Vol. 5 No. 11 (2016)

Published: 2017-12-30

Articles

  • Seamless Access Internet using Wi fi in Dynamic Vehicles

    Kiruthika A.M Chandra Sekran .S
    207
    247
  • A Survey on Multi Owner Data Sharing for Dynamic Groups in the Cloud Securely

    Sushma Nallamalli ,SivaNagaRaju Rajulapati Chandrajit Yadav Loya
    285
    262
  • The Human Genome Project: An Insight to the Homo Sapiens

    Neda Firoz .
    286
    245
  • A Survey on Smart Garbage Management in Cities using IoT

    Ruhin Mary Saji, Drishya Gopakumar , Harish Kumar S , K N Mohammed Sayed Lakshmi s
    380
    840
  • An Experimental On Time Table Generator

    D Raju and V Mallesh .
    215
    428
  • Adaptive Video Streaming Through Server Driven Rate Control In Manets

    Yaddula Vijay Babu , R.Raja Sekhar
    246
    270
  • An Approach of Handling Packet Loss for Delay Sensitive Video Streaming in MANETs

    Y.MD.Inayathulla, R. Raja Sekhar
    221
    259
  • Improved LEACH Routing Communication Protocol for Wireless Sensor Network

    Mankita, Er. Paramjeet Singh, Er. Shaveta Rani
    219
    270
  • Maximum Power Point Tracking Using DRCC and MRAC With Modified Mit Rules For PV Cells

    K.SriRakavi ,N.Muthumohanraj
    270
    293
  • Preventive Measurement and Online Insulation Evaluation of Power Transformer

    T.Saranya. ,R.Dheivanai
    285
    271
  • Scalability Study of Hadoop MapReduce and Hive in Big Data Analytics

    Khadija Jabeen , Dr TSS Balaji
    251
    316
  • Data Deduplication in Parallel Mining of Frequent Item sets using MapReduce

    Pavithra.K .
    286
    260
  • Parikh matrix on the Context-Free Grammar for Natural Languages

    Amrita Bhattacharjee ,Bipul Syam Purkayastha
    254
    306
  • Garbage Collection Management System

    Pranjal Lokhande , M.D.Pawar
    299
    400
  • Enhancing the Performance of AODV by Exchanging Neighboring Node Information with Hello Packets in VANET

    Shubham Mittal, Swati Singh, Kamlesh C. Purohit
    239
    250
  • Trust Factor Based Secure Congestion Control For Vanet

    Shanty Bala , Dr. Vijay Laxmi
    240
    262
  • Map Reduce Framework Driven Apriori Algorithm Base Model of Opinion Mining for drug Review

    R.Rajesh, B.Raghu Ram B.Hanmanthu, Dr.P.Niranjan
    242
    263
  • Cloud computing and security issue

    Rajendra kumar .
    252
    264
  • Improving the Reverse Dictionary Using Scalable Dataset

    Mrs. R. Carolene Praveena, Mrs. A. Manjula
    182
    261
  • Investigation on Super Lift DC/AC Inverters Using Photovoltaic Energy for AC Component Application

    Mr.A.Johny renoald , M.Dhivya B.E
    304
    308
  • A Survey on Efficient Broadcast Protocol for the Internet of Things

    Anusree Radhakrishnan Minu Lalitha Madhav
    193
    266
  • A Review on Security Challenges and Considerations in Cloud Computing

    Riten Shah, Karan Pittie , Priya G.
    166
    237
  • A Paper On Edge Detection In Images Using Fuzzy K Means Clustering Approach

    R.Dhivya, R.Prakash, R.Thilepa
    228
    252
  • Implementation of clustering of uncertain data on probability distribution similarity

    Nikhatparvin Ahamad ,Shahid Nadeem ,Shyam Dubey,Nusrat Anjum
    183
    252
  • Prediction of post overload fatigue crack growth life of HSLA steel under mixed-mode (I and II) spike overload by using genetic programming

    J. R. Mohanty .
    243
    226
  • Secure Data Retrieval Of Attribute Based Encryption Policy System

    Mahaling G. Salimath Pavana S. Baligar, Sharada K. S Rajeshwari Banni
    241
    233
  • Review on Mining High Utility Patterns Decreasing Candidates

    Satyajeet Bankar,Krushna Barve Rohit Dusane,Tejas Desale
    239
    224
  • Plastic Flexible Memory Chip Devices

    Prachi D.Bhuskat Priya G. Babhulkar Jay R. jayjethawa, .Ruchi M.Iche
    287
    274
  • Software Reliability Testing Tools: An Overview and Comparison

    Manohar Singh .
    696
    350
  • An Approach of Computer Simulator for Integrating with Radar Data Encoder by using Basic Platforms

    Saniya Taskeen, Inchara.K Rumana Sadiya, Mohammed Elahi
    194
    265
  • Review on Security Management in Cloud computing

    Gouri Ajeev , Karthik Karunakaran Arpita Gaur, Priya G
    188
    266
  • A Survey on Privacy Protected Facial Biometric Verification

    Parvathy R , Dhanya Sreedharan .
    222
    245
  • Alternative Method of Audio Searching (AMAS)

    Biprajeet Pal, Vishal Ramanathan Abhilaksh Sharma , Riten Shah , Sarthak Raisurana
    218
    234
  • A Survey on Secret Data Transmission Using Various Steganographic Aspects

    Ajin P Thomas, Sruthi P.S,Jerry Rachel Jaco,Vandana V Nair,Reeba R
    208
    254
  • Importance of Wireless Sensor Network and Artificial Intelligence for Safety Prerequisite in Mines

    Amar Nath Singh ,Er. Subhasritam Tripath , Er. Prasanna Sahoo,Er. Bikash Panda Er. Utkal Kumar Pradhan, Er. Abhilash
    249
    240
  • Implementation of Solar Power Ac Motor Pump Set on MPPT With Battery Backup For Agriculture System

    S.Kalasathya , P.Sathish Khanna
    238
    263
  • Distortion-Resistant Routing Framework for Video Traffic in Wireless Networks

    Dr.G.Kavitha, M.Agalya AP,S.Gayathri AP,S.K.Murugaraja AP
    236
    260
  • Safety of Underground Coal Mine Using Artificial Intelligence and Wireless Sensor Network

    Amar Nath Singh, Er. Ravi Ranjan Kumar Er. Vijay Kumar, Er. Vipin Gautam
    243
    252
  • Supporting Humans in an Intelligent Manner with Awareness of the Human’s State Using Artificial Intelligence & Machine Learning

    Amar Nath Singh Divyanshu Anand, Divyanshu Kumar Chandan Kumar, Dhiraj Kalindi
    222
    215
  • A survey paper on logical perspective to manage BigData with incremental map reduce

    Snehal Dhamelia A.P.Kankale
    191
    254
  • Trust Mechanism in E-Commerce

    Kunal Sanghvi, Chetan Kumar, Aditya Trikha, Prof. Priya G
    137
    275
  • Utility Study of Neural Network and Back Propagation Algorithm in The Field Of Learning And Computing Data In Mines Area

    Amar Nath Singh Er. Amit Kumar Patra Er. Biswabijayee Dash, . MD Aqueeb Jawed Er. Krishnananda Nayak
    149
    219
  • A Comprehensive Assessment and Comparative Analysis of Simulations Tools for Cloud Computing

    Nimisha Patel, Hiren Patel
    161
    252
  • A Survey on Feature Extraction Techniques for Image Retrieval using Data Mining & Image Processing Techniques

    Sreelekshmi.U, Anil A.R
    185
    215
  • A Survey on Traffic Management in Smart Cities

    Anaswara R Lakshmi S
    163
    210
  • A Survey on Active Queue Management Techniques

    Anup Kumar Sharma, Ashok Kumar Behra
    196
    218
  • Social Event Storyboard Generation from Image Click-A Survey

    Sreelekshmi.U Gopu Darsan
    159
    224
  • High Gain Coupled Inductor-Based Dc/Dc Converter For Offshore Wind Energy Systems

    S.Priyadharshini1 ,K.Devaraj .
    210
    236
  • Privacy Circles: Sharing Images on Social Networking Sites Using A3P

    Dr Sheikh Gouse, Dr G Kiran Kumar M. Jhansi, B. Kishore Kumar
    144
    232
  • Research & Survey of Data Mining Techniques In Educational System

    Surabhi juneja, Swapnali kendre , Parinita chate
    152
    257
  • Review of Agile Project Development Technique

    Dhruv Jindal, Arushi Gupta, Katik Chopra Vasiraju Srivenkatesh, Prof Ramesh Babu
    156
    232
  • Auto Contour Initialization of Breast Masses in Contrast Enhanced Breast CT

    Harmandeep Kaur , Neeraj Julka
    159
    243
  • Yawning detection and Head Nodding Detecion Analysis of Student Engagement during online Tutorials

    Harshali S.Sawale , R.R.Keole
    160
    234
  • A Comparison Survey of Multiple Access Scheme for upcoming 4G Communication

    Digjaya Dhawan, Dhruv Jindal Arushi Gupta, Priyanshi Gupta
    157
    240
  • Image Enhancement Using Novel Spatial & Frequency Techniques

    Er. Ashutosh Kumar Singh .
    156
    227
  • Network Switching: Traditional Techniques and Evolution

    Devid Sahu, Divyanshu Tiwari , Pranjali Singh, Ruchi Bhatt Rajesh Singh Thakur
    209
    451
  • A Data Owner Controlled Model for Co tenant Covert Channel Protection

    S.Rama Krishna, B.Padmaja Rani
    115
    210
  • Efficient Exploration of Algorithms in Scholarly Documents Using Big Data Analytics

    B. Tamil Bharathi , K. Devaki
    178
    236
  • Task Scheduling Using Meta-Heuristic Optimization Techniques in Cloud Environment

    M.Jaeyalakshmi , Dr.P.Kumar
    138
    199
  • Review on K-Mode Clustering

    Antara Prakash, Simran Kalera Archisha Tomar, Aarushi Rai Pooja Reddy, Prof. Ramesh Babu
    182
    652
  • Review on Intrusion Detection and Prevention System

    Sayalee Shinde S.V.Athawale
    144
    236
  • The Challenges and Opportunities of E-Commerce in India: Future Prospective

    Dr. P. Devaraju .
    165
    542
  • An Incorporation of Artificial Intelligence Capabilities in Cloud Computing

    Mandeep Kumar
    218
    391
  • Uploading Images on Content Sharing Sites with privacy Policy Inference

    Venkatesh, Sudheer Kumar
    119
    215
  • Common Fixed Point Theorem for Compatible Maps of Type (β)

    Dr.M.RamanaReddy .
    144
    201
  • An Energy Saving Multipath AODV Routing Protocol In MANET

    Seema Tiwari, Er. Prateek Singh
    145
    209
  • Diagnosing Venomous Facebook Applications

    K. Saiprasad .
    150
    228
  • Smart System To Avoid Bridge Collapses

    Mohamed Harris .
    184
    237
  • Temperature Controller for Continuous Stirred Tank Reactor using Adaptive PSO Based PID Controller

    S.Boobalan, K.Prabhu .
    189
    261
  • Precision Agriculture Using Wireless Sensor Network System: Opportunities and Challenges

    Manikandan .S.V Jayapriya .P
    192
    295
  • A New Improve Intrusion Prevention System Security for Wireless LAN A Review

    K K. Mahurkar, S V. Athawale
    150
    211
  • Spam Zombie Detection and Blocking Mechanism

    Mr. Rajan S. Moravkar Ujwala.V. Gaikwad
    195
    214
  • Trend of Students towards Higher Education in Science & Technology: Study on Central Universities in India

    Shashank Mishra , Manju Pandey
    168
    234
  • Predictive Analysis in E-commerce Domain and Cloud Platforms – A Survey

    Nisha Jha Prof.Amit Saxena
    148
    221
  • Automobile Monitoring Tool

    Ravinder Kumar, Pushap Saini Gautam Kumar
    159
    200
  • Content Based Image Retrieval Using Multifeaturefusion Extraction

    Shrutayu M.Thakre , Prof. D.G..Gahane
    178
    214
  • An Energy Efficient Multicast Routing Protocol for MANET

    Vijay Kumar Tiwari , Dr. Anil Kumar Malviya
    178
    194
  • Image Encryption using RSA Algorithm with Biometric Recognition

    R.Saranya , S.Prabhu
    183
    277
  • Exposure Of Sql Injection In Packet Stream

    M.Sharada Varalakshmi V.Harika Naidu, Shreya Valluri
    181
    594
  • A 3D Molecular design and Management using Data Glove Interaction Technique

    Prachi D, Patil D.R. .
    135
    222
  • Health Centre Monitoring System

    Ayushi Agarwal, Digjaya Dhawan Ankita Singh
    154
    204
  • Economic Potential of Cultural Tourism In Terms of Tourism Marketing

    Tülin Durukan Cihat Kartal
    131
    226
  • A DWT-SVD Hybrid Approach for Robust Digital Image Watermarking

    Hina Lala .
    176
    215
  • Number Plate Recognition and Document Verification using Feature Extraction OCR Algorithm

    Bhonsale Tejas, Dhamal Omkar , Dhumal Rutuja, Khedekar Prajakta Patil Bhakt
    136
    244
  • Analysis Of Cloud Based Multitenant Load Scaling

    Ankita Kaushik, Dr. Vikas Kumar, Dr. Amit Chaturvedi
    174
    217
  • Optimization of Wireless Sensor Networks using PPSS Algorithm

    S.Muthukumaran, S.Neelakandan
    166
    226
  • Breakthroughs and issues in the implementation of Six Sense Technology: A review

    Harsimrat Deo .
    173
    331
  • Design and Modeling of Controllers for Aircraft Pitch Contol Movement

    Ajai Kumar Singh And Rahul Dahiya
    140
    231
  • Performance Analysis of Control Techniques for Roll Movement of Aircraft

    Rahul Dahiya * and Ajai Kumar Singh
    150
    199
  • Overview of MIMO Technology in LTE, LTE-A & LTE-A-Pro

    Bhavesh Khasdev , Angeeta Hirwe
    183
    280
  • Analysis of Effect of Flooding on Performance of Ad hoc Network

    Sumeet Dubey, Aaquib Ladiwala , Vignesh Kamath,Pranav Nanda Shubha Puthran
    487
    278
  • A Survey on Driver Fatigue-Drowsiness Detection System

    Indu R. Nair ,Nadiya Ebrahimkutty Priyanka B.R , Sreeja M Prof. Gopu Darsan
    198
    278
  • A Survey On Biometrics Authentication For Online Transactions

    Neenu Ann Shaji, Soumya Murali , Sumitha Soman, Sandeep Hari, Sanoop Hari
    120
    198
  • Automated Scrolling Using Speech Recognition

    Manikandan K, Apurva Singh Sakshi Agarwal, Ankita Singh
    186
    207
  • Compute the Best Route from All Intersection using Cloud Based Services

    Priyatharsini V, Grahalakshmi S
    118
    209
  • APT Attacks: How Big Data Fights Back

    Rukhsana Ambreen, Prof. Shahid Nadeem Prof. Shyam Dubey
    134
    214
  • Restoration-Multiple Removing of Noise under Water Images using Multidirectional Filtering Techniques

    Sukhjinder Singh , Dr. Sandeep Kautish
    229
    217
  • Segmentation of Degraded Text using Dynamic Profile Projection in Handwritten Gurmukhi Script

    Karamjeet Kaur Ashok Kumar Bathla
    146
    228
  • Review of Various Image Restoration and Denoising Methods Underwater Images

    Sukhjinder Singh Dr. Sandeep Kautish
    121
    203