Volume 4 Issue 4 April 2015

Volume 4 Issue 4 April 2015

S.No. Title and Authors of Paper Page.No.
1 LFSR operated fault detection enabled 4 bit ALU using Ad-hoc process in Complex Programmable Logic Device
Abhishek Singh, Mohd. Arif, Kanchan Gupta, Deepali Ketle
1084-1089
2 Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
V.S.Chaudhari, Prof.P.N.Matte, Prof. V.P.Bhope
1090-1094
3 Use Of Ontology And Web Usage Mining For Web-Page Recommendation
NazneenTarannum S.H. Rizvi, Prof. Ranjit R. Keole
1095-1099
4 Optical Interference Filters Transmission Performance Efficiency Under Temperature Variations Effects
Ahmed Nabih Zaki Rashed, Abd El-Naser A. Mohamed, and Abdo Said Abdo
1100-1108
5 SEP Performance analysis of GMSK over Rayleigh, Rician and Nakagami-m Fading Environment Using MGF Approach
Pooja Seth
1109-1113
6 Implementation of Online ERP System for Educational Institutes
Prof. S. B. Chaudhari, Ms. Sonu.A.Mathurawala, Mr. Siddesh.P.Tupe,Ms. Priyanka.R.Dake, Mr. Omkar.R.Dake
1114-1116
7 A Comparison of Algorithms used to measure the Similarity between two documents
Khuat Thanh Tung, Nguyen Duc Hung, Le Thi My Hanh
1117-1121
8 Opinion mining for reputation evaluation on unstructured Big Data
Mrs. Uma Gurav, Prof. Dr. Nandini sidnal
1122-1130
9 A Survey on:Hybrid semantic model for content based image retrieval
Asst Professor Lalit Gehlod, Aman Chouhan, Mr. Jitendra Soni
1131-1134
10 Digital Watermarking: A survey on image watermarking in Frequency Domain using Genetic Algorithm
Vagesh Porwal, Siddharth Gupta
1135-1145
11 Time Rules for NTFS File System for Digital Investigation
Tejpal Sharma, Manjot Kaur
1146-1151
12 The Design and Implementation of Handheld Multipurpose Scope Using Bluetooth IOIO Board
Ms. Komal B. Umare, Dr. D. V. Padole
1152-1155
13 Data Aggregation Framework for Clustered Sensor Networks Using Multi Layer Perceptron Neural Network
Hevin Rajesh. D, Paramasivan. B
1156-1160
14 Cluster Based Secure Data Aggregation Using Simulated Annealing Approach
Hevin Rajesh. D, Paramasivan. B
1161-1164
15 Automated test data generation using soft computing techniques
Deepa Chauhan, Akanksha Sehgal
1165-1169
16 A Comparative Study & Analysis of Random Waypoint and Reference Point Group Mobility Model in Ad-hoc networks
Ishu Sukhija, Dinesh Kumar
1170-1172
17 A Survey On Weighted Sentiment Analysis using Artificial Bee Colony Algorithm

Ms. Ruby Dhurve, Asst Prof. Megha Seth
1173-1178
18 A Survey: Routing Protocols In Mobile Ad hoc Networks
Mr. Ankit Agrawal, Asst. Prof. Rajender Singh Yadav
1179-1181
19 A SURVEY OF SPATIOTEMPORAL DATA COMPRESSION IN WIRELESS SENSOR NETWORKS
N.Boopal, Dr. S. Gunasekaran, V.Alamelu mangai
1182-1185
20 Energy aware issues of routing protocols in Mobile Ad hoc Network
Nirnimesh Kumar Singh,Rakesh Ranjan
1186-1190
21 Secured file storage and retrieval in cloud using cryptography with secret key
K.Kanagalakshmi, T.Sumathi
1191-1199
22 Result Evaluation of Twice Precaution during Transmission of hidden data using RC4 algorithm
Amrapali Bhandare, Dinesh Patil, Rahul Shete
1200-1204
23 DESIGN OF LOW POWER L1 CACHE FOR EMBEDDED PROCESSOR
T.Nathiya, Mr.R.Kandasamy
1205-1208
24 Secure Server Verification
Shweta Umredkar, Snehal Badhe, Hemali kondhekar
1209-1212
25 A GSM BASED SECURITY DEVICE FOR WOMEN WORKING LATE NIGHT
RAMYA R,HARI PRASHANTH.D, USHA M
1213-1219
26 Vehicle Tracking System using GPS and Android OS
Amol Dhumal, Amol Naikoji, Yutika Patwa, Manali Shilimkar, Prof. M. K. Nighot
1220-1224
27 Data Path Design using FPGA
ShivashankarTonape, Shradha Joshi
1225-1229
28 UP-Growth: An Efficient Algorithm for Mining High Utility Itemsets from Transactional Databases
Goura A Koti, Prof. J.Nagesh Babu
1230-1235
29 A Strategy for Optimal Placement of Virtual Machines in IAAS Clouds
Rajalakshmi Shenbaga Moorthy
1236-1240
30 HUMAN COMPUTER INTERACTION BASED ON HAND GESTURE USING RGB-D CAMERA
Rajesh T , Gowri Saranya S
1241-1247
31 Ehco-cancellaton using General Kalman filter and comparison between GKF,APA and NLMS
Mr. Rahul R. Hattarki, Prof. P. D. Bahirgonde
1248-1251
32 Soft Synchronizing Control of a Wind Microgrid
Ms. Priya Gurjar
1252-1256
33 Child Tracking System using Android phones
Maghade Satish, Chavhan Nandlal, Gore Sandip
1257-1260
34 Image Visual Cryptography By Using Haar Wavelet Based Decomposition
Ms. Pradnya S. Nagdive, Prof. Anjali B. Raut
1261-1265
35 Integrate the Components with the Help of Glue Code Using .Net And Java Platform
ManbirKaur, Er.Prabhdeep Singh
1266-1270
36 Controlling the dedicated camera using subscriber identity module (SIM) through mobile
Veerendhra Prasadreddy Kalubhavi
1271-1273
37 Face Recognition Using YCbCr and CIElab Skin Color Segmentation Methods:A Review
Gurveen Kaur, Paramjeet Kaur
1274-1276
38 Empirical Performance Evaluation Methodology and its Application to Page Segmentation Algorithms: A Review
Pinky Gather, Avininder Singh
1277-1279
39 REVIEW PAPER: A NOVEL TECHNIQUE FOR OPTIMZED ROUTING IN WIRELESS BODY AREA NETWORK USING GENETIC ALGORITHM
MS. REVA KACHROO
1280-1285
40 Built in Self Diagnosis for Logic Blocks in Application Specific FPGA
Kavya V
1286-1288
41 A REVIEW ON DEVELOPMENT OF LabVIEW BASED REMOTE MONITORING SYSTEM
Ms. Shital Patil,Dr. D. V. Padole
1289-1291
42 CONTENT BASED IMAGE RETRIEVAL WITH HASH CODES
MAITHIILI.K, ELAKKIYA.P, GAYATHRI.G, SANGEETHA.A
1292-1295
43 Virtual Classroom in PHP
Mayuri Mohod, Farah Iqbal, Juhi Katariya, Shruti Katkar
1296-1304
44 Design of a Power efficient Reversible Adder/Subtractor
Harpreet Singh, Chakshu Goel
1305-1308
45 Design of reversible MAC unit, shift and add multiplier using PSDRM technique
Sasikala.R,Tamilarasi.C, Vimaladevi.R
1309-1316
46 Optimization of Bandwidth by Implementing Effective Routing in a Node Mobility Aware ZigBee Cluster Tree Network
M.Iswarya , P.Muthu Priya, A.Alan Selva Denis, Mr.S. Franco Varun Richo.
1317-1321
47 Security in Wireless Sensor Network
Pritesh Patel, Nikhil Lende
1322-1325
48 Two-step authentication with data de-duplication in Cloud
Manohar Vasantrao Rathod, Prof.S.G.Vaidya
1326-1330
49 Fetching data from an Incognito window for the purpose of Bigdata processing
Dinesh Govindaraji, Prof. Tarik El Taeib
1331-1333
50 “Tap-&-Pay” A Universal Transport Billing System Using RFID Smart Card
Rohit Bisht, Ganesh R. Kalal, Mayur N. Tikar, Govind P. Yatnalkar
1334-1341
51 A JPEG-Discrete Cosine Transformation Based Coding Technique for Image Data
A L Choodarathnakara
1342-1348
52 Digital FIR–LP Filter using Window Functions
A L Choodarathnakara
1349-1356
53 Analysis of Trail Algorithms for User Search Behavior
Surabhi S. Golechha, Prof. R.R. Keole
1357-1361
54 SECURE DEDUPLICATION SCHEME FOR CLOUD STORAGE
Swapnil Patil,Mr.K.Venkatesh
1362-1366
55 Mobile Data Offloading Techniques and Related Issues
Ashwini R Pawar, S.S. Bhardwaj,Sachin N. Wandre
1367-1371
56 Association Rule Generation using Attribute Information Gain and Correlation Analysis for Classification
L Kiran Kumar Reddy,Dr.S.Phani Kumar
1372-1377
57 DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT
Prashant P Chavan,Vikas G Aher,Ronak V Patil,Sneha R Gadekar
1378-1381
58 Quantum Cost efficient Reversible Multiplier
Mandeep Kaur, Chakshu Goel
1382-1386
59 A Comparative Study of Multiplicative Data Perturbation Techniques for Privacy Preserving Data Mining
Bhupendra Kumar Pandya,Umesh kumar Singh,Keerti Dixit
1387-1393
60 LOW POWER MODELING OF HIGH SPEED CAM WITH CONTROLLED SENSING DELAY
S SALMAN, KUPPAM N CHANDRA SEKHAR, R MALLIKARJUNA REDDY
1394-1397
61 BUSINESS MODEL FOR CLOUD COMPUTING USING RSA & AES ALGORITHM
Prachi Bhagat, Asmita Dhamale, Ishita Saraf , Madhuri Thorat
1398-1402
62 Securing an Graphical Password by multiple questions and random codes
Ms. Dhanshri Agashe, Prof. A.R Raipurkar
1403-1406
63 A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks
Neeti Yadav
1407-1411
64 UNL Enconversion framework for Machine Translation
Athira.K
1412-1417
65 HIDING A HIGH FRACTION OF LOCATION PRIVACY THROUGH NOVELEPIDEMIC MODEL
Rajeshwari S, DR. B. R. Prasad Babu, DR. K. Prasada Rao
1418-1422
66 Integrated PSO-SQP technique for Short-term Hydrothermal Scheduling
Shashank Gupta, Nitin Narang
1423-1428
67 A Detail Comprehensive Review on IPv4-to-IPv6 Transition and Co-Existence Strategies
Priya Bali
1429-1432
68 An Empirical Study and Impact of Software Quality in Software Development
Zuhab Gafoor Dand
1433-1439
69 Triangle Area Method Based Multivariate Correlation Analysis to Detect Denial of Service Attack using Packet Marking Trace Back
K.Sujithra, V.Vinoth Kumar
1440-1447
70 HMM Based Online Signature Verification
Toai Q.Ton, Tai Nhu Do
1448-1451
71 Mitigation of Peak to Average Power Ratio with Modified PTS Multiple Signaling Probabilistic Technique in OFDM System
Yamuna.P, Ramassamy.E, Sridevi.V
1452-1455
72 Person identification for security system using Iris biometric technique
Harshada Terkhedkar, Prof. Dr. S. L. Lahudkar
1456-1458
73 Cloud Computing Security: From Single Cloud to Multi-Clouds using Digital Signature
Sayali S. Satav,Ganesh Prajapati,Sonali Dahiphale,Sadhana More,Prof.N Bogiri
1459-1464
74 A Survey on Keylogger: A malicious Attack
Hemita Pathak, Apurva Pawar, Balaji Patil
1465-1469
75 Design & Simulation of Rectangular Shaped Patch Antenna Used for ISM band using HFSS
Minhaz G. Vayada, Mohammed G. Vayada, Arti Patel
1470-1474
76 Artificial Bee colony and its Application: An Overview
Abdul Wahid, Subhra Chandan Behera, Debasish Mohapatra
1475-1480
78 Performance Analysis of OLSR and DSR Routing Protocols for Static Wireless Sensor Networks (WSN)
Shivani Attri
1485-1491
79 A Survey: Compressing of the Data Packet using Protocols in Wireless Sensor Network
Sandeep M Gundale
1492-1498
80 CV WIZARD
Adey Snehal, Belhekar Pratik, Bharsakal Tanaji, Jagtap Gauri, Khandelwal Meerakumari, Sawant Akash
1499-1502
81 Forecasting Electrical Load for Home Appliances using Genetic Algorithm based Back Propagation Neural Network
Gaurang Panchal, Devyani Panchal
1503-1506
82 Hybridization of Genetic Algorithm and Neural Network for Optimization Problem
Gaurang Panchal, Devyani Panchal
1507-1511
83 Scheduling, Controlling And Monitoring of Agricultural Devices Using Android Application
Mukesh Choudhary, Sumeet Dhone, Akshay Jadhav, Chetan Dhandal, Prof. J. M. Nighot
1512-1515
84 A Scheme for Source Message Authentication
Manasa K, Lata S H
1516-1519
85 A literature Review on Android Permission System
Ahmed Ben Ayed
1520-1523
86 Secure Access Policy Generation For Complex Event Handling System
Sharad Handibag , Sandesh Ugale, Shafik Shaikh
1524-1529
87 A User View Specification Approach for Test Case Prioritization
Ritu,Tulika Das
1530-1533
88 VARIOUS TCP OPTIONS FOR CONGESTION EVASION
Ravi Kamboj , Gurpreet Singh
1534-1539
89 Face Recognition Techniques: A Survey for Forensic Applications
Ritika Lohiya, Pooja Shah
1540-1546
90 A Detail Review on Multiprotocol Label Switching (MPLS)
Nisha Chauhan, Vivek Kumar
1547-1551
91 A Comprehensive Survey on Voice over Internet Protocol (VoIP)
Tripti Raheja, Deepkiran Munjal
1552-1557
92 Enhancing Brand Visibility by Identifying Influencers
Mr. Anmol Jain, Mr. Bhavya Sanghavi, Mr. Rishabh Rathod, Prof. Khushali Deulkar
1558-1560
93 DATA OBSCURITY IN DEVICES DURING SECURED WIRELESS COMMUNICATION
Mr. Rishabh Mishra, Dr. Rakesh Sharma
1561-1567
94 Design of an optimized multiplication technique by using ColumnBypass Multiplier
Thara Rajendra Rao, Dipal Patel
1568-1570
95 VHDL implementation for design of an I2C Interface for Temperature Sensor and an EEPROM Memory
Vidya Venkatesh , Deepthi Dayanand, Shri Kanhu Charan Padhy
1571-1575
96 VHDL Implementation of TMDS encoder for the transmission of video signals in serial communication
Supreetha Rao, Kiran Kumar V.G, Kanhu Charan Padhy
1576-1579
97 VHDL Implementation of an SPI Interface for an FRAM Memory over FPGA
Prajna, Mrs. Deepthi Dayanand , Shri Kanhu Charan Padhy
1580-1583
98 Review of Different Automatic Evaluation of Clusters Based on a Cluster Validation Indexes
S. A. Magdum, H. A. Tirmare
1584-1587
99 MODELING OF INTERFACE FOR FPGA AND EXTERNAL SRAM USING VHDL
Supreetha M, Kiran Kumar V.G, Kanhu Charan Padhy
1588-1590
100 A Survey on K-means clustering algorithm for initialisation of centroid

Swati Nenava, Prof. Manoj Chouhan
1591-1597
101 Mobile Quiz through Wi-Fi on Android Platform
B. Lakshmi, V. Sai Durga, K. Anji Reddy
1598-1601
102 Image Identification in Android Applications aiding visually impaired users
Mrs. Minal Nerkar, Shweta Samangadkar, Kajal Lohar, Vijay Biswas
1602-1606
103 A Comparative Performance Analysis of AODV and DSR Routing Protocols for Vehicular Ad-hoc Networks (VANETs)
Sheetal Goyal
1607-1613
104 Big data: Extracting Value from Big data
Suman R. Tiwari
1614-1616
105 Dynamic Approach for Measuring Internal Attributes of Object-Oriented System
Amar Pal Yadav, C. S. Yadav
1617-1622
106 Comparative Analysis for Traditional and Object- Oriented Approach using COCOMO-II Model for Cost Estimation
Amar Pal Yadav, C. S. Yadav, Ram Kumar Sharma
1623-1628
107 Recent trends in VLSI Design Applications
Kanhu Charan Padhy,Ms. Supreetha Rao,Ms. Supreetha M,Ms. Prajna,Ms.Vidya
1629-1632
108 A General Review of Face Hallucination Methods
Sudhir Kumar,VikramMutneja
1633-1639
109 An Improved Type-1 Fuzzy Logic Method for Edge Detection
Dharampal,VikramMutneja
1640-1644
110 A low-power and high-speed Wallace 10×10 Multiplier based on 4-2 Compressors
K.S.Chakradhar,D.Nataraj
1645-1648
111 Coal Conveyor Belt Fault Detection and Control in Thermal power plant using PLC and SCADA
R.Keerthika, M.Jagadeeswari
1649-1652
112 PLC & SCADA Based Effective Boiler Automation System for Thermal Power Plant
S.Kalaivani, M.Jagadeeswari
1653-1657
113 Speech Signal Analysis using FFT and LPC
Lalima Singh
1658-1660
114 A Study of Effective Segmentation Techniques for Liver Segmentation
Ina Singh
1661-1666
115 REVIEW OF REMOTE SENSING IMAGE SEGMENTATION TECHNIQUES
Harmanpreet Kaur
1667-1674
116 Study of various effective optimization techniques for lung classification
Tejinder Kaur
1675-1679
117 Demystifying the Inward FPGA Communication Stack of USRP
Vandana D. Parmar, Bhavika A. Vithalpara, Sudhir Agrawal
1680-1685
118 To implement resistance measurement techniques using DC bridge circuits (Wheatstone and Kelvin double bridge) on National Instruments ELVIS-II workstation
Sukhraj Singh, Neeraj Kumar, Amit Monga
1686-1690