Vol. 4 No. 03 (2015)

Published: 2017-12-29

Articles

  • A Literature Review of Reliable Multipath Routing Techniques

    Versha Matre , Reena karandikar
    276
    258
  • Secure Video watermarking Algorithm Using K-harris feature point detection with dual watermarks

    Ekta, Dr. Naresh Kumar Garg
    234
    226
  • A Study of Various Web Page Recommendation Algorithms

    Pallaviben J Gohil, Krunal Patel
    206
    230
  • TOXICITY STUDY OF KAJJALI WITH SPECIAL REFERENCE TO DIFFERENT SAMPLES OF PARADA

    Gaurav Desai, R. S. Hiremath
    464
    295
  • Supporting Search-As-You-Type among Multiple Tables using Multi-Join and Top-k Query Model

    J.Shanmugheswari1, M.Sugashini2, V.Hemalatha3, Dr.P.Gomathi
    186
    239
  • Android Server For Wlan Control And Management

    Prof. Ashvini Jadhav1, Mr.Akshay L. Gosavi2,Miss.Vrushali R. H Mr.Nikhil S. Thite4, Miss.Mamta B. Sawle
    219
    240
  • Effect of Temperature on Maximum Power Point of Photovoltaic Module

    Mrs AbubakarAbisetu1, DrDominicS.Nyitamen2,Dr Nnorom Achara3
    208
    213
  • Development of Mathematical Model to Predict the Removal Rate of Zinc in Zinc Barrel Plating wash water using Full Factorial Design

    S. Kalaivani1, Dr. S. Ananthalakshmi2
    246
    213
  • Cervical Implementation of Image Restoration Schema Using Digital Image Processing Techniques

    S. P. Victor, A. Shakul Hamid
    203
    207
  • Effect Of Routing Packet Overheads On Routing Protocols

    Prof. C. M. Jadhav1, Miss. Tejaswini. P. Patil2
    242
    227
  • Revamp the Power Consumption in MANET by designing EPARDA routing Protocol

    Abinesh.T 1, Ganesan.T 2
    236
    236
  • Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach

    Mr. Patankar Nikhil S., Prof.P.P.Rokade
    223
    220
  • Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

    Miss. Sumita S.Chandekar1, Mr. Sunil Malviya2
    219
    223
  • Image processing and Biometric Approach for Licence and Vehicle documents verification

    Yuvraj Nikam1,Miss .Monika N.Walunj2, Miss. Pooja M.Paranjape3, Mr. Ruturaj A.Kumbhar4, Mr. Subodh R.Pawar 5
    183
    251
  • Provable Data Possession Securing The From Untrusted Server

    J.Praveen, S.Karthikeyan, Mrs Sumathy
    189
    207
  • Intelligent Access Smart Grid System,Metering and Monitoring

    J.Nivetha1. Dr.K.Sundaravadivu2
    195
    206
  • Role of Robot Scientists and Artificial Intelligence in Drug discovery

    Anand M1, Clarice Susan2
    215
    267
  • Bluetooth Chat Application: Bluez

    Aishwarya S Bote, Nitish Ghare, Pravin Kumar Rahurkar, Mandar Latkar
    531
    844
  • A Survey on Various Developments In The Field Of Computer Science

    Anik Shah, Animesh Shah
    183
    216
  • Practically observation of standard Minute Value of T-shirt

    Md.Ramij Howlader1 Md.Monirul Islam (Rajib)2 Md.Tanjibul Hasan Sajib3
    211
    220
  • Improving the Hybrid Ad hoc Network Routing Performance Using RMECR Algorithm and Lightweight protocol

    R Priya, H Prabavathi
    181
    217
  • C.A.D. & F.E.M. ANALYSIS OF DISC BRAKE SYSTEM

    Er. N. B. Shinde1, Prof. B.R. Borkar2
    262
    521
  • HyPACK: Hybrid Prediction-Based Cloud Bandwidth and Cost Reduction System

    Ms.Pratibha A Kuber , Ms.Garima Makhija
    210
    219
  • Minutiae Matching Algorithm For Partial Fingerprints

    Lekshmi S P
    216
    195
  • Data DeDuplication Using Optimized Fingerprint Lookup Method for Cloud Storage Using Android

    Prof. Sulbha Ghadling , Piyush Mehta, Piyush Oswal, Rohit Padwal, Amit Mohol
    186
    230
  • A newer method and its comparison with other available methods in wireless sensor network

    Jyoti Sharma1, Beerendra Kumar2
    200
    215
  • A Survey Report on Risk-aware Role-based Access Control Model

    Bhoomi Pipaliya 1 Vinay Harsora 2
    218
    199
  • A Review: Intelligent Pick and Place System by Using Practical Robotic Minimal Grasper

    Dhairyashil M. Patil, Dr. S.K. Shah,
    169
    209
  • Improving Network Performance Using An Intrusion Detection & Adaptive Response Approach For Manets

    Karthigha M, Rangarajan Gowtham S
    207
    200
  • A New Technique for Low Power Double Tail Comparator Using Parallel Mechanism

    Remya Ayyappan
    217
    224
  • RFID-Based Tracking System

    Mr.G. Manikandan 1, Mr.N.Mathavan 2 , Mr.M.Paramasivan3, T.Ashly 4
    203
    226
  • EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

    K.Priyanga,V.Radhika, ,Mrs.Josepha Menandas M.E., ,L.D.R.Vinoodune,
    235
    213
  • Android Parental Tracking

    Tejal D. Katore 1 , Tejaashri M. Ghule 4 Prof .Tamhane K. D Gayatri R. Ghogare 2 Dipeeka R. Shinde
    195
    214
  • Comparative Analysis Of Methods For Semi- Supervised Dimensionality Reduction

    Archana H.Telgaonkar1, Sachin Deshmukh1
    188
    206
  • Responsive Web Design

    Anushree Rajesh Nene
    275
    205
  • Face Captcha

    Prof. N. B. Kadu 1, Pushkar U. Wable2, Swati K. Wale3, Dipti B. Tambe4, Amol P. Londhe5
    187
    228
  • Cloud Based Real Time Anti Vehicle Theft By Using LP Recognition And OCR Recognition

    R. Ramachandran, R. , Manivannan, R. Ramachandiran, N. Balachandar
    184
    217
  • Vulnerable Attitude of Road user using Fuzzy Matrix Technique

    A. Victor Devadoss1 , S.M.A. Shahul Hameed2
    172
    196
  • Analysis of Use Cases and Use Case Estimation

    Abhishek Chaudhary , Nalin Chaudhary , Aasiya Khatoon
    268
    195
  • A Social Chat Network Site With User Anonymity Consideration

    Oyinloye O.Elohor, Akinyemi B.Peter
    211
    208
  • Advanced Security System Using Finger Vein Recognition

    M.Soundarya, J.Rohini, V.Pavithra V.Ramya S.Nithya
    135
    171
  • Finger Print Based Door Locking System

    A. Aditya Shankar1, P.R.K.Sastry2, A. L.Vishnu Ram3 , A.Vamsidhar4
    214
    1847
  • Survey on Threat management system

    Aniket Tare1, Mrunal Funde2, Shraddha zade3,Vaishnavi khati4
    122
    180
  • Sketch Based Photographs Retrieval System

    Mrs.Shameera S.L,# B.E(M.E), Mr.P.Gopalakrishnan
    153
    176
  • Single Sign on Mechanism

    Priyanka Jagtap, Shraddha Karande, Pratibha Kohinkar,Tazeen Mansuri
    151
    185
  • An Improved Image Watermarking Using LTVC Scheme

    Aswathy. S
    134
    187
  • Deploying Relay Nodes with Controllable Mobility to Conserve Power in MANETs

    Priya S 1, Karthikeyan M 2
    117
    181
  • Improving Return loss of Microstrip Patch antenna using AMC

    Madhusudan A. Mohite, Sandeep C. Munghate, Subodh N. Pandharkame
    113
    184
  • Improving efficiency of hybrid Intrusion Detection System using kmeans and Naïve Bayes

    Pushpak singha, Rahul lakkadwala, Anup sheth, akshay gaikwad, Megha V. kadam
    138
    201
  • Comparison between PMC AND AMC

    Madhusudan A. Mohite1, Tirupati L.Iltapawar2, Krunal P.Rane3
    400
    747
  • Information System Based On College Campus

    Shilpa Bilawane, Pranali Jambhulkar
    168
    225
  • Analysing Uncertain Data by Building Decision Tree

    Megha Pimpalkar1, Garima Singh2,
    139
    189
  • Inferring User Search Goals with feedback Sessions using Fuzzy KMeans Algorithm

    Mr.Gajanan Patil, Miss.Sonal Patil
    221
    232
  • Performance Analysis of Shunt Active Power Filter Using Pi Controller

    Md. Jahid Hasan1, Ahmed Abdullah2, Apu Samadder 3
    121
    198
  • Twice Precaution during Transmission of Hidden Data

    Amrapali Bhandare, Dinesh Patil & Rahul Shete,
    130
    186
  • Sign Language Recognition for Deaf and Dumb People

    Y.M.Pathan1, S.R.Waghmare2, P.K.Patil3
    303
    246
  • Complete Library Control Robot

    Arumugaraja.M, Revathi.M, Roja.S
    137
    167
  • Design & Simulation of MHD Antenna for Wireless Applications

    Kuldeep Lakra , Amit Kumar, Gyanender Kumar
    163
    184
  • RFID Based Intelligent Trolley System using Zigbee

    Aniket Wani1 Krutika Thakur2, Nikhil Vaze3, Meeta Vadhel4 , Prof. Rupali Advirkar5
    192
    228
  • PC Controlled Car for Terrain Detection

    Ashwin Pais1, Jivitesh Gudekar2, Pinak Kelkar3, Jay Borade4
    132
    191
  • Survey Paper on Automatic Speaker Recognition Systems

    Miss. Sarika S. Admuthe1 Mrs. Shubhada Ghugardare
    158
    192
  • Estimating The Age Of Human Face In Image Processing Using Matlab

    Aditi Sengupta1 , Piyas Mondal2
    126
    210
  • Bi-orthogonal wavelet transform based video watermarking

    Aswathy K.Nair1, Flower Abraham Mundackal2
    128
    168
  • A Proficient Extreme Learning Machine Approach For Tracking And Estimating Human Poses.

    Dr.P. Tamije Selvy1, T. Renuka Devi2, R.Siva Keerthini3, S.Umamaheswari4
    122
    187
  • Security Suite

    Tanmay Ghawate1, Chaitanya Patel2, Rushikesh Bargaje3, Kamlakar Kadam4, Prof. Harmeet Khanuja5
    132
    190
  • A Probabilistic Approach for Anomaly Detection In Social Streams

    S. Sundara Selvi, Mr. K.Durairaj
    108
    201
  • A Novel Secure Multiparty Algorithms in Horizontally Distributed Database for Fast Distributed Database

    S.Pavithra, P.Prasanna
    119
    192
  • Resist Adverseries With Broader Background Knowledge In Personalized Web Search.

    R.Jayanthi, Mr. C.Mahesh
    142
    193
  • Performance Analysis of Cement manufacturing Industry

    Neeraj Pandagre
    178
    259
  • Interactive File Sharing Web Application for Organization

    Bramha Gogade1, Shraddha Dharmik2, Saili Patil3, Prof. A. N. Adapanawar 4
    189
    315
  • Location Based Services: Architecture and Issues

    Anshuman S. Patel1
    131
    184
  • Cost-Efficiency And Privacy Preserving With Eirq Methods In Commercial Cloud

    Vanajakshi Devi.K1 Praveen Kumar.N2, Ramesh.B3
    139
    191
  • An Implementation of Hand Gesture Recognition System for Controlling a Car Buggy

    1Sanjyot Agureddy, 2Mohammed Esoofally, Meenakshi Raut, 4Manish Bhutada
    174
    193
  • A Robust Technique for Detection of Lung Nodules with Virtual Dual Energy Technology and Feed Forward Neural Network

    Drishya Vijayan1 Shine P. James2
    101
    176
  • Retinal Hemorrhage Detection Using Feature Classification

    Preniya Prasad
    136
    206
  • Memory Management In C++ And Java

    Gayathri Kandasamy Sengottaiyan
    153
    201
  • Senior Citizen Independent Living

    C. Suganthini 1, K.Sandhya2, R.Elavarasi3
    158
    189
  • Data Hiding Technique Using Audio Watermarking

    Yugandhara H. Wankhede1, Prof. Samadhan D. Mali2
    142
    176
  • Reversible Data Hiding Technique with Improved Reversibility in Encrypted Images

    Himangi Mohan Mujumdar1 1, Prof. Sachin B. Takale2
    110
    180
  • A Study on Securing Privacy In Personalized Web Search

    Priyanka Deulkar 1, Dr.A.D.Gawande2
    129
    184
  • Design of A Controlled Multi-Logic Function Generator and ALU by Using COG Reversible Logic Gates

    K.Rajasekhar 2.Devi Prasanna Yamuna 4.Pujitha Sai 5.Pranay Kumar 6.Sanasi Naidu
    143
    203
  • An High Eqipped SC FDMA Communication Model Based On Advanced Wavelet Mechanism For Wireless Systems

    A.Navya Lakshmi, V.Vamsi Sudheera
    115
  • VHDL Implementation Using Clustring Algorithm

    Prof.K.R.Chaudhari, Dinde Rupali ,Dhage Radhika, Khedekar Priyanka
    186
    197
  • A Review on Channel Allocation Schemes in Mobile Ad Hoc Networks

    Shweta A Mane, Sanjay S Pawar
    180
    203
  • Automated Measuring Tool for Handwriting Examination

    Vaibhav Saran1 1, Suneet Kumar2, Kriti Nigam3 Syeed Ahmed4, A.K.Gupta5
    128
    178
  • A Survey: Wireless Lan Security Protocols

    Anik Shah, Animesh Shah
    207
    221
  • A Mutation Testing Analysis And Regression Testing

    Deepti singh1, Ankit Thakur2, Abhishek Chaudhary3
    692
    211
  • Intrusion Detection and Response Using Game Strategy And RRE Engine In Network Security

    Anuvarsha.G, 2Rajesh kumar
    149
    171
  • Various Techniques of Fractal Image Compression - A Review

    Veena K K1 , Bhuvaneswari P
    137
    213
  • Textual Graphical Password Scheme against Shoulder Surfing Attack

    Saurabh Saoji1 Swapnali Bhadale2, Harshada Wagh3
    129
    189
  • A Machine Learning Techinque For Generative Classifier Under Attack

    S.Sasikala, C.Mahesh
    130
    163
  • DS-CDMA system with linear multiuser detection using kasami codes

    M.Mamatharani1 , R.Deepthi2 V.Tarunkumar3 ,S.Gopi4 ,G.Sridharkumar5
    109
    184
  • Piston connecting rod code detection and matching system using image processing and OCR

    Roshan Kshirsagar1, Amol Date2, Yogesh pawar3, Darshana Desa
    126
    181
  • A Survey On Channel Estimation In Mimo-Ofdm Systems

    Sonia Rani1, Manish kansal2
    114
    194
  • Head gesture recognition for hands-free control of robot movements

    Prof.Ms. P.B.Alappanavar1, Mr. Kishor Gardi2, Mr. Shubham Raut3, M Ghorpade4, Mr. Sameer waghmare5
    131
    190
  • A Survey of ICI Self-Cancellation Techniques for OFDM Systems

    Ritu Chaudhary1 Geeta Arora2
    130
    198
  • Robust Document Image Binarization Technique for Degraded Images

    Gaurav Divate1 1,Aniket Vaidya2,Vipul Wankhede3
    122
    202
  • A Review on Removal of Rain Streaks in an Image by using Image Decomposition

    Sneha Wandale1, Prof.P.A.Tijare2, Prof.S.N.Sawalkar3
    125
    173
  • Preference Aware Automatic Search Using Multiple Taxonomies

    Nidhin.R1 , Sharmila.L2
    123
    195
  • XRD And AFM Study Of Zirconium Substituted Zn-Ni Ferrite Using Solution Combustion Method

    *Jasmeen Saini, *Rupesh Kumar, *Jaspreet Kaur Rajput, ***Arvind Kumar
    134
    197
  • Load-Balancing Based On Geographic Routing Around Connectivity Holes In Wireless Sensor Network

    R.Mohanapriya1, V.Vennila2, S.Savitha3
    128
    179 0
  • Ann Based Head Movement Detection with Eye Tracking

    Nimi M R, Renji S
    131
    188
  • Multimedia Cloud Computing an Emerging Technology: Surve

    Er. Ramandeep Kaur Er. Gurjot Kaur
    122
    429
  • Self Powered Sensor Based Environmental Bridge Condition Monitoring System Using Gsm

    Prof.Dr.S.S.Patil, Bhadange Tejaswini Jadhav Poonam, Jagtap Bhakti
    139
    217
  • Extract Structured Data from Heterogeneous Web Pages

    M.D. Nirmal1, Shital B. Jadhav2, Nilam V. Dhumal3, Rutuja V. Kapadnis4, Priyanka H. Thakar
    115
    191
  • Cellular Phone Has Opened a New Horizon of Socio- Economic Development: A Case Study Of Banglades

    Malaya Tashbeen Barnamala
    148
    183
  • Traffic Classification By Using: TIE (Traffic Identification Engine)

    P.Raj kumar, P.Prasanna
    128
    186
  • “Camera Based Product Information Reading For Blind People”

    Priyanka Patil1, Sonali Solat2 ,Shital Hake3 Prof.S.T.KHOT4
    147
    192
  • A Phishing obligation analysis on web based secure authentication

    M.Rajesh M.Tech, Mr.R.Hariharan M.Tech
    135
    177