Vol. 3 No. 05 (2014)

Published: 2014-05-28

Articles

  • Calculating the Area of the Union of Iso-oriented Rectangles Using MapReduce

    Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
    230
    259
  • Stress Analysis and Optimization of Crankshafts Subject to Static Loading

    Mr.B. Varun
    336
    233
  • Effectiveness of Location Based Routing Protocols against Wormhole Attack in MANETs

    Devendra Kumar, Deepak Kumar Xaxa
    198
    231
  • DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

    V. Uma Rani , Dr. M. Sreenivasa Rao , V. Theresa Vinayasheela
    242
    224
  • K-Means on GPU: A Review

    Vidya Dhamdhere, Rahul G. Ghudji
    205
    233
  • Study of Different Aspects in Machine Learning

    Sheilly Padda, Sonali Gupta, Priya Sharma, Apoorva Arora
    223
    230
  • Improving Intellectual Skills of Students by Analyzing their Performance and Classifying them Based on Bloom’s Taxonomy Using K-Means Clustering Algorithm

    Ms. S. Sangeetha , Ms. M. Thiruvarutselvi
    199
    218
  • Survey Paper for Dynamic Resource Allocation using Migration in Cloud

    Ms. Renu Krishnan, Ms. Silja Varghese
    226
    241
  • A survey on text mining techniques

    Mr. Rahul Patel, Mr. Gaurav Sharma
    228
    297
  • Security and Privacy in Private Cloud Storage

    V.B. Maral, Mehul Sanghvi, Pankaj Rana, Wajeda Pathan, Heena Parihar
    248
    232
  • AN IMPROVED AODV ROUTING PROTOCOL BASED ON LOCAL ROUTE REPAIR MECHANISM

    Arpit Dhingra, Anil Kumar
    262
    210
  • IMAGE DENOISING TECHNIQUES: LITERATURE REVIEW

    Monika Raghav, Sahil Raheja
    201
    234
  • Enhance Performance of Random Testing using Randomized Algorithm

    Jaypal D. Rangari, Swapnili P. Karmore
    173
    234
  • Controllability of mixed Volterra- Fredholm type Impulsive integro-differential inclusions in Banach spaces

    R.Murugesu, T. Tamil Selvan, B. Gayathiri
    184
    219
  • An explicit finite element integration scheme for linear eight node convex quadrilaterals using automatic mesh generation technique over plane regions

    H.T.Rathod , Bharath Rathod , K.T.Shivaram ,K. Sugantha Devi , Tara Rathod
    246
    221
  • Facial Emotion Detection using Eigenfaces

    A.N. Paithane, Shruti Hullyalkar, Gayatri Behera, Neha Sonakul, Aditi Manmode
    259
    227
  • Virtual Sense: An auto email downloading and news reading system for visually impaired people

    Prajakta Made, Snehal Kadam, Darshana Jain.
    246
    196
  • An Implementation of Image Watermarking by Using Gradients

    Dnyandevi W.Shrirao, Prof.Sulbha patil, Prof. Sonal Honale
    170
    241
  • IVRS BASED COLLEGE AUTOMATION

    Pinkey J. Ratnani, Priyanka L. Patil , Rashmi A. Sonawane , Rohidas B. Sangore
    221
    233
  • Blind Noise Level Estimation and Blind Denoising Using Principal Component Analysis

    Bheem Prasad Ram, Sachi Choudhary
    280
    208
  • Complete Performance Analysis of L- band Optical Communication System for NRZ and RZ Format.

    Navdeep Kaur , Gurpreet kaur
    203
    236
  • Design of an Application Specific Microcontroller

    Naveen Kumar, Akshay Jindal, Prof. Alok Basu
    272
    218
  • A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED

    Arti Tiwari, Prof.Nilmani Verma
    203
    215
  • Optimizing Node Position using Ant Colony Optimization Algorithm (ACO)

    A.P.Leela Vinodhini
    215
    218
  • A Report on Dhruval Enterprise Resource Planning Solution Implementing Financial Module

    Lokesh Sharma, Vijayakumar Kubsad, Prasanta Kumar Paul
    207
    209
  • Cloud Computing and Security Issues

    Mrs.R. Pushpalatha
    292
    227
  • IT STRATEGY: A Present Business Need

    Srishti Narayan, Hariom Awasthi
    170
    220
  • AUTOMATED PARKING SYSTEM WITH BLUETOOTH ACCESS

    Harmeet Singh, Chetan Anand, Vinay Kumar, Ankit Sharma
    436
    1644
  • RIVER: A RELIABLE INTER-VEHICULAR ROUTING PROTOCOL FOR VEHICULAR ADHOC NETWORKS

    R.Mallika Devi, Dr.B.Srinivasan
    206
    211
  • An Enhanced Level Set Segmentation for gray Images Using Fuzzy Clustering and Lattice Boltzmann Method

    Savita Agrawal, Deepak kumar xaxa
    407
    218
  • SMART VISION SYSTEM FOR BLIND

    Prof.R.R.Bhambare, Akshay Koul, Siddique Mohd Bilal, Siddharth Pandey
    238
    231
  • A Survey of SignCryption Its Types and Techniques

    R. Bahirathy, S. Aruljothi
    308
    195
  • Protection from Vampire Attacks on Routing Protocol

    Pushpalata D. Chandore, Devendra Vatsa, Nitesh Rastogi
    216
    200
  • Design and Simulation of Microstrip Patch Antenna for Wireless Communication

    Gyanender Kumar, Charanjeet Singh, Deepender Dabas
    230
    221
  • Greening the Cloud Computing

    Deepak Prashant
    203
    204
  • Mine Adverse Drug Reaction from Patient Electronic Database using Particle Swarm Optimization

    M.Maheswari, Ms. J.Preethi
    191
    226
  • REVIEW OF CATTLE MONITORING SYSTEM USING WIRELESS NETWORK

    Anselemi B.Lukonge, Dr.Shubi Kaijage , Ramadhani S. Sinde
    284
    222
  • Brain Tumor Detection and Classification Using Histogram Equalization And Fuzzy Support Vector Machine Approach

    K. Vinotha
    169
    254
  • Vehicle Number Plates Detection and Recognition using improved Algorithms: A Review with Tanzanian Case study

    Cosmo H.Munuo, Dr. Michael Kisangiri
    218
    233
  • Demographical Implementation of Graph Classification in Educational Network Using Graph Mining Technique

    S.A Amala Nirmal Doss, Dr.S.P.Victor
    218
    204
  • Use of Dispersion Compensating Fiber in Optical Transmission Network for NRZ Modulation Format

    Gurpreet Kaur, Navdeep Kaur
    152
    207
  • UNDERWATER VIDEO PROCESSING FOR DETECTING AND TRACKING MOVING OBJECT

    Srividya M. S., Hemavathy R., Shobha G.
    103
    179
  • Mitigation of co residence profiling from malicious user through MUSSEL BEHAVIOR framework

    A.P.Leela Vinodhini .M.E , A.Justine Jerald M.Tech
    141
    207
  • Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream

    Mr.Sulabh.S, Mr.Siva Shankar.S
    120
    285
  • ASPECT EXTRACTION & SEGMENTATION IN OPINION MINING

    Mily Lal, Kavita Asnani
    169
    204
  • Enhancing Accuracy in Cross-Domain Sentiment Classification by using Discounting Factor

    K.Aarthi, C.S.Kanimozhi Selvi
    145
    190
  • AUTOMATED BLOOD VESSEL SEGMENTATION IN RETINAL IMAGE

    Pradeepa.BMr., J.Benadict Raja
    133
    197
  • Improving Efficiency of IDS using alert Correlation

    Thakar Vivek R, Prof. Vrushank Shah, Prof. Yatin Patel
    146
    186
  • A Survey on: Pre-Emptive Migration of a video process using Genetic Algorithm on Virtual machine

    Ranjitha K N, Sandhya S, N K Cauvery
    119
    170
  • Survey Paper for Resisting Web Proxy Based Http Attacks by Locality Behavior

    Lakshmi B, Silja Varghese
    188
    209
  • OBJECT DETECTION AND TRACKING IN VIDEOS : A REVIEW

    Nagalakshmi.C.K, Hemavathy.R , Shobha.G
    142
    208
  • Fraud Detection Social Security and Social Welfare Data Mining

    A.Jenifer Sophia, S.Parthiban
    145
    210
  • Studying and Comparing Automated Testing Tools; Ranorex and TestComplete

    Neha Dubey, Mrs. Savita Shiwani
    203
    327
  • Augmented Reality based on Image Processing

    Mayank Pandey, Ms. Prabha Nair, Dr. Manoj Wadhwa , Ashish Chaudhary
    157
    203
  • AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK

    C.Vijayakumaran, K. Janaky
    112
    183
  • A Common Fixed Point Theorem for A-Contraction Mapping and its Application

    Rakesh Kumar, Arvind Gupta
    118
    172
  • A Systematic Approach to Cloud Security Using SeDas Platform

    Karthik D U, Madhu C, Sushant M
    126
    190
  • Methodology for Selection of Spindle Drives for Milling Machines

    Mikho Mikhov, Marin Zhilevski
    142
    211
  • Delivering Of Real Time Services through Internet Protocol Using Cloud Computing

    Nikshape S S, Deepak S S
    116
    181
  • Opportunistic Routing Protocols In Human Working Day Model Delay Tolerant Networks

    Shermina V Anthru, T.P Jayakumar
    129
    187
  • Security Issues Cloud computing Storage

    Kunjali Bhardwaj, Dr.Neerja Jindal
    154
    179
  • Location Privacy using Traffic-Aware Mix zones in Vehicular or Mobile Networks

    Anju Pathrose, T.Poornima
    122
    177
  • A SURVEY ON WIRELESS SENSOR NETWORKS APPLICATION FOR AIR POLLUTION MONITORING

    Godbless Swagarya , Shubi Kaijage , Ramadhani S. Sinde
    135
    199
  • Challenges in Testing of Web Applications

    Anisha Tandon, Dr. Mamta Madan
    152
    201
  • Various Methods to improve the visual appearance of Black & White and Colored Images

    Baljit Kaur, Monika Tuteja, Shally Gujral
    151
    177
  • Web Usage Mining For extracting Users’ Navigational Behavior

    Divya Racha
    114
    207
  • Wood Species Identification System

    S. Mohan, K. Venkatachalapathy, S. Ezhil Priya
    138
    191
  • Cut Detection in Wireless Sensor Networks: A Survey

    Goodubaigari Amrulla, Murlidher Mourya, Shaik Ansar Basha
    147
    178
  • A Survey and Comparative Study of Routing Protocols in Wireless Sensor Network

    Sakshi Sharma, Malti rani
    131
    182
  • Automatic Texture analysis of cartilage for early detection of osteoarthritis

    Anjani, Sanjeev Kubakaddi
    153
    185
  • Pruning the Cloud Internal Data Stealing By Treachery Attacks

    Shobha Agasibagil, Mr. G.Lingana Gowda
    169
    171
  • Realization of computerized text taxonomy through a supervised learning system

    Mr. Suresh G S, Mrs. Sharayu Pradeep
    118
    167
  • Fast Greedy Algorithm for Routing in Delay Tolerant Network

    Aditya Pancholi, Sapna Grover
    187
    212
  • Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

    Mrs.Shantala C P, Mr.Anil Kumar
    151
    189
  • Group Co-operative Schemes for Optimal Multicast Capacity-Delay Scaling in MANET

    Geetha.C, Mr. Justin Gopinath
    129
    193
  • Mtbf Analysis Of The Two-Unit Series System With Repair Facility

    V.K. Pathak, Kamal Mehta, Seema Sahu & H.L. Manker
    142
    207
  • Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation

    S. Chandrakanth Sagar, Dr. M. Narayana
    321
    0 631
  • Development of Wireless Communication Networks: From 1G to 5G

    Shivam Jaiswal , Ajay Kumar , Neha Kumari
    214
    833
  • Refinement of visual secret sharing scheme without image size expansion

    Ms. Smita Patil, Prof. Ms. Jyoti Rao
    112
    181
  • A New Automated Scheme of Quadrilateral Mesh Generation for Finite Element Analysis

    H.T. Rathoda, Bharath Rathod , K. T. Shivaram, K. Sugantha Devi
    166
    200
  • Success of Windows 8: Capturing multiple markets

    Ajay Kumar, Shivam Jaiswal,Asha Yadav
    124
    222
  • FSR: Ferry-based Secure Routing Algorithm for Delay Tolerant Networks

    Sapna Grover, Aditya Pancholi, Sonika Arora
    141
    197
  • Development of PCU Value of Vehicle under mix Nature Traffic Condition in Cities on Congested Highways

    A.R.Khanorkar, S.D.Ghodmare
    187
    1693
  • An Overview of Reusability of Software Components

    Ramandeep Kaur, Navjot Kaur, Rajwinder Kaur
    113
    189
  • An NLP Method for Discrimination Prevention Using both Direct and Indirect Method in Data Mining”

    Sampada U. Nagmote, Prof. P. P. Deshmukh
    168
    216
  • Re-ranking of Images using Semantic Signatures with Duplicate Images Removal & K-means clustering

    Sayali Baxi, S.V.Dabhade
    124
    186
  • MR Image Reconstruction with L1norm Minimization and Total Variation Denoising

    Danny Joseph, Manu Raju
    173
    201
  • Algorithmic Reduction and Optimization of Logic Circuit in area and Power Tradeoffs’ with the Help of BDD

    Gaurav Sharma
    139
    187
  • Automated-Combined valve oscillation testing machine for 4&6 Cylinders

    Ms. Nutan Ghodake, Ms. Pooja Doshi, Ms. Shruti Dharmahattikar
    159
    197
  • Implementation of Cooperative Caching in Social Wireless Networks

    S.L.Suganya, Dr.R.Indra Gandhi
    110
    194
  • Performance analysis of different Image Enhancement Algorithms”

    Mr. Gharu Anand Nandlal, Prof. Rastogi Nitesh
    136
    179
  • Trust-based security for Ad-Hoc network

    Prof. (Ms) A. A. Patil, Prof. T. I. Bagban, Prof. S. J. Patil
    110
    170
  • A Literature Survey on Mobile Cloud Computing: Open Issues and Future Directions

    Nitesh Kaushik, Gaurav, Jitender Kumar
    198
    205
  • Intelligent technique for mining customers review by the help of opinion mining

    Shubham pandey, Prateek gupta
    115
    207
  • Development of an e-Diary Service for Deployment on the UFH network

    Shadreck Mudziwepasi, Phumzile Nomnga, Mfundo Shakes Scott
    129
    216
  • PROTECTED DESIGN FOR TOPOLOGY TO MANAGE AND AUTHORIZE MOBILE AD HOC NETWORK

    Mr.J.Rajesh B.E.,(M.E), Mrs.A.Kamakshi* M.Tech
    149
    190
  • IMPROVED EXPECTATION MAXIMIZATION CLUSTERING ALGORITHM

    Garima Sehgal, Dr. Kanwal Garg
    138
    211
  • A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

    Kanchan, Harwant Singh Arri
    135
    197
  • Product Review By Sentiment Analysis

    Devare Jayvant,Punde Sunita, Sahane Sujata,Shendage Sonali, Kanase Rajesh
    122
    188
  • Rainfall Prediction Using Data Mining techniques: A Survey

    Shoba G, Dr. Shobha G.
    139
    187
  • Use of Image Processing Techniques for Making Run out Decision in Cricket

    Shashank Yeole, Nisheet Sharma, Yogesh Shinde, Sufiyan Shaikh
    113
    290
  • Cross lingual information retrieval using tf-idf and similarity measures

    Prof. Pankaj Khambre, Aishwarya Pathak, Aarti Deshpande, Shringar Jha
    125
    315
  • Increasing Performance of Cooperative Opportunistic Routing in MANET using Spatial Reuse

    Raghunath M. Kawale, Prof. M. D. Ingle
    140
    185
  • A STUDY ON SOFTWARE RELIABILITY, RELIABILITY TESTING AND GOMPERTZ MODEL

    Sandeep Sharma
    132
    205
  • Solving Multistage Graph using ACS Algorithm

    Pankaj D.Khambre, Ms.Aarti Deshpande
    141
    195
  • Vehicle Health Monitoring System In A Developing Nation.

    Ebole Alpha F., Prof. Omotosha O. J
    113
    179
  • A SURVEY ON WEB IMAGE SEARCH USING RERANKING

    Shweta gonde, Assistant Professor Uday Chouarisia, Assistant Professor Raju Barskar
    124
    201
  • A survey on phishing detection and prevention technique

    Archit Shukla , Lalit Gehlod
    162
    214