• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 4 July - August 2015

    ISSN 0975 - 9646

    1. A Survey on Data Security of Cloud Storage Services
    Pages : 3252-3255
    Gunjal Yogita S.
    Abstract | PDFPDF
    2. LERP: A Secure Location Based Efficient Routing Protocol
    Pages :3256-3260
    Rajan Gandhi , Prof Prasanna Joeg
    Abstract | PDFPDF
    3. An Iterative Random PSO to minimize Total-flowtime in Flowshop Scheduling
    Pages : 3261-3265
    M. M. Ghumare, L. A. Bawoor, Dr. S. U. Sapkal
    Abstract | PDFPDF
    4. Web Mining- Concepts and Application
    Pages : 3266-3268
    S.Vidya, K.Banumathy
    Abstract | PDFPDF
    5. No Science No Humans, No New Technologies No changes "Big Data a Great Revolution
    Pages : 3269-3274
    S.Sangeetha, A.K Sreeja
    Abstract | PDFPDF
    6. Impact of Frequencies on IEEE 802.15.4 WPANs for Wireless Sensor Networks
    Pages : 3275-3279
    Sukhvinder S Bamber, Gurprem Singh
    Abstract | PDFPDF
    7. Finger Vein Detection using Repeated Line Tracking, Even Gabor and Multilinear Discriminant Analysis (MDA)
    Pages : 3280-3284
    Manpreet Kaur, Geetanjali Babbar
    Abstract | PDFPDF
    8. A Survey on Designing a Framework for Detection and Capturing of Network Attacks in Cloud
    Environment

    Pages : 3285-3287
    Mukul Pande, Prof. Sulabha. V. Patil
    Abstract | PDFPDF
    9. Construction of Software Model Graph and Analysing Object-Oriented Program(C#) Using Abstract Syntax Tree Method
    Pages : 3288-3293
    Appala Srinuvasu Muttipati, Poosapati Padmaja
    Abstract | PDFPDF
    10. Comparative Study of Pre-processing Techniques for Classifying Streaming Data
    Pages : 3294-3297
    Ketan Desale, Roshani Ade
    Abstract | PDFPDF
    11. A Modified Agent Based AODV Routing Protocol for MANET’s
    Pages : 3298-3301
    Prakirti Raghuvanshi, Suman Pandey
    Abstract | PDFPDF
    12. Implementing Pyramid Structure for Generating Efficient Personnelized Recommendations
    Pages : 3302-3306
    Minakshi Pachpatil, Anjana N.Ghule
    Abstract | PDFPDF
    13. Simulated Annealing (SA) based Load Balancing Strategy for Cloud Computing
    Pages : 3307-3312
    Brototi Mondal, Avishek Choudhury
    Abstract | PDFPDF
    14. Detection of Vampire Attack in Wireless Sensor Networks
    Pages : 3313-3317
    Deepmala Verma, Gajendra Singh, Kailash Patidar
    Abstract | PDFPDF
    15. How Use of Technological Devices is related to Students Category: A Review
    Pages : 3318-3322
    Satinder Kaur, Simmi Bagga
    Abstract | PDFPDF
    16. Efficient CAD system based on GLCM& derived feature for diagnosing Breast Cancer
    Pages : 3323-3327
    Rabi Narayan Panda, Mirza Ashad Baig, Dr. Bijay Ketan Panigrahi, Dr. Manas Ranjan Patro
    Abstract | PDFPDF
    17. Driver Behavior Analysis and Prediction Models: A Survey
    Pages : 3328-3333
    Mamidi Kiran Kumar, V. Kamakshi Prasad
    Abstract | PDFPDF
    18. A Review and Evaluations of Real Time Shortest Path according to current traffic on road
    Pages : 3334-3337
    Disha Gupta, U. Datta
    Abstract | PDFPDF
    19. Evaluation of Document Clustering Approach based on Particle Swarm Optimization Method for
    Twitter Dataset

    Pages : 3338-3341
    Baljeet Kaur, Sheetal Kundra, Harish Kundra
    Abstract | PDFPDF
    20. Secure and Efficient Confidential Data Using Multiple Authorities in DTN
    Pages : 3342-3344
    Ayinavalli Venkata Ramana, Pavithra Urjana
    Abstract | PDFPDF
    21. Intrusion Detection System on KDDCup99 Dataset: A Survey
    Pages : 3345-3348
    Sonali Rathore, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    22. Optimal Neural Network Based Classifier Using Optical Character Recognition Engine for Tamil
    Language

    Pages : 3349-3356
    Dr.N Venkateswaran, Dr.PS Jagadeesh Kumar
    Abstract | PDFPDF
    23. Filtering Of Abusive Messages Posted By User on OSN
    Pages : 3357-3360
    Tata A S K Ishwarya, Dr. H Venkateswara Reddy
    Abstract | PDFPDF
    24. SVM Based Effective Malware Detection System
    Pages : 3361-3365
    Smita Ranveer, Swapnaja Hiray
    Abstract | PDFPDF
    25. IRIS Recognition Using High Level Features
    Pages : 3366-3369
    C Suresh kumar, Jagadisha N
    Abstract | PDFPDF
    26. Software Reliability Models: Time between failures and Accuracy estimation
    Pages : 3370-3373
    Dalbir Kaur, Monika Sharma
    Abstract | PDFPDF
    27. Performance Analysis of Automated Sequence Model Testing (ASMT) using Cloud Integration
    Pages : 3374-3379
    Priya Purohit, Mahesh Malviya, Yunus Khan
    Abstract | PDFPDF
    28. Enhanced Security for Mobile WiMAX through Secured Initial Ranging Process
    Pages : 3380-3384
    D. Roselin Selvarani, and Dr. T. N. Ravi
    Abstract | PDFPDF
    29. OPTIMIZATION OF TEXT CLASSIFICATION USING SUPERVISED AND UNSUPERVISED LEARNING APPROACH
    Pages : 3385-3387
    Manpreet Kaur, Vijay Kumar
    Abstract | PDFPDF
    30. SELinux Integration into Linux Kernel
    Pages : 3388-3391
    Vinay Karajagi , Meenakshi Garg
    Abstract | PDFPDF
    31. A Review of SaaS Profit Maximization in Cloud Computing
    Pages : 3392-3395
    Richa, Hari Singh
    Abstract | PDFPDF
    32. A Review of Model Based Slicing
    Pages : 3396-3399
    Tamanna, Dr. Sukhvir Singh
    Abstract | PDFPDF
    33. A Qualitative Survey on Position Based Unicast Routing Protocols in Vehicular Ad hoc Networks (VANETs)
    Pages : 3400-3404
    Sarvesh Kr. Soni, B.P Chaurasia
    Abstract | PDFPDF
    34. Inherent Error Analysis of Slope Variable with IDW Method
    Pages : 3405-3409
    Dr.Neeraj Bhargava, Dr. Ritu Bhargava, Prakash Singh Tanwar
    Abstract | PDFPDF
    35. Framework on Capturing User Search Intention Based on Duplicate Image Detection
    Pages : 3410-3413
    Ankita K. Jagtap, B. A. Tidke
    Abstract | PDFPDF
    36. Securing Classified Information: A Six-Step Approach to Data Classification
    Pages : 3414-3418
    Siti Hazwah Abd Karim, Dr. Zahri Yunos, Mohd Shamir Hashim, Rahayu Azlina Ahmad
    Abstract | PDFPDF
    37. Recommender System Using Clustering Based On Collaborative Filtering Approach
    Pages : 3419-3423
    Jyoti Pandey, M. R. Patil
    Abstract | PDFPDF
    38. A Survey on Nadi Pareeksha for Early Detection of Several Diseases& Computational Models using Nadi Patterns
    Pages : 3424-3425
    Dhanalaxmi .Gaddam
    Abstract | PDFPDF
    39. An Efficient & Detailed Digital Image Feature Extraction Method Using K-NN Algorithm and Image Tags
    Pages : 3426-3433
    Gaurav Mandloi, Prof. Kshitij Pathak
    Abstract | PDFPDF
    40. Drashti- An Android Reading Aid
    Pages : 3434-3437
    Vikram Shirol, Abhijit M, Savitri A, Pooja R, Amrutha K
    Abstract | PDFPDF
    41. User- and Query- Dependent Ranking for Searching Technical Papers
    Pages : 3438-3442
    Manish R. Jansari, Prof. P. M. Chawan
    Abstract | PDFPDF
    42. A Review: RSA Algorithm for blurred image and restoration in different blur techniques
    Pages : 3443-3446
    Kirti Bhadauria, U. Dutta
    Abstract | PDFPDF
    43. Multi Scale Wavelet Fusion Based Vocal Singer Matching
    Pages : 3447-3451
    Meenu, Monika Aggarwal
    Abstract | PDFPDF
    44. Development of a Scalable System for Stealthy P2P Botnet Detection
    Pages : 3452-3456
    Navya Balla, P.V. Siva Kumar
    Abstract | PDFPDF
    45. K-Means based General Self-Organized Tree- Based Energy Balancing Routing Protocol for
    Wireless Sensor Networks

    Pages : 3457-3464
    Pardeep Kaur, Vinay Bhardwaj
    Abstract | PDFPDF
    46. Design Applications ProSIARS as Media Support for Optimize the Simulation Based Learning
    Pages : 3465-3468
    Slamet Sudaryanto N, Maryani S, Sudaryanto
    Abstract | PDFPDF
    47. Survey on Pedestrian Detection, Classification and Tracking
    Pages : 3469-3474
    Rudra Gouda, Jyothi S Nayak
    Abstract | PDFPDF
    48. Analysis of Low Phase Noise and Low Power CMOS VCO – A Review
    Pages : 3475-3478
    Shweta Chadha, Risha Sharma
    Abstract | PDFPDF
    49. Implementation of H.264/MPEG-4 AVC for Compound Image Compression Using Histogram based Block Classification Scheme
    Pages : 3479-3488
    Dr.PS Jagadeesh kumar, Arif Aziz, Sudipta Sahana, Prasanth Thapliyal
    Abstract | PDFPDF
    50. POS: Pattern Oriented Scheme for Data Leakage Detection in Content Delivery Networks
    Pages : 3489-3495
    Rajeswari Mandadi, B.Chandra Mouli, P.Nirupama
    Abstract | PDFPDF
    51. Genetic Tuning of Fuzzy Inference System for Furnace Temperature Controller
    Pages : 3496-3500
    Rachana R. Mudholkar, Umesh V. Somnatti
    Abstract | PDFPDF
    52. Fault Node Prediction Model in Wireless Sensor Networks Using Improved Generic Algorithm
    Pages : 3501-3503
    Venkata Surya Sarat Kumar Lakamana, S.Jhansi Rani
    Abstract | PDFPDF
    53. Investigating the Impact of Malicious Node on the Performance of AODV Routing Protocol in
    MANETs

    Pages : 3504-3506
    P.V.Venkateswara Rao, S. Pallam Shetty
    Abstract | PDFPDF
    54. A Study of Different Data Encryption Algorithms at Security Level: A Literature Review
    Pages : 3475-3478
    Alongbar Daimary , Prof. (Dr.) L. P. Saikia
    Abstract | PDFPDF
    55. Matrix Clock Synchronization in the Distributed Computing Environment
    Pages : 3510-3513
    Avaneesh Singh, Neelendra Badal
    Abstract | PDFPDF
    56. Captcha based Password Authentication - A New Security Scheme
    Pages : 3514-3522
    Monika Chilluru, B. Ravindra Naick, P. Nirupama
    Abstract | PDFPDF
    57. Fake Review and Brand Spam Detection using J48 Classifier
    Pages : 3523-3526
    Sushant Kokate, Bharat Tidke
    Abstract | PDFPDF
    58. A Survey Paper on Wireless Access Protocol
    Pages : 3527-3534
    Vikash Yadav, Monika Verma, Nisha
    Abstract | PDFPDF
    59. A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Detection
    Pages : 3535-3540
    Sanket Shinde, Girija Chiddarwar
    Abstract | PDFPDF
    60. Analyzing Different Performance Metrics on TCP Varients over Mobile Ad-Hoc Networks
    Pages : 3541-3547
    Payal Sharma
    Abstract | PDFPDF
    61. Finding Template Mails from Spam Corpus Using Genetic Algorithm and K-Means Algorithm
    Pages : 3548-3551
    Liny Varghese, Supriya M.H, K. Poulose Jacob
    Abstract | PDFPDF
    62. Proposed Methodology of a Hybrid Approach using Particle Swarm Optimization with Linear Crossover to solve Continuous Optimization Problem
    Pages : 3552-3555
    Dolly Verma, Rashmi Shrivas
    Abstract | PDFPDF
    63. Novel Intrusion Detection in MANETs based on Trust
    Pages :3556-3560
    Devendra Singh, S. S. Bedi
    Abstract | PDFPDF
    64. Detection of Malware on Android based on Application Features
    Pages : 3561-3564
    Gunjan Kapse, Aruna Gupta
    Abstract | PDFPDF
    65. Privacy Model for Anonymizing Sensitive Data in Social Network
    Pages : 3565-3570
    N.Sowndhariya, T.C.R.Jeyarathika, P.Suganya, P.Saranya
    Abstract | PDFPDF
    66. Communication Amoung Agents Using SACA Architecture
    Pages : 3571-3576
    Ashwini K, Dr M V Vijayakumar
    Abstract | PDFPDF
    67. Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
    Pages : 3577-3580
    T.Vijayalakshmi, N.Suresh
    Abstract | PDFPDF
    68. Performance Augmentation Of Mobile Devices Using Cloud Computing
    Pages : 3581-3587
    Monica Gajbhe, Dr. S. R. Sakhare
    Abstract | PDFPDF
    69. Handling multiple failures in IP Backbone network using LOLS along with AOMDV for detecting and
    avoiding wormhole attack

    Pages : 3588-3593
    Anuja Sanjay Divekar and Pankaj Chandre
    Abstract | PDFPDF
    70. Trust Aware Recommender Systems: A Survey on Implicit Trust Generation Techniques
    Pages : 3594-3599
    Swati Gupta, Sushama Nagpal
    Abstract | PDFPDF
    71. Improving the privacy of web search by Restricting the Adversary by Capturing Series of Queries
    Pages : 3600-3603
    P.Rajani, K.Ramesh, O.Bhaskar
    Abstract | PDFPDF
    72. Framework for Providing Security and Energy saving Using Elliptic Curve Cryptography in Wireless Sensor Networks
    Pages : 3604-3608
    Venkateswarlu Sunkari, S. Kranthi Kumar, Ato Daniel Abebe
    Abstract | PDFPDF
    73. A Generalized Framework for Public Mobile Device Tracking System using Central Database and Location Based Services
    Pages : 3609-3610
    Venkatesh Suvarna
    Abstract | PDFPDF
    74. Customizable Content Based Filtering Method to Filter Texts and Images from Social Network User Wall
    Pages : 3611-3614
    Mahesh Jadhav, Subhash Pingale, Ravindra Takalikar
    Abstract | PDFPDF
    75. Person Identification Using Palm Image Fusion Using Hybrid Wavelet Transform with PCA and EHD
    Pages : 3615-3618
    Bhagyashree S. Sawant, Vaishali L. Kolhe
    Abstract | PDFPDF
    76. A Score and Cluster Head Based Algorithm for Finding MRC against Link Failures
    Pages : 3619-3624
    Samiksha Chatare, Ravi Singh Pippal
    Abstract | PDFPDF
    77. Information Retrieval using Pattern Deploying and Pattern Evolving Method for Text Mining
    Pages : 3625-3629
    Vishakha D. Bhope, Sachin N. Deshmukh
    Abstract | PDFPDF
    78. Thermodynamic Availability Analysis: Usage in Quantification of Resilience Modulus, Modulus of
    Elasticity and Yield Stress for an Absorber Column System

    Pages : 3630-3649
    Sirshendu Guha and Sudip Kumar Das
    Abstract | PDFPDF
    79. An Efficient Multi-Dimensional Data Analysis over Parallel Computing Framework
    Pages : 3650-3654
    Pramod Patil, Amit Patange
    Abstract | PDFPDF
    80. Hyperspectral Image Classification through Watershed Segmentation
    Pages : 3655-3658
    Savita Sabale, Chhaya Jadhav
    Abstract | PDFPDF
    81. Ensuring Secure Data Communication Cloud Environment
    Pages : 3659-3662
    Chayashree G
    Abstract | PDFPDF
    82. Dual Tree Complex Wavelet Cepstral Coefficient– based Bat Classification in Kalakad Mundanthurai
    Tiger Reserve.

    Pages : 3663-3671
    Gladrene Sheena Basil, Juliet Vanitharani, Jayapriya K , Antonysamy A
    Abstract | PDFPDF
    83. Separable Reversible Data Hiding Using Blowfish Algorithm
    Pages : 3672-3676
    Rakesh D. Desale, Yogesh S. Patil
    Abstract | PDFPDF
    84. Sequential Decision Task by Adaptive Reinforcement Learning Method
    Pages : 3677-3681
    Ankur Verma, Pramod Patil
    Abstract | PDFPDF
    85. Gene Expression with Pheonotype Classification and Patient Survival Prediction Algorithm
    Pages : 3682-3687
    T.Shanmugavadivu, Dr. T.Ravichandran
    Abstract | PDFPDF
    86. Digital Watermarking in Audio Using Least Significant Bit and Discrete Cosine Transform
    Pages : 3688-3692
    Priyanka Pattanshetti, Prof.Shabda Dongaonkar, Prof. Sharmila Karpe
    Abstract | PDFPDF
    87. Modelling of Weather Data Using Gaussian Linear Regression
    Pages : 3693-3696
    Vamsi Krishna G
    Abstract | PDFPDF
    88. Data Mining Application for Big Data Analysis
    Pages : 3697-3700
    Bharati Punjabi, Prof. Sonal Honale
    Abstract | PDFPDF
    89. Efficient Technique for Annonymized Microdata Preservation using Slicing
    Pages : 3701-3705
    Manjusha S. Mirashe, Prof. Kapil N. Hande
    Abstract | PDFPDF
    90. Wireless Sensor Networks (WSN)
    Pages : 3706-3708
    N.Reka
    Abstract | PDFPDF
    91. A Survey on Efficient and Secure data transmission for MANET
    Pages : 3709-3711
    Rasika Nerkar, Jagdish Pimple
    Abstract | PDFPDF
    92. A Note on Quantization using Cuckoo Search using Self Information: A Short Review and an
    Application with Real Images

    Pages : 3712-3715
    Sandeep Kad, Sukhmeet Kaur
    Abstract | PDFPDF
    93. Recognition of spoken English phrases using visual features extraction and classification
    Pages : 3716-3719
    Salma Pathan, Archana Ghotkar
    Abstract | PDFPDF
    94. Target Tracking in Wireless Sensor Network: A Survey
    Pages : 3720-3723
    Kabita Hazra, B. N. Bhramar Ray
    Abstract | PDFPDF
    95. Face Recognition Using BBDCT and BPSO For Feature Extraction and Selection
    Pages :3724-3727
    Vikas Katakdound
    Abstract | PDFPDF
    96. Result Based on Graphical Password and Biometric Authentication for High Security
    Pages : 3728-3732
    Rahul Bora, Madhuri Zawar
    Abstract | PDFPDF
    97. Image Privacy Protection for Online Storage Using Adaptive Security Model
    Pages : 3733-3735
    Rupinder Kaur, Rekha Bhatia
    Abstract | PDFPDF
    98. Solving Task Allocation to the Worker Using Genetic Algorithm
    Pages : 3736-3741
    Jameer. G. Kotwal, Dr. Tanuja S. Dhope
    Abstract | PDFPDF
    99. Enhancing Text Classification by Stochastic Optimization method and Support Vector Machine
    Pages : 3742-3745
    Suresh Kumar, Dr. Shivani Goel
    Abstract | PDFPDF
    100. Green Computing: Driving Economic and Environmental Conditions
    Pages : 3746-3748
    Saurabh Patodi, Richa Sharma, Aniruddha Solanki
    Abstract | PDFPDF
    101. Vision Based User Authentication System for Industrial Application
    Pages : 3749-3752
    Piyush Anjankar, Prof.Shubhangi Borkarr
    Abstract | PDFPDF
    102. A Comparative Study of Un-optimized and Optimized Video Steganography
    Pages : 3753-3757
    Ritesh Upadhyay, Y. S. Thakur, Dr. D. K. Sakravdia
    Abstract | PDFPDF
    103. Energy base route established approach for expansion the network life time in Wireless Mobile
    Ad-hoc Network: Survey

    Pages : 3758-3762
    Neha Sharma, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    104. Comparision in cover media under Stegnography Digital media by Hide and Seek Approach
    Pages : 3763-3768
    Shruti
    Abstract | PDFPDF
    105. Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern
    Pages : 3769-3773
    Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
    Abstract | PDFPDF
    106. Object Tracking in Video Using Mean Shift Algorithm: A Review
    Pages : 3774-3777
    Aparna Shivhare and Dr. Vinita Choudhary
    Abstract | PDFPDF
    107. Intrusion Detection System (IDS) framework for Digital Network
    Pages : 3778-3783
    Ashish K. Uplenchwar,Tanuja Dhope
    Abstract | PDFPDF
    108. Analysis of Digital Image Sharing By Diverse Image Media
    Pages : 3784-3786
    Mayuri Sonkusare, Prof. Nitin Janwe
    Abstract | PDFPDF
    109. Nearest Duplicate Video Retrieval with Multiple Features using Temporal Correlation
    Pages : 3787-3790
    Shital Bhirud, Prof. P. S. Desai
    Abstract | PDFPDF
    110. A Survey on Various Attribute based Public Key Cryptography
    Pages : 3791-3794
    Pooja Dubey, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    111. A Secure & Verifiable Technique for Secure Communication using Elliptic Curve
    Pages : 3795-3798
    Pooja Dubey, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    112. An Enhanced-NQCA Combined Metrics Based Clustering Algorithm for MANETs
    Pages : 3799-3805
    Anjana Rani Sikdar, Deepak Kumar Xaxa
    Abstract | PDFPDF
    113. Routing Scheme for Min-Max Energy based Dropping Power Consumption in MANET
    Pages : 3806-3811
    Neha Sharma, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    114. Image Fusion Using Higher Order Singular Value Decomposition
    Pages : 3812-3814
    Pooja Kohok, Sachin Patil
    Abstract | PDFPDF
    115. A Survey on Various Image Fusion techniques
    Pages : 3815-3819
    Priyanka Kaurav, Richa Chouhan, Mohd. Ahmed
    Abstract | PDFPDF
    116. Secure Broker-less Publish/Subscribe System using ECC
    Pages : 3820-3824
    Onkar Kasarlewar, Prof. P. S. Desai
    Abstract | PDFPDF
    117. Content-Based Face Image Retrieval Using Attribute-Enhanced Sparse Codewords
    Pages : 3825-3829
    Bharti S. Satpute, Archana A. Chaugule
    Abstract | PDFPDF
    118. The Value of Big Data in Clinical Decision Making
    Pages : 3830-3835
    Dr. Amit Dang, Dr. Shilpa Mendon
    Abstract | PDFPDF
    119. A Literature Review on Security Aspects for Fault Tolerance in Networks
    Pages : 3836-3843
    Kavita Mishra, Prashant Vats
    Abstract | PDFPDF
    120. Solving N-Queen Problem by Prediction
    Pages : 3844-3848
    Lijo V. P., Jasmin T. Jose
    Abstract | PDFPDF
    121. Investigating Contemporary Software Engineering Challenges Involved in Integrating Disparate
    Software Systems

    Pages : 3849-3854
    Nazeen Ansari, Dr. G.T. Thampi
    Abstract | PDFPDF
    122. Review on SMS Encryption using MNTRU Algorithms on Android
    Pages : 3855-3858
    Shobha Jha, U. Dutta
    Abstract | PDFPDF
    123. A Survey on Compression of an Image Using Wavelet Transform
    Pages : 3859-3860
    K. S. Solanki and Nitu Senani
    Abstract | PDFPDF
    124. Sky Computing: The Future of cloud computing
    Pages : 3861-3864
    Abha Tewari, Pooja Nagde, Aarti Sahitya
    Abstract | PDFPDF
    125. Evaluate Network Security and Measure Performance of Self Healing in 5G
    Pages : 3865-3870
    Haripriya N , Sangeethalakshmi G
    Abstract | PDFPDF
    126. A Review on: Iris Recognition
    Pages : 3871-3873
    Sonia Sangwan, Reena Rani
    Abstract | PDFPDF
    127. A Survey on Text Filtering in Online Social Networks
    Pages : 3874-3876
    Shilpa Radhakrishnan
    Abstract | PDFPDF
    128. A New Approach of Feature Extraction using Genetic Algorithm and Scale-Invariant Feature Transform
    Pages :3877-3880
    Meenu Sahu, Amit Saxena, Dr. Manish Manoria
    Abstract | PDFPDF
    129. Algorithms for Duty Cycle Control in Wireless Sensor Networks- A Survey
    Pages : 3881-3884
    Jyothi T
    Abstract | PDFPDF
    130. Cloud Computing for Digital Libraries in Universities
    Pages : 3885-3889
    Dev Ras Pandey, Gauri Shanker Kushwaha
    Abstract | PDFPDF
    131. EHUI: A Novel Algorithm for Mining High Utility Itemsets
    Pages : 3890-3892
    Prashant V. Barhate, Prof. S. R. Chaudhari, Prof. P. C. Gill
    Abstract | PDFPDF
    132. Article Removed
    Pages : xxx-xxx
    xxx
    Abstract | PDFPDF
    133. Entire Gabor Subspace Approach for Expression Recognition Using Locality Preserving Projection
    Pages : 3897-3903
    G.P.Hegde, M.Seetha, Nagaratna Hegde
    Abstract | PDFPDF
    134. An Enhancement of Images Using Recursive Adaptive Gamma Correction
    Pages : 3904-3909
    Gagandeep Singh, Sarbjeet Singh
    Abstract | PDFPDF
    135. A Study On Blocking Fake Accounts In Online Social Network
    Pages : 3910-3913
    T. Vidhya, Dr. R. Mala
    Abstract | PDFPDF
    136. Cloud Computing Paradigm and Current Trends
    Pages : 3914-3918
    N.Subha Malar, K.Vasantha Kokilam
    Abstract | PDFPDF
    137. Side Channel Security with Multiclouds
    Pages : 3919-3921
    S. M. Bansode
    Abstract | PDFPDF
    138. An Effective tool for Cloud based E-learning Architecture
    Pages : 3922-3924
    Dr. N.Vanjulavalli, S.Arumugam, Dr.A.Kovalan
    Abstract | PDFPDF
    139. A Novel Approach for the Detection of Small Cell Lung Cancer Based on Entropy and PSNR Value
    Pages : 3925-3929
    Georgy George, Nisha J.S
    Abstract | PDFPDF
    140. Odd-Even Message Bit Sequence Based Image Steganography
    Pages : 3930-3932
    Sandeep Singh, Jaspreet Kaur
    Abstract | PDFPDF
    141. Visualizing Big Data Mining: Challenges, Problems and Opportunities
    Pages : 3933-3937
    Rakesh Ranjan Kumar, Binita Kumari
    Abstract | PDFPDF
    142. Sleep Disorder Recognition using Wearable Sensor and Raspberry Pi
    Pages : 3938-3942
    Vinay Kumar Chandna, Sagar Narang, Yash Bansal
    Abstract | PDFPDF
    143. Security Enhancement Technique for Defending Wormhole Attacks in Wireless Mesh Networks
    Pages : 3943-3948
    Virendra Dani, Vijay Birchha
    Abstract | PDFPDF
    144. To Enhance A-KNN Clustering Algorithm for Improving Software Architecture
    Pages : 3949-3954
    Ishu, Sandeep Singh
    Abstract | PDFPDF
    145. Study on Customer’s attitude towards Online firms based on their Service Reputation
    Pages : 3955-3960
    Manjula Shanbhog, Mayank Singh, Shailendra Mishra
    Abstract | PDFPDF
    146. A Study on Incremental Association Rule Mining
    Pages : 3961-3964
    V.Umarani
    Abstract | PDFPDF
    147. Survey on Security Risks in Android OS and an Introduction to Samsung KNOX
    Pages : 3965-3967
    Maya Krishnan
    Abstract | PDFPDF
    148. Frequency Partioning Based Image Fusion for CCTV
    Pages : 3968-3972
    Veerpal Kaur, Jaspreet Kaur
    Abstract | PDFPDF
    149. Sketch Based Image Retrieval System for the Web - A Survey
    Pages : 3973-3979
    Neetesh Prajapati, G.S.Prajapti
    Abstract | PDFPDF
    150. Comparative Analysis of Association Rule Mining Algorithms Based on Performance Survey
    Pages : 3980-3985
    K.Vani
    Abstract | PDFPDF
    151. Search Based Face Annotation Using PCA and Unsupervised Label Refinement Algorithms
    Pages : 3986-3991
    Shital Shinde, Archana Chaugule
    Abstract | PDFPDF
    152. A Proposed IP Multimedia Subsystem Security Framework for Long Term Evaluation (LTE)
    Networks

    Pages : 3992-3998
    Samah Osama M. Kamel, Adly S. Tag El Dein, Nadia H. Hegazi , Hala M.Abd El Kader , Hany M. Harb
    Abstract | PDFPDF
    153. Web Enabled Employee Performance System
    Pages : 3999-4002
    R.Shobana & K. P. Mani Anand
    Abstract | PDFPDF
    154. An Extension To Securedsms: A Protocol For Sms Security
    Pages : 4003-4005
    Deepthi Sucheendran, Anju S, Arun. R
    Abstract | PDFPDF
    155. Optimal Replication Strategy Using Rough Set Theory for Dynamic Content Replication
    Pages : 4006-4009
    Shruthi, Dr. Santosh L Deshpande
    Abstract | PDFPDF
    156. Achieving efficient Geographic routing via Mobility based forwarding node selection schemes in Mobile Sensor Network
    Pages : 4010-4014
    Akash Amathe, Dr. Santosh Deshapande
    Abstract | PDFPDF
    157. Optimization of Terminal Aerodrome Forecast
    Pages : 4015-4016
    Aditi Sharma, Dr. Mamta Bansal
    Abstract | PDFPDF
    158. Prevention Of Black Hole Attack Using Improvised Watch Dog Through Data Accumulation
    Pages : 4017-4019
    K. R. Viswa Jhananie, Dr. C. Chandrasekar
    Abstract | PDFPDF
    159. Comparative Analysis of Flooding and Gossiping in Wireless Sensor Networks Using SIR
    Pages : 4020-4023
    Mukta Chandna, Bhawna Singla
    Abstract | PDFPDF
    160. Finger Vein Recognition Using computational Intelligence Techniques
    Pages : 4024-4028
    RamaPrabha R, Prof Dr. Vasantha Kalyani David
    Abstract | PDFPDF
    161. Web Mining: A Survey on Various Annotation Techniques
    Pages : 4029-4032
    Avnish Rajput, Amit Saxena, Manish Manoria
    Abstract | PDFPDF
    162. Home Security Using Cloud Service
    Pages : 4033-4036
    Pradnya S. Gotmare, Anjali Chachra
    Abstract | PDFPDF
    163. Improvised Genetic Approach for an Effective Resource Allocation in Cloud Infrastructure
    Pages : 4037-4046
    M. Durairaj, P. Kannan
    Abstract | PDFPDF
    164. A Survey on Visual Cryptography for Secret Data Sharing
    Pages : 4047-4053
    M. Durairaj, V. Sutharson
    Abstract | PDFPDF
    165. An Empirical study on Emotional Influence of Indian Classical Raag Yaman and Darbari on Face
    Pages : 4054-4057
    Aashish A.Bardekar
    Abstract | PDFPDF
    166. Analysis of Frequent Item set Mining of Electronic Evidence using FP-Growth based on Map/Reduce
    Pages : 4058-4061
    Pranavkumar Bhadane, R.V.Patil
    Abstract | PDFPDF
    167. A Web Based Fuzzy Expert System for Epistaxis Diagnosis
    Pages : 4062-4068
    Chanchal Sharma, Tejalal Choudhary
    Abstract | PDFPDF
    168. Finger Vein Image Enhancement Using RPL, Segmentation with Neural Networks
    Pages : 4069-4073
    Arshdeep Kaur, Abhinav Mishra
    Abstract | PDFPDF
    169. Decentralized and Vigorous Unidentified Validation Access Control System
    Pages : 4074-4077
    G.Anusha, R.Sathiyaraj
    Abstract | PDFPDF
    170. Association Rule Mining for Accident Record Data in Mines
    Pages : 4078-4085
    Amber Hayat, Khustar Ansari, Praveen
    Abstract | PDFPDF
    171. Supporting Privacy Protection In Personalized Web Searching and Browsing
    Pages : 4086-4093
    Manali Wadnerkar, Dr. R. R. Ingle
    Abstract | PDFPDF
    172. A Survey: Query Optimization
    Pages : 4094-4095
    Vishal Sharma, Mr. Lovenish Sharma
    Abstract | PDFPDF
    173. XML Based Non Redundant Distributed Question Bank Generation
    Pages : 4096-4101
    V.D.V.Naga Lakshmi,CH.Anupama, D.Haritha
    Abstract | PDFPDF
    174. Techniques to Alleviate Sybil Attack and Security Issues in Wireless Sensor Network
    Pages :4102-4105
    Sandeep Sindhu, Dr.Suman Sangwan
    Abstract | PDFPDF
    175. Countermeasures against Timing Attack on AES
    Pages :4106-4109
    Advait Kelapure, M. M. Chandane
    Abstract | PDFPDF
    176. Privacy and Security Issues in Cloud
    Pages : 4110-4117
    Shiv Shankar Barai, Sridhar Mocherla
    Abstract | PDFPDF
    177. A Secure Ad hoc Wireless Sensor Network For Vampire Attack
    Pages :4118-4122
    Deepmala Verma, Gajendra Singh, Kailash Patidar
    Abstract | PDFPDF
    178. Intrusion Detection and Prevention in Homogenous Wireless Sensor Networks
    Pages : 4123-4127
    Vanita B. Raut
    Abstract | PDFPDF
    179. Load Balancing of Virtual Machine Using Honey Bee Galvanizing Algorithm in Cloud
    Pages : 4128-4132
    Monika Rathore, Sarvesh Rai, Navdeep Saluja
    Abstract | PDFPDF
    180. Review on: Providing Arithmetic Operations on RSA using Homomorphic Technique
    Pages : 4133-4135
    Shiwali, Namita kakkar
    Abstract | PDFPDF
    181. Reliable Data Tier Architecture for Job Portal using AWS
    Pages : 4136-4140
    Manoj Prakash Thalagatti, Chaitra B, Mohammed Asrar Naveed
    Abstract | PDFPDF
    182. A Big Data Mining – A Review
    Pages : 4141-4144
    N.Kumar, Dr.T.Christopher
    Abstract | PDFPDF
    183. Comparative study of various Image De-noising Techniques
    Pages : 4145-4147
    Karthik, Kamalakshi Naganna
    Abstract | PDFPDF
    184. A Survey on Mining and Statistical Analysis of Social Website Data using Syntatic Analysis and
    Hybrid Classification

    Pages :4148-4150
    Niranjan C Kundur, Rohitaksha K, Sreenatha M, Abhilash C B
    Abstract | PDFPDF
    185. Security Enhancements for Finger Print Templates on Minutiae
    Pages :4151-4153
    Dr G.VenkataRamiReddy, Vidyasree.P
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-