Published: 2014-05-28

Calculating the Area of the Union of Iso-oriented Rectangles Using MapReduce

Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
Full text

Abstract 281  | PDF 53 

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

V. Uma Rani , Dr. M. Sreenivasa Rao , V. Theresa Vinayasheela
Full text

Abstract 301  | PDF 27 

K-Means on GPU: A Review

Vidya Dhamdhere, Rahul G. Ghudji
Full text

Abstract 301  | PDF 55 

Study of Different Aspects in Machine Learning

Sheilly Padda, Sonali Gupta, Priya Sharma, Apoorva Arora
Full text

Abstract 366  | PDF 33 

Survey Paper for Dynamic Resource Allocation using Migration in Cloud

Ms. Renu Krishnan, Ms. Silja Varghese
Full text

Abstract 288  | PDF 67 

A survey on text mining techniques

Mr. Rahul Patel, Mr. Gaurav Sharma
Full text

Abstract 428  | PDF 41 

Security and Privacy in Private Cloud Storage

V.B. Maral, Mehul Sanghvi, Pankaj Rana, Wajeda Pathan, Heena Parihar
Full text

Abstract 186  | PDF 38 

IMAGE DENOISING TECHNIQUES: LITERATURE REVIEW

Monika Raghav, Sahil Raheja
Full text

Abstract 207  | PDF 56 

Enhance Performance of Random Testing using Randomized Algorithm

Jaypal D. Rangari, Swapnili P. Karmore
Full text

Abstract 193  | PDF 29 

Facial Emotion Detection using Eigenfaces

A.N. Paithane, Shruti Hullyalkar, Gayatri Behera, Neha Sonakul, Aditi Manmode
Full text

Abstract 291  | PDF 107 

An Implementation of Image Watermarking by Using Gradients

Dnyandevi W.Shrirao, Prof.Sulbha patil, Prof. Sonal Honale
Full text

Abstract 284  | PDF 42 

IVRS BASED COLLEGE AUTOMATION

Pinkey J. Ratnani, Priyanka L. Patil , Rashmi A. Sonawane , Rohidas B. Sangore
Full text

Abstract 330  | PDF 208 

Design of an Application Specific Microcontroller

Naveen Kumar, Akshay Jindal, Prof. Alok Basu
Full text

Abstract 209  | PDF 65 

A Report on Dhruval Enterprise Resource Planning Solution Implementing Financial Module

Lokesh Sharma, Vijayakumar Kubsad, Prasanta Kumar Paul
Full text

Abstract 225  | PDF 97 

Cloud Computing and Security Issues

Mrs.R. Pushpalatha
Full text

Abstract 237  | PDF 115 

IT STRATEGY: A Present Business Need

Srishti Narayan, Hariom Awasthi
Full text

Abstract 157  | PDF 32 

AUTOMATED PARKING SYSTEM WITH BLUETOOTH ACCESS

Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma
Full text

Abstract 664  | PDF 270 

SMART VISION SYSTEM FOR BLIND

Prof.R.R.Bhambare, Akshay Koul, Siddique Mohd Bilal, Siddharth Pandey
Full text

Abstract 477  | PDF 411 

A Survey of SignCryption Its Types and Techniques

R. Bahirathy, S. Aruljothi
Full text

Abstract 147  | PDF 47 

Protection from Vampire Attacks on Routing Protocol

Pushpalata D. Chandore, Devendra Vatsa, Nitesh Rastogi
Full text

Abstract 149  | PDF 56 

Design and Simulation of Microstrip Patch Antenna for Wireless Communication

Gyanender Kumar, Charanjeet Singh, Deepender Dabas
Full text

Abstract 503  | PDF 608 

Greening the Cloud Computing

Deepak Prashant
Full text

Abstract 256  | PDF 98 

REVIEW OF CATTLE MONITORING SYSTEM USING WIRELESS NETWORK

Anselemi B.Lukonge, Dr.Shubi Kaijage , Ramadhani S. Sinde
Full text

Abstract 291  | PDF 45 

UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECT

Srividya M. S., Hemavathy R., Shobha G.
Full text

Abstract 336  | PDF 149 

Mitigation of co residence profiling from malicious user through MUSSEL BEHAVIOR framework

A.P.Leela Vinodhini .M.E , A.Justine Jerald M.Tech
Full text

Abstract 202  | PDF 43 

ASPECT EXTRACTION & SEGMENTATION IN OPINION MINING

Mily Lal, Kavita Asnani
Full text

Abstract 196  | PDF 181 

AUTOMATED BLOOD VESSEL SEGMENTATION IN RETINAL IMAGE

Pradeepa.BMr., J.Benadict Raja
Full text

Abstract 203  | PDF 42 

Improving Efficiency of IDS using alert Correlation

Thakar Vivek R, Prof. Vrushank Shah, Prof. Yatin Patel
Full text

Abstract 190  | PDF 32 

OBJECT DETECTION AND TRACKING IN VIDEOS : A REVIEW

Nagalakshmi.C.K, Hemavathy.R , Shobha.G
Full text

Abstract 173  | PDF 311 

Fraud Detection Social Security and Social Welfare Data Mining

A.Jenifer Sophia, S.Parthiban
Full text

Abstract 168  | PDF 198 

Augmented Reality based on Image Processing

Mayank Pandey, Ms. Prabha Nair, Dr. Manoj Wadhwa , Ashish Chaudhary
Full text

Abstract 182  | PDF 229 

A Systematic Approach to Cloud Security Using SeDas Platform

Karthik D U, Madhu C, Sushant M
Full text

Abstract 141  | PDF 55 

Methodology for Selection of Spindle Drives for Milling Machines

Mikho Mikhov, Marin Zhilevski
Full text

Abstract 242  | PDF 50 

Security Issues Cloud computing Storage

Kunjali Bhardwaj, Dr.Neerja Jindal
Full text

Abstract 136  | PDF 46 

A SURVEY ON WIRELESS SENSOR NETWORKS APPLICATION FOR AIR POLLUTION MONITORING

Godbless Swagarya , Shubi Kaijage , Ramadhani S. Sinde
Full text

Abstract 192  | PDF 107 

Challenges in Testing of Web Applications

Anisha Tandon, Dr. Mamta Madan
Full text

Abstract 160  | PDF 37 

Various Methods to improve the visual appearance of Black & White and Colored Images

Baljit Kaur, Monika Tuteja, Shally Gujral
Full text

Abstract 222  | PDF 31 

Wood Species Identification System

S. Mohan, K. Venkatachalapathy, S. Ezhil Priya
Full text

Abstract 152  | PDF 51 

Cut Detection in Wireless Sensor Networks: A Survey

Goodubaigari Amrulla, Murlidher Mourya, Shaik Ansar Basha
Full text

Abstract 271  | PDF 92 

Pruning the Cloud Internal Data Stealing By Treachery Attacks

Shobha Agasibagil, Mr. G.Lingana Gowda
Full text

Abstract 178  | PDF 62 

Fast Greedy Algorithm for Routing in Delay Tolerant Network

Aditya Pancholi, Sapna Grover
Full text

Abstract 294  | PDF 78 

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Mrs.Shantala C P, Mr.Anil Kumar
Full text

Abstract 268  | PDF 60 

Mtbf Analysis Of The Two-Unit Series System With Repair Facility

V.K. Pathak, Kamal Mehta, Seema Sahu & H.L. Manker
Full text

Abstract 159  | PDF 35 

Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation

S. Chandrakanth Sagar, Dr. M. Narayana
Full text

Abstract 251  | PDF 811 

Development of Wireless Communication Networks: From 1G to 5G

Shivam Jaiswal , Ajay Kumar , Neha Kumari
Full text

Abstract 228  | PDF 2025 

Refinement of visual secret sharing scheme without image size expansion

Ms. Smita Patil, Prof. Ms. Jyoti Rao
Full text

Abstract 340  | PDF 29 

A New Automated Scheme of Quadrilateral Mesh Generation for Finite Element Analysis

H.T. Rathoda, Bharath Rathod , K. T. Shivaram, K. Sugantha Devi
Full text

Abstract 247  | PDF 265 

Success of Windows 8: Capturing multiple markets

Ajay Kumar, Shivam Jaiswal,Asha Yadav
Full text

Abstract 180  | PDF 47 

FSR: Ferry-based Secure Routing Algorithm for Delay Tolerant Networks

Sapna Grover, Aditya Pancholi, Sonika Arora
Full text

Abstract 243  | PDF 34 

An Overview of Reusability of Software Components

Ramandeep Kaur, Navjot Kaur, Rajwinder Kaur
Full text

Abstract 201  | PDF 79 

Automated-Combined valve oscillation testing machine for 4&6 Cylinders

Ms. Nutan Ghodake, Ms. Pooja Doshi, Ms. Shruti Dharmahattikar
Full text

Abstract 234  | PDF 38 

Implementation of Cooperative Caching in Social Wireless Networks

S.L.Suganya, Dr.R.Indra Gandhi
Full text

Abstract 239  | PDF 21 

Performance analysis of different Image Enhancement Algorithms”

Mr. Gharu Anand Nandlal, Prof. Rastogi Nitesh
Full text

Abstract 265  | PDF 39 

Trust-based security for Ad-Hoc network

Prof. (Ms) A. A. Patil, Prof. T. I. Bagban, Prof. S. J. Patil
Full text

Abstract 374  | PDF 62 

A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions

Nitesh Kaushik, Gaurav, Jitender Kumar
Full text

Abstract 478  | PDF 157 

Development of an e-Diary Service for Deployment on the UFH network

Shadreck Mudziwepasi, Phumzile Nomnga, Mfundo Shakes Scott
Full text

Abstract 274  | PDF 222 

PROTECTED DESIGN FOR TOPOLOGY TO MANAGE AND AUTHORIZE MOBILE AD HOC NETWORK

Mr.J.Rajesh B.E.,(M.E), Mrs.A.Kamakshi* M.Tech
Full text

Abstract 204  | PDF 43 

IMPROVED EXPECTATION MAXIMIZATION CLUSTERING ALGORITHM

Garima Sehgal, Dr. Kanwal Garg
Full text

Abstract 289  | PDF 209 

Product Review By Sentiment Analysis

Devare Jayvant,Punde Sunita, Sahane Sujata,Shendage Sonali, Kanase Rajesh
Full text

Abstract 299  | PDF 439 

Use of Image Processing Techniques for Making Run out Decision in Cricket

Shashank Yeole, Nisheet Sharma, Yogesh Shinde, Sufiyan Shaikh
Full text

Abstract 131  | PDF 395 

Cross lingual information retrieval using tf-idf and similarity measures

Prof. Pankaj Khambre, Aishwarya Pathak, Aarti Deshpande, Shringar Jha
Full text

Abstract 229  | PDF 162 

Solving Multistage Graph using ACS Algorithm

Pankaj D.Khambre, Ms.Aarti Deshpande
Full text

Abstract 286  | PDF 61 

Vehicle Health Monitoring System In A Developing Nation.

Ebole Alpha F., Prof. Omotosha O. J
Full text

Abstract 199  | PDF 348 

A SURVEY ON WEB IMAGE SEARCH USING RERANKING

Shweta gonde, Assistant Professor Uday Chouarisia, Assistant Professor Raju Barskar
Full text

Abstract 150  | PDF 42 

A survey on phishing detection and prevention technique

Archit Shukla , Lalit Gehlod
Full text

Abstract 284  | PDF 120