National Conference on Current Research Advances in Computer Science
Contents: 1. Detection and Classification of Exudates from RGB Fundus Images using K-Mean Clustering Technique. 2. Design Principles for Efficient Hybrid Cloud Architecture. 3. Abnormality Detection in Brain Images using Morphological Watershed Segmentation Method. 4. An Approach for Finding Colocation Patterns – Map Reduce Framework. 5. Battlefield Decision Support System. 6. Incipient Trends and Technologies in Unstructured Databases. 7. Efficient Mining of Negative Association Rules using Improved Frequent Pattern Tree. 8. Mining Borrowing Patterns from Library Transactional Database using Incremental Mining Algorithm. 9. A Secured Architecture of Mobile Payment Entrusted by Public Key Cryptography. 10. Re-Filterization of Negative Association Rules Based on Rule of Importance. 11. A Study on Security Issues in Platform-as-a-Service Model. 12. De-duplication of Data in Cloud. 13. Dermoscopy Image Classification Using Color Constancy. 14. Exchange of Distributed Knowledge in Peer-to-Peer Systems. 15. Survey on Cloud Security Issues and Attacks. 16. Packet Filtering for IP Forging using Term Frequency Technique. 17. Energy Efficiency Aspects in Cloud Computing. 18. Balancing Performance Accuracy and Precision for Secure Cloud Transactions. 19. Load Balancing Improvement in Task Scheduling. 20. Applying Privacy Policy by Design in Software Engineering. 21. Importance of SOA in Cloud Computing. 22. Most Competent Algorithm for Mining Frequent Items in Data Streams. 23. Typicality Based Collaborative Filtering Recommendation. 24. Natural Language Processing Technologies for Multi-Level Intelligent Spam EMail-Filter. 25. Multi tenancy and load distribution in IAAS cloud. 26. Li-Fi (Light Fidelity): Advancement in wireless communication technology .27. Authentication in Cloud Computing with Password and Fingerprint. 28. Big Data Analysis in Healthcare System. 29. Survey on Classification of Components from Software Reuse Repository. 30. Performance Analysis of Hadoop Distributed File System Vs Local File System With Respect To Read and Write Operations. 31. Artificial Neural Network Model for Software Development Efforts Prediction: Review. 32. Enhancing the User Search Goals Using Feedback Sessions and Evaluation Method. 33. To Filter Unwanted Message from OSN by Using System 34. Improve K-means Clustering with Extended Viewpoint using Classification. 35. A Five-Regime Model for a Balanced Strategy to Letting the Server to Operate in an Optimal Longest Period of Reasonable Time. 36. An Innovative Centralized Method for Cluster Developing in Wireless based Sensor Networks. 37. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. 38. Semantic Web Mining Using Ontology. 39. The Effective and in-centric approaches of Web Personalization. 40. Li-Fi-T based Collaborated Learning and Peer to Peer Learning Approaches for Future Engineering and Medical Education. 41. Big Data: Analysis, Opportunities and Challenges. 42. A Multi-Data Sharing in Cloud Storage Using Key Aggregate Searchable Encryption. 43. An Improved Stemmer using K-Mean Clustering for Telugu Language. 44. Big Data Opportunities and Challenges for Cyber Security. 45. Huge information security issues in view of quantum cryptography and protection with Confirmation. 46. Survey Paper on Challenges for MapReduce in Big Data Analysis. 47. A Novel Mechanism for Fine-grained Multi-keyword Search over Encrypted Cloud Data. 48. Analysis of Context Based Diversification for Keyword Search Queries over XML Data. 49. Multi-Authority Identity-Based Encryption in Cloud Computing. 50. Power Conscious Routing Etiquettes Outline Design Aspects in Wireless Sensor Networks. 51. Data Partition in Wireless sensor network using Cluster Analysis: A Survey. 52. Digital India –VLC Technology based Invention for Open High Speed Internet Service in Public and Private Places. 53. Identity Based Remote Data Integrity Checking with Data Dynamics and Public Auditing in Cloud. 54. A Study of Mobile Communication: Challenges and Attacks. 55. Developing SMS Secure Codes for Mobile Nets. 56. Critical Analysis of key safety, privacy and security issuesin overcoming barriers through Unmanned Aerial Vehicles (UAVs). 57. Application of various Soft Computing Techniques for Prediction of Diseases. 58. Modified Hierarchical Pixel Clustering for Image Segmentation. 59. Optimal and fair buffer allocation in Wireless Mesh Networks. 60. Security of E-Transactions – A Survey. 61. Diagnosis of Diabetes by Applying Clustering Algorithms. 62. Study of AODV Protocol in the Presence of Worm Hole Attack. 63. Clustering Data Streams Based on Shared Density between Micro-Clusters. 64. Role of Cloud Computing Paradigm in Education. 65. Classification Algorithms to Identify the Preferred Videos to Maximise Advertising Using Hadoop. 66. Data Encryption for Consumer's Data for Mobile Clients. 67. Curriculum Development Proposal for Technology-Based Software Engineering. 68. Sink Based Wireless Sensor Network. 69. Environmet of Open Source Platforms and Frameworks for Big Data. 70. Detecting Dynamic obstacles for mobile robots in path planning. 71. A Literature Survey on Mobile Computing Characteristics and Issues. 72. Mobile Cloud Computing: Future Trends and security issues. 73. Evaluating Soil Productivity using Fuzzy Logic Controller. 74. Information Security Problems and Proposed Algorithms for Cloud Computing. 75. Understanding Feature Selection in Text Categorization. 76. Secured Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. 77. Web Evaluation and Usability Engineering Design Approach. 78. Network Coding Gain Optimization in wireless Ad-hoc Networks. 79. An Overview of Internet of Things: Its Recent Trends. 80. Survey of Digital Image Water Marking Techniques Using Neural Networks. 81. A Retractable scheme in Cloud using Identity Based Encryption. 82. Digital Image Watermarking: State-of-the-Art. 83. Semantic Sketch Based Image Retrieval using BoVW. 84. A Systematic Review on Measuring Testability for Object Oriented Design. 85. A Novel Approach to Code Refactoration based on Design Variations.