Published: 2014-05-28

Calculating the Area of the Union of Iso-oriented Rectangles Using MapReduce

Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian

Abstract 71  | PDF

Stress Analysis and Optimization of Crankshafts Subject to Static Loading

Mr.B. Varun

Abstract 54  | PDF

Effectiveness of Location Based Routing Protocols against Wormhole Attack in MANETs

Devendra Kumar, Deepak Kumar Xaxa

Abstract 42  | PDF

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

V. Uma Rani , Dr. M. Sreenivasa Rao , V. Theresa Vinayasheela

Abstract 36  | PDF

K-Means on GPU: A Review

Vidya Dhamdhere, Rahul G. Ghudji

Abstract 41  | PDF

Study of Different Aspects in Machine Learning

Sheilly Padda, Sonali Gupta, Priya Sharma, Apoorva Arora

Abstract 52  | PDF

Improving Intellectual Skills of Students by Analyzing their Performance and Classifying them Based on Bloom’s Taxonomy Using K-Means Clustering Algorithm

Ms. S. Sangeetha , Ms. M. Thiruvarutselvi

Abstract 37  | PDF

Survey Paper for Dynamic Resource Allocation using Migration in Cloud

Ms. Renu Krishnan, Ms. Silja Varghese

Abstract 36  | PDF

A survey on text mining techniques

Mr. Rahul Patel, Mr. Gaurav Sharma

Abstract 64  | PDF

Security and Privacy in Private Cloud Storage

V.B. Maral, Mehul Sanghvi, Pankaj Rana, Wajeda Pathan, Heena Parihar

Abstract 35  | PDF

AN IMPROVED AODV ROUTING PROTOCOL BASED ON LOCAL ROUTE REPAIR MECHANISM

Arpit Dhingra, Anil Kumar

Abstract 46  | PDF

IMAGE DENOISING TECHNIQUES: LITERATURE REVIEW

Monika Raghav, Sahil Raheja

Abstract 50  | PDF

Enhance Performance of Random Testing using Randomized Algorithm

Jaypal D. Rangari, Swapnili P. Karmore

Abstract 34  | PDF

Controllability of mixed Volterra- Fredholm type Impulsive integro-differential inclusions in Banach spaces

R.Murugesu, T. Tamil Selvan, B. Gayathiri

Abstract 34  | PDF

An explicit finite element integration scheme for linear eight node convex quadrilaterals using automatic mesh generation technique over plane regions

H.T.Rathod , Bharath Rathod , K.T.Shivaram ,K. Sugantha Devi , Tara Rathod

Abstract 45  | PDF

Facial Emotion Detection using Eigenfaces

A.N. Paithane, Shruti Hullyalkar, Gayatri Behera, Neha Sonakul, Aditi Manmode

Abstract 35  | PDF

Virtual Sense: An auto email downloading and news reading system for visually impaired people

Prajakta Made, Snehal Kadam, Darshana Jain.

Abstract 26  | PDF

An Implementation of Image Watermarking by Using Gradients

Dnyandevi W.Shrirao, Prof.Sulbha patil, Prof. Sonal Honale

Abstract 27  | PDF

IVRS BASED COLLEGE AUTOMATION

Pinkey J. Ratnani, Priyanka L. Patil , Rashmi A. Sonawane , Rohidas B. Sangore

Abstract 31  | PDF

Blind Noise Level Estimation and Blind Denoising Using Principal Component Analysis

Bheem Prasad Ram, Sachi Choudhary

Abstract 25  | PDF

Complete Performance Analysis of L- band Optical Communication System for NRZ and RZ Format.

Navdeep Kaur , Gurpreet kaur

Abstract 44  | PDF

Design of an Application Specific Microcontroller

Naveen Kumar, Akshay Jindal, Prof. Alok Basu

Abstract 26  | PDF

A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED

Arti Tiwari, Prof.Nilmani Verma

Abstract 32  | PDF

Optimizing Node Position using Ant Colony Optimization Algorithm (ACO)

A.P.Leela Vinodhini

Abstract 33  | PDF

A Report on Dhruval Enterprise Resource Planning Solution Implementing Financial Module

Lokesh Sharma, Vijayakumar Kubsad, Prasanta Kumar Paul

Abstract 31  | PDF

Cloud Computing and Security Issues

Mrs.R. Pushpalatha

Abstract 28  | PDF

IT STRATEGY: A Present Business Need

Srishti Narayan, Hariom Awasthi

Abstract 27  | PDF

AUTOMATED PARKING SYSTEM WITH BLUETOOTH ACCESS

Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma

Abstract 247  | PDF

RIVER: A RELIABLE INTER-VEHICULAR ROUTING PROTOCOL FOR VEHICULAR ADHOC NETWORKS

R.Mallika Devi, Dr.B.Srinivasan

Abstract 46  | PDF

An Enhanced Level Set Segmentation for gray Images Using Fuzzy Clustering and Lattice Boltzmann Method

Savita Agrawal, Deepak kumar xaxa

Abstract 170  | PDF

SMART VISION SYSTEM FOR BLIND

Prof.R.R.Bhambare, Akshay Koul, Siddique Mohd Bilal, Siddharth Pandey

Abstract 63  | PDF

A Survey of SignCryption Its Types and Techniques

R. Bahirathy, S. Aruljothi

Abstract 26  | PDF

Protection from Vampire Attacks on Routing Protocol

Pushpalata D. Chandore, Devendra Vatsa, Nitesh Rastogi

Abstract 25  | PDF

Design and Simulation of Microstrip Patch Antenna for Wireless Communication

Gyanender Kumar, Charanjeet Singh, Deepender Dabas

Abstract 50  | PDF

Greening the Cloud Computing

Deepak Prashant

Abstract 25  | PDF

Mine Adverse Drug Reaction from Patient Electronic Database using Particle Swarm Optimization

M.Maheswari, Ms. J.Preethi

Abstract 28  | PDF

REVIEW OF CATTLE MONITORING SYSTEM USING WIRELESS NETWORK

Anselemi B.Lukonge, Dr.Shubi Kaijage , Ramadhani S. Sinde

Abstract 91  | PDF

Brain Tumor Detection and Classification Using Histogram Equalization And Fuzzy Support Vector Machine Approach

K. Vinotha

Abstract 40  | PDF

Vehicle Number Plates Detection and Recognition using improved Algorithms: A Review with Tanzanian Case study

Cosmo H.Munuo, Dr. Michael Kisangiri

Abstract 36  | PDF

Demographical Implementation of Graph Classification in Educational Network Using Graph Mining Technique

S.A Amala Nirmal Doss, Dr.S.P.Victor

Abstract 30  | PDF

Use of Dispersion Compensating Fiber in Optical Transmission Network for NRZ Modulation Format

Gurpreet Kaur, Navdeep Kaur

Abstract 30  | PDF

UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECT

Srividya M. S., Hemavathy R., Shobha G.

Abstract 27  | PDF

Mitigation of co residence profiling from malicious user through MUSSEL BEHAVIOR framework

A.P.Leela Vinodhini .M.E , A.Justine Jerald M.Tech

Abstract 35  | PDF

Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream

Mr.Sulabh.S, Mr.Siva Shankar.S

Abstract 27  | PDF

ASPECT EXTRACTION & SEGMENTATION IN OPINION MINING

Mily Lal, Kavita Asnani

Abstract 53  | PDF

Enhancing Accuracy in Cross-Domain Sentiment Classification by using Discounting Factor

K.Aarthi, C.S.Kanimozhi Selvi

Abstract 33  | PDF

AUTOMATED BLOOD VESSEL SEGMENTATION IN RETINAL IMAGE

Pradeepa.BMr., J.Benadict Raja

Abstract 26  | PDF

Improving Efficiency of IDS using alert Correlation

Thakar Vivek R, Prof. Vrushank Shah, Prof. Yatin Patel

Abstract 28  | PDF

A Survey on: Pre-Emptive Migration of a video process using Genetic Algorithm on Virtual machine

Ranjitha K N, Sandhya S, N K Cauvery

Abstract 29  | PDF

Survey Paper for Resisting Web Proxy Based Http Attacks by Locality Behavior

Lakshmi B, Silja Varghese

Abstract 50  | PDF

OBJECT DETECTION AND TRACKING IN VIDEOS : A REVIEW

Nagalakshmi.C.K, Hemavathy.R , Shobha.G

Abstract 35  | PDF

Fraud Detection Social Security and Social Welfare Data Mining

A.Jenifer Sophia, S.Parthiban

Abstract 42  | PDF

Studying and Comparing Automated Testing Tools; Ranorex and TestComplete

Neha Dubey, Mrs. Savita Shiwani

Abstract 54  | PDF

Augmented Reality based on Image Processing

Mayank Pandey, Ms. Prabha Nair, Dr. Manoj Wadhwa , Ashish Chaudhary

Abstract 31  | PDF

AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK

C.Vijayakumaran, K. Janaky

Abstract 28  | PDF

A Common Fixed Point Theorem for A-Contraction Mapping and its Application

Rakesh Kumar, Arvind Gupta

Abstract 28  | PDF

A Systematic Approach to Cloud Security Using SeDas Platform

Karthik D U, Madhu C, Sushant M

Abstract 27  | PDF

Methodology for Selection of Spindle Drives for Milling Machines

Mikho Mikhov, Marin Zhilevski

Abstract 35  | PDF

Delivering Of Real Time Services through Internet Protocol Using Cloud Computing

Nikshape S S, Deepak S S

Abstract 31  | PDF

Opportunistic Routing Protocols In Human Working Day Model Delay Tolerant Networks

Shermina V Anthru, T.P Jayakumar

Abstract 25  | PDF

Security Issues Cloud computing Storage

Kunjali Bhardwaj, Dr.Neerja Jindal

Abstract 36  | PDF

Location Privacy using Traffic-Aware Mix zones in Vehicular or Mobile Networks

Anju Pathrose, T.Poornima

Abstract 27  | PDF

A SURVEY ON WIRELESS SENSOR NETWORKS APPLICATION FOR AIR POLLUTION MONITORING

Godbless Swagarya , Shubi Kaijage , Ramadhani S. Sinde

Abstract 38  | PDF

Challenges in Testing of Web Applications

Anisha Tandon, Dr. Mamta Madan

Abstract 31  | PDF

Various Methods to improve the visual appearance of Black & White and Colored Images

Baljit Kaur, Monika Tuteja, Shally Gujral

Abstract 29  | PDF

Web Usage Mining For extracting Users’ Navigational Behavior

Divya Racha

Abstract 33  | PDF

Wood Species Identification System

S. Mohan, K. Venkatachalapathy, S. Ezhil Priya

Abstract 33  | PDF

Cut Detection in Wireless Sensor Networks: A Survey

Goodubaigari Amrulla, Murlidher Mourya, Shaik Ansar Basha

Abstract 35  | PDF

A Survey and Comparative Study of Routing Protocols in Wireless Sensor Network

Sakshi Sharma, Malti rani

Abstract 30  | PDF

Automatic Texture analysis of cartilage for early detection of osteoarthritis

Anjani, Sanjeev Kubakaddi

Abstract 27  | PDF

Pruning the Cloud Internal Data Stealing By Treachery Attacks

Shobha Agasibagil, Mr. G.Lingana Gowda

Abstract 32  | PDF

Realization of computerized text taxonomy through a supervised learning system

Mr. Suresh G S, Mrs. Sharayu Pradeep

Abstract 25  | PDF

Fast Greedy Algorithm for Routing in Delay Tolerant Network

Aditya Pancholi, Sapna Grover

Abstract 37  | PDF

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Mrs.Shantala C P, Mr.Anil Kumar

Abstract 31  | PDF

Group Co-operative Schemes for Optimal Multicast Capacity-Delay Scaling in MANET

Geetha.C, Mr. Justin Gopinath

Abstract 30  | PDF

Mtbf Analysis Of The Two-Unit Series System With Repair Facility

V.K. Pathak, Kamal Mehta, Seema Sahu & H.L. Manker

Abstract 30  | PDF

Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation

S. Chandrakanth Sagar, Dr. M. Narayana

Abstract 192  | PDF

Development of Wireless Communication Networks: From 1G to 5G

Shivam Jaiswal , Ajay Kumar , Neha Kumari

Abstract 88  | PDF

Refinement of visual secret sharing scheme without image size expansion

Ms. Smita Patil, Prof. Ms. Jyoti Rao

Abstract 24  | PDF

A New Automated Scheme of Quadrilateral Mesh Generation for Finite Element Analysis

H.T. Rathoda, Bharath Rathod , K. T. Shivaram, K. Sugantha Devi

Abstract 36  | PDF

Success of Windows 8: Capturing multiple markets

Ajay Kumar, Shivam Jaiswal,Asha Yadav

Abstract 27  | PDF

FSR: Ferry-based Secure Routing Algorithm for Delay Tolerant Networks

Sapna Grover, Aditya Pancholi, Sonika Arora

Abstract 26  | PDF

Development of PCU Value of Vehicle under mix Nature Traffic Condition in Cities on Congested Highways

A.R.Khanorkar, S.D.Ghodmare

Abstract 71  | PDF

An Overview of Reusability of Software Components

Ramandeep Kaur, Navjot Kaur, Rajwinder Kaur

Abstract 25  | PDF

An NLP Method for Discrimination Prevention Using both Direct and Indirect Method in Data Mining”

Sampada U. Nagmote, Prof. P. P. Deshmukh

Abstract 32  | PDF

Re-ranking of Images using Semantic Signatures with Duplicate Images Removal & K-means clustering

Sayali Baxi, S.V.Dabhade

Abstract 27  | PDF

MR Image Reconstruction with L1norm Minimization and Total Variation Denoising

Danny Joseph, Manu Raju

Abstract 33  | PDF

Algorithmic Reduction and Optimization of Logic Circuit in area and Power Tradeoffs’ with the Help of BDD

Gaurav Sharma

Abstract 33  | PDF

Automated-Combined valve oscillation testing machine for 4&6 Cylinders

Ms. Nutan Ghodake, Ms. Pooja Doshi, Ms. Shruti Dharmahattikar

Abstract 60  | PDF

Implementation of Cooperative Caching in Social Wireless Networks

S.L.Suganya, Dr.R.Indra Gandhi

Abstract 26  | PDF

Performance analysis of different Image Enhancement Algorithms”

Mr. Gharu Anand Nandlal, Prof. Rastogi Nitesh

Abstract 26  | PDF

Trust-based security for Ad-Hoc network

Prof. (Ms) A. A. Patil, Prof. T. I. Bagban, Prof. S. J. Patil

Abstract 27  | PDF

A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions

Nitesh Kaushik, Gaurav, Jitender Kumar

Abstract 92  | PDF

Intelligent technique for mining customers review by the help of opinion mining

Shubham pandey, Prateek gupta

Abstract 25  | PDF

Development of an e-Diary Service for Deployment on the UFH network

Shadreck Mudziwepasi, Phumzile Nomnga, Mfundo Shakes Scott

Abstract 29  | PDF

PROTECTED DESIGN FOR TOPOLOGY TO MANAGE AND AUTHORIZE MOBILE AD HOC NETWORK

Mr.J.Rajesh B.E.,(M.E), Mrs.A.Kamakshi* M.Tech

Abstract 28  | PDF

IMPROVED EXPECTATION MAXIMIZATION CLUSTERING ALGORITHM

Garima Sehgal, Dr. Kanwal Garg

Abstract 26  | PDF

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

Kanchan, Harwant Singh Arri

Abstract 28  | PDF

Product Review By Sentiment Analysis

Devare Jayvant,Punde Sunita, Sahane Sujata,Shendage Sonali, Kanase Rajesh

Abstract 35  | PDF

Rainfall Prediction Using Data Mining techniques: A Survey

Shoba G, Dr. Shobha G.

Abstract 30  | PDF

Use of Image Processing Techniques for Making Run out Decision in Cricket

Shashank Yeole, Nisheet Sharma, Yogesh Shinde, Sufiyan Shaikh

Abstract 33  | PDF

Cross lingual information retrieval using tf-idf and similarity measures

Prof. Pankaj Khambre, Aishwarya Pathak, Aarti Deshpande, Shringar Jha

Abstract 30  | PDF

Increasing Performance of Cooperative Opportunistic Routing in MANET using Spatial Reuse

Raghunath M. Kawale, Prof. M. D. Ingle

Abstract 32  | PDF

A STUDY ON SOFTWARE RELIABILITY, RELIABILITY TESTING AND GOMPERTZ MODEL

Sandeep Sharma

Abstract 29  | PDF

Solving Multistage Graph using ACS Algorithm

Pankaj D.Khambre, Ms.Aarti Deshpande

Abstract 36  | PDF

Vehicle Health Monitoring System In A Developing Nation.

Ebole Alpha F., Prof. Omotosha O. J

Abstract 28  | PDF

A SURVEY ON WEB IMAGE SEARCH USING RERANKING

Shweta gonde, Assistant Professor Uday Chouarisia, Assistant Professor Raju Barskar

Abstract 28  | PDF

A survey on phishing detection and prevention technique

Archit Shukla , Lalit Gehlod

Abstract 25  | PDF