e-ISSN:0976-5166 p-ISSN:2231-3850
Vol. 8, No. 3 |
Article # |
Article Title & Authors (Volume 8 Number 3 Jun - Jul 2017) |
Page |
1. |
ANALYSIS AND DESIGN OF PROTOCOL FOR ENHANCED SELFISH ROUTING SCHEME
Raman Kumar
Abstract | PDF |
192-200 |
2. |
PROTECTING PRIVACY OF BIG DATA IN PRESENCE OF UNTRUSTED MAPPER AND REDUCER
N. Madhusudhana Reddy, Dr. C. Naga Raju, Dr. A. Ananda Rao
Abstract | PDF |
201-209 |
3. |
Application of Pre-processing and Segmentation Methods on Cardiac MR Images
G. N. Beena Bethel, Prof. T. V. Rajinikanth, Prof. S. Viswanadha Raju
Abstract | PDF |
210-217 |
4. |
RANKING OF ROUTER-BASED CONGESTION CONTROL APPROACHES FOR HIGH SPEED NETWORKS USING AHP
Vandana Kushwaha, Ratneshwer
Abstract | PDF |
218-234 |
5. |
A LITERATURE REVIEW ON IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY TOOLS ON RURAL SOCIETY OF INDIA
Atul D. Newase, Dr. Jitendra Sheetlani, Dr. Ranjit D. Patil
Abstract | PDF |
235-240 |
6. |
AUTOMATION OF PRE-PROCESSING OF STUDENTS DATA
Sridevi Bonthu, B V Prasanthi, K Himabindu
Abstract | PDF |
241-245 |
7. |
QUEST OF ROGUE ACCESS POINT IN BLUETOOTH NETWORKS USING NEURAL NETWORK
Menal Dahiya
Abstract | PDF |
246-248 |
8. |
Review on Feature Extraction methods of Image based Sign Language Recognition system
Hemina Bhavsar, Dr. Jeegar Trivedi
Abstract | PDF |
249-259 |
9. |
Hybridized Combinational Feature Selection Framework for Network Intrusion Detection System (HCFSF)
Shivangi Seth, Rajni Ranjan Singh Makwana, Manish Dixit
Abstract | PDF |
260-267 |
10. |
SECURE IMAGE PROCESSING USING AES ALGORITHM
Bhavana Verma, Sona Malhotra
Abstract | PDF |
268-273 |
11. |
STUDENT FINAL GRADE PREDICTION BASED ON LINEAR REGRESSION
Mahesh Gadhavi, Dr. Chirag Patel
Abstract | PDF |
274-279 |
12. |
Enhancing Data Security in cloud using Encryption Techniques
Tannu, Dr. Karambir
Abstract | PDF |
280-284 |
13. |
MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS
Harjinder Kaur, Dr. Gurpreet Singh
Abstract | PDF |
285-296 |
14. |
Analysis of Some Software Reliability Growth Models Using Failure Data of Real Time Control System
Javaid Iqbal
Abstract | PDF |
297-305 |
15. |
AN EFFICIENT SERVICE ALLOCATION & VM MIGRATION IN CLOUD ENVIRONMENT
Puneet Dahiya, Jitender Kumar
Abstract | PDF |
306-312 |
16. |
WEB DATA MINING IN E-SERVICES – CONCEPTS AND APPLICATIONS
Sunil, Prof. M. N. Doja
Abstract | PDF |
313-318 |
17. |
Review of the Teaching Learning Based Optimization Algorithm
Aruna, Dr. Sheetal Kalra
Abstract | PDF |
319-323 |
18. |
A STUDY ON QR CODE BASED PUBLIC CLOUD DATA PROTECTION
Srikanth Bharadwaj
Abstract | PDF |
324-332 |
19. |
THE ROLE OF FUZZY LOGIC IN CASE-BASED REASONING: A SURVEY
Nabanita Choudhury, Dr. Shahin Ara Begum
Abstract | PDF |
333-340 |
20. |
A Technique for Design Patterns Detection
Manjari Gupta
Abstract | PDF |
341-345 |
21. |
FIREFLY OPTIMIZATION BASED DIMENSIONALITY REDUCTION FOR IMPROVING ACCURACY IN JOB HUNTING
Dr. D. Asir Antony Gnana Singh, B. Krishna Kumari, Dr. E. Jebamalar Leavline
Abstract | PDF |
346-357 |
22. |
Automatic estimation of crowd size and target detection using Image processing
Asst Prof. Avinash Rai, Rahul Meshram
Abstract | PDF |
358-362 |
23. |
A LIGHTWEIGHT WIRELESS INTRUSION DETECTION SYSTEM FOR IEEE 802.11 BASED WIRELESS SENSOR NETWORK
Siva Balaji Yadav C, R Seshadri
Abstract | PDF |
363-374 |
24. |
BIG DATA CHALLENGES AND ISSUES: REVIEW ON ANALYTIC TECHNIQUES
Saritha K, Sajimon Abraham
Abstract | PDF |
375-382 |
25. |
SEMANTIC WEB MINING: OPTIMUM APPROACH
Mamta, Dr. Vijay Rana
Abstract | PDF |
383-388 |
26. |
DESIGN AND ANALYSIS OF OPTICAL PATTERNS USING BACTERIAL FORAGING OPTIMIZATION ALGORITHM FOR OPTIMIZED ILLUMINATION
Namrata Karlupia, Pawanesh Abrol, Parveen Lehana
Abstract | PDF |
389-394 |
27. |
AN AUTOMATED SEGMENTATION OF HUMAN IRIS FOR BIOMETRIC IDENTIFICATION
P. Kalavathi, S. Naganandhini, G. Sabari Durga, S. Boopathiraja
Abstract | PDF |
395-399 |
28. |
In Depth Analysis of Semantic Similarity for Context Attributes in Recommender Systems
PallabDutta, Dr. A. Kumaravel
Abstract | PDF |
400-413 |
29. |
FEATURE SUBSET SELECTION AND CLASSIFICATION USING HYBRID IMPROVED SVM
P.Arumugam, P.Jose
Abstract | PDF |
414-423 |
30. |
16 BIT IMPLEMENTATION OF ASYNCHRONOUS TWOS COMPLEMENT ARRAY MULTIPLIER USING MODIFIED BAUGH-WOOLEY ALGORITHM AND ARCHITECTURE.
AditiPandey, AvinashRai
Abstract | PDF |
424-430 |
31. |
A REVIEW OF DATA PRIVACY AND SECURITY IN CLOUD COMPUTING
Sugandh Bhatia, Rajinder Singh Virk, JyoteeshMalhotra
Abstract | PDF |
431-435 |
32. |
Performance Enhancement of MANET using Multi Criteria Algorithm (M.C.A)
Narinder Kumar, Prof. Jahid Ali
Abstract | PDF |
436-447 |
33. |
Graphic Integer Sequence as canopy of Trees
Krishnendu Basuli
Abstract | PDF |
448-451 |
34. |
ARTIFICIAL INTELLIGENCE AND ANT COLONY OPTIMIZATION BASED WIRELESS SENSOR NETWORKS TO MINIMIZE ENERGY OF NETWORK
Sneha S. More, Prof. Mininath K. Nighot
Abstract | PDF |
452-462 |
35. |
Enhanced Ad-hoc On-Demand Distance Vector Routing Algorithm
Nidhi Beniwal, Mamta Mittal, Lalit Mohan Goyal, Monika
Abstract | PDF |
463-469 |
36. |
Analysis of Scalable and Energy Aware Multicast Routing Protocols for MANETs
Dinesh Chander, Dr. Rajneesh Kumar
Abstract | PDF |
470-478 |
37. |
TЕST AUTOMATION AS FRAMЕWORK FOR WЕB APPLICATIONS
Suman Madan, Aakriti Kakkar
Abstract | PDF |
479-486 |