1. |
Removal of Hair Particles from Skin Disease
Images Using Pixel Based Approach
Pages : 4154-4158
Dr. Poulami Das, Ms. Mayurika Gangopadhyay
Abstract | PDF |
2. |
Predictive Music Shuffling Algorithm
Pages :4159-4162
Prateek Singh, Aditya Batheja, Abhijit Chowdhury
Abstract | PDF |
3. |
Effective Searching of Annotations in Web for
Composite Text using SVM
Pages : 4163-4167
Pallavi Dutta, Amit Saxena, Dr. Manish Manoria
Abstract | PDF |
4. |
Average Half Face Feature Detection – An
Implementation of Viola Jones
Pages : 4168-4170
Sourabh Arora, Shikha Chawla
Abstract | PDF |
5. |
A Brief Study on Defining Templates to Avoid
XSS Vulnerabilities Using Auto Escape Templates
for Web Applications
Pages : 4171-4173
Ch Rajesh, K S V K Srikanth, I S L Sarwani, G Sankara Rao
Abstract | PDF |
6. |
Privacy Preserving Data Mining Using
Sanitizing Algorithm
Pages : 4174-4179
R.Hemalatha, M.Elamparithi
Abstract | PDF |
7. |
Detection and Localization of Heart Sound Using
Adaptive Learning Technique
Pages : 4180-4185
Sarbjit kaur, Jatinder Kaur
Abstract | PDF |
8. |
Environment Independent Speech Recognition System
using MFCC (Mel-frequency cepstral coefficient)
Pages :4186-4190
Kamalpreet kaur, Jatinder Kaur
Abstract | PDF |
9. |
A Study on the Use of Concept Maps in Web
Based Learning
Pages : 4191-4200
Anal Acharya, Devadatta Sinha
Abstract | PDF |
10. |
Secure Data Retrieval Using CP-ABE for
Decentralized Disruption Tolerant Military
Networks
Pages : 4201-4205
C. Rajeshwar Reddy, N.V. Sailaja
Abstract | PDF |
11. |
An Analysis of Multipliers in a New Binary
System
Pages : 4206-4211
R.K. Dubey & Anamika Pathak
Abstract | PDF |
12. |
Cloud Adoption Model in Logistics Solutions:
Selection Module
Pages : 4212-4215
Shivani Dubey and Sunayana Jain
Abstract | PDF |
13. |
Securing Node Communication in MANET using
Certificate Revocation
Pages : 4216-4219
D. Vikram Raj Reddy, M. Gangappa
Abstract | PDF |
14. |
Designing a Framework for Web Testing using Object-oriented Testing Approach
Pages :4220-4227
Nimish Kumar, Reena Dadhich, Aditya Shastri
Abstract | PDF |
15. |
Query Optimization Strategies in Distributed
Databases
Pages : 4228-4234
Shyam Padia, Sushant Khulge, Akhilesh Gupta, Parth Khadilikar
Abstract | PDF |
16. |
Improving the Test Quality of Safety Critical
Software by using Combined KPSO Mutation
Method
Pages : 4235-4240
Dr.S.Preetha, Gangarajam
Abstract | PDF |
17. |
Detecting Cross-Project Clones Using Frequent
Pattern Mining
Pages : 4241-4244
Ronica Raj , Vishakha Vinod
Abstract | PDF |
18. |
A Bi-level Security Mechanism with Encryption
and User Authentication through Hardware Token
for Cloud Computing Based Web Application
Pages : 4245-4247
Shrinivas Kathale, Shraddha Phansalkar
Abstract | PDF |
19. |
A Novel Approach to Design Confidentiality
Encryption Algorithm
Pages : 4248-4250
Shalinee Singh Baghel, Amit Saxen, Manish Manoria
Abstract | PDF |
20. |
Higher Order-Nonlinearities on Two Classes of
Boolean Functions
Pages :4251-4256
Manish Garg
Abstract | PDF |
21. |
A Novel approach for Novelty Detection of Web
Documents
Pages : 4257-4262
Manvi Breja
Abstract | PDF |
22. |
Finding Bug by using Data Reduced Techniques
Pages : 4263-4265
Amruta Gadekar, Pranjali Taralkar, Nikita Waghmare, Rahul Dapke
Abstract | PDF |
23. |
E-mail Spam Filtering Using Genetic Algorithm:
A Deeper Analysis
Pages : 4266-4270
Mandeep Chowdhary , V. S. Dhaka
Abstract | PDF |
24. |
Topology Control and Hop-by-hop Authentication
in MANETs with Cooperative Communications
Pages : 4271-4278
Srichandradeep. C, Dr. B. Raveendra Babu
Abstract | PDF |
25. |
A Neural Network Based Efficient Technique for
Handwritten Digit Recognition System
Pages : 4279-4280
Pooja Agrawal, Dr. Anand Rajavat
Abstract | PDF |
26. |
Generation of N-party Man-In-Middle Attack for
Diffie–Hellman Key Exchange Protocol: A Review
Pages : 4281-4285
Sulochana Devi, Ritu Makani
Abstract | PDF |
27. |
Fault Tolerant Instantaneous Utilization Factor
Schedulability of Real Time Tasks
Pages : 4286-4291
Kshama Kulkarni, Radhakrishna Naik, Vaishali Shinde
Abstract | PDF |
28. |
Dynamic Query Evaluation using Proximity
Ranking
Pages : 4292-4295
K. Padmaja, B. Prashant
Abstract | PDF |
29. |
Automatic Speech Recognition of Marathi isolated
words using Neural Network
Pages : 4296-4298
Kishori R. Ghule, Ratnadeep R. Deshmukh
Abstract | PDF |
30. |
A Novel 4X4 LSB Pixel Substitution Approach for
Image Steganography
Pages : 4299-4303
Venkata Giriprasad Ronanki, K Kavitha
Abstract | PDF |
31. |
Knowledge Representation using Fuzzy
Ontologies – A Review
Pages : 4304-4308
Nilavu Devadoss, Sivakumar Ramakrishnan
Abstract | PDF |
32. |
A Personalized Recommendation on the Basis of
Item Based Algorithm
Pages : 4309-4312
Kishori R. Ghule, Ratnadeep R. Deshmukh
Abstract | PDF |
33. |
Detecting Malfunctioning Nodes in Mobile Ad hoc
Networks by using EAACK
Pages : 4313-4317
Dilip Kumar Thumu, R.Vasavi, A. Kousar Nikhath
Abstract | PDF |
34. |
Effective Resource Management for Virtualized
Data centers
Pages : 4318-4320
G.Ramakrishna, Dr.A.Mallareddy
Abstract | PDF |
35. |
Approaches of Information and Communication
Technologies (ICT) for Building Smart Cities
– A Review
Pages : 4321-4326
S. Navitha
Abstract | PDF |
36. |
Content Base Image Retrieval using Combination
of Colour, Shape and Texture Features: A Meta-
Analysis
Pages : 4327-4330
Bhagyashri Amrutka, Lokesh Singh
Abstract | PDF |
37. |
Social Interaction and Self-Organizing Map
Pages : 4331-4338
Arijit Jha
Abstract | PDF |
38. |
A Visual Cryptographic Scheme To Secure Image
Shares Using Digital Watermarking
Pages : 4339-4343
Malvika Gupta, Deepti Chauhan
Abstract | PDF |
39. |
Network Management for New Era
Pages : 4344-4349
Dr. R. Prabakaran, J.Palanivel
Abstract | PDF |
40. |
Enhancing the Privacy and Implementation of Access Control Mechanism by Anonymization
Pages : 4350-4352
Barkha Kasab, Prof. Vinayak Pottigar, Prof. Swapnaja Ubale
Abstract | PDF |
41. |
Customizing Moodle to Facilitate Integration with Other Platforms
Pages : 4353-4356
Madhupriya R
Abstract | PDF |
42. |
Dynamic Resource Scheduling In Cloud Computing Using Genetic Algorithm: A Survey
Pages : 4357-4360
Manjunatha Swamy C, Anil Kumar B H, Kiran B
Abstract | PDF |
43. |
Battery Optimization of Android OS
Pages : 4361-4363
Alex Chirayath, Alfred Gonsalves, Chinmayi Kulkarni, Mahendra Mehra
Abstract | PDF |
44. |
Clustering Amelioration and Optimization with
Swarm Intelligence for Color Image Segmentation
Pages : 4364-4370
Kiranpreet, Prince Verma
Abstract | PDF |
45. |
Lung Cancer Survival Modelling using AdaptiveNeuro-fuzzy Inference System
Pages : 4371-4374
Plachikkad.A. Rehana Bhadhrika, Sri Kunjam Nageswara Rao
Abstract | PDF |
46. |
Artificial Neural Network Based Decision on Parameter Values in AODV to Enhance the Performance of Mobile Ad Hoc Networks
Pages : 4375-4377
K.Narasimha Raju, Dr.S.P.Setty
Abstract | PDF |
47. |
A Survey of Cloud Based Mobile Secure Data Storage Application
Pages : 4378-4380
Swati Sharma, Ravindra Sharma
Abstract | PDF |
48. |
Cotton Crop Discrimination Using Landsat-8 Data
Pages : 4381-4384
Sandip A. Kharat, Vijaya B. Musande
Abstract | PDF |
49. |
Prediction of Psychological Disorder using ANN
Pages : 4385-4389
Purva D. Kekatpure, Prof. Rekha S. Sugandhi
Abstract | PDF |
50. |
Real-Time Health Monitoring System for Remote Places
Pages : 4390-4391
Nithi Pillai,Madhura Kakade,Shreyas Bhimale,Mahesh Bagde
Abstract | PDF |
51. |
Automated Intelligent Surveillance using Human Behavior Analysis in Shopping Malls
Pages : 4392-4396
P.kamala, Ranjini RS, Manjula.P
Abstract | PDF |
52. |
Detecting Attacks in Wireless Sensor Network through Bloom Filtering
Pages : 4397-4399
Rupali Adhau, Ashwini Ambekar, Abhishek Drakshe, Rajat Thorave
Abstract | PDF |
53. |
Exploring the Power of Cloud Computing Over Grid Computing
Pages : 4400-4403
Anil Barnwal, Satyakam Pugla, Rajesh Jangade
Abstract | PDF |
54. |
Detection and Prevention of Black Hole Attack with Modified DRI Table in Mobile Network
Pages : 4404-4408
Aakanksha Choubey, Neelam Peters
Abstract | PDF |
55. |
String Transformation Using Top K Pruning Algorithm
Pages : 4409-4411
Swapnali S. Maske, Prashant Jawalkar
Abstract | PDF |
56. |
From Moore’s Law to Amdahl’s Law: The Pursuitof Computer Performance
Pages : 4412-4416
Chakib Chraibi
Abstract | PDF |
57. |
Efficient Flooding using Zonal Concept of LAR Protocol on AODV in MANETs
Pages : 4417-4420
Vishal Gupta, Dr. Rajneesh Gujral
Abstract | PDF |
58. |
Performance And Result Analysis Of Hybrid Adaptive Random Partition Testing For Improved Bug Detection and Test Coverage
Pages : 4421-4428
Reetika Patidar,Mahesh Malviya
Abstract | PDF |
59. |
Anomaly Detection in Network using Genetic Algorithm and Support Vector Machine
Pages : 4429-4433
Prashansa Chouhan and Dr.Vineet Richhariya
Abstract | PDF |
60. |
Security on Cloud Using Mass Storage Device for Authentication
Pages : 4434-4437
SnehaNaik, Pranay Chauhan
Abstract | PDF |
61. |
A Review on Cloud Server Optimization Using Orthogonal Recursive Bisection Technique for Cloud Migration
Pages : 4438-4439
Kamalpreet Kaur and Vanita Rani
Abstract | PDF |
62. |
Application of Educational Data mining techniques in e-Learning- A Case Study
Pages : 4440-4443
S. Lakshmi Prabha Dr.A.R.Mohamed Shanavas
Abstract | PDF |
63. |
Ternary Based Web Crawler For Optimized Search Results
Pages : 4444-4449
Abhilasha Bhagat, Vanita Raut
Abstract | PDF |
64. |
Comprehensive Analysis of Dynamic Routing
Protocols in Computer Networks
Pages : 4450-4455
Priya Asher
Abstract | PDF |
65. |
Analysis on Employment of Wireless Sensor Networks
Pages : 4456-4458
Sundar Kumar. S, Bharathi. B
Abstract | PDF |
66. |
Comparative Study of Subspace Clustering Algorithms
Pages : 4459-4464
S.Chitra Nayagam
Abstract | PDF |
67. |
Texture Synthesis – A Comparative Study
Pages : 4465-4468
Aarthi.K
Abstract | PDF |
68. |
ATM Card and Safety Chip: Embedded in Human
Preventing ATM from Hackers and Frauds
Pages : 4469-4474
Deepa Malviya
Abstract | PDF |
69. |
Mining Annotated Search Results From Web
Databases
Pages : 4475-4478
Thushara K P, Varsha Philip
Abstract | PDF |
70. |
Secure Multi-Cloud data sharing using Key Aggregate Cryptosystem for scalable data sharing
Pages : 4479-4482
Suhas Bachhav, Chetan Chaudhari, Nikhilesh Shinde, Poonam Kaloge
Abstract | PDF |
71. |
OCMM Based clustering in Research as well as
Reviewers & Optimal Allocation of Proposals to Experts by Ontology Matching
Pages : 4483-4489
T.Sahaya Arthi Jeno, D.Jim Solomon Raja
Abstract | PDF |
72. |
A Novel Secured Data Exchange Mechanism For sensor nodes used in military networks using minimal keys
Pages : 4490-4495
TEEDA ANITHA, P.S.L.SRAVANI
Abstract | PDF |
73. |
An Efficient Schema Free Keyword Search Approach Over Linked Data using Lucene
Indexing Algorithm
Pages : 4496-4500
Tejashree R. Shinde, Sanchika A. Bajpai
Abstract | PDF |
74. |
Performance Analysis of Reactive and Hybrid Routing Protocols in Ad Hoc Networks
Pages : 4501-4506
Pooja Mangla, Rajneesh Gujral, Manpreet Singh
Abstract | PDF |
75. |
Providing Authentication by Using Biometric Multimodal Framework for Cloud Computing
Pages : 4507-4511
R. Parimala, C. Jayakumar
Abstract | PDF |
76. |
Fusion of CT and MRI Images Based on Fuzzy Logic and Discrete Wavelet Transform
Pages : 4512-4519
Myna A N, J Prakash
Abstract | PDF |
77. |
Integrated Particle Swarm Optimization and Genetic Algorithm Based Compression for
Reduction of Blocking Artifacts
Pages : 4520-4527
Prabhjeet kaur, Parminder Singh
Abstract | PDF |
78. |
Interpretation of Tamil Script using Optical Character Recognition in Android
Pages : 4528-4530
Arun Srivatsa.R , Shriya.P , Adithya Srinivasan
Abstract | PDF |
79. |
Implementation of Classification Algorithms to Predict Mode of Delivery
Pages : 4531-4534
Alisha Kamat, Veenal Oswal, Manalee Datar
Abstract | PDF |
80. |
An Admirable Client-Side Result Evaluation of Location Queries
Pages : 4535-4537
J.Munikishore Reddy, M.Kirankumar
Abstract | PDF |
81. |
Efficient Discovery of Community and Enhanced Privacy Technique in Multidimensional Network
Pages : 4538-4541
G.Soundarya, M.Kirankumar
Abstract | PDF |
82. |
E-Government: Study of Factors significantly affects Adoption and Acceptance in State of Punjab
Pages : 4542-4548
Prof. Manjot Kaur, Dr. Amitoj Singh
Abstract | PDF |
83. |
Finger Vein Enhancement Using Segmentation and SVM
Pages : 4549-4554
Kirandeep Kaur, Shashi Bhushan
Abstract | PDF |
84. |
A Survey on Automation System by Enabling Wireless Devices and Sensors
Pages : 4555-4558
Akshay Jaitpal, Pavan Kodihal, Pratik Gothiwadekar, Sharmila A.Chopade
Abstract | PDF |
85. |
An Analysis of Robust Exemplar-Based Inpainting Algorithm Using Region Segmentation and Block Computation
Pages : 4559-4562
Yogesh Laxman Tonape, Vinayak Pottigar, Swapnaja Ubale
Abstract | PDF |
86. |
RTSP Based Video Surveillance System Using IP
Camera for Human Detection in OpenCV
Pages : 4563-4567
K. Bapayya, K. Sujitha,SD. Akthar Basha
Abstract | PDF |
87. |
Security and Privacy Issues in Trusted Cloud Computing Secure Architecture
Pages : 4568-4570
Shalini Agarwal , Arun Singh Chouhan
Abstract | PDF |
88. |
Firewall Design Techniques and its Development in Linux System
Pages : 4571-4574
Vinit A. Sinha
Abstract | PDF |
89. |
A Novel Secured Data Exchange Mechanism by using Captcha images
Pages : 4575-4581
BODDAPU SUNITHA, SHALINI BHARIDE
Abstract | PDF |
90. |
Performance Analysis Of Ontology Processing System Using Information Filter and Knowledge Repository for Semantic Web
Pages : 4582-4586
Sudha J Vishwakarma
Abstract | PDF |
91. |
A Survey of various routing protocols in MANETs
Pages : 4587-4592
Rajesh Yadav, Dr. Srinivasa Rao
Abstract | PDF |
92. |
Data Recovery in Cloud Environment Using Seed Block Algorithm
Pages : 4593-4598
Vedashree N, Praveen Kumar KC, Anilkumar G
Abstract | PDF |
93. |
Survey of Quality of Services to Improved Performance of Routing in MANET
Pages : 4599-4604
Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Raju Sujane, Manish Taram
Abstract | PDF |
94. |
Article Removed
Pages : 4605-4610
xxx,xxx
Abstract | PDF |
95. |
A Survey on Software Data Reduction Techniques for Effective Bug Triage
Pages : 4611-4612
Ashwini Jadhav, Komal Jadhav, Anuja Bhalerao, Amol Kharade
Abstract | PDF |
96. |
A Survey on Intrusion Detection in MANET through AODV
Pages : 4613-4615
Divya Patidar, Jigyasu Dubey
Abstract | PDF |
97. |
Biometric System- A Review
Pages : 4616-4619
Abhilash Kumar Sharma, Ashish Raghuwanshi, Vijay Kumar Sharma
Abstract | PDF |
98. |
VM Consolidation Technique for Green Cloud Computing
Pages : 4620-4624
Priyanka Nema, Sapna Choudhary, Tripti Nema
Abstract | PDF |
99. |
An Effective Method for Detecting Double JPEG Image by Using an Effective Classifier -Review
Pages : 4625-4628
Athira Abraham, Muhammed Nizar B K
Abstract | PDF |
100. |
Applications of Big data in Various Fields
Pages : 4629-4632
Kuchipudi Sravanthi, Tatireddy Subba Reddy
Abstract | PDF |
101. |
Big Data: Technologies, Trends and Applications
Pages : 4633-4639
Sudhakar Singh, Pankaj Singh, Rakhi Garg, P K Mishra
Abstract | PDF |
102. |
A Comprehensive Study on Mobile Cloud Computing (MCC) & It’s Internals
Pages : 4640-4645
Saania Sayed, Jovi D’Silva
Abstract | PDF |
103. |
Video Steganography by Intermediate Significant Bitplanes
Pages : 4646-4650
Praneetha S.R
Abstract | PDF |
104. |
A New owner ship Control System on germination of Data Stored in Cloud
Pages : 4651-4654
B.Trinadh, M.Kalyan Ram
Abstract | PDF |
105. |
SMS Encryption
Pages : 4655-4659
Rashmi P. Sarode, Neeraj Manglani
Abstract | PDF |
106. |
New Approach of Scheduling Algorithms in Linux Operating System with Goodness Function
Pages : 4660-4662
G.Keerthi, R.China Appala Naidu
Abstract | PDF |
107. |
A Survey of Data Mining Applications and Techniques
Pages : 4663-4666
Samiddha Mukherjee, Ravi Shaw, Nilanjan Haldar, Satyasaran Changdar
Abstract | PDF |
108. |
Data Mining: The Massive Data Set
Pages : 4667-4671
Saurabh Patodi, Mini Jain, Teena Negi
Abstract | PDF |
109. |
Factors Effecting the Usage of Public Transport Multinomial Logit Model
Pages : 4672-4675
B.RAJASEKHAR REDDY, CH.DEEPIKA, G.NAVYA, G.RAJA
Abstract | PDF |
110. |
Implementation of Energy-Efficient Resource Allocation for OFDM-Based Cognitive Radio Networks
Pages : 4676-4681
Anna Kumar.G, Kishore Kumar.M, Anjani Suputri Devi.D
Abstract | PDF |
111. |
A Hierarchical Tree Based Online Web Portal
Pages : 4682-4684
Pooja Sabnani, Vivek Bajpai
Abstract | PDF |
112. |
A Competent Target Tracking Procedure in Wireless Sensor Networks
Pages : 4685-4688
Sagarika Sethy, Chinmaya Kumar Nayak, Manoranjan Pradhan, Satyabrata Das
Abstract | PDF |
113. |
Virtual Subjective Examination on Tablets
Pages : 4689-4691
Namrata Parekh, Kalpesh Dusane,Shivam Thakur, Amoli Sonawane
Abstract | PDF |
114. |
Article Removed
Pages : xxx-xxx
xxx,xxx
Abstract | PDF |
115. |
Analysis the impact of E-governance Services in Rural Areas of Mansa District-Punjab
Pages : 4696-4698
Resham Dhillon, Dr Vijay Laxmi
Abstract | PDF |
116. |
TD-ZRP: Trigger Driven Zero Remnance Proof Technique for Self Data Removal in Web Services
Pages : 4699-4704
Pooja Bhavsar, Rakesh kumar Lodhi
Abstract | PDF |
117. |
Localization of SMS on Mobile Phones
Pages : 4705-4708
Kavita Agrawal, Arvind Kumar Chaubey, V.M.Ruth
Abstract | PDF |
118. |
Supporting privacy Preserved in personalized web
search Engine
Pages : 4709-4711
Mahesh Holkar, Kunal Patil, Khemraj Kakade, Ajay Pakhale
Abstract | PDF |
119. |
Secure and Fast Adaptive Mobile Video Streaming and Sharing in Wireless Mobile Network
Pages : 4712-4717
Nisha Bhaskar Patil, Amol D. Potgantwar
Abstract | PDF |
120. |
Improving Model Based Testing Using Event
Consideration For Various Designs Concepts
Pages : 4718-4723
Nidhi Pare, Prof. Piyush Soni
Abstract | PDF |
121. |
MulticastOpportunisticRoutingProtocol “TOMR”
Based on Trust and Link Quality Matrix for
Wireless Networks
Pages : 4724-4729
Sanafarin Salim Mulla, J.A.Shaikh
Abstract | PDF |
122. |
JPEG Steganography based on uniform embedding
and Syndrome trellis codes
Pages : 4730-4735
Aasemuddin Quazi, Prof. A.K. Gulve
Abstract | PDF |
123. |
An Approach for Hybrid Cluster Based Feature Selection on High Dimensional Data
Pages : 4736-4739
P. Ramasita, S. Rama Sree
Abstract | PDF |
124. |
Parallel Implementation of Fuzzy Clustering Algorithm Based on MapReduce Computing Model
of Hadoop –A Detailed Survey
Pages : 4740-4744
Jerril Mathson Mathew, Lekshmy P Chandran
Abstract | PDF |
125. |
Enhancing the Capacity of Steganography Using
Reversible Texture Synthesis with Edge Adaptive
and Tree-Based Parity Check (TBPC) Methods
-A Detailed Survey
Pages : 4745-4747
Reenu Mariam Cherian, Sanoj R
Abstract | PDF |
126. |
Enhancing the Performance of AODV in MANETs using Fuzzy logic
Pages : 4748-4750
V.V.S.Prasanthi, Dr.S.Pallam Setty
Abstract | PDF |
127. |
Enhanced Adaptive Weighted Mean Filter With Non-Local Means To Denoise Image Corrupted By Salt And Pepper Noise
Pages : 4751-4752
Sukina K, Reshna T
Abstract | PDF |
128. |
Code Optimization using Code Purifier
Pages : 4753-4757
Neeta Malviya, Dr. Ajay Khunteta
Abstract | PDF |
129. |
Learning Liveness Detection and Classification of Iris Images: A Detailed Survey
Pages : 4758-4761
John Joy, Rekha K S
Abstract | PDF |
130. |
Embedding Audio Message in Images Using Integer Wavelet Transform-A Detailed Survey
Pages : 4762-4764
Julie Antony K, Sanoj R
Abstract | PDF |
131. |
An Analysis on Web Usage Mining For Internet Users
Pages : 4765-4767
Priyanka Sharma, Sumayya Khan, Shilpa Singh,Pooja Tiwari
Abstract | PDF |
132. |
Time Efficient Neighbor Discovery Protocol for
Wireless Sensor Networks with Multipacket
Reception
Pages : 4768-4769
S.Arun Showry , K.Surendra
Abstract | PDF |
133. |
A Survey for detecting Acute Lymphoblastic
Leukaemia using Image Processing Techniques
Pages : 4770-4773
K.Dhana Shree, M.Saranya, G.Poorani, Dr.A.Grace Selvarani
Abstract | PDF |
134. |
Integrated Color Image Fusion Using Joint Trilateral Filter and IBLPCA
Pages : 4774-4781
Pavneet Kaur, Er. Rajesh Sharma
Abstract | PDF |
135. |
Graduate Prediction Using Ontology Approach
Pages : 4782-4784
Tirth Mehta, Tanmay Kshirsagar, Azeem Merchant, Professor Sindhu Nair
Abstract | PDF |
136. |
Use of ID3 Decision Tree Algorithm for Placement Prediction
Pages : 4785-4789
Hitarthi Bhatt, Shraddha Mehta, Lynette R. D'mello
Abstract | PDF |
137. |
Bridging the Semantic Gap
Pages : 4790-4794
Tanveer J. Siddiqui
Abstract | PDF |
138. |
Filtering and Classification Of User Based On
Social Media Data Using Memetic and Naive
Bayes Methods
Pages : 4795-4798
Gauri Joshi, Samadhan Sonawane
Abstract | PDF |
139. |
Application of Deep Belief Networks for Image Compression
Pages : 4799-4803
Venkatesh Lokare, Saurabh Birari, Omkar Patil
Abstract | PDF |
140. |
An Efficient Frequent Pattern Mining using Boolean
Matrix and Transaction Reduction Technique
Pages : 4804-4806
S.Tejaswi, D.Suresh Kumar, Ch.Sita Kameswari
Abstract | PDF |
141. |
An Efficient Data Sharing in Public Cloud using
two way Authentication & Encryption
Pages : 4807-4811
Roshni Sharma, Amit Saxena, Dr. Manish Manoria
Abstract | PDF |
142. |
Security Enhanced Adaptive Acknowledgment Intrusion Detection System
Pages : 4812-4817
Pawar Priyanka, Hashmi S.A.
Abstract | PDF |
143. |
MapReduce Based Frequent Itemset Mining for Improved Electronic Evidence Analysis Using
Palm-Print
Pages : 4818-4821
Mayuresh Sonawane, Navnath Borade, Manoj Jadhav, Vikas Mandal, Prof. A. S. Chandgude
Abstract | PDF |
144. |
Survey on Content Based Image Retrieval Techniques
Pages : 4822-4824
Lalit Agrowal, Prof. Anil Patidar
Abstract | PDF |
145. |
Comparative Analysis of Various Classifiers for
Performance Improvement in Intrusion Detection
System by Reducing the False Positives
Pages : 4825-4828
Vivek P.Kshirsagar, Dr.Madhuri Joshi
Abstract | PDF |
146. |
Comparative Analysis of Classifiers for Brain Tumour Detection Using Metabolites from
Magnetic Resonance Spectroscopy Graph
Pages : 4829-4832
Meghana Nagori, Dr. Madhuri Joshi
Abstract | PDF |
147. |
Analysis of MFCC & Multitaper MFCC Feature Extraction for Speaker Verification
Pages : 4833-4836
Rupali G Shintri, Asst.Prof S.K.Bhatia
Abstract | PDF |
148. |
Comparison of Different Web Personalization
Mechanisms
Pages : 4837-4839
Enam Shah, Hitarth Shah, Khushali Deulkar
Abstract | PDF |
149. |
Providing Arithmetic Operations on RSA Using
Homomorphic Technique
Pages : 4840-4846
Shiwali, Namita kakkar
Abstract | PDF |
150. |
The Forensic Process Analysis of Mobile Device
Pages : 4847-4850
Dasari Manendra Sai, Nandagiri R G K Prasad, Satish Dekka
Abstract | PDF |
|
|