Volume-2, Issue-4


1 The Art of Scheduling in Cloud Computing
Harshita Vashishth, Kamal Prakash
(Vol: 2, Issue: 4)
2 A Closer Overview on Blur Detection-A Review
Ravi Saini, Sarita Bajaj
(Vol: 2, Issue: 4)
3 Study of Different Techniques for Human Identification using Finger Knuckle Approach
Sanjna Singla, Supreet Kaur
(Vol: 2, Issue: 4)
4 Non-Probabilistic K-Nearest Neighbor for Automatic News Classification Model with K-Means Clustering
Akanksha Gupta
(Vol: 2, Issue: 4)
5 MRI Fuzzy Segmentation of Brain Tumor with Fuzzy Level Set Optimization
Poonam Khokher, Kiran Jain
(Vol: 2, Issue: 4)
6 Tumor Segmentation and Automated Training for Liver Cancer Isolation
Shikha Mandhan, Kiran Jain
(Vol: 2, Issue: 4)
7 Implementation of OLSR Protocol in MANET
Rohit Katoch, Anuj Gupta
(Vol: 2, Issue: 4)
8 Performance Analysis of Multi-Hop Parallel Free-Space Optical Systems over Exponentiated Weibull Fading Channels Optimize by Particle Swarm Optimization
Babita, Dr. Manjit Singh Bhamrah
(Vol: 2, Issue: 4)
9 A Hybrid Approach for Enhancing Security in RFID Networks
Bhawna Sharma, Dr. R.K. Chauhan
(Vol: 2, Issue: 4)
10 Credit Card Fraud Detection and False Alarms Reduction using Support Vector Machines
Mehak Kamboj, Shankey Gupta
(Vol: 2, Issue: 4)
11 Extensive Labview based Power Quality Monitoring and Protection System
Anurag Verma, Mrs. Shimi S.L
(Vol: 2, Issue: 4)
12 Arduino based Low Cost Power Protection System
Anurag Verma, Mrs. Shimi S.L
(Vol: 2, Issue: 4)
13 A Malicious Data Prevention Mechanism to Improve Intruders in Cloud Environment
Tajinder Kaur
(Vol: 2, Issue: 4)
14 A Robust Cryptographic Approach using Multilevel Key Sharing Paradigm
Tajinder Kaur
(Vol: 2, Issue: 4)
15 Authentication using Finger Knuckle Print Techniques
Sanjna Singla, Supreet Kaur
(Vol: 2, Issue: 4)
16 A Novel Approach for Detection of Traffic Congestion in NS2
Arun Sharma, Kapil Kapoor, Bodh Raj, Divya Jyoti
(Vol: 2, Issue: 4)
17 Consumer Trend Prediction using Efficient Item-Set Mining of Big Data
Yukti Chawla, Parikshit Singla
(Vol: 2, Issue: 4)
18 Robust data compression model for linear signal data in the Wireless Sensor Networks
Sukhcharn Sandhu
(Vol: 2, Issue: 4)
19 A Review on ACO based Scheduling Algorithm in Cloud Computing
Meena Patel, Rahul Kadiyan
(Vol: 2, Issue: 4)
20 Novel Approach for Heart Disease using Data Mining Techniques
Era Singh Kajal, Ms. Nishika
(Vol: 2, Issue: 4)
21 Novel Approach for Image Forgery Detection Technique based on Colour Illumination using Machine Learning Approach
K. Sharath Chandra Reddy, Tarun Dalal
(Vol: 2, Issue: 4)
22 Indian Coin Detection by ANN and SVM
Sneha Kalra, Kapil Dewan
(Vol: 2, Issue: 4)
23 Automated Checking of PCB Circuits using Labview Vision Toolkit
Manoj Kumar, Mrs. Shimi S.L
(Vol: 2, Issue: 4)
24 Automated Supervision of PCB Circuits
Manoj Kumar, Mrs. Shimi S.L
(Vol: 2, Issue: 4)
25 An Experimental Study on Performance of Jatropha Biodiesel using Exhaust Gas Recirculation
Kiranjot Kaur
(Vol: 2, Issue: 4)
26 Review Data De-Duplication by Encryption Method
Sonam Bhardwaj, Poonam Dabas
(Vol: 2, Issue: 4)
27 Pharmacological Studies on Hypnea Musiformis (Wulfen) Lamouroux
B. Lavanya, N. Narayanan, A. Maheshwaran
(Vol: 2, Issue: 4)
28 Classification through Artificial Neural Network and Support Vector Machine of Breast Masses Mammograms
Kamaldeep Kaur, Er. Pooja
(Vol: 2, Issue: 4)
29 Review of Copy Move Forgery with Key Point Features
Mrs. Nisha, Mr. Mohit Kumar
(Vol: 2, Issue: 4)
30 Analytical Review of the News Data Classification Methods with Multivariate Classification Attributes
Mandeep Kaur
(Vol: 2, Issue: 4)
31 Robustness against Sharp and Blur Attack in Proposed Visual Cryptography Scheme
Dhirendra Bagri, R. K. Kapoor
(Vol: 2, Issue: 4)
32 Review of Different Approaches in Mammography
Prabhjot Kaur, Amardeep Kaur
(Vol: 2, Issue: 4)
33 Ethanol: A Clean Fuel
Samarth Bhardwaj
(Vol: 2, Issue: 4)
34 Review of Brain Tumour Segmentation Approaches
Nagampreet Kaur, Natasha Sharma
(Vol: 2, Issue: 4)
35 A Survey over the Critical Performance Analytical Study of the MANET Routing Protocols (AODV & TORA)
Manju, Mrs Maninder kaur
(Vol: 2, Issue: 4)
36 Lexicon Analysis based Automatic News Classification Approach
Kamaldeep Kaur, Maninder Kaur
(Vol: 2, Issue: 4)
37 Design of Low Area and Secure Encryption System using Combined Watermarking and Mix-column Approach
Swati Sharma, Dr. M. Levy
(Vol: 2, Issue: 4)
38 Security Enhancement of the Telemedicine and Remote Health Monitoring Models
Nishu Dhiman, Tejpal Sharma
(Vol: 2, Issue: 4)
39 Railway Bridge & Track Condition Monitoring System
Vinod Bolle, Santhosh Kumar Banoth
(Vol: 2, Issue: 4)
40 Flow Past a Rotating Circular Grooved Cylinder
Ashish Kumar Saroj, Bharath Reddy, Gundu Jayadhar, D.Gokul
(Vol: 2, Issue: 4)
41 A Comparison of Different Techniques used to Detect and Mitigate Black Hole Attack in AODV Routing Protocol based on MANET
Shivani, Pooja Rani, Pritpal Singh
(Vol: 2, Issue: 4)
42 Phylogenetic and Evolutionary Studies of Flavivirus
Meenu Priya Kontu, Dr. Sweta Prakash
(Vol: 2, Issue: 4)
43 Analyze the Effect of Base Station and Node Failure and Recovery on the Performance of Wimax
Kanika, Er. Amardeep Singh Virk
(Vol: 2, Issue: 4)


Is there a mistake in your details. Please let us know via this form.