1. |
Secure Routing in Multicast Routing Protocol for Manet’s
Amandeep chhabra, Geeta Arora
|
|
2. |
Survey on segmentation of medical images based on low level features
Amita Sharda, Gagan Jindal
|
|
3. |
Multi Objective Based BBO for Optimal Placement of TCSC in Transmission Lines
Asha Deepthi Vijay, Rinku Scaria
|
|
4. |
Selection and Sizing of Orifice Area of Pressure Relief Valve
B.J.Patil, Dr. V. B. Sondur
|
|
5. |
Comparison Of Asymmetrical Cascaded Multilevel Inverter Control Techniques
Dr. Hina Chandwani, Himanshu N Chaudhari, Dhaval Patel
|
|
6. |
Improved Security for Attacks in MANET using AODV
Dadaso Mane, Deepali Gothwal
|
|
7. |
An Enhancement of Medical Images using Classical Unsharp Mask Filter and Log Gabor Filter
Gurpreet Kaur, Gagan Jindal
|
|
8. |
Affective Music Video Content Retrieval Features Based on Songs
R.Hemalatha, A.Anbumani
|
|
9. |
An Automated Performance Tuning Scheduling Framework for Computational Jobs in Desktop Grid
K Hemant Kumar Reddy, Diptendu Sinha Roy, Manas Ranjan Patra
|
|
10. |
A Review on Routing Protocols in Wireless Sensor Networks
S.Kalaiarasi
|
|
11. |
Review Paper on PSO in workflow scheduling and Cloud Model enhancing Search mechanism in Cloud Computing
Kavita Bhatt, Dr. Mahesh Bundele
|
|
12. |
Brute-force Attack “Seeking but Distressing”
Konark Truptiben Dave
|
|
13. |
WEDM Development and Optimization of process: A review
Lokesh Goyat, Rajesh Dudi, Neeraj Sharma
|
|
14. |
Cryptographic Approach to Overcome Black Hole Attack in MANETs
Mohan Kumar S B, Nirmal Kumar S Benni
|
|
15. |
Improved Bluetooth Connectivity with RFID
Nisha, Soniya Goyal, Neeraj Manglani
|
|
16. |
Finite Element Analysis of Piezoelectric Cantilever
Nitin N More
|
|
17. |
Ridge Regression for the Prediction of Compressive Strength of Concrete
Palika Chopra, Dr. R. K. Sharma, Dr. Maneek Kumar
|
|
18. |
Review of Domain Driven Data Mining
K. Priya Karunakaran
|
|
19. |
ICT driven Resource Mapping & Triggering using 3Cs for Disaster Management
Rajesh Sodhani, A. K. Goyal
|
|
20. |
Smartphone Security by Cloud Computing
Ria Das, Indrajit Das
|
|
21. |
Network Security Using Graph Theory
Angad Singh Cheema, Jitin Kohli, Kunal Arora, Saurabh Gupta, Syed Saif Ahmed
|
|
22. |
Study on Content based Retrieval and Semantic Technique
Shelly, Gagan jindal
|
|
23. |
Adaptive Vehicle Detector Approach for Complex Environments
M.P. Sirisha, A.Shanthi
|
|
24. |
A Novel Implementation of Wavelet Transform and Lzma for Compression and Decompression of Document Images
M.Sudha, Dr.S.Palani
|
|
25. |
Investigation on Engineering Properties of Soil-Mixtures Comprising of Expansive Soils and a Cohesive Non-Swelling Soil
Dr. Ch. Sudha Rani
|
|
26. |
Preliminary Level Automated Classification of Brain Tumor using PCA and PNN
V. S. Kolge, Dr. K.V.Kulhalli
|
|
27. |
Comprehensive Group Study Environment on Cloud
Yashasree.Tummala, Chintam VB Aditya Kumar
|
|
28. |
Feasibility Testing of VCR Engine using various blend of Neem Oil
Yogesh Tamboli, Dr. G. R. Selokar, Amitesh Paul, Jehan Zala
|
|
29. |
Rapid Scalable Scheduling for Updates in Streaming Data Warehouses
Dattatray G. Modani, Vinod S. Badgujar, A.Simhadri Babu
|
|
30. |
A Novel Frequency Domain Based Watermarking
Nirupma Tiwari, Dr.Naveen Hemrajani
|
|
31. |
Improvising Teaching Methodologyfor Large Class using Technology
Safa Hamdare
|
|
32. |
Cyber Crime against Person
Desai Purva N., Patel Asma M.
|
|
33. |
Rescue Robot
Sunantha Krishnan, Anthony Selva Jessobalan
|
|
34. |
Applications of cyber Forensics: A study of cyber security and IT Act 2000 to prevent cyber crimes in Indian society
Seema M. Shinde, Bhusare Sangita A.,Karhale Deepali
|
|
35. |
Load Balancing Algorithm for Azure Virtualization with Specialized VM’s
Anand Chaudhari, Anushka Kapadia
|
|
36. |
An Efficient Active Diode Clamped Multilevel Inverter with Reduced Switching Stress
Avinash Verma, Sanjeev Gupta
|
|
37. |
Imputation in Mixed Attribute Datasets using Higher Order Kernel Functions
Aasha.M
|
|
38. |
Combined Effects of Thermal Barrier Coating and Blending With Diesel Fuel on Usability of Waste Plastic Oil in Diesel Engines
Dr.T.Senthilkumar, B.Kumaragurubaran, Dr.M.Chandrasekar, B.M.Gnanasekaran, J.Rajasekaran
|
|
39. |
Improving Query Search Results by Using Click Patterns
Vishwanath D. Chavan, Anil S. Naik, Santosh C Pawar
|
|
40. |
Study of biometric technology in Face recognition and its approaches
Upneet Kaur, Gagandeep Jindal
|
|
41. |
Friction Welding on Lathe Machine with special Fixture
Gourav sardana, Ajay Lohan
|
|
42. |
Data Security using Packet Dispersion in MANET
Ramkrushna C. Maheshwar, Rohitkumar R. Wagdarikar, Anandrao G. Deshmukh
|
|
43. |
The importance of Information Integrity, Security, Networking and Data Protection
Rajashri S.Limaye
|
|
44. |
Design and Analysis of Gasket Sealing of Cylinder Head under Engine Operation Conditions
D.Vinod Kumar, V.Sreenivasulu , P.Divakara Rao, Dr.C.Udaya Kiran, Y.Vijaya Kumar
|
|
45. |
Implementation of Monostable Multivibrator Using Low Voltage Current Differencing Transconductance Amplifier
Shweta Gautam, Neeraj Jain, Anshul Kumar Sharma
|
|
46. |
Power Aware & High Speed Booth Multiplier based on Adiabatic Logic
Namrata Gupta
|
|