Volume 5 Issue 2 February 2016

Volume 5 Issue 2 February 2016

S.No. Title and Authors of Paper Page.No.
1 ANALYSIS OF IMPLEMENTATION OF WEB SERVICE IN E-LEARNING PDITT DIKTI
Nurul Hidayat, Ahmad Ashari
0215-0217
2 Study of Product aspect ranking Techniques
Pratish Jage, Shreeniwas Kavhale, Aniket Bharati
0218-0221
3 Comparison of Routing Protocols in Wireless Sensor Network
Hardik Solanki, Mahir Shaikh, Nikhil Kamath, Aniket Pol, Nilesh Rathod
0222-0228
4 Electrically small antennas: The art of miniaturization
Mukesh R chaurasia, Pratima R Pimpalgaonkar, Bhargavi Raval, Trushit K. upadhyaya
0229-0234
5 Multilevel Security for Cloud Computing using Cryptography
K.Satyanarayana
0235-0242
6 DATA SECURITY USING IP PACKET FILTERING
Ms. C. Nagarani,Ms. L. Pushpa
0243-0248
7 A survey on online banking authentication and data security
Stud.Ranjana Singh, AS.prof Kirti Patil, AS.Prof Ashish Tiwari
0249-0252
8 Video Streaming for QOS Approach in Multimedia Cloud
V.S.Swarnalekha,S.Aadhirai,S.Shanthameena
0253-0257
9 To Propose a Novel Technique for Link Recovery in MANET
Amanpreet Singh, Bhupinder Kaur
0258-0262
10 Online file sharing system for industry and general user usage
Mahajan Sagar, Kulkarni Akshay, Mohan Digambar, Gandhi Akshay, Prof. PritiVyawahare
0263-0265
11 Industrial Automation using Internet of Things (IOT)
Ashwini Deshpande,Prajakta Pitale,Sangita Sanap
0266-0269
12 A SURVEY ON LUNG TISSUE CATEGORIZATION
Dr.J.Preethi, Mrs. Shalini Raju, Ms. Sowmiya Sekaran
0270-0275
13 Cybercrime Cases Analysis: Threat and Vulnerability
Dr.P.B.Pathak
0276-0279
14 A Review on PLC based Automatic Waste Segregator
Subhasini Dwivedi, Michael Fernandes, Rohit D’souza
0280-0285
15 Information seeking behavior of faculty of technical institutes of Haryana
DR. Krishan Gopal,Ajay Kaushik
0286-0288
16 INFORAMTION SEEKING BEHAVIOUR OF FACULTY OF SKIET & GEC ENGINEERING COLLGES
DR. Krishan Gopal,Ajay Kaushik
0289-0292
17 Genetic Algorithm Overview and Modeling for Function Optimization Using Benchmark Function
Parul Gupta
0293-0295
18 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
Dr. R. Shanmugavadivu, B. Chitra
0296-0300
19 Improving the Efficiency of MANET by Reducing Routing overhead using a NCPR protocol
Prajkta S. Nagrare, Vaishali N. Sahare
0301-0305
20 DOOR CONTROLLER USING SMART CARD AND INTERACTIVE CODE LOCK
Tochukwu Churchill, Micheal Akubue
0306-0314
21 An Internal Intrusion Detection and Protection System to Resist Insider Attacks
Gaurang S.Joshi,Mr. R. Subash
0315-0319
22 ANALYSIS OF DRIVER BEHAVIOR IN CAR USING CLUSTERING
Kakde Swati S,Dr.C.MALATHY
0320-0323
23 Ontology-Based Data Access via Ontop
Asad Ali, MelikeSah
0324-0329
24 A Review on Enhanced Machine Learning Approach for Detection of Malicious Urls and Spam in Social Network
Ms. Roshani K. Chaudhari, Prof. D. M. Dakhane
0330-0333
25 An Efficient New Audio Steganography Scheme based on Location Selection with Enhanced Security
Shweta Vinayakarao Jadhav,Prof. A.M Rawate
0334-0337
26 A Review on Anti Theft Mechanism through Face Recognition
Ms.Neha J. Agrawal,Dr. Siddharth A. Ladhake
0338-0341
27 Exploring the Finger Dorsal Pattern for human Identification using LBP-Haar Decomposition and 1-D Log Gabor Filter
Dhanwate Hrishikesh N., Prof. Badadapure Pravinkumar R.
0342-0344
28 AUTOMATED ELECTRICITY BILLING SYSTEM USING GSM
Soumya Dath G
0345-0348
29 QUALITY AND ACCURACY OF CLUSTERING ALGORITHMS ON BIG DATA SETS USING HADOOP
Chandrahas Reddy.M,Sugandhi.k
0349-0367
30 SURVEY ON MULTILEVEL BIOMETRIC AUTHENTICATION SYSTEM
NIKHIL VARMA, JUNED BAGWAN, NILESH BASUTKAR , VIKRAM WANKHADE,PROF. BHAGYASHREE PATLE
0368-0370
31 A Dangerous Trend of Cybercrime: Ransomware Growing Challenge
Dr.P.B.Pathak
0371-0373
32 A Survey on Vehicle Tracking with Various Techniques
Nikita Rawat, Prof. Rohit Raja
0374-0377
33 Trust Based Detection of Malicious Nodes in Wireless Sensor Network
K.Sumathi, Dr.M.Venkatesan
0378-0381
34 A Survey on Automated Monitoring System for Vehicle Detection Using Different Techniques
Shraddha Shukla, Prof. Rohit Raja
0382-0384
35 AN INTELLIGENT PATIENT HEALTH MONITORING IN A UBIQUITOUS WIRELESS BANET
D.Sashikala, M.Indira
0385-0389
36 MANET USAGE FOR BROADCASTING WITH GAURANTEED MOBILE COVERAGE
S.Jothi, V.S.Lavanya
0390-0393
37 Design and Analysis of a Multiresonant Slotted Microstrip Antenna with Modified Ground Plane
Mahendra kumar Soni, Pratibha Devi Umesh
0394-0397
38 MITIGATION OF GRAY-HOLE ATTACK IN MOBILE AD-HOC NETWORKS
Neha Patidar,Pritesh Jain
0398-0403
39 Automated Configuration Design of a Deployable Polyhedral Truss for Large Antenna
Anshumaan Sharma, Lakshminarayana B, Nagaraj B. P,Suresha Kumar HN, Thyagaraj MR
0404-0410
40 To Provide a Well-Organized and Proposed Structure to Minimize Packet Delay and Complex Interaction in Mobile Ad-Hoc Network (MANET)
Umeshkumar Kewat, Ganesh Ghone, Lerina Gonsalves
0411-0414
41 PERFORMANCE EVALUATION OF IMPROVED CONTENT ADAPTIVE IMAGE DETAIL ENHANCEMENT BY USING GUIDED IMAGE FILTER
Seema, Er. Harshdeep Trehan, Er.Varinderjit Kaur, Dr.Naveen Dhillon
0415-0419
42 Prominence of IoT and Cloud in Health Care
R.Babu, Dr.K.Jayashree
0420-0424
43 Anti-Assault Device
Jaspreet Singh Riar, Abhinav Gandhi
0425-0429
44 A Survey on Virtualization and Hypervisor-based Technology in Cloud Computing Environment
Sonam Srivastava,S.P Singh
0430-0435
45 Comparative Analysis of VLSI circuits using multigate devices
Aditya Waingankar,Asha Waskar,Yash Vesvikar,Pratik Rathod,Mahalaxmi Palinje
0436-0440
46 Opinion Analysis: A Multistage Approach
Ritesh Shrivastava, Sanjay Gupta
0441-0444