Published: 2017-12-29

A Literature Review of Reliable Multipath Routing Techniques

Versha Matre , Reena karandikar

Abstract 86  | PDF

Secure Video watermarking Algorithm Using K-harris feature point detection with dual watermarks

Ekta, Dr. Naresh Kumar Garg

Abstract 41  | PDF

A Study of Various Web Page Recommendation Algorithms

Pallaviben J Gohil, Krunal Patel

Abstract 43  | PDF

TOXICITY STUDY OF KAJJALI WITH SPECIAL REFERENCE TO DIFFERENT SAMPLES OF PARADA

Gaurav Desai, R. S. Hiremath

Abstract 148  | PDF

Supporting Search-As-You-Type among Multiple Tables using Multi-Join and Top-k Query Model

J.Shanmugheswari1, M.Sugashini2, V.Hemalatha3, Dr.P.Gomathi

Abstract 41  | PDF

Android Server For Wlan Control And Management

Prof. Ashvini Jadhav1, Mr.Akshay L. Gosavi2,Miss.Vrushali R. H Mr.Nikhil S. Thite4, Miss.Mamta B. Sawle

Abstract 41  | PDF

Effect of Temperature on Maximum Power Point of Photovoltaic Module

Mrs AbubakarAbisetu1, DrDominicS.Nyitamen2,Dr Nnorom Achara3

Abstract 47  | PDF

Development of Mathematical Model to Predict the Removal Rate of Zinc in Zinc Barrel Plating wash water using Full Factorial Design

S. Kalaivani1, Dr. S. Ananthalakshmi2

Abstract 48  | PDF

Cervical Implementation of Image Restoration Schema Using Digital Image Processing Techniques

S. P. Victor, A. Shakul Hamid

Abstract 45  | PDF

Effect Of Routing Packet Overheads On Routing Protocols

Prof. C. M. Jadhav1, Miss. Tejaswini. P. Patil2

Abstract 37  | PDF

Revamp the Power Consumption in MANET by designing EPARDA routing Protocol

Abinesh.T 1, Ganesan.T 2

Abstract 38  | PDF

Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach

Mr. Patankar Nikhil S., Prof.P.P.Rokade

Abstract 39  | PDF

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Miss. Sumita S.Chandekar1, Mr. Sunil Malviya2

Abstract 36  | PDF

Image processing and Biometric Approach for Licence and Vehicle documents verification

Yuvraj Nikam1,Miss .Monika N.Walunj2, Miss. Pooja M.Paranjape3, Mr. Ruturaj A.Kumbhar4, Mr. Subodh R.Pawar 5

Abstract 35  | PDF

Provable Data Possession Securing The From Untrusted Server

J.Praveen, S.Karthikeyan, Mrs Sumathy

Abstract 33  | PDF

Intelligent Access Smart Grid System,Metering and Monitoring

J.Nivetha1. Dr.K.Sundaravadivu2

Abstract 47  | PDF

Role of Robot Scientists and Artificial Intelligence in Drug discovery

Anand M1, Clarice Susan2

Abstract 26  | PDF

Bluetooth Chat Application: Bluez

Aishwarya S Bote, Nitish Ghare, Pravin Kumar Rahurkar, Mandar Latkar

Abstract 365  | PDF

A Survey on Various Developments In The Field Of Computer Science

Anik Shah, Animesh Shah

Abstract 30  | PDF

Practically observation of standard Minute Value of T-shirt

Md.Ramij Howlader1 Md.Monirul Islam (Rajib)2 Md.Tanjibul Hasan Sajib3

Abstract 27  | PDF

Improving the Hybrid Ad hoc Network Routing Performance Using RMECR Algorithm and Lightweight protocol

R Priya, H Prabavathi

Abstract 26  | PDF

C.A.D. & F.E.M. ANALYSIS OF DISC BRAKE SYSTEM

Er. N. B. Shinde1, Prof. B.R. Borkar2

Abstract 71  | PDF

HyPACK: Hybrid Prediction-Based Cloud Bandwidth and Cost Reduction System

Ms.Pratibha A Kuber , Ms.Garima Makhija

Abstract 28  | PDF

Minutiae Matching Algorithm For Partial Fingerprints

Lekshmi S P

Abstract 29  | PDF

Data DeDuplication Using Optimized Fingerprint Lookup Method for Cloud Storage Using Android

Prof. Sulbha Ghadling , Piyush Mehta, Piyush Oswal, Rohit Padwal, Amit Mohol

Abstract 29  | PDF

A newer method and its comparison with other available methods in wireless sensor network

Jyoti Sharma1, Beerendra Kumar2

Abstract 25  | PDF

A Survey Report on Risk-aware Role-based Access Control Model

Bhoomi Pipaliya 1 Vinay Harsora 2

Abstract 34  | PDF

A Review: Intelligent Pick and Place System by Using Practical Robotic Minimal Grasper

Dhairyashil M. Patil, Dr. S.K. Shah,

Abstract 31  | PDF

Improving Network Performance Using An Intrusion Detection & Adaptive Response Approach For Manets

Karthigha M, Rangarajan Gowtham S

Abstract 33  | PDF

A New Technique for Low Power Double Tail Comparator Using Parallel Mechanism

Remya Ayyappan

Abstract 37  | PDF

RFID-Based Tracking System

Mr.G. Manikandan 1, Mr.N.Mathavan 2 , Mr.M.Paramasivan3, T.Ashly 4

Abstract 31  | PDF

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

K.Priyanga,V.Radhika, ,Mrs.Josepha Menandas M.E., ,L.D.R.Vinoodune,

Abstract 36  | PDF

Android Parental Tracking

Tejal D. Katore 1 , Tejaashri M. Ghule 4 Prof .Tamhane K. D Gayatri R. Ghogare 2 Dipeeka R. Shinde

Abstract 30  | PDF

Comparative Analysis Of Methods For Semi- Supervised Dimensionality Reduction

Archana H.Telgaonkar1, Sachin Deshmukh1

Abstract 29  | PDF

Responsive Web Design

Anushree Rajesh Nene

Abstract 97  | PDF

Face Captcha

Prof. N. B. Kadu 1, Pushkar U. Wable2, Swati K. Wale3, Dipti B. Tambe4, Amol P. Londhe5

Abstract 30  | PDF

Cloud Based Real Time Anti Vehicle Theft By Using LP Recognition And OCR Recognition

R. Ramachandran, R. , Manivannan, R. Ramachandiran, N. Balachandar

Abstract 35  | PDF

Vulnerable Attitude of Road user using Fuzzy Matrix Technique

A. Victor Devadoss1 , S.M.A. Shahul Hameed2

Abstract 27  | PDF

Analysis of Use Cases and Use Case Estimation

Abhishek Chaudhary , Nalin Chaudhary , Aasiya Khatoon

Abstract 38  | PDF

A Social Chat Network Site With User Anonymity Consideration

Oyinloye O.Elohor, Akinyemi B.Peter

Abstract 27  | PDF

Advanced Security System Using Finger Vein Recognition

M.Soundarya, J.Rohini, V.Pavithra V.Ramya S.Nithya

Abstract 32  | PDF

Finger Print Based Door Locking System

A. Aditya Shankar1, P.R.K.Sastry2, A. L.Vishnu Ram3 , A.Vamsidhar4

Abstract 97  | PDF

Survey on Threat management system

Aniket Tare1, Mrunal Funde2, Shraddha zade3,Vaishnavi khati4

Abstract 28  | PDF

Sketch Based Photographs Retrieval System

Mrs.Shameera S.L,# B.E(M.E), Mr.P.Gopalakrishnan

Abstract 30  | PDF

Single Sign on Mechanism

Priyanka Jagtap, Shraddha Karande, Pratibha Kohinkar,Tazeen Mansuri

Abstract 50  | PDF

An Improved Image Watermarking Using LTVC Scheme

Aswathy. S

Abstract 26  | PDF

Deploying Relay Nodes with Controllable Mobility to Conserve Power in MANETs

Priya S 1, Karthikeyan M 2

Abstract 25  | PDF

Improving Return loss of Microstrip Patch antenna using AMC

Madhusudan A. Mohite, Sandeep C. Munghate, Subodh N. Pandharkame

Abstract 27  | PDF

Improving efficiency of hybrid Intrusion Detection System using kmeans and Naïve Bayes

Pushpak singha, Rahul lakkadwala, Anup sheth, akshay gaikwad, Megha V. kadam

Abstract 31  | PDF

Comparison between PMC AND AMC

Madhusudan A. Mohite1, Tirupati L.Iltapawar2, Krunal P.Rane3

Abstract 254  | PDF

Information System Based On College Campus

Shilpa Bilawane, Pranali Jambhulkar

Abstract 62  | PDF

Analysing Uncertain Data by Building Decision Tree

Megha Pimpalkar1, Garima Singh2,

Abstract 28  | PDF

Inferring User Search Goals with feedback Sessions using Fuzzy KMeans Algorithm

Mr.Gajanan Patil, Miss.Sonal Patil

Abstract 45  | PDF

Performance Analysis of Shunt Active Power Filter Using Pi Controller

Md. Jahid Hasan1, Ahmed Abdullah2, Apu Samadder 3

Abstract 34  | PDF

Twice Precaution during Transmission of Hidden Data

Amrapali Bhandare, Dinesh Patil & Rahul Shete,

Abstract 35  | PDF

Sign Language Recognition for Deaf and Dumb People

Y.M.Pathan1, S.R.Waghmare2, P.K.Patil3

Abstract 178  | PDF

Complete Library Control Robot

Arumugaraja.M, Revathi.M, Roja.S

Abstract 26  | PDF

Design & Simulation of MHD Antenna for Wireless Applications

Kuldeep Lakra , Amit Kumar, Gyanender Kumar

Abstract 27  | PDF

RFID Based Intelligent Trolley System using Zigbee

Aniket Wani1 Krutika Thakur2, Nikhil Vaze3, Meeta Vadhel4 , Prof. Rupali Advirkar5

Abstract 87  | PDF

PC Controlled Car for Terrain Detection

Ashwin Pais1, Jivitesh Gudekar2, Pinak Kelkar3, Jay Borade4

Abstract 30  | PDF

Survey Paper on Automatic Speaker Recognition Systems

Miss. Sarika S. Admuthe1 Mrs. Shubhada Ghugardare

Abstract 32  | PDF

Estimating The Age Of Human Face In Image Processing Using Matlab

Aditi Sengupta1 , Piyas Mondal2

Abstract 31  | PDF

Bi-orthogonal wavelet transform based video watermarking

Aswathy K.Nair1, Flower Abraham Mundackal2

Abstract 32  | PDF

A Proficient Extreme Learning Machine Approach For Tracking And Estimating Human Poses.

Dr.P. Tamije Selvy1, T. Renuka Devi2, R.Siva Keerthini3, S.Umamaheswari4

Abstract 33  | PDF

Security Suite

Tanmay Ghawate1, Chaitanya Patel2, Rushikesh Bargaje3, Kamlakar Kadam4, Prof. Harmeet Khanuja5

Abstract 26  | PDF

A Probabilistic Approach for Anomaly Detection In Social Streams

S. Sundara Selvi, Mr. K.Durairaj

Abstract 27  | PDF

A Novel Secure Multiparty Algorithms in Horizontally Distributed Database for Fast Distributed Database

S.Pavithra, P.Prasanna

Abstract 26  | PDF

Resist Adverseries With Broader Background Knowledge In Personalized Web Search.

R.Jayanthi, Mr. C.Mahesh

Abstract 30  | PDF

Performance Analysis of Cement manufacturing Industry

Neeraj Pandagre

Abstract 34  | PDF

Interactive File Sharing Web Application for Organization

Bramha Gogade1, Shraddha Dharmik2, Saili Patil3, Prof. A. N. Adapanawar 4

Abstract 78  | PDF

Location Based Services: Architecture and Issues

Anshuman S. Patel1

Abstract 30  | PDF

Cost-Efficiency And Privacy Preserving With Eirq Methods In Commercial Cloud

Vanajakshi Devi.K1 Praveen Kumar.N2, Ramesh.B3

Abstract 40  | PDF

An Implementation of Hand Gesture Recognition System for Controlling a Car Buggy

1Sanjyot Agureddy, 2Mohammed Esoofally, Meenakshi Raut, 4Manish Bhutada

Abstract 54  | PDF

A Robust Technique for Detection of Lung Nodules with Virtual Dual Energy Technology and Feed Forward Neural Network

Drishya Vijayan1 Shine P. James2

Abstract 28  | PDF

Retinal Hemorrhage Detection Using Feature Classification

Preniya Prasad

Abstract 40  | PDF

Memory Management In C++ And Java

Gayathri Kandasamy Sengottaiyan

Abstract 43  | PDF

Senior Citizen Independent Living

C. Suganthini 1, K.Sandhya2, R.Elavarasi3

Abstract 40  | PDF

Data Hiding Technique Using Audio Watermarking

Yugandhara H. Wankhede1, Prof. Samadhan D. Mali2

Abstract 38  | PDF

Reversible Data Hiding Technique with Improved Reversibility in Encrypted Images

Himangi Mohan Mujumdar1 1, Prof. Sachin B. Takale2

Abstract 26  | PDF

A Study on Securing Privacy In Personalized Web Search

Priyanka Deulkar 1, Dr.A.D.Gawande2

Abstract 25  | PDF

Design of A Controlled Multi-Logic Function Generator and ALU by Using COG Reversible Logic Gates

K.Rajasekhar 2.Devi Prasanna Yamuna 4.Pujitha Sai 5.Pranay Kumar 6.Sanasi Naidu

Abstract 36  | PDF

An High Eqipped SC FDMA Communication Model Based On Advanced Wavelet Mechanism For Wireless Systems

A.Navya Lakshmi, V.Vamsi Sudheera

Abstract 37  | PDF

VHDL Implementation Using Clustring Algorithm

Prof.K.R.Chaudhari, Dinde Rupali ,Dhage Radhika, Khedekar Priyanka

Abstract 72  | PDF

A Review on Channel Allocation Schemes in Mobile Ad Hoc Networks

Shweta A Mane, Sanjay S Pawar

Abstract 33  | PDF

Automated Measuring Tool for Handwriting Examination

Vaibhav Saran1 1, Suneet Kumar2, Kriti Nigam3 Syeed Ahmed4, A.K.Gupta5

Abstract 28  | PDF

A Survey: Wireless Lan Security Protocols

Anik Shah, Animesh Shah

Abstract 43  | PDF

A Mutation Testing Analysis And Regression Testing

Deepti singh1, Ankit Thakur2, Abhishek Chaudhary3

Abstract 135  | PDF

Intrusion Detection and Response Using Game Strategy And RRE Engine In Network Security

Anuvarsha.G, 2Rajesh kumar

Abstract 31  | PDF

Various Techniques of Fractal Image Compression - A Review

Veena K K1 , Bhuvaneswari P

Abstract 26  | PDF

Textual Graphical Password Scheme against Shoulder Surfing Attack

Saurabh Saoji1 Swapnali Bhadale2, Harshada Wagh3

Abstract 33  | PDF

A Machine Learning Techinque For Generative Classifier Under Attack

S.Sasikala, C.Mahesh

Abstract 37  | PDF

DS-CDMA system with linear multiuser detection using kasami codes

M.Mamatharani1 , R.Deepthi2 V.Tarunkumar3 ,S.Gopi4 ,G.Sridharkumar5

Abstract 26  | PDF

Piston connecting rod code detection and matching system using image processing and OCR

Roshan Kshirsagar1, Amol Date2, Yogesh pawar3, Darshana Desa

Abstract 32  | PDF

A Survey On Channel Estimation In Mimo-Ofdm Systems

Sonia Rani1, Manish kansal2

Abstract 30  | PDF

Head gesture recognition for hands-free control of robot movements

Prof.Ms. P.B.Alappanavar1, Mr. Kishor Gardi2, Mr. Shubham Raut3, M Ghorpade4, Mr. Sameer waghmare5

Abstract 30  | PDF

A Survey of ICI Self-Cancellation Techniques for OFDM Systems

Ritu Chaudhary1 Geeta Arora2

Abstract 39  | PDF

Robust Document Image Binarization Technique for Degraded Images

Gaurav Divate1 1,Aniket Vaidya2,Vipul Wankhede3

Abstract 27  | PDF

A Review on Removal of Rain Streaks in an Image by using Image Decomposition

Sneha Wandale1, Prof.P.A.Tijare2, Prof.S.N.Sawalkar3

Abstract 33  | PDF

Preference Aware Automatic Search Using Multiple Taxonomies

Nidhin.R1 , Sharmila.L2

Abstract 31  | PDF

XRD And AFM Study Of Zirconium Substituted Zn-Ni Ferrite Using Solution Combustion Method

*Jasmeen Saini, *Rupesh Kumar, *Jaspreet Kaur Rajput, ***Arvind Kumar

Abstract 33  | PDF

Load-Balancing Based On Geographic Routing Around Connectivity Holes In Wireless Sensor Network

R.Mohanapriya1, V.Vennila2, S.Savitha3

Abstract 30  | PDF

Ann Based Head Movement Detection with Eye Tracking

Nimi M R, Renji S

Abstract 27  | PDF

Multimedia Cloud Computing an Emerging Technology: Surve

Er. Ramandeep Kaur Er. Gurjot Kaur

Abstract 27  | PDF

Self Powered Sensor Based Environmental Bridge Condition Monitoring System Using Gsm

Prof.Dr.S.S.Patil, Bhadange Tejaswini Jadhav Poonam, Jagtap Bhakti

Abstract 35  | PDF

Extract Structured Data from Heterogeneous Web Pages

M.D. Nirmal1, Shital B. Jadhav2, Nilam V. Dhumal3, Rutuja V. Kapadnis4, Priyanka H. Thakar

Abstract 30  | PDF

Cellular Phone Has Opened a New Horizon of Socio- Economic Development: A Case Study Of Banglades

Malaya Tashbeen Barnamala

Abstract 28  | PDF

Traffic Classification By Using: TIE (Traffic Identification Engine)

P.Raj kumar, P.Prasanna

Abstract 38  | PDF

“Camera Based Product Information Reading For Blind People”

Priyanka Patil1, Sonali Solat2 ,Shital Hake3 Prof.S.T.KHOT4

Abstract 39  | PDF

A Phishing obligation analysis on web based secure authentication

M.Rajesh M.Tech, Mr.R.Hariharan M.Tech

Abstract 31  | PDF