S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Generation of Nanometer Optical Tweezers Used for Optical Communication NetworksA.NIKOUKAR, I.S.AMIRI, J.ALI |
|
3 |
2 |
Detection of Edges Using Fuzzy Inference SystemABHRADITA DEEPAK BORKAR, MITHILESH ATULKAR |
|
1 |
3 |
Cloud Cluster NexusPROF B.B.GITE, ANKUR JAISWAR, ALISHA TELRANDHE, SANDEEP MASKE |
|
2 |
4 |
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud ComputingDR. T.NALINI, DR.K.MANIVANNAN,VAISHNAVI MOORTHY |
|
1 |
5 |
A Vector Quantization Technique for Image Compression using Modified Fuzzy Possibilistic C-Means with Weighted Mahalanobis DistanceDR. S.SATHAPPAN |
|
1 |
6 |
Privacy Preserving & Access Control to Intrusion Detection in Cloud SystemSWATI P. RAMTEKE, PRIYA S.KAREMORE, S.S.GOLAIT |
|
2 |
7 |
Book Tracking Application in Android For Library using GPSAKHIL CHOUDARI, SANKALP JOSHI, AKSHAY BEMBALKAR, NAINESH MARATHE, L.J.SANKPAL |
|
2 |
8 |
Privacy Conserving Approach to Anonymous DatabaseJAIMIN MARFATIA, NAINISH MODI, NIRAJ LAD, VAISHALI PATEL, JIGNASA PATEL |
|
1 |
9 |
3D Face Recognition Using Pose and Illumination CompensationDR.A.MUTHU KUMARAVEL |
|
1 |
10 |
A Social Collaboration Platform for SchoolsANURESH KOTHARI, AAKASH GHOGARE, PIYUSH NANDAN, BHARATI SHINDE |
|
1 |
11 |
Mobile Messaging using Wi-Fi Adhoc NetworkPIYUSH VILAS SHEWALE, AMIT SUBHASH SHELKE, SOURABH MADHUKAR DARANGE |
|
2 |
12 |
Automatic Overtaking for Accident Avoidance and Automatic Windscreen WiperMS.SAMIKSHA P.NATE, MS.SHWETA B.BANSUDE, MS.ANUJA M.BHOSALE, PROF. A.S.SHITOLE |
|
1 |
13 |
Education-As-A-ServiceKALAIPRASATH.R, R. UDAYAKUMAR, R. ELANKAVI |
|
2 |
14 |
An Energy-Efficient, Cross Layer Approach for Time-Critical Applications in Underwater Sensor NetworksRAKESH V S, SRIMATHI C |
|
2 |
15 |
The Efficiency of the Scalable Architecture for Revealing and Observing the Environment using Wireless SensorB.SUNDAR RAJ |
|
1 |
16 |
A Study on Cloud Resource Management TechniquesD.MAHENDRAN, M.GOPI, S. PRIYADHARSHINI, R.KARTHICK |
|
2 |
17 |
Mock Manager ToolPRIYANKA BANSAL, MAMTA VADHARIYA, APURVA NARASIMHAN, ANKIT MEHTA, MRS. SHWETA TIWASKAR |
|
1 |
18 |
Automate and Secure Your Home Using Zigbee TechnologyNAUSHEEN BELIM, HARSHADA BHAMBURE, PRIYANKA KUMBHAR, SIMRANJIT TUTEJA |
|
1 |
19 |
Performance Comparison of Single Channel Speech Enhancement Techniques for Personal CommunicationMILIND U. NEMADE, PROF. SATISH K.SHAH |
|
1 |
20 |
Textile Reinforced Structural Composites for Advanced ApplicationsARVIND VASHISHTHA |
|
10 |
21 |
Image Retrieval Using Personalized and Non-Personalized SearchDR.A.MUTHU KUMARAVEL |
|
1 |
22 |
Survey of Attacks on Wireless NetworkANKUR BAWISKAR, DR. B.B.MESHRAM |
|
1 |
23 |
Generation of New Julia Sets and Mandelbrot Sets for Inverse Sine FunctionRAJESHRI RANA, YASHWANT SINGH CHAUHAN |
|
1 |
24 |
Hybrid Algorithm for 2D Image Compression using Wavelet TransformC.PRIYA |
|
1 |
25 |
Open Loop Travelling Salesman Problem using Genetic AlgorithmAKSHATHA .P.S, VASUDHA VASHISHT, TANUPRIYA CHOUDHURY |
|
1 |
26 |
Wide band LH Circular Polarized Antenna; Design and AnalysisK.PRAVEEN KUMAR, K.SANJEEVA RAO, V.MALLIKARJUNA RAO, N.ANJANEYA VARAPRASAD, C.MURALIMOHAN |
|
1 |
27 |
Intelligent Train Engine For The Fastest New Age TechnologyANIL KUMAR VERMA, DHARMENDRA KUMAR, GOPAL KRISHNA GOLE, JITENDRA KUMAR |
|
1 |
28 |
Fault Diagnosis Using LP-TPG for Random Logic CircuitsJ. KAUSHIK, M. JAYASANTHI |
|
1 |
29 |
A Technique for changing or adding the attribute of shape files through mobile device in a distributed system environmentRITIK SHARMA , SAURABH KAUSHIK, SHUBHANGI GARG, HIMANSHU SETIYA |
|
1 |
30 |
Analysis of Software Functional Programming and Imperative ProgrammingV.Thangadurai, Dr.K.P.Yadav, Dr.K.Krishnamoorthy |
|
2 |
31 |
Number Plate Detection with Application to Electronic Toll Collection SystemKANNAN SUBRAMANIAN |
|
1 |
32 |
XML Path Algorithm for Matching XML Elements with Different QueriesK.KARTHIBAN, M.ARUL JOTHI, G S MAGTHALIN NISHA, V.SINDHU |
|
1 |
33 |
Five Level Inverter with SARC Boost Converter for PV ApplicationsT.RANGANATHAN,J.SUNIL KUMAR |
|
1 |
34 |
Efficient Email Spam Prediction using Feedback Clustering TechniqueVenkata Sai Sriharsha Sammeta, K Jairam Naik, K Ram Mohan Rao |
|
1 |
35 |
Network Attacks and Their CountermeasuresAJIT KOTKAR, ALOK NALAWADE, SIDDHESH GAWAS, ANIKET PATWARDHAN |
|
7 |
36 |
A Customized Three Estimate Value Model of Requirements for a Business ModelVENKATESWARLU S, VIDUSHI SARMA
|
|
6 |