S.No. |
Title and Authors of Paper |
Page.No. |
1 |
ANALYSIS OF IMPLEMENTATION OF WEB SERVICE IN E-LEARNING PDITT DIKTI
Nurul Hidayat, Ahmad Ashari |
0215-0217 |
2 |
Study of Product aspect ranking Techniques
Pratish Jage, Shreeniwas Kavhale, Aniket Bharati |
0218-0221 |
3 |
Comparison of Routing Protocols in Wireless Sensor Network
Hardik Solanki, Mahir Shaikh, Nikhil Kamath, Aniket Pol, Nilesh Rathod |
0222-0228 |
4 |
Electrically small antennas: The art of miniaturization
Mukesh R chaurasia, Pratima R Pimpalgaonkar, Bhargavi Raval, Trushit K. upadhyaya |
0229-0234 |
5 |
Multilevel Security for Cloud Computing using Cryptography
K.Satyanarayana |
0235-0242 |
6 |
DATA SECURITY USING IP PACKET FILTERING
Ms. C. Nagarani,Ms. L. Pushpa |
0243-0248 |
7 |
A survey on online banking authentication and data security
Stud.Ranjana Singh, AS.prof Kirti Patil, AS.Prof Ashish Tiwari |
0249-0252 |
8 |
Video Streaming for QOS Approach in Multimedia Cloud
V.S.Swarnalekha,S.Aadhirai,S.Shanthameena |
0253-0257 |
9 |
To Propose a Novel Technique for Link Recovery in MANET
Amanpreet Singh, Bhupinder Kaur |
0258-0262 |
10 |
Online file sharing system for industry and general user usage
Mahajan Sagar, Kulkarni Akshay, Mohan Digambar, Gandhi Akshay, Prof. PritiVyawahare |
0263-0265 |
11 |
Industrial Automation using Internet of Things (IOT)
Ashwini Deshpande,Prajakta Pitale,Sangita Sanap |
0266-0269 |
12 |
A SURVEY ON LUNG TISSUE CATEGORIZATION
Dr.J.Preethi, Mrs. Shalini Raju, Ms. Sowmiya Sekaran |
0270-0275 |
13 |
Cybercrime Cases Analysis: Threat and Vulnerability
Dr.P.B.Pathak |
0276-0279 |
14 |
A Review on PLC based Automatic Waste Segregator
Subhasini Dwivedi, Michael Fernandes, Rohit D’souza |
0280-0285 |
15 |
Information seeking behavior of faculty of technical institutes of Haryana
DR. Krishan Gopal,Ajay Kaushik |
0286-0288 |
16 |
INFORAMTION SEEKING BEHAVIOUR OF FACULTY OF SKIET & GEC ENGINEERING COLLGES
DR. Krishan Gopal,Ajay Kaushik |
0289-0292 |
17 |
Genetic Algorithm Overview and Modeling for Function Optimization Using Benchmark Function
Parul Gupta |
0293-0295 |
18 |
A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
Dr. R. Shanmugavadivu, B. Chitra |
0296-0300 |
19 |
Improving the Efficiency of MANET by Reducing Routing overhead using a NCPR protocol
Prajkta S. Nagrare, Vaishali N. Sahare |
0301-0305 |
20 |
DOOR CONTROLLER USING SMART CARD AND INTERACTIVE CODE LOCK
Tochukwu Churchill, Micheal Akubue |
0306-0314 |
21 |
An Internal Intrusion Detection and Protection System to Resist Insider Attacks
Gaurang S.Joshi,Mr. R. Subash |
0315-0319 |
22 |
ANALYSIS OF DRIVER BEHAVIOR IN CAR USING CLUSTERING
Kakde Swati S,Dr.C.MALATHY |
0320-0323 |
23 |
Ontology-Based Data Access via Ontop
Asad Ali, MelikeSah |
0324-0329 |
24 |
A Review on Enhanced Machine Learning Approach for Detection of Malicious Urls and Spam in Social Network
Ms. Roshani K. Chaudhari, Prof. D. M. Dakhane |
0330-0333 |
25 |
An Efficient New Audio Steganography Scheme based on Location Selection with Enhanced Security
Shweta Vinayakarao Jadhav,Prof. A.M Rawate |
0334-0337 |
26 |
A Review on Anti Theft Mechanism through Face Recognition
Ms.Neha J. Agrawal,Dr. Siddharth A. Ladhake |
0338-0341 |
27 |
Exploring the Finger Dorsal Pattern for human Identification using LBP-Haar Decomposition and 1-D Log Gabor Filter
Dhanwate Hrishikesh N., Prof. Badadapure Pravinkumar R. |
0342-0344 |
28 |
AUTOMATED ELECTRICITY BILLING SYSTEM USING GSM
Soumya Dath G |
0345-0348 |
29 |
QUALITY AND ACCURACY OF CLUSTERING ALGORITHMS ON BIG DATA SETS USING HADOOP
Chandrahas Reddy.M,Sugandhi.k |
0349-0367 |
30 |
SURVEY ON MULTILEVEL BIOMETRIC AUTHENTICATION SYSTEM
NIKHIL VARMA, JUNED BAGWAN, NILESH BASUTKAR , VIKRAM WANKHADE,PROF. BHAGYASHREE PATLE |
0368-0370 |
31 |
A Dangerous Trend of Cybercrime: Ransomware Growing Challenge
Dr.P.B.Pathak |
0371-0373 |
32 |
A Survey on Vehicle Tracking with Various Techniques
Nikita Rawat, Prof. Rohit Raja |
0374-0377 |
33 |
Trust Based Detection of Malicious Nodes in Wireless Sensor Network
K.Sumathi, Dr.M.Venkatesan |
0378-0381 |
34 |
A Survey on Automated Monitoring System for Vehicle Detection Using Different Techniques
Shraddha Shukla, Prof. Rohit Raja |
0382-0384 |
35 |
AN INTELLIGENT PATIENT HEALTH MONITORING IN A UBIQUITOUS WIRELESS BANET
D.Sashikala, M.Indira |
0385-0389 |
36 |
MANET USAGE FOR BROADCASTING WITH GAURANTEED MOBILE COVERAGE
S.Jothi, V.S.Lavanya |
0390-0393 |
37 |
Design and Analysis of a Multiresonant Slotted Microstrip Antenna with Modified Ground Plane
Mahendra kumar Soni, Pratibha Devi Umesh |
0394-0397 |
38 |
MITIGATION OF GRAY-HOLE ATTACK IN MOBILE AD-HOC NETWORKS
Neha Patidar,Pritesh Jain |
0398-0403 |
39 |
Automated Configuration Design of a Deployable Polyhedral Truss for Large Antenna
Anshumaan Sharma, Lakshminarayana B, Nagaraj B. P,Suresha Kumar HN, Thyagaraj MR |
0404-0410 |
40 |
To Provide a Well-Organized and Proposed Structure to Minimize Packet Delay and Complex Interaction in Mobile Ad-Hoc Network (MANET)
Umeshkumar Kewat, Ganesh Ghone, Lerina Gonsalves |
0411-0414 |
41 |
PERFORMANCE EVALUATION OF IMPROVED CONTENT ADAPTIVE IMAGE DETAIL ENHANCEMENT BY USING GUIDED IMAGE FILTER
Seema, Er. Harshdeep Trehan, Er.Varinderjit Kaur, Dr.Naveen Dhillon |
0415-0419 |
42 |
Prominence of IoT and Cloud in Health Care
R.Babu, Dr.K.Jayashree |
0420-0424 |
43 |
Anti-Assault Device
Jaspreet Singh Riar, Abhinav Gandhi |
0425-0429 |
44 |
A Survey on Virtualization and Hypervisor-based Technology in Cloud Computing Environment
Sonam Srivastava,S.P Singh |
0430-0435 |
45 |
Comparative Analysis of VLSI circuits using multigate devices
Aditya Waingankar,Asha Waskar,Yash Vesvikar,Pratik Rathod,Mahalaxmi Palinje |
0436-0440 |
46 |
Opinion Analysis: A Multistage Approach
Ritesh Shrivastava, Sanjay Gupta |
0441-0444 |