S.No. |
Title and Authors of Paper |
Page.No. |
1 |
RED-PROFUNDITY DESIGNED FOR TRUST VALUATION IN SOCIETAL NETWORKS
A. Praveen,M. Kamala Kumari |
4297-4303 |
2 |
A Survey on Optimization Techniques in Wireless Sensor Networks
P.Hemalatha, Dr.J.Gnanambigai |
4304-4309 |
3 |
Discrete Wavelet Transform Method For The Reduction Of Computation Time To Denoise Image Corrupted By Salt And Pepper Noise
S.Gomathi, Dr.S.M.Jagatheesan |
4310-4313 |
4 |
IDENTIFICATION OF MEASUREMENT ITEMS OF PERFORMANCE DIMENSIONS IN CONTAINER PORT TERMINALS
T. Hari Krishna,N. Vijaya Sai,M. Ashok Chakravarthy,V. Sudheer Kumar |
4314-4319 |
5 |
Developing a Water Quality Model for Upper Lake of Bhopal Using Data Mining Methods
Sanjeev Gour,Dr. Mamta Gour, Purushottam Sharma |
4320-4324 |
6 |
Analysis of security issues in Vehicular Ad Hoc Networks (VANET)
K.Balaji, D.Yaso Omkari, M.Swathi, P. Bhavya |
4325-4331 |
7 |
Data Mining Techniques: An Overview
Miss. Radhika K. Rathi, Dr. S. E. Yedey |
4332-4338 |
8 |
COMPARING THE TECHNIQUES OF CLUSTER ANALYSIS FOR BIG DATA
Miss. Harshada S. Deshmukh, Prof. P. L. Ramteke |
4339-4343 |
9 |
Web image re-ranking and their techniques for better search experience: An Overview
Miss. Namrata P. Kawtikwar, Prof. M.R. Joshi |
4344-4348 |
10 |
Improving Data Security over Cloud at Storage Level Using Efficient Encryption Based Approach
Dushyantkumar B. Sisode,Vijay Kumar Verma |
4349-4351 |
11 |
(2, (c1, c2))-Regular Intuitionistic Fuzzy Graphs
S. Ravi Narayanan, N.R. Santhi Maheswari |
4352-4358 |
12 |
IMPLEMENTATION OF AN OPTIMIZATION TECHNIQUE: GENETIC ALGORITHM
TWINKLE GUPTA |
4359-4364 |
13 |
High Speed SPI Slave Implementation in FPGA using Verilog HDL
Mr. Akshay K. Shah |
4365-4369 |
14 |
A Study on an Intuitionistic Fuzzy Prime Γ-Hyperideals of Γ- Semihyperrings
S.Abirami,S.Murugesan |
4370-4376 |
15 |
DEVELOPMENT OF EFFECTIVE TIME SERIES FORECASTING MODEL
Fedir Geche, Anatoliy Batyuk, Oksana Mulesa, Mykhaylo Vashkeba |
4377-4386 |
16 |
A Review on Software Defect Prediction
H. S. Shukla,Deepak Kumar Verma |
4387-4394 |
17 |
Analysis of 8T SRAM Cell Using Leakage Reduction Technique
Sandhya Patel, Somit Pandey |
4395-4399 |
18 |
Image Transmission Using 64-QAM Modulation Technique in Digital Communication System
Shadbhawana Jain, Shailendra Yadav |
4400-4403 |
19 |
A Query Based Algorithm For Optimal Location Search
ASHWINI PAWAR, PRAJOTI HIRAVE, SHRUTI POOJARI, POOJA PAWAR |
4404-4406 |
20 |
A REVIEW OF VARIOUS PRIVACY POLICY APPROACHES TO IMPROVE SECURITY IN SOCIAL NETWORKING COMMUNITIES
Ashita |
4407-4410 |
21 |
A Result Paper on Investigation of Incremental Detection Problems in Distributed Data
Mr.Dattatray Raghunath Kale, Mr. Satish R.Todmal |
4411-4414 |
22 |
Malaria Outbreak Prediction Model Using Machine Learning
Vijeta Sharma,Ajai Kumar,Lakshmi Panat,Dr. Ganesh Karajkhede,Anuradha lele |
4415-4419 |
|
Remaining Papers will be available soon…. |
|