• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 7 ISSUE 3 May - June 2016

    ISSN 0975 - 9646

    1. Matrix Based Method for Terrain Generation
    Pages :1018-1019
    Sujay Raj, Prakhar Rastogi, Dr. Badam Singh Kushvah
    Abstract | PDFPDF
    2. Feature Extraction Technique: Ellipse Method
    Pages :1020-1024
    Md Saquib Seraj and Aneet Kumar Dutta
    Abstract | PDFPDF
    3. Secondary Construction of Non-normal Boolean Functions
    Pages : 1025-1028
    Deepmala Sharma, Rashmeet Kaur
    Abstract | PDFPDF
    4. Analysis of Network Security Issue and Its Attack and Defence
    Pages : 1029-1031
    Uday Kumar, Sushant Kumar Mishra,Anand Chhibba,Gagan Tyagi,Vipin Shukla
    Abstract | PDFPDF
    5. Speed Algorithm for Underwater Moving Objects Detection Based On Image Sequence
    Pages :1032-1035
    Omkaramurthy Ancha
    Abstract | PDFPDF
    6. Lightweight Platform for Internet of Things with support for CoAP Block-wise Transfer
    Pages :1036-1040
    Namrata Pawar, Madhuri Wakode
    Abstract | PDFPDF
    7. Towards Service Composition Based on Mixture of different things
    Pages :1041-1047
    Dr.I.Lakshmi, G.D. DhanaLakshmi
    Abstract | PDFPDF
    8. Emerging Technology on Mobile Phone Computing in 5G
    Pages :1048-1052
    Dr.I. Lakshmi, M. DhanaLakshmi
    Abstract | PDFPDF
    9. A Comparative Study on Various Scheduling Algorithms of Cloud Computing
    Pages :1053-1057
    NUPUR AGRAHARI, VIKASH
    Abstract | PDFPDF
    10. Web Image Re-Ranking using Query-Specific Semantic Signatures
    Pages :1058-1060
    Shekhar Maity, Naveen Yerawar, Shivratan Pardeshi, Monalisa Singh
    Abstract | PDFPDF
    11. A Hybrid Method for Text Extraction from Mosaiced Image of Text Dominant Video
    Pages :1061-1068
    P Nagabhushan, Vimuktha Evangeleen Jathanna
    Abstract | PDFPDF
    12. A Study on Energy Efficient Communication Protocol in Wireless Sensor Network
    Pages :1069-1072
    Raman Choudhary, Sujeet Kumar
    Abstract | PDFPDF
    13. ECC based Fault Tolerant and Secured E-Payment Protocol
    Pages :1073-1078
    Aditya Bhattacharyya, Sanjit Kumar Setua
    Abstract | PDFPDF
    14. A Cognitive Model for the Forensic Recovery of End-User Passwords
    Pages :1079-1081
    R.Arun kumar, Dr.Kumar
    Abstract | PDFPDF
    15. A Review : Image Fusion Techniques and Applications
    Pages :1082-1085
    Mamta Sharma
    Abstract | PDFPDF
    16. 2.4 GHz Class F Power Amplifier for Healthcare Application
    Pages :1086-1090
    WEI CAI, HAIJINAG MA, NANSONG WU
    Abstract | PDFPDF
    17. Page-Level Data Extraction Approach for Web Pages Using Data Mining Techniques
    Pages :1091-1096
    K. Syed Kousar Niasi, Dr. E. Kannan, M. Mohamed Suhail
    Abstract | PDFPDF
    18. A Spatial Spectral Filtration (SSF) Based Correlated Coefficients Thresholding Approach for Image Denoising.
    Pages :1097-1101
    Md Ateeq ur Rahman, Abdul Samad Khan
    Abstract | PDFPDF
    19. Classification of Thyroid Disease: A Survey
    Pages :1102-1104
    Prem Kumar, Amit Kumar Dewangan
    Abstract | PDFPDF
    20. Segmentation of Tumours from Brain Magnetic Resonance Images using Gain Ratio Based Fuzzy C-Means algorithm
    Pages :1105-1110
    Swetha Sridharan, J. Angel Arul Jothi, V. Mary Anita Rajam
    Abstract | PDFPDF
    21. Effective Method of Feature Selection on Features Possessing Group Structure
    Pages :1111-1115
    Nayana Murkute, Prof. Prashant Borkar
    Abstract | PDFPDF
    22. Efficient Methods and Implementation of Automatic Speech Recognition System
    Pages :1116-1120
    Himali Junghare, Prof. Prashant Borkar
    Abstract | PDFPDF
    23. Intervention Prediction and Progressive Learning Using Machine Learning Techniques
    Pages :1121-1131
    Dachapally Prudhvi Raj, Nallamilli Manikanta Reddy, Kandrekula Venkatesh, Sreereddy Bharath Reddy
    Abstract | PDFPDF
    24. Efficient Biometric Authentication Technique using Fingerprint
    Pages :1132-1135
    Vishal Vishwas Jadhav, Rahul Ratnakar Patil, Rohit Chandrashekar Jadhav,Adwait Niranjan Magikar
    Abstract | PDFPDF
    25. Results and Performance Analysis of File Sharing Between Peer-to-Peer Using Network Coding Algorithm
    Pages :1136-1144
    Rathod Vijay U, Prof. Mrs. V. R. Chirchi
    Abstract | PDFPDF
    26. Cloud Computing Security, Defense In Depth Detailed Survey
    Pages :1145-1151
    Ajitabh Mahalkari, Avni Tailor, Aniket Shukla
    Abstract | PDFPDF
    27. Inspection of Classical Techniques to Perform Inpainting
    Pages :1152-1154
    Preeti Gupta, Kuldip Pahwa
    Abstract | PDFPDF
    28. A Secured Location Estimation Technique in Mobile Devices
    Pages :1155-1161
    T.Prabhakara Rao, Kanugula Lalitha Kumari
    Abstract | PDFPDF
    29. Improving Vision in Fog using yellow light
    Pages :1162-1164
    Vivek Pandey, Ram Singar Verma
    Abstract | PDFPDF
    30. Analysis of IT adoption in Indian SMEs -Case Study of Rajasthan
    Pages :1165-1168
    Sunil Kr. Pandey, Pooja.S.Kushwaha
    Abstract | PDFPDF
    31. LSB based Steganography using Bit masking method on RGB planes
    Pages :1169-1173
    Shahin Shabnam, Prof K Hemachandran
    Abstract | PDFPDF
    32. Machine Learning Algorithms: A Review
    Pages :1174-1179
    Ayon Dey
    Abstract | PDFPDF
    33. Object Oriented Metrics: Revisited
    Pages :1180-1183
    Aman Jatain, Jyoti Kataria
    Abstract | PDFPDF
    34. Data Warehouse
    Pages :1184-1185
    Pushpinder Kaur
    Abstract | PDFPDF
    35. Extraction of Drug Reviews by Specific Aspects for Sentimental Analysis
    Pages :1186-1189
    Vrushali Moon, Prof. Prashant Borkar
    Abstract | PDFPDF
    36. Product Aspect Ranking based on IDR/EDR Opinion
    Pages :1191-1194
    Madhuri Shirsat, Nilesh Vani
    Abstract | PDFPDF
    37. Printed Text Assimilator for Visually Impaired: Implementation
    Pages :1195-1198
    Bharati Ainapure, Nitin Sankpal , Pranav Ranadive, Rohan Shiroor, Satish Vairagar
    Abstract | PDFPDF
    38. Adapting Egyptian Vulture Optimization Algorithm for Vehicle Routing Problem
    Pages :1199-1204
    Dilip Kumar, M. Nandhini
    Abstract | PDFPDF
    39. Architecture of Secure Cloud Data Center Storage
    Pages :1205-1211
    Kanwar Lal Dhakar, Prof. Savita Rathod
    Abstract | PDFPDF
    40. Next Generation Firewall- A Review
    Pages :1212-1215
    Manoj R Chakravarthi
    Abstract | PDFPDF
    41. Supervised Distance Based Detection of Outliers by Reverse Nearest Neighbors Method
    Pages :1216-1219
    Trupti Rinayat, Prof. Prashant Borkar
    Abstract | PDFPDF
    42. A Robust Approach for Detection of Brain Anomalies using MRI
    Pages :1220-1224
    Mayur Rahul
    Abstract | PDFPDF
    43. The QoS Assured Handoff Decision in Heterogeneous Content Distribution over Wireless Network
    Pages :1225-1229
    Ashwini S. Bonde, P.N. Borkar
    Abstract | PDFPDF
    44. Sensex Prediction Using Sentiment Analysis
    Pages :1230-1231
    Aarti Deshpande, Rucha Paturkar and Sonali Pimpale
    Abstract | PDFPDF
    45. An Enhanced Clustering Technique Using Rough Set Approach for Discovering Improved and Unambiguous Groups of Users
    Pages :1232-1237
    Parth Suthar, Prof. Bhavesh Oza
    Abstract | PDFPDF
    46. Identification of Network Protocol using Collapsed Variational Bayesian Inference Algorithm
    Pages :1238-1241
    Sadiya Sheikh, Lalit Dole
    Abstract | PDFPDF
    47. Literature Review : Scripting in Qt for Scripting Engine development
    Pages :1242-1245
    Mrunali Tandel, Prof. Uday Joshi, Amit Golhani
    Abstract | PDFPDF
    48. Adaptive Broadcasting in Vehicular Ad-hoc Networks
    Pages :1246-1250
    Priyanka Chourse, Santosh K Mishra
    Abstract | PDFPDF
    49. Big data analytics for Diagnosis and Prognosis of Cancer using Genetic Algorithm
    Pages :1251-1253
    Venkat Reddy Korupally, Subba Rao Pinnamaneni
    Abstract | PDFPDF
    50. Web Recommender System using EM-NB Classifier
    Pages :1254-1256
    Haseena Begum, Dr.B.M Vidyavathi
    Abstract | PDFPDF
    51. To design an Architectural Model for On-Shore Oil Monitoring using Wireless Sensor Network
    System

    Pages :1257-1262
    Rekha Gautam, Saurabh Shukla, Dr.G.N.Pandey
    Abstract | PDFPDF
    52. Edge Preserving Decomposition-Based Haze Removal in Video Sequence Using Koschmiedars Law
    Pages :1263-1266
    Namitha Shajan, Dr.D.Loganathan
    Abstract | PDFPDF
    53. Enhanced Holistic and Component Based Algorithm for Sketch to Photo Matching in Criminal Investigations
    Pages :1267-1272
    Chippy Thomas, Dr. D. Loganathan
    Abstract | PDFPDF
    54. A Survey on Wormhole Attack Detection in Wireless Network
    Pages :1273-1276
    Haritima Shrivastava, Sandeep Pratap Singh
    Abstract | PDFPDF
    55. ICTS: Global Tool for Banishing Poverty and Improving Opportunity
    Pages :1277-1281
    Tahiru Shittu, Dr. Oyedemi Jacob Folasayo
    Abstract | PDFPDF
    56. Accelerating MicroRNA Target Prediction Using Multithreading
    Pages :1282-1290
    Animesh Hazra, Subrata Kumar Mandal, Soumyabrata Bhattacharyya, Aritra Dutta, Subham Jain
    Abstract | PDFPDF
    57. An Enhancement of Number Plate Recognition based on Artificial Neural Network
    Pages :1291-1295
    Apurva Biswas, Dr.Bhupesh Gour
    Abstract | PDFPDF
    58. Reliability Analysis of Two-Unit Warm Standby System Subject to Hardware and Human Error
    Failures

    Pages :1296-1309
    Pravindra Singh, Pankaj Kumar & Anil Kumar
    Abstract | PDFPDF
    59. Optimal Web Service Selection According to Response Time
    Pages :1310-1313
    U. B. Bagal, R. N. Pawar, R. S. Jamgekar
    Abstract | PDFPDF
    60. By Machine Learning Techniques to Estimate Wind Turbine Power Generation
    Pages :1314-1319
    Swarna Jain, Anil Pimpalapure
    Abstract | PDFPDF
    61. Enhancement to Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
    Pages :1320-1327
    Sadia Suroor, Manoj Challa, Zafar Ahmed Syed
    Abstract | PDFPDF
    62. Review on Mining Association Rule from Semantic Data
    Pages :1328-1331
    Kalyani A.Kale, R.P.Sonar
    Abstract | PDFPDF
    63. Machine to Machine (M2M) Open Data System for Business Intelligence in Products Massive Distribution oriented on Big Data
    Pages :1332-1336
    Angelo Galiano, Alessandro Massaro, Donato Barbuzz#, Leonardo Pellicani, Giuseppe Birardi,
    Bachir Boussahel, Francesca De Carlo, Veronica Calati, Giovanni Lofano, Laura Maffei,
    Marilena Solazzo, Vito Custodero, Gaetano Frulli, Egidio Frulli, Francesca Mancini, Leonardo
    D’Alessandro, Francesco Crudele
    Abstract | PDFPDF
    64. A Step toward Decision making in Diagnostic Applications using Single Agent Learning Algorithms
    Pages :1337-1342
    Deepak A. Vidhate, Dr. Parag Kulkarni
    Abstract | PDFPDF
    65. Comprehensive Performance Study of Existing Techniques in Hand Gesture Recognition System for Sign Languages
    Pages :1343-1347
    Jayshree. R. Pansare, Maya Ingle
    Abstract | PDFPDF
    66. Confident Software Development Process Model
    Pages :1348-1352
    S.Thulasi Krishna, Dr. S .Sreekanth
    Abstract | PDFPDF
    67. Li-Fi: The Future Wireless Communication Technology
    Pages :1353-1354
    Ashoka S. B.
    Abstract | PDFPDF
    68. Interface Development for Eucalyptus Based Cloud
    Pages :1355-1357
    Sandeep Kumar Verma, Mala chaturvedi
    Abstract | PDFPDF
    69. Collaborative Black hole attack on MANET
    Pages :1358-1361
    Sushama Singh, Atish mishra, Dinesh Bhuriya, Upendra Singh
    Abstract | PDFPDF
    70. Multi-Objective Sentiment Analysis Using Evolutionary Algorithm for Mining Positive & Negative Association Rules
    Pages :1362-1368
    Swati V. Gupta, Madhuri S. Joshi
    Abstract | PDFPDF
    71. Designs of Parallel Glowworm Swarm Optimization Tool Using Map Reduce
    Pages :1369-1371
    Dr.R.N.Kulkarni, Aishwarya H.M, ArunKumar, Deeksha Patil, Diksha Jain .P
    Abstract | PDFPDF
    72. A New Method for Improving Contrast Enhancement in Remote Sensing Images by Image Fusion
    Pages :1372-1377
    Shraddha Gupta, Sanjay Sharma
    Abstract | PDFPDF
    73. Impact of Flooding Attack on MANET: A Survey
    Pages :1378-1381
    Sheetal Jatthap, Priya Saxena
    Abstract | PDFPDF
    74. Performance Study of Noise Removal Techniques for Recognition of Modi Consonants
    Pages :1382-1388
    Deepti Dubey, Bhumika Solanki, Maya Ingle
    Abstract | PDFPDF
    75. BOTNET Detection Approach by DNS Behavior and Clustering Analysis
    Pages :1389-1393
    Vartika Srivastava, Ashish Sharma
    Abstract | PDFPDF
    76. Ranking Vulnerability for Web Application based on Severity Ratings Analysis
    Pages :1394-1399
    Nitish Kumar, Kumar Rajnish, Anil Kumar
    Abstract | PDFPDF
    77. A Simplified Data Processing in MapReduce
    Pages :1400-1402
    P. Buddha Reddy, CH Sravan Kumar, K. Srinivas
    Abstract | PDFPDF
    78. Retrieving the Missing Information from Information Systems Using Rough Set, Covering Based Rough Set and Soft Set
    Pages :1403-1407
    B.S.Panda, S.S.Gantayat, Ashok Misra
    Abstract | PDFPDF
    79. Enhanced Big Data Quality Frame Work
    Pages :1408-1409
    G.Mallikajruna Reddy, Ganesh Deshmukh, R.Arun kumar, N.Anil Babu
    Abstract | PDFPDF
    80. A Survey Paper on different Clustering techniques for Collaborative Filtering for services recommendation
    Pages :1410-1413
    Reshma M Batule, Prof.Dr.Mrs.S.A.Itkar
    Abstract | PDFPDF
    81. Impact of Latency on the Economics of Cloud Computing
    Pages :1414-1416
    Shashank Sharma, Puneet Sharma
    Abstract | PDFPDF
    82. Cloud Data Outsourcing and off sourcing using trust computation
    Pages :1417-1424
    Priyanka Motwani, Priya Saxena
    Abstract | PDFPDF
    83. Chandhassu Recognizer for Telugu Poems
    Pages :1425-1434
    I. Reddy Sekhar Reddy, M.Humera Khanam
    Abstract | PDFPDF
    84. Survey On: Web Usage Mining Techniques Generating Frequent Patterns for Web-Page Recommendation.
    Pages :1435-1437
    Gauri A Sonawane, Prof.Dr.Mrs.S.A.Itkar
    Abstract | PDFPDF
    85. CALL ANTIQUITY – An Easy Way to Store Permanent Call History
    Pages :1438-1439
    Anjusha Pimpalshende, Mounisha K
    Abstract | PDFPDF
    86. A Novel Approach to Design Optimized Deterministic Finite Automata to Accept the Palindrome using Three Input Characters
    Pages :1440-1443
    Abhishek Bhardwaj, Achint Chaudhary, Shankar Z. Thawkar, Jhalak, Vijay S. Katta
    Abstract | PDFPDF
    87. Vehicle Monitoring System Using RFID
    Pages :1444-1447
    Durugu Kiranmayi
    Abstract | PDFPDF
    88. Design and Comparative Analysis of Various Adders through Pipelining Techniques
    Pages :1448-1456
    Aakansha, Ravi Payal
    Abstract | PDFPDF
    89. Gray-hole Attack in Mobile Ad-hoc Networks : A Survey
    Pages :1457-1460
    Rupali Sharma
    Abstract | PDFPDF
    90. Operating System on Microcontroller in Context of Emulator
    Pages :1461-1465
    Sneha.M.L, Dr. Rohini Nagapadma
    Abstract | PDFPDF
    91. Image Steganography By Using Reversible Texture Synthesis
    Pages :1466-1470
    Aarthi.K, Gokul.S
    Abstract | PDFPDF
    92. Analysis and Evaluation of “Reducing the Attack Surfaces” to improve the security of the Software at Design Level
    Pages :1471-1475
    Mubashirah Majeed, S.M.K Quadri
    Abstract | PDFPDF
    93. An Approach for Preventing Resource Consumption Attacks: Vampire
    Pages :1476-1482
    Manish Soni, Priya Saxena
    Abstract | PDFPDF
    94. Basic Principles of Animation Techniques used to Demonstrate DBF Mathematical Model Flow through a Rectangular Porous Channel
    Pages :1483-1485
    Ashoka S. B, Sowmya S. B
    Abstract | PDFPDF
    95. A Review on Comparison on Network on Chip(NOC) Using Simulation Tool NS2
    Pages :1486-1489
    Kusum Kardam, Akanksha Singh
    Abstract | PDFPDF
    96. Weather Prediction Using Normal Equation Method and Linear regression Techniques
    Pages :1490-1493
    Sanyam Gupta, Indumathy K, Govind Singhal
    Abstract | PDFPDF
    97. Secure Data Acquisition System
    Pages :1494-1496
    Ajay, Ajey B S, B C Steaven, Naveen Deshpande, Anitha C
    Abstract | PDFPDF
    98. Energy Efficient Homogeneous WSN protocols : An Analysis
    Pages :1497-1501
    Shipra Singla, Karamjot Kaur
    Abstract | PDFPDF
    99. Thickness Computation Under In-Vivo Trabecular Bone CT Imaging
    Pages :1502-1506
    Gokul. S, Aarthi.K
    Abstract | PDFPDF
    100. Image Fusion using NSCT Theory and Wavelet Transform for Medical Diagnosis
    Pages :1507-1510
    Anju P J, Dr.D.Loganathan
    Abstract | PDFPDF
    101. A Literature Survey on Secure Data Sharing in Cloud Storage with Key Aggregate Cryptosystem
    Pages :1511-1513
    Prof. B. M. Kore, Archana Jadhav, Prof. V. V. Pottigar
    Abstract | PDFPDF
    102. Re-Ranking of Web Image Search Using Relevance Preserving Ranking Techniques
    Pages :1514-1518
    Delvia Mary Vadakkan, Dr.D.Loganathan
    Abstract | PDFPDF
    103. Video Denoising Algorithm: A Review
    Pages :1519-1523
    Preeti Shukla, Jageshwar Srivas
    Abstract | PDFPDF
    104. Computational Thinking: The Skill Set of the 21st Century
    Pages :1524-1530
    Mahsa Mohaghegh, Michael McCauley
    Abstract | PDFPDF
    105. Design of effective algorithm for Removal of Ocular Artifact from Multichannel EEG Signal Using ICA and Wavelet Method
    Pages :1531-1535
    Snehal Ashok Gaikwad, K.P.Paradeshi
    Abstract | PDFPDF
    106. Algorithm to Determine the Safest Route
    Pages :1536-1540
    Sarang Tarlekar, Asmita Bhat, Suhas Pandhe, Tejaswini Halarnkar
    Abstract | PDFPDF
    107. Development of an Efficient Classifier for Classification of Liver Patient with Feature Selection
    Pages :1541-1544
    Harsha Pakhale, Deepak Kumar Xaxa
    Abstract | PDFPDF
    108. An Enhanced NVSS Scheme for Visual Secret Sharing
    Pages :1545-1548
    Chinju V.C., Dr.D.Loganathan
    Abstract | PDFPDF
    109. Progressive of Duplicate Detection Using Adaptive Window Technique
    Pages :1549-1551
    Shanila Thampi, Dr.D.Loganathan
    Abstract | PDFPDF
    110. Deep Learning using Restricted Boltzmann Machines
    Pages :1552-1556
    Neelam Agarwalla, Debashis Panda, Prof. Mahendra Kumar Modi
    Abstract | PDFPDF
    111. A Survey on Different Keyword-based Search techniques over Encrypted Data
    Pages :1557-1559
    Shraddha Ingale, Prof. Dr. B. D. Phulpagar
    Abstract | PDFPDF
    112. Implementation and Performance evaluation of Better Accuracy And Risk Handling In Cost Estimation Using Assessment Values
    Pages :1560-1566
    Renu Goswami, Ajay Kumar Sharma
    Abstract | PDFPDF
    113. Internet of Things
    Pages :1567-1570
    Sivangula Manogna, Harith Reddy Dakannagari
    Abstract | PDFPDF
    114. Local Tri-directional Weber Patterns: A New Descriptor for Texture and Face Image Retrieval
    Pages :1571-1577
    Venkata Satya Kumar Gangavarapu, Gopala Krishna Mohan Pillutla
    Abstract | PDFPDF
    115. Text Categorization on Multiple Languages Based On Classification Technique
    Pages :1582-1585
    Kapila Rani, Satvika
    Abstract | PDFPDF
    116. Intruder Detection in Smart Cities using Mh-PCA (Face recognition System)
    Pages :1578-1581
    KHAN ATIYA NAAZ
    Abstract | PDFPDF
    117. Verification of Deadlock Recovery in NOC using Encoding Scheme
    Pages :1586-1588
    Prateek kumar T R, Shashidhara H. R., S.L. Gangadharaiah
    Abstract | PDFPDF
    118. Assuring Data Integrity through a Novel Message Authentication Code with Iterative SHA-1 and Secret Key Randomizer
    Pages :1589-1594
    Megha Sunhare, Prof. Mahendra K. Verma
    Abstract | PDFPDF
    119. Security Awareness of Mobile Application for Discovering Fraud Rank
    Pages :1595-1599
    S.K.Ram Kumar, Dr. N. Lakshmi Narasimman
    Abstract | PDFPDF
    120. Reducing False Positive in Intrusion Detection System: A Survey
    Pages :1600-1603
    Neha Gupta, Komal Srivastava, Ashish Sharma
    Abstract | PDFPDF
    121. A Survey on Network Anti Forensic Tools and Techniques
    Pages :1604-1606
    Komal Srivastava, Neha Gupta, Shivam Agarwal
    Abstract | PDFPDF
    122. Mining Rare Item Sets Using both Top Down and Bottom up Approach
    Pages :1607-1614
    Arnab Kumar Das
    Abstract | PDFPDF
    123. 3-Level DWT Based Digital Image Watermarking
    Pages :1615-1619
    Deepika Sardana, Ajit Singh
    Abstract | PDFPDF
    124. A Comparative Study of Hadoop Family Tools
    Pages :1620-1623
    Prachi Pandey, Dr. Sanjay Silakari, Uday Chourasia
    Abstract | PDFPDF
    125. Efficient Hybrid Ranking Algorithm for Search Engine
    Pages :1624-1629
    Nirali Arora, Sharvari Govilkar
    Abstract | PDFPDF
    126. Two-factor Cheating Prevention in Visual Cryptography using hybrid codebook
    Pages :1630-1634
    Sayali Gapate, Prof. Jyoti Rao
    Abstract | PDFPDF
    127. Mitigation of Gray-Hole Attack in MANET
    Pages :1635-1637
    Rupali Sharma
    Abstract | PDFPDF
    128. Security Improvement of Mobile Ad Hoc Networks using Clustering Approach
    Pages :1638-1642
    Upendra singh, Makrand Samvatsar, Neeraj Arya
    Abstract | PDFPDF
    129. A Study of Facial Expression Reorganization and Local Binary Patterns
    Pages :1643-1647
    Poonam Verma, Deepshikha Rathore
    Abstract | PDFPDF
    130. Security Issues on Cryptography and Network Security
    Pages :1648-1654
    Poornachander V
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-