IJRITCC June 17 Volume 5 Issue 6

1. Design and Implementation of an Advanced Home Automation System using WiFi Technology  

Authors: Jaspalsinh Prafulsinh Yadav, Prof. Riyaj Kazi

Page No.: 01 – 04

 

2. Oblong Mean Prime Labeling of Some Snake Graphs  

Authors: Sunoj B S, Mathew Varkey T K

Page No.: 05 – 07

 

3. Compressive Study on Wireless 3d Printer Using Lua Code  

Authors: Chetan P, Arun S, Megha M, Sarfrazkhan F, Maltesh I.G.

Page No.: 08 – 14

 

4. Two stage Decision Tree Learning from Multi-class Imbalanced Tweets for Knowledge Discovery  

Authors: Salina Adinarayana, E. Ilavarasan

Page No.: 15 – 19

 

5. Variability in Behavior of Application Service Workload in a Utility Cloud  

Authors: Monika Sainger, Dr. K. P. Yadav, Dr. H. S. Sharma

Page No.: 20 – 25

 

6. Security & Privacy Issues of Big Data in IOT based Healthcare System using Cloud Computing  

Authors: Md. Zahid Ibna Alam, Prof. Hiral M. Patel

Page No.: 26 – 30

 

7. Study of Ancient and Recent Methods of Green Buildings  

Authors: Dr Awari Mahesh Babu

Page No.: 31 – 36

 

8. An Optimization Framework for IEEE 802.11s Based Wireless Mesh Network  

Authors: Veenu Mor, Harish Kumar

Page No.: 37 – 41

 

10. Fuzzy C-Means Algorithm to Diagnose Breast Cancer  

Authors: Dr. W. Abdul Hameed, Dr. Shaik Sharief Basha

Page No.: 46 – 50

 

11. Development of Artificial Pancreas  

Authors: Ananya Mathur, Apoorva Chaudhary

Page No.: 51 – 55

 

13. Worldwide Consumption of Sodium and Its Impact on Human Health  

Authors: Sonal Dhemla, Dr Kanika Varma

Page No.: 62 - 67

 

14. Prediction of Conflicts in Transportation Services using Real-Time Data  

Authors: Wali Salman Khan, Ankita Sheetlaprasad Upadhyay, Anjali Ashok Chidrawar, Namrata Rajkumar Kore, Balaji. Bodkhe

Page No.: 68 - 73

 

16. Graph Based Disambiguation of Named Entities using Linked Data  

Authors: Arpa H. Mirani, Mansi A. Radke

Page No.: 78 – 86

 

17. Multilevel Security System for Bank Locker  

Authors: Aishwarya Shah, Akshay Wadatkar ,Santosh Verma, Prof. M. P. Sardey

Page No.: 87 – 92

 

18. Digital Image Steganography: Study of Current Methods  

Authors: Arun Kumar Singh

Page No.: 93 – 96

 

19. Some Properties of Fuzzy Evidence Graph  

Authors: Mathew Varkey T.K, Sreena T.D

Page No.: 97 – 99

 

20. A Semantic-Based Friend Recommendation System for Large-scale System  

Authors: Miss. Bhavana Zambare, Mrs. Madhuri Zawar

Page No.: 100 - 104

 

21. A Comprehensive Survey on Sixth Sense Technology  

Authors: Reema Dhiman, Navneet Kaur

Page No.: 105 – 108

 

22. Brain Computer Interface based Robot Design for Physically Disabled Person  

Authors: Shradha S Salunke, Prof. Riyaj Kazi

Page No.: 109 – 112

 

24. MPPT for Photovoltaic Systems with SEPIC Converter Counting Steady-State and Drift Analysis  

Authors: Mr. Narayan L. Khiste, Mrs. K. S. Gadgil

Page No.: 119 – 127

 

25. A Novel Reliability Management Technique by Reduced Replication in Cloud Storage Applications  

Authors: C. Afzal, M. Atheequllah Khan, M. Sudhakar

Page No.: 128 – 133

 

26. Data Transfer via Human Body  

Authors: Shubham Rathod, Bhavana Kate, Sandip Bhange, Mrs. H. D. Shinde

Page No.: 134 – 136

 

27. Electrical Power Line Theft Detection  

Authors: Mr. Jitendra S. Atkari, Mr. Shubham A. Sutar, Mr. Vivekanand G. Birajdar, Ms. A. B. Kanwade

Page No.: 137 – 141

 

28. Modification of Current Weather Indicating System used at Airports  

Authors: Sagar Tathod, Somesh Joshi, Umair Yelurkar, S.V. Lohar

Page No.: 142 – 144

 

30. DIP Based Smart Door Lock System  

Authors: Ms. Uzma Fatima Shaikh, Ms. Usha Shinde, Prof. M. P. Sardey

Page No.: 150 – 153

 

31. Data Analysis using Hierarchical Computing  

Authors: Aliasger Kagalwala, Ankush Khurana, Shashwat Kaul, Govind Pole

Page No.: 154 – 158

 

32. Divergence among Students for E- Learning Skills in Different Districts of Jammu & Kashmir  

Authors: Wasim Akram Zargar, Jagbir Ahlawat

Page No.: 159 – 169

 

33. Comparative Analysis of Different Tools Business Process Simulation  

Authors: Jayesh J. Gamar, Dr. B.S. Agrawal

Page No.: 170 – 174

 

34. Air and Sound Pollution Monitoring System using IoT  

Authors: Sarika Deshmukh, Saurabh Surendran, Prof. M.P. Sardey

Page No.: 175 – 178

 

35. Review of performance of various Big Databases  

Authors: Mallika Wadhwa, Er. Amrit Kaur

Page No.: 179 – 182

 

36. Business Process Simulation: Transformation of BPMN 2.0 to Discrete Event System Specification  

Authors: Jayesh J. Gamar, Dr. B.S. Agrawal

Page No.: 183 – 186

 

37. Characteristics and Challenges of Big Data  

Authors: Piyush Bhardwaj, Dr. Suruchi Gautam, Dr. Payal Pahwa, Neha Singh

Page No.: 187 – 190

 

38. Enhanced DCP filter for Real-World Hazy Scenes  

Authors: Sanjay Sharma, Padma J Bonde

Page No.: 191 – 196

 

39. Energy Efficient Network Selection in Heterogeneous Network using TOPSIS  

Authors: Priyanka Rani, Silki Baghla, Dr.Himanshu Monga

Page No.: 197 – 202

 

40. Car Black Box System  

Authors: Miss. Umeda Anil Yeole, Miss. Kirti Narendra Deshmukh, Mrs. Mohini P. Sardet

Page No.: 203– 205

 

41. Big Data Harmonization – Challenges and Applications  

Authors: Prof. Jigna Ashish Patel, Dr. Priyanka Sharma

Page No.: 206 – 208

 

42. Construction Project of Residential Building in 3-Tier City  

Authors: Tejas Sanjay Nikumbh, Dipak P. Patil

Page No.: 209 – 211

 

44. A Single Phase Five Level Inverter based on switched DC sources with Reduced Number of Total Component Count by Novel Topology  

Authors: Mrs. Bharati S.Mathapati, Prof. Shubhangi S.Landge, Prof.Pushkaraj V.Sakhare, Mr.Jadhav Dnyaneshwar N.

Page No.: 218 – 223

 

45. Simulation and Analysis of Modified RSA Cryptographic Algorithm using Five Prime Numbers  

Authors: Dharitri Talukdar, Lakshmi Prasad Saikia

Page No.: 224 – 228

 

46. Application of Inventory Management in Construction Industry  

Authors: Jyoti Sanjeev Mohopadkar, Dipak R. Patil

Page No.: 229 - 231

 

47. Personnel Identification Using Handwriting, Tested On Indian Writers  

Authors: Anish Raj, Apoorva Chaudhary

Page No.: 232 – 235

 

48. An Exploration of Security Issues in Cloud Environment  

Authors: Tharani P, Kalpana A M

Page No.: 236 – 243

 

49. UWB MIMO Antenna with Band-Notched Characteristic  

Authors: D. Krupa Rani, J.V.K. Ratnam

Page No.: 244 – 247

 

50. Internet of Things: A World of Need and Opportunity  

Authors: Vikas Kumar, Dr. Neetu Sharma

Page No.: 248 – 252

 

51. Generalized Coding Theorem with Different Source Coding Schemes  

Authors: D. K. Sharma, Sonali Saxena

Page No.: 253 – 257

 

52. An Integrated Approach for detecting DDoS attacks in Cloud Computing  

Authors: Sarat Akasapu

Page No.: 258 – 261

 

53. Speed Control of Induction Motor using Fuzzy Logic  

Authors: Miss. Ritita. R. Lavate, Mrs. K. S. Gadgil

Page No.: 262 – 265

 

55. GUI Based Test Case Generation- A Review  

Authors: Mrs. Aarti Chugh

Page No.: 273 – 276

 

57. A Survey on Brain Tumor Classification & Detection Techniques  

Authors: Mrunal H. Suthar, Yeshvanht Birla

Page No.: 283 – 286

 

59. The Sum-Eccentricity Energy of A Graph  

Authors: Mohammad Issa Sowaity, B. Sharada

Page No.: 293 – 304

 

60. Hybrid Recommendation System Using Clustering and Collaborative Filtering  

Authors: Roshni Padate, Priyanka Bane, Jayesh Kudase, Adarsh Gupta

Page No.: 305 – 310

 

61. Hybrid Cooler Works on DC Motor  

Authors: Pranali Nitnaware, Ajay Mahawadiwar

Page No.: 311 – 317

 

63. Electronic Counseling System for the Visually Impaired in Enugu State Nigeria  

Authors: Okeke Ogochukwu Clementina, Ndigwe Chinwe F.

Page No.: 324 – 329

 

64. An Overview of Image Steganography: Survey and Analysis  

Authors: Arun Kumar Singh

Page No.: 330 – 332

 

66. Monitoring of Temperature and Analysis of Image Degradation in EFMRI System  

Authors: Renuka, Prof. Shahla Sohail

Page No.: 338 – 341

 

67. Analysing Amino Acids in Galanin Graph Theoretical Approach  

Authors: Suresh Singh G., Akhil C. K.

Page No.: 342 – 346

 

68. Metallographic Image Fusion  

Authors: V. K. Bairagi, Ekbote Shrutika A., Bhosale Akshada R.

Page No.: 347 – 352

 

69. Advancements in Multi-Layer Perceptron Training to Improve Classification Accuracy  

Authors: K. Hemalatha, K. Usha Rani

Page No.: 353 – 357

 

70. Spur Gear Damage Analysis Using Variation of Speed Range  

Authors: Deepika S.

Page No.: 358 – 362

 

71. Enhancing Accuracy of Disease Prediction of KNN and Euclidean Distance using Hybrid Approach  

Authors: Amandeep Kaur, Varinder Kaur Attri

Page No.: 363 – 367

 

72. Enhancing Performance in Terms of Energy Consumption of Cluster Based Protocol by the use of Priority Queue  

Authors: Kiranpreet Kaur, Asst. Prof. Neena Madan

Page No.: 368 – 373

 

73. An Evolutionary Algorithm based Parameter Estimation using Pima Indians Diabetes Dataset  

Authors: Dr. Chandan Banerjee, Sayak Paul, Moinak Ghoshal

Page No.: 374 – 377

 

74. Content Based Image Retrieval using CMM+GWT and SVM Classifier  

Authors: Rocky S. Upadhyay, Dayashankar Pandey, Ritesh Yadav

Page No.: 378 – 381

 

75. (N,N) Share Generation using Key Share approach for RGB image in VCS  

Authors: Shivam S. Upadhyay, Niresh Sharma, Ritesh Yadav

Page No.: 382 – 386

 

76. Solve Non-Linear Parabolic Partial Differential Equation by Spline Collocation Method  

Authors: P. B. Choksi, A. K. Pathak

Page No.: 387 – 391

 

77. Remotely Sensed Image Inpainting With MNLTV Model  

Authors: Rohini B. Late, Prof. N. G. Dharashive

Page No.: 392 – 398

 

78. Spatial Analysis of Crime with Public Alliance System  

Authors: Amandeep Kaur, Dr. Neetu Sharma

Page No.: 399 – 404

 

81. E-CAPTCHA: A Two Way Graphical Password based Hard AI Problem  

Authors: Sudarshan Soni, Dr. Padma Bonde

Page No.: 418 – 421

 

82. Performance Enhancement of Channel Estimation Technique in Broadcast and Multicast Mode  

Authors: Onkar Singla, Harjeet Singh, Navdeep Choudhary

Page No.: 422 – 425

 

83. Feasibility and Stability of Steel Girder Bridge on Basis of Corrosion  

Authors: Reshma Biswakarma, Er. Manjit Kaur

Page No.: 426 – 431

 

84. Software Test Automation with Robot Framework  

Authors: Harsha T, B A Sujatha Kumari

Page No.: 432 – 433

 

85. Polarity Classification of Twitter Data using Sentiment Analysis  

Authors: Arvind Singh Raghuwanshi, Satish Kumar Pawar

Page No.: 434 – 439

 

86. Cocoa Care - An Android Application for Cocoa Disease Identification  

Authors: Harivinod N, Pooja P, Nithesh Kumar H, Ashritha B S, Gururaj G Hegde

Page No.: 440 – 444

 

87. BFSMpR:A BFS Graph based Recommendation System using Map Reduce  

Authors: Vivek Pandey, Dr. Padma Bonde

Page No.: 445 – 449

 

88. Design of Solar-Biomass-Biogas Based Hybrid System for Rural Electrification with Environmental Benefits  

Authors: Priyanka Anand, Sarbjeet Kaur Bath, Mohammad Rizwan

Page No.: 450 – 456

 

89. Attribute Based Encryption with Verifiable Time Stamped Decryption  

Authors: Miss. Madhavi Phalak, Mr. Rahul Gaikwad

Page No.: 457 – 461

 

90. Implementation of RDH in Encrypted Image  

Authors: Miss. Harshali Phalak, Mr. Rahul Gaikwad

Page No.: 462 – 466

 

91. Enhancing Security of Android Phones  

Authors: Tejaswini Bhandarkar, Prof. Rajesh Babu

Page No.: 467 – 470

 

92. Clone Detection for Efficient System in WSN Using AODV  

Authors: Ms. Rupika Yadav, Prof. Roshani Talmale, Prof. Vishal Tiwari

Page No.: 471 – 478

 

93. A Review Paper on Design Analysis of Connecting Rod  

Authors: Magesh Kumar, Prof. Ankush K Biradar

Page No.: 479 – 481

 

94. Investigation of Mechanical Properties and Phase Analysis in Boiler Plate ASME SA-516-60 Grade by Welding Process  

Authors: Arvind B. Totey, Kartik Bamrautwar, Chiranjeevi Shetye, Niti Shesh

Page No.: 482 – 485

 

95. A Survey on Meta-Heuristic Scheduling Optimization Techniques in Cloud Computing Environment  

Authors: Shubhdeep Kaur Sandhu, Anil Kumar

Page No.: 486 – 492

 

96. Analyzing the Effect of Scintillation on Free Space Optics  

Authors: Jasjot Kaur Sahota, Divya Dhawan

Page No.: 493 – 496

 

97. A Study on Hyper Spectral Remote Sensing Pest Management  

Authors: A. Swarupa Rani, S. Jyothi

Page No.: 497 – 503

 

98. A Survey on Classification of Routing Protocols in Wireless Sensor Networks  

Authors: Vennu Lavanya, Prof. C. Kalyana Chakravarthy

Page No.: 504 – 510

 

99. Advanced Transport Management System  

Authors: Maheshwari Kale, Sayali Bhadale, S. V. Lohar

Page No.: 511 – 513

 

100. Automated Identification of Diabetic Retinopathy: A Survey  

Authors: Pradeep Kumar K G, Dr. Karunakara K, Dr. Thyagaraju G S

Page No.: 514 – 520

 

102. Light Monitoring on a Management Tool  

Authors: Naveena. Anumala, Dr. R. Kumar

Page No.: 525 – 531

 

103. Niobium Superconducting Cavity for Radio Frequency: A Review  

Authors: Sachin Rishishwar, Raghavendra Sharma

Page No.: 532 – 535

 

104. Security System by Motion Detection and Light Mechanism  

Authors: Lipika Shah, Heena Sayyed, Rohini Temkar

Page No.: 536 – 539

 

105. Design and implementation of JAMB Computer-Based Test System with Voice Command  

Authors: Dr. M. O. Onyesolu, Ezenwegbu Nnamdi Chimaobi

Page No.: 540 – 548

 

107. Implementation of Anomaly Detection Using Data Mining Technique  

Authors: Ragini, Mahesh Kumar

Page No.: 554 – 556

 

108. From Traditional to 360-Degree Feedback in Performance Evaluation of Bhutan  

Authors: Sagar Bhujel, Rinchen Zangmo, Sonam Wangmo, Yeshi Wangchuk, Kezang Jurmey

Page No.: 557 – 565

 

109. G-Task: Proposal for Development of a Freelancing Android Based Mobile Application in Bhutan  

Authors: Sonam Wangmo, Tashi Phuntsho, Kailash Rai , Tshewang Tenzin, Nima Dukpa

Page No.: 566 – 570

 

110. Evaluation of Student Data Storage System and Development of Student Information System  

Authors: Ney Dorji, Rinzin Dema, Sonam Tenzin, Tshering

Page No.: 571 – 577

 

112. PI Controller Based New Soft-Switching Boost Converter With A Coupled Inductor  

Authors: Amala Asokan, P. Sundaramoorthi

Page No.: 599 – 604

 

113. Real Time Respiration Rate Measurement Using Temperature Sensor  

Authors: Abhishek Singh, Apoorva Chaudhary

Page No.: 605 – 607

 

114. Phishing: A Continual Threat for Cyber World  

Authors: Somnath Basak, Chandrani Ray Chowdhury

Page No.: 608 – 612

 

115. Proof Verification and Attribute Based Re-Encryption of Shared Data over Public Cloud  

Authors: Mr. Swapnil R. Patil, Prof. N. D. Kale

Page No.: 613 – 618

 

116. Signal Capturing on VLSI Systems in Real Time  

Authors: S. Khadar Bhasha, B.H.K. Bhagat Kumar

Page No.: 619 – 624

 

117. Sign Language Recognition Using Convolutional Neural Networks  

Authors: N. Priyadharsini, N. Rajeswari

Page No.: 625 – 628

 

118. An Analytical Survey on Vein Pattern Recognition  

Authors: Lovepreet Kaur, Navjot Kaur

Page No.: 629 – 634

 

119. Gujarati Word Sense Disambiguation using Genetic Algorithm  

Authors: Zankhana B. Vaishnav

Page No.: 635 – 639

 

121. POTC model for Safe and Secure Cyber Communication as well as Transactions  

Authors: Desai Ami Shaileshkumar, Dr. Sanjay Buch

Page No.: 643 – 649

 

122. Research Proposal on Distinct Study and Significant of Search Techniques in Web Mining  

Authors: Tiruveedula Gopikrishna, Prof. Dr. K. V. N. Sunitha

Page No.: 650 – 654

 

123. Design & Performance Analysis of 8-Bit Low Power Parity Preserving Carry-Look Ahead Adder  

Authors: Palak Sharma, Amandeep Singh Bhandari, Dr. Charanjit Singh

Page No.: 655 – 664

 

124. Squential Step Towards Pattern Warehousing  

Authors: Harshita Jain, Dr. Akhilesh Tiwari

Page No.: 665 – 670

 

125. A Systematic Literature Survey on IDS  

Authors: Palash Chaturvedi, Amit Saxena

Page No.: 671 – 676

 

126. Modeling used for Software Product Line Engineering  

Authors: Satinderjit Kaur Gill, Dr. Amita Sharma

Page No.: 677 – 679

 

127. Efficient Hybrid Machine Learning Algorithm for text Classification  

Authors: Dr. M. Durairaj, A. Alagu Karthikeyan

Page No.: 680 – 688

 

128. A Pragmatic Review on Security and Integrity in Wireless Networks  

Authors: Shina Arora

Page No.: 689 – 692

 

129. Personal Assistance using Artificial Intelligence for Computers  

Authors: Bharathi K, Prathmi Naik V, Shamanth A P, Shreyas S, Shyam Thejaswi

Page No.: 693 – 695

 

130. Arithmetic Operations on Intuitionistic Hexagonal Fuzzy Numbers Using ? Cut  

Authors: Dr. A. Sahaya Sudha, M. Revathy

Page No.: 696 – 704

 

131. Predictor Analysis of the Non-parametric Bulk Arrival Fuzzy Queueing System  

Authors: Sivaramalingam Geetha, Bharathi Ramesh Kumar, Sankar Murugesan

Page No.: 705 – 709

 

132. Design of An Efficient Image Enhancement Algorithms Using Hybrid Technique  

Authors: Mohammad Abdul Ramiz, Prof. Ruhina Quazi

Page No.: 710 – 713

 

133. Sharing Data with Secure Advancing ABE method using Timestamp  

Authors: Miss. Sharayu Bonde

Page No.: 714 – 718

 

135. Wind Power Control Using MPPT and SEPIC Converter  

Authors: Rakshith P, Jahnavi R Bhat, Ashvini M, Rakshitha C R, Vinay Kumar Sharma

Page No.: 722 – 726

 

137. An Approach to the Detection of Retinoblastoma based on Apriori Algorithm  

Authors: Pradeep Kumar K G, Dr. Karunakara K, Dr. Thyagaraju G S

Page No.: 733 – 738

 

138. Intuitionistic Hesitant Fuzzy Filters in BE-Algebras  

Authors: Hamid Shojaei, Neda shojaei

Page No.: 739 – 745

 

139. Challenging Problems in Data Mining and Data Warehousing  

Authors: Esha Rana, Dashrath Mane

Page No.: 746 – 752

 

140. Effect of Welding Parameters on the Mechanical Properties and Microstructure of BQ Plateastm SA 516 – 60 Grade  

Authors: Arvind B. Totey, Abhishek Lad, Aditya Takote, Kiran Dhawale, Bhaskar Yadav

Page No.: 753 – 756

 

141. Dynamic Policy Update on Cloud for File Access  

Authors: Shrikant Malge, Prof. Snehal D. Chaudhary, Priyanka Paygude, Shrikala Deshmukh

Page No.: 757 – 761

 

145. DC Line-to-Ground Fault Analysis for VSC Based HVDC Transmission System  

Authors: Ashwini K. Khairnar, Dr. P. J. Shah

Page No.: 773 – 778

 

146. BSRS: Best Stable Route Selection Algorithm for Wireless Sensor Network Applications  

Authors: Shivali Shrivastava, D. Srinivasa Rao, G. Sriram

Page No.: 779 – 785

 

147. Analysis and Design of Power Gated Low-Power, High Performance Latch Dynamic Double-Tail Comparator  

Authors: Ramprakash Gupta, Mr. Charanjeet Singh

Page No.: 786 – 793

 

149. Wireless Sensor Node for Industry 4.0  

Authors: Anantharama Somayaji, V Nattarasu

Page No.: 797 – 799

 

150. Development of a New Model for Population Prediction in Anambra State, Nigeria  

Authors: Okeke, Ogochukwu Clementina, Dr. Onyesolu, Moses Okechukwu, Ndigwe, Chinwe F.

Page No.: 800 – 805

 

151. Securing Communication in MANET through E-GAMAN Algorithm  

Authors: Deepali Aggarwal

Page No.: 806 – 810

 

152. EHG Signal Classification for True and False Pregnancy Analysis  

Authors: Uzma Fatima, Prof. Tirupati Goskula

Page No.: 811 – 814

 

154. An Innovative Method to approach Operational Feasibility Study for Making the Software Popular  

Authors: Prof. Rasendu Mishra, Prof. Rushabh Shah, Prof. Ajaykumar M Patel

Page No.: 823 – 825

 

155. Comparison of Microstrip Patch Antenna using Different substrate Material for Multiband Application  

Authors: Mohd Gulman Siddiqui, Kamakshi, Abhishek Saroj, Prof J. A. Ansari

Page No.: 826 – 831

 

156. Artificial Neural Network-based Approach for Plate Segmentation and Character Recognition  

Authors: Ms. Shabnam Sangwan, Nitin Dalal

Page No.: 832 – 837

 

157. A Neural Network-based Approach for the Machine Vision of Character Recognition  

Authors: Ms. Shabnam Sangwan, Nitin Dalal

Page No.: 838 – 841

 

158. Matrix Transformation between Geometric Difference Sequence Spaces  

Authors: Khirod Boruah

Page No.: 842 – 851

 

159. Fuzzy Analysis for Nodes Deployment Strategies in Wireless Sensor Network  

Authors: Vishal Choudhary, Dr. S.Taruna

Page No.: 852 – 855

 

160. Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification  

Authors: Dr. B. Sateesh Kumar, Ms. V Uma Rani, Mustafa Saad

Page No.: 856 – 859

 

161. EOAODV: Routing Protocol for Cognitive Radio Network  

Authors: Shishir Borkar, Dr. S. M. Ali, Anam Quadri

Page No.: 860 – 864

 

162. Hybrid TUI Abacus Model: An Advance Tool for Learning Math  

Authors: Shyamsunder G. Goswami, Suraj Kutteri, Mona Deshmukh

Page No.: 865 – 870

 

163. Continuous and Discrete Time Analysis of Network in NS2  

Authors: Preeti Wadhwa, Himanshi Saini

Page No.: 871 – 875

 

165. Measures for Cost Escalation in Bridge  

Authors: Rahul Munde, Prof. Ashish Waghmare

Page No.: 881 – 885

 

166. Optimization of Solar Energy Tapping by an Automatic Solar Radiation Tracker  

Authors: Bikash Monger, Jigme Namgyel, Kelzang Tenzin, Namgay Dorji, Dechen Lhamo

Page No.: 886 – 892

 

167. Cap Like and Star like Complex Functions  

Authors: Dr. T. Ravi

Page No.: 893 – 908

 

168. Financial Literacy and Financial Inclusion: A Case Study of Punjab  

Authors: Neha Sharma

Page No.: 909 – 916

 

169. Clustering of Bootstrap for Web Service Discovery  

Authors: S. Sagayaraj, M. Santhoshkumar

Page No.: 917 – 921

 

171. Solution of Variable Coefficient Fuzzy Differential Equations by Fuzzy Laplace Transform  

Authors: Komal R.Patel, Narendrasinh B.Desai

Page No.: 927 - 942

 

172. Review Paper on Zigbee based Secured Wireless Communication by using DES Encryption  

Authors: Renuka Londhe, Shalmali Kumawat, Pooja Gaware, C. K. Bhange

Page No.: 943 – 944

 

173. Optimal Placement and Sizing of Distributed Generators by Using Voltage Indexing & Heuristic Method  

Authors: Aadesh Kumar Arya, Amit Kumar, Akhilendra Yadav

Page No.: 945 – 949

 

174. Meter Data Acquisition System  

Authors: Sonia, Dr. Neetu Sharma

Page No.: 950 – 953

 

176. Ad-hoc Networks Energy Management Techniques  

Authors: Arun Kumar Dey, Padma Bonde

Page No.: 960 – 964

 

177. An Extended Review on Fabric Defects and Its Detection Techniques  

Authors: M. Dhivya, Dr. M. Renuka Devi

Page No.: 965 – 977

 

180. Preventing and Detecting Technique of Black Hole Attack in MANET AOMDV  

Authors: Kavita Rani, Surender Singh

Page No.: 990 – 993

 

182. Internet Search Tool with Query Builder for Users in Rural Area  

Authors: Reena Lokare

Page No.: 1002 – 1004

 

183. An Efficient Cross-Domain Recommendation Technique in Cold-Start Situations  

Authors: V. Kiran Kumar Reddy, K. Ramesh, T. Subramanyam

Page No.: 1005 – 1010

 

185. Donut Shaped Ultra wideband Antenna for Cognitive Radio Application  

Authors: Anam Quadri, Dr. S. M. Ali, Shishir Borkar

Page No.: 1017 – 1019

 

186. Optimization of Path Selection in MIMO  

Authors: V. Santhiya, Dr. M. Uma Devi

Page No.: 1020 – 1025

 

187. Working Model of Refrigerator cum Air conditioner  

Authors: Sharma Vivekkumar Kiritbhai

Page No.: 1026 – 1033

 

189. Internet of Things Based Technology for Smart Home System: A Generic Framework  

Authors: Markandeshwar Jerabandi, Mallikarjun M Kodabagi

Page No.: 1038 – 1046

 

190. Avoidance of Black Hole and Gray Hole Attack in MANET using Hash Function based  

Authors: Munish Wadhwa, Ashwani Sethi

Page No.: 1047 – 1051

 

191. Control bit Based Congestion Control in Mobile Ad-hoc Network using OLSR Protocol  

Authors: Sukhwinder Singh, Vijay Laxmi

Page No.: 1052 – 1056

 

192. Overview of Indexes Used in NOSQL Databases of MongoDB Architecture  

Authors: Ms. Poonam Verma, Ms. Arpana Chaturvedi

Page No.: 1057 – 1059

 

193. Time Efficient Dynamic Processing of Big Data for Remote Sensing Application  

Authors: Mr. Vikas Dudhe, Prof. Gunjan Agre

Page No.: 1060 – 1066

 

194. Conceptual Approach of Hybrid DWT and SVD based Digital Image Watermarking for Fingerprint Security  

Authors: Zareen Khan, Prof. Tirupati Goskula

Page No.: 1067 – 1072

 

195. A Dynamic Parallel and Pipelined Architecture for Intra Prediction in H.265 Standard  

Authors: Diwakar K.R, Swamy T N, K Ramesha

Page No.: 1073 – 1077

 

196. SHED: Spam Ham Email Dataset  

Authors: Upasana Sharma, Surinder Singh Khurana

Page No.: 1078 – 1082

 

197. A Novel Framework for Big Data Security Infrastructure Components  

Authors: Manpreet Kaur, Alpa Shah

Page No.: 1083 – 1088

 

199. A Approach to Optimal Strategy for Energy Efficiency in Cloud System  

Authors: Shruti Dadhich, Prof (Dr.) Vibhakar Pathak

Page No.: 1097 – 1101

 

200. Role of EYCDFA for Optical Communication System  

Authors: Kulwinder Singh, Karan Goel, Kamaljit Singh Bhatia, Hardeep Singh Ryait

Page No.: 1102 – 1106

 

202. A Preface on Android Malware: Taxonomy, Techniques and Tools  

Authors: Rashmi Rupendra Chouhan, Alpa Kavin Shah

Page No.: 1111 – 1117

 

203. Importance of HRIS: A Critical Study on Service and Auto Sector  

Authors: Prof. Swati Bankar, Prof. Dr. M. D. Kakade

Page No.: 1118 - 1121

 

204. Architecture Analysis of NIASN  

Authors: Amardeep Gupta

Page No.: 1122 – 1124

 

205. Fuzzy Clustering in Web Mining  

Authors: Dr. A. B. Raut

Page No.: 1125 – 1130

 

207. Introduction to Fluids in Motion  

Authors: V. Manjula, Dr. K. V. Chandrasekhar

Page No.: 1137 – 1139

 

208. Discrete Wavelet Transformation Implementation in GPU through Register Based Strategy  

Authors: Hemkant Balasaheb Gangurde, M. U. Kharat

Page No.: 1140 – 1145

 

209. Review Analysis of Automated Mobile Application Testing  

Authors: Sapana Desai, Prashant Keswani

Page No.: 1146 – 1149

 

210. Emotion Based Information Retrieval System  

Authors: Bhavana Tiple, Prof. Achamma Thomas

Page No.: 1150 – 1153

 

212. Integrated Page Rank Algorithm of Optimization Search Engine - Semantic Search Engine  

Authors: Rahul Mestry, Rajesh Gawari

Page No.: 1159 – 1160

 

214. Two Warehouse Inventory Model for Deteriorating Products with Stock Dependent Demand and Shortages  

Authors: Rajendrakumar, Amit Kumar Attri, SR Singh, Sachinkumar

Page No.: 1166 – 1176

 

216. Comparison of Classification rules for Predicting Personality  

Authors: Mixymol V.K.

Page No.: 1183 – 1186

 

217. VLSI Realization of Switched Hamming Neural Network for 3-Bit Digit Recognition  

Authors: S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

Page No.: 1187 – 1190

 

218. Design and Analysis of Current Mirror Circuits on HSPICE 180nm Technology  

Authors: S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

Page No.: 1191 – 1195

 

219. VLSI Implementation of Modified Hamming Neural Network for non Binary Pattern Recognition  

Authors: S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

Page No.: 1196 – 1198

 

220. Multihead Node Selection Technique for Improving Lifetime and Energy Efficiency of WSN  

Authors: Ms. Sonali Gadwar, Prof. D. M. Sable

Page No.: 1199– 1208

 

221. Implementation Ids for Web Security Mechanism against Injection and Multiple Attacks  

Authors: Pranali Mankar, Prof. Jayant Adhikari

Page No.: 1209– 1213

 

222. Event Based Rumor Detection on Social Media for Digital Forensics and Information Security  

Authors: Anamika Joshi, Dr. D. S. Bhilare

Page No.: 1214 – 1218

 

223. A Hybrid Image Encoding Technique with DCT and Mosaic based Segmentation  

Authors: M. Varalakshmi, Dr. Ch. Ramesh

Page No.: 1219 – 1222

 

224. Security Aspects of Mobile Based E Wallet  

Authors: G. Kanimozhi, K.S. Kamatchi

Page No.: 1223 – 1228

 

225. Building a GUI Application for Viewing and Searching Apache Kafka Messages  

Authors: Shivkumar Goel, M Prabhanath Nair, T Varghese John

Page No.: 1229 – 1231

 

226. Ant Colony Optimization for Efficient Resource Allocation in Cloud Computing  

Authors: Harshitha H D, Mrs. Beena B M

Page No.: 1232 – 1235

 

227. Efficient Text Classification of 20 Newsgroup Dataset using Classification Algorithm  

Authors: Karishma Borkar, Prof. Nutan Dhande

Page No.: 1236– 1240

 

228. Preprocessing and Feature Selection on Group Structure Analysis using Entropy and Thresholding  

Authors: Ms. Prajakta Deshmukh, Prof. Jayant Adhikari

Page No.: 1241– 1244

 

229. Fusion of Two Images using DWT and PCA Methodology  

Authors: Miss. Yashashri Katole, Prof. D. M. Sable

Page No.: 1245– 1248

 

230. E-learning – An Indian Perceptive  

Authors: Miss Deepali Pande, Dr. V. M Wadhai, Dr. V. M Thakare

Page No.: 1249 – 1251

 

231. Overcoming the Challenges in implementing e-Governance in Rural India  

Authors: Dr. Sandeep Aggarwal

Page No.: 1252 – 1255

 

232. Cybercrime and Cyber Law Pertaining to India: An analysis  

Authors: Shinde Kashmira Jayvant, Rekha P.

Page No.: 1256 – 1260

 

233. A Treatise on the use of Finger Print for a Biometric Authentication System  

Authors: Jayati Ghosh Dastidar

Page No.: 1261 – 1265

 

234. Capability Analysis of Attacks in Wireless Sensor Network  

Authors: Neha Singh, Dr. Deepali Virmani

Page No.: 1266 – 1270

 

235. Analyatical Study and Evaluation of Database Optimization Techniques  

Authors: Jayana Ahuja, Gayatri Kapadia

Page No.: 1271 – 1274

 

236. Cluster based Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks  

Authors: Mr. Amol Deshmukh, Mr. Rahul Chinchore

Page No.: 1275 – 1280

 

237. A Multiple Classifier Approach to Improving Classification Accuracy Using Big Data Analytics Tool  

Authors: Geetha. P, Dr. Chandrakant Naikodi, Dr. Suresh L

Page No.: 1281 – 1285

 

238. Synchronization of Microgrid by Actively Controlling Parameter  

Authors: Rinky S. Maity, Ganesh Mhatre

Page No.: 1286 – 1293

 

239. An Analysis of Clustering Algorithms for Big Data  

Authors: B. Bikku, P. Praveen

Page No.: 1294 – 1299

 

240. Survey of Impact of Technology on Effective Implementation of Precision Farming in India  

Authors: Meena Kushwaha, Dr. V. R. Raghuveer

Page No.: 1300 – 1310

 

241. In Silico Vaccine Design for Multidrug-Resistant Staphylococcus Aureus Clumping Factor A (ClfA)  

Authors: Shilpa M. D, Sulochana M. B, Anil Kumar S

Page No.: 1311 – 1316

 

242. Geographic Routing in Clustered Wireless Sensor Network  

Authors: Shaziya Parveen Umar Khan, Dr. A. S. Khan

Page No.: 1317 – 1319

 

243. A Survey on Various Routing Protocols in Manet with Various Protection Schemes  

Authors: Suman Bala, Er. Amandeep Singh Bhandari, Dr. Charanjit Singh

Page No.: 1320 – 1325

 

245. Survey on Mobile Social Cloud Computing (MSCC)  

Authors: Rakshit Gupta, Piyush Kumar Shukla, Rajeev Pandey

Page No.: 1332 – 1340

 

246. Lossless Transmission Lines Terminated by Linear and Nonlinear RLC-Loads  

Authors: Vasil G. Angelov, Marin M. Hristov

Page No.: 1341 – 1352

 

248. Performance Evaluation of EM and K-Means Clustering Algorithms in Data Mining System  

Authors: Shaik Firoj Basha, Dr. S. Ramakrishna

Page No.: 1358 – 1360

 

249. Design of an Efficient Viterbi Decoder using Xilinx  

Authors: Nishat Khan, Dr. A.S Khan

Page No.: 1361 – 1363

 

250. Service Recommendation System using Social User’s Rating Behaviors  

Authors: Atul K. Jamnekar, Prof. P. B. Sambhare, Prof. P. D. Soni

Page No.: 1364 – 1369

 

251. Use of Metaheuristic Algorithms in Malware Detection  

Authors: Wasiur Rhmann, Gufran Ahmad Ansari

Page No.: 1370 – 1374

 

253. Cloud Based Framework for Autism Spectrum Disorder Therapy App  

Authors: Nagaraj G, Sumanth Simha C, Samarth S, Dr. Indiramma M

Page No.: 1379 - 1383

 

254. Devlopment and Analysis of Natural Banana Fiber Composite  

Authors: Asabe Popat, B Bhosale S.B.

Page No.: 1384 – 1386

 

255. Big Data Clustering Algorithm and Strategies  

Authors: Nithya P, Kalpana A M

Page No.: 1387 – 1391

 

256. Healthcare Monitoring System  

Authors: Mrs. A. G. Andurkar, Ms. Suvarna S. Patil

Page No.: 1392 – 1406

 

257. Energy Efficient Cluster Head Selection Method in Wireless Sensor Network  

Authors: Ms. Navneet Kaur Cheema, Prof. Simarjot Kaur

Page No.: 1407 – 1411

 

258. Graphical Analysis on Text Mining Unstructured Data Using D-Matrix  

Authors: Sneha P. Mendhe, Kapil N. Hande

Page No.: 1412 – 1416

 

259. A Review on Applications of Peltier Devices  

Authors: Upendra Kumar, Rajbir

Page No.: 1417 – 1418

 

260. Wireless Security System with Password Protection  

Authors: Upendra Kumar, Manjeet Kaur

Page No.: 1419 – 1421

 

261. Implementation on Health Care Database Mining in Outsourced Database  

Authors: Monali Gainkar, Sonali Bodkhe

Page No.: 1422 - 1427

 

262. Cluster Heads Based IEEE 802.11P And LTE Hybrid Design for VANET Safety Message Dissemination  

Authors: Vinjamuri supraja, T.Vandana

Page No.: 1428 – 1432

 

263. Brain Alzheimer’s disease Detection in Magnetic Resonance Images Using Image Processing  

Authors: Mumtaz Ahmed, Danish Raza Rizvi

Page No.: 1433 – 1436

 

264. A DOM-Tree based Representation of Web Document Structure for Web Mining Applications  

Authors: Manoj Kumar Sarma, Anjana Kakoti Mahanta

Page No.: 1437 – 1439

 

266. Hand Gesture Classification Using Emg Signal  

Authors: Arshi Anjum, Prof. Muzaffar Khan, Sana Ali

Page No.: 1443 – 1447

 

267. Implementations of the IoT Devices in the Agriculture Fields  

Authors: Devik Vekriya, Malav Vasita, Dr. Rajan Datt, Prof. Dhaval Jha

Page No.: 1448 – 1451

 

268. Different population-based algorithms for Travelling Salesman Problem: A Review Paper  

Authors: Harleen Kaur, Er. Harmandeep Singh

Page No.: 1452 – 1454

 

269. Implementation of Multicast Routing on IPv4 and IPv6 Networks  

Authors: Dr. Sridevi

Page No.: 1455 – 1467

 

270. Dimension Reduction in Big Data Environment-A Survey  

Authors: Saheli Ghosh, Mainak Sen

Page No.: 1468 – 1474

 

271. The Smart Guide Cane for Assisting the Visually Challenged for Indoor  

Authors: Pallavi B. Thawakar, Dr. N. N. Mhala

Page No.: 1475 – 1478

 

272. A Cyber -Physical System for Industrial Air Pollution Monitoring using Raspberry Pi  

Authors: Supriya M. Wasnik, Prof. Sunil Gupta

Page No.: 1479 – 1481

 

273. Comparitive Study of Plain Foundations with Shell Foundations  

Authors: Wrushali Punwatkar, Prof. G D Dhavale

Page No.: 1482 – 1484

 

274. Enhancement of Security of Digital Data with Steganography Technique  

Authors: Arpana Bharani, Dr. Jitendra Sheetlani

Page No.: 1485 – 1487

 

275. Review of MAC Unit for Complex Numbers  

Authors: Priyanka W. Kinge, Prof. Dr. D. R. Dandekar

Page No.: 1488 – 1490

 

277. Comprative Study Kirchoff’s and Tutte Matrix Theorem  

Authors: Dr. Sudhir Prakash Srivastava

Page No.: 1497 – 1501

 

278. Electricity Generation of Solar Photovoltaic System  

Authors: Ahmad Faizan Sherwani

Page No.: 1502 – 1506

 

279. Secure Powerline Communication for Rural and Hilly Areas  

Authors: Arshad J. Ali, Prof. Shubhangi Borkar

Page No.: 1507 – 1510