• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 7 ISSUE 2 March - April 2016

    ISSN 0975 - 9646

    1. A Distributed Learning System
    Pages :465-466
    Ritisha Thakar, Pratibha Pal, Bhavya Bangera, Prof. Anshika Gupta
    Abstract | PDFPDF
    2. Classification of Mammogram Using Wave Atom Transform and Support Vector Machine Classifier
    Pages :467-470
    A.Rajesh and Dr. Mohan Ellappan
    Abstract | PDFPDF
    3. A Literature Survey on Keyword Query Processing in Web Search Engines
    Pages : 471-473
    Kalyani Wagaj, Prof.Subhash Pingale
    Abstract | PDFPDF
    4. Application of Wireless Sensor Network at Home
    Pages : 474-475
    Geeta Gupta, Mohit Rathore, Binoda Nand Prasad, Vikas Gupta
    Abstract | PDFPDF
    5. A Survey on Ontology Building Methodologies and Tools for Indian Languages
    Pages :476-479
    Pooja Jidge, Prof. Sharvari Govilkar
    Abstract | PDFPDF
    6. A Survey on Text Categorization Techniques for Indian Regional Languages
    Pages :480-483
    Pooja Bolaj, Sharvari Govilkar
    Abstract | PDFPDF
    7. Deep Learning: The Holy Grail of Artificial Intelligence?
    Pages :484-485
    Dachapally Prudhviraj
    Abstract | PDFPDF
    8. A Novel Approach for Data Leakage Detection Using Steganography
    Pages :486-489
    P.P.Dandavate, Prof.S.S.Dhotre
    Abstract | PDFPDF
    9. Adaptive Sorting Using Machine Learning
    Pages :490-493
    Somshubra Majumdar, Ishaan Jain, Kunal Kukreja, Professor Kiran Bhowmick
    Abstract | PDFPDF
    10. A Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network (WSN)
    Pages :494-497
    Achyutha Prasad N, Dr. Siddaraju
    Abstract | PDFPDF
    11. Efficient Role-based self-organization Algorithm for Creation of Network in MANETs
    Pages :498-502
    Dinesh A. Kulkarni, Suhas H. Patil
    Abstract | PDFPDF
    12. Comparision and Assesment of Evolutionary and Parallel Genetic Algorithms for a Cryptarithmetic
    Problem

    Pages :503-506
    Dr. J P Patra, Nayan Shivhare, Shraddha Verma
    Abstract | PDFPDF
    13. Profile Similarity Technique for Detection of Duplicate Profiles in Online Social Network
    Pages :507-512
    Dr. M. Nandhini, Bikram Bikash Das
    Abstract | PDFPDF
    14. Replica Detection and Eliminating XML Duplicates in Hierarchical Data
    Pages :513-516
    R.Rajkumar, M.Gayathri, S.Kanchana, Dr.S.Rajkumar
    Abstract | PDFPDF
    15. Alternatives to CAPTCHA
    Pages :517-518
    Siddharth Syal
    Abstract | PDFPDF
    16. Image Processing Approach for Grading And Identification Of Diseases On Pomegranate Fruit: An Overview
    Pages :519-522
    D. S. Gaikwad , K. J. Karande
    Abstract | PDFPDF
    17. Development of E-Scholarship System
    Pages :523-530
    Mohammed Abdullahi Jibrin, Muhammad Ndagie Musa, Shittu Tahir
    Abstract | PDFPDF
    18. New technique for Web page Information Categorization using Unsupervised Clustering
    Pages :531-536
    Neeraj Mehta, Avinash Rathore
    Abstract | PDFPDF
    19. Management of User Revocation with Public Auditing for Shared Data in the Cloud
    Pages :537-539
    ANJU T G, SIVADASAN E T
    Abstract | PDFPDF
    20. A Multimodal Approach to Biometric Recognition
    Pages :540-545
    Richie M. Varghese
    Abstract | PDFPDF
    21. Use of Elliptic Curve Cryptography for Integrity and Authentication
    Pages :546-548
    Swati Sucharita Barik, Smruti Sephalika Barik
    Abstract | PDFPDF
    22. Securing the Virtual Machines in Cloud Environment Using Hypervisor-based Technology
    Pages :549-552
    Gaurav Mhatre, Harshali Mhatre
    Abstract | PDFPDF
    23. Ridge Distance Averaging Based Matching for Interoperability of Fingerprint Sensors
    Pages :553-561
    M. Selvakumar, D. Nedumaran
    Abstract | PDFPDF
    24. A Study on Vision Based Sign Language Translation
    Pages :562-565
    Ashmi Chheda, Janvi Beed, Siddhi Barbhaya, Prof. Bhakti Palkar
    Abstract | PDFPDF
    25. SQL Injection Prevention by Blocking Internet Protocol Address after Analysing Error Message of
    Database Server

    Pages :566-569
    Sanjay Mishra, Subodh Mishra, Vivek Sharma
    Abstract | PDFPDF
    26. Modified Animal Migration Optimization Algorithm for Numerical Function Optimization
    Pages :570-574
    AmrataSaraswat, Dushyant Singh
    Abstract | PDFPDF
    27. A Survey on Steganography Techniques & Genetic Algorithm based Steganography in Image Masking
    Pages :575-576
    Farheen Fatima, Shashwat Shukla, Brahma Hazela
    Abstract | PDFPDF
    28. Directory Structure and File Allocation Methods
    Pages :577-582
    Mandeep Kaur, Sofia Singh, Rupinder Kaur
    Abstract | PDFPDF
    29. Resolving Mobile Communique App Using Classification of Data Mining Technique
    Pages :583-587
    M.Mohamed Suhail, K.SyedKousarNiasi,
    Abstract | PDFPDF
    30. Survey on Cryptographic Schemes for Security in Cloud Data Storage
    Pages :588-592
    Mounesh, Pandurang.D.R, Basavaprabhu, Sagar V, Shyamala G
    Abstract | PDFPDF
    31. Cloud Computing Environment-Legal Obstacles
    Pages :593-597
    Sumeet V. Vinchurkar, Ajay A. Jaiswal
    Abstract | PDFPDF
    32. Performance of various Clustering Algorithm Used in Wireless Sensor Network
    Pages :598-603
    Ananya Saxena, Dr. Deepshikha Agarwal
    Abstract | PDFPDF
    33. ASMF: Attribute Signature Management Framework for Digital Document Security and Integrity
    Pages :604-609
    Deepika Pawar, Prof. Mahendra K. Verma
    Abstract | PDFPDF
    34. Smart Dustbins for Smart Cities
    Pages :610-611
    Bikramjit Singh, Manpreet Kaur
    Abstract | PDFPDF
    35. Facial Expression Detection
    Pages :612-615
    Nabeelaa Hanjgika, Dhara T Kurian
    Abstract | PDFPDF
    36. An Efficient Face Recognition & Tracking using Hybrid Filtering & Eigen Faces
    Pages :616-619
    MD Sarfaraz Jalil, Joy Bhattacharya
    Abstract | PDFPDF
    37. Survey on Trust Models in Peer to Peer File Sharing Systems
    Pages :620-622
    Aswani Ashok, Jayakumar T V
    Abstract | PDFPDF
    38. Prediction of Mobile Ad Click Using Supervised Classification Algorithms
    Pages :623-625
    M. Sree Vani
    Abstract | PDFPDF
    39. An Improved Reversible Data Hiding Scheme Using AMBTC Compression (IRSAC)
    Pages :626-630
    Pranjal Shrivastava, Sandeep Pratap Singh
    Abstract | PDFPDF
    40. Cloud based Magixphone and Web gaming Platform
    Pages :631-633
    Aditi Kore, Komal Lunkad, Pranjali Ingole, Sonia Gupta
    Abstract | PDFPDF
    41. Secured and Scalable Data Sharing by Authenticated User Using Key Aggregate Cryptosystem Technique
    Pages :634-636
    Shreya Kulkarni, Punam Channa, Chandani Madavi, Prof. D. A. Kulkarni
    Abstract | PDFPDF
    42. Speeding up of Search Engine by Detection and Control of Duplicate Documents on the Web
    Pages :637-642
    Rekha V R, Resmy V R
    Abstract | PDFPDF
    43. Applying Parallel Genetic and Considering Proximity for Resource Allocation in Cloud
    Pages :643-646
    Romil Chauhan, Yash Jain, Harsh Agarwal, Aruna Gawde
    Abstract | PDFPDF
    44. Assessment of Component Generality using Fuzzy Approach to Optimize Software Development Cost
    Pages :647-654
    Dr. Parul Gandhi
    Abstract | PDFPDF
    45. Flexible Content Based Video Surveillance System for crime Prevention based on moving object
    detection

    Pages :655-660
    Snehal Anwekar, Isha Walimbe, Priyanka Suryagan,Alisha Gujarathi, Kalpana Thakre
    Abstract | PDFPDF
    46. Survey: Opinion Spam Detection Approaches and Techniques
    Pages :661-664
    P.N.V.S.Pavan Kumar, A.Suresh Babu , N.Kasiviswanath
    Abstract | PDFPDF
    47. Crop Recommendation and Fertilizer Purchase System
    Pages :665-667
    Mansi Shinde, Kimaya Ekbote, Sonali Ghorpade,Sanket Pawar, Shubhada Mone
    Abstract | PDFPDF
    48. A Review Paper on Energy Efficient Hierarchical Protocols in Wireless Sensor Networks
    Pages :623-625
    Zia Ur Rahman, Parul Yadav
    Abstract | PDFPDF
    49. Cyber Security Tools
    Pages :672-674
    Gunjan.Hardasmalani, Rashmi.Bajaj, Harsha.Sachdev
    Abstract | PDFPDF
    50. Comparative Analysis of IPV4 and IPV6
    Pages :675-678
    Samson Isaac
    Abstract | PDFPDF
    51. Big Data Security Analytics
    Pages :679-681
    K. Radhika, G. Vijaya
    Abstract | PDFPDF
    52. Hierarchical Cluster Based Energy Efficient Routing Protocol for Wireless Sensor Networks: A Survey
    Pages :682-687
    Puneet Gurbani, Hansa Acharya, Prof. Anurag Jain
    Abstract | PDFPDF
    53. Energy Efficient Data Gathering by Mobility Sink in Wireless Sensor Networks
    Pages :688-691
    R.Jayaprasanth, Kiran.R.Alex, K.Ashok Kumar
    Abstract | PDFPDF
    54. Performance Evaluation of Rule Enforced Information Flow Control System With Tagged Service Data For CSPs
    Pages :692-699
    Kirtibala Mali, Prof. Anurag Jain
    Abstract | PDFPDF
    55. Performance Analysis of AODV and AOMDV and Compare to the MAODV Routing Protocol for MANET Scenario
    Pages :700-702
    Megha Joshi, Praveen Kumar Goutam
    Abstract | PDFPDF
    56. Randomized Honey Bee Load Balancing Algorithm in Cloud Computing System
    Pages :703-707
    Monika Rathore, Sarvesh Rai, Navdeep Saluja
    Abstract | PDFPDF
    57. An Efficient method of Web Document Clustering with Semantic Representation of Documents
    Pages :708-710
    Raja Varma Pamba, Dr Elizabeth Sherly
    Abstract | PDFPDF
    58. Remote Access of Android Smart Phone
    Pages :711-714
    Onkar Mule, Nihal Shaikh, Pratik Shinde, Amit Wagaskar, Prof. Sneha Ramteke
    Abstract | PDFPDF
    59. The second-order nonlinearity of a class of Boolean functions
    Pages :715-720
    Manish Garg
    Abstract | PDFPDF
    60. Noise Reduction in MRI Images using Contourlet Transform and Threshold Shrinkages Techniques
    Pages :723-728
    Jannath Firthouse.P, Shajun Nisha.S, Dr.M.Mohammed Sathik
    Abstract | PDFPDF
    61. Secured Sharing of Medical Data on Hybrid Cloud Environment
    Pages :729-733
    M.Nandhini, K.A.Muthukumar
    Abstract | PDFPDF
    62. Selective De-noising of Sparse-Coloured Images
    Pages :734-737
    Arjun Chaudhuri
    Abstract | PDFPDF
    63. An Experimental Study of Performance Comparison for Various Parallel Sorting Algorithms
    Pages :738-740
    Jagdeep Singh, Alka Singh, Garima Singh
    Abstract | PDFPDF
    64. A Review of Load Balancing Technique of Cloud Computing Using Swarm Intelligence
    Pages :741-744
    Abhishek Kumar Tiwari, Sreeja Nair
    Abstract | PDFPDF
    65. Distributed Content Aggregation& Content Change Detection using Bloom Filters
    Pages :745-748
    Sornalingam Nadaraj
    Abstract | PDFPDF
    66. A Methodology for Incorporation of Domain Ontology in Knowledge Discovery Process for Interpretation and Improvement of Mining Results
    Pages :749-754
    Joachim Narzary, Dr. S. Siva Sathya, Minisrang Basumatary
    Abstract | PDFPDF
    67. Quantitative Analysis of Dairy Product Packaging with the Application of Data Mining Techniques
    Pages :755-759
    Ankita Chopra, Yukti Ahuja, Mahima Gupta
    Abstract | PDFPDF
    68. Web Based Placement Management System
    Pages :760-763
    Anjali.V, Jeyalakshmi.PR, Anbubala.R, Sri Mathura devi.G ,Ranjini.V
    Abstract | PDFPDF
    69. Extracting More Relevant Features from Color Image for Enhancing the Image Retrieval Using
    Genetic Algorithm

    Pages :764-768
    Aruna Bajpai
    Abstract | PDFPDF
    70. Big Data Concepts and Analysis: A Survey
    Pages :769-772
    Ran vijay singh, Sheenu Rizvi
    Abstract | PDFPDF
    71. Robotic Control Using an Android Application
    Pages :773-776
    Saurabh Khoje, Devendra Urad, Monika Shirke, Prof. Anita Shinde
    Abstract | PDFPDF
    72. Object Tracking and Motion Estimation Using Particle Swarm Optimization
    Pages :777-779
    Yateen Kedare, Rohit Thakare, Jayesh Raghuwanshi, Vedant Deokar
    Abstract | PDFPDF
    73. Privacy My Decision: Control of Photo Sharing on Online Social Networks
    Pages :780-782
    P.Srilakshmi, S.Aaratee, S. Subbalakshmi
    Abstract | PDFPDF
    74. Triple Layer Security to Data in Cloud
    Pages :783-785
    R.Kalaivani
    Abstract | PDFPDF
    75. Determining an Optimal Parenthesization of a Matrix Chain Product using Dynamic Programming
    Pages :786-792
    Vivian Brian Lobo, Flevina D’souza, Pooja Gharat, Edwina Jacob, and Jeba Sangeetha Augestin
    Abstract | PDFPDF
    76. Secured Digital Image Watermarking by using a Hybrid Technique with Kalman Filtering
    Pages :793-798
    Samreet Kaur, Ravneet Kaur Sidhu
    Abstract | PDFPDF
    77. Cyber Attack Detection Techniques – Solutions
    Pages :799-801
    P.Vishalini, K.Swaroopa Rani, Ch.Vimala
    Abstract | PDFPDF
    78. Performance Analysis of SSA under the Secure Environment
    Pages :802-806
    Navpreet Bhathal, Sukhpreet Kaur
    Abstract | PDFPDF
    79. Survey on Secure Data Self-Destructing Scheme in Cloud Computing
    Pages :807-808
    M.Bhandari, Pooja Chaudhari, Sonal Sonawane, Bhagyashree Shetkar,. Manisha Konde
    Abstract | PDFPDF
    80. Diversification of User Recommendations Using Entropy Redistribution
    Pages :809-810
    Abhinav Pachauri
    Abstract | PDFPDF
    81. Improve the Efficiency of Load Balancing in Cloud Environment using DAG and Honey Bee Algorithm
    Pages :811-815
    Abhishek Kumar Tiwari, Sreeja Nair
    Abstract | PDFPDF
    82. Location Based Advertising Promotions on Mobile Device
    Pages :816-819
    Yogita V. Salvi, Dr.V.R.Ghorpade
    Abstract | PDFPDF
    83. An Improved and Optimal Prediction of Bone Disease Based On Risk Factors
    Pages :820-823
    M.Saranya, K.Sarojini
    Abstract | PDFPDF
    84. Article Removed
    Pages :824-826
    xxx, xxx
    Abstract | PDFPDF
    85. Review On: Privacy-Preserving in Wireless Networks
    Pages :827-829
    Vishal Mahajan, Priyakanksha Mahajan
    Abstract | PDFPDF
    86. A Review Paper on Solving 0-1 knapsack Problem with Genetic Algorithms
    Pages :830-832
    Veenu Yadav, Ms.Shikha Singh
    Abstract | PDFPDF
    87. Genetic Algorithm for Outlier Detection
    Pages :833-835
    Maria Afzal, S M Arif Ashraf
    Abstract | PDFPDF
    88. Content Based Video Retrieval System
    Pages :836-838
    Yojita Raut, Madhuri Shimpi, Mansvi Patil
    Abstract | PDFPDF
    89. Securing the Clouds using OTP Technology
    Pages :839-842
    Sandeep Mali, Kishor Sawant, Nilesh Thombare, Vinod Bharat
    Abstract | PDFPDF
    90. Towards Better Accuracy and Risk Handling In Cost Estimation Using Assessment Values
    Pages :843-848
    Renu Goswami, Ajay Kumar Sharma
    Abstract | PDFPDF
    91. Didactics in Online Learning Technical Courses: A Case Study Based on Activity Theory
    Pages :849-854
    Abdelali IBRIZ, Mohamed BENSLIMANE , Kamar OUAZZANI
    Abstract | PDFPDF
    92. Automatic Load Balancing of Applications Using Class Constrained Bin Packing Algorithm: A Review
    Pages :855-857
    Akshay Karale, Shradha Katte,Prashant Yadav, Chetan Godha
    Abstract | PDFPDF
    93. Parallel Popular Crime Pattern Mining in Multidimensional Databases
    Pages :858-863
    BVS. Varma, V. Valli Kumari
    Abstract | PDFPDF
    94. Data Access For Cloud Users Using Strong Token Authentication
    Pages :864-870
    Ali Asgar Hussain, Reetu Gupta
    Abstract | PDFPDF
    95. Autonomous Cloud Computation with Distribution Enactment and Proficient Data Veracity Process
    Pages :871-874
    Joshuva Baretto, Prof Mohan K
    Abstract | PDFPDF
    96. A Literature Survey on Efficient Software Bug Triaging Using Software Data Reduction Techniques
    Pages :875-877
    Prof. Subhash Pingale, Prof. R.A.Taklikar, Ankita Godse
    Abstract | PDFPDF
    97. Performance Measure of Hard c-means,Fuzzy c-means and Alternative c-means Algorithms
    Pages :878-883
    Binoda Nand Prasad, Mohit Rathore, Geeta Gupta, Tarandeep Singh
    Abstract | PDFPDF
    98. Service Composition Techniques for a Context- Aware Smart Hospital Ward Monitoring System
    Pages :884-887
    Ashok Immanuel V, Preethi R
    Abstract | PDFPDF
    99. I-Detector: An Intelligent Real Time Monitoring Vehicle System for Taxis
    Pages :888-890
    Akshay Malkampate, Apurva Maandaay, Rahul Mandora
    Abstract | PDFPDF
    100. Adapting Web Content Using Internet Speed for Mobile Devices
    Pages :891-892
    Yugandhara R. Firake, Pooja Sharma , Sayali Sinkar, Vishakha Warade
    Abstract | PDFPDF
    101. Time-Frequency Spectral Analysis of Single - Channel Earthquake Data for P-Wave Detection
    Pages :893-895
    Pooja Sarin, Prof. Poonam Dabas
    Abstract | PDFPDF
    102. Face Recognition Using Artificial Neural Networks
    Pages :896-899
    Abhjeet Sekhon and Dr. Pankaj Agarwal
    Abstract | PDFPDF
    103. Multipath Routing Protocol for MANET
    Pages :900-902
    Versha Matre, Girish Kaushal, Piyush Chouhan
    Abstract | PDFPDF
    104. Cache Related Pre-emption Delays in Probabilistic Real Time System
    Pages :903-907
    Prof. Minal V. Domke, Prof. Pritee Saktel, Prof. Ekta Gupta
    Abstract | PDFPDF
    105. Unmanned Ground Vehicle Using Ultrasonic Ranging module
    Pages :908-909
    Krutika Basinge, Sejal Nagpure, Punam Shinde, Prof.Y.K.Sharma
    Abstract | PDFPDF
    106. ECCS MENU: A Novel Implementation of Electronic Clearance Scheme
    Pages :910-912
    Charu Thaore, Gaurav Thapliyal
    Abstract | PDFPDF
    107. VD-kNN Query Processing over Untrusted Cloud
    Pages :913-918
    Utsav Raychaudhuri, Chandni Singhal, Neelima Shahi, Shital Jadhav, Vaishali Kolhe
    Abstract | PDFPDF
    108. Scheduling in the Queuing System with Asynchronously Varying Service Rates
    Pages :919-921
    Shyamsundar R, Geofrin Shirly. S
    Abstract | PDFPDF
    109. DIGITAL IMAGE PROCESSING – Sequence, Components and Pros
    Pages :922-924
    K.Radhika, P.Vishalini
    Abstract | PDFPDF
    110. Analysis of Fraud Detection Mechanism in Health Insurance Using Statistical Data Mining Techniques
    Pages :925-927
    Pravin R. Bagde, Manoj S. Chaudhari
    Abstract | PDFPDF
    111. Opportunistic Routing Protocols for Wireless Sensor Networks: A Survey
    Pages :928-931
    Mounika M, Chinnaswamy C N
    Abstract | PDFPDF
    112. A Study on Agent Based Modelling for Traffic Simulation
    Pages :932-936
    Priyadarsini Ghadai, L.Prachi Shree, Lelina Chhatria, RVVSV Prasad
    Abstract | PDFPDF
    113. Analyzing Social Media Data for Understanding Student’s Problem Based on Clustering Techniques
    Pages :937-941
    Shrinivas R Goud, Rahul Gaikwad
    Abstract | PDFPDF
    114. Parallelizing 1D Midpoint Displacement Algorithm for Terrain Generation
    Pages :942-944
    Yadav Mayank Subhash, Prakash Tripathi, P.S.Rao
    Abstract | PDFPDF
    115. Approaches to Rank Technical Blog Users : A Survey
    Pages :945-950
    Amruta Jadhav, Sharvari Tamane
    Abstract | PDFPDF
    116. ANALYSIS OF MESSAGE PASSING IN FOS: An Operating System for Clouds and Multicores
    Pages :951-953
    Akansha Gautam , Soma Sircar , Pankaj Gupta
    Abstract | PDFPDF
    117. SFITBOT
    Pages :954-956
    Natalina Rodrigues, Samiksha Salgaonkar, Shreya Salunke, Natasha Rego
    Abstract | PDFPDF
    118. Real Time Data Mining Using Cyber Physical System
    Pages :957-959
    Pallavi .P.Pophale , Dr.M.S.Ali
    Abstract | PDFPDF
    119. Prevention for Direct and Indirect Discrimination in Data Mining
    Pages :960-963
    Ms Nikhita B Ugale, Prof S D Deshpande
    Abstract | PDFPDF
    120. Enhanced SSO based Multi-Factor Authentication for Web Security
    Pages :960-966
    Shruti Bawaskar , Prof. Mahendra Verma
    Abstract | PDFPDF
    121. To Enhance Type 4 Clone Detection in Clone Testing
    Pages :967-971
    Swati Sharma, Priyanka Mehta
    Abstract | PDFPDF
    122. A Survey of Methods and Strategies in Tamil Palm Script Recognition
    Pages :972-977
    B. Kiruba, Mr.K.Manikandan
    Abstract | PDFPDF
    123. Ranking Web Forum Radical Influential Users Based On Textual Data through Sentiment Classification
    Pages :978-982
    J.Jovitha Fastina, Dr.Ilango Krishnamurthi
    Abstract | PDFPDF
    124. Encryption Algorithm for Cloud Computing
    Pages :983-989
    Ankita Nandgaonkar, Prof. Pallavi Kulkarni
    Abstract | PDFPDF
    125. Correlation Based Image Tampering Detection
    Pages :990-995
    Priya Singh, Shalini Sharma Goel
    Abstract | PDFPDF
    126. Survey for Incentive Mechanism to Reduce Problem of Free Riders in Peer To Peer Network
    Pages :996-1003
    Priyanka kumrawat, Kamal Borana
    Abstract | PDFPDF
    127. Comparative Analysis of C, FORTRAN, C# and Java Programming Languages
    Pages :1004-1007
    Keshav Biswa, Bishal Jamatia, Deepjyoti Choudhury, Pallabi Borah
    Abstract | PDFPDF
    128. Parallel Histogram Sorting in MPI
    Pages :1008-1010
    Abhishek Pasari, Pentyala Srinivasa Rao
    Abstract | PDFPDF
    129. Improvement in Estimation of Unidentified Value (Gene Expression Data) in Biotechnology
    Pages :1011-1013
    Baitali Nath, Bindu Agarwalla, Laxman Sahoo
    Abstract | PDFPDF
    130. Survey of MANET Attacks, Security Concerns and Measures
    Pages :1014-1017
    Shweta Jadye
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-