ISSN ONLINE(2320-9801) PRINT (2320-9798)
Research Article: IJIRCCE |
Construction and Selection of Six Sigma Quick Switching Sampling System: Sample Size Tightening |
D. Senthilkumar, B. Esha Raffie |
DOI: 10.15680/ijircce.2015.0303002 |
Research Article: IJIRCCE |
Secured Data Transmission Using Elliptic Curve Cryptography |
K.S.Abitha, Anjalipandey, K.P.Kaliyamurthie |
DOI: 10.15680/ijircce.2015.0303003 |
Research Article: IJIRCCE |
Detection of Hacking nodes using Dynamic Sensor with Ant Colony Optimization |
R.Balaji, V.Abhishek, D.Kerana Hanirex |
DOI: 10.15680/ijircce.2015.0303004 |
Research Article: IJIRCCE |
Survey of Various Opinion Mining Approaches |
Gayathri R Krishna, Jothi S, Minojini N, Sowmiyaa P |
DOI: 10.15680/ijircce.2015.0303005 |
Research Article: IJIRCCE |
Avoiding Network Performance Degradation Problem in Zigbee |
Jothi.S, Daniel.D, Jackulin Durairani.A, Rekha.A |
DOI: 10.15680/ijircce.2015.0303006 |
Research Article: IJIRCCE |
Analysis of the Effect of Harmonics Due To Switching Devices W.R.T. Experimental & Simulation Point of View |
Rajesh Maharudra Patil, M.S. Nagaraj, P.S.Venkataramu |
DOI: 10.15680/ijircce.2015.0303008 |
Research Article: IJIRCCE |
Evaluation of Keyword Search System with Ranking |
P.Saranya, S.Babu |
DOI: 10.15680/ijircce.2015.0303009 |
Research Article: IJIRCCE |
Hill Cipher Modifications: A Detailed Review |
Narendra B. Parmar, Kirit R. Bhatt |
DOI: 10.15680/ijircce.2015.0303010 |
Research Article: IJIRCCE |
Review on Anonymous Routing Protocol for High Anonymity Protection in MANETs |
Namrata R. Borkar, Avinash P. Wadhe |
DOI: 10.15680/ijircce.2015.0303011 |
Research Article: IJIRCCE |
Isolated Telugu Speech Recognition using MFCC and Gamma tone features by Radial Basis Networks in Noisy Environment |
Shaik Shafee, B.Anuradha |
DOI: 10.15680/ijircce.2015.0303012 |
Research Article: IJIRCCE |
DOGGY- a Graphical Security Technique to prevent Online Guessing Attacks |
S.Sachin Shriram, K.P.Kaliyamurthie |
DOI: 10.15680/ijircce.2015.0303013 |
Research Article: IJIRCCE |
Adaptation Backoff Exponent Mechanism in Zigbee Sensor Network for Improving Through put |
Priyanka Deshpande, Mangala S. Madankar |
DOI: 10.15680/ijircce.2015.0303014 |
Research Article: IJIRCCE |
Sybil Attack Resistant Cryptographic Traffic Information Dissemination in VuC |
Vandana C.P, Nitty Sarah Alex |
DOI: 10.15680/ijircce.2015.0303015 |
Research Article: IJIRCCE |
Facial Feature Extraction Based On FPD and GLCM Algorithms |
S. Vijayarani, S. Priyatharsini |
DOI: 10.15680/ijircce.2015.0303016 |
Research Article: IJIRCCE |
Legal Implication of Human and Physical- Activity Monitoring System Using Android Smartphone |
K.P.Kaliyamurthie, H.Ajmal Hasan, Abhishek Mishra |
DOI: 10.15680/ijircce.2015.0303017 |
Research Article: IJIRCCE |
Survey on Different Phases of Digital Forensics Investigation Models |
Priya S. Patil, A. S. Kapse |
DOI: 10.15680/ijircce.2015.0303018 |
Research Article: IJIRCCE |
Despeckling of SAR Images Using Wavelet Based Spatially Adaptive Method |
B.Leela Kapil, M.Santosh Kumar, M.Avinash, K.Suhasan, K.Prasanna Kumar |
DOI: 10.15680/ijircce.2015.0303019 |
Research Article: IJIRCCE |
Design and Development of Efficient Content Independent Genealogy |
Rahul S. Dudhabaware, Mangala S. Madankar |
DOI: 10.15680/ijircce.2015.0303020 |
Research Article: IJIRCCE |
Associate Adaptable Transactional Information Store in the Cloud Using Distributed Storage and Meta Data Manager |
K.G.S. Venkatesan, Kathir.Viswalingam, N.G. Vijitha |
DOI: 10.15680/ijircce.2015.0303021 |
Research Article: IJIRCCE |
Mining User Profile Exploitation Cluster from Computer Program Logs |
K.G.S. Venkatesan1, V. Khanna, Jay Prakash Thakur, Banbari Kumar |
DOI: 10.15680/ijircce.2015.0303022 |
Research Article: IJIRCCE |
Dynamic Pricing for Usage of Cloud Resource |
K.Sangeetha, K.Ravikumar |
DOI: 10.15680/ijircce.2015.0303023 |
Research Article: IJIRCCE |
Opinion Mining From Text Reviews Using Machine Learning Algorithm |
Poobana S, Sashi Rekha k |
DOI: 10.15680/ijircce.2015.0303024 |
Research Article: IJIRCCE |
A Comprehensive Approach on Different Biometric Modalities and Its Applications for Security |
Saranya.K.R, Vanitha.S, Selva Priya.G |
DOI: 10.15680/ijircce.2015.0303025 |
Research Article: IJIRCCE |
Detecting Cars In Traffic Using Cascade Haar With KLP |
Kiruthika R, Mythili S |
DOI: 10.15680/ijircce.2015.0303026 |
Research Article: IJIRCCE |
A Review on Software Fault Injection Methods and Tools |
K. Umadevi, S. Brintha Rajakumari |
DOI: 10.15680/ijircce.2015.0303027 |
Research Article: IJIRCCE |
Survey on Aggregate Cryptosystem for Scalable Vital Data Distribution in Cloud Storage |
B. Thejaswini, M.Sakthi Priya |
DOI: 10.15680/ijircce.2015.0303028 |
Research Article: IJIRCCE |
Survey of Integrity Verification in Cloud- Storage Using Various Techniques |
Sheela.K, Sivasri.S |
DOI: 10.15680/ijircce.2015.0303029 |
Research Article: IJIRCCE |
Study of Ridge Based and Image Based Approach for Fingerprint Gender Classification |
Alok Chauhan, Akhil Anjikar, Suchita Tarare |
DOI: 10.15680/ijircce.2015.0303030 |
Research Article: IJIRCCE |
Communication through Photon Using Quantum Cryptography: A Survey |
Leenata B. Isal, Chetan J. Shelke |
DOI: 10.15680/ijircce.2015.0303031 |
Research Article: IJIRCCE |
Fingerprint Based Gender Classification Using Block-Based DCT |
Akhil Anjikar, Suchita Tarare, M. M. Goswami |
DOI: 10.15680/ijircce.2015.0303032 |
Research Article: IJIRCCE |
Survey on Policy Based Framework for Smartphone Application?s Privacy Using Multiple Profiles |
Vinothini.S |
DOI: 10.15680/ijircce.2015.0303033 |
Research Article: IJIRCCE |
Design of 'V' Shape Microstrip Patch Antenna |
Deepak Sabale, Ranjeet Landge, Vaibhav Salke, A.A.Trikolikar |
DOI: 10.15680/ijircce.2015.0303034 |
Research Article: IJIRCCE |
Human Effects to Enhance Clustering Techniques That Assists User in Grouping the Friends |
S. Srigowthem, K.G.S Venkatesan, Sourav Kumar Nag, Suraj Raj |
DOI: 10.15680/ijircce.2015.0303035 |
Research Article: IJIRCCE |
LOBOT: Low-Cost Robotic Vehicle |
Snehal D. Patil, Archana A. Hatkar |
DOI: 10.15680/ijircce.2015.0303036 |
Research Article: IJIRCCE |
Survey on CommTrust: Multi-Dimensional Trust Using Mining E-Commerce Feedback Comments |
Vinaya R. Firake, Yogesh S. Patil |
DOI: 10.15680/ijircce.2015.0303037 |
Research Article: IJIRCCE |
An Image Removal Using Local Tetra Patterns for Content Based Image Retrieval |
Manish K. Shriwas, Vivek. R. Raut |
DOI: 10.15680/ijircce.2015.0303038 |
Research Article: IJIRCCE |
A Framework for Detection of Jammers in Wireless Sensor Network |
S.Jaipriya |
DOI: 10.15680/ijircce.2015.0303039 |
Research Article: IJIRCCE |
Performance Comparison of POLY Protocol with Existing CDS Protocols |
Shimrose S.Mulla, S.V.Sankpal |
DOI: 10.15680/ijircce.2015.0303040 |
Research Article: IJIRCCE |
Survey on Feature Subset Selection Algorithm in Brain Interaction Patterns |
K.Vidhyadevia, M.Beema Mehraj, K.P.Kaliyamurthie |
DOI: 10.15680/ijircce.2015.0303041 |
Research Article: IJIRCCE |
Unified Data Access Security on Revocable Multi Authority CP-ABE in Cloud |
Suresh Kumar.P, Tamilselvan.D, Anuradha.C |
DOI: 10.15680/ijircce.2015.0303042 |
Research Article: IJIRCCE |
Automatic Integration of Drug Indications from Multiple Health Resources |
S. Srivenkatesh, R. Karthikeyan |
DOI: 10.15680/ijircce.2015.0303043 |
Research Article: IJIRCCE |
A Review on Implementation of QAM on FPGA |
Ravindra H. Sharma, Kiritkumar R. Bhatt |
DOI: 10.15680/ijircce.2015.0303044 |
Research Article: IJIRCCE |
Accessible Display Design to Control Home Area Networks |
Rohini B. Thube, Archana A. Hatkar |
DOI: 10.15680/ijircce.2015.0303045 |
Research Article: IJIRCCE |
One Bit-Line Multi-Threshold SRAM Cell With High Read Stability |
Prangya Parimita Nanda , Kanan Bala Ray, Sushree Sangita Das |
DOI: 10.15680/ijircce.2015.0303046 |
Research Article: IJIRCCE |
Identification of Cup-Disk Ratio for Glaucoma Prone Eyes |
Niladri Halder, Dibyendu Roy, Arnab Chattaraj, Tanumoy Chowdhury |
DOI: 10.15680/ijircce.2015.0303047 |
Research Article: IJIRCCE |
An Efficient Data Aggregation Scheme and Cluster Optimization in Wireless Sensor Networks. |
R.Mehala, A.Balamurugan |
DOI: 10.15680/ijircce.2015.0303048 |
Research Article: IJIRCCE |
Survey on Controllable Secure Watermark Technique to Detect Data Leakage |
Sivasri S, Parthiban R |
DOI: 10.15680/ijircce.2015.0303049 |
Research Article: IJIRCCE |
Review of Automatic Attendance Using Facial Recognization |
Rahul S. Rode , Nikhil A. Dahelkar, Nikhil R. Nagdive, Anagha S. Gajbhiye, Manish K. Shriwas |
DOI: 10.15680/ijircce.2015.0303050 |
Research Article: IJIRCCE |
Security and Privacy Issues in Private Cloud Storage |
Girija Rajendra |
DOI: 10.15680/ijircce.2015.0303051 |
Research Article: IJIRCCE |
Literature Survey on Data Mining and Statistical Report for Drugs Reviews |
V.Ranjani Gandhi, N.Priya |
DOI: 10.15680/ijircce.2015.0303052 |
Research Article: IJIRCCE |
D-Matrix: Fault Diagnosis Framework |
Tinal R. Thombare, Lalit Dole |
DOI: 10.15680/ijircce.2015.0303053 |
Research Article: IJIRCCE |
Review on Intelligent Traffic Management System Based on VANET |
Nikhil Suresh Kshirsagar, U. S. Sutar |
DOI: 10.15680/ijircce.2015.0303059 |
Research Article: IJIRCCE |
A Novel Cell Phone Designed For Blind Along With Voice Based Guidance and Location Indication |
Reddy Roja, Shilpa.S, Swathi.J, Natya.S |
DOI: 10.15680/ijircce.2015.0303060 |
Research Article: IJIRCCE |
A Review of Bike Security System Using Fingerprint GSM&GPS |
K.Dineshkumar, G. Nirmal, S.Prakash, S.Raguvaran |
DOI: 10.15680/ijircce.2015.0303061 |
Research Article: IJIRCCE |
Elimination of Baseline Fluctuation in EMG Signal Using Digital Filter |
Jeet Singh, Jitendar yadav |
DOI: 10.15680/ijircce.2015.0303062 |
Research Article: IJIRCCE |
Performance Evaluation of Advanced OLSR against Black Hole Attack and Wormhole Attack in MANET |
K.Sivagurunathan, K.Manojkumar, D.Sounder, Midhun Sebastian |
DOI: 10.15680/ijircce.2015.0303063 |
Research Article: IJIRCCE |
Current Distribution of Dipole Antenna for Different Lengths Using Different Types of Basis Functions Applying To Method of Moment |
Tamajit Nag, Amlan Datta |
DOI: 10.15680/ijircce.2015.0303064 |
Research Article: IJIRCCE |
Interactive Voice Response System by Using Asterisk |
Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel |
DOI: 10.15680/ijircce.2015.0303065 |
Research Article: IJIRCCE |
Prepaid Energy Meter with GSM Technology |
JaychandUpadhyay, Namita Devadiga, Alrina D’mello, Glenie Fernandes |
DOI: 10.15680/ijircce.2015.0303066 |
Research Article: IJIRCCE |
MOSES: Supporting and Enforcing Security Profiles on Smart Phones |
E.Ramya, A.Nirosha |
DOI: 10.15680/ijircce.2015.0303068 |
Research Article: IJIRCCE |
Design of Space-Time Coded Single-Carrier and Multi-Carrier MIMO-CDMA systems |
P. Sreesudha, B.L. Malleswari |
DOI: 10.15680/ijircce.2015.0303069 |
Research Article: IJIRCCE |
Personalized Search of User Search Behaviour with Ontology |
N.Hemamalini, M.Gomati, V.Indumathi, S.Jegadeesan |
DOI: 10.15680/ijircce.2015.0303070 |
Research Article: IJIRCCE |
Detection of Implanted Devices In Underground By Using UWB Penetrating Radar with Support of PN Code |
P.Navaganesh, P.Ananda Ramunaidu, K.Sudha Rani, N.Raja, Shaik.Azeez |
DOI: 10.15680/ijircce.2015.0303071 |
Research Article: IJIRCCE |
Contribution of Feed Waveguide on the Admittance Characteristics Of Coplanar Slot Coupled E-H Tee Junction |
M.Murali, G.S.N Raju |
DOI: 10.15680/ijircce.2015.0303072 |
Research Article: IJIRCCE |
Survey on Text Classification Based on Similarity |
Kavitha Sri.M, Hemalatha.P |
DOI: 10.15680/ijircce.2015.0303073 |
Research Article: IJIRCCE |
A Survey on the Privacy Settings of User Data and Images on Content Sharing Sites |
Sangeetha J |
DOI: 10.15680/ijircce.2015.0303074 |
Research Article: IJIRCCE |
Automatic Generate CNC Code for Symmetrical Object |
V.Naga Arjun, D.Nagarathinam |
DOI: 10.15680/ijircce.2015.0303075 |
Research Article: IJIRCCE |
Optimized Energy Conserving Using Selective Forwarding Algorithm (SFA) for Wireless Sensor Network (WSN) |
K.Esthar, N.Aravindhan, S.Srinath, S.Sudharshan, D.Sriganesh |
DOI: 10.15680/ijircce.2015.0303076 |
Research Article: IJIRCCE |
U-Slot Microstrip Patch Antenna for Wireless Application |
J.Venkatachalapathi, M.Kaanchana, T.Adhilakshmi, B.Vaishnavi, D.Sriganesh |
DOI: 10.15680/ijircce.2015.0303077 |
Research Article: IJIRCCE |
Accent Recognition using MFCC and LPC with Acoustic Features |
Reena H. Chaudhari, Kavita Waghmare, Bharti W. Gawali |
DOI: 10.15680/ijircce.2015.0303078 |
Research Article: IJIRCCE |
Smart Antennas for Communications in Line of Sight |
Surayamubeen, A.M.Prasad, A.Jhansi Rani |
DOI: 10.15680/ijircce.2015.0303079 |
Research Article: IJIRCCE |
Public Auditing of Dynamic Big Data Storage with Efficient High Memory Utilization and ECC Algorithm |
G.Janani, C.Kavitha |
DOI: 10.15680/ijircce.2015.0303081 |
Research Article: IJIRCCE |
Efficient Deduplication with Security Using Jenkins and Recovery Techniques |
S.Hemalatha, U.Muthaiah |
DOI: 10.15680/ijircce.2015.0303082 |
Research Article: IJIRCCE |
A Review onDesign of a high gain Microstrip Antenna using Parasitic Patch for GPS Application |
RupeshBudharam Raut, V. D. Nagrale |
DOI: 10.15680/ijircce.2015.0303083 |
Research Article: IJIRCCE |
Providing Consistency in Cloud Using Read after Write Technique to Endusers |
R.Jeena, S.Saravanakumar, B.Poornima Bharathi, R.P.Priyancaa |
DOI: 10.15680/ijircce.2015.0303084 |
Research Article: IJIRCCE |
Secure Internet-Banking with Visual Authentication Protocols |
S.Saravana Kumar, R.Senthil Kumar, P.Venkatraman, M.Thamodharan, S.Vishnu Prashod |
DOI: 10.15680/ijircce.2015.0303085 |
Research Article: IJIRCCE |
Robust Video-based Face Recognition. |
Subashini.T, S.T.Munusamy, Srinivasan. R |
DOI: 10.15680/ijircce.2015.0303086 |
Research Article: IJIRCCE |
Robust Technique for Detection and Classification of Glands from Human Tissue Samples |
Prachi Kawalkar, Girish Talmale |
DOI: 10.15680/ijircce.2015.0303087 |
Research Article: IJIRCCE |
Study of Algorithms for Separation of Singing Voice from Music |
Madhuri A. Patil, Harshada P. Burute, Kirtimalini B. Chaudhari, Pradeep B. Mane |
DOI: 10.15680/ijircce.2015.0303088 |
Research Article: IJIRCCE |
Defense against DDoS Attacks Using IP Address Spoofing |
Archana .S. Pimpalkar, A. R. Bhagat Patil |
DOI: 10.15680/ijircce.2015.0303110 |
Research Article: IJIRCCE |
Energy Efficient Mobile Sink Path Selection Using a Cluster Based Approach in WSNs |
L.Brindha, U.Muthaiah |
DOI: 10.15680/ijircce.2015.0303111 |
Research Article: IJIRCCE |
Trust Management Model Observation towards Security Enhancements and QoS in MANET�s |
A.Jayakumari, M.Sakthivel |
DOI: 10.15680/ijircce.2015.0303112 |
Research Article: IJIRCCE |
A Comparative Study about Region Based and Model Based Using Segmentation Techniques |
A. Manikannan, J.SenthilMurugan |
DOI: 10.15680/ijircce.2015.0303113 |
Research Article: IJIRCCE |
Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks |
M H Pradeep Kumar |
DOI: 10.15680/ijircce.2015.0303114 |
Research Article: IJIRCCE |
Design of A DIP System for Circumstantial Examination and Determination for Visually Disabled Persons |
M H Pradeep Kumar |
DOI: 10.15680/ijircce.2015.0303115 |
Research Article: IJIRCCE |
Comparing the Performance of Frequent Itemsets Mining Algorithms |
Kalash Dave, Mayur Rathod, Parth Sheth, Avani Sakhapara |
DOI: 10.15680/ijircce.2015.0303116 |
Research Article: IJIRCCE |
Behavioural Model of Adult Obesity by Childhood Predictors using Crowd Sourcing |
Mohd Zareef Affani, Uma N. Dulhare |
DOI: 10.15680/ijircce.2015.0303117 |
Research Article: IJIRCCE |
Survey of DOS Defense Mechanisms |
Anup Ranekar, A. R. Bhagat Patil |
DOI: 10.15680/ijircce.2015.0303118 |
Research Article: IJIRCCE |
Preserving Privacy using Secret Sharing in Distributed Environment on Perturbed Data |
Sagar S. Phake, Vikrant S. Moon, Avinash A. Waghmare, Gaurav B. Ijare |
DOI: 10.15680/ijircce.2015.0303119 |
Research Article: IJIRCCE |
Survey on Interactive Visualization and Navigation of Web Search Results |
S.Sandhiya, P.Hemalatha |
DOI: 10.15680/ijircce.2015.0303120 |
Research Article: IJIRCCE |
Data Access Service through Web Service by Auto-Updation Mechanism |
Sneha Kalbande, N.M.Tarbani |
DOI: 10.15680/ijircce.2015.0303121 |
Research Article: IJIRCCE |
Handling Load Balancing using Genetic Algorithm in Cloud Based Multimedia System |
E.Naveen Karki, S.Venkateswaran, AR.Arunachalam |
DOI: 10.15680/ijircce.2015.0303122 |
Research Article: IJIRCCE |
An Empirical Performance Analysis of Relative Keyword Search Techniques |
Avinandan Kumar, Dipankar Nag, G.Michael |
DOI: 10.15680/ijircce.2015.0303123 |
Research Article: IJIRCCE |
Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation |
Arivukkarasu S, Malar R |
DOI: 10.15680/ijircce.2015.0303124 |
Research Article: IJIRCCE |
Design of Microstrip Patch Antenna for GPS Applications using EBG Structures |
Naveen JVSS, Varun Kumar.K, Ramesh.B, Vinay. K.P |
DOI: 10.15680/ijircce.2015.0303125 |
Research Article: IJIRCCE |
The Software Approach to Measure the Quality of Vein Images for Fake Detection in Online Attendance System |
B.Ayisha, S.Rajeswari |
DOI: 10.15680/ijircce.2015.0303126 |
Research Article: IJIRCCE |
Broadband Double Psi (�¨) Shaped Patch Antennas for Wireless Communications |
Kavita Gundappa Talandage, U. S. Sutar |
DOI: 10.15680/ijircce.2015.0303127 |
Research Article: IJIRCCE |
Efficient Cloud Computing Load Balancing Using Cloud Partitioning and Game Theory in Public Cloud |
P.Rahul, A.Senthil Kumar, Boney Cherian |
DOI: 10.15680/ijircce.2015.0303128 |
Research Article: IJIRCCE |
Prevention of SQL Injection Attack on Web Applications |
Shakti Kumar, Subhendu Dey, R.Karthikeyan, K.G.S. Venkatesan |
DOI: 10.15680/ijircce.2015.0303129 |
Research Article: IJIRCCE |
Multi-hop overlay Transport for High Throughput transfers in the Internet |
DOI: 10.15680/ijircce.2015.0303130 |
Research Article: IJIRCCE |
Advanced Adaptive Routing Algorithm for Highway and City Scenarios in VANET |
Shubhrant Jibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar |
DOI: 10.15680/ijircce.2015.0303131 |
Research Article: IJIRCCE |
Cryptographic Technique through Hexagonal Path Using Genetic Algorithm |
Somalina Chowdhury |
DOI: 10.15680/ijircce.2015.0303132 |
Research Article: IJIRCCE |
Image Encryption Using Chaotic Map and Prime modulo Multiplicative Linear Congruential Generator |
Sukhjeevan Kaur, Shaveta Angurala |
DOI: 10.15680/ijircce.2015.0303133 |
Research Article: IJIRCCE |
Top K Result Retrieval in Searching the File over the Encrypted Data in Cloud |
C.Saranya, G.Radha, R.Subash |
DOI: 10.15680/ijircce.2015.0303134 |
Research Article: IJIRCCE |
A Review On the Development of GEDIT 3 Plug-In: Go-To Definition for C Using Exuberant-Ctags |
P.S. Bangare, Pramod Sonar, Pallab Pain and Sadhna Advani |
DOI: 10.15680/ijircce.2015.0303135 |
Research Article: IJIRCCE |
Vedic Multiplier in VLSI for High Speed Applications |
G.Ramachandran, T.Muthumanickam, P.M.Murali, Sajith.S.Nair, L.Vasnath |
DOI: 10.15680/ijircce.2015.0303136 |
Research Article: IJIRCCE |
Intersection RSU in VANET |
Rohini Avinash Nere, Uma Nagaraj |
DOI: 10.15680/ijircce.2015.0303137 |
Research Article: IJIRCCE |
Search Me If You Can Privacy-Preserving Location Query Service |
Akash Mishra, Shefali Kadam, Avinash Kumar, Sharvari Shinde |
DOI: 10.15680/ijircce.2015.0303138 |
Research Article: IJIRCCE |
Detection of Intrusions in KDDCup Dataset using GA by Enumeration Technique |
Vishal R. Chaudhary, R. S. Bichkar |
DOI: 10.15680/ijircce.2015.0303139 |
Research Article: IJIRCCE |
Multi Threshold Low Power SRAM Using Floating Gates |
Sushree Sangita Das, Kanan Bala Ray, Prangya Parimita Nanda |
DOI: 10.15680/ijircce.2015.0303140 |
Research Article: IJIRCCE |
Review of Botnet Attacks and its Detection Mechanism |
D.Kavitha, Rani S.K |
DOI: 10.15680/ijircce.2015.0303141 |
Research Article: IJIRCCE |
A Review: Eulerian Video Motion Magnification |
Kranti Kamble, Nitin Jagtap, R.A Patil, Ankit Bhurane |
DOI: 10.15680/ijircce.2015.0303142 |
Research Article: IJIRCCE |
Litrature Survey on Collaborative Cloud Computing For Sharing Resource in Trustworthy Manner |
Bhaskar, Pothumani, Aravind Gosh |
DOI: 10.15680/ijircce.2015.0303143 |
Research Article: IJIRCCE |
Multilevel Anti-Discrimination Privacy Preserved Data Transmission |
Naveena M.S, Merlin Shoerio |
DOI: 10.15680/ijircce.2015.0303144 |
Research Article: IJIRCCE |
Vehicle Locking Using Radio Frequency Identification with Theft Intimation and Smart Tracking System |
Manu Poduval, Nitish Pokharkar, Anirudha Punekar, S. D. Borde |
DOI: 10.15680/ijircce.2015.0303145 |
Research Article: IJIRCCE |
Design of 1X2 Triangular Shaped Microstrip Patch Antenna Array for WLAN Applications with DGS Structures |
K.Shrikar, L. Sai vinodh, B.Ramesh, K.P.Vinay |
DOI: 10.15680/ijircce.2015.0303146 |
Research Article: IJIRCCE |
Efficient Cloud Storage Management Using DHT Mechanism |
D.K.Karthika, G.Sudhakar, D.Sugumar |
DOI: 10.15680/ijircce.2015.0303147 |
Research Article: IJIRCCE |
Review on Various Face Recognition Techniques |
Ashlesha D. Kolap,S.V. Shrikhande, Nitin K. Jagtap |
DOI: 10.15680/ijircce.2015.0303148 |
Research Article: IJIRCCE |
Computer Intraction Based on Hand Gestures |
Suresh.D, Subash.P, F.Noorullah Khan |
DOI: 10.15680/ijircce.2015.0303149 |
Research Article: IJIRCCE |
Uncertain Bandwidth Calculation in Networks with Non-Linear Services |
T.Keerthikala, L.Hemalatha, B.Sundarraj |
DOI: 10.15680/ijircce.2015.0303150 |
Research Article: IJIRCCE |
Dynamic Annotation by Web Database Search Results |
Bincy S Kalloor, Sheeja Agustin |
DOI: 10.15680/ijircce.2015.0303151 |
Research Article: IJIRCCE |
Secured Authentication for De-Duplication by Using Hybrid Cloud Approach |
Anucia Devi D.S, Anuradha C, K.G.S. Venkatesan |
DOI: 10.15680/ijircce.2015.0303153 |
Research Article: IJIRCCE |
Performance Analysis of Time Moments, Markov's Parameters and Eigen Spectrum Using Matching Moments |
Dharmendra Singh, Om Prakash Gujela |
DOI: 10.15680/ijircce.2015.0303154 |
Research Article: IJIRCCE |
Light Weight Intrusion Detection System with Wrapper Approach and Optimized Feature Selection |
Amol A.Dhiwar, G.K.Patnaik |
DOI: 10.15680/ijircce.2015.0303155 |
Research Article: IJIRCCE |
Automated Drinking Water Supply System and Theft Identification Using Embedded Technology |
Sagar Khole, Tushar Kolape, A.P.More |
DOI: 10.15680/ijircce.2015.0303156 |
Research Article: IJIRCCE |
Association Rules Mining in Vertically Distributed Databases |
P.Kalaivani, D.Kerana Hanirex, K.P.Kaliyamurthie |
DOI: 10.15680/ijircce.2015.0303157 |
Research Article: IJIRCCE |
Maintaining Reliability and Time in the Message Transfer within Wireless Sensor Network |
Prajakta D.Patil, A. A. Tayade |
DOI: 10.15680/ijircce.2015.0303158 |
Research Article: IJIRCCE |
Secure Top-K Query to Variably Encrypted Signature in Tiered Sensor Networks |
P.Ramya, C. Nalini |
DOI: 10.15680/ijircce.2015.0303159 |
Research Article: IJIRCCE |
Pixel Steganalysis - A Novel Approach in Image Steganography Using F5 Algorithm |
Prabhu Kumar, Nikhil Tirpathi, G.Michael |
DOI: 10.15680/ijircce.2015.0303160 |
Research Article: IJIRCCE |
SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments |
K.Adithya Narayanan, Monish Joel Singh, D.Kerana Hanirex, K.G.S. Venkatesan |
DOI: 10.15680/ijircce.2015.0303161 |
Research Article: IJIRCCE |
QOS - Guaranteed Neighbour Selection & Distributed Packet Scheduling Algorithm by Using MANET Wireless Networks |
Abhinav Kumar, Abhijeet Kumar, Dr. C. Nalini, K.G.S. Venkatesan |
DOI: 10.15680/ijircce.2015.0303162 |
Research Article: IJIRCCE |
Traffic Identification Method Engine: An Open Platform for Traffic Classification |
A.R. Arunachalam, K.G.S. Venkatesan, Abdul Basith.K.V, M. Sriram |
DOI: 10.15680/ijircce.2015.0303163 |
Research Article: IJIRCCE |
Recommendation System Based On Clustering and Collaborative Filtering |
K. Dhanalakshmi, A.Anitha, G. Michael, K.G.S. Venkatesan |
DOI: 10.15680/ijircce.2015.0303164 |
Research Article: IJIRCCE |
Retinal Disparity Estimation and 2D Fusion in Stereo-Pairs |
Priyanka.V.K, Vijayakumar.K, Sudheesh Madhavan |
DOI: 10.15680/ijircce.2015.0303165 |
Research Article: IJIRCCE |
CBPPP: Cloud Based Patient Centric Privacy Preserving System |
Nishant Kumar, Nitish Kumar, C.Anuradha |
DOI: 10.15680/ijircce.2015.0303166 |
Research Article: IJIRCCE |
Geographic Random Forwarding for Ad-Hoc and Sensor Networks Multihop Performance |
B.Sundar Raj, S.Naveenraj, A.Gopinath |
DOI: 10.15680/ijircce.2015.0303167 |
Research Article: IJIRCCE |
Fast Data Collection Using Two-Layer Multicast Communication Protocol in Wireless Sensor Networks |
K.Priyadharshini, S.Bhuvenswari, R.Arun, K.Cholaraja |
DOI: 10.15680/ijircce.2015.0303168 |
Research Article: IJIRCCE |
FPGA Based Intelligent Potholes Detection System |
Sumit Pawade, B.P. Fuladi, L.A. Hundikar |
DOI: 10.15680/ijircce.2015.0303169 |
Research Article: IJIRCCE |
Session Based Access Control Mechanism Using ECC in WMN- A Review |
Rahul V.Bambodkar, Avinash P. Wadhe |
DOI: 10.15680/ijircce.2015.0303170 |
Research Article: IJIRCCE |
Design of Review Based Product Aspect Ranking With Transaction Id Verification |
Rupesh, K.sivaraman |
DOI: 10.15680/ijircce.2015.0303171 |
Research Article: IJIRCCE |
Mat Lab Based Synthesis of Speech & Speaker Reorganization Using Data Driven Approach |
Leela Kumari, Aakash Dadhich, Rahul Guha |
DOI: 10.15680/ijircce.2015.0303172 |
Research Article: IJIRCCE |
Neighborhood based Framework Active Learning |
K.P.Kaliyamurthie, K.G.S. Venkatesan, S. Sriram, N.Vijay , Richard Solomon |
DOI: 10.15680/ijircce.2015.0303173 |
Research Article: IJIRCCE |
Intelligent Surveillance and Security System |
Monali Chaudhari, Gauresh Vanjare, Dhairya Thakkar, Malay Shah, Amit Kadam |
DOI: 10.15680/ijircce.2015.0303174 |
Research Article: IJIRCCE |
Parallel Clustering of Gene Expression Dataset in Multicore Environment |
Pranoti Kamble, Rakhi Wajgi |
DOI: 10.15680/ijircce.2015.0303175 |
Research Article: IJIRCCE |
Managing XML Retrieval through Personalization Using Search Engine |
B. Kurinchi Meenakshi, C.Nalini |
DOI: 10.15680/ijircce.2015.03030176 |
Research Article: IJIRCCE |
A Survey on Economic Denial of Sustainability Attack Mitigation Techniques |
Rohit Thaper, Amandeep Verma |
DOI: 10.15680/ijircce.2015.03030177 |
Research Article: IJIRCCE |
A Novel Approach for Energy Efficient Reliable Routing Using TABU in Wireless Ad Hoc Networks |
M.Ranjitha, K.Gowsic |
DOI: 10.15680/ijircce.2015.03030178 |
Research Article: IJIRCCE |
Modification of Linux Kernel with Jumping Virtual Clock Round Robin Scheduling |
Laxmi M. Gurnani, Anurag Sinha, Gurmeet Singh Gujral, Abhijeet Patil, Ashish T. Bhole |
DOI: 10.15680/ijircce.2015.03030179 |
Research Article: IJIRCCE |
Comparative Study of Load Testing Tools |
Sandeep Bhatti, Raj Kumari |
DOI: 10.15680/ijircce.2015.0303181 |
Research Article: IJIRCCE |
High Utility Itemset Mining with Selective Item Replication |
V.Narendranath, P.S.Rajan, R.Karthikeyan |
DOI: 10.15680/ijircce.2015.0303182 |
Research Article: IJIRCCE |
Vehicular Ad hoc Network (VANETs): A Review |
Divya Chadha, Reena |
DOI: 10.15680/ijircce.2015.0303183 |
Research Article: IJIRCCE |
IVUS detection using Image Processing: A Review |
Rahul Lanjewar, Kiran Barapatre, Mayur Petkar, Prasad Pande |
DOI: 10.15680/ijircce.2015.0303184 |
Research Article: IJIRCCE |
Implementation of a New Electro Magnetic Interference Filters Design to Diminish CM Noise |
G.Vengatesan, B.Karthik, T.V.U. Kiran Kumar |
DOI: 10.15680/ijircce.2015.0303185 |
Research Article: IJIRCCE |
A Study on Content Based Image Retrieval Systems |
L. Haldurai, V. Vinodhini |
DOI: 10.15680/ijircce.2015.0303186 |
Research Article: IJIRCCE |
A Stochastic Model to Investigate Data Center Performance and QoS in Iaas Cloud Computing Systems |
B. Sundarraj, K.G.S. Venkatesan, Vimal Chand |
DOI: 10.15680/ijircce.2015.0303187 |
Research Article: IJIRCCE |
Reduced Path, Sink Failures in Autonomous Network Reconfiguration System (ANRS) Techniques |
K.G.S. Venkatesan, V. Khanaa, A. Chandrasekar |
DOI: 10.15680/ijircce.2015.0303188 |
Research Article: IJIRCCE |
Accident Detection System by Using Navigation Devices |
Priyanka Dodmise, Priya Mahadik, Nihalahmad Shikalgar |
DOI: 10.15680/ijircce.2015.0303189 |
Research Article: IJIRCCE |
Design and Implementation of 2by3 Prescaler using Different Logic in CMOS 45nm Technology |
Siddharth A. Koshiyar, Narendra J. Patadiya, Bharat H. Nagpara |
DOI: 10.15680/ijircce.2015.0303190 |
Research Article: IJIRCCE |
Thermodynamic Modeling and Optimization of a Dual Pressure Reheat Combined Power Cycle |
Seema S. Billur, Vaijanath V. Yerigeri, Ravi V. Yerigeri |
DOI: 10.15680/ijircce.2015.0303191 |
Research Article: IJIRCCE |
An Iaas Cloud System with Federation Threshold |
B. Sundarraj, K.G.S. Venkatesan, M. Sriram, Vimal Chand |
DOI: 10.15680/ijircce.2015.0303192 |
Research Article: IJIRCCE |
Literature Survey on Hybrid Approach for Cloud Bandwidth and Cost Reduction System Using Predictive Acknowledgements |
Syed Sajid Hussain, A R Arunachalam |
DOI: 10.15680/ijircce.2015.0303007 |
Research Article: IJIRCCE |
Improved Crypto Analysis for Scrambling Digital Video Using Secret Key |
S.Hemalatha, V.Hemamalini, S.Manimozhi, B. Revathi, S. Sridevi |
DOI: 10.15680/ijircce.2015.0303054 |
Research Article: IJIRCCE |
Design of SCS Protocol and Analysis of Quality of Service Parameters for Wireless Sensor Networks |
G Ramprabu, S Ananthi, R Chitra, J Saranya, G Saratha Preethi |
DOI: 10.15680/ijircce.2015.0303055 |
Research Article: IJIRCCE |
Secure Crypto and ECG Steganography Based Data Communication for Wireless Body Sensor Network |
G Sheeba, M I Anju, K Hari Priya, V Monisha, M M Sabbana Banu |
DOI: 10.15680/ijircce.2015.0303056 |
Research Article: IJIRCCE |
Fiber Fault Localization in FTTH Using Online Monitoring |
S Sivakami, G Ramprabu, V Hemamalini, K Veronica, C Thirupoorani |
DOI: 10.15680/ijircce.2015.0303057 |
Research Article: IJIRCCE |
Organ Abnormality Prediction Using Finger Vein Reader |
S Tamilelakkiya, S Hemalatha, S Manimala, B Santhamala, P Sri Indhuganga |
DOI: 10.15680/ijircce.2015.0303058 |
Research Article: IJIRCCE |
Video Streaming Over WIMAX with Ant Colony Optimization for Health Applications |
S.Suganya, R.Ponnulakshmi |
DOI: 10.15680/ijircce.2015.0303067 |
Research Article: IJIRCCE |
Design and Performance Evaluation of DWDM based Metropolitan Ring Networks |
Jaspreet Minhas, Rajesh Kochher |
DOI: 10.15680/ijircce.2015.0303080 |
Research Article: IJIRCCE |
Big Data Processing of Data Services in Geo Distributed Data Centers Using Cost Minimization Implementation |
A. Dhineshkumar, M.Sakthivel |
DOI: 10.15680/ijircce.2015.0303152 |
Research Article: IJIRCCE |
Efficient Privacy Preserving Secure ODARM Algorithm in Horizontally Distributed Database |
Priyanka.G, Premkumar.M |
DOI: 10.15680/ijircce.2015.0303180 |
Research Article: IJIRCCE |
Design of Double Tail Comparator Using Dual Mode Logic in PTL Design |
Elackiya.N, Swethaabraham |
DOI: 10.15680/ijircce.2015.0305015 |
Research Article: IJIRCCE |
OSDM Based Underwater Acoustic Communication |
D.Arunkumar, M.Margarat |
DOI: 10.15680/ijircce.2015.0303193 |
Research Article: IJIRCCE |
Healthcare Data Security in Cloud Computing |
G. Rathi, Abinaya. M, Deepika. M¸ Kavyasri. T |
DOI: 10.15680/ijircce.2015.0303089 |
Research Article: IJIRCCE |
Moral Hacking: A Way to Boost Data Security by Using Vulnerability Scanning Tools |
Anish Kumar Anbukarsan, Ilampirai Nagarajan, K.G.S Venkatesan |
DOI: 10.15680/ijircce.2015.0303194 |
Research Article: IJIRCCE |
Preserving Privacy by Enhancing Security in Cloud |
N.Vaitheeka, V.Rajeswari, D.Mahendran |
DOI: 10.15680/ijircce.2015.0303195 |
Research Article: IJIRCCE |
Virtual Makeover and Virtual Trial Dressing |
Jaychand Upadhyay, Divya Shukla, Nidhi Patel, Sheetal Nangare |
DOI: 10.15680/ijircce.2015.0303090 |
Research Article: IJIRCCE |
Authenticated Deniable Internet Key Exchange |
R.Pitchandi, S.Saranya |
DOI: 10.15680/ijircce.2015.0303196 |
Research Article: IJIRCCE |
A Novel Security Issues Analysis and Evaluation of Security Method in WSNs |
A.Senthilkumar, R.B.Sarooraj |
DOI: 10.15680/ijircce.2015.0303197 |
Research Article: IJIRCCE |
Enhancement of Underwater Images Using Wavelength Compensation Method |
R.Sathya, M.Bharathi |
DOI: 10.15680/ijircce.2015.0303091 |
Research Article: IJIRCCE |
An Efficient Attack Detection Method in Proactive Source Routing Protocol for Mobile Adhoc Networks |
S.Kanagalakshmi, N.Pappu Sivanantham |
DOI: 10.15680/ijircce.2015.0303092 |
Research Article: IJIRCCE |
Digital Watermarking of Audio in Time Domain Multiple Bit Plane based on Chaotic Scrambling. |
Jeebananda Panda, Indu Kumari, Nitish Goe |
DOI: 10.15680/ijircce.2015.0303093 |
Research Article: IJIRCCE |
Cloud Service Based Measuring Consumer's Preferences |
T. Leema Rose, AR.Arunachalam |
DOI: 10.15680/ijircce.2015.0303198 |
Research Article: IJIRCCE |
Design of Smart Home Energy Management System. |
Vaibhavi Sunil Yardi |
DOI: 10.15680/ijircce.2015.0303094 |
Research Article: IJIRCCE |
Designing of MCAM Using 22nm Technology |
Komal J. Anasane, Ujwala A.Kshirsagar |
DOI: 10.15680/ijircce.2015.0303199 |
Research Article: IJIRCCE |
Survey on Intelligent Semantic Web Search Engines as Generic Search Engine |
Deepika Dasari Soorasamharan, Pranamita Nanda |
DOI: 10.15680/ijircce.2015.0303200 |
Research Article: IJIRCCE |
Detecting and Preventing DDoS Attacks in Cloud. |
S.SaravanaKumar, R.SenthilKumar, R.Arun prasad, S.Thiraviam, J.Vignesh |
DOI: 10.15680/ijircce.2015.0303095 |
Research Article: IJIRCCE |
VHDL Simulation of Image Compression Using LBG |
Rahul R. Ade, Ashish B. Kharate |
DOI: 10.15680/ijircce.2015.0303201 |
Research Article: IJIRCCE |
Scalable Learning for Collective Behaviour Using Sparse Social Dimensions |
V.Priyadharshini, K.Thamaria Selvi, P.Sowmiyaa |
DOI: 10.15680/ijircce.2015.0303096 |
Research Article: IJIRCCE |
An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks |
K.G.S. Venkatesan, Dr. V. Khanaa, M.Sriram, Lekha Sri |
DOI: 10.15680/ijircce.2015.0303202 |
Research Article: IJIRCCE |
Survey on Web-Scale Image Search and Re-Ranking With Semantic Signatures. |
Darshana C. Chaudhari, Priti Subramanium. |
DOI: 10.15680/ijircce.2015.0303097 |
Research Article: IJIRCCE |
Energy Efficient Design for Full Adder Logic Implementation |
Rakhi Saha, Sambita Dalal, Satyasis Mishra |
DOI: 10.15680/ijircce.2015.0303098 |
Research Article: IJIRCCE |
Document Image Binarization Using Threshold Segmentation. |
Rekha Chaudhari, Dinesh Patil |
DOI: 10.15680/ijircce.2015.0303099 |
Research Article: IJIRCCE |
Simulation of Algal Bloom Detection System Using Modified ABR Algorithm |
S.Nithya Kamatchi, S.Suresh Kumar. |
DOI: 10.15680/ijircce.2015.0303100 |
Research Article: IJIRCCE |
Real Time GPRS- Fuel Tracking and Monitoring Entity Using Telematics |
Dhivyasri G, Rajeshwari Mariappan |
DOI: 10.15680/ijircce.2015.0303101 |
Research Article: IJIRCCE |
Analysis and Design of Efficient generalized Forensic framework for Detecting Twitter Spammers |
Ankita M. Ghate, L. G. Malik |
DOI: 10.15680/ijircce.2015.0303102 |
Research Article: IJIRCCE |
A Combined Approach Using IoT and Cloud for the Efficient Data Retrieval in Medical Technology |
Shaik Hussain S I |
DOI: 10.15680/ijircce.2015.0303103 |
Research Article: IJIRCCE |
Comprehensive Study and Review Various Routing Protocols in MANET |
Manish Sharma, Jaspreet Kaur |
DOI: 10.15680/ijircce.2015.0303104 |
Research Article: IJIRCCE |
Biometric Secured Voting Machine to Avoid Bogus Voting Based on AADHAR CARD |
Umang Shah, Trupt Shah, Marteen Kansagara, Saagar Daxini |
DOI: 10.15680/ijircce.2015.0303105 |
Research Article: IJIRCCE |
Detection of Parkinson's Disease by Speech Analysis |
Ch.Rajanikanth, A.Amardeep, B.Kishore, Shaik Azeez |
DOI: 10.15680/ijircce.2015.0303106 |
Research Article: IJIRCCE |
Performance Analysis of PAPR Reduction Using DFT-Spreading OFDMA Technique |
Alcardo Alex Barakabitze, Tan Xiaoheng |
DOI: 10.15680/ijircce.2015.0303001 |
Research Article: IJIRCCE |
Online Voting System Using Three Factor Authentication |
Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde |
DOI: 10.15680/ijircce.2015.0303107 |
Research Article: IJIRCCE |
Hybrid Based Energy Efficient Wireless Sensor Network Routing Algorithm for Farmland |
Pramod T. Shitole, UmeshL. Kulkarni |
DOI: 10.15680/ijircce.2015.0303108 |
Research Article: IJIRCCE |
A Context-Aware Relation Extraction Method for Relation Completion |
B.Sivaranjani, Meena Selvaraj |
DOI: 10.15680/ijircce.2015.0303109 |