1. |
Captcha as Graphical Passwords
Pages : 1975-1985
Kalyani S Kumar
Abstract | PDF |
2. |
An Innovative Approach to Diabetes Diagnosis
Pages :1986-1989
G.Nageswara Rao, V.Swetha, M.Rithvik
Abstract | PDF |
3. |
Development of Android Mobile Application for
Cloud Video Streaming using Mobile Cloud Computing
Pages : 1990-1993
Narsu Patil, Nitesh Patil, Anil Bagal, Mayuri Desai, Anita Bhosale
Abstract | PDF |
4. |
Review on Block Based Transformation Image
Encryption Techniques
Pages : 1994-1995
Himani Patwa and Akhilesh Deep Arya
Abstract | PDF |
5. |
Adaption of Customer Relationship Management
and Data mining tools in the Data intensive Cloud
Computing Environment
Pages : 1996-2002
Sanjib Kumar Routray, Sasmita Mishra
Abstract | PDF |
6. |
Parallel and Improved PageRank Algorithm for
GPU-CPU Collaborative Environment
Pages :2003-2005
Prasann Choudhari , Eikshith Baikampadi, Paresh Patil , Sanket Gadekar
Abstract | PDF |
7. |
An Efficient RSA Based Technique for the
Encryption and Decryption
Pages :2006-2009
Sharad Morolia, Manoj Dhawan
Abstract | PDF |
8. |
A Comprehensive Survey on Fanet : Challenges
and Advancements
Pages : 2010-2013
Shashank Kumar Singh
Abstract | PDF |
9. |
Database search Orchestrator for cloud database
Pages : 2014-2017
Shweta Agrawal, Raj Kamal
Abstract | PDF |
10. |
Eliminating Redundancy in File System Using Data
Compression and Secured File Sharing
Pages :2018-2022
Raakesh, Varun Raj G, Krishna R, L.Maria Michael Visuwasam
Abstract | PDF |
11. |
Improving the life cycle of Genetic Programming
using Feature Selection with Multiobjective
Fitness Function
Pages : 2023-2026
Rupali Koushal , Manoj Dhawan
Abstract | PDF |
12. |
Secure and Economical Information Transmission
for Cluster-Based Wireless Sensor Networks
Pages : 2027-2030
Bhimashankar K. Dhurape , Swati S. Joshi
Abstract | PDF |
13. |
EEG signal classification using Modified Fuzzy
Clustering algorithm
Pages :2031-2034
Priyanka Jaiswal, Rupali Koushal
Abstract | PDF |
14. |
A Survey on Techniques and Fundamentals
of Internet Access in VANET-INTERNET
Integration Scenarios
Pages : 2035-2039
Ujwala L. Mane, Aparna A. Junnarkar
Abstract | PDF |
15. |
A Modified Classification Based Technique for
More Accurate Classification & Prediction of the
Intrusion
Pages : 2040-2042
Neha Agrawal, Priyanka Vijayvargiya
Abstract | PDF |
16. |
A Survey on Various Image Enhancement
Algorithms for Naturalness Preservation
Pages : 2043-2045
Divya K A, Roshna K I
Abstract | PDF |
17. |
Survey on Clustering Algorithms of Wireless
Sensor Network
Pages : 2046-2049
Mohini Kumrawat, Manoj Dhawan
Abstract | PDF |
18. |
Optimal Code Compiling in C
Pages : 2050-2057
Nitika Gupta, Nistha Seth, Prabhat Verma
Abstract | PDF |
19. |
Automatic Generation of Owl for Domain Based
Applications
Pages : 2058-2060
Neha Dalwadi
Abstract | PDF |
20. |
An Image Indexing and Retrieval Method Using
Local Tetra Pattern for Content-Based Image
Retrieval (CBIR)
Pages : 2061-2064
Shraddha D. Jumade, Prof. Sheetal S. Dhande
Abstract | PDF |
21. |
A Literature Survey on Digital Image Processing
Techniques in Character Recognition of Indian
Languages
Pages : 2065-2069
Dr. Jangala. Sasi Kiran, N. Vijaya Kumar , N. Sashi Prabha , M. Kavya
Abstract | PDF |
22. |
OPEN FLOW :Innovating campus network
Pages : 2070-2075
Prithvi krishna D, Shrihari M R, AnkithaGowda
Abstract | PDF |
23. |
A Study on Use of Big Data in Cloud
Computing Environment
Pages : 2076-2078
Venkatesh H, Shrivatsa D Perur, Nivedita Jalihal
Abstract | PDF |
24. |
A Portable and Secure Healthcare Maintenance
System
Pages : 2079-2083
K.Sravani, B.Bindusha Reddy, R.R.V.N.V.Kumari, G.Vijay Kumar
Abstract | PDF |
25. |
An Improved Method for Detection of
Satire from User-Generated Content
Pages : 2084-2088
Syed Taha Owais,Tabrez Nafis, Seema Khanna
Abstract | PDF |
26. |
Cloud Business Process Management & Data
Security
Pages : 2089-2093
Honey Tilwani
Abstract | PDF |
27. |
Reliable Cloud Using elliptical Curve Deffie
Hellman and Elliptical Curve Digital Signature
Pages : 2094-2096
Akash Shrivastava, Nitya M Nerli
Abstract | PDF |
28. |
Modified RSA Algorithm for (Wi-Fi) Security
Protocol
Pages : 2097-2098
T.Venkata Satya Vivek, D.Anandam , Ganta Anil,B.Sreenivasulu, V.Lakshma Reddy, M Rao Batchnaboyina
Abstract | PDF |
29. |
Load Balancing in Content Delivery Network
Using Distributed Control Law
Pages : 2099-2105
Chetana B. Bhagat, Dilip K. Budhwant
Abstract | PDF |
30. |
Protecting the Finger Print Template by Fusion of
Ridges and Texture
Pages : 2106-2110
Vidyasree.P, Dr.G.VenkataRamiReddy
Abstract | PDF |
31. |
Constrained Curve Drawing with C1 Continuous Rational Quadratic Curve
Pages : 2111-2114
Ashu Pal, Harshvardhan Mathur
Abstract | PDF |
32. |
Image Segmentation Based Face Recognition Using Enhanced SPCA-KNN Method
Pages : 2115-2120
J.Savitha, Dr.A.V.Senthil Kumar
Abstract | PDF |
33. |
An Intelligent System For Forecasting Electric
Load And Price
Pages : 2121-2126
Sushmita Tiwari, Vaishali singh, Rajiv Kumar
Abstract | PDF |
34. |
Identifying and Extracting Data from Clipboard
Pages : 2127-2129
Ganesh N. Nadargi, Zakir M. Shaikh
Abstract | PDF |
35. |
A Review on Various RFID Based Automated
Highway Toll Collection Systems
Pages : 2130-2133
Venkatesh Suvarna and Jeet Patalia
Abstract | PDF |
36. |
Tool for Extraction of Functional Requirements
from Legacy Code
Pages :2134-2138
Pooja Khanna
Abstract | PDF |
37. |
Faster and Efficient Method for Robust Exemplar
Based Inpainting Using Block Processing
Pages : 2139-2141
Yogesh Laxman Tonape, Vinayak Pottigar, Swapanaja Ubale
Abstract | PDF |
38. |
An Indirect Encryption using Compression with
Random bit stuffing
Pages : 2142-2144
Dr. M. Ramesh, Dr. B. Hemanth Kumar, Prof. M. Surendra Prasad Babu
Abstract | PDF |
39. |
Database Evaluation Considering the Decisive
Factors for Obtaining an Optimistic Value to
Predict the Diagnose
Pages : 2145-2149
M.Purnachandra Rao, N.Padmini Krishna, N.Jagannadh Varma, P.Rohini, V.Sri Divya
Abstract | PDF |
40. |
Privacy Conflicts for Collaborative Data Sharing
in Online Social Network
Pages : 2150-2153
Sandip S. Shirgave, Prof. Subhash V. Pingale, Dr. K. J. Karande
Abstract | PDF |
41. |
Implementing Capability Maturity Model for
Higher Education as Education ERP Solution
Pages : 2154-2158
Pinak Pani Chakrabarty
Abstract | PDF |
42. |
A Comparative Study on Web Crawling for
searching Hidden Web
Pages : 2159-2163
Beena Mahar, C K Jha
Abstract | PDF |
43. |
NTP Based Smart Energy Meter
Pages : 2164-2167
Chetana Dapse
Abstract | PDF |
44. |
A Fuzzy Effective Approach to Perform Image
Fusion on Medical Images
Pages : 2168-2171
Shilpa, Nishant Jakhar, Prabhneet Kaur
Abstract | PDF |
45. |
Detecting of Materialize Topical Trend Topic from
Social Networks
Pages : 2172-2174
Tamilmani.G, Rajathi. K, Ponnaruvi. P
Abstract | PDF |
46. |
An Innovative Data Security Techniques Using
Cryptography and Steganographic Techniques
Pages : 2175-2182
Richa Dubey, Apurva Saxena, Sunita Gond
Abstract | PDF |
47. |
Comparative Study of Data Dissemination
Algorithms based on Cluster Forming Parameters
in Vehicular Ad-hoc Network
Pages : 2183-2186
Arvind Kumar, Sudesh Rani
Abstract | PDF |
48. |
Scalable Transactions for Web Applications in the
Cloud using Customized CloudTPS
Pages : 2187-2191
Shashikant Mahadu Bankar
Abstract | PDF |
49. |
User Authentication Using Multimodal Biometrics
Pages : 2192-2200
Prashant Kumar Jain, Shailja Shukla, S.S. Thakur
Abstract | PDF |
50. |
An Active Approach based on Independent
Component Analysis for Digital Image Forensics
Pages : 2201-2203
Anil Dada Warbhe, R. V. Dharaskar
Abstract | PDF |
51. |
Partial Image Encryption Using Block Shuffling
and Affine Transform
Pages : 2204-2207
Rakhi, Rekha Pandit
Abstract | PDF |
52. |
Survey on Various Quantum Key Distribution
Algorithms
Pages : 2208-2209
Vivek Singh, Bhawna Chauhan
Abstract | PDF |
53. |
Manufacturing Backend
Pages : 2210-2214
Anusha Hiremath , Apoorva Dhavale , K V Roopa , Keertee Savadi, Aruna S. Nayak
Abstract | PDF |
54. |
A Survey on Different Routing Protocols in
Wireless Sensor Network
Pages :2215-2220
Nidhi Sharma
Abstract | PDF |
55. |
An SVM-Fuzzy Expert System Design For
Diabetes Risk Classification
Pages :2221-2226
Thirumalaimuthu Thirumalaiappan Ramanathan , Dharmendra Sharma
Abstract | PDF |
56. |
Estimating the optimal number of servers for an
emergency department of a private hospital, via
mathematical programming.
Pages : 2227-2231
Zeinab yousef Mahmoud
Abstract | PDF |
57. |
RFID Based Ticketing System For Local Trains
Pages : 2232-2234
K. T. Patil, Dipti Mehendale,Vidya S., Aldar Leena Govilkar, S.K.Narayankhedkar
Abstract | PDF |
58. |
An Automatic Approach Towards Coloring Videos
Using Monochrome Texture Descriptor & Parallel
Processing
Pages : 2235-2239
Gauri R. Joshi, Prof. Mayur S. Burange
Abstract | PDF |
59. |
Distributed Cache Modernizing for the Multi-
Source Transmitting Protocol
Pages : 2240-2243
G.Thilipkumar, Dr. R. Balasubramanian
Abstract | PDF |
60. |
Identify and Compare discernment rules for
accurate Liver Disorder detection using Apriori
and FP Generation Analysis
Pages : 2244-2255
Gagandeep Kaur
Abstract | PDF |
61. |
Elicitation of Information from Online
Libraries using Web Content Mining Methods and Applications
Pages : 2256-2258
Rutvija Pandya, Jayati Pandya
Abstract | PDF |
62. |
A Survey of Quality of Service routing protocols
in MANETs
Pages : 2259-2262
Juned Ahmad, Samir Srivastava, PK Singh
Abstract | PDF |
63. |
Power Consumption Analysis
Pages : 2263-2266
Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia
Abstract | PDF |
64. |
Efficient Packet Forwarding Technique in LEACH
Protocol in Multisink Wireless Sensor Network
Pages : 2267-2271
Nikha Sheoran ,Kaushik Ghosh
Abstract | PDF |
65. |
E-mail Spam Filtering Using Genetic Algorithm:
A Deeper Analysis
Pages : 2272-2276
Mandeep Chowdhary , V. S. Dhaka
Abstract | PDF |
66. |
Vehicle License Plate Recognition System Using
LoG Operator for Edge Detection and Radon Transform for Slant Correction
Pages : 2277-2281
Jaya Gupta, Prof. Supriya Agrawal
Abstract | PDF |
67. |
A Study Combined DWT-DCT Digital Image
Hiding Information
Pages : 2282-2286
Jyoti Sahu, Dolley Shukla
Abstract | PDF |
68. |
Sales Prediction Using Effective Mining
Techniques
Pages : 2287-2289
Nirav Shah, Mayank Solanki, Aditya Tambe, Dnyaneshwar Dhangar
Abstract | PDF |
69. |
Protecting Fingerprint Privacy Using Combined
Minutiae Template Generation Algorithm
Pages : 2290-2294
Prabhakara Rao T, Gintanjali Sahu
Abstract | PDF |
70. |
Watershed: An Image Segmentation Approach
Pages : 2295-2297
Arindrajit Seal, Arunava Das, Prasad Sen
Abstract | PDF |
71. |
Generating Placement Intelligence in Higher
Education Using Data Mining
Pages : 2298-2302
Praveen Rani, Dr. Rajan Vohra
Abstract | PDF |
72. |
Product Sales Prediction Based on Sentiment
Analysis Using Twitter Data
Pages : 2303-2313
Dipak Gaikar, Bijith Marakarkandy
Abstract | PDF |
73. |
Offline Handwritten Character Recognition in
South Indian Scripts: A Broad Visualization
Pages : 2314-2317
Sunitha Anne M. O. Chacko, Ansu Joseph, Jeena Joji Anchanattu, Sreelakshmi .S , Veena A. Kumar
Abstract | PDF |
74. |
Tourview: Sentiment Based Analysis on Tourist
Domain
Pages : 2318-2320
Deepanshi Sharma, Achal Kulshreshtha, Priyanka Paygude
Abstract | PDF |
75. |
Web Usage Mining Approaches for User’s
Request Prediction: A Survey
Pages : 2321-2325
Avneet Saluja, Dr. Bhupesh Gour, Lokesh Singh
Abstract | PDF |
76. |
Spam Outlier Detection in High Dimensional Data:
Ensemble Subspace Clustering Approach
Pages : 2326-2329
Suresh S. Kapare, Bharat A. Tidke
Abstract | PDF |
77. |
Efficient Productivity For Recommendation Of Semantic Web Pages
Pages : 2330-2334
B.Gayatri Devi, S.Soundarajan
Abstract | PDF |
78. |
A Survey Paper on Video Steganography
Pages : 2335-2338
Kedar Nath Choudry, Aakash Wanjari
Abstract | PDF |
79. |
A Survey on Privacy Preservation Used in Data
Mining Techniques
Pages : 2339-2341
Haina Mahilary
Abstract | PDF |
80. |
TRAODV: Trusted and Robust Adhoc On demand
Distance Vector Routing in MANET
Pages : 2342-2346
Ravindra J. Mandale, Dadaso T. Mane
Abstract | PDF |
81. |
Auditing Based Cloud Consistency as a Service for
PHR data
Pages : 2347-2348
K.Brindha, T.K.P.Rajagopal
Abstract | PDF |
82. |
A Basic Introduction to DevOps Tools
Pages : 2349-2353
Akshaya H L, Nisarga Jagadish S, Vidya J, Veena K
Abstract | PDF |
83. |
A Review of Various Linear and Non Linear
Dimensionality Reduction Techniques
Pages : 2354-2360
Sumithra V.S, Subu Surendran
Abstract | PDF |
84. |
Expert Search on Web Using Association
Distribution
Pages : 2361-2363
Poonam P. Rayakar, Prof. S Pratap Singh
Abstract | PDF |
85. |
Error Log Analytics using Big Data and
MapReduce
Pages : 2364-2367
Laurel Thejas Souza, Girish U R
Abstract | PDF |
86. |
Thwarting Perils through Cloud Provisioning using
Security Issues in Vehicular Cloud
Pages : 2368-2372
N. Nijanthan, B.Mohankumar, Dr. P. Marikkannu
Abstract | PDF |
87. |
Review of a Secure Approach to Prevent Packet
Dropping and Message Tampering Attacks on
AODV-based MANETs
Pages : 2373-2376
Arpana Akash Morey, Jagdish W. Bakal
Abstract | PDF |
88. |
Energy Enhancement and Performance Evaluation
of LAEEBA Routing Protocol in WBAN using
NS-2
Pages : 2377-2383
Sheth Mahammed Ovesh I., Sarika Khandelwal
Abstract | PDF |
89. |
Design & Implementation of Traffic Violation
Monitoring System
Pages : 2384-2386
Govind Prasad Arya , Durga Prasad Chauhan, Vishal Garg
Abstract | PDF |
90. |
Design & Analysis of Authentication of Moving
Image Using Message Digest
Pages : 2387-2394
Vijender Kumawat, Palika Jajoo
Abstract | PDF |
91. |
Thyroid Classification using Ensemble Model
with Feature Selection
Pages : 2395-2398
Suman Pandey, Anshu Tiwari , Akhilesh Kumar Shrivas and Vivek Sharma
Abstract | PDF |
92. |
A Brief Introduction to Digital Watermarking
Pages : 2399-2401
Ankita Sharma, Sarika khandelwal
Abstract | PDF |
93. |
Stateless Multicast Protocol for Ad- Hoc Networks
Pages : 2402-2405
Trupti Patil, A. A. Phatak
Abstract | PDF |
94. |
Minimum Broadcast Energy Conserving Protocol
for Asymmetric WSN
Pages : 2406-2408
Anujatai Patil , A.V. Mophare
Abstract | PDF |
95. |
An Authentication of Secretely Encrypted Message
Using Half-Tone Pixel Swapping From Carrier
Stego Image
Pages : 2409-2414
Sneha A. Deshmukh, P.B.Sambhare
Abstract | PDF |
96. |
Performance Analysis of DSDV, DSR Routing
Protocols in Vehicular Ad-Hoc Network(Vanets)
Pages : 2415-2418
V.Anji Reddy, P.Siva Prasuna, Rittika.D.Varu, P.Nikhila, N.SriLakshmi
Abstract | PDF |
97. |
Microcontroller Based Mechanised Videographing
of Text and Auto-Generation of Voice Text in Real
Time
Pages : 2419-2425
P. Nagabhushan , Vimuktha Evangeleen Jathanna
Abstract | PDF |
98. |
A Review paper on Construction of Query Forms
Pages : 2426-2428
Jayashri M.Jambukar, Prof. M.B.Vaidya
Abstract | PDF |
99. |
An Efficient Approach towards Thunderstorm
Detection Using Saliency Map
Pages : 2429-2434
Rasika P. Gawande, Prof. Namrata D. Ghuse
Abstract | PDF |
100. |
An Automated System for Signature Recognition
and Authentication from Multishare Based Image
Database
Pages : 2435-2440
Sharayu S. Sangeka, D.C.Dhanwani
Abstract | PDF |
101. |
User Anonymous Authentication Scheme for
Decentralized Access Control in Clouds
Pages : 2441-2447
Pooja R. Vyawhare, Prof.Namrata D. Ghuse
Abstract | PDF |
102. |
Parallel Comparison of Text Document with Input
Data Mining and VizSFP
Pages : 2448-2453
Priyanka P. Palsaniya, D. C. Dhanwani
Abstract | PDF |
103. |
Modified Cat Swarm Optimization Algorithm for Design and Optimization of IIR BS Filter
Pages : 2454-2460
Kamalpreet Kaur Dhaliwal, Jaspreet Singh Dhillon
Abstract | PDF |
104. |
Enhancing Firewall for Serving the Distributed Security Requirements for Cloud
Pages : 2461-2466
Yamini Bangur, Vijendra Mandraha
Abstract | PDF |
105. |
Detection of Child Events with the kinetic Components of a Vehicle to Avoid the Hidden
Dangers-A Survey
Pages : 2467-2470
Mortha Manasa Devi
Abstract | PDF |
106. |
A Survey on Multiparty Access Control Mechanism of Online Social Networks
Pages : 2471-2474
Sandip Sharad Shirgave, Dr. K. J. Karande,Subhash V. Pingale, Prakash Gadekar, S. S. Kulkarni
Abstract | PDF |
107. |
A Survey on Protection against Power Depletion Attack in WSN
Pages : 2475-2478
Sruthin R.V., Jayasudha J. S.
Abstract | PDF |
108. |
On Replication Strategies for Data Intensive Cloud Applications
Pages : 2479-2484
Rashmi Ranjana T P, Jayalakshmi D S, Dr. Srinivasan R
Abstract | PDF |
109. |
A Review on Prediction of Collective Behavior
Pages : 2485-2487
Pranjali Deshmukh, R.M.Gawande
Abstract | PDF |
110. |
VMAIL: Voice Based Email Application
Pages :2488-2490
Rahul Anwani, Usha Santuramani, Deeksha Raina, Priya R.L
Abstract | PDF |
111. |
Analysis & Design of multiple watermarking in a
Video for Authentication & Copyright Protection
Pages : 2491-2497
Yogendra Sharma, Jitender Kumar, Yogesh Rathi
Abstract | PDF |
112. |
Flower Detection and Counting Using
Morphological and Segmentation Technique
Pages :2498-2501
Balvant V. Biradar, Santosh P. Shrikhande
Abstract | PDF |
113. |
Predictive Analysis of Diabetic Treatment Using
Classification Algorithm
Pages :2502-2505
M.Mounika, S.D.Suganya, B.Vijayashanthi, S.KrishnaAnand
Abstract | PDF |
114. |
Crowdsourcing with Smartphones for Traffic
Dissemination
Pages : 2506-2508
Asha K, Nasreen Taj M.B
Abstract | PDF |
115. |
Enhancing Bandwidth in Route Recovery – An
Approach Based on Forward and Reverse Path
Routing with Hop-Count
Pages : 2509-2511
Apoorva P, Kumar Sharath.B.C, Manu Bhargav.M.R
Abstract | PDF |
116. |
PERFORMANCE EVALUATION OF QUALITY METRICES BASED FAULT PREDECTION MODEL FOR REPLICA MANAGEMENT IN CLOUD COMPUTING
Pages : 2512-2518
Ajitabh Mahalkari, Prof. Ritu Tondon
Abstract | PDF |
117. |
Proficient acquaintance based system for citrus
leaf disease recognition and categorization
Pages : 2519-2524
K.Lalitha,K.Muthulakshmi,A.Vinothini
Abstract | PDF |
118. |
Survey of various POS tagging techniques for
Indian regional languages
Pages :2525-2529
Shubhangi Rathod, Sharvari Govilkar
Abstract | PDF |
119. |
A New Approach of Fault Node Recovery in
Wireless Sensor Network
Pages : 2530-2533
Vibha Paradkar, Gajendra Singh, Kailash Patidar
Abstract | PDF |
120. |
Analysis of The Fraud E-Mails using Truncated
Gaussian Mixture Model and Ontological
Application
Pages : 2534-2536
Sreenivasulu. V, Satya Prasad. R
Abstract | PDF |
121. |
Weight-Based-Priority Approach for Analyzing
Data Using Traces and Filters
Pages :2537-2540
Mahendra S. Pandit
Abstract | PDF |
122. |
A Survey on IP Address Assignment in a Mobile
Ad Hoc Network
Pages :2541-2544
Vibhoo Sachan, Samir Srivastava, P.K.Singh
Abstract | PDF |
123. |
Evolution of Mobile Wireless Technology from 0G to 5G
Pages :2545-2551
Mohammad Meraj ud in Mir , Dr. Sumit Kumar
Abstract | PDF |
124. |
Penetration Testing
Pages :2552-2553
Raghavendra Pokuri, Chanikya Merugu, Naveen Battula
Abstract | PDF |
125. |
Prediction of Cancer Diseases Using Navie Bayes
Classification
Pages :2554-2556
Shruthi S, Mithun Mohan, Akshaya Aravind
Abstract | PDF |
126. |
A Research Work on English to Marathi Hybrid Translation System
Pages :2557-2560
Pramod Salunkhe, Mrunal Bewoor, Dr.Suhas Patil
Abstract | PDF |
127. |
Notion of Black Hole in Wireless Networks
targeting on iMANET
Pages :2561-2565
Natasha Tomar, Amit Chaudhary
Abstract | PDF |
128. |
Private Preserving Publically Checking for
Shared Data in the Cloud Using Oruta
Pages :2566-2569
Ashwini H, Mrutyunjay B, Sangamesh P, Smitha D, Veeresh Biradar
Abstract | PDF |
129. |
Object Scanning based Road Obstacles
Detection using Weighted Sum Method
Pages :2570-2573
Neha Chalana, Lovnish Bansal
Abstract | PDF |
130. |
Machine Learning Approach to Detect Tuberculosis in patients with or without HIV co-infection
- A Survey
Pages :2574-2578
Ashwini D.V.and Dr. Seema S.
Abstract | PDF |
131. |
Multi-Level Encryption Mechanism for Access
Control Over Cloud Data
Pages :2579-2582
T. Kavitha B. Narendra C. Sushama S. Shiva Prakash
Abstract | PDF |
132. |
Analysis of Pattern Matching Algorithms
Pages :2583-2586
Siva Kumar Kotamraju
Abstract | PDF |
133. |
FINE TUNING OF PHYLIP ON INTEL XEON
ARCHITECTURE
Pages :2587-2592
Prinkesh Sharma, Kondorpa Kumar Borchetia, Shivam Saxena
Abstract | PDF |
134. |
Detection of Brain Tumors using Learning
Machine Approach and Spatial Fuzzy
Segmentation
Pages :2593-2596
G. Lavanya, C. Suganthini
Abstract | PDF |
135. |
Metaheuristic Based Approach to Regression
Testing
Pages :2597-2605
Shweta Mittal, Om Prakash Sangwan
Abstract | PDF |
136. |
Implementation of Location based Steganography
on mobile Smartphone using Android Platform
Pages :2606-2609
Khushali Pandit, Varsha Bhosale
Abstract | PDF |
137. |
HIDES: Hierarchical based and an Energy
Efficient Intrusion Detection System for Wireless
Sensor Networks
Pages :2610-2615
B Kamaladharan
Abstract | PDF |
138. |
Data mining and the News Boy Model in B2B
E-Commerce Supply Chain
Pages :2616-2619
Minakshi Lalit Patil
Abstract | PDF |
139. |
A Clustering Search Technique for Social
Network Applications
Pages :2620-2622
Saurabh Sharma, Aravendra Kumar Sharma, Arun Kumar Sharma
Abstract | PDF |
140. |
Enhancing Data Security and Storage in Cloud
Computing Environment
Pages :2623-2626
Shivali Munjal, Shelly Garg
Abstract | PDF |
141. |
Enhanced Security Layer by Using Integration of
Sound Signature and Graphical Password
Authentication System
Pages :2627-2629
Manasa Bhat, Vanisha P Santhmayor, Mahesh .K
Abstract | PDF |
142. |
Hybrid Security Using Digital Signature & RSA
Encryption for AODV in MANET
Pages :2630-2635
Shelbala Solanki, Anand Gadwal
Abstract | PDF |
143. |
Comparitive Study of Uterine Cyst Characterisation
Using Glcm and Wavelet Transform
Pages :2636-2640
Brindha D, Kandaswamy A, Subbashini S
Abstract | PDF |
144. |
A Comparative Analysis of M-GEAR and
MODLEACH Energy Efficient WSN Protocols
Pages :2641-2644
Neeraj Dewli, Rashmi Saini
Abstract | PDF |
145. |
Image Matcher – Content Based Image Retrieval
System Using Image Sub Blocks and Indexing
Pages :2645-2652
D. D. Pukale, Varsha H. Sakore, Nilima K. Shevate,. Nutan D. Pawar, Priyanka N. Shendage
Abstract | PDF |
146. |
Unambiguous Representation for Sliceable
Rectangular Floorplans
Pages :2653-2657
Soumya Pratik Saha, Satrajit Ghosh
Abstract | PDF |
147. |
Web Log Analyzer for Semantic Web Mining
Pages :2658-2662
Fakhrun Jamal , Mamta Bansal
Abstract | PDF |
148. |
A Survey of Text Categorization and its Various
Approaches
Pages :2663-2666
M. Maharasi, N. Antony Sophia
Abstract | PDF |
149. |
Level of Ubiquity of Various Software Projects
Pages :2667-2670
Anil Kumar Mishra, Diksha Nagpal
Abstract | PDF |
150. |
Data Based-Secure and Efficient Dynamic
Clustering (DB-SEDC) for Data Aggregation in
Wireless Sensor Network
Pages :2671-2673
Priya M R, Chinnaswamy C N, Sreenivas T H
Abstract | PDF |
151. |
Extension of Preserving Privacy Location in Social
Networks
Pages :2674-2677
Ravi Konaraddi
Abstract | PDF |
152. |
Survey on Identity Based Blind Signature
Pages :2678-2681
Girish, Krupa K T, Dr. Phaneendra H D
Abstract | PDF |
153. |
A Survey on Various Word Spotting Techniques
for Content Based Document Image Retrieval
Pages :2682-2686
Blessy Varghese, Sharvari Govilkar
Abstract | PDF |
154. |
A Comparative Study of Parallel Job Scheduling
Algorithms in Cloud Computing
Pages :2687-2690
A.Kousalya, R.Radhakrishnan
Abstract | PDF |
155. |
An Overview of Concept Based and Advanced
Text Clustering Methods
Pages :2691-2697
B.Jyothi, D.Sailaja, Y.Srinivasa Rao
Abstract | PDF |
156. |
A Genetic Algorithm Based Average Percentage of
Statement Coverage Technique for Test Case Ordering
Pages :2698-2705
Atul kumar Pal, Makul Mahajan
Abstract | PDF |
157. |
Offline Resource Extractor: An Efficient Resource
Extraction System
Pages :2706-2709
N.P.Joshi
Abstract | PDF |
158. |
Enhancing the Semantic of the Business
Repository Components for More Efficient Web
Services Discovery
Pages :2710-2716
Salim BAROUDI, Mohamed BAHAJ
Abstract | PDF |
159. |
Link Initialization and Training in MAC Layer of PCIe 3.0
Pages :2717-2719
Chandana K N , Karunavathi R K
Abstract | PDF |
160. |
CAPTCHA Problems Based On AI Provide
Protection against Automated Hacking Tools
Pages :2720-2723
Priyanka K.Kukade, Prof. Ms. M.S. Deshmukh
Abstract | PDF |
161. |
A Filter Base Addressing Protocol for Node Auto-
Configuration in Wireless Ad Hoc Network Using
Cuckoo Filter
Pages :2724-2728
Bhushan A. Badgujar, Swati patil, Mayur Agrawal
Abstract | PDF |
162. |
Registration Plate Recognition from Still Images
and Videos in Real Time Conditions
Pages :2729-2734
Glence Joseph, Dr.Tripty Singh, Andan HM, Aravind G
Abstract | PDF |
163. |
Topological Conditions for Maintaining
Stabilization of Dynamic System
Pages :2735-2737
Dilip Budhwant, Bhagyashri Bhalekar
Abstract | PDF |
164. |
Driver Evaluation System Using Mobile Phone
and OBD-II System
Pages :2738-2745
Sujata Khedkar, Akshaykumar Oswal, Manjari Setty, Srinivas Ravi
Abstract | PDF |
165. |
Research on Cloud Testing Based on Ontology and
Multi-Agent Framework
Pages :2746-2749
Afaf Al-Neaimi
Abstract | PDF |
166. |
Cross Domain Composition of Web Service
Workflows using a Provenance Ontology with an automated Re-planning
Pages :2750-2753
B.Meenakshi Sundaram, Dr. D. Manimegalai
Abstract | PDF |
167. |
A Hybrid Security Service To Achieve Strong
Authentication And Cryptography For Cloud
Applications
Pages :2754-2760
Vivek Dandir, Prof. Mohsin Sheikh
Abstract | PDF |
168. |
Self-Navigating Quadcopter
Pages :2761-2765
O Guneshwor Singh
Abstract | PDF |
169. |
Slope Switch Variable Value Prediction using Two
Dimensional Curve Fitting for a Limited Data
Mining Set
Pages :2766-2767
Venkatesh Suvarna
Abstract | PDF |
170. |
Displaying Crisis Informing for Auto Collision
over Dichotomized Progress Demonstrate in
Vehicular Ad-hoc System
Pages :2768-2771
Veena R C
Abstract | PDF |
171. |
On the Advancements in Cloud Computing
Technology: An Overview
Pages :2772-2778
Majed Alhaisoni
Abstract | PDF |
172. |
Adaptive Fault Free and Secured Path
Selection in Wireless Sensor Networks
Pages :2779-2781
Deepali Virmani, Pranav Gupta
Abstract | PDF |
173. |
Voting Methods For Malware Detection
Pages :2782-2786
Pranit Gaikwad, Dilip Motwani, Vinayak D.Shinde
Abstract | PDF |
174. |
Ensuring Data Security on Cloud
Pages :2787-2790
Jitendra Kumar Seth, Satish Chandra
Abstract | PDF |
175. |
Secured Data Sharing in the Cloud
Pages :2791-2793
Amrut Hunashyal, Chetak Patil, Vilas Balaganur
Abstract | PDF |
176. |
Challenges in Design and development of EEG
based BCI: A Review
Pages :2794-2796
Vaishali Kadam, Dr. R. R. Deshmukh
Abstract | PDF |
177. |
An Enhanced Function Point Analysis (FPA)
Method for Software Size Estimation
Pages :2797-2799
Nilesh Choursiya, Rashmi Yadav
Abstract | PDF |
178. |
Are you a Human or Robot? or Everything CAPTCHA
Pages :2800-2805
Revati Ghadge, Archana M. Naware
Abstract | PDF |
179. |
Wolf Routing to Detect Vampire Attacks in
Wireless Sensor Networks
Pages :2806-2809
Besty Haris
Abstract | PDF |
180. |
BYOD:Usability
Pages :2810-2814
Abha Tewari, Pooja Nagdev,Kiran Israni
Abstract | PDF |
181. |
Assessment of Document Similarity with
Clustering Using Multi View-Points
Pages :2815-2818
Sindhudarshini S, Suresh G S
Abstract | PDF |
182. |
Dynamic Environment Exploration Tool: A
Blind’s Eye
Pages :2819-2822
Dushyant Kumar Singh
Abstract | PDF |
183. |
Securing Broker-less Publish/Subscribe System
using Fuzzy Identity-Based Encryption
Pages :2823-2826
Maithily B, Swathi Y
Abstract | PDF |
184. |
Trustworthy Resource Sharing on Collaborative
Cloud Computing
Pages :2827-2830
T. Amith Kumar, G. Priya, N.Jaisankar
Abstract | PDF |
185. |
Effective Personalization of web search based on
Fuzzy Information Retrieval
Pages :2831-2837
Suruchi Chawla
Abstract | PDF |
186. |
Data Driven Data Mining Model for Biological
Pathways
Pages :2838-2840
N.Sevugapandi and Dr.C.P.Chandran
Abstract | PDF |
187. |
Study and Analysis of Digital Image Enhancement
Pages :2841-2848
Sanjib Das, Niranjan Cannon
Abstract | PDF |
188. |
A Survey of News Article Clustering and
Summarization
Pages :2849-2851
Purabi Choudhury
Abstract | PDF |
189. |
Emphasizing Big Data Engineering and Software
Architecture on Cloud Computing
Pages :2852-2855
Mohammed Faisal,Tamil Selvi Madeswaran, Sanjay Gupta
Abstract | PDF |
190. |
Bi-Variate Gaussian Mixture Model Based
Techniques for Effective Analysis of Cyber Crimes
Pages :2856-2858
V.Sreenivasulu, R. Satya Prasad
Abstract | PDF |
191. |
Collaboration in Multicloud Computing
Environments: Framework and Security Issues
Pages :2859-2862
Madivalayya M Hiremath, Annapurna P Patil
Abstract | PDF |
192. |
Finger-Knuckle-Print Based Recognition System
using LBP and SURF
Pages :2863-2867
Salil Kumar Verma, Maitreyee Dutta
Abstract | PDF |
193. |
Classification of Unstructured Data using Soft
Computing: A Survey
Pages :2868-2870
Swati Wakode, Rakesh Mallesh, Mandar Wagh, Manisha P Mali
Abstract | PDF |
194. |
Big Data Analysis using Partition Technique
Pages :2871-2875
Prasadkumar Kale and Arti Mohanpurkar
Abstract | PDF |
195. |
Single Page Application using AngularJS
Pages :2876-2879
Madhuri A. Jadhav, Balkrishna R. Sawant, Anushree Deshmukh
Abstract | PDF |
196. |
Perspective Identification of Indian Musical
Instrument Ghan and Sushir Vadya
Pages :2880-2883
Satish Ramling Sankaye, S.C. Mehrotra, U.S. Tandon
Abstract | PDF |
197. |
Automating the Payment of Toll Tax at Toll Plazas
Pages :2884-2887
Kruti Sanghvi , Prof.Amol Joglekar
Abstract | PDF |
198. |
Collaborative Filtering Approach For Big Data
Applications in Social Networks
Pages :2888-2892
Rajeswari.M
Abstract | PDF |
199. |
A Survey on Unsupervised Extraction of Product
Information from Semi-Structured Sources
Pages :2893-2897
Abhilasha Bhagat, Vanita Raut
Abstract | PDF |
200. |
A Preventing Privacy Leakage and Discrimination
Enabled Vulnerabilities in Data Publishing and Mining
Pages :2898-2901
Pujari.Sasidhar, K.R.K.Satheesh
Abstract | PDF |
201. |
Controlling Air Conditioner (Temperature and Airflow)
Using Wireless Sensor Network and iSense Technology
Pages :2902-2906
Karthik SK, Maheshwari Kittur, Suraj M Halakatti and Vineetkumar Patil
Abstract | PDF |
202. |
Classification of Music based on Clave Direction
using Machine Learning Techniques
Pages :2907-2909
Sabina M A
Abstract | PDF |
203. |
Application of Data Mining in Adaptive and
Intelligent Tutoring Systems: A Review
Pages :2910-2917
Rajitha Koppisetty
Abstract | PDF |
204. |
A Survey Paper on Automatic Speech Recognition
by Machine
Pages :2918-2922
Dinesh Kumar Dansena, Yogesh Rathore
Abstract | PDF |
205. |
Real Time Opinion Mining of Twitter Data
Pages :2923-2927
Narahari P Rao, S Nitin Srinivas and Prashanth C M
Abstract | PDF |
206. |
A Review: Data Mining Technique Used In
Education Sector
Pages :2928-2930
Johina, Vikas Kamra
Abstract | PDF |
207. |
Application of Image Segmentation Techniques on
Medical Reports
Pages :2931-2933
Chandni Panchasara, Amol Joglekar
Abstract | PDF |
208. |
An Approach for Data Integrity Checking and Data
Recovery in Cloud Data Storage
Pages :2934-2937
Charmee V. Desai, Prof. Gordhan B. Jethava
Abstract | PDF |
209. |
A Novel Speech Recognition system for Punjabi
language: A review
Pages :2938-2940
Harpreet Kaur
Abstract | PDF |
210. |
Zone Based and Morphological Based Feature
Extraction Techniques for English Alphabets
Pages :2941-2944
Saleem Pasha, Ajay Kumar, Syed Younus Hussain, Amritansh, Mohammed Shafi Ul Umam
Abstract | PDF |
211. |
Improved Method of Single Image Dehazing based
on Multi-Scale Fusion
Pages :2945-2949
Neha Padole, Akhil Khare
Abstract | PDF |
212. |
Implementation of Home Security System using
GSM module and Microcontroller
Pages :2950-2953
Abhishek S. Parab, Amol Joglekar
Abstract | PDF |
213. |
Cell Phone Controlled Robot with Fire
Detection Sensors
Pages :2954-2958
Lakshay Arora, Prof.Amol Joglekar
Abstract | PDF |
214. |
Use of Hidden Markov’s Model for Handwritten
Kannada Character Recognition
Pages :2959-2960
Akshayparvatikar,Veena G.S
Abstract | PDF |
215. |
Denial-Of-Service Attack Detection Technique
Derived From Statistical Traffic Analysis
Pages :2961-2964
Sanjivani Sumant, Prof. Sweta Kale
Abstract | PDF |
216. |
An Efficient and Compact Indexing Scheme for
Large-Scale Data Store
Pages :2961-2964
Sanjivani Sumant, Prof. Sweta Kale
Abstract | PDF |
217. |
Speech Emotion Recognition by Gaussian Mixture
Model
Pages :2969-2971
Reshma, Maninder, Amarbir Singh
Abstract | PDF |
218. |
Simple Application of GlusterFs: Distributed file
system for Academics
Pages :2972-2974
Shyam C Deshmukh, Prof.Sudarshan S Deshmukh
Abstract | PDF |
219. |
Enhanced Minimum Utilization VM Selection
Mechanism for Clouds
Pages :2975-2977
Versha Lodhi, Prof.SarveshRai, Ganesh Kumar Vishwakarma
Abstract | PDF |
220. |
Enhancement of Face Recognition Rate by Data Base Pre-processing
Pages :2978-2984
Harihara Santosh Dadi, P G Krishna Mohan
Abstract | PDF |
221. |
A New Approach to Control a Robot using
Android Phone and Colour Detection Technique
Pages :2985-2989
Saurav Biswas, Umaima Rahman, Asoke Nath
Abstract | PDF |
222. |
3D Multi Way Feedback Encryption Standard
Version II (3dMWFES -II)
Pages :2990-2997
Arijit Ghosh, Prabhakar Chakraborty, Asoke Nath
Abstract | PDF |
223. |
Image Enhancement by Comparing Contrast value in Fuzzy Plane
Pages :2998-3001
Swati Tyagi, Pradeep Jain
Abstract | PDF |
224. |
A Survey on Malware Attacks on Smartphones
Pages :3002-3004
Kireet .M, Dr.Meda Sreenivasa Rao
Abstract | PDF |
225. |
A Review on Privacy Enhanced Participating
Sensing Infrastructure Architecture
Pages :3005-3009
Amandeep Kaur, Simarjeet Kaur
Abstract | PDF |
226. |
Role of Distributed Systems in Data Mining
Pages :3010-3013
Mona Shah, Dr. Hiren Joshi
Abstract | PDF |
227. |
Application of Feature Extraction Technique:
A Review
Pages :3014-3016
Meenu Sahu, Amit Saxena, Manish Manoria
Abstract | PDF |
228. |
Wireless Multi-Domain Network: A Study of
Routing Protocols and Security Enhancements
Pages :3017-3022
Girish Tiwari and Shalini Sharma
Abstract | PDF |
229. |
Classification Rule and Exception Mining Using Nature
Inspired Algorithms
Pages :3023-3030
Amarnath Pathak, Jyoti Vashistha
Abstract | PDF |
230. |
Study on Various Clustering Techniques
Pages :3031-3033
Saroj , Tripti Chaudhary
Abstract | PDF |
231. |
A Review on DES, AES and Blowfish for Image Encryption & Decryption
Pages :3034-3036
Aarti Devi, Ankush Sharma, Anamika Rangra
Abstract | PDF |
232. |
Search Based Face Annotation Using Weakly Labeled Facial Images
Pages :3037-3041
Shital Shinde, Archana Chaugule
Abstract | PDF |
233. |
Privacy Preserving Data Mining- An Overview
Pages :3042-3045
Supriya S. Borhade, Dr. S. V. Gumaste
Abstract | PDF |
234. |
Comparing and Contrasting different Approaches
of Code Generator(Enum,Map-Like,If-else,Graph)
Pages :3046-3050
Vivek Tripathi, Sandeep kumar Gonnade
Abstract | PDF |
235. |
A New Hybrid Cloud Based Email Security
Model Using Image Sequence Authentication, Compression and Cryptography
Pages :3051-3056
Nikita Rathi, Prateek Nahar, Vijay Kumar Verma
Abstract | PDF |
236. |
A Similitude Study on Weighted Pagerank and
Enhanced Ratiorank Algorithms Using Visit of
Links of a Web Page
Pages :3057-3061
V.Annapoorna, M.V.Kishore
Abstract | PDF |
237. |
An Enhanced Strategy for Efficient Content
Based Video Copy Detection
Pages :3062-3066
Sanket Shinde, Girija Chiddarwar
Abstract | PDF |
238. |
A Survey of Digital Audio Watermarking
Techniques
Pages :3067-3072
Sakriti Dutt
Abstract | PDF |
239. |
An Efficient Grid Partition based Classification
Algorithm for Intrusion in KDDCup 99
Pages :3073-3076
Sonali Rathore, Amit Saxena, Manish Manoria
Abstract | PDF |
240. |
Access Control Model with Multi-Tier
Authentication for Mobile Platforms – A Review
Pages :3077-3079
Yashika Sharma, Rekha Bhatia
Abstract | PDF |
241. |
Reducing Transmission Risk Using Diverse Image
Media
Pages :3080-3084
Aparna Bhosale, Jyoti Rao
Abstract | PDF |
242. |
An Improved and Efficient Multipath Anonymous
Routing in MANET
Pages :3085-3088
B Usha, Premala Patil
Abstract | PDF |
243. |
Cognitive Radio Spectrum Sharing Techniques
: A Review
Pages :3089-3091
Mandeep Kaur, Amandeep Kaur
Abstract | PDF |
244. |
Explore Comparative Analysis Software
Development Life Cycle Models
Pages :3092-3098
Anshu Mishra
Abstract | PDF |
245. |
Health Monitoring & Real Time Traking System of
Remote Soldier
Pages :3099-3103
P. S. Kurhe, C. P. Pawar
Abstract | PDF |
246. |
Diamond Effect in Object Oriented Programming
Languages
Pages :3104-3111
Rajesh Jangade, Anil Barnwal, Satyakam Pugla
Abstract | PDF |
247. |
Recommendation for Evaluating Candidates
competency for a specific job – A perspective to
Competency Mapping
Pages :3112-3114
Ashwin Perti
Abstract | PDF |
248. |
Development of an Effective Online Bus Pass
Generation System for Transportation Service in
Karnataka State
Pages :3115-3118
Parashuram Baraki, Sandhya Kulkarni, Spurthi Kulkarni, Arpita Goggi, Keertipriya I
Abstract | PDF |
249. |
An Overview of Pre-Processing Text Clustering
Methods
Pages :3119-3124
D Sailaja, M.V.Kishore, B.Jyothi, N.R.G.K.Prasad
Abstract | PDF |
250. |
An Efficient Dynamic TESLA based
Authentication Scheme for Secure network Coding
Pages :3125-3128
Aparna Jumde, Shyamsundar Gupta
Abstract | PDF |
251. |
Review of Classification of project proposal
through Ontology Text Mining
Pages :3129-3134
Sunil Datir, Megha singh
Abstract | PDF |
252. |
Verification of AMBA based AXI 4 Slave
Interface
Pages :3135-3137
Krithi B, Sudarshan Bhat, Yogesh Panchaksharaiah
Abstract | PDF |
253. |
Client-Side Scheduling For Video-Streaming
Using Clouds
Pages :3138-3143
T Venkatesh, Santhana G, Swathi L S, Sushmashree S, Arpitha C
Abstract | PDF |
254. |
Encrypting Contacts in Mobile Cloud using
Polyalphabetic Substitution
Pages :3144-3149
Ramandeep Singh Rajpal, Raghvendra Kumar
Abstract | PDF |
255. |
The development of Mobile Application for
Gastronomic Tourism in ASEAN
Pages :3150-3155
Pannee Suanpang
Abstract | PDF |
256. |
Comparative evaluation and implementation of
various kernel techniques for nonlinear data
classification in support vector machine
Pages :3156-3162
Vivek verma, Ram nivas giri
Abstract | PDF |
257. |
Ensuring Higher Accuracy of Intrusion Detection
in Virtual Environment using Counter measure
Selection
Pages :3163-3165
Prajakta Godambe , Rohini Pise , Swachchhanda Patil , Shital Ghate
Abstract | PDF |
258. |
An Improved Privacy Policy Inference over the
Socially Shared Images with Automated
Annotation Process
Pages :3166-3169
Sangeetha. J, Kavitha. R
Abstract | PDF |
259. |
A Comprehensive Survey on Data Preprocessing Methods in Web Usage Minning
Pages :3170-3174
Sujith Jayaprakash, Balamurugan E.
Abstract | PDF |
260. |
Privacy Preservation using On Demand
Computational of Gain using Vertical Partition
Pages :3175-3179
Ankita Jain, Shubha Dubey, Anurag Jain
Abstract | PDF |
261. |
Synchronizing Text Documents using Semantic
Similarity for Topic Mining
Pages :3180-3184
Sakshi Jain, Virendra Raghuwanshi, Anurag Jain
Abstract | PDF |
262. |
Improved Apriori Algorithm – A Comparative
study using different Objective measures
Pages :3185-3191
Dr. K. Rajeswari
Abstract | PDF |
263. |
Image Encryption and Compression using HAAR
and COIFLET Wavelet Transform
Pages :3192-3197
Navita Palta, Neha Sharma
Abstract | PDF |
264. |
Low Power Dynamic CMOS Full-Adder Cell Pages :3198-3201
Vahid Foroutan and Keivan Navi
Abstract | PDF |
265. |
Classroomwiki: Collaborative learning tool along
with content relevancy predictor system
Pages :3202-3205
Vijayalaxmi Hanjage, Poonam Lambhate
Abstract | PDF |
266. |
Speech Recognition using Deep Learning
Pages :3206-3209
Akhilesh Halageri , Amrita Bidappa , Arjun C ,. Madan Mukund Sarathy ,. Shabana Sultana
Abstract | PDF |
267. |
Based on Packet Delivery Performance Review
for Route Discovery in Reactive Routing
Protocols (AODV, AOMDV, DSDV)
Pages :3210-3218
K S R Murthy , Dr Samuel VaraPrasad Raju
Abstract | PDF |
268. |
Test Design Automation Tool Development
Using VBScript
Pages :3219-3221
Kavya Hanisha G U V
Abstract | PDF |
269. |
VSP-Virtual Smart Phone
(First Step to Connect Virtual World)
Pages :3222-3227
Happy
Abstract | PDF |
270. |
A Data Mining Approach for secure Cloud using
Enhanced Random Forest
Pages :3228-3231
Shikha Pathania, Rajdeep Kaur
Abstract | PDF |
271. |
MANET: Improved Secured Routing For AODV
Pages :3232-3236
Namrata Awasthi, Anurag Jain, Himanshu Yadav
Abstract | PDF |
272. |
Comparative Analysis of Backtrack Search
Optimization Algorithm (BSA) with other Evolutionary
Algorithms for Global Continuous Optimization
Pages :3237-3241
Shovan Mandal, Rohit Kumar Sinha, Kamal Mittal
Abstract | PDF |
273. |
An Effective Approach to Mine Frequent
Sequential Pattern over Uncertain dataset
Pages :3242-3244
Kshiti S Rana, Hiren V Mer
Abstract | PDF |
274. |
A Study Of Moving Object For Color Detection
Pages :3245-3248
D.B.Bhakte, Dr.Anilkumar N.Holambe
Abstract | PDF |
275. |
Facial Expression Recognition Using Neural
Network
Pages :3249-3251
Manisha, Dr Jagjit Singh, Dr Neelam R. Prakash
Abstract | PDF |
|
|