Sr/ No |
Title |
Pdf |
1 |
Usefulness of Ear ang Gait Biometrics in forensics science
Dr.Kashif Qureshi
|
Download
|
2 |
Cancelable Crypto-Biometrics for more sanctuary augmentation
Dr.Kashif Qureshi
|
Download
|
3 |
Matrix Mapping of Crypto-Biometrics for more security implementation
Dr.Kashif Qureshi
|
Download
|
4 |
SURFNET BASED P2P VOD SYSTEMS
Karthikram.A, Devanathan.P, Mathan Mohan.A, Vijayavel.L |
|
5 |
Performance Evolution Of Mimo Communication Systems Using Spatial Modulation- A Survey
S.DHILIPKUMAR, C.ARUNACHALAPERUMAL |
|
6 |
A COMPARATIVE APPROACH ON STEGANOGRAPHY TOOLS
Mr.E.Gurumoorthi, Mr.S.Balamurugan, Mrs.G.Vijayabarathi, Mr.R.Anbarasan |
|
7 |
Traffic Control System for Multi Topology IGP Based Networks
Ning Wang, Kin Hon Ho |
|
8 |
Packet-Hiding Methods for Preventing Selective
Jamming Attacks
A.Mani, K.Adlinsuji,P.Ganesh |
|
9 |
USE OF AUTOMATED TOOLS IN REVERSE ENGINEERING
Isha Malik, Harpreet Kaur |
|
10 |
Speckle Noise Reduction of SAR Images using Hybrid GMAP-Median Filter
K.R.Jayakumar,S.Hanis |
|
11 |
Microcontroller Based Online Tuning of Fuzzy Gain Scheduling PI Controller for a temperature process
Babi . T, D. Pamela |
|
12 |
Unconstrained Profiling of Internet Endpoints via
Information on the Web
Mr. SENTHIL.M , Mr. VENKATANARASIMHARAO.V |
|
13 |
TOP-K SPATIAL QUERIES BASED ON QUALITY PREFERENCES
S.Iniyan , S. Thanga Prasath |
|
14 |
Fabrication of Polymer Nano Particles by Plasma Polymerization Method
Dr. S. Gokulraj. Debmalya Bhattacharya |
|
15 |
Optical Properties and Microstructural parameters of Nanoparticle by Ellipsometry Method
Dr. S. Gokulraj. Debmalya Bhattacharya |
|
16 |
A Network Based Vulnerability Scanner for
Detecting and Preventing SQLI Attacks in Web Applications
M.Muralidharan, M. Surya |
|
17 |
Prediction of EDM Responses for TiC 3% Al-6061 using Central Composite Design
Parthasarathy. C 1, Chandrasekaran. K, Samuel. M, Shivapragash. B |
|
18 |
AN ANALYTICAL ANALYSIS OF ANTENNA SELECTION ALGORITHMS IN MIMO SYSTEMS
Premnath S.P ,Jenifer J.R,Arunachalaperumal.C |
|
19 |
ARCHITECTURE FOR DECIMATOR IN MULTIRATE SIGNAL PROCESSING CIRCUIT
Ms.Purvi, U. Gandecha, Dr. SA Ladhake |
|
20 |
SOURCE PREFIX BASED FILTERING TECHNIQUE TO BLOCK UNWANTED
TRAFFIC IN THE NETWORK
S.Radhakrishnan, R.Kalaivani |
|
21 |
Lateral and Medial Rotation of Artificial Arm Using EOG Signal
Rahulsinh B. Chauhan |
|
22 |
Simulative Investigation of Single Channel DWDM System with and without Dispersion Compensation Fiber at 40 Gbps
Neha Chaudhary , Dr. Ranjit Singh |
|
23 |
TRACKING USER MOBILE POSITIONS USING NETWORK FLUX MODEL
M.Swapna, K.Tamilselvi, Sima kumari sinha, Mrs.D.Kerana Hanirex |
|
24 |
VTCMOS Leakage Reduction in various logic circuits
Tarun Sachdeva, Nitin Sachdeva, Dr. S.K Aggarwal, Nisha Kumari
|
|
25 |
INVENTORY MANAGEMENT SYSTEM USING ANDROID
Vaishali Kamble, Kirti Bhgyawant, Yugandhara Parab, Smita Shinde |
|
26 |
A Hybrid Method for XML Clustering with Dynamic Topic Updation
MS.THANGALATHA |
|
27 |
THE INFLUENCE OF LAND USE AND LAND-COVER CHANGES ON SURFACE WATER QUALITY VARIATION IN THE JAKARA BASIN NORTH-WESTERN NIGERIA
Adamu Mustapha, Ado Abdu, Abba Lawali Geidam |
|
28 |
Hand Gesture Recognition using Neural Networks
¬
Amith Mohan, Rohan Thorat, Santosh Thombare, B.W.Balkhande |
|
29 |
Concave Surface Evaluation in Specular Object contain Inter-Reflection
A. Anbarasi, A. Venkatesh, D. Premkumar |
|
30 |
Simulation of Efficient Low Voltage High Current Synchronous Buck Converterfor SMPS
DipendrasinhParmar, MehulsinhJadeja,T. B. Maniar |
|
31 |
An Efficient Key Generation In RSA Using Pseudo Random Generator
S. Divya, S. Dilipkumar |
|
32 |
QUICK AMBULANCE RESCUE SYSTEM USING GPS
G.Divya bharathi , M.Nandhini , Mrs.B.Hymavathi |
|
33 |
Improved Intrusion Detection System for Cloud
Environment
Rajesh Shankar Dongare , Ganesh Shivaji Gadhave , Kishor R. Kolhe |
|
34 |
Thermal Analysis of the Poppet Valves In I.C Engines
K.Gopinath |
|
35 |
Traffic Control System for Multi Topology Interior Gateway Protocol Based Networks
R.Indumathi, R.Sudha |
|
36 |
Simulation of Indirect Field Oriented Control of Induction Motor
Mehulsinh Jadeja, Prof. A.D.Joshi, Dipendrasinh Parmar |
|
37 |
A PWM based DC/DC Boost Converter with MPPT Solar Photovoltaic System
Jaypalsinhchauhan, Ravikumar Patel, A.D.Joshi |
|
38 |
A Software Engineering techniques for Improving Software Reliability
U.Ankaiah, G.Raviteja,Kandula.Venkata Reddy |
|
39 |
ORBITAL INDEX OF ADULT IGBOS AND ADULT OGONIS (AGED 17-70 YEARS)
Oladipo, G.S; Yorkum, L.K; David L.K |
|
40 |
RFID Used for Anti Theft in Shopping Malls:
A Research Survey
Ms. Khyati J. Gohil, Ms. Priyanka Trikha |
|
41 |
Design of Online Security Strategies for Large Social Networks
Kolla.Ashok Chakravartthi, khalim.Amjed merja |
|
42 |
Design of New Security Protocol for Privacy Preserving Data Aggregation in Wireless
Sensor Networks
Sakthivel.B , Dinesh.D |
|
43 |
A COMPETITIVE STUDY OF CRYPTOGRAPHY TECHNIQUES
OVER BLOCK CIPHER
Patil shrirang vitchalrao , Dr.Rajasekhra |
|
44 |
APPLICATION FOR QUANTUM CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER
G.Uma Sri, R.Kalaivani ,Patil shrirang vitchalrao ,Dr.Rajasekhra |
|
45 |
MOBILE AD HOC NETWORKS (MANET) ARE NETWORKS PROTOCOLS TO IMPROVE QOS
Mr.R.Rajasekaran, Mr.T.Senthil Murugan |
|
46 |
PRESERVING PUBLIC AUDITING ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD COMPUTING
Mr. C. Ernest Samuel Philip , Mr. R. SRINIVASAN , Mr.R.Rajasekaran |
|
47 |
SECURING APPLICATIONS IN PEER-TO-PEER DISTRIBUTED COLLABORATIVE ENVIRONMENTS
Mr. S.GOKULAKRISHNAN , Mrs. A. PADMAJA , MR.R.RAJASEKARAN |
|
48 |
A TECHNIQUE TO SECURE A DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION
Mrs. M.VIDHYA2Mr. C.BALA MURUGAN |
|
49 |
A Survey on Image Retrieval by Image
Manisha S. Ballal, Prof. Potdar G.P. |
|
50 |
Survey on Various Forms of Attacks and Counter Measures in Wireless Mesh Networks
M. Mohan chandra, Dr.V.Srikanth, N. Vijaya gopal |
|
51 |
RECOGNITION OF SPEAKER USING
MEL FREQUENCY CEPSTRUM
A.M.V.N.Maruti , D.Subhashini |
|
52 |
NOVEL APPROACH FOR HANDLING SELFISHNESS IN MOBILE
AD HOC NETWORK
Mrs K.Adlin Suji, Mr. R.Govindasamy |
|
53 |
HI-Tech Mound
Prof. S.B.Tatale, OmkarGanjewar Anish Pillai |
|
54 |
Optimal Policy for an Inventory Model without Shortages considering Fuzziness in Demand, Holding Cost and Ordering Cost
D.Dutta, Pavan Kumar |
|
55 |
A survey on web service composition for security and semantic problems
Mr. K. Purushothaman, Mr. Murugavel |
|
56 |
DESIGN AND DEVELOPMENT OF SKILL TESTS IN BALL BADMINTON
P. Raj Kumar, Dr. R. Kalidasan |
|
57 |
APC & MODIFIED OMS TECHNIQUES FOR OPTIMIZED LUT DESIGN
D.Rajitha, P.Suneetha, K.Suresh |
|
58 |
An SOA Based Framework for Integrating and Protecting High Sensitive Data
E.Poonguzhali, S.Ramakrishnan, A.Tharagesh, V.SVSSSRP Kumar |
|
59 |
An END-To-END SYSTEM for IMPROVING
QUALITY of DATA with DYNAMIC FORMS
G.Ravi Teja, U.Ankaiah , K.Rajesh |
|
60 |
Survey on Recommendation System Based on
Mahout
Sachin Walunj, Kishor Sadafale |
|
61 |
A SURVEY OF PALMPRINT IDENTIFICATION TECHNIQUES
Khot Sagar S. , Mane Vikram A , Vishal Kore |
|
62 |
Mining Frequent Itemsets from Spatial Data Bases by Using Markov Chaining Method (MCM) Approach
CH.M.H.SAI BABA, Dr. Rekha Redamalla |
|
63 |
An Autonomic Active Queue Management Mechanism to Improve Multimedia Flow
Delivery Quality
Mr.Rahul B Digge, Prof. Sanjeev C Mhamane, Prof.D.B.Mantri |
|
64 |
Efficient Matching Data Collection for Mobile Users in Personal Digital Assistant (PDA) Devices
T.Saravanan , Rajesh |
|
65 |
Cloud Computing: Concepts, Architecture and Energy Management
Savreet Kaur, Dr. Raman Maini |
|
66 |
Distributed Resource Discovery and Management in Shared Wide Area Platform
S.Shankar, S.Rajesh |
|
67 |
A STUDY ON USE OF ZERO KNOWLEDGE AUTHENTICATIONS AT P2P PROTOCOLS
Sharath Yaji |
|
68 |
PERFORMANCE EVALUATION OF DIFFERENT
EDGE DETECTORS
WITH SALT AND PEPPER NOISE
Sheenam Bansal, Dr. Raman Maini |
|
69 |
Enterprise Resource Planning-
A Complete Business Solution
Shravan Kumar, Shrikant Nirmalkar, Sudhir Kumar Meesala |
|
70 |
MEMS based Top-Loaded Monopole Antenna Operating at 77 GHz for Automotive Radar Systems
R.Revathy, K.J.Jegadish Kumar |
|
71 |
WATER TANK LEVEL MONITORING FOR WIRELESS SENSOR WITH GSM/GPRS MOBILE NETWORK
B.Siva Naga Raju,V.David Sushil, K.Raghava Rao |
|
72 |
PERFORMANCE ANALYSIS OF RANKING ALGORITHMS USING ONTOLOGY FOR WEB PERSONALIZATION
M.SONIYA , Dr. B.KALPANA
|
|
73 |
Secure Spread Spectrum Technique Using Video Watermarking for Data Hiding
Mr.P.Thiyagarajan, Mr.S.Senthilkumar, Mr.K.Sudhakar, |
|
74 |
ARTIFICIAL INTELEGENSE BASED ENERGY EFFICIENT WIRELESS SENSOR NETWORK
S.VEDANTHARAJAGOPAL, C.BALAJI |
|
75 |
Improving Page Rank Using Semantic Relevance
Er. Tanveer Singh, Dr. Raman Maini |
|
76 |
An Effective and Optimal Mobility Model and its Prediction in MANETs
Shsshiraj Teotia, Dr. S. Garg |
|
77 |
Providing Time-Based Dependable Service Composition for MANET
P.Iyappan, R.Varalakshmi
|
|
78 |
Grid Resource Monitoring and Prediction System With Resource Classification Based On NMF
J.Vasuki ,M.Kalimuthu |
|
79 |
ENHANCED ONTOLOGY-BASED ALGORITHM FOR TEXT DOCUMENT CLUSTERING USING DB-SCAN ALGORITHM
R.VIDHYA ROHINI , Dr. B.KALPANA |
|
80 |
A Survey on Mobile Cloud Computing: Concept, Applications and Challenges
Vikas Kottari, Vishwanath Kamath G, Lloyd Presley Saldanha, Chandan Mohan |
|
81 |
Practicability and Validation of Roundabout
Amit G. Shah, Prof. Suresh M. Damodariya |
|
82 |
Mining Educational Data using decision tree to Improve Student’s Performance
K. Arun |
|
83 |
Data Dynamics in Cloud Storage
G.Chaitanya, Dr.T.V.Rao |
|
84 |
Parallel Car Parking based on Fuzzy Logic
Hardik J.Parmar, Aditya C.Mhamunkar, Chandraprakash F. Jain, Kanchan K. Doke |
|
85 |
Control the Speed of PMBLDC motor by using DSP without position sensor
Chetan.P.Patil, Sagar.R.Ghuge, Rajendra. S.Ahire |
|
86 |
CELL PHONE JAMMERS
Divyashree P. K, Sahaja Nayak , Deepthi Krishna,Pallavi,Akshaya S. |
|
87 |
Middleware for Service composition and providing fault tolerant in cloud computing
S.Dhasarathapandian |
|
88 |
Simulation of Shunt Active Filter for Compensating Current Generation using Instantaneous Power Theory
Dhirendrakumar R Rana, Pradipkumar S Patel, Dr.S.N.Pandya |
|
89 |
A Review on Multi Level DC Link Inverter Topologies
G Durga Prasad, Dr. V. Jegathesan |
|
90 |
Virtual Reality For Interior Design
Bhagyashree Bhole,Varsha Saindane,Tejashvi Yewale,Prof.D.R.Ingle |
|
91 |
AN APPROACH FOR OPTIMIZING MACHINING PARAMETERS THROUGH TAGUCHI METHOD AND FUZZY RULE
S.ASHOKKUMAR, Dr.R.SARAVANAN |
|
92 |
Optimizing machiningparameters using artificial neural network
S.ASHOKKUMAR, Dr.R.SARAVANAN |
|
93 |
A method to optimize the Cutting Parameters Using Genetic Algorithm
RAJESH KUMAR, Dr.R.SARAVANAN |
|
94 |
An approach for balancing the assembly line using genetic algorithms
RAJESH KUMAR, Dr.R.SARAVANAN |
|
95 |
Multipath Routing Protocol for Congestion Control in MANET
Mr. S.A. Jain, Mr. Gaurav Chimote,Mr.Swapnil Sangle,Mr.Akash Bhagat |
|
96 |
Performance analysis of MAC protocols in underwater communication by using optimum packet size
Godwin Jacob D, Karthika S |
|
97 |
Social Networks and Security Issues
Annapurna Gummadi, M Sunitha, T Janardhan Rao, M Madhavi Latha |
|
98 |
Behaviour of High Strength Concrete by using Rice Husk Ash
ILIYAS. U. RASOOLBHAI, SUHASINI. M. KULKARNI |
|
99 |
Performance Improvement in Underwater Wireless Sensor Networks Using MFBR Technique with Error Control Coding
Kamesh M, Karthika S |
|
100 |
VHDL Modeling of Fuzzy Control System
Kanai Lal Kar ,Chandra Prakash Giri, Dr. B.B. Mangaraj |
|
101 |
Program Slicing
Kaustubh Bahdmukhe, Rohan Gandhi,Sumit Bhattacharjee |
|
102 |
THE PERFORMANCE OF BASALT FIBRE IN HIGH STRENGTH CONCRETE
Gore Ketan R , Prof. Suhasini M.Kulkarni |
|
103 |
Pricing Model in a Cloud Environment
Madhurendra, MBalakrishnashenoy |
|
104 |
INTEGRATED LAYERED APPROACH WITH CONDITIONAL RANDOM FIELDS FOR INTRUSION DETECTION USING GRID COMPUTING AND GRID SERVICES
Mrs. Shagupta Mulla, Mr. Mangesh Ghodake,
Mr. Bhavesh Tank, Mr. Prasad Darekar
Mr. Anup Tawdar, Mr. Vijaykumar Patil
|
|
105 |
A Survey Paper of Detect and Localize Text in Image
Maunil Patel, Aniruddhsinh Dodiya
|
|
106 |
EFFECT OF POLYPROPYLENE FIBRE ON THE HIGH STRENGTH CONCRETE
MR. Mehul J. Patel , MRS. S. M. KULKARNI
|
|
107 |
Modeling Network Communication in VANET Using Bluetooth Technology
M. Milton Joe, R.S. Shaji, R. Thulasi
|
|
108 |
A Healthy Deadlock determination on Interconnection Networks
S.Mohiadeen Abdul Kadhar , Dr. T.Revathi
|
|
109 |
Study of Image Registration for Area Matching By Using Transform Based Methods
Ms. Nayana M. Nichat, Prof. V.K. Shandilya, Ms. Snehali M. Khakse
|
|
110 |
An improved Symmetric key cryptography with
DNA based strong cipher
Komal Kumbharkar, Nazma Shaikh , Shraddha Yemale, Prof. Kanchan Doke
|
|
111 |
MATLAB-based Simulation of
Photovoltaic Solar Module and Array at
Different radiation values
Pradipkumar S. Patel ,Dhirendrakumar R. Rana
|
|
112 |
ARTICLE RETRACTED
|
|
113 |
Privacy-Preserving Updates to Anonymous and
Confidential Databases
Sheetal Doiphode, Poonam Deshmukh, Rahul Tarware, R.Ponmalar
|
|
114 |
Automatic Detection of Coal Mine Monitoring System using Wireless Sensor Network
R.Rajadurai, S.Tamilvanan,Geo Joe Mathai
|
|
115 |
A Review of Various Techniques of Face Recognition with Neural Networks
Rakesh Kumar, Sailendra Kumar, B.S.Puarkayastha
|
|
116 |
An Efficient Approach For Finding All Best Swap Edges of a Minimum Diameter Spanning Tree By Distributed Algorithm
Rakesh Kumar Yadav , Kumar Abhishek , Kerana Hanerix
|
|
117 |
AN UNUSED TRANSMISSION CAPACITY IN WIRELESS BROADBAND NETWORKS
M. Ram Rajesh, G. Rama Krishna, N. Vijaya Gopal
|
|
118 |
An Entropic EOQ with imperfect quality inventory control using dynamic programming
K. KALAIARASI
|
|
119 |
Visual Role Mining for Banking Sector
Poonguzhali. E, Sasikala.P, Suganya.S, Vishnupriya.S
|
|
120 |
URL TRACKER
Miss. Shalaka Chavan, Mr. Rahul Mirajkar,
Miss. Sahej Redekar, Miss. Priyanka Jadhav
|
|
121 |
Digital signature concepts and its implementation by using RSA, DSA and ElGamal
Shikha Jindal, Dr Raman Maini
|
|
122 |
Employee Promotion System Using SAP
Ajjarapu Krishna Pavan Kumar, Mrs. Syed Shaheen , Dr. B.PoornaSatyanarayana
|
|
123 |
SECURE MULTI PARTY PROTOCOLS FOR PRIVACY PRESERVING DATAMINING USING DATASETS
S.SUBASHINI, K.KALAIVANI
|
|
124 |
Fast and Scalable Method to Resolve Anomalies in Firewall Policies
Sudhir S. Jadhav, Sunil M. Jadhav, R.R.Agrawal
|
|
125 |
Reduction of Download Time in
Client-Server Network
Vinaya Bhat, Supriya Mallya, Bharath Jogi, Vishal Nayak
|
|
126 |
RECOVERY SCHEME FOR
MULTICAST COMMUNICATION
K.Suresh
|
|
127 |
RECOGNITION OF MARK AUTHENTICATION USING NEURAL NETWORKS
Dr.P.Suresh, S.Muthukumaran, J.Stalin Jose
|
|
128 |
A SURVEY ON WEB ANAYTICS –AN ONLINE EDUCATION SYSTEM FOR STUDENTS PERFORMANCE
R.Sylviya
|
|
129 |
CLOUD COMPUTING : IAAS
T.Gopikiran,S.Satyanarayana,A.Srinivasa Rao
|
|
130 |
Energy Aware Air pollution Monitoring System Using WSN
Prof.S.A.Mishra, Prof A.S.Kale, Prof.R.R.Agrawal, Prof P.U.Gandecha
|
|
131 |
Literature survey for Measurement of Delay in Undersaturated condition using Modified Saturation Flow Method at
Pre-timed Signalized Intersection
Amitkumar Arvindbhai Patel, Suresh M Damodariya, N B Parmar
|
|
132 |
Performance Analysis of Channel Allocation Strategy In WiMAX based System
Bhavin I. Patel, Bhaumik S. Khakhi, Dr. K.H. Wandra
|
|
133 |
Routing Security against Flooding Attack in Wireless Ad hoc Networks
A.Dhana Lakshmi , Dr.V.Srikanth , Mr.T.pavan kumar
|
|
134 |
USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT-ORIENTED SYSTEMS
K.G.S.VENKATESAN, M.ELAMURUGASELVAM
|
|
135 |
Virtual Machine Provisioning on Cloud
Prerana Jarande, Rajeshree Shelke, Monika Kharade, Goresh Musalay
|
|
136 |
Energy Efficient Clustering in Sensor Networks Using Cluster Manager
Sivakumar P, Ganesh Kumar P, Saravanan S
|
|
137 |
An Ultrafast And Efficient Method Optic Disc Localization And Optic Disc Boundary
Segmentation For Diagnosis Of Diabetics Retinopathy
S.K.Somasundaram
|
|
138 |
REDUCE THE FALSE POSITIVE AND FALSE NEGATIVE FROM REAL TRAFFIC WITH INTRUSION DETECTION
Balaji.S
|
|
139 |
ENHANCING THE SECURITY IN TOR
G.Priyadharshini, K.R.Nivethitha, S.Mohammed Arsath, Mr.S.Vinothkumar, Dr.S.Karthik
|
|
140 |
Stateful Threat Aware Removal System (STARS)
Jayesh Patil, Pranay Gawand, Shweta Barshe
|
|
141 |
SECURE PACKET SCHEME FOR PREVENTING JAMMING ATTACKS IN WIRELESS NETWORKS
R.Venisha, K.Gobinathan
|
|
142 |
Textual and Visual Content-Based Anti-Phishing:A Bayesian Approach
Priyanka Pandey,Sujit Sharma,Maulin Shah,Nidhi Sharma
|
|
143 |
SURVEY OF EVOLUTION OF MOBILE TECHNOLOGY
Khot Sagar S. , Kore Vishal S. , Chaugule Balaji A
|
|