Volume 5, Issue 1, June, 2017
ISSN: 2321-5992, Journal IMPACT Factor: 8.98
Volume 5, Issue 1, June, 2017
Hierarchical Clustering of Differentially Expressed Genes using Up and Down Gene Regulation and Gene Enrichment Analysis in Alzheimer Disease Dataset
Authors: S.B.ISHWARYA; DR.R.PORKODI
A STUDY ON DISEASE SUBTYPES TO IDENTIFY TOP RANKED GENES DISCRIMINATION AND BUILDING GENE ASSOCIATED NETWORKS OF OBESITY MICROARRAY DATASET USING MACHINE LEARNING AND STATISTICAL METHODS
Authors: S.MUTHULAKSHMI; Dr.R.PORKODI
Designing a Software that Detect and Block Phishing Attacks
Authors: Priyanka R. Raut; Samiksha Bharne
The Design and implementation of EDMSP using Serial COMPORT
Authors: Deep Mala; Suhas H.Patil
Big Data-as-a- Service (BDaaS) in Cloud Computing Environments
Authors: Dr Minimol Anil Job
Volume 5, Issue 4, April, 2017
Different Type Network Security Threats and Solutions, A Review
Authors: Shilpa Pareek; Ashutosh Gautam; Ratul Dey
Effective Methods for Range Aggregate Queries in Big Data with Enhanced Security
Authors: Anisa I. Tamboli; Sandeep G. Sutar
Volume 5, Issue 5, May, 2017
Circularly Polarized Aperture Coupled Microstrip Short Backfire Antenna with One Ring
Authors: Kawa ABDOULA
The Newspaper Distribution Problem: Strategic Analysis of Profit-Loss Picture for A Metro Distributor
Authors: Joseph Gilkey Jr; Nicholas Riepe; Eliran Epshtein; Igal Oren
Sentiment Analysis in Twitter for NRC Hashtag Emotion
Authors: Ketan J. Sarvakar; Dhwani Patel
Volume 5, Issue 6, June, 2017
MATHEMATICAL AND COMPUTATIONAL STUDY OF BLOOD FLOW THROUGH DISEASED ARTERY
Authors: Sapna Ratan Shah; Anamika
Cyber Security Attacks: Common Vulnerabilities in the Critical Infrastructure
Authors: Sohail Razi Khan; Luis Borges Gouveia
Multi-objective Genetic algorithm optimization in Inventory model for deteriorating items with shortages using Supply Chain management
Authors: Ajay Singh Yadav; Ankur Garg; Kusum Gupta; Anupam Swami
Digital Payments, Security Attacks and Vulnerabilities of End-users Systems
Authors: ANAND
Implementation of Motion Object Detection using BMNCKFCM on FPGA and ASIC
Authors: Siva Nagi Reddy Kalli; S Bhanu MurthyBhaskara
Mobile Communication Technologies: 1G to 4G
Authors: Ashok Kumar; Shant Kaushik
Volume 5, Issue 8, Aug, 2017
Android Application Pen-testing Framework
Authors: Digvijaysinh Rathod
Effective Mobile Based Health Care System By Body Sensor Networks (BSNs)
Authors: K Rajendra Prasad
An Empirical Study on Online Grocery Shopping Intentions of Consumers in Ahmedabad City
Authors: Amol Ranadive
Comparison of performance with support vector machines
Authors: Kai Li; Lulu Zhai
A Comparative study of Median, ANW, NLM and proposed Hybrid Filtering Technique using Median and ANW Filter for Medical Images
Authors: Kavitha G.; Chetana Prakash; Shashirekha H
Various Node Deployment Strategies in Wireless Sensor Network
Authors: Nagarajan Munusamy; Karthik Srinivasan
Towards Discriminant Function Analysis based Classification
Authors: Ajit Kumar Jain; C. K. Jha
SAFETY REDEFINED
Authors: K.Sudha; Ajay Kumar; Ritika Jaiswal; Shakshi Bhardwaj; Abhishek Matlotia
Identification Of IRIS Flower Species Using Machine Learning
Authors: Shashidhar T Halakatti
Volume 5, Issue 9,Sep, 2017
FILTERING FALSE INJECTED DATA AND AGGREGATION USING ITERATIVE FILTERING ALGORITHM IN WIRELESS SENSOR NETWORK
Authors: R. Karthika M. Krishnamoorthy
Consumer Attitude towards purchase of Real Estate
Authors: Anupama Sundar D
A INNOVATIVE APPROACH FOR CONTENT BASED IMAGE RETRIEVAL USING CLOUD COMPUTING
Authors: K. Valli Madhavi Dr.Y.Venkateswarlu
Blacklist Technique for Detection and Isolation of Malicious nodes from Manet
Authors: VENIKA CHAUDHARY AMANDEEP KAUR
A STUDY ON DIABETES HEALTHCARE PATHWAY PROCESS USING DATA MINING TECHNIQUES
Authors: J. Jamila Yasmin Banu S. Babu
Prediction based Auto Scaling for Cloud Applications
Authors: Chirag A Patel J.S.Shah Hiren Patel
Auditor Implementation in Malicious Environments for Detecting Guilty Party for Data Leakage and Provide Security for Data Transfer
Authors: Rawali P D. Baswaraj
Detecting Edges in RGB Color Channels: A Segmentation Approach
Authors: E.Boopathi Kumar V. Thiagarasu
FACE RECOGNITION BASED ON SWT AND PROCRUSTES ANALYSIS
Authors: Ganapathi V Sagar Sahitya Reddy M V K Suresh Babu K B Raja Venugopal K
A Key Escrow-Free Identity-Based Signature Scheme from Bilinear Paring
Authors: Subhas Chandra Sahana Bubu Bhuyan
ABC Optimized Weighted Task Load Balancing Algorithm in Cloud Computing
Authors: Rajpreet Kaur Vikas Khullar
Volume 5, Issue 10,Oct, 2017
Increasing Information Shareability by Using NTBS clustering Approach for VANET
Authors: Venkatamangarao Nampally M. Raghavender Sharma
PERFORMANCE EVALUATION OF EDGE DETECTION ALGORITHMS USING HOUGH TRANSFORM ON IMAGES OF CIRCULAR OBJECTS
Authors: Khandakar Faridar Rahman Saurabh Mukherjee
Hybrid AODV algorithm for path establishment in MANET using bio inspired techniques
Authors: Er. Jatinder Kaur Er.Gurpreet Singh
An Innovative Technique to Improve Student’s Performance with Neural Network and Data Mining Technique
Authors: NIKHIL WADHWANI AMOL JOGLEKAR
DATA DISSEMINATION PROCESS IN WIRELESS BODY AREA NETWORKS FOR HEALTHCARE APPLICATIONS
Authors: Mohd Afroz Md Ateeq Ur Rahman
IMPROVISED OPPORTUNISTIC ROUTING FOR UNDERWATER WIRELESS SENSOR NETWORKS
Authors: Mohd Mujeebuddin Md Ateeq Ur Rahman
IMPROVED AND PROFICIENT ATTRIBUTE BASED ENCRYPTION MODEL FOR WIRELESS BODY AREA SENSOR NETWORKS
Authors: AzmathUllahHaqqani Md Ateeq Ur Rahman
COST MINIMIZATION MODEL FOR ONLINE SOCIAL NETWORKS IN GEO-DISTRIBUTED CLOUDS
Authors: Abdul Abrar Md Ateeq Ur Rahman
Real Time Content Based Automated Privacy Policy QR Code Watermarking for User Uploaded Images in Cloud
Authors: Jayaramu H S A K Gautham
Authentication and Secure Communication in CSS Cognitive Radio Networks
Authors: Rajesh D. Kadu Pravin P. Karde V. M. Thakare
To measure WiFi signal strength and solution to increase the signal strength
Authors: Saloni Burad Rambabu Vatti Chaitanya Patil Nikhil Zambare Umesh Jagtap
A Brief Survey: Computer Science and Game Theory
Authors: Dr.Bidyapati Kumar Suresh Roy
Critical Review and Analysis of Atomization of Diabetic Maculopathy
Authors: Chetan P.Pattebahadur Ramesh R. Manza
Improving Cache Techniques performance for Advanced Operations on High Dimensional Data
Authors: Sahiti H M. Ravi D. Baswaraj M. Janga Reddy
Two-layered integration framework for smart devices using web-based technology
Authors: Dr.I.Lakshmi
A Survey on Different Association Rule Mining Algorithms in Data Mining
Authors: P.Dhanalakshmi R. Porkodi
ANALYSIS OF OBJECTS CATEGORIZATION IN UNDERWATER IMAGES
Authors: N.Jayachandra A. R. Nadira Banu Kamal
A Blur-Invariant Local Feature Descriptor for Gaussian and Motion Blurred Image Matching
Authors: QiangTong Terumasa Aoki
Volume 5, Issue 11,Nov, 2017
Authors: Bianzeubé TIKRI Nadjitonon NGARMAIM Djonglibet WEL-DORET Ngargueudedjim KIMTANGAR Djimako BONGO Jean-Louis ROBERT
Authors: S.PITCHUMANI ANGAYARKANNI Dr.NADIRA BANU KAMAL Dr.RANJIT JEBA THANGAIYA
Authors: C. Sudha T. Nirmal Raj
Authors: RM.Iswarya T. Nirmal Raj
Authors: K.Suguna S.Babu
Authors: T. Mylsami B.L. Shivakumar
Authors: Elayaraja.N Mythili.K
Authors: Padmini.P Mythili.K
Authors: C.Monika K. Mythili
Authors: Dr.Sridevi
Authors: Vrushali Ambadas Sungar
Authors: Syeda Asra Dr.Shubhangi DC
Volume 5, Issue 12,Dec, 2017
Authors: S. Sangeetha S. Babu
Authors: Yash Mundra
Authors: M. Upendra Naidu A. Uday Kishore
Authors: Sayali S. Patil Bhakti S. Ahirwadkar
Authors: Sunil Thakur Kapil Jairath Navdeep Singh
Authors: Rupali A. Mangrule Dr.K.Vengatesan