Category Archives: Volume 3 Issue 2 February 2014

Volume 3 Issue 2 February 2014

S.No. Title and Authors of Paper Page.No.
1 A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs
Vijaya Lekshmi. S.V, E.P.Prakash
246-250
2 RFID Technology in Bank Services
Sana Azari, Somayyeh Jafarali Jassbi, Midia Reshadi
251-255
3 Click Based Authentication For Accessing Web Accounts
Rohit Urade, Roshan Kumar, Dinesh Gawande, Sejal Jawade, Ashwini Awchat
256-259
4 Identification of Phishing Web Pages and Target Detection
Purnima Singh, Manoj D. Patil
260-263
5 Combine Study of Transmission Line Fault Detection Techniques
Rucha V. Deshmukh, A.Prof. M. R. Salodkar
264-267
6 Investigating Interesting Rules Using Association Mining for Educational Data
Dr.Vijayalakshmi M N,S.Anupama Kumar,Kavyashree BN
268-271
7 Load Balancing Algorithms in Cloud Computing Environment – A Methodical Comparison
J. Uma, V. Ramasamy, A. Kaleeswaran
272-275
8 An Efficient Mining Model For Enhancing Text Classification Using k-NN
T.SIVAKUMAR,A.KALEESWARAN
276-284
9 The New Era of Transmission and Communication Technology : Li-Fi (Light Fidelity)LED & TED Based Approach
Ravi Prakash, Prachi Agarwal
285-290
10 Improved Particle Swarm Optimization for Wireless Intelligent Surveillance Path Planning using Wireless Sensor Network
Mr. R.Baskarane, Mr. T. Sendhil kumar, Mr. A.Parthiban
291-296
11 A Survey on Greedy Routing Using Clustering Approach in VANET
Karupparaya yuvaraja.S, K.Aravindhan
297-300
12 A NOVEL APPROACH FOR DESIGNING A D-FLIP FLOP USING MTCMOS TECHNIQUE FOR REDUCING POWER CONSUMPTION
Megala. C. D,Venkatesan .K
301-306
13 A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps
Subhajit Bhattacharyya, Nisarga Chand, Subham Chakraborty
307-312
14 Cloud Computing an Era in the World
V. Vijayalakshmi, S. Thamizharasan, P. Mahalakshmi
313-319
15 Double-phase Microaggregation for Protecting Bio-medical Data in Mobile Health
S. Saranya, M. Madan mohan, X. Rexeena
320-323
16 Risk Assessment for Diabetes Mellitus using Association Rule Mining
X.Rexeena, B.Suganya Devi, S.Saranya
324-328
17 Enhancement of a Novel Secure Dependable Data Storage & Privacy in Cloud Network
Prof. B. Anuradha, V. Nithya
329-333
18 Detect and Isolate Black hole attack in MANET using AODV Protocol
Jaspinder Kaur,Birinder Singh
334-338
19 HYBRID RECOMMENDATION USING ASSOCIATION RULE MINING BY PARTIAL EVALUATION OF WEB PERSONALIZATION FOR RETRIEVAL EFFECTIVENESS
Richa Soni,Gurpreet Kaur
339-348
20 Vegetation of Low Cost Remote Sensing Images by Mean Shift Algorithm
S.Chitra, R.Subash, C.Premalatha
349-353
21 A Survey: Hadoop, Managing Large Data very efficiently
Yadav Krishna R ,Ms. Purnima Singh
354-356
22 A PCQP Technique Of Location Based Service To Improve k-NN Search Using Secret Circular Shift
B.LEKSHMI JAIN,R.S SYAM DEV,M. MADAN MOHAN
357-363
23 ROUGH SETS APPLICATION FOR STUDENTS CLASSIFICATION BASED ON PERCEPTUAL DATA
Asheesh Kumar, Naresh Rameshrao Pimplikar, Apurva Mohan Gupta
364-371
24 Subspace Clustering using CLIQUE: An Exploratory Study
Jyoti Yadav, Dharmender Kumar
372-378
25 A Comparative Analysis on Symmetric Key Encryption Algorithms
G. Muthukumar,Dr. E. George Dharma Prakash Raj
379-383
26 Application of Monte Carlo method in Grid Computing and Allied Fields
Manas kumar Yogi, Vijaya kranthi chinthala
384-388
27 REVIEW OF IMPERCEPTIBLE TECHNIQUES FOR STILL DIGITAL IMAGE WATERMARKING
Ms. Chandrakala J. Chetri,Dr. Subhaschandra G. Desai
389-395
28 Active Contours based SAR Image Segmentation with G0- Statistical- Model
D.SriDevi, J.Marimuthu
396-398
29 A Novel Fuzzy Control Approach for the Allocation of Virtualized Resource
R. Nandhiniprabha, G. Sudhakar, M. Madan Mohan
399-402
30 SELF COLLIMATION IN PILLAR TYPE PHOTONIC CRYSTAL USING COMSOL
S.Hemalatha , K.Shanthalakshmi
403-407
31 HAVS: Hadoop Based Adaptive Video Streaming by the Integration of Cloudlets and Stratus
Keerthika Janani.M ,Sudhakar.G
408-413
32 A Review of Phase Correction Methods for Partial Fourier Reconstruction of MRI
Sivadas Neelima, Lakshmi Prabha P
414-418
33 GSM Based Alphanumeric Scrolling Display System
Raj Hakani
419-422
34 Comparison and performance analysis of routing protocol for mobile adhoc network
Lokeshwer Sinha, Samta Gajbhiye
423-426
35 Survey on Packet Hiding Scheme for Network Security by Selective Jamming Attacks
Katkar Kiran B., Dukare Ajay B., Pawar Monali R., Darandale Dnyaneshwar R.
427-431
36 K-Means Based Clustering In High Dimensional Data
Sindhupriya. R, Ignatius Selvarani. X
432-433
37 Survey on Playlist Generation Techniques
Sneha Antony, Jayarajan J N
437-439
38 Real Time News Reporting Using MOBICLOUD
Dahale Jyoti A. , Ahirrao Swapnil S. , Bhagwat Sagar S. , Autade Yogesh S.
440-443
39 Novel Approach to Discover Effective Patterns For Text Mining
Rujuta Taware, Prof. Sanchika A. Bajpai
444-448
41 AN EFFECTIVE ALGORITHM FOR COMPARISON OF REAL-TIME AND NON-REAL TIME DATA IN TEMPORAL BASED ACTIVITY MODEL
G.Karthika, V.Bhuvaneshwari ,G.Elavarasi
454-457
42 Emotion classification of textual document using Emotion – Topic Model
S.Sujitha, S.Selvi, J.Martina Jasmine
458-462
43 A RESEARCH: RESOLUTION FOR TYPICAL QUESTIONS IN TEMPORAL EXPRESSION(TERSEO) WITH THE HELP OF FILE.C ,WHAT.OUTPUT
Vijayaraghavan.U, Dr.Kumar.A,Sivakumar.V, Maharajan.K,Vijayalakshmi.S
463-469
44 Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique
V.Rakesh, S.Prashanth, V.Revathi, M.Satish, Ch.Gayatri
470-474
45 Q-FACTOR IMPROVEMENT IN 32 APSK FOR LONG HAUL OPTICAL COMMUNICATION
Sathiya vathi B , Siva kumar M
475-478
46 An Evolution of Testing In Software Engineering
K. Rajasri, T. Godwin Selva Raja
479-482
47 Smart Address Book
Saurabhee A. Wandhekar,Amey P. Pagar,Sagar V. Yewatkar, Shivkanya S. Shinde
483-486
48 Secure Frequent Itemset Hiding Techniques in Data Mining
Arpit Agrawal,Jitendra Soni
487-495
49 Liver And Hepatic Tumors Segmentation in 3-D CT Images
Christo Ananth, D.L.Roshni Bai, K.Renuka, A.Vidhya, C.Savithra
496-503
50 Comparative Study of Routing Protocols in MANET
Prerna Yadav,Shubhra Saxena
504-509
51 Dynamic Cluster Scoring Job Scheduling algorithm for grid computing
S. Dineshbabu, S. Supriya
510-514
52 Attendance Monitoring Using Image Processing
Divya Singh, Monica Kamnani, Ruhi Hadke,Shruti Khonde,Valhavi Patil, Mitali.R. Ingle
515-518
53 A Review of Empirical Evaluation of Software Testing Techniques with Subjects
Manika Tyagi, Sona Malhotra
519-523
54 Secret Sharing in Multisession Using Peer Head Authority
S.Pavithra, R.Jeyanthi
524-527
55 A machine doctor that diagnosing ophthalmology problems using Neural Networks
A.Jenefa, R.Ravi,H.Manimala
528-533
56 DESIGN AND PERFORMANCE ANALYSIS OF FAULT SECURE NETWORK-ON-CHIP USING FPGA
C.Ashok Kumar, P.Muneeswari, K.Rajkumar
534-539
57 Job Scheduling in Cloud Computing using Ant Colony Optimization
Dr.D.Maruthanayagam,T. Arun Prakasam
540-547
58 AUTOMATIC TRACK CREATION AND DELETION FRAMEWORK FOR FACE TRACKING
Renimol T G, Anto Kumar R.P
548-552
59 Overview of Sequential Pattern-Mining Algorithms
Prof. Kirti S. Patil.
553-555
60 An Improved Fuzzy C-means Algorithm learned wavelet network for segmentation of Dermoscopic image
LishaRajan T L,Jemila Rose R
556-563
61 A Comparative Study of Various Filters in Image Denosing with Curvelet Transformation
Sunil Kumar Naik,Abha Choubey
564-567
62 PREVENTING DNS BASED BOTNET COMMUNICATION FOR DDOS ATTACK
K.Suganya, Asst.Prof C.Gomathi
568-574
63 DOMAIN KNOWLEDGE IDENTIFICATION AND CLASSIFICATION FOR DISEASE DIAGNOSIS
Jothilakshmi.M, Asst.Prof Anuvelavan.S
575-581
64 SCHEDULING TRANSFERABLE OBJECTS FOR QUERY PROCESSING IN WSN
S.Kanimozhi,Asst.Prof P.Karthikeyan
582-589
65 Multi Level Malicious Behaviour Detection and Analysis Using Genetic Algorithm for Social Network
Sudhansu Gaur, Ashwani Kumar
590-597