Volume-8 Issue-9S4, July 2019
- Version
- Download 74
- File Size 4.00 KB
- Create Date July 20, 2019
- .
Volume-8 Issue-9S4, July 2019, ISSN: 2278-3075 (Online) Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)
PLHIM: Proposing an Inheritance based Object-Oriented Metric Latika Kharb1, Deepak Chahal2An Accuracy Examination of OCR Tools Jayesh Majumdar1, Richa Gupta2
Recent Advancements in Various Machine Learning Techniques Jaspreet Kaur1, Dilbag Singh2, Manjit Kaur3
Allocation of Cloudlets using Solution of Job Assignment Problem Sonam Pathak1, Manish Pandey2, Kanu Geete3
Efficient Docker Container Scheduling Using ABC Optimization Technique Ram Krishna Verma1, Ruchika Gupta2
Biometric Authentication and Identification using Behavioral Biometrics Technique of Signature Verification Shalini Dhiman1, Munish Sabharwal2
Sentiment Analysis for Social Media using SVM Classifier of Machine Learning Dipti Sharma1, Munish Sabharwal2
Performance Examination and Feature Selection on Sybil User Data using Recursive Feature Elimination Dheeraj Sonkhla1, Manu Sood2
Heart Disease Prediction Method using Hybrid Classifier Saloni Kapoor1, Ashwinder Tanwar2
Multi Group Based Daily Living Activity Recognition (DLAR) using Advanced Machine Learning Algorithm Doreswamy1, Yogesh K M2
Maximizing Quality Data-collection in Mobile-sink Based Energy-harvesting Sensor Networks Naween Kumar1, Dinesh Dash2
A Novel Quasi Z-Source based DC-DC Converter with High Voltage Gain in Photo Voltaic applications Manish Sharma1, Prakash Bahrani2
Improved Segmentation algorithm using PSO and K-means for Basal Cell Carcinoma Classification from Skin Lesions Komal Sharma1, Sanjay Madaan2
Genetic Load Balancing Algorithms in Cloud Environment Neha Sharma1, Jaspreet Singh2, Rohit Bajaj3
Secure Trust Aware Hybrid Key Management Routing Protocol for WSNs for the Application of IoT Sharmila1, Kumkum Som2, Umang Kant3, Pramod Kumar4
Speech Recognition Implementation Kanika Bansalwal1, Kamaldeep Sharma2, Anuj Jain3
Experiences of Teaching Computer Network Course through Lesson Outcomes Abhishek Vichare1, Prathamesh P. Churi2
Calculation of Energy Flow and Carbon Credit Earned in Roof Integrated Photovoltaic Thermal System Amit Kumar Dash1, Sanjay Agrawal2, Shweta Shukla3, Sanjay Gairola4
A Flood Model for the Chalakudy River Area Georg Gutjahr1, Sachin Das2
A Method Towards Allocation of VM using a Cuckoo Search Algorithm Roma Singh1, Rohit Bajaj2, Jaspreet Singh3
Identification and Prioritization of Flood Conditioning Factors using ISM and MICMAC Technique Swati Sharma1, Vineet Sharma2
Multi-Criteria Decision Making and its Applications Shweta Panjwani1, S Naresh Kumar2, Laxmi Ahuja3
Transform Domain Block Based Watermarking using Spatial Frequency and SVD Sachin Gaur1, Vinay Kumar Srivastava2
Personal Iris Recognition from an Image at Long Distance using Back Propagation Neural Network Swati D. Shirke1, C. Rajabhushanam2
Multiple Lanes Identification using Novel Region-Based Iterative Seed Method Suvarna Shirke1, R. Udayakumar2
Towards Protecting Privacy in Retrieval of Image Devi. T1, N. Suhbakaran2
Projection of Constraint Based on Clustering Jai Sharma. K1, Chandra Mouliswara Reddy. P2
Performance of Machine Learning for Lane Detection K. Malathi1, R. Kavitha2, N. Rahul Varma3
Ambulance Calling System using Heart Rate Sensor in Smart Band V. Sai Harsha1, U. Kumaran2
Digital Risk Management for Data Attacks against State Evaluation M. Nalini1, Anvesh Chakram2
Abnormal User Detection of Malicious Accounts in Online Social Networks using Cookie Based Cross Verification Nirmala B1, SP. Chokkalingam2, G. Sai Neelima3
Air Quality Prediction based on Supervised Machine Learning Methods K. Mahesh Babu1, J. Rene Beulah2
A Safe Image Steganography for Verbal Communication through Information Activity in Digital Pictures Rinesh. S1, Nithyapoojeswari. D2
Determining Trust Based Examination on Social Networks for Hotel Recommendation Shri Vindhya1, V.Dharnesh2
Fault Tolerance & Load Balanced Ad-hoc Networks using LRDV Routing Protocol Sybi Cynthia J1, R Rathna2
Detecting Cache-Based Side Channel Attacks in IaaS using Enhanced Algorithm R. Vanathi1, SP. Chokkalingam2
CDMA based Data Transmission Methods between Vehicles SP. Chokkalingam1, S. Jabeer Basha2, Indla Venkatesh3, Yadla Srinivas4
Attribute Based Encryption in Cloud Computing Devi. T1, N. Deepa2, Kodikalla Preetham Krishna3, P.Mohit Sai4
Blurring an Image using Python Rahul Sai Ganesh1, Jagadesh Babu2, N. Bhanu Prasad3, M. Jagadeeshwar Reddy4, Devi. T5, A. Sumanth6
Predict the Shipment Forecast using Time-Series Data in Machine Learning N. Deepa1, M. Bhuvanachandra2, B. Reddyprasad3, M.Nagendra4
Early Diagnosis of Coronary Artery Disease using UCI Data set SP. Chokkalingam1, N. Deepa2
Towards Securing Cloud Network using Tree-Rule Firewal T. Sai Sravan1, S. Usha2, N. Sushma3, N. Lavanya4, T. Devi5, Murugeswari. M6
Mitigating Ransomware Attacks K. Jaisharma1, Suvvala Manoj2, K. Manideep3, Manoj Kumar Reddy4
A Novel Protocol to Provide Authentication and Privacy in WSN Devi. T1, N. Deepa2, K. Lakshmi Swathi3, Harthik4, Manideep5
Wheel Obstraction Detection with Machine Learning Shanmukhsrivamsinimmagadla1, P.Shanmuga Prabha2
