• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 6 ISSUE 2 March - April 2015

    ISSN 0975 - 9646

    1. A Model for Detection of Application Layer Denial of Service Attacks using Group Testing Theory
    Pages : 931-935
    Shazia Shafi, Sanjay Jamwal
    Abstract | PDFPDF
    2. HPIS: A Scalable Routing Protocol for WMN
    Pages :936-940
    Tapodhir Acharjee, Azhar Hussain Mozumder, Sudipta Roy
    Abstract | PDFPDF
    3. Attack Graph-Based Security Metrics and other Metrices for Producing Security to the Computer
    Network

    Pages : 941-943
    Patil Priyanka Nagnath, Prakash B. Dhainje, Deshmukh Pradeep K.
    Abstract | PDFPDF
    4. Secure Key Establishment for Bundle Security Protocol of Space DTNs in Noninteractive manner
    Pages : 944-946
    Chaitali S.Jadhav, Prakash B. Dhainje, Deshmukh Pradeep K.
    Abstract | PDFPDF
    5. A Survey on Congestion Problem of MANET
    Pages : 947-951
    Ritu Jain, Bhawana Pillai
    Abstract | PDFPDF
    6. Automatic License Plate Based Smart Vehicle Validation &Security by Gate Control &Email Send
    Pages :952-957
    Rinky Sharma
    Abstract | PDFPDF
    7. An Effective Personalization of User Search Behavior with Semantic Framework Algorithm
    Pages :958-963
    Dr.N.Sivakumar, S.Saranya
    Abstract | PDFPDF
    8. Improved Protein Function Classification Using Support Vector Machine
    Pages : 964-968
    Ravdeep Singh, Rajbir Singh, Dheeraj Pal Kaur
    Abstract | PDFPDF
    9. Providing Security And Privacy To Cloud Data Storage
    Pages : 969-971
    Yogesh V. Bhapkar, Rakesh S. Gaikwad, Milind R. Hegade
    Abstract | PDFPDF
    10. A Survey on Different Methods of Channel Estimation in a 3G Private Mobile Network Using a Six Port Receiver
    Pages : 972-974
    Zeba Khan Rafi, E. Annadevi
    Abstract | PDFPDF
    11. Auto-Replication: Automated replication for Failover Clusters
    Pages : 975-978
    Swapnil Mirjolkar, Ankur Mourya,Vinay Karajagi, Dashrath Mane
    Abstract | PDFPDF
    12. Comparative Analysis of Programming Methodologies of Java, C and Assembly Language Programming
    Pages : 979-989
    Khandare Nikhil B
    Abstract | PDFPDF
    13. Optimum Patch Selection Using GA in Exemplar Based Image In-painting
    Pages :990-997
    Seema Kumari Singh , Prof J.V Shinde
    Abstract | PDFPDF
    14. Energy Efficient Self Adaptive on Demand Geographical Routing Protocols in MANET
    Pages : 998-1001
    Prachi Nikate, Prashant. Kumbharkar
    Abstract | PDFPDF
    15. A Correlative Study about Different Social Networking Sites
    Pages : 1002-1006
    Raveendra Singh, Shashank Gupta
    Abstract | PDFPDF
    16. A Survey on Searching Techniques over Encrypted Data
    Pages : 1007-1010
    Archana D. Narudkar, Aparna A. Junnarkar
    Abstract | PDFPDF
    17. Article Removed
    Pages : xxx-xxx
    xxx, xxx
    Abstract | PDFPDF
    18. Sink Mobility for Data Collection in Wireless Sensor Network Life Cycle
    Pages : 1015-1018
    Dhivya.M,Divya.K,Keerthi.R, Kukatlapalli Pradeep Kumar
    Abstract | PDFPDF
    19. A Review on Wireless Nanosensor Networks Based on Electromagnetic Communication
    Pages : 1019-1022
    Vishranti Rupani, Sunera Kargathara, Jigisha Sureja
    Abstract | PDFPDF
    20. Energy Efficient Dynamic Threshold Based Load Balancing Technique in Cloud Computing Environment
    Pages : 1023-1026
    Shivani Gupta, Damodar Tiwari, Shailendra Singh
    Abstract | PDFPDF
    21. LSB Steganography Using Android Phone
    Pages : 1027-1029
    Rajashri Ghare, Pruthvi Bansode, Sagar Bombale, Bilkis Chandargi
    Abstract | PDFPDF
    22. Region Based Algorithm Selection for Network Security
    Pages : 1030-1032
    V.Asaithambi, Dr.N.Rama
    Abstract | PDFPDF
    23. Cluster Head Selection Prediction in Wireless Sensor Networks
    Pages : 1033-1035
    Raveendra Singh, Shashank Gupta
    Abstract | PDFPDF
    24. License Plate Recognition for High Security Registration Plates: A Review
    Pages : 1036-1039
    Siddhartha Choubey, Anshuman Rai
    Abstract | PDFPDF
    25. Analysis and Detection of Heart Related Issues: A Proposed Algorithm
    Pages : 1040-1043
    Kumari Nirmala, R.M.Singh
    Abstract | PDFPDF
    26. Security Model to Detect and Avoid Wormhole Attack Using AODV Protocol
    Pages : 1044-1049
    Gulzar Ahmad Wani, Dr. Sanjay Jamwal
    Abstract | PDFPDF
    27. Review Paper on Using Procedural Content Generation & Difficulty Curves
    Pages : 1050-1052
    Paritosh Desai, Ninad Kulkarni, Suraj Jaiswal, Sachin Chauthe, Prof. Yogini Bazaz
    Abstract | PDFPDF
    28. Artery: A Data-Centric Architecture for Wireless Sensor Networks
    Pages : 1053-1058
    Javad mozafari, Abbas Mirzaei Somarin, Amin Mohajer
    Abstract | PDFPDF
    29. Model To Prevent Websites From XSS Vulnerabilities
    Pages : 1059-1067
    Tejinder Singh Mehta , Sanjay Jamwal
    Abstract | PDFPDF
    30. A Survey on Signature Verification Approaches
    Pages : 1068-1072
    Shailaja Dilip Pawar
    Abstract | PDFPDF
    31. Self Improvement of Cloud Operation Using Dynarep Algorithm and Skewness Algorithm
    Pages : 1073-1075
    M. Senthamarai, J. Sakunthala
    Abstract | PDFPDF
    32. A Survey on Visual Cryptography Techniques and their Applications
    Pages : 1076-1079
    Bhawna Shrivas, Shweta Yadav
    Abstract | PDFPDF
    33. Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing
    Pages : 1080-1083
    Jissy Ann George, Dr.M.Hemalatha
    Abstract | PDFPDF
    34. A Survey on Analysis of Data centre Performance and QOS in IaaS Cloud
    Pages : 1084-1087
    Karthik.M, Sharavana K
    Abstract | PDFPDF
    35. A Review on Video Streaming in Education
    Pages : 1088-1091
    Supriya Bhosale, Prof. Vinayak Pottigar, Prof. Vijaysinh Chavan
    Abstract | PDFPDF
    36. Preserving Public Auditing and Privacy Policy for Shared Data in the Cloud
    Pages : 1092-1095
    Krishna Kumar L, Deepa P Sivan
    Abstract | PDFPDF
    37. Denial of Service Attack and Classification Techniques for Attack Detection
    Pages : 1096-1099
    Prajakta Solankar, Prof. Subhash Pingale, Prof. Ranjeetsingh Parihar
    Abstract | PDFPDF
    38. Log Aggregator for Better Root-Cause-Analysis
    Pages : 1100-1102
    Anamika, Gayatri Bisht, Kanhaiya and Poonam
    Abstract | PDFPDF
    39. Performance Analysis of Classification Algorithms Using Healthcare Dataset
    Pages : 1103-1106
    D. Rajeswara rao, Vidyullata Pellakuri, SathishTallam, T. Ramya Harika
    Abstract | PDFPDF
    40. Comparative Evaluation of Thresholding and Segmentation Algorithms
    Pages : 1107-1110
    Aaron Gonsalves, Rhea Machado, Gerffi Michael, Omprakash Yadav
    Abstract | PDFPDF
    41. Interpretation of Hand Gestures Using Neural Networks:A Review
    Pages : 1111-1114
    Priyanka Parvathy Dali, Dr. Hema C.R
    Abstract | PDFPDF
    42. Image Inpainting using Super Resolution : A Review
    Pages : 1115-1117
    Kanchan T. Narwade, Dr.S.A.Ladhake
    Abstract | PDFPDF
    43. B2B Order Management System
    Pages : 1118-1122
    Monisha Shetty, Waqaar Juned Shareef, Kanika Shetty, Savita Lohiya
    Abstract | PDFPDF
    44. Analysing Excellence Measure, Recital of Real World Web Services
    Pages : 1123-1126
    D.Venkatesh, C.Sivaraman
    Abstract | PDFPDF
    45. Uncertainty of Rendezvous and Unsurpassed Random Walk
    Pages : 1127-1129
    Monisha.S., Mrs.K.Ulagapriya
    Abstract | PDFPDF
    46. Kinect Gaming And Physiotherapy
    Pages : 1130-1133
    Sachin.V.Singh , Akshay.S.Sonawane , Prajakta Kshirsagar , Yogesh Mahajan
    Abstract | PDFPDF
    47. A Real – Time Research Platform for Extraocular Image Processing of Epiretinal Prosthesis
    Pages : 1134-1140
    Sharmili N, Seetha Ramaiah P
    Abstract | PDFPDF
    48. Improving Customer Satisfaction through Smart Shopping: A Prototype
    Pages : 1141-1152
    Dan Michael A. Cortez, Charito M. Molina, Khatalyn E. Mata, Jayson Raymund D. Bermudez
    Abstract | PDFPDF
    49. Air Drum Using Kinect and Arduino
    Pages : 1153-1155
    G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
    Abstract | PDFPDF
    50. Security Issues and Trends in Cloud Computing
    Pages : 1156-1159
    G.S.Raghavendra, D.R.N.S.Lakshmi, S.Venkateswarlu
    Abstract | PDFPDF
    51. Load Balancing in Parallel Network File System using Adaptive Load Data Migration
    Pages : 1160-1163
    Ratan Deokar, Sagar Hagwane, Shreenath Iyer, Vivek Labhade, Mayur Koli
    Abstract | PDFPDF
    52. A Rapid Grouping Based Empirical Subset Selection Algorithm for High Dimensional Data
    Pages :1164-1166
    B.Praveenkumar, M.V.Jagannatha Reddy
    Abstract | PDFPDF
    53. Watermarked LTVC Scheme
    Pages :1167-1170
    Aswathy. S
    Abstract | PDFPDF
    54. Reinfection and Self-Start Analysis on the Propagation Dynamics of Modern Email Malware
    Pages : 1171-1174
    Preetha. S.M
    Abstract | PDFPDF
    55. Computation Load Sharing of Personalized Mobile Search Engine
    Pages : 1175-1177
    Ujvala Patil, N.Y.Suryawanshi
    Abstract | PDFPDF
    56. A User centric cost efficient resource management model for cloud computing
    Pages : 1178-1180
    Harleen Kaur, Vandana Pushe
    Abstract | PDFPDF
    57. Auditing Framework Service for Efficient Secure Data Storage in Multi- cloud
    Pages : 1181-1183
    M. Ravi kumar, E . Madhusudhana Reddy
    Abstract | PDFPDF
    58. Multifunction Web Log Analyzer: A Survey
    Pages : 1184-1187
    Lalit Agrawal, Prof. Anil Patidar
    Abstract | PDFPDF
    59. Reconstructing Minutiae and Orientation Fields Using Enhanced Feedback Paradigm
    Pages : 1188-1191
    Lekshmi S P, Lizmol Stephen
    Abstract | PDFPDF
    60. Advanced Security using VCS and Watermarking
    Pages : 1192-1195
    Minal Nerkar, Priya Talreja, Komal Pawar , Radha Gosavi, Devika Dhadphale
    Abstract | PDFPDF
    61. Securing Server/Client side Applications against XSS attack via XSS-Obliterator
    Pages : 1196-1203
    Amit Singh, Suraj Singh Tomer
    Abstract | PDFPDF
    62. A Model to Restrict Online Password Guessing Attacks
    Pages : 1204-1208
    Aqib Malik , Dr. Sanjay Jamwal
    Abstract | PDFPDF
    63. A Review on Web Image Retrieval Techniques
    Pages : 1209-1212
    Rasika V. Khandre, Dr. Neeta A. Deshpande
    Abstract | PDFPDF
    64. Using Ranking – Based Techniques Improvement of Aggregate Recommendation Diversity and
    Accuracy

    Pages : 1213-1216
    Dipika Anil Hole, Ashvini Sitaram Bangar, Priyanka Hanumant Rokade
    Abstract | PDFPDF
    65. Automated Detection and Classification of Glaucoma from Eye Fundus Images: A Survey
    Pages : 1217-1224
    Syed Akhter Hussain, Dr. Holambe A. N
    Abstract | PDFPDF
    66. A Review on Incomplete Data And Clustering
    Pages : 1225-1227
    Vaishali H. Umathe, Gauri Chaudhary
    Abstract | PDFPDF
    67. Computational Auditory Scene Analysis for Acoustic Event Detection: An Improved Approach
    Pages : 1228-1231
    Jincy Joseph.P, Shamla Beevi.A
    Abstract | PDFPDF
    68. Authentication with Colours and Session Password
    Pages : 1232-1233
    Priya More , Ankita Singh , Prakash Singh
    Abstract | PDFPDF
    69. Dynamic Message Authentication Code for Short Messages
    Pages : 1234-1238
    D.Ganesh, A.Jahnavi, M.Trivikram
    Abstract | PDFPDF
    70. Adoption Of Electronic Media Among the Farmers using Data Mining Techniques in Perambalur District Of Tamil Nadu
    Pages : 1239-1241
    J. Nithya jayaseeli, S.Natarajan
    Abstract | PDFPDF
    71. Throughput Maximization in Wireless LAN by Load Balancing Approach
    Pages : 1242-1244
    Manjit Singh
    Abstract | PDFPDF
    72. Data Hiding in Encrypted Images
    Pages : 1245-1247
    Ankita Sawant, Vishakha Darji, Anisha Shetty
    Abstract | PDFPDF
    73. Segmentation of MR images for Tumor extraction by using clustering algorithms
    Pages : 1248-1252
    Shaik Salma Begum, T.Venkata Mohana Rao, P.Nageswara Rao, G.Srikanth
    Abstract | PDFPDF
    74. Understanding Architecture and Framework of J2EE using Web Application
    Pages : 1253-1257
    Devadrita Dey Sarkar ,Anavi jaiswal , Ankur Saxena
    Abstract | PDFPDF
    75. Hand & Upper Body Based Hybrid Gesture Recognition
    Pages : 1258-1262
    Prerna Sharma, Naman Sharma
    Abstract | PDFPDF
    76. A Survey on Machine Learning Techniques to Extract Chemical Names from Text Documents
    Pages : 1263-1266
    Snehal P. Umare, Dr. Neeta A. Deshpande
    Abstract | PDFPDF
    77. Enhancing Security and Privacy in Multi Cloud Computing Environment
    Pages : 1267-1270
    V. Vankireddy, N. Sudheer, R. Lakshmi Tulasi
    Abstract | PDFPDF
    78. A Survey on Modular Approach to Share Secure and Efficient Video Streaming over Cloud
    Pages : 1271-1274
    Radha A. Mundhada, Sapna S.Khapre
    Abstract | PDFPDF
    79. Distributed Approach for Replication of Scalable Service Deployment in Autonomic Network
    Environment

    Pages :1275-1281
    Raji Rajasekharan
    Abstract | PDFPDF
    80. Energy Efficient Approach on Cut Detection in Wireless Sensor Networks
    Pages : 1282-1286
    Poojarini Mitra, Sinthia Roy, Sayani Chandra, Ipsita Saha, Bidyutmala Saha
    Abstract | PDFPDF
    81. An Optimization Based Approach for Image Embedding in QR Codes: A Review
    Pages : 1287-1289
    Pranjali A. Shrirao , Prof. V.T. Gaikwad , Prof. H.N. Datir
    Abstract | PDFPDF
    82. An Efficient Method for Predicting Heart Disease Problem Using Fitness Value
    Pages : 1290-1293
    Prachi Paliwal , Mahesh Malviya
    Abstract | PDFPDF
    83. A Cluster-Based Filtering Algorithm for Mashup Service
    Pages : 1294-1295
    Sathish.S, Nulyn Punitha J
    Abstract | PDFPDF
    84. Automatic Template Extraction from Heterogeneous Web Pages
    Pages : 1296-1299
    Rashmi D Thakare , Mrs. Manisha R Patil
    Abstract | PDFPDF
    85. Face Annotation and Similar Image Retrieval using PCA and MLP
    Pages : 1300-1302
    Anusree B S, Resmy V R
    Abstract | PDFPDF
    86. JPEG Anti-Forensics with Undetectability and Image Quality
    Pages : 1303-1306
    Ruma V S, Neena Raj N R
    Abstract | PDFPDF
    87. An Automated Health Care Computing Model for Continuous Monitoring of Patients for Immediate
    Medical Care during Emergency

    Pages : 1307-1311
    P. Samuel Kirubakaran, Dr.S.Uma, Donbyntalang Dewkhaid, Selva Kumar P
    Abstract | PDFPDF
    88. Performance and Evaluation of Classification Data Mining Techniques in Diabetes
    Pages : 1312-1319
    Dr. D. Ashok Kumar and R. Govindasamy
    Abstract | PDFPDF
    89. An Efficient Mining of Sequential Rules Using Vertical Data Format
    Pages : 1320-1323
    Surbhi Jigneshkumar Sheth, Shailendra K Mishra
    Abstract | PDFPDF
    90. Simultaneous Secure Transmission for Textual Data Using Radomized Bits
    Pages : 1324-1327
    Remya R Nair
    Abstract | PDFPDF
    91. An Efficient Fully Dynamic Algorithm to Optimize the Task Scheduling Activities in Cloud Systems
    Pages : 1328-1332
    Sarwat Jahan, Safdar Tanweer, Masoorul Haque
    Abstract | PDFPDF
    92. Modelling Cloud Services for Big Data using Hadoop
    Pages : 1333-1335
    Trapti Sharma
    Abstract | PDFPDF
    93. A Lexicon for Hadith Science Based on a Corpus
    Pages : 1336-1340
    Moath Najeeb, Abdelkarim Abdelkader, Musab Al-Zghoul , Abdelrahman Osman
    Abstract | PDFPDF
    94. Web Based Coaching Institute Management System
    Pages : 1341-1344
    Mayuri Kamble, Vidya Bhuvad, Omkar Keluskar, Vinayak Malavade
    Abstract | PDFPDF
    95. Dynamic Profile Activation for Enhancing Security in Android Devices
    Pages : 1345-1349
    Venkata Sai Abhishek Gogu, Venkata Sai Teja and Jahnavi Agepati
    Abstract | PDFPDF
    96. Empowering Service Claims Fraudulent Using Big Data Analytics
    Pages : 1350-1353
    U. Kartheek Chandra Patnaik, Ch. Navyatha, B.V.Maliney, B.Mounica, J. Neelima
    Abstract | PDFPDF
    97. E-Mail Filtering in Android
    Pages : 1354-1355
    Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
    Abstract | PDFPDF
    98. Minimizing Cost for big data processing using Online Database
    Pages : 1356-1359
    Shruthy Y, Sreenimol K. R
    Abstract | PDFPDF
    99. Smart Traffic Signal
    Pages : 1360-1363
    Monish Puthran, Sangeet Puthur, Radhika Dharulkar
    Abstract | PDFPDF
    100. NFC Based Healthcare System
    Pages : 1364-1366
    Ketan Bhadoriya, Rajshekhar Humbe, Yogesh Kodgire, S.G.Phule
    Abstract | PDFPDF
    101. Predicting the impact of different Variables on Students Academic Performance using Artificial
    Intelligence

    Pages : 1367-1370
    Pratiksha R.Shetgaonkar
    Abstract | PDFPDF
    102. Cross Tier Framework for Rapid Web Application Development
    Pages : 1371-1374
    Avinash D’Silva, Majesly Correia, Pruthvish Vyas
    Abstract | PDFPDF
    103. False Node Detection in Trust Aware Routing Framework (TARF) in WSN
    Pages : 1375-1378
    Bhagyashree N V, Bhat Geetalaxmi Jairam
    Abstract | PDFPDF
    104. Fraud Detection in Credit Card Transactions: Classification, Risks and Prevention Techniques
    Pages : 1379-1386
    N.Sivakumar, Dr.R.Balasubramanian
    Abstract | PDFPDF
    105. Target Planning System
    Pages : 1387-1389
    Dhara K.N, B.K Raghavendra, Santosh Kumar J, VNBM Krishna
    Abstract | PDFPDF
    106. A Survey on Unicast Routing Protocols for VANET
    Pages : 1390-1392
    Imtisunep T Longchar, Rwngouti Chamframary, Dip Jyoti Deka, T Sivakumar
    Abstract | PDFPDF
    107. Vehicle Information System
    Pages : 1393-1395
    Sanjeev Shelar, Wasim Sheikh , Pratik Shinde
    Abstract | PDFPDF
    108. Performance Evaluation of WiMAX 802.16e OFDM PHY LAYER
    Pages : 1396-1400
    Ashish Kishore
    Abstract | PDFPDF
    109. Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud
    Pages : 1401-1407
    Palak Purohit, Awani Joshi, Richa Jain
    Abstract | PDFPDF
    110. A Simplified Rule Based Distributed Information Flow Control for Cloud Computing
    Pages : 1408-1414
    Awani Joshi, Palak Purohit, Richa Jain
    Abstract | PDFPDF
    111. Enhancing Security of Traffic Redundancy and Elimination Approach in Cloud Data Storage using
    3DES

    Pages : 1415-1419
    Anisha Sarah Mathew, Mitha Rachel Jose
    Abstract | PDFPDF
    112. Session Authentication using Color Scheme
    Pages : 1420-1423
    Shefali Amlani, Shweta Jaiswal, Suchitra Patil
    Abstract | PDFPDF
    113. FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its
    application in market basket analysis

    Pages : 1424-1428
    Suvarna Bhoir, Sushil Shrestha, Sudarshan Mali, Vijay Bhammu
    Abstract | PDFPDF
    114. Fastest Pedestrian Detector
    Pages : 1429-1432
    Tinto Raj R V
    Abstract | PDFPDF
    115. Collaborative Web Service QoS Prediction with Multi-Criteria Decision Making Using CB-NIMF
    Pages : 1433-1438
    M.Thirumaran, A.V.Arimathi
    Abstract | PDFPDF
    116. Semantic Reasoner Based Change Management Framework for Ev: LCS
    Pages : 1439-1450
    M.Thirumaran, G.Gayathry@Brendha , Subham Soni
    Abstract | PDFPDF
    117. Hadoop Based Analytics on Next Generation Medicare System
    Pages : 1451-1453
    Gopal A. Tathe, Pratik S. Patil, Sangram C. Parle,Vishal S. Pathare,Prof. Sudarshan S. Deshmukh
    Abstract | PDFPDF
    118. Counter Measures against Malicious Program in Universal Serial Bus
    Pages : 1454-1456
    Selvi Grija, Kovartthan, Selva Kumar, Thamilzselvan
    Abstract | PDFPDF
    119. CHOKe: A Stateless Queue for Securing Flows
    Pages : 1457-1459
    Saniya Elza Dominic, Gayathri .R Krishna
    Abstract | PDFPDF
    120. A Novel Ontology Processing System Using Information Filter and Knowledge Repository for
    Semantic Web

    Pages :1460-1464
    Sudha J Vishwakarma
    Abstract | PDFPDF
    121. Survey on Online Recommendation Using Web Usage Mining
    Pages : 1465-1467
    Neeraj Iyer, Alex Dcunha, Akshay Desai, Kavita Jain
    Abstract | PDFPDF
    122. Parking Navigation System Based on RFID and IR Sensor
    Pages : 1468-1472
    Prof.Gayatri Bhandari, Mrinal Bari, Shweta Borse, Ashwini Gaikwad, Reshma Kadam
    Abstract | PDFPDF
    123. Vehicle Tracking Using Number Plate Recognition System
    Pages : 1473-1476
    D.Madhu Babu, K.Manvitha, M.S.Narendra, A.Swathi, K.Praveen Varma
    Abstract | PDFPDF
    124. A Rule Based Verification with Strongly Typed Field based SQL Injection and XSS Attack
    Detection

    Pages : 1477-1482
    Ajay Singh Dikhit, Prof.khushboo Karodia
    Abstract | PDFPDF
    125. An E-Commerce Website based Chatbot
    Pages : 1483-1485
    Siddharth Gupta, Deep Borkar, Chevelyn De Mello, Saurabh Patil
    Abstract | PDFPDF
    126. Fusion of Local and Global Iris Features to Construct Feature Vector Using Genetic Algorithm
    Pages : 1486-1489
    S.Pon Sangeetha
    Abstract | PDFPDF
    127. Mining Social Network Data for Cyber Physical System
    Pages : 1490-1492
    Manjushree Gokhale, Bhushan Barde, Ajinkya Bhuse, Sonali Kaklij
    Abstract | PDFPDF
    128. Route Prediction in Wireless Sensor Networks using Markov Model
    Pages : 1493-1496
    Nisha Pachori, Vivek Suryawanshi
    Abstract | PDFPDF
    129. Dynamic Signature Recognition and Verification Using Pixel Based Approach
    Pages : 1497-1499
    Rinku N. Patel, Suman P. Chauhan, Khushbu C. Panwala, Hardi D. Prajapati
    Abstract | PDFPDF
    130. Improving Trust Management for Effective Collaborative Intrusion Detection Network
    Pages : 1500-1504
    P.Ayesha Barvin, G.Bakkiyaraj
    Abstract | PDFPDF
    131. MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation
    Pages : 1505-1508
    Chinnu A
    Abstract | PDFPDF
    132. A Survey on the Role of Cloud Computing in Social Networking Sites
    Pages : 1509-1512
    Tadepalli Sarada Kiranmayee
    Abstract | PDFPDF
    133. ANN Based Head Movement Detection with Eye Tracking
    Pages : 1513-1517
    NIMI M R, RENJI S
    Abstract | PDFPDF
    134. Fuzzy based clustering of High Dimensional Datasets
    Pages : 1518-1520
    M.Pavani, M.Pravallika, M. SaiChandan, M.Lokesh, A. Snehitha
    Abstract | PDFPDF
    135. Image Registration using Discrete Wavelet Transform and Particle Swarm Optimization
    Pages : 1521-1525
    Jitendra Pramanik, Sunita Dalai, Debaraj Rana
    Abstract | PDFPDF
    136. An Automated Framework for Shortest Path Computation
    Pages : 1526-1534
    R.Kamatchi, Dr.S.Lakshmi
    Abstract | PDFPDF
    137. A Survey on Big Data, Data Mining and Overlay Based Parallel Data Mining
    Pages : 1535-1538
    Pushpanjali, Jyothi S Nayak
    Abstract | PDFPDF
    138. Review of Efficient Techniques for Reducing Web Page Complexity
    Pages : 1539-1540
    Chaitali Domde, Hemlata Dakhore
    Abstract | PDFPDF
    139. Improving Scalability Of Storage System:Object Storage Using Open Stack Swift
    Pages : 1541-1546
    G.Kathirvel Karthika, R.C.Malathy, M.Keerthana
    Abstract | PDFPDF
    140. Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm
    Pages : 1547-1551
    Preeti Kushwah, Dr. Abhay Kothari
    Abstract | PDFPDF
    141. Mitigating Flood Attack Using AODV in Disruption Tolerant Network
    Pages : 1552-1555
    Jananii.M, Vasanthi.S
    Abstract | PDFPDF
    142. Enhancing the Query Processing in Unstructured Peer To Peer Network
    Pages : 1556-1559
    Rajashree Dongare, Prof.Rachana Satao
    Abstract | PDFPDF
    143. A Novel Method for Making a Photo-book Using Cloud
    Pages : 1560-1564
    Aishwarya Habib, Praveen Mulgund, Abdul Kareem Sirasgi, Priyadarshini Kalwad
    Abstract | PDFPDF
    144. Software Metrics Evaluation: An Open Source Case Study
    Pages : 1565-1568
    Sandeep Kaur, Navjot Kaur
    Abstract | PDFPDF
    145. Hybrid CPU Scheduling Algorithm
    Pages : 1569-1572
    Anil Kumar Gupta
    Abstract | PDFPDF
    146. Comparative Analysis of Recall-based (Drawmetric) and Click-based (Locimetric) Graphical Password Authentication Schemes
    Pages : 1573-1577
    1Km Ritu, #2Rajiv Ranjan Singh, #3Bharti Kumar
    Abstract | PDFPDF
    147. Survey on Types of Bug Reports and General Classification Techniques in Data Mining
    Pages : 1578-1583
    Smita Mishra, Somesh Kumar
    Abstract | PDFPDF
    148. A Comparative Study on Semantic Web Service Discovery Approaches
    Pages : 1584-1587
    Mourougaradjane Puthupattan, Dinadayalan Perumal
    Abstract | PDFPDF
    149. Privacy Preserving Issues and their Solutions in Cloud Computing: A Survey
    Pages : 1588-1592
    Pooja HP, Nagarathna N
    Abstract | PDFPDF
    150. An Hybrid Anti-Phishing Approach Using MAC Verifier, Pattern Similarity Index (PSI) and SLIQ Decision System
    Pages : 1593-1597
    Anil Kumar Goutam, Tejalal Choudhary
    Abstract | PDFPDF
    151. Android App Based Robot
    Pages : 1598-1600
    Aiman Ansari, Yakub Ansari, Saquib Gadkari, Aarti Gokul
    Abstract | PDFPDF
    152. Minimizing Search Latency using Portable Existence Services
    Pages : 1601-1605
    Rage.Parasuramudu, M.Veeresh babu
    Abstract | PDFPDF
    153. A New Approach to Event Dissemination in Distributed Systems
    Pages : 1606-1609
    Anson Antony Fertal, P. Priya Ponnusamy
    Abstract | PDFPDF
    154. Mitigating Man in the Middle attack Using Vi-Fickle Algorithm
    Pages : 1610-1612
    Vishnuganth.M, Mohanraj.S, Stanly Jayaprakash.J
    Abstract | PDFPDF
    155. Text Clustering for Information Retrieval System Using Supplementary Information
    Pages : 1613-1615
    Chitra Kalyanasundaram, Snehal Ahire, Gaurav Jain, Swapnil Jain
    Abstract | PDFPDF
    156. Radius Bone Fracture Detection Using Morphological Gradient Based Image Segmentation Technique
    Pages : 1616-1619
    Swathika.B, Anandhanarayanan.K, Baskaran.B and Govindaraj.R
    Abstract | PDFPDF
    157. Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD
    Pages : 1620-1624
    Aswathy K.Nair, Flower Abraham Mundackal
    Abstract | PDFPDF
    158. A Secure tunnel technique using IPv6 Transition over IPv4 Channel
    Pages : 1625-1628
    Kamna Chauhan, Pooja Jain
    Abstract | PDFPDF
    159. Transpiler and it’s Advantages
    Pages :1629-1631
    Rohit Kulkarni, Aditi Chavan, Abhinav Hardikar
    Abstract | PDFPDF
    160. Dual Stenography Approach For Secure Data Communication
    Pages : 1632-1635
    Kirti Shukla, Priyanka Vijaywargiya
    Abstract | PDFPDF
    161. Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images
    Pages : 1636-1642
    Omprakash Rajankar, Dr. Uttam Kolekar
    Abstract | PDFPDF
    162. Identification of Age And Gender Using HMM
    Pages : 1643-1647
    Bhavana R. Jawale, Swati patil, Mayur Agrawal
    Abstract | PDFPDF
    163. A Survey of Machine Learning Based Approaches for Parkinson Disease Prediction
    Pages : 1648-1655
    Shubham Bind, Arvind Kumar Tiwari, Anil Kumar Sahani
    Abstract | PDFPDF
    164. Non-Saperable Reversible Data Hiding in Encrypted Image Using Chaoutic Map
    Pages : 1656-1659
    Nilesh Solanki, Mahesh Parmar, Dr. Vineet Richhariya
    Abstract | PDFPDF
    165. Advanced Probabilistic Binary Decision Tree Using SVM for large class problem
    Pages : 1660-1664
    Anita Meshram, Roopam Gupta and Sanjeev Sharma
    Abstract | PDFPDF
    166. Semi Supervised Collaborative Image Retrieval Using Binary Classifier
    Pages : 1665-1668
    Gaurav Kulkarni, Mahesh Kulkarni, Prashant Kausal , Suraj Kedar
    Abstract | PDFPDF
    167. Reliable Cloud Using elliptical Curve Deffie Hellman and Elliptical Curve Digital Signature
    Pages : 1669-1671
    Akash Shrivastava, Nitya M Nerli
    Abstract | PDFPDF
    168. Green Data Center Using Spearman’s Ranking Algorithm
    Pages : 1672-1676
    Sonu Choudhary, Dr. Abhay Kothari
    Abstract | PDFPDF
    169. Secure Multimatch Packet Classification Based on SignatureTree
    Pages : 1677-1679
    Pinky M S , Anna Prathibha Shobak
    Abstract | PDFPDF
    170. Web Log Based Analysis of User’s Browsing Behavior
    Pages : 1680-1684
    Ashwini ladekar, Pooja Pawar, Dhanashree Raikar, Prof.Jayashree Chaudhari
    Abstract | PDFPDF
    171. Analysis of Various Clustering Algorithms in Wireless Sensor Network
    Pages : 1685-1691
    Kunkunuru Udaykumar, Tamizharasi Thirugnanam
    Abstract | PDFPDF
    172. Image Based Authentication Using Visual Cryptography and Encryption Algorithm
    Pages : 1692-1696
    Shreya Zarkar, Sayali vaidya, Arifa Tadvi, Tanashree Chavan, Prof. Achal Bharambe
    Abstract | PDFPDF
    173. Recursive Binary Time Partitioning For Low-Power Mobile Discovery and Bandwidth Allocation in
    Cloud-Based Wireless Live-Streaming

    Pages : 1697-1702
    Kaushlya Salunkhe, Gadekar Devendra
    Abstract | PDFPDF
    174. Optimized Resource Management Decision System (ORM-DS) for Distributed Infrastructure
    Management in Cloud Computing

    Pages : 1703-1709
    Nandini Kranti, Anand Singh Rajavat
    Abstract | PDFPDF
    175. Fault Node Discovery and Efficient Route Repairing Algorithm for Wireless Sensor Network
    Pages : 1710-1715
    Vibha Paradkar, Gajendra Singh Chandel, Kailash Patidar
    Abstract | PDFPDF
    176. ORSMF: Optimistic Replacement Based Switching Median Filter for Highly Corrupted Images
    Pages : 1716-1723
    Rupinder Kaur, Dinesh Kumar
    Abstract | PDFPDF
    177. Genetic K-means Algorithm for Credit Card Fraud Detection
    Pages : 1724-1727
    Pooja Chougule, A.D. Thakare, Prajakta Kale, Madhura Gole, Priyanka Nanekar
    Abstract | PDFPDF
    178. Sensitive Broadcasting of Data for Cluster Based WSNs
    Pages : 1728-1730
    Renuga.A, Sakthivel.B
    Abstract | PDFPDF
    179. A Survey on Comparative Study of Routing Protocol in Delay-Tolerant Networks
    Pages : 1731-1736
    Vikash, R.K.Singh
    Abstract | PDFPDF
    180. A Proposed Hybrid Spatial Indexing: QX Tree
    Pages : 1737-1739
    Jayanaranjan Dash, Dipa Patra, Chittaranjan Pradhan
    Abstract | PDFPDF
    181. Enhanced Video Retrieval and Classification of Video Database Using Multiple Frames Based on
    Texture Information

    Pages : 1740-1745
    Mohd. Aasif Ansari, Dr. Hemlata Vasishtha
    Abstract | PDFPDF
    182. Minimizing Communication Overhead of Server in Client Server Communication
    Pages : 1746-1749
    Rucha R. Goundadkar, Roshani K. Nakhate, Sonali K. Koratkar, Prof. R. H. Kulkarni
    Abstract | PDFPDF
    183. GIntrusion Detection Using Data Mining Technique (Classification)
    Pages : 1750-1754
    Dr.D.Aruna Kumari, N.Tejeswani, G.Sravani, R.Phani Krishna
    Abstract | PDFPDF
    184. Shadow Detection and Removal from Images-A Review
    Pages : 1755-1757
    Harpreet Kaur, Navdeep Kaur
    Abstract | PDFPDF
    185. A Context-Aware Search System for Smart Phones Based on Context-Aware Infrastructure
    Pages : 1758-1760
    Gayatri Dange, Rajan Jamgekar, Swapnaja Ubale
    Abstract | PDFPDF
    186. Privacy –Enhanced Web Personalization
    Pages : 1761-1764
    Rupali Keshavrao Aher, Akshay Rajdhar Adik
    Abstract | PDFPDF
    187. Performance Analysis of DYMO FSR & GSR Using Wormhole attack under VANET’s
    Pages : 1765-1768
    Gurminder Kaur, Manju Bala, Manoj Kumar
    Abstract | PDFPDF
    188. Agile Testing
    Pages : 1769-1773
    Sakshi Sachdeva, Purnima Khurana
    Abstract | PDFPDF
    189. A Review on Large-scale Video Classification with Recurrent Neural Network (RNN)
    Pages : 1774-1778
    Bhagyashri P. Lokhande, Sanjay S. Gharde
    Abstract | PDFPDF
    190. Audio Visual Speech Synthesis and Speech Recognition for Hindi Language
    Pages : 1779-1783
    Kaveri Kamble, Ramesh Kagalkar
    Abstract | PDFPDF
    191. Kinship Verification
    Pages : 1784-1786
    Kanchan Pardeshi , Vrushali Pawar, Snehal Sonawane , Kavita Wagh
    Abstract | PDFPDF
    192. ETL Life Cycle
    Pages : 1787-1791
    Purnima Bindal , Purnima Khurana
    Abstract | PDFPDF
    193. Development of improved Aggregated Key Cryptosystem for scalable data sharing
    Pages : 1792-1794
    Rashmi Khawale, Roshani Ade
    Abstract | PDFPDF
    194. Credit Card Fraud Detection System using Hidden Markov Model and Adaptive Communal Detection
    Pages : 1795-1797
    Nabha Kshirsagar, Neha Pandey,Shraddha Kotkar, Suja S. Panicker, Amol Pate
    Abstract | PDFPDF
    195. Embedded Image Capturing & Digital Converting Process using Raspberry pi System interfacing and Comparision of Generation 2 verses Generation 1 models in Raspberry pi
    Pages : 1798-1801
    Anoop Mishra, Arshita Dixit
    Abstract | PDFPDF
    196. AUTHOR IDENTIFICATION in MAIL
    Pages : 1802-1805
    S.A.Aher, D.S.Nikam, J.M.Tadge, Bharti.Avhad, V.D.Mahajan
    Abstract | PDFPDF
    197. Detection of Burr type XII Reliable Software Using SPRT on Interval Domain Data
    Pages : 1806-1811
    Dr. R. Satya Prasad, B. Ramadevi, Dr. G.Sridevi
    Abstract | PDFPDF
    198. An Efficient Reuse of Legacy C-ISAM through Java Native Interface
    Pages : 1812-1813
    Raphael O. Anumba
    Abstract | PDFPDF
    199. Aggregating Correlated Naive Predictions to Detect Network Traffic Intrusion
    Pages : 1814-1818
    G.Vivek, B.Logesshwar, Civashritt.A.B, D.Ashok
    Abstract | PDFPDF
    200. Portfolio Investment Model Using Neuro Fuzzy System
    Pages : 1819-1823
    Keerti. S.Mahajan, Shruti. S. Jamsandekar, Dr. R .V. Kulkarni
    Abstract | PDFPDF
    201. Solving NP hard Problems using Genetic Algorithm
    Pages : 1824-1827
    Gaurang Panchal & Devyani Panchal
    Abstract | PDFPDF
    202. Efficient Attribute Evaluation, Extraction and Selection Techniques for Data Classification
    Pages : 1828-1831
    Gaurang Panchal & Devyani Panchal
    Abstract | PDFPDF
    203. Secure Implementation of Artificial Neural Networks over Cloud
    Pages : 1832-1834
    Pallavi Mhatre , Prachi Pimple , Surabhi Shikarkhane ,Poi Tamrakar
    Abstract | PDFPDF
    204. Survey on Recent Algorithms for Privacy Preserving Data mining
    Pages : 1835-1840
    S.Selva Rathna, Dr. T. Karthikeyan
    Abstract | PDFPDF
    205. Steady State Analysis of a Three Stage Communication Network with DBA and Batch Arrivals
    Pages : 1841-1847
    G. Rajendra Kumar, Kuda Nageswara Rao, K. Srinivasa Rao
    Abstract | PDFPDF
    206. An Incremental Feature Clustering Algorithm for Text Classification
    Pages : 1848-1851
    Johny Thomas, Abishek Nair, Arpit Gupta
    Abstract | PDFPDF
    207. Face Recognition Based Solution For Security Using Web Technology
    Pages : 1852-1854
    V.Srinivasarao
    Abstract | PDFPDF
    208. Profile Management System
    Pages : 1855-1858
    Rajdip kaur Bath, Tyson Fernandes, Akash Jadhav
    Abstract | PDFPDF
    209. Analysis Clustering Techniques in Biological Data with R
    Pages : 1859-1864
    Satish Kumar, Dr.Mohammed Asger
    Abstract | PDFPDF
    210. A Novel Page Links Prediction Technique for Web Search Sources
    Pages : 1865-1868
    Aleem Ansari, Dr. Hemlata Vasishtha
    Abstract | PDFPDF
    211. Automatic Evaluation System for Student Code
    Pages : 1869-1871
    Pratik Saraf, Shankar Ramesh, Sachin Patel, Prof. Sujata Pathak
    Abstract | PDFPDF
    212. Wearable Devices: Google Glass & Smart Watch
    Pages : 1872-1873
    Lakshay Garg, Abhishek Bhardwaj, Meetu Gupta
    Abstract | PDFPDF
    213. Custom ROM’s in Android
    Pages : 1874-1875
    Meetu Gupta, Abhishek Bhardwaj, Lakshay Garg
    Abstract | PDFPDF
    214. Analytical Approach to Predictive Disease Diagnosis using K-nn and Kstar
    Pages : 1876-1879
    Rashmi Madhukar Jadhav, Ms. Roshani Ade
    Abstract | PDFPDF
    215. Secure Key Distribution Over MANET : A Cryptographic Approach
    Pages : 1880-1883
    Vikas Kumar Rana, Rajneesh Gujral
    Abstract | PDFPDF
    216. Perturb and Observe MPPT Algorithm Implementation for PV Applications
    Pages : 1884-1887
    Gangavarapu Mamatha
    Abstract | PDFPDF
    217. Image Retrieval Based on LBP Pyramidal Multiresolution using Reversible Watermarking
    Pages : 1888-1893
    H. Ouahi, K. Afdel,M.Machkour
    Abstract | PDFPDF
    218. Energy Efficient Protocols Used in Wireless Sensor Networks
    Pages : 1894-1896
    PARKAVI. D, Dr. Y.SURESH
    Abstract | PDFPDF
    219. Essential Characteristics for Ubiquitous Projects
    Pages : 1897-1899
    Anil kumar Mishra, Pushpa Yadav, Latika Singh
    Abstract | PDFPDF
    220. Comparative Study of Various Enhancement Techniques for Finger Print Images
    Pages : 1900-1905
    Darshan Charan Nayak
    Abstract | PDFPDF
    221. Handling DDoS attacks in Cloud
    Pages : 1906-1912
    Yesu Jeya Bensh P, Murugan K
    Abstract | PDFPDF
    222. Stabilizing Route and Control Overhead by Using Ad-Hoc Routing Protocol in Vehicular Ad-Hoc
    Network (VANET)

    Pages : 1913-1916
    Bhargavi Dalal and Smita Jangale
    Abstract | PDFPDF
    223. A Mining Algorithm to Generate the Candidate Pattern for Authorship Attribution for Filtering
    Spam Mail

    Pages : 1917-1921
    Khongbantabam Susila Devi, Dr. R. Ravi
    Abstract | PDFPDF
    224. Continuous User Authentication Using Keystroke Dynamics
    Pages : 1922-1925
    M.Pavithra, K.B.Sri Sathya
    Abstract | PDFPDF
    225. A Novel Method for Prediction of Resource Requirements Using Replica Mechanism
    Pages : 1926-1929
    Mohini Rai, Rupali Bhartiya
    Abstract | PDFPDF
    226. Comparison of Different Navigation Prediction Techniques
    Pages : 1930-1939
    Prasad J. Koyande, Kavita P. Shirsat
    Abstract | PDFPDF
    227. Current Image Segmentation Techniques-A Review
    Pages : 1940-1942
    Manraj, Amitpal Singh
    Abstract | PDFPDF
    228. A Competent Situation of Responsive Intrusion Detection System for Secure Portable Devices
    Pages : 1943-1946
    Rekha Dwivedi, Priyanka Vijayvargiya
    Abstract | PDFPDF
    229. Earthquake Damage Assessment of Buildings Using Pre-event and Post-event Imagery
    Pages : 1947-1951
    M.R.Archana Jenis,D.G.Enoch Raja,3. D.V.Viji Nirmala
    Abstract | PDFPDF
    230. Effective Navigation of Query Results Using Apriori Algorithm
    Pages : 1952-1955
    Tagore Kumar Tummapudi, Uma M
    Abstract | PDFPDF
    231. Efficient Processing of Decision Tree Using ID3 & improved C4.5 Algorithm
    Pages : 1956-1961
    Sonal Patil, Mayur Agrawal, Vijaya R. Baviskar
    Abstract | PDFPDF
    232. Active Learning of constraints using incremental approach in semi-supervised clustering
    Pages : 1962-1964
    Jamil Ahmed Sk, Manjunath Prasad, Abdullah Gubbi, Hasibur Rahman
    Abstract | PDFPDF
    233. Wireless Intrusion Detection System
    Pages : 1965-1968
    Keith Chettiar, Akshay Patil, Arpita Pradhan and Sushama Khanvilkar
    Abstract | PDFPDF
    234. Efficient Energy Utilization in Wireless Sensor Networks by installing Relay Stations
    Pages : 1969-1970
    Rama Krishna Reddy Kallam
    Abstract | PDFPDF
    235. Supervised and Unsupervised Document Classification-A survey
    Pages : 1971-1974
    Deepshikha Kalita
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-