Vol. 4 No. 04 (2015)

Published: 2017-12-29

Articles

  • Graph Based Approach For Multi Document Summarization

    Mr. Vijay Sonawane, Prof. Rakesh Salam
    98
    39
  • A System for Serving Disability using Facial Expression Recognition

    K.Kausalya1, K.Subashini2, M.Priyanga3
    92
    43
  • Home Automation System Using Android and Internet

    Prof. R.S. Suryavanshi1, Gulam Hussain2, Kunal Khivensara3, Nitish Bansal4, Vikash Kumar5
    49
    36
  • Retinal Images Classification using Graph-Based approach for Disease Identification

    Divya.K.S1 , Kamala Malar.M2
    81
    39
  • Improving Accessing Efficiency of Cloud Storage Using DeDuplication and Feedback Schemes

    R.K.Saranya1, R.Sanjana2, Steffi Miriam Philip3, Shahana M.S.A4
    157
    74
  • Experimental Implementation Of Image Restoration Schema Using Inverse Filter Processing Techniques

    A. Shakul Hamid*, Dr.S.P.Victor,
    51
    48
  • Handwritten Devnagari Character Recognition System

    Neha Avhad1, Shraddha Darade2 2,Neha Gawali3, Apurva Matsagar4
    94
    40
  • A Review on Digital Watermarking Techniques, Applications and Attacks

    Ms. Komal M.Shukla1, Mr. Ashish K.Mehta2
    87
    146
  • HBase Performance Testing On Multi-node Cluster Setup

    G. Nataraja Sekhar1, Smt. S. Jessica Saritha2, C. Penchalaiah
    98
    82
  • DTMF Based Mobile Operated Surveillance Vehicle

    B.Dineshkumar1, P.Balaji2,E.Natarajan3, G.Vignesh4,R.Selvamani5
    95
    71
  • Modified SLM Based Peak To Average Power Ratio Reduction In MIMO-OFDM Systems

    Harshini Sarvotham, Logeshwari.N, Madhumitha.S#3, Dr.M.Palanivelan
    71
    39
  • Low cost Intelligent Parking management and Guidance System

    Nikhitkumar1, Abhijith S2, Shruti Jajoo3, S G Raghavendra Prasad4, Dr. Jitendar Mungara5
    62
    63
  • A Proposed Automatic Answering System for Natural Language Questions

    Prof. Dhanshri Patil1, Abhijeet Chopade2, Pankaj Bhambure3, Sanket Deshmukh4, Aniket Tetame5
    86
    52
  • Implementation of Desktop Control and Information Retrieval from the Internet Using Augmented Reality

    Anup Raut1, Afroz Kazi2, Akshay Kamthe3, Sachin Waghmare4, Smita Kalunge5
    52
    41
  • Fashion Accessories using Virtual Mirror

    Sonal Kachare1, Shrisha Vanga2, Ekta Gupta3, Jay Borade4
    45
    256
  • Laser Ignition System for Internal Combustion Engine

    M.Srinivasnaik1, Dr.T.V.V. Sudhakar2, Dr.B. Balunaik3, Dr.A.SomiReddy4
    94
    47
  • Mobile Controlled Robots

    K.Kanimozhi, S.Viswanathan
    39
    23
  • Web Database Annotation for Fast and Accurate Retrieval

    Kiran Dhumale, Swati Chavanm, Monali Kulkarni, Sachin Landge
    39
    27
  • Securing Computer Device Using Bluetooth technology and OneTime Password

    Mrs Aruna Gawde, Sanchit Jaina ,Mohsin Masanib, Sahil Deliwalaa,b,
    37
    43
  • Implementation of Hadoop Pseudo-distributed Cluster on Android using ‘chroot’

    Prof. S. Y. Raut1, Balwant B. Raut, Mangesh S. Jondhale, Nilesh R. Jaware4, Prachil S. Tambe5
    38
    119
  • Two Phase Secured Multiparty Sum Computation Protocol (2PSMC) for Privacy preserving data mining

    Selva Rathna1, Dr.T. Karthikeyan2
    45
    28
  • Intelligent Network

    Anurag Singh1, Abhishek Bhardwaj2, Vipin Rai3
    43
    34
  • Database Recovery Techniques: A Review

    Pradip R. Patel
    94
    101
  • A Password authentication in social Networking sites

    MR. Praveen Kumar1, S.Sirisha2, N.Breetha3, M.Lakshmi4
    36
    21
  • Automated Identification of Diabetic Retinopathy Stages in Digital Fundus Image using CDR and Micro aneurysms

    Dhanya C L1, Sanjeev Kubakaddi2 , Dr, Shilpa Mehta3
    47
    44
  • Intelligent Query Search

    Prof.M.R.Kharde, Priyanka Ghuge ,Kurhe Prajakta,Cholake Shital,Maghade Rachana
    36
    32
  • Mobile Enabled Streaming System

    Prof.Smita Patil, Arvind Kolhe, Arun Shinde, Rahul Sadaphal
    43
    31
  • Comparative Performance Analysis of Removal of Impulse Noise using Different Methods

    Namrata Shelke1, Prof. Sumit Sharma2
    39
    31
  • Dual-Broadband Planar Antenna For 2G/3G/LTE Base Stations

    M.Ramya1, Dr.A.Kannammal2
    49
    46
  • Hierarchical Similarity Of Context Instances

    Sayyad F.S.1 P.P.Kalyankar2
    41
    26
  • A Classification of various unicast and multicast Routing protocols in MANET

    M.Sravan Kumar Reddy , Vikram Narayandas
    35
    89
  • Role of Software Quality Assurance in Software Development

    Deepak Kumar1, Parul2
    45
    34
  • Visual Secrete Sharing by Diverse Image Media

    Aparna Bhosale 1, Jyoti Rao
    37
    31
  • A Review on APCC based Fractal Image Compression

    Date Vinod H., Prof. S. V. Kulkarni
    40
    43
  • Application of Multi-agent system in College Searching for Fresher’s Recruitment System

    Alankar Srivastava1, Akshay Varshney2, Akhil Chaurasia3
    50
    58
  • Towards an understanding of Li-Fi: Next generation Visible Light Communication Technology

    Deepali Bajaj1, Isha Mangal2, Asha Yadav3
    48
    42
  • Wireless Surveillance Robot Using Wireless Network

    Kiran Gautam, Pranit Chettri, Ravindra Singh Negi, Rangpo, Majhitar, Prerna Rai
    48
    40
  • Detection of Nutrients and chemicals in food products using sensors in smart phones

    Prof. Sukhesh Kothari, Prof.Hemlata Channe.
    109
    128
  • Comparative Seismic Analysis Of An Irregular Building With A Shear Wall And Frame Tube System Of Various Sizes

    B.N.Sarath, D.Claudiajeyapushpa
    63
    36
  • Category, Strategy and Validation of Software Change Impact Analysis

    Zeba Mahmood* Rakesh Bharti , Tahera Mahmood
    44
    39
  • Differences and problems task scheduling algorithm -A Survey

    Mohit Pal Singh Birdi, Kapil Kumar, Abhinav Hans, Navdeep Singh
    45
    23
  • Speech Enhancement Using Beamforming

    Dr. G. Ramesh Babu1, D. Lavanya2, B. Yamuna2, H. Divya2, B. Shiva Kumar2, B. Ashok Kumar2
    49
    34
  • Hop Voting scheme with Voting tag Verification Scheme for wireless Networks

    Dr. M. Senthamil Selvi1, Adhars Ram B², Ashok K³, Babu V4
    41
    26
  • Security measures for CDMA Mobile Phone Cloning

    S.Kanimozhi, D.Lavanya, S.SivaChandiran, D.Jayakumar
    55
    51
  • Data Transfer Through Power Line

    Ulhas Patil1, Chilgar Neha B.2, Pawar Priya S.3, Patel Arati R.4
    41
    431
  • Designing Of Novel Low Power Signed And Unsigned Multiplier Using 180nm CMOS Technology In CADENCE

    V.G.Santhi Swaroop1, E.Pavani2, Ch.Vasundhara3
    49
    29
  • Encryption Based Access Control Model In Cloud : A Survey

    Rachana Chavda, Rajanikanth Aluvalu
    42
    26
  • Motion Reconstruction Of 3-D Objects From 2-D Correspondences

    Vikas kumar, Lokesh Kashyap 3. Nalin Chaudhary
    37
    32
  • PAPR Reduction Of OFDM Using An Exponential Companding Technique

    G.Kranthi Kumar, S.Lenin Kumar Reddy, K.Santhosh Kumar
    57
    49
  • Extracting and Mining Of Data From PDF and WEB

    Pooja Tajane, Pranjal Gadakh, Nisha Shelar, Madhuri Javare
    47
    37
  • A Scalable Two-Phase Bottom-Up Specialization Prospective For Data Anonymization Using Map Reduce On Cloud

    Dilipprasad.E, Ajay.R , Mr. K.Durairaj
    42
    22
  • Performance Analysis of anEnhanced AODV Routing Protocol

    Vipin kumar sahu1, Prof. Aishwarya mishra2
    45
    25
  • Comparative evaluation of Google Glass, Vuzix M100 & Epson Moverio BT-200

    Vijay Sanjos Alexander, Venkatesh Babu
    51
    42
  • RTOS Based Fault Diagnosis And Efficient Data Transfer On Priority Basis Using Can

    K.T Indhupriya B.E, G Balaji M.Tech
    37
    25
  • A Comparative Analysis of Traditional RDBMS with MapReduce and Hive for E-Governance system

    Mr.Swapnil A. Kale 1, Prof.S.S.Dandge
    54
    86
  • Design and Implementation of AMBA-AHB&APB bridge memory controller by VHDL

    S.Anoosh1 T.Vidhya2 B.Vinod Kumar3 Ch.Anitha4 S.Rama Krishnaa
    41
    83
  • Maintainability assurance in Software Product Lines An Activity- Based Model

    Manoj Nainwal1, Anurag Awasthi2
    41
    60
  • Design and Analysis of Square and Circular type fractal Shapes Microstrip Patch Antenna

    Dr.Yogesh Bhomia1, Dr. S.V.A.V.Prasad2,Pradeep Kumar3
    38
    28
  • Authentication at Single-Point-of-Access in Cloud Environments

    Rizwan Ahmed*, Mr. Imran Ijaz
    45
    27
  • Data Analysis Using Document Clustering

    Prof. Priya Thakare, Sneha Gaikwad , Manish Khaladkar Rekha Kamble Priyanka Karche,
    36
    26
  • Survey Of Electronic Countermeasures Attacks And Techniques In Wireless Detector Networks

    Sundar R*
    37
    31
  • A Review on Media Access Control Spoofing

    Srishti Gupta, Kirti, Jaya Chaudhary
    67
    483
  • Mechanism for secure Big data stored within cloud storage by using cloud computing (Secure cloud storage)

    Sandip S. Dabre1 , Mangesh S. Shegokar2
    40
    36
  • Life Cycle Cost Analysis Of Buildings

    N.Kale, 2A.Joshi
    109
    74
  • Twitter Sentiment Analysis with Emoticons

    Waghode Poonam B, Prof. Mayura Kinikar
    42
    37
  • Extracting Structue Data From UnStructured Data Through HiveQL

    K. Balakrishna1, C. Penchalaiah3 Smt. S. Jessica Saritha2,
    48
    71
  • CPS-PWM Based Cascaded H-Bridge MLI with Voltage Balancing Capability

    R.Priya, C.Kanimozhi
    45
    29
  • Performance evaluation of Energy-aware routing algorithm for wireless sensor networks.

    Pawan deepkaur
    47
    31
  • Color Edge Detection Based On The Fusion Of Hue Component And Principal Component Analysis

    Ramandeep Kaur
    38
    32
  • Hybrid solar cooker

    Anubhav pandey1, Abhineet shukla1, Avinash mishra1, Prashant Dwivedi1, Ankit sahu1
    42
    34
  • Automated Emergency System in Ambulance to Control Traffic Signals using IoT

    Dr. A. Balamurugan1, G. Navin Siva Kumar2, S. Raj Thilak3, P. Selvakumar4
    62
    175
  • A Review of Ad Hoc Routing Protocols

    Showkat Ahmad Dar, Firdous Rashid , Dr. S.Palanivel
    56
    45
  • Novel Approach for Localizing Jammers in wireless network

    Sundar.R1, Mahesh.C2
    45
    27
  • In-Place Transformation Engine for Analytics

    Nilendra Chaudhari, Bipin Patwardhan
    43
    32
  • Study On High Strength Self Compacting Concrete Beams With Steel & Recron Fiber

    P.Karthi, S.Sankar
    47
    32
  • Experimental Investigations on Flexural Strength and Durability Properties of Mortars Containing Cement Replacement Materials

    Dr M. Vijaya Sekhar Reddy1, M. Seshalalitha2, N.Krishna Murthy3
    40
    41
  • Face Recognition using Eigenfaces and Distance Classifiers

    A V Krishna Rao Padyala, K Sai Prasanth D Neeraja
    37
    27
  • Secured Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

    N.R RejinPaul1 ,Alagu Lakshmi M.S2 , Sai Rasmitha D3
    38
    29
  • Achieving Multi Layered security, Flexibility, Scalability, Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)

    Priyanka Madhirjau
    38
    47
  • Analysis of Characteristics of 2G/3G Cellular Networks in rural and urban areas of Delhi

    Jai Prakash1, Vikas Kumar2, Harish Chandra Maurya3
    49
    34
  • E-Field Uniformity Test Volume In Gtem Cell Based On Labview

    Dominic S. Nyitamen
    58
    34
  • Enhancement of the IEEE 802.15.4 Cluster-Tree Network with Energy Efficient Cluster Scheduling

    Ahmed Ben Saleh, Martin J N Sibley, Peter Mather
    44
    28
  • Software Application for Design of Structural Element Using Visual Basic Coding

    J.Manoj Babu
    43
    35
  • Flight Delay Prediction System Using Weighted Multiple Linear Regression

    Sruti Oza1, Somya Sharma2, Hetal Sangoi3, Rutuja Raut4, V.C. Kotak5
    83
    129
  • Literature Survey on Maharashtra State Transport Buses and RFID

    Prof A.M.Magar, Akshay A. Kulkarni, Dayanand K. Jadhav
    123
    70
  • Unwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper)

    Rakhi Bhardwaj1, Vikram Kale2, , Prasad Morye2, Manoj Dhaygude2, Sagar Badhe2
    38
    31
  • Implementation of VRouter in KVM virtualized host

    Kajal Gaikwad, Shweta Nazarkar, Praneta Painthankar, Srushti Khadke
    81
    27
  • Security in Privacy Preserving Data Mining

    Neha Kashyap1, Dr. Vandana Bhattacharjee2
    43
    22
  • Design And Implementation Of A Robot ARM Control System

    Prof. Hycinth C. Inyiama1, Prof Christiana .C. Okezie2, Maxwell C. Okeke3, Tochukwu C. Akubue
    43
    50
  • The Design of Vegetable Oil Biodiesel Reactor

    N Achara
    55
    53
  • Smart Home Energy Management System

    Arti Kedar 1, S. B. Somani2
    38
    31
  • Transformation Of Analysis Model To Business Process Model

    Kulshan Pattanaik
    47
    34
  • Object Oriented Software Testing

    Vandna1, Dr. Ritu Sindhu2
    39
    24
  • Organizational Mail Tracking With Security Using 3d Password And Database Encryption

    Megha Sunil, Navami M Chandrabose, Neethu Pious
    43
    32
  • Real Time Location Tracking Application based on Location Alarm

    Adnaan Ghadiyali1, Ankur Tiku2, Sumeet Bandevar3, Ruturaj Tengale4
    35
    99
  • Impact and General Awareness of Cloud Computing In Public Domain

    Mr. Rajesh Saini*; Mr. Siddarth Kaul**; Mr. Satish Kumar
    35
    29
  • ASP.Net Technology Based Training And Placement Management System

    Shaikh Mohammed Salman1,Kanchwala Taha Juzer2,Ansari Mohammed Abdul Aziz3, Prof. Shrinidhi G
    48
    38
  • Ultrasonic Stick for Blind

    Ankit Agarwal1, Deepak Kumar2, Abhishek Bhardwaj3
    63
    310
  • Effective Website Accessibility Through Optimization Using Knapsack Programming Model

    BalaVignesh.P1, SanthoshKumar.C*, Bhaanureaka.B2 2, Gomathi.N3, Nivedha.S.K4
    38
    34
  • Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data

    Aashi Qul Huq A1 Bhaggiaraj S
    51
    45
  • Development of WiFi-Bluetooth Communication Protocol

    Prof. Manjitsing Valvi, Jay P. Chauhan, Dinsha S. Dinani
    40
    42
  • Comparative Analysis Between Prophet, Spray &Wait And Spray & Focus Protocol Of Wireless Opportunistic Networks

    Sonam kashyap Jasvir Singh
    34
    38
  • Mobile Virtual Laboratory in Nigeria

    Ogundipe Oluwole1, Goga Nicolae2, Omotosho Olawale3, Awodele Oludele4
    48
    36
  • Web Database Annotation for Fast and Accurate Retrieval

    Kiran Dhumale, Swati Chavanm, Monali Kulkarni, Sachin Landge
    38
    17
  • Image Retrieval using Markovian Semantic indexing (MSI)

    J.Premkumar, Mr.P.Prasenna
    47
    37
  • A New Approach for Distributed Data Mining based on SOA

    K.R.Shankar1, K.Manikandan2
    39
    27
  • Encrypted Data Transmission for secured SMS over Web via EMail Platform

    MugheleEse Sophia
    34
    40
  • A Comparative Analysis of Detecting the Moving Object with Principal Component Pursuit for Surveillance Application

    Jonsta Grashia.J, M.Kamala Malar
    41
    27
  • Ethical Hacking

    Deepak Kumar1, Ankit Agarwal2, Abhishek Bhardwaj3
    51
    117
  • Wind - An Efficient, Safe and Economic Global Energy Resource with Zero Effect

    Shikha Parashar1, Rekha Parashar2, Apoorva Srivastava3
    41
    33
  • FPGA Implementation Of Invisible Watermarking Algorithm Using LSB And DWT Technique

    Prof. S.M.Rajbhoj, Gudaghe Aarti, Ghavate Bhagyashree, Bhabad Pallavi
    41
    29
  • Captcha as Graphical Password

    Sujata D. Salunkhe1, Prof.Dhanshree Patil2
    42
    27
  • Exploiting a Low Power Self Timed Ternary CAM Architecture Using RWOS Mechanism

    Silna George1, I. Rabeek Raja2, M. Prakash
    37
    29