Published: 2017-12-30

Personalized Web Search with Custom Privacy Preservation

Swapna Desale ,Jyothi Rao

Abstract 46  | PDF

Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

V. Mariyammal , Dr.K.Thamodaran

Abstract 60  | PDF

A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup

Sushma K R Mrs.Renuka malge

Abstract 54  | PDF

Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review

Sapna Pooja Nagpal

Abstract 55  | PDF

Intrusion Detection System Using Machine Learning Approach

P.Akshaya, .

Abstract 79  | PDF

Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images

Ankoji Pavan , K. Ramanjaneyulu

Abstract 52  | PDF

An Efficient Approach for Secure Data Hiding Using Cryptography

Reetu, Ms.Mamta Mr. Satish Dhull

Abstract 56  | PDF

MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

Prinkesh Soni, Ankush Yadav , Rakesh Singh Lodhi, Amit Solanki

Abstract 65  | PDF

An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model

Akanxa Mishra, Namrata Sharma .

Abstract 48  | PDF

Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

N. Pavani , P. Pothuraju

Abstract 56  | PDF

An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation

Pooja Chaturvedi, Chetan Gupta

Abstract 47  | PDF

Emotion Speech Recognition System For Isolated Words In Marathi Language

Asmita Gajarishi Shital Sukre, Dhanashri Rachetti Pratik Kurzekar

Abstract 73  | PDF

Publish/Subscribe Systems Security through Distinct Identity Encryiption

R. Kiranmayi, P. Pothuraju

Abstract 48  | PDF

Fixed Point Theorem in Weakly Compatible Self Mappings on Complete

Dr.M.RamanaReddy, .

Abstract 50  | PDF

Filter Bubble: How to burst your filter bubble

Sneha Prakash .

Abstract 76  | PDF

Simulation of Steerable Gaussian Smoothers using VHDL

Sharanabasava, Syed Gilani Pasha

Abstract 42  | PDF

Study of Unified Power Quality Conditioner for Power Quality Improvement

Anupam Ojha , Amit Solanki, Rakesh Singh Lodhi

Abstract 42  | PDF

Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

K.Sridhar Dr. Syed Abdul Sattar Dr. M.Chandra Mohan

Abstract 35  | PDF

Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

Dillip Kumar Swain , Sarojananda Mishra , Sasmita Mishra

Abstract 37  | PDF

Cone metric spaces and fixed point theorems of contractive mappings

C Vijender .

Abstract 33  | PDF

Characterization of Advanced Encryption Standard (AES) for Textual and Image data

S. Rehman *, S.Q. Hussain , W.Gul and Israr

Abstract 38  | PDF

Automated diagnosis of Lungs Tumor Using Segmentation Techniques

S.Piramu Kailasam ,Dr. M. Mohammed Sathik

Abstract 52  | PDF

Mobile Printer with Bluetooth Compatibility Using Raspberry PI

G.Jhansi, S.Saraswathi .

Abstract 59  | PDF

Enhanced Way of Association Rule Mining With Ontology

T.Bharathi, Dr. A.Nithya .

Abstract 41  | PDF

Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy

G Krishna Vasudeva Rao, K Premchand

Abstract 32  | PDF

Vein Pattern Recognition: A secured way of Authentication

Navjot Kaur , Paritosh Chopra

Abstract 33  | PDF

Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

Swati Rastogi, Surya Prakash , S.P.Duttagupta, H.Muthurajan

Abstract 35  | PDF

Speech Recognition using e-Speaking: A Review

Anju Bisen, Krishna Hirpara Madhu, Roshani Rathore

Abstract 37  | PDF

Visual Crypto-Steganography in Images

Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami shah

Abstract 45  | PDF

Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

Yashwant kumar, Rajat joshi Tameshwar mandavi, Simran bharti Miss Roshni Rathour

Abstract 63  | PDF

An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

S. Anuradha, K.B. Madhuri B. Jaya Lakshmi

Abstract 37  | PDF

Effect of Nano Fluids in Solar Flat Plate Collector Systems

S. Arockiaraj, P. Jidhesh

Abstract 38  | PDF

Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

H.T. Rathod*, K. Sugantha Devi , C.S.Nagabhushana , H.M.Chudamani

Abstract 41  | PDF

Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Aarti Bhoi Ashwini Madan , Tejal Khandave

Abstract 33  | PDF

Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register

Cheekati Sirisha K. Prakash

Abstract 32  | PDF

Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management

Vengala Abhilash , J. Pushparani

Abstract 41  | PDF

A Review on Feature Extraction Techniques for Speech Processing

Amandeep Singh Gill .

Abstract 39  | PDF

A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic

A.Malathi *, M.Theinmozhi

Abstract 45  | PDF

MongoDB for Read Intensive Cases Using YCSB

Adarsh Kumar , Anita Ganpati

Abstract 41  | PDF

Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation

Manish Vyas , Dr. Saurabh Jain

Abstract 73  | PDF

Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

Bhaskar Chaturvedi,Uttkarsh Rawat,, Tanish Aggarwal,Shriyash Mohril, Mahipal Singh Sankhla, Dr. Rajeev Kumar

Abstract 28  | PDF

Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time

B. SUMANJALI , K. NAGAIAH , B. ANITHA

Abstract 37  | PDF

A Concise Study about Data Mining Methods, Tools and Its Trendy Applications

C.Thangamalar, R.Ramya R.Lavanya

Abstract 32  | PDF

Mobile Apps Fraud Detection Using Raking

D.Uma Maheswari, S.Jassica Saritha

Abstract 33  | PDF

An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET

Dr. N. Rama, Justin Sophia. I

Abstract 43  | PDF

Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

Sanjay Kumar, Narendra Sahu Aakash Deep , Khushboo Gavel Miss Rumi Ghosh

Abstract 50  | PDF

A Review on Prediction of User Action Interpretation for Online Content Optimization

Mr. Pratik V. Pande , Dr. M.A.Pund

Abstract 35  | PDF

Fusion Layer Topological Space Query Indexing For Uncertain Data Mining

M. Kalavathi, Dr. P. Suresh

Abstract 35  | PDF

Blood group Detection and RBC, WBC Counting: An Image Processing Approach

Akshaya P. Sahastrabuddhe , Dr. Sayyad D. Ajij

Abstract 56  | PDF

Fixed points of -generalized contraction selfmapings in D*-metric space

Dr C Vijender .

Abstract 37  | PDF

Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

J.JenoMactaline Pears ,Dr.D.C.Joy Winnie Wise

Abstract 35  | PDF

Sentiment Analysis Through Text Mining-A Review

Anupriya Pandey Rakhi Verma, Deepika Bariha Varsha Dewangan

Abstract 40  | PDF

Analysis of Bigdata Using Visualizing Technique

Aalia Qureshi , Dr. Tripti Arjariya

Abstract 28  | PDF

Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing

Amandeep Kaur , Pooja Nagpal

Abstract 46  | PDF

Preventing Social Sites from Publishing Malicious Content

Deepak Ranjan , Dr. Tripti Arjariya

Abstract 46  | PDF

Fruit Recognition and its Calorie Measurement: An Image Processing Approach

Manpreetkour Basantsingh Sardar Dr. Sayyad D. Ajij

Abstract 50  | PDF

Mobile Application Testing: Tools & Challenges

PPallavi Bhuarya, Shruti Nupur Anuradha Chatterjee, Rajesh Singh Thakur

Abstract 39  | PDF

Various audio Steganography techniques for audio signals

Rubby Garg , Dr.Vijay Laxmi

Abstract 36  | PDF

Impact of Security Risk on Cloud Computing Adoption

Shashank Mishra, Manju. Pandey

Abstract 34  | PDF

A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data

Akash Sharma , Nikita Jain

Abstract 35  | PDF

Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project

Priyanka ,

Abstract 1285  | PDF

A Secure Pin Authentication Method against Shoulder Surfing Attacks

K.Kiruthika, D.Jennifer K.Sangeetha Jackulin.C, R.Shalini

Abstract 42  | PDF

Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data Extraction

Soriful Hoque

Abstract 32  | PDF

Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

R. Sai Sandhya, R. Padmini

Abstract 80  | PDF

Providing Privateness via Transaction Splitting Using PFP Growth Algorithm

M. Jhansi Rani, K. Venkatagurunath Naidu

Abstract 43  | PDF

Time Sequence Scheme for Ideal Transmit In Remote Systems

K. Surekha, N. Padmaja

Abstract 32  | PDF

Performance of Multi Server Validation and Key Association with User Protection in Network Security

R. Padmini .

Abstract 39  | PDF

Texture Classification with Motif Shape Patterns on Local Directional Pattern

Dr. P Chandra Sekhar Reddy

Abstract 34  | PDF