• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 8 ISSUE 2 March - April 2017

    ISSN 0975 - 9646

    1. Object Detection Using Background Subtraction Tolerating Sudden Background Variations
    Pages :146-148
    Aruna A S, Deepthi K
    Abstract | PDFPDF
    2. An Empirical Study of Geographic Popularity Patterns of Motion Picture Content across Europe
    Using Unsupervised Machine Learning

    Pages :149-152
    Pawan Dwivedi, Pentyala Srinivasa Rao
    Abstract | PDFPDF
    3. An Efficient Dynamic Data Replication for HDFS using Erasure Coding
    Pages :153-158
    Franklin John, Suji Gopinath, Elizabeth Sherly
    Abstract | PDFPDF
    4. Threshold Based Enhanced Segmentation Technique for Early Detection and Prediction of Lung Cancer
    Pages :159-162
    Sneha Kumari
    Abstract | PDFPDF
    5. Comparison Study of Algorithms Used for Feature Extraction in Facial Recognition
    Pages :163-166
    Shreyas N Raj, Prof.Vijayalakshmi Niar
    Abstract | PDFPDF
    6. CURVELET Based IMAGE COMPRESSION
    Pages :167-169
    Sree Lekshmi A N, Lekshmi Priya A N
    Abstract | PDFPDF
    7. An IOT Based Appliances Control for Smart Homes
    Pages :170-174
    Padilla Syamala, Ch. Lalitha
    Abstract | PDFPDF
    8. Hybrid Technique for Medical Image Segmentation to detect Brain Tumour
    Pages :175-177
    S.U.Ravi Kumar Chavali, Dr.I.H.Nagaraja Rao
    Abstract | PDFPDF
    9. Joint Activities of Market Basket Analysis and Product Facing for Business Intelligence oriented
    on Global Distribution Market: examples of data mining applications

    Pages :178-183
    Alessandro Massaro, Angelo Galiano, Donato Barbuzzi, Leonardo Pellicani, Giuseppe Birardi, Davide
    Donato Romagno, Luisa Frulli
    Abstract | PDFPDF
    10. Parameter Optimization using Genetic Algorithm for Classification of Multispectral Satellite Images
    Pages :184-186
    Mamta N. Marbate, Dr. M. M. Raghuwanshi
    Abstract | PDFPDF
    11. A Hybrid Particle Swarm Optimization Algorithm for Solving Optimization Problem
    Pages :187-189
    Pintu Pal
    Abstract | PDFPDF
    12. The Security SEAL : A Security Solution for SMART CITIES
    Pages :190-193
    Sri Harsha
    Abstract | PDFPDF
    13. Automatic Text Summarization with Cohesion Features
    Pages :194-198
    Nilesh R. Patil, Girish Kumar Patnaik
    Abstract | PDFPDF
    14. Distributed Intrusion Detection System Using Clustering approach And Genetic Algorithm
    Pages :199-207
    Snehil Dahima, Dr. Jitendra Sheetlani
    Abstract | PDFPDF
    15. A Survey on Computing, Communication& Identification Technologies Used For Internet of Things
    Pages :208-211
    Prof. Apurva B. Parandeka, Prof. Ambarish R. Bhuyar
    Abstract | PDFPDF
    16. Clustering with Mobile Sink in WSN
    Pages :212-216
    Inderjeet Singh, Pooja, Varsha
    Abstract | PDFPDF
    17. E-Learning: A Tool for Enhancing Teaching and Learning in Educational Institutes
    Pages :217-221
    Abubakar Mohammed, Sanjeev Kumar, Bashir Maina Saleh, Aishatu Shuaibu
    Abstract | PDFPDF
    18. Protection of Data during Data Migration
    Pages :222-223
    Nitin P.S.S., Prof. Sudha. T, P.S.Maheswari
    Abstract | PDFPDF
    19. Review on Benefits and Security Challenges of Cloud Computing
    Pages :224-228
    Nasarul Islam.K.V
    Abstract | PDFPDF
    20. A Semantic-Based Friend Recommendation System Based On Lifestyle Matching
    Pages :229-231
    Prof. Vijayalaxmi Kanade , Pratibha Uphade, Priti Thite, Omkar Bandal, Neeraj Datar
    Abstract | PDFPDF
    21. A Parallel Incremental Mining Algorithm using Modified Inverted Matrix
    Pages :232-236
    Siddharth Shah, Aniruddha K, Prerak Thakkar, Chinmay Joshi, Gopi Bhatt
    Abstract | PDFPDF
    22. Honeypot Based Intrusion Detection System with Snooping agents and Hash Tags
    Pages :237-242
    Vishal Joshi and Parveen Kakkar
    Abstract | PDFPDF
    23. Optimized Load Balancing using Linear Programming
    Pages :243-246
    Prof.B.C. Julme, Spruha Shevade, Pranita Shinde, Shweta Lokhande, Sneha Suryawanshi
    Abstract | PDFPDF
    24. Enhanced Public Auditing for Code-Based Multiserver Cloud
    Pages :247-251
    Chitra V Bawankule, Megha C Sadawarti, Shradha D Agnihotri
    Abstract | PDFPDF
    25. Web 2.0 Technology Enhancements to Support E-governance Implementation
    Pages :252-255
    Bindu.N
    Abstract | PDFPDF
    26. Modern Machine Learning Approaches For Robotic Path Planning- Analytic research and comparison
    Pages :256-259
    Shreyas J, Sandeep J
    Abstract | PDFPDF
    27. Task management of Robot using Priority Job Scheduling
    Pages :260-265
    Amitava Kar, Ajoy Kumar Dutta and Subir Kumar Debnath
    Abstract | PDFPDF
    28. Effective On-Page Optimization for Better Ranking
    Pages :266-270
    Dr. N. Yuvaraj, S. Gowdham, V.M. Dinesh Kumar and S. Mohammed Aslam Batcha
    Abstract | PDFPDF
    29. Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware
    Pages :271-275
    Shayan Taheri and Jiann-Shiun Yuan
    Abstract | PDFPDF
    30. An Improved Annotation based Summary Generation for Unstructured Data
    Pages :276-284
    Teena Bhawsar, Devendra singh Kaushal
    Abstract | PDFPDF
    31. Comparative Analysis Using Hive and Pig on Consumers Data
    Pages :285-291
    Pooja Jain, Prof. Jay Prakash Maurya
    Abstract | PDFPDF
    32. UBlood: Utilize every cell of Blood- A Proposed Mobile based Application Framework
    Pages :292-294
    Simmi Chawla, Tarun Dalal
    Abstract | PDFPDF
    33. Updating of Inter-quartile range Virtual Machine Allocation policy in cloud computing
    Pages :295-297
    Anurudh Kumar Upadhyay, Prof. Kailash Patidar
    Abstract | PDFPDF
    34. Denial of Service Attack Detection and Secure Data Transmission Using Trusted Path in MANET
    Pages :298-301
    Shilpa Agnihotri, Prof. Amit Saxena
    Abstract | PDFPDF
    35. Smart Home System using Raspberry Pi
    Pages :302-305
    Danesh Marolia, Abhishek Khadse, Akshay Lemos, Godson Lemos
    Abstract | PDFPDF
    36. A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing
    Pages :306-310
    R.Gowthami Saranya, A.Kousalya
    Abstract | PDFPDF
    37. A study on Defacing Ransomware: Are we aware and ready?
    Pages :311-317
    Naman Gupta, Vidyavati Ramteke
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-