S.No. |
Title and Authors of Paper |
Page.No. |
1 |
LFSR operated fault detection enabled 4 bit ALU using Ad-hoc process in Complex Programmable Logic Device
Abhishek Singh, Mohd. Arif, Kanchan Gupta, Deepali Ketle |
1084-1089 |
2 |
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
V.S.Chaudhari, Prof.P.N.Matte, Prof. V.P.Bhope |
1090-1094 |
3 |
Use Of Ontology And Web Usage Mining For Web-Page Recommendation
NazneenTarannum S.H. Rizvi, Prof. Ranjit R. Keole |
1095-1099 |
4 |
Optical Interference Filters Transmission Performance Efficiency Under Temperature Variations Effects
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, and Abdo Said Abdo |
1100-1108 |
5 |
SEP Performance analysis of GMSK over Rayleigh, Rician and Nakagami-m Fading Environment Using MGF Approach
Pooja Seth |
1109-1113 |
6 |
Implementation of Online ERP System for Educational Institutes
Prof. S. B. Chaudhari, Ms. Sonu.A.Mathurawala, Mr. Siddesh.P.Tupe,Ms. Priyanka.R.Dake, Mr. Omkar.R.Dake
|
1114-1116 |
7 |
A Comparison of Algorithms used to measure the Similarity between two documents
Khuat Thanh Tung, Nguyen Duc Hung, Le Thi My Hanh
|
1117-1121 |
8 |
Opinion mining for reputation evaluation on unstructured Big Data
Mrs. Uma Gurav, Prof. Dr. Nandini sidnal
|
1122-1130 |
9 |
A Survey on:Hybrid semantic model for content based image retrieval
Asst Professor Lalit Gehlod, Aman Chouhan, Mr. Jitendra Soni
|
1131-1134 |
10 |
Digital Watermarking: A survey on image watermarking in Frequency Domain using Genetic Algorithm
Vagesh Porwal, Siddharth Gupta
|
1135-1145 |
11 |
Time Rules for NTFS File System for Digital Investigation
Tejpal Sharma, Manjot Kaur
|
1146-1151 |
12 |
The Design and Implementation of Handheld Multipurpose Scope Using Bluetooth IOIO Board
Ms. Komal B. Umare, Dr. D. V. Padole
|
1152-1155 |
13 |
Data Aggregation Framework for Clustered Sensor Networks Using Multi Layer Perceptron Neural Network
Hevin Rajesh. D, Paramasivan. B
|
1156-1160 |
14 |
Cluster Based Secure Data Aggregation Using Simulated Annealing Approach
Hevin Rajesh. D, Paramasivan. B
|
1161-1164 |
15 |
Automated test data generation using soft computing techniques
Deepa Chauhan, Akanksha Sehgal
|
1165-1169 |
16 |
A Comparative Study & Analysis of Random Waypoint and Reference Point Group Mobility Model in Ad-hoc networks
Ishu Sukhija, Dinesh Kumar
|
1170-1172 |
17 |
A Survey On Weighted Sentiment Analysis using Artificial Bee Colony Algorithm
Ms. Ruby Dhurve, Asst Prof. Megha Seth
|
1173-1178 |
18 |
A Survey: Routing Protocols In Mobile Ad hoc Networks
Mr. Ankit Agrawal, Asst. Prof. Rajender Singh Yadav
|
1179-1181 |
19 |
A SURVEY OF SPATIOTEMPORAL DATA COMPRESSION IN WIRELESS SENSOR NETWORKS
N.Boopal, Dr. S. Gunasekaran, V.Alamelu mangai
|
1182-1185 |
20 |
Energy aware issues of routing protocols in Mobile Ad hoc Network
Nirnimesh Kumar Singh,Rakesh Ranjan
|
1186-1190 |
21 |
Secured file storage and retrieval in cloud using cryptography with secret key
K.Kanagalakshmi, T.Sumathi
|
1191-1199 |
22 |
Result Evaluation of Twice Precaution during Transmission of hidden data using RC4 algorithm
Amrapali Bhandare, Dinesh Patil, Rahul Shete
|
1200-1204 |
23 |
DESIGN OF LOW POWER L1 CACHE FOR EMBEDDED PROCESSOR
T.Nathiya, Mr.R.Kandasamy
|
1205-1208 |
24 |
Secure Server Verification
Shweta Umredkar, Snehal Badhe, Hemali kondhekar
|
1209-1212 |
25 |
A GSM BASED SECURITY DEVICE FOR WOMEN WORKING LATE NIGHT
RAMYA R,HARI PRASHANTH.D, USHA M
|
1213-1219 |
26 |
Vehicle Tracking System using GPS and Android OS
Amol Dhumal, Amol Naikoji, Yutika Patwa, Manali Shilimkar, Prof. M. K. Nighot
|
1220-1224 |
27 |
Data Path Design using FPGA
ShivashankarTonape, Shradha Joshi
|
1225-1229 |
28 |
UP-Growth: An Efficient Algorithm for Mining High Utility Itemsets from Transactional Databases
Goura A Koti, Prof. J.Nagesh Babu
|
1230-1235 |
29 |
A Strategy for Optimal Placement of Virtual Machines in IAAS Clouds
Rajalakshmi Shenbaga Moorthy
|
1236-1240 |
30 |
HUMAN COMPUTER INTERACTION BASED ON HAND GESTURE USING RGB-D CAMERA
Rajesh T , Gowri Saranya S
|
1241-1247 |
31 |
Ehco-cancellaton using General Kalman filter and comparison between GKF,APA and NLMS
Mr. Rahul R. Hattarki, Prof. P. D. Bahirgonde
|
1248-1251 |
32 |
Soft Synchronizing Control of a Wind Microgrid
Ms. Priya Gurjar
|
1252-1256 |
33 |
Child Tracking System using Android phones
Maghade Satish, Chavhan Nandlal, Gore Sandip
|
1257-1260 |
34 |
Image Visual Cryptography By Using Haar Wavelet Based Decomposition
Ms. Pradnya S. Nagdive, Prof. Anjali B. Raut
|
1261-1265 |
35 |
Integrate the Components with the Help of Glue Code Using .Net And Java Platform
ManbirKaur, Er.Prabhdeep Singh
|
1266-1270 |
36 |
Controlling the dedicated camera using subscriber identity module (SIM) through mobile
Veerendhra Prasadreddy Kalubhavi
|
1271-1273 |
37 |
Face Recognition Using YCbCr and CIElab Skin Color Segmentation Methods:A Review
Gurveen Kaur, Paramjeet Kaur
|
1274-1276 |
38 |
Empirical Performance Evaluation Methodology and its Application to Page Segmentation Algorithms: A Review
Pinky Gather, Avininder Singh
|
1277-1279 |
39 |
REVIEW PAPER: A NOVEL TECHNIQUE FOR OPTIMZED ROUTING IN WIRELESS BODY AREA NETWORK USING GENETIC ALGORITHM
MS. REVA KACHROO
|
1280-1285 |
40 |
Built in Self Diagnosis for Logic Blocks in Application Specific FPGA
Kavya V
|
1286-1288 |
41 |
A REVIEW ON DEVELOPMENT OF LabVIEW BASED REMOTE MONITORING SYSTEM
Ms. Shital Patil,Dr. D. V. Padole
|
1289-1291 |
42 |
CONTENT BASED IMAGE RETRIEVAL WITH HASH CODES
MAITHIILI.K, ELAKKIYA.P, GAYATHRI.G, SANGEETHA.A
|
1292-1295 |
43 |
Virtual Classroom in PHP
Mayuri Mohod, Farah Iqbal, Juhi Katariya, Shruti Katkar
|
1296-1304 |
44 |
Design of a Power efficient Reversible Adder/Subtractor
Harpreet Singh, Chakshu Goel
|
1305-1308 |
45 |
Design of reversible MAC unit, shift and add multiplier using PSDRM technique
Sasikala.R,Tamilarasi.C, Vimaladevi.R
|
1309-1316 |
46 |
Optimization of Bandwidth by Implementing Effective Routing in a Node Mobility Aware ZigBee Cluster Tree Network
M.Iswarya , P.Muthu Priya, A.Alan Selva Denis, Mr.S. Franco Varun Richo.
|
1317-1321 |
47 |
Security in Wireless Sensor Network
Pritesh Patel, Nikhil Lende
|
1322-1325 |
48 |
Two-step authentication with data de-duplication in Cloud
Manohar Vasantrao Rathod, Prof.S.G.Vaidya
|
1326-1330 |
49 |
Fetching data from an Incognito window for the purpose of Bigdata processing
Dinesh Govindaraji, Prof. Tarik El Taeib
|
1331-1333 |
50 |
“Tap-&-Pay” A Universal Transport Billing System Using RFID Smart Card
Rohit Bisht, Ganesh R. Kalal, Mayur N. Tikar, Govind P. Yatnalkar
|
1334-1341 |
51 |
A JPEG-Discrete Cosine Transformation Based Coding Technique for Image Data
A L Choodarathnakara
|
1342-1348 |
52 |
Digital FIR–LP Filter using Window Functions
A L Choodarathnakara
|
1349-1356 |
53 |
Analysis of Trail Algorithms for User Search Behavior
Surabhi S. Golechha, Prof. R.R. Keole
|
1357-1361 |
54 |
SECURE DEDUPLICATION SCHEME FOR CLOUD STORAGE
Swapnil Patil,Mr.K.Venkatesh
|
1362-1366 |
55 |
Mobile Data Offloading Techniques and Related Issues
Ashwini R Pawar, S.S. Bhardwaj,Sachin N. Wandre
|
1367-1371 |
56 |
Association Rule Generation using Attribute Information Gain and Correlation Analysis for Classification
L Kiran Kumar Reddy,Dr.S.Phani Kumar |
1372-1377 |
57 |
DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT
Prashant P Chavan,Vikas G Aher,Ronak V Patil,Sneha R Gadekar |
1378-1381 |
58 |
Quantum Cost efficient Reversible Multiplier
Mandeep Kaur, Chakshu Goel |
1382-1386 |
59 |
A Comparative Study of Multiplicative Data Perturbation Techniques for Privacy Preserving Data Mining
Bhupendra Kumar Pandya,Umesh kumar Singh,Keerti Dixit |
1387-1393 |
60 |
LOW POWER MODELING OF HIGH SPEED CAM WITH CONTROLLED SENSING DELAY
S SALMAN, KUPPAM N CHANDRA SEKHAR, R MALLIKARJUNA REDDY |
1394-1397 |
61 |
BUSINESS MODEL FOR CLOUD COMPUTING USING RSA & AES ALGORITHM
Prachi Bhagat, Asmita Dhamale, Ishita Saraf , Madhuri Thorat |
1398-1402 |
62 |
Securing an Graphical Password by multiple questions and random codes
Ms. Dhanshri Agashe, Prof. A.R Raipurkar |
1403-1406 |
63 |
A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks
Neeti Yadav |
1407-1411 |
64 |
UNL Enconversion framework for Machine Translation
Athira.K |
1412-1417 |
65 |
HIDING A HIGH FRACTION OF LOCATION PRIVACY THROUGH NOVELEPIDEMIC MODEL
Rajeshwari S, DR. B. R. Prasad Babu, DR. K. Prasada Rao |
1418-1422 |
66 |
Integrated PSO-SQP technique for Short-term Hydrothermal Scheduling
Shashank Gupta, Nitin Narang |
1423-1428 |
67 |
A Detail Comprehensive Review on IPv4-to-IPv6 Transition and Co-Existence Strategies
Priya Bali |
1429-1432 |
68 |
An Empirical Study and Impact of Software Quality in Software Development
Zuhab Gafoor Dand |
1433-1439 |
69 |
Triangle Area Method Based Multivariate Correlation Analysis to Detect Denial of Service Attack using Packet Marking Trace Back
K.Sujithra, V.Vinoth Kumar |
1440-1447 |
70 |
HMM Based Online Signature Verification
Toai Q.Ton, Tai Nhu Do |
1448-1451 |
71 |
Mitigation of Peak to Average Power Ratio with Modified PTS Multiple Signaling Probabilistic Technique in OFDM System
Yamuna.P, Ramassamy.E, Sridevi.V |
1452-1455 |
72 |
Person identification for security system using Iris biometric technique
Harshada Terkhedkar, Prof. Dr. S. L. Lahudkar |
1456-1458 |
73 |
Cloud Computing Security: From Single Cloud to Multi-Clouds using Digital Signature
Sayali S. Satav,Ganesh Prajapati,Sonali Dahiphale,Sadhana More,Prof.N Bogiri |
1459-1464 |
74 |
A Survey on Keylogger: A malicious Attack
Hemita Pathak, Apurva Pawar, Balaji Patil |
1465-1469 |
75 |
Design & Simulation of Rectangular Shaped Patch Antenna Used for ISM band using HFSS
Minhaz G. Vayada, Mohammed G. Vayada, Arti Patel |
1470-1474 |
76 |
Artificial Bee colony and its Application: An Overview
Abdul Wahid, Subhra Chandan Behera, Debasish Mohapatra |
1475-1480 |
78 |
Performance Analysis of OLSR and DSR Routing Protocols for Static Wireless Sensor Networks (WSN)
Shivani Attri |
1485-1491 |
79 |
A Survey: Compressing of the Data Packet using Protocols in Wireless Sensor Network
Sandeep M Gundale |
1492-1498 |
80 |
CV WIZARD
Adey Snehal, Belhekar Pratik, Bharsakal Tanaji, Jagtap Gauri, Khandelwal Meerakumari, Sawant Akash |
1499-1502 |
81 |
Forecasting Electrical Load for Home Appliances using Genetic Algorithm based Back Propagation Neural Network
Gaurang Panchal, Devyani Panchal |
1503-1506 |
82 |
Hybridization of Genetic Algorithm and Neural Network for Optimization Problem
Gaurang Panchal, Devyani Panchal |
1507-1511 |
83 |
Scheduling, Controlling And Monitoring of Agricultural Devices Using Android Application
Mukesh Choudhary, Sumeet Dhone, Akshay Jadhav, Chetan Dhandal, Prof. J. M. Nighot |
1512-1515 |
84 |
A Scheme for Source Message Authentication
Manasa K, Lata S H |
1516-1519 |
85 |
A literature Review on Android Permission System
Ahmed Ben Ayed |
1520-1523 |
86 |
Secure Access Policy Generation For Complex Event Handling System
Sharad Handibag , Sandesh Ugale, Shafik Shaikh |
1524-1529 |
87 |
A User View Specification Approach for Test Case Prioritization
Ritu,Tulika Das |
1530-1533 |
88 |
VARIOUS TCP OPTIONS FOR CONGESTION EVASION
Ravi Kamboj , Gurpreet Singh |
1534-1539 |
89 |
Face Recognition Techniques: A Survey for Forensic Applications
Ritika Lohiya, Pooja Shah |
1540-1546 |
90 |
A Detail Review on Multiprotocol Label Switching (MPLS)
Nisha Chauhan, Vivek Kumar |
1547-1551 |
91 |
A Comprehensive Survey on Voice over Internet Protocol (VoIP)
Tripti Raheja, Deepkiran Munjal |
1552-1557 |
92 |
Enhancing Brand Visibility by Identifying Influencers
Mr. Anmol Jain, Mr. Bhavya Sanghavi, Mr. Rishabh Rathod, Prof. Khushali Deulkar |
1558-1560 |
93 |
DATA OBSCURITY IN DEVICES DURING SECURED WIRELESS COMMUNICATION
Mr. Rishabh Mishra, Dr. Rakesh Sharma |
1561-1567 |
94 |
Design of an optimized multiplication technique by using ColumnBypass Multiplier
Thara Rajendra Rao, Dipal Patel |
1568-1570 |
95 |
VHDL implementation for design of an I2C Interface for Temperature Sensor and an EEPROM Memory
Vidya Venkatesh , Deepthi Dayanand, Shri Kanhu Charan Padhy |
1571-1575 |
96 |
VHDL Implementation of TMDS encoder for the transmission of video signals in serial communication
Supreetha Rao, Kiran Kumar V.G, Kanhu Charan Padhy |
1576-1579 |
97 |
VHDL Implementation of an SPI Interface for an FRAM Memory over FPGA
Prajna, Mrs. Deepthi Dayanand , Shri Kanhu Charan Padhy |
1580-1583 |
98 |
Review of Different Automatic Evaluation of Clusters Based on a Cluster Validation Indexes
S. A. Magdum, H. A. Tirmare |
1584-1587 |
99 |
MODELING OF INTERFACE FOR FPGA AND EXTERNAL SRAM USING VHDL
Supreetha M, Kiran Kumar V.G, Kanhu Charan Padhy |
1588-1590 |
100 |
A Survey on K-means clustering algorithm for initialisation of centroid
Swati Nenava, Prof. Manoj Chouhan |
1591-1597 |
101 |
Mobile Quiz through Wi-Fi on Android Platform
B. Lakshmi, V. Sai Durga, K. Anji Reddy |
1598-1601 |
102 |
Image Identification in Android Applications aiding visually impaired users
Mrs. Minal Nerkar, Shweta Samangadkar, Kajal Lohar, Vijay Biswas |
1602-1606 |
103 |
A Comparative Performance Analysis of AODV and DSR Routing Protocols for Vehicular Ad-hoc Networks (VANETs)
Sheetal Goyal |
1607-1613 |
104 |
Big data: Extracting Value from Big data
Suman R. Tiwari |
1614-1616 |
105 |
Dynamic Approach for Measuring Internal Attributes of Object-Oriented System
Amar Pal Yadav, C. S. Yadav |
1617-1622 |
106 |
Comparative Analysis for Traditional and Object- Oriented Approach using COCOMO-II Model for Cost Estimation
Amar Pal Yadav, C. S. Yadav, Ram Kumar Sharma |
1623-1628 |
107 |
Recent trends in VLSI Design Applications
Kanhu Charan Padhy,Ms. Supreetha Rao,Ms. Supreetha M,Ms. Prajna,Ms.Vidya |
1629-1632 |
108 |
A General Review of Face Hallucination Methods
Sudhir Kumar,VikramMutneja |
1633-1639 |
109 |
An Improved Type-1 Fuzzy Logic Method for Edge Detection
Dharampal,VikramMutneja |
1640-1644 |
110 |
A low-power and high-speed Wallace 10×10 Multiplier based on 4-2 Compressors
K.S.Chakradhar,D.Nataraj |
1645-1648 |
111 |
Coal Conveyor Belt Fault Detection and Control in Thermal power plant using PLC and SCADA
R.Keerthika, M.Jagadeeswari |
1649-1652 |
112 |
PLC & SCADA Based Effective Boiler Automation System for Thermal Power Plant
S.Kalaivani, M.Jagadeeswari |
1653-1657 |
113 |
Speech Signal Analysis using FFT and LPC
Lalima Singh |
1658-1660 |
114 |
A Study of Effective Segmentation Techniques for Liver Segmentation
Ina Singh |
1661-1666 |
115 |
REVIEW OF REMOTE SENSING IMAGE SEGMENTATION TECHNIQUES
Harmanpreet Kaur |
1667-1674 |
116 |
Study of various effective optimization techniques for lung classification
Tejinder Kaur |
1675-1679 |
117 |
Demystifying the Inward FPGA Communication Stack of USRP
Vandana D. Parmar, Bhavika A. Vithalpara, Sudhir Agrawal |
1680-1685 |
118 |
To implement resistance measurement techniques using DC bridge circuits (Wheatstone and Kelvin double bridge) on National Instruments ELVIS-II workstation
Sukhraj Singh, Neeraj Kumar, Amit Monga |
1686-1690 |