Vol. 4 No. 02 (2015)

Published: 2017-12-29

Articles

  • Automation of Electricity Management

    Sayali Gore, Anmol Bhegade Priyanka Dhaybar
    157
  • A Data Mining Approach To Insurance Risk Analysis

    Akinsola Adeniyi F, Sokunbi M.A , Lawal .O.N Okikiola F.M
    199
    229
  • Survey of SMS Based FAQ Retrieval Systems

    Jotsna Waghmare, s. M. A. Potey
    188
    225
  • A Smart Real Time Ridesharing And Travel Assistance

    Aarthi R
    232
  • A Survey Of Digital Watermarking Techniques

    Sumedh P. Ingale, Dr.C.A.Dhote
    211
    215
  • IVR System for three phase motor protection, Control and Alert system using GSM

    Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
    226
    270
  • Performance Analysis of Fault Tolerance using Clustering Scheme for Wireless Sensor Network

    Swati P. Wankhede, A. N. Thakare
    216
    239
  • Design and Implementation of Multiple LED Notice Boards by Using ZIGBEE Technology

    Vishal S. Deshmukh, Saurabh M. Titre,Salim A. Chavhan, , Shyam D. Bawankar
    202
    227
  • Big-O Test of RSA Algorithm Complexity in Civil DataBase ( SIN / eID )

    Jutono Gondohanindijo, Eko Sediyono
    299
    225
  • Development Of A Circulation Library System(Case Study Of T.Y Danjuma Library - Acu)

    Oguntoke Kawthar, Ayeni Joshua , Makinde Oladayo
    268
    235
  • A Comprenssive Survey On Different Methods For Detecting Salient Object

    Manish M. Paliwal, Prashant N. Chatur
    234
    201
  • Performance Evaluation of AODV and DSR Protocols in MANET

    Prachi Mishra, Neelesh Gupta
    194
    229
  • Decision Trees for Uncertain Data

    Rohit Sutar , Ashish Malunjkar , Amit Kadam Pravin Jadhav , Prof. Shalini Wankhade
    221
    218 209
  • Identify Obstacles of Different Types in the Path of UGV Using Region Based Image Segmentation

    Rajinder Kaur, Amanpreet Kaur
    190
    338
  • Heart Rate Frequency Detection System Based On Digital Signal Processing

    Pandipriya.J, Jegan Antony Marcilin
    199
    361
  • Social Sensing: An Exploratory Investigation for Smart City

    Rajesh Kumar Sahu, Lokesh Kumar, Vinod Kumar
    203
    229
  • An Efficient Pairwise Key Establishment Scheme for Wireless Sensor Networks Using ORP

    Gisha N, Jeena Sara George Sushitha Susan Joseph
    176
    208
  • Survey on Evaluation of Recommender Systems

    Shraddha Shinde, M. A. Potey
    173
    246
  • Steganalysis using hopping cluster algorithm

    Ramandeep Kaur, Arshdeep Singh
    171
    250
  • Design of FIR filter using Matlab Simulink and Xilinx system generator

    Priti R. Chandak, Vipul P.Giradkar Amol T.Wadmalwar
    245
    259
  • Result Evaluation of Dynamic Topology Control Using Quality Estimation Factors for Mobile Ad-Hoc Network

    Jitendra Tiwari, Jasneet Kaur, Jitendra Tiwari, Jasneet Kaur
    212
    203 0
  • Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm

    Madhav Prasad Namdev, Anil Kumar, Varun Bansal
    221
  • Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

    Vrushali K Gaikwad, Ramesh Kagalkar
    159
    194
  • Survey on A Methodology for Sensitive Attribute Discrimination Prevention In Data Mining

    Naziya Tabassum Qazi , Ms.V.M.Deshmukh
    190
    206
  • Factor Authentication for Banking System by using Android based Smart Phones

    Krishna P. Tayade, Omkar R. Chorghe , Mr. Swapnil R. Sawan Ravi C. Munde , Mr. Akshay R. Misal
    208
    214
  • Survey on Improving System Security using BGP and IP Prefix Hijacking

    Trishula A.Hajare, D.A.Chaudhari
    171
    200
  • An Efficient Solution To Task Scheduling And Memory Partitioning For Uniprocessor

    Jenish Ponraj Peter.J B.E, Navaneethan.S M.E
    187
    199
  • A Survey of Trust Management using types of Uncertain Reasoning in Network Environment

    Kadiwala shabnam , Swapnil R.Andhariya
    188
    227
  • Online Mobile Cloud Based Compiler

    Pooja D. Pawar, Sheetal S. Rai, Madhuri V. Sherawade
    190
    203
  • External radiation dose measurement in private nuclear medicine and diagnostic x-ray facilities in Bangladesh

    M Haider, S Shill , L Begum QMR Nizam, M Haider, S Shill , L Begum QMR Nizam
    219
    218
  • Specification of Software Components

    Manjeet kaur, Harmanjot Kaur , Kanchan Kumari ,Harpinder Kaur
    191
  • istribution Based Model to Improve the Tradeoff between Reliability and Energy Efficiency

    V.Krishnapriya, S.Naveena
    211
    214
  • Survey On Business Model For Cloud Computing Using Rsa & Aes Algorithm

    Prachi Bhagat, Asmita Dhamale Ishita Saraf , Madhuri Thorat
    186
    206
  • ITS Cluster Based Efficient Exemplar Image Inpainting Technique

    Kiran R.Sole, Swati Patil
    202
    198
  • Enhancing Data Security in Neural Network Computing Using Biometrics

    C.R., Kavitha
    159
    216
  • Expansion Of Current Wi-Fi Implementation Through Energy Efficient Way

    Nithin, S.Sivan
    155
    218
  • Query Recommendations for Interactive Database Exploration

    Sruthi T.K
    180
    227
  • Dynamic Route Allocation for Guaranteed Data Delivery in Mobile Ad Hoc Networks using DPRP & VDVH

    Ruchee Sadani, Shreya Jain
    206
    222
  • Privacy-Preserving Public Auditing for Shared Data in the Cloud

    C. M. Jadhav, .S.D. Shabade
    200
  • Frequent Pattern Mining

    Tanmay bapu, kadam
    180
    198
  • A Combined Effective Time Dependent Matrix Approach to Analyze the Men Affected by Cardiovascular Disease (CVD) in Chennai

    M. Clement Joe Anand, M. Lathamaheswari
    202
    224
  • Clustering of E-mails Using Pattern Matching

    Bhavana Pansare, Yamini Chaudhari, Pradnya Deshmukh Deepti Mutalik-Desai , Tanuja Khedkar
    195
    240
  • Identity-Based Encryption for Preserving Privacy In Cloud For Publish/Subscribe System

    D.Devisri, J.Ramya, T.Kalaichelvi
    163
    207
  • Efficient Validation and Source Aloofness in Wireless Sensor Networks

    Priya.G.S, Muthulakshmi.B
    118
    192
  • Image Registration Techniques: A Review

    Parita P Vaghasiya, Pankaj Kumar Gautam
    126
    201
  • A Novel Approach For Authorized Deduplication

    Anup V. Adke, Akash N. Nawale Pravin N. Jadhav Vijayandra A. Yeole, Kavita S. Kumavat
    166
    177
  • Security Lock System for Fake Traits Based on Image Processing

    G. pratibha
    144
    183
  • Image Enhancement using DWT

    Prasad D. Boraste, Kalvadekar.P.N
    143
    208
  • Secure Mechanism for Credit/Debit Card Transaction Fraud Detection by using Fingerprint Authentication System

    Priyanka Jamdar, Supriya K. Bendale Jyoti G. Hulsure
    172
    199
  • Survey on Efficient Retrieval of Nearest Neighbor over Relational Database by using Keywords

    Nikita R. Barge, . Pravin R. Barapatre
    138
    191
  • Speed Control and Direction Control of Dc Motor Using Arm7

    K.A.Wadile, S.R.Chillarge , D.D.Jadhav
    153
    422
  • On Demand Load Balance Secure Routing Scheme For Mobile ADHOC Network

    Shishir Patra, Jajati Mallick
    251
    200
  • An Effective Load Balancing In Long Term Evaluation Self Optimization Network Using Multi Objective Optimized Algorithm

    R.Nandhini, S.Uma Maheswari
    130
    205
  • An Efficient Image Forgery Detection Method with Dempster Shefer’s Theory for Detecting Jpeg Anti-Forensics

    K.Karthika, P.Damodharan
    131
    185
  • Task Ranking Based Allocation of Scientific Workflows in Multiple Clouds with Deadline Constraint

    T.Gayathri, B.Vinitha Subashini
    125
    197
  • Mobile barcode system with Inventory management and Employee work tracking using Google Analytics

    Arshad Shaikh, Sanjay Mali Suraj Tambe , Akshay Yadav
    157
    275
  • Design and Analysis of Low Power Pulse Triggered Flip-Flop

    V.Kavipriya, K.Sedhuramalingam
    107
    194
  • Literature Review on Fem Analysis Of Disc Brake System

    N. B. Shinde , B.R. Borkar
    191
    568
  • Geometry Based Efficient Routing Protocol In Wireless Sensor Networks

    Radhika A. Narwaria, S.R.Gupta , S.M.Balwani
    143
    196
  • Virtual Mouse using Eye Tracking and Face in various Illumination Environment.

    Krishna Tayade, Sujata Kale , Anjoo Chaurasiya Mrunalee Deshmukh
    139
    176
  • Detecting Attack Packets by Using Darpa Dataset on Intrusion Detection System

    Sarika Rameshwar , rathi
    124
  • Comparative Study of Error Performance in Modulation Schemes for VLC Systems

    Ankita Choubey deepak sharma
    168
    213
  • Clipping Technique for BER and PAPR Reduction in OFDM System

    J. P. Panwar, .Y.K.Jain
    159
    193
  • BER and PAPR Reduction in OFDM System By Using Companding Technique

    J. P. Panwar, Y.k.jain
    122
    197
  • A Novel Non Linear Distortion Suppressed, Pre-Compensation for A 10.7-Gb/S System Employing A Directly Modulated Laser

    V.S.R.Kumari, Muppalla Papa Rao
    155
    214
  • New Compressive Sensing Inter Cluster Data Aggregation Based Ileach Protocol For Homogenious Wsns

    Mandeep Kaur, Harmandeep Singh
    114
    200