Published: 2014-05-28

Calculating the Area of the Union of Iso-oriented Rectangles Using MapReduce

Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
Full text

Abstract 202  | PDF 35 

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

V. Uma Rani , Dr. M. Sreenivasa Rao , V. Theresa Vinayasheela
Full text

Abstract 206  | PDF 16 

K-Means on GPU: A Review

Vidya Dhamdhere, Rahul G. Ghudji
Full text

Abstract 221  | PDF 46 

Study of Different Aspects in Machine Learning

Sheilly Padda, Sonali Gupta, Priya Sharma, Apoorva Arora
Full text

Abstract 273  | PDF 26 

Survey Paper for Dynamic Resource Allocation using Migration in Cloud

Ms. Renu Krishnan, Ms. Silja Varghese
Full text

Abstract 199  | PDF 58 

A survey on text mining techniques

Mr. Rahul Patel, Mr. Gaurav Sharma
Full text

Abstract 303  | PDF 32 

Security and Privacy in Private Cloud Storage

V.B. Maral, Mehul Sanghvi, Pankaj Rana, Wajeda Pathan, Heena Parihar
Full text

Abstract 103  | PDF 22 

IMAGE DENOISING TECHNIQUES: LITERATURE REVIEW

Monika Raghav, Sahil Raheja
Full text

Abstract 119  | PDF 45 

Enhance Performance of Random Testing using Randomized Algorithm

Jaypal D. Rangari, Swapnili P. Karmore
Full text

Abstract 99  | PDF 20 

Facial Emotion Detection using Eigenfaces

A.N. Paithane, Shruti Hullyalkar, Gayatri Behera, Neha Sonakul, Aditi Manmode
Full text

Abstract 177  | PDF 77 

An Implementation of Image Watermarking by Using Gradients

Dnyandevi W.Shrirao, Prof.Sulbha patil, Prof. Sonal Honale
Full text

Abstract 201  | PDF 30 

IVRS BASED COLLEGE AUTOMATION

Pinkey J. Ratnani, Priyanka L. Patil , Rashmi A. Sonawane , Rohidas B. Sangore
Full text

Abstract 236  | PDF 172 

Design of an Application Specific Microcontroller

Naveen Kumar, Akshay Jindal, Prof. Alok Basu
Full text

Abstract 117  | PDF 44 

A Report on Dhruval Enterprise Resource Planning Solution Implementing Financial Module

Lokesh Sharma, Vijayakumar Kubsad, Prasanta Kumar Paul
Full text

Abstract 118  | PDF 71 

Cloud Computing and Security Issues

Mrs.R. Pushpalatha
Full text

Abstract 166  | PDF 103 

IT STRATEGY: A Present Business Need

Srishti Narayan, Hariom Awasthi
Full text

Abstract 98  | PDF 21 

AUTOMATED PARKING SYSTEM WITH BLUETOOTH ACCESS

Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma
Full text

Abstract 448  | PDF 187 

SMART VISION SYSTEM FOR BLIND

Prof.R.R.Bhambare, Akshay Koul, Siddique Mohd Bilal, Siddharth Pandey
Full text

Abstract 308  | PDF 362 

A Survey of SignCryption Its Types and Techniques

R. Bahirathy, S. Aruljothi
Full text

Abstract 89  | PDF 39 

Protection from Vampire Attacks on Routing Protocol

Pushpalata D. Chandore, Devendra Vatsa, Nitesh Rastogi
Full text

Abstract 85  | PDF 48 

Design and Simulation of Microstrip Patch Antenna for Wireless Communication

Gyanender Kumar, Charanjeet Singh, Deepender Dabas
Full text

Abstract 353  | PDF 556 

Greening the Cloud Computing

Deepak Prashant
Full text

Abstract 181  | PDF 88 

REVIEW OF CATTLE MONITORING SYSTEM USING WIRELESS NETWORK

Anselemi B.Lukonge, Dr.Shubi Kaijage , Ramadhani S. Sinde
Full text

Abstract 204  | PDF 35 

UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECT

Srividya M. S., Hemavathy R., Shobha G.
Full text

Abstract 269  | PDF 140 

Mitigation of co residence profiling from malicious user through MUSSEL BEHAVIOR framework

A.P.Leela Vinodhini .M.E , A.Justine Jerald M.Tech
Full text

Abstract 104  | PDF 32 

ASPECT EXTRACTION & SEGMENTATION IN OPINION MINING

Mily Lal, Kavita Asnani
Full text

Abstract 146  | PDF 141 

AUTOMATED BLOOD VESSEL SEGMENTATION IN RETINAL IMAGE

Pradeepa.BMr., J.Benadict Raja
Full text

Abstract 143  | PDF 33 

Improving Efficiency of IDS using alert Correlation

Thakar Vivek R, Prof. Vrushank Shah, Prof. Yatin Patel
Full text

Abstract 135  | PDF 25 

OBJECT DETECTION AND TRACKING IN VIDEOS : A REVIEW

Nagalakshmi.C.K, Hemavathy.R , Shobha.G
Full text

Abstract 99  | PDF 303 

Fraud Detection Social Security and Social Welfare Data Mining

A.Jenifer Sophia, S.Parthiban
Full text

Abstract 88  | PDF 159 

Augmented Reality based on Image Processing

Mayank Pandey, Ms. Prabha Nair, Dr. Manoj Wadhwa , Ashish Chaudhary
Full text

Abstract 96  | PDF 216 

A Systematic Approach to Cloud Security Using SeDas Platform

Karthik D U, Madhu C, Sushant M
Full text

Abstract 85  | PDF 47 

Methodology for Selection of Spindle Drives for Milling Machines

Mikho Mikhov, Marin Zhilevski
Full text

Abstract 158  | PDF 37 

Security Issues Cloud computing Storage

Kunjali Bhardwaj, Dr.Neerja Jindal
Full text

Abstract 77  | PDF 37 

A SURVEY ON WIRELESS SENSOR NETWORKS APPLICATION FOR AIR POLLUTION MONITORING

Godbless Swagarya , Shubi Kaijage , Ramadhani S. Sinde
Full text

Abstract 125  | PDF 90 

Challenges in Testing of Web Applications

Anisha Tandon, Dr. Mamta Madan
Full text

Abstract 90  | PDF 26 

Various Methods to improve the visual appearance of Black & White and Colored Images

Baljit Kaur, Monika Tuteja, Shally Gujral
Full text

Abstract 121  | PDF 22 

Wood Species Identification System

S. Mohan, K. Venkatachalapathy, S. Ezhil Priya
Full text

Abstract 89  | PDF 33 

Cut Detection in Wireless Sensor Networks: A Survey

Goodubaigari Amrulla, Murlidher Mourya, Shaik Ansar Basha
Full text

Abstract 181  | PDF 67 

Pruning the Cloud Internal Data Stealing By Treachery Attacks

Shobha Agasibagil, Mr. G.Lingana Gowda
Full text

Abstract 90  | PDF 30 

Fast Greedy Algorithm for Routing in Delay Tolerant Network

Aditya Pancholi, Sapna Grover
Full text

Abstract 206  | PDF 55 

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Mrs.Shantala C P, Mr.Anil Kumar
Full text

Abstract 192  | PDF 41 

Mtbf Analysis Of The Two-Unit Series System With Repair Facility

V.K. Pathak, Kamal Mehta, Seema Sahu & H.L. Manker
Full text

Abstract 82  | PDF 20 

Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation

S. Chandrakanth Sagar, Dr. M. Narayana
Full text

Abstract 137  | PDF 662 

Development of Wireless Communication Networks: From 1G to 5G

Shivam Jaiswal , Ajay Kumar , Neha Kumari
Full text

Abstract 142  | PDF 1893 

Refinement of visual secret sharing scheme without image size expansion

Ms. Smita Patil, Prof. Ms. Jyoti Rao
Full text

Abstract 274  | PDF 19 

A New Automated Scheme of Quadrilateral Mesh Generation for Finite Element Analysis

H.T. Rathoda, Bharath Rathod , K. T. Shivaram, K. Sugantha Devi
Full text

Abstract 135  | PDF 253 

Success of Windows 8: Capturing multiple markets

Ajay Kumar, Shivam Jaiswal,Asha Yadav
Full text

Abstract 103  | PDF 29 

FSR: Ferry-based Secure Routing Algorithm for Delay Tolerant Networks

Sapna Grover, Aditya Pancholi, Sonika Arora
Full text

Abstract 163  | PDF 23 

An Overview of Reusability of Software Components

Ramandeep Kaur, Navjot Kaur, Rajwinder Kaur
Full text

Abstract 144  | PDF 50 

Automated-Combined valve oscillation testing machine for 4&6 Cylinders

Ms. Nutan Ghodake, Ms. Pooja Doshi, Ms. Shruti Dharmahattikar
Full text

Abstract 164  | PDF 23 

Implementation of Cooperative Caching in Social Wireless Networks

S.L.Suganya, Dr.R.Indra Gandhi
Full text

Abstract 167  | PDF 12 

Performance analysis of different Image Enhancement Algorithms”

Mr. Gharu Anand Nandlal, Prof. Rastogi Nitesh
Full text

Abstract 181  | PDF 23 

Trust-based security for Ad-Hoc network

Prof. (Ms) A. A. Patil, Prof. T. I. Bagban, Prof. S. J. Patil
Full text

Abstract 302  | PDF 48 

A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions

Nitesh Kaushik, Gaurav, Jitender Kumar
Full text

Abstract 311  | PDF 122 

Development of an e-Diary Service for Deployment on the UFH network

Shadreck Mudziwepasi, Phumzile Nomnga, Mfundo Shakes Scott
Full text

Abstract 210  | PDF 184 

PROTECTED DESIGN FOR TOPOLOGY TO MANAGE AND AUTHORIZE MOBILE AD HOC NETWORK

Mr.J.Rajesh B.E.,(M.E), Mrs.A.Kamakshi* M.Tech
Full text

Abstract 146  | PDF 34 

IMPROVED EXPECTATION MAXIMIZATION CLUSTERING ALGORITHM

Garima Sehgal, Dr. Kanwal Garg
Full text

Abstract 208  | PDF 168 

Product Review By Sentiment Analysis

Devare Jayvant,Punde Sunita, Sahane Sujata,Shendage Sonali, Kanase Rajesh
Full text

Abstract 194  | PDF 358 

Use of Image Processing Techniques for Making Run out Decision in Cricket

Shashank Yeole, Nisheet Sharma, Yogesh Shinde, Sufiyan Shaikh
Full text

Abstract 72  | PDF 345 

Cross lingual information retrieval using tf-idf and similarity measures

Prof. Pankaj Khambre, Aishwarya Pathak, Aarti Deshpande, Shringar Jha
Full text

Abstract 155  | PDF 128 

Solving Multistage Graph using ACS Algorithm

Pankaj D.Khambre, Ms.Aarti Deshpande
Full text

Abstract 169  | PDF 38 

Vehicle Health Monitoring System In A Developing Nation.

Ebole Alpha F., Prof. Omotosha O. J
Full text

Abstract 145  | PDF 314 

A SURVEY ON WEB IMAGE SEARCH USING RERANKING

Shweta gonde, Assistant Professor Uday Chouarisia, Assistant Professor Raju Barskar
Full text

Abstract 80  | PDF 28 

A survey on phishing detection and prevention technique

Archit Shukla , Lalit Gehlod
Full text

Abstract 213  | PDF 109