Volume 3 Issues - (October 15 Volume 3 Issue 10)

2. Secured Technique of AMOV and ESOV in the Clouds  

Authors: Dhiraj Kumar Gupta, Prof. Roshani Talmale

Page No.: 5728 - 5731

 

3. Advanced Voting Machine with Secutiry Features  

Authors: Abhilash Bande, Smruti Sutar, Pooja Botre, Namrata Nagdeo

Page No.: 5732 - 5735

 

4. Statistical Static Timing Analysis for Digital Circuitry  

Authors: Bhushan Malkapurkar, Anil Wanare

Page No.: 5736 - 5741

 

5. Increasing Efficiency of Recommendation System using Big Data Analysis  

Authors: Chandan Venkatesh, Deekshith Kumar, Ganesh Madhav R

Page No.: 5742 - 5744

 

7. A Novel Approach for Generic log analyser  

Authors: Reshma Chaudhari, Naykar Savita Dilip, Vandhan Himali Jaywant, Shelke Pratibha Ashok, Prof. Kavita S. Kumavat

Page No.: 5748 - 5751

 

8. Comprehensive Comparison of Various Approaches for Implementation of Expert IR System through Pre-processing and Clustering  

Authors: Ms. Komal Rahane, Ms. Poonam Rajurkar, Ms. Neha Pathak, Mr. Aditya Bhor, Asst. Prof. Anagha N. Chaudhari

Page No.: 5752 - 5757

 

9. Analysis of ECG Signal Using WP-HH Transform  

Authors: Ms. Ujwala B. Yeole, Mr. Ajay N. paithane

Page No.: 5758 - 5761

 

10. Policies and User Perception based Data Security in the Cloud  

Authors: Ms. Rakhi Ramdas Dighade, Mrs. S. M. Jaybhaye

Page No.: 5762 - 5766

 

11. Smart Shopping Cart  

Authors: S. Prince Samuel, N. Kamalamoorthy, N. Karthikeyan

Page No.: 5767 - 5770

 

13. PACK: Prediction-Based Traffic Redundancy Elimination System & provide secure encryption in Cloud  

Authors: Amavi A. Vispute, Prof. H. A. Hingoliwala

Page No.: 5778 - 5782

 

14. A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad-Hoc Networks  

Authors: Shafiqua C. Pathan, Prof. Dhananjay M. Sable

Page No.: 5783 - 5786

 

15. A Survey on Security in Data Sharing Application for Decentralized Military Network  

Authors: Priyanka Mehkare, Prof. Mayur Dhait

Page No.: 5787 - 5790

 

16. A Survey Paper on Online Shortest Path Computation for Users Based on Traffic Analysis  

Authors: Sharyu Waghmare, Prof. Nutan Dhande

Page No.: 5791 - 5794

 

18. Survey on Security User Data in Local Connectivity Using Multicast Key Agreement  

Authors: Shahela A. Khan, Prof. Dhananjay M. Sable

Page No.: 5799 - 5801

 

19. Use of Cloud Computing in Education  

Authors: Mr. Dharmesh Dhablia, Ms. Madhuri Zambre, Ms. Shruti Timande

Page No.: 5802 - 5805

 

20. Prediction of Stock Values Based on Fuzzy Logic using Fundamental Analysis  

Authors: Mr.Chittaranjan Mangale, Mr. ShyamSundar Meena, Mr.Vijay Birchha

Page No.: 5806 - 5810

 

21. A Low-Cost GPS & INS Integrated System Based on ARM 7  

Authors: A.H.Ansari, D.V.Pande

Page No.: 5811 - 5814

 

23. Frame Based Single Channel Speech Separation using Sumary Autocorrelation Function  

Authors: Raghi E.R, Lekshmi M.S

Page No.: 5822 - 5824

 

24. Hadamard Coded Modulation for Wavelet based Radio Over Fiber Networks  

Authors: Yashwant Kumar, Ms. Ramanpreet Kaur

Page No.: 5825 - 5829

 

25. A Noval Saliency Based Iris Segmentation Framework  

Authors: Fazil Latheef, Robin Abraham

Page No.: 5830 - 5833

 

26. Implementation of Improved IR System through Swarm Intelligence Technique  

Authors: Ms. Shraddha G. Lohar, Ms. Priyanka J. Howale, Ms. Sanketa S. Pradhan, Mr. Mehul D. Redekar, Asst. Prof. Anagha N. Chaudhari

Page No.: 5834 - 5837

 

27. A New Speech Enhancment algorithm in Hearing Aid based on Wavelet Transform  

Authors: Mr. Pradip Baria, Prof. Darshana Shah

Page No.: 5838 - 5841

 

28. Review: - Phasor Measurement Unit in Smart Grid for Minimum Elapsed Time  

Authors: Anita Rawat, S.N.Joshi

Page No.: 5842 - 5844

 

30. A Model for Pitch Estimation Using Wavelet Packet Transform Based CEPSTRUM Method  

Authors: Muhaseena T K, Lekshmi M.S

Page No.: 5852 - 5854

 

31. SMARTPARK-Intelligent Parking Application using Image Processing  

Authors: Yash Jain, Badal Davda, Vaibhav Bavishi, Prof. Chitra Bhole

Page No.: 5855 - 5857

 

32. E-Learning Hub (Online)  

Authors: Yash Mahant, Jaykumar Patel, Rituraj Dharwadkar, Prof. Shubhada Labde

Page No.: 5858 - 5860

 

33. Security Enhancement in Card Payment Systems  

Authors: Prof. Yashwant Ingle, Ms. Dipali Gawde, Ms. Pranoti Deshmukh, Ms. Dipti Deshmukh

Page No.: 5861 - 5863

 

34. Consistency of Reading Techniques to Enhance Expertised Based Language Proficiency For E.S.L Students  

Authors: Mr. K.V. Ram Mohan, Dr. Madhavi Kesari

Page No.: 5864 - 5868

 

35. Study of Different Aspects of Software Configuration Management  

Authors: Shivanand S. Rumma, Kavita Manikrao

Page No.: 5869 - 5871

 

37. E-Delivery Training System using Agile Technology  

Authors: M.Wasim Raja, Dr.K.Nirmala

Page No.: 5877 - 5879

 

38. Automatic Railway track Inspection for early warning using Real time image Processing with GPS  

Authors: Raushan Kumar Verma, Sachin Jain, Akash Jeewan, Mohit Vats

Page No.: 5880 - 5883

 

39. Face Recognition using local Patterns  

Authors: Mukesh D. Rinwa, Prof. Bharat S. Borkar

Page No.: 5884 - 5889

 

40. Analysis of Milk Adulteration Using MID-IR Spectroscopy  

Authors: Kunal Kishor, Ritula Thakur

Page No.: 5890 - 5895

 

42. An Analysis of Trend of Urbanisation in Tripura, India  

Authors: Namita Chakma

Page No.: 5904 - 5908

 

44. Improved Performance of cloud services using Artificial Neural Network  

Authors: Makardhwaj Sharma, Mohit Vats

Page No.: 5916 - 5918

 

46. A Review: Video Steganography for Hiding Data  

Authors: Miss Madhuri R. Shende

Page No.: 5922 - 5924

 

47. A Review: An Approach Comparative study of ACM, FCM, SHFCM  

Authors: Miss Prajakta Dilip Borkar, Prof. Amit Welekar

Page No.: 5925 - 5929

 

48. A Review: Data Extraction from multiple web databases  

Authors: Ms. Amruta Pise, Prof. Jayant Adhikari

Page No.: 5930 - 5932

 

49. A Review: Implementation of Web Security Mechanisms using Vulnerability & Attack Injection  

Authors: Neha Waghale, Prof. Parul Bhanarkar

Page No.: 5933 - 5936

 

50. PicoLAN-A Concurrent Multi-User Control System  

Authors: Jayvijay V Shah, Vedant Ganguly, Krishna Patel, Prof. Chitra Bhole

Page No.: 5937 - 5940

 

51. Various Approaches of Support vector Machines and combined Classifiers in Face Recognition  

Authors: Navin Prakash, Dr.Yashpal Singh

Page No.: 5941 - 5950

 

52. Generic key Generation Algorithm using Weighted Graphs  

Authors: Vigneet Sompura, Prajakta Karandikar, Dhvanish Patel

Page No.: 5951 - 5952

 

53. Novel Approach for Diagnosis of Brain Diseases byUsing Mixed Scheme on MRI and CT Images  

Authors: Udaykumar G. Sapkal, Rajaram D. Patil

Page No.: 5953 - 5956

 

54. Object Tracking in Video using Mean Shift Algorithm including Effect of AWGN channel  

Authors: Aparna Shivhare, Dr. Vineeta Chaudhary

Page No.: 5957 - 5959

 

55. Satellite Image Classification using Clustering Algorithms with Edge Detection Operators  

Authors: Sushma Suresh K, Dr. Prashantha H. S, Dr. S Sandya

Page No.: 5960 - 5966

 

56. Applying Advanced ICT Technologies and Augmented Reality To Generate Future Events On The Example of Organisation and Education in Sports Methodological Assumptions  

Authors: Wojciech B. Cieslinski, Kazimierz Witkowski, Piotr Glowicki, Pawel A. Piepiora, Janusz Sobecki

Page No.: 5967 - 5971

 

57. Demystifying the Sizeof () operator in C through Assembly Code  

Authors: Harsh Patel, Anubhav Chaturvedi, Mr. VishwasRaval

Page No.: 5972 - 5975

 

59. Fuzzy Based Trust Model for Peer to Peer Systems  

Authors: Gayathri S. P, Madhumita A Chatterjee

Page No.: 5986 - 5988

 

60. Paper on Frequency based audio Noise Reduction using Butter Worth, Chebyshev & Elliptical Filters  

Authors: Er. Mannu Singla, Mr. Harpal Singh

Page No.: 5989 - 5995

 

62. Energy Efficient Scheduling of MapReduce over Big Data  

Authors: Prashant Sugandhi, Cheryl Joseph, Harshit Karnewar, Prof. Jayashree Chaudhari

Page No.: 6003 - 6007

 

64. Discovering High Utility Itemsets using Hybrid Approach  

Authors: Amol J. Gosavi, Dr. K. V. Metre

Page No.: 6013 - 6018

 

65. Smart Android Application for blind people based on object Detection  

Authors: Ms. Pratiksha More, Ms. Ketaki Tharkude, Ms. Sonali Kothey, Ms. Aishwarya Wayase, Prof. Kanchan Varpe

Page No.: 6019 - 6020

 

66. Survey of Face Recognition using ICA  

Authors: Payal Dangi, Shabbir Ahmad

Page No.: 6021 - 6023

 

67. A Comparative Case study on Different Parameters of Blowfish Algorithm with other Cryptographic Algorithms  

Authors: Vaibhav Poonia, Rahul Guha, Jai Prakash Kumawat

Page No.: 6024 - 6026

 

68. Overcoming Constraints in Classroom Talk: An over view  

Authors: Mr. Vijay Kumar Neerudu, Dr. Madhavi Kesari

Page No.: 6027 - 6029

 

69. Smart Response System using Speech Emotion  

Authors: Anuraag Advani, Ankita Gandhi, Harita Jagad, Prof. Dharmesh Mistry

Page No.: 6030 - 6032

 

70. An Adaptive Approach for image Enhancement and Naturalness Preservation  

Authors: Sangeetha S, Darsana Vijay

Page No.: 6033 - 6038

 

73. Machine Learning for Classification of Imbalanced Big Data  

Authors: Takshak Desai, Udit Deshmukh, Prof. Kiran Bhowmick

Page No.: 6049 - 6053

 

74. Survey on Dynamic Query Forms for Database Queries  

Authors: Deepak Pagaro, Viral Prajapati, Sahil Gambhir, Harish Singh, Mr. Rahul Pawar, Mrs. D. A. Phalke

Page No.: 6054 - 6057

 

76. Preventing Effects of Natural Diasters in Poland – Financial Aspects  

Authors: Zbigniew Piepiora, Marian Kachniarz, Arkadiusz Babczuk

Page No.: 6062 - 6066

 

77. Clustering Based Routing Protocol LEACH and Its’ Variants: A Review  

Authors: Nikhat Khan, Prof. K.K. Tiwari

Page No.: 6067 - 6071