Published: 2017-12-30

Hybrid Approach for Location Based Customized POI Travel Recommendation System

Ashwini R,

Abstract 35  | PDF

Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data

Ms.K.Muthukarupaee1 , Ms.Blessyselvam2 ,Ms.V.Ranjani3, Ms.N.Radha4

Abstract 36  | PDF

A survey on Energy Monitoring System

Krupa Pensalwar , Pooja Daas, Saloni Verma Divya Rajwani

Abstract 30  | PDF

Adaption of Cloud Computing On Smart Phones To Enable Efficient Multimedia Applications

Dr. A.Samydurai, K.Priyadharshini

Abstract 42  | PDF

Review on Secure Routing in Wireless Adhoc Networks

Ugendhar Addagatla1, Dr. V. Janaki2

Abstract 30  | PDF

Health Care Virtual Environment System Reinforced by Hadoop and Cloud

Vidyashree S K .

Abstract 33  | PDF

A Survey of approaches for mining large data sets

Shweta Mishra, Vivek Badhe

Abstract 36  | PDF

Beacon for Proximity Target Marketing

Navalkrushna Allurwar,Balasaheb Nawale,Swapnesh Patel

Abstract 74  | PDF

Authentication System for Any Touch Devices Using DWT

Vasundhara M. Goslar(M.E.), Mangala Madankar

Abstract 33  | PDF

Enhancing Web Navigation Appropriateness by Correlating Actual and Predictable Practice

Ashwini R, .

Abstract 31  | PDF

A Survey on Moving Object Detection and Tracking Techniques

Shilpa , Prathap H.L , Sunitha M.R

Abstract 53  | PDF

Routing Taxonomies for Network Aware Territory of Vehicles: A Review

T. Sivakumar 1, Ali Tauseef Reza2 T. Anil Kumar 3

Abstract 37  | PDF

Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network

Punam Dandare1, Prof. Vikrant Chole2

Abstract 88  | PDF

Modeling The Performance Enablers Of Public Sector Banks Using Cfa And Conjoint Analysis.

T. Harikrishna1*, N. Vijaya Sai2

Abstract 34  | PDF

Smart pi cam based Internet of things for motion detection using Raspberry pi

Pallavi N R .

Abstract 36  | PDF

Digital Remembrance Based User Validation for Internet of Things [IoT]

Sunain Kowser,

Abstract 27  | PDF

Cloud Computing: “Secured Service Provider for data mining”

Garima Gupta, Dr. Rajesh Pathak

Abstract 38  | PDF

A Review of techniques for Automatic detection and diagnose of mango pathologies

S. B. Ullagaddi , Dr. S.Vishwanadha Raju2

Abstract 36  | PDF

Students Record System using Radio Frequency Technique

Purnima Singh1 Archana Gautam.2 Km. Jyotsana3, Diksha S ,Aditya Kumar Singh5

Abstract 28  | PDF

Improved PSO algorithm approach in Gray scale image multi-level thresholding

1 S. Sakthi Priya ,2 P. Rishika Menon, 3 M. Vasanthi , * I. Thivya Roopini *

Abstract 33  | PDF

A Survey on Captcha Categories

Divyashree N1, Dr. T. Satish Kumar2

Abstract 33  | PDF

New Approach in Biometrics to Combat the Automated Teller Machine Frauds: Facial Recognition

Priyanka Mahajan

Abstract 31  | PDF

Weather prediction using CPT+ algorithm

Dr. Bhawna Mallick1, Kriti Raj2, Himani3

Abstract 28  | PDF

Study of vulnerability taxonomies to provide a Novel approach for vulnerability categorization

Bindu Dodiya Ranawat1 Dr.Umesh Kumar Singh2

Abstract 31  | PDF

Optimum Route Selection & Modified Network Approach to optimize Power aware Routing in MANET

Nikita Yadav1, Abhishek Sharma2

Abstract 34  | PDF

Wireless Sensing System Security Concerns - A Review

Shabnum Mohi Ud Din1 , Narender Singh Rana2

Abstract 27  | PDF

My Privacy My Decision: Control Communication media on Online Social Networks

Arpitha B, Mrs. Deepika

Abstract 29  | PDF

An Analytic Survey On Current Clustering Technique of data Categorizing and Retrieving

Snehlata Bhadoria , U. Datta

Abstract 26  | PDF

Equal And Unequal Distribution of Nodes based Simulation of Routing Protocols in MANET

Vaibhav Gupta1, Prof. Ashish Mishra2

Abstract 30  | PDF

Bitcoin: First Decentralized Payment System

Richa Kaushal1

Abstract 44  | PDF

Comparision of two different andriod versions i.e Lollipop and Marshmallow, and also development of campsys mobile Andriod Application - An Overview

Dev Baloni ,Jyotsna, Minakshi Mandoli Pawitra Kathait

Abstract 54  | PDF

Comparism Of Thermal And Microwave Methods In Structural Modification Of Lumefantrine

Afolabi Ezekiel O; Ben Omoh E; OhanejeChidozie H; and Kindala Junior T.

Abstract 29  | PDF

Attack Graph-Based Approach For Enterprise Networks Security Analysis

Saidu Isah Rambo , Ibrahim M, Anka

Abstract 30  | PDF

LIVE: Lightweight Integrity Verification for Named Data Networking

M.K.M. Lhogeshvaree1 S. Muruganandam2,

Abstract 30  | PDF

Outlier Detection in High Dimension Data Based On Multimodality And Neighbourhood Size Using KNN Method

Deepthi Navile, Dr. Ravikumar G.K

Abstract 36  | PDF

A Review on an Efficient Monitoring Of Substations Using Microcontroller Based Monitoring System

Kaxil Patel, ,

Abstract 36  | PDF

A Survey On Unicast Routing Protocols For VANET

T. Anil Kumar1 , Ali Tauseef Reza2, T. Sivakumar3

Abstract 30  | PDF

OTP system with third party trusted authority as a mediator

Suraj Rasal 1, Megha Matta 2, Karan Saxena 3

Abstract 31  | PDF

Reliable and Adaptive Steganalysis Method for Binary Image Using CRMST Algorithm

K.Suganyadevi Snehalatha.V., M.E.,

Abstract 32  | PDF

Design and Implementation Of NAODV ETCP To Handle Jelly Fish Attack

Preety Dahiya, Miss Bhawana

Abstract 31  | PDF

Applications of Pattern Recognition Algorithm in Health and Medicine: A Review

Priyanka Mahajan

Abstract 67  | PDF

Nearest Neighbor Browsing and Search with Keywords in Spatial Databases

Sphurti S. Sao1, Dr. Rahila Sheikh2

Abstract 40  | PDF

GALSR: Geographical Based Adaptive Lifetime Secure Routing Protocol For Wireless Sensor Network

Hanan Raj.R1, Shanthameena.C2

Abstract 52  | PDF

Implementation of Robust Barcode Modulation Mechanism for Large Data Trans Reception Using Android Device

Ashwini Kasurde1, Pratima Bhati2

Abstract 27  | PDF

Automatic Railway Gate Control System

Randeep Kushwaha1, Brij Bihari Chaubey1 Jyotindra Kumar Singh1 Prashant Kumar Dubey1 Mr.Rahul Jaiswal2

Abstract 37  | PDF

Improved Tumor Detection Using Modified Hough Mertic Trasformation

Kirna Rani

Abstract 31  | PDF

A Survey on Partial Reconfiguration Techniques

Mrs Sowmya Aithal .

Abstract 35  | PDF

FPGA Implementation of AHB to APB Protocol

Mrs Sowmya Aithal , Dr. J.S. Baligar 2, Guruprasad S.P. 3

Abstract 147  | PDF

Free Vibration Response Of Double-Bay Multi-Storey Building Frames With Stiffened Joints

E.C. Mbanusi*1, D.A. Obodoh2

Abstract 35  | PDF

A General Framework for Multi-level security to restrict unauthorized users in Sulaymaniyah E-Court Database

Rzgar Sirwan Raza Zana Azeez Kakarash

Abstract 35  | PDF

Optimized cloud migration using reliabilty framework

Ancy Nevil.S, Kavitha Priya . C.J

Abstract 37  | PDF

Video broadcast using cloud computing with metadata

Carlos R. Soria-Cano1 Salvador Álvarez Ballesteros

Abstract 34  | PDF

Implementation and Analysis of Multi-Processing Processor Using Data Encryption Standard on FPGA

Soumya D1, Dr. K Ramesha2 and Guruprasad S P3

Abstract 30  | PDF

Design and Implementation of EEG Signals Analysis on FPGA

Sapana M Adhalli 1, H Umadevi 1 Guruprasad S P 2 and Rajeshwari Hegde3

Abstract 49  | PDF

Web Harvesting: A Technique for Fast Retrieval of Information from Web

Meenakshi Srivastava1, Dr. S.K. Singh2

Abstract 28  | PDF

Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic

B.Muniswamy, Dr. N. Geethanjali

Abstract 39  | PDF

Improvement of HADOOP Ecosystem and Their Pros and Cons in Big Data

S.Suguna1 , K.Devi2

Abstract 27  | PDF

Power Quality Improvement in Modified Solid State Transformer System Using Statcom

R.S. Sundaramoorthy, Dr.G.Udhayakumar, M.E.Ph.D,

Abstract 33  | PDF

Design Of A Model Predictive Control For A Multivariable Process

J. Merlin1, C. SelvaKumar2

Abstract 30  | PDF

Survey Paper on Recommendation System using Data Mining Techniques

Sony V Hovale , Poonam G

Abstract 42  | PDF

Design of Temperature Control Coolant

Vikash Chandra Sharma1, Ankit Verma1 , Aditya Kumar Gautam1 , Miss Rangoli Srivastava2

Abstract 29  | PDF

Block Based Compressed Sensing Algorithm for Medical Image Compression

S.Spurthi, Parnasree Chakraborty

Abstract 31  | PDF

Trust Based Cloud Service Provider Selection

S.Rajasree, B.Lydia Elizabeth

Abstract 35  | PDF

Automatic Mathematical and Chronological Prediction in Smartphone Keyboard

G. Indrajith, K.Vijayakumar

Abstract 36  | PDF

Generation of Question Paper using Credit System

Adhil Roshan N.A1, Abhishek Nair M2, C.K

Abstract 29  | PDF

Spoofing Attack Detection And Localization In Wireless Networks

V Jagadheeswar Reddy , M.Nirmala

Abstract 36  | PDF

E-Clinic

Snehali Nandurkar1, Dinesh Bandagar2 , Megharaj Hele3, Atul Gund4 , Guruprasad Kalkeri5

Abstract 32  | PDF

Implementing Campus Indoor Location Tracking System

S.Neelakandan1 , S.Muthukumaran2, R.Annamalai3

Abstract 43  | PDF

Introducing automated system for Lung Cancer Detection using Evolutionary Approach

Manasee Kurkure, Anuradha Thakare

Abstract 51  | PDF

Design of a Smart Low Cost Mini Ups for PC’s

Akshay M R, Arun Kumar S G Bhimappa Baragundi Harshavardhan M, 2Dr. Rehna VJ

Abstract 36  | PDF