S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Automated Intelligent Wireless Drip Irrigation Using Linear Programming
Manish Giri,Dnyaneshwar Natha Wavhal |
001-005 |
2 |
An effective Golden Section Search Approach based Distribution Load Flow
Naveen Jain, Jai Kumar Maherchandani |
006-010 |
3 |
Review of methods for secret sharing in cloud computing
Dnyaneshwar Supe, Amit Srivastav, Dr. Rajesh S. Prasad |
011-017 |
4 |
DIFFERENTIATION OF TERM AND PRETERM DELIVERY GROUPS BY EHG SIGNAL ANALYSIS
Dhananjay Kumar, Kumar Gaurav Shankar, Praveen Kumar |
018-020 |
5 |
Some New Steganographic Techniques using Spatial Resolution Reduction
H. Faheem Ahmed, U. Rizwan |
021-026 |
6 |
Performance Comparison of ACO Algorithms for MANETs
Jubin Sebastian E |
027-032 |
7 |
A Survey of Metastability Errors in CMOS Digital Circuits
Manisha Thakur, Puran Gaur, Braj Bihari soni |
033-036 |
8 |
Fault identification and diagnosis using greedy Back Tracking approach in large-scale network
U.Sridhar, Dr.G.Gunasekaran |
037-041 |
9 |
Optimized Surveillance Solution for Unattended Baggage Recognition
R.Karthikeyan, P.Mahalakshmi, N.GowriShankar |
042-046 |
10 |
UNMANNED MULTI-FUNCTIONAL ROBOT USING ZIGBEE ADOPTER NETWORK FOR DEFENSE APPLICATION
Premkumar .M |
047-055 |
11 |
On Fault Tolerance of Resources in Grid Environment
Minakshi Memoria, Mukesh Yadav |
056-063 |
12 |
Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R |
064-070 |
13 |
Electronic Mail Security
Dr. Ajit Singh, Meenakshi Gahlawat |
071-076 |
15 |
A REVIEW ON OPTIMIZATION OF ENERGY BY USING PWM INVERTER
Mr. Ravindra Patil,Prof. M.H. Nerkar, Mr. Prashant Chaudhari |
082-085 |
16 |
A REVIEW ON HAND GETSURE RECOGNITION SYSTEMS
Mr. Prashant Chaudhari,Prof. G. R. Phulay,Mr. Ravindra Patil |
086-090 |
17 |
DATA STORAGE SECURITY IN CLOUD BY USING JAR FILES AND HIERARCHICAL ID-BASED CRYPTOGRAPHY
Ms R.PUNITHA,Mr.D.VIJAYBABU |
091-096 |
18 |
A SURVEY ON SECURED WATERMARKING TECHNIQUES FOR JPEG IMAGES ON COMPRESSED-ENCRYPTED DOMAIN
Aparna Soni, Deepty Dubey |
097-101 |
19 |
Feature Based Image Sequence Retargeting in the Uncompressed Video Domain
Kavitha. S |
102-106 |
20 |
DDS architecture for digital frequency generation
Ms. Shruti S.Desai, Prof. A.S.Joshi |
107-111 |
21 |
A Comparative Study of Fuzzy & Genetic Power System Stabilizers and Role of Static Voltage Compensation on Power System stability
Naveen Jain, Jai Kumar Maherchandani |
112-115 |
22 |
ANALYZING AND EXTRACTING SOCIALMINING TRENDS THROUGH WEB OPINION DEVELOPMENTS VIA DENSITY BASED CLUSTERING
Jeswin Roy Dcouth, MohanRaj.T |
116-122 |
23 |
Survey on Data Integrity in Cloud Computing
Reenu Sara George, Sabitha S |
123-125 |
24 |
Integrating Heterogeneous Data Sources Using XML
Yogesh R.Rochlani , Prof. A.R. Itkikar |
126-130 |
25 |
Cryptography Using Quantum Key Distribution in Wireless Networks
Srinivasa Rao Katakam,M.S.R.Lakshmi Reddy |
131-135 |
26 |
My College Finder – An Android based application
Ankit Karandikar, Sameer Kalantre, Ajinkya Kohok, Deepak Ingale, Mrs. Rutuja Kulkarni |
136-138 |
27 |
Health-On-The-Move based on ANDROID Operating System
Rutuja Kulkarni,Ankita Deshmukh, Manjiri Shivankar,Prajakta Gore,Tanmay Patil |
139-141 |
28 |
A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING
C.M.Geetha, K.Sangeetha ,Dr S.Karthik |
142-144 |
29 |
A Survey of Performance based Secure Routing Protocols in MANET
Hariom Soni,Preeti Verma |
145-154 |
30 |
Survey on Live VM Migration Techniques
Anju Mohan, Shine S |
155-157 |
31 |
Performance Study of Different Medical Images Based on Morphology in Noisy Environment
V. Kalpana,V. Vijaya kishore |
158-168 |
32 |
Energy Ef ficient and Reliable Communication in Underwater Acoustic Sensor Networks
S.Beeno Ancy, S.Shahul Hammed |
169-173 |
33 |
An Approach for Storage Security in Cloud Computing- A Survey
W. Sharon Inbarani, G. Shenbaga Moorthy, C. Kumar Charlie Paul |
174-179 |
35 |
A Modified Linear Approximation Transform for Medical Image Compression
K.Shiby Angel, D.Sujitha Juliet, S.Saravanan |
183-187 |
36 |
STUDY OF VARIOUS ISSUES IN VOICE TRANSLATION
Aakash Nayak, Santosh Khule, Anand More, Avinash Yalgonde,Dr. Rajesh S. Prasad |
188-191 |
37 |
DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS
S.Pavaimalar, G.ShenbagaMoorthy |
192-196 |
38 |
Integration of Sound Signature and Graphical Password Authentication System
Suyog S. Nischal, Sachin Gaikwad, Kunal Singh, Prof. A. Devare |
197-199 |
39 |
Modelling and Controller Design of Inverted Pendulum
Mr.Pankaj Kumar,Mr. KunalChakraborty,Mr. RabiRanjan Mukherjee,Mr.SuvobratraMukherjee |
200-206 |
40 |
An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN
Priyanka M. Lokhande, Prof. A.P.Thakare |
207-213 |
41 |
A Modified Stochastic Location Update Scheme In Mobile Ad-hoc Networks
Rosemary. P.J., Aneesh M Haneef |
214-217 |
42 |
Data Mining in Clinical Decision Support Systems for Diagnosis, Prediction and Treatment of Heart Disease
Syed Umar Amin, Kavita Agarwal, Dr. Rizwan Beg |
218-223 |
43 |
Image Steganography
Rahul Joshi,Lokesh Gagnani, Salony Pandey |
224-227 |
44 |
Image Steganography With LSB
Rahul Joshi,Lokesh Gagnani, Salony Pandey |
228-229 |
45 |
VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
AJINKYA NIKAM, BHIM BIRADAR, SAGAR DHERE, PRAHSANT SONAWANE,Prof .Ruta Kulkarni |
230-232 |
46 |
MSNN based techniques for Face and Eye Recognition
Ramit Lala, Alok Kumar Singh |
233-237 |
47 |
Survey on Certain Algorithms Computing Best Possible Routes for Transportation Enquiry Services
Neha Choubey,Mr. Bhupesh Kr. Gupta |
238-242 |
48 |
ARM Based Fruit Grading and Management System Using Image Processing
Manoj B. Avhad, Satish M. Turkane |
243-248 |
49 |
A Comprehensive Study of Data Mining and Application
Dheeraj Agrawal |
249-252 |
50 |
Review of Real Time Two Phase Navigation System for Interactive Path Finding and Tracking Approach for Assisting Visually Impaired People
Sanjay M.Malode, Dr. S.K.Shriwastava |
253-255 |
51 |
A Latest Method for Improving Resolution in Three Dimension Imaging Light Detection and Ranging
R. Sugunadevi, K. Shanthalakshmi |
256-262 |
52 |
Frame Differencing with Simulink model for Moving Object Detection
Himanshu Goyal |
263-266 |
53 |
Design of Colour and Texture Based Relevant Image Search Engine
S.Meenachi Sundaresan , Dr. K.G.Srinivasagan |
267-272 |
54 |
Maximizing The Lifetime Of Wireless Sensor Node
SANGEETHA KAILAIMANI |
273-281 |
55 |
A Comparative based study of Different Video-Shot Boundary Detection algorithms
Mr. Ravi Mishra, Dr. S. K. Singhai, Dr. Monisha Sharma |
282-289 |
56 |
Review of Cloud Computing and Its Application
Sagar B.Jadhav, Dr. Rajesh Prasad,Shantanu S.Panhale, Chetan S. Mohture |
290-292 |
57 |
Optimization of Searches on Social Networks using Graph theory and Formal Concepts Analysis
Quist-Aphetsi Kester |
293-303 |
58 |
A Survey on Recent Trends in Cloud Computing and its Application for
Multimedia
M. Ramya Catherine, E.Bijolin Edwin |
304-309 |
59 |
Challenges in the Cloud Application Development
B.J.D Kalyani |
310-313 |
60 |
Implementation of MKD-WebServer Rating Application for Analysis of Web performance through SSL
Veereshkumar M Kolli, Vinaykumar M Kolli, Vaishakh B |
314-318 |