Published: 2015-01-31

Power Theft Identification Using Smart Grid Technology

Parvin Shikalgar, Prasad Yadav, Hemant Pawar

259 - 263

TAMC: Traffic Analysis Measurement and Classification Using Hadoop MapReduce

Mr. Yogesh Vasant Kadam, Prof. Mrs. Vina Lomte

165 - 168

Survey: Detection Of Crop Diseases Using Multiscaling Technique

Mr. Mahesh Shivaji Dange, Mrs. S.M. Handore

330 - 332

Health Infomatics Using Multy-Keyword Rank Search Over Cloud

Shubham A. Ahire, Gaurav A. Dere, Mayur D. Mekha, Amit S.Wagh

82 - 85

The future Clean Energy Harvesting by Wind Power Generation

Prashant Meshram, Ritesh Ujawane, Priya Gaikwad, Prakash Yemde

248 - 252

Approach to access the Remote device in same network using Virtual Network Computing: An Accessibility Endeavor

Shiv Kumar Goel, Nikita Haryani, Abhishek Jain, Pramod Tiwari, Prasad Kuvalekarani

414 - 418

A Novel Method for Graphical Password Mechanism

Siddharth R. Dharane, Pradip N. Kakade, Sapna P. Gaikwad, Pooja K. Dokhale, Prof. Ashvini Y. Bhamare

156 - 161

P300 Brain Computer Interface Control after an Acquired Brain Injury

Jean Daly, Elaine Armstrong, Eileen Thomson, Andreas Pinegger, Gernot Müller-Putz, Suzanne Martin

318 - 325

Flow Secure Message in Parity Matrix

P. Ramya, P. Sandhya, R. Varun

238 - 240

Detecting Phishing Web Pages using NB classifier and EMD Approach

Pranali P. Akare, Heena. Mohm. H. Maniyar, Tejendra D. Thorat, Jagruti k. Pagar

148 - 151

Overview of GINIX and Top-k Method

Nikhil B. Kedare, Harshada P. Wagh, Sayali D. Pingle, Nayana P. Khode, Prof. Kavita S. Kumavat

62 - 66

Novel Approach for User-Friendly Home Automation System on One Touch

Miss. Juily Mataghare, Miss. Pallavi Salvi, Mr. Vrushali Watpade

222 - 225

A Comparative Study on Apiculture Technology among Trained and Untrained Women

Anuradha Ranjan Kumari, Sarita Sanwal, Serene Shekhar

140 - 143

Grammar Generation and Optimization from Multiple Inputs

Pankaj B. Devre, Prof. Madhuri A. Bhalekar, Dr. Madan U. Kharat

298 - 302

Data Sharing Securely for Administrators of Dynamic Groups in Cloud

Nirali H. Patel, Sajiya S. Patel, Pooja C. Ighe, Prof. Madhuri B. Patil

212 - 216

Real-time capabilities in the standard Linux Kernel: How to enable and use them?

Luc Perneel, Fei Guan, Long Peng, Hasan Fayyad-Kazan, Martin Timmerman

131 - 135

Information Searching Using Web Data Extraction for Acquiring Enrich MM Results

Firoz I. Kadri, Kaushal A. Kapse, Nitin V. Landge, Hemant B. Shirsath, Prof. V. D. Badgujar

203 - 208

Crime Monitoring and Controlling System by Mobile Device

Swapnali Rayate, Rohini Bhamare, Kaustubh Barhate, Mahendra Sonawane

123 - 126

Website Content Analyzer SEO Tool

Khushboo Sonawane, Bhagyshree Wagh, Meenakshi Shelar, Neha Yeole

280 - 283

Micro Strip Patch Antenna Using Broadside Coupling

Mr. Bhavik K. Patel, Dr. Yagnesh B. Shukla, Mr. Sameep P. Dave

33 - 35

Image Quality Measures for Gender Classification

Anusree Bhaskar, Aneesh R.P.

360 - 364

A Survey on Spectral Handoff Mechanisms for the Cognitive Radio Network

Mr. Vinay S. Prabhavalkar, Dr. Vijay R. Ghorpade

113 - 116

Analysis of Critical Success Factors In Application of “DRYWALL” Technique in Construction Industry

Pranoti Chandrakant Jagtap, Abhijit N. Bhirud, Miss. Ingale Nilam Nandkumar

271- 275

Access to Encrypted Data in Cloud Database

Sakshi Sanjay Deshmukh, Dr.G.R.Bamnote

347 - 350

Anomaly Extraction Using Histogram-Based Detector

Mayur Devidas Khairnar, Sandesh Ramesh Shinde, Swapnil Bajirao Suryawanshi, Girish Sunil Patil, Prof. Kavita S. Kumavat

86 - 90

Decentralized Anonymous User Authentication For Securing Data Storage in Cloud

Shital S. Pagar, Snehal M. Baviskar, Vandana N. Chalwadi, Prof. Kavita S. Kumavat

05 - 10

Access of Encrypted Personal Record in Cloud

Miss. Shwetambari G.Pundkar, Dr. G. R. Bamnote

326 - 329

A Review of Palm Oil Biodiesel under Long-Term Storage Conditions

Krutika V Prajapati Patel, Mehulkumar Nandlal

313 - 317

GUI Testing On Android Application

Neha J. Jagadale, Aditi G. Pagar, Mayuri.S.Deore, Priti V. Raut, Prof. Kavita S. Kumavat

67 - 71

A Run-time Detection System for Malicious URLs in Twitter

Harshad D. Nannaware, Tushar P. Dhangar, Aniket S. Dhanrao, Prof. V. D. Badgujar.

144 - 147

Enhanced AODV Routing Protocol Using Leader Election Algorithm

Mr. Hemant D. Sonawane, Dr. L. K. Vishwamitra

303 - 308

Study of Detached (Fresh) Leaf and Dried Leaf with Image Processing

Parmar D. K., Dabhi B. K., Patel K. P., Raj M. P.

57 - 61

Personal Authentication Using Finger Images

Renuka Mahesh Jadhav, Prof. Dr. D. S. Bormane

389 - 393

Auto-Summarization of Email Document Using Statistical Approach

Swati Thakare, Shital Kunzarkar, Sonal Chaudhari, Pranali Bhadane

136 - 139

Overview of Auditing Cloud Consistency

Hemant T. Aher, Poonam D. Shirode, Kundan L. Shinde, Arti A. Jadhav

46 - 51

A study of Email date attacks in Network Security

Mr. Kamlesh Lahre, Rohit Kumar Miri, Suraj Prasad keshri ,

209 - 211

Evaluation of Green Building with Resources and Cost Aspects

Nangare Priyanka Pandharinath, Pund Gaurav Chandrakant.,Warudkar A.A.

127 - 130

Grid Layout - A Fluid Web Framer

Gaurav Vaswani, Priyanka Punjabi, Ajay Chotrani

284 - 287

Maintain the Consistency of Auditing Cloud

Amol D Vispute, Umesh M Nawale, Vikram S Wagh, Amol B Sonawane, Prof. Kavita S. Kumavat

117 - 122

Overview of Cloud Computing Storage System

Vrushali Arun Patil, Sayali Dilip Jejurkar, Sushmita Sonyabapu Gadekar

184 - 189

Arabic Documents classification method a Step towards Efficient Documents Summarization

Hesham Ahmed Hassan, Mohamed Yehia Dahab, Khaled Bahnassy, Amira M. Idrees, Fatma Gamal

351 - 359

MARKOV CHAIN MONTE CARLO SOLUTION OF POISSON’S EQUATION

Matthew N. O. Sadiku, Raymond. C. Garcia, Sarhan M. Musa, Sudarshan R. Nelatury

106 - 112

Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device

Atul R. Ghumare, Nivedita D. Patil, Chetan D. Holkar, Vivek D. Badgujar

175 - 180