Published: 2018-01-02

Impacts of Television Serials on Tamil Rural Women: A Data Mining Case Study of Theni District

K. Sujitha, R. Shantha Mary Joshitta, B. Nivetha,

Abstract 142  | PDF

A Novel Ber Analysis Approach For Different Modulation Schemes For Conventional And Wavelet Based Ofdm System

Rakesh Pathak (PG Scholar) k.Narender M.tech, Dr. B.R.Vikram Ph.D,

Abstract 61  | PDF

Increasing Coverage in Wireless Mesh Networks: Mobile mesh networks

F Mr. Basavantraya, Mr. Kiranbabu T S,

Abstract 49  | PDF

Cloud and Virtualization: Interdependency

Anu Gupta, Dr. R.B.Garg,

Abstract 49  | PDF

To Automate the Services Life Cycle of Cloud Using Semantic Technologies

N.Sunanda, M.Naresh Babu,

Abstract 49  | PDF

Web Based Spatial Query System for Decision Making

Alfisha Khan, Vinod M Bothale , K.Subba Reddy,

Abstract 54  | PDF

Event Detection in Twitter Using Mentioning Practice of the User

Chaitra , M,

Abstract 46  | PDF

Predicting Patterns over Protein Sequences Using Apriori Algorithm

Savitri , Dhumale,

Abstract 67  | PDF

Secure Transmission of Data Using DNA Technology

Soumya V. , Vastrad,

Abstract 53  | PDF

Lung Cancer Identification Using CT Images

Sunanda Biradar Kavya Agalatakatti,, Sunanda Biradar Kavya Agalatakatti,

Abstract 62  | PDF

Improved Gradient & Multiple Selection Based Sorted Switching Median Filter

Kanchan Bali Er. Prabhpreet Kaur,

Abstract 56  | PDF

Wavelet based denoising of brain MRI images

Sujata Desai, Lubna.M.Kazi,

Abstract 50  | PDF

Cloud ‘As -a- Service

Anu Gupta,

Abstract 64  | PDF

Design And Development Of Algorithm To Avoid Wormhole Attacks In Wireless Networks For Proactive Algorithms

Deepika D, Pai,

Abstract 45  | PDF

A Feasible Approach to Design a Cmos Domino Circuit at Low Power VLSI Application Design

Pallavi Sharma, Dr Subodh Wariya,

Abstract 48  | PDF

Design Of Energy-Efficient Clustering Algorithm for Large Scale Wireless Sensor Networks

Sridevi H N, C K Raju,

Abstract 48  | PDF

Design of Wireless Variable Gesture Control For Mobile Devices

1Ch.Supriya, R.Prashanthi, M.Tech

Abstract 37  | PDF

ARM Based Application Of Data Hiding Process By Using Anti Forensics Technique For Authentication

K. Jaswanthi, J. Amarendra, M.Tech(ph.d)

Abstract 50  | PDF

Quality Of Experience In Remote Virtual Desktop Services

P.Lakshmi, S.Himabindu,

Abstract 42  | PDF

Kindiling And Perception Of Qr-Images Using Raspberry-PI

1P.V.Vinod Kumar, K.Dhanunjaya, M.Tech

Abstract 63  | PDF

Text Mining using Ontology based Similarity Measure

Atiya Kazi, D.T.Kurian,

Abstract 38  | PDF

Exploiting a Protocol at network frame to avoid packet failure

Ms.Jayashree Yadannavar, Ms.Chandrakala Patil

Abstract 38  | PDF

Minimizing Time Complexity based on Parallel Processing using RNS for Audio

Divya Jennifer Dsouza, Radhakrishna Dodmane,

Abstract 59  | PDF

Design of An Efficient Aging-Aware Reliable Multiplier Based On Adaptive Hold Logic

T. Shireesha, P.P. Nagaraja Rao,

Abstract 78  | PDF

AID for Narcolepsy People

S.Arunodhayan, S.Srivatsan, B.Sumathy,

Abstract 53  | PDF

Spectral _Spatial Classification For Hyper Spectral Images Based On An Effective Extended Random Walker

P.Sreevani, Prof.B. Abdul Rahim, Fahimuddin.Shaik,

Abstract 43  | PDF

Spray Forming of Al-10Si-20Pb, Al-10Si-20Sn and Al-20Sn alloy: A Comparative study of their microstructure and wear characteristics

Mallikarjuna Pujar, Dr.G.B.Rudrakshi,

Abstract 41  | PDF

Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing

Er. Mahak kukreja, Er. Alankrtia Aggarwal,

Abstract 42  | PDF

Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing

Azmath Akheela, Hina Naz,

Abstract 40  | PDF

Performance Evaluation of LMS, DLMS and TVLMS Digital Adaptive FIR filters by using MATLAB

Ashwini Ramteke , Prof. N.P.Bodane

Abstract 59  | PDF

Reactive Power Compensation In Distribution Systems Using SAPF

Mandeep Paposa, Mr. Shailendra Kumar Verma

Abstract 61  | PDF

Cloud-Computing: A milestone in Information Technology

Kumari Seema Rani ,

Abstract 94  | PDF

Design of Query Recommendation System using Clustering & Rank Updater

Priyanka Rani, Mrs. Annu Mor

Abstract 38  | PDF

Abnormality Detection in Kidney Ultrasound Imaging

Prema T. Akkasalgar Shruti S. karakalmani

Abstract 42  | PDF

Simulation Of High Voltage Gain Boost Converter For Battery Charging With PV System In A Single Stage Conversion

Praneetha Tummala, Amarendra Alluri

Abstract 25  | PDF

Acoustic Analysis of voice samples to differentiate Healthy and Asthmatic persons

Khushboo Batra , Swati Bhasin , Amandeep Singh

Abstract 137  | PDF

Pitch, Formant Frequencies, Intensities as Speech Cue to preceived age

Tarunam Chaudhary Sawati Bhasin, Saloni

Abstract 38  | PDF

Running Costminimization Of An Electric Power Sector

Osita Oputa .

Abstract 25  | PDF

Implementation of ERP module for the key processes of hull production in shipbuilding industry

Kairav Bhatt .

Abstract 33  | PDF

Duplicate Detection In Hierarchical XML Multimedia Data Using Improved Multidup Method

Prof. Pramod. B. Gosavi Mrs. M. A. Patel

Abstract 37  | PDF

Multidomain Optimised Hidden Web Crawler

Khushboo Gupta , Ankush Goyal

Abstract 29  | PDF

On Improving Side channel Attack defence mechanism using ECPM technique under Elliptic curve Cryptography

Mrs. Sweta Nigam, Mr. K.N. Hande

Abstract 48  | PDF

To Study the Nonlinear Effects Related To PAPR and PAS in Wireless System

Rajvansh Sehamby , Dr. Jyoteesh Malhotra

Abstract 30  | PDF

Optimized Distributed Association Mining (ODAM) Algorithm for detecting Web Robots

Akshata Dilip Jagtap, Prof. Vijayalaxmi Kadroli

Abstract 34  | PDF

Classification of underwater objects using acoustic techniques

Pooja Gavande Dr. R.S. Kawitkar, , M. Selva Balan

Abstract 33  | PDF

A Survey of Military Application of Wireless Sensor Networks For Soldiers

Farkhonde Khakestani , Saeed balochian

Abstract 33  | PDF

Recognition Of Indian Currency Note Using Grid Technique

Sneha Talikoti1 , Prof S.S.Panchal

Abstract 142  | PDF

WSN Based Cluster Head Fault Tolerance Mechanism

J.Rajprabaharan .

Abstract 29  | PDF

Information Security with the help of MLMS and HLSB

Ms. Ekata S. Bele, Prof. Chetan Bawankar

Abstract 27  | PDF

An Efficient Denial-of-Service Attack Detection System Based on Multivariate Correlation Analysis

Binil Anto Thampi C., Syed Farook K.

Abstract 30  | PDF

Enhance Distribution of Load in Cloud

Rashi Saxena, Tarun Gupta

Abstract 25  | PDF

Bank Cheque Identification and Classification using ANN

Savita Biradar , S.S.Panchal

Abstract 38  | PDF

Survey of Routing Protocols in MANET

Tejeswara Raju V Vineeth V , Sneha R, Suhas Chadha

Abstract 38  | PDF

Design Of Embedded Virtual System By Using Human Machine Interaction (HMI)

Tiyyagura. Sneha , M. Kezia Aruna Jyoth

Abstract 34  | PDF

Optimization Of Cmos Circuits By Using Quaternary Logic LUT

V.Narasimhulu, K.V. Bhanu Prasanth, C.Md.Aslam

Abstract 44  | PDF

A Review on Annotation Process

Sabna N S, Jayalekshmi S

Abstract 44  | PDF

Detection and Prevention of Black Hole & Gray hole attack in MANET using Digital signature Techniques

Monika , Swati Gupta

Abstract 39  | PDF

Assessing Version Consistency by Identifying systematic Code Changes during Runtime

P.Swapna Shankar , P.Niranjan, P.Shireesha

Abstract 24  | PDF

Offline Signature Identification Using Adaptive Window Position Technique

Chaitra Kulkarni .

Abstract 43  | PDF

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

J.Sivaiah , Dr.K.Venkataramana

Abstract 38  | PDF

Smart Home System Control Using GSM

A.C.Kaveri, T.Jyothi

Abstract 43  | PDF

Review of Evolutionary Optimization Algorithms for Test Case Minimization

Aditya Vikram Sharma .

Abstract 33  | PDF

Investigation of The Effect Of Water-Cement Ratio On The Modulus Of Rupture Of Concrete

Onwuka. D. Oa, Awodiji C.T.Gb and Onwuka, S.U

Abstract 59  | PDF

An effective Research Paper Recommender System based on Subspace Clustering

K. Naga Neeraja, Dr. B. Prajna

Abstract 62  | PDF

Improving Classification Accuracy Using Weighted Multiple Regression

Sonali S. Salunke, Swati Deshpande

Abstract 43  | PDF

Probabilistic Determination of Class for an Unbalanced Dataset

Samadhan B. Patil, Vaishali Ghate Dhanashree Tarodmalle

Abstract 24  | PDF

Comparitive Analysis of Watermarking in Digital Images Using 3-Level DWT & LBP

Jyoti Joshi , Pawan Kumar Mishra

Abstract 41  | PDF

Social Group-Based Routing in Delay Tolerant Networks using Fuzzy Logic

Shadha K., Sherikh K. K.

Abstract 33  | PDF

Ant Colony Optimization Algorithm for Software Project Scheduling Using Critical Chain Project Management

Haseeba N, Sajeer K.

Abstract 36  | PDF

A Fast and Efficient RBTRC-MAC Protocol for Event-Driven Wireless Sensor Networks

Hasna P., Annes Philip

Abstract 45  | PDF

A Review on image compression technique

Er. Sonia Er. Jujhar Singh

Abstract 40  | PDF

Enhancing Security of MANETs by Implementing Elliptical Curve based Threshold Cryptography

Ms. Bhavna Sharma , Mrs Vandana Madaan

Abstract 47  | PDF

Establishing a Multi-Application ADHOC Network for Smart city Design

M.Annapurna , S.Himabindu

Abstract 47  | PDF

Efficient Design Of Binary Adders Using Cellular Automata

G.Divya, Mr. S.Venkata Kiran

Abstract 44  | PDF

Comparative Study of Various Scheduling Algorithms in Cloud Computing

Kavyasri M N, Dr. Ramesh B

Abstract 36  | PDF

Programmable Direct Memory Access Controller Design Using Advanced High Performance Bus Protocol

Ms. Sarojini Hoogar S, Mrs. Sapna M K

Abstract 41  | PDF

Implementation of FPGA Architecture for OFDM-SDR with an optimized Direct Digital Frequency Synthesizer

Aluru Koteswara Rao, A.Anasuyamma, M.Tech

Abstract 43  | PDF

Design and FPGA-Based Implementation of A High Performance 64-Bit DSP Processor

Jadapalli Pavani, K.Dhanunjaya(phd)

Abstract 51  | PDF

An Efficient FPGA Implementation Of Multifunction Residue Architectures

Chembeti silpa, G.Mukesh,, M.Tech

Abstract 44  | PDF

Optimized Analytical Study to Show the Impact of CFO on the Performance of LTE Uplink

Punugoti Asritha .

Abstract 44  | PDF

Evaluation of Energy Efficient Low Power Listening MAC Protocols in WSN

Komaldeep Kaur, Dr. Jyoteesh Malhotra

Abstract 44  | PDF

Review on Security Issues of SaaS Clouds

Ritesh Mahendra Ahire Prof.Ganesh Kadam

Abstract 25  | PDF

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network

1Haseena M. K., Annes Philip.

Abstract 43  | PDF

A Survey on Techniques of Critical Infrastructure Monitoring

Madhuri Unde, Borkar Bharat

Abstract 29  | PDF

Dealing With Concept Drifts In Process Mining Using Event Logs

Maddu. Uma Lavanya , Mr. Sunil Kumar Talluri

Abstract 27  | PDF

Challenges of Big Data: Current Analysis

Mr. A. Jamaludeen Mr. C. Senthil Kumaran Ms. R. Suriya

Abstract 25  | PDF

A Study on Weibull Distribution for Estimating the Reliability

Dr. P. K. Suri , Parul Raheja

Abstract 97  | PDF

Cost Effective Method for Detecting Clone Nodes in Wireless Sensor Network

Dilna V., Sajitha M.

Abstract 44  | PDF

EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing

Soumya P. V., Shreeja R.

Abstract 44  | PDF

Anonymous Routing Protocols in MANETs - A Survey

Sethulekshmi C G, Manoj Kumar G

Abstract 176  | PDF

Contrast Enhancement Detection on Digital Images - A Survey

Geethu N Nadh, Sreelatha S.H

Abstract 34  | PDF

Video Compression – from Fundamentals to H.264 and H.265 Standards

Sruthi S, Dr. Shreelekshmi R

Abstract 30  | PDF

Model for User’s Trust in Cloud Service Providers in Cloud Environment

Kavita Rathi, Sudesh Kumari

Abstract 44  | PDF

Effects On Human Cells Due To RF And Electromagnetic Field

V. S. Nimbalkar .

Abstract 36  | PDF

Comparative Analysis of Different Technique for Detection of Noise in Restored Image

Puneet Kaushik Mridul Chawla * Gyanender Kumar

Abstract 40  | PDF

A Survey over Various Variants of RS and Similar Cryptography Techniques

Pramila Patidar Namrata Sharma

Abstract 26  | PDF

A Novel Approach for Enhancing Security of MANET Using Trust Based Method

1Shabana M. L., Anil K. Jacob

Abstract 44  | PDF

Using Genetic Algorithm For Optimization Of Mobile Agent In Wireless Sensor Network: A Survey

Harveen Kaur, Mandeep Singh Sra

Abstract 27  | PDF

Implementation of Systematic Error Correcting Codes for Matching Of Data Encoded

Amala A , Jasmine M

Abstract 31  | PDF

Breast Cancer Using KMSVM Techniques In Wisconsin Detect Prognostic Breast Cancer Data Sets

D. Rajakumari, C. Jayanthi

Abstract 29  | PDF

A Novel Human Opinion Dynamics Based Optimization for Software Cost Estimation

Kriti Changle, Nisha Singh Sumit Kumar Bola

Abstract 28  | PDF

An High Equipped Data Hiding Algorithm Based On Secret Fragment Visible Mosaic Images And Pixel Color Transformations For Secure Image Transmission

Pathan Mohd Aziz Khan .Praveen Kumar M.Tech Hod

Abstract 37  | PDF

An High Equipped Power Constrained Algorithm For OLEDS Based On MSR

Dayaker S Yakub M.Tech

Abstract 26  | PDF

Downloading and performance analyzing of WMV and MPEG files in Cloud Computing.

Manoj Kumar Tiwari .

Abstract 47  | PDF

M-Commerce: A Revolution in E-Business

Kumari Seema Rani Pratibha Yadav

Abstract 42  | PDF

Experimental design of adaptive algorithms to reduce SER in M-ary QAM System

Preetika Gupta , Ankur Singhal

Abstract 30  | PDF

Online Community of Open Code Development Project

Rehan Khan .

Abstract 43  | PDF

Text Watermarking Approaches for Copyright Protection

Gagandeep kaur, Sukhwinderbir .

Abstract 45  | PDF

DDR3 Based Lookup Circuit For High Performance Network Processing

C.Jayachandra , Vali Babu

Abstract 47  | PDF

“Study of Performance Enhancement and Optimizing Various Parameters of Lateral IMOS”

Mr.Hira lal Dhruw Mr.Ravi Mohan , Mr.Divyanshu Rao

Abstract 48  | PDF

A Study on Various Image Segmentation Techniques: Merits and Demerits

Abin Jose Joy, Meenu K Mathew

Abstract 43  | PDF

Efficient Authentication Technique Based On Virtual Password

1Sufyan Panginikkadan ,Zainul Abid T.P.

Abstract 41  | PDF

Information Retrieval

Mukta Airon .

Abstract 41  | PDF

A Controlled Approach for Multicast Routing Protocol Using Branching Router

Anishma N , Sajitha M

Abstract 31  | PDF

Implementation Of Clock Gating Logic By Matching Factored Forms

A.kirankumari, P.P. Nagaraja Rao

Abstract 33  | PDF

“Dynamic Soil Structure Interaction Analysis for Piled Raft Foundation”

Chaithra T P, Manogna H N

Abstract 71  | PDF

Group Authentication Using Threshold Secret Sharing

1Parvathy Sudheer Zainul Abid T. P

Abstract 40  | PDF

Study of Software Quality and Risk Estimation and Quality Cost Analysis using empirical study

Dr. P. K. Suri , Pooja

Abstract 45  | PDF

Efficient Publish/Subscribe System Using Identity Based Encryption

Prathyusha M. Kumar., Mumthas T.K.

Abstract 24  | PDF

Scalable and Efficient Data acquisition in Service Oriented Vehicular Adhoc Networks

Nishi K.M. , Indu P

Abstract 24  | PDF

Survey on String Transformation - A Query Based Approach

Shijina J Salim , Diliya M Khan

Abstract 42  | PDF