Published: 2017-07-31

Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment

Moiz Husain Bohra, Prof. Sandeep Raghuwanshi, Dr. Yogendra Kumar Jain

01 – 05

Simulation of Five Level Diode Clamped Multilevel Inverter

P. Anil Kumar, K. Kartheek, B. Madhukar

19 – 24

Automatic Lawn Mower using Green Energy Sources

Kanchana K, Pheba Cheriyan, Anoop K J

46 – 49

Collation of Mobile Ad-Hoc Network Protocols

Bharti Rohilla, Dr. Poonam Singal

50 – 53

Importance of Land Use Planning and its Considerations

Ar. Tulsi N Patel, Ar. Parul Shastri

69 – 71

A Review of ECG signals for Human Emotion Detection

Deepak Kumar, Prof. Hemant Kumar Gupta, Prof. Rahul Shrivastava

72 – 76

Challenges in Dynamic Resource Allocation and Task Scheduling in Heterogeneous Clouds

Ms. Ragini Karwayun, Dr. H. S. Sharma, Dr. K. P. Yadav

93 – 97

Low Leakage and PDP Optimized FinFET based 8T SRAM Design

Ayushi Gagneja, Dr. Rajesh Mehra

116 – 120

Big Data Analytics Issues and Challenges: A Survey

Dr. D. Lakshmi Sreenivasa Reddy, Dr. Mudumbi Krishna Murthy

136 – 140

Secure Transaction Model for NoSQL Database Systems: Review

Mrs. Chaitra M, Md Aquib Raza Usmani, Priyanshu, Ranjan Mishra, Rashid Ahmed

141 – 144

Review of Digital Image Forgery Detection

Jigna J. Patel, Dr.Ninad Bhatt

152 – 155

Analysis of Privacy Issues in Cloud Computing

Neetu Anand, Dr. Tapas Kumar

162 – 167

Under Publication Process

Under Publication Process

181 – 185

Single Arc Truncated Suspended Rectangular Microstrip Antenna

Suryakanth Nirate, R. M. Vani, P. V. Hunagund, S. L. Mallikarjun

186 – 188

Natural Language Processing Semantical and Syntactical Analysis for English

Gayatri P Patil, Mallamma V Reddy, Suman P Gouda, Nishali R Nandarage

219 – 222

BER Analysis of OFDM Systems with Varying Frequency Offset Factor over AWGN and Rayleigh Channels

Amandeep Singh Sehmby, Dr. Harjit Pal Singh, Er. Navneet Gill

223 – 227

A Survey on the Use of Pattern Recognition Techniques

Raj Kumar Goel, Saurabh Srivastava

258 – 262

On Demand Feedback Analysis for Certification Process

A M Chandrashekhar, Muktha G S

263 – 268

A Survey on Wireless Sensor Network For Agriculture

Mr. Shankar Pujari, Mr. Nagaraju Bogiri

269 – 272

Threats –Solutions in Cloud security

Ranjit Kumar, L. Venkateswar Reddy

279 – 282

Elective Subject Selection Recommender System

Rishi Kumar Dubey, Umesh Kumar Pandey

306 – 310

Translating SQL to Spreadsheet: A Survey

Tasnim T. Hajiwala, Prof. Santosh A. Shinde

320 – 323

Framework for Product Recommandation for Review Dataset

Kaki Sudheshna, Arumilli Bala Sushma Sri, Achutuni Indraja, S. Adinarayana

324 – 330

An Implementation Tour to AngularJS

Preeti Yadav, Bhupender Singh

358 – 360

Conservation of fauna of Seshachalam Biosphere Reserve – An overview

Prof. D. Bharathi, Dr. B. Hemavathi, Dr. A. Shobha Rani

361 – 368

Design and Implementation Recognition System for Handwritten Hindi/Marathi Document

Rupal Saoji, Prof. S. W. Mohod, Prof. M. C. Nikose

369 – 373

Face Recognition in the Scrambled Domain Using MK-RDA

Ms. Kavita Kadam, Prof. C. R. Jadhav

378 - 383

Enhanced VGDRA for Dynamic WSN

Sonam, Damanpreet Singh

399 – 406

Finding nearest Neighbor in Geo-Social Query Processing

Mr. Swapnil Nanabhau Pingale, Prof. Ashish B. Manwatkar

407 – 411

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

Saudamini B. Ingale, Miheeka G. Chaudhary, Anjali R. Patil, Aishvarya Akshaya V., Dhanashree Toradmalle

482 – 485

Design of suitable Magnitude Comparator Architecture for Big Data Analytics

Ms. Reshma B. Chougale, Mrs. Vanita Agarwal

486 – 489

Implementing Provable Security and Group Key Agreement for Conbe Scheme

Suman Gupta, M. Madhavi, G. Vishnu Murthy

490 – 493

Optimization of A Smart IOT Gateway

Rashida Shujaee, Prof. M. Nasiruddin

494 – 501

Vigorous Module Based Data Management

M. P. Bidve, Prof. N. J. Pathan

502 – 506

GST and Online Marketplace: A Love-Hate Affair

Ankit Dhamija, Deepika Dhamija

507 – 513

Under Publication Process

Under Publication Process

514 – 519

Hybrid Approach for Face Recognition Using DWT and LBP

Pawanpreet Kaur Harra, Deepak Aggarwal

523 – 527

Characterizations of Prime and Minimal Prime Ideals of Hyperlattices

A. D. Lokhande, Aryani B Gangadhara, Jameel A Ansari

532 – 548

Development of Human-Biometric Sensor Interaction Model for Distinctive Assert Framework

T.Venkat Narayana Rao, Shiny Kannarapu, Khasim Shaik

558 – 562

Prediction Techniques in Internet of Things (IoT) Environment: A Comparative Study

Rakshith M D, Dr. Harish H Kenchannavar, Dr. Thyagaraju G S

581 – 590

High Speed and Low Power Consumption Carry Skip Adder using Binary to Excess-One Converter

Sanyukta Vijaykumar Chahande, Prof. Mohammad Nasiruddin

595 – 598

Multi-Level Inverter For Domestic Application

Avinash. V, Raghumanth. A, Venugopal.N

603 – 608

Synthesis and Characterization of Er Doped CaZrO3 Phosphors

Sk. Erfan, B. Subba Rao, P Sai Raju, D. Srinivasa Rao, K. V. R. Murthy

620 – 622

Data Mining and Life Science: A Survey

Dipti N. Punjani, Dr. Kishor Atkotiya

633 – 636

Power Efficient and High Speed Carry Skip Adder using Binary to Excess One Converter

Sanyukta Vijaykumar Chahande, Prof. Mohammad Nasiruddin

637 - 641

The FM / FM / 1queue with Single Working Vacation

G. Kannadasan, N. Sathiyamoorthi

648 – 654

A Hybrid Procreative –Discriminative Based Hashing Method

Ambresh Bhadra Shetty, Soumya M M

664 – 668

Booster in High Dimensional Data Classification

Ambresh Bhadrashetty, Vishalaxi

673 – 677

Explicit Minimum Storage Regenerating Codes

Ambresh Bhadra Shetty, Pratibha

684 – 686

Grouping of Hashtags using Co-relating the Occurrence in Microblogs

Ambresh Bhadra Shetty, Megharani S Ambalgi

687 – 689

Path Planning on Roads using Cache

Ambresh Bhadra Shetty, Bhagyashree M.Mogalai

690 – 692

Implementation of ECC and ECDSA for Image Security

Dhanashree Toradmalle, Varsha Sonigara, Kiran Singh, Omkar Kakade, Krishnachandra Panigrahy

734 – 737

Detection of Compromised Accounts in Online Social Networks

P. Rajeshwari, M. Madhavi, G. Vishnu Murthy

738 – 741

Secure and Reliable Data Transfer across Multiple Entities by Using LIME

B. Sneha, N. Swapna Goud, G. Vishnu Murthy

742 – 744

Under Publication Process

Author 1, Author 2

745 – 748

Elementary Concepts of Big Data and Hadoop

Hasmukh B. Domadiya, Dr. Girish C. Bhimani

749 – 752

TAG ME: An Accurate Name Tagging System for Web Facial Images using Search-Based Face Annotation

Mr. Ansari Mohammed Abdul Qadir Ataullah, Prof. R.P.Dahake

753 – 758

wgr?-I-Homeomorphism in Ideal Topological Spaces

A. Jayalakshmi, C. Janaki

798 – 802

Secure Fog Computing System using Emoticon Technique

Harish Kumar, Sampada Shinde, Pratvina Talele

808 – 811

Design and Implementation of Optimized 32-Bit Reversible Arithmetic Logic Unit

Er. Ravijot Kaur, Er. Amandeep Singh Bhandari

835 – 840

Homometric Number of Graphs

Aparna Lakshmanan S., Manju K. Menon, Anu V.

846 – 850

SOC Module for IOT Based Smart Water Monitoring

R. Padmanabhan, D. Elamukil, P. T. V. Bhuvaneswari

865 – 870

Spectrum Sensing Using CSMA Technique

Rahul Kumar Garg, Nitin Halkara

881 - 883

Shakespeare and His Theater

Richa Mahajan

892 - 894

A Review Paper Based on Content-Based Image Retrieval

Yogendra Singh Rathore, Vishal Shrivastava

895 - 899