1. |
Review of Shape and Texture Feature Extraction
Techniques for Fruits
Pages : 4851-4854
Drashti Jasani, Paras Patel, Snehal Patel, Bindiya Ahir, Khushbu Patel, Mitali Dixit
Abstract | PDF |
2. |
Application of Data Mining Techniques in Higher
Education (With Special Reference to Improving
the Quality)
Pages :4855-4859
Amit Agnihitri, Bharat Mishra
Abstract | PDF |
3. |
Encoding N-party Man-In-Middle Attack for Diffie–Hellman Algorithm in a Client-Server
Paradigm
Pages : 4860-4865
Sulochana Devi, Ritu Makani
Abstract | PDF |
4. |
Improving Performance in Keyword Search by Supporting Search as-you-type
Pages : 4866-4873
Datta M. Ningole, Vijay B. Patil
Abstract | PDF |
5. |
Energy Efficiency in Wireless Sensor Networks Using Packet Splitting Technique
Pages : 4874-4877
J. Anton Bose
Abstract | PDF |
6. |
Algorithm for Ranking Consumer Reviews on E-commerce Websites
Pages : 4878-4881
Rajat Sharma, Gautam Nagpal, Amit Kanwar
Abstract | PDF |
7. |
Effect of Image Quality Improvement on the Leaf Image Classification Accuracy
Pages : 4882-4887
Arun Kumar, Vinod Patidar, Deepak Khazanchi, Poonam Saini
Abstract | PDF |
8. |
A Review on Multi-Agent Data Mining Systems
Pages :4888-4893
Siddhant Patil, Sayali Karnik , Vinaya Sawant
Abstract | PDF |
9. |
A Wireless Scheme to Establish a Communication between One Disable with Multiple Disables: A
Survey
Pages : 4894-4897
Vaishnavi Kokate, Chandratre Ruchika, Khairnar Himanshu, Kamble Archana
Abstract | PDF |
10. |
Cloud –Based Energy Efficient Offloading Transcoding Service Policy
Pages :4898-4900
Vaishali Y. Baviskar, Snehal Mandlik, Supriya Patil,Pallavi Sinha,Pooja Gopale
Abstract | PDF |
11. |
Quadrants Dynamic Histogram Equlization Based Contrast Enhancement with Median Filtering
Pages :4901-4903
Roshni Reghunathan K, Jayasree M
Abstract | PDF |
12. |
Survey of Detection of Sinkhole Attack in Wireless Sensor Network
Pages :4904-4909
Kesav Unnithan S L, Lakshmi Devi C , Sreekuttan Unnithan C
Abstract | PDF |
13. |
IEAACK-Secure Detection System for Packet- Dropping attack in MANETs
Pages :4910-4913
Preeti Sharanvijay. Chikkshetty, Abhijit. V. Mophare
Abstract | PDF |
14. |
Easy V-Mail
A Simplified Mailing Application
Pages :4914-4916
Apoorva D. Shetty, Juhi D. Gala, Hiloni S. Punatar, Kriti Srivastava
Abstract | PDF |
15. |
Secured Data Transmission in Sensor Devices Using Minimal Keys
Pages :4917-4920
Satish Dekka, Nandagiri R. G. K. Prasad
Abstract | PDF |
16. |
Design and Implementation of Pseudo Random Number Generator in FPGA & CMOS VLSI
Pages :4921-4924
Chandra Sekhar.K, Unitha.Pailu, Aradada.Sirisha
Abstract | PDF |
17. |
A Solutions Provided to Secured Your Online Banking Frauds
Pages :4925-4928
Komal Saxena , Dr. Anurag Awasthi
Abstract | PDF |
18. |
Alternating Current Coefficients in DCT Based Image Fusion with Saturation Weighting
Pages :4929-4935
Harkamal Preet Kaur, Sunny Dhawan
Abstract | PDF |
19. |
Precheck Algorithm with Success Rate Table in Handshake for Detecting and Removing Gray and
Black Hole Attack in MANET
Pages :4936-4940
K. R. Viswa Jhananie, Dr. C. Chandrasekar
Abstract | PDF |
20. |
Efficient Topic Evolution Discovery in a Corpus using Semantic Similarity and Citation Graph
Pages :4941-4951
Vijay Subramanya, Saiprashanth Kote, Santosh Kumar, P. Santhi Thilagam
Abstract | PDF |
21. |
Security Issues Associated With Big Data in Cloud Computing
Pages :4952-4956
K.Shanmugapriya, M.Murugeswari, K.Suriya
Abstract | PDF |
22. |
Proposed E-payment System using Biometrics
Pages :4957-4960
Vishal Vishwas Jadhav, Rahul Ratnakar Patil, Rohit Chandrashekar Jadhav,Adwait Niranjan Magikar
Abstract | PDF |
23. |
Avoidance of Power Draining in Mobile Ad-HOC Network over Vampire Attack
Pages :4961-4964
Anamika Garg, Mayank K Sharma
Abstract | PDF |
24. |
Image Capturing using Blink Detection
Pages :4965-4968
Keval Lakhani, Aunsh Chaudhari, Kena Kothari, Harish Narula
Abstract | PDF |
25. |
Web Structure Mining using Link Analysis Algorithms
Pages :4969-4973
Ronak Jain, Aditya Chavan, Sindhu Nair
Abstract | PDF |
26. |
Data Archival using Hadoop Distributed File System
Pages :4974-4976
Kajal J. Jewani, Deepika Singh T, Neil George, Parth Mehta , Harsh Basantani
Abstract | PDF |
27. |
Profit and Penalty Based Real Time Scheduler for EMS
Pages :4977-4981
Vaishali Shinde, R.B.Naik, Kshama Kulkarni
Abstract | PDF |
28. |
Scheduling Resources in Cloud using Threshold
Values at Host and Data Center level
Pages :4982-4986
Yatendra Sahu, Neha Agrawal
Abstract | PDF |
29. |
A Comprehensive Study of Multicast based Routing Protocols in Wired Networks(LAN)
Pages :4987-4991
Alok Sahu, Dr. Bharat Mishra
Abstract | PDF |
30. |
Opinion Extraction and Classification of Real Time E-commerce Websites Reviews
Pages :4992-4996
Randa Benkhelifa, Fatima Zohra Laallam
Abstract | PDF |
31. |
A Privacy Policy for Continuous Query Processing through Location Based Services
Pages :4997-5003
K.B.Anusha, M.Sweta Harini
Abstract | PDF |
32. |
Slicing Aspect-oriented program Hierarchically
Pages :5004-5013
S. R. Mohanty, P. K. Behera, D. P. Mohapatra
Abstract | PDF |
33. |
A Novel Method for Homogeneous Region Based Image Segmentation Technique for Remotely
Sensed Images
Pages :5014-5021
Hema Jagadish, J. Prakash
Abstract | PDF |
34. |
P VS NP PROBLEM
Pages :5022-5025
Shivam Sharma
Abstract | PDF |
35. |
A Systematic Way to Cloud Server Optimization Using Orthogonal Recursive Bisection Technique
for Cloud Migration
Pages :5026-5032
Kamalpreet Kaur and Vanita Rani
Abstract | PDF |
36. |
Vertical Handoff Decision Algorithm to Reduce Unnecessary Handoff for Heterogeneous Wireless
Networks
Pages :5033-5036
Mrunali Pramod Kulkarni, Veerbhadra S.Bale
Abstract | PDF |
37. |
An Improved Unsupervised Cluster based Hubness Technique for Outlier Detection in High
dimensional data
Pages :5037-5043
R.Lakshmi Devi, Dr.R.Amalraj
Abstract | PDF |
38. |
Crowd Analysis and Density Estimation Using Surveillance Cameras
Pages :5044-5047
Nachiket Kulkarni , Abhijeet Rana, Aboli Patre
Abstract | PDF |
39. |
Web Mining for Web Personalization
Pages :5048-5053
Prof. Jharana Paikaray, Prof.Santosh Kumar Rath, Prof.Smaranika Mohapatra
Abstract | PDF |
40. |
High-Quality Location Based Wireless Sensor Networks
Pages :5054-5058
Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
Abstract | PDF |
41. |
Database Intrusion Detection and Protection System Using Log Mining and Forensic Analysis
Pages :5059-5061
Shubhangi S. Suryawanshi, Tousif Mulani, Suraj Zanjurne, Kaustubh Inarkar, Ashutosh Jambhulkar
Abstract | PDF |
42. |
Data Security through Video Embedding
Pages :5062-5067
Arushi Shah, Nidhi Kapadia, Ashwinee Mehta, Mrs Kriti Srivastava
Abstract | PDF |
43. |
A Framework for Detection of Video Spam on YouTube
Pages :5068-5072
Niyanta Ashar, Hitarthi Bhatt, Shraddha Mehta, Prof. (Mrs.) Chetashri Bhadane
Abstract | PDF |
44. |
A Survey of Web Usage Mining Techniques
Pages :5073-5076
Parth Suthar, Prof. Bhavesh Oza
Abstract | PDF |
45. |
Advanced Authentication System Using
Graphical Password
Pages :5077-5079
Wanjari Nilima, Aher Vaishnavi, Pagare Sharmila, Kulkarni Hema
Abstract | PDF |
46. |
Multimodal Biometric System in Secure e- Transaction in Smart Phone
Pages :5080-5084
Amit Kumar, Kailash Patidar, Nagendra sharma, Manoj Kumar Yadav
Abstract | PDF |
47. |
Schemes against Pollution Attack in Network Coding: A Survey
Pages :5085-5089
Neha V. Mamidwar, Ms. Deepali Gothawal
Abstract | PDF |
48. |
Implementation of Efficient Provable Data Possession
Pages :5090-5092
Dhanashri Bamane, Prof. Vinayak Pottigar, Prof. Subhash Pingale
Abstract | PDF |
49. |
Indication for Collision Occurrence of Trains Using ARM7
Pages :5093-5096
Dr. K. R. R. Mohan Rao, Jayasri. Mekala, T. Mounika
Abstract | PDF |
50. |
Automatic e-mails Classification Using genetic Algorithm
Pages :5097-5103
Mandeep Choudhary , V. S. Dhaka
Abstract | PDF |
51. |
A Survey on Improved Router Design
Pages :5104-5106
Shwetha K S, Shobha M S, Nandini Byahatti
Abstract | PDF |
52. |
Amazon Review Classification and Sentiment Analysis
Pages :5107-5110
Aashutosh Bhatt, Ankit Patel, Harsh Chheda, Kiran Gawande
Abstract | PDF |
53. |
Survey on Technical Farming
Pages :5111-5113
Disha Deotale, Kranti Sanap, Sandip Panchal, Ravindra Wagh, Prashant Badade
Abstract | PDF |
54. |
Proficient Enhancement of Accuracy for Movie Rating Recommendation System via Algorithmic
Approaches
Pages :5114-5117
G.P Karpagam, S.Balaji
Abstract | PDF |
55. |
Printed Text Assimilator for Visually Impaired : A Survey
Pages :5118-5120
Bharati Ainapure, Nitin Sankpal, Pranav Ranadive, Rohan Shiroor, Satish Vairagar
Abstract | PDF |
56. |
Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks
Pages :5121-5125
Mohit, Suraj Pal
Abstract | PDF |
57. |
PPDM and Data Mining Technique Ensures Privacy and Security for Medical Text and Image
Feature Extraction in E-Health Care System
Pages :5126-5129
M.S Inthumathi, P. Damodharan
Abstract | PDF |
58. |
Employee Monitoring System Using Android Smartphone
Pages :5130-5132
Rachana Sabale, Pranjal pawar, Sana Sayyed, Aishwarya Kadadekar, Pavan Kawade
Abstract | PDF |
59. |
Survey of Road Bump and Intensity Detection algorithms using Smartphone Sensors
Pages :5133-5136
Prof.B.Lanjewar, Jyoti Khedkar, Rahul Sagar, Rasika Pawar, Kunal Gosavi
Abstract | PDF |
60. |
Digital Watermarking for Secure Online Transmission
Pages :5137-5140
Anubhav Bewerwal , Kailash Patidar
Abstract | PDF |
61. |
Article Removed
Pages :5141-5144
xxx,xxx
Abstract | PDF |
62. |
A Review on Multi-keyword Context–Oriented diversification search on Map-Reduce Framework
over XML Data
Pages :5145-5147
Sneha B. Mandlik, Prof.Santosh Durugkar
Abstract | PDF |
63. |
Developing System to Filter Unwanted Texts and Images from Social Network User Wall
Pages :5148-5152
Ravindra Takalikar, Mahesh Jadhav, Subhash Pingale
Abstract | PDF |
64. |
Accessing Desktop remotely using WCF service and Cloud Computing
Pages :5153-5155
Akhilesh Shukla, Satendra Sonare
Abstract | PDF |
65. |
Improved Bees Hybrid Sensor Coverage Algorithm
Pages :5156-5158
M. Sabarivel, K. Marimuthu, A. Kaliappan
Abstract | PDF |
66. |
Novel Framework for Browser Compatibility
Testing of a Web Application using Selenium
Pages :5159-5162
Prof. Anand Motwani, Amber Agrawal, Dr. P. N. Singh, Prof. Anurag Shrivastava
Abstract | PDF |
67. |
Hierarchical Structure of Geospatial Field Data Using Enhanced Rtree
Pages :5163-5165
Kumutha Priya M, Brinda B M
Abstract | PDF |
68. |
Implementing Coarse Grained Task Parallelism Using OpenMP
Pages :5166-5169
Manju Mathews, Jisha P Abraham
Abstract | PDF |
69. |
A Survey on Cross Domain Sentiment Classification Techniques
Pages :5170-5172
Kinnari Ajmera, Lynette R. D'mello
Abstract | PDF |
70. |
Product Label Reading From Handheld Objects Using Portable Camera For Visually Challenged
Persons
Pages :5173-5176
Prof. S. Babu Renga Rajan, Mrs.B. Shanmuga Sundari, Mrs. A. Haseena Beevi
Abstract | PDF |
71. |
GSM Based Smart Locker
Pages :5177-5180
Souvik Paul, Soumi Mondal
Abstract | PDF |
72. |
MultiHop Dynamic Channel Assignment to Optimize Cellular Networks Based on Dynamic
Frequency Selections
Pages :5181-5183
V.Lakshman Narayana, Y.Rajesh, T.Kishore babu
Abstract | PDF |
73. |
Performance Evaluation of Equalization Algorithms for Electrocardiogram Signal Transmission
Pages :5184-5188
Priya.L, Kandaswamy.A,Danvanth.V,Chezhiyan.NA, Hariram.J
Abstract | PDF |
74. |
Secure Communication against Vampire Attacks in WSN (Survey)
Pages :5189-5193
Laxmi Choukiker, Amit Saxena, Dr Manish Manoria
Abstract | PDF |
75. |
Efficient Backward Non Deterministic Matching (EBNDM) Algorithm
Pages :5194-5197
Sonam Jain, Vivek Kumar
Abstract | PDF |
76. |
An Improved Content Based Image Retrieval Using A Multi-Scale Saliency Model
Pages :5198-5203
Gaurav Mandloi, Prof. Abhishek Raghuvanshi
Abstract | PDF |
77. |
Grid Computing- Proposed Methods
Pages :5204-5206
Ravikant Dewangan
Abstract | PDF |
78. |
A New Approach towards Secure Password Authentication Based on CARP
Pages :5207-5211
Dr. D.Pushpa Ranjini, B. Shanmuga Sundari, S. AbdulKather, N.Deivanayaki
Abstract | PDF |
79. |
A Survey on Moving Object Detection and Tracking Methods
Pages :5212-5215
Imrankhan Pathan, Chetan Chauhan
Abstract | PDF |
80. |
Semantic Web Representation in RDFSchema: A Practical Approach
Pages :5216-5221
S.Sangeetha, V.Bhuvaneswari
Abstract | PDF |
81. |
Sentimental Analysis Using Bayesian Theorem
Pages :5222-5225
Rohit Vincent, Nisha Mariam Daniel, P Beaulah Soundarabai
Abstract | PDF |
82. |
Cloud Computing as a Tool for NGOs in India and
Pakistan
Pages :5226-5237
Afreen Bhumgara, Muhammad Salman
Abstract | PDF |
83. |
A Novel Secured Data Transmission using Less
Number of Keys in Sensor Nodes Used in Security
Application Networks
Pages :5238-5243
Venkateswara Dunna, Y.Ramesh Kumar
Abstract | PDF |
84. |
A Study on Physiological Parameters Used To Monitor Stress in Experimentally Induced Stimuli
Pages :5244-5246
Neelam Rup Prakash, Jasleen Kaur
Abstract | PDF |
85. |
Comparative Study of Secure Email System Based on Security Mechanism
Pages :5247-5250
Apeksha Nemavarkar, Rajesh Kumar Chakrawarti
Abstract | PDF |
86. |
Secure Multi keyword Retrieval over Encrypted Cloud Data
Pages :5251-5255
Pradnya H. Unde, Arti Mohanpurkar
Abstract | PDF |
87. |
Reliable Routing in Vehicular Adhoc Network Using Maximum Reliable Threshold
Construction(MRTC)
Pages :5256-5260
K Himantha Rao and Nagarjuna Karyemsetty
Abstract | PDF |
88. |
Shrewd Technique for Mining High Utility Itemset via TKU and TKO Algorithm
Pages :5261-5264
R.Nandhini, Dr.N.Suguna
Abstract | PDF |
89. |
Prediction of Popular Content from Social Media Mining
Pages :5265-5267
Bharat Naiknaware, Seema Kawathekar, Sachin Deshmukh
Abstract | PDF |
90. |
kNN-R:Building Confidential and Efficient Query Services in the Cloud Using RASP Data
Perturbation
Pages :5268-5273
D. S. Shintre, Dr. S. M. Jagade
Abstract | PDF |
91. |
Survey of some Popular Android applications used in Post Disaster management Scenario
Pages :5274-5278
Sayantan Chanda, Sharmistha Dey, Arunava Nath, Mouli Dutta, Krischina Koley
Abstract | PDF |
92. |
Local vs. Distributed - An experimental comparative analysis of divergent overload control
methods in SIP Server
Pages :5279-5283
Abdullah Akbar, S. Mahaboob Basha, Syed Abdul Sattar
Abstract | PDF |
93. |
An Effective Signcryption Based Authentication for Security in Cloud Computing
Pages :5284-5288
Richa Singh Dangi, Amit Saxena, Manish Manoria
Abstract | PDF |
94. |
Survey on Finding Cost & Time Effective Path For Travelling
Pages :5289-5291
Rachna Sable, Akshay Ravtole, Chandravadan Deshpande, Deepika Agarwal,Sayali Boralkar
Abstract | PDF |
95. |
Generalised Approaches for ALU Design Using Reversible Gates
Pages :5292-5294
Neelam Rup Prakash, Neha Pannu
Abstract | PDF |
96. |
Bluetooth Security Issues
Pages :5295-5299
Purvish Patel, Akash Merchant, Nisarg Tailo3, Chintan Trivedi
Abstract | PDF |
97. |
Ranking SDLC Models using BBA
Pages :5300-5302
Aakash Singhal, Aman Agrawal, Jatin Makkar
Abstract | PDF |
98. |
A Review on Geospatial Technologies for Education in Aurangabad City
Pages :5303-5307
Pathan Aminkhan B., Pandagale Pallavi U., Mundhe Manisha R.
Abstract | PDF |
99. |
Effect of Distance measures on Partitional Clustering Algorithms using Transportation Data
Pages :5308-5312
Sesham Anand, P Padmanabham, A Govardhan
Abstract | PDF |
100. |
Enhanced Security for Multi Cloud Storage using AES Algorithm
Pages :5313-5315
Namita N. Pathak, Prof. Meghana Nagori
Abstract | PDF |
101. |
Dynamic Approach for Efficient Deployment of Intelligent Tutoring Systems (ITSs)
Pages :5316-5322
Ruaa Ali Khamees, Dr. R Satya Prasad
Abstract | PDF |
102. |
A Hybrid Approach for Job Shop Scheduling Problems
Pages :5323-5327
Dr.R. Ramkumar
Abstract | PDF |
103. |
Anaphora Resolution for Hindi Language
Pages :5328-5330
Priyanka Ahir, Bhakti Mehta, Riddhi Desai, Zinal Patel, Elisha Patel, Nehal Adhvaryu
Abstract | PDF |
104. |
Sensor based Automated Irrigation System with IOT: A Technical Review
Pages :5331-5333
Karan Kansara, Vishal Zaveri, Shreyans Shah, Sandip Delwadkar, Kaushal Jani
Abstract | PDF |
105. |
Secured Remote Client Authentication using Elliptic Curve Cryptography Algorithm
Pages :5334-5339
Lakshmanarao Battula, Dr.P.Vamsikrishna Raja
Abstract | PDF |
106. |
Online Automated UML Generation
Pages :5340-5341
Avnish Singh Jat
Abstract | PDF |
107. |
Analysis of Feature Extraction Techniques for Vehicle Number Plate Detection
Pages :5342-5346
Swati Jagtap
Abstract | PDF |
108. |
Improving Webpage Visibility in Search Engines by Enhancing Keyword Density Using Improved
On-Page Optimization Technique
Pages :5347-5352
Meenakshi Bansal, Deepak Sharma
Abstract | PDF |
109. |
ID3 and Its Applications in Generation of Decision Trees across Various Domains- Survey
Pages :5353-5357
L.Surya Prasanthi, R.Kiran Kumar
Abstract | PDF |
110. |
A Survey on Access Control and Encryption Mechanisms for Cloud Computing
Pages :5363-5366
B. K.Ugale, R. N. Phursule
Abstract | PDF |
111. |
A Survey on Sentiment Analysis on Twitter Data Using Different Techniques
Pages :5358-5362
Bholane Savita Dattu, Prof.Deipali V. Gore
Abstract | PDF |
112. |
Public Auditing and Self-Destructing Approach for Shared Data on Cloud
Pages :5367-5371
Amir Ali, Prof Savitri Patil
Abstract | PDF |
113. |
A Survey on Classification over Semantically Secure Encrypted Data
Pages :5372-5374
Chaitali R. Shewale
Abstract | PDF |
114. |
Context Based Search Engine for Personal Information Management
Pages :5375-5378
Sayyad F.S., Prof.P.P.Kalyankar
Abstract | PDF |
115. |
An approach of curing Depression by Artificial Neural Networks (ANN)
Pages :5379-5383
Souvik Paul, Atrayee Sanyal Chatterjee
Abstract | PDF |
116. |
PSD Analysis of Neural Spectrum During Transition from Awake Stage to Sleep Stage
Pages :5384-5389
Chintan Joshi, Dipesh Kamdar
Abstract | PDF |
117. |
Efficient High Utility Itemset Mining using extended UP Growth on Educational Feedback
Dataset
Pages :5390-5394
Yamini P. Jawale, Prof. Nilesh Vani
Abstract | PDF |
118. |
Multi-hop Energy Efficient Routing in WSN to Maximize Network Life Time using Percolation
Theory
Pages :5395-5397
Priyanka Saxena, U. Datta
Abstract | PDF |
119. |
Comparative Study of Machine Learning Models in Protein Structure Prediction
Pages :5398-5404
Sonal Mishra, Anamika Ahirwar
Abstract | PDF |
120. |
Steganography in Ad Hoc Networks
Pages :5405-5408
Rashmi Hegde, Dr. T H Sreenivas
Abstract | PDF |
121. |
XML Retrieval with the help of Personalization in Search: A Review
Pages :5409-5412
Jayati Kale, Garima Singh Makhija
Abstract | PDF |
122. |
Comprehensive Study of Contemporary Image forgery Identification Techniques
Pages :5413-5416
Gauravkumarsingh Gaharwar, Prof. V. V. Nath, Raina Gaharwar
Abstract | PDF |
123. |
Study of Multi-keyword Ranked Searching and
Encryption Technique over Cloud
Pages :5417-5420
SonamDarda, Manasi. K. Kulkarni
Abstract | PDF |
124. |
Fingertip Tracking and Hand Gesture Recognition
by 3D Vision
Pages :5421-5424
De Gu
Abstract | PDF |
125. |
Green Cloud Computing – Power Efficiency
Pages :5425-5428
Rakshith K.N., Dr. T H Sreenivas
Abstract | PDF |
126. |
(OOCS) OpenStack Open-source Cloud Computing System
Pages :5429-5431
A.Dhasaradhi, S.Ramakrishna
Abstract | PDF |
127. |
Comparison between SSL and SSH in Network and Transport Layer
Pages :5432-5434
Trivedi Anjali, Shah Krishna, Zatakiya Poonam
Abstract | PDF |
128. |
Enhancement and Evaluation of Pattern Classifiers in NIDS: A Survey
Pages :5435-5438
Nikhil A. Gaikwad, Prof. Sunil M. Sangve
Abstract | PDF |
129. |
Local Ternary Pattern for the Recognition of Surgically Altered Face Images
Pages :5439-5441
Georgy George, Nisha JS
Abstract | PDF |
130. |
Image Steganography for Secret Transmission of
Data Using Cryptography Approach for Encryption of Data
Pages :5442-5445
Teena Rani, Shifali Singla
Abstract | PDF |
131. |
Development of Multilingual Assamese Electronic
Dictionary
Pages :5446-5452
Saiful Islam, Bipul Syam Purkayastha
Abstract | PDF |
132. |
Microarray Analysis and Gene Expression
: A simplified Review
Pages :5453-5458
Saad Subair and Hussah AlEisa
Abstract | PDF |
133. |
A Novel Lifelog Management Scheme for
Improving Health-Related Quality of Life
Pages :5459-5464
Myung-Kyu Yi, Taeg Keun Whangbo
Abstract | PDF |
134. |
Natural Language Processing using NLTK and
WordNet
Pages :5442-5445
Alabhya Farkiya, Prashant Saini, Shubham Sinha, Sharmishta Desai
Abstract | PDF |
135. |
Cluster Based Secure WSN against the Blackhole and Grayhole Attack
Pages :5470-5472
Ojashvi Shivwanshi, Rahul Patel, Preetika Saxena
Abstract | PDF |
136. |
Captcha as Textual Passwords with Click Points to Protect Information
Pages :5473-5477
Sandeep Kumar Vengala, Goje Roopa
Abstract | PDF |
137. |
Methodology for Deploying a Security Framework in Mission Critical Infrastructure Based Wireless Sensor
Networks
Pages :5478-5486
Sudipto Roy, Manisha J Nene
Abstract | PDF |
138. |
A Survey to Support NFRs in Agile Software
Development Process
Pages :5487-5489
Trupti Suryawanshi, Gauri Rao
Abstract | PDF |
139. |
A Secure Application For Shopping in Mall using NFC
Pages :5490-5492
Monika S. Borkar, Piyusha. Kadam, Nikita P.Pagar, Aboli G.More, Akshada Deokar, Trupti Suryawanshi
Abstract | PDF |
140. |
Multiple License Plate Location Identification Using the Optical Flow Algorithm and Blob
Analysis
Pages :5493-5496
Remya Krishnan
Abstract | PDF |
141. |
Comparative Study of Web Search Methods Using Ontology
Pages :5497-5499
Anushree Mehta, Shreyansh Zatakia, Prof. Khushali Deulkar
Abstract | PDF |
142. |
Technical Review: Drip Irrigation System Using Wireless Sensor Network
Pages :5500-5502
Karishma Patel, Krishna Patel , Kajal Patel, Sandip Delwadkar
Abstract | PDF |
143. |
Frequent Pattern Mining and Customer Retention using Vertical Data Set and Boolean Matrix
Pages :5503-5504
S.Tejaswi, Ch.Sita Kameswari
Abstract | PDF |
144. |
Improved Hop-by-Hop Congestion Control Algorithm
Pages :5505-5508
Urvashi Handa, Padma Bonde
Abstract | PDF |
145. |
Adapting Property Graph Model to Overcome Modeling Challenges in Internet of Things (IoT)
Pages :5509-5511
Jagadeesh Hanumantegowda
Abstract | PDF |
146. |
Personalized Image Search Using Simple Case of One Word-Based Queries-An OverviewSensor
Networks
Pages :5512-5517
Prof. Dipak R. Pardhi, Lalitkumar B. Borase
Abstract | PDF |
147. |
Article Removed
Pages :5518-5526
xxx,xxx
Abstract | PDF |
148. |
Computer Assisted Solution of Homotopy Continuation Method Algorithm for Darcy-Brinkman Forchheimer
Flow through an 3D Animation Visualization
Pages :5527-5530
Ashoka S. B.
Abstract | PDF |
149. |
Large Scale Image Processing Using Distributed and Parallel Architecture
Pages :5531-5535
Helly M. Patel, Krunal Panchal, Prashant Chauhan, M. B. Potdar
Abstract | PDF |
150. |
A Review: Shadow Detection and Removal
Pages :5536-5541
Vijay Chondagar, Harshiv Pandya, Mehul Panchal, Rinkesh Patel, Dhaval Sevak, Kaushal Jani
Abstract | PDF |
151. |
Super Node Localization for Time Synchronization
in UWSNs
Pages :5542-5546
Thota Nischala, T .Venkata Naga Jayudu
Abstract | PDF |
152. |
A Genetic Algorithm for Conformation Search Optimization in Molecular Docking
Pages :5547-5551
Sudha Ramachandra, Vinay Chavan
Abstract | PDF |
153. |
Mining Rare Association Rule
Pages :5552-5557
Arnab kumar Das
Abstract | PDF |
154. |
Yet Another nlogn Sorting
Pages :5558-5560
Arijit Bhattacharya, Satrajit Ghosh
Abstract | PDF |
155. |
Hidding secured information into secured image
Pages :5561-5564
J.Sabthami, N.Nivetha, P.Maheswari, S.Janani
Abstract | PDF |
156. |
An Efficient Algorithm for Sign Language Recognition
Pages :5565-5571
Pratibha Pandey, Vinay Jain
Abstract | PDF |
157. |
Caption Mining with Face Annotation Using
Distributed Database
Pages :5572-5574
Afshan Jabeen, Raana Syeda
Abstract | PDF |
158. |
Performance Analysis of Novel Privacy Preserving Model for Location Based Servers
in Mobile Clouds
Pages :5575-5582
Anjali Kalore, Prof.Megha Singh
Abstract | PDF |
159. |
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques
Pages :5583-5587
Jayshri P. Patil, Chhaya Nayak
Abstract | PDF |
160. |
A Systematic Study and its Implementations of Wireless Sensor Networks in Real Time
Pages :5588-5592
P. J. Shriidhar, Dr. A. Senthil Kumar
Abstract | PDF |
161. |
Review on Quality-Aware Cloud Service Selection based on Hybrid Method using Cloudsim Toolkit
Pages :5593-5594
Prabhjot Kaur and Talwinder Kaur
Abstract | PDF |
162. |
A Novel Cryptographic Approach for Preventing Attacks in a Network
Pages :5595-5598
Pratibha Lanka, Ch. Sita Kameswari
Abstract | PDF |
163. |
ADWARE: A REVIEW
Pages :5599-5604
Seyhmus Yilmaz, Sultan Zavrak
Abstract | PDF |
|
|