1. |
A Survey on Data Security of Cloud Storage Services
Pages : 3252-3255
Gunjal Yogita S.
Abstract | PDF |
2. |
LERP: A Secure Location Based Efficient Routing
Protocol
Pages :3256-3260
Rajan Gandhi , Prof Prasanna Joeg
Abstract | PDF |
3. |
An Iterative Random PSO to minimize Total-flowtime
in Flowshop Scheduling
Pages : 3261-3265
M. M. Ghumare, L. A. Bawoor, Dr. S. U. Sapkal
Abstract | PDF |
4. |
Web Mining- Concepts and Application
Pages : 3266-3268
S.Vidya, K.Banumathy
Abstract | PDF |
5. |
No Science No Humans, No New Technologies No changes "Big Data a Great Revolution
Pages : 3269-3274
S.Sangeetha, A.K Sreeja
Abstract | PDF |
6. |
Impact of Frequencies on IEEE 802.15.4 WPANs
for Wireless Sensor Networks
Pages : 3275-3279
Sukhvinder S Bamber, Gurprem Singh
Abstract | PDF |
7. |
Finger Vein Detection using Repeated Line
Tracking, Even Gabor and Multilinear
Discriminant Analysis (MDA)
Pages : 3280-3284
Manpreet Kaur, Geetanjali Babbar
Abstract | PDF |
8. |
A Survey on Designing a Framework for Detection
and Capturing of Network Attacks in Cloud
Environment
Pages : 3285-3287
Mukul Pande, Prof. Sulabha. V. Patil
Abstract | PDF |
9. |
Construction of Software Model Graph and
Analysing Object-Oriented Program(C#) Using
Abstract Syntax Tree Method
Pages : 3288-3293
Appala Srinuvasu Muttipati, Poosapati Padmaja
Abstract | PDF |
10. |
Comparative Study of Pre-processing Techniques
for Classifying Streaming Data
Pages : 3294-3297
Ketan Desale, Roshani Ade
Abstract | PDF |
11. |
A Modified Agent Based AODV Routing Protocol for MANET’s
Pages : 3298-3301
Prakirti Raghuvanshi, Suman Pandey
Abstract | PDF |
12. |
Implementing Pyramid Structure for Generating
Efficient Personnelized Recommendations
Pages : 3302-3306
Minakshi Pachpatil, Anjana N.Ghule
Abstract | PDF |
13. |
Simulated Annealing (SA) based Load Balancing
Strategy for Cloud Computing
Pages : 3307-3312
Brototi Mondal, Avishek Choudhury
Abstract | PDF |
14. |
Detection of Vampire Attack in Wireless Sensor
Networks
Pages : 3313-3317
Deepmala Verma, Gajendra Singh, Kailash Patidar
Abstract | PDF |
15. |
How Use of Technological Devices is related to
Students Category: A Review
Pages : 3318-3322
Satinder Kaur, Simmi Bagga
Abstract | PDF |
16. |
Efficient CAD system based on GLCM& derived feature for diagnosing Breast Cancer
Pages : 3323-3327
Rabi Narayan Panda, Mirza Ashad Baig, Dr. Bijay Ketan Panigrahi, Dr. Manas Ranjan Patro
Abstract | PDF |
17. |
Driver Behavior Analysis and Prediction Models: A Survey
Pages : 3328-3333
Mamidi Kiran Kumar, V. Kamakshi Prasad
Abstract | PDF |
18. |
A Review and Evaluations of Real Time Shortest
Path according to current traffic on road
Pages : 3334-3337
Disha Gupta, U. Datta
Abstract | PDF |
19. |
Evaluation of Document Clustering Approach
based on Particle Swarm Optimization Method for
Twitter Dataset
Pages : 3338-3341
Baljeet Kaur, Sheetal Kundra, Harish Kundra
Abstract | PDF |
20. |
Secure and Efficient Confidential Data Using
Multiple Authorities in DTN
Pages : 3342-3344
Ayinavalli Venkata Ramana, Pavithra Urjana
Abstract | PDF |
21. |
Intrusion Detection System on KDDCup99
Dataset: A Survey
Pages : 3345-3348
Sonali Rathore, Amit Saxena, Manish Manoria
Abstract | PDF |
22. |
Optimal Neural Network Based Classifier Using
Optical Character Recognition Engine for Tamil
Language
Pages : 3349-3356
Dr.N Venkateswaran, Dr.PS Jagadeesh Kumar
Abstract | PDF |
23. |
Filtering Of Abusive Messages Posted By User on OSN
Pages : 3357-3360
Tata A S K Ishwarya, Dr. H Venkateswara Reddy
Abstract | PDF |
24. |
SVM Based Effective Malware Detection System
Pages : 3361-3365
Smita Ranveer, Swapnaja Hiray
Abstract | PDF |
25. |
IRIS Recognition Using High Level Features
Pages : 3366-3369
C Suresh kumar, Jagadisha N
Abstract | PDF |
26. |
Software Reliability Models: Time between
failures and Accuracy estimation
Pages : 3370-3373
Dalbir Kaur, Monika Sharma
Abstract | PDF |
27. |
Performance Analysis of Automated Sequence
Model Testing (ASMT) using Cloud Integration
Pages : 3374-3379
Priya Purohit, Mahesh Malviya, Yunus Khan
Abstract | PDF |
28. |
Enhanced Security for Mobile WiMAX through Secured Initial Ranging Process
Pages : 3380-3384
D. Roselin Selvarani, and Dr. T. N. Ravi
Abstract | PDF |
29. |
OPTIMIZATION OF TEXT CLASSIFICATION USING SUPERVISED AND UNSUPERVISED LEARNING APPROACH
Pages : 3385-3387
Manpreet Kaur, Vijay Kumar
Abstract | PDF |
30. |
SELinux Integration into Linux Kernel
Pages : 3388-3391
Vinay Karajagi , Meenakshi Garg
Abstract | PDF |
31. |
A Review of SaaS Profit Maximization in Cloud Computing
Pages : 3392-3395
Richa, Hari Singh
Abstract | PDF |
32. |
A Review of Model Based Slicing
Pages : 3396-3399
Tamanna, Dr. Sukhvir Singh
Abstract | PDF |
33. |
A Qualitative Survey on Position Based Unicast Routing Protocols in Vehicular Ad hoc Networks (VANETs)
Pages : 3400-3404
Sarvesh Kr. Soni, B.P Chaurasia
Abstract | PDF |
34. |
Inherent Error Analysis of Slope Variable with IDW Method
Pages : 3405-3409
Dr.Neeraj Bhargava, Dr. Ritu Bhargava, Prakash Singh Tanwar
Abstract | PDF |
35. |
Framework on Capturing User Search Intention Based on Duplicate Image Detection
Pages : 3410-3413
Ankita K. Jagtap, B. A. Tidke
Abstract | PDF |
36. |
Securing Classified Information: A Six-Step Approach to Data Classification
Pages : 3414-3418
Siti Hazwah Abd Karim, Dr. Zahri Yunos, Mohd Shamir Hashim, Rahayu Azlina Ahmad
Abstract | PDF |
37. |
Recommender System Using Clustering Based On Collaborative Filtering Approach
Pages : 3419-3423
Jyoti Pandey, M. R. Patil
Abstract | PDF |
38. |
A Survey on Nadi Pareeksha for Early Detection of Several Diseases& Computational Models using Nadi Patterns
Pages : 3424-3425
Dhanalaxmi .Gaddam
Abstract | PDF |
39. |
An Efficient & Detailed Digital Image Feature Extraction Method Using K-NN Algorithm and Image Tags
Pages : 3426-3433
Gaurav Mandloi, Prof. Kshitij Pathak
Abstract | PDF |
40. |
Drashti- An Android Reading Aid
Pages : 3434-3437
Vikram Shirol, Abhijit M, Savitri A, Pooja R, Amrutha K
Abstract | PDF |
41. |
User- and Query- Dependent Ranking for
Searching Technical Papers
Pages : 3438-3442
Manish R. Jansari, Prof. P. M. Chawan
Abstract | PDF |
42. |
A Review: RSA Algorithm for blurred image and
restoration in different blur techniques
Pages : 3443-3446
Kirti Bhadauria, U. Dutta
Abstract | PDF |
43. |
Multi Scale Wavelet Fusion Based Vocal Singer
Matching
Pages : 3447-3451
Meenu, Monika Aggarwal
Abstract | PDF |
44. |
Development of a Scalable System for Stealthy
P2P Botnet Detection
Pages : 3452-3456
Navya Balla, P.V. Siva Kumar
Abstract | PDF |
45. |
K-Means based General Self-Organized Tree-
Based Energy Balancing Routing Protocol for
Wireless Sensor Networks
Pages : 3457-3464
Pardeep Kaur, Vinay Bhardwaj
Abstract | PDF |
46. |
Design Applications ProSIARS as Media Support
for Optimize the Simulation Based Learning
Pages : 3465-3468
Slamet Sudaryanto N, Maryani S, Sudaryanto
Abstract | PDF |
47. |
Survey on Pedestrian Detection, Classification
and Tracking
Pages : 3469-3474
Rudra Gouda, Jyothi S Nayak
Abstract | PDF |
48. |
Analysis of Low Phase Noise and Low Power
CMOS VCO – A Review
Pages : 3475-3478
Shweta Chadha, Risha Sharma
Abstract | PDF |
49. |
Implementation of H.264/MPEG-4 AVC for
Compound Image Compression Using Histogram
based Block Classification Scheme
Pages : 3479-3488
Dr.PS Jagadeesh kumar, Arif Aziz, Sudipta Sahana, Prasanth Thapliyal
Abstract | PDF |
50. |
POS: Pattern Oriented Scheme for Data Leakage
Detection in Content Delivery Networks
Pages : 3489-3495
Rajeswari Mandadi, B.Chandra Mouli, P.Nirupama
Abstract | PDF |
51. |
Genetic Tuning of Fuzzy Inference System for
Furnace Temperature Controller
Pages : 3496-3500
Rachana R. Mudholkar, Umesh V. Somnatti
Abstract | PDF |
52. |
Fault Node Prediction Model in Wireless Sensor
Networks Using Improved Generic Algorithm
Pages : 3501-3503
Venkata Surya Sarat Kumar Lakamana, S.Jhansi Rani
Abstract | PDF |
53. |
Investigating the Impact of Malicious Node on the
Performance of AODV Routing Protocol in
MANETs
Pages : 3504-3506
P.V.Venkateswara Rao, S. Pallam Shetty
Abstract | PDF |
54. |
A Study of Different Data Encryption Algorithms
at Security Level: A Literature Review
Pages : 3475-3478
Alongbar Daimary , Prof. (Dr.) L. P. Saikia
Abstract | PDF |
55. |
Matrix Clock Synchronization in the Distributed
Computing Environment
Pages : 3510-3513
Avaneesh Singh, Neelendra Badal
Abstract | PDF |
56. |
Captcha based Password Authentication - A
New Security Scheme
Pages : 3514-3522
Monika Chilluru, B. Ravindra Naick, P. Nirupama
Abstract | PDF |
57. |
Fake Review and Brand Spam Detection using J48
Classifier
Pages : 3523-3526
Sushant Kokate, Bharat Tidke
Abstract | PDF |
58. |
A Survey Paper on Wireless Access Protocol
Pages : 3527-3534
Vikash Yadav, Monika Verma, Nisha
Abstract | PDF |
59. |
A Segmentation Based Sequential Pattern
Matching for Efficient Video Copy Detection
Pages : 3535-3540
Sanket Shinde, Girija Chiddarwar
Abstract | PDF |
60. |
Analyzing Different Performance Metrics on TCP
Varients over Mobile Ad-Hoc Networks
Pages : 3541-3547
Payal Sharma
Abstract | PDF |
61. |
Finding Template Mails from Spam Corpus Using
Genetic Algorithm and K-Means Algorithm
Pages : 3548-3551
Liny Varghese, Supriya M.H, K. Poulose Jacob
Abstract | PDF |
62. |
Proposed Methodology of a Hybrid Approach using
Particle Swarm Optimization with Linear Crossover
to solve Continuous Optimization Problem
Pages : 3552-3555
Dolly Verma, Rashmi Shrivas
Abstract | PDF |
63. |
Novel Intrusion Detection in MANETs based on
Trust
Pages :3556-3560
Devendra Singh, S. S. Bedi
Abstract | PDF |
64. |
Detection of Malware on Android based on
Application Features
Pages : 3561-3564
Gunjan Kapse, Aruna Gupta
Abstract | PDF |
65. |
Privacy Model for Anonymizing Sensitive Data in
Social Network
Pages : 3565-3570
N.Sowndhariya, T.C.R.Jeyarathika, P.Suganya, P.Saranya
Abstract | PDF |
66. |
Communication Amoung Agents Using SACA
Architecture
Pages : 3571-3576
Ashwini K, Dr M V Vijayakumar
Abstract | PDF |
67. |
Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud
Pages : 3577-3580
T.Vijayalakshmi, N.Suresh
Abstract | PDF |
68. |
Performance Augmentation Of Mobile Devices
Using Cloud Computing
Pages : 3581-3587
Monica Gajbhe, Dr. S. R. Sakhare
Abstract | PDF |
69. |
Handling multiple failures in IP Backbone network
using LOLS along with AOMDV for detecting and
avoiding wormhole attack
Pages : 3588-3593
Anuja Sanjay Divekar and Pankaj Chandre
Abstract | PDF |
70. |
Trust Aware Recommender Systems: A Survey on
Implicit Trust Generation Techniques
Pages : 3594-3599
Swati Gupta, Sushama Nagpal
Abstract | PDF |
71. |
Improving the privacy of web search by Restricting
the Adversary by Capturing Series of Queries
Pages : 3600-3603
P.Rajani, K.Ramesh, O.Bhaskar
Abstract | PDF |
72. |
Framework for Providing Security and Energy
saving Using Elliptic Curve Cryptography in
Wireless Sensor Networks
Pages : 3604-3608
Venkateswarlu Sunkari, S. Kranthi Kumar, Ato Daniel Abebe
Abstract | PDF |
73. |
A Generalized Framework for Public Mobile
Device Tracking System using Central Database
and Location Based Services
Pages : 3609-3610
Venkatesh Suvarna
Abstract | PDF |
74. |
Customizable Content Based Filtering Method to Filter
Texts and Images from Social Network User Wall
Pages : 3611-3614
Mahesh Jadhav, Subhash Pingale, Ravindra Takalikar
Abstract | PDF |
75. |
Person Identification Using Palm Image Fusion
Using Hybrid Wavelet Transform with
PCA and EHD
Pages : 3615-3618
Bhagyashree S. Sawant, Vaishali L. Kolhe
Abstract | PDF |
76. |
A Score and Cluster Head Based Algorithm for
Finding MRC against Link Failures
Pages : 3619-3624
Samiksha Chatare, Ravi Singh Pippal
Abstract | PDF |
77. |
Information Retrieval using Pattern Deploying and
Pattern Evolving Method for Text Mining
Pages : 3625-3629
Vishakha D. Bhope, Sachin N. Deshmukh
Abstract | PDF |
78. |
Thermodynamic Availability Analysis: Usage in
Quantification of Resilience Modulus, Modulus of
Elasticity and Yield Stress for an Absorber
Column System
Pages : 3630-3649
Sirshendu Guha and Sudip Kumar Das
Abstract | PDF |
79. |
An Efficient Multi-Dimensional Data Analysis over
Parallel Computing Framework
Pages : 3650-3654
Pramod Patil, Amit Patange
Abstract | PDF |
80. |
Hyperspectral Image Classification through
Watershed Segmentation
Pages : 3655-3658
Savita Sabale, Chhaya Jadhav
Abstract | PDF |
81. |
Ensuring Secure Data Communication Cloud
Environment
Pages : 3659-3662
Chayashree G
Abstract | PDF |
82. |
Dual Tree Complex Wavelet Cepstral Coefficient–
based Bat Classification in Kalakad Mundanthurai
Tiger Reserve.
Pages : 3663-3671
Gladrene Sheena Basil, Juliet Vanitharani, Jayapriya K , Antonysamy A
Abstract | PDF |
83. |
Separable Reversible Data Hiding Using Blowfish
Algorithm
Pages : 3672-3676
Rakesh D. Desale, Yogesh S. Patil
Abstract | PDF |
84. |
Sequential Decision Task by Adaptive Reinforcement
Learning Method
Pages : 3677-3681
Ankur Verma, Pramod Patil
Abstract | PDF |
85. |
Gene Expression with Pheonotype Classification
and Patient Survival Prediction Algorithm
Pages : 3682-3687
T.Shanmugavadivu, Dr. T.Ravichandran
Abstract | PDF |
86. |
Digital Watermarking in Audio Using Least
Significant Bit and Discrete Cosine Transform
Pages : 3688-3692
Priyanka Pattanshetti, Prof.Shabda Dongaonkar, Prof. Sharmila Karpe
Abstract | PDF |
87. |
Modelling of Weather Data Using Gaussian Linear
Regression
Pages : 3693-3696
Vamsi Krishna G
Abstract | PDF |
88. |
Data Mining Application for Big Data Analysis Pages : 3697-3700
Bharati Punjabi, Prof. Sonal Honale
Abstract | PDF |
89. |
Efficient Technique for Annonymized Microdata
Preservation using Slicing
Pages : 3701-3705
Manjusha S. Mirashe, Prof. Kapil N. Hande
Abstract | PDF |
90. |
Wireless Sensor Networks (WSN)
Pages : 3706-3708
N.Reka
Abstract | PDF |
91. |
A Survey on Efficient and Secure data
transmission for MANET
Pages : 3709-3711
Rasika Nerkar, Jagdish Pimple
Abstract | PDF |
92. |
A Note on Quantization using Cuckoo Search
using Self Information: A Short Review and an
Application with Real Images
Pages : 3712-3715
Sandeep Kad, Sukhmeet Kaur
Abstract | PDF |
93. |
Recognition of spoken English phrases using
visual features extraction and classification
Pages : 3716-3719
Salma Pathan, Archana Ghotkar
Abstract | PDF |
94. |
Target Tracking in Wireless Sensor Network: A Survey
Pages : 3720-3723
Kabita Hazra, B. N. Bhramar Ray
Abstract | PDF |
95. |
Face Recognition Using BBDCT and BPSO For
Feature Extraction and Selection
Pages :3724-3727
Vikas Katakdound
Abstract | PDF |
96. |
Result Based on Graphical Password and
Biometric Authentication for High Security
Pages : 3728-3732
Rahul Bora, Madhuri Zawar
Abstract | PDF |
97. |
Image Privacy Protection for Online Storage Using
Adaptive Security Model
Pages : 3733-3735
Rupinder Kaur, Rekha Bhatia
Abstract | PDF |
98. |
Solving Task Allocation to the Worker Using
Genetic Algorithm
Pages : 3736-3741
Jameer. G. Kotwal, Dr. Tanuja S. Dhope
Abstract | PDF |
99. |
Enhancing Text Classification by Stochastic
Optimization method and Support Vector Machine
Pages : 3742-3745
Suresh Kumar, Dr. Shivani Goel
Abstract | PDF |
100. |
Green Computing: Driving Economic and
Environmental Conditions
Pages : 3746-3748
Saurabh Patodi, Richa Sharma, Aniruddha Solanki
Abstract | PDF |
101. |
Vision Based User Authentication System for
Industrial Application
Pages : 3749-3752
Piyush Anjankar, Prof.Shubhangi Borkarr
Abstract | PDF |
102. |
A Comparative Study of Un-optimized and
Optimized Video Steganography
Pages : 3753-3757
Ritesh Upadhyay, Y. S. Thakur, Dr. D. K. Sakravdia
Abstract | PDF |
103. |
Energy base route established approach for
expansion the network life time in Wireless Mobile
Ad-hoc Network: Survey
Pages : 3758-3762
Neha Sharma, Amit Saxena, Manish Manoria
Abstract | PDF |
104. |
Comparision in cover media under Stegnography
Digital media by Hide and Seek Approach
Pages : 3763-3768
Shruti
Abstract | PDF |
105. |
Web Usage Mining for Comparing User Access
Behaviour using Sequential Pattern
Pages : 3769-3773
Amit Dipchandji Kasliwal, Dr. Girish S. Katkar
Abstract | PDF |
106. |
Object Tracking in Video Using Mean Shift
Algorithm: A Review
Pages : 3774-3777
Aparna Shivhare and Dr. Vinita Choudhary
Abstract | PDF |
107. |
Intrusion Detection System (IDS) framework for
Digital Network
Pages : 3778-3783
Ashish K. Uplenchwar,Tanuja Dhope
Abstract | PDF |
108. |
Analysis of Digital Image Sharing By Diverse
Image Media
Pages : 3784-3786
Mayuri Sonkusare, Prof. Nitin Janwe
Abstract | PDF |
109. |
Nearest Duplicate Video Retrieval with Multiple
Features using Temporal Correlation
Pages : 3787-3790
Shital Bhirud, Prof. P. S. Desai
Abstract | PDF |
110. |
A Survey on Various Attribute based Public Key
Cryptography
Pages : 3791-3794
Pooja Dubey, Amit Saxena, Manish Manoria
Abstract | PDF |
111. |
A Secure & Verifiable Technique for Secure
Communication using Elliptic Curve
Pages : 3795-3798
Pooja Dubey, Amit Saxena, Manish Manoria
Abstract | PDF |
112. |
An Enhanced-NQCA Combined Metrics Based
Clustering Algorithm for MANETs
Pages : 3799-3805
Anjana Rani Sikdar, Deepak Kumar Xaxa
Abstract | PDF |
113. |
Routing Scheme for Min-Max Energy based
Dropping Power Consumption in MANET
Pages : 3806-3811
Neha Sharma, Amit Saxena, Manish Manoria
Abstract | PDF |
114. |
Image Fusion Using Higher Order Singular Value
Decomposition
Pages : 3812-3814
Pooja Kohok, Sachin Patil
Abstract | PDF |
115. |
A Survey on Various Image Fusion techniques
Pages : 3815-3819
Priyanka Kaurav, Richa Chouhan, Mohd. Ahmed
Abstract | PDF |
116. |
Secure Broker-less Publish/Subscribe System
using ECC
Pages : 3820-3824
Onkar Kasarlewar, Prof. P. S. Desai
Abstract | PDF |
117. |
Content-Based Face Image Retrieval Using
Attribute-Enhanced Sparse Codewords
Pages : 3825-3829
Bharti S. Satpute, Archana A. Chaugule
Abstract | PDF |
118. |
The Value of Big Data in Clinical Decision
Making
Pages : 3830-3835
Dr. Amit Dang, Dr. Shilpa Mendon
Abstract | PDF |
119. |
A Literature Review on Security Aspects for Fault
Tolerance in Networks
Pages : 3836-3843
Kavita Mishra,
Prashant Vats
Abstract | PDF |
120. |
Solving N-Queen Problem by Prediction
Pages : 3844-3848
Lijo V. P., Jasmin T. Jose
Abstract | PDF |
121. |
Investigating Contemporary Software Engineering
Challenges Involved in Integrating Disparate
Software Systems
Pages : 3849-3854
Nazeen Ansari, Dr. G.T. Thampi
Abstract | PDF |
122. |
Review on SMS Encryption using MNTRU
Algorithms on Android
Pages : 3855-3858
Shobha Jha, U. Dutta
Abstract | PDF |
123. |
A Survey on Compression of an Image Using
Wavelet Transform
Pages : 3859-3860
K. S. Solanki and Nitu Senani
Abstract | PDF |
124. |
Sky Computing: The Future of cloud computing
Pages : 3861-3864
Abha Tewari, Pooja Nagde, Aarti Sahitya
Abstract | PDF |
125. |
Evaluate Network Security and Measure
Performance of Self Healing in 5G
Pages : 3865-3870
Haripriya N , Sangeethalakshmi G
Abstract | PDF |
126. |
A Review on: Iris Recognition
Pages : 3871-3873
Sonia Sangwan, Reena Rani
Abstract | PDF |
127. |
A Survey on Text Filtering in Online Social
Networks
Pages : 3874-3876
Shilpa Radhakrishnan
Abstract | PDF |
128. |
A New Approach of Feature Extraction using
Genetic Algorithm and Scale-Invariant Feature
Transform
Pages :3877-3880
Meenu Sahu, Amit Saxena, Dr. Manish Manoria
Abstract | PDF |
129. |
Algorithms for Duty Cycle Control in Wireless
Sensor Networks- A Survey
Pages : 3881-3884
Jyothi T
Abstract | PDF |
130. |
Cloud Computing for Digital Libraries in
Universities
Pages : 3885-3889
Dev Ras Pandey, Gauri Shanker Kushwaha
Abstract | PDF |
131. |
EHUI: A Novel Algorithm for Mining High
Utility Itemsets
Pages : 3890-3892
Prashant V. Barhate, Prof. S. R. Chaudhari, Prof. P. C. Gill
Abstract | PDF |
132. |
Article Removed
Pages : xxx-xxx
xxx
Abstract | PDF |
133. |
Entire Gabor Subspace Approach for Expression
Recognition Using Locality Preserving Projection
Pages : 3897-3903
G.P.Hegde, M.Seetha, Nagaratna Hegde
Abstract | PDF |
134. |
An Enhancement of Images Using Recursive
Adaptive Gamma Correction
Pages : 3904-3909
Gagandeep Singh, Sarbjeet Singh
Abstract | PDF |
135. |
A Study On Blocking Fake Accounts In Online
Social Network
Pages : 3910-3913
T. Vidhya, Dr. R. Mala
Abstract | PDF |
136. |
Cloud Computing Paradigm and Current Trends
Pages : 3914-3918
N.Subha Malar, K.Vasantha Kokilam
Abstract | PDF |
137. |
Side Channel Security with Multiclouds
Pages : 3919-3921
S. M. Bansode
Abstract | PDF |
138. |
An Effective tool for Cloud based E-learning
Architecture
Pages : 3922-3924
Dr. N.Vanjulavalli, S.Arumugam, Dr.A.Kovalan
Abstract | PDF |
139. |
A Novel Approach for the Detection of Small Cell
Lung Cancer Based on Entropy and PSNR Value
Pages : 3925-3929
Georgy George, Nisha J.S
Abstract | PDF |
140. |
Odd-Even Message Bit Sequence Based Image
Steganography
Pages : 3930-3932
Sandeep Singh, Jaspreet Kaur
Abstract | PDF |
141. |
Visualizing Big Data Mining: Challenges,
Problems and Opportunities
Pages : 3933-3937
Rakesh Ranjan Kumar, Binita Kumari
Abstract | PDF |
142. |
Sleep Disorder Recognition using Wearable Sensor
and Raspberry Pi
Pages : 3938-3942
Vinay Kumar Chandna, Sagar Narang, Yash Bansal
Abstract | PDF |
143. |
Security Enhancement Technique for Defending
Wormhole Attacks in Wireless Mesh Networks
Pages : 3943-3948
Virendra Dani, Vijay Birchha
Abstract | PDF |
144. |
To Enhance A-KNN Clustering Algorithm for
Improving Software Architecture
Pages : 3949-3954
Ishu, Sandeep Singh
Abstract | PDF |
145. |
Study on Customer’s attitude towards Online
firms based on their Service Reputation
Pages : 3955-3960
Manjula Shanbhog, Mayank Singh, Shailendra Mishra
Abstract | PDF |
146. |
A Study on Incremental Association Rule Mining
Pages : 3961-3964
V.Umarani
Abstract | PDF |
147. |
Survey on Security Risks in Android OS and an
Introduction to Samsung KNOX
Pages : 3965-3967
Maya Krishnan
Abstract | PDF |
148. |
Frequency Partioning Based Image Fusion for
CCTV
Pages : 3968-3972
Veerpal Kaur, Jaspreet Kaur
Abstract | PDF |
149. |
Sketch Based Image Retrieval System for the Web
- A Survey
Pages : 3973-3979
Neetesh Prajapati, G.S.Prajapti
Abstract | PDF |
150. |
Comparative Analysis of Association Rule Mining
Algorithms Based on Performance Survey
Pages : 3980-3985
K.Vani
Abstract | PDF |
151. |
Search Based Face Annotation Using PCA and
Unsupervised Label Refinement Algorithms
Pages : 3986-3991
Shital Shinde, Archana Chaugule
Abstract | PDF |
152. |
A Proposed IP Multimedia Subsystem Security
Framework for Long Term Evaluation (LTE)
Networks
Pages : 3992-3998
Samah Osama M. Kamel, Adly S. Tag El Dein, Nadia H. Hegazi , Hala M.Abd El Kader , Hany M. Harb
Abstract | PDF |
153. |
Web Enabled Employee Performance System
Pages : 3999-4002
R.Shobana & K. P. Mani Anand
Abstract | PDF |
154. |
An Extension To Securedsms: A Protocol For Sms
Security
Pages : 4003-4005
Deepthi Sucheendran, Anju S, Arun. R
Abstract | PDF |
155. |
Optimal Replication Strategy Using Rough Set
Theory for Dynamic Content Replication
Pages : 4006-4009
Shruthi, Dr. Santosh L Deshpande
Abstract | PDF |
156. |
Achieving efficient Geographic routing via
Mobility based forwarding node selection schemes
in Mobile Sensor Network
Pages : 4010-4014
Akash Amathe, Dr. Santosh Deshapande
Abstract | PDF |
157. |
Optimization of Terminal Aerodrome Forecast
Pages : 4015-4016
Aditi Sharma, Dr. Mamta Bansal
Abstract | PDF |
158. |
Prevention Of Black Hole Attack Using Improvised
Watch Dog Through Data Accumulation
Pages : 4017-4019
K. R. Viswa Jhananie, Dr. C. Chandrasekar
Abstract | PDF |
159. |
Comparative Analysis of Flooding and Gossiping
in Wireless Sensor Networks Using SIR
Pages : 4020-4023
Mukta Chandna, Bhawna Singla
Abstract | PDF |
160. |
Finger Vein Recognition Using computational
Intelligence Techniques
Pages : 4024-4028
RamaPrabha R, Prof Dr. Vasantha Kalyani David
Abstract | PDF |
161. |
Web Mining: A Survey on Various Annotation
Techniques
Pages : 4029-4032
Avnish Rajput, Amit Saxena, Manish Manoria
Abstract | PDF |
162. |
Home Security Using Cloud Service
Pages : 4033-4036
Pradnya S. Gotmare, Anjali Chachra
Abstract | PDF |
163. |
Improvised Genetic Approach for an Effective
Resource Allocation in Cloud Infrastructure
Pages : 4037-4046
M. Durairaj, P. Kannan
Abstract | PDF |
164. |
A Survey on Visual Cryptography for Secret Data
Sharing
Pages : 4047-4053
M. Durairaj, V. Sutharson
Abstract | PDF |
165. |
An Empirical study on Emotional Influence of
Indian Classical Raag Yaman and Darbari on Face
Pages : 4054-4057
Aashish A.Bardekar
Abstract | PDF |
166. |
Analysis of Frequent Item set Mining of Electronic
Evidence using FP-Growth based on Map/Reduce
Pages : 4058-4061
Pranavkumar Bhadane, R.V.Patil
Abstract | PDF |
167. |
A Web Based Fuzzy Expert System for
Epistaxis Diagnosis
Pages : 4062-4068
Chanchal Sharma, Tejalal Choudhary
Abstract | PDF |
168. |
Finger Vein Image Enhancement Using RPL,
Segmentation with Neural Networks
Pages : 4069-4073
Arshdeep Kaur, Abhinav Mishra
Abstract | PDF |
169. |
Decentralized and Vigorous Unidentified
Validation Access Control System
Pages : 4074-4077
G.Anusha, R.Sathiyaraj
Abstract | PDF |
170. |
Association Rule Mining for Accident Record
Data in Mines
Pages : 4078-4085
Amber Hayat, Khustar Ansari, Praveen
Abstract | PDF |
171. |
Supporting Privacy Protection In Personalized
Web Searching and Browsing
Pages : 4086-4093
Manali Wadnerkar, Dr. R. R. Ingle
Abstract | PDF |
172. |
A Survey: Query Optimization
Pages : 4094-4095
Vishal Sharma, Mr. Lovenish Sharma
Abstract | PDF |
173. |
XML Based Non Redundant Distributed Question
Bank Generation
Pages : 4096-4101
V.D.V.Naga Lakshmi,CH.Anupama, D.Haritha
Abstract | PDF |
174. |
Techniques to Alleviate Sybil Attack and Security
Issues in Wireless Sensor Network
Pages :4102-4105
Sandeep Sindhu, Dr.Suman Sangwan
Abstract | PDF |
175. |
Countermeasures against Timing Attack on AES
Pages :4106-4109
Advait Kelapure, M. M. Chandane
Abstract | PDF |
176. |
Privacy and Security Issues in Cloud
Pages : 4110-4117
Shiv Shankar Barai, Sridhar Mocherla
Abstract | PDF |
177. |
A Secure Ad hoc Wireless Sensor Network For
Vampire Attack
Pages :4118-4122
Deepmala Verma, Gajendra Singh, Kailash Patidar
Abstract | PDF |
178. |
Intrusion Detection and Prevention in
Homogenous Wireless Sensor Networks
Pages : 4123-4127
Vanita B. Raut
Abstract | PDF |
179. |
Load Balancing of Virtual Machine Using Honey
Bee Galvanizing Algorithm in Cloud
Pages : 4128-4132
Monika Rathore, Sarvesh Rai, Navdeep Saluja
Abstract | PDF |
180. |
Review on: Providing Arithmetic Operations on
RSA using Homomorphic Technique
Pages : 4133-4135
Shiwali, Namita kakkar
Abstract | PDF |
181. |
Reliable Data Tier Architecture for Job Portal
using AWS
Pages : 4136-4140
Manoj Prakash Thalagatti, Chaitra B, Mohammed Asrar Naveed
Abstract | PDF |
182. |
A Big Data Mining – A Review
Pages : 4141-4144
N.Kumar, Dr.T.Christopher
Abstract | PDF |
183. |
Comparative study of various Image De-noising
Techniques
Pages : 4145-4147
Karthik, Kamalakshi Naganna
Abstract | PDF |
184. |
A Survey on Mining and Statistical Analysis of
Social Website Data using Syntatic Analysis and
Hybrid Classification
Pages :4148-4150
Niranjan C Kundur, Rohitaksha K, Sreenatha M, Abhilash C B
Abstract | PDF |
185. |
Security Enhancements for Finger Print Templates
on Minutiae
Pages :4151-4153
Dr G.VenkataRamiReddy, Vidyasree.P
Abstract | PDF |