Volume 3 Issue 11 November 2014

Volume 3 Issue 11 November 2014

S.No. Title and Authors of Paper Page.No.
1 AUTOMATIC LIVER SEGMENTATION USING MEAN-SHIFT TECHNIQUES
SUDHA.P.,Dr.T.Arumuga Maria Devi
3598-3602
2 A Status Report on Resource Allocation in Cloud Computing Using Queuing Theory
R.Murugesan, C.Elango, S.Kannan
3603-3608
3 A Survey on Energy Efficient Wireless Communication in Cellular Networks
Suganya Rajendran, C.Jaya suriya
3609-3614
4 Data Rescue Process in Network Medium with Higher End Security Measures
Praveena.S, RajeshKannan.C
3615-3619
5 REAL TIME FACE DETECTION: SURVEY
Bavitra Krishnan , Y.R.Packia Dhas
3620-3625
6 A Survey on Vehicular Internet Access Techniques
M. ShahinaThasneem, S.I.Padma
3626-3632
7 Influence of machine learning techniques on Authorship attribution for Telugu text features
S.NAGAPRASAD,T.RAGHUNADHA REDDY,Dr. P.VIJAYAPAL REDDY,Dr. A.VINAYA BABU,Dr. B. Vishnu Vardhan
3633-3640
8 Multiple Inpainting of low resolution images using examplar and super resolution algorithm
A.Breezy Joy, C.Rekha
3641-3648
9 Dual level Image watermarking using SVD and Edge detection technique
Shiney Dang , Jagandeep sidhu
3649-3652
10 A Survey on Brain Tumor Classification Using Artificial Neural Network
M .Queen, T.M. Babi Mol
3653-3657
11 EXPLORATION OF DISTRIBUTED GENERATION FOR FUTURE DISTRIBUTION NETWORKS
Surbhi Bakshi, Tilak Thakur, Rintu Khanna
3658-3666
12 Review Paper on Identification of Plant Diseases Using Image Processing Technique
Rani Pagariya, Mahip Bartere
3667-3669
13 ANALYSIS OF ENERGY CONSUMING FOR CORRELATION BASED DATA AGGREGATION
R.Vijila, C.S.Thayanandeeswari
3670-3675
14 An Integrated System for Recognition of Facial Expression and Head-Pose Estimation
Divyanshu Dewangan, Shrikant Tiwari, Yamini Chouhan
3676-3679
15 Review: Predicting The Efficiency of Difficult Keyword Queries Over Databases
Miss. Varsha Vetal, Mrs. Sanchika Bajpai
3680-3683
16 Image Registration and Restoration from Multiple degraded colour images
Anil Kumar Pandey, Rohit Raja, Yamini chouchan
3684-3690
17 A Survey On Security Evaluation Of Pattern Classifiers Under Attack
Sandhyarani Sambhaji Patil, Dnyaneshwar A. Rokade
3691-3693
18 A REVIEW ON DESIGN OF PIPELINED ADC
J Monica,Prof.P.Kannan
3694-3698
19 Steering Vector and Interference Cancellation of Two-Dimensional Arrays
Fahad Alraddady
3699-3702
20 LOGIC EFFORT OF CMOS BASED DUAL MODE LOGIC GATES
D.Rani, R.Mallikarjuna Reddy
3703-3710
21 Study of Detecting Malicious Nodes in MANET and Fault tolerance: A Survey
T. PARAMESWARAN, Dr. C. PALANISAMY, T. JASMINE SONIA
3711-3716
22 PERFORMANCE EVALUATION FOR CAH-MAC USING DSRC VEHICULAR SAFETY COMMUNICATION
T. PARAMESWARAN, Dr. C. PALANISAMY, A.NITHYA
3717-3722
23 A Survey on Improving the Lifetime of the Network in Mobile Adhoc Network
Dharani D, Dr. Devaki P
3723-3726
24 Enhancing Cohesion Metrics in Refactoring with Code Smells
J. Kaviarasi, P.R. Jayanthi
3727-3730
25 Survey on Medical Data Cluster analysis using Feature Selection and Neural Networks
V.Sangeetha, J.Preethi, M.Sreeshakthy
3731-3738
26 Secured Green Payments using NFC Device
Subhasini Dwivedi,Shraddha Panbude,Rama Rao
3739-3744
27 A COMPARATOR WITH REDUCED OFFSET VOLTAGE & DELAY TIME IN 130nm CMOS
Ms. Ankita Bhatia, Mrs.Susmita Mishra
3745-3747
28 Automatic Text Detection from Images
Jignesh N Solanki, Viral D Sanghvi
3748-3751
29 CLOUD
COMPUTING AND METHODS FOR PRIVACY PRESERVATION: A SURVEY

Mr. R. Nallakumar,Dr. N. Sengottaiyan, M.MohamedArif
3752-3756
30 A SURVEY ON DISEASE DIAGONSIS ALGORITHMS
Aanchal Oswal, Vachana Shetty, Mustafa Badshah, Rohit Pitre, Manali Vashi
3757-3761
31 Survey Paper on Vehicle Tracking System using GPS and Android
Amol Dhumal, Amol Naikoji, Yutika Patwa, Manali Shilimkar, Prof. M. K. Nighot
3762-3765
32 REVIEW PAPER ON BRAIN IMAGE SEGMENTATION USING CHAN-VESE ALGORITHM AND ACTIVE CONTOURS
Payal Gupta,Er. Satinderjeet Singh
3766-3769
33 UBPS :User Based Personalized Search With Big Data
S.Ilakkiya, R.Shenbagavalli
3770-3774
34 A Survey on Parallel Rough Set Based Knowledge Acquisition Using MapReduce from Big Data
Sachin Jadhav, Shubhangi Suryawanshi
3775-3779
35 A Survey on: A New Algorithm for Inferring User Search Goals with Feedback Sessions
Swati S. Chiliveri, Pratiksha C.Dhande
3780-3785
36 A Survey on Online Aggregation For Large Mapreduce Jobs
M SABIR M SHABBIR, REKHA JADHAV
3786-3791
37 Secure Routing Through Trusted Nodes in Wireless Sensor Networks – A Survey
D. Latha, K. Palanivel
3792-3799
38 Feature Selection for High Dimensional and Imbalanced Data- A Comparative Study
Kokane Vina A., Lomte Archana C.
3800-3804
39 A Survey on Degraded Document Image Binarization Techniques
K.Ajitha,Professor P.Kannan
3805-3808
40 A Survey on Moving Object Detection
Roopa Gokul, Dr. J. C. Prasad
3809-3812
41 Security in Cloud over the Virtual Environment
E.Nalina, B.Kabilarasan
3813-3817
42 Comparative Performance Analysis of LMS and Notch Filter to Remove the Noise from ECG Signal
Salma Masuda Lisa, Tushar Kanti Roy, Feroz Ahmmed Bhuyan, Dr. Md. Zahurul Islam Sarkar
3818-3821
43 An Overview of Replicated Data in DDBMS
Savyasachi, Amit Kumar Nirala
3822-3826
44 Dynamic path selection with hybrid protocol and secure data transmission with PGP security in VANET
Rajni Singla, Namisha Sharma
3827-3831
45 Ultra Sonographic Examination of Carotid Artery for Cancer Identification
Greeshma S L
3832-3834
46 A Survey on Big Data mining Applications and different Challenges
Dattatray Raghunath Kale, Satish R.Todmal
3835-3838
47 Improving service discovery for goal oriented system using SOAP architecture
Miss Heena Dabherao, Prof A.P.Bodkhe
3839-3841
48 A Review on Distributed Network Services Using SSO for Secure Mechanism
Mr.D.S. Baravde,Prof. S.S Bere
3842-3844
49 False base station attack in GSM Network Environment
Mishra Sandip D., Dr. Nilesh K. Modi
3845-3849
50 Enhanced Security Approach for Detecting Intrusions in Multitier Web Applications
Ashwini R Pawar, S.S. Bhardwaj,,Sachin N. Wandre
3850-3854
51 Detecting Data Leakage using Data Allocation Strategies With Fake objects
S.P.Subalakshmi, B.Geetha, S.P.Karthikeyan
3855-3862
52 Detection of Non Consecutive Malicious Nodes Under Black Hole Attack In Manet
Harveen,Vanita singh
3863-3870
53 Design and Simulation of Microstrip Patch Antenna Using Different Substrates
Munira Bano, Dr. A.K.Rastogi, Shanu Sharma
3871-3875
54 Noise Reduction Based on Multilevel DTCWT Using Bootstrap Method
T.Eswar Reddy, K.M.Hemambaran
3876-3882
55 Improving Transmission efficiency in VANET using MAC and Multichannel
Kamaldeep Kaur,Namisha Sharma
3883-3890
56 Facebook Integration with RESTFB API
JASMEET KAUR, NEHA SINGH
3891-3894
57 Web Log Based Analysis of User’s Browsing Behavior
Ashwini Ladekar, Dhanashree Raikar,Pooja Pawar
3895-3899
58 STUDY THE EFFECT OF RAIN ON TELECOMMUNICATION AND PROPOSE A METHOD TO GUARD AGAINST IT
Raghav Madan
3900-3904
59 Dynamic Traffic Grooming At Max Connectivity Nodes with Grooming Resources in WDM Optical Network
K. APARNA, P. KRISHNA KUMARI
3905-3909
60 A Genetic Algorithm Processor Based on Redundant Binary Numbers (GAPBRBN)
Miss. KIRTI JOSHI
3910-3914
61 A New Approach To Discover User Search Goals Using Feedback Session
Pranali Dhondiram Desai, Prof.Wadne Vinod Subhashrao
3915-3917
62 A Survey on Packet Delivery in Hybrid Wireless Network
S.LishaSelvi ,T.AgnesRameena
3918-3923
63 Providing Flexible Security as a Service Model for Cloud Infrastructure
Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar
3924-3930
64 DIB: DATA INTEGRATION IN BIGDATA FOR EFFICIENT QUERY PROCESSING
P.Divya, K.Priya
3931-3935
65 SVN: SOFTWARE VULNERABILITY PREDICTION BY NEURAL NETWORK
B Noorul Sajini ,P. Vijaya Sarathy
3936-3939
66 TWO STEP VERIFICATION USING HAT (HASHING, ANT COLONY, TRACKING THE IP) TO INFER IDENTITY OF POLLUTERS IN MANET
R.Ananthi, J.Jayapradha
3940-3944
67 An Optimized Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Network Architecture
Madhura M.Unde, Simran Khiani
3945-3948
68 SIGNING AND DESIGNING WITH DATA RECOVERY FOR SECURED CLOUD STORAGE
S. Arshiya Kausar, S. Karthik
3949-3952
69 SECURED DATA MINING WITH (ALA) ANTI LEECHING ALGORITHM
U. Manju, J. Jayapradha
3953-3956
70 QMS PROTOCOL & CAD ALGORITHM: QUARANTINE MALICIOUS SOFTWARE PROTOCOL & COUNTER ATTACK THROUGH DIVERSION ALGORITHM
B. Vidhya, R. Shenbagavalli
3957-3960
71 MESSAGE MINING FOR EMERGENCY NEEDS THROUGH VANET
C.Manimaran, R.Mohan
3961-3965
72 SIAT: ON THE USE OF SIDE INFORMATION FOR MINING TEXT DATA
S. Manjula, K. Kavitha
3966-3969
73 PROFILE BASED CONCURRENT DATA DOWNLOAD IN CLOUD WITH DATA SHARING AND LOAD BALANCING
S. Pradeepa, E. Priyadarsini
3970-3973
75 SECRET SHARING SCHEMES WITH DIVERSE IMAGE MEDIA
G. Selvapriya, J. Jayapriya Jayapal
3978-3981
76 Implementation of SOA and mashup technology to maintain confidentiality of private data
Ms.Deepali V.Shinkar, Prof. S. Pratap Singh
3982-3987
77 EFFICIENT FINE-GRAINED PRIVACY PRESERVING SYSTEM FOR PUBLIC CLOUD NETWORKS
K. Suganya, V. Geetha
3988-3994
78 DETECTION AND PREVENTION OF VULNERABILITY APPLICATIONS THROUGH NEURAL NETWORKS
L.YuvaPriya, Saranya Gunasekaran
3995-3998
79 Reconfigurable flight control system
V.M. Kazak, D.O. Shevchuk, M.P.Kravchuk, M.H. Levchenko, O.M. Pavlenko
3999-4006
80 Detecting Phantom Communication using Cell Counting Attack
S. Kavya, CH. Aruna
4007-4012
81 Clock Synchronization in Distributed System
Ms.Rashmi Deshmukh , Ms.Ketki Bhakare , Ms.Jayashree Shiral, Ms.Rachana Deshmukh
4013-4015
82 Website Structure Improvement using Tailoring Method
Milind M Shinde, Vinod S Wadne, Kuldeep B Vayadande
4016-4019
83 DESIGN AND IMPLEMENTATION OF APPLICATION SPECIFIC 32-BITALU USING XILINX FPGA
T.MALLIKARJUNA,K.SREENIVASA RAO
4020-4025
84 A novel approach towards the design of self clocked D flip-flop using 90nm CMOS Process
Achyut pandey, Ravi Mohan, Vivek Dubey
4026-4029
85 A Survey on Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Amey K. Redkar, Dnyaneshwar A. Rokade
4030-4034
86 Cross Site Scripting Attack Detection & Prevention System
Punam Thopate, Purva Bamm, Apeksha Kamble, Snehal Kunjir, Prof S.M.Chawre
4035-4039
87 Measuring Parameters of Quality of Service in Wireless Sensor Networks
Vipin Kumar, Avadhesh Kumar Gupta
4040-4045
88 Detection of Raman Peaks for Identification of Chemicals using Labview
Nisha Ahlawat
4046-4049
89 Analog Phase Lock Loop using CMOS Ring Oscillator in 22 nm Technology
Abhishek Singh, Kalpita Agrawal, Kalpita Agrawal
4050-4052
90 DATABASE THREAT ANALYSING TOOL (DTAT) FOR TOP-K OBJECTS QUERIES
S Jayapriya, M. Lakshmanan
4053-4056
91 Python- A Promising Future
Priyanka Gupta
4057-4059
92 Robust Quaternion LMS Algorithm for Adaptive Filtering of Hyper complex real world processes
B Yamuna, K Manjunath
4060-4065