S.No. |
Title and Authors of Paper |
Page.No. |
1 |
AUTOMATIC LIVER SEGMENTATION USING MEAN-SHIFT TECHNIQUES
SUDHA.P.,Dr.T.Arumuga Maria Devi |
3598-3602 |
2 |
A Status Report on Resource Allocation in Cloud Computing Using Queuing Theory
R.Murugesan, C.Elango, S.Kannan |
3603-3608 |
3 |
A Survey on Energy Efficient Wireless Communication in Cellular Networks
Suganya Rajendran, C.Jaya suriya |
3609-3614 |
4 |
Data Rescue Process in Network Medium with Higher End Security Measures
Praveena.S, RajeshKannan.C |
3615-3619 |
5 |
REAL TIME FACE DETECTION: SURVEY
Bavitra Krishnan , Y.R.Packia Dhas |
3620-3625 |
6 |
A Survey on Vehicular Internet Access Techniques
M. ShahinaThasneem, S.I.Padma |
3626-3632 |
7 |
Influence of machine learning techniques on Authorship attribution for Telugu text features
S.NAGAPRASAD,T.RAGHUNADHA REDDY,Dr. P.VIJAYAPAL REDDY,Dr. A.VINAYA BABU,Dr. B. Vishnu Vardhan |
3633-3640 |
8 |
Multiple Inpainting of low resolution images using examplar and super resolution algorithm
A.Breezy Joy, C.Rekha |
3641-3648 |
9 |
Dual level Image watermarking using SVD and Edge detection technique
Shiney Dang , Jagandeep sidhu |
3649-3652 |
10 |
A Survey on Brain Tumor Classification Using Artificial Neural Network
M .Queen, T.M. Babi Mol |
3653-3657 |
11 |
EXPLORATION OF DISTRIBUTED GENERATION FOR FUTURE DISTRIBUTION NETWORKS
Surbhi Bakshi, Tilak Thakur, Rintu Khanna |
3658-3666 |
12 |
Review Paper on Identification of Plant Diseases Using Image Processing Technique
Rani Pagariya, Mahip Bartere |
3667-3669 |
13 |
ANALYSIS OF ENERGY CONSUMING FOR CORRELATION BASED DATA AGGREGATION
R.Vijila, C.S.Thayanandeeswari |
3670-3675 |
14 |
An Integrated System for Recognition of Facial Expression and Head-Pose Estimation
Divyanshu Dewangan, Shrikant Tiwari, Yamini Chouhan |
3676-3679 |
15 |
Review: Predicting The Efficiency of Difficult Keyword Queries Over Databases
Miss. Varsha Vetal, Mrs. Sanchika Bajpai |
3680-3683 |
16 |
Image Registration and Restoration from Multiple degraded colour images
Anil Kumar Pandey, Rohit Raja, Yamini chouchan |
3684-3690 |
17 |
A Survey On Security Evaluation Of Pattern Classifiers Under Attack
Sandhyarani Sambhaji Patil, Dnyaneshwar A. Rokade |
3691-3693 |
18 |
A REVIEW ON DESIGN OF PIPELINED ADC
J Monica,Prof.P.Kannan |
3694-3698 |
19 |
Steering Vector and Interference Cancellation of Two-Dimensional Arrays
Fahad Alraddady |
3699-3702 |
20 |
LOGIC EFFORT OF CMOS BASED DUAL MODE LOGIC GATES
D.Rani, R.Mallikarjuna Reddy |
3703-3710 |
21 |
Study of Detecting Malicious Nodes in MANET and Fault tolerance: A Survey
T. PARAMESWARAN, Dr. C. PALANISAMY, T. JASMINE SONIA |
3711-3716 |
22 |
PERFORMANCE EVALUATION FOR CAH-MAC USING DSRC VEHICULAR SAFETY COMMUNICATION
T. PARAMESWARAN, Dr. C. PALANISAMY, A.NITHYA |
3717-3722 |
23 |
A Survey on Improving the Lifetime of the Network in Mobile Adhoc Network
Dharani D, Dr. Devaki P |
3723-3726 |
24 |
Enhancing Cohesion Metrics in Refactoring with Code Smells
J. Kaviarasi, P.R. Jayanthi |
3727-3730 |
25 |
Survey on Medical Data Cluster analysis using Feature Selection and Neural Networks
V.Sangeetha, J.Preethi, M.Sreeshakthy |
3731-3738 |
26 |
Secured Green Payments using NFC Device
Subhasini Dwivedi,Shraddha Panbude,Rama Rao |
3739-3744 |
27 |
A COMPARATOR WITH REDUCED OFFSET VOLTAGE & DELAY TIME IN 130nm CMOS
Ms. Ankita Bhatia, Mrs.Susmita Mishra |
3745-3747 |
28 |
Automatic Text Detection from Images
Jignesh N Solanki, Viral D Sanghvi |
3748-3751 |
29 |
CLOUD
COMPUTING AND METHODS FOR PRIVACY PRESERVATION: A SURVEY
Mr. R. Nallakumar,Dr. N. Sengottaiyan, M.MohamedArif |
3752-3756 |
30 |
A SURVEY ON DISEASE DIAGONSIS ALGORITHMS
Aanchal Oswal, Vachana Shetty, Mustafa Badshah, Rohit Pitre, Manali Vashi |
3757-3761 |
31 |
Survey Paper on Vehicle Tracking System using GPS and Android
Amol Dhumal, Amol Naikoji, Yutika Patwa, Manali Shilimkar, Prof. M. K. Nighot |
3762-3765 |
32 |
REVIEW PAPER ON BRAIN IMAGE SEGMENTATION USING CHAN-VESE ALGORITHM AND ACTIVE CONTOURS
Payal Gupta,Er. Satinderjeet Singh |
3766-3769 |
33 |
UBPS :User Based Personalized Search With Big Data
S.Ilakkiya, R.Shenbagavalli |
3770-3774 |
34 |
A Survey on Parallel Rough Set Based Knowledge Acquisition Using MapReduce from Big Data
Sachin Jadhav, Shubhangi Suryawanshi |
3775-3779 |
35 |
A Survey on: A New Algorithm for Inferring User Search Goals with Feedback Sessions
Swati S. Chiliveri, Pratiksha C.Dhande |
3780-3785 |
36 |
A Survey on Online Aggregation For Large Mapreduce Jobs
M SABIR M SHABBIR, REKHA JADHAV |
3786-3791 |
37 |
Secure Routing Through Trusted Nodes in Wireless Sensor Networks – A Survey
D. Latha, K. Palanivel |
3792-3799 |
38 |
Feature Selection for High Dimensional and Imbalanced Data- A Comparative Study
Kokane Vina A., Lomte Archana C. |
3800-3804 |
39 |
A Survey on Degraded Document Image Binarization Techniques
K.Ajitha,Professor P.Kannan |
3805-3808 |
40 |
A Survey on Moving Object Detection
Roopa Gokul, Dr. J. C. Prasad |
3809-3812 |
41 |
Security in Cloud over the Virtual Environment
E.Nalina, B.Kabilarasan |
3813-3817 |
42 |
Comparative Performance Analysis of LMS and Notch Filter to Remove the Noise from ECG Signal
Salma Masuda Lisa, Tushar Kanti Roy, Feroz Ahmmed Bhuyan, Dr. Md. Zahurul Islam Sarkar |
3818-3821 |
43 |
An Overview of Replicated Data in DDBMS
Savyasachi, Amit Kumar Nirala |
3822-3826 |
44 |
Dynamic path selection with hybrid protocol and secure data transmission with PGP security in VANET
Rajni Singla, Namisha Sharma |
3827-3831 |
45 |
Ultra Sonographic Examination of Carotid Artery for Cancer Identification
Greeshma S L |
3832-3834 |
46 |
A Survey on Big Data mining Applications and different Challenges
Dattatray Raghunath Kale, Satish R.Todmal |
3835-3838 |
47 |
Improving service discovery for goal oriented system using SOAP architecture
Miss Heena Dabherao, Prof A.P.Bodkhe |
3839-3841 |
48 |
A Review on Distributed Network Services Using SSO for Secure Mechanism
Mr.D.S. Baravde,Prof. S.S Bere |
3842-3844 |
49 |
False base station attack in GSM Network Environment
Mishra Sandip D., Dr. Nilesh K. Modi |
3845-3849 |
50 |
Enhanced Security Approach for Detecting Intrusions in Multitier Web Applications
Ashwini R Pawar, S.S. Bhardwaj,,Sachin N. Wandre |
3850-3854 |
51 |
Detecting Data Leakage using Data Allocation Strategies With Fake objects
S.P.Subalakshmi, B.Geetha, S.P.Karthikeyan |
3855-3862 |
52 |
Detection of Non Consecutive Malicious Nodes Under Black Hole Attack In Manet
Harveen,Vanita singh |
3863-3870 |
53 |
Design and Simulation of Microstrip Patch Antenna Using Different Substrates
Munira Bano, Dr. A.K.Rastogi, Shanu Sharma |
3871-3875 |
54 |
Noise Reduction Based on Multilevel DTCWT Using Bootstrap Method
T.Eswar Reddy, K.M.Hemambaran |
3876-3882 |
55 |
Improving Transmission efficiency in VANET using MAC and Multichannel
Kamaldeep Kaur,Namisha Sharma |
3883-3890 |
56 |
Facebook Integration with RESTFB API
JASMEET KAUR, NEHA SINGH |
3891-3894 |
57 |
Web Log Based Analysis of User’s Browsing Behavior
Ashwini Ladekar, Dhanashree Raikar,Pooja Pawar |
3895-3899 |
58 |
STUDY THE EFFECT OF RAIN ON TELECOMMUNICATION AND PROPOSE A METHOD TO GUARD AGAINST IT
Raghav Madan |
3900-3904 |
59 |
Dynamic Traffic Grooming At Max Connectivity Nodes with Grooming Resources in WDM Optical Network
K. APARNA, P. KRISHNA KUMARI |
3905-3909 |
60 |
A Genetic Algorithm Processor Based on Redundant Binary Numbers (GAPBRBN)
Miss. KIRTI JOSHI |
3910-3914 |
61 |
A New Approach To Discover User Search Goals Using Feedback Session
Pranali Dhondiram Desai, Prof.Wadne Vinod Subhashrao |
3915-3917 |
62 |
A Survey on Packet Delivery in Hybrid Wireless Network
S.LishaSelvi ,T.AgnesRameena |
3918-3923 |
63 |
Providing Flexible Security as a Service Model for Cloud Infrastructure
Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar |
3924-3930 |
64 |
DIB: DATA INTEGRATION IN BIGDATA FOR EFFICIENT QUERY PROCESSING
P.Divya, K.Priya |
3931-3935 |
65 |
SVN: SOFTWARE VULNERABILITY PREDICTION BY NEURAL NETWORK
B Noorul Sajini ,P. Vijaya Sarathy |
3936-3939 |
66 |
TWO STEP VERIFICATION USING HAT (HASHING, ANT COLONY, TRACKING THE IP) TO INFER IDENTITY OF POLLUTERS IN MANET
R.Ananthi, J.Jayapradha |
3940-3944 |
67 |
An Optimized Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Network Architecture
Madhura M.Unde, Simran Khiani |
3945-3948 |
68 |
SIGNING AND DESIGNING WITH DATA RECOVERY FOR SECURED CLOUD STORAGE
S. Arshiya Kausar, S. Karthik |
3949-3952 |
69 |
SECURED DATA MINING WITH (ALA) ANTI LEECHING ALGORITHM
U. Manju, J. Jayapradha |
3953-3956 |
70 |
QMS PROTOCOL & CAD ALGORITHM: QUARANTINE MALICIOUS SOFTWARE PROTOCOL & COUNTER ATTACK THROUGH DIVERSION ALGORITHM
B. Vidhya, R. Shenbagavalli |
3957-3960 |
71 |
MESSAGE MINING FOR EMERGENCY NEEDS THROUGH VANET
C.Manimaran, R.Mohan |
3961-3965 |
72 |
SIAT: ON THE USE OF SIDE INFORMATION FOR MINING TEXT DATA
S. Manjula, K. Kavitha |
3966-3969 |
73 |
PROFILE BASED CONCURRENT DATA DOWNLOAD IN CLOUD WITH DATA SHARING AND LOAD BALANCING
S. Pradeepa, E. Priyadarsini |
3970-3973 |
75 |
SECRET SHARING SCHEMES WITH DIVERSE IMAGE MEDIA
G. Selvapriya, J. Jayapriya Jayapal |
3978-3981 |
76 |
Implementation of SOA and mashup technology to maintain confidentiality of private data
Ms.Deepali V.Shinkar, Prof. S. Pratap Singh |
3982-3987 |
77 |
EFFICIENT FINE-GRAINED PRIVACY PRESERVING SYSTEM FOR PUBLIC CLOUD NETWORKS
K. Suganya, V. Geetha |
3988-3994 |
78 |
DETECTION AND PREVENTION OF VULNERABILITY APPLICATIONS THROUGH NEURAL NETWORKS
L.YuvaPriya, Saranya Gunasekaran |
3995-3998 |
79 |
Reconfigurable flight control system
V.M. Kazak, D.O. Shevchuk, M.P.Kravchuk, M.H. Levchenko, O.M. Pavlenko |
3999-4006 |
80 |
Detecting Phantom Communication using Cell Counting Attack
S. Kavya, CH. Aruna |
4007-4012 |
81 |
Clock Synchronization in Distributed System
Ms.Rashmi Deshmukh , Ms.Ketki Bhakare , Ms.Jayashree Shiral, Ms.Rachana Deshmukh |
4013-4015 |
82 |
Website Structure Improvement using Tailoring Method
Milind M Shinde, Vinod S Wadne, Kuldeep B Vayadande |
4016-4019 |
83 |
DESIGN AND IMPLEMENTATION OF APPLICATION SPECIFIC 32-BITALU USING XILINX FPGA
T.MALLIKARJUNA,K.SREENIVASA RAO |
4020-4025 |
84 |
A novel approach towards the design of self clocked D flip-flop using 90nm CMOS Process
Achyut pandey, Ravi Mohan, Vivek Dubey |
4026-4029 |
85 |
A Survey on Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Amey K. Redkar, Dnyaneshwar A. Rokade |
4030-4034 |
86 |
Cross Site Scripting Attack Detection & Prevention System
Punam Thopate, Purva Bamm, Apeksha Kamble, Snehal Kunjir, Prof S.M.Chawre |
4035-4039 |
87 |
Measuring Parameters of Quality of Service in Wireless Sensor Networks
Vipin Kumar, Avadhesh Kumar Gupta |
4040-4045 |
88 |
Detection of Raman Peaks for Identification of Chemicals using Labview
Nisha Ahlawat |
4046-4049 |
89 |
Analog Phase Lock Loop using CMOS Ring Oscillator in 22 nm Technology
Abhishek Singh, Kalpita Agrawal, Kalpita Agrawal |
4050-4052 |
90 |
DATABASE THREAT ANALYSING TOOL (DTAT) FOR TOP-K OBJECTS QUERIES
S Jayapriya, M. Lakshmanan |
4053-4056 |
91 |
Python- A Promising Future
Priyanka Gupta |
4057-4059 |
92 |
Robust Quaternion LMS Algorithm for Adaptive Filtering of Hyper complex real world processes
B Yamuna, K Manjunath |
4060-4065 |