Sr/ No |
Title |
Pdf |
1 |
Security and Energy Efficient Communication Scheme in Mobile Ad Hoc Networks
R.Aiyshwariya Devi,E.Devi priya |
Download
|
2 |
Comprehensive Survey On Face Tracking In
Real Time Video
Amit Bhoomkar, Ajay Kulkarni and Somnath Gosavi .
|
Download
|
3 |
A Survey New: Attribute-Based Encryption for Personal Health Records in Cloud Computing
Anitha A, Thamaraiselvi k |
Download
|
4 |
Detection of Unknown Anomaly on Network
- The Emerging Way
Anup G. Kadu, Dr. A.S.Alvi |
Download
|
5 |
COMPUTER AIDED ANALYSIS ON THOUGH TYPE OF R.C.C FOLDED PLATE
ARUN H. TEJANI, A.A. PARIKH |
Download
|
6 |
Spinning LED Display Using
GSM Interface
Ashutosh Shelke, Bhushan Varadkar, Sameer Tanksale , S.R. Wategaonkar |
Download
|
7 |
A 1.5 V Current Mode Winner Take All
Behzad Ghanavati, Zohreh Manoochehri |
Download
|
8 |
A 1.5 V Minimum Current selector circuit
Jamming Attacks
Behzad Ghanavati, Milad Kaboli, Zohreh Manoochehri |
Download
|
9 |
An Intelligent Robot for Bomb Detection with
Wireless Video Transmission
Babul Kumar, Debadas Khuntia, Chhote Lal Kumar Ram |
Download
|
10 |
Vertical handoff algorithm for wireless network
Bhaumik S. Khakhil, Bhavin I Patel, K.M.Pattani |
Download
|
11 |
A Review of Analysis of Cable-Stayed Bridge Subjected To Seismic Excitetion Using Sap2000
Bhavesh Mangukiya B., Suhasani Kulkarni M. |
Download
|
12 |
PIXEL BASED CORRELATION OF SAD AND SSD ALGORITHMS FOR DISPARITY MAP USING MULTIVIEW IMAGES
CHIRAG D. PATEL , KAPIL S. RAVIYA |
Download>
|
13 |
Image Segmentation by mixing of various EDGE Detection Techniques
C.H.Bhabhor, A.B.Upadhyay, V.D.Baria |
Download
|
14 |
Constructivist Learning Model
In Writing Learning Indonesian
Nunuy Nurjanah |
Download
|
15 |
Public Diplomacy For Good Governance
H.A. Asep Saefudin |
Download
|
16 |
Simulink Based Verification Model for ZigBee Transceiver
Dipak V. Vaniya, Sima K. Gonsai |
Download
|
17 |
USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT- ORIENTED SYSTEMS
K.G.S.VENKATESAN, M.ELAMURUGASELVAM |
Download
|
18 |
Location Estimation in Cellular Networks
Using Artificial Neural Networks
A.Gouthami , k.Vijayasri , B.Anil Singh , M.Kamalesh , G. Narendra Naik |
Download
|
19 |
Secure Data by Espionage Method using Substitution+Steganography
Grishma Trivedi, Chirag Patel, Kishor Bamniya |
Download
|
20 |
Firewall Scenario and Issues
Gursimrat Singh, Amitoj kaur, Amardeep Singh |
Download
|
21 |
Gradient Feature Based Image Super Resolution Using Neighbor Embedding
Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi |
Download
|
22 |
A Survey on Load Balancing Techniques in Cloud Data Center using VM Migration
Hitesh B Patel, Prashant B Swadas, Sudarshan N Patel |
Download
|
23 |
A SYSTEM FOR NEGLIGENT BIKE RIDERS
JAI RAJESH.P, ARIFA BEGAM.A |
Download
|
24 |
IEEE 802.3 MAC Transmitter Using FSM and VHDL Techniques
MR. JANAK A.PATEL, PROF. PANKAJ P.PRAJAPATI, PROF. PIYUSH R. KAPADIYA
|
Download
|
25 |
A Privacy-Preserving in Wireless Sensor Networks using generalization and suppression methods
B.Karthika,J.K.Jeevitha |
Download
|
26 |
Discrete Wavelet Transform (DWT) and
Singular Value decomposition (SVD)
applied to Digital Image
Mrs.S.Jothi Lakshmi, Dr.VE.Jayanthi |
Download
|
27 |
A Novel Approach - Effective Method of Prevention of Cache Poisoning for Wild Card Secure DNS
K.Sampath Kumar , Dr.G.K.D.Prasanna Venkatesan , R.Vignesh |
Download
|
28 |
Reputation with Lie-Detector Scheme to Restrict Black Hole and Selfish nodes in MANET
¬
Kanimozhi.M,Madhavi.S |
Download
|
29 |
Improving Trustworthiness Of Websites
Using Truth Finder Algorithm
Mrs.G.Kirubasri , Mrs.A.Sathya Sofia |
Download
|
30 |
Dimensionality Reduction in Text Classification using Feature Reduction Approaches
P. Kiruthiga |
Download
|
31 |
INTERNET2
FOURTH GENERATION INTERNET
Latika Chaudhary, Sangita Panmand, Prachi More,Prof. M.A.Devmane |
Download
|
32 |
Genuine Route Identifier (GRI) scheme for USOR to Restrict Worm hole Attack in MANET
Maharani.R,Kanagaraju.P |
Download
|
33 |
Collection of Sensor data in an energy efficient manner using Rendezvous
based approach
Environment
Mrs.S.Pushpalatha, P.Manoj Kumar, |
Download
|
34 |
Designing of A new Low Voltage Low Power Tunable Fuzzy Logic Controler Chip
Milad Kaboli, Behzad Ghanavati |
Download
|
35 |
SECURING WEB SERVER AND DATABASE SERVER FROM QUERY PRIVILEGE AND INJECTION ATTACKS
T.Mohana, |
Download
|
36 |
Improving Performance of Search Engines using Morphology
Nargis Parveen, Mohd Athar |
Download
|
37 |
Paper 37 available at last of this page |
|
38 |
Noise Level Estimation Deblurring using Directional Filters
Miss.Pallavi Mankar, Miss.Mrunal Datir, Miss.Sonali Rathi |
Download
|
39 |
A Location Privacy Using Monitoring System for Wireless Sensor Networks
D.Udhaya Kumara Pandian, P.Natarajan |
Download
|
40 |
Collaboration of Two Approaches for the Detection of Outlier
Niketa V. Kadam , Prof. M. A. Pund |
Download
|
41 |
Privacy Preserving in Association Rule mining
Nilesh R. Radadiya, Nilesh B. Prajapati, Krupali H. Shah |
Download
|
42 |
Medical Application Based on Wireless Sensor Network
Niraj Patil, Asip Mulla, Prasad Nikam, Dipak Shinde |
Download
|
43 |
OPTIMIZED TRAVELING SALESMAN PROBLEM USING ESTIMATION MAXIMIZATION TECHNIQUE
D.Nithya, Dr.B.G.Geetha, |
Download
|
44 |
THE EFFECT OF MEASURING PROCEDURE ON THE APPARENT RHEOLOGICAL PROPERTIES OF SELF-COMPACTING CONCRETE
MR. V.A. PATEL, S.M. KULKARNI |
Download
|
45 |
RECENT TRENDS IN MOBILE TV TECHNOLOGY
Prachi P. Londe |
Download
|
46 |
Domain Decomposition Based Game Theory to Arrive Optimal Video Streaming Pricing Policies
N.Prakash, P.Manimaran |
Download
|
47 |
Analysis and Basic Implementation of Audio Watermark in Digital Image
P. S. Patel, N. M. Patel, U. K. Jaliya. |
Download
|
48 |
Dependable and Protected Storage Services
in Cloud Computing
M.Shanmugapriya, |
Download
|
49 |
Retrieving Energy Using Peltier Effect
Vibhav Sharma , Priyam Ganguly, Syed Md. Taqiudeen , B.karthik |
Download
|
50 |
Software Testing Approach for efficient Bug finding with Yin-Yang Testing Theory
Gaurav Saini, Kestina Rai |
Download
|
51 |
Data retrieval from cloud with cache implementation
K.Venkata Raju , P. Dinesh, M.Sudheerraja |
Download
|
52 |
CRIME PATTERN ANALYSIS USING
SPATIAL DATA MINING
R.Ragunath, P.Sathishkumar |
Download
|
53 |
VHDL Implementation of
Viterbi Decoder by Butterfly Module
Mr.Rajan N. Shah,Mr.Altaf I. Darvadiya |
Download
|
54 |
EFFECTIVE PREPROCESSING TECHNIQUE FOR BETTER BORDER DETECTION
K.Rajesh , and A.Gnanabaskaran |
Download
|
55 |
Prevention of Pollution Attacks and DoS Attack in Network Coding Using Node Identity Verification Scheme
R. Karthick, K. Chandraprabha and B.G.Geetha |
Download
|
56 |
EFFECTIVE OPTIMAL SEARCHING MECHANISM USING
TEXT MINING
J.E Nalavade,Ruchi Priya,Priya Koul,Riya and Manish Anand |
Download
|
57 |
Efficient Database Indexing Techniques using Cluster, Non-Cluster and Full Text Indexing
Mr. Kawhale Rohitkumar K., Miss. Prachi Patil M., Mr. Chabukswar Mandar U. |
Download
|
58 |
IDENTIFYING FALSE ALARM IN SELFISH REPLICA
ALLOCATION
K.Sathyaseelan,S.Rinesh |
Download
|
59 |
Heterogeneity in Stochastic Frontier Models
. V. SEETHA LAKSHMI |
Download
|
60 |
MOVING OBJECT DETECTION IN AIRBORNE VIDEOS
Selvakumar S, Rajalakshmi K |
Download
|
61 |
AN EFFICIENT APPROACH FOR INCREASING POWER OPTIMIZATION IN MOBILE ADHOC NETWORKS
M. Senthil Kumar, Dr. Ashish Chaturvedi |
Download
|
62 |
A Comparative Analysis of Reactive and Proactive Routing Protocols in Mobile Ad-hoc Networks
Shiva Prakash, J.P. Saini, S.C. Gupta |
Download
|
63 |
Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi |
Download
|
64 |
A Comprehensive Study of Cryptography and Digital Signature
Sonia, Dibjot Kaur |
Download
|
65 |
Learning Structure in Cloud
(Implementing SaaS)
Ambati Nikhila, K.V.D.Kiran, V.Sreenivas |
Download
|
66 |
Comparative Study on hardness of As-cast and heat treated Al based hybrid composites
M. Sreenivasa Reddy, Dr. Soma V. Chetty |
Download
|
67 |
A SCIENTIFIC APPROCH FOR FILTER DESIGN IN SPATIAL DOMAIN IMPULSE NOISE REMOVAL IN DIGITAL IMAGES
Dr.B.SRINIVASARAO |
Download
|
68 |
Reconfigurable Architecture of FPGA Based Image Compression Using DWT
D.Vanathi, S.Rajkumar, D.Thamarai Selvi |
Download
|
69 |
STATCOM BASED MITIGATING POWER QUALITY ISSUES IN GRID CONNECTED WIND ENERGY SYSTEM USING LABVIEW
S.Venkateshwaran , G.Vijaya gowri |
Download
|
70 |
Experimental investigation of vortex flow visualization using various fluids
Vijay Kumar. S, Dr. K. V. Sreenivasa Rao & Dr. A. N. Khaleel Ahmed |
Download
|
71 |
Effect of Aerodynamic Force in Modern Cars
M.Venkatasudhahar, T.Manvelraj |
Download
|
72 |
Spectrum sensing techniques and power control algorithm using power swarm optimization for cognitive radio
Yogesh N. Kakadiya ,Kiran Parmar
|
Download
|
73 |
UTILITY WIRELESS MULTIPOINT CIRCULAR AND EMERGENCY MESSAGE TRANSFER SYSTEM
BABU SAHEB, ASHOK KUMAR, ABHISHEK SINGH, ABHISHEK SINGH |
Download
|
74 |
Optimal Cost for VANETS Streaming Distributions
Abir Biswas ,Kailash Kumar Sinha, Dr. T. Nalini |
Download
|
75 |
Sentiment uncovering by employ of Biometrics techniques
Dr.Kashif Qureshi |
Download
|
76 |
BIOMETRIC AUTHENTICATION FOR A MOBILE PERSONAL DEVICE FOR ACCESING WEB SERVICES
Akash Kanshal, Pankaj Kr Giri, Dr.C.Nalini |
Download
|
77 |
A System for Email Users Clustering, Automatic Answering and Automatic Text Summarization.
Akshay Jayale, Sudershan Karad, Sudhakar Gawade
|
Download
|
78 |
DYNAMIC PORTABILITY AND STREAMING OF ADVERTISEMENTS BASED ON CONTENT AWARE AND USER INTEREST PROTOCOL
ASISH KUMAR DODKA,AMITABH KUMAR,DR.A.KUMARAVEL |
Download
|
79 |
A Review Paper on Wireless Sensor Networks: Applications and System
Amitoj Kaur , Gursimrat Singh |
Download
|
80 |
Survey on Digital Image Watermarking: Techniques and Attacks
Amitoj Kaur, Jagroop Kaur |
Download
|
81 |
Trendsetter:Location Service using Android
Prof. Vidya Chitre, Amritansh, Deepratna Aditya, Deepak Pandey |
Download
|
82 |
Nonlinear Effects and its Impact on WDM Systems in Optical Fiber Communication
Anupjeet Kaur |
Download
|
83 |
DETECTION OF VITAL SIGNS IN PATIENT MONITORING SYSTEM BASED ON ANYCAST MODE
S.M.Shakir, Avanish Dubey, S.Pothumani |
Download
|
84 |
Discovering a Pattern in Effective Manner
Avinash S Shegokar, Rohit S Jachak, Ashish Yerawar |
Download
|
85 |
A 1.5v CMOS Fuzzifier Using Adaptive Biasing
Behzad Ghanavati, Milad Kaboli |
Download
|
86 |
Analysis of Integrating RFID technology in B2B applications
Mr.S.Balamurugan, Mr.E.Gurumoorthi, Mr.R.Ramakrishanan, Mrs.M.Vasuki |
Download
|
87 |
Non-linear Static Analysis of RC Frame Building with and without Shear Wall
Mr. Bhargav D. Patel, Prof. S. M. Kulkarni |
Download
|
88 |
3rd Level Image Hiding Technique Using Alpha Blending Method
Bhavna A Marwada ,Yagnesh J Parmar , Kishor Bamniya |
Download
|
89 |
Video Transmission in WMSN Environment using Compressed Sensing Technique
Chetan S. Deshmukh, Prof. S.V.Dhopte |
Download
|
90 |
Wavelength Division Multiplexing Passive Optical Network: review paper
Chinky rani , Kulwinder Singh , Bhawna utreja |
Download
|
91 |
Single Phase Online UPS Employing Advanced Charging Technology with Power Factor Corrected Rectifier
Chintan Patel, Dipendrasinh Parmar, T. B. Maniar |
Download
|
92 |
State-of-art review on
Study of high performance concrete containing supplementary cementitious materials
MR.D.V.SONI, S.M.KULKARNI, DR.V.P.PAREKH |
Download
|
93 |
Managing the Denial-of-Service Attacks Using Rectified PPM Algorithm
V. Midhun, T. Nalini, M. Padmavathy |
Download
|
94 |
Static Analysis of Composite Mono Leaf Spring For LCV (TATA ACE ) - Design, Manufacturing and Testing
Mr. P.B.Patole , Mr. Jeevesh Kumar ,
Mr. A.S.Kondi , Mr. G.B.Kalukhe ,
Mr. A.H.Gongane , Mr. S.R.Ingole
|
Download
|
95 |
Quality Classification of Peanut using Computer Vision Technique
Govind Chaudhari, Kinjal Mehta |
Download
|
96 |
Topic Identification Using Temporal and Concept Relationship Analysis on Text Streams
Jayalakshmi.M, Gunavathi.C |
Download
|
97 |
IMPLEMENTATION OF SPECT TECHNIQUE IN DETECTION OF CANCER
Chagamreddy Jhansi, K.S.Roy,Shaik Mahaboob Ali |
Download
|
98 |
Various Cellular Generations –A survey
M.UdhayaMoorthi,M.jagadesh,C.MageshKumar |
Download
|
99 |
End-to-End Delay caused by M/M/1 Queuing Model
Kiran Gowda.C, K.C.Gouda, K.Raghuveer, Kumuda.M.N |
Download
|
100 |
SOME ATTACKS ON CRYPTOGRAPHIC HASH FUNCTIONS
C. Krishna Kumar , Dr. C. Suyambulingom |
Download
|
101 |
OPTICAL CHARACTER RECOGNITION USING NEURAL NETWORK
Krunal H. kubavat , Sima K. Gonsai |
Download
|
102 |
Effective Human skeleton extraction from single monocular video
A.MADESWARAN, and Dr. K.SAKTHIVEL |
Download
|
103 |
MULTIFACTOR AUTHENTICATION
FOR E-COMMERCE APPLICATIONS
Namita Redkar, Manish Yadav, Prof. D.R. Ingle |
Download
|
104 |
DESIGN and ANALYSIS of POST TENSIONED PRESTRESSED CONCRETE MEMBER by USING ADAPT SOFTWARE
Mayank I. PATEL, S. M. KULKARNI,
|
<Download
|
105 |
A Study of Teacher’s perception with special reference to English as a second Language
Mohammed Sajid
|
Download
|
106 |
Optimization Approach to Link and Power Allocation in Cellular Networks
M.N.Mehta, Dr. K.R.Parmar
| Download
|
107 |
Designing Of A New 0.18um CMOS Voltage Mode Squar Root Analog Multiplier
Milad Kaboli, Behzad Ghanavati
| Download
|
108 |
New Design Of A 0.18µm CMOS Low Power High Frequency Four Quadrant Multiplier
Milad Kaboli
| Download
|
109 |
Design a novel Low-Noise ,High Gain and High Bandwith Amplifire for 5GHz Wireless Recivers
Farhad Amiri, Milad kaboli
| Download
|
110 |
AUTOMATIC VEHICLE STARTER SYSTEM BASED ALCOHOL BREATH ANALYZER SENSING
LILU MAHTO ,RITESH KUMAR ,SANTOSH KUMAR, Mrs. SARAVANA.S M.E
| Download
|
111 |
WATER LEVEL CONTROL SYSTEM USING PLC AND SCADA
MD HASNAIN ,RAKESH RANJAN ,AMOD KUMAR SINGH
| Download
|
112 |
Status of Soil and Water Conservation Practices in Tigray Region, Ethiopia: A Case Study
Mushir Ali
| Download
|
113 |
Smart Class using Wireless Technique
MD PARWEZ ALAM,
PANKAJ TRIPATHI,
NISHANT KUMAR VIDHYARTHI, SARAVANA.S
|
Download
|
114 |
An Remote Data Possession Checking (RDPC) Protocol for Storage Security in Cloud.
Naganandhini.S,
| Download
|
115 |
Spatio-Temporal Network Anomaly Detection By Assessing Deviations Of Empirical Measures
Nihar Ranjan Sethy, T. Nalini, M. Padmavathy
| Download
|
116 |
Dynamic Detection Strategy Based Flow Analysis Scheme for Flash Crowd Attacks
Narmadha.B,AyyaMuthukumar.D,Kannan.M
| Download
|
117 |
PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs
Rahul Sanskritayayan,Nidhi Raina,Sunil Jadhav,KanchanDoke
| Download
|
118 |
Steganographic Secure Data Communication –A Hardware Approach
Mrs.A.N.Naik, Prof.R.T.Patil , N.B.Naik
| Download
|
119 |
A DYNAMIC APPROACH TO IMPROVE THE TRANSMISSION EFFICIENCY IN WIRELESS AD HOC NETWORK
S Nivedha, S Raghul Krishna, T Ramyapriya, P Boopathi
| Download
|
120 |
Cloud Computing: Alternative to Enormous In-House Data Centers
Prof. Pallavi S. Kadam , Prof. S. B. Patil
| Download
|
121 |
OPTIMAL STOCHASTIC LOCATION UPDATES IN MANET USING DREAM ALGORITHM
P.Poonkodi, P.Boopathi , Prof.T.Kalaikumaran
| Download
|
122 |
Performance Evaluation of Canny Edge Detector for Noisy Images
Priya Arora, Dr. Lakhwinder Kaur
| Download
|
123 |
Authentication in Cloud Computing
Mr. Amey Hawal, Mr. Rahul Mirajkar, Mr. Sagar Lad
Miss.Pouravi Kadam , Miss.Sayali Jamadade
|
Download
|
124 |
Advanced Multimedia Messaging Services for Improving Examination Result System
Mr. Rahul. P. Mirajkar, Mr. Ranjeet Kumbhar, Mr. Ajinkya Sarnobat, Mr. Pramod Pawar
Mr. Sagar Yadav, Mr. Nitin Patil
| Download
|
125 |
A MODEL OF DATA WARE HOUSING PROCESS MATURITY
Ranjan Kumar paswan , Naveed Hussain Farooqui
| Download
|
126 |
PREVENTION OF UNAUTHORISED DATA MODIFICATION SYSTEM USING SECURED MULTI KEY IMPLEMENTION
RAVI KUMAR, GOPAL PRASAD BEHERA, R.CHANDARSEKARAN
| Download
|
127 |
A practical approach of DoS/Jamming attack of Cognitive Radio Network
Roshan Singh Thakur , Prof. Parul Bhanarkar , Prof. Girish Agarwal
|
Download
|
128 |
INTELLIGENT PUBLIC TRANSPORT SYSTEM USING INFORMATION FORENCICS AND SECURITY
Prof. Sunita Barve, Sagar Dasgude , Atish Walunj , Mahaveer Jain
| Download
|
129 |
ANALYSIS OF SEMI-AUTOMATION CLUSTERING TECHNIQUES FOR PERSONA DEVLOPMENT
MD SHAMSHAD ALAM, VINAY KUMAR,
|
Download
|
130 |
SMART TINY E-CARD FOR EMPLOYEE MANAGEMENT SYSTEM USING WIRELESS PROTOCOL
SAURABH KUMAR, RAJU KUMAR, ROHIT KUMAR, M.JASMINE
|
Download
|
131 |
XML Data Search with Query Assistance and Semantic Analysis
Selvi.V,Rajkumar.S
|
Download
|
132 |
A comparative study of arrivals and prices of agricultural commodities at APMC using Time Series Analysis
Patel S.A., Patel J.M.
|
Download
|
133 |
Enhancement of Password Guessing Resistant Protocol With Cookie and Session Monitoring
Sindhu.M
| Download
|
134 |
Data Warehouse as a Service (DwaaS)
Sreekanth Tangudu, Velagapudi Sreenivas , K.V.D Kiran
|
Download
|
135 |
Ensured Data Packet Security and Integrity using Merkle Hash Tree Algorithm in Cloud Computing System
SRIMANTA SARKAR , SYED IKRAM AHMED
|
Download
|
136 |
A Hash-Based RFID Security Protocol
Subodh S. Bhoite, Prof. Pawar Sanjay Shamrao
|
Download
|
137 |
Iris Detection Techniques: Daugman’s Integro-Differential Operator and Ellipse fitting
Sunny H. Mujpara, Kunal P. Acharya
|
Download
|
138 |
Methods for Software Testing in Cloud
Computing Environment
Krishna Tej Koganti, Sai Sagar.Narasingu, Eswar Patnala, K. N. Soujanya
|
Download
|
139 |
Resource Allocation and Load Distribution for Mixed Workloads under Cloud Environment
Sutha.K,Kaladevi.P
|
Download
|
140 |
MODELING OF WIND TURBINE FOR WIND ENERGY CONVERSION SYSTEM
Vaibhavi Parmar, Prof. H.D.Mehta
|
Download
|
141 |
A High Throughput Low Complex VLSI Architecture for MIMO
M.U.Veenesh, N.Mahendran
|
Download
|
142 |
Simulation and Performance Evaluation of Lee model under Urban, Suburban and Rural Environments for GSM system in mobile communication
Vimal Patel, Kinjal Mehta, Vishal D. Nimavat
|
Download
|
143 |
A study and comparison of Priority Inheritance Protocol and Priority Ceiling Protocol
Vishal Prajapati, Apurva Shah
|
Download
|
144 |
Design of Ultra-Wide Bandpass Filters
Using Electromagnetic Band Gap
Abhishek Sinha , Kumar
Gaurav,
Kundan Kumar,
Pankaj kr. Yadav
| Download
|
145 |
Smart Identity Management system using Biometrics
Dr.Kashif Qureshi
|
Download
|
146 |
MULTIMODAL BIOMETRICS FOR VEHICLE ACCESS
Dr.Kashif Qureshi
|
Download
|
147 |
Detection Of Gray Hole Attack In Mobile Ad-hoc Network
Nilesh Rokade, Madhav Pandhare, Nikhil Wani, Priyanka Patil
|
Download
|
148 |
Fine grained group based job scheduling algorithm with highest computing resource in grid
Achyut Sakadasariya
|
Download
|
149 |
Fuzzy Keyword Search over Encrypted Data using Search Scheme in Cloud Computing
K.Rajesh,K.Venkatreddy,G.RaviTeja
|
Download
|
150 |
Non Uniform High Density Anchor Nodes Scheme for Localization of sensors in WSN
Gurpreet Singh, Sandeep Singh Waraich
|
Download
|
151 |
Advanced Differential Protection Scheme Using Microcontroller
Dilipsinh Gohil, Kalpesh Rathava, J.B.Pujara
|
Download
|
152 |
Pattern Co –orientation In Spatial Based Retrieving Data in Content Based Segmentation
B.Dinesh, L. Ashok Kumar
|
Download
|
153 |
Implementation of PAPR reduction technique in SFBC based OFDM MIMO systems
Mr. Dipak K Patel ,Mr. Kunal M Pattani
|
Download
|
154 |
Stability Analysis By Feedback Control Based
Biped Robot
Divrania Dhirubhai A., Rathod Ajit A., Patel Ankit A.
|
Download
|
155 |
HAND & HEAD MOUNTED HAPTIC FEEDBACK SONAR OBSTACLE AVOIDANCE DEVICE
AMRENDRA KUMAR SINGH,
ADAPA ASHISH KUMAR,
CHANDAN KUMAR PASWAN,
JAYANTA DEY
|
Download
|
156 |
An Efficient Crash Prediction and Secured Communication of OLSR Routing Protocol uses Different Key Exchanges for VANETs
R.Gowtham, M.Suguna, Dr.D.Sharmila
|
Download
|
157 |
A review of TCP Reno, TCP Vegas and TFRC for mobile ad hoc networks
Gurmeet Singh, Jaswinder Singh
|
Download
|
158 |
Strategies For Developing a Sustainable ICT Management System For Distance Learning In Kenya. The ODL Model
Kimutai James
|
Download
|
159 |
FINGERPRINT BASED BIOMETRIC ATM AND CREDIT CARD PAYMENT
Dhananjay Kumar Tiwary, Chandan Kumar, Amit Kumar, Ms. Arul Selvi
|
Download
|
160 |
Comparison and Analysis for low power CMOS sram cell using 90 nm and 180 nm technology using cadence tool
Sagar Joshi, Sarman Hadia
|
Download
|
161 |
Circular Shift operation on Mesh and Hypercube
Ms. Khyati Gohil
|
Download
|
162 |
WIRELESS SENSOR NETWORKS USING HIGH SECURITY FOR NODES
J.VIJAYARAJ, R.RAJASEKAR,MA.MOHAMMED ANSAR ALI
|
Download
|
163 |
Energy Saving routing Scheme for Information Gathering and Collision Avoidance in Wireless Sensor Network
Jasmeet kaur, Sarpreet Singh
|
Download
|
164 |
Various Efficient Cluster based Power Saving Scheme for WSN
Navmeet kaur, Kamaljit Kaur
|
Download
|
165 |
IMPACT OF LYDIARD TRAINING WITH TAPERING ON SELECTED
PHYSIOLOGICAL VARIABLES AMONG MALE RACE WALKERS
K.Mohan , Dr.R.Kalidasan
|
Download
|
166 |
USING SELF ORGANIZING TEAM IN AGILE SOFTWARE DEVELOPMENT
R.Rajadurai, S.Nandhini
|
Download
|
167 |
DDoS Attack Prevention In Cloud Computing Using Hop Count Based Packet Monitoring Approach
Nisha H Bhandari
|
Download
|
168 |
Security in AODV against
Wormhole attack in MANET
Priyanka B. Patel, Purvi N. Ramanuj, Dr. J.S. Shah
|
Download
|
169 |
Evolution towards Grid Computing: A Survey
Gaurav Sharma , Puneet Banga
|
Download
|
170 |
EFFECT OF VARIOUS STRENGTH TRAINING PROGRAMMES ON SELECTED PHYSICAL AND PERFORMANCE VARIABLES
AMONG MALE ATHLETES
M. Arunkumar, Dr.A.Surendar
|
Download
|
171 |
Implementation and Performance Analysis of 4-bit GDI Adders
RUPAL N.ASHWANI , BHARAT H.NAGPARA
|
Download
|
172 |
Automatic Reconfiguration for
Large-Scale trustworthy Storage Systems
Dr.B.G.Geetha, P.Senthil Raja, R.Vijay sai
|
Download
|
173 |
A New Data Mining Approach for Network Intrusion Detection
Mr. Narayan Arjunwadkar, Mr. Jeevan Barguje, Mr.Rohit Barde, Mr. Sachin Hirave, Prof. N.K.Patil
|
Download
|
174 |
A Study to determine the Suitability of Ground Water for Irrigation Purposes in Madurai District, Tamil Nadu, India
R. Padmanaban, M. Dharmendirakumar, P.B. Sakthivel, and N.S.Elangovan
|
Download
|
175 |
8x8 Bit of Low Power Multipliers
Shivam K.Dave, Bharat H.Nagpara
|
Download
|
176 |
Fast and Variable Amount of Data Collection in Tree Based Wireless Sensor Networks
Sivakumar M., Suguna M.
|
Download
|
177 |
DATA FORWARDING IN MULTIHOP LOW DUTY-CYCLE WIRELESS SENSOR NETWORKS
SRIDHAR D., THAMARAI SELVI.K
|
Download
|
178 |
Implementation of On Demand Routing Protocol to Load Balance in MANET
V. K. Sivaprasad
|
Download
|
179 |
Infrastructure in Cloud as a Service Provider
ShanmukhaPriya.P, Sasiveena
|
Download
|
180 |
Mobile Ad-hoc Networks in the Battlefield With 4G Support
ViswasriSravya.M, NagaSaiKeerthi.J, M.S.S.Dasarsh Rajarao
|
Download
|
181 |
AUTOMATIC ACCIDENT SPOTTING REMOTE TUNED BLACK-BOX
Pronali Sonowal,
Renu Gupta
|
Download>
|
182 |
Development of Palm Date Pits Activated Carbon Adsorbent for Textile Effluent Treatment
AdeolaG. Olugbenga, AbubakarMohammed, Clement B. Arowosola
3
|
Download
|
183 |
DOUBLE GUARD: DETECTING INTRUSIONS
IN MULTITIER WEB APPLICATIONS
Mohamed AfzalKhan.A, Mr.Chandrasekaran
|
Download
|
184 |
New Scheme for Prevention of Wormhole Attack in Manet
Ajit Singh, O.S.Khanna
| Download
|
185 |
Analysis of Image Compression and Decompression using JSS algorithm- A Review
Gaganpreet Kaur , AmandeepSingh , Dr. Dheerendra Singh
|
Download
|
186 |
Intelligent Heart Disease Prediction System using Naive Bayes Classifier
Amol P. Patil , Ayodhyanadan P. Bhosale , GokulP. Ambre,Sumit P. Pawar , Prof. M. S. Chaudhari
|
Download
|
187 |
A novel technique based on ant colony optimization for image stitching
Amrita, JaspreetSingh Cheema,Nirvair Neeru
|
Download
|
188 |
PRACTICAL ATTACK SCENARIOS ON SECURE ELEMENT-MOBILE ENABLED DEVICE
Anil Kumar Singh, Chandan Kumar, Chandan Kumar Deo
|
Download
|
189 |
GESTURE CONTROLLED CAR DRIVING SYSTEM TO ASSIST THE PHYSICALLY CHALLENGED
ANUPAMA SINHA, ARCHANA KUMARI, AVINASH KUMAR, S.P.VVIJAYARAGAVAN
|
Download
|
190 |
A Simulation of Measurement of WBC using MEMS
Arpita GUPTA, T.K.BASAK, G.U.KHARAT, Poonam GOYAL
|
Download
|
191 |
A Challenge in E-Passport: 2D Human Skull Recognition
using Mutual Information Algorithm with
Passport Display Screen
C.V.Arulkumar, Prof.G.Selvavinayagam
|
Download
|
192 |
Context disambiguation based on dynamic Bayesian networks for context-aware environment in pervasive computing
Arun Paul. J , Dr.B.G.Geetha
|
Download
|
193 |
Analysis for the Parameters of various Queueing Models
T. Ponnammal, Dr. G. Eswara Prasad
|
Download
|
194 |
Robot Navigation System With RFID And
UltrasonicSensors
Manjeet Kumar , Azhar Farhan,Kumar Abhinav ,Kumar Abhishek
|
Download
|
195 |
Multi-hop Stable Selection with Mobile Sink in Wireless Sensor Network
Simarjeet Singh, Jaswinder Singh
|
Download
|
196 |
NETWORK SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY
Sumesh Ranjan Sethi, Sidhartha Ku. Satapathy, Sushanta Kumar
|
Download
|
197 |
3-Level NPC Inverter Testing on Different Loads
Hardik Patel, Vijesh Patel, Dr. S.N.Pandya
|
Download
|
198 |
Speech Encryption Techniques: A Selected Review
Jaspreet kaur , ER. Kanwal preet Singh
|
Download
|
199 |
DETECTION TECHNIQUES WIRELESS SENSOR NETWORKS AND SECURITY
R.RAJASEKAR, MA.MOHAMMED ANSAR ALI, J.VIJAYARAJ
|
Download
|
200 |
LOCALIZATION
IN WIRELESS SENSOR NETWORKS
MA.MOHAMMED ANSAR ALI, R.RAJASEKAR, J.VIJAYARAJ
|
Download
|
201 |
DESIGN OFAUTO-GUARD SYSTEM BASED ON RFID AND NETWORK
KUMAR MADHUSUDAN , Mrs. NIRUBAMA, PRAGNYA PRAKASH NANDA, P. GOPI,1. Y.V. JESHWAR DAS
|
Download
|
202 |
WIRELESS MOTOR SPEED CONTROL USING RF SENSOR
kumari nimmi , M.Surumbar khuzhali, Ruby kumari , Pragati bag
|
Download
|
203 |
PREVENTION OF ONLINE PASSWORD HACKING PROCESS WITH SECURED MULTI AUTHENTICATION SCHEME
Kunjesh Kumar Mishra , Vimal Chand , G. Michael
|
Download
|
204 |
PRIVACY-PRESERVING REDISTRIBUTED KEY-POLICY ATTRIBUTE-BASED SECRET WRITING
Mac Donald Khongwir , Debabrata Laimayum , Ms. Anuradha
|
Download
|
205 |
Energy Efficient clustering scheme analysis with mobile sink in Wireless Sensor Network
Deepinder Kaur, Kamaljit Kaur
|
Download
|
206 |
Analysis of Mode Choice Behaviour of Students for College Trip
Mayank H. Rathod, Prof. Suresh M. Damodariya, Dr. Vilin P. Parekh
|
Download
|
207 |
Retain Data In Mobile Disconnected Network Using Trajectory Approach
S. MELBA,N.S. USHA
|
Download
|
208 |
AUTOMATED SHOPPING CART
MUMPI GHOSH , Mrs. SARAVANA.S ,RUSHI MAHATO,SAGARIKA BEHERA
|
Download
|
209 |
Performance Evaluation of Image and Video Steganography for optimization of PSNR
Naitik P Kamdar, Dolly H. Patira, Dharmesh N.khandhar
|
Download
|
210 |
Optimal Location of DG in Existing Distribution
Network
Nipun Damor , Kalpesh Rathwa, Prof. H D Patel
|
Download
|
211 |
Efficient Keyword Based Search on Encrypted Cloud Data
Pooja Shah, Gopal Pandey
|
Download
|
212 |
ANTI THEFT SYSTEM FOR ELECTRONIC EQUIPMENTS
USING INTERTIAL MEMS SENSOR AND ZIGBEE
Pramod Kumar Bishwas,
Hemant Kumar Himanshu ,
Ashutosh kumar das,
R.Manoj,
|
Download
|
213 |
Optimizing Aggregation Query Processing
Prateek Singhal, Velagapudi Sreenivas, K V D Kiran
|
Download
|
214 |
USING FUZZY TOPSIS FOR MULTI CRITERIA DECISION MAKING
Prathiba P.H, Karthikeyan R
|
Download
|
215 |
TRAFFIC INFORMATION SERVICE BASED ON PRIVATE NETWORK
PRATIK KUMAR JHA, PRATEEK SAHU,PRASUN KUMAR KANCHAN
|
Download>
|
216 |
Optimized Energy Efficient Allocation of Virtual Machines in Cloud Data Center
Jagjeet Singh, Sarpreet Singh
|
Download
|
217 |
Clustering based routing for Mobile Ad-hoc Devices with ACO
Manpreet Kaur, Jyoti Kohli
|
Download
|
218 |
Intrusion detection System for Attack Prevention in Mobile Ad-hoc Network
Tapan p.Gondaliya, Maninder Singh
|
Download
|
219 |
Time on Demand Distance Vector Protocol with Fault Tolerance for Mobile Ad-hoc Networks
Sukhwinder Pal Singh, O.S.Khanna
|
Download
|
220 |
Energy Efficient dynamic Clustering schemes for Mobile Wireless Sensor Network
Gurpreet Singh, Amandeep Kaur
|
Download
|
221 |
AUTOMATIC EVALUATING OF WATER QUALITY BASED ON HIGH SPEED NETWORKING
ANKIT JAISWAL,PRAVEEN KUMAR ,RAHUL KUMAR JHA
|
Download>
|
222 |
A Privacy-Preserving Reputation Management System in E-Learning
J.Ramya Beaula
|
Download
|
223 |
DYNAMIC VOLTAGERESTORER
FOR
VOLTAGE SAG MITIGATION
RAVIKUMAR D. PATEL, VIJESH N. PATEL, CHINTANKUMAR A. PATEL.
|
Download
|
224 |
WIRELESS DATA ENCRYPTION AND DECRYPTION USING OFDM AND PIC
Vivek Raj , Tutan Sukla Baidya , Vivek Kumar
|
Download
|
225 |
Bug Tracking System
Swapnil Bhalerao,Rishikesh Kakasaheb Pawar,Rajendra .G.Pawar
|
Download
|
226 |
AUTOMATED ELECTROPLATING PROCESS
Prof. Sumod K. Pawar, Dattatraya B. Misal,Pradeep J. Nikam, Avinash D. Sawant,
|
Download
|
227 |
Comprehensive analysis on performance and emission characteristics of C.I Engine by using Karanja
(Pongamia Pinnata) Bio-Diesel
Aherkar U.T, Aher D.A, Mokashi S.A, Jarad V.B.
|
Download
|
228 |
Monitoring of Mansa Devi Landslide using GPS
Saiful Islam, Mozaffar Imam
|
Download
|
229 |
VIRTUAL BLUE PRINTING ROBOT FOR INDOOR SURVELLIANCE IN COMBATTING URBAN
NABAUDAY NATH, SANDEEP KUMAR, SWETHA
|
Download
|
230 |
Effective Use of HTML5 for Developing Offline Web Applications
K. Ram Sandilya, Ramidi Sudheer, Velagapudi Sreenivas, K V D Kiran
|
Download
|
231 |
An Efficient Data Aggregation Scheme With Security And Cost Optimization Scheme
Sangeetha.P , Poornima.R
|
Download
|
232 |
An Image Segmentation using Seeded Region growing
Mrs. Musale Shital S, Prof. Pawar Sanjay S.
|
Download
|
233 |
GPS BASED AUTOMATIC TRACKING SYSTEM
Mr. S.K.CHAUHAN, Dr. K. R.PARMAR,
|
Download>
|
234 |
Computer Vision Based Recognitionof Nut and Bolt System
Tapas Pramanik,Prof.P.R. Rothe
|
Download
|
235 |
Qualitative Bankruptcy Prediction Using ACO Algorithm
K.Vignesh, A.Martin
|
Download>
|
236 |
AN APPLICATION REVIEW OF COIR FIBER REINFORCED CONCRETE
VIJAY CHAVADA, A.A. PARIKH
|
Download
|
237 |
ANALYSIS OF STATCOM FOR POWER FLOW IN THE SYSTEM
VIJESH N. PATEL , RAVIKUMAR D. PATEL ,HARDIK S. PATEL
|
Download
|
238 |
CONTENT BASED IMAGE RETRIEVAL
Jitendra L. Koradiya, Prof. Prashant B. Swadas
|
Download
|
239 |
TRAILING SYSTEM TO PERCEIVE ADVERSARY INTRUSION IN BORDERS USING
WIRELESS SECURITY NETWORK
Ramdayal Rajbhar,
Vachan Peter ,
Gautam Kumar
|
Download
|
240 |
Video tracking and person categorization system
Dr.Kashif Qureshi
|
Download
|
241 |
Clustering the nodes with trust value of intrusion detection using iterative process of watchdog mechanism
Jeevitha.T,Kalimuthu.M,Sengottuvelan.P
|
Download
|
242 |
Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
|
Download
|
243 |
Communication of nodes in Hybrid honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
|
Download
|
244 |
Survey of Honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
|
Download
|
245 |
SEMANTIC WEB ANALYSIS
K.C.Gouda, K. Deepan siddarthan , Nagaraj Bhat
|
Download
|
246 |
Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
|
Download
|
247 |
Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi
|
Download
|
248 |
Design of Ultra-Wide Bandpass Filters
Using Electromagnetic Band Gap
Abhishek Sinha,
Kumar Gaurav,
Kundan Kumar,
Pankaj kr. Yadav,
|
Download
|
249 |
CLOUD COMPUTING IN AIRCRAFT
NETWORK
P.Shakthikumaran,T.Nalini,J.Rama
|
Download
|
250 |
RECOGNITION OF COINS USING ARTIFICIAL NEURAL
NETWORK TRAINED BY GENETICAL ALGORITHM
Ashwini Dakhode, Dr.P.R.Deshmukh
|
Download
|
251 |
Medical Image Retrieval System Using an
Improved MLP Neural Network
G.Ravi Teja, G.Chaitanya, K.Rajesh
|
Download
|
252 |
An Extracting Relation of Machine Learning by
Identifying Disease Treatment Relations in the
Research Methodologies
V.Rama Krishna
, T.Geethika
, Sk.Sunaina Sulthana
|
Download
|
253 |
Applying Genetic Algorithm to Optimize Path Testing and to Achieve Total Code Coverage
Mohd Athar, Nargis Parveen |
Download
|