Volume 4 Issue 3 March 2015
Volume 4 Issue 3 March 2015
S.No. | Title and Authors of Paper | Page.No. |
1 | Review On: Hybrid Approach for Gait Recognition with GPPE and SURF technique Ms.Jatinder Kaur and Ms.Varsha |
577-584 |
2 | Record Linkage Using Jaro-Winkler Technique Implemented In Database Misuse Domain V.Vennila, S.Savitha, T.Sathya |
585-587 |
3 | Autoregressive Image Super-resolution And Retrival of Image Using NSP Anasmon A K, Abhijith G.S |
588-594 |
4 | User Centric Scaling System for Dynamic Cloud Resource Sharing Environment N.Aishwarya, P.Sivaranjani |
595-599 |
5 | Appearance Based Approach Car Parking Slot Detecting System with Android Application K.K.Dhivyabharathi, D.Sorna Shanthi |
600-605 |
6 | Performance Optimization of WSN Using Multiple Sinks Mr. Amol B. Bhadange and Mr. Sudipta Giri |
606-613 |
7 | A study on Automated Speech Recognition Technique Vijayalakshmi A, Midhun Jimmy, Moksha Nair |
614-617 |
8 | Clustering Moodle Data As a Tool For Profiling Students Gawali Kavita Bapu, Mrs.Pratiksha R. Deshmukh |
618-621 |
9 | Cross Layer Intrusion Detection In MANET’S:A Survey I.Meenatchi, K. Palanivel |
622-626 |
10 | Image Fusion and Secure Transmission of Medical Images Anjali Babu, Padmavathi N.B. |
627-633 |
11 | Efficient Practices of Privacy Preservation in Relational Databases Anusmitha.A, Renjana Ramachandran |
634-638 |
12 | Secure Navigation of Missile through Wireless Communication Using IDEA Algorithm Prof. Anuradha S. Deshpande, Omkar D. Cherekar, Aniket S. Patil, Abhijeet S. Patil |
639-641 |
13 | Clustering methods for Big data analysis Keshav Sanse, Meena Sharma |
642-648 |
14 | Low Power Truncated Binary Multiplier Using Replica Redundancy Block Gopalakrishnan.S, Savitha V V |
649-652 |
15 | Intrusion Protection Against SQL Injection Attacks Using Reverse Proxy Monika Ghodake, Gitanjali Dabhade, Gayatri Aher, Mr.Sachin N.Wandre |
653-656 |
16 | TRACKING A GAZE USING A METHOD OF EYE LOCALIZATION Prof.V.B.Raskar, Priyanka E Borhade, Monali R Gayake, Sujata B Pimpale |
657-660 |
17 | Flow Based Solutions for DoS and DDoS Attack Detection Noble George, Sujitha M |
661-664 |
18 | An Effective Web Service Selection based on Hybrid Collaborative Filtering and QoS-Trust Evaluation S. Urmela, Dr. K. Suresh Joseph |
665-672 |
19 | Efficient Ranking on Websites Using ScaleRank with Interpolation Search Tinku Varghese, Subha Sreekumar |
673-676 |
20 | FPGA Implementation of High Resolution All-Digital Duty Cycle Corrector Using NAND Based Logic Mrs.S.V.KIRUTHIKA, Dr.R.SUDARMANI |
677-680 |
21 | Performance Enhancement Guaranteed Cache Using STT-RAM Technology Ms.P.SINDHU, Ms.K.V.ARCHANA |
681-685 |
22 | A Digital Video Stabilization Method Based On Hilbert-Huang Transform Mr.Kiran D.Daulatdar, Mr.Dhanraj V.Jagtap, Mr.Vikas N.Ranpise, Prof.R.K.Sarawale |
686-689 |
23 | Person Re-Identification Over Camera Gridsby Multi-Task Distance Metric Learning Prof. Seema B. Idhate, Atif Sayyed, Abhishek Sawant, Pratik Borse |
690-695 |
24 | An Approch For Nanoscale Wireless Communication Using Minimum Energy Channel Code Prof.Anuradha Deshpande, Mahesh Adhav, Shekhar Zende, Prashant Khati |
696-701 |
25 | 3D Object Approximation from Multi-View Depth Information Prof. Seema Idhate, Abhishek Kumar Pandey, Ainar Nanda, Tripti Pandey |
702-706 |
26 | A Survey on Efficient Protocol for Privacy Preserving Association Rule Mining Miss Prajakta Jaswante, Dr. P. R. Deshmukh |
707-710 |
27 | A Dynamic Scheduling Scheme for Cloud Computing S.Sujan, R.Kanniga Devi |
711-716 |
28 | Design of U-shape microstrip patch antenna at 2.4GHz Rajratan kamble , Pradeep Yadav , Vijay Umbarkar, Prof.A.A.Trikolikar |
717-720 |
29 | A distributed, bandwidth-efficient accident avoidance and Secured Mobility Pattern in VANET Pandia Sundareshwari P, Pushpa Rani M |
721-725 |
30 | An Energy-Efficient Cooperative Routing in Wireless Sensor Networks Chinthamani R, Pushpa Rani M |
726-730 |
31 | Development of Human Tracking ,Control and Obstacle Avoiding Marathoner Bot Prof. P.R. Badadapure, Yogesh Palve, Abhishek Vig, Prashant Jha |
731-736 |
32 | A New Tri Class Otsu Segmentation With K-Means Clustering In Brain Image Segmentation Ann Josy John, Merlin Mary James |
737-741 |
33 | Bluetooth Embedded Portable Oscilloscope powered by Android Prof. P. R. Badadapure , Yogesh T. Vidhate , Yuvraj R. Garud |
742-745 |
34 | ENHANCED SECURITY IN PERSONALISED WEB SEARCH Leya Zacharias, Neema George |
746-749 |
35 | Detecting Unexplained Sequences using Top-k Algorithm Jintu Ann John, Neethu Maria John |
750-753 |
36 | Centroid Ratio for a Pairwise Random Swap Clustering Algorithm Mrs. S.SUGANYA ,MS R.SOUNDHARYA, Ms.J.Laveena Grasy |
754-758 |
37 | MULTIPLE OBJECT RECOGNITION ROBOT Vinod D. Mhaske,Vishwas Shivsamb, Prof. S.S. Dathkhore |
759-762 |
38 | Lung Cancer Detection with fusion of CT and MRI Images Using Image Processing Prof. Anuradha S. Deshpande, Dhanesh D. Lokhande, Rahul P. Mundhe, Juilee M.Ghatole |
763-767 |
39 | FUSION OF MULTIPLE IMAGES USING SUPPORT VECTOR MACHINE AND DISCRETE WAVELET TRANSFORM Prof. N.S. Labhade, Ashwini Y. Chopade, Shubhangi S. Dhumal, Shraddha S. Urunkar |
768-771 |
40 | Segmentation of Video Using local Descriptors and Optical flow Techniques Prof. S. K. Bhatia, Deepa Pawar, Supriya Thorat, Sonali Ghante |
772-775 |
41 | Methodology for Detecting Diabetic Presence from Iris Image Analysis Prof. S. K. Bhatia, Priyanka Atole, Sarika Kamble, Pooja Telang |
776-779 |
42 | CENTRALIZE COMPUTER CONTROL NUTRIEN TFEEDER SYSTEM Yogesh pote, Milind Thete, Sagar Kape, Hardik Lakade |
780-782 |
43 | Image Restoration & Registration for Brain Tumor Detection Prof. S. K. Bhatia, Sneha Sapkal, Neha Pharate |
783-788 |
44 | Scanned Image De-Screening with Image Redundancy and Adaptive Filtering Sagar Dangat, Vishaka Dhirdekar, Thadani Nikita, Prof. P.R. Badadapure |
789-792 |
45 | Filtering Unwanted Messages from (OSN) User Wall’s Using MLT Prof.Sarika.N.Zaware, Anjiri Ambadkar, Nishigandha Bhor, Shiva Mamidi, Chetan Patil |
793-798 |
46 | VOTING BASED MOTION ESTIMATION FOR REAL TIME VIDEO TRANSMISSION Prof. V.B. Raskar, Kiran B. Patil, Snehal Y. Nikam, Ganesh A. Abnave |
799-801 |
47 | Implementation on Analyzing the Bubble Flows in Microchannels using Image Processing Anjushree Nair, Neha Pandey, Kalpana R. Bodke, Mrs. Mohini Laghate |
802-808 |
48 | Testing of Various Embedded System with Artificial Intelligence Approach Swapnili P. Karmore, Dr. Anjali R. Mahajan |
809-814 |
49 | Real Time Product Analysis using Data Mining Jawahire Nakash, Shaikh Anas, Siddiqi Muzammil Ahmad, Ansari Mohd. Azam,Prof Tabrez Khan |
815-820 |
50 | Data Aggregation for Using the Node Coverage Area in Wireless Sensor Networks Sowmia Devanandh , C.Madhubala, K.Renugadevi, R.K. Santhia |
821-824 |
51 | A Survey on Frequent Web Page Mining with Improving Data Quality of Log Cleane Ms Shashi Sahu, Asst Prof. Leena Sahu |
825-829 |
52 | HAND GESTURE BY USING ROBOTIC CAR CONTROL Mr. Dineshkumar Bhusare,Ms.Shilpa Karale, Ms. Pooja Pawar, Prof. R.K. Sarawale |
830-833 |
53 | Optimizing Pattern Recognition Scheme Using Genetic Algorithms In Computer Image Processing Mansoor Farooq |
834-836 |
54 | Providing Authentication by Merging Minutiae Template Priya Raul, Sayali Surve, Sushma Gilbile, Jasmine Hebbalkar, Prof J.L. Chaudhari |
837-845 |
55 | PRACTICAL APPLICATIONS OF ROBOTIC HAND USING IMAGE PROCESSING Prof.V.B.Raskar, Nilesh Hargude, Sabale Vishwanath, krishna Chavan |
846-848 |
56 | Smart Lecture Delivery Using Raspberry Pi Ansari Imran,Bhatkar Firoz, Chaudhary Faisal, Khan Shahrukh, Prof. Mubashir Khan |
849-855 |
57 | DECIMATION FILTER DESIGN AND NOISE ANALYSIS FOR MULTISTANDARD WIRELESS COMMUNICATION Pooja Bande |
856-861 |
58 | Lightweight Key Distribution for secure routing and secure information propagation – A Review Anubha Goyal, Geetanjali Babbar |
862-865 |
59 | FILTERING MICROSTRIP PATCH ANTENNA USING FILTER SYNTHESIS APROACH MAYUR THAKARE, SHASHIKANT OVHAL, GHORPADE AKSHAY |
866-868 |
60 | Image Processing and Joint Reduction of PAPR and BER in OFDM System Prof. Manisha Khaladkar, Rupesh Rathod, Sumit Dharne,Sanket Deshmukh |
869-873 |
61 | Smart Shopping- An Android Based Shopping Application Adarsh Borkar, Madhura Ansingkar, Monali Khobragade, Pooja Nashikkar, Arti Raut |
874-878 |
62 | High Image Quality and Resilience Controlled Reversible Watermarking with Interpolation Error Expansion Technique Manjumadha T R, Kavitha C, Sakthivel S |
879-885 |
63 | GunBot : A Semi-Autonomous UGV Aniket Nagaonkar, Ritika Marathe, Shreya Sangle,Prof.Dr.Swapnil Lahudkar |
886-888 |
64 | Simulation of hasswa based VHO algorithm for mobile handoff Mr. Rajabhau Tidke, Mr. Abhijeet Karale, Mr. Yash Rathod, Dr. S. L. Lahudkar |
889-893 |
65 | SMART DRUNKEN DETECTION HANDHELD DEVICE Mr.SOHAN LOKHANDE,Mr.DHIRAJ SINGH RAJPUT,Mr.NILESH KUMAR PADWAL,Prof.Mr.MAHESH MAINDARKAR |
894-898 |
66 | Dynamic Bigdata and Security with Kerberos Sachin Choudhary, Sandesh Manohar, Sunil Salunkhe |
899-904 |
67 | Transfer of Malware and Prevention Technique via Ultrasonic M. Kailesh, J. Godwin Ponsam |
905-909 |
68 | WIRELESS OSCILLOSCOPE USING ZIGBEE MODULE IN MATLAB Mithila Jaybhaye,Dipeshkumar Pokar,Priyanka K.Katkar, Prof. A.A.Trikolikar |
910-913 |
69 | Achieving Minimum Transmitting and Caching Memory Cost On Data Staging Algorithm In Cloud Prof.Sanchika Bajpai,Sujata Yadav,Reshma Ruke, Trupti Mahadik |
914-916 |
70 | Inpainting on Static Object of Video and Maintaining Spatial Secular Stability Prof. R. K. Sarawale, Nitin L. Tajane, Ashwini R. Makhare, Neha R. Reddy |
917-920 |
71 | Quality of Service for Video Streaming over Wireless Networks in Mobile Phone Udhayakumar M, Suganthi P |
921-924 |
72 | Prediction of Charisma and Temperament of a Person by Prospecting Their Social Network Activities D.Saranya, V.Priyanga Jaanagi, S.Harini, K.Janani |
925-928 |
73 | Accurate Emotion Detection of Digital Images Using Bezier Curves C.Karuna Sharma, T.Aswini, A.Vinodhini, V.Selvi |
929-933 |
74 | Pixel as Graphical Password for Security Primitive M.Pradeep, S.Karthikeyan, M.Seshadri, K.Karuppaiya, B.Karthikeyan |
934-937 |
75 | Integrated Services With Smart Home Control Systems Applications Ahmed Nabih Zaki Rashed, Ayman A.Kotb, Osama M. I. Elshazly, Ahmed B. Ali, Ibrahim A. S. M. Khattab, Mohamed A. Elsayed, Mohey Z.Ramadan, and Angham Z.Kandel |
938-942 |
76 | DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEM Mrs. S.Anusha, Saranya G, Sowmya S |
943-949 |
77 | An Emperical Study for E-voting System Ashish Pedgulwar, Manjiri Nigade, Pranav Rajhans, Asst. Prof. Shweta Joshi |
950-952 |
78 | A Survey on Cryptographic Security over Cloud Er. Lalit Gehlod,Govind Patidar |
953-957 |
79 | A SURVEY ON PREVENTING DDOS ATTACK IN CLOUD ENVIRONMENT Karthik Sekaran, Karunakaran G, Charanya R |
958-961 |
80 | INTERIOUR DESIGN USING AUGMENTED REALITY Miss. Arti Yadav, Miss. Taslim Shaikh,Mr. Abdul Samad Hujare,Prof. Murkute P.K. |
962-966 |
81 | ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS Durga Prasad JKS |
967-975 |
82 | VHDL IMPLEMENTATION OF NEURAL RECORDING SYSTEM WITH UWB TELEMETRY VIJAYAKUMAR.P, Mrs. ANANTHA LAKSHMI.A.V |
976-980 |
83 | MOBILE PHONE CONTROLLED ALIVE HUMAN DETECTOR USING ROBOTICS M.BREM KUMAR, D.MANIKANDAN, M.GOWDEM, D.BALASUBRAMANIAN |
981-984 |
84 | ENERGY HARVESTING FROM RF SIGNAL Yogesh Bhole , Sagar Chaugule, Bhavesh Damankar,Vaibhav Yadav |
985-989 |
85 | Coin Based Mobile Charger Using Solar Panel, RFID Raju R. Khawse, Sachin S. Shikare , Pradip Suryawanshi, Prof. A. A. Trikolikar |
990-992 |
86 | A Survey Paper For Finding Frequent Pattern In Text Mining Ms. Sonam Tripathi , Asst Prof. Tripti Sharma |
993-997 |
87 | An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs I. Meenatchi , K. Palanivel |
998-1004 |
88 | A Survey on Various Techniques for Generating Image Steganography with Improved Efficiency Ms. Neha Shrivastava, Assistant Prof. Mr. Toran Verma |
1005-1009 |
89 | An Image Watermarking Using hybridization of DWT, CZT and modified SVD Ishpreet Kaur, Astt. Prof. Amandeep Mavi |
1010-1013 |
90 | Analysis of Vulnerabilities in the Protocols used in SCADA Systems Krushna Chandra Mahapatra, S.Magesh |
1014-1019 |
91 | ANDROID DASHBOARD AND SMART VEHICLE MANAGEMENT Mr.Saurav V. Malpani Ms.Aishwarya D. Deshmukh Ms.Gitanjali S. Sakore Prof.Mrs.S.K.Bhatia |
1020-1022 |
92 | Beamforming Smart Antenna LCMV & MVDR Algorithm Swapnil Waghmare, Nilsagar Gotarne, Rohan Botre, Prof.K.G. Maske |
1023-1026 |
93 | Communication of Multifarious Devices through Internet of Things and their Organization Sharat Sharma S, B R Prasad Babu |
1027-1033 |
94 | Predicate Encryption in decentralized Architecture For Security Enhancement in current DOSN Mr.GaneshPotle,Mr.PremGaykar,Mr.ImranMujawar,Prof.Patil S.S. |
1034-1040 |
95 | AN EFFICIENT ANALYSIS FOR COMPETITIVE ALGORITHM TO FIND BEST CLUSTERS Miss Dhanshree Hadawale, Miss Prajakta Mande, Miss Sushama Patil |
1041-1045 |
96 | Basic Medical Image Fusion Methods Medha Balachandra Mule,Padmavathi N.B. |
1046-1049 |
97 | A Survey on Energy Conservation in Wireless Sensor Network with Genetic Algorithm Harpreet Kaur, Dr.Rohit Bajaj |
1050-1053 |
98 | REAL TI ME BUS AVAILABILITY SYSTEM Tejas N A, Younus Zain, Mrs.Panimozhi K |
1054-1061 |
99 | SECURE BANKING SYSTEM USING ANDROID APPLICATION Akash M.Bhalerao, Abhijeet P.Pandhare, Akash H.Bhogade, Amit C.Mane |
1062-1064 |
100 | Data mining and Security in Big data Muni raj Choopa |
1065-1069 |
101 | Denoising EEG Signal Using Wavelet Transform R. PRINCY, P. THAMARAI, B.KARTHIK |
1070-1074 |
102 | An Android Application for Parking Management and Dissemination System Shinde Smita N., Shinde Komal V., Nagpure Rashmila D. , Tupkar Avanti S., Prof. Ankoshe M. S. |
1075-1080 |
103 | Natural Language (English) To MongoDB Interface Mahesh D. Gadekar, Bhagwan M. Jadhav, Ansar S. Shaikh, Raju B. Kokare |
1081-1083 |