SN |
Paper |
1 |
A Survey of Unsupervised Techniques for Web Data Extraction
Disha Patel, Dr. Ankit Thakkar
|
2 |
Media Player Control Using Augmented Reality
Shamla Mantri, Sandeep Vasave, Amol Palve, Yogesh Shinde, Rajeshwar Gunjmurte
|
3 |
A Novel Watermark Approach for securing Fingerprint Template
Rubal Jain, Arun Kumar Yadav, Dr. Chander Kant
|
4 |
Improving Performance of a Face Liveness Detection System Using Soft Biometrics
Sonal Girdhar, Arun Kumar Yadav, Dr. Chander Kant
|
5 |
A Multimodal Approach to Increase the Security of Biometric System
Mamta Ahlawat, Arun Kumar Yadav, Dr. Chander Kant
|
6 |
Comparative Analysis of Apriori Algorithm based on Association Rule
Apurwa Sahu, Mradul Dhakar, Pushpi Rani
|
7 |
Blocking of Mischievous users in Anonymizing Networks using Nymble System
Anil Kumar, Kirti Bhatia
|
8 |
Result of Blocking of Mischievous users in Anonymizing Networks using Nymble System
Anil Kumar, Kirti Bhatia
|
9 |
A Novel Approach To Increase The Performance of Biometrics Iris Sensors
Nitin Sambharwal, Arun Kumar Yadav, Dr. Chander Kant
|
10 |
Adaptive Clustering Using Round Robin Technique in WSN
Ruchi Sharma, Gunjan Jain
|
11 |
SCAODV: A Protocol to Prevent Black Hole Attacks in Mobile Ad Hoc Networks
Shailja Sharma, Umesh Kumar Singh, Kailash Chandra Phuleriya, D.N. Goswami
|
12 |
A Study of Various Data Compression Techniques
P.RAVI, Dr.A.ASHOKKUMAR
|
13 |
Designing Framework for Testing Web Applications
Amit Singh, Kirti Bhatia
|
14 |
A Survey on Base Measures of Software Metrics in Business Process Model
Ramesh Kumar, Dr.Rajesh Verma
|
15 |
Load Balancing in Cloud Computing
Minakshi Berwal, Dr. Chander Kant
|
16 |
Performance Evaluation of MC-CDMA System-A Survey
Rohini S, Dr. Suriyakala C D
|
17 |
Glaucoma Detection Techniques: A Review
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.601
|
18 |
A simple approach to Cup-to-Disk Ratio determination for Glaucoma Screening
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.602
|
19 |
Glaucoma Screening Using Compensated Cup-to-Disk Ratio Value
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.603
|
20 |
Optimal Feature Selection for Accelerated Plethysmography based Enhanced Pitta Classification
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.604
|
21 |
Accelerated Plethysmography based Enhanced Pitta Classification using LIBSVM
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.605
|
22 |
Accelerated Plethysmography based Enhanced Pitta Classification using Artificial Neural Networks
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.606
|
23 |
Anomaly Detection via Median based Filtering and Online osPCA
Amol M. Pawar, Manisha S. Mahindrakar
DOI: 10.090592/IJCSC.2015.607
|
24 |
Dermatoglyphics: Blueprints of Human Cognition on Fingerprints
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.608
|
25 |
Image processing techniques in Dermatoglyphic fingerprint analysis: A review
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.609
|
26 |
Validation of Fourier Mellin technique for Dermatoglyphic fingerprint pattern matching
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.610
|
27 |
Development of Phase Only Correlation (POC) based two class classifier for Dermatoglyphic patterns
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.611
|
28 |
Memory Conscious Protocol for Replay Attack Detection and Prevention in WSN
Bharati N. Sawant, Bhupendra S. Chordia
DOI: 10.090592/IJCSC.2015.612
|
29 |
Optimizing the Generic Key Distribution Process with efficient Routing in Ad-Hoc Networks using the Ant Colony Optimization
Sharada Valiveti, Gaurang Raval
DOI: 10.090592/IJCSC.2015.613
|
30 |
Modified Approach of Multinomial Naïve Bayes for Text Document Classification
S.W. Mohod, Dr. C.A.Dhote, Dr. V.M. Thakare
DOI: 10.090592/IJCSC.2015.614
|
31 |
An architecture for elastic resource allocation in Fog Computing
Swati Agarwal, Shashank Yadav, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.615
|
32 |
Digital Watermarking SVD-DWT-DCT Using Kalman Filter
Renuka kaur, Prof.Gulshan Goyal
DOI: 10.090592/IJCSC.2015.616
|
33 |
A Review of Weather Forecasting Models-Based on Data Mining and Artificial Neural Networks
G.Vamsi Krishna
DOI: 10.090592/IJCSC.2015.617
|
34 |
Biometric System: Secure User Authentication
Nippun Kamboj, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.618
|
35 |
An Neuro-Fuzzy Approach Based Voting Scheme for Fault Tolerant Systems Using Hybrid Artificial Bee Colony Training
D. Uma Devi, P. Seetha Ramaiah
DOI: 10.090592/IJCSC.2015.619
|
36 |
Ear Pattern Recognition and Compression
Joginder Singh
DOI: 10.090592/IJCSC.2015.620
|
37 |
Comparision of Fat Tree and Ethernet(WAN) Routing in Cloud data centre
Shweta Agrawal, Prof (Dr.) vibhakar pathak
DOI: 10.090592/IJCSC.2015.621
|
38 |
A Review on High-dynamic-range imaging with its Technique
Gaurav Tiwari, Pushpi Rani
DOI: 10.090592/IJCSC.2015.622
|
39 |
RAKS. M. PK 1.0, an Efficient Methodology to Determine The Steganography Signature Of Steganography Tools
Rakesh Kumar, Pratik Kumar
DOI: 10.090592/IJCSC.2015.623
|
40 |
Weighted Approach for 3-D/2-D Localization Method in WSN using Fuzzy Modeling with Parameter Analysis
Nidhi Agarwal
DOI: 10.090592/IJCSC.2015.624
|
41 |
Genetically Modified Compression Approach for Multimedia Data on cloud storage
Amanjot Kaur Sandhu, Er. Anupama Kaur
DOI: 10.090592/IJCSC.2015.625
|
42 |
An Approach to Sanskrit as Computational and Natural Language Processing
Inderjeet
DOI: 10.090592/IJCSC.2015.626
|
43 |
An architecture for Load Balancing Techniques for Fog Computing Environment
Manisha Verma, Neelam Bhardawaj, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.627
|
44 |
A Data Mining Tool for Network Fault Detection
Poonam Chaudhary & Vikram Singh
DOI: 10.090592/IJCSC.2015.628
|
45 |
A Review of Load Balancing Schemes for Cognitive Radio Networks
Ravneet Kaur, Er.Vimmi Malhotra, Dr. Dheerendra Singh
DOI: 10.090592/IJCSC.2015.629
|
46 |
Dynamic Web Services Composition using Optimization Approach
Kirit J. Modi, Sanjay Garg
DOI: 10.090592/IJCSC.2015.630
|
47 |
Discovery and Composition of Link Open Data based RESTful Web services
Kirit J. Modi, Sanjay Garg
DOI: 10.090592/IJCSC.2015.631
|
48 |
Fault Tolerance with Minimum Checkpoint Scheme and Low Energy Consumption Technique
Anil Vadhwa, SS Yadav, Preeti Yadav
DOI: 10.090592/IJCSC.2015.632
|
49 |
Comparative Analysis of Traditional Methods for Moving Object Detection in Video Sequence
Chirag I Patel, Sanjay Garg
DOI: 10.090592/IJCSC.2015.633
|
50 |
A Review: Detection of Clones in Wireless Sensor Network
Manisha R. Deore, R. V. Patil
DOI: 10.090592/IJCSC.2015.634
|
51 |
An energy efficient Swarm based Energy Hole Detection approach for Mobile Sensor Network
Dr. Yashwant Singh Sangwan
DOI: 10.090592/IJCSC.2015.635
|
52 |
Spatio-Temporal Outlier Detection Technique
K.P. Agrawal, Sanjay Garg, Pinkal Patel
DOI: 10.090592/IJCSC.2015.636
|
53 |
Performance Measures for Densed and Arbitrary Shaped Clusters
K.P. Agrawal, Sanjay Garg, Pinkal Patel
DOI: 10.090592/IJCSC.2015.637
|
54 |
Performance Comparison of Reactive Based Routing Protocols in MANET’s
Anil Kumar
DOI: 10.090592/IJCSC.2015.638
|
55 |
Deployment algorithms in Underwater Acoustic Wireless Sensor Networks: A Review
Archana Toky, Rishi Pal Singh, Sanjoy Das
DOI: 10.090592/IJCSC.2015.639
|
56 |
IDS and its Routing Protocols in MANET
Suraj Pal
DOI: 10.090592/IJCSC.2015.640
|
57 |
Routing Protocols in MANETS: A Review
Suraj Pal
DOI: 10.090592/IJCSC.2015.641
|
58 |
Digital Modulation Techniques Using MATLAB Script file and Graphical Approach
Seema jangra, Rajender Kumar
DOI: 10.090592/IJCSC.2015.642
|
|
|