1. |
A Distributed Learning System
Pages :465-466
Ritisha Thakar, Pratibha Pal, Bhavya Bangera, Prof. Anshika Gupta
Abstract | PDF |
2. |
Classification of Mammogram Using Wave Atom Transform and Support Vector Machine Classifier
Pages :467-470
A.Rajesh and Dr. Mohan Ellappan
Abstract | PDF |
3. |
A Literature Survey on Keyword Query Processing in Web Search Engines
Pages : 471-473
Kalyani Wagaj, Prof.Subhash Pingale
Abstract | PDF |
4. |
Application of Wireless Sensor Network at Home
Pages : 474-475
Geeta Gupta, Mohit Rathore, Binoda Nand Prasad, Vikas Gupta
Abstract | PDF |
5. |
A Survey on Ontology Building Methodologies and Tools for Indian Languages
Pages :476-479
Pooja Jidge, Prof. Sharvari Govilkar
Abstract | PDF |
6. |
A Survey on Text Categorization Techniques for Indian Regional Languages
Pages :480-483
Pooja Bolaj, Sharvari Govilkar
Abstract | PDF |
7. |
Deep Learning: The Holy Grail of Artificial Intelligence?
Pages :484-485
Dachapally Prudhviraj
Abstract | PDF |
8. |
A Novel Approach for Data Leakage Detection Using Steganography
Pages :486-489
P.P.Dandavate, Prof.S.S.Dhotre
Abstract | PDF |
9. |
Adaptive Sorting Using Machine Learning
Pages :490-493
Somshubra Majumdar, Ishaan Jain, Kunal Kukreja, Professor Kiran Bhowmick
Abstract | PDF |
10. |
A Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network (WSN)
Pages :494-497
Achyutha Prasad N, Dr. Siddaraju
Abstract | PDF |
11. |
Efficient Role-based self-organization Algorithm for Creation of Network in MANETs
Pages :498-502
Dinesh A. Kulkarni, Suhas H. Patil
Abstract | PDF |
12. |
Comparision and Assesment of Evolutionary and Parallel Genetic Algorithms for a Cryptarithmetic
Problem
Pages :503-506
Dr. J P Patra, Nayan Shivhare, Shraddha Verma
Abstract | PDF |
13. |
Profile Similarity Technique for Detection of Duplicate Profiles in Online Social Network
Pages :507-512
Dr. M. Nandhini, Bikram Bikash Das
Abstract | PDF |
14. |
Replica Detection and Eliminating XML Duplicates in Hierarchical Data
Pages :513-516
R.Rajkumar, M.Gayathri, S.Kanchana, Dr.S.Rajkumar
Abstract | PDF |
15. |
Alternatives to CAPTCHA
Pages :517-518
Siddharth Syal
Abstract | PDF |
16. |
Image Processing Approach for Grading And Identification Of Diseases On Pomegranate Fruit:
An Overview
Pages :519-522
D. S. Gaikwad , K. J. Karande
Abstract | PDF |
17. |
Development of E-Scholarship System
Pages :523-530
Mohammed Abdullahi Jibrin, Muhammad Ndagie Musa, Shittu Tahir
Abstract | PDF |
18. |
New technique for Web page Information Categorization using Unsupervised Clustering
Pages :531-536
Neeraj Mehta, Avinash Rathore
Abstract | PDF |
19. |
Management of User Revocation with Public Auditing for Shared Data in the Cloud
Pages :537-539
ANJU T G, SIVADASAN E T
Abstract | PDF |
20. |
A Multimodal Approach to Biometric Recognition
Pages :540-545
Richie M. Varghese
Abstract | PDF |
21. |
Use of Elliptic Curve Cryptography for Integrity and Authentication
Pages :546-548
Swati Sucharita Barik, Smruti Sephalika Barik
Abstract | PDF |
22. |
Securing the Virtual Machines in Cloud
Environment Using Hypervisor-based Technology
Pages :549-552
Gaurav Mhatre, Harshali Mhatre
Abstract | PDF |
23. |
Ridge Distance Averaging Based Matching for Interoperability of Fingerprint Sensors
Pages :553-561
M. Selvakumar, D. Nedumaran
Abstract | PDF |
24. |
A Study on Vision Based Sign Language Translation
Pages :562-565
Ashmi Chheda, Janvi Beed, Siddhi Barbhaya, Prof. Bhakti Palkar
Abstract | PDF |
25. |
SQL Injection Prevention by Blocking Internet Protocol Address after Analysing Error Message of
Database Server
Pages :566-569
Sanjay Mishra, Subodh Mishra, Vivek Sharma
Abstract | PDF |
26. |
Modified Animal Migration Optimization Algorithm for Numerical Function Optimization
Pages :570-574
AmrataSaraswat, Dushyant Singh
Abstract | PDF |
27. |
A Survey on Steganography Techniques & Genetic Algorithm based Steganography in Image Masking
Pages :575-576
Farheen Fatima, Shashwat Shukla, Brahma Hazela
Abstract | PDF |
28. |
Directory Structure and File Allocation Methods
Pages :577-582
Mandeep Kaur, Sofia Singh, Rupinder Kaur
Abstract | PDF |
29. |
Resolving Mobile Communique App Using Classification of Data Mining Technique
Pages :583-587
M.Mohamed Suhail, K.SyedKousarNiasi,
Abstract | PDF |
30. |
Survey on Cryptographic Schemes for Security in Cloud Data Storage
Pages :588-592
Mounesh, Pandurang.D.R, Basavaprabhu, Sagar V, Shyamala G
Abstract | PDF |
31. |
Cloud Computing Environment-Legal Obstacles
Pages :593-597
Sumeet V. Vinchurkar, Ajay A. Jaiswal
Abstract | PDF |
32. |
Performance of various Clustering Algorithm Used in Wireless Sensor Network
Pages :598-603
Ananya Saxena, Dr. Deepshikha Agarwal
Abstract | PDF |
33. |
ASMF: Attribute Signature Management Framework for Digital Document Security and Integrity
Pages :604-609
Deepika Pawar, Prof. Mahendra K. Verma
Abstract | PDF |
34. |
Smart Dustbins for Smart Cities
Pages :610-611
Bikramjit Singh, Manpreet Kaur
Abstract | PDF |
35. |
Facial Expression Detection
Pages :612-615
Nabeelaa Hanjgika, Dhara T Kurian
Abstract | PDF |
36. |
An Efficient Face Recognition & Tracking using Hybrid Filtering & Eigen Faces
Pages :616-619
MD Sarfaraz Jalil, Joy Bhattacharya
Abstract | PDF |
37. |
Survey on Trust Models in Peer to Peer File Sharing Systems
Pages :620-622
Aswani Ashok, Jayakumar T V
Abstract | PDF |
38. |
Prediction of Mobile Ad Click Using Supervised
Classification Algorithms
Pages :623-625
M. Sree Vani
Abstract | PDF |
39. |
An Improved Reversible Data Hiding Scheme Using AMBTC Compression (IRSAC)
Pages :626-630
Pranjal Shrivastava, Sandeep Pratap Singh
Abstract | PDF |
40. |
Cloud based Magixphone and Web gaming Platform
Pages :631-633
Aditi Kore, Komal Lunkad, Pranjali Ingole, Sonia Gupta
Abstract | PDF |
41. |
Secured and Scalable Data Sharing by Authenticated User Using Key Aggregate
Cryptosystem Technique
Pages :634-636
Shreya Kulkarni, Punam Channa, Chandani Madavi, Prof. D. A. Kulkarni
Abstract | PDF |
42. |
Speeding up of Search Engine by Detection and Control of Duplicate Documents on the Web
Pages :637-642
Rekha V R, Resmy V R
Abstract | PDF |
43. |
Applying Parallel Genetic and Considering Proximity for Resource Allocation in Cloud
Pages :643-646
Romil Chauhan, Yash Jain, Harsh Agarwal, Aruna Gawde
Abstract | PDF |
44. |
Assessment of Component Generality using Fuzzy Approach to Optimize Software Development Cost
Pages :647-654
Dr. Parul Gandhi
Abstract | PDF |
45. |
Flexible Content Based Video Surveillance System for crime Prevention based on moving object
detection
Pages :655-660
Snehal Anwekar, Isha Walimbe, Priyanka Suryagan,Alisha Gujarathi, Kalpana Thakre
Abstract | PDF |
46. |
Survey: Opinion Spam Detection Approaches and Techniques
Pages :661-664
P.N.V.S.Pavan Kumar, A.Suresh Babu , N.Kasiviswanath
Abstract | PDF |
47. |
Crop Recommendation and Fertilizer Purchase System
Pages :665-667
Mansi Shinde, Kimaya Ekbote, Sonali Ghorpade,Sanket Pawar, Shubhada Mone
Abstract | PDF |
48. |
A Review Paper on Energy Efficient Hierarchical Protocols in Wireless Sensor Networks
Pages :623-625
Zia Ur Rahman, Parul Yadav
Abstract | PDF |
49. |
Cyber Security Tools
Pages :672-674
Gunjan.Hardasmalani, Rashmi.Bajaj, Harsha.Sachdev
Abstract | PDF |
50. |
Comparative Analysis of IPV4 and IPV6
Pages :675-678
Samson Isaac
Abstract | PDF |
51. |
Big Data Security Analytics
Pages :679-681
K. Radhika, G. Vijaya
Abstract | PDF |
52. |
Hierarchical Cluster Based Energy Efficient Routing
Protocol for Wireless Sensor Networks: A Survey
Pages :682-687
Puneet Gurbani, Hansa Acharya, Prof. Anurag Jain
Abstract | PDF |
53. |
Energy Efficient Data Gathering by Mobility Sink in Wireless Sensor Networks
Pages :688-691
R.Jayaprasanth, Kiran.R.Alex, K.Ashok Kumar
Abstract | PDF |
54. |
Performance Evaluation of Rule Enforced Information Flow Control System With
Tagged Service Data For CSPs
Pages :692-699
Kirtibala Mali, Prof. Anurag Jain
Abstract | PDF |
55. |
Performance Analysis of AODV and AOMDV and Compare to the MAODV Routing Protocol for
MANET Scenario
Pages :700-702
Megha Joshi, Praveen Kumar Goutam
Abstract | PDF |
56. |
Randomized Honey Bee Load Balancing Algorithm in Cloud Computing System
Pages :703-707
Monika Rathore, Sarvesh Rai, Navdeep Saluja
Abstract | PDF |
57. |
An Efficient method of Web Document Clustering with Semantic Representation of Documents
Pages :708-710
Raja Varma Pamba, Dr Elizabeth Sherly
Abstract | PDF |
58. |
Remote Access of Android Smart Phone
Pages :711-714
Onkar Mule, Nihal Shaikh, Pratik Shinde, Amit Wagaskar, Prof. Sneha Ramteke
Abstract | PDF |
59. |
The second-order nonlinearity of a class of Boolean functions
Pages :715-720
Manish Garg
Abstract | PDF |
60. |
Noise Reduction in MRI Images using Contourlet Transform and Threshold Shrinkages Techniques
Pages :723-728
Jannath Firthouse.P, Shajun Nisha.S, Dr.M.Mohammed Sathik
Abstract | PDF |
61. |
Secured Sharing of Medical Data on Hybrid Cloud Environment
Pages :729-733
M.Nandhini, K.A.Muthukumar
Abstract | PDF |
62. |
Selective De-noising of Sparse-Coloured Images
Pages :734-737
Arjun Chaudhuri
Abstract | PDF |
63. |
An Experimental Study of Performance Comparison for Various Parallel Sorting Algorithms
Pages :738-740
Jagdeep Singh, Alka Singh, Garima Singh
Abstract | PDF |
64. |
A Review of Load Balancing Technique of Cloud Computing Using Swarm Intelligence
Pages :741-744
Abhishek Kumar Tiwari, Sreeja Nair
Abstract | PDF |
65. |
Distributed Content Aggregation& Content Change Detection using Bloom Filters
Pages :745-748
Sornalingam Nadaraj
Abstract | PDF |
66. |
A Methodology for Incorporation of Domain Ontology in Knowledge Discovery Process for Interpretation and Improvement of Mining Results
Pages :749-754
Joachim Narzary, Dr. S. Siva Sathya, Minisrang Basumatary
Abstract | PDF |
67. |
Quantitative Analysis of Dairy Product Packaging with the Application of Data Mining Techniques
Pages :755-759
Ankita Chopra, Yukti Ahuja, Mahima Gupta
Abstract | PDF |
68. |
Web Based Placement Management System
Pages :760-763
Anjali.V, Jeyalakshmi.PR, Anbubala.R, Sri Mathura devi.G ,Ranjini.V
Abstract | PDF |
69. |
Extracting More Relevant Features from Color Image for Enhancing the Image Retrieval Using
Genetic Algorithm
Pages :764-768
Aruna Bajpai
Abstract | PDF |
70. |
Big Data Concepts and Analysis: A Survey
Pages :769-772
Ran vijay singh, Sheenu Rizvi
Abstract | PDF |
71. |
Robotic Control Using an Android Application
Pages :773-776
Saurabh Khoje, Devendra Urad, Monika Shirke, Prof. Anita Shinde
Abstract | PDF |
72. |
Object Tracking and Motion Estimation Using Particle Swarm Optimization
Pages :777-779
Yateen Kedare, Rohit Thakare, Jayesh Raghuwanshi, Vedant Deokar
Abstract | PDF |
73. |
Privacy My Decision: Control of Photo Sharing on Online Social Networks
Pages :780-782
P.Srilakshmi, S.Aaratee, S. Subbalakshmi
Abstract | PDF |
74. |
Triple Layer Security to Data in Cloud
Pages :783-785
R.Kalaivani
Abstract | PDF |
75. |
Determining an Optimal Parenthesization of a Matrix Chain Product using Dynamic
Programming
Pages :786-792
Vivian Brian Lobo, Flevina D’souza, Pooja Gharat, Edwina Jacob, and Jeba Sangeetha Augestin
Abstract | PDF |
76. |
Secured Digital Image Watermarking by using a Hybrid Technique with Kalman Filtering
Pages :793-798
Samreet Kaur, Ravneet Kaur Sidhu
Abstract | PDF |
77. |
Cyber Attack Detection Techniques – Solutions
Pages :799-801
P.Vishalini, K.Swaroopa Rani, Ch.Vimala
Abstract | PDF |
78. |
Performance Analysis of SSA under the Secure Environment
Pages :802-806
Navpreet Bhathal, Sukhpreet Kaur
Abstract | PDF |
79. |
Survey on Secure Data Self-Destructing Scheme in Cloud Computing
Pages :807-808
M.Bhandari, Pooja Chaudhari, Sonal Sonawane, Bhagyashree Shetkar,. Manisha Konde
Abstract | PDF |
80. |
Diversification of User Recommendations Using Entropy Redistribution
Pages :809-810
Abhinav Pachauri
Abstract | PDF |
81. |
Improve the Efficiency of Load Balancing in Cloud Environment using DAG and Honey Bee
Algorithm
Pages :811-815
Abhishek Kumar Tiwari, Sreeja Nair
Abstract | PDF |
82. |
Location Based Advertising Promotions on Mobile Device
Pages :816-819
Yogita V. Salvi, Dr.V.R.Ghorpade
Abstract | PDF |
83. |
An Improved and Optimal Prediction of Bone Disease Based On Risk Factors
Pages :820-823
M.Saranya, K.Sarojini
Abstract | PDF |
84. |
Article Removed
Pages :824-826
xxx, xxx
Abstract | PDF |
85. |
Review On: Privacy-Preserving in Wireless Networks
Pages :827-829
Vishal Mahajan, Priyakanksha Mahajan
Abstract | PDF |
86. |
A Review Paper on Solving 0-1 knapsack Problem with Genetic Algorithms
Pages :830-832
Veenu Yadav, Ms.Shikha Singh
Abstract | PDF |
87. |
Genetic Algorithm for Outlier Detection
Pages :833-835
Maria Afzal, S M Arif Ashraf
Abstract | PDF |
88. |
Content Based Video Retrieval System
Pages :836-838
Yojita Raut, Madhuri Shimpi, Mansvi Patil
Abstract | PDF |
89. |
Securing the Clouds using OTP Technology
Pages :839-842
Sandeep Mali, Kishor Sawant, Nilesh Thombare, Vinod Bharat
Abstract | PDF |
90. |
Towards Better Accuracy and Risk Handling In Cost Estimation Using Assessment Values
Pages :843-848
Renu Goswami, Ajay Kumar Sharma
Abstract | PDF |
91. |
Didactics in Online Learning Technical Courses: A Case Study Based on Activity Theory
Pages :849-854
Abdelali IBRIZ, Mohamed BENSLIMANE , Kamar OUAZZANI
Abstract | PDF |
92. |
Automatic Load Balancing of Applications Using Class Constrained Bin Packing Algorithm: A Review
Pages :855-857
Akshay Karale, Shradha Katte,Prashant Yadav, Chetan Godha
Abstract | PDF |
93. |
Parallel Popular Crime Pattern Mining in Multidimensional Databases
Pages :858-863
BVS. Varma, V. Valli Kumari
Abstract | PDF |
94. |
Data Access For Cloud Users Using Strong Token Authentication
Pages :864-870
Ali Asgar Hussain, Reetu Gupta
Abstract | PDF |
95. |
Autonomous Cloud Computation with Distribution Enactment and Proficient Data Veracity Process
Pages :871-874
Joshuva Baretto, Prof Mohan K
Abstract | PDF |
96. |
A Literature Survey on Efficient Software Bug Triaging Using Software Data Reduction
Techniques
Pages :875-877
Prof. Subhash Pingale, Prof. R.A.Taklikar, Ankita Godse
Abstract | PDF |
97. |
Performance Measure of Hard c-means,Fuzzy c-means and Alternative c-means Algorithms
Pages :878-883
Binoda Nand Prasad, Mohit Rathore, Geeta Gupta, Tarandeep Singh
Abstract | PDF |
98. |
Service Composition Techniques for a Context- Aware Smart Hospital Ward Monitoring System
Pages :884-887
Ashok Immanuel V, Preethi R
Abstract | PDF |
99. |
I-Detector: An Intelligent Real Time Monitoring Vehicle System for Taxis
Pages :888-890
Akshay Malkampate, Apurva Maandaay, Rahul Mandora
Abstract | PDF |
100. |
Adapting Web Content Using Internet Speed for Mobile Devices
Pages :891-892
Yugandhara R. Firake, Pooja Sharma , Sayali Sinkar, Vishakha Warade
Abstract | PDF |
101. |
Time-Frequency Spectral Analysis of Single - Channel Earthquake Data for P-Wave Detection
Pages :893-895
Pooja Sarin, Prof. Poonam Dabas
Abstract | PDF |
102. |
Face Recognition Using Artificial Neural Networks
Pages :896-899
Abhjeet Sekhon and Dr. Pankaj Agarwal
Abstract | PDF |
103. |
Multipath Routing Protocol for MANET
Pages :900-902
Versha Matre, Girish Kaushal, Piyush Chouhan
Abstract | PDF |
104. |
Cache Related Pre-emption Delays in Probabilistic Real Time System
Pages :903-907
Prof. Minal V. Domke, Prof. Pritee Saktel, Prof. Ekta Gupta
Abstract | PDF |
105. |
Unmanned Ground Vehicle Using Ultrasonic Ranging module
Pages :908-909
Krutika Basinge, Sejal Nagpure, Punam Shinde, Prof.Y.K.Sharma
Abstract | PDF |
106. |
ECCS MENU: A Novel Implementation of Electronic Clearance Scheme
Pages :910-912
Charu Thaore, Gaurav Thapliyal
Abstract | PDF |
107. |
VD-kNN Query Processing over Untrusted Cloud
Pages :913-918
Utsav Raychaudhuri, Chandni Singhal, Neelima Shahi, Shital Jadhav, Vaishali Kolhe
Abstract | PDF |
108. |
Scheduling in the Queuing System with Asynchronously Varying Service Rates
Pages :919-921
Shyamsundar R, Geofrin Shirly. S
Abstract | PDF |
109. |
DIGITAL IMAGE PROCESSING – Sequence, Components and Pros
Pages :922-924
K.Radhika, P.Vishalini
Abstract | PDF |
110. |
Analysis of Fraud Detection Mechanism in Health Insurance Using Statistical Data Mining Techniques
Pages :925-927
Pravin R. Bagde, Manoj S. Chaudhari
Abstract | PDF |
111. |
Opportunistic Routing Protocols for Wireless Sensor Networks: A Survey
Pages :928-931
Mounika M, Chinnaswamy C N
Abstract | PDF |
112. |
A Study on Agent Based Modelling for Traffic Simulation
Pages :932-936
Priyadarsini Ghadai, L.Prachi Shree, Lelina Chhatria, RVVSV Prasad
Abstract | PDF |
113. |
Analyzing Social Media Data for Understanding Student’s Problem Based on Clustering Techniques
Pages :937-941
Shrinivas R Goud, Rahul Gaikwad
Abstract | PDF |
114. |
Parallelizing 1D Midpoint Displacement Algorithm for Terrain Generation
Pages :942-944
Yadav Mayank Subhash, Prakash Tripathi, P.S.Rao
Abstract | PDF |
115. |
Approaches to Rank Technical Blog Users : A Survey
Pages :945-950
Amruta Jadhav, Sharvari Tamane
Abstract | PDF |
116. |
ANALYSIS OF MESSAGE PASSING IN FOS: An Operating System for Clouds and Multicores
Pages :951-953
Akansha Gautam , Soma Sircar , Pankaj Gupta
Abstract | PDF |
117. |
SFITBOT
Pages :954-956
Natalina Rodrigues, Samiksha Salgaonkar, Shreya Salunke, Natasha Rego
Abstract | PDF |
118. |
Real Time Data Mining Using Cyber Physical System
Pages :957-959
Pallavi .P.Pophale , Dr.M.S.Ali
Abstract | PDF |
119. |
Prevention for Direct and Indirect Discrimination in Data Mining
Pages :960-963
Ms Nikhita B Ugale, Prof S D Deshpande
Abstract | PDF |
120. |
Enhanced SSO based Multi-Factor Authentication for Web Security
Pages :960-966
Shruti Bawaskar , Prof. Mahendra Verma
Abstract | PDF |
121. |
To Enhance Type 4 Clone Detection in Clone Testing
Pages :967-971
Swati Sharma, Priyanka Mehta
Abstract | PDF |
122. |
A Survey of Methods and Strategies in Tamil Palm Script Recognition
Pages :972-977
B. Kiruba, Mr.K.Manikandan
Abstract | PDF |
123. |
Ranking Web Forum Radical Influential Users Based On Textual Data through Sentiment
Classification
Pages :978-982
J.Jovitha Fastina, Dr.Ilango Krishnamurthi
Abstract | PDF |
124. |
Encryption Algorithm for Cloud Computing
Pages :983-989
Ankita Nandgaonkar, Prof. Pallavi Kulkarni
Abstract | PDF |
125. |
Correlation Based Image Tampering Detection
Pages :990-995
Priya Singh, Shalini Sharma Goel
Abstract | PDF |
126. |
Survey for Incentive Mechanism to Reduce Problem of Free Riders in Peer To Peer Network
Pages :996-1003
Priyanka kumrawat, Kamal Borana
Abstract | PDF |
127. |
Comparative Analysis of C, FORTRAN, C# and Java Programming Languages
Pages :1004-1007
Keshav Biswa, Bishal Jamatia, Deepjyoti Choudhury, Pallabi Borah
Abstract | PDF |
128. |
Parallel Histogram Sorting in MPI
Pages :1008-1010
Abhishek Pasari, Pentyala Srinivasa Rao
Abstract | PDF |
129. |
Improvement in Estimation of Unidentified Value (Gene Expression Data) in Biotechnology
Pages :1011-1013
Baitali Nath, Bindu Agarwalla, Laxman Sahoo
Abstract | PDF |
130. |
Survey of MANET Attacks, Security Concerns and Measures
Pages :1014-1017
Shweta Jadye
Abstract | PDF |
|
|