Vol. 6 No. 1 (2017)

Published: 2017-01-01

Articles

  • Classification and Analysis of Web Multimedia Data using Principal Component Analysis

    Siddu P. Algur1 , Basavaraj A. Goudannavar Prashant Bhat
    1669
    166
  • Weighted Energy Efficient Cluster Based Algorithm in MANET

    Sanehi Sirohi Manoj Yadav
    178
    133
  • Training Feed forward Neural Network With Backpropogation Algorithm

    RashmiAmardeep Dr.K ThippeSwamy
    195
    446
  • Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms

    N. Priya Dr. M. Kannan
    232
    277
  • Identification of Human using Palm-Vein Images: A new trend in biometrics

    Miss. Swapnali N. Dere Dr. A. A. Gurjar
    439
    0
  • An Efficient Fair Resource Allocation in Multicast Networks

    M. Sangeetha
    188
    140
  • Prediction of Breast Cancer using Random Forest, Support Vector Machines and Naïve Bayes

    Madeeh Nayer Elgedawy
    414
    0
  • A Novelistic Querying procedure for clustering the Legal Precedents

    B.Basaveswar Rao, B.V.RamaKrishna K.Gangadhara Rao, K.Chandan
    539
    134
  • Analytical Solutions For Security Issues In Cloud Environment

    Smaranika Mohapatra Dr. Kusum Lata Jain
    160
    123
  • Ionic Liquids – A New Era in Green Chemistry

    T.Vedavathi, T.Srinivas
    267
    153
  • Development of Students Results Monitoring System Model

    Sulis Sandiwarno
    207
    154
  • Constant amplitude fatigue crack growth life prediction of 8090 Al-alloy by ANFIS

    J. R. Mohanty
    436
    111
  • Hybrid Technique Based Blind Digital Image Watermarking

    Shubhangi Pande Santosh Varshney
    156
    122
  • A Review on Dynamic Clustering: Using Density Metrics

    Megha S.Mane , Prof.N.R.Wankhade
    156
    134
  • Energy consumption of High Power MANET Using LVC

    K.Santhya, Dr.N. Sasirekha
    138
    126
  • Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM

    M. Praveen E. Adinarayana Dr .V.S.R.Kumari
    422
    108
  • Review of protocols used in Multicasting Communication

    Ashish, Jyotsana pandey
    138
    126
  • Specific Trait Identification in Margins Using Hand Written Cursive

    Syeda Asra, Dr.Shubhangi DC
    308
    144
  • Sentiment Analysis of Reviews for E-Shopping Websites

    Dr. U Ravi Babu
    157
    304
  • Ashirwad: An extremely cost efficient Swabbing Robot

    Rupinder Kaur
    230
    164
  • DNA Computing

    Rajni A
    137
    142
  • Approaches for Camera Source Identification: A Review

    Mr. Amol P. Khapare Mrs. D. A. Phalk
    119
    131
  • Analysis of handwriting patterns of Dyslexic Children vis-à-vis the nondyslexics using Hamming Distance

    Dr. Jyotsna Dongardive Malhar Margaj
    133
    109
  • Double-Faced Data Hiding Techniques in Images using RIT: A Survey

    Mr. Santosh Kale
    130
    106
  • Balancing Load in Smartphone’s

    Rakesh Podaralla, Dr., V.Hanuman Kumar
    452
    96
  • Optimizing Information Rate in Polynomial Based Image Secret Sharing Scheme Using Huffman Coding

    Nehal Markandeya, Prof.Dr.Sonali Patil
    242
    106
  • Image Compression Using Huffman Coding

    Nehal Markandeya, Prof.Dr.Sonali Patil
    165
    336
  • A Study on Web Content Mining

    Anurag kumar Ravi Kumar Singh
    174
    165
  • Finding the Routing Table by Dynamic Processing Method in Distance Vector Routing

    Jyotsana Pandey Ashish
    157
    169
  • Usage of Data Mining Techniques for combating cyber security

    Farhad Alam Sanjay Pachauri
    141
    123
  • Evaluating Prediction of Customer Churn Behavior Based On Artificial Bee Colony Algorithm

    Riddhima Rikhi Sharma Rajan Sachdeva
    462
    147
  • Data Hiding System with Mosaic Image for Protected Communication

    Manjunatha N Mrs. Reshma M
    386
    93
  • Recursive Formulation Based Parallel Self Timed Adder Design Based Architectural Design and CMOS Implementation Approach

    Badavath Ravikumar, Fouziya Yasmeen
    127
    117
  • Behaviour analysis of STREE, SABR and SARDS under different simulation enviornements:A Case Study.

    Roopashree H.R., Dr. Anita Kanavalli
    113
    80
  • Research for Cipher Chip for the Encryption of Sensor data: A Survey

    Shali Sara Abraham , Supriya L.P
    343
    89
  • Survey on Opportunistic Routing Protocol: JOKER

    Brejit Lilly Abraham, Anjana P.Nair
    117
    80
  • Foundation of Ethics and Practice in Amitābha Cult: Modern Social Perspective

    Le Trong Nghia
    404
    87
  • Maximization Influence Flow Using Modified Greedy Algorithm

    Jyoti Rani , Prof. Ashwani Sethi
    398
    86
  • Mining Web Graphs for Large Scale Meta Search Engine Results

    Bandi Krishna Dr.V.B.Narasimha
    331
    120
  • Graphical Password as an OTP

    Veena Rathanavel Swati Mali
    503
    134
  • A Survey on Smart Ration Card System

    Golden Bagul , Brendon Desouza Tejaswini Gaikwad , Ankush Panghanti Trupti Kumbhare
    146
    386
  • Development of Embedded Application for Receiver Processor Unit

    B Charan Singh, Vandana Khare
    113
    79
  • Survey on Efficient Certificateless Access Control for Wireless Body Area Networks

    Jeena Sara Viju Sruthy S
    122
    99
  • A Literature Survey on Password Extraction via Reconstructed Wireless Mouse Trajectory

    Divya S, Anju J Prakash
    126
    118
  • A Review in Statistical Aspects of Data Mining

    K.Samundeeswari, Dr.K.Srinivasan
    122
    85
  • Survey on Face Recognition in the Scrambled Dataset by Using Many Kernels

    Sreehara .B, Lashma .K
    408
    85
  • Survey on Integrated Design of Smartphone Interface with Multiple Image Processing Methods

    Lija John, Vani V Prakash
    315
    76
  • Survey on Monitoring Aquatic Debris Using Smartphone-Based Robots

    Sreelekshmi .B, Vidya .N
    104
    77
  • Survey on a Lightweight Authenticated Communication Scheme for Smart Grid

    Sneha .U Liji Samuel
    103
    71
  • Adaptive Harmonic Elimination in a Grid-Connected Three-Phase PV Inverter

    G Chandra Sekhar P Rama Krishna
    414
    89
  • A Grid Connected Three Phase PV Quasi-Z-Source Inverter with Double Frequency Ripple Suppression Control

    SivaSiddhartha Chalasani Ch Chinna Veeraiah
    411
    103
  • Raspberry PI 3 Based Control and Monitor Remote Machine Automation

    Rekha Onkar Nehete Prof. A.S. Bhide
    98
    148
  • Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment

    Ms. Samita Mokal Prof. Nilima D. Nikam Prof. Vaishali Londhe
    284
    88
  • Brain MR Image Segmentation for Tumor Detection using Artificial Neural

    Prof. Vrushali Borase Prof. Gayatri Naik Prof. Vaishali Londhe
    145
    100
  • An Overview of Distributed System for Wireless Sensor Network

    Nalin Chaudhary Abhishek Choudhary Manoj Kumar
    112
    86
  • A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach

    Ingale Ashwini Nagnath, Kanherkar Hars Kanse Sonali Dilip , Naykinde Pallavi Babasaheb , Prof.Belsare P.P.
    97
    83
  • ADFC Robot: Ashirwad A Low cost much efficient ADFC(Autonomous Dry Floor Clean-up) Robot

    Rupinder Kaur1 , Kamalpreet Kaur Harpreet Kaur
    345
    80