Vol. 5 No. 12 (2016)

Published: 2018-01-05

Articles

  • Effective Utilization of Data Mining Techniques for Digital Security

    Farhad Alam ,Vishal Shukla
    77
    52
  • A Novel Algorithm to Determine the Attacks Intention in Wireless Ad hoc Networks

    S V Athawal, M A Pund
    73
    58
  • A Survey of Load Balencing Technique in Cloud Computing Environment

    Manisha Verma, Somesh Kumar .
    68
    49
  • Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things

    Jin Hee Chung , Tae Ho Cho
    77
    76
  • Smart Wi-Fi Traffic Assister

    K. Sujitha, B. Kanna Vijay , R. Gopi Krishna
    83
    57
  • Prospect of Elecrto Commerce In Present Indian Market

    Dr. P. Devraju .
    68
    82
  • A Hypothesis on Assorted E-Commerce Performances in Online Market

    Dr. P. Devaraj .
    92
    993
  • Eeg Based Person Identification And Authentication Using Bci

    Shashank N, Mrs.Rashmi C R
    91
    56
  • Analysis of Speed controller for three phase induction motor in 125/60 TPH Aggregate crushing Sand Plant

    H.Sathishkumar and Dr.S.S.Parthasarathy
    100
    53
  • Improving Image Compression Using DWT

    Rajani Verma , Permendar Kumar verma
    75
    45
  • A Review: To Detect and Identify Cotton leaf disease based on pattern recognition technique.

    Mr.Chandrakant D.Kokane , Prof.N.LBhale
    86
    106
  • Ordered Dither Block Truncation Coding For Content Based Image Retrieval Using Relevance Feedback

    Simantinee S Joshi .
    76
    91
  • Design and implementation of Smart Agriculture using Embedded System

    Ankit Yadav, Pranav Pandhare Saleel Kulkarni, Shubham Kale, Soniya
    83
    180
  • Improving Quality Of The Services In Manet Usign The Hierarchical Fair Service Curve And Fisheye State Routing Protocol

    Anand R, Jitendranth Mungara .
    82
    67
  • Word Recognition System Using ANN

    Dr. J.Kejiya Rani, .
    61
    56
  • Deist: Dynamic Detection Of Sinkhole Attack For Internet Of Things

    R. Stephen, A. Dalvin Vinoth Kumar , Dr. L. Arockiam
    61
    59
  • Software Reliability Model when multiple errors occur at a time including a fault correction process

    K. Harishchandra, K. M. Manjunatha and Balakrishna
    72
    47
  • A Gamified Kenyan K-12 Learning System

    B.K Chemwotie and Z. Fengnian
    56
    50
  • Guided Filter for Grayscale, RGB and HSV color space

    Prajakta Mukund Waghmare, Swati Shankar Shetkar
    61
    224
  • Obtaining Good Heuristics for Big Data Broadcasting Problem Using Novel Pipeline Approach.

    Prof. Priyadarshani Kalokhe Abhishek Kumbhar, Jyoti Shelke Rinkal Bari, Snehal Shewale
    55
    42
  • Power Quality Control of Nonlinear Load using Custom Power Devices

    Mr.Praful A.Desale MS.Bhagyshri S. Patil
    52
    46
  • An Innovative Accession To Mobile License Plate Reader System (MLPR)

    Dolly Sharma, Dr. Pankaj Sharma Vyom Kulshreshtha
    55
    53
  • A survey on different PAPR reduction techniques in OFDM systems

    Manjula A V Dr.K.N.Muralidhara
    60
    48
  • A Conceptual Study To Make Research About Contribution Of Innovation And Competition Relation Over New Economy

    Tülin Durukan, Cihat Kartal .
    59
    48
  • DC Motor Speed Control Using LDR Sensor and Atmega89s52

    Arpita Srivatava Anil Kumar Chaudhary
    76
    467
  • Behavior Analysis of OSPF and ISIS Routing Protocol with Service Provider Network

    Vikasdeep Kaur , Jaspreet Kaur , Harpreet Kaur
    63
    192
  • Enhanced Security Protocol for Spontaneous Wireless ad-hoc Network

    Firoz Ravi Antil, Ankur Jain
    58
    33
  • Smart Tourist System

    Deanne Charan , Apoorva Chouhan , Avelon Pereira
    71
    65
  • Text Summarization using topic modeling and cluster based MapReduce framework

    N.Prameela .
    69
    66
  • ¬¬¬¬¬¬Gasification-Contributing to the Energy Production Demands

    Adil Wazeer, Bhaskar Chaturvedi , Shriyash Mohril, Mahipal Singh Sankhla Dr. Rajeev Kumar
    58
    53
  • Comparision Between Dct & Dwt Image Compression TechniquE

    Yashi tiwari, Amit Kumar
    84
    53
  • Intelligent Data Mining and Network-Based Modeling of Social Media for Improving Care

    Mr. Pramod B. Deshmukh , Mrs. Aditi A. Kalia, Mrs. Vrushali U. Mrs. Dipali M. Patil
    63
    40
  • Prop up the Farming Community with E-Services: Web Based Services for Agriculture

    K.Kiruthika , R.Parimala
    52
    52
  • An energy efficiency of cloud based services using EaaS transcoding of the multimedia data.

    Harshal P. Ganvir , Prof. Pravin Kulurkar , Prof. Pranita Laddhad
    57
    44
  • Safety in Wireless Sensor Network: Types of Attacks and Solutions

    Kanika Sharma , Dr. Nischay Bahl
    51
    52
  • An Approach of Speech Recognition System for Desktop Application

    Prof.Shivashankar M.Rampur , Miss.Kavita S.Rampur D
    135
    42
  • Automatic Retina Exudates Segmentation Algorithm For Early Detection With High Performance

    Kethavath Narender , Ananchu Sushma Rani
    47
    43
  • Autonomous Neuron Telematics Data Mining Architecture

    Bh.V.Rama Krishna , B. Sushma
    59
    42
  • Improvement of Human Thinking Factors In Machine Using Artificial Intelligence

    Prof Amar Nath Singh ,Er. Bhaskar Anand Er. Ankit Kumar Singh, Er. Chandan Mar ,Er. Anshu Kumar
    55
    51
  • Data Security System in Cloud by Using Fog Computing and Data Mining

    Parashar Sangle, Romit Deshmukh , Rohit Ghodake , Akash Yadav Prof. Jitendra Musale
    57
    58
  • A Comparative Study of Perceiving Intrusion Using Data Mining Techniques

    M.Deepa, Dr.P. Sumitra .
    59
    42
  • Image Segmentation Quality Assessment For "Truncated Compound Normal With Gamma Mixture Model"

    Viziananda Row Sanapala , Sreenivasa Rao Kraleti ,and Srinivasa Rao Peri
    52
    45
  • DOID: A Lexical Analyzer for Understanding Mid-Level Compilation Processes

    Oyebode Idris and Adedoyin Olayinka Ajayi
    57
    74
  • Design of Electronically Commutated Motors for Motors for Hybrid Vechile for Braking

    Arun.R, M.Balakrishnan M.Sethuraman , P.Raghunayagan
    49
    55
  • A Survey on Smart Ration card system using RFID and Biometrics

    Smita Khot, Diksha Kamble , Bharti Lokhande , Prachiti Sardar, Tushar Khose
    56
    94
  • Imperfect Debugging Software Reliability Growth Model for the Rayleigh failure time distribution

    Balakrishna, K. Harishchandra .
    53
    83
  • Implementation of High speed and Low power 6T SRAM cell using FinFET at 22nm technology

    A.Sai Kumar, B.S. Priyanka Kumari
    73
    59
  • Reduction in Infrastructure and operating costs using Server Virtualization

    Gitanjali .
    55
    53
  • Selfish Attack detection mechanism using COOPON in Cognitive Radio

    Shital.S.Patil ,A.N.Jadhav, Vivek T. Patil
    48
    39
  • Correct Name Labelled For Search Based Face Annotation

    Bhawana Pise, Naziya Pathan, Shyam Dube
    49
    47
  • Combination of Cloud Computing and High Performance Computing

    Mandeep Kumar .
    110
    55
  • Topic Digging Over Asynchronous Text Sequences

    Monali S Patil, Sandip S Kankal
    56
    74
  • On a Software Reliability Growth Model with Log Logistic failure time distribution

    Balakrishna, K. Harishchandra
    93
    50
  • A Low cost prototype for Vehicle to Infrastructure communication

    Badugu Samatha, Dr. K. Raja Kumar, Nagarjuna Karyemsetty
    52
    76
  • Systematic Review of Mobile Operating Systems

    Rupesh Kumar Balasi , Jaswinder Singh
    144
    94
  • Test Case Generation for Software Quality Assurance by Using PrT Nets

    M. Mahanandi Babu, G. Ramesh, G. Geetha
    66
    37
  • A Review On Data Security in Cloud Environment

    Varsha Yaduvanshi, Asst.Prof. Manish Rai Prof.(Dr.) Mohit Gangwar
    47
    49
  • Comparative Study of Predicting Heart Disease By Means Of Data Mining

    C.Sowmiya , Dr.P. Sumitra
    52
    55
  • Image Steganography Using LSB Along With IDEA Algorithm

    Priyanka Tirkey, Dipika Kudiyam , Neha Dhruw, Deepshikha Markam , Miss Rumi Ghosh
    55
    121
  • Enhance multipath routing in topology transparent network for better QoS in MANET

    Surendra Ladiya .
    49
    42
  • A proposal for efficient 8 two way traffic signal system for pedestrian and ambulance along with violation detection

    Riya Paul, Miss. Amrutha Benny , Dr. Vince Paul
    53
    46
  • Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH

    Miss. A.Usha, Dr. A. Subramani .
    62
    101
  • An Improved Novel Energy Efficient Method for Resource Allocation in Clouds Based on Ant Theory

    Ashmita , Dr. Dinesh Kumar
    46
    46
  • New Soft Computing Techniques in the Software Testing

    Suraj Indiver, Mr. Vyom Kulshreshtha
    53
    39
  • A Study: Impact of Interactive Posting in Social Site

    Vivek Dubey .
    45
    41
  • Secure Data Sharing and Privacy Preserving Authentication Protocol for Cloud Environment

    Rudresh N. Bagade , C.R.Barde
    66
    44
  • A Survey on Destination Prediction Using Trajectory Data Mining Technique

    Banupriya C S1, Dr.V.Vijaya Chamundeeswa
    46
    34
  • Analysis of Disease using Retinal Blood Vessels Detection

    Minal B. Wankhade, Dr. A. A. Gurjar
    59
    54
  • Multi-threaded QoS Architecture for Multimedia Services over Software Defined Networks

    Ms. Pooja A. Baleghate Prof. Sachin B. Takmare , Prof. Pramod A. Kharade
    54
    42
  • Cooling Techniques for a Spindle of Machine Tool

    Poonam S. Patil, R. R. Mudholkar
    60
    70
  • A novel approach for temperature sensing and monitoring through wireless sensor using IoT

    Siddharth Anand Kokalki, Ritesh Haridas Sontakke ,Pawan Anand Mundada, Akshay Rajendra Mali
    72
    37
  • Design an Innovative Smart Control Scheme to Hybridize Conventional and Expert Controllers

    Mahmoud M Aboattia .
    47
    33
  • On theory and Performance of high throughput parallel block and S-random interleavers for Turbo Codes

    Rutuja A. Deshmukh, Dr. Ashish R. Panat
    55
    47
  • The Probabilistic Approach for Identifying Hotel Appraise Passing Through Intrinsic & Extrinsic Domain Relevance

    Miss. Rutu A Ostwal, Prof. G.P. Chakote
    50
    34
  • An All Quadrilateral Automesh Generation Technique and Explicit Integration Scheme for Finite Elements to Solve Some Elliptic Boundary Value Problems in Two Space

    H.T Rathod*, K. Sugantha Devi
    57
    31
  • A Study of Digital Image Segmentation Techniques

    Rajvardhan Oak .
    68
    97
  • A Review of Weather Forecasting Using Data Mining Techniques

    Ms.P.Shivaranjani , Dr.K.Karthikeyan
    79
    74
  • An Efficient Usage of APIs in Software Code Reuse

    Dr. Madhavi Karanam .
    50
    41
  • Energy Efficient Communication for WSNs using Grey-Wolf Optimization Algorithm

    Pranjali Diwan ,M.R . Khan
    51
    73
  • Monitoring Lan User Wirelessly By Android Mobile Based On Client/Server Mode."

    Soniya Zope, Shrutika Pandit Shweta Wakale ,Farin Tamboli, Jay Bedekar
    62
    48
  • A Partial Replacement of Fine Aggregate by Copper Slag In Concrete

    Naveed A Shaikh, , Pradeep P Tapkire
    162
    86
  • A New Resource Allocation Policy in Virtualized Environment for IAAS Clouds

    Richa Vats * Geetika Jain* Gyanender Kumar**
    55
    40
  • Towards an Inclusive India with eAccessibility

    Sanjeev Sharma .
    55
    47
  • Social Engineering Attacks Detection Techniques: Survey Study

    Mohamed H. Haggag, Ensaf H. Mohammed, Mariam S. El-Rahmany
    93
    71