Vol. 4 No. 11 (2015)

Published: 2018-01-03

Articles

  • Using Image Processing In Security

    Shivam Sharma
    64
    68
  • Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation

    Ms.Ashwini Thool, Prof. Prashant R. Indurkar , Prof.S.M.Sakhare
    74
    56
  • Text clustering for computer investigation with search optimization

    Jameer Kotwal, Prajkta Varhade, Komal Koli, Roshni Gawande, Varsha Andhale
    62
    60
  • Digital Library: Using Hybrid Book Recommendation Engine

    Prof. Sulbha Ghadling,Kanchan Belavadi, Shubhangi Bhegade, Pradnya Ghojage, Supriya Kamble
    72
    175
  • Re-Ranking Based Image Categorization Using Saliency Driven Nonlinear Diffusion Filtering -A Review

    Ms. Nisha Barsagade, Prof. Mr. Mayur Dhait
    67
    54
  • Review of Social Collaborative Filtering Recommender System’s Methods

    Pratibha Yadav, Kumari Seema Rani, Sonia Kumari
    82
    61
  • Fast File Downloading Using Network Coding in Distributed System

    Prof. Ashvini Jadhav, Pratik P. Raut, Rohan S. Ghorpade, Vishal K. Raut, Chinmay Y. Kale
    82
    90
  • A Survey-Decentralized Access Control with Anonymous Authenti-cation and Deduplication of Data Stored in Clouds

    Mr. Imran D. Tamboli, Prof. Ranjana R. Badre, Prof. Rajeshwari M. Goudar
    72
    62
  • Position Based On Refining Aggregate Recommendation Assortment

    L. Pravin Kumar, Ramesh Krishnan
    64
    55
  • Bigdata Analysis In Health Care

    L. Pravin Kumar, Ramesh Krishnan
    69
    47
  • A Survey paper on An Effective Analytical Approaches for Detecting Outlier in Continuous Time Variant Data Stream

    Mr. Raghav M. Purankar , Prof. Pragati Patil
    83
    63
  • Stability Analysis of A Non Vaccinated Sir Epidemic Model

    Prof. Dr. Sumit Kumar Banerjee
    74
    58
  • Programming Paradigms in the Context of the Programming Language

    Sonia Kumari, Pratibha Yadav Kumari Seema Rani
    101
    107
  • A Survey Of Ontology Evaluation Techniques For Data Retrieval

    Harsh Shah, Parth Shah, Khushali Deulkar, Assistant Prof
    61
    64
  • A Review Of Inferring Latent Attributes From Twitter

    Surabhi Singh Ludu
    60
    48
  • The Interdisciplinary Nature Of Knowledge Discovery Databases And Data Mining

    T. Bharathi
    68
    55
  • Comparative Study Of Semantic Search Engines

    Vidhi Shah, Akshat Shah , Asst. Prof. Khushali Deulkar
    60
    53
  • Cognitive Perspective Of Attribute Hiding Factor Complexity Metric

    Francis Thamburaj, A. Aloysius
    68
    55
  • Ontology-Based Multi-Document Summarization

    Bhakti Mehta ,Varsha Marathe , Priyanka Padvi and Manjusha Shewale
    59
    55
  • Lung cancer detection and classification using Support Vector Machine

    Niranjan Shukla, Aakash Narayane, Aniket Nigade Krishnakumar Yadav, Mrs Harshada Mhaske
    60
    60
  • Third Party Auditing of Data on Cloud With Fine Grained Updates

    Ajinkya Sabale, Rohit Prajapati, Sameer Pathan, Sanket Prabhu, Prof .Sanjay Agrawal
    57
    49
  • The Future Generation Intelligent System Need For Human Memory To Detect Crime Using Virtual Brain Technology.

    R.Uma, S.Kavitha, V.Ilakkiya
    57
    305
  • Surveying Smartphone Security for Linux Powered Devices

    Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh, Rahul Koti, Mrs. D.A. Phalke(Guide), Mr. Rahul Pawar (Co-Guide)
    66
    51
  • Gamma Corrected Bright Channel Filtering Based Fast Single Image De-hazing

    Navjot Kaur, Dr. Lalita Bhutani
    48
    52
  • Survey on Credit Card Fraud Detection Techniques

    Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli
    168
    159
  • Robust Construction Of Multiday Itinerary Planning

    Ms.P.Jayapriya , Mr.S.Gunasekaran , Ms.S.Nathiya
    59
    45
  • Secure data management system for patients and their doctor.

    Miss.Revati Wahul, Miss.Eshaa Sood, Miss.Julie Yohannan, Miss.Zahra Budhwani
    75
    52
  • Detection of Black Hole Attack in DTN with Authentication

    D.Humera, M.VeereshBabu
    60
    45
  • Energy Efficient Data Transfer In Mobile Wireless Sensor Network

    T . Mary RincyMol , Mrs.A.SahayaPrincyM.Tech
    50
    44
  • Performance Analysis of JPEG2000 for Different Wavelets Transforms in satellite images

    P.Krishnamoorthy, V.P.Ajay
    50
    58
  • Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network

    M. Sindhuja & Mrs A.Sahaya Princy M.Tech
    53
    58
  • Providing Lifetime Optimization and Security in Wireless Sensor Network

    Sindhuja.R, Mrs.Vidhya.S
    63
    54
  • Secured Data in Cloud by Using LFSR

    Sumalatha Potteti, Ravi Kumar Goura
    47
    39
  • P – TSP Seasonal Constrained Model

    Vijayalakshmi R, Gurava Raju P, Sundara Murthy
    42
    33
  • Dynamic and intelligent classifier for efficient retrieval from web mining

    M.Parvathi MCA, M.Phil, S.Thabasu Kannan M.TECh, Ph.D, MBA
    39
    40
  • Hybrid visual servoing for tracking multiple targets with a swarm of mobile robots

    Gossaye Mekonnen Alemu
    49
    44
  • A Survey of Commonly Used Cryptographic Algorithms in Information Security

    Manjula G., and Dr. Mohan H.S.
    49
    48
  • Study of Classification of Diseases by Genetic Algorithm for Multiclass Support Vector Machine Using Hadoop

    Mr.Ankit R. Deshmukh , Prof.S.P.Akarte
    44
    36
  • HIGHLY SECURE REVERSIBLE WATERMARKING MECHANISM USING REVERSIBLE DE-IDENTIFICATON

    Fasiha Shereen, B A Sharath Manohar
    53
    40
  • Performance Measures for a three-unit compact circuit

    Ashish Namdeo ,V.K. Pathak, Anil Tiwari
    59
    29
  • Comparisons Of Restored Blurred-Noisy Dental Images Using Wiener Filter And Lucy-Richardson Technique.

    Aanchal Joseph, Mr. Sandeep B. Patil
    42
    57