S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node
Shikha Nema,Neeraj Shukla |
001-008 |
2 |
A Literature Survey: Stemming Algorithm for Odia Language
Dhabal Prasad Sethi, Sanjit Kumar Barik |
009-011 |
3 |
Leakage Power Reduction Using Power Gating And Multi-Vt Technique
AruljothiK ,PrajithaP B, RajaprabhaR |
012-019 |
4 |
Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations
Kanpariya Nilam, Rahul Joshi |
020-024 |
5 |
Image Mining Using Image Feature
Varsha Kundlikar, Meghana Nagori |
025-030 |
6 |
PageRank and Link Analysis using Web Mining
Sanjay Kumar Singh, Rohit Raja |
031-034 |
7 |
Study of cloud provisioning and it’s Research challenges
Mitesh Barad, Prashant Jani, Richa Sinha |
035-039 |
8 |
Fuel Gauge Sensing Technologies for Automotive Applications
Vinay Divakar |
040-042 |
9 |
ENHANCING TRAVELING SALESMAN PROBLEM THROUGH BIO INSPIRED ALGORITHMS (ABC)
SARANYA. S, PRIYA VAIJAYANTHI. R |
043-046 |
10 |
Noise Removal from Electrocardiogram (ECG) a Comparison Approaches
Rajesh D. Wagh, Kiran R. Khandarkar, Dipanjali D. Shipne, Shaila P. Kharde |
047-051 |
12 |
ANALYSIS ON THE WEATHER FORECASTING AND TECHNIQUE
Janani.B,PriyankaSebastian |
059-061 |
13 |
DESIGN AND` DEVELOPMENT OF RFID BASED INTELLIGENT SECURITY SYSTEM
Sukhraj Singh, Neeraj Kumar, Navjot Kaur |
062-065 |
14 |
AN IMAGE RANKING USING GOOGLE IMAGE SEARCH
Shilpa A. Shingare, Manoj D. Patil |
066-070 |
15 |
A novel approach to Edge Detection in Coloured Images by Genetic Algorithms & Neural Networks
Er. Navneet Kaur ,Er. Rishma,Er. Naveen Dhillon |
071-076 |
16 |
MapReduce Programming Paradigm Solving Big-Data Problems by Using Data-Clustering Algorithm
Yadav Krishna R,Ms. Purnima Singh |
077-080 |
17 |
SURVEY ON SLEEP SCHEDULING METHODS IN WIRELESS SENSOR NETWORKS
S. Kousalya Devi,Mrs.C.Kavitha |
081-085 |
18 |
ENHANCEMENT AND ISOLATION PROCESS APPLIED ON MRI IMAGES FOR CLASSIFICATION OF BRAIN TUMOUR
NEERAJ SINGLA, SUGANDHA SHARMA |
086-091 |
19 |
ADVANCED SURVEY ON FACE RECOGNITION TECHNIQUES IN IMAGE PROCESSING
NEERAJ SINGLA,SUGANDHA SHARMA |
092-098 |
20 |
Performance Enhancement of Radio Over Fiber Communication Systems With Wavelength Division Multiplexing and Modulation Techniques
Hamdy A. Sharshar |
099-107 |
21 |
Review of Web Pre-Fetching and Caching Algorithms
Arun Pasrija,Shikha Sharma |
108-112 |
22 |
E-Learning in India
Sunil Kumar Sharma, Javed Wasim, Dr. Jamshed Siddiqui |
113-117 |
23 |
Accessibility Testing of Website through Statistical Technique
Monika Purohit, RemyaM.A |
118-123 |
24 |
A Survey on Image Classification Methods and Techniques for Improving Accuracy
R.R Darlin Nisha, V.Gowri |
124-126 |
25 |
Enhancing Digital Forensic Analysis through Document Clustering
Vidhya B, Priya Vaijayanthi R |
127-130 |
26 |
Survey on Stock Market Prediction and Performance Analysis
Mrityunjay Sharma |
131-135 |
27 |
My Help
Santhosh Reddy M, Monisha LakshmiPathi, Monica Kathi Reddy |
136-138 |
28 |
Novel Approach to Discover High Utility Itemsets from Transactional Database
Supriya P. Bhosale |
139-142 |
29 |
A Review on Changing Image from Grayscale to Color
Miss. Apurva B. Parandekar, Prof. S.S.Dhande, Prof. H.R.Vhyawhare |
143-146 |
30 |
TRANSIENT AUTHENTICATION SERVICE
Sapana V Shinde, Daniyal M Solkar, Paul Antony, Swapnil Chatte , Lakshmi Madhuri |
147-152 |
31 |
Feature Extraction of Leaf Diseases
Mr. Hrishikesh P. Kanjalkar, Prof. S.S.Lokhande |
153-155 |
32 |
Priority based Packet Classification
Vijayalalitha A, Dharmaraj R |
156-158 |
33 |
A Review On RGB Color Preserving Cryptography For Secure Data Transmission
Anchal A. Solio, Dr. S. A. Ladhake |
159-162 |
34 |
Enhancing Data Privacy and Efficiency for Secure Cloud Storage Model
S.Simla Mercy, D.S.Delphin Hepsiba, G.Umarani Srikanth |
163-166 |
35 |
A Review on Self Adaptive Technique For Image Registration Working On Variable Image Parameter
Prof. Ankita V. Pande, Prof. A. B. Deshmukh |
167-171 |
36 |
Packet Classification Based On Standard Access Control List
S.Mythrei, R.Dharmaraj |
172-175 |
37 |
A Novel Approach to Content Based Image Retrieval Technique Using Local Tetra Patterns
Vinayak G Ukinkar , Prof. Praveen Bhanodiya , Prof. Mrudula Mukadam |
176-181 |
38 |
WEB PAGE INFORMATION HIDING USING PAGE CONTENTS
Dhammjyoti V. Dhawase , Prof. Sachin Chavan |
182-186 |
39 |
Literature Review on a secure hashing scheme for Image Authentication
Samruddhi S.kuralkar, Dr. P. R. Deshmukh |
187-190 |
40 |
Survey on Routing Mechanisms and Schemes in MANETs
Ramya.R, Karunakaran.P |
191-196 |
41 |
AN EFFICIENT XML DATA STREAMING METHOD IN MOBILE WIRELESS NETWORK
U. Ravindran, J. Sribhavani |
197-205 |
42 |
IMPROVING SERVICE CREDIBILITY IN PASSWORD AUTHENTICATED PEER SERVICES
U. Ravindran, D.Gayathri |
206-209 |
43 |
Steady State Behavior Of a Network Queue Model Comprised of Two Bi-serial Channels Linked with a Common Server
Deepak Gupta,Navjeet Kaur,Raminder Kaur Cheema |
210-222 |
44 |
An Analysis of Web Mining and its types besides Comparison of Link Mining Algorithms in addition to its specifications
B. Rajdeepa, Dr. P. Sumathi |
223-227 |
45 |
Ensemble System for Optic Disc and Macula Detection
Tamilarasi, Duraiswamy |
228-232 |
46 |
A Novel Approach In Fractal Antenna Design Using Sierpinski Arrowhead Geometry
Ankan Bhattacharya |
233-237 |
47 |
Implementation and Analysis of cloud based Secure Trust based Middleware for Smartphones for accessing Enterprise Applications
Harsukhpal Singh,Nitin Gohal,Sachin Majithia,Mandeep Singh |
238-245 |