Table Of
Content
Editorial |
| Sl. No. |
Title and Authors |
Page No. |
| 1. |
Low Power ROM less FFT Processor
Deepa Susan George & V.Sarada
|
1-4 |
| 2. |
Predicting the Analysis of Heart Disease Symptoms Using Medicinal Data Mining Methods
V. Manikantan & S. Latha
|
5-10 |
| 3. |
AutoEpsDBSCAN : DBSCAN with Eps Automatic for Large Dataset
Manisha Naik Gaonkar & Kedar Sawant
|
11-16 |
| 4. |
Geo Location Based RSA Encryption Technique
Ayesha Khan
|
17-20 |
| 5. |
A Survey on Domain Specific Search Engine
Shweta Redkar, Norman Dias & J. A. Laxminarayana
|
21-26 |
| 6. |
Mother Infant Nurturing Application
Roshini. B, Y.C. Kiran & K.N. Narasinga Rao
|
27-30 |
| 7. |
A Single Model for Event-Driven Software
Om Kumar C.U., P. Bhargavi & Vinod Kumar. K
|
31-36 |
| 8. |
Resource Monitoring and Provisioning in SaaS in Public Cloud
Syed Manzoor Ali & Sandeeep Sahu
|
37-42 |
| 9. |
Sandhi Splitting of Marathi Compound Words
Joshi Shripad S.
|
43-46 |
| 10. |
A Systematic Literature Review on Software Fault Prediction based on Qualitative and Quantitative Factors
Gurvinder Singh, Baljit Singh Saini & Neeraj Mohan
|
47-50 |
| 11. |
3 Dimensional Security in Cloud Computing
D. A. Kulkarni, Sayali Dadas & Aniket Kakade
|
51-54 |
| 12. |
Hash-Based String Matching Algorithm For Network Intrusion Prevention systems (NIPS)
VINOD. O & B. M. SAGAR
|
55-59 |
| 13. |
Gesture Based Interactive Multi Touch Surface With RFID Technology For Hotels
Rajat Verma
|
60-66 |
| 14. |
Information Hiding Scheme on Image Using Contourlet Wavelet Transform
A. Saravanan, A. Sivabalan & Ramkumar Prabhu
|
67-70 |
| 15. |
CTP Algorithm : An Implementation In the Real World
Priyaswarupa Rani Pati & E. Poovammal
|
71-73 |
| 16. |
Hand Gesture Recognition Using PCA and Histogram Projection
Krishnakant C. Mule & Anilkumar N. Holambe
|
74-78 |
| 17. |
To Implement SaaS Multitenant Framework Security in Cloud Computing
S. P. Patil & V. N. Nirgude
|
79-85 |
| 18. |
Development of Use Case Model from Software Requirement using in-between SBVR format at Analysis Phase
Devendrasingh Thakore & Akhilesh R. Upadhyay
|
86-92 |
| 19. |
Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks
Abdul Goni, Goutam Gorai & Santanu Rakshit
|
93-97 |
| 20. |
Wi-Fi Infrastructure Security System from Vulnerable Attacks
Geethanjali. N, Thangaraj. P, Kathiresan. K & Mathumathi. R
|
98-104 |
| 21. |
An Efficient Query Processing Search Using Textual and Spatial Relevances
Santhanakrishnan. C, Sivaprakasam. V, Rajasekar. R, Sudhakar. D & Lourdu Michael Antony. K
|
105-109 |
| 22. |
Identification of Opinionated Text and Classifying its Sentiments of Online Product Reviews Using Corpus-Based Approach: Opinion Mining
Regina. J
|
110-114 |
| 23. |
LCS based Secure Authentication Scheme for Health Care Information Exchange
B. Anne Vinitha Vardhini, T. S. Sivapriya & S. Poonkuntran
|
115-120 |
| 24. |
A Review of Data Clustering Techniques and Enhancement of Data Clustering using Hybrid Clustering Model of K‐Means and PSO Clustering
Vinod Sharma, Nitish Salwan, Sandeep Singh, Navneet Singh Babra & Prabhsimran Singh
|
121-124 |
| 25. |
Impact of Compression Algorithms on Data Transmission
Vandana Jindal, A. K. Verma & Seema Bawa
|
125-132 |
| 26. |
Transient Stability Analysis Using MATLAB Simulink and Neural Network
Devender Kumar & Balwinder Singh Surjan
|
133-138 |
| 27. |
Sorting Data with One Swap Operation
Rama Sushil, Sushil Kumar & Anuj Kumar
|
139-143 |