S.No. Paper ID Title 1569890217 2

S.No. Paper ID
1569890217
1
1569891865
2
Title
2-Bit Magnitude Comparator using GDI Technique
A Comparative Analysis and Design Study of Cross Layer Scheme Based Algorithm to increase the Qos
performances in wireless Communication
A Cross-layer Topology Control with Clustering and Routing for Energy Efficient Wireless Sensor
Networks
A Discrete Multiwavelet Based Video Watermarking Scheme Using SURF Features
3
1569905367
4
5
1569882817
6
7
8
1569910449
A Distributed Intrusion Detection System to Thwart Security Attacks in Mobile Adhoc Networks
(MANETs)
A Flexible Approach for Securing MANETs
1569895117
A Fuzzy Approach for Detection of Impulse Noise from Color Image
1569868661
9
10
11
12
13
14
15
16
17
18
19
1569895069
A Genetic Algorithm for Task Allocation in Collaborative Software Development using Formal Concept
Analysis
A Genetic Approach for processor Scheduling
1569904817
A Gray-Scale Image Encryption Using Fisher-Yates Chaotic Shuffling in Wavelet Domain
1569893729
A Multilingual Currency Interpreter
1569873957
A New Approach for Data Cleaning Process
1569904901
A New Approach for Flame Image Edges Detection
1569896127
A Noble Technique for Detecting Anemia through Classification of Red Blood Cells in Blood Smear
1569895381
A Novel Approach: Multiview Video Compression
1569909389
A novel APSP algorithm and it's application in Multi Domain SDN
1569905179
A Novel Blackhole Attack for Multipath AODV and its Mitigation
1569887667
A novel image fusion technique for gray scale images using tensor unfolding in transform domains
1569901137
20
1569868373
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1569876983
A Novel Intrusion Detection System for Ad Hoc Flooding Attack Using Fuzzy Logic in Mobile Ad Hoc
Networks
A Novel Method to Prevent the AODV Protocol from Coopeartive Black hole attack in Mobile Ad hoc
Network
A Novel Study of Fuzzy Clustering Algorithms for their Applications in Various Domains
1569869313
A Parallel Approach for Image Steganography using OpenCL in GPU Based Systems
1569896867
A Privacy Settings Recommender System for Online Social Networks
1569868901
A Probabilistic Method to Optimize Energy Consumption in Mobile Ad-hoc Networks
1569869377
A Proposed System for Cotton Yarn Defects Classification Using Probabilistic Neural Network
1569902379
A real-time approach to stabilization of Inverted Pendulum using two-loop PID, PID+PI and LQR
1569867209
A Reduced Complexity Approach for Image Compression using 1-D & 2-D Chaos Functions
1569918719
A Resource Allocation Algorithm for Heterogeneous Jobs in Grid Environment
1569910511
A scalable Feature Selection Algorithm for large datasets - Quick Branch & Bound Iterative (QBB-I)
1569869375
A Self Explanatory Review of Decision Tree Classifiers
1569894847
A Skewed Derivative Activation Function for SFFANNs
1569894821
A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks(VANETs)
1569869237
Accelerating Convolution Coding And Viterbi Decoding on GPUs using OpenCL
1569895213
Achieving High Dimension CNF to DNF Conversion using Grid Computing
1569894891
ADS:Protecting NTFS From Hacking
1569904975
An agent -based optimized cloud service discovery system
1569903097
AN ANALYSIS OF NUMERICAL SOLUTION OF DIFFUSION EQUATION WITH NON- LOCAL BOUNDARY CONDITION
1569916531
An Efficient Algorithm for Fast Block Motion Estimation in High Efficiency Video Coding (HEVC)
1569884189
An Efficient Algorithm of Steganography Using JPEG Colored Image
1569893513
An Efficient Approach for Web Navigation Using Ant Colony Optimization
1569918663
An Efficient Checkpointing using hypercube Structure (self-adjusted) in Mobile Ad Hoc Network
1569910927
An Efficient Halftone Visual Secret Sharing Scheme
1569895073
An Efficient Novel Latch design for Sequential Applications
1569916293
An Energy Saving Algorithm for Variable Cache Ways
1569892531
An Improved Approach for Solving 0/1 Knapsack Problem In Polynomial Time Using Genetic Algorithms
46
1569895461
47
48
1569905439
49
50
51
52
53
54
55
56
57
58
59
60
1569894641
Analysis of flows using Bagging,LogitBoost and Rotation Forest Machine Learning Algorithms for Real
Time Internet Traffic Classification
Analysis of Supervised Maximum Likelihood Classification for Remote Sensing Image
1569893901
Analysis of Various Direction Lifting Schemes for JPEG2000 Standard
1569918743
Anomaly Detection using Smart Tracing Tricks on Call Stack
1569907823
Applicability of Wavelet Transform in Multi-resolution Motion Estimation Technique
1569893127
An Improved Method for Emotions Detection using Gabor Wavelet and Radial Basis Function (RBF)
Network
Analysis and Realization of Relaxed Consistency Memory Model for Multi-core CPU or GPU
1569869461 Application of Functional Link Based Artificial Neural Networks for Exchange Rate Prediction
1569868823
Area and Speed Efficient Floating Point Unit
1569868919
Automated methodology comprised of supervised techniques to assist product selection
1569904971
Automatic Processing of EEG signals for Seizure Detection using Soft Computing Techniques
1569904165
Automatic Segmentation of Broadcast News Audio using Self Similarity Matrix
1569888499
Bangla web page reader - an approach to Bangla text-to-speech conversion
1569895103
BFCA-VF: Best Fit Channel Allocation and Void Filling by Burst Segmenting and Scheduling
1569869621
61
62
63
64
65
66
1569915925
Binary Division Algorithm and High Speed Deconvolution Algorithm (Based on Ancient Indian Vedic
Mathematics)
Bit Level Multi Way Feedback Encryption Standard Ver-1(BLMWFES-1)
1569910739
By Fractional Frequency Reuse Mitigate Interference in Heterogeneous Femto and Macro Cell Networks
1569918729
Circular Morphological Feature Extraction for Nuclear Medicine Facilitation
1569904459
Clinical Decision Support System for Diabetes Disease Diagnosis Using Optimized Neural Network
1569895479
Color Based Image Retriveal System Using SVM Classifier and BTC
1569894713
67
1569891375
68
1569894205
69
70
71
72
73
74
75
76
77
78
1569899575
Combination Approach to Score Level Fusion for Multimodal Biometric system by using Face and
Fingerprint
Combination of Encryption and Digital Watermarking Techniques used for Security and Copyright
Protection of Still Image
Combining Multiple Features Using Canonical Correlation Analysis for A PCG Biometric Identification
System
Comparative Analysis Of Haar and Skin color Method For Face Detection
1569904987
Comparison of Classification Techniques for Intrusion Detection Dataset using WEKA
1569894071
Constructing Secure Web Applications With Proper Data Validations
1569895739
Content Based Categorization of E-Mail using Hidden Markov Model Approach
1569895049
Content Extraction from Web pages - A survey
1569888037
Crossbreed Multi-level Cache Management Policy
1569895489
Cutting Stock Problem: A Survey Of Evolutionary Computing Based Solution
1569905023
Data Security Protocol for Cloudlet based Architecture
1569905477
Debugging and Visualization Techniques for Multithreaded Programs: A Survey
1569888163
79
1569884545
80
81
1569891253
Degree of Disease Possibility (DDP): A mining based statistical measuring approach for disease prediction
in health care data mining
Design & Development of Image mosaicking based Intelligent Road Traffic Congestion Control Scheme
(IRTCCS)
Design and implementation of TDPC sleep scheduling algorithm for energy efficient networks
82
83
84
85
86
87
88
89
1569918825
Design, Development and Analysis of Organizational Level Email Archival Searching System Using
Freeware Open Source Software's
Detection and Prevention of Profile Cloning in Online Social Networks
1569904799
Detection of Direction Deviation of Vehicle using CCTV Cameras
1569868429
Developed Personalized Cyber Clone System By Amalgamation Of Human Brain Intelligence
1569895097
Domain-Independent Hindi Language Question-Answering System Based on Relational Database
1569907105
Dynamic Page Replacement at the Cache Memory for the Video on Demand Server
1569895287
Dynamic Scheduling of Trains in Multi Agent based Railway System
1569910781
Effective Resource Management Techniques using Reservation Pool
1569917311
Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques
1569894965
90
91
92
93
94
95
96
97
98
99
1569893883
Embedding ECG and Patient Information In Medical Image
1569888965
Empirical Analysis of Object Oriented Metrics using Dimensionality Reduction Techniques
1569893651
Energy based Efficient Resource Scheduling: A step towards Green Computing
1569888061
Energy Conservation of Access Point Using CAPS algorithm
1569893043
Energy Efficient Algorithm for Routing Problem in Wireless Sensor Networks
1569907799
Energy Efficient Communication Protocol for Wireless Sensor Networks with Mobile Nodes
1569904707
Energy Efficient Protocol for Heterogeneous Wireless Sensor Networks Using Fuzzy Logic
1569894373
Energy Efficient Protocol For Wireless Sensor Network
1569868511
Enhanced lambda Iteration Algorithm for the solution of large scale Economic dispatch problem
1569910519
100
101
102
103
104
105
1569874089
Enhanced Sentiment Analysis of Informal Textual Communication in Social Media By Considering
Objective Words and Intensifiers
Evaluation of a New Modified Firefly Algorithm
1569899829
Evaluation of MFCC for Speaker Verification on Various Windows
1569894107
Expert System and it's Requirement Engineering Process
1569895501
Feature Subset Selection For Linked Data
1569895503
Feature Subset Selection For Linked Data
1569895335
106
107
108
109
1569853219
Feature subset selection using differential evolution mechanism to improve performance of cereal grain
classification
Finding Shortest Path Between Two Locations Using Matrix Representation
1569905335
Fuzzy Expert System for the Risk Identification of the Hepatocellular Carcinoma
1569892321
Game Analysis and Prediction of Ball Positions in a Football Match from Video Footages
1569894691
110
111
112
1569880927
Genetic Algorithm to Optimize Cluster Head Selection for Prolonging Lifetime of Wireless Sensor
Networks
Gujarati Text-To-Speech (TTS) conversion system using Histogram and Edge detection method
1569886915
Hardware Software Partitioning of Task Graph Using Genetic Algorithm
1569895557
113
114
115
116
1569866993
Heterogeneous traffic handling using Genetic Binary Decision Tree and Earliest Deadline Fairness for
WBAN system
Hierarchical Wavelet Adaptive Control for a Class of Uncertain Underactuated Systems
1569868877
Highly Randomized Image Steganography using Secret Keys
1569911133
Homomorphic Encryption Scheme Ensures Data Security on Cloud
1569918585
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
1569868515
Hybrid Approach to Image Enhancement using Contrast Stretching on Image Sharpening and the analysis
of various case arising using Histogram
Hybrid Neuro-Fuzzy Approaches for Abnormality Detection in Human Retinal Images
1569895209
ID-based Signcryption Scheme Based on Elliptic Curve
1569905079
Impact of Black Hole and Gray Hole Attack in AODV Protocol
1569893541
Impact of Memory Intensive Applications on Performance of Cloud Virtual Machine
1569910009
Implementation Issues with Devanagari Handwritten Text Recognition
1569839657
Implementation of a New Symmetric Key Encryption Algorithm: Performance Analysis with DES
1569894143
Implementation of Automated Sentiment Discovery System
1569885259
Improved Blocking Expanding Ring Search (I-BERS) Protocol for Energy Efficient Routing in MANET
1569900743
Improved Blom Key Management Scheme For Wireless Sensor Network
1569839717
Inferring Trust Relationships in Web-based Social Networks using Min-Max and A* Search Algorithm
1569895145
Intensified Regularized Discriminant Analysis Technique
1569896857
IOCP: Implementation of Optimized Commit Protocol
1569918889
LabVIEW Based Design of Heart Disease Detection System
1569895405
Link-Based Classification for MultiRelational Database
1569917429
LOD Cloud Mining for Prognosis Model (Case Study: Native App for Drug Recommender System)
1569865791
Machine Vision Based Automatic Fruit Grading System using Fuzzy
1569893591
134
135
1569887203
Management of Security and Privacy Issues of Application Development in Mobile Cloud Environment: A
Survey
Mechanism for Identification of Duplicate Test Cases
1569905759
Medical Image Fusion using Content Based Automatic Segmentation
136
137
138
139
140
141
142
143
144
145
1569893909
Memetic Search in Artificial Bee Colony Algorithm with Fitness based Position Update
1569869149
MGI: A New Heuristic for Classifying Continuous Attributes in Decision Trees
1569909531
Minimizing Congestion and Improved QoS of AODV using Clustering in Mobile Ad Hoc Network
1569894955
Mobility Model Based Performance Analysis of DSDV Mobile Ad Hoc Routing Protocol
1569895811
Modeling Behavior of a Cloud Computing Service
1569905089
Motion Estimation for Video Compression Using Modified Hexagonal Search
1569893783
Multi-frame Super-Resolution Reconstruction and Image Quality Metrics of Different Gray Scale Images
1569895715
Multiple People Tracking By Moments Approach
1569888521
Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments
1569903913
146
147
148
149
150
151
152
1569894509
Necessary and sufficient condition for the existence of symmetrical Reversible Variable Length Codes,
based on Kraft's inequality
New Call and Handoff Call Management Scheme for Reuse Partitioning Based Cellular Systems
1569905143
Nonlinear Noise Suppression Edge Detection Scheme for Noisy Images
1569905323
Object Detection and Tracking based on Silhouette Based trained shape Model with Kalman Filter
1569832483
OCTA (STAR ) PVD A Different Approach of Image Steganography
1569895329
Offline Signature Verification based on Contourlet Transform and Textural features using HMM
1569905281
Offline Vs Live migration: A Performance Evaluation
1569892905
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
1569904611
Optimal Payment Policy for Deteriorating Item with Preservation Technology Investment under Trade
credit and Inflation
Optimal scheduling policy for jitter control in AFDX End-System
1569891891
Optimization of Drilling Process Parameters by Harmony Search Algorithm
1569905297
Optimization technique based localization in IEEE 802.11 WLAN
1569905049
PAPR Reduction of OFDM systems Using PTS with Genetic Algorithm at low computational complexity
1569893949
PBACC Method for Congestion Control in Wireless Sensor Network
1569893903
Performance Analysis in Detecting Brain Tumor Tissue Using SVM in MR Images
1569869481
Performance Analysis of Modified RC4 Encryption Algorithm
1569907097
Performance Enhancement for Audio/Video Proxy Server
1569892707
Performance evaluation of region based active contour models used in segmentation
1569910521
Personalization of Web Search using an implicitly learned Dynamic Category Interest Tree (DCIT)
1569894341
Phonetic Matching and Syntactic Tree Similarity Based QA System for SMS Queries
1569904735
Query Maintenance with Hierarchical Updates
1569886913
Real Time Condition Monitoring System for Tomato Ripening
1569893603
Reliability Improvement of Distribution System using Differential Search Algorithm
1569885383
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
1569895271
Reversible ROI-Based Multiple Layer Medical Image Watermarking Technique for Tamper Detection and
Recovery
Rigorous design of moving sequencer crash tolerant atomic broadcast with unicast broadcast
1569894019
Rule based fuzzy approach for Peripheral Motor Neuropathy (PMN) diagnosis based on NCS Data
1569894739
Rules based Automatic Linux Device Driver Verifier and Code Assistance
1569905299
Scheduling project with Random and time-dependent activity
1569874397
Secret Communication using Public key Steganography
1569918735
Secure Data Storage Operations with Verifiable Outsourced Decryption for Mobile Cloud Computing
1569894299
Self Congestion Prediction Algorithm for Efficient Routing in Mobile Ad-Hoc Network
1569900581
Self-Acclimating Hybrid Network Topology HYNET-AmI
1569905779
Self-Healing Model for Software Application
1569909167
Serious Games based approach to cyber security concept learning: Indian context
1569909521
Simulation of Multi-core Power-network for Early Software Development
1569869371
Simultaneous 12-Lead QRS Detection by K-means Clustering Algorithm
1569895167
Software Code Cloning Detection and Future Scope Development- Latest Short Review
1569869269
Stabilization of Triple link Inverted Pendulum system based on LQR control Technique
1569904809
Static Analysis Approaches to Detect SQL Injection and Cross Site Scripting Vulnerabilities in Web
Applications: A Survey
183
184
185
186
187
188
1569887565
Survey on Extractive Based Automatic Text Summarization
1569895343
Survey on Graph and Cluster Based Approaches in Multi-document Text Summarization
1569918477
technical Analysis of NIFTY-50 Using BPFFN and NARX
1569896633
The Application of Genetic Operators in the Artificial Bee Colony Algorithm
1569895021
Translating Hindi Sentence into SQL Query using Pattern Matching Technique
1569868835
189
1569894015
190
191
192
193
1569909853
Two warehouse Inventory Model with Stock-level Dependent Demand rate and time varying Holding
cost under Shortages
User and Device tracking in private networks by correlating logs: A system for responsive forensic
analysis
User Behavior Rating System
1569918839
Using Labels for Policy Based Routing in Software Defined Data Center Networks
1569902933
Vehicular Pollution monitoring using IoT
1569866901
Working Vacation Queue with K-phases Essential Service and Vacation Interruptions