Search All Published Paper Details easy to find any paper. Please use Ctrl+F if the search is not working in your browser.


You are browsing Research Papers of Computer

Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Authors: Abhinav Bhatnagar, Sapna Sinha
Volume: 2 | Issue: 1 | PageNo: 35-39


Use of Hadoop Big Data: A Review
Use of Hadoop Big Data: A Review
Authors: Mohd Hashim
Volume: 2 | Issue: 1 | PageNo: 44-47


Community Detection in social networks
Community Detection in social networks
Authors: Pradeep kumar
Volume: 2 | Issue: 1 | PageNo: 48-52


Software Testing Technique Using Genetic Algorithm
Software Testing Technique Using Genetic Algorithm
Authors: Pramod Garg, Dr. Deepak Kumar
Volume: 2 | Issue: 1 | PageNo: 71-77


Use of game theory in executive support system
Use of game theory in executive support system
Authors: Ashish Sharma, Sarika Jain
Volume: 2 | Issue: 1 | PageNo: 66-70


A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY SENSED IMAGE
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY
Authors: Dr. S. Rajesh, Mithuna.J
Volume: 2 | Issue: 1 | PageNo: 120-126


IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FAC
Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
Volume: 2 | Issue: 1 | PageNo: 219-224


Three Aspects of Web Mining
Three Aspects of Web Mining
Authors: AR.Sivakumaran, Dr.P.Marikkannu
Volume: 2 | Issue: 1 | PageNo: 276-279


Survey on Worm Spreading and Worm Detection
Survey on Worm Spreading and Worm Detection
Authors: Aiswarya Francie Challat, Binny Chelziah M
Volume: 2 | Issue: 1 | PageNo: 238-239


Spam Detection using KNN
Spam Detection using KNN
Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
Volume: 2 | Issue: 1 | PageNo: 290-293


A New Approach for Feature Subset Selection Based on Hadoop
A New Approach for Feature Subset Selection Based on Hadoop
Authors: Ramya P V, Shashikala B
Volume: 2 | Issue: 1 | PageNo: 244-251


Reducing False Positive In Intrusion Detection using Genetic Algorithm
Reducing False Positive In Intrusion Detection using Genetic Algorithm
Authors: Dipika Narsingyani, Ompriya Kale
Volume: 2 | Issue: 1 | PageNo: 104-107


A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Senso
Authors: Manpreet kaur, Surender Singh
Volume: 2 | Issue: 1 | PageNo: 113-119


Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Networ
Authors: Chirag Parmar, Prof. Chaita Jani
Volume: 2 | Issue: 1 | PageNo: 127-132


Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Authors: Viral Jethva, Risha A. Tiwari
Volume: 2 | Issue: 1 | PageNo: 142-147


A Survey on Dynamic Load Balancing with Min Scaling
A Survey on Dynamic Load Balancing with Min Scaling
Authors: shweta gupta, Ms. Jasmin Jha
Volume: 2 | Issue: 1 | PageNo: 190-194


Association Rules and their Optimization using Genetic Algorithm
Association Rules and their Optimization using Genetic Algorithm
Authors: Arvind Jaiswal
Volume: 2 | Issue: 1 | PageNo: 316-322


Tracking Moving Targets in Wireless Sensor Network
Tracking Moving Targets in Wireless Sensor Network
Authors: M.Sridhar , G.Naresh
Volume: 2 | Issue: 2 | PageNo: 86-89


A Heuristic Approach To Record Deduplication
A Heuristic Approach To Record Deduplication
Authors: Lata.S.Math, Smt.Shashikala.B
Volume: 2 | Issue: 2 | PageNo: 148-154


Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Authors: M.VANITHA, Dr.P.MARIKKANNU
Volume: 2 | Issue: 2 | PageNo: 159-163


Data Security in Cloud Storage using RBAC
Data Security in Cloud Storage using RBAC
Authors: Mr. Harshal Ashokrao Karande
Volume: 2 | Issue: 2 | PageNo: 195-201


A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script
A Survey of Problems of Overlapped Handwritten Characters in Recognition process
Authors: arwinder kaur, ashok kumar bathla
Volume: 2 | Issue: 2 | PageNo: 220-224


REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
Volume: 2 | Issue: 2 | PageNo: 137-143


QoS and Energy Aware Geographic Routing Protocol for WSN
QoS and Energy Aware Geographic Routing Protocol for WSN
Authors: K.Sindhuja, P. Punnam Chander Reddy
Volume: 2 | Issue: 2 | PageNo: 260-264


An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
Authors: Dnyaneshwar Kudande
Volume: 2 | Issue: 3 | PageNo: 88-95


An Ensemble of Classifiers using Weighted Instance Selection
An Ensemble of Classifiers using Weighted Instance Selection
Authors: Santosh N. Nagargoje, Prasad Kulkarni
Volume: 2 | Issue: 3 | PageNo: 96-102


Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Authors: Suraj Baviskar, Nitin Namdev
Volume: 2 | Issue: 3 | PageNo: 130-135


Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Alg
Authors: Dr. M. Balamurugan, P. Mathiazhagan
Volume: 2 | Issue: 3 | PageNo: 171-176


object tracking using image processing
object tracking using image processing
Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
Volume: 2 | Issue: 4 | PageNo: 67-72


Remote method Invocation and Remote Procedure Call
Remote method Invocation and Remote Procedure Call
Authors: Kunwar Deep Singh Toor
Volume: 2 | Issue: 4 | PageNo: 77-81


Applying cryptography to cancellable signatures
Applying cryptography to cancellable signatures
Authors: Shiwani Gupta
Volume: 2 | Issue: 4 | PageNo: 135-140


AFFECTIVE COMPUTING
AFFECTIVE COMPUTING
Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
Volume: 2 | Issue: 4 | PageNo: 141-145


Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Authors: Dr. M. Balamurugan, A. Nancy
Volume: 2 | Issue: 4 | PageNo: 164-166


SMART CARD SECURITY
SMART CARD SECURITY
Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
Volume: 2 | Issue: 4 | PageNo: 160-163


Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil
Authors: B.P.SREEJA, G.SARATHA DEVI
Volume: 2 | Issue: 4 | PageNo: 106-110


Performance Tuning in Teradata
Performance Tuning in Teradata
Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
Volume: 2 | Issue: 5 | PageNo: 46-51


Google Chrome Operatin System
Google Chrome Operatin System
Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
Volume: 2 | Issue: 5 | PageNo: 75-77


Audio Controlled Quadcoipter with Stereo Camera
Audio Controlled Quadcoipter with Stereo Camera
Authors: Amlan Prakash
Volume: 2 | Issue: 5 | PageNo: 126-128


computer networking
computer networking
Authors: SONIA RANA
Volume: 2 | Issue: 5 | PageNo: 69-71


Exception Handling
Exception Handling
Authors: Gourav Agghi
Volume: 2 | Issue: 5 | PageNo: 134-135


classes and object
classes and object
Authors: Manmohan
Volume: 2 | Issue: 6 | PageNo: 20-22


pointer analysis for c programing
pointer analysis for c programing
Authors: Mohit bansal
Volume: 2 | Issue: 6 | PageNo: 78-81


Array review
Array review
Authors: Monika Yadav
Volume: 2 | Issue: 6 | PageNo: 312-313


Java applet
Java applet
Authors: Jalaj sharma
Volume: 2 | Issue: 6 | PageNo: 353-354


SQL Injection Detection & Defeating Tools
SQL Injection Detection & Defeating Tools
Authors: kartik rai
Volume: 2 | Issue: 6 | PageNo: 90-93


THE C PROGRAMMING LANGUAGE
THE C PROGRAMMING LANGUAGE
Authors: Alia Anis
Volume: 2 | Issue: 6 | PageNo: 107-108


PROGRAMMING LANGUAGE C++
PROGRAMMING LANGUAGE C++
Authors: Happy Gogoi
Volume: 2 | Issue: 6 | PageNo: 166-167


Human Computer Interaction
Human Computer Interaction
Authors: Navneet Yadav
Volume: 2 | Issue: 6 | PageNo: 99-102


fundamentals of C programming language
fundamentals of C programming language
Authors: Ritika nain
Volume: 2 | Issue: 6 | PageNo: 175-176


Data file handling in c++
Data file handling in c++
Authors: Kripashanker yadav
Volume: 2 | Issue: 6 | PageNo: 326-329


Best programming language for a Beginner
Best programming language for a Beginner
Authors: Deepakshi Singh
Volume: 2 | Issue: 6 | PageNo: 172-174


C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
Authors: Manish
Volume: 2 | Issue: 6 | PageNo: 115-119


Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Authors: shweta gupta, Ms.Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 204-208


software Testing
software Testing
Authors: Chaynika Kapoor
Volume: 2 | Issue: 6 | PageNo: 286-289


The c preprocessor
The c preprocessor
Authors: Mayank yadav
Volume: 2 | Issue: 6 | PageNo: 120-122


Switch and classes in c
Switch and classes in c
Authors: Nishant
Volume: 2 | Issue: 6 | PageNo: 138-139


pointers
pointers
Authors: Rahul Deshwal
Volume: 2 | Issue: 6 | PageNo: 140-142


5G Wireless Technology
5G Wireless Technology
Authors: Sunil rai
Volume: 2 | Issue: 6 | PageNo: 236-242


statements in c
statements in c
Authors: kashika grover
Volume: 2 | Issue: 6 | PageNo: 308-309


Stack and queue
Stack and queue
Authors: Pankaj gaur
Volume: 2 | Issue: 6 | PageNo: 322-325


ASP.NET AND ITS FRAMEWORK
ASP.NET AND ITS FRAMEWORK
Authors: KOMAL CHAUHAN
Volume: 2 | Issue: 6 | PageNo: 261-264


Web Service Discovery using Relational Database and Apache Lucene
Web Service Discovery using Relational Database and Apache Lucene
Authors: Bhavin Solanki, Jasmin Jha
Volume: 2 | Issue: 6 | PageNo: 23-30


File Management in C
File Management in C
Authors: Ria Arora
Volume: 2 | Issue: 6 | PageNo: 294-296


FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING
Authors: Rahul Y. Modi, Indr Jeet Rajput
Volume: 2 | Issue: 6 | PageNo: 37-42


Thread (computing)
Thread (computing)
Authors: Gajendra singh
Volume: 2 | Issue: 6 | PageNo: 402-403


ASP.net
ASP.net
Authors: Sanjana Singh
Volume: 2 | Issue: 6 | PageNo: 251-253


PHP - A Review
PHP - A Review
Authors: Ipsita Vashista
Volume: 2 | Issue: 6 | PageNo: 400-401


arrays in C
arrays in C
Authors: Priya Yadav
Volume: 2 | Issue: 6 | PageNo: 339-339


Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Authors: Dhruvil K Patel
Volume: 2 | Issue: 6 | PageNo: 48-52


Threats in Java Applet
Threats in Java Applet
Authors: Ankit Bhatt
Volume: 2 | Issue: 6 | PageNo: 364-365


bubble sort
bubble sort
Authors: priyanka kunjwal
Volume: 2 | Issue: 6 | PageNo: 265-267


Memory Management in C
Memory Management in C
Authors: Puneet Saini, Ria Arora
Volume: 2 | Issue: 6 | PageNo: 257-258


Spring MVC Framework
Spring MVC Framework
Authors: Simran Bhatti
Volume: 2 | Issue: 6 | PageNo: 290-293


java security
java security
Authors: Ritu Yadav
Volume: 2 | Issue: 6 | PageNo: 254-256


SOFTWARE TESTING
SOFTWARE TESTING
Authors: AARTI SINGH
Volume: 2 | Issue: 6 | PageNo: 268-274


.NET FRAMEWORK
.NET FRAMEWORK
Authors: Karuna Hazrati
Volume: 2 | Issue: 7 | PageNo: 0-0


Java multithreading system
Java multithreading system
Authors: kritika chadha
Volume: 2 | Issue: 6 | PageNo: 375-381


Research Paper on C Language
Research Paper on C Language
Authors: kawalpreet Singh
Volume: 2 | Issue: 6 | PageNo: 310-311


PHP Web Application Frameworks based upon Design Patterns
PHP Web Application Frameworks based upon Design Patterns
Authors: Aakash goyal
Volume: 2 | Issue: 6 | PageNo: 391-394


SOFTWARE & MANUAL TESTING
SOFTWARE & MANUAL TESTING
Authors: Abhishek Jain
Volume: 2 | Issue: 6 | PageNo: 382-385


Digital Diary
Digital Diary
Authors: Manjeet Saini
Volume: 2 | Issue: 6 | PageNo: 386-390


Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
Volume: 2 | Issue: 6 | PageNo: 182-186


A Survey work on ETC System for an Efficient Image Encryption and Compression
A Survey work on ETC System for an Efficient Image Encryption and Compression
Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 209-212


Survey paper on CAPTCHA AND VRP
Survey paper on CAPTCHA AND VRP
Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
Volume: 2 | Issue: 6 | PageNo: 317-321


A Study on Data Mining with Big Data
A Study on Data Mining with Big Data
Authors: B.Zakia Bano , Dr.K.Pavan Kumar
Volume: 2 | Issue: 6 | PageNo: 187-192


AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
Volume: 2 | Issue: 6 | PageNo: 193-198


A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Cen
Authors: Neha Jain, K. K. Joshi
Volume: 2 | Issue: 6 | PageNo: 431-435


Overview on Android and its Versions
Overview on Android and its Versions
Authors: Sahil Munjal
Volume: 2 | Issue: 6 | PageNo: 415-418


Peer to Peer Computing
Peer to Peer Computing
Authors: RAJAT WASON
Volume: 2 | Issue: 6 | PageNo: 408-412


Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Authors: SMRUTI PHADKE, K.K. Joshi
Volume: 2 | Issue: 7 | PageNo: 160-167


POINTER ANALYSIS FOR C PROGRAM
POINTER ANALYSIS FOR C PROGRAM
Authors: PRIYANK GUPTA
Volume: 2 | Issue: 7 | PageNo: 177-179


Survey on the Security Aspects of Mobile Operating Systems
Survey on the Security Aspects of Mobile Operating Systems
Authors: Amod N. Narvekar, Prof. K. K. Joshi
Volume: 2 | Issue: 7 | PageNo: 197-203


execution project in java
execution project in java
Authors: jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 168-169


Android and GPS tracking
Android and GPS tracking
Authors: aakash soni
Volume: 2 | Issue: 7 | PageNo: 100-105


Business Suite Software Modules in SAP
Business Suite Software Modules in SAP
Authors: Karan Bhalla
Volume: 2 | Issue: 7 | PageNo: 180-184


Safe arrays and pointers in c
Safe arrays and pointers in c
Authors: Rahul kumar
Volume: 2 | Issue: 7 | PageNo: 204-206


Review of C/C++
Review of C/C++
Authors: rahul rai gupta
Volume: 2 | Issue: 7 | PageNo: 158-159


REVIEW OF C++
REVIEW OF C++
Authors: sachin kumar benwal
Volume: 2 | Issue: 7 | PageNo: 170-171


Review of TETRA Radio System
Review of TETRA Radio System
Authors: pragy kaushik
Volume: 2 | Issue: 7 | PageNo: 172-172


Network Security: Attacks And Tips
Network Security: Attacks And Tips
Authors: Himanshu Saini
Volume: 2 | Issue: 7 | PageNo: 173-176


data mining
data mining
Authors: samiksha yadav
Volume: 2 | Issue: 7 | PageNo: 250-252


Basic Fundamentals of Programming
Basic Fundamentals of Programming
Authors: Sahil Jindal
Volume: 2 | Issue: 7 | PageNo: 306-308


The andriod- mobile operating system with its mobile based applications
The andriod- mobile operating system with its mobile based applications
Authors: Jyoti yadav, Jyoti yadav
Volume: 2 | Issue: 7 | PageNo: 775-779


loops in C
loops in C
Authors: Pratibha Sharma
Volume: 2 | Issue: 7 | PageNo: 598-599


Review paper on summer training
Review paper on summer training
Authors: pooja nayak
Volume: 2 | Issue: 7 | PageNo: 351-352


A Diverse Methodology For Monitoring And Controlling Application in Active Database Management Systems
A Diverse Methodology For Monitoring And Controlling Application in Active Datab
Authors: Thodeti Srikanth
Volume: 2 | Issue: 6 | PageNo: 453-457


JDBC
JDBC
Authors: Upender yadav
Volume: 2 | Issue: 7 | PageNo: 780-781


DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and image Encryption
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and
Authors: Mr Ashish Singh., Ajay Gupta
Volume: 2 | Issue: 7 | PageNo: 529-533


Online Comment Analysis for Recommendation
Online Comment Analysis for Recommendation
Authors: Tushar Mehmi
Volume: 2 | Issue: 7 | PageNo: 636-640


discretizaiton
discretizaiton
Authors: rahul yadav
Volume: 2 | Issue: 7 | PageNo: 641-645


Probability PSO Search Feature Selection for Data Stream Mining for current market trend
Probability PSO Search Feature Selection for Data Stream Mining for current mark
Authors: snehal rode, Ram joshi
Volume: 2 | Issue: 7 | PageNo: 717-720


A Survey On Various Approaches For Webpage Recommendation System In Web Mining
A Survey On Various Approaches For Webpage Recommendation System In Web Mining
Authors: Darshan K Prajapati, Dr. Shyamal Tanna
Volume: 2 | Issue: 7 | PageNo: 498-502


SECURING THE NETWORK IN CLOUD ENVIRONMENT
SECURING THE NETWORK IN CLOUD ENVIRONMENT
Authors: P.Sakthi Priyanka, C.Radha
Volume: 2 | Issue: 7 | PageNo: 654-660


A Survey Paper on Variants of R-tree Data Structure
A Survey Paper on Variants of R-tree Data Structure
Authors: Bhoomika Panchal, Vinit Kumar Gupta
Volume: 2 | Issue: 7 | PageNo: 543-547


A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence
A Survey on Software Fault Prediction Technique based on Clustering Algorithm an
Authors: Margi Patel
Volume: 2 | Issue: 7 | PageNo: 623-627


Performance analysis of on demand multipath routing scheme in wireless environment
Performance analysis of on demand multipath routing scheme in wireless environme
Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
Volume: 2 | Issue: 7 | PageNo: 787-791


Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and
Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
Volume: 2 | Issue: 7 | PageNo: 796-802


Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encryp
Authors: Rucha Anil Shinde, Hema V. Kumbhar
Volume: 2 | Issue: 7 | PageNo: 808-810


Scalable architecture for multi-user encrypted SQL operations on cloud database services
Scalable architecture for multi-user encrypted SQL operations on cloud database
Authors: A.SHEELAVATHI, K. Preethi
Volume: 2 | Issue: 8 | PageNo: 20-25


Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Authors: Farinaparveen Khan , R K Krishna
Volume: 2 | Issue: 8 | PageNo: 72-77


FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDEN
Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
Volume: 2 | Issue: 8 | PageNo: 32-39


FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
Authors: Dr.M. Balamurugan, R. Prasanka
Volume: 1 | Issue: 8 | PageNo: 129-133


Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access
Password Guessing Resistant Protocol for Securing System from Bots and Illegal A
Authors: Ms. Arya Kumar, Prof. A.K.Gupta
Volume: 2 | Issue: 8 | PageNo: 91-94


Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Authors: Sahil Meshram, Ujwala H. Wanaskar
Volume: 2 | Issue: 9 | PageNo: 18-21


Packet Loss Control Using Tokens
Packet Loss Control Using Tokens
Authors: Rajeswari.Villa, A. SatyaMallesh
Volume: 2 | Issue: 9 | PageNo: 15-17


Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique
Classification and Allocation of Project Proposals to Reviewers Using Ontology B
Authors: Ratish Srivastava, Prof. P.K. Deshmukh
Volume: 2 | Issue: 9 | PageNo: 57-61


Analysis of Data Mining Techniques for HealthCare Data Classification
Analysis of Data Mining Techniques for HealthCare Data Classification
Authors: Dr. M. Balamurugan, S. Vijaykumar
Volume: 1 | Issue: 9 | PageNo: 125-128


Cryptography with High Throughput : A survey
Cryptography with High Throughput : A survey
Authors: Bhoomika Modi, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 1-7


Format Preserving Encryption: A Survey
Format Preserving Encryption: A Survey
Authors: ZALAK BHATT, Vinitkumar Gupta
Volume: 2 | Issue: 10 | PageNo: 8-17


High Capacity Steganography with Improved Transformation and Security Technique:A survey
High Capacity Steganography with Improved Transformation and Security Technique:
Authors: Bhumin Mandaliya, Vinit Gupta
Volume: 0 | Issue: no | PageNo: 0-0


Stochastic optimization for Conserving Energy in Smart Phone Applications - A Survey
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Su
Authors: M.Ramu, Indurani
Volume: 2 | Issue: 10 | PageNo: 29-34


DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
Volume: 2 | Issue: 10 | PageNo: 172-177


BUS TACKING SYSTEM USING RFID
BUS TACKING SYSTEM USING RFID
Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
Volume: 2 | Issue: 10 | PageNo: 137-141


Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods
Comparative Study between Equivalence Class Partitioning and Boundary Value Anal
Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
Volume: 2 | Issue: 10 | PageNo: 74-78


Comparative study on Motion Estimation in video sequence
Comparative study on Motion Estimation in video sequence
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 10 | PageNo: 79-83


Cloud Computing Architecture, Security issues: A Review
Cloud Computing Architecture, Security issues: A Review
Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
Volume: 2 | Issue: 10 | PageNo: 154-158


SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
Authors: Anjli J Patel, Ms.Jayna B.Shah
Volume: 0 | Issue: no | PageNo: 0-0


Survey on privacy preserving association rule hiding in data mining
Survey on privacy preserving association rule hiding in data mining
Authors: jinal patel, Gurcharan sahani
Volume: 2 | Issue: 10 | PageNo: 111-118


A Comparative Study of Web Page Ranking Algorithms
A Comparative Study of Web Page Ranking Algorithms
Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
Volume: 2 | Issue: 10 | PageNo: 178-184


Fuzzy Page Ranking Scheme in IR System
Fuzzy Page Ranking Scheme in IR System
Authors: Shikha Gupta
Volume: 2 | Issue: 10 | PageNo: 185-187


A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 2 | Issue: 10 | PageNo: 128-131


Big Data Analysis by Classification Algorithm Using Flight Data Set
Big Data Analysis by Classification Algorithm Using Flight Data Set
Authors: Ujjwala Urkude
Volume: 2 | Issue: 10 | PageNo: 188-189


Survey on Privacy Preservation for Inference Control on OLAP
Survey on Privacy Preservation for Inference Control on OLAP
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 11 | PageNo: 10-13


Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Authors: Gaurang Patel, Sanket Patel
Volume: 2 | Issue: 11 | PageNo: 1-4


A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COM
Authors: Umang Thakkar, Indrjeet Rajput
Volume: 2 | Issue: 11 | PageNo: 5-9


COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
Volume: 2 | Issue: 11 | PageNo: 78-81


Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Authors: Bhumika Parmar, Mr. Tejas Bhatt
Volume: 2 | Issue: 11 | PageNo: 21-25


DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Volume: 2 | Issue: 11 | PageNo: 26-33


Operative and Secured Privacy enhanced Location Based Services System
Operative and Secured Privacy enhanced Location Based Services System
Authors: M.Shakul Hameed, V.Indurani
Volume: 2 | Issue: 11 | PageNo: 34-41


SENTIMENT ANALYSIS: A REVIEW
SENTIMENT ANALYSIS: A REVIEW
Authors: NILU, TANUJA SHUKLA
Volume: 2 | Issue: 11 | PageNo: 90-94


A Review On Handwritten Character Recognition Techniques
A Review On Handwritten Character Recognition Techniques
Authors: Parul Singla, Sargam Munjal
Volume: 2 | Issue: 11 | PageNo: 373-376


A Review for Video Mosaicing Using Feature Tracking
A Review for Video Mosaicing Using Feature Tracking
Authors: Foram N. Patel, Neha Parmar
Volume: 2 | Issue: 11 | PageNo: 71-74


AppZoo
AppZoo
Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
Volume: 2 | Issue: 11 | PageNo: 200-203


MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
Volume: 2 | Issue: 11 | PageNo: 214-218


Optimization of Social Media Posts
Optimization of Social Media Posts
Authors: kanhaiya choudhary, astha singh, nitin Sharma
Volume: 2 | Issue: 11 | PageNo: 304-307


Tracking and Analyzing the Public Opinions by Interpretation Techniques
Tracking and Analyzing the Public Opinions by Interpretation Techniques
Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
Volume: 2 | Issue: 11 | PageNo: 316-318


CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
Volume: 2 | Issue: 11 | PageNo: 343-348


SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
Authors: Asia Mashkoor, Himani Gupta
Volume: 2 | Issue: 11 | PageNo: 391-398


IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
Volume: 2 | Issue: 11 | PageNo: 272-277


Real-Time Image Improvement Methods
Real-Time Image Improvement Methods
Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 428-430


SEARCHING LARGE DATA SETS IN GRID COMPUTING
SEARCHING LARGE DATA SETS IN GRID COMPUTING
Authors: Sudha K, Sangeetha C, Aruna R
Volume: 2 | Issue: 11 | PageNo: 411-416


Prediction of network security situation based on fuzzy neutral network
Prediction of network security situation based on fuzzy neutral network
Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
Volume: 2 | Issue: 11 | PageNo: 423-427


DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
Volume: 2 | Issue: 11 | PageNo: 417-422


SCALABLE DATA SHARING BY USING KEY AGGREGATION
SCALABLE DATA SHARING BY USING KEY AGGREGATION
Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
Volume: 2 | Issue: 12 | PageNo: 10-16


Security in Banking sector using cloud computing with TPA
Security in Banking sector using cloud computing with TPA
Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
Volume: 2 | Issue: 12 | PageNo: 6-9


A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Volume: 2 | Issue: 12 | PageNo: 307-310


ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
Volume: 2 | Issue: 12 | PageNo: 1-5


Person Identification Using Iris Recognition System Using Fastest Searching Algorithm
Person Identification Using Iris Recognition System Using Fastest Searching Algo
Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
Volume: 2 | Issue: 12 | PageNo: 238-242


Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework
Identification, Implementation and Validation of Authentication and Authorizatio
Authors: ketan kumar, kalpesh patel
Volume: 2 | Issue: 12 | PageNo: 65-68


PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
Volume: 2 | Issue: 12 | PageNo: 352-355


Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Int
Authors: Margi Patel, Upama Vachhani
Volume: 2 | Issue: 12 | PageNo: 69-77


Dynamic Resource Allocation Technique in Cloud
Dynamic Resource Allocation Technique in Cloud
Authors: Ishita Patel, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 84-88


A New Approach of Virtual Machine Allocation In Cloud
A New Approach of Virtual Machine Allocation In Cloud
Authors: Rikin Thakkar, anuradha desai
Volume: 2 | Issue: 12 | PageNo: 89-93


Privacy Preservation for Inference Control with Improved ND Algorithm
Privacy Preservation for Inference Control with Improved ND Algorithm
Authors: Maulik Joshi, Chetna Chand
Volume: 2 | Issue: 12 | PageNo: 99-103


An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Env
Authors: Pranali Gajjar, Brona Shah
Volume: 2 | Issue: 12 | PageNo: 113-120


Modified Key Based Image Encryption using RSA algorithm
Modified Key Based Image Encryption using RSA algorithm
Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
Volume: 2 | Issue: 12 | PageNo: 252-255


COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CAS
Authors: Anamika Madaan, Bharti Jha
Volume: 2 | Issue: 12 | PageNo: 402-406


Steganography Techniques:A Review
Steganography Techniques:A Review
Authors: TARIQ RASHID, SUNNY DAGAR
Volume: 2 | Issue: 12 | PageNo: 387-391


Fast Block matching motion estimation using fusion of Four Step & Diamond Step Search algorithm for video compression
Fast Block matching motion estimation using fusion of Four Step & Diamond Step S
Authors: Ankit Souparana, Ankur kumar Aggarwal
Volume: 2 | Issue: 12 | PageNo: 378-382


FOCUS : LEARNING TO CRAWL WEB FORUMS
FOCUS : LEARNING TO CRAWL WEB FORUMS
Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
Volume: 2 | Issue: 12 | PageNo: 448-452


Comparative analysis of Domain Specific Testing Techniques
Comparative analysis of Domain Specific Testing Techniques
Authors: Neha Kumawat, Yashika Sharma
Volume: 3 | Issue: 1 | PageNo: 1-4


Category Based Implementation of Web Crawler
Category Based Implementation of Web Crawler
Authors: Nandita , Sarika Rana
Volume: 3 | Issue: 1 | PageNo: 192-197


Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
Volume: 3 | Issue: 1 | PageNo: 269-272


Data Mining tools and techniques in Medical Science
Data Mining tools and techniques in Medical Science
Authors: Anu Bura, DR. Prakash Kumar Pathak
Volume: 3 | Issue: 1 | PageNo: 149-158


Analyzing Twitter data for Multiple languages by applying machine learning Techniques
Analyzing Twitter data for Multiple languages by applying machine learning Techn
Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
Volume: 3 | Issue: 1 | PageNo: 43-48


Advanced Music Player With Integrated Face Recognition Mechanism
Advanced Music Player With Integrated Face Recognition Mechanism
Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
Volume: 3 | Issue: 1 | PageNo: 8-11


A Mobile Application for Bus Tracking System
A Mobile Application for Bus Tracking System
Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
Volume: 3 | Issue: 1 | PageNo: 17-20


Deep Web Data Extraction by Using Vision Approach for Multi-Region
Deep Web Data Extraction by Using Vision Approach for Multi-Region
Authors: Shweta Dhall, Parikshit Singla
Volume: 3 | Issue: 1 | PageNo: 104-109


Review of JSON Data Interchange Format
Review of JSON Data Interchange Format
Authors: Garima Dutt, Anup Singh Kushwaha
Volume: 3 | Issue: 1 | PageNo: 309-313


A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews
A Review on Opinion Word and Opinion Target Extraction and Classification of Rev
Authors: Sangram Ashok Patil, Prof. K. B. Manwade
Volume: 3 | Issue: 1 | PageNo: 110-113


Routing Protocol in Wireless Sensor Networks – Survey
Routing Protocol in Wireless Sensor Networks – Survey
Authors: Priya P, Kuppusamy N K
Volume: 3 | Issue: 1 | PageNo: 159-163


video mosaicing
video mosaicing
Authors: Foram N Patel, Neha Parmar
Volume: 3 | Issue: 1 | PageNo: 242-248


Unsupervised Stemmer for Kannada Language
Unsupervised Stemmer for Kannada Language
Authors: Mounika S, B H Manjunath Kumar
Volume: 3 | Issue: 1 | PageNo: 146-148


EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Volume: 3 | Issue: 1 | PageNo: 377-382


Security Issues and Challenges in Cloud Computing
Security Issues and Challenges in Cloud Computing
Authors: Arvind Jaiswal
Volume: 3 | Issue: 1 | PageNo: 383-387


Review Paper for Query Optimization for Declarative Crowdsourcing System
Review Paper for Query Optimization for Declarative Crowdsourcing System
Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
Volume: 3 | Issue: 2 | PageNo: 32-36


Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Authors: Khushboo Arora, Mamta Arora
Volume: 3 | Issue: 2 | PageNo: 65-69


Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sens
Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
Volume: 3 | Issue: 2 | PageNo: 46-52


Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Network
Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
Volume: 3 | Issue: 2 | PageNo: 20-25


schema agnostic indexing with live indexes
schema agnostic indexing with live indexes
Authors: monica bansal
Volume: 3 | Issue: 2 | PageNo: 26-31


Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews