Volume 3 Issue 12 December 2014
S.No. |
Title and Authors of Paper |
Page.No. |
1 |
A Survey on Image Processing Techniques for Glaucoma Detection
Dr. PSJ Kumar, Ms. Sukanya Banerjee |
4066-4073 |
2 |
Design of Mobile Ad hoc Network with Performance evaluation of AODV and DSDV Routing Protocols
Snehal S. Nikam |
4074-4077 |
3 |
A New Approach in LSB Based Image Steganography to Enhance Network Security
Susmita Soni, Abhinav Soni |
4078-4082 |
4 |
To Protect Sensitive Labels in Social Network Data Anonymization
Miss Pradnya L. Sangade,Prof. Nitin Shivale |
4083-4085 |
5 |
Integration of Classification and Clustering for the Analysis of Spatial Data
M. Nachiket Kumar, Dr. Venkatesan, D. Manoj Prabhu |
4086-4096 |
6 |
Saturation throughput analysis for IEEE 802.11 WLANs using Fibonacci algorithms
K.NISHANTH RAO, G.KARTHIK REDDY, A. DEEPTHI |
4097-4099 |
7 |
A Robust and Multipurpose Robot for Military
Ms.Rajashri Vasawade, Mr.Moresh Mukhedkar |
4100-4102 |
8 |
A Review on Texture Image Classification Using Different Methods
A.H.Karode, K.K.Pandey |
4103-4105 |
9 |
LOW POWER MAC PROTOCOL IN WBAN FOR E-HEALTH APPLICATIONS
G.Karthik Reddy, Mohammad Abdul Rawoof |
4106-4110 |
10 |
MULTI ZONE BASE SPOOFING ATTACK DETECTION AND LOCALIZATION FOR WIRELESS SENSOR NETWORK USING NOVEL HYPOTHESIS TESTING
T.Priya,C.P.Balasubramaniam |
4111-4118 |
11 |
Improving Banking Authentication Using Hybrid Cryptographic Technique
Arpit Agrawal,Sant Choubey |
4119-4127 |
12 |
Web based Bangla Online Handwritten Prescription system for Telemedicine through Multimedia Conferencing
Asok Bandyopadhyay,Bhaswati Mukherjee |
4128-4133 |
13 |
A survey of classifier techniques for Spam filtering
Dr. VivekKapoor, Rahul Maheshwari |
4134-4143 |
14 |
Virtual Brain Technology
Sonal chawla, Nisha Ahlawat, Neetika Goswami |
4144-4146 |
15 |
Implementation and Removal of co-operative blackhole and wormhole Attacks on manet with DSR
Manisha, Dr. Mukesh Kumar |
4147-4151 |
16 |
A Dynamic Bandwidth Adjustment Approach for QoS Optimization in Mobile Network
Kiran, Mamta Sachdeva |
4152-4157 |
17 |
A Research on Computational Technique in Vehicle Based Wireless Communications Systems
M.Ramesh,S.Mohanram,N.Rajeshkumar |
4158-4161 |
18 |
3G-Assisted Data Delivery in VANETs
E.MAHENDRA, D.VENKATESH |
4162-4166 |
19 |
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Mukesh Kumar Garg, Dr. Ela Kumar |
4167-4172 |
20 |
An emerging technology today in computer science – cloud computing
A.Prathyusha |
4173-4183 |
21 |
Effect Of Grayhole Attack With Ids Technique For Aodv Routing Protocol Using Network Simulator
Garima Neekhra,Sharda Patel,Ashok Verma,Ashish Chaurasia |
4184-4190 |
22 |
A Study on Authorized Deduplication Techniques in Cloud Computing
Bhushan Choudhary, Amit Dravid |
4191-4194 |
23 |
Ontology Based Rule Acquisition from similar Web with Knuth Morris Pratt Algorithm
M. Maria Alex,M.Amal Rajan |
4195-4200 |
24 |
A REVIEW ON SVM TRAINING PHASE REDUCTION FOR MALWARE DETECTION
Abhijeet J. Choudhari,Vikrant Chole |
4201-4205 |
25 |
A Survey on Face Recognition in Present Scenario
Parul Jain, Nilay Jain and Rohit Raja |
4206-4209 |
26 |
Evaluation of Blind image Restoration
H.Riyaz Fathima,Mr.K.Madhan Kumar |
4210-4215 |
27 |
Design and Simulation Model for Compensated and Optimized T-junctions in Microstrip Line
Alok Kumar Rastogi, Munira Bano, Shanu Sharma |
4216-4220 |
28 |
Medical Image Fusion Based On Lifting Wavelet Transform and Neuro Fuzzy
Swathi.A,K.Krishneswari |
4221-4223 |
29 |
Keyword based Question Answering System in Natural Language Interface to Database
Jyothsna Cherapanamjeri, Lavanya Lingareddy, Himabindu. K |
4224-4226 |
30 |
AN OVERVIEW OF FAULT TOLERANT ROUTING PROTOCOLS IN MANET
Ms.P.RAJESWARI, Dr.T.N.RAVI |
4227-4231 |
31 |
Predicting Heart Disease Symptoms using Fuzzy C-Means Clustering
Lovepreet Kaur |
4232-4235 |
32 |
DECIMATION FILTER FOR MULTISTANDARD WIRELESS RECEIVER
SHEETAL S.SHENDE |
4236-4241 |
33 |
Realization of Microstrip Band-Pass Filter Design
Mr. K.S.Khandelwal, Dr. A.K.Kureshi |
4242-4247 |
34 |
BIOMETRIC APPLICATION: TEXTURE AND SHAPE BASED 3D FACE RECOGNITION
P.Manju Bala,A.Kalaiselvi |
4248-4251 |
35 |
Efficient Mining and Hiding of Sensitive Association Rule
Sonali Sambhaji Shintre, Prof. Pravin P. Kalyankar |
4252-4257 |
36 |
Optimization Based Reactive Power Control Of Photovoltaic Inverter
A. Yazhini, S. Jayanthi |
4258-4261 |
37 |
Efficient Noise Cancellation Systems Based on Adaptive Algorithms and Their Performance Comparisons
Kiran.W.S, Shalin.M, Jayaram.J |
4262-4267 |
38 |
A Review on Image Retrieval System
Shaila S. Tambe, Prof. B. S. Borkar |
4268-4271 |
39 |
Public Auditability and Data Storage Security In Cloud Computing By Using RSASS And ECCSS
Poonam Pawar |
4272-4276 |
40 |
Automated Object Recognition From High Resolution Satellite Images: A Review
Dimple Kapoor, Ms. Minakshi Kumar, Prof. Pradeep Pant |
4277-4282 |
41 |
Automated Object Recognition FromHigh Resolution Satellite Images
Dimple Kapoor, Ms. Minakshi Kumar,Prof. Pradeep Pant |
4283-4289 |
42 |
Optimizing security in E-Commerce Transaction: An Overview
Miss Nikita A. Rathi,Prof S. R. Gupta |
4290-4294 |
43 |
A Step up in Data Cleaning and User identification of Preprocessing on Web Usage data
Manisha Valera, Shaktisinh Parmar |
4295-4298 |
44 |
An Effective Text Processing Approach With MapReduce
Jigyasa Nigam , Sandeep Sahu |
4299-4301 |
45 |
SECURE BANKING USING QR CODE
Brindha G, Gopikaarani N |
4302-4306 |
46 |
Survey on Harmonic Mitigation Techniques in Multilevel Inverters
Namrata Shrivastava, Assistant Professor Pawan Mehta |
4307-4311 |
47 |
An Study and Analysis of Opinion Mining and Sentiment analysis
Akshata Shirish Nayak, Roshan Fernandes |
4312-4315 |
48 |
Constructing the Classification systems using Association rule mining for Predictive Analysis
K.Mohanappriya, M.Vaidhehi |
4316-4323 |
49 |
Machine Learning Techniques for learning features of any kind of data: A Case Study
P.Anitha, G.Krithka, Mani Deepak Choudhry |
4324-4331 |
50 |
A FUZZY LOGIC BASED CONTRAST ENHANCEMENT TECHNIQUE BY REMOVAL OF IMPULSIVE NOISE
Mithilesh Atulkar, A.S. Zadgaonkar, Sanjay Kumar |
4332-4336 |
51 |
Sentiment Analysis Of Twitter Data
K S Kushwanth Ram, Sachin Araballi,Shambhavi B R,Shobha G |
4337-4342 |
52 |
Security Issues and challenges in Cloud Computing
T.Ambika |
4343-4348 |
53 |
CREDIT CARD DECEIT DETECTION USING GSM
Sujatha.S, A.Abitha, A.Stephy |
4349-4352 |
54 |
Optimization of SNR InSigma-Delta Modulators with Clock Jitter Using Genetic Algorithm
Monika Singh,Anil Kumar Sahu |
4353-4357 |
55 |
Online Shortest Path Computation on Time Dependent Network
Mr.Nikhil Asolkar, Prof. Satish R. Todmal |
4358-4361 |
56 |
Design and Analysis of Low-Power Subtractor Circuits using P-XOR Logic Gates with Sleep Approach
Ms. Varsha Rani Tamrakar, Mr. Alok Kumar |
4362-4367 |
57 |
A survey of various Cryptographic techniques and their Issues
Dr. Vivek Kapoor, Sandeep Verma |
4368-4373 |
58 |
Survey on Traffic Monitoring System using Image Processing
Nikhil Lende,Prof.S.S.Paygude |
4374-4377 |
59 |
Security in Cloud computing Using Attribute Based Encryption: Proxy Re-encryption
Ms. Dipali L.Patil |
4378-4380 |
60 |
RASP: Building Confidential and Efficient Query Services in the Cloud
MS. D. S. SHINTRE, DR. S. M. JAGADE |
4381-4386 |
61 |
A survey of Video Steganography through LSB Insertion
Dr. Vivek Kapoor,Akbar Mirza |
4387-4392 |
62 |
Novel Resource Discovery in Grid Computing using ACO
Mr. Laxman J. Deokate, Mr. V. V. Puri |
4393-4396 |
63 |
The Implementation of Run Length Encoding for RGB Image Compression
Varsha Bansal, Pratishtha Gupta, Suhail Tomar |
4397-4401 |
64 |
Medical Image Segmentation using Enhanced Neuro Fuzzy Classification Algorithm based on Multi-Modal Function of PSO
S.Jayachitra, E.Mary shyla |
4402-4407 |
65 |
Simulation Modelling of Selfish Node Attack Using ICMP Protocol
Nitin Kumar Gohal,Ranbir Singh |
4408-4413 |
66 |
Design of Three Input Buck-Boost DC-DC Converter with Constant input voltage and Variable duty ratio using MATLAB/Simulink
A.Thiyagarajan, B.Gokulavasan |
4414-4419 |
67 |
3DMP: The 3D Movie Player
Kishor P. Deshmukh, Gauri K. Bodkhe |
4420-4424 |
68 |
Secure AODV Routing Protocols Based on Concept of Trust in MANET’s
Vijaya Singh, Megha Jain |
4425-4428 |
69 |
Cloud Based E-Learning in Education
Ambika.T,Kavitha.R |
4429-4433 |
70 |
Secure Authorized De-duplication Using Hybrid Cloud
Shilpa Giri |
4434-4437 |
71 |
A Review on Image Enhancement using Hardware co-simulation for Biomedical Application
Kalyani A. Dakre, Prof. P. N. Pusdekar |
4438-4441 |
73 |
E-Government: Services Offered by State of Punjab
Manjot Kaur,Dr. Amitoj Singh |
4451-4456 |