Search Your Paper

IJIRT Search Xplore - Search by Paper id, Published paper id, Paper Name, Author Name and Paper Title

Search Your Paper Details.

All Published Paper Digital Library. Search Through below Search Option.

  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 35-39

Comparative Analysis of Speech Recognition Based on Artificial Neural Network

  • Authors: Abhinav Bhatnagar, Sapna Sinha
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 44-47

Use of Hadoop Big Data: A Review

  • Authors: Mohd Hashim
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 48-52

Community Detection in social networks

  • Authors: Pradeep kumar
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 71-77

Software Testing Technique Using Genetic Algorithm

  • Authors: Pramod Garg, Dr. Deepak Kumar
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 66-70

Use of game theory in executive support system

  • Authors: Ashish Sharma, Sarika Jain
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 219-224

IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION

  • Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 276-279

Three Aspects of Web Mining

  • Authors: AR.Sivakumaran, Dr.P.Marikkannu
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 238-239

Survey on Worm Spreading and Worm Detection

  • Authors: Aiswarya Francie Challat, Binny Chelziah M
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 290-293

Spam Detection using KNN

  • Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 244-251

A New Approach for Feature Subset Selection Based on Hadoop

  • Authors: Ramya P V, Shashikala B
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 104-107

Reducing False Positive In Intrusion Detection using Genetic Algorithm

  • Authors: Dipika Narsingyani, Ompriya Kale
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 127-132

Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network

  • Authors: Chirag Parmar, Prof. Chaita Jani
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 142-147

Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead

  • Authors: Viral Jethva, Risha A. Tiwari
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 190-194

A Survey on Dynamic Load Balancing with Min Scaling

  • Authors: shweta gupta, Ms. Jasmin Jha
  • Year:
  • Volume: 2
  • Issue: 1
  • PageNo: 316-322

Association Rules and their Optimization using Genetic Algorithm

  • Authors: Arvind Jaiswal
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 86-89

Tracking Moving Targets in Wireless Sensor Network

  • Authors: M.Sridhar , G.Naresh
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 148-154

A Heuristic Approach To Record Deduplication

  • Authors: Lata.S.Math, Smt.Shashikala.B
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 159-163

Load Balancing Algorithms in Cloud Computing Environment : An Introspection

  • Authors: M.VANITHA, Dr.P.MARIKKANNU
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 195-201

Data Security in Cloud Storage using RBAC

  • Authors: Mr. Harshal Ashokrao Karande
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 220-224

A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script

  • Authors: arwinder kaur, ashok kumar bathla
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 137-143

REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM

  • Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
  • Year:
  • Volume: 2
  • Issue: 2
  • PageNo: 260-264

QoS and Energy Aware Geographic Routing Protocol for WSN

  • Authors: K.Sindhuja, P. Punnam Chander Reddy
  • Year:
  • Volume: 2
  • Issue: 3
  • PageNo: 88-95

An Ensemble of Classifiers using Dynamic Method on Ambiguous Data

  • Authors: Dnyaneshwar Kudande
  • Year:
  • Volume: 2
  • Issue: 3
  • PageNo: 96-102

An Ensemble of Classifiers using Weighted Instance Selection

  • Authors: Santosh N. Nagargoje, Prasad Kulkarni
  • Year:
  • Volume: 2
  • Issue: 3
  • PageNo: 130-135

Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review

  • Authors: Suraj Baviskar, Nitin Namdev
  • Year:
  • Volume: 2
  • Issue: 3
  • PageNo: 171-176

Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm

  • Authors: Dr. M. Balamurugan, P. Mathiazhagan
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 67-72

object tracking using image processing

  • Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 77-81

Remote method Invocation and Remote Procedure Call

  • Authors: Kunwar Deep Singh Toor
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 135-140

Applying cryptography to cancellable signatures

  • Authors: Shiwani Gupta
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 141-145

AFFECTIVE COMPUTING

  • Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 164-166

Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data

  • Authors: Dr. M. Balamurugan, A. Nancy
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 160-163

SMART CARD SECURITY

  • Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
  • Year:
  • Volume: 2
  • Issue: 4
  • PageNo: 106-110

Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language

  • Authors: B.P.SREEJA, G.SARATHA DEVI
  • Year:
  • Volume: 2
  • Issue: 5
  • PageNo: 46-51

Performance Tuning in Teradata

  • Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
  • Year:
  • Volume: 2
  • Issue: 5
  • PageNo: 75-77

Google Chrome Operatin System

  • Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
  • Year:
  • Volume: 2
  • Issue: 5
  • PageNo: 126-128

Audio Controlled Quadcoipter with Stereo Camera

  • Authors: Amlan Prakash
  • Year:
  • Volume: 2
  • Issue: 5
  • PageNo: 69-71

computer networking

  • Authors: SONIA RANA
  • Year:
  • Volume: 2
  • Issue: 5
  • PageNo: 134-135

Exception Handling

  • Authors: Gourav Agghi
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 20-22

classes and object

  • Authors: Manmohan
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 78-81

pointer analysis for c programing

  • Authors: Mohit bansal
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 312-313

Array review

  • Authors: Monika Yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 353-354

Java applet

  • Authors: Jalaj sharma
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 90-93

SQL Injection Detection & Defeating Tools

  • Authors: kartik rai
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 107-108

THE C PROGRAMMING LANGUAGE

  • Authors: Alia Anis
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 166-167

PROGRAMMING LANGUAGE C++

  • Authors: Happy Gogoi
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 99-102

Human Computer Interaction

  • Authors: Navneet Yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 175-176

fundamentals of C programming language

  • Authors: Ritika nain
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 326-329

Data file handling in c++

  • Authors: Kripashanker yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 172-174

Best programming language for a Beginner

  • Authors: Deepakshi Singh
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 115-119

C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS

  • Authors: Manish
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 204-208

Dynamic Load Balancing with Min Scaling and Cooldown Adjustment

  • Authors: shweta gupta, Ms.Jasmin Jha
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 286-289

software Testing

  • Authors: Chaynika Kapoor
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 120-122

The c preprocessor

  • Authors: Mayank yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 138-139

Switch and classes in c

  • Authors: Nishant
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 140-142

pointers

  • Authors: Rahul Deshwal
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 236-242

5G Wireless Technology

  • Authors: Sunil rai
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 308-309

statements in c

  • Authors: kashika grover
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 322-325

Stack and queue

  • Authors: Pankaj gaur
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 261-264

ASP.NET AND ITS FRAMEWORK

  • Authors: KOMAL CHAUHAN
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 23-30

Web Service Discovery using Relational Database and Apache Lucene

  • Authors: Bhavin Solanki, Jasmin Jha
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 294-296

File Management in C

  • Authors: Ria Arora
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 37-42

FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC

  • Authors: Rahul Y. Modi, Indr Jeet Rajput
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 402-403

Thread (computing)

  • Authors: Gajendra singh
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 251-253

ASP.net

  • Authors: Sanjana Singh
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 400-401

PHP - A Review

  • Authors: Ipsita Vashista
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 339-339

arrays in C

  • Authors: Priya Yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 48-52

Cross Layer Design of Intrusion Detection in Wireless Mesh Network

  • Authors: Dhruvil K Patel
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 364-365

Threats in Java Applet

  • Authors: Ankit Bhatt
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 265-267

bubble sort

  • Authors: priyanka kunjwal
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 257-258

Memory Management in C

  • Authors: Puneet Saini, Ria Arora
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 290-293

Spring MVC Framework

  • Authors: Simran Bhatti
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 254-256

java security

  • Authors: Ritu Yadav
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 268-274

SOFTWARE TESTING

  • Authors: AARTI SINGH
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 0-0

.NET FRAMEWORK

  • Authors: Karuna Hazrati
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 375-381

Java multithreading system

  • Authors: kritika chadha
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 310-311

Research Paper on C Language

  • Authors: kawalpreet Singh
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 391-394

PHP Web Application Frameworks based upon Design Patterns

  • Authors: Aakash goyal
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 382-385

SOFTWARE & MANUAL TESTING

  • Authors: Abhishek Jain
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 386-390

Digital Diary

  • Authors: Manjeet Saini
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 182-186

Cluster based distributed mutual exclusion algorithm for mobile ad hoc network

  • Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 209-212

A Survey work on ETC System for an Efficient Image Encryption and Compression

  • Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 317-321

Survey paper on CAPTCHA AND VRP

  • Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 187-192

A Study on Data Mining with Big Data

  • Authors: B.Zakia Bano , Dr.K.Pavan Kumar
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 193-198

AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION

  • Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 431-435

A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center

  • Authors: Neha Jain, K. K. Joshi
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 415-418

Overview on Android and its Versions

  • Authors: Sahil Munjal
  • Year:
  • Volume: 2
  • Issue: 6
  • PageNo: 408-412

Peer to Peer Computing

  • Authors: RAJAT WASON
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 160-167

Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center

  • Authors: SMRUTI PHADKE, K.K. Joshi
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 177-179

POINTER ANALYSIS FOR C PROGRAM

  • Authors: PRIYANK GUPTA
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 197-203

Survey on the Security Aspects of Mobile Operating Systems

  • Authors: Amod N. Narvekar, Prof. K. K. Joshi
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 168-169

execution project in java

  • Authors: jyoti yadav
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 100-105

Android and GPS tracking

  • Authors: aakash soni
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 180-184

Business Suite Software Modules in SAP

  • Authors: Karan Bhalla
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 204-206

Safe arrays and pointers in c

  • Authors: Rahul kumar
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 158-159

Review of C/C++

  • Authors: rahul rai gupta
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 170-171

REVIEW OF C++

  • Authors: sachin kumar benwal
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 172-172

Review of TETRA Radio System

  • Authors: pragy kaushik
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 173-176

Network Security: Attacks And Tips

  • Authors: Himanshu Saini
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 250-252

data mining

  • Authors: samiksha yadav
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 306-308

Basic Fundamentals of Programming

  • Authors: Sahil Jindal
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 775-779

The andriod- mobile operating system with its mobile based applications

  • Authors: Jyoti yadav, Jyoti yadav
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 598-599

loops in C

  • Authors: Pratibha Sharma
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 351-352

Review paper on summer training

  • Authors: pooja nayak
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 780-781

JDBC

  • Authors: Upender yadav
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 636-640

Online Comment Analysis for Recommendation

  • Authors: Tushar Mehmi
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 641-645

discretizaiton

  • Authors: rahul yadav
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 498-502

A Survey On Various Approaches For Webpage Recommendation System In Web Mining

  • Authors: Darshan K Prajapati, Dr. Shyamal Tanna
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 654-660

SECURING THE NETWORK IN CLOUD ENVIRONMENT

  • Authors: P.Sakthi Priyanka, C.Radha
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 543-547

A Survey Paper on Variants of R-tree Data Structure

  • Authors: Bhoomika Panchal, Vinit Kumar Gupta
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 787-791

Performance analysis of on demand multipath routing scheme in wireless environment

  • Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 796-802

Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology

  • Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
  • Year:
  • Volume: 2
  • Issue: 7
  • PageNo: 808-810

Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud

  • Authors: Rucha Anil Shinde, Hema V. Kumbhar
  • Year:
  • Volume: 2
  • Issue: 8
  • PageNo: 20-25

Scalable architecture for multi-user encrypted SQL operations on cloud database services

  • Authors: A.SHEELAVATHI, K. Preethi
  • Year:
  • Volume: 2
  • Issue: 8
  • PageNo: 72-77

Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm

  • Authors: Farinaparveen Khan , R K Krishna
  • Year:
  • Volume: 2
  • Issue: 8
  • PageNo: 32-39

FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS

  • Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
  • Year:
  • Volume: 1
  • Issue: 8
  • PageNo: 129-133

FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM

  • Authors: Dr.M. Balamurugan, R. Prasanka
  • Year:
  • Volume: 2
  • Issue: 8
  • PageNo: 91-94

Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access

  • Authors: Ms. Arya Kumar, Prof. A.K.Gupta
  • Year:
  • Volume: 2
  • Issue: 9
  • PageNo: 18-21

Reliable Wireless Sensor Network Data Transfer to Mobile Cloud

  • Authors: Sahil Meshram, Ujwala H. Wanaskar
  • Year:
  • Volume: 2
  • Issue: 9
  • PageNo: 15-17

Packet Loss Control Using Tokens

  • Authors: Rajeswari.Villa, A. SatyaMallesh
  • Year:
  • Volume: 2
  • Issue: 9
  • PageNo: 57-61

Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique

  • Authors: Ratish Srivastava, Prof. P.K. Deshmukh
  • Year:
  • Volume: 1
  • Issue: 9
  • PageNo: 125-128

Analysis of Data Mining Techniques for HealthCare Data Classification

  • Authors: Dr. M. Balamurugan, S. Vijaykumar
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 1-7

Cryptography with High Throughput : A survey

  • Authors: Bhoomika Modi, Vinitkumar Gupta
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 8-17

Format Preserving Encryption: A Survey

  • Authors: ZALAK BHATT, Vinitkumar Gupta
  • Year:
  • Volume: 0
  • Issue: no
  • PageNo: 0-0

High Capacity Steganography with Improved Transformation and Security Technique:A survey

  • Authors: Bhumin Mandaliya, Vinit Gupta
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 172-177

DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES

  • Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 137-141

BUS TACKING SYSTEM USING RFID

  • Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 74-78

Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods

  • Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 79-83

Comparative study on Motion Estimation in video sequence

  • Authors: Ankit Souparana, Ankur kumar Aggarwal
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 154-158

Cloud Computing Architecture, Security issues: A Review

  • Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
  • Year:
  • Volume: 0
  • Issue: no
  • PageNo: 0-0

SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES

  • Authors: Anjli J Patel, Ms.Jayna B.Shah
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 111-118

Survey on privacy preserving association rule hiding in data mining

  • Authors: jinal patel, Gurcharan sahani
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 178-184

A Comparative Study of Web Page Ranking Algorithms

  • Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 185-187

Fuzzy Page Ranking Scheme in IR System

  • Authors: Shikha Gupta
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 128-131

A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM

  • Authors: NIYATI M. MEVADA, JAYNA B. SHAH
  • Year:
  • Volume: 2
  • Issue: 10
  • PageNo: 188-189

Big Data Analysis by Classification Algorithm Using Flight Data Set

  • Authors: Ujjwala Urkude
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 10-13

Survey on Privacy Preservation for Inference Control on OLAP

  • Authors: Maulik Joshi, Chetna Chand
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 1-4

Survey on Privacy Preserving Updates for Anonymous and Confidential Databases

  • Authors: Gaurang Patel, Sanket Patel
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 5-9

A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING

  • Authors: Umang Thakkar, Indrjeet Rajput
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 78-81

COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD

  • Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 21-25

Volume Visualization using Marching Cubes Algorithms: Survey & Analysis

  • Authors: Bhumika Parmar, Mr. Tejas Bhatt
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 26-33

DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK

  • Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 34-41

Operative and Secured Privacy enhanced Location Based Services System

  • Authors: M.Shakul Hameed, V.Indurani
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 90-94

SENTIMENT ANALYSIS: A REVIEW

  • Authors: NILU, TANUJA SHUKLA
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 373-376

A Review On Handwritten Character Recognition Techniques

  • Authors: Parul Singla, Sargam Munjal
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 71-74

A Review for Video Mosaicing Using Feature Tracking

  • Authors: Foram N. Patel, Neha Parmar
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 200-203

AppZoo

  • Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 214-218

MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES

  • Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 304-307

Optimization of Social Media Posts

  • Authors: kanhaiya choudhary, astha singh, nitin Sharma
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 316-318

Tracking and Analyzing the Public Opinions by Interpretation Techniques

  • Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 343-348

CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)

  • Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 391-398

SURVEY ON FACIAL RECOGNITIONS TECHNIQUES

  • Authors: Asia Mashkoor, Himani Gupta
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 272-277

IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA

  • Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 428-430

Real-Time Image Improvement Methods

  • Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 411-416

SEARCHING LARGE DATA SETS IN GRID COMPUTING

  • Authors: Sudha K, Sangeetha C, Aruna R
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 423-427

Prediction of network security situation based on fuzzy neutral network

  • Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
  • Year:
  • Volume: 2
  • Issue: 11
  • PageNo: 417-422

DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION

  • Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 10-16

SCALABLE DATA SHARING BY USING KEY AGGREGATION

  • Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 6-9

Security in Banking sector using cloud computing with TPA

  • Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 307-310

A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK

  • Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 1-5

ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET

  • Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 238-242

Person Identification Using Iris Recognition System Using Fastest Searching Algorithm

  • Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 352-355

PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY

  • Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 69-77

Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence

  • Authors: Margi Patel, Upama Vachhani
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 84-88

Dynamic Resource Allocation Technique in Cloud

  • Authors: Ishita Patel, Brona Shah
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 89-93

A New Approach of Virtual Machine Allocation In Cloud

  • Authors: Rikin Thakkar, anuradha desai
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 99-103

Privacy Preservation for Inference Control with Improved ND Algorithm

  • Authors: Maulik Joshi, Chetna Chand
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 113-120

An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment

  • Authors: Pranali Gajjar, Brona Shah
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 252-255

Modified Key Based Image Encryption using RSA algorithm

  • Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 402-406

COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES

  • Authors: Anamika Madaan, Bharti Jha
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 387-391

Steganography Techniques:A Review

  • Authors: TARIQ RASHID, SUNNY DAGAR
  • Year:
  • Volume: 2
  • Issue: 12
  • PageNo: 448-452

FOCUS : LEARNING TO CRAWL WEB FORUMS

  • Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 1-4

Comparative analysis of Domain Specific Testing Techniques

  • Authors: Neha Kumawat, Yashika Sharma
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 192-197

Category Based Implementation of Web Crawler

  • Authors: Nandita , Sarika Rana
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 269-272

Detection Of Distributed Denial of Service Attack With Hadoop On Live Network

  • Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 149-158

Data Mining tools and techniques in Medical Science

  • Authors: Anu Bura, DR. Prakash Kumar Pathak
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 43-48

Analyzing Twitter data for Multiple languages by applying machine learning Techniques

  • Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 8-11

Advanced Music Player With Integrated Face Recognition Mechanism

  • Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 17-20

A Mobile Application for Bus Tracking System

  • Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 104-109

Deep Web Data Extraction by Using Vision Approach for Multi-Region

  • Authors: Shweta Dhall, Parikshit Singla
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 309-313

Review of JSON Data Interchange Format

  • Authors: Garima Dutt, Anup Singh Kushwaha
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 110-113

A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews

  • Authors: Sangram Ashok Patil, Prof. K. B. Manwade
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 159-163

Routing Protocol in Wireless Sensor Networks – Survey

  • Authors: Priya P, Kuppusamy N K
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 242-248

video mosaicing

  • Authors: Foram N Patel, Neha Parmar
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 146-148

Unsupervised Stemmer for Kannada Language

  • Authors: Mounika S, B H Manjunath Kumar
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 377-382

EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM

  • Authors: NIYATI M. MEVADA, JAYNA B. SHAH
  • Year:
  • Volume: 3
  • Issue: 1
  • PageNo: 383-387

Security Issues and Challenges in Cloud Computing

  • Authors: Arvind Jaiswal
  • Year:
  • Volume: 3
  • Issue: 2
  • PageNo: 32-36

Review Paper for Query Optimization for Declarative Crowdsourcing System

  • Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
  • Year:
  • Volume: 3
  • Issue: 2
  • PageNo: 65-69

Hybrid Approach for Optimizing Test Suite Based on GA & ACO

  • Authors: Khushboo Arora, Mamta Arora
  • Year:
  • Volume: 3
  • Issue: 2
  • PageNo: 46-52

Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks

  • Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
  • Year:
  • Volume: 3
  • Issue: 2
  • PageNo: 20-25

Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks

  • Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
  • Year:
  • Volume: 3
  • Issue: 2
  • PageNo: 26-31

schema agnostic indexing with live indexes

  • Authors: monica bansal