Published: 2017-12-30

Personalized Web Search with Custom Privacy Preservation

Swapna Desale ,Jyothi Rao
Full text

Abstract 292  | PDF 65 

An Efficient Approach for Secure Data Hiding Using Cryptography

Reetu, Ms.Mamta Mr. Satish Dhull
Full text

Abstract 301  | PDF 57 

MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

Prinkesh Soni, Ankush Yadav , Rakesh Singh Lodhi, Amit Solanki
Full text

Abstract 545  | PDF 229 

Emotion Speech Recognition System For Isolated Words In Marathi Language

Asmita Gajarishi Shital Sukre, Dhanashri Rachetti Pratik Kurzekar
Full text

Abstract 304  | PDF 116 

Filter Bubble: How to burst your filter bubble

Sneha Prakash .
Full text

Abstract 354  | PDF 327 

Simulation of Steerable Gaussian Smoothers using VHDL

Sharanabasava, Syed Gilani Pasha
Full text

Abstract 616  | PDF 39 

Study of Unified Power Quality Conditioner for Power Quality Improvement

Anupam Ojha , Amit Solanki, Rakesh Singh Lodhi
Full text

Abstract 215  | PDF 137 

Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

K.Sridhar Dr. Syed Abdul Sattar Dr. M.Chandra Mohan
Full text

Abstract 256  | PDF 34 

Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

Dillip Kumar Swain , Sarojananda Mishra , Sasmita Mishra
Full text

Abstract 396  | PDF 44 

Characterization of Advanced Encryption Standard (AES) for Textual and Image data

S. Rehman *, S.Q. Hussain , W.Gul and Israr
Full text

Abstract 368  | PDF 53 

Automated diagnosis of Lungs Tumor Using Segmentation Techniques

S.Piramu Kailasam ,Dr. M. Mohammed Sathik
Full text

Abstract 155  | PDF 50 

Enhanced Way of Association Rule Mining With Ontology

T.Bharathi, Dr. A.Nithya .
Full text

Abstract 561  | PDF 98 

Vein Pattern Recognition: A secured way of Authentication

Navjot Kaur , Paritosh Chopra
Full text

Abstract 584  | PDF 395 

Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

Swati Rastogi, Surya Prakash , S.P.Duttagupta, H.Muthurajan
Full text

Abstract 294  | PDF 48 

Speech Recognition using e-Speaking: A Review

Anju Bisen, Krishna Hirpara Madhu, Roshani Rathore
Full text

Abstract 830  | PDF 137 

Visual Crypto-Steganography in Images

Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami shah
Full text

Abstract 732  | PDF 45 

Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

Yashwant kumar, Rajat joshi Tameshwar mandavi, Simran bharti Miss Roshni Rathour
Full text

Abstract 357  | PDF 251 

An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

S. Anuradha, K.B. Madhuri B. Jaya Lakshmi
Full text

Abstract 488  | PDF 38 

Effect of Nano Fluids in Solar Flat Plate Collector Systems

S. Arockiaraj, P. Jidhesh
Full text

Abstract 324  | PDF 214 

Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

H.T. Rathod*, K. Sugantha Devi , C.S.Nagabhushana , H.M.Chudamani
Full text

Abstract 271  | PDF 66 

Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Aarti Bhoi Ashwini Madan , Tejal Khandave
Full text

Abstract 170  | PDF 75 

MongoDB for Read Intensive Cases Using YCSB

Adarsh Kumar , Anita Ganpati
Full text

Abstract 591  | PDF 242 

Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

Bhaskar Chaturvedi,Uttkarsh Rawat,, Tanish Aggarwal,Shriyash Mohril, Mahipal Singh Sankhla, Dr. Rajeev Kumar
Full text

Abstract 286  | PDF 31 

Mobile Apps Fraud Detection Using Raking

D.Uma Maheswari, S.Jassica Saritha
Full text

Abstract 304  | PDF 58 

Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

Sanjay Kumar, Narendra Sahu Aakash Deep , Khushboo Gavel Miss Rumi Ghosh
Full text

Abstract 372  | PDF 1154 

Blood group Detection and RBC, WBC Counting: An Image Processing Approach

Akshaya P. Sahastrabuddhe , Dr. Sayyad D. Ajij
Full text

Abstract 211  | PDF 722 

Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

J.JenoMactaline Pears ,Dr.D.C.Joy Winnie Wise
Full text

Abstract 270  | PDF 64 

Sentiment Analysis Through Text Mining-A Review

Anupriya Pandey Rakhi Verma, Deepika Bariha Varsha Dewangan
Full text

Abstract 847  | PDF 137 

Analysis of Bigdata Using Visualizing Technique

Aalia Qureshi , Dr. Tripti Arjariya
Full text

Abstract 184  | PDF 44 

Preventing Social Sites from Publishing Malicious Content

Deepak Ranjan , Dr. Tripti Arjariya
Full text

Abstract 431  | PDF 87 

Fruit Recognition and its Calorie Measurement: An Image Processing Approach

Manpreetkour Basantsingh Sardar Dr. Sayyad D. Ajij
Full text

Abstract 612  | PDF 555 

Mobile Application Testing: Tools & Challenges

PPallavi Bhuarya, Shruti Nupur Anuradha Chatterjee, Rajesh Singh Thakur
Full text

Abstract 344  | PDF 415 

Various audio Steganography techniques for audio signals

Rubby Garg , Dr.Vijay Laxmi
Full text

Abstract 333  | PDF 627 

Impact of Security Risk on Cloud Computing Adoption

Shashank Mishra, Manju. Pandey
Full text

Abstract 329  | PDF 42