• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 5 September - October 2015

    ISSN 0975 - 9646

    1. Removal of Hair Particles from Skin Disease Images Using Pixel Based Approach
    Pages : 4154-4158
    Dr. Poulami Das, Ms. Mayurika Gangopadhyay
    Abstract | PDFPDF
    2. Predictive Music Shuffling Algorithm
    Pages :4159-4162
    Prateek Singh, Aditya Batheja, Abhijit Chowdhury
    Abstract | PDFPDF
    3. Effective Searching of Annotations in Web for Composite Text using SVM
    Pages : 4163-4167
    Pallavi Dutta, Amit Saxena, Dr. Manish Manoria
    Abstract | PDFPDF
    4. Average Half Face Feature Detection – An Implementation of Viola Jones
    Pages : 4168-4170
    Sourabh Arora, Shikha Chawla
    Abstract | PDFPDF
    5. A Brief Study on Defining Templates to Avoid XSS Vulnerabilities Using Auto Escape Templates
    for Web Applications

    Pages : 4171-4173
    Ch Rajesh, K S V K Srikanth, I S L Sarwani, G Sankara Rao
    Abstract | PDFPDF
    6. Privacy Preserving Data Mining Using Sanitizing Algorithm
    Pages : 4174-4179
    R.Hemalatha, M.Elamparithi
    Abstract | PDFPDF
    7. Detection and Localization of Heart Sound Using Adaptive Learning Technique
    Pages : 4180-4185
    Sarbjit kaur, Jatinder Kaur
    Abstract | PDFPDF
    8. Environment Independent Speech Recognition System using MFCC (Mel-frequency cepstral coefficient)
    Pages :4186-4190
    Kamalpreet kaur, Jatinder Kaur
    Abstract | PDFPDF
    9. A Study on the Use of Concept Maps in Web Based Learning
    Pages : 4191-4200
    Anal Acharya, Devadatta Sinha
    Abstract | PDFPDF
    10. Secure Data Retrieval Using CP-ABE for Decentralized Disruption Tolerant Military Networks
    Pages : 4201-4205
    C. Rajeshwar Reddy, N.V. Sailaja
    Abstract | PDFPDF
    11. An Analysis of Multipliers in a New Binary System
    Pages : 4206-4211
    R.K. Dubey & Anamika Pathak
    Abstract | PDFPDF
    12. Cloud Adoption Model in Logistics Solutions: Selection Module
    Pages : 4212-4215
    Shivani Dubey and Sunayana Jain
    Abstract | PDFPDF
    13. Securing Node Communication in MANET using Certificate Revocation
    Pages : 4216-4219
    D. Vikram Raj Reddy, M. Gangappa
    Abstract | PDFPDF
    14. Designing a Framework for Web Testing using Object-oriented Testing Approach
    Pages :4220-4227
    Nimish Kumar, Reena Dadhich, Aditya Shastri
    Abstract | PDFPDF
    15. Query Optimization Strategies in Distributed Databases
    Pages : 4228-4234
    Shyam Padia, Sushant Khulge, Akhilesh Gupta, Parth Khadilikar
    Abstract | PDFPDF
    16. Improving the Test Quality of Safety Critical Software by using Combined KPSO Mutation Method
    Pages : 4235-4240
    Dr.S.Preetha, Gangarajam
    Abstract | PDFPDF
    17. Detecting Cross-Project Clones Using Frequent Pattern Mining
    Pages : 4241-4244
    Ronica Raj , Vishakha Vinod
    Abstract | PDFPDF
    18. A Bi-level Security Mechanism with Encryption and User Authentication through Hardware Token
    for Cloud Computing Based Web Application

    Pages : 4245-4247
    Shrinivas Kathale, Shraddha Phansalkar
    Abstract | PDFPDF
    19. A Novel Approach to Design Confidentiality Encryption Algorithm
    Pages : 4248-4250
    Shalinee Singh Baghel, Amit Saxen, Manish Manoria
    Abstract | PDFPDF
    20. Higher Order-Nonlinearities on Two Classes of Boolean Functions
    Pages :4251-4256
    Manish Garg
    Abstract | PDFPDF
    21. A Novel approach for Novelty Detection of Web Documents
    Pages : 4257-4262
    Manvi Breja
    Abstract | PDFPDF
    22. Finding Bug by using Data Reduced Techniques
    Pages : 4263-4265
    Amruta Gadekar, Pranjali Taralkar, Nikita Waghmare, Rahul Dapke
    Abstract | PDFPDF
    23. E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis
    Pages : 4266-4270
    Mandeep Chowdhary , V. S. Dhaka
    Abstract | PDFPDF
    24. Topology Control and Hop-by-hop Authentication in MANETs with Cooperative Communications
    Pages : 4271-4278
    Srichandradeep. C, Dr. B. Raveendra Babu
    Abstract | PDFPDF
    25. A Neural Network Based Efficient Technique for Handwritten Digit Recognition System
    Pages : 4279-4280
    Pooja Agrawal, Dr. Anand Rajavat
    Abstract | PDFPDF
    26. Generation of N-party Man-In-Middle Attack for Diffie–Hellman Key Exchange Protocol: A Review
    Pages : 4281-4285
    Sulochana Devi, Ritu Makani
    Abstract | PDFPDF
    27. Fault Tolerant Instantaneous Utilization Factor Schedulability of Real Time Tasks
    Pages : 4286-4291
    Kshama Kulkarni, Radhakrishna Naik, Vaishali Shinde
    Abstract | PDFPDF
    28. Dynamic Query Evaluation using Proximity Ranking
    Pages : 4292-4295
    K. Padmaja, B. Prashant
    Abstract | PDFPDF
    29. Automatic Speech Recognition of Marathi isolated words using Neural Network
    Pages : 4296-4298
    Kishori R. Ghule, Ratnadeep R. Deshmukh
    Abstract | PDFPDF
    30. A Novel 4X4 LSB Pixel Substitution Approach for Image Steganography
    Pages : 4299-4303
    Venkata Giriprasad Ronanki, K Kavitha
    Abstract | PDFPDF
    31. Knowledge Representation using Fuzzy Ontologies – A Review
    Pages : 4304-4308
    Nilavu Devadoss, Sivakumar Ramakrishnan
    Abstract | PDFPDF
    32. A Personalized Recommendation on the Basis of Item Based Algorithm
    Pages : 4309-4312
    Kishori R. Ghule, Ratnadeep R. Deshmukh
    Abstract | PDFPDF
    33. Detecting Malfunctioning Nodes in Mobile Ad hoc Networks by using EAACK
    Pages : 4313-4317
    Dilip Kumar Thumu, R.Vasavi, A. Kousar Nikhath
    Abstract | PDFPDF
    34. Effective Resource Management for Virtualized Data centers
    Pages : 4318-4320
    G.Ramakrishna, Dr.A.Mallareddy
    Abstract | PDFPDF
    35. Approaches of Information and Communication Technologies (ICT) for Building Smart Cities – A Review
    Pages : 4321-4326
    S. Navitha
    Abstract | PDFPDF
    36. Content Base Image Retrieval using Combination of Colour, Shape and Texture Features: A Meta-
    Analysis

    Pages : 4327-4330
    Bhagyashri Amrutka, Lokesh Singh
    Abstract | PDFPDF
    37. Social Interaction and Self-Organizing Map
    Pages : 4331-4338
    Arijit Jha
    Abstract | PDFPDF
    38. A Visual Cryptographic Scheme To Secure Image Shares Using Digital Watermarking
    Pages : 4339-4343
    Malvika Gupta, Deepti Chauhan
    Abstract | PDFPDF
    39. Network Management for New Era
    Pages : 4344-4349
    Dr. R. Prabakaran, J.Palanivel
    Abstract | PDFPDF
    40. Enhancing the Privacy and Implementation of Access Control Mechanism by Anonymization
    Pages : 4350-4352
    Barkha Kasab, Prof. Vinayak Pottigar, Prof. Swapnaja Ubale
    Abstract | PDFPDF
    41. Customizing Moodle to Facilitate Integration with Other Platforms
    Pages : 4353-4356
    Madhupriya R
    Abstract | PDFPDF
    42. Dynamic Resource Scheduling In Cloud Computing Using Genetic Algorithm: A Survey
    Pages : 4357-4360
    Manjunatha Swamy C, Anil Kumar B H, Kiran B
    Abstract | PDFPDF
    43. Battery Optimization of Android OS
    Pages : 4361-4363
    Alex Chirayath, Alfred Gonsalves, Chinmayi Kulkarni, Mahendra Mehra
    Abstract | PDFPDF
    44. Clustering Amelioration and Optimization with Swarm Intelligence for Color Image Segmentation
    Pages : 4364-4370
    Kiranpreet, Prince Verma
    Abstract | PDFPDF
    45. Lung Cancer Survival Modelling using AdaptiveNeuro-fuzzy Inference System
    Pages : 4371-4374
    Plachikkad.A. Rehana Bhadhrika, Sri Kunjam Nageswara Rao
    Abstract | PDFPDF
    46. Artificial Neural Network Based Decision on Parameter Values in AODV to Enhance the Performance of Mobile Ad Hoc Networks
    Pages : 4375-4377
    K.Narasimha Raju, Dr.S.P.Setty
    Abstract | PDFPDF
    47. A Survey of Cloud Based Mobile Secure Data Storage Application
    Pages : 4378-4380
    Swati Sharma, Ravindra Sharma
    Abstract | PDFPDF
    48. Cotton Crop Discrimination Using Landsat-8 Data
    Pages : 4381-4384
    Sandip A. Kharat, Vijaya B. Musande
    Abstract | PDFPDF
    49. Prediction of Psychological Disorder using ANN
    Pages : 4385-4389
    Purva D. Kekatpure, Prof. Rekha S. Sugandhi
    Abstract | PDFPDF
    50. Real-Time Health Monitoring System for Remote Places
    Pages : 4390-4391
    Nithi Pillai,Madhura Kakade,Shreyas Bhimale,Mahesh Bagde
    Abstract | PDFPDF
    51. Automated Intelligent Surveillance using Human Behavior Analysis in Shopping Malls
    Pages : 4392-4396
    P.kamala, Ranjini RS, Manjula.P
    Abstract | PDFPDF
    52. Detecting Attacks in Wireless Sensor Network through Bloom Filtering
    Pages : 4397-4399
    Rupali Adhau, Ashwini Ambekar, Abhishek Drakshe, Rajat Thorave
    Abstract | PDFPDF
    53. Exploring the Power of Cloud Computing Over Grid Computing
    Pages : 4400-4403
    Anil Barnwal, Satyakam Pugla, Rajesh Jangade
    Abstract | PDFPDF
    54. Detection and Prevention of Black Hole Attack with Modified DRI Table in Mobile Network
    Pages : 4404-4408
    Aakanksha Choubey, Neelam Peters
    Abstract | PDFPDF
    55. String Transformation Using Top K Pruning Algorithm
    Pages : 4409-4411
    Swapnali S. Maske, Prashant Jawalkar
    Abstract | PDFPDF
    56. From Moore’s Law to Amdahl’s Law: The Pursuitof Computer Performance
    Pages : 4412-4416
    Chakib Chraibi
    Abstract | PDFPDF
    57. Efficient Flooding using Zonal Concept of LAR Protocol on AODV in MANETs
    Pages : 4417-4420
    Vishal Gupta, Dr. Rajneesh Gujral
    Abstract | PDFPDF
    58. Performance And Result Analysis Of Hybrid Adaptive Random Partition Testing For Improved Bug Detection and Test Coverage
    Pages : 4421-4428
    Reetika Patidar,Mahesh Malviya
    Abstract | PDFPDF
    59. Anomaly Detection in Network using Genetic Algorithm and Support Vector Machine
    Pages : 4429-4433
    Prashansa Chouhan and Dr.Vineet Richhariya
    Abstract | PDFPDF
    60. Security on Cloud Using Mass Storage Device for Authentication
    Pages : 4434-4437
    SnehaNaik, Pranay Chauhan
    Abstract | PDFPDF
    61. A Review on Cloud Server Optimization Using Orthogonal Recursive Bisection Technique for Cloud Migration
    Pages : 4438-4439
    Kamalpreet Kaur and Vanita Rani
    Abstract | PDFPDF
    62. Application of Educational Data mining techniques in e-Learning- A Case Study
    Pages : 4440-4443
    S. Lakshmi Prabha Dr.A.R.Mohamed Shanavas
    Abstract | PDFPDF
    63. Ternary Based Web Crawler For Optimized Search Results
    Pages : 4444-4449
    Abhilasha Bhagat, Vanita Raut
    Abstract | PDFPDF
    64. Comprehensive Analysis of Dynamic Routing Protocols in Computer Networks
    Pages : 4450-4455
    Priya Asher
    Abstract | PDFPDF
    65. Analysis on Employment of Wireless Sensor Networks
    Pages : 4456-4458
    Sundar Kumar. S, Bharathi. B
    Abstract | PDFPDF
    66. Comparative Study of Subspace Clustering Algorithms
    Pages : 4459-4464
    S.Chitra Nayagam
    Abstract | PDFPDF
    67. Texture Synthesis – A Comparative Study
    Pages : 4465-4468
    Aarthi.K
    Abstract | PDFPDF
    68. ATM Card and Safety Chip: Embedded in Human Preventing ATM from Hackers and Frauds
    Pages : 4469-4474
    Deepa Malviya
    Abstract | PDFPDF
    69. Mining Annotated Search Results From Web Databases
    Pages : 4475-4478
    Thushara K P, Varsha Philip
    Abstract | PDFPDF
    70. Secure Multi-Cloud data sharing using Key Aggregate Cryptosystem for scalable data sharing
    Pages : 4479-4482
    Suhas Bachhav, Chetan Chaudhari, Nikhilesh Shinde, Poonam Kaloge
    Abstract | PDFPDF
    71. OCMM Based clustering in Research as well as Reviewers & Optimal Allocation of Proposals to Experts by Ontology Matching
    Pages : 4483-4489
    T.Sahaya Arthi Jeno, D.Jim Solomon Raja
    Abstract | PDFPDF
    72. A Novel Secured Data Exchange Mechanism For sensor nodes used in military networks using minimal keys
    Pages : 4490-4495
    TEEDA ANITHA, P.S.L.SRAVANI
    Abstract | PDFPDF
    73. An Efficient Schema Free Keyword Search Approach Over Linked Data using Lucene
    Indexing Algorithm

    Pages : 4496-4500
    Tejashree R. Shinde, Sanchika A. Bajpai
    Abstract | PDFPDF
    74. Performance Analysis of Reactive and Hybrid Routing Protocols in Ad Hoc Networks
    Pages : 4501-4506
    Pooja Mangla, Rajneesh Gujral, Manpreet Singh
    Abstract | PDFPDF
    75. Providing Authentication by Using Biometric Multimodal Framework for Cloud Computing
    Pages : 4507-4511
    R. Parimala, C. Jayakumar
    Abstract | PDFPDF
    76. Fusion of CT and MRI Images Based on Fuzzy Logic and Discrete Wavelet Transform
    Pages : 4512-4519
    Myna A N, J Prakash
    Abstract | PDFPDF
    77. Integrated Particle Swarm Optimization and Genetic Algorithm Based Compression for
    Reduction of Blocking Artifacts

    Pages : 4520-4527
    Prabhjeet kaur, Parminder Singh
    Abstract | PDFPDF
    78. Interpretation of Tamil Script using Optical Character Recognition in Android
    Pages : 4528-4530
    Arun Srivatsa.R , Shriya.P , Adithya Srinivasan
    Abstract | PDFPDF
    79. Implementation of Classification Algorithms to Predict Mode of Delivery
    Pages : 4531-4534
    Alisha Kamat, Veenal Oswal, Manalee Datar
    Abstract | PDFPDF
    80. An Admirable Client-Side Result Evaluation of Location Queries
    Pages : 4535-4537
    J.Munikishore Reddy, M.Kirankumar
    Abstract | PDFPDF
    81. Efficient Discovery of Community and Enhanced Privacy Technique in Multidimensional Network
    Pages : 4538-4541
    G.Soundarya, M.Kirankumar
    Abstract | PDFPDF
    82. E-Government: Study of Factors significantly affects Adoption and Acceptance in State of Punjab
    Pages : 4542-4548
    Prof. Manjot Kaur, Dr. Amitoj Singh
    Abstract | PDFPDF
    83. Finger Vein Enhancement Using Segmentation and SVM
    Pages : 4549-4554
    Kirandeep Kaur, Shashi Bhushan
    Abstract | PDFPDF
    84. A Survey on Automation System by Enabling Wireless Devices and Sensors
    Pages : 4555-4558
    Akshay Jaitpal, Pavan Kodihal, Pratik Gothiwadekar, Sharmila A.Chopade
    Abstract | PDFPDF
    85. An Analysis of Robust Exemplar-Based Inpainting Algorithm Using Region Segmentation and Block Computation
    Pages : 4559-4562
    Yogesh Laxman Tonape, Vinayak Pottigar, Swapnaja Ubale
    Abstract | PDFPDF
    86. RTSP Based Video Surveillance System Using IP Camera for Human Detection in OpenCV
    Pages : 4563-4567
    K. Bapayya, K. Sujitha,SD. Akthar Basha
    Abstract | PDFPDF
    87. Security and Privacy Issues in Trusted Cloud Computing Secure Architecture
    Pages : 4568-4570
    Shalini Agarwal , Arun Singh Chouhan
    Abstract | PDFPDF
    88. Firewall Design Techniques and its Development in Linux System
    Pages : 4571-4574
    Vinit A. Sinha
    Abstract | PDFPDF
    89. A Novel Secured Data Exchange Mechanism by using Captcha images
    Pages : 4575-4581
    BODDAPU SUNITHA, SHALINI BHARIDE
    Abstract | PDFPDF
    90. Performance Analysis Of Ontology Processing System Using Information Filter and Knowledge Repository for Semantic Web
    Pages : 4582-4586
    Sudha J Vishwakarma
    Abstract | PDFPDF
    91. A Survey of various routing protocols in MANETs
    Pages : 4587-4592
    Rajesh Yadav, Dr. Srinivasa Rao
    Abstract | PDFPDF
    92. Data Recovery in Cloud Environment Using Seed Block Algorithm
    Pages : 4593-4598
    Vedashree N, Praveen Kumar KC, Anilkumar G
    Abstract | PDFPDF
    93. Survey of Quality of Services to Improved Performance of Routing in MANET
    Pages : 4599-4604
    Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Raju Sujane, Manish Taram
    Abstract | PDFPDF
    94. Article Removed
    Pages : 4605-4610
    xxx,xxx
    Abstract | PDFPDF
    95. A Survey on Software Data Reduction Techniques for Effective Bug Triage
    Pages : 4611-4612
    Ashwini Jadhav, Komal Jadhav, Anuja Bhalerao, Amol Kharade
    Abstract | PDFPDF
    96. A Survey on Intrusion Detection in MANET through AODV
    Pages : 4613-4615
    Divya Patidar, Jigyasu Dubey
    Abstract | PDFPDF
    97. Biometric System- A Review
    Pages : 4616-4619
    Abhilash Kumar Sharma, Ashish Raghuwanshi, Vijay Kumar Sharma
    Abstract | PDFPDF
    98. VM Consolidation Technique for Green Cloud Computing
    Pages : 4620-4624
    Priyanka Nema, Sapna Choudhary, Tripti Nema
    Abstract | PDFPDF
    99. An Effective Method for Detecting Double JPEG Image by Using an Effective Classifier -Review
    Pages : 4625-4628
    Athira Abraham, Muhammed Nizar B K
    Abstract | PDFPDF
    100. Applications of Big data in Various Fields
    Pages : 4629-4632
    Kuchipudi Sravanthi, Tatireddy Subba Reddy
    Abstract | PDFPDF
    101. Big Data: Technologies, Trends and Applications
    Pages : 4633-4639
    Sudhakar Singh, Pankaj Singh, Rakhi Garg, P K Mishra
    Abstract | PDFPDF
    102. A Comprehensive Study on Mobile Cloud Computing (MCC) & It’s Internals
    Pages : 4640-4645
    Saania Sayed, Jovi D’Silva
    Abstract | PDFPDF
    103. Video Steganography by Intermediate Significant Bitplanes
    Pages : 4646-4650
    Praneetha S.R
    Abstract | PDFPDF
    104. A New owner ship Control System on germination of Data Stored in Cloud
    Pages : 4651-4654
    B.Trinadh, M.Kalyan Ram
    Abstract | PDFPDF
    105. SMS Encryption
    Pages : 4655-4659
    Rashmi P. Sarode, Neeraj Manglani
    Abstract | PDFPDF
    106. New Approach of Scheduling Algorithms in Linux Operating System with Goodness Function
    Pages : 4660-4662
    G.Keerthi, R.China Appala Naidu
    Abstract | PDFPDF
    107. A Survey of Data Mining Applications and Techniques
    Pages : 4663-4666
    Samiddha Mukherjee, Ravi Shaw, Nilanjan Haldar, Satyasaran Changdar
    Abstract | PDFPDF
    108. Data Mining: The Massive Data Set
    Pages : 4667-4671
    Saurabh Patodi, Mini Jain, Teena Negi
    Abstract | PDFPDF
    109. Factors Effecting the Usage of Public Transport Multinomial Logit Model
    Pages : 4672-4675
    B.RAJASEKHAR REDDY, CH.DEEPIKA, G.NAVYA, G.RAJA
    Abstract | PDFPDF
    110. Implementation of Energy-Efficient Resource Allocation for OFDM-Based Cognitive Radio Networks
    Pages : 4676-4681
    Anna Kumar.G, Kishore Kumar.M, Anjani Suputri Devi.D
    Abstract | PDFPDF
    111. A Hierarchical Tree Based Online Web Portal
    Pages : 4682-4684
    Pooja Sabnani, Vivek Bajpai
    Abstract | PDFPDF
    112. A Competent Target Tracking Procedure in Wireless Sensor Networks
    Pages : 4685-4688
    Sagarika Sethy, Chinmaya Kumar Nayak, Manoranjan Pradhan, Satyabrata Das
    Abstract | PDFPDF
    113. Virtual Subjective Examination on Tablets
    Pages : 4689-4691
    Namrata Parekh, Kalpesh Dusane,Shivam Thakur, Amoli Sonawane
    Abstract | PDFPDF
    114. Article Removed
    Pages : xxx-xxx
    xxx,xxx
    Abstract | PDFPDF
    115. Analysis the impact of E-governance Services in Rural Areas of Mansa District-Punjab
    Pages : 4696-4698
    Resham Dhillon, Dr Vijay Laxmi
    Abstract | PDFPDF
    116. TD-ZRP: Trigger Driven Zero Remnance Proof Technique for Self Data Removal in Web Services
    Pages : 4699-4704
    Pooja Bhavsar, Rakesh kumar Lodhi
    Abstract | PDFPDF
    117. Localization of SMS on Mobile Phones
    Pages : 4705-4708
    Kavita Agrawal, Arvind Kumar Chaubey, V.M.Ruth
    Abstract | PDFPDF
    118. Supporting privacy Preserved in personalized web search Engine
    Pages : 4709-4711
    Mahesh Holkar, Kunal Patil, Khemraj Kakade, Ajay Pakhale
    Abstract | PDFPDF
    119. Secure and Fast Adaptive Mobile Video Streaming and Sharing in Wireless Mobile Network
    Pages : 4712-4717
    Nisha Bhaskar Patil, Amol D. Potgantwar
    Abstract | PDFPDF
    120. Improving Model Based Testing Using Event Consideration For Various Designs Concepts
    Pages : 4718-4723
    Nidhi Pare, Prof. Piyush Soni
    Abstract | PDFPDF
    121. MulticastOpportunisticRoutingProtocol “TOMR” Based on Trust and Link Quality Matrix for
    Wireless Networks

    Pages : 4724-4729
    Sanafarin Salim Mulla, J.A.Shaikh
    Abstract | PDFPDF
    122. JPEG Steganography based on uniform embedding and Syndrome trellis codes
    Pages : 4730-4735
    Aasemuddin Quazi, Prof. A.K. Gulve
    Abstract | PDFPDF
    123. An Approach for Hybrid Cluster Based Feature Selection on High Dimensional Data
    Pages : 4736-4739
    P. Ramasita, S. Rama Sree
    Abstract | PDFPDF
    124. Parallel Implementation of Fuzzy Clustering Algorithm Based on MapReduce Computing Model of Hadoop –A Detailed Survey
    Pages : 4740-4744
    Jerril Mathson Mathew, Lekshmy P Chandran
    Abstract | PDFPDF
    125. Enhancing the Capacity of Steganography Using Reversible Texture Synthesis with Edge Adaptive and Tree-Based Parity Check (TBPC) Methods -A Detailed Survey
    Pages : 4745-4747
    Reenu Mariam Cherian, Sanoj R
    Abstract | PDFPDF
    126. Enhancing the Performance of AODV in MANETs using Fuzzy logic
    Pages : 4748-4750
    V.V.S.Prasanthi, Dr.S.Pallam Setty
    Abstract | PDFPDF
    127. Enhanced Adaptive Weighted Mean Filter With Non-Local Means To Denoise Image Corrupted By Salt And Pepper Noise
    Pages : 4751-4752
    Sukina K, Reshna T
    Abstract | PDFPDF
    128. Code Optimization using Code Purifier
    Pages : 4753-4757
    Neeta Malviya, Dr. Ajay Khunteta
    Abstract | PDFPDF
    129. Learning Liveness Detection and Classification of Iris Images: A Detailed Survey
    Pages : 4758-4761
    John Joy, Rekha K S
    Abstract | PDFPDF
    130. Embedding Audio Message in Images Using Integer Wavelet Transform-A Detailed Survey
    Pages : 4762-4764
    Julie Antony K, Sanoj R
    Abstract | PDFPDF
    131. An Analysis on Web Usage Mining For Internet Users
    Pages : 4765-4767
    Priyanka Sharma, Sumayya Khan, Shilpa Singh,Pooja Tiwari
    Abstract | PDFPDF
    132. Time Efficient Neighbor Discovery Protocol for Wireless Sensor Networks with Multipacket
    Reception

    Pages : 4768-4769
    S.Arun Showry , K.Surendra
    Abstract | PDFPDF
    133. A Survey for detecting Acute Lymphoblastic Leukaemia using Image Processing Techniques
    Pages : 4770-4773
    K.Dhana Shree, M.Saranya, G.Poorani, Dr.A.Grace Selvarani
    Abstract | PDFPDF
    134. Integrated Color Image Fusion Using Joint Trilateral Filter and IBLPCA
    Pages : 4774-4781
    Pavneet Kaur, Er. Rajesh Sharma
    Abstract | PDFPDF
    135. Graduate Prediction Using Ontology Approach
    Pages : 4782-4784
    Tirth Mehta, Tanmay Kshirsagar, Azeem Merchant, Professor Sindhu Nair
    Abstract | PDFPDF
    136. Use of ID3 Decision Tree Algorithm for Placement Prediction
    Pages : 4785-4789
    Hitarthi Bhatt, Shraddha Mehta, Lynette R. D'mello
    Abstract | PDFPDF
    137. Bridging the Semantic Gap
    Pages : 4790-4794
    Tanveer J. Siddiqui
    Abstract | PDFPDF
    138. Filtering and Classification Of User Based On Social Media Data Using Memetic and Naive
    Bayes Methods

    Pages : 4795-4798
    Gauri Joshi, Samadhan Sonawane
    Abstract | PDFPDF
    139. Application of Deep Belief Networks for Image Compression
    Pages : 4799-4803
    Venkatesh Lokare, Saurabh Birari, Omkar Patil
    Abstract | PDFPDF
    140. An Efficient Frequent Pattern Mining using Boolean Matrix and Transaction Reduction Technique
    Pages : 4804-4806
    S.Tejaswi, D.Suresh Kumar, Ch.Sita Kameswari
    Abstract | PDFPDF
    141. An Efficient Data Sharing in Public Cloud using two way Authentication & Encryption
    Pages : 4807-4811
    Roshni Sharma, Amit Saxena, Dr. Manish Manoria
    Abstract | PDFPDF
    142. Security Enhanced Adaptive Acknowledgment Intrusion Detection System
    Pages : 4812-4817
    Pawar Priyanka, Hashmi S.A.
    Abstract | PDFPDF
    143. MapReduce Based Frequent Itemset Mining for Improved Electronic Evidence Analysis Using
    Palm-Print

    Pages : 4818-4821
    Mayuresh Sonawane, Navnath Borade, Manoj Jadhav, Vikas Mandal, Prof. A. S. Chandgude
    Abstract | PDFPDF
    144. Survey on Content Based Image Retrieval Techniques
    Pages : 4822-4824
    Lalit Agrowal, Prof. Anil Patidar
    Abstract | PDFPDF
    145. Comparative Analysis of Various Classifiers for Performance Improvement in Intrusion Detection
    System by Reducing the False Positives

    Pages : 4825-4828
    Vivek P.Kshirsagar, Dr.Madhuri Joshi
    Abstract | PDFPDF
    146. Comparative Analysis of Classifiers for Brain Tumour Detection Using Metabolites from Magnetic Resonance Spectroscopy Graph
    Pages : 4829-4832
    Meghana Nagori, Dr. Madhuri Joshi
    Abstract | PDFPDF
    147. Analysis of MFCC & Multitaper MFCC Feature Extraction for Speaker Verification
    Pages : 4833-4836
    Rupali G Shintri, Asst.Prof S.K.Bhatia
    Abstract | PDFPDF
    148. Comparison of Different Web Personalization Mechanisms
    Pages : 4837-4839
    Enam Shah, Hitarth Shah, Khushali Deulkar
    Abstract | PDFPDF
    149. Providing Arithmetic Operations on RSA Using Homomorphic Technique
    Pages : 4840-4846
    Shiwali, Namita kakkar
    Abstract | PDFPDF
    150. The Forensic Process Analysis of Mobile Device
    Pages : 4847-4850
    Dasari Manendra Sai, Nandagiri R G K Prasad, Satish Dekka
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-