Volume 5 Issue 3 March 2016

Volume 5 Issue 3 March 2016

S.No. Title and Authors of Paper Page.No.
1 CT Image Denoising in Wavelet Transform using Threshold Shrinkage Techniques
N. Rigana Fathima, S. Shajun Nisha, Dr. M. Mohammed Sathik
0445-0453
2 Analysis of Traditional BEEM based Protocol in Wireless Sensing Environment
Harpreet kaur, Neetu Gupta
0454-0458
3 Data Centric Directed Diffusion Based On Weighted Grover’s Quantum Algorithm In Wireless Sensor Network
SWATI R. MARKAD, DEVEN PATIL, SHAHRUKH. MOHD AYAZ KHAN
0459-0461
4 SALES REPORT GENERATION SYSTEM WITH RECOMMENDATION TOOL
MihirSolanki,Tejaswini Nanaware,Deepali Bharmal,Mrs.Neeti Desai
0462-0472
5 AN EFFICIENT VEHICLE ACCIDENT DETECTION USING SENSOR TECHNOLOGY
P.Kaliuga Lakshmi, C.Thangamani
0473-0476
6 AN INTELLIGENT TECHNOLOGY FOR CHILDRENS TRACKING SYSTEM USING MOBILE TERMINALS
B.Sugapriya, O.P.Umamaheswari
0477-0480
7 Dynamic Backlight Optimization for Mobile Streaming Applications using Hadoop (DBOMSAH)
Pranjalee Khandave, Reshma Chapole, Madhuri Kanthe, Shameer Mulla, Krupali Deshmukh
0481-0484
8 INTELLIGENT TRAFFIC LIGHT CONTROLLER (ITLC)
V.Purna Chandra Reddy ,V.Ravindra Reddy
0485-0491
9 Providing Effective Approach for Communication among Blind, Deaf and Dumb People
Bhagyashri Shirude, Aishwarya Mohite, Kalyani Aghav, Pranjali Gade
0492-0495
10 Group User Revocation in Cloud for Shared Data
Mahesh Salunke, Harshal Meher, Ajay Tambe, Sudir Deshmukh,Prof.Sanjay Agarwal
0496-0500
11 Study of Liquid Crystal Polymer Based Flexible Antenna
Dipal S Sindha, Brijesh Shah, Falguni Raval
0501-0503
12 CITY GARBAGE COLLECTION INDICATOR USING WIRELESS TECHNOLOGY
Chetan Patil, Ajay Shimpi, Prasad Sawant, Piyusha Patil
0504-0506
13 Authentication Scheme For Session Password Using Play-Fair Cipher
Vishal Janjalkar, Shekhar Mulik, Archana Nanade
0507-0511
14 Software Scheduling and Tracking using Visual Representation
Amit Agarwal, Aakash Naik, Omkar Khanolkar,Amit Sharma
0512-0514
15 Document Validation and Verification System
Samit Shivadekar ,Stephen Raj Abraham ,Sheikh Khalid
0515-0518
16 Enhanced data security model for cloud using ECC algorithm and third party auditor
Niyati Jain, Priya Jain, Nikita Kapil
0519-0524
17 A secure authentication and data security for online banking in cloud environment
Ranjana Singh, AS.prof Kite Patil, AS.Prof Ashish Tiwari
0525-0528
18 Partial Face Recognition using Multi key-point Descriptor with Neural Network
John Appu, Ganesh Ghone, Rahul Tandel, Neetu Singh
0529-0531
19 OSN Wall Filtering on Social Networking Site Using Sentiment Technique
Damini Raut, Renuka Tembhurne, Shweta Wakodikar, Trushagni Dongre, Prof. Roshni Bhave
0532-0536
21 A survey on preserving user data privacy on location based services
HARISHA D K, UMASHANKER M L
0542-0546
22 A Comparative Study on Mobile Platforms (Android vs. IOS)
Smt. Annapurna, K.V.S. Pavan Teja, Dr. Y. Satyanarayana Murty
0547-0553
23 Clustering of Web Pages through Feature Weighting: A Survey
Muneer K
0554-0556
24 ASMB (Advanced Smart Media Box)
Shiyaz.T , Sharfudheen.S, Ranjith.U , Vipin.R ,RemyaRamachandran
0557-0563
25 Impact of Online News Media on Consumption Habits of People
Siddhesh Thadeshwar, Prof.Amol Joglekar
0564-0568
26 Analysing the risk of heart disease using ANN
Aarti Londhe, Prof. Amol Joglekar
0569-0572
27 WIRELESS POWER TRANSFER SYSTEM
Chinmay Kolwalkar, Vignesh Nair, Vaibhav More, Kartik Ganjoo
0573-0576
28 Data Size versus Accuracy: Performance by different Data Mining Tools
D. Udhayakumarapandian, RM. Chandrasekaran
0577-0580
29 IMPROVISATION OF SECURITY AND ENERGY OVER A NETWORKING SYSTEM
R. Meena, V. Perumal
0581-0583
30 DroidDetector: An Android application based on Contrasting Permission Patterns
Chinmay Sanjay Kapare, Omkar Sharad Joshi, Ms. Vanessa Rumao
0584-0587
31 Circuit Design of Low Area 4-bit Static CMOS based DADDA Multiplier with low Power Consumption
J. Lakshmi Aparna,Bhaskara Rao Doddi, Buralla Murali Krishna
0588-0592
32 THE EFFECTIVENESS OF AN INVISIBLE SECURITY IMAGE IN INTERNET BANKING
L. Karthika, V. Perumal
0593-0596
33 Black-Hole Attack in MANET: A Study
Minoti Puray, Priyanka Palod
0597-0601
34 Survey of ROI Methodologies for Software Process Improvement
Manas Kumar Yogi, G.Vijay Kumar
0602-0613
35 DNA-Profile Database Building Using STR DNA Marker For Diyala Province Population
Saja Dheyaa Khudhur, Dr. Muayad Sadik Croock, Mohammed Mahdi AL-Zubaidi
0614-0619
36 A Review on 2d, 2.5d and 3d Image visualization Techniques
Mohd. Sherfuddin Khan, Dr. V. H. Mankar
0620-0627
37 Using Particle Swarm Optimization (PSO) Algorithm to Protect Vehicular Ad Hoc Networks (VANETS) From Denial of Service (DOS) Attack
Silas Momanyi Nyabuga, Dr. Wilson Cheruiyot, Dr. Michael Kimwele
0628-0631
38 Automatic Scanning machine with Image clearance using Matlab
Manasi Koli,Neha Jadhav,Shrutika Lokare,Sanket Kothawade
0632-0635
39 Cloud Computing: Overview of Storage Architecture and Data storage security
Miss. Swati I. Bairagi, Prof. Ankur o. Bang
0636-0640
40 A REVIEW ON IMAGE SEGMENTATION TECHNIQUES
P. Sivakumar, Dr. S.Meenakshi
0641-0647
41 Location based Encryption and Authentication of Cloud Data
Atul Kamble,Poonam Mantri, Parmeshwar Shinde, S. B. Nemade
0648-0651
42 Utilizing Mobile for On Campus Location Tracking And Video Calling
Jadhav Sumit, Patil Tejas, Patil Vaibhav, Tayade Vishal
0652-0655
43 FISHERMEN NAUTICAL BORDER ALERT SYSTEM
Aishwarya Dalvi, Ridhee Borad, Nidhi Dawda, Niraj Bangera
0656-0662
44 BIG DATA DIGITAL REFERANCE TECHNOLOGY
CHAUDHARI TEJASVINI P.,MULAY AJINKYA S.,LOHAKARE AVINASH K,NAWARE CHETAN G,Mrs. Pratiksha R. Deshmukh
0663-0666
45 Experimental Findings of Categorial Characterization of Mineral Data Using Clustering Techniques with Focus on K-Mean & SOM
PHARAD DAYANAND S.,GAWALI SHARAD S.,MAHAJAN AMOL A.,MULE SIDDHESHWAR P.,Mrs. Pratiksha R. Deshmukh
0667-0669
46 Security and Privacy Issues in Application from SQL Injections
Priyanka Gupta, Anupam Sharma
0670-0674
47 Note to Coin Exchanger
Pranjali Badhe, Pradnya Jamadhade, Vasanta Kamble, Prof. S. M. Jagdale
0675-0679
48 A Survey on Video Surveillance Using Hadoop
ShashankSupe,SushantShelar,MohanShinde,MayurShinde,BhagyashreePatle
0680-0682
49 Brokerage Cost Reduction by Efficient Information Retrieval Query in Cloud Services
Mr. A.Jahir Husain Ass. Professor, Pradeepa.JB
0683-0697
50 A Simultaneous Text To Speech Conversion System
Vandana Chandola, Pooja Jain, Abhishek Mendon, Dilip Dalgade
0698-0700
51 MITIGATING WEB SPAM TAXONOMY FOR MOBILE APP USING LINK PRUNING AND REWEIGHTING ALGORITHM
A.Mangalakshmi,R.Priyanka,V.Vinothini,G.Rajalakshmi
0701-0704
52 TWO STEP CREDIT RISK ASSESMENT MODEL FOR RETAIL BANK LOAN APPLICATIONS USING DECISION TREE DATA MINING TECHNIQUE
Sudhakar M, Dr. C. V. K Reddy
0705-0718
53 A NOVEL JOB SCHEDULING ALGORITHM TO ENHANCE EXECUTION AND RESOURCE MANAGEMENT USING MAP REDUCE
Ms. P.PRIYANKA, Mr. A. JAHIR HUSAIN
0719-0724
54 Android Application for women security system
Kavita Sharma, Anand More
0725-0729
55 Third party auditor in cloud computing (survey)
Mrs. Mala dutta, Mustafa khan
0730-0736
56 Bluesense: – Technology for Communication and Data Transfer of Temperature, Pulse Rate Data
Prashant Sadaphule, Komal Agarwal, Madhuri Desale,Dhanashri Rajapure ,Bhakti Shendkar
0737-0740
57 Bug Triage with Enhanced Data Reduction using PSO
Ms.G.Kousalya, Mr.S.J.Vivekanandan
0741-0744
58 Enhancement and Efficient Prediction of Fraud Application Based on Ranking and Review
J.Kavitha,D.Vinotha
0745-0748
59 Ultrasonic Collision Prevention System for Vehicles
Pranay Bhandari, Yadnesh Zagade, Meet Patel, Parth Desai, Niyati Soni
0749-0753
60 Industrial Monitoring using Wireless Sensor Network
Akshay Patil,Bhavesh Rewale,OmkarSankhe,Gaurang Vishwasrao,Manoj Mishra
0754-0756
61 RHUI Based Mining for Efficient Discovery of Itemsets in Knowledge Representation
Ms.M.Vijayalakshmi, Mr. S.J.Vivekanandan, Ms.P.Subhashree
0757-0760
62 An Altered Fingerprint and Multi-Biometric System to Enhanced Security Using
Delaunay Triangulation

Ms.V.Mathavi, Ms.T.Bavithra Devi
0761-0764
63 A secure Zero Knowledge Free Re-Authentication Mechanism in AnonyControl Scheme
Ms.S.Kokila, Mrs.D.Vinotha
0765-0768
64 Analysis of Densification Gain for 5G Mobile Technology
Pankaj Shankar Srivastava,Upendra Kumar Agrawal
0769-0771
65 Denial-of-service Attack Detection System Based On Multivariate Correlation Analysis using Triangle Area Maps
Ankush Bhat , Pooja Ingole ,Rahul Ingole , Pooja Garje
0772-0776
66 Methods and techniques to evaluate the performance of Data Cleansing Algorithms for very Large Database Systems
R. Deepa, Dr. R Manicka Chezian
0777-0785
67 Securing the Wireless Sensor Network Communication
Chaya P, Chandra Shekar P
0786-0789
68 Performance Enhancement of Black-Hole Attack in MANETs
Minoti Puray, Priyanka Palod
0790-0797
69 PARALLEL ALGORITHMS AND STRUCTURES FOR IMPLEMENTATION OF MERGE SORT
Ivan Tsmots, Oleksa Skorokhoda, Volodymyr Antoniv
0798-0807
70 Stock Market Value Prediction Using DBSCAN Algorithm
Rinkesh Shah, JairajShettigar, SmeetPurohit, Sweta Jain
0808-0810
71 Social Networking and e-Government: The Role & Its Impact
Ramandeep Kaur, Dipen Saini
0811-0819
72 Internet of Things: Understanding the Security Concerns
Dr.P.B.Pathak
0820-0822
73 Security Detection Using Proposed CBDS (Cooperative bait detection scheme) Algorithm in MANET
Prachi Arya, Gagan Prakash Negi, Kapil Kapoor
0823-0829
74 A SECURE WITH EFFICIENT DATA TRANSACTION IN CLOUD SERVICE
DR.C.K.GOMATHY, V.GEETHA, S.MADHUMITHA, S.SANGEETHA, R.VISHNUPRIYA
0830-0833
75 Towards Online Straight Pathway Estimation
Manoj Shinde, Sitaram Makhane, Jyoti Kharabe, Suraj Borge
0834-0838
76 m-Healthcare Cloud Computing System
Ms.E. Afreen Banu,D. Nishanth, A.Vivek, C. Bala Vignesh
0839-0842
77 A Web Application for Pune Transportation System using Client-Server Technology
Nilambari Dhumal, Pushpa Sasane, Tejal Patil, Shubhangi Kakade
0843-0846
78 Mobile Application for Resolving Citizens Complaints
Gaurav Gawde, Sharvil Sarfare, Shreyash Naik, Vishal Mistry, Harshal Patil
0847-0850
79 Friendbook-Posts Classification and Account Banning for Safety Perspective
Sonali Durgade, Swagata Batwal,Sayali Bagul,Diksha Shetkar,Ass. Prof. Mrs Sangita Nemade
0851-0853
80 Design of Modern Secure Distributed Deduplication Systems with Improved Reliability
Miss. Gore Swapnali , Miss. Gore Supriya ,Miss. Tengale Kanchan, Miss. Tengale Varsha, Prof. S.B.Bandgar
0854-0858
81 Survey on Identification of Network Protocol using Collapsed Variational Bayesian Inference Algorithm
Sadiya S. Sheikh, Lalit Dole
0859-0862
82 GSM BASED LAN MONITORING SYSTEM
BhaweshChavan ,OmkarJalgaonkar, AkshayDeokar , Suresh Choudhary
0863-0865
83 Energy Efficient Approach to Find Complete Node Disjoint Multipath in AODV Using Directional Forwarding Scheme
Er.Ashima Goyal, Er. Sushil Kamboj
0866-0871
Remaining Papers will be available soon….