Volume-2, Issue-5


1 Diabetes Prediction by Supervised and Unsupervised Learning with Feature Selection
Rabina, Er. Anshu Chopra
(Vol: 2, Issue: 5)
2 Review on Grey- Hole Attack Detection and Prevention
Suman Brar, Mohit Angurala
(Vol: 2, Issue: 5)
3 Review of Image Watermarking Technique for Medical Images
Kamalpreet Kaur, Er. Suppandeep Kaur
(Vol: 2, Issue: 5)
4 Review on Rank Base Data Routing Scheme with Grey Hole Detection & Prevention in MANETS
Reena Kumari, Neha Goyal
(Vol: 2, Issue: 5)
5 Comparative Analysis of PCF, DCF and EDCF over IEEE 802.11 WLANs
Jagdish Singh, Joykaran Singh
(Vol: 2, Issue: 5)
6 Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Neetika Lalotra, Devasheesh Sharma
(Vol: 2, Issue: 5)
7 A Study on Friction Stir Welding of Various Aluminum Alloys
Neeraj Kumar, Virender Kumar
(Vol: 2, Issue: 5)
8 Image Encryption using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression
Lavisha Sharma, Anuj Gupta
(Vol: 2, Issue: 5)
9 Mammogram Image Nucleus Segmentation and Classification using Convolution Neural Network Classifier
Prabhjot kaur
(Vol: 2, Issue: 5)
10 Hybrid Algorithm for Cluster Head Selection Based on Energy in MANET
Updesh Gangwar, Ravi Shankar Shukla
(Vol: 2, Issue: 5)
11 Railway Bridge Track Surveying System for Accident Reduction
Vinod Bolle, Santhosh kumar banoth, Puja Khangar
(Vol: 2, Issue: 5)
12 A Novel Algorithm in 2 Level Aggregations for WSN in Multi Interface Multichannel Routing Protocol
Luv Kumar Pal, Anil Panday
(Vol: 2, Issue: 5)
13 A Review on Traffic Classification Methods in WSN
Jaskirat Singh, Harpreet Kaur Saini
(Vol: 2, Issue: 5)
14 Comparison of Gray Hole Attack in Manet in OLSR Protocol
Rohit Katoch, Anuj Gupta
(Vol: 2, Issue: 5)
15 Sentimental Analysis of Twitter Data using Text Mining and Hybrid Classification Approach
Shubham Goyal
(Vol: 2, Issue: 5)
16 MY Portfolio: An Intelligent Platform
Vinu Lata, Mrs. Aaradhna Singh
(Vol: 2, Issue: 5)
17 Image Enhancement by Adaptive Filter with Ant Colony Optimization
Kanchan Rani, Er. Gurjot kaur
(Vol: 2, Issue: 5)
18 An Improved Visual Recognition of Letters of English Language using Lip Reading Technique
Ishu Garg, Amandeep Verma
(Vol: 2, Issue: 5)
19 Vehicular Adhoc Network Routing Improved Throughput by Flower Pollination Optimization Algorithm
Karan Sharma, Shelly
(Vol: 2, Issue: 5)
20 Web Usage Mining Tools & Techniques: A survey
Satya Prakash Singh, Meenu
(Vol: 2, Issue: 5)
21 Graph Coloring and Its Implementation
Ridhi Jindal, Meena Rani
(Vol: 2, Issue: 5)
22 Introduction to Wireless Sensor
Smridhi
(Vol: 2, Issue: 5)
23 Natural Language Processing
Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak
(Vol: 2, Issue: 5)
24 An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm
Harpreet Kaur, Gaganpreet Kaur Bhalla
(Vol: 2, Issue: 5)
25 Implementing Multiple Security in the Cloud Environment
Anuradha, Dr. Suman Sangwan
(Vol: 2, Issue: 5)
26 A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism
Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar
(Vol: 2, Issue: 5)
27 Review on Routing Approaches of MANET with Opportunistic Network
Karan Sharma, Shelly Bhalla
(Vol: 2, Issue: 5)
28 Review on CSTR PLANT Error Optimization
Ramandeep Kaur, Jaspreet Kaur
(Vol: 2, Issue: 5)
29 Gateway Discovery in MANET: A Survey
Rahul Mishra, Rakesh Kumar
(Vol: 2, Issue: 5)
30 Big Data: Challenges and Opportunities
Meena Rani, Ridhi Jindal
(Vol: 2, Issue: 5)
31 Review on Agile Method with Text Mining
Parveen kaur
(Vol: 2, Issue: 5)
32 Performance Comparison of Ad-hoc Routing Protocols
Sheetal
(Vol: 2, Issue: 5)
33 Efficient Fingerprint Recognition using Wavelet Transforms
Jaspreet Kaur, Navleen Kaur
(Vol: 2, Issue: 5)
34 Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.
Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam
(Vol: 2, Issue: 5)
35 Review on Detection of Gray Hole Attack in MANET
Geetanjali, Anupama Kumari
(Vol: 2, Issue: 5)
36 Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach
Adviti Chauhan, Jyoti Gupta
(Vol: 2, Issue: 5)
37 Real Time Sign Language Recognition Systems: A Review
Sumit Sandhu, Sonia khatri
(Vol: 2, Issue: 5)
38 Survey of Various X-RAY Bone Image Segmentation Approaches
Sarita, Vikas Sandhu
(Vol: 2, Issue: 5)
39 Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach
Nishan Singh Saklani, Saurabh Sharma
(Vol: 2, Issue: 5)
40 Smart Wifi Dustbin System
Akshay Bandal, Pranay Nate, Rohan Mankar, Rahul Powar
(Vol: 2, Issue: 5)
41 Twitter Stream Analysis for Traffic Detection in Real Time
Rucha Kulkarni, Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer
(Vol: 2, Issue: 5)
42 Novel Approach for Routing in MANET by Network Connectivity with Meta Heuristic
Ramninder Kaur, Harpreet Kaur
(Vol: 2, Issue: 5)
43 Advanced E-voting System using NFC
Pratiksha Bhosale, Sayali Mokashi, Priyanka Wadkar, Prof P.V.Mahadik
(Vol: 2, Issue: 5)
44 Distance Sensing with Ultrasonic Sensor and Arduino
N. Anju Latha, B. Rama Murthy, K. Bharat Kumar
(Vol: 2, Issue: 5)


Is there a mistake in your details. Please let us know via this form.