Vol. 3 No. 12 (2014)

Published: 2017-12-29

Articles

  • A Review of Extraction of Image, Text-line and Keywords from Document Image

    Sneha L. Bagadkar, Dr. L. G. Malik
    263
    250
  • Design and Development of a Remote Monitoring and Maintenance of Solar Plant Supervisory System

    R. Nagalakshmi, B. Kishore Babu, D. Prashanth
    224
    290
  • The Performance Analysis of OFDM-IDMA in Wireless Communication by Using an Iterative Sub-optimal Receiver Structure

    Y.Sukanya, K.Lakshmana Rao
    230
    235
  • Link Analysis in Relational Databases using Data Mining Techniques

    Smita Shinde, Amol Rajmane
    198
    314
  • Using Educational Data Mining (EDM) to Prediction and Classify Students

    Samira Talebi, Ali Asghar Sayficar
    224
    240
  • T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence

    Miss M.A. ShehnazBegum, Miss N.Nalini,Mrs.A.Angayarkanni
    234
    297
  • Rural Marketing in India: Challenges And Opportunities

    Arshi Talwar, Shweta Popli, Sneha Gupta
    261
    515
  • Basic Overview of Mobile Cloud Computing

    Miss Pritee Ashok Rewatkar, Pof. Sonal Honale
    195
    262
  • Multiplex Data Transmission System over a Twisted Pair of Cable

    N.B.Bhawarkar, S.R. Sawalakhe, S.B.Garde, K.V.Tambatkar
    217
    294
  • A Novel Framework for Satellite Image Resolution Enhancement Using Wavelet-Domain Approach Based On Dt-Cwt and NLM

    K. Mehrajul Haq (Pg Scholar), P. Jaya Rami Reddy M.Tech
    239
    242
  • Toll collection and speed monitoring system using RFID

    Yashavi Bhole, Komal Binawade, Rahul Bhosle, Prof. Dhanashri Joshi
    215
    254
  • Simplified approach towards DES

    Harshit Singh, Avineshwar Pratap Singh
    241
    266
  • Web Intelligence-An Emerging vertical of Artificial Intelligence

    Rahul Pareek
    193
    283
  • An integrated system for an effective e-teaching-learning process

    Chidozie Ifeanyi, AdesinaOmolayo, Ayeni Joshua
    227
    270
  • Multiple Image Fusion Using Laplacian Pyramid

    Sukhpreet Singh, Rachna Rajput
    269
    269
  • DWT Based Hybrid Image Compression For Smooth Internet Transfers

    Reetinder Kaur
    227
    245
  • A Study on Free Open Source Data mining Tools

    K. Saravanapriya
    217
    260
  • Energy Structure Theory and Energy Hinded Equation

    Yu Han
    199
    236
  • An High Equipped Image Reconstruction Approach Based On Novel Bregman SR Algorithm Using Morphologic Regularization Technique

    Billa Manasa (Pg Scholor), S. Vaishali M.Tech
    213
    240
  • Reliability Analysis of unreliable MX/G/1 Retrial Queue with Second Optional Service, Setup and Discouragement

    Madhu Jain, Deepa Chauhan
    210
    244
  • Providing Security Features to Android OS With Multiuser Facility

    Sharad Gadhe, Mayur Chaudhari, Ajay Gaikwad, Ajit Patil, Pradnya Kast
    197
    228
  • Digital Image Processing based Detection of Brain Abnormality for Alzheimer’s disease

    Dr. PSJ Kumar, Mr. Anirban Saha
    230
    263
  • Rule Mining in Medical Domain Using Swarm based Techniques

    Varinder Singh
    182
    235
  • Hand Gesture for Controlling a Robotic Device using a Personal Computer

    Shaumika S Rane, Srisakhi Sengupta , Priyanka Kumari, Vishakha M Gandhi
    235
    227
  • Improved Single Sign on Mechanism

    Prof.Pankaj R.Chandre , Kurhe Bhagwan Subhash
    203
    231
  • Review- Challenges in Face Authentication using Extended Principal Component Analysis

    Samarjeet Powalkar, Prof. Moresh M.Mukhedkar
    234
    240
  • A Survey on Sentiment Analysis And Summarization For Prediction

    Vikrant Hole, Mukta Takalikar
    207
    247
  • Review on Big Data Security in Hadoop

    Vijaykumar Patil, Prof. Venkateshan N
    208
    264
  • Review on Data merging and Data movement to accelerate Hadoop performance

    Kishor Shinde, Prof. Venkateshan N
    191
    219
  • A Survey on Secure Reversible Data Hiding Techniques in Encrypted Images by Reserving Space In Advance

    Anjaly Mohanachandran, Mary Linda P.A
    225
    243
  • A Survey on different approaches of CBIR and their combinations

    Krishna N. Parekh, Mr. Narendra Limbad
    192
    260
  • A Survey on Face Recognition and Facial Expression Identification

    Ostawal Prachi Satish, Prof.P.G.Salunke
    170
    239
  • A survey on various summarization techniques

    Divya Vidyadharan, Anju CR
    216
    214
  • Heat Generation and Chemical Reaction Effects On MHD Flow Over An Infinite Vertical Oscillating Porous Plate With Thermal Radiation

    B Lavanya, S.Mohammed Ibrahim, A Leela Ratnam
    194
    225
  • Creating a Knowledge Base by extracting Top-K lists from the web

    Ramya.Y, K.Ramana Reddy
    186
    245
  • A Review Paper on Collaborative Black Hole Attack in MANET

    Barleen Shinh, Manwinder Singh
    207
    233
  • Data Integrity Proofs in Document Management System under Cloud with Multiple Storage

    Ms. Payal P. Kilor, Prof. Vijay B. Gadicha
    190
    226
  • A Survey on CBIR Features Extraction Techniques

    Jahnavi Shukla, Jignesh Vania
    222
    243
  • Investigating the ways through evaluation practice in higher Education: the value of a learner’s need

    Jasleen Kaur, Anjali Bishnoi
    159
    216
  • Gender Recognition and Age-group Prediction: A Survey

    Mr. Brajesh Patel, Mr. Raghvendra
    196
    239
  • A Framework for Privacy Preserving Collaborative Data Mining

    Gottipamula Padmavathi, T.V. Ramanamma
    136
    215
  • Novel Approach for Predicting Performance Degradation in Cloud

    Pritam Fulsoundar, Rajesh Ingle
    163
    211
  • Survey of various query suggestion system

    Prajakta Shinde, Pranjali Joshi
    133
    217
  • Restoration of Historical Wall Paintings Using Improved Nearest Neighbour Algorithm

    Sukhjeet Kaur, Amanpeert Kaur
    151
    208
  • Cyber-bullying

    Er. Anup Lal Yadav, Er. Sahil Verma, Er. Kavita
    227
    235
  • Discussion on Very Small Aperture Terminal Networks

    Er. Anup Lal Yadav, Er. Sahil Verma, Er. Kavita
    221
    293
  • Design of Low Power 9T Full Adder Based 4*4 Wallace Tree Multiplier

    R.Naveen, K.Thanushkodi, R.Preethi, C.Saranya
    156
    255
  • Utilization of Recycled Demolition Concrete

    R. Praba Rajathi, J. Jai kanth
    141
    230
  • Using data mining in prediction of educational status

    Samira Talebi, Ali AsgharSayficar
    129
    212
  • Multimedia Data Mining- A Survey

    Anuraag Vikram Kate, Nikilav P V , Giriesh S, Hari Prasath R S, Naren J
    164
    209
  • Optimized super pixel segmentation for natural image using lazy random walk algorithm

    A. senthil kumari.P, B kapalishwari.T, C.tamilarasi.M
    147
    199
  • A Literature Survey on performance evaluation of query processing on encrypted database

    Rajendra H. Rathod , Dr.C.A.Dhote
    122
    185
  • Dual-Link Failure Resiliency through Backup Link Mutual Exclusion

    Prof. C. M. Jadhav, Prof. Amruta. R. Shegadar, Prof. S. Shabade
    127
    223
  • An Efficient Content Based Image Retrieval System for Sketches by Using PAM Algorithm

    A. Ravi Kumar, A. Yuva Krishna
    145
    224
  • Automatic Colour Mixing Machine using PLC

    Sachin S. Giri, Dr. M. J. Lengare
    177
    604
  • An Optimize Mechanism for Multifunction Diagnosis of Kidneys by using Genetic Algorithm

    Miss.Vaishali M. Sawale, Prof. A.D. Chokhat
    150
    223
  • Development of Cognitive Architecture using Ambient and Swarm Intelligence for the Agents

    Ashwini K, Dr M V Vijayakumar
    154
    221
  • OpthoABM-An Intelligent Agent Based Model for Diagnosis of Ophthalmic Diseases

    Falguni Ranadive, Prof. Priyanka Sharma
    130
    209
  • Tracking Online Assessments through Information Visualization

    T.Sudha Rani, Anusha.Y
    141
    218
  • Latent Overlapped Fingerprint Matching Using Level-2 and Level-3 Features Refinement

    Rajasekar .T , Uma Maheswari.N
    165
    225
  • Noise Power Spectrum for Transfer Press Machines

    Shaikh Irfan, Shaikh Y.H
    150
    203
  • Face Recognition Using Image Processing Techniques: A Survey

    Selvapriya.M , Dr.J.KomalaLakshmi
    141
    385
  • Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling

    Suganya.K, Mrs.A.Nirmala
    146
    209
  • Detecting and Preventing Distributed Denial of Service (DDOS) Attacks Using BOTNET Monitoring System

    S.Manikandan, K. Manikanda Kumaran , S.Palanimurugan , S.Aravindan , S.Praveen Kumar
    161
    245
  • Evaluating Effectiveness of 3D object picking algorithms in Non immersive virtual world

    Dr.M.Mohamed Sathik, K.Merriliance
    132
    410
  • Reliable Techniques for Data Transfer in Wireless Sensor Networks

    S.Lavanya, Dr. S.Prakasm
    123
    218
  • Preventing Senstive Social Network Data By Using UINN Algorithm

    Tummala Surya Padma , B.Venkata Reddy
    149
    230
  • FIS for Edge detection based on the method of convolution and a mixture of Gaussian and triangular membership functions

    Archana R Priyadarshini
    127
    213
  • Metadata Construction Model for Web Videos: A Domain Specific Approach

    Siddu P. Algur, Prashant Bhat, Suraj Jain
    158
    243
  • Evaluating the key findings of Image Fusion Techniques

    Harkamal preet kaur, Sunny Dhawan
    137
    210
  • A Research Paper on Content Based Image Retrieval System using Improved SVM Technique

    Deepu Rani, Monica Goyal
    129
    220
  • An Efficient Technique for Parallel CRC Generation

    CH. Janakiram, K.N.H.Srinivas
    147
    224
  • Duplicate Detection Algorithm In Hierarchical Data Using Efficient And Effective Network Pruning Algorithm: Survey

    Ashwini G Rathod, Vinod S Wadne
    172
    247
  • Tree Detection for Urban Environment Using Watershed Segmentation

    Priyanka Garg, Mukesh Rawat
    114
    229
  • A Survey on Dynamic Load Balancing Strategies for A Distributed Computer System

    B.Srimathi, Dr.M.Ravindran
    129
    221