Volume 4 Issue 5 May 2015

Volume 4 Issue 5 May 2015

S.No. Title and Authors of Paper Page.No.
1 Comparative Analysis Study of Optical Intersatellite links for Different Both Transmission Bit Rates and Operating Wavelengths
Hamdy A. Sharshar, Eman Mohsen El-gammal
1691-1698
2 AN EFFICIENT SOURCE ROUTING PROTOCOLS IN MANET
Naveen Kumar.V.G, Mr. JAYA KUMAR.B.L, Dr. B. R. Prasad Babu
1699-1703
3 DIGITAL MEDICAL CARE WITH ITERATIVE AND PROBABILISTIC DISEASE PREDICTION
Aanchal Oswal, VachanaShetty, Mustafa Badshah, RohitPitre
1704-1709
4 Optimal Node Deployment for Fault Tolerant Wireless Sensor Networks: A Survey
Ms. Vishakha Dhiman, Dr. T.P. Sharma
1710-1717
5 Load Balancing with Optimal Cost Scheduling Algorithm
Lovepreet, Sahil Vashisht
1718-1720
6 IMAGE RETRIEVAL BY INFORMATION FU-SION OF MULTIMEDIA RESOURCES
Ms. Vaishali B. Khobragade, Mrs. Leena H. Patil, Mrs. Uma Patel
1721-1727
7 Formation of Association Rules on Hubness Using Data Mining
Vidisha H. Zodape, Prof. Leena H. Patil
1728-1734
8 Graph Representation of Vessel Tree and A/V Classification Method for AVR Calculation On Retinal Images
Minakshee K. Chandankhede, Prof. Leena H. Patil
1735-1740
9 An Improved Approach towards Image Watermarking Using Standard Watermarking Techniques
Ishpreet kaur, Astt. Prof. Amandeep Mavi
1741-1746
10 Comparative Study of SQL & NoSQL Databases
Supriya S. Pore, Swalaya B. Pawar
1747-1753
11 A Robust Face Annotation Method by Mining Facial Images
Ms. Malashree Patil, Prof. Jyoti Neginal
1754-1758
12 A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Image
Jyoti R H, Prof Jyoti Neginal
1759-1763
13 A New Approach to Merging Structured XML Files
Hung Dinh
1764-1767
14 AN EFFICIENT APPROACH OF SENSITIVE AREA WATERMARKING WITH ENCRYPTION SECURITY
Ankita Ojha,Tripti Saxena,Dr.Vineet Richariya
1768-1774
15 Security, Privacy and Trust for Smart Mobile devices in Internet of Things – A Literature Study
RafidhaRehiman K A, Dr. S.Veni
1775-1779
16 Comparative Study of segmentation techniques in Diabetic Retinopathy Detection
Praveen S Palegar, Dr K.S. Prabhushetty
1780-1783
17 Detection of Non Continguous Clones in Software using Program Slicing
Er. Richa Grover, Er. Narender Rana
1784-1789
18 Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach
Vaishali Mittal
1790-1795
19 Disaster Recovery in Cloud Computing
Mr.Akshay A. Gharat, Mr. Devendra E. Mhamunkar
1796-1801
20 Wheel-Chair Control Using Accelerometer Based Gesture Technology
Sandeep, Supriya
1802-1806
21 Multi-Channel Image Compression Using JPEG-DCT with LAB Color Model
Mr Khomlal Sinha,Jyoti Gajendra
1807-1811
22 Design and Performance Analysis of Radio Over Fiber System: A Review
Nisha Sharma, Er. Robin Khurana
1812-1814
23 Coarse Wavelength Division Multiplexing Technology – A Review
Anamika Basnotra
1815-1817
24 Increasing Security in Click Based Graphical Password with Kerberos
Prof. Leena H. Patil, Prof. Uma Patel, Ms. Preeti Ramtekkar
1818-1824
25 CLUSTERING and LOCALIZATION ALGORITHM IN WIRELESS SENSOR NETWORK
Kapil Mangla , Pravanjana Das
1825-1828
26 TRACKING OF MOBILE USERS IN WIRELESS NETWORK
Farzana, Mohammad Umar
1829-1832
27 COMPARATIVE ANALYSIS OF DIFFERENT LNS DESIGN
Ujjayant Lamba , Mohammad Umar
1833-1837
28 An Improved User Browsing Behavior Prediction Using Web Log Analysis
Vedpriya Dongre, Jagdish Raikwal
1838-1842
29 Literature Review on Block Matching Motion Estimation Algorithms for Video Compression
Chandana Pandey, Deependra Pandey
1843-1847
30 Image Contrast Enhancement using Depth Image
Ashish B. Umredkar,Prof. Leena H. Patil
1848-1853
31 Online Signature Verification Using Dynamic Time Wrapping and Extended Regression
Toai Q.Ton, Tung Thanh Pham
1854-1857
32 Fuzzy Implementation of proposed hybrid algorithm using Topic Tilling & C99 for Text Segmentation
Mr. Mohit Lahori,Dr. Shaily Jain
1858-1862
33 Watermarking Technique For Protection in Tampering for High-Efficiency Live Video
Ms. Bhagyashri L. Gabhane, Mrs. L. H. Patil
1863-1868
34 Implementing GIS using a digital elevation model for MRVC railway project
Pranav Markande, Aniket More
1869-1874
35 Secure and Distributed Data Query In Intermittently Connected Passive Ad-Hoc Networks
Prof. Sridevi, Shruti
1875-1879
36 Analysis and Comparison of Performance Testing Tools
Dipika Kelkar, Kavita Kandalgaonkar
1880-1883
37 Neurofeedback as an Intervention for Brain Abilities Enhancement
Navjot Saini, Ravinder Agarwal
1884-1886
38 Attribute Based Revocable Data Access Control for Multi Authority Cloud Storage
Syeda Rabiya Basri, Rashmi K H
1887-1890
39 Intelligent Division for Change Detection in Multi-spectral Remote sensing Images
Megha.M.Patil, Mannikamma.Malipatil
1891-1896
40 Synthetic or Reconstructed Biometric Sample Detection for Real-Time Systems:Application to Face Recognition
Preeti R Dubey, Manikamma
1897-1902
41 Literature Review on Video Frame Segmentation for Position Control of Parabolic Solar Reflector Using MATLAB
Kirti Chaurasiya, Prof. Satish Kumar
1903-1908
42 A Survey on Vehicular Ad-hoc Networks (VANETs)
Mahendri, Neha Sawal
1909-1914
43 A Neural Network Based Approach to Predict Solar Radiation and Analyze the Suitability of Crops Based on Atmospheric Conditions
T.SANDHYA,V.R.KAVITHA
1915-1921
44 Number Plate Detection using Image Processing for Automated Toll Collection to prevent fraudulent behaviour
Namrata Shirodkar, Preksha Uchil
1922-1927
45 New Enhanced Security For Data Transmission Across Mobile Adhoc Network
NR. Sathish Babu, M.Mari Rajan, A.Alan Selva Denis,M.Dervin Moses, M.Rajha
1928-1935
46 Securing Web Services Using XML Signature & XML Encryption
Abhijeet G Gaikwad, Bhavin P. Dhalwani
1936-1940
47 An Efficient Extraction of Data in Biomedical Using Stemming Algorithm
A.Srinivas, V.Sudheer Goud, J.Stalin Babu, T.Charan Singh
1941-1944
48 Design and Implementation of Multi-Level Clustering Technique for Wireless Sensor Networks
S S Archana, Jayasri B S
1945-1949
49 Relevance Feedback for Content-Based Visual Information Retrieval using Active Learning Method
Vikrant Gunjal,Virendra Baranwal
1950-1956
50 Review on Attacks in Mobile Ad-hoc Networks (MANET)
Manju Sehrawat, Praveen Sharma
1957-1960
51 Implementing GIS and Remote Sensing for City planning and Management
Mr. SujitPavaskar, Mr. Deepak Rajaram
1961-1966
52 GI-FI, the Technology of New Era
Yadav Sushil G. , Pandey Pratik H.
1967-1969
53 Performance Analysis of VOIP over Mobile WiMAX
Jyoti Singhal , Vandana
1970-1975
54 A Review Paper on Data Mining Techniques and Algorithms
Ashish Kumar Dogra, TanujWala
1976-1979
55 Algorithm of Particle Filtering of Recognition in Visual Aided Navigation
M.P. MUKHINA, I.V. SEDEN, M.F. TUPITSYN, A.S. YURCHENKO
1980-1987
56 Literature Study on Hybrid Wind/Mini hydro Power Plants
Kruti Gupta, Kamal Kant Sharma
1988-1994
57 Environment Change Prediction to Adapt Climate-Smart Agriculture Using Big Data Analytics
Ramya M G,Chetan Balaji, Girish L
1995-2000
58 Data Protection as a Service (DPaaS): A Novel Approach For Data Protection in Cloud
Jeelani,Anil Kumar .G
2001-2006
59 Near Real-Time Data Warehousing Using ETL(Extract, Transform and Load) Tools
Mr. Narendra Gajanan Mane
2007-2012
60 Web Mining-Types,Applications,Challenges and Tools
Ms. Gaikwad Surekha Naganath , Ms. Mali Supriya Pralhad
2013-2015
61 Overcoming Security Challenges in WAP Protocol
CHAUHAN SHAILENDRA
2016-2019
62 Research on Solutions of Security Issues of Ecommerce and Their Comparative Analysis
Shahbaz Khan, Dilina Nair
2020-2025
63 Application of Web Service for Large file transfer
Pratiksha J.Deshmukh ,Prof.Amarja Adgoankar, Anil Chaturvedi
2026-2031
64 A Detail Review on IEEE 802.16m (WiMAX-2)
Manju Sharma, Preeti Sharma
2032-2038
65 Performance Evaluation of Video on Demand (VoD) over WiMAX
Kunti Dagar, Preeti Sharma
2039-2043
66 An Improvement In Cloud Data Security That Uses Data Mining
Prof.P. S. Tembhurne,Prof.C.M.Goswami,Prof. S.V.Deshmukh
2044-2049
67 A SURVEY ON INTERIOR DESIGN USING AUGMENTED REALITY
Miss. Arti Yadav, Miss. Taslim Shaikh, Mr. Abdul Samad Hujare, Prof. Murkute P.K.
2050-2053
68 SKILLFULL SYSTEM FOR COLOR COMMENTARY IN CRICKET
Amruta Waghulkar, Prof. L.H.Patil
2054-2057
69 3D Mask fake face detection using near set theory
Ms. Neha Kuchankar, Prof. S. D. Zade
2058-2062
70 Suggestion For Enhancing Performance For Microsoft SharePoint
Sanket S. Nalawade
2063-2069
71 Meta Heuristic Approach for Task Scheduling In Cloud Datacenter for Optimum Performance
Salma Khanum, Girish L
2070-2074
72 A survey on various text mining techniques and their Issues
Mr. Jagdish Raikwal, Vikas Ransore
2075-2078
73 Implementing Issues and Resolution of Cloud Computing in Android Devices
Mr. Nikhil G. Thakur,Mr. Kiran M. Baisane
2079-2083
74 Dynamic Management of Virtual machines for Server Consolidation in Data Centers
Ashwini K.S, Prof Shantala C.P, Mr. Girish L
2084-2087
75 Green Cloud Computing: Balancing and Minimization of Energy Consumption
Ms. Amruta V. Tayade,Mr. Surendra V. Sharma
2088-2095
76 REPLICATION BASED DISASTER RECOVERY IN VIRTUAL MACHINES
Nethra H L,Prof. Shantala C P
2096-2100
77 Achieving QoS in Underwater Sensor Networks
Gnaneshwari T R, Mr. Anil Kumar G , Mr. Harish T A
2101-2104
78 Efficient Approach for Disaster Management in Wireless Sensor Networks
Ranjitha B N, Mr. Anil Kumar G, Mr. Harish T A
2105-2109
79 Performance Evaluation of Eigen faces and Fisher faces with different pre-processed Data sets
Harihara Santosh Dadi, P G Krishna Mohan
2110-2116
80 Market Sentiment Analysis for Popularity of Flipkart
Mr. Sagar Nadagoud,Mr. Kotresh Naik.D
2117-2123
81 Secure video steganalysis to detect hidden communication between virtual machines in cloud
Shwetha B N,Prof. Shantala C.P,Girish L
2124-2129
82 Collective Predictive Analysis for Flight Disasters
Ms.Annapurna.K.A.,Mr.Harish.T.A.
2130-2136
83 An Inclusive Perspective for Threshold Proxy Re-Encryption Scheme to Ensure Data Confidentiality
Shruthi R,Prof Nagaraja P
2137-2141
84 Cloud Data Partitioning For Distributed Load Balancing With Map Reduce
Nutan. N,Girish. L
2142-2147
85 Review on Circular Monopole Antenna for UWB Applications
Nivedita Singhal
2148-2150
87 Predictive Analysis from Advanced Sports Data For Effective Decisions
Sowmya N S,Mr. Justin A Gopinath,Mr. Harish T A
2156-2162
88 Automatic Drug Reaction Detection Using Sentimental Analysis
Sahana D S, Prof. Shantala C.P, Girish L
2163-2170
89 Cyclic HMM-based Method for Pathological Gait Recognition from Side View Gait Video
Hoang Xuan Hai, Hoang Le Uyen Thuc
2171-2176
90 Study on Securing Private Data in Hybrid Cloud
Falguni M Panchal,Manali V Mulik
2177-2180
91 Proposed Algorithm for Clustering Based Routing protocol in WSN
Jyoti Attri, Tanuj Wala, Pushpender Kumar
2181-2183
92 Survey of various Power Management Techniques for Datacenter in Cloud Computing
Shilpa Kumari, Tanuj Wala
2184-2186
93 Design of Severity Estimation Unit of Automotive Accidents
Saroj S. Raut, Swapnili P. Karmore
2187-2191
94 PRIVACY PRESERVING DATA SHARING WITH CP-ABE
Neeta S. Nipane, Nutan M. Dhande
2192-2197
95 INTELLIGENT INTERNET OF THINGS [IOT] FRAMEWORK FOR SMART CITY
Ms. Archana A,Mr. Girish L
2198-2202
96 Verifiable Cryptographic based Data Transformation System
Aishwarya.M, Kumaresan.A, Manjuparkavi.R.,Maheswaran.R, Kalaignanam.K
2203-2207
97 STUDY AND ANALYSIS FOR MOBILE CLOUD COMPUTING ON ENERGY SAVING APPROACHES
G.Badri Narayanan, K.Anushya, Prof. P Karthikeyan
2208-2210
98 An Hybrid Approach for Suitable Content Navigation Based on Weighted Clustering for Online Users
Suma H.C,Harish T.A, Girish L
2211-2215
99 Energy Conservation In Wireless Sensor Network
Deepika Sharma, Gurpreet Singh
2216-2220
100 Biometric Security Enhancement using GLCM Method: A Review
Shelza Thakur, Shivani Rana, Vandana Thakur
2221-2223
101 Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding
v.vallinayagi,Dr.G.M.Nasira
2224-2229
102 Adaptive Threshoding for Wavelet Denoising on Medical Images through PSO Algorithm
Ms. Preeti Dansena, Mr.Omprakash Dewangan
2230-2237
103 Application of wireless sensor networks in Mumbai traffic control
Chandrika S. Kamble
2238-2244
104 Multi Keyword Ranked Search over Encrypted Cloud Data
Vanishree R,Mr.G.S Suresh
2245-2248
105 An Approach for Analyzing keyframes based on Self Adaptive Threshold and Scene Descriptors
Suruthi.K , Babu Kannan.K, Kumaresan.A,Velu.S
2249-2254
106 Dictionary Compression: An Optimal Answering for Continuous Top-k Dominating Queries
Ramya.A, Sankaran.L, Kumaresan.A, Manju Parkavi.R, Kalaignanam.K, Lokesh.V
2255-2260
107 AndroidAnti-Malware Analysis
Mr.Sharad R.Kurhade,Mr.Nayan D. Gite
2261-2266
108 Homomorphic Encryption- a Consolidate Element for Data Security in Cloud Computing
Nishigandha Lavkumar Dhotre, Rahul Ashok Chavan
2267-2273
109 Study on Masquerade User Detection Techniques using Schonlau’s Data Set & Simple Cipher Substitution
Nitish V. Lad, Sagar S. Sawant
2274-2279
110 Comparative Study on Order-Preserving Submatrices with repeated measurements and Bucket Order-Preserving SubMatrices
Pratiksha Kalbhor, Bhagyashree Nehete
2280-2286
111 Analysis of AODV Routing Protocol in Vehicular Environment
Bhanupriya, Akansha Dhall
2287-2291
112 HTTP2 VS HTTP1.x (Specifications &Suggestions)
Girish K. M. ,Akshay R. Muntode
2292-2294
113 Social Media Crowdsourcing and Detecting Financial Fraud Using Real Time System
Sneha Sawant, Rohini Varatharajan
2295-2301
114 Census Data analysis with Multi Relational Data Mining in Clusters
Gowthami N,Harish T A
2302-2304
115 ALTERED FINGER PRINT ENHANCEMENT USING SIFT POINTS
Hemalatha. Yeramati,T. Hanumantha Reddy
2305-2308
116 Enhancement of QoS performance in Mobile Ad-Hoc Networks
SAVITHA M K,SRIDEVI
2309-2316
117 Implementing GIS for City planning and Management in Thane city
Viraj V. Patil
2317-2320
118 Detection and Prevention of Wormhole Attack in MANET using New Fresh Algorithm
S.Nivedha, S.SankaraNarayanan
2321-2326
119 Eliminating Noise from Mixed Noisy Image by using Modified Bilateral Filter
Sameer Ansari, Kapil Mangla
2327-2332
120 Speech Recognition System with Speaker Verification using HMM, LPC & MFCC
Rupinder Kaur, Pushpalata S
2333-2339
121 Palmprint Recognition System Using Independent Component Analysis and Gabor Texture Descriptors
Vijayalaxmi S D, Pushpalata
2340-2344
122 A COMPREHENSIVE STUDY OF CONTRAST ENHANCEMENT MEDICAL IMAGE USING VARIOUS WAVELETS TRANSFORM
Swati Gupta,Shweta Shrivastava,Dr. Vineet Richariya
2345-2353
123 Discrimination prevention with improved data transformation method
Priti Gawade, Prof. Jayashree Chaudhari
2354-2357
124 A survey on Symmetric Key Algorithms for Image Encryption
Aarti Devi, Ankush Sharma, Anamika Rangra
2358-2361
125 Comparative Evaluation of FIR Filter Design with Genetic Algorithm and Particle Swarm Optimization
Anita Suman , Parveen Kumar , Asha Rani
2362-2367
126 A SERVEY OF SECURITY ALGORITHMS IN CLOUD COMPUTING
SONIA SINDHU
2368-2371
127 Survey of Approaches Used in Machine Translation System
Mamta, Tanuj Wala
2372-2374
128 IPTV – A Digital Service Provider System
Arun Kumar S B, K.R. Prasannakumar
2375-2378
129 Cross Level Frequent Pattern Mining Using Dynamic Programming Approach
Ms. Deepika Fole, Asst Prof. Omprakash Dewangan
2379-2384
130 Private-Searching Techniques in Cloud Environment
Mr. Suryabhargav R, Smt. Kavitha M
2385-2387
131 A Survey on Message Authentication Schemes in Wireless Sensor Networks
Mahindra Kubsad, Prabodh C P
2388-2392
132 Need of Hubness for Object Recognition
Sneha Prakash Sumare, Rasika M. Kaingade
2393-2395
133 Energy Efficient Hierarchical Routing Protocols for Enhancing the Lifetime of Wireless Sensor Networks-A Survey
Shivani Rana, Shelza Thakur, Anamika Rangra
2396-2399
134 Closest Keyword Retrieval with Data Mining Approach
Ms. Sonali B. Gosavi, Dr.Shyamrao.V.Gumaste
2400-2404
135 Logo Detection and Recognition Using Artificial Neural Network
Gayathri. R, Akshaya. A
2405-2408
136 Adaptive Encoding & Decoding of Compressed Video Using SPIHT Algorithm
K M Amritha, Nithin S S
2409-2412
137 Analysis of energy efficient scheduling algorithms in green cloud computing
Pragya,Mrs Manjeet Gupta
2413-2416
138 A Survey-An Efficient Flooding Scheme for Mitigating Broadcast Storm Problem in Wireless Sensor Network
Madhusudhana V,Gururaj S P
2417-2421
139 Bandwidth improvement of rectangular patch antenna at frequency 2.3 GHz
Mridul Tripathi , Prof. Satyendra Swarnkar
2422-2426
140 CBFAST- Efficient Clustering Based Extended Fast Feature Subset Selection Algorithm for High Dimensional Data
Kokane Vina A., Lomte Archana C.
2427-2434
141 Data security on Android OS Against Malware
Ms. Kanchan Sanjay Patil,Mr.Vinod Shivdas Panchal
2435-2439
142 Design of FIR filter using hanning window, hamming window and modified hamming window
Er. Sandeep Kaur, Er. Sangeet Pal Kaur
2440-2443
143 ENERGYEFFICIENT TRANSMISSION OF DWT IMAGE OVER OFDM USING BPSK, QPSK AND 16PSK
Mohd. Nayeem Ahmed Shareef, Mohammed Imtiaz Ali Ahsan
2444-2449
144 Analysis of Sobel Edge Detection Technique for Face Recognition
Achal Sharma,Shilpa Jaswal
2450-2453
145 Analysis of Selective Mapping PAPR Reduction Technique in OFDM System
Kusum Lata,Shilpa Jaswal
2454-2458
146 Prevention of Gray Hole Attack in Vehicular Ad-hoc Network by Enhanced Multipath Approach
Vaishali Mittal
2459-2466
147 Web Services Protocol: SOAP vs REST
Vibha Kumari
2467-2469
148 Web Usage Analysis of University Students to Improve the Quality of Internet Service
ANANDAN BELLIE
2470-2474
149 Extension of Dynamic Fault Detection Correction Routing in Wireless Networks
Manju, Supriya
2475-2477
150 Minimizing Routing Interruption through Backup Paths with Energy Saving and Routing Attacks in IP Networks
Varsha Gosavi, Prof. S. P. Pingat
2478-2482
151 Implementation and Analysis of a Hybrid approach for Clustering Weblog
Chandana S. Khatavkar , Prof. Mangesh Wanjari
2483-2487
152 The Study of Haptics in Medical Training Simulation
Chinmay S. Deshpande
2488-2491
153 Scene Text Recognition in Mobile Application using K-Mean Clustering and Support Vector Machine
Priyanka N Guttedar, Pushpalata S
2492-2496