Search All Published Paper Details easy to find any paper. Please use Ctrl+F if the search is not working in your browser.


You are browsing Research Papers of Computer

Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Comparative Analysis of Speech Recognition Based on Artificial Neural Network
Authors: Abhinav Bhatnagar, Sapna Sinha
Year: | Volume: 2 | Issue: 1 | PageNo: 35-39


Use of Hadoop Big Data: A Review
Use of Hadoop Big Data: A Review
Authors: Mohd Hashim
Year: | Volume: 2 | Issue: 1 | PageNo: 44-47


Community Detection in social networks
Community Detection in social networks
Authors: Pradeep kumar
Year: | Volume: 2 | Issue: 1 | PageNo: 48-52


Software Testing Technique Using Genetic Algorithm
Software Testing Technique Using Genetic Algorithm
Authors: Pramod Garg, Dr. Deepak Kumar
Year: | Volume: 2 | Issue: 1 | PageNo: 71-77


Use of game theory in executive support system
Use of game theory in executive support system
Authors: Ashish Sharma, Sarika Jain
Year: | Volume: 2 | Issue: 1 | PageNo: 66-70


A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY SENSED IMAGE
A NOVEL UNSUPERVISED SUBPIXEL MAPPING ALGORITHM TO ENHANCE ACCURACY OF REMOTELY
Authors: Dr. S. Rajesh, Mithuna.J
Year: | Volume: 2 | Issue: 1 | PageNo: 120-126


IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FACE DETECTION
IMAP- INTELLIGENT MANAGEMENT OF ATTENDANCE PROCESSING USING VJ ALGORITHM FOR FAC
Authors: Muthu Senthil , A Samydurai, C Vijayakumaran
Year: | Volume: 2 | Issue: 1 | PageNo: 219-224


Three Aspects of Web Mining
Three Aspects of Web Mining
Authors: AR.Sivakumaran, Dr.P.Marikkannu
Year: | Volume: 2 | Issue: 1 | PageNo: 276-279


Survey on Worm Spreading and Worm Detection
Survey on Worm Spreading and Worm Detection
Authors: Aiswarya Francie Challat, Binny Chelziah M
Year: | Volume: 2 | Issue: 1 | PageNo: 238-239


Spam Detection using KNN
Spam Detection using KNN
Authors: sunidhi bansal, Sunidhi Bansal, Dr. Kanwal Garg
Year: | Volume: 2 | Issue: 1 | PageNo: 290-293


A New Approach for Feature Subset Selection Based on Hadoop
A New Approach for Feature Subset Selection Based on Hadoop
Authors: Ramya P V, Shashikala B
Year: | Volume: 2 | Issue: 1 | PageNo: 244-251


Reducing False Positive In Intrusion Detection using Genetic Algorithm
Reducing False Positive In Intrusion Detection using Genetic Algorithm
Authors: Dipika Narsingyani, Ompriya Kale
Year: | Volume: 2 | Issue: 1 | PageNo: 104-107


A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey
A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Senso
Authors: Manpreet kaur, Surender Singh
Year: | Volume: 2 | Issue: 1 | PageNo: 113-119


Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Network
Reputation Management of Peers to Reduce the Sybil Attack in Peer-to-Peer Networ
Authors: Chirag Parmar, Prof. Chaita Jani
Year: | Volume: 2 | Issue: 1 | PageNo: 127-132


Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Efficient FP-Growth Distributed Algorithm with Minimum Communication Overhead
Authors: Viral Jethva, Risha A. Tiwari
Year: | Volume: 2 | Issue: 1 | PageNo: 142-147


A Survey on Dynamic Load Balancing with Min Scaling
A Survey on Dynamic Load Balancing with Min Scaling
Authors: shweta gupta, Ms. Jasmin Jha
Year: | Volume: 2 | Issue: 1 | PageNo: 190-194


Association Rules and their Optimization using Genetic Algorithm
Association Rules and their Optimization using Genetic Algorithm
Authors: Arvind Jaiswal
Year: | Volume: 2 | Issue: 1 | PageNo: 316-322


Tracking Moving Targets in Wireless Sensor Network
Tracking Moving Targets in Wireless Sensor Network
Authors: M.Sridhar , G.Naresh
Year: | Volume: 2 | Issue: 2 | PageNo: 86-89


A Heuristic Approach To Record Deduplication
A Heuristic Approach To Record Deduplication
Authors: Lata.S.Math, Smt.Shashikala.B
Year: | Volume: 2 | Issue: 2 | PageNo: 148-154


Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Load Balancing Algorithms in Cloud Computing Environment : An Introspection
Authors: M.VANITHA, Dr.P.MARIKKANNU
Year: | Volume: 2 | Issue: 2 | PageNo: 159-163


Data Security in Cloud Storage using RBAC
Data Security in Cloud Storage using RBAC
Authors: Mr. Harshal Ashokrao Karande
Year: | Volume: 2 | Issue: 2 | PageNo: 195-201


A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script
A Survey of Problems of Overlapped Handwritten Characters in Recognition process
Authors: arwinder kaur, ashok kumar bathla
Year: | Volume: 2 | Issue: 2 | PageNo: 220-224


REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
REDUCE REROUTING TIME IN MANET USING VIRTUAL BUFFER ZONE ALGORITHM
Authors: Umakant Shivsharanappa Shirshetti, Gurunath T. Chavan
Year: | Volume: 2 | Issue: 2 | PageNo: 137-143


QoS and Energy Aware Geographic Routing Protocol for WSN
QoS and Energy Aware Geographic Routing Protocol for WSN
Authors: K.Sindhuja, P. Punnam Chander Reddy
Year: | Volume: 2 | Issue: 2 | PageNo: 260-264


An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
An Ensemble of Classifiers using Dynamic Method on Ambiguous Data
Authors: Dnyaneshwar Kudande
Year: | Volume: 2 | Issue: 3 | PageNo: 88-95


An Ensemble of Classifiers using Weighted Instance Selection
An Ensemble of Classifiers using Weighted Instance Selection
Authors: Santosh N. Nagargoje, Prasad Kulkarni
Year: | Volume: 2 | Issue: 3 | PageNo: 96-102


Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Analyzing and Predicting Stock Market Using Data Mining Techniques – A Review
Authors: Suraj Baviskar, Nitin Namdev
Year: | Volume: 2 | Issue: 3 | PageNo: 130-135


Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Algorithm
Credit Card Transaction Fraud Detection System Using Fuzzy Logic and K-Means Alg
Authors: Dr. M. Balamurugan, P. Mathiazhagan
Year: | Volume: 2 | Issue: 3 | PageNo: 171-176


object tracking using image processing
object tracking using image processing
Authors: S.THENNAMMAI, D.MAHIMA, D.SARANYA, A.C.SOUNTHARARAJ
Year: | Volume: 2 | Issue: 4 | PageNo: 67-72


Remote method Invocation and Remote Procedure Call
Remote method Invocation and Remote Procedure Call
Authors: Kunwar Deep Singh Toor
Year: | Volume: 2 | Issue: 4 | PageNo: 77-81


Applying cryptography to cancellable signatures
Applying cryptography to cancellable signatures
Authors: Shiwani Gupta
Year: | Volume: 2 | Issue: 4 | PageNo: 135-140


AFFECTIVE COMPUTING
AFFECTIVE COMPUTING
Authors: SABARINI G, RUDHRA DEVI V, VIVEKA
Year: | Volume: 2 | Issue: 4 | PageNo: 141-145


Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Performance Analysis of FPMining Algorithm Using Apriori on HealthCare Data
Authors: Dr. M. Balamurugan, A. Nancy
Year: | Volume: 2 | Issue: 4 | PageNo: 164-166


SMART CARD SECURITY
SMART CARD SECURITY
Authors: SOWPARANIGA.Y, HEMA.K, SUGANYA.T, JOSELIN.J
Year: | Volume: 2 | Issue: 4 | PageNo: 160-163


Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil Language
Parsing-based Machine Translation using an Open Source Toolkit: Joshua for Tamil
Authors: B.P.SREEJA, G.SARATHA DEVI
Year: | Volume: 2 | Issue: 4 | PageNo: 106-110


Performance Tuning in Teradata
Performance Tuning in Teradata
Authors: Mahesh Khaire, Jasmeet Singh Birgi, Sahil Hira
Year: | Volume: 2 | Issue: 5 | PageNo: 46-51


Google Chrome Operatin System
Google Chrome Operatin System
Authors: Madhulika Sharma, Sarita Yadav, Usha Yadav, Gunjan Bansal
Year: | Volume: 2 | Issue: 5 | PageNo: 75-77


Audio Controlled Quadcoipter with Stereo Camera
Audio Controlled Quadcoipter with Stereo Camera
Authors: Amlan Prakash
Year: | Volume: 2 | Issue: 5 | PageNo: 126-128


computer networking
computer networking
Authors: SONIA RANA
Year: | Volume: 2 | Issue: 5 | PageNo: 69-71


Exception Handling
Exception Handling
Authors: Gourav Agghi
Year: | Volume: 2 | Issue: 5 | PageNo: 134-135


classes and object
classes and object
Authors: Manmohan
Year: | Volume: 2 | Issue: 6 | PageNo: 20-22


pointer analysis for c programing
pointer analysis for c programing
Authors: Mohit bansal
Year: | Volume: 2 | Issue: 6 | PageNo: 78-81


Array review
Array review
Authors: Monika Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 312-313


Java applet
Java applet
Authors: Jalaj sharma
Year: | Volume: 2 | Issue: 6 | PageNo: 353-354


SQL Injection Detection & Defeating Tools
SQL Injection Detection & Defeating Tools
Authors: kartik rai
Year: | Volume: 2 | Issue: 6 | PageNo: 90-93


THE C PROGRAMMING LANGUAGE
THE C PROGRAMMING LANGUAGE
Authors: Alia Anis
Year: | Volume: 2 | Issue: 6 | PageNo: 107-108


PROGRAMMING LANGUAGE C++
PROGRAMMING LANGUAGE C++
Authors: Happy Gogoi
Year: | Volume: 2 | Issue: 6 | PageNo: 166-167


Human Computer Interaction
Human Computer Interaction
Authors: Navneet Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 99-102


fundamentals of C programming language
fundamentals of C programming language
Authors: Ritika nain
Year: | Volume: 2 | Issue: 6 | PageNo: 175-176


Data file handling in c++
Data file handling in c++
Authors: Kripashanker yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 326-329


Best programming language for a Beginner
Best programming language for a Beginner
Authors: Deepakshi Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 172-174


C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
C LANGUAGE AND ITS DIFFERENT TYPES OF FUNCTIONS
Authors: Manish
Year: | Volume: 2 | Issue: 6 | PageNo: 115-119


Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Dynamic Load Balancing with Min Scaling and Cooldown Adjustment
Authors: shweta gupta, Ms.Jasmin Jha
Year: | Volume: 2 | Issue: 6 | PageNo: 204-208


software Testing
software Testing
Authors: Chaynika Kapoor
Year: | Volume: 2 | Issue: 6 | PageNo: 286-289


The c preprocessor
The c preprocessor
Authors: Mayank yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 120-122


Switch and classes in c
Switch and classes in c
Authors: Nishant
Year: | Volume: 2 | Issue: 6 | PageNo: 138-139


pointers
pointers
Authors: Rahul Deshwal
Year: | Volume: 2 | Issue: 6 | PageNo: 140-142


5G Wireless Technology
5G Wireless Technology
Authors: Sunil rai
Year: | Volume: 2 | Issue: 6 | PageNo: 236-242


statements in c
statements in c
Authors: kashika grover
Year: | Volume: 2 | Issue: 6 | PageNo: 308-309


Stack and queue
Stack and queue
Authors: Pankaj gaur
Year: | Volume: 2 | Issue: 6 | PageNo: 322-325


ASP.NET AND ITS FRAMEWORK
ASP.NET AND ITS FRAMEWORK
Authors: KOMAL CHAUHAN
Year: | Volume: 2 | Issue: 6 | PageNo: 261-264


Web Service Discovery using Relational Database and Apache Lucene
Web Service Discovery using Relational Database and Apache Lucene
Authors: Bhavin Solanki, Jasmin Jha
Year: | Volume: 2 | Issue: 6 | PageNo: 23-30


File Management in C
File Management in C
Authors: Ria Arora
Year: | Volume: 2 | Issue: 6 | PageNo: 294-296


FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING TOPIC
FINDING THE ENDORSEMENT MEASUREMENT FOR SELECTING THE TWEET IN TWITTER TRENDING
Authors: Rahul Y. Modi, Indr Jeet Rajput
Year: | Volume: 2 | Issue: 6 | PageNo: 37-42


Thread (computing)
Thread (computing)
Authors: Gajendra singh
Year: | Volume: 2 | Issue: 6 | PageNo: 402-403


ASP.net
ASP.net
Authors: Sanjana Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 251-253


PHP - A Review
PHP - A Review
Authors: Ipsita Vashista
Year: | Volume: 2 | Issue: 6 | PageNo: 400-401


arrays in C
arrays in C
Authors: Priya Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 339-339


Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Cross Layer Design of Intrusion Detection in Wireless Mesh Network
Authors: Dhruvil K Patel
Year: | Volume: 2 | Issue: 6 | PageNo: 48-52


Threats in Java Applet
Threats in Java Applet
Authors: Ankit Bhatt
Year: | Volume: 2 | Issue: 6 | PageNo: 364-365


bubble sort
bubble sort
Authors: priyanka kunjwal
Year: | Volume: 2 | Issue: 6 | PageNo: 265-267


Memory Management in C
Memory Management in C
Authors: Puneet Saini, Ria Arora
Year: | Volume: 2 | Issue: 6 | PageNo: 257-258


Spring MVC Framework
Spring MVC Framework
Authors: Simran Bhatti
Year: | Volume: 2 | Issue: 6 | PageNo: 290-293


java security
java security
Authors: Ritu Yadav
Year: | Volume: 2 | Issue: 6 | PageNo: 254-256


SOFTWARE TESTING
SOFTWARE TESTING
Authors: AARTI SINGH
Year: | Volume: 2 | Issue: 6 | PageNo: 268-274


.NET FRAMEWORK
.NET FRAMEWORK
Authors: Karuna Hazrati
Year: | Volume: 2 | Issue: 7 | PageNo: 0-0


Java multithreading system
Java multithreading system
Authors: kritika chadha
Year: | Volume: 2 | Issue: 6 | PageNo: 375-381


Research Paper on C Language
Research Paper on C Language
Authors: kawalpreet Singh
Year: | Volume: 2 | Issue: 6 | PageNo: 310-311


PHP Web Application Frameworks based upon Design Patterns
PHP Web Application Frameworks based upon Design Patterns
Authors: Aakash goyal
Year: | Volume: 2 | Issue: 6 | PageNo: 391-394


SOFTWARE & MANUAL TESTING
SOFTWARE & MANUAL TESTING
Authors: Abhishek Jain
Year: | Volume: 2 | Issue: 6 | PageNo: 382-385


Digital Diary
Digital Diary
Authors: Manjeet Saini
Year: | Volume: 2 | Issue: 6 | PageNo: 386-390


Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Cluster based distributed mutual exclusion algorithm for mobile ad hoc network
Authors: Prof .Dudhagi Rupali R., Prof. Valsang Aarti B., Prof. Khureshi M. A.
Year: | Volume: 2 | Issue: 6 | PageNo: 182-186


A Survey work on ETC System for an Efficient Image Encryption and Compression
A Survey work on ETC System for an Efficient Image Encryption and Compression
Authors: GAURI B CHAVAN, Dr.Prof.kumbharkar P.B.
Year: | Volume: 2 | Issue: 6 | PageNo: 209-212


Survey paper on CAPTCHA AND VRP
Survey paper on CAPTCHA AND VRP
Authors: Vijayalakshmi Daundkar, Dr.Prof.kumbharkar P.B.
Year: | Volume: 2 | Issue: 6 | PageNo: 317-321


A Study on Data Mining with Big Data
A Study on Data Mining with Big Data
Authors: B.Zakia Bano , Dr.K.Pavan Kumar
Year: | Volume: 2 | Issue: 6 | PageNo: 187-192


AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
AN ACCURATE AUTOMATIC TEST PACKETGENERATION AND FAULT LOCALIZATION
Authors: Kattubadi Abdulla, A.V.Ramakrishna Reddy
Year: | Volume: 2 | Issue: 6 | PageNo: 193-198


A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Center
A Survey of VM Allocation and Migration algorithms for Energy-Efficient Data Cen
Authors: Neha Jain, K. K. Joshi
Year: | Volume: 2 | Issue: 6 | PageNo: 431-435


Overview on Android and its Versions
Overview on Android and its Versions
Authors: Sahil Munjal
Year: | Volume: 2 | Issue: 6 | PageNo: 415-418


Peer to Peer Computing
Peer to Peer Computing
Authors: RAJAT WASON
Year: | Volume: 2 | Issue: 6 | PageNo: 408-412


Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Survey of Energy-Efficient Load-Balancing Scheduling Algorithms in Data Center
Authors: SMRUTI PHADKE, K.K. Joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 160-167


POINTER ANALYSIS FOR C PROGRAM
POINTER ANALYSIS FOR C PROGRAM
Authors: PRIYANK GUPTA
Year: | Volume: 2 | Issue: 7 | PageNo: 177-179


Survey on the Security Aspects of Mobile Operating Systems
Survey on the Security Aspects of Mobile Operating Systems
Authors: Amod N. Narvekar, Prof. K. K. Joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 197-203


execution project in java
execution project in java
Authors: jyoti yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 168-169


Android and GPS tracking
Android and GPS tracking
Authors: aakash soni
Year: | Volume: 2 | Issue: 7 | PageNo: 100-105


Business Suite Software Modules in SAP
Business Suite Software Modules in SAP
Authors: Karan Bhalla
Year: | Volume: 2 | Issue: 7 | PageNo: 180-184


Safe arrays and pointers in c
Safe arrays and pointers in c
Authors: Rahul kumar
Year: | Volume: 2 | Issue: 7 | PageNo: 204-206


Review of C/C++
Review of C/C++
Authors: rahul rai gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 158-159


REVIEW OF C++
REVIEW OF C++
Authors: sachin kumar benwal
Year: | Volume: 2 | Issue: 7 | PageNo: 170-171


Review of TETRA Radio System
Review of TETRA Radio System
Authors: pragy kaushik
Year: | Volume: 2 | Issue: 7 | PageNo: 172-172


Network Security: Attacks And Tips
Network Security: Attacks And Tips
Authors: Himanshu Saini
Year: | Volume: 2 | Issue: 7 | PageNo: 173-176


data mining
data mining
Authors: samiksha yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 250-252


Basic Fundamentals of Programming
Basic Fundamentals of Programming
Authors: Sahil Jindal
Year: | Volume: 2 | Issue: 7 | PageNo: 306-308


The andriod- mobile operating system with its mobile based applications
The andriod- mobile operating system with its mobile based applications
Authors: Jyoti yadav, Jyoti yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 775-779


loops in C
loops in C
Authors: Pratibha Sharma
Year: | Volume: 2 | Issue: 7 | PageNo: 598-599


Review paper on summer training
Review paper on summer training
Authors: pooja nayak
Year: | Volume: 2 | Issue: 7 | PageNo: 351-352


A Diverse Methodology For Monitoring And Controlling Application in Active Database Management Systems
A Diverse Methodology For Monitoring And Controlling Application in Active Datab
Authors: Thodeti Srikanth
Year: | Volume: 2 | Issue: 6 | PageNo: 453-457


JDBC
JDBC
Authors: Upender yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 780-781


DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and image Encryption
DIGITAL DATA FRIEND: A Secure Framework for sharing data using Diverse Media and
Authors: Mr Ashish Singh., Ajay Gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 529-533


Online Comment Analysis for Recommendation
Online Comment Analysis for Recommendation
Authors: Tushar Mehmi
Year: | Volume: 2 | Issue: 7 | PageNo: 636-640


discretizaiton
discretizaiton
Authors: rahul yadav
Year: | Volume: 2 | Issue: 7 | PageNo: 641-645


Probability PSO Search Feature Selection for Data Stream Mining for current market trend
Probability PSO Search Feature Selection for Data Stream Mining for current mark
Authors: snehal rode, Ram joshi
Year: | Volume: 2 | Issue: 7 | PageNo: 717-720


A Survey On Various Approaches For Webpage Recommendation System In Web Mining
A Survey On Various Approaches For Webpage Recommendation System In Web Mining
Authors: Darshan K Prajapati, Dr. Shyamal Tanna
Year: | Volume: 2 | Issue: 7 | PageNo: 498-502


SECURING THE NETWORK IN CLOUD ENVIRONMENT
SECURING THE NETWORK IN CLOUD ENVIRONMENT
Authors: P.Sakthi Priyanka, C.Radha
Year: | Volume: 2 | Issue: 7 | PageNo: 654-660


A Survey Paper on Variants of R-tree Data Structure
A Survey Paper on Variants of R-tree Data Structure
Authors: Bhoomika Panchal, Vinit Kumar Gupta
Year: | Volume: 2 | Issue: 7 | PageNo: 543-547


A Survey on Software Fault Prediction Technique based on Clustering Algorithm and Artificial Intelligence
A Survey on Software Fault Prediction Technique based on Clustering Algorithm an
Authors: Margi Patel
Year: | Volume: 2 | Issue: 7 | PageNo: 623-627


Performance analysis of on demand multipath routing scheme in wireless environment
Performance analysis of on demand multipath routing scheme in wireless environme
Authors: Dinesh Kumar Sen, Prof. Umesh Barahdiya, Prof. S.M. Khare
Year: | Volume: 2 | Issue: 7 | PageNo: 787-791


Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and Twin Encoding Methodology
Performance Analysis of a Robust Blind Digital Image Watermarking Using DWT and
Authors: Shubhangi Pande, Santosh Varshney, Dr. M. K. Ravat
Year: | Volume: 2 | Issue: 7 | PageNo: 796-802


Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encrypted Cloud
Efficient Multikeyword Ranked Search with Provision of Synonym Query over Encryp
Authors: Rucha Anil Shinde, Hema V. Kumbhar
Year: | Volume: 2 | Issue: 7 | PageNo: 808-810


Scalable architecture for multi-user encrypted SQL operations on cloud database services
Scalable architecture for multi-user encrypted SQL operations on cloud database
Authors: A.SHEELAVATHI, K. Preethi
Year: | Volume: 2 | Issue: 8 | PageNo: 20-25


Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Feature extraction Of Heterogeneous Face images using SIFT and MLBP algorithm
Authors: Farinaparveen Khan , R K Krishna
Year: | Volume: 2 | Issue: 8 | PageNo: 72-77


FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDENTS ON ROADS
FATIGUE DETECTION BASED ON IMAGE EYE TRACKING AND DETECTION FOR AVOIDING ACCIDEN
Authors: Snehal B. Meshram, Prof.Sonali Bodkhe
Year: | Volume: 2 | Issue: 8 | PageNo: 32-39


FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
FORCAST THE STUDENT PERFORMANCE USING NEURO FUZZY SYSTEM
Authors: Dr.M. Balamurugan, R. Prasanka
Year: | Volume: 1 | Issue: 8 | PageNo: 129-133


Password Guessing Resistant Protocol for Securing System from Bots and Illegal Access
Password Guessing Resistant Protocol for Securing System from Bots and Illegal A
Authors: Ms. Arya Kumar, Prof. A.K.Gupta
Year: | Volume: 2 | Issue: 8 | PageNo: 91-94


Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Reliable Wireless Sensor Network Data Transfer to Mobile Cloud
Authors: Sahil Meshram, Ujwala H. Wanaskar
Year: | Volume: 2 | Issue: 9 | PageNo: 18-21


Packet Loss Control Using Tokens
Packet Loss Control Using Tokens
Authors: Rajeswari.Villa, A. SatyaMallesh
Year: | Volume: 2 | Issue: 9 | PageNo: 15-17


Classification and Allocation of Project Proposals to Reviewers Using Ontology Based Hybrid Mining Technique
Classification and Allocation of Project Proposals to Reviewers Using Ontology B
Authors: Ratish Srivastava, Prof. P.K. Deshmukh
Year: | Volume: 2 | Issue: 9 | PageNo: 57-61


Analysis of Data Mining Techniques for HealthCare Data Classification
Analysis of Data Mining Techniques for HealthCare Data Classification
Authors: Dr. M. Balamurugan, S. Vijaykumar
Year: | Volume: 1 | Issue: 9 | PageNo: 125-128


Cryptography with High Throughput : A survey
Cryptography with High Throughput : A survey
Authors: Bhoomika Modi, Vinitkumar Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 1-7


Format Preserving Encryption: A Survey
Format Preserving Encryption: A Survey
Authors: ZALAK BHATT, Vinitkumar Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 8-17


High Capacity Steganography with Improved Transformation and Security Technique:A survey
High Capacity Steganography with Improved Transformation and Security Technique:
Authors: Bhumin Mandaliya, Vinit Gupta
Year: | Volume: 0 | Issue: no | PageNo: 0-0


Stochastic optimization for Conserving Energy in Smart Phone Applications - A Survey
Stochastic optimization for Conserving Energy in Smart Phone Applications - A Su
Authors: M.Ramu, Indurani
Year: | Volume: 2 | Issue: 10 | PageNo: 29-34


DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
DATA MINING AND HIERARCHICAL CLUSTERING TECHNIQUES
Authors: Aishwarya.S, Mrs.B.Meena preethi, Gokul Krishnan.M, Sabarini
Year: | Volume: 2 | Issue: 10 | PageNo: 172-177


BUS TACKING SYSTEM USING RFID
BUS TACKING SYSTEM USING RFID
Authors: Indhu Priya S, M.Rohini, G.Nivedhitha
Year: | Volume: 2 | Issue: 10 | PageNo: 137-141


Comparative Study between Equivalence Class Partitioning and Boundary Value Analysis Testing Methods
Comparative Study between Equivalence Class Partitioning and Boundary Value Anal
Authors: Neha Kumawat, Yashika Sharma, Urmila Pilania
Year: | Volume: 2 | Issue: 10 | PageNo: 74-78


Comparative study on Motion Estimation in video sequence
Comparative study on Motion Estimation in video sequence
Authors: Ankit Souparana, Ankur kumar Aggarwal
Year: | Volume: 2 | Issue: 10 | PageNo: 79-83


Cloud Computing Architecture, Security issues: A Review
Cloud Computing Architecture, Security issues: A Review
Authors: Mandeep kaur, Rohini Sharma, Pankaj Palta
Year: | Volume: 2 | Issue: 10 | PageNo: 154-158


SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
SURVEY OF IMAGE STEGANOGRAPHY USING SPATIAL DOMAIN TECHNIQUES
Authors: Anjli J Patel, Ms.Jayna B.Shah
Year: | Volume: 0 | Issue: no | PageNo: 0-0


Survey on privacy preserving association rule hiding in data mining
Survey on privacy preserving association rule hiding in data mining
Authors: jinal patel, Gurcharan sahani
Year: | Volume: 2 | Issue: 10 | PageNo: 111-118


A Comparative Study of Web Page Ranking Algorithms
A Comparative Study of Web Page Ranking Algorithms
Authors: Priyanka Tuteja, Meena Chaudhary, Sarika Gambhir
Year: | Volume: 2 | Issue: 10 | PageNo: 178-184


Fuzzy Page Ranking Scheme in IR System
Fuzzy Page Ranking Scheme in IR System
Authors: Shikha Gupta
Year: | Volume: 2 | Issue: 10 | PageNo: 185-187


A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
A SURVEY ON TECHNIQUES FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Year: | Volume: 2 | Issue: 10 | PageNo: 128-131


Big Data Analysis by Classification Algorithm Using Flight Data Set
Big Data Analysis by Classification Algorithm Using Flight Data Set
Authors: Ujjwala Urkude
Year: | Volume: 2 | Issue: 10 | PageNo: 188-189


Survey on Privacy Preservation for Inference Control on OLAP
Survey on Privacy Preservation for Inference Control on OLAP
Authors: Maulik Joshi, Chetna Chand
Year: | Volume: 2 | Issue: 11 | PageNo: 10-13


Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Survey on Privacy Preserving Updates for Anonymous and Confidential Databases
Authors: Gaurang Patel, Sanket Patel
Year: | Volume: 2 | Issue: 11 | PageNo: 1-4


A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING
A NOVEL APPROACH FOR DYNAMIC SELECTION OF LOAD BALANCING ALGORITHMS IN CLOUD COM
Authors: Umang Thakkar, Indrjeet Rajput
Year: | Volume: 2 | Issue: 11 | PageNo: 5-9


COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATA SETS IN CLOUD
Authors: Manikandan.M, Meena.V, Dinesh Priyadarshan.J
Year: | Volume: 2 | Issue: 11 | PageNo: 78-81


Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Volume Visualization using Marching Cubes Algorithms: Survey & Analysis
Authors: Bhumika Parmar, Mr. Tejas Bhatt
Year: | Volume: 2 | Issue: 11 | PageNo: 21-25


DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Authors: Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Year: | Volume: 2 | Issue: 11 | PageNo: 26-33


Operative and Secured Privacy enhanced Location Based Services System
Operative and Secured Privacy enhanced Location Based Services System
Authors: M.Shakul Hameed, V.Indurani
Year: | Volume: 2 | Issue: 11 | PageNo: 34-41


SENTIMENT ANALYSIS: A REVIEW
SENTIMENT ANALYSIS: A REVIEW
Authors: NILU, TANUJA SHUKLA
Year: | Volume: 2 | Issue: 11 | PageNo: 90-94


A Review On Handwritten Character Recognition Techniques
A Review On Handwritten Character Recognition Techniques
Authors: Parul Singla, Sargam Munjal
Year: | Volume: 2 | Issue: 11 | PageNo: 373-376


A Review for Video Mosaicing Using Feature Tracking
A Review for Video Mosaicing Using Feature Tracking
Authors: Foram N. Patel, Neha Parmar
Year: | Volume: 2 | Issue: 11 | PageNo: 71-74


AppZoo
AppZoo
Authors: Nisha Bakare, Samruddhi Chandratre, Pooja Dumbare, Priyanka Pagare
Year: | Volume: 2 | Issue: 11 | PageNo: 200-203


MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
MALWARE PROTECTION FOR EXTERNAL STORAGE DEVICES
Authors: SHUBHAM BHASME, Swarupa Sathe, Ambar Lonkar, Prof. Laxmi Madhuri
Year: | Volume: 2 | Issue: 11 | PageNo: 214-218


Optimization of Social Media Posts
Optimization of Social Media Posts
Authors: kanhaiya choudhary, astha singh, nitin Sharma
Year: | Volume: 2 | Issue: 11 | PageNo: 304-307


Tracking and Analyzing the Public Opinions by Interpretation Techniques
Tracking and Analyzing the Public Opinions by Interpretation Techniques
Authors: R.P.S.Manikandan, Dr. A.M. Kalpana
Year: | Volume: 2 | Issue: 11 | PageNo: 316-318


CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
CLOUD COMPUTING (COMPREHENSIVE KNOWLEDGE OF CLOUD COMPUTING)
Authors: SUNAINA MAMGAIN, AKANCHHA PANDEY, KARAN PANJWANI
Year: | Volume: 2 | Issue: 11 | PageNo: 343-348


SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
SURVEY ON FACIAL RECOGNITIONS TECHNIQUES
Authors: Asia Mashkoor, Himani Gupta
Year: | Volume: 2 | Issue: 11 | PageNo: 391-398


IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA
Authors: Nitin Arun Khandare, Jaihind D. Mungle, Shadaf J. Warunkar, Vishal V. shinde
Year: | Volume: 2 | Issue: 11 | PageNo: 272-277


Real-Time Image Improvement Methods
Real-Time Image Improvement Methods
Authors: Pramod Kumar Tiwari, Sweta Singh, Dipesh Das
Year: | Volume: 2 | Issue: 11 | PageNo: 428-430


SEARCHING LARGE DATA SETS IN GRID COMPUTING
SEARCHING LARGE DATA SETS IN GRID COMPUTING
Authors: Sudha K, Sangeetha C, Aruna R
Year: | Volume: 2 | Issue: 11 | PageNo: 411-416


Prediction of network security situation based on fuzzy neutral network
Prediction of network security situation based on fuzzy neutral network
Authors: NEERAJ KUMAR SAHU, LOKESH JAIN, Dipesh Das
Year: | Volume: 2 | Issue: 11 | PageNo: 423-427


DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
DETECTION OF PHISHING URL BASED ON TEXT FEATURE EXTRACTION
Authors: Mayur Kadhane, Abhinav Jagtap, Mahesh Adhav, Harshad Phalak
Year: | Volume: 2 | Issue: 11 | PageNo: 417-422


SCALABLE DATA SHARING BY USING KEY AGGREGATION
SCALABLE DATA SHARING BY USING KEY AGGREGATION
Authors: Shivanand Gaikwad, Mukesh Giri , Akshay Jadhav, Rupesh kandhare, Prof.Nitin Hambir
Year: | Volume: 2 | Issue: 12 | PageNo: 10-16


Security in Banking sector using cloud computing with TPA
Security in Banking sector using cloud computing with TPA
Authors: Sarabjeet kaur Popli, Akanksha Pawar; Prof. Jayashree Jadhav, Priyanka Rawat, Prajakta Salke
Year: | Volume: 2 | Issue: 12 | PageNo: 6-9


A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
A SECURE MODEL FOR IDENTIFY ORIGIN FORGERY AND PACKET FALL ATTACK IN NETWORK
Authors: Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandgar , Prof.Mandar Mokashi
Year: | Volume: 2 | Issue: 12 | PageNo: 307-310


ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
ENERGY EFFICIENT DSR TO IMPROVE THE ROUTING IN MANET
Authors: JayrajSinh Rana, Jayraj Rana, Ashish Patel, Minesh P Thaker
Year: | Volume: 2 | Issue: 12 | PageNo: 1-5


Person Identification Using Iris Recognition System Using Fastest Searching Algorithm
Person Identification Using Iris Recognition System Using Fastest Searching Algo
Authors: Ruchita Rahate, Shivani Bakshi , Karishma Bavne, Madhuri Satare
Year: | Volume: 2 | Issue: 12 | PageNo: 238-242


Identification, Implementation and Validation of Authentication and Authorization pattern in Distributed System using Spring Security Framework
Identification, Implementation and Validation of Authentication and Authorizatio
Authors: ketan kumar, kalpesh patel
Year: | Volume: 2 | Issue: 12 | PageNo: 65-68


PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
PUBLISHING DOCUMENTS WITH RESPECT TO ROLES SECURITY
Authors: Rashmi D. Rahane, Sayali S. Digholkar, Amruta P. Panghavane, Pooja U. Amrutkar
Year: | Volume: 2 | Issue: 12 | PageNo: 352-355


Software Fault Prediction based on CURE Clustering Algorithm and Artificial Intelligence
Software Fault Prediction based on CURE Clustering Algorithm and Artificial Int
Authors: Margi Patel, Upama Vachhani
Year: | Volume: 2 | Issue: 12 | PageNo: 69-77


Dynamic Resource Allocation Technique in Cloud
Dynamic Resource Allocation Technique in Cloud
Authors: Ishita Patel, Brona Shah
Year: | Volume: 2 | Issue: 12 | PageNo: 84-88


A New Approach of Virtual Machine Allocation In Cloud
A New Approach of Virtual Machine Allocation In Cloud
Authors: Rikin Thakkar, anuradha desai
Year: | Volume: 2 | Issue: 12 | PageNo: 89-93


Privacy Preservation for Inference Control with Improved ND Algorithm
Privacy Preservation for Inference Control with Improved ND Algorithm
Authors: Maulik Joshi, Chetna Chand
Year: | Volume: 2 | Issue: 12 | PageNo: 99-103


An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Environment
An Efficient Scalable Framework for Auto Scaling Services in Cloud Computing Env
Authors: Pranali Gajjar, Brona Shah
Year: | Volume: 2 | Issue: 12 | PageNo: 113-120


Modified Key Based Image Encryption using RSA algorithm
Modified Key Based Image Encryption using RSA algorithm
Authors: Devashish Vaghela, Prof.Rajyalakshmi Jaiswal
Year: | Volume: 2 | Issue: 12 | PageNo: 252-255


COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CASES
COMPARISON BETWEEN VARIOUS OPTIMIZATION TECHNIQUES FOR FINDING ADEQUATE TEST CAS
Authors: Anamika Madaan, Bharti Jha
Year: | Volume: 2 | Issue: 12 | PageNo: 402-406


Steganography Techniques:A Review
Steganography Techniques:A Review
Authors: TARIQ RASHID, SUNNY DAGAR
Year: | Volume: 2 | Issue: 12 | PageNo: 387-391


Fast Block matching motion estimation using fusion of Four Step & Diamond Step Search algorithm for video compression
Fast Block matching motion estimation using fusion of Four Step & Diamond Step S
Authors: Ankit Souparana, Ankur kumar Aggarwal
Year: | Volume: 2 | Issue: 12 | PageNo: 378-382


FOCUS : LEARNING TO CRAWL WEB FORUMS
FOCUS : LEARNING TO CRAWL WEB FORUMS
Authors: Bagam Rakesh, S Ravi Kiran, Asst. Prof., N. Swapna Suhasini
Year: | Volume: 2 | Issue: 12 | PageNo: 448-452


Comparative analysis of Domain Specific Testing Techniques
Comparative analysis of Domain Specific Testing Techniques
Authors: Neha Kumawat, Yashika Sharma
Year: | Volume: 3 | Issue: 1 | PageNo: 1-4


Category Based Implementation of Web Crawler
Category Based Implementation of Web Crawler
Authors: Nandita , Sarika Rana
Year: | Volume: 3 | Issue: 1 | PageNo: 192-197


Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Detection Of Distributed Denial of Service Attack With Hadoop On Live Network
Authors: Suchita Korad, Madhuri Jadhav, Shubhada Kadam, Prajakta Deore , Prof.Rahul Patil
Year: | Volume: 3 | Issue: 1 | PageNo: 269-272


Data Mining tools and techniques in Medical Science
Data Mining tools and techniques in Medical Science
Authors: Anu Bura, DR. Prakash Kumar Pathak
Year: | Volume: 3 | Issue: 1 | PageNo: 149-158


Analyzing Twitter data for Multiple languages by applying machine learning Techniques
Analyzing Twitter data for Multiple languages by applying machine learning Techn
Authors: MANU KRISHNA BHARDWAJ, Brajesh Kumar
Year: | Volume: 3 | Issue: 1 | PageNo: 43-48


Advanced Music Player With Integrated Face Recognition Mechanism
Advanced Music Player With Integrated Face Recognition Mechanism
Authors: Yash Bagadia, Parul Tambe, Tahir Khalil, Noorulain Shaikh , Prof. L.J.Sankpal
Year: | Volume: 3 | Issue: 1 | PageNo: 8-11


A Mobile Application for Bus Tracking System
A Mobile Application for Bus Tracking System
Authors: Sarthak Thakur, Ajinkya Sarnobat, Pratik Tilekar, Rahul Rachamadugu
Year: | Volume: 3 | Issue: 1 | PageNo: 17-20


Deep Web Data Extraction by Using Vision Approach for Multi-Region
Deep Web Data Extraction by Using Vision Approach for Multi-Region
Authors: Shweta Dhall, Parikshit Singla
Year: | Volume: 3 | Issue: 1 | PageNo: 104-109


Review of JSON Data Interchange Format
Review of JSON Data Interchange Format
Authors: Garima Dutt, Anup Singh Kushwaha
Year: | Volume: 3 | Issue: 1 | PageNo: 309-313


A Review on Opinion Word and Opinion Target Extraction and Classification of Reviews
A Review on Opinion Word and Opinion Target Extraction and Classification of Rev
Authors: Sangram Ashok Patil, Prof. K. B. Manwade
Year: | Volume: 3 | Issue: 1 | PageNo: 110-113


Routing Protocol in Wireless Sensor Networks – Survey
Routing Protocol in Wireless Sensor Networks – Survey
Authors: Priya P, Kuppusamy N K
Year: | Volume: 3 | Issue: 1 | PageNo: 159-163


video mosaicing
video mosaicing
Authors: Foram N Patel, Neha Parmar
Year: | Volume: 3 | Issue: 1 | PageNo: 242-248


Unsupervised Stemmer for Kannada Language
Unsupervised Stemmer for Kannada Language
Authors: Mounika S, B H Manjunath Kumar
Year: | Volume: 3 | Issue: 1 | PageNo: 146-148


EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
EFFICIENT TECHNIQUE FOR MINING FREQUENT PATTERNS OVER DATA STREAM
Authors: NIYATI M. MEVADA, JAYNA B. SHAH
Year: | Volume: 3 | Issue: 1 | PageNo: 377-382


Security Issues and Challenges in Cloud Computing
Security Issues and Challenges in Cloud Computing
Authors: Arvind Jaiswal
Year: | Volume: 3 | Issue: 1 | PageNo: 383-387


Review Paper for Query Optimization for Declarative Crowdsourcing System
Review Paper for Query Optimization for Declarative Crowdsourcing System
Authors: Nilesh Nivrutti Thorat, A. B. Rajmane
Year: | Volume: 3 | Issue: 2 | PageNo: 32-36


Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Hybrid Approach for Optimizing Test Suite Based on GA & ACO
Authors: Khushboo Arora, Mamta Arora
Year: | Volume: 3 | Issue: 2 | PageNo: 65-69


Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sensor Networks
Efficient Connectivity Using Cooperative Transmission in Wireless Multi-Hop Sens
Authors: Nagendra HM, Channakrishna Raju, Dr M.Siddappa
Year: | Volume: 3 | Issue: 2 | PageNo: 46-52


Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Networks
Design of an Efficient Algorithm to Enhance Life time in Wireless Sensor Network
Authors: Virupaksha V Tippa, Channakrishna Raju, Dr. M . Siddappa
Year: | Volume: 3 | Issue: 2 | PageNo: 20-25


schema agnostic indexing with live indexes
schema agnostic indexing with live indexes
Authors: monica bansal
Year: | Volume: 3 | Issue: 2 | PageNo: 26-31


Conference Alert

NCSST-2023

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2023

Go To Issue



Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews