Volume 4 Issue 10 October 2015

Volume 4 Issue 10 October 2015

S.No. Title and Authors of Paper Page.No.
1 Research Study of Techniques for Securing Cloud
Miss. Pooja D.Bardiya, Prof.Mr.P.L.Ramteke
3744-3750
2 Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology
E. Pragnavi,J. Sandeep Kumar
3751-3756
3 Human Effects of Enhanced Multiparty Secured Access Control for Online Social Networks
Ms.M.Sandhiyah,Mrs.V.Shanmuga priya
3757-3766
4 Review Paper on Energy Efficient Zone Routing Protocol
Nidhi Rani , Sonal Rana
3767-3771
5 Review On Attribute-assisted Reranking for Image Search
Waghmare Supriya, Wavhal Archana, Patil Nital, Tapkir Yogita, Prof. Yogesh Thorat
3772-3774
6 A Survey on Virtual reality platform and its Applications
Akrati Bhat, Gunjan Bhagwat, Jagannath Chavan
3775-3778
7 MobSafe: Forensic Analysis For Android Applications And Detection Of Fraud Apps Using CloudStack And Data Mining
Patil Rohini, Kale Pallavi, Jathade Pournima, Kudale Kucheta, Prof.Pankaj Agarkar
3779-3782
8 A chatbot system demonstrating Intelligent Behaviour using NLP
Ameya Vichare, Ankur Gyani, Yashika Shrikhande, Nilesh Rathod
3783-3785
9 Comparative Study and Analysis on various Opinion Mining Techniques
Deepak Kumar Yadav,Sampada Vishwas Massey
3786-3794
10 A Reversible Data Hiding Scheme Based on Two Dimensional Difference-Histogram Modification to Embed Binary Data
Shivani Sharma, Kulwinder Singh
3795-3804
11 Automatic Service Discovery using Ontology Learning Semantic Focused Crawler for Mining
D.Saranya, S.Thulasidass,D.Gomathi
3805-3811
12 Peer To Peer Communication Using Heterogeneous Networks
Khandave Pooja, Karande Ashwini, Kharmale Swati,Vanve Subeda
3812-3816
13 A Survey: Cluster based Routing Protocols in Wireless sensor network
Rohan Jaysinh Parmar, Dr. Sanjay kumar
3817-3822
14 Energy Aware Data Aggregation in Wireless Sensor Network
Rohan Jaysinh Parmar, Dr. Sanjay kumar
3823-3828
15 Development of LabVIEW based Slit and Bender System Controlling Graphical User Interface (GUI)
Amit Gupta, Deepika Soni
3829-3830
16 Data Security in Multi Cloud Computing:A Brief Review
Mrs. Renu Nagendra Shinde, Prof. Mrs. Varsha Khandekar
3831-3835
17 Implementation of Home Automation System Using Android Smart Phone
D.Sashikala, M.Indira
3836-3839
18 REDUCTION OF TIME PERIOD IN ROM USING CONSTANT DELAY LOGIC STYLE TECHNIQUE
T.ARVEEND, NARESH SURABU, SURESH H. BALLALA
3840-3860
19 A Review On Various Attack Detection Techniques In cloud Architecture
Amandeep Kaur, Anupama Kaur
3861-3867
20 Secure Data Hiding using Cryptography And LSB Techniques
Shambhavi U. Burge, Nitin A. Sawant , Swapnil D. Choudhari, Priyanka A. Sonkusare
3868-3870
21 Security and Load Balancing In Cloud Computing
Tejashri Khandve,Megha Talekar,Sheetal Dhiwar,Madhuri Patil
3871-3874
22 SMART SHOPPING TROLLEY USING RFID
Komal Ambekar, Vinayak Dhole, supriya sharma,Tushar Wadekar
3875-3877
23 Wound Image segmentation using Fuzzy logic
Nila Mankar, U.T.Nagdeve , Manisha Mankar
3878-3880
24 PERFORMANCE COMPARISION OF IMPACT ON USERS OF SOCIAL MEDIA USING CLASSIFICATION ALGORITHM
Mrs. R. Srividhya,Ms. R. Suganya
3881-3889
25 WIRELESS SMART ENERGY METER
Mrs, N.Saranya, Mrs, V. Shanmugapriya
3890-3897
26 Land Slide Detection and Animal Detection Using WSN
Prof.C.S.Patil, Prof.R.R.Karhe, Mr.S.B.Kothawade
3898-3902
27 Improved Data Security Using Video Steganography
Anmol D Kulkarni, Esti Bansal, Hole Rajashree B, Jadhav Rasika R, Lakshmi Madhuri
3903-3905
28 Removal of Random Value Impulse Noise using Various Filters: A Review
Rita Rai, Prof. Shanu Singla
3906-3909
29 Design And Implementation of an Optimized Way of Multi-Phase Grid And Color Based Password Authentication System in Cloud Computing
Teshu Gaurav Singh,Miss Sarita Sharma,Mr. Gurpreet Singh Chhabra
3910-3916
30 Multi owner based data security in cloud using threshold cryptography: A Survey
Sagar Rakshe, Rushikesh Suryawanshi, Sachin Tandale, Onkar Thorawade
3917-3920
31 A Review on Secured Techniques for Privacy Preserving and Auditability in Cloud-assisted Mobile-access of Health Data
Radhika Chavan, Prof. S.Y.Raut
3921-3924
32 MRI Segmentation using K-Means Clustering in HSV Transform
Rajnisha Verma, Sagar Singh Rathore, Abhishek Verma
3925-3929
33 Distributed Big RDF Data Processing and Data Partitioning using hadoop in Cloud
Tejas Bharat Thorat,Prof.Ranjana R.Badre
3930-3933
34 A STUDY ON EDUCATIONAL DATA MINING
Dr.S.Umamaheswari, K.S.Divyaa
3934-3940
35 Study and Implementation of Secure Storage Service in Cloud Computing
Mrs. Pramila Kailas Ahire, Prof. R. V. Patil
3941-3944
36 Moving Objects Tracking with due Account for Motion Direction and Partial Occlusions
D. Peleshko, Yu. Ivanov, I. Izonin, O. Makoveychuk, D. Batyuk
3945-3953
37 An Evaluation Criteria of Autonomic Network Architecture
P.Lakshmisagar, K.Lalitha
3954-3959
38 EFFECTIVE SERVICES IN OPERATING SYSTEM
Sweta
3960-3963
39 Location Based Services on Windows Phone
Kalyani Ganesh Kadam, Prof. Vaishali Khairnar, Dr. Deven Shah, Prof. Hariram K. Chavan
3964-3968
40 Game Changers for Transforming Government
Gopala Krishna Behara
3969-3972
41 Survey Paper on an Efficient Secured system for data transactions in Decentralized Disruption Tolerant Networks
Rohan Jadhav,Tasmin Pathan,Ashok Kumbhar,Prof. A. S. Hambarde
3973-3975
42 A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network
M.MADHUMATHI, S. Sindhuja
3976-3981
43 Circuit Design of Low area 8-bit magnitude Comparator With Low Power by Static CMOS
T. Suryakala, B. Swaroopa, Bhaskara Rao Doddi
3982-3986
44 An Efficient Framework for Deduplication in Cloud
Kunal R. Mahajan, Akshay D. Nagawade, Ravina Patil, Deepak Choudhari
3987-3989
45 Area efficient Circuit Design of N-bit Carry look Ahead Adder with High Speed by using Static CMOS
Y. Aswani,V.Balaji,Bhaskara Rao Doddi
3990-3994
Remaining Papers will be available soon….