Vol. 6 No. 5 (2017)

Published: 2017-05-01

Articles

  • Dynamic Load Balancing in Distributed Systems: A Graph-Based Approach to Optimize Resource Allocation

    Sai Dikshit Pasham
    21547-21562
    239
    212
  • Obtaining Good Heuristics for Big Data Broadcasting Problem Using Novel Pipeline Approach.

    Prof. Priyadarshani Kalokhe Abhishek Kumbhar, Jyoti Shelke Rinkal Bari, Snehal Shewale
    289
    291
  • Fuzzy Based Contrast Enhancement Method for Lung Cancer CT Images

    Rakesh Kumar Khare G. R. Sinha Sushil Kumar
    256
    321
  • Secured access using Cognitive Services on Raspberry Pi

    Rosch Goes Dr. Suchithra Nair
    265
    294
  • Naïve Tweet Analyser

    Abhinav Garg Kratika Gupta Abhijeet Singh
    1192
    273
  • Cut Detection in Wireless Sensor Networks

    M Manasa Ravali, Vemula K Harika M Chaithanya Kishore Reddy
    325
    276
  • Asymmetric key algorithms-A Proposed Method

    MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay
    265
    271
  • Real-time location based service for tracing mobile using Android Application

    M.Prasanna Lakshmi E.Venkateswara Rao B. Lakshmi
    266
    303
  • E-KYC Ticketing System

    Yogesh Suman Ms. G.Geetha
    897
    462
  • A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network

    Rammurti Gupta, Raj Kumar Paul
    232
  • IOT Based Calorie Calculator For Healthcare System

    Kumar Harsh , Mayank Yadav Amit Kumar B. Chandra Mohan
    312
    341
  • Intelligent Method for Cost Estimation during Software Maintenance

    Durga Puja Raghav Mehra BD Mazumdar
    361
    324
  • Literature Survey of Privacy Preserving Data Publishing (PPDP) Techniques

    Amita Sharma, N. Badal
    282
    317
  • Analysis and Design Of Multistory Apartment Building Using ETABS

    Sayyed A.Ahad , Hashmi S Afzal Pathan Tabrej , Shaikh Ammar Shaikh Vikhar , Shivaji Bidve
    1343
    2858
  • A Clustering Technique for Improving Marketing Strategy in Social Media using Data Mining Approach

    Shreyas S, Dr. Vidya Raj C
    306
    275
  • Novel Preprocessing Techniques for NID3R

    Trilok Suthar
    290
    288
  • PSO-Based Support Vector Machine Technique with Cuckoo Search For Lungs Cancer Diagnosis

    Dr.K.Mahalakshmi Ms.R.Keerthika Ramyadevi
    247
    265
  • Taxing the Cloud

    Vinay Kumar Singh
    205
    260
  • Simulation of Water Level Control in a Tank Using Fuzzy Logic in Matlab.

    Mohd Iqbal, Dr.K.A.Khan
    526
    545
  • Effective Feature Selection for Feature Possessing Group Structure

    Yasmeen Sheikh, Prof. S. V. Sonekar
    226
    254
  • Comparative Study of Energy Saving Grid-based heuristic approaches in dispersed computational environment

    Rupinder Kaur Rachna Rajput
    262
    255
  • Prospects of Crowd funding Education: A Conceptual Framework

    Annie Stephen, Anita Arul,
    233
    288
  • A New Approach to E-Learning (E-Web Class)

    Vardaan Mittal , Jatin Patwa Mukul Dabi Rishi Raj Somani
    473
    310
  • Digital Video Watermarking Techniques: A Review

    Arti Bhardwaj Ajay Khuteta
    253
    305
  • Travel Information System

    Angad Sachdave Monica Munnangi
    243
    258
  • SVM classifier based CAD system for Lung Cancer Detection

    Apoorva Mahale , Chetan Rawool Dinesh Tolani , Deepesh Bathija Prof. Kajal Jewani
    252
    288
  • A review on Neural Network and Ant Colony Optimization for Vehicle Traffic Analysis and Routing

    Er.Manpreet Kaur Er.Gurpreet Singh
    256
    239
  • Survey of Intentional Enterprises Threats using Social Engineering Exploits and Prevention Techniques

    Swati Chauhan
    483
    273
  • Social Complaint Application

    Ritwit Singh, Srushti Koulage Adarsh Pratap Singh, Prachi Chavan Prof.S.S.Pawar
    246
    289
  • Location Based Social Network For Rating Procedure Geographical Location Using Extended Collaborative Algorithm

    M.Muralikrishnan G.Kalpana M.Karthikraj
    266
    385
  • Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme

    M.Karthikraj , S.Arunkumar M.Muralikrishnan
    251
    268
  • Behavioural Analysis of Android Malware using Machine Learning

    Lokesh Vaishanav ,Shanu Chauhan Hrithik Vaishanav , Mahipal Singh Sank Dr. Rajeev Kumar
    266
    293
  • Students of Bachelor of Technology in Computer Science, School of Computer Science Engineering, Galgotias University, Greater Noida.

    Vanita Dandhwani Dr.Vipul Vekariya
    247
    278
  • A Survey on Image Compression Methods

    Akhilesh Kumar Singh A. K. Malviya
    253
    385
  • Improved Routing Metric In The Overlay Routing Delay Nodes

    Kalyani Wasnik, Prof. Shrikant v.Sonekar
    234
    257
  • Novel Weighted Hybrid Approach in Recommendation Method

    Mr. Avadhut D. Wagavkar, Mrs. S.S.Vairagar
    226
    262
  • Role of Internet of Things in Smart Passenger Cars

    G.Vidhya Krishnan M.Valan Rajkumar D.UmaKirthika
    301
    309
  • A Study of Various Bone Fracture Detection Techniques

    Irfan Khatik
    331
    447
  • A Formation of Cloud Data Sharing With Integrity and User Revocation

    Prof. Butkar U D Ms. Sasane Minal Ms. Sonali Salpure
    207
    249
  • An Efficient Approach for Image Filtering by Directional Neighborhood with wavelets

    Dr. Smrity Prasad
    224
    245
  • Internet of Things: A Survey on Security Issues Analysis and Countermeasures

    B.Sasikala M. Rajanarajana Dr. B. Geethavani
    155
    226
  • Review Paper on Image Enhancement and Its Techniques

    Amanjot Kaur Randhawa Alka Bamotra
    225
    296
  • Staff Monitoring System Using Biometric

    Joseph Elijah, Dr. Amit Mishra M. Usman Gana , Engr. Mathew Chukwu Udo Prof. Abiodun Musa Aibinu
    189
    361
  • Experimental investigation of strength properties of concrete with partial replacement of cement with glass powder and fine aggregate with foundry sand

    Sunil Kumar .V.S Lokesh.J.K
    176
    221
  • Efficient Defense Mechanism against Sybil Attack in Wireless Sensor Network

    Priyanka A
    177
    194
  • Modeling and Performance Analysis of BLDC Motor under Different Operating Speed Conditions

    Karthik K , R Kiran Kumar Panisetty Sreenivasulu
    191
    623
  • Implementation of Railway Track Crack Detection and Protection

    N.Karthick R.Nagarajan S.Suresh , R.Prabhu
    425
    570
  • A Review of Fatigue Monitoring System

    Ms.Sushadevi Shamrao Adagale Sachin Jagannath Pukale Shubhangi Sagar Vairagar
    189
    227
  • A Review of Android Smart Security

    Ms.Sushadevi Shamrao Adagale Sachin Jagannath Pukale Shubhangi Sagar Vairagar
    164
    314
  • Survey on Android application for power efficiency in private cloud

    Vrushali Kadam, Snehal Mane Balabai Waghmode Ms.Soudamini Pawar , Ms. Vidya Nikam
    139
    233
  • DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environment

    Prof. Ashok Kumar Kalal, Kunal Jondhalek Piyush Kumar, Pavan Kumar Pandey Himanshu Thakur
    149
    253
  • Deployment of Data Base as a Service and connecting it with the local server

    Kaustubh Rai Dr. Abhineet Anand
    199
    207
  • Waste Management in IoT- Enabled Smart Cities: A Survey

    Nalavadi Srikantha Khaja Moinuddin Lokesh K S , Aswatha Narayana
    181
    286
  • New Multicast Routing Protocols for Mobile Adhoc networks

    Harendra Kumar, Madan Kushwaha
    157
    244
  • Secure Data Transfer: Based on Steganography and Visual Cryptography

    Rini K D.Rajapriya
    163
    257
  • Knowledge Management in E-Learning A Critical Analysis

    Jui Pattnayak Sabyasachi Pattnaik Priyaranjan Dash
    187
    265
  • Biomedical Named Entity Recognition - a swift review

    S.Vijaya Dr.R.Radha
    213
    237
  • Data Access Control with Revocable Multiauthority Cloud Storage

    P.Srilakshmi Dr.A.V.R.Mayuri K.Asha Rani
    134
    231
  • A Machine Learning Approach for Early Prediction of Breast Cancer

    Younus Ahmad Malla Mohammad Ubaidullah Bokari
    250
    243