CATEGORIES
IJANA ARTICLES

Special Issue

Special Issue - National Conference on "Novel Trends in Computer Science" (TECHSA-17) on March 4th-2017, held at Government Arts College for Women, Ramanathapuram

Data Mining in Banking Sector

M.Preethi, M.Vijayalakshmi
1-4
Security Perspectives on Deployment of Big Data using Cloud: A Survey

R.Kalaivani
5-9
A Review on Big Data Analytics with Hadoop Technology

S. Srimathy
10-13
A Secure Data Self-Destructing Scheme in Cloud Computing

M S Jayaprabha, Dr A R Nadira Banu Kamal
14-18
An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

T.Arunachalam
19-23
Advanced Method Using Find and Detection Skin Cancer Classification

M.P.PANDI MEENA, ASST.PROF. Dr.T.Balaji
24-27
Splat Feature Classification with Retinal Hemorrhage Detection in Diabetic Patients

M. Kayalvizhi, T.Balaji
28-32
Green Computing - Energy Harvesting and Recycling

I.Eswari, S.Najiya Mahjabin
33-36
An Efficient Face Recognition Feature Using Learning Compact for Adaptive Matching and Authentication

P.ANAND@PATCHAIAPPAN
37-40
Highlights Some of the Major Issues in Cloud Services and Analysis of Various Data Center Selection Algorithms

M.Nagavalli, Dr.A.R.Nadira Banu Kamal
41-45
Mobile Service in Cloud of Things Using Model Driven Architecture

D Murugeswari, Dr A R Nadira Banu Kamal
46-50
A Survey on Data Mining Tools and Techniques in Medical Field

D.Usha Rani MCA MPhil
51-54
Methods of Mining the Data from Big Data and Social Networks Based on Recommender System

P.Priyanga, Dr.A.R.Nadira Banu Kamal
55-60
Comparative Study on Tools and Techniques of Big Data Analysis

B.THILLAIESWARI M.S., M.Phil., B.Ed.,
61-66
A Survey on Load Balancing in Cloud Computing using Various Algorithms

G.Angayarkanni
67-71
Expedition through Various Ant Based Routing Algorithms for MANETS

S.Mahima,MCA.M.Phil,Phd, M.Sudha,MCA.,M.Phil.,
72-78
Mobile Computing - An Introduction With Wireless Lan and Adhoc Network

B.Karthick, V.RajaManickam
79-81
A Study of Various Text Mining Techniques

D. Jasmine Guna Sundari, D. Sundar
82-85
Analysis of Various Image Processing Techniques

Mr. P. RAVI, Dr. A. ASHOKKUMAR
86-89
A Study of Ant Colony Optimization for Image Compression

Ravi.P, Tamilselvi.S
90-92
Analysis of Heart Disease Prediction Using Datamining Techniques

S.SHARMILA, Dr.M.P.INDRA GANDHI
93-95
An Approach to Extract the Data using Hadoop ETL in Disaster Event

M.Saranya, A.Prema, K.Chelladurai
96-100
E-Health for Security and Privacy in Health Care System Using Hadoop Map Reduce

B.Prasanna, A.Prema, K.Chelladurai
101-104
Aids Detection System Using Big Data Analytics

PACKIYAM.S, PREMA.A , CHELLADURAI.K
105-109
A Special Perspective on Web crawler in Web Mining

A. JeevaRathinam
110-113
Efficacious Management of Grid Resources by Grid Venture

M. Janaki
114-119
Network Security, A Challenge

Jenani. M
120-123
Data Storage Security in Cloud Computing Using AES

Tamilselvi.S
124-127
A Study of Anomaly Detection in Bipartite Graph

K. Punitha
128-130









Special Issue - 1st National Conference on Biomedical signal and Image Processing (NCBSI-16 Nov-16, Dept. of BME, held at ACSCE, Bangalore)
Distinguishing Staghorn and Struvite kidney stones using GLCM and Pixel Intensity Matrix Parameters

Dr.Punal.M.Arabi, Pratibha T.P, Aasma Dahal, Deepak samantha
1-4
Estimation of Body Fat using Bioelectric Impedance Analysis

Praful Giridhar Davangeri, Veeresh P, Pooja P. V
5-8
Biomedical Sleep Inducer

Sumukh S R, Dimpal kumara, Aishwarya M N, Priya S B
9-12
Categorising Normal Skin, Oily Skin and Dry Skin using 4-Connectivity and 8-Connectivity Region Properties

Dr. Punal. M. Arabi, Mrs. Gayathri Joshi, Rohith. N. Reddy, Anusha S R, Archa P S
13-15
SU-8 Polymer Based Bio-MEMS Micromachining:A Review

M.V. Devaiah, Dr. S. Anand Kumar
16-19
Performance Evaluation of Filtering Techniques For Cancerous Lung Images

Mrs. Surekha Nigudgi, Dr G M Patil, Dinshid T Ummer, Prathibha H M
20-22
Computer Aided Diagnosis of Osteoporosis Using 1st Order Texture Parameters

Dr.Pravin G.U, Vamsha Deepa, Abrar Ahmed, Divya Susheel
23-27
A Novel Approach to Nebulizer based Drug Delivery System

Mr Hemanth Kumar G, Harsha P S, Shaurya Madappa K, Shreya Srinivas Bhat
28-31
Realization of Real Time Robotic Arm Control System Based on EEG Signal

Dr. Joshi Manisha.S, Hemanth Kumar.G, Harsha L Singh, Preethish Kashyap.H
32-35
Extraction of Fetal ECG from Maternal ECG using Least Mean Square Algorithm

Vamshadeepa.N, Priyanka.H.B, Ashwini.V
36-40
EEG & EMG Controlled Driving Aid for Electric Wheelchairs: Review

Rakesh H B, Swetha B R, Dr.Anitha S
41-44
Liver segmentation by region properties

Mrs. Nanditha Krishna, Rohith. N. Reddy, Dhatri, Raveena. B. Prashanth
45-48
Effective Application for Detection of Diseases from Sclera Image

Mrs.M.Sarala, Mr.Vijayanand, Dr.M.Malathy*
49-51
Distinguishing Normal and Abnormal Eye Images Based on Pixel Intensity Level

Dr. Punal M Arabi, Gayatri Joshi, Tejaswi Bhat, B.R Akshatha Urs
52-56
Energy Efficient Data Transfer in Communication Networks for Wireless Big Data

R.YASHWANTHI, P.NALAYINI
57-64
Hardware Implementation of Combining Image Enhancement and ROI Extraction for Night Time Images

R. Nivedha, W. Newton David Raj
65-71
Evaluation Performance of GLCM and Pixel Intensity Matrix for Liver Cirrhosis

Dr. Punal.M.Arabi, M.R Ramya, Sanjaya Pandey, Varini Chinnabhandar
72-74








Special Issue - 1st International Conference on “Innovations in Computing & Networking”
(ICICN-2016) held at RajaRajeswari College of Engineering, Bangalore

IMPROVING THE WIRELESS SENSOR NETWORK LIFETIME BY DIMINISHING THE ENERGY CONSUMPTION VIA NATURE INSPIRED TECHNIQUE

Vinay R N, Parvathi C
1-4
AN ANALYTICAL FRAMEWORK INTENDED FOR CONGESTION IN WIRELESS NETWORKS

Daina K K, Dhanalakshmi H.B , PallaviGowdoor , Sindhura D
5-9
THREE TIER APPROACH FOR SECURE DATA TRANSMISSION BY USING STEGANOGRAPHY, LOGISTIC MAPS WITH GENETIC ALGORITHM AND VISUAL CRYPTOGRAPHY

VamsiKrishna.Y, Varuni.R.V, Shivaranjini.A
10-14
GREEDY FORWARDING FOR WIRELESS SENSOR NETWORKS WITH GUARANTEED DELIVERY

NamitaMirjankar, Siddhitha S Pai , LohitPatil
15-19
A SURVEY ON SOA GOVERNANCE SCOPE, OBJECTIVES AND ITS POLICIES

Pushpalatha B, R Jaya
20-23
AN EFFICIENT REDUCTION OF ENCRYPTION KEYS FORGROUP DATA SHARING VIA CLOUD STORAGE

Manjula K, Mahalakshmi ,Yashaswini M.S
24-27
PROVISION OF SECURING DATA IN CLOUD THROUGH AUDITING & DEDUPLICATION

Sandhya Rani G.V ,Naveen Ghorpade, Dhananjaya V, K Prakash
28-34
A THIRD GENERATION DESIGN FOR SECURED ATM TRANSACTION USING SIM CARD

A.Chandhanaa ,Durga.S
35-40
CLOUD LATENCY: A CLOUD BASED LATENCY CHECKING SYSTEM FOR THE DEVELOPERS

Arun Kumar P L,Mr.Arun Kumar D R
41-44
TRAFFIC PROFILING AND DYNAMIC WEIGHT COMPUTING USING DWRR FOR AVERAGE PACKET DELAY VERSUS TRAFFIC LOAD

AkshathaKamath, HumeraSiddiqua, Usha M. S
45-50
A CLOUD-BASED VENUE RECOMMENDATION FRAMEWORK ON MOBICONTEXT

Ambika L G, Anitha T N,Bharathi M
51-54
A NOVEL IDENTITY-BASED ENCRYPTION USING OUTSOURCED REVOCATION IN CLOUD COMPUTING

Meenakshi.S, Radhika.B.R, Sripriya.B.S, Tejashwini, Nandini.G
55-59
PORTABLE AND INEVITABLE PATH THROUGH VERSATILE INFORMATION GATHERING IN REMOTE SENSOR SYSTEMS

Rekha B, SowmyaNaik P.T
60-65
ADVANCED NETWORK MONITORING SYSTEM USING A HYBRID OF AGENT AND AGENTLESS CONCEPTS

Rahul S Sreedhar, PrithviVihari R, Dr. N Guruprasad
66-70
SECURING THE DATA CONFIDENTIALITY OF PATIENTS IN DISTRIBUTED M-HEALTHCARE CLOUD COMPUTING SYSTEM

Chandrika, Mahima.J, Yamuna.R, Swetha
71-73
THREE PARTY AUTHENTICATION USING QUANTUM KEY DISTRIBUTION PROTOCOL

Pratap M S, Drishya Nair, Ponnu Narayanan, NithaKamar, Aneesa C V
74-77
REDUCING THE TIME FACTOR FOR ANALYZING THE ERRORS AND FIXING IN BIG SENSOR DATA

Anusha G, Dr. N Guruprasad
78-81
AUTOMATING INFRASTRUCTURE AS A CODE USING CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY

Bhanupriya H, Dr. Krishna A N, Ravi ShekharJha
82-88
PRIVACY PRESERVING MOBILE ACCESS OF HEALTH DATA ENABLING AUDITABILITY

Deepashree N S, Tanushree K N
89-94
INTELLIGENT SOFTWARE AGENT BASED IMAGE FUSION IN WIRELESS MULTIMEDIA SENSOR NETWORK

Bhanu K. N, Dr.P.K.Srimani
95-101
EAMC: USING FOG COMPUTING AND RRP FOR EXIGENCY ALERT SERVICE

Deepika M, Srinivasa R
102-106
TECHNIQUE TO BALANCE ENERGY EFFICIENT CLUSTERING WITH DATA TRANSMISSION IN LARGE SCALE SENSOR NETWORK

Jyothi A.P, UshaSaktivel
107-113
EFFICIENT ENERGY CONSERVATION TECHNIQUE USING SINK NODE MOBILITY FOR BIG DATA GATHERING IN DENSELY DISTRIBUTED WSN

Karthik K J, Anitha K
114-117
IMPLEMENTAION OF PRIVILEGE DATA IN CLOUD COMPUTING BY DOUBLE ENCRYPTION CONCEPT

Govindaswamy H R, Bhanu K N
118-120
SECURED LOAD RE-DEPLOYMENT OF FILE CHUNKS IN DISTRIBUTED FILE SYSTEMS

Roopadevi D.S, Mrs. Nandini G
121-125
ENHANCING COMPUTER INSPECTION USING DOCUMENT CLUSTERING FOR ANALYSIS

Mr.Chandrasekhar M S, Mr.Subhash B N, Mr.Satish V, Mr.Bharath J
126-128
ANALYSIS AND IMPLEMENTATION OF MULTICAST VIDEO USING OPTICAL NETWORK BY STREAMING PROCESS

Nalina kumara, Bhargav Rama Gowd, Hitesh Mehta
129-132
CLUSTERING IN MOBILE WIRELESS SENSOR NETWORKS: A REVIEW

Shantala Devi Patil, Vijayakumar BP
133-136
FIELD WEAKENING STRATEGY IN VECTOR CONTROL OF INDUCTION MOTOR DURING VOLTAGE SATURATION REGION

Pallavi H.R., Sumitha T.L.
137-140
INVESTIGATING HACKERS ON FACEBOOK APPLICATION USING FRAppE

:Asha Alias, Rincy Varghese, Ritu. M. Varghese, Mr. V.M. Saravana Perumal
141-145
A NOVEL APPROACH FOR EFFICIENT DATA COLLECTION IN CLUSTER BASED COMMUNICATION USING COMPRESSIVE SENSING AND MIMO TECHNIQUES TO EXTEND NETWORK LIFETIME

SunandaPatne, Vinodha K
146-152
MANAGEMENT OF QOS IN SENSOR CLOUD

Anasuya N J, Akhila S J
153-155
CONTROLLED DATA ACCESS USING IBE IN CLOUD COMPUTING

Bhoomika M U,Chandini M, Harshitha.R.S, Suraj S Gurav,Prof.Mangala.C.N
156-160
BE-SAFE: APPLICATION TO LIMIT DRUKEN DRIVE CASES

Bharath B K, Abdul Rahoof K, Ashwin Suresh, K Rahul
161-163
ON SURVIVABILITY TESTING AND COMPUTING THE NODE CONNECTIVITY OF A TOPOLOGICAL STRUCTURE OF A INTERCONNECTION NETWORK GRAPH

Nethravathi B, Kamalesh V N
164-166
SECURE SYSTEM WITH HIGHER RELIABILITY AND CONFIDENTIALITY USING DISTRIBUTED DEDUPLICATION OF MULTIMEDIA

AishwaryaR,Anusha G Bedekar, Chandana R, Dr.Malathy M
167-172
EFFICIENT SCHEMES FOR RESOURCE ALLOCATION IN THE CLOUD FOR MEDIA STREAMING APPLICATIONS

ShreyaKulkarni,PragnaPrakash S, Shaila S, Mrs.Janaki.K
173-176
AN OVERVIEW OF SWARM INTELLIGENCE BASED ALGORITHM FOR OPTIMIZATION PROBLEM IN WIRELESS SENSOR NETWORKS

Nandini G, Dr J Anitha
177-181
A SCHEDULED BASED MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY

Anitha K, Usha S
182-186
NFC-BASED SECURE MOBILE HEALTHCARE SYSTEM

Madhura PM, Palash Jain, Harini Shankar
187-190
HUMAN ACTIVITY RECOGNITION USING ANDROID SMARTPHONE

Usharani J, Dr. Usha Sakthivel
191-197
A REWARD-BASED MAC LAYER SCHEDULING FOR CO-OPERATIVE MULTI-HOP. COGNITIVE RADIO NETWORKS

HaseebaYaseen, SnigdhaSen
198-201
LI-FI BASED AUDIO COMMUNICATION AND DEVICE SWITCHING

Madan Kumar K, Karthik M C, Manoj Kumar C, Harshith C, D Pradeepa, K R PavanKumar
202-204
WIRELESS ROBOT CONTROL WITH ROBOTIC ARM USING MEMS AND ZIGBEE

Rakesh. H .K, Shivashankara. B .S.
205-209
AN AUTONOMOUS ROBOT FOR FINDING OPTIMAL PATH DURING DYNAMIC ENVIRONMENT USING GRID BASED APPROACH

Jashwanth N B, SreeRajendra
210-214
PERFORMANCE ANALYSIS OF VARIOUS MANET ROUTING PROTOCOLS USING OPNET SIMULATOR

D.Chitra, Dr.M.Chandrasekaran
215-220
OFFLINE HANDWRITING IDENTIFICATION USING ADAPTIVE NEURAL FUZZY INFERENCE SYSTEM

Devi T, SwathiPriya N, Prabaharan J, Manigandan J
221-223
DETECTION AND IDENTIFICATION OF LBBB AND RBBB RHYTHMS IN ECG WAVES USING GABOR TRANSFORM ANALYSIS

Geetha A, T.R Gopalakrishnan Nair, Asharani M
224-227
REVIEW PAPER ON PHOTONIC CRYSTAL BASED OPTICAL MEMORY

Jyoti.B
228-231
ANALYSIS OF WHITE BLOOD CELLS FOR MALARIA DETECTION

Hemalatha K L, Karthik R, NandanSateeshHegde
232-235
3D RECONSTRUCTION METHODOLOGIES: A REVIEW

Sowmya S G, Dr. Sunanda Dixit
236-238
AUTOMATIC ROAD EXTRACTION FROM SATELLITE IMAGE BY DIFFERENCE OF GAUSSIAN AND CONVOLUTION OVERLAP ADD METHOD

Veda.D, Suma B
239-243
QUALITATIVE IMPROVEMENT IN WIRELESS CAPSULE ENDOSCOPY IMAGES USING SPECIFIC CONTRAST ENHANCEMENT TECHNIQUES

Muddasir Khan , Ashwini S.S, M Z Kurian
244-246
PROMINENCE OF EXPERT SYSTEM AND CASE STUDY- DENDRAL

NamitaMirjankar, ShrutiGhatnatti
247-251
STATE OF ART TECHNIQUE THAT ACCOMPLISHES DIGITAL IMAGE PROTECTION AND SELF RECOVERY

Prema C.R, Megha S
252-256
SUPER RESOLUTION RECONSTRUCTION BASED ON DIFFERENT TECHNIQUES OF REGISTRATION AND INTERPOLATION

KamalavvaTotagi, Chidananda Murthy M V, M Z Kurian
257-262
A SURVEY ON DIFFERENT METHODS FOR BRAIN TUMOR SEGMENTATION

Ngangom Priyobata Singh, Dr. Sunanda Dixit, Prof. B.I. Khondanpur
263-266
AN EFFICIENT IMAGE DE-NOISING USING EPITOME AND WIENER FILTER

Ranjith R D, Ms. Janaki
267-270
SPEECH CONTROLLED SMART WHEELCHAIR USING REGIONAL LANGUAGES

Chandramma R ,Akshatha K Gowda, Asha U2 Jyothi B S ,Meghana B Bapat
271-273
STUDY AND ANALYSIS OF DWT-SVD BASED DIGITAL IMAGE WATERMARKING TECHNIQUE FOR COLOUR IMAGES

Rebecca. A,UshaSakthivel
274-278
ENHANCING IMAGE COPY-MOVE FORGERY DETECTION USING PARTICLE SWARM OPTIMIZATION TECHNIQUES

Veda.D, Suma B Rao
279-284
A SURVEY ON DIFFERENT METHODS FOR LIVER SEGMENTATION

MallikarjunKesaratti, Dr. Sunanda Dixit, Prof. B.I. Khodanpur
285-288
CERTAIN INVESTIGATIONS ON FILTER PERFORMANCE FOR SKIN TEXTURE ANALYSIS

Dr.Punal M Arabi, Gayatri Joshi, Kavya PParameswaran, Abhik Raj Subedi
289-292
APPROACHES TO CONTENT-BASED IMAGE RETRIEVAL

Lavanya B, Meghashree M D, SanjanaP,Usha M, Poonam kumara
293-296
A SURVEY ON USAGE OF FMRI TECHNIQUE IN BCI

Gireesh H R, Dr.B.S.Pradeep
297-299
MULTI MODEL IMAGE REGISTRATION AND FUSION USING FAST DISCRETE CONTOURLET TRANSFORM

Yashaswini V A, P. Bhuvaneswari, B.Aravind
300-304
AN EFFECTIVE & AUTOMATED MR BRAIN IMAGE SEGMENTATION & TUMOR DETECTION

PushpaLathaN,Aruna Kumara B
305-307
CLASSIFICATION OF KIDNEY STONE USING GLCM

Dr.Punal M Arabi, SurekhaNigudgi, Rohith N Reddy,Dhatri
308-310
AUTHENTICATING LOGIN SESSION USING MOUSE BIOMETRIC WITH AES ENCRYPTION

Shruthi G.,Shilpa S.G.,Geeta S. Hukkerimath
311-315
SECURED SECRET IMAGE TRANSMISSION BY USING FRAGMENT VISIBLE MOSAIC IMAGE TECHNIQUE

Ashalatha H M,M.D AnithaDevi,Dr. K.B Shivakumar, Dr. M. Z Kurian
316-319
A FRAMEWORK FOR TEXT ANALYTICS USING THE BAG OF WORDS (BOW) MODEL FOR PREDICTION

Deepu S, Pethuru Raj ,S.Rajaraajeswari
320-323
A NEW APPROACH OF IMAGE STEGANOGRAPHY TECHNIQUE FOR INFORMATION HIDING USING NEAREST FILLING TECHNIQUE

S. Sreedhar Kumar, Bhagyalakshmi
324-326
SPLENDID RESOLUTION IMAGES USING CONTRAST LIMITED ADAPTIVE HISTOGRAM EQUALIZATION

Sushmitha S.R, Rajesh K.S
327-330
AN INTERACTIVE SMART GLASS

Srinivas M, Gangaram D, Varun Reddy R, AtulKewatK,DrS.Usha
331-334
IDENTIFYING SUITABLE ENHANCEMENT TECHNIQUE FOR THERMAL AND NON THERMAL DIABETIC FOOT IMAGES

Dr.Punal M Arabi, Gayatri Joshi, TejaswiBhat, Harsha L Singh
335-338
A FRAMEWORK FOR ANOMALY EVENT DETECTION BY ANALYSING THE VIDEO SEQUENCES

Puttegowda D, U N Sinha
339-344
STEGANOGRAPHICDATA EMBEDDING WITH REVOCABLE TEXTURE SYNTHESIS

AkshayU.Joshi,Sachin K S, Vishal .M, Aruna KumaraB
345-349
DESIGN of an GESTURE RECOGNITION BASED CAR GAMING

Dr. Parameshachari B D, Rubeena Muheeb,Nagashree R N,Deekshith B N, Keerthikumar M, Rashmi P, Rachana C R
350-354
ECG SIGNAL STEGANOGRAPHY USING WAVELET TRANSFORMS

Asha N S, Anithadevi M D, Dr.Shivakumar K B ,Dr. M Z Kurian
355-359
MANUAL SEGMENTATION OF HRCT LUNG IMAGE USING GAP FILLING TECHNIQUE

Dr.Punal M Arabi, VamshaDeepa, Lakshmi Bai P
360-362
AUTOMATED ATTENDANCE SYSTEM USING IMAGE PROCESSING

Pooja G.R, Poornima M, Palakshi S, M. BhanuPrakashVarma, Krishna A N
363-367
EMOTION RECOGNITION:DETECTING EMOTIONS FROM TEXTUAL DOCUMENTS, BLOGS AND AUDIO FILES

Lakshmi.K,Harshitha.K.Rao,Revathi. V,Mrinal, Archana .T.P
368-371
PERFORMANCE ANALYSIS OF DIFFERENT FILTERS WITH VARIOUS NOISES IN PREPROCESSING OF IMAGES

Janaki K, Dr.M.Madheswaran
372-376
POWERFUL IMAGE COMPRESSION TECHNIQUE ON MEDICAL IMAGES

Janaki K ,Dr.M.Madheswaran
377-382
AN A3P APPROACH TOWARDS IMAGE PRIVACY POLICY RECOMMENDATION ON CONTENT SHARING SITES

Mrs.Swapna R, Dr.Nagesh H R
383-386
ANALYZING THE REAL PHOTO IMAGES WITH THE SCANNED PHOTO IMAGES USING HISTOGRAM EQUALIZER

Dr.M.Malathy, Mr.Vijayanand, Dr.ArputhaVijayaSelvi
387-389
A SURVEY ON DYNAMIC WEB SERVICES COMPOSITION EXISTING METHODS AND RELATED TECHNIQUES

NehaSinghal, Dr.Y.S. Kumaraswami
390-394
WEIGHTED ITEMSET MINING FROM BIGDATA USING HADOOP

Divya.M.G, Nandini.K, Priyanka.K.T, Vandana.B
399-404
LIVE WEBSITE TRAFFIC ANALYSIS INTEGRATED WITH IMPROVED PERFORMANCE FOR SMALL FILES USING HADOOP

Navyashree B L, Rakshitha H, Ranjitha M, T Auntin Jose
405-408
CUSTOMER BEHAVIOR ANALYSIS OF WEB SERVER LOGS USING HIVE IN HADOOP FRAMEWORK

Lavanya KS, Srinivasa R
409-412
RANKING DETECTION AND AVOIDANCE FRAUDS MOBILE APPS STORE

Abhiilash T P, L Dinesha
413-418
STREAM PROCESSING OF SCIENTIFIC BIG DATA ON HETEROGENEOUS PLATFORMS WITH IMAGE ANALYTICS ON BIG DATA

Ms. Shruti B Karki, Mr. Auntin Jose. T
419-424
ANALYSIS OF DWT OFDM USING RICIAN CHANNEL AND COMPARISON WITH ANN BASED OFDM

Geeta S H, Smitha B, Shruthi G, Shilpa S G
425-430
AUTOMATIC RANGE TIMELINE GENERATION FOR VOLUME BASED TWEET STREAM

Tejaswini K, Madhavi H, Sreenivasa B R
431-435
OVERVIEW OF BIG DATA VISUALIZATION

Sagargouda S.Patil
436-438
PREDICTIVE, CORRECTIVE ACTIONS OF ENERGY MANAGEMENT AND BENEFITS THROUGH DATA ANALYTICS WITH INTELLIGENT REPORTING

Spurthi. R .Terwai,Shamshekhar. S. Patil
439-443
IMPLEMENTATION OF AN EFFICIENT MONGODB NOSQL EXPLORER FOR BIG DATA VISUALIZATION

Chaitanya.P, Ranjan H.P, Kiran T.S, Anitha.K
444-447
EVALUATING THE JOB PERFORMANCE USING DYSCALE SCHEDULER AND MAPREDUCE IN HADOOP FRAMEWORK

Supriya.R, Kantharaju.H.C
448-451
IMPLEMENTATION OF EXTENDED MAPREDUCE FOR EMERGING BIGDATA ANALYTICS

Nayana N Kumar, Jayashree L K
452-455
A FRIEND RECOMMENDATION SYSTEM BASED ON SIMILARITY METRIC AND SOCIAL GRAPHS

Rashmi. J, Dr. Asha. T
456-460
A SELECTIVE APPROACH FOR STORING SMALL FILES IN RESPECTIVE BLOCKS OF HADOOP

Chethan.R ,ChandanKumar, JayanthKumar.S ,Girish.H.J ,Mangala.C.N
461-465
INTEGRATION OF VISUAL TEMPORAL AND TEXTUAL DISTRIBUTION INFORMATION FOR NEWS VIDEO MINING

Prof Shivamurthy R C, Tauseef Ahmed S S
466-472
A SURVEY OF VARIOUS TECHNOLOGIES FOR SOA ADOPTED BY SOFTWARE INDUSTRIES

Karthik .V, Prof. R.Jaya
473-476
STUDY OF IOT: UNDERSTANDING IOT ARCHITECTURE, APPLICATIONS, ISSUES AND CHALLENGES

Soumyalatha,Shruti G Hegde
477-482
A NOVEL APPROACH TO DESIGN A SMART BIN USING THROUGH IOT

SRUTHI K V, MANJUNATH K N
483-485
PREPARATION OF PAPERS FOR AN E-GOVERNANCE PORTAL FOR TAX PAYMENT

Rizwanaunnisa, Bhanuk.N
486-489
SOCIAL MEDIA ANALYTICS FOR BUSINESS ANALYSIS AND IMPROVED DECISION MAKING

HarshaVasishta M. Sreenivasa B. R
490-493
A FRAMEWORK ON PENETENTIARY CONSERVANCY

Syedaasrasamreen, Bhanu K. N.
494-496
INTERNET OF THINGS FOR ENVIRONMENTAL MONITORING

Srinivasa.R, Bhoomika.K.N, Deepa.C, Rashmi.R.K
497-501
AN GENERIC CLOUD FRAMEWORK FOR CLOUD BASED APPLICATIONS

Arvind Kumar M, MrT.Auntin Jose
502-506
SMART BUS ALERT SYSTEM FOR EASY NAVIGATION OF BLIND

Adarsh Holikatti , Dr. S. Mohan Kumar
507-512
AUDIO-VIDEO GENERS CLASSIFICATION USING AANN

Dr. K. Subashini, Vijayaanand.S
513-517
A SURVEY ON IMPORTANCE AND APPLICATIONS OF DATA MINING USING ARTIFICIAL NEURAL NETWORK

Ms. R.Jaya, Mr.Giridhar V
518-522
METHODOLOGY TO MAKE NATURAL LANGUAGE AS COMPUTER PROGRAMMING LANGUAGE

Nalina H J, Mr.Vinay T R
523-525
APPROACHING MACHINE LEARNING USING H2O AND INSPECTING IT ON APPAREL INDUSTRY USING D3 VISUALIZATION

Chaitra D.B, Mrs.Bindiya M.K
526-531
A NOVEL FRAME WORK FOR E-NDORSE

Divya R K ,Bhanu K N
532-534
IMPLEMENTATION OF INPAINTING ALGORITHM

Rohan Ramakrishna Genne, Bhanu K. N
535-537
A NOVEL APPROACH OF 4*4 VEDIC MULTIPLIER USING REVERSIBLE LOGIC GATES

Shivarathnamma, G.Jyothi, M Z Kurian
538-542
DESIGN, IMPLEMENTATION AND COMPARISON OF 8-BIT VEDIC MULTIPLIER USING MULTIPLEXERS AND LOGIC GATES

Sumanashree C.V, M.C.Chandrashekhar, M Z Kurian
543-546
DESIGN APPROACH FOR INCREASED LIFETIME OF WSN USING ARTIFICIAL NEURAL NETWORK BASED DATA AGGREGATION

Manomi K S, Vinutha C B, M Z Kurian
547-550
ANTI-JAMMING TECHNOLOGY FOR MOBILE SIGNALS USING EMP JAMMER

Akash R Mannari
551-553
DESIGN AND IMPLEMENTATION TO INCREASE THE EFFICIENT ROUTING SCHEMES BY DISTRIBUTE LIFETIME IN WSN

R Tejas, Manjula Devi T.H
554-557
OBTAIN LOW ENERGY CONSUMPTION USING FORWARDING TECHNIQUE IN WIRELESS SENSOR NETWORK

Mamatha G, A. Sreenivasan
558-560
AN EFFICIENT ROUTING PROTOCOL WITH SUCCESSIVE INTERFERENCE CANCELLATION IN WIRELESS SENSOR NETWORKS

Tejaswini S, Nagarathna
561-563
ENHANCED AODV WITH SECRETE KEY SHARING TO IMPROVE SECURITY AND ENERGY EFFICIENCY IN MANETS

Mr. Murali G, Ms. Divyashree B.N, Dr. Balakrishna R, Dr. M.VinayakaMurthy
564-568
DECISION TREE BASED PREDICTIVE ANALYTICS FOR DETECTING PREGNANCY INDUCED HYPER TENSION

Ranjith Ramesh
569-576
QUEST FOR COMPUTATION-SOLVING QUANTUM MECHANICAL CALCULATION ON MOLECULES

N.Sathyan, Jobish Johns and T. R Gopalakrishnan Nair
577-579
SELECTIVE HARMONIC MINIMIZATION METHODFOR CASCADED MULTINVERTERS USING ANNS

PrakruthiVasanth, Gowtham N
580-584
DATA PROTECTION IN THE CLOUD BY USING JAR GENERATION

Hanusha.K,G.Priyanka, Sridihar
585-589







Special Issue - UGC Sponsored National Conference on Advanced Networking and Applications (NCANA'15) held at Government Arts College, Udumalpet
A Note On: Cognitive Radio and It Performance Tools

Ms.L.Indhumathi, Dr.R.Vadivel
1-7
A Secured Mobile Ad Hoc Network Using Certificateless Effective key Management CL-EKM)

Dr. M.Gobi, L.Moorthi
8-13
Brain Tumor Detection and Identification Using K-Means Clustering Technique

Malathi R, Dr. Nadirabanu Kamal A R
14-18
Challenges of Wireless Sensor Networks and Issues associated with Time Synchronization

S. Karthik, Dr. A. Ashok Kumar
19-23
Comparative Analysis and Implementation of Verifiable Secret Sharing Over a Single Path in VoIP Security with Reliable Time Delay

R. Shankar, Dr. E.Karthikeyan
24-27
Decision Tree based Network Packet Classification Algorithms

T S Urmila, Dr R Balasubramanian
28-34
Developing Multimedia Services in Mobile Social Networks from Security and Privacy Perspectives

D Murugeswari, B Thillaieswari
35-39
Job Shop Scheduling Using Metaheurestic Search Technic – Tabu Search

K.Anandapadmanabhan
40-43
An Overview of MANET Routing Protocols

Anto Ramya. S. I
44-49
Mobile-Cloud: A Framework Of Cloud Computing For Mobile Applications

Dr. R. UMARANI, R. SUGUNA
50-52
Performance Evaluation of Machine Learning Techniques for Text Classification

Dr.R.Manicka chezian, C.Kanakalakshmi
53-57
SOP: An Approach to Minimize Path Discovery Delay and Find Shortest Optimum Path

V.Princy, Dr.P.Calduwel Newton
58-61
Tools to Trace Path between Server and Web Applications over Internet

P Veeralakshmi, A Dhavapandiammal
62-66
Wireless Sensor Networks: Application, Architecture, Design issues and Research Challenges

O.Deepa,, Dr. A. Senthilkumar
67-70
A New Approach to Detect, Filter And Trace the DDoS Attack

S.Gomathi, Dr.E.Karthikeyan
71-75
Review On Rushing Attack And Its Prevention Techniques In MANET

R.Thilagarasi, D.Geetha
76-79
A Review on Spectrum Sensing Techniques in Cognitive Radio Network

A.Arthy, P.Periyasamy
80-83
A Review on Types of Jamming Attack In Mobile Ad-Hoc Network

R.Maheswari, Ms.S.Rajeswari
84-86
A Survey Of Neural Network In Heart Attack And Bloodcancer

Dr.S.Sujatha, Ms.D.Divya
87-89
A Survey of Routing Attacks in Manet

R.Latha, S.Sasikala
90-93
A Survey On Smoothing Quality And The Liveness Of The Stream By Increasing The Smoothing Window Size In Video Streaming

A.Jagadeeshwaran, Dr.E.Karthikeyan
94-97
Content Based Image Retrieval “Public and Private Search Engines”

Dr T. Santha, M .Abhayadev
98-102
Design Of Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data

Mr. S.Sathish, Mrs. B.Hemalatha
103-106
Green Computing Techniques to Power Management and Energy Efficiency

Bobby. S
107-112
Internet Of Things: A Great Wonder

Mr. P. Ravi, Dr. A.Ashokkumar
113-119
Iris Recognition Process

Sr.Sagaya Mary James
120-122
Li- Fi Compete The Wi-Fi And Comparative Study Between Li- Fi Vs Wi-Fi

J Fathima Kaleema
123-126
Message Authentication in Sensor Networks Using En-route Filtering

K.J. Sridevi
127-131
Mobile Data Mining-Using Mobile Device Management System (Mdm)

Mrs.N.Kanchana, Ms.N.Abinaya
132-134
RSA Algorithm and Signature in Cloud in Cloud - Review

Mrs. Dhina Suresh, Dr. M. Lilly Florence
135-140
A Secured Cloud Security Using Elliptic Curve Cryptography

Dr.M.Gobi, Karthik Sundararaj
141-144
A Security Analysis In Voip Using Hierarchical Threshold Secret Sharing

E.S. Thirunavukkarasu, E. Karthikeyan
145-149
A Study on Mining Lung Cancer Data for Increasing or Decreasing Disease Prediction Value by Using Ant Colony Optimization Techniques

Dr.T.Christopher, J.Jamera banu
150-153
Energy-Efficient Routing Protocols in Mobile Ad Hoc Networks: A Survey

M. Kokilamani, Dr. E. Karthikeyan
154-162
Comparative Analysis of Internet Traffic Identification Methods

Kokila S, Sathish A, Shankar R
163-167
A Comparative Study on the Performance and the Security of RSA and ECC Algorithm

Dr.M.Gobi, R.Sridevi, R.Rahini priyadharshini
168-171
Real Time Activity based Pre-key Distribution in three tier security schemes in Wireless Sensor Networks

B.Sangeetha, Radhimeenakshi
172-174
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks

R.Rajamani, M.Rathika
175-179
Trust and Cluster based Security architecture in MANET for a Collaborative Computing Environment

S.Sivagurunathan, K.Prathapchandran
180-186
A Study on Congestion Control Algorithms in Computer Networks

K. Pavithra, Dr. E. Karthikeyan
187-190
Analysis of Big Data Based On Ensemble Classification

Mrs. Marrynal .S. Eastaff, Mrs. Premalatha P
191-193
A Study Of Clustering Based Algorithm For Outlier Detection In Data streams

Dr. T. Christopher, T. Divya
194-197
A Comparative Study on Secured Image Transmission Using Steganography Techniques

R. BharathiPriya, Dr. E. Karthikeyan
198-200
A Comparative Study on Various Routing Protocols of Wireless Sensor Network

P. Ramesh, S. Kruba
201-205
A Study on Security Concepts In Mobile Ad Hoc Network

P.Ramesh, G.Ramya
206-211
Diabetes Risk Factors Analysis Based on Genetic Factor Using Genetic-Pattern Matching Approach

K. Soundarrajan, L.Thenmozhi
212-216
Evaluating the Performance of Routing Protocols In Mobile Ad-hoc Networks

K. Vijayalakshmi, Dr. R. Manicka Chezian
217-221
Assignable Algorithms Available for Missing Data for Finding MV

P.Logeshwari, Dr.Antony Selvadoss Thanamani
222-227
Routing Protocols in MANET

K. Maheshwari, M.Sahaya Agnel Rigana
228-234


National Conference on Current Research Trends in CLOUD COMPUTING & BIG DATA held at Jaipur National University
Prediction of Student’s Academic Performance using Clustering

Prof. Prashant Sahai Saxena, Prof. M. C. Govil
1-6
Ant Colony Optimization – A Prologue

AASHDEEP SINGH, V. S. DHAKA, Gurpreet Singh
7-11
Suitability of Ant Colony Optimization as an Application to MANET

Amanpreet Kaur, V. S. Dhaka, Gurpreet Singh, T. P. Singh
12-16
Estimating Performance of TCP Alternatives in Wireless Environment

Neha Bathla, Amanpreet Kaur, Gurpreet Singh
17-22
Comparative Assessment of SAR Under Different Power Density Exposure for Human Eye for near Field Radiation of Electromagnetic Wave at Wireless Communication of 900 Mhz and 1800 Mhz frequency

Pragati Sharma, A K Gautam, Sandeep Kumar
23-26
A Secure Hardware Based Multifarious Component Authentication Technique Using USB for Cloud Environment

Ankit Dhamija, Deepika Dhamija
27-32
Mining Weighted Frequent Patterns using 'Weighted_FPGrowth’ - A modified FP-Growth

Deepak Sinwar, Dr. V. S. Dhaka
33-36
A Model for Classification of Issues and Strategies Related To Smart Phones Applications Testing

Deepika Dhamija
37-41
Automatic e-mails Classification Using Genetic Algorithm

Mandeep Choudhary, V. S. Dhaka
42-49
Developing a CAPTCHA Utilizing Cognitive Ability of Human through PHP

Dr. Vijay Dhaka, Mrs. Geeta Gandhi
50-54
Performance Evaluation of Mobile Agent within Domain Using Security Bank

Hans Raj, Dr. V.S. Dhaka
55-57
A Study on Recent Trends and Workload Prediction Requirements of Cloud Computing

Supreet Kaur Sahi, Dr. V.S.Dhaka
58-61
Speech Recognition: A Review

Manoj Kumar Sharma, Omendri kumari
62-71
A Framework for Big Data Analytics as a Scalable Systems

Himanshu Shekhar, Manoj Sharma
72-82
Automatic Number Plate Recognition - Approch for Detecting the Vehicle Number Plate On-The-Go

Priti Rajvanshi
83-89
Study of MANET Routing Protocols

Harshita Tuli, Dr. Sanjay Kumar
90-93
Character Recognition of Offline Handwritten English Scripts: A Review

V. S. Dhaka, Manoj Kumar, Harshit Sharma
94-103
Segmentation of Lung Nodule Using Image Processing Techniques from CT Images

Santosh Singh, Ritu Vijay, Yogesh Singh
104-107
Decision Support System: A Step towards Improved and Efficient Decision Making in Government Organization

Vijay Pal Dhaka, Pooja Nahar
108-113
Offline Handwritten English Script Recognition: A Survey

V. S. Dhaka, Manoj Kumar, Prashant Chaudhary
114-124
Optimization Technique in Optical Interconnection Network

Vishal Choudhary, Madan Singh
125-128
A Symmetric Key Based Framework for Data Security in Cloud Computing

Mrinal Kanti Sarkar, Dr. V S Dhaka, Rupayan Das
129-134
Lossless Image Compression having Compression Ratio Higher than JPEG

Madan Singh, Vishal Chaudhary
135-139
Data Management and Big Data Text Analytics

Zaheeruddin Ahmed
140-144
Comparability of Conventional Network and Neural Network Techniques for Image Enhancement Methods

Mamta Sakpal, Nitin Jain
145-148
Tending to Security Issues in Cloud Computing

Sumati Manchanda, Manpreet Singh Bajwa
149-152
Scrutinizing Various Approaches towards Green Cloud Computing

Sumati Manchanda, Manpreet Singh Bajwa
153-158
Facial Expression Recognition: A Review

Dr. Sanjay Kumar, Ayushi Gupta
159-162
A Review: English Online Handwriting Recognition

PratishrutiSaxena
163-169
Modern Compiler Design: An approach to make Compiler Design a Significant Study for Studentse

Namit Bhati
170-175
A Survey on Rule Extraction for Achieving a Trade off Between Accuracy and Comprehensibility

Vikash Gupta, Mamta Sakpal Surve
176-179
Comparative Study of Reactive Routing Protocols for MANETs

Keren Lois
180-183
Data Mining in Education Sector: A Review

Jaya Srivastava, Dr Abhay Kumar Srivastava
184-190
HPCC System and its Future Aspects in Maintaining Big Data

Tarun Goya, Ved Prakash Upadhyay, Bhartendu Shrimali
191-194
Analysis of different Routing Protocols in Mobile Ad Hoc Network (MANET)

Latika Mehrotra
195-200
Security and Data Compression in Cloud Computing Using BlobSeer Technique

Ashwin Dhivakar M R, Prof. D Ravichandran, Dr. Vijay Dakha
201-203
Common Fixed Point of Compatible and Weakly Compatible Maps in Fuzzy Metric Spaces

Dr. DEEPTI SHARMA, NIDHI SHARMA
204-207
Feature Extraction Techniques Based on Color Images

Dr. Sanjay Kumar, Ankur Chauhan
208-214
Multi-Level authentication in Cloud Computing using 3D security

Jeena Jha, Jalak Pansuriya
215-218


National Conference held at Marvadi Educational Institution
An Analysis of Minimum and Maximum Character Bounds of Password Lengths of Globally Ranked Websites

Dr. Jatinderkumar R. Saini
1-6
An Analysis of Opinion Mining Research Works Based on Language, Writing Style and Feature Selection Parameters

Jasleen Kaur, Dr. Jatinderkumar R. Saini
7-13
A Literature Review on Recent Advances in Neuro-Fuzzy Applications

Nidhi Arora, Dr. Jatinderkumar R. Saini
14-20
Performance Analysis of Supervised Techniques for Review Spam Detection

Mr. Ashok Badresiya, Prof. Saifee Vohra, Prof. Jay Teraiya
21-24
Comparative Analysis of Prediction Accuracy of General and Personalized Datasets Based Classification Model for Medical Domain

Omprakash Chandrakar, Dr. Jatinderkumar R. Saini
25-28
A Survey on Effects of Computer Based Technology for Special Needs Learners

Jonita Mekie, Dr. Devarshi Mehta, Dr. Priti Sajja
29-33
A Review on Dysarthric Speech Recognition

Megha Rughani, D. Shivakrishna
34-38
Computational Thinking the Intellectual Thinking for the 21st century

J. Shailaja, Dr. R. Sridaran
39-46
Comparison and Implementation Challenges in E-Commerce and M-Commerce (B2B) Web Sites

Nilesh Advani
47-52
Identification, Categorization and Weighting of Software Engineering Attributes for Quality Evaluation of Software Project Documentation

Vikas S. Chomal, Dr. Jatinderkumar R. Saini
53-62
Use of Cluster Analysis-A Data mining tool for improved water quality monitoring of River Satluj

Neetu Arora, Amarpreet Singh Arora, Siddhartha Sharma, Dr. Akepati S. Reddy
63-69
A Review on Low Power Testing Techniques

Shaktisinh Jadeja, Preeti Mathuria, Jayesh Popat
70-72
A Study of Current State of Work and Challenges in Mining Big Data

Kaushika Pal, Dr. Jatinderkumar R. Saini
73-76
Novel Approach for Fingerprint Recognition Using Sparse Representation

Rohit Thanki, Komal Borisagar
77-82
Performance Based Study and Comparative Analysis of Various Algorithms and Techniques for Information Retrieval

Jinal H. Tailor, Gaurang K. Panwala
83-86
Optimization of Energy Usage for Computer Systems by Effective Implementation of Green Computing

Vimal P.Parmar, Apurva K. Pandya, Dr. CK Kumbharana
87-90
Live Experiments depicting SQL Injection Attacks

Prof. Disha H. Parekh, Mr. Dhaivat Dave, Dr. R. Sridaran
91-93
Development of Privacy Protecting Identity Management System for E-Government in India

Aparajita Pandey, Dr. Jatinderkumar R. Saini
94-100
Exploring the Challenges in MANETs

Hardik K. Molia, Prof. Rashmi Agrawal
101-107
Issues and Challenges of Security in Cloud Computing Environment

Prof. Divyakant Meva, Dr. C. K. Kumbharana
108-111
Profile Based Location Update Strategy in Mobile Computing

Prof. Kalpesh A. Popat, Dr. Priyanka Sharma
112-116
Comparative study of Amazon EC2 and Microsoft Azure cloud architecture

Prof Vaibhav A Gandhi, Dr. C. K. Kumbharana
117-123
An Overview of DDoS Attacks in Cloud Environment

Nagaraju kilari, Dr. R. Sridaran
124-127
Enhancement Clustering of Cloud Datasets using of Improved Agglomerative Technique

Prof. Madhuri h Parekh
128-131
Survey-ACO in Task Scheduling problem

Vinothina V, Dr.R.Sridaran
132-136
Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools

Ms. Rakhi Budhrani, Dr. R. Sridaran
137-150
Analysis and Survey of Issues in Live Virtual Machine Migration Interferences

Ms. Tarannum Bloch, Dr. R Sridaran, Dr. Prashanth CSR
151-157
All Copyrights © 2013 , Eswar PublicationsDesigned by , klmn Software Solutions