Volume 3 Issues - (January 15 Volume 3 Issue 1)

1. Ascertaining Chronological Change Patterns in the Presence of Multiple Taxonomies  

Authors: Poul Geeta Venkatrao, Prof. P. D. Lambhate

Page No.: 01 – 04
DOI: 10.17762/ijritcc2321-8169.150101    


2. Decentralized Anonymous User Authentication For Securing Data Storage in Cloud  

Authors: Shital S. Pagar, Snehal M. Baviskar, Vandana N. Chalwadi, Prof. Kavita S. Kumavat

Page No.: 05 - 10
DOI: 10.17762/ijritcc2321-8169.150102    


5. Review on AMES-Cloud Using Preservation, Fetching and Decisive Video Streaming Over Cloud Computing  

Authors: Miss. Payal Krishnarao Hedau, Prof. Manoj S. Chaudhari

Page No.: 18 - 21
DOI: 10.17762/ijritcc2321-8169.150105    


6. Faster Image Zooming using Cubic Spline Interpolation Method  

Authors: Shabana Parveen, Ms. Rajbala Tokas

Page No.: 22 - 26
DOI: 10.17762/ijritcc2321-8169.150106    


7. Development and Analysis of Different Density Auxetic Cellular Structures  

Authors: M. Usman Aslam, Saied M. Darwish

Page No.: 27 - 32
DOI: 10.17762/ijritcc2321-8169.150107    


8. Micro Strip Patch Antenna Using Broadside Coupling  

Authors: Mr. Bhavik K. Patel, Dr. Yagnesh B. Shukla, Mr. Sameep P. Dave

Page No.: 33 - 35
DOI: 10.17762/ijritcc2321-8169.150108    


9. Modified Hough Transform for Road Lane Colorization to Prevent Accidents  

Authors: Guramarjot Kaur, Prof. Jatinder Kumar

Page No.: 36 - 40
DOI: 10.17762/ijritcc2321-8169.150109    


10. Improved Color Image Segmentation Using Fuzzy Weighting And Edge Preservation  

Authors: Navjot Kaur, Prof. Jatinder Kumar

Page No.: 41 - 45
DOI: 10.17762/ijritcc2321-8169.150110    


11. Overview of Auditing Cloud Consistency  

Authors: Hemant T. Aher, Poonam D. Shirode, Kundan L. Shinde, Arti A. Jadhav

Page No.: 46 - 51
DOI: 10.17762/ijritcc2321-8169.150111    


12. Web Based Image search Using Semantic Signature Re-ranking Technique  

Authors: Aakib F. Bagwan, Bharti A. Gupta , Bhagyashri M. Dhole, Prof. Ashvini Y. Bhamare

Page No.: 52 - 56
DOI: 10.17762/ijritcc2321-8169.150112    


13. Study of Detached (Fresh) Leaf and Dried Leaf with Image Processing  

Authors: Parmar D. K., Dabhi B. K., Patel K. P., Raj M. P.

Page No.: 57 - 61
DOI: 10.17762/ijritcc2321-8169.150113    


14. Overview of GINIX and Top-k Method  

Authors: Nikhil B. Kedare, Harshada P. Wagh, Sayali D. Pingle, Nayana P. Khode, Prof. Kavita S. Kumavat

Page No.: 62 - 66
DOI: 10.17762/ijritcc2321-8169.150114    


15. GUI Testing On Android Application  

Authors: Neha J. Jagadale, Aditi G. Pagar, Mayuri.S.Deore, Priti V. Raut, Prof. Kavita S. Kumavat

Page No.: 67 - 71
DOI: 10.17762/ijritcc2321-8169.150115    


16. A Review on Automatic Color Form Dropout for Document Processing  

Authors: Mr. Ankush D.Kadu, Dr. P.R.Deshmukh

Page No.: 72 - 75
DOI: 10.17762/ijritcc2321-8169.150116    


18. Health Infomatics Using Multy-Keyword Rank Search Over Cloud  

Authors: Shubham A. Ahire, Gaurav A. Dere, Mayur D. Mekha, Amit S.Wagh

Page No.: 82 - 85
DOI: 10.17762/ijritcc2321-8169.150118    


19. Anomaly Extraction Using Histogram-Based Detector  

Authors: Mayur Devidas Khairnar, Sandesh Ramesh Shinde, Swapnil Bajirao Suryawanshi, Girish Sunil Patil, Prof. Kavita S. Kumavat

Page No.: 86 - 90
DOI: 10.17762/ijritcc2321-8169.150119    


21. Advanced of Mathematics-Statistics Methods to Radar Calibration for Rainfall Estimation; A Review  

Authors: Ali Nikahd, Mazlan Hashim, Ali A. Mirzaie,, Zabi allah Nikahd GHosiraie

Page No.: 96 - 105
DOI: 10.17762/ijritcc2321-8169.150121    



Authors: Matthew N. O. Sadiku, Raymond. C. Garcia, Sarhan M. Musa, Sudarshan R. Nelatury

Page No.: 106 - 112
DOI: 10.17762/ijritcc2321-8169.150122    


23. A Survey on Spectral Handoff Mechanisms for the Cognitive Radio Network  

Authors: Mr. Vinay S. Prabhavalkar, Dr. Vijay R. Ghorpade

Page No.: 113 - 116
DOI: 10.17762/ijritcc2321-8169.150123    


24. Maintain the Consistency of Auditing Cloud  

Authors: Amol D Vispute, Umesh M Nawale, Vikram S Wagh, Amol B Sonawane, Prof. Kavita S. Kumavat

Page No.: 117 - 122
DOI: 10.17762/ijritcc2321-8169.150124    


25. Crime Monitoring and Controlling System by Mobile Device  

Authors: Swapnali Rayate, Rohini Bhamare, Kaustubh Barhate, Mahendra Sonawane

Page No.: 123 - 126
DOI: 10.17762/ijritcc2321-8169.150125    


26. Evaluation of Green Building with Resources and Cost Aspects  

Authors: Nangare Priyanka Pandharinath, Pund Gaurav Chandrakant.,Warudkar A.A.

Page No.: 127 - 130
DOI: 10.17762/ijritcc2321-8169.150126    


27. Real-time capabilities in the standard Linux Kernel: How to enable and use them?  

Authors: Luc Perneel, Fei Guan, Long Peng, Hasan Fayyad-Kazan, Martin Timmerman

Page No.: 131 - 135
DOI: 10.17762/ijritcc2321-8169.150127    


28. Auto-Summarization of Email Document Using Statistical Approach  

Authors: Swati Thakare, Shital Kunzarkar, Sonal Chaudhari, Pranali Bhadane

Page No.: 136 - 139
DOI: 10.17762/ijritcc2321-8169.150128    


29. A Comparative Study on Apiculture Technology among Trained and Untrained Women  

Authors: Anuradha Ranjan Kumari, Sarita Sanwal, Serene Shekhar

Page No.: 140 - 143
DOI: 10.17762/ijritcc2321-8169.150129    


30. A Run-time Detection System for Malicious URLs in Twitter  

Authors: Harshad D. Nannaware, Tushar P. Dhangar, Aniket S. Dhanrao, Prof. V. D. Badgujar.

Page No.: 144 - 147
DOI: 10.17762/ijritcc2321-8169.150130    


31. Detecting Phishing Web Pages using NB classifier and EMD Approach  

Authors: Pranali P. Akare, Heena. Mohm. H. Maniyar, Tejendra D. Thorat, Jagruti k. Pagar

Page No.: 148 - 151
DOI: 10.17762/ijritcc2321-8169.150131    


33. A Novel Method for Graphical Password Mechanism  

Authors: Siddharth R. Dharane, Pradip N. Kakade, Sapna P. Gaikwad, Pooja K. Dokhale, Prof. Ashvini Y. Bhamare

Page No.: 156 - 161
DOI: 10.17762/ijritcc2321-8169.150133    


35. TAMC: Traffic Analysis Measurement and Classification Using Hadoop MapReduce  

Authors: Mr. Yogesh Vasant Kadam, Prof. Mrs. Vina Lomte

Page No.: 165 - 168
DOI: 10.17762/ijritcc2321-8169.150135    


37. Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device  

Authors: Atul R. Ghumare, Nivedita D. Patil, Chetan D. Holkar, Vivek D. Badgujar

Page No.: 175 - 180
DOI: 10.17762/ijritcc2321-8169.150137    


39. Overview of Cloud Computing Storage System  

Authors: Vrushali Arun Patil, Sayali Dilip Jejurkar, Sushmita Sonyabapu Gadekar

Page No.: 184 - 189
DOI: 10.17762/ijritcc2321-8169.150139    



Authors: Arun G, N Sasirekha

Page No.: 190 - 192
DOI: 10.17762/ijritcc2321-8169.150140    


42. Information Searching Using Web Data Extraction for Acquiring Enrich MM Results  

Authors: Firoz I. Kadri, Kaushal A. Kapse, Nitin V. Landge, Hemant B. Shirsath, Prof. V. D. Badgujar

Page No.: 203 - 208
DOI: 10.17762/ijritcc2321-8169.150142    


43. A study of Email date attacks in Network Security  

Authors: Mr. Kamlesh Lahre, Rohit Kumar Miri, Suraj Prasad keshri ,

Page No.: 209 - 211
DOI: 10.17762/ijritcc2321-8169.150143    


44. Data Sharing Securely for Administrators of Dynamic Groups in Cloud  

Authors: Nirali H. Patel, Sajiya S. Patel, Pooja C. Ighe, Prof. Madhuri B. Patil

Page No.: 212 - 216
DOI: 10.17762/ijritcc2321-8169.150144    


46. Novel Approach for User-Friendly Home Automation System on One Touch  

Authors: Miss. Juily Mataghare, Miss. Pallavi Salvi, Mr. Vrushali Watpade

Page No.: 222 - 225
DOI: 10.17762/ijritcc2321-8169.150146    


48. Flow Secure Message in Parity Matrix  

Authors: P. Ramya, P. Sandhya, R. Varun

Page No.: 238 - 240
DOI: 10.17762/ijritcc2321-8169.150148    


50. The future Clean Energy Harvesting by Wind Power Generation  

Authors: Prashant Meshram, Ritesh Ujawane, Priya Gaikwad, Prakash Yemde

Page No.: 248 - 252
DOI: 10.17762/ijritcc2321-8169.150150    


51. BSNL: Obstacles for Its Development & Its Solution  

Authors: Dr. Sreeekumar D Menon

Page No.: 253 - 258
DOI: 10.17762/ijritcc2321-8169.150151    


52. Power Theft Identification Using Smart Grid Technology  

Authors: Parvin Shikalgar, Prasad Yadav, Hemant Pawar

Page No.: 259 - 263
DOI: 10.17762/ijritcc2321-8169.150152    


53. HDL Design for Exa Hertz Clock Based 2e10-1 Exa Bits Per Second (Ebps) PRBS IP Core Generator for Ultra High Speed Wireless Communication Products  

Authors: Prof. P. N. V. M Sastry, Prof. G. Krishnaiah, Prof. Dr. D. N. Rao, Dr. S. Vathsal

Page No.: 264 - 267
DOI: 10.17762/ijritcc2321-8169.150153    


54. Communication in Cloud-of-Clouds Environment for Brokers  

Authors: Nitesh Khandare, Dinesh Yadav

Page No.: 268 - 270
DOI: 10.17762/ijritcc2321-8169.150154    


55. Analysis of Critical Success Factors In Application of “DRYWALL” Technique in Construction Industry  

Authors: Pranoti Chandrakant Jagtap, Abhijit N. Bhirud, Miss. Ingale Nilam Nandkumar

Page No.: 271- 275
DOI: 10.17762/ijritcc2321-8169.150155    


57. Website Content Analyzer SEO Tool  

Authors: Khushboo Sonawane, Bhagyshree Wagh, Meenakshi Shelar, Neha Yeole

Page No.: 280 - 283
DOI: 10.17762/ijritcc2321-8169.150157    


58. Grid Layout - A Fluid Web Framer  

Authors: Gaurav Vaswani, Priyanka Punjabi, Ajay Chotrani

Page No.: 284 - 287
DOI: 10.17762/ijritcc2321-8169.150158    


59. Matlab Simulations of Ad Hoc Sensors Network Algorithms  

Authors: Dr. Amir J. Majid

Page No.: 288 - 293
DOI: 10.17762/ijritcc2321-8169.150159    


61. Grammar Generation and Optimization from Multiple Inputs  

Authors: Pankaj B. Devre, Prof. Madhuri A. Bhalekar, Dr. Madan U. Kharat

Page No.: 298 - 302
DOI: 10.17762/ijritcc2321-8169.150161    


62. Enhanced AODV Routing Protocol Using Leader Election Algorithm  

Authors: Mr. Hemant D. Sonawane, Dr. L. K. Vishwamitra

Page No.: 303 - 308
DOI: 10.17762/ijritcc2321-8169.150162    


63. Design of Antenna System to harvest RF Energy for Generating Electricity  

Authors: Arghya Sahoo, M. Neelaveni Ammal

Page No.: 309 - 312
DOI: 10.17762/ijritcc2321-8169.150163    


64. A Review of Palm Oil Biodiesel under Long-Term Storage Conditions  

Authors: Krutika V Prajapati Patel, Mehulkumar Nandlal

Page No.: 313 - 317
DOI: 10.17762/ijritcc2321-8169.150164    


65. P300 Brain Computer Interface Control after an Acquired Brain Injury  

Authors: Jean Daly, Elaine Armstrong, Eileen Thomson, Andreas Pinegger, Gernot Müller-Putz, Suzanne Martin

Page No.: 318 - 325
DOI: 10.17762/ijritcc2321-8169.150165    


66. Access of Encrypted Personal Record in Cloud  

Authors: Miss. Shwetambari G.Pundkar, Dr. G. R. Bamnote

Page No.: 326 - 329
DOI: 10.17762/ijritcc2321-8169.150166    


67. Survey: Detection Of Crop Diseases Using Multiscaling Technique  

Authors: Mr. Mahesh Shivaji Dange, Mrs. S.M. Handore

Page No.: 330 - 332
DOI: 10.17762/ijritcc2321-8169.150167    


68. Energy Efficient System for Wireless Sensor Networks using Modified RECHS Protocol  

Authors: Mr. Nikhil Vilasrao Deshmukh, Mr. Y. M. Patil

Page No.: 333 - 337
DOI: 10.17762/ijritcc2321-8169.150168    


69. A New Approach to Supplier Selection Problem: An Introduction of AHP-SCOR Integrated Model  

Authors: Raja Nazim, Saadiah Yahya, Muhammad Rozi Malim

Page No.: 338 - 346
DOI: 10.17762/ijritcc2321-8169.150169    


70. Access to Encrypted Data in Cloud Database  

Authors: Sakshi Sanjay Deshmukh, Dr.G.R.Bamnote

Page No.: 347 - 350
DOI: 10.17762/ijritcc2321-8169.150170    


71. Arabic Documents classification method a Step towards Efficient Documents Summarization  

Authors: Hesham Ahmed Hassan, Mohamed Yehia Dahab, Khaled Bahnassy, Amira M. Idrees, Fatma Gamal

Page No.: 351 - 359
DOI: 10.17762/ijritcc2321-8169.150171    


72. Image Quality Measures for Gender Classification  

Authors: Anusree Bhaskar, Aneesh R.P.

Page No.: 360 - 364
DOI: 10.17762/ijritcc2321-8169.150172    


73. Detection and Localization of Wireless Jammer using XBee module  

Authors: Swati Shripati Kadam, Y. M. Patil

Page No.: 365 - 367
DOI: 10.17762/ijritcc2321-8169.150173    


74. Effect of Erroneous In Ergonomics and Its Remedies to Workers in Industries-A Literature Survey  

Authors: C.Vijayakumar, T.Vignesha, A.Murugesan, N.Bavana

Page No.: 368 - 377
DOI: 10.17762/ijritcc2321-8169.150174    


75. Advanced Partial Palmprint Matching Based on Repeated Adjoining Minutiae  

Authors: Gayathri.R.Nayar, Aneesh R.P.

Page No.: 378 - 381
DOI: 10.17762/ijritcc2321-8169.150175    


77. Personal Authentication Using Finger Images  

Authors: Renuka Mahesh Jadhav, Prof. Dr. D. S. Bormane

Page No.: 389 - 393
DOI: 10.17762/ijritcc2321-8169.150177    


78. Advanced Artery / Vein Classification System in Retinal Images for Diabetic Retinopathy  

Authors: Leshmi Satheesh, Priyanka Prabhakar, Aneesh R P

Page No.: 394 - 400
DOI: 10.17762/ijritcc2321-8169.150178    


79. Automation of Universal Testing machine using Human Machine Interface (HMI)  

Authors: Mr. Abhijeet Patil, Dr. Mrs. S. B. Patil,

Page No.: 401 - 403
DOI: 10.17762/ijritcc2321-8169.150179    


81. Document Clustering with Map Reduce using Hadoop Framework  

Authors: M. Satish, M. Ramakrishna Murty

Page No.: 409 - 413
DOI: 10.17762/ijritcc2321-8169.150181    


82. Approach to access the Remote device in same network using Virtual Network Computing: An Accessibility Endeavor  

Authors: Shiv Kumar Goel, Nikita Haryani, Abhishek Jain, Pramod Tiwari, Prasad Kuvalekarani

Page No.: 414 - 418
DOI: 10.17762/ijritcc2321-8169.150182    


83. Extreme Learning Machine for Microarray Cancer Classification  

Authors: M Yasodha, M. Selva Boopathi

Page No.: 419 - 422
DOI: 10.17762/ijritcc2321-8169.150183    


84. Bit Error Rate (BER) Analysis of Conventional OFDM (DFT - OFDM) And Wavelet Based OFDM (DWT – OFDM)  

Authors: Pragate Tomar, Mitra Sharma, Bhawani Shankar Chaudhary

Page No.: 423 - 426
DOI: 10.17762/ijritcc2321-8169.150184