Published Paper List:
Volume 4 - Issue 11, November Edition 2016
Kiran Pachlasiya and Pinkeshwar Mishra
User Authentication Using Image Processing Based on Lip Motion Detection.PDF
Volume 8 - Issue 7, July Edition 2020
Pratham Patel, Hardik Soni and Bhavishya Lohia
Detection of Sarcasm on Social Networks Using Neural Networks.pdf
Volume 8 - Issue 5, May Edition 2020
Wasim Khan and Dharmendra Gupta
Future Attraction of Digital Marketing Users - Review and Research Agenda.pdf
Volume 8 - Issue 3, March Edition 2020
Volume 7 -Issue 12, December Edition 2019
Volume 7 -Issue 11, November Edition 2019
Volume 7 -Issue 10, October Edition 2019
Sudhanshu Jaisani , Vrinda Diwan , Parth Katare
A Review and a Comparative Study of Object Detection Algorithms .pdf
Yash Bhawsar, Satyam Atasnia, Rajat Kumar Gupta
Research Paper On The Use Of Biometrics In Electronic Voting Machines.pdf
Neil Dhanotia , Piyush Chandak and Luv Kumar Saini
RFID Technology Principles, Benefits,Limitations & Its Applications.pdf
Volume 7 -Issue 9, September Edition 2019
Aman Khandegar, Chetan Khatke
Hand Gestures Detection and Recognition for Paralytic Person using Neural Network.pdf
Volume 7 -Issue 8, August Edition 2019
Sameeksha Jain, Harshit Sanwal
Design Approach For Opinion Mining In Hotel Review Using SVM With Particle Swarm Optimization (PSO).pdf
Mohit Kaothekar, Nachiketa Rajput, Khyati Mehta
Performance Analysis of Various Activation Function.pdf
Volume 7 -Issue 7, July Edition 2019
Sanjana Kukreja, Shweta Negi, Laya Gyanee
Multi-Level Clustering Machine Learning Algorithm (Mlcmla) For Fraud Detection In Banking Transactions.pdf
Volume 7 -Issue 6, June Edition 2019
Prem Narayan Jhaand Milind Chaturvedi
IoT Based Environment for Athlete’s Supervision (IoT - Athletics).pdf
Volume 7 -Issue 5, May Edition 2019
Volume 7 -Issue 4, April Edition 2019
Prachi Vaishnav, Romil Jain, Somya Lalwani
Digital Forensics And Analysis Of Intrusion Detection Techniques In Cloud Environment.pdf
Volume 7 -Issue 3, March Edition 2019
Himank Pathak, Shivank Awasthi, Jayant Devda
A Comparison Study of Various Credit Card Fraud Detection System.pdf
Devendra Kushwah, Arpit Motwani, Kuldeep Chouhan
Detection of Diabetic Retinopathy using Neural Network.pdf
Volume 7 -Issue 2, February Edition 2019
Volume 7 -Issue 1, January Edition 2019
Sudhanshu Jaisani,Vrinda Diwan,Parth Katare
A Review And A Comparative Study Of Object Detection Algorithms.pdf
Ms. Anushka Soni, Ms. Nitya Gupta, Ms. Muskan Khan
A Survey Paper on Data Security Algorithms- AES, DES and RSA.pdf
Volume 5 -Issue 10, October Edition 2017
Rashi Chouhan, Dr. Dhanraj Verma
Automated Email Filter Organizer with Information Management Application.pdf
Volume 5 -Issue 5, May Edition 2017
Chandan Kumar Gupta, Dr. C. S. Satsangi
Hybrid Approach for Image Compression Using SPIHT With Quadtree Decomposition.pdf
Volume 5 -Issue 3, March Edition 2017
Mr. Wasim Khan Mr. Narendra Kumar Sahu Mr. Navnit Choudhury
A literature Review and survey report on Green Computing The demand of Time.pdf
Volume 2 -Issue 4, February 2014
Volume 4-Issue 6, June 2016
Raghvendra Pratap Singh Rathore
A Survey on Face Parts Detection and Analysis Based on Feature Dependent Method.PDF
Deepika khandelwal
An Adaptive Replica Distribution Based Fault Tolerance Model for Cloud Computing.PDF
Volume 4-Issue 5, May 2016
Prof.A.Ramaswamy Iyengar,Associate Professor,Retail Management
Talents in retail Store Operations.pdf
Priyanka Sharma
Developing Server Exchanges on Intranet Using Intelligent Gateways Assistance Program for Web Services.PDF
Priyanka Sharma
Efficient Approach of Integration Server Using Intelligent Gateways for Controlling Traffic and Sharing.PDF
Volume 4-Issue 4, April 2016
Prof. K. S. Solanki , Pratap Singh Katara
Performance Evaluation of TCP over multi-path routing protocol using different TCP variant in mobile ad hoc networks.pdf
Volume 4-Issue 3, March 2016
Gursimran Singh Chawla , Anurup Moghe , Ishan Mandle , Vibhor Jaiswal
Implementation_of_IOT_application_based_on_Tracking_of_Vehicle_in_Case_of_EmergencyAccident_using_Raspberry_pi.pdf
Volume 4-Issue 1, January 2016
Anshul Tiwari
En_Review-_In_WEB_Mining_For_Text_Based_Feature_Extraction_Using_SVM_Categorization.pdf
Volume 3 -Issue 10, December 2015
Shahnawaz. Ahmad Siddiqi, Zaheeruddin
A_Secure_RSU_based_Vehicular_Communication_against_Hole_Attack_in_VANET.pdf
Volume 3 -Issue 9, November 2015
Volume 3 -Issue 8, October 2015
Volume 3 -Issue 7, September 2015
Hitesh shinde, Prof. Manish Barve
PERFORMANCE_ANALYSIS_OF_BIT_ERROR_RATE_FOR_DFT__DCT___DWT_BASED_OFDM_SYSTEMS.PDF
Mr. Manoj Prajapati,M.tech. Scholar, Mr. Zaheer Uddin, Associate. Prof.
Efficient Speckle Noise Reduction in SAR Images By Using simplified Bivariate Shrinkage Function.pdf
Volume 3 -Issue 4, June 2015
Durga Jhariya, Preeti Jain
Mitigation_of_Voltage_Sag_with_Transient_and_Steady-State_Control_Using_Dynamic_Voltage_Restorer.pdf
Shilpa Vishwakarma, Preeti Jain
Applications_of_STATCOM_in_the_Improvement_of_Dynamic_Performance_of_Wind_Power_Generation(1).pdf
Ashwini K Patil, P. Dinesh*and S.B.Patil
Study_of_Castor_Oil_Based_Quenchant_with_Metal_Salts_as_Quench_Accelerators_in_Heat_Treating_Medium_Carbon_Steels.pdf
Biswarup Nandi, Souvik Sur, Upasana Roy Chowdhury,Romit Beed
Drishti_Automated_Machine_Interface.pdf
Volume 3 -Issue 3, May 2015
Madhuri Mitola, Prof. Y. S. Thakur, Dr. D. K. Sakravdia
A_Study_of_Various_Edge_Detection_Methods.pdf
Ritesh Upadhyay, Prof. Y. S. Thakur, Dr. D. K. Sakravdia
A_Survey_on_Various_Steganography_Techniques_and_Their_Modifications.pdf
Mr. Ganesh Kohad, Prof. Y.S.Thakur, Dr. D.K.Sakravdia
A_Review_Over_Iris_Biometric_Recognition_System_Using_Canny_Edge_Detection.pdf
Mr.RajeshKhatri, Professor,
Design_and_Performance_Evaluation_of_Folded_Mixer_Topology_for_Ultra_Wideband_Communication.pdf
Shantilal Bhayal, Lalit Gehlod
Web_Based_Advance_Email_Filter_System_Using_text_Mining_Research_Paper.pdf
Volume 3 -Issue 2, April 2015
Lalit Gehlod , Shantilal Bhayal
A_Review_paper_on_Web_Based_Advanced_Email_Filter_System_Using_Text_Mining.pdf
Surya Pratim Kesh, Dr. Mousumi Majumdar, Dr. Sukanta Chandra Swain
Augment_The_Use_Of_Plastic_Money_And_Virtual_Wallet_Services_By_Emphasizing_the_Need_to_Reduce_Digital_Footprints.pdf
Volume 3 -Issue 1B, March 2015
Mr.Ganesh Kohad, Prof. Y.S.Thakur, Dr. D.K.Sakravdia
A_Comparatively_Study_Among_The_Differ_Biometric_System_Using_Digital_Image_Processing.pdf
Arpita Agrawal, Mrs. Amrita Soni
Performance_Analysis_of_2_Cross_2_MIMO-STBC_-WiMAX_System_Under_Efficient_Fading_Channel_using_Image_Transmission.pdf
Nishant Singh Rana & Prof. Girish Tiwari
Modelling_And_Analytical_Study_Of_Ieee802.15.4_Wireless_Sensor_Network.pdf
Volume 3 -Issue 1A, February 2015
Volume 3 -Issue 1, January 2015
Nishant Singh Rana1 & Prof. Girish Tiwari
A_Study_over_an_energy_efficient_MAC_protocol_in_Heterogeneous_Network_for_Intrusion_Detection.pdf
Volume 2 -Issue 12, December 2014
Prof. Girish Tiwari , Jogendra Raghuwanshi
Integrated_Wi-Fi__WiMax_Networks__A_Comparitive_Study.pdf
Volume 2 -Issue 11, November 2014
Associate Prof. K.S. Solanki Chanchal Barha
STUDY_ON_BEHAVIOR_OF_THE_ADAPTIVE_FILTER_BASED_ON_TDBLMS_ALGORITHM_FOR_IMAGE_NOISE_CANCELLATION.pdf
Volume 2 -Issue 10, October 2014
Volume 2 -Issue 9, September 2014
Volume 2 -Issue 8, August 2014
Volume 2 -Issue 7, July 2014
Vasudevan Janarthanan, Jorge Ramirez
Role_of_Information_Technology_in_the_Design__Planning_and_Evaluation_of_a_New_Business_Process.pdf
Dahmane HACHI , Badreddine NAAS , Bachir NAAS , AIDA Kamel, CHAHARA Belkacem
2D Modelling Induction Machine.pdf
Volume 2 -Issue 6, June 2014
Shailendra Vishvakarma, Prof.Amrita Soni
A_Review_of_Vertical_Handover_Decision_Making_Algorithms.pdf
Volume 2 -Issue 5, May 2014
Volume 2 -Issue 6, April 2014
REETA MALVIYA , Prof. PRAVEEN PATEL
HAZARD_IDENTIFICATION_AND_QUANTITATIVE_RISK_ASSESSMENT_IN_PROPANE_TANK.pdf
Volume 2 -Issue 4, February 2014
Chandrapal Singh Dangi, Prof. Ravindra Kumar, Prof. Gajendra Singh Chandel
An Ensemble Approach for Cyber Attack Detection using SVM.pdf
Dr. Mukta Dhopeshwarkar, Mrs. Manjiri Deshmukh
Study of 3D face recognition using Fourier Descriptors.pdf
Swati joshi (SDBCE), Indore
AnAlysis of schema matching technique for xml data using similarity computation.pdf
Puja Gupta,Jitendra Sheetlani
A review of Issues associated Ad-hoc routing protocols in ad-hoc Network.pdf
Volume 2 -Issue 2, December 2013
Achal Sharma, R.B Gaikwad
Comparison_of_CAMSHIFT_with_Highly_Efficient_Object_Tracking_Algorithm.pdf
Shweta kori,Satyawan Mehra,Vishal Trivedi ,Romil Rawat
Research_dataset_Evaluation_for_Technologies.pdf
Sumit Dhariwal,Sneha Soni,Shilpa Lakhina,Romil Rawat
Comparative_Effective_study_of_machine_learning_Techniques.pdf
Volume 2 -Issue 1, november 2013
Volume 1-Issue 12, october 2013
Ankur Patney, Yogadhar Pandey, Dr. Rajiv Srivastava
An Application of Information Security through Hybrid Approach in Cryptography Technique.pdf
Rashmi Vishwakarma, Sumit Dhariwal, Mohmmed Imran
Review EN efficient Approaches for MANETs in Rushing Attacks.pdf
Volume 1-Issue 11, September 2013
Mr. Neeraj Shrivastava, Ms. Vineeta Rathore
An_New_Approach_to_Make_TORA_Protocol_Energy_Efficient.pdf
Trupti Gangakhedkar,Prof. K.S. Solanki
Calculation of Peak to Average Power Ratio in OFDM Transmission.pdf
Volume 1-Issue 10, August 2013
Sourabh Gupta1, Girish Tiwari
Challenges to MAC Layer in Mobile Ad-Hoc Networks its Routing Protocols.pdf
Sachin Singh, A. Kulothungan
Efficient Grammar Recovery and Refactoring Through Parsing Technique.pdf
Volume 1-Issue 9, July 2013
Surendra kumar chadokar, Divakar Singh, Anju Singh
A survey of Frequent Itemsets Mining for Network Traffic.pdf
AKHILESH PANCHAL, R.B. GAIKWAD, NEHA SHARMA
Comparison between Adaptive Power Control Algorithm and Modified Adaptive Power Control Algorithm.pdf
Mr. Prakash. S. Prasad, Dr. Akhilesh R. Upadhyay
Interrupt Mechanism for Hybrid Operating System.pdf
Volume 1-Issue 8, June 2013
AkhileshPanchal,Rambhau Gaikwad,Trupti gangakhedkar,Ganesh kohad,Priyanka zamade
Modified Adaptive Step Size Power Control Algorithm for WCDMA.PDF
Shashi Bahir, Rahul Bangar, Sujit Shetty, Saurabh Shinde, Vandana Jagtap
Filesystem in Userspace FUSE.pdf
Ganesh kohad,Shikha gupta,Trupti gangakhedkar,Jogender raghuvanshi,Umesh ahirwar
Concurrency Control issues in Mobile Database.pdf
Ganesh kohad, Shikha gupta, Trupti gangakhedkar, Umesh ahirwar, Ajit kumar
Concept and techniques of transaction processing of Distributed Database management system.pdf
Megha Zodape, Mrs. Pragya Shukla
Analysis of Triple DES and RSA Algorithm in securing Image Steganography.pdf
Ayesha F Shariff , P Paniram Prasad, Noorullah Shariff
A Novel Social Networking and eLearning Solution for Engineering Community.pdf
Volume 1-Issue 7, May 2013
Dr. Gulnar Sharma, Prof. Sushopti Gawade, Prof . Pragati Unde
Prediction of Results in Education By Data Mining.pdf
Prof.Sushopti Gawade. Prof. Swati Chopade, Mr. Aniket patil
Intelligent Data Security Efficient Way to Store the data.pdf
Amrit Kumar, Ritu Beliya, kamalkishor Nagar
An Efficient Approach Based On Cluster system on MANETs Routing Protocol.pdf
Mr. S.Y.Ambatkar, Prof. Mrs. M. S. Joshi,Prof. Mrs. M.D.Ingole, Prof. Mrs. A. P. Deshmukh
Advanced Methodology to improve performance of RS-232 in REAL TIME Environment.pdf
Volume 1-Issue 6, April 2013
Neelam Singh Parihar, Deepa Verma, Parekh Ankita Arvindbhai
Obscure Surveillance and Server Monitoring.pdf
Mr. P. S. Prasad, Dr. Akhilesh Upadhyay, Dr. M. Joshi, Mr. S.Y.Ambatkar
Advanced Scheduling Policy and Its Performance For Embedded Real Time System.pdf
P.M. Mainkar, Shailesh.S.Ghule, Onkar.S.Ghate, Radharaman.N.Ojha
OPTIMAL SIDE LOBE REDUCTION OF LINEAR NON- UNIFORM ARRAY USING GENETIC ALGORITHM .pdf
Payal Thakur, Rakesh Singh Lodhi
Review of Sensorless Vector Control of Induction Motor Based on Comparisons of Model Reference Adaptive System and Kalman Filter Speed Estimation Techniq.pdf
Abhishek Joshi, Prasad Lahare, Mohit Mangal, Tushar Shinde, Madhura Phatak
Classification of Natural Scene Images Based on Emotion.pdf
Preeti.S.Ratnaparkhi, Devesh.D.Nawgaje
Vision Based Hand Gesture Recognition using Artificial Neural Network.pdf
P. M. Mainkar, Dr. G. N. Mulay, S.C.Upadhyay
Performance Evaluation of the RLS Adaptive Beamforming Algorithm.pdf
P.M. Mainkar, Shailesh.S.Ghule, Onkar.S.Ghate, Radharaman.N.Ojha
OPTIMAL SIDE LOBE REDUCTION OF LINEAR NON- UNIFORM ARRAY USING GENETIC ALGORITHM.pdf
F.Mhaboob Khan,I.Thanga Dharsni,J.Felcia
Implementation of Real Time Human Monitoring System Using Heart Beat Sensor and Triaxial Accelerometer.pdf
Mrs. Kavita Shelke
Classification And Detection Of Biological Early Brain Cancer Using Artificial Neural Network And Image Processing.pdf
B.Sujatha, Dr.S.Viswanadha Raju, Humera Shaziya
A Novel Architecture for the Natural Language Interface to Databases.pdf
Ashish Kumar Sahu, Abha Choubey
A Motion Detection Algorithm for Tracking of Real Time Video Surveillance.pdf
Volume 1-Issue 5, March 2013
Harshal Chepey, Rohit Deodhar, Sachin Kolhe, Shailesh Patil, Mamta Bhamare
Secured Program Evaluation System(SPES).pdf
Sukhpreet kaur, Harpreet Kaur
Performance_Analysis_of_Static_Space_Sharing_Scheduling_Policies-1.pdf
Mr.Arvind M Jagtap, Prof.Mrs.M.A.Shukla
Optimized_Node_Deployment_using_Enhanced_Particle_Swarm_Optimization_for_WSN.pdf
Harish Patidar
Design_of_multilevel_authentication_for_web_application_using_public_key_encryption.pdf
Ms. Pritee Pandurang Chinchkar,Prof. Sunita S. Barve
CRP__Routing_Protocol_for_Cognitive_Radio_Ad_Hoc_Networks.pdf
Volume 1-Issue 4,February 2013
Chandrapal Singh Dangi, Prof. Ravindra Kumar, Prof. Gajendra Singh Chandel
An Ensemble Approach for Cyber Attack Detection using SVM.pdf
Dr. Mukta Dhopeshwarkar, Mrs. Manjiri Deshmukh
Study of 3D face recognition using Fourier Descriptors.pdf
Swati joshi (SDBCE), Indore
AnAlysis of schema matching technique for xml data using similarity computation.pdf
Puja Gupta,Jitendra Sheetlani
A review of Issues associated Ad-hoc routing protocols in ad-hoc Network.pdf
Volume 1-Issue 3,January 2013
Volume 1-Issue 2,December 2012
Achal Sharma, R.B Gaikwad
Comparison_of_CAMSHIFT_with_Highly_Efficient_Object_Tracking_Algorithm.pdf
Shweta kori,Satyawan Mehra,Vishal Trivedi ,Romil Rawat
Research_dataset_Evaluation_for_Technologies.pdf
Sumit Dhariwal,Sneha Soni,Shilpa Lakhina,Romil Rawat
Comparative_Effective_study_of_machine_learning_Techniques.pdf
Volume 1:Issue 1,November 2012
Sagar Pandit, Toshi Jain, Rimpal Chugga, Pragya Bagdi
Study of search engines that travel World Wide Web.pdf
Ms.Rachna Singh Thakur, Shubham Pathak, Rupali Patil,Neha Kate,Aditi Badkul
GRAPHICAL PASSWORD (PUZZLES) AUTHENTICATION SYSTEM.pdf
Vishal Trivedi,Yagyapal Yadav, Romil Rawat,Surendra Kumar Shukla
FOTIS MODEL- Modeling of Reverse Attack.pdf
Volume 4 - Issue 11, November Edition 2016
Kiran Pachlasiya and Pinkeshwar Mishra
User Authentication Using Image Processing Based on Lip Motion Detection.PDF
Volume 8 - Issue 7, July Edition 2020
Pratham Patel, Hardik Soni and Bhavishya Lohia
Detection of Sarcasm on Social Networks Using Neural Networks.pdf
Volume 8 - Issue 5, May Edition 2020
Wasim Khan and Dharmendra Gupta
Future Attraction of Digital Marketing Users - Review and Research Agenda.pdf
Volume 8 - Issue 3, March Edition 2020
Volume 7 -Issue 12, December Edition 2019
Volume 7 -Issue 11, November Edition 2019
Volume 7 -Issue 10, October Edition 2019
Sudhanshu Jaisani , Vrinda Diwan , Parth Katare
A Review and a Comparative Study of Object Detection Algorithms .pdf
Yash Bhawsar, Satyam Atasnia, Rajat Kumar Gupta
Research Paper On The Use Of Biometrics In Electronic Voting Machines.pdf
Neil Dhanotia , Piyush Chandak and Luv Kumar Saini
RFID Technology Principles, Benefits,Limitations & Its Applications.pdf
Volume 7 -Issue 9, September Edition 2019
Aman Khandegar, Chetan Khatke
Hand Gestures Detection and Recognition for Paralytic Person using Neural Network.pdf
Volume 7 -Issue 8, August Edition 2019
Sameeksha Jain, Harshit Sanwal
Design Approach For Opinion Mining In Hotel Review Using SVM With Particle Swarm Optimization (PSO).pdf
Mohit Kaothekar, Nachiketa Rajput, Khyati Mehta
Performance Analysis of Various Activation Function.pdf
Volume 7 -Issue 7, July Edition 2019
Sanjana Kukreja, Shweta Negi, Laya Gyanee
Multi-Level Clustering Machine Learning Algorithm (Mlcmla) For Fraud Detection In Banking Transactions.pdf
Volume 7 -Issue 6, June Edition 2019
Prem Narayan Jhaand Milind Chaturvedi
IoT Based Environment for Athlete’s Supervision (IoT - Athletics).pdf
Volume 7 -Issue 5, May Edition 2019
Volume 7 -Issue 4, April Edition 2019
Prachi Vaishnav, Romil Jain, Somya Lalwani
Digital Forensics And Analysis Of Intrusion Detection Techniques In Cloud Environment.pdf
Volume 7 -Issue 3, March Edition 2019
Himank Pathak, Shivank Awasthi, Jayant Devda
A Comparison Study of Various Credit Card Fraud Detection System.pdf
Devendra Kushwah, Arpit Motwani, Kuldeep Chouhan
Detection of Diabetic Retinopathy using Neural Network.pdf
Volume 7 -Issue 2, February Edition 2019
Volume 7 -Issue 1, January Edition 2019
Sudhanshu Jaisani,Vrinda Diwan,Parth Katare
A Review And A Comparative Study Of Object Detection Algorithms.pdf
Ms. Anushka Soni, Ms. Nitya Gupta, Ms. Muskan Khan
A Survey Paper on Data Security Algorithms- AES, DES and RSA.pdf
Volume 5 -Issue 10, October Edition 2017
Rashi Chouhan, Dr. Dhanraj Verma
Automated Email Filter Organizer with Information Management Application.pdf
Volume 5 -Issue 5, May Edition 2017
Chandan Kumar Gupta, Dr. C. S. Satsangi
Hybrid Approach for Image Compression Using SPIHT With Quadtree Decomposition.pdf
Volume 5 -Issue 3, March Edition 2017
Mr. Wasim Khan Mr. Narendra Kumar Sahu Mr. Navnit Choudhury
A literature Review and survey report on Green Computing The demand of Time.pdf
Volume 2 -Issue 4, February 2014
Volume 4-Issue 6, June 2016
Raghvendra Pratap Singh Rathore
A Survey on Face Parts Detection and Analysis Based on Feature Dependent Method.PDF
Deepika khandelwal
An Adaptive Replica Distribution Based Fault Tolerance Model for Cloud Computing.PDF
Volume 4-Issue 5, May 2016
Prof.A.Ramaswamy Iyengar,Associate Professor,Retail Management
Talents in retail Store Operations.pdf
Priyanka Sharma
Developing Server Exchanges on Intranet Using Intelligent Gateways Assistance Program for Web Services.PDF
Priyanka Sharma
Efficient Approach of Integration Server Using Intelligent Gateways for Controlling Traffic and Sharing.PDF
Volume 4-Issue 4, April 2016
Prof. K. S. Solanki , Pratap Singh Katara
Performance Evaluation of TCP over multi-path routing protocol using different TCP variant in mobile ad hoc networks.pdf
Volume 4-Issue 3, March 2016
Gursimran Singh Chawla , Anurup Moghe , Ishan Mandle , Vibhor Jaiswal
Implementation_of_IOT_application_based_on_Tracking_of_Vehicle_in_Case_of_EmergencyAccident_using_Raspberry_pi.pdf
Volume 4-Issue 1, January 2016
Anshul Tiwari
En_Review-_In_WEB_Mining_For_Text_Based_Feature_Extraction_Using_SVM_Categorization.pdf
Volume 3 -Issue 10, December 2015
Shahnawaz. Ahmad Siddiqi, Zaheeruddin
A_Secure_RSU_based_Vehicular_Communication_against_Hole_Attack_in_VANET.pdf
Volume 3 -Issue 9, November 2015
Volume 3 -Issue 8, October 2015
Volume 3 -Issue 7, September 2015
Hitesh shinde, Prof. Manish Barve
PERFORMANCE_ANALYSIS_OF_BIT_ERROR_RATE_FOR_DFT__DCT___DWT_BASED_OFDM_SYSTEMS.PDF
Mr. Manoj Prajapati,M.tech. Scholar, Mr. Zaheer Uddin, Associate. Prof.
Efficient Speckle Noise Reduction in SAR Images By Using simplified Bivariate Shrinkage Function.pdf
Volume 3 -Issue 4, June 2015
Durga Jhariya, Preeti Jain
Mitigation_of_Voltage_Sag_with_Transient_and_Steady-State_Control_Using_Dynamic_Voltage_Restorer.pdf
Shilpa Vishwakarma, Preeti Jain
Applications_of_STATCOM_in_the_Improvement_of_Dynamic_Performance_of_Wind_Power_Generation(1).pdf
Ashwini K Patil, P. Dinesh*and S.B.Patil
Study_of_Castor_Oil_Based_Quenchant_with_Metal_Salts_as_Quench_Accelerators_in_Heat_Treating_Medium_Carbon_Steels.pdf
Biswarup Nandi, Souvik Sur, Upasana Roy Chowdhury,Romit Beed
Drishti_Automated_Machine_Interface.pdf
Volume 3 -Issue 3, May 2015
Madhuri Mitola, Prof. Y. S. Thakur, Dr. D. K. Sakravdia
A_Study_of_Various_Edge_Detection_Methods.pdf
Ritesh Upadhyay, Prof. Y. S. Thakur, Dr. D. K. Sakravdia
A_Survey_on_Various_Steganography_Techniques_and_Their_Modifications.pdf
Mr. Ganesh Kohad, Prof. Y.S.Thakur, Dr. D.K.Sakravdia
A_Review_Over_Iris_Biometric_Recognition_System_Using_Canny_Edge_Detection.pdf
Mr.RajeshKhatri, Professor,
Design_and_Performance_Evaluation_of_Folded_Mixer_Topology_for_Ultra_Wideband_Communication.pdf
Shantilal Bhayal, Lalit Gehlod
Web_Based_Advance_Email_Filter_System_Using_text_Mining_Research_Paper.pdf
Volume 3 -Issue 2, April 2015
Lalit Gehlod , Shantilal Bhayal
A_Review_paper_on_Web_Based_Advanced_Email_Filter_System_Using_Text_Mining.pdf
Surya Pratim Kesh, Dr. Mousumi Majumdar, Dr. Sukanta Chandra Swain
Augment_The_Use_Of_Plastic_Money_And_Virtual_Wallet_Services_By_Emphasizing_the_Need_to_Reduce_Digital_Footprints.pdf
Volume 3 -Issue 1B, March 2015
Mr.Ganesh Kohad, Prof. Y.S.Thakur, Dr. D.K.Sakravdia
A_Comparatively_Study_Among_The_Differ_Biometric_System_Using_Digital_Image_Processing.pdf
Arpita Agrawal, Mrs. Amrita Soni
Performance_Analysis_of_2_Cross_2_MIMO-STBC_-WiMAX_System_Under_Efficient_Fading_Channel_using_Image_Transmission.pdf
Nishant Singh Rana & Prof. Girish Tiwari
Modelling_And_Analytical_Study_Of_Ieee802.15.4_Wireless_Sensor_Network.pdf
Volume 3 -Issue 1A, February 2015
Volume 3 -Issue 1, January 2015
Nishant Singh Rana1 & Prof. Girish Tiwari
A_Study_over_an_energy_efficient_MAC_protocol_in_Heterogeneous_Network_for_Intrusion_Detection.pdf
Volume 2 -Issue 12, December 2014
Prof. Girish Tiwari , Jogendra Raghuwanshi
Integrated_Wi-Fi__WiMax_Networks__A_Comparitive_Study.pdf
Volume 2 -Issue 11, November 2014
Associate Prof. K.S. Solanki Chanchal Barha
STUDY_ON_BEHAVIOR_OF_THE_ADAPTIVE_FILTER_BASED_ON_TDBLMS_ALGORITHM_FOR_IMAGE_NOISE_CANCELLATION.pdf
Volume 2 -Issue 10, October 2014
Volume 2 -Issue 9, September 2014
Volume 2 -Issue 8, August 2014
Volume 2 -Issue 7, July 2014
Vasudevan Janarthanan, Jorge Ramirez
Role_of_Information_Technology_in_the_Design__Planning_and_Evaluation_of_a_New_Business_Process.pdf
Dahmane HACHI , Badreddine NAAS , Bachir NAAS , AIDA Kamel, CHAHARA Belkacem
2D Modelling Induction Machine.pdf
Volume 2 -Issue 6, June 2014
Shailendra Vishvakarma, Prof.Amrita Soni
A_Review_of_Vertical_Handover_Decision_Making_Algorithms.pdf
Volume 2 -Issue 5, May 2014
Volume 2 -Issue 6, April 2014
REETA MALVIYA , Prof. PRAVEEN PATEL
HAZARD_IDENTIFICATION_AND_QUANTITATIVE_RISK_ASSESSMENT_IN_PROPANE_TANK.pdf
Volume 2 -Issue 4, February 2014
Chandrapal Singh Dangi, Prof. Ravindra Kumar, Prof. Gajendra Singh Chandel
An Ensemble Approach for Cyber Attack Detection using SVM.pdf
Dr. Mukta Dhopeshwarkar, Mrs. Manjiri Deshmukh
Study of 3D face recognition using Fourier Descriptors.pdf
Swati joshi (SDBCE), Indore
AnAlysis of schema matching technique for xml data using similarity computation.pdf
Puja Gupta,Jitendra Sheetlani
A review of Issues associated Ad-hoc routing protocols in ad-hoc Network.pdf
Volume 2 -Issue 2, December 2013
Achal Sharma, R.B Gaikwad
Comparison_of_CAMSHIFT_with_Highly_Efficient_Object_Tracking_Algorithm.pdf
Shweta kori,Satyawan Mehra,Vishal Trivedi ,Romil Rawat
Research_dataset_Evaluation_for_Technologies.pdf
Sumit Dhariwal,Sneha Soni,Shilpa Lakhina,Romil Rawat
Comparative_Effective_study_of_machine_learning_Techniques.pdf
Volume 2 -Issue 1, november 2013
Volume 1-Issue 12, october 2013
Ankur Patney, Yogadhar Pandey, Dr. Rajiv Srivastava
An Application of Information Security through Hybrid Approach in Cryptography Technique.pdf
Rashmi Vishwakarma, Sumit Dhariwal, Mohmmed Imran
Review EN efficient Approaches for MANETs in Rushing Attacks.pdf
Volume 1-Issue 11, September 2013
Mr. Neeraj Shrivastava, Ms. Vineeta Rathore
An_New_Approach_to_Make_TORA_Protocol_Energy_Efficient.pdf
Trupti Gangakhedkar,Prof. K.S. Solanki
Calculation of Peak to Average Power Ratio in OFDM Transmission.pdf
Volume 1-Issue 10, August 2013
Sourabh Gupta1, Girish Tiwari
Challenges to MAC Layer in Mobile Ad-Hoc Networks its Routing Protocols.pdf
Sachin Singh, A. Kulothungan
Efficient Grammar Recovery and Refactoring Through Parsing Technique.pdf
Volume 1-Issue 9, July 2013
Surendra kumar chadokar, Divakar Singh, Anju Singh
A survey of Frequent Itemsets Mining for Network Traffic.pdf
AKHILESH PANCHAL, R.B. GAIKWAD, NEHA SHARMA
Comparison between Adaptive Power Control Algorithm and Modified Adaptive Power Control Algorithm.pdf
Mr. Prakash. S. Prasad, Dr. Akhilesh R. Upadhyay
Interrupt Mechanism for Hybrid Operating System.pdf
Volume 1-Issue 8, June 2013
AkhileshPanchal,Rambhau Gaikwad,Trupti gangakhedkar,Ganesh kohad,Priyanka zamade
Modified Adaptive Step Size Power Control Algorithm for WCDMA.PDF
Shashi Bahir, Rahul Bangar, Sujit Shetty, Saurabh Shinde, Vandana Jagtap
Filesystem in Userspace FUSE.pdf
Ganesh kohad,Shikha gupta,Trupti gangakhedkar,Jogender raghuvanshi,Umesh ahirwar
Concurrency Control issues in Mobile Database.pdf
Ganesh kohad, Shikha gupta, Trupti gangakhedkar, Umesh ahirwar, Ajit kumar
Concept and techniques of transaction processing of Distributed Database management system.pdf
Megha Zodape, Mrs. Pragya Shukla
Analysis of Triple DES and RSA Algorithm in securing Image Steganography.pdf
Ayesha F Shariff , P Paniram Prasad, Noorullah Shariff
A Novel Social Networking and eLearning Solution for Engineering Community.pdf
Volume 1-Issue 7, May 2013
Dr. Gulnar Sharma, Prof. Sushopti Gawade, Prof . Pragati Unde
Prediction of Results in Education By Data Mining.pdf
Prof.Sushopti Gawade. Prof. Swati Chopade, Mr. Aniket patil
Intelligent Data Security Efficient Way to Store the data.pdf
Amrit Kumar, Ritu Beliya, kamalkishor Nagar
An Efficient Approach Based On Cluster system on MANETs Routing Protocol.pdf
Mr. S.Y.Ambatkar, Prof. Mrs. M. S. Joshi,Prof. Mrs. M.D.Ingole, Prof. Mrs. A. P. Deshmukh
Advanced Methodology to improve performance of RS-232 in REAL TIME Environment.pdf
Volume 1-Issue 6, April 2013
Neelam Singh Parihar, Deepa Verma, Parekh Ankita Arvindbhai
Obscure Surveillance and Server Monitoring.pdf
Mr. P. S. Prasad, Dr. Akhilesh Upadhyay, Dr. M. Joshi, Mr. S.Y.Ambatkar
Advanced Scheduling Policy and Its Performance For Embedded Real Time System.pdf
P.M. Mainkar, Shailesh.S.Ghule, Onkar.S.Ghate, Radharaman.N.Ojha
OPTIMAL SIDE LOBE REDUCTION OF LINEAR NON- UNIFORM ARRAY USING GENETIC ALGORITHM .pdf
Payal Thakur, Rakesh Singh Lodhi
Review of Sensorless Vector Control of Induction Motor Based on Comparisons of Model Reference Adaptive System and Kalman Filter Speed Estimation Techniq.pdf
Abhishek Joshi, Prasad Lahare, Mohit Mangal, Tushar Shinde, Madhura Phatak
Classification of Natural Scene Images Based on Emotion.pdf
Preeti.S.Ratnaparkhi, Devesh.D.Nawgaje
Vision Based Hand Gesture Recognition using Artificial Neural Network.pdf
P. M. Mainkar, Dr. G. N. Mulay, S.C.Upadhyay
Performance Evaluation of the RLS Adaptive Beamforming Algorithm.pdf
P.M. Mainkar, Shailesh.S.Ghule, Onkar.S.Ghate, Radharaman.N.Ojha
OPTIMAL SIDE LOBE REDUCTION OF LINEAR NON- UNIFORM ARRAY USING GENETIC ALGORITHM.pdf
F.Mhaboob Khan,I.Thanga Dharsni,J.Felcia
Implementation of Real Time Human Monitoring System Using Heart Beat Sensor and Triaxial Accelerometer.pdf
Mrs. Kavita Shelke
Classification And Detection Of Biological Early Brain Cancer Using Artificial Neural Network And Image Processing.pdf
B.Sujatha, Dr.S.Viswanadha Raju, Humera Shaziya
A Novel Architecture for the Natural Language Interface to Databases.pdf
Ashish Kumar Sahu, Abha Choubey
A Motion Detection Algorithm for Tracking of Real Time Video Surveillance.pdf
Volume 1-Issue 5, March 2013
Harshal Chepey, Rohit Deodhar, Sachin Kolhe, Shailesh Patil, Mamta Bhamare
Secured Program Evaluation System(SPES).pdf
Sukhpreet kaur, Harpreet Kaur
Performance_Analysis_of_Static_Space_Sharing_Scheduling_Policies-1.pdf
Mr.Arvind M Jagtap, Prof.Mrs.M.A.Shukla
Optimized_Node_Deployment_using_Enhanced_Particle_Swarm_Optimization_for_WSN.pdf
Harish Patidar
Design_of_multilevel_authentication_for_web_application_using_public_key_encryption.pdf
Ms. Pritee Pandurang Chinchkar,Prof. Sunita S. Barve
CRP__Routing_Protocol_for_Cognitive_Radio_Ad_Hoc_Networks.pdf
Volume 1-Issue 4,February 2013
Chandrapal Singh Dangi, Prof. Ravindra Kumar, Prof. Gajendra Singh Chandel
An Ensemble Approach for Cyber Attack Detection using SVM.pdf
Dr. Mukta Dhopeshwarkar, Mrs. Manjiri Deshmukh
Study of 3D face recognition using Fourier Descriptors.pdf
Swati joshi (SDBCE), Indore
AnAlysis of schema matching technique for xml data using similarity computation.pdf
Puja Gupta,Jitendra Sheetlani
A review of Issues associated Ad-hoc routing protocols in ad-hoc Network.pdf
Volume 1-Issue 3,January 2013
Volume 1-Issue 2,December 2012
Achal Sharma, R.B Gaikwad
Comparison_of_CAMSHIFT_with_Highly_Efficient_Object_Tracking_Algorithm.pdf
Shweta kori,Satyawan Mehra,Vishal Trivedi ,Romil Rawat
Research_dataset_Evaluation_for_Technologies.pdf
Sumit Dhariwal,Sneha Soni,Shilpa Lakhina,Romil Rawat
Comparative_Effective_study_of_machine_learning_Techniques.pdf
Volume 1:Issue 1,November 2012
Sagar Pandit, Toshi Jain, Rimpal Chugga, Pragya Bagdi
Study of search engines that travel World Wide Web.pdf
Ms.Rachna Singh Thakur, Shubham Pathak, Rupali Patil,Neha Kate,Aditi Badkul
GRAPHICAL PASSWORD (PUZZLES) AUTHENTICATION SYSTEM.pdf
Vishal Trivedi,Yagyapal Yadav, Romil Rawat,Surendra Kumar Shukla
FOTIS MODEL- Modeling of Reverse Attack.pdf