S.No. |
Title and Authors of Paper |
Page.No. |
1 |
USING SENTAURUS MOnte CArlo(MOCA) SIMULATION ESTIMATION OF SCATTERING EFFECTS IN NANOWIRE TRANSISTORS
Mr.S.Esakki Rajavel, A.GunaDhivya Vinisha, J.Jochebed,P.Angelene Sanjana, D.Gnancy |
598-603 |
2 |
AN EFFICIENT HEMORRHAGE DETECTION USING SVM CLASSIFIER
Jishma Elizabeth Joy, R Jemila Rose |
604-610 |
3 |
Analytical Study of Common Web Application Attacks
Junaid Latief Shah |
611-617 |
4 |
Segmentation of Natural Color Images in HSI Color Space Based on FCM Clustering
Ganesan P, Priya Chakravarty, Shweta Verma |
618-622 |
5 |
A Survey on Odia Computational Morphology
Dhabal Prasad Sethi |
623-625 |
6 |
EFFECTIVE ALGORITHM FOR MINING ADVERSE DRUG REACTIONS
H.SANKARA VADIVU, E.MANOHAR, R.RAVI |
626-630 |
7 |
Image Decomposition and Restoration for Blurred Images Using Filtering Techniques
A.Deepika, K.Raja Sundari, R.Ravi |
631-635 |
8 |
Ecological Planning for Sustainable Development with a Green Technology: GIS
Anuj Tiwari, Merugu Suresh, Arun Kumar Rai |
636-641 |
10 |
Dramatic Atmospheric Turbulence Effects on Submarine Laser Communication Systems (SLCS) and Free Space Optics (FSO)
Ahmed Nabih Zaki Rashed, Mohamed S. F. Tabbour |
655-666 |
11 |
Evaluating F-Measure Metric Using ManTra Machine Translation Engine in Tourism domain for English to Hindi Language
Dr. Neeraj Tomer |
667-671 |
12 |
FREQUENT PATTERNS FOR MINING ASSOCIATION RULE IN IMPROVED APRIORI ALGORITHM
Ms. Jyoti B. Deone, Asst. Prof. Vimla Jethani |
672-678 |
13 |
An Efficient Method for Detection of Brain Tumor in MRI Images
Vishal B. Padole |
679-682 |
14 |
Estimating the Exposure of Network Mechanisms to High-Tech DDoS Attacks
S.Vasanthi, R.Ravi, Dr. Beulah Shekhar |
683-686 |
15 |
Securing Online Reputation System Through Trust Evaluation And User Correlation
D.Gnana Binu, R.Ravi, Dr. Beulah Shekhar |
687-690 |
16 |
Morse Passwords Based Authentication System
Jyotsana Raut,Nikita Agashe,Suchita Somkuwar,Trupti Sapate,Pranali Doifode,Ms.Minal Domke |
691-694 |
17 |
SECURE AND IMPLEMENTATION OF INTRUSION DETECTION IN VIRTUAL MACHINE SYSTEMS
U.Murugan, Guru Rama Senthilvel |
695-700 |
18 |
An Alternative Approach for Time Synchronization in WSN
Rajni Kaushal |
701-705 |
19 |
Web interface for configuration of Linux server
Ashish Anand, Kumar Kundan, Parag Dhawan, Rahul Kumar Pal, Sumit Kumar |
706-709 |
21 |
A SURVEY ON VARIOUS TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING
Gaurang Patel, Asst.Prof. Rutvik Mehta |
715-717 |
22 |
LAN Monitoring and Controlling using Android
Dhanke D.T., Bodkhe S.S., Hambarde S.M., Vaidya R.P. |
718-722 |
23 |
Review Article on Quantum Cryptography
Anuradha Singhal, Tarun Chander |
723-728 |
24 |
Automation of Ant Build
Anuradha Singhal, Tarun Chander |
729-730 |
25 |
LARGE SCALE SATELLITE IMAGE PROCESSING USING HADOOP DISTRIBUTED SYSTEM
Sarade Shrikant D., Ghule Nilkanth B., Disale Swapnil P., Sasane Sandip R. |
731-735 |
26 |
Secure Data Storage of Mobile Phones on Cloud
Nilesh Khonde , Swapnil Bawankar, Lokesh Ashtankar, Anand Dharamthok , Khaire P. A. |
736-739 |
27 |
Efficient Mining of web log for improving the website using Density Based Spatial Clustering Application with Noise (DBSCAN)
Akiladevi R, Mathew Kurian |
740-743 |
28 |
Delegating Log Management to the Cloud by Secure Logging as a Service
Priyadharshini.T.R,Senbagavalli.M,Saravana kumar.R |
744-748 |
29 |
A Novel Approach Based Anomaly Detection for Secure Data Aggregation Using HEED Algorithm
S.Kannadhasan, J.Sangeetha, K.Niranjana |
749-751 |
30 |
MIMO with Constant Envelope Modulation (CEM) – For Better Circuit Design
Brahmadesam T Madav |
752-755 |
31 |
IDENTIFYING GUILTY AGENT USING MP3-STEGO-FILE
Ashwini Palimkar,Dr. S.H.Patil |
756-762 |
32 |
Office Security Monitoring System
Achennaki Shylla, Hashmita Raut, Heena Nehare, Pooja Anne, Prarthana Deshkar |
763-765 |
33 |
Bank Locker System Using Iris
Chetna R. Koli, Nikita S. Kheratkar, Pooja S. Ganganalli, T. G. Shirsat |
766-770 |
34 |
Various Techniques Use In Wireless Sensor Network For Congestion Control
Prof. Sachin Patel, Prof. Rakesh Pandit, Mr. Abhijeet Rathod |
771-774 |
35 |
Dynamic Bus Timetable Using GPS
Gunjal Sunil N. , Joshi Ajinkya V. , Gosavi Swapnil C. , Kshirsagar Vyanktesh B. |
775-778 |
36 |
WSN Routing Challenges: A Methodical Analysis
Sukhchandan Randhawa |
779-785 |
37 |
Key Dependent Secure Messenger
Nandanwar Aniket D., Deshmukh Sonali S., Hadawale Rashmi R., Nanaware Gauri B. |
786-789 |
38 |
ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM
H.Anusuya Baby, Christo Ananth |
790-795 |
39 |
IMAGE RETRIEVAL SYSTEM: BASED ON USER REQUIREMENT AND INFERRING ANALYSIS TROUGH FEEDBACK
Mount Steffi Varish.C, Guru Rama SenthilVel |
796-801 |
40 |
Performance Analysis of Medical Image Fusion Using Multimodal Graph Cut Algorithm
S.Anbumozhi, P. S.Manoharan |
802-807 |
41 |
IMPROVING EFFICIENCY OF NODES USING DEPLOYMENT FRAMEWORK IN ZIGBEE WIRELESS NETWORKS
Prinslin.L, V.Janani |
808-810 |
42 |
A Distributed Firewall Optimization Protocol For Customized Policy Verification
Arun.P, Divya.V, Jyothi.S,Vaishnavi.S |
811-813 |
43 |
Cloud information accountability using cloud log security protocols
A.PUNITHA ANGEL MARY, P.MALARKODI |
814-817 |
44 |
OPTIMIZING THE WEB RESOURCES USING AN EFFECTIVE MECHANISM
S.SUJITHA, R.RAVI, DR.BEULAH SEKHAR |
818-821 |
45 |
COMPARISION OF PARALLEL BCD MULTIPLICATION IN LUT-6 FPGA AND 64-BIT FLOTING POINT ARITHMATIC USING VHDL
Mrs. Vibha Mishra, Prof. Vinod Kapse |
822-826 |
46 |
Survey Paper on Credit Card Fraud Detection
Suman,Mitali Bansal |
827-832 |
47 |
Optimized Design of IIR Poly-phase Multirate Filter for Wireless Communication System
Er. Kamaldeep Vyas, Mrs. Neetu |
833-839 |
48 |
Resilient Identity Based Encryption for Cloud Storage by using Aggregate Keys
L.MohamedIrfan, S.Muthurangasamy, T.Yogananth |
840-844 |
49 |
A Review on: Efficient fuzzy type Ahead search in Xml data
Ms. Sonali Kadam, Prof. Sanchika Bhajpai |
845-848 |
50 |
A High Quality Cryptography Based Image Steganography Using ASCII Differencing and Three LSB Bits Insertion Method
Tajinder Singh, Sukhjit Singh, Gurvinder Singh |
849-852 |
51 |
Comparative Study and Implementation of Image Enhancement Techniques based on Histogram Equalization
Satnam Kaur, Baljeet singh |
853-859 |
52 |
ON-BOARD DIAGNOSTIC SYSTEM FOR VEHICLES
D.NANDHINI, G.NANDHINI, M.NANDHINI, R.VIDHYA |
860-865 |
53 |
Searching and Optimization Techniques in Artificial Intelligence: A Comparative Study & Complexity Analysis
Ashwani Chandel, Manu Sood |
866-871 |
54 |
Markovian Semantic Indexing:Application to Online Image Retrieval System
K. Naresh Kumar, K. Krishna Reddy |
872-878 |
55 |
LLVM Clang Utilities
Borase Gayatri S., Gawale Mohini R., Mate Satyabhama S., Mujawar Nilofar S. |
879-882 |
56 |
SECURE DATA ACCESS USING BIOMETRIC RECOGNITION IN CLOUD COMPUTING
P.NIVETHA , V.SARALA |
883-887 |
57 |
Industrial Network for People and Resources (IPRnet)
Chaitali Datkhore , Tejaswini Tule , Vaishali Titare, Mayuri Wagh |
888-891 |
58 |
ITFOOD: Indexing Technique for Fuzzy Object Oriented Database
Priyanka J. Pursani, Prof. A. B. Raut |
892-898 |
59 |
Content Relevance Prediction Algorithm in Web Crawlers to Enhance Web Search
Saurabh Pakhidde, Jaya Rajurkar, Prashant Dahiwale |
899-902 |
60 |
ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS: A LITERATURE REVIEW
Najiya A, Fameela K.A, Asst. Professor Reshma V.K |
903-908 |
61 |
REVIEW PAPER ON
IMAGE CONTRAST ENHANCEMENT TECHNIQUES
Ms. K.T.Chalekar, Prof T. Yengantiwar |
909-911 |
62 |
Autosilent Mobile System
Kore Geetanjali T.,Naik Suman R., Sanap Kavita V., Mawale Ashwini J. |
912-914 |
63 |
TGI Modules for Social Tagging System
Mr. Tambe Pravin M.,Prof. Shamkuwar Devendra O. |
915-919 |
64 |
AN EFFICIENT APPROACH TO SEGMENT SCALING IN PSORIASIS SKIN IMAGE
Anuradha Balasubramaniam, Anbu Selvi |
920-925 |
65 |
Literature Survey on Contour Point based Recognition
E.Komathi, A.Mani |
926-929 |
66 |
PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER
T.Pavithra,Mrs.G.Umarani |
930-934 |
67 |
Adaptive Additive-Increase Multiplicative-Decrease (AAIMD) Congestion control Algorithm for WSN
SubhashPanchal,Prof. O.S Khanna |
935-940 |
68 |
An Architecture For Centralizing And Modernizing The Classical Medical System
Hari.P.V, Vijaya Kumar.S,Vijaya kumar.H |
941-945 |
69 |
DYNAMIC QUERY GROUPING BASED ON THE USER SEARCH QUERY LOGS
K.Sugashini, O.Priyanga, M.Abarna |
946-949 |
70 |
Hybrid Cryptography Technique For Mobile Ad-hoc Network
M.sangeetha, V.Vidya Lakshmi |
950-954 |
71 |
Morphological Technique in Medical Imaging for Human Brain Image Segmentation
Asheesh Kumar, Naresh Pimplikar, Apurva Mohan Gupta, Natarajan P |
955-959 |
72 |
FIXED POINT THEOREM IN MENGER SPACE
M.S. Chauhan,Dheeraj Aheere,Bharat Singh |
960-965 |
73 |
Women Security System
Shaik Mazhar Hussain |
966-968 |
74 |
Indian stock market prediction using neural network technique
Gholap Rahul Mansing,Kale Devidas Bhausaheb,Shirasth Yogesh Sominath,Borkute Pooja Ashok |
969-971 |
75 |
Detection of Insider and Outsider Attack using Holistic Protocol in Vehicular Ad Hoc Networks
M.sharmila mari, M.Ponnrajakumari |
972-975 |
76 |
Domainwise Extraction of Information and Knowledge using Automated Query Generation
Akash R. Dumbre, Yogesh S. Sandbhor, Hrishikesh V. Pardeshi, Nikhil K. Niwdunge |
976-979 |
77 |
Evaluation of Crop Fields from Hyperspectral Images Using Optimized Methods
Dr.P.Tamije Selvy, S.Sam Peter |
980-983 |
78 |
ENHANCING THE PERFORMANCE OF INFORMATION RETRIEVAL IN QA USING SEMANTIC WEB TECHNOLOGY
S.Lakshmi Prabha,C.Meenaa , S.Pugazhl Vendhan, S.Raja Ranganathan |
984-989 |
79 |
Particle Swarm Optimization with Aging Leader and Challenges for Multiswarm Optimization
S.Vijayalakshmi, D.Sudha, S.Mercy Sigamani, K.Kalpana Devi |
990-995 |
80 |
A Survey of Tag Completion for Efficient Image Retrieval Based on TBIR
Mr. Wakchaure Sujit R., Prof. Shamkuwar Devendra O. |
996-1000 |
81 |
Power and Area Efficient Error Tolerant Adder Using Pass Transistor XOR Logic in VLSI Circuits
S.Sathish Kumar, V.Muralidharan, S.Raja |
1001-1005 |
82 |
Audit based Misbehaviour and Gray-hole detection in spontaneous wireless Adhoc network
Nafees Muneera.M, Thirupurasundari.D.R |
1006-1011 |
83 |
Location Based Service on Android Platform
Shweta C . Agrawal , Rutuja G.Gadbail ,Prof. P.D.Chowhan |
1012-1015 |
84 |
Detection of Lost Mobile on Android Platform
Shreya K. Patil , Bhawana D. Sarode ,Prof. P.D.Chowhan |
1016-1018 |
85 |
Agricultural Environmental Sensing Application Using Wireless Sensor Network
Manish Giri, Pranoti Kulkarni, Anuja Doshi,Kanchan Yendhe,Sushma Raskar |
1019-1022 |
86 |
Efficient Nearest and Score Based Ranking for Keyword Search
Rajkumar.R, Manimekalai.P, Mohanapriya.M, Vimalarani.C |
1023-1027 |
87 |
Maximizing the Network Lifetime of MANET Using Efficient Power and Life Aware Routing Protocol
Anuja.M, Jaya shree.S, Gobinath.S, Mrs. R.M.Bhavadharini |
1028-1031 |
88 |
Certificate Revocation Using Public Key Infrastructure For MANET’s
Gowsalyaa.M,Karthick.N,Keerthana.S,Durga.R |
1032-1035 |