Volume-8 Issue-9S4, July 2019
- Version
- Download 74
- File Size 4.00 KB
- Create Date July 20, 2019
- .
Volume-8 Issue-9S4, July 2019, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)
PLHIM: Proposing an Inheritance based Object-Oriented Metric
Latika Kharb1, Deepak Chahal2
An Accuracy Examination of OCR Tools
Jayesh Majumdar1, Richa Gupta2
Recent Advancements in Various Machine Learning Techniques
Jaspreet Kaur1, Dilbag Singh2, Manjit Kaur3
Allocation of Cloudlets using Solution of Job Assignment Problem
Sonam Pathak1, Manish Pandey2, Kanu Geete3
Efficient Docker Container Scheduling Using ABC Optimization Technique
Ram Krishna Verma1, Ruchika Gupta2
Biometric Authentication and Identification using Behavioral Biometrics Technique of Signature Verification
Shalini Dhiman1, Munish Sabharwal2
Sentiment Analysis for Social Media using SVM Classifier of Machine Learning
Dipti Sharma1, Munish Sabharwal2
Performance Examination and Feature Selection on Sybil User Data using Recursive Feature Elimination
Dheeraj Sonkhla1, Manu Sood2
Heart Disease Prediction Method using Hybrid Classifier
Saloni Kapoor1, Ashwinder Tanwar2
Multi Group Based Daily Living Activity Recognition (DLAR) using Advanced Machine Learning Algorithm
Doreswamy1, Yogesh K M2
Maximizing Quality Data-collection in Mobile-sink Based Energy-harvesting Sensor Networks
Naween Kumar1, Dinesh Dash2
A Novel Quasi Z-Source based DC-DC Converter with High Voltage Gain in Photo Voltaic applications
Manish Sharma1, Prakash Bahrani2
Improved Segmentation algorithm using PSO and K-means for Basal Cell Carcinoma Classification from Skin Lesions
Komal Sharma1, Sanjay Madaan2
Genetic Load Balancing Algorithms in Cloud Environment
Neha Sharma1, Jaspreet Singh2, Rohit Bajaj3
Secure Trust Aware Hybrid Key Management Routing Protocol for WSNs for the Application of IoT
Sharmila1, Kumkum Som2, Umang Kant3, Pramod Kumar4
Speech Recognition Implementation
Kanika Bansalwal1, Kamaldeep Sharma2, Anuj Jain3
Experiences of Teaching Computer Network Course through Lesson Outcomes
Abhishek Vichare1, Prathamesh P. Churi2
Calculation of Energy Flow and Carbon Credit Earned in Roof Integrated Photovoltaic Thermal System
Amit Kumar Dash1, Sanjay Agrawal2, Shweta Shukla3, Sanjay Gairola4
A Flood Model for the Chalakudy River Area
Georg Gutjahr1, Sachin Das2
A Method Towards Allocation of VM using a Cuckoo Search Algorithm
Roma Singh1, Rohit Bajaj2, Jaspreet Singh3
Identification and Prioritization of Flood Conditioning Factors using ISM and MICMAC Technique
Swati Sharma1, Vineet Sharma2
Multi-Criteria Decision Making and its Applications
Shweta Panjwani1, S Naresh Kumar2, Laxmi Ahuja3
Transform Domain Block Based Watermarking using Spatial Frequency and SVD
Sachin Gaur1, Vinay Kumar Srivastava2
Personal Iris Recognition from an Image at Long Distance using Back Propagation Neural Network
Swati D. Shirke1, C. Rajabhushanam2
Multiple Lanes Identification using Novel Region-Based Iterative Seed Method
Suvarna Shirke1, R. Udayakumar2
Towards Protecting Privacy in Retrieval of Image
Devi. T1, N. Suhbakaran2
Projection of Constraint Based on Clustering
Jai Sharma. K1, Chandra Mouliswara Reddy. P2
Performance of Machine Learning for Lane Detection
K. Malathi1, R. Kavitha2, N. Rahul Varma3
Ambulance Calling System using Heart Rate Sensor in Smart Band
V. Sai Harsha1, U. Kumaran2
Digital Risk Management for Data Attacks against State Evaluation
M. Nalini1, Anvesh Chakram2
Abnormal User Detection of Malicious Accounts in Online Social Networks using Cookie Based Cross Verification
Nirmala B1, SP. Chokkalingam2, G. Sai Neelima3
Air Quality Prediction based on Supervised Machine Learning Methods
K. Mahesh Babu1, J. Rene Beulah2
A Safe Image Steganography for Verbal Communication through Information Activity in Digital Pictures
Rinesh. S1, Nithyapoojeswari. D2
Determining Trust Based Examination on Social Networks for Hotel Recommendation
Shri Vindhya1, V.Dharnesh2
Fault Tolerance & Load Balanced Ad-hoc Networks using LRDV Routing Protocol
Sybi Cynthia J1, R Rathna2
Detecting Cache-Based Side Channel Attacks in IaaS using Enhanced Algorithm
R. Vanathi1, SP. Chokkalingam2
CDMA based Data Transmission Methods between Vehicles
SP. Chokkalingam1, S. Jabeer Basha2, Indla Venkatesh3, Yadla Srinivas4
Attribute Based Encryption in Cloud Computing
Devi. T1, N. Deepa2, Kodikalla Preetham Krishna3, P.Mohit Sai4
Blurring an Image using Python
Rahul Sai Ganesh1, Jagadesh Babu2, N. Bhanu Prasad3, M. Jagadeeshwar Reddy4, Devi. T5, A. Sumanth6
Predict the Shipment Forecast using Time-Series Data in Machine Learning
N. Deepa1, M. Bhuvanachandra2, B. Reddyprasad3, M.Nagendra4
Early Diagnosis of Coronary Artery Disease using UCI Data set
SP. Chokkalingam1, N. Deepa2
Towards Securing Cloud Network using Tree-Rule Firewal
T. Sai Sravan1, S. Usha2, N. Sushma3, N. Lavanya4, T. Devi5, Murugeswari. M6
Mitigating Ransomware Attacks
K. Jaisharma1, Suvvala Manoj2, K. Manideep3, Manoj Kumar Reddy4
A Novel Protocol to Provide Authentication and Privacy in WSN
Devi. T1, N. Deepa2, K. Lakshmi Swathi3, Harthik4, Manideep5
Wheel Obstraction Detection with Machine Learning
Shanmukhsrivamsinimmagadla1, P.Shanmuga Prabha2