Vol. 6 No. 1 (2017)

Published: 2017-01-01

Articles

  • Classification and Analysis of Web Multimedia Data using Principal Component Analysis

    Siddu P. Algur1 , Basavaraj A. Goudannavar Prashant Bhat
    1791
    304
  • Weighted Energy Efficient Cluster Based Algorithm in MANET

    Sanehi Sirohi Manoj Yadav
    362
    288
  • Training Feed forward Neural Network With Backpropogation Algorithm

    RashmiAmardeep Dr.K ThippeSwamy
    343
    597
  • Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms

    N. Priya Dr. M. Kannan
    362
    428
  • Identification of Human using Palm-Vein Images: A new trend in biometrics

    Miss. Swapnali N. Dere Dr. A. A. Gurjar
    537
    0
  • An Efficient Fair Resource Allocation in Multicast Networks

    M. Sangeetha
    293
    287
  • Prediction of Breast Cancer using Random Forest, Support Vector Machines and Naïve Bayes

    Madeeh Nayer Elgedawy
    580
    0
  • A Novelistic Querying procedure for clustering the Legal Precedents

    B.Basaveswar Rao, B.V.RamaKrishna K.Gangadhara Rao, K.Chandan
    640
    276
  • Analytical Solutions For Security Issues In Cloud Environment

    Smaranika Mohapatra Dr. Kusum Lata Jain
    242
    278
  • Ionic Liquids – A New Era in Green Chemistry

    T.Vedavathi, T.Srinivas
    425
    322
  • Development of Students Results Monitoring System Model

    Sulis Sandiwarno
    311
    322
  • Constant amplitude fatigue crack growth life prediction of 8090 Al-alloy by ANFIS

    J. R. Mohanty
    545
    264
  • Hybrid Technique Based Blind Digital Image Watermarking

    Shubhangi Pande Santosh Varshney
    268
    270
  • A Review on Dynamic Clustering: Using Density Metrics

    Megha S.Mane , Prof.N.R.Wankhade
    269
    290
  • Energy consumption of High Power MANET Using LVC

    K.Santhya, Dr.N. Sasirekha
    240
    275
  • Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM

    M. Praveen E. Adinarayana Dr .V.S.R.Kumari
    589
    256
  • Review of protocols used in Multicasting Communication

    Ashish, Jyotsana pandey
    239
    281
  • Specific Trait Identification in Margins Using Hand Written Cursive

    Syeda Asra, Dr.Shubhangi DC
    435
    272
  • Sentiment Analysis of Reviews for E-Shopping Websites

    Dr. U Ravi Babu
    275
    467
  • Ashirwad: An extremely cost efficient Swabbing Robot

    Rupinder Kaur
    360
    317
  • DNA Computing

    Rajni A
    252
    348
  • Approaches for Camera Source Identification: A Review

    Mr. Amol P. Khapare Mrs. D. A. Phalk
    219
    276
  • Analysis of handwriting patterns of Dyslexic Children vis-à-vis the nondyslexics using Hamming Distance

    Dr. Jyotsna Dongardive Malhar Margaj
    260
    249
  • Double-Faced Data Hiding Techniques in Images using RIT: A Survey

    Mr. Santosh Kale
    293
    250
  • Balancing Load in Smartphone’s

    Rakesh Podaralla, Dr., V.Hanuman Kumar
    558
    234
  • Optimizing Information Rate in Polynomial Based Image Secret Sharing Scheme Using Huffman Coding

    Nehal Markandeya, Prof.Dr.Sonali Patil
    367
    259
  • Image Compression Using Huffman Coding

    Nehal Markandeya, Prof.Dr.Sonali Patil
    292
    486
  • A Study on Web Content Mining

    Anurag kumar Ravi Kumar Singh
    282
    330
  • Finding the Routing Table by Dynamic Processing Method in Distance Vector Routing

    Jyotsana Pandey Ashish
    269
    316
  • Usage of Data Mining Techniques for combating cyber security

    Farhad Alam Sanjay Pachauri
    262
    263
  • Evaluating Prediction of Customer Churn Behavior Based On Artificial Bee Colony Algorithm

    Riddhima Rikhi Sharma Rajan Sachdeva
    584
    286
  • Data Hiding System with Mosaic Image for Protected Communication

    Manjunatha N Mrs. Reshma M
    540
    230
  • Recursive Formulation Based Parallel Self Timed Adder Design Based Architectural Design and CMOS Implementation Approach

    Badavath Ravikumar, Fouziya Yasmeen
    246
    263
  • Behaviour analysis of STREE, SABR and SARDS under different simulation enviornements:A Case Study.

    Roopashree H.R., Dr. Anita Kanavalli
    217
    223
  • Research for Cipher Chip for the Encryption of Sensor data: A Survey

    Shali Sara Abraham , Supriya L.P
    478
    225
  • Survey on Opportunistic Routing Protocol: JOKER

    Brejit Lilly Abraham, Anjana P.Nair
    209
    227
  • Foundation of Ethics and Practice in Amitābha Cult: Modern Social Perspective

    Le Trong Nghia
    526
    229
  • Maximization Influence Flow Using Modified Greedy Algorithm

    Jyoti Rani , Prof. Ashwani Sethi
    520
    247
  • Mining Web Graphs for Large Scale Meta Search Engine Results

    Bandi Krishna Dr.V.B.Narasimha
    456
    248
  • Graphical Password as an OTP

    Veena Rathanavel Swati Mali
    611
    251
  • A Survey on Smart Ration Card System

    Golden Bagul , Brendon Desouza Tejaswini Gaikwad , Ankush Panghanti Trupti Kumbhare
    249
    517
  • Development of Embedded Application for Receiver Processor Unit

    B Charan Singh, Vandana Khare
    204
    197
  • Survey on Efficient Certificateless Access Control for Wireless Body Area Networks

    Jeena Sara Viju Sruthy S
    227
    229
  • A Literature Survey on Password Extraction via Reconstructed Wireless Mouse Trajectory

    Divya S, Anju J Prakash
    202
    250
  • A Review in Statistical Aspects of Data Mining

    K.Samundeeswari, Dr.K.Srinivasan
    217
    201
  • Survey on Face Recognition in the Scrambled Dataset by Using Many Kernels

    Sreehara .B, Lashma .K
    481
    207
  • Survey on Integrated Design of Smartphone Interface with Multiple Image Processing Methods

    Lija John, Vani V Prakash
    398
    209
  • Survey on Monitoring Aquatic Debris Using Smartphone-Based Robots

    Sreelekshmi .B, Vidya .N
    190
    190
  • Survey on a Lightweight Authenticated Communication Scheme for Smart Grid

    Sneha .U Liji Samuel
    184
    200
  • Adaptive Harmonic Elimination in a Grid-Connected Three-Phase PV Inverter

    G Chandra Sekhar P Rama Krishna
    474
    220
  • A Grid Connected Three Phase PV Quasi-Z-Source Inverter with Double Frequency Ripple Suppression Control

    SivaSiddhartha Chalasani Ch Chinna Veeraiah
    479
    235
  • Raspberry PI 3 Based Control and Monitor Remote Machine Automation

    Rekha Onkar Nehete Prof. A.S. Bhide
    169
    273
  • Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment

    Ms. Samita Mokal Prof. Nilima D. Nikam Prof. Vaishali Londhe
    351
    209
  • Brain MR Image Segmentation for Tumor Detection using Artificial Neural

    Prof. Vrushali Borase Prof. Gayatri Naik Prof. Vaishali Londhe
    237
    226
  • An Overview of Distributed System for Wireless Sensor Network

    Nalin Chaudhary Abhishek Choudhary Manoj Kumar
    195
    201
  • A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach

    Ingale Ashwini Nagnath, Kanherkar Hars Kanse Sonali Dilip , Naykinde Pallavi Babasaheb , Prof.Belsare P.P.
    161
    191
  • ADFC Robot: Ashirwad A Low cost much efficient ADFC(Autonomous Dry Floor Clean-up) Robot

    Rupinder Kaur1 , Kamalpreet Kaur Harpreet Kaur
    409
    204