• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 8 ISSUE 1 January - February 2017

    ISSN 0975 - 9646

    1. Tree Pruning Based Searching of Similar Trajectories
    Pages :1-6
    Gajanan S. Gawde, Jyoti D. Pawar
    Abstract | PDFPDF
    2. A Survey on Various Duplicate Detection Methods
    Pages :7-9
    M.Priyanka, Asha Baby
    Abstract | PDFPDF
    3. Efficient Loss Recovery in Ad Hoc Networks
    Pages :10-15
    S Yasaswini, G M Naik, P G K Sirisha
    Abstract | PDFPDF
    4. Implementation Advance Technique for Prediction Bug Using Machine Learning
    Pages :16-19
    Pooja Maltare,Vishal Sharma
    Abstract | PDFPDF
    5. Secured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates
    Pages :20-26
    G.Gayathri, T.Anitha
    Abstract | PDFPDF
    6. Constructs of Natural Language Processing
    Pages :27-30
    Mallamma V. Reddy, Hanumanthappa M.
    Abstract | PDFPDF
    7. Scaling Solr Performance Using Hadoop for Big Data
    Pages :31-33
    Tarun Patel, Dixa Patel, Ravina Patel, Siddharth Shah
    Abstract | PDFPDF
    8. An Elevation of Image Compression Techniques
    Pages :34-41
    Nidhi Bansal, Hariom Tyagi
    Abstract | PDFPDF
    9. Comparative Study on Big Data Analytic Frameworks in Cloud
    Pages :42-44
    D.Avinash Babu, A.Koushik
    Abstract | PDFPDF
    10. Identifying Pedophiles by Visualizing Vein Patterns from Color Skin Images
    Pages :45-47
    Anila S, Anitha Mary M.O. Chacko
    Abstract | PDFPDF
    11. Grapheme Segmentation of Tamil Speech Signals using Excitation Information with MFCC and LPCC Features
    Pages :48-52
    Geetha K, Dr. R. Vadivel
    Abstract | PDFPDF
    12. A Feasible Method for Blurbing Higher Education Institute
    Pages :53-55
    Dileep Kumar Yadav, Surjeet Kumar
    Abstract | PDFPDF
    13. Survey on Algorithms for Brain Tumor Detection
    Pages :56-58
    Priyanka Shah, Manila Jeshnani, Sagar Kukreja, Priyanka Ailani
    Abstract | PDFPDF
    14. Big Data Performance and Comparison with Different DB Systems
    Pages :59-63
    Matteo D’Aloia, Ruggero Russo, Gianpaolo Cice, Angela Montingelli, Gaetano Frulli, Egidio Frulli,
    Francesca Mancini, Maria Rizzi, Annalisa Longo
    Abstract | PDFPDF
    15. A Genetic approach to Segment a Remote Sensing Image by Removing Haze Distortion
    Pages :64-67
    Eshita
    Abstract | PDFPDF
    16. Functional Dependency Based Data Distribution by Using Association Patterns
    Pages :68-72
    Nisha
    Abstract | PDFPDF
    17. Ant Colony Optimization Based Hyper Pipes Classifier for IDS
    Pages :73-80
    Kumari Babita and Piyush Singh
    Abstract | PDFPDF
    18. Power of Nonverbal Communication in Project Management
    Pages :81-88
    Priyadarshi Saha
    Abstract | PDFPDF
    19. Similarity Measures of Web Repositories constructed by Focused Crawling from Database Driven Websites
    Pages :89-93
    J.Tamilselvan, Dr. A.Senthilrajan
    Abstract | PDFPDF
    20. Secured Data Exchange Mechanism used in Military Networks Using Minimal Keys in Sensor Networks
    Pages :94-99
    Thandava Sumanth, B.Madhusudhana Rao
    Abstract | PDFPDF
    21. A Review of Different Content Based Image Retrieval Techniques
    Pages :100-104
    Shristi Jain, Dr. Asmita A. Moghe
    Abstract | PDFPDF
    22. Review Techniques of Knowledge mining
    Pages :105-108
    Reema Thareja,Charu Sharma,Ridhi Gupta,Prerna Goel,Kriti singhal
    Abstract | PDFPDF
    23. Image Super Resolution Using Sparse Neighbour Embedding and clustering algorithm
    Pages :109-111
    Dr. Dharmanna L, Deekshith K
    Abstract | PDFPDF
    24. Mobile Opportunistic Network
    Pages :112-115
    Merlin John, Beyona Jose, Linta Abraham, Shintamol Thomas, Josmy George
    Abstract | PDFPDF
    25. Robotic Algorithm Development
    Pages :116-119
    Palash Shrawak, Tanzeem Kagzi , Ayush Pratap Singh, Brijesh Dobariya, Prof. Pranali Lokhande, Prof. B.R. Alhat
    Abstract | PDFPDF
    26. Identify Fake and Real User Face by using Client Information for Face Antispoofing
    Pages :120-124
    Poonam Nemade, Rekha jadhav
    Abstract | PDFPDF
    27. A Model Checker for Epistemic Hybrid Automata Using Constraints Logic Programming
    Pages :125-131
    Ammar Mohamed, Rana Mohamed, Hesham Hefny
    Abstract | PDFPDF
    28. A Critical Review of Fault Tolerance: Security Perspective
    Pages :132-135
    Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan
    Abstract | PDFPDF
    29. A Review: Cryptographically Efficient, Dynamically Strong, Securely proven Optimal and hybrid Hierarchal Access Control System
    Pages :136-140
    Smita Parte, Dr. Durgesh Kumar Mishra
    Abstract | PDFPDF
    30. Improved Pass-BYOP Based Graphical Authentication System Using Video Splitting Method
    Pages :141-145
    Garima Mathur, Gagan Vishwakarma
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-