• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 3 May - June 2015

    ISSN 0975 - 9646

    1. Captcha as Graphical Passwords
    Pages : 1975-1985
    Kalyani S Kumar
    Abstract | PDFPDF
    2. An Innovative Approach to Diabetes Diagnosis
    Pages :1986-1989
    G.Nageswara Rao, V.Swetha, M.Rithvik
    Abstract | PDFPDF
    3. Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing
    Pages : 1990-1993
    Narsu Patil, Nitesh Patil, Anil Bagal, Mayuri Desai, Anita Bhosale
    Abstract | PDFPDF
    4. Review on Block Based Transformation Image Encryption Techniques
    Pages : 1994-1995
    Himani Patwa and Akhilesh Deep Arya
    Abstract | PDFPDF
    5. Adaption of Customer Relationship Management and Data mining tools in the Data intensive Cloud
    Computing Environment

    Pages : 1996-2002
    Sanjib Kumar Routray, Sasmita Mishra
    Abstract | PDFPDF
    6. Parallel and Improved PageRank Algorithm for GPU-CPU Collaborative Environment
    Pages :2003-2005
    Prasann Choudhari , Eikshith Baikampadi, Paresh Patil , Sanket Gadekar
    Abstract | PDFPDF
    7. An Efficient RSA Based Technique for the Encryption and Decryption
    Pages :2006-2009
    Sharad Morolia, Manoj Dhawan
    Abstract | PDFPDF
    8. A Comprehensive Survey on Fanet : Challenges and Advancements
    Pages : 2010-2013
    Shashank Kumar Singh
    Abstract | PDFPDF
    9. Database search Orchestrator for cloud database
    Pages : 2014-2017
    Shweta Agrawal, Raj Kamal
    Abstract | PDFPDF
    10. Eliminating Redundancy in File System Using Data Compression and Secured File Sharing
    Pages :2018-2022
    Raakesh, Varun Raj G, Krishna R, L.Maria Michael Visuwasam
    Abstract | PDFPDF
    11. Improving the life cycle of Genetic Programming using Feature Selection with Multiobjective
    Fitness Function

    Pages : 2023-2026
    Rupali Koushal , Manoj Dhawan
    Abstract | PDFPDF
    12. Secure and Economical Information Transmission for Cluster-Based Wireless Sensor Networks
    Pages : 2027-2030
    Bhimashankar K. Dhurape , Swati S. Joshi
    Abstract | PDFPDF
    13. EEG signal classification using Modified Fuzzy Clustering algorithm
    Pages :2031-2034
    Priyanka Jaiswal, Rupali Koushal
    Abstract | PDFPDF
    14. A Survey on Techniques and Fundamentals of Internet Access in VANET-INTERNET Integration Scenarios
    Pages : 2035-2039
    Ujwala L. Mane, Aparna A. Junnarkar
    Abstract | PDFPDF
    15. A Modified Classification Based Technique for More Accurate Classification & Prediction of the
    Intrusion

    Pages : 2040-2042
    Neha Agrawal, Priyanka Vijayvargiya
    Abstract | PDFPDF
    16. A Survey on Various Image Enhancement Algorithms for Naturalness Preservation
    Pages : 2043-2045
    Divya K A, Roshna K I
    Abstract | PDFPDF
    17. Survey on Clustering Algorithms of Wireless Sensor Network
    Pages : 2046-2049
    Mohini Kumrawat, Manoj Dhawan
    Abstract | PDFPDF
    18. Optimal Code Compiling in C
    Pages : 2050-2057
    Nitika Gupta, Nistha Seth, Prabhat Verma
    Abstract | PDFPDF
    19. Automatic Generation of Owl for Domain Based Applications
    Pages : 2058-2060
    Neha Dalwadi
    Abstract | PDFPDF
    20. An Image Indexing and Retrieval Method Using Local Tetra Pattern for Content-Based Image
    Retrieval (CBIR)

    Pages : 2061-2064
    Shraddha D. Jumade, Prof. Sheetal S. Dhande
    Abstract | PDFPDF
    21. A Literature Survey on Digital Image Processing Techniques in Character Recognition of Indian
    Languages

    Pages : 2065-2069
    Dr. Jangala. Sasi Kiran, N. Vijaya Kumar , N. Sashi Prabha , M. Kavya
    Abstract | PDFPDF
    22. OPEN FLOW :Innovating campus network
    Pages : 2070-2075
    Prithvi krishna D, Shrihari M R, AnkithaGowda
    Abstract | PDFPDF
    23. A Study on Use of Big Data in Cloud Computing Environment
    Pages : 2076-2078
    Venkatesh H, Shrivatsa D Perur, Nivedita Jalihal
    Abstract | PDFPDF
    24. A Portable and Secure Healthcare Maintenance System
    Pages : 2079-2083
    K.Sravani, B.Bindusha Reddy, R.R.V.N.V.Kumari, G.Vijay Kumar
    Abstract | PDFPDF
    25. An Improved Method for Detection of Satire from User-Generated Content
    Pages : 2084-2088
    Syed Taha Owais,Tabrez Nafis, Seema Khanna
    Abstract | PDFPDF
    26. Cloud Business Process Management & Data Security
    Pages : 2089-2093
    Honey Tilwani
    Abstract | PDFPDF
    27. Reliable Cloud Using elliptical Curve Deffie Hellman and Elliptical Curve Digital Signature
    Pages : 2094-2096
    Akash Shrivastava, Nitya M Nerli
    Abstract | PDFPDF
    28. Modified RSA Algorithm for (Wi-Fi) Security Protocol
    Pages : 2097-2098
    T.Venkata Satya Vivek, D.Anandam , Ganta Anil,B.Sreenivasulu, V.Lakshma Reddy, M Rao Batchnaboyina
    Abstract | PDFPDF
    29. Load Balancing in Content Delivery Network Using Distributed Control Law
    Pages : 2099-2105
    Chetana B. Bhagat, Dilip K. Budhwant
    Abstract | PDFPDF
    30. Protecting the Finger Print Template by Fusion of Ridges and Texture
    Pages : 2106-2110
    Vidyasree.P, Dr.G.VenkataRamiReddy
    Abstract | PDFPDF
    31. Constrained Curve Drawing with C1 Continuous Rational Quadratic Curve
    Pages : 2111-2114
    Ashu Pal, Harshvardhan Mathur
    Abstract | PDFPDF
    32. Image Segmentation Based Face Recognition Using Enhanced SPCA-KNN Method
    Pages : 2115-2120
    J.Savitha, Dr.A.V.Senthil Kumar
    Abstract | PDFPDF
    33. An Intelligent System For Forecasting Electric Load And Price
    Pages : 2121-2126
    Sushmita Tiwari, Vaishali singh, Rajiv Kumar
    Abstract | PDFPDF
    34. Identifying and Extracting Data from Clipboard
    Pages : 2127-2129
    Ganesh N. Nadargi, Zakir M. Shaikh
    Abstract | PDFPDF
    35. A Review on Various RFID Based Automated Highway Toll Collection Systems
    Pages : 2130-2133
    Venkatesh Suvarna and Jeet Patalia
    Abstract | PDFPDF
    36. Tool for Extraction of Functional Requirements from Legacy Code
    Pages :2134-2138
    Pooja Khanna
    Abstract | PDFPDF
    37. Faster and Efficient Method for Robust Exemplar Based Inpainting Using Block Processing
    Pages : 2139-2141
    Yogesh Laxman Tonape, Vinayak Pottigar, Swapanaja Ubale
    Abstract | PDFPDF
    38. An Indirect Encryption using Compression with Random bit stuffing
    Pages : 2142-2144
    Dr. M. Ramesh, Dr. B. Hemanth Kumar, Prof. M. Surendra Prasad Babu
    Abstract | PDFPDF
    39. Database Evaluation Considering the Decisive Factors for Obtaining an Optimistic Value to Predict the Diagnose
    Pages : 2145-2149
    M.Purnachandra Rao, N.Padmini Krishna, N.Jagannadh Varma, P.Rohini, V.Sri Divya
    Abstract | PDFPDF
    40. Privacy Conflicts for Collaborative Data Sharing in Online Social Network
    Pages : 2150-2153
    Sandip S. Shirgave, Prof. Subhash V. Pingale, Dr. K. J. Karande
    Abstract | PDFPDF
    41. Implementing Capability Maturity Model for Higher Education as Education ERP Solution
    Pages : 2154-2158
    Pinak Pani Chakrabarty
    Abstract | PDFPDF
    42. A Comparative Study on Web Crawling for searching Hidden Web
    Pages : 2159-2163
    Beena Mahar, C K Jha
    Abstract | PDFPDF
    43. NTP Based Smart Energy Meter
    Pages : 2164-2167
    Chetana Dapse
    Abstract | PDFPDF
    44. A Fuzzy Effective Approach to Perform Image Fusion on Medical Images
    Pages : 2168-2171
    Shilpa, Nishant Jakhar, Prabhneet Kaur
    Abstract | PDFPDF
    45. Detecting of Materialize Topical Trend Topic from Social Networks
    Pages : 2172-2174
    Tamilmani.G, Rajathi. K, Ponnaruvi. P
    Abstract | PDFPDF
    46. An Innovative Data Security Techniques Using Cryptography and Steganographic Techniques
    Pages : 2175-2182
    Richa Dubey, Apurva Saxena, Sunita Gond
    Abstract | PDFPDF
    47. Comparative Study of Data Dissemination Algorithms based on Cluster Forming Parameters in Vehicular Ad-hoc Network
    Pages : 2183-2186
    Arvind Kumar, Sudesh Rani
    Abstract | PDFPDF
    48. Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS
    Pages : 2187-2191
    Shashikant Mahadu Bankar
    Abstract | PDFPDF
    49. User Authentication Using Multimodal Biometrics
    Pages : 2192-2200
    Prashant Kumar Jain, Shailja Shukla, S.S. Thakur
    Abstract | PDFPDF
    50. An Active Approach based on Independent Component Analysis for Digital Image Forensics
    Pages : 2201-2203
    Anil Dada Warbhe, R. V. Dharaskar
    Abstract | PDFPDF
    51. Partial Image Encryption Using Block Shuffling and Affine Transform
    Pages : 2204-2207
    Rakhi, Rekha Pandit
    Abstract | PDFPDF
    52. Survey on Various Quantum Key Distribution Algorithms
    Pages : 2208-2209
    Vivek Singh, Bhawna Chauhan
    Abstract | PDFPDF
    53. Manufacturing Backend
    Pages : 2210-2214
    Anusha Hiremath , Apoorva Dhavale , K V Roopa , Keertee Savadi, Aruna S. Nayak
    Abstract | PDFPDF
    54. A Survey on Different Routing Protocols in Wireless Sensor Network
    Pages :2215-2220
    Nidhi Sharma
    Abstract | PDFPDF
    55. An SVM-Fuzzy Expert System Design For Diabetes Risk Classification
    Pages :2221-2226
    Thirumalaimuthu Thirumalaiappan Ramanathan , Dharmendra Sharma
    Abstract | PDFPDF
    56. Estimating the optimal number of servers for an emergency department of a private hospital, via
    mathematical programming.

    Pages : 2227-2231
    Zeinab yousef Mahmoud
    Abstract | PDFPDF
    57. RFID Based Ticketing System For Local Trains
    Pages : 2232-2234
    K. T. Patil, Dipti Mehendale,Vidya S., Aldar Leena Govilkar, S.K.Narayankhedkar
    Abstract | PDFPDF
    58. An Automatic Approach Towards Coloring Videos Using Monochrome Texture Descriptor & Parallel
    Processing

    Pages : 2235-2239
    Gauri R. Joshi, Prof. Mayur S. Burange
    Abstract | PDFPDF
    59. Distributed Cache Modernizing for the Multi- Source Transmitting Protocol
    Pages : 2240-2243
    G.Thilipkumar, Dr. R. Balasubramanian
    Abstract | PDFPDF
    60. Identify and Compare discernment rules for accurate Liver Disorder detection using Apriori and FP Generation Analysis
    Pages : 2244-2255
    Gagandeep Kaur
    Abstract | PDFPDF
    61. Elicitation of Information from Online Libraries using Web Content Mining Methods and Applications
    Pages : 2256-2258
    Rutvija Pandya, Jayati Pandya
    Abstract | PDFPDF
    62. A Survey of Quality of Service routing protocols in MANETs
    Pages : 2259-2262
    Juned Ahmad, Samir Srivastava, PK Singh
    Abstract | PDFPDF
    63. Power Consumption Analysis
    Pages : 2263-2266
    Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia
    Abstract | PDFPDF
    64. Efficient Packet Forwarding Technique in LEACH Protocol in Multisink Wireless Sensor Network
    Pages : 2267-2271
    Nikha Sheoran ,Kaushik Ghosh
    Abstract | PDFPDF
    65. E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis
    Pages : 2272-2276
    Mandeep Chowdhary , V. S. Dhaka
    Abstract | PDFPDF
    66. Vehicle License Plate Recognition System Using LoG Operator for Edge Detection and Radon Transform for Slant Correction
    Pages : 2277-2281
    Jaya Gupta, Prof. Supriya Agrawal
    Abstract | PDFPDF
    67. A Study Combined DWT-DCT Digital Image Hiding Information
    Pages : 2282-2286
    Jyoti Sahu, Dolley Shukla
    Abstract | PDFPDF
    68. Sales Prediction Using Effective Mining Techniques
    Pages : 2287-2289
    Nirav Shah, Mayank Solanki, Aditya Tambe, Dnyaneshwar Dhangar
    Abstract | PDFPDF
    69. Protecting Fingerprint Privacy Using Combined Minutiae Template Generation Algorithm
    Pages : 2290-2294
    Prabhakara Rao T, Gintanjali Sahu
    Abstract | PDFPDF
    70. Watershed: An Image Segmentation Approach
    Pages : 2295-2297
    Arindrajit Seal, Arunava Das, Prasad Sen
    Abstract | PDFPDF
    71. Generating Placement Intelligence in Higher Education Using Data Mining
    Pages : 2298-2302
    Praveen Rani, Dr. Rajan Vohra
    Abstract | PDFPDF
    72. Product Sales Prediction Based on Sentiment Analysis Using Twitter Data
    Pages : 2303-2313
    Dipak Gaikar, Bijith Marakarkandy
    Abstract | PDFPDF
    73. Offline Handwritten Character Recognition in South Indian Scripts: A Broad Visualization
    Pages : 2314-2317
    Sunitha Anne M. O. Chacko, Ansu Joseph, Jeena Joji Anchanattu, Sreelakshmi .S , Veena A. Kumar
    Abstract | PDFPDF
    74. Tourview: Sentiment Based Analysis on Tourist Domain
    Pages : 2318-2320
    Deepanshi Sharma, Achal Kulshreshtha, Priyanka Paygude
    Abstract | PDFPDF
    75. Web Usage Mining Approaches for User’s Request Prediction: A Survey
    Pages : 2321-2325
    Avneet Saluja, Dr. Bhupesh Gour, Lokesh Singh
    Abstract | PDFPDF
    76. Spam Outlier Detection in High Dimensional Data: Ensemble Subspace Clustering Approach
    Pages : 2326-2329
    Suresh S. Kapare, Bharat A. Tidke
    Abstract | PDFPDF
    77. Efficient Productivity For Recommendation Of Semantic Web Pages
    Pages : 2330-2334
    B.Gayatri Devi, S.Soundarajan
    Abstract | PDFPDF
    78. A Survey Paper on Video Steganography
    Pages : 2335-2338
    Kedar Nath Choudry, Aakash Wanjari
    Abstract | PDFPDF
    79. A Survey on Privacy Preservation Used in Data Mining Techniques
    Pages : 2339-2341
    Haina Mahilary
    Abstract | PDFPDF
    80. TRAODV: Trusted and Robust Adhoc On demand Distance Vector Routing in MANET
    Pages : 2342-2346
    Ravindra J. Mandale, Dadaso T. Mane
    Abstract | PDFPDF
    81. Auditing Based Cloud Consistency as a Service for PHR data
    Pages : 2347-2348
    K.Brindha, T.K.P.Rajagopal
    Abstract | PDFPDF
    82. A Basic Introduction to DevOps Tools
    Pages : 2349-2353
    Akshaya H L, Nisarga Jagadish S, Vidya J, Veena K
    Abstract | PDFPDF
    83. A Review of Various Linear and Non Linear Dimensionality Reduction Techniques
    Pages : 2354-2360
    Sumithra V.S, Subu Surendran
    Abstract | PDFPDF
    84. Expert Search on Web Using Association Distribution
    Pages : 2361-2363
    Poonam P. Rayakar, Prof. S Pratap Singh
    Abstract | PDFPDF
    85. Error Log Analytics using Big Data and MapReduce
    Pages : 2364-2367
    Laurel Thejas Souza, Girish U R
    Abstract | PDFPDF
    86. Thwarting Perils through Cloud Provisioning using Security Issues in Vehicular Cloud
    Pages : 2368-2372
    N. Nijanthan, B.Mohankumar, Dr. P. Marikkannu
    Abstract | PDFPDF
    87. Review of a Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on
    AODV-based MANETs

    Pages : 2373-2376
    Arpana Akash Morey, Jagdish W. Bakal
    Abstract | PDFPDF
    88. Energy Enhancement and Performance Evaluation of LAEEBA Routing Protocol in WBAN using NS-2
    Pages : 2377-2383
    Sheth Mahammed Ovesh I., Sarika Khandelwal
    Abstract | PDFPDF
    89. Design & Implementation of Traffic Violation Monitoring System
    Pages : 2384-2386
    Govind Prasad Arya , Durga Prasad Chauhan, Vishal Garg
    Abstract | PDFPDF
    90. Design & Analysis of Authentication of Moving Image Using Message Digest
    Pages : 2387-2394
    Vijender Kumawat, Palika Jajoo
    Abstract | PDFPDF
    91. Thyroid Classification using Ensemble Model with Feature Selection
    Pages : 2395-2398
    Suman Pandey, Anshu Tiwari , Akhilesh Kumar Shrivas and Vivek Sharma
    Abstract | PDFPDF
    92. A Brief Introduction to Digital Watermarking
    Pages : 2399-2401
    Ankita Sharma, Sarika khandelwal
    Abstract | PDFPDF
    93. Stateless Multicast Protocol for Ad- Hoc Networks
    Pages : 2402-2405
    Trupti Patil, A. A. Phatak
    Abstract | PDFPDF
    94. Minimum Broadcast Energy Conserving Protocol for Asymmetric WSN
    Pages : 2406-2408
    Anujatai Patil , A.V. Mophare
    Abstract | PDFPDF
    95. An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier
    Stego Image

    Pages : 2409-2414
    Sneha A. Deshmukh, P.B.Sambhare
    Abstract | PDFPDF
    96. Performance Analysis of DSDV, DSR Routing Protocols in Vehicular Ad-Hoc Network(Vanets)
    Pages : 2415-2418
    V.Anji Reddy, P.Siva Prasuna, Rittika.D.Varu, P.Nikhila, N.SriLakshmi
    Abstract | PDFPDF
    97. Microcontroller Based Mechanised Videographing of Text and Auto-Generation of Voice Text in Real Time
    Pages : 2419-2425
    P. Nagabhushan , Vimuktha Evangeleen Jathanna
    Abstract | PDFPDF
    98. A Review paper on Construction of Query Forms
    Pages : 2426-2428
    Jayashri M.Jambukar, Prof. M.B.Vaidya
    Abstract | PDFPDF
    99. An Efficient Approach towards Thunderstorm Detection Using Saliency Map
    Pages : 2429-2434
    Rasika P. Gawande, Prof. Namrata D. Ghuse
    Abstract | PDFPDF
    100. An Automated System for Signature Recognition and Authentication from Multishare Based Image Database
    Pages : 2435-2440
    Sharayu S. Sangeka, D.C.Dhanwani
    Abstract | PDFPDF
    101. User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
    Pages : 2441-2447
    Pooja R. Vyawhare, Prof.Namrata D. Ghuse
    Abstract | PDFPDF
    102. Parallel Comparison of Text Document with Input Data Mining and VizSFP
    Pages : 2448-2453
    Priyanka P. Palsaniya, D. C. Dhanwani
    Abstract | PDFPDF
    103. Modified Cat Swarm Optimization Algorithm for Design and Optimization of IIR BS Filter
    Pages : 2454-2460
    Kamalpreet Kaur Dhaliwal, Jaspreet Singh Dhillon
    Abstract | PDFPDF
    104. Enhancing Firewall for Serving the Distributed Security Requirements for Cloud
    Pages : 2461-2466
    Yamini Bangur, Vijendra Mandraha
    Abstract | PDFPDF
    105. Detection of Child Events with the kinetic Components of a Vehicle to Avoid the Hidden Dangers-A Survey
    Pages : 2467-2470
    Mortha Manasa Devi
    Abstract | PDFPDF
    106. A Survey on Multiparty Access Control Mechanism of Online Social Networks
    Pages : 2471-2474
    Sandip Sharad Shirgave, Dr. K. J. Karande,Subhash V. Pingale, Prakash Gadekar, S. S. Kulkarni
    Abstract | PDFPDF
    107. A Survey on Protection against Power Depletion Attack in WSN
    Pages : 2475-2478
    Sruthin R.V., Jayasudha J. S.
    Abstract | PDFPDF
    108. On Replication Strategies for Data Intensive Cloud Applications
    Pages : 2479-2484
    Rashmi Ranjana T P, Jayalakshmi D S, Dr. Srinivasan R
    Abstract | PDFPDF
    109. A Review on Prediction of Collective Behavior
    Pages : 2485-2487
    Pranjali Deshmukh, R.M.Gawande
    Abstract | PDFPDF
    110. VMAIL: Voice Based Email Application
    Pages :2488-2490
    Rahul Anwani, Usha Santuramani, Deeksha Raina, Priya R.L
    Abstract | PDFPDF
    111. Analysis & Design of multiple watermarking in a Video for Authentication & Copyright Protection
    Pages : 2491-2497
    Yogendra Sharma, Jitender Kumar, Yogesh Rathi
    Abstract | PDFPDF
    112. Flower Detection and Counting Using Morphological and Segmentation Technique
    Pages :2498-2501
    Balvant V. Biradar, Santosh P. Shrikhande
    Abstract | PDFPDF
    113. Predictive Analysis of Diabetic Treatment Using Classification Algorithm
    Pages :2502-2505
    M.Mounika, S.D.Suganya, B.Vijayashanthi, S.KrishnaAnand
    Abstract | PDFPDF
    114. Crowdsourcing with Smartphones for Traffic Dissemination
    Pages : 2506-2508
    Asha K, Nasreen Taj M.B
    Abstract | PDFPDF
    115. Enhancing Bandwidth in Route Recovery – An Approach Based on Forward and Reverse Path Routing with Hop-Count
    Pages : 2509-2511
    Apoorva P, Kumar Sharath.B.C, Manu Bhargav.M.R
    Abstract | PDFPDF
    116. PERFORMANCE EVALUATION OF QUALITY METRICES BASED FAULT PREDECTION MODEL FOR REPLICA MANAGEMENT IN CLOUD COMPUTING
    Pages : 2512-2518
    Ajitabh Mahalkari, Prof. Ritu Tondon
    Abstract | PDFPDF
    117. Proficient acquaintance based system for citrus leaf disease recognition and categorization
    Pages : 2519-2524
    K.Lalitha,K.Muthulakshmi,A.Vinothini
    Abstract | PDFPDF
    118. Survey of various POS tagging techniques for Indian regional languages
    Pages :2525-2529
    Shubhangi Rathod, Sharvari Govilkar
    Abstract | PDFPDF
    119. A New Approach of Fault Node Recovery in Wireless Sensor Network
    Pages : 2530-2533
    Vibha Paradkar, Gajendra Singh, Kailash Patidar
    Abstract | PDFPDF
    120. Analysis of The Fraud E-Mails using Truncated Gaussian Mixture Model and Ontological Application
    Pages : 2534-2536
    Sreenivasulu. V, Satya Prasad. R
    Abstract | PDFPDF
    121. Weight-Based-Priority Approach for Analyzing Data Using Traces and Filters
    Pages :2537-2540
    Mahendra S. Pandit
    Abstract | PDFPDF
    122. A Survey on IP Address Assignment in a Mobile Ad Hoc Network
    Pages :2541-2544
    Vibhoo Sachan, Samir Srivastava, P.K.Singh
    Abstract | PDFPDF
    123. Evolution of Mobile Wireless Technology from 0G to 5G
    Pages :2545-2551
    Mohammad Meraj ud in Mir , Dr. Sumit Kumar
    Abstract | PDFPDF
    124. Penetration Testing
    Pages :2552-2553
    Raghavendra Pokuri, Chanikya Merugu, Naveen Battula
    Abstract | PDFPDF
    125. Prediction of Cancer Diseases Using Navie Bayes Classification
    Pages :2554-2556
    Shruthi S, Mithun Mohan, Akshaya Aravind
    Abstract | PDFPDF
    126. A Research Work on English to Marathi Hybrid Translation System
    Pages :2557-2560
    Pramod Salunkhe, Mrunal Bewoor, Dr.Suhas Patil
    Abstract | PDFPDF
    127. Notion of Black Hole in Wireless Networks targeting on iMANET
    Pages :2561-2565
    Natasha Tomar, Amit Chaudhary
    Abstract | PDFPDF
    128. Private Preserving Publically Checking for Shared Data in the Cloud Using Oruta
    Pages :2566-2569
    Ashwini H, Mrutyunjay B, Sangamesh P, Smitha D, Veeresh Biradar
    Abstract | PDFPDF
    129. Object Scanning based Road Obstacles Detection using Weighted Sum Method
    Pages :2570-2573
    Neha Chalana, Lovnish Bansal
    Abstract | PDFPDF
    130. Machine Learning Approach to Detect Tuberculosis in patients with or without HIV co-infection
    - A Survey

    Pages :2574-2578
    Ashwini D.V.and Dr. Seema S.
    Abstract | PDFPDF
    131. Multi-Level Encryption Mechanism for Access Control Over Cloud Data
    Pages :2579-2582
    T. Kavitha B. Narendra C. Sushama S. Shiva Prakash
    Abstract | PDFPDF
    132. Analysis of Pattern Matching Algorithms
    Pages :2583-2586
    Siva Kumar Kotamraju
    Abstract | PDFPDF
    133. FINE TUNING OF PHYLIP ON INTEL XEON ARCHITECTURE
    Pages :2587-2592
    Prinkesh Sharma, Kondorpa Kumar Borchetia, Shivam Saxena
    Abstract | PDFPDF
    134. Detection of Brain Tumors using Learning Machine Approach and Spatial Fuzzy Segmentation
    Pages :2593-2596
    G. Lavanya, C. Suganthini
    Abstract | PDFPDF
    135. Metaheuristic Based Approach to Regression Testing
    Pages :2597-2605
    Shweta Mittal, Om Prakash Sangwan
    Abstract | PDFPDF
    136. Implementation of Location based Steganography on mobile Smartphone using Android Platform
    Pages :2606-2609
    Khushali Pandit, Varsha Bhosale
    Abstract | PDFPDF
    137. HIDES: Hierarchical based and an Energy Efficient Intrusion Detection System for Wireless Sensor Networks
    Pages :2610-2615
    B Kamaladharan
    Abstract | PDFPDF
    138. Data mining and the News Boy Model in B2B E-Commerce Supply Chain
    Pages :2616-2619
    Minakshi Lalit Patil
    Abstract | PDFPDF
    139. A Clustering Search Technique for Social Network Applications
    Pages :2620-2622
    Saurabh Sharma, Aravendra Kumar Sharma, Arun Kumar Sharma
    Abstract | PDFPDF
    140. Enhancing Data Security and Storage in Cloud Computing Environment
    Pages :2623-2626
    Shivali Munjal, Shelly Garg
    Abstract | PDFPDF
    141. Enhanced Security Layer by Using Integration of Sound Signature and Graphical Password Authentication System
    Pages :2627-2629
    Manasa Bhat, Vanisha P Santhmayor, Mahesh .K
    Abstract | PDFPDF
    142. Hybrid Security Using Digital Signature & RSA Encryption for AODV in MANET
    Pages :2630-2635
    Shelbala Solanki, Anand Gadwal
    Abstract | PDFPDF
    143. Comparitive Study of Uterine Cyst Characterisation Using Glcm and Wavelet Transform
    Pages :2636-2640
    Brindha D, Kandaswamy A, Subbashini S
    Abstract | PDFPDF
    144. A Comparative Analysis of M-GEAR and MODLEACH Energy Efficient WSN Protocols
    Pages :2641-2644
    Neeraj Dewli, Rashmi Saini
    Abstract | PDFPDF
    145. Image Matcher – Content Based Image Retrieval System Using Image Sub Blocks and Indexing
    Pages :2645-2652
    D. D. Pukale, Varsha H. Sakore, Nilima K. Shevate,. Nutan D. Pawar, Priyanka N. Shendage
    Abstract | PDFPDF
    146. Unambiguous Representation for Sliceable Rectangular Floorplans
    Pages :2653-2657
    Soumya Pratik Saha, Satrajit Ghosh
    Abstract | PDFPDF
    147. Web Log Analyzer for Semantic Web Mining
    Pages :2658-2662
    Fakhrun Jamal , Mamta Bansal
    Abstract | PDFPDF
    148. A Survey of Text Categorization and its Various Approaches
    Pages :2663-2666
    M. Maharasi, N. Antony Sophia
    Abstract | PDFPDF
    149. Level of Ubiquity of Various Software Projects
    Pages :2667-2670
    Anil Kumar Mishra, Diksha Nagpal
    Abstract | PDFPDF
    150. Data Based-Secure and Efficient Dynamic Clustering (DB-SEDC) for Data Aggregation in Wireless Sensor Network
    Pages :2671-2673
    Priya M R, Chinnaswamy C N, Sreenivas T H
    Abstract | PDFPDF
    151. Extension of Preserving Privacy Location in Social Networks
    Pages :2674-2677
    Ravi Konaraddi
    Abstract | PDFPDF
    152. Survey on Identity Based Blind Signature
    Pages :2678-2681
    Girish, Krupa K T, Dr. Phaneendra H D
    Abstract | PDFPDF
    153. A Survey on Various Word Spotting Techniques for Content Based Document Image Retrieval
    Pages :2682-2686
    Blessy Varghese, Sharvari Govilkar
    Abstract | PDFPDF
    154. A Comparative Study of Parallel Job Scheduling Algorithms in Cloud Computing
    Pages :2687-2690
    A.Kousalya, R.Radhakrishnan
    Abstract | PDFPDF
    155. An Overview of Concept Based and Advanced Text Clustering Methods
    Pages :2691-2697
    B.Jyothi, D.Sailaja, Y.Srinivasa Rao
    Abstract | PDFPDF
    156. A Genetic Algorithm Based Average Percentage of Statement Coverage Technique for Test Case Ordering
    Pages :2698-2705
    Atul kumar Pal, Makul Mahajan
    Abstract | PDFPDF
    157. Offline Resource Extractor: An Efficient Resource Extraction System
    Pages :2706-2709
    N.P.Joshi
    Abstract | PDFPDF
    158. Enhancing the Semantic of the Business Repository Components for More Efficient Web Services Discovery
    Pages :2710-2716
    Salim BAROUDI, Mohamed BAHAJ
    Abstract | PDFPDF
    159. Link Initialization and Training in MAC Layer of PCIe 3.0
    Pages :2717-2719
    Chandana K N , Karunavathi R K
    Abstract | PDFPDF
    160. CAPTCHA Problems Based On AI Provide Protection against Automated Hacking Tools
    Pages :2720-2723
    Priyanka K.Kukade, Prof. Ms. M.S. Deshmukh
    Abstract | PDFPDF
    161. A Filter Base Addressing Protocol for Node Auto- Configuration in Wireless Ad Hoc Network Using
    Cuckoo Filter

    Pages :2724-2728
    Bhushan A. Badgujar, Swati patil, Mayur Agrawal
    Abstract | PDFPDF
    162. Registration Plate Recognition from Still Images and Videos in Real Time Conditions
    Pages :2729-2734
    Glence Joseph, Dr.Tripty Singh, Andan HM, Aravind G
    Abstract | PDFPDF
    163. Topological Conditions for Maintaining Stabilization of Dynamic System
    Pages :2735-2737
    Dilip Budhwant, Bhagyashri Bhalekar
    Abstract | PDFPDF
    164. Driver Evaluation System Using Mobile Phone and OBD-II System
    Pages :2738-2745
    Sujata Khedkar, Akshaykumar Oswal, Manjari Setty, Srinivas Ravi
    Abstract | PDFPDF
    165. Research on Cloud Testing Based on Ontology and Multi-Agent Framework
    Pages :2746-2749
    Afaf Al-Neaimi
    Abstract | PDFPDF
    166. Cross Domain Composition of Web Service Workflows using a Provenance Ontology with an automated Re-planning
    Pages :2750-2753
    B.Meenakshi Sundaram, Dr. D. Manimegalai
    Abstract | PDFPDF
    167. A Hybrid Security Service To Achieve Strong Authentication And Cryptography For Cloud Applications
    Pages :2754-2760
    Vivek Dandir, Prof. Mohsin Sheikh
    Abstract | PDFPDF
    168. Self-Navigating Quadcopter
    Pages :2761-2765
    O Guneshwor Singh
    Abstract | PDFPDF
    169. Slope Switch Variable Value Prediction using Two Dimensional Curve Fitting for a Limited Data
    Mining Set

    Pages :2766-2767
    Venkatesh Suvarna
    Abstract | PDFPDF
    170. Displaying Crisis Informing for Auto Collision over Dichotomized Progress Demonstrate in Vehicular Ad-hoc System
    Pages :2768-2771
    Veena R C
    Abstract | PDFPDF
    171. On the Advancements in Cloud Computing Technology: An Overview
    Pages :2772-2778
    Majed Alhaisoni
    Abstract | PDFPDF
    172. Adaptive Fault Free and Secured Path Selection in Wireless Sensor Networks
    Pages :2779-2781
    Deepali Virmani, Pranav Gupta
    Abstract | PDFPDF
    173. Voting Methods For Malware Detection
    Pages :2782-2786
    Pranit Gaikwad, Dilip Motwani, Vinayak D.Shinde
    Abstract | PDFPDF
    174. Ensuring Data Security on Cloud
    Pages :2787-2790
    Jitendra Kumar Seth, Satish Chandra
    Abstract | PDFPDF
    175. Secured Data Sharing in the Cloud
    Pages :2791-2793
    Amrut Hunashyal, Chetak Patil, Vilas Balaganur
    Abstract | PDFPDF
    176. Challenges in Design and development of EEG based BCI: A Review
    Pages :2794-2796
    Vaishali Kadam, Dr. R. R. Deshmukh
    Abstract | PDFPDF
    177. An Enhanced Function Point Analysis (FPA) Method for Software Size Estimation
    Pages :2797-2799
    Nilesh Choursiya, Rashmi Yadav
    Abstract | PDFPDF
    178. Are you a Human or Robot? or Everything CAPTCHA
    Pages :2800-2805
    Revati Ghadge, Archana M. Naware
    Abstract | PDFPDF
    179. Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks
    Pages :2806-2809
    Besty Haris
    Abstract | PDFPDF
    180. BYOD:Usability
    Pages :2810-2814
    Abha Tewari, Pooja Nagdev,Kiran Israni
    Abstract | PDFPDF
    181. Assessment of Document Similarity with Clustering Using Multi View-Points
    Pages :2815-2818
    Sindhudarshini S, Suresh G S
    Abstract | PDFPDF
    182. Dynamic Environment Exploration Tool: A Blind’s Eye
    Pages :2819-2822
    Dushyant Kumar Singh
    Abstract | PDFPDF
    183. Securing Broker-less Publish/Subscribe System using Fuzzy Identity-Based Encryption
    Pages :2823-2826
    Maithily B, Swathi Y
    Abstract | PDFPDF
    184. Trustworthy Resource Sharing on Collaborative Cloud Computing
    Pages :2827-2830
    T. Amith Kumar, G. Priya, N.Jaisankar
    Abstract | PDFPDF
    185. Effective Personalization of web search based on Fuzzy Information Retrieval
    Pages :2831-2837
    Suruchi Chawla
    Abstract | PDFPDF
    186. Data Driven Data Mining Model for Biological Pathways
    Pages :2838-2840
    N.Sevugapandi and Dr.C.P.Chandran
    Abstract | PDFPDF
    187. Study and Analysis of Digital Image Enhancement
    Pages :2841-2848
    Sanjib Das, Niranjan Cannon
    Abstract | PDFPDF
    188. A Survey of News Article Clustering and Summarization
    Pages :2849-2851
    Purabi Choudhury
    Abstract | PDFPDF
    189. Emphasizing Big Data Engineering and Software Architecture on Cloud Computing
    Pages :2852-2855
    Mohammed Faisal,Tamil Selvi Madeswaran, Sanjay Gupta
    Abstract | PDFPDF
    190. Bi-Variate Gaussian Mixture Model Based Techniques for Effective Analysis of Cyber Crimes
    Pages :2856-2858
    V.Sreenivasulu, R. Satya Prasad
    Abstract | PDFPDF
    191. Collaboration in Multicloud Computing Environments: Framework and Security Issues
    Pages :2859-2862
    Madivalayya M Hiremath, Annapurna P Patil
    Abstract | PDFPDF
    192. Finger-Knuckle-Print Based Recognition System using LBP and SURF
    Pages :2863-2867
    Salil Kumar Verma, Maitreyee Dutta
    Abstract | PDFPDF
    193. Classification of Unstructured Data using Soft Computing: A Survey
    Pages :2868-2870
    Swati Wakode, Rakesh Mallesh, Mandar Wagh, Manisha P Mali
    Abstract | PDFPDF
    194. Big Data Analysis using Partition Technique
    Pages :2871-2875
    Prasadkumar Kale and Arti Mohanpurkar
    Abstract | PDFPDF
    195. Single Page Application using AngularJS
    Pages :2876-2879
    Madhuri A. Jadhav, Balkrishna R. Sawant, Anushree Deshmukh
    Abstract | PDFPDF
    196. Perspective Identification of Indian Musical Instrument Ghan and Sushir Vadya
    Pages :2880-2883
    Satish Ramling Sankaye, S.C. Mehrotra, U.S. Tandon
    Abstract | PDFPDF
    197. Automating the Payment of Toll Tax at Toll Plazas
    Pages :2884-2887
    Kruti Sanghvi , Prof.Amol Joglekar
    Abstract | PDFPDF
    198. Collaborative Filtering Approach For Big Data Applications in Social Networks
    Pages :2888-2892
    Rajeswari.M
    Abstract | PDFPDF
    199. A Survey on Unsupervised Extraction of Product Information from Semi-Structured Sources
    Pages :2893-2897
    Abhilasha Bhagat, Vanita Raut
    Abstract | PDFPDF
    200. A Preventing Privacy Leakage and Discrimination Enabled Vulnerabilities in Data Publishing and Mining
    Pages :2898-2901
    Pujari.Sasidhar, K.R.K.Satheesh
    Abstract | PDFPDF
    201. Controlling Air Conditioner (Temperature and Airflow) Using Wireless Sensor Network and iSense Technology
    Pages :2902-2906
    Karthik SK, Maheshwari Kittur, Suraj M Halakatti and Vineetkumar Patil
    Abstract | PDFPDF
    202. Classification of Music based on Clave Direction using Machine Learning Techniques
    Pages :2907-2909
    Sabina M A
    Abstract | PDFPDF
    203. Application of Data Mining in Adaptive and Intelligent Tutoring Systems: A Review
    Pages :2910-2917
    Rajitha Koppisetty
    Abstract | PDFPDF
    204. A Survey Paper on Automatic Speech Recognition by Machine
    Pages :2918-2922
    Dinesh Kumar Dansena, Yogesh Rathore
    Abstract | PDFPDF
    205. Real Time Opinion Mining of Twitter Data
    Pages :2923-2927
    Narahari P Rao, S Nitin Srinivas and Prashanth C M
    Abstract | PDFPDF
    206. A Review: Data Mining Technique Used In Education Sector
    Pages :2928-2930
    Johina, Vikas Kamra
    Abstract | PDFPDF
    207. Application of Image Segmentation Techniques on Medical Reports
    Pages :2931-2933
    Chandni Panchasara, Amol Joglekar
    Abstract | PDFPDF
    208. An Approach for Data Integrity Checking and Data Recovery in Cloud Data Storage
    Pages :2934-2937
    Charmee V. Desai, Prof. Gordhan B. Jethava
    Abstract | PDFPDF
    209. A Novel Speech Recognition system for Punjabi language: A review
    Pages :2938-2940
    Harpreet Kaur
    Abstract | PDFPDF
    210. Zone Based and Morphological Based Feature Extraction Techniques for English Alphabets
    Pages :2941-2944
    Saleem Pasha, Ajay Kumar, Syed Younus Hussain, Amritansh, Mohammed Shafi Ul Umam
    Abstract | PDFPDF
    211. Improved Method of Single Image Dehazing based on Multi-Scale Fusion
    Pages :2945-2949
    Neha Padole, Akhil Khare
    Abstract | PDFPDF
    212. Implementation of Home Security System using GSM module and Microcontroller
    Pages :2950-2953
    Abhishek S. Parab, Amol Joglekar
    Abstract | PDFPDF
    213. Cell Phone Controlled Robot with Fire Detection Sensors
    Pages :2954-2958
    Lakshay Arora, Prof.Amol Joglekar
    Abstract | PDFPDF
    214. Use of Hidden Markov’s Model for Handwritten Kannada Character Recognition
    Pages :2959-2960
    Akshayparvatikar,Veena G.S
    Abstract | PDFPDF
    215. Denial-Of-Service Attack Detection Technique Derived From Statistical Traffic Analysis
    Pages :2961-2964
    Sanjivani Sumant, Prof. Sweta Kale
    Abstract | PDFPDF
    216. An Efficient and Compact Indexing Scheme for Large-Scale Data Store
    Pages :2961-2964
    Sanjivani Sumant, Prof. Sweta Kale
    Abstract | PDFPDF
    217. Speech Emotion Recognition by Gaussian Mixture Model
    Pages :2969-2971
    Reshma, Maninder, Amarbir Singh
    Abstract | PDFPDF
    218. Simple Application of GlusterFs: Distributed file system for Academics
    Pages :2972-2974
    Shyam C Deshmukh, Prof.Sudarshan S Deshmukh
    Abstract | PDFPDF
    219. Enhanced Minimum Utilization VM Selection Mechanism for Clouds
    Pages :2975-2977
    Versha Lodhi, Prof.SarveshRai, Ganesh Kumar Vishwakarma
    Abstract | PDFPDF
    220. Enhancement of Face Recognition Rate by Data Base Pre-processing
    Pages :2978-2984
    Harihara Santosh Dadi, P G Krishna Mohan
    Abstract | PDFPDF
    221. A New Approach to Control a Robot using Android Phone and Colour Detection Technique
    Pages :2985-2989
    Saurav Biswas, Umaima Rahman, Asoke Nath
    Abstract | PDFPDF
    222. 3D Multi Way Feedback Encryption Standard Version II (3dMWFES -II)
    Pages :2990-2997
    Arijit Ghosh, Prabhakar Chakraborty, Asoke Nath
    Abstract | PDFPDF
    223. Image Enhancement by Comparing Contrast value in Fuzzy Plane
    Pages :2998-3001
    Swati Tyagi, Pradeep Jain
    Abstract | PDFPDF
    224. A Survey on Malware Attacks on Smartphones
    Pages :3002-3004
    Kireet .M, Dr.Meda Sreenivasa Rao
    Abstract | PDFPDF
    225. A Review on Privacy Enhanced Participating Sensing Infrastructure Architecture
    Pages :3005-3009
    Amandeep Kaur, Simarjeet Kaur
    Abstract | PDFPDF
    226. Role of Distributed Systems in Data Mining
    Pages :3010-3013
    Mona Shah, Dr. Hiren Joshi
    Abstract | PDFPDF
    227. Application of Feature Extraction Technique: A Review
    Pages :3014-3016
    Meenu Sahu, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    228. Wireless Multi-Domain Network: A Study of Routing Protocols and Security Enhancements
    Pages :3017-3022
    Girish Tiwari and Shalini Sharma
    Abstract | PDFPDF
    229. Classification Rule and Exception Mining Using Nature Inspired Algorithms
    Pages :3023-3030
    Amarnath Pathak, Jyoti Vashistha
    Abstract | PDFPDF
    230. Study on Various Clustering Techniques
    Pages :3031-3033
    Saroj , Tripti Chaudhary
    Abstract | PDFPDF
    231. A Review on DES, AES and Blowfish for Image Encryption & Decryption
    Pages :3034-3036
    Aarti Devi, Ankush Sharma, Anamika Rangra
    Abstract | PDFPDF
    232. Search Based Face Annotation Using Weakly Labeled Facial Images
    Pages :3037-3041
    Shital Shinde, Archana Chaugule
    Abstract | PDFPDF
    233. Privacy Preserving Data Mining- An Overview
    Pages :3042-3045
    Supriya S. Borhade, Dr. S. V. Gumaste
    Abstract | PDFPDF
    234. Comparing and Contrasting different Approaches of Code Generator(Enum,Map-Like,If-else,Graph)
    Pages :3046-3050
    Vivek Tripathi, Sandeep kumar Gonnade
    Abstract | PDFPDF
    235. A New Hybrid Cloud Based Email Security Model Using Image Sequence Authentication, Compression and Cryptography
    Pages :3051-3056
    Nikita Rathi, Prateek Nahar, Vijay Kumar Verma
    Abstract | PDFPDF
    236. A Similitude Study on Weighted Pagerank and Enhanced Ratiorank Algorithms Using Visit of Links of a Web Page
    Pages :3057-3061
    V.Annapoorna, M.V.Kishore
    Abstract | PDFPDF
    237. An Enhanced Strategy for Efficient Content Based Video Copy Detection
    Pages :3062-3066
    Sanket Shinde, Girija Chiddarwar
    Abstract | PDFPDF
    238. A Survey of Digital Audio Watermarking Techniques
    Pages :3067-3072
    Sakriti Dutt
    Abstract | PDFPDF
    239. An Efficient Grid Partition based Classification Algorithm for Intrusion in KDDCup 99
    Pages :3073-3076
    Sonali Rathore, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    240. Access Control Model with Multi-Tier Authentication for Mobile Platforms – A Review
    Pages :3077-3079
    Yashika Sharma, Rekha Bhatia
    Abstract | PDFPDF
    241. Reducing Transmission Risk Using Diverse Image Media
    Pages :3080-3084
    Aparna Bhosale, Jyoti Rao
    Abstract | PDFPDF
    242. An Improved and Efficient Multipath Anonymous Routing in MANET
    Pages :3085-3088
    B Usha, Premala Patil
    Abstract | PDFPDF
    243. Cognitive Radio Spectrum Sharing Techniques : A Review
    Pages :3089-3091
    Mandeep Kaur, Amandeep Kaur
    Abstract | PDFPDF
    244. Explore Comparative Analysis Software Development Life Cycle Models
    Pages :3092-3098
    Anshu Mishra
    Abstract | PDFPDF
    245. Health Monitoring & Real Time Traking System of Remote Soldier
    Pages :3099-3103
    P. S. Kurhe, C. P. Pawar
    Abstract | PDFPDF
    246. Diamond Effect in Object Oriented Programming Languages
    Pages :3104-3111
    Rajesh Jangade, Anil Barnwal, Satyakam Pugla
    Abstract | PDFPDF
    247. Recommendation for Evaluating Candidates competency for a specific job – A perspective to
    Competency Mapping

    Pages :3112-3114
    Ashwin Perti
    Abstract | PDFPDF
    248. Development of an Effective Online Bus Pass Generation System for Transportation Service in
    Karnataka State

    Pages :3115-3118
    Parashuram Baraki, Sandhya Kulkarni, Spurthi Kulkarni, Arpita Goggi, Keertipriya I
    Abstract | PDFPDF
    249. An Overview of Pre-Processing Text Clustering Methods
    Pages :3119-3124
    D Sailaja, M.V.Kishore, B.Jyothi, N.R.G.K.Prasad
    Abstract | PDFPDF
    250. An Efficient Dynamic TESLA based Authentication Scheme for Secure network Coding
    Pages :3125-3128
    Aparna Jumde, Shyamsundar Gupta
    Abstract | PDFPDF
    251. Review of Classification of project proposal through Ontology Text Mining
    Pages :3129-3134
    Sunil Datir, Megha singh
    Abstract | PDFPDF
    252. Verification of AMBA based AXI 4 Slave Interface
    Pages :3135-3137
    Krithi B, Sudarshan Bhat, Yogesh Panchaksharaiah
    Abstract | PDFPDF
    253. Client-Side Scheduling For Video-Streaming Using Clouds
    Pages :3138-3143
    T Venkatesh, Santhana G, Swathi L S, Sushmashree S, Arpitha C
    Abstract | PDFPDF
    254. Encrypting Contacts in Mobile Cloud using Polyalphabetic Substitution
    Pages :3144-3149
    Ramandeep Singh Rajpal, Raghvendra Kumar
    Abstract | PDFPDF
    255. The development of Mobile Application for Gastronomic Tourism in ASEAN
    Pages :3150-3155
    Pannee Suanpang
    Abstract | PDFPDF
    256. Comparative evaluation and implementation of various kernel techniques for nonlinear data
    classification in support vector machine

    Pages :3156-3162
    Vivek verma, Ram nivas giri
    Abstract | PDFPDF
    257. Ensuring Higher Accuracy of Intrusion Detection in Virtual Environment using Counter measure
    Selection

    Pages :3163-3165
    Prajakta Godambe , Rohini Pise , Swachchhanda Patil , Shital Ghate
    Abstract | PDFPDF
    258. An Improved Privacy Policy Inference over the Socially Shared Images with Automated
    Annotation Process

    Pages :3166-3169
    Sangeetha. J, Kavitha. R
    Abstract | PDFPDF
    259. A Comprehensive Survey on Data Preprocessing Methods in Web Usage Minning
    Pages :3170-3174
    Sujith Jayaprakash, Balamurugan E.
    Abstract | PDFPDF
    260. Privacy Preservation using On Demand Computational of Gain using Vertical Partition
    Pages :3175-3179
    Ankita Jain, Shubha Dubey, Anurag Jain
    Abstract | PDFPDF
    261. Synchronizing Text Documents using Semantic Similarity for Topic Mining
    Pages :3180-3184
    Sakshi Jain, Virendra Raghuwanshi, Anurag Jain
    Abstract | PDFPDF
    262. Improved Apriori Algorithm – A Comparative study using different Objective measures
    Pages :3185-3191
    Dr. K. Rajeswari
    Abstract | PDFPDF
    263. Image Encryption and Compression using HAAR and COIFLET Wavelet Transform
    Pages :3192-3197
    Navita Palta, Neha Sharma
    Abstract | PDFPDF
    264. Low Power Dynamic CMOS Full-Adder Cell
    Pages :3198-3201
    Vahid Foroutan and Keivan Navi
    Abstract | PDFPDF
    265. Classroomwiki: Collaborative learning tool along with content relevancy predictor system
    Pages :3202-3205
    Vijayalaxmi Hanjage, Poonam Lambhate
    Abstract | PDFPDF
    266. Speech Recognition using Deep Learning
    Pages :3206-3209
    Akhilesh Halageri , Amrita Bidappa , Arjun C ,. Madan Mukund Sarathy ,. Shabana Sultana
    Abstract | PDFPDF
    267. Based on Packet Delivery Performance Review for Route Discovery in Reactive Routing
    Protocols (AODV, AOMDV, DSDV)

    Pages :3210-3218
    K S R Murthy , Dr Samuel VaraPrasad Raju
    Abstract | PDFPDF
    268. Test Design Automation Tool Development Using VBScript
    Pages :3219-3221
    Kavya Hanisha G U V
    Abstract | PDFPDF
    269. VSP-Virtual Smart Phone (First Step to Connect Virtual World)
    Pages :3222-3227
    Happy
    Abstract | PDFPDF
    270. A Data Mining Approach for secure Cloud using Enhanced Random Forest
    Pages :3228-3231
    Shikha Pathania, Rajdeep Kaur
    Abstract | PDFPDF
    271. MANET: Improved Secured Routing For AODV
    Pages :3232-3236
    Namrata Awasthi, Anurag Jain, Himanshu Yadav
    Abstract | PDFPDF
    272. Comparative Analysis of Backtrack Search Optimization Algorithm (BSA) with other Evolutionary Algorithms for Global Continuous Optimization
    Pages :3237-3241
    Shovan Mandal, Rohit Kumar Sinha, Kamal Mittal
    Abstract | PDFPDF
    273. An Effective Approach to Mine Frequent Sequential Pattern over Uncertain dataset
    Pages :3242-3244
    Kshiti S Rana, Hiren V Mer
    Abstract | PDFPDF
    274. A Study Of Moving Object For Color Detection
    Pages :3245-3248
    D.B.Bhakte, Dr.Anilkumar N.Holambe
    Abstract | PDFPDF
    275. Facial Expression Recognition Using Neural Network
    Pages :3249-3251
    Manisha, Dr Jagjit Singh, Dr Neelam R. Prakash
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-