1. |
Tree Pruning Based Searching of Similar Trajectories
Pages :1-6
Gajanan S. Gawde, Jyoti D. Pawar
Abstract | PDF |
2. |
A Survey on Various Duplicate Detection Methods
Pages :7-9
M.Priyanka, Asha Baby
Abstract | PDF |
3. |
Efficient Loss Recovery in Ad Hoc Networks
Pages :10-15
S Yasaswini, G M Naik, P G K Sirisha
Abstract | PDF |
4. |
Implementation Advance Technique for Prediction Bug Using Machine Learning
Pages :16-19
Pooja Maltare,Vishal Sharma
Abstract | PDF |
5. |
Secured Data Transfer & Avoidance of Forgery
Attacks with Digital Certificates
Pages :20-26
G.Gayathri, T.Anitha
Abstract | PDF |
6. |
Constructs of Natural Language Processing
Pages :27-30
Mallamma V. Reddy, Hanumanthappa M.
Abstract | PDF |
7. |
Scaling Solr Performance Using Hadoop for Big
Data
Pages :31-33
Tarun Patel, Dixa Patel, Ravina Patel, Siddharth Shah
Abstract | PDF |
8. |
An Elevation of Image Compression Techniques
Pages :34-41
Nidhi Bansal, Hariom Tyagi
Abstract | PDF |
9. |
Comparative Study on Big Data Analytic Frameworks in Cloud
Pages :42-44
D.Avinash Babu, A.Koushik
Abstract | PDF |
10. |
Identifying Pedophiles by Visualizing Vein Patterns from Color Skin Images
Pages :45-47
Anila S, Anitha Mary M.O. Chacko
Abstract | PDF |
11. |
Grapheme Segmentation of Tamil Speech Signals using Excitation Information with MFCC and
LPCC Features
Pages :48-52
Geetha K, Dr. R. Vadivel
Abstract | PDF |
12. |
A Feasible Method for Blurbing Higher Education Institute
Pages :53-55
Dileep Kumar Yadav, Surjeet Kumar
Abstract | PDF |
13. |
Survey on Algorithms for Brain Tumor Detection
Pages :56-58
Priyanka Shah, Manila Jeshnani, Sagar Kukreja, Priyanka Ailani
Abstract | PDF |
14. |
Big Data Performance and Comparison with Different DB Systems
Pages :59-63
Matteo D’Aloia, Ruggero Russo, Gianpaolo Cice, Angela Montingelli, Gaetano Frulli, Egidio Frulli,
Francesca Mancini, Maria Rizzi, Annalisa Longo
Abstract | PDF |
15. |
A Genetic approach to Segment a Remote Sensing Image by Removing Haze Distortion
Pages :64-67
Eshita
Abstract | PDF |
16. |
Functional Dependency Based Data Distribution by Using Association Patterns
Pages :68-72
Nisha
Abstract | PDF |
17. |
Ant Colony Optimization Based Hyper Pipes Classifier for IDS
Pages :73-80
Kumari Babita and Piyush Singh
Abstract | PDF |
18. |
Power of Nonverbal Communication in Project Management
Pages :81-88
Priyadarshi Saha
Abstract | PDF |
19. |
Similarity Measures of Web Repositories constructed by Focused Crawling from Database
Driven Websites
Pages :89-93
J.Tamilselvan, Dr. A.Senthilrajan
Abstract | PDF |
20. |
Secured Data Exchange Mechanism used in Military Networks Using Minimal Keys in Sensor
Networks
Pages :94-99
Thandava Sumanth, B.Madhusudhana Rao
Abstract | PDF |
21. |
A Review of Different Content Based Image Retrieval Techniques
Pages :100-104
Shristi Jain, Dr. Asmita A. Moghe
Abstract | PDF |
22. |
Review Techniques of Knowledge mining
Pages :105-108
Reema Thareja,Charu Sharma,Ridhi Gupta,Prerna Goel,Kriti singhal
Abstract | PDF |
23. |
Image Super Resolution Using Sparse Neighbour Embedding and clustering algorithm
Pages :109-111
Dr. Dharmanna L, Deekshith K
Abstract | PDF |
24. |
Mobile Opportunistic Network
Pages :112-115
Merlin John, Beyona Jose, Linta Abraham, Shintamol Thomas, Josmy George
Abstract | PDF |
25. |
Robotic Algorithm Development
Pages :116-119
Palash Shrawak, Tanzeem Kagzi , Ayush Pratap Singh, Brijesh Dobariya, Prof. Pranali Lokhande, Prof. B.R. Alhat
Abstract | PDF |
26. |
Identify Fake and Real User Face by using Client Information for Face Antispoofing
Pages :120-124
Poonam Nemade, Rekha jadhav
Abstract | PDF |
27. |
A Model Checker for Epistemic Hybrid Automata Using Constraints Logic Programming
Pages :125-131
Ammar Mohamed, Rana Mohamed, Hesham Hefny
Abstract | PDF |
28. |
A Critical Review of Fault Tolerance: Security Perspective
Pages :132-135
Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan
Abstract | PDF |
29. |
A Review: Cryptographically Efficient, Dynamically Strong, Securely proven Optimal and
hybrid Hierarchal Access Control System
Pages :136-140
Smita Parte, Dr. Durgesh Kumar Mishra
Abstract | PDF |
30. |
Improved Pass-BYOP Based Graphical Authentication System Using Video Splitting
Method
Pages :141-145
Garima Mathur, Gagan Vishwakarma
Abstract | PDF |
|
|