Vol. 3 No. 07 (2014)

Published: 2017-12-29

Articles

  • Face Recognition and Emotion Classification

    Ruby Kamboj , Sarita Choudhary
    221
    250
  • OTP Generation for ATM Theft Protection

    D.Priya,R.Suganya Dr.R.Nedunchelian
    228
    279
  • 6LoWPAN Routing Issues

    Vishalakshi R, Chaithra P, Srikanth N S
    226
    264
  • Comprehensive Review of Space Wave Optical Link

    Amolpreet Kaur , Gagangeet Singh Aujla , Sahil Vashist
    227
    213
  • Music Recommendation System Using Association Rule Mining and Clustering Technique To Address Coldstart Problem

    V.Manvitha, M.Sunitha Reddy
    237
    267
  • Survey on Recent trends in Computational & Experimental Technique to Evaluate Performance of Air Flow in Defrost/Demist System for Automobile

    Saiprasad N. Patil, Prof. P. D. Sonawane
    212
    274
  • Novel Use of Single Phase Electromechanical Energy Meter for Standardized Testing of Digital Energy Meters

    Mr.S.B.Parmar, Mr.B.S.Shah Mr.J.N.Rathod, Dr.A.S.Pandya
    200
    230
  • A Review of Cloud Based Schedulers on Cloud Computing Environment

    Renu Bala, Gagandeep Singh, Sahil Vashist
    234
    234
  • A Modified K-Medoid Method to Cluster Uncertain Data Based on Probability Distribution Similarity

    Aliya Edathadathil, Syed Farook, Balachandran KP
    216
    255
  • Mobile Application Protection System: A Secured Architecture

    B Meenakumari, Sandeep Karnam
    236
    243
  • Requirement Elicitation Of Large Web Projects

    Surabhi Sachdeva, Monika Malhotra
    225
    263
  • A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks

    Farzana T, Mrs.Aswathy Babu
    238
    250
  • Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion

    Sarabdeep singh, Shikha khera
    210
    219
  • Detection of Crash Transient Failure during Job Scheduling using Replication Technique

    Inderpreet Kaur, Sarpreet Singh
    249
    250
  • Optimal Implementation of Graph Kernel Matching in Matrimonial Database Using Graph Mining Technique

    S. A. Amala Nirmal Doss, Dr.S.P.Victor
    223
    233
  • Design of Intelligent Mobile Vehicle Checking System Based On ARM 7

    Mr. Rajendra B. Mohite, Prof. Miss Rupali R. Jagtap
    228
    241
  • A New Technique Called Annotation Used To Categories The Content Of Web Pages

    U. Madhavi, S. Hrushikesava Raju , P. Nirupama
    213
    233
  • Numerical Solutions of Ordinary Differential Equations Using Mathematica

    Adoh, A. C., Ojobor, S. A.
    260
    669
  • An Efficient Job Scheduling Algorithm using Min-Min and Ant Colony Concept for Grid Computing

    Davinder Kaur, Sarpreet Singh
    204
    235
  • Multiple Quality Parameters for Image Quality assessment

    Esha Meshram, Suyash Agrawal
    212
    220
  • A combined approach of using DWT-DCT watermarking and AES encryption to improve the security of satellite images

    Naida.H.Nazmudeen, Jismi.K
    252
    240
  • A Review on Dealing Uncertainty, imprecision and Vagueness in Association Rule Mining Using Extended and Generalized Fuzzy

    Vivek Badhe, Dr. R.S. Thakur, Dr. G.S. Thakur
    308
    208
  • A Survey of various Routing Algorithms based on Shortest Path

    Neha Rathod, Ms. Rupali Bhartiya
    206
    213
  • Improved Gradients & Global Mean Based Switching Median Filter

    Lovepreet Kaur, Dr. Arun Khosla
    194
    208
  • Optimizing the Ad-hoc applications in Vehicular Network using Max-Min Ant system

    Sumeet Sekhon, Dinesh Kumar
    202
    222
  • A Reactive Hierarchical Trust Management Scheme for Wireless Sensor Networks

    Reshmi V, Sajitha M
    210
    230
  • Security Assessment Automation Framework: Web Applications

    Gopal R. Choudhari, Prof Madhav V. Vaidya
    196
    235
  • Enhanced Page Rank Algorithm Using Time Factor

    Monica Sehgal, Priya
    200
    227
  • Energy-Efficient Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks

    Shini K, Shijukumar P S
    215
    236
  • A Multiple Queue Management Scheme to Optimize the Job Sequencing in Cloud Computing

    Navdeep Singh, Ghanshyam Verma
    203
    203
  • Comparison of Various Queuing Techniques to Select Best Solution for Eradicating Congestion in Networks

    Sahil Kochher, Gurnam Singh
    208
    253
  • FACIAL DETECTION SYSTEM (Using MATLAB)

    Anjali Vats, R.K Bhatnagar, Shikha Vats, Antara Sarkar and Ankit
    305
    245
  • A Generosity Model to Study Data Center Performance and QoS in IaaS Cloud Computing Systems

    D.S.Selvi, A.Balasubramani, P.Nirupama
    222
    215
  • Design and Development of Micro Vertical Axis Wind Turbine for Rural Application

    Nilesh N Sorte, S M Shiekh
    355
    383
  • Computer Surveillance System

    Ruchi Jain, Dr. Mohd Amjad
    243
    209
  • Target Recognition using Improved SIFT Algorithm

    Darshana Vispute, Sachin Pable, Devidas Dighe
    182
    221
  • A New Color Image Compression Based on Fractal and Discrete Cosine Transform

    K. Sharmila, K. Kuppusamy,
    205
    230
  • Healthcare Measurement Analysis Using Data mining Techniques

    Dr.A.Shaik Abdul Khadir , S.Menaka
    207
    216
  • Human Iris Processing Using Matlab

    Pooja chaturvedi, Upasana Mehta
    208
    209
  • Implementation of Database Synchronization Technique between Client and Server

    Naveen Malhotra, Anjali Chaudhary
    229
    225
  • Controlling Luminare Illumination without Sensors

    Sita Madhuri Bondila, B.Maheswara Rao
    140
    209
  • Survey: Digital Image Watermarking Technique

    Aditya Bhagat, Shikha Singh
    146
    176
  • Content Based Video Retrieval by Genre Recognition Using Tree Pruning Technique

    Amit Fegade, Vipul Dalal
    141
    181
  • Enhanced Authentication by Virtual World

    Pradeep Yadav
    129
    213
  • Design and Implementation of a Backtracking Wormhole Switch using MARX units for Mesh Topology

    Sharon A., Mrs.Yogeshwary B.H.
    136
    195
  • Feature Subset Selection Algorithm for Elevated Dimensional Data By using Fast Cluster

    B.Swarna Kumari, M.Doorvasulu Naidu
    129
    187
  • Analysis of Reactive Attacks on Mobile Communication Protocol Network

    Praveen Kumar Maurya, Akhilesh Panday
    115
    191
  • BMM Filtering Approach for Image Enhancement of Indian High Security Registration Number Plate

    Reena Gupta, R. K. Somani, Manju Mandot
    128
    188
  • Universal Data Management through Web Base Configurable System

    Vrishali Patil, Biradar M. S
    136
    180
  • HPBDMS: High Performance Big Data Management System on Massive & Complex Data

    Manoj Kumar Singh, Dr. Parveen Kumar
    159
    192
  • Vehicle Theft Intimation Using GSM Modem

    Minakshi Kumari, Prof. Manoj Singh
    139
    201
  • Dimension and Complexity Study for Alzheimer’s disease Feature Extraction

    Mohamed M. Dessouky, Mohamed A. Elrashidy, Taha E. Taha, Hatem M. Abdelkader
    129
    186
  • How virtualisation helps smart phones in cloud computing: A survey

    Joshi Rakhi, Prof. V.B. Maral
    121
    193
  • QArt - new Generation of Visual Appearing QR Code

    Amit Kr Tiwari, Apurv Gupta
    132
    207
  • Structural properties of NSC and HSC beams bonded by GFRP wraps

    Vivek Singh, Nandini, Sanjith J
    139
    203
  • Smart Travel Alarm – An Android app on Sencha2.2

    Dr. Abhilasha Mishra, Ankit Jain, Neha Pamecha
    141
    187
  • An Advanced Approach for Ranking in Query Recommendation

    Rinki Khanna, Asha Mishra
    120
    212
  • Enumeration Sort on OTIS k-Ary n-Cube Architecture

    Abdul Hannan Akhtar, Keny T. Lucas
    146
    231
  • Efficient Load Balancing in Clusters in Hierarchical Structure

    Viney Rana, Sunil Kumar Nandal
    139
    173
  • A Comparision on Text-Based and Graphical Browser

    Shweta Bhatia, Sweety Patel
    168
    323
  • Protecting Sensitive Information in Relational Databases By Using Null Value Theory

    Prashant Gumgaonkar, Dr.M.B.Chandak, Manisha Kamble
    133
    147
  • Context Aware Driver’s Behavior Detection System: A Survey

    Priyanka B. Shinde, Vikram A. Mane
    159
    172
  • Mining Frequent Patterns from Uncertain Databases

    A.Chandrakanth, R. Sateesh Kumar, Yella Anitha
    118
    194
  • Human Action Recognition Using Kinect

    Niranjan Deokule, Geetanjali Kale
    147
    196
  • Complexity & Performance Analysis of Parallel Algorithms of Numerical Quadrature Formulas on Multi Core system Using Open MP

    D.S. Ruhela, R.N.Jat
    146
    322
  • Sequential clustering algorithms for anonymizing social

    P.MohanaLakshmi, P.Balaji, P.Nirupama
    150
    169
  • A Review on Evaluation Measures for Data Mining Tasks

    B. Kiranmai, Dr. A. Damodaram
    158
    349
  • PCA Based Classification of Relational and Identical Features of Remote Sensing Images

    Balaji. T, Sumathi. M
    128
    214
  • A Study of Quantum Cryptographic Architectures and It’s An Efficient Implementations

    B.Sujatha, S.Nagaprasad, G.Srinivasa Rao
    146
    188
  • Reducing Blocking Probability of 3G Mobile Communication System Using Time Multiplexing NOVSF Codes

    Dr. Mahesh Kumar, Mr. Pradeep Kumar
    130
    188
  • Role of Data Mining in the Manufacturing and Service Application

    Rajesh Kumar
    123
    179
  • A Multichannel Multimode RF Transceiver With DSM

    Rehna A S, Radha S, Hazeena Hussain
    237
    567
  • Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

    Pradeep M, Anil Kumar
    116
    181
  • Assessment of Sustainability Indicators for Off Grid Energy System

    Rahul Lanjewar, Subroto Dutt
    127
    181
  • A New Improved and Secure Version of MD5

    Sumita Tyagi, Seema Luthra
    142
    185
  • STUDY OF REACTIVE POWER COMPENSATION USING STATIC VAR COMPENSTOR

    Prof. Ameenudin Ahmad, Mukesh Kumar Tanwer
    168
    192
  • A Review on Multiple Single Hop Clustering Based Data Transmission in Wireless Sensor Network

    Pratistha Sharma, Mr. Abhishek Gupta
    126
    202
  • A Survey on Content Based Video Retrieval

    Mr. Amit Fegade, Prof. Vipul Dalal
    143
    202
  • Wireless Equipment for Localization Using an Unmanned Mini-Helicopter-Based Airborne

    N.Anusha, P. Ramesh Babu, P.Nirupama
    136
    209
  • WIMAX

    Aarti Maheshwari
    142
    222
  • Chroma-Key Effect by Optimizing Coarse and Fine Filter

    Pallavi P. Kotgire, Dr. S. K. Shah
    148
    255
  • A Mobile Approach Applied To Public Safety In Cities

    S.P.Maniraj, R.Thamizhamuthu
    143
    184
  • Three-Port Full-Bridge Converters with Varied Voltage Input for Solar Power Systems

    M.Priya, K. Babu
    144
    188
  • Digital Image Watermarking Technique

    Aditya Bhagat, Shikha Singh
    134
    187
  • A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography

    Megha Goel, Mr. M. Chaudhari
    151
    183
  • Single Image Haze Removal Algorithm Using Edge Detection

    Ms. Ghorpade, Dr. Shah S. K P. V
    159
    224
  • Multilabel Associative Text Classification Using Summarization

    Prof. P.A.Bailke, Mrs. Sonal Raghvendra Kulkarni, Dr.(Prof.)S.T.Patil
    149
    210
  • A Review of Voice over IP Mobile Telephony Using WIFI

    Mr. Vishal Kasat , Mr. Rakesh Pandit , Mr. Sachin Patel
    167
    191
  • Comparative approach on load balancing algorithm by partitioning of public cloud

    Anisaara Nadaph, Prof. Vikas Maral
    130
    183
  • Heuristic based optimization of users request in cloud computing

    Loveneesh Singla, Sahil Vashist
    123
    158
  • An Overview of Image Steganography Techniques

    Amritpal Singh, Satinder Jeet Singh
    111
    214
  • A Study On Diffie-Hellman Algorithm in Network Security

    Vinothini, Saranya, Vasumathi
    145
    333
  • A Comparative Study of Classification of Image Fusion Techniques

    Sukhpreet Singh, Rachna Rajput
    184
    229
  • Comparative Study of Automated Testing Tools: Selenium and Quick Test Professional

    S.Rajeevan, B.Sathiyan
    116
    188
  • Network Security: Cloud Computing

    Jaya Chaudhary
    122
    184
  • Triple System Security in Cloud Computing

    Parul Mukhi, Bhawna Chauhan
    111
    173
  • A Comprehensive Comparison between WiMAX and Wi-Fi

    Shally Sharma, Navdeep Singh Randhawa
    141
    359
  • Distribution of cloud resources dynamically by using virtualization

    D.Sireesha, M.Chiranjeevi, P.Nirupama
    194
    245
  • Defense against Shoulder Surfing Attack for Recognition Based Graphical Password

    Swati Kumari, Ruhi Kaur Oberoi
    133
    195
  • Routing and Sorting on OTIS-Hyper Hexa-Cell

    Abdul Hannan Akhtar, Keny T. Lucas
    154
    194
  • Discover and Verifying Authentication of Nearest Nodes in Mobile Ad hoc Networks

    N.R.Anitha, E. Murali
    97
    192