Published: 2017-01-01

Classification and Analysis of Web Multimedia Data using Principal Component Analysis

Siddu P. Algur1 , Basavaraj A. Goudannavar Prashant Bhat

Abstract 899  | PDF

Weighted Energy Efficient Cluster Based Algorithm in MANET

Sanehi Sirohi Manoj Yadav

Abstract 71  | PDF

Training Feed forward Neural Network With Backpropogation Algorithm

RashmiAmardeep Dr.K ThippeSwamy

Abstract 89  | PDF

Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms

N. Priya Dr. M. Kannan

Abstract 123  | PDF

Identification of Human using Palm-Vein Images: A new trend in biometrics

Miss. Swapnali N. Dere Dr. A. A. Gurjar

Abstract 219  | PDF

An Efficient Fair Resource Allocation in Multicast Networks

M. Sangeetha

Abstract 87  | PDF

Prediction of Breast Cancer using Random Forest, Support Vector Machines and Naïve Bayes

Madeeh Nayer Elgedawy

Abstract 200  | PDF

A Novelistic Querying procedure for clustering the Legal Precedents

B.Basaveswar Rao, B.V.RamaKrishna K.Gangadhara Rao, K.Chandan

Abstract 318  | PDF

Analytical Solutions For Security Issues In Cloud Environment

Smaranika Mohapatra Dr. Kusum Lata Jain

Abstract 71  | PDF

Ionic Liquids – A New Era in Green Chemistry

T.Vedavathi, T.Srinivas

Abstract 167  | PDF

Development of Students Results Monitoring System Model

Sulis Sandiwarno

Abstract 120  | PDF

Constant amplitude fatigue crack growth life prediction of 8090 Al-alloy by ANFIS

J. R. Mohanty

Abstract 243  | PDF

Hybrid Technique Based Blind Digital Image Watermarking

Shubhangi Pande Santosh Varshney

Abstract 72  | PDF

A Review on Dynamic Clustering: Using Density Metrics

Megha S.Mane , Prof.N.R.Wankhade

Abstract 90  | PDF

Energy consumption of High Power MANET Using LVC

K.Santhya, Dr.N. Sasirekha

Abstract 66  | PDF

Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM

M. Praveen E. Adinarayana Dr .V.S.R.Kumari

Abstract 202  | PDF

Review of protocols used in Multicasting Communication

Ashish, Jyotsana pandey

Abstract 58  | PDF

Specific Trait Identification in Margins Using Hand Written Cursive

Syeda Asra, Dr.Shubhangi DC

Abstract 112  | PDF

Sentiment Analysis of Reviews for E-Shopping Websites

Dr. U Ravi Babu

Abstract 89  | PDF

Ashirwad: An extremely cost efficient Swabbing Robot

Rupinder Kaur

Abstract 102  | PDF

DNA Computing

Rajni A

Abstract 70  | PDF

Approaches for Camera Source Identification: A Review

Mr. Amol P. Khapare Mrs. D. A. Phalk

Abstract 58  | PDF

Analysis of handwriting patterns of Dyslexic Children vis-à-vis the nondyslexics using Hamming Distance

Dr. Jyotsna Dongardive Malhar Margaj

Abstract 60  | PDF

Double-Faced Data Hiding Techniques in Images using RIT: A Survey

Mr. Santosh Kale

Abstract 55  | PDF

Balancing Load in Smartphone’s

Rakesh Podaralla, Dr., V.Hanuman Kumar

Abstract 232  | PDF

Optimizing Information Rate in Polynomial Based Image Secret Sharing Scheme Using Huffman Coding

Nehal Markandeya, Prof.Dr.Sonali Patil

Abstract 91  | PDF

Image Compression Using Huffman Coding

Nehal Markandeya, Prof.Dr.Sonali Patil

Abstract 91  | PDF

A Study on Web Content Mining

Anurag kumar Ravi Kumar Singh

Abstract 91  | PDF

Finding the Routing Table by Dynamic Processing Method in Distance Vector Routing

Jyotsana Pandey Ashish

Abstract 79  | PDF

Usage of Data Mining Techniques for combating cyber security

Farhad Alam Sanjay Pachauri

Abstract 62  | PDF

Evaluating Prediction of Customer Churn Behavior Based On Artificial Bee Colony Algorithm

Riddhima Rikhi Sharma Rajan Sachdeva

Abstract 260  | PDF

Data Hiding System with Mosaic Image for Protected Communication

Manjunatha N Mrs. Reshma M

Abstract 225  | PDF

Recursive Formulation Based Parallel Self Timed Adder Design Based Architectural Design and CMOS Implementation Approach

Badavath Ravikumar, Fouziya Yasmeen

Abstract 59  | PDF

Behaviour analysis of STREE, SABR and SARDS under different simulation enviornements:A Case Study.

Roopashree H.R., Dr. Anita Kanavalli

Abstract 41  | PDF

Research for Cipher Chip for the Encryption of Sensor data: A Survey

Shali Sara Abraham , Supriya L.P

Abstract 126  | PDF

Survey on Opportunistic Routing Protocol: JOKER

Brejit Lilly Abraham, Anjana P.Nair

Abstract 55  | PDF

Foundation of Ethics and Practice in Amitābha Cult: Modern Social Perspective

Le Trong Nghia

Abstract 245  | PDF

Maximization Influence Flow Using Modified Greedy Algorithm

Jyoti Rani , Prof. Ashwani Sethi

Abstract 195  | PDF

Mining Web Graphs for Large Scale Meta Search Engine Results

Bandi Krishna Dr.V.B.Narasimha

Abstract 129  | PDF

Graphical Password as an OTP

Veena Rathanavel Swati Mali

Abstract 273  | PDF

A Survey on Smart Ration Card System

Golden Bagul , Brendon Desouza Tejaswini Gaikwad , Ankush Panghanti Trupti Kumbhare

Abstract 56  | PDF

Development of Embedded Application for Receiver Processor Unit

B Charan Singh, Vandana Khare

Abstract 38  | PDF

Survey on Efficient Certificateless Access Control for Wireless Body Area Networks

Jeena Sara Viju Sruthy S

Abstract 42  | PDF

A Literature Survey on Password Extraction via Reconstructed Wireless Mouse Trajectory

Divya S, Anju J Prakash

Abstract 40  | PDF

A Review in Statistical Aspects of Data Mining

K.Samundeeswari, Dr.K.Srinivasan

Abstract 43  | PDF

Survey on Face Recognition in the Scrambled Dataset by Using Many Kernels

Sreehara .B, Lashma .K

Abstract 203  | PDF

Survey on Integrated Design of Smartphone Interface with Multiple Image Processing Methods

Lija John, Vani V Prakash

Abstract 99  | PDF

Survey on Monitoring Aquatic Debris Using Smartphone-Based Robots

Sreelekshmi .B, Vidya .N

Abstract 38  | PDF

Survey on a Lightweight Authenticated Communication Scheme for Smart Grid

Sneha .U Liji Samuel

Abstract 37  | PDF

Adaptive Harmonic Elimination in a Grid-Connected Three-Phase PV Inverter

G Chandra Sekhar P Rama Krishna

Abstract 245  | PDF

A Grid Connected Three Phase PV Quasi-Z-Source Inverter with Double Frequency Ripple Suppression Control

SivaSiddhartha Chalasani Ch Chinna Veeraiah

Abstract 190  | PDF

Raspberry PI 3 Based Control and Monitor Remote Machine Automation

Rekha Onkar Nehete Prof. A.S. Bhide

Abstract 38  | PDF

Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment

Ms. Samita Mokal Prof. Nilima D. Nikam Prof. Vaishali Londhe

Abstract 125  | PDF

Brain MR Image Segmentation for Tumor Detection using Artificial Neural

Prof. Vrushali Borase Prof. Gayatri Naik Prof. Vaishali Londhe

Abstract 67  | PDF

An Overview of Distributed System for Wireless Sensor Network

Nalin Chaudhary Abhishek Choudhary Manoj Kumar

Abstract 39  | PDF

A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach

Ingale Ashwini Nagnath, Kanherkar Hars Kanse Sonali Dilip , Naykinde Pallavi Babasaheb , Prof.Belsare P.P.

Abstract 38  | PDF

ADFC Robot: Ashirwad A Low cost much efficient ADFC(Autonomous Dry Floor Clean-up) Robot

Rupinder Kaur1 , Kamalpreet Kaur Harpreet Kaur

Abstract 173  | PDF