Papers for Issue

Volume:3 Issue:5 May ' 2017

Sr No. Paper Title Abstract Page No Download
1 Application of Bio metric through mobile in Indian Banking
Author(s): Miss.Dhanashri B.Vaity.
View 1-6 pdf
2 Existence of Unique Common Fixed Point for Pairs of Mappings in Complete Metric Spaces
Author(s): Anil Saini , Seema Devi , Naveen Gulati.
View 7-12 pdf
3 Implementation of Smart Monitoring of Patients using IOT
Author(s): Amruta P. Kothawade.
View 13-17 pdf
4 Bogus Apps – Threat to cyber security
Author(s): Ms. Arati Anil Chile , Ms. Darshana Jitendra Lokhande.
View 15-22 pdf
5 A SEARCHING TECHNIQUE FOR MULTI DATA OWNERS IN CLOUD COMPUTING USING MULTI KEYWORD SEARCH
Author(s): M Manimegalai , Dr S Kirubakaran , S Dhanasekaran.
View 18-22 pdf
6 Review of Random Number Generation
Author(s): Shrutika Sanjivan Deshmukh , Bhagyashree Damle , Dr. Suhasini Vijaykumar.
View 23-26 pdf
7 Big Data Application In Indian Healthcare
Author(s): Sonali Vinaychandra Pandit.
View 27-32 pdf
8 A Survey On Different Scheduling Algorithm for Resource Optimizing in Cloud Computing
Author(s): Akanksha Sharma , S.R. Tandan.
View 33-36 pdf
9 A Study of Salesforce Security – OAuth and Manual Sharing
Author(s): Deepesh R Rao , Prof. Vidhya Rao.
View 37-43 pdf
10 THE HAND FLEXION OF PATIENTS MONITORING FOR REHABILITATION PURPOSE
Author(s): DHANASHRI VIJAY KULKARNI , ARCHANA SHEWALE.
View 44-49 pdf
11 IoT ENABLED FOREST FIRE DETECTION AND ONLINE MONITORING SYSTEM
Author(s): ABHINAV KUMAR SHARMA , Md Faiz Raza Ansari , Md Firoz Siddiqui , Mirza Ataullah Baig.
View 50-54 pdf
12 Wireless Power Transfer System
Author(s): Neeraj Kumar Bharti , Md. Faquih Alam , Ranu Kumari , Ravi Ranjan Singh.
View 55-56 pdf
13 MIMO Beamforming with Filter Bank Multicarrier Access Technique
Author(s): Sukanya.K.V , Mrs.Chandhini.T , Ms.Nithika.B.
View 57-64 pdf
14 AUTOMATIC RACKING MACHINE
Author(s): Pawan Chaudhary , Shivansh Prashar.
View 65-69 pdf
15 FPGA IMPLEMENTATION OF LIGHTWEIGHT PRESENT-GRP FOR RFID
Author(s): AMBILI.U , P.RAJASEKAR , PARANI. T.K.
View 70-78 pdf
16 A HYSYS Simulation Project for the Production of Synthetic Ethanol by Hydration of Ethylene
Author(s): Dr. Ruhul Amin , Mithun Kumar Sen , Rajata Suvra Chakrovorty.
View 79-85 pdf
17 Self-Adaptive Configuration Frames for Addressing Permanent Errors
Author(s): Seethika.G , Ms.Amrutha.E , Mr.P.Rajasekar.
View 86-95 pdf
18 LO DETECTOR WITH LESS TIMING MISALIGNMENT AND IMPROVED SIGNAL QUALITY
Author(s): SWATHI K S , E. Ramesh Marivendan , P. Rajasekar.
View 96-102 pdf
19 DETECTION OF POWER GRID SYNCHRONIZATION FAILURE
Author(s): MOHIT GERA , VIKRAM SINGH , RAM KUMAR PANDEY , SONU JAISWAL.
View 103-106 pdf
20 Reliability with accuracy: Verifying correctness of resultant of the Outsourced Frequent Item set Mining in Data-Mining-as-a-service Paradigm
Author(s): Revansidda Mulge , Dr. Kiran Kumari Patil.
View 107-111 pdf
21 Load Frequency Control Of Two Area Power System
Author(s): Km Preeti Tiwari , Jyoti Verma , Amandeep , Shubham Thapa.
View 112-162 pdf
22 MATERIAL SORTING AND STAMPING MACHINE
Author(s): Ekta Tripathi , Pawan Chaudhary.
View 163-169 pdf
23 Review Paper for Multiband and Ultra-wide band Microstrip Patch antenna
Author(s): Nidhi , Ajay Kumar Jaiswal , Jagtar Singh.
View 170-175 pdf
24 HAP TECHNOLOGY
Author(s): M. SUSHMA SRI.
View 176-184 pdf
25 Salesforce Tool for CRM : A Comparative Study
Author(s): Prajakta Pravin More , Seeza Franklin.
View 185-190 pdf
26 Improved Page Ranking in Search Engine Using Web Content Mining and Web Structure Mining
Author(s): Sapna kaushik , Babita Yadav.
View 191-194 pdf
27 Fruit Quality Inspection System Using Machine Vision: A Review
Author(s): Akshay Deshpande , J.K.Singh.
View 195-201 pdf
28 A Hybrid approach for Regression Test Case Prioritization using Branch Coverage, Code Coverage and Mandatory Requirement Coverage
Author(s): Varsha Kaushik , Babita Yadav.
View 202-206 pdf
29 AN EFFICIENT AND SECURED DATA TRANSMISSION IN WBAN USING U-WEAR TECHNOLOGY
Author(s): SRUTHI P.M , PARANI T.K , P. RAJASEKAR.
View 207-217 pdf
30 Cloud Computing – Issues in Data Privacy and Security Protection
Author(s): Saurabh Raghunath Dhirde , Prof.Shubhangi Mahadik.
View 218-222 pdf
31 Review on Steganography Based Reversible Texture Synthesis
Author(s): Shahara Banu.
View 223-229 pdf
32 Study On Implementation of Machine Learning and Data Mining Methods for Intrusion Detection
Author(s): Surbhi Kumari , Chaithra V , Shrihari M R , Dr. Manjunath. T. N.
View 230-235 pdf
33 A Survey on Image Denoiisng Algorithms
Author(s): Naseeba P P , Annes Phillip.
View 236-239 pdf
34 CHALLENGES ON NETWORK VIRTUALISATION
Author(s): A.M.Chandrashekhar , M.P Mahadeva Prasad.
View 240-246 pdf