Volume 4 Issue 8 August 2015

Volume 4 Issue 8 August 2015

S.No. Title and Authors of Paper Page.No.
1 A Survey on Cybercrime – A Threat to Individual, Government
Manikeshwar.S.B, A.V. Krishna Mohan
3325-3328
2 Iris based attendance system
Prashik S. Bhagat, Prof. D. S. Shilwant, Prof. S. P. Kharde, Praful S. Bhagat, Abhijit S. Andure, Prof. Amol A. Shirsath
3329-3332
3 A new approach for clustering of text data based on fuzzy logic
Deepti Gupta, Er. Jitendra Dangra
3333-3336
4 A Research on minimizing security threat in cloud computing by DUN(declining unsecure Node) Technique
Amarbir Kaur,Nitin Bhagat
3337-3340
5 A NARRATIVE APPROACH FOR ANALYZING DIABETES MELLITUS AND NON PROLIFERATIVE DIABETIC RETINOPATHY USING PSVM CLASSIFIER
Dr.S.SUJATHA,DIVYA.D
3341-3345
6 Image Encryption then Compression System for Optimal Computational Resources
Vijayadarshini .H,Professor Shivleela Patil
3346-3356
7 An Effective Age Classification Based On Geometric Components Of the Face
Suprita.A.Patil,Prof ShivleelaPatil
3357-3362
8 Retinal Vessel Extraction by using Local Entropy based Thresholding and Directional Filters
Ms.Ramandeep Kaur,Mrs.Jaswinder Kaur,Mr.Inderjeet Singh Gill
3363-3369
9 Review on Variants of Routing protocols and Leach protocols in Wireless Sensor Network
Supreet kaur, Mandeep Singh Bandral
3370-3377
10 An Optimized Approach for Data Warehouse Schema Partitioning Technique
M.Thenmozhi, K.Vivekanandan
3378-3387
11 Real Time User-Centric Energy Efficient Scheduling In Embedded Systems
N.SREEVALLI, Mr.D.SRIHARI NAIDU
3388-3394
12 Second Order Median Filtering based Image De-hazing with Color Stabilization
Tanika Goyal, Sahil Vashisht
3395-3398
13 Review of Automobile Identification and Tracing
Ms. Varuni Chitransh, Prof Rahul Dubey
3399-3403
14 A Review of Different Generations of Mobile Technology
Amritpal Singh
3404-3408
15 Bandwidth management and fairness guarantee in wireless mesh network
S.Jounaidi, B.Nassereddine, Y.Saadi, A.Haqiq
3409-3414
16 Enhancement of MANET Security using Cross-layer Technology
Dr. K Suresh Babu, C. Sathvik
3415-3418
17 Lossy and lossless compression using combinational methods
Ms. C.S Sree Thayanandeswari, J Jeya Christy Bindhu Sheeba
3419-3424
18 Make the Availability of Big Data Advantages on Cloud Systems
Mr. M.Rengasamy, Mrs. P.Anitha
3425-3427
19 CBDS (Cooperative bait detection scheme) ATTACK – A Review
Prachi Arya,Gagan Prakash Negi,Pushpender Kumar Dhiman,Kapil Kapoor
3428-3434
20 Autonomous Energy Saving In Wireless Sensor Networks
Parvathy Ajay, Bibin Varghese Kurien
3435-3439
21 Sphere Decoding in Multi-user Multiple Input Multiple Output with reduced complexity
Er. Navjot Singh, Er. Vinod Kumar
3440-3445
22 Advanced Wireless Telemedicine application using Embedded Sensor and Android OS
Padmashree T, Dr.N.K.Cauvery, Smitha G R
3446-3454
23 Detecting and Reporting bugs by using Data Reduced technique
Prof. Amruta Gadekar, Nikita Waghmare, Pranjali Taralkar, Rahul Dapke
3455-3457
24 MultiHop Routing for Delay Minimization in WSN
Sandeep Chaurasia, Saima Khan, Sudesh Gupta
3458-3463
25 Priority Based Infrastructure Resources Allocation in Online Social Cloud
Shailesh H. Dinde, Arati M. Dixit
3464-3468
26 An Analysis of Performance of Routing Protocol for Low Power and Lossy Network in Sparse Wireless Sensor Network
Loven Kalyan, Karamjit Kaur
3469-3472
27 Exploring Role and Associated Challenges of Data Mining Technique and it’s Implementation in E-Governance
Krishna Kumar Verma, Navita Shrivastava
3473-3478
28 Design and Implementation of an Intelligent and Scalable Gateway with an integrated IVR, for transforming ordinary homes to Smart Homes/SOHOs
Ravi Prakash, Rahul Jayakrishnan
3479-3484
Remaining Papers will be available soon….