Volume 3 Issues - (April 15 Volume 3 Issue 4)

1. Multiple - Antenna System for Mobile Phones  

Authors: Wani Hanan Nazir, M Neelaveni Ammal

Page No.: 1739 - 1741
DOI: 10.17762/ijritcc2321-8169.160401    

 

2. Survey on privacy preservation in personalized web environment  

Authors: Esmita Gupta, Prof. Deepali Vora

Page No.: 1742 - 1745
DOI: 10.17762/ijritcc2321-8169.160402    

 

3. Data Security in Cloud for Medical Sciences using AES 512-bit Algorithm  

Authors: R. Sai Sindhu Theja, G. Kalyani, K Krishna Jyothi

Page No.: 1746 - 1749
DOI: 10.17762/ijritcc2321-8169.160403    

 

4. Constraint-Aware Approach to Web Service Composition  

Authors: C. B. Sai Krishnan, S. Brintha Rajakumari, M. Beema Mehraj

Page No.: 1750 - 1754
DOI: 10.17762/ijritcc2321-8169.160404    

 

5. A Survey Paper on OpenGL ES  

Authors: Ms. Warsha M. Choudhari, Ms. Rinku Rajankar

Page No.: 1755 - 1758
DOI: 10.17762/ijritcc2321-8169.160405    

 

10. A Review on IOT Techniques for Automating Devices  

Authors: Mr. Pranay P. Gaikwad, Mrs. Jyotsna P. Gabhane, Mrs. Snehal S. Golait

Page No.: 1773 - 1777
DOI: 10.17762/ijritcc2321-8169.160410    

 

11. Power Generation System by using Piezo Sensors for Multiple Applications  

Authors: Sowmyashree M S, Naveen R, Naveen S, Manoj V, Shashanka M K,

Page No.: 1778 - 1780
DOI: 10.17762/ijritcc2321-8169.160411    

 

12. Online Remedy Finder for Homeopathy  

Authors: Jenny Mandy, Vanessa Pais, Calvin Cleetus

Page No.: 1781 - 1786
DOI: 10.17762/ijritcc2321-8169.160412    

 

13. Survey on Privacy Preservation in Personalized Web Environment  

Authors: Esmita Gupta, Prof. Deepali Vora

Page No.: 1787 - 1790
DOI: 10.17762/ijritcc2321-8169.160413    

 

14. Interavtive Voice Response System  

Authors: Ms.Rashmi Janbandhu, M s.Divya Jawle, Ms. Naina Shende, Ms. Akansha Chipde, Mr. Viplove Karhade

Page No.: 1791 - 1796
DOI: 10.17762/ijritcc2321-8169.160414    

 

15. Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority  

Authors: Minakshi V.Shinde, Prof.H.A.Hingoliwala.

Page No.: 1797 - 1801
DOI: 10.17762/ijritcc2321-8169.160415    

 

16. Abstraction Based Data Mining  

Authors: Gaurav Kothari, Anup Ahuje, Amish Patel, Abhinandan Khilari

Page No.: 1802 - 1806
DOI: 10.17762/ijritcc2321-8169.160416    

 

17. Optimal Service Placement in Distributed Networks  

Authors: Raji Rajasekharan

Page No.: 1807 - 1815
DOI: 10.17762/ijritcc2321-8169.160417    

 

18. A Review of Particle Swarm Optimization: Feature Selection, Classification and Hybridizations  

Authors: Madan Madhaw Shrivas, Amit Saxena, Leeladhar Kumar Gavel

Page No.: 1816 - 1820
DOI: 10.17762/ijritcc2321-8169.160418    

 

20. Action Recognition using High-Level Action Units  

Authors: Paul. T. Jaba, Ms. Jackulin Asha G. S.

Page No.: 1831 - 1835
DOI: 10.17762/ijritcc2321-8169.160420    

 

21. High Secured Image by LSB Steganography Technique using Matlab  

Authors: Ms. Jayashri Gokul Gurav, Prof. MukeshTiwari, Prof. Jayakaran Singh

Page No.: 1836 - 1840
DOI: 10.17762/ijritcc2321-8169.160421    

 

22. Automation Testing Using Data Driven Approach  

Authors: Ayush Gondhali, Rishikesh Chandra, Ashish Shinde, Sanket Pimple.

Page No.: 1841 - 1844
DOI: 10.17762/ijritcc2321-8169.160422    

 

23. A Double Pipe Heat Exchanger – Fabrication and Standardization  

Authors: Prof.P.B.Dehankar, K.K.Pandhare, M.J.Vagare, V.M.Nerlekar

Page No.: 1845 - 1847
DOI: 10.17762/ijritcc2321-8169.160423    

 

24. Ex-HABE with User Accountability for Secure Access Control in Cloud  

Authors: Nilesh S. Jadhav, Ms. D. A. Chaudhari

Page No.: 1848 - 1853
DOI: 10.17762/ijritcc2321-8169.160424    

 

26. Secure Image Transmission Using Stochastic Diffusion  

Authors: Mr. H.D. Gadade, Pranita Patil, Priyanka Patil

Page No.: 1860 - 1862
DOI: 10.17762/ijritcc2321-8169.160426    

 

28. Optimized Variable Step Size Normalized LMS Adaptive Algorithm for Echo Cancellation  

Authors: Deman Kosale, H.R. Suryawanshi, V.K. Dwivedi

Page No.: 1873 - 1877
DOI: 10.17762/ijritcc2321-8169.160428    

 

30. Efficacy of Educomp Smart Class  

Authors: Dr. Savita Srivastava

Page No.: 1884 - 1894
DOI: 10.17762/ijritcc2321-8169.160430    

 

31. A Survey on Feature Selection Algorithms  

Authors: Dr. Amit Kumar Saxena, Vimal Kumar Dubey

Page No.: 1895 - 1899
DOI: 10.17762/ijritcc2321-8169.160431    

 

33. Vehicle Transportation Information Using Global Positioning System  

Authors: Prof. B. B. Lonkar, Prof. Rajesh T. Nakhate, Prof. Manoj R. Sayankar

Page No.: 1905 - 1909
DOI: 10.17762/ijritcc2321-8169.160433    

 

34. Comparison of Different Distance Metrics to Find Similarity between Images In CBIR System  

Authors: Shrikant Bhosle, Dr. Prakash Khanale

Page No.: 1910 - 1917
DOI: 10.17762/ijritcc2321-8169.160434    

 

35. A Review Paper on Classification of Stem Cell Transplant to Identify the High Survival Rate  

Authors: Ms. Jayshree S. Raju, Mr. Prafulla L. Mehar, Ms. Dipali P. Pethe

Page No.: 1918 - 1920
DOI: 10.17762/ijritcc2321-8169.160435    

 

36. Cognitive Radio Relay Network Performance Analysis by using Game Theory  

Authors: G. D. Arjun, Mr. P. Vijaya Kumar,

Page No.: 1921 - 1926
DOI: 10.17762/ijritcc2321-8169.160436    

 

37. Visual Cryptography and Steganography Methods - Review  

Authors: Kavita M. Tambe, Ramling D. Patane

Page No.: 1927 - 1930
DOI: 10.17762/ijritcc2321-8169.160437    

 

38. Security Management Methods in Relational Data  

Authors: Suhasini Gurappa .Metri, Dr. D. R. Shashi Kumar

Page No.: 1931 - 1933
DOI: 10.17762/ijritcc2321-8169.160438    

 

39. Apple Grade Inspection by Using Machine Vision  

Authors: Sourabh Bisht, Vikas Rathi, Gaurav Pant, Vivek Verma

Page No.: 1934 - 1941
DOI: 10.17762/ijritcc2321-8169.160439    

 

40. Ex-AS-CRED Method for Inter Domain Routing of BGP  

Authors: Trishula Hajare, Mrs. D. A. Chaudhari

Page No.: 1942 - 1946
DOI: 10.17762/ijritcc2321-8169.160440    

 

41. The Carpooling System  

Authors: Ashish Kumar Joshi, Aniket Tapkir, Durgesh Vinchurkar, Sunil Rathod

Page No.: 1947 - 1949
DOI: 10.17762/ijritcc2321-8169.160441    

 

42. Productivity Improvement Techniques for Casting  

Authors: Mr. Zagade D.D., Mr. Dulange S.R.

Page No.: 1950 - 1952
DOI: 10.17762/ijritcc2321-8169.160442    

 

43. Review of k-Zero Day Safety Network Security Metrics to Measure the Risk on Different Vulnerabilities  

Authors: Ms. Suchita D. Pawar, Prof. H. A. Hingoliwala

Page No.: 1953 - 1956
DOI: 10.17762/ijritcc2321-8169.160443    

 

45. Data Transmission using AES-RSA Based Hybrid Security Algorithms  

Authors: Shashikant Kuswaha, Praful B. Choudhary, Sachin Waghmare, Nilesh Patil

Page No.: 1964 - 1969
DOI: 10.17762/ijritcc2321-8169.160445    

 

46. Analysis of Security methods in Internet of Things  

Authors: Saranya. C. M, Nitha. K. P

Page No.: 1970 - 1974
DOI: 10.17762/ijritcc2321-8169.160446    

 

47. Online Crime Fraud Detection System  

Authors: Charudatta G. Bangal, Mansi R. Mangare, Pooja V. Babar, Pooja B. Tungar

Page No.: 1975 - 1978
DOI: 10.17762/ijritcc2321-8169.160447    

 

49. A Review Paper on Technical Data of Present HVDC Links in India  

Authors: Koganti Sri lakshmi, G. Sravanthi, L. Ramadevi, Koganti Harish chowdary

Page No.: 1985 - 1991
DOI: 10.17762/ijritcc2321-8169.160449    

 

52. Slicing: A New Access to Isolation Preserving Data Publishing  

Authors: Swapnil Y. Gursale, Ravindra S. Avhad, Rajesh K. Pagare

Page No.: 2003 - 2006
DOI: 10.17762/ijritcc2321-8169.160452    

 

53. Performance Improvement of an Industry by using (MRP) Software  

Authors: Mr. Bartakke A.G. Mr. Dulange S.R.

Page No.: 2007 - 2015
DOI: 10.17762/ijritcc2321-8169.160453    

 

54. Introduction to Steganography  

Authors: Ms. Rashmi Janbandhu, Mr. Viplove Karhade

Page No.: 2016 - 2019
DOI: 10.17762/ijritcc2321-8169.160454    

 

55. An Ecosystem Conservation Approach for Northern Alpine Wetlands  

Authors: R. Hussein, R. Bano, R. Sardon

Page No.: 2020 - 2022
DOI: 10.17762/ijritcc2321-8169.160455    

 

57. Multi Focus Image Fusion Techniques  

Authors: Samiha Naik, Tanvi Limbachiya, Usha Kakadiya, Vilas Satasiya

Page No.: 2029 - 2033
DOI: 10.17762/ijritcc2321-8169.160457    

 

58. Implementation of Low Cost Automatic Gear Suggestion System  

Authors: S Venkatesh , Dr. B Jai Shankar, S Finney Daniel Shadrach, M Singaram

Page No.: 2034 - 2036
DOI: 10.17762/ijritcc2321-8169.160458    

 

60. Securing ATM with OTP and Biometric  

Authors: Mohammed Hamid Khan

Page No.: 2041 - 2044
DOI: 10.17762/ijritcc2321-8169.160460    

 

61. Electronic Toll Collection (ETC) System Using Wi-Fi Technology  

Authors: Adesh Mhatre, Shilpesh Agre, Anil Avhad, Dhruv Gandhi, Nilesh Patil

Page No.: 2045 - 2050
DOI: 10.17762/ijritcc2321-8169.160461    

 

62. Introduction to Information Retrieval Systems  

Authors: Ms. Rashmi Janbandhu, Mr.Viplove Karhade

Page No.: 2051 - 2054
DOI: 10.17762/ijritcc2321-8169.160462    

 

63. Implementation of Fast, Low Power and Area Efficient Carry Select Adder  

Authors: Priya H. Agrawal, Prashant R. Rothe

Page No.: 2056 - 2059
DOI: 10.17762/ijritcc2321-8169.160463    

 

64. Image Analysis, Brightness Improvement and Enhancement of Image using Histogram Equalization Technique  

Authors: Miss. Priyanka Hajare, Akshay .P Rahane, Vikrant V. Sangekar

Page No.: 2060 - 2064
DOI: 10.17762/ijritcc2321-8169.160464    

 

65. An Application to Enhance the Admission Process and Communication between Members of an Institute.  

Authors: Siddhant Gokule, Rohit Jadhav, Mruganayani Mane, Sanchita Chhajed

Page No.: 2065 - 2068
DOI: 10.17762/ijritcc2321-8169.160465    

 

66. Credit Card Fraud Detection Using Perceptron Training Algorithm and Prevention Using One Time Password.  

Authors: Prof. Gajanan Bherde, Ashwin Telang, Mehul Bhuva, Harsh Gajra, Ajit Patel

Page No.: 2069 - 2071
DOI: 10.17762/ijritcc2321-8169.160466    

 

67. Comparitive Study on Secure Data Retrieval Framework for Military Networks  

Authors: C Krithina Thimmaiah, Sandeep Kumar

Page No.: 2072 - 2075
DOI: 10.17762/ijritcc2321-8169.160467    

 

68. Software Metrics and Metric Tools- A Review  

Authors: Sandeep Kaur, Navjot Kaur

Page No.: 2076 - 2079
DOI: 10.17762/ijritcc2321-8169.160468    

 

69. A Review on Significance of PID Controller for Speed Control of DC Motor  

Authors: Mr. R. B. Nimbalkar, Mr. S. B .Lavhate, Mr. V. R. Lawande, Mr. N. D. Toradmal

Page No.: 2080 - 2082
DOI: 10.17762/ijritcc2321-8169.160469    

 

70. Stress Detection by Measuring Heart Rate Variability  

Authors: Dipali H.Patil, Garima Kumari, Pooja Daware, Vijayalaxmi Shinde, Akanksha Pran Raina

Page No.: 2083 - 2089
DOI: 10.17762/ijritcc2321-8169.160470    

 

71. Modern Feedback System: A Survey  

Authors: Subodh Garg, Sukanya Sarma, Supriya G, Saba Naureen, Dr. Prasad G R

Page No.: 2090 - 2096
DOI: 10.17762/ijritcc2321-8169.160471    

 

72. Image Processing Technique for Hard Exudates Detection for diagnosis of Diabetic Retinopathy  

Authors: Prof. Neha N. Gaikwad, Prof. Pravinkumar R. Badadapure

Page No.: 2097 - 2100
DOI: 10.17762/ijritcc2321-8169.160472    

 

73. A Survey on Interlaken Protocol for Network Applications  

Authors: Gaidhani Dhananjay Shekhar, A.Yogaraj, Shridhar Dudam

Page No.: 2101 - 2105
DOI: 10.17762/ijritcc2321-8169.160473    

 

74. Automatic Speaker Recognition using LPCC and MFCC  

Authors: Mr. P, Kumar, Dr. S. L. Lahudkar

Page No.: 2106 - 2109
DOI: 10.17762/ijritcc2321-8169.160474    

 

75. Video Anti Forensics - A Review  

Authors: Monika Ramesh Chourasiya, Avinash P. Wadhe

Page No.: 2110 - 2114
DOI: 10.17762/ijritcc2321-8169.160475    

 

76. Configure A VoIP Network  

Authors: Prof. A. I. Darvadiya, Ms. Gohil Zarna M., Ms. Joshi Nehalkumari T.

Page No.: 2115 - 2120
DOI: 10.17762/ijritcc2321-8169.160476    

 

77. Target Tracking in Wireless Sensor Network  

Authors: Agniwesh Mishra, R. Annie Uthra

Page No.: 2121 - 2126
DOI: 10.17762/ijritcc2321-8169.160477    

 

78. Improving Performance of Cross-Domain Firewalls in Multi-Firewall System  

Authors: Sonali A. Deo, Ms. D. B. Gothawal

Page No.: 2127 - 2131
DOI: 10.17762/ijritcc2321-8169.160478    

 

79. A Survey paper on Cloud Environment for Backup and Data Storage  

Authors: Prof. Palash M. Gourshettiwar, Prof. Dhiraj Shirbhate

Page No.: 2132 - 2136
DOI: 10.17762/ijritcc2321-8169.160479    

 

80. A Survey Paper on Ontology-Based Approaches for Semantic Data Mining  

Authors: Prof. Priti V. Bhagat, Prof. Palash M. Gourshettiwar

Page No.: 2137 - 2141
DOI: 10.17762/ijritcc2321-8169.160480    

 

81. Analysis of COMPOUND TCP using Network Emulation  

Authors: Harshit Parmar, Kapil Raviya

Page No.: 2142 - 2145
DOI: 10.17762/ijritcc2321-8169.160481    

 

83. Title Under Publication Process  

Authors: Author, Author2

Page No.: 2150 - 2153
DOI: 10.17762/ijritcc2321-8169.160483    

 

84. Survey on Encroachment Sensing Scheme over the MANET  

Authors: Apurba Shukla, Prof. Sachin Deshpande

Page No.: 2154 - 2157
DOI: 10.17762/ijritcc2321-8169.160484    

 

85. Review on Automatic Car Parking Indicator System  

Authors: Mr. Amit A. Kamble, Mrs. Archana Dehankar

Page No.: 2158 - 2161
DOI: 10.17762/ijritcc2321-8169.160485    

 

86. Stochastic Simulation in Agricultural Economics  

Authors: Avijit Jain, Amit Pathak, N Farheen Safoora, Neantha Louiza Vaz, M Prajakta

Page No.: 2162 - 2167
DOI: 10.17762/ijritcc2321-8169.160486    

 

87. Contactor Logic Circuit Replacement In Die casting Machine (LK -12T) Using MITSUBISHI PLC  

Authors: Prof.Mrs.Sharada Dhavale, Mr.Akhil Nair, Ms.Komal Mandape, Ms.Meena Lawate

Page No.: 2168 - 2170
DOI: 10.17762/ijritcc2321-8169.160487    

 

88. Human Detection in Video Surveillance System  

Authors: Ajinkya Sapkal, Sushil Nemade, Nikhil Mohadikar, Pallavi Gosavi

Page No.: 2171 - 2173
DOI: 10.17762/ijritcc2321-8169.160488    

 

89. A Study Paper on use of System Camera for System Mouse Control  

Authors: Nitin Sakhare, Pratyoosh Rai

Page No.: 2174 - 2179
DOI: 10.17762/ijritcc2321-8169.160489    

 

90. Emission Reduction Techniques for Printed Circuit Board  

Authors: Satish Kumar Das, Mr. Vishal H. Shah

Page No.: 2180 - 2183
DOI: 10.17762/ijritcc2321-8169.160490    

 

91. Implicit Sentiment Identification using Aspect based Opinion Mining  

Authors: Sayali A Mankar, Prof. M.D. Ingle

Page No.: 2184 - 2188
DOI: 10.17762/ijritcc2321-8169.160491    

 

92. PLC Installation on Inner Ring Bore SHG Grinding Machine  

Authors: Mrs.D.S. Khurge, Mr.Saurabh Waykole, Mr. Ajinkya Thorat, Mr. Nitin Sapru

Page No.: 2189 - 2193
DOI: 10.17762/ijritcc2321-8169.160492    

 

95. ECG Signal Analysis with DB6 Wavelet using Verilog HDL.docx  

Authors: Shivani Mehrotra, Ms. Jagandeep Kaur, Ms. Nisha Charaya, Dr. Janak B. Patel

Page No.: 2202 - 2207
DOI: 10.17762/ijritcc2321-8169.160495    

 

97. Measurement of Body Mass Index (BMI) using PIC 18F452 Microcontroller  

Authors: Ms. Dipika S. Varma, Ms. Varsha R. Mhatre, Mr. Prashant M. More, Prof. S. S. Ayane

Page No.: 2213 - 2216
DOI: 10.17762/ijritcc2321-8169.160497    

 

98. Stock Value Prediction System  

Authors: Dhiraj Mundada, Gaurav Chhaparwal, Sachin Chaudhari, Trupti Bhamare

Page No.: 2217 - 2219
DOI: 10.17762/ijritcc2321-8169.160498    

 

99. Overview of Power Estimation Methods in Mobile Communications  

Authors: Anirudh Mudaliar, Deepika Patel

Page No.: 2220 - 2224
DOI: 10.17762/ijritcc2321-8169.160499    

 

100. TCP Concurrent Echo Program using Fork and Thread  

Authors: Ms.Rupilaa V.M, Ms.Sangeetha M, Mr.Sathya Seelan K, Mr.Vadivel R.

Page No.: 2225 - 2229
DOI: 10.17762/ijritcc2321-8169.1604100    

 

101. Review Analysis on Causes and Effects of Change orders on Construction Projects  

Authors: Jadhav Onkar Uttam, Prof.Abhijit .N. Bhirud

Page No.: 2230 - 2233
DOI: 10.17762/ijritcc2321-8169.1604101    

 

102. Efficient Routing Protocol in MANET  

Authors: Ms. Amruta Kodole, Prof. Pankaj Agarkar

Page No.: 2234 - 2238
DOI: 10.17762/ijritcc2321-8169.1604102    

 

104. OTP Generation using SHA  

Authors: Mohammed Hamid Khan

Page No.: 2244 - 2245
DOI: 10.17762/ijritcc2321-8169.1604104    

 

105. FPGA Based Notch Filter to Remove PLI Noise from ECG  

Authors: Mr. P.C. Bhaskar, Dr.M.D.Uplane

Page No.: 2246 - 2250
DOI: 10.17762/ijritcc2321-8169.1604105    

 

106. New Technique for Image Fusion Using DDWT and PSO In Medical field  

Authors: Mr.Pradeep P.Patil, Prof.Kiran B.Deshpande

Page No.: 2251 - 2254
DOI: 10.17762/ijritcc2321-8169.1604106    

 

107. Analysis and Design of a Two Stage CMOS OP-AMP with 180nm using Miller Compensation Technique  

Authors: Shilpa Goyal, Nitin Sachdeva, Tarun Sachdeva

Page No.: 2255 - 2260
DOI: 10.17762/ijritcc2321-8169.1604107    

 

108. Investigation of Effective De Noising Techniques for ECG Signal  

Authors: Mr. Yogesh V. Ravandale, Mr. Sanjeev N Jain

Page No.: 2261 - 2268
DOI: 10.17762/ijritcc2321-8169.1604108    

 

110. Marathi Speech Interface System for the Activation and Controlling of Electronic Equipment  

Authors: Santosh Gaikwad, Bharti Gawali, Suresh Mehrotra

Page No.: 2273 - 2281
DOI: 10.17762/ijritcc2321-8169.1604110    

 

111. Recognition of Marathi Newsprint Text Using Neural Network and Genetic Algorithm  

Authors: Miss Vrushali V. Sabale, Prof. Mukund R. Joshi

Page No.: 2282 - 2286
DOI: 10.17762/ijritcc2321-8169.1604111    

 

112. Damage Detection caused by Natural Disaster using Image Processing Technique  

Authors: Rani Parijat Singh, Prof. Toran Verma

Page No.: 2287 - 2291
DOI: 10.17762/ijritcc2321-8169.1604112    

 

113. Data Doctor: An Efficient Data Profiling and Quality Improvement Tool  

Authors: Shruti Sarkate, Kaveri Tare, Ruchi Kamble, Narendra Gawai

Page No.: 2292 - 2297
DOI: 10.17762/ijritcc2321-8169.1604113    

 

115. An Intra-city Route Management System - Sanchari Mitra  

Authors: Aneesh M.G., Chinnaswamy C.N., Neha Kumari, Karan M. Shet, Mohit Kumar Gupta,T.H. Sreenivas

Page No.: 2302 - 2306
DOI: 10.17762/ijritcc2321-8169.1604115    

 

117. Wifi AP Based Secure Data Sharing Among Smartphones And Computer System  

Authors: Miss. Rachana N. Sawade, Prof. P. V. Dudhe

Page No.: 2313 - 2316
DOI: 10.17762/ijritcc2321-8169.1604117    

 

119. Encryption and Decryption Using Rijndael Algorithm  

Authors: Manisha Mankar, Dr.R.V Kshirsagar, Prof.M.V.Vyawahare

Page No.: 2326 - 2329
DOI: 10.17762/ijritcc2321-8169.1604119    

 

120. Performance Enhancement of SOPDT System with Numerically Optimized PID Controller  

Authors: Mr. C. B. Kadu, Mr. S. B. Lukare

Page No.: 2330 - 2334
DOI: 10.17762/ijritcc2321-8169.1604120    

 

121. On Field Monitoring and Control of Polyhouse  

Authors: Mrs.Ashwini.S.Shinde, Mr.N.K.Singh, Ms.S.K.Shukla, Mr.D.J.Trivedi

Page No.: 2335 - 2338
DOI: 10.17762/ijritcc2321-8169.1604121    

 

122. Robotic Groundnut Sower  

Authors: Prof. S.Y Sawant, Mr. A. Hulsure, Mr. S. Jadhav, Mr. K. Jadhav

Page No.: 2339 - 2342
DOI: 10.17762/ijritcc2321-8169.1604122    

 

123. Prototype Implementation of Real Time CAN Driver for Distributed Embedded Applications  

Authors: Kuldipsing Rajput, Babu Krishnamurthy, Sasikala G.

Page No.: 2343 - 2348
DOI: 10.17762/ijritcc2321-8169.1604123    

 

124. Multiple TPA for Extensive Reliability and Security in Cloud Storage  

Authors: Swati khambete, Mr.Abhijit Patankar

Page No.: 2349 - 2352
DOI: 10.17762/ijritcc2321-8169.1604124    

 

125. Direction of Arrival Algorithm using GSU-minimization  

Authors: Ganesh V. Karbhari, Prof.A.S.Deshpande

Page No.: 2353 - 2355
DOI: 10.17762/ijritcc2321-8169.1604125    

 

126. A Protective Mechanism to Avoid Eavesdropping Attack in MANET  

Authors: Rajani B. Patil, Prof. Dhanashree Kulkarni

Page No.: 2356 - 2361
DOI: 10.17762/ijritcc2321-8169.1604126    

 

127. A Novel Approach to Autonomous Farming Robot  

Authors: Ronak Mistry, Kishan Malaviya, Harsh Kotak, Harshil Bhatt, Urvi Patel

Page No.: 2362 - 2366
DOI: 10.17762/ijritcc2321-8169.1604127    

 

128. Low Power Design Bi – Directional Shift Register By using GDI Technique  

Authors: C.Ravindra Murthy, C.P.Rajasekhar Rao,G. Sree Reddy

Page No.: 2367 - 2373
DOI: 10.17762/ijritcc2321-8169.1604128    

 

129. Effective Utilization of Search Engine Algorithm in Relevant Information Retrieval  

Authors: Jayashri D.Nagpure, Aishwarya R.Gayake, Jyoti S.Danave, Ravindra S.Tambe

Page No.: 2374 - 2376
DOI: 10.17762/ijritcc2321-8169.1604129    

 

130. Hand Gesture Recognition System Using Histogram and Neural Network  

Authors: Anurag Ranjan, Jeevan M.M, Pankaj Chaudhary, Pavana Swaroopa S, S.KuzhalvaiMozhi

Page No.: 2377 - 2382
DOI: 10.17762/ijritcc2321-8169.1604130    

 

131. Query Processing on Encrypted Database: A Performance Evaluation  

Authors: Rajendra H. Rathod, Dr. C. A. Dhote

Page No.: 2383 - 2388
DOI: 10.17762/ijritcc2321-8169.1604131    

 

133. Security Threats of Cloud Computing  

Authors: Nancy Aawadallah

Page No.: 2393 - 2397
DOI: 10.17762/ijritcc2321-8169.1604133    

 

134. Video Streaming using Message Accelerator  

Authors: Luvish Yadav, Prof. A. J. Jadhav, Chaitanya Pol, Akshay Teke, Saurabh Yeramwar

Page No.: 2398 - 2403
DOI: 10.17762/ijritcc2321-8169.1604134    

 

135. Architectural Design of D2H Medicare  

Authors: Manne Lakshmi Mounika, Dr. Syed Umar, Popuri Silpa

Page No.: 2404 - 2407
DOI: 10.17762/ijritcc2321-8169.1604135    

 

136. Comparison of Different Supervisied Classifiers in Detection of Microaneurysms  

Authors: Nayan Jyoti Talukdar, Prof. P. Manohar

Page No.: 2408 - 2412
DOI: 10.17762/ijritcc2321-8169.1604136    

 

137. Biometric Validation by Storing different Patterns using Mouse Gesture Signatures  

Authors: Mr. Vishal S. Patil, Prof. P. R. Devale

Page No.: 2413 - 2415
DOI: 10.17762/ijritcc2321-8169.1604137    

 

138. Lifetime improvement with LEACH Protocol  

Authors: Khushboo Manohar, A. I. Darvadiya

Page No.: 2416 - 2420
DOI: 10.17762/ijritcc2321-8169.1604138    

 

139. Privacy Preservation in Analyzing E-Health Records in Big Data Environment  

Authors: E. Srimathi, K. A. Apoorva

Page No.: 2421 - 2427
DOI: 10.17762/ijritcc2321-8169.1604139    

 

140. Detection of SYBIL Attack using Neighbour Nodes in Static WSN  

Authors: C. Geetha, M. Ramakrishnan

Page No.: 2428 - 2432
DOI: 10.17762/ijritcc2321-8169.1604140    

 

143. Review on Data Transmission using Dynamic Routing And Reverse Encryption Algorithm  

Authors: Kaustubh Satput, Charudatt Satpute, Gajanan Tikhe

Page No.: 2440 - 2442
DOI: 10.17762/ijritcc2321-8169.1604143    

 

144. A Review on Different Video Coding Standards  

Authors: Vanshika Arora, Hardeep Saini

Page No.: 2443 - 2446
DOI: 10.17762/ijritcc2321-8169.1604144    

 

145. Adaptive Non-invasive Blood Pressure Measurement  

Authors: Julin Sara Thomas, Dr. Andhe Pallavi

Page No.: 2447 - 2451
DOI: 10.17762/ijritcc2321-8169.1604145    

 

146. Solar Powered Optimal Battery Charging Scheme For Moving Robotic Vehicle  

Authors: Gaurav Andhare, Sachin Shelar

Page No.: 2452 - 2455
DOI: 10.17762/ijritcc2321-8169.1604146    

 

148. A Review Paper on Behavior of Node in MANET  

Authors: Vaibhav V. Bhujade, Deepak Chaudhary, Suraj V. Raut

Page No.: 2461 - 2465
DOI: 10.17762/ijritcc2321-8169.1604148    

 

149. Identification of Alphanumeric Pattern Using Android  

Authors: Anamika Sharma, Suman Kumar Jha

Page No.: 2466 - 2470
DOI: 10.17762/ijritcc2321-8169.1604149    

 

150. A Review – Clustering and Preprocessing For Web Log Mining  

Authors: Shital S. Kontamwar, Prof. Anil Warbhe, Prof. Shyam. Dubey

Page No.: 2471 - 2473
DOI: 10.17762/ijritcc2321-8169.1604150    

 

152. Comparative Analyses of Multilevel and Geometric Image Fusion Techniques  

Authors: Laxman Gurki, Jayanthi.M.G

Page No.: 2479 - 2482
DOI: 10.17762/ijritcc2321-8169.1604152    

 

153. PGP Implementation with IDEA  

Authors: Vibha Ojha, Deepak Gupta, Ravindra Singh

Page No.: 2483 - 2487
DOI: 10.17762/ijritcc2321-8169.1604153    

 

154. A Study of Orthogonal Components for Visible Image Data Hiding  

Authors: Shivanand S. Rumma

Page No.: 2488 - 2491
DOI: 10.17762/ijritcc2321-8169.1604154