IJECS Journal
Sai Vidya Institute Of Technology
3793
Publications
1
Journals
0201–2025
Active
808,620
Total Views
189,896
Downloads
97
Citations
3793
Publications
Citations per article
Publications 3793
1.
Predicting Student Dropout Risk Through Machine Learning Analysis of Behavioral Patterns
2.
Optimizing Laser Heat Treatment to Enhance Phase Stability and Hardness in NiTi Alloys for Implants
3.
Frequency Reconfigurable Fractal Microstrip Filtering Antenna for Cognitive Radio Applications
4.
Performance Evaluation of Interleaved Division Multiple Access Using Low Density Parity Check Forward Error Correcting Codes for 5g Wireless System
5.
AI-Powered Real-Time Anomaly Detection in Edge Computing Systems for Smart Cities
6.
Artificial Intelligence for Fault Detection in Cloud-Optimized Data Engineering Systems
7.
Transforming Personal Finance Coaching through Artificial Intelligence
8.
Emergent Architectures in Edge Computing for Low-Latency Application
9.
Feature value quantization and reduction process for predicting heart attack possibility and the level of severity by a machine learning model
10.
Advanced Innovations in Electronic Control Units: Enhancing Performance and Reliability with AI
11.
Utilizing Neural Networks for Early Prediction of Pneumococcal Disease: A Case Study in Bonny Island, Nigeria
12.
Leveraging Oracle NetSuite to Enhance Supply Chain Optimization in Manufacturing
13.
Cloud Migration Strategies: Ensuring Seamless Integration and Scalability in Dynamic Business Environments
14.
Software Engineering Implementation Model on a Tool Rental System
15.
CRIME PREDICTION SYSTEM USING DEEP LEARNING AND CONVOLUTIONAL NEURAL NETWORK: A SYSTEMATIC REVIEW AND FUTURE ENHANCEMENT
16.
Security Challenges and Protocols in the Expanding Realm of IoT: A Comprehensive Survey
17.
Innovations in Electronic Control Units: Enhancing Performance and Reliability with AI (Revision-1)
18.
Quantum Cloud Computing: Transforming Cryptography, Machine Learning, and Drug Discovery
19.
Scalable AI Pipelines in Edge-Cloud Environments: Challenges and Solutions for Big Data Processing
20.
Harnessing AI for Autonomous Data Engineering: Streamlining Data Integration and ETL Processes
21.
Cybersecurity in the Age of Big Data: Implementing Robust Strategies for Organizational Protection
22.
Building Scalable Data Engineering Platforms to Enhance AI-Driven Business Intelligence
23.
Cloud-based Solutions for AI-Enhanced Data Governance and Assurance
24.
Stability analysis of first order homogeneous Sylvester system of Difference equations
25.
Solar Powered Soil And Weather Monitoring System Using Iot
26.
Multi-Agent Reinforcement Learning for Efficient Task Scheduling in Edge-Cloud Systems
27.
Advancing Digital Payment Systems: Combining AI, Big Data, and Biometric Authentication for Enhanced Security
28.
AI-Enhanced Information Security: Safeguarding Government and Healthcare PHI
29.
Transforming Cyber Defense: Anomaly Detection and Predictive Analytics for Automated Threat Response
30.
Smart Distributed Multi-Ledger Construction Algorithm for Internet of things (IoT)
31.
Region based Feature Fusion of Imperfect Face and Gait cues for human recognition using Median-LBPF and Median-LBPG based PCA followed by LDA
32.
Leveraging Data Engineering For Ai-Enabled Energy Systems: Advancing Smart Grid Technology
33.
AI-Driven Strategies for Ensuring Data Reliability in Multi-Cloud Ecosystems
34.
Kronecker Product of matrices and their applications to self-adjoint two-point boundary value problems associated with first order matrix differential systems
35.
Integrating Demand Forecasting with Inventory Management Models for Decision Support Systems
36.
Security Considerations in AI, Cloud Computing, and Edge Ecosystems
37.
Implementing an Structural Prototype of Emergency Services in Web – Application
38.
Optimizing AI Workflows: The Synergy of Cloud Computing and Edge Devices
39.
Three Point Boundary Value Problems Associated with First Order Fuzzy Difference Systems-Existence and Uniqueness via the Best Least Square Solution
40.
An Assessment of the Impact and Benefits of Total Productive Maintenance (TPM) On Manufacturing Profitability: A Case Study of a Food Processing Industry in Nigeria
41.
Ensuring Data Integrity and Confidentiality in Financial Transactions Using Aes-256-Gcm And Secure Transmission
42.
Comparitive Analysis and Findings on Dct & Lbg Compression Techniques
43.
Identical Twins Facial Recognition System Using Cloud
44.
Intercropping Using NRC Algorithm
45.
TOTP Based Authentication Using QR Code For Gateway Entry System
46.
Penetration Testing on Metasploitable 2
47.
Interoperability of Cloud Using Single API
48.
GPS Based City Wise Integration System for City Vendors
49.
The Future of Efficiency: Integrating Consumer Feedback Loops in Digital Platforms
50.
Enhancing Vehicle Lifecycle Management through Integrated Data Platforms and IoT Connectivity
51.
Cloud-Based Consulting Models: Transitioning Traditional Advisory Services to Scalable Digital Platforms
52.
Cloud Security Challenges in Modernizing Insurance Operations with Multi-Tenant Architectures
53.
Big Data Engineering for Real-Time Inventory Optimization in Wholesale Distribution Networks
54.
Intelligent Risk Management in Financial Services Using Cloud-Based Machine Learning Models
55.
Cloud-Centric Data Engineering: AI-Driven Mechanisms for Enhanced Data Quality Assurance
56.
Roadmap for Enterprise Information Management: Strategies and Approaches in 2019
57.
Credit Card Fraud Detection Using Hidden Markov Model
58.
Modification of KNN Algorithm
59.
The application of Expert System of Artificial Intelligence for advice in detection of disease in Health Care
60.
A new approach of ranking prevalent news topics from social media using unsupervised techniques
61.
Data Mining on 5G Technology IOT
62.
Extracting Business Rule from existing COBOL programs for Redevelopment
63.
Analytical Assessment of Poultry Feed Production in Animal Husbandry
64.
Analytical Assessment Of The Negative Impacts Of Marijuana Smoking On Human Population
65.
Design of a web – based online Contract Administrative System platform of an Engineering firm
66.
Impact of Accurate Demand Forecasting on Inventory Stock Levels and Supply Chain Optimization
67.
Survey of mobile ad hoc networks (manets)
68.
Electromagnetic Field and Total Loss Analysis of Transformers by Finite Element Method
69.
A New Method for Multi-hop Communication Over Bluetooth in Smartphones
70.
Level of Awareness about HIV Transmission among Married Men in Bangladesh
71.
Comparison of SPWM and SVPWM Based Closed Loop Speed Control of BLDC drive
72.
Distributed Approach to Cloud Oriented E-Marketplaces: a Constructive Review
73.
Exploring the Law of Supply and Demand in the Context of Oracle NetSuite ERP
74.
Location Aided Service Discovery with Optimal Service Rating Prediction in Location Based Services
75.
Review on RFID Technology and Applications
76.
Algorithms on Rough-Intuitionistic Fuzzy Classification with a Threshold and Implementations
77.
NTRU based Security in Cloud Computing
78.
A New Approach to Automatic Generation of All Graded Triangular and Quadrilateral Finite Element Mesh Over Polygonal Domains
79.
Multiple Attribute Authorities for Public Cloud Storge using a Robust Auditable Access Control
80.
Survey on On-Road Air Quality Analysis and Path Recommendation
81.
Review of Bandwidth Enhancement of a Microstrip patch antenna with a different shape for WLAN communication
82.
Surveillance Robot for Military Application
83.
Estimation of age groups using facial recognition features
84.
Identification and Detection of Missing RFID Tags using RUN Protocol
85.
Bot Net of Things – A Survey
86.
Efficient Anomaly Detection in Big Data Streams Using Deep Graph Neural Networks
87.
Wellness Program Counsel
88.
Blended Extensibility of Cyber Forensics
89.
Dynamics of the Ebrié Lagoon from 1986 to 2017 (Southern of Ivory Coast): contribution of Remote sensing and GIS
90.
Monitoring and Controlling of an Air Quality for an Individual
91.
Secure Software Rollback System
92.
Multimedia Learning Design for Ablution and Prayer (Case Studies at Pesantren Arafah Kota Sungai Penuh)
93.
IOTA-Next Generation Block chain
94.
Facial Recognition an Added Security Level To Mobiles And Laptops
95.
Survey on Design and Implementation of Indoor Environment Monitoring and control system
96.
High Gain and Reduced Switch Stress DC-DC Converter Topology for PV System
97.
Hand gesture based dumb and deaf communication using smart gloves
98.
Design Of Wireless Sensor Networks For IOT Application : A Challenges and survey
99.
Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security
100.
Design of Quasi-Cyclic Low Density Parity Check Decoder Using Optimized Min-Sum Algorithm
101.
Modeling and Simulation of 27- Level Hybrid H-Bridge Multilevel Inverter for PV System
102.
String Matching Algorithms
103.
Neural Network based Handwritten Character Recognition system
104.
A Big Data Based Edge Detection Method for Image Pattern Recognition - A Survey
105.
Accident Detection for Automobiles Switch and Buzzer
106.
Survey of new attack models on Cloud Infrastructure
107.
Survey of Routing Protocols under Realistic Mobility and Traffic
108.
Recommender Framework for Sentimental Analysis using l-injection
109.
Military Based Security System Using Raspberry Pi
110.
Survey on Cloud Based IP Traceback Authentication Framework
111.
Review on Logic Encryption Strategy Ensuring Key Interdependency
112.
Survey on Effect of Multimodal Interface on Senior Citizen
113.
A Text Recognizing Device For Visually Impaired
114.
Scope and Challenges of Internet of Things (IoT) in Kashmir
115.
Agriculture Robotics
116.
Two-Wheeler Safety System for Accident Prevention, Detection and Reporting
117.
Severity Analysis of Macular Edema using Random Tree Classifier
118.
Survey on Finding of Admissible Information and Influential Users
119.
Real Time DC Motor Speed/Position Control with Bluetooth Communication
120.
Feature Selection for Opinion Mining Using Shuffled Frog Leaping Algorithm
121.
A Performance Evaluation of Attribute Extraction Technique for the Analysis of Sentiment
122.
A Distinct Voice Descriptive Shopping Cart - Integrated with Gmap and Responsive Customer Care Service
123.
Reducing Fragmentation via Exploiting Backup History and Cache Knowledge Granting Security
124.
Prediction of Indian petroleum product prices by using Kalman Filter based Neural Networks
125.
An Android Mobile Application for Guide to Terrorism
126.
Performance Analysis of KNN on Different Types of Attributes
127.
Using Semi-Supervised Learning in Cellular Automata for Edge Detection of Image Segmentation
128.
Segmentation of Remotely Sensed Images using Unsupervised ‘Sampling-Resampling’ based on Hopfield Type Neural Network
129.
Attitude towards Computers among Primary School Teachers in Kenya: A Case of Siongiroi Divison, Bomet County
130.
Survey on Multi-Hop Communication To Enhance The Efficiency Of Sensor Node in WSN
131.
Color Attenuation Prior (CAP) for Single Image Dehazing
132.
A Fault Tolerant Scheme for Detecting Overflow in Residue Number Microprocessors
133.
Exploration of Green Composites of Oil Palm Frond for Low Strength-Moderate Flexure Building Applications
134.
Building Software Component Architecture Directly from User Requirements
135.
A Survey for Analyzing & Preventing of Gray-hole Attack Minimization for OLSR Based Network
136.
Design Technique of High-pass Filter using different window
137.
Internet of Things in Vehicle Safety – Obstacle Detection and Alert System
138.
Office Automation for Industrial Business (AUTO ME)
139.
CONDENZA:A System for Extracting Abstract from a Given Source Document
140.
Soft-Computing: A Fundamental Approach in Analyzing Big Data
141.
Dynamic Resource Provisioning in Cloud Environments Using Predictive Analytics
142.
Data Mining techniques for prediction of Type-2 Diabetes
143.
The Odd Generalized Exponential Type-I Generalised Half Logistic Distribution: Properties and Application
144.
A Constructive System Forgetting as part of Case-Based Reasoning
145.
Minimizing of current harmonics for electrical power system station by controlled current source
146.
Review on EM-CURE Algorithm for Detection DDOS Attack
147.
Review On: Detection of Spam Comments Using NLP Algorithm
148.
Fire Fighting Robot
149.
ProfsApp: Android App for Professional Networking and Resume Sharing
150.
Survey on String Transformation - A Query Based Approach
151.
Scalable and Efficient Data acquisition in Service Oriented Vehicular Adhoc Networks
152.
Efficient Publish/Subscribe System Using Identity Based Encryption
153.
Study of Software Quality and Risk Estimation and Quality Cost Analysis using empirical study
154.
Group Authentication Using Threshold Secret Sharing
155.
“Dynamic Soil Structure Interaction Analysis for Piled Raft Foundation”
156.
Implementation Of Clock Gating Logic By Matching Factored Forms
157.
A Controlled Approach for Multicast Routing Protocol Using Branching Router
158.
Information Retrieval
159.
Efficient Authentication Technique Based On Virtual Password
160.
A Study on Various Image Segmentation Techniques: Merits and Demerits
161.
“Study of Performance Enhancement and Optimizing Various Parameters of Lateral IMOS”
162.
DDR3 Based Lookup Circuit For High Performance Network Processing
163.
Text Watermarking Approaches for Copyright Protection
164.
Online Community of Open Code Development Project
165.
Experimental design of adaptive algorithms to reduce SER in M-ary QAM System
166.
M-Commerce: A Revolution in E-Business
167.
Downloading and performance analyzing of WMV and MPEG files in Cloud Computing.
168.
An High Equipped Power Constrained Algorithm For OLEDS Based On MSR
169.
An High Equipped Data Hiding Algorithm Based On Secret Fragment Visible Mosaic Images And Pixel Color Transformations For Secure Image Transmission
170.
A Novel Human Opinion Dynamics Based Optimization for Software Cost Estimation
171.
Breast Cancer Using KMSVM Techniques In Wisconsin Detect Prognostic Breast Cancer Data Sets
172.
Implementation of Systematic Error Correcting Codes for Matching Of Data Encoded
173.
Using Genetic Algorithm For Optimization Of Mobile Agent In Wireless Sensor Network: A Survey
174.
A Novel Approach for Enhancing Security of MANET Using Trust Based Method
175.
A Survey over Various Variants of RS and Similar Cryptography Techniques
176.
Comparative Analysis of Different Technique for Detection of Noise in Restored Image
177.
Effects On Human Cells Due To RF And Electromagnetic Field
178.
Model for User’s Trust in Cloud Service Providers in Cloud Environment
179.
Video Compression – from Fundamentals to H.264 and H.265 Standards
180.
Contrast Enhancement Detection on Digital Images - A Survey
181.
Anonymous Routing Protocols in MANETs - A Survey
182.
EBHEAL: Distributed and Localized Mechanism for Coverage Hole Detection and Healing
183.
Cost Effective Method for Detecting Clone Nodes in Wireless Sensor Network
184.
A Study on Weibull Distribution for Estimating the Reliability
185.
Challenges of Big Data: Current Analysis
186.
An Efficient Distributed Congestion Control Protocol with Stability and Fairness
187.
Dealing With Concept Drifts In Process Mining Using Event Logs
188.
Implementation Of User Define Kernel For Non-Linear Data Classification In Support Vector Machine
189.
A Survey on Techniques of Critical Infrastructure Monitoring
190.
Attenuation of Geopathic Stress by Using NAAVRAJ Attenuation Technique
191.
A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network
192.
Energy Efficient Load Balanced Multipath Routing in MANET
193.
Review on Security Issues of SaaS Clouds
194.
Evaluation of Energy Efficient Low Power Listening MAC Protocols in WSN
195.
Optimized Analytical Study to Show the Impact of CFO on the Performance of LTE Uplink
196.
An Efficient FPGA Implementation Of Multifunction Residue Architectures
197.
Design and FPGA-Based Implementation of A High Performance 64-Bit DSP Processor
198.
Implementation of FPGA Architecture for OFDM-SDR with an optimized Direct Digital Frequency Synthesizer
199.
Programmable Direct Memory Access Controller Design Using Advanced High Performance Bus Protocol
200.
Comparative Study of Various Scheduling Algorithms in Cloud Computing
201.
Efficient Design Of Binary Adders Using Cellular Automata
202.
Establishing a Multi-Application ADHOC Network for Smart city Design
203.
Enhancing Security of MANETs by Implementing Elliptical Curve based Threshold Cryptography
204.
A Review on image compression technique
205.
A Fast and Efficient RBTRC-MAC Protocol for Event-Driven Wireless Sensor Networks
206.
Ant Colony Optimization Algorithm for Software Project Scheduling Using Critical Chain Project Management
207.
Social Group-Based Routing in Delay Tolerant Networks using Fuzzy Logic
208.
Comparitive Analysis of Watermarking in Digital Images Using 3-Level DWT & LBP
209.
Probabilistic Determination of Class for an Unbalanced Dataset
210.
Improving Classification Accuracy Using Weighted Multiple Regression
211.
An effective Research Paper Recommender System based on Subspace Clustering
212.
Investigation of The Effect Of Water-Cement Ratio On The Modulus Of Rupture Of Concrete
213.
Review of Evolutionary Optimization Algorithms for Test Case Minimization
214.
Smart Home System Control Using GSM
215.
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
216.
Offline Signature Identification Using Adaptive Window Position Technique
217.
Assessing Version Consistency by Identifying systematic Code Changes during Runtime
218.
Detection and Prevention of Black Hole & Gray hole attack in MANET using Digital signature Techniques
219.
A Review on Annotation Process
220.
Optimization Of Cmos Circuits By Using Quaternary Logic LUT
221.
Design Of Embedded Virtual System By Using Human Machine Interaction (HMI)
222.
Cognitive Radios Spectrum Sensing Using Cyclic Detection by Wavelength Assignment
223.
Survey of Routing Protocols in MANET
224.
Bank Cheque Identification and Classification using ANN
225.
Enhance Distribution of Load in Cloud
226.
An Efficient Denial-of-Service Attack Detection System Based on Multivariate Correlation Analysis
227.
Information Security with the help of MLMS and HLSB
228.
WSN Based Cluster Head Fault Tolerance Mechanism
229.
Design And Implementation Of Accelerometer Based Wireless Gesture Controlled Rover
230.
Recognition Of Indian Currency Note Using Grid Technique
231.
Low Power Modeling Of Topologically Compressed Static FlipFlop.
232.
32nm Based High-Speed Low-Power Calibrated Flash ADC comparator with improved ENOB
233.
A Survey of Military Application of Wireless Sensor Networks For Soldiers
234.
Classification of underwater objects using acoustic techniques
235.
Optimized Distributed Association Mining (ODAM) Algorithm for detecting Web Robots
236.
To Study the Nonlinear Effects Related To PAPR and PAS in Wireless System
237.
On Improving Side channel Attack defence mechanism using ECPM technique under Elliptic curve Cryptography
238.
Interactive Image Segmentation Using Combined MRF and Ant Colony Optimization
239.
Multidomain Optimised Hidden Web Crawler
240.
Survey on security and privacy issues of Wireless Sensor Network
241.
Duplicate Detection In Hierarchical XML Multimedia Data Using Improved Multidup Method
242.
Implementation of ERP module for the key processes of hull production in shipbuilding industry
243.
Running Costminimization Of An Electric Power Sector
244.
Pitch, Formant Frequencies, Intensities as Speech Cue to preceived age
245.
Acoustic Analysis of voice samples to differentiate Healthy and Asthmatic persons
246.
Simulation Of High Voltage Gain Boost Converter For Battery Charging With PV System In A Single Stage Conversion
247.
Abnormality Detection in Kidney Ultrasound Imaging
248.
Design of Query Recommendation System using Clustering & Rank Updater
249.
Cloud-Computing: A milestone in Information Technology
250.
Reactive Power Compensation In Distribution Systems Using SAPF
251.
Social Engineering Attacks Detection Techniques: Survey Study
252.
Towards an Inclusive India with eAccessibility
253.
A New Resource Allocation Policy in Virtualized Environment for IAAS Clouds
254.
A Partial Replacement of Fine Aggregate by Copper Slag In Concrete
255.
Monitoring Lan User Wirelessly By Android Mobile Based On Client/Server Mode."
256.
Energy Efficient Communication for WSNs using Grey-Wolf Optimization Algorithm
257.
An Efficient Usage of APIs in Software Code Reuse
258.
A Review of Weather Forecasting Using Data Mining Techniques
259.
A Study of Digital Image Segmentation Techniques
260.
The Probabilistic Approach for Identifying Hotel Appraise Passing Through Intrinsic & Extrinsic Domain Relevance
261.
Design an Innovative Smart Control Scheme to Hybridize Conventional and Expert Controllers
262.
Cooling Techniques for a Spindle of Machine Tool
263.
Multi-threaded QoS Architecture for Multimedia Services over Software Defined Networks
264.
Analysis of Disease using Retinal Blood Vessels Detection
265.
New Soft Computing Techniques in the Software Testing
266.
An Improved Novel Energy Efficient Method for Resource Allocation in Clouds Based on Ant Theory
267.
Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH
268.
A proposal for efficient 8 two way traffic signal system for pedestrian and ambulance along with violation detection
269.
Fiber Optic Network Applications
270.
Review of Various Image Restoration and Denoising Methods Underwater Images
271.
Segmentation of Degraded Text using Dynamic Profile Projection in Handwritten Gurmukhi Script
272.
Restoration-Multiple Removing of Noise under Water Images using Multidirectional Filtering Techniques
273.
APT Attacks: How Big Data Fights Back
274.
Compute the Best Route from All Intersection using Cloud Based Services
275.
Automated Scrolling Using Speech Recognition
276.
A Survey On Biometrics Authentication For Online Transactions
277.
A Survey on Driver Fatigue-Drowsiness Detection System
278.
Analysis of Effect of Flooding on Performance of Ad hoc Network
279.
Overview of MIMO Technology in LTE, LTE-A & LTE-A-Pro
280.
Performance Analysis of Control Techniques for Roll Movement of Aircraft
281.
Design and Modeling of Controllers for Aircraft Pitch Contol Movement
282.
Breakthroughs and issues in the implementation of Six Sense Technology: A review
283.
Optimization of Wireless Sensor Networks using PPSS Algorithm
284.
Analysis Of Cloud Based Multitenant Load Scaling
285.
Number Plate Recognition and Document Verification using Feature Extraction OCR Algorithm
286.
A DWT-SVD Hybrid Approach for Robust Digital Image Watermarking
287.
Economic Potential of Cultural Tourism In Terms of Tourism Marketing
288.
Health Centre Monitoring System
289.
A 3D Molecular design and Management using Data Glove Interaction Technique
290.
Exposure Of Sql Injection In Packet Stream
291.
Image Encryption using RSA Algorithm with Biometric Recognition
292.
An Energy Efficient Multicast Routing Protocol for MANET
293.
Content Based Image Retrieval Using Multifeaturefusion Extraction
294.
Automobile Monitoring Tool
295.
Predictive Analysis in E-commerce Domain and Cloud Platforms – A Survey
296.
Trend of Students towards Higher Education in Science & Technology: Study on Central Universities in India
297.
Spam Zombie Detection and Blocking Mechanism
298.
A New Improve Intrusion Prevention System Security for Wireless LAN A Review
299.
Precision Agriculture Using Wireless Sensor Network System: Opportunities and Challenges
300.
Temperature Controller for Continuous Stirred Tank Reactor using Adaptive PSO Based PID Controller
301.
Smart System To Avoid Bridge Collapses
302.
Diagnosing Venomous Facebook Applications
303.
An Energy Saving Multipath AODV Routing Protocol In MANET
304.
Common Fixed Point Theorem for Compatible Maps of Type (β)
305.
Uploading Images on Content Sharing Sites with privacy Policy Inference
306.
An Incorporation of Artificial Intelligence Capabilities in Cloud Computing
307.
The Challenges and Opportunities of E-Commerce in India: Future Prospective
308.
Review on Intrusion Detection and Prevention System
309.
Review on K-Mode Clustering
310.
Task Scheduling Using Meta-Heuristic Optimization Techniques in Cloud Environment
311.
Efficient Exploration of Algorithms in Scholarly Documents Using Big Data Analytics
312.
A Data Owner Controlled Model for Co tenant Covert Channel Protection
313.
Image Enhancement Using Novel Spatial & Frequency Techniques
314.
Yawning detection and Head Nodding Detecion Analysis of Student Engagement during online Tutorials
315.
Auto Contour Initialization of Breast Masses in Contrast Enhanced Breast CT
316.
Texture Classification with Motif Shape Patterns on Local Directional Pattern
317.
Performance of Multi Server Validation and Key Association with User Protection in Network Security
318.
Time Sequence Scheme for Ideal Transmit In Remote Systems
319.
Providing Privateness via Transaction Splitting Using PFP Growth Algorithm
320.
Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks
321.
Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data Extraction
322.
A Secure Pin Authentication Method against Shoulder Surfing Attacks
323.
Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project
324.
A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data
325.
Impact of Security Risk on Cloud Computing Adoption
326.
Various audio Steganography techniques for audio signals
327.
Mobile Application Testing: Tools & Challenges
328.
Fruit Recognition and its Calorie Measurement: An Image Processing Approach
329.
Preventing Social Sites from Publishing Malicious Content
330.
Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing
331.
Analysis of Bigdata Using Visualizing Technique
332.
Sentiment Analysis Through Text Mining-A Review
333.
Fixed points of -generalized contraction selfmapings in D*-metric space
334.
Blood group Detection and RBC, WBC Counting: An Image Processing Approach
335.
Fusion Layer Topological Space Query Indexing For Uncertain Data Mining
336.
A Review on Prediction of User Action Interpretation for Online Content Optimization
337.
Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network
338.
An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET
339.
A Concise Study about Data Mining Methods, Tools and Its Trendy Applications
340.
Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time
341.
A Novel Metrics Based Technique for Code Clone Detection
342.
Mobile Security Awareness Efforts On User Behavior
343.
Risk Perception And Behavior Using In Mobile Security
344.
Time and Cost Effective Web Testing on AWS
345.
Phishing Detection in Websites Using Neural Networks and Firefly
346.
Impact of Using E-learning Skills by Academic Staff Members in their Teaching at Some Saudi Universities
347.
Common Fixed Point Theorem Satisfying Implicit Relation On Menger Space.
348.
Big Data Processing Using Hadoop in Retail Domain G
349.
Enhanced MODLEACH Using Effective Energy Utilization Technique For Wireless Sensor Network
350.
Implementation of Fault Tolerant Filter Based On Error Correction Codes for Digital Applications
351.
Comparative Analysis DWT and DFT Using Various Modulation Approaches to Improve BER Performance
352.
Trust Certificate Based Cluster Head Misbehaviour Detection And Isolation In Mobile Ad Hoc Networks
353.
A Voltage Controlled PV Inverter for Certs Microgrid Applications
354.
Investigation on Microstructure and Mechanical Properties of Aluminum reinforced with MWCNT and Nano-SiC
355.
Ensuring Security to Data on Cloud using Cryptography
356.
Advanced Audio Compression For Lossless Audio Coding Using Ieee 1857.2
357.
A Review on Removal of Salt And Pepper Noise From Digital Images
358.
Cluster Based Data Dissemination Protocol In VANET
359.
An Aggressive Scheme for Identifying Replicas in Limited Time
360.
Arduino based real time driver drowsiness detection and mobile alert system using bluetooth
361.
Privacy Secured and Share with the Destination in Cloud
362.
Shortest Path Detection among the Clustering Nodes
363.
Design of Advance and Robust Vehicle Security System with Accident Monitoring
364.
Compatibility of Border Meeting of Two Layers Protocol (BGP Version 4) With IPV6
365.
The Comparative Study on Public Key Algorithm using RSA AND OAEP
366.
Prototype for MEMS Based Assistance for Physically Disable People
367.
Function of big-data over data streams
368.
Laws of Duality of soft mathematical morphology
369.
A Voltage Controlled PV Inverter for a Certs Microgrid
370.
A Survey on Mobile Wireless Network
371.
Risk Analysis and Estimation of Schedule Using Monte Carlo Simulation
372.
Secure Transmission of Data Using DNA Technology
373.
A Simple Clutter Canceling Circuit and Background Noise Algorithm Based On Microwave Life Detection System
374.
Optimized PAPR Reduction Approach by Partial Approximate Gradient Constellation Algorithm for Better Efficiency
375.
Medical Image Registration Based on Feed-forward Neural Networks and Directional Discrete Cosine Transform
376.
Analysis of Implementation of FACTS Devices in Power Factor Improvement
377.
Taxonomy of Cryptography Techniques for Network Security
378.
Numerical Solution of Fourth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions
379.
Automation in Information Technology: Implication on Job Market In India
380.
Simulation Of IOT Based Domestic Devices By Saving Their State Of Remote Database Server
381.
SECURED HANDHELD MOBILE DEVICE COMMUNICATION USING BARCODE MODULATION BASED ON OFDM
382.
Wireless Communication Based High Speed Spy Bot
383.
MM-Wave Planner Antenna For Wireless Communication
384.
Scheduling Algorithms in Big Data: A Survey
385.
Multi-Dimensional Student's Result Analytical Processing For Tertiary Institutions
386.
Selection and Maintenance of Materialized View Using Genetic Algorithm
387.
Proposed Novel Hybrid Approach For Improvement in Bug Severity prediction
388.
A Survey on Energy Efficient, Secure Routing Protocols for Wireless Sensor Networks
389.
Collocation Method for Fifth Order Boundary Value Problems by Using Quintic B-splines
390.
Collocation Method for Seventh Order Boundary Value Problems by Using Sextic B-splines
391.
Performance comparison of Energy Efficient Routing algorithm prolonging network lifetime in wireless Ad Hoc network
392.
Survey and Comparison of Classification Algorithm for Medical Image
393.
Adaptive control for MIMO nonlinear systems based on PID neural networks
394.
Shotcreting in Tunnels
395.
Automatic Generation of Coverage tests for System Programs
396.
A Review on Plant Leaf Classification and Segmentation
397.
Protection of Inter-Continental Ballistic Missile (ICBM) from Anti-Ballistic Missile (ABM) by using Anti-Anti-Ballistic Missile (AABM)
398.
Simulation of Black Hole Attack in Manet
399.
Analysis of Web base applications testing using mutant
400.
An Empirical Evaluation of Mutation Testing for Improving The Test Quality of Web Application’s Security
401.
Implementation Of Encryption And Watermarking Algorithm For Remote Sensing Image.
402.
Performance Enhancement System for the Cloud with Multi Factor Resource Allocation Technique
403.
Reducing the Cold-Start Problem by Explicit Information with Mathematical Set Theory in Recommendation Systems
404.
Analysis of Machine Learning Techniques & Emergence of Intrusion Detection System
405.
Performance Analysis of ANODR and ZRP protocol against Wormhole attack in Wireless Sensor Network
406.
Efficient Methods to Secure Web Application From Major Threats
407.
Effect of PWM Vibrations on Microfluidic Flow Across a Cu-Mica Microchannel
408.
Iterative Success Variety Method for Joined words in Tamil Language
409.
Automatic Query Formulation for Extracting Hidden Web: A Review
410.
A Review of HVDC Circuit Breaker
411.
Survey :Various Prediction Algorithms for Chemical Bond Formation on GPU
412.
An Optimized and Secure Association Rule Mining Algorithm in Parallel and Distributed Environment
413.
Real Time Analysis using Hadoop
414.
Best Customer Services among the E-Commerce Websites – A Predictive Analysis
415.
Detection of Outlier in Uncategorical Dataset using Hybrid Algorithm
416.
Effect on Information Retrieval Using One and Two Point Crossover
417.
ReCoCa Scheme For Wireless Multimedia Sensor Networks
418.
Authorization in Cloud Computing
419.
Noise Estimation for Images using Eigen Values and Frobenius norm
420.
Image Steganography with the password authentication using CHAP protocol
421.
Pose Invarient Face Recognition System
422.
Varying Number of Selfish Nodes based Simulation of AODV Routing Protocol in MANET using Reputation Based Scheme.
423.
Comparative study of various classification algorithms combined with K means algorithm for Leaf Identification
424.
Effect of Transformer Connection on Protection of Feeder Connected With Distributed Generators
425.
Advance Entity Liking with a Knowledge Base
426.
A Trust Model Based Routing Protocol For MANET
427.
An Automated Medical Support System based on Medical Palmistry and Nail Color Analysis
428.
Database Management System And Information Retrival
429.
Survey on Pre-Processing Techniques for Text Mining
430.
Duality Of Iterative Soft Dilation In Multi Scale Soft Morphological Environment
431.
Exploiting a Low Power Self Timed Ternary CAM Architecture Using RWOS Mechanism
432.
Captcha as Graphical Password
433.
FPGA Implementation Of Invisible Watermarking Algorithm Using LSB And DWT Technique
434.
Wind - An Efficient, Safe and Economic Global Energy Resource with Zero Effect
435.
Ethical Hacking
436.
A Comparative Analysis of Detecting the Moving Object with Principal Component Pursuit for Surveillance Application
437.
Encrypted Data Transmission for secured SMS over Web via EMail Platform
438.
A New Approach for Distributed Data Mining based on SOA
439.
Image Retrieval using Markovian Semantic indexing (MSI)
440.
Web Database Annotation for Fast and Accurate Retrieval
441.
Mobile Virtual Laboratory in Nigeria
442.
Comparative Analysis Between Prophet, Spray &Wait And Spray & Focus Protocol Of Wireless Opportunistic Networks
443.
Development of WiFi-Bluetooth Communication Protocol
444.
Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data
445.
Effective Website Accessibility Through Optimization Using Knapsack Programming Model
446.
Ultrasonic Stick for Blind
447.
ASP.Net Technology Based Training And Placement Management System
448.
Impact and General Awareness of Cloud Computing In Public Domain
449.
Real Time Location Tracking Application based on Location Alarm
450.
Organizational Mail Tracking With Security Using 3d Password And Database Encryption
451.
Object Oriented Software Testing
452.
Transformation Of Analysis Model To Business Process Model
453.
Smart Home Energy Management System
454.
The Design of Vegetable Oil Biodiesel Reactor
455.
A Survey of Various Method to improve the throughput of Zigbee Cluster Tree Networ
456.
Implementation of Saurp for Mobile Network
457.
User Access Control for Online Social Networks
458.
A Comparative Study of Cloud based ERP systems with Traditional ERP and Analysis of Cloud ERP implementation
459.
Sensitive Data Storage in Wireless Devices Using AES Algorithm
460.
Advanced Technique for Removal Of Salt & Pepper Noise In Images
461.
Power Efficient, High Performance SRAM array in 90nm CMOS Process
462.
Leakage Power Reduction by Using Sleep Methods
463.
Consumer Interest Tracking and Data Acquisition System
464.
Performance Evaluation of Dynamic Fuzzy Voter Used In Safety Critical Systems
465.
Literature Survey on Energy Consumption Control for Wireless Mobile Ad-hoc Network
466.
Trust Aware AODV
467.
Mining Association Rules for Web Crawling using Genetic Algorithm
468.
Review On Secure and Distributed Reprogramming Protocol
469.
Multiple Routing Configurations For Fast Ip Network Recovery
470.
Advance Reservations And Scheduling For Bulk Transfers In Research Networks
471.
An Allocation of Exploited Resources for Potent Parallel Data Processing In Cloud
472.
Numerical Integration Over Polygonal Domains using Convex Quadrangulation and Gauss Legendre Quadrature Rules
473.
Introduction on Data Warehouse with OLTP and OLAP
474.
Internet Routing With Lightweight Route Attestation
475.
Novel Approach for Secured Data Delivery in Congested Wireless Sensor Network
476.
STATISTICS OF CYBER CRIME IN INDIA: AN OVERVIEW
477.
Prevention of Credit Card Fraudulence in Point-of-Sale Terminus
478.
Comparative Analysis of CMOS Transmission Gate Based Adders
479.
BRUTE FORCE ATTACK – BLOCKING TECHNIQUE
480.
OVERVIEW ON PASSENGERS OVERLOAD CONTROL IN PUBLIC BUSES CASE STUDY: TANZANIA
481.
A Novel Image Steganography (NIS) Technique
482.
Mosacing Using Laplacian of Gaussion Method
483.
Modeling and Predicting Total Ozone Column and Rainfall in Kodaikanal, Tamilnadu By Arima ProcessAmongst all weather happenings, ozone plays the very important role in human life as well as climate change. The understanding of Total Ozone Column (TOC) and
484.
Literature Survey of WATM
485.
Iris Recognition using Discrete Sub-band Transform for Biometric Identification
486.
Ipv6 Security: Issue Of Anonymity
487.
Association Rule Mining on Type 2 Diabetes using FP-growth association rule
488.
Design And Implementation Of A Robot ARM Control System
489.
Security in Privacy Preserving Data Mining
490.
Implementation of VRouter in KVM virtualized host
491.
Unwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper)
492.
Literature Survey on Maharashtra State Transport Buses and RFID
493.
Flight Delay Prediction System Using Weighted Multiple Linear Regression
494.
Software Application for Design of Structural Element Using Visual Basic Coding
495.
Enhancement of the IEEE 802.15.4 Cluster-Tree Network with Energy Efficient Cluster Scheduling
496.
E-Field Uniformity Test Volume In Gtem Cell Based On Labview
497.
Analysis of Characteristics of 2G/3G Cellular Networks in rural and urban areas of Delhi
498.
Achieving Multi Layered security, Flexibility, Scalability, Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)
499.
Secured Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
500.
Face Recognition using Eigenfaces and Distance Classifiers
501.
Experimental Investigations on Flexural Strength and Durability Properties of Mortars Containing Cement Replacement Materials
502.
Study On High Strength Self Compacting Concrete Beams With Steel & Recron Fiber
503.
In-Place Transformation Engine for Analytics
504.
Novel Approach for Localizing Jammers in wireless network
505.
A Review of Ad Hoc Routing Protocols
506.
Automated Emergency System in Ambulance to Control Traffic Signals using IoT
507.
Hybrid solar cooker
508.
Color Edge Detection Based On The Fusion Of Hue Component And Principal Component Analysis
509.
Performance evaluation of Energy-aware routing algorithm for wireless sensor networks.
510.
CPS-PWM Based Cascaded H-Bridge MLI with Voltage Balancing Capability
511.
Extracting Structue Data From UnStructured Data Through HiveQL
512.
Twitter Sentiment Analysis with Emoticons
513.
Life Cycle Cost Analysis Of Buildings
514.
Mechanism for secure Big data stored within cloud storage by using cloud computing (Secure cloud storage)
515.
A Review on Media Access Control Spoofing
516.
Survey Of Electronic Countermeasures Attacks And Techniques In Wireless Detector Networks
517.
Data Analysis Using Document Clustering
518.
Authentication at Single-Point-of-Access in Cloud Environments
519.
Design and Analysis of Square and Circular type fractal Shapes Microstrip Patch Antenna
520.
Maintainability assurance in Software Product Lines An Activity- Based Model
521.
Design and Implementation of AMBA-AHB&APB bridge memory controller by VHDL
522.
A Comparative Analysis of Traditional RDBMS with MapReduce and Hive for E-Governance system
523.
RTOS Based Fault Diagnosis And Efficient Data Transfer On Priority Basis Using Can
524.
Comparative evaluation of Google Glass, Vuzix M100 & Epson Moverio BT-200
525.
Performance Analysis of anEnhanced AODV Routing Protocol
526.
A Scalable Two-Phase Bottom-Up Specialization Prospective For Data Anonymization Using Map Reduce On Cloud
527.
Extracting and Mining Of Data From PDF and WEB
528.
PAPR Reduction Of OFDM Using An Exponential Companding Technique
529.
Motion Reconstruction Of 3-D Objects From 2-D Correspondences
530.
Encryption Based Access Control Model In Cloud : A Survey
531.
Designing Of Novel Low Power Signed And Unsigned Multiplier Using 180nm CMOS Technology In CADENCE
532.
Data Transfer Through Power Line
533.
Security measures for CDMA Mobile Phone Cloning
534.
Hop Voting scheme with Voting tag Verification Scheme for wireless Networks
535.
Speech Enhancement Using Beamforming
536.
Differences and problems task scheduling algorithm -A Survey
537.
Category, Strategy and Validation of Software Change Impact Analysis
538.
Comparative Seismic Analysis Of An Irregular Building With A Shear Wall And Frame Tube System Of Various Sizes
539.
Detection of Nutrients and chemicals in food products using sensors in smart phones
540.
Wireless Surveillance Robot Using Wireless Network
541.
Towards an understanding of Li-Fi: Next generation Visible Light Communication Technology
542.
Application of Multi-agent system in College Searching for Fresher’s Recruitment System
543.
A Review on APCC based Fractal Image Compression
544.
Visual Secrete Sharing by Diverse Image Media
545.
Role of Software Quality Assurance in Software Development
546.
A Classification of various unicast and multicast Routing protocols in MANET
547.
Leveraging AI to Enhance Data Reliability in Hybrid Cloud Computing Architecture
548.
Automatic Detection and Classification of Cervical Cancer in Pap Smear Images using ETCM & CFE methods based Texture features and Various Classification Techniques
549.
Texture Classification Based On Integrated Method
550.
Extract User Tweet Post Location & Detect Social and Disastrous event using NER & POS Tags
551.
Warning Time Analysis for Emergency Response in Sumbawanga City for the Repeat of Magnitude 7.2 Earthquakes of 1919 Using Proposed Community Earthquake Early Warning System
552.
Multilevel Security for Cloud Storage using Encryption Algorithms
553.
Hierarchical Similarity Of Context Instances
554.
Design and analysis of front axle for heavy commercial vehicle
555.
Dual-Broadband Planar Antenna For 2G/3G/LTE Base Stations
556.
Comparative Performance Analysis of Removal of Impulse Noise using Different Methods
557.
Binarization And Post Processing of Binarized Document Images for Background Text Removal
558.
Mobile Enabled Streaming System
559.
A Review on Atmospheric Parameter Monitoring System for SMART CITIES using Internet
560.
Intelligent Query Search
561.
A Personalized Ontology Model For Web Mining Using Instance Matching
562.
A Survey on Low Cost Solar Powered WDA
563.
Automated Identification of Diabetic Retinopathy Stages in Digital Fundus Image using CDR and Micro aneurysms
564.
Multimedia Data Hiding using Fourier series on an Experimental Basis
565.
A Password authentication in social Networking sites
566.
A NEW f-IDPS APPROACH FOR THE INTRUSION DETECTION IN HIGH-SPEED NETWORKS
567.
Database Recovery Techniques: A Review
568.
Review on Various Data Mining Approaches on Smart Phone
569.
OPPORTUNITIES AND CHALLENGES FOR CLOUD COMPUTING
570.
Intelligent Network
571.
Two Phase Secured Multiparty Sum Computation Protocol (2PSMC) for Privacy preserving data mining
572.
An Integrated Framework for Efficient Implementation Of Enterprise Systems
573.
Implementation of Hadoop Pseudo-distributed Cluster on Android using ‘chroot’
574.
Design and implementation of efficient 32-bit floating point multiplier using Verilog
575.
Securing Computer Device Using Bluetooth technology and OneTime Password
576.
Web Database Annotation for Fast and Accurate Retrieval
577.
EFFECTIVE FIBER OPTIC COMMUNICATION BY OPTICAL PHASE CONJUGATION FOR A MULTICHANNEL SYSTEM
578.
Mobile Controlled Robots
579.
Clustered Key Management Scheme to Maximize Life of Wireless Sensor Networks
580.
Laser Ignition System for Internal Combustion Engine
581.
Signal Processing in Neural Network using VLSI Implementation
582.
Fashion Accessories using Virtual Mirror
583.
Development & Calibration of CAN for Designing Vehicle Electronic Architecture
584.
Implementation of Desktop Control and Information Retrieval from the Internet Using Augmented Reality
585.
Estimation of the Image Quality under Different Distortions
586.
A Proposed Automatic Answering System for Natural Language Questions
587.
SECURE COMBINATORIAL APPROACH IN WSN USING PAIRWISE AND TRIPLE KEY DISTRIBUTION
588.
Low cost Intelligent Parking management and Guidance System
589.
Mining Educational Data To Analyze The Performance Of Infrastructure Facilities Of Gujarat State
590.
TRANSFORMING BUSINESS WITH MOBILE ENTERPRISE APPS
591.
Modified SLM Based Peak To Average Power Ratio Reduction In MIMO-OFDM Systems
592.
An Overview and Evolution of the Intelligent Transportation System as VANETs
593.
REVIEW OF INSIDIOUS ATTACKS AND ITS PROTECTION MECHANISMS FOR WIRELESS SENSOR NETWORKS
594.
DTMF Based Mobile Operated Surveillance Vehicle
595.
A study on least square fit for outlier detection
596.
HBase Performance Testing On Multi-node Cluster Setup
597.
A Review on Digital Watermarking Techniques, Applications and Attacks
598.
Securing Privacy over Encrypted Cloud Data Using Multiple Keywords Rank Based Search
599.
Handwritten Devnagari Character Recognition System
600.
DESIGN AND IMPLEMENTATION OF A PIPELINED BCD MULTIPLIER USING KARATSUBA –OFMAN’S ALGORITHM
601.
Design of Rectangular Microstrip Patch Antenna for Wi-Fi
602.
Experimental Implementation Of Image Restoration Schema Using Inverse Filter Processing Techniques
603.
IDENTIFICATION OF OUTLIERS BY COOK’S DISTANCE IN AGRICULTURE DATASETS
604.
Improving Accessing Efficiency of Cloud Storage Using DeDuplication and Feedback Schemes
605.
“FINGERPRINT MATCHING USING NEURAL NETWORK TRAINING”
606.
Retinal Images Classification using Graph-Based approach for Disease Identification
607.
COVERAGE DRIVEN VERIFICATION IP AMBA AXI4-LITE
608.
Home Automation System Using Android and Internet
609.
Brain Computer Interface applications and classification techniques
610.
A System for Serving Disability using Facial Expression Recognition
611.
SEGMENTATION OF ACL IN MR IMAGES
612.
Explicit Parallel Instruction Computing
613.
DATA STORAGE IN CLOUD COMPUTING
614.
Availability and Reliability analysis of a system having main unit and its sub unit & two associate units
615.
A COMPARATIVE STUDY ON OPEN SOURCE CLOUD COMPUTING FRAMEWORK
616.
Design of Tunable Method for PID Controller for Higher Order System
617.
A ROBUST METHOD FOR CLASSIFICATION OF MYOCARDIAL INFARCTION SIGNALS FROM VIDEO IMAGES USING FAST ICA AND ANFIS
618.
A NOVEL METHOD TO DETECT BONE CANCER USING IMAGE FUSION AND EDGE DETECTIO
619.
Effect of Curing Methods on the Compressive Strength of Concrete
620.
COMPARISON ANALYSIS OF VARIOUS TRANSITION MECHANISMS FROM IPV4 TO IPV6
621.
Web Personalization Based on Enhanced Web Access Pattern using Sequential Pattern Mining
622.
IMPLEMENTATION OF AN ENERGY-EFFICIENT ALGORITHM TO IMPROVE THE ENERGY OF LOW ENERGY NODES IN WSN
623.
A Review on RSA Encryption Algorithm
624.
Improving The Performance of Grid Network using Energy Optimal Routing with Square Matrix in
625.
Improved Map Reduce K Mean Clustering Algorithm for Hadoop Architecture
626.
IMPLEMENTATION OF REPUTATION INDEX PROTOCOL (RIP) FOR SECURE COMMUNICATION IN MANE
627.
LTE Network Structure, QoS Considerations, Bearers and Interfaces
628.
INDUSTRIAL TEMPERATURE MONITORING AND CONTROL SYSTEM THROUGH ETHERNET LAN
629.
Recognition of Fake Currency Based on Security Thread Feature of Currency
630.
SIMULATION BASED STUDY OF TWO REACTIVE ROUTING PROTOCOLS
631.
OVERVIEW ON APPROCHES OF IMAGE SEGMENTATION WITH IT’S ALGORITHM AND APPLICATIONS
632.
Approach on Face Recognition & Detection Techniques
633.
THE NEW AND CLEAR APPROACH TO BLUEJACKIN
634.
IMPLEMENTATION OF SCFT ALGORITHM TO DETECT AND SOLVE GREEDY NODES IN WIRELESS SENSOR NETWORKS
635.
CROSS PLATFORM APPLICATION DEVELOPMENT WITH COMPATIBLE GUI SOLUTION
636.
Design of a Smart Low Cost Mini Ups for PC’s
637.
INTEGRATED DAYLIGHT HARVESTING AND OCCUPANCY DETECTION USING DIGITAL IMAGING
638.
Introducing automated system for Lung Cancer Detection using Evolutionary Approach
639.
EVEN GRACEFUL LABELING OF SOME NEW GRAPHS
640.
E-Clinic
641.
SECURITY MODEL FOR COMPUTER NETWORK BASED ON CLUSTER COMPUTING
642.
Spoofing Attack Detection And Localization In Wireless Networks
643.
Generation of Question Paper using Credit System
644.
SNR ESTIMATION FOR HIGH LEVEL MODULATION SCHEME IN OFDM SYSTEM
645.
Automatic Mathematical and Chronological Prediction in Smartphone Keyboard
646.
Trust Based Cloud Service Provider Selection
647.
IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES
648.
NEUROCOMPUTATIONAL MODEL USING LEABRA FRAMEWORK FOR INFORMATION STORAGE
649.
A REVIEW ON KNOWLEDGE-BASED EXPERT SYSTEM
650.
Block Based Compressed Sensing Algorithm for Medical Image Compression
651.
Design of Temperature Control Coolant
652.
COMPARISON OF DIFFERENT UML TOOL: - TOOL APPROACH
653.
Survey Paper on Recommendation System using Data Mining Techniques
654.
Design Of A Model Predictive Control For A Multivariable Process
655.
EXPERT SYSTEM TO DETECT SKIN DISEASE
656.
Power Quality Improvement in Modified Solid State Transformer System Using Statcom
657.
Improvement of HADOOP Ecosystem and Their Pros and Cons in Big Data
658.
Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic
659.
Web Harvesting: A Technique for Fast Retrieval of Information from Web
660.
DESIGN A MODULE OF 256 × 16 NON-VOLATILE RAM FOR VECTORIZATION WITH CHIP AREA & WIRE LENGTH MINIMIZATION
661.
IMPLEMENTATION OF TRAFFIC MONITORING SYSTEM USING AOMDV TECHNIQUE
662.
Implementation and Analysis of Multi-Processing Processor Using Data Encryption Standard on FPGA
663.
AN OPTIMIZED APPROACH FOR RECORD DEDUPLICATION USING MBAT ALGORITHM Subi S, Thangam P
664.
Optimized cloud migration using reliabilty framework
665.
A General Framework for Multi-level security to restrict unauthorized users in Sulaymaniyah E-Court Database
666.
Free Vibration Response Of Double-Bay Multi-Storey Building Frames With Stiffened Joints
667.
FPGA Implementation of AHB to APB Protocol
668.
A Survey on Partial Reconfiguration Techniques
669.
Improved Tumor Detection Using Modified Hough Mertic Trasformation
670.
: VIGART APPLICATION TO ASSIST ASD CHILDREN
671.
AUTOMATED ASSESSMENT SYSTEM FOR SOURCE CODE
672.
OUTLIER TEST FOR CATEGORICAL DATA BY USING HYPERGRAPH DEVIATION COMPARISON
673.
RAKE MANAGEMENT SYSTEM (RMS): OPERATIONAL ASPECT OF FREIGHT OPERATIONS INFORMATION SYSTEM (FOIS) FOR INDIAN RAILWAYS (IR)
674.
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
675.
: HIGH SPEED MULTICAST DISTRIBUTION SCHEME FOR MOBILE ADHOC NETWORKS USING DATA MINING TECHNIQUE
676.
MEDICAL IMAGE COMPRESSION USING INTEGER MULTI WAVELETS TRANSFORM FOR TELEMEDICINE APPLICATIONS
677.
EMPIRICAL ANALYSIS OF CORRELATION BETWEEN C&K METRICS AND TESTABILITY
678.
Automatic Railway Gate Control System
679.
Implementation of Robust Barcode Modulation Mechanism for Large Data Trans Reception Using Android Device
680.
GALSR: Geographical Based Adaptive Lifetime Secure Routing Protocol For Wireless Sensor Network
681.
Nearest Neighbor Browsing and Search with Keywords in Spatial Databases
682.
Applications of Pattern Recognition Algorithm in Health and Medicine: A Review
683.
Design and Implementation Of NAODV ETCP To Handle Jelly Fish Attack
684.
Reliable and Adaptive Steganalysis Method for Binary Image Using CRMST Algorithm
685.
OTP system with third party trusted authority as a mediator
686.
A Survey On Unicast Routing Protocols For VANET
687.
A Review on an Efficient Monitoring Of Substations Using Microcontroller Based Monitoring System
688.
Outlier Detection in High Dimension Data Based On Multimodality And Neighbourhood Size Using KNN Method
689.
LIVE: Lightweight Integrity Verification for Named Data Networking
690.
Attack Graph-Based Approach For Enterprise Networks Security Analysis
691.
Comparism Of Thermal And Microwave Methods In Structural Modification Of Lumefantrine
692.
Comparision of two different andriod versions i.e Lollipop and Marshmallow, and also development of campsys mobile Andriod Application - An Overview
693.
Bitcoin: First Decentralized Payment System
694.
Equal And Unequal Distribution of Nodes based Simulation of Routing Protocols in MANET
695.
An Analytic Survey On Current Clustering Technique of data Categorizing and Retrieving
696.
My Privacy My Decision: Control Communication media on Online Social Networks
697.
Wireless Sensing System Security Concerns - A Review
698.
Optimum Route Selection & Modified Network Approach to optimize Power aware Routing in MANET
699.
Study of vulnerability taxonomies to provide a Novel approach for vulnerability categorization
700.
Weather prediction using CPT+ algorithm
701.
New Approach in Biometrics to Combat the Automated Teller Machine Frauds: Facial Recognition
702.
A Survey on Captcha Categories
703.
Improved PSO algorithm approach in Gray scale image multi-level thresholding
704.
Students Record System using Radio Frequency Technique
705.
A Review of techniques for Automatic detection and diagnose of mango pathologies
706.
Cloud Computing: “Secured Service Provider for data mining”
707.
Digital Remembrance Based User Validation for Internet of Things [IoT]
708.
Smart pi cam based Internet of things for motion detection using Raspberry pi
709.
Modeling The Performance Enablers Of Public Sector Banks Using Cfa And Conjoint Analysis.
710.
Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network
711.
Routing Taxonomies for Network Aware Territory of Vehicles: A Review
712.
Enhancing Web Navigation Appropriateness by Correlating Actual and Predictable Practice
713.
Authentication System for Any Touch Devices Using DWT
714.
Beacon for Proximity Target Marketing
715.
A Survey of approaches for mining large data sets
716.
Health Care Virtual Environment System Reinforced by Hadoop and Cloud
717.
Review on Secure Routing in Wireless Adhoc Networks
718.
Adaption of Cloud Computing On Smart Phones To Enable Efficient Multimedia Applications
719.
A survey on Energy Monitoring System
720.
Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data
721.
A Phishing obligation analysis on web based secure authentication
722.
“Camera Based Product Information Reading For Blind People”
723.
Traffic Classification By Using: TIE (Traffic Identification Engine)
724.
Cellular Phone Has Opened a New Horizon of Socio- Economic Development: A Case Study Of Banglades
725.
Extract Structured Data from Heterogeneous Web Pages
726.
Self Powered Sensor Based Environmental Bridge Condition Monitoring System Using Gsm
727.
Multimedia Cloud Computing an Emerging Technology: Surve
728.
Ann Based Head Movement Detection with Eye Tracking
729.
Load-Balancing Based On Geographic Routing Around Connectivity Holes In Wireless Sensor Network
730.
Preference Aware Automatic Search Using Multiple Taxonomies
731.
A Review on Removal of Rain Streaks in an Image by using Image Decomposition
732.
Robust Document Image Binarization Technique for Degraded Images
733.
A Survey of ICI Self-Cancellation Techniques for OFDM Systems
734.
Head gesture recognition for hands-free control of robot movements
735.
A Survey On Channel Estimation In Mimo-Ofdm Systems
736.
Piston connecting rod code detection and matching system using image processing and OCR
737.
DS-CDMA system with linear multiuser detection using kasami codes
738.
A Machine Learning Techinque For Generative Classifier Under Attack
739.
Textual Graphical Password Scheme against Shoulder Surfing Attack
740.
Various Techniques of Fractal Image Compression - A Review
741.
Intrusion Detection and Response Using Game Strategy And RRE Engine In Network Security
742.
A Mutation Testing Analysis And Regression Testing
743.
A Survey: Wireless Lan Security Protocols
744.
Automated Measuring Tool for Handwriting Examination
745.
A Review on Channel Allocation Schemes in Mobile Ad Hoc Networks
746.
VHDL Implementation Using Clustring Algorithm
747.
An High Eqipped SC FDMA Communication Model Based On Advanced Wavelet Mechanism For Wireless Systems
748.
Design of A Controlled Multi-Logic Function Generator and ALU by Using COG Reversible Logic Gates
749.
A Study on Securing Privacy In Personalized Web Search
750.
Reversible Data Hiding Technique with Improved Reversibility in Encrypted Images
751.
Data Hiding Technique Using Audio Watermarking
752.
Senior Citizen Independent Living
753.
Memory Management In C++ And Java
754.
Retinal Hemorrhage Detection Using Feature Classification
755.
A Robust Technique for Detection of Lung Nodules with Virtual Dual Energy Technology and Feed Forward Neural Network
756.
An Implementation of Hand Gesture Recognition System for Controlling a Car Buggy
757.
Cost-Efficiency And Privacy Preserving With Eirq Methods In Commercial Cloud
758.
Location Based Services: Architecture and Issues
759.
Interactive File Sharing Web Application for Organization
760.
Performance Analysis of Cement manufacturing Industry
761.
Resist Adverseries With Broader Background Knowledge In Personalized Web Search.
762.
A Novel Secure Multiparty Algorithms in Horizontally Distributed Database for Fast Distributed Database
763.
A Probabilistic Approach for Anomaly Detection In Social Streams
764.
Security Suite
765.
A Proficient Extreme Learning Machine Approach For Tracking And Estimating Human Poses.
766.
Bi-orthogonal wavelet transform based video watermarking
767.
Estimating The Age Of Human Face In Image Processing Using Matlab
768.
Survey Paper on Automatic Speaker Recognition Systems
769.
PC Controlled Car for Terrain Detection
770.
RFID Based Intelligent Trolley System using Zigbee
771.
Design & Simulation of MHD Antenna for Wireless Applications
772.
Complete Library Control Robot
773.
Sign Language Recognition for Deaf and Dumb People
774.
Twice Precaution during Transmission of Hidden Data
775.
Performance Analysis of Shunt Active Power Filter Using Pi Controller
776.
Inferring User Search Goals with feedback Sessions using Fuzzy KMeans Algorithm
777.
Analysing Uncertain Data by Building Decision Tree
778.
Information System Based On College Campus
779.
Comparison between PMC AND AMC
780.
Improving efficiency of hybrid Intrusion Detection System using kmeans and Naïve Bayes
781.
Improving Return loss of Microstrip Patch antenna using AMC
782.
Deploying Relay Nodes with Controllable Mobility to Conserve Power in MANETs
783.
An Improved Image Watermarking Using LTVC Scheme
784.
Single Sign on Mechanism
785.
Sketch Based Photographs Retrieval System
786.
Survey on Threat management system
787.
Finger Print Based Door Locking System
788.
Advanced Security System Using Finger Vein Recognition
789.
A Social Chat Network Site With User Anonymity Consideration
790.
Analysis of Use Cases and Use Case Estimation
791.
Vulnerable Attitude of Road user using Fuzzy Matrix Technique
792.
Cloud Based Real Time Anti Vehicle Theft By Using LP Recognition And OCR Recognition
793.
Face Captcha
794.
Responsive Web Design
795.
Comparative Analysis Of Methods For Semi- Supervised Dimensionality Reduction
796.
Android Parental Tracking
797.
EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors
798.
SOFT COMPUTING METHODOLOGIES IN BIOINFORMATICS AND ITS ADVANCE TOWARDS BIOLOGICAL DNA
799.
Clothing Color and Pattern Recognition for Impaired people
800.
Achieving Data Confidentiality And Access Control Through Ciphertext Property Based on Symmetric Encryption with Undeniable Assignment
801.
“A Review Based On Pic Microcontroller For Fastest Finger First”
802.
FINGERPRINT, RETINA AND FACIAL RECOGNITION BASED MULTIMODAL SYSTEMS
803.
A literature survey on Big Data Analytics in Service Industry
804.
ICT and IT: Challenges and Opportunities
805.
RFID-Based Tracking System
806.
A New Technique for Low Power Double Tail Comparator Using Parallel Mechanism
807.
An Efficient System for Scalable Data Sharing In Cloud Storage
808.
Improving Network Performance Using An Intrusion Detection & Adaptive Response Approach For Manets
809.
Visual Cryptography Scheme for Colored Image using XOR with Random Key Generation
810.
A Review: Intelligent Pick and Place System by Using Practical Robotic Minimal Grasper
811.
Efficient Mining Algorithm For Reducing Number Of Itemsets Using Chud
812.
A Survey Report on Risk-aware Role-based Access Control Model
813.
Energy Efficient Sink Relocation Scheme (Ee-Srs) For Enhanced Network Lifetime in Wireless Sensor Networks
814.
A newer method and its comparison with other available methods in wireless sensor network
815.
A Survey on Moving Object Detection and Tracking Techniques
816.
Data DeDuplication Using Optimized Fingerprint Lookup Method for Cloud Storage Using Android
817.
TECHNIQUES OF DEFEATING STEGANOGRAPHY: A STATE OF ART SURVEY
818.
Minutiae Matching Algorithm For Partial Fingerprints
819.
HyPACK: Hybrid Prediction-Based Cloud Bandwidth and Cost Reduction System
820.
C.A.D. & F.E.M. ANALYSIS OF DISC BRAKE SYSTEM
821.
Comparison between Various Approaches for Customer Relationship Management in Data Mining
822.
Improving the Hybrid Ad hoc Network Routing Performance Using RMECR Algorithm and Lightweight protocol
823.
CONTENT-BASED IMAGE RETRIEVAL VIA VECTOR QUANTIZATION
824.
Practically observation of standard Minute Value of T-shirt
825.
A Survey on Various Developments In The Field Of Computer Science
826.
Bluetooth Chat Application: Bluez
827.
Multi-Document Summarization Using TF-IDF Algorithm.
828.
Role of Robot Scientists and Artificial Intelligence in Drug discovery
829.
Static analysis of Orifice plate for Different Geometries
830.
Intelligent Access Smart Grid System,Metering and Monitoring
831.
A GDI Approach to Various Combinational Logic Circuits in CMOS Nano Technology
832.
Provable Data Possession Securing The From Untrusted Server
833.
Image processing and Biometric Approach for Licence and Vehicle documents verification
834.
NUMERICAL INTEGRATION OVER A LINEAR CONVEX POLYHEDRON USING AN ALL HEXAHEDRAL DISCRETISATION AND GAUSS LEGENDRE FORMULAS
835.
Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network
836.
Energy Efficient Wireless Performance Monitoring System For Solar Panel
837.
Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach
838.
Virtual Marketing
839.
Revamp the Power Consumption in MANET by designing EPARDA routing Protocol
840.
Effect Of Routing Packet Overheads On Routing Protocols
841.
PID/IPD Controller Design For Electro Mechanical Systems – A Study With PSO, BFO And FA
842.
Cervical Implementation of Image Restoration Schema Using Digital Image Processing Techniques
843.
Proposed New Architecture Of Overlay Network Of Distributed Hash Table
844.
Development of Mathematical Model to Predict the Removal Rate of Zinc in Zinc Barrel Plating wash water using Full Factorial Design
845.
Comparative Study of Forward and Backward Chaining in Artificial Intelligence
846.
APPLICATION OF GENETIC ALGORITHM FOR SWITCH LEVEL FAULT FINDING IN INTEGRATED CIRCUITS
847.
Modelling & Performing Analysis of an Alamouti Transmit Diversity System by using JTRAS Scheme & with Gold Code in different regions using MIMO System
848.
Android Server For Wlan Control And Management
849.
Big Data and Current Cloud Computing Issues and Challenges
850.
CASE STUDY ON TRANSFORMER TRIPPING AFTER COMMISSIONING & OIL SPALSH OUT
851.
Robotics In Agriculture
852.
Role of K-Means Algorithm in Disease Prediction
853.
A Wireless Sensor Network for Agricultural Applications Using ARM7
854.
Location Tracking And Detection Of Human Using Mobile Robot And Wireless Sensor Networks
855.
Design Of Pid Controller With Compensator Using Direct Synthesis Method For Unstable System
856.
Providing Confidential Policy Conjecture To Images Uploaded By Users On Social Sites
857.
An Optimal Cache Partition Based Algorithm For Content Distribution And Replication
858.
Performance Appraisal Of KDD Technique In Shopping Complex Dataset
859.
New Ieee Standard For Advanced Audio Coding In Lossless Audio Compression : A Literature Review
860.
A Survey on Antidiscrimination using Direct and Indirect Methods in Data Mining
861.
A Survey on Improving Classification Performance Using Data Pre processing And Machine Learning Methods on NSL-KDD Data
862.
Modelling Of Wind Diesel Hybrid System for Reverse Power Management Using Bess.
863.
Network & Terminal based Wireless Positioning Techniques
864.
Preventing Gray Hole Attack using AOTMDV Routing protocol in MANE
865.
Online Fir Registration and Sos System
866.
Big Data and Large Scale Methods In Cloud Computing
867.
Fragmentation Study for Deduplication in cache Backup Storage
868.
Risk predictor & Health-care information manager using Android and Cloud
869.
Automated Toll Collection System Using NFC And Theft Vehicle Detection
870.
Supporting Search-As-You-Type among Multiple Tables using Multi-Join and Top-k Query Model
871.
TOXICITY STUDY OF KAJJALI WITH SPECIAL REFERENCE TO DIFFERENT SAMPLES OF PARADA
872.
ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE NETWORK:
873.
A SURVEY ON SECURITY IN MOBILE ADHOC NETWOR
874.
Performance Analysis of RSA Algorithm Using Elliptic Curve Cryptography, Diffie Hellman And OAEP
875.
PERFORMANCE EVALUATION OF LOCALIZATION TECHNIQUE IN WIRELESS SENSOR NETWORK
876.
SIMULATION AND EXPERIMENTAL STUDIES ON HYDRODYNAMICS CHARACTERISTICS OF COCURRENT THREE PHASE FLUIDISATION USING FUZZY LOGIC
877.
Fuzzy Based Efficient Routing Protocol For Route Recovery In MANET
878.
ASPECTS OF SECURITY IN CLOUD COMPUTING
879.
: A STUDY OF FUNDAMENTALS AND PRINCIPLES OF SOFTWARE ENGINEERING PROCESS
880.
SECURITY AND KEY DISTRIBUTION IN BINDING OF IP TO DNS
881.
PHOTO SHARING WEBSITES USING PERSONALIZED AND NON-PERSONALIZED IMAGE SEARCH
882.
PID-Controllers Tuning Optimization with PSO Algorithm for Nonlinear Gantry Crane System
883.
Epileptic Seizure Prediction: An overview
884.
Denoising Of ECG Signal Using Multi-Resolution Techniques Based On Stationary Wavelet Transformation With Different Coefficients
885.
PROTECTED CASH WITHDRAWAL IN ATM USING MOBILE PHONE
886.
Android Based Patient Critical Health Monitoring and Notification System
887.
WEB MINING AND ITS CATEGORIES – A SURVEY
888.
A Review Based On Plc For Mixing And Filling Of Liquids”
889.
ARTIFICIAL VISION SYSTEM FOR AUTOMATIC NUMBER PLATE IDENTIFICATION
890.
A SURVEY OF BROADCASTING PROTOCOLS IN WIRELESS NETWORK
891.
Low Frequency Current Ripple Reduction Technique With Active Control In A Power System With Inverter Load
892.
A Review paper on compressive modulation in digital communication using OFDM
893.
Dynamic Routing With Security Considerations
894.
A Pattern Recognition System To Improve Quality Assurance For Manufacturing Industries Using Image Processing
895.
Anomaly Detection: An Application of Visual Surveillance
896.
Critical Analysis of Various Parallel Scheduling Algorithms
897.
Tracking Algorithm for Augmented Reality System
898.
Wavelet-Based Image Compression and its Application
899.
Image Segmentation Using Graph Partition Methods
900.
Constraint Satisfaction Algorithm to Improve Energy Loss & Ber for Indoor Mobile Network
901.
Performance Analysis of Mesh, Torus and Folded Torus under Broadcasting, using Distance Vector Algorithm
902.
Soft Computing Techniques ABC, IABC and SFL Optimization Algorithms for 15 Unit Thermal Generating Systems
903.
IMAGE RECONSTRUCTION OF WATER WAVES USING BISPECTRUM TECHNIQUES
904.
Design and implementation of High performance Bus Architecture using FPGA
905.
An Aperture Coupled Feed Approach to Gain and Bandwidth Enhancement of Microstrip Patch Array Antennas
906.
Improving Decision Support Systems with Data mining, Data warehousing, OLAP and OLTP Technologies
907.
Achieving Energy Efficiency by the Enhancement Of Mac Protocol To Prevent Nav Attack
908.
Analysis on Emotional Intelligence Among Telecom Employees
909.
A Smart Energy Efficient Scheme for Dynamic Clustering in Wireless Sensor Network using Neural Networks
910.
Smart Energy Meter Using Android Application And Gsm Network
911.
To Enhance the Biometric Image using Binarization
912.
“The Pertinence of Intelligent System in the field of Digital Image Forensics”
913.
File Encryption System Based on Symmetric Key Cryptography
914.
Analysis of Load Flow Study Using Pso And Compensate The System Using Facts Device
915.
A Review on Multiband OFDM Based UWB System
916.
Analysis of Security threats in ad hoc cloud
917.
Image Segmentation Using Cellular Automata: A Technical Survey
918.
Development of Image Processing Algorithm for Array processor
919.
Comparison: Wireshark on different parameters
920.
Wireless Cellular Communications Security Issues and Types of Attacks with WAP
921.
SPIHT ALGORITHM BASED COLOR IMAGE COMPRESSION
922.
Advance Dynamic Malware Analysis Using Api Hooking
923.
Issues and Challenges in Simulation and Modeling
924.
USE OF ARTIFICIAL NEURAL NETWORK TO IDENTIFY CARCINOMA CELL
925.
Determining K-most demanding products using data mining technique
926.
A Hybrid Watermarking Scheme For Medical Images
927.
Advanced Secure Voting System with IoT
928.
Rushing attack prevention algorithm for manet using random route selection to make DSR and AODV more efficient
929.
System Automation And Production Monitoring In Industries Using Arduino With IoT Technology
930.
Novel Technique to Detect and Isolate Black hole Attack in MANET
931.
A Hybrid Watermarking Scheme For Medical Images
932.
Near Field Communication for Transferring Files between Pair of Supported Devices
933.
Multipurpose Card Using Rfid Technology
934.
Implementation of Unsupervised Clustering Using Geometric Approach
935.
Sanative Chatbot For Health Seekers
936.
Islanding Detection Analysis in Wind Turbine Units Based On Voltage, Frequency and Negative Sequence Components
937.
Patient Parameter Monitoring System using Raspberry Pi
938.
GOOD PAYLOAD DEFORMATION FOR REVERSIBLE DATA HIDING IN MILITARY AND MEDICAL APPLCATION
939.
A Review of Damaged Manuscripts Using Binarization Techniques.
940.
Hybrid Dwt-Dct Coding Techniques for Medical Images
941.
Variants Of Resource Allocation Problem
942.
An overview of Mobile Ad Hoc Networks for the Proactive, Reactive and Hybrid Routing Protocol
943.
Design and simulation of dual stacked microstrip patch antenna used in wireless communication
944.
Fog Computing: Securing the cloud and preventing insider attacks in the cloud.
945.
Integration of 2 D Secure Barcode in Identity Cards:A New Approach
946.
Consortium based Biosurfactant development for degradation and emulsification of oils and Petroleum Hydrocarbons
947.
RELIABILITY APPROACH OF DATA GATHERING PROTOCOL FOR MOBILE USERS IN WIRELESS SENSOR NETWORK
948.
Multi Criteria Recommendation System for Material Management
949.
Image compression using Thresholding Techniques
950.
DATA MINING TECHNIQUES FOR SOFTWARE EFFORT ESTIMATION TO IMPROVE COST EFFICIENCY
951.
Study of Perfect Difference Network: Review
952.
Bluetooth Technology
953.
OVERVIEW OF TEXT SUMMARIZATION EXTRACTIVE TECHNIQUES
954.
Microscopic Image Analysis for Plant Tissue Using Image Processing Technique
955.
Role of Fault Current Limiter in Power System Network
956.
Enhancement of Blur Detection for Digital Images using Circular Averaging Filter
957.
Quantification Analysis of Chaotic Fractal Dimensions
958.
A Genetic Algorithm Approach for Clustering
959.
A Review on Tcp Westwood Protocol For Simulated And Internet Environment
960.
Distributed Segment Tree Using MapReduce
961.
Role Based Query Modification for Relational Database systems
962.
Design and fabrication of low cost intelligent wheelchair
963.
Copy Detection of Multimedia Contents in Cloud
964.
Minutiae Based Fingerprint Recogntion
965.
Analysis of Performance for Data Center under for Private Cloud through Cloud Computing
966.
Performance Analysis of Routing Protocols in Vehicular Ad Hoc Networks for Cbr Applications Over Udp Connections
967.
Protection of Data Base Security via Collaborative Inference Detection
968.
RIAs AT ODDs WITH SEOs?
969.
Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique
970.
Carry Bypass & Carry Select Adder Using Reversible Logic Gates
971.
Intelligent Course Timetable Scheduling Using Memetics
972.
Web Search Result Clustering using IFCWR Algorithm
973.
Software Quality Prediction: A Review and Current Trends
974.
Medium Valuation Method for Massive MIMO Using Gaussian Mixture Bayesian Learning
975.
Inferring User Search Goals with feedback Sessions using Fuzzy K-Means Algorithm
976.
Heterogeneous Mobility Management and Vision for Wireless Networks
977.
Advance Encryption Standard implementation
978.
Overview of Classification and Risk Evaluation in Multi-dimensional Datasets
979.
Proposed Algorithm for HCRUsing K-Means Clustering Algorithm
980.
Mobile Application Development Strategies
981.
Power performance analysis on secure and efficient authentication protcols in mobile devices
982.
Implementation of Neural Network based Hand Gesture Recognition System
983.
Sixth Sense Technology
984.
Security Ecosystem in IoT & Cloud
985.
Comparative Analysis of Various Fingerprint Image Enhancement Algorithms
986.
Layer Based Secure Data Aggregation for Wireless Sensor Network
987.
Insights to Sensor Technology and it’s Applications
988.
Secure Educational Network
989.
Enhancement of lifetime using different Protocols in wireless sensor network
990.
A review: Issues and Challenges in Big Data from Analytic and Storage perspectives
991.
Optimization of Group Elevator Scheduling
992.
A survey on Filtering Annoying Posts From OSN User Walls
993.
Importance of String Matching in Real World Problems
994.
Health Monitoring System for Induction Motors
995.
DNA Samples Processing Using Dry Block Heating System
996.
Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud
997.
A Secure Environment for Unsafe Component Loading
998.
A Combine Approach of Compression And Encryption For Image Transmission
999.
Tamper Detection in Database using Forensic Analysis
1000.
Extraction of Html Documents From Heterogeneous WebPages Using Cluster Techniques
1001.
Analysis of Three Level Diode Clamped Multilevel Fed Induction Motor Drive
1002.
An Efficient Framework for Name Disambiguition In Digital Library
1003.
E-Learning Training of Teachers
1004.
Modified Random Walk Algorithm to Improve the Efficiency of Word Sense Disambiguation (WSD)
1005.
Effective Resource Management Based on Flexible Workload Technique in Cloud
1006.
Design of Ultra High Band Pass Filter By Using Di-Electric Resonator
1007.
Comparative Evaluation of Wireless Ad-Hoc Networks Routing Approach
1008.
Tracking System for Wireless Devices in Wifi Environment
1009.
Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites
1010.
Friction Stir Welding – Process Parameters and its Variables: A Review
1011.
n Artificial Neural Network Based Vessel Detection On The Optic Disc Using Retinal Photograph
1012.
“Review On- Efficient Data Transfer For Mobile Devices By Using Ad-Hoc Network”
1013.
Assessment of the Effects of Surface And Subsurface Moisture On ADO-AFAO Road Pavement Failure In Ekiti-State, Nigeria
1014.
Secure Migration of Various Database over A Cross Platform Environment
1015.
Real-Time Carpooling Application for Android Platform
1016.
“Formation of E-Commerce Recommendation (E-Shop)”
1017.
“Tourist App”- to find a locations
1018.
Dynamic parallel K-Means Algorithm Based On Dunn’s Index Method
1019.
Improved Security Architecture For Up Keeping Routing Services on Ad Hoc Networks
1020.
"Identifying high throughput path in Wireless Mesh Networks with bandwidth Guarantees
1021.
Graph Clustering In Social Networks Based On Attribute Similarities
1022.
An R-Tree Node Splitting Algorithm Using MBR Partition for Spatial Query
1023.
Analysis and comparison of various edge detection technique
1024.
Designing of Mobile Robot with Mecanum Wheel
1025.
Design of 2.5 GHz Phase locked loop using 32nm CMOS technology.
1026.
Water Quality Prediction Using Data Mining techniques: A Survey
1027.
Multiuser Short Message Service Based Wireless Electronic Notice Board
1028.
IMAGE STREAM TRANSFER USING REAL TIME PROTOCOL
1029.
Vibration Analysis of Smart Beam
1030.
ENHANCING SECURITY IN PALM PRINT RECOGNITION SYSTEMS USING ENCRYPTION ALGORITHMS
1031.
Mobile Wireless Networks :Challenges
1032.
Generation Of A Scenic Image By Tacking Multiple Images
1033.
Study of Smartphone Attacks and Defenses
1034.
Data dissemination Issue and protocol in WSN a survey
1035.
4G, the fourth generation of mobile Communication
1036.
Review paper on securing the PKI using the ECDS
1037.
A Novel Cloud Computing Architecture Supporting E-Governance
1038.
Design and Analysis of Integrated Electronic Ballast for HID Lamps Featuring HPF
1039.
Performance Analysis of Content Based Image Retrivel
1040.
Multi Benfit’s Through Compression For Large Data Stored In Cloud
1041.
Novel Cache Replacement Algorithm
1042.
A survey on phishing detection and prevention technique
1043.
Implementation of Secret Delegation for Secured Attribute Based Access Control In Cloud Computing
1044.
A SURVEY ON WEB IMAGE SEARCH USING RERANKING
1045.
Survey Paper on Training of Cellular Automata for image
1046.
Vehicle Health Monitoring System In A Developing Nation.
1047.
Solving Multistage Graph using ACS Algorithm
1048.
A STUDY ON SOFTWARE RELIABILITY, RELIABILITY TESTING AND GOMPERTZ MODEL
1049.
TRANSFERRING VOICE OVER LOCAL AREA NETWORK THROUGH INTERNET PROTOCOL-PRIVATE BRANCH EXCHANGE
1050.
Increasing Performance of Cooperative Opportunistic Routing in MANET using Spatial Reuse
1051.
Cross lingual information retrieval using tf-idf and similarity measures
1052.
An Adaptive Architecture for Autonomic Orchestration of Web Services
1053.
Use of Image Processing Techniques for Making Run out Decision in Cricket
1054.
Rainfall Prediction Using Data Mining techniques: A Survey
1055.
Subscriber Theoretic Pricing for Video Streaming In Mobile Networks
1056.
Product Review By Sentiment Analysis
1057.
A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols
1058.
Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks
1059.
IMPROVED EXPECTATION MAXIMIZATION CLUSTERING ALGORITHM
1060.
PROTECTED DESIGN FOR TOPOLOGY TO MANAGE AND AUTHORIZE MOBILE AD HOC NETWORK
1061.
Development of an e-Diary Service for Deployment on the UFH network
1062.
Intelligent technique for mining customers review by the help of opinion mining
1063.
A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions
1064.
Trust-based security for Ad-Hoc network
1065.
Performance analysis of different Image Enhancement Algorithms”
1066.
Implementation of Cooperative Caching in Social Wireless Networks
1067.
Automated-Combined valve oscillation testing machine for 4&6 Cylinders
1068.
Algorithmic Reduction and Optimization of Logic Circuit in area and Power Tradeoffs’ with the Help of BDD
1069.
MR Image Reconstruction with L1norm Minimization and Total Variation Denoising
1070.
Re-ranking of Images using Semantic Signatures with Duplicate Images Removal & K-means clustering
1071.
An NLP Method for Discrimination Prevention Using both Direct and Indirect Method in Data Mining”
1072.
An Overview of Reusability of Software Components
1073.
Development of PCU Value of Vehicle under mix Nature Traffic Condition in Cities on Congested Highways
1074.
FSR: Ferry-based Secure Routing Algorithm for Delay Tolerant Networks
1075.
Success of Windows 8: Capturing multiple markets
1076.
Refinement of visual secret sharing scheme without image size expansion
1077.
Development of Wireless Communication Networks: From 1G to 5G
1078.
Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation
1079.
Mtbf Analysis Of The Two-Unit Series System With Repair Facility
1080.
Group Co-operative Schemes for Optimal Multicast Capacity-Delay Scaling in MANET
1081.
Integrity Check Mechanism in Cloud Using SHA-512 Algorithm
1082.
Fast Greedy Algorithm for Routing in Delay Tolerant Network
1083.
Realization of computerized text taxonomy through a supervised learning system
1084.
Pruning the Cloud Internal Data Stealing By Treachery Attacks
1085.
Automatic Texture analysis of cartilage for early detection of osteoarthritis
1086.
A Survey and Comparative Study of Routing Protocols in Wireless Sensor Network
1087.
Cut Detection in Wireless Sensor Networks: A Survey
1088.
RF ID TAGS BASED ENERGY AUTOMATION SYSTEM USING EMBEDDED TECHNOLOGY
1089.
Wood Species Identification System
1090.
Web Usage Mining For extracting Users’ Navigational Behavior
1091.
AN IMPROVED TECHNIQUE FOR ENRICHING THE QUALITY OF IMAGE USING ENHANCED NL MEANS APPROACH
1092.
Various Methods to improve the visual appearance of Black & White and Colored Images
1093.
Challenges in Testing of Web Applications
1094.
SURVEY ON RESOURCES PROVISIONING IN CLOUD SYSTEMS FOR COST BENEFITS
1095.
A SURVEY ON WIRELESS SENSOR NETWORKS APPLICATION FOR AIR POLLUTION MONITORING
1096.
Ensuring Data Storage Security in Cloud Computing
1097.
Location Privacy using Traffic-Aware Mix zones in Vehicular or Mobile Networks
1098.
Security Issues Cloud computing Storage
1099.
Comparative study between MFCC and LP-Mel based front-ends for noisy speech recognition using HMM
1100.
Opportunistic Routing Protocols In Human Working Day Model Delay Tolerant Networks
1101.
Delivering Of Real Time Services through Internet Protocol Using Cloud Computing
1102.
Performance Evaluation of Alamouti Space-Time Block Coded Multi-User W-CDMA Wireless Communication System
1103.
Methodology for Selection of Spindle Drives for Milling Machines
1104.
WEATHER TEMPERATURE COMPUTATION USING DISCRETE FOURIER TRANSFORMATION TOOLS
1105.
A Systematic Approach to Cloud Security Using SeDas Platform
1106.
A Common Fixed Point Theorem for A-Contraction Mapping and its Application
1107.
ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT
1108.
AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK
1109.
Improving The QOS In MANET Using Dynamic Efficient Power Consumption Based Congestion Control Scheme
1110.
Application of Multi-Atlas Segmentation in Image Processing
1111.
A Review On Security Issues In Cloud Computing
1112.
Desgin and Implementation of Wi-Fi based Smart Home System Vinod Choudhary, Aniket Parab, Satyajit Bhapkar, Neetesh Jha, Ms. Medha Kulkarni
1113.
Powering Nation
1114.
Overcoming Circumstances Caused by Jammer Using Time Interval / Sampling Method
1115.
Determination of cloud adoption factor and Subordinate Virtual Cloud mechanism to overcome the performance issues in bigdata
1116.
A Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm
1117.
An efficient framework for image data retrieval
1118.
Analysis of PV Cell-based DG involving Improved Power Quality Converter for voltage control
1119.
Protecting the Database against Misuse
1120.
Convective heat transfer in Water Functionalized Carbon Nanotube Flow past a Static/Moving wedge with heat source/sink
1121.
Efficient Instant Fuzzy Search With Proximity Ranking And Query Logs
1122.
Smart Power Generation Using Radio-Frequency Waves
1123.
Control algorithm for SISO case using F O S with modeling in Simulink
1124.
Adaptive Query Interface for Database Search
1125.
Association Rule Classification based on Multi-Dimensional Data Cubes
1126.
Feature Extraction of Linear Objects from Remote Sensing Image (RSI) Using Gradient Filters
1127.
Classification Study of Sound and Image Events Using Event Detection Systems
1128.
On the Underlying Mathematical and Quantum Structures of Quantum Cryptography
1129.
Image Compression using Multilayer Feed-Forward Artificial Neural Network with Levenberg Marquardt.
1130.
Reducing Call Drops Due to Cell Failure
1131.
Event Triggering Using Hand Gesture Using Open CV
1132.
A Survey on SDN: An Unprecedented approach in Networking
1133.
Image Fusion using Hybrid Technique (PCA + SWT)
1134.
TRANSFORMATION OF UML ACTIVITY DIAGRAMS INTO PETRI NETS FOR VERIFICATION PURPOSES
1135.
Augmented Reality based on Image Processing
1136.
Studying and Comparing Automated Testing Tools; Ranorex and TestComplete
1137.
Fraud Detection Social Security and Social Welfare Data Mining
1138.
IRIS-GRATITUDE STRATEGIES ACTIVELY INVOLVED IN AN IMPROVEMENT OF REVOLUTIONARY MERCANTILE APPLICATION ACROSS UNRESTRICTED & RESTRICTED SECTOR.
1139.
OBJECT DETECTION AND TRACKING IN VIDEOS : A REVIEW
1140.
Predictive Model Of Stroke Disease Using Hybrid Neuro-Genetic Approach
1141.
A CHARGE CONTROL MODEL OF SURROUNDING GATE MOSFET
1142.
Survey Paper for Resisting Web Proxy Based Http Attacks by Locality Behavior
1143.
Reduce The False Positive And False Negative From Real Traffic With Intrusion Detection
1144.
A Survey on: Pre-Emptive Migration of a video process using Genetic Algorithm on Virtual machine
1145.
Improving Efficiency of IDS using alert Correlation
1146.
Information Retrieval From Web Document Using Clustering Techniques
1147.
AUTOMATED BLOOD VESSEL SEGMENTATION IN RETINAL IMAGE
1148.
Enhancing Accuracy in Cross-Domain Sentiment Classification by using Discounting Factor
1149.
VIRTUAL, ALL TOO VIRTUAL THE VIRTUAL TRANSACTION AND THE END OF POSTMODERNISM
1150.
ASPECT EXTRACTION & SEGMENTATION IN OPINION MINING
1151.
Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream
1152.
Mitigation of co residence profiling from malicious user through MUSSEL BEHAVIOR framework
1153.
Human Body as a Medium for Communication
1154.
UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECT
1155.
Use of Dispersion Compensating Fiber in Optical Transmission Network for NRZ Modulation Format
1156.
Demographical Implementation of Graph Classification in Educational Network Using Graph Mining Technique
1157.
Vehicle Number Plates Detection and Recognition using improved Algorithms: A Review with Tanzanian Case study
1158.
Brain Tumor Detection and Classification Using Histogram Equalization And Fuzzy Support Vector Machine Approach
1159.
REVIEW OF CATTLE MONITORING SYSTEM USING WIRELESS NETWORK
1160.
Mine Adverse Drug Reaction from Patient Electronic Database using Particle Swarm Optimization
1161.
Greening the Cloud Computing
1162.
Design and Simulation of Microstrip Patch Antenna for Wireless Communication
1163.
Protection from Vampire Attacks on Routing Protocol
1164.
A Survey of SignCryption Its Types and Techniques
1165.
MULTIPLE KEY GENERATION USING ELLIPTIC CURVE CRYPTOGRAPHY FUSION ALGORITHM FOR BIOMETRIC SOURCE
1166.
Effect Of Global Thresholding On Tumor-Bearing Brain Mri Images
1167.
BROADCASTING OF URBAN-STATISTICS VIA VEHICULAR INTELLECT DIA
1168.
Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET
1169.
AN AUTONOMOUS FRAMEWORK FOR CLASSIFIER SELECTION IN WEKA
1170.
Study Of Different Attacks On Network & Transport Layer
1171.
SMART VISION SYSTEM FOR BLIND
1172.
Modeling and Simulation of Non-Grid-Connected Wind Energy Conversion System
1173.
An Enhanced Level Set Segmentation for gray Images Using Fuzzy Clustering and Lattice Boltzmann Method
1174.
Implementation and Control of an Hybrid Multilevel Converter
1175.
RIVER: A RELIABLE INTER-VEHICULAR ROUTING PROTOCOL FOR VEHICULAR ADHOC NETWORKS
1176.
AUTOMATED PARKING SYSTEM WITH BLUETOOTH ACCESS
1177.
Survey On Argo UML Tool
1178.
IT STRATEGY: A Present Business Need
1179.
STRATEGIC ENVIRONMENTAL ASSESSMENT (SEA) OF MULTIMODAL TRANSPORT ON NH-9 IN HYDERABAD CITY USING REMOTE SENSING AND GIS
1180.
Cloud Computing and Security Issues
1181.
Andropay- M-Commerce Application For Procurement Of Products Enabled With Barcode Through Mobiles
1182.
Adaptive Web Based Application Development
1183.
Bayesian Classifier Approach For An Effective Outlier Intrusion Detection System In Mobile Adhoc Networks
1184.
Increase In Cache Performance Use Of Size As Factor In Replacement Algorithm
1185.
Final Year, Department Of Computer Science And Engineering K.S.R College Of Engineering
1186.
Persistent And Concurrent Server For Reliable Transacton
1187.
Modular Implementation of Neural network Structures in Marketing Domain Using Data Mining Technique
1188.
Predicting Risk for Evaluating Eligible Students using Multi-Dimensional
1189.
REDUCING ATTACK FREQUENCY IN MANET ROUTING
1190.
Sequential Implementation of Web Content Mining Using Data Analysis in Online Sales Domain
1191.
Urban road network analysis of Yenagoa, Bayelsa State Using GIS Idhoko K.E, Ndiwari, E. L., Ogeh, V. C., & Ikegbulam, S. C.
1192.
To Find the Comparison of Non-Split Domination Number, The Average Distance and The Diameter of Circular-Arc Graphs
1193.
A Paradigm for Active Database Management Systems
1194.
USING CLOUD COMPUTING TO PROVIDE DATA MINING SERVICES
1195.
EFFECTIVE ANOMALY DETECTION TECHNIQUES FOR SEQUENTIAL DATA IN DATA MINING
1196.
: MIN-HEAP BASED ENERGY EFFICIENT LOAD BALANCED CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
1197.
IMPULSE NOISE REDUCTION USING COMBINED FUZZY AND NON LOCAL MEANS APPROACH
1198.
: FEATURE EXTRACTION AND CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING GLCM AND BACK PROPAGATION TECHNIQUE
1199.
: A FUZZY RULE BASED MULTI-TEXTURE IMAGE SEGMENTATION USING M-BAND WAVELET TRANSFORM
1200.
CLOUD COMPUTING: A technology for Communication
1201.
AN ENERGY EFFICIENT WORMHOLE DETECTION TECHNIQUE BY TRAFFIC ANALYSIS IN WIRELESS SENSOR NETWORKS
1202.
: A NOVEL APPROACH TO DETECT THE SHORTEST PATH FOR SECURE DATA AGGREGATION USING FUZZY LOGIC IN WIRELESS SENSOR NETWORKS
1203.
IMPROVED PARTITION CLUSTERING ALGORITHM (K-MEANS) BASED ON GENETICS (USING SINGLE CROSSOVER)
1204.
STUDY OF MAINTAINING CONFIDENTIALITY DURING CHANGE OF INFORMATION
1205.
DATABASE FORENSIC ANALYSIS ALGORITHMS
1206.
AN EFFECTIVE SECURE ENVIRONMENT USING GRAPHICAL PASSWORD AUTHENTICATION SCHEME
1207.
BRAILLE CALCULATOR
1208.
ANALYSIS OF CLUSTER BASED ROUTING IN WIRELESS SENSOR NETWORKS
1209.
MINIMIZING AIR GAP LENGTH AND LOSSES FOR OPTIMAL DESIGNOF THREE PHASE INDUCTION MOTOR BY GENETIC ALGORITHM
1210.
: REDUCED LINK FAILURES THROUGH AUTONOMOUS RECONFIGURATION SYSTEM FOR WIRELESS MESH NETWORKS
1211.
: COMPARATATIVE ANALYSIS OF CLOUD BACKUP IN ENTERPRISE AND SMALL MEDIUM BUSINESS
1212.
PERFORMANCE EVALUATION OF MULTIPATHAODV ROUTING PROTOCOL
1213.
IMPROVISED RECORD MATCHING SCHEME USING UNSUPERVISED LEARNING FROM WEB DATABASES
1214.
INTEGRATED BLOCK BASED METHOD USES UNIQUENESS MATRIX FOR EFFECTIVE WATERMARKING
1215.
MODERN APPROACHES FOR DETECTING DATA LEAKAGE PROBLEMS
1216.
Evaluate The Asphalt Pavement Performance Of Rut Depth Based On Intelligent Method
1217.
An Implementation Of IPC Using Direct Thread Switching
1218.
Efficient Content Based Image Retrieval Using Combination Of Dominant-Color, Shape And Texture Features And K-Means Clustering
1219.
A Survey On Outlier Detection Technique In Streaming Data Using Data Clustering Approach
1220.
Optimization of Speed and Feed Rate for a Low Vibration and Better Surface Finish in Mild Steel on Lathe
1221.
COMPARATIVE ANALYSIS OF WIND POWER FORECASTING USING ARTIFICIAL NEURAL NETWORK (ANN)
1222.
Green Cloud Environmental Infrastructure
1223.
Automated Video Surveillance System With Sms Alert
1224.
Web service QoS Based Broker Architecture and Heuristic Algorithm applied for an Apartment Management system
1225.
Hybrid Model For Intrusion Detection System
1226.
Performance Evaluation of IEEE 802.16 Grids using scheduling Algorithms
1227.
Maintainability of Software using Aspect Oriented Programming for Process quality Analysis
1228.
Symmetric Key Management: A new approach
1229.
ONTOLOGY MINING FOR PERSONALIZED WEB INFORMATION GATHERING
1230.
Control Strategy For Wind Energy And Hybrid Generating Systems Based On The Concept Of Power Electronics
1231.
Wi-Fi Localization using RSSI in Indoor Environment via a smartphone
1232.
OLED: A New Display Technology
1233.
ZigBee: The New Bluetooth Technology
1234.
Network Security – How to Defend an Infinitely Expanding Frontier
1235.
Cyber Crime And Thier Solution
1236.
Mind Control Using Psycotronics
1237.
A Study On Spatial Data Clustering Algorithms In Data Mining
1238.
Design Of High Speed Uart For Programming Fpga
1239.
Review of Single Step Techniques for Production of ACNT’s
1240.
Assessment of Public Awareness and Interest on Establishment of EGovernment in Nigeria
1241.
Emerging Technology of Rule Based Expert System for Crimes against Women Laws in Indian judicial system
1242.
Big Data Mining approach to E-governance: Mining Census data for enhanced citizen centric policy making
1243.
A Study of Visualizing Social Network Data.
1244.
Cloud System for Software Testing
1245.
Aswaja Challenge In Globalization Era Presented in the Aswaja study meeting in Fatayat NU Menganti Gresik on September 21, 2017
1246.
Optimum Step for multistep prediction blind equalizer
1247.
Review of Selection Methods in Genetic Algorithms
1248.
Socio-economic Determinants of Age at First Marriage of Rural Women: A Statistical Analysis
1249.
A Survey on Moving Object Detection and Tracking Techniques
1250.
XRD And AFM Study Of Zirconium Substituted Zn-Ni Ferrite Using Solution Combustion Method
1251.
Recent Developments on Nanotechnology In Solar Energy
1252.
Performance analysis of Very Sparse Matrix Converter using ECSVM method
1253.
Provable Data Possession at Untrusted Cloud Storage server
1254.
Malayalam Character Recognition using Discrete Cosine Transform
1255.
Message Communication A New Approach
1256.
Defence Mechanism to Mitigate DDoS Attack For Wireless LAN
1257.
Art of Hiding: An Introduction to Steganography
1258.
An efficient “3 phase 4 channel AC energy meter” with automatic load control and automated billing using GSM
1259.
Off-Line English Character Recognition with Geometric Discretization
1260.
Comparison and Analysis of Document Stored Databases
1261.
Emerging Technologies For Big Data Processing: NOSQL And NEWSQL Data Stores
1262.
A Survey on Covert photo Classification.
1263.
Video Surveillance And Monitoring System For Examination Malpractice In Tertiary Institutions
1264.
MECHANICAL PROPERTIES OF FLY ASH STABILIZED CLAYEY LATERITE
1265.
Wireless Sensor Network
1266.
Design And Analysis Of High Speed, Low Power And Area Efficientdct Architecture For Multimedia Applicationsimplemented Oncadence 180nm
1267.
Object Tracking In Images And Videos
1268.
Survey Paper On Bandwidth Estimation For Video Streaming
1269.
SURVEY ON METEOROLOGICAL WEATHER ANALYSIS BASED ON NAÏVE BAYES CLASSIFICATION ALGORITHM
1270.
Review of Scheduling Algorithms in Cloud Computing Environment
1271.
Socio and Demographic Determinants of Neonatal Mortality in Bangladesh
1272.
Ranking Radically Association Among Users On Web Forum
1273.
Intelligent hybrid detection and mitigation of Distributed Denial of Service Attacks in SDN
1274.
Buried Target Parameter Characterization for Handheld Ground Penetrating Radar
1275.
IOT based control of DC traction motor
1276.
Wavelet Packet and Deep Forest based Objective Auscultation in Traditional Chinese Medicine
1277.
A relationship between happiness and life expectancy in breast cancer
1278.
Data-Level Parallel Approaches for the H.264/AVC: A Review from the Encoder and the Decoder Perspectives
1279.
Designing Ideal Task Partitioning Scheduling Model In Distributed Computing Scenario
1280.
Investigating The Relationship Linking Self Management Of Learning And M-Learning (SAAS Model) Adoption In Higher Learning Institutions: A Case Of Africa Nazarene University, Nairobi.
1281.
Containerized Microservices architecture
1282.
REAL: Multi-Label Learning with Relevant Feature for Each Label
1283.
A Brief Review On The Application Of Polynomial Splines To Quadrature In One And Two Dimensions
1284.
Identifying Wastages and Calculating SMV through Work Sampling Study in Sewing Section
1285.
A New Blind Equalization Algorithm for Improving the Channel Equalized Performance
1286.
Growth Rates in Algorithm Complexity: the Missing Link
1287.
Big Data Analysis: A Review
1288.
A Customized Ranking Procedure for Selecting Federated Cloud Provider
1289.
Research and implementation of Docker performance service in distributed platform
1290.
Adaptive Neuro Fuzzy Inference Systems Based Clustering Approach For Wireless Sensor Networks
1291.
Database Management System Using Index efiltering In Information Retrival System
1292.
Finite element solution of Poisson Equation over Polygonal Domains using a novel auto mesh generation technique and an explicit integration scheme for nine node linear convex quadrilateral of Lagrange family.
1293.
Water Level Monitoring and Controlling Using Bluetooth in Agriculture
1294.
Microservices Maturity Model
1295.
Parallelization of Least Significant Bit Algorithm for Image Steganography in GPU using CUDA
1296.
Review Paper on Text mining and Sentimental analysis
1297.
Measurement of Colour Shade Variation & Colour Strength for Uniform Colour using LAB Space Model for Computer Generated Images
1298.
Location Values -Based Services Based On Geo-Document on User Search Recommendation
1299.
Magnetic Engine Magnetic head to head collision repulsive piston engine (MHCRPE)
1300.
A Review: Fingernail Images for Disease Detection
1301.
Scripting Languages for Research in Data Mining
1302.
A Novel Method for Data Hosting and Load Balancing in Multi Cloud Environment
1303.
Mobile Digi Health Service System Using IOT
1304.
Optimizing Processing of Multiple Queries
1305.
Digi-Med plus System Using Internet of Things (IoT)
1306.
Data Mining in Bigdata using RCDC Clustering Algorithm
1307.
Creep of Concrete Using Different Cement Types and Superplasticizer for Concrete Dams
1308.
Finite element solution of Poisson Equation over Polygonal Domains using a novel auto mesh generation technique and an explicit integration scheme for eight node linear convex quadrilaterals
1309.
Hop Onset Network: Adequate Stationing Schema for Large Scale CloudApplications
1310.
Allocation of Resources Dynamically in Cloud Computing Environment Using Virtual Machines
1311.
Travel Motivations and Perception of Tourists to Lower Subansiri District of Arunachal Pradesh, India
1312.
Analytical Approach on Routing Protocols in Wireless Ad-Hoc Networks under Security Attacks
1313.
A Comparative Analysis of Various Images in Bio Medical Using Artificial Neural Networks
1314.
Secure Data Storage over Cloud Using Content Features Processing
1315.
Sentiment Ontology Analysis in Pharmacovigilance – A Review
1316.
An Affricative Finger Print Feature Extraction Using Diagnostic Approach
1317.
Real Time Product Feedback Review and Analysis Using Apache Technologies and NOSQL Database
1318.
ETL Data conversion: Extraction, transformation and loading Data conversion
1319.
Data Mining and its Techniques
1320.
Influence of Viscous Dissipation on MHD unsteady flow past an Exponentially Accelerated plate through Porous Medium with Heat Source
1321.
A survey on Number plate recognition systems
1322.
Measurement of Network Delay between Two Internet Hosts Using Mininet
1323.
Edge Detection using Average filter & Thresholding
1324.
Analysis of Dynamic Buffer Management Approaches in Mobile Ad hoc network
1325.
User Awareness of Privacy Concerns Posed by the Use of mHealth Apps
1326.
A Secure Framework for Messaging on Android Devices with Honey Encryption
1327.
Design and Analysis of Hybrid Solar Vehicle
1328.
Parallelizing A* Path Finding Algorithm
1329.
Review Paper on Big Data Tools and Techniques
1330.
Review on various scheduler used by Hadoop framework
1331.
Analysis and Modeling of a Five- Level Inverter
1332.
Offline Signature Verification System for Bank Cheques Using Zernike Moments, Circularity Property and Fuzzy Logic
1333.
West Indian Folk Music Analysis
1334.
Cloud Robotics: Its Industrial Automation Implementation And Challenges
1335.
Predicting whether songs will be hit using Logistic Regression
1336.
Mining of Retail Transactional Data for Revealing Seasonal Facts
1337.
Design a Low Power Zigbee based smart energy Metering
1338.
A Systematic Literature Review on Diabetes Diagnosis Management System (DDM-SYS)
1339.
Cloud computing in the field of education
1340.
Structural and Thermal Analysis of Honda CB Unicorn Disc Brake Using Solid Works and Ansys
1341.
Estimation of Reliable Routing and Maintenance For Wireless Sensor Network.
1342.
Analysis and Performance Evaluation of Electric Springs and STATCOM for Compensating Voltage Fluctuations
1343.
Enhancement Control Concept of Grid Power Transmission Limits During Day And Night Using PV-Solar Farm as STATCOM
1344.
Analysis of Cascaded H-Bridge Multilevel Inverter with Distributed MPPT for Grid-Connected PV Applications
1345.
Analysis of Reactive Power Sharing in Islanded Micro Grid Using an Improved Droop Control Strategy
1346.
Distributed Data mining In Wireless Sensor Network Using Fuzzy Naïve Byes
1347.
Phishing Detection and Prevention Techniques & Analysis of Various Recent Phishing Attacks
1348.
Towards The Study of Cloud Computing and Its Security
1349.
A Review on Coverage in WSNs
1350.
A Review of Traffic Management in WDM Optical Networks: Progress and Challenges
1351.
Reconfigurable Fir Filter Architecture for EEG Application
1352.
An Effective Thresholding Technique for Otsu’s Method using Contrast Enhancement
1353.
A Review on Rare Sequential Topic Patterns
1354.
Cost Effective Resource Allocation in C-RAN with Mobile Cloud Computing
1355.
High Dimensional Graphical Data Reduction
1356.
Explain the ‘Explain’
1357.
Data Mining For Breast Cancer Classification
1358.
Routing With Reliability in Mobile WSNs
1359.
Implementing Enhanced AODV Using FLAP in Wireless Sensor Networks
1360.
A New Approach to Automatic Generation of All Triangular Mesh For Finite Element Analysis
1361.
Voltage Differencing Buffered Amplifier Based on Floating-Gate MOSFET and its Filter Applications
1362.
Detection of Motion and Tracking Based on Consecutive Frame Using Differnce Hybrid Filtering Method
1363.
A Comparative Study on Seismic Analysis of Multi-Storey Building with and without Steel Bracings
1364.
Optimized Software Testing Using Genetic Algorithm
1365.
A Comparative Study on Influence of Layered Subsoil to the Response of RCC Structure with Different types of Foundations
1366.
Seismic Analysis of Liquid- Storage Tank
1367.
Research and Improvement on K-means Algorithm Based on Large Data Set
1368.
Intelligent Student Analysis using Fuzzy Logic
1369.
Towards achieving Efficient Secure Multi-keyword Searchable encryption over Cloud Data using ECC
1370.
Implementation and evaluation of optimal algorithms for computing association rule learning
1371.
Punjabi Chunker using Bootstrapping Approach
1372.
A Study on VMM and Resource Allocation Strategies in Cloud Computing Environment
1373.
Experimental Analysis of Long Term Evolution Using Vector Signal Transceiver (VST)
1374.
Efficient Texture Classifier for Hand-dorsa Vein Recognition System using Completed LBTP (C-LBTP) Feature Descriptor
1375.
A detailed study of Software Development Life Cycle (SDLC) Models
1376.
An Extended ERP model for Yemeni universities using TAM model.
1377.
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture
1378.
Digital Transactions Through Mobiles Using WAP
1379.
Travel Information System
1380.
Improvement the Efficiency CIGS Thin Film Solar Cells by Changing the Thickness Layers
1381.
Qos Recommendation
1382.
A Taxonomy Of Efficient Hierarchical Parallel Algorithms Using Grid Computing
1383.
Big Data Feature Selection Data Stream Mining
1384.
Spatial Item Recommendation using collaborative filtering
1385.
VESIT Library - An Android Based Application
1386.
Performance Evaluation of Quality of Service Parameters for Scheduling Algorithms in Wireless Mesh Networks
1387.
Questioning Answering Mechanism Using Natural Language Processing
1388.
Anonymity and the Obfuscation Issues in the Cryptographic Currency: Bitcoin
1389.
Performance Metrics on Routing Protocols in Wireless Ad-Hoc Networks under Security Attacks
1390.
RE Flow With Prototype & Its Impact with End- user in System Development
1391.
A Generalized Reliability Mechanism with minimum -Replica by PRCR
1392.
Energy Efficient E0 Algorithm for Wireless Transceivers
1393.
A Secure and Reversible Watermarking using Secret-Fragment-Visible Mosaic Images and Arnold's Cat map
1394.
Level of Project Management of Estimation, Planning and Tracking and uses techniques
1395.
Finding Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach
1396.
Applications of Big Data Analytics and Machine Learning Techniques in Health Care Sectors
1397.
Fuzzy Adaptive Selection of Votes in Probabilistic Filtering Scheme in WSNs
1398.
Biometric Authentication using the elements in the hair
1399.
A Review on Mobile Cloud Computing
1400.
Machine Learning Approach for Marketing Intelligence: Managerial Application
1401.
Performing Efficient protocol for reducing energy consumption in wireless sensor Networks
1402.
Lexical Analysis of Devanagari Hindi Language
1403.
Diagnosing Dengue: A Faster, Artificial Intelligence Based Hack
1404.
Encrypted Bigdata Using AES Deduplication in Cloud Storage
1405.
Performance Analysis of 8-Channel Bidirectional Passive Optical Network using Optical Fiber at Various Power Levels and Distance and Channel spacing
1406.
A Survey on Quality of Service Routing Protocols for Mobile Ad hoc Networks
1407.
Dynamic Analysis for Simulating the Effect of Power Quality on Sensitive Electronic Equipment
1408.
An overview on Cloud Security and Proposed Solutions
1409.
A Design of AMBA AXI4-Lite ACE Interconnect Protocol for Transactionbased SoC Design Techniques Integration
1410.
Design and Implementation of UPFC Using Ten Switch Converter With Switch Reduction
1411.
An efficient method for web page classification based on text
1412.
A Survey on Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
1413.
Slope Stability Prediction using Artificial Neural Network (ANN)
1414.
Reconfiguration of 25 kW Solar PV Power Plant
1415.
Dynamic Analysis of web system by using model-based testing and Process Crawler Model
1416.
Selection of Appropriate Web Content Management System (WCMS)
1417.
Paper on Searching and Indexing Using Elasticsearch
1418.
A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability
1419.
Privacy Preserving Healthcare System using secured cloud environment
1420.
Artificial Neural Network Model for predicting Maintainability Using MOOD and size metrics
1421.
A Survey on Secure Communication Protocols for IoT Systems
1422.
On Multi-granulation Rough Sets
1423.
A Critical Analysis and Evaluation of Requirement Prioritization using Analytical Hierarchy Process
1424.
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
1425.
Classification of Age variant CARPAL AREA BONES by Support vector machine with RBF Kernel
1426.
Analytical and Experimental Performance Evaluation of Parallel Merge sort on Multicore System
1427.
Deterministic Routing Algorithm for Shared Memory Processing (SMP)
1428.
Notice App: An android application to understand and identify students’ perspective
1429.
A Survival Study on Pattern Recognition for Ischemic Stroke Detection on CT Images
1430.
Exploring The Emerging Role Of Data Mining In Retail Forecasting : Need For The Retailers
1431.
A Proposed Method for Semantic Annotation on Social Media Images
1432.
Usage of Brain Tumor Segmentation in MRI Images Using Intelligent Water Drops Algorithm
1433.
Web Content Management System (WCMS): A Need
1434.
Secure Web Authentication Using OPASS to Prevent Secret Key Stealing
1435.
Design and Manufacturing of Pneumatic Vehicle for Industrial Purpose
1436.
Flexible Approach for Data Mining using Grid based Computing Concepts
1437.
Survey on Digital Image Watermarking & Techniques
1438.
A Study on Development of Online Marketing Information System for Agricultural Sector of KSA
1439.
Climate induced variation in forest fire using Remote Sensing and GIS in Bilaspur District of Himachal Pradesh
1440.
New Modified AODV for MANET
1441.
Increasing network lifetime by energy-efficient routing scheme for OLSR protocol
1442.
Using predictive modelling for forecasting blood donor response
1443.
Mining High Utility Patterns in One Phase without Generating Candidates
1444.
Optimization of Image Compression algorithms using DWT- DCT method
1445.
Symmetric Stream Cipher Based On Chebyshev Polynomial
1446.
Cooks Distance and Mahanabolis Distance Outlier Detection Methods to identify Review Spam
1447.
Image Denoising Technique Using Trimmed Based Median Bilateral Filtering Method
1448.
Predicting and Diagnosing of Heart Disease Using Machine Learning Algorithms
1449.
Segmentation of brain MRI –A tri level PSO based approach
1450.
Anti-Swing Control of an Overhead Crane by Using Genetic Algorithm Based LQR
1451.
Cloud Load Balancing: A Perspective Study
1452.
Design, Materials, Production, FEM and Experimental Analysis of an I.C. Engine Crankshaft – A Review
1453.
Simulation and Analysis of Power Spectral Density for Digital Pulse Interval Modulation
1454.
Performance Analysis of Free Space Communication System for Gamma– Gamma Turbulence
1455.
Efficient Energy Management System for Smart Grid Using Bacterial Foraging Optimization Technique
1456.
Spectrum Calculations for an Orthogonalized Non Linear System
1457.
A Novel Papr Reduction Approach Based On The Weighted OFDM Algorithm
1458.
Housing Society Management, Authentication and Security App
1459.
Watermark Image Enhancement from various Attacks by SWT Using Hybrid Meta-heuristics
1460.
The Comparison of Various Decision Tree Algorithms for Data Analysis
1461.
Digital Predistortion of Power Amplifier using Quadratic Rotation Method
1462.
Open Source Dashboard Technology and IEDSS for Higher Education Institutions
1463.
Data Access Control with Revocable Multiauthority Cloud Storage
1464.
Dynamic Load Balancing in Distributed Systems: A Graph-Based Approach to Optimize Resource Allocation
1465.
Biomedical Named Entity Recognition - a swift review
1466.
Knowledge Management in E-Learning A Critical Analysis
1467.
Secure Data Transfer: Based on Steganography and Visual Cryptography
1468.
New Multicast Routing Protocols for Mobile Adhoc networks
1469.
Waste Management in IoT- Enabled Smart Cities: A Survey
1470.
Deployment of Data Base as a Service and connecting it with the local server
1471.
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environment
1472.
Survey on Android application for power efficiency in private cloud
1473.
A Review of Android Smart Security
1474.
A Review of Fatigue Monitoring System
1475.
Implementation of Railway Track Crack Detection and Protection
1476.
Modeling and Performance Analysis of BLDC Motor under Different Operating Speed Conditions
1477.
Efficient Defense Mechanism against Sybil Attack in Wireless Sensor Network
1478.
Experimental investigation of strength properties of concrete with partial replacement of cement with glass powder and fine aggregate with foundry sand
1479.
Staff Monitoring System Using Biometric
1480.
Review Paper on Image Enhancement and Its Techniques
1481.
Internet of Things: A Survey on Security Issues Analysis and Countermeasures
1482.
An Efficient Approach for Image Filtering by Directional Neighborhood with wavelets
1483.
A Formation of Cloud Data Sharing With Integrity and User Revocation
1484.
A Study of Various Bone Fracture Detection Techniques
1485.
Role of Internet of Things in Smart Passenger Cars
1486.
Novel Weighted Hybrid Approach in Recommendation Method
1487.
Improved Routing Metric In The Overlay Routing Delay Nodes
1488.
A Machine Learning Approach for Early Prediction of Breast Cancer
1489.
A Survey on Image Compression Methods
1490.
Students of Bachelor of Technology in Computer Science, School of Computer Science Engineering, Galgotias University, Greater Noida.
1491.
Behavioural Analysis of Android Malware using Machine Learning
1492.
A Machine Learning Approach for Early Prediction of Breast Cancer
1493.
Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme
1494.
Location Based Social Network For Rating Procedure Geographical Location Using Extended Collaborative Algorithm
1495.
Social Complaint Application
1496.
Survey of Intentional Enterprises Threats using Social Engineering Exploits and Prevention Techniques
1497.
A review on Neural Network and Ant Colony Optimization for Vehicle Traffic Analysis and Routing
1498.
SVM classifier based CAD system for Lung Cancer Detection
1499.
Digital Video Watermarking Techniques: A Review
1500.
A New Approach to E-Learning (E-Web Class)
1501.
Prospects of Crowd funding Education: A Conceptual Framework
1502.
Comparative Study of Energy Saving Grid-based heuristic approaches in dispersed computational environment
1503.
Effective Feature Selection for Feature Possessing Group Structure
1504.
Simulation of Water Level Control in a Tank Using Fuzzy Logic in Matlab.
1505.
Taxing the Cloud
1506.
PSO-Based Support Vector Machine Technique with Cuckoo Search For Lungs Cancer Diagnosis
1507.
A Clustering Technique for Improving Marketing Strategy in Social Media using Data Mining Approach
1508.
Analysis and Design Of Multistory Apartment Building Using ETABS
1509.
Literature Survey of Privacy Preserving Data Publishing (PPDP) Techniques
1510.
Intelligent Method for Cost Estimation during Software Maintenance
1511.
IOT Based Calorie Calculator For Healthcare System
1512.
A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network
1513.
E-KYC Ticketing System
1514.
Real-time location based service for tracing mobile using Android Application
1515.
Asymmetric key algorithms-A Proposed Method
1516.
Cut Detection in Wireless Sensor Networks
1517.
Naïve Tweet Analyser
1518.
Secured access using Cognitive Services on Raspberry Pi
1519.
Fuzzy Based Contrast Enhancement Method for Lung Cancer CT Images
1520.
Obtaining Good Heuristics for Big Data Broadcasting Problem Using Novel Pipeline Approach.
1521.
Signature Verification for Banking Sector Based on SIFT
1522.
Secure Authentication using Image Processing through Visual Cryptography
1523.
Design and Implementation of Low Power ALU Design
1524.
Operation and Control of Converter Based Single Phase Distributed Generators in a Utility Connected Grid
1525.
Review on the various Watermarking Techniques Based on Medical Images
1526.
Research on the Study of Evolution of Websites
1527.
Flexible Data Processing Using Apache PIG
1528.
Personalized Book Recommendation System
1529.
Image Processing Based Student Attendance System using Raspberry PI
1530.
Data Leakage Detection Using Cloud Computing
1531.
Anticipating Human Activities from Surveillance Videos
1532.
Data Integration among Sensor Nodes Using Wireless Toolkit
1533.
A Perfect Partner for Event Marketing
1534.
Survey of Various Face Liveness Detection Techniques for Biometric Antispoofing Applications
1535.
Video Surveillance Using Adaptive-Rate Compressive Sensing
1536.
Customer Complaint Analysis Using Hadoop (Consumer Analysis)
1537.
Sparse Signal Recovery in Compressive Sensing Using sparse Kalman Tress Search Algorithm
1538.
Spectrum Monitoring In OFDM-Based Cr Networks By Window Based Energy Ratio Algorithm
1539.
A Frequency Reconfigurable UWB Monopole Antenna with Slotted Ground Structure
1540.
Using kiosks as information-delivery channels to apply for Schemes and other government services for Rural India
1541.
PAPR Reduction in NC-OFDM Based Cognitive Radio System Using Signal Cancelation and Tone Reservation
1542.
Privacy Preservation in Dynamic Bigdata for Verification and Correctness
1543.
Security Analysis with respect to Wireless Sensor Network – Review
1544.
Investigations on the Fabrication and Properties of Fibre Reinforced Composites with Natural Fibres of Banana and Coir with Epoxy and Polyester Polymers
1545.
A survey on IoT and Security issues of RFID
1546.
Internet Banking System & Security Analysis
1547.
Ethical Hacking and Hacking Attacks
1548.
Survey on Educational Data Mining Techniques
1549.
Algorithms for Recognition of Geometric and Parametric Features in prismatic parts using IGES
1550.
IOT Based Waste Monitoring For Smart City
1551.
Footstep Power Generation System
1552.
Minimising the Execution Time of Selection Sort Algorithm
1553.
Detecting Malicious Facebook Applications
1554.
Comparative Analysis of K-Means and Kohonen-SOM data mining algorithms based on student behaviors in sharing information on facebook
1555.
Survey on Various Retrieval Strategies and Utilities for effective Information Retrieval
1556.
Hierarchical Messaging Application for Android Using Salesforce
1557.
Study of machine learning based recommendation techniques used by Ecommerce
1558.
pGate: An Introduction to A Novel Universal Gate and Power Drop Calculation of QCA circuits
1559.
Implementation of 3D Campus View
1560.
An Overview of Theoretical Models of Exchange Bias Mechanism
1561.
Energy Consumption in Wireless Sensor Networks Using Multi Level Clustering Energy Efficient Protocol
1562.
Survey of Intentional Enterprises Threats using Social Engineering Exploits and Prevention Techniques
1563.
Implementation of Multiqueue Interlacing Peak Scheduling based on Task Classification in Cloud Computing
1564.
Error-based Adaptive Update Rate in multi-function Phased-array Radar Using IMM Target-Tracking Algorithm
1565.
Improving performance of Virtual Machines by Virtio bridge Bypass for PCI devices
1566.
Enhancing A Medbox for Health Precautions Using IOT
1567.
IoT Based Automated Smart Home
1568.
A Survey of Multilingual Document Clustering
1569.
A research Paper on Cryptography Encryption and Compression Techniques
1570.
A Mobile Based Smart Healthcare System
1571.
Analysis of Speech Disabled People with Dysarthria using TORGO Database
1572.
Sentiment Analysis in Today’s Trend: A Review
1573.
Progressive Localization using Mobile Anchor in Wireless Sensor Network
1574.
A Clustering Technique for Improving Marketing Strategy in Social Media using Data Mining Approach
1575.
Enhanced Public Auditing for Code-Based Multi-server Cloud
1576.
Literature Survey of Privacy Preserving Data Publishing (PPDP) Techniques
1577.
Image Enhancement using Mathematical Morphology
1578.
ECIES for Group Key Establishment in WSN for Secure Multicast Communication
1579.
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
1580.
Transient Stability Analysis of IEEE-9 Bus Electrical Power System
1581.
Recent Trends and Challenges in Development of Smart Systems
1582.
Diffie-Hellman Key Exchange Protocol with Entities Authentication
1583.
Social Uni-Books Web Service
1584.
Face Recognition Using PCA
1585.
Learning of RBF network by using Teaching-Learning Based Optimization (TLBO) Algorithm
1586.
Color Scheme Authentication for Session Password
1587.
Optimization of Migration Time affected storage overheads during VM Live Migration using Network Attached Storage device
1588.
Evaluation of internet of Things Devices and Management tools.
1589.
Cluster Based Data Mining Technique for Identification of User Behavior
1590.
Virtual Keyboard
1591.
Multilevel Security Models in Real-Time Database Systems: Comparing and Analyzing
1592.
Reliable and Intelligent Automated Networking Framework for Internet Networking
1593.
Empboard
1594.
Automatic Rule Detection and POS Tagging of Punjabi Text
1595.
Text Classification Using Centroid Technique
1596.
Review on Content Based Medical Image Retrieval System and Techniques
1597.
A Comparative Study of SVM Kernel Functions Based on Polynomial
1598.
Implementation of IoT In Smart Robotics: A Survey
1599.
Landslide Monitoring Using Flux Sensor by Wireless Technique
1600.
Review Paper on Wireless Power Transmission for Charging Mobile Devices
1601.
Ear Recognition by Feature Extraction Using Force Field Transformation
1602.
Internet of Things for Business
1603.
Improving Rating Predection Accuracy by Exploring Social User Sentiments
1604.
Automatic Detection of Tuberculosis in Chest Radiography Using Fuzzy Classifier
1605.
An Improved Run Length Encoding Scheme for Image Compression
1606.
Cognitive Weighted Polymorphism Factor: Empirical and Theoretical Validations
1607.
Smart Environmental Monitoring System Using Labview
1608.
Fraud Resilient Device Offline Micro-Payments using Bit-Exchange Algorithms
1609.
Intelligent Smart Home Automation and Security System Using Arduino and Wi-fi
1610.
Policy Based Detection during Emergency and Sharing Secure Information
1611.
Multimodal Biometric In Human Identification Of Finger Vein Patterns Using Score Level And GSA
1612.
Survey of Brain Abnormality using Gabor Wavelets
1613.
Survey of MapReduce on Big Data
1614.
Motif Placement on Garment Pattern: Comparison and Development of a CAD Tool
1615.
Vehicle Communication System Using Li-Fi Technology
1616.
A Practical Approach for Parallel k-means
1617.
Visual Authentication Protocol With QR Generation And Image Processing
1618.
Detection of Traffic Sign using Feature Based Method
1619.
Restricted Legal Dictionary generation for Legal Domain Specific Mining
1620.
Implementation of Chopper Fed Speed Control of Separately Excited DC Motor Using PI Controller
1621.
Load Balancing of Intermediate Nodes to Extend Network Lifetime
1622.
Evaluation of Software Testing Techniques Using Artificial Neural Network
1623.
Automatic Toll Collection System Using QR Code
1624.
Information Security: A Saga of Security Measures
1625.
Adaptive Acknowledgement Techniques to Improving Security for MANETs Using MRA Scheme
1626.
Security Based Deduplication with Efficient and Reliable Data Storage
1627.
Optimisation of Damping in Short Fiber Reinforced Aligned Composites: A Review of literature using Micromechanical Analysis
1628.
Potential Applications of Ultrasonic Sensor
1629.
Transformerless UPFC Using Multilevel Inverter
1630.
A Review on the Performance of Object Detection Algorithm
1631.
A Review on the Text Segmentation Techniques
1632.
Development of IOT Based Secured Emission Test
1633.
Revocable-Storage Identity-Based Encryption: Secure Data Sharing In Cloud
1634.
Benami Identification Using Mining with Bigdata Analytics
1635.
Qualitative Significant Image Reports in Image Reclamation Structure for Ontology
1636.
A Framework for Natural Disaster Management System Using Twitter Data
1637.
Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore, India
1638.
P.S.R.Rengasamy College Of Engg for women, Sivakasi
1639.
Energy Aware Compressive Sensing Scheme in Wireless Sensor Network
1640.
Android Arduino Interface with Smart Farming System
1641.
A Survey On Semantic Image Retrieval For Bigdata
1642.
Qos Multicast Routing Algorithm For MANET
1643.
Cluster Based DDoS Detection Method in Data Mining
1644.
Robust Performance-Based Resource Provisioning
1645.
Image Contrast Enhancment Using Feed Forward Network
1646.
A Review on the Artificial Bee Colony & Clahe Based Hybrid Hough Transform For Efficient Lane Detection
1647.
Review of Techniques Used For Change Detection in Remotely Sensed Images
1648.
Implementation of PV - Based Boost Converter Using PI Controller with PSO Algorithm
1649.
Digital Image Watermarking Using 3-Level DWT-SVD And Median Filter
1650.
Enhancement of Slotted Circular Patch Antenna ith Different Substrate
1651.
Multi-Key Searchable Encryption for Group Sharing Via Cloud Storage
1652.
RFID Technology Based Attendance Management System
1653.
A Survey on Question –Answering System
1654.
Modified AODV Techniques for Detection and Prevention of Gray Hole Attack in MANET
1655.
E-Shopping Community Structure Analysis Using Data Clustering
1656.
Enhanced Public Auditing System
1657.
Design & Simulation of Turbo Decoder for BER Calculation
1658.
Stega Image a Technique to Hide Data within Image File, Using Image Steganography and Encryption
1659.
Review on Content Based Image Retrieval (CBIR) Technique
1660.
Biometric Authentication using Software as a Service in Cloud Computing
1661.
A Literature Review of Reliable Multipath Routing Techniques
1662.
Knowledge Discovery using Data Mining
1663.
Genetic Approach on Descriptive Modeling of Data Mining
1664.
A Novel Method for Determining Link Correlation and Candidate Key in VANETs
1665.
Performance Analysis Of Data Mining Algorithms For Breast Cancer Cell Detection Using Naïve Bayes, Logistic Regression and Decision Tree
1666.
An Approach for Composing Web Services through OWL
1667.
A Unified Bigdata Analysis Platform Using Hadoop Technology
1668.
Data Mining Techniques for the Prediction of Kidney Diseases and Treatment: A Review
1669.
Efficiency Improvement in Data Detection
1670.
Mining Correlation Rules for Interval - Vague Sets
1671.
An Intuitionistic Fuzzy Topsis DSS Model with Weight Determining Methods
1672.
Data Mining With Big Data Using Clustering Based Collaborative Filtering
1673.
Optimized Chemical Bond Pattern Search Using Tree Indexing Technique
1674.
A Hybrid Multi Threaded Task Scheduling and Knapsack Load Balancing in Multiple Cloud Centers
1675.
Spam Reviews Detection Using Hadoop
1676.
Warning Time Analysis for Emergency Response in Sumbawanga City for the Repeat of Magnitude 7.2 Earthquakes of 1919 Using Proposed Community Earthquake Early Warning System
1677.
Review on 32-Bit IEEE 754 Complex Number Multiplier Based on FFT Architecture using BOOTH Algorithm
1678.
Implementation of Personalized Web Search with Privacy Protection
1679.
Implementation to Extract Text from Different Images by Using Tesseract Algorithm
1680.
Routing for Mobile Ad Hoc and Wireless Sensor Network on location basis
1681.
Security protocols for Wireless Sensor Networks
1682.
An Improved Document Clustering with Multiview Point Similarity /Dissimilarity measures
1683.
Real Time College Bus Tracking Application for Android Smartphone
1684.
Classifying sentiments of twitter data using Bay’s neural network
1685.
MMLSL: Modelling Mobile Learning for Sign Language
1686.
RF Based Localization Antenna for Wireless Communication
1687.
The Components that can build Flexible & Efficient Software Defined Network
1688.
Increase accuracy the recognition of objects using artificial neural network technology
1689.
Architecture for Internet of Things (IOT) for Home Automation
1690.
Autonomous Car: The Future of Secured Transportation
1691.
Detecting Spammers on Social Networks
1692.
Online Traffic Light Control System
1693.
A Study on Prediction of User Behavior Based on Web Server Log Files in Web Usage Mining
1694.
Efficient Data Transmission with Barcode Modulation Based On DPSKOFDM
1695.
Survey on Matching Of Users in Social Networks Using Friend Book
1696.
Securing E-healthcare records on Cloud Using Relevant data classification and Encryption
1697.
A Web Navigation Frame Work to Identify the Influence of Faculty on Students Using Datamining Tecniques
1698.
Mobile Web Based Android Application for College Management Sysytem
1699.
Survey on Emerging Security Mechanisms for Medical Cyber Physical Systems
1700.
A Unified Framework for Both Graph and Pattern Matching Using IPaMWAG
1701.
Analysis of Database Services for Cloud
1702.
Analysis and Evaluation of Techniques for Managing Unstructured and Semi-Structured Data in a MapReduce Platform
1703.
Identification and Removal of Interfernce in Aspectj Programs
1704.
Comparitive Study on Sentiment Analysis Techniques and User Behavior Prediction on Twitter Data
1705.
ADFC Robot: Ashirwad A Low cost much efficient ADFC(Autonomous Dry Floor Clean-up) Robot
1706.
A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach
1707.
An Overview of Distributed System for Wireless Sensor Network
1708.
Brain MR Image Segmentation for Tumor Detection using Artificial Neural
1709.
Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment
1710.
Raspberry PI 3 Based Control and Monitor Remote Machine Automation
1711.
A Grid Connected Three Phase PV Quasi-Z-Source Inverter with Double Frequency Ripple Suppression Control
1712.
Adaptive Harmonic Elimination in a Grid-Connected Three-Phase PV Inverter
1713.
Survey on a Lightweight Authenticated Communication Scheme for Smart Grid
1714.
Survey on Monitoring Aquatic Debris Using Smartphone-Based Robots
1715.
Survey on Integrated Design of Smartphone Interface with Multiple Image Processing Methods
1716.
Survey on Face Recognition in the Scrambled Dataset by Using Many Kernels
1717.
A Review in Statistical Aspects of Data Mining
1718.
A Literature Survey on Password Extraction via Reconstructed Wireless Mouse Trajectory
1719.
Survey on Efficient Certificateless Access Control for Wireless Body Area Networks
1720.
Development of Embedded Application for Receiver Processor Unit
1721.
A Survey on Smart Ration Card System
1722.
Graphical Password as an OTP
1723.
Mining Web Graphs for Large Scale Meta Search Engine Results
1724.
Maximization Influence Flow Using Modified Greedy Algorithm
1725.
Foundation of Ethics and Practice in Amitābha Cult: Modern Social Perspective
1726.
Survey on Opportunistic Routing Protocol: JOKER
1727.
Research for Cipher Chip for the Encryption of Sensor data: A Survey
1728.
Behaviour analysis of STREE, SABR and SARDS under different simulation enviornements:A Case Study.
1729.
Recursive Formulation Based Parallel Self Timed Adder Design Based Architectural Design and CMOS Implementation Approach
1730.
Data Hiding System with Mosaic Image for Protected Communication
1731.
Evaluating Prediction of Customer Churn Behavior Based On Artificial Bee Colony Algorithm
1732.
Usage of Data Mining Techniques for combating cyber security
1733.
Finding the Routing Table by Dynamic Processing Method in Distance Vector Routing
1734.
A Study on Web Content Mining
1735.
Image Compression Using Huffman Coding
1736.
Optimizing Information Rate in Polynomial Based Image Secret Sharing Scheme Using Huffman Coding
1737.
Balancing Load in Smartphone’s
1738.
Novel Preprocessing Techniques for NID3R
1739.
Double-Faced Data Hiding Techniques in Images using RIT: A Survey
1740.
Analysis of handwriting patterns of Dyslexic Children vis-à-vis the nondyslexics using Hamming Distance
1741.
Approaches for Camera Source Identification: A Review
1742.
DNA Computing
1743.
Ashirwad: An extremely cost efficient Swabbing Robot
1744.
Sentiment Analysis of Reviews for E-Shopping Websites
1745.
Specific Trait Identification in Margins Using Hand Written Cursive
1746.
Review of protocols used in Multicasting Communication
1747.
Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM
1748.
Energy consumption of High Power MANET Using LVC
1749.
A Review on Dynamic Clustering: Using Density Metrics
1750.
Hybrid Technique Based Blind Digital Image Watermarking
1751.
Constant amplitude fatigue crack growth life prediction of 8090 Al-alloy by ANFIS
1752.
Development of Students Results Monitoring System Model
1753.
Ionic Liquids – A New Era in Green Chemistry
1754.
Analytical Solutions For Security Issues In Cloud Environment
1755.
A Novelistic Querying procedure for clustering the Legal Precedents
1756.
Prediction of Breast Cancer using Random Forest, Support Vector Machines and Naïve Bayes
1757.
An Efficient Fair Resource Allocation in Multicast Networks
1758.
Identification of Human using Palm-Vein Images: A new trend in biometrics
1759.
Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms
1760.
Training Feed forward Neural Network With Backpropogation Algorithm
1761.
Weighted Energy Efficient Cluster Based Algorithm in MANET
1762.
Classification and Analysis of Web Multimedia Data using Principal Component Analysis
1763.
An Advanced BIST Architecture with Low Power LBIST and BDS Oriented March Algorithm for Intra Word Coupling Faults
1764.
Effective Utilization of Data Mining Techniques for Digital Security
1765.
Seamless Access Internet using Wi fi in Dynamic Vehicles
1766.
On theory and Performance of high throughput parallel block and S-random interleavers for Turbo Codes
1767.
A novel approach for temperature sensing and monitoring through wireless sensor using IoT
1768.
A Survey on Destination Prediction Using Trajectory Data Mining Technique
1769.
Secure Data Sharing and Privacy Preserving Authentication Protocol for Cloud Environment
1770.
A Study: Impact of Interactive Posting in Social Site
1771.
Enhance multipath routing in topology transparent network for better QoS in MANET
1772.
Image Steganography Using LSB Along With IDEA Algorithm
1773.
Comparative Study of Predicting Heart Disease By Means Of Data Mining
1774.
A Review On Data Security in Cloud Environment
1775.
Test Case Generation for Software Quality Assurance by Using PrT Nets
1776.
Systematic Review of Mobile Operating Systems
1777.
A Low cost prototype for Vehicle to Infrastructure communication
1778.
On a Software Reliability Growth Model with Log Logistic failure time distribution
1779.
Topic Digging Over Asynchronous Text Sequences
1780.
Combination of Cloud Computing and High Performance Computing
1781.
Correct Name Labelled For Search Based Face Annotation
1782.
Selfish Attack detection mechanism using COOPON in Cognitive Radio
1783.
Reduction in Infrastructure and operating costs using Server Virtualization
1784.
Implementation of High speed and Low power 6T SRAM cell using FinFET at 22nm technology
1785.
Imperfect Debugging Software Reliability Growth Model for the Rayleigh failure time distribution
1786.
A Survey on Smart Ration card system using RFID and Biometrics
1787.
Design of Electronically Commutated Motors for Motors for Hybrid Vechile for Braking
1788.
DOID: A Lexical Analyzer for Understanding Mid-Level Compilation Processes
1789.
Image Segmentation Quality Assessment For "Truncated Compound Normal With Gamma Mixture Model"
1790.
A Comparative Study of Perceiving Intrusion Using Data Mining Techniques
1791.
Data Security System in Cloud by Using Fog Computing and Data Mining
1792.
Autonomous Neuron Telematics Data Mining Architecture
1793.
Automatic Retina Exudates Segmentation Algorithm For Early Detection With High Performance
1794.
An Approach of Speech Recognition System for Desktop Application
1795.
Safety in Wireless Sensor Network: Types of Attacks and Solutions
1796.
An energy efficiency of cloud based services using EaaS transcoding of the multimedia data.
1797.
Prop up the Farming Community with E-Services: Web Based Services for Agriculture
1798.
Intelligent Data Mining and Network-Based Modeling of Social Media for Improving Care
1799.
Comparision Between Dct & Dwt Image Compression TechniquE
1800.
¬¬¬¬¬¬Gasification-Contributing to the Energy Production Demands
1801.
Text Summarization using topic modeling and cluster based MapReduce framework
1802.
Smart Tourist System
1803.
Enhanced Security Protocol for Spontaneous Wireless ad-hoc Network
1804.
Behavior Analysis of OSPF and ISIS Routing Protocol with Service Provider Network
1805.
DC Motor Speed Control Using LDR Sensor and Atmega89s52
1806.
A Conceptual Study To Make Research About Contribution Of Innovation And Competition Relation Over New Economy
1807.
A survey on different PAPR reduction techniques in OFDM systems
1808.
An Innovative Accession To Mobile License Plate Reader System (MLPR)
1809.
Power Quality Control of Nonlinear Load using Custom Power Devices
1810.
Obtaining Good Heuristics for Big Data Broadcasting Problem Using Novel Pipeline Approach.
1811.
Guided Filter for Grayscale, RGB and HSV color space
1812.
A Gamified Kenyan K-12 Learning System
1813.
Software Reliability Model when multiple errors occur at a time including a fault correction process
1814.
Deist: Dynamic Detection Of Sinkhole Attack For Internet Of Things
1815.
Word Recognition System Using ANN
1816.
Improving Quality Of The Services In Manet Usign The Hierarchical Fair Service Curve And Fisheye State Routing Protocol
1817.
Design and implementation of Smart Agriculture using Embedded System
1818.
Ordered Dither Block Truncation Coding For Content Based Image Retrieval Using Relevance Feedback
1819.
A Review: To Detect and Identify Cotton leaf disease based on pattern recognition technique.
1820.
Improving Image Compression Using DWT
1821.
Analysis of Speed controller for three phase induction motor in 125/60 TPH Aggregate crushing Sand Plant
1822.
Eeg Based Person Identification And Authentication Using Bci
1823.
A Hypothesis on Assorted E-Commerce Performances in Online Market
1824.
Prospect of Elecrto Commerce In Present Indian Market
1825.
Smart Wi-Fi Traffic Assister
1826.
Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things
1827.
A Survey of Load Balencing Technique in Cloud Computing Environment
1828.
A Novel Algorithm to Determine the Attacks Intention in Wireless Ad hoc Networks
1829.
Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet
1830.
Personalized Web Search with Custom Privacy Preservation
1831.
Improved LEACH Routing Communication Protocol for Wireless Sensor Network
1832.
A Survey on Multi Owner Data Sharing for Dynamic Groups in the Cloud Securely
1833.
Optimal PID Controller Designing for Uncertain Bioreactor Using BFO Algorithm
1834.
A Review on Feature Extraction Techniques for Speech Processing
1835.
Neural Network based Weather Prediction Model towards Ideal Crop Selection
1836.
Understanding Captcha: with its types,for security
1837.
MongoDB for Read Intensive Cases Using YCSB
1838.
Virtual Machine Migration in Cloud Data Centers for Resource management
1839.
Instrumentation Detailed Engineering
1840.
Review on Reactive Power Compensation in Short Transmission Line
1841.
Implementation of IOT Based Health Care Solution Based on Cloud Computing
1842.
Numerical Solution of Eighth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basic functions and Septic B-Splines as weight functions
1843.
Image Enhancement Approach for Digital Applications Based On Generalized Histogram Equalization Model
1844.
An IOT Based Framework for Group Monitoring and Irrigation Control
1845.
Single Image Haze Removal Using Dark Channel Prior
1846.
A Review on Various Techniques of Image Compression
1847.
Comparison and Performance Analysis of Various FACTS Devices in Power System
1848.
Human Identity Recognition Using Ear Lobes Geometric Features
1849.
Multitask TSK Fuzzy System Modeling by Mining Intertask Common Hidden Structure
1850.
Preprocessing Techniques of Electrocardiogram
1851.
A Cloud Based Automatic Recovery and Backup System with Video Compression
1852.
Multivariate Web Service Recommendation Using Personalized Collaborative Filtering
1853.
Design And Implementation of Facial Expression Recognition Using Adaptive Neuro Fuzzy Classifier
1854.
A New Approximated To the Natural Intelligence Decision Tree
1855.
Frequency Domain Techniques For Blocking Artifact Reduction-A Review
1856.
Disease Identification using Concept and Feature Relationship Analysis for Remote Health Services
1857.
Finite Element Solution of Poisson Equation over Polygonal Domains using an Explicit Integration Scheme and a novel Auto Mesh Generation Technique
1858.
Implementing Campus Indoor Location Tracking System
1859.
Hybrid Approach for Location Based Customized POI Travel Recommendation System
1860.
Network Switching: Traditional Techniques and Evolution
1861.
A Comparison Survey of Multiple Access Scheme for upcoming 4G Communication
1862.
Review of Agile Project Development Technique
1863.
Research & Survey of Data Mining Techniques In Educational System
1864.
Privacy Circles: Sharing Images on Social Networking Sites Using A3P
1865.
High Gain Coupled Inductor-Based Dc/Dc Converter For Offshore Wind Energy Systems
1866.
Social Event Storyboard Generation from Image Click-A Survey
1867.
A Survey on Active Queue Management Techniques
1868.
A Survey on Traffic Management in Smart Cities
1869.
A Survey on Feature Extraction Techniques for Image Retrieval using Data Mining & Image Processing Techniques
1870.
A Comprehensive Assessment and Comparative Analysis of Simulations Tools for Cloud Computing
1871.
Trust Mechanism in E-Commerce
1872.
A survey paper on logical perspective to manage BigData with incremental map reduce
1873.
Supporting Humans in an Intelligent Manner with Awareness of the Human’s State Using Artificial Intelligence & Machine Learning
1874.
Distortion-Resistant Routing Framework for Video Traffic in Wireless Networks
1875.
Implementation of Solar Power Ac Motor Pump Set on MPPT With Battery Backup For Agriculture System
1876.
Importance of Wireless Sensor Network and Artificial Intelligence for Safety Prerequisite in Mines
1877.
A Survey on Secret Data Transmission Using Various Steganographic Aspects
1878.
Alternative Method of Audio Searching (AMAS)
1879.
A Survey on Privacy Protected Facial Biometric Verification
1880.
Review on Security Management in Cloud computing
1881.
An Approach of Computer Simulator for Integrating with Radar Data Encoder by using Basic Platforms
1882.
Software Reliability Testing Tools: An Overview and Comparison
1883.
Plastic Flexible Memory Chip Devices
1884.
Secure Data Retrieval Of Attribute Based Encryption Policy System
1885.
Prediction of post overload fatigue crack growth life of HSLA steel under mixed-mode (I and II) spike overload by using genetic programming
1886.
Implementation of clustering of uncertain data on probability distribution similarity
1887.
A Paper On Edge Detection In Images Using Fuzzy K Means Clustering Approach
1888.
A Review on Security Challenges and Considerations in Cloud Computing
1889.
A Survey on Efficient Broadcast Protocol for the Internet of Things
1890.
Investigation on Super Lift DC/AC Inverters Using Photovoltaic Energy for AC Component Application
1891.
Improving the Reverse Dictionary Using Scalable Dataset
1892.
Cloud computing and security issue
1893.
Trust Factor Based Secure Congestion Control For Vanet
1894.
Enhancing the Performance of AODV by Exchanging Neighboring Node Information with Hello Packets in VANET
1895.
Garbage Collection Management System
1896.
Parikh matrix on the Context-Free Grammar for Natural Languages
1897.
Data Deduplication in Parallel Mining of Frequent Item sets using MapReduce
1898.
Scalability Study of Hadoop MapReduce and Hive in Big Data Analytics
1899.
Preventive Measurement and Online Insulation Evaluation of Power Transformer
1900.
Maximum Power Point Tracking Using DRCC and MRAC With Modified Mit Rules For PV Cells
1901.
An Approach of Handling Packet Loss for Delay Sensitive Video Streaming in MANETs
1902.
Adaptive Video Streaming Through Server Driven Rate Control In Manets
1903.
An Experimental On Time Table Generator
1904.
A Survey on Smart Garbage Management in Cities using IoT
1905.
The Human Genome Project: An Insight to the Homo Sapiens
1906.
Mobile Apps Fraud Detection Using Raking
1907.
Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review
1908.
Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation
1909.
A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic
1910.
Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management
1911.
Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register
1912.
Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme
1913.
Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons
1914.
Effect of Nano Fluids in Solar Flat Plate Collector Systems
1915.
An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data
1916.
Enhancing the Security of Data Using DES Algorithm along with Substitution Technique
1917.
Visual Crypto-Steganography in Images
1918.
Speech Recognition using e-Speaking: A Review
1919.
Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM
1920.
Vein Pattern Recognition: A secured way of Authentication
1921.
Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy
1922.
Enhanced Way of Association Rule Mining With Ontology
1923.
Mobile Printer with Bluetooth Compatibility Using Raspberry PI
1924.
Automated diagnosis of Lungs Tumor Using Segmentation Techniques
1925.
Characterization of Advanced Encryption Standard (AES) for Textual and Image data
1926.
Cone metric spaces and fixed point theorems of contractive mappings
1927.
Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network
1928.
Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences
1929.
Study of Unified Power Quality Conditioner for Power Quality Improvement
1930.
Simulation of Steerable Gaussian Smoothers using VHDL
1931.
Fixed Point Theorem in Weakly Compatible Self Mappings on Complete
1932.
Publish/Subscribe Systems Security through Distinct Identity Encryiption
1933.
Emotion Speech Recognition System For Isolated Words In Marathi Language
1934.
An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation
1935.
Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations
1936.
An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model
1937.
MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter
1938.
An Efficient Approach for Secure Data Hiding Using Cryptography
1939.
Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images
1940.
Intrusion Detection System Using Machine Learning Approach
1941.
Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review
1942.
A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup
1943.
Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations
1944.
Improving the Performance of Information Collection Using Social Networks with Online Sampling
1945.
Simulation of Black Hole Attack in Manet
1946.
Inference of User Image-Search Goals and Personalization Using Click Through Log
1947.
Optimization and Investigation of Mg-Alloy with MWCNT Nano-Composites for Connecting Rod Application
1948.
Group User Revocation and Integrity Auditing Of Shared Data in Cloud Environment
1949.
Agile Testing Automation Framework
1950.
Numerical Solution of Fourth Order Boundary Value Problems by Petrov-Galerkin Method with Quartic B-splines as basis functions and Sextic B-Splines as weight functions
1951.
Numerical Solution of Fifth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions
1952.
Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system
1953.
MM Sort algorithms
1954.
Comparison Of Routing Protocols (DSDV, DSR and AODV) In Manets
1955.
A Survey of Energy Efficient Clustering Algorithms in Wireless Sensor Networks
1956.
A Study On Cloud Robotics Architecture, Challenges and Applications
1957.
Mouse Control Using Image Processing
1958.
Survey on Relay and Beam forming Spectrum Sharing Cognitive Radio Networks
1959.
A DWT-DCT-SVD Based Enhancement Technique for Low Contrast Satellite Images
1960.
A Review on Performance of Database Systems Azfar Inayat Khan
1961.
Evaluating the Performance of Ant Colony Algorithm for the Solution of Constraint Based Traveling Salesman Problem
1962.
Numerical Solution of Tenth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions
1963.
Secure Reliable Reactive Routing Enhancement In Wireless Sensor Networks
1964.
Dynamic Cluster Head Selection Mechanism For Wireless Sensor Networks
1965.
Cloud Computing for Rural Banking
1966.
Enhancement of BER and PSD of OFDM Signals with PAPR Reduction Using Linear Companding Transform
1967.
Combination of Modified Clipping Technique and Selective Mapping for PAPR Reduction
1968.
Solving nQueen problem using modified Rakhya’s approach for parallel system
1969.
New Design of Acoustic Doppler Current Profiler
1970.
To Identify a Torque Controller System Approximating a Neural Network Based on Model Reference Technique
1971.
A Novel Digital Watermarking Approach for Accurate Authentication Using of Integer Wavelet Transform Coefficients
1972.
A Survey On Various Phishing Detection And Prevention Techniques
1973.
Analysis of Non-Technical Losses in Distributed Transformer System
1974.
Iris Recognition Using Curve let Transformation Based on Gabor Filter& SVM
1975.
Retina Recognition Using Support Vector Machine
1976.
Evaluation of Data Mining Classification Algorithms for Predicting Students Performance in Technical Trades.
1977.
Effect Of Combination Of Different Features On Speech Recognition For Abnormal Speech
1978.
Effective Ness and Illustration of Distribution Systems and Supply Chain Management.
1979.
A Comprehensive Survey of Content Based Image Retrieval Techniques
1980.
Grid Base Cluster Aproach for Detection Of Sinkhole Attack in WSN
1981.
Green IT: A Key to a Better Future
1982.
Coding scheme for defining the behavior of a pedagogical agent
1983.
Literature Survey on Wireless Sensor Network
1984.
Image Compression - An Overview
1985.
Differentially Private Utility Item Mining
1986.
Various Issues & Challenges of Load Balancing Over Cloud: A Survey
1987.
Performance Analysis of Non-uniform Filter Bank with Equi ripple Band pass Filter
1988.
Design an Ultra Wideband Low Noise Amplifier at 6 GHz Applications
1989.
Healthcare Data Clustering with Summary Analysis under Multiple Databases
1990.
Compression of Medical Images by Integer Wavelet Transform
1991.
Prevention of MANET from Co-Operative Black Hole Attacks
1992.
The Fault Level Reduction in Distribution System Using an Active Type SFCL
1993.
Blackhole Detection and Prevention Strategies in DTN
1994.
Design and Implementation of Emotional State Recognition via Text Algorithm (E.S.R.T.A)
1995.
A Round-Robin based Load balancing approach for Scalable demands and maximized Resource availability
1996.
Network Reconfiguration Of Distribution System Using Particle Swarm Optimization
1997.
Impact of Marker Width to Optimize Fabric Cost of Garments
1998.
Simulation of AODV and QoS Based CBRP Based WMNProtocol Routing with Varying Pause Time using NS-2
1999.
Access to higher education among the paudibhuyan tribe in Barkote block, Deogarh District in Odisha: A sociological study
2000.
QoS Based Approach for Web Service Recommendation
2001.
Image Enhancement using Contrast Limited Adaptive Histogram Equalization and Wiener filter
2002.
Ontology based indexing of hidden web: Review
2003.
Review On Secure Anti-Collusion Data Sharing For Dynamic Group In The Cloud
2004.
Heterogeneous Phase-Level Scheduling With Jobs Execution Scheduling Algorithm To Enhance Job Execution And Resource Management In Mapreduce
2005.
Integration Of Big Data And Cloud Computing To Detect Black Money Check Rotation With Range Aggregate Queries
2006.
QOS Ranking Prediction For Cloud Brokerage Services
2007.
Test Path Generation Using Cellular Automata
2008.
Bandwidth Optimization In Data Retrieval From Cloud Using Continuous Hive Language
2009.
An Optimization And Security Of Data Replication In Cloud Using Advanced Encryption Algorithm
2010.
Efficient Retrival Of Mobile Apps Using EIRQ
2011.
Protection Preserving Public Supportable System In Cluster Based Distributed Storage
2012.
Soil Classification and Suitable Crop Yield Prediction Using Support Vector Machine
2013.
Pomegranate Leaf Disease Detection Using Support Vector Machine
2014.
RFID Based Ration Card Using Autmated Load Cell
2015.
Bug Triage Using Dimensionality Reduction Technique And PSO Algorithm
2016.
Scrum Methodology
2017.
Intelligent Techniques with GUI by Challenge Keypad for Secure Password
2018.
Concurrent Data Compression for Cost Effective Applications
2019.
A review on grid power quality improvement in wind energy system using STATCOM with BESS
2020.
Unmanned Aerial Vehicle (DRONE)
2021.
Review on Energy Efficient LEACH Protocol in Wireless Sensor Network
2022.
Comparative Study MANET and VANET
2023.
Feature Extraction and Selection of a Combination of Entropy Features for Real-time Epilepsy Detection
2024.
Early Diagnosis Of Heart Disease Using Alternating Decision Tree And KNN Algorithm
2025.
Role of Cloud Computing in Data Mining
2026.
Review on Mining High Utility Patterns Decreasing Candidates
2027.
Protecting Data in Modern Computing Devices
2028.
Perfect Difference Number System
2029.
Boundless Communication
2030.
An Approach to Utilize Memory Streams for efficient Memory Management
2031.
Preserving Data Privacy without Secure Channel
2032.
Credit Card Fraud Detection System
2033.
Design of Instruction Fetch Unit and ALU for Pipelined RISC Processor
2034.
Review: Performance Estimation of Best Ad Hoc Routing Protocol with Trust Mechanism in MANET
2035.
A New Era to improve the QOS on Cloud using hybrid approach
2036.
Innovations By Internet Of Things
2037.
Sensorless Sensing with WiFi device free human detection
2038.
GIS Based Application in Education for Aurangabad city
2039.
Analysis Of Genetic Crossover Techniques Based On Roulette Wheel Selection Algorithm And Steady State Selection Algorithm
2040.
Enhanced Security In Data Transmission In Wireless Sensor Network Using Randomized Path
2041.
I2mapreduce: Fine-Grain Incremental Processing In Big Data Mining
2042.
A Review On Efficient Privacy Preserving And Secure Data Integrity Protection In Regenerating Coding Based Multi-Cloud Storage
2043.
Effect of Temperature on Maximum Power Point of Photovoltaic Module
2044.
A Review Paper on Effective AES Implementation
2045.
Implementing Radix Sort With Linked Buckets Using Lsd & Msd And Their Comparitive Analysis And Discussion On Applications
2046.
Providing Multi Security In Privacy Preserving Data Mining
2047.
Prediction Search Of Topics Based On Timestamp And Interest Of Domain With Advertising
2048.
Efficient Content Based Image Retrieval Using Combination Of Dominant-Color, Shape And Texture Features And K-Means Clustering
2049.
Design And Analysis Of Xy Positioning Table
2050.
Comparative Study Of Different User Authentication Schemes
2051.
Decision Forecast Modelling For Effective Execution Of Research Projects In R&D Labs Through Bi Models
2052.
Speech Classification Using Mfcc, Power Spectrum And Neural Networkand.
2053.
Dos Resistant Cloud Based Secure Authentication Protocol
2054.
An Enhanced Blue Light Emitting Diode
2055.
DETECTION OF LICENSE PLATE NUMBER USING DYNAMIC IMAGE PROCESSING TECHNIQUE
2056.
NOVEL INDUSTRIAL WIRELESS SENSOR NETWORK FOR MACHINE CONDITION MONITORING
2057.
Efficient Storage of Defect Maps for Nanoscale Memory
2058.
Fake Currency Verification Using Blue Pixel Region Analysis And Image Difference
2059.
An Automated Guided Model For Integrating News Into Stock Trading Strategies
2060.
Overview of Hidden Markov Model for Test-To-Speech Synthesis Methods
2061.
Speech Enhancement Using Modified Spectral Subtraction Algorithm
2062.
The Role Of E-Learning In Producing Independent Students With Critical Thinking
2063.
Intrusion Detection Alarms Filtering System Based On Ant Clustering Approach
2064.
Http Streaming Based Ajax Player
2065.
Practical Energy Saving Techniques For Multi-Storey Office Buildings In Accra, Ghana
2066.
A New Approach For Text Detection In Natural Scene Images
2067.
Analysis of a Semi-Markov Model for Software Reliability
2068.
Performance Analysis in Dynamic Social Networks
2069.
Design and Implementation of UART using Verilog
2070.
Power Aware and Energy Efficient Multipath Routing Scheme for WSNs
2071.
Concepts Of Serious Game In Education
2072.
Model For Spectral Classification
2073.
Refocusing Computer Engineering and Computer Sciences in Educational Institutions For Economic Sustainability And Local Input Contents Of Computer And Mobile Phones In Nigeria
2074.
A Dual System Capture Biometric Fingerprint Scanner
2075.
A New Digital Video Quality Enhancement Approach Based On Generalized Histogram Equalization Model
2076.
Syntactic Error Correction System
2077.
Papr Reduction And Companding Distortion Mitigation By Piecewise Linear Companding
2078.
NSCT DOMAIN BASED MULTIMODAL MEDICAL IMAGE FUSION APPROACH BASED ON PHASE CONGRUENCY AND DIRECTIVE CONTRAST
2079.
Map-based Multi-source Message Passing Model to find Betweenness Centrality using MapReduce
2080.
Study On Cardiovascular Disease Classification Using Machine Learning Approaches
2081.
Review on Automated Text Summarizer using Top K-Rules
2082.
Review of Efficient Routing In Delay Tolerant Network
2083.
Strict Privacy With Enhanced Utility Preservation By N, T Closeness Through Microaggregation
2084.
Banking Expert System”With credit card fraud detection using HMM algorithm
2085.
Proficient Pattern Selection for Supervised Tagging
2086.
Design Of Tunable Method Of PID Controller For Integrating Process
2087.
Vibrant Rule Base Erection and Continuance plot for Ailment Profecy
2088.
A Generic Computer Tool for the Solution of Fluid Flow Problems: Case Study of a Thermal Radiative Flow of an Optically Thick Gray Gas in the Presence of Indirect Natural Convection
2089.
A Survey on Different IP Traceback Techniques for finding The Location of Spoofers
2090.
Performance Measures for a three-unit compact circuit
2091.
Development of an Efficient Hand Gesture Recognition system for human computer interaction
2092.
A Study on Chaos-Based System for Improved Encryption of Images
2093.
Design Patterns’ Model for Application Development in Object Oriented Languages
2094.
Artifact Reduction For Visually Challenged
2095.
STUDY ON ENSURING DATA STORAGE SECURITY SYSTEM IN CLOUD COMPUTING SERVICE
2096.
Comparisons Of Restored Blurred-Noisy Dental Images Using Wiener Filter And Lucy-Richardson Technique.
2097.
Performance Measures for a three-unit compact circuit
2098.
HIGHLY SECURE REVERSIBLE WATERMARKING MECHANISM USING REVERSIBLE DE-IDENTIFICATON
2099.
Study of Classification of Diseases by Genetic Algorithm for Multiclass Support Vector Machine Using Hadoop
2100.
A Survey of Commonly Used Cryptographic Algorithms in Information Security
2101.
Hybrid visual servoing for tracking multiple targets with a swarm of mobile robots
2102.
P – TSP Seasonal Constrained Model
2103.
Secured Data in Cloud by Using LFSR
2104.
Providing Lifetime Optimization and Security in Wireless Sensor Network
2105.
Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network
2106.
Performance Analysis of JPEG2000 for Different Wavelets Transforms in satellite images
2107.
Energy Efficient Data Transfer In Mobile Wireless Sensor Network
2108.
Detection of Black Hole Attack in DTN with Authentication
2109.
Secure data management system for patients and their doctor.
2110.
Robust Construction Of Multiday Itinerary Planning
2111.
Survey on Credit Card Fraud Detection Techniques
2112.
Gamma Corrected Bright Channel Filtering Based Fast Single Image De-hazing
2113.
Surveying Smartphone Security for Linux Powered Devices
2114.
The Future Generation Intelligent System Need For Human Memory To Detect Crime Using Virtual Brain Technology.
2115.
Third Party Auditing of Data on Cloud With Fine Grained Updates
2116.
Lung cancer detection and classification using Support Vector Machine
2117.
Ontology-Based Multi-Document Summarization
2118.
Cognitive Perspective Of Attribute Hiding Factor Complexity Metric
2119.
Comparative Study Of Semantic Search Engines
2120.
The Interdisciplinary Nature Of Knowledge Discovery Databases And Data Mining
2121.
A Review Of Inferring Latent Attributes From Twitter
2122.
A Survey Of Ontology Evaluation Techniques For Data Retrieval
2123.
Programming Paradigms in the Context of the Programming Language
2124.
Stability Analysis of A Non Vaccinated Sir Epidemic Model
2125.
A Survey paper on An Effective Analytical Approaches for Detecting Outlier in Continuous Time Variant Data Stream
2126.
Bigdata Analysis In Health Care
2127.
Position Based On Refining Aggregate Recommendation Assortment
2128.
A Survey-Decentralized Access Control with Anonymous Authenti-cation and Deduplication of Data Stored in Clouds
2129.
Fast File Downloading Using Network Coding in Distributed System
2130.
Review of Social Collaborative Filtering Recommender System’s Methods
2131.
Re-Ranking Based Image Categorization Using Saliency Driven Nonlinear Diffusion Filtering -A Review
2132.
Digital Library: Using Hybrid Book Recommendation Engine
2133.
Text clustering for computer investigation with search optimization
2134.
Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation
2135.
Using Image Processing In Security
2136.
Review of Social Collaborative Filtering Recommender System’s Methods
2137.
Recommender System: Revolution in E-Commerce
2138.
The Challenges of National e-ID for Kurdistan Region government for Multi-purposes
2139.
Enhancing Security On Mosaic Images Using Cryptographic Algorithm And Compression Technique-A Review
2140.
MULTITASKING REAL-TIME SCHEDULING IN A ROBOT
2141.
Large scale Data Sharing using BestPeer++ Technique
2142.
Speech Enhancement using Spectral Subtraction-type Algorithms: A survey on Comparison
2143.
Performance Evaluation Analysis Of An Interference Alignment Based Precoding In Mimo-Ofdm System
2144.
Study and Analysis of MYCIN expert system
2145.
Implementation of Surveillance robot with the feature of semi automatic recharging capability
2146.
High Density Salt and Pepper Noise Removal in Images Using Adapted Decision Based Unsymmetrical Trimmed Mean Filter Cascaded with Gaussian filter
2147.
Music Genre Classification
2148.
Content Based Medical Image Retrieval Using Fuzzy Gaussian Mixture Model with Relevance Feedback
2149.
Analytical Approach for PAPR Reduction and Mitigating Companding Distortion Using Piecewise Linear Companding
2150.
Analytical Analysis Of Implementation Issues And Its Practical Applicability In DVB-NGH Single Frequency Networks
2151.
A Novel Optimized Approach for Underwater Acoustic (UWA) Cooperative Communication Systems to Achieve Delay Diversity
2152.
A Novel Reversible De-Identification Approach For Lossless Image Compression Based On Reversible Watermarking Mechanism Based On Obfuscation Process
2153.
AN EFFICIENT POWER-CONSTRAINED CONTRAST ENHANCEMENT ALGORITHM FOR OLED DISPLAYS USING MULTI SCALE RETINEX ALGORITHM
2154.
A Novel Approach For Papr Reduction And Mitigating The Companding Distortion By Using Piece Wise Linear Companding Framework
2155.
Analytical Channel Estimation Approach For OFDM System Based On Near-Optimal Dft-Based Channel Estimator With Leakage Nulling
2156.
Energy Efficient Secure Routing in Manets Based on Multipath Erasure Coding
2157.
A Comparative Study on Various Wireless Sensor Network Tools
2158.
Prevention of Blackhole Attack over AODV and DSR MANET Routing Protocol
2159.
Detection Monitoring Of Secure Packet Transfer Over Network Traffic
2160.
A Literature Review on Quantization Table Design for the JPEG Baseline Algorithm
2161.
Comparison of Empirical Models in the Estimation of Global Solar Radiation over Nigeria
2162.
Analytical Approach For Decoder Delay Reduction Sec-DED-DAEC Codes Derived From Orthogonal Latin Square Codes
2163.
A Novel Power Saving Approach for Residue Number System Moduli Set Based On Fast Sign Detection Algorithm
2164.
An Efficient Structured Sparsity Model For Reverberant Speech Separation
2165.
A High-Speed Montgomery Modular Multiplication Algorithm To Reduce The Energy Consumption Based On RSA Cryptosystems
2166.
Quantitative Analysis of Apriori and Eclat Algorithm for Association Rule Mining
2167.
A Study of Two Stage Operational Transconductance Amplifier using Floating gate MOSFET
2168.
The Adoption of Knowledge Management Development System in Nigeria Higher Education
2169.
Performance of Induction Motor Drive by Using Modular Multilevel Converter With Battery Energy Sources
2170.
Security Mechanism for Authentication
2171.
Improvement in Wireless TCP Using Modified Loss Differentiation Algorithm
2172.
A Review on Sentiment Analysis and Visualization of Customer Reviews
2173.
Recognition Of Punjabi Script Character And Number For Multiple Fonts
2174.
Advanced Vecliw Architecture For Executing Multi-Scalar/Vector Instructions On Unified Datapath
2175.
Towards Semantic Web: Challenges and Needs
2176.
A Single-Phase Photovoltaic Drive Controller with A Series-Connected Energy Buffer
2177.
Performance of Dynamic Voltage Restorer by Using Fuzzy Controller With Battery Energy Storage System
2178.
Performance Evaluation Of Bandwidth Scheduling Techniques In Passive Optical Networks
2179.
A Review on Image reconstruction using Haar DWT on Crack Images
2180.
An Improved LEDIR Technique Using LEDIR For Failure Node Recovery In WSN
2181.
A Strong Token Authentication And Cryptography Based Application And Data Access For Cloud Users
2182.
A Review On Rfid, For Resolving Transport Related Issues
2183.
Comparative Performance Analysis of KNN (K-Nearest Neighbor) algorithm for Fatigue Detection in vehicular Drivers using pulse oximetry signal
2184.
Client Identification Model for GPS-based On-demand Real-Time Video Surveillance Security System
2185.
Energy Efficient AODV routing protocol For Mobile Ad-hoc Network
2186.
FPGA Implementation of Double Precision Floating Point Arithmetic Unit
2187.
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
2188.
A Brief Review of Defogging Techniques for Haze Affected Images
2189.
Improving The Performance Of Dc Motor Drive Application For Dc-Dc Converter By Using Resistance Compression Network
2190.
Performance evaluation of CI engine with Rice bran and Pungamia oil-Diesel blends as Alternative fuel.
2191.
High-Efficiency Isolated Bidirectional Ac Dc Converter For A Dc Distribution System
2192.
Utilization Of Renewable Energy Resource Pva With Parallel Current Sharing Dc-Dc Booster Converters
2193.
Comparative Analysis of Performance of Various Virtual Machines in Hybrid Cloud Environment using KVM
2194.
Design & Analysis of Performance of Semantic based approach for Knowledge Extraction in Web mining Environment
2195.
Rasp-Pi based Remote Controlled Smart Advertising of Still and Moving Images
2196.
WSN Practical adaptations
2197.
Interacting Device for Deaf & Dumb using Atmega 328 Processor
2198.
Approximate Processing of Queries in P2P Networks
2199.
Comparative Analysis of performance of K-means algorithm for skin detection using wearable Sensors
2200.
A Platform Independent Log Analyzer with Searched Keywords Reporting Feature
2201.
Digital Watermarking Algorithms: A Review
2202.
Approaches in the fields of the Code Optimization
2203.
Study & Analysis of Intention of a BDI Agent and its Performance
2204.
A Comparative Study: Image Steganography and Watermarking
2205.
Multi-criteria Decision making for Identifying Top-k profitable Stocks from Stock market
2206.
Multiple Antenna Adaptation for Secondary Users Using Data Rate Assessment
2207.
Extension to Alpha Algorithm for Process Mining
2208.
A Transformation from Relational Databases to Big Data
2209.
A Study On Association Rule Mining
2210.
Optimized Blind Data Extraction Approach Based On SS Technique
2211.
A Genetic Algorithm Based K-Means Algorithm For Compressing Images
2212.
Analytical Approach For Evaluating Performance Of An Interference Alignment Based Precoding In Mimo-Ofdm System
2213.
A Study Of Multi Level Heterogeneous Routing Protocols In WSN
2214.
An Overview of Multi-Microcontroller Bus Synchronization for Simultaneous Operation of the Microcontrollers
2215.
Survey On Verification Of Storage Correctness In Cloud Computing
2216.
Impact Of Data Mining Techniques In Medical System
2217.
Optimized Reserving Room Approach For Reversible Data Hiding Algorithm Before Encryption On Encrypted Digital Images
2218.
A Novel BER Analytical Performance Of DWT Based OFDM Using Various Channel Over DFT Based OFDM
2219.
Analytical Approach For Enhanced Residue Modular Multiplier For Cryptography
2220.
Optimized Analytical Approach For Wireless Sensory Nodes Based On Low Power DSP Architecture
2221.
Management of Packet Queues in Buffer using Proactive Protocol
2222.
Optimized Papr Reduction Approach By Piece Wise Linear Companding Framework With Less Companding Distortion
2223.
Evaluation Of Dual Fingerprint Approach For Privacy Protention
2224.
Analytical Approach For Privacy Protection By Palm Print Mechanism Using Wavelet Transformation
2225.
Controller Design for a Two-loop Missile Autopilot in Pitch Plane
2226.
Use Of precast SIFCON Laminates For Strengthening of RC Beams
2227.
Hyperspectral Image Denoising with a Spatial– Spectral View Fusion Strategy
2228.
Performance Evaluation of PAPR Reduction in OFDM System Using Non Linear Companding Transform
2229.
A Web Based Fuzzy Expert System for Human Disease Diagnosis
2230.
Efficient Recognition Of Survival Rate In Bone Marrow Records Using Non-Matrix Factorization Algorithm
2231.
Devnagari Sign Language Recognition using Image Processing for Hearing Impaired Indian Students.
2232.
Document Clustering and Automatic Labeling for Forensic Analysis Using High Performance Clustering Algorithm
2233.
RFID Tag Enabling Wireless Sensor Networks Data Acquisition System By Using Embedded Linux
2234.
Security Enhancement of 4G LTE system using PGP and Iterative RSA technique
2235.
Arm Based Human Machine Interface Of Plastic Extrusion Blow Molding System
2236.
Optimized Multi scale Similarity Approach for Images Based on Single Image Super Resolution Framework
2237.
Design of High Performance Shared Buffer NoC Router
2238.
Analysis of Non-Melanoma Skin Lesions Using Curve Let based Texture Analysis on Probabilistic Neural Network Classifier
2239.
An Incremental Shared Nearest Neighbour Clustering Approach For Numerical Data Using An Efficient Distance Measure
2240.
Computer Aided Detection of Diabetes Retinopathy and Analysis through ANFIS and Optimtool
2241.
Classification of Breast Mass classification - CAD System with Performance Evaluation
2242.
Paradigm of Privacy Preserving Techniques in Social Network Data Publishing
2243.
Performance comparison between single & couple rectangular tank system using NNPID controller
2244.
Automating the test case generation for Object Oriented Systems using Activity Diagrams
2245.
A Survey on Parallel Method for Rough Set using MapReduce Technique for Data Mining
2246.
Optimized Approach for Authentication In Audio Signal By Wavelet Packets Transformation Technique
2247.
Toward Data Protection laws and code of conduct in Kurdistan region government
2248.
Apriori Algorithm base Model of Opinion Mining for Drug Review
2249.
Wireless Sensor Network Optimization
2250.
SIM300 GSM Module Controller For Smart Home
2251.
Analysis of Non-coherent Receivers for Suppression of NBI in UWB Communication System
2252.
Query Response Ranking by Temporal Diversity using User Sessions as Feedbacks
2253.
A Wavelet Based Image Restoration for MR images
2254.
Sheltered Security for Mobile Ad Hoc Networks Using Stoical Traffic Pattern Systems
2255.
An Audio Multiple Shuffle Encryption Algorithm
2256.
E-Payment: Prospects, Challenges and Solutions in KRG Public Sector
2257.
An Improved Energy Efficient Scheme for Scheduling Mobile Sensors in a Hybrid Wireless Sensor Networks with Obstacle Avoidance
2258.
Secure M-commerce Business over Global System For mobile communications (GSM)
2259.
Design of a Sun Tracker with Position Display
2260.
Evaluating effectiveness of BIM application in Construction Projects
2261.
Robust Utkin’s Observer Based Controller for Deregulated Hydro-Thermal LFC Problem
2262.
Opportunities and Challenges of Quality-Assured contributions of Life Cycle Data Network for Web-shared Publication.
2263.
Improving Playfair Algorithm To Support User Verification And All The Languages In The World Including Kurdish Language
2264.
C Source Code Auto Review Tool for Secure Programming of Indian Spacecraft Ground Software Elements, GEOSCHEMACS
2265.
An E-commerce Feedback Comment Mining Using SentiWordNet Tool and K-Means Clustering Method
2266.
Green cloud computing: reduced overload with a better architecture
2267.
Performance Evaluation of Secure tunnel technique using IPv6 Transition over IPv4 Channel
2268.
A Review: Image enhancement approaches using Histogram Equalization
2269.
A Review on HTTP Streaming Strategies in Media Streaming
2270.
Potential based similarity metrics for implementing hierarchical clustering
2271.
Analysis of Star, Tree and Mesh Optical Network Topologies for successive distance between nodes Using Optimized Raman-EDFA Hybrid Optical Amplifier
2272.
Hyperspectral Image Denoising with a Spatial – Spectral View Fusion Strategy
2273.
Handful Trends in the Banking Security
2274.
Detecting Phishing Websites Based On Improved Visual Cryptography
2275.
Implementation of Interface between AXI and DDR3 memory Controller for SoC
2276.
An RTOS Architecture for Industrial Wireless Sensor Network Stacks with Multi-Processor Support
2277.
Power-Management Strategies for a Grid-Connected PV-FC Hybrid System
2278.
Reconfigurable Modified Viterbi Decoder For A WiFi Receiver
2279.
Implementation of mobile crowd network for equalized distribution of work processing
2280.
Implementation Of I2c Multi Task And Multi Slave Bus Controller Using Verilog
2281.
The Role of Informatics in Cancer Personalized Medicine
2282.
Component-Based: The Right Candidate for Restructuring the Nature of Software Development in Organizations
2283.
A Data mining model for Customer Relationship Management -A Review
2284.
A Review on Energy Efficient Clustering Techniques in WSN
2285.
A study on Task Scheduling Algorithms in Grids
2286.
Stochastic Analysis Of The LMS And NLMS Algorithms For Cyclostationary White Gaussian Inputs
2287.
Study of Growing Grapes Technique for Malware Detection
2288.
Confined Decentralize Cloud Storage Using Authentic Access Contol Scheme
2289.
Public Sentiment Interpretation On Twitter - A Survey
2290.
Development and Characterization of Hybrid Natural Fiber Reinforced Composites based on Poly- propylene Resin
2291.
Comparison of AOMDV With and Without Black Hole Attack
2292.
FRDMS For Fuzzy Querying Based On GEFRED Model
2293.
Improving the Security of Workflow-based System using Multiple XML Digital Signature
2294.
Comparison of Improved Routing Protocol (IPL_AOMDV) and Existing Routing Protocol (PL_AOMDV) For Wireless Ad-hoc Network
2295.
A Novel Fuzzy Based Single Switch Converter For High Speed Srm Drive Applications
2296.
Medical Image Fusion Using Redundant Wavelet Based ICA Co-Variance Analysis
2297.
Multidimensional Image Compression
2298.
Resourceful Power Aware Routing Protocol in MANET
2299.
Weighted Guided Image Filtering For Image Fusion
2300.
Improved Degraded Document Image Binarization Using DBMF And Edge Pixel Stroke
2301.
Aperiodic task Scheduling Algorithms for Multiprocessor systems in Real Time environment
2302.
Building Secure, Concurrent, Distributed DBaaS with Confidential Data over Threshold Access Structure
2303.
A Fuzzy Improved ACO Approach for Test Path Optimization
2304.
Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud Computing
2305.
Interactive Dustbin
2306.
A Review of Web Forum Crawling Techniques
2307.
A Rational Approach on Model Based Slicing
2308.
Inter frame Video Duplication Forgery Detection: A Review
2309.
Data Encoding And Decoding Techniques For NOC Applications
2310.
Space Time Block Codes With Spatial Modulation
2311.
Data Center Management: Viewing Racks in the Network through Dot net platform
2312.
SQL Injection Detection Based On Replacing The SQL Query Parameter Values
2313.
An Algorithmic approach to improve Network Performance for 1G-EPON
2314.
Prevention Of Cross Site Scripting Attack Using Filters By String Based Approach
2315.
Papr Reduction In Ofdm System By Using Clipping And Filtering And Weighted Method
2316.
Optimized Multimodal Medical Image Fusion Approach Based On Phase Congruency And Directive Contrast In Nsct Domain
2317.
Review Paper on Various Data Hiding Techniques
2318.
LTE-Advanced communication using in Femtocells Perspective
2319.
Transformation-based Optimizations Framework (ToF) for Workflows and its Security issues in the Cloud Computing
2320.
Reduction Of Switching Activity In Noc By Using Data Encoding Schemes
2321.
Design and Implementation of Vedic Algorithm using Reversible Logic Gates
2322.
Design of a Sun Tracker with Position Display
2323.
A Survey on Detection and Prevention of Black Hole & Gray hole attack in MANET
2324.
High Gain Multi Level Dual Load SEPIC Converter for Incremental Conductance MPPT
2325.
Efficient Incremental Clustering of Documents based on Correlation
2326.
A 16-Core Processor with Shared-Memory and Message-Passing Communications
2327.
Macs of Traction
2328.
Study of Cryptography and Steganography System
2329.
An Enhancement on EASR Method for Sink Relocation in Wireless Sensor Network
2330.
Watermarking For Digital Content- A SURVEY
2331.
Identification of User Search Behavior through Task Trail Clustering
2332.
Forestalling Against Data Breaching
2333.
A Novel Approach For Medical Image Fusion Based On NSCT Theory
2334.
Impact of Cloud Based Services on Mental Health
2335.
Real-Time GPS/GPRS Based Vehicle Tracking System
2336.
Study of Grid and Cluster based Network in Wireless Sensor Network
2337.
An Enhanced General Self-Organized Tree-Based Energy-Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
2338.
An Approach to Implement Map Reduce with NoSQL Databases
2339.
Computer as An Essential Tool For Teaching and Learning In the Modern World: Case Study of Selected Secondary School within the Maiduguri Metropolitan Council, Borno State
2340.
Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing
2341.
Spray Forming of Al-10Si-20Pb, Al-10Si-20Sn and Al-20Sn alloy: A Comparative study of their microstructure and wear characteristics
2342.
Spectral _Spatial Classification For Hyper Spectral Images Based On An Effective Extended Random Walker
2343.
AID for Narcolepsy People
2344.
Design of An Efficient Aging-Aware Reliable Multiplier Based On Adaptive Hold Logic
2345.
Minimizing Time Complexity based on Parallel Processing using RNS for Audio
2346.
Exploiting a Protocol at network frame to avoid packet failure
2347.
Text Mining using Ontology based Similarity Measure
2348.
Kindiling And Perception Of Qr-Images Using Raspberry-PI
2349.
Quality Of Experience In Remote Virtual Desktop Services
2350.
ARM Based Application Of Data Hiding Process By Using Anti Forensics Technique For Authentication
2351.
Design of Wireless Variable Gesture Control For Mobile Devices
2352.
Design Of Energy-Efficient Clustering Algorithm for Large Scale Wireless Sensor Networks
2353.
A Feasible Approach to Design a Cmos Domino Circuit at Low Power VLSI Application Design
2354.
Design And Development Of Algorithm To Avoid Wormhole Attacks In Wireless Networks For Proactive Algorithms
2355.
Cloud ‘As -a- Service
2356.
Wavelet based denoising of brain MRI images
2357.
Improved Gradient & Multiple Selection Based Sorted Switching Median Filter
2358.
Lung Cancer Identification Using CT Images
2359.
Predicting Patterns over Protein Sequences Using Apriori Algorithm
2360.
Event Detection in Twitter Using Mentioning Practice of the User
2361.
Web Based Spatial Query System for Decision Making
2362.
To Automate the Services Life Cycle of Cloud Using Semantic Technologies
2363.
Cloud and Virtualization: Interdependency
2364.
Increasing Coverage in Wireless Mesh Networks: Mobile mesh networks
2365.
A Novel Ber Analysis Approach For Different Modulation Schemes For Conventional And Wavelet Based Ofdm System
2366.
Impacts of Television Serials on Tamil Rural Women: A Data Mining Case Study of Theni District
2367.
Performance Evaluation of LMS, DLMS and TVLMS Digital Adaptive FIR filters by using MATLAB
2368.
Vision Assisted Web structure and Data Extraction Methods
2369.
Congestion Control Load Balancing Scheme Intended for Improving Performance of MANET
2370.
Improved Dominant Brightness Level Based Color Image Enhancemrnt Using Bilateral Filter
2371.
Recognition Text for Liver Cell Lab Reports Based on Hybrid HMM Approach
2372.
A Review on various techniques of hiding Association rules in Privacy Preservation Data Mining
2373.
A Hybrid Approach to Social Context Based Scalable Recommender System
2374.
A Review on Location Aided Routing Protocol in Mobile Adhoc Networks
2375.
Comparative Scenario between Grid and Grid based Cluster network in Wireless Sensor Network
2376.
A Survey On Routing Issues And Routing Protocols In Wireless Sensor Networks
2377.
Novel Technique for Parallel Pipeline Double Precision IEEE-754 Floating Point Adder
2378.
Survey On Automatic Cancer Detection And Diagnosis
2379.
A Comprehensive Review on Image Fusion Techniques
2380.
Introduction of Hadamard Coded Modulation For Optical fiber communications systems
2381.
Electronic Products and E-Waste Management –an approach to minimize & Regulate e-Waste in country, India.
2382.
SCORM/AICC Compliance in Learning Management System and e-Learning: A Survey
2383.
Smart Diabater: Android Based Diabetics System
2384.
A review on markov models and web page prediction
2385.
Query Recommendation Approach For Searching Database Using Search Engine
2386.
Development Of Mobile Payment System: An Implementation Of Cashless Economy
2387.
A Computational Approach for Better Classification of Breast Cancer using GeneticAlgorithm
2388.
Generating Private Recommendations Using ElGamal Homomorphic Encryption
2389.
A New Approach to Automatic Generation of All Quadrilateral Finite Element Mesh for Planar Multiply Connected Regions
2390.
Extended Approach of Visual Secret Sharing for Digital Images
2391.
Rain Streaks Removal from Single Image
2392.
Review of model based approach for automating the test case generation for Object Oriented Systems.
2393.
Anatomization of Medical Image Segmentation with Novel Proposal
2394.
Cloud Architecture for Big Data
2395.
A Comprehensive Survey on Hidden Web Crawler
2396.
Proposed Method for Securing Image Using Visual Cryptography
2397.
Multiparty Access Control and Content Based Filtering for Online Social Networks
2398.
Review: Applications of Ant Colony Optimization
2399.
Design of Enhanced Entropy based Feature for CBIR
2400.
Simulation and Analysis of Ad-hoc routing protocols under varying density and mobility in VANET
2401.
An Introduction of Cloud Computing Security and Privacy Issues in IT Industries
2402.
Activities Log In Enterprise Social Network- A Review
2403.
Study on Mining Weighted Infrequent Itemsets Using FP Growth
2404.
Deliverable Management In Projects
2405.
Image Watermarking Based On DWT, DCT and SVD Techniques
2406.
An Efficient Approach for Relevance Feedback in CBIR using Navigation Patterns
2407.
Dynamic Trust and Security Management Protocol For Delay Tolerant Networks using Information centric-Networks Architecture
2408.
Implementing Actual Working Like Intuition Mechanism In Artificial Neural Network
2409.
Social Network Based Security Schema for Botnet Detection and prevention
2410.
Cloud Data Center's Resource Provisioning With Secured Mining In Distributed Mechanism
2411.
Privacy Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data
2412.
Building an Interactive environs for Blind Students with RFID Technology.
2413.
Reliability and Availability of FSO for different Weather Conditions
2414.
Improving SNR Of Radar Signal Using Wavelet De-Noising Scheme
2415.
Enhanced Vulnerability Analysis For Clickjacking Web Attack And Providing Security Using Whitelisting URL Analyzer
2416.
Performance analysis of Symmetric Key Algorithms: DES, AES and Blowfish for Image encryption and decryption
2417.
The Theory of Changes in Extreme Conditions The Properties and Trends of Changes and Movements The Theory of the Dynamic Structures
2418.
Design and Performance Analysis of LC Oscillator and VCO for ISM and WI-FI Band Applications
2419.
Indoor Positioning System for Retail
2420.
Securing Hadoop Using Layered Approach
2421.
Designing and Implementation of Iris recognition System Using Morphological Bridged Canny Edge Detection and KNN Classifier
2422.
Implementing Java Distributed Objects
2423.
Survey on Data Mining and IP Traceback Technique in DDoS Attack
2424.
WiMAX Tracker
2425.
Cross-Layer Approach for Minimizing Routing Disruption with Load Balancing in IP Networks
2426.
Unit Level Web Databases Searching
2427.
Study of Enhancing ARM Algorithms with Map Reduce Framework
2428.
Design and Construction of Groundnut Oil Expeller
2429.
Analysis Of Emotion Recognition System Through Speech Signal Using KNN, GMM & SVM Classifier
2430.
Enhancing TCP in mixed wired wireless environment using Time Agents
2431.
A Review on Various Data Routing Techniques in WSN Communication
2432.
An Efficient Trip Planner for Time Dependent Road Networks
2433.
Smart Vehicle Security System Using GSM & GPS
2434.
Design ALU Based online BIST for Multi word-width RAM’s
2435.
“Study of Characteristics Performance of VCR Engine for Different Fuels”
2436.
FPGA Design Of High Throughput STBC-OFDM System For Low Power Applications
2437.
Design of high performance SRAM cell using 12T MTCMOS Technology
2438.
Digital Signal Processing For Optical OFDM Based Future Optical Networks
2439.
Experimental Investigation Of Performance And Emission Characteristics Of Tamanu Oil As Alternative Fuel In Ci Engine
2440.
A Novel Data Hiding Scheme Based on Fused Adaptive and Nonadaptive Technique
2441.
A Review On Comparative Analysis Of Different Transport Layer Protocols In MANETs
2442.
Data Dictionary Based Mechanism against SQL Injection Attacks
2443.
Design secure sharing protocol
2444.
Sensor-based System for Monitoring of Child movements & falls
2445.
Performance Analysis On Concrete Photovoltaic/Thermal Water Collectors
2446.
Brief Literature Survey on WSN Routing Protocols
2447.
Image Steagnography: A Review
2448.
Types and Tools Available for Fluency Disorder –Speech Therapy
2449.
Graphical Modularity Analysis Using Force Directed Approach
2450.
A Comparative Performance Analysis of AODV and DSR Routing Protocols for Vehicular Ad-hoc Networks (VANETs)
2451.
A Study on Strength Properties for Cement Mortar added with Carbon Nanotubes and Zeolite
2452.
Implementation of an Android Application for Management of a Housing Society
2453.
A Comprehensive Survey on Internet Protocol Television (IPTV)
2454.
Indepth Packet Inspection Using Modified Enhanced Multipattern Matching Algorithm
2455.
Enhanced Fingerprint Recognition Techniques
2456.
Systematic Approach to Extract Medical Relations using Machine Learning Approach
2457.
Privacy Preserving Public Auditing Mechanism For Shared Data In Cloud Computing Environment With Dynamic Groups
2458.
Design and Analysis of Hexagonal Fractal Antenna for UWB Application
2459.
Closed Loop Control System and Remote Monitoring In Agriculture for Social Modernization
2460.
Power Flow Control in Transmission Line Using IPFC Equipped with Fuzzy Logic Controller
2461.
Solar Irradiance Measurement Using Neuro Fuzzy Network
2462.
EETSR: Energy Efficient Threshold Sensitive Hierarchical Routing Protocol for Wireless Sensor Network
2463.
Online Polling System Using Extended Visual Cryptography
2464.
A Review on Load Balancing In Cloud Computing
2465.
A Review on Various Approaches Utilized for image segmentation
2466.
Properties of Municipal Solid Waste Incinerator Ash in Concrete
2467.
Experimental investigation on different properties of hazardous incinerator bottom ash concrete
2468.
LTE-Advanced: Femtocell Perspective
2469.
Local Independent Projection Based Classification Using Fuzzy Clustering
2470.
Simulation Of Echo Canceller For Network Extender
2471.
Quantum Cryptography, its Protocols and Techniques
2472.
Performance Analysis of OTDM System at the Different Data Rate
2473.
Bit Error Rate Analytical Approach For Different Modulation Techniques Based On Comparison Of Conventional And Wavelet Based OFDM LTE Mechanisms
2474.
Optimal placement of DG in a Distributed Generation Environment
2475.
Computational Intelligence for fault detection in power distribution network using ANN
2476.
Design and Development of MANETs with Quality of Service Parameters
2477.
Performance Analysis Of Various Phases Of Srm With Classical & New Compact Converter
2478.
A Novel Semi Automatic Web Composition for Users Social Interactions
2479.
Steganography in True Color Images Using Even Odd Bit Slicing
2480.
Design and Parametric Optimization Of Heavy Duty Leaf Spring
2481.
An Efficient Design and Implementation of ALU using Gated Diffusion Index
2482.
Survey on Data Extraction and Annotation Methods
2483.
Finite Element Analysis on the Structural Behaviour of Bolted Joints
2484.
Performance Evaluation of Various Cluster based OFDM Schemes
2485.
Extended Two Phase Commit Protocal In Real Time Distributed Database System
2486.
Parametric Modeling & Study Of Structural Characterics Of Wind Turbine Blade
2487.
Flexibility Analysis of A Bare Pipe Line Used For Cryo Application
2488.
An Energy Efficient Multichannel Mac Provisioning In MANETS
2489.
A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
2490.
Security in Wireless Sensor Networks using Trust Based Distance Bounding
2491.
Content Dependent Video Retrieval System
2492.
Prevention And Elimination Of Vampire Attacks That Drains Life From WSN Using IDS
2493.
Power Aware Cluster Based Routing With Sleep Scheduling in WSN (PACBR)
2494.
Hybrid Intrusion Detection Architecture for Cloud Environment
2495.
A Survey on Speech Enhancement Techniques
2496.
Categorization of Text into Appropriate Sentiment for Automatic Synthesis of Expressive Speech
2497.
Hybrid Approach For Wireless Sensor Network
2498.
Implementation of High Efficiency Video Coding (HEVC) Decoder for Medical Video Applications
2499.
Text Detection and Character Segmentation from Natural Scene Images Based Using Graph Cut Labeling
2500.
PlSI Is A Way To Summarize The Search Result
2501.
Geographical Image Retrieval
2502.
Comparison of Image Fusion Techniques: Spatial and Transform Domain based Techniques
2503.
A Method For Measuring The Accuracy Of Multi-Modal Medical Image Fusion Using Non-Subsampled Contour Transform And Pulse Couple Neural Network
2504.
Performance Evaluation Of PAPR Reduction In OFDM System Using Non Linear Companding Transform
2505.
Efficient Technique for Providing Authentication of Short Encrypted Messages
2506.
Anonymous Authentication of Cloud Data Storage using Decentralized Access Control
2507.
Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
2508.
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
2509.
Comparative Study of Some Engineering Properties of Aluminium Roof Sheets Manufactured In Nigeria and China
2510.
An Efficient Authentication Scheme for Wireless Sensor Network
2511.
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
2512.
A 16-Bit Ripple Carry Adder Design Using High Speed Modified Feedthrough Logic
2513.
A Traffic Model for Routing Logic in Network On Chip
2514.
Towards Secure and Dependable Message Authentication in WSN
2515.
Better Performance Codes Of UWB Based Systems For Wireless Body Area Network
2516.
Web Data Extraction Using Partial Tree Alignment
2517.
Wireless Networks – Analysis on Prevention of Jamming Attacks
2518.
Ingenious Armor For A well Being Society
2519.
Modelling And Simulation Of STATCOM For Compensation Of Reactive Power To Improving The Power Quality By Using PI With Fuzzy Logic Controller
2520.
An Experimental Study of Data Mining Techniques in Blood Donors Sector
2521.
Secure Role Based Cloud System By Integrating Trust and Role Based Encryption Scheme
2522.
Compression On Wireless Sensor Network With Performance Guarantee
2523.
Hidden Markov Model With Biclustering Cache Replacement Policy For Location Based Services In MANET
2524.
Visual Cryptography and BPCS Steganography for Data Shielding
2525.
An Experimental Study of Data Mining Techniques in Blood Donors Sector
2526.
An Optimized Image Encryption Technique for Multikey conservative chaotic system
2527.
Design of Environment Monitoring and Control System
2528.
Tracking And Scheduling of State Transport Bus using RFID
2529.
Image steganography for hiding videos
2530.
Designing of Hydraulic Ram Pump
2531.
Design and Optimization of Planar Antenna With horizontal slit for ISM Band(2.4 GHz) Applications
2532.
Search Engine Results Clustering Using TF-IDF Based Apriori Approach
2533.
A Survey on Coverage Problem in Wireless Sensor Network
2534.
Comparative study and evaluation of various data classification techniques in data mining
2535.
A Survey on Different Methods for Design of Sparse FIR Filter
2536.
Spatial And Temporal Characterization Of 433mhz Radio Base Wsn In Outdoor Environment
2537.
Optimization of Search Engine contents
2538.
To Know About The Latest Bluetooth As A Wireless Technology
2539.
Potential Of Replication In Distibuted R.T.D.B.
2540.
Feature Based Detection Of Liver Tumor Using K-Means Clustering And Classifying Using Probabilistic Neural Networks
2541.
Various Bit-Rotation Technique On Key-Symmetric Matrix
2542.
Temperature control of CSTR using PID Controller
2543.
A survey on Efficient Geographic Multicasting Protocol
2544.
PAPR and SNR performance analysis of IFDMA and LFDMA technique in a single carrier frequency division multiple access system
2545.
Re-Encryption with Attribute Key Management for Secure Transactions in Cloud
2546.
Mammogram Image Preprocessing for detection of masses in Breast Cancer
2547.
Denoising Of Medical Ultrasound Images In Wavelet Domain
2548.
iSearch-Enterprise Search Solution
2549.
An approach to implement Energy Efficiency for MAC Protocol in WSN
2550.
Personal Emergency Notification Application for Mobile Devices
2551.
Black Hole detection and avoidance in mobile Adhoc Networks
2552.
Intrusion Detection in Heterogeneous Wireless Sensor Networks using Multi-layer Multi Detector Approach
2553.
Non-Linear Data Perturbation Method for Privacy Preserving Data Mining
2554.
Implementation of Digital Pixel Sensor Based Parallel Architecture For Automatic Braking System in Automobiles
2555.
Power Reduction with FlipFlop Grouping in Data Driven Clock Gating
2556.
Design And Implementation Of High Efficient And Performance Of Modified Adder Circuit Using 128 Bit CSLA And BEC Adder For Filter Design
2557.
A Design of Low Power Low Area High Speed Full Adder Using GDI Technique
2558.
Artificial Intelligence Based Speed Control of Induction Motor- A Detailed Study
2559.
Secure Scheme over private Cloud data supporting Semantic Relation
2560.
Transformerless Inverter With Virtual Dc Bus Concept For Cost-Effective Grid-Connected Pv Power Systems
2561.
A Hybrid Encryption Algorithm Based on DES and RSA In Bluetooth Communication
2562.
Text Extraction From Images With Edge-Enhanced Mser And Hardware Interfacing Using Arduino
2563.
“An Effective Image Encryption Based On The Combination Of Scan And Elgamal Method”
2564.
High Speed Fused Add-Multiply Operator Design Based On SQRT-CSLA Adder
2565.
Efficient Multiclass Classification Model For Imbalanced Data.
2566.
Heat Template Generator in Openstack
2567.
A Survey of different decoding schemes for LDPC block codes
2568.
Flight Delay Prediction System Using Weighted Multiple Linear Regression
2569.
AppML : An Idea of Mordern Web Development
2570.
Implementation of a visible and invisible video watermarking technique
2571.
Increasing of CIR Performance of the OFDM System without Increasing Hardware Complexity
2572.
Word Sense Disambiguation: A Survey
2573.
An Efficient Sdmpc Metric Based Approach For Refactoring Software Code
2574.
Review of Online & Offline Character Recognition
2575.
An Automated guided model for merging news into Stock Trading Strategies
2576.
Dynamic Web-Based Mobile Application For Traffic Police
2577.
Using Business Intelligence For Mining Online Reviews For Predicting Sales Performance
2578.
Graph Based Approach For Multi Document Summarization
2579.
A Novel Combination of Encryption and Compression for Privacy Protection by Using BTC
2580.
A Real Time Automatic License Plate Recognition Using Optical Character Recognition
2581.
Proficient Techniques For The Enhancement Of Horizontal Aggregations In SQL
2582.
A Study of Various Web Page Recommendation Algorithms
2583.
Secure Video watermarking Algorithm Using K-harris feature point detection with dual watermarks
2584.
New Compressive Sensing Inter Cluster Data Aggregation Based Ileach Protocol For Homogenious Wsns
2585.
A Novel Non Linear Distortion Suppressed, Pre-Compensation for A 10.7-Gb/S System Employing A Directly Modulated Laser
2586.
BER and PAPR Reduction in OFDM System By Using Companding Technique
2587.
Clipping Technique for BER and PAPR Reduction in OFDM System
2588.
Comparative Study of Error Performance in Modulation Schemes for VLC Systems
2589.
Detecting Attack Packets by Using Darpa Dataset on Intrusion Detection System
2590.
Virtual Mouse using Eye Tracking and Face in various Illumination Environment.
2591.
Geometry Based Efficient Routing Protocol In Wireless Sensor Networks
2592.
Literature Review on Fem Analysis Of Disc Brake System
2593.
Design and Analysis of Low Power Pulse Triggered Flip-Flop
2594.
Mobile barcode system with Inventory management and Employee work tracking using Google Analytics
2595.
Task Ranking Based Allocation of Scientific Workflows in Multiple Clouds with Deadline Constraint
2596.
An Efficient Image Forgery Detection Method with Dempster Shefer’s Theory for Detecting Jpeg Anti-Forensics
2597.
An Effective Load Balancing In Long Term Evaluation Self Optimization Network Using Multi Objective Optimized Algorithm
2598.
On Demand Load Balance Secure Routing Scheme For Mobile ADHOC Network
2599.
Speed Control and Direction Control of Dc Motor Using Arm7
2600.
Survey on Efficient Retrieval of Nearest Neighbor over Relational Database by using Keywords
2601.
Secure Mechanism for Credit/Debit Card Transaction Fraud Detection by using Fingerprint Authentication System
2602.
Image Enhancement using DWT
2603.
Security Lock System for Fake Traits Based on Image Processing
2604.
A Novel Approach For Authorized Deduplication
2605.
Image Registration Techniques: A Review
2606.
Efficient Validation and Source Aloofness in Wireless Sensor Networks
2607.
Identity-Based Encryption for Preserving Privacy In Cloud For Publish/Subscribe System
2608.
Clustering of E-mails Using Pattern Matching
2609.
A Combined Effective Time Dependent Matrix Approach to Analyze the Men Affected by Cardiovascular Disease (CVD) in Chennai
2610.
Frequent Pattern Mining
2611.
Privacy-Preserving Public Auditing for Shared Data in the Cloud
2612.
Dynamic Route Allocation for Guaranteed Data Delivery in Mobile Ad Hoc Networks using DPRP & VDVH
2613.
Query Recommendations for Interactive Database Exploration
2614.
Expansion Of Current Wi-Fi Implementation Through Energy Efficient Way
2615.
Enhancing Data Security in Neural Network Computing Using Biometrics
2616.
ITS Cluster Based Efficient Exemplar Image Inpainting Technique
2617.
Survey On Business Model For Cloud Computing Using Rsa & Aes Algorithm
2618.
istribution Based Model to Improve the Tradeoff between Reliability and Energy Efficiency
2619.
Specification of Software Components
2620.
External radiation dose measurement in private nuclear medicine and diagnostic x-ray facilities in Bangladesh
2621.
Online Mobile Cloud Based Compiler
2622.
A Survey of Trust Management using types of Uncertain Reasoning in Network Environment
2623.
An Efficient Solution To Task Scheduling And Memory Partitioning For Uniprocessor
2624.
Survey on Improving System Security using BGP and IP Prefix Hijacking
2625.
Factor Authentication for Banking System by using Android based Smart Phones
2626.
Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession
2627.
Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm
2628.
Result Evaluation of Dynamic Topology Control Using Quality Estimation Factors for Mobile Ad-Hoc Network
2629.
Design of FIR filter using Matlab Simulink and Xilinx system generator
2630.
An Efficient Pairwise Key Establishment Scheme for Wireless Sensor Networks Using ORP
2631.
Survey on A Methodology for Sensitive Attribute Discrimination Prevention In Data Mining
2632.
Steganalysis using hopping cluster algorithm
2633.
Survey on Evaluation of Recommender Systems
2634.
Social Sensing: An Exploratory Investigation for Smart City
2635.
Heart Rate Frequency Detection System Based On Digital Signal Processing
2636.
Identify Obstacles of Different Types in the Path of UGV Using Region Based Image Segmentation
2637.
Decision Trees for Uncertain Data
2638.
Performance Evaluation of AODV and DSR Protocols in MANET
2639.
A Comprenssive Survey On Different Methods For Detecting Salient Object
2640.
Development Of A Circulation Library System(Case Study Of T.Y Danjuma Library - Acu)
2641.
Metals in E Waste Causing Concerns in Bihar
2642.
Big-O Test of RSA Algorithm Complexity in Civil DataBase ( SIN / eID )
2643.
Design and Implementation of Multiple LED Notice Boards by Using ZIGBEE Technology
2644.
Performance Analysis of Fault Tolerance using Clustering Scheme for Wireless Sensor Network
2645.
IVR System for three phase motor protection, Control and Alert system using GSM
2646.
A Survey Of Digital Watermarking Techniques
2647.
A Smart Real Time Ridesharing And Travel Assistance
2648.
Survey of SMS Based FAQ Retrieval Systems
2649.
A Data Mining Approach To Insurance Risk Analysis
2650.
Automation of Electricity Management
2651.
A Study on Mobile Networks and 3d Self-Deployment Algorithm
2652.
Improving Cloud Data Storage Using Data Partition and Recovery
2653.
IVR System for three phase motor protection, Control and Alert system using GSM
2654.
Software Project Risk Assessment based on Neuro-Fuzzy Technique
2655.
Software Testing as a Service (STaaS) using Cloud Computing
2656.
Passive Optical LAN as an emerging LAN Architecture
2657.
Single-Stage Reconfigurable Solar Converter for Grid-Linked System by using a fuzzy logic
2658.
An Application Deployment to Openshift Cloud Using Existing Git Repository From Local Client
2659.
A Compressive Survey on Active and Passive Methods for Image Forgery Detection
2660.
Identity Based Secured Distributed Data Storage Schemes
2661.
Different Methods of Classification of Documents A Survey Paper
2662.
Search Results Clustering using TF-IDF Based Apriori Approach: A Survey Paper
2663.
Enhancing Information Management System performance by specializing the concept of Indexing
2664.
Analysis and Simulation of Orthogonal UWB Pulse for Modulation Scheme and Transmission
2665.
Automation of Electricity Management
2666.
Cab Tracking And Personal Security System
2667.
Improved Energy Consumption and Resource Utilization through Sensor Virtualization in Smart home
2668.
A Novel And Improved Technique For Clustering Uncertain Data
2669.
Integration of Wireless Network in WiMAX and Wi-Fi Wireless Technology Communication
2670.
Data Privacy in Multi Cloud Environment using Third Party Key Providence in Public Clouds
2671.
Introduction of “Internet of Things” its Application and Challenges
2672.
A Survey of Various Scheduling Algorithms and types of Resources Provisioning in Cloud Environment
2673.
Scalable Push Pull architecture for retrieving student information request and response with data wrappers
2674.
Review on Performance of MANET Using Different Routing Algorithm
2675.
Review on Xml Tree Pattern Matching Using Holistic Algorithms
2676.
A Review On Palmprint Recognition Using Features From Principle Lines
2677.
Examplar Based Inpainting Mechanism Based On Sr Algorithm
2678.
Dual Tree Complex Wavelet Transform Based On Noise Reduction Using Partial Reference
2679.
To propose a new algorithm for improving software architecture with clustering algorithm
2680.
Context-Aware Approach for enhancing security and privacy of RFID
2681.
A Novel Fusion Approach by Non-Sub Sampled Contourlet Transform
2682.
Mining Educational Data for Predicting Higher Secondary School Student’s Grade Using ID3 Algorithm
2683.
A Survey on Different Methods for Hiding Information behind an Image
2684.
An Intrusion Detection System Based On Support Vector Machine Using Hierarchical Clustering And Genetic Algorithm
2685.
Evaluation of Network Performance Using Upper Threshold RED
2686.
Embedded Based System for the Fruit Quality Management Using PIC Micro Controller
2687.
Maximum Power Point Tracking System for Wind Generator Using MATLAB.
2688.
Constructing Horizontal layout and Clustering Horizontal layout by applying Fuzzy Concepts for Data mining Reasoning
2689.
iOS Based Multipurpose Application for Task Scheduling with Voice Command Handling
2690.
A brief study on different operating system
2691.
ECC Based Prevention for Side Channel Attack: A Survey
2692.
Survey on Different types of Neural Network Techniques to Classify Human Face
2693.
Achieving MAC Fairness Using Binary Exponential Backoff (BEB) Algorithm in Wireless Adhoc Network
2694.
Improving Security and Reduce Overhead in Mobile Health Monitoring
2695.
A Configurable Bus-Tracer For Errorreproduction In Post-Silicon Validation
2696.
Retrieving Of Images Using Pseudo Zernike Moments
2697.
A Review on Distributed Application Processing Framework – Clone Cloud
2698.
Predicting Student Performance Using MapReduce
2699.
Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
2700.
Evolution of Hand Gesture Recognition : A Review
2701.
Development of a Timed Coloured Petri Nets Model for Health Centre Patient Care Flow Processes
2702.
Farm Monitoring Mobile Robot Speed Controlled of DC Motor Driver System Using PID Controller.
2703.
Innovation and Knowledge Cluster in 21st century: An Economic Manifesto for e-Learning Future
2704.
Data Cleaning System to Handle Noisy Data
2705.
Closed loop control of curing process using Lab VIEW
2706.
Privacy Preserving Public Auditing and Recovery Using Backup & Restore Method for Secure Cloud Storage
2707.
Migration to Next Generation IP Network
2708.
An Improved Steganography Technique of LSB Substitution Method
2709.
Deciphering The Prominent Security Tools Ofkali Linux
2710.
The Concept of Time and Space on the Internet Analyzed through the Pseudonymous
2711.
Advance Resistor Value Calculator with MATLAB
2712.
Cancelable Template Generation Based On Imrpoved Quality Fingerrint Image For Person Authentication
2713.
Solar Radiation Prediction with Single Diode Photovoltaic Module
2714.
Secure Geographic Routing Hybrid Approach For Void Resolution In Wireless Sensor Network
2715.
An Overview of Load balancing Techniques in Cloud Computing Environments
2716.
Introduction to technique of Soft Computing: Artificial Neural Networks
2717.
To Study the Wireless Sensor Networks, Architecture and Design Issues Related To WSN
2718.
Resilient modulus of different asphalt mixtures of varying bitumen content by performing Creep test using UTM-5P
2719.
Android App for Meter Reading
2720.
A Review on Automatic Speech Recognition System
2721.
To Improve the Power Quality by Varying the Block Parameter (KP, Ki , Kd)
2722.
A Survey Paper on "Effective Navigation in Website
2723.
Enhancement of SMAC Using Clustering Approach in Wireless Sensor Networks
2724.
Next Generation Networks (NGN) Billing and Charging System
2725.
Capacity Analysis of MIMO Technology
2726.
Optimization Techniques For High Performance Content Downloading And Data Access In Vehicular Networks
2727.
DESIGN AND IMPLEMENTATION OF USB DRIVER FOR REAL TIME APPLICATION
2728.
A Survey on Dynamic Load Balancing Strategies for A Distributed Computer System
2729.
Tree Detection for Urban Environment Using Watershed Segmentation
2730.
Duplicate Detection Algorithm In Hierarchical Data Using Efficient And Effective Network Pruning Algorithm: Survey
2731.
An Efficient Technique for Parallel CRC Generation
2732.
A Research Paper on Content Based Image Retrieval System using Improved SVM Technique
2733.
Evaluating the key findings of Image Fusion Techniques
2734.
Metadata Construction Model for Web Videos: A Domain Specific Approach
2735.
FIS for Edge detection based on the method of convolution and a mixture of Gaussian and triangular membership functions
2736.
Preventing Senstive Social Network Data By Using UINN Algorithm
2737.
Reliable Techniques for Data Transfer in Wireless Sensor Networks
2738.
Evaluating Effectiveness of 3D object picking algorithms in Non immersive virtual world
2739.
Detecting and Preventing Distributed Denial of Service (DDOS) Attacks Using BOTNET Monitoring System
2740.
Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling
2741.
Face Recognition Using Image Processing Techniques: A Survey
2742.
Noise Power Spectrum for Transfer Press Machines
2743.
Latent Overlapped Fingerprint Matching Using Level-2 and Level-3 Features Refinement
2744.
Tracking Online Assessments through Information Visualization
2745.
OpthoABM-An Intelligent Agent Based Model for Diagnosis of Ophthalmic Diseases
2746.
Development of Cognitive Architecture using Ambient and Swarm Intelligence for the Agents
2747.
An Optimize Mechanism for Multifunction Diagnosis of Kidneys by using Genetic Algorithm
2748.
Automatic Colour Mixing Machine using PLC
2749.
An Efficient Content Based Image Retrieval System for Sketches by Using PAM Algorithm
2750.
Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
2751.
A Literature Survey on performance evaluation of query processing on encrypted database
2752.
Optimized super pixel segmentation for natural image using lazy random walk algorithm
2753.
Multimedia Data Mining- A Survey
2754.
Using data mining in prediction of educational status
2755.
Utilization of Recycled Demolition Concrete
2756.
Design of Low Power 9T Full Adder Based 4*4 Wallace Tree Multiplier
2757.
Discussion on Very Small Aperture Terminal Networks
2758.
Cyber-bullying
2759.
Restoration of Historical Wall Paintings Using Improved Nearest Neighbour Algorithm
2760.
Survey of various query suggestion system
2761.
Novel Approach for Predicting Performance Degradation in Cloud
2762.
A Framework for Privacy Preserving Collaborative Data Mining
2763.
Gender Recognition and Age-group Prediction: A Survey
2764.
Investigating the ways through evaluation practice in higher Education: the value of a learner’s need
2765.
A Survey on CBIR Features Extraction Techniques
2766.
Data Integrity Proofs in Document Management System under Cloud with Multiple Storage
2767.
A Review Paper on Collaborative Black Hole Attack in MANET
2768.
Creating a Knowledge Base by extracting Top-K lists from the web
2769.
Heat Generation and Chemical Reaction Effects On MHD Flow Over An Infinite Vertical Oscillating Porous Plate With Thermal Radiation
2770.
A survey on various summarization techniques
2771.
A Survey on Face Recognition and Facial Expression Identification
2772.
A Survey on different approaches of CBIR and their combinations
2773.
A Survey on Secure Reversible Data Hiding Techniques in Encrypted Images by Reserving Space In Advance
2774.
Review on Data merging and Data movement to accelerate Hadoop performance
2775.
Review on Big Data Security in Hadoop
2776.
A Survey on Sentiment Analysis And Summarization For Prediction
2777.
Review- Challenges in Face Authentication using Extended Principal Component Analysis
2778.
Improved Single Sign on Mechanism
2779.
Hand Gesture for Controlling a Robotic Device using a Personal Computer
2780.
Rule Mining in Medical Domain Using Swarm based Techniques
2781.
Digital Image Processing based Detection of Brain Abnormality for Alzheimer’s disease
2782.
Providing Security Features to Android OS With Multiuser Facility
2783.
Reliability Analysis of unreliable MX/G/1 Retrial Queue with Second Optional Service, Setup and Discouragement
2784.
An High Equipped Image Reconstruction Approach Based On Novel Bregman SR Algorithm Using Morphologic Regularization Technique
2785.
Energy Structure Theory and Energy Hinded Equation
2786.
A Study on Free Open Source Data mining Tools
2787.
DWT Based Hybrid Image Compression For Smooth Internet Transfers
2788.
Multiple Image Fusion Using Laplacian Pyramid
2789.
An integrated system for an effective e-teaching-learning process
2790.
Simplified approach towards DES
2791.
Toll collection and speed monitoring system using RFID
2792.
A Novel Framework for Satellite Image Resolution Enhancement Using Wavelet-Domain Approach Based On Dt-Cwt and NLM
2793.
Multiplex Data Transmission System over a Twisted Pair of Cable
2794.
Basic Overview of Mobile Cloud Computing
2795.
Rural Marketing in India: Challenges And Opportunities
2796.
T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
2797.
Using Educational Data Mining (EDM) to Prediction and Classify Students
2798.
Link Analysis in Relational Databases using Data Mining Techniques
2799.
The Performance Analysis of OFDM-IDMA in Wireless Communication by Using an Iterative Sub-optimal Receiver Structure
2800.
Design and Development of a Remote Monitoring and Maintenance of Solar Plant Supervisory System
2801.
A Review of Extraction of Image, Text-line and Keywords from Document Image
2802.
Wireless Data Acquisition And Transmission System Design Using Arm 9
2803.
Implementation Aspects To Secure Criticaldatain Public Cloud Network Using Opnet Simulator
2804.
A Secured and Controlled Billing System by Agent for Cloud Computing Environment
2805.
Dynamic Data Storage for Trustworthy Cloud
2806.
Intelligent Driver Assistance System using Image Processing
2807.
Simulation and Analysis of 4 bit applications using 9T full adder
2808.
Directive Contrast based Medical Image Fusion Using DWT
2809.
Matching Anonymized User Profiles In Mobile Social Networks
2810.
Transient Analysis of Unreliable Server MX/G/1 Queue with Bernoulli Vacation Schedule and Second Optional Repair under Controlled Admissibility Policy
2811.
Automated 3d-Image Extraction in Brain MRI Using Geometric Transformable Prototype
2812.
Identification Of Gender And Face Recognition Using Adaboost And SVM Classifier
2813.
Implementation of Can and Zigbee Networks Based Industrial Monitoring and Control Applications On Arm 7 Processor
2814.
Animated Pedagogical Agents: Face-to-Face Interaction in Interactive Learning Environments
2815.
FPGA Implementation of Binary Coded Decimal Digit Adder and Multiplier
2816.
Cloud Computing-Overview
2817.
Basic Overview of Mobile Cloud Computing
2818.
Energy Efficient Clustering Approach For Wireless Sensor Network
2819.
New Inverter Topology for Grid Support and Harmonic Mitigation For Interconnecting Renewable Power Generation Systems
2820.
A Novel Reference On Driving AThreePhase Brushless DC Motor With A New Matrix Converter
2821.
High Security System Provided By Steganographic Technique Using Palm and Iris Scan
2822.
A Block Based Novel Digital Video Watermarking Scheme Using DCT
2823.
Tap & Pay”Universal Transport Billing System Using RFID Smart Card
2824.
Electronic Waste Study & Facts in Bihar
2825.
GPS-GSM Based Advanced Tracking System
2826.
A New Topology for Speed control of Sensor less BLDC Motor with Reduced Commutator Switches and Improved Input Power Factor
2827.
Contactless Hand Gesture Recognition System
2828.
A Novel Approach for Facial Expression Recognition Rate (FER) By Using Tensor Perceptual Color Framework
2829.
The analysis of distance variation on microstrip Broadband bow tie antenna (BBTA)
2830.
A Service-oriented Architecture Based on Windows Communication foundation for Health Monitoring and Tracking
2831.
Solutions to the Bargaining Problem
2832.
Watermarking in Frequency Domain A Review
2833.
An approach to Re-evaluate CERS method for News Mining
2834.
Review of Histogram Equalization Techniques
2835.
A Literature Survey On Secure De-Duplication Using Convergent Encryption Key Management
2836.
Cloud Computing: VM placement & Load Balancing
2837.
Study Of Fault Prediction Using Quad Tree Based K-Means Algorithm And Quad Tree Based EM Algorithm
2838.
HAPTICS TECHNOLOGY: (sense of touch)
2839.
Controlled Bilateral Filter And Clahe Based Approach For Image Enhancement
2840.
Information-Theoretic Outlier Detection For Large_Scale Categorical Data
2841.
Gamma Distributions Model For The Breast Cancer Survival Data Using Maximum Likelihood Method
2842.
A New Design Of A Hybrid Encryption Algorithm
2843.
Entropy Reduction Based On K-Means Clustering And Neural Network/SVM Classifier
2844.
A Comprehensive Review On Fuzzy Logic System
2845.
A Survey On Flower Image Retrieval Based On Saliency Map And Feature Extraction
2846.
Color Constancy Techniques
2847.
Evaluation of Fusion Methods: Pan-Sharpening Methods
2848.
Effect Of Flow Charestric On The Heat Transfer Performance Across Low-Finned Fin Banks
2849.
Network Video Capture and Motion Detection Based On Embedded Linux with GSM Service
2850.
A Study on Semantic Web Languages and Technologies
2851.
Novel and Hybrid Technique for Efficient Intrusion Classification
2852.
Spurious Minutia Removal Technique using Euclidean distance approach
2853.
Analysis of Supervised algorithm for Voice Query Classification
2854.
Voltage Profile Improvement by STATCOM
2855.
Mixed DWT-DCT Approached Based Image Compression Technique
2856.
Fingerprint Matching with Ridge Ends and Virtual Core Point using Enhanced Concentric Ring Algorithim
2857.
Automated Tool for Plant Leaf Classification Using Morphological Features
2858.
Digital Image Steganography- Then, Now & Analysis of its Techniques
2859.
Generic Test Automation and Keyword Driven Approach
2860.
Design of A High Throughput Elliptic Curve Scalar Multiplier
2861.
Iris Segmentation and Recognization Using Log Gabor Filter And Curvelet Transform
2862.
Analysis of Single Frame Super Resolution Methods
2863.
Low Power Data Compression Algorithm For Wireless Sensor Networks Using VHDL
2864.
An Intelligent Transport Navigation and Vehicle Speed Monitoring System Using Arm9
2865.
Improving Mystery For Information Protection In Cloud Computing
2866.
Utilization Of Statcom Control For Fsig-Based Wind Forms Under Asymmetrical Grid Faults
2867.
Automatic Toll Gate Management and Vehicle Access Intelligent Control System Using Arm7 Microcontroller
2868.
A Review on Evaluation of Digital Image Watermarking Techniques
2869.
Three Phase Grid-Tied Single Stage Reconfigurable Solar Converter Controlled By SVPWM Technique
2870.
A Survey of Cloud Computing Service and Security issues
2871.
On the Use of Side Information for Text Mining using Clustering and Classification Techniques-A Survey
2872.
Electronic-voting approach with an open cloud computing architecture
2873.
Approaches For Automated Detection And Classification Of Masses In Mammograms
2874.
Performance Analysis of Optical Amplifiers
2875.
Decision Tree Based Denoising And Enhancement In Images
2876.
A Survey on Various Watermarking Techniques for Video Data Copyrighting
2877.
Survey on Sentiment-Topic Detection from Text
2878.
Gesture Recognition for 3D Human Computer Interface: A Review
2879.
New Active Power Filter Topology for Grid Support and Harmonic Mitigation in Interconnecting Renewable Power Generation Systems
2880.
User Speech Recogintion and Voice Command based Reminder Service integrated with location based reminder using GPS technology
2881.
Enhancing Massive Data Analytics with the Hadoop Ecosystem
2882.
LCSiLEACH: LWZ Compressive Sensing Based iLEACH
2883.
3-Way Security for Packet Transmission
2884.
Digital Signature Authentication for Android Smart Phones
2885.
Contentious News Article Categorization by Identifying Opponents
2886.
Data Mining Using PAFI
2887.
Designing of Combinational Fractal Microstrip Patch Antenna using Iteration Methods
2888.
Implementation of a Zero-Voltage-Switching and Zero-Current-Switching Interleaved Boost and Buck Converter
2889.
Image Compression with Neural Network
2890.
CBIR Approach Based On Combined HSV, Auto Correlogram, Color Moments and Gabor Wavelet
2891.
Survey on User Behavioral Search using the Auxiliary Information Mining
2892.
Performance Analysis of A 3*2 MIMO System For Fading Channel
2893.
Mobile cloud security a Survey
2894.
Leveraging Hybrid Recommendation System In Insurance Domain
2895.
WPST Based Single Channel Speech Separation
2896.
Co-Channel Speech Separation by Cochlear Filtering And Binary Masking.
2897.
Efficient and Secure Node Recovery in Wireless Sensor and Actor Network Using Minimal Topology Changes
2898.
Internet traffic classification using Hybrid Aggregated classifier and Neural Network
2899.
Comparative Study of Hydrogen Adsorption on Alkali Metal Assisted Carbon-Nano Structured Materials
2900.
Variable Truncated Multiplier with Low Power
2901.
A Survey: Gene Selection Methods VIA Spectral Biclustering
2902.
A Novel Approach for Quality Evaluation of Digital Images By Auto Regressive Approach Based On Internal Generative Mechanism
2903.
Semantic Search Based Feature Subset Selection for Multi Dimensional Data
2904.
Performance Analysis of Image Compression Using DWT And WPT
2905.
An Efficient Design of Parallel Pipelined FFT Architecture
2906.
Design Recovery of Student Information Legacy System
2907.
A Survey on Data Mining Research Trends
2908.
Resource Allocation in Cloud Computing with General Classification Time and Exponential Service (G/M/s)
2909.
A Review Paper on Data Embedding in Scrambled Digital Video for Data Security & Authentication
2910.
Controlled Single Switch Step down AC/DC Converter without Transformer
2911.
Comparison of Selective Harmonic Elimination And Space Vector PWM for Common-Mode Voltage Reduction in Three-Level Neutral-Point-Clamped Inverters for Variable Speed Induction Drives
2912.
Investigation of Water Balance at Catchment Scale using MIKE-SHE
2913.
Parallel Prefix Algorithm for OTIS-HHC Architecture
2914.
Renewable Energy Sources (RES): An Overview with Indian Context
2915.
Implementation on Secure Routing Method for Detecting False Reports and Gray-hole Attacks along with Elliptic Curve Cryptography in Wireless Sensor Network
2916.
Taxonomy of Testing Techniques
2917.
Efficient Data Transmission by Introducing Stuffing Bits in HUFFMAN Coding Technique
2918.
Cloud Computing And Virtualization: Trends And Technologies
2919.
Unwanted Message Filtering From OSN User Walls And Implementation Of Blacklist
2920.
Performance Evaluation of Different Types of CMOS Operational Transconductance
2921.
Component-Based Development Technologies and Limitations
2922.
Face Recognition using Local Derivative Pattern Face Descriptor
2923.
Detecting the Car Number Plate Using Segmentation
2924.
Explore Multidocument Text Clustering With Supervised And Unsupervised Constraints
2925.
UNPRIVILIGED BLACK BOX DETECTION OF USER-SPACE KEYLOGGERS
2926.
Compressing Land Images using Fractal Lossy Compression
2927.
A Novel Image Retrieval Approach for Digital Images Based On Pseudo-Zernike Moment Invariants
2928.
Controlling a Car Buggy Using a NIR Camera with Hand Gestures
2929.
Home Automation System Using Android and WiFi
2930.
Combining Support Vector Machine Learning with the Discrete Wavelet Trannsform and Contourlet Transform in Image Compression
2931.
AI Web-Based Agent for Banks
2932.
Energy Transmission Protocols for Wireless Sensor Networks: A Review
2933.
Adaptive Rate Limiting Strategy To Defend Against Distributed Denial Of Service Attacks
2934.
Temporal Segmentation of Facial Behavior in Static Images Using HOG & Piecewise Linear SVM
2935.
Task Scheduling of Special Types of Distributed Software in the Presence of Communication and Computation Faults
2936.
Performance Evaluation of Low Power Dynamic Circuit Using Footed Diode Domino Logic
2937.
Comparison of Communication Algorithms on OTIS-HHC and OTIS-Ring Parallel Architectures
2938.
PAPR Reduction for High-Data-Rate Through-Metal Control Network Applications Using Bit-Loaded
2939.
A Novel Approach for Channel Estimation In MIMO-OFDM System Using The Efficient Pilot Patterns
2940.
A new Data Embedding approach in digital images Using Adaptive Pixel Pair Matching
2941.
FPGA Implementation of Canny Edge Detection Algorithm
2942.
A Pragmatic Study of Malwares to Enrich Application for Self Defence
2943.
Predict the Future Path based on Frequent Path Detection using Particle Swarm and Binary Bat Optimization Technique
2944.
A Survey of Requirement Engineering Practices in Software Development
2945.
Detecting Client Based HTTP Attacks on Web Proxy by Temporal and Spatial Locality Behavior and Protocol Modification
2946.
Cumulative Software Failures To Erp Systems
2947.
UNERSTANDING IPV4 &IPV 6 DIFEERENCES AND TRANSITION MECHANISMS
2948.
Protecting AODV from Wormhole Attack in WSN
2949.
Urban Area Classification Using High Resolution Remote Sensing Data: A Hybrid Classification Approach
2950.
Energy saving Mechanism in cloud computing by using multi core architecture
2951.
A Novel Approach To Enhance The Lifetime And Throughput Of Wireless Sensor Network Using Actor Nodes.
2952.
Hetertogenous Database Migration using ODTDM Supported with SAX and SDM algorithms
2953.
A Survey on Object Based Image Retrieval using Local and Global Features
2954.
Improved Emotion Detection by Regression Algorithm with SURF Feature and SVM
2955.
A Novel Method of Early prediction of Packet Delay for Mobile Nodes with modified constraint violation Detection Algorithm
2956.
Comparison and Performance Analysis of Proactive and Reactive Multicast Routing Protocols in MANETs
2957.
An Efficient certificate Revocation Method For Mobile Ad Hoc Network
2958.
Improving Power Line Utilization and Performance With Facts Devices In Disturbed Power Systems
2959.
FPGA Based Low Area Motion Estimation with BISCD Architecture
2960.
Enhanced Modified model for safe driving using Embedded Automotive control systems
2961.
Design and development of shunt hybrid power filter for harmonic mitigation
2962.
A Framework for Handoff Decision and Signal Selection Algorithms for Heterogeneous Network
2963.
FPGA Implementation of Adaptive Equalizer
2964.
A new diskless checkpointing approach for handling multiple processor failures
2965.
Detection of Red Lesions and Hard Exudates in Color Fundus Images
2966.
A Survey on Data Mining Techniques In Business Intelligence
2967.
Content Based Image Retrieval using User Interaction
2968.
A Novel QR Code Watermarking In Digital Media Using DWT
2969.
Android Mobile Automation Framework
2970.
Analysis of Information Retrieval models
2971.
Application and Architecture Survey on Internet of Things
2972.
Brain Tumor Extraction by K-Means Clustering Based On Morphological Image Processing
2973.
A Novel Framework for Nanoscale Wireless Communications Using Minimum Energy Channel Codes
2974.
A novel algorithm for sensing the digital signal in cognitive radio: Maximizing the spectrum utilization using the Bayesian approach
2975.
Improved Routing Performance in MANET Using Anonymity Algorithm
2976.
Design and Implementation of Livestock Data Marts for a Web and Mobile-Based Decision Support System for Smallholder Livestock Keepers: Case Study of Tanzania
2977.
Decision Support System for Information Security in the Semantics of Bio- Medical Documents
2978.
Modified AODV for Detection and Recovery of Worm Hole Attack
2979.
A Review on Color Image Fusion Techniques
2980.
Enhanced Cluster Based Distributer Fault Tolerance Algorithm for Mobile Node in WSN
2981.
A Study on Wireless Sensor Network, Protocol, Application, Challenges
2982.
Comparison of Control Algorithms for Shunt Active Filter for Harmonic Mitigation
2983.
Performance analysis of a newly designed three frame VAWT having cavity vanes
2984.
Performance Evaluation of Secure Key Distribution Based on Quantum Mechanics Principles Over Free Space
2985.
Implementing Big Data Management on Grid Computing Environment
2986.
IPV6 SLAAC related security issues and removal of those security issues
2987.
A Study of Existing Cross Site Scripting Detection and Prevention Techniques in Web Applications
2988.
Diabetes Prediction in Women Based On Soft Computing Techniques
2989.
Modeling and Control Solutions for Mechatronics Design of Solar Battery Electric Vehicles
2990.
New refined Model for Mechatronics design of solar differential drive mobile robotic platforms
2991.
Analysing Performance of Companding Technique For PAPR Reduction in OFDM System
2992.
Comparative Analysis of Secure and Energy Efficient routing protocols in Wireless sensor network
2993.
Fuzzy Logic Enforced Traffic Management for High Speed Networks
2994.
Direct Single Stage Power Converter (AC/DC).
2995.
Improving Edge Based Color Constancy for Multiple Light Sources
2996.
Survey of Visual Cryptography Schemes without Pixel Expansion
2997.
Diagnosis and Correction of tear in films with Optimization of Motion Estimation Technique
2998.
Study and Analysis of Edge Detection Techniques for Segmentation using Dental Radiograph
2999.
New level of Security in ATM System Using Brain Fingerprinting
3000.
License Plate Character Recognition
3001.
Performance analysis of Neural Network Algorithms on Stock Market Forecasting
3002.
Combination of Markov and MultiDamping Techniques for Web Page Ranking
3003.
UW-Hybrid Architecture of Underwater Acoustic Sensor Networks
3004.
Defense Mechanism for Denial of Service Attack to UMTS Networks Using Sim-Less Devices
3005.
Proficient Secret Transmission of Images And Message
3006.
Mapreduce & Comparison of HDFS And GFS
3007.
Classification of Human Action in a Controlled Environment
3008.
0.18um based 6T SRAM to Reduced Power
3009.
Impact of Mobile Applications on Health Care Information System
3010.
A Review of Load Balancing Algorithms for Cloud Computing
3011.
Modelling Reservoir Operation Using Multiple Regression & Artificial Neural Network
3012.
Enhanced Cluster Based Distributer Fault Tolerance Algorithm For Mobile Node In WSN
3013.
Smart Home Implementation Using Data Mining
3014.
Review On: Fractal Antenna Design Geometries and Its Applications
3015.
Survey on Linux Security and Vulnerabilities
3016.
Preparation of silver nanoparticles by pulsed laser ablation in liquid medium
3017.
A Comprehensive Paper on Performance Analysis between AODV & DSDV Routing Protocol
3018.
Security Aspects in WSN: Survey and Analysis
3019.
Removal of High Density Salt and Pepper Noise from Digital Images
3020.
CFD Analysis & Experimental Study on Heat Transfer Enhancement by various shapes of wings and Material with Forced Convection
3021.
Identification Of Malnutrition With Use Of Supervised Datamining Techniques –Decision Trees And Artificial Neural Networks
3022.
Implementation of Personalized mobile search engine based on Ontology
3023.
An Overview on Hybrid Cloud as an It Service Broker
3024.
MPLI: A Novel Modified Parametric Location Identification for AODV in MANET
3025.
Radiation absorption effect on MHD, free convection, chemically reacting visco-elastic fluid past an oscillatory vertical porous plate in slip flow regime
3026.
Effect on Relaxation Time and Polarizability in Electric Field Induced Nucleation Processes
3027.
A Review of Various Gesture Recognition Techniques
3028.
Solving Knapsack Problem Using Constraint Programming
3029.
A Review On Software Testing In SDlC And Testing Tools
3030.
Review On:Metamaterials And Their Appliations
3031.
Mining High Utility Items from Transactional Databases-Useing Systolic Algorithm
3032.
A Metric Base Calaculation for Object Oriented Software Modularization Quality Measurement
3033.
A Survey on Routing Protocols Using TCP Variants over MANETs
3034.
Finger Vein Detection Combining Segmentation, Gabor Filter and Matched Filter
3035.
A Review of Open Access Publication in Tanzania
3036.
Extended self destructing data system with data recovery
3037.
A Comprehensive Analysis of Cloud Computing Including Security Issues and Overview of Monitoring
3038.
Switching attacks in wireless networks using denial of service phenomenon
3039.
Search Engine –A Demanding Advertising Tool
3040.
Cyborgs-Human + Machine= the Future Man
3041.
Battery Capacity Management in Wireless Sensor Network Rechargeable Sensor Nodes
3042.
Design & Implementation of Binary Phase Shift Keying Demodulation through phase locked loop
3043.
Car Safety using CAN Module and Multi sensors
3044.
Hyperspectral Image Classification Using SVM
3045.
Comparative analysis of image quality assessment using HVS Based Model
3046.
Revised Reliable Algorithm with Results & Algorithm for Thinning Numeral Pattern
3047.
Search The Web Services Based On Qos Aware
3048.
A Review of Various Encryption Techniques
3049.
Ideas for Some Improvement in A.C.O. On The Behalf Of Presently Working A.C.O.
3050.
Eigenface Approach For The Recognition Of Face And Detection Of The Face
3051.
Design and implementation of dc motor speed control based on pic microcontroller
3052.
Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network
3053.
Wavelength Assignment in Optical WDM Optical Network
3054.
Usability Testing
3055.
The Future Version of IP - IPV6
3056.
Corner Defect Detection Based On Inverse Trigonometric Function Using Image of Square Ceramic Tiles
3057.
Review Based Entity Ranking using Fuzzy Logic Algorithmic Approach: Analysis
3058.
Interactive Pick and Place Robot Control using Image Processing Method
3059.
Spell Checking and Error Correcting System for text paragraphs written in Punjabi Language using Hybrid approach
3060.
Stock Market Be¬havior Prediction Using Pattern Matching Approach
3061.
Punjabi Speech Synthesis System for Android Mobile Phones
3062.
Study of Public and Private Clouds in Indian Environment
3063.
A novel approach to make NLP predictive and non-ambigious in Punjabi Language
3064.
Reduction of ambiguity due to synonym and Homographs in Punjabi Language
3065.
Presenting of executable model of the enterprise architecture in order to evaluate the reliability
3066.
STUDY ON WEB STRUCTURE MINING AND ITS PAGE RANKING ALGORITHM
3067.
A Wireless LAN Protocol for Initial Access Authentication
3068.
Energy-based Controller with Optimization Tuning by Using Nelder-Mead Algorithm for Overhead Cranes
3069.
Detection & Prevention of Wormhole attack on AODV Protocol in Mobile Adhoc Networks (MANETS)
3070.
Online Identification Using RLS Algorithm and Kaczmarz’s Projection Algorithm for a Bioreactor Process
3071.
Gender Recognization & Age Prediction
3072.
Enhancement in the neighbor-based diskless checkpointing approach
3073.
Various Techniques for Denoising EEG signal : A Review
3074.
A Wheeling and Steering based route reconstruction approach in congested MPLS network
3075.
ANALYSIS OF FFT AND DWT BASED OFDM
3076.
Efficient Routing in VANETs using Traffic Awareness
3077.
Implementation of Discrete Wavelet Transmission for Color Image Transmission in OFDM
3078.
CMOS Digital Based Technology for Static Power Reduction in Nanoscale Circuits
3079.
A Review Paper On Web Page Ranking Algorithms
3080.
A Review Paper on Energy Efficient Routing in Wireless Sensor Networks
3081.
Fault Detection and Tolerant System (FDTS) for SaaS Layer in Cloud Computing
3082.
Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
3083.
Extended Round Robin Load Balancing in Cloud Computing
3084.
Probabilistic Broadcasting based on Neighbor Coverage for CBR and VBR Traffic in MANET
3085.
Hadoop – from where the journey of unstructured data begins…
3086.
A Review of Invisible Image Steganography Using Mid Band DCT Coefficients
3087.
Optimization of Repeater Spacing in Optical Fiber Communication
3088.
“The Advanced Prolong Montroller & Recording System” using Wireless, Distributed DAS Technology
3089.
Regression Testingin Software Development
3090.
Pyramid Based Image Fusion
3091.
Tutorial review on existing image compression techniques
3092.
Study of Web Content Mining and Its Tools
3093.
Robust Feature Based Automatic Text-Independent Gender Identification System Using Ergodic Hidden Markov Models(HMMs)
3094.
Image Compression Techniques Review: DCT, DWT, VQ and Fractal Compression
3095.
A Review on Basic Principles of an E-Assessment System
3096.
Load Balancing In Clustered Network
3097.
Data Security for Wireless Mesh Network Using Onion Routing Algorithm
3098.
Security Issues in Health Care
3099.
Survey on Cloud Computing In Health Care Systems
3100.
Car Number Plate Recognition System
3101.
Ranking on Data Manifold with Sink Points
3102.
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
3103.
Ternary wide-bandgap chalcogenides LiGaS2 and BaGa4S7 for the mid-IR
3104.
Introducing Health Care Analytics for Cancer Treatment
3105.
Development of a Computer-Based Test Platform with a FOSS
3106.
A Review on Fingerprint Recoginition Technique Using Real Minutia Identification
3107.
Wireless Sensor Network For Landslide Assessment
3108.
A Novel Power Saving Framework for Emissive Displays Using Contrast Enhancement Based On Histogram Equalization
3109.
A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation
3110.
Novel Resonant Pole Inverter for Brushless DC Motor Drive System using Fuzzy Logic controller
3111.
Disaster Event Dectection Reporting System Development Using Tweet Analysis
3112.
Adaptive Constructive Algorithm for Artificial Neural Networks
3113.
DWT Domain Data Encryption with Asymmetric key Cryptography
3114.
Conserve Energy by Optimally Executing Mobile Applications in Mobile device or Offloading to Cloud
3115.
Character Recognition from Born Digital Images using Correlation
3116.
Performance Analysis of MFCC and LPCC Techniques in Automatic Speech Recognition
3117.
Comparative Study on Currency Recognition System Using Image Processing
3118.
Trust Understanding in Cloud and It’s Services
3119.
Weight Optimization and FEA Analysis of Al-Si Metal Matrix Composite Drive Shaft
3120.
Code controlling in DTN’s for progressive packet arrival dynamically
3121.
Data Mining Approaches for Diabetes using Feature selection
3122.
Caesar Cipher Cryptographic Method Along With Bit-Manipulation to a Message to be encrypted and digest for RFID credit card security
3123.
QBIC, MARS and VIPER: A Review on Content Based Image Retrieval Techniques
3124.
The Nonmonotone Motion
3125.
Secure Data hiding in Multi-level using Digital Invisible Ink based on Spread Spectrum Watermarking
3126.
BER of Wireless Mesh Networks- A Review
3127.
Depletion of Energy Attacks in Wireless Sensor Networks
3128.
Comparison between NICE and NICE-1 Algorithms In Virtual network systems
3129.
An Analysis of Wideband Phased Array Antenna System using with Micro strip Filter
3130.
An Evaluation of the Arrangement Transmitter System by Direction of Arrival (DOA) Estimation
3131.
A Novel Method for Classification of Lung Nodules as Benign and Malignant using Artificial Neural Network
3132.
Memory Authentication using Soft PUFs
3133.
Low Power Booth Multiplier Using Radix-4 Algorithm On FPGA
3134.
Improvement in Divide and Conquer Scheme Using Relay Nodes
3135.
Marathi WordNet Development
3136.
Concept Identification Using Markov Logic Network
3137.
Interactive Disk Platform for Teaching Kinematics of Machines
3138.
Comparative Study on Thresholding Techniques of Discrete Wavelet Transform (DWT) to De-noise Corrupted ECG Signals
3139.
Review of ALERT based on cryptography method
3140.
Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
3141.
Degradation of Keratinous Waste Products by Keratinolytic Bacteria Isolated from soil
3142.
Extraction of text from images
3143.
Automatic Discovery of Personal Name Aliases from the Web Using Lexical Pattern-Based Approach
3144.
Detection and Isolation of Packet Droppers in Wireless Networks
3145.
A Review on Performance Improvement of Wireless System via Smart Antennas
3146.
Dynamic histogram equalization, PCA & MAX-DCT based multi-focus image fusion
3147.
A survey and comparative analysis on different algorithms for Blind Source Separation
3148.
Data dissemination and effective Path Management on Wireless Sensor Network
3149.
Performance Analysis and Study of Audio Watermarking Algorithms
3150.
Adaptive Data Rate Oriented Speed and Capacity Based Vertical Handoff Algorithm
3151.
Multiscale Modeling For Image Analysis of Brain Tumor Detection And Segmentation Using Histogram Thresholding
3152.
AN OVERVIEW OF BIG-DATA AND CLOUD COMPUTING
3153.
Iris Segmentation & Recognition in Unconstrained Environment
3154.
Design and Development of a Filtration Tool for an Online Job Recruitment Portal
3155.
A Framework for Polarity Classification and Emotion Mining from Text
3156.
Detection and Prevention Of Black Hole Using Clustering In MANET Using Ns2
3157.
Dynamic Query Forms for Non-Relational Database Queries
3158.
Trust Based Opportunistic Routing Protocol for VANET Communication
3159.
A Review on Region Detection And Matching For Object Recognition
3160.
Effective Allocation of IPTV Services Through Virtualization in Cloud
3161.
Optimization of Dynamic Packet Length in Wireless Sensor Network
3162.
A Novel Topology for Network Intrusion Detection with Anomaly Detection
3163.
Review On An Approach To Infer User Search Goals
3164.
Discover and Verifying Authentication of Nearest Nodes in Mobile Ad hoc Networks
3165.
Routing and Sorting on OTIS-Hyper Hexa-Cell
3166.
Defense against Shoulder Surfing Attack for Recognition Based Graphical Password
3167.
Distribution of cloud resources dynamically by using virtualization
3168.
A Comprehensive Comparison between WiMAX and Wi-Fi
3169.
Triple System Security in Cloud Computing
3170.
Network Security: Cloud Computing
3171.
Comparative Study of Automated Testing Tools: Selenium and Quick Test Professional
3172.
A Comparative Study of Classification of Image Fusion Techniques
3173.
A Study On Diffie-Hellman Algorithm in Network Security
3174.
An Overview of Image Steganography Techniques
3175.
Heuristic based optimization of users request in cloud computing
3176.
Comparative approach on load balancing algorithm by partitioning of public cloud
3177.
A Review of Voice over IP Mobile Telephony Using WIFI
3178.
Multilabel Associative Text Classification Using Summarization
3179.
Single Image Haze Removal Algorithm Using Edge Detection
3180.
A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography
3181.
Digital Image Watermarking Technique
3182.
Three-Port Full-Bridge Converters with Varied Voltage Input for Solar Power Systems
3183.
A Mobile Approach Applied To Public Safety In Cities
3184.
Chroma-Key Effect by Optimizing Coarse and Fine Filter
3185.
WIMAX
3186.
Wireless Equipment for Localization Using an Unmanned Mini-Helicopter-Based Airborne
3187.
A Survey on Content Based Video Retrieval
3188.
A Review on Multiple Single Hop Clustering Based Data Transmission in Wireless Sensor Network
3189.
STUDY OF REACTIVE POWER COMPENSATION USING STATIC VAR COMPENSTOR
3190.
A New Improved and Secure Version of MD5
3191.
Assessment of Sustainability Indicators for Off Grid Energy System
3192.
Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity
3193.
A Multichannel Multimode RF Transceiver With DSM
3194.
Role of Data Mining in the Manufacturing and Service Application
3195.
Reducing Blocking Probability of 3G Mobile Communication System Using Time Multiplexing NOVSF Codes
3196.
A Study of Quantum Cryptographic Architectures and It’s An Efficient Implementations
3197.
PCA Based Classification of Relational and Identical Features of Remote Sensing Images
3198.
A Review on Evaluation Measures for Data Mining Tasks
3199.
Sequential clustering algorithms for anonymizing social
3200.
Complexity & Performance Analysis of Parallel Algorithms of Numerical Quadrature Formulas on Multi Core system Using Open MP
3201.
Human Action Recognition Using Kinect
3202.
Mining Frequent Patterns from Uncertain Databases
3203.
Context Aware Driver’s Behavior Detection System: A Survey
3204.
Protecting Sensitive Information in Relational Databases By Using Null Value Theory
3205.
A Comparision on Text-Based and Graphical Browser
3206.
Efficient Load Balancing in Clusters in Hierarchical Structure
3207.
Enumeration Sort on OTIS k-Ary n-Cube Architecture
3208.
An Advanced Approach for Ranking in Query Recommendation
3209.
Smart Travel Alarm – An Android app on Sencha2.2
3210.
Structural properties of NSC and HSC beams bonded by GFRP wraps
3211.
QArt - new Generation of Visual Appearing QR Code
3212.
How virtualisation helps smart phones in cloud computing: A survey
3213.
Dimension and Complexity Study for Alzheimer’s disease Feature Extraction
3214.
Vehicle Theft Intimation Using GSM Modem
3215.
HPBDMS: High Performance Big Data Management System on Massive & Complex Data
3216.
Universal Data Management through Web Base Configurable System
3217.
BMM Filtering Approach for Image Enhancement of Indian High Security Registration Number Plate
3218.
Analysis of Reactive Attacks on Mobile Communication Protocol Network
3219.
Feature Subset Selection Algorithm for Elevated Dimensional Data By using Fast Cluster
3220.
Design and Implementation of a Backtracking Wormhole Switch using MARX units for Mesh Topology
3221.
Enhanced Authentication by Virtual World
3222.
Content Based Video Retrieval by Genre Recognition Using Tree Pruning Technique
3223.
Survey: Digital Image Watermarking Technique
3224.
Controlling Luminare Illumination without Sensors
3225.
Implementation of Database Synchronization Technique between Client and Server
3226.
Human Iris Processing Using Matlab
3227.
Healthcare Measurement Analysis Using Data mining Techniques
3228.
A New Color Image Compression Based on Fractal and Discrete Cosine Transform
3229.
Target Recognition using Improved SIFT Algorithm
3230.
Computer Surveillance System
3231.
Design and Development of Micro Vertical Axis Wind Turbine for Rural Application
3232.
A Generosity Model to Study Data Center Performance and QoS in IaaS Cloud Computing Systems
3233.
FACIAL DETECTION SYSTEM (Using MATLAB)
3234.
Comparison of Various Queuing Techniques to Select Best Solution for Eradicating Congestion in Networks
3235.
A Multiple Queue Management Scheme to Optimize the Job Sequencing in Cloud Computing
3236.
Energy-Efficient Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks
3237.
Enhanced Page Rank Algorithm Using Time Factor
3238.
Security Assessment Automation Framework: Web Applications
3239.
A Reactive Hierarchical Trust Management Scheme for Wireless Sensor Networks
3240.
Optimizing the Ad-hoc applications in Vehicular Network using Max-Min Ant system
3241.
Improved Gradients & Global Mean Based Switching Median Filter
3242.
A Survey of various Routing Algorithms based on Shortest Path
3243.
A Review on Dealing Uncertainty, imprecision and Vagueness in Association Rule Mining Using Extended and Generalized Fuzzy
3244.
A combined approach of using DWT-DCT watermarking and AES encryption to improve the security of satellite images
3245.
Multiple Quality Parameters for Image Quality assessment
3246.
An Efficient Job Scheduling Algorithm using Min-Min and Ant Colony Concept for Grid Computing
3247.
Numerical Solutions of Ordinary Differential Equations Using Mathematica
3248.
A New Technique Called Annotation Used To Categories The Content Of Web Pages
3249.
Design of Intelligent Mobile Vehicle Checking System Based On ARM 7
3250.
Optimal Implementation of Graph Kernel Matching in Matrimonial Database Using Graph Mining Technique
3251.
Detection of Crash Transient Failure during Job Scheduling using Replication Technique
3252.
Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion
3253.
A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks
3254.
Requirement Elicitation Of Large Web Projects
3255.
Mobile Application Protection System: A Secured Architecture
3256.
A Modified K-Medoid Method to Cluster Uncertain Data Based on Probability Distribution Similarity
3257.
A Review of Cloud Based Schedulers on Cloud Computing Environment
3258.
Novel Use of Single Phase Electromechanical Energy Meter for Standardized Testing of Digital Energy Meters
3259.
Survey on Recent trends in Computational & Experimental Technique to Evaluate Performance of Air Flow in Defrost/Demist System for Automobile
3260.
Music Recommendation System Using Association Rule Mining and Clustering Technique To Address Coldstart Problem
3261.
Comprehensive Review of Space Wave Optical Link
3262.
6LoWPAN Routing Issues
3263.
OTP Generation for ATM Theft Protection
3264.
Face Recognition and Emotion Classification
3265.
USE OF MOBILE AND WIRELESS TECHNOLOGY IN INDIAN LIBRARIES
3266.
A Review of Reliable Multipath Routing Techniques
3267.
Distinctive Multipath Based Data Chunk Sequencing Scheme
3268.
Route Trace Reduction Based Leader Election Approach to Improve Communication in Mobile WSN
3269.
An Improved Approach of Digital Watermarking in Frequency Domain
3270.
Adaptive Energy Optimized Minimum Hop Routing In Sensor Network
3271.
Mobile Tourism Application BasedOn Situation Awareness
3272.
Human Gait Identification using Depth Gradient Histogram Energy Image
3273.
Energy Adaptive Approach for Node Inclusion and Exclusion in Dynamic Clustered WSN
3274.
A Dual Sink Based Bubbling Mechanism for Clusters
3275.
Data Hiding using difference between adjacent pixels and bit plane swapping
3276.
Brief overview of VANET routing protocols and their security attacks
3277.
Image Segmentation Using Modified K- Means Algorithm and JSEG Method
3278.
Effectiveness of Power flow by Shunt Compensation on Power Transmission
3279.
Research Work on Network Intrusion Detection Using Artificial Immune System
3280.
Effect of Voltage on Metallic Particle Movement in 3φ Pahse Gas Insulated Busduct Using Analytical Method, Fem & Csm
3281.
Review on Software Testing Metrics
3282.
Web Usage Behavior and Navigational Structure mining
3283.
Black Hole Attack Prevention Techniques in MANET: A Review
3284.
Fault Removal Effectiveness On Software Requirements Specification Using Non-Preemptive Relocation Technique
3285.
Avoid personal data presumption attacks on social networks
3286.
Application of Data Mining Techniques on Software Engineering Data for Software Quality
3287.
Reduction Of Ground Current In A Transformerless Photo Voltic Inverter Connected To Grid
3288.
A Reduced Switch Count Dual Output Single Phase Inverter
3289.
Trust Decision Making Scheme for Wireless Sensor Networks
3290.
Reducing Routing Overhead In MANET Using NCPR
3291.
Hosting Files Using Android Web Server
3292.
Remote Client Administration
3293.
A Report on Dhruval Enterprise Resource Planning Solution Implementing Financial Module
3294.
Optimizing Node Position using Ant Colony Optimization Algorithm (ACO)
3295.
A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED
3296.
Design of an Application Specific Microcontroller
3297.
Complete Performance Analysis of L- band Optical Communication System for NRZ and RZ Format.
3298.
Blind Noise Level Estimation and Blind Denoising Using Principal Component Analysis
3299.
IVRS BASED COLLEGE AUTOMATION
3300.
An Implementation of Image Watermarking by Using Gradients
3301.
Virtual Sense: An auto email downloading and news reading system for visually impaired people
3302.
Facial Emotion Detection using Eigenfaces
3303.
Controllability of mixed Volterra- Fredholm type Impulsive integro-differential inclusions in Banach spaces
3304.
Enhance Performance of Random Testing using Randomized Algorithm
3305.
IMAGE DENOISING TECHNIQUES: LITERATURE REVIEW
3306.
AN IMPROVED AODV ROUTING PROTOCOL BASED ON LOCAL ROUTE REPAIR MECHANISM
3307.
Security and Privacy in Private Cloud Storage
3308.
A survey on text mining techniques
3309.
Survey Paper for Dynamic Resource Allocation using Migration in Cloud
3310.
Improving Intellectual Skills of Students by Analyzing their Performance and Classifying them Based on Bloom’s Taxonomy Using K-Means Clustering Algorithm
3311.
Study of Different Aspects in Machine Learning
3312.
K-Means on GPU: A Review
3313.
DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
3314.
Effectiveness of Location Based Routing Protocols against Wormhole Attack in MANETs
3315.
Stress Analysis and Optimization of Crankshafts Subject to Static Loading
3316.
Calculating the Area of the Union of Iso-oriented Rectangles Using MapReduce
3317.
Survey of MARS: Spatial Link Quality and Node Positioning in Wireless Relay Network
3318.
Routing in Delay Tolerant Mobile Network: A Comparative Analysis
3319.
Profit Maximization Using Prediction Model
3320.
Comparative study of CPW-fed Bowtie antenna with ACS-fed Bowtie antenna for wireless applications
3321.
CLOUD COMPUTING: BEGINNING OF A NEW TECHNICAL ERA
3322.
Research on Android app Vs Apple app Market: Who is leading?
3323.
IRCAR: Improved Reputation based Context-aware Routing Algorithm for Delay Tolerant Network
3324.
Network Security: Spoofing-The Online Attacks
3325.
River: A Reliable Inter-Vehicular Routing Protocol For Vehicular Adhoc Networks
3326.
Satellite Image enhancement using Combination of Transform Techniques and Interpolation Methods
3327.
Design of a Power System Stabilizer for aSynchronous Generator Using HybridIntelligent Controller
3328.
Performance Studies of Three-Phase Cascaded H-Bridge and Diode-Clamped Multilevel inverters
3329.
Short Term Load Prediction of a Distribution Network based on an Artificial Intelligent Method
3330.
Privacy Preservation of Sensitive Attributes Using Hybrid Approach
3331.
Cloud Storage, Issues and Solution
3332.
POWER QUALITY IMPROVEMENT TECHNIQUES IN HYBRID SYSTEMS – A REVIEW
3333.
PREDICTION OF ELASTIC MODULUS FROM COMPESSIVE MODULUS OF LIME STABILIZED LATERITIC SOIL FOR MECHANISTIC DESIGN USING THE SPLIT CYLINDER
3334.
Digital Image Watermarking For Bank Security Using Arm Processor
3335.
Age Synthesis and Estimation From Face Image
3336.
IMAGE SEGMENTATION- A REVIEW
3337.
Tracking A Dynamic Target in Wireless Sensor Network Using Enhanced Polygon Based Framework
3338.
Customization Issues In Cloud Based Multi Tenant SaaS Applications
3339.
Netflow Traffic Analyzer For worm detection- A Survey
3340.
Twilight in the Wireless Web: Light Fidelity
3341.
Disease Identification in Iris Using Gabor Filter
3342.
DDOS Attack And Detection For Secured Cloud Computing Resources
3343.
Fabrication Of Thin Film Transistor Using High K Dielectric Materials
3344.
Local Route Repair Mechanism for AODV
3345.
Twitance Twitter Recommendation and Analytic Tool
3346.
Agile Development Methodology with cloud computing
3347.
Identification of diseases of Soybean Using Cluster Analysis
3348.
Providing Information Security Using ArcSight SIEM in an Organization
3349.
iMobile: Remote Access for Android Phones
3350.
Evaluation of the Reduction in Switching Time and Stress in Constant Electric Power Dependent Public Utilities by Automatic Mains and Phase Changer
3351.
Optimal Sizing And Placement Of Capacitor In A Radial Distribution System Using Loss Sensitivity Factor And Firefly Algorithm.
3352.
DEFENDING FLOOD ATTACKS BY LIMITING PACKET REPLICATION ON TIME INTERVAL
3353.
Mining Hashtags: The Tweet Suggestion System
3354.
ATM Transaction Security System Using Biometric Palm Print Recognition and Transaction Confirmation System
3355.
Review on Software Ecosystem: An Emerging Area
3356.
Location Detection and Time Monitoring System for Moving Object
3357.
An Effective Classification and Novel Class Detection of Data Streams
3358.
PAPR Reduction in OFDM Systems
3359.
Clustering Approach To Test Case Prioritization Using Code Coverage Metric
3360.
The Case study of Energy Conservation & Audit in Industry Sector
3361.
A Review of Research Work in Software Engineering
3362.
A Smart Home Security System Based On Arm7 Processor
3363.
The Proposal of an Efficient Cyber forensics tool using Neural Networks and Image Mining concepts
3364.
Use of NFC Technology In Electronic Ticket System For Public Transport
3365.
Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
3366.
Single Image Super Resolution Using Sparse Representation with Image Fusion Principle
3367.
Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks
3368.
A Review on Photovoltaic Module and its Various Simulation Methods
3369.
On Jordan Triple Derivations of prime Γ-Rings
3370.
Moving Object Detection and Tracking
3371.
Clustering Perspective in Attribute Based data Set in the Collaborative Learning Behavior
3372.
Clustering Based Energy Efficient Protocols For Wireless Sensor Networks
3373.
MEDAPP
3374.
E-CIRCULAR SYSTEM
3375.
Network Security: A study on Emergency security signal technology for safety
3376.
Change Detection in Satellite Images Using Contourlet Transform and RFLICM Clustering
3377.
Some Studies on PWM Converter Controlled Wind Energy Conversion System
3378.
MOTION DETECTION USING CAUCHY DISTRIBUTION AND SENDING IMAGE OVER ANDROID SMART PHONE USING GCM ALERT
3379.
Design and Performances Analysis of 16-bit RISC Processor using Xilinx tool
3380.
POWER QUALITY IMPROVEMENT USING ACTIVE POWER FILTER BASED ON FUZZY LOGIC CONTROLLER
3381.
Enhanced Worms Detection By NetFlow
3382.
ENHANCEMENT OF QUALITY OF SERVICE IN WIRELESS SENSOR NETWORKS THROUGH ENERGY EFFICIENT QUERY SCHEDULING SCHEME
3383.
FPGA Implementation of Fast Fourier Transform (FFT) Based Finite Impulse Response (FIR) filter Using VHDL
3384.
Robot Navigation control through EEG Based Signals
3385.
FACE IMAGE RETRIEVAL USING LWT-PCA WITH DIFFERENT CLASSIFIERS
3386.
Secure Fuzzy keyword Search using an Advanced Technique over Encrypted Cloud Data
3387.
A COMPREHENSIVE REVIEW ON DIFFERENT TECHNIQUES OF IMAGE FUSION
3388.
REVIEW ON DIFFERENT TECHNIQUES OF IMAGE REGISTRATION
3389.
Performance Evaluation of iSCSI based storage network with cluster mirroring
3390.
Removal of malachite green from aqueous solution using corn cob as adsorbent
3391.
EXPLORATORY STUDY FOR REGRESSION TEST SELECTION TECHNIQUES IN PROCEDURAL AND OBJECT ORIENTED PROGRAMMING PARADIGM
3392.
Location Based Services and Integration of Google Maps in Android
3393.
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
3394.
An Efficient Image Denoising Technique for Various Noisy Images
3395.
Design and Implementation of a Virtual Machine Video Conferencing Application
3396.
Programming a Computer and a Microcontroller to Control the Speed and Direction of DC Motors
3397.
Modeling the Adaptive Immune Response in HIV Infection Using a Cellular Automata
3398.
Automatic Lecture Recording and Broadcasting
3399.
STUDENTS AUTOMATION SYSTEM USING RFID
3400.
Bus Navigation System with Effective Data Transmission Using GPS and Wireless Transmitter
3401.
Performance Investigation of DYMO, DSR, AODV and LAR Routing Protocols using Different Mobility and Energy Models in MANETs
3402.
FPGA IMPLEMENTATION OF INTELLIGENT TRAFFIC SIGNAL CONTROLLER BASED ON NEURO FUZZY SYSTEM
3403.
THE LIBRARY MANAGEMENT ROBOT
3404.
Low-Voltage, High Frequency CMOS Analog Multiplier
3405.
Mining and Clustering of mobile transaction sequences in location based service environment
3406.
DESIGN AND DEVELOPMENT OF ETHERNET CONTROL SYSTEM FOR EMBEDDED WEB SERVERUSING ARM PROCESSOR
3407.
Survey on Weighted Load Balanced Routing Protocol and Energy-Aware Routing Protocol for MANET
3408.
IMPLEMENT A NEW WINDOW FUNCTION AND DESIGN FIR FILTERS BY USING THIS NEW WINDOW
3409.
Fuzzy Technique for software Quality Measurement
3410.
Survey of Various Mobility Models in VANETs
3411.
Providing Data Sharing For Multiple Users In Cloud
3412.
Cross Site Scripting (XSS): The dark side of HTML
3413.
Local Thresholding Techniques in Image Binarization
3414.
SMART WALKING STICK FOR VISUALLY IMPAIRED
3415.
Robustness of Disruption Tolerant Network against Flood Attacks
3416.
MOBILITY MOVEMENT PATTERNS TRAITS FOR ROUTING PROTOCOL
3417.
A 1.5V 3bit, 500MS/s LOW POWER CMOS Flash ADC
3418.
A Survey on Privacy Preserving Homomorphic in Collaborative Data Publishing
3419.
Integrated PCA & DCT Based Fusion Using Consistency Verification & Non-Linear Enhancement
3420.
Enhanced 2nd Order Gray Edge Color Constancy Algorithm Using Bilateral Filter
3421.
Recoverable Concealed Data Aggregation with Multiple Applications in WSN
3422.
SECURITY ISSUES AND RESOURCE PLANNING IN CLOUD COMPUTING
3423.
ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs
3424.
Mobile Network Area Selection and Analysis of 3G GSM Network Site
3425.
DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX
3426.
Virtual Network Computing- A Technique to Control Android Phones Remotely
3427.
A Efficient Approach Used for Identifying Distraction of statue Image
3428.
ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION
3429.
Cloud Computing Security using Federated Key Management
3430.
An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor
3431.
Energy Efficient Routing in MANET: A Survey
3432.
Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm
3433.
Virtual Touch Screen Using Microsoft Kinect
3434.
Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews
3435.
Flash Drive Communication Using Embedded System
3436.
Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter
3437.
EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD
3438.
Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique
3439.
ATM Technology Prospects: A Review
3440.
A Review of Various Trust Management Models for Cloud Computing Storage Systems
3441.
Authentication of System using Text, Image and Audio
3442.
A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN
3443.
Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks
3444.
A Survey on Visible Light Communication
3445.
CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS
3446.
Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction
3447.
Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms
3448.
Security issues in Voice over IP: A Review
3449.
Review On: Object Detection and Tracking To Implement Human- Machine Interaction
3450.
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset
3451.
Computer Viruses and Challenges for Anti-virus Industry
3452.
Physical Security: A Biometric Approach
3453.
EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK
3454.
An Adapted Group Method of Data Handling for Abrupt Data Analysis
3455.
Network Security: Virtual Private Network
3456.
RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III
3457.
An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior
3458.
An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks
3459.
Design and Modeling of Parallel Rectangular Patch Based Microwave Antenna
3460.
Literature Survey On Fingerprint Recognition Using Level 3 Feature Extraction Method
3461.
RECOGNITION OF FACIAL EXPESSION USING FACIAL MOVEMENT FEATURES
3462.
Energy Efficient Data Gathering Mechanism In Wireless Sensor Networks Using Mobile Collectors
3463.
COMPARATIVE ANALYSIS of LINEARLY POLARIZED PATCH ANTENNA for WI-FI and WLAN APPLICATIONS
3464.
A Review of Method of Stream data classification through Optimized Feature Evolution Process
3465.
Pattern Recognition and Their Different Approach
3466.
Hybridization Of Web Page Recommender Systems
3467.
A SURVEY ON: UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECTS
3468.
Defect Forecasting In Software System - Mining Approach
3469.
On some Security aspect of HPC Environment
3470.
SOA enabled e-administration for institutes providing higher education
3471.
SCADA: SUPERVISORY CONTROL AND DATA ACQUISITION
3472.
Assessment of Service Composition Plan using Colored Petri Nets
3473.
Fraud Detection in credit Card Transaction Using Hybrid Model
3474.
Graphical Interpreter
3475.
A Novel Approach to Construct Deterministic Finite State Automata
3476.
An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation
3477.
Review & Proposal for a Cloud based Framework for Indian Higher Education
3478.
Network Security: Li-Fi: Data Onlight Instead of Online
3479.
Analysis of New-Fangled Mandelbrot Sets Controlled by TAN Function
3480.
A Secure Communication Model to Detect Flooding Attacks in Disruption Tolerant Networks
3481.
Survey of Defense-In-Depth Intrusion Detection Framework in Virtual Network System
3482.
A RESEARCH REVIEW ON DIFFERENT DATA HIDING TECHNIQUES
3483.
Survey of Optimizing Link Sleeping Reconfigurations in ISP Networks
3484.
Network Security: Security in Cloud Computing
3485.
MEDICAL IMAGE COMPRESSION BASED ON AUTOMATED ROI SELECTION FOR TELEMEDICINE APPLICATION
3486.
New Technology for Mobility Based Wireless Sensor Networks
3487.
A review paper on investigation on feasibility of biogas as fuel for automobile/vehicle engine
3488.
Effect of Different Component Values on 3- Stage Type-B Pulse Forming Network
3489.
Performance Improvement Technique for Multiple User Detection in DS-CDMA System using Groupwise Successive Interference Cancellation (GSIC)
3490.
Oblique Decision Tree Learning Approaches : A survey
3491.
Influence of Fine Glass Aggregate On Cement Mortar
3492.
Denoising of Gaussian and Speckle Noise from XRay Scans using Haar Wavelet Transform
3493.
A survey on Software as a service (SaaS) using quality model in cloud computing
3494.
Protein Secondary Structure Prediction Using Improved Support Vector Machine And Neural Networks
3495.
Graphical User Interface for Capacity Planning in Long Term Evolution
3496.
A Prototype of a Wirelessly Controlled Nuclear Centrifuge
3497.
Nano Scale Simulation of GaAs based Resonant Tunneling Diode
3498.
Comprehensive study of Handoff Strategy-A Survey
3499.
Obstacle Locating Capabilities of Mobile Robot Using Various Navigational Aids
3500.
Modelling & Simulation of Three-phase Induction Motor Fed by an asymmetrically Configured Hybrid Multilevel Inverter
3501.
A Clinical Expert System For Positional Vertigo
3502.
Semantically Driven Personalized Recommendations on Sparse Data
3503.
Overcoming Cache Staleness Issue Using Dynamic Source Routing Protocol
3504.
Glass Fiber Reinforced Concrete & Its Properties Shrikant Harle, Prof. Ram Meghe
3505.
Secured PHR Transactions using Homomorphic Encryption in Cloud Computing
3506.
E-Mail Abstraction Scheme Using Collaborative Spam Detection Scheme
3507.
A Trust System for Broadcast Communications in SCADA
3508.
Fundamental Design Issues for the Future Internet
3509.
Image Compression Using SVD Technique and Measurement of Quality Parameters
3510.
Modeling and Design of Microstrip Line Based SIW and Structural Effect on Wave Propagation Characteristics
3511.
Image Decomposition Using Wavelet Transform
3512.
Color STIPs for the Live Feed
3513.
An Enhanced Content Based Image Retrieval System using Color Features
3514.
A Strategic Capacity Planning Model: A Genetic Algorithm Approach
3515.
HUE Preserving Color Image Enhancement without GAMUT Problem using newly proposed Algorithm
3516.
Effect of Aspirated Consonants on EMG Signals Generated in Zygomaticus Muscles
3517.
Speech Enhancement through Elimination Of Impulsive Disturbance Using Log MMSE Filtering
3518.
9-Transistor Full Adder Design For Area Minimization
3519.
Efficient Monitoring Of Intrusion Detection In Mobile Ad Hoc Networks Using Monitoring Based Approach
3520.
Secure Data Sharing In Cloud by Using CIA
3521.
Slope Finder – A Distance Measure for DTW based Isolated Word Speech Recognition
3522.
Data Protection Using Digital Watermarking
3523.
Machine Learning: An artificial intelligence methodology
3524.
SJRR CPU Scheduling Algorithm
3525.
Bandwidth-Oriented Motion Estimation Algorithm For Real Time Mobile Video Application
3526.
Cloud: Computing Services And Deployment Models
3527.
Grip on the cloud and service grid technologies & some Pain points that clouds and service grids address
3528.
Moving Towards IT platforms to the cloud Computing & deep understanding with IT platform architecture transformation
3529.
Clarifying the clouds - Discussing cloud Computing and assistance grid architectures
3530.
A Comprehensive Paper for Performance Evaluation Between DSDV & AODV Routing Protocol
3531.
A STUDY ON TRADE-OFFS AMONG SERVICE EXCELLENCE ATTRIBUTES OF CLOUD COMPUTING
3532.
Extraction of Ontological Information based on Semantic Analysis
3533.
Pervasive Computing Issues, Challenges and Applications
3534.
Applications of Video Data Base Management System (Vdbms) For Video Query Processing
3535.
Adaptation in Neural Networks: A Review
3536.
A Comparative Survey on Various Coin Recognition Systems Based on Image Processing
3537.
TV AND RADIO BROADCAST ELECTROMAGNETIC RADIATIONS ANALYSIS ON THE MALE SPERM INFERTILITY
3538.
An Intelligent System for Minerals Detection using Supervised Learning Approach
3539.
DC/DC Boost Converter Functionality in a Three-Phase IMC
3540.
Strength of Evolving Agent Population in MAS
3541.
Cryptography Implementation in IP Datagram
3542.
Control of power flow in grid by using distribution facts controller
3543.
Low Quality Image Information Enhancement Using SVD Fusion Technique
3544.
Implementation of Discrete Wavelet Transform on FPGA to Detect Electrical Power System Disturbances
3545.
A Realistic Approach to Systematic Reuse
3546.
Recognizing Spam Zombies by Monitoring leaving Messages
3547.
Analysis Tool for Radar Data Using C‘ Oriented Approach
3548.
Overview of Fifth Generation Mobile Communications
3549.
A Hamming Distance Based Dynamic Key Distribution Scheme for Wireless Sensor Networks
3550.
High Capacity and Low Distortion Reversible Image Watermarking using Integer Wavelet Transform
3551.
A Study on Scalable Internet Traffic Measurement and Analysis with Hadoop
3552.
A Review: Different methods of segmenting a continuous speech signal into basic units
3553.
A study on inverted Tshaped micro strip antenna at different frequencies
3554.
Tcp performance in coded wireless mesh networks with cope implementation: An overview
3555.
Convergence of pv system with Buck-Boost Converter using MPPT Techniques.
3556.
Optimization of grid connected conventional energy resources by using single phase micro inverter with LCL filter
3557.
Survey on Methods for Enhancing Web Navigation
3558.
A new routing approach in P2P Networks
3559.
Optimal Location of Base Station in a Wireless Sensor Network Using Gravity Location Model
3560.
Tremplin C# Database Application Development Compressed
3561.
Remote Method Invocation – Usage & Implementation
3562.
“Review on Redundancy in Electronics
3563.
Secure Communication for Multiparty OSN
3564.
A New Approach to Minimise Network Blocking In 4g for Better Accessibility
3565.
Non Blind Watermarking Scheme for Image and Video using DWT-SVD
3566.
NFC Technology and Social Networking
3567.
Implementation of CMOS circuits In Logic optimization using logical effort technique
3568.
Design Pattern Detection by Sub Graph Isomorphism Technique
3569.
Identification of level of resemblance between web based documents
3570.
DEVELOPMENT ON UTILISING EMPLOYEE PERFORMANCE REPORT FOR APPRAISALS
3571.
Multi-Line power Flow Control Using Interline Power Flow Controller (IPFC) in Power Transmission system
3572.
Profit Analysis of a System Having One Main Unit And Two Supporting Units
3573.
Denial of Service Flood Attacks in Disruption Tolerant Networks
3574.
Optimal Design of Direct Adaptive Fuzzy Control Scheme for a Class of Uncertain Nonlinear Systems Using Firefly Algorithm
3575.
HARMONICS ELIMINATION USING FILTER DESIGN
3576.
Color Extended Visual Cryptography Using Error Diffusion With VIP Synchronization
3577.
MOBILE COMMERCE APPLICATIONS AND SERVICES
3578.
Generating Meta Alert with Intrusion Framework on IDS
3579.
Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
3580.
VERIFICATION of DATA INTEGRITY in CO-OPERATIVE MULTICLOUD STORAGE
3581.
Hybrid Selective Harmonic Elimination PWM for Common-ModeVoltage Reduction in Three-Level Neutral-Point-ClampedInverters for Variable Speed Induction Drives
3582.
A ZVS Interleaved Power factor correction based Boost, Half Bridge And Full bridge AC/DC Converter Used in Plug-in Electric Vehicles
3583.
Swarm Intelligence and Knowledge Acquisition
3584.
New topologies for Transformerless Single-Stage AC/DC Converter
3585.
PRIVACY PRESERVATION OF DATA PUBLISHING BASED ON NOISE ENABLED SLICING APPROACH
3586.
An Overview of Project Planning
3587.
Modeling and Data testing for Indian Universities Clusters
3588.
AVA DATABASE CONNECTIVITY (JDBC) - DATA ACCESS TECHNOLOGY
3589.
ENTROPHY BASED NETWORK CODING MULTIPATH ROUTING IN WIRELESS SENSOR NETWORK
3590.
Simulation of a Zero-Voltage-Switching and Zero-Current-Switching Interleaved Boost And Buck Converter
3591.
AN OVERVIEW OF DISTRIBUTED FILE SYSTEM
3592.
An analytical study on conic volume technique vs bounding box technique in picking object in Non Immersive Virtual world
3593.
Cache Memory Organization
3594.
Empowering Auditability of Public and Data Dynamics for Depot Protection in Cloud
3595.
Image Denoising Using Wavelet Thresholding
3596.
Artificial Neural Netwok
3597.
Analyzing Ambiguity of Context-Free Grammarss
3598.
Design and Development of a University Portal for the Management of Final Year Undergraduate Projects
3599.
New technique for improving recognize letters E-set
3600.
Deadlock Detection and Removalin Distributed Systems
3601.
:THE POWER CONSTRAINT AND REMEDIAL METHOD IN DESIGN OF VARIATION TRAINED DROWSY CACHE(VTD- CACHE) IN VLSI SYSTEM DESIGN
3602.
Integration of GIS and Cloud Computing for Emergency System
3603.
PREVENTION OF TRESPASSER ACCESSING IN NETWORKS USING TICKET GRANTING SERVICE
3604.
Survey On Vehicle And Toll Plaza For National Highways In India
3605.
Detection of Flash Crowd Attack Based On Router Values Using Alarm Fixation
3606.
Efficient Master /Slave Computing Using Threshold Value Specification
3607.
A Survey on LSB Based Steganography Methods
3608.
ANALYSIS OF VULNERABILITY IN INTERNET FIREWALL USING RULE BASED ALGORITHM
3609.
Software Product Development—an Approach Using Scrum
3610.
Security Analysis Using Batch Verification Scheme
3611.
Prevention of Selective Jamming Attacks Using Swarm intelligence Packet-Hiding Methods
3612.
Paradigm shift for Project Managers in Agile Projects
3613.
Graphical Password or Graphical User Authentication as Effective Password Provider
3614.
OBLIGING EVINCIBLE DATA CHATTELS FOR VERIFICATION IN DISTRIBUTED CLOUD APPLICATION
3615.
Network Coding as an Efficient Technique of Transmitting Data
3616.
Risk aware and ALERT protocol for mitigating routing attacks in Mobile Ad hoc Networks
3617.
NETWORK ADVANCEMENT in 4G: TD-LTE Technology
3618.
Multi-criteria Recommender systems for Open Authorization
3619.
A DISCRETE CHAOTIC ENCRYPTION ALGORITHM USING LORENZ ATTRACTOR
3620.
Load Balancing Parallel Routing Protocol in Mobile Ad Hoc Network
3621.
Recommendation Diversity using Optimization Techniques and Ranking Method
3622.
Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform
3623.
Towards Automated design of Combinational Circuits Using Evolutionary Techniques
3624.
Faulty Node Detection in Multirate anypath Routing Protocol in Multi-Hop Wireless Networks
3625.
Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
3626.
Contrast Enhancement Image Fusion With Using Gaussian Filter
3627.
Achieving Anonymity and Traceability in Wireless Networks
3628.
Development of Inventory Database System Using Radio Frequency Identification
3629.
A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy Integrated Approach Two Level
3630.
A Study on Semantic Web Mining And Web Crawler
3631.
Harmonics Compensation of HAPF with Adaptive Fuzzy Dividing Rule
3632.
Comparison Of SINR In FemtoCell & MacroCell Network In MacroCell Environment
3633.
IMPLEMENTATION OF WAVELET TRANSFORM, DPCM AND NEURAL NETWORK FOR IMAGE COMPRESSION
3634.
A Survey on LSB Based Steganography Methods
3635.
IMPROVING HIGH PERFORMANCE UTILIZATION OF INFRASTRUCTURE-AS-A-SERVICE CLOUDS
3636.
HOP-COUNT ANALYSIS IN UNSTRUCTURED P2P NETWORKS
3637.
Review of "Achieving Secure, Scalable, and Finegrained Data Access Control in Cloud Computing"
3638.
Traffic Flow Prediction Based on Optimized Type-2 Neuro-Fuzzy Systems
3639.
Diagnosis and Risk Assessment of Cancer On Genes Dataset Using Data Mining Techniques
3640.
An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks
3641.
An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks
3642.
New Algorithm for Minimum Spanning Network Connectivity Problem
3643.
Computational Algorithm for Automatic Recognition of Vehicle Registration Plates
3644.
A Collaborative Writing Tool on Cloud Environment
3645.
Empirical Study on Migrating Data From Relational Databases To Object-Oriented Technology.
3646.
Analysis Of Full Bridge Boost Converter For Wide Input Voltage Range
3647.
An Optimal Energy Efficient Video Distribution Over Cooperative Wireless Networks
3648.
A Software Test Data Generation Tool for Unit Testing Of C++ Programs Using Control Flow Graph
3649.
A Review on” Packet-Hiding Methods to Hamper Selective Jamming Attacks in wireless networks
3650.
A Review on “Adaptive Contriving Routing for Multihop Wireless Ad Hoc Networks
3651.
Corrosion Inhibition Studies Of Ficus Abutilifolia On N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Solution
3652.
Kinetic And Correlation Studies Between Varying Corrosion Parameters And Corrosion Rate Of N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Pickling Solution Using Ficus Abutilifolia Plant Extract
3653.
Biometric Based Web Security Using Ridges of Finger
3654.
A System for Monitoring and Reporting Excessive Passengers in Public Buses Case Study: Tanzania
3655.
Smart Casing for Desktop Personal Computer
3656.
Flood Detector Emergency Warning System
3657.
Automatic vehicle over speed, accident alert and locator system for public transport (Buses)
3658.
Development of Tomato Inspection and Grading System using Image Processing
3659.
Survey on Intelligent Transport System (ITS) application for vehicle speed limit monitoring and accident reporting
3660.
Development New Press Machine using Programmable Logic Controller
3661.
Development New Press Machine using Programmable Logic Controller
3662.
Texture Image Classification using Neurofuzzy Approach
3663.
Impeccable Data Dispatching In Strenuous Mobile Ad Hoc Network
3664.
Real Time System Relate to Time Travel for DesigningUltrafast Spaceship.
3665.
Multicasting with Localized Control in Wireless Ad Hoc Networks
3666.
Multi-Path Routing and Secure Data Collection In Wireless Sensor Networks
3667.
Channel Feedback Scheduling For Wireless Communications
3668.
The palladinium catalyzed activation of bifunctional vinyl halide a-Bromoacrylic amides with 1, 3 dines and Alkynes
3669.
A Survey on Voting Algorithms Used In Safety Critical Systems
3670.
OPTIMIZED BROADBAND WILKINSON BALUN - DESIGN AND ANALYSIS USING METAMATERIAL
3671.
A Trusted-Group Criteria for Performing Trust Aware Routing in Mobile Networks
3672.
Design and VLSI Implementation of HighPerformance Face-Detection Engine using MCT
3673.
DESIGN AND CONSTRUCTION OF DOOR LOCKING SECURITY SYSTEM USING GSM
3674.
Achieving maximum VoIP Call Using Fuzzy Logic
3675.
Detection Of Routing Misbehavior In Manet By Enhanced 2ack Scheme Using Dsr Protocol
3676.
Reliability Analysis of Failure Mode Screening Using Fuzzy Set Theory
3677.
Impact of Internet on Libraries: An Observation
3678.
Impact of Information Technology on Library Space Requirements
3679.
OPINION AND TOPIC DETECTION USING SENTIMENT CLASSIFIER
3680.
Dept. of Mathematics, S. V. University, Tirupati, Andhra Pradesh, India
3681.
NETWORK OF P- PATH MINIMUM CONSTRAINED CONNECTIVITY FROM CITIES TO HEAD QUARTER
3682.
Multi-Input– Multi-Output Network Systems in DERS using Self-Tuning Proportional Integrative plus Derivative (SPID) Controller
3683.
An Intrusion Detection System for Multitier Web Applications Using Double Guard
3684.
PNN Based Detection of QRS-complexes in Electrocardiogram using Entropy
3685.
Speed Control of Permanent Magnet Brushless DC Motor Using Fuzzy Logic Controller-Hardware Implementation
3686.
Devise, Extend and Upgraded Algorithm of Gene Sequence for Local Alignment
3687.
THE EFFECT OF PLANT AVAILABILITY ON LIFE CYCLE PERFORMANCE OF COAL FIRED POWER STATIONS
3688.
INTRUSION DETECTION SYSTEM FOR CLOUD SYSTEM USING INTELLIGENT AGENTS
3689.
ASTUDY REPORT ON X-RAY SENSOR AMPLIFIER PCB FOR X-RAY BAGGAGE INSPECTION SYSTEM (XBIS)
3690.
EDGE DETECTION THROUGH FUZZY INFERENCE SYSTEM
3691.
OPTIMIZING THE RESOURCES THROUGH EFFECTIVE TASK SCHEDULING MECHANISMUSING BENDER’S DECOMPOSITION
3692.
CLASSIFICATION OF EXACT IDENTIFICATION OF CANCER USING EXPRESIONS OF SUPPORT VECTOR MACHINES WITH FUZZY C-MEANS CLUSTERING
3693.
PERFORMANCE AND ANALYSIS OF BLOCKING ARTIFACTS REDUCTION USING PARALLEL DEBLOCKING FILTER FOR H.264/AVC ON LOW BITRATE CODING
3694.
FACE RECOGNITION USING EIGEN FACES AND TRANSMISSION OF HIDDEN DATA USING WATERMARKING AUTHENTICATION
3695.
DATA REDUCTION BY POINT SAMPLING AND FILTER REDUNDANCY METHOD FOR LASER SCANNING.
3696.
A NOVEL APPROACH FOR MODELLING AND SIMULATION OF SENSOR LESS BLDC MOTOR
3697.
HIERARCHICAL WITH STRONG AUTHENTICATION REDUCTION SCHEME IN MANETS
3698.
COUNTERMEASURE AGAINST SELECTIVE JAMMING ATTACKS BY USING PACKET-HIDING METHODS
3699.
ADAPTIVE PROTOCOL FOR INDUSTRIAL AND CONTROL APPLICATION USING WIRELESS SENSOR
3700.
KEYLESS USER DEFINED OPTIMAL SECURITY ENCRYPTION
3701.
: A REFINEMENT IN EXPLOITING DATA GATHERING USING LOCALIZAT
3702.
THREE-PORT FULL-BRIDGE CONVERTERS WITH WIDE VOLTAGE RANGE INPUT FOR SOLAR POWER SYSTEMS
3703.
IWLAN: AN IMPLEMENTATION MODEL FOR HIGH DENSITY SMART INTRANET COMMUNICATIONS, (A CASE FOR ELDI)
3704.
AN ECONOMETRIC INVESTIGATION ON THE IMPACT OF ICT IN THE BUSINESS PROCESSES OF FINANCIAL INSTITUTIONS IN THE DEVELOPING COUNTRIES
3705.
A LITERAL SYNTHESIS ALGORITHM FOR HIGH PROCESS REGULATION IN ICOFLS
3706.
ISCLOUD V.1.0: AN INTERACTIVE CLOUD SHOPPING CART BASED ON SOFTWARE AS A SERVICE COMPUTING MODEL WITH HYBRID CRYPTOGRAHIC ALGORITHM
3707.
SMARESiM: AN IMPROVED MODEL OF E-VOTING SYSTEM BASED ON BIOMETRIC KEY BINDING
3708.
ISCLOUD V.1.0: AN INTERACTIVE CLOUD SHOPPING CART BASED ON SOFTWARE AS A SERVICE COMPUTING MODEL WITH HYBRID CRYPTOGRAHIC ALGORITHM
3709.
SMARESiM: AN IMPROVED MODEL OF E-VOTING SYSTEM BASED ON BIOMETRIC KEY BINDING
3710.
Automatic Land Marking on Lateral Cephalogram Using Single Fixed View Appearance Model for Gender Identification
3711.
SMARESiM: AN IMPROVED MODEL OF E-VOTING SYSTEM BASED ON BIOMETRIC KEY BINDING
3712.
INTEGRATION OF 2D SECURE BARCODE IN IDENTITY CARDS: WITH ADDITIONAL SECURITY FEATURES
3713.
COMPARISON OF XP AND SCRUM PROJECT MANAGEMENT TOOLS
3714.
A NEW APPROACH FOR LOAD BALANCING IN CLOUD COMPUTING
3715.
EDUCATIONAL ENVIRONMENTS AND WEB MINING
3716.
REVIEW ON TECHNOLOGY TO MEASURE SPEED OF CRICKET BALL AND BAT
3717.
COLOUR FACE RECOGNITION:A NOVEL RECOGNITION METHOD
3718.
A NEW CONVERTER TOPOLOGY FOR HYBRID-ELECTRIC POWER PLANTS
3719.
POWER QUALITY IMPROVEMENT USING 5-LEVEL FLYING CAPACITOR MULTILEVEL CONVERTER BASED DYNAMIC VOLTAGE RESTORER FOR VARIOUS FAULTS
3720.
DESIGN AND FABRICATION OF FLUIDIZED-BED REACTOR
3721.
BIOFUEL FOR SUSTAINABLE (AND ECO-FRIENDLY) ENERGY DEVELOPMENT
3722.
MODEL REFERENCE ADAPTIVE TECHNIQUE FOR SENSORLESS SPEED CONTROL OF INDUCTION MOTOR
3723.
TWO LINK ROBOT CONTROLLERS BASED ON FUZZY TYPE-2 AND HIGHER ORDER SLIDING MODE
3724.
MINIMIZATION OF INTRA-CLUSTERERROR CRITERION FUNCTION USING IMPROVED K-MEANS
3725.
ANDROID BASED PORTABLE ECG MONITOR
3726.
AN EXPLORING DYNAMIC NATURE ROUTING TO INCREASE NLT AND LLT IN MOBILE AD-HOC NETWORK
3727.
PRODUCT LIFE CYCLE MANAGEMENT IN AUTOMOTIVE ENTERPRISES
3728.
PERFORMANCE ANALYSIS OF RICIAN FADING CHANNELS USING M-PAM MODULATION SCHEME IN SIMULINK ENVIRONMENT
3729.
A KNOWLEDGE BASED METHODOLOGY TO UNDERSTAND THE USER BROWSING BEHAVIOR FOR QUALITY MEASUREMENT OF THE WEBSITES USING WEB USAGE MINING
3730.
UTILIZATION OF BAGASSE IN PULP AND PAPER MANUFACTURE IN NIGERIA
3731.
A FUTURE APPROACH FOR HUMAN FACE IDENTIFICATION
3732.
A REVIEW ON RIPPLE CURRENT REDUCTION TECHNIQUE WITH ACTIVE POWER FILTER
3733.
SPEED CONTROLING USING DISTANCE DETECTOR IN MOVING VEHICLE
3734.
PERFORMANCE ANALYSIS OF WEB SERVICES BY USING J METER PERFORMANCE TOOL
3735.
Evaluation of Eye Gaze Interaction
3736.
Optimal bandwidth assignment for multiple description coded video
3737.
Advancement in Heterogeneous Catalysis of Triglycerides for Biodiesel Production
3738.
A Modified Version Of Extended Plafair Cipher (8x8)
3739.
Purelet approach and ICA Based Poisson Noise Reduction in MRI Data Set
3740.
DESIGN OF THE MATHEMATICAL MODEL FOR ANALYSIS OF HUMAN RESPIRATORY SYSTEM
3741.
ACTIVE SHAPE MODEL AND TOUCH LESS HAND GEOMETRY FOR PALM PRINT RECOGNITION
3742.
: A NOVEL TECHNIQUE OF REAL TIME VIDEO MONITORING SYSTEM
3743.
: RESOURCE IDENTIFICATION IN GRID USING GRS
3744.
CAD SYSTEM FOR LUNG CANCER DETECTION
3745.
AN ADAPTIVE TECHNIQUE FOR FINGER CODE GENERATION USING SEGMENTATION WITH SPFB BASED TECHNIQUE
3746.
Gesture Recognition: A Communication and Future to Tablets
3747.
A Survey on SQL Injection attacks, their Detection and Prevention Techniques
3748.
TA DETAILED REVIEW ON INCREASING RELIABILITY OF SOFTWARE BY AN INNOVATIVE APPROACH
3749.
Use Of Information Technology In Rural Development”
3750.
CYBER FORENSICS-A REVIEW
3751.
Grid computing Issues, Challenges, Need And Practice
3752.
Design of Low Power Variable Latency adder and Its Implementation in Decimation Filter
3753.
INTER SECURE WEBPORTAL SOLUTION
3754.
A SURVEY ON 3D INTERNET IN WEB 3.0
3755.
A Soc Trojan Virus Detector And Corrector Using Multiple Monitoring Schemes
3756.
An Efficient Scheme To Improve The Overlapped Transmission In Wireless Adhoc Network Using Carrier Sense Multiple Access
3757.
Qi Open Wireless Charging Standard – A Wireless Technology for the Future
3758.
Increasing no. of nodes for Dijkstra algorithm without degrading the performance
3759.
Secure And Authenticated Reversible Data Hiding In Encrypted Images
3760.
An Unlinkable and Unobservable Secure Routing with Symmetric Approach for MANETS
3761.
“Digital Image Processing Approach for Fruit and Flower Leaf Identification and Recognition”
3762.
EFFICIENCYIMPROVEMENT OF PELTON WHEEL ANDCROSS-FLOW TURBINES IN MICRO-HYDRO POWER PLANTS: CASE STUDY
3763.
REALIZATION OF ARTIFICIAL NEURAL NETWORK IN POWER SYSTEM & MICRO-GRIDS: A REVIEW
3764.
4G TECHNOLOGY
3765.
An Efficient Contrast Enhancement of Medical X-Ray Images -Adaptive Region Growing Approach
3766.
A NOVEL APPROACH ON IMAGE STEGANOGRAPHIC METHODS FOR OPTIMUM HIDING CAPACITY
3767.
THE TUNABLE PATH SELECTION BY USING ONION ROUTING NETWORK
3768.
Seamless Handover between Bluetooth and WIFI Using Packet Content Transfer Method
3769.
Energy management options at a Fertilizer Company in Zimbabwe
3770.
Manufacturing capacity building baseline survey on Small to Medium Enterprises (SME’s) : A case study of Hire Engineering Co. in Zimbabw
3771.
Optimize Security solution for mobile agent security: A Review
3772.
Signal Scrambling Techniques for PAPR Reduction in OFDM Systems
3773.
A Secure Address Allocation Scheme for Wireless Area Distributed Communication Network
3774.
Secure Visual Cryptography
3775.
N-Nodeset Importance Representative based Outlier Detection for Categorical Data
3776.
Similarity Analysis Of Images Using Content Based Image Retrieval System
3777.
Multiuser Channel Measurements For Wireless Localization
3778.
By Dynamic Voltage Restorerfor Power Quality Improvement
3779.
A Survey on Cloud Database Management
3780.
Malware Attacks on Smart Phone, Its Limitation & Evolution to Detect New Techniques
3781.
Iris Recognition based on Pupil using Canny edge detection and KMeans Algorithm
3782.
Analysis of Solar PV cell Performance with Changing Irradiance and Temperature Pradhan Arjyadhara1, Ali S.M2, J
3783.
An Explanatory Study of the Parameters to Be Measured From EMG Signal
3784.
Comparative study of C, Objective C, C++ programming language
3785.
Extraction of Electrical Power Transformer Parameters
3786.
Extraction of Electrical Power Transformer Parameters
3787.
Target Tracking in Wireless Sensor Networks
3788.
INTER-CARRIER INTERFERENCE REDUCTION TECHNIQUE IN OFDM SYSTEM BASED ON SELF CANCELLATION TECHNIQUE
3789.
Effects Of The Cyclic Prefix In Siso And Miso Wimax Systems
3790.
A modified RSA cryptosystem based on ‘n’ prime numbers
3791.
THE NEW ERA OF BROWSING -VOICE BROWSING
3792.
Cryptography And Network Security Principles And Practices
3793.
Comparative analysis of Statistical Parameters of Finger Knuckle in Digital Image Processing