Volume 4 Issue 3 March 2015

Volume 4 Issue 3 March 2015

S.No. Title and Authors of Paper Page.No.
1 Review On: Hybrid Approach for Gait Recognition with GPPE and SURF technique
Ms.Jatinder Kaur and Ms.Varsha
577-584
2 Record Linkage Using Jaro-Winkler Technique Implemented In Database Misuse Domain
V.Vennila, S.Savitha, T.Sathya
585-587
3 Autoregressive Image Super-resolution And Retrival of Image Using NSP
Anasmon A K, Abhijith G.S
588-594
4 User Centric Scaling System for Dynamic Cloud Resource Sharing Environment
N.Aishwarya, P.Sivaranjani
595-599
5 Appearance Based Approach Car Parking Slot Detecting System with Android Application
K.K.Dhivyabharathi, D.Sorna Shanthi
600-605
6 Performance Optimization of WSN Using Multiple Sinks
Mr. Amol B. Bhadange and Mr. Sudipta Giri
606-613
7 A study on Automated Speech Recognition Technique
Vijayalakshmi A, Midhun Jimmy, Moksha Nair
614-617
8 Clustering Moodle Data As a Tool For Profiling Students
Gawali Kavita Bapu, Mrs.Pratiksha R. Deshmukh
618-621
9 Cross Layer Intrusion Detection In MANET’S:A Survey
I.Meenatchi, K. Palanivel
622-626
10 Image Fusion and Secure Transmission of Medical Images
Anjali Babu, Padmavathi N.B.
627-633
11 Efficient Practices of Privacy Preservation in Relational Databases
Anusmitha.A, Renjana Ramachandran
634-638
12 Secure Navigation of Missile through Wireless Communication Using IDEA Algorithm
Prof. Anuradha S. Deshpande, Omkar D. Cherekar, Aniket S. Patil, Abhijeet S. Patil
639-641
13 Clustering methods for Big data analysis
Keshav Sanse, Meena Sharma
642-648
14 Low Power Truncated Binary Multiplier Using Replica Redundancy Block
Gopalakrishnan.S, Savitha V V
649-652
15 Intrusion Protection Against SQL Injection Attacks Using Reverse Proxy
Monika Ghodake, Gitanjali Dabhade, Gayatri Aher, Mr.Sachin N.Wandre
653-656
16 TRACKING A GAZE USING A METHOD OF EYE LOCALIZATION
Prof.V.B.Raskar, Priyanka E Borhade, Monali R Gayake, Sujata B Pimpale
657-660
17 Flow Based Solutions for DoS and DDoS Attack Detection
Noble George, Sujitha M
661-664
18 An Effective Web Service Selection based on Hybrid Collaborative Filtering and QoS-Trust Evaluation
S. Urmela, Dr. K. Suresh Joseph
665-672
19 Efficient Ranking on Websites Using ScaleRank with Interpolation Search
Tinku Varghese, Subha Sreekumar
673-676
20 FPGA Implementation of High Resolution All-Digital Duty Cycle Corrector Using NAND Based Logic
Mrs.S.V.KIRUTHIKA, Dr.R.SUDARMANI
677-680
21 Performance Enhancement Guaranteed Cache Using STT-RAM Technology
Ms.P.SINDHU, Ms.K.V.ARCHANA
681-685
22 A Digital Video Stabilization Method Based On Hilbert-Huang Transform
Mr.Kiran D.Daulatdar, Mr.Dhanraj V.Jagtap, Mr.Vikas N.Ranpise, Prof.R.K.Sarawale
686-689
23 Person Re-Identification Over Camera Gridsby Multi-Task Distance Metric Learning
Prof. Seema B. Idhate, Atif Sayyed, Abhishek Sawant, Pratik Borse
690-695
24 An Approch For Nanoscale Wireless Communication Using Minimum Energy Channel Code
Prof.Anuradha Deshpande, Mahesh Adhav, Shekhar Zende, Prashant Khati
696-701
25 3D Object Approximation from Multi-View Depth Information
Prof. Seema Idhate, Abhishek Kumar Pandey, Ainar Nanda, Tripti Pandey
702-706
26 A Survey on Efficient Protocol for Privacy Preserving Association Rule Mining
Miss Prajakta Jaswante, Dr. P. R. Deshmukh
707-710
27 A Dynamic Scheduling Scheme for Cloud Computing
S.Sujan, R.Kanniga Devi
711-716
28 Design of U-shape microstrip patch antenna at 2.4GHz
Rajratan kamble , Pradeep Yadav , Vijay Umbarkar, Prof.A.A.Trikolikar
717-720
29 A distributed, bandwidth-efficient accident avoidance and Secured Mobility Pattern in VANET
Pandia Sundareshwari P, Pushpa Rani M
721-725
30 An Energy-Efficient Cooperative Routing in Wireless Sensor Networks
Chinthamani R, Pushpa Rani M
726-730
31 Development of Human Tracking ,Control and Obstacle Avoiding Marathoner Bot
Prof. P.R. Badadapure, Yogesh Palve, Abhishek Vig, Prashant Jha
731-736
32 A New Tri Class Otsu Segmentation With K-Means Clustering In Brain Image Segmentation
Ann Josy John, Merlin Mary James
737-741
33 Bluetooth Embedded Portable Oscilloscope powered by Android
Prof. P. R. Badadapure , Yogesh T. Vidhate , Yuvraj R. Garud
742-745
34 ENHANCED SECURITY IN PERSONALISED WEB SEARCH
Leya Zacharias, Neema George
746-749
35 Detecting Unexplained Sequences using Top-k Algorithm
Jintu Ann John, Neethu Maria John
750-753
36 Centroid Ratio for a Pairwise Random Swap Clustering Algorithm
Mrs. S.SUGANYA ,MS R.SOUNDHARYA, Ms.J.Laveena Grasy
754-758
37 MULTIPLE OBJECT RECOGNITION ROBOT
Vinod D. Mhaske,Vishwas Shivsamb, Prof. S.S. Dathkhore
759-762
38 Lung Cancer Detection with fusion of CT and MRI Images Using Image Processing
Prof. Anuradha S. Deshpande, Dhanesh D. Lokhande, Rahul P. Mundhe, Juilee M.Ghatole
763-767
39 FUSION OF MULTIPLE IMAGES USING SUPPORT VECTOR MACHINE AND DISCRETE WAVELET TRANSFORM
Prof. N.S. Labhade, Ashwini Y. Chopade, Shubhangi S. Dhumal, Shraddha S. Urunkar
768-771
40 Segmentation of Video Using local Descriptors and Optical flow Techniques
Prof. S. K. Bhatia, Deepa Pawar, Supriya Thorat, Sonali Ghante
772-775
41 Methodology for Detecting Diabetic Presence from Iris Image Analysis
Prof. S. K. Bhatia, Priyanka Atole, Sarika Kamble, Pooja Telang
776-779
42 CENTRALIZE COMPUTER CONTROL NUTRIEN TFEEDER SYSTEM
Yogesh pote, Milind Thete, Sagar Kape, Hardik Lakade
780-782
43 Image Restoration & Registration for Brain Tumor Detection
Prof. S. K. Bhatia, Sneha Sapkal, Neha Pharate
783-788
44 Scanned Image De-Screening with Image Redundancy and Adaptive Filtering
Sagar Dangat, Vishaka Dhirdekar, Thadani Nikita, Prof. P.R. Badadapure
789-792
45 Filtering Unwanted Messages from (OSN) User Wall’s Using MLT
Prof.Sarika.N.Zaware, Anjiri Ambadkar, Nishigandha Bhor, Shiva Mamidi, Chetan Patil
793-798
46 VOTING BASED MOTION ESTIMATION FOR REAL TIME VIDEO TRANSMISSION
Prof. V.B. Raskar, Kiran B. Patil, Snehal Y. Nikam, Ganesh A. Abnave
799-801
47 Implementation on Analyzing the Bubble Flows in Microchannels using Image Processing
Anjushree Nair, Neha Pandey, Kalpana R. Bodke, Mrs. Mohini Laghate
802-808
48 Testing of Various Embedded System with Artificial Intelligence Approach
Swapnili P. Karmore, Dr. Anjali R. Mahajan
809-814
49 Real Time Product Analysis using Data Mining
Jawahire Nakash, Shaikh Anas, Siddiqi Muzammil Ahmad, Ansari Mohd. Azam,Prof Tabrez Khan
815-820
50 Data Aggregation for Using the Node Coverage Area in Wireless Sensor Networks
Sowmia Devanandh , C.Madhubala, K.Renugadevi, R.K. Santhia
821-824
51 A Survey on Frequent Web Page Mining with Improving Data Quality of Log Cleane
Ms Shashi Sahu, Asst Prof. Leena Sahu
825-829
52 HAND GESTURE BY USING ROBOTIC CAR CONTROL
Mr. Dineshkumar Bhusare,Ms.Shilpa Karale, Ms. Pooja Pawar, Prof. R.K. Sarawale
830-833
53 Optimizing Pattern Recognition Scheme Using Genetic Algorithms In Computer Image Processing
Mansoor Farooq
834-836
54 Providing Authentication by Merging Minutiae Template
Priya Raul, Sayali Surve, Sushma Gilbile, Jasmine Hebbalkar, Prof J.L. Chaudhari
837-845
55 PRACTICAL APPLICATIONS OF ROBOTIC HAND USING IMAGE PROCESSING
Prof.V.B.Raskar, Nilesh Hargude, Sabale Vishwanath, krishna Chavan
846-848
56 Smart Lecture Delivery Using Raspberry Pi
Ansari Imran,Bhatkar Firoz, Chaudhary Faisal, Khan Shahrukh, Prof. Mubashir Khan
849-855
57 DECIMATION FILTER DESIGN AND NOISE ANALYSIS FOR MULTISTANDARD WIRELESS COMMUNICATION
Pooja Bande
856-861
58 Lightweight Key Distribution for secure routing and secure information propagation – A Review
Anubha Goyal, Geetanjali Babbar
862-865
59 FILTERING MICROSTRIP PATCH ANTENNA USING FILTER SYNTHESIS APROACH
MAYUR THAKARE, SHASHIKANT OVHAL, GHORPADE AKSHAY
866-868
60 Image Processing and Joint Reduction of PAPR and BER in OFDM System
Prof. Manisha Khaladkar, Rupesh Rathod, Sumit Dharne,Sanket Deshmukh
869-873
61 Smart Shopping- An Android Based Shopping Application
Adarsh Borkar, Madhura Ansingkar, Monali Khobragade, Pooja Nashikkar, Arti Raut
874-878
62 High Image Quality and Resilience Controlled Reversible Watermarking with Interpolation Error Expansion Technique
Manjumadha T R, Kavitha C, Sakthivel S
879-885
63 GunBot : A Semi-Autonomous UGV
Aniket Nagaonkar, Ritika Marathe, Shreya Sangle,Prof.Dr.Swapnil Lahudkar
886-888
64 Simulation of hasswa based VHO algorithm for mobile handoff
Mr. Rajabhau Tidke, Mr. Abhijeet Karale, Mr. Yash Rathod, Dr. S. L. Lahudkar
889-893
65 SMART DRUNKEN DETECTION HANDHELD DEVICE
Mr.SOHAN LOKHANDE,Mr.DHIRAJ SINGH RAJPUT,Mr.NILESH KUMAR PADWAL,Prof.Mr.MAHESH MAINDARKAR
894-898
66 Dynamic Bigdata and Security with Kerberos
Sachin Choudhary, Sandesh Manohar, Sunil Salunkhe
899-904
67 Transfer of Malware and Prevention Technique via Ultrasonic
M. Kailesh, J. Godwin Ponsam
905-909
68 WIRELESS OSCILLOSCOPE USING ZIGBEE MODULE IN MATLAB
Mithila Jaybhaye,Dipeshkumar Pokar,Priyanka K.Katkar, Prof. A.A.Trikolikar
910-913
69 Achieving Minimum Transmitting and Caching Memory Cost On Data Staging Algorithm In Cloud
Prof.Sanchika Bajpai,Sujata Yadav,Reshma Ruke, Trupti Mahadik
914-916
70 Inpainting on Static Object of Video and Maintaining Spatial Secular Stability
Prof. R. K. Sarawale, Nitin L. Tajane, Ashwini R. Makhare, Neha R. Reddy
917-920
71 Quality of Service for Video Streaming over Wireless Networks in Mobile Phone
Udhayakumar M, Suganthi P
921-924
72 Prediction of Charisma and Temperament of a Person by Prospecting Their Social Network Activities
D.Saranya, V.Priyanga Jaanagi, S.Harini, K.Janani
925-928
73 Accurate Emotion Detection of Digital Images Using Bezier Curves
C.Karuna Sharma, T.Aswini, A.Vinodhini, V.Selvi
929-933
74 Pixel as Graphical Password for Security Primitive
M.Pradeep, S.Karthikeyan, M.Seshadri, K.Karuppaiya, B.Karthikeyan
934-937
75 Integrated Services With Smart Home Control Systems Applications
Ahmed Nabih Zaki Rashed, Ayman A.Kotb, Osama M. I. Elshazly, Ahmed B. Ali, Ibrahim A. S. M. Khattab, Mohamed A. Elsayed, Mohey Z.Ramadan, and Angham Z.Kandel
938-942
76 DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEM
Mrs. S.Anusha, Saranya G, Sowmya S
943-949
77 An Emperical Study for E-voting System
Ashish Pedgulwar, Manjiri Nigade, Pranav Rajhans, Asst. Prof. Shweta Joshi
950-952
78 A Survey on Cryptographic Security over Cloud
Er. Lalit Gehlod,Govind Patidar
953-957
79 A SURVEY ON PREVENTING DDOS ATTACK IN CLOUD ENVIRONMENT
Karthik Sekaran, Karunakaran G, Charanya R
958-961
80 INTERIOUR DESIGN USING AUGMENTED REALITY
Miss. Arti Yadav, Miss. Taslim Shaikh,Mr. Abdul Samad Hujare,Prof. Murkute P.K.
962-966
81 ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS
Durga Prasad JKS
967-975
82 VHDL IMPLEMENTATION OF NEURAL RECORDING SYSTEM WITH UWB TELEMETRY
VIJAYAKUMAR.P, Mrs. ANANTHA LAKSHMI.A.V
976-980
83 MOBILE PHONE CONTROLLED ALIVE HUMAN DETECTOR USING ROBOTICS
M.BREM KUMAR, D.MANIKANDAN, M.GOWDEM, D.BALASUBRAMANIAN
981-984
84 ENERGY HARVESTING FROM RF SIGNAL
Yogesh Bhole , Sagar Chaugule, Bhavesh Damankar,Vaibhav Yadav
985-989
85 Coin Based Mobile Charger Using Solar Panel, RFID
Raju R. Khawse, Sachin S. Shikare , Pradip Suryawanshi, Prof. A. A. Trikolikar
990-992
86 A Survey Paper For Finding Frequent Pattern In Text Mining
Ms. Sonam Tripathi , Asst Prof. Tripti Sharma
993-997
87 An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs
I. Meenatchi , K. Palanivel
998-1004
88 A Survey on Various Techniques for Generating Image Steganography with Improved Efficiency
Ms. Neha Shrivastava, Assistant Prof. Mr. Toran Verma
1005-1009
89 An Image Watermarking Using hybridization of DWT, CZT and modified SVD
Ishpreet Kaur, Astt. Prof. Amandeep Mavi
1010-1013
90 Analysis of Vulnerabilities in the Protocols used in SCADA Systems
Krushna Chandra Mahapatra, S.Magesh
1014-1019
91 ANDROID DASHBOARD AND SMART VEHICLE MANAGEMENT
Mr.Saurav V. Malpani Ms.Aishwarya D. Deshmukh Ms.Gitanjali S. Sakore Prof.Mrs.S.K.Bhatia
1020-1022
92 Beamforming Smart Antenna LCMV & MVDR Algorithm
Swapnil Waghmare, Nilsagar Gotarne, Rohan Botre, Prof.K.G. Maske
1023-1026
93 Communication of Multifarious Devices through Internet of Things and their Organization
Sharat Sharma S, B R Prasad Babu
1027-1033
94 Predicate Encryption in decentralized Architecture For Security Enhancement in current DOSN
Mr.GaneshPotle,Mr.PremGaykar,Mr.ImranMujawar,Prof.Patil S.S.
1034-1040
95 AN EFFICIENT ANALYSIS FOR COMPETITIVE ALGORITHM TO FIND BEST CLUSTERS
Miss Dhanshree Hadawale, Miss Prajakta Mande, Miss Sushama Patil
1041-1045
96 Basic Medical Image Fusion Methods
Medha Balachandra Mule,Padmavathi N.B.
1046-1049
97 A Survey on Energy Conservation in Wireless Sensor Network with Genetic Algorithm
Harpreet Kaur, Dr.Rohit Bajaj
1050-1053
98 REAL TI ME BUS AVAILABILITY SYSTEM
Tejas N A, Younus Zain, Mrs.Panimozhi K
1054-1061
99 SECURE BANKING SYSTEM USING ANDROID APPLICATION
Akash M.Bhalerao, Abhijeet P.Pandhare, Akash H.Bhogade, Amit C.Mane
1062-1064
100 Data mining and Security in Big data
Muni raj Choopa
1065-1069
101 Denoising EEG Signal Using Wavelet Transform
R. PRINCY, P. THAMARAI, B.KARTHIK
1070-1074
102 An Android Application for Parking Management and Dissemination System
Shinde Smita N., Shinde Komal V., Nagpure Rashmila D. , Tupkar Avanti S., Prof. Ankoshe M. S.
1075-1080
103 Natural Language (English) To MongoDB Interface
Mahesh D. Gadekar, Bhagwan M. Jadhav, Ansar S. Shaikh, Raju B. Kokare
1081-1083