CONFERENCE DATE: Date: 17th April, 2016 Venue: Pune, India |
Query by Example Spoken Term Detection Using Parallel Tokenizers | |||||||||||
Page(s): | 1-3 | ||||||||||
Author | Neha, A. U. Bapat | ||||||||||
|
Smart CCTV With an Advanced Security System Using GSM and OTP | |||||||||||
Page(s): | 4-6 | ||||||||||
Author | Snehal P. Aher, Pritee Moule, Sanket Mahajan, Pallavi Khairnar, Santosh Kumar | ||||||||||
|
Event Driven Tracking of Changes in Database at API Level | |||||||||||
Page(s): | 7-10 | ||||||||||
Author | Shivani Dhotre, V. S. Mahalle | ||||||||||
|
Position Encoders: AN Efficient System For Warehousing | |||||||||||
Page(s): | 11-15 | ||||||||||
Author | Kshitija Deshmukh, Ashitha Ann Santhosh, Saurabh Verma, Yogesh Mane | ||||||||||
|
Compilation of Calibration Data of the Compression Testing Machines | |||||||||||
Page(s): | 16-18 | ||||||||||
Author | Balasaheb Bhoye | ||||||||||
|
Compatibility of Chemical Admixture With Cement: Marsh Cone Test | |||||||||||
Page(s): | 19-23 | ||||||||||
Author | Durgesh Jadhav | ||||||||||
|
Study of Mix Design For High Performance Concrete | |||||||||||
Page(s): | 24-29 | ||||||||||
Author | Sachin Patil | ||||||||||
|
Comparison of Compressive Strength of Various Brands of Cement | |||||||||||
Page(s): | 30-32 | ||||||||||
Author | Sangita Bhamere | ||||||||||
|
An Experimental Investigation on Machinability of Waspaloy | |||||||||||
Page(s): | 33-39 | ||||||||||
Author | Shivaram, Gopinath Rathod | ||||||||||
|
Design and Estimation of Big Data Analysis Using Mapreduce and Hadoop-A | |||||||||||
Page(s): | 40-44 | ||||||||||
Author | Darshana Wajekar, Sushila Ratre | ||||||||||
|
Authentication & Isolation of Cryptographic Services For Cloud Computing | |||||||||||
Page(s): | 45-48 | ||||||||||
Author | Madhavi Shyamsunder Shinde | ||||||||||
|
Web Based Email Marketing Based Recommendation | |||||||||||
Page(s): | 49-52 | ||||||||||
Author | Dhanashree S. Dombe, Priyanka S. Garud, Arati T. Jagtap, Jyotsna V. Khairnar, Jyoti P. Kshirsagar | ||||||||||
|
Protective Headgear Using Smartphone Connectivity | |||||||||||
Page(s): | 53-56 | ||||||||||
Author | Patil Pritam, Kevin Nesamani, Anniesh J, Andhavarapu Siva, D. Ramkiran | ||||||||||
|
Software Project Scheduler Using Ant Colony Optimization and Event-Based Scheduler | |||||||||||
Page(s): | 57-60 | ||||||||||
Author | Utkarsha Patil, Jagruti Patil, Jayshri Patil, Sonali Waghmare, R.A.Deshmukh | ||||||||||
|
Environmental Conscious Product Design Using CAD and CAE | |||||||||||
Page(s): | 61-65 | ||||||||||
Author | P M Nandilkolmath, Gopinath Rathod | ||||||||||
|
A Review on Arbiters in Router For the Interconnection Network | |||||||||||
Page(s): | 66-68 | ||||||||||
Author | Ashish V Kayarkar, Deepti S.Khurge | ||||||||||
|
Prediction of Heart Disease Using ANN and Data Mining Techniques | |||||||||||
Page(s): | 69-72 | ||||||||||
Author | Monica Deshmukh, Vishakha Jadhav, Rupali Kaudare, Madhuri Lokhande, Nisha Kimmatkar | ||||||||||
|
Privacy Preserving K-Nearest Neighbor Classification Over Encrypted Cloud Data | |||||||||||
Page(s): | 73-75 | ||||||||||
Author | Pooja Bajare, Monika Bhoyate, Yogita Bhujbal, Erandole Monika, Vaishali Shinde | ||||||||||
|
Generating Effective Patterns Having Relevance With Set of Input Documents Given | |||||||||||
Page(s): | 76-79 | ||||||||||
Author | Bhamare Pranjal, Andhare Sohan, Bhavasar Manasi, Deore Diksha, S.D.Kale | ||||||||||
|
Parallel Video Processing Using Hadoop | |||||||||||
Page(s): | 80-83 | ||||||||||
Author | Bankar Swapnil, Bhagwat Vaibhav, G Shruti Goud, Kamble Sneha, Chandrama Thorat | ||||||||||
|
Deduplication of Files in Cloud Environment | |||||||||||
Page(s): | 84-88 | ||||||||||
Author | Megha A Shyadligeri, Shanta Kallur | ||||||||||
|
Data Sharing in Multi-Owner Style With Revocation Mechanism | |||||||||||
Page(s): | 89-92 | ||||||||||
Author | Usha F. Annigeri, Pradeep Surasura | ||||||||||
|
Deduplication System With Security and Improved Reliability | |||||||||||
Page(s): | 93-97 | ||||||||||
Author | Ade Monika, Gumate Sonali, Gutte Poonam, Kothawade Pranjali | ||||||||||
|
An Intelligent Approach to Resource Procurement in Cloud Computing | |||||||||||
Page(s): | 98-101 | ||||||||||
Author | Bendgude Ramprasad, Chavan Pradeep, Jagdale Shweta, Kute Supriya, S.R.Kakade | ||||||||||
|
Data Storage in Cloude Using Decentralized Access Control and Various Encryption Strategies | |||||||||||
Page(s): | 102-105 | ||||||||||
Author | Tejas Bangale, Kunal Gajar, Anushree Ghanekar, Tejaswini Joshi, G. D. Upadhye | ||||||||||
|
Phishstorm: An Automated Realtime Phishing Detection System For Emails | |||||||||||
Page(s): | 106-108 | ||||||||||
Author | Gaurav Deshmukh, Rushikesh Deshmukh, Sanket Fajage, Pratiksha Kate, A.B.Bagwan | ||||||||||
|
A Secure Key For Communication Using Cloud Computing | |||||||||||
Page(s): | 109-112 | ||||||||||
Author | Prerana Sarak, Farhin Shikalgar, Akshada Sonawane | ||||||||||
|
Strategic LTE Transitions on Cellular Broadcast Networks Within Rural Areas Using TV Bands | |||||||||||
Page(s): | 113-118 | ||||||||||
Author | Lijo Thomas, C.T Manimegalai | ||||||||||
|
Power System Stability Improvement Using GPSS, PIDMB, TCSC and STATCOM | |||||||||||
Page(s): | 119-125 | ||||||||||
Author | E.Kirankumar, V.C.Veera Reddy, P.Hema Chandu | ||||||||||
|
Gender Empowerment Through Skill Development: Paradox and Challenges in India | |||||||||||
Page(s): | 126 | ||||||||||
Author | Anupama Rawat | ||||||||||
|