No image available for this title

Jurnal

International Journal Of Computer Sciences & Information Technology (IJCSIT)



Tidak Tersedia Deskripsi


Ketersediaan

0136/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.6,NO.3 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0142/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7.NO.2 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0138/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.6.N0.3 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0139/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.6.NO.4 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0140/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.6.NO.4 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0141/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7,NO.1 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0137/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.6.NO.3 TIM iPerpustakaan STMIK AKBATersedia namun tidak untuk dipinjamkan - No Loan
0143/JUR/AKBA/17JUR/KOMPUTER/2015 V0L.6.NO.5 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0144/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7.NO.3 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0145/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7.NO.4 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0146/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7,NO.5 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0147/JUR/AKBA/17JUR/KOMPUTER/2015 VOL.7,NO.6 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0148/JUR/AKBA/17JUR/KOMPUTER/2016 VOL.8,NO.1 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0149/JUR/AKBA/17JUR/KOMPUTER/2016 VOL.8,N0.2 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan
0150/JUR/AKBA/17JUR/KOMPUTER/2017 VOL.8,NO.3 TIM iPerpustakaan STMIK AKBA (A)Tersedia namun tidak untuk dipinjamkan - No Loan

Informasi Detil

Judul Seri
-
No. Panggil
JUR KOMPUTER 15 TIM i
Penerbit : .,
Deskripsi Fisik
1-3251 hlm.; 29,5 cm
Bahasa
Indonesia
ISBN/ISSN
0975-9646
Klasifikasi
REF TIM i
Tipe Isi
-
Tipe Media
-
Tipe Pembawa
-
Edisi
VOL.6,NO.4 2015
Subyek
-
Info Detil Spesifik
1. Captcha As Graphical Passwords. Oleh Kaylani S. Kumar, Pages : 1975-1985 2. An Innovative Approach To Diabetes Diagnosis. Oleh G. Nageswara Rao, V. Swetha, M. Rithvik, Pages : 1986-1989 3. Development of Android Mobile Application For Cloud Video Streaming Using Mobile Cloud Computing. Oleh Narsu Patil, Nitesh Patil, Anil Bagal, Mayuri Desai, Anita Bhosale, Pages : 1990-1993 4. Review on Block Based Transformation Image Encryption Techniques. Oleh Himani Patwa And Akhilesh Deep Arya, Pages : 1994-1995 5. Adaption Of Customer Relationship Management And Data Mining Tools In The Data Intensive Cloud Computing Environment. Oleh Sanjib Kumar Routray, Sasmita Mishra, Pages : 1996-2002 6. Parallel And Improved Page Rank Algorithm For GPU-CPU Collaborative Environment. Oleh Prasann Choudhari, Eikshith Baikampadi, Paresh Patil, Sanket Gadekar, Pages : 2003-2005 7. An Efficient RSA Based Technique For The Encryption And Decryption. Oleh Sharad Morolia, Manoj Dhawan, Pages : 2006-2009 8. A Comprehensive Survey on Fanet : Challenges And Advancements. Oleh Shashank Kumar Singh, Pages : 2010-2013 9. Database Search Orchestrator For Cloud Database. Oleh Shweta Agrawal, Raj Kamal, Pages : 2014-2017 10. Eliminating Redundancy In File System Using Data Compression And Secured File Sharing. Oleh Raakesh, Varun Raj G, Krishna R, L. Maria Michael Visuwasam, Pages : 2018-2022 11. Improving The Life Cycle Of Genetic Programming Using Feature Selection With Multiobjective Fitness Function. Oleh Rupali Koushal, Manoj Dhawan, Pages : 2023-2026 12. Secure And Economical Information Transmission For Cluster-Based Wireless Sensor Networks. Oleh Bhimashankar K. Dhurape, Swati S. Joshi, Pages : 2027-2030 13. EEG Signal Classification Using Modified Fuzzy Clustering Algorithm. Oleh Priyanka Jaiswal, Rupali Koushal, Pages : 2031-2034 14. A Survey On Techniques And Fundamentals Of Internet Accesss in VANET-INTERNET Integration Scenarios. Oleh Ujwala L. Mane, Aparna A. Junnarkar, Pages : 2035-2039 15. A Modified Classification Based Technique For More Accurate Classification & Prediction Of The Intrusion. Oleh Neha Agrawal, Priyanka Vijayvargiya, Pages : 2040-2042 16. A Survey On Various Image Enhancement Algorithms For Naturalness Preservation. Oleh Divya K. A, Roshna K. I, Pages : 2043-2045 17. Survey On Clustering Algorithms of Wireless Sensor Network. Oleh Mohini Kumrawat, manoj Dhawan, Pages : 2046-2049 18. Optimal Code Compiling In C. Oleh Nikita Gupta, Nistha Seth, Prabhat Verma, Pages : 2050-2057 19. Automatic Generation Of Owl For Domain based Applications. Oleh Neha Dalwadi. Pages : 2058-2060 20. An Image Indexing And Retrieval Method Using Local Tetra Pattern For Content-Based Image Retrieval (CBIR). Oleh Shraddha D. Jumade, Prof. Sheetal S. Dhande, pages : 2061-2064 21. A Literature Survey On Digital Image Processing Techniques In Character Recognition Of Indian Languages. Oleh Dr. Jangala Sasi Kiran, N. Vijaya Kumar, N. Sashi Prabha, M. Kavya, Pages : 2065-2069 22. OPEN FLOW : Innovating Campus Network. Oleh Prithvi Krishna D, Shrihari M. R., Ankitha Gowda, Pages : 2070-2075 23. A Study on Use Of Big Data in Cloud Computing Environment. Oleh Venkatesh H, Shrivatsa D. Perur, Nivedita Jalihal, Pages : 2076-2078 24. A Portable And Secure Healthcare Maintenance System. Oleh k. Sravani, B. Bindusha Reddy, R. R. V. N. V. Kumari, G. Vijay Kumar, Pages : 2079-2083 25. An Improved Method For Detection Of Satire From User-Generated Content. Oleh Syed Taha Owais, Tabrez Nafis, Seema Khanna, Pages : 2084-2088 26. Cloud Business Process Management & Data Security. Oleh Honey Tilwani, Pages : 2089-2093 27. Relieble Cloud Using Elliptical Curve Deffie Hellman And Elliptical Curve Digital Signature. Oleh Akash Shrivastava, Nitya M. Nerli, Pages : 2094-2096 28. Modified RSA Algorithm For (Wi-Fi) Security Protocol. Oleh T. Venkata Satya Vivek, D. Anandam, Ganta Anil, B. Sreenivasulu, V. Lakshma Reddy, M. Rao Batchnaboyina, Pages : 2097-2098 29. Load Balancing In Content Delivery Network Using Distributed Control Law. Oleh Chetana B. Bhagat, Dilip k. Budhwant, Pages : 2099-2105 30. Protecting The Finger Print Template by FUsion Of Ridges And Texture. Oleh Vidyasree. P, Dr. G. Venkata Rami Reddy, Pages : 2106-2110 31. Constrained Curve Drawing With C1Continuous Rational Quadratic Curve. Oleh Ashu Pal, Harshvardhan mathur, Pages : 2111-2114 32. Image Segmentation Based Face Recocnition Using Enhanced SPCA-KNN Methode. Oleh J. Savitha, Dr. A. V. Senthil Kumar, Pages : 2115-2120 33. An Intelligent in System Forecasting Electric Load And Price. Oleh Sushmita Tiwari, Vaishali Singh, Rajiv Kumar, Pages : 2121-2126 34. Identifying And Extracting Data From Clipboard. oleh Ganesh N. Nadargi, Zakir M. Shaikh, Pages : 2127-2129 35. A Review on Various RFID Based Automated ighway Toll Collection System. Oleh Venkatesh Suvarna And Jeet Patalia, Pages : 2130-2133 36. Tool For Extraction Of Functional Requirements From Legacy Code. Oleh Pooja Khanna, Pages : 2134-2138 37. Faster And Efficient Method For Robust Exemplar Based Inpainting Using Block Processing. Oleh Yogesh Laxman Tonape, Vinayak Pottigar, Swapanaja Ubale, Pages : 2139-2141 38. An Indirect Encryption Using Compression With Random Bit Stuffing. Oleh Dr. M. Ramesh, Dr. B. Hemanth Kumar, Prof. M. Surendra Prasad Babu, Pages : 2142-2144 39. Database Evaluation Considering The Decisive Factors For Obtaining an Optimistic Value to Predict The Daignose. Oleh M. Purnachandra Rao, N. Padmini Krishna, N. Jagannadh Varma, P. Rohini, V. Sri Divya, Pages : 2145-2149 40. Privacy Conflicts For Collaborative Data Sharing in Online Social Network. Oleh Sandip S. Shirgave, Prof. Subhash V. Pingale, Dr. K. J. Karande, Pages : 2150-2153 41. Implementing Capability Maturity Model For Hgher Education ERP Solution. Oleh Pinak Pani Chakrabarty, Pages : 2154-2158 42. A Comparative Study On Web Crawling For Searching Hidden Web. Oleh Beena Mahar, C. K. Jha, Pages : 2159-2163 43. NTP Based Smart Energy Meter. Oleh Chetana Dapse, Pages : 2164-2167 44. A Fuzzy Effective Approach to Perform Image Fusion on Medical Images. Oleh Shilpa, Nishant Jakhar, Prabhneet Kaur, Pages : 2168-2171 45. Detecting of Materialize Topical Trend Topic From Social Networks. Oleh Tamilmani. G, Rajathi. K, Ponnaruvi. P, Pages : 2172-2174 46. An Innovative Data Security Techniques Using Cryptography And Steganographic Techniques. Oleh Richa Dubey, Apurva Saxena, Sunita Gond, Pages : 2175-2182 47. Comparative Study of Data Dissemination Algorithm Based on Cluster Forming Parameters in Vehicular Ad-hoc Network. Oleh Arvind Kumar, Sudesh Rani, Pages : 2183-2186 48. Scalable transaction for Web Applications in The Cloud Using Customized Cloud TPS. Oleh Shashikant Mahadu Bankar, Pages : 2187-2191 49. User Authentication Using Multimodal Biometrics. Oleh Prashant Kumar Jain, Shailja Shukla, S. S. Thakur, Pages : 2192-2200 50. An Active Approach Based On Independent Component Analysis For Digital Image Forensics. Oleh Anil Dada Warbhe, R. V. Dharaskar, Pages : 2201-2203 51. Partial Image Encryption Using Block Shuffling And Affine Transform. Oleh Rakhi, Rekha Pandit, Pages : 2204-2207 52. Survey On Various Quantum Key Distribution Algorithms. Oleh Vivek Singh, Bhawna Chauhan, Pages : 2208-2209 53. Manufacturing Backend. Oleh Anusha Hiremath, Apoorva Dhavale, K. V. Roopa, Keertee Savadi, Aruna S. Nayak, Pages : 2210-2214 54. A Survey on Different Routing Protocols In Wireless Sensor Network. Oleh Nidhi Sharma, Pages : 2215-2220 55. An SVM-Fuzzy Expert System Design For Diabetes Risk Classification. Oleh Thirumalaimuthu Thirumalaiappan Ramanathan, Dharmendra Sharma, Pages : 2221-2226 56. Estimating The Optimal Number Of Servers For an Emergency Department Of A Private Hospital, via Mathematical Programming. Oleh Zeinab Yousef Mahmoud, Pages : 2227-2231 57. RFID Based Ticketing System For Local Trains. Oleh K. T. Patil, Dipti Mehendale, Vidya. S, Aldar Leena Govilkar, S. K. Narayankhedkar, Pages : 2232-2234 58. An Automatic Approach Towards Coloring Videos Using Monochrome Texture Descriptor & Parallel Processing. Oleh Gauri R. Joshi, Prof. Mayur S. Burange, Pages : 2235-2239 59. Distributed Cache Modernizing For The Multi-Source Transmitting Protocol. Oleh G. Thilipkumar, Dr. R. Balasubramanian, Pages : 2240-2243 60. Identify And Compare Discernment Rules For Accurate Liver Disorder Detection using Apriori And FP Generation Analysis. Oleh Gagandeep Kaur, Pages : 2244-2255 61. Elicitation Of information From Online Libraries Using Web Content Mining Methods And Applications. Oleh Rutvija Pandya, Jayati Pandya, Pages : 2256-2258 62. A Survey Of Quality Of Service Routing protocols in MANETs. Oleh Juned Ahmad, Samir Srivastava, P. K. Singh, Pages : 2259-2262 63. Power Consumption Analysis. Oleh Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia, Pages : 2263-2266 64. Efficient Packet Forwarding Technique in LEACH Protocol in Multisink Wireless Sensor Network. Oleh Nikha, Sheoran, Kaushik Ghosh, Pages : 2267-2271 65. E-mail Spam Filtering Using System Using Log Operator For Edge Detection And Radon Transform For Slant Correction. Oleh Jaya Gupta, prof. Supriya Agrawal, Pages : 2277-2286 67. A Study Combined DWT-DCT Digital Image Hiding Information. Oleh Jyoti Sahu, Dolley Shukla, Pages : 2282-2286 68. Sales prediction Using Effective Mining Techniques. Oleh Nirav Shah, Mayank Solanki, Aditya Tambe, Dnyaneshwar Dhangar, Pages : 2287-2289 69. Protecting Finger Print Privacy Combined Minutiae Template Generation Algorithm. Oleh Prabhakara Rao T, Gintanjali Sahu, Pages : 2290-2294 70. Watershed : An Image Segmentation Approach. Oleh Arindrajit Seal, Arunava Das, Prasad Sen, Pages : 2295-2297 71. Generating Placement Intelligence in Higher Education Using Data Mining. oleh Praveen Rani, Dr. Rajan Vohra, Pages : 2298-2302 72. Product Sales Prediction Based on Sentiment Analysis Using Twitter Data. Oleh Dipak Marakarkandy 73. Offline Handwritten Character Recognition in South Indian Scripts : A Broad Visualization. Oleh Sunitha Anne M. O. Chacko, Ansu Joseph, Jeena Joji Anchanattu, Sreelakshmi. S, Veena A. Kumar, Pages : 2314-2317 74. Tourview : Sentiment Based Analysis on Tourist Domain. Oleh Deepanshi Sharma, Achal Kulshreshtha, Priyanka Paygude, Pages : 2318-2320 75. Web Usage Mining Approaches For User's Request Prediction : A Survey. Oleh Avneet Saluja, Dr. Bhupesh Gour, Lokesh Singh, Pages : 2321-2325 76. Spam Outlier Detection in High Dimensional Data : Ensemble Subspace Clustering Approach. Oleh Suresh S. Kapare, Bharat A. Tidke, Pages : 2326-2329 77. Efficient Productivity For Recommendation Of Semantic Web Pages. Oleh B. Gayatri Devi, S. Soundarajan, Pages : 2330-2334 78. A Survey Paper on Video Steganography. Oleh Kedar Nath Choudry, Aakash Winjari, Pages : 2335-2338 79. A Survey on privacy Preservation Used in Data Mining Techniques. Oleh Haina Mahilary, Pages : 2339-2341 80. TRAODV : Trusted And Robust Adhoc On Demand Distance Vector Routing In MANET. Oleh Ravindra J. Mandale, Dadaso T. Mane, Pages : 2342-2346 81. Auditing Based Cloud Consistency as a Service For PHR Data. Oleh K. Brindha, T. K. P. Rajagopal, Pages : 2347-2348 82. A Basic Introduction To Devops Tools. Oleh Akshaya H.L, Nisarga Jagadish. S, Vidya. J, Veena. K. Pages : 2349-2353 83. A Review Of Various Linear And Non Linear Dimensionality Reduction Techniques. Oleh Sumithra V. S, Subu Surendra, Pages : 2354-2360 84. Expert Searchon Web Using Association Distribution. Oleh Poonam P. Rayakar, Prof. S. Pratap Singh, Pages : 2361-2363 85. Error Log Analysis Using Big Data And Map Reduce. Oleh Laurel Thejas Souza, Girish U. R, Pages : 2364-2367 86. Thwarting Perils Through Cloud Provisioning Using Security Issues in Vehicular Cloud. Oleh N. Nijanthan, B. Mohankumar, Dr. P. Marikkannu, Pages : 2368-2372 87. Review Of A Secure Approach To Prevent Packet Dropping And Message Tampering Attacks on AODV-Based MANETs. Oleh Arpana Akash Morey, jagdish W. Bakal, Pages : 2373-2376 88. Energy Enhancement And Performance Evaluation Of LAEEBA Routing Protocol In WBAN Using NS-2. Oleh Sheth Mahammed Ovesh I., Sarika Khandelwal, Pages : 2377-2383 89. Design & Implementation of Traffic Violation Monitoring System. Oleh Govind Prasad Arya, Durga Prasad Chauhan, Vishal Garg, Pages : 2384-2386 90. Design & Analysis Of Authentication of Moving Image Using Message Digest. Oleh Vijender Kumawat, Palika Jajoo, Pages : 2387-2394 91. Thyroid Classification Using Ensemble Model With Feature Selection. Oleh Suman Pandey, Anshu Tiwari, Akhilesh Kumar Shrivas And Vivek Sharma, Pages : 2395-2398 92. A Brief Introduction To Digital Water Marking. Oleh Ankita Sharma, Sarika Khandelwal, Pages : 2399-2401 93. Stateless Multicast Protocol For Ad-Hoc Networks. Oleh Trupti Patil, A. A. Phatak, Pages : 2402-2405 94. Minimun Broadcast Energy Conserving Protocol For Asymmetric WSN. Oleh Anujatai Patil, A. V. Mophare 95. An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier Stego Image. Oleh Shena A. Deshmukh, P. B. Sambhare, Pages : 2409-2414 96. Performance Analysis Of DSDV, DSR Routing Protocols in Vehicular Ad-Hoc Network (Vanets). Oleh V. Anji Reddy, P. Siva Prasuna, Rittika D. Varu , P. nikhila, N. Srilaksmi 97. Microcontroller Based Mechanised Videographing Of Text And Auto-Generation Of Voice Text In Real Time. Oleh P. Nagabhushan, Vimuktha Evangeleen Jathanna, Pages : 2419-2425 98. A Review Paper On Construction Of Query Forms. Oleh Jayashri M. Jambukar, Prof. M. B. Vaidya, Pages : 2426-2428 99. An Efficient Approach Towards Thunderstorm Detection Using Saliency Map. Oleh Rasika P. Gawande, Prof. Namrata D. Ghuse, Pages : 2429-2434 100. An Automated System For Signature Recognition And Authentication From Multishare Based Image Database. Oleh Sharayu S. Sangeka, D. C. Dhanwani, Pages : 2435-2440 101. User Anonymous Authentications Scheme For Decentralized Access Control In Clouds. Oleh Pooja R. Vyawhare, Prof. Namrata D. Ghuse, Pages : 2441-2447 102. Parallel Comparison Of Text Document With Input Data Mining And VizSFP. Oleh Priyanka P. Palsaniya, D. C. Dhanwani, Pages : 2448-2453 103. Modified Cat Swarm Optimization Algorithm For Design And Optimization Of IIR BS Filter. Oleh Kamalpreet Kaur Dhaliwal, Jaspreet Singh Dhillon, Pages : 2454-2460 104. Enhancing Firewall For Serving The Distributed Security Requirements For Cloud. Oleh Yamini Bangur, Vijendra Mandraha, Pages : 2161-2466 105. Detection Of Child Events With The Kinetic Components Of A Vehicle To Avoid The Hidden Dangers-A-Survey. Oleh Mortha Manasa Devi, Pages : 2567-2470 106. A Survey on Multiparty Access Control mechanism of Online Social Networks. Oleh Sandip Sharad Shirgave, Dr. K. J. Karande, Subhash V. Pingale, Prakash Gadekar, S. S. Kulkarni, Pages : 2471-2474 107. A Survey on Protection Against Power Depletion Attack in WSN. Oleh Sruthin R. V., Jayasudha J.S., Pages : 2475-2478 108. On Replication Strategies For Data Intensive Cloud Applications. Oleh Rashmi Ranjana T. P., Jayalaksmi D. S., Dr. Srinivasan. R, Pages : 2479-2484 109. A Review on Prediction Of Collective Behavior. Oleh Pranjali Deshmukh, R. M. Gawande, Pages : 2485-2487 110. VMAIL : Voice Based Email Application. Oleh Rahul Anwani, Usha Santuramani, Deeksha Raina, Priya R. L., Pages : 2488-2490 111. Analysis & Desain Of Multiple Watermarking in a Video For Authentication & Copyright Protection. Oleh Yogendra Sharma, Jitender Kumar, Yogesh Rathi, Pages : 2491-2497 112. Flower Detection And Counting Using Morphological And Segmentation Technique. Oleh Balvant. V, Santosh P. Shrikhande, Pages : 2498-2501 113. Predictive Analysis Of Diabetic Treatment Using Classification Algorithm. Oleh M. Mounika, S. D. Suganya, B. Vijayashanthi, S. Krishna Anand, Pages : 2502-2505 114. Crowdsourcing With Smartphones For Traffic Dissemination. Oleh Asha. K, Nasreen Taj. M. B, Pages : 2506-208 115. Enhancing Bandwidth in Route Recovery-An Approach Based on Forward And Reverse Path Routing With Hop-Count. Oleh Apoorva. P, Kumar Sharath. B. C, Manu Bhargav. M. R, Pages : 2509-2511 116. Performance Evaluation Of Quality Metrices Based Fault Predection Model For Replica Management In Cloud Computing. Oleh Ajitabh Mahalkari, Prof. Ritu Tondon, Pages : 2512-2518 117. Proficient Acquaintance Based System For Citrus Leaf Disease RecognitionAnd Categorization. Oleh K. Lalitha, K. Muthulaksmi, A. Vinothini, Pages : 2519-2524 118. Survey Of Various POS Tagging Techniques For Indian Regional Languages. Oleh Shubhangi Rathod, Sharvari Govilkar, Pages : 2525-2529 119. A New Approach of Fault Node Recovery in Wireless Sensor Network. Oleh Vibha Paradkar, Gajendra Singh, Kailash Patidar, Pages : 2530-2533 120. Analysis of The Fraud E-mails Using Truncated Gaussian Mixture Model And Ontological Application. Oleh Sreenivasulu. V, Satya Prasad. R, Pages : 2530-2533 121. Weight-Based-Priority Approach For Analyzing Data Using Traces And Filters. Oleh Mahendra S. Pandit, Pages : 2537-2540 122. A Survey on IP Address Assignment in a Mobile Ad-Hoc Network. Oleh Vibhoo Sachan, Samir Srivastava, P. K. Singh, Pages : 2541-2544 123. Evolution Of Mobile Wireless Technology From 0G to 5G. Oleh Mohammad Merajudin Mir, Dr. Sumit Kumar, Pages : 2545-2551 124. Penetration Testing. Oleh Raghavendra Pokuri, Chanikya Merugu, Naveen Battula, Pages : 2552-2553 125. Prediction Of Cancer Diseases Using Navie Bayes Classification. Oleh Shruthi. S, Mithun Mohan, Akshaya Aravind, Pages : 2554-2556 126. A Research Work on English to Marathi Hybrid Translation System. Oleh Pramod Salunkhe, M. Runal Bewoor, Dr. Suhas Patil, Pages : 2557-2560 127. Notion of Black Hole in Wireless Networks Targeting on iMANET. Oleh Natasha Tomar, Amit Chaudhary, Pages : 2561-2565 128. Private Preserving Publically Checking For Shared Data in the Cloud Usng Oruta. Oleh Ashwini. H, Mrutyunjay. B, Sangamesh. P, Smitha. D, Veeresh Biradar, Pages : 2566-2569 129. ObJect Scanning Based Road Obstacles Detection Weighted Sum Method. Oleh Neha Chalana, Lovnish Bansal, Pages : 2570-2573 130. Macnine Learning Approach To Detect Tuberculosis in Patients With or Without HIV Co-Infection A Survey. Oleh Ashwini D. V. And Dr. Seema. S, Pages : 2574-2578 131. Multi-Level Encryption Mechanism For Access Control Over Cloud Data. Oleh T. Kavitha, B. Narendra, C. Sushama, S. Shiva Prakash, Pages : 2579-2582 132. Analysis of Patter Matching Algorithms. Oleh Siva Kumar Kotamraju, Pages : 2583-2586 133. Fine Tuning Of Phylip on Intel Xeon Architecture. Oleh Prinkesh Sharma, Kondorpa Kumar Borchetia, Shivam Saxena, Pages : 2587-2592 134. Detection of Brain Tumors Using Learning Machine Approach And Spatial Fuzzy Segmentation. Oleh G. Lavanya, C. Suganthini, Pages : 2593-2596 135. Metaheuristic Based Approach To Regression Testing. Oleh Shweta Mitta, Om Prakash Sangwan, Pages : 2597-2605 136. Implementation of Location Based Steganography on mobile Smartphone Using Android Platform. Oleh Khushali Pandit, Varsha Bhosale, Pages : 2606-2609 137. HIDES : Hierarchical Based And An Energy Efficient Intrusion Detection System For Wireless Sensor Networks. Oleh B. Kamaladharan, Pages : 2610-2615 138. Data Mining And The News Boy Model in B2B E-Commerce Supply Chain. Oleh Minakshi Lalit Patil, Pages : 2616-2619 139. A Clustering Search Technique for Social Network Applications. Oleh Saurabh Sharma, Aravendra Kumar Sharma, Arun Kumar Sharma, Pages : 2620-2622 140. Enhancing Data Security And in Cloud Computing Environment. Oleh Shivali Munjal, Shelly Garg, Pages : 2623-2626 141. Enhanced Security Layer by Using Integration of Sound Signature And Graphical Password Authentication System. Oleh Manasa Bhat, Vanisha P. Santhmayor, Mahesh. K, Pages : 2627-2629 142. Hybrid Security Using Digital Signature & RSA Encryption For AODV in MANET. Oleh Shelbala Solanki, Anand Gadwal, Pages : 2630-2635 143. Comparitive Study of Uterine Cyst Characterisation Using Glcm And Wavelet Transform. Oleh Brindha. D, Kandaswamy. A, Subbashini. S, Pages : 2636-2640 144. A Comparative Analysis of M-GER And MODLEACH Energy Efficient WSN Protocols. Oleh Neeraj Dewli, Rashmi Saini, Pages :2641-2644 145. Image Matcher-Content Based Image Retrieval System Using Image Sub Blocks And Indexing. Oleh D. D. Pukale, Varsha H. Sakore, Nilima K. Shevate, Nutan D. Pawar, Priyanka N. Shendage, Pages: 2645-2652 146. Unambiguous Representation For Sliceable Rectangur Floorplans. Oleh Soumya Pratik Saha, Satrajit Ghosh, Pages : 2653-2657 147. Web Log Analyzer For Semantic Web Mining. Oleh Fakhrun Jamal, Mamta Bansal, Pages : 2658-2662 148. A Survey of Text Categorization And its Various Approaches. Oleh M. Maharasi, N. Antony Sophia, Pages : 2663-2666 149. Level of Ubiquity of Various Software Projects. Oleh Anil Kumar Mishra, Diksha Nagpal, Pages : 2667-2670 150. Data Based-Secure And Efficient Dynamic Clustering (DB-SEDC)For Data Aggregation in Wireless Sensor Network. Oleh Priya M. R, Chinnaswamy C. N, Sreenivas T. H, Pages : 2671-2673 151. Extension of Preserving Privacy Location in Social Networks. Oleh Ravi Konaraddi, Pages : 2674-2677 152. Survey on Identity Based Blind Signature. Oleh Girish, Krupa. K. T, Dr. Phaneendra H. D, Pages : 2678-2681 153. A Survey on Variuos Word Spotting Techniques For Content Based Document Image Retrieval. Oleh Blessy Varghese, Sharvari Govilkar, Pages : 2682-2686 154. A Comparative Study of Parallel Job Scheduling Algorithms in Cloud Computing. oleh A. Kousalya, R. Radhakrishnan, Pages : 2687-2690 155. An Overview of Concept Based And Advanced Text Clustering Methods. Oleh B. Jyothi, D. Sailaja, Y. Srunivasa Rao, Pages : 2691-2697 156. A Genetic Algorithm Based Average Percentage of Statement Coverage Technique For Test Case Ordering. Oleh Atul Kumar Pal, Makul Mahajan, Pages : 2698-2705 157. Offline Resource Extractor: An Efficient Resource Extraction System. Oleh N. P. Joshi, Pages : 2706-2709 158. Enhancing The Semantic of The Business Repository Components For More Efficient Web Services Discovery. Oleh Salim Baroudi, Mohamed Bahaj, Pages : 2710-2716 159. Link Initialization And Training in MAC Layer of PCle 3.0. Oleh Chandana K. N, Karunavathi R. K, Pages : 2717-2719 160. CAPTCHA Problems Based On Al Provide Protection Against Automated Hacking Tools. Oleh Priyanka K. Kukade, Prof. Ms. M. S. Deshmukh, Pages : 2720-2723 161. A Filter Base Addressing Protocol For Node Auto-Configuration in Wireless Ad-Hoc Network Using Cuckoo Filter. Oleh Bhushan A. Badgujar, Swati Patil, Mayur Agrawal, Pages : 2724-2728 162. Registration Plate Recognition From Still Images And Video in Real Time Conditions. Oleh Glence Joseph, Dr. Tripty Singh, Andan H.M, Aravind. G, Pages : 2729-2734 163. Topological Conditions For Maintaining Stabilization of Dynamic System. Oleh Dilip Budhwant, Bhagyashri Bhalekar, Pages : 2735-2737 164. Driver Evaluation System Using Mobile Phone And OBD-II System. Oleh Sujata Khedkar, Akshaykumar Oswal, Manjari Setty, Srinivas Ravi, Pages : 2738-2745 165. Research on Cloud Testing Based on Ontology And Multi-Agent Framework. Oleh Afaf Al-Neaimi, Pages : 2746-2749 166. Cross Domain Compoeition of Web Service Workflows using a Provenance Ontology With an Automated Re-planning. OLeh B. Meenakshi Sundaram, Dr. D. Manimegalai, Pages : 2750-2753 167. A Hybrid Security Service To Achieve Strong Authentication And Cryptography For Cloud Applications. Oleh Vivek Dandir, Prof. Mohsin Sheikh, Pages : 2754-2760 168. Self-Navigating Quadcopter. Oleh O Guneshwor Singh, Pages : 2761-2765 169. Slope Swith Variable Value Prediction Using Two Dimensional Curve Fitting For a Limited Data Mining Set. Oleh Venkatesh Suvarna, Pages : 2766-2767 170. Displaying Crisis Informing For Auto Collision Over Dichotomized Progress Demonstrate in Vehicular Ad-Hoc System. Oleh Veena. R. C, Pages : 2768-2771 171. On The Advancements in Cloud Computing Technology: An Overview. Oleh Majed Alhaisoni, Pages : 2772-2778 172. Adaptive Fault Free And Secured Path Selection in Wireless Sensor Networks. Oleh Deepali Virmani, Pranav Gupta, Pages : 2779-2781 173. Voting Methods For Malware Detection. Oleh Pranit Gaikwad, Dilip Motwani, Pages : 2782-2786 174. Ensuring Data Security on Cloud. Oleh Jitendra Kumar Seth, Satish Chandra, Pages : 2787-2790 175. Secured Data Sharing in The Cloud. Oleh Amrut Hunashyal, Chetak Patil, Vilas Balaganur, Pages : 2791-2793 176. Challenges in Design And Development of EEG Based BCI : A Review. Oleh Vaishali Kadam, Dr. R.R. Deshmukh, Pages : 2794-2796 177. An Enhanced Function Point Analysis (FPA) Method For Software Size Estimation. Oleh Nilesh Choursiya, Rashmi Yadav, Pages : 2797-299 178. Are You A Human or Robot? or Everything CAPTCHA. Oleh Revati Ghadge, Archana M. Naware, Pages : 2800-2805 179. Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks. Oleh Besty Haris, 2806-2809 180. BYOD : Usability. Oleh Abha Tewari, Pooja Nagdev, Kiran Israni, Pages : 2810-2814 181. Assessment of Document Similarity With Clustering Using Multi View-Points. Oleh Sindhudarshini. S, Suresh. G. S, Pages : 2815-2818 182. Dynamic Environment Exploration Tool : A Blind's Eye. Oleh Dushyant Kumar Singh, Pages : 2819-2822 183. Securing Broker-less Publish/Subsribe System Using Fuzzy Identity-Based Encryption. Oleh Maithily. b, Swathi. Y, Pages : 2823-2826 184. Trustworthy Resource Sharing on Colleborative Cloud Computing. Oleh T. Amith Kumar, G. Priya, N. Jaisankar, Pages : 2827-2830 185. Effective Personalization of Web Seacrh Based on Fuzzy Information Retrieval. Oleh Suruchi Chawla, Pages : 2831-2837 186. Data Driven Data Mining Model For Biological Pathways. Oleh N. Sevugapandi And Dr. C. P. Chandran 187. Study And Analysis of Digital Image Enhancement. Oleh Sanjib Das, Niranjan Cannon, Pages : 2841-2848 188. A Survey of News Article Clustering And Summarization. Oleh Purabi Choudhury, Pages : 2849-2851 189. Emphasizing Big Data Engineering And Software Architecture on Cloud Computing. Oleh Mohammed Faisal, Tamil Selvi Madeswaran, Sanjay Gupta, Pages : 2852-2855 190. Bi-Variate Gaussian Mixture Model Based Techniques For Effective Analysis of Cyber Crimes. Oleh V. Sreenivasulu, R. Satya Prasad, Pages : 2856-2858 191. Collaboration in Multicloud Computing Environments: Framework And Security Issues. Oleh Madivalayya M. Hiremath, Annapurna P. Patil, Pages : 2859-2862 192. Finger-Knuckle-Print Based Recognition System Using LBP And SURF. Oleh Salil Kumar Verma, Maitreyee Dutta, Pages : 2863-2867 193. Classification Of Unstructured Data Using Soft Computing: A Survey. Oleh Swati Wakode, Rakesh Mallesh, Mandar Wagh, Manisha P. Mali, Pages : 2868-2870 194. Big Data Analysis Using Partition Technique. Oleh Prasadkumar Kale And Arti Mohanpurkar, Pages : 2871-2875 195. Single Page Application Using Angular JS. Oleh Madhuri A. Jadhav, Balkrishna R. Sawant, Anushree Deshmukh, Pages : 2876-2879 196. Perspective Identification of Indian Musical Instrument Ghan And Sushir Vadya. Oleh Satish Ramling Sankaye, S. C. Mehrotra, U. S. Tandon, Pages : 2880-2883 197. Automating The Payment of Toll Tax at Toll Plazas. Oleh Kruti Sanghvi, Prof. Amol Joglekar, Pages : 2884-2887 198. Collaborative Filtering Approach For Big Data Applications in Social Networks. Oleh Rajeswari. M, Pages : 2888-2892 199. A Survey Unsupervised Extraction of Product Information From Semi-Structured Sources. Oleh Abhilasha Bhagat, Vanita raut, Pages : 2893-2897 200. A Preventing Privacy Leakage And Discrimination Enabled Vulnerabilities in Data Publishing And Mining. Oleh Pujari Sasidhar, K. R. K. Satheesh, Pages : 2898-2901 201. Controlling Air Conditioner (Temperature And AirFlow) Using Wireless Sensor Network And iSense Technology. Oleh Karthik. SK, Maheshwari kittur, Suraj M. Halakatti And Vineetkumar Patil, Pages : 2902-2906 202. Classification of Music Based on Clave Direction Using Machine Learning Techniques. Oleh Sabina, M.A, Pages : 2907-2909 203. Application of Data Mining in Adaptive And Intelligent Tutoring Systems: A review. Oleh Rajitha Koppisetty, Pages : 2910-2917 204. A Survey Paper on Automatic Speech Recognition by Machine. Oleh Dinesh Kumar Dansena, Yogesh Rathore, Pages : 2918-2922 205. Real Time Opinion Mining Of Twitter Data. Oleh Narahari P. Rao, S. Nitin Srinivas And Prashanth C. M, Pages : 2923-2927 206. A Review: Data Mining Technique Used In Eeducation Sector. Oleh Johina, Vikas Kamra, Pages : 2928-2930 207. Application of Image Segmentation Techniques on Medical Reports. Oleh Chandni Panchasara, Amol Joglekar, Pages : 2931-2933 208. An Approach For Data Integrity Checking And Data Recovery in Cloud Data Storege. Oleh Charmee V. Desai, prof. Gordhan B. Jethava, Pages : 2934-2937 209. A Novel Speech Recognition System For Punjabi Language: A Review. Oleh Harpreet Kaur, Pages : 2938-2940 210. Zone Based And Morphological Based Feature Extraction Techniques For English Alphabets. Oleh Saleem Pasha, Ajay Kumar, Syed Younus Hussain, Amritansh, Mohammed Shafi Ul Umam, Pages : 2941-2944 211. Improved Method of Single Image Dehazing Based on Multi-Scale Fusion. Oleh Neha Padole, Akhil Khare, Pages : 2945-2949 212. Implementation of Home Security System UsingGSM Module And Microcontroller. Oleh Abhishek S. Parab, Amol Joglekar, Pages : 2950-2953 213. Cell Phone Controller Robot With Fire Detection Sensors. Oleh Lakshay Arora, prof. Amol Jaglekar, Pages : 2954-2958 214. Use Of Hidden Markov's Model For Handwritten Kannada Character Recognition. Oleh Akshayparvatikar, Veena G. S, Pages : 2959-2960 215. Denial-Of-Service Attack Detection Technique Derived From Statistical Traffic Analysis. Oleh Sanjivani Sumant, Prof. Sweta Kale, Pages : 2961-2964 216. An Efficient And Compact Indexing Scheme For Large-Scale Data Store. Oleh Sanjivani Sumant, Prof. Sweta kale 217. Speech Emotion Recognition by Gaussian Mixture Model. Oleh Reshma, Maninder, Amarbir Singh, Pages : 2969-2971 218. Simple Application of GlusterFs: Distributed File System For Academics. Oleh Shyam C. Deshmukh, Prof. Sudarshan S. Deshmukh, Pages : 2972-2974 219. Enhanced Minimun Utilization VM Selection Mechanism For Clouds. Oleh Versha Lodhi, Prof. SarveshRai, Ganesh Kumar Viswakarma, Pages : 2975-2977 220. Enhancement Of Face Recognition Rate by Data Base pre-processing. Oleh harihara Santosh Dadi, P. G. Krishna Mohan,
Pernyataan Tanggungjawab

Versi lain/terkait

Tidak tersedia versi lain




Informasi


DETAIL CANTUMAN


Kembali ke sebelumnyaXML DetailCite this