IF

 

bh

 

VOLUME 6 ISSUE 2 March - April 2015

ISSN 0975 - 9646

1. A Model for Detection of Application Layer Denial of Service Attacks using Group Testing Theory
Pages : 931-935
Shazia Shafi, Sanjay Jamwal
Abstract | PDFPDF
2. HPIS: A Scalable Routing Protocol for WMN
Pages :936-940
Tapodhir Acharjee, Azhar Hussain Mozumder, Sudipta Roy
Abstract | PDFPDF
3. Attack Graph-Based Security Metrics and other Metrices for Producing Security to the Computer
Network

Pages : 941-943
Patil Priyanka Nagnath, Prakash B. Dhainje, Deshmukh Pradeep K.
Abstract | PDFPDF
4. Secure Key Establishment for Bundle Security Protocol of Space DTNs in Noninteractive manner
Pages : 944-946
Chaitali S.Jadhav, Prakash B. Dhainje, Deshmukh Pradeep K.
Abstract | PDFPDF
5. A Survey on Congestion Problem of MANET
Pages : 947-951
Ritu Jain, Bhawana Pillai
Abstract | PDFPDF
6. Automatic License Plate Based Smart Vehicle Validation &Security by Gate Control &Email Send
Pages :952-957
Rinky Sharma
Abstract | PDFPDF
7. An Effective Personalization of User Search Behavior with Semantic Framework Algorithm
Pages :958-963
Dr.N.Sivakumar, S.Saranya
Abstract | PDFPDF
8. Improved Protein Function Classification Using Support Vector Machine
Pages : 964-968
Ravdeep Singh, Rajbir Singh, Dheeraj Pal Kaur
Abstract | PDFPDF
9. Providing Security And Privacy To Cloud Data Storage
Pages : 969-971
Yogesh V. Bhapkar, Rakesh S. Gaikwad, Milind R. Hegade
Abstract | PDFPDF
10. A Survey on Different Methods of Channel Estimation in a 3G Private Mobile Network Using a Six Port Receiver
Pages : 972-974
Zeba Khan Rafi, E. Annadevi
Abstract | PDFPDF
11. Auto-Replication: Automated replication for Failover Clusters
Pages : 975-978
Swapnil Mirjolkar, Ankur Mourya,Vinay Karajagi, Dashrath Mane
Abstract | PDFPDF
12. Comparative Analysis of Programming Methodologies of Java, C and Assembly Language Programming
Pages : 979-989
Khandare Nikhil B
Abstract | PDFPDF
13. Optimum Patch Selection Using GA in Exemplar Based Image In-painting
Pages :990-997
Seema Kumari Singh , Prof J.V Shinde
Abstract | PDFPDF
14. Energy Efficient Self Adaptive on Demand Geographical Routing Protocols in MANET
Pages : 998-1001
Prachi Nikate, Prashant. Kumbharkar
Abstract | PDFPDF
15. A Correlative Study about Different Social Networking Sites
Pages : 1002-1006
Raveendra Singh, Shashank Gupta
Abstract | PDFPDF
16. A Survey on Searching Techniques over Encrypted Data
Pages : 1007-1010
Archana D. Narudkar, Aparna A. Junnarkar
Abstract | PDFPDF
17. Article Removed
Pages : xxx-xxx
xxx, xxx
Abstract | PDFPDF
18. Sink Mobility for Data Collection in Wireless Sensor Network Life Cycle
Pages : 1015-1018
Dhivya.M,Divya.K,Keerthi.R, Kukatlapalli Pradeep Kumar
Abstract | PDFPDF
19. A Review on Wireless Nanosensor Networks Based on Electromagnetic Communication
Pages : 1019-1022
Vishranti Rupani, Sunera Kargathara, Jigisha Sureja
Abstract | PDFPDF
20. Energy Efficient Dynamic Threshold Based Load Balancing Technique in Cloud Computing Environment
Pages : 1023-1026
Shivani Gupta, Damodar Tiwari, Shailendra Singh
Abstract | PDFPDF
21. LSB Steganography Using Android Phone
Pages : 1027-1029
Rajashri Ghare, Pruthvi Bansode, Sagar Bombale, Bilkis Chandargi
Abstract | PDFPDF
22. Region Based Algorithm Selection for Network Security
Pages : 1030-1032
V.Asaithambi, Dr.N.Rama
Abstract | PDFPDF
23. Cluster Head Selection Prediction in Wireless Sensor Networks
Pages : 1033-1035
Raveendra Singh, Shashank Gupta
Abstract | PDFPDF
24. License Plate Recognition for High Security Registration Plates: A Review
Pages : 1036-1039
Siddhartha Choubey, Anshuman Rai
Abstract | PDFPDF
25. Analysis and Detection of Heart Related Issues: A Proposed Algorithm
Pages : 1040-1043
Kumari Nirmala, R.M.Singh
Abstract | PDFPDF
26. Security Model to Detect and Avoid Wormhole Attack Using AODV Protocol
Pages : 1044-1049
Gulzar Ahmad Wani, Dr. Sanjay Jamwal
Abstract | PDFPDF
27. Review Paper on Using Procedural Content Generation & Difficulty Curves
Pages : 1050-1052
Paritosh Desai, Ninad Kulkarni, Suraj Jaiswal, Sachin Chauthe, Prof. Yogini Bazaz
Abstract | PDFPDF
28. Artery: A Data-Centric Architecture for Wireless Sensor Networks
Pages : 1053-1058
Javad mozafari, Abbas Mirzaei Somarin, Amin Mohajer
Abstract | PDFPDF
29. Model To Prevent Websites From XSS Vulnerabilities
Pages : 1059-1067
Tejinder Singh Mehta , Sanjay Jamwal
Abstract | PDFPDF
30. A Survey on Signature Verification Approaches
Pages : 1068-1072
Shailaja Dilip Pawar
Abstract | PDFPDF
31. Self Improvement of Cloud Operation Using Dynarep Algorithm and Skewness Algorithm
Pages : 1073-1075
M. Senthamarai, J. Sakunthala
Abstract | PDFPDF
32. A Survey on Visual Cryptography Techniques and their Applications
Pages : 1076-1079
Bhawna Shrivas, Shweta Yadav
Abstract | PDFPDF
33. Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing
Pages : 1080-1083
Jissy Ann George, Dr.M.Hemalatha
Abstract | PDFPDF
34. A Survey on Analysis of Data centre Performance and QOS in IaaS Cloud
Pages : 1084-1087
Karthik.M, Sharavana K
Abstract | PDFPDF
35. A Review on Video Streaming in Education
Pages : 1088-1091
Supriya Bhosale, Prof. Vinayak Pottigar, Prof. Vijaysinh Chavan
Abstract | PDFPDF
36. Preserving Public Auditing and Privacy Policy for Shared Data in the Cloud
Pages : 1092-1095
Krishna Kumar L, Deepa P Sivan
Abstract | PDFPDF
37. Denial of Service Attack and Classification Techniques for Attack Detection
Pages : 1096-1099
Prajakta Solankar, Prof. Subhash Pingale, Prof. Ranjeetsingh Parihar
Abstract | PDFPDF
38. Log Aggregator for Better Root-Cause-Analysis
Pages : 1100-1102
Anamika, Gayatri Bisht, Kanhaiya and Poonam
Abstract | PDFPDF
39. Performance Analysis of Classification Algorithms Using Healthcare Dataset
Pages : 1103-1106
D. Rajeswara rao, Vidyullata Pellakuri, SathishTallam, T. Ramya Harika
Abstract | PDFPDF
40. Comparative Evaluation of Thresholding and Segmentation Algorithms
Pages : 1107-1110
Aaron Gonsalves, Rhea Machado, Gerffi Michael, Omprakash Yadav
Abstract | PDFPDF
41. Interpretation of Hand Gestures Using Neural Networks:A Review
Pages : 1111-1114
Priyanka Parvathy Dali, Dr. Hema C.R
Abstract | PDFPDF
42. Image Inpainting using Super Resolution : A Review
Pages : 1115-1117
Kanchan T. Narwade, Dr.S.A.Ladhake
Abstract | PDFPDF
43. B2B Order Management System
Pages : 1118-1122
Monisha Shetty, Waqaar Juned Shareef, Kanika Shetty, Savita Lohiya
Abstract | PDFPDF
44. Analysing Excellence Measure, Recital of Real World Web Services
Pages : 1123-1126
D.Venkatesh, C.Sivaraman
Abstract | PDFPDF
45. Uncertainty of Rendezvous and Unsurpassed Random Walk
Pages : 1127-1129
Monisha.S., Mrs.K.Ulagapriya
Abstract | PDFPDF
46. Kinect Gaming And Physiotherapy
Pages : 1130-1133
Sachin.V.Singh , Akshay.S.Sonawane , Prajakta Kshirsagar , Yogesh Mahajan
Abstract | PDFPDF
47. A Real – Time Research Platform for Extraocular Image Processing of Epiretinal Prosthesis
Pages : 1134-1140
Sharmili N, Seetha Ramaiah P
Abstract | PDFPDF
48. Improving Customer Satisfaction through Smart Shopping: A Prototype
Pages : 1141-1152
Dan Michael A. Cortez, Charito M. Molina, Khatalyn E. Mata, Jayson Raymund D. Bermudez
Abstract | PDFPDF
49. Air Drum Using Kinect and Arduino
Pages : 1153-1155
G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
Abstract | PDFPDF
50. Security Issues and Trends in Cloud Computing
Pages : 1156-1159
G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
Abstract | PDFPDF
51. Load Balancing in Parallel Network File System using Adaptive Load Data Migration
Pages : 1160-1163
Ratan Deokar, Sagar Hagwane, Shreenath Iyer, Vivek Labhade, Mayur Koli
Abstract | PDFPDF
52. A Rapid Grouping Based Empirical Subset Selection Algorithm for High Dimensional Data
Pages :1164-1166
B.Praveenkumar, M.V.Jagannatha Reddy
Abstract | PDFPDF
53. Watermarked LTVC Scheme
Pages :1167-1170
Aswathy. S
Abstract | PDFPDF
54. Reinfection and Self-Start Analysis on the Propagation Dynamics of Modern Email Malware
Pages : 1171-1174
Preetha. S.M
Abstract | PDFPDF
55. Computation Load Sharing of Personalized Mobile Search Engine
Pages : 1175-1177
Ujvala Patil, N.Y.Suryawanshi
Abstract | PDFPDF
56. A User centric cost efficient resource management model for cloud computing
Pages : 1178-1180
Harleen Kaur, Vandana Pushe
Abstract | PDFPDF
57. Auditing Framework Service for Efficient Secure Data Storage in Multi- cloud
Pages : 1181-1183
M. Ravi kumar, E . Madhusudhana Reddy
Abstract | PDFPDF
58. Multifunction Web Log Analyzer: A Survey
Pages : 1184-1187
Lalit Agrawal, Prof. Anil Patidar
Abstract | PDFPDF
59. Reconstructing Minutiae and Orientation Fields Using Enhanced Feedback Paradigm
Pages : 1188-1191
Lekshmi S P, Lizmol Stephen
Abstract | PDFPDF
60. Advanced Security using VCS and Watermarking
Pages : 1192-1195
Minal Nerkar, Priya Talreja, Komal Pawar , Radha Gosavi, Devika Dhadphale
Abstract | PDFPDF
61. Securing Server/Client side Applications against XSS attack via XSS-Obliterator
Pages : 1196-1203
Amit Singh, Suraj Singh Tomer
Abstract | PDFPDF
62. A Model to Restrict Online Password Guessing Attacks
Pages : 1204-1208
Aqib Malik , Dr. Sanjay Jamwal
Abstract | PDFPDF
63. A Review on Web Image Retrieval Techniques
Pages : 1209-1212
Rasika V. Khandre, Dr. Neeta A. Deshpande
Abstract | PDFPDF
64. Using Ranking – Based Techniques Improvement of Aggregate Recommendation Diversity and
Accuracy

Pages : 1213-1216
Dipika Anil Hole, Ashvini Sitaram Bangar, Priyanka Hanumant Rokade
Abstract | PDFPDF
65. Automated Detection and Classification of Glaucoma from Eye Fundus Images: A Survey
Pages : 1217-1224
Syed Akhter Hussain, Dr. Holambe A. N
Abstract | PDFPDF
66. A Review on Incomplete Data And Clustering
Pages : 1225-1227
Vaishali H. Umathe, Gauri Chaudhary
Abstract | PDFPDF
67. Computational Auditory Scene Analysis for Acoustic Event Detection: An Improved Approach
Pages : 1228-1231
Jincy Joseph.P, Shamla Beevi.A
Abstract | PDFPDF
68. Authentication with Colours and Session Password
Pages : 1232-1233
Priya More , Ankita Singh , Prakash Singh
Abstract | PDFPDF
69. Dynamic Message Authentication Code for Short Messages
Pages : 1234-1238
D.Ganesh, A.Jahnavi, M.Trivikram
Abstract | PDFPDF
70. Adoption Of Electronic Media Among the Farmers using Data Mining Techniques in Perambalur District Of Tamil Nadu
Pages : 1239-1241
J. Nithya jayaseeli, S.Natarajan
Abstract | PDFPDF
71. Throughput Maximization in Wireless LAN by Load Balancing Approach
Pages : 1242-1244
Manjit Singh
Abstract | PDFPDF
72. Data Hiding in Encrypted Images
Pages : 1245-1247
Ankita Sawant, Vishakha Darji, Anisha Shetty
Abstract | PDFPDF
73. Segmentation of MR images for Tumor extraction by using clustering algorithms
Pages : 1248-1252
Shaik Salma Begum, T.Venkata Mohana Rao, P.Nageswara Rao, G.Srikanth
Abstract | PDFPDF
74. Understanding Architecture and Framework of J2EE using Web Application
Pages : 1253-1257
Devadrita Dey Sarkar ,Anavi jaiswal , Ankur Saxena
Abstract | PDFPDF
75. Hand & Upper Body Based Hybrid Gesture Recognition
Pages : 1258-1262
Prerna Sharma, Naman Sharma
Abstract | PDFPDF
76. A Survey on Machine Learning Techniques to Extract Chemical Names from Text Documents
Pages : 1263-1266
Snehal P. Umare, Dr. Neeta A. Deshpande
Abstract | PDFPDF
77. Enhancing Security and Privacy in Multi Cloud Computing Environment
Pages : 1267-1270
V. Vankireddy, N. Sudheer, R. Lakshmi Tulasi
Abstract | PDFPDF
78. A Survey on Modular Approach to Share Secure and Efficient Video Streaming over Cloud
Pages : 1271-1274
Radha A. Mundhada, Sapna S.Khapre
Abstract | PDFPDF
79. Distributed Approach for Replication of Scalable Service Deployment in Autonomic Network
Environment

Pages :1275-1281
Raji Rajasekharan
Abstract | PDFPDF
80. Energy Efficient Approach on Cut Detection in Wireless Sensor Networks
Pages : 1282-1286
Poojarini Mitra, Sinthia Roy, Sayani Chandra, Ipsita Saha, Bidyutmala Saha
Abstract | PDFPDF
81. An Optimization Based Approach for Image Embedding in QR Codes: A Review
Pages : 1287-1289
Pranjali A. Shrirao , Prof. V.T. Gaikwad , Prof. H.N. Datir
Abstract | PDFPDF
82. An Efficient Method for Predicting Heart Disease Problem Using Fitness Value
Pages : 1290-1293
Prachi Paliwal , Mahesh Malviya
Abstract | PDFPDF
83. A Cluster-Based Filtering Algorithm for Mashup Service
Pages : 1294-1295
Sathish.S, Nulyn Punitha J
Abstract | PDFPDF
84. Automatic Template Extraction from Heterogeneous Web Pages
Pages : 1296-1299
Rashmi D Thakare , Mrs. Manisha R Patil
Abstract | PDFPDF
85. Face Annotation and Similar Image Retrieval using PCA and MLP
Pages : 1300-1302
Anusree B S, Resmy V R
Abstract | PDFPDF
86. JPEG Anti-Forensics with Undetectability and Image Quality
Pages : 1303-1306
Ruma V S, Neena Raj N R
Abstract | PDFPDF
87. An Automated Health Care Computing Model for Continuous Monitoring of Patients for Immediate
Medical Care during Emergency

Pages : 1307-1311
P. Samuel Kirubakaran, Dr.S.Uma, Donbyntalang Dewkhaid, Selva Kumar P
Abstract | PDFPDF
88. Performance and Evaluation of Classification Data Mining Techniques in Diabetes
Pages : 1312-1319
Dr. D. Ashok Kumar and R. Govindasamy
Abstract | PDFPDF
89. An Efficient Mining of Sequential Rules Using Vertical Data Format
Pages : 1320-1323
Surbhi Jigneshkumar Sheth, Shailendra K Mishra
Abstract | PDFPDF
90. Simultaneous Secure Transmission for Textual Data Using Radomized Bits
Pages : 1324-1327
Remya R Nair
Abstract | PDFPDF
91. An Efficient Fully Dynamic Algorithm to Optimize the Task Scheduling Activities in Cloud Systems
Pages : 1328-1332
Sarwat Jahan, Safdar Tanweer, Masoorul Haque
Abstract | PDFPDF
92. Modelling Cloud Services for Big Data using Hadoop
Pages : 1333-1335
Trapti Sharma
Abstract | PDFPDF
93. A Lexicon for Hadith Science Based on a Corpus
Pages : 1336-1340
Moath Najeeb, Abdelkarim Abdelkader, Musab Al-Zghoul , Abdelrahman Osman
Abstract | PDFPDF
94. Web Based Coaching Institute Management System
Pages : 1341-1344
Mayuri Kamble, Vidya Bhuvad, Omkar Keluskar, Vinayak Malavade
Abstract | PDFPDF
95. Dynamic Profile Activation for Enhancing Security in Android Devices
Pages : 1345-1349
Venkata Sai Abhishek Gogu, Venkata Sai Teja and Jahnavi Agepati
Abstract | PDFPDF
96. Empowering Service Claims Fraudulent Using Big Data Analytics
Pages : 1350-1353
U. Kartheek Chandra Patnaik, Ch. Navyatha, B.V.Maliney, B.Mounica, J. Neelima
Abstract | PDFPDF
97. E-Mail Filtering in Android
Pages : 1354-1355
Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
Abstract | PDFPDF
98. Minimizing Cost for big data processing using Online Database
Pages : 1356-1359
Shruthy Y, Sreenimol K. R
Abstract | PDFPDF
99. Smart Traffic Signal
Pages : 1360-1363
Monish Puthran, Sangeet Puthur, Radhika Dharulkar
Abstract | PDFPDF
100. NFC Based Healthcare System
Pages : 1364-1366
Ketan Bhadoriya, Rajshekhar Humbe, Yogesh Kodgire, S.G.Phule
Abstract | PDFPDF
101. Predicting the impact of different Variables on Students Academic Performance using Artificial
Intelligence

Pages : 1367-1370
Pratiksha R.Shetgaonkar
Abstract | PDFPDF
102. Cross Tier Framework for Rapid Web Application Development
Pages : 1371-1374
Avinash D’Silva, Majesly Correia, Pruthvish Vyas
Abstract | PDFPDF
103. False Node Detection in Trust Aware Routing Framework (TARF) in WSN
Pages : 1375-1378
Bhagyashree N V, Bhat Geetalaxmi Jairam
Abstract | PDFPDF
104. Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques
Pages : 1379-1386
N.Sivakumar, Dr.R.Balasubramanian
Abstract | PDFPDF
105. Target Planning System
Pages : 1387-1389
Dhara K.N, B.K Raghavendra, Santosh Kumar J, VNBM Krishna
Abstract | PDFPDF
106. A Survey on Unicast Routing Protocols for VANET
Pages : 1390-1392
Imtisunep T Longchar, Rwngouti Chamframary, Dip Jyoti Deka, T Sivakumar
Abstract | PDFPDF
107. Vehicle Information System
Pages : 1393-1395
Sanjeev Shelar, Wasim Sheikh , Pratik Shinde
Abstract | PDFPDF
108. Performance Evaluation of WiMAX 802.16e OFDM PHY LAYER
Pages : 1396-1400
Ashish Kishore
Abstract | PDFPDF
109. Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud
Pages : 1401-1407
Palak Purohit, Awani Joshi, Richa Jain
Abstract | PDFPDF
110. A Simplified Rule Based Distributed Information Flow Control for Cloud Computing
Pages : 1408-1414
Awani Joshi, Palak Purohit, Richa Jain
Abstract | PDFPDF
111. Enhancing Security of Traffic Redundancy and Elimination Approach in Cloud Data Storage using
3DES

Pages : 1415-1419
Anisha Sarah Mathew, Mitha Rachel Jose
Abstract | PDFPDF
112. Session Authentication using Color Scheme
Pages : 1420-1423
Shefali Amlani, Shweta Jaiswal, Suchitra Patil
Abstract | PDFPDF
113. FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its
application in market basket analysis

Pages : 1424-1428
Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
Abstract | PDFPDF
114. Fastest Pedestrian Detector
Pages : 1429-1432
Tinto Raj R V
Abstract | PDFPDF
115. Collaborative Web Service QoS Prediction with Multi-Criteria Decision Making Using CB-NIMF
Pages : 1433-1438
M.Thirumaran, A.V.Arimathi
Abstract | PDFPDF
116. Semantic Reasoner Based Change Management Framework for Ev: LCS
Pages : 1439-1450
M.Thirumaran, G.Gayathry@Brendha , Subham Soni
Abstract | PDFPDF
117. Hadoop Based Analytics on Next Generation Medicare System
Pages : 1451-1453
Gopal A. Tathe, Pratik S. Patil, Sangram C. Parle,Vishal S. Pathare,Prof. Sudarshan S. Deshmukh
Abstract | PDFPDF
118. Counter Measures against Malicious Program in Universal Serial Bus
Pages : 1454-1456
Selvi Grija, Kovartthan, Selva Kumar, Thamilzselvan
Abstract | PDFPDF
119. CHOKe: A Stateless Queue for Securing Flows
Pages : 1457-1459
Saniya Elza Dominic, Gayathri .R Krishna
Abstract | PDFPDF
120. A Novel Ontology Processing System Using Information Filter and Knowledge Repository for
Semantic Web

Pages :1460-1464
Sudha J Vishwakarma
Abstract | PDFPDF
121. Survey on Online Recommendation Using Web Usage Mining
Pages : 1465-1467
Neeraj Iyer, Alex Dcunha, Akshay Desai, Kavita Jain
Abstract | PDFPDF
122. Parking Navigation System Based on RFID and IR Sensor
Pages : 1468-1472
Prof.Gayatri Bhandari, Mrinal Bari, Shweta Borse, Ashwini Gaikwad, Reshma Kadam
Abstract | PDFPDF
123. Vehicle Tracking Using Number Plate Recognition System
Pages : 1473-1476
D.Madhu Babu, K.Manvitha, M.S.Narendra, A.Swathi, K.Praveen Varma
Abstract | PDFPDF
124. A Rule Based Verification with Strongly Typed Field based SQL Injection and XSS Attack
Detection

Pages : 1477-1482
Ajay Singh Dikhit, Prof.khushboo Karodia
Abstract | PDFPDF
125. An E-Commerce Website based Chatbot
Pages : 1483-1485
Siddharth Gupta, Deep Borkar, Chevelyn De Mello, Saurabh Patil
Abstract | PDFPDF
126. Fusion of Local and Global Iris Features to Construct Feature Vector Using Genetic Algorithm
Pages : 1486-1489
S.Pon Sangeetha
Abstract | PDFPDF
127. Mining Social Network Data for Cyber Physical System
Pages : 1490-1492
Manjushree Gokhale, Bhushan Barde, Ajinkya Bhuse, Sonali Kaklij
Abstract | PDFPDF
128. Route Prediction in Wireless Sensor Networks using Markov Model
Pages : 1493-1496
Nisha Pachori, Vivek Suryawanshi
Abstract | PDFPDF
129. Dynamic Signature Recognition and Verification Using Pixel Based Approach
Pages : 1497-1499
Rinku N. Patel, Suman P. Chauhan, Khushbu C. Panwala, Hardi D. Prajapati
Abstract | PDFPDF
130. Improving Trust Management for Effective Collaborative Intrusion Detection Network
Pages : 1500-1504
P.Ayesha Barvin, G.Bakkiyaraj
Abstract | PDFPDF
131. MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation
Pages : 1505-1508
Chinnu A
Abstract | PDFPDF
132. A Survey on the Role of Cloud Computing in Social Networking Sites
Pages : 1509-1512
Tadepalli Sarada Kiranmayee
Abstract | PDFPDF
133. ANN Based Head Movement Detection with Eye Tracking
Pages : 1513-1517
NIMI M R, RENJI S
Abstract | PDFPDF
134. Fuzzy based clustering of High Dimensional Datasets
Pages : 1518-1520
M.Pavani, M.Pravallika, M. SaiChandan, M.Lokesh, A. Snehitha
Abstract | PDFPDF
135. Image Registration using Discrete Wavelet Transform and Particle Swarm Optimization
Pages : 1521-1525
Jitendra Pramanik, Sunita Dalai, Debaraj Rana
Abstract | PDFPDF
136. An Automated Framework for Shortest Path Computation
Pages : 1526-1534
R.Kamatchi, Dr.S.Lakshmi
Abstract | PDFPDF
137. A Survey on Big Data, Data Mining and Overlay Based Parallel Data Mining
Pages : 1535-1538
Pushpanjali, Jyothi S Nayak
Abstract | PDFPDF
138. Review of Efficient Techniques for Reducing Web Page Complexity
Pages : 1539-1540
Chaitali Domde, Hemlata Dakhore
Abstract | PDFPDF
139. Improving Scalability Of Storage System:Object Storage Using Open Stack Swift
Pages : 1541-1546
G.Kathirvel Karthika, R.C.Malathy, M.Keerthana
Abstract | PDFPDF
140. Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm
Pages : 1547-1551
Preeti Kushwah, Dr. Abhay Kothari
Abstract | PDFPDF
141. Mitigating Flood Attack Using AODV in Disruption Tolerant Network
Pages : 1552-1555
Jananii.M, Vasanthi.S
Abstract | PDFPDF
142. Enhancing the Query Processing in Unstructured Peer To Peer Network
Pages : 1556-1559
Rajashree Dongare, Prof.Rachana Satao
Abstract | PDFPDF
143. A Novel Method for Making a Photo-book Using Cloud
Pages : 1560-1564
Aishwarya Habib, Praveen Mulgund, Abdul Kareem Sirasgi, Priyadarshini Kalwad
Abstract | PDFPDF
144. Software Metrics Evaluation: An Open Source Case Study
Pages : 1565-1568
Sandeep Kaur, Navjot Kaur
Abstract | PDFPDF
145. Hybrid CPU Scheduling Algorithm
Pages : 1569-1572
Anil Kumar Gupta
Abstract | PDFPDF
146. Comparative Analysis of Recall-based (Drawmetric) and Click-based (Locimetric) Graphical Password Authentication Schemes
Pages : 1573-1577
1Km Ritu, #2Rajiv Ranjan Singh, #3Bharti Kumar
Abstract | PDFPDF
147. Survey on Types of Bug Reports and General Classification Techniques in Data Mining
Pages : 1578-1583
Smita Mishra, Somesh Kumar
Abstract | PDFPDF
148. A Comparative Study on Semantic Web Service Discovery Approaches
Pages : 1584-1587
Mourougaradjane Puthupattan, Dinadayalan Perumal
Abstract | PDFPDF
149. Privacy Preserving Issues and their Solutions in Cloud Computing: A Survey
Pages : 1588-1592
Pooja HP, Nagarathna N
Abstract | PDFPDF
150. An Hybrid Anti-Phishing Approach Using MAC Verifier, Pattern Similarity Index (PSI) and SLIQ Decision System
Pages : 1593-1597
Anil Kumar Goutam, Tejalal Choudhary
Abstract | PDFPDF
151. Android App Based Robot
Pages : 1598-1600
Aiman Ansari, Yakub Ansari, Saquib Gadkari, Aarti Gokul
Abstract | PDFPDF
152. Minimizing Search Latency using Portable Existence Services
Pages : 1601-1605
Rage.Parasuramudu, M.Veeresh babu
Abstract | PDFPDF
153. A New Approach to Event Dissemination in Distributed Systems
Pages : 1606-1609
Anson Antony Fertal, P. Priya Ponnusamy
Abstract | PDFPDF
154. Mitigating Man in the Middle attack Using Vi-Fickle Algorithm
Pages : 1610-1612
Vishnuganth.M, Mohanraj.S, Stanly Jayaprakash.J
Abstract | PDFPDF
155. Text Clustering for Information Retrieval System Using Supplementary Information
Pages : 1613-1615
Chitra Kalyanasundaram, Snehal Ahire, Gaurav Jain, Swapnil Jain
Abstract | PDFPDF
156. Radius Bone Fracture Detection Using Morphological Gradient Based Image Segmentation Technique
Pages : 1616-1619
Swathika.B, Anandhanarayanan.K, Baskaran.B and Govindaraj.R
Abstract | PDFPDF
157. Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD
Pages : 1620-1624
Aswathy K.Nair, Flower Abraham Mundackal
Abstract | PDFPDF
158. A Secure tunnel technique using IPv6 Transition over IPv4 Channel
Pages : 1625-1628
Kamna Chauhan, Pooja Jain
Abstract | PDFPDF
159. Transpiler and it’s Advantages
Pages :1629-1631
Rohit Kulkarni, Aditi Chavan, Abhinav Hardikar
Abstract | PDFPDF
160. Dual Stenography Approach For Secure Data Communication
Pages : 1632-1635
Kirti Shukla, Priyanka Vijaywargiya
Abstract | PDFPDF
161. Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images
Pages : 1636-1642
Omprakash Rajankar, Dr. Uttam Kolekar
Abstract | PDFPDF
162. Identification of Age And Gender Using HMM
Pages : 1643-1647
Bhavana R. Jawale, Swati patil, Mayur Agrawal
Abstract | PDFPDF
163. A Survey of Machine Learning Based Approaches for Parkinson Disease Prediction
Pages : 1648-1655
Shubham Bind, Arvind Kumar Tiwari, Anil Kumar Sahani
Abstract | PDFPDF
164. Non-Saperable Reversible Data Hiding in Encrypted Image Using Chaoutic Map
Pages : 1656-1659
Nilesh Solanki, Mahesh Parmar, Dr. Vineet Richhariya
Abstract | PDFPDF
165. Advanced Probabilistic Binary Decision Tree Using SVM for large class problem
Pages : 1660-1664
Anita Meshram, Roopam Gupta and Sanjeev Sharma
Abstract | PDFPDF
166. Semi Supervised Collaborative Image Retrieval Using Binary Classifier
Pages : 1665-1668
Gaurav Kulkarni, Mahesh Kulkarni, Prashant Kausal , Suraj Kedar
Abstract | PDFPDF
167. Reliable Cloud Using elliptical Curve Deffie Hellman and Elliptical Curve Digital Signature
Pages : 1669-1671
Akash Shrivastava, Nitya M Nerli
Abstract | PDFPDF
168. Green Data Center Using Spearman’s Ranking Algorithm
Pages : 1672-1676
Sonu Choudhary, Dr. Abhay Kothari
Abstract | PDFPDF
169. Secure Multimatch Packet Classification Based on SignatureTree
Pages : 1677-1679
Pinky M S , Anna Prathibha Shobak
Abstract | PDFPDF
170. Web Log Based Analysis of User’s Browsing Behavior
Pages : 1680-1684
Ashwini ladekar, Pooja Pawar, Dhanashree Raikar, Prof.Jayashree Chaudhari
Abstract | PDFPDF
171. Analysis of Various Clustering Algorithms in Wireless Sensor Network
Pages : 1685-1691
Kunkunuru Udaykumar, Tamizharasi Thirugnanam
Abstract | PDFPDF
172. Image Based Authentication Using Visual Cryptography and Encryption Algorithm
Pages : 1692-1696
Shreya Zarkar, Sayali vaidya, Arifa Tadvi, Tanashree Chavan, Prof. Achal Bharambe
Abstract | PDFPDF
173. Recursive Binary Time Partitioning For Low-Power Mobile Discovery and Bandwidth Allocation in
Cloud-Based Wireless Live-Streaming

Pages : 1697-1702
Kaushlya Salunkhe, Gadekar Devendra
Abstract | PDFPDF
174. Optimized Resource Management Decision System (ORM-DS) for Distributed Infrastructure
Management in Cloud Computing

Pages : 1703-1709
Nandini Kranti, Anand Singh Rajavat
Abstract | PDFPDF
175. Fault Node Discovery and Efficient Route Repairing Algorithm for Wireless Sensor Network
Pages : 1710-1715
Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar
Abstract | PDFPDF
176. ORSMF: Optimistic Replacement Based Switching Median Filter for Highly Corrupted Images
Pages : 1716-1723
Rupinder Kaur, Dinesh Kumar
Abstract | PDFPDF
177. Genetic K-means Algorithm for Credit Card Fraud Detection
Pages : 1724-1727
Pooja Chougule, A.D. Thakare, Prajakta Kale, Madhura Gole, Priyanka Nanekar
Abstract | PDFPDF
178. Sensitive Broadcasting of Data for Cluster Based WSNs
Pages : 1728-1730
Renuga.A, Sakthivel.B
Abstract | PDFPDF
179. A Survey on Comparative Study of Routing Protocol in Delay-Tolerant Networks
Pages : 1731-1736
Vikash, R.K.Singh
Abstract | PDFPDF
180. A Proposed Hybrid Spatial Indexing: QX Tree
Pages : 1737-1739
Jayanaranjan Dash, Dipa Patra, Chittaranjan Pradhan
Abstract | PDFPDF
181. Enhanced Video Retrieval and Classification of Video Database Using Multiple Frames Based on
Texture Information

Pages : 1740-1745
Mohd. Aasif Ansari, Dr. Hemlata Vasishtha
Abstract | PDFPDF
182. Minimizing Communication Overhead of Server in Client Server Communication
Pages : 1746-1749
Rucha R. Goundadkar, Roshani K. Nakhate, Sonali K. Koratkar, Prof. R. H. Kulkarni
Abstract | PDFPDF
183. GIntrusion Detection Using Data Mining Technique (Classification)
Pages : 1750-1754
Dr.D.Aruna Kumari, N.Tejeswani, G.Sravani, R.Phani Krishna
Abstract | PDFPDF
184. Shadow Detection and Removal from Images-A Review
Pages : 1755-1757
Harpreet Kaur, Navdeep Kaur
Abstract | PDFPDF
185. A Context-Aware Search System for Smart Phones Based on Context-Aware Infrastructure
Pages : 1758-1760
Gayatri Dange, Rajan Jamgekar, Swapnaja Ubale
Abstract | PDFPDF
186. Privacy –Enhanced Web Personalization
Pages : 1761-1764
Rupali Keshavrao Aher, Akshay Rajdhar Adik
Abstract | PDFPDF
187. Performance Analysis of DYMO FSR & GSR Using Wormhole attack under VANET’s
Pages : 1765-1768
Gurminder Kaur, Manju Bala, Manoj Kumar
Abstract | PDFPDF
188. Agile Testing
Pages : 1769-1773
Sakshi Sachdeva, Purnima Khurana
Abstract | PDFPDF
189. A Review on Large-scale Video Classification with Recurrent Neural Network (RNN)
Pages : 1774-1778
Bhagyashri P. Lokhande, Sanjay S. Gharde
Abstract | PDFPDF
190. Audio Visual Speech Synthesis and Speech Recognition for Hindi Language
Pages : 1779-1783
Kaveri Kamble, Ramesh Kagalkar
Abstract | PDFPDF
191. Kinship Verification
Pages : 1784-1786
Kanchan Pardeshi , Vrushali Pawar, Snehal Sonawane , Kavita Wagh
Abstract | PDFPDF
192. ETL Life Cycle
Pages : 1787-1791
Purnima Bindal , Purnima Khurana
Abstract | PDFPDF
193. Development of improved Aggregated Key Cryptosystem for scalable data sharing
Pages : 1792-1794
Rashmi Khawale, Roshani Ade
Abstract | PDFPDF
194. Credit Card Fraud Detection System using Hidden Markov Model and Adaptive Communal Detection
Pages : 1795-1797
Nabha Kshirsagar, Neha Pandey,Shraddha Kotkar, Suja S. Panicker, Amol Pate
Abstract | PDFPDF
195. Embedded Image Capturing & Digital Converting Process using Raspberry pi System interfacing and Comparision of Generation 2 verses Generation 1 models in Raspberry pi
Pages : 1798-1801
Anoop Mishra, Arshita Dixit
Abstract | PDFPDF
196. AUTHOR IDENTIFICATION in MAIL
Pages : 1802-1805
S.A.Aher, D.S.Nikam, J.M.Tadge, Bharti.Avhad, V.D.Mahajan
Abstract | PDFPDF
197. Detection of Burr type XII Reliable Software Using SPRT on Interval Domain Data
Pages : 1806-1811
Dr. R. Satya Prasad, B. Ramadevi, Dr. G.Sridevi
Abstract | PDFPDF
198. An Efficient Reuse of Legacy C-ISAM through Java Native Interface
Pages : 1812-1813
Raphael O. Anumba
Abstract | PDFPDF
199. Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion
Pages : 1814-1818
G.Vivek, B.Logesshwar, Civashritt.A.B, D.Ashok
Abstract | PDFPDF
200. Portfolio Investment Model Using Neuro Fuzzy System
Pages : 1819-1823
Keerti. S.Mahajan, Shruti. S. Jamsandekar, Dr. R .V. Kulkarni
Abstract | PDFPDF
201. Solving NP hard Problems using Genetic Algorithm
Pages : 1824-1827
Gaurang Panchal & Devyani Panchal
Abstract | PDFPDF
202. Efficient Attribute Evaluation, Extraction and Selection Techniques for Data Classification
Pages : 1828-1831
Gaurang Panchal & Devyani Panchal
Abstract | PDFPDF
203. Secure Implementation of Artificial Neural Networks over Cloud
Pages : 1832-1834
Pallavi Mhatre , Prachi Pimple , Surabhi Shikarkhane ,Poi Tamrakar
Abstract | PDFPDF
204. Survey on Recent Algorithms for Privacy Preserving Data mining
Pages : 1835-1840
S.Selva Rathna, Dr. T. Karthikeyan
Abstract | PDFPDF
205. Steady State Analysis of a Three Stage Communication Network with DBA and Batch Arrivals
Pages : 1841-1847
G. Rajendra Kumar, Kuda Nageswara Rao, K. Srinivasa Rao
Abstract | PDFPDF
206. An Incremental Feature Clustering Algorithm for Text Classification
Pages : 1848-1851
Johny Thomas, Abishek Nair, Arpit Gupta
Abstract | PDFPDF
207. Face Recognition Based Solution For Security Using Web Technology
Pages : 1852-1854
V.Srinivasarao
Abstract | PDFPDF
208. Profile Management System
Pages : 1855-1858
Rajdip kaur Bath, Tyson Fernandes, Akash Jadhav
Abstract | PDFPDF
209. Analysis Clustering Techniques in Biological Data with R
Pages : 1859-1864
Satish Kumar, Dr.Mohammed Asger
Abstract | PDFPDF
210. A Novel Page Links Prediction Technique for Web Search Sources
Pages : 1865-1868
Aleem Ansari, Dr. Hemlata Vasishtha
Abstract | PDFPDF
211. Automatic Evaluation System for Student Code
Pages : 1869-1871
Pratik Saraf, Shankar Ramesh, Sachin Patel, Prof. Sujata Pathak
Abstract | PDFPDF
212. Wearable Devices: Google Glass & Smart Watch
Pages : 1872-1873
Lakshay Garg, Abhishek Bhardwaj, Meetu Gupta
Abstract | PDFPDF
213. Custom ROM’s in Android
Pages : 1874-1875
Meetu Gupta, Abhishek Bhardwaj, Lakshay Garg
Abstract | PDFPDF
214. Analytical Approach to Predictive Disease Diagnosis using K-nn and Kstar
Pages : 1876-1879
Rashmi Madhukar Jadhav, Ms. Roshani Ade
Abstract | PDFPDF
215. Secure Key Distribution Over MANET : A Cryptographic Approach
Pages : 1880-1883
Vikas Kumar Rana, Rajneesh Gujral
Abstract | PDFPDF
216. Perturb and Observe MPPT Algorithm Implementation for PV Applications
Pages : 1884-1887
Gangavarapu Mamatha
Abstract | PDFPDF
217. Image Retrieval Based on LBP Pyramidal Multiresolution using Reversible Watermarking
Pages : 1888-1893
H. Ouahi, K. Afdel,M.Machkour
Abstract | PDFPDF
218. Energy Efficient Protocols Used in Wireless Sensor Networks
Pages : 1894-1896
PARKAVI. D, Dr. Y.SURESH
Abstract | PDFPDF
219. Essential Characteristics for Ubiquitous Projects
Pages : 1897-1899
Anil kumar Mishra, Pushpa Yadav, Latika Singh
Abstract | PDFPDF
220. Comparative Study of Various Enhancement Techniques for Finger Print Images
Pages : 1900-1905
Darshan Charan Nayak
Abstract | PDFPDF
221. Handling DDoS attacks in Cloud
Pages : 1906-1912
Yesu Jeya Bensh P, Murugan K
Abstract | PDFPDF
222. Stabilizing Route and Control Overhead by Using Ad-Hoc Routing Protocol in Vehicular Ad-Hoc
Network (VANET)

Pages : 1913-1916
Bhargavi Dalal and Smita Jangale
Abstract | PDFPDF
223. A Mining Algorithm to Generate the Candidate Pattern for Authorship Attribution for Filtering
Spam Mail

Pages : 1917-1921
Khongbantabam Susila Devi, Dr. R. Ravi
Abstract | PDFPDF
224. Continuous User Authentication Using Keystroke Dynamics
Pages : 1922-1925
M.Pavithra, K.B.Sri Sathya
Abstract | PDFPDF
225. A Novel Method for Prediction of Resource Requirements Using Replica Mechanism
Pages : 1926-1929
Mohini Rai, Rupali Bhartiya
Abstract | PDFPDF
226. Comparison of Different Navigation Prediction Techniques
Pages : 1930-1939
Prasad J. Koyande, Kavita P. Shirsat
Abstract | PDFPDF
227. Current Image Segmentation Techniques-A Review
Pages : 1940-1942
Manraj, Amitpal Singh
Abstract | PDFPDF
228. A Competent Situation of Responsive Intrusion Detection System for Secure Portable Devices
Pages : 1943-1946
Rekha Dwivedi, Priyanka Vijayvargiya
Abstract | PDFPDF
229. Earthquake Damage Assessment of Buildings Using Pre-event and Post-event Imagery
Pages : 1947-1951
M.R.Archana Jenis,D.G.Enoch Raja,3. D.V.Viji Nirmala
Abstract | PDFPDF
230. Effective Navigation of Query Results Using Apriori Algorithm
Pages : 1952-1955
Tagore Kumar Tummapudi, Uma M
Abstract | PDFPDF
231. Efficient Processing of Decision Tree Using ID3 & improved C4.5 Algorithm
Pages : 1956-1961
Sonal Patil, Mayur Agrawal, Vijaya R. Baviskar
Abstract | PDFPDF
232. Active Learning of constraints using incremental approach in semi-supervised clustering
Pages : 1962-1964
Jamil Ahmed Sk, Manjunath Prasad, Abdullah Gubbi, Hasibur Rahman
Abstract | PDFPDF
233. Wireless Intrusion Detection System
Pages : 1965-1968
Keith Chettiar, Akshay Patil, Arpita Pradhan and Sushama Khanvilkar
Abstract | PDFPDF
234. Efficient Energy Utilization in Wireless Sensor Networks by installing Relay Stations
Pages : 1969-1970
Rama Krishna Reddy Kallam
Abstract | PDFPDF
235. Supervised and Unsupervised Document Classification-A survey
Pages : 1971-1974
Deepshikha Kalita
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-