1. |
A Literature Survey on Handwritten Character Recognition
Pages :1-5
Ayush Purohit, Shardul Singh Chauhan
Abstract | PDF |
2. |
A Literature Survey on Mood Detection System
Pages :6-10
Rajneesh Singla
Abstract | PDF |
3. |
Evaluating Digital Image Watermarking based on Image Interlacing, DWT & DCT.
Pages : 11-17
Mahejabi Khan, Ajay Kushwaha, Toran Verma
Abstract | PDF |
4. |
A Survey on Supporting Privacy Protection in Personalized Web Search
Pages : 18-21
Chanda Agarwal, Prof.Dr.Suhasini Itkar
Abstract | PDF |
5. |
Survey on Presentation Slides Generation for Academic Papers
Pages : 22-25
Ektaa G Meshram, Mrs. D. A. Phalke
Abstract | PDF |
6. |
Comparative Study of Text Line Segmentation on Handwritten Kannada Documents
Pages : 26-33
Chethana H T, Mamatha H R
Abstract | PDF |
7. |
Security in Mobile Cloud Computing: A Review
Pages : 34-39
Prashant Pranav, Naela Rizvi
Abstract | PDF |
8. |
Agile Methodologies
Pages :40-44
Sakshi Sachdeva
Abstract | PDF |
9. |
De-Noising Medical Images Using Low Rank Matrix Decomposition, NN and SVM
Pages : 45-48
Charankamaldeep Kaur, Nishu Bansal
Abstract | PDF |
10. |
Survey on Web Scale Based Near Duplicate Video Retrieval
Pages : 49-55
Bhosale Varsharani, D.A.Phalke
Abstract | PDF |
11. |
A Study on Improved Hop by Hop Congestion Control Algorithm
Pages : 56-59
Urvashi Handa, Padma Bonde
Abstract | PDF |
12. |
Machine Learning for Web Page Adpatation
Pages : 60-65
Neetu Narwal, Dr. Sanjay Kumar Sharma
Abstract | PDF |
13. |
Establishment of Efficient Algorithm for Medical Image Diagnosis
Pages : 66-70
A. Sorna Gowri, Dr. K. Ramar
Abstract | PDF |
14. |
A Framework to Classify the Satellite Images
Pages :71-73
Manali Jain, Amit Sinha
Abstract | PDF |
15. |
Security Threats in Mobile Ad Hoc Networks - A Survey
Pages :78-82
Sanjeev Gangwar
Abstract | PDF |
16. |
A Comparative Study of Classification Techniques for Fire Data Set
Pages :71-73
Rachna Raghuwanshi
Abstract | PDF |
17. |
The Journey of e-Governance to Cloud: Hybrid Clouds as a Strategic Option
Pages :83-90
Muzaffar Azim, Dr. S. Kazim Naqvi
Abstract | PDF |
18. |
Comparative Study of Segmentation Methods applied on Cervical Cytology Images
Pages :91-93
G.Karthigai Lakshmi, K.Krishnaveni
Abstract | PDF |
19. |
Survey Paper on Deduplicating Data and Secure Auditing in Cloud
Pages :94-95
Meghana Vijay Kakde, Prof. N.B.Kadu
Abstract | PDF |
20. |
An Effective & Secure Data Sharing using Elliptic Curve with MD-5 in Cloud Computing
Pages :96-100
Rahul Sharma, Manoj Tyagi
Abstract | PDF |
21. |
Cloud Data Integrity using Password Based Digital Signatures
Pages :101-103
Ceena Mathews
Abstract | PDF |
22. |
Study of Various Attacks in MANET and Elaborative Discussion of RREQ Flooding Attack
and Its Solutions
Pages :104-107
Neha Kamdar, Vinita Sharma, Poorva Kakani
Abstract | PDF |
23. |
Real Time Taxi Ride Sharing
Pages :108-111
Prof. Deeksha Bhardwaj, Azam Khan, Sunny Patil, Rajat Dhoot
Abstract | PDF |
24. |
Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet
Pages :112-118
Chidambar P.Inamdar, Dr. C .Chandrasekar
Abstract | PDF |
25. |
A Survey on m-Privacy for Collaborative Data Publishing
Pages :119-122
Sarita D. Kashid,and Prof. Manasi K. Kulkarni
Abstract | PDF |
26. |
Auditing Cloud Environment Using Control Attribute Based Encryption
Pages :123-125
Vishal Dnyandeo Ghogare, Prof. S.D Jondhale
Abstract | PDF |
27. |
Card less ATM Cash Withdrawal: A simple and Alternate Approach
Pages :126-128
Nischaykumar Hegde, Sharath K R
Abstract | PDF |
28. |
Ontology Based Development of Learning System
Pages :129-131
Chinmay Kshirsagar, Tanaji Jadhav, Harshit Gupta
Abstract | PDF |
29. |
Android System for LAN Monitoring
Pages :132-134
Kiran Purkar, Akshay Jotrao, Nilesh Bade
Abstract | PDF |
30. |
A Survey on Security Attacks in Mobile Ad Hoc Networks
Pages :135-140
Saritha Reddy Venna, Ramesh Babu Inampudi
Abstract | PDF |
31. |
Intelligent Automatic Irrigation System
Pages :141-143
Dr.Sarika Tale, Sowmya P
Abstract | PDF |
32. |
A Novel method for securing packets against Reactive Jammer
Pages :144-148
G.Neelima, Dr. I. Ramesh Babu
Abstract | PDF |
33. |
Protocols for Implementing Histogram LOB in chord Networks
Pages :149-152
S.BhagyaRekha
Abstract | PDF |
34. |
Security Enhancement in HASBE for Cloud Computing Environment
Pages :153-156
B. K.Ugale, R. N. Phursule
Abstract | PDF |
35. |
A Literature Survey on Challenges and Issues on Mobile Ad Hoc Networks
Pages :157-162
Rajneesh Singla
Abstract | PDF |
36. |
Finding the Malicious URLs using Search Engines
Pages :163-166
Amruta Rajeev Nagaonkar, Umesh L. Kulkarni
Abstract | PDF |
37. |
A Comprehensive Review of Text Mining
Pages :167-169
Tarsem Singh
Abstract | PDF |
38. |
Identification of Common Challenges and Key Factors in Software Architecture Using Grounded
Theory
Pages :170-173
Vinay Krishna, Dr. Anirban Basu
Abstract | PDF |
39. |
Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network
Pages :174-180
Jyoti P.Desai, Prof Abhijit Patil
Abstract | PDF |
40. |
A Dynamic Algorithm approach in Distributed System
Pages :181-184
Divyaa Siingh, Dr.Vishal Nagar
Abstract | PDF |
41. |
Speech Recognition System for Medical Domain
Pages :185-189
Tripti Dodiya, Sonal Jain
Abstract | PDF |
42. |
A Text Polarity Analysis Using Sentiwordnet Based an Algorithm
Pages :190-193
Deepak Singh Tomar, Pankaj Sharma
Abstract | PDF |
43. |
Feature Selection Using Genetic Algorithm and Classification using Weka for Ovarian Cancer
Pages :194-196
Priyanka khare, Dr.Kavita Burse
Abstract | PDF |
44. |
Computational Intelligence, Granular Computing and Soft Computing
Pages :197-200
Aahan Bhatt
Abstract | PDF |
45. |
A Rule Enforced Information Flow Control System with Tagged Service Data for Cloud
Service Providers
Pages :201-207
Kirtibala Mali, Prof. Anurag Jain
Abstract | PDF |
46. |
An Idea to Recognition of Handwritten Characters using Genetic Algorithms
Pages :208-210
Samta Jain Goyal, Rajeev Goyal
Abstract | PDF |
47. |
A Review of Wireless Sensor Network with Its Applications
Pages :211-214
Navreetinder Kaur, Tarandeep Singh
Abstract | PDF |
48. |
Tweet Sarcasm: Mechanism of Sarcasm Detection in Twitter
Pages :215-217
Komalpreet Kaur Bindra, Ankita Gupta
Abstract | PDF |
49. |
Data Mining Case Study for Analysing Opinion Mining from Emotions in Social Network Sites in
Theni Dt., Tamilnadu
Pages :218-223
B. Nasreen Fathima, S. Jothi, R. Aswini
Abstract | PDF |
50. |
Agile Software Development: User Story Conversion
Pages :224-226
Purtee Kohli, Avnish Singh Jat, Vikas Agarwal
Abstract | PDF |
51. |
A Privacy Preserving and Data Dynamics for Storage Security in Cloud Computing by using
Third Party Auditor
Pages :227-231
M.Gayathri, S.Kanchana, R.Rajkumar, Dr.S.Rajkumar
Abstract | PDF |
52. |
Study of a Disease Sample Pixel Clustering for
Accurate Infection Prediction Using Image Processing and Data Mining
Pages :232-233
Milind H. Padgavankar, Shrikant P. Akarte
Abstract | PDF |
53. |
A Novel Categorized Search Strategy using Distributional Clustering
Pages :234-238
Neenu Joseph. M, Sudheep Elayidom
Abstract | PDF |
54. |
Disassembling and Patching iOS Applications
Pages :239-248
Arpita Jadhav Bhatt, Chetna Gupta
Abstract | PDF |
55. |
Multiclass Vehicle Detection and Tracking Using Local Visual Features
Pages :249-253
Prof. Deepali Sale, Namrata Bhole, Prof. S.D.Chavan
Abstract | PDF |
56. |
Building a K-Nearest Neighbor Classifier for Text
Categorization
Pages :254-256
A.Kousar Nikhath, K.Subrahmanyam, R.Vasavi
Abstract | PDF |
57. |
Key Composite Encryption for Extensible Data Sharing in Cloud Storage
Pages :257-259
Prof. S. S. Nirmal, Snehal D.Andhale, Suvarna N. Pansare, Vrushali S.Kharde, Liladhar R.Raut
Abstract | PDF |
58. |
A Combined Rough Sets–K-means Vector Quantization Model for Arabic Speech Recognizer
Pages :260-265
Elsadig Ahmed Mohamed, Hanan Adlan, Abd. Rahman Ramli
Abstract | PDF |
59. |
Modified Porter Stemming Algorithm
Pages :266-269
Atharva Joshi, Nidhin Thomas, Megha Dabhade
Abstract | PDF |
60. |
Forgery Detection in Video Using Watermarking: A Review
Pages :270-274
Sonal R. Papinwar, P.H.Pawar
Abstract | PDF |
61. |
Load Balancing Algorithm with Threshold value for Cloud Computing
Pages :275-277
Ranjan Kumar Mondal, Enakshmi Nandi, Payel Ray, Debabrata Sardder
Abstract | PDF |
62. |
A Survey Paper on Efficient Processing of AJAX Data using Mining Algorithms
Pages :278-280
Pooja P. Taral, Prof. Pravin D. Soni
Abstract | PDF |
63. |
Survey on Content Based Recommendation System
Pages :281-284
Nymphia Pereira, SatishKumar Varma
Abstract | PDF |
64. |
Big Data-Concepts, Tools and Foresight
Pages :285-291
Ravi Shaw, Samiddha Mukherjee, Nilanjan Haldar, Satyasaran Changdar
Abstract | PDF |
65. |
Decision making using Multi Inference-LDA Algorithm
Pages :292-296
Kanchana J, Gladston Raj S
Abstract | PDF |
66. |
A Survey On Data Mining Algorithm
Pages :297-301
Rohit Jacob Mathew, Sasi Rekha Sankar, Preethi Varsha. V
Abstract | PDF |
67. |
Physical Resource Block Allocation Scheme-a novel approach for Balancing QoS in Wireless
Mobile Communication
Pages :302-305
Omkar B. Bhalke, T. A. Chavan
Abstract | PDF |
68. |
Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment
Analysis on Big Data
Pages :306-311
G. Vaitheeswaran, Dr. L. Arockiam
Abstract | PDF |
69. |
Adjacent Search Outcomes with Keywords
Pages :312-317
P. Sunil Kumar Reddy, Prof. P. Govindarajulu
Abstract | PDF |
70. |
Study of Various Algorithms on Vertical Search in Medical Domain
Pages :318-320
Roshini R Nair, Bhagyshri Shukla, Manjiri Lad, Prof. Ashraf Siddiqui
Abstract | PDF |
71. |
Knowledge Discovery – Techniques and Application
Pages :321-322
Ajay Kumar, Indranath Chatterjee
Abstract | PDF |
72. |
Non-Separable Reversible Data Hiding Based on Histogram Shifting and Random Scramble
Encryption
Pages :323-328
Ajay Trivedi, Dr.Pratima Gautam, Vijay Trivedi
Abstract | PDF |
73. |
Data Retrieval with Secure CP-ABE: A Review
Pages :329-332
Sharayu N. Bonde , Rahul Gaikwad
Abstract | PDF |
74. |
A Novel Secured Wireless Data and Key Exchange Mechanism for Adhoc Networks
Pages :333-337
Kosuru Surya Narayana, P Chandana
Abstract | PDF |
75. |
N-list based Friend Recommendation System Using Pre-rule Checking
Pages :338-341
Anil K.R, Gladston Raj S
Abstract | PDF |
76. |
Android Based Business Card Scanner: An OCR Based Approach
Pages :342-348
Prof. Kaushal Patel, Prof. Amit Choksi
Abstract | PDF |
77. |
Efficient Relational Data Management Using Access Control and Privacy-Preserving
Mechanism
Pages :349-352
CH. Srinivasa Reddy, V.vasanthi, Ravuri Daniel, K.V.N. Rajesh
Abstract | PDF |
78. |
WSN Method of Pollution Monitoring System
Pages :353-359
Anju D, Dr. Vinodkumar Jacob
Abstract | PDF |
79. |
Improving the Transmission Performance of Fragmented Messages in Websocket
Pages :360-362
Raphael O Anumba
Abstract | PDF |
80. |
Video Source Identification
Pages :363-366
Naveen Sharma, Anwer Reyaz J, Balan C
Abstract | PDF |
81. |
Rule Based Classifier Models For Intrusion Detection System
Pages :367-370
Vivek kshirsagar, Madhuri S.Joshi
Abstract | PDF |
82. |
Model for Disconnectivity Analysis in Schizophrenics for Sternberg Item Recognition
Paradigm
Pages :371-374
Meghana Nagori, Madhuri S.Joshi
Abstract | PDF |
83. |
Removal Speckle Noise from Medical Image Using Image Processing Techniques
Pages :375-377
Dr. Abdulaziz Saleh Yeslem Bin-Habtoor, Dr. Salem Saleh Al-amri
Abstract | PDF |
84. |
Article Removed
Pages :xxx-xxx
xxx
Abstract | PDF |
85. |
Large Graph mining Approach for Cluster
Analysis to Identify Critical Components
within the Water Distribution System
Pages :384-391
S.V.S.Santhi, Poosapati Padmaja
Abstract | PDF |
86. |
Adaptive Beamformer Using Nested Arrays and Multirate Techniques
Pages :392-395
Vrushali Golhar, M.R. Vargantwar
Abstract | PDF |
87. |
A Review on Prediction of Heart Diseases by Comparing Risk Factors in Data Mining
Pages :396-398
K.Manimekalai
Abstract | PDF |
88. |
Security System using Iris as Biometrics
Pages :399-401
Bakti B.Bhagnagare
Abstract | PDF |
89. |
Civic Complaint Application under Smart City Project
Pages :402-406
Satish Kumar Prasad, Ritesh Patil, Sagar Beldare, Prof. Anita Shinde
Abstract | PDF |
90. |
Edge Histogram Descriptor, Geometric Moment and Sobel Edge Detector Combined Features
Based Object Recognition and Retrieval System
Pages :407-412
Neetesh Prajapati, Amit Kumar Nandanwar, G.S. Prajapati
Abstract | PDF |
91. |
Secure Message Transmission Ensuring Authentication Using Digital Signature and
Watermarking
Pages :413-416
Shivi Garg, Manoj Kumar
Abstract | PDF |
92. |
Literature Perlustration of Opinion Analysis on E-commerce
Pages :417-421
Penubaka Balaji, Dr. O.Nagaraju, Prof. D.Haritha
Abstract | PDF |
93. |
Extraction of Hidden Opinion Based On Sentiment Analysis Using Word Alignment Model
: A Review
Pages :422-426
Jayshri Vilas Borole, Nilesh Vani
Abstract | PDF |
94. |
A Study on Reversible Logic Gates of Quantum Computing
Pages :427-432
A.G.Aruna, K H Vani, C Sathya, R.Sowndarya Meena
Abstract | PDF |
95. |
Improved Clustering Approach for high Dimensional Citrus Image data
Pages :433-440
Dr. M. Lavanya
Abstract | PDF |
96. |
Web Application Security: A Survey
Pages :441-445
Leena Jacob, Virginia Mary Nadar, Madhumita Chatterjee
Abstract | PDF |
97. |
STAR: A Comparison of Points-To Analysis Algorithms
Pages :446-451
Kanchan Arora
Abstract | PDF |
98. |
Feasibility Study of Management Information System and Application of it in Dairy Industry
Pages :452-456
Prof. Rajesh S. Walse, Ajay B. Kurhe
Abstract | PDF |
99. |
Meeting the challenge of Virtualization impact on Cloud services
Pages :457-461
N.L.Udaya Kumar, Dr.M.Siddappa
Abstract | PDF |
100. |
Event Based Campus Navigation System
Pages :462-464
Sunil Bendre, Narendra Patil, Dhananjay Kanawade, Sagar Kandekar, Rutuja Kirpal
Abstract | PDF |
|
|