Search Your Paper
IJIRT Search Xplore - Search by Paper id, Published paper id, Paper Name, Author Name and Paper Title
Search Your Paper Details.
All Published Paper Digital Library. Search Through below Search Option.
Search All Published Paper Details easy to find any paper. Please use Ctrl+F if the search is not working in your browser.
You are browsing Research Papers of Computer
Comparative Analysis of Speech Recognition Based on Artificial Neural Network Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Authors: Abhinav Bhatnagar, Sapna Sinha
Year: | Volume: 2 | Issue: 1 | PageNo: 35-39
Use of Hadoop Big Data: A Review Use of Hadoop Big Data: A Review
Authors: Mohd Hashim
Year: | Volume: 2 | Issue: 1 | PageNo: 44-47
Community Detection in social networks Community Detection in social networks
Authors: Pradeep kumar
Year: | Volume: 2 | Issue: 1 | PageNo: 48-52
Software Testing Technique Using Genetic Algorithm Software Testing Technique Using Genetic Algorithm
Authors: Pramod Garg, Dr. Deepak Kumar
Year: | Volume: 2 | Issue: 1 | PageNo: 71-77
Use of game theory in executive support system Use of game theory in executive support system
Authors: Ashish Sharma, Sarika Jain
Year: | Volume: 2 | Issue: 1 | PageNo: 66-70
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY SENSED IMAGE A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY
Authors: Dr. S. Rajesh, Mithuna.J
Year: | Volume: 2 | Issue: 1 | PageNo: 120-126
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FAC
Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
Year: | Volume: 2 | Issue: 1 | PageNo: 219-224
Three Aspects of Web Mining Three Aspects of Web Mining
Authors: AR.Sivakumaran, Dr.P.Marikkannu
Year: | Volume: 2 | Issue: 1 | PageNo: 276-279
Survey on Worm Spreading and Worm Detection Survey on Worm Spreading and Worm Detection
Authors: Aiswarya Francie Challat, Binny Chelziah M
Year: | Volume: 2 | Issue: 1 | PageNo: 238-239
Spam Detection using KNN Spam Detection using KNN
Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
Year: | Volume: 2 | Issue: 1 | PageNo: 290-293
A New Approach for Feature Subset Selection Based on Hadoop A New Approach for Feature Subset Selection Based on Hadoop
Authors: Ramya P V, Shashikala B
Year: | Volume: 2 | Issue: 1 | PageNo: 244-251
Reducing False Positive In Intrusion Detection using Genetic Algorithm Reducing False Positive In Intrusion Detection using Genetic Algorithm
Authors: Dipika Narsingyani, Ompriya Kale
Year: | Volume: 2 | Issue: 1 | PageNo: 104-107
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Senso
Authors: Manpreet kaur, Surender Singh
Year: | Volume: 2 | Issue: 1 | PageNo: 113-119
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Networ
Authors: Chirag Parmar, Prof. Chaita Jani
Year: | Volume: 2 | Issue: 1 | PageNo: 127-132
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Authors: Viral Jethva, Risha A. Tiwari
Year: | Volume: 2 | Issue: 1 | PageNo: 142-147
A Survey on Dynamic Load Balancing with Min Scaling A Survey on Dynamic Load Balancing with Min Scaling
Authors: shweta gupta, Ms. Jasmin Jha
Year: | Volume: 2 | Issue: 1 | PageNo: 190-194
Association Rules and their Optimization using Genetic Algorithm Association Rules and their Optimization using Genetic Algorithm
Authors: Arvind Jaiswal
Year: | Volume: 2 | Issue: 1 | PageNo: 316-322
Tracking Moving Targets in Wireless Sensor Network Tracking Moving Targets in Wireless Sensor Network
Authors: M.Sridhar , G.Naresh
Year: | Volume: 2 | Issue: 2 | PageNo: 86-89
A Heuristic Approach To Record Deduplication A Heuristic Approach To Record Deduplication
Authors: Lata.S.Math, Smt.Shashikala.B
Year: | Volume: 2 | Issue: 2 | PageNo: 148-154
Load Balancing Algorithms in Cloud Computing Environment : An Introspection Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Authors: M.VANITHA, Dr.P.MARIKKANNU
Year: | Volume: 2 | Issue: 2 | PageNo: 159-163
Data Security in Cloud Storage using RBAC Data Security in Cloud Storage using RBAC
Authors: Mr. Harshal Ashokrao Karande
Year: | Volume: 2 | Issue: 2 | PageNo: 195-201
A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script A Survey of Problems of Overlapped Handwritten Characters in Recognition process
Authors: arwinder kaur, ashok kumar bathla
Year: | Volume: 2 | Issue: 2 | PageNo: 220-224
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
Year: | Volume: 2 | Issue: 2 | PageNo: 137-143
QoS and Energy Aware Geographic Routing Protocol for WSN QoS and Energy Aware Geographic Routing Protocol for WSN
Authors: K.Sindhuja, P. Punnam Chander Reddy
Year: | Volume: 2 | Issue: 2 | PageNo: 260-264
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
Authors: Dnyaneshwar Kudande
Year: | Volume: 2 | Issue: 3 | PageNo: 88-95
An Ensemble of Classifiers using Weighted Instance Selection An Ensemble of Classifiers using Weighted Instance Selection
Authors: Santosh N. Nagargoje, Prasad Kulkarni
Year: | Volume: 2 | Issue: 3 | PageNo: 96-102
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Authors: Suraj Baviskar, Nitin Namdev
Year: | Volume: 2 | Issue: 3 | PageNo: 130-135
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Alg
Authors: Dr. M. Balamurugan, P. Mathiazhagan
Year: | Volume: 2 | Issue: 3 | PageNo: 171-176
object tracking using image processing object tracking using image processing
Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
Year: | Volume: 2 | Issue: 4 | PageNo: 67-72
Remote method Invocation and Remote Procedure Call Remote method Invocation and Remote Procedure Call
Authors: Kunwar Deep Singh Toor
Year: | Volume: 2 | Issue: 4 | PageNo: 77-81
Applying cryptography to cancellable signatures Applying cryptography to cancellable signatures
Authors: Shiwani Gupta
Year: | Volume: 2 | Issue: 4 | PageNo: 135-140
AFFECTIVE COMPUTING AFFECTIVE COMPUTING
Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
Year: | Volume: 2 | Issue: 4 | PageNo: 141-145
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Authors: Dr. M. Balamurugan, A. Nancy
Year: | Volume: 2 | Issue: 4 | PageNo: 164-166
SMART CARD SECURITY SMART CARD SECURITY
Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
Year: | Volume: 2 | Issue: 4 | PageNo: 160-163
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil
Authors: B.P.SREEJA, G.SARATHA DEVI
Year: | Volume: 2 | Issue: 4 | PageNo: 106-110
Performance Tuning in Teradata Performance Tuning in Teradata
Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
Year: | Volume: 2 | Issue: 5 | PageNo: 46-51
Google Chrome Operatin System Google Chrome Operatin System
Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
Year: | Volume: 2 | Issue: 5 | PageNo: 75-77
Audio Controlled Quadcoipter with Stereo Camera Audio Controlled Quadcoipter with Stereo Camera
Authors: Amlan Prakash
Year: | Volume: 2 | Issue: 5 | PageNo: 126-128
computer networking computer networking
Authors: SONIA RANA
Year: | Volume: 2 | Issue: 5 | PageNo: 69-71
Exception Handling Exception Handling
Authors: Gourav Agghi
Year: | Volume: 2 | Issue: 5 | PageNo: 134-135
classes and object classes and object
Authors: Manmohan
Year: | Volume: 2 | Issue: 6 | PageNo: 20-22
pointer analysis for c programing pointer analysis for c programing
Authors: Mohit bansal
Year: | Volume: 2 | Issue: 6 | PageNo: 78-81
Array review Array review
Authors: Monika Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 312-313
Java applet Java applet
Authors: Jalaj sharma
Year: | Volume: 2 | Issue: 6 | PageNo: 353-354
SQL Injection Detection & Defeating Tools SQL Injection Detection & Defeating Tools
Authors: kartik rai
Year: | Volume: 2 | Issue: 6 | PageNo: 90-93
THE C PROGRAMMING LANGUAGE THE C PROGRAMMING LANGUAGE
Authors: Alia Anis
Year: | Volume: 2 | Issue: 6 | PageNo: 107-108
PROGRAMMING LANGUAGE C++ PROGRAMMING LANGUAGE C++
Authors: Happy Gogoi
Year: | Volume: 2 | Issue: 6 | PageNo: 166-167
Human Computer Interaction Human Computer Interaction
Authors: Navneet Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 99-102
fundamentals of C programming language fundamentals of C programming language
Authors: Ritika nain
Year: | Volume: 2 | Issue: 6 | PageNo: 175-176
Data file handling in c++ Data file handling in c++
Authors: Kripashanker yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 326-329
Best programming language for a Beginner Best programming language for a Beginner
Authors: Deepakshi Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 172-174
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
Authors: Manish
Year: | Volume: 2 | Issue: 6 | PageNo: 115-119
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Authors: shweta gupta, Ms.Jasmin Jha
Year: | Volume: 2 | Issue: 6 | PageNo: 204-208
software Testing software Testing
Authors: Chaynika Kapoor
Year: | Volume: 2 | Issue: 6 | PageNo: 286-289
The c preprocessor The c preprocessor
Authors: Mayank yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 120-122
Switch and classes in c Switch and classes in c
Authors: Nishant
Year: | Volume: 2 | Issue: 6 | PageNo: 138-139
pointers pointers
Authors: Rahul Deshwal
Year: | Volume: 2 | Issue: 6 | PageNo: 140-142
5G Wireless Technology 5G Wireless Technology
Authors: Sunil rai
Year: | Volume: 2 | Issue: 6 | PageNo: 236-242
statements in c statements in c
Authors: kashika grover
Year: | Volume: 2 | Issue: 6 | PageNo: 308-309
Stack and queue Stack and queue
Authors: Pankaj gaur
Year: | Volume: 2 | Issue: 6 | PageNo: 322-325
ASP.NET AND ITS FRAMEWORK ASP.NET AND ITS FRAMEWORK
Authors: KOMAL CHAUHAN
Year: | Volume: 2 | Issue: 6 | PageNo: 261-264
Web Service Discovery using Relational Database and Apache Lucene Web Service Discovery using Relational Database and Apache Lucene
Authors: Bhavin Solanki, Jasmin Jha
Year: | Volume: 2 | Issue: 6 | PageNo: 23-30
File Management in C File Management in C
Authors: Ria Arora
Year: | Volume: 2 | Issue: 6 | PageNo: 294-296
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING
Authors: Rahul Y. Modi, Indr Jeet Rajput
Year: | Volume: 2 | Issue: 6 | PageNo: 37-42
Thread (computing) Thread (computing)
Authors: Gajendra singh
Year: | Volume: 2 | Issue: 6 | PageNo: 402-403
ASP.net ASP.net
Authors: Sanjana Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 251-253
PHP - A Review PHP - A Review
Authors: Ipsita Vashista
Year: | Volume: 2 | Issue: 6 | PageNo: 400-401
arrays in C arrays in C
Authors: Priya Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 339-339
Cross Layer Design of Intrusion Detection in Wireless Mesh Network Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Authors: Dhruvil K Patel
Year: | Volume: 2 | Issue: 6 | PageNo: 48-52
Threats in Java Applet Threats in Java Applet
Authors: Ankit Bhatt
Year: | Volume: 2 | Issue: 6 | PageNo: 364-365
bubble sort bubble sort
Authors: priyanka kunjwal
Year: | Volume: 2 | Issue: 6 | PageNo: 265-267
Memory Management in C Memory Management in C
Authors: Puneet Saini, Ria Arora
Year: | Volume: 2 | Issue: 6 | PageNo: 257-258
Spring MVC Framework Spring MVC Framework
Authors: Simran Bhatti
Year: | Volume: 2 | Issue: 6 | PageNo: 290-293
java security java security
Authors: Ritu Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 254-256
SOFTWARE TESTING SOFTWARE TESTING
Authors: AARTI SINGH
Year: | Volume: 2 | Issue: 6 | PageNo: 268-274
.NET FRAMEWORK .NET FRAMEWORK
Authors: Karuna Hazrati
Year: | Volume: 2 | Issue: 7 | PageNo: 0-0
Java multithreading system Java multithreading system
Authors: kritika chadha
Year: | Volume: 2 | Issue: 6 | PageNo: 375-381
Research Paper on C Language Research Paper on C Language
Authors: kawalpreet Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 310-311
PHP Web Application Frameworks based upon Design Patterns PHP Web Application Frameworks based upon Design Patterns
Authors: Aakash goyal
Year: | Volume: 2 | Issue: 6 | PageNo: 391-394
SOFTWARE & MANUAL TESTING SOFTWARE & MANUAL TESTING
Authors: Abhishek Jain
Year: | Volume: 2 | Issue: 6 | PageNo: 382-385
Digital Diary Digital Diary
Authors: Manjeet Saini
Year: | Volume: 2 | Issue: 6 | PageNo: 386-390
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
Year: | Volume: 2 | Issue: 6 | PageNo: 182-186
A Survey work on ETC System for an Efficient Image Encryption and Compression A Survey work on ETC System for an Efficient Image Encryption and Compression
Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
Year: | Volume: 2 | Issue: 6 | PageNo: 209-212
Survey paper on CAPTCHA AND VRP Survey paper on CAPTCHA AND VRP
Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
Year: | Volume: 2 | Issue: 6 | PageNo: 317-321
A Study on Data Mining with Big Data A Study on Data Mining with Big Data
Authors: B.Zakia Bano , Dr.K.Pavan Kumar
Year: | Volume: 2 | Issue: 6 | PageNo: 187-192
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
Year: | Volume: 2 | Issue: 6 | PageNo: 193-198
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Cen
Authors: Neha Jain, K. K. Joshi
Year: | Volume: 2 | Issue: 6 | PageNo: 431-435
Overview on Android and its Versions Overview on Android and its Versions
Authors: Sahil Munjal
Year: | Volume: 2 | Issue: 6 | PageNo: 415-418
Peer to Peer Computing Peer to Peer Computing
Authors: RAJAT WASON
Year: | Volume: 2 | Issue: 6 | PageNo: 408-412
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Authors: SMRUTI PHADKE, K.K. Joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 160-167
POINTER ANALYSIS FOR C PROGRAM POINTER ANALYSIS FOR C PROGRAM
Authors: PRIYANK GUPTA
Year: | Volume: 2 | Issue: 7 | PageNo: 177-179
Survey on the Security Aspects of Mobile Operating Systems Survey on the Security Aspects of Mobile Operating Systems
Authors: Amod N. Narvekar, Prof. K. K. Joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 197-203
execution project in java execution project in java
Authors: jyoti yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 168-169
Android and GPS tracking Android and GPS tracking
Authors: aakash soni
Year: | Volume: 2 | Issue: 7 | PageNo: 100-105
Business Suite Software Modules in SAP Business Suite Software Modules in SAP
Authors: Karan Bhalla
Year: | Volume: 2 | Issue: 7 | PageNo: 180-184
Safe arrays and pointers in c Safe arrays and pointers in c
Authors: Rahul kumar
Year: | Volume: 2 | Issue: 7 | PageNo: 204-206
Review of C/C++ Review of C/C++
Authors: rahul rai gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 158-159
REVIEW OF C++ REVIEW OF C++
Authors: sachin kumar benwal
Year: | Volume: 2 | Issue: 7 | PageNo: 170-171
Review of TETRA Radio System Review of TETRA Radio System
Authors: pragy kaushik
Year: | Volume: 2 | Issue: 7 | PageNo: 172-172
Network Security: Attacks And Tips Network Security: Attacks And Tips
Authors: Himanshu Saini
Year: | Volume: 2 | Issue: 7 | PageNo: 173-176
data mining data mining
Authors: samiksha yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 250-252
Basic Fundamentals of Programming Basic Fundamentals of Programming
Authors: Sahil Jindal
Year: | Volume: 2 | Issue: 7 | PageNo: 306-308
The andriod- mobile operating system with its mobile based applications The andriod- mobile operating system with its mobile based applications
Authors: Jyoti yadav, Jyoti yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 775-779
loops in C loops in C
Authors: Pratibha Sharma
Year: | Volume: 2 | Issue: 7 | PageNo: 598-599
Review paper on summer training Review paper on summer training
Authors: pooja nayak
Year: | Volume: 2 | Issue: 7 | PageNo: 351-352
A Diverse Methodology For Monitoring And Controlling Application in Active Database Management Systems A Diverse Methodology For Monitoring And Controlling Application in Active Datab
Authors: Thodeti Srikanth
Year: | Volume: 2 | Issue: 6 | PageNo: 453-457
JDBC JDBC
Authors: Upender yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 780-781
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and image Encryption DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and
Authors: Mr Ashish Singh., Ajay Gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 529-533
Online Comment Analysis for Recommendation Online Comment Analysis for Recommendation
Authors: Tushar Mehmi
Year: | Volume: 2 | Issue: 7 | PageNo: 636-640
discretizaiton discretizaiton
Authors: rahul yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 641-645
Probability PSO Search Feature Selection for Data Stream Mining for current market trend Probability PSO Search Feature Selection for Data Stream Mining for current mark
Authors: snehal rode, Ram joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 717-720
A Survey On Various Approaches For Webpage Recommendation System In Web Mining A Survey On Various Approaches For Webpage Recommendation System In Web Mining
Authors: Darshan K Prajapati, Dr. Shyamal Tanna
Year: | Volume: 2 | Issue: 7 | PageNo: 498-502
SECURING THE NETWORK IN CLOUD ENVIRONMENT SECURING THE NETWORK IN CLOUD ENVIRONMENT
Authors: P.Sakthi Priyanka, C.Radha
Year: | Volume: 2 | Issue: 7 | PageNo: 654-660
A Survey Paper on Variants of R-tree Data Structure A Survey Paper on Variants of R-tree Data Structure
Authors: Bhoomika Panchal, Vinit Kumar Gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 543-547
A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence A Survey on Software Fault Prediction Technique based on Clustering Algorithm an
Authors: Margi Patel
Year: | Volume: 2 | Issue: 7 | PageNo: 623-627
Performance analysis of on demand multipath routing scheme in wireless environment Performance analysis of on demand multipath routing scheme in wireless environme
Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
Year: | Volume: 2 | Issue: 7 | PageNo: 787-791
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and
Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
Year: | Volume: 2 | Issue: 7 | PageNo: 796-802
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encryp
Authors: Rucha Anil Shinde, Hema V. Kumbhar
Year: | Volume: 2 | Issue: 7 | PageNo: 808-810
Scalable architecture for multi-user encrypted SQL operations on cloud database services Scalable architecture for multi-user encrypted SQL operations on cloud database
Authors: A.SHEELAVATHI, K. Preethi
Year: | Volume: 2 | Issue: 8 | PageNo: 20-25
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Authors: Farinaparveen Khan , R K Krishna
Year: | Volume: 2 | Issue: 8 | PageNo: 72-77
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDEN
Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
Year: | Volume: 2 | Issue: 8 | PageNo: 32-39
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
Authors: Dr.M. Balamurugan, R. Prasanka
Year: | Volume: 1 | Issue: 8 | PageNo: 129-133
Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access Password Guessing Resistant Protocol for Securing System from Bots and Illegal A
Authors: Ms. Arya Kumar, Prof. A.K.Gupta
Year: | Volume: 2 | Issue: 8 | PageNo: 91-94
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Authors: Sahil Meshram, Ujwala H. Wanaskar
Year: | Volume: 2 | Issue: 9 | PageNo: 18-21
Packet Loss Control Using Tokens Packet Loss Control Using Tokens
Authors: Rajeswari.Villa, A. SatyaMallesh
Year: | Volume: 2 | Issue: 9 | PageNo: 15-17
Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique Classification and Allocation of Project Proposals to Reviewers Using Ontology B
Authors: Ratish Srivastava, Prof. P.K. Deshmukh
Year: | Volume: 2 | Issue: 9 | PageNo: 57-61
Analysis of Data Mining Techniques for HealthCare Data Classification Analysis of Data Mining Techniques for HealthCare Data Classification
Authors: Dr. M. Balamurugan, S. Vijaykumar
Year: | Volume: 1 | Issue: 9 | PageNo: 125-128
Cryptography with High Throughput : A survey Cryptography with High Throughput : A survey
Authors: Bhoomika Modi, Vinitkumar Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 1-7
Format Preserving Encryption: A Survey Format Preserving Encryption: A Survey
Authors: ZALAK BHATT, Vinitkumar Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 8-17
High Capacity Steganography with Improved Transformation and Security Technique:A survey High Capacity Steganography with Improved Transformation and Security Technique:
Authors: Bhumin Mandaliya, Vinit Gupta
Year: | Volume: 0 | Issue: no | PageNo: 0-0
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Survey Stochastic optimization for Conserving Energy in Smart Phone Applications - A Su
Authors: M.Ramu, Indurani
Year: | Volume: 2 | Issue: 10 | PageNo: 29-34
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
Year: | Volume: 2 | Issue: 10 | PageNo: 172-177
BUS TACKING SYSTEM USING RFID BUS TACKING SYSTEM USING RFID
Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
Year: | Volume: 2 | Issue: 10 | PageNo: 137-141
Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods Comparative Study between Equivalence Class Partitioning and Boundary Value Anal
Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
Year: | Volume: 2 | Issue: 10 | PageNo: 74-78
Comparative study on Motion Estimation in video sequence Comparative study on Motion Estimation in video sequence
Authors: Ankit Souparana, Ankur kumar Aggarwal
Year: | Volume: 2 | Issue: 10 | PageNo: 79-83
Cloud Computing Architecture, Security issues: A Review Cloud Computing Architecture, Security issues: A Review
Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
Year: | Volume: 2 | Issue: 10 | PageNo: 154-158
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
Authors: Anjli J Patel, Ms.Jayna B.Shah
Year: | Volume: 0 | Issue: no | PageNo: 0-0
Survey on privacy preserving association rule hiding in data mining Survey on privacy preserving association rule hiding in data mining
Authors: jinal patel, Gurcharan sahani
Year: | Volume: 2 | Issue: 10 | PageNo: 111-118
A Comparative Study of Web Page Ranking Algorithms A Comparative Study of Web Page Ranking Algorithms
Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
Year: | Volume: 2 | Issue: 10 | PageNo: 178-184
Fuzzy Page Ranking Scheme in IR System Fuzzy Page Ranking Scheme in IR System
Authors: Shikha Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 185-187
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Year: | Volume: 2 | Issue: 10 | PageNo: 128-131
Big Data Analysis by Classification Algorithm Using Flight Data Set Big Data Analysis by Classification Algorithm Using Flight Data Set
Authors: Ujjwala Urkude
Year: | Volume: 2 | Issue: 10 | PageNo: 188-189
Survey on Privacy Preservation for Inference Control on OLAP Survey on Privacy Preservation for Inference Control on OLAP
Authors: Maulik Joshi, Chetna Chand
Year: | Volume: 2 | Issue: 11 | PageNo: 10-13
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Authors: Gaurang Patel, Sanket Patel
Year: | Volume: 2 | Issue: 11 | PageNo: 1-4
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COM
Authors: Umang Thakkar, Indrjeet Rajput
Year: | Volume: 2 | Issue: 11 | PageNo: 5-9
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
Year: | Volume: 2 | Issue: 11 | PageNo: 78-81
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Authors: Bhumika Parmar, Mr. Tejas Bhatt
Year: | Volume: 2 | Issue: 11 | PageNo: 21-25
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Year: | Volume: 2 | Issue: 11 | PageNo: 26-33
Operative and Secured Privacy enhanced Location Based Services System Operative and Secured Privacy enhanced Location Based Services System
Authors: M.Shakul Hameed, V.Indurani
Year: | Volume: 2 | Issue: 11 | PageNo: 34-41
SENTIMENT ANALYSIS: A REVIEW SENTIMENT ANALYSIS: A REVIEW
Authors: NILU, TANUJA SHUKLA
Year: | Volume: 2 | Issue: 11 | PageNo: 90-94
A Review On Handwritten Character Recognition Techniques A Review On Handwritten Character Recognition Techniques
Authors: Parul Singla, Sargam Munjal
Year: | Volume: 2 | Issue: 11 | PageNo: 373-376
A Review for Video Mosaicing Using Feature Tracking A Review for Video Mosaicing Using Feature Tracking
Authors: Foram N. Patel, Neha Parmar
Year: | Volume: 2 | Issue: 11 | PageNo: 71-74
AppZoo AppZoo
Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
Year: | Volume: 2 | Issue: 11 | PageNo: 200-203
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
Year: | Volume: 2 | Issue: 11 | PageNo: 214-218
Optimization of Social Media Posts Optimization of Social Media Posts
Authors: kanhaiya choudhary, astha singh, nitin Sharma
Year: | Volume: 2 | Issue: 11 | PageNo: 304-307
Tracking and Analyzing the Public Opinions by Interpretation Techniques Tracking and Analyzing the Public Opinions by Interpretation Techniques
Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
Year: | Volume: 2 | Issue: 11 | PageNo: 316-318
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING) CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
Year: | Volume: 2 | Issue: 11 | PageNo: 343-348
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
Authors: Asia Mashkoor, Himani Gupta
Year: | Volume: 2 | Issue: 11 | PageNo: 391-398
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
Year: | Volume: 2 | Issue: 11 | PageNo: 272-277
Real-Time Image Improvement Methods Real-Time Image Improvement Methods
Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
Year: | Volume: 2 | Issue: 11 | PageNo: 428-430
SEARCHING LARGE DATA SETS IN GRID COMPUTING SEARCHING LARGE DATA SETS IN GRID COMPUTING
Authors: Sudha K, Sangeetha C, Aruna R
Year: | Volume: 2 | Issue: 11 | PageNo: 411-416
Prediction of network security situation based on fuzzy neutral network Prediction of network security situation based on fuzzy neutral network
Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
Year: | Volume: 2 | Issue: 11 | PageNo: 423-427
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
Year: | Volume: 2 | Issue: 11 | PageNo: 417-422
SCALABLE DATA SHARING BY USING KEY AGGREGATION SCALABLE DATA SHARING BY USING KEY AGGREGATION
Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
Year: | Volume: 2 | Issue: 12 | PageNo: 10-16
Security in Banking sector using cloud computing with TPA Security in Banking sector using cloud computing with TPA
Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
Year: | Volume: 2 | Issue: 12 | PageNo: 6-9
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Year: | Volume: 2 | Issue: 12 | PageNo: 307-310
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
Year: | Volume: 2 | Issue: 12 | PageNo: 1-5
Person Identification Using Iris Recognition System Using Fastest Searching Algorithm Person Identification Using Iris Recognition System Using Fastest Searching Algo
Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
Year: | Volume: 2 | Issue: 12 | PageNo: 238-242
Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework Identification, Implementation and Validation of Authentication and Authorizatio
Authors: ketan kumar, kalpesh patel
Year: | Volume: 2 | Issue: 12 | PageNo: 65-68
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
Year: | Volume: 2 | Issue: 12 | PageNo: 352-355
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence Software Fault Prediction based on CURE Clustering Algorithm and Artificial Int
Authors: Margi Patel, Upama Vachhani
Year: | Volume: 2 | Issue: 12 | PageNo: 69-77
Dynamic Resource Allocation Technique in Cloud Dynamic Resource Allocation Technique in Cloud
Authors: Ishita Patel, Brona Shah
Year: | Volume: 2 | Issue: 12 | PageNo: 84-88
A New Approach of Virtual Machine Allocation In Cloud A New Approach of Virtual Machine Allocation In Cloud
Authors: Rikin Thakkar, anuradha desai
Year: | Volume: 2 | Issue: 12 | PageNo: 89-93
Privacy Preservation for Inference Control with Improved ND Algorithm Privacy Preservation for Inference Control with Improved ND Algorithm
Authors: Maulik Joshi, Chetna Chand
Year: | Volume: 2 | Issue: 12 | PageNo: 99-103
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Env
Authors: Pranali Gajjar, Brona Shah
Year: | Volume: 2 | Issue: 12 | PageNo: 113-120
Modified Key Based Image Encryption using RSA algorithm Modified Key Based Image Encryption using RSA algorithm
Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
Year: | Volume: 2 | Issue: 12 | PageNo: 252-255
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CAS
Authors: Anamika Madaan, Bharti Jha
Year: | Volume: 2 | Issue: 12 | PageNo: 402-406
Steganography Techniques:A Review Steganography Techniques:A Review
Authors: TARIQ RASHID, SUNNY DAGAR
Year: | Volume: 2 | Issue: 12 | PageNo: 387-391
Fast Block matching motion estimation using fusion of Four Step & Diamond Step Search algorithm for video compression Fast Block matching motion estimation using fusion of Four Step & Diamond Step S
Authors: Ankit Souparana, Ankur kumar Aggarwal
Year: | Volume: 2 | Issue: 12 | PageNo: 378-382
FOCUS : LEARNING TO CRAWL WEB FORUMS FOCUS : LEARNING TO CRAWL WEB FORUMS
Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
Year: | Volume: 2 | Issue: 12 | PageNo: 448-452
Comparative analysis of Domain Specific Testing Techniques Comparative analysis of Domain Specific Testing Techniques
Authors: Neha Kumawat, Yashika Sharma
Year: | Volume: 3 | Issue: 1 | PageNo: 1-4
Category Based Implementation of Web Crawler Category Based Implementation of Web Crawler
Authors: Nandita , Sarika Rana
Year: | Volume: 3 | Issue: 1 | PageNo: 192-197
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
Year: | Volume: 3 | Issue: 1 | PageNo: 269-272
Data Mining tools and techniques in Medical Science Data Mining tools and techniques in Medical Science
Authors: Anu Bura, DR. Prakash Kumar Pathak
Year: | Volume: 3 | Issue: 1 | PageNo: 149-158
Analyzing Twitter data for Multiple languages by applying machine learning Techniques Analyzing Twitter data for Multiple languages by applying machine learning Techn
Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
Year: | Volume: 3 | Issue: 1 | PageNo: 43-48
Advanced Music Player With Integrated Face Recognition Mechanism Advanced Music Player With Integrated Face Recognition Mechanism
Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
Year: | Volume: 3 | Issue: 1 | PageNo: 8-11
A Mobile Application for Bus Tracking System A Mobile Application for Bus Tracking System
Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
Year: | Volume: 3 | Issue: 1 | PageNo: 17-20
Deep Web Data Extraction by Using Vision Approach for Multi-Region Deep Web Data Extraction by Using Vision Approach for Multi-Region
Authors: Shweta Dhall, Parikshit Singla
Year: | Volume: 3 | Issue: 1 | PageNo: 104-109
Review of JSON Data Interchange Format Review of JSON Data Interchange Format
Authors: Garima Dutt, Anup Singh Kushwaha
Year: | Volume: 3 | Issue: 1 | PageNo: 309-313
A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews A Review on Opinion Word and Opinion Target Extraction and Classification of Rev
Authors: Sangram Ashok Patil, Prof. K. B. Manwade
Year: | Volume: 3 | Issue: 1 | PageNo: 110-113
Routing Protocol in Wireless Sensor Networks – Survey Routing Protocol in Wireless Sensor Networks – Survey
Authors: Priya P, Kuppusamy N K
Year: | Volume: 3 | Issue: 1 | PageNo: 159-163
video mosaicing video mosaicing
Authors: Foram N Patel, Neha Parmar
Year: | Volume: 3 | Issue: 1 | PageNo: 242-248
Unsupervised Stemmer for Kannada Language Unsupervised Stemmer for Kannada Language
Authors: Mounika S, B H Manjunath Kumar
Year: | Volume: 3 | Issue: 1 | PageNo: 146-148
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Year: | Volume: 3 | Issue: 1 | PageNo: 377-382
Security Issues and Challenges in Cloud Computing Security Issues and Challenges in Cloud Computing
Authors: Arvind Jaiswal
Year: | Volume: 3 | Issue: 1 | PageNo: 383-387
Review Paper for Query Optimization for Declarative Crowdsourcing System Review Paper for Query Optimization for Declarative Crowdsourcing System
Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
Year: | Volume: 3 | Issue: 2 | PageNo: 32-36
Hybrid Approach for Optimizing Test Suite Based on GA & ACO Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Authors: Khushboo Arora, Mamta Arora
Year: | Volume: 3 | Issue: 2 | PageNo: 65-69
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sens
Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
Year: | Volume: 3 | Issue: 2 | PageNo: 46-52
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Network
Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
Year: | Volume: 3 | Issue: 2 | PageNo: 20-25
schema agnostic indexing with live indexes schema agnostic indexing with live indexes
Authors: monica bansal
Year: | Volume: 3 | Issue: 2 | PageNo: 26-31