S.No. |
Title and Authors of Paper |
Page.No. |
01 |
WEB ONLINE REVIEW EVALUATION IN OPINION MINING USING HIERARCHICAL PACHINKO ALLOCATION MODEL
E.Sowmiya, M.Geetha |
1801-1805 |
02 |
Data Transmission using clustering and Mobile Sink for wireless Sensor Network
Tesulata Sahu ,Deepak Shrivastava |
1806-1808 |
03 |
MITIGATION OF BYZANTINE ATTACK IN MANET
Jitendra Soni, Ashish Soni, Shweta Shah,Dr.Kirti Mathur |
1809-1815 |
04 |
Prevention of Data from Re-identifiers Using MapReduce
Mr. Kolekar Jairam, Mr. Pande Vikas, Mr. Nitin Khandagale, Mrs. Archana Gaikwad |
1816-1819 |
05 |
Analysis of Reversible Data Hiding Techniques
Ms. Himani Patel, Ms. Himani Parekh |
1820-1825 |
06 |
Rectangular Microstrip Patch Antenna employing Polycarbonate substrate for Broadcasting and Inductive applications
Amritpal Singh Grewal, Prabhdeepak Singh Sidhu, Simarjit Singh Saini |
1826-1829 |
07 |
A Survey for Secure Cloud Replication in Private Cloud Environment
Shweta Shah,Sumeet Kothari,Arpit Agrawal,Ashish Soni |
1830-1835 |
08 |
Data Hiding In Image Edge Base For Secure Communication Using DCT Method
Prof. PopatBorse,Rohit Kharve, Kushal Yadav, Aparna Jadhav, Kiran Kaldate |
1836-1839 |
09 |
Ranking Algorithms based on Links and Contents for Search Engine: A Review
Charanjit Singh, Vijay Laxmi, Arvinder Singh Kang |
1840-1844 |
10 |
Mining Frequent Patterns using Self-Organizing Map with MATLAB Neural Network Toolbox
Peddi Kishor, Dr. Sammulal Porika |
1845-1850 |
11 |
Innovative Design of CMOS 8-bit Comparator using conditional tracking for low area
M. Meena Kumari, Bhaskara Rao Doddi, G.Sunil Kumar |
1851-1855 |
12 |
Improved DHT Based Task Allocation Strategy with Least Migration and Adaptive Load Balancing Approach
Dr. Sanjay Tejbahadur Singh |
1856-1866 |
13 |
CONGESTION IDENTIFICATION AND AVOIDANCE APPROACH TO INTERNETWORKING FOR TRAFFIC ENGINEERING MECHANISM
G.RAKESH,Dr.K.THANGADURAI |
1867-1872 |
14 |
Network Reachability In Cross Domain Using Privacy Preserving Protocol
S.Lavanya, Lithiya Sara Babu, S.Seetha |
1873-1876 |
15 |
Identification of Shape-Signature of Moving Objects in Video Frames: A review
Kalpana Martha, Chandra Sekhar Panda |
1877-1885 |
16 |
Hardware Magnified Association Rule Mining for Hash Table Filter using MD5 Algorithm
M.Preethi, P.K.Mangaiyarkarasi |
1886-1889 |
17 |
TRUSTBASED PREVENTION MECHANISM FOR SELECTIVE JAMMING ATTACK
Lalit Gehlod,Mala Dutta,Nikita Mulatkar |
1890-1894 |
18 |
Online Product Rating by Utilization of Social Schedule and Filtering Fake Users
Madhu Rajput, Prof.Amit Thakur |
1895-1901 |
19 |
A survey on Quad Tree based digital watermarking
Anamika Upadhyay,Prof.Nirupama Tiwari |
1902-1907 |
20 |
INVESTIGATIONS ON AUTOMATED MONITORING SYSTEMS IN INDUSTRIES
Dr.K. Geetha, P. Prabha, C. Preetha Devi, S. Priyadharshini, S. Tamilselvan |
1908-1914 |
21 |
AN ENHANCED APPROACH FOR OUTLIER DETECTION AND CLASSIFICATION IN CATEGORICAL DATA USING CLASSIC K-NN ALGORITHM
Monika.M, C.P.Balasubramaniam |
1915-1920 |
22 |
Personalized and Ranking Travel Recommendation On Predict Of Multi Source Big Data
N.Kokila,Ms.R.Rooba |
1921-1924 |
23 |
Design and Development of Data Mining Based Intrusion Detection and Intrusion Tolerant System
Kandukuri Chandrasena Chary |
1925-1927 |
24 |
Location Alarm Application
Gunjan Pabreja ,Monal Rupapara, Chintan Rank |
1928-1930 |
|
Remaining Papers will be available soon…. |
|