Volume 4 Issue 11 November 2015

Volume 4 Issue 11 November 2015

S.No. Title and Authors of Paper Page.No.
1 A Hybrid Cryptography Technique to Support Cyber Security Infrastructure
Dr. Vivek Kapoor,Rahul Yadav
3995-4002
2 Destination-based Greedy Routing Protocol for Wireless Sensor Networks
Viraj Sahai,Neha Kaushik,Vansh Tuli
4003-4007
3 A Cumulative study of DTN network for secure data transmission
Siddhesh Pande, Pankaj Sharma, Pritesh Soni, Aniket Shrimawale
4008-4010
4 Security to Mobile banking using Location based Encryption
Apurva Deshpande, Manisha Jagtap, Supriya Kadam, Ashwini Chechare, Pallavi Dhade
4011-4014
5 A Novel and Efficient LZW-RNS Scheme for Enhanced Information Compression and Security
Abdul-Barik Alhassan, Kazeem A. Gbolagade, Edem K. Bankas
4015-4019
6 A SURVEY ON RELEVANCE FEATURE SELECTION METHOD FOR TEXT CLASSIFICATION
Nisha Ranjani.S,Karthikeyan.K
4020-4024
7 A ROBUST METHOD TO OVERCOME COMPRESSION LOSS IN VIDEO OBJECT STEGNOGRAPHY
C.Deepthi Nivetha, E.P.Prakash, G.Poorni
4025-4029
8 Development in RFID (Radio Frequency Identification) Technology in Internet of Things (IOT)
HEMALATHA D, AFREEN BANU E
4030-4038
9 A Personalized E-Learning Recommender System Using the Concept of Fuzzy Tree Matching
G. Poorni,K. Balaji,C. DeepthiNivetha
4039-4043
10 Simulation and Mathematical modelling of MEMS Acoustic Sensor
Diksha Sharma,Arti Arora
4044-4048
11 A Review on Intrusion Prevention and Self-healing of Server side
Priya N Jethani, Ankush S. Narkhede
4049-4052
12 AN ENERGY EFFICIENT DATA SHARING USING INFORMATION CENTRIC APPROACH WITH INFORMATION SECURITY IN BIG DATA
ARUNUDAYA R, AFREEN BANU E
4053-4061
13 ENHANCEMENT OF KERNEL DISCRIMINATIVE ANALYSIS (KDA) IN FACE SPOOFING DETECTION METHOD
S.Menaka, E.P.Prakash, V.Dhinakari
4062-4068
14 A Survey On Re-Ranking of Images
Ms. Gouri K. Ghadge , Prof. Mrs. G. J. Chhajed
4069-4072
15 A Review on Application of Image Processing for Automatic Inspection
Hema L. Chavan., Santosh A. Shinde
4073-4075
16 A Survey On Opinion Mining Techniques for Social Sites
Pallavi D. Jawalkar, Prof. Mrs. G. J. Chhajed, Prof. Mukesh B. Rangdal
4076-4080
17 An improved two-warehouse partial backlogging inventory model for deteriorating items under conditionally permissible delay in payment
Sanjai Sharma
4081-4090
18 Recognizing Surgically Altered Face Images Using Granulation Computation Approach and Hybrid Spatial Features
Miss. Asavari Gajanan Joshi, Prof. A. S. Deshpande
4091-4095
19 A Novel Approach of ECG Classification for Diagnosis of Heart Diseases: Review
Ekta Gajendra,Mr. Jitendra Kumar
4096-4100
20 Intrusion Dеtеction and Mеssagе Authеntication Protocol (IDMAP) for VANЕTs
Vishal Patil, Deepak singh tomar, Jayesh baviskar
4101-4107
21 Progressive Image Transmission Using OFDM System
Abhijit S. Andure, Prof. S. M. Shende
4108-4112
22 Digital – Notice Board
Jaiswal Rohit , Kalawade Sanket , Kore Amod , Lagad Sanket
4113-4115
23 Sentiment Analysis Based on Data Mining and Natural Language Processing
Deepak Kumar Yadav ,Sampada Vishwas Massey
4116-4120
24 Abandoned Object Detection And Vigilance Enhancement Using Video Surveillance
Kavita Patel, Prof. G. Ramya
4121-4127
25 Preserving Data Mining through Data Perturbation
Mr. Swapnil Kadam, Prof. Navnath Pokale
4128-4133
26 Recommendation and Sharing the Social videos from Irrelevant Content Promoter
J.Akila, Dr. Godfrey Winster
4134-4137
27 A Review on Secure Methodology Fragmentation and Replication of data in cloud for Data Secrecy and Ideal Performance
Radhika Chavan, Prof. S.Y.Raut
4138-4141
28 Real-time foreground segmentation and boundary matting for live videos using SVM technique
Kajal Sangale, Prof. N.B.Kadu
4142-4146
29 A Survey On Short Text Summarization Of Comment Streams On Social Network Sites
Ms. Pooja S. Choudhari , Prof. S. S. Nandgaonkar
4147-4151
30 DYNAMIC AGGREGATE KEY GENERATOR FOR CLOUD COMPUTING
Deepika Patil, Ashish Modak, Swagnik Das, Arshi Akab
4152-4156
31 A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS
T.Sathya, T.Krishnan
4157-4163
32 Survey on Extractive Summary Generation from Opinion Targets and Opinion Words with Word Alignment Model
Ashwini B. Atole
4164-4167
33 INTELLIGENT PARKING MANAGEMENT SYSTEM
Ranjit Bhosale, Dhanashree Nemade, Shreyasi Kolapkar, Simran Manghwani,Mrs. Rajasree R.S.
4168-4170
34 Efficiency improvement for RFG based face recognition
Kuldeep Parade Patil, Ismail Aman, Omkar Konnur, Sudhindra Purohit
4171-4172
35 One Approach of e-learning Platform Customization for Primary Education
Nenad Kojic, Aleksandra Adzic, Radica Kojic
4173-4178
36 Efficient Algorithm for Predicting QOS in Cloud Services
Sangeeta R. Alagi, Srinu Dharavath
4179-4183
37 Simulation and Analysis of OFDM and SC-FDMA with STBC using Different Modulation Techniques
Navjot Kaur, Er.Neetu Gupta
4184-4189
38 Comparison on the Performance of Genetic Algorithm and Ant Colony Optimization
Pardeep Kaur, Er. Neetu Gupta
4190-4194
39 Real Time Anomaly Intrusion detection using SVM and Genetic selection process and Fuzzy Logic
Mr. Jitendra Soni,Mr. Arpit Agrawal,Govind Bisen
4195-4197
40 Enhancing the Security of Internet Banking using Iris Biometrics
AbhidaShende,Apurva Patil,PrachiPatole,Prof. Mrs. B Mahalakshmi
4198-4201
41 Efficient Protocol for Privacy Preserving Association Rule Mining
Dr. P. R. Deshmukh , Miss Prajakta Jaswante
4202-4207
42 IMPROVED SOURCES ANONYMITY MESSAGE AUTHENTICATION CODE TECHNIQUE USING GLOBAL HOP LEVEL PUBLIC CRYPTO SCHEME IN WSN
Jeyakumar. L,Dr. Senthil Kumar. C
4208-4216
43 EMERGENCY MEDICAL HELP SYSTEM USING OSM
Mahesh Burkul, Ajay Nadmane, SwapnilUdamale, SharadVagare
4217-4221
44 System configuration of v-f control with solar PV generator operating at MPPT with a battery storage System
K.Gokila, D.DanPrakash
4222-4227
45 Elastic Bunch Graph Matching : A Review
Yugal kishor Sahu, Sonu Agrawal
4228-4231
46 IoT in Mines for Safety and Efficient Monitoring
G. Prabhakar Reddy,M.Vijaya Lakshmi
4232-4236
47 A TECHNIQUE OF MINING DATA WITH LARGE DATASET-SURVEY
Surya.k
4237-4240
48 A LITERATURE SURVEY ON COST EFFICIENT RELIABLE AND SECRET DATA SHARING SCHEME
V.Dhinakari,R.NallaKumar, S.Menaka
4241-4246
49 A Survey Paper on Continuous Authentication by Multimodal Biometric
Nikita M. Agashe,Prof. Sonali Nimbhorkar
4247-4253
50 Improved Particle Filter for Tracking Objects in Video
Tram Tran Nguyen Quynh
4254-4261
51 A Survey Paper on Detection of Denial of Service Attack on Wireless Network
Pooja Gudadhe,Sonali Nimbhorkar
4262-4265
52 Binary Integrity in RGB Image: A Case of LSB Technique for Watermarking
Krishna Kumar Bohra, Prof (Dr) Priyadarshi Patni
4266-4269
53 PSoC Based Isolated Speech Recognition System for Voice controlled Appliances
Devarsh V. Bharambe, S. P. Kodgire
4270-4272
54 QoS Enhanced Scheduling Framework for IoT Using LTE-A
Aiswariya Milan K, Shilpa Ramesh
4273-4276
55 AN ENHANCED DYNAMIC CONGESTION DETECTION AND CONTROL ROUTING IN MOBILE AD-HOC NETWORK
P.Dhivya, Dr. S.Meenakshi
4277-4283
57 Building Confidential and Efficient Query Services in the Cloud Using kNN-R and RASP Data Perturbation
MS. DIPALI S. SHINTRE, DR. S. M. JAGADE
4288-4292
58 Review Paper on AODV Protocol for link stability in mobile ad-hoc network
Amanpreet Singh, Ashish Dutt
4293-4296
Remaining Papers will be available soon….