1
|
ENERGY STORAGE SYSTEM, THEIR TYPES AND NEED FOR INTEGRATION OF RENEWABLE ENERGY TO SMART GRID
Toshi Mandloi ,Anil K Jain
|
1-5
|
|
2
|
SIMULATION OF THREE PHASE SEVEN-LEVEL INVERTER WITH REDUCED NUMBER OF SWITCHES FOR BLDC DRIVE
K. Raghubabu, K. Sandhyarani, M.Srividhya, CH .Vidhyasagar
|
6-11
|
|
3
|
VARIOUS SECURITY ISSUES AND THEIR REMEDIES IN CLOUD COMPUTING
Mridula Batra,Dr.Neha Gupta
|
16-18
|
|
4
|
VIRTUAL IMPLIMENTATION OF MEMORY ELEMENTS DIGITAL CIRCUITS SYSTEMS USING LAB VIEW
Priyanka Anand, Mittarpal, Asha
|
19-27
|
|
5
|
IMPROVED HYPER-HEURISTIC SCHEDULING WITH LOAD-BALANCING AND RASA FOR CLOUD COMPUTING SYSTEMS
Geetinder Kaur,Sarabjit Kaur
|
28-35
|
|
6
|
CHALLENGES AND DATA MINING MODEL
Divya Joshi,Chanchal Kumari,Abhishek Srivastava
|
36-41
|
|
7
|
PROTECTION OF E COMMERCE WEBSITES FROM D- DOS ATTACK
Abhishek Wadhwa,Vyomkesh Nandan
|
42-44
|
|
8
|
QUINSERTION: A HYBRID SORTING TECHNIQUE
Pavi Saraswat,Anurag Yadav
|
45-49
|
|
9
|
ELUCUBRATION OF ASPECT ORIENTED PROGRAMMING
Shivam Verma, Ved Prakash Singh, Vaibhav Varshney
|
50-54
|
|
10
|
GRASP PERFORMANCE IMPROVEMENT USING ACTIVE LEARNING IN VISION BASED HAND PROSTHESIS
Jayant Kashyap,Sahil Agarwal
|
55-61
|
|
11
|
INNOVATIVE AND OPTIMIZED COMPUTING
Rishabh Joshi,Neharika Pandey,Sahil Agarwal
|
62-67
|
|
12
|
RECENT EMERGENT TRENDS IN SENTIMENT ANALYSIS ON BIG DATA
Bhupendra, Komal Varshney, Dhruv
|
68-72
|
|
13
|
NUMERIC IMAGE ENHANCEMENT TECHNIQUES
Rishabh Agrawal, Samarth Agarwal, Saumya Shukla, Yatish Soorma
|
73-75
|
|
14
|
ANT COLONY OPTIMIZATION: A SOLUTION OF LOAD BALANCING IN CLOUD
Rishabh Agrawal, Samarth Agarwal, Saumya Shukla, Yatish Soorma
|
76-79
|
|
15
|
>DATA HIDING IN IMAGE USING LSB WITH DES CRYPTOGRAPHY
Krati Yadav,Swapnil Rajput
|
80-85
|
|
16
|
AGE ESTIMATION FROM SPEECH USING GAUSSIAN MIXTURE MODEL
Jyoti Gupta,Shagufta,Neha,Poornima Gupta
|
86-88
|
|
17
|
DATABASE WATERMARKING TECHNIQUES
Hira Khan, Parul Srivastava, Ritu Dagar, Suhasini
|
89-93
|
|
18
|
SECURE SPREAD: AN INTEGRATED ARCHITECTURE FOR SECURE GROUP COMMUNICATION
Arjeeta Tripathi,Anshika Mishra,Shudhanshu Purwar,Kirti Sharma
|
94-99
|
|
19
|
APPLYING RSA ON ASCII VALUE FOR ENCRYPTION AND DECRYPTION OF DATA
Abishek Kumar, Ashish Kumar, Manu Sharma
|
100-102
|
|
20
|
SECURED MAIL
Abhishek Srivastava, Shivangi Singh, Shalini Gupta, Antu Rani
|
103-106
|
|
21
|
INTRUDER DETECTION SYSTEM
Gayatri Bhagat,Megha Soni,Priyanka Singh
|
107-109
|
|
22
|
DATA LAKE FOR SOCIO-KNOWLEDGE PLATFORMS
Ankit Khanna,Hardik Bhatt,Hardik Marya,Rakshit Sakhuja
|
110-113
|
|
23
|
GEO-ENCRYPTION TO ACCESS THE DATA USING AES ALGORITHM
Himanshu Pant,Vinay Kaushik,Priyanshi Singhal,Vishal
|
114-116
|
|
24
|
ENHANCEMENT OF CHEST X-RAY IMAGING USING IMAGE PROCESSING
Yogesh Singh,Santosh Singh,Keerti Mathur
|
117-120
|
|
25
|
IMAGE PROCESSING: A BETTER MEANS FOR DIAGNOSIS OF LUNG CANCER
Yogesh Singh,Santosh Singh,Keerti Mathur
|
121-123
|
|