Published: 2017-12-29

Enhancement in the neighbor-based diskless checkpointing approach

Parase Dipali B, Dr Mrs Apte S S, Shegadar A R

Abstract 37  | PDF

Gender Recognization & Age Prediction

Mr. Raghvendra, Prof.Sandeep Sahu

Abstract 34  | PDF

Online Identification Using RLS Algorithm and Kaczmarz’s Projection Algorithm for a Bioreactor Process

S.Sundari, Alamelu Nachiappan

Abstract 52  | PDF

Detection & Prevention of Wormhole attack on AODV Protocol in Mobile Adhoc Networks (MANETS)

Dimple Saharan

Abstract 36  | PDF

Energy-based Controller with Optimization Tuning by Using Nelder-Mead Algorithm for Overhead Cranes

Nguyen Quang Hoang, Vu Van Khoa

Abstract 37  | PDF

A Wireless LAN Protocol for Initial Access Authentication

Sandhya K, Nagaraju Rayapati

Abstract 33  | PDF

STUDY ON WEB STRUCTURE MINING AND ITS PAGE RANKING ALGORITHM

T. Shanmugapriya, K.Kalaiselvi

Abstract 36  | PDF

Presenting of executable model of the enterprise architecture in order to evaluate the reliability

Maryam Nazemi Ashani , Ali HarounAbadi , sayed Javad Mirabedini

Abstract 40  | PDF

Reduction of ambiguity due to synonym and Homographs in Punjabi Language

Navdeep Kaur, Vandana Pushe

Abstract 42  | PDF

A novel approach to make NLP predictive and non-ambigious in Punjabi Language

Parneet Kaur, Er.Vandana Pushe

Abstract 33  | PDF

Study of Public and Private Clouds in Indian Environment

Rakesh Patel , Mili Patel, Proff. Anupam R. Chaube

Abstract 44  | PDF

Punjabi Speech Synthesis System for Android Mobile Phones

Jagmeet Kaur, Parminder Singh

Abstract 39  | PDF

Stock Market Be¬havior Prediction Using Pattern Matching Approach

Prakash Kumar Sarangi, Birendra Kumar Nayak

Abstract 46  | PDF

Spell Checking and Error Correcting System for text paragraphs written in Punjabi Language using Hybrid approach

Amanjot Kaur, Dr. Paramjeet Singh, Dr. Shaveta Rani

Abstract 43  | PDF

Interactive Pick and Place Robot Control using Image Processing Method

Mr. Raskar D. S., Prof. Mrs. Belagali P. P.

Abstract 51  | PDF

Review Based Entity Ranking using Fuzzy Logic Algorithmic Approach: Analysis

Pratik N. Kalamkar, Anupama G. Phakatkar

Abstract 32  | PDF

Corner Defect Detection Based On Inverse Trigonometric Function Using Image of Square Ceramic Tiles

Ravindra Singh, Gyan Chand Yadav

Abstract 49  | PDF

The Future Version of IP - IPV6

Mr. P Ravindra, Mr. Dr.V.V.Krishna Mr. S.Srinivasulu

Abstract 37  | PDF

Usability Testing

Purnima Bindal, Sonika Gupta, Purnima Khurana

Abstract 38  | PDF

Wavelength Assignment in Optical WDM Optical Network

Mudasir Ali , Parminder Singh Saini

Abstract 35  | PDF

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

K. Naveen Kumar, Madan Pojala, P.Venkateswarlu Reddy

Abstract 37  | PDF

Design and implementation of dc motor speed control based on pic microcontroller

Snehlata Sanjay Thakare, Prof.Santosh Kompelli, Snehlata Sanjay Thakare, Prof.Santosh Kompelli

Abstract 42  | PDF

Eigenface Approach For The Recognition Of Face And Detection Of The Face

Er. Anup lal Yadav, Er. Sahil Verma, Er. Kavita

Abstract 45  | PDF

Ideas for Some Improvement in A.C.O. On The Behalf Of Presently Working A.C.O.

Er. Anup lal Yadav, Er. Sahil Verma, Er. Kavita

Abstract 37  | PDF

A Review of Various Encryption Techniques

Harshraj N. Shinde, Aniruddha S. Raut, Shubham R. Vidhale, Rohit V. Sawant, Vijay A. Kotkar

Abstract 28  | PDF

Search The Web Services Based On Qos Aware

Sudhakar Murugesan, Dorcas Boateng, Nivash Thirunavukarasu

Abstract 33  | PDF

Revised Reliable Algorithm with Results & Algorithm for Thinning Numeral Pattern

Er. Anup, Er. Sahil Verma, Dr. Kamal Sharma

Abstract 27  | PDF

Comparative analysis of image quality assessment using HVS Based Model

Dr. Anil Panghal, Puja Chugh A.P

Abstract 28  | PDF

Hyperspectral Image Classification Using SVM

CH. Bala subramanyam, G. Naga lakshmi

Abstract 32  | PDF

Car Safety using CAN Module and Multi sensors

Prasad H. Kulkarni, C.S. Patil, R. R. Karhe

Abstract 30  | PDF

Design & Implementation of Binary Phase Shift Keying Demodulation through phase locked loop

Roopa.V, R.Mallikarjuna Setty

Abstract 37  | PDF

Battery Capacity Management in Wireless Sensor Network Rechargeable Sensor Nodes

Mrs. Anasuya., N. Jadagerimath

Abstract 31  | PDF

Cyborgs-Human + Machine= the Future Man

Surbhi gupta, Vikrant dewan

Abstract 22  | PDF

Search Engine –A Demanding Advertising Tool

Jyoti Godara, Shilpa Sharma

Abstract 32  | PDF

Switching attacks in wireless networks using denial of service phenomenon

Srinivas Kolli, B. V. Srikanth, Dr.P.Venkateswarlu

Abstract 44  | PDF

A Comprehensive Analysis of Cloud Computing Including Security Issues and Overview of Monitoring

Deepika Upadhyay, Sanjay Silakari, Uday Chourasia

Abstract 25  | PDF

Extended self destructing data system with data recovery

Vinayaka R H, Dayananda P , Shwetha S

Abstract 26  | PDF

A Review of Open Access Publication in Tanzania

Wasiwasi J. Mgonzo, Zaipuna O. Yonah

Abstract 35  | PDF

Finger Vein Detection Combining Segmentation, Gabor Filter and Matched Filter

Amandeep kaur

Abstract 22  | PDF

A Survey on Routing Protocols Using TCP Variants over MANETs

Manpreet Kaur, Dr. Sandeep Singh Kang

Abstract 22  | PDF

A Metric Base Calaculation for Object Oriented Software Modularization Quality Measurement

Ruchi Kulkarni, Samidha Diwedi Sharma

Abstract 24  | PDF

Mining High Utility Items from Transactional Databases-Useing Systolic Algorithm

C.Mamatha Devi, M. Bhargavi

Abstract 32  | PDF

Review On:Metamaterials And Their Appliations

Isha Gupta, Munish Rattan, Ankita Tiwari

Abstract 24  | PDF

A Review On Software Testing In SDlC And Testing Tools

T.Amruthavalli, S.MahaLAkshmi, K.HariKrishnan

Abstract 21  | PDF

Solving Knapsack Problem Using Constraint Programming

Vaishali Cooner

Abstract 171  | PDF

A Review of Various Gesture Recognition Techniques

Vaibhavi S. Gandhi, Akshay A. Khond, Sanket N. Raut, Vaishali A. Thakur, Shabnam S. Shaikh

Abstract 35  | PDF

Effect on Relaxation Time and Polarizability in Electric Field Induced Nucleation Processes

N. Singh, R. S. Chauhan

Abstract 24  | PDF

Radiation absorption effect on MHD, free convection, chemically reacting visco-elastic fluid past an oscillatory vertical porous plate in slip flow regime

M. C. Raju, B. Vidyasagar, S.V. K. Varma, S. Venkataramana

Abstract 24  | PDF

MPLI: A Novel Modified Parametric Location Identification for AODV in MANET

Akash Karma, Jitendra Choudhary

Abstract 22  | PDF

An Overview on Hybrid Cloud as an It Service Broker

P. Soumya Sree Laxmi

Abstract 23  | PDF

Implementation of Personalized mobile search engine based on Ontology

Ms.Namrata G Kharate

Abstract 25  | PDF

Identification Of Malnutrition With Use Of Supervised Datamining Techniques –Decision Trees And Artificial Neural Networks

D.Thangamani, P.Sudha

Abstract 52  | PDF

CFD Analysis & Experimental Study on Heat Transfer Enhancement by various shapes of wings and Material with Forced Convection

Snehal C. Kapse, Dr. R.R Arakerimath

Abstract 21  | PDF

Removal of High Density Salt and Pepper Noise from Digital Images

Sruthi Ignatious

Abstract 24  | PDF

Security Aspects in WSN: Survey and Analysis

Swati Kakran, Sunil Kumar

Abstract 24  | PDF

A Comprehensive Paper on Performance Analysis between AODV & DSDV Routing Protocol

Mr. Raj Kumar Singh, Mr. Rakesh Kumar Khare

Abstract 23  | PDF

Preparation of silver nanoparticles by pulsed laser ablation in liquid medium

Leena F. Hamza, Dr.Issam M.Ibrahim

Abstract 33  | PDF

Survey on Linux Security and Vulnerabilities

Ashvini T. Dheshmukh, Dr. Parikshit. N . Mahalle

Abstract 52  | PDF

Review On: Fractal Antenna Design Geometries and Its Applications

Ankita Tiwari, Dr. Munish Rattan, Isha Gupta

Abstract 30  | PDF

Smart Home Implementation Using Data Mining

Gayatri D. Kulkarni, Priyanka V. Gode, Jadi Pratapreddy,Madhura H. Deshmukh, Nitin R. Talhar

Abstract 30  | PDF

Enhanced Cluster Based Distributer Fault Tolerance Algorithm For Mobile Node In WSN

Avrinderpal Kaur , Er. Upasna Garg

Abstract 32  | PDF

Modelling Reservoir Operation Using Multiple Regression & Artificial Neural Network

S.S.Khare, Dr. A.R.Gajbhiye

Abstract 22  | PDF

A Review of Load Balancing Algorithms for Cloud Computing

Dr.G.N.K.Sureshbabu, Dr.S.K.Srivatsa

Abstract 22  | PDF

Impact of Mobile Applications on Health Care Information System

R. Anand, Dr. S. K. Srivatsa

Abstract 24  | PDF

0.18um based 6T SRAM to Reduced Power

Mrs. J.N. Ingole , Miss. Poonam A. Mirge

Abstract 23  | PDF

Detection of TCP/IP Covert Channel based on Naïve-Bayesian Classifier

Vibhor Kumar Vishnoi, Sunil Kumar

Abstract 25  | PDF

Classification of Human Action in a Controlled Environment

Asmeet Bhosale, Geetanjali Kale

Abstract 24  | PDF

Mapreduce & Comparison of HDFS And GFS

Ameya Daphalapurkar, Manali Shimpi, Priyal Newalkar

Abstract 49  | PDF

Proficient Secret Transmission of Images And Message

S.Uma, V.Valarmathi

Abstract 22  | PDF

Defense Mechanism for Denial of Service Attack to UMTS Networks Using Sim-Less Devices

V. Palaniyappan , M.Duraipandian , K.Malarvizhi

Abstract 23  | PDF

UW-Hybrid Architecture of Underwater Acoustic Sensor Networks

Tanu Singh, Manu Singh

Abstract 28  | PDF

Combination of Markov and MultiDamping Techniques for Web Page Ranking

Sandeep Nagpure

Abstract 23  | PDF

Performance analysis of Neural Network Algorithms on Stock Market Forecasting

Manasi Shah, Nandana Prabhu, Jyothi Rao

Abstract 28  | PDF

License Plate Character Recognition

Rintu Tom, Jinson Devis

Abstract 27  | PDF

New level of Security in ATM System Using Brain Fingerprinting

N. Geethanjali

Abstract 23  | PDF

Study and Analysis of Edge Detection Techniques for Segmentation using Dental Radiograph

N.P.Ansingkar, M.G.Dhopeshwarkar

Abstract 30  | PDF

Diagnosis and Correction of tear in films with Optimization of Motion Estimation Technique

Jilfy James, Jobi Jose

Abstract 26  | PDF

Survey of Visual Cryptography Schemes without Pixel Expansion

Asst. Prof. Jyoti Rao, Dr. Vikram Patil, Ms. Smita Patil

Abstract 33  | PDF

Improving Edge Based Color Constancy for Multiple Light Sources

Ancy Varghese, Darsana Vijay

Abstract 31  | PDF

Direct Single Stage Power Converter (AC/DC).

Md. Jahid Hasan, Pritam Dutta, Md. Shafayet Ahmmad Khan

Abstract 29  | PDF

Fuzzy Logic Enforced Traffic Management for High Speed Networks

T. Hari, P. Hemanth Kumar

Abstract 23  | PDF

Comparative Analysis of Secure and Energy Efficient routing protocols in Wireless sensor network

Amanpreet Kaur, Dr. Sandeep Singh Kang

Abstract 25  | PDF

Analysing Performance of Companding Technique For PAPR Reduction in OFDM System

Rikhee Ram, Manoj Gabhel

Abstract 22  | PDF

New refined Model for Mechatronics design of solar differential drive mobile robotic platforms

Farhan A. Salem

Abstract 24  | PDF

Modeling and Control Solutions for Mechatronics Design of Solar Battery Electric Vehicles

Farhan A. Salem , Ali S. Alosaimy

Abstract 25  | PDF

Diabetes Prediction in Women Based On Soft Computing Techniques

S.Karthikeyeni, S.Saranya

Abstract 21  | PDF

A Study of Existing Cross Site Scripting Detection and Prevention Techniques in Web Applications

Neha Gupta

Abstract 35  | PDF

IPV6 SLAAC related security issues and removal of those security issues

Priya Tayal

Abstract 28  | PDF

Implementing Big Data Management on Grid Computing Environment

Lawal Muhammad Aminu

Abstract 22  | PDF

Performance Evaluation of Secure Key Distribution Based on Quantum Mechanics Principles Over Free Space

Lawal Muhammad Aminu

Abstract 26  | PDF