Volume 3 Issues - (June 15 Volume 3 Issue 6)

1. Secure Communication with DNS through Cloud  

Authors: Akash Bajaj, Srujana, Vibha.V, Sinchana P.Shetty, Mohanesh B.M

Page No.: 3481 - 3486
DOI: 10.17762/ijritcc2321-8169.150601    


2. Implementation of Power Clock Generation Method for Pass-Transistor Adiabatic Logic 4:1 MUX  

Authors: Prafull Shripal Kumbhar, Amruta P. Auradkar, Prof. Mrs. Anita. P. Patil

Page No.: 3487 - 3492
DOI: 10.17762/ijritcc2321-8169.150602    


3. A Novel Identity Based Blind Signature Scheme using DLP for E-Commerce  

Authors: Girish, Krupa K T, Dr.Phannedra.H.D

Page No.: 3493 - 3497
DOI: 10.17762/ijritcc2321-8169.150603    


5. Email Security: The Challenges of Network Security  

Authors: Ms.Priyanka S. Kamthe, Ms.Sonal P. Nalawade

Page No.: 3505 - 3509
DOI: 10.17762/ijritcc2321-8169.150605    


7. Image Stitching Using Speeded Up Robust Features  

Authors: Mr. Venugopala Gowda D, Mrs..Padmajadevi G

Page No.: 3514 - 3519
DOI: 10.17762/ijritcc2321-8169.150607    


8. Secure IR Communication Design For Pre-Cardiac Arrest Detection In Wireless Body Area Network  

Authors: M. V. Karthikeyan, J. Martin Leo Manickam

Page No.: 3520 - 3525
DOI: 10.17762/ijritcc2321-8169.150608    


9. Automatic Vehicle Accident Detection and Traffic Control System  

Authors: Sachin M S, Prasanna P

Page No.: 3526 - 3531
DOI: 10.17762/ijritcc2321-8169.150609    


10. Low Power EMC Optimized Wireless Sensor Network for Air Pollution Monitoring System  

Authors: Roopa Shree. J, C. R. Raghunath, Ravikumar D

Page No.: 3532 - 3537
DOI: 10.17762/ijritcc2321-8169.150610    


11. A Better Approach in Secure Replication of Documents for Cloud Storage  

Authors: Pawar Pruthviraj R., Prof. P.A.Jadhav

Page No.: 3538 - 3539
DOI: 10.17762/ijritcc2321-8169.150611    


12. Vehicle Security System Based on GSM Technology  

Authors: Mr. Amey Anil Ghodgekar, Ms. Minaldevi Tank

Page No.: 3540 - 3542
DOI: 10.17762/ijritcc2321-8169.150612    


13. Performance Analysis of Induction Motor For Sudden Load Disturbance Using PI And FUZZY Controller  

Authors: Ritu Gopal, Dr. Dharmendra Kumar Singh, Mr. Amit Agrawal

Page No.: 3543 - 3546
DOI: 10.17762/ijritcc2321-8169.150613    


14. Performance Analysis of Induction Motor Using PI And FUZZY Controller  

Authors: Ritu Gopal, Dr. Dharmendra Kumar Singh, Mr. Amit Agrawal

Page No.: 3547 - 3552
DOI: 10.17762/ijritcc2321-8169.150614    


15. Comprehensive Study Effort in Cloud Computing : Fog Computing Approach  

Authors: Azhar L. Inamdar, Prof.Pramod Jadhav

Page No.: 3553 - 3555
DOI: 10.17762/ijritcc2321-8169.150615    


16. Clustering based Feature Selection from High Dimensional Data  

Authors: Harshali D. Gangurde, Prof. K. V. Metre

Page No.: 3556 - 3560
DOI: 10.17762/ijritcc2321-8169.150616    


17. When LED bulbs Becomes a Medium of Communication: Li-Fi Technology  

Authors: Rathod Nalisha Girish Nalini, Singh Priyanka Arvind Veena

Page No.: 3561 - 3565
DOI: 10.17762/ijritcc2321-8169.150617    


19. Analysis of ACL in ASA and Enhancing ASA in Firewall  

Authors: Kumar Shiv, Bhardwaj Ekta, Poonam

Page No.: 3571 - 3574
DOI: 10.17762/ijritcc2321-8169.150619    


23. Secure Image Transmission with Secret Fragment Visible Mosaic Images  

Authors: Miss. Nayan A. Ardak, Prof. Nitin A. Shelke,

Page No.: 3595 - 3598
DOI: 10.17762/ijritcc2321-8169.150623    


24. Speech Recognition Writing Robotic Arm  

Authors: S. M. Gaikwad, K. S. Jadhav

Page No.: 3599 - 3603
DOI: 10.17762/ijritcc2321-8169.150624    


25. Achieve High Verifiability using Proxy Resignature and TPA in User Revocation within the Cloud  

Authors: Ms. Megha D. Bochare, Prof. L. J. Sankpal

Page No.: 3604 - 3607
DOI: 10.17762/ijritcc2321-8169.150625    


26. A Web-Based Knowledge Management System  

Authors: Miss. Kalyani U. Sapre Prof. S.W.Ahmad

Page No.: 3608 - 3613
DOI: 10.17762/ijritcc2321-8169.150626    


27. DDoS Attack Detection Using Cooperative Overlay Networks and Gossip Protocol  

Authors: Shreya Bhattacharya, Sabah H Qazi, Surekha J S, Shruthi J G , Sanjeetha R

Page No.: 3614 - 3617
DOI: 10.17762/ijritcc2321-8169.150627    


28. Addressing Security issues for Enterprises Migrating to HYBRID Cloud Computing Model  

Authors: Sanjay, Shabnam Sangwan, Sachin, Sunita Sangwan

Page No.: 3618 - 3622
DOI: 10.17762/ijritcc2321-8169.150628    


30. Improving Hierarchy LEVEL Access Performance Using Recursion Function  

Authors: Kuber Vikram Singh, Inderjeet Yadav

Page No.: 3627 - 3632
DOI: 10.17762/ijritcc2321-8169.150630    


31. Autonomous Navigation of Flying Quadcopter  

Authors: Moulesh Kumar, Nitish Kumar, Dr. T. H. Sreenivas

Page No.: 3633 - 3634
DOI: 10.17762/ijritcc2321-8169.150631    


32. Minimize the Vampire Attack using WSN on Routing Protocol  

Authors: Trupti Borgamwar, Kanchan Dhote

Page No.: 3635 - 3638
DOI: 10.17762/ijritcc2321-8169.150632    


33. Improvisation of Incremental Computing in Hadoop Architecture with File Caching  

Authors: Mr.Alhad V. Alsi, Prof. A P.Bodkhe

Page No.: 3639 - 3642
DOI: 10.17762/ijritcc2321-8169.150633    


34. Design and Development of Application to Transport Layer Protocol for Smart Collaboration of Intelligent Devices  

Authors: Smt. K.S. Rekha, Avinash Kumar, G Sai Rohith, Gautam Baghel, Gopal Kumar Roy

Page No.: 3643 - 3646
DOI: 10.17762/ijritcc2321-8169.150634    


35. Site Suitability Analysis for Urban Development: A Review  

Authors: Santanu Kumar Misra, Shrijana Sharma

Page No.: 3647 - 3651
DOI: 10.17762/ijritcc2321-8169.150635    


36. Path Following Mobile Robot using Passive RFID Tags in Indoor Environment  

Authors: Suvankar Barai, Buddhadeb Sau

Page No.: 3652 - 3655
DOI: 10.17762/ijritcc2321-8169.150636    


38. An Efficient Technique for mining Association rules using Enhanced Apriori Algorithm  

Authors: Mr. Gaurav P. Wankhade, Prof. Ms. V. M. Deshmukh

Page No.: 3663 - 3666
DOI: 10.17762/ijritcc2321-8169.150638    


40. An Approach to Develop Security Aspect of MANET using NS2 Field  

Authors: Sachin, Shabnam Sangwan, Sonu Rani, Sanjay Kumar

Page No.: 3672 - 3675
DOI: 10.17762/ijritcc2321-8169.150640    


42. Detection of Bacterial Blight on Pomegranate Leaf  

Authors: Ms. Manisha A. Bhange, Prof. H. A. Hingoliwala

Page No.: 3682 - 3685
DOI: 10.17762/ijritcc2321-8169.150642    


44. PC Controlled Rain Simulation  

Authors: Smitha B V, Prof. C. R. Raghunath

Page No.: 3690 - 3694
DOI: 10.17762/ijritcc2321-8169.150644    


45. Login History and CaRP for User Authentication  

Authors: Reshma J Chavan, Prof. M. D. Ingle.

Page No.: 3695 - 3698
DOI: 10.17762/ijritcc2321-8169.150645    


46. Aquatic Robot Design for Water Pollutants Monitoring  

Authors: Anuradha A. Maindalkar, Saniya M. Ansari

Page No.: 3699 - 3703
DOI: 10.17762/ijritcc2321-8169.150646    


48. Marathi Speech Synthesis: A Review  

Authors: Sangramsing Kayte, Kavita Waghmare, Dr. Bharti Gawali

Page No.: 3708 - 3711
DOI: 10.17762/ijritcc2321-8169.150648    


49. Smart Feedback Mechanism  

Authors: Gangaprasad Shankar Gone, Manishkumar Nera, Indira Bhattachariya

Page No.: 3712 - 3715
DOI: 10.17762/ijritcc2321-8169.150649    


50. A Novel Time Frequency Approach of Content Revival Based Medical Image Compression  

Authors: Mr. Dipak V Ahire, Prof. Prakash V. Baviskar

Page No.: 3716 - 3718
DOI: 10.17762/ijritcc2321-8169.150650    


51. Implementation of Vision Based Robot Navigation System in Dynamic Environment  

Authors: Rahul R. Sharma, Dr. Prashant V. Ingole

Page No.: 3719 - 3724
DOI: 10.17762/ijritcc2321-8169.150651    


52. Analysis and Design of Intelligent Logistics System Based on Internet of Things  

Authors: Yang Lv-qing, He Xiao-li, Zhou Sheng

Page No.: 3725 - 3731
DOI: 10.17762/ijritcc2321-8169.150652    


53. A Framework for Protecting Cloud Users from Third Party Auditors  

Authors: Saif Khalid Musluh, Mr. T. Ramdas Naik

Page No.: 3732 - 3736
DOI: 10.17762/ijritcc2321-8169.150653    


54. Enhancing the Computer Network Security in Data Centre Networks using QoS Metrics  

Authors: Ohaneme, L.C., Ibiejugba, M.A, Adejo, B.O.

Page No.: 3737 - 3745
DOI: 10.17762/ijritcc2321-8169.150654    


55. Robust Aggregation Mechanism in WSN for Mitigating Attacks  

Authors: Jaber Ibrahim Naser, Mr. T. Ramdas Naik

Page No.: 3746 - 3749
DOI: 10.17762/ijritcc2321-8169.150655    


56. Group Based Secure Sharing of Cloud Data with Provable Data Freshness  

Authors: Hussein Ali Ghadhban Salman, T. Ramdas Naik

Page No.: 3750 - 3754
DOI: 10.17762/ijritcc2321-8169.150656    


62. Fusion of Text and Image in Multimedia Information Retrieval System  

Authors: Trupti S. Atre, Prof. K. V. Metre

Page No.: 3788 - 3792
DOI: 10.17762/ijritcc2321-8169.150662    


63. Binarization Technique on Historical Documents using Edge Width Detection  

Authors: Vrushali S. Nikam., Prashant M. Yawalkar.

Page No.: 3793 - 3798
DOI: 10.17762/ijritcc2321-8169.150663    


65. Dynamic Load Balancing protocols in WSN  

Authors: Ikjot Singh, Amardeep Kaur

Page No.: 3804 - 3808
DOI: 10.17762/ijritcc2321-8169.150665    


66. Top-Down Integration Methodology for Clocking Blocks into High Speed Serial IO  

Authors: Nadeem Tehsildar, S. L. Gangadharaiah

Page No.: 3809 - 3812
DOI: 10.17762/ijritcc2321-8169.150666    


68. Study Of Wind Energy Conversion System Connected To Grid Using Doubly Fed Induction Generator  

Authors: Aman Upadhyay, Mr. Amit Agrawal, Dr. Dharmendra Kumar Singh

Page No.: 3817 - 3820
DOI: 10.17762/ijritcc2321-8169.150668    


69. Design of a Wireless Power Transfer System using Inductive Coupling and MATLAB programming  

Authors: Apoorva.P, Deeksha.K.S, Pavithra.N, Vijayalakshmi.M.N, Somashekar.B, David Livingston.D

Page No.: 3817 - 3825
DOI: 10.17762/ijritcc2321-8169.150669    


70. Nonparametric Regression with Trapezoidal Fuzzy Data  

Authors: T. Razzaghnia, S. Danesh

Page No.: 3826 - 3831
DOI: 10.17762/ijritcc2321-8169.150670    


71. Query Result Integrity in Multiple Storage Servers in Distributed Environment  

Authors: Sharayu Anap Dr. K. V. Metre

Page No.: 3832 - 3835
DOI: 10.17762/ijritcc2321-8169.150671    


72. Features Mapping Based Human Gait Recognition  

Authors: Prerna Arora, Rajni

Page No.: 3836 - 3843
DOI: 10.17762/ijritcc2321-8169.150672    


73. Graph Based Video Sequence Matching & BoF Method for Video Copy detection  

Authors: Kakade Avinash Hanumant, Prof. Mansi Bhonsle

Page No.: 3844 - 3848
DOI: 10.17762/ijritcc2321-8169.150673    


74. Performance Analysis of CMOS and FinFET based 16-Bit Barrel Shifter  

Authors: Bharti Midha, Manish Mehta

Page No.: 3849 - 3852
DOI: 10.17762/ijritcc2321-8169.150674    


75. Comparative analysis of different Current mirror using 45nm technology  

Authors: Jaspreet Kaur, Mr. Manish Mehta

Page No.: 3853 - 3857
DOI: 10.17762/ijritcc2321-8169.150675    


76. Query Recommender System Using Hierarchical Classification  

Authors: Shruti Y. Patil, Prof. Dinesh D. Patil

Page No.: 3858 - 3861
DOI: 10.17762/ijritcc2321-8169.150676    


79. Ant Colony Optimization for Network Aggregation in a Fully Connected Network  

Authors: Prof. Leena Raut, Mr. Rutwij Chaudhari

Page No.: 3873 - 3877
DOI: 10.17762/ijritcc2321-8169.150679    


81. Havoc awake & Notification System via Android app  

Authors: Mr. Amit S. Gosavi, Miss. S. S.Vishnu

Page No.: 3886 - 3893
DOI: 10.17762/ijritcc2321-8169.150681    


82. Exploiting and Ranking Dominating Product Features through Communal Sentiments  

Authors: Mr. S. P. Ghode, Prof. S. S. Bere

Page No.: 3894 - 3900
DOI: 10.17762/ijritcc2321-8169.150682    


83. Implementation of Volatile Secure Model in P2P System: A Detailed Analysis  

Authors: Mrs. Amina. N, Prof. Dhaigude T.A

Page No.: 3901 - 3903
DOI: 10.17762/ijritcc2321-8169.150683    


84. Temperature Compensated Ultrasonic Ranging and Location finder for Blind Person  

Authors: Poja P. Patil, Prof. R. G. Dabhade

Page No.: 3904 - 3907
DOI: 10.17762/ijritcc2321-8169.150684    


87. Design, Simulation and electromechanical Modeling of RF MEMS Capacitive Switches  

Authors: Ajitkumar Bachipale, Lakshmi.S

Page No.: 3919 - 3924
DOI: 10.17762/ijritcc2321-8169.150687    


88. Depth Estimation for 2D-to-3D Image Conversion Using Scene Feature  

Authors: Shweta Patil, Priya Charles

Page No.: 3925 - 3929
DOI: 10.17762/ijritcc2321-8169.150688    


89. High Pass Filter Analysis using DGS  

Authors: Surabhi Patankar, Devendra Kumar

Page No.: 3930 - 3933
DOI: 10.17762/ijritcc2321-8169.150689    


90. Enhancement of A Road Sign Board Using Wireless Sensors  

Authors: Vaishali Gatty, Mayuri Kadam, Bhagyashree Dighe

Page No.: 3938 - 3941
DOI: 10.17762/ijritcc2321-8169.150690    


91. Uncovering Trending Stories from Twitter by Extracting Ground Truth from Datasets  

Authors: Mr. Vishal Dilip Shinde, Prof. Tanaji A. Dhaigude

Page No.: 3942 - 3946
DOI: 10.17762/ijritcc2321-8169.150691    


93. Detection of Malware By Using Support Vector Machine  

Authors: Ms. Phalke Nutan Navnath, Prof. Amrit Priyadarshi

Page No.: 3951 - 3954
DOI: 10.17762/ijritcc2321-8169.150693    


94. A Implementation on Forecasting Behavioral outcomes through Crowdsourcing Mechanism  

Authors: Mane Kush Chandrakant, Bere Sachin Sukhadeo

Page No.: 3955 - 3959
DOI: 10.17762/ijritcc2321-8169.150694    


95. Personalized Web Recommender System based on Collaborative Filtering  

Authors: Mr.Mukesh Phadatare, Mr.Sachin More

Page No.: 3960 - 3961
DOI: 10.17762/ijritcc2321-8169.150695    


96. Green Computing: Save Power, Save Environment  

Authors: Sachin Kadam

Page No.: 3962 - 3963
DOI: 10.17762/ijritcc2321-8169.150696    


98. Steganography on Multi-media Elements  

Authors: Vipin Deoli, Vassudev Dhempo

Page No.: 3970 - 3975
DOI: 10.17762/ijritcc2321-8169.150698    


99. Design and Analysis of Plastic Fuel Tank for Three Wheeler CNG Passenger Vehicle  

Authors: H. V. Chavan, Prof. S. R. Gawade

Page No.: 3976 - 3981
DOI: 10.17762/ijritcc2321-8169.150699    


100. Oracle SuperCluster: Taking Oracle Clustered Engineering Systems to the Next Level  

Authors: Aaqib Kerawalla, Arvind Kanojiya

Page No.: 3982 - 3987
DOI: 10.17762/ijritcc2321-8169.1506100    


101. Approach to Provide Single View of Employee Data to Readily Use for Data Analysis  

Authors: Mona Deshmukh,Nikita Haryani, Dr. M. A. Pund

Page No.: 3988 - 3992
DOI: 10.17762/ijritcc2321-8169.1506101    


102. Online Interactive E-Learning Using Video Annotation  

Authors: Atul S. Choudhary, Prof. Balkrushna K.Patil

Page No.: 3993 - 3996
DOI: 10.17762/ijritcc2321-8169.1506102    


103. Outlier Detection using Hybrid Approach for Mixed datasets  

Authors: Anjali Barmade, Prof. Manjusha Deshmukh

Page No.: 3997 - 4002
DOI: 10.17762/ijritcc2321-8169.1506103    


105. Improve Performance of FAUB Error for Three Phase Power Distribution System  

Authors: Ashok Kumar Meena, Devendra Kumar Mittal

Page No.: 4007 - 4010
DOI: 10.17762/ijritcc2321-8169.1506105    


106. Late Semantic Fusion Approach for the Retrieval of Multimedia Data  

Authors: Shweta Satish Kadam, Usha Sunil Gound, Prof. Tanaji A.Dhaigude, Avinash Shivaji Gaikwad

Page No.: 4011 - 4014
DOI: 10.17762/ijritcc2321-8169.1506106    


108. In Pursuit of an Easy to Use Brain Computer Interface for Domestic Use in a Population with Brain Injury  

Authors: Jean Daly, Andreas Pinegger ,Elaine Armstrong, Eileen Thomson, Gernot Müller-Putz, Suzanne Martin

Page No.: 4019 - 4029
DOI: 10.17762/ijritcc2321-8169.1506108    


110. Software Project Life Cycle – Management (SPLICE-M)  

Authors: Mrs. Mona Deshmukh, Sampada Pramod Gawde

Page No.: 4033 - 4037
DOI: 10.17762/ijritcc2321-8169.1506110    


111. Degraded Document Image Binarization Using Segmentation Algorithm  

Authors: Ms. Rekha V. Chaudhari, Prof.Dinesh D. Patil

Page No.: 4038 - 4041
DOI: 10.17762/ijritcc2321-8169.1506111    


113. Identification of Features from User Opinions using Domain Relevance  

Authors: Mr. A. V. Moholkar, Prof. S. S. Bere

Page No.: 4047 - 4052
DOI: 10.17762/ijritcc2321-8169.1506113    


114. Detection of PUE- Attack in Cognitive Radio Networks  

Authors: Megha Chopra, Sonika Soni

Page No.: 4053 - 4059
DOI: 10.17762/ijritcc2321-8169.1506114    


115. Survey, Overview and Performance Evaluation Of Proactive, Reactive and Hybrid Routing Protocol  

Authors: Mrs. Dhanashree Tordammale, Tanvi Sangle, Javeria Shaikh, Shraddha Yadav, Aakash Shah

Page No.: 4060 - 4065
DOI: 10.17762/ijritcc2321-8169.1506115    


116. DCT SVD Based Hybrid Transform Coding for Image Compression  

Authors: Raghavendra.M.J, Dr.Prasantha .H.S, Dr.S.Sandya

Page No.: 4066 - 4071
DOI: 10.17762/ijritcc2321-8169.1506116    


117. Design & Analysis of Clamped Free MEMS Resonator  

Authors: Ms .Vijaya V .Gomase, Prof. Mr. Vipin S. Bhure

Page No.: 4072 - 4074
DOI: 10.17762/ijritcc2321-8169.1506117    


119. Authentication System Using Text and 3D Image Password  

Authors: B. B. Vikhe, Prof. Arpit Solanki

Page No.: 4081 - 4084
DOI: 10.17762/ijritcc2321-8169.1506119    


121. Two Level Security for Cloud Storage with Data Deduplication  

Authors: Pallavi N Marathe, Shivani Deosthale, Rashmi Chavan

Page No.: 4090 - 4093
DOI: 10.17762/ijritcc2321-8169.1506121    


122. A Brief Introduction of Resource Management Techniques in Cloud Computing Environment  

Authors: Miss. Pragya Tripathi, Prof. Manjusha Deshmukh.

Page No.: 4094 - 4099
DOI: 10.17762/ijritcc2321-8169.1506122    


123. Secure Dynamic Groups Auditing Service with Group Signature for Cloud Storage  

Authors: Komal Waykole, Shivani Deosthale, Smita Bansod

Page No.: 4100 - 4103
DOI: 10.17762/ijritcc2321-8169.1506123    


124. Recover Degraded Document images Using Binarization Technique  

Authors: Nimbalkar Amruta, A Prof.Amrit Priyadarshi

Page No.: 4104 - 4106
DOI: 10.17762/ijritcc2321-8169.1506124    


125. eNavigate: Effective and Efficient User Web Navigation  

Authors: Mr. Nitin B. Kasar, Prof. Amrit Priyadarshi

Page No.: 4107 - 4111
DOI: 10.17762/ijritcc2321-8169.1506125    


126. Enhanced Document Clustering using K-Means with Support Vector Machine (SVM) Approach  

Authors: Prachi K. Khairkar, Mrs. D. A. Phalke

Page No.: 4112 - 4116
DOI: 10.17762/ijritcc2321-8169.1506126    


127. Voice Based Navigation System For Blind People Using Ultrasonic Sensor  

Authors: Anushree Harsur, Chitra.M

Page No.: 4117 - 4122
DOI: 10.17762/ijritcc2321-8169.1506127    


128. Dynamic Load Balancing Algorithms For Cloud Computing  

Authors: Miss. Nikita Sunil Barve, Prof. Manjusha Deshmukh, Miss . Prgya Tripathi

Page No.: 4123 - 4129
DOI: 10.17762/ijritcc2321-8169.1506128    


129. Video Inpainting with Image Inpainting using Super Resolution.  

Authors: Ms. Manisha P Dhande, Prof.Amrit Priyadarshi

Page No.: 4130 - 4135
DOI: 10.17762/ijritcc2321-8169.1506129    


130. Stock Market Portfolio Management: A Walk-through  

Authors: Bharat V. Chawda, Dr. Jayeshkumar Madhubhai Patel

Page No.: 4136 - 4143
DOI: 10.17762/ijritcc2321-8169.1506130    


131. Simple and Naïve Techniques for Backdoor Elimination in RCA  

Authors: Usha Sunil Gound, Shweta Satish kadam, Prof. Tanaji A.Dhaigude, Avinash Shivaji Gaikwad

Page No.: 4144 - 4147
DOI: 10.17762/ijritcc2321-8169.1506131    


133. Speech Recognition Using HMM/ANN Hybrid Model  

Authors: Supriya S. Surwade, Dr. Y.S. Angal

Page No.: 4154 - 4157
DOI: 10.17762/ijritcc2321-8169.1506133    


134. Secure Cloud using RGB value and Homomorphic Encryption for Shared Data in Cloud  

Authors: Yogita S. Pawar, Shambhu Kumar Singh

Page No.: 4158 - 4161
DOI: 10.17762/ijritcc2321-8169.1506134    


135. Design and Implementation of Data Scrambler & Descrambler System Using VHDL  

Authors: Naina K.Randive, Prof.G.P.Borkhade

Page No.: 4162 - 4167
DOI: 10.17762/ijritcc2321-8169.1506135    


136. Artificial Neural Network Assisted Weather Based Plant Disease Forecasting System  

Authors: R. Bhagawati, K. Bhagawati, A.K.K. Singh, R. Nongthombam, R. Sarmah, G. Bhagawati

Page No.: 4168 - 4173
DOI: 10.17762/ijritcc2321-8169.1506136    


137. Implementation of Quality of Service for Cloud based Application  

Authors: Smita Patil, Shabir Ahmad

Page No.: 4174 - 4176
DOI: 10.17762/ijritcc2321-8169.1506137    


139. A Novel Method for Acquisition of Crowdedness in City using Mobility Clustering  

Authors: Mr.Sujit Ajit Navale, Prof.Y.B.Gurav

Page No.: 4181 - 4184
DOI: 10.17762/ijritcc2321-8169.1506139    


140. A Compact Microstrip Fed T Shape Patch Antenna with Swastika Ground  

Authors: Komal Garg, Sukhdeep Kaur

Page No.: 4185 - 4189
DOI: 10.17762/ijritcc2321-8169.1506140    


141. Revisting SQL Query Recommender System Using Hierarchical Classification  

Authors: Shruti Y. Patil, Prof. Dinesh D. Patil

Page No.: 4190 - 4193
DOI: 10.17762/ijritcc2321-8169.1506141    


142. Implementation in Data Cube Mining for Map Reduce Paradigm  

Authors: Ms.Gawade Swati B, Prof.T.A.Dhaigude

Page No.: 4194 - 4197
DOI: 10.17762/ijritcc2321-8169.1506142    


143. A Review on Proposed Implementation of VGDRA and its Comparative Analysis.  

Authors: Preetinder Kaur, Simarpreet kaur

Page No.: 4198 - 4200
DOI: 10.17762/ijritcc2321-8169.1506143    


145. Performance Analysis of CMOS Flip-flops  

Authors: Savita. C H, Dr. Ravishankar. C.V

Page No.: 4206 - 4208
DOI: 10.17762/ijritcc2321-8169.1506145    


146. Moon Shape Microstrip Patch Antenna with Stair Case Ground  

Authors: Renuka Wadhwa, Sukhdeep Kaur

Page No.: 4209 - 4213
DOI: 10.17762/ijritcc2321-8169.1506146    


147. Build Automation on an Order Management System  

Authors: Shakti. S. Putra, Ms. Rekha Nair, Prof. Sanjeetha R

Page No.: 4214 - 4217
DOI: 10.17762/ijritcc2321-8169.1506147    


148. Adaptive N-Gram Classifier for Privacy Protection  

Authors: Libin Babu, Deepa S.S

Page No.: 4218 - 4222
DOI: 10.17762/ijritcc2321-8169.1506148    


149. Performance Enhancement of MIMO MC-CDMA System employing Cylically Rotated Complete Complementary Codes  

Authors: B. Uma Maheshwari, P. Sreesudha, Dr. K. Rama Linga Reddy

Page No.: 4223 - 4226
DOI: 10.17762/ijritcc2321-8169.1506149    


150. Improved Performance of Area and Delay for Radix 4 and Radix 8 Multiplier  

Authors: Anuradha Kumari, Nidhish Tiwari

Page No.: 4227 - 4230
DOI: 10.17762/ijritcc2321-8169.1506150    


151. Rain Streaks Removal from Single Image  

Authors: Shalaka A. Mhetre, Prof. P. M. Patil, Prof Samir B.

Page No.: 4231 - 4235
DOI: 10.17762/ijritcc2321-8169.1506151    


152. Synchronization Algorithms for Multi-cores and Multiprocessors  

Authors: Cherish G, Satish Kumar T

Page No.: 4236 - 4240
DOI: 10.17762/ijritcc2321-8169.1506152    


153. Comparative Study of Conventional Concrete Strength with Quarry Dust Replacing Sand in Concrete  

Authors: Prof. Sumit L. Chauhan, Prof. Pavan S.Kamble

Page No.: 4241 - 4243
DOI: 10.17762/ijritcc2321-8169.1506153    


154. Maximizing Data Utility by using Data Anonymization Technique  

Authors: Ms.Padma L.Gaikwad, Prof.M.M.Naoghare

Page No.: 4244 - 4248
DOI: 10.17762/ijritcc2321-8169.1506154    


155. Face Recognition by Artificial Neural Network using MATLAB Toolbox  

Authors: Aman Arora, Dishant Chawla, Kinjal Thakkar, Bhavika Bhanushali, Sheetal Thakkar

Page No.: 4249 - 4253
DOI: 10.17762/ijritcc2321-8169.1506155    


156. Heterogeneous Video Transcoder for H.264/AVC to HEVC  

Authors: S. J. Kaware, S. K. Jagtap

Page No.: 4254 - 4256
DOI: 10.17762/ijritcc2321-8169.1506156    


157. Decorrelation of Lung and Heart Sound  

Authors: A. A. Ballewar, Dr. S. D. Lokhande, Dr. R. R. Kodgule

Page No.: 4257 - 4260
DOI: 10.17762/ijritcc2321-8169.1506157    


159. Mining Frequent Itemsets for Evolving Database Involving Insertion  

Authors: Mrs. Ashlesha A. Jagdale, Prof. Sonali Patil

Page No.: 4267 - 4274
DOI: 10.17762/ijritcc2321-8169.1506159    


160. Remote Patient Monitoring and MANET: Applications and Challenges  

Authors: Sonu Kumar, Aditya Soni, Ravi Kumar

Page No.: 4275 - 4283
DOI: 10.17762/ijritcc2321-8169.1506160    


161. Requirements for Point of Care Devices using Use Case Maps  

Authors: Sivanesan Tulasidas, Josef Hausner, John Terzakis, Fred Love, Stefan Mattern, Chris Hudson, Dr. Nada Manivannan, Dr. Ruth Mackay, Wamadeva Balachandran

Page No.: 4284 - 4288
DOI: 10.17762/ijritcc2321-8169.1506161    


162. Design and Implementation of UART  

Authors: Miss. Ruchika Longadge, Prof. Mithilesh Mahindra

Page No.: 4289 - 4291
DOI: 10.17762/ijritcc2321-8169.1506162    


163. Automation & Security System for Public Transport  

Authors: Miss. Supriya satish Chougule, Dr. Mrs. Shubhangi B. Patil

Page No.: 4292 - 4294
DOI: 10.17762/ijritcc2321-8169.1506163    


164. Generic Framework for Gaining Insight Into Data  

Authors: Shaila Eksambekar, Prof. S.A. Itkar

Page No.: 4295 - 4300
DOI: 10.17762/ijritcc2321-8169.1506164    


165. Critical Analysis of Various Symmetric Key Cryptographic Algorithms  

Authors: Preksha Nema, M.A.Rizvi

Page No.: 4301 - 4306
DOI: 10.17762/ijritcc2321-8169.1506165    


166. A Survey on Water Marking techniques for Secure Sharing of Medical Data  

Authors: Vathsalya.G.N , VaishakSundaresh

Page No.: 4307 - 4308
DOI: 10.17762/ijritcc2321-8169.1506166    


167. Optimization of High Utility Itemset Mining from Large Transaction Databases on multi core processor  

Authors: Ms. Yogita S. Khot, Prof. Mrs. Manasi K. Kulkarni

Page No.: 4309 - 4313
DOI: 10.17762/ijritcc2321-8169.1506167    


168. Data Aggregation Based Proactive Data Reporting Protocol for Wireless Sensor Network  

Authors: Ms. Sonali N. Kadam, Prof.Mrs.Manjusha S. Borse

Page No.: 4314 - 4317
DOI: 10.17762/ijritcc2321-8169.1506168    


170. Improve Performance of FLC for HVAC System by Fuzzy Logic  

Authors: Sharwan Kumar, Mukesh Kumar Gupta

Page No.: 4326 - 4329
DOI: 10.17762/ijritcc2321-8169.1506170    


172. A Study on Systematic Reviews  

Authors: Shivanand S. Rumma

Page No.: 4335 – 4337