Volume 4 Issue 2 February 2015

Volume 4 Issue 2 February 2015

S.No. Title and Authors of Paper Page.No.
1 REAL TIME BASED OPINION MINING OF PRODUCT REVIEWS IN ONLINE SHOPPING USING SUPERVISED LEARNING
K.KISHORE ANTHUVAN, S.DHIVIYA, C.RAJESWARI, S.SUGUNA
270-274
3 Review on: image Fusion
Ms. Maninder kaur ,Ms. Pooja
279-283
4 IMPLEMENTATION OF INVESTE THE CHANNEL ADAPTATION AND INTERFERENCE FOR MULTI ANTENNA OFDM USING STBC SCHEMES
Pradeep K. Sharma, Manish Purohit, Piyush Vyas, Prof. K. K. Arora
284-287
5 Research on the Design Architecture & Services over a State Wide Area Network: A case of Himachal Pradesh
Ashwani Chandel, Vikram Jeet Singh
288-291
6 Simulation of MUSIC and RLS Algorithm for Adaptive Antenna Array
Dhaval M. Modi, Jayesh S. Patel, Ashwin M. Patel
292-296
7 Prevention of black hole attack by different methods in MANET
Nakka Nandini, Reena Aggarwal
297-300
8 A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack
Swaijit Kaushal, Reena Aggarwal
301-305
9 A Study on Privacy enhancing Technologies for the Internet
Kriti Arora
306-316
10 ONLINE BANKING USING TWO – FACTOR AUTHENTICATION
P. Selvi Grija, Balakrishnan Nandhini Devi, Jeevitha.D, Seethalakshmi.R
317-322
11 Analysis of QOS in Wireless Sensor Network
Mr. Sudhir U.Gaikwad, Manoj Kumar Singh
323-325
12 Prediction using Sugar production data : Neural and Fuzzy time series
Swati Sharma, Saurabh Ahalawat
326-330
13 REINFORCEMENT WITH INTENT SEARCH (DOMAIN AREA:DATA MINING AND IMAGE PROCESSING)
Desai Prerana P., Nigade Supriya S.,Hajare Komal S.
331-336
14 Categorize Online news Using Various Classification Techniques
Neeru Sharma, Paramjit Kaur
337-340
15 IDENTIFYING LUNG CANCER IN ITS EARLY STAGE USING NEURAL NETWORK AND GA ALGORITHM
Nancy,Paramjit Kaur
341-344
16 An Efficient Algorithm for Differentially Private Data Release
Hanooja T, D.Ravi, T.K.P Rajagopal
345-349
17 An Efficient Approach for Retrieving Personalized User Goals
Deepa M, D Ravi, T K P Rajagopal
350-353
18 Survey on Keyword Search in Encrypted Cloud Data
Minnu C Tomy, Vidhya S S
354-357
19 A SURVEY ON SINGING VOICE SEPARATION TECHNIQUES
Shamili P, Ancy K Sunny, Dr. T. M Thasleema
358-361
20 A Robust Background Subtraction Technique for Object Detection
Rohan K. Naik
362-366
21 INVISIBLE WATERMARKING for TEXT FILES
MALA DUTTA, PRATEEK SAXENA
367-371
22 Web Camera Based Mouse Controlling Using RGB Colours
R. Lulu, Vanshri Kurhade, Neha Pande, Rohini Gaidhane , Nikita Khangar, Priya Chawhan, Ashwini Khaparde
372-375
23 Boosting Stars Performance Through Adaboost algorithm in MANET’s
K.Sudha, D.Udhaiyakumarie, M.Vinothini, D.Nagamany Abirami
376-379
24 Face Recognition System based on face models and LBP
S.Chidambaranathan
380-382
25 DESIGNING AND IMPLEMENTING VIRTUAL PASSWORD TO PROTECT USERS FROM THEFT OF PASSWORD
S. R. SRIRAM, D. SAVEETHA
383-387
26 Graphical Password Using Captcha for More Secure Authentication Scheme
Parth Patel, Pathan Firdos, Pantawane Gaurav, Mr. Sachin N. Wandre
388-392
27 Recent Advances in Delivering School Education and Cloud Technologies
Ramneek Kaur
393-396
28 An Improved Cooperative Harmony Search for Function Optimization
Malarvvizhi G, Subramanian K M
397-400
29 MICROCONTROLLER BASED AUTOMATIC COLLEGE BELL WITH MONITORING SYSTEM
Shweta Butoliya, Nupur Shal, Snehal Girhepunje, Aakanksha Rannaware,Prerna Baddalwar, Vaishali Badwe, Prof. S.A.Bagal
401-404
30 A Review Study of Various Control strategies for a class of Uncertain Nonlinear Systems
Ms Geeta Shakya, Mhd. Ashfaque Khan
405-410
31 Channel Equaliser for Communication Channel using Neuro-Fuzzy Approach
Nikita Jain, Vineeta Choudhary
411-415
32 Performance Analysis of Open-Source Real Time Operating Systems
J.Ramprabu, G.Sindhuja
416-418
33 Automatic Text Classification System
Vrusha U.Suryawanshi, Pallavi Bogawar, Pallavi Patil, Priya Meshram, Komal Yadav, Prof. Nikhil S. Sakhare
419-423
34 Framework for Online Auction Fraud Detection
S.MD.HAROON, D.KHADAR HUSSAIN
424-426
35 Remote Data Integrity Protection Enhancement in Cloud Storage
Varsha B.
427-428
36 DCT Based Digital Video Watermarking Using MATLAB/Simulink
Sangeeta Yadav, Priyanka Anand
429-432
37 A Brief Survey of Self Organized Particle Swarm Optimization
Er. Avneet Kaur, Er. Mandeep Kaur
433-436
38 LST: Load Sharing Tool For Big Data
K.Radhika, V.Vinothini, R.Usha, S.Madhavi
437-440
39 Quality Image Compression without Any Loss
U.Sowndharya Lakshmi, S.Tharanya, R.Tharagai, S.Kalaivani
441-444
40 Automated Vehicular Distribution in Emergency Situation
G.Deepalakshmi, P.Sowmiya, K.Nivedhitha, Dr. Poonkavithai Kalamegam
445-448
41 A NEW INTERLEAVED THREE LEVEL AC–DC CONVERTER
S.Hemapriya, S.P.Vijayaragavan, B.Karthik
449-456
42 Image Steganography Based on Mantissa Replacement using LWT
N Sathisha, K Suresh Babu, K B Raja, K R Venugopal
457-465
43 Database for Unstructured,Semistructured data-NoSQL
Prof. Kirti, Prof. Pardeep Maan
466-469
44 Human Face Identification Using Robot
Mayuri Botre, Prachi Mendhe, Prajakta Gaurkar, Shruti Kuhikar, Himanshu Dekate, Prof.Rashmi Deshmukh
470-472
45 INTELLIGENT UNMANNED ARMY ROBOT
R.Thilagavathy, J.Murali, P.Kamal, P.ArunPandiyan
473-477
46 SECURING WIRELESS SENSOR NETWORK USING GSTEB PROTOCOL
R.VIGNESHKUMAR, J.GODWIN PONSAM
478-482
47 GRAPHICAL PASSWORD AUTHENTICATION USING CaRP
Ragavendra .A, Jeysree .J
483-486
48 Secured Inrusion Detection System in Wireless Sensor Network
J.Godwin Ponsam, P.Pradeep
487-490
49 Result Analysis of Edge Detection of Brighter Satellite Images: A Comparative Study of New and Existing Techniques
Sasmita Mishra , Kalyan Kumar Jena , Sarojananda Mishra
491-495
50 Trends in Automatic Modulation Classification for Advanced Data Communication Networks
Praveen S Thakur, Sushila Madan, Mamta Madan
496-507
51 ENHANCING DATA STORAGE SECURITY IN CLOUD COMPUTING USING PDDS TECHNIQUE
AparajitaSain, Parna Dutta, NamrataDwivedi, PradnyaChikhale, VrundaBhusari
508-515
52 A NOVEL APPROACH FOR VIDEO RESTORATION USING GROUP-BASED SPARSE REPRESENTATION
M.BAGYA LAKSHMI, S.GOMATHI, S.MALAIARASAN
516-519
53 Security Enhancement In 4G Technology By Integrating SME and EPS Architecture
R.Pradeepa, CH.Lavanya, G.Rajalakshmi, S.Kalaivani
520-523
54 Improving Security of Publish/Subscribe System Using HASBE
Gokula Nath G, Syamamol T
524-527
55 Identification Of Discrimination And Prevention Methods In Data Mining
Mhaske Ashwini B., Jamdar Tanaji J., Taware Mitali A., Dhavale Sachin B.
528-532
56 Hiding Patient Confidential Information in ECG Signal Using DWT Technique
Ms. Pawar Kshetramala Dilip, Prof. V. B. Raskar
533-538
57 Sensor based automatic control of railway gates
Karthik Krishnamurthi, Monica Bobby, Vidya V, Edwin Baby
539-543
58 Finding an Efficient Approach for Generating Frequent Patterns in Large Database
Ms. Deepika Fole, Asst Prof. Chaitali Choudhary
544-548
59 Detection and Fixing of web application vulnerabilities on field data
Michael Joshuva A., Savaridassan P.
549-555
60 Digital Image Sharing using Encryption Processes
Taniya Rohmetra, KshitijAnil Naik, Sayali Saste, Tejan Irla
556-561
61 Plug-ins an Added component for automatic testing of Modern Web Applications
S.MD.HAROON,D. KHADAR HUSSAIN
562-567
62 Comparision And Analysis Of Wavelet Based Image Denoising Techniques
Ms. Preeti Dansena, Asst Prof. Omprakash Dewangan
568-571
63 ACO ALGORITHM FOR LOAD BALANCING IN SIMPLE NETWORK
Mrs Minal.Nerkar, Bhagyashree Kale, Shivani Bhutada, Chetan Darshale, Poonam Patil
572-576