Published: 2017-12-29

A Literature Review of Reliable Multipath Routing Techniques

Versha Matre , Reena karandikar
Full text

Abstract 12  | PDF 34 

A Study of Various Web Page Recommendation Algorithms

Pallaviben J Gohil, Krunal Patel
Full text

Abstract 14  | PDF 92 

Supporting Search-As-You-Type among Multiple Tables using Multi-Join and Top-k Query Model

J.Shanmugheswari1, M.Sugashini2, V.Hemalatha3, Dr.P.Gomathi
Full text

Abstract 9  | PDF 30 

Android Server For Wlan Control And Management

Prof. Ashvini Jadhav1, Mr.Akshay L. Gosavi2,Miss.Vrushali R. H Mr.Nikhil S. Thite4, Miss.Mamta B. Sawle
Full text

Abstract 8  | PDF 12 

Effect of Temperature on Maximum Power Point of Photovoltaic Module

Mrs AbubakarAbisetu1, DrDominicS.Nyitamen2,Dr Nnorom Achara3
Full text

Abstract 9  | PDF 31 

Effect Of Routing Packet Overheads On Routing Protocols

Prof. C. M. Jadhav1, Miss. Tejaswini. P. Patil2
Full text

Abstract 9  | PDF 7 

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Miss. Sumita S.Chandekar1, Mr. Sunil Malviya2
Full text

Abstract 15  | PDF 15 

Image processing and Biometric Approach for Licence and Vehicle documents verification

Yuvraj Nikam1,Miss .Monika N.Walunj2, Miss. Pooja M.Paranjape3, Mr. Ruturaj A.Kumbhar4, Mr. Subodh R.Pawar 5
Full text

Abstract 23  | PDF 41 

Provable Data Possession Securing The From Untrusted Server

J.Praveen, S.Karthikeyan, Mrs Sumathy
Full text

Abstract 6  | PDF 6 

Intelligent Access Smart Grid System,Metering and Monitoring

J.Nivetha1. Dr.K.Sundaravadivu2
Full text

Abstract 9  | PDF 26 

Bluetooth Chat Application: Bluez

Aishwarya S Bote, Nitish Ghare, Pravin Kumar Rahurkar, Mandar Latkar
Full text

Abstract 102  | PDF 581 

Practically observation of standard Minute Value of T-shirt

Md.Ramij Howlader1 Md.Monirul Islam (Rajib)2 Md.Tanjibul Hasan Sajib3
Full text

Abstract 19  | PDF 443 

C.A.D. & F.E.M. ANALYSIS OF DISC BRAKE SYSTEM

Er. N. B. Shinde1, Prof. B.R. Borkar2
Full text

Abstract 59  | PDF 191 

HyPACK: Hybrid Prediction-Based Cloud Bandwidth and Cost Reduction System

Ms.Pratibha A Kuber , Ms.Garima Makhija
Full text

Abstract 9  | PDF 8 

Data DeDuplication Using Optimized Fingerprint Lookup Method for Cloud Storage Using Android

Prof. Sulbha Ghadling , Piyush Mehta, Piyush Oswal, Rohit Padwal, Amit Mohol
Full text

Abstract 19  | PDF 487 

A Survey Report on Risk-aware Role-based Access Control Model

Bhoomi Pipaliya 1 Vinay Harsora 2
Full text

Abstract 15  | PDF 9 

RFID-Based Tracking System

Mr.G. Manikandan 1, Mr.N.Mathavan 2 , Mr.M.Paramasivan3, T.Ashly 4
Full text

Abstract 42  | PDF 71 

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

K.Priyanga,V.Radhika, ,Mrs.Josepha Menandas M.E., ,L.D.R.Vinoodune,
Full text

Abstract 18  | PDF 4 

Android Parental Tracking

Tejal D. Katore 1 , Tejaashri M. Ghule 4 Prof .Tamhane K. D Gayatri R. Ghogare 2 Dipeeka R. Shinde
Full text

Abstract 23  | PDF 107 

Comparative Analysis Of Methods For Semi- Supervised Dimensionality Reduction

Archana H.Telgaonkar1, Sachin Deshmukh1
Full text

Abstract 13  | PDF 6 

Responsive Web Design

Anushree Rajesh Nene
Full text

Abstract 325  | PDF 165 

Face Captcha

Prof. N. B. Kadu 1, Pushkar U. Wable2, Swati K. Wale3, Dipti B. Tambe4, Amol P. Londhe5
Full text

Abstract 15  | PDF 8 

Cloud Based Real Time Anti Vehicle Theft By Using LP Recognition And OCR Recognition

R. Ramachandran, R. , Manivannan, R. Ramachandiran, N. Balachandar
Full text

Abstract 21  | PDF 28 

Vulnerable Attitude of Road user using Fuzzy Matrix Technique

A. Victor Devadoss1 , S.M.A. Shahul Hameed2
Full text

Abstract 13  | PDF 13 

Analysis of Use Cases and Use Case Estimation

Abhishek Chaudhary , Nalin Chaudhary , Aasiya Khatoon
Full text

Abstract 22  | PDF 93 

A Social Chat Network Site With User Anonymity Consideration

Oyinloye O.Elohor, Akinyemi B.Peter
Full text

Abstract 11  | PDF 12 

Advanced Security System Using Finger Vein Recognition

M.Soundarya, J.Rohini, V.Pavithra V.Ramya S.Nithya
Full text

Abstract 19  | PDF 91 

Finger Print Based Door Locking System

A. Aditya Shankar1, P.R.K.Sastry2, A. L.Vishnu Ram3 , A.Vamsidhar4
Full text

Abstract 88  | PDF 3086 

Survey on Threat management system

Aniket Tare1, Mrunal Funde2, Shraddha zade3,Vaishnavi khati4
Full text

Abstract 11  | PDF 14 

Sketch Based Photographs Retrieval System

Mrs.Shameera S.L,# B.E(M.E), Mr.P.Gopalakrishnan
Full text

Abstract 10  | PDF 15 

Single Sign on Mechanism

Priyanka Jagtap, Shraddha Karande, Pratibha Kohinkar,Tazeen Mansuri
Full text

Abstract 50  | PDF 20 

Improving Return loss of Microstrip Patch antenna using AMC

Madhusudan A. Mohite, Sandeep C. Munghate, Subodh N. Pandharkame
Full text

Abstract 4  | PDF 51 

Improving efficiency of hybrid Intrusion Detection System using kmeans and Naïve Bayes

Pushpak singha, Rahul lakkadwala, Anup sheth, akshay gaikwad, Megha V. kadam
Full text

Abstract 22  | PDF 5 

Comparison between PMC AND AMC

Madhusudan A. Mohite1, Tirupati L.Iltapawar2, Krunal P.Rane3
Full text

Abstract 206  | PDF 32 

Information System Based On College Campus

Shilpa Bilawane, Pranali Jambhulkar
Full text

Abstract 31  | PDF 380 

Analysing Uncertain Data by Building Decision Tree

Megha Pimpalkar1, Garima Singh2,
Full text

Abstract 8  | PDF 6 

Performance Analysis of Shunt Active Power Filter Using Pi Controller

Md. Jahid Hasan1, Ahmed Abdullah2, Apu Samadder 3
Full text

Abstract 11  | PDF 31 

Twice Precaution during Transmission of Hidden Data

Amrapali Bhandare, Dinesh Patil & Rahul Shete,
Full text

Abstract 14  | PDF 7 

Sign Language Recognition for Deaf and Dumb People

Y.M.Pathan1, S.R.Waghmare2, P.K.Patil3
Full text

Abstract 300  | PDF 98 

Complete Library Control Robot

Arumugaraja.M, Revathi.M, Roja.S
Full text

Abstract 12  | PDF 6 

Design & Simulation of MHD Antenna for Wireless Applications

Kuldeep Lakra , Amit Kumar, Gyanender Kumar
Full text

Abstract 17  | PDF 17 

RFID Based Intelligent Trolley System using Zigbee

Aniket Wani1 Krutika Thakur2, Nikhil Vaze3, Meeta Vadhel4 , Prof. Rupali Advirkar5
Full text

Abstract 87  | PDF 860 

PC Controlled Car for Terrain Detection

Ashwin Pais1, Jivitesh Gudekar2, Pinak Kelkar3, Jay Borade4
Full text

Abstract 17  | PDF 10 

Survey Paper on Automatic Speaker Recognition Systems

Miss. Sarika S. Admuthe1 Mrs. Shubhada Ghugardare
Full text

Abstract 16  | PDF 209 

Estimating The Age Of Human Face In Image Processing Using Matlab

Aditi Sengupta1 , Piyas Mondal2
Full text

Abstract 7  | PDF 382 

Bi-orthogonal wavelet transform based video watermarking

Aswathy K.Nair1, Flower Abraham Mundackal2
Full text

Abstract 9  | PDF 4 

A Proficient Extreme Learning Machine Approach For Tracking And Estimating Human Poses.

Dr.P. Tamije Selvy1, T. Renuka Devi2, R.Siva Keerthini3, S.Umamaheswari4
Full text

Abstract 33  | PDF 12 

Security Suite

Tanmay Ghawate1, Chaitanya Patel2, Rushikesh Bargaje3, Kamlakar Kadam4, Prof. Harmeet Khanuja5
Full text

Abstract 6  | PDF 10 

A Probabilistic Approach for Anomaly Detection In Social Streams

S. Sundara Selvi, Mr. K.Durairaj
Full text

Abstract 10  | PDF 20 

Interactive File Sharing Web Application for Organization

Bramha Gogade1, Shraddha Dharmik2, Saili Patil3, Prof. A. N. Adapanawar 4
Full text

Abstract 18  | PDF 327 

Location Based Services: Architecture and Issues

Anshuman S. Patel1
Full text

Abstract 70  | PDF 45 

Cost-Efficiency And Privacy Preserving With Eirq Methods In Commercial Cloud

Vanajakshi Devi.K1 Praveen Kumar.N2, Ramesh.B3
Full text

Abstract 13  | PDF 5 

An Implementation of Hand Gesture Recognition System for Controlling a Car Buggy

1Sanjyot Agureddy, 2Mohammed Esoofally, Meenakshi Raut, 4Manish Bhutada
Full text

Abstract 30  | PDF 61 

Memory Management In C++ And Java

Gayathri Kandasamy Sengottaiyan
Full text

Abstract 36  | PDF 58 

Senior Citizen Independent Living

C. Suganthini 1, K.Sandhya2, R.Elavarasi3
Full text

Abstract 10  | PDF 8 

Data Hiding Technique Using Audio Watermarking

Yugandhara H. Wankhede1, Prof. Samadhan D. Mali2
Full text

Abstract 9  | PDF 21 

Reversible Data Hiding Technique with Improved Reversibility in Encrypted Images

Himangi Mohan Mujumdar1 1, Prof. Sachin B. Takale2
Full text

Abstract 11  | PDF 18 

A Study on Securing Privacy In Personalized Web Search

Priyanka Deulkar 1, Dr.A.D.Gawande2
Full text

Abstract 16  | PDF 80 

Design of A Controlled Multi-Logic Function Generator and ALU by Using COG Reversible Logic Gates

K.Rajasekhar 2.Devi Prasanna Yamuna 4.Pujitha Sai 5.Pranay Kumar 6.Sanasi Naidu
Full text

Abstract 32  | PDF 103 

VHDL Implementation Using Clustring Algorithm

Prof.K.R.Chaudhari, Dinde Rupali ,Dhage Radhika, Khedekar Priyanka
Full text

Abstract 109  | PDF 43 

Automated Measuring Tool for Handwriting Examination

Vaibhav Saran1 1, Suneet Kumar2, Kriti Nigam3 Syeed Ahmed4, A.K.Gupta5
Full text

Abstract 19  | PDF 57 

A Survey: Wireless Lan Security Protocols

Anik Shah, Animesh Shah
Full text

Abstract 14  | PDF 48 

A Mutation Testing Analysis And Regression Testing

Deepti singh1, Ankit Thakur2, Abhishek Chaudhary3
Full text

Abstract 28  | PDF 55 

Various Techniques of Fractal Image Compression - A Review

Veena K K1 , Bhuvaneswari P
Full text

Abstract 28  | PDF 17 

Textual Graphical Password Scheme against Shoulder Surfing Attack

Saurabh Saoji1 Swapnali Bhadale2, Harshada Wagh3
Full text

Abstract 26  | PDF 47 

DS-CDMA system with linear multiuser detection using kasami codes

M.Mamatharani1 , R.Deepthi2 V.Tarunkumar3 ,S.Gopi4 ,G.Sridharkumar5
Full text

Abstract 14  | PDF 16 

Piston connecting rod code detection and matching system using image processing and OCR

Roshan Kshirsagar1, Amol Date2, Yogesh pawar3, Darshana Desa
Full text

Abstract 11  | PDF 29 

A Survey On Channel Estimation In Mimo-Ofdm Systems

Sonia Rani1, Manish kansal2
Full text

Abstract 23  | PDF 103 

Head gesture recognition for hands-free control of robot movements

Prof.Ms. P.B.Alappanavar1, Mr. Kishor Gardi2, Mr. Shubham Raut3, M Ghorpade4, Mr. Sameer waghmare5
Full text

Abstract 10  | PDF 24 

A Survey of ICI Self-Cancellation Techniques for OFDM Systems

Ritu Chaudhary1 Geeta Arora2
Full text

Abstract 19  | PDF 4 

Robust Document Image Binarization Technique for Degraded Images

Gaurav Divate1 1,Aniket Vaidya2,Vipul Wankhede3
Full text

Abstract 15  | PDF 45 

A Review on Removal of Rain Streaks in an Image by using Image Decomposition

Sneha Wandale1, Prof.P.A.Tijare2, Prof.S.N.Sawalkar3
Full text

Abstract 8  | PDF 125 

XRD And AFM Study Of Zirconium Substituted Zn-Ni Ferrite Using Solution Combustion Method

*Jasmeen Saini, *Rupesh Kumar, *Jaspreet Kaur Rajput, ***Arvind Kumar
Full text

Abstract 5  | PDF 56 

Multimedia Cloud Computing an Emerging Technology: Surve

Er. Ramandeep Kaur Er. Gurjot Kaur
Full text

Abstract 7  | PDF 174 

Self Powered Sensor Based Environmental Bridge Condition Monitoring System Using Gsm

Prof.Dr.S.S.Patil, Bhadange Tejaswini Jadhav Poonam, Jagtap Bhakti
Full text

Abstract 18  | PDF 25 

Extract Structured Data from Heterogeneous Web Pages

M.D. Nirmal1, Shital B. Jadhav2, Nilam V. Dhumal3, Rutuja V. Kapadnis4, Priyanka H. Thakar
Full text

Abstract 15  | PDF 25 

“Camera Based Product Information Reading For Blind People”

Priyanka Patil1, Sonali Solat2 ,Shital Hake3 Prof.S.T.KHOT4
Full text

Abstract 11  | PDF 160 

A Phishing obligation analysis on web based secure authentication

M.Rajesh M.Tech, Mr.R.Hariharan M.Tech
Full text

Abstract 10  | PDF 68