Volume 6 Issue 12 December 2017

Volume 6 Issue 12 December 2017

S.No. Title and Authors of Paper Page.No.
01 WEB ONLINE REVIEW EVALUATION IN OPINION MINING USING HIERARCHICAL PACHINKO ALLOCATION MODEL
E.Sowmiya, M.Geetha
1801-1805
02 Data Transmission using clustering and Mobile Sink for wireless Sensor Network
Tesulata Sahu ,Deepak Shrivastava
1806-1808
03 MITIGATION OF BYZANTINE ATTACK IN MANET
Jitendra Soni, Ashish Soni, Shweta Shah,Dr.Kirti Mathur
1809-1815
04 Prevention of Data from Re-identifiers Using MapReduce
Mr. Kolekar Jairam, Mr. Pande Vikas, Mr. Nitin Khandagale, Mrs. Archana Gaikwad
1816-1819
05 Analysis of Reversible Data Hiding Techniques
Ms. Himani Patel, Ms. Himani Parekh
1820-1825
06 Rectangular Microstrip Patch Antenna employing Polycarbonate substrate for Broadcasting and Inductive applications
Amritpal Singh Grewal, Prabhdeepak Singh Sidhu, Simarjit Singh Saini
1826-1829
07 A Survey for Secure Cloud Replication in Private Cloud Environment
Shweta Shah,Sumeet Kothari,Arpit Agrawal,Ashish Soni
1830-1835
08 Data Hiding In Image Edge Base For Secure Communication Using DCT Method
Prof. PopatBorse,Rohit Kharve, Kushal Yadav, Aparna Jadhav, Kiran Kaldate
1836-1839
09 Ranking Algorithms based on Links and Contents for Search Engine: A Review
Charanjit Singh, Vijay Laxmi, Arvinder Singh Kang
1840-1844
10 Mining Frequent Patterns using Self-Organizing Map with MATLAB Neural Network Toolbox
Peddi Kishor, Dr. Sammulal Porika
1845-1850
11 Innovative Design of CMOS 8-bit Comparator using conditional tracking for low area
M. Meena Kumari, Bhaskara Rao Doddi, G.Sunil Kumar
1851-1855
12 Improved DHT Based Task Allocation Strategy with Least Migration and Adaptive Load Balancing Approach
Dr. Sanjay Tejbahadur Singh
1856-1866
13 CONGESTION IDENTIFICATION AND AVOIDANCE APPROACH TO INTERNETWORKING FOR TRAFFIC ENGINEERING MECHANISM
G.RAKESH,Dr.K.THANGADURAI
1867-1872
14 Network Reachability In Cross Domain Using Privacy Preserving Protocol
S.Lavanya, Lithiya Sara Babu, S.Seetha
1873-1876
15 Identification of Shape-Signature of Moving Objects in Video Frames: A review
Kalpana Martha, Chandra Sekhar Panda
1877-1885
16 Hardware Magnified Association Rule Mining for Hash Table Filter using MD5 Algorithm
M.Preethi, P.K.Mangaiyarkarasi
1886-1889
17 TRUSTBASED PREVENTION MECHANISM FOR SELECTIVE JAMMING ATTACK
Lalit Gehlod,Mala Dutta,Nikita Mulatkar
1890-1894
18 Online Product Rating by Utilization of Social Schedule and Filtering Fake Users
Madhu Rajput, Prof.Amit Thakur
1895-1901
19 A survey on Quad Tree based digital watermarking
Anamika Upadhyay,Prof.Nirupama Tiwari
1902-1907
20 INVESTIGATIONS ON AUTOMATED MONITORING SYSTEMS IN INDUSTRIES
Dr.K. Geetha, P. Prabha, C. Preetha Devi, S. Priyadharshini, S. Tamilselvan
1908-1914
21 AN ENHANCED APPROACH FOR OUTLIER DETECTION AND CLASSIFICATION IN CATEGORICAL DATA USING CLASSIC K-NN ALGORITHM
Monika.M, C.P.Balasubramaniam
1915-1920
22 Personalized and Ranking Travel Recommendation On Predict Of Multi Source Big Data
N.Kokila,Ms.R.Rooba
1921-1924
23 Design and Development of Data Mining Based Intrusion Detection and Intrusion Tolerant System
Kandukuri Chandrasena Chary
1925-1927
24 Location Alarm Application
Gunjan Pabreja ,Monal Rupapara, Chintan Rank
1928-1930
Remaining Papers will be available soon….