Published: 2017-06-30

Oblong Mean Prime Labeling of Some Snake Graphs

Sunoj B S, Mathew Varkey T K

05 – 07

Compressive Study on Wireless 3d Printer Using Lua Code

Chetan P, Arun S, Megha M, Sarfrazkhan F, Maltesh I.G.

08 – 14

Variability in Behavior of Application Service Workload in a Utility Cloud

Monika Sainger, Dr. K. P. Yadav, Dr. H. S. Sharma

20 – 25

Fuzzy C-Means Algorithm to Diagnose Breast Cancer

Dr. W. Abdul Hameed, Dr. Shaik Sharief Basha

46 – 50

Development of Artificial Pancreas

Ananya Mathur, Apoorva Chaudhary

51 – 55

Prediction of Conflicts in Transportation Services using Real-Time Data

Wali Salman Khan, Ankita Sheetlaprasad Upadhyay, Anjali Ashok Chidrawar, Namrata Rajkumar Kore, Balaji. Bodkhe

68 - 73

Multilevel Security System for Bank Locker

Aishwarya Shah, Akshay Wadatkar ,Santosh Verma, Prof. M. P. Sardey

87 – 92

Some Properties of Fuzzy Evidence Graph

Mathew Varkey T.K, Sreena T.D

97 – 99

A Semantic-Based Friend Recommendation System for Large-scale System

Miss. Bhavana Zambare, Mrs. Madhuri Zawar

100 - 104

A Comprehensive Survey on Sixth Sense Technology

Reema Dhiman, Navneet Kaur

105 – 108

Data Transfer via Human Body

Shubham Rathod, Bhavana Kate, Sandip Bhange, Mrs. H. D. Shinde

134 – 136

Electrical Power Line Theft Detection

Mr. Jitendra S. Atkari, Mr. Shubham A. Sutar, Mr. Vivekanand G. Birajdar, Ms. A. B. Kanwade

137 – 141

Modification of Current Weather Indicating System used at Airports

Sagar Tathod, Somesh Joshi, Umair Yelurkar, S.V. Lohar

142 – 144

DIP Based Smart Door Lock System

Ms. Uzma Fatima Shaikh, Ms. Usha Shinde, Prof. M. P. Sardey

150 – 153

Data Analysis using Hierarchical Computing

Aliasger Kagalwala, Ankush Khurana, Shashwat Kaul, Govind Pole

154 – 158

Air and Sound Pollution Monitoring System using IoT

Sarika Deshmukh, Saurabh Surendran, Prof. M.P. Sardey

175 – 178

Review of performance of various Big Databases

Mallika Wadhwa, Er. Amrit Kaur

179 – 182

Characteristics and Challenges of Big Data

Piyush Bhardwaj, Dr. Suruchi Gautam, Dr. Payal Pahwa, Neha Singh

187 – 190

Enhanced DCP filter for Real-World Hazy Scenes

Sanjay Sharma, Padma J Bonde

191 – 196

Energy Efficient Network Selection in Heterogeneous Network using TOPSIS

Priyanka Rani, Silki Baghla, Dr.Himanshu Monga

197 – 202

Car Black Box System

Miss. Umeda Anil Yeole, Miss. Kirti Narendra Deshmukh, Mrs. Mohini P. Sardet

203– 205

Big Data Harmonization – Challenges and Applications

Prof. Jigna Ashish Patel, Dr. Priyanka Sharma

206 – 208

Construction Project of Residential Building in 3-Tier City

Tejas Sanjay Nikumbh, Dipak P. Patil

209 – 211

A Single Phase Five Level Inverter based on switched DC sources with Reduced Number of Total Component Count by Novel Topology

Mrs. Bharati S.Mathapati, Prof. Shubhangi S.Landge, Prof.Pushkaraj V.Sakhare, Mr.Jadhav Dnyaneshwar N.

218 – 223

Application of Inventory Management in Construction Industry

Jyoti Sanjeev Mohopadkar, D. P. Patil

229 - 231

UWB MIMO Antenna with Band-Notched Characteristic

D. Krupa Rani, J.V.K. Ratnam

244 – 247

Internet of Things: A World of Need and Opportunity

Vikas Kumar, Dr. Neetu Sharma

248 – 252

Speed Control of Induction Motor using Fuzzy Logic

Miss. Ritita. R. Lavate, Mrs. K. S. Gadgil

262 – 265

The Sum-Eccentricity Energy of A Graph

Mohammad Issa Sowaity, B. Sharada

293 – 304

Hybrid Recommendation System Using Clustering and Collaborative Filtering

Roshni Padate, Priyanka Bane, Jayesh Kudase, Adarsh Gupta

305 – 310

Hybrid Cooler Works on DC Motor

Pranali Nitnaware, Ajay Mahawadiwar

311 – 317

Electronic Counseling System for the Visually Impaired in Enugu State Nigeria

Okeke Ogochukwu Clementina, Ndigwe Chinwe F.

324 – 329

Metallographic Image Fusion

V. K. Bairagi, Ekbote Shrutika A., Bhosale Akshada R.

347 – 352

Content Based Image Retrieval using CMM+GWT and SVM Classifier

Rocky S. Upadhyay, Dayashankar Pandey, Ritesh Yadav

378 – 381

(N,N) Share Generation using Key Share approach for RGB image in VCS

Shivam S. Upadhyay, Niresh Sharma, Ritesh Yadav

382 – 386

Remotely Sensed Image Inpainting With MNLTV Model

Rohini B. Late, Prof. N. G. Dharashive

392 – 398

Spatial Analysis of Crime with Public Alliance System

Amandeep Kaur, Dr. Neetu Sharma

399 – 404

Software Test Automation with Robot Framework

Harsha T, B A Sujatha Kumari

432 – 433

Polarity Classification of Twitter Data using Sentiment Analysis

Arvind Singh Raghuwanshi, Satish Kumar Pawar

434 – 439

Cocoa Care - An Android Application for Cocoa Disease Identification

Harivinod N, Pooja P, Nithesh Kumar H, Ashritha B S, Gururaj G Hegde

440 – 444

Attribute Based Encryption with Verifiable Time Stamped Decryption

Miss. Madhavi Phalak, Mr. Rahul Gaikwad

457 – 461

Implementation of RDH in Encrypted Image

Miss. Harshali Phalak, Mr. Rahul Gaikwad

462 – 466

Enhancing Security of Android Phones

Tejaswini Bhandarkar, Prof. G. Rajesh Babu

467 – 470

Clone Detection for Efficient System in WSN Using AODV

Prof. Roshani Talmale, Ms. Rupika Yadav, Prof. Vishal Tiwari

471 – 478

A Review Paper on Design Analysis of Connecting Rod

Magesh Kumar, Prof. Ankush K Biradar

479 – 481

Analyzing the Effect of Scintillation on Free Space Optics

Jasjot Kaur Sahota, Divya Dhawan

493 – 496

A Survey on Classification of Routing Protocols in Wireless Sensor Networks

Vennu Lavanya, Prof. C. Kalyana Chakravarthy

504 – 510

Advanced Transport Management System

Maheshwari Kale, Sayali Bhadale, S. V. Lohar

511 – 513

Automated Identification of Diabetic Retinopathy: A Survey

Pradeep Kumar K G, Dr. Karunakara K, Dr. Thyagaraju G S

514 – 520

Light Monitoring on a Management Tool

Naveena. Anumala, Dr. R. Kumar

525 – 531

Niobium Superconducting Cavity for Radio Frequency: A Review

Sachin Rishishwar, Raghavendra Sharma

532 – 535

Security System by Motion Detection and Light Mechanism

Lipika Shah, Heena Sayyed, Rohini Temkar

536 – 539

From Traditional to 360-Degree Feedback in Performance Evaluation of Bhutan

Sagar Bhujel, Rinchen Zangmo, Sonam Wangmo, Yeshi Wangchuk, Kezang Jurmey

557 – 565

G-Task: Proposal for Development of a Freelancing Android Based Mobile Application in Bhutan

Sonam Wangmo, Tashi Phuntsho, Kailash Rai , Tshewang Tenzin, Nima Dukpa

566 – 570

Phishing: A Continual Threat for Cyber World

Somnath Basak, Chandrani Ray Chowdhury

608 – 612

Signal Capturing on VLSI Systems in Real Time

S. Khadar Bhasha, B.H.K. Bhagat Kumar

619 – 624

An Analytical Survey on Vein Pattern Recognition

Lovepreet Kaur, Navjot Kaur

629 – 634

Research Proposal on Distinct Study and Significant of Search Techniques in Web Mining

Tiruveedula Gopikrishna, Prof. Dr. K. V. N. Sunitha

650 – 654

Design & Performance Analysis of 8-Bit Low Power Parity Preserving Carry-Look Ahead Adder

Palak Sharma, Amandeep Singh Bhandari, Dr. Charanjit Singh

655 – 664

Squential Step Towards Pattern Warehousing

Harshita Jain, Dr. Akhilesh Tiwari

665 – 670

A Systematic Literature Survey on IDS

Palash Chaturvedi, Amit Saxena

671 – 676

Modeling used for Software Product Line Engineering

Satinderjit Kaur Gill, Dr. Amita Sharma

677 – 679

Personal Assistance using Artificial Intelligence for Computers

Bharathi K, Prathmi Naik V, Shamanth A P, Shreyas S, Shyam Thejaswi

693 – 695

Predictor Analysis of the Non-parametric Bulk Arrival Fuzzy Queueing System

Sivaramalingam Geetha, Bharathi Ramesh Kumar, Sankar Murugesan

705 – 709

Wind Power Control Using MPPT and SEPIC Converter

Rakshith P, Jahnavi R Bhat, Ashvini M, Rakshitha C R, Vinay Kumar Sharma

722 – 726

An Approach to the Detection of Retinoblastoma based on Apriori Algorithm

Pradeep Kumar K G, Dr. Karunakara K, Dr. Thyagaraju G S

733 – 738

Effect of Welding Parameters on the Mechanical Properties and Microstructure of BQ Plateastm SA 516 – 60 Grade

Arvind B. Totey, Abhishek Lad, Aditya Takote, Kiran Dhawale, Bhaskar Yadav

753 – 756

Dynamic Policy Update on Cloud for File Access

Shrikant Malge, Prof. Snehal D. Chaudhary, Priyanka Paygude, Shrikala Deshmukh

757 – 761

Wireless Sensor Node for Industry 4.0

Anantharama Somayaji, V Nattarasu

797 – 799

Development of a New Model for Population Prediction in Anambra State, Nigeria

Okeke, Ogochukwu Clementina, Dr. Onyesolu, Moses Okechukwu, Ndigwe, Chinwe F.

800 – 805

EHG Signal Classification for True and False Pregnancy Analysis

Uzma Fatima, Prof. Tirupati Goskula

811 – 814

An Innovative Method to approach Operational Feasibility Study for Making the Software Popular

Prof. Rasendu Mishra, Prof. Rushabh Shah, Prof. Ajaykumar M Patel

823 – 825

Comparison of Microstrip Patch Antenna using Different substrate Material for Multiband Application

Mohd Gulman Siddiqui, Kamakshi, Abhishek Saroj, Prof J. A. Ansari

826 – 831

Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification

Dr. B. Sateesh Kumar, Ms. V Uma Rani, Mustafa Saad

856 – 859

EOAODV: Routing Protocol for Cognitive Radio Network

Shishir Borkar, Dr. S. M. Ali, Anam Quadri

860 – 864

Hybrid TUI Abacus Model: An Advance Tool for Learning Math

Shyamsunder G. Goswami, Suraj Kutteri, Mona Deshmukh

865 – 870

Measures for Cost Escalation in Bridge

Rahul Munde, Prof. Ashish Waghmare

881 – 885

Optimization of Solar Energy Tapping by an Automatic Solar Radiation Tracker

Bikash Monger, Jigme Namgyel, Kelzang Tenzin, Namgay Dorji, Dechen Lhamo

886 – 892

Clustering of Bootstrap for Web Service Discovery

S. Sagayaraj, M. Santhoshkumar

917 – 921

Review Paper on Zigbee based Secured Wireless Communication by using DES Encryption

Renuka Londhe, Shalmali Kumawat, Pooja Gaware, C. K. Bhange

943 – 944

Meter Data Acquisition System

Sonia, Dr. Neetu Sharma

950 – 953

Ad-hoc Networks Energy Management Techniques

Arun Kumar Dey, Padma Bonde

960 – 964

An Efficient Cross-Domain Recommendation Technique in Cold-Start Situations

V. Kiran Kumar Reddy, K. Ramesh, T. Subramanyam

1005 – 1010

Donut Shaped Ultra wideband Antenna for Cognitive Radio Application

Anam Quadri, Dr. S. M. Ali, Shishir Borkar

1017 – 1019

Optimization of Path Selection in MIMO

V. Santhiya, Dr. M. Uma Devi

1020 – 1025

Working Model of Refrigerator cum Air conditioner

Sharma Vivekkumar Kiritbhai

1026 – 1033

Internet of Things Based Technology for Smart Home System: A Generic Framework

Markandeshwar Jerabandi, Mallikarjun M Kodabagi

1038 – 1046

Overview of Indexes Used in NOSQL Databases of MongoDB Architecture

Ms. Poonam Verma, Ms. Arpana Chaturvedi

1057 – 1059

SHED: Spam Ham Email Dataset

Upasana Sharma, Surinder Singh Khurana

1078 – 1082

A Approach to Optimal Strategy for Energy Efficiency in Cloud System

Shruti Dadhich, Prof (Dr.) Vibhakar Pathak

1097 – 1101

Role of EYCDFA for Optical Communication System

Kulwinder Singh, Karan Goel, Kamaljit Singh Bhatia, Hardeep Singh Ryait

1102 – 1106

A Preface on Android Malware: Taxonomy, Techniques and Tools

Rashmi Rupendra Chouhan, Alpa Kavin Shah

1111 – 1117

Importance of HRIS: A Critical Study on Service and Auto Sector

Prof. Swati Bankar, Prof. Dr. M. D. Kakade

1118 - 1121

Architecture Analysis of NIASN

Amardeep Gupta

1122 – 1124

Fuzzy Clustering in Web Mining

Dr. A. B. Raut

1125 – 1130

Introduction to Fluids in Motion

V. Manjula, Dr. K. V. Chandrasekhar

1137 – 1139

Review Analysis of Automated Mobile Application Testing

Sapana Desai, Prashant Keswani

1146 – 1149

Emotion Based Information Retrieval System

Bhavana Tiple, Prof. Achamma Thomas

1150 – 1153

VLSI Realization of Switched Hamming Neural Network for 3-Bit Digit Recognition

S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

1187 – 1190

Design and Analysis of Current Mirror Circuits on HSPICE 180nm Technology

S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

1191 – 1195

VLSI Implementation of Modified Hamming Neural Network for non Binary Pattern Recognition

S. Archana, Dr. B. K. Madhavi, Dr. I V Murlikrishna

1196 – 1198

Implementation Ids for Web Security Mechanism against Injection and Multiple Attacks

Ms. Anupriya Mishra, Ms.Megha Bhalkar, Ms.Priyanka Mahakalkar

1209– 1213

Security Aspects of Mobile Based E Wallet

G. Kanimozhi, K.S. Kamatchi

1223 – 1228

Building a GUI Application for Viewing and Searching Apache Kafka Messages

Shivkumar Goel, M Prabhanath Nair, T Varghese John

1229 – 1231

Fusion of Two Images using DWT and PCA Methodology

Miss. Yashashri Katole, Prof. D. M. Sable

1245– 1248

E-learning – An Indian Perceptive

Miss Deepali Pande, Dr. V. M Wadhai, Dr. V. M Thakare

1249 – 1251

Cybercrime and Cyber Law Pertaining to India: An analysis

Shinde Kashmira Jayvant, Rekha P.

1256 – 1260

Capability Analysis of Attacks in Wireless Sensor Network

Neha Singh, Dr. Deepali Virmani

1266 – 1270

Geographic Routing in Clustered Wireless Sensor Network

Shaziya Parveen Umar Khan, Dr. A. S. Khan

1317 – 1319

A Survey on Various Routing Protocols in Manet with Various Protection Schemes

Suman Bala, Er. Amandeep Singh Bhandari, Dr. Charanjit Singh

1320 – 1325

Survey on Mobile Social Cloud Computing (MSCC)

Rakshit Gupta, Piyush Kumar Shukla, Rajeev Pandey

1332 – 1340

Design of an Efficient Viterbi Decoder using Xilinx

Nishat Khan, Dr. A.S Khan

1361 – 1363

Service Recommendation System using Social User’s Rating Behaviors

Atul K. Jamnekar, Prof. P. B. Sambhare, Prof. P. D. Soni

1364 – 1369

Use of Metaheuristic Algorithms in Malware Detection

Wasiur Rhmann, Gufran Ahmad Ansari

1370 – 1374

Cloud Based Framework for Autism Spectrum Disorder Therapy App

Nagaraj G, Sumanth Simha C, Samarth S, Dr. Indiramma M

1379 - 1383

Big Data Clustering Algorithm and Strategies

Nithya P, Kalpana A M

1387 – 1391

Healthcare Monitoring System

Mrs. A. G. Andurkar, Ms. Suvarna S. Patil

1392 – 1406

Energy Efficient Cluster Head Selection Method in Wireless Sensor Network

Ms. Navneet Kaur Cheema, Prof. Simarjot Kaur

1407 – 1411

A Review on Applications of Peltier Devices

Upendra Kumar, Rajbir

1417 – 1418

Wireless Security System with Password Protection

Upendra Kumar, Manjeet Kaur

1419 – 1421

Hand Gesture Classification Using Emg Signal

Arshi Anjum, Prof. Muzaffar Khan, Sana Ali

1443 – 1447

Implementations of the IoT Devices in the Agriculture Fields

Devik Vekriya, Malav Vasita, Dr. Rajan Datt, Prof. Dhaval Jha

1448 – 1451

Comparitive Study of Plain Foundations with Shell Foundations

Wrushali Punwatkar, Prof. G D Dhavale

1482 – 1484

Enhancement of Security of Digital Data with Steganography Technique

Arpana Bharani, Dr. Jitendra Sheetlani

1485 – 1487

Review of MAC Unit for Complex Numbers

Priyanka W. Kinge, Prof. Dr. D. R. Dandekar

1488 – 1490

Comprative Study Kirchoff’s and Tutte Matrix Theorem

Dr. Sudhir Prakash Srivastava

1497 – 1501

Secure Powerline Communication for Rural and Hilly Areas

Arshad J. Ali, Prof. Shubhangi Borkar

1507 – 1510