Search Your Paper
IJIRT Search Xplore - Search by Paper id, Published paper id, Paper Name, Author Name and Paper Title
Search Your Paper Details.
All Published Paper Digital Library. Search Through below Search Option.
Search All Published Paper Details easy to find any paper. Please use Ctrl+F if the search is not working in your browser.
You are browsing Research Papers of Computer
Comparative Analysis of Speech Recognition Based on Artificial Neural Network Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Authors: Abhinav Bhatnagar, Sapna Sinha
Volume: 2 | Issue: 1 | PageNo: 35-39
Use of Hadoop Big Data: A Review Use of Hadoop Big Data: A Review
Authors: Mohd Hashim
Volume: 2 | Issue: 1 | PageNo: 44-47
Community Detection in social networks Community Detection in social networks
Authors: Pradeep kumar
Volume: 2 | Issue: 1 | PageNo: 48-52
Software Testing Technique Using Genetic Algorithm Software Testing Technique Using Genetic Algorithm
Authors: Pramod Garg, Dr. Deepak Kumar
Volume: 2 | Issue: 1 | PageNo: 71-77
Use of game theory in executive support system Use of game theory in executive support system
Authors: Ashish Sharma, Sarika Jain
Volume: 2 | Issue: 1 | PageNo: 66-70
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY SENSED IMAGE A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY
Authors: Dr. S. Rajesh, Mithuna.J
Volume: 2 | Issue: 1 | PageNo: 120-126
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FAC
Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
Volume: 2 | Issue: 1 | PageNo: 219-224
Three Aspects of Web Mining Three Aspects of Web Mining
Authors: AR.Sivakumaran, Dr.P.Marikkannu
Volume: 2 | Issue: 1 | PageNo: 276-279
Survey on Worm Spreading and Worm Detection Survey on Worm Spreading and Worm Detection
Authors: Aiswarya Francie Challat, Binny Chelziah M
Volume: 2 | Issue: 1 | PageNo: 238-239
Spam Detection using KNN Spam Detection using KNN
Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
Volume: 2 | Issue: 1 | PageNo: 290-293
A New Approach for Feature Subset Selection Based on Hadoop A New Approach for Feature Subset Selection Based on Hadoop
Authors: Ramya P V, Shashikala B
Volume: 2 | Issue: 1 | PageNo: 244-251
Reducing False Positive In Intrusion Detection using Genetic Algorithm Reducing False Positive In Intrusion Detection using Genetic Algorithm
Authors: Dipika Narsingyani, Ompriya Kale
Volume: 2 | Issue: 1 | PageNo: 104-107
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Senso
Authors: Manpreet kaur, Surender Singh
Volume: 2 | Issue: 1 | PageNo: 113-119
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Networ
Authors: Chirag Parmar, Prof. Chaita Jani
Volume: 2 | Issue: 1 | PageNo: 127-132
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Authors: Viral Jethva, Risha A. Tiwari
Volume: 2 | Issue: 1 | PageNo: 142-147
A Survey on Dynamic Load Balancing with Min Scaling A Survey on Dynamic Load Balancing with Min Scaling
Authors: shweta gupta, Ms. Jasmin Jha
Volume: 2 | Issue: 1 | PageNo: 190-194
Association Rules and their Optimization using Genetic Algorithm Association Rules and their Optimization using Genetic Algorithm
Authors: Arvind Jaiswal
Volume: 2 | Issue: 1 | PageNo: 316-322
Tracking Moving Targets in Wireless Sensor Network Tracking Moving Targets in Wireless Sensor Network
Authors: M.Sridhar , G.Naresh
Volume: 2 | Issue: 2 | PageNo: 86-89
A Heuristic Approach To Record Deduplication A Heuristic Approach To Record Deduplication
Authors: Lata.S.Math, Smt.Shashikala.B
Volume: 2 | Issue: 2 | PageNo: 148-154
Load Balancing Algorithms in Cloud Computing Environment : An Introspection Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Authors: M.VANITHA, Dr.P.MARIKKANNU
Volume: 2 | Issue: 2 | PageNo: 159-163
Data Security in Cloud Storage using RBAC Data Security in Cloud Storage using RBAC
Authors: Mr. Harshal Ashokrao Karande
Volume: 2 | Issue: 2 | PageNo: 195-201
A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script A Survey of Problems of Overlapped Handwritten Characters in Recognition process
Authors: arwinder kaur, ashok kumar bathla
Volume: 2 | Issue: 2 | PageNo: 220-224
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
Volume: 2 | Issue: 2 | PageNo: 137-143
QoS and Energy Aware Geographic Routing Protocol for WSN QoS and Energy Aware Geographic Routing Protocol for WSN
Authors: K.Sindhuja, P. Punnam Chander Reddy
Volume: 2 | Issue: 2 | PageNo: 260-264
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
Authors: Dnyaneshwar Kudande
Volume: 2 | Issue: 3 | PageNo: 88-95
An Ensemble of Classifiers using Weighted Instance Selection An Ensemble of Classifiers using Weighted Instance Selection
Authors: Santosh N. Nagargoje, Prasad Kulkarni
Volume: 2 | Issue: 3 | PageNo: 96-102
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Authors: Suraj Baviskar, Nitin Namdev
Volume: 2 | Issue: 3 | PageNo: 130-135
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Alg
Authors: Dr. M. Balamurugan, P. Mathiazhagan
Volume: 2 | Issue: 3 | PageNo: 171-176
object tracking using image processing object tracking using image processing
Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
Volume: 2 | Issue: 4 | PageNo: 67-72
Remote method Invocation and Remote Procedure Call Remote method Invocation and Remote Procedure Call
Authors: Kunwar Deep Singh Toor
Volume: 2 | Issue: 4 | PageNo: 77-81
Applying cryptography to cancellable signatures Applying cryptography to cancellable signatures
Authors: Shiwani Gupta
Volume: 2 | Issue: 4 | PageNo: 135-140
AFFECTIVE COMPUTING AFFECTIVE COMPUTING
Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
Volume: 2 | Issue: 4 | PageNo: 141-145
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Authors: Dr. M. Balamurugan, A. Nancy
Volume: 2 | Issue: 4 | PageNo: 164-166
SMART CARD SECURITY SMART CARD SECURITY
Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
Volume: 2 | Issue: 4 | PageNo: 160-163
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil
Authors: B.P.SREEJA, G.SARATHA DEVI
Volume: 2 | Issue: 4 | PageNo: 106-110
Performance Tuning in Teradata Performance Tuning in Teradata
Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
Volume: 2 | Issue: 5 | PageNo: 46-51
Google Chrome Operatin System Google Chrome Operatin System
Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
Volume: 2 | Issue: 5 | PageNo: 75-77
Audio Controlled Quadcoipter with Stereo Camera Audio Controlled Quadcoipter with Stereo Camera
Authors: Amlan Prakash
Volume: 2 | Issue: 5 | PageNo: 126-128
computer networking computer networking
Authors: SONIA RANA
Volume: 2 | Issue: 5 | PageNo: 69-71
Exception Handling Exception Handling
Authors: Gourav Agghi
Volume: 2 | Issue: 5 | PageNo: 134-135
classes and object classes and object
Authors: Manmohan
Volume: 2 | Issue: 6 | PageNo: 20-22
pointer analysis for c programing pointer analysis for c programing
Authors: Mohit bansal
Volume: 2 | Issue: 6 | PageNo: 78-81
Array review Array review
Authors: Monika Yadav
Volume: 2 | Issue: 6 | PageNo: 312-313
Java applet Java applet
Authors: Jalaj sharma
Volume: 2 | Issue: 6 | PageNo: 353-354
SQL Injection Detection & Defeating Tools SQL Injection Detection & Defeating Tools
Authors: kartik rai
Volume: 2 | Issue: 6 | PageNo: 90-93
THE C PROGRAMMING LANGUAGE THE C PROGRAMMING LANGUAGE
Authors: Alia Anis
Volume: 2 | Issue: 6 | PageNo: 107-108
PROGRAMMING LANGUAGE C++ PROGRAMMING LANGUAGE C++
Authors: Happy Gogoi
Volume: 2 | Issue: 6 | PageNo: 166-167
Human Computer Interaction Human Computer Interaction
Authors: Navneet Yadav
Volume: 2 | Issue: 6 | PageNo: 99-102
fundamentals of C programming language fundamentals of C programming language
Authors: Ritika nain
Volume: 2 | Issue: 6 | PageNo: 175-176
Data file handling in c++ Data file handling in c++
Authors: Kripashanker yadav
Volume: 2 | Issue: 6 | PageNo: 326-329
Best programming language for a Beginner Best programming language for a Beginner
Authors: Deepakshi Singh
Volume: 2 | Issue: 6 | PageNo: 172-174
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
Authors: Manish
Volume: 2 | Issue: 6 | PageNo: 115-119
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Authors: shweta gupta, Ms.Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 204-208
software Testing software Testing
Authors: Chaynika Kapoor
Volume: 2 | Issue: 6 | PageNo: 286-289
The c preprocessor The c preprocessor
Authors: Mayank yadav
Volume: 2 | Issue: 6 | PageNo: 120-122
Switch and classes in c Switch and classes in c
Authors: Nishant
Volume: 2 | Issue: 6 | PageNo: 138-139
pointers pointers
Authors: Rahul Deshwal
Volume: 2 | Issue: 6 | PageNo: 140-142
5G Wireless Technology 5G Wireless Technology
Authors: Sunil rai
Volume: 2 | Issue: 6 | PageNo: 236-242
statements in c statements in c
Authors: kashika grover
Volume: 2 | Issue: 6 | PageNo: 308-309
Stack and queue Stack and queue
Authors: Pankaj gaur
Volume: 2 | Issue: 6 | PageNo: 322-325
ASP.NET AND ITS FRAMEWORK ASP.NET AND ITS FRAMEWORK
Authors: KOMAL CHAUHAN
Volume: 2 | Issue: 6 | PageNo: 261-264
Web Service Discovery using Relational Database and Apache Lucene Web Service Discovery using Relational Database and Apache Lucene
Authors: Bhavin Solanki, Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 23-30
File Management in C File Management in C
Authors: Ria Arora
Volume: 2 | Issue: 6 | PageNo: 294-296
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING
Authors: Rahul Y. Modi, Indr Jeet Rajput
Volume: 2 | Issue: 6 | PageNo: 37-42
Thread (computing) Thread (computing)
Authors: Gajendra singh
Volume: 2 | Issue: 6 | PageNo: 402-403
ASP.net ASP.net
Authors: Sanjana Singh
Volume: 2 | Issue: 6 | PageNo: 251-253
PHP - A Review PHP - A Review
Authors: Ipsita Vashista
Volume: 2 | Issue: 6 | PageNo: 400-401
arrays in C arrays in C
Authors: Priya Yadav
Volume: 2 | Issue: 6 | PageNo: 339-339
Cross Layer Design of Intrusion Detection in Wireless Mesh Network Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Authors: Dhruvil K Patel
Volume: 2 | Issue: 6 | PageNo: 48-52
Threats in Java Applet Threats in Java Applet
Authors: Ankit Bhatt
Volume: 2 | Issue: 6 | PageNo: 364-365
bubble sort bubble sort
Authors: priyanka kunjwal
Volume: 2 | Issue: 6 | PageNo: 265-267
Memory Management in C Memory Management in C
Authors: Puneet Saini, Ria Arora
Volume: 2 | Issue: 6 | PageNo: 257-258
Spring MVC Framework Spring MVC Framework
Authors: Simran Bhatti
Volume: 2 | Issue: 6 | PageNo: 290-293
java security java security
Authors: Ritu Yadav
Volume: 2 | Issue: 6 | PageNo: 254-256
SOFTWARE TESTING SOFTWARE TESTING
Authors: AARTI SINGH
Volume: 2 | Issue: 6 | PageNo: 268-274
.NET FRAMEWORK .NET FRAMEWORK
Authors: Karuna Hazrati
Volume: 2 | Issue: 7 | PageNo: 0-0
Java multithreading system Java multithreading system
Authors: kritika chadha
Volume: 2 | Issue: 6 | PageNo: 375-381
Research Paper on C Language Research Paper on C Language
Authors: kawalpreet Singh
Volume: 2 | Issue: 6 | PageNo: 310-311
PHP Web Application Frameworks based upon Design Patterns PHP Web Application Frameworks based upon Design Patterns
Authors: Aakash goyal
Volume: 2 | Issue: 6 | PageNo: 391-394
SOFTWARE & MANUAL TESTING SOFTWARE & MANUAL TESTING
Authors: Abhishek Jain
Volume: 2 | Issue: 6 | PageNo: 382-385
Digital Diary Digital Diary
Authors: Manjeet Saini
Volume: 2 | Issue: 6 | PageNo: 386-390
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
Volume: 2 | Issue: 6 | PageNo: 182-186
A Survey work on ETC System for an Efficient Image Encryption and Compression A Survey work on ETC System for an Efficient Image Encryption and Compression
Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 209-212
Survey paper on CAPTCHA AND VRP Survey paper on CAPTCHA AND VRP
Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 317-321
A Study on Data Mining with Big Data A Study on Data Mining with Big Data
Authors: B.Zakia Bano , Dr.K.Pavan Kumar
Volume: 2 | Issue: 6 | PageNo: 187-192
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
Volume: 2 | Issue: 6 | PageNo: 193-198
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Cen
Authors: Neha Jain, K. K. Joshi
Volume: 2 | Issue: 6 | PageNo: 431-435
Overview on Android and its Versions Overview on Android and its Versions
Authors: Sahil Munjal
Volume: 2 | Issue: 6 | PageNo: 415-418
Peer to Peer Computing Peer to Peer Computing
Authors: RAJAT WASON
Volume: 2 | Issue: 6 | PageNo: 408-412
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Authors: SMRUTI PHADKE, K.K. Joshi
Volume: 2 | Issue: 7 | PageNo: 160-167
POINTER ANALYSIS FOR C PROGRAM POINTER ANALYSIS FOR C PROGRAM
Authors: PRIYANK GUPTA
Volume: 2 | Issue: 7 | PageNo: 177-179
Survey on the Security Aspects of Mobile Operating Systems Survey on the Security Aspects of Mobile Operating Systems
Authors: Amod N. Narvekar, Prof. K. K. Joshi
Volume: 2 | Issue: 7 | PageNo: 197-203
execution project in java execution project in java
Authors: jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 168-169
Android and GPS tracking Android and GPS tracking
Authors: aakash soni
Volume: 2 | Issue: 7 | PageNo: 100-105
Business Suite Software Modules in SAP Business Suite Software Modules in SAP
Authors: Karan Bhalla
Volume: 2 | Issue: 7 | PageNo: 180-184
Safe arrays and pointers in c Safe arrays and pointers in c
Authors: Rahul kumar
Volume: 2 | Issue: 7 | PageNo: 204-206
Review of C/C++ Review of C/C++
Authors: rahul rai gupta
Volume: 2 | Issue: 7 | PageNo: 158-159
REVIEW OF C++ REVIEW OF C++
Authors: sachin kumar benwal
Volume: 2 | Issue: 7 | PageNo: 170-171
Review of TETRA Radio System Review of TETRA Radio System
Authors: pragy kaushik
Volume: 2 | Issue: 7 | PageNo: 172-172
Network Security: Attacks And Tips Network Security: Attacks And Tips
Authors: Himanshu Saini
Volume: 2 | Issue: 7 | PageNo: 173-176
data mining data mining
Authors: samiksha yadav
Volume: 2 | Issue: 7 | PageNo: 250-252
Basic Fundamentals of Programming Basic Fundamentals of Programming
Authors: Sahil Jindal
Volume: 2 | Issue: 7 | PageNo: 306-308
The andriod- mobile operating system with its mobile based applications The andriod- mobile operating system with its mobile based applications
Authors: Jyoti yadav, Jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 775-779
loops in C loops in C
Authors: Pratibha Sharma
Volume: 2 | Issue: 7 | PageNo: 598-599
Review paper on summer training Review paper on summer training
Authors: pooja nayak
Volume: 2 | Issue: 7 | PageNo: 351-352
A Diverse Methodology For Monitoring And Controlling Application in Active Database Management Systems A Diverse Methodology For Monitoring And Controlling Application in Active Datab
Authors: Thodeti Srikanth
Volume: 2 | Issue: 6 | PageNo: 453-457
JDBC JDBC
Authors: Upender yadav
Volume: 2 | Issue: 7 | PageNo: 780-781
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and image Encryption DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and
Authors: Mr Ashish Singh., Ajay Gupta
Volume: 2 | Issue: 7 | PageNo: 529-533
Online Comment Analysis for Recommendation Online Comment Analysis for Recommendation
Authors: Tushar Mehmi
Volume: 2 | Issue: 7 | PageNo: 636-640
discretizaiton discretizaiton
Authors: rahul yadav
Volume: 2 | Issue: 7 | PageNo: 641-645
Probability PSO Search Feature Selection for Data Stream Mining for current market trend Probability PSO Search Feature Selection for Data Stream Mining for current mark
Authors: snehal rode, Ram joshi
Volume: 2 | Issue: 7 | PageNo: 717-720
A Survey On Various Approaches For Webpage Recommendation System In Web Mining A Survey On Various Approaches For Webpage Recommendation System In Web Mining
Authors: Darshan K Prajapati, Dr. Shyamal Tanna
Volume: 2 | Issue: 7 | PageNo: 498-502
SECURING THE NETWORK IN CLOUD ENVIRONMENT SECURING THE NETWORK IN CLOUD ENVIRONMENT
Authors: P.Sakthi Priyanka, C.Radha
Volume: 2 | Issue: 7 | PageNo: 654-660
A Survey Paper on Variants of R-tree Data Structure A Survey Paper on Variants of R-tree Data Structure
Authors: Bhoomika Panchal, Vinit Kumar Gupta
Volume: 2 | Issue: 7 | PageNo: 543-547
A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence A Survey on Software Fault Prediction Technique based on Clustering Algorithm an
Authors: Margi Patel
Volume: 2 | Issue: 7 | PageNo: 623-627
Performance analysis of on demand multipath routing scheme in wireless environment Performance analysis of on demand multipath routing scheme in wireless environme
Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
Volume: 2 | Issue: 7 | PageNo: 787-791
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and
Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
Volume: 2 | Issue: 7 | PageNo: 796-802
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encryp
Authors: Rucha Anil Shinde, Hema V. Kumbhar
Volume: 2 | Issue: 7 | PageNo: 808-810
Scalable architecture for multi-user encrypted SQL operations on cloud database services Scalable architecture for multi-user encrypted SQL operations on cloud database
Authors: A.SHEELAVATHI, K. Preethi
Volume: 2 | Issue: 8 | PageNo: 20-25
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Authors: Farinaparveen Khan , R K Krishna
Volume: 2 | Issue: 8 | PageNo: 72-77
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDEN
Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
Volume: 2 | Issue: 8 | PageNo: 32-39
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
Authors: Dr.M. Balamurugan, R. Prasanka
Volume: 1 | Issue: 8 | PageNo: 129-133
Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access Password Guessing Resistant Protocol for Securing System from Bots and Illegal A
Authors: Ms. Arya Kumar, Prof. A.K.Gupta
Volume: 2 | Issue: 8 | PageNo: 91-94
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Authors: Sahil Meshram, Ujwala H. Wanaskar
Volume: 2 | Issue: 9 | PageNo: 18-21
Packet Loss Control Using Tokens Packet Loss Control Using Tokens
Authors: Rajeswari.Villa, A. SatyaMallesh
Volume: 2 | Issue: 9 | PageNo: 15-17
Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique Classification and Allocation of Project Proposals to Reviewers Using Ontology B
Authors: Ratish Srivastava, Prof. P.K. Deshmukh
Volume: 2 | Issue: 9 | PageNo: 57-61
Analysis of Data Mining Techniques for HealthCare Data Classification Analysis of Data Mining Techniques for HealthCare Data Classification
Authors: Dr. M. Balamurugan, S. Vijaykumar
Volume: 1 | Issue: 9 | PageNo: 125-128
Cryptography with High Throughput : A survey Cryptography with High Throughput : A survey
Authors: Bhoomika Modi, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 1-7
Format Preserving Encryption: A Survey Format Preserving Encryption: A Survey
Authors: ZALAK BHATT, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 8-17
High Capacity Steganography with Improved Transformation and Security Technique:A survey High Capacity Steganography with Improved Transformation and Security Technique:
Authors: Bhumin Mandaliya, Vinit Gupta
Volume: 0 | Issue: no | PageNo: 0-0
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Survey Stochastic optimization for Conserving Energy in Smart Phone Applications - A Su
Authors: M.Ramu, Indurani
Volume: 2 | Issue: 10 | PageNo: 29-34
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
Volume: 2 | Issue: 10 | PageNo: 172-177
BUS TACKING SYSTEM USING RFID BUS TACKING SYSTEM USING RFID
Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
Volume: 2 | Issue: 10 | PageNo: 137-141
Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods Comparative Study between Equivalence Class Partitioning and Boundary Value Anal
Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
Volume: 2 | Issue: 10 | PageNo: 74-78
Comparative study on Motion Estimation in video sequence Comparative study on Motion Estimation in video sequence
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 10 | PageNo: 79-83
Cloud Computing Architecture, Security issues: A Review Cloud Computing Architecture, Security issues: A Review
Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
Volume: 2 | Issue: 10 | PageNo: 154-158
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
Authors: Anjli J Patel, Ms.Jayna B.Shah
Volume: 0 | Issue: no | PageNo: 0-0
Survey on privacy preserving association rule hiding in data mining Survey on privacy preserving association rule hiding in data mining
Authors: jinal patel, Gurcharan sahani
Volume: 2 | Issue: 10 | PageNo: 111-118
A Comparative Study of Web Page Ranking Algorithms A Comparative Study of Web Page Ranking Algorithms
Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
Volume: 2 | Issue: 10 | PageNo: 178-184
Fuzzy Page Ranking Scheme in IR System Fuzzy Page Ranking Scheme in IR System
Authors: Shikha Gupta
Volume: 2 | Issue: 10 | PageNo: 185-187
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 2 | Issue: 10 | PageNo: 128-131
Big Data Analysis by Classification Algorithm Using Flight Data Set Big Data Analysis by Classification Algorithm Using Flight Data Set
Authors: Ujjwala Urkude
Volume: 2 | Issue: 10 | PageNo: 188-189
Survey on Privacy Preservation for Inference Control on OLAP Survey on Privacy Preservation for Inference Control on OLAP
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 11 | PageNo: 10-13
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Authors: Gaurang Patel, Sanket Patel
Volume: 2 | Issue: 11 | PageNo: 1-4
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COM
Authors: Umang Thakkar, Indrjeet Rajput
Volume: 2 | Issue: 11 | PageNo: 5-9
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
Volume: 2 | Issue: 11 | PageNo: 78-81
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Authors: Bhumika Parmar, Mr. Tejas Bhatt
Volume: 2 | Issue: 11 | PageNo: 21-25
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Volume: 2 | Issue: 11 | PageNo: 26-33
Operative and Secured Privacy enhanced Location Based Services System Operative and Secured Privacy enhanced Location Based Services System
Authors: M.Shakul Hameed, V.Indurani
Volume: 2 | Issue: 11 | PageNo: 34-41
SENTIMENT ANALYSIS: A REVIEW SENTIMENT ANALYSIS: A REVIEW
Authors: NILU, TANUJA SHUKLA
Volume: 2 | Issue: 11 | PageNo: 90-94
A Review On Handwritten Character Recognition Techniques A Review On Handwritten Character Recognition Techniques
Authors: Parul Singla, Sargam Munjal
Volume: 2 | Issue: 11 | PageNo: 373-376
A Review for Video Mosaicing Using Feature Tracking A Review for Video Mosaicing Using Feature Tracking
Authors: Foram N. Patel, Neha Parmar
Volume: 2 | Issue: 11 | PageNo: 71-74
AppZoo AppZoo
Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
Volume: 2 | Issue: 11 | PageNo: 200-203
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
Volume: 2 | Issue: 11 | PageNo: 214-218
Optimization of Social Media Posts Optimization of Social Media Posts
Authors: kanhaiya choudhary, astha singh, nitin Sharma
Volume: 2 | Issue: 11 | PageNo: 304-307
Tracking and Analyzing the Public Opinions by Interpretation Techniques Tracking and Analyzing the Public Opinions by Interpretation Techniques
Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
Volume: 2 | Issue: 11 | PageNo: 316-318
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING) CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
Volume: 2 | Issue: 11 | PageNo: 343-348
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
Authors: Asia Mashkoor, Himani Gupta
Volume: 2 | Issue: 11 | PageNo: 391-398
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
Volume: 2 | Issue: 11 | PageNo: 272-277
Real-Time Image Improvement Methods Real-Time Image Improvement Methods
Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 428-430
SEARCHING LARGE DATA SETS IN GRID COMPUTING SEARCHING LARGE DATA SETS IN GRID COMPUTING
Authors: Sudha K, Sangeetha C, Aruna R
Volume: 2 | Issue: 11 | PageNo: 411-416
Prediction of network security situation based on fuzzy neutral network Prediction of network security situation based on fuzzy neutral network
Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 423-427
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
Volume: 2 | Issue: 11 | PageNo: 417-422
SCALABLE DATA SHARING BY USING KEY AGGREGATION SCALABLE DATA SHARING BY USING KEY AGGREGATION
Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
Volume: 2 | Issue: 12 | PageNo: 10-16
Security in Banking sector using cloud computing with TPA Security in Banking sector using cloud computing with TPA
Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
Volume: 2 | Issue: 12 | PageNo: 6-9
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Volume: 2 | Issue: 12 | PageNo: 307-310
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
Volume: 2 | Issue: 12 | PageNo: 1-5
Person Identification Using Iris Recognition System Using Fastest Searching Algorithm Person Identification Using Iris Recognition System Using Fastest Searching Algo
Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
Volume: 2 | Issue: 12 | PageNo: 238-242
Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework Identification, Implementation and Validation of Authentication and Authorizatio
Authors: ketan kumar, kalpesh patel
Volume: 2 | Issue: 12 | PageNo: 65-68
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
Volume: 2 | Issue: 12 | PageNo: 352-355
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence Software Fault Prediction based on CURE Clustering Algorithm and Artificial Int
Authors: Margi Patel, Upama Vachhani
Volume: 2 | Issue: 12 | PageNo: 69-77
Dynamic Resource Allocation Technique in Cloud Dynamic Resource Allocation Technique in Cloud
Authors: Ishita Patel, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 84-88
A New Approach of Virtual Machine Allocation In Cloud A New Approach of Virtual Machine Allocation In Cloud
Authors: Rikin Thakkar, anuradha desai
Volume: 2 | Issue: 12 | PageNo: 89-93
Privacy Preservation for Inference Control with Improved ND Algorithm Privacy Preservation for Inference Control with Improved ND Algorithm
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 12 | PageNo: 99-103
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Env
Authors: Pranali Gajjar, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 113-120
Modified Key Based Image Encryption using RSA algorithm Modified Key Based Image Encryption using RSA algorithm
Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
Volume: 2 | Issue: 12 | PageNo: 252-255
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CAS
Authors: Anamika Madaan, Bharti Jha
Volume: 2 | Issue: 12 | PageNo: 402-406
Steganography Techniques:A Review Steganography Techniques:A Review
Authors: TARIQ RASHID, SUNNY DAGAR
Volume: 2 | Issue: 12 | PageNo: 387-391
Fast Block matching motion estimation using fusion of Four Step & Diamond Step Search algorithm for video compression Fast Block matching motion estimation using fusion of Four Step & Diamond Step S
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 12 | PageNo: 378-382
FOCUS : LEARNING TO CRAWL WEB FORUMS FOCUS : LEARNING TO CRAWL WEB FORUMS
Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
Volume: 2 | Issue: 12 | PageNo: 448-452
Comparative analysis of Domain Specific Testing Techniques Comparative analysis of Domain Specific Testing Techniques
Authors: Neha Kumawat, Yashika Sharma
Volume: 3 | Issue: 1 | PageNo: 1-4
Category Based Implementation of Web Crawler Category Based Implementation of Web Crawler
Authors: Nandita , Sarika Rana
Volume: 3 | Issue: 1 | PageNo: 192-197
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
Volume: 3 | Issue: 1 | PageNo: 269-272
Data Mining tools and techniques in Medical Science Data Mining tools and techniques in Medical Science
Authors: Anu Bura, DR. Prakash Kumar Pathak
Volume: 3 | Issue: 1 | PageNo: 149-158
Analyzing Twitter data for Multiple languages by applying machine learning Techniques Analyzing Twitter data for Multiple languages by applying machine learning Techn
Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
Volume: 3 | Issue: 1 | PageNo: 43-48
Advanced Music Player With Integrated Face Recognition Mechanism Advanced Music Player With Integrated Face Recognition Mechanism
Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
Volume: 3 | Issue: 1 | PageNo: 8-11
A Mobile Application for Bus Tracking System A Mobile Application for Bus Tracking System
Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
Volume: 3 | Issue: 1 | PageNo: 17-20
Deep Web Data Extraction by Using Vision Approach for Multi-Region Deep Web Data Extraction by Using Vision Approach for Multi-Region
Authors: Shweta Dhall, Parikshit Singla
Volume: 3 | Issue: 1 | PageNo: 104-109
Review of JSON Data Interchange Format Review of JSON Data Interchange Format
Authors: Garima Dutt, Anup Singh Kushwaha
Volume: 3 | Issue: 1 | PageNo: 309-313
A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews A Review on Opinion Word and Opinion Target Extraction and Classification of Rev
Authors: Sangram Ashok Patil, Prof. K. B. Manwade
Volume: 3 | Issue: 1 | PageNo: 110-113
Routing Protocol in Wireless Sensor Networks – Survey Routing Protocol in Wireless Sensor Networks – Survey
Authors: Priya P, Kuppusamy N K
Volume: 3 | Issue: 1 | PageNo: 159-163
video mosaicing video mosaicing
Authors: Foram N Patel, Neha Parmar
Volume: 3 | Issue: 1 | PageNo: 242-248
Unsupervised Stemmer for Kannada Language Unsupervised Stemmer for Kannada Language
Authors: Mounika S, B H Manjunath Kumar
Volume: 3 | Issue: 1 | PageNo: 146-148
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 3 | Issue: 1 | PageNo: 377-382
Security Issues and Challenges in Cloud Computing Security Issues and Challenges in Cloud Computing
Authors: Arvind Jaiswal
Volume: 3 | Issue: 1 | PageNo: 383-387
Review Paper for Query Optimization for Declarative Crowdsourcing System Review Paper for Query Optimization for Declarative Crowdsourcing System
Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
Volume: 3 | Issue: 2 | PageNo: 32-36
Hybrid Approach for Optimizing Test Suite Based on GA & ACO Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Authors: Khushboo Arora, Mamta Arora
Volume: 3 | Issue: 2 | PageNo: 65-69
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sens
Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
Volume: 3 | Issue: 2 | PageNo: 46-52
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Network
Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
Volume: 3 | Issue: 2 | PageNo: 20-25
schema agnostic indexing with live indexes schema agnostic indexing with live indexes
Authors: monica bansal
Volume: 3 | Issue: 2 | PageNo: 26-31