Welcome to Reseach & Development Manager (Member Login )


Research and Development Manager is the innitiative taken by our organization to serve the GENXT Researchers in field of

 

 

 

 Networking, Communication and Software Development and provide with the facility to explore more and more..............

 

 

IJAIR- Volume 2 Issue 4

 

 

   

Sr/ No Title Pdf
1 Security and Energy Efficient Communication Scheme in Mobile Ad Hoc Networks
R.Aiyshwariya Devi,E.Devi priya
2 Comprehensive Survey On Face Tracking In Real Time Video
Amit Bhoomkar, Ajay Kulkarni and Somnath Gosavi .
3 A Survey New: Attribute-Based Encryption for Personal Health Records in Cloud Computing
Anitha A, Thamaraiselvi k
4 Detection of Unknown Anomaly on Network - The Emerging Way
Anup G. Kadu, Dr. A.S.Alvi
5 COMPUTER AIDED ANALYSIS ON THOUGH TYPE OF R.C.C FOLDED PLATE
ARUN H. TEJANI, A.A. PARIKH
6 Spinning LED Display Using GSM Interface
Ashutosh Shelke, Bhushan Varadkar, Sameer Tanksale , S.R. Wategaonkar
7 A 1.5 V Current Mode Winner Take All
Behzad Ghanavati, Zohreh Manoochehri
8 A 1.5 V Minimum Current selector circuit Jamming Attacks
Behzad Ghanavati, Milad Kaboli, Zohreh Manoochehri
9 An Intelligent Robot for Bomb Detection with Wireless Video Transmission
Babul Kumar, Debadas Khuntia, Chhote Lal Kumar Ram
10 Vertical handoff algorithm for wireless network
Bhaumik S. Khakhil, Bhavin I Patel, K.M.Pattani
11 A Review of Analysis of Cable-Stayed Bridge Subjected To Seismic Excitetion Using Sap2000
Bhavesh Mangukiya B., Suhasani Kulkarni M.
12 PIXEL BASED CORRELATION OF SAD AND SSD ALGORITHMS FOR DISPARITY MAP USING MULTIVIEW IMAGES
CHIRAG D. PATEL , KAPIL S. RAVIYA
13 Image Segmentation by mixing of various EDGE Detection Techniques
C.H.Bhabhor, A.B.Upadhyay, V.D.Baria
14 Constructivist Learning Model In Writing Learning Indonesian
Nunuy Nurjanah
15 Public Diplomacy For Good Governance
H.A. Asep Saefudin
16 Simulink Based Verification Model for ZigBee Transceiver
Dipak V. Vaniya, Sima K. Gonsai
17 USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT- ORIENTED SYSTEMS
K.G.S.VENKATESAN, M.ELAMURUGASELVAM
18 Location Estimation in Cellular Networks Using Artificial Neural Networks
A.Gouthami , k.Vijayasri , B.Anil Singh , M.Kamalesh , G. Narendra Naik
19 Secure Data by Espionage Method using Substitution+Steganography
Grishma Trivedi, Chirag Patel, Kishor Bamniya
20 Firewall Scenario and Issues
Gursimrat Singh, Amitoj kaur, Amardeep Singh
21 Gradient Feature Based Image Super Resolution Using Neighbor Embedding
Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi
22 A Survey on Load Balancing Techniques in Cloud Data Center using VM Migration
Hitesh B Patel, Prashant B Swadas, Sudarshan N Patel
23 A SYSTEM FOR NEGLIGENT BIKE RIDERS
JAI RAJESH.P, ARIFA BEGAM.A
24 IEEE 802.3 MAC Transmitter Using FSM and VHDL Techniques
MR. JANAK A.PATEL, PROF. PANKAJ P.PRAJAPATI, PROF. PIYUSH R. KAPADIYA
25 A Privacy-Preserving in Wireless Sensor Networks using generalization and suppression methods
B.Karthika,J.K.Jeevitha
26 Discrete Wavelet Transform (DWT) and Singular Value decomposition (SVD) applied to Digital Image
Mrs.S.Jothi Lakshmi, Dr.VE.Jayanthi
27 A Novel Approach - Effective Method of Prevention of Cache Poisoning for Wild Card Secure DNS
K.Sampath Kumar , Dr.G.K.D.Prasanna Venkatesan , R.Vignesh
28 Reputation with Lie-Detector Scheme to Restrict Black Hole and Selfish nodes in MANET ¬
Kanimozhi.M,Madhavi.S
29 Improving Trustworthiness Of Websites Using Truth Finder Algorithm
Mrs.G.Kirubasri , Mrs.A.Sathya Sofia
30 Dimensionality Reduction in Text Classification using Feature Reduction Approaches
P. Kiruthiga
31 INTERNET2 FOURTH GENERATION INTERNET
Latika Chaudhary, Sangita Panmand, Prachi More,Prof. M.A.Devmane
32 Genuine Route Identifier (GRI) scheme for USOR to Restrict Worm hole Attack in MANET
Maharani.R,Kanagaraju.P
33 Collection of Sensor data in an energy efficient manner using Rendezvous based approach Environment
Mrs.S.Pushpalatha, P.Manoj Kumar,
34 Designing of A new Low Voltage Low Power Tunable Fuzzy Logic Controler Chip
Milad Kaboli, Behzad Ghanavati
35 SECURING WEB SERVER AND DATABASE SERVER FROM QUERY PRIVILEGE AND INJECTION ATTACKS
T.Mohana,
36 Improving Performance of Search Engines using Morphology
Nargis Parveen, Mohd Athar
37 Paper 37  available at last of this page  
38 Noise Level Estimation Deblurring using Directional Filters
Miss.Pallavi Mankar, Miss.Mrunal Datir, Miss.Sonali Rathi
39 A Location Privacy Using Monitoring System for Wireless Sensor Networks
D.Udhaya Kumara Pandian, P.Natarajan
40 Collaboration of Two Approaches for the Detection of Outlier
Niketa V. Kadam , Prof. M. A. Pund
41 Privacy Preserving in Association Rule mining
Nilesh R. Radadiya, Nilesh B. Prajapati, Krupali H. Shah
42 Medical Application Based on Wireless Sensor Network
Niraj Patil, Asip Mulla, Prasad Nikam, Dipak Shinde
43 OPTIMIZED TRAVELING SALESMAN PROBLEM USING ESTIMATION MAXIMIZATION TECHNIQUE
D.Nithya, Dr.B.G.Geetha,
44 THE EFFECT OF MEASURING PROCEDURE ON THE APPARENT RHEOLOGICAL PROPERTIES OF SELF-COMPACTING CONCRETE
MR. V.A. PATEL, S.M. KULKARNI
45 RECENT TRENDS IN MOBILE TV TECHNOLOGY
Prachi P. Londe
46 Domain Decomposition Based Game Theory to Arrive Optimal Video Streaming Pricing Policies
N.Prakash, P.Manimaran
47 Analysis and Basic Implementation of Audio Watermark in Digital Image
P. S. Patel, N. M. Patel, U. K. Jaliya.
48 Dependable and Protected Storage Services in Cloud Computing
M.Shanmugapriya,
49 Retrieving Energy Using Peltier Effect
Vibhav Sharma , Priyam Ganguly, Syed Md. Taqiudeen , B.karthik
50 Software Testing Approach for efficient Bug finding with Yin-Yang Testing Theory
Gaurav Saini, Kestina Rai
51 Data retrieval from cloud with cache implementation
K.Venkata Raju , P. Dinesh, M.Sudheerraja
52 CRIME PATTERN ANALYSIS USING SPATIAL DATA MINING
R.Ragunath, P.Sathishkumar
53 VHDL Implementation of Viterbi Decoder by Butterfly Module
Mr.Rajan N. Shah,Mr.Altaf I. Darvadiya
54 EFFECTIVE PREPROCESSING TECHNIQUE FOR BETTER BORDER DETECTION
K.Rajesh , and A.Gnanabaskaran
55 Prevention of Pollution Attacks and DoS Attack in Network Coding Using Node Identity Verification Scheme
R. Karthick, K. Chandraprabha and B.G.Geetha
56 EFFECTIVE OPTIMAL SEARCHING MECHANISM USING TEXT MINING
J.E Nalavade,Ruchi Priya,Priya Koul,Riya and Manish Anand
57 Efficient Database Indexing Techniques using Cluster, Non-Cluster and Full Text Indexing
Mr. Kawhale Rohitkumar K., Miss. Prachi Patil M., Mr. Chabukswar Mandar U.
58 IDENTIFYING FALSE ALARM IN SELFISH REPLICA ALLOCATION
K.Sathyaseelan,S.Rinesh
59 Heterogeneity in Stochastic Frontier Models
. V. SEETHA LAKSHMI
60 MOVING OBJECT DETECTION IN AIRBORNE VIDEOS
Selvakumar S, Rajalakshmi K
61 AN EFFICIENT APPROACH FOR INCREASING POWER OPTIMIZATION IN MOBILE ADHOC NETWORKS
M. Senthil Kumar, Dr. Ashish Chaturvedi
62 A Comparative Analysis of Reactive and Proactive Routing Protocols in Mobile Ad-hoc Networks
Shiva Prakash, J.P. Saini, S.C. Gupta
63 Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi
64 A Comprehensive Study of Cryptography and Digital Signature
Sonia, Dibjot Kaur
65 Learning Structure in Cloud (Implementing SaaS)
Ambati Nikhila, K.V.D.Kiran, V.Sreenivas
66 Comparative Study on hardness of As-cast and heat treated Al based hybrid composites
M. Sreenivasa Reddy, Dr. Soma V. Chetty
67 A SCIENTIFIC APPROCH FOR FILTER DESIGN IN SPATIAL DOMAIN IMPULSE NOISE REMOVAL IN DIGITAL IMAGES
Dr.B.SRINIVASARAO
68 Reconfigurable Architecture of FPGA Based Image Compression Using DWT
D.Vanathi, S.Rajkumar, D.Thamarai Selvi
69 STATCOM BASED MITIGATING POWER QUALITY ISSUES IN GRID CONNECTED WIND ENERGY SYSTEM USING LABVIEW
S.Venkateshwaran , G.Vijaya gowri
70 Experimental investigation of vortex flow visualization using various fluids
Vijay Kumar. S, Dr. K. V. Sreenivasa Rao & Dr. A. N. Khaleel Ahmed
71 Effect of Aerodynamic Force in Modern Cars
M.Venkatasudhahar, T.Manvelraj
72 Spectrum sensing techniques and power control algorithm using power swarm optimization for cognitive radio
Yogesh N. Kakadiya ,Kiran Parmar
73 UTILITY WIRELESS MULTIPOINT CIRCULAR AND EMERGENCY MESSAGE TRANSFER SYSTEM
BABU SAHEB, ASHOK KUMAR, ABHISHEK SINGH, ABHISHEK SINGH
74 Optimal Cost for VANETS Streaming Distributions
Abir Biswas ,Kailash Kumar Sinha, Dr. T. Nalini
75 Sentiment uncovering by employ of Biometrics techniques
Dr.Kashif Qureshi
76 BIOMETRIC AUTHENTICATION FOR A MOBILE PERSONAL DEVICE FOR ACCESING WEB SERVICES
Akash Kanshal, Pankaj Kr Giri, Dr.C.Nalini
77 A System for Email Users Clustering, Automatic Answering and Automatic Text Summarization.
Akshay Jayale, Sudershan Karad, Sudhakar Gawade
78 DYNAMIC PORTABILITY AND STREAMING OF ADVERTISEMENTS BASED ON CONTENT AWARE AND USER INTEREST PROTOCOL
ASISH KUMAR DODKA,AMITABH KUMAR,DR.A.KUMARAVEL
79 A Review Paper on Wireless Sensor Networks: Applications and System
Amitoj Kaur , Gursimrat Singh
80 Survey on Digital Image Watermarking: Techniques and Attacks
Amitoj Kaur, Jagroop Kaur
81 Trendsetter:Location Service using Android
Prof. Vidya Chitre, Amritansh, Deepratna Aditya, Deepak Pandey
82 Nonlinear Effects and its Impact on WDM Systems in Optical Fiber Communication
Anupjeet Kaur
83 DETECTION OF VITAL SIGNS IN PATIENT MONITORING SYSTEM BASED ON ANYCAST MODE
S.M.Shakir, Avanish Dubey, S.Pothumani
84 Discovering a Pattern in Effective Manner
Avinash S Shegokar, Rohit S Jachak, Ashish Yerawar
85 A 1.5v CMOS Fuzzifier Using Adaptive Biasing
Behzad Ghanavati, Milad Kaboli
86 Analysis of Integrating RFID technology in B2B applications
Mr.S.Balamurugan, Mr.E.Gurumoorthi, Mr.R.Ramakrishanan, Mrs.M.Vasuki
87 Non-linear Static Analysis of RC Frame Building with and without Shear Wall
Mr. Bhargav D. Patel, Prof. S. M. Kulkarni
88 3rd Level Image Hiding Technique Using Alpha Blending Method
Bhavna A Marwada ,Yagnesh J Parmar , Kishor Bamniya
89 Video Transmission in WMSN Environment using Compressed Sensing Technique
Chetan S. Deshmukh, Prof. S.V.Dhopte
90 Wavelength Division Multiplexing Passive Optical Network: review paper
Chinky rani , Kulwinder Singh , Bhawna utreja
91 Single Phase Online UPS Employing Advanced Charging Technology with Power Factor Corrected Rectifier
Chintan Patel, Dipendrasinh Parmar, T. B. Maniar
92 State-of-art review on Study of high performance concrete containing supplementary cementitious materials
MR.D.V.SONI, S.M.KULKARNI, DR.V.P.PAREKH
93 Managing the Denial-of-Service Attacks Using Rectified PPM Algorithm
V. Midhun, T. Nalini, M. Padmavathy
94 Static Analysis of Composite Mono Leaf Spring For LCV (TATA ACE ) - Design, Manufacturing and Testing
Mr. P.B.Patole , Mr. Jeevesh Kumar , Mr. A.S.Kondi , Mr. G.B.Kalukhe , Mr. A.H.Gongane , Mr. S.R.Ingole
95 Quality Classification of Peanut using Computer Vision Technique
Govind Chaudhari, Kinjal Mehta
96 Topic Identification Using Temporal and Concept Relationship Analysis on Text Streams
Jayalakshmi.M, Gunavathi.C
97 IMPLEMENTATION OF SPECT TECHNIQUE IN DETECTION OF CANCER
Chagamreddy Jhansi, K.S.Roy,Shaik Mahaboob Ali
98 Various Cellular Generations –A survey
M.UdhayaMoorthi,M.jagadesh,C.MageshKumar
99 End-to-End Delay caused by M/M/1 Queuing Model
Kiran Gowda.C, K.C.Gouda, K.Raghuveer, Kumuda.M.N
100 SOME ATTACKS ON CRYPTOGRAPHIC HASH FUNCTIONS
C. Krishna Kumar , Dr. C. Suyambulingom
101 OPTICAL CHARACTER RECOGNITION USING NEURAL NETWORK
Krunal H. kubavat , Sima K. Gonsai
102 Effective Human skeleton extraction from single monocular video
A.MADESWARAN, and Dr. K.SAKTHIVEL
103 MULTIFACTOR AUTHENTICATION FOR E-COMMERCE APPLICATIONS
Namita Redkar, Manish Yadav, Prof. D.R. Ingle
104 DESIGN and ANALYSIS of POST TENSIONED PRESTRESSED CONCRETE MEMBER by USING ADAPT SOFTWARE
Mayank I. PATEL, S. M. KULKARNI,
105 A Study of Teacher’s perception with special reference to English as a second Language
Mohammed Sajid
106 Optimization Approach to Link and Power Allocation in Cellular Networks
M.N.Mehta, Dr. K.R.Parmar
107 Designing Of A New 0.18um CMOS Voltage Mode Squar Root Analog Multiplier
Milad Kaboli, Behzad Ghanavati
108 New Design Of A 0.18µm CMOS Low Power High Frequency Four Quadrant Multiplier
Milad Kaboli
109 Design a novel Low-Noise ,High Gain and High Bandwith Amplifire for 5GHz Wireless Recivers
Farhad Amiri, Milad kaboli
110 AUTOMATIC VEHICLE STARTER SYSTEM BASED ALCOHOL BREATH ANALYZER SENSING
LILU MAHTO ,RITESH KUMAR ,SANTOSH KUMAR, Mrs. SARAVANA.S M.E
111 WATER LEVEL CONTROL SYSTEM USING PLC AND SCADA
MD HASNAIN ,RAKESH RANJAN ,AMOD KUMAR SINGH
112 Status of Soil and Water Conservation Practices in Tigray Region, Ethiopia: A Case Study
Mushir Ali
113 Smart Class using Wireless Technique
MD PARWEZ ALAM, PANKAJ TRIPATHI, NISHANT KUMAR VIDHYARTHI, SARAVANA.S
114 An Remote Data Possession Checking (RDPC) Protocol for Storage Security in Cloud.
Naganandhini.S,
115 Spatio-Temporal Network Anomaly Detection By Assessing Deviations Of Empirical Measures
Nihar Ranjan Sethy, T. Nalini, M. Padmavathy
116 Dynamic Detection Strategy Based Flow Analysis Scheme for Flash Crowd Attacks
Narmadha.B,AyyaMuthukumar.D,Kannan.M
117 PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs
Rahul Sanskritayayan,Nidhi Raina,Sunil Jadhav,KanchanDoke
118 Steganographic Secure Data Communication –A Hardware Approach
Mrs.A.N.Naik, Prof.R.T.Patil , N.B.Naik
119 A DYNAMIC APPROACH TO IMPROVE THE TRANSMISSION EFFICIENCY IN WIRELESS AD HOC NETWORK
S Nivedha, S Raghul Krishna, T Ramyapriya, P Boopathi
120 Cloud Computing: Alternative to Enormous In-House Data Centers
Prof. Pallavi S. Kadam , Prof. S. B. Patil
121 OPTIMAL STOCHASTIC LOCATION UPDATES IN MANET USING DREAM ALGORITHM
P.Poonkodi, P.Boopathi , Prof.T.Kalaikumaran
122 Performance Evaluation of Canny Edge Detector for Noisy Images
Priya Arora, Dr. Lakhwinder Kaur
123 Authentication in Cloud Computing
Mr. Amey Hawal, Mr. Rahul Mirajkar, Mr. Sagar Lad Miss.Pouravi Kadam , Miss.Sayali Jamadade
124 Advanced Multimedia Messaging Services for Improving Examination Result System
Mr. Rahul. P. Mirajkar, Mr. Ranjeet Kumbhar, Mr. Ajinkya Sarnobat, Mr. Pramod Pawar Mr. Sagar Yadav, Mr. Nitin Patil
125 A MODEL OF DATA WARE HOUSING PROCESS MATURITY
Ranjan Kumar paswan , Naveed Hussain Farooqui
126 PREVENTION OF UNAUTHORISED DATA MODIFICATION SYSTEM USING SECURED MULTI KEY IMPLEMENTION
RAVI KUMAR, GOPAL PRASAD BEHERA, R.CHANDARSEKARAN
127 A practical approach of DoS/Jamming attack of Cognitive Radio Network
Roshan Singh Thakur , Prof. Parul Bhanarkar , Prof. Girish Agarwal
128 INTELLIGENT PUBLIC TRANSPORT SYSTEM USING INFORMATION FORENCICS AND SECURITY
Prof. Sunita Barve, Sagar Dasgude , Atish Walunj , Mahaveer Jain
129 ANALYSIS OF SEMI-AUTOMATION CLUSTERING TECHNIQUES FOR PERSONA DEVLOPMENT
MD SHAMSHAD ALAM, VINAY KUMAR,
130 SMART TINY E-CARD FOR EMPLOYEE MANAGEMENT SYSTEM USING WIRELESS PROTOCOL
SAURABH KUMAR, RAJU KUMAR, ROHIT KUMAR, M.JASMINE
131 XML Data Search with Query Assistance and Semantic Analysis
Selvi.V,Rajkumar.S
132 A comparative study of arrivals and prices of agricultural commodities at APMC using Time Series Analysis
Patel S.A., Patel J.M.
133 Enhancement of Password Guessing Resistant Protocol With Cookie and Session Monitoring
Sindhu.M
134 Data Warehouse as a Service (DwaaS)
Sreekanth Tangudu, Velagapudi Sreenivas , K.V.D Kiran
135 Ensured Data Packet Security and Integrity using Merkle Hash Tree Algorithm in Cloud Computing System
SRIMANTA SARKAR , SYED IKRAM AHMED
136 A Hash-Based RFID Security Protocol
Subodh S. Bhoite, Prof. Pawar Sanjay Shamrao
137 Iris Detection Techniques: Daugman’s Integro-Differential Operator and Ellipse fitting
Sunny H. Mujpara, Kunal P. Acharya
138 Methods for Software Testing in Cloud Computing Environment
Krishna Tej Koganti, Sai Sagar.Narasingu, Eswar Patnala, K. N. Soujanya
139 Resource Allocation and Load Distribution for Mixed Workloads under Cloud Environment
Sutha.K,Kaladevi.P
140 MODELING OF WIND TURBINE FOR WIND ENERGY CONVERSION SYSTEM
Vaibhavi Parmar, Prof. H.D.Mehta
141 A High Throughput Low Complex VLSI Architecture for MIMO
M.U.Veenesh, N.Mahendran
142 Simulation and Performance Evaluation of Lee model under Urban, Suburban and Rural Environments for GSM system in mobile communication
Vimal Patel, Kinjal Mehta, Vishal D. Nimavat
143 A study and comparison of Priority Inheritance Protocol and Priority Ceiling Protocol
Vishal Prajapati, Apurva Shah
144 Design of Ultra-Wide Bandpass Filters Using Electromagnetic Band Gap
Abhishek Sinha , Kumar Gaurav, Kundan Kumar, Pankaj kr. Yadav
145 Smart Identity Management system using Biometrics
Dr.Kashif Qureshi
146 MULTIMODAL BIOMETRICS FOR VEHICLE ACCESS
Dr.Kashif Qureshi
147 Detection Of Gray Hole Attack In Mobile Ad-hoc Network
Nilesh Rokade, Madhav Pandhare, Nikhil Wani, Priyanka Patil
148 Fine grained group based job scheduling algorithm with highest computing resource in grid
Achyut Sakadasariya
149 Fuzzy Keyword Search over Encrypted Data using Search Scheme in Cloud Computing
K.Rajesh,K.Venkatreddy,G.RaviTeja
150 Non Uniform High Density Anchor Nodes Scheme for Localization of sensors in WSN
Gurpreet Singh, Sandeep Singh Waraich
151 Advanced Differential Protection Scheme Using Microcontroller
Dilipsinh Gohil, Kalpesh Rathava, J.B.Pujara
152 Pattern Co –orientation In Spatial Based Retrieving Data in Content Based Segmentation
B.Dinesh, L. Ashok Kumar
153 Implementation of PAPR reduction technique in SFBC based OFDM MIMO systems
Mr. Dipak K Patel ,Mr. Kunal M Pattani
154 Stability Analysis By Feedback Control Based Biped Robot
Divrania Dhirubhai A., Rathod Ajit A., Patel Ankit A.
155 HAND & HEAD MOUNTED HAPTIC FEEDBACK SONAR OBSTACLE AVOIDANCE DEVICE
AMRENDRA KUMAR SINGH, ADAPA ASHISH KUMAR, CHANDAN KUMAR PASWAN, JAYANTA DEY
156 An Efficient Crash Prediction and Secured Communication of OLSR Routing Protocol uses Different Key Exchanges for VANETs
R.Gowtham, M.Suguna, Dr.D.Sharmila
157 A review of TCP Reno, TCP Vegas and TFRC for mobile ad hoc networks
Gurmeet Singh, Jaswinder Singh
158 Strategies For Developing a Sustainable ICT Management System For Distance Learning In Kenya. The ODL Model
Kimutai James
159 FINGERPRINT BASED BIOMETRIC ATM AND CREDIT CARD PAYMENT
Dhananjay Kumar Tiwary, Chandan Kumar, Amit Kumar, Ms. Arul Selvi
160 Comparison and Analysis for low power CMOS sram cell using 90 nm and 180 nm technology using cadence tool
Sagar Joshi, Sarman Hadia
161 Circular Shift operation on Mesh and Hypercube
Ms. Khyati Gohil
162 WIRELESS SENSOR NETWORKS USING HIGH SECURITY FOR NODES
J.VIJAYARAJ, R.RAJASEKAR,MA.MOHAMMED ANSAR ALI
163 Energy Saving routing Scheme for Information Gathering and Collision Avoidance in Wireless Sensor Network
Jasmeet kaur, Sarpreet Singh
164 Various Efficient Cluster based Power Saving Scheme for WSN
Navmeet kaur, Kamaljit Kaur
165 IMPACT OF LYDIARD TRAINING WITH TAPERING ON SELECTED PHYSIOLOGICAL VARIABLES AMONG MALE RACE WALKERS
K.Mohan , Dr.R.Kalidasan
166 USING SELF ORGANIZING TEAM IN AGILE SOFTWARE DEVELOPMENT
R.Rajadurai, S.Nandhini
167 DDoS Attack Prevention In Cloud Computing Using Hop Count Based Packet Monitoring Approach
Nisha H Bhandari
168 Security in AODV against Wormhole attack in MANET
Priyanka B. Patel, Purvi N. Ramanuj, Dr. J.S. Shah
169 Evolution towards Grid Computing: A Survey
Gaurav Sharma , Puneet Banga
170 EFFECT OF VARIOUS STRENGTH TRAINING PROGRAMMES ON SELECTED PHYSICAL AND PERFORMANCE VARIABLES AMONG MALE ATHLETES
M. Arunkumar, Dr.A.Surendar
171 Implementation and Performance Analysis of 4-bit GDI Adders
RUPAL N.ASHWANI , BHARAT H.NAGPARA
172 Automatic Reconfiguration for Large-Scale trustworthy Storage Systems
Dr.B.G.Geetha, P.Senthil Raja, R.Vijay sai
173 A New Data Mining Approach for Network Intrusion Detection
Mr. Narayan Arjunwadkar, Mr. Jeevan Barguje, Mr.Rohit Barde, Mr. Sachin Hirave, Prof. N.K.Patil
174 A Study to determine the Suitability of Ground Water for Irrigation Purposes in Madurai District, Tamil Nadu, India
R. Padmanaban, M. Dharmendirakumar, P.B. Sakthivel, and N.S.Elangovan
175 8x8 Bit of Low Power Multipliers
Shivam K.Dave, Bharat H.Nagpara
176 Fast and Variable Amount of Data Collection in Tree Based Wireless Sensor Networks
Sivakumar M., Suguna M.
177 DATA FORWARDING IN MULTIHOP LOW DUTY-CYCLE WIRELESS SENSOR NETWORKS
SRIDHAR D., THAMARAI SELVI.K
178 Implementation of On Demand Routing Protocol to Load Balance in MANET
V. K. Sivaprasad
179 Infrastructure in Cloud as a Service Provider
ShanmukhaPriya.P, Sasiveena
180 Mobile Ad-hoc Networks in the Battlefield With 4G Support
ViswasriSravya.M, NagaSaiKeerthi.J, M.S.S.Dasarsh Rajarao
181 AUTOMATIC ACCIDENT SPOTTING REMOTE TUNED BLACK-BOX
Pronali Sonowal, Renu Gupta
182 Development of Palm Date Pits Activated Carbon Adsorbent for Textile Effluent Treatment
AdeolaG. Olugbenga, AbubakarMohammed, Clement B. Arowosola 3
183 DOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS
Mohamed AfzalKhan.A, Mr.Chandrasekaran
184 New Scheme for Prevention of Wormhole Attack in Manet
Ajit Singh, O.S.Khanna
185 Analysis of Image Compression and Decompression using JSS algorithm- A Review
Gaganpreet Kaur , AmandeepSingh , Dr. Dheerendra Singh
186 Intelligent Heart Disease Prediction System using Naive Bayes Classifier
Amol P. Patil , Ayodhyanadan P. Bhosale , GokulP. Ambre,Sumit P. Pawar , Prof. M. S. Chaudhari
187 A novel technique based on ant colony optimization for image stitching
Amrita, JaspreetSingh Cheema,Nirvair Neeru
188 PRACTICAL ATTACK SCENARIOS ON SECURE ELEMENT-MOBILE ENABLED DEVICE
Anil Kumar Singh, Chandan Kumar, Chandan Kumar Deo
189 GESTURE CONTROLLED CAR DRIVING SYSTEM TO ASSIST THE PHYSICALLY CHALLENGED
ANUPAMA SINHA, ARCHANA KUMARI, AVINASH KUMAR, S.P.VVIJAYARAGAVAN
190 A Simulation of Measurement of WBC using MEMS
Arpita GUPTA, T.K.BASAK, G.U.KHARAT, Poonam GOYAL
191 A Challenge in E-Passport: 2D Human Skull Recognition using Mutual Information Algorithm with Passport Display Screen
C.V.Arulkumar, Prof.G.Selvavinayagam
192 Context disambiguation based on dynamic Bayesian networks for context-aware environment in pervasive computing
Arun Paul. J , Dr.B.G.Geetha
193 Analysis for the Parameters of various Queueing Models
T. Ponnammal, Dr. G. Eswara Prasad
194 Robot Navigation System With RFID And UltrasonicSensors
Manjeet Kumar , Azhar Farhan,Kumar Abhinav ,Kumar Abhishek
195 Multi-hop Stable Selection with Mobile Sink in Wireless Sensor Network
Simarjeet Singh, Jaswinder Singh
196 NETWORK SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY
Sumesh Ranjan Sethi, Sidhartha Ku. Satapathy, Sushanta Kumar
197 3-Level NPC Inverter Testing on Different Loads
Hardik Patel, Vijesh Patel, Dr. S.N.Pandya
198 Speech Encryption Techniques: A Selected Review
Jaspreet kaur , ER. Kanwal preet Singh
199 DETECTION TECHNIQUES WIRELESS SENSOR NETWORKS AND SECURITY
R.RAJASEKAR, MA.MOHAMMED ANSAR ALI, J.VIJAYARAJ
200 LOCALIZATION IN WIRELESS SENSOR NETWORKS
MA.MOHAMMED ANSAR ALI, R.RAJASEKAR, J.VIJAYARAJ
201 DESIGN OFAUTO-GUARD SYSTEM BASED ON RFID AND NETWORK
KUMAR MADHUSUDAN , Mrs. NIRUBAMA, PRAGNYA PRAKASH NANDA, P. GOPI,1. Y.V. JESHWAR DAS
202 WIRELESS MOTOR SPEED CONTROL USING RF SENSOR
kumari nimmi , M.Surumbar khuzhali, Ruby kumari , Pragati bag
203 PREVENTION OF ONLINE PASSWORD HACKING PROCESS WITH SECURED MULTI AUTHENTICATION SCHEME
Kunjesh Kumar Mishra , Vimal Chand , G. Michael
204 PRIVACY-PRESERVING REDISTRIBUTED KEY-POLICY ATTRIBUTE-BASED SECRET WRITING
Mac Donald Khongwir , Debabrata Laimayum , Ms. Anuradha
205 Energy Efficient clustering scheme analysis with mobile sink in Wireless Sensor Network
Deepinder Kaur, Kamaljit Kaur
206 Analysis of Mode Choice Behaviour of Students for College Trip
Mayank H. Rathod, Prof. Suresh M. Damodariya, Dr. Vilin P. Parekh
207 Retain Data In Mobile Disconnected Network Using Trajectory Approach
S. MELBA,N.S. USHA
208 AUTOMATED SHOPPING CART
MUMPI GHOSH , Mrs. SARAVANA.S ,RUSHI MAHATO,SAGARIKA BEHERA
209 Performance Evaluation of Image and Video Steganography for optimization of PSNR
Naitik P Kamdar, Dolly H. Patira, Dharmesh N.khandhar
210 Optimal Location of DG in Existing Distribution Network
Nipun Damor , Kalpesh Rathwa, Prof. H D Patel
211 Efficient Keyword Based Search on Encrypted Cloud Data
Pooja Shah, Gopal Pandey
212 ANTI THEFT SYSTEM FOR ELECTRONIC EQUIPMENTS USING INTERTIAL MEMS SENSOR AND ZIGBEE
Pramod Kumar Bishwas, Hemant Kumar Himanshu , Ashutosh kumar das, R.Manoj,
213 Optimizing Aggregation Query Processing
Prateek Singhal, Velagapudi Sreenivas, K V D Kiran
214 USING FUZZY TOPSIS FOR MULTI CRITERIA DECISION MAKING
Prathiba P.H, Karthikeyan R
215 TRAFFIC INFORMATION SERVICE BASED ON PRIVATE NETWORK
PRATIK KUMAR JHA, PRATEEK SAHU,PRASUN KUMAR KANCHAN
216 Optimized Energy Efficient Allocation of Virtual Machines in Cloud Data Center
Jagjeet Singh, Sarpreet Singh
217 Clustering based routing for Mobile Ad-hoc Devices with ACO
Manpreet Kaur, Jyoti Kohli
218 Intrusion detection System for Attack Prevention in Mobile Ad-hoc Network
Tapan p.Gondaliya, Maninder Singh
219 Time on Demand Distance Vector Protocol with Fault Tolerance for Mobile Ad-hoc Networks
Sukhwinder Pal Singh, O.S.Khanna
220 Energy Efficient dynamic Clustering schemes for Mobile Wireless Sensor Network
Gurpreet Singh, Amandeep Kaur
221 AUTOMATIC EVALUATING OF WATER QUALITY BASED ON HIGH SPEED NETWORKING
ANKIT JAISWAL,PRAVEEN KUMAR ,RAHUL KUMAR JHA
222 A Privacy-Preserving Reputation Management System in E-Learning
J.Ramya Beaula
223 DYNAMIC VOLTAGERESTORER FOR VOLTAGE SAG MITIGATION
RAVIKUMAR D. PATEL, VIJESH N. PATEL, CHINTANKUMAR A. PATEL.
224 WIRELESS DATA ENCRYPTION AND DECRYPTION USING OFDM AND PIC
Vivek Raj , Tutan Sukla Baidya , Vivek Kumar
225 Bug Tracking System
Swapnil Bhalerao,Rishikesh Kakasaheb Pawar,Rajendra .G.Pawar
226 AUTOMATED ELECTROPLATING PROCESS
Prof. Sumod K. Pawar, Dattatraya B. Misal,Pradeep J. Nikam, Avinash D. Sawant,
227 Comprehensive analysis on performance and emission characteristics of C.I Engine by using Karanja (Pongamia Pinnata) Bio-Diesel
Aherkar U.T, Aher D.A, Mokashi S.A, Jarad V.B.
228 Monitoring of Mansa Devi Landslide using GPS
Saiful Islam, Mozaffar Imam
229 VIRTUAL BLUE PRINTING ROBOT FOR INDOOR SURVELLIANCE IN COMBATTING URBAN
NABAUDAY NATH, SANDEEP KUMAR, SWETHA
230 Effective Use of HTML5 for Developing Offline Web Applications
K. Ram Sandilya, Ramidi Sudheer, Velagapudi Sreenivas, K V D Kiran
231 An Efficient Data Aggregation Scheme With Security And Cost Optimization Scheme
Sangeetha.P , Poornima.R
232 An Image Segmentation using Seeded Region growing
Mrs. Musale Shital S, Prof. Pawar Sanjay S.
233 GPS BASED AUTOMATIC TRACKING SYSTEM
Mr. S.K.CHAUHAN, Dr. K. R.PARMAR,
234 Computer Vision Based Recognitionof Nut and Bolt System
Tapas Pramanik,Prof.P.R. Rothe
235 Qualitative Bankruptcy Prediction Using ACO Algorithm
K.Vignesh, A.Martin
236 AN APPLICATION REVIEW OF COIR FIBER REINFORCED CONCRETE
VIJAY CHAVADA, A.A. PARIKH
237 ANALYSIS OF STATCOM FOR POWER FLOW IN THE SYSTEM
VIJESH N. PATEL , RAVIKUMAR D. PATEL ,HARDIK S. PATEL
238 CONTENT BASED IMAGE RETRIEVAL
Jitendra L. Koradiya, Prof. Prashant B. Swadas
239 TRAILING SYSTEM TO PERCEIVE ADVERSARY INTRUSION IN BORDERS USING WIRELESS SECURITY NETWORK
Ramdayal Rajbhar, Vachan Peter , Gautam Kumar
240 Video tracking and person categorization system
Dr.Kashif Qureshi
241 Clustering the nodes with trust value of intrusion detection using iterative process of watchdog mechanism
Jeevitha.T,Kalimuthu.M,Sengottuvelan.P
242 Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
243 Communication of nodes in Hybrid honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
244 Survey of Honey pot system for the Network Security
Prof Sulakshana B Mane , Prof. Khiarnar V .D
245 SEMANTIC WEB ANALYSIS
K.C.Gouda, K. Deepan siddarthan , Nagaraj Bhat
246 Wireless Sensor Networks In Cloud Computing
B.Rajkumar,V.David Sushil ,B.Siva Nagaraju,S.Satyanarayana
247 Image security using Genetic Algorithm
Shubhangini P.Nichat, Prof.Mrs. S.S.Sikchi
248 Design of Ultra-Wide Bandpass Filters Using Electromagnetic Band Gap
Abhishek Sinha, Kumar Gaurav, Kundan Kumar, Pankaj kr. Yadav,
249 CLOUD COMPUTING IN AIRCRAFT NETWORK
P.Shakthikumaran,T.Nalini,J.Rama
250 RECOGNITION OF COINS USING ARTIFICIAL NEURAL NETWORK TRAINED BY GENETICAL ALGORITHM
Ashwini Dakhode, Dr.P.R.Deshmukh
251 Medical Image Retrieval System Using an Improved MLP Neural Network
G.Ravi Teja, G.Chaitanya, K.Rajesh
252 An Extracting Relation of Machine Learning by Identifying Disease Treatment Relations in the Research Methodologies
V.Rama Krishna , T.Geethika , Sk.Sunaina Sulthana
253 Applying Genetic Algorithm to Optimize Path Testing and to Achieve Total Code Coverage
Mohd Athar, Nargis Parveen