Volume-8 Issue-9S4, July 2019

  • Version
  • Download 74
  • File Size 4.00 KB
  • Create Date July 20, 2019
  • .

Volume-8 Issue-9S4, July 2019, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)

PLHIM: Proposing an Inheritance based Object-Oriented Metric
Latika Kharb1, Deepak Chahal2


An Accuracy Examination of OCR Tools
Jayesh Majumdar1, Richa Gupta2


Recent Advancements in Various Machine Learning Techniques
Jaspreet Kaur1, Dilbag Singh2, Manjit Kaur3


Allocation of Cloudlets using Solution of Job Assignment Problem
Sonam Pathak1, Manish Pandey2, Kanu Geete3


Efficient Docker Container Scheduling Using ABC Optimization Technique
Ram Krishna Verma1, Ruchika Gupta2


Biometric Authentication and Identification using Behavioral Biometrics Technique of Signature Verification
Shalini Dhiman1, Munish Sabharwal2


Sentiment Analysis for Social Media using SVM Classifier of Machine Learning
Dipti Sharma1, Munish Sabharwal2


Performance Examination and Feature Selection on Sybil User Data using Recursive Feature Elimination
Dheeraj Sonkhla1, Manu Sood2


Heart Disease Prediction Method using Hybrid Classifier
Saloni Kapoor1, Ashwinder Tanwar2


Multi Group Based Daily Living Activity Recognition (DLAR) using Advanced Machine Learning Algorithm
Doreswamy1, Yogesh K M2


Maximizing Quality Data-collection in Mobile-sink Based Energy-harvesting Sensor Networks
Naween Kumar1, Dinesh Dash2


A Novel Quasi Z-Source based DC-DC Converter with High Voltage Gain in Photo Voltaic applications
Manish Sharma1, Prakash Bahrani2


Improved Segmentation algorithm using PSO and K-means for Basal Cell Carcinoma Classification from Skin Lesions
Komal Sharma1, Sanjay Madaan2


Genetic Load Balancing Algorithms in Cloud Environment
Neha Sharma1, Jaspreet Singh2, Rohit Bajaj3


Secure Trust Aware Hybrid Key Management Routing Protocol for WSNs for the Application of IoT
Sharmila1, Kumkum Som2, Umang Kant3, Pramod Kumar4


Speech Recognition Implementation
Kanika Bansalwal1, Kamaldeep Sharma2, Anuj Jain3


Experiences of Teaching Computer Network Course through Lesson Outcomes
Abhishek Vichare1, Prathamesh P. Churi2


Calculation of Energy Flow and Carbon Credit Earned in Roof Integrated Photovoltaic Thermal System
Amit Kumar Dash1, Sanjay Agrawal2, Shweta Shukla3, Sanjay Gairola4


A Flood Model for the Chalakudy River Area
Georg Gutjahr1, Sachin Das2


A Method Towards Allocation of VM using a Cuckoo Search Algorithm
Roma Singh1, Rohit Bajaj2, Jaspreet Singh3


Identification and Prioritization of Flood Conditioning Factors using ISM and MICMAC Technique
Swati Sharma1, Vineet Sharma2


Multi-Criteria Decision Making and its Applications
Shweta Panjwani1, S Naresh Kumar2, Laxmi Ahuja3


Transform Domain Block Based Watermarking using Spatial Frequency and SVD
Sachin Gaur1, Vinay Kumar Srivastava2


Personal Iris Recognition from an Image at Long Distance using Back Propagation Neural Network
Swati D. Shirke1, C. Rajabhushanam2


Multiple Lanes Identification using Novel Region-Based Iterative Seed Method
Suvarna Shirke1, R. Udayakumar2


Towards Protecting Privacy in Retrieval of Image
Devi. T1, N. Suhbakaran2


Projection of Constraint Based on Clustering
Jai Sharma. K1, Chandra Mouliswara Reddy. P2


Performance of Machine Learning for Lane Detection
K. Malathi1, R. Kavitha2, N. Rahul Varma3


Ambulance Calling System using Heart Rate Sensor in Smart Band
V. Sai Harsha1, U. Kumaran2


Digital Risk Management for Data Attacks against State Evaluation
M. Nalini1, Anvesh Chakram2


Abnormal User Detection of Malicious Accounts in Online Social Networks using Cookie Based Cross Verification
Nirmala B1, SP. Chokkalingam2, G. Sai Neelima3


Air Quality Prediction based on Supervised Machine Learning Methods
K. Mahesh Babu1, J. Rene Beulah2


A Safe Image Steganography for Verbal Communication through Information Activity in Digital Pictures
Rinesh. S1, Nithyapoojeswari. D2


Determining Trust Based Examination on Social Networks for Hotel Recommendation
Shri Vindhya1, V.Dharnesh2


Fault Tolerance & Load Balanced Ad-hoc Networks using LRDV Routing Protocol
Sybi Cynthia J1, R Rathna2


Detecting Cache-Based Side Channel Attacks in IaaS using Enhanced Algorithm
R. Vanathi1, SP. Chokkalingam2


CDMA based Data Transmission Methods between Vehicles
SP. Chokkalingam1, S. Jabeer Basha2, Indla Venkatesh3, Yadla Srinivas4


Attribute Based Encryption in Cloud Computing
Devi. T1, N. Deepa2, Kodikalla Preetham Krishna3, P.Mohit Sai4


Blurring an Image using Python
Rahul Sai Ganesh1, Jagadesh Babu2, N. Bhanu Prasad3, M. Jagadeeshwar Reddy4, Devi. T5, A. Sumanth6


Predict the Shipment Forecast using Time-Series Data in Machine Learning
N. Deepa1, M. Bhuvanachandra2, B. Reddyprasad3, M.Nagendra4


Early Diagnosis of Coronary Artery Disease using UCI Data set
SP. Chokkalingam1, N. Deepa2


Towards Securing Cloud Network using Tree-Rule Firewal
T. Sai Sravan1, S. Usha2, N. Sushma3, N. Lavanya4, T. Devi5, Murugeswari. M6


Mitigating Ransomware Attacks
K. Jaisharma1, Suvvala Manoj2, K. Manideep3, Manoj Kumar Reddy4


A Novel Protocol to Provide Authentication and Privacy in WSN
Devi. T1, N. Deepa2, K. Lakshmi Swathi3, Harthik4, Manideep5


Wheel Obstraction Detection with Machine Learning
Shanmukhsrivamsinimmagadla1, P.Shanmuga Prabha2