Search Your Paper
IJIRT Search Xplore - Search by Paper id, Published paper id, Paper Name, Author Name and Paper Title
Search Your Paper Details.
All Published Paper Digital Library. Search Through below Search Option.
Search All Published Paper Details easy to find any paper. Please use Ctrl+F if the search is not working in your browser.
You are browsing Research Papers of Computer
Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Authors: Abhinav Bhatnagar, Sapna Sinha
Volume: 2 | Issue: 1 | PageNo: 35-39
Use of Hadoop Big Data: A Review
Use of Hadoop Big Data: A Review
Authors: Mohd Hashim
Volume: 2 | Issue: 1 | PageNo: 44-47
Community Detection in social networks
Community Detection in social networks
Authors: Pradeep kumar
Volume: 2 | Issue: 1 | PageNo: 48-52
Software Testing Technique Using Genetic Algorithm
Software Testing Technique Using Genetic Algorithm
Authors: Pramod Garg, Dr. Deepak Kumar
Volume: 2 | Issue: 1 | PageNo: 71-77
Use of game theory in executive support system
Use of game theory in executive support system
Authors: Ashish Sharma, Sarika Jain
Volume: 2 | Issue: 1 | PageNo: 66-70
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY SENSED IMAGE
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY
Authors: Dr. S. Rajesh, Mithuna.J
Volume: 2 | Issue: 1 | PageNo: 120-126
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FAC
Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
Volume: 2 | Issue: 1 | PageNo: 219-224
Three Aspects of Web Mining
Three Aspects of Web Mining
Authors: AR.Sivakumaran, Dr.P.Marikkannu
Volume: 2 | Issue: 1 | PageNo: 276-279
Survey on Worm Spreading and Worm Detection
Survey on Worm Spreading and Worm Detection
Authors: Aiswarya Francie Challat, Binny Chelziah M
Volume: 2 | Issue: 1 | PageNo: 238-239
Spam Detection using KNN
Spam Detection using KNN
Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
Volume: 2 | Issue: 1 | PageNo: 290-293
A New Approach for Feature Subset Selection Based on Hadoop
A New Approach for Feature Subset Selection Based on Hadoop
Authors: Ramya P V, Shashikala B
Volume: 2 | Issue: 1 | PageNo: 244-251
Reducing False Positive In Intrusion Detection using Genetic Algorithm
Reducing False Positive In Intrusion Detection using Genetic Algorithm
Authors: Dipika Narsingyani, Ompriya Kale
Volume: 2 | Issue: 1 | PageNo: 104-107
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Senso
Authors: Manpreet kaur, Surender Singh
Volume: 2 | Issue: 1 | PageNo: 113-119
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Networ
Authors: Chirag Parmar, Prof. Chaita Jani
Volume: 2 | Issue: 1 | PageNo: 127-132
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Authors: Viral Jethva, Risha A. Tiwari
Volume: 2 | Issue: 1 | PageNo: 142-147
A Survey on Dynamic Load Balancing with Min Scaling
A Survey on Dynamic Load Balancing with Min Scaling
Authors: shweta gupta, Ms. Jasmin Jha
Volume: 2 | Issue: 1 | PageNo: 190-194
Association Rules and their Optimization using Genetic Algorithm
Association Rules and their Optimization using Genetic Algorithm
Authors: Arvind Jaiswal
Volume: 2 | Issue: 1 | PageNo: 316-322
Tracking Moving Targets in Wireless Sensor Network
Tracking Moving Targets in Wireless Sensor Network
Authors: M.Sridhar , G.Naresh
Volume: 2 | Issue: 2 | PageNo: 86-89
A Heuristic Approach To Record Deduplication
A Heuristic Approach To Record Deduplication
Authors: Lata.S.Math, Smt.Shashikala.B
Volume: 2 | Issue: 2 | PageNo: 148-154
Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Authors: M.VANITHA, Dr.P.MARIKKANNU
Volume: 2 | Issue: 2 | PageNo: 159-163
Data Security in Cloud Storage using RBAC
Data Security in Cloud Storage using RBAC
Authors: Mr. Harshal Ashokrao Karande
Volume: 2 | Issue: 2 | PageNo: 195-201
A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script
A Survey of Problems of Overlapped Handwritten Characters in Recognition process
Authors: arwinder kaur, ashok kumar bathla
Volume: 2 | Issue: 2 | PageNo: 220-224
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
Volume: 2 | Issue: 2 | PageNo: 137-143
QoS and Energy Aware Geographic Routing Protocol for WSN
QoS and Energy Aware Geographic Routing Protocol for WSN
Authors: K.Sindhuja, P. Punnam Chander Reddy
Volume: 2 | Issue: 2 | PageNo: 260-264
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
Authors: Dnyaneshwar Kudande
Volume: 2 | Issue: 3 | PageNo: 88-95
An Ensemble of Classifiers using Weighted Instance Selection
An Ensemble of Classifiers using Weighted Instance Selection
Authors: Santosh N. Nagargoje, Prasad Kulkarni
Volume: 2 | Issue: 3 | PageNo: 96-102
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Authors: Suraj Baviskar, Nitin Namdev
Volume: 2 | Issue: 3 | PageNo: 130-135
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Alg
Authors: Dr. M. Balamurugan, P. Mathiazhagan
Volume: 2 | Issue: 3 | PageNo: 171-176
object tracking using image processing
object tracking using image processing
Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
Volume: 2 | Issue: 4 | PageNo: 67-72
Remote method Invocation and Remote Procedure Call
Remote method Invocation and Remote Procedure Call
Authors: Kunwar Deep Singh Toor
Volume: 2 | Issue: 4 | PageNo: 77-81
Applying cryptography to cancellable signatures
Applying cryptography to cancellable signatures
Authors: Shiwani Gupta
Volume: 2 | Issue: 4 | PageNo: 135-140
AFFECTIVE COMPUTING
AFFECTIVE COMPUTING
Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
Volume: 2 | Issue: 4 | PageNo: 141-145
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Authors: Dr. M. Balamurugan, A. Nancy
Volume: 2 | Issue: 4 | PageNo: 164-166
SMART CARD SECURITY
SMART CARD SECURITY
Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
Volume: 2 | Issue: 4 | PageNo: 160-163
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil
Authors: B.P.SREEJA, G.SARATHA DEVI
Volume: 2 | Issue: 4 | PageNo: 106-110
Performance Tuning in Teradata
Performance Tuning in Teradata
Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
Volume: 2 | Issue: 5 | PageNo: 46-51
Google Chrome Operatin System
Google Chrome Operatin System
Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
Volume: 2 | Issue: 5 | PageNo: 75-77
Audio Controlled Quadcoipter with Stereo Camera
Audio Controlled Quadcoipter with Stereo Camera
Authors: Amlan Prakash
Volume: 2 | Issue: 5 | PageNo: 126-128
computer networking
computer networking
Authors: SONIA RANA
Volume: 2 | Issue: 5 | PageNo: 69-71
Exception Handling
Exception Handling
Authors: Gourav Agghi
Volume: 2 | Issue: 5 | PageNo: 134-135
classes and object
classes and object
Authors: Manmohan
Volume: 2 | Issue: 6 | PageNo: 20-22
pointer analysis for c programing
pointer analysis for c programing
Authors: Mohit bansal
Volume: 2 | Issue: 6 | PageNo: 78-81
Array review
Array review
Authors: Monika Yadav
Volume: 2 | Issue: 6 | PageNo: 312-313
Java applet
Java applet
Authors: Jalaj sharma
Volume: 2 | Issue: 6 | PageNo: 353-354
SQL Injection Detection & Defeating Tools
SQL Injection Detection & Defeating Tools
Authors: kartik rai
Volume: 2 | Issue: 6 | PageNo: 90-93
THE C PROGRAMMING LANGUAGE
THE C PROGRAMMING LANGUAGE
Authors: Alia Anis
Volume: 2 | Issue: 6 | PageNo: 107-108
PROGRAMMING LANGUAGE C++
PROGRAMMING LANGUAGE C++
Authors: Happy Gogoi
Volume: 2 | Issue: 6 | PageNo: 166-167
Human Computer Interaction
Human Computer Interaction
Authors: Navneet Yadav
Volume: 2 | Issue: 6 | PageNo: 99-102
fundamentals of C programming language
fundamentals of C programming language
Authors: Ritika nain
Volume: 2 | Issue: 6 | PageNo: 175-176
Data file handling in c++
Data file handling in c++
Authors: Kripashanker yadav
Volume: 2 | Issue: 6 | PageNo: 326-329
Best programming language for a Beginner
Best programming language for a Beginner
Authors: Deepakshi Singh
Volume: 2 | Issue: 6 | PageNo: 172-174
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
Authors: Manish
Volume: 2 | Issue: 6 | PageNo: 115-119
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Authors: shweta gupta, Ms.Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 204-208
software Testing
software Testing
Authors: Chaynika Kapoor
Volume: 2 | Issue: 6 | PageNo: 286-289
The c preprocessor
The c preprocessor
Authors: Mayank yadav
Volume: 2 | Issue: 6 | PageNo: 120-122
Switch and classes in c
Switch and classes in c
Authors: Nishant
Volume: 2 | Issue: 6 | PageNo: 138-139
pointers
pointers
Authors: Rahul Deshwal
Volume: 2 | Issue: 6 | PageNo: 140-142
5G Wireless Technology
5G Wireless Technology
Authors: Sunil rai
Volume: 2 | Issue: 6 | PageNo: 236-242
statements in c
statements in c
Authors: kashika grover
Volume: 2 | Issue: 6 | PageNo: 308-309
Stack and queue
Stack and queue
Authors: Pankaj gaur
Volume: 2 | Issue: 6 | PageNo: 322-325
ASP.NET AND ITS FRAMEWORK
ASP.NET AND ITS FRAMEWORK
Authors: KOMAL CHAUHAN
Volume: 2 | Issue: 6 | PageNo: 261-264
Web Service Discovery using Relational Database and Apache Lucene
Web Service Discovery using Relational Database and Apache Lucene
Authors: Bhavin Solanki, Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 23-30
File Management in C
File Management in C
Authors: Ria Arora
Volume: 2 | Issue: 6 | PageNo: 294-296
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING
Authors: Rahul Y. Modi, Indr Jeet Rajput
Volume: 2 | Issue: 6 | PageNo: 37-42
Thread (computing)
Thread (computing)
Authors: Gajendra singh
Volume: 2 | Issue: 6 | PageNo: 402-403
ASP.net
ASP.net
Authors: Sanjana Singh
Volume: 2 | Issue: 6 | PageNo: 251-253
PHP - A Review
PHP - A Review
Authors: Ipsita Vashista
Volume: 2 | Issue: 6 | PageNo: 400-401
arrays in C
arrays in C
Authors: Priya Yadav
Volume: 2 | Issue: 6 | PageNo: 339-339
Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Authors: Dhruvil K Patel
Volume: 2 | Issue: 6 | PageNo: 48-52
Threats in Java Applet
Threats in Java Applet
Authors: Ankit Bhatt
Volume: 2 | Issue: 6 | PageNo: 364-365
bubble sort
bubble sort
Authors: priyanka kunjwal
Volume: 2 | Issue: 6 | PageNo: 265-267
Memory Management in C
Memory Management in C
Authors: Puneet Saini, Ria Arora
Volume: 2 | Issue: 6 | PageNo: 257-258
Spring MVC Framework
Spring MVC Framework
Authors: Simran Bhatti
Volume: 2 | Issue: 6 | PageNo: 290-293
java security
java security
Authors: Ritu Yadav
Volume: 2 | Issue: 6 | PageNo: 254-256
SOFTWARE TESTING
SOFTWARE TESTING
Authors: AARTI SINGH
Volume: 2 | Issue: 6 | PageNo: 268-274
.NET FRAMEWORK
.NET FRAMEWORK
Authors: Karuna Hazrati
Volume: 2 | Issue: 7 | PageNo: 0-0
Java multithreading system
Java multithreading system
Authors: kritika chadha
Volume: 2 | Issue: 6 | PageNo: 375-381
Research Paper on C Language
Research Paper on C Language
Authors: kawalpreet Singh
Volume: 2 | Issue: 6 | PageNo: 310-311
PHP Web Application Frameworks based upon Design Patterns
PHP Web Application Frameworks based upon Design Patterns
Authors: Aakash goyal
Volume: 2 | Issue: 6 | PageNo: 391-394
SOFTWARE & MANUAL TESTING
SOFTWARE & MANUAL TESTING
Authors: Abhishek Jain
Volume: 2 | Issue: 6 | PageNo: 382-385
Digital Diary
Digital Diary
Authors: Manjeet Saini
Volume: 2 | Issue: 6 | PageNo: 386-390
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
Volume: 2 | Issue: 6 | PageNo: 182-186
A Survey work on ETC System for an Efficient Image Encryption and Compression
A Survey work on ETC System for an Efficient Image Encryption and Compression
Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 209-212
Survey paper on CAPTCHA AND VRP
Survey paper on CAPTCHA AND VRP
Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 317-321
A Study on Data Mining with Big Data
A Study on Data Mining with Big Data
Authors: B.Zakia Bano , Dr.K.Pavan Kumar
Volume: 2 | Issue: 6 | PageNo: 187-192
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
Volume: 2 | Issue: 6 | PageNo: 193-198
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Cen
Authors: Neha Jain, K. K. Joshi
Volume: 2 | Issue: 6 | PageNo: 431-435
Overview on Android and its Versions
Overview on Android and its Versions
Authors: Sahil Munjal
Volume: 2 | Issue: 6 | PageNo: 415-418
Peer to Peer Computing
Peer to Peer Computing
Authors: RAJAT WASON
Volume: 2 | Issue: 6 | PageNo: 408-412
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Authors: SMRUTI PHADKE, K.K. Joshi
Volume: 2 | Issue: 7 | PageNo: 160-167
POINTER ANALYSIS FOR C PROGRAM
POINTER ANALYSIS FOR C PROGRAM
Authors: PRIYANK GUPTA
Volume: 2 | Issue: 7 | PageNo: 177-179
Survey on the Security Aspects of Mobile Operating Systems
Survey on the Security Aspects of Mobile Operating Systems
Authors: Amod N. Narvekar, Prof. K. K. Joshi
Volume: 2 | Issue: 7 | PageNo: 197-203
execution project in java
execution project in java
Authors: jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 168-169
Android and GPS tracking
Android and GPS tracking
Authors: aakash soni
Volume: 2 | Issue: 7 | PageNo: 100-105
Business Suite Software Modules in SAP
Business Suite Software Modules in SAP
Authors: Karan Bhalla
Volume: 2 | Issue: 7 | PageNo: 180-184
Safe arrays and pointers in c
Safe arrays and pointers in c
Authors: Rahul kumar
Volume: 2 | Issue: 7 | PageNo: 204-206
Review of C/C++
Review of C/C++
Authors: rahul rai gupta
Volume: 2 | Issue: 7 | PageNo: 158-159
REVIEW OF C++
REVIEW OF C++
Authors: sachin kumar benwal
Volume: 2 | Issue: 7 | PageNo: 170-171
Review of TETRA Radio System
Review of TETRA Radio System
Authors: pragy kaushik
Volume: 2 | Issue: 7 | PageNo: 172-172
Network Security: Attacks And Tips
Network Security: Attacks And Tips
Authors: Himanshu Saini
Volume: 2 | Issue: 7 | PageNo: 173-176
data mining
data mining
Authors: samiksha yadav
Volume: 2 | Issue: 7 | PageNo: 250-252
Basic Fundamentals of Programming
Basic Fundamentals of Programming
Authors: Sahil Jindal
Volume: 2 | Issue: 7 | PageNo: 306-308
The andriod- mobile operating system with its mobile based applications
The andriod- mobile operating system with its mobile based applications
Authors: Jyoti yadav, Jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 775-779
loops in C
loops in C
Authors: Pratibha Sharma
Volume: 2 | Issue: 7 | PageNo: 598-599
Review paper on summer training
Review paper on summer training
Authors: pooja nayak
Volume: 2 | Issue: 7 | PageNo: 351-352
A Diverse Methodology For Monitoring And Controlling Application in Active Database Management Systems
A Diverse Methodology For Monitoring And Controlling Application in Active Datab
Authors: Thodeti Srikanth
Volume: 2 | Issue: 6 | PageNo: 453-457
JDBC
JDBC
Authors: Upender yadav
Volume: 2 | Issue: 7 | PageNo: 780-781
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and image Encryption
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and
Authors: Mr Ashish Singh., Ajay Gupta
Volume: 2 | Issue: 7 | PageNo: 529-533
Online Comment Analysis for Recommendation
Online Comment Analysis for Recommendation
Authors: Tushar Mehmi
Volume: 2 | Issue: 7 | PageNo: 636-640
discretizaiton
discretizaiton
Authors: rahul yadav
Volume: 2 | Issue: 7 | PageNo: 641-645
Probability PSO Search Feature Selection for Data Stream Mining for current market trend
Probability PSO Search Feature Selection for Data Stream Mining for current mark
Authors: snehal rode, Ram joshi
Volume: 2 | Issue: 7 | PageNo: 717-720
A Survey On Various Approaches For Webpage Recommendation System In Web Mining
A Survey On Various Approaches For Webpage Recommendation System In Web Mining
Authors: Darshan K Prajapati, Dr. Shyamal Tanna
Volume: 2 | Issue: 7 | PageNo: 498-502
SECURING THE NETWORK IN CLOUD ENVIRONMENT
SECURING THE NETWORK IN CLOUD ENVIRONMENT
Authors: P.Sakthi Priyanka, C.Radha
Volume: 2 | Issue: 7 | PageNo: 654-660
A Survey Paper on Variants of R-tree Data Structure
A Survey Paper on Variants of R-tree Data Structure
Authors: Bhoomika Panchal, Vinit Kumar Gupta
Volume: 2 | Issue: 7 | PageNo: 543-547
A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence
A Survey on Software Fault Prediction Technique based on Clustering Algorithm an
Authors: Margi Patel
Volume: 2 | Issue: 7 | PageNo: 623-627
Performance analysis of on demand multipath routing scheme in wireless environment
Performance analysis of on demand multipath routing scheme in wireless environme
Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
Volume: 2 | Issue: 7 | PageNo: 787-791
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and
Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
Volume: 2 | Issue: 7 | PageNo: 796-802
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encryp
Authors: Rucha Anil Shinde, Hema V. Kumbhar
Volume: 2 | Issue: 7 | PageNo: 808-810
Scalable architecture for multi-user encrypted SQL operations on cloud database services
Scalable architecture for multi-user encrypted SQL operations on cloud database
Authors: A.SHEELAVATHI, K. Preethi
Volume: 2 | Issue: 8 | PageNo: 20-25
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Authors: Farinaparveen Khan , R K Krishna
Volume: 2 | Issue: 8 | PageNo: 72-77
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDEN
Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
Volume: 2 | Issue: 8 | PageNo: 32-39
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
Authors: Dr.M. Balamurugan, R. Prasanka
Volume: 1 | Issue: 8 | PageNo: 129-133
Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access
Password Guessing Resistant Protocol for Securing System from Bots and Illegal A
Authors: Ms. Arya Kumar, Prof. A.K.Gupta
Volume: 2 | Issue: 8 | PageNo: 91-94
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Authors: Sahil Meshram, Ujwala H. Wanaskar
Volume: 2 | Issue: 9 | PageNo: 18-21
Packet Loss Control Using Tokens
Packet Loss Control Using Tokens
Authors: Rajeswari.Villa, A. SatyaMallesh
Volume: 2 | Issue: 9 | PageNo: 15-17
Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique
Classification and Allocation of Project Proposals to Reviewers Using Ontology B
Authors: Ratish Srivastava, Prof. P.K. Deshmukh
Volume: 2 | Issue: 9 | PageNo: 57-61
Analysis of Data Mining Techniques for HealthCare Data Classification
Analysis of Data Mining Techniques for HealthCare Data Classification
Authors: Dr. M. Balamurugan, S. Vijaykumar
Volume: 1 | Issue: 9 | PageNo: 125-128
Cryptography with High Throughput : A survey
Cryptography with High Throughput : A survey
Authors: Bhoomika Modi, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 1-7
Format Preserving Encryption: A Survey
Format Preserving Encryption: A Survey
Authors: ZALAK BHATT, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 8-17
High Capacity Steganography with Improved Transformation and Security Technique:A survey
High Capacity Steganography with Improved Transformation and Security Technique:
Authors: Bhumin Mandaliya, Vinit Gupta
Volume: 0 | Issue: no | PageNo: 0-0
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Survey
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Su
Authors: M.Ramu, Indurani
Volume: 2 | Issue: 10 | PageNo: 29-34
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
Volume: 2 | Issue: 10 | PageNo: 172-177
BUS TACKING SYSTEM USING RFID
BUS TACKING SYSTEM USING RFID
Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
Volume: 2 | Issue: 10 | PageNo: 137-141
Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods
Comparative Study between Equivalence Class Partitioning and Boundary Value Anal
Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
Volume: 2 | Issue: 10 | PageNo: 74-78
Comparative study on Motion Estimation in video sequence
Comparative study on Motion Estimation in video sequence
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 10 | PageNo: 79-83
Cloud Computing Architecture, Security issues: A Review
Cloud Computing Architecture, Security issues: A Review
Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
Volume: 2 | Issue: 10 | PageNo: 154-158
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
Authors: Anjli J Patel, Ms.Jayna B.Shah
Volume: 0 | Issue: no | PageNo: 0-0
Survey on privacy preserving association rule hiding in data mining
Survey on privacy preserving association rule hiding in data mining
Authors: jinal patel, Gurcharan sahani
Volume: 2 | Issue: 10 | PageNo: 111-118
A Comparative Study of Web Page Ranking Algorithms
A Comparative Study of Web Page Ranking Algorithms
Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
Volume: 2 | Issue: 10 | PageNo: 178-184
Fuzzy Page Ranking Scheme in IR System
Fuzzy Page Ranking Scheme in IR System
Authors: Shikha Gupta
Volume: 2 | Issue: 10 | PageNo: 185-187
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 2 | Issue: 10 | PageNo: 128-131
Big Data Analysis by Classification Algorithm Using Flight Data Set
Big Data Analysis by Classification Algorithm Using Flight Data Set
Authors: Ujjwala Urkude
Volume: 2 | Issue: 10 | PageNo: 188-189
Survey on Privacy Preservation for Inference Control on OLAP
Survey on Privacy Preservation for Inference Control on OLAP
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 11 | PageNo: 10-13
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Authors: Gaurang Patel, Sanket Patel
Volume: 2 | Issue: 11 | PageNo: 1-4
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COM
Authors: Umang Thakkar, Indrjeet Rajput
Volume: 2 | Issue: 11 | PageNo: 5-9
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
Volume: 2 | Issue: 11 | PageNo: 78-81
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Authors: Bhumika Parmar, Mr. Tejas Bhatt
Volume: 2 | Issue: 11 | PageNo: 21-25
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Volume: 2 | Issue: 11 | PageNo: 26-33
Operative and Secured Privacy enhanced Location Based Services System
Operative and Secured Privacy enhanced Location Based Services System
Authors: M.Shakul Hameed, V.Indurani
Volume: 2 | Issue: 11 | PageNo: 34-41
SENTIMENT ANALYSIS: A REVIEW
SENTIMENT ANALYSIS: A REVIEW
Authors: NILU, TANUJA SHUKLA
Volume: 2 | Issue: 11 | PageNo: 90-94
A Review On Handwritten Character Recognition Techniques
A Review On Handwritten Character Recognition Techniques
Authors: Parul Singla, Sargam Munjal
Volume: 2 | Issue: 11 | PageNo: 373-376
A Review for Video Mosaicing Using Feature Tracking
A Review for Video Mosaicing Using Feature Tracking
Authors: Foram N. Patel, Neha Parmar
Volume: 2 | Issue: 11 | PageNo: 71-74
AppZoo
AppZoo
Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
Volume: 2 | Issue: 11 | PageNo: 200-203
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
Volume: 2 | Issue: 11 | PageNo: 214-218
Optimization of Social Media Posts
Optimization of Social Media Posts
Authors: kanhaiya choudhary, astha singh, nitin Sharma
Volume: 2 | Issue: 11 | PageNo: 304-307
Tracking and Analyzing the Public Opinions by Interpretation Techniques
Tracking and Analyzing the Public Opinions by Interpretation Techniques
Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
Volume: 2 | Issue: 11 | PageNo: 316-318
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
Volume: 2 | Issue: 11 | PageNo: 343-348
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
Authors: Asia Mashkoor, Himani Gupta
Volume: 2 | Issue: 11 | PageNo: 391-398
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
Volume: 2 | Issue: 11 | PageNo: 272-277
Real-Time Image Improvement Methods
Real-Time Image Improvement Methods
Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 428-430
SEARCHING LARGE DATA SETS IN GRID COMPUTING
SEARCHING LARGE DATA SETS IN GRID COMPUTING
Authors: Sudha K, Sangeetha C, Aruna R
Volume: 2 | Issue: 11 | PageNo: 411-416
Prediction of network security situation based on fuzzy neutral network
Prediction of network security situation based on fuzzy neutral network
Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 423-427
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
Volume: 2 | Issue: 11 | PageNo: 417-422
SCALABLE DATA SHARING BY USING KEY AGGREGATION
SCALABLE DATA SHARING BY USING KEY AGGREGATION
Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
Volume: 2 | Issue: 12 | PageNo: 10-16
Security in Banking sector using cloud computing with TPA
Security in Banking sector using cloud computing with TPA
Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
Volume: 2 | Issue: 12 | PageNo: 6-9
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Volume: 2 | Issue: 12 | PageNo: 307-310
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
Volume: 2 | Issue: 12 | PageNo: 1-5
Person Identification Using Iris Recognition System Using Fastest Searching Algorithm
Person Identification Using Iris Recognition System Using Fastest Searching Algo
Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
Volume: 2 | Issue: 12 | PageNo: 238-242
Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework
Identification, Implementation and Validation of Authentication and Authorizatio
Authors: ketan kumar, kalpesh patel
Volume: 2 | Issue: 12 | PageNo: 65-68
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
Volume: 2 | Issue: 12 | PageNo: 352-355
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Int
Authors: Margi Patel, Upama Vachhani
Volume: 2 | Issue: 12 | PageNo: 69-77
Dynamic Resource Allocation Technique in Cloud
Dynamic Resource Allocation Technique in Cloud
Authors: Ishita Patel, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 84-88
A New Approach of Virtual Machine Allocation In Cloud
A New Approach of Virtual Machine Allocation In Cloud
Authors: Rikin Thakkar, anuradha desai
Volume: 2 | Issue: 12 | PageNo: 89-93
Privacy Preservation for Inference Control with Improved ND Algorithm
Privacy Preservation for Inference Control with Improved ND Algorithm
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 12 | PageNo: 99-103
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Env
Authors: Pranali Gajjar, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 113-120
Modified Key Based Image Encryption using RSA algorithm
Modified Key Based Image Encryption using RSA algorithm
Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
Volume: 2 | Issue: 12 | PageNo: 252-255
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CAS
Authors: Anamika Madaan, Bharti Jha
Volume: 2 | Issue: 12 | PageNo: 402-406
Steganography Techniques:A Review
Steganography Techniques:A Review
Authors: TARIQ RASHID, SUNNY DAGAR
Volume: 2 | Issue: 12 | PageNo: 387-391
Fast Block matching motion estimation using fusion of Four Step & Diamond Step Search algorithm for video compression
Fast Block matching motion estimation using fusion of Four Step & Diamond Step S
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 12 | PageNo: 378-382
FOCUS : LEARNING TO CRAWL WEB FORUMS
FOCUS : LEARNING TO CRAWL WEB FORUMS
Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
Volume: 2 | Issue: 12 | PageNo: 448-452
Comparative analysis of Domain Specific Testing Techniques
Comparative analysis of Domain Specific Testing Techniques
Authors: Neha Kumawat, Yashika Sharma
Volume: 3 | Issue: 1 | PageNo: 1-4
Category Based Implementation of Web Crawler
Category Based Implementation of Web Crawler
Authors: Nandita , Sarika Rana
Volume: 3 | Issue: 1 | PageNo: 192-197
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
Volume: 3 | Issue: 1 | PageNo: 269-272
Data Mining tools and techniques in Medical Science
Data Mining tools and techniques in Medical Science
Authors: Anu Bura, DR. Prakash Kumar Pathak
Volume: 3 | Issue: 1 | PageNo: 149-158
Analyzing Twitter data for Multiple languages by applying machine learning Techniques
Analyzing Twitter data for Multiple languages by applying machine learning Techn
Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
Volume: 3 | Issue: 1 | PageNo: 43-48
Advanced Music Player With Integrated Face Recognition Mechanism
Advanced Music Player With Integrated Face Recognition Mechanism
Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
Volume: 3 | Issue: 1 | PageNo: 8-11
A Mobile Application for Bus Tracking System
A Mobile Application for Bus Tracking System
Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
Volume: 3 | Issue: 1 | PageNo: 17-20
Deep Web Data Extraction by Using Vision Approach for Multi-Region
Deep Web Data Extraction by Using Vision Approach for Multi-Region
Authors: Shweta Dhall, Parikshit Singla
Volume: 3 | Issue: 1 | PageNo: 104-109
Review of JSON Data Interchange Format
Review of JSON Data Interchange Format
Authors: Garima Dutt, Anup Singh Kushwaha
Volume: 3 | Issue: 1 | PageNo: 309-313
A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews
A Review on Opinion Word and Opinion Target Extraction and Classification of Rev
Authors: Sangram Ashok Patil, Prof. K. B. Manwade
Volume: 3 | Issue: 1 | PageNo: 110-113
Routing Protocol in Wireless Sensor Networks – Survey
Routing Protocol in Wireless Sensor Networks – Survey
Authors: Priya P, Kuppusamy N K
Volume: 3 | Issue: 1 | PageNo: 159-163
video mosaicing
video mosaicing
Authors: Foram N Patel, Neha Parmar
Volume: 3 | Issue: 1 | PageNo: 242-248
Unsupervised Stemmer for Kannada Language
Unsupervised Stemmer for Kannada Language
Authors: Mounika S, B H Manjunath Kumar
Volume: 3 | Issue: 1 | PageNo: 146-148
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 3 | Issue: 1 | PageNo: 377-382
Security Issues and Challenges in Cloud Computing
Security Issues and Challenges in Cloud Computing
Authors: Arvind Jaiswal
Volume: 3 | Issue: 1 | PageNo: 383-387
Review Paper for Query Optimization for Declarative Crowdsourcing System
Review Paper for Query Optimization for Declarative Crowdsourcing System
Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
Volume: 3 | Issue: 2 | PageNo: 32-36
Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Authors: Khushboo Arora, Mamta Arora
Volume: 3 | Issue: 2 | PageNo: 65-69
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sens
Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
Volume: 3 | Issue: 2 | PageNo: 46-52
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Network
Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
Volume: 3 | Issue: 2 | PageNo: 20-25
schema agnostic indexing with live indexes
schema agnostic indexing with live indexes
Authors: monica bansal
Volume: 3 | Issue: 2 | PageNo: 26-31