Volume 2 Issues - (March 14 Issue3)

1. Meander Line Antenna for LTE Communications  

Authors: Shivshankar Tondare, Navale V S

Page No.: 411 - 416

 

2. High- speed- Low-Power Viterbi Decoder Design  

Authors: P. Arul Sindhia, V.D.M. Jabez Daniel

Page No.: 417 - 420

 

4. A Factorial Study of Consumer Buying Behaviour towards Durable Goods With Reference To Urban Working Women  

Authors: Dr Pooja Bhatia, Dr Syed Haider Ali, Zeba Mehdi

Page No.: 424 - 434

 

5. Railway Route Optimization System Using Dijkstra Method  

Authors: Pramod Pandey, Sunanda Dixit

Page No.: 435 - 440

 

6. Enhance The Heat Transfer Rate of Heat Exchanger  

Authors: K.S.Parmar, M.J.Patel, U. R. Soni

Page No.: 441 - 446

 

7. Reducing Latency by Clustering Based Index Services using Hybrid Cache in Ad Hoc Networks  

Authors: Ms.V.Neela Gandhi, Mr.R.Alexander, Mr.C.GopalaKrishnan

Page No.: 447 - 456

 

8. Dual Pai Sigma Segment Matchline for low power Ternary CAM  

Authors: S.Karthikeyan, D.Deepika

Page No.: 457 - 462

 

9. Thermal Analysis of A Thermo Acoustic Cryocooler  

Authors: Naresh Kumar

Page No.: 463 - 470

 

11. A Survey on Secret Key Extraction Using Received Signal Strength in Wireless Networks  

Authors: Hemavathi M N, Annapurna V K

Page No.: 479 - 482

 

12. Visual Cryptography in Biometrics Passport  

Authors: Dhara Trivedi, Dr, Jigar Patel

Page No.: 483 - 487

 

13. Analysis of Web Crawling Algorithms  

Authors: Rashmi Janbandhu, Prashant Dahiwale, M.M.Raghuwanshi

Page No.: 488 - 492

 

14. Design of Mems Based Tristate Phase Shifter Using COMSOL 4.3b  

Authors: T.K.Sethuramalingam, S. Sathish, J. Kaushik, G.Arun Francis

Page No.: 493 - 496

 

15. E-Police Police Record Management System  

Authors: Sumit R. Farsole, Shreyas B. Kene, Prof. V. V. Bhujade

Page No.: 497 - 500

 

16. Semi Ideal and Semi Filter in Distributive Q lattices  

Authors: A. D. Lokhande, Ashok S Kulkarni

Page No.: 501 - 506

 

17. Controlled Cloud Based SaaS Service Scheme to Denial the Hotspot Locating Attacks in Wireless Sensor Networks  

Authors: K.Jegadeeswaran, S.Ramakrishnan, M.Mailsamy

Page No.: 507 - 512

 

18. Cloud Based Security  

Authors: Nikita M. Ikhar, Shivani S. Meghal, Prof. Kaustubh Satpute

Page No.: 513 - 518

 

19. Exaggerated Realism Interacting With Computers In Future  

Authors: Amit R. Baid, Vikramkumar R. Jani, Anjali S.Jibhakate, Prof.Rahul V. Bambodkar

Page No.: 519 - 523

 

20. An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing  

Authors: Mrs.V.P.Kavitha, M.Suganya, K.Suganya, G.Sridevi, D.Suganya

Page No.: 524 - 532

 

21. Automatic Detection of Diabetic Retinopathy from Color Fundus Retinal Images  

Authors: C.R.Dhivyaa, K.Nithya, M.Saranya

Page No.: 533 - 536

 

22. eCOPS Electronics Police Record Management System  

Authors: Prof. V. V. Bhujade, Sweta P. Lende, Teena N. Tadas, Rohini R.Hiwarkar

Page No.: 537 - 540

 

23. Concept Based Labeling of Text Documents Using Support Vector Machine  

Authors: K.Nithya, M.Saranya, C.R.Dhivyaa

Page No.: 541 - 544

 

25. Emotion Recognition by Using Bimodal Fusion  

Authors: Shruti V. Kulkarni, Prof. Savita S. Raut

Page No.: 548 - 552

 

26. Third Party Anti Theft Automobile Security System  

Authors: Akash M. Marathe, Mihir S. Samak, Prof. Sudhanshu Gonge, Mr. Samir Kulkarni

Page No.: 553 - 556

 

27. Exhaustive Study of Median filter  

Authors: Anamika Sharma, Bhawana Soni, Nikita Chauhan, Rashmi Bisht, Ritu Vijay

Page No.: 557 - 562

 

28. Remote File Retrieving Through SMS  

Authors: Piyush S. Sawant, Sonali S. Tanavade, Jai D. Zore, Pralhad S. Gamare

Page No.: 563 - 565

 

29. Patient Diagnosis System Using Evolutionary Computation  

Authors: Harish Chopkar, Vikas Palekar, Sumit Wadaskar, Sapna Yadav

Page No.: 571 - 573

 

30. Notopedia Self Learning Study Material BIBLIOPHILY  

Authors: Anjali S.Jibhakate, Ankita J. Gakare, Rinku C. Nag, Prof.Rahul V. Bambodkar

Page No.: 574 - 577

 

32. Training and Placement Web Portal  

Authors: Mr. Hitesh K. Kasture, Mr. Sumit S. Saraiyya, Mr. Abhishek S. Malviya, Prof. Preeti V. Bhagat

Page No.: 586 - 591

 

33. Taxi Automation Using Real Time Adaptive Scheduling  

Authors: Anurag Mandle, Akshay Jaiswal, Bhushan Dod, Roshan Lokhande

Page No.: 592 - 594

 

34. Extraction of Exclusive Video Content from One Shot Video  

Authors: A.Chithra, M.C.Shanker

Page No.: 595 - 600

 

38. Cell Phone Operated Land Rover  

Authors: Sumona Biswas, Bipin Kumar, Aditya kushwaha, Debasish Sardar

Page No.: 617 - 621

 

39. Mobile Phone Forensics Challenges and Tools Classification A Review  

Authors: Ms. Mohini N. Umale, Prof. A. B. Deshmukh, Prof. M. D. Tambhakhe

Page No.: 622 - 626

 

40. Crime Analysis Using Self Learning  

Authors: Pranav Ruke, Stephy Mathew, Meghna Mohanty, Pankaja Alappanavar, Gandhali Gurjar

Page No.: 627 - 630

 

41. Vehicle Number Plate Recognition System  

Authors: Surbhi Sahay, Abhijeet Kamble, Pramod Sonawane

Page No.: 631 - 633

 

42. Cassandra File System Over Hadoop Distributed File System  

Authors: Mr. Ashish A. Mutha, Miss. Vaishali M. Deshmukh

Page No.: 634 - 637

 

43. Medical Imaging Advancement  

Authors: Sonal Borase, Prof. Dr. Manjusha Deshmukh

Page No.: 638 - 640

 

44. Security and Privacy Preservation over Interconnected Networks  

Authors: J. Augustin Jebakumar, N. Gowdham, G. Josephine Kirubha, M. Navaneetha Krishnan

Page No.: 641 - 644

 

45. Development of Secure Mobile Cloud Computing Using Improved Identity Management Protocol  

Authors: Prof. Arun Katara, Prof. Priyanka, Prof. Jayant Rohankar, Pankaja A.Hadole

Page No.: 645 - 650

 

46. Evaluation of MSE in Delta Sigma First Order Modulator  

Authors: Nirmalya Chandra, Tanusree Mondal, Vishal Panda, Kakali Sarkar

Page No.: 651 - 655

 

47. Two Step Share Visual Cryptography Algorithm for Secure Visual Sharing  

Authors: N. Gowdham, S.D. Libin Raja, M. Sornalakshmi, M. Navaneetha Krishnan

Page No.: 656 - 660

 

48. Reviews on Agro Sense Precision Agriculture Using Wireless Sensor Networks  

Authors: Ms. Neha A. Wadaskar, Prof. S. A. Ladhake

Page No.: 661 - 664

 

49. File Transfer Protocol in Cloud Computing  

Authors: Ch.Madhu Babu, O.Lakshmi Chandana

Page No.: 665 - 667

 

50. Surveillance and Steering of Agricultural Field using Zigbee  

Authors: Mr.K.Kirubakaran, Selvi Ramalingam, S.Meerabai, V.Preethi

Page No.: 668 - 672

 

51. A Modified Hybrid Port Knocking Technique for Host Authentication A Review  

Authors: Ms. Pratiksha R. Yewale, Mr. Vishwas T. Gaikwad, Mr. Harshal N.Datir

Page No.: 673 - 677

 

52. Mobile Data Offloading the Growing Need with Its Solutions and Challenges  

Authors: Rahul Rajkumar Pahlajani, Dr. G. R. Bamnote

Page No.: 678 - 682

 

53. Securing Web Application against SQL Injection Attack A Review  

Authors: Ms. Mira K. Sadar, Mr. Pritish A.Tijare, Mr. Swapnil N.Sawalkar

Page No.: 683 - 687

 

54. UDP-Based Multi-Stream Communication Protocol Using NS2  

Authors: Vandana Vijay Belkhode, Prof. D. M. Dakhane

Page No.: 688 - 690

 

55. Mosix the Cluster Operating System Having Advancements & Many Features  

Authors: Vijendra Rajendra Augustine , Prof. P. L. Ramteke

Page No.: 691 - 695

 

56. Design of High Speed Comparator  

Authors: Jayesh S. Shetti Karwarker, Dr. H. G. Virani

Page No.: 696 - 699

 

57. PHP Desk  

Authors: Shingnapure Ganesh Rajabhau, Golegaonkar Omkar Nitin, Jain Nikhil Arun, Shinde Akshay Nandkishor

Page No.: 700 - 702

 

58. Mobile Cloud Computing the Necessity of Future with its Architecture, Advantages and Applications  

Authors: Anup Arvind Lahoti, Prof. Prabhaker L. Ramteke

Page No.: 703 - 708