Vol. 5 No. 10 (2016)

Published: 2017-12-30

Articles

  • Personalized Web Search with Custom Privacy Preservation

    Swapna Desale ,Jyothi Rao
    189
    235
  • Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

    V. Mariyammal , Dr.K.Thamodaran
    233
    276
  • A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup

    Sushma K R Mrs.Renuka malge
    194
    227
  • Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review

    Sapna Pooja Nagpal
    233
    213
  • Intrusion Detection System Using Machine Learning Approach

    P.Akshaya, .
    249
    260
  • Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images

    Ankoji Pavan , K. Ramanjaneyulu
    235
    265
  • An Efficient Approach for Secure Data Hiding Using Cryptography

    Reetu, Ms.Mamta Mr. Satish Dhull
    251
    258
  • MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

    Prinkesh Soni, Ankush Yadav , Rakesh Singh Lodhi, Amit Solanki
    285
    347
  • An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model

    Akanxa Mishra, Namrata Sharma .
    201
    260
  • Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

    N. Pavani , P. Pothuraju
    230
    236
  • An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation

    Pooja Chaturvedi, Chetan Gupta
    195
    233
  • Emotion Speech Recognition System For Isolated Words In Marathi Language

    Asmita Gajarishi Shital Sukre, Dhanashri Rachetti Pratik Kurzekar
    265
    266
  • Publish/Subscribe Systems Security through Distinct Identity Encryiption

    R. Kiranmayi, P. Pothuraju
    233
    227
  • Fixed Point Theorem in Weakly Compatible Self Mappings on Complete

    Dr.M.RamanaReddy, .
    224
    228
  • Filter Bubble: How to burst your filter bubble

    Sneha Prakash .
    233
    419
  • Simulation of Steerable Gaussian Smoothers using VHDL

    Sharanabasava, Syed Gilani Pasha
    183
    236
  • Study of Unified Power Quality Conditioner for Power Quality Improvement

    Anupam Ojha , Amit Solanki, Rakesh Singh Lodhi
    229
    241
  • Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

    K.Sridhar Dr. Syed Abdul Sattar Dr. M.Chandra Mohan
    197
    221
  • Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

    Dillip Kumar Swain , Sarojananda Mishra , Sasmita Mishra
    210
    229
  • Cone metric spaces and fixed point theorems of contractive mappings

    C Vijender .
    215
    243
  • Characterization of Advanced Encryption Standard (AES) for Textual and Image data

    S. Rehman *, S.Q. Hussain , W.Gul and Israr
    241
    241
  • Automated diagnosis of Lungs Tumor Using Segmentation Techniques

    S.Piramu Kailasam ,Dr. M. Mohammed Sathik
    208
    231
  • Mobile Printer with Bluetooth Compatibility Using Raspberry PI

    G.Jhansi, S.Saraswathi .
    227
    313
  • Enhanced Way of Association Rule Mining With Ontology

    T.Bharathi, Dr. A.Nithya .
    198
    284
  • Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy

    G Krishna Vasudeva Rao, K Premchand
    226
    235
  • Vein Pattern Recognition: A secured way of Authentication

    Navjot Kaur , Paritosh Chopra
    200
    454
  • Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

    Swati Rastogi, Surya Prakash , S.P.Duttagupta, H.Muthurajan
    219
    256
  • Speech Recognition using e-Speaking: A Review

    Anju Bisen, Krishna Hirpara Madhu, Roshani Rathore
    185
    238
  • Visual Crypto-Steganography in Images

    Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami shah
    203
    228
  • Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

    Yashwant kumar, Rajat joshi Tameshwar mandavi, Simran bharti Miss Roshni Rathour
    241
    316
  • An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

    S. Anuradha, K.B. Madhuri B. Jaya Lakshmi
    224
    228
  • Effect of Nano Fluids in Solar Flat Plate Collector Systems

    S. Arockiaraj, P. Jidhesh
    207
    235
  • Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

    H.T. Rathod*, K. Sugantha Devi , C.S.Nagabhushana , H.M.Chudamani
    162
    205
  • Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

    Aarti Bhoi Ashwini Madan , Tejal Khandave
    202
    234
  • Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register

    Cheekati Sirisha K. Prakash
    217
    274
  • Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management

    Vengala Abhilash , J. Pushparani
    181
    217
  • A Review on Feature Extraction Techniques for Speech Processing

    Amandeep Singh Gill .
    208
    253
  • A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic

    A.Malathi *, M.Theinmozhi
    200
    222
  • MongoDB for Read Intensive Cases Using YCSB

    Adarsh Kumar , Anita Ganpati
    227
    271
  • Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation

    Manish Vyas , Dr. Saurabh Jain
    236
    244
  • Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

    Bhaskar Chaturvedi,Uttkarsh Rawat,, Tanish Aggarwal,Shriyash Mohril, Mahipal Singh Sankhla, Dr. Rajeev Kumar
    128
    197
  • Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time

    B. SUMANJALI , K. NAGAIAH , B. ANITHA
    122
    193
  • A Concise Study about Data Mining Methods, Tools and Its Trendy Applications

    C.Thangamalar, R.Ramya R.Lavanya
    151
    236
  • Mobile Apps Fraud Detection Using Raking

    D.Uma Maheswari, S.Jassica Saritha
    140
    211
  • An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET

    Dr. N. Rama, Justin Sophia. I
    137
    206
  • Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

    Sanjay Kumar, Narendra Sahu Aakash Deep , Khushboo Gavel Miss Rumi Ghosh
    146
    399
  • A Review on Prediction of User Action Interpretation for Online Content Optimization

    Mr. Pratik V. Pande , Dr. M.A.Pund
    152
    187
  • Fusion Layer Topological Space Query Indexing For Uncertain Data Mining

    M. Kalavathi, Dr. P. Suresh
    123
    218
  • Blood group Detection and RBC, WBC Counting: An Image Processing Approach

    Akshaya P. Sahastrabuddhe , Dr. Sayyad D. Ajij
    160
    318
  • Fixed points of -generalized contraction selfmapings in D*-metric space

    Dr C Vijender .
    182
    198
  • Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

    J.JenoMactaline Pears ,Dr.D.C.Joy Winnie Wise
    177
    215
  • Sentiment Analysis Through Text Mining-A Review

    Anupriya Pandey Rakhi Verma, Deepika Bariha Varsha Dewangan
    148
    209
  • Analysis of Bigdata Using Visualizing Technique

    Aalia Qureshi , Dr. Tripti Arjariya
    118
    211
  • Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing

    Amandeep Kaur , Pooja Nagpal
    158
    224
  • Preventing Social Sites from Publishing Malicious Content

    Deepak Ranjan , Dr. Tripti Arjariya
    179
    228
  • Fruit Recognition and its Calorie Measurement: An Image Processing Approach

    Manpreetkour Basantsingh Sardar Dr. Sayyad D. Ajij
    159
    699
  • Mobile Application Testing: Tools & Challenges

    PPallavi Bhuarya, Shruti Nupur Anuradha Chatterjee, Rajesh Singh Thakur
    144
    215
  • Various audio Steganography techniques for audio signals

    Rubby Garg , Dr.Vijay Laxmi
    148
    228
  • Impact of Security Risk on Cloud Computing Adoption

    Shashank Mishra, Manju. Pandey
    135
    210
  • A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data

    Akash Sharma , Nikita Jain
    134
    202
  • Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project

    Priyanka ,
    1758
    1893
  • A Secure Pin Authentication Method against Shoulder Surfing Attacks

    K.Kiruthika, D.Jennifer K.Sangeetha Jackulin.C, R.Shalini
    157
    222
  • Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data Extraction

    Soriful Hoque
    128
    181
  • Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

    R. Sai Sandhya, R. Padmini
    172
    203
  • Providing Privateness via Transaction Splitting Using PFP Growth Algorithm

    M. Jhansi Rani, K. Venkatagurunath Naidu
    157
    219
  • Time Sequence Scheme for Ideal Transmit In Remote Systems

    K. Surekha, N. Padmaja
    149
    192
  • Performance of Multi Server Validation and Key Association with User Protection in Network Security

    R. Padmini .
    165
    214
  • Texture Classification with Motif Shape Patterns on Local Directional Pattern

    Dr. P Chandra Sekhar Reddy
    137
    206