1. |
Secure Password Transfer Using Randomized Grids
Pages :1655-1659
Aranta Rokade, Sandesh Gupta, Supriya Rokade, Vidhi Sanghavi
Abstract | PDF |
2. |
Comparative Study of Web Services Using Evolutionary Algorithms
Pages :1660-1663
Priyanka Saxena, U. Datta
Abstract | PDF |
3. |
Extensible Multi Agent System for Heterogeneous Database Unification Using Parallel Task and Segmentation Algorithm
Pages : 1664-1669
A.Ramar, M.Elamparuthi
Abstract | PDF |
4. |
Estimate Optimum Architecture of SOM Neural Network and Its Weigh Adjustment Using Particle Swarm Optimization
Pages : 1670-1673
Aradhana Mishra, Pradeep Kumar Mishra
Abstract | PDF |
5. |
Physiological Parameters Used To Monitor Asthma
Pages :1674-1677
Nidhi Banga, Neelam Rup Prakash
Abstract | PDF |
6. |
A Survey on Web Authentication Methods for Web Applications
Pages :1678-1680
Ch.Jhansi Rani, SK.Shammi Munnisa
Abstract | PDF |
7. |
A Proposed Security Framework for Enhancing User Privacy on Android Platform
Pages :1681-1683
Ritu Talreja, Dilip Motwani
Abstract | PDF |
8. |
A Comprehensive Survey on Variants in Artificial Bee Colony (ABC)
Pages :1684-1689
S. Neelima, N. Satyanarayana, P. Krishna Murthy
Abstract | PDF |
9. |
Dashboard using Data Analytics and Statistical Modeling
Pages :1690-1695
Sunad M, Aditya Naik, Mrinal Panda, Swarnim Suman,Radhika K R
Abstract | PDF |
10. |
Community Based Routing in Delay Tolerant Mobile Social Networks
Pages :1696-1700
M.Kapilakaviya, G.Thilipkumar
Abstract | PDF |
11. |
An Analysis of Mutation Operator in Mutation Testing
Pages :1701-1704
Bajirao Baban Kondbhar, Prof. Dr. Emmanuel M
Abstract | PDF |
12. |
Introduction to Interaction Overview Diagram as a Model
Pages :1705-1710
Sumender Roy, Dr Samuel Vara Prasada Raju
Abstract | PDF |
13. |
Multi-Protocol Label Switching Traffic Engineering-Link Protection
Pages :1711-1714
Balaji Tedla, Dr.K.Suresh Babu
Abstract | PDF |
14. |
Effectiveness of Different Similarity Measures for Text Classification and Clustering
Pages :1715-1720
Komal Maher, Madhuri S. Joshi
Abstract | PDF |
15. |
Opinion Mining: A Research in Agriculture
Pages :1721-1722
Nayan. S. Patel, Dr. Dipti. B. Shah
Abstract | PDF |
16. |
Preprocessing on Digital Image using Histogram Equalization: An Experiment Study on MRI Brain Image
Pages :1723-1727
Musthofa Sunaryo, Mochammad Hariadi
Abstract | PDF |
17. |
General Meta Model of Software Quality
Pages :1728-1734
Adil KHAMMAL, Youness BOUKOUCHI, Mohamed Amine HANINE, Abdelaziz MARZAK
Abstract | PDF |
18. |
Prediction of Fake Profiles on Facebook using Supervised Machine Learning Techniques-A Theoretical Model.
Pages :1735-1738
Suheel Yousuf Wani, Mudasir M Kirmani, Syed Imamul Ansarulla
Abstract | PDF |
19. |
Captcha as a Graphical Password with Multilayered Enhanced Security by Clique Point
Technique
Pages :1739-1742
Monica Auti, Prof. Sachin Patil
Abstract | PDF |
20. |
Performance Metrics for Eigen and Fisher Feature Based Face Recognition Algorithms
Pages :1743-1752
Harihara Santosh Dadi, Gopala Krishna Mohan Pillutla
Abstract | PDF |
21. |
The Integrated and Efficient Implementation based on Self Destructing Data System for Active
Storage Summarization
Pages :1753-1756
Kriti Jain, Anand Rajavat
Abstract | PDF |
22. |
An Alternative Approach to Image Steganography and its Evaluation
Pages :1757-1759
Aakanksha Agarwal,Aditya N. Bhatt and Yogin B. Bhatt
Abstract | PDF |
23. |
Wavelet Based Approach to Solve Eigenmodes in A Rectangular Waveguide
Pages :1760-1762
Manisha Khulbe, H. Parthsarthy
Abstract | PDF |
24. |
Document Recommendation Using Keyword Extraction for Meeting Analysis
Pages :1763-1766
Kumodini V. Tate, Bhushan R. Nandwalkar
Abstract | PDF |
25. |
Design and Implementation of Boosting Classification Algorithm for Sentiment Analysis
on Newspaper Articles
Pages :1767-1770
Prabhjot Kaur, Rupinder Kaur Gurm
Abstract | PDF |
26. |
Web Based Expert System to Detect and Diagnose the Leaf Diseases of Cereals in Punjabi Language
Pages :1771-1773
Rajvir kaur#, Salam Din
Abstract | PDF |
27. |
Improvement Estimate Wind Turbine Power Generation Using Machine Learning Techniques
Pages :1774-1778
Swarna Jain, Anil Pimpalapure
Abstract | PDF |
28. |
A Survey on Android Malwares and their Detection Mechanisms
Pages :1779-1782
Nancy, Dr. Deepak Sharma
Abstract | PDF |
29. |
Implementation and Analysis of IPS˗AODV for Emergency scenario in MANET
Pages :1783-1787
Kanika, Dr. Vineet Sharma
Abstract | PDF |
30. |
Handwritten English Character Recognition using HMM, Baum-Welch and Genetic Algorithm
Pages :1788-1794
Atmaprakash Singh, Ravindra Nath, Santosh Kumar
Abstract | PDF |
31. |
Color, Texture and Shape Hybrid Features Based Image Retrieval System
Pages :1795-1800
Deepa Dubey, Vivek Suryawanshi
Abstract | PDF |
32. |
Detection Model for CSRF and Broken Authentication and Session Management Attack
Pages :1801-1804
Virginia Mary Nadar, Madhumita Chatterjee, Leena Jacob
Abstract | PDF |
33. |
Rule Based Phonetic Search for Slavic Surnames
Pages :1805-1808
Janki B. Pardeshi, B .R. Nandwalkar
Abstract | PDF |
34. |
An Improved Technique for Gait Recognition Based On PAL and PAL Entropy Image
Pages :1809-1812
Deepti Gautam, Nirendra Kumar
Abstract | PDF |
35. |
Secure Data Aggregation forEnhancingQoS in H-WSN
Pages :1813-1817
Shubhangi Gaikwad, S. V. Todkari
Abstract | PDF |
36. |
An Efficient Framework to Handle DoS Attack by Using Software Puzzle and Decision Tree
Pages :1818-1821
Jyoti Shende, S. Todkari
Abstract | PDF |
37. |
Reduction and Classification of Feature of Cyber Attack Data: Brief Review
Pages :1822-1825
Himanshu Shroti, Kaptan Singh
Abstract | PDF |
38. |
Effective Pattern Identification Approach for Text Mining
Pages :1826-1830
Vaishali Pansare
Abstract | PDF |
39. |
Location Based Opinion Mining of Real Time Twitter Data
Pages :1831-1835
Gargi Mishra, Shivani Varshney
Abstract | PDF |
40. |
A Data Placing Policy Established on Genetic Algorithm in Cloud Computing
Pages :1836-1846
Y.Neeraja, G.Divya Zion, U.Supriya
Abstract | PDF |
41. |
BALANCING LOAD USING GENETIC CRITERIA IN CLOUD COMPUTING
Pages :1847-1856
S. Kowser Sultana, G. Divya Zion, U. Supriya
Abstract | PDF |
42. |
Scheduling the family jobs using Genetic algorithm for Big Data Clouds
Pages :1857-1867
T. Uma Devi, G. Divya Zion, U. Supriya
Abstract | PDF |
43. |
Implementation of Advanced Encryption Standard Algorithm
Pages :1868-1871
H. B. Pethe, Dr. S. R. Pande
Abstract | PDF |
44. |
Review of Offloading Approaches in Mobile Cloud Computing
Pages :1872-1874
Ishali Jain, Rekha Bhatia
Abstract | PDF |
45. |
An Efficient and Privacy Preserving in Multi- Keyword Ranked Search over Encrypted Cloud Data
Pages :1875-1879
Jaikishan A Tindwani#1, Prof. Aruna K Gupta
Abstract | PDF |
46. |
Protected Authorized Deduplication on Cloud Using Hybrid Cloud Approach
Pages :1880-1885
Dr.V.Goutham, G.Shivakrishna, M.Prathyusha
Abstract | PDF |
47. |
A Literature Survey on Web Image Re-Ranking
Pages :1886-1888
Prof. Prakash Gadeka, Jayshri Kokare, Prof. Subhash Pingale
Abstract | PDF |
48. |
Ranking Technically Influential Users on Web Blogs
Pages :1889-1893
Amruta K. Jadhav, Sharvari Tamane
Abstract | PDF |
49. |
Leach Protocol in Wireless Sensor Network: A Survey
Pages :1894-1896
Reshma I. Tandel
Abstract | PDF |
50. |
Load Balancing with Secure and Privacy Preserving by NTRU Implementation for
Customer-Side Networks
Pages :1897-1901
Nitesh Wamanrao Dangare, Prof. S.D. Satav
Abstract | PDF |
51. |
Enhancing Fire Detection for Indoor and outdoor locations via video surveillance
Pages :1902-1906
Rohini Ravindra Jadhav, Prof. P.D. Lambhate
Abstract | PDF |
52. |
Enhanced Elman Neural Network and Its Applications in Agriculture
Pages :1907-1910
Shyamsundar Narayan Patil, Priti Subramanium
Abstract | PDF |
53. |
Data Leakage Detection with K-Anonymity Algorithm
Pages :1911-1915
Wakhare Yashwant R, B. M. Patil
Abstract | PDF |
54. |
Learning System Development Using Ontology and Learning Objects
Pages :1916-1917
Tanaji Jadhav, Harshit Gupta, Chinmay Kshirsagar
Abstract | PDF |
55. |
In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge
Pages :1918-1921
Reshma A. Fegade, Prof. R. D. Bharati
Abstract | PDF |
56. |
An Effective Computation Offloading from Mobile Devices to Cloud
Pages :1922-1927
Jaya Ashok Suradkar, Prof. R. D. Bharati
Abstract | PDF |
57. |
Scalable and Efficient Keyword-based Semantic Search over Encrypted Multi-Cloud Data
Pages :1928-1931
Shraddha Ingale, Prof. Dr. B. D. Phulpagar
Abstract | PDF |
58. |
A Novel Method for Making Cut-Copy-Paste Operations Using Clipboard
Pages :1932-1935
Mayur M Patil, Akkamahadevi R Hanni, Priyadarshini M Patil
Abstract | PDF |
59. |
Deep Web Mining and its Application in Business Intelligence
Pages :1936-1939
RAKESH KUMAR BALODA, PRAVEEN KANTH
Abstract | PDF |
60. |
Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism
Pages :1940-1946
Gayatri D Patwardhan, Prof.B. W. Balkhande
Abstract | PDF |
61. |
Face Recognition
Pages :1947-1951
Ajay Kumar, Navdeep Kaur
Abstract | PDF |
62. |
Assessing Body Volume Index Using Neural Networks
Pages :1952-1954
C.Vishnu Prasad and Dr.D.Gladis
Abstract | PDF |
63. |
Prediction, Sentimental Analysis and Visualization of Static and Dynamic football data using Hadoop
in a Multi-Node system
Pages :1955-1959
Shalom Mathews , Rohan Naik, Keziah Elsa John
Abstract | PDF |
64. |
An Algorithm to Transpose Zero- One Matrix
Pages :1960-1961
Sanil Shanker KP
Abstract | PDF |
65. |
A Review on Reactive & Proactive Routing Protocols and Security Breaches and Remedies in MANETs
Pages :1962-1965
Mohammed Aziz Ahmed, Mohammed Sirajuddin, Nazia Kouser
Abstract | PDF |
66. |
Secure Mobile Adhoc Network using AES and RSA
Pages :1966-1969
Anshul Jain, Sumeet Dhillion, Yogendra Kumar Jain
Abstract | PDF |
67. |
Android Malware Detection using Decision Trees and Network Traffic
Pages :1970-1974
Nancy, Dr. Deepak Sharma
Abstract | PDF |
68. |
An Approach to classify Acute Myelogenous Leukemia Using LBP Based Features
Pages :1975-1978
Neena George, Lisha Mathai
Abstract | PDF |
69. |
An Approach to Cluster Web Pages for Personalization of Web Search
Pages :1979-1985
Amol Rajmane, Pradeep Patil
Abstract | PDF |
70. |
A Survey on Erasure Coding Techniques for Cloud Storage System
Pages :1986-1997
Kiran P. Pawar, R. M. Jogdand
Abstract | PDF |
71. |
Data Mining With Incremental Mapreduce
Pages :1998-2001
Trupti Maruti Shinde, Prof. Santosh V.Chobe
Abstract | PDF |
72. |
Ontology Based Data Extraction for Mining Services in Crawler
Pages :2002-2005
Surekha Rikame, Prof.S.V. Chobe
Abstract | PDF |
73. |
Test Suite Generation of t- way CIT with constraints for Web Based Application
Pages :2006-2010
B. Vani, Dr. R. Deepalakshmi
Abstract | PDF |
74. |
Extracting Content Structure from Web Pages by Applying Vision based Approach
Pages :2011-2016
Prof.K.S.Kadam, Prof.A.B.majgave, Prof.Y.M.Kamble
Abstract | PDF |
75. |
An Ontology-Based Enhance Term Prediction
Algorithm and Union of Divers D-Matrix
Pages :2017-2020
Seema Jadhav, Prof.Santosh Chobe
Abstract | PDF |
76. |
Detecting Facial Wrinkles based on Gabor Filter using Geometric Constraints
Pages :2021-2025
Ashwini Jalindar Mawale, Archana Chaugule
Abstract | PDF |
77. |
Balancing Load Using Genetic Criteria in Cloud Computing
Pages :2026-2034
S. Kowser Sultana, G. Divya Zion, U. Supriya
Abstract | PDF |
78. |
Evaluation of Sensitive Data Security in Android
Pages :2035-2040
Ch.Naveen Kumar Reddy, C.Ramakrishna
Abstract | PDF |
79. |
Secure Image Transmission using Color Transformations and Difference Expansion Data
Embedding Technique
Pages :2041-2045
Pooja Shelar, Archana Chaugule
Abstract | PDF |
80. |
A Simulation Set-Up for Delivery of User Data Groups through Multimedia Broadcast Multicast Service
Pages :2046-2051
Debasis Mukherjee
Abstract | PDF |
81. |
Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Pages :2052-2058
Richa Agnihotri, Dr. Shikha Agrawal, Dr. Rajeev Pandey
Abstract | PDF |
82. |
Request Distribution Strategies in Cluster Based Network Servers
Pages :2059-2062
V.Hema, Dr. K.Kungumaraj
Abstract | PDF |
83. |
Website Personalization based on Link Analysis, Navigational Patterns and Web Content
Pages :2063-2067
Atul N. Pawar, Dr. Suresh K. Shirgave
Abstract | PDF |
84. |
Unsupervised Web Data Extraction Using Trinary Trees
Pages :2068-2070
Prof. N. M. Sawant, Prof. V. V. Pottigar, Miss. P. B. Lamkane
Abstract | PDF |
85. |
Medical Search Engine For More Accurate and Specific Search Results in Cancer Patients Data
Pages :2071-2074
Venkat Reddy Korupally, Subba Rao Pinnamaneni
Abstract | PDF |
86. |
Roads Paved for Reuse in Software Engineering
Pages :2075-2079
N.Krishna Chythanya, Prof. Dr.Lakshmi Rajamani
Abstract | PDF |
87. |
Secure and Effective Web Searching Experience Using Cumulative Weighted Page Rank Algorithm
Pages :2080-2083
Megha Bhawsar, Tejalal Choudhary
Abstract | PDF |
88. |
A Study on Application-Aware Local-Global Source De-duplication for Cloud Backup Services
of Personal Storage
Pages :2084-2086
G.Arunajyothi
Abstract | PDF |
89. |
Efficient & Secure data Retrieval technique using CP-ABE for decentralized DTNs.
Pages :2087-2089
Prof. A.A.Rajguru, Prof. V.V.Pottigar, P.A.Patil
Abstract | PDF |
90. |
Prediction of Type 2 Diabetes using Optimized ANFIS with Genetic Algorithm and Particle
Swarm Optimization
Pages :2090-2095
Alby S, Dr. B L Shivakumar
Abstract | PDF |
91. |
A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme
Pages :2096-2099
Sanjeev Kumar Mandal, A.R Deepti
Abstract | PDF |
92. |
A Survey on Big Data Analytics Using Hadoop Ecosystem Tools
Pages :2100-2102
Monika Yadav, Sonal Chaudhary
Abstract | PDF |
93. |
Sustainable Development of Grampanchayat through E-Governance
Pages :2103-2107
Amit N. Sangole, S.A.Bhura
Abstract | PDF |
94. |
An Application Awareness Local Source and Global Source De-Duplication with Security in resource constraint based Cloud backup services
Pages :2108-2112
S.Meghana
Abstract | PDF |
95. |
Multicast Security Using RSA for Inter Cluster Communication with Rekeying in MANET
Pages :2113-2118
G. Sankara Rao, E. Jagadeswara Rao, K. Suneeta, H. Vanajarani
Abstract | PDF |
96. |
Performance Analysis of Attribute Signature Management Framework(ASMF) for Digital is Document Security and Integrity
Pages :2119-2124
Deepika Pawar, Prof. Mahendra K. Verma
Abstract | PDF |
97. |
Analyzing Social Media Data in Educational Sectors Using Data Mining Techniques
Pages :2125-2129
Manjunath B Talawar, Prasad.M.R, Sreenatha M, Niranjan C Kundur
Abstract | PDF |
98. |
Face Recognition System on Mobile Device based on Web Service approach
Pages :2130-2135
Angelo Galiano, Alessandro Massaro, Donato Barbuzzi, Mattia Legrottaglie,
Valeria Vitti, Leonardo Pellicani, Vitangelo Birardi
Abstract | PDF |
99. |
Performance analysis of Key Frame Extraction using SIFT and SURF algorithms
Pages :2136-2139
Suhas Athani, CH Tejeshwar
Abstract | PDF |
100. |
A Novel Approach of Syntactic Similarity of Question Analogous System
Pages :2140-2144
Neha kumari, Sukhbir Kaur
Abstract | PDF |
|
|