Search Your Journal



International Journal of Computer Science and Mobile Computing - IJCSMC

Journal Papers (604) Details Call for Paper Manuscript submission Publication Ethics Contact Authors' Guide Line
1 DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET?, SHARMILA.G?, J.R.THRESPHINE?
2 The autonomous detection and tracking of moving objects - A Survey work?, P Sanyal, S K Bandyopadhyay?
3 Generating SMS (Short Message Service) in the form of Quick Response Code (QR-code), Mohammad Zainuddin, D. Baswaraj, SM Riyazoddin?
4 Reduce Energy Consumption by Improving the LEACH Protocol?, Ali F. Marhoon, Mishall H. Awaad
5 Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability?, Vikas Chaurasia, Saurabh Pal?
6 Adaptive Pixel Pair Matching Technique for Data Embedding?, Nalimela Mounika, T. Madhavi Kumari?
7 DESIGN OF LOW POWER / HIGH SPEED MULTIPLIER USING SPURIOUS POWER SUPPRESSION TECHNIQUE (SPST)?, G. Sasi?
8 Energy Efficient Mobile Relaying in Data Intensive Wireless Sensor Networks?, Satish Chikkala, K. Sathi Reddy?
9 Virtual Machine-Based Resource Management System for Cloud Computing Services, Sri hari Reddy Medapati?, K. Sathi Reddy?
10 A SURVEY OF WIRELESS NETWORK SECURITY, S. Gopalakrishnan?
11 WarningBird MailAlert Based Malicious URLs Blocker System in Twitter?, MS. SARANYA.S, MR. UDHAYA KUMAR.V?
12 Iris Recognition using Wavelet Transformation Techniques?, P.Thirumurugan, G.Mohanbabu
13 ARM MICRO-CONTROLLER BASED MULTI -FUNCTION SOLAR TRACKING SYSTEM?, D.Rajendra Prasad, K.Sudhakar?
14 HIGH ACCURACY DETECTION OF DENIAL OF SERVICE ATTACK BASED ON TRIANGLE MAP GENERATION?, J.WELKIN EYES, S.KARTHIPREM, E.THANGADURAI?
15 Noise Suppression using Weighted Median Filter for Improved Edge Analysis in Ultrasound Kidney Images, K.Ramamoorthy, T.Chelladurai, P.N.Sundararajan, M.Krishnamurthy?
16 An Efficient Methodology for Detecting Spam Using Spot System, MRS. SARANYA.S, MRS. R.BHARATHI?
17 A Study of Electronic Document Security, Mr. Parag S.Deshmukh, Mr. Pratik Pande?
18 Mobile Web Services Invocation System Using SMAP?, Prof. Deepak Kapgate?, Monali Khune?
19 FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic?, T.Sadaiyappan, K.K.Manoj, S.A.Subhasakthe
20 Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm?, Morteza Heydari, Mahdieh Nadi Senejani?
21 The Survey of Techniques for Link Recovery & Admission Control in Wireless Mesh Network?, Kalyani Pendke, Anup Dhamgaye?
22 Application of Unified Network Management in LAN for Load Shedding?, Ravi Prakash?
23 Cued Click Point Technique for Graphical Password Authentication?, Vaibhav Moraskar, Sagar Jaikalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke
24 Data Design and Analysis for Survey System Based on Statistical Functionality?, Wessam Abbas Hamed, Atheer Yousif Oudah, Sarmad Kadhim Dhiab?
25 Survey on Distributed Accountability for Data Sharing in the Cloud?, K.S.Khadke, Prof. Umesh.B.Chavan
26 Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud?, Lokesh.P.Chaudhari, Prof. Umesh.B.Chavan?
27 DESIGN AND IMPLEMENTATION OF MULTIPLE SENSOR INTERFACE USING ETHERNET?, Bandi Praveen Kumar, Dr.R.V.Krishnaiah?
28 Quality of Service Assessment of AOMDV for Random Waypoint and Random Walk Mobility Models?, V B Kute, Dr. M U Kharat?
29 An Optimized Solution to Map Web User Profile Based on Domain Ontology?, Prof. Ratheesh Kumar A.M, Prof. Velusamy A, Prof. Shobana G?
30 EFFICIENT DYNAMIC MULTILEVEL PRIORITY TASK SCHEDULING FOR WIRELESS SENSOR NETWORKS, Mrs. K.Indumathi, Mrs. M. Santhi?
31 Evaluate the Performance of the Router Algorithms in Different Scenarios TCP Newreno and TCP Reno?, Wessam Abbas Hamed?
32 Segmentation of Nuclei in Cytological Images of Breast FNAC Sample: Case Study, Aditya P. Pise, Rushi Longadge, L. G. Malik?
33 A Review of Numerous Facial Recognition Techniques in Image Processing, A.Swaminathan, N.Kumar, M.Ramesh Kumar?
34 Self-optimization and Self-Protection (Transactional Security) in AODV Based Wireless Sensor Network?, Rajani Narayan, Dr. B.P. Mallikarjunaswamy, M.C. Supriya?
35 Surveillance on Bigdata to Mine Pattern?, N. Monica, Dr. K. Ramesh Kumar, T. Nelson Gnanaraj?
36 Improved Human Identification using Finger Vein Images?, Sameer Sharma, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?
37 An Image Fusion Method Using DT-CWT and Average Gradient?, A. M. El Ejaily, F. Eltohamy, M. S. Hamid, G. Ismail?
38 GAIT RECOGNITION OF HUMAN USING SVM AND BPNN CLASSIFIERS?, Arun Joshi, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?
39 Wireless Mesh Networks: The Survey of Andover Continuum Wireless Technology and CyberStation Wireless Control?, K.Sangeetha, P.Revathi, N.Kokhila, C.Theebendra?
40 THE IMAGE STEGANOGRAPHY AND STEGANALYSIS BASED ON PEAK-SHAPED TECHNIQUE FOR MP3 AUDIO AND VIDEO?, P.Manimegalai, K.S.Gomathi, D.Ponniselvi, M.Santha?
41 Fuzzy Mining Approach for Gene Clustering and Gene Function Prediction, Akhil Kumar Das, Debasis Mandal, Mainak Adhikary, Amit Kumar Sen
42 EFFICIENT CLASSIFICATION METHOD FOR LARGE DATASET BY ASSIGNING THE KEY VALUE IN CLUSTERING?, Dr. B Rosiline Jeetha?
43 IMPLEMENTATION OF SPEED UP ROBUST FEATURE FOR DETECTION AND TRACKING OF INANIMATE OBJECTS, Fari Muhammad Abubakar?
44 An Analysis on Clustering Algorithms in Data Mining?, Mythili S, Madhiya E?
45 An Approach to an Emerging Classification Method for Large Dataset in Clustering, Kathiresan V, Dr. P Sumathi?
46 The Image Quality in Computer Tomography Using Curve-let Transform, M.Selvi, J.Vanitha, S.Yasotha?
47 Efficient Service Broker Algorithm for Data Center Selection in Cloud Computing, Prof. Deepak Kapgate
48 ENERGY EFFICIENT VOTING BASED INTRUSION DETECTION TECHNIQUES IN HETEROGENEOUS WIRELESS SENSOR NETWORK?, Divya.B, Manju.R, Sathyabama.B?
49 REVIEW PAPER ON RESPONSE BASED APPROACHES FOR DETECTION OF MISBEHAVING NODES IN MANETS?, Swapna Taksande, Prof. Rajani Bhoomarker, Prof. Sameena Jafar
50 Design and Implementation of Web Based Collaborative Learning Model for ICT Course of College Student in Bangladesh?, Md. Tariqul Islam, S. M. J. Rahman, Syed Md. Galib, K. M. A. Uddin, G. M. M. Bashir
51 Design and Implementation of Web Based Collaborative Learning Model for ICT Course of College Student in Bangladesh, Md. Tariqul Islam, S. M. J. Rahman, Syed Md. Galib, K. M. A. Uddin, G. M. M. Bashir
52 AES and DES Using Secure and Dynamic Data Storage in Cloud, Gowtham B, Prasanth SP?
53 An Overview of MANET: Applications, Attacks and Challenges?, Mr. L Raja, Capt. Dr. S Santhosh Baboo?
54 Real Time HCI using Eye Blink Detection?, R.T.Narmadha, T.Mythili, R.T.Nivetha?
55 A Survey on Wireless Sensor Network Protocols?, T.Mythili, R.T.Narmadha, R.T.Nivetha?
56 Mining Association Rules to Improve Academic Performance?, Rakesh Kumar Arora, Dr. Dharmendra Badal?
57 Design & Implementation of Data Protection Server: Detect Guilty Agent & Protect Secure Data?, Hema Donekar, Pratiksha Raut, Nita Janorkar, Shital Admane, Indu Mandwi?
58 SURVEY ON AN EFFICIENT APPROACH FOR MULTIMEDIA TRANSMISSION USING MULTIPATH ROUTING IN MANET?, A.Sheganaz, P.D.R.Vijaya Kumar?
59 SURVEY ON USER REVOCATION AND FINE GRAINED ACCESS CONTROL OF PHR IN CLOUD USING HASBE, T.Radhika, S.Vasumathi Kannagi?
60 Memetic Algorithm with Hybrid Mutation Operator?, Manju Sharma
61 A SURVEY OF QUESTION ANSWERING SYSTEM FOR COMPARABLE ENTITY MINING, S.Deepa, S.Vasumathi Kannagi?
62 Code Birthmarks and Graph Isomorphism for Theft Detection?, Snehal N. Nayakoji, S. P. Sonavane?
63 MULTI-WAVELET BASED ON NON-VISIBLE WATER MARKING?, P.Venkatapathi, Suresh.N?
64 Performance Analysis of Image Fusion Algorithms using HAAR Wavelet?, Deepika.L, Mary Sindhuja.N.M?
65 Survey on Quality Analysis of Cooperation Incentive Strategies in MANET?, K Savitha Rohini, S Dhanasekar?
66 Distributing, Ensuring and Recovery of Data Stored in Cloud?, Dr. B. F. Momin, Mr. Girish Bamane?
67 A Survey Conducted on E-Agriculture with Indian Farmers?, Sumitha Thankachan, Dr. S. Kirubakaran?
68 A Survey on Delegating Log Management to The Cloud, Sinu P S, M.Ananthi?
69 Survey on Clinical Decision Support System for Diagnosing Heart Disease?, Suchithra, Dr. P. Uma Maheswari?
70 Monitoring Driver Alertness and Avoiding Traffic Collision Using WSN?, B.Arunkumar, N.Deepak, Dr.T.V.P.Sundararajan?
71 Speech Recognition Using Backoff N-Gram Modelling in Android Application, S.Aparna, V.Senthil Kumar?
72 Design of Encounter-Based Social Network in Mobile Application, S.Niranjani, A.Rathna?
73 DIGITAL FORENSICS SERVICE PLATFORM FOR INTERNET VIDEOS?, N. Deepak, B. Arunkumar, Dr. T.V.P.Sundararajan
74 SEARCHING MOBILE NODES USING MODIFIED COLUMN MOBILITY MODEL?, Dr. Tanweer Alam?, Dr. Parveen Kumar?, Prabhakar Singh
75 Predictive Data Mining: A Generalized Approach?, Meghana Deshmukh?, Prof. S. P. Akarte
76 Automatic Detection and Restraining Mobile Virus Propagation using Android?, S. Chandrasekar, Prof. V. Jayaprakasan
77 Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks?, Nishant Sharma, Upinderpal Singh?
78 Decision Support System for Precluding Coronary Heart Disease (CHD)?, K. Cinetha, Dr. P. Uma Maheswari?
79 A SURVEY ON WORKFLOW SCHEDULING IN CLOUD USING ANT COLONY OPTIMIZATION?, J.Elayaraja, S.Dhanasekar?
80 Integrated System for Reading Multiple Files, Awanti Kamble, Anshoola Jaiswal, Nikita Dekate, Shama Haridas, Kalyani Pendke?
81 ENHANCING SECURITY IN TWO-WAY RELAY NETWORK BY USING COOPERATION JAMMING AND RELAY SELECTION APPROACH?, Ramya T V, M. Madan Mohan?
82 Honey Trap Security Server: An Efficient Approach of Securing E-Banking Network?, Ashwini Gabhane, Kiran Bansule, Pradnya Kedar, Lekha Gahukar, Swati Sahare, Ketki Bhakare
83 Weighted Moving Average Forecast Model based Prediction Service Broker Algorithm for Cloud Computing, Prof. Deepak Kapgate?
84 A NOVEL ON FAST PARALLEL FILE TRANSFER USING REPLICATION?, K.Sabarigirivason?, R. Giridharan
85 Evaluating and Analyzing Clusters in Data Mining using Different Algorithms?, N. Sunil Chowdary, D. Sri Lakshmi Prasanna, P. Sudhakar
86 High Efficiency Data Access System Architecture for Deblocking Filter Supporting Multiple Video Coding Standards, S.Karthikeyan, K.Saran?
87 Literature Survey on Applications of Digital Signal Processing using Anti-Aliasing and Anti-Imaging Filters?, S.Arun Kumar?
88 An Investigation of Face Recognition Characteristics Using PCA and ICA?, Yundi Fu, Yongli Cao, Arun Kumar Sangaiah?
89 An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures?, Arun Kumar Sangaiah, Minghao Han, Suzi Zhang?
90 PERFORMANCE EVALUATION FOR FEEDBACK ROTATE- QUASI- ORTHOGONAL SPACE-TIME BLOCK CODES IN MULTIPLE TRANSMIT ANTENNAS?, K. Deepak Babu, Rajesh Durgam, P. Anil Kumar?
91 AN EFFICIENT LOCATION BASED ROUTING FOR MOBILE ADHOC NETWORKS?, S.Saranya, D.Gokilapriya
92 Porter Five Forces Analysis of the Leading Mobile Cellular Telephony Service Provider in India?, Subhasish Majumdar, Partha Pratim Bhattacharya?
93 An Improved IDS Detection with Protection of Agent Collude Attacks?, L.Devi?, V.Santhiya?
94 Denial of Service Attacks in Wireless Networks: The Case of Jammers, L.Devi?, ?A.Suganthi?
95 Fast IP Network Recovery Using MRC from Multiple Failures, L.Devi?, ?M.Suganthi?
96 Wireless Body Area Sensor System for Monitoring Physical Activities Using GUI?, L.Devi?, ?R.Nithya?
97 Implementing & Developing Cloud Computing on Web Application?, Anisha Tandon?
98 A ZIG-BEE BASED WEARABLE HEALTH MONITORING SYSTEM?, M.Sherwin Nayanar, V.Pandimurugan, V.Gowri?
99 Application of the Fuzzy Logic in Content Based Image Retrieval using Color Feature?, Aqeel M. Humadi, Hameed A. Younis?
100 VLSI Implementation and Analysis of Parallel Adders for Low Power Applications?, Arunprasath S, Karthick A, Dhineshkumar D?
101 Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?, Mahendar.R, Navaneetha Krishnan.S, Roshini Ravinayagam, Prakash.P?
102 A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?, M.VIJAYAKUMAR, V.PRIYA DHARSHINI, Dr.C.SELVAN?
103 SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?, J.BALU, DR.S.THIRUNIRAI SENTHIL
104 On Generating Permutations under User Defined Constraints?, Dhruvil Badani?
105 EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY?, G.Tejeswar Reddy, N.Meenakshi?
106 CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR NFC APPLICATION, V.Gowri, F.W.JESUDAS, M.Sherwin Nayanar?
107 Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network?, P.PRIYADHARSHINI, C.ANOOR SELVI?
108 AN ANDROID APPLICATION FOR UNIVERSITY ONLINE COUNSELING?, N. Banu Priya, I. Juvanna?
109 XML Dissemination Scheme for Mobile Computing Based on Lineage Encoding?, K. Anusree, Mrs. D. Usha, C. Shiny Jennifer
110 APPLICATION OF CLOUD COMPUTING AS HPC PLATFORM FOR EMBEDDED SYSTEMS?, N.S.Gawai, B.V.Chikte, V.R.Pandit, S.M.Ingale, M.S. Burle?
111 PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA?, NWALOZIE GERALD .C, UFOAROH S.U, EZEAGWU C.O, EJIOFOR A.C?
112 Analysis of Lossy Hyperspectral Image Compression Techniques?, Dr. S.M.Ramesh, P.Bharat, J.Anand, J.Anbu Selvan
113 VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm, M.Mohana Arasi, J.Anand, P.Bharat, J.Anbu Selvan?
114 Copyright Protection through Deep Packet Inspection- An Indian Perspective?, Priyanka Jain, Jai Sachith Paul, Prof. K.Pradeep Kumar?
115 FINITEľPRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS, Hoglah Leena Bollam?
116 FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM?, K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha?
117 Monitoring Factory Machine Status from Remote Location using GSM Technologies?, C. Shiny Jennifer, B.V. Baiju, K. Anusree?
118 EFFICIENT GRIDDING AND SEGMENTATION FOR MICROARRAY IMAGES?, P.Thamaraimanalan, D.Dhinesh kumar, K.Nirmalakumari?
119 Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique, A.Jeeva, Dr.C.Selvan, A.Anitha?
120 DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT?, T.EZHILARASAN, R.BACKIYALAKSHMI
121 A Supervised Method for Multi-keyword Web Crawling on Web Forums?, A.Gowtham, Dr.K.Deepa?
122 Improvement of Email Summarization Using Statistical Based Method?, Mithak I. Hashem?
123 Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network?, Nikhil Varghane, Prof. Bhakti Kurade, Prof. Chandradas Pote?
124 DESIGN PATTERN BASED ANALYSIS IN MULTI-AGENT FRAMEWORK?, A.Sindhuja, Rathi.P.R, Anis Fathima.A.R, A.P.Jeyasanthini?
125 LARYNX DISEASE ANALYSIS USING DYNAMIC TIME WARPING ALGORITHM?, K. Aiswarya Lakshmi, D. Karunanithi, G.Swetha?
126 Traveler Guide using GPS?, Prashant Beldar, Prashant Bansode, Rajendra Mane, Swapnil Gaikwad
127 TIMETABLE GENERATION SYSTEM?, Anuja Chowdhary, Priyanka Kakde, Shruti Dhoke, Sonali Ingle, Rupal Rushiya, Dinesh Gawande?
128 Smart Remote Health Care Data Collection Server?, Kalyani Bangale, Karishma Nadhe, Nivedita Gupta, Swati Singh Parihar, Gunjan Mankar?
129 LABVIEW Based Module For Bio Signals Monitoring?, Sabeetha Begum.M, Kumarnath.J?
130 Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols, Mahima Chitkara, Mohd. Waseem Ahmad?
131 Review of Techniques for Detecting Video Forgeries?, Aniket Pathak, Dinesh Patil
132 QUASI RESONANT BUCK CONVERTER FOR DUAL STRING BUCK LED DRIVER, Vijayadevi.A, Sneha Prem, Jikku Mathew, Manikandan.K, Sajla Rehman?
133 Lossless Compression for Compound Documents Based on Block Classification?, A.Thamarai Selvi, M.Sambath, S.Ravi?
134 ADDRESSING BIG DATA WITH HADOOP?, TWINKLE ANTONY?, SHAIJU PAUL?
135 Privacy in Map Reduce Based Systems: A Review, Rosmy C Jose, Shaiju Paul?
136 AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM?, Deboral C, Sudhagar G?
137 PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS?, Ramya. K, Nithya. N?
138 JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING?, E.Mallika, K.SivaKumar?
139 Novel Techniques for Color and Texture Feature Extraction?, Miss. Priyanka N.Munje?, Prof. Deepak Kapgate?, Prof. Snehal Golait?
140 Data Integration Models for Operational Data Warehousing?, G. Swetha, D. Karunanithi, K. Aiswarya Lakshmi?
141 REALIZATION OF VLSI ARCHITECTURE FOR DECISION TREE BASED DENOISING METHOD IN IMAGES, Gobu.CK, Priya.R?
142 Providing Efficient Data management Services Using Cloud Cache?, Swapnil L. Mahadeshwar, A.R.Surve?
143 GAPSS: GPS Aided Photo Search System?, Amey Divekar, Pravin Khot, Gaurav Chaudhari, Vishal Shembekar?
144 A Review on Privacy Problems in Distributed Information Brokering System and Solutions?, Mr. Ashutosh Kamble, Prof. Deepak Kapgate, Prof. Prakash Prasad?
145 SURVEY ON SECURE AUDIO ENCRYPTION USING SILENCE PART OF THE SPEECH?, V. Anusuya Devi, Dr. V. Kalaivani, T. Sam Pradeep Raj?
146 An Approach for Minimization of Power Consumption in Ad-Hoc Network?, Abhiruchi Akre, Kimi Bhoyar, Ankita Malve, Avantika Kalbande, Pawan Khade?
147 Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH Algorithm, Krupa Mary Jacob, K.Sangeetha, S.Karthik?
148 DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM?, P.Anishprabu, M.Sangeetha, M.Nagulanand?
149 EduPad- ôA Tablet Based Educational System for Improving Adult Literacy in Rural Indiaö?, Mayuri Tawri, Richa Sharma, Charandas Pote?
150 Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner?, Mr. Ajay Bhaisare, Prof. Prakash Prasad, Prof. Ashwini Meshram?
151 Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks?, D. Balamahalakshmi, Mr. K.N. Vimal Shankar??
152 AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA?, Saranya.S, Mr. K.N. Vimal Shankar?
153 Gas Level Detection and Leakage Monitoring System using a Specific Technique, I. Juvanna, N. Meenakshi?
154 Lane Detection Techniques - A Review?, Anjali Goel?
155 A Review on Image Dehazing Methods, Reshma Kurian, Namitha T.N??
156 APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS?, Dr. N. Amsaveni, M. Manjula??
157 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption?, Prof. Y.B.Gurav?, Manjiri Deshmukh
158 EFFICIENT AND DISTRIBUTED NETWORK MODEL FOR P2P SYSTEMS?, K.KAYALVIZHI, BHARATHI.R?
159 Attendance Monitoring Using Face Recognition?, Divya Singh, Ruhi Sunil Hadke, Shruti Sanjay Khonde, Valhavi Diwakar Patil, Monica Kamnani, Mitali R. Ingle?
160 GEOGRAPHIC ROUTING SCHEME BASED ON DYNAMIC LOCATION UPDATE AND LOAD BALANCING MECHANISM?, M.Rajalakshmi, K.Gowsic?
161 SECURE NETWORK SHARING NEMO BASED AD-HOC?, V.Pavithra, M.Mohankumar?
162 SAT4BSC: A Static Analysis Tool for BPEL Source Codes?, Esubalew Alemneh, Abdul Azim Abd Ghani, Rodziah Atan?
163 Improvising Authenticity and Security of Automated Teller Machine Services, Srivatsan Sridharan, Gorthy Ravi Kiran, Sridhar Jammalamadaka?
164 A Survey on Privacy-Preserving Techniques for Secure Cloud Storage?, Salve Bhagyashri, Prof. Y.B.Gurav?
165 Cloud Removal from Satellite Images Using Information Cloning?, Saranya M?
166 Automatic Detection of Optic Disc for the Extraction of Ocular Structure?, Nivedha S, Dinesh V?
167 PHISHING WEBSITE DETECTION: A REVIEW?, Feon Jaison, Seenia Francis?
168 A Review of Intrusion Detection System in Computer Network?, Abhilasha A Sayar, Sunil. N. Pawar, Vrushali Mane?
169 MULTIMEDIA QA GENERATION BY USING SEARCH DIVERSIFICATION?, Nandhini.N, Ramya.K, Sandeepa.P
170 CPU Power Prediction on Modern Multicore Embedded Processor?, Shuhaizar Daud, R. Badlishah Ahmad, Ong Bi Lynn?
171 Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor Networks, P. Dhivya, P. Sathya Priya, M. Thenila?
172 Integration of Touch Technology in Restaurants using Android?, Sushmita Sarkar, Resham Shinde, Priyanka Thakare, Neha Dhomne, Ketki Bhakare?
173 VIDEO MINING AND ANOMALY DETECTION ľ SURVEY?, Subashree.D, Sobitha Ahila.S
174 Review on Authentication Mechanisms of Digital Signatures used for Certification?, Shraddha Kulkarni, Prof. Vikrant Chole, Prof. P S Prasad?
175 AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUAL CRYPTOGRAPHY?, Mr. Bhushan Yenurkar, Mr. Shrikant Zade?
176 Advanced E-mail Spam Detection Methodology by the Neural Network Classifier, V. BRINDHA, J. GEORGE CHRISTOBER, V.NANDHINI?
177 Translation of English Algorithm in C Program using Syntax Directed Translation Schema, Nisha N. Shirvi, Mahesh H. Panchal?
178 One-Dimension Multi-Objective Bin Packing Problem using Memetic Algorithm?, Khushbu Patel, Mahesh Panchal
179 Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Walls?, Ms. Pallavi Kalyane, Prof. Sachin Chavan, Prof. Pravin Rahate?
180 Mining Multilevel Fuzzy Association Rule from Transaction Data?, Urvi A. Chaudhary, Mahesh Panchal?
181 Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages?, Sushil Kumar Soni, Ravi Kant Kapoor?
182 A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm?, Rashmi.J, Bharathi.G?
183 AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH?, K.Mythili?, K.Kanagavalli,? B.Shibi?
184 IDENTIFICATION OF THE DEGREE OF PARTICIPATION BASED ON HMM?, S.Chidambaranathan?
185 An Efficient Real Time Video Multicasting Protocol and WLANs Cross-Layer Optimization in IEEE 802.11N?, Gopikrishnan.R, Ms. J.R.Thresphine??
186 Implementation of Password Guessing Resistant Protocol (PGRP) to Prevent Online Attacks?, M.YUVARAJ, A.R.BHARATHIDASAN, N.KUMAR?
187 Selection of Most Relevant Features from High Dimensional Data using IG-GA Hybrid Approach?, Ishani Mandli, Prof. Mahesh Panchal?
188 WIRELESS MESH NETWORKS: ISSUES AND CHALLENGES?, Jubil Jose, Rigi C.R?
189 The Role of Web Content Mining and Web Usage Mining in Improving Search Result Delivery?, Ms. Shital C. Patil, Prof. R. R. Keole?
190 A TECHNIQUE FOR IMPROVING CAKEPHP WEB PAGE RESPONSE TIME, Pharaoh Chaka, Hilton Chikwiriro?
191 Security Issues in SaaS Delivery Model of Cloud Computing, Aized Amin Soofi, M. Irfan Khan, Raman Talib, Umer Sarwar?
192 Security Issues in SaaS Delivery Model of Cloud Computing, Aized Amin Soofi, M. Irfan Khan, Ramzan Talib, Umer Sarwar?
193 DATA MINING TECHNIQUES FOR PREDICTING SCHOOL FAILURES AND DROPOUT, Mrs.KALPANA.N, Dr.K.DAVID?
194 Depth Video Compression Using Weighted Mode Filtering?, Ms. MAANVIZHI.J, Mr. K.SIVAKUMAR?
195 EXHAUSTING VERVE BY VAMPIREĺS IN WIRELESS AD HOC SENSOR NETWORKS?, P. DivyaPrabha, R. Sundaram?
196 Enhanced Privacy ID for Remote Authentication using Direct Anonymous Attestation Scheme?, Uma.R, Aravind.P?
197 Intrusion Detection in Mobile Adhoc Network?, Mrs. Mugdha Kirkire, Prof. Poonam Gupta?
198 ENTITY SEARCH ENGINES?, Pinky Paul?, Mr. Thomas George?
199 Data Services For E-Tailers Leveraging Web Search Engine Assets- A Review?, Shaleena K.P, Thomas George?
200 TRUSTED ATOMIC WEB SERVICE TRANSACTION IN CLOUD, K. LOHESWARAN, S.BAGYASHREE, K.KAVIYA?
201 A Mechanism to Adjust the Updated Data and Recovery for School?, Hussain Abdulkareem Younis, Hassen Mohssen Audafa, Dr. Hameed A. Younis
202 MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS?, Prinslin.L, V.Janani?
203 A NEW IP TRACEBACK SCHEME TO AVOID LAUNCH ATTACKS?, E.JANSI?, BHARATHI.R?, E.PUSHPARAJ?
204 A Survey on Quality of Service for Optimized Linked State Routing protocol in Mobile Ad hoc Network?, Jalpesh D. Ghumaliya, Sandip Chauhan?
205 OSN User Filtered Walls for Unwanted Messages Using Content Mining?, Ms. Shruti C. Belsare, Prof. R.R. Keole?
206 REVIEW: DETECTION OF TYPES OF ACUTE LEUKEMIA?, SHRUTIKA MAHAJA, SNEHAL S. GOLAIT, ASHWINI MESHRAM, NILIMA JICHLKAN
207 QOS ORIENTED NODE SELECTION APPROACH IN AD-HOC ROUTING IN VANET, VIGNESHKANNA.B, M.MANIKANDAN?
208 Critical Analysis of Cloud Computing Using OpenStack?, Paramjot Singh, Vishal Pratap Singh, Gaurav Pachauri?
209 Polarity Classification Using Twitter Data?, Paramjot Singh?
210 Defending Against Attack in Heterogeneous Networks?, M. Mukesh Krishnan, R. Ravi?
211 A HETEROGENEOUS WIRELESS NETWORK FOR 5G MOBILE?, Renuka S. Durge, Vaishali B. Bhagat?
212 MOBILE CLOUD COMPUTING AN EFFICIENT TECHNIQUE FOR MOBILE USERS, Shraddha A. Jalan, Vaishali B.Bhagat?
213 Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks?, B.Renugadevi, T.John Peter
214 A NOVEL DESIGN OF REVERSIBLE FLOATING POINT ADDER ARCHITECTURE?, N. Keerthika, Mr. M.Rajmohan?
215 Analysis of Data Confidentiality Techniques in Cloud Computing?, Ms. Mayuri R. Gawande, Mr. Arvind S. Kapse?
216 Analysis of Malware Detection Techniques in Android?, Ms. Prajakta D. Sawle, Prof. A. B. Gadicha?
217 A Survey on Privacy Preservation in Data Publishing?, V. Shyamala Susan, Dr. T. Christopher?
218 Error Detection in Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes, K. ADINARAYANA, J. RAVI?
219 A NEW APPROACH TO IMPROVE BUSINESS USING SEO TECHNIQUES?, Sreeharsha Muram, VenkataRamana.K, Rajasekhar Kunisetty
220 Security for Privileged Accounts Using Break-Glass Technique, Arun.S, Mohanasundarm.A, Bhoopathi Siva.K?
221 Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud?, I.Sudha, A.Kannaki, S.Jeevidha?
222 Dynamic Data Aggregation Prediction Based Clustering to Mobile Sink in Wireless Sensor Networks?, M.Suganthi, Mrs. Susmita Mishra?
223 Enhancing Search Engine Optimization using Web Content Mining?, Mr. S.Balamurugan, Dr. S.Thirunirai Senthil?
224 A Survey on Wavelet Domain Techniques for Image Super Resolution?, Saranya P, Fatimakani K, Kanchanadevi P, Venkatesan S, Govindaraju S?
225 Special Scheme of Hidden Data Procession for Several Applications in Wireless Sensor Networks, Janarish Saju C, Sharon Nisha M
226 A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS?, M.Ranjith Priyanka, J.Mary Metilda?
227 An Assess Android Antimalware that Detects Malicious Dynamic Code in Apps, Miss. Srushti Hatwar, Prof. Chetan Shelke?
228 Field Oriented Control of Permanent Magnet Synchronous Motor?, P.Ramesh, RachaPrathyusha?
229 DESIGN AND IMPLEMENTATION OF BALLOT MALFUNCTIONING AVOIDANCE SYSTEM SECURITY OPTIMIZATION?, Srikeerthi Godena, P. Kumara guru Diderot?
230 DESIGN OF HIGH-ACCURACY FIXED-WIDTH MODIFIED BOOTH MULTIPLIER, Ms. Jeena Maria Cherian, B.Sireesha?
231 Clustering with Efficient Web Usage Mining?, MS. RASIKA KALBENDE, MR. AMIT SAHU?
232 CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)?, JEBARANJANI.B?, SANGEETHA.S?
233 Secure Crypto System for Image Encryption and Data Embedding using Chaos and BB Equation Algorithm?, S.Revathy?
234 FPGA Implementation of Wu-Manber Algorithm for BLASTN DNA Sequence Matching, Anitha Ranganathan?
235 Logical Fault Detection Based on Conservative QCA for Ultra Low Power Devices?, Yamuna S?
236 Design of Power Gated ML Sensing Low Power CAM?, Neelam Sharma S?
237 A Survey on Text Based Clustering, S.Chidambaranathan
238 GENERATION OF SECURITY TEST TO FIND INJECTION ATTACKS BY CODE REVIEW, N. Parthiban, R. Ravi, Dr. Beulah Shekhar?
239 An Android Based Medicine Reminder System Using External Storage?, Prabhukannan.G, Liza M. Kunjachen, Dr. J. Jegadeesan?
240 REAL-TIME COMPRESSION STRATEGY ON VARIOUS POINT CLOUD STREAMS, Miss. R.SARANYA, DR. S.THIRUNIRAI SENTHIL?
241 Watermarking Scheme for Colour Images Using Hidden Markov Model?, Mr. Kanchan Mahajan, Prof. Mahendrakumar Rai?
242 SECURITY ANALYSIS OF DYNAMIC GROUPS IN CLOUD?, Ms. Shrayu P. Pachgade, Prof .K.G. Bagde?
243 Review of Image Processing Techniques for Automatic Detection of Tumor in Human Liver, Vinita Dixit, Jyotika Pruthi
244 Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET?, Yassine MALEH?, DR. Abdellah Ezzati?
245 DATA SECURITY BASED ON LAN USING DISTRIBUTED FIREWALL?, Jayshri V.Gaud, Mahip M.Bartere?
246 INTRUSION DETECTION AND PREVENTION BY USING LIGHT WEIGHT VIRTUALIZATION IN WEB APPLICATIONS?, J.Angeline Linora, M.Nava Barathy?
247 BRAIN TISSUE SEGMENTATION FROM MAGNETIC RESONANCE IMAGE USING PARTICLE SWARM OPTIMIZATION ALGORITHM?, Abinaya.K.S, Pandiselvi.T?
248 An Analysis on the Performance Evaluation of Routing Protocols in Wi-Fi/802.11b Network?, Merin Skariah, Prof. Dr. Suriyakala C D?
249 SECURITY ISSUES: THE BIG CHALLENGE IN MANET?, Sneha U. Agalawe, Nitin R.Chopde?
250 Selecting Best Features Using Combined Approach in POS Tagging for Sentiment Analysis?, Nikita D. Patel, Chetana Chand?
251 A SURVEY ON CONTENT RETRIEVAL SCHEMES FOR MEDICAL IMAGES?, Meeshika Arora?
252 DESIGN OF MULTIPLE CONSTANT MULTIPLICATION ALGORITHM FOR FIR FILTER?, T. Sandhya Pridhini, Diana Aloshius, Aarthi Avanthiga, Rubesh Anand?
253 Categorization of Data Mining Tools Based on Their Types?, J.Mary Dallfin Bruxella, S.Sadhana, S.Geetha
254 Enhanced Data Transmission for Cluster-Based Wireless Sensor Networks?, Miss. Vaishali M.Sawale, Prof. Arvind.S.Kapse?
255 QoS Enhanced Architecture for Cloud Computing Environment?, ANBUMOZHI ANBUKKARASAN, LIZA M KUNJACHEN?
256 Design of Router Micro Architecture Based on Runtime Adaptive Selection Strategies for On-Chip Communication Interconnection Network?, Ms. Aryadevi S, Mr. T Shanmughanathan?
257 FAULT TOLERANT DEFLECTING ROUTER WITH HIGH FAULT COVERAGE FOR ON-CHIP NETWORK, Mr. Vishnu K P, Mr. T Shanmughanathan?
258 A Survey on Androidĺs Location Content Search Engine?, Kanchan B. Budhakar, Amruta T. Kashid, Rutuja N. Pathare?
259 Remote Administrative Trojan/Tool (RAT), Manjeri N. Kondalwar, Prof. C.J. Shelke?
260 A SECURE AND TRUSTED ROUTING SCHEME FOR WIRELESS MESH NETWORKS, Pushpender Sarao, Prof.(Dr.) Sohan Garg?
261 A MODEL FOR EVALUATING AND MAINTAINING LOAD BALANCING IN CLOUD COMPUTING?, Pushpendra Verma, Dr. Jayant Shekhar, Amit Asthana?
262 A High Speed and Area Efficient Wallace Tree Multiplier with Booth Recoded Technique?, B. Venkata Sateesh, Shiju C Chacko?
263 Agile Programming and Design Patterns on Web Applications Using J2EE and Ruby on Rails ľA Case Study?, Vedavyas J, Kumarswamy Y?
264 A Novel Design of Reversible Universal Shift Register, Rashid Anwar, Jobbin Abraham Ben?
265 BUNDLE PROTOCOL ALONG WITH OLSR IN MANET?, J. Vithya Roshni, J. Prabin Jose
266 Android Based Meter Reading Using OCR?, Rohit Dayama, Anil Chatla, Heena Shaikh, Medha Kulkarni?
267 DooDB: A Graphical Password Database Consist of Doodles and Pseudo Signature Based User Authentication?, Miss. Yugandhara A.Thakare, Prof.A.S.Kapse?
268 Secure Key Exchange over Internet?, Miss. Pooja P. Taral, Prof. Vijay B. Gadicha?
269 AN EXPLORATORY STUDY OF DUPLICATE BUG REPORTS IN OSS PROJECTS, Swati Sen, Anita Ganpati, Aman Kumar Sharma?
270 WIFI MIMO EMERGING TREND IN WIRELESS TECHNOLOGY?, Sneha A. Jaswante, Mahip M.Bartere?
271 A Comparative Study on Performance Evalution of Eager versus Lazy Learning Methods?, Solomon Getahun Fentie, Abebe Demessie Alemu, Bhabani Shankar D. M.?
272 Congestion Detection & Minimization in Wireless Sensor Network By Using Multipath Rate Organization Technique?, Prof. Sachin Patel, Prof. Rakesh Pandit, Mr.Abhijeet Rathod
273 Performance Analysis of two Anaphora Resolution System for Hindi Language, Priya Lakhmani, Smita Singh, Sudha Morwal?
274 Design of Power and Rate Adaptation with Scheduling In Wireless Networks Based On SIC?, M.Vinodhini, R.Uthira Devi?
275 New Touch Screen Application to Retrieve Speech Information?, J.Rajeswari, E.Thanga Selvi?
276 SMART BATTERY CHARGER FOR SOLAR-POWERED LINE FOLLOWER ROBOTIC VEHICLE, S.Anusuya, Mrs.M.Thiruveni?
277 Estimation and Detection of Blood Pressure Using Smart Phones without Using Cuff?, V.Sathya, R.Mohan Raj?
278 Fingerprint Authentication System Using Minutiae Matching and Application?, M.Sathiya Moorthy, R.Jayaraj, Dr. J. Jagadeesan
279 A Statistical Communication Analysis Model for Attack Detection in Mobile Network?, Amit Kumar, Omprakash Tailor, Mr. Krishna Kumar?
280 A Study on Different Approaches on Software Review Mining?, Anju, Anshul Anand?
281 AN IMPROVED GGP BASED CLUSTER HEAD ROUTING FOR RECOVERING AND SENSING DATA AGGREGATION INTEGRITY IN WIRELESS SENSOR NETWORKS?, K.Sujana Banu, V.Vignesh, K.Banazeer?
282 Characteristic Evaluation of Distributed QoS Routing, Shuchita Upadhyaya, Gaytri Devi?
283 A FRAMEWORK FOR HOSTING IMAGE COMPRESSION IN CLOUD?, S. Girija Lakshmi, N.R. Gayathiri?
284 Design of Power Efficient Low-Cost Embedded Control Systems for Domestic Induction Heating Appliances?, S.Shanthi, S.Muthukrishnan, G.Mohanambal?
285 Encryption of JPEG2000 Images using Watermarking?, Renuga Devi.J, Priyadharshini.K, Umamaheswari.V
286 IMPLEMENTING JOINT IDLE QUEUE ALGORITHM IN CLOUD ENVIRONMENT?, S.P. Dhayalini, S. Saranya Devi?
287 Secured Energy Optimization for Wireless Multimedia Sensor Networks using Fuzzy logic?, Sindhu Duraisamy, R. Priya, Vinu Raja VijayaKumar?
288 Analysis of Integer Transformation and Quantization Blocks using H.264 Standard and the Conventional DCT Techniques?, Priyanka P James, Chirappanath B Albert, Inbalina.K?
289 LOW POWER QVCO USING ADIABATIC LOGIC?, Vergin Jeyaseeli.F, Udhaya Kumar.S?
290 Identity Management System to Ensure Cloud Security?, Miss. Priyanka S. Rathod, Prof. Mr. R.R. Keole?
291 FUFM-High Utility Itemsets in Transactional Database, S.Priya, E.Thenmozhi, Mrs. D.Shiny Irene?
292 Importance of Virtual Reality in Current World?, Shiny Mathew?
293 A Study of Web Traffic Analysis, Mr. Pratik V. Pande, Mr. N.M. Tarbani, Mr. Pavan V. Ingalkar?
294 Energy Saving in Wireless Sensor Network using Attribute Based Dynamic Routing?, G.Subha, M.Nava Bharathy?
295 THE DOORWAY OF SECURE DATA SHARING SCHEME FOR CONFEDERACY CLOUDS, K.ISRAIL, Y.SURESH?
296 Implementation of Multibiometric System Using Iris and Thumb Recognition, Ashish Naghate, Mayur Sahu, Pranju Bhange, Swati Lonkar, Pallavi Wankhede, Yamini Bute?
297 Software Quality Assessment in Object Based Architecture?, N.Jayalakshmi, Nimmati Satheesh?
298 SECURE AND EFFICIENT ROLLBACK RECOVERY IN GRID ENVIRONMENT?, Ms. A. Wisy Shantha, Prof. S. Subashini?
299 A SECURED PERVASIVE HEALTH SYSTEM FOR MOBILE HEALTHCARE EMERGENCY?, Ms. SENBAGAVALLI.S, Mr. K.DAVID?
300 Performance Analysis of Topology based Routing Protocols in VANET, M. Chitra, S. Sivasathya, B. Muthamizh
301 SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE, R.Selva Bhuvaneshwari, P.Anuja?
302 Intelligent Monitoring of Patients in Hospitals Using CAN Protocols and ARM7TDMI Processor?, Dr. C. Gurudas Nayak?, Siddu S Kadiwal?, Shobha Kadiwal?, Aruna Kumar Angadi?
303 Cloud Security Tracking, Log Maintenance and Notification System for Net Banking Cloud Applications?, Miss. Bhagyashree A. Dhamande, Mr. Amit Sahu?
304 Design of Power Optimization using C2H Hardware Accelerator and NIOS II Processor?, Mr. Sufiyan B. Mukadam, Prof. Abhijit S. Titarmare?
305 Density-Based Spatial Clustering with Noise ľ A Survey?, Naveen Kumar, S.Sivasathya?
306 Application for Intra-College Communication Based on Cloud Computing?, Neethuanna Mathew, Namrata Salgar, Pretty Varghese, Mr. Yogesh Pawar?
307 A NOVEL APPROACH TO ENHANCE OBJECT DETECTION USING INTEGRATED DETECTION ALGORITHMS?, Swati Gossain, Jagbir Gill?
308 ADVANCED DIGITAL SIGNAL PROCESSING TECHNIQUE TO REDUCE SYSTEM COMPLEXITY USING DHT ALGORITHM, S.Madhan, Ms.V.Saranya?
309 SATELLITE IMAGE PROCESSING ON A GRID BASED COMPUTING ENVIRONMENT?, P.DEVABALAN?
310 Digital Watermarking of Wavelet Transforms Based on Coding and Decoding Techniques?, Mrs. Rashmi Soni, Prof. M.K.Gupta?
311 TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON CLUSTERING?, Kriti Thakur, Ravikant Sahu?
312 TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON NEURAL NETWORK?, Parminder Kaur, Ravikant Sahu?
313 TO ENHANCE THE SECURITY IN DBMS USING INTEGRATED CRYPTOGRAPHIC ALGORITHMS?, Davinderpal Kaur, Kewal Krishn?
314 Survey of the Green within Computing?, Vishnu Kumar M, Ganapathy Sundaram V, Beulah Joice R
315 Watermarking of Dataset with Usability Constraints Model?, R. Shankari, V. Sindhiya, D. Vidhya, Mrs.D.Shiny Irene, Mrs.M.Arshiya Mobeen
316 5G Technology-Evolution and Revolution?, Meenal G. Kachhavay?, Ajay P.Thakare?
317 An Advanced Security - A Two-Way Password Technique for Cloud Services?, Yogesh Brar, Shobhit Krishan, Ankur Mehta, Vipul Talwar, Tanupriya Choudhury, Vasudha Vashisht?
318 Anonymously Share Data on Group Signature in the Large Groups of Cloud?, Rengasamy.R, Guru Rani.G?
319 IMPROVING THE WINDOWS PASSWORD POLICIES USING MOBILE BLUETOOTH AND RIJNDAEL ENCRYPTION?, Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo?
320 A Review on Novel Approach for MRI Image Detection using Kochanek-Bartels Splines with Masking Algorithm?, Sukhjit Kaur, Pooja Sharma?
321 A Review on Novel Approach of Boundary Detection and Image Segmentation using Brightness Gradient and Cardinal Splines?, Pooja Sharma, Sukhjit Kaur?
322 A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink?, E.Revathi, C.Darwin, G.Vivitha?
323 Defending against Flood Attacks in Disruption Tolerant Networks using Blowfish Algorithm, S. Pushpa, B. Mani Megalai, A. Wisy Shantha?
324 A COMPARATIVE STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES?, David.S?, Manikandan.R?
325 Vehicle to Vehicle Communication using RFID along with GPS and WAP?, A.Vanitha Katherine, R.Muthumeenakshi, N.Vallilekha?
326 ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY?, Ashish M. Jaiswal, Mahip Bartere
327 Comparative Analysis of Various Underwater Image Enhancement Technique, Shiwam S. Thakare, Amit Sahu?
328 Using OLAP with Diseases Registry Warehouse for Clinical Decision Support?, A. K. Hamoud, Dr. Taleb A.S. Obaid
329 Performance Analysis of Classification Algorithms?, Payal Pahwa, Manju Papreja, Renu Miglani?
330 SECRET SPLITTING SCHEME: A REVIEW?, Nikita Dhule, Mr. Amit Sahu?
331 To Enhance Reliability of Dynamic Clustering Using Self Learning Technique: A Review, Shivani Garg?
332 Data Mart Designing and Integration Approaches?, Rashmi Chhabra, Payal Pahwa?
333 Approaches for Web Service Selection, Vijayalaxmi S Jeure, Y.C.Kulkarni?
334 Intelligent System for Brain Diseases Diagnosis Using Neural Network and Bayesian Methods?, Amir Y Mahdi, Shaker k Ali, Rabia R Mkamis?
335 Review on Text Clustering Based on Frequent Itemset?, Prajakta Jaswante, Dr. P.R. Deshmukh?
336 Review on ôData Mining with Big Dataö, Vitthal Yenkar, Prof. Mahip Bartere
337 Review on ôAdaption of Ranking Model for Domain Specific Searchö?, Mr. Pratik R.Mantri, Prof. Mahip M.Bartere?
338 Review on ôAn analysis of the Management Security and Security Algorithms in Cloud Computingö, Nilesh N.Chawande, Prof. Jayant P.Mehare?
339 Automatic Segmentation of Digital Images Applied in Cardiac Medical Images?, Mukesh G. Mahore, Vrushali V. Dhanrale, Harshad R. Borde, Pooja G.Lahoti, Suraj B. Borge
340 Secure Platform for Wireless Sensor Network?, Mohamed Otmani, Abdellah Ezzati?
341 Mobile Database Review and Security Aspects?, Bhagat.A.R, Prof. Bhagat.V.B
342 Mobile HealthCare Technology Based on Wireless Sensor?, Pimpre.D.M, Bhagat.V.B?
343 QADR with Energy Consumption for DIA in Cloud?, Ms. S.Soundharya, Mr. R.Santhosh?
344 Local Octal Pattern: A Proficient Feature Extraction for Face Recognition, Nithya J, Suchitra S, Dr. S Chitrakala?
345 SMART PHONE BASED SOCIAL NETWORKING FOR TEACHING & LEARNING?, G. M. M. Bashir, Md. Atikqur Rahaman, Syed Md. Galib, M.M. Rahaman?
346 HAPTIC SCIENCE AND TECHNOLOGY IN SURGICAL SIMULATION, MEDICAL TRAINING AND MILITARY APPLICATION?, Miss. Snehal N. Meshram?, Prof. Amit M. Sahu?
347 Network Assisted Mobile Computing with Efficient Cache Maintenance?, K Komarasamy, Dr. L M Nithya
348 Performance Analysis of Sequential Element for Low Power Clocking System?, Umayal.S?
349 Using Genetic Algorithm for Whole Test suite Generation of Object Oriented Programs?, Mrs.R.Gowri, R.DhanBhagya Preety, B.Durga Devi, G.Aruna?
350 Survey on Secure Updates using Over the Air Programming in Wireless Sensor Network, Naresh M. Bhagat, S. P. Akarte?
351 A Review of Jelly Fish Attack in Mobile Adhoc Networks, Manjot Kaur, Anand Nayyar?
352 A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes, Naveen Sharma, Anand Nayyar?
353 Design of Coarse Grain Architecture for DSP Application?, Kushal R. Kalmegh?, Prof. Vaishali Tehre?
354 Critical Success Factors for Agile Methodology Adaptation in Software Development Organizations?, Vishvadeep Tripathi, Arvind Kumar Goyal?
355 REVIEW ON STEGANOGRAPHY FOR HIDING DATA?, Sagar S.Pawar, Prof. Vinit Kakde?
356 DYNAMIC NUMBER PLATE RECOGNISATION USING GENETIC ALGORITHMS, M.Sudha, E.Saranya, R.Karthika, R.Santhosh?
357 Alienation of Melanocytes in Cancer Pretentious Cells using Level Set Segmentation Algorithm, Narmadha.R, Ahalya Mary.J?
358 OPTIMIZED KERNEL IMPLEMENTATION OF MANSOS?, M.Prabhu, V.Rajaram?
359 A Review on Various Techniques for Image Debluring, Shital Hemant Umale?
360 Monitoring and Self-Transmitting Data Using Zone Routing Protocol in Ad-hoc Network towards Effective Mobility Management?, S.Jayamoorthy, I.Varalakshmi, S.Kumarakrishnan?
361 SAAS ľ A Gateway to Cost Effective Secure Vehicular Clouds?, M.R.Yasmeen?, M.Ramya Devi?
362 Dynamic Bandwidth Allocation Scheme for Efficient Handover in IEEE 802.16e Networks?, M. Deva Priya, M.L. Valarmathi, R.K. Shanmugapriya, D. Prithviraj?
363 Change Monitoring of Burphu Glacier from 1963 to 2011 using Remote Sensing?, Rahul Singh, Dr. Renu Dhir?
364 Designing a Web Based Module for SAR to Ensure Data Security Using JAVA?, Bhumi Aravind Kalaria, Dr. C Gurudas Nayak, Dr. N.K. Shrivastava
365 SEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION?, M.Gopianand, S.Jayakumar?
366 ISSUES IN KNOWLEDGE DISCOVERY FROM MEDICAL DATABASES?, K.Kathirvel?
367 PROTECTING PROXY BASED NETWORK FROM DDoS ATTACKERS WITH IP SPOOFING DETECTION?, Yedu Krishnan.R, A.Anbumani??
368 A CONVENTIONAL STUDY OF EDGE DETECTION TECHNIQUE IN DIGITAL IMAGE PROCESSING?, Indrajeet Kumar, Jyoti Rawat, Dr. H.S. Bhadauria?
369 Layered Mapping of Cloud Architecture with Grid Architecture?, Pardeep Seelwal?
370 On New Approach in Using 433MHz Radio Modules?, Prithviraj Shetti, Prasad V. Sakharpe, Amrut Ubare?
371 A SURVEY ON IMPROVING PERFORMANCE OF APRIORI ALGORITHM, Er.Rajvir Kaur, Er.Nishi Madaan?
372 Firewall and Its Policies Management?, Er. Smriti Salaria, Er. Nishi Madaan?
373 An Innovative Smart Soft Computing Methodology towards Disease (Cancer, Heart Disease, Arthritis) Detection in an Earlier Stage and in a Smarter Way?, Mr. Tanupriya Choudhury, Prof. (Dr.) Vivek Kumar, Dr. Darshika Nigam, Vasudha Vashisht?
374 COMPARISON OF DIFFERENT DATASETS USING VARIOUS CLASSIFICATION TECHNIQUES WITH WEKA?, Deepali Kharche, K. Rajeswari, Deepa Abin?
375 EXTRACT ASSOCIATION RULES TO MINIMIZE THE EFFECTS OF DENGUE BY USING A TEXT MINING TECHNIQUE?, Atif Amin, Ramzan Talib, Salman Raza?
376 EXTRACT ASSOCIATION RULES TO MINIMIZE THE EFFECTS OF DENGUE BY USING A TEXT MINING TECHNIQUE?, Atif Amin, Ramzan Talib, Salman Raza?, Saima Javed?
377 Satellite Image Fusion Using Maximization of Non-Gaussianity?, A. M. El Ejaily, F. Eltohamy, M. S. Hamid, G. Ismail?
378 Design of Mobile Event Management and Broadcast System Using Rational Unified Process?, Sonali Addetla, Mohini Gorde, Supriya Ghadge, Suvarna Kusal, Anupkumar M Bongale
379 GRAPHICAL PASSWORD FOR EMAIL APPLICATION BY PERSUASIVE CLICK POINTS USING CENTERED DISCRETIZATION?, Mr. Aniket G. Jadhav, Ms. Rajashri D. Dipak, Ms. Lavina P. Dadlani, Mr. Mangesh K. Manke?
380 WIRELESS CHARGING OF MOBILE PHONE USING MICROWAVE?, Priya A. Rewaskar, Prof. Dinesh Datar?
381 Enhancing Security in Mobile Communication using a Unique Approach in Steganography?, Prof. Sharmishta Desai, Sanaa Amreliwala, Vineet Kumar?
382 Performance Improvement of Routing Protocol Using Two Different Mobility Models In Vehicular Adhoc Vehicular Network?, Mr.Vaibhav D. Patil, Prof. Atul R. Deshmukh?
383 A Review on the Role of Big Data in Business?, Jafar Raza Alam, Asma Sajid, Ramzan Talib, Muneeb Niaz?
384 Detection of Automobile Drivers Stress from Physiological Signals?, Dayalin Subi J, Anuja H S
385 Application Layerĺs Approaches for TCP Incast Problem at Data Center Networks?, Irfan Riaz Shohab, Muhammad Younas, Ramzan Talib, Umer Sarwar?
386 Light Fidelity (LI-FI)-A Comprehensive Study?, Ekta, Ranjeet Kaur?
387 MULTIHOMING AND MULTISTREAM PROTOCOL IN COMPUTER NETWORKS, Syed Yasmeen Shahdad, Gulshan Amin, Pushpender Sarao?
388 Literature Survey on DWT Based Image Steganography?, Mrs. Suvarna Patil, Mr. Gajendra Singh Chandel
389 Encryption and Decryption of Data Using QR Authentication System, Atul Hole, Mangesh Jadhav, Shivkant Kad, Swanand Shinde?, Prof. Pramod Patil?
390 IDS: Survey on Intrusion Detection System in Cloud Computing?, Mr. Ashish Kumbhare, Mr. Manoj Chaudhari?
391 Improvement of Expectation Maximization Clustering using Select Attribute, Rupali Bhondave, Madhura Kalbhor, Supriya Shinde, K. Rajeswari?
392 A Survey on Security in Cloud Computing, Varsha Yadav, Preeti Aggarwaal?
393 Secure Sharing of Medical Records Using Cryptographic Methods in Cloud, M.P. Radhini, P.Ananthaprabha, P.Parthasarathi?
394 A Distributed Computer Machine Vision System for Automated Inspection and Grading of Fruits?, Yogitha.S, Sakthivel.P?
395 A Multi-Level Security Framework for Cloud Computing?, Mr. Anup Date, Mr. Dinesh Datar?
396 Predicting the Effect of Diabetes on Kidney using Classification in Tanagra?, Divya Jain, Sumanlata Gautam
397 Design of Moderate Speed and Moderate Resolution Successive Approximation Analog to Digital Converter?, Mr. Jitendra Waghmare?, Prof. P.M. Ghutke?
398 An Aggregate Key Based Cryptosystem for Secure Data Sharing in Cloud Computing?, R. Vanitha, V. Elavarasi?
399 Challenges and Security Issues in Cloud Computing?, Joshna S, Manjula P?
400 Multimodality Sensor System for Sleep- Quality Monitoring?, Ms. Snehal R. Sawale, Prof. Vijay S. Gulhane
401 Data Mining Technique its Needs and Using Applications?, Anup Arvind Lahoti?, Prof. P. L. Ramteke?
402 MONITORING OF RAILWAY BOGIES AND PREVENTING ACCIDENTS USING ARM7TDMI AND CAN PROTOCOLS, Siddu S Kadiwal?, Dr. C. Gurudas Nayak?, Shobha Kadiwal?, Gururaj Kadiwal?
403 An Advanced Watermarking and Compression of Images using SPIHT Compression, Shihas Abdul Razak J, Rekha Bhandarkar
404 A Review: Grid Computing, Ankit Punia, Ms. Pooja Mittal
405 The Multitenant Cloud Architecture?, JUEE DARYAPURKAR, PROF. KARUNA BAGDE
406 ISONET: HARDWARE BASED JOB QUEUE MANAGEMENT FOR MANY CORE ARCHITECTURES, Jeyanthi.S, Mrs. M. Deivakani?
407 Human Computer Interaction: Analysis and Journey through Eras?, Pratibha T Jose, Surbhi Miglani, Sanjay Yadav?
408 Survey on Network Based Intrusion Detection System in MANET?, Nithya Karthika M, Raj Kumar?
409 Social Authentication and Untrusted Clouds for Secure Location Sharing?, Miss. Priyanka K. Shinde, Prof. Nitin R. Chopde
410 Different Genetic Operator Based Analysis and Exploration of TSP?, Ashima Malik?
411 To Avoid Unwanted Messages from User Wall: Content Based Filtering Approach, Miss. Dipali D. Vidhate, Prof. Ajay P. Thakare?
412 CLUSTER ENHANCED SECURE AUTHENTICATION SCHEME FOR DATA INTEGRITY IN MANET?, A. Praveena, Dr. L.M. Nithya?
413 SECURE DATA TRANSMISSION IN MANETS USING DSR, AODV, TRUST PROTOCOLS?, K.Sangeetha, K.Rajakumari?
414 Hybrid Approach for Optimizing the Search Engine Result?, Ashish Kumar Kushwaha, Nitin Chopde?
415 AN IMAGE FORENSICS ANALYSIS OF DECISION FUSION APPROACHES, D.GOKILA BHARATHI, G.SELVAVINAYAGAM?
416 Enhancement the Security of WSN using ALARM Protocol to Prevention from Reply Attack?, Neelam Shekhawat, Moumita Ghosh
417 Review on ôImage Segmentation Methodsö?, Rita Harle, Prof. M. R. Joshi?
418 ASSOCIATION RULE MINING IN DISTRIBUTED DATABASE SYSTEM?, E.Deenadayalan, D.Kerana Hanirex, Dr.K.P.Kaliyamurthie?
419 A Comprehensive Study on Cloud Computing?, Suruchee V.Nandgaonkar, Prof. A. B. Raut?
420 Optimization of Rule - Based Medication Delivery in Large scale Healthcare Framework, G.Manikandan, Dr. S.Prabakaran?
421 A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES?, Er.Aman Kumar, Er.Naveen Bilandi?
422 An Enhancement in Centroid Algorithm in Range-free Grid Based Environment for Wireless Sensor Networks?, Gurleen Singh, Malti Rani?
423 Mail_Alert: Online Suspicious URL Detection of Tweets from Twitter Public Timeline, SPOORTHI K, SARVAMANGALA D R?
424 DETECTION AND RECOGNITION OF HUMAN FACE USING ANN TRAINED BY GENETICAL ALGORITHM?, Mr. Vaibhav N. Dhage, Prof. P. L. Ramteke?
425 ZigBee Wireless Sensor Network Technology?, Miss. Pooja V. Ingalkar, Prof. A. B. Deshmukh?
426 Enhancing Probabilistic Packet Marking by Integrating Dynamic Probability and Time to Live (TTL) Clustering?, Souzan Asadollahi?
427 DIAGNOSING SENSOR NODES AND DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS?, R. Dhivya Subathra, M. Suguna, D. Sharmila?
428 Detection of Fire Flow in Videos by SVM Classifier with EM-Segmentation Method?, S.Shanthi, J.George Christober
429 Performance Analysis of Dual Tail Comparator for Low Power Applications?, P. Raja Sekara Pandian, Mr. M. Krishnamurthy?
430 A Survey on Advanced Page Ranking in Query Recommendation?, Rinki Khanna, Asha Mishra?
431 An Approach for Finding Frequent Item Set Done By Comparison Based Technique, Ms. Ankita Parmar, Mr. Kamal Sutaria, Mr. Krutarth Joshi?
432 Client-Server Version of Energy Management through the Computational Outsourcing?, Sridevi.K, George Christober.J?
433 AN APPROACH TO SECURE LOCATION OF USER IN PERVASIVE COMPUTING ENVIRONMENT?, SUDHEER KUMAR SINGH, SHANSHANK SINGH, NITIN GOEL, RAHUL RANJAN
434 Efficient Allocation of Resources in Cloud Server Using Lopsidedness?, B. Selvi, C. Vinola, Dr. R. Ravi?
435 Secure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model?, Nidhi Mouje, Nikita Chavhan
436 EXTENDED STATE KALMAN FILTERING BASED FETAL ECG, MATERNAL ECG EXTRACTION & ESTIMATE THE MATERNAL BLOOD PRESSURE USING SINGLE CHANNEL RECORDINGS?, Remi D, Jebila S?
437 An Efficient Directional Multiresolution Image Representation using Contourlet Transform?, Ankita Sharma, Prof. Abhay Kumar, Prof. Rahul Deshmukh?
438 Integrating Static Analysis Tools for Improving Operating System Security, Ashish Joshi, Kanak Tewari, Vivek Kumar, Dibyahash Bordoloi
439 Brain Tumor Detection using Curvelet Transform and Support Vector Machine, Bhawna Gupta, Shamik Tiwari?
440 Utilizations of LSB Matching and Replacement for Efficiency Improvement in Digital Secret Communication, Nisha.M.J, G.H.Asha, Anandh Kumar.V, Mahendar.R?
441 MULTI LEVEL SECURITY ARCHITECTURE FOR NFC ENABLED CAR KEYS, Suman Chaudhary, Niharika Garg
442 Recognition of 2D Barcode Images Using Edge Detection and Morphological Operation, Priyanka Gaur, Shamik Tiwari?
443 Improve Performance by Task Scheduling Beneficial to Both User and Cloud Provider in Cloud Computing?, Drashti P. Hirani, Prof. Altaf B. Mogal?
444 Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network?, Samta Gupta, A. Prabhakar Rao?
445 Analysis of Packet Filtering Technology in Computer Network Security?, Miss. Rupali P. Hinglaspure, Prof. B. R. Burghate?
446 Ongole Breed Cattle Health Expert Advisory System Using Parallel Particle Swarm Optimization Algorithm?, B. Jogeswara Rao, Prof. M. S. Prasad Babu?
447 MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS?, Salman Raza, Ramzan Talib, Atif Amin?
448 RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM?, P.SUBBULAKSHMI, V.SHALINI?
449 FPGA IMPLEMENTATION OF DIGITAL WATERMARKING SYSTEM?, K.Tamilvanan, R.B.Selvakumar?
450 Development of Mushroom Expert System Based on SVM Classifier and Naive Bayes Classifier?, Prof. M.S. Prasad Babu?, Rajani Thommandru?, K.Swapna?, E.Nilima?
451 An Efficient Privacy Preserving Scheme for VANET?, BUVANESWARI GANESAN, BENNET PRABHA, MOHANA SUNDARI G?
452 Survey on Access Control Delegation to Protect and Maintain Privacy of Cloud Data, Nicholaus Gati, Sudhakar G.?
453 SURVEY ON PROTECTING PRIVACY AND SECURITY IN XML INFORMATION BROKERING?, Noe Elisa, K. Suresh Babu?
454 ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS, A.Napolean, M.Kaushika?
455 Color Image Segmentation using IMOWT with 2D Histogram Grouping?, Christo Ananth, A.S.Senthilkani, S.Kamala Gomathy, J.Arockia Renilda, G.Blesslin Jebitha, Sankari @Saranya.S.?
456 Cloud Computing for Academic Environment?, S. Palaniappan?
457 COMPARATIVE ANALYSIS OF SOFTWARE COST AND EFFORT ESTIMATION METHODS: A REVIEW, OMPRAKASH TAILOR, JYOTI SAINI, Mrs. POONAM RIJWANI?
458 A Self Destructing Data System Based on Active Storage Framework for Protecting Data Privacy from attackers UN agency?, R.Rengasamy, V.Kumaresan, G.Guru Rani?
459 An Industrial Investigation of Human Factors Effect on Software Productivity: Analyzed by SEM Model?, Rabia Khan, Israr Ahmed, Md. Faisal?
460 Design of Piezoelectric MEMS Sensor for Energy Harvesting from Low Frequency Applications, Swapnil D.Shamkuwar, Kunal N.Dekate?
461 Implementation of Hash Function Based On Neural Cryptography?, Vineeta Soni, Mrs. Sarvesh Tanwar, Prof. Prema K.V.?
462 MONITORING AND SECURITY SYSTEM OF LOCOMOTIVES USING CAN AND PRINCIPLE COMPONENT ANALYSIS?, Lingaraju M R, Pradyumna Bhat?
463 Reversible Watermarking Data Embedding into Images using DHS and IMC?, D.Maladevi, V.Rajaram, K.Thaiyalnayaki?
464 Improving Selfish Node Detection in ZigBee Wireless Network with Shortcut Tree Routing?, Mr. A. Mohanasundaram, Mr. R. Regin, Dr. P. S. Prakash?
465 Path Planning Algorithm for Mobile Anchor-Based Localization in Mobile Networks?, T. S. Lokhande, Prof. R. R. Shelke
466 AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING?, Neena Jose, Jini KM?
467 Secure Authentication with 3D Password?, GANESH JAIRAM RAJGURU?, Prof. P. L. Ramteke?
468 A Review of Rule Based Clustering and Routing Approach to Improve Clustered Network Communication?, Shafali Vashist, Mr. Samit Yadav?
469 Approaches for Combating Delay and Achieving Optimal Path Efficiency in Wireless Sensor Networks?, Agam Gupta, Mansi Gupta, Anand Nayyar?
470 Review of Routing Techniques Driving Wireless Sensor Networks, Shuchi Sharma, Mansi Gupta, Anand Nayyar?
471 A STUDY ON ISSUES AND TECHNIQUES OF WEB MINING, R. Munilatha, K.Venkataramana
472 A Review on Partitioning Techniques in Database?, Abhay Kumar, Jitendra Singh Yadav?
473 A Framework for an Outlier Pattern Detection in Weather Forecasting?, Miss. Kavita Thawkar, Prof. Snehal Golait, Prof. Rushi Longadge
474 Clustering Techniques Analysis for Microarray Data?, Shweta Srivastava, Nikita Joshi?
475 A Review: Security Issues in Mobile Ad Hoc Network?, Priti, Dr. Priti Sharma?
476 The Energy Efficient Multi-Hop Clustering Process for Data Transmission in Mobile Sensor Networks, V. Shunmuga Sundaram
477 Comparison of SVD-Watermarking and LSB-Watermarking Techniques?, Anupma Yadav, Anju Yadav?
478 Implementation of Reversible Sequential Circuits Using Conservative Logic Gates, Dhaarinee.S, Rajeswaran.N
479 A SURVEY OF SECURE AND PRIVACY PRESERVING IN SOCIAL NETWORK WITH GROUP MATCHING TECHNIQUES?, RESHMA ZUNKE, AMIT PIMPALKAR?
480 DESIGN AND ANALYSIS OF SRAM ARRAY STRUCTURES?, S.Divyapriya, Dr. P.Ramamoorthy?
481 Reversible Data Hiding and its Methods: A Survey?, Sukhdeep Kaur, Manshi Shukla?
482 Result Analysis for LBP and Shape Context Methodologies used as Authentication Mechanisms of Digital Signatures used for Certification?, Shraddha Kulkarni, Prof. Vikrant Chole
483 Optimizing the Performance and Secure Distributed Wireless Network in Unreliable D-NCS using CGA?, Babu Pinjar?, C.N.Chinnaswamy?
484 Dynamic Routing for ADA in Wireless Sensor Networks?, Nagaraj?, C.N.Chinnaswamy?
485 PROCURE DATA CENTRE SHARING SCHEME IN VIRTUAL CLOUD ENVIRONMENT USING CLOUDSIM?, Mr. P. Ranjith Kumar, Ms. M. Shanthi?
486 Effective Copyright Protection of Digital Products by Embedding Watermarking?, Monika Craig, Prof. Deepak Kapgate?
487 CYBER TERRORISM ATTACK OF THE CONTEMPORARY INFORMATION TECHNOLOGY AGE: ISSUES, CONSEQUENCES AND PANACEA, Kuboye Oluwafemi Samuel, Wan Rozaini Sheik Osman, Yazan Al-Khasawneh, Saif Duhaim?
488 Performance Improvement in Multimedia Answering By Web Excavation?, Aparna.N, Prathima.V.R?
489 Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach?, Krunal P. Bhaturkar?, Prof. Karuna G. Bagde?
490 Document Clustering Using Concept Weight?, Sapna Gupta, Prof. Vikrant Chole
491 An Analysis of Subspace Methods for Large South Indian Datasets, Krishna Murthy C.R, C.Naveena, T.C Manjunath?
492 A Simplified Review on Fast HSV Image Color and Texture Detection and Image Conversion Algorithm, Monika Deswal, Neetu Sharma?
493 A Framework for MEMS Based Hand Gesture Recognition System for Controlling the Mouse Cursor using Wireless Technology?, Khushbu Agrawal, Vikrant Chole?
494 Intrusion Detection using Fuzzy Data Mining, Sandeep Dhopte, Prof. Manoj Chaudhari
495 A Simplified Review on Study and Implementation of Recognizing Terrorist by Rapid Detection by Activities and their Facial Match, Ritu Kanwa, Samit Yadav?
496 Security in WLAN- Review of Security and Throughput Tradeoff?, Avinash Kaur, Harwant Singh
497 A DYNAMIC APPROACH FOR DATABASE SECURITY?, Mr. Mahesh Singh, Ms. Alka
498 Content Based Image Retrieval using Color Feature Extraction with KNN Classification, MS. PRAGATI ASHOK DEOLE, PROF. RUSHI LONGADGE?
499 A Novel Patient Centric Framework for Data Access Control in Semi-trusted Cloud Servers?, Allamaprabhu G Rudraxi, Mr. Parikshith Nayak S.K?
500 Network Security Analysis Based on Authentication Techniques?, Anupriya Shrivastava, M A Rizvi?
501 An Effective Approach on Scheduling Algorithm in Cloud Computing?, Suman Sangwan, Sunita Sangwan?
502 Intruder Proof and Secure Cryptography?, Ravinder Sangwan, Anshul Anand?
503 CONSIDERATION OF RELATIONSHIP ABILITY BY SUMMARIZED?, Dr. M.V.Siva Prasad, M.Shailaja, P.Swathi?
504 Achieving Optical Fiber Communication Experiments by OptiSystem?, Alla Abbas Khadir, Baydaa F. Dhahir, Xiquan Fu
505 Metadata-Based Modeling Approach: A Multi-Viewpoints UML Profile?, Ali Hassan Muosa?
506 A Review on GPS and its Applications in Computer Science?, POOJA SINGAL, DR. R.S.CHHILLAR
507 A Secure Routing Protocol for Wireless Adhoc Network Creation, Rajashekharagouda Patil, Shreedharamurthy S K?
508 MODIFIED MUTLIRESOLUTION MEDICAL IMAGE SEGMENTATION BASED ON WAVELET TRANSFORM?, Dr. K.R.Ananth, Dr. P.Navaneetham?
509 A Modified Version of DMAC Clustering Algorithm in MANET?, Ira Nath, Trisha Gorai?
510 A Comparative Analysis of Pro-active Routing Protocols in MANET?, B. Kondaiah, Dr. M. Nagendra
511 A New ANN, GRNN and RBF Neural Network for Heart Disease Diagnosis?, Pramod Kumar Yadav?, Dr. K.L.Jaiswal?, Dr. Kamlesh Singh?, Satish Pandey?
512 A Rule Based Clustering and Routing Approach to Improve Clustered Network Communication?, Shafali Vashist, Mr. Samit Yadav?
513 Improved Accuracy for Decision Tree Algorithm Based on Unsupervised Discretization, Ihsan A. Kareem, Mehdi G. Duaimi?
514 Improved Accuracy and User Satisfaction by Inferring User Search Goals based on Feedback Sessions?, Ms. S. S. Jadhav, Prof. N. D. Kale?
515 Which one is better - JavaScript or jQuery?, Md. Zeeshan Ahmed
516 IDS IMPLEMENTATION IN A PRIVATE CLOUD, Mr. Ashish Kumbhare, Mr. Manoj Chaudhari?
517 Rician Noise Reduction in MRI Images using Wave Atom Transform?, Shashi Jangra, Mr. Samit Yadav?
518 An Effective Method for Load Balancing in MANET?, Dr. M.V. Siva Prasad, P. Niranjan, B. Swathi?
519 Data Encryption Methods Used in Secure ATM Transactions?, CH. Krishna Prasad, G. Srinivasa Rao, Dr. M.V. Siva Prasad?
520 Image De-noising and its Methods: A Survey?, Barjinder Kaur, Manshi Shukla?
521 A Comparison of Performance Metrics for Various Routing Protocols in MANET?, Hemant Rai?
522 An Elegant Fusion of Concurrent Crawling and Page Rank Technique for Spidering Websites, Smita Marwadi?, Mr. Neelabh Sao
523 An Elegant Draw Near to Improve the Design of an E-commerce Website Using Web Usage Mining and K-Means Clustering?, S. Divya Rajan?, Mr. Neelabh Sao?
524 Adaptive Image De-Noising Model Based on Multi-Wavelet with Emphasis on Pre-Processing?, Shubhra Soni?, Ahsan Hussain?
525 A REVIEW ON DATA COMPRESSION USING STEGANOGRAPHY?, Tamanna Garg, Sonia Vatta?
526 FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE?, Er. Shikha Pandit, Er. Pritam Kumar, Er. Deepak Malik?
527 Improved Accuracy Distribution Localization in Wireless Sensor Networks?, Asmaa Q. Shareef, Maad M. Mijwel?
528 SECURITY PROTOCOL FOR SENSOR NETWORK USING RSA?, Sridevi?
529 A Survey on Data Storage and Security in Cloud Computing?, V. Spoorthy, M. Mamatha, B. Santhosh Kumar?
530 Cloud Testing: A Review Article?, Radhika Batra, Naveen Sharma
531 Earthquake Reporting System by Using Real Time Nature of Twitter?, SK.Haseena, P.Sandeep Reddy, Dr. M.V Siva Prasad?
532 SATELLITE BANDWIDTH ALLOCATION FOR SATELLITE ROUTED SENSOR NETWORKS?, Ambika Telkar, Mr. S.V.Niranjanamurthy?
533 QR Code Scanning app for Mobile Devices?, Mircea Moisoiu, Andrei Negr?u, Robert Gy?r÷di, Cornelia Gy?r÷di, George Pecherle?
534 DETERMINATION USING GPS WITH ENHANCE SECURITY LOCATION MEASURES, Pratima, Ramandeep Kaur?
535 REAL-TIME SCHEDULING OF SOFT PERIODIC TASKS ON MULTIPROCESSOR SYSTEMS: A FUZZY MODEL, Reshu Manwani, Nisha Phogat?
536 A Comparative Study on Data Aggregation in Wireless Sensor Networks by using Directed Diffusion and Ant Colony Algorithm?, M. Shailaja?
537 TUNNEL-BASED IPV6 TRANSITION WITH AUTOMATIC BANDWIDTH MANAGEMENT, Srinidhi K S, Smt. R. Anitha, A.V.Srikantan
538 KEYWORD GENERATION FOR SEARCH ENGINE ADVERTISING?, Pratik Joshi, Imran Pathan, Aamir Khan?
539 Leader Election Algorithms in Distributed Systems?, Seema Balhara, Kavita Khanna?
540 Measuring Height of an Object using Accelerometer and Camera in iOS and Android Devices?, Anmole Dewan, Abhijeet Sharma, Tanupriya Choudhary, Vasudha Vashisht?
541 PREVENTION OF VAMPIRE ATTACKS TO CONTROL ROUTING BEHAVIOR IN WIRELESS AD HOC SENSOR NETWORKS?, Kavya.H.B, Manjunath R Raikar?
542 Application of Cloud Rank Framework to Achieve the Better Quality of Service (QoS) Ranking Prediction of Web Services?, Miss. Shraddha B.Toney, Prof. N.D.Kale?
543 An Efficient Face Recognition using PCA and Euclidean Distance Classification?, Ashutosh Chandra Bhensle, Rohit Raja?
544 FOOT STEP POWER GENERATION SYSTEM FOR RURAL ENERGY APPLICATION TO RUN AN AUTOMATED TOLL GATE SYSTEM?, Vinod Katti, Dr. Nagabhushan Katte?
545 Text Grouping using Textual Entailment?, Partha Pakray?
546 A Semi-Distributed Load Balancing Algorithm Using Clustered Approach?, Shweta Rajani, Renu Bagoria?
547 Survey of Creating Location Based Regions of Spatial Queries Using Proxy Approach in Mobile Environments?, K.Suresh Babu, Swetha Madireddy
548 Improving the Effectiveness of Marketing and Sales using Genetic Algorithm?, Pratima O. Fegade, Prof. Dinesh D. Patil?
549 SURVEY ON HETEROGENEOUS NETWORK TRAFFIC ANALYSIS WITH SUPERVISED AND UNSUPERVISED DATA MINING TECHNIQUES?, D.Jayachitra, Dr. J. Jebamalar Tamilselvi?
550 An Analysis of Genetic Algorithm and Tabu Search Algorithm for Channel Optimization in Cognitive AdHoc Networks?, V.Jayaraj, J.Jegathesh Amalraj, S.Hemalatha?
551 Analysis of Location Based Routing Protocols against Wormhole Attack for MANETs: A Literature Survey?, Devendra Kumar, Deepak Kumar Xaxa?
552 Call Admission Control and Resource Utilization in 3G Networks?, K. Prasuna, Chilakalapudi Meher Babu, Dr. Ujwal A. Lanjewar, K. Priya?
553 Modified Shape Context for Signature Verification of Automated Cheque Authentication System?, Sangeeta Girish Narkhede, Prof. Dinesh D. Patil?
554 MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING?, Dr. Sandeep Dalal, Poonam Rani?
555 A NEAR WELLBORE SIMULATOR?, Zeeshan Ahmad, Jaspal K Saini, Haziq Jeelani?
556 Data Broadcasting Approximation Algorithms for Wireless Networks, B.Sujatha, S.Nagaprasad, G.Srinivasa Rao?
557 Study of Energy Consumption in DSR using NS2, Palak, Nasib Singh Gill?
558 Multi-Robot Co-ordination For Box-Pushing using Embedded Controller?, Ketaki.P.Dahale, Vijay.D.Chaudhari, Kantilal.P.Rane?
559 A Comparison and Selection on Basic Type of Searching Algorithm in Data Structure?, Kamlesh Kumar Pandey, Narendra Pradhan?
560 Performance Evaluation of AODV and AODV-LR in terms of Route Maintenance, R. Vijayadharshini?, Dr. A. Padmapriya?
561 Design and Development of Speech Database for Travel Purpose in Marathi?, Pooja V. Janse, Ratnadeep R. Deshmukh, Smita B. Magre
562 A Novel Interoperable Mobile Wallet Model with Capability Based Access Control Framework?, Neeharika P, V N Sastry?
563 DESIGN AND IMPLEMENT PRIVACY PROTECTION FOR SECURE INFORMATION BROKERING SYSTEMS, SHAIK.MAHABOOB BASHA, A.BHASKAR, D.V SATISH KALADHAR REDDY?
564 Distributed Data Collection Scheme for Store and Forward Information in Wireless Sensor Network?, Madhavi S. Kukade, Prof. Kapil N. Hande?
565 Automated Window 8 Security and Safety System?, Geeta?, Dr. Neelam Sharivastav?
566 FoCUS ľ Forum Crawler Under Supervision?, V.Rajapriya?
567 Intelligent Pressure Measuring System, Shayama Subair, Lizy Abraham?
568 EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)?, B.Ashok, V.Sucharitha?
569 A Review on Question Generation System from Punjabi Text Contain Historical Information?, Parshan Singh, Rajbhupinder Kaur?
570 EFFICIENT POWER FACTOR MEASUREMENT SYSTEM WITH LABVIEW INTERFACING FOR HOUSEHOLD APPLICATIONS?, Arya Krishna.S, Lizy Abraham?
571 Wireless Acoustic Signal Monitoring Using MEMS sensor and ATmega on LabVIEW Platform?, Swathy L, Lizy Abraham?
572 Efficient Image Retrieval Using Different Content Based Image Retrieval Methods: A Review, Priyanka Srivastava, Dr. K.S.Patnaik?
573 A Review on Compressive Sensing in Synthetic Aperture Radar (SAR)?, Ankit, Manoj Ahlawat?
574 Using the Literature to Develop a Preliminary Conceptual Model for the Student Success Factors in a Programming Course: Java as a Case Study?, Salam Abdulabbas Ghanim, Nassir Jabir Al-khafaji?
575 A Review on Comparative Analysis of Routing Protocols of MANET?, Umara Urooj, Nafees Ayub, Ramzan Talib, Yahya Saeed?
576 Securing Online Name System through Trust Demonstrating and Temporal Analysis, Chandana Krishna Sivunigunta, Sudha.K?
577 A Generalized Flow-Based Method for Research on Acted Relationships in Wikipedia?, Nalini N, Padmavathi V, Prudhvi Raj V?
578 Polymorphic Worms Collection in Cloud Computing?, Ashraf A. Shahin?
579 A Lightweight Access for Hybrid Mobile Web Cloud Content Architecture, Shawkat K. Guirguis, Adel A. El-Zoghabi, Mohamed A. Hassan?
580 An Implementation of Early Warning of Floods along Zambezi Basin Through the Use of Context-Awareness?, Munyaradzi Magomelo, Hilton Chikwiriro, Clive Gurure?
581 IMAGE QUALITY ASSESSMENT BY USING AR PREDICTION ALGORITHM WITH INTERNAL GENERATIVE MECHANISM?, C. Naga Venkat Raam, K. Lakshmi Bhavani?
582 Segmentation of Medical Images using Image Registration?, A.Nirmala, V.Sridevi?
583 The Role of Data Warehousing Concept for Improved Organizations Performance and Decision Making?, Nwakanma Ifeanyi, Egbivwie Oghenevwoke, Azike Uchenna, Nwaobilo Amarachi, Ibeji Chinedum, Ohia Nwabueze?
584 A Hybrid Approach used to Stem Punjabi Words?, Puneet Thapar?
585 Advance Reservation of Resources in Workflow System?, Lalit?, Dr. Hardeep Singh?
586 Service Selection by Predicting Website Attender Information´╗┐, Prof. Dr. Zafer Agdelen; Dr. Amir Reza Shahbazkia´╗┐
587 Neighbourhood Countries Text Translation by Help of Mathematical Rules (Independent of Any Electronic Devices)´╗┐, Prof. Dr. Ali Haydar; Dr. Amir Reza Shahbazkia
588 Machine Translation by Homograph Detector with the Help of Grammatical Base of Persian Words´╗┐, Prof. Dr. Zafer Agdelen; Dr. Amir Reza Shahbazkia´╗┐
589 Superimposed Rule-Based Classification Algorithm in IoT´╗┐ , Ivy Kim D. Machica; Bobby D. Gerardo; Ruji P. Medina´╗┐
590 Development of Text Recognition Prototype with Classification of Neural Networks AND Text-To-Speech in Javanese Scripts Using Incremental Methods´╗┐ , Ifan Prihandi; Indra Ranggadara; Boy Yuliandi´╗┐
591 Tableau Big Data Visualization Tool in the Higher Education Institutions for Sustainable Development Goals´╗┐ , Ahmed M. Amer; Mohamed M. EL-Hadi´╗┐
592 Detecting Digital Forgery Using Image Processing in Zero Day Attack , L. Haider Hameed Razzaq; Dr. Ghadah Al-Khafaji´╗┐
593 Information Governance: A Necessity in Today's Business Environment´╗┐ , Ripon Datta; Mounicasri Valavala; Md Haris Uddin Sharif´╗┐
594 Multidimensional Modeling of Semi-Structured Data: XML Documents and Tweets´╗┐ , Kais Khrouf´╗┐
595 A New Approach for Data Cryptography´╗┐ , Ziad Alqad; Majid Oraiqat; Salah Al-Saleh; Hind Al Husban; Soubhi Al-Rimawi´╗┐
596 ESP32 Based Data Logger´╗┐ , Ibrahim Al Abbas´╗┐
597 Brain Computer Interface (BCI)´╗┐ , Abdallah Abdelaziz´╗┐
598 The Examination of Analyzing Data by Algorithm Performance´╗┐ , Farhad Shamssoolari´╗┐
599 Retina Random Number Generator for Stream Cipher Cryptography´╗┐ , Murooj Aamer Taha; Naji Mutar Sahib; Taha Mohammed Hasan´╗┐
600 Numerical Simulation of the Coupled Dynamic Thermoelastic Problem for Orthotropic Bodies´╗┐ , Kalandarov A.A.; Babadjanov M.R.´╗┐
601 Optimized Siting and Sizing of DG in a HESCO Feeder using Particle Swarm Optimization , Shahbaz Ahmed; Mahesh Kumar; Syed Hadi Hussain; Zubair Ahmed Memon´╗┐
602 A Review on Cloud Computing Security´╗┐ , Oluyinka. I. Omotosho´╗┐
603 Semantic based e-Housing Platform for Urban Regions´╗┐ , Omotosho, Oluyinka. I.; Adeyanju, Ibrahim A.´╗┐
604 A POPBL CONCEPTUAL FRAMEWORK FOR THE DESIGN AND IMPLEMENTATION OF ASICs´╗┐ , Terungwa Stephen Akor; Kamalularifin bin Subari; Hanifah binti Jambari; Amirmudin bin Udin; Sarimah binti Ismail´╗┐