• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 7 ISSUE 1 January - February 2016

    ISSN 0975 - 9646

    1. A Literature Survey on Handwritten Character Recognition
    Pages :1-5
    Ayush Purohit, Shardul Singh Chauhan
    Abstract | PDFPDF
    2. A Literature Survey on Mood Detection System
    Pages :6-10
    Rajneesh Singla
    Abstract | PDFPDF
    3. Evaluating Digital Image Watermarking based on Image Interlacing, DWT & DCT.
    Pages : 11-17
    Mahejabi Khan, Ajay Kushwaha, Toran Verma
    Abstract | PDFPDF
    4. A Survey on Supporting Privacy Protection in Personalized Web Search
    Pages : 18-21
    Chanda Agarwal, Prof.Dr.Suhasini Itkar
    Abstract | PDFPDF
    5. Survey on Presentation Slides Generation for Academic Papers
    Pages : 22-25
    Ektaa G Meshram, Mrs. D. A. Phalke
    Abstract | PDFPDF
    6. Comparative Study of Text Line Segmentation on Handwritten Kannada Documents
    Pages : 26-33
    Chethana H T, Mamatha H R
    Abstract | PDFPDF
    7. Security in Mobile Cloud Computing: A Review
    Pages : 34-39
    Prashant Pranav, Naela Rizvi
    Abstract | PDFPDF
    8. Agile Methodologies
    Pages :40-44
    Sakshi Sachdeva
    Abstract | PDFPDF
    9. De-Noising Medical Images Using Low Rank Matrix Decomposition, NN and SVM
    Pages : 45-48
    Charankamaldeep Kaur, Nishu Bansal
    Abstract | PDFPDF
    10. Survey on Web Scale Based Near Duplicate Video Retrieval
    Pages : 49-55
    Bhosale Varsharani, D.A.Phalke
    Abstract | PDFPDF

    11.

    A Study on Improved Hop by Hop Congestion Control Algorithm
    Pages : 56-59
    Urvashi Handa, Padma Bonde
    Abstract | PDFPDF
    12. Machine Learning for Web Page Adpatation
    Pages : 60-65
    Neetu Narwal, Dr. Sanjay Kumar Sharma
    Abstract | PDFPDF
    13. Establishment of Efficient Algorithm for Medical Image Diagnosis
    Pages : 66-70
    A. Sorna Gowri, Dr. K. Ramar
    Abstract | PDFPDF
    14. A Framework to Classify the Satellite Images
    Pages :71-73
    Manali Jain, Amit Sinha
    Abstract | PDFPDF
    15. Security Threats in Mobile Ad Hoc Networks - A Survey
    Pages :78-82
    Sanjeev Gangwar
    Abstract | PDFPDF
    16. A Comparative Study of Classification Techniques for Fire Data Set
    Pages :71-73
    Rachna Raghuwanshi
    Abstract | PDFPDF
    17. The Journey of e-Governance to Cloud: Hybrid Clouds as a Strategic Option
    Pages :83-90
    Muzaffar Azim, Dr. S. Kazim Naqvi
    Abstract | PDFPDF
    18. Comparative Study of Segmentation Methods applied on Cervical Cytology Images
    Pages :91-93
    G.Karthigai Lakshmi, K.Krishnaveni
    Abstract | PDFPDF
    19. Survey Paper on Deduplicating Data and Secure Auditing in Cloud
    Pages :94-95
    Meghana Vijay Kakde, Prof. N.B.Kadu
    Abstract | PDFPDF
    20. An Effective & Secure Data Sharing using Elliptic Curve with MD-5 in Cloud Computing
    Pages :96-100
    Rahul Sharma, Manoj Tyagi
    Abstract | PDFPDF
    21. Cloud Data Integrity using Password Based Digital Signatures
    Pages :101-103
    Ceena Mathews
    Abstract | PDFPDF
    22. Study of Various Attacks in MANET and Elaborative Discussion of RREQ Flooding Attack and Its Solutions
    Pages :104-107
    Neha Kamdar, Vinita Sharma, Poorva Kakani
    Abstract | PDFPDF
    23. Real Time Taxi Ride Sharing
    Pages :108-111
    Prof. Deeksha Bhardwaj, Azam Khan, Sunny Patil, Rajat Dhoot
    Abstract | PDFPDF
    24. Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet
    Pages :112-118
    Chidambar P.Inamdar, Dr. C .Chandrasekar
    Abstract | PDFPDF
    25. A Survey on m-Privacy for Collaborative Data Publishing
    Pages :119-122
    Sarita D. Kashid,and Prof. Manasi K. Kulkarni
    Abstract | PDFPDF
    26. Auditing Cloud Environment Using Control Attribute Based Encryption
    Pages :123-125
    Vishal Dnyandeo Ghogare, Prof. S.D Jondhale
    Abstract | PDFPDF
    27. Card less ATM Cash Withdrawal: A simple and Alternate Approach
    Pages :126-128
    Nischaykumar Hegde, Sharath K R
    Abstract | PDFPDF
    28. Ontology Based Development of Learning System
    Pages :129-131
    Chinmay Kshirsagar, Tanaji Jadhav, Harshit Gupta
    Abstract | PDFPDF
    29. Android System for LAN Monitoring
    Pages :132-134
    Kiran Purkar, Akshay Jotrao, Nilesh Bade
    Abstract | PDFPDF
    30. A Survey on Security Attacks in Mobile Ad Hoc Networks
    Pages :135-140
    Saritha Reddy Venna, Ramesh Babu Inampudi
    Abstract | PDFPDF
    31. Intelligent Automatic Irrigation System
    Pages :141-143
    Dr.Sarika Tale, Sowmya P
    Abstract | PDFPDF
    32. A Novel method for securing packets against Reactive Jammer
    Pages :144-148
    G.Neelima, Dr. I. Ramesh Babu
    Abstract | PDFPDF
    33. Protocols for Implementing Histogram LOB in chord Networks
    Pages :149-152
    S.BhagyaRekha
    Abstract | PDFPDF
    34. Security Enhancement in HASBE for Cloud Computing Environment
    Pages :153-156
    B. K.Ugale, R. N. Phursule
    Abstract | PDFPDF
    35. A Literature Survey on Challenges and Issues on Mobile Ad Hoc Networks
    Pages :157-162
    Rajneesh Singla
    Abstract | PDFPDF
    36. Finding the Malicious URLs using Search Engines
    Pages :163-166
    Amruta Rajeev Nagaonkar, Umesh L. Kulkarni
    Abstract | PDFPDF
    37. A Comprehensive Review of Text Mining
    Pages :167-169
    Tarsem Singh
    Abstract | PDFPDF
    38. Identification of Common Challenges and Key Factors in Software Architecture Using Grounded
    Theory

    Pages :170-173
    Vinay Krishna, Dr. Anirban Basu
    Abstract | PDFPDF
    39. Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network
    Pages :174-180
    Jyoti P.Desai, Prof Abhijit Patil
    Abstract | PDFPDF
    40. A Dynamic Algorithm approach in Distributed System
    Pages :181-184
    Divyaa Siingh, Dr.Vishal Nagar
    Abstract | PDFPDF
    41. Speech Recognition System for Medical Domain
    Pages :185-189
    Tripti Dodiya, Sonal Jain
    Abstract | PDFPDF
    42. A Text Polarity Analysis Using Sentiwordnet Based an Algorithm
    Pages :190-193
    Deepak Singh Tomar, Pankaj Sharma
    Abstract | PDFPDF
    43. Feature Selection Using Genetic Algorithm and Classification using Weka for Ovarian Cancer
    Pages :194-196
    Priyanka khare, Dr.Kavita Burse
    Abstract | PDFPDF
    44. Computational Intelligence, Granular Computing and Soft Computing
    Pages :197-200
    Aahan Bhatt
    Abstract | PDFPDF
    45. A Rule Enforced Information Flow Control System with Tagged Service Data for Cloud Service Providers
    Pages :201-207
    Kirtibala Mali, Prof. Anurag Jain
    Abstract | PDFPDF
    46. An Idea to Recognition of Handwritten Characters using Genetic Algorithms
    Pages :208-210
    Samta Jain Goyal, Rajeev Goyal
    Abstract | PDFPDF
    47. A Review of Wireless Sensor Network with Its Applications
    Pages :211-214
    Navreetinder Kaur, Tarandeep Singh
    Abstract | PDFPDF
    48. Tweet Sarcasm: Mechanism of Sarcasm Detection in Twitter
    Pages :215-217
    Komalpreet Kaur Bindra, Ankita Gupta
    Abstract | PDFPDF
    49. Data Mining Case Study for Analysing Opinion Mining from Emotions in Social Network Sites in
    Theni Dt., Tamilnadu

    Pages :218-223
    B. Nasreen Fathima, S. Jothi, R. Aswini
    Abstract | PDFPDF
    50. Agile Software Development: User Story Conversion
    Pages :224-226
    Purtee Kohli, Avnish Singh Jat, Vikas Agarwal
    Abstract | PDFPDF
    51. A Privacy Preserving and Data Dynamics for Storage Security in Cloud Computing by using Third Party Auditor
    Pages :227-231
    M.Gayathri, S.Kanchana, R.Rajkumar, Dr.S.Rajkumar
    Abstract | PDFPDF
    52. Study of a Disease Sample Pixel Clustering for Accurate Infection Prediction Using Image Processing and Data Mining
    Pages :232-233
    Milind H. Padgavankar, Shrikant P. Akarte
    Abstract | PDFPDF
    53. A Novel Categorized Search Strategy using Distributional Clustering
    Pages :234-238
    Neenu Joseph. M, Sudheep Elayidom
    Abstract | PDFPDF
    54. Disassembling and Patching iOS Applications
    Pages :239-248
    Arpita Jadhav Bhatt, Chetna Gupta
    Abstract | PDFPDF
    55. Multiclass Vehicle Detection and Tracking Using Local Visual Features
    Pages :249-253
    Prof. Deepali Sale, Namrata Bhole, Prof. S.D.Chavan
    Abstract | PDFPDF
    56. Building a K-Nearest Neighbor Classifier for Text Categorization
    Pages :254-256
    A.Kousar Nikhath, K.Subrahmanyam, R.Vasavi
    Abstract | PDFPDF
    57. Key Composite Encryption for Extensible Data Sharing in Cloud Storage
    Pages :257-259
    Prof. S. S. Nirmal, Snehal D.Andhale, Suvarna N. Pansare, Vrushali S.Kharde, Liladhar R.Raut
    Abstract | PDFPDF
    58. A Combined Rough Sets–K-means Vector Quantization Model for Arabic Speech Recognizer
    Pages :260-265
    Elsadig Ahmed Mohamed, Hanan Adlan, Abd. Rahman Ramli
    Abstract | PDFPDF
    59. Modified Porter Stemming Algorithm
    Pages :266-269
    Atharva Joshi, Nidhin Thomas, Megha Dabhade
    Abstract | PDFPDF
    60. Forgery Detection in Video Using Watermarking: A Review
    Pages :270-274
    Sonal R. Papinwar, P.H.Pawar
    Abstract | PDFPDF
    61. Load Balancing Algorithm with Threshold value for Cloud Computing
    Pages :275-277
    Ranjan Kumar Mondal, Enakshmi Nandi, Payel Ray, Debabrata Sardder
    Abstract | PDFPDF
    62. A Survey Paper on Efficient Processing of AJAX Data using Mining Algorithms
    Pages :278-280
    Pooja P. Taral, Prof. Pravin D. Soni
    Abstract | PDFPDF
    63. Survey on Content Based Recommendation System
    Pages :281-284
    Nymphia Pereira, SatishKumar Varma
    Abstract | PDFPDF
    64. Big Data-Concepts, Tools and Foresight
    Pages :285-291
    Ravi Shaw, Samiddha Mukherjee, Nilanjan Haldar, Satyasaran Changdar
    Abstract | PDFPDF
    65. Decision making using Multi Inference-LDA Algorithm
    Pages :292-296
    Kanchana J, Gladston Raj S
    Abstract | PDFPDF
    66. A Survey On Data Mining Algorithm
    Pages :297-301
    Rohit Jacob Mathew, Sasi Rekha Sankar, Preethi Varsha. V
    Abstract | PDFPDF
    67. Physical Resource Block Allocation Scheme-a novel approach for Balancing QoS in Wireless Mobile Communication
    Pages :302-305
    Omkar B. Bhalke, T. A. Chavan
    Abstract | PDFPDF
    68. Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data
    Pages :306-311
    G. Vaitheeswaran, Dr. L. Arockiam
    Abstract | PDFPDF
    69. Adjacent Search Outcomes with Keywords
    Pages :312-317
    P. Sunil Kumar Reddy, Prof. P. Govindarajulu
    Abstract | PDFPDF
    70. Study of Various Algorithms on Vertical Search in Medical Domain
    Pages :318-320
    Roshini R Nair, Bhagyshri Shukla, Manjiri Lad, Prof. Ashraf Siddiqui
    Abstract | PDFPDF
    71. Knowledge Discovery – Techniques and Application
    Pages :321-322
    Ajay Kumar, Indranath Chatterjee
    Abstract | PDFPDF
    72. Non-Separable Reversible Data Hiding Based on Histogram Shifting and Random Scramble Encryption
    Pages :323-328
    Ajay Trivedi, Dr.Pratima Gautam, Vijay Trivedi
    Abstract | PDFPDF
    73. Data Retrieval with Secure CP-ABE: A Review
    Pages :329-332
    Sharayu N. Bonde , Rahul Gaikwad
    Abstract | PDFPDF
    74. A Novel Secured Wireless Data and Key Exchange Mechanism for Adhoc Networks
    Pages :333-337
    Kosuru Surya Narayana, P Chandana
    Abstract | PDFPDF
    75. N-list based Friend Recommendation System Using Pre-rule Checking
    Pages :338-341
    Anil K.R, Gladston Raj S
    Abstract | PDFPDF
    76. Android Based Business Card Scanner: An OCR Based Approach
    Pages :342-348
    Prof. Kaushal Patel, Prof. Amit Choksi
    Abstract | PDFPDF
    77. Efficient Relational Data Management Using Access Control and Privacy-Preserving Mechanism
    Pages :349-352
    CH. Srinivasa Reddy, V.vasanthi, Ravuri Daniel, K.V.N. Rajesh
    Abstract | PDFPDF
    78. WSN Method of Pollution Monitoring System
    Pages :353-359
    Anju D, Dr. Vinodkumar Jacob
    Abstract | PDFPDF
    79. Improving the Transmission Performance of Fragmented Messages in Websocket
    Pages :360-362
    Raphael O Anumba
    Abstract | PDFPDF
    80. Video Source Identification
    Pages :363-366
    Naveen Sharma, Anwer Reyaz J, Balan C
    Abstract | PDFPDF
    81. Rule Based Classifier Models For Intrusion Detection System
    Pages :367-370
    Vivek kshirsagar, Madhuri S.Joshi
    Abstract | PDFPDF
    82. Model for Disconnectivity Analysis in Schizophrenics for Sternberg Item Recognition Paradigm
    Pages :371-374
    Meghana Nagori, Madhuri S.Joshi
    Abstract | PDFPDF
    83. Removal Speckle Noise from Medical Image Using Image Processing Techniques
    Pages :375-377
    Dr. Abdulaziz Saleh Yeslem Bin-Habtoor, Dr. Salem Saleh Al-amri
    Abstract | PDFPDF
    84. Article Removed
    Pages :xxx-xxx
    xxx
    Abstract | PDFPDF
    85. Large Graph mining Approach for Cluster Analysis to Identify Critical Components within the Water Distribution System
    Pages :384-391
    S.V.S.Santhi, Poosapati Padmaja
    Abstract | PDFPDF
    86. Adaptive Beamformer Using Nested Arrays and Multirate Techniques
    Pages :392-395
    Vrushali Golhar, M.R. Vargantwar
    Abstract | PDFPDF
    87. A Review on Prediction of Heart Diseases by Comparing Risk Factors in Data Mining
    Pages :396-398
    K.Manimekalai
    Abstract | PDFPDF
    88. Security System using Iris as Biometrics
    Pages :399-401
    Bakti B.Bhagnagare
    Abstract | PDFPDF
    89. Civic Complaint Application under Smart City Project
    Pages :402-406
    Satish Kumar Prasad, Ritesh Patil, Sagar Beldare, Prof. Anita Shinde
    Abstract | PDFPDF
    90. Edge Histogram Descriptor, Geometric Moment and Sobel Edge Detector Combined Features Based Object Recognition and Retrieval System
    Pages :407-412
    Neetesh Prajapati, Amit Kumar Nandanwar, G.S. Prajapati
    Abstract | PDFPDF
    91. Secure Message Transmission Ensuring Authentication Using Digital Signature and Watermarking
    Pages :413-416
    Shivi Garg, Manoj Kumar
    Abstract | PDFPDF
    92. Literature Perlustration of Opinion Analysis on E-commerce
    Pages :417-421
    Penubaka Balaji, Dr. O.Nagaraju, Prof. D.Haritha
    Abstract | PDFPDF
    93. Extraction of Hidden Opinion Based On Sentiment Analysis Using Word Alignment Model : A Review
    Pages :422-426
    Jayshri Vilas Borole, Nilesh Vani
    Abstract | PDFPDF
    94. A Study on Reversible Logic Gates of Quantum Computing
    Pages :427-432
    A.G.Aruna, K H Vani, C Sathya, R.Sowndarya Meena
    Abstract | PDFPDF
    95. Improved Clustering Approach for high Dimensional Citrus Image data
    Pages :433-440
    Dr. M. Lavanya
    Abstract | PDFPDF
    96. Web Application Security: A Survey
    Pages :441-445
    Leena Jacob, Virginia Mary Nadar, Madhumita Chatterjee
    Abstract | PDFPDF
    97. STAR: A Comparison of Points-To Analysis Algorithms
    Pages :446-451
    Kanchan Arora
    Abstract | PDFPDF
    98. Feasibility Study of Management Information System and Application of it in Dairy Industry
    Pages :452-456
    Prof. Rajesh S. Walse, Ajay B. Kurhe
    Abstract | PDFPDF
    99. Meeting the challenge of Virtualization impact on Cloud services
    Pages :457-461
    N.L.Udaya Kumar, Dr.M.Siddappa
    Abstract | PDFPDF
    100. Event Based Campus Navigation System
    Pages :462-464
    Sunil Bendre, Narendra Patil, Dhananjay Kanawade, Sagar Kandekar, Rutuja Kirpal
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-