IF

 

bh

 

VOLUME 5 ISSUE 3 May - June 2014

ISSN 0975 - 9646

1. Towards Secure Cloud Infrastructure with Cloud Validation
Pages : 2676-2683
Sathiya Moorthy S and Chandrasekar C
Abstract | PDFPDF
2. An Illustrative Analysis of Mathematical Morphology Operations for MRI Brain Images
Pages : 2684-2688
N.Senthilkumaran, J.Thimmiaraja
Abstract | PDFPDF
3. Face Recognition under Pose Variations
Pages : 2689-2693
Jagdish P. Sarode and Alwin D. Anuse
Abstract | PDFPDF
4. Compact Structure of Felonious Crime Sets Using FP-Tree Comparable Algorithms Analysis
Pages : 2694-2699
Apexa Joshi, Dr. Suresh M. B.
Abstract | PDFPDF
5. Cloud Based Managed File Transfer Services
Pages : 2700-2702
Pranav Kulkarni, Sahil Jain, Vinay Kumar
Abstract | PDFPDF
6. TBDS- A New Data Security Algorithm in Cloud Computing
Pages :2703-2706
R. K. Seth and Rimmy Chuchra and Simran
Abstract | PDFPDF
7. Page Ranking Algorithm Based on Counts of Link Hits (PRCLH): An Implementation
Pages : 2707-2712
Zaved Akhtar, Saoud Sarwar
Abstract | PDFPDF
8. Formal Specification of UML Use Case Diagram - A CASL based approach
Pages : 2713-2717
Bhaswati Mondal, Barun Das, Prasenjit Banerjee
Abstract | PDFPDF
9. Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm
Pages : 2718-2722
Gurkamal Bhullar, Navneet Kaur
Abstract | PDFPDF
10. Performance Analysis in Ad-Hoc Network
Pages : 2723-2728
Princy Tyagi
Abstract | PDFPDF
11. A Comprehensive Survey on Efficient Routing Protocols And Simulation Tools For VANET
Pages : 2729-2737
M.Siva Sangari, Dr.K.Baskaran
Abstract | PDFPDF
12. Energy-Efficient and Secure Routing In Wireless Sensor Networks
Pages : 2738-2741
Asha Devi. A, RameshKumar. M
Abstract | PDFPDF
13. Estimating Software Development Effort using UML Use Case Point (UCP) Method with a Modified set of Environmental Factors
Pages :2742-2744
Pragya Jha1, Preetam Pratap Jena, Rajani Kanta Malu
Abstract | PDFPDF
14. TCP Based Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing
Pages :2745-2748
Monika Waghmare, Prof T.A.Chavan
Abstract | PDFPDF
15. An Efficient Iris Recognition System using Dualtree Complex Wavelet Transform
Pages :2749-2754
Neelam T. Rakate, Prof. U. A. Patil
Abstract | PDFPDF
16. Review on Node-Disjoint Multipath Routing Based on AOMDV Protocol for MANETS
Pages :2755-2757
Er.Rubia Singla, Er.Jasvir Singh
Abstract | PDFPDF
17. Reliable Communication in Event Processing Systems
Pages :2758-2761
Kannadasan.R, Sandeep Kumar.J, Venu Kumar.B
Abstract | PDFPDF
18. Channel Modelling and Optimization of Wireless Body Area Network (WBAN)
Pages :2762-2766
Sindhu R Pai , Kavitha C
Abstract | PDFPDF
19. Performance of Clustering Algorithms on Home Interview Survey Data Employed for Travel Demand Estimation
Pages :2767-2771
Anand Sesham , Padmanabham P, Goverdhan A, Sai Hanuman A
Abstract | PDFPDF
20. A Novel Fuzzy Controller for Dynamic Cloud Applications
Pages :2772-2775
R. Nandhiniprabha, G. Sudhakar
Abstract | PDFPDF
21. Analyzing Performance of Zone Routing Protocol by Varying Node Density and Transmission Range
Pages :2776-2782
Vishal Polara, Pooja Bhatt
Abstract | PDFPDF
22. A Survey on IDS Techniques to Detect Misbehavior Nodes in Mobile Ad-hoc Network
Pages :2783-2787
Sarika Patil, Deepali Borade
Abstract | PDFPDF
23. Data Hiding in Audio by Reserving Room in Advance of Encryption
Pages :2788-2792
B.Kavitha, Mrs.Brindha Rajakumari
Abstract | PDFPDF
24. Review on Network on Chip Router Design
Pages :2793-2795
Vikrant A. Bute, Devendra S. Chaudhari
Abstract | PDFPDF
25. CIPHER-Text Policy Attribute Based Access to Cloud
Pages :2796-2799
Venkateshprasad.Kalluri, D.Haritha
Abstract | PDFPDF
26. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal
Patterns

Pages :2800-2802
A.Vineela, P. Penchala Prasad Y.Janardhan Reddy
Abstract | PDFPDF
27. Emergency Management System Using Android Application
Pages :2803-2805
Rehka Jadhav, Jwalant Patel, Darshan Jain, Suyash Phadhtare
Abstract | PDFPDF
28. Clustering-Classification Based Prediction of Stock Market Future Prediction
Pages :2806-2809
Abhishek Gupta, Dr. Samidha D. Sharma
Abstract | PDFPDF
29. Secure Cloud Storage with File Assured Deletion
Pages :2810-2815
Gousiya Begum, M. Shravya
Abstract | PDFPDF
30. A Review - Prevention and Detection of Black Hole Attack in AODV based on MANET
Pages :2816-2818
Bhoomika Patel, Khushboo Trivedi
Abstract | PDFPDF
31. A Denoising Framework with a ROR Mechanism Using FCM Clustering Algorithm and NLM
Pages :2819-2823
M. Nandhini, Dr.T.Nalini
Abstract | PDFPDF
32. Capital Letter Recognition in Non Cursive Handwritten Documents
Pages :2824-2827
Samudra Gupt Maurya, Ritika Chugh, Rohit Kumar, P V Manoj
Abstract | PDFPDF
33. Remote Vehicle Tracking & Driver Health Monitoring System Using GSM Modem & Google Maps
Pages :2828-2832
Madhuri Unde, Bharat Borkar
Abstract | PDFPDF
34. TCET Connect - Social Networking Site for College
Pages :2833-2836
Anil Vasoya, Aditya Yadav, Samkit Sheth, Vivek Mishra
Abstract | PDFPDF
35. Two Stage Block-Wise Fingerprint Enhancement Using Discrete Wavelet Transform
Pages :2837-2840
J.P.Bidishaw, Dr.T.Nalini
Abstract | PDFPDF
36. Software Development Effort Estimation Using Fuzzy Logic: A Review
Pages :2841-2845
Shifali, Naveen Bilandi
Abstract | PDFPDF
37. Intrusion Protection against SQL Injection And Cross Site Scripting Attacks Using a Reverse Proxy
Pages :2846-2850
Tanmay S. Mule , Aakash S. Mahajan, Sangharatna Kamble, Omkar Khatavkar
Abstract | PDFPDF
38. A Security Architecture of Cloud Computing for Business applications
Pages :2851-2854
Sreeja S , Chithra P,Jesna Jose
Abstract | PDFPDF
39. Survey on Different Process Models Used In Software Development
Pages :2855-2860
Anu P Salim. , Chithra P. , Sreeja S.
Abstract | PDFPDF
40. A Survey on Task Distribution Approach for Mobile Cloud Computing Application
Pages :2861-2864
Vishal Tiwari, Prof L.H.Patil
Abstract | PDFPDF
41. Acceleration of LSB Algorithm in GPU
Pages :2865-2867
Darshan R, Prabu R, Divya M
Abstract | PDFPDF
42. Effective Distributed Accountability for Data Shearing In cloud
Pages :2868-2870
Rahul H. Bhole, Ganesh K. Pakle
Abstract | PDFPDF
43. Feature Selection Using Genetic Algorithm with Mutual Information
Pages :2871-2874
S. Sivakumar, Dr.C.Chandrasekar
Abstract | PDFPDF
44. Mathematical Interpretation of the Maturity Levels in the Ticket Based Information Technology
Service Management Model

Pages :2875-2881
Jayant Biswas, Snigdha Srivastava, Gaurav Prakash
Abstract | PDFPDF
45. Detection of Geo-Spatial Targets in High Resolution Remote Sensing Images
Pages :2882-2885
Thirumalini.S, Varunkumar.M, Vani sri
Abstract | PDFPDF
46. Image Based Encryption Techniques: A Review
Pages :2886-2889
Aman Jain, Namita Tiwari, Madhu Shandilya
Abstract | PDFPDF
47. Random walker Segmentation based Cancer Detection technique
Pages :2890-2894
Ruchi Thakur, Prof. Piyush Singh, Prof. Gourav Shrivastava
Abstract | PDFPDF
48. A Genetic Programming Approach for Record Deduplication
Pages :2895-2898
R.Parimala devi , Dr. V.Thigarasu
Abstract | PDFPDF
49. Service Level Agreement Assurance in Cloud Computing: A Trust Issue
Pages :2899-2906
S.B.Dash, H.Saini , T.C.Panda, A. Mishra
Abstract | PDFPDF
50. Development of an Algorithm for Stock Market Trading
Pages :2907-2909
Dr.Ajit More and CA Aseema Dake Kulkarni
Abstract | PDFPDF
51. ARM Based Smart Power Saving System for Home Automation
Pages :2910-2913
Madhu M S, Gangadhar M, Sanjaya G C
Abstract | PDFPDF
52. Encryption Based Steganography- Modern Approach for Information Security
Pages :2914-2917
Mohammad Sajid Khan, Sarvesh Singh Rai
Abstract | PDFPDF
53. Designing Various CPU Scheduling Techniques using SCILAB
Pages :2918-2923
Mona Saini
Abstract | PDFPDF
54. Security in Composite Mobile Services and Load Balancing
Pages :2924-2927
Vishi Narayan, R.Krishnakripa, Rohit Mishra, Sagar Rathore, Trishna Panse
Abstract | PDFPDF
55. Moving from E-Government to Semantic E-Government
Pages :2928-2932
Dr. Parul Verma
Abstract | PDFPDF
56. Introducing Multiparty Authorization And String Search In A Parental Controlled Social Network
Pages :2933-2936
Anu P Salim, Reeba R
Abstract | PDFPDF
57. Authentication Using Minutiae Based Fingerprint Matching Scheme for Smart Phones
Pages :2937-2939
Irene Getzi S
Abstract | PDFPDF
58. Improvement in Performance of the VoIP Over WLAN
Pages :2940-2941
Laxmi Poonia, Sunita Gupta, Manoj Gupta
Abstract | PDFPDF
59. Semi-Distributed Cloud Computing System with Load Balancing Algorithm
Pages :2942-2947
Payal A.Pawade, Prof. V. T. Gaikwad
Abstract | PDFPDF
60. A Quick Survey on Data Stream Mining
Pages :2948-2950
Poonam Debnath , Santoshkumar Chobe
Abstract | PDFPDF
61. Vampire Attacks Deploying Resources in Wireless Sensor Networks
Pages :2951-2953
P.Rajipriyadharshini,V.Venkatakrishnan,S.Suganya,A.Masanam
Abstract | PDFPDF
62. An Efficient Approach for Number Plate Extraction from Vehicles Image under Image Processing
Pages :2954-2959
Sarbjit Kaur, Sukhvir Kaur
Abstract | PDFPDF
63. Time Based (TB) Application model for Mobile Cloud computing
Pages :2960-2962
Siddiqui Mohammad Saad, Prof. S.C.Nandedkar
Abstract | PDFPDF
64. Study of Existing Method of Finding Aliases and Improve Method of Finding Aliases from Web
Pages :2963-2973
Ravi H. Gedam, Prof. T.Yengantiwar, Prof. P.Velavan
Abstract | PDFPDF
65. Current Refuge Trends using Classical and Quantum Cryptography
Pages :2974-2977
Rohit Kumar, Ritika Chugh, Samudra Gupt Maurya, P.V. Manoj
Abstract | PDFPDF
66. Multi-View Face Recognition Using Local Binary Pattern
Pages :2978-2981
H.Girisha , B.Sreepathi , K.Karibasappa
Abstract | PDFPDF
67. Comparative Study of Motion Estimation Techniques in Video
Pages :2982-2989
S Sangeeta Mishra, Chittaranjan Pradhan, Alka Singh
Abstract | PDFPDF
68. Automatic Generation of Platforms in Cloud Computing
Pages :2990-2994
Mathews Abraham, Kuttyamma A.J
Abstract | PDFPDF
69. A review on Security in Distributed Information Sharing
Pages :2995-3000
Swati Upadhyay, Prof J P Maurya
Abstract | PDFPDF
70. Automated Car Parking System Commanded by Android Application
Pages :3001-3004
Prof. D. J. Bonde , Rohit S. Shende, Ketan S. Gaikwad, Akshay S. Kedari,Amol U. Bhokre
Abstract | PDFPDF
71. Bandwidth and Transmit Power Allocation for QoS Support in Wireless Networks
Pages :3005-3010
Shiji.S, S.Subasree
Abstract | PDFPDF
72. Interpreting Stakeholder Roles in ERP Implementation Projects: a Case Study
Pages :3011-3018
Smiju Sudevan, Prof.M.Bhasi, Prof.K.V.Pramod
Abstract | PDFPDF
73. To Prepare a Forecasting Proxy Server to Improve Hits Using SVM.
Pages :3019-3024
Suvarna Temgire, Poonam Gupta
Abstract | PDFPDF
74. Survey on Image Segmentation Techniques and Color Models
Pages :3025-3030
Savita Agrawal, Deepak Kumar Xaxa
Abstract | PDFPDF
75. A Survey Report on Requirement Traceability of Service Oriented Architecture
Pages :3031-3033
Saini Subhadarshini, Abhishek Ray
Abstract | PDFPDF
76. Optimization of Large Data in Cloud computing using Replication Methods
Pages :3034-3038
Vijaya -Kumar-C , Dr. G.A. Ramachandhra
Abstract | PDFPDF
77. Survey and Analysis on Advance Technique of Wireless Sensor Network Technology
Pages :3039-3041
Sanket S.Desale , Prof Mr.S.P.Medhane
Abstract | PDFPDF
78. Challenges to Big Data Security and Privacy
Pages :3042-3043
Manju Kaushik, Aditi Jain
Abstract | PDFPDF
79. Efficient File Transmission and Load Balancing using Multicast over Dynamic Bandwidth Weighted Links
Pages :3044-3046
Onkar Habbu, Jayant Golhar, Chinmay Nalawade, Sunil Mane
Abstract | PDFPDF
80. A Review of Security Mechanisms for Detection of Malicious Transactions in Database
Pages :3047-3051
Varada Bharat Srinivas, Dr.Syed Umar
Abstract | PDFPDF
81. DBMS as a Cloud Service
Pages :3052-3054
Yatharth Bhatnagar, Sarwesh Sethiya, Siddharth Jain
Abstract | PDFPDF
82. Performance Enhancement in Collaborative Filtering Technique by Removing Shilling Effect
Pages :3055-3057
Pooja, Max Bhatia
Abstract | PDFPDF
83. Secure Computation in Cloud Environment
Pages :3058-3061
Fazail Amin
Abstract | PDFPDF
84. Geographical Topologies of Routing Protocols in Vehicular Ad hoc Networks – A Survey
Pages :3062-3065
Aashish Kumar,Mack Tyagi
Abstract | PDFPDF
85. Eliminating the Noise from Web Pages using Page Replacement Algorithm
Pages :3066-3068
Rajni Sharma, Max Bhatia
Abstract | PDFPDF
86. Uncertain Data Mining using Decision Tree and Bagging Technique
Pages :3069-3073
Manasi M. Phadatare, Sushma S. Nandgaonkar
Abstract | PDFPDF
87. Comparison of Various Clustering Algorithms
Pages :3074-3076
Garima Sehgal, Dr. Kanwal Garg
Abstract | PDFPDF
88. Energy Conservation in Wireless Sensor Networks Using Top-Down Approach with Regular Sleep and Wake Periods
Pages :3077-3080
Balaji M. Kore, Prof. S. K. Pathan
Abstract | PDFPDF
89. Identifying Customer Interest in Real Estate Using Data Mining Techniques
Pages :3081 - 3084
Vishal Venkat Raman, Swapnil Vijay, Sharmila Banu K
Abstract | PDFPDF
90. Impact of PageRank and its Variation On Convergence and Ranking
Pages :3085 - 3088
Harjeet Kaur and Dr. Kanwal Garg
Abstract | PDFPDF
91. Web Security using Transparent Image Captcha (TIC)
Pages :3089 - 3092
Ved Prakash Singh, Preet Pal, Pushpendra Kumar Pateriya
Abstract | PDFPDF
92. Mining Distributed Frequent Itemset with Hadoop
Pages :3093 - 3097
Poonam Modgi, Prof. Dinesh Vaghela
Abstract | PDFPDF
93. Real Time Sentiment Analysis of Twitter Data Using Hadoop
Pages :3098 - 3100
Sunil B. Mane, Yashwant Sawant, Saif Kazi, Vaibhav Shinde
Abstract | PDFPDF
94. Avalanche Effect of AES Algorithm
Pages :3101 - 3103
Jayant P. Bhoge, Dr. Prashant N. Chatur
Abstract | PDFPDF
95. Anomaly Extraction In Backbone Network Using Association Rules
Pages :3104 - 3106
Pratiksha R. Naik, Shruti S. Kedari, Snehal G. Pawale
Abstract | PDFPDF
96. Review of VANET Mobility Models with New Cluster Based Routing Protocol
Pages :3107 - 3111
Nisha V. Jadhav
Abstract | PDFPDF
97. Performance Improvement of Web Caching Page Replacement Algorithms
Pages :3112 - 3115
Deepak Sachan, Dhawaleshwar Rao Ch
Abstract | PDFPDF
98. Analyze and Design of Green Computing in Health Care Center
Pages :3116 - 3118
Sudhakar Murugesan, Seenuvasan Arumugam
Abstract | PDFPDF
99. Testing Approaches to Generate Automated Unit Test Cases
Pages :3119 - 3121
Parul Sharma, Neha Bajpai
Abstract | PDFPDF
100. A Survey: Classification of E-mail Data Using Semi Supervised Learning
Pages :3122 - 3125
Hiral Dilipbhai Padhiyar, Prof. Purvi Rekh
Abstract | PDFPDF
101. Fine Grained Data Access Control in Cloud Computing
Pages :3126 - 3131
A.Parameshwari, B.Rasina Begum
Abstract | PDFPDF
102. A Hybrid DCT and DWT Color Image Watermarking in RGB Color Space
Pages :3132 - 3138
Jaya Jeswani, Tanuja Sarode
Abstract | PDFPDF
103. Review on Performance Improvement of TCP with TCP New Reno & Improved Westwood
Pages :3139 - 3141
Er.Karuna Mittal, Er.Jasvir Singh
Abstract | PDFPDF
104. Implementation of Artificial Intelligence for Best Moves using Chessboard
Pages :3142 - 3144
Priya Hajari ,Raakhee Iyer , Ashish Patil
Abstract | PDFPDF
105. Performance and Analysis of Routing Protocols with TCP Traffic in Mobile Ad Hoc Network
Pages :3145 - 3148
Sandeep Sandhu, Anirudh Menon, Parikshit Sinha, Nirav Afinwale
Abstract | PDFPDF
106. Genetic Based Prioritization Regression Testing
Pages :3149 - 3151
Quience Gulati, Arun Prakash Agarwal
Abstract | PDFPDF
107. Strategies of an Efficient Algorithm PARM to Generate Association Rules Mining Technique
Based on Spatial Data

Pages :3152 - 3158
Pallavi Rathod, Prof. S. S. Dhande
Abstract | PDFPDF
108. Analysis of Multibase Scalar Point Multiplication Scheme in ECC
Pages :3159 - 3164
Kirti Chawla, Om Pal Yadav
Abstract | PDFPDF
109. Indexing and Advanced Relevance Ranking Score Preserving for Multi-Keyword Search over
Encrypted Cloud Data

Pages :3165 - 3169
Amol D. Sawant and Prof. M.D Ingle
Abstract | PDFPDF
110. Lightweight Implementation of Public Key Infrastructure for Wireless Sensor Network μPKI
Pages :3170 - 3175
Dipayan Kumar Ghosh, Namita Ghosh
Abstract | PDFPDF
111. Survey on Soft Computing based Call Admission Control in Wireless Networks
Pages :3176 - 3180
Mahesh G, Yeshwanth S, Manikantan U V
Abstract | PDFPDF
112. Immense Review on Clustering Approaches
Pages :3181 - 3185
Deepali N. Gunjate, Prof. B. R. Kanawade
Abstract | PDFPDF
113. Performance Evaluation of Feasible Placement Model in AODV for Mobile Ad Hoc Networks
Pages :3186 - 3189
K. Narasimha Raju, S.P.Setty
Abstract | PDFPDF
114. Rapid Decentralized Network Intrusion Defense System on Multiple Virtual Machines
Pages :3190 - 3195
M.Judith Lucia and T.Thirunavukarasu
Abstract | PDFPDF
115. Formulate Competent Decision Making in Data Mart using Fuzzy Optimization Technique
Pages :3196 - 3202
A. Prema, A.Pethalakshmi
Abstract | PDFPDF
116. An Entropy-based Adaptive Genetic Algorithm Approach on Data Mining for Classification
Problems

Pages :3203 - 3209
Dipayan Kumar Ghosh, Namita Ghosh
Abstract | PDFPDF
117. Advance Image Classification System
Pages :3210 - 3214
N.N.Khalsa, Parag.P.Gudadhe, Dr. V. T. Ingole
Abstract | PDFPDF
118. A Review Report on Security Threats on Database
Pages :3215 - 3219
Shivnandan Singh, Rakesh Kumar Rai
Abstract | PDFPDF
119. An Algorithmic Approach for the Detection of Malicious Nodes in a Cluster Based Adhoc
Wireless Networks

Pages :3220 - 3223
Bhakti Thakre, S.V.Sonekar
Abstract | PDFPDF
120. Survey on Feature Extraction methods in Object Recognition
Pages :3224 - 3226
Shilpa Bane, Prof. D.R. Pawar
Abstract | PDFPDF
121. A Survey on Bitemporal Data Warehousing System and Data Warehouse Design Techniques
Pages :3227 - 3231
P.N.V.S.Pavan Kumar, K.Bala Chowdappa, S.Subba Lakshmi
Abstract | PDFPDF
122. Web Cache Page Replacement by Using LRU and LFU Algorithms with Hit Ratio: A Case Unification
Pages :3232 - 3235
Kapil Arora, Dhawaleswar Rao Ch
Abstract | PDFPDF
123. Semantical and Syntactical Analysis of NLP
Pages :3236 - 3238
Mallamma V. Reddy, Hanumanthappa M.
Abstract | PDFPDF
124. An Approach for Efficient and Secure Retrieval of Encrypted Cloud Data Based On Top-K Multikeywords
Pages :3239 - 3241
Suman M, B. Chempavathy
Abstract | PDFPDF
125. Issues and Challenges in Using Social Media
Pages :3242 - 3245
J. Pratik Infanto, Prof. D. Venkata Subramaniam, Prof. S.P Chokkalingam
Abstract | PDFPDF
126. Review On: An Efficient Technique of Noising and De-Noising Medical Images Using
Neuro– FUZZY and LDA

Pages :3246 - 3249
Amritpal Kaur, Dr. Pankaj Kumar Verma
Abstract | PDFPDF
127. Honeydoop - A System for Creating Virtual Honeypots Using Hadoop
Pages :3250 -3253
Sumaiyya Z. Khan , Prof. D.M.Dakhane , Prof. R.L.Pardhi
Abstract | PDFPDF
128. Prevention Of Black hole Attack using AODV Routing Protocol in MANET
Pages :3254 - 3258
Nirali Modi, Vinit Kumar Gupta
Abstract | PDFPDF
129. Secure Image Encryption and Decryption in Full Motion Video
Pages :3259 - 3261
S Raghunath Reddy, K Srikanth ,T Swathi
Abstract | PDFPDF
130. Aspect Based Sentiment Analysis to Extract Meticulous Opinion Value
Pages :3262 - 3266
Deepali Virmani, Vikrant Malhotra, Ridhi Tyagi
Abstract | PDFPDF
131. Energy Efficient Route Selection in MANET
Pages :3267 - 3273
Namita Agrawal, Nitin Choubey, Prashant Mishra
Abstract | PDFPDF
132. A Survey on Clustered Feature Selection Algorithms for High Dimensional Data
Pages :3274 - 3280
Khedkar S.A., Bainwad A. M., Chitnis P. O.
Abstract | PDFPDF
133. Review On: Human Identification Using GAIT Recognition Technique with PAL and PAL
Entropy and NN

Pages :3281 - 3285
Preetpal Kaur, Gagangeet Singh Aujla
Abstract | PDFPDF
134. Mass Users Behaviour Prediction in Social Media: A Survey
Pages :3286 - 3288
Kanchan U. Jadhav, Prof. Nalini A. Mhetre
Abstract | PDFPDF
135. A Review on Image Segmentation Clustering Algorithms
Pages :3289 - 3293
Devarshi Naik , Pinal Shah
Abstract | PDFPDF
136. Generation of Electricity from Fans
Pages :3294 - 3297
MD Saquib Gadkari, Khemchand Kolte, Mrunal Jasani, Akash Vichare, Beatrice.S
Abstract | PDFPDF
137. Signature Verification for Automated Cheque Authentication System Based on Shape Contexts
Pages :3297 - 3300
Sangeeta Girish Narkhede, Prof. Dinesh D. Patil
Abstract | PDFPDF
138. Text Rank: A Novel Concept for Extraction Based Text Summarization
Pages :3301 - 3304
Dipti.D.Pawar, M.S.Bewoor, S.H.Patil
Abstract | PDFPDF
139. A View on Cloud Computing in the Banking Sector
Pages :3305 - 3308
K .Sudhakar, G.Vinay Kumar, L.Sudha Rani
Abstract | PDFPDF
140. Efficient Data Packet Transmission in MANET Using Enhanced Hybrid Cryptographic Technique
Pages :3309 - 3311
R. Vedhavarshini , T. Anand
Abstract | PDFPDF
141. Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage
Pages :3312 - 3317
Ved M. Kshirsagar, Prof. V.S.Gulhane
Abstract | PDFPDF
142. Object-Oriented Design Metrics to Predict Fault Proneness of Software Applications
Pages :3318-3321
Jeenam Chawla, Arun Agarwal
Abstract | PDFPDF
143. Article Removed
Pages :3322-3326
xxxx, xxxx
Abstract | PDFPDF
144. A Multimodal SVM Approach for Fused Biometric Recognition
Pages :3327-3330
Geethu S Kumar,C Jyothirmati Devi
Abstract | PDFPDF
145. FPGA Implementation of Fast Arithmetic Unit Based on QSD
Pages :3331-3334
Shrikesh A. Dakhane, A. M. Shah
Abstract | PDFPDF
146. Survey on Document Clustering Approach for Forensics Analysis
Pages :3335-3338
Bhagyashree Umale, Prof.Nilav M
Abstract | PDFPDF
147. A Review paper for Detection of Overlapping Communities in Complex Networks
Pages :3339-3341
Vinay, Sumit, Jai Parkash
Abstract | PDFPDF
148. Survey on Privacy Preserving Data Mining
Pages :3342-3343
Krishna Pratap Rao,Adesh Chaudhary, Prashant Johri
Abstract | PDFPDF
149. Preserving Privacy and Data Security in Database
Pages :3344-3346
Adesh Chaudhary , Krishna Pratap Rao , Prashant Johri
Abstract | PDFPDF
150. Data Partitioning Technique to Improve Cloud Data Storage Security
Pages :3347-3350
Swapnil V.Khedkar , A.D.Gawande
Abstract | PDFPDF
151. Performance Evaluation of Mobile Ad- hoc Networks Routing Protocol AODV, DSR & DSDV in Different Mobility Models with Varying Speed of Nodes
Pages :3351-3354
Prateek Chudhary, Viomesh Singh
Abstract | PDFPDF
152. Authentication Session Password Scheme Using Texts And Color
Pages :3355-3358
Suwarna Jungari, Vrushali Bhujbal, Shital Sonawane, Supriya Bhujbal, Prof. Shital Salve
Abstract | PDFPDF
153. A Survey on Optimization Techniques for Content Downloading in Vehicular Networks
Pages :3359-3362
Rooban M. Kadwe, Pragati Patil, Yogesh Bhute
Abstract | PDFPDF
154. How to Possible Virtual Education by Haptic Technology
Pages :3363-3366
Uttama Suryavanshi
Abstract | PDFPDF
155. Survey on Mobile Adhoc Networks
Pages :3367-3369
Nanditha N, Sreedevi N
Abstract | PDFPDF
156. Combined Linear And Nonlinear Image Enhancement
Pages :3370-3372
Saurabh Bhatia, V.K.Govindan
Abstract | PDFPDF
157. Bayesian Approach to Prediction of Protein Secondary Structure
Pages :3373-3375
Asmita A. Yendralwar, Swapnali L.Waghmare , Rajlaxmi M. Biyani, Satish S. Kumbhar
Abstract | PDFPDF
158. Program Recognition System for C A Novel Take on Use of Plans and Clichés for Program Understanding
Pages :3376-3380
Manasi Deshmukh , Rohan Ingale , Rajat Doshi , Priyanka Sathe
Abstract | PDFPDF
159. Evaluation on Malware Analysis
Pages :3381-3383
Monika Agrawal, Heena Singh, Nidhi Gour, Ajay Kumar
Abstract | PDFPDF
160. Automatic Machine Learning Forgery Detection Based On SVM Classifier
Pages :3384-3388
S.L.Jothilakshmi, V.G.Ranjith
Abstract | PDFPDF
161. Ethical Hacking Techniques with Penetration Testing
Pages :3389-3393
K.Bala Chowdappa , S.Subba Lakshmi , P.N.V.S.Pavan Kumar
Abstract | PDFPDF
162. Optimization of Image Registration for Medical Image Analysis
Pages :3394-3398
PN Maddaiah , PN Pournami , VK Govindan
Abstract | PDFPDF
163. An Improvement for HEER Protocol in Wireless Sensor Network
Pages :3399-3402
Sakshi Sharma , Malti Rani
Abstract | PDFPDF
164. QPSK Modulator on FPGA using 64 Values ROM
Pages :3403-3406
Prashant D. Thombare, Ameed. M. Shah
Abstract | PDFPDF
165. Localization of License Plate using Characteristics of Alphanumeric Characters
Pages :3407-3409
Pushpendra Singh Chouhan, V. K. Govindan
Abstract | PDFPDF
166. Survey on Certificate Revocation Scheme for Mobile Ad Hoc Networks
Pages :3410-3415
Ann Grace Attokaren, Mujeebudheen Khan A. I
Abstract | PDFPDF
167. Ensuring Security in MANET by NRB (NMA Protocol, Roaming Honeypot, Bigdata) Technique
Pages :3416-3420
Tarun Varshney, Aishwary Katiyar, 3Anuj Gupta, Pankaj Sharma
Abstract | PDFPDF
168. A Literature Survey on Energy Efficient MAC Protocols for WSN
Pages :3421-3424
Rohan Parmar, Dr. R. C. Poonia
Abstract | PDFPDF
169. A Digital Multiband Orthogonal Frequency Division Multiplexing baseband design
Pages :3425-3428
Sanket Sardar , Manisha Ingle
Abstract | PDFPDF
170. Methods to Define a Single Point in the Polygon
Pages :3429-3430
Arun Kumar Sharma, Sandeep Kaur Gill
Abstract | PDFPDF
171. Neural Network Implementation Using FPGAs
Pages :3431-3433
Dhirajkumar S. Jinde, Samrat S. Thorat
Abstract | PDFPDF
172. Sentiment Classification in Public Opinions using Multi-Domain Sentiment-Sensitive Thesaurus
Pages :3434-3436
Komal Paraswani , Professor P.P. Tribhuvan
Abstract | PDFPDF
173. Network Layer Attacks and Protection in MANETA Survey
Pages :3437-3443
Athira V Panicker, Jisha G
Abstract | PDFPDF
174. Effective Use of Prim’s Algorithm for Model Based Test case Prioritization
Pages :3444-3447
Shweta A. Joshi, Prof. D.S. Adiga, Prof. B.S. Tiple
Abstract | PDFPDF
175. A Comparative Performance Analysis of Classification Algorithms Using Weka Tool Of Data
Mining Techniques

Pages :3448-3453
Suman , Mrs.Pooja Mittal
Abstract | PDFPDF
176. Energy Efficient Protocol for Heterogeneous Wireless Sensor Network using Ant Colony Optimization
Pages :3454-3456
Saburi Parvatkar, Deipali Gore
Abstract | PDFPDF
177. TEM Color Image Segmentation using Hill Climbing Algorithm
Pages :3457-3459
Garima Goyal
Abstract | PDFPDF
178. A New Technique to Prevent MANET against Rushing Attack
Pages :3460-3464
Satyam Shrivastava , Dharmendra Mangal
Abstract | PDFPDF
179. Efficient Algorithms for Mining Rare Itemset over Time Variant Transactional Database
Pages :3465-3468
Nidhi Sethi, Pradeep Sharma
Abstract | PDFPDF
180. Separable Reversible Data Hiding in Image Using Advanced Encryption Standard with Fake Data
Generation

Pages :3469-3473
Divyani UdayKumar Singh, Kasturi Mohan Padwal, Madhura Pundlik Jadhav
Abstract | PDFPDF
181. Improved DBSCALE Algorithm by using Ant Colony Optimization
Pages :3474-3477
Reena Jindal, Dr. Samidha D.Sharma, Prof. Angad Singh
Abstract | PDFPDF
182. Analysing Pattern for Chromium Bug Area Classification
Pages :3478-3482
Trasha Gupta, Monika Gupta
Abstract | PDFPDF
183. An Efficient Technique of Noising and De-Noising Medical Images Using Support Vector Machine
Pages :3483-3486
Monika Pathania , ParulPreet Singh
Abstract | PDFPDF
184. Smart Wireless Sensor Network for Monitoring an Agricultural Environment
Pages :3487-3490
Prof. Mrs. S. S. Patil Prof. V. M. Davande Prof. J. J. Mulani
Abstract | PDFPDF
185. Enforced Conviction in Cryptographic Provenance Across Critical System Information
Pages :3491-.3493
Prof. Asha. N, Prince
Abstract | PDFPDF
186. Designing and Implementation of Efficient Fuzzy Logic Based Fractal Image Compression Technique in DCT Domain Using Quadtree Algorithm
Pages :3494-3499
Preeti Banerjee, Deepak Kumar Xaxa
Abstract | PDFPDF
187. Prevention of Spoofing Attacks in Wireless Sensor Networks
Pages :3500-3502
B.Dineshbabu , T.Thirunavukarasu
Abstract | PDFPDF
188. A Neighbor Knowledge with Zonal Routing Protocol to Reducing Routing Overhead in MANETs
Pages :3503-3507
M.Saravanan,D.Jagan
Abstract | PDFPDF
189. GooDoop: Local Search Engine using Hadoop
Pages :3508-3510
Ganesh Phadatare, Ketankumar Rathod, Vinayak Shukla, Mahesh S. Salunkhe
Abstract | PDFPDF
190. Dashboard Necessary in Every Field
Pages :3511-3513
Shilpa Malik, Pratima Sharma
Abstract | PDFPDF
191. Unsupervised Detection of Duplicates in User Query Results using Blocking
Pages :3514-3520
Dr. B. Vijaya Babu, K. Jyotsna Santoshi
Abstract | PDFPDF
192. Survey on Data Preprocessing Method of Web Usage Mining
Pages :3521-3524
Wasvand Chandrama, Prof.P.R.Devale, Prof. Ravindra Murumkar
Abstract | PDFPDF
193. Energy Minimization and Conformation Analysis of Molecules using Steepest Descent Method
Pages :3525-3528
B.J.Jaidh an, Prof. P.Srinivasa Rao, Prof. Allam Apparao
Abstract | PDFPDF
194. Wireless Arraigning Of Mobile Phones Using Microwaves
Pages :3529-3533
P.Rajeshkumar, G. Murugaboopathi
Abstract | PDFPDF
195. An Efficient Approach of Building a New Software Web Framework for Better Software Solutions with DAO Layer
Pages :3534-3538
Digambar Y. Yedage, Anand Bone
Abstract | PDFPDF
196. Offline Signature Verification Using Surf Feature Extraction and Neural Networks Approach
Pages :3539-3541
Priyanka Sharma
Abstract | PDFPDF
197. A Framework for Enhancing Privacy Provision in Cloud Computing
Pages :3542-3547
Fatima N. AL-Aswadi & Omar Batarfi
Abstract | PDFPDF
198. Modified RSA Public Key Cryptosystem Using Two Key Pairs
Pages :3548-3550
Jainul Abudin, Sanjay Kumar Keot, Geetanjali Malakar, Nita Moni Borah Mustafizur Rahman
Abstract | PDFPDF
199. A System for Detection of Distributed Denial of Service (DDoS) Attacks using KDD Cup Data Set
Pages :3551-3555
Janhavi Kaskar, Ruchit Bhatt, Rohit Shirsath
Abstract | PDFPDF
200. Public Key Infrastructure (PKI) using Symmetric Key Cryptography (SC) in VANETs
Pages :3556-3561
Sumegha Sakhreliya, Neha Pandya
Abstract | PDFPDF
201. Improve Heuristics for User Session Identification through Web Server Log in Web Usage Mining
Pages :3562-3565
Priyanka Patel, Mitixa Parmar
Abstract | PDFPDF
202. Review on: Image Compression with Tiling using Hybrid KEKRE and DAUBECHIES Wavelet
Transformation

Pages :3566-3568
Nandini Sharma, Dr. Pankaj Kumar Verma
Abstract | PDFPDF
203. Detection of Faulty Sensors in Wireless Sensor Networks and Avoiding the Path Failure Nodes
Pages :3569-3574
Pinak S. Patel, Mohammed Husain Bohara, Binita D. Chahwala
Abstract | PDFPDF
204. Communication and Self-Location of Wireless Sensor Network or Nodes Using Wireless System:
Implementation of VANET

Pages :3575-3580
Monica R. Dhawale, Dr. S.A.Ladhake
Abstract | PDFPDF
205. Inverse Orchestra: An approach to find faster solution of matrix inversion through Cramer’s rule
Pages :3581-3585
Shweta Ag rawal , Rajkamal
Abstract | PDFPDF
206. Improving AODV Routing Protocol against Black Hole Attack based on MANET
Pages :3586-3589
Bhoomika Patel, Khushboo Trivedi
Abstract | PDFPDF
207. Improving Multipath AODV for Video Transmission
Pages :3590-3594
MayuriBaldaniya, Prof. NehaSisodiya
Abstract | PDFPDF
208. News Analytics and Sentiment Analysis to Predict Stock Price Trends
Pages :3595-3604
Spandan Ghose Chowdhury , Soham Routh , Satyajit Chakrabarti
Abstract | PDFPDF
209. Multilingual Handwritten Text Verification
Pages :3605-3607
M.Sivasankari, Dr.S.P.Victor
Abstract | PDFPDF
210. Handwritten Text Recognition
Pages :3608-3610
M.Sivasankari, Dr.S.P.Victor
Abstract | PDFPDF
211. Statistical Steganalysis Scheme of Using Block DCT
Pages :3611-3615
Papiya Chakraborty, Dr. Bikramjit Sarkar
Abstract | PDFPDF
212. On Campus Location Tracking Using Mobiles Phones
Pages :3616-3618
Anil Birajdar, Manisha Koul,Mridushi Srivastav, Pooja Nair
Abstract | PDFPDF
213. Blind Robust Digital Video Watermarking Scheme using Hybrid Based Approach
Pages :3619-3625
Nitin A. Shelke, Dr.P.N.Chatur
Abstract | PDFPDF
214. A Systematic Study on Agile Software Development Methodologies and Practices
Pages :3626-3637
Harleen K. Flora, Swati V. Chande
Abstract | PDFPDF
215. Palm print Authentication Using PCA Technique
Pages :3638-3640
Mithuna Behera and V.K. Govindan
Abstract | PDFPDF
216. Super Resolution Image Reconstruction using Geometric Registration
Pages :3641-3644
M Venkatesh, and Govindan V.K
Abstract | PDFPDF
217. Privacy Preserving Updates to Sliced Anonymous Data Bases
Pages :3645-3647
Asha Thomas, Adarsh Sunil
Abstract | PDFPDF
218. Review on: Enhanced Offline Signature Recognition Using Neural Network and SVM
Pages :3648-3652
Rapanjot Kaur, Gagangeet Singh Aujla
Abstract | PDFPDF
219. Implementation of Query Result Caching Using Dynamic Data Cache
Pages :3653-3656
M. A. Ramteke, Prof. S. S. Dhande, Prof. H. R. Vyawahare
Abstract | PDFPDF
220. Indian Sign Language Recognition based on Histograms of Oriented Gradient
Pages :3657-3660
Neha V. Tavari, Prof. A. V. Deorankar
Abstract | PDFPDF
221. Person Authentification by Finger Vein Images: A Review
Pages :3661-3663
Rajwinder Kaur, Rekha Rani
Abstract | PDFPDF
222. Review on: Emotion Detection
Pages :3664-3669
Navleen Kaur, Madhu Bahl,Harsimran Kaur
Abstract | PDFPDF
223. Social Profile Based Gift Recommendation System
Pages :3670-3673
Purnima Tomar, Prateek Arora, Aakash Goel, Dharmender Saini
Abstract | PDFPDF
224. To Evaluate Performance of BF, DYMO and ZRP Protocols
Pages :3674-3676
Er.Chaitali Malik, Dr.Rajiv Mahajan
Abstract | PDFPDF
225. Enhancement of Underwater Images: A Review
Pages :3677-3678
Aanchal Garg , Nirvair Neeru
Abstract | PDFPDF
226. TRApriori Classification Based Algorithm by Fuzzy Techniques to Reduced Time Complexity
Pages :3679-3683
Rohit Miri,Priyanka Tripathi, S.R.Tandan
Abstract | PDFPDF
227. A Robust Automated Process for Vehicle Number Plate Recognition
Pages :3684-3689
Dr. Khalid Nazim S. A., Adarsh N.
Abstract | PDFPDF
228. Finding Frequent Items Dynamically
Pages :3690-3694
Sunita Murjani, Indrajeet Rajput
Abstract | PDFPDF
229. Review On: Finger Vein Detection Using Repeated Line, Even Gabor and Median Filter
Pages :3695-3698
Komal Turka and Gurpreet Kaur
Abstract | PDFPDF
230. Review On: GAIT Recognition Technique using SVM and K-MEANS with Gait PAL and PAL Entropy
Pages :3699-3702
Anjali Kaushik and Gurpreet Kaur
Abstract | PDFPDF
231. Wavelet and Curvelet Transform based Image Fusion Algorithm
Pages :3703-3707
Shriniwas T. Budhewar
Abstract | PDFPDF
232. Enhancing Routing With Cross Layer Optimization in MANETs
Pages :3708-3710
Shruti Thacker
Abstract | PDFPDF
233. Implementation of Plastic Surgery Face Recognition Using Multimodal Biometric Features
Pages :3711-3715
Minal Mun and Prof. Anil Deorankar
Abstract | PDFPDF
234. Distributed File Systems: A Survey
Pages :3716-3721
L.Sudha Rani, K. Sudhakar , S.Vinay Kumar
Abstract | PDFPDF
235. Batch -Incremental Classification of Stream Data Using Storage
Pages :3722-3725
Ponkiya Parita, Rohit Srivastava
Abstract | PDFPDF
236. A Design of Low Cost Head-Mounted Display Using Android Smartphone
Pages :3726-3728
Hemant Surale, Prof. Sagar Shinde
Abstract | PDFPDF
237. Software Testing Techniques in Software Development Life Cycle
Pages :3729-3731
D.Meenakshi , J. Swami Naik , M.Raghavendra Reddy
Abstract | PDFPDF
238. Survey on Security Issues in Mobile Ad Hoc Networks
Pages :3732-3735
Devesh Kumar Pal, Dr. Pallavi Murghai Goel
Abstract | PDFPDF
239. Mining Frequent Itemsets for Improving the Effectiveness of Marketing and Sales
Pages :3736-3738
Pratima O. Fegade, Prof. Dinesh D. Patil
Abstract | PDFPDF
240. Software Component Selection techniques - A review
Pages :3739-3742
Loveleen Kaur, Dr. Hardeep Singh
Abstract | PDFPDF
241. FPGA based Image Feature Extraction Using Xilinx System Generator
Pages :3743-3747
Swapnil G. Kavitkar, Prashant L. Paikrao
Abstract | PDFPDF
242. A Study on Power efficient Techniques in various layers of Protocol stack in MANETs
Pages :3748-3753
Supriya Mahajan , Bhupinder Kaur , Vaibhav Pandey
Abstract | PDFPDF
243. Android Application for Vehicle Theft Prevention and Tracking System
Pages :3754-3758
Rohitaksha K , Madhu C G , Nalini B G ,Nirupama C V
Abstract | PDFPDF
244. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique
Pages :3759-3763
Swati Goel, Pramod Kumar, Rekha Saraswat
Abstract | PDFPDF
245. Multi labelled Graph Mining with Dynamic Network
Pages :3764-3767
Ankita V. Raiyani, Prof. Ajaykumar T. Shah
Abstract | PDFPDF
246. Nearest Clustering Algorithm for Satellite Image Classification in Remote Sensing Applications
Pages :3768-3772
Anil K Goswami, Swati Sharma, Praveen Kumar
Abstract | PDFPDF
247. A Survey of Transport Protocols for Delay Tolerant Satellite Networks
Pages :3773-3776
Mitul K. Patel
Abstract | PDFPDF
248. An Efficient and Secure Multicast Key Management Scheme based on Star Topology
Pages :3777-3783
Neha Mittal, Vinod Kumar
Abstract | PDFPDF
249. Issues in Data Privacy
Pages :3784-3786
Akshaya.S ,Jayasre Manchari.V L ,MohamedThoufeeq.A
Abstract | PDFPDF
250. Performance of Kalman Filter on Filtering Colored Noise
Pages :3787-3790
Pratibha Singh, Kiran Jain, Shivnandan Singh
Abstract | PDFPDF
251. Power Efficiency in Agriculture using Wireless Sensor Network
Pages :3791-3793
Kamalpreet Kaur, Rohit Sethi , Amandeep Kaur
Abstract | PDFPDF
252. Map Reduce a Programming Model for Cloud Computing Based On Hadoop Ecosystem
Pages :3794-3799
Santhosh voruganti
Abstract | PDFPDF
253. Comparison of Forest Fire Detection Techniques Using WSNs
Pages :3800-3802
Amandeep Kaur, Rohit Sethi, Kamalpreet Kaur
Abstract | PDFPDF
254. Software Reliability and Quality Analyser with Quality Metric Analysis Along With Software Reliability Growth Model
Pages :3803-3806
Madhavi Mane, Manjusha Joshi, Prof. Amol Kadam, Prof. Dr. S.D. Joshi
Abstract | PDFPDF
255. Location Based Group Key Generation in Wireless Sensor Network
Pages :3807-3812
Ambika.N, G.T.Raju
Abstract | PDFPDF
256. B-spline Non Rigid Image Registration using L-BFGS Optimizer
Pages :3813-3816
Barkuru Sri harsha ,PN Pournami , V K Govindan
Abstract | PDFPDF
257. Anomaly Detection Using Context-Based Intrusion Detection System
Pages :3817-3822
Rupali Garje, Shrawani Bharati, Prakriti Kar, Vaibhav Khatavkar
Abstract | PDFPDF
258. A Contemporary Study of Application Layer Multicast Protocols in aid of Effective Communication
Pages :3823-3838
M. Anitha, P. Yogesh
Abstract | PDFPDF
259. An Efficient Density Conscious Subspace Clustering Method using Top-down and Bottom-up Strategies
Pages :3839-3842
M. Suguna, Dr. S. Palaniammal
Abstract | PDFPDF
260. Categorize and Efficient: Top k keyword Search of Spatial-Textual data on the Road Network
Pages :3843-3847
Santosh.I.Halpati, D.M.Thakore
Abstract | PDFPDF
261. A Brief Review of an Experience Reuses Approach
Pages :3848-3851
Navjot Kaur, Ramandeep Kaur
Abstract | PDFPDF
262. Use Face as Mouse
Pages :3852-3853
Gauri Sonawane, Priyanka Sutar, Ankita Shelar, Shraddha Kulange
Abstract | PDFPDF
263. Modelling & Detaining Mobile Virus Proliferation over Smart phones
Pages :3854-3862
Ashwini Gour,Jagdish Pimple, Somesh Gangotri
Abstract | PDFPDF
264. A Survey on Distributed Denial of Services (DDOS)
Pages :3863-3866
Er. Sakshi kakkar , Er. Dinesh kumar
Abstract | PDFPDF
265. Big Data Analytics with Hadoop to analyze Targeted Attacks on Enterprise Data
Pages :3867-3870
Bhawna Gupta, Dr. Kiran Jyoti
Abstract | PDFPDF
266. Survey on Techniques for Steganography of Audio Files
Pages :3871-3872
Charu Arora, Nitish Anand
Abstract | PDFPDF
267. Mining Search Log for Privacy Definitions and Phish Safe
Pages :3873-3877
Janani. V.D
Abstract | PDFPDF
268. QR Codes and Security Concerns
Pages :3878-3879
Shruti Ahuja
Abstract | PDFPDF
269. Survey Paper on Hilbert Transform With its Applications in Signal Processing
Pages :3880-3882
Aditi Singh
Abstract | PDFPDF
270. A New Approach for Electing a Coordinator in Anonymous System
Pages :3883-3886
Priyanka D. Bhute
Abstract | PDFPDF
271. A Survey on Resource Management in Cloud Computing
Pages :3887-3889
Sanchari Saha, Abhilash K.V
Abstract | PDFPDF
272. Study of Various Congestion-control Protocols in Network
Pages :3890-3894
Pratima Bhujbal, Uma Nagaraj
Abstract | PDFPDF
273. Analysis And Design Of Circular Microstrip Patch Antenna At 5.8GHz
Pages :3895-3898
Keshav Gupta, Kiran Jain, Pratibha Singh
Abstract | PDFPDF
274. Optimization of Multirate Polyphase Decimator using MCM and Digit Serial Architecture
Pages :3899-3906
Rajendra M. Rewatkar, Dr. Sanjay L. Badjate
Abstract | PDFPDF
275. The Countering the XDoS Attack for Securing the Web Services
Pages :3907-3911
Amit Vinayakrao Angaitkar, Narendra Shekokar, Mahesh Maurya
Abstract | PDFPDF
276. Mining and Summarizing Movie Reviews in Mobile Environment
Pages :3912-3916
Savita Harer, Sandeep Kadam
Abstract | PDFPDF
277. Swarm Management in Multi Tracker P2P Network
Pages :3917-3920
Vishal Annadate
Abstract | PDFPDF
278. Taxonomy of Distributed Consensus Algorithms
Pages :3921-3923
Suman Kumari, Dr. Harish Rohil
Abstract | PDFPDF
279. Performance Analysis of Reactive & Proactive Routing Protocols for Vehicular Adhoc -Networks with Varying Speed of Nodes
Pages :3924-3927
Monika Patidar, Anil Patidar
Abstract | PDFPDF
280. Health Analysis System Using Machine Learning
Pages :3928-3933
Pravin Shinde, Prof.Sanjay Jadhav
Abstract | PDFPDF
281. Inner cluster Data Aggregation for Wireless Sensor Networks
Pages :3934-3936
K.B.Ashwini, G.T.Raju
Abstract | PDFPDF
282. Survey of Applications based on Vehicular Ad-Hoc Network (VANET) Framework
Pages :3937-3942
Mrunmayi S Sahasrabudhe, Dr. Meenu Chawla
Abstract | PDFPDF
283. Digital Inpainting on the Basis of Exemplar Based Method
Pages :3943-3945
Sanket Khedikar, P.N. Chatur
Abstract | PDFPDF
284. Triple Play Services Transmission over VDSL2 Broadband Access Network in MDU
Pages :3946-3952
Nasser N. Khamiss, Sara Ali Abed Al-Hussein
Abstract | PDFPDF
285. Near Infrared Spectroscopy Based a Portable Soil Nitrogen Detector Design
Pages :3953-3956
Sneha J. Bansod , Shubhada S. Thakare
Abstract | PDFPDF
286. Service Broker Algorithm for Cloud-Analyst
Pages :3957-3962
Rakesh Kumar Mishra , Sreenu Naik Bhukya
Abstract | PDFPDF
287. A Blind Watermarking Scheme against Local Attacks
Pages :3963-3964
Neethu Raveendran.K
Abstract | PDFPDF
288. Reviews of Load Balancing Based on Partitioning in Cloud Computing
Pages :3965-3967
Ms.Shilpa D.More, Mrs.Smita Chaudhari
Abstract | PDFPDF
289. Prevention Of Fire Accidents In Villages Using Wireless Sensor Networks
Pages :3968-3971
Dr. A. S. N. Chakravarthy, T. Anjikumar
Abstract | PDFPDF
290. Histogram Domain Adaptive Power Law Applications in Image Enhancement Technique
Pages :3972-3978
T. Romen Singh, Sudipta Roy, Kh. Manglem Singh
Abstract | PDFPDF
291. Hierarchical Clustering Algorithm LEACH -A Review
Pages :3979-3981
Devina Chhabra, Rajeev Vashisht
Abstract | PDFPDF
292. Exploiting Data Mining Technique for Rainfall Prediction
Pages :3982-3984
Nikhil Sethi, Dr.Kanwal Garg
Abstract | PDFPDF
293. Survey on Size Invariant Visual Cryptography
Pages :3985-3990
Biswapati Jana,Gargi Hait ,Shyamal Kumar Mondal
Abstract | PDFPDF
294. Review On: Gait Recognition for Human Identification using NN.
Pages :3991-3993
Navneet Kaur, Samandeep Singh
Abstract | PDFPDF
295. Implementation of Power Analysis Attack using SASEBO-W
Pages :3994-3997
Deevi Radha Rani, S. Venkateswarlu
Abstract | PDFPDF
296. An Improved Hierarchal Clustering Algorithm using Feature Reduction Techniques and Clustering Validation Indices
Pages :3998-4003
Nitin Soni, Prof Abha Choubey
Abstract | PDFPDF
297. Article Removed
Pages :xxx-xxx
xxx,xxx
Abstract | PDFPDF
298. Collapp - Real Time Online Code Collaborator
Pages :4009-4010
AradhyaTulsyan, Aaron Brako, Rahul Parekh,.Neepa Shah, AnujaNagare
Abstract | PDFPDF
299. Neural Network Based Face Recognition Using PCA
Pages :4011-4014
Ganesh Linge, Meenakshi Pawar
Abstract | PDFPDF
300. Design Of Reversible Fault Tolerent Decoder Using MOS Transistors
Pages :4015-4018
M.Amulya, Dr.M.V.Subramanyam
Abstract | PDFPDF
301. Review on SQL Injection Attacks: Detection Techniques and Protection Mechanisms
Pages :4019-4022
Sankaran. S , Sitharthan. S , Ramkumar. M
Abstract | PDFPDF
302. Energy Efficient Algorithm for Congestion Control in Wireless Sensor Networks
Pages :4023-4027
Ravinder singh, Sanjay Gurjar
Abstract | PDFPDF
303. Dynamic Cluster Configuration Algorithm in MapReduce Cloud
Pages :4028-4033
Rahul Prasad Kanu , Shabeera T P , S D Madhu Kumar
Abstract | PDFPDF
304. Classification of Agricultural Pests Using DWT and Back Propagation Neural Networks
Pages :4034-4037
Gaurav Kandalkar, A.V.Deorankar , P.N.Chatur
Abstract | PDFPDF
305. A Review - LOOP Dependence Analysis for Parallelizing Compiler
Pages :4038-4046
Pradip S. Devan, R. K. Kamat
Abstract | PDFPDF
306. A Model For Predicting Influential Users In Social Network
Pages :4047-4053
Sriganga B K, Ragini Krishna, and Dr. Prashanth C M
Abstract | PDFPDF
307. Fast Transmission to the Remote Co Operative Group: A New Key Management VPN and Security Policy Enforcement
Pages :4054-4056
Anil s Naik, Prakash C Pawar, Santosh C Pawar
Abstract | PDFPDF
308. Different Cube Computation Approaches: Survey Paper
Pages :4057-4061
Dhanshri S. Lad, Rasika P. Saste
Abstract | PDFPDF
309. Data Integrity Checking Protocol with Data Dynamics and Public Verifiability for Secure Cloud Computing
Pages :4062-4064
Snehal Vilas Zargad, Amruta Vijay Tambile,Shivangi Shashikant Sankoli, Rajashree Chandrakant Bhongale
Abstract | PDFPDF
310. Database Watermarking Using SHA 512 Signature Generation Technique
Pages :4065-4068
Ranjana Waman Gore, Rucha Tare
Abstract | PDFPDF
311. Despeckling of Images Using Wiener Filter in Dual Wavelet Transform Domain
Pages :4069-4071
Naman Chopra, Anshul Anand
Abstract | PDFPDF
312. Enhance the Security Level of MANET’s Using Digital Signature
Pages :4072-4076
M.BalaGanesh , M.Mohamed Faisal
Abstract | PDFPDF
313. Modified Secure Two Way Authentication System in Cloud Computing Using Encrypted One Time
Password

Pages :4077-4080
Geetanjali Choudhury, Jainul Abudin
Abstract | PDFPDF
314. Sentiment Analysis Based Mining and Summarizing Using SVM-MapReduce
Pages :4081-4085
Jayashri Khairnar, Mayura Kinikar
Abstract | PDFPDF
315. Analysis of Different Techniques Used For Fault Tolerance
Pages :4086-4090
Jasbir Kaur, Supriya Kinger
Abstract | PDFPDF
316. A Survey Web Content Mining Methods and Applications for Information Extraction from Online Shopping Sites
Pages :4091-4094
Ananthi.J
Abstract | PDFPDF
317. Cloud Offerings: A Systematic Review
Pages :4095-4103
Dr. Reema Ajmera, Rudra Gautam
Abstract | PDFPDF
318. An Effective Approach of Data Security for Distributed Shared Memory Multiprocessors
Pages :4104-4110
Pradip S. Devan, R. K. Kamat
Abstract | PDFPDF
319. Review: Face Detection and Recognition Techniques
Pages :4111-4117
Shaily Pandey, Sandeep Sharma
Abstract | PDFPDF
320. Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing
Pages :4118-4123
Devi D, Arun P S
Abstract | PDFPDF
321. Analysis of Fast FIR Algorithms based Area Efficient FIR Digital Filters
Pages :4124-4127
Shikha Jain, Prof. Ravi Koneti, Dr. Rita Jain
Abstract | PDFPDF
322. Contour Based Object Tracking
Pages :4128-4130
Jaya P, Geethu Balakrishnan
Abstract | PDFPDF
323. Crime Trend Analysis and Prediction Using Mahanolobis Distance and Dynamic Time Warping Technique
Pages :4131-4135
Anchal Rani, Rajasree S.
Abstract | PDFPDF
324. Relevance Precise Protocol Structural Design for Wireless Sensor Networks
Pages :4136-4139
Gurpreet Singh, Ruby Gupta
Abstract | PDFPDF
325. Edge Detection of Sickle Cells in Red Blood Cells
Pages :4140-4144
Aruna N.S., Hariharan S.
Abstract | PDFPDF
326. An Approach to Perform Aspect level Sentiment Analysis on Customer Reviews using Sentiscore
Algorithm and Priority Based Classification

Pages :4145-4148
Aishwarya Mohan, Manisha.R, Vijayaa.B, Naren.J
Abstract | PDFPDF
327. Classifying Linux Shell Commands using Naive Bayes Sequence Model
Pages :4149-4151
Prof. Darshika Lothe, Pradumna Gite, Amit Mishra, Anubhav Yadav, Snehal Kadlag
Abstract | PDFPDF
328. CBSE as Novel Approach for IDS
Pages :4152-4154
Mohit Angurala, Malti Rani
Abstract | PDFPDF
329. Article Removed
Pages :4155-4161
xxx, xxx
Abstract | PDFPDF
330. A Survey on Web Application Attacks
Pages :4162-4166
Gurvinder Kaur Pannu
Abstract | PDFPDF
331. Role of Software Metrics to Improve Software Quality
Pages :4167-4170
Vikash Chauhan, Dharmendra Lal Gupta, Sarvottam Dixit
Abstract | PDFPDF
332. Survey on Virtual Appliance - Technology, Merits and Case Studies
Pages :4171-4174
Sachin S. Pande, Parth Srivastava
Abstract | PDFPDF
333. Clustering of Documents using Particle Swarm Optimization and Semantics Information
Pages :4175-4180
Sunita Sarkar, Arindam Roy, Bipul Syam Purkayastha
Abstract | PDFPDF
334. IASC-CI: Improved Ant Based Swarm Computing for Classifying Imagery
Pages :4181-4189
Rebika Rai, Ratika Pradhan, M.K.Ghose
Abstract | PDFPDF
335. Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image
Pages :4190-4193
Lekhika Chettri
Abstract | PDFPDF
336. Comparative Analysis of Performing Vehicle To Vehicle Communication Based On Two Tier Approach with High Security
Pages :4194-4199
Aarti R. Thakur, Prof. Jagdish Pimple
Abstract | PDFPDF
337. Study and Analysis of Universal Gates Using Stacking Low Power Technique
Pages :4200-4204
Neha Goyal, Renu Singla, Puneet Goyal
Abstract | PDFPDF
338. Performance Evaluation of Various Denoising Filters for Medical Image
Pages :4205-4209
P.Deepa, M.Suganthi
Abstract | PDFPDF
339. Dataset Segmentation for Cloud Computing and Securing Data Using ECC
Pages :4210-4213
Vidyanand Ukey, Nitin Mishra
Abstract | PDFPDF
340. Applications of Server Virtualization Technology
Pages :4214-4217
Shrithi H H, Vanamala C.K
Abstract | PDFPDF
341. A Survey on Different Available Detection Techniques of IDS and Attacks at Different Layers of MANET
Pages :4218-4221
Mahesh Gosavi, Prof. E. Jayanthi
Abstract | PDFPDF
342. Wireless Monitoring of Human Limb Motion
Pages :4222-4225
Vikas R Thakur, Snehal M Gajbhiye
Abstract | PDFPDF
343. CRI: A Novel Rating Based Leasing Policy and Algorithm for Efficient Resource Management in IaaS Clouds
Pages :4226-4230
Vivek Shrivastava, D. S. Bhilare
Abstract | PDFPDF
344. A Robust Trust Aware Secure Intrusion Detection for MANETs
Pages :4231-4237
R.Vineeth, Dr. N. K. Sakthivel, Dr. S. Subasree
Abstract | PDFPDF
345. EduPad-“A Tablet Based Educational System for Improving Adult Literacy in Rural India”
Pages :4238-4244
Mayuri Tawri, Prof. Richa Sharma
Abstract | PDFPDF
346. Driver Drowsiness Detection System and Techniques: A Review
Pages :4245-4249
Vandna Saini, Rekha Saini
Abstract | PDFPDF
347. A Survey on Effective Video Retrieval using Image Fuzzy Ontology
Pages :4250-4256
Jeeva S, Saranya V
Abstract | PDFPDF
348. A Review on Clustering Algorithms in WSN
Pages :4257-4258
Manpreet Kaur, Er. Lokesh Pawar
Abstract | PDFPDF
349. An Empirical Approach of Optimizing AODV Routing Protocol for Route Discovery in Mobile Ad-Hoc Network
Pages :4259-4264
Hirkani Padwad, S. V. Sonekar
Abstract | PDFPDF
350. Efficient Certificate Revocation with Vindication Capability for Mobile Ad-Hoc Networks
Pages :4265-4271
Nausheen Shamsi, Ranjana B Nagagoudar, Amareshwari Patil
Abstract | PDFPDF
351. Article Removed
Pages :4272-4277
xxx,xxx
Abstract | PDFPDF
352. An Association Rrule Data Classification with Optimization
Pages :4278-4283
Suman Mishra, Prateek Gupta
Abstract | PDFPDF
353. 3D Face Recognition Using Geodesic Facial Curves to Handle Expression, Occlusion and Pose
Variations

Pages :4284-4287
Ashwini S Gawali and Prof.Ratnadeep R Deshmukh
Abstract | PDFPDF
354. On the reliance of COM Metrics for a C# Project
Pages :4288-4291
Harsh Bhasin, Deepika Sharma, Rashmi Popli
Abstract | PDFPDF
355. Performance Analysis of Gaussian Minimum Shift Keying (GMSK) With Error Control Codes in Wireless Sensor Networks
Pages :4292-4296
M. Sheik Dawood ,C.Jenifer, R.Abdul Sikkandhar and G.Athisha
Abstract | PDFPDF
356. Hybrid Classification Models Integration of Data for Business Integration
Pages :4297-4300
Pornima Rathi
Abstract | PDFPDF
357. Image Enhancement with Different Techniques and Aspects
Pages :4301-4303
Poonam, Er.Rajiv Kamboj
Abstract | PDFPDF
358. Visually Summarizing the Web using Internal Images and Keyphrases
Pages :4304-4309
M.V.Gedam, S. A. Takale
Abstract | PDFPDF
359. Review on Online SLA Tracking
Pages :4310-4312
Anuradha Rana, Pratima Sharma
Abstract | PDFPDF
360. Greedy Estimation of Distributed Algorithm to Solve Bounded knapsack Problem
Pages :4313-4316
Shweta Gupta, Devesh Batra, Pragya Verma
Abstract | PDFPDF
361. Introduction to Signed Brauer Algebra
Pages :4317-4319
Dr.Jeyabharthi, J.Evangeline Jeba
Abstract | PDFPDF
362. LabVIEW based Automatic Data acquisition system for Electrical Impedance Tomography
Pages :4320-4324
Vidya Sarode, Hema Patil, Alice N. Cheeran
Abstract | PDFPDF
363. Real Time Tracking & Health Monitoring System of Remote Soldier
Pages :4325-4330
P. S. Kurhe , K. V. Karad , A. S. Chavan
Abstract | PDFPDF
364. Enhanced Leach for Better Cluster Management Using MAX-HEAP
Pages :4331-4335
Rajni Kamboj, Rohit Chahal
Abstract | PDFPDF
365. Business Intelligence System for Banking and Finance
Pages :4336-4349
Tejas Vaidya, Sagar Ahirrao, Kiran Kadam, Kundan Lugade
Abstract | PDFPDF
366. A Survey: Enhanced Offline Signature Recognition Using Neuro- Fuzzy and SURF Features Techniques
Pages :4350-4353
Rupali Mehra, Dr. R.C. Gangwar
Abstract | PDFPDF
367. An Efficient Neural Network Based System for Diagnosis of Breast Cancer
Pages :4354-4360
Seema Singh, Sushmitha H, Harini J and Surabhi B.R
Abstract | PDFPDF
368. A Survey on Data Extraction of Web Pages Using Tag Tree Structure
Pages :4361-4363
Vivek D. Mohod, Mrs. J. V. Megha
Abstract | PDFPDF
369. Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Pages :4364-4368
Kritika Sharma, Parikshit Singla
Abstract | PDFPDF
370. A Survey of Different Approaches to Detect Wormhole attack
Pages :4369-4372
Baltej Kaur Saluja, Prof A.K.Gupta
Abstract | PDFPDF
371. Enhanced QoS Support with Self Reconfigurable Wireless Mesh Networks
Pages :4373-4380
Sameena Fatima, Dr. Mohammed Abdul Waheed, Shridevi Soma
Abstract | PDFPDF
372. A Self-Healing Approach for Service Unavailability in Dynamic Web Service Composition
Pages :4381-4383
S.Poonguzhali, L.JerlinRubini, S.Divya
Abstract | PDFPDF
373. Change Profile with SMS on Android Platform
Pages :4384-4389
B. Lakshmi, B. Vijay Dattu and K. Anji Reddy
Abstract | PDFPDF
374. A MetaModel for Quality Software Based on the MDA Approach
Pages :4390-4393
Youness BOUKOUCHI, Adil KHAMAL, Abdalaziz MARZAK, Hicham MOUTACHAOUIK
Abstract | PDFPDF
375. An Interface for Extracting and Cropping of Face from Video Frames
Pages :4394-4397
Jyoti Rani, Dr. Kanwal Garg
Abstract | PDFPDF
376. Empirical Analysis for Web Based Projects - Software Components Reuse Techniques
Pages :4398-4404
Prof. Vuppu Padmakar, Dr. B V Ramana Murthy
Abstract | PDFPDF
377. A Survey of Uncertain Data Handling
Pages :4405-4410
Deepali Karne, Prof Pramod Patil
Abstract | PDFPDF
378. Quaternion Fourier Transform for Colour Images
Pages :4411-4416
Vikas R. Dubey
Abstract | PDFPDF
379. Performance Analysis of Black Hole Attack on different MANET Routing Protocols
Pages :4417-4419
Neeraj Arora, Dr. N.C. Barwar
Abstract | PDFPDF
380. Attack-Resistant Routing for Wireless Ad Hoc Networks
Pages :4420-4423
Susan Sharon George, Suma.R
Abstract | PDFPDF
381. Web Mining: Application for Web Based Distance Education Platform
Pages :4424-4425
Mohd Majid Shaikh, Dr.V.M.Patil, Prof.S.V.Dhopte
Abstract | PDFPDF
382. Study of Hummingbird Cryptographic Algorithms based on FPGA Implementation
Pages :4426-4430
Reena Bhatia
Abstract | PDFPDF
383. Yesterday’s Technology is Today’s Social Problem: Compelling Need to Incorporate Ethical Theories in Information System
Pages :4431-4435
Devashish Gosain, Mohit Sajwan, Sagarkumar Surani
Abstract | PDFPDF
384. Hands free JAVA (Through Speech Recognition)
Pages :4436-4439
Rakesh Patel , Mili Patel
Abstract | PDFPDF
385. A New Congestion Control Algorithm Based on Novel AQM
Pages :4440-4443
Dr. T.Karthikeyan, B. Subramani
Abstract | PDFPDF
386. Review of Algorithms for Clustering Random Data
Pages :4444-4445
Bhumika Ingale, Priyanka Fulare
Abstract | PDFPDF
387. FPGA Based Implementation Of Baseband OFDM Transceiver Using VHDL
Pages :4446-4449
A. S. Chavan , P. S. Kurhe , K. V. Karad
Abstract | PDFPDF
388. GSM & RFID Based Tx & Rx For Collision Avoidance & Speed Control
Pages :4450-4454
K. V. Karad , P. S. Kurhe , A. S. Chavan
Abstract | PDFPDF
389. A Recommendation Based Efficient Secure discover-predict-deliver Content Sharing Scheme
Pages :4455-4462
Asiya Zareen, Dr. Mohammed Abdul Waheed, Shridevi Soma
Abstract | PDFPDF
390. Parameter Estimation of COCOMO II using Tabu Search
Pages :4463-4465
Jagjit Kaur, Ritu Sindhu
Abstract | PDFPDF
391. Food Sustainability Using Wireless Sensors Networks: Waspmote and Meshlium
Pages :4466-4468
GeetinderKaur , Sourabh Joshi , Gulwatanpreet Singh
Abstract | PDFPDF
392. A Review of Various Agent Based Resolution Modelling Methods
Pages :4469-4472
Vivek Sharma, Anil Sagar, S B Taneja
Abstract | PDFPDF
393. Encrypt an Audio file using Combine Approach of Transformation and Cryptography
Pages :4473-4476
Vinita Makwana, Neha Parmar
Abstract | PDFPDF
394. Layers of Cloud – IaaS, PaaS and SaaS: A Survey
Pages :4477-4480
S.K. Sowmya, P. Deepika, J. Naren
Abstract | PDFPDF
395. Delegation of Auditing Operation to Auditor by Data Owner with Multiple Authorities for Secure
Cloud Storage

Pages :4481-4484
Sowmya M N, Girish
Abstract | PDFPDF
396. Development of a New Scalable Parallelization Strategy for GCM Varsha and its Historical
Perspective

Pages :4485-4489
T. Venkatesh and U.N.Sinha
Abstract | PDFPDF
397. Android Based, Arduino Powered Automated Wall Painting
Pages :4490-4491
Praneet Singh, Deepanshu Suneja, Prachi, Jitendra Kumar
Abstract | PDFPDF
398. A Comparative Analysis of SHA and MD5 Algorithm
Pages :4492-4495
Piyush Gupta, Sandeep Kumar
Abstract | PDFPDF
399. Comparative Analysis of Conventional IP Network and MPLS Network over VoIP Application
Pages :4496-4499
Rohit Mishra, Hifzan Ahmad
Abstract | PDFPDF
400. Study of Network Characteristics Incorporating Different Routing Protocols
Pages :4500-4504
Sumitpal Kaur, Hardeep S Ryait, Manpreet Kaur
Abstract | PDFPDF
401. Designing a new Applications of Data Warehousing Using 3-tier Architecture for Petroleum Industry
Pages :4505-4510
Dr. D.V.S.S.Subrahmanyam
Abstract | PDFPDF
402. Impacts of Keyword Frequency and Ranking Scope on Relevance of Web Search Results
Pages :4511-4513
Preeti Sharma
Abstract | PDFPDF
403. Comparative Study on Content Based Image Retrieval With Various Approaches
Pages :4514-4518
Sukhman Kaur, Rajesh Sharma
Abstract | PDFPDF
404. Study of Various Mutation Operators in Genetic Algorithms
Pages :4519-4521
Nitasha Soni, Dr Tapas Kumar
Abstract | PDFPDF
405. Improving Performance by combining Fingerprint and Iris in Multimodal Biometric
Pages :4522-4525
Sakshi Kalra, Anil Lamba
Abstract | PDFPDF
406. Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Pages :4526-4530
Renuka Goyal, Navjot Sidhu
Abstract | PDFPDF
407. Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods
Pages :4531-4535
S.B.Gavali , A. K. Bongale and A.B.Gavali
Abstract | PDFPDF
408. Discriminants of Brauer Algebra
Pages :4536-4540
Dr.Jeyabharthi, J.Evangeline Jeba
Abstract | PDFPDF
409. Effective Classifier for User's Behavioral Profile Classification
Pages :4541-4545
Umesh K. Gaikwad , Shirish S. Sane
Abstract | PDFPDF
410. Building Domain Specific Search Engine Based on DLS and VSM Algorithms
Pages :4546-4551
Mohamed. M. Elbasyouni, Elsaeed. E. Abdelrazek, Doaa. M. Hawa
Abstract | PDFPDF
411. GPGPU in the Most Avid Communication Medium: Emails
Pages :4552-4555
Prachi Goyal Juneja, R.K.Pateriya
Abstract | PDFPDF
412. Critical Need of the Data Warehouse for an Educational Institution and Its Challenges
Pages :4556-4559
Shaweta
Abstract | PDFPDF
413. Morphological based Face Detection& Recognition with Principal Component Analysis
Pages :4560-4565
Mandar Kiran Kulkarni, Prof. S. S. Lokhande
Abstract | PDFPDF
414. Privacy-Preserving For Collaborative Data Publishing
Pages :4566-4569
V. V. Nagendra kumar, C. Lavanya
Abstract | PDFPDF
415. AODV based Congestion Control Protocols: Review
Pages :4570-4575
Bandana Bhatia, Neha Sood
Abstract | PDFPDF
416. Efficient Bucketization Technique for Multidimensional Range Queries over Encrypted Metering Data for Smart Grid
Pages :4576-4581
Reshma Sultana N, Girish
Abstract | PDFPDF
417. A Review on Fault Tolerant Analysis for Hard Real Time Safety Critical Embedded System
Pages :4582-4586
Nisha O. S., Dr. K. Siva Sankar
Abstract | PDFPDF
418. Reduction of Confusing-Pair Effect in Car Registration Plate Identification
Pages :4587-4589
Dipankar Bhattacharya
Abstract | PDFPDF
419. Implementation of an Efficient Mechanism for Improving Web Image Search based on User Intention
Pages :4590-4593
Sanjyot S.Desale, Y.C.Kulkarni
Abstract | PDFPDF
420. A Systematic Approach for News Caption Generation
Pages :4594-4598
PHILO SUMI, ANU.T.P
Abstract | PDFPDF
421. A Review of Different Reputation Schemes to Thwart the Misbehaving Nodes in Mobile Ad Hoc Network
Pages :4599-4603
Suhas Sutariya, Prof. Prashant Modi
Abstract | PDFPDF
422. A Novel Approach to Detect Web Page Tampering
Pages :4604-4607
Ramniwas Kachhawa, Nikhil Kumar Singh, Deepak Singh Tomar
Abstract | PDFPDF
423. Protected Data Sharing scheme with Multi- Ownership for Non Static Groups in the Cloud
Pages :4608-4614
Chaitra C, Dr. T. R. Mahesh
Abstract | PDFPDF
424. A Survey on Feature Extraction Techniques for Color Images
Pages :4615-4620
Gaurav Mandloi
Abstract | PDFPDF
425. Sentiment Classification of News Articles
Pages :4621-4623
Kiran Shriniwas Doddi, Dr. Mrs. Y. V. Haribhakta, Dr. Parag Kulkarni
Abstract | PDFPDF
426. SMS Spam Filtering Application Using Android
Pages :4624-4626
Gaurav Sethi, Vijender Bhootna
Abstract | PDFPDF
427. Performance-Energy Aggregate metric based Scheduler (PEAS) for Smartphones
Pages :4627-4632
Rashmi Devi, Preeti Sharma
Abstract | PDFPDF
428. A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud
Computing through Trusted TPA

Pages :4633-4637
Nupoor M. Yawale, Prof. V. B. Gadicha
Abstract | PDFPDF
429. Grading & Identification of Disease in Pomegranate Leaf and Fruit
Pages :4638-4645
Tejal Deshpande, Sharmila Sengupta, K.S.Raghuvanshi
Abstract | PDFPDF
430. Dynamically Allocating the Resources Using Virtual Machines
Pages :4646-4648
Gavine Kanakadurga Santan B.Veeramallu
Abstract | PDFPDF
431. Application of Data Mining in Educational Database for Predicting Behavioural Patterns of the Students
Pages :4649-4652
Elakia, Gayathri, Aarthi, Naren J
Abstract | PDFPDF
432. GA Based Spatial Time Scheduler for Reliable Multicasting in Wireless Ad-hoc Network
Pages :4653-4660
A.P.Shanmugasundaram, C.Chandrasekar
Abstract | PDFPDF
433. Low Energy Adaptive Clustering Hierarchy in Wireless Sensor Network (LEACH)
Pages :4661-4664
Lalita Yadav, Ch. Sunitha
Abstract | PDFPDF
434. A Comparative Study: Efficient Multihop Broadcast Protocol and Receiver Initiated-Medium
Access Control Protocol

Pages :4665-4668
Pramatha.S , Dr.N.K.Sakthivel , Dr.S.Subasree
Abstract | PDFPDF
435. Comparison and Analysis of Different Mutation Strategies to improve the Performance of Genetic Algorithm
Pages :4669-4673
Suvarna Patil, Manisha Bhende
Abstract | PDFPDF
436. A Survey on Association Rule Mining Algorithm and Architecture for Distributed Processing
Pages :4674-4678
Imran Qureshi, Jammi Ashok, Vinaysagar Anchuri
Abstract | PDFPDF
437. Dynamic Resource Allocation to Maximize the Profits in Cloud Environment
Pages :4679-4683
K.R Dilip, J Bala Murali Krishna
Abstract | PDFPDF
438. A Secure way of performing Credit Card Transaction using Hybrid Model
Pages :4684-4691
Ashish Gupta, Jagdish Raikwal
Abstract | PDFPDF
439. A Survey of Analyzing the Efficiency Based Feature Selection of High Dimensional Data using
Fast Algorithm

Pages :4692-4695
S.Nagendrudu, Chakali Subba Govardhan
Abstract | PDFPDF
440. Haze Removal and Color Compensation of Underwater Image and Denoising
Pages :4627-4632
Alka Tripathi, Pragya Gupta, Dr. Vineet Richaria
Abstract | PDFPDF
441. A Cellular Data Placement model for Wireless Sensor Network based on Distributed Clustering
Approach

Pages :4702-4705
Virendra P. Yadav, Prof Kemal U. Koche
Abstract | PDFPDF
442. Localization Techniques and Their Challenges in Underwater Wireless Sensor Networks
Pages :4706-4710
Mukesh Beniwal, Rishipal Singh
Abstract | PDFPDF
443. Survey on Frauds in Financial Transactions
Pages :4711-4713
Vaibhav Bhosale, Megha Jonnalagedda
Abstract | PDFPDF
444. Design Of Flash Memory Controller
Pages :4714-4718
Sanket Jadhav, Sachin Shinde , Mrs. Shruti Oza
Abstract | PDFPDF
445. Optimization techniques for Routing in Wireless Sensor Network
Pages :4719-4721
Loveneet Kaur, Dinesh Kumar
Abstract | PDFPDF
446. Comparison of various Edge Detection Techniques for maximum data hiding using LSB Algorithm
Pages :4722-4727
Soumyajit Sarkar, Arijit Basu
Abstract | PDFPDF
447. Evaluating the Usability and Security of a Spelling Based Captcha System
Pages :4728-4731
Prof. Yogdhar Pandey, Darshika Lothe
Abstract | PDFPDF
448. A Study on String Matching Methodologies
Pages :4732-4735
Shivendra Kumar Pandey, Neeraj Kumar Dubey, Sonam Sharma
Abstract | PDFPDF
449. Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks
Pages :4736-4740
D. Kiranmayi
Abstract | PDFPDF
450. Survey: Vision based Road Detection Techniques
Pages :4741-4747
Vipul H. Mistry, Dr. Ramji Makwana
Abstract | PDFPDF
451. Dynamic Role Assignment in Loose-Virtual-Clustering- Based Networks for Power Efficient MANETs
Pages :4748-4751
Pooja Deshpande, Prof.Anil Bende
Abstract | PDFPDF
452. Survey on Universal Image Steganalysis
Pages :4752-4759
Madhavi B. Desai, Dr. S.V. Patel
Abstract | PDFPDF
453. A Survey on Simulators for Cognitive Radio Network
Pages :4760-4761
Meenakshi Bhrugubanda
Abstract | PDFPDF
454. Enhanced Color Correction Using Histogram Stretching Based On Modified Gray World and White Patch Algorithms
Pages :4762-4770
Manjinder Singh, Dr. Sandeep Sharma
Abstract | PDFPDF
455. Improved Hop-by-Hop Congestion Control Algorithm
Pages :4771-4773
Urvashi Handa
Abstract | PDFPDF
456. Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Pages :4774-4778
Saiyad Sharik Kaji, Prof.M.B.Chandak
Abstract | PDFPDF
457. An Implementation on Secure Hash Algorithm in Wireless Algorithms to Ensure the Integrity
Pages :4779-4781
Neetesh Tiwari, Amit Sinhal
Abstract | PDFPDF
458. Content based Recommender System on Customer Reviews using Sentiment Classification Algorithms
Pages :4782-4787
Keshav R,Arvind Swaminathan S,Goutham R,Naren J
Abstract | PDFPDF
459. Improving Energy and Efficiency in cluster based VANETs through AODV Protocol
Pages :4788-4792
Prerana Deshmukh, Prof. Shrikant Sonekar
Abstract | PDFPDF
460. Design and Development of Software for the Implementation of Image Processing Approach for
Leaf Area Measurement

Pages :4793-4797
Gurjot Kaur, Salam Din, Amandeep Singh Brar
Abstract | PDFPDF
461. A Novel Scheme to Detect Wormhole Attacks in Wireless Mesh Network
Pages :4798-4801
Priti Gupta, Suveg Moudgil
Abstract | PDFPDF
462. Socket Programming
Pages :4802-4807
Limi Kalita
Abstract | PDFPDF
463. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation
Pages :4808-4817
Harsha Banafar, Sanjay Sharma
Abstract | PDFPDF
464. Parallel Implementation & Performance Evaluation of Blast Algorithm on Linux Cluster
Pages :4818-4820
Nisha Dhankher , O P Gupta
Abstract | PDFPDF
465. A Cost Effective Automatic Online Bus Information System using RFID and ZigBee
Pages :4821-4825
P. Prudhvi Kiran, R.Daniel,K.Venkata Prasad
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-