S.No. |
Title and Authors of Paper |
Page.No. |
1 |
A Verification Method Based On Petri Net for Online Student Registration Web Service Composition
A.Kumaravel, M.Merlin Mexa |
1663-1669 |
2 |
An Overview of Partial Shuffle for Database Access Pattern Protection Using Reverse Encryption Algorithm
Priti V. Bhagat, Rohit Singhal |
1670-1673 |
3 |
ENHANCED TECHNIQUE FOR SECURED AND RELIABLE WATERMARKING USING MFHWT
Sandeep Kaur, Rajiv Bansal |
1674-1677 |
4 |
DESIGN OF WI-FI INTEGRATED SOPHISTICATED METER USING EMBEDDED SYSTEM
Iswarya.V |
1678-1683 |
5 |
CLASSIFICATION BY K-MEANS CLUSTERING
MUKESH KUMAR CHOUDHAR, MANDEEP SINGH SAINI, PALVEE |
1684-1688 |
6 |
Harris-Hessian Algorithm for Coin Apprehension
Saranya das.Y.M,R.Pugazhenthi |
1689-1693 |
7 |
Modified Dactylogram Sifting
Geethu V S, V.Selvakumar |
1694-1698 |
8 |
Preserving Privacy Using Data Perturbation in Data Stream
Neha Gupta, IndrJeet Rajput
|
1699-1704 |
9 |
A Study of Secure Routing in Mobile Ad-hoc Networks
Desai Piyusha P. |
1705-1708 |
10 |
Secure Data Transmission using Watermarking and Image Compression
Dr. Ajit Singh, Meenakshi Gahlawat |
1705-1715 |
11 |
Mitigating Denial of Service Attacks in Wireless Networks
S. Raja Ratna,R. Ravi,Dr. Beulah Shekhar |
1716-1719 |
12 |
Packet Load Generator for Telecom Networks
Niranjan U, Ramacharyulu P Govardhanam, K Vijaya |
1720-1724 |
13 |
Fusion of Statistic, Data Mining and Genetic Algorithm for feature selection in Intrusion Detection
MeghaAggarwal, Amrita |
1725-1731 |
14 |
Efficient and Reliable Resource Management Framework for Public Cloud Computing
M.Sasitharagai, T.Rajendran, M.Malarmathi |
1732-1737 |
15 |
Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
Sanaz Jafari, Prof.Dr.Suhas H. Patil |
1738-1742 |
16 |
750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
Alka Szeerin Mansoori |
1743-1748 |
17 |
Performance Analysis of IIR Digital Band Stop Filter
Subhadeep Chakraborty, Abhirup Patra |
1749-1756 |
18 |
Cooperative Defense against Pollution Attack in P2P System with Network Coding
Dr Siddaraju, Chitresha Mehta |
1757-1761 |
19 |
Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks
Mya Thidar Myo Win, Kyaw Thet Khaing |
1762-1765 |
20 |
A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset
Thwe Thwe Oo, Thandar Phyu |
1766-1770 |
21 |
Design and Implementation of Structured and Unstructured Data Querying System in Heterogeneous Environment
Thu Zar Mon |
1771-1775 |
22 |
Intrusion Alert Elimination on Network Attack Alerting System
Mon Mon Zaw |
1776-1779 |
23 |
A Survey on Windows Component Loading Vulnerabilities
U.Haritha, V.Lokanadham Naidu |
1780-1783 |
24 |
Enforcing Multi-user Security Policies in Cloud Computing
Mrs. Shubhada P. Mone, Mrs. Sunita S. Dhotre |
1784-1788 |
25 |
Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks
Dr. D. SENTHILKUMAR, R. GANESAN, B. ESHA RAFFIE |
1789-1800 |
26 |
Audio-based Classification of Video Genre Using Multivariate Adaptive Regression Splines
Hnin Ei Latt, Nu War |
1801-1805 |
27 |
Cost Estimation Modal to find faulty Objects in Software Reusable Components
Ramadeep Kaur, Sami Anand |
1806-1810 |
28 |
Overview of Impact of Requirement Metrics in Software Development Environment
Mohd.Haleem, Prof (Dr) Mohd.Rizwan Beg, Sheikh Fahad Ahmad |
1811-1815 |
29 |
A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
G.Sunitha, Dr.A.Jaya |
1816-1819 |
30 |
The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking
Mya Thidar Kyaw, Dr. Kyi Soe |
1820-1824 |
31 |
WEIGHT ROTATION TECHNIQUE FOR PAPR REDUCTION IN OFDM
S.P.Vijayaragavan,R.Sakthivel,B.Karthik |
1825-1828 |
32 |
Key Frame Extraction for Video Summarization Using DWT Wavelet Statistics
Khin Thandar Tint, Dr. Kyi Soe |
1829-1833 |
33 |
AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
M.Sivapriya, S.Pushpa |
1834-1840 |
34 |
A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)
Kiranjit Kaur,Sami Anand |
1841-1843 |
35 |
The optimize load balancing in cluster computing
Mr. Sunil Kumar Pandey, Prof. Rajesh Tiwari |
1844-1849 |
36 |
Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System
Phyu Thi Htun, Kyaw Thet Khaing |
1850-1854 |
37 |
Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors
Phyu Thi Htun, Kyaw Thet Khaing |
1855-1860 |
38 |
Fuzzy RDBMS Design: SQL Add-On
Subita Kumari, Sonia |
1861-1865 |
39 |
Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Pinki Yadav, Partha Pratim Bhattacharya |
1866-1872 |
40 |
Simulative analysis for Image Denoising using wavelet thresholding techniques
Virendra Kumar, Dr. Ajay Kumar |
1873-1878 |
41 |
Human Identification Based Biometric Gait Features using MSRC
Nyo Nyo Htwe, Nu War |
1879-1885 |
42 |
MEMS ACCELEROMETER BASED HAND GESTURE RECOGNITION
Meenaakumari.M, M.Muthulakshmi |
1886-1892 |
43 |
Security Analysis of Fair E-cash Payment System
Thae Nu Nge |
1893-1896 |
44 |
Fairness of Optimistic ID-Based Concurrent Signature Schemes
Pearl Ei Phyu |
1897-1900 |
45 |
Analysis and Improvement on a Single Unit Cyclic Fair Exchange Protocol for Multi-party
Nay Chi Htun, Khin Khat Khat Kyaw |
1901-1903 |
46 |
Reconfiguration of Memory for High Speed Matrix Multiplication
Ms. Shamshad Shirgeri,Ms. Pallavi Umesh Naik, Mrs. Rohini, Prof. Krishnananda Shet |
1904-1908 |
47 |
A Survey on Algorithms for Cluster Head Selection in WSN
Srie Vidhya Janani. E, Ganeshkumar.P, Vasantha Suganthi.G, Sultan.M, Kaleeswaran. D |
1909-1913 |
48 |
STUDY OF QUANTUM CRYPTOGRAPHY
Swapnika,Rajani bala,Kavita |
1914-1917 |
49 |
Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform
Sangeeta Madhesiya, Shakil Ahmed |
1918-1923 |
50 |
Energy Enhancement in AOMDV
Alpesh chauhan, Prof.B.V.Buddhdev |
1924-1929 |