S.No. |
Title and Authors of Paper |
Page.No. |
01 |
Smart Band Ambulance System
Shubhanshu Singh Patwal, Rohit Kumar, Rishabh Mishra |
559-563 |
02 |
Virtual mouse using sixth sense technology
Swati Tiwari, Siddhi Parkar, Shruti Gharat, Kinjal Patel, Prof. Khalil Pinjari |
564-567 |
03 |
Adaptive Replication Management using Predictor for HDFS
I.Sugapriya,K.Bhuvaneswari |
568-573 |
04 |
Providing De-Duplication And Fault Tolerance On Cloud Storage
S.Maniyarasi ,V.Snehalatha |
574-579 |
05 |
Enhancing Security And Efficiency In Cloud Server Based On MRSE
S.KALAIMATHI, Mrs. K.BHUVANESHWARI |
580-585 |
06 |
Review for Twitter Sentiment Analysis Using Various Methods
Avinash Surnar, Sunil Sonawane |
586-588 |
07 |
A Research Study On Blue Brain
Suryanshu Bakshi, Shravan Das, Rishabh Mishra |
589-593 |
08 |
DESIGN OF A RECONFIGURABLE MICROSTRIP ANTENNA FOR FUTURE MOBILE APPLICATIONS
Preeti Vyas, Ashok Kumar Kajla, Rahul Raj Choudhary |
594-598 |
09 |
Automated Precision Farming using Internet of Things
Himanshu Gupta, Vinita Pareek, Richanshu Mishra, Lavanya K |
599-603 |
10 |
INTENSIFYING SECURITY IN SERVER LOAD BALANCING IN WSN
Gayathri.V, Kayalvizhi.R |
604-609 |
11 |
A review on methods of Duplicate Detection
Ms. Laxmi R Adhav, Ms. Monali A. Gurule |
610-613 |
12 |
IMPLEMENTATION OF SMART CRAWLER FOR EFFICIENTLY HARVESTING DEEP WEB INTERFACE
Rizwan k Shaikh, Deepali pagare, Dhumne Pooja, Baviskar Ashutosh |
614-620 |
13 |
Human identification on the basis of finger dorsal image
Waykar Pratik Kisan, Mulujkar Rahul M |
621-623 |
14 |
A Review of Clustering Technique Based on Different Soft Computing Approach
Mr. Gajendra Dangi, Ms.Malti Nagle, Mr.Tarique Zeya Khan |
624-628 |
15 |
Mining Facets For Queries From Their Search Results
Afreen Anjum T. khan,Prof. R. R. Keole |
629-635 |
16 |
Information Retrieval Based On Relevance Feedback Algorithm
Dipalee S. Hirde,Prof. R. R. Keole |
636-642 |
17 |
A Brief Survey on Solar Power Plant Electricity Sensor Reads Using IOT Devices to Get a Data in Mobile App
Ashwini R Mali Patil,Apoorva B S,Libiya R |
643-647 |
18 |
Implementation on Solar Power Plant Electricity Sensor Reads Using IOT Devices to Get a Data in Mobile App
Ashwini R Mali Patil,Manasa K G, Poornima H R |
648-651 |
19 |
Compelling Protection Schemes for Phishing Attacks On Cell Phones
Ms. Rajeshwari S, Manasa K G, Sushmitha N, Yashashwini B |
652-657 |
20 |
Energy-Efficient and Reliable Routing for Versatile Wireless Sensor Networks
Mrs.Neha Singhal,Lekha B S,Yashashwini B |
658-663 |
21 |
Shareware Evolution in Globally Scatter Product Development
M. Ramakoteswara Rao |
664-673 |
22 |
Reliable Completion of Images: A Survey
Rahul Ahiray, Pavan Ambhure, Parthasarthi Bapat, Akshay Avhad, Prof. Shital Bhandare |
674-676 |
23 |
Performance Analysis of Local Binary Pattern Variants in Texture Classification
Ch. Sudha Sree, M. V. P Chandra Sekhara Rao |
677-684 |
24 |
Vitality Efficient Flat and Hierarchical Routing Protocols In Remote Sensor Networks
Mrs. Neha Singhal,Sushmitha N,Priyanka C |
685-691 |
25 |
Web Page Design for Patient Monitoring System
Noor Kadhim, Hassan Jaleel |
692-696 |
26 |
A STUDY OF CITIZEN INVOLVEMENT IN E-GOVERNMENT PROJECTS IMPLEMENTATION
MALLESHWAR RAO BALIWADA,PROF. MOHD. AKBAR ALI KHAN |
697-703 |
27 |
Cross breed Provable Data Possession at Untrusted Stores in Cloud Computing
Dr.R.Balakrishna, Prasad.A.Y, Geethanjali.S, Shravani P.M |
704-708 |
28 |
Deduplication on Scrambled Enormous Information in Cloud
Dr.R.Balakrishna, Prasad.A.Y, Monika R, Megha S |
709-715 |
29 |
Study and analysis of data encryption techniques and implementation using MATLAB programming
Ananya Banerjee, Swarnendu Moitra, Urmee Karmakar, Sayan Chowdhury, Saheli Datta, SandipanDebnath |
716-719 |
30 |
An Improved Approach for the Classification of Exudates from Fundus Image
Dr.S.Batmavady, Nandhini. K |
720-722 |
31 |
A Review: Prediction of Election Using Twitter Sentiment Analysis
Pritee Salunkhe, Avinash Surnar, Sunil Sonawane |
723-725 |
32 |
A Survey Paper on Cloud Computing Based CDA Generation and Integration system for exchanging Health Information
Miss. Rohini A. Dhote,Mr. Vinod S. Gangwani |
726-729 |
33 |
A LITERATURE SURVEY ON BIOMETRIC STEGANOGRAPHY USING VISUAL OBJECT FOR REMOTE AUTHENTICATION
Veda D, Bhargavi V, Harshitha S, Navyashree S |
730-735 |
34 |
Reorganization of Devnagari Script Character Using Genetic Algorithm
Sushilkumar N. Holambe,Dr. Ulhas B. Shinde,Shrikant D. Mali |
736-743 |
35 |
DEVANAGARI SCRIPT SEPARATION AND RECOGNITION USING MORPHOLOGICAL OPERATIONS AND OPTIMIZED FEATURE EXTRACTION METHODS
Sushilkumar N. Holambe,Dr. Ulhas B. Shinde,Shrikant D. Mali |
744-748 |
36 |
Affective Learning with Thought Mining
Uzma Farheen , Dr.Anjali B.Raut |
749-758 |
37 |
EFFECTIVE AND SECURED INFORMATION EXCHANGE WITH LOAD EQUALIZATION AND CONNECTIVITY PROTECTION IN VERSATILE SENSOR NETWORKS
Mr. Prasad A Y,Lekha B S, Bhargavi V |
759-766 |
38 |
Secured E-Banking services using CBM
JELPHINA LOBO, ZAHIR AALAM |
767-772 |
39 |
A Study of Background Modeling
Ana M. Herrera,José A. Palacios, Hugo Jiménez, Alejandro Romero, Sandra L. Canchola, Carlos A. Olmos |
773-777 |
40 |
Review on Keyword Processing According to Rank in LBSP (Location-Based Service Providers)
Miss Apeksha B. Nachone,Prof. Karuna G. Bagde |
778-782 |
41 |
FACTORS THAT INFLUENCE THE CHOICE OF VIRTUALIZED ENVIRONMENTS IN SMALL MEDIUM ENTERPRISES
Vincent Motochi, Dr. Samuel Mbugua, Dr. Shem AngoloMbandu |
783-805 |
42 |
SECURITY ISSUES IN VIRTUALIZED ENVIRONMENTS FOR SMALL AND MEDIUM ENTERPRISES
Vincent Motochi, Dr. Samuel Mbugua, Dr. Shem AngoloMbandu |
806-824 |
43 |
APPLICATION OF INTERNET OF THINGS IN AUTOMATED IRRIGATION SYSTEM (3 PHASE)
ASHWINI R, KRUTHI P BHASKAR, K.V RAKSHITH |
825-827 |
44 |
Location of Base Station in WSN Using Harmony Search Algorithm
Latha M.N, Kruthi P Bhaskar, Prasad A Y |
828-832 |
45 |
An Efficient Approach For Information Retrieval Based On Relevance Feedback Algorithm
Dipalee S. Hirde,Prof. R. R. Keole |
833-839 |
46 |
Developing the Ede Language Processing Applications Based on the Vietnamese-Ede Vocabulary Database
Hoang Thi My Le |
840-843 |
47 |
ENCRYPTED DATA HIDING IN CRYPTOGRAPHY PROCESS USING KEYLESS ALGORITHM
M.Jayabharathi,M.Harikrishnan. |
844-850 |
|
Remaining Papers will be available soon…. |
|