S.No. |
Title and Authors of Paper |
Page.No. |
1 |
A Review of Routing Protocols and Attacks in Mobile Ad-hoc Network
S. Anusuya, Dr. S.Meenakshi |
3485-3493 |
2 |
Comparative Performance Analysis of Study of Routing Protocols for Adhoc Networks
Charanjeet Singh, Vinod Sharma |
3494-3498 |
3 |
Energy Efficiency in Wireless Sensor Networks Using Clustering and Fuzzy Logic
Er. Parminder Kaur,Er. Vinod Kumar |
3499-3503 |
4 |
A Proposed Binarization Technique on Hand written document
Navdeep Kaur,Monica Goyal |
3504-3512 |
5 |
A Review on image Compression Techniques
Mr. Shubham Yadav, Mrs. Shikha Singh |
3513-3521 |
6 |
Centralized Profile Translation Using Enhance Security
Priyanka Badwaik |
3522-3527 |
7 |
Performance Analysis of VOIP Codes under Different Mobility Pattern
Manpreet Kaur,Rishideep Singh |
3528-3531 |
8 |
WEB BASED HEALTH CARE DETECTION USING NAIVE BAYES ALGORITHM
S.Indhumathi, Mr.G.Vijaybaskar |
3532-3536 |
9 |
ADAPTIVE MODULATION TECHNIQUES FOR CAPACITY IMPROVEMENT OF BER IN WCDMA
Alumona T.L, Onoh G.N, Ezeagwu C.O, Okeoma S.C |
3537-3542 |
10 |
Enhancement in Performance of Processor Using Apriori Algorithm For Multicore System
Prantik Pancholi, Shital Khairnar, Jyoti Kamble, Prof. Amol Jadhao |
3543-3547 |
11 |
Fuzzy Optimal Replenishment Policy for Weibull Deteriorating Items with Ramp Type Demand and Partial Backlogging Under Permissible Delay in Payments
J.Sujatha, P.Parvathi |
3548-3558 |
12 |
An Efficient Handoff Scheme Using a Minimum Residual Time First Scheme
Bilal Owaidat, Rola Kassem, Hamza Issa |
3559-3565 |
13 |
IMPLEMENTATION OF VITERBI DECODER WITH VARIABLE CODE RATE
T.VENU GOPAL |
3566-3576 |
14 |
An Effective Association Rule Mining Using Fuzzy Confabulation Rare Item set Selection Algorithm
Ms.M.Sandhiyah,Mrs.V.Shanmuga priya |
3577-3584 |
15 |
ID Based Automated Data Integrity Checking Model
Ms. Pooja G. Natu,Mrs. Shikha Pachouly |
3585-3591 |
16 |
Anti-Theft Location Detection Chip (ATT)
Chinmay Lad, Rohan Manudhane, Aditya Landge, Rakhi Kalantri |
3592-3595 |
17 |
Communication Server to have IVR, Text chatting, Video Chatting, Secure messaging for a care co-ordination team
Saniya Shah, Ganesh Kanawade, Ankit Kurup |
3596-3600 |
18 |
Speed Control of Photovoltaic Pumping System Employing PMSM Drive
Mahesh kagitha,Balaji Gutta |
3601-3610 |
19 |
A Survey on SmartCrawler: A Deep-Web Harvesting Approach
Radhika Bairagade, Nirmala Singh, Nikita Afre, Durga Bhamare |
3611-3614 |
20 |
An Android Application for Student Information System
Ms. Vijayalakshmi P.B,Manasi Kawathekar,Kirti K. Bhate,Pankaj Belgoankar |
3615-3619 |
21 |
A Review on GLCM feature extraction in Retinal Image
Pooja Maule,Anuja Shete,Kalyani Wani,Aruna Dawange |
3620-3622 |
22 |
IMPLEMENTATION OF GOSSIPING PROTOCOL IN MULTIHOP WSN
Harjit Singh,Ramanpreet Kaur |
3623-3627 |
23 |
A Survey on Distributed De-duplication system with improved Dependability
Yogesh Bhagwat, Sunil Minde, Kunal Malve, Harshad Pawar |
3628-3632 |
24 |
Hardware Testing, Designing and Simulation of Dual Input Buck-Buck DC-DC Converter Using H-Bridge Cells
A.Thiyagarajan , Dr.V.Chandrasekaran |
3633-3638 |
25 |
Survey on Learning analytics system for assessing student’s performance in online education
Anil Adhikari, SachinThakur,HrishikeshDamle, Prasad Khairnar |
3639-3643 |
26 |
Data Aggregation Strategy Using of WSN Increasing Network Lifetime Using READA
Amol Jadhav, Amol Kotkar, Sarang Metkar,Anil patil |
3644-3647 |
27 |
Compression based Energy aware routing algorithm for WSN
Priya,Manoj Kumar,Harjit Pal Singh |
3648-3653 |
28 |
IDENTIFICATION AND MITIGATION OF POWER QUALITY DISTURBANCES USING IUPQC BASED ON PSODV TECHNIQUE
SK.Abdul Khaleel, B.MaheshBabu, Dr.L.Ravi Srinivas, Dr.S.S.Tulasi Ram |
3654-3665 |
29 |
An Optimal Machine learning Approach for Large-Scale Data
P.Sirisha, M.V. Jagannatha Reddy |
3666-3668 |
30 |
A Survey on Investigation of Incremental Detection Problems in Distributed Data
Mr.Dattatray Raghunath Kale, Mr. Satish R.Todmal, Mr.Dhanaji S.Baravade |
3669-3671 |
31 |
Power Quality Improvement With Shunt Hybrid Active Power Filter Using ANN-Based Predictive and Adaptive Controllers
Mr. CH. VNV HariKrishna,Smt. CH. Sujatha,Sri. P. Bala KoteswaraRao |
3672-3678 |
32 |
Fuzzy motivated data linkage for Self-Adaptive Systems
G. Roja Ramani, M. SrujanKumar Reddy |
3679-3682 |
33 |
A Review of Different Resource Scheduling Algorithms in Cloud computing
Er. Amritpal Singh |
3683-3685 |
34 |
An Intelligent Web Page Prediction Based On WUM and Domain Ontology Using Key Information Extraction Algorithm
Jyoti B. Patil, Hridaynath P. Khandagale |
3686-3690 |
35 |
Face Hallucination Using Sparse Representation Algorithm
Sudhir Kumar, Vikram Mutneja |
3691-3697 |
36 |
Enhanced Wireless Control System for Fire and Smoke ,Temperature, Humidity etc. Detection
Dhiraj Sandanshiv, Tushar Kasar, Chinmay Zambre |
3698-3703 |
37 |
Coal Mine Monitoring System for Rescue and Protection using ZigBee
Shilpa Lande, Prof.Matte P.N |
3704-3710 |
38 |
Cloud centric IOT Framework for Crowd Management
K.Thasleema, Mr.Wilson Thomas |
3711-3713 |
39 |
LOG FILES UTILITY FOR SOFTWARE MAINTENANCE
Wasim Khan, Hannan Ansari, Anwar Ahamed Shaikh |
3714-3718 |
40 |
Web Based Requirement Elicitation Tool
Mr. Shinde Santaji Krishna,Dr. D. K. Kaushik,Dr. Shashank Dattatraya Joshi |
3719-3722 |
41 |
Revised Approach for Smartphone Security Using Cloud and Android Applications
Ms. Diksha Kale, Dr. Sudhir Sawarkar, Prof. Vijay Bhosale |
3723-3729 |
42 |
Learning in Particle Swarm Optimization
Shailendra S. Aote, M.M.Raghuwanshi, L.G.Malik |
3730-3733 |
43 |
Multi-Instance Heterogeneous Classifiers with Extended Space forest
Mr.Vikas Singh |
3734-3740 |
44 |
Improved Searching Method Based on Genetic and Page Rank Revised Algorithms
Khandve Dhanashri,Sudrik Snehal,Wagh Sonali,Yewale Savita,Borse P.T. |
3741-3743 |
|
Remaining Papers will be available soon…. |
|