1
|
COMBINATION OF CONTENT BASED IMAGE RETRIEVAL TECHNIQUES FOR PERFORMANCE IMPROVEMENT
Er. Jaspreet Kaur, Er. Shikha Mantrao, Er. Ramandeep Kaur
|
1-4
|
|
2
|
INCREASING SINGLE IMAGE RESOLUTION AND DENOISING USING COMBINATION OF BICUBIC INTERPOLATION AND SPARSE REPRESENTATION
Anita Dangi,Pankaj Rakheja
|
5-9
|
|
3
|
PERFORMANCE EVALUATION OF WCDMA SYSTEM FOR DIFFERENT MODULATIONS WITH EQUAL GAIN COMBINING SCHEME
Rajkumar Gupta
|
10-14
|
|
4
|
GRID-CONNECTED PV-FC HYBRID SYSTEM POWER CONTROL USING MPPT AND BOOST CONVERTER
B. Jagadish Kumar,K. Vyshnavi Sai Sree
|
15-22
|
|
5
|
ENHANCED MODEL OF STUDENT INFORMATION MANAGEMENT SYSTEM
Sharada Baindoor, Rakshanda P, S P Adhira Devi, Sadhana K M
|
23-25
|
|
6
|
MATHEMATICAL STUDY OF NON-UNIFORM HEAT SOURCE ON MHD HEAT TRANSFER IN A LIQUID FILM OVER AN UNSTEADY STRETCHING SHEET
Ananthaswamy. V,Yogeswari. N
|
26-36
|
|
7
|
ROLE OF 3D PRINTING TECHNOLOGY
Manoj Kumar
|
37-40
|
|
8
|
KNOWLEDGE EXTRACTION FOR DISASTER MITIGATION AND RAPID DEPLOYMENT THROUGH INDICATORS
Dr. P. K. Chande,Dr. Rajesh Sodhani,Dr. A. K. Goyal
|
41-45
|
|
9
|
WEB CRAWLING TO EXTRACT AND ANALYZE THE DATA FROM TWITTER AND COMPUTE THE PROBABILITY OF TWEETS
Manjunath Patil,Prof. Pavithra P
|
46-51
|
|
10
|
ENHANCED MODEL FOR SECURE TRANSMISSION OF TEXT USING AN AUDIO FILE
Alfred Augustin,Thrupthi,Veena Kamath,Prof. Rajgopal K. T.
|
52-55
|
|
11
|
VOICE ASSISTANCE FOR PEOPLE WITH SPEAKING ABNORMALITIES
Jyothish Yadav M, Anooj H.N, Mathews K.Varghese, Surekha Mariam Varghese
|
56-57
|
|
12
|
COMPARISON OF PERFORMANCE ANALYSIS OF TEEN & FAULT TOLERANT TEEN PROTOCOL IN WIRELESS SENSOR NETWORK
Tamanna,Anshu Sharma,Sarabjit Kaur
|
58-64
|
|
13
|
FPGA IMPLEMENTATION OF HIGH SPEED DCT COMPUTATION OF JPEG USING VEDIC MULTIPLIER
Prasannkumar Sohani,P.C.Bhaskar
|
65-69
|
|
14
|
AN OPTIMISED WEIGHT BASED CLUSTERING ROUTING PROTOCOL SCHEME IN MANETS FOR IMPROVED QOS
Manpreet Kaur, Sarabjit Kaur, Anshu Sharma
|
70-78
|
|
15
|
A NEW PRACTICAL APPROACH OF MANAGEMENT SYSTEM
Archana R, Meghana.S, Nandini Pai, Athira M
|
79-82
|
|
16
|
KEYWORD OPTIMIZATION: RELEVANT KEYWORD EXTRACTION
Ranjitha K S,Manjuprasad B
|
83-86
|
|
17
|
OPTIMAL METHOD FOR SHARING INTERNET IN WIRELESS MESH NETWORK USING FIXED-BAND NON-SHARING, NON-FIXED-BAND NON-SHARING / SHARING ALGORITHMS
Palanivel.N,Arun Prasath.A
|
87-91
|
|
18
|
AN ANDROID APP OCR+: FOR TEXT TRANSLATOR, DOCUMENT EDITOR, BUSINESS CARD READER & EQUATION SOLVER
Shefali Chaudhary, Rohan Malhotra, Mayank Jaiswal, Shikhar Gupta, Ravinder Ahuja
|
92-95
|
|
19
|
PERFORMANCE EVALUATION OF INTERPOLATION FACTOR IN RRC FILTER FOR MRC SCHEME IN WCDMA SYSTEM
Rajkumar Gupta,Amit Chaurasia
|
96-101
|
|
20
|
POMEGRANATE FRUIT DISEASE DETECTION AND CLASSIFICATION
Miss.Kshamarani Purvimath,Dr.Pushpa B.Patil
|
102-106
|
|
21
|
A STUDY OF MOVEMENT OF POINT ROBOT THROUGH NEURAL NETWORK
Lokesh Kumar Shrivastav
|
107-113
|
|
22
|
INTRADAY STOCK MARKET DATA ANALYSIS: BASED ON SIMULATION AND EMPIRICAL STUDIES
Lokesh Kumar Shrivastav
|
114-119
|
|
23
|
A DETAIL PRESERVING FILTER FOR HIGH DENSITY SALT-AND-PEPPER NOISE
Akansha Singh,Poonam Sharma,Krishna Kant Singh
|
120-123
|
|
24
|
EXUDATES DETECTION FROM RETINAL FUNDUS IMAGES USING PROBABILISTIC NEURAL NETWORK
Akansha Singh,Poonam Sharma,Krishna Kant Singh
|
124-128
|
|
25
|
COMPARISON AND ANALYSIS OF IT PROJECT RISK ASSESSMENT MODEL METHODS: PROPOSED ENTROPY RISK ASSESSMENT METHOD WITH MANUAL CALCULATION METHOD AND FUZZY TECHNIQUE BASED RISK ASSESSMENT
Pradnya Purandare
|
129-134
|
|
26
|
A CRITICAL EXAMINATION OF DATA MINING CLASSIFICATION TECHNIQUES IN MEDICAL IMAGE DATABASES
Kavita
|
135-139
|
|
27
|
PROCESS MINING FALLS IN BUSINESS INTELLIGENCE
Sadhana Singh,Preeti Pandey,Smriti Singh
|
140-143
|
|
28
|
DYNAMIC SIMULATION AND MODELING OF PHYSICAL BEHAVIOR
Lokesh Kumar Shrivastav
|
144-146
|
|
29
|
SHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES
Parneet Kaur,Shivani Goel
|
147-152
|
|
30
|
DETECTION OF INTEGRAL EQUATION BY IMAGE PROCESSING AND GENERATION OF SOLUTION
M. R. Apsangi, Amit N. Pawar, Vishal S. Khindkar, Aditya S. Dushing
|
153-155
|
|
31
|
INFORMATION ASSURANCE AND SYSTEM SECURITY IN CLOUD COMPUTING
Brahm Prakash Dahiya,Balkar Singh
|
156-158
|
|
32
|
VARIOUS LOAD BALANCING TECHNIQUES AND CHALLENGES IN CLOUD COMPUTING
Brahm Prakash Dahiya
|
159-162
|
|
33
|
IMPROVING TRANSIENT STABILITY OF WIND FARM USING FACTS DEVICES FOCUSED ON STATCOM
Kumar Pushpak, Anuradha, Balram Kumar, Agnivesh Ravi
|
163-167
|
|
34
|
SMART SOLUTION OF ANTIVIRUS IMPLEMENTATION WITH AUTO-UPDATE USING JAVA FRAMEWORK TO GUARD THE COMPUTERS
Dr. Sunita S.Padmannavar, Prof. Poonam R. Jadhav, Prof. Neha R. Dalal
|
168-174
|
|
35
|
PATCH ANTENNA IMPROVEMENT USING METAMATERIAL
Swati Gautam,Anshul Agrawal
|
175-178
|
|
36
|
BRAIN TUMOUR DETECTION FROM MRI IMAGES USING HYBRID GENETIC FCM
Deepa,Akansha Singh,Krishna Kant Singh
|
179-184
|
|
37
|
A NUCLEIC FILTER TO DEFEND THE DDoS ATTACKS IN CLOUD COMPUTING ENVIRONMENT
Mr. Oinam David Singh,Dr. Jayant Shekhar
|
185-188
|
|
38
|
EMERGING APPROACHES FOR LOAD BALANCING IN CLOUD
Roopali Gupta
|
189-191
|
|