IF

 

bh

 

VOLUME 8 ISSUE 1 January - February 2017

ISSN 0975 - 9646

1. Tree Pruning Based Searching of Similar Trajectories
Pages :1-6
Gajanan S. Gawde, Jyoti D. Pawar
Abstract | PDFPDF
2. A Survey on Various Duplicate Detection Methods
Pages :7-9
M.Priyanka, Asha Baby
Abstract | PDFPDF
3. Efficient Loss Recovery in Ad Hoc Networks
Pages :10-15
S Yasaswini, G M Naik, P G K Sirisha
Abstract | PDFPDF
4. Implementation Advance Technique for Prediction Bug Using Machine Learning
Pages :16-19
Pooja Maltare,Vishal Sharma
Abstract | PDFPDF
5. Secured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates
Pages :20-26
G.Gayathri, T.Anitha
Abstract | PDFPDF
6. Constructs of Natural Language Processing
Pages :27-30
Mallamma V. Reddy, Hanumanthappa M.
Abstract | PDFPDF
7. Scaling Solr Performance Using Hadoop for Big Data
Pages :31-33
Tarun Patel, Dixa Patel, Ravina Patel, Siddharth Shah
Abstract | PDFPDF
8. An Elevation of Image Compression Techniques
Pages :34-41
Nidhi Bansal, Hariom Tyagi
Abstract | PDFPDF
9. Comparative Study on Big Data Analytic Frameworks in Cloud
Pages :42-44
D.Avinash Babu, A.Koushik
Abstract | PDFPDF
10. Identifying Pedophiles by Visualizing Vein Patterns from Color Skin Images
Pages :45-47
Anila S, Anitha Mary M.O. Chacko
Abstract | PDFPDF
11. Grapheme Segmentation of Tamil Speech Signals using Excitation Information with MFCC and LPCC Features
Pages :48-52
Geetha K, Dr. R. Vadivel
Abstract | PDFPDF
12. A Feasible Method for Blurbing Higher Education Institute
Pages :53-55
Dileep Kumar Yadav, Surjeet Kumar
Abstract | PDFPDF
13. Survey on Algorithms for Brain Tumor Detection
Pages :56-58
Priyanka Shah, Manila Jeshnani, Sagar Kukreja, Priyanka Ailani
Abstract | PDFPDF
14. Big Data Performance and Comparison with Different DB Systems
Pages :59-63
Matteo D’Aloia, Ruggero Russo, Gianpaolo Cice, Angela Montingelli, Gaetano Frulli, Egidio Frulli,
Francesca Mancini, Maria Rizzi, Annalisa Longo
Abstract | PDFPDF
15. A Genetic approach to Segment a Remote Sensing Image by Removing Haze Distortion
Pages :64-67
Eshita
Abstract | PDFPDF
16. Functional Dependency Based Data Distribution by Using Association Patterns
Pages :68-72
Nisha
Abstract | PDFPDF
17. Ant Colony Optimization Based Hyper Pipes Classifier for IDS
Pages :73-80
Kumari Babita and Piyush Singh
Abstract | PDFPDF
18. Power of Nonverbal Communication in Project Management
Pages :81-88
Priyadarshi Saha
Abstract | PDFPDF
19. Similarity Measures of Web Repositories constructed by Focused Crawling from Database Driven Websites
Pages :89-93
J.Tamilselvan, Dr. A.Senthilrajan
Abstract | PDFPDF
20. Secured Data Exchange Mechanism used in Military Networks Using Minimal Keys in Sensor Networks
Pages :94-99
Thandava Sumanth, B.Madhusudhana Rao
Abstract | PDFPDF
21. A Review of Different Content Based Image Retrieval Techniques
Pages :100-104
Shristi Jain, Dr. Asmita A. Moghe
Abstract | PDFPDF
22. Review Techniques of Knowledge mining
Pages :105-108
Reema Thareja,Charu Sharma,Ridhi Gupta,Prerna Goel,Kriti singhal
Abstract | PDFPDF
23. Image Super Resolution Using Sparse Neighbour Embedding and clustering algorithm
Pages :109-111
Dr. Dharmanna L, Deekshith K
Abstract | PDFPDF
24. Mobile Opportunistic Network
Pages :112-115
Merlin John, Beyona Jose, Linta Abraham, Shintamol Thomas, Josmy George
Abstract | PDFPDF
25. Robotic Algorithm Development
Pages :116-119
Palash Shrawak, Tanzeem Kagzi , Ayush Pratap Singh, Brijesh Dobariya, Prof. Pranali Lokhande, Prof. B.R. Alhat
Abstract | PDFPDF
26. Identify Fake and Real User Face by using Client Information for Face Antispoofing
Pages :120-124
Poonam Nemade, Rekha jadhav
Abstract | PDFPDF
27. A Model Checker for Epistemic Hybrid Automata Using Constraints Logic Programming
Pages :125-131
Ammar Mohamed, Rana Mohamed, Hesham Hefny
Abstract | PDFPDF
28. A Critical Review of Fault Tolerance: Security Perspective
Pages :132-135
Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan
Abstract | PDFPDF
29. A Review: Cryptographically Efficient, Dynamically Strong, Securely proven Optimal and hybrid Hierarchal Access Control System
Pages :136-140
Smita Parte, Dr. Durgesh Kumar Mishra
Abstract | PDFPDF
30. Improved Pass-BYOP Based Graphical Authentication System Using Video Splitting Method
Pages :141-145
Garima Mathur, Gagan Vishwakarma
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-