Detail Cantuman
Advanced SearchJurnal
International Journal Of Computer Sciences & Information Technology (IJCSIT)
Tidak Tersedia Deskripsi
Ketersediaan
0136/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.6,NO.3 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0142/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7.NO.2 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0138/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.6.N0.3 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0139/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.6.NO.4 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0140/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.6.NO.4 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0141/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7,NO.1 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0137/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.6.NO.3 TIM i | Perpustakaan STMIK AKBA | Tersedia namun tidak untuk dipinjamkan - No Loan |
0143/JUR/AKBA/17 | JUR/KOMPUTER/2015 V0L.6.NO.5 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0144/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7.NO.3 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0145/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7.NO.4 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0146/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7,NO.5 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0147/JUR/AKBA/17 | JUR/KOMPUTER/2015 VOL.7,NO.6 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0148/JUR/AKBA/17 | JUR/KOMPUTER/2016 VOL.8,NO.1 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0149/JUR/AKBA/17 | JUR/KOMPUTER/2016 VOL.8,N0.2 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
0150/JUR/AKBA/17 | JUR/KOMPUTER/2017 VOL.8,NO.3 TIM i | Perpustakaan STMIK AKBA (A) | Tersedia namun tidak untuk dipinjamkan - No Loan |
Informasi Detil
Judul Seri |
-
|
---|---|
No. Panggil |
JUR KOMPUTER 15 TIM i
|
Penerbit | : ., 2015 |
Deskripsi Fisik |
1-3251 hlm.; 29,5 cm
|
Bahasa |
Indonesia
|
ISBN/ISSN |
0975-9646
|
Klasifikasi |
REF TIM i
|
Tipe Isi |
-
|
Tipe Media |
-
|
---|---|
Tipe Pembawa |
-
|
Edisi |
VOL.6,NO.4 2015
|
Subyek |
-
|
Info Detil Spesifik |
1. Captcha As Graphical Passwords. Oleh Kaylani S. Kumar, Pages : 1975-1985
2. An Innovative Approach To Diabetes Diagnosis. Oleh G. Nageswara Rao, V. Swetha, M. Rithvik, Pages : 1986-1989
3. Development of Android Mobile Application For Cloud Video Streaming Using Mobile Cloud Computing. Oleh Narsu Patil, Nitesh Patil, Anil Bagal, Mayuri Desai, Anita Bhosale, Pages : 1990-1993
4. Review on Block Based Transformation Image Encryption Techniques. Oleh Himani Patwa And Akhilesh Deep Arya, Pages : 1994-1995
5. Adaption Of Customer Relationship Management And Data Mining Tools In The Data Intensive Cloud Computing Environment. Oleh Sanjib Kumar Routray, Sasmita Mishra, Pages : 1996-2002
6. Parallel And Improved Page Rank Algorithm For GPU-CPU Collaborative Environment. Oleh Prasann Choudhari, Eikshith Baikampadi, Paresh Patil, Sanket Gadekar, Pages : 2003-2005
7. An Efficient RSA Based Technique For The Encryption And Decryption. Oleh Sharad Morolia, Manoj Dhawan, Pages : 2006-2009
8. A Comprehensive Survey on Fanet : Challenges And Advancements. Oleh Shashank Kumar Singh, Pages : 2010-2013
9. Database Search Orchestrator For Cloud Database. Oleh Shweta Agrawal, Raj Kamal, Pages : 2014-2017
10. Eliminating Redundancy In File System Using Data Compression And Secured File Sharing. Oleh Raakesh, Varun Raj G, Krishna R, L. Maria Michael Visuwasam, Pages : 2018-2022
11. Improving The Life Cycle Of Genetic Programming Using Feature Selection With Multiobjective Fitness Function. Oleh Rupali Koushal, Manoj Dhawan, Pages : 2023-2026
12. Secure And Economical Information Transmission For Cluster-Based Wireless Sensor Networks. Oleh Bhimashankar K. Dhurape, Swati S. Joshi, Pages : 2027-2030
13. EEG Signal Classification Using Modified Fuzzy Clustering Algorithm. Oleh Priyanka Jaiswal, Rupali Koushal, Pages : 2031-2034
14. A Survey On Techniques And Fundamentals Of Internet Accesss in VANET-INTERNET Integration Scenarios. Oleh Ujwala L. Mane, Aparna A. Junnarkar, Pages : 2035-2039
15. A Modified Classification Based Technique For More Accurate Classification & Prediction Of The Intrusion. Oleh Neha Agrawal, Priyanka Vijayvargiya, Pages : 2040-2042
16. A Survey On Various Image Enhancement Algorithms For Naturalness Preservation. Oleh Divya K. A, Roshna K. I, Pages : 2043-2045
17. Survey On Clustering Algorithms of Wireless Sensor Network. Oleh Mohini Kumrawat, manoj Dhawan, Pages : 2046-2049
18. Optimal Code Compiling In C. Oleh Nikita Gupta, Nistha Seth, Prabhat Verma, Pages : 2050-2057
19. Automatic Generation Of Owl For Domain based Applications. Oleh Neha Dalwadi. Pages : 2058-2060
20. An Image Indexing And Retrieval Method Using Local Tetra Pattern For Content-Based Image Retrieval (CBIR). Oleh Shraddha D. Jumade, Prof. Sheetal S. Dhande, pages : 2061-2064
21. A Literature Survey On Digital Image Processing Techniques In Character Recognition Of Indian Languages. Oleh Dr. Jangala Sasi Kiran, N. Vijaya Kumar, N. Sashi Prabha, M. Kavya, Pages : 2065-2069
22. OPEN FLOW : Innovating Campus Network. Oleh Prithvi Krishna D, Shrihari M. R., Ankitha Gowda, Pages : 2070-2075
23. A Study on Use Of Big Data in Cloud Computing Environment. Oleh Venkatesh H, Shrivatsa D. Perur, Nivedita Jalihal, Pages : 2076-2078
24. A Portable And Secure Healthcare Maintenance System. Oleh k. Sravani, B. Bindusha Reddy, R. R. V. N. V. Kumari, G. Vijay Kumar, Pages : 2079-2083
25. An Improved Method For Detection Of Satire From User-Generated Content. Oleh Syed Taha Owais, Tabrez Nafis, Seema Khanna, Pages : 2084-2088
26. Cloud Business Process Management & Data Security. Oleh Honey Tilwani, Pages : 2089-2093
27. Relieble Cloud Using Elliptical Curve Deffie Hellman And Elliptical Curve Digital Signature. Oleh Akash Shrivastava, Nitya M. Nerli, Pages : 2094-2096
28. Modified RSA Algorithm For (Wi-Fi) Security Protocol. Oleh T. Venkata Satya Vivek, D. Anandam, Ganta Anil, B. Sreenivasulu, V. Lakshma Reddy, M. Rao Batchnaboyina, Pages : 2097-2098
29. Load Balancing In Content Delivery Network Using Distributed Control Law. Oleh Chetana B. Bhagat, Dilip k. Budhwant, Pages : 2099-2105
30. Protecting The Finger Print Template by FUsion Of Ridges And Texture. Oleh Vidyasree. P, Dr. G. Venkata Rami Reddy, Pages : 2106-2110
31. Constrained Curve Drawing With C1Continuous Rational Quadratic Curve. Oleh Ashu Pal, Harshvardhan mathur, Pages : 2111-2114
32. Image Segmentation Based Face Recocnition Using Enhanced SPCA-KNN Methode. Oleh J. Savitha, Dr. A. V. Senthil Kumar, Pages : 2115-2120
33. An Intelligent in System Forecasting Electric Load And Price. Oleh Sushmita Tiwari, Vaishali Singh, Rajiv Kumar, Pages : 2121-2126
34. Identifying And Extracting Data From Clipboard. oleh Ganesh N. Nadargi, Zakir M. Shaikh, Pages : 2127-2129
35. A Review on Various RFID Based Automated ighway Toll Collection System. Oleh Venkatesh Suvarna And Jeet Patalia, Pages : 2130-2133
36. Tool For Extraction Of Functional Requirements From Legacy Code. Oleh Pooja Khanna, Pages : 2134-2138
37. Faster And Efficient Method For Robust Exemplar Based Inpainting Using Block Processing. Oleh Yogesh Laxman Tonape, Vinayak Pottigar, Swapanaja Ubale, Pages : 2139-2141
38. An Indirect Encryption Using Compression With Random Bit Stuffing. Oleh Dr. M. Ramesh, Dr. B. Hemanth Kumar, Prof. M. Surendra Prasad Babu, Pages : 2142-2144
39. Database Evaluation Considering The Decisive Factors For Obtaining an Optimistic Value to Predict The Daignose. Oleh M. Purnachandra Rao, N. Padmini Krishna, N. Jagannadh Varma, P. Rohini, V. Sri Divya, Pages : 2145-2149
40. Privacy Conflicts For Collaborative Data Sharing in Online Social Network. Oleh Sandip S. Shirgave, Prof. Subhash V. Pingale, Dr. K. J. Karande, Pages : 2150-2153
41. Implementing Capability Maturity Model For Hgher Education ERP Solution. Oleh Pinak Pani Chakrabarty, Pages : 2154-2158
42. A Comparative Study On Web Crawling For Searching Hidden Web. Oleh Beena Mahar, C. K. Jha, Pages : 2159-2163
43. NTP Based Smart Energy Meter. Oleh Chetana Dapse, Pages : 2164-2167
44. A Fuzzy Effective Approach to Perform Image Fusion on Medical Images. Oleh Shilpa, Nishant Jakhar, Prabhneet Kaur, Pages : 2168-2171
45. Detecting of Materialize Topical Trend Topic From Social Networks. Oleh Tamilmani. G, Rajathi. K, Ponnaruvi. P, Pages : 2172-2174
46. An Innovative Data Security Techniques Using Cryptography And Steganographic Techniques. Oleh Richa Dubey, Apurva Saxena, Sunita Gond, Pages : 2175-2182
47. Comparative Study of Data Dissemination Algorithm Based on Cluster Forming Parameters in Vehicular Ad-hoc Network. Oleh Arvind Kumar, Sudesh Rani, Pages : 2183-2186
48. Scalable transaction for Web Applications in The Cloud Using Customized Cloud TPS. Oleh Shashikant Mahadu Bankar, Pages : 2187-2191
49. User Authentication Using Multimodal Biometrics. Oleh Prashant Kumar Jain, Shailja Shukla, S. S. Thakur, Pages : 2192-2200
50. An Active Approach Based On Independent Component Analysis For Digital Image Forensics. Oleh Anil Dada Warbhe, R. V. Dharaskar, Pages : 2201-2203
51. Partial Image Encryption Using Block Shuffling And Affine Transform. Oleh Rakhi, Rekha Pandit, Pages : 2204-2207
52. Survey On Various Quantum Key Distribution Algorithms. Oleh Vivek Singh, Bhawna Chauhan, Pages : 2208-2209
53. Manufacturing Backend. Oleh Anusha Hiremath, Apoorva Dhavale, K. V. Roopa, Keertee Savadi, Aruna S. Nayak, Pages : 2210-2214
54. A Survey on Different Routing Protocols In Wireless Sensor Network. Oleh Nidhi Sharma, Pages : 2215-2220
55. An SVM-Fuzzy Expert System Design For Diabetes Risk Classification. Oleh Thirumalaimuthu Thirumalaiappan Ramanathan, Dharmendra Sharma, Pages : 2221-2226
56. Estimating The Optimal Number Of Servers For an Emergency Department Of A Private Hospital, via Mathematical Programming. Oleh Zeinab Yousef Mahmoud, Pages : 2227-2231
57. RFID Based Ticketing System For Local Trains. Oleh K. T. Patil, Dipti Mehendale, Vidya. S, Aldar Leena Govilkar, S. K. Narayankhedkar, Pages : 2232-2234
58. An Automatic Approach Towards Coloring Videos Using Monochrome Texture Descriptor & Parallel Processing. Oleh Gauri R. Joshi, Prof. Mayur S. Burange, Pages : 2235-2239
59. Distributed Cache Modernizing For The Multi-Source Transmitting Protocol. Oleh G. Thilipkumar, Dr. R. Balasubramanian, Pages : 2240-2243
60. Identify And Compare Discernment Rules For Accurate Liver Disorder Detection using Apriori And FP Generation Analysis. Oleh Gagandeep Kaur, Pages : 2244-2255
61. Elicitation Of information From Online Libraries Using Web Content Mining Methods And Applications. Oleh Rutvija Pandya, Jayati Pandya, Pages : 2256-2258
62. A Survey Of Quality Of Service Routing protocols in MANETs. Oleh Juned Ahmad, Samir Srivastava, P. K. Singh, Pages : 2259-2262
63. Power Consumption Analysis. Oleh Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia, Pages : 2263-2266
64. Efficient Packet Forwarding Technique in LEACH Protocol in Multisink Wireless Sensor Network. Oleh Nikha, Sheoran, Kaushik Ghosh, Pages : 2267-2271
65. E-mail Spam Filtering Using System Using Log Operator For Edge Detection And Radon Transform For Slant Correction. Oleh Jaya Gupta, prof. Supriya Agrawal, Pages : 2277-2286
67. A Study Combined DWT-DCT Digital Image Hiding Information. Oleh Jyoti Sahu, Dolley Shukla, Pages : 2282-2286
68. Sales prediction Using Effective Mining Techniques. Oleh Nirav Shah, Mayank Solanki, Aditya Tambe, Dnyaneshwar Dhangar, Pages : 2287-2289
69. Protecting Finger Print Privacy Combined Minutiae Template Generation Algorithm. Oleh Prabhakara Rao T, Gintanjali Sahu, Pages : 2290-2294
70. Watershed : An Image Segmentation Approach. Oleh Arindrajit Seal, Arunava Das, Prasad Sen, Pages : 2295-2297
71. Generating Placement Intelligence in Higher Education Using Data Mining. oleh Praveen Rani, Dr. Rajan Vohra, Pages : 2298-2302
72. Product Sales Prediction Based on Sentiment Analysis Using Twitter Data. Oleh Dipak Marakarkandy
73. Offline Handwritten Character Recognition in South Indian Scripts : A Broad Visualization. Oleh Sunitha Anne M. O. Chacko, Ansu Joseph, Jeena Joji Anchanattu, Sreelakshmi. S, Veena A. Kumar, Pages : 2314-2317
74. Tourview : Sentiment Based Analysis on Tourist Domain. Oleh Deepanshi Sharma, Achal Kulshreshtha, Priyanka Paygude, Pages : 2318-2320
75. Web Usage Mining Approaches For User's Request Prediction : A Survey. Oleh Avneet Saluja, Dr. Bhupesh Gour, Lokesh Singh, Pages : 2321-2325
76. Spam Outlier Detection in High Dimensional Data : Ensemble Subspace Clustering Approach. Oleh Suresh S. Kapare, Bharat A. Tidke, Pages : 2326-2329
77. Efficient Productivity For Recommendation Of Semantic Web Pages. Oleh B. Gayatri Devi, S. Soundarajan, Pages : 2330-2334
78. A Survey Paper on Video Steganography. Oleh Kedar Nath Choudry, Aakash Winjari, Pages : 2335-2338
79. A Survey on privacy Preservation Used in Data Mining Techniques. Oleh Haina Mahilary, Pages : 2339-2341
80. TRAODV : Trusted And Robust Adhoc On Demand Distance Vector Routing In MANET. Oleh Ravindra J. Mandale, Dadaso T. Mane, Pages : 2342-2346
81. Auditing Based Cloud Consistency as a Service For PHR Data. Oleh K. Brindha, T. K. P. Rajagopal, Pages : 2347-2348
82. A Basic Introduction To Devops Tools. Oleh Akshaya H.L, Nisarga Jagadish. S, Vidya. J, Veena. K. Pages : 2349-2353
83. A Review Of Various Linear And Non Linear Dimensionality Reduction Techniques. Oleh Sumithra V. S, Subu Surendra, Pages : 2354-2360
84. Expert Searchon Web Using Association Distribution. Oleh Poonam P. Rayakar, Prof. S. Pratap Singh, Pages : 2361-2363
85. Error Log Analysis Using Big Data And Map Reduce. Oleh Laurel Thejas Souza, Girish U. R, Pages : 2364-2367
86. Thwarting Perils Through Cloud Provisioning Using Security Issues in Vehicular Cloud. Oleh N. Nijanthan, B. Mohankumar, Dr. P. Marikkannu, Pages : 2368-2372
87. Review Of A Secure Approach To Prevent Packet Dropping And Message Tampering Attacks on AODV-Based MANETs. Oleh Arpana Akash Morey, jagdish W. Bakal, Pages : 2373-2376
88. Energy Enhancement And Performance Evaluation Of LAEEBA Routing Protocol In WBAN Using NS-2. Oleh Sheth Mahammed Ovesh I., Sarika Khandelwal, Pages : 2377-2383
89. Design & Implementation of Traffic Violation Monitoring System. Oleh Govind Prasad Arya, Durga Prasad Chauhan, Vishal Garg, Pages : 2384-2386
90. Design & Analysis Of Authentication of Moving Image Using Message Digest. Oleh Vijender Kumawat, Palika Jajoo, Pages : 2387-2394
91. Thyroid Classification Using Ensemble Model With Feature Selection. Oleh Suman Pandey, Anshu Tiwari, Akhilesh Kumar Shrivas And Vivek Sharma, Pages : 2395-2398
92. A Brief Introduction To Digital Water Marking. Oleh Ankita Sharma, Sarika Khandelwal, Pages : 2399-2401
93. Stateless Multicast Protocol For Ad-Hoc Networks. Oleh Trupti Patil, A. A. Phatak, Pages : 2402-2405
94. Minimun Broadcast Energy Conserving Protocol For Asymmetric WSN. Oleh Anujatai Patil, A. V. Mophare
95. An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier Stego Image. Oleh Shena A. Deshmukh, P. B. Sambhare, Pages : 2409-2414
96. Performance Analysis Of DSDV, DSR Routing Protocols in Vehicular Ad-Hoc Network (Vanets). Oleh V. Anji Reddy, P. Siva Prasuna, Rittika D. Varu , P. nikhila, N. Srilaksmi
97. Microcontroller Based Mechanised Videographing Of Text And Auto-Generation Of Voice Text In Real Time. Oleh P. Nagabhushan, Vimuktha Evangeleen Jathanna, Pages : 2419-2425
98. A Review Paper On Construction Of Query Forms. Oleh Jayashri M. Jambukar, Prof. M. B. Vaidya, Pages : 2426-2428
99. An Efficient Approach Towards Thunderstorm Detection Using Saliency Map. Oleh Rasika P. Gawande, Prof. Namrata D. Ghuse, Pages : 2429-2434
100. An Automated System For Signature Recognition And Authentication From Multishare Based Image Database. Oleh Sharayu S. Sangeka, D. C. Dhanwani, Pages : 2435-2440
101. User Anonymous Authentications Scheme For Decentralized Access Control In Clouds. Oleh Pooja R. Vyawhare, Prof. Namrata D. Ghuse, Pages : 2441-2447
102. Parallel Comparison Of Text Document With Input Data Mining And VizSFP. Oleh Priyanka P. Palsaniya, D. C. Dhanwani, Pages : 2448-2453
103. Modified Cat Swarm Optimization Algorithm For Design And Optimization Of IIR BS Filter. Oleh Kamalpreet Kaur Dhaliwal, Jaspreet Singh Dhillon, Pages : 2454-2460
104. Enhancing Firewall For Serving The Distributed Security Requirements For Cloud. Oleh Yamini Bangur, Vijendra Mandraha, Pages : 2161-2466
105. Detection Of Child Events With The Kinetic Components Of A Vehicle To Avoid The Hidden Dangers-A-Survey. Oleh Mortha Manasa Devi, Pages : 2567-2470
106. A Survey on Multiparty Access Control mechanism of Online Social Networks. Oleh Sandip Sharad Shirgave, Dr. K. J. Karande, Subhash V. Pingale, Prakash Gadekar, S. S. Kulkarni, Pages : 2471-2474
107. A Survey on Protection Against Power Depletion Attack in WSN. Oleh Sruthin R. V., Jayasudha J.S., Pages : 2475-2478
108. On Replication Strategies For Data Intensive Cloud Applications. Oleh Rashmi Ranjana T. P., Jayalaksmi D. S., Dr. Srinivasan. R, Pages : 2479-2484
109. A Review on Prediction Of Collective Behavior. Oleh Pranjali Deshmukh, R. M. Gawande, Pages : 2485-2487
110. VMAIL : Voice Based Email Application. Oleh Rahul Anwani, Usha Santuramani, Deeksha Raina, Priya R. L., Pages : 2488-2490
111. Analysis & Desain Of Multiple Watermarking in a Video For Authentication & Copyright Protection. Oleh Yogendra Sharma, Jitender Kumar, Yogesh Rathi, Pages : 2491-2497
112. Flower Detection And Counting Using Morphological And Segmentation Technique. Oleh Balvant. V, Santosh P. Shrikhande, Pages : 2498-2501
113. Predictive Analysis Of Diabetic Treatment Using Classification Algorithm. Oleh M. Mounika, S. D. Suganya, B. Vijayashanthi, S. Krishna Anand, Pages : 2502-2505
114. Crowdsourcing With Smartphones For Traffic Dissemination. Oleh Asha. K, Nasreen Taj. M. B, Pages : 2506-208
115. Enhancing Bandwidth in Route Recovery-An Approach Based on Forward And Reverse Path Routing With Hop-Count. Oleh Apoorva. P, Kumar Sharath. B. C, Manu Bhargav. M. R, Pages : 2509-2511
116. Performance Evaluation Of Quality Metrices Based Fault Predection Model For Replica Management In Cloud Computing. Oleh Ajitabh Mahalkari, Prof. Ritu Tondon, Pages : 2512-2518
117. Proficient Acquaintance Based System For Citrus Leaf Disease RecognitionAnd Categorization. Oleh K. Lalitha, K. Muthulaksmi, A. Vinothini, Pages : 2519-2524
118. Survey Of Various POS Tagging Techniques For Indian Regional Languages. Oleh Shubhangi Rathod, Sharvari Govilkar, Pages : 2525-2529
119. A New Approach of Fault Node Recovery in Wireless Sensor Network. Oleh Vibha Paradkar, Gajendra Singh, Kailash Patidar, Pages : 2530-2533
120. Analysis of The Fraud E-mails Using Truncated Gaussian Mixture Model And Ontological Application. Oleh Sreenivasulu. V, Satya Prasad. R, Pages : 2530-2533
121. Weight-Based-Priority Approach For Analyzing Data Using Traces And Filters. Oleh Mahendra S. Pandit, Pages : 2537-2540
122. A Survey on IP Address Assignment in a Mobile Ad-Hoc Network. Oleh Vibhoo Sachan, Samir Srivastava, P. K. Singh, Pages : 2541-2544
123. Evolution Of Mobile Wireless Technology From 0G to 5G. Oleh Mohammad Merajudin Mir, Dr. Sumit Kumar, Pages : 2545-2551
124. Penetration Testing. Oleh Raghavendra Pokuri, Chanikya Merugu, Naveen Battula, Pages : 2552-2553
125. Prediction Of Cancer Diseases Using Navie Bayes Classification. Oleh Shruthi. S, Mithun Mohan, Akshaya Aravind, Pages : 2554-2556
126. A Research Work on English to Marathi Hybrid Translation System. Oleh Pramod Salunkhe, M. Runal Bewoor, Dr. Suhas Patil, Pages : 2557-2560
127. Notion of Black Hole in Wireless Networks Targeting on iMANET. Oleh Natasha Tomar, Amit Chaudhary, Pages : 2561-2565
128. Private Preserving Publically Checking For Shared Data in the Cloud Usng Oruta. Oleh Ashwini. H, Mrutyunjay. B, Sangamesh. P, Smitha. D, Veeresh Biradar, Pages : 2566-2569
129. ObJect Scanning Based Road Obstacles Detection Weighted Sum Method. Oleh Neha Chalana, Lovnish Bansal, Pages : 2570-2573
130. Macnine Learning Approach To Detect Tuberculosis in Patients With or Without HIV Co-Infection A Survey. Oleh Ashwini D. V. And Dr. Seema. S, Pages : 2574-2578
131. Multi-Level Encryption Mechanism For Access Control Over Cloud Data. Oleh T. Kavitha, B. Narendra, C. Sushama, S. Shiva Prakash, Pages : 2579-2582
132. Analysis of Patter Matching Algorithms. Oleh Siva Kumar Kotamraju, Pages : 2583-2586
133. Fine Tuning Of Phylip on Intel Xeon Architecture. Oleh Prinkesh Sharma, Kondorpa Kumar Borchetia, Shivam Saxena, Pages : 2587-2592
134. Detection of Brain Tumors Using Learning Machine Approach And Spatial Fuzzy Segmentation. Oleh G. Lavanya, C. Suganthini, Pages : 2593-2596
135. Metaheuristic Based Approach To Regression Testing. Oleh Shweta Mitta, Om Prakash Sangwan, Pages : 2597-2605
136. Implementation of Location Based Steganography on mobile Smartphone Using Android Platform. Oleh Khushali Pandit, Varsha Bhosale, Pages : 2606-2609
137. HIDES : Hierarchical Based And An Energy Efficient Intrusion Detection System For Wireless Sensor Networks. Oleh B. Kamaladharan, Pages : 2610-2615
138. Data Mining And The News Boy Model in B2B E-Commerce Supply Chain. Oleh Minakshi Lalit Patil, Pages : 2616-2619
139. A Clustering Search Technique for Social Network Applications. Oleh Saurabh Sharma, Aravendra Kumar Sharma, Arun Kumar Sharma, Pages : 2620-2622
140. Enhancing Data Security And in Cloud Computing Environment. Oleh Shivali Munjal, Shelly Garg, Pages : 2623-2626
141. Enhanced Security Layer by Using Integration of Sound Signature And Graphical Password Authentication System. Oleh Manasa Bhat, Vanisha P. Santhmayor, Mahesh. K, Pages : 2627-2629
142. Hybrid Security Using Digital Signature & RSA Encryption For AODV in MANET. Oleh Shelbala Solanki, Anand Gadwal, Pages : 2630-2635
143. Comparitive Study of Uterine Cyst Characterisation Using Glcm And Wavelet Transform. Oleh Brindha. D, Kandaswamy. A, Subbashini. S, Pages : 2636-2640
144. A Comparative Analysis of M-GER And MODLEACH Energy Efficient WSN Protocols. Oleh Neeraj Dewli, Rashmi Saini, Pages :2641-2644
145. Image Matcher-Content Based Image Retrieval System Using Image Sub Blocks And Indexing. Oleh D. D. Pukale, Varsha H. Sakore, Nilima K. Shevate, Nutan D. Pawar, Priyanka N. Shendage, Pages: 2645-2652
146. Unambiguous Representation For Sliceable Rectangur Floorplans. Oleh Soumya Pratik Saha, Satrajit Ghosh, Pages : 2653-2657
147. Web Log Analyzer For Semantic Web Mining. Oleh Fakhrun Jamal, Mamta Bansal, Pages : 2658-2662
148. A Survey of Text Categorization And its Various Approaches. Oleh M. Maharasi, N. Antony Sophia, Pages : 2663-2666
149. Level of Ubiquity of Various Software Projects. Oleh Anil Kumar Mishra, Diksha Nagpal, Pages :
2667-2670
150. Data Based-Secure And Efficient Dynamic Clustering (DB-SEDC)For Data Aggregation in Wireless Sensor Network. Oleh Priya M. R, Chinnaswamy C. N, Sreenivas T. H, Pages : 2671-2673
151. Extension of Preserving Privacy Location in Social Networks. Oleh Ravi Konaraddi, Pages : 2674-2677
152. Survey on Identity Based Blind Signature. Oleh Girish, Krupa. K. T, Dr. Phaneendra H. D, Pages : 2678-2681
153. A Survey on Variuos Word Spotting Techniques For Content Based Document Image Retrieval. Oleh Blessy Varghese, Sharvari Govilkar, Pages : 2682-2686
154. A Comparative Study of Parallel Job Scheduling Algorithms in Cloud Computing. oleh A. Kousalya, R. Radhakrishnan, Pages : 2687-2690
155. An Overview of Concept Based And Advanced Text Clustering Methods. Oleh B. Jyothi, D. Sailaja, Y. Srunivasa Rao, Pages : 2691-2697
156. A Genetic Algorithm Based Average Percentage of Statement Coverage Technique For Test Case Ordering. Oleh Atul Kumar Pal, Makul Mahajan, Pages : 2698-2705
157. Offline Resource Extractor: An Efficient Resource Extraction System. Oleh N. P. Joshi, Pages : 2706-2709
158. Enhancing The Semantic of The Business Repository Components For More Efficient Web Services Discovery. Oleh Salim Baroudi, Mohamed Bahaj, Pages : 2710-2716
159. Link Initialization And Training in MAC Layer of PCle 3.0. Oleh Chandana K. N, Karunavathi R. K, Pages : 2717-2719
160. CAPTCHA Problems Based On Al Provide Protection Against Automated Hacking Tools. Oleh Priyanka K. Kukade, Prof. Ms. M. S. Deshmukh, Pages : 2720-2723
161. A Filter Base Addressing Protocol For Node Auto-Configuration in Wireless Ad-Hoc Network Using Cuckoo Filter. Oleh Bhushan A. Badgujar, Swati Patil, Mayur Agrawal, Pages : 2724-2728
162. Registration Plate Recognition From Still Images And Video in Real Time Conditions. Oleh Glence Joseph, Dr. Tripty Singh, Andan H.M, Aravind. G, Pages : 2729-2734
163. Topological Conditions For Maintaining Stabilization of Dynamic System. Oleh Dilip Budhwant, Bhagyashri Bhalekar, Pages : 2735-2737
164. Driver Evaluation System Using Mobile Phone And OBD-II System. Oleh Sujata Khedkar, Akshaykumar Oswal, Manjari Setty, Srinivas Ravi, Pages : 2738-2745
165. Research on Cloud Testing Based on Ontology And Multi-Agent Framework. Oleh Afaf Al-Neaimi, Pages : 2746-2749
166. Cross Domain Compoeition of Web Service Workflows using a Provenance Ontology With an Automated Re-planning. OLeh B. Meenakshi Sundaram, Dr. D. Manimegalai, Pages : 2750-2753
167. A Hybrid Security Service To Achieve Strong Authentication And Cryptography For Cloud Applications. Oleh Vivek Dandir, Prof. Mohsin Sheikh, Pages : 2754-2760
168. Self-Navigating Quadcopter. Oleh O Guneshwor Singh, Pages : 2761-2765
169. Slope Swith Variable Value Prediction Using Two Dimensional Curve Fitting For a Limited Data Mining Set. Oleh Venkatesh Suvarna, Pages : 2766-2767
170. Displaying Crisis Informing For Auto Collision Over Dichotomized Progress Demonstrate in Vehicular Ad-Hoc System. Oleh Veena. R. C, Pages : 2768-2771
171. On The Advancements in Cloud Computing Technology: An Overview. Oleh Majed Alhaisoni, Pages : 2772-2778
172. Adaptive Fault Free And Secured Path Selection in Wireless Sensor Networks. Oleh Deepali Virmani, Pranav Gupta, Pages : 2779-2781
173. Voting Methods For Malware Detection. Oleh Pranit Gaikwad, Dilip Motwani, Pages : 2782-2786
174. Ensuring Data Security on Cloud. Oleh Jitendra Kumar Seth, Satish Chandra, Pages : 2787-2790
175. Secured Data Sharing in The Cloud. Oleh Amrut Hunashyal, Chetak Patil, Vilas Balaganur, Pages : 2791-2793
176. Challenges in Design And Development of EEG Based BCI : A Review. Oleh Vaishali Kadam, Dr. R.R. Deshmukh, Pages : 2794-2796
177. An Enhanced Function Point Analysis (FPA) Method For Software Size Estimation. Oleh Nilesh Choursiya, Rashmi Yadav, Pages : 2797-299
178. Are You A Human or Robot? or Everything CAPTCHA. Oleh Revati Ghadge, Archana M. Naware, Pages : 2800-2805
179. Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks. Oleh Besty Haris, 2806-2809
180. BYOD : Usability. Oleh Abha Tewari, Pooja Nagdev, Kiran Israni, Pages : 2810-2814
181. Assessment of Document Similarity With Clustering Using Multi View-Points. Oleh Sindhudarshini. S, Suresh. G. S, Pages : 2815-2818
182. Dynamic Environment Exploration Tool : A Blind's Eye. Oleh Dushyant Kumar Singh, Pages : 2819-2822
183. Securing Broker-less Publish/Subsribe System Using Fuzzy Identity-Based Encryption. Oleh Maithily. b, Swathi. Y, Pages : 2823-2826
184. Trustworthy Resource Sharing on Colleborative Cloud Computing. Oleh T. Amith Kumar, G. Priya, N. Jaisankar, Pages : 2827-2830
185. Effective Personalization of Web Seacrh Based on Fuzzy Information Retrieval. Oleh Suruchi Chawla, Pages : 2831-2837
186. Data Driven Data Mining Model For Biological Pathways. Oleh N. Sevugapandi And Dr. C. P. Chandran
187. Study And Analysis of Digital Image Enhancement. Oleh Sanjib Das, Niranjan Cannon, Pages : 2841-2848
188. A Survey of News Article Clustering And Summarization. Oleh Purabi Choudhury, Pages : 2849-2851
189. Emphasizing Big Data Engineering And Software Architecture on Cloud Computing. Oleh Mohammed Faisal, Tamil Selvi Madeswaran, Sanjay Gupta, Pages : 2852-2855
190. Bi-Variate Gaussian Mixture Model Based Techniques For Effective Analysis of Cyber Crimes. Oleh V. Sreenivasulu, R. Satya Prasad, Pages : 2856-2858
191. Collaboration in Multicloud Computing Environments: Framework And Security Issues. Oleh Madivalayya M. Hiremath, Annapurna P. Patil, Pages : 2859-2862
192. Finger-Knuckle-Print Based Recognition System Using LBP And SURF. Oleh Salil Kumar Verma, Maitreyee Dutta, Pages : 2863-2867
193. Classification Of Unstructured Data Using Soft Computing: A Survey. Oleh Swati Wakode, Rakesh Mallesh, Mandar Wagh, Manisha P. Mali, Pages : 2868-2870
194. Big Data Analysis Using Partition Technique. Oleh Prasadkumar Kale And Arti Mohanpurkar, Pages : 2871-2875
195. Single Page Application Using Angular JS. Oleh Madhuri A. Jadhav, Balkrishna R. Sawant, Anushree Deshmukh, Pages : 2876-2879
196. Perspective Identification of Indian Musical Instrument Ghan And Sushir Vadya. Oleh Satish Ramling Sankaye, S. C. Mehrotra, U. S. Tandon, Pages : 2880-2883
197. Automating The Payment of Toll Tax at Toll Plazas. Oleh Kruti Sanghvi, Prof. Amol Joglekar, Pages : 2884-2887
198. Collaborative Filtering Approach For Big Data Applications in Social Networks. Oleh Rajeswari. M, Pages : 2888-2892
199. A Survey Unsupervised Extraction of Product Information From Semi-Structured Sources. Oleh Abhilasha Bhagat, Vanita raut, Pages : 2893-2897
200. A Preventing Privacy Leakage And Discrimination Enabled Vulnerabilities in Data Publishing And Mining. Oleh Pujari Sasidhar, K. R. K. Satheesh, Pages : 2898-2901
201. Controlling Air Conditioner (Temperature And AirFlow) Using Wireless Sensor Network And iSense Technology. Oleh Karthik. SK, Maheshwari kittur, Suraj M. Halakatti And Vineetkumar Patil, Pages : 2902-2906
202. Classification of Music Based on Clave Direction Using Machine Learning Techniques. Oleh Sabina, M.A, Pages : 2907-2909
203. Application of Data Mining in Adaptive And Intelligent Tutoring Systems: A review. Oleh Rajitha Koppisetty, Pages : 2910-2917
204. A Survey Paper on Automatic Speech Recognition by Machine. Oleh Dinesh Kumar Dansena, Yogesh Rathore, Pages : 2918-2922
205. Real Time Opinion Mining Of Twitter Data. Oleh Narahari P. Rao, S. Nitin Srinivas And Prashanth C. M, Pages : 2923-2927
206. A Review: Data Mining Technique Used In Eeducation Sector. Oleh Johina, Vikas Kamra, Pages : 2928-2930
207. Application of Image Segmentation Techniques on Medical Reports. Oleh Chandni Panchasara, Amol Joglekar, Pages : 2931-2933
208. An Approach For Data Integrity Checking And Data Recovery in Cloud Data Storege. Oleh Charmee V. Desai, prof. Gordhan B. Jethava, Pages : 2934-2937
209. A Novel Speech Recognition System For Punjabi Language: A Review. Oleh Harpreet Kaur, Pages : 2938-2940
210. Zone Based And Morphological Based Feature Extraction Techniques For English Alphabets. Oleh Saleem Pasha, Ajay Kumar, Syed Younus Hussain, Amritansh, Mohammed Shafi Ul Umam, Pages : 2941-2944
211. Improved Method of Single Image Dehazing Based on Multi-Scale Fusion. Oleh Neha Padole, Akhil Khare, Pages : 2945-2949
212. Implementation of Home Security System UsingGSM Module And Microcontroller. Oleh Abhishek S. Parab, Amol Joglekar, Pages : 2950-2953
213. Cell Phone Controller Robot With Fire Detection Sensors. Oleh Lakshay Arora, prof. Amol Jaglekar, Pages : 2954-2958
214. Use Of Hidden Markov's Model For Handwritten Kannada Character Recognition. Oleh Akshayparvatikar, Veena G. S, Pages : 2959-2960
215. Denial-Of-Service Attack Detection Technique Derived From Statistical Traffic Analysis. Oleh Sanjivani Sumant, Prof. Sweta Kale, Pages : 2961-2964
216. An Efficient And Compact Indexing Scheme For Large-Scale Data Store. Oleh Sanjivani Sumant, Prof. Sweta kale
217. Speech Emotion Recognition by Gaussian Mixture Model. Oleh Reshma, Maninder, Amarbir Singh, Pages : 2969-2971
218. Simple Application of GlusterFs: Distributed File System For Academics. Oleh Shyam C. Deshmukh, Prof. Sudarshan S. Deshmukh, Pages : 2972-2974
219. Enhanced Minimun Utilization VM Selection Mechanism For Clouds. Oleh Versha Lodhi, Prof. SarveshRai, Ganesh Kumar Viswakarma, Pages : 2975-2977
220. Enhancement Of Face Recognition Rate by Data Base pre-processing. Oleh harihara Santosh Dadi, P. G. Krishna Mohan,
|
Pernyataan Tanggungjawab |
-
|
Versi lain/terkait
Tidak tersedia versi lain