| SN |
Paper |
| 1 |
A Survey of Unsupervised Techniques for Web Data Extraction
Disha Patel, Dr. Ankit Thakkar
|
| 2 |
Media Player Control Using Augmented Reality
Shamla Mantri, Sandeep Vasave, Amol Palve, Yogesh Shinde, Rajeshwar Gunjmurte
|
| 3 |
A Novel Watermark Approach for securing Fingerprint Template
Rubal Jain, Arun Kumar Yadav, Dr. Chander Kant
|
| 4 |
Improving Performance of a Face Liveness Detection System Using Soft Biometrics
Sonal Girdhar, Arun Kumar Yadav, Dr. Chander Kant
|
| 5 |
A Multimodal Approach to Increase the Security of Biometric System
Mamta Ahlawat, Arun Kumar Yadav, Dr. Chander Kant
|
| 6 |
Comparative Analysis of Apriori Algorithm based on Association Rule
Apurwa Sahu, Mradul Dhakar, Pushpi Rani
|
| 7 |
Blocking of Mischievous users in Anonymizing Networks using Nymble System
Anil Kumar, Kirti Bhatia
|
| 8 |
Result of Blocking of Mischievous users in Anonymizing Networks using Nymble System
Anil Kumar, Kirti Bhatia
|
| 9 |
A Novel Approach To Increase The Performance of Biometrics Iris Sensors
Nitin Sambharwal, Arun Kumar Yadav, Dr. Chander Kant
|
| 10 |
Adaptive Clustering Using Round Robin Technique in WSN
Ruchi Sharma, Gunjan Jain
|
| 11 |
SCAODV: A Protocol to Prevent Black Hole Attacks in Mobile Ad Hoc Networks
Shailja Sharma, Umesh Kumar Singh, Kailash Chandra Phuleriya, D.N. Goswami
|
| 12 |
A Study of Various Data Compression Techniques
P.RAVI, Dr.A.ASHOKKUMAR
|
| 13 |
Designing Framework for Testing Web Applications
Amit Singh, Kirti Bhatia
|
| 14 |
A Survey on Base Measures of Software Metrics in Business Process Model
Ramesh Kumar, Dr.Rajesh Verma
|
| 15 |
Load Balancing in Cloud Computing
Minakshi Berwal, Dr. Chander Kant
|
| 16 |
Performance Evaluation of MC-CDMA System-A Survey
Rohini S, Dr. Suriyakala C D
|
| 17 |
Glaucoma Detection Techniques: A Review
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.601
|
| 18 |
A simple approach to Cup-to-Disk Ratio determination for Glaucoma Screening
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.602
|
| 19 |
Glaucoma Screening Using Compensated Cup-to-Disk Ratio Value
Mandeep Singh, Mooninder Singh, JiwanpreetKaurVirk
DOI: 10.090592/IJCSC.2015.603
|
| 20 |
Optimal Feature Selection for Accelerated Plethysmography based Enhanced Pitta Classification
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.604
|
| 21 |
Accelerated Plethysmography based Enhanced Pitta Classification using LIBSVM
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.605
|
| 22 |
Accelerated Plethysmography based Enhanced Pitta Classification using Artificial Neural Networks
Mandeep Singh, Mooninder Singh, Sachpreet Kaur
DOI: 10.090592/IJCSC.2015.606
|
| 23 |
Anomaly Detection via Median based Filtering and Online osPCA
Amol M. Pawar, Manisha S. Mahindrakar
DOI: 10.090592/IJCSC.2015.607
|
| 24 |
Dermatoglyphics: Blueprints of Human Cognition on Fingerprints
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.608
|
| 25 |
Image processing techniques in Dermatoglyphic fingerprint analysis: A review
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.609
|
| 26 |
Validation of Fourier Mellin technique for Dermatoglyphic fingerprint pattern matching
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.610
|
| 27 |
Development of Phase Only Correlation (POC) based two class classifier for Dermatoglyphic patterns
Mandeep Singh, Oindri Majumdar
DOI: 10.090592/IJCSC.2015.611
|
| 28 |
Memory Conscious Protocol for Replay Attack Detection and Prevention in WSN
Bharati N. Sawant, Bhupendra S. Chordia
DOI: 10.090592/IJCSC.2015.612
|
| 29 |
Optimizing the Generic Key Distribution Process with efficient Routing in Ad-Hoc Networks using the Ant Colony Optimization
Sharada Valiveti, Gaurang Raval
DOI: 10.090592/IJCSC.2015.613
|
| 30 |
Modified Approach of Multinomial Naïve Bayes for Text Document Classification
S.W. Mohod, Dr. C.A.Dhote, Dr. V.M. Thakare
DOI: 10.090592/IJCSC.2015.614
|
| 31 |
An architecture for elastic resource allocation in Fog Computing
Swati Agarwal, Shashank Yadav, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.615
|
| 32 |
Digital Watermarking SVD-DWT-DCT Using Kalman Filter
Renuka kaur, Prof.Gulshan Goyal
DOI: 10.090592/IJCSC.2015.616
|
| 33 |
A Review of Weather Forecasting Models-Based on Data Mining and Artificial Neural Networks
G.Vamsi Krishna
DOI: 10.090592/IJCSC.2015.617
|
| 34 |
Biometric System: Secure User Authentication
Nippun Kamboj, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.618
|
| 35 |
An Neuro-Fuzzy Approach Based Voting Scheme for Fault Tolerant Systems Using Hybrid Artificial Bee Colony Training
D. Uma Devi, P. Seetha Ramaiah
DOI: 10.090592/IJCSC.2015.619
|
| 36 |
Ear Pattern Recognition and Compression
Joginder Singh
DOI: 10.090592/IJCSC.2015.620
|
| 37 |
Comparision of Fat Tree and Ethernet(WAN) Routing in Cloud data centre
Shweta Agrawal, Prof (Dr.) vibhakar pathak
DOI: 10.090592/IJCSC.2015.621
|
| 38 |
A Review on High-dynamic-range imaging with its Technique
Gaurav Tiwari, Pushpi Rani
DOI: 10.090592/IJCSC.2015.622
|
| 39 |
RAKS. M. PK 1.0, an Efficient Methodology to Determine The Steganography Signature Of Steganography Tools
Rakesh Kumar, Pratik Kumar
DOI: 10.090592/IJCSC.2015.623
|
| 40 |
Weighted Approach for 3-D/2-D Localization Method in WSN using Fuzzy Modeling with Parameter Analysis
Nidhi Agarwal
DOI: 10.090592/IJCSC.2015.624
|
| 41 |
Genetically Modified Compression Approach for Multimedia Data on cloud storage
Amanjot Kaur Sandhu, Er. Anupama Kaur
DOI: 10.090592/IJCSC.2015.625
|
| 42 |
An Approach to Sanskrit as Computational and Natural Language Processing
Inderjeet
DOI: 10.090592/IJCSC.2015.626
|
| 43 |
An architecture for Load Balancing Techniques for Fog Computing Environment
Manisha Verma, Neelam Bhardawaj, Arun Kumar Yadav
DOI: 10.090592/IJCSC.2015.627
|
| 44 |
A Data Mining Tool for Network Fault Detection
Poonam Chaudhary & Vikram Singh
DOI: 10.090592/IJCSC.2015.628
|
| 45 |
A Review of Load Balancing Schemes for Cognitive Radio Networks
Ravneet Kaur, Er.Vimmi Malhotra, Dr. Dheerendra Singh
DOI: 10.090592/IJCSC.2015.629
|
| 46 |
Dynamic Web Services Composition using Optimization Approach
Kirit J. Modi, Sanjay Garg
DOI: 10.090592/IJCSC.2015.630
|
| 47 |
Discovery and Composition of Link Open Data based RESTful Web services
Kirit J. Modi, Sanjay Garg
DOI: 10.090592/IJCSC.2015.631
|
| 48 |
Fault Tolerance with Minimum Checkpoint Scheme and Low Energy Consumption Technique
Anil Vadhwa, SS Yadav, Preeti Yadav
DOI: 10.090592/IJCSC.2015.632
|
| 49 |
Comparative Analysis of Traditional Methods for Moving Object Detection in Video Sequence
Chirag I Patel, Sanjay Garg
DOI: 10.090592/IJCSC.2015.633
|
| 50 |
A Review: Detection of Clones in Wireless Sensor Network
Manisha R. Deore, R. V. Patil
DOI: 10.090592/IJCSC.2015.634
|
| 51 |
An energy efficient Swarm based Energy Hole Detection approach for Mobile Sensor Network
Dr. Yashwant Singh Sangwan
DOI: 10.090592/IJCSC.2015.635
|
| 52 |
Spatio-Temporal Outlier Detection Technique
K.P. Agrawal, Sanjay Garg, Pinkal Patel
DOI: 10.090592/IJCSC.2015.636
|
| 53 |
Performance Measures for Densed and Arbitrary Shaped Clusters
K.P. Agrawal, Sanjay Garg, Pinkal Patel
DOI: 10.090592/IJCSC.2015.637
|
| 54 |
Performance Comparison of Reactive Based Routing Protocols in MANET’s
Anil Kumar
DOI: 10.090592/IJCSC.2015.638
|
| 55 |
Deployment algorithms in Underwater Acoustic Wireless Sensor Networks: A Review
Archana Toky, Rishi Pal Singh, Sanjoy Das
DOI: 10.090592/IJCSC.2015.639
|
| 56 |
IDS and its Routing Protocols in MANET
Suraj Pal
DOI: 10.090592/IJCSC.2015.640
|
| 57 |
Routing Protocols in MANETS: A Review
Suraj Pal
DOI: 10.090592/IJCSC.2015.641
|
| 58 |
Digital Modulation Techniques Using MATLAB Script file and Graphical Approach
Seema jangra, Rajender Kumar
DOI: 10.090592/IJCSC.2015.642
|
|
|