Volume 3 Issues - (January 15 Volume 3 Issue 1)

1. Ascertaining Chronological Change Patterns in the Presence of Multiple Taxonomies  

Authors: Poul Geeta Venkatrao, Prof. P. D. Lambhate

Page No.: 01 – 04
DOI: 10.17762/ijritcc2321-8169.150101    

 

2. Decentralized Anonymous User Authentication For Securing Data Storage in Cloud  

Authors: Shital S. Pagar, Snehal M. Baviskar, Vandana N. Chalwadi, Prof. Kavita S. Kumavat

Page No.: 05 - 10
DOI: 10.17762/ijritcc2321-8169.150102    

 

5. Review on AMES-Cloud Using Preservation, Fetching and Decisive Video Streaming Over Cloud Computing  

Authors: Miss. Payal Krishnarao Hedau, Prof. Manoj S. Chaudhari

Page No.: 18 - 21
DOI: 10.17762/ijritcc2321-8169.150105    

 

6. Faster Image Zooming using Cubic Spline Interpolation Method  

Authors: Shabana Parveen, Ms. Rajbala Tokas

Page No.: 22 - 26
DOI: 10.17762/ijritcc2321-8169.150106    

 

7. Development and Analysis of Different Density Auxetic Cellular Structures  

Authors: M. Usman Aslam, Saied M. Darwish

Page No.: 27 - 32
DOI: 10.17762/ijritcc2321-8169.150107    

 

8. Micro Strip Patch Antenna Using Broadside Coupling  

Authors: Mr. Bhavik K. Patel, Dr. Yagnesh B. Shukla, Mr. Sameep P. Dave

Page No.: 33 - 35
DOI: 10.17762/ijritcc2321-8169.150108    

 

9. Modified Hough Transform for Road Lane Colorization to Prevent Accidents  

Authors: Guramarjot Kaur, Prof. Jatinder Kumar

Page No.: 36 - 40
DOI: 10.17762/ijritcc2321-8169.150109    

 

10. Improved Color Image Segmentation Using Fuzzy Weighting And Edge Preservation  

Authors: Navjot Kaur, Prof. Jatinder Kumar

Page No.: 41 - 45
DOI: 10.17762/ijritcc2321-8169.150110    

 

11. Overview of Auditing Cloud Consistency  

Authors: Hemant T. Aher, Poonam D. Shirode, Kundan L. Shinde, Arti A. Jadhav

Page No.: 46 - 51
DOI: 10.17762/ijritcc2321-8169.150111    

 

12. Web Based Image search Using Semantic Signature Re-ranking Technique  

Authors: Aakib F. Bagwan, Bharti A. Gupta , Bhagyashri M. Dhole, Prof. Ashvini Y. Bhamare

Page No.: 52 - 56
DOI: 10.17762/ijritcc2321-8169.150112    

 

13. Study of Detached (Fresh) Leaf and Dried Leaf with Image Processing  

Authors: Parmar D. K., Dabhi B. K., Patel K. P., Raj M. P.

Page No.: 57 - 61
DOI: 10.17762/ijritcc2321-8169.150113    

 

14. Overview of GINIX and Top-k Method  

Authors: Nikhil B. Kedare, Harshada P. Wagh, Sayali D. Pingle, Nayana P. Khode, Prof. Kavita S. Kumavat

Page No.: 62 - 66
DOI: 10.17762/ijritcc2321-8169.150114    

 

15. GUI Testing On Android Application  

Authors: Neha J. Jagadale, Aditi G. Pagar, Mayuri.S.Deore, Priti V. Raut, Prof. Kavita S. Kumavat

Page No.: 67 - 71
DOI: 10.17762/ijritcc2321-8169.150115    

 

16. A Review on Automatic Color Form Dropout for Document Processing  

Authors: Mr. Ankush D.Kadu, Dr. P.R.Deshmukh

Page No.: 72 - 75
DOI: 10.17762/ijritcc2321-8169.150116    

 

18. Health Infomatics Using Multy-Keyword Rank Search Over Cloud  

Authors: Shubham A. Ahire, Gaurav A. Dere, Mayur D. Mekha, Amit S.Wagh

Page No.: 82 - 85
DOI: 10.17762/ijritcc2321-8169.150118    

 

19. Anomaly Extraction Using Histogram-Based Detector  

Authors: Mayur Devidas Khairnar, Sandesh Ramesh Shinde, Swapnil Bajirao Suryawanshi, Girish Sunil Patil, Prof. Kavita S. Kumavat

Page No.: 86 - 90
DOI: 10.17762/ijritcc2321-8169.150119    

 

21. Advanced of Mathematics-Statistics Methods to Radar Calibration for Rainfall Estimation; A Review  

Authors: Ali Nikahd, Mazlan Hashim, Ali A. Mirzaie,, Zabi allah Nikahd GHosiraie

Page No.: 96 - 105
DOI: 10.17762/ijritcc2321-8169.150121    

 

22. MARKOV CHAIN MONTE CARLO SOLUTION OF POISSON’S EQUATION  

Authors: Matthew N. O. Sadiku, Raymond. C. Garcia, Sarhan M. Musa, Sudarshan R. Nelatury

Page No.: 106 - 112
DOI: 10.17762/ijritcc2321-8169.150122    

 

23. A Survey on Spectral Handoff Mechanisms for the Cognitive Radio Network  

Authors: Mr. Vinay S. Prabhavalkar, Dr. Vijay R. Ghorpade

Page No.: 113 - 116
DOI: 10.17762/ijritcc2321-8169.150123    

 

24. Maintain the Consistency of Auditing Cloud  

Authors: Amol D Vispute, Umesh M Nawale, Vikram S Wagh, Amol B Sonawane, Prof. Kavita S. Kumavat

Page No.: 117 - 122
DOI: 10.17762/ijritcc2321-8169.150124    

 

25. Crime Monitoring and Controlling System by Mobile Device  

Authors: Swapnali Rayate, Rohini Bhamare, Kaustubh Barhate, Mahendra Sonawane

Page No.: 123 - 126
DOI: 10.17762/ijritcc2321-8169.150125    

 

26. Evaluation of Green Building with Resources and Cost Aspects  

Authors: Nangare Priyanka Pandharinath, Pund Gaurav Chandrakant.,Warudkar A.A.

Page No.: 127 - 130
DOI: 10.17762/ijritcc2321-8169.150126    

 

27. Real-time capabilities in the standard Linux Kernel: How to enable and use them?  

Authors: Luc Perneel, Fei Guan, Long Peng, Hasan Fayyad-Kazan, Martin Timmerman

Page No.: 131 - 135
DOI: 10.17762/ijritcc2321-8169.150127    

 

28. Auto-Summarization of Email Document Using Statistical Approach  

Authors: Swati Thakare, Shital Kunzarkar, Sonal Chaudhari, Pranali Bhadane

Page No.: 136 - 139
DOI: 10.17762/ijritcc2321-8169.150128    

 

29. A Comparative Study on Apiculture Technology among Trained and Untrained Women  

Authors: Anuradha Ranjan Kumari, Sarita Sanwal, Serene Shekhar

Page No.: 140 - 143
DOI: 10.17762/ijritcc2321-8169.150129    

 

30. A Run-time Detection System for Malicious URLs in Twitter  

Authors: Harshad D. Nannaware, Tushar P. Dhangar, Aniket S. Dhanrao, Prof. V. D. Badgujar.

Page No.: 144 - 147
DOI: 10.17762/ijritcc2321-8169.150130    

 

31. Detecting Phishing Web Pages using NB classifier and EMD Approach  

Authors: Pranali P. Akare, Heena. Mohm. H. Maniyar, Tejendra D. Thorat, Jagruti k. Pagar

Page No.: 148 - 151
DOI: 10.17762/ijritcc2321-8169.150131    

 

33. A Novel Method for Graphical Password Mechanism  

Authors: Siddharth R. Dharane, Pradip N. Kakade, Sapna P. Gaikwad, Pooja K. Dokhale, Prof. Ashvini Y. Bhamare

Page No.: 156 - 161
DOI: 10.17762/ijritcc2321-8169.150133    

 

35. TAMC: Traffic Analysis Measurement and Classification Using Hadoop MapReduce  

Authors: Mr. Yogesh Vasant Kadam, Prof. Mrs. Vina Lomte

Page No.: 165 - 168
DOI: 10.17762/ijritcc2321-8169.150135    

 

37. Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device  

Authors: Atul R. Ghumare, Nivedita D. Patil, Chetan D. Holkar, Vivek D. Badgujar

Page No.: 175 - 180
DOI: 10.17762/ijritcc2321-8169.150137    

 

39. Overview of Cloud Computing Storage System  

Authors: Vrushali Arun Patil, Sayali Dilip Jejurkar, Sushmita Sonyabapu Gadekar

Page No.: 184 - 189
DOI: 10.17762/ijritcc2321-8169.150139    

 

40. SURVEY PAPER BASED ON DIABETIC RETINOPATHY  

Authors: Arun G, N Sasirekha

Page No.: 190 - 192
DOI: 10.17762/ijritcc2321-8169.150140    

 

42. Information Searching Using Web Data Extraction for Acquiring Enrich MM Results  

Authors: Firoz I. Kadri, Kaushal A. Kapse, Nitin V. Landge, Hemant B. Shirsath, Prof. V. D. Badgujar

Page No.: 203 - 208
DOI: 10.17762/ijritcc2321-8169.150142    

 

43. A study of Email date attacks in Network Security  

Authors: Mr. Kamlesh Lahre, Rohit Kumar Miri, Suraj Prasad keshri ,

Page No.: 209 - 211
DOI: 10.17762/ijritcc2321-8169.150143    

 

44. Data Sharing Securely for Administrators of Dynamic Groups in Cloud  

Authors: Nirali H. Patel, Sajiya S. Patel, Pooja C. Ighe, Prof. Madhuri B. Patil

Page No.: 212 - 216
DOI: 10.17762/ijritcc2321-8169.150144    

 

46. Novel Approach for User-Friendly Home Automation System on One Touch  

Authors: Miss. Juily Mataghare, Miss. Pallavi Salvi, Mr. Vrushali Watpade

Page No.: 222 - 225
DOI: 10.17762/ijritcc2321-8169.150146    

 

48. Flow Secure Message in Parity Matrix  

Authors: P. Ramya, P. Sandhya, R. Varun

Page No.: 238 - 240
DOI: 10.17762/ijritcc2321-8169.150148    

 

50. The future Clean Energy Harvesting by Wind Power Generation  

Authors: Prashant Meshram, Ritesh Ujawane, Priya Gaikwad, Prakash Yemde

Page No.: 248 - 252
DOI: 10.17762/ijritcc2321-8169.150150    

 

51. BSNL: Obstacles for Its Development & Its Solution  

Authors: Dr. Sreeekumar D Menon

Page No.: 253 - 258
DOI: 10.17762/ijritcc2321-8169.150151    

 

52. Power Theft Identification Using Smart Grid Technology  

Authors: Parvin Shikalgar, Prasad Yadav, Hemant Pawar

Page No.: 259 - 263
DOI: 10.17762/ijritcc2321-8169.150152    

 

53. HDL Design for Exa Hertz Clock Based 2e10-1 Exa Bits Per Second (Ebps) PRBS IP Core Generator for Ultra High Speed Wireless Communication Products  

Authors: Prof. P. N. V. M Sastry, Prof. G. Krishnaiah, Prof. Dr. D. N. Rao, Dr. S. Vathsal

Page No.: 264 - 267
DOI: 10.17762/ijritcc2321-8169.150153    

 

54. Communication in Cloud-of-Clouds Environment for Brokers  

Authors: Nitesh Khandare, Dinesh Yadav

Page No.: 268 - 270
DOI: 10.17762/ijritcc2321-8169.150154    

 

55. Analysis of Critical Success Factors In Application of “DRYWALL” Technique in Construction Industry  

Authors: Pranoti Chandrakant Jagtap, Abhijit N. Bhirud, Miss. Ingale Nilam Nandkumar

Page No.: 271- 275
DOI: 10.17762/ijritcc2321-8169.150155    

 

57. Website Content Analyzer SEO Tool  

Authors: Khushboo Sonawane, Bhagyshree Wagh, Meenakshi Shelar, Neha Yeole

Page No.: 280 - 283
DOI: 10.17762/ijritcc2321-8169.150157    

 

58. Grid Layout - A Fluid Web Framer  

Authors: Gaurav Vaswani, Priyanka Punjabi, Ajay Chotrani

Page No.: 284 - 287
DOI: 10.17762/ijritcc2321-8169.150158    

 

59. Matlab Simulations of Ad Hoc Sensors Network Algorithms  

Authors: Dr. Amir J. Majid

Page No.: 288 - 293
DOI: 10.17762/ijritcc2321-8169.150159    

 

61. Grammar Generation and Optimization from Multiple Inputs  

Authors: Pankaj B. Devre, Prof. Madhuri A. Bhalekar, Dr. Madan U. Kharat

Page No.: 298 - 302
DOI: 10.17762/ijritcc2321-8169.150161    

 

62. Enhanced AODV Routing Protocol Using Leader Election Algorithm  

Authors: Mr. Hemant D. Sonawane, Dr. L. K. Vishwamitra

Page No.: 303 - 308
DOI: 10.17762/ijritcc2321-8169.150162    

 

63. Design of Antenna System to harvest RF Energy for Generating Electricity  

Authors: Arghya Sahoo, M. Neelaveni Ammal

Page No.: 309 - 312
DOI: 10.17762/ijritcc2321-8169.150163    

 

64. A Review of Palm Oil Biodiesel under Long-Term Storage Conditions  

Authors: Krutika V Prajapati Patel, Mehulkumar Nandlal

Page No.: 313 - 317
DOI: 10.17762/ijritcc2321-8169.150164    

 

65. P300 Brain Computer Interface Control after an Acquired Brain Injury  

Authors: Jean Daly, Elaine Armstrong, Eileen Thomson, Andreas Pinegger, Gernot Müller-Putz, Suzanne Martin

Page No.: 318 - 325
DOI: 10.17762/ijritcc2321-8169.150165    

 

66. Access of Encrypted Personal Record in Cloud  

Authors: Miss. Shwetambari G.Pundkar, Dr. G. R. Bamnote

Page No.: 326 - 329
DOI: 10.17762/ijritcc2321-8169.150166    

 

67. Survey: Detection Of Crop Diseases Using Multiscaling Technique  

Authors: Mr. Mahesh Shivaji Dange, Mrs. S.M. Handore

Page No.: 330 - 332
DOI: 10.17762/ijritcc2321-8169.150167    

 

68. Energy Efficient System for Wireless Sensor Networks using Modified RECHS Protocol  

Authors: Mr. Nikhil Vilasrao Deshmukh, Mr. Y. M. Patil

Page No.: 333 - 337
DOI: 10.17762/ijritcc2321-8169.150168    

 

69. A New Approach to Supplier Selection Problem: An Introduction of AHP-SCOR Integrated Model  

Authors: Raja Nazim, Saadiah Yahya, Muhammad Rozi Malim

Page No.: 338 - 346
DOI: 10.17762/ijritcc2321-8169.150169    

 

70. Access to Encrypted Data in Cloud Database  

Authors: Sakshi Sanjay Deshmukh, Dr.G.R.Bamnote

Page No.: 347 - 350
DOI: 10.17762/ijritcc2321-8169.150170    

 

71. Arabic Documents classification method a Step towards Efficient Documents Summarization  

Authors: Hesham Ahmed Hassan, Mohamed Yehia Dahab, Khaled Bahnassy, Amira M. Idrees, Fatma Gamal

Page No.: 351 - 359
DOI: 10.17762/ijritcc2321-8169.150171    

 

72. Image Quality Measures for Gender Classification  

Authors: Anusree Bhaskar, Aneesh R.P.

Page No.: 360 - 364
DOI: 10.17762/ijritcc2321-8169.150172    

 

73. Detection and Localization of Wireless Jammer using XBee module  

Authors: Swati Shripati Kadam, Y. M. Patil

Page No.: 365 - 367
DOI: 10.17762/ijritcc2321-8169.150173    

 

74. Effect of Erroneous In Ergonomics and Its Remedies to Workers in Industries-A Literature Survey  

Authors: C.Vijayakumar, T.Vignesha, A.Murugesan, N.Bavana

Page No.: 368 - 377
DOI: 10.17762/ijritcc2321-8169.150174    

 

75. Advanced Partial Palmprint Matching Based on Repeated Adjoining Minutiae  

Authors: Gayathri.R.Nayar, Aneesh R.P.

Page No.: 378 - 381
DOI: 10.17762/ijritcc2321-8169.150175    

 

77. Personal Authentication Using Finger Images  

Authors: Renuka Mahesh Jadhav, Prof. Dr. D. S. Bormane

Page No.: 389 - 393
DOI: 10.17762/ijritcc2321-8169.150177    

 

78. Advanced Artery / Vein Classification System in Retinal Images for Diabetic Retinopathy  

Authors: Leshmi Satheesh, Priyanka Prabhakar, Aneesh R P

Page No.: 394 - 400
DOI: 10.17762/ijritcc2321-8169.150178    

 

79. Automation of Universal Testing machine using Human Machine Interface (HMI)  

Authors: Mr. Abhijeet Patil, Dr. Mrs. S. B. Patil,

Page No.: 401 - 403
DOI: 10.17762/ijritcc2321-8169.150179    

 

81. Document Clustering with Map Reduce using Hadoop Framework  

Authors: M. Satish, M. Ramakrishna Murty

Page No.: 409 - 413
DOI: 10.17762/ijritcc2321-8169.150181    

 

82. Approach to access the Remote device in same network using Virtual Network Computing: An Accessibility Endeavor  

Authors: Shiv Kumar Goel, Nikita Haryani, Abhishek Jain, Pramod Tiwari, Prasad Kuvalekarani

Page No.: 414 - 418
DOI: 10.17762/ijritcc2321-8169.150182    

 

83. Extreme Learning Machine for Microarray Cancer Classification  

Authors: M Yasodha, M. Selva Boopathi

Page No.: 419 - 422
DOI: 10.17762/ijritcc2321-8169.150183    

 

84. Bit Error Rate (BER) Analysis of Conventional OFDM (DFT - OFDM) And Wavelet Based OFDM (DWT – OFDM)  

Authors: Pragate Tomar, Mitra Sharma, Bhawani Shankar Chaudhary

Page No.: 423 - 426
DOI: 10.17762/ijritcc2321-8169.150184