Volume 4 Issue 6 June 2015

Volume 4 Issue 6 June 2015

S.No. Title and Authors of Paper Page.No.
1 Simulation Based Analysis of VOIP over MANET
Neeru Mehta, leena
2497-2501
2 Securing Ad hoc Network By Mitigating Jamming Attack
Neeti Yadav, Dr. Vivek Kumar
2502-2506
3 Performance of Internet Protocol TV over WiMAX
Kunti Dagar, Preeti Sharma
2507-2513
4 Performance Analysis of various Codecs Schemes of VOIP over WiMAX
Sheetal Jalendry, Shradha Verma
2514-2518
5 A Review on Quality-of-Service Multicast Routing Techniques Based on Genetic Algorithm in Manet
Sukhvinder Singh,Manoj Yadav,Sanjeev Kumar
2519-2527
6 Research on Resolution of Security Issues in Smart Phones
Qutubuddin Shaikh, Yashwant Deore
2528-2532
7 An Improvement of AODV Routing Protocol for Vehicular Ad-hoc Networks (VANETs)
Sheetal Goyal
2533-2538
8 A Survey on Inter-Cell Interference Co-ordination Techniques of LTE Networks
Pardeep Kumar, Sanjeev Kumar
2539-2544
9 Design of High Speed MAC (Multiply and Accumulate) Unit Based On “Urdhva Tiryakbhyam Sutra”
Parth S. Patel, Khyati K. Parasania
2545-2549
10 High Performance and Area Efficient Correlation for IEEE 802.16 OFDM Using FPGA
Krunal Mehta, Khyati Parasania
2550-2555
11 Introducing Ruby to Web Profile Mining
Neil Fernandes
2556-2558
12 Performance Comparison of Various Routing Protocols in IPv4-IPv6 Coexistence Environments
Priya Bali, Dr. Vivek Kumar
2559-2564
13 The Cloud As An Enabler For Big Data Analytics
Prajakta Rawool, Swapnil Salvi
2565-2574
14 Efficient Multicast Routing Protocol Using Limited Flooding For Efficient Route Discovery
Preeti.G.Sajjan,Sujata.V.Mallapur
2575-2580
15 Dynamic Resource Allocation using Virtualization Technology in Cloud Computing
Miss. Gawali Anita D., Prof. S. K. Sonkar
2581-2584
16 Brain Glass Technology
Samruddhi Heramb Kanade,Rajasi S.Salunkhe
2585-2589
17 Design and Performance Optimization of Bidirectional SCM based Radio over Fiber System
Nisha Sharma, Er Robin Khurana
2590-2596
18 Performance Review of Optimized Link State Routing Protocol
Swati, Yogesh Chaba
2597-2600
19 STUDY OF MVC ARCHITECTURE AND IMPLEMENTATION
Ms. Lavina .S. Jadhav,Mr. Burhanuddin A. Sodawala
2601-2604
20 Advanced Techniques for Enhanced Database Security
Er. Bhavna Sharma
2605-2609
21 Enhanced Log Cleaner with User and Session based Clustering for Effective Log Analysis
Ms Shashi Sahu, Mr. Omprakash Dewanagan
2610-2615
22 Protection of Environment By Green Computing: A Study
Deepak Verma, Lalit Kr. Saini
2616-2620
23 Fingerprint Enhancement and Feature Extraction using Thinning and Minutiae Extraction of Ridge and Bifurcation
Aneesha Karar, Prof.Amarjeet kaur
2621-2624
24 High accuracy Face Recognition system based on SIFT
Ajitkumar Deshmukh, Pritam Sirpotdar, Juber Sheikh, Prof. Dr. M. A. Joshi
2625-2628
25 PHP Optimization Using Hip Hop Virtual Machine
Chaitali Tambe, Pramod Pawar, Dashrath Mane
2629-2633
26 Email Aggregation using IMAP, PHP & MySQL Database
Antonius H. Carvalho
2634-2638
27 SOM Improved Neural Network Approach For Next Page Prediction
Vidushi, Dr. Yashpal Singh
2639-2644
28 Problem areas of Public Cloud in Business Applications
Ninad U. Sawarkar
2645-2647
29 To Study Various Machine Learning Technique
Atul Kumar, Sunila Godara
2648-2653
30 Noise Reduction in camera captured images in android application
Sumit Debnath, Aditya Waghdhare, Dashrath Mane
2654-2658
31 A Survey on Impact of Social Media on Election System
Gayatri Wani N. V. Alone
2659-2662
32 An Efficient Vehicle-to-Vehicle communication protocol to avoid the congestion in VANETs
kaveri G, Sujata M
2663-2667
33 Problems & Suggestions for Android City Tour Guide System Based on Web Services for Mumbai
Lalita R. Pawar, Sarvesh S. Patwardhan
2668-2672
34 A Study on Various Text Document Annotation Systems
Sajith H, Vipin Kumar KS
2673-2680
35 An Effective Use of Meta Information for Text Mining
Mr. Nitin J.Ghatge, Prof. Poonam D. Lambhate
2681-2685
36 An Effective Fusion of PSO-Neural Network Technique for Intrusion Detection
Ms. Lissy P K, Ms. Jesna Anver
2686-2691
37 STRENGTHENING INFOMATION SECURITY WITH VAPT
Sherin S Panikar
2692-2702
38 Design of IIR Filter Using Chebyshev
Mandeep Singh Saini, Dr. Kuldeep Kaur
2703-2709
39 Quality Analysis in Data Transfer without Packet Dump
D.R. ManoRanjani, M.S. NishaPriya, BheemaMehraj
2710-2714
40 A novel approach of fault detection using artificial neural network (ANN)
Ms. S. S. Patil,Prof. S. K. Pathan
2715-2720
41 Performance Evolution of Cognitive Radio System using MatLab
Yuvraj Kasar, Ms. Mithra Venkatesan, Dr. A. V. Kulkarni
2721-2724
42 IMPACT OF BIG DATA AND CLOUD ON INDIAN INDUSTRY
Pratima P. Vishwakarma
2725-2729
43 Design of Fuzzy Based Controlling System for Buck Converter
Ms. Bhagyashri U. Patil, Prof. S. R. Jagtap
2730-2733
44 Censorship on Internet
Vijay S. Changan, Apar Chopade
2734-2737
45 EMG Signal Feature Extraction for Designing the Calf Stimulator
Ms. Rutuja U.Bachche,Prof. R.T.Patil
2738-2742
46 A review on cloud computing security and Privacy
Neha Sehgal , Amninder Kaur
2743-2746
47 Mining for Data Cube and Computing Interesting Measures
Miss.Madhuri S. Magar,Prof. Sonali A. Patil
2747-2752
48 Detection of attacks based on timestamp discrepancy
Ms. Pratibha S. Gaikwad, Prof. S. P. Pingat
2753-2756
49 Nodes Failure Recover in Wireless Sensor Network
Roshni Bhave, Prof. Vijay Bagdi
2757-2760
50 A Survey Paper on Energy Efficient Routing Technique on WSN
Ankita Khapre,Umesh Lilhore, Sitendra Tamrakar
2761-2766
51 Performance Evaluation of IPV6 Transition Technologies
Surbhi Rani, Vandana
2767-2770
52 A Time Slot based Parametric Table Mapping Approach for Wormhole Detection in WSN
Deepika,Dr. Yashpal Singh
2771-2782
53 RELIABLE DATA DELIVERY IN LOW-POWER AND LOSSY NETWORKS USING TRUST BASED LINK SELECTION
Ms. Archana Chemate, Prof. S. P. Pingat
2783-2786
54 Database Technology (Nosql)
Rupesh suresh vedante,Ashwini Sampat Salunkhe
2787-2791
55 E-mail Spam Classification Using Naïve Bayesian Classifier
Priyanka Sao, Pro. Kare Prashanthi
2792-2796
56 Elimination of Gray Hole Attack in Wireless Mesh Network by Enhanced Multipath Security Approach
Renu Bala, Sarika
2797-2801
57 RFID and GSM based Automatic Rationing System using LPC2148
Vinayak T. Shelar, Mahadev S. Patil
2802-2805
58 A Review Paper on Page Ranking Algorithms
Sanjay, Dharmender Kumar
2806-2811
59 Face Recognition System using Local Feature Descriptors: A Survey
Mukesh D. Rinwa, B.S.Borkar
2812-2815
60 A Novel Text Classifier Using Supervised and Unsupervised Term Weighting Method
Chandrashekhar P. Bhamare, Dinesh D. Patil
2816-2822
61 BIG DATA IN CLOUD CHALLENGES AND SOLUTION
M.Amudha, T.Ambika , P.Sangeetha, B.S.Sangeetha
2823-2826
62 A Survey on Deterministic Finite Automata Compression Techniques
Ms. Utkarsha P. Pisolkar, Asst. Prof. Shivaji R. Lahane
2827-2829
63 A Survey on Meta Information Based Text Data Clustering and Classification
Mrunal V. Upasani, Rucha C. Samant
2830-2833
64 Study Of Methods For Preventing Selective Jamming Attacks
Mr.Ganesh R.Patil,Prof.Prashant S.Wankhade
2834-2837
65 Implementation and Design of Low Power Carry Select Adder using Different Technologies
Rajwinder Kaur, Amit Grover
2838-2841
66 A Study of Hysteresis Band Current Control Scheme For Shunt Active Power Filter Used For Harmonics Mitigation
Anita Choudhary, Prerna Gaur
2842-2847
67 Optimizing Technique to Reduce Traffic Load in Peer-to-Peer Systems
G. Thejonath Reddy, Dr. S. Vasundra
2848-2853
68 Adoption of Cloud Computing for Education in Kenyan Universities: Challenges and Opportunities
Elizabeth MULI, James KIMUTAI
2854-2860
69 Human Face Detection Based on Skin Color Using Support Vector Machine
Ms. Ruchida S. Sonar,Dr. P.R. Deshmukh
2861-2865
70 A WIRELESS PHYSIOLOGICAL PARAMETER MONITORING SYSTEM
Sumimol Varghese,Rahul M. Nair
2866-2871
71 Detectability of T Wave Alternans in ECG Signal by Principle Component Analysis Method
Shraddha. D. Satav, Dhananjay E. Upasani
2872-2876
72 Host Based Intrusion Detection System Based on Fusion of Classifier using K-means Clustering
Manisha A.Rakate, Prof.R.H .Kulkarni
2877-2881
73 Enhanced and Efficient Search Multimedia Data by Using Multi-Keyword Synonym Query
Manish M. Pardeshi,R. L. Paikrao
2882-2886
74 Modified Tone Reservation Approach for the Reduction of PAPR in OFDM Systems
Manik Virdi, Dr. Neeraj Sharma
2887-2892
75 An Effective and Modified approach for Distance Vector Routing Protocol to increase the Throughput and Security
Simarjot Kaur,Dr.Neeraj Sharma
2893-2899
76 Feature Recommendation from Competitive Product Description by using KNN with Different Similarity Formulas
Ms. Syeda Nazema Syed Subhan, S. N. Deshmukh
2900-2905
77 Id-Based Signature For Energy Efficient WSN
Ms. Roshani R. Patle, Mrs. Rachana Satao
2906-2910
78 Context Based Query Auto-Completion
Veena K Mawarkar, V. S. Malemath
2911-2917
79 Multivariate Correlation Analysis for Denial-of-Service Attack Detection
Dipali A. Kamble , Amruta Amune
2918-2923
80 PROACTIVE & DETECTION STRATEGY DESIGNING FOR DRDOS ATTACK
Dipika Mahire,Amruta Amune
2924-2928
81 A Privacy and Security Aware Location Based Mobile Marketing and Rewarding System
Mr. Digvijay A. Patil, Prof Yogesh B. Gurav
2929-2932
82 Secure Image Transfer Using Clustering and Permutation Based Approach
Riyaz Sikandar Kazi, Prof. Navnath Pokale
2933-2937
83 Image Reconstruction and Improve Image Visibility using Super-Resolution Technique
Mr. Chirag Dhanani, Prof. Ratnaraj Kumar
2938-2941
84 Overview of detection methods of Cross site scripting Attack
Pratibha Kamal, Bharti Nagpal, Radhika Murari
2942-2945
85 Brain MRI Image Classification Using Probabilistic Neural Network and Tumor Detection Using Image Segmentation
Prof. N.D.Pergad, Ms. Kshitija V.Shingare
2946-2951
86 Privacy-Retaining Public Analyzing For Shared Datain the Cloud
Madhubala Rajendra Patil,Srinu Dharavath
2952-2956
87 A Modified Approach for Cluster Head Selection on the basis of Energy, Bandwidth and Black List Status of nodes in MANET
Mandeep Singh,Mr.Gagangeet Singh
2957-2963
88 Frequent Item Sets in Large Uncertain Databases are mined efficiently
Miss. Ifrah Kaladgi, Prof. Yoginath Kalshetty
2964-2967
89 WEB 2.0 TOOLS –AS A WAY DIRECTION FOR STUDENTS TOWARD THE TRUSTED AND RIGHT SOURCES WHILE TEACHING A LANGUAGE ONLINE
Doniyorbek K.Ahmadaliev, Chen Xiaohui, Sardor U.Dadabayev, Zhe Zhang
2968-2971
90 Analyzing behavioral activities among the multilingual big-data on the complex network with the help of suggested potential monitoring: Altai family languages in China
Doniyorbek K. Ahmadaliev, Chen Xiaohui, Sardor U. Dadabayev
2972-2976
91 Biometric Identification Criminal, Terrorist, and individual Identification System It’s a New Wine & Tast
Adnan Majeed
2977-2986
92 Maximal Phrase Based Opinion Extraction of Product and Movie Reviews
Supriya B. Moralwar, Sachin N. Deshmukh
2987-2990
93 Improved Transactional Security in Cloud Using Secured Dynamic Two Phase Commit Algorithm
Shilpi Chaubey, Dr.S.M.Ghosh
2991-2998
94 Comparatives Analysis of Secure Information Transmission Based on Cryptography Fused with Steganography
Mr. Akash V. Malasane, Prof. S. P. Bhonge
2999-3004
95 Annotating search using Web databases
Poonam V. Wankhede,Sachin N. Deshmukh
3005-3009
96 An Investigation of Zone Routing Protocol (ZRP) in Mobile Ad-Hoc networks
Shiksha Devi, Poonam Chaudhary
3010-3014
97 Enhancement in AOMDV Protocol to Reduce Chances of Link Failure in Mobile Adhoc Network
Monika Sharma, AmandeepKaur Brar
3015-3018
98 TASK SCHEDULING IN CLOUD COMPUTING
SONIA SINDHU
3019-3023