Welcome to Reseach & Development Manager ( )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 4

 

 

   

Sr/ No Title Pdf
1 Security and Energy Efficient Communication Scheme in Mobile Ad Hoc Networks
R.Aiyshwariya Devi,E.Devi priya
Download
2 Comprehensive Survey On Face Tracking In Real Time Video
Amit Bhoomkar, Ajay Kulkarni and Somnath Gosavi .
Download
3 A Survey New: Attribute-Based Encryption for Personal Health Records in Cloud Computing
Anitha A, Thamaraiselvi k
Download
4 Detection of Unknown Anomaly on Network - The Emerging Way
Anup G. Kadu, Dr. A.S.Alvi
Download
5 COMPUTER AIDED ANALYSIS ON THOUGH TYPE OF R.C.C FOLDED PLATE
ARUN H. TEJANI, A.A. PARIKH
Download
6 Spinning LED Display Using GSM Interface
Ashutosh Shelke, Bhushan Varadkar, Sameer Tanksale , S.R. Wategaonkar
Download
7 A 1.5 V Current Mode Winner Take All
Behzad Ghanavati, Zohreh Manoochehri
Download
8 A 1.5 V Minimum Current selector circuit Jamming Attacks
Behzad Ghanavati, Milad Kaboli, Zohreh Manoochehri
Download
9 An Intelligent Robot for Bomb Detection with Wireless Video Transmission
Babul Kumar, Debadas Khuntia, Chhote Lal Kumar Ram
Download
10 Vertical handoff algorithm for wireless network
Bhaumik S. Khakhil, Bhavin I Patel, K.M.Pattani
Download
11 A Review of Analysis of Cable-Stayed Bridge Subjected To Seismic Excitetion Using Sap2000
Bhavesh Mangukiya B., Suhasani Kulkarni M.
Download
12 PIXEL BASED CORRELATION OF SAD AND SSD ALGORITHMS FOR DISPARITY MAP USING MULTIVIEW IMAGES
CHIRAG D. PATEL , KAPIL S. RAVIYA
Download>
13 Image Segmentation by mixing of various EDGE Detection Techniques
C.H.Bhabhor, A.B.Upadhyay, V.D.Baria
Download
14 Constructivist Learning Model In Writing Learning Indonesian
Nunuy Nurjanah
Download
15 Public Diplomacy For Good Governance
H.A. Asep Saefudin
Download
16 Simulink Based Verification Model for ZigBee Transceiver
Dipak V. Vaniya, Sima K. Gonsai
Download
17 USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT- ORIENTED SYSTEMS
K.G.S.VENKATESAN, M.ELAMURUGASELVAM
Download
18 Location Estimation in Cellular Networks Using Artificial Neural Networks
A.Gouthami , k.Vijayasri , B.Anil Singh , M.Kamalesh , G. Narendra Naik
Download
19 Secure Data by Espionage Method using Substitution+Steganography
Grishma Trivedi, Chirag Patel, Kishor Bamniya
Download
20 Firewall Scenario and Issues
Gursimrat Singh, Amitoj kaur, Amardeep Singh
Download
21 Gradient Feature Based Image Super Resolution Using Neighbor Embedding
Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi
Download
22 A Survey on Load Balancing Techniques in Cloud Data Center using VM Migration
Hitesh B Patel, Prashant B Swadas, Sudarshan N Patel
Download
23 A SYSTEM FOR NEGLIGENT BIKE RIDERS
JAI RAJESH.P, ARIFA BEGAM.A
Download
24 IEEE 802.3 MAC Transmitter Using FSM and VHDL Techniques
MR. JANAK A.PATEL, PROF. PANKAJ P.PRAJAPATI, PROF. PIYUSH R. KAPADIYA
Download
25 A Privacy-Preserving in Wireless Sensor Networks using generalization and suppression methods
B.Karthika,J.K.Jeevitha
Download
26 Discrete Wavelet Transform (DWT) and Singular Value decomposition (SVD) applied to Digital Image
Mrs.S.Jothi Lakshmi, Dr.VE.Jayanthi
Download
27 A Novel Approach - Effective Method of Prevention of Cache Poisoning for Wild Card Secure DNS
K.Sampath Kumar , Dr.G.K.D.Prasanna Venkatesan , R.Vignesh
Download
28 Reputation with Lie-Detector Scheme to Restrict Black Hole and Selfish nodes in MANET ¬
Kanimozhi.M,Madhavi.S
Download
29 Improving Trustworthiness Of Websites Using Truth Finder Algorithm
Mrs.G.Kirubasri , Mrs.A.Sathya Sofia
Download
30 Dimensionality Reduction in Text Classification using Feature Reduction Approaches
P. Kiruthiga
Download
31 INTERNET2 FOURTH GENERATION INTERNET
Latika Chaudhary, Sangita Panmand, Prachi More,Prof. M.A.Devmane
Download
32 Genuine Route Identifier (GRI) scheme for USOR to Restrict Worm hole Attack in MANET
Maharani.R,Kanagaraju.P
Download
33 Collection of Sensor data in an energy efficient manner using Rendezvous based approach Environment
Mrs.S.Pushpalatha, P.Manoj Kumar,
Download
34 Designing of A new Low Voltage Low Power Tunable Fuzzy Logic Controler Chip
Milad Kaboli, Behzad Ghanavati
Download
35 SECURING WEB SERVER AND DATABASE SERVER FROM QUERY PRIVILEGE AND INJECTION ATTACKS
T.Mohana,
Download
36 Improving Performance of Search Engines using Morphology
Nargis Parveen, Mohd Athar
Download
37 Paper 37  available at last of this page  
38 Noise Level Estimation Deblurring using Directional Filters
Miss.Pallavi Mankar, Miss.Mrunal Datir, Miss.Sonali Rathi
Download
39 A Location Privacy Using Monitoring System for Wireless Sensor Networks
D.Udhaya Kumara Pandian, P.Natarajan
Download
40 Collaboration of Two Approaches for the Detection of Outlier
Niketa V. Kadam , Prof. M. A. Pund
Download
41 Privacy Preserving in Association Rule mining
Nilesh R. Radadiya, Nilesh B. Prajapati, Krupali H. Shah
Download
42 Medical Application Based on Wireless Sensor Network
Niraj Patil, Asip Mulla, Prasad Nikam, Dipak Shinde
Download
43 OPTIMIZED TRAVELING SALESMAN PROBLEM USING ESTIMATION MAXIMIZATION TECHNIQUE
D.Nithya, Dr.B.G.Geetha,
Download
44 THE EFFECT OF MEASURING PROCEDURE ON THE APPARENT RHEOLOGICAL PROPERTIES OF SELF-COMPACTING CONCRETE
MR. V.A. PATEL, S.M. KULKARNI
Download
45 RECENT TRENDS IN MOBILE TV TECHNOLOGY
Prachi P. Londe
Download
46 Domain Decomposition Based Game Theory to Arrive Optimal Video Streaming Pricing Policies
N.Prakash, P.Manimaran
Download
47 Analysis and Basic Implementation of Audio Watermark in Digital Image
P. S. Patel, N. M. Patel, U. K. Jaliya.
Download
48 Dependable and Protected Storage Services in Cloud Computing
M.Shanmugapriya,
Download
49 Retrieving Energy Using Peltier Effect
Vibhav Sharma , Priyam Ganguly, Syed Md. Taqiudeen , B.karthik
Download
50 Software Testing Approach for efficient Bug finding with Yin-Yang Testing Theory
Gaurav Saini, Kestina Rai
Download
51 Data retrieval from cloud with cache implementation
K.Venkata Raju , P. Dinesh, M.Sudheerraja
Download
52 CRIME PATTERN ANALYSIS USING SPATIAL DATA MINING
R.Ragunath, P.Sathishkumar
Download
53 VHDL Implementation of Viterbi Decoder by Butterfly Module
Mr.Rajan N. Shah,Mr.Altaf I. Darvadiya
Download
54 EFFECTIVE PREPROCESSING TECHNIQUE FOR BETTER BORDER DETECTION
K.Rajesh , and A.Gnanabaskaran
Download
55 Prevention of Pollution Attacks and DoS Attack in Network Coding Using Node Identity Verification Scheme
R. Karthick, K. Chandraprabha and B.G.Geetha
Download
56 EFFECTIVE OPTIMAL SEARCHING MECHANISM USING TEXT MINING
J.E Nalavade,Ruchi Priya,Priya Koul,Riya and Manish Anand
Download
57 Efficient Database Indexing Techniques using Cluster, Non-Cluster and Full Text Indexing
Mr. Kawhale Rohitkumar K., Miss. Prachi Patil M., Mr. Chabukswar Mandar U.
Download
58 IDENTIFYING FALSE ALARM IN SELFISH REPLICA ALLOCATION
K.Sathyaseelan,S.Rinesh
Download
59 Heterogeneity in Stochastic Frontier Models
. V. SEETHA LAKSHMI
Download
60 MOVING OBJECT DETECTION IN AIRBORNE VIDEOS
Selvakumar S, Rajalakshmi K
Download
61 AN EFFICIENT APPROACH FOR INCREASING POWER OPTIMIZATION IN MOBILE ADHOC NETWORKS
M. Senthil Kumar, Dr. Ashish Chaturvedi
Download
62 A Comparative Analysis of Reactive and Proactive Routing Protocols in Mobile Ad-hoc Networks
Shiva Prakash, J.P. Saini, S.C. Gupta
Download
63 Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi
Download
64 A Comprehensive Study of Cryptography and Digital Signature
Sonia, Dibjot Kaur
Download
65 Learning Structure in Cloud (Implementing SaaS)
Ambati Nikhila, K.V.D.Kiran, V.Sreenivas
Download
66 Comparative Study on hardness of As-cast and heat treated Al based hybrid composites
M. Sreenivasa Reddy, Dr. Soma V. Chetty
Download
67 A SCIENTIFIC APPROCH FOR FILTER DESIGN IN SPATIAL DOMAIN IMPULSE NOISE REMOVAL IN DIGITAL IMAGES
Dr.B.SRINIVASARAO
Download
68 Reconfigurable Architecture of FPGA Based Image Compression Using DWT
D.Vanathi, S.Rajkumar, D.Thamarai Selvi
Download
69 STATCOM BASED MITIGATING POWER QUALITY ISSUES IN GRID CONNECTED WIND ENERGY SYSTEM USING LABVIEW
S.Venkateshwaran , G.Vijaya gowri
Download
70 Experimental investigation of vortex flow visualization using various fluids
Vijay Kumar. S, Dr. K. V. Sreenivasa Rao & Dr. A. N. Khaleel Ahmed
Download
71 Effect of Aerodynamic Force in Modern Cars
M.Venkatasudhahar, T.Manvelraj
Download
72 Spectrum sensing techniques and power control algorithm using power swarm optimization for cognitive radio
Yogesh N. Kakadiya ,Kiran Parmar
Download
73 UTILITY WIRELESS MULTIPOINT CIRCULAR AND EMERGENCY MESSAGE TRANSFER SYSTEM
BABU SAHEB, ASHOK KUMAR, ABHISHEK SINGH, ABHISHEK SINGH
Download
74 Optimal Cost for VANETS Streaming Distributions
Abir Biswas ,Kailash Kumar Sinha, Dr. T. Nalini
Download
75 Sentiment uncovering by employ of Biometrics techniques
Dr.Kashif Qureshi
Download
76 BIOMETRIC AUTHENTICATION FOR A MOBILE PERSONAL DEVICE FOR ACCESING WEB SERVICES
Akash Kanshal, Pankaj Kr Giri, Dr.C.Nalini
Download
77 A System for Email Users Clustering, Automatic Answering and Automatic Text Summarization.
Akshay Jayale, Sudershan Karad, Sudhakar Gawade
Download
78 DYNAMIC PORTABILITY AND STREAMING OF ADVERTISEMENTS BASED ON CONTENT AWARE AND USER INTEREST PROTOCOL
ASISH KUMAR DODKA,AMITABH KUMAR,DR.A.KUMARAVEL
Download
79 A Review Paper on Wireless Sensor Networks: Applications and System
Amitoj Kaur , Gursimrat Singh
Download
80 Survey on Digital Image Watermarking: Techniques and Attacks
Amitoj Kaur, Jagroop Kaur
Download
81 Trendsetter:Location Service using Android
Prof. Vidya Chitre, Amritansh, Deepratna Aditya, Deepak Pandey
Download
82 Nonlinear Effects and its Impact on WDM Systems in Optical Fiber Communication
Anupjeet Kaur
Download
83 DETECTION OF VITAL SIGNS IN PATIENT MONITORING SYSTEM BASED ON ANYCAST MODE
S.M.Shakir, Avanish Dubey, S.Pothumani
Download
84 Discovering a Pattern in Effective Manner
Avinash S Shegokar, Rohit S Jachak, Ashish Yerawar
Download
85 A 1.5v CMOS Fuzzifier Using Adaptive Biasing
Behzad Ghanavati, Milad Kaboli
Download
86 Analysis of Integrating RFID technology in B2B applications
Mr.S.Balamurugan, Mr.E.Gurumoorthi, Mr.R.Ramakrishanan, Mrs.M.Vasuki
Download
87 Non-linear Static Analysis of RC Frame Building with and without Shear Wall
Mr. Bhargav D. Patel, Prof. S. M. Kulkarni
Download
88 3rd Level Image Hiding Technique Using Alpha Blending Method
Bhavna A Marwada ,Yagnesh J Parmar , Kishor Bamniya
Download
89 Video Transmission in WMSN Environment using Compressed Sensing Technique
Chetan S. Deshmukh, Prof. S.V.Dhopte
Download
90 Wavelength Division Multiplexing Passive Optical Network: review paper
Chinky rani , Kulwinder Singh , Bhawna utreja
Download
91 Single Phase Online UPS Employing Advanced Charging Technology with Power Factor Corrected Rectifier
Chintan Patel, Dipendrasinh Parmar, T. B. Maniar
Download
92 State-of-art review on Study of high performance concrete containing supplementary cementitious materials
MR.D.V.SONI, S.M.KULKARNI, DR.V.P.PAREKH
Download
93 Managing the Denial-of-Service Attacks Using Rectified PPM Algorithm
V. Midhun, T. Nalini, M. Padmavathy
Download
94 Static Analysis of Composite Mono Leaf Spring For LCV (TATA ACE ) - Design, Manufacturing and Testing
Mr. P.B.Patole , Mr. Jeevesh Kumar , Mr. A.S.Kondi , Mr. G.B.Kalukhe , Mr. A.H.Gongane , Mr. S.R.Ingole
Download
95 Quality Classification of Peanut using Computer Vision Technique
Govind Chaudhari, Kinjal Mehta
Download
96 Topic Identification Using Temporal and Concept Relationship Analysis on Text Streams
Jayalakshmi.M, Gunavathi.C
Download
97 IMPLEMENTATION OF SPECT TECHNIQUE IN DETECTION OF CANCER
Chagamreddy Jhansi, K.S.Roy,Shaik Mahaboob Ali
Download
98 Various Cellular Generations –A survey
M.UdhayaMoorthi,M.jagadesh,C.MageshKumar
Download
99 End-to-End Delay caused by M/M/1 Queuing Model
Kiran Gowda.C, K.C.Gouda, K.Raghuveer, Kumuda.M.N
Download
100 SOME ATTACKS ON CRYPTOGRAPHIC HASH FUNCTIONS
C. Krishna Kumar , Dr. C. Suyambulingom
Download
101 OPTICAL CHARACTER RECOGNITION USING NEURAL NETWORK
Krunal H. kubavat , Sima K. Gonsai
Download
102 Effective Human skeleton extraction from single monocular video
A.MADESWARAN, and Dr. K.SAKTHIVEL
Download
103 MULTIFACTOR AUTHENTICATION FOR E-COMMERCE APPLICATIONS
Namita Redkar, Manish Yadav, Prof. D.R. Ingle
Download
104 DESIGN and ANALYSIS of POST TENSIONED PRESTRESSED CONCRETE MEMBER by USING ADAPT SOFTWARE
Mayank I. PATEL, S. M. KULKARNI,
<Download
105 A Study of Teacher’s perception with special reference to English as a second Language
Mohammed Sajid
Download
106 Optimization Approach to Link and Power Allocation in Cellular Networks
M.N.Mehta, Dr. K.R.Parmar
Download
107 Designing Of A New 0.18um CMOS Voltage Mode Squar Root Analog Multiplier
Milad Kaboli, Behzad Ghanavati
Download
108 New Design Of A 0.18µm CMOS Low Power High Frequency Four Quadrant Multiplier
Milad Kaboli
Download
109 Design a novel Low-Noise ,High Gain and High Bandwith Amplifire for 5GHz Wireless Recivers
Farhad Amiri, Milad kaboli
Download
110 AUTOMATIC VEHICLE STARTER SYSTEM BASED ALCOHOL BREATH ANALYZER SENSING
LILU MAHTO ,RITESH KUMAR ,SANTOSH KUMAR, Mrs. SARAVANA.S M.E
Download
111 WATER LEVEL CONTROL SYSTEM USING PLC AND SCADA
MD HASNAIN ,RAKESH RANJAN ,AMOD KUMAR SINGH
Download
112 Status of Soil and Water Conservation Practices in Tigray Region, Ethiopia: A Case Study
Mushir Ali
Download
113 Smart Class using Wireless Technique
MD PARWEZ ALAM, PANKAJ TRIPATHI, NISHANT KUMAR VIDHYARTHI, SARAVANA.S
Download
114 An Remote Data Possession Checking (RDPC) Protocol for Storage Security in Cloud.
Naganandhini.S,
Download
115 Spatio-Temporal Network Anomaly Detection By Assessing Deviations Of Empirical Measures
Nihar Ranjan Sethy, T. Nalini, M. Padmavathy
Download
116 Dynamic Detection Strategy Based Flow Analysis Scheme for Flash Crowd Attacks
Narmadha.B,AyyaMuthukumar.D,Kannan.M
Download
117 PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs
Rahul Sanskritayayan,Nidhi Raina,Sunil Jadhav,KanchanDoke
Download
118 Steganographic Secure Data Communication –A Hardware Approach
Mrs.A.N.Naik, Prof.R.T.Patil , N.B.Naik
Download
119 A DYNAMIC APPROACH TO IMPROVE THE TRANSMISSION EFFICIENCY IN WIRELESS AD HOC NETWORK
S Nivedha, S Raghul Krishna, T Ramyapriya, P Boopathi
Download
120 Cloud Computing: Alternative to Enormous In-House Data Centers
Prof. Pallavi S. Kadam , Prof. S. B. Patil
Download
121 OPTIMAL STOCHASTIC LOCATION UPDATES IN MANET USING DREAM ALGORITHM
P.Poonkodi, P.Boopathi , Prof.T.Kalaikumaran
Download
122 Performance Evaluation of Canny Edge Detector for Noisy Images
Priya Arora, Dr. Lakhwinder Kaur
Download
123 Authentication in Cloud Computing
Mr. Amey Hawal, Mr. Rahul Mirajkar, Mr. Sagar Lad Miss.Pouravi Kadam , Miss.Sayali Jamadade
Download
124 Advanced Multimedia Messaging Services for Improving Examination Result System
Mr. Rahul. P. Mirajkar, Mr. Ranjeet Kumbhar, Mr. Ajinkya Sarnobat, Mr. Pramod Pawar Mr. Sagar Yadav, Mr. Nitin Patil
Download
125 A MODEL OF DATA WARE HOUSING PROCESS MATURITY
Ranjan Kumar paswan , Naveed Hussain Farooqui
Download
126 PREVENTION OF UNAUTHORISED DATA MODIFICATION SYSTEM USING SECURED MULTI KEY IMPLEMENTION
RAVI KUMAR, GOPAL PRASAD BEHERA, R.CHANDARSEKARAN
Download
127 A practical approach of DoS/Jamming attack of Cognitive Radio Network
Roshan Singh Thakur , Prof. Parul Bhanarkar , Prof. Girish Agarwal
Download
128 INTELLIGENT PUBLIC TRANSPORT SYSTEM USING INFORMATION FORENCICS AND SECURITY
Prof. Sunita Barve, Sagar Dasgude , Atish Walunj , Mahaveer Jain
Download
129 ANALYSIS OF SEMI-AUTOMATION CLUSTERING TECHNIQUES FOR PERSONA DEVLOPMENT
MD SHAMSHAD ALAM, VINAY KUMAR,
Download
130 SMART TINY E-CARD FOR EMPLOYEE MANAGEMENT SYSTEM USING WIRELESS PROTOCOL
SAURABH KUMAR, RAJU KUMAR, ROHIT KUMAR, M.JASMINE
Download
131 XML Data Search with Query Assistance and Semantic Analysis
Selvi.V,Rajkumar.S
Download
132 A comparative study of arrivals and prices of agricultural commodities at APMC using Time Series Analysis
Patel S.A., Patel J.M.
Download
133 Enhancement of Password Guessing Resistant Protocol With Cookie and Session Monitoring
Sindhu.M
Download
134 Data Warehouse as a Service (DwaaS)
Sreekanth Tangudu, Velagapudi Sreenivas , K.V.D Kiran
Download
135 Ensured Data Packet Security and Integrity using Merkle Hash Tree Algorithm in Cloud Computing System
SRIMANTA SARKAR , SYED IKRAM AHMED
Download
136 A Hash-Based RFID Security Protocol
Subodh S. Bhoite, Prof. Pawar Sanjay Shamrao
Download
137 Iris Detection Techniques: Daugman’s Integro-Differential Operator and Ellipse fitting
Sunny H. Mujpara, Kunal P. Acharya
Download
138 Methods for Software Testing in Cloud Computing Environment
Krishna Tej Koganti, Sai Sagar.Narasingu, Eswar Patnala, K. N. Soujanya
Download
139 Resource Allocation and Load Distribution for Mixed Workloads under Cloud Environment
Sutha.K,Kaladevi.P
Download
140 MODELING OF WIND TURBINE FOR WIND ENERGY CONVERSION SYSTEM
Vaibhavi Parmar, Prof. H.D.Mehta
Download
141 A High Throughput Low Complex VLSI Architecture for MIMO
M.U.Veenesh, N.Mahendran
Download
142 Simulation and Performance Evaluation of Lee model under Urban, Suburban and Rural Environments for GSM system in mobile communication
Vimal Patel, Kinjal Mehta, Vishal D. Nimavat
Download
143 A study and comparison of Priority Inheritance Protocol and Priority Ceiling Protocol
Vishal Prajapati, Apurva Shah
Download
144 Design of Ultra-Wide Bandpass Filters Using Electromagnetic Band Gap
Abhishek Sinha , Kumar Gaurav, Kundan Kumar, Pankaj kr. Yadav
Download
145 Smart Identity Management system using Biometrics
Dr.Kashif Qureshi
Download
146 MULTIMODAL BIOMETRICS FOR VEHICLE ACCESS
Dr.Kashif Qureshi
Download
147 Detection Of Gray Hole Attack In Mobile Ad-hoc Network
Nilesh Rokade, Madhav Pandhare, Nikhil Wani, Priyanka Patil
Download
148 Fine grained group based job scheduling algorithm with highest computing resource in grid
Achyut Sakadasariya
Download
149 Fuzzy Keyword Search over Encrypted Data using Search Scheme in Cloud Computing
K.Rajesh,K.Venkatreddy,G.RaviTeja
Download
150 Non Uniform High Density Anchor Nodes Scheme for Localization of sensors in WSN
Gurpreet Singh, Sandeep Singh Waraich
Download
151 Advanced Differential Protection Scheme Using Microcontroller
Dilipsinh Gohil, Kalpesh Rathava, J.B.Pujara
Download
152 Pattern Co –orientation In Spatial Based Retrieving Data in Content Based Segmentation
B.Dinesh, L. Ashok Kumar
Download
153 Implementation of PAPR reduction technique in SFBC based OFDM MIMO systems
Mr. Dipak K Patel ,Mr. Kunal M Pattani
Download
154 Stability Analysis By Feedback Control Based Biped Robot
Divrania Dhirubhai A., Rathod Ajit A., Patel Ankit A.
Download
155 HAND & HEAD MOUNTED HAPTIC FEEDBACK SONAR OBSTACLE AVOIDANCE DEVICE
AMRENDRA KUMAR SINGH, ADAPA ASHISH KUMAR, CHANDAN KUMAR PASWAN, JAYANTA DEY
Download
156 An Efficient Crash Prediction and Secured Communication of OLSR Routing Protocol uses Different Key Exchanges for VANETs
R.Gowtham, M.Suguna, Dr.D.Sharmila
Download
157 A review of TCP Reno, TCP Vegas and TFRC for mobile ad hoc networks
Gurmeet Singh, Jaswinder Singh
Download
158 Strategies For Developing a Sustainable ICT Management System For Distance Learning In Kenya. The ODL Model
Kimutai James
Download
159 FINGERPRINT BASED BIOMETRIC ATM AND CREDIT CARD PAYMENT
Dhananjay Kumar Tiwary, Chandan Kumar, Amit Kumar, Ms. Arul Selvi
Download
160 Comparison and Analysis for low power CMOS sram cell using 90 nm and 180 nm technology using cadence tool
Sagar Joshi, Sarman Hadia
Download
161 Circular Shift operation on Mesh and Hypercube
Ms. Khyati Gohil
Download
162 WIRELESS SENSOR NETWORKS USING HIGH SECURITY FOR NODES
J.VIJAYARAJ, R.RAJASEKAR,MA.MOHAMMED ANSAR ALI
Download
163 Energy Saving routing Scheme for Information Gathering and Collision Avoidance in Wireless Sensor Network
Jasmeet kaur, Sarpreet Singh
Download
164 Various Efficient Cluster based Power Saving Scheme for WSN
Navmeet kaur, Kamaljit Kaur
Download
165 IMPACT OF LYDIARD TRAINING WITH TAPERING ON SELECTED PHYSIOLOGICAL VARIABLES AMONG MALE RACE WALKERS
K.Mohan , Dr.R.Kalidasan
Download
166 USING SELF ORGANIZING TEAM IN AGILE SOFTWARE DEVELOPMENT
R.Rajadurai, S.Nandhini
Download
167 DDoS Attack Prevention In Cloud Computing Using Hop Count Based Packet Monitoring Approach
Nisha H Bhandari
Download
168 Security in AODV against Wormhole attack in MANET
Priyanka B. Patel, Purvi N. Ramanuj, Dr. J.S. Shah
Download
169 Evolution towards Grid Computing: A Survey
Gaurav Sharma , Puneet Banga
Download
170 EFFECT OF VARIOUS STRENGTH TRAINING PROGRAMMES ON SELECTED PHYSICAL AND PERFORMANCE VARIABLES AMONG MALE ATHLETES
M. Arunkumar, Dr.A.Surendar
Download
171 Implementation and Performance Analysis of 4-bit GDI Adders
RUPAL N.ASHWANI , BHARAT H.NAGPARA
Download
172 Automatic Reconfiguration for Large-Scale trustworthy Storage Systems
Dr.B.G.Geetha, P.Senthil Raja, R.Vijay sai
Download
173 A New Data Mining Approach for Network Intrusion Detection
Mr. Narayan Arjunwadkar, Mr. Jeevan Barguje, Mr.Rohit Barde, Mr. Sachin Hirave, Prof. N.K.Patil
Download
174 A Study to determine the Suitability of Ground Water for Irrigation Purposes in Madurai District, Tamil Nadu, India
R. Padmanaban, M. Dharmendirakumar, P.B. Sakthivel, and N.S.Elangovan
Download
175 8x8 Bit of Low Power Multipliers
Shivam K.Dave, Bharat H.Nagpara
Download
176 Fast and Variable Amount of Data Collection in Tree Based Wireless Sensor Networks
Sivakumar M., Suguna M.
Download
177 DATA FORWARDING IN MULTIHOP LOW DUTY-CYCLE WIRELESS SENSOR NETWORKS
SRIDHAR D., THAMARAI SELVI.K
Download
178 Implementation of On Demand Routing Protocol to Load Balance in MANET
V. K. Sivaprasad
Download
179 Infrastructure in Cloud as a Service Provider
ShanmukhaPriya.P, Sasiveena
Download
180 Mobile Ad-hoc Networks in the Battlefield With 4G Support
ViswasriSravya.M, NagaSaiKeerthi.J, M.S.S.Dasarsh Rajarao
Download
181 AUTOMATIC ACCIDENT SPOTTING REMOTE TUNED BLACK-BOX
Pronali Sonowal, Renu Gupta
Download>
182 Development of Palm Date Pits Activated Carbon Adsorbent for Textile Effluent Treatment
AdeolaG. Olugbenga, AbubakarMohammed, Clement B. Arowosola 3
Download
183 DOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS
Mohamed AfzalKhan.A, Mr.Chandrasekaran
Download
184 New Scheme for Prevention of Wormhole Attack in Manet
Ajit Singh, O.S.Khanna
Download
185 Analysis of Image Compression and Decompression using JSS algorithm- A Review
Gaganpreet Kaur , AmandeepSingh , Dr. Dheerendra Singh
Download
186 Intelligent Heart Disease Prediction System using Naive Bayes Classifier
Amol P. Patil , Ayodhyanadan P. Bhosale , GokulP. Ambre,Sumit P. Pawar , Prof. M. S. Chaudhari
Download
187 A novel technique based on ant colony optimization for image stitching
Amrita, JaspreetSingh Cheema,Nirvair Neeru
Download
188 PRACTICAL ATTACK SCENARIOS ON SECURE ELEMENT-MOBILE ENABLED DEVICE
Anil Kumar Singh, Chandan Kumar, Chandan Kumar Deo
Download
189 GESTURE CONTROLLED CAR DRIVING SYSTEM TO ASSIST THE PHYSICALLY CHALLENGED
ANUPAMA SINHA, ARCHANA KUMARI, AVINASH KUMAR, S.P.VVIJAYARAGAVAN
Download
190 A Simulation of Measurement of WBC using MEMS
Arpita GUPTA, T.K.BASAK, G.U.KHARAT, Poonam GOYAL
Download
191 A Challenge in E-Passport: 2D Human Skull Recognition using Mutual Information Algorithm with Passport Display Screen
C.V.Arulkumar, Prof.G.Selvavinayagam
Download
192 Context disambiguation based on dynamic Bayesian networks for context-aware environment in pervasive computing
Arun Paul. J , Dr.B.G.Geetha
Download
193 Analysis for the Parameters of various Queueing Models
T. Ponnammal, Dr. G. Eswara Prasad
Download
194 Robot Navigation System With RFID And UltrasonicSensors
Manjeet Kumar , Azhar Farhan,Kumar Abhinav ,Kumar Abhishek
Download
195 Multi-hop Stable Selection with Mobile Sink in Wireless Sensor Network
Simarjeet Singh, Jaswinder Singh
Download
196 NETWORK SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY
Sumesh Ranjan Sethi, Sidhartha Ku. Satapathy, Sushanta Kumar
Download
197 3-Level NPC Inverter Testing on Different Loads
Hardik Patel, Vijesh Patel, Dr. S.N.Pandya
Download
198 Speech Encryption Techniques: A Selected Review
Jaspreet kaur , ER. Kanwal preet Singh
Download
199 DETECTION TECHNIQUES WIRELESS SENSOR NETWORKS AND SECURITY
R.RAJASEKAR, MA.MOHAMMED ANSAR ALI, J.VIJAYARAJ
Download
200 LOCALIZATION IN WIRELESS SENSOR NETWORKS
MA.MOHAMMED ANSAR ALI, R.RAJASEKAR, J.VIJAYARAJ
Download
201 DESIGN OFAUTO-GUARD SYSTEM BASED ON RFID AND NETWORK
KUMAR MADHUSUDAN , Mrs. NIRUBAMA, PRAGNYA PRAKASH NANDA, P. GOPI,1. Y.V. JESHWAR DAS
Download
202 WIRELESS MOTOR SPEED CONTROL USING RF SENSOR
kumari nimmi , M.Surumbar khuzhali, Ruby kumari , Pragati bag
Download
203 PREVENTION OF ONLINE PASSWORD HACKING PROCESS WITH SECURED MULTI AUTHENTICATION SCHEME
Kunjesh Kumar Mishra , Vimal Chand , G. Michael
Download
204 PRIVACY-PRESERVING REDISTRIBUTED KEY-POLICY ATTRIBUTE-BASED SECRET WRITING
Mac Donald Khongwir , Debabrata Laimayum , Ms. Anuradha
Download
205 Energy Efficient clustering scheme analysis with mobile sink in Wireless Sensor Network
Deepinder Kaur, Kamaljit Kaur
Download
206 Analysis of Mode Choice Behaviour of Students for College Trip
Mayank H. Rathod, Prof. Suresh M. Damodariya, Dr. Vilin P. Parekh
Download
207 Retain Data In Mobile Disconnected Network Using Trajectory Approach
S. MELBA,N.S. USHA
Download
208 AUTOMATED SHOPPING CART
MUMPI GHOSH , Mrs. SARAVANA.S ,RUSHI MAHATO,SAGARIKA BEHERA
Download
209 Performance Evaluation of Image and Video Steganography for optimization of PSNR
Naitik P Kamdar, Dolly H. Patira, Dharmesh N.khandhar
Download
210 Optimal Location of DG in Existing Distribution Network
Nipun Damor , Kalpesh Rathwa, Prof. H D Patel
Download
211 Efficient Keyword Based Search on Encrypted Cloud Data
Pooja Shah, Gopal Pandey
Download
212 ANTI THEFT SYSTEM FOR ELECTRONIC EQUIPMENTS USING INTERTIAL MEMS SENSOR AND ZIGBEE
Pramod Kumar Bishwas, Hemant Kumar Himanshu , Ashutosh kumar das, R.Manoj,
Download
213 Optimizing Aggregation Query Processing
Prateek Singhal, Velagapudi Sreenivas, K V D Kiran
Download
214 USING FUZZY TOPSIS FOR MULTI CRITERIA DECISION MAKING
Prathiba P.H, Karthikeyan R
Download
215 TRAFFIC INFORMATION SERVICE BASED ON PRIVATE NETWORK
PRATIK KUMAR JHA, PRATEEK SAHU,PRASUN KUMAR KANCHAN
Download>
216 Optimized Energy Efficient Allocation of Virtual Machines in Cloud Data Center
Jagjeet Singh, Sarpreet Singh
Download
217 Clustering based routing for Mobile Ad-hoc Devices with ACO
Manpreet Kaur, Jyoti Kohli
Download
218 Intrusion detection System for Attack Prevention in Mobile Ad-hoc Network
Tapan p.Gondaliya, Maninder Singh
Download
219 Time on Demand Distance Vector Protocol with Fault Tolerance for Mobile Ad-hoc Networks
Sukhwinder Pal Singh, O.S.Khanna
Download
220 Energy Efficient dynamic Clustering schemes for Mobile Wireless Sensor Network
Gurpreet Singh, Amandeep Kaur
Download
221 AUTOMATIC EVALUATING OF WATER QUALITY BASED ON HIGH SPEED NETWORKING
ANKIT JAISWAL,PRAVEEN KUMAR ,RAHUL KUMAR JHA
Download>
222 A Privacy-Preserving Reputation Management System in E-Learning
J.Ramya Beaula
Download
223 DYNAMIC VOLTAGERESTORER FOR VOLTAGE SAG MITIGATION
RAVIKUMAR D. PATEL, VIJESH N. PATEL, CHINTANKUMAR A. PATEL.
Download
224 WIRELESS DATA ENCRYPTION AND DECRYPTION USING OFDM AND PIC
Vivek Raj , Tutan Sukla Baidya , Vivek Kumar
Download
225 Bug Tracking System
Swapnil Bhalerao,Rishikesh Kakasaheb Pawar,Rajendra .G.Pawar
Download
226 AUTOMATED ELECTROPLATING PROCESS
Prof. Sumod K. Pawar, Dattatraya B. Misal,Pradeep J. Nikam, Avinash D. Sawant,
Download
227 Comprehensive analysis on performance and emission characteristics of C.I Engine by using Karanja (Pongamia Pinnata) Bio-Diesel
Aherkar U.T, Aher D.A, Mokashi S.A, Jarad V.B.
Download
228 Monitoring of Mansa Devi Landslide using GPS
Saiful Islam, Mozaffar Imam
Download
229 VIRTUAL BLUE PRINTING ROBOT FOR INDOOR SURVELLIANCE IN COMBATTING URBAN
NABAUDAY NATH, SANDEEP KUMAR, SWETHA
Download
230 Effective Use of HTML5 for Developing Offline Web Applications
K. Ram Sandilya, Ramidi Sudheer, Velagapudi Sreenivas, K V D Kiran
Download
231 An Efficient Data Aggregation Scheme With Security And Cost Optimization Scheme
Sangeetha.P , Poornima.R
Download
232 An Image Segmentation using Seeded Region growing
Mrs. Musale Shital S, Prof. Pawar Sanjay S.
Download
233 GPS BASED AUTOMATIC TRACKING SYSTEM
Mr. S.K.CHAUHAN, Dr. K. R.PARMAR,
Download>
234 Computer Vision Based Recognitionof Nut and Bolt System
Tapas Pramanik,Prof.P.R. Rothe
Download
235 Qualitative Bankruptcy Prediction Using ACO Algorithm
K.Vignesh, A.Martin
Download>
236 AN APPLICATION REVIEW OF COIR FIBER REINFORCED CONCRETE
VIJAY CHAVADA, A.A. PARIKH
Download
237 ANALYSIS OF STATCOM FOR POWER FLOW IN THE SYSTEM
VIJESH N. PATEL , RAVIKUMAR D. PATEL ,HARDIK S. PATEL
Download
238 CONTENT BASED IMAGE RETRIEVAL
Jitendra L. Koradiya, Prof. Prashant B. Swadas
Download
239 TRAILING SYSTEM TO PERCEIVE ADVERSARY INTRUSION IN BORDERS USING WIRELESS SECURITY NETWORK
Ramdayal Rajbhar, Vachan Peter , Gautam Kumar
Download
240 Video tracking and person categorization system
Dr.Kashif Qureshi
Download
241 Clustering the nodes with trust value of intrusion detection using iterative process of watchdog mechanism
Jeevitha.T,Kalimuthu.M,Sengottuvelan.P
Download
242 Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
Download
243 Communication of nodes in Hybrid honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
Download
244 Survey of Honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
Download
245 SEMANTIC WEB ANALYSIS
K.C.Gouda, K. Deepan siddarthan , Nagaraj Bhat
Download
246 Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
Download
247 Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi
Download
248 Design of Ultra-Wide Bandpass Filters Using Electromagnetic Band Gap
Abhishek Sinha, Kumar Gaurav, Kundan Kumar, Pankaj kr. Yadav,
Download
249 CLOUD COMPUTING IN AIRCRAFT NETWORK
P.Shakthikumaran,T.Nalini,J.Rama
Download
250 RECOGNITION OF COINS USING ARTIFICIAL NEURAL NETWORK TRAINED BY GENETICAL ALGORITHM
Ashwini Dakhode, Dr.P.R.Deshmukh
Download
251 Medical Image Retrieval System Using an Improved MLP Neural Network
G.Ravi Teja, G.Chaitanya, K.Rajesh
Download
252 An Extracting Relation of Machine Learning by Identifying Disease Treatment Relations in the Research Methodologies
V.Rama Krishna , T.Geethika , Sk.Sunaina Sulthana
Download
253 Applying Genetic Algorithm to Optimize Path Testing and to Achieve Total Code Coverage
Mohd Athar, Nargis Parveen
Download