Volume 5 Issues - (May 17 Volume 5 Issue 5)

2. A Study: Can MFCC be accepted as a Better Feature for Speech Emotion Recognition  

Authors: Akalpita Das, Purnendu Acharjee, Pranhari Talukdar

Page No.: 10 – 11

 

3. Smart Car System using Raspberry pi  

Authors: Anusha M R, Bhumika S Kumar, Bhuvana Priya, Poornima B S, Asst. Prof. Rakesh M B

Page No.: 12 – 15

 

6. A Review on Intelligent Scene Text Recognition of Natural Images  

Authors: Pooja P. Kohapare, Prof. N. Kottawar, Prof A. Manusmare

Page No.: 26 – 28

 

7. A Review Paper on an Approach to Track the Driver Gaze and Eyes of the Road System to Avoid the Accidents  

Authors: Kanchan S. Bobade, Prof. N. Kottawar, Prof. Ashish Manusmare

Page No.: 29 – 31

 

8. Design and Implementation of a Distributed Encryption System for the Cloud  

Authors: Arun Mohan, Sudheep Elayidom

Page No.: 32 – 36

 

9. Adsorption of arsenic (III) by a novel adsorbent prepared from Ocimum sanctum  

Authors: D. Gnanasangeetha, D. Sarala Thambavani

Page No.: 37 – 42

 

10. Identification of Cotton Leaf Diseases Using Raspberry Pi  

Authors: Navin V. Dumare, Prof. S. S. Mungona

Page No.: 43 – 44

 

11. Using Custom Mininet Topology Configuring L2-Switch in Opendaylight  

Authors: Guruprasad E, Sindhu G

Page No.: 45 – 48

 

13. Online Signature Verification and Authentication using Smart Phones  

Authors: Harshil Shah, Pranav Pawar, Mr. S.P. Khachane, Shikhar Sharma, Shrey Pithava

Page No.: 54 – 58

 

14. Unique Approach to Manage Patient Medical Records using Firebase  

Authors: Amit Koppad, Kunal Katdare, Tejas Rathod, Umanng Kolhe, Bhushan Patil

Page No.: 59 – 61

 

15. An Analytical Approach to Analyze Big Web Data  

Authors: Sandeep, Sachin Kumar Chauhan, Reema, Shabnam Sangwan

Page No.: 62 – 69

 

18. Social Network Analysis and Visualization with R  

Authors: Kim Gye-Soo

Page No.: 83 – 86

 

19. Ranking Product Aspects Based on Consumer Reviews  

Authors: Prof. C. M. Jadhav, Ms. Swapnali G. Patil

Page No.: 87 – 90

 

20. Innovation in E-Attendance System using Biometrics  

Authors: Chaitanya Sunil Khachane, Dr. S. M. Jadhav

Page No.: 91 – 93

 

21. Comparative Study and Analysis of Federated and Non-federated Data Warehouse Architecture  

Authors: Bikramjit Pal, Sunanda Bharti, Mallika De

Page No.: 94 – 99

 

22. A Survey on Development of Mobile Technology  

Authors: Mrs. Punam Gurlhosur, Mrs. Pranita Nagpurkar

Page No.: 100 – 104

 

23. Network Engineering through Skip List Data Structure for Federated Cloud Data Center  

Authors: Dr. Vibhakar Pathak, Shabana Patel

Page No.: 105 – 107

 

24. Evaluation of Attribute-Based Access Control (ABAC) for EHR in Fog Computing Environment  

Authors: Aisha Mohammed Alshiky, Seyed M. Buhari, Ahmed Barnawi

Page No.: 108 – 117

 

25. Securing Patient Data Access using Segmented Key Management Approach  

Authors: Dr. M. Sughasiny, C. Sengamalai

Page No.: 118 – 124

 

26. Evaluation of Road Traffic Congestion by Shock Wave Theory and Reduction Strategies  

Authors: Dr. Neeta Saxena, Dr. Neha Jain

Page No.: 125 – 129

 

27. Matching Domination of Lexicograph Product of Two Graphs  

Authors: P Bhaskarudu

Page No.: 130 - 134

 

28. Designing Techniques for Low Power Multipliers: A Review  

Authors: Swarnalika Nagi, Ms. Jagandeep Kaur, Ms. Nisha Charaya

Page No.: 135 – 138

 

29. Cloud Data Security using Elliptical Curve Cryptography  

Authors: Dr. P. Srivaramangai, J. Rajeshwari

Page No.: 139 - 144

 

30. Proposed Energy Aware Scheduling Algorithm in Data Center by using Map Reduce  

Authors: Dr. M. Sughasiny, G. Murali

Page No.: 145 - 150

 

31. Using Semantic Recommenders for Personalized Recommendations  

Authors: Tanuja Lonhari, Sandhya Gundre, Shilpi Arora

Page No.: 151 – 154

 

33. Proposing Optimus Scheduler Algorithm for Virtual Machine Placement Within a Data Center  

Authors: Dr. M. Sughasiny, M. Hari Prakash

Page No.: 159 – 165

 

34. Bio medical Waste Management : A Case Study of Pune City  

Authors: Vaishali D. Jaysingpure, Ashwin A. Mali, Samadhan D. Raut, Pranav S. Shinde

Page No.: 166 – 169

 

35. Pattern Based Mining For Relevant Document Extraction  

Authors: Priyanka R. Magar, C. S. Biradar

Page No.: 170 – 173

 

36. A Cryptographic Solution to the Predefind Bound of Ciphertext Classes in KAC  

Authors: Mr. Rahul Suresh Tamkhane, Mr. Nilesh S. Vani, Mr. Pramod B. Gosavi

Page No.: 174 – 178

 

37. The Study of Vander Waals (vdW) Coefficients for Chalcogenide Semiconductor Compound (ChSCs)  

Authors: Dr. Alka Singh, Dr. Navin Kumar

Page No.: 179 – 182

 

38. Implementation of Data Hiding Approach by Diverse Image Media  

Authors: Miss. Sweeti. A. Parwatkar, Prof. V. B. Bhagat.

Page No.: 183 – 186

 

39. Wavelets and Their Application in Image Processing with Future Research Prospect  

Authors: Y. S. Thakur, Ajay Maurya

Page No.: 187 – 190

 

40. QoS Web Service Composition  

Authors: Jaspreet Bedi, Rydhm Beri

Page No.: 191 – 193

 

41. Analysis of Black Hole Attack in MANET Based on Simulation through NS3.26  

Authors: Neelam Janak Kumar Patel, Dr. Khushboo Tripathi

Page No.: 194 – 205

 

42. A Review on Software Architecture Optimization Methods  

Authors: Akshay Jadhav, Dr. Sanjay Agarwal

Page No.: 206 – 211

 

43. Sentiment Classification using Machine Learning: A Survey  

Authors: Kushall Pal Singh, Sanjay Agrawal

Page No.: 212 – 216

 

44. Ferry Route Design with MAC Protocol in Delay Tolerant Networks  

Authors: Chaitra T K, Dr. A S Poornima

Page No.: 217 – 222

 

45. Custom Annotation for Execution of Data Manipulation Commands in a Generic Manner – A Case Study  

Authors: Dr. Poornima G. Naik, Mr. Girish R. Naik

Page No.: 223 – 232

 

46. An Efficient Approach towards Tidal Power Production Using Vertical Planar Motion  

Authors: Dhanalakshmi.S, Murugalakshmi.A

Page No.: 233 – 236

 

47. Performance Characteristics of Carbon Nanotube Field Effect Transistor based Immunosensor  

Authors: Dr. P. Geetha, Dr. N. Vidyalakshmi

Page No.: 237 – 240

 

49. Vehicle Health Monitoring System Using ARDUINO and IOT  

Authors: Chaitra B, Raziya Begum M, Aishwarya K, Sachin Patil

Page No.: 252 – 254

 

50. Design of Microstrip Patch Antenna using Ads Tool  

Authors: Rajaneesh Ganiger, Nanda Hunagund, Shruti Surangi, Suman Patil, Sachin Patil

Page No.: 255 – 258

 

51. Rakshak - A Rescue Bot  

Authors: Laxmi T, Nikhat B, Suryaprabha M C, Vijaylaxmi V S, Basavaraj Soratur

Page No.: 259 – 261

 

52. An Empirical Study to Examine the Role of Manufacturing Informatics in Smart Manufacturing  

Authors: Jaspreet Singh Randhawa, Amanpreet Singh Sethi

Page No.: 262 - 269

 

53. To Study The Impact of Information and Communication Technology Tools on Society of Hilly and Rural Area of Bhor Taluka, District- Pune, Maharashtra  

Authors: Atul Dattatrya Newase, Dr. Jitendra Sheetlani, Dr. Ranjit D. Patil

Page No.: 270 – 279

 

54. Literature Survey on Keystroke Dynamics for User Authentication  

Authors: Brajesh Singh, Saurabh Sonawane, Yash Shah, Vaishakh Singh

Page No.: 280 – 282

 

55. Border Security System  

Authors: Nitin Srivastava, Neeraj Gupta, Bittu Verma, Prashant Tiwari, Lakshay Verma, Manjeet Kaur

Page No.: 283 – 285

 

56. Reliable Taxi Ride Sharing System  

Authors: Prof. K. K. Chhajed, Gauri Bhade, Harsha Khapre, Neha Gawande, Dhanashri Lokhande, Snehal Gawai

Page No.: 286 – 290

 

57. A Color Image Watermarking Scheme Based On QR Factorization, Logistic and Lorentz Chaotic Maps  

Authors: Kamred Udham Singh, Dr. Achintya Singhal

Page No.: 291 – 296

 

58. Biometric Fusion and Recognition  

Authors: Supriya S. Laykar, S. B. Patil, A. N. Jadhav

Page No.: 297 – 301

 

59. Bandwidth Enhancement of Different Patch Shaped Antennas  

Authors: Simran Goyat, Kapongo Ilunga, Anil Kumar, Ved Prakash

Page No.: 302 – 306

 

60. Programming Languages: A Survey  

Authors: Krishan Kumar, Sonal Dahiya

Page No.: 307 - 313

 

61. Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm  

Authors: Siddheshwar A. Suratkar, Rahul A. Udgirkar, Pratik D. Kale, Amit A. Shelke, Mohsin H. Shaikh, Prof. D. C. Dhanwani

Page No.: 314 – 319

 

62. A Survey of Azure ML Recommender System  

Authors: Tanvi D.Patel, Ankita Gandhi

Page No.: 320 – 324

 

63. Variable Size 2D DCT with FPGA Implimentation  

Authors: Monika Rani Jha, Mr. Neeraj Gupta, Ms. Shruti Karkra

Page No.: 325 – 332

 

64. A Study of Supervised Learning in Context with Decision and Regression Tree  

Authors: Prof. Neeraj Bhargava, Dr. Ritu Bhargava, Kapil Chauhan

Page No.: 333 – 337

 

65. Numerical Investigation of Thermal Performance Factor for different Twisted Tape Configurations  

Authors: B.Pramila Devi, Ch. Kiran Kumar, K.Pavan Kumar

Page No.: 338 – 345

 

66. Compendious Discourse Concerning MANET Routing Protocols & Simulation Tools  

Authors: Sandeep Kaur, Rydhm Beri, Satbir Singh

Page No.: 346 – 349

 

67. Survey on Hybrid Anonymization using k-anonymity for Privacy Preserving in Data Mining  

Authors: Binal Upadhyay, Sumitra Menaria

Page No.: 350 – 355

 

68. Implementation of Energy Saver Circuit using 8051 Microcontroller  

Authors: Goutam Kumar Maity, Arunava Karmakar, Pradip Kumar Das, Sandip Mandal

Page No.: 356 – 360

 

69. A Comparative Study of Public and Private Sector Banks in India  

Authors: Habiba Abbasi

Page No.: 361 – 370

 

70. Optical Quadruple Feynman Gate using SLM and Savart Plate  

Authors: Animesh Bhattacharya, Goutam Kumar Maity, Amal K Ghosh, Kazi A H Taslim Arif

Page No.: 371 – 375

 

72. Non Linear Chaotic Map for Secure Data Transmission  

Authors: S Sankar, S Nagarajan

Page No.: 380 - 384

 

74. Power Amplifier Linearization using Singular Value Decomposition Algorithm  

Authors: Er. Sanjeev Goyal, Er. Harpreet Kaur, Er. Harisharan Aggarwal

Page No.: 389 – 392

 

75. Analysis of Channel Models for Memory Less Nonlinear System  

Authors: Er. Sukhwinder Partap Rana, Er. Harisharan Aggarwal

Page No.: 393 – 395

 

76. An Empiral Study and Discussions on Multiple Object Tracking: Current State of Art  

Authors: Adinarayana Ekkurthi, Dr. G.Sudhavani

Page No.: 396 – 399

 

77. Review on Performance Analysis of Square Pixel and Hexagonal Pixel Structure in Image Processing  

Authors: Snehali A. Dakhore, Prof. K. B. Bijwe

Page No.: 400 – 403

 

78. IoT based Smart Hospital for Secure Healthcare System  

Authors: Sejal Patel, Narendra Singh, Sharnil Pandya

Page No.: 404 – 408

 

79. A Survey of VPN Performance Evaluation  

Authors: Avani J.Patel, Ankita Gandhi

Page No.: 409 – 413

 

80. Performance Analysis of OOK-NRZ and OOK-RZ digital Modulation Techniques for Free Space Optical Communication System  

Authors: Er. Manjit Singh Bhullar, Er. Harpreet Kaur, Er. Harisharan Aggarwal

Page No.: 414 – 416

 

81. Miscellaneous Properties Of Full Graphs  

Authors: Shadi Ibrahim Khalaf, Veena Mathad, Sultan Senan Mahde

Page No.: 417 – 419

 

82. IoT Based Automated Car  

Authors: Bhumit Patel, Sharnil Pandya, Satvik Patel

Page No.: 420 – 422

 

83. Secure E-mailing System Using Pair Based Scheme and AES with Session Password  

Authors: Mandar A. Joshi, Vikrant S. Shendarkar, Khushbu Solanke, Monika Chandelle, Nidhi Iche

Page No.: 423 – 428

 

84. Performance Enhancement of Routing in MANETs by using EOMD  

Authors: D Venkatesh, A Subramanyam

Page No.: 429 – 432

 

85. Simulative Investigations on Log-Normal Turbulence Model for Free Space Optical Communication  

Authors: Er. Darshan Singh Dhillon, Er. Harisharan Aggarwal

Page No.: 433 – 435

 

86. Design and Performance Evaluation of An Arduino Based Activity Tracker  

Authors: Aditya Garg, Prateek Kumar Yadav, Tushar Taneja, Manoj Kumar Pandey, Tejender Singh Rawat

Page No.: 436 – 439

 

87. Quality Assessments of Various Digital Image Fusion Techniques  

Authors: D. A. Deshmukh, Prof. Dr.P. V. Ingole

Page No.: 440 - 445

 

89. Effective Method of Image Retrieval Using BTC with Gabor Wavelet Matrix  

Authors: Mohana Sundari. L, Nivetha. R

Page No.: 453 – 458

 

90. Impact of Demonetization on E-Commerce Websites& Payment Systems  

Authors: Deepika Dhamija, Ankit Dhamija

Page No.: 459 – 463

 

91. Generation of High Voltage DC using Diodes & Capacitors in Ladder Network  

Authors: Pooja. S. A., Revathi. S., Lavanya. C. K., Somashekar. B.

Page No.: 464 – 469

 

92. Parallel Page Rank Algorithms: A Survey  

Authors: Atul kumar Srivastava, Mitali Srivastava, Rakhi Garg, P. K . Mishra

Page No.: 470 – 473

 

93. Exploring Relationship between Software Product Quality Metrics  

Authors: Rashmi Gupta, Ruchi Kamra

Page No.: 474 – 477

 

95. Comparative Study of Spurious Power Suppression Technique Based Carry Look Ahead Adder And Carry Select Adder  

Authors: Swarnalika Nagi, Ms. Jagandeep Kaur, Ms. Nisha Charaya

Page No.: 498 – 504

 

96. Design of Low Power and High Speed Fir Filter using Spurious Power Suppression Technique based Multiplier  

Authors: Swarnalika Nagi, Ms. Jagandeep Kaur, Ms. Nisha Charaya

Page No.: 505 – 511

 

98. Twitter Sentiment Analysis of Current Affairs  

Authors: Mahavar Anjali B, Priya Pati, Abhishek Tripathi

Page No.: 517 – 521

 

99. A Review On Green Cloud Computing  

Authors: Anjali Verma, Dr. Priyanka Tripathi

Page No.: 522 – 528

 

100. Automated Control System for Air Pollution in Vehicle  

Authors: Aleena Mary Anson, Dr. Priti Singh, Manish Kataria, Sachin Dabas, Mansi Bajaj, Dr. Karamjit

Page No.: 529 – 532

 

101. Data Safeguarding against Internal and External Threats  

Authors: Aditi S. Dixit, Abhilasha C. Devkar, Shreya S. Kela and Amruta S. Kulkarni

Page No.: 533 – 536

 

102. Models for Self-Balancing of Two Wheeled Vehicles: A Review  

Authors: Rahul Kumar, Ayush Mathur, Tejender Singh Rawat, Rajat Butola

Page No.: 537 – 539

 

106. A Review of Intrusion Detection System  

Authors: Mr. Utpal Shrivastava

Page No.: 556 – 558

 

107. Supervised Intrusions Detection System Using KNN  

Authors: Mr Utpal Shrivastava

Page No.: 559 – 562

 

109. Distributed Software Requirement Specification- An Overview  

Authors: Neha Bhateja

Page No.: 570 – 572