• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 7 ISSUE 4 July - August 2016

    ISSN 0975 - 9646

    1. Secure Password Transfer Using Randomized Grids
    Pages :1655-1659
    Aranta Rokade, Sandesh Gupta, Supriya Rokade, Vidhi Sanghavi
    Abstract | PDFPDF
    2. Comparative Study of Web Services Using Evolutionary Algorithms
    Pages :1660-1663
    Priyanka Saxena, U. Datta
    Abstract | PDFPDF
    3. Extensible Multi Agent System for Heterogeneous Database Unification Using Parallel Task and Segmentation Algorithm
    Pages : 1664-1669
    A.Ramar, M.Elamparuthi
    Abstract | PDFPDF
    4. Estimate Optimum Architecture of SOM Neural Network and Its Weigh Adjustment Using Particle Swarm Optimization
    Pages : 1670-1673
    Aradhana Mishra, Pradeep Kumar Mishra
    Abstract | PDFPDF
    5. Physiological Parameters Used To Monitor Asthma
    Pages :1674-1677
    Nidhi Banga, Neelam Rup Prakash
    Abstract | PDFPDF
    6. A Survey on Web Authentication Methods for Web Applications
    Pages :1678-1680
    Ch.Jhansi Rani, SK.Shammi Munnisa
    Abstract | PDFPDF
    7. A Proposed Security Framework for Enhancing User Privacy on Android Platform
    Pages :1681-1683
    Ritu Talreja, Dilip Motwani
    Abstract | PDFPDF
    8. A Comprehensive Survey on Variants in Artificial Bee Colony (ABC)
    Pages :1684-1689
    S. Neelima, N. Satyanarayana, P. Krishna Murthy
    Abstract | PDFPDF
    9. Dashboard using Data Analytics and Statistical Modeling
    Pages :1690-1695
    Sunad M, Aditya Naik, Mrinal Panda, Swarnim Suman,Radhika K R
    Abstract | PDFPDF
    10. Community Based Routing in Delay Tolerant Mobile Social Networks
    Pages :1696-1700
    M.Kapilakaviya, G.Thilipkumar
    Abstract | PDFPDF
    11. An Analysis of Mutation Operator in Mutation Testing
    Pages :1701-1704
    Bajirao Baban Kondbhar, Prof. Dr. Emmanuel M
    Abstract | PDFPDF
    12. Introduction to Interaction Overview Diagram as a Model
    Pages :1705-1710
    Sumender Roy, Dr Samuel Vara Prasada Raju
    Abstract | PDFPDF
    13. Multi-Protocol Label Switching Traffic Engineering-Link Protection
    Pages :1711-1714
    Balaji Tedla, Dr.K.Suresh Babu
    Abstract | PDFPDF
    14. Effectiveness of Different Similarity Measures for Text Classification and Clustering
    Pages :1715-1720
    Komal Maher, Madhuri S. Joshi
    Abstract | PDFPDF
    15. Opinion Mining: A Research in Agriculture
    Pages :1721-1722
    Nayan. S. Patel, Dr. Dipti. B. Shah
    Abstract | PDFPDF
    16. Preprocessing on Digital Image using Histogram Equalization: An Experiment Study on MRI Brain Image
    Pages :1723-1727
    Musthofa Sunaryo, Mochammad Hariadi
    Abstract | PDFPDF
    17. General Meta Model of Software Quality
    Pages :1728-1734
    Adil KHAMMAL, Youness BOUKOUCHI, Mohamed Amine HANINE, Abdelaziz MARZAK
    Abstract | PDFPDF
    18. Prediction of Fake Profiles on Facebook using Supervised Machine Learning Techniques-A Theoretical Model.
    Pages :1735-1738
    Suheel Yousuf Wani, Mudasir M Kirmani, Syed Imamul Ansarulla
    Abstract | PDFPDF
    19. Captcha as a Graphical Password with Multilayered Enhanced Security by Clique Point Technique
    Pages :1739-1742
    Monica Auti, Prof. Sachin Patil
    Abstract | PDFPDF
    20. Performance Metrics for Eigen and Fisher Feature Based Face Recognition Algorithms
    Pages :1743-1752
    Harihara Santosh Dadi, Gopala Krishna Mohan Pillutla
    Abstract | PDFPDF
    21. The Integrated and Efficient Implementation based on Self Destructing Data System for Active
    Storage Summarization

    Pages :1753-1756
    Kriti Jain, Anand Rajavat
    Abstract | PDFPDF
    22. An Alternative Approach to Image Steganography and its Evaluation
    Pages :1757-1759
    Aakanksha Agarwal,Aditya N. Bhatt and Yogin B. Bhatt
    Abstract | PDFPDF
    23. Wavelet Based Approach to Solve Eigenmodes in A Rectangular Waveguide
    Pages :1760-1762
    Manisha Khulbe, H. Parthsarthy
    Abstract | PDFPDF
    24. Document Recommendation Using Keyword Extraction for Meeting Analysis
    Pages :1763-1766
    Kumodini V. Tate, Bhushan R. Nandwalkar
    Abstract | PDFPDF
    25. Design and Implementation of Boosting Classification Algorithm for Sentiment Analysis on Newspaper Articles
    Pages :1767-1770
    Prabhjot Kaur, Rupinder Kaur Gurm
    Abstract | PDFPDF
    26. Web Based Expert System to Detect and Diagnose the Leaf Diseases of Cereals in Punjabi Language
    Pages :1771-1773
    Rajvir kaur#, Salam Din
    Abstract | PDFPDF
    27. Improvement Estimate Wind Turbine Power Generation Using Machine Learning Techniques
    Pages :1774-1778
    Swarna Jain, Anil Pimpalapure
    Abstract | PDFPDF
    28. A Survey on Android Malwares and their Detection Mechanisms
    Pages :1779-1782
    Nancy, Dr. Deepak Sharma
    Abstract | PDFPDF
    29. Implementation and Analysis of IPS˗AODV for Emergency scenario in MANET
    Pages :1783-1787
    Kanika, Dr. Vineet Sharma
    Abstract | PDFPDF
    30. Handwritten English Character Recognition using HMM, Baum-Welch and Genetic Algorithm
    Pages :1788-1794
    Atmaprakash Singh, Ravindra Nath, Santosh Kumar
    Abstract | PDFPDF
    31. Color, Texture and Shape Hybrid Features Based Image Retrieval System
    Pages :1795-1800
    Deepa Dubey, Vivek Suryawanshi
    Abstract | PDFPDF
    32. Detection Model for CSRF and Broken Authentication and Session Management Attack
    Pages :1801-1804
    Virginia Mary Nadar, Madhumita Chatterjee, Leena Jacob
    Abstract | PDFPDF
    33. Rule Based Phonetic Search for Slavic Surnames
    Pages :1805-1808
    Janki B. Pardeshi, B .R. Nandwalkar
    Abstract | PDFPDF
    34. An Improved Technique for Gait Recognition Based On PAL and PAL Entropy Image
    Pages :1809-1812
    Deepti Gautam, Nirendra Kumar
    Abstract | PDFPDF
    35. Secure Data Aggregation forEnhancingQoS in H-WSN
    Pages :1813-1817
    Shubhangi Gaikwad, S. V. Todkari
    Abstract | PDFPDF
    36. An Efficient Framework to Handle DoS Attack by Using Software Puzzle and Decision Tree
    Pages :1818-1821
    Jyoti Shende, S. Todkari
    Abstract | PDFPDF
    37. Reduction and Classification of Feature of Cyber Attack Data: Brief Review
    Pages :1822-1825
    Himanshu Shroti, Kaptan Singh
    Abstract | PDFPDF
    38. Effective Pattern Identification Approach for Text Mining
    Pages :1826-1830
    Vaishali Pansare
    Abstract | PDFPDF
    39. Location Based Opinion Mining of Real Time Twitter Data
    Pages :1831-1835
    Gargi Mishra, Shivani Varshney
    Abstract | PDFPDF
    40. A Data Placing Policy Established on Genetic Algorithm in Cloud Computing
    Pages :1836-1846
    Y.Neeraja, G.Divya Zion, U.Supriya
    Abstract | PDFPDF
    41. BALANCING LOAD USING GENETIC CRITERIA IN CLOUD COMPUTING
    Pages :1847-1856
    S. Kowser Sultana, G. Divya Zion, U. Supriya
    Abstract | PDFPDF
    42. Scheduling the family jobs using Genetic algorithm for Big Data Clouds
    Pages :1857-1867
    T. Uma Devi, G. Divya Zion, U. Supriya
    Abstract | PDFPDF
    43. Implementation of Advanced Encryption Standard Algorithm
    Pages :1868-1871
    H. B. Pethe, Dr. S. R. Pande
    Abstract | PDFPDF
    44. Review of Offloading Approaches in Mobile Cloud Computing
    Pages :1872-1874
    Ishali Jain, Rekha Bhatia
    Abstract | PDFPDF
    45. An Efficient and Privacy Preserving in Multi- Keyword Ranked Search over Encrypted Cloud Data
    Pages :1875-1879
    Jaikishan A Tindwani#1, Prof. Aruna K Gupta
    Abstract | PDFPDF
    46. Protected Authorized Deduplication on Cloud Using Hybrid Cloud Approach
    Pages :1880-1885
    Dr.V.Goutham, G.Shivakrishna, M.Prathyusha
    Abstract | PDFPDF
    47. A Literature Survey on Web Image Re-Ranking
    Pages :1886-1888
    Prof. Prakash Gadeka, Jayshri Kokare, Prof. Subhash Pingale
    Abstract | PDFPDF
    48. Ranking Technically Influential Users on Web Blogs
    Pages :1889-1893
    Amruta K. Jadhav, Sharvari Tamane
    Abstract | PDFPDF
    49. Leach Protocol in Wireless Sensor Network: A Survey
    Pages :1894-1896
    Reshma I. Tandel
    Abstract | PDFPDF
    50. Load Balancing with Secure and Privacy Preserving by NTRU Implementation for Customer-Side Networks
    Pages :1897-1901
    Nitesh Wamanrao Dangare, Prof. S.D. Satav
    Abstract | PDFPDF
    51. Enhancing Fire Detection for Indoor and outdoor locations via video surveillance
    Pages :1902-1906
    Rohini Ravindra Jadhav, Prof. P.D. Lambhate
    Abstract | PDFPDF
    52. Enhanced Elman Neural Network and Its Applications in Agriculture
    Pages :1907-1910
    Shyamsundar Narayan Patil, Priti Subramanium
    Abstract | PDFPDF
    53. Data Leakage Detection with K-Anonymity Algorithm
    Pages :1911-1915
    Wakhare Yashwant R, B. M. Patil
    Abstract | PDFPDF
    54. Learning System Development Using Ontology and Learning Objects
    Pages :1916-1917
    Tanaji Jadhav, Harshit Gupta, Chinmay Kshirsagar
    Abstract | PDFPDF
    55. In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge
    Pages :1918-1921
    Reshma A. Fegade, Prof. R. D. Bharati
    Abstract | PDFPDF
    56. An Effective Computation Offloading from Mobile Devices to Cloud
    Pages :1922-1927
    Jaya Ashok Suradkar, Prof. R. D. Bharati
    Abstract | PDFPDF
    57. Scalable and Efficient Keyword-based Semantic Search over Encrypted Multi-Cloud Data
    Pages :1928-1931
    Shraddha Ingale, Prof. Dr. B. D. Phulpagar
    Abstract | PDFPDF
    58. A Novel Method for Making Cut-Copy-Paste Operations Using Clipboard
    Pages :1932-1935
    Mayur M Patil, Akkamahadevi R Hanni, Priyadarshini M Patil
    Abstract | PDFPDF
    59. Deep Web Mining and its Application in Business Intelligence
    Pages :1936-1939
    RAKESH KUMAR BALODA, PRAVEEN KANTH
    Abstract | PDFPDF
    60. Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism
    Pages :1940-1946
    Gayatri D Patwardhan, Prof.B. W. Balkhande
    Abstract | PDFPDF
    61. Face Recognition
    Pages :1947-1951
    Ajay Kumar, Navdeep Kaur
    Abstract | PDFPDF
    62. Assessing Body Volume Index Using Neural Networks
    Pages :1952-1954
    C.Vishnu Prasad and Dr.D.Gladis
    Abstract | PDFPDF
    63. Prediction, Sentimental Analysis and Visualization of Static and Dynamic football data using Hadoop
    in a Multi-Node system

    Pages :1955-1959
    Shalom Mathews , Rohan Naik, Keziah Elsa John
    Abstract | PDFPDF
    64. An Algorithm to Transpose Zero- One Matrix
    Pages :1960-1961
    Sanil Shanker KP
    Abstract | PDFPDF
    65. A Review on Reactive & Proactive Routing Protocols and Security Breaches and Remedies in MANETs
    Pages :1962-1965
    Mohammed Aziz Ahmed, Mohammed Sirajuddin, Nazia Kouser
    Abstract | PDFPDF
    66. Secure Mobile Adhoc Network using AES and RSA
    Pages :1966-1969
    Anshul Jain, Sumeet Dhillion, Yogendra Kumar Jain
    Abstract | PDFPDF
    67. Android Malware Detection using Decision Trees and Network Traffic
    Pages :1970-1974
    Nancy, Dr. Deepak Sharma
    Abstract | PDFPDF
    68. An Approach to classify Acute Myelogenous Leukemia Using LBP Based Features
    Pages :1975-1978
    Neena George, Lisha Mathai
    Abstract | PDFPDF
    69. An Approach to Cluster Web Pages for Personalization of Web Search
    Pages :1979-1985
    Amol Rajmane, Pradeep Patil
    Abstract | PDFPDF
    70. A Survey on Erasure Coding Techniques for Cloud Storage System
    Pages :1986-1997
    Kiran P. Pawar, R. M. Jogdand
    Abstract | PDFPDF
    71. Data Mining With Incremental Mapreduce
    Pages :1998-2001
    Trupti Maruti Shinde, Prof. Santosh V.Chobe
    Abstract | PDFPDF
    72. Ontology Based Data Extraction for Mining Services in Crawler
    Pages :2002-2005
    Surekha Rikame, Prof.S.V. Chobe
    Abstract | PDFPDF
    73. Test Suite Generation of t- way CIT with constraints for Web Based Application
    Pages :2006-2010
    B. Vani, Dr. R. Deepalakshmi
    Abstract | PDFPDF
    74. Extracting Content Structure from Web Pages by Applying Vision based Approach
    Pages :2011-2016
    Prof.K.S.Kadam, Prof.A.B.majgave, Prof.Y.M.Kamble
    Abstract | PDFPDF
    75. An Ontology-Based Enhance Term Prediction Algorithm and Union of Divers D-Matrix
    Pages :2017-2020
    Seema Jadhav, Prof.Santosh Chobe
    Abstract | PDFPDF
    76. Detecting Facial Wrinkles based on Gabor Filter using Geometric Constraints
    Pages :2021-2025
    Ashwini Jalindar Mawale, Archana Chaugule
    Abstract | PDFPDF
    77. Balancing Load Using Genetic Criteria in Cloud Computing
    Pages :2026-2034
    S. Kowser Sultana, G. Divya Zion, U. Supriya
    Abstract | PDFPDF
    78. Evaluation of Sensitive Data Security in Android
    Pages :2035-2040
    Ch.Naveen Kumar Reddy, C.Ramakrishna
    Abstract | PDFPDF
    79. Secure Image Transmission using Color Transformations and Difference Expansion Data Embedding Technique
    Pages :2041-2045
    Pooja Shelar, Archana Chaugule
    Abstract | PDFPDF
    80. A Simulation Set-Up for Delivery of User Data Groups through Multimedia Broadcast Multicast Service
    Pages :2046-2051
    Debasis Mukherjee
    Abstract | PDFPDF
    81. Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
    Pages :2052-2058
    Richa Agnihotri, Dr. Shikha Agrawal, Dr. Rajeev Pandey
    Abstract | PDFPDF
    82. Request Distribution Strategies in Cluster Based Network Servers
    Pages :2059-2062
    V.Hema, Dr. K.Kungumaraj
    Abstract | PDFPDF
    83. Website Personalization based on Link Analysis, Navigational Patterns and Web Content
    Pages :2063-2067
    Atul N. Pawar, Dr. Suresh K. Shirgave
    Abstract | PDFPDF
    84. Unsupervised Web Data Extraction Using Trinary Trees
    Pages :2068-2070
    Prof. N. M. Sawant, Prof. V. V. Pottigar, Miss. P. B. Lamkane
    Abstract | PDFPDF
    85. Medical Search Engine For More Accurate and Specific Search Results in Cancer Patients Data
    Pages :2071-2074
    Venkat Reddy Korupally, Subba Rao Pinnamaneni
    Abstract | PDFPDF
    86. Roads Paved for Reuse in Software Engineering
    Pages :2075-2079
    N.Krishna Chythanya, Prof. Dr.Lakshmi Rajamani
    Abstract | PDFPDF
    87. Secure and Effective Web Searching Experience Using Cumulative Weighted Page Rank Algorithm
    Pages :2080-2083
    Megha Bhawsar, Tejalal Choudhary
    Abstract | PDFPDF
    88. A Study on Application-Aware Local-Global Source De-duplication for Cloud Backup Services of Personal Storage
    Pages :2084-2086
    G.Arunajyothi
    Abstract | PDFPDF
    89. Efficient & Secure data Retrieval technique using CP-ABE for decentralized DTNs.
    Pages :2087-2089
    Prof. A.A.Rajguru, Prof. V.V.Pottigar, P.A.Patil
    Abstract | PDFPDF
    90. Prediction of Type 2 Diabetes using Optimized ANFIS with Genetic Algorithm and Particle Swarm Optimization
    Pages :2090-2095
    Alby S, Dr. B L Shivakumar
    Abstract | PDFPDF
    91. A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme
    Pages :2096-2099
    Sanjeev Kumar Mandal, A.R Deepti
    Abstract | PDFPDF
    92. A Survey on Big Data Analytics Using Hadoop Ecosystem Tools
    Pages :2100-2102
    Monika Yadav, Sonal Chaudhary
    Abstract | PDFPDF
    93. Sustainable Development of Grampanchayat through E-Governance
    Pages :2103-2107
    Amit N. Sangole, S.A.Bhura
    Abstract | PDFPDF
    94. An Application Awareness Local Source and Global Source De-Duplication with Security in resource constraint based Cloud backup services
    Pages :2108-2112
    S.Meghana
    Abstract | PDFPDF
    95. Multicast Security Using RSA for Inter Cluster Communication with Rekeying in MANET
    Pages :2113-2118
    G. Sankara Rao, E. Jagadeswara Rao, K. Suneeta, H. Vanajarani
    Abstract | PDFPDF
    96. Performance Analysis of Attribute Signature Management Framework(ASMF) for Digital is Document Security and Integrity
    Pages :2119-2124
    Deepika Pawar, Prof. Mahendra K. Verma
    Abstract | PDFPDF
    97. Analyzing Social Media Data in Educational Sectors Using Data Mining Techniques
    Pages :2125-2129
    Manjunath B Talawar, Prasad.M.R, Sreenatha M, Niranjan C Kundur
    Abstract | PDFPDF
    98. Face Recognition System on Mobile Device based on Web Service approach
    Pages :2130-2135
    Angelo Galiano, Alessandro Massaro, Donato Barbuzzi, Mattia Legrottaglie, Valeria Vitti, Leonardo Pellicani, Vitangelo Birardi
    Abstract | PDFPDF
    99. Performance analysis of Key Frame Extraction using SIFT and SURF algorithms
    Pages :2136-2139
    Suhas Athani, CH Tejeshwar
    Abstract | PDFPDF
    100. A Novel Approach of Syntactic Similarity of Question Analogous System
    Pages :2140-2144
    Neha kumari, Sukhbir Kaur
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-