S.No. |
Title and Authors of Paper |
Page.No. |
1 |
Analysis of Black Hole Attack on MANET Using Different Routing Protocols
Vandna Dahiya |
3309-3316 |
2 |
A Study on NoSQL Database Related to Large of Amount of Data in Distributed Environment
Manoj Kumar Singh, Mohammad Kemal, Dr. Farid Ahmed |
3317-3325 |
3 |
Present State and Piracy Control Using Interoperable Digital rights Management
Priyanka Gupta |
3326-3329 |
4 |
Remote Monitoring and Sorting System for Waste Material Management Using RFID
Prof. Mr. P. Balramdu, Prof. Mr. Manoj Kumar, Mr. Chape Laxman Murlidhar, Mr.Wankhade Sachin Sudamrao, Mr.Phalke Ulhas,Mr.Kotkar Narhari Ramkrushna |
3330-3334 |
5 |
Towards Mobile Cloud Computing
Pragati Redekar, Rakesh Rajani |
3335-3338 |
6 |
Autonomous Environmental Parameters Monitoring System Using ZigBee
Ms. Shweta S. Badgi, Prof. N. A. Dawande |
3339-3342 |
7 |
Multi-Part Data Hiding in Audio Steganography
Uma Mehta |
3343-3346 |
8 |
Iris Recognition for Eyelash Detection Using Gabor Filter
Rupesh Mude, Meenakshi R Patel |
3347-3351 |
9 |
MONITORING AND IMPROVING THE PERFORMANCE OF STUDENTS BY SENDING ACADEMIC INFORMATION USING IMAP AND ID3
Sateesh kumar Metti, R Raja Ramesh Merugu |
3352-3357 |
10 |
ACHIEVING USER PRIVACY AND ANONYMITY IN WIRELESS MESH NETWORKS USING ANONYMOUS PROTOCOL
Phani babu Komarapu, Loshma Gunisetti |
3358-3364 |
11 |
A COMPARATIVE STUDY ON CLOUD MODELS AND SERVICES
W.SARADA, B. LAKSHMI PRASANNA, V.PADMALATHA |
3365-3371 |
12 |
Fuzzy based intelligent routing in high speed networks
M Mohan rao,Vamsi Krishna |
3372-3379 |
13 |
SECURE CLOUD USING INTRUSION DETECTION AND COUNTERMEASURES SELECTION
S.Deepak, P. Kiruthika, H.Anandakumar, B.Anuradha |
3380-3383 |
14 |
EMBEDDED INTELLIGENT HOME CONTROL SYSTEM BASED ON ARM-LINUX
I.Mahendar,K.Srinivasa Reddy,D.Rupa Kumar,E.Geetha Reddy |
3384-3387 |
15 |
Static Gesture Recognition of Devnagari Sign Language using Feed-Forward Neural Network
Ms. Shraddha Taunk, Mr. Dipesh Kumar Sharma, Mr. Ram Nivas Giri |
3388-3392 |
16 |
A Review Paper on Hindi Language Graphical User Interface to Relational Database using NLP
Abhijeet R. Sontakke, Prof. Amit Pimpalkar |
3393-3397 |
17 |
Quantitative Analysis of Cardiac Q Wave Modeling Using Adaptive Neuro Fuzzy Inference System
S.Ananthi, V.Vignesh, K.Padmanabhan |
3398-3403 |
18 |
MOBILE WIRELESS LAN
KETAN S. SHEVALE |
3404-3407 |
19 |
Minimizing the memory Cost in Clouds using Data Staging Algorithm
Prof.Sanchika Bajpai, Sujata Yadav,Reshma Ruke, Trupti Mahadik |
3408-3410 |
20 |
IMS BASED PRESENCE SERVICE FOR INTER DOMAIN ENTERPRISE MOBILITY
N.DivyaBharathi,Dr.N.CHANDRA SHEKAR ,Santhosh |
3411-3416 |
21 |
Enhancing A Software Testing Tool to Validate the Web Services
Tanuj Wala, Aman Kumar Sharma |
3417-3423 |
22 |
COMPARATIVE ANALYSIS OF CLASSIFICATION TECHNIQUES FOR ACCURACY ON A MULTIVARIATE DATA SET
KalpanaRangra,Dr. K.L.Bansal |
3424-3428 |
23 |
Diagonal Block Steganography Based Enhanced Auxiliary Key Crypting for Secure Data Transfer
Sudipta Sahana, Abhipsa Kundu |
3429-3432 |
24 |
A Survey on sliding window based weighted maximal frequent pattern mining over data streams
Rahul Anil Ghatage, Dnyaneshwar A Rokade, Rahul V Chavan |
3433-3436 |
25 |
A SURVEY ON INVISIBLE WATERMARKING IN DIGITAL IMAGES USING DWT
S.D.Heeba, A.Kowshika, H.Ananda Kumar, B.Anuradha |
3437-3439 |
26 |
A SURVEY ON ACCESSING CLOUD STORAGE BY GROUP MEMBERS WITH SECURE DYNAMIC USER REGISTRATION AND REVOCATION
V.Dhivya, M.Sivakumar, H.AnandaKumar, B.Anuradha |
3440-3443 |
27 |
A SURVEY TO IMPROVED THE LIFETIME OF WIMAX USING 802.16g BASED TECHNOLOGY
Divya.S,Vishalakshi.A, Anandakumar.H, Anuradha.B |
3444-3446 |
28 |
Robust Modification and Implementation of Randomized Cryptographic Algorithm
Feroz Morab, Sadiya Thazeen, Mohamed Najmus Saqhib, Seema Morab |
3447-3452 |
29 |
PERFORMANCE ANALYSIS OF BODY AREA NETWORK WITH ECG SIGNAL: REVIEW
Priyarani .S. Jagatap, Rupali .R. Jagtap. |
3453-3456 |
30 |
3DP: The 3D Panorama
Kishor P. Deshmukh, Gauri K. Bodkhe |
3457-3460 |
31 |
WEB FORUMS CRAWLER FOR USER RESPONSE ANALYSIS
B.Muthulakshmi, Dr.V.Thiagarasu |
3461-3466 |
32 |
Building Safety Management and Automation System Using PIC Microcontroller
K.Dharani, A.Priyadarshini |
3467-3470 |
33 |
WSN Based Fire Detection And Extinguisher For Fireworks Warehouse
S.Subalakshmi, D.Balamurugan |
3471-3475 |
34 |
OPTIMIZED MULTIPLIER USING REVERSIBLE LOGIC GATES: A VEDIC MATHAMATICAL APPROACH
M.Anitha,A.Rajani,N.Pushpalatha |
3476-3482 |
35 |
Data Storage Transfer Using Classification and Prediction in Cognitive Radio System
Dhivya.N, Anandakumar.H, Anuradha.B |
3483-3486 |
36 |
AN EXPOSURE TO CLUSTERING BASIS SYSTEM FOR ENHANCING CLASSIFIER POTENTIALS
A.Kavitha, N.Zareena |
3487-3490 |
37 |
EVIDENCE COLLECTING SYSTEM FROM CAR BLACK BOX
Ms. Kontham Lavanya, Mrs. Y. Roji |
3491-3493 |
38 |
Iris Segmentation and Recognition System
M. Karpaga Kani, Dr.T. Arumuga MariaDevi |
3494-3498 |
39 |
An Algorithm for Feature Level Fusion in Multimodal Biometric System
S.K.Bhardwaj |
3499-3503 |
40 |
Cryptographically Secure Linear feedback shift Register
Deeksha Sharma, Abdul Khalid, Shradha Parashar |
3504-3507 |
41 |
Aircraft outer contour in flight mode diagnostic system
V.M. Kazak, D.O. Shevchuk, N.A.Tymoshenko, M.H. Levchenko, O.M. Pavlenko |
3508-3510 |
42 |
A Survey of Biometric Fusion and Template Security Techniques
C.Prathipa, Dr.L.Latha |
3511-3516 |
43 |
TO PROPOSE A NOVEL TECHNIQUE TO REDUCE LINK FAILURE PROBLEM IN MANET
HARPREET KAUR, GURBINDER SINGH BRAR, Dr. Rahul Malhotra |
3517-3521 |
44 |
Survey Enhancement of Modified DSR protocol For Removal and Detection of Selective Black Hole Attack in MANET
Rahul Vasant Chavan, M S Choudhari, R A Ghatage |
3522-3525 |
45 |
A Novel System for Severity Estimation of Automotive Accident with Automatic Notification
B.Karthiga, B.Arun kumar |
3526-3530 |
46 |
A Review: Data Mining for Big Data
Miss. Punde Archana, Miss. Daundkar Kavita, Miss. Shelar Sarswatee |
3531-3533 |
47 |
IMPLEMENTATION ON PALM PRINT BY GLOBAL FEATURES
DHANUSHIA BEULAH.T,Dr.T. Arumuga Maria Devi |
3534-3539 |
48 |
Cuckoo Search Algorithm for Speech Recognition
Madhumita Dash, Ricky Mohanty |
3540-3545 |
49 |
Performance Evaluation of Rule Based Classification Algorithms
Aditi Mahajan, Anita Ganpati |
3546-3550 |
50 |
Survey on Techniques for Cross Platform Mobile Application Development
Apurva P. Pawar, Vandana S. Jagtap, Mamta S. Bhamare |
3551-3558 |
51 |
Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms
Damanjeet Kaur |
3559-3563 |
52 |
Design of digital cmos circuits by Using Standard Cell Library for high performance
Mr.P.Balaramudu, Mr.Manoj Kumar, Mr.Chape L.M., Mr.Wankhade S.S., Mr.Phalke Ulhas |
3564-3571 |
53 |
SIGNAL TO NOISE RATIO ESTIMATION OF QAM AND QPSK MODULATION TECHNIQUE AT 910MHz and 2116.4 MHz USING MEASURED DATA
Alumona T.L, G.N Onoh, Mbanugo P.C, Ugwuoke O.O |
3572-3576 |
54 |
Multi Resonant Stacked Micro Strip Patch Antenna Designs for IMT, WLAN & WiMAX Applications
Tejinder Kaur Gill, Ekambir Sidhu |
3577-3585 |
55 |
ESTIMATION OF PAPR REDUCTION IN OFDM USING MODIFIED DCT-SLM
KARUNA PANDEY , ASSIST PROF. AMIT KUMAR PATHAK |
3586-3589 |
56 |
Detection and Tracking of People’s group
Jorge Paullada, Ana Herrera, Hugo Jiménez, Maribel Bueno, Consuelo Frías, Felipe Estrada |
3590-3593 |
57 |
A study of Data Mining Process in context of Utility and Functions in present scenario
Parul Dubey, Ratnaraja Kumar |
3594-3597 |