CONFERENCE DATE: Pune, 16-03-2014 |
Data Security In Cloud Using Password Generation Techniques | |||||||||||
Page(s): | 01-06 | ||||||||||
Author | S.A.Darade, Vaishnavi Deokar, Sayali Deshpande, Radhika Devkar | ||||||||||
|
Anomaly Extraction In The Network Using Association Rule Mining | |||||||||||
Page(s): | 07-08 | ||||||||||
Author | Gayatri r. Dahiwadkar, sayali M. Gaikwad, sarojani B. Salgar, Bhagyashree B. Sawant, sanketa S. Sawant | ||||||||||
|
Intelligent Traffic Light Control System (ITLCS) | |||||||||||
Page(s): | 09-12 | ||||||||||
Author | A.D.Jadhav, Bhor madhuri t., Thakre ketan l. | ||||||||||
|
A Comparative Study Of Channel Estimation For Multicarrier System For Qam/Qpsk Modulation Techniques | |||||||||||
Page(s): | 13-17 | ||||||||||
Author | Ramakrishna.S, Priyatamkumar | ||||||||||
|
Capacity Enhancement Of Short Circuit Laboratory Using Parallel Operation Of Transformer | |||||||||||
Page(s): | 18-23 | ||||||||||
Author | Tejpal purohit, H. K. Mishra, Hemang pandya | ||||||||||
|
Detection of Suspicious URLS In Twitter Stream | |||||||||||
Page(s): | 24-27 | ||||||||||
Author | Nilesh B. Nikumbhe1,Ravi uyyala | ||||||||||
|
Numerical Study Of Subsonic Flow Over A Cascade Of Three Plates | |||||||||||
Page(s): | 28-31 | ||||||||||
Author | Parul Aghi, Roschelle R. Martis, Ajay Misra | ||||||||||
|
Ranking Adaptation And Semantic Data Repository Through An Inference Policy Engine | |||||||||||
Page(s): | 32-35 | ||||||||||
Author | J.H.Rekha, V.Vidhya, S.Nivetha, B.Vanathi | ||||||||||
|
Application Of Wireless Power Transmission Via Radio Frequency (RF) Signal | |||||||||||
Page(s): | 36-39 | ||||||||||
Author | Raj Kumar Patel, Aishwarya Raut, Pratik Sonawane | ||||||||||
|
Powering Commercial Building Using Distributed Genration | |||||||||||
Page(s): | 40-44 | ||||||||||
Author | Karishma Patil, Aditya Parihar, Suraj Musale | ||||||||||
|
Application Of High Temperature Superconductors In Designing Efficient Power Transmission System | |||||||||||
Page(s): | 45-48 | ||||||||||
Author | Pooja Patil, Nikita Bhagawatkar, Ankita Sonowane | ||||||||||
|
Crystalline Silicon Solar Cells Based On Ceramic Substrates | |||||||||||
Page(s): | 49-51 | ||||||||||
Author | Ankita K. Patil, Avinash Baitade, Sachin Varade | ||||||||||
|
Brushless Dc Motor | |||||||||||
Page(s): | 52-55 | ||||||||||
Author | Apurva Sanjay Mahajan, Yugandhara Sanjay Mahajan, Sneha Vijay Wadje | ||||||||||
|
Application Of Exergy (Availability) Analysis To Spark-Ignition Engines Operation Considering A Single-Zone Combustion Model | |||||||||||
Page(s): | 56-60 | ||||||||||
Author | Ankur Manikandan | ||||||||||
|
Theoretical & CFD Analysis Of De Laval Nozzle | |||||||||||
Page(s): | 61-64 | ||||||||||
Author | Nikhil D. Deshpande, suyash S. Vidwans, Pratik R. Mahale, Rutuja S. Joshi, K. R. Jagtap | ||||||||||
|
Discovering Time Dependent Multicast Network Using Β-Synchronizer | |||||||||||
Page(s): | 65-68 | ||||||||||
Author | Pradhnya S. Kalaskar, Prachi jaini | ||||||||||
|
Compressed Sensing Using Deterministic Measurement Matrix in WSN | |||||||||||
Page(s): | 69-72 | ||||||||||
Author | Sneha R.Walke, Prachi Jaini | ||||||||||
|
Crack Detection In Cantilever Beams Using A New Hybrid Approach | |||||||||||
Page(s): | 73-78 | ||||||||||
Author | Shshank Garg, Rounak Chawla, Bhagat Singh | ||||||||||
|
An Overview of IOT Architecture Scheme Suitable for Smart Grid | |||||||||||
Page(s): | 79-83 | ||||||||||
Author | Navrati Saxena, Jinghua Ding | ||||||||||
|
Applications and Open Issues of Internet of Things: A Brief Overview | |||||||||||
Page(s): | 84-89 | ||||||||||
Author | Jinghua Ding, Navrati Saxena | ||||||||||
|
Smart M2m Uplink Scheduling Algorithm Over LTE | |||||||||||
Page(s): | 90-93 | ||||||||||
Author | Jinghua Ding, Navrati Saxena | ||||||||||
|
Patient Monitoring using Wireless Networks | |||||||||||
Page(s): | 94-97 | ||||||||||
Author | Ku. Sheetal dabrase, Ku.monika chaware, Ku. Priyanka jodhe, Pranay Bhaskar | ||||||||||
|
VLSI Implementation Of Area Optimized ALU Using GDI Technique | |||||||||||
Page(s): | 98-102 | ||||||||||
Author | Akshay Dhenge, Abhilash Kapse, Sandip Kakde | ||||||||||
|
Ornithopter Design and Operation | |||||||||||
Page(s): | 103-106 | ||||||||||
Author | Akshay Bhargava, Apoorv Bhargava, Saurabh Kr. Jangid | ||||||||||
|
Design and analysis of an All Terrain Vehicle | |||||||||||
Page(s): | 107-111 | ||||||||||
Author | Gaurav s. Chimote, Kartik P. Rajas, Alok Kumar Mishra | ||||||||||
|
Comparative Harmonic Analysis of Vsi Fed Induction Motor Drive | |||||||||||
Page(s): | 112-117 | ||||||||||
Author | Nikhil D. Patne, Sushant S. Angre, Monalisa Dash | ||||||||||
|
Solving Dna Sequence Assembly Using Particle Swarm Optimization With Inertia Weight And Constriction Factor | |||||||||||
Page(s): | 118-124 | ||||||||||
Author | R. Indumathy, S. Uma maheswari | ||||||||||
|
Wireless Power Transfer | |||||||||||
Page(s): | 125-127 | ||||||||||
Author | Abhijeet Orke, Arvind Rathod, Monali Waghmare, Vishakha Sahane, Pravin Sagoriya | ||||||||||
|
Dadcq Protocol As An Adaptive Approach In Manet | |||||||||||
Page(s): | 128-130 | ||||||||||
Author | Vaishali Kashiwar, Prachi Jaini | ||||||||||
|
Controlling Algorithm For A Remote Head Module Carrier In Nuclear Environment | |||||||||||
Page(s): | 131-135 | ||||||||||
Author | Evin K Ealias, Atul Kumar Singh, Arvind Singh Shekhawat, Renuka Bhandari | ||||||||||
|
Secured Data Storage In Cloud Environment Using Time Varying Secret Key | |||||||||||
Page(s): | 136-139 | ||||||||||
Author | Ram Pradhan | ||||||||||
|
Support Vector Machine Based Heartbeat Classification | |||||||||||
Page(s): | 140-144 | ||||||||||
Author | N P Joshi, P S Topannavar | ||||||||||
|
Steganography Based Online Voting System Using Biometric Security | |||||||||||
Page(s): | 145-148 | ||||||||||
Author | Shweta A. Tambe., P. S. Topannavar. | ||||||||||
|
Design The Framework For A High-Performance Distributed Web Crawler | |||||||||||
Page(s): | 149-153 | ||||||||||
Author | Shishir Sarkar | ||||||||||
|
Design & Implementation Of Fixed Width Modified Booth Multiplier | |||||||||||
Page(s): | 154-158 | ||||||||||
Author | Saroj p. Sahu, Rashmi Keote | ||||||||||
|
Secured Cloud Computing With Decoy Documents | |||||||||||
Page(s): | 159-161 | ||||||||||
Author | Dnyanesh S. Patil, suyash S. Patil, Deepak P. Pote, Nilesh V. Koli | ||||||||||
|
Web-Based Erp System Using Cloud | |||||||||||
Page(s): | 162-165 | ||||||||||
Author | Mayuri Murkute, Kalyani Sankpal, Rupali Dhanawate, Saad Khan, Priti Lahane | ||||||||||
|
Text Extraction From English Comic Images Using Connected Component Algorithm | |||||||||||
Page(s): | 166-169 | ||||||||||
Author | Pawar Pooja, Rashmi Phalak, Waghmare Jayashri, Shinde Yugandhara | ||||||||||
|
VLSI Design Of Barrel Shifter Using Complementary And Pseudo Nmos Logic | |||||||||||
Page(s): | 170-172 | ||||||||||
Author | Dhananjay Jadhav, Mithilesh Muley, Mangesh Ashtankar | ||||||||||
|
Amazon?s Approach To Cloud Security | |||||||||||
Page(s): | 173-178 | ||||||||||
Author | Aishwarya Anand | ||||||||||
|
Bus Assistance Application Using Gps, Gsm And Android | |||||||||||
Page(s): | 179-181 | ||||||||||
Author | Mitali Wasekar, Apurva Pingle, Snehashri Chavhan, Mayura Wase, Krutika Wandhare, Sarikashelke | ||||||||||
|
A System To Filter Unwanted Messages Fromosn User Walls | |||||||||||
Page(s): | 182-185 | ||||||||||
Author | Vikrant Sanghvi, Nanaware Amol, Divya Nadar, Chitra Bhole | ||||||||||
|
Rotation Invariant Image Registration Using Robust Shape Matching | |||||||||||
Page(s): | 186-189 | ||||||||||
Author | Meenal D Divate, Seema.R.Baji | ||||||||||
|
A Survey On Naturalness Preservation Of Images And Performance Measurements | |||||||||||
Page(s): | 190-193 | ||||||||||
Author | Urvashi Manikpuri, Yojana Yadav | ||||||||||
|
Face Detection And Recognition Of Video Characters | |||||||||||
Page(s): | 194-198 | ||||||||||
Author | S.A.Darade, Pooja Deshmukh, Komal Bamgude, Pranali Lande, Priyanka Shahane | ||||||||||
|
Tree Based Association Rules Mined From Xml Document For Xml Query Answering | |||||||||||
Page(s): | 199-201 | ||||||||||
Author | Swati N. Patil, R. V. Mane | ||||||||||
|
Finger Vein Recognition System Using Image Processing | |||||||||||
Page(s): | 202-205 | ||||||||||
Author | Rashmi R. Tallam, Supriya S. Temgire, Rinku M. Zirange | ||||||||||
|
Gaming Through Viola Jones Method | |||||||||||
Page(s): | 206-210 | ||||||||||
Author | Parmanand Mishra, Chaitali Nagrale, Pooja Mrig, Mona Choudhary | ||||||||||
|
Code Clone Detection Technique Using Weighted Graph And CFG | |||||||||||
Page(s): | 211-214 | ||||||||||
Author | R.V.Patil, Madhuri Lole, Ruchira Kudale, Rajani Konde, S.D.Joshi, V.Khanna | ||||||||||
|
Spam Zombie Detection And Blocking Mechanism | |||||||||||
Page(s): | 215-218 | ||||||||||
Author | Tanvi Dange, Dhanashree Kolpe, Pratiksha Kutal, Ashwini Khairkar | ||||||||||
|
Optimize The Power In Mimo Cognitive Radio Network | |||||||||||
Page(s): | 219-221 | ||||||||||
Author | Priyanka Shahare, Dipti Theng | ||||||||||
|