Volume 6 Issue 5 May 2017

Volume 6 Issue 5 May 2017

S.No. Title and Authors of Paper Page.No.
01 Smart Band Ambulance System
Shubhanshu Singh Patwal, Rohit Kumar, Rishabh Mishra
559-563
02 Virtual mouse using sixth sense technology
Swati Tiwari, Siddhi Parkar, Shruti Gharat, Kinjal Patel, Prof. Khalil Pinjari
564-567
03 Adaptive Replication Management using Predictor for HDFS
I.Sugapriya,K.Bhuvaneswari
568-573
04 Providing De-Duplication And Fault Tolerance On Cloud Storage
S.Maniyarasi ,V.Snehalatha
574-579
05 Enhancing Security And Efficiency In Cloud Server Based On MRSE
S.KALAIMATHI, Mrs. K.BHUVANESHWARI
580-585
06 Review for Twitter Sentiment Analysis Using Various Methods
Avinash Surnar, Sunil Sonawane
586-588
07 A Research Study On Blue Brain
Suryanshu Bakshi, Shravan Das, Rishabh Mishra
589-593
08 DESIGN OF A RECONFIGURABLE MICROSTRIP ANTENNA FOR FUTURE MOBILE APPLICATIONS
Preeti Vyas, Ashok Kumar Kajla, Rahul Raj Choudhary
594-598
09 Automated Precision Farming using Internet of Things
Himanshu Gupta, Vinita Pareek, Richanshu Mishra, Lavanya K
599-603
10 INTENSIFYING SECURITY IN SERVER LOAD BALANCING IN WSN
Gayathri.V, Kayalvizhi.R
604-609
11 A review on methods of Duplicate Detection
Ms. Laxmi R Adhav, Ms. Monali A. Gurule
610-613
12 IMPLEMENTATION OF SMART CRAWLER FOR EFFICIENTLY HARVESTING DEEP WEB INTERFACE
Rizwan k Shaikh, Deepali pagare, Dhumne Pooja, Baviskar Ashutosh
614-620
13 Human identification on the basis of finger dorsal image
Waykar Pratik Kisan, Mulujkar Rahul M
621-623
14 A Review of Clustering Technique Based on Different Soft Computing Approach
Mr. Gajendra Dangi, Ms.Malti Nagle, Mr.Tarique Zeya Khan
624-628
15 Mining Facets For Queries From Their Search Results
Afreen Anjum T. khan,Prof. R. R. Keole
629-635
16 Information Retrieval Based On Relevance Feedback Algorithm
Dipalee S. Hirde,Prof. R. R. Keole
636-642
17 A Brief Survey on Solar Power Plant Electricity Sensor Reads Using IOT Devices to Get a Data in Mobile App
Ashwini R Mali Patil,Apoorva B S,Libiya R
643-647
18 Implementation on Solar Power Plant Electricity Sensor Reads Using IOT Devices to Get a Data in Mobile App
Ashwini R Mali Patil,Manasa K G, Poornima H R
648-651
19 Compelling Protection Schemes for Phishing Attacks On Cell Phones
Ms. Rajeshwari S, Manasa K G, Sushmitha N, Yashashwini B
652-657
20 Energy-Efficient and Reliable Routing for Versatile Wireless Sensor Networks
Mrs.Neha Singhal,Lekha B S,Yashashwini B
658-663
21 Shareware Evolution in Globally Scatter Product Development
M. Ramakoteswara Rao
664-673
22 Reliable Completion of Images: A Survey
Rahul Ahiray, Pavan Ambhure, Parthasarthi Bapat, Akshay Avhad, Prof. Shital Bhandare
674-676
23 Performance Analysis of Local Binary Pattern Variants in Texture Classification
Ch. Sudha Sree, M. V. P Chandra Sekhara Rao
677-684
24 Vitality Efficient Flat and Hierarchical Routing Protocols In Remote Sensor Networks
Mrs. Neha Singhal,Sushmitha N,Priyanka C
685-691
25 Web Page Design for Patient Monitoring System
Noor Kadhim, Hassan Jaleel
692-696
26 A STUDY OF CITIZEN INVOLVEMENT IN E-GOVERNMENT PROJECTS IMPLEMENTATION
MALLESHWAR RAO BALIWADA,PROF. MOHD. AKBAR ALI KHAN
697-703
27 Cross breed Provable Data Possession at Untrusted Stores in Cloud Computing
Dr.R.Balakrishna, Prasad.A.Y, Geethanjali.S, Shravani P.M
704-708
28 Deduplication on Scrambled Enormous Information in Cloud
Dr.R.Balakrishna, Prasad.A.Y, Monika R, Megha S
709-715
29 Study and analysis of data encryption techniques and implementation using MATLAB programming
Ananya Banerjee, Swarnendu Moitra, Urmee Karmakar, Sayan Chowdhury, Saheli Datta, SandipanDebnath
716-719
30 An Improved Approach for the Classification of Exudates from Fundus Image
Dr.S.Batmavady, Nandhini. K
720-722
31 A Review: Prediction of Election Using Twitter Sentiment Analysis
Pritee Salunkhe, Avinash Surnar, Sunil Sonawane
723-725
32 A Survey Paper on Cloud Computing Based CDA Generation and Integration system for exchanging Health Information
Miss. Rohini A. Dhote,Mr. Vinod S. Gangwani
726-729
33 A LITERATURE SURVEY ON BIOMETRIC STEGANOGRAPHY USING VISUAL OBJECT FOR REMOTE AUTHENTICATION
Veda D, Bhargavi V, Harshitha S, Navyashree S
730-735
34 Reorganization of Devnagari Script Character Using Genetic Algorithm
Sushilkumar N. Holambe,Dr. Ulhas B. Shinde,Shrikant D. Mali
736-743
35 DEVANAGARI SCRIPT SEPARATION AND RECOGNITION USING MORPHOLOGICAL OPERATIONS AND OPTIMIZED FEATURE EXTRACTION METHODS
Sushilkumar N. Holambe,Dr. Ulhas B. Shinde,Shrikant D. Mali
744-748
36 Affective Learning with Thought Mining
Uzma Farheen , Dr.Anjali B.Raut
749-758
37 EFFECTIVE AND SECURED INFORMATION EXCHANGE WITH LOAD EQUALIZATION AND CONNECTIVITY PROTECTION IN VERSATILE SENSOR NETWORKS
Mr. Prasad A Y,Lekha B S, Bhargavi V
759-766
38 Secured E-Banking services using CBM
JELPHINA LOBO, ZAHIR AALAM
767-772
39 A Study of Background Modeling
Ana M. Herrera,José A. Palacios, Hugo Jiménez, Alejandro Romero, Sandra L. Canchola, Carlos A. Olmos
773-777
40 Review on Keyword Processing According to Rank in LBSP (Location-Based Service Providers)
Miss Apeksha B. Nachone,Prof. Karuna G. Bagde
778-782
41 FACTORS THAT INFLUENCE THE CHOICE OF VIRTUALIZED ENVIRONMENTS IN SMALL MEDIUM ENTERPRISES
Vincent Motochi, Dr. Samuel Mbugua, Dr. Shem AngoloMbandu
783-805
42 SECURITY ISSUES IN VIRTUALIZED ENVIRONMENTS FOR SMALL AND MEDIUM ENTERPRISES
Vincent Motochi, Dr. Samuel Mbugua, Dr. Shem AngoloMbandu
806-824
43 APPLICATION OF INTERNET OF THINGS IN AUTOMATED IRRIGATION SYSTEM (3 PHASE)
ASHWINI R, KRUTHI P BHASKAR, K.V RAKSHITH
825-827
44 Location of Base Station in WSN Using Harmony Search Algorithm
Latha M.N, Kruthi P Bhaskar, Prasad A Y
828-832
45 An Efficient Approach For Information Retrieval Based On Relevance Feedback Algorithm
Dipalee S. Hirde,Prof. R. R. Keole
833-839
46 Developing the Ede Language Processing Applications Based on the Vietnamese-Ede Vocabulary Database
Hoang Thi My Le
840-843
47 ENCRYPTED DATA HIDING IN CRYPTOGRAPHY PROCESS USING KEYLESS ALGORITHM
M.Jayabharathi,M.Harikrishnan.
844-850
Remaining Papers will be available soon….