Published: 2017-12-29

Face Recognition and Emotion Classification

Ruby Kamboj , Sarita Choudhary

Abstract 39  | PDF

OTP Generation for ATM Theft Protection

D.Priya,R.Suganya Dr.R.Nedunchelian

Abstract 44  | PDF

6LoWPAN Routing Issues

Vishalakshi R, Chaithra P, Srikanth N S

Abstract 41  | PDF

Comprehensive Review of Space Wave Optical Link

Amolpreet Kaur , Gagangeet Singh Aujla , Sahil Vashist

Abstract 46  | PDF

Music Recommendation System Using Association Rule Mining and Clustering Technique To Address Coldstart Problem

V.Manvitha, M.Sunitha Reddy

Abstract 64  | PDF

Survey on Recent trends in Computational & Experimental Technique to Evaluate Performance of Air Flow in Defrost/Demist System for Automobile

Saiprasad N. Patil, Prof. P. D. Sonawane

Abstract 52  | PDF

Novel Use of Single Phase Electromechanical Energy Meter for Standardized Testing of Digital Energy Meters

Mr.S.B.Parmar, Mr.B.S.Shah Mr.J.N.Rathod, Dr.A.S.Pandya

Abstract 41  | PDF

A Review of Cloud Based Schedulers on Cloud Computing Environment

Renu Bala, Gagandeep Singh, Sahil Vashist

Abstract 42  | PDF

A Modified K-Medoid Method to Cluster Uncertain Data Based on Probability Distribution Similarity

Aliya Edathadathil, Syed Farook, Balachandran KP

Abstract 42  | PDF

Mobile Application Protection System: A Secured Architecture

B Meenakumari, Sandeep Karnam

Abstract 46  | PDF

Requirement Elicitation Of Large Web Projects

Surabhi Sachdeva, Monika Malhotra

Abstract 46  | PDF

A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks

Farzana T, Mrs.Aswathy Babu

Abstract 58  | PDF

Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion

Sarabdeep singh, Shikha khera

Abstract 44  | PDF

Detection of Crash Transient Failure during Job Scheduling using Replication Technique

Inderpreet Kaur, Sarpreet Singh

Abstract 43  | PDF

Optimal Implementation of Graph Kernel Matching in Matrimonial Database Using Graph Mining Technique

S. A. Amala Nirmal Doss, Dr.S.P.Victor

Abstract 42  | PDF

Design of Intelligent Mobile Vehicle Checking System Based On ARM 7

Mr. Rajendra B. Mohite, Prof. Miss Rupali R. Jagtap

Abstract 46  | PDF

A New Technique Called Annotation Used To Categories The Content Of Web Pages

U. Madhavi, S. Hrushikesava Raju , P. Nirupama

Abstract 30  | PDF

Numerical Solutions of Ordinary Differential Equations Using Mathematica

Adoh, A. C., Ojobor, S. A.

Abstract 43  | PDF

An Efficient Job Scheduling Algorithm using Min-Min and Ant Colony Concept for Grid Computing

Davinder Kaur, Sarpreet Singh

Abstract 35  | PDF

Multiple Quality Parameters for Image Quality assessment

Esha Meshram, Suyash Agrawal

Abstract 36  | PDF

A combined approach of using DWT-DCT watermarking and AES encryption to improve the security of satellite images

Naida.H.Nazmudeen, Jismi.K

Abstract 36  | PDF

A Review on Dealing Uncertainty, imprecision and Vagueness in Association Rule Mining Using Extended and Generalized Fuzzy

Vivek Badhe, Dr. R.S. Thakur, Dr. G.S. Thakur

Abstract 109  | PDF

A Survey of various Routing Algorithms based on Shortest Path

Neha Rathod, Ms. Rupali Bhartiya

Abstract 37  | PDF

Improved Gradients & Global Mean Based Switching Median Filter

Lovepreet Kaur, Dr. Arun Khosla

Abstract 34  | PDF

Optimizing the Ad-hoc applications in Vehicular Network using Max-Min Ant system

Sumeet Sekhon, Dinesh Kumar

Abstract 33  | PDF

A Reactive Hierarchical Trust Management Scheme for Wireless Sensor Networks

Reshmi V, Sajitha M

Abstract 40  | PDF

Security Assessment Automation Framework: Web Applications

Gopal R. Choudhari, Prof Madhav V. Vaidya

Abstract 37  | PDF

Enhanced Page Rank Algorithm Using Time Factor

Monica Sehgal, Priya

Abstract 38  | PDF

Energy-Efficient Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks

Shini K, Shijukumar P S

Abstract 32  | PDF

A Multiple Queue Management Scheme to Optimize the Job Sequencing in Cloud Computing

Navdeep Singh, Ghanshyam Verma

Abstract 36  | PDF

Comparison of Various Queuing Techniques to Select Best Solution for Eradicating Congestion in Networks

Sahil Kochher, Gurnam Singh

Abstract 32  | PDF

FACIAL DETECTION SYSTEM (Using MATLAB)

Anjali Vats, R.K Bhatnagar, Shikha Vats, Antara Sarkar and Ankit

Abstract 58  | PDF

A Generosity Model to Study Data Center Performance and QoS in IaaS Cloud Computing Systems

D.S.Selvi, A.Balasubramani, P.Nirupama

Abstract 31  | PDF

Design and Development of Micro Vertical Axis Wind Turbine for Rural Application

Nilesh N Sorte, S M Shiekh

Abstract 49  | PDF

Computer Surveillance System

Ruchi Jain, Dr. Mohd Amjad

Abstract 27  | PDF

Target Recognition using Improved SIFT Algorithm

Darshana Vispute, Sachin Pable, Devidas Dighe

Abstract 29  | PDF

A New Color Image Compression Based on Fractal and Discrete Cosine Transform

K. Sharmila, K. Kuppusamy,

Abstract 36  | PDF

Healthcare Measurement Analysis Using Data mining Techniques

Dr.A.Shaik Abdul Khadir , S.Menaka

Abstract 39  | PDF

Human Iris Processing Using Matlab

Pooja chaturvedi, Upasana Mehta

Abstract 33  | PDF

Implementation of Database Synchronization Technique between Client and Server

Naveen Malhotra, Anjali Chaudhary

Abstract 46  | PDF

Controlling Luminare Illumination without Sensors

Sita Madhuri Bondila, B.Maheswara Rao

Abstract 28  | PDF

Survey: Digital Image Watermarking Technique

Aditya Bhagat, Shikha Singh

Abstract 27  | PDF

Content Based Video Retrieval by Genre Recognition Using Tree Pruning Technique

Amit Fegade, Vipul Dalal

Abstract 29  | PDF

Enhanced Authentication by Virtual World

Pradeep Yadav

Abstract 30  | PDF

Design and Implementation of a Backtracking Wormhole Switch using MARX units for Mesh Topology

Sharon A., Mrs.Yogeshwary B.H.

Abstract 30  | PDF

Feature Subset Selection Algorithm for Elevated Dimensional Data By using Fast Cluster

B.Swarna Kumari, M.Doorvasulu Naidu

Abstract 37  | PDF

Analysis of Reactive Attacks on Mobile Communication Protocol Network

Praveen Kumar Maurya, Akhilesh Panday

Abstract 27  | PDF

BMM Filtering Approach for Image Enhancement of Indian High Security Registration Number Plate

Reena Gupta, R. K. Somani, Manju Mandot

Abstract 28  | PDF

Universal Data Management through Web Base Configurable System

Vrishali Patil, Biradar M. S

Abstract 36  | PDF

HPBDMS: High Performance Big Data Management System on Massive & Complex Data

Manoj Kumar Singh, Dr. Parveen Kumar

Abstract 28  | PDF

Vehicle Theft Intimation Using GSM Modem

Minakshi Kumari, Prof. Manoj Singh

Abstract 30  | PDF

Dimension and Complexity Study for Alzheimer’s disease Feature Extraction

Mohamed M. Dessouky, Mohamed A. Elrashidy, Taha E. Taha, Hatem M. Abdelkader

Abstract 32  | PDF

How virtualisation helps smart phones in cloud computing: A survey

Joshi Rakhi, Prof. V.B. Maral

Abstract 27  | PDF

QArt - new Generation of Visual Appearing QR Code

Amit Kr Tiwari, Apurv Gupta

Abstract 35  | PDF

Structural properties of NSC and HSC beams bonded by GFRP wraps

Vivek Singh, Nandini, Sanjith J

Abstract 35  | PDF

Smart Travel Alarm – An Android app on Sencha2.2

Dr. Abhilasha Mishra, Ankit Jain, Neha Pamecha

Abstract 32  | PDF

An Advanced Approach for Ranking in Query Recommendation

Rinki Khanna, Asha Mishra

Abstract 28  | PDF

Enumeration Sort on OTIS k-Ary n-Cube Architecture

Abdul Hannan Akhtar, Keny T. Lucas

Abstract 28  | PDF

Efficient Load Balancing in Clusters in Hierarchical Structure

Viney Rana, Sunil Kumar Nandal

Abstract 28  | PDF

A Comparision on Text-Based and Graphical Browser

Shweta Bhatia, Sweety Patel

Abstract 78  | PDF

Protecting Sensitive Information in Relational Databases By Using Null Value Theory

Prashant Gumgaonkar, Dr.M.B.Chandak, Manisha Kamble

Abstract 28  | PDF

Context Aware Driver’s Behavior Detection System: A Survey

Priyanka B. Shinde, Vikram A. Mane

Abstract 33  | PDF

Mining Frequent Patterns from Uncertain Databases

A.Chandrakanth, R. Sateesh Kumar, Yella Anitha

Abstract 33  | PDF

Human Action Recognition Using Kinect

Niranjan Deokule, Geetanjali Kale

Abstract 31  | PDF

Complexity & Performance Analysis of Parallel Algorithms of Numerical Quadrature Formulas on Multi Core system Using Open MP

D.S. Ruhela, R.N.Jat

Abstract 36  | PDF

Sequential clustering algorithms for anonymizing social

P.MohanaLakshmi, P.Balaji, P.Nirupama

Abstract 36  | PDF

A Review on Evaluation Measures for Data Mining Tasks

B. Kiranmai, Dr. A. Damodaram

Abstract 41  | PDF

PCA Based Classification of Relational and Identical Features of Remote Sensing Images

Balaji. T, Sumathi. M

Abstract 31  | PDF

A Study of Quantum Cryptographic Architectures and It’s An Efficient Implementations

B.Sujatha, S.Nagaprasad, G.Srinivasa Rao

Abstract 39  | PDF

Reducing Blocking Probability of 3G Mobile Communication System Using Time Multiplexing NOVSF Codes

Dr. Mahesh Kumar, Mr. Pradeep Kumar

Abstract 28  | PDF

Role of Data Mining in the Manufacturing and Service Application

Rajesh Kumar

Abstract 33  | PDF

A Multichannel Multimode RF Transceiver With DSM

Rehna A S, Radha S, Hazeena Hussain

Abstract 140  | PDF

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

Pradeep M, Anil Kumar

Abstract 29  | PDF

Assessment of Sustainability Indicators for Off Grid Energy System

Rahul Lanjewar, Subroto Dutt

Abstract 28  | PDF

A New Improved and Secure Version of MD5

Sumita Tyagi, Seema Luthra

Abstract 48  | PDF

STUDY OF REACTIVE POWER COMPENSATION USING STATIC VAR COMPENSTOR

Prof. Ameenudin Ahmad, Mukesh Kumar Tanwer

Abstract 49  | PDF

A Review on Multiple Single Hop Clustering Based Data Transmission in Wireless Sensor Network

Pratistha Sharma, Mr. Abhishek Gupta

Abstract 29  | PDF

A Survey on Content Based Video Retrieval

Mr. Amit Fegade, Prof. Vipul Dalal

Abstract 36  | PDF

Wireless Equipment for Localization Using an Unmanned Mini-Helicopter-Based Airborne

N.Anusha, P. Ramesh Babu, P.Nirupama

Abstract 38  | PDF

WIMAX

Aarti Maheshwari

Abstract 27  | PDF

Chroma-Key Effect by Optimizing Coarse and Fine Filter

Pallavi P. Kotgire, Dr. S. K. Shah

Abstract 35  | PDF

A Mobile Approach Applied To Public Safety In Cities

S.P.Maniraj, R.Thamizhamuthu

Abstract 28  | PDF

Three-Port Full-Bridge Converters with Varied Voltage Input for Solar Power Systems

M.Priya, K. Babu

Abstract 39  | PDF

Digital Image Watermarking Technique

Aditya Bhagat, Shikha Singh

Abstract 36  | PDF

A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography

Megha Goel, Mr. M. Chaudhari

Abstract 35  | PDF

Single Image Haze Removal Algorithm Using Edge Detection

Ms. Ghorpade, Dr. Shah S. K P. V

Abstract 42  | PDF

Multilabel Associative Text Classification Using Summarization

Prof. P.A.Bailke, Mrs. Sonal Raghvendra Kulkarni, Dr.(Prof.)S.T.Patil

Abstract 54  | PDF

A Review of Voice over IP Mobile Telephony Using WIFI

Mr. Vishal Kasat , Mr. Rakesh Pandit , Mr. Sachin Patel

Abstract 38  | PDF

Comparative approach on load balancing algorithm by partitioning of public cloud

Anisaara Nadaph, Prof. Vikas Maral

Abstract 29  | PDF

Heuristic based optimization of users request in cloud computing

Loveneesh Singla, Sahil Vashist

Abstract 29  | PDF

An Overview of Image Steganography Techniques

Amritpal Singh, Satinder Jeet Singh

Abstract 35  | PDF

A Study On Diffie-Hellman Algorithm in Network Security

Vinothini, Saranya, Vasumathi

Abstract 39  | PDF

A Comparative Study of Classification of Image Fusion Techniques

Sukhpreet Singh, Rachna Rajput

Abstract 49  | PDF

Comparative Study of Automated Testing Tools: Selenium and Quick Test Professional

S.Rajeevan, B.Sathiyan

Abstract 30  | PDF

Network Security: Cloud Computing

Jaya Chaudhary

Abstract 34  | PDF

Triple System Security in Cloud Computing

Parul Mukhi, Bhawna Chauhan

Abstract 31  | PDF

A Comprehensive Comparison between WiMAX and Wi-Fi

Shally Sharma, Navdeep Singh Randhawa

Abstract 28  | PDF

Distribution of cloud resources dynamically by using virtualization

D.Sireesha, M.Chiranjeevi, P.Nirupama

Abstract 30  | PDF

Defense against Shoulder Surfing Attack for Recognition Based Graphical Password

Swati Kumari, Ruhi Kaur Oberoi

Abstract 41  | PDF

Routing and Sorting on OTIS-Hyper Hexa-Cell

Abdul Hannan Akhtar, Keny T. Lucas

Abstract 36  | PDF

Discover and Verifying Authentication of Nearest Nodes in Mobile Ad hoc Networks

N.R.Anitha, E. Murali

Abstract 29  | PDF