Article # | Article Title & Authors |
1. |
PERFORMANCE ANALYSIS OF SUPERCHARGING PROCESS IN SI ENGINE & CI ENGINE AND APPLICATION OF SUPERCHARGER (Page: 9-Jan)
Prakash Kumar Sen, Rohit Jaiswal, Shailendra Kumar Bohidar |
2. |
DEVELOPMENT OF ANN FOR FORECASTING OF BSE INDEX (Page: 16-Oct)
Udit Narayan Bera, Bhavesh B Kunbi |
3. |
STUDY ON A FLAT PLATE SOLAR COLLECTOR: APPLICATION, PERFORMANCE & EFFICIENCY AT DIFFERENT FLOW RATES (Page: 17-22)
Prakash Kumar Sen, Gayatri Choudhary, Shailendra Kumar Bohidar |
4. |
STUDY ON SOLAR WATER HEATER AND ITS SYSTEM PERFORMANCE (Page: 23-27)
Prakash Kumar Sen, Nishita Kispotta ,Shailendra Kumar Bohidar |
5. |
STUDY ON ENERGY PERFORMANCE OF SOLAR GREENHOUSE (Page: 28-33)
Shailendra Kumar Bohidar, Dhaneshwari Sidar, Prakash Kumar Sen |
6. |
SECURE TRUSTWORTHY SERVICE EVALUATION IN SOCIAL NETWORKS (Page: 34-39)
T.Chindrella Priyadharshini, M.Swarnalatha, P.Mugilan |
7. |
IN A FOUR-STROKE ENGINE EFFECT OF KNOCKING IN SPARK IGNITION
(Page: 40-43)
Prakash Kumar Sen, Chandrakant Singh , Shailendra Kumar Bohidar |
8. |
STUDY OF DESIGN OF CYCLONE SEPARATOR UNDER COLLECTION EFFICIENCY AND AIR DENSITY EFFECT (Page: 44-52)
Radhe Shyam Verma, Prakash Kumar Sen, Shailendra Kumar Bohidar Abstract |PDF|HTML |
9. |
ROLE OF ELECTROSTATIC PRECIPITATOR IN INDUSTRY (Page: 53-58)
Shailendra Kumar Bohidar, Kheer Sagar Naik, Prakash Kumar Sen |
10. |
AN OVERVIEW: MOBILITY BASED ANCHOR POINT NODE (APN) HYBRID NETWORK (Page: 59-67)
Soumya S. Hooli, M. S. Shirdhonkar |
11. |
STUDY ABOUT EFFICIENCY IMPROVEMENT OF THERMAL POWER PLANT & ADVANCE TECHNOLOGIES IN DIFFERENT TYPES OF PLANTS (Page: 68-76)
Kush Jaiswal, Prakash Kumar Sen, Shailendra Kumar Bohidar |
12. |
SURVEY ON FINDING FAULTS USING VIRTULIZED DATACENTERENVIRONMENTAND VIRTULIZATION FAULT TOLERANCE APPROACH TOWORDS MANDATORY SECURITY MONITORING (Page: 77-84)
Kshamarani Purvimath, Shriharsha S.Veni |
13. |
A NOVEL APPROACH FOR AES ALGORITHM IN IMAGE ENCRYPT?ON (Page: 85-92)
Sai Charan Dhatrika , Deepika Puvvula , S.Venu Gopal |
14. |
A CRITICAL REVIEW ON THERMAL PROTECTION SYSTEM IN AEROSPACE SHUTTLE (Page: 93-97)
Shailendra Kumar Bohidar, Jaishri Dubey , Prakash Kumar Sen |
15. |
ROBOTIC SENSOR: CONTACT AND NON-CONTACT SENSOR (Page: 98-102)
Shailendra Kumar Bohidar, Khemraj Patel, Prakash Kumar Sen |
16. |
A BRIEF STUDY ABOUT ADVANCEMENT IN ROCKET NOZZLE USED IN AIRCRAFT SCIENCE (Page: 103-108)
Shailendra Kumar Bohidar, Kumar Gaurav, Prakash Kumar Sen |
17. |
CRITERIA OF ARTIFICIAL NEURAL NETWORK IN RECONITION OF PATTERN AND IMAGE AND ITS INFORMATION PROCESSING METHODOLOGY (Page: 109-117)
Khagesh Kumar Dewangan, Naresh Kumar Dewangan, Purushottam Patel |
18. |
AUTOMATIC INDEXING MECHANISM FOR DRILLING MACHINE (Page: 118-121)
Ashish Mourya, Chandrashekhar Patil, Priyanka Chavan, Manjur Sande, Sarang Pisal |
19. |
SOLAR OPERATED PESTICIDE SPRAYER (Page: 122-126)
Pandurang Lad, Virendra Patil , Prashant Patil Tushar Pati, Pravin Patil |
20. |
LAYERS BASED SECURITY ISSUES IN CLOUD COMPUTING (Page: 127-133)
John Jeya Singh.T, Dr E.Baburaj |
21. |
SECURING DOCUMENT IMAGES USING SECRET SHARING (Page: 134-139)
Manjusha R. Gaikkwad, Dr. Savita R. Bhosale |
22. |
ANALYSIS OF SATELLITE IMAGES USING DISCRETE WAVELET TRANSFORM FOR BETTER PSNR VALUE (Page: 140-146)
S.Kannadhasan , K.Venmathi |
23. |
COLLATION OF SECURITY FOR ASSORTED ATTACKS IN WIRELESS SENSOR NETWORKS (Page: 147-156)
R.M.Dilip Charaan, Dr.R.Ramesh |
24. |
SPAM FILTERING IN MACHINE LEARNING ? A SURVEY
(Page: 157-163)
N.Vijayalakshmi, Dr.P.Vivekanandan, P.Malathi,E.Sivajothi |
25. |
NEUTROSOPHIC LOGIC BASED INCONSISTENT RELATIONAL DATABASE FOR NORMALIZING DATA AND ACCURATE DECISION (Page: 164-170)
Soumitra De |
26. |
ANALYSIS OF ANNULAR RING SLOT MICROSTRIP ANTENNA FOR MULTIBAND OPERATION (Page: 171-175)
Alpana Singh, RitikaTandon, Saurabh Khanna |
27. |
A COMPARATIVE STUDY OF CONTENT MANAGEMENT SYSTEMS: JOOMLA, DRUPAL AND WORDPRESS
(Page: 176-183)
R N Sheokand, Vinay |
28. |
STUDY OF CONTENT MANAGEMENT SYSTEM : JOOMLA (Page: 184-190)
Vinay, R N Sheokand |
29. |
ENERGY CONSERVATION IN INDUCTION FURNACE: A REVIEW (Page: 191-196)
Rakesh S. Ambade, Bhushan P. Sonkusale, Aditya A. Bhave, Diksha S. Rangari, Yashashree P. Rangari |
30. |
ANALYSIS BASED ON STATISTICS AND HISTOGRAM OF EDGE DETECTION TECHNIQUES (Page: 197-204)
Toshi Patel, Dimpy Singh, Modassir Anis |
31. |
AN EFFICIENT MECHANISM TO PROTECT CLOUD FROM INTERNET ATTACKS (Page: 205-214)
Lokashree S , Lokana S , Dr.M V Sathyanarayana |
32. |
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA USING MULTI-CLOUD STORAGE (Page: 215-222)
S. Thirumurugan, S. Vignesh |
33. |
CATEGORIZING THE RISK LEVEL OF AUTISTIC CHILDREN USING DATA MINING TECHNIQUES (Page: 223-230)
Mohana E, Poonkuzhali.S |
34. |
BLUE EYES TECHNOLOGY (Page: 231-238)
Swati |
35. |
?ONE-STEPSECANT? A GEOMETRICAL SHAPE RECOGNITION ALGORITH (Page: 239-248)
Anjali Gangwar, Amrita Kaur, Deep Kumar Sharma |
36. |
TRIBOLOGICAL INVESTIGATION OF DETONATION SPRAYED Al2O3, Al2O3-3TiO2 AND Al2O3-13TiO2 COATINGS ON GREY CAST IRON TO ENHANCE ITS WEAR RESISTANCE (Page: 249-253)
Gobind, Jwala Parshad, Dr. NeelKanth Grover |
37. |
DISTRIBUTED FIREWALL: A WAY OF DATA SECURITY IN LOCAL AREA NETWORK (Page: 254-260)
Satinder, Vinay |
38. |
PARTICLE FILTER APPLIED IN AIRCRAFT TRACKING SYSTEMS (Page: 261-267)
Elanthamizhan.R , Deepan Raj.K, Selva Kumar.B, Karthikeyan.L.M |
39. |
COLLABORATION IN MULTICLOUD COMPUTING ENVIRONMENTS: FRAMEWORK AND SECURITY ISSUES (Page: 268-271)
Reshma Valishettar, Rameshkumar H K |
40. |
STUDY OF SOLAR ENERGY & IT?S APPLICATION IN DAILY LIFE (Page: 272-278)
Chandan Sharma, Shailendra Kumar Bohidar, Prakash Kumar Sen |
41. |
SURVEY ON SMART GRID SECURITY: THREATS, CHALLENGES AND AUTHENTICATION MECHANISM (Page: 279-287)
Prof. Pavan D.Mahendarkar, Adiba Maniyar |
42. |
SECURITY WITH WHITE BOX CRYPTOGRAPHY (Page: 288-292)
Asmita, Ankush |
43. |
EFFICIENT CLASSIFIER FOR PREDICTING STUDENTS KNOWLEDGE LEVEL USING DATA MINING TECHNIQUES (Page: 293-300)
S.Visalaxi, S.Usha, S.Poonkuzhali |
44. |
NUMERICAL ANALYSIS OF HEAT DISSIPATION OF RECTANGULAR HEAT SINK UNDER NATURAL CONVECTION WITH ORIENTATION EFFECTS (Page: 301-309)
Prashant Rathod, Hanoca.P. |
45. |
PRIORITIZATION OF MULTIFACETED CRITERIA FOR THE DIFFERENT CO2 REMOVAL TECHNOLOGIES FROM BIOGAS USING ANALYTICAL HIERARCHICAL PROCESS (Page: 310-320)
Sudeep Yadav, Amitabh K. Srivatava, R.S.Singh |
46. |
IMPROVED METHOD FOR GENDER CLASSIFICATION USING FINGERPRINT (Page: 321-324)
Shreejith K B, Dr. Mohammed Rafi |
47. |
SURVEY ON SELF-RECONFIGURATION IN CYBER-PHYSICAL SYSTEMS (Page: 325-332)
Tarannum Kumasgi, Prof. Kiran Patil |
48. |
DESIGN AND PERFORMANCE ANALYSIS OF TRAIN CONTROL SYSTEM WITH AND WITHOUT CO-OPERATIVE RELAYING USING LINK BREAKAGE (Page: 333-337)
D.K.Harish, Dr.M.Arun |
49. |
PERFORMANCE OF ROUTING PROTOCOLS IN VEHICULAR NETWORKS BY THE VERTICAL HANDOFF STRATEGIES (Page: 338-344)
N.N.V.R.K.Dinesh, Suresh Nuthalapati |
50. |
SICKLE CELL DETECTION USING MARKER-CONTROLLED WATERSHED SEGMENTATION (Page: 345-348)
Manjula S, Rashmi M.J and Varsha.D |
51. |
A STUDY OF DOS ATTACKS IN MANET (Page: 349-353)
Prof. Ajay Kumar Patel |
52. |
ACOUSTIC ECHO CANCELLATION BY USING NPVSS NLMS-UM CASE (Page: 354-360)
Deman Kosale, H.R. Suryawanshi, V.K. Dwivedi |
53. |
FACE RECOGNITION USING NEURAL NETWORK WITH PCA-MBP ALGORITHM (Page: 361-367)
Sanjay Singh, Nitin Kumar, Dayashankar Singh |
54. |
BEHAVIOR OF PUMICE LIGHTWEIGHT CONCRETE (Page: 368-374)
N.Venkata Ramana |
55. |
IMPLEMENTATION OF IRIS RECOGNITION USING FUSION OF HOMOGENEOUS FEATURES (Page: 375-380)
Deepika R, Vibha S Rao, Prasad M R |
56. |
SURVEY ON CAPTCHA-A NEW WAY OF GRAPHICAL SECURITY (Page: 381-385)
Priyanka Sajjan , Prof.Santosh S.Dewar |
57. |
A REVIEW ON BAYESIAN NETWORK TECHNIQUES FOR INFERRING GENE REGULATORY NETWORKS (Page: 386-391)
Paras Bansal, Shailendra Singh, Abhishek |
58. |
HOMOMORPHIC CRYTOGRAPHY DEVELOPMENT USING SCHEMES (Page: 392-396)
Priyanka, Dinesh |
59. |
2D FIR FILTER BASED EDGE DETECTION OF ANGIOGRAM IMAGES (Page: 397-403)
J.Swetha , P. Ganesh Kumar, |
60. |
IMPACTS OF CLOUD COMPUTING ON E-COMMERCE BUSINESSES IN INDIA
(Page: 404-411)
Satinder , Niharika |
61. |
STUDY OF CONTENT MANAGEMENT SYSTEM: WORDPRESS (Page: 412-416)
Vinay , Satinder |
62. |
SOCIAL MOBILITY ANALYTICS CLOUD (SMAC): AN OVERVIEW AND ITS IMPACTS ON SOCIETY (Page: 417-422)
Dr. AnamikaBhargava, Aruna Verma, Satinder |
63. |
A STUDY OF MACHINE TRANSLATION METHODS AND THEIR CHALLENGES (Page: 423-429)
Anand Ballabh, Dr. Umesh Chandra Jaiswal |
64. |
SURVING SELF LOADING VIDEO COMPOSITION (Page: 430-438)
T.Dhanabalan, S. Suresh |
65. |
A FRAMEWORK FOR PRECISE RECOGNITION OF INDIAN PAPER CURRENCY NOTE FOR VISUALLY IMPAIRED USERS (Page: 439-449)
Aruna D H, Manpreet Bagga, Dr Baljeet Singh |
66. |
IMPROVING TRAFFIC MANAGEMENT USING GENETIC ALGORITHMS AND ANT COLONY OPTIMIZATION METHODS (Page: 450-457)
Sankar. A, Vijay Sekar. E, M. Yamuna |
67. |
OZONE SIMULATIONS FOR HGB AREA USING DIFFERENT CHEMICAL MECHANISMS WITHCAMX (Page: 458-465)
Samarita Sarker, Raghava R. Kommalapati, Ziaul Huque |
68. |
ENHANCED SECURE FRAMEWORK FOR HETEROGENEOUS WIRELESS SENSOR NETWORK (Page: 466-472)
Ms. Varsha Buktare and Dr. Savita R. Bhosale |
69. |
A NOVEL APPROACH FOR IMPROVING TCP CONGESTION RESPONSE IN PACKET REORDERING SCENARIO USING DCR (Page: 473-479)
Vivek Kumar Kushwaha, K Vinay Kumar |
70. |
SECURING CLOUD DATA USING CRYPTOGRAPHY (Page: 480-486)
M.Janaki, Dr.M.Ganaga Durga |
71. |
THE INFLUENCE OF SOCIAL MEDIA ON INDIAN STUDENTS AND TEENAGERS (Page: 487-493)
Kavita |
72. |
REVIEW ON RENDERING RIGID SHADOWS USING HYBRID ALGORITHM (Page: 494-502)
Nitin Kumar, Sugandha Aggarwal, Rashmi Dubey |
73. |
EFFECT OF PROCESS PARAMETERS ON FRICTION STIR WELDED AA 6061 ALUMINUM ALLOY BUTT JOINTS. (Page: 503-519)
P.Srinivasulu, Dr.G. Krishnamohan Rao, M.Satyanaraya Guptha |
74. |
A MULTI LAYER AUTHENTICATION APPROACH FOR ROUTING IN MESH NETWORKS (Page: 520-530)
P.Ramya, A.Komathi |
75. |
STUDY OF VARIOUS NETWORK TYPE SECURITY PROTOCOLS (Page: 531-543)
Sudhakar Singh, P.K. Khare, Prashant Mor |
76. |
HIDING THE DATA USING STEGANOGRAPHY WITH DIGITAL WATERMARKING (Page: 544-548)
G.Thirumani Aatthi, A.Komathi |
77. |
SURVEY ON DIGITAL WATERMARKING TECHNIQUES (Page: 549-553)
Rutuja Sonar, Shivaputra S. Panchal |
78. |
DYNAMIC ALGORITHM IN MOBILE AD-HOC NETWORKFOR SAVING ENERGY CONSUMPTION (Page: 554-561)
Rajesh Shrivastava, Agnivesh Kumar Agnihotri, Omanand Tiwari |
79. |
ADVANCE TEXT AND COLOR BASED SESSION PASSWORD SECURITY RESISTANT TO SHOULDER SURFING, KEY LOGGER AND MOUSE TRACKER SPYWARE (Page: 562-568)
Ms. Kiran P.Lokhande, Prof.Sonal Honale |
80. |
INNOVATIVE WAYS OF DATA MANAGEMENT THROUGH CLOUD COMPUTING (Page: 569-572)
Praveen Kumar Shrivastava Dr. S.M.Ghosh Vibha Sahu |
81. |
AN ENHANCED DETECTION OF MASKED REPLICATION ATTACK IN WIRELESS SENSOR NETWORKS (Page: 573-581)
Somesh Pal , K. Vinay Kumar |
82. |
PARALLEL OPTIMIZED LIVE VM MIGRATION
(Page: 582-594)
Jayasree P, Meenakshi Sharma |
83. |
TO STUDY LMS & NLMS ALGORITHM FOR ADAPTIVE ECHO CANCELLATION (Page: 595-600)
Sandip A. Zade , Prof. Sameena Zafar |
84. |
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA (Page: 601-606)
U.Pandi Priya, R.Padma Priya |
85. |
CYBER TERRORISM (Page: 607-613)
Bhawana |
86. |
IDENTIFICATION OF FACTORS IN IMPLEMENTATION OF QUALITY CIRCLE (Page: 614-618)
Ajay Kalirawna , Rajesh Attri, Nikhil Dev |
87. |
IDENTIFICATION OF BARRIERS AFFECTING IMPLEMENTATION OF 5S (Page: 619-624)
Sunil Mehra, Rajesh attri, Bhupender Singh |
88. |
INTERNET OF THINGS: OPPORTUNITIES AND CHALLENGES (Page: 625-628)
Madhavi Dhingra |
89. |
SURVEY ON AMES: ADAPTIVE MOBILE VIDEO STREAMING AND EFFICIENT SOCIAL VIDEO SHARING IN THE CLOUDS (Page: 629-634)
Laxmi Sharma, Laxmi Shabadi |
90. |
COMMUNITY DETECTION IN SOCIAL NETWORKS USING EXTENDED SELF ORGANIZING MAP ALGORITHM (Page: 635-642)
Harish Kumar Shakya, Kuldeep singh, Bhaskar Biswas |
91. |
DISTRIBUTED RESTRAINING MALWARE PROPAGATION IN MOBILE SINK ROUTING FOR WIRELESS SENSOR NETWORKS (Page: 643-647)
M.Sindhuja, A.Komathi |
92. |
WAVELET TRANSFORMATION OVER FOURIER TRANSFORMATION (Page: 648-651)
Anita, Sanjay, Seema, Shashank, Pratibha Bharti, Dr.Prof.K.K Saini |
93. |
IMPROVED ACCURACY FOR FACIAL FEATURE POINT DETECTION AND FACIAL EXPRESSION RECOGNITION (Page: 652-658)
V.P. Lakshmi, Dr. P. Marikkannu |
94. |
CLOUD COMPUTING IN HIGHER EDUCATION: OPPORTUNITIES, CHALLENGES AND COUNTER MEASURES (Page: 659-668)
Meenaakshi N. Munjal |
95. |
VARIOUS WAVELET ALGORITHMS FOR IRIS RECOGNITION (Page: 669-672)
R.Subha, Dr. M.Pushparani |
96. |
SECURITY ANALYSIS OF NETWORK PROTOCOLS (Page: 673-677)
Kamlesh, Puneet Rani |
97. |
EXPERIMENTAL ANALYSIS FOR EFFICIENCY OF BIOMASS GASIFIER ON MOISTURE CONTENT (Page: 678-682)
Venda Prasad Maurya, Anshu, Kunwer Sandeep Singh |
98. |
CLOUD COMPUTING: SECURITY ISSUES AND SECURITY MEASURES (Page: 683-690)
Disha Bhatnagar, Rajkumar Singh Rathore |
99. |
SURVEY PAPER ON CLOUD COMPUTING (Page: 691-696)
Kalpana Tiwari, Er. Sachin Chaudhary, Er. Kumar Shanu |
100. |
GREEN COMPUTING: AN EXPLORATION OF APPROACHES & IMPLEMENTATIONS (Page: 697-702)
Farzana Parveen, Rahul Singh, Preeti Singh |