S.No. Title Author Pages G. Scholar
1 Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms M.Venugopal, E.G. Rajan, Venkat Raman 1-
2 Improved Performance for “Color to Gray and Back” using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi 1-6
3 Combined Economic and Emission Dispatch Using Multiobjective Particle Swarm Optimization with SVC Installation Sravanthi Velaga, K.Padma 7-12
4 To Develop Prototype Model of FPGA and RF UP Converter Neeta S. Matti, Saroja V. Siddamal 13-18
5 Data Mining with Meteorological Data A. R. Chaudhari, D. P. Rana, R. G. Mehta 19-23
6 Optimal Coordination of Directional Overcurrent Relays using Interval Two Phase Simplex Linear Programming Shimpy Ralhan, Shashwati Ray 24-29
7 Segmentation of Similar Color Objects using Modified GrowCut Method Sayan Bhowal, Bibhas Chandra Dhara 30-35
8 Image Steganography using DCT-DST, Haar-DST, Walsh-DST, Hartley-DST Hybrid Wavelet Transforms H. B. Kekre, Sudeep D. Thepade, Ratnesh N. Chaturvedi 36-40
9 Multicast Routing in Scalable Networks using MAODV Jayalakshmi G Naragund, R M Banakar 41-47
10 Detection of facial features of frontal face color images Nidhi Tiwari, Mohd.Ahmed 48-52
11 Multi-Document Text Summarization using Mutual Reinforcement and Relevance Propagation Models Added with Query and Features Profile Poonam P. Bari , Shanta Sondur 53-57
12 Measuring Coverage Percentage for C Programs using Code Slicer and CREST Tool Sangharatna Godboley, Avijit Das, Kuleshwar Sahu3 , Durga Prasad Mohapatra, Banshidhar Majhi 58-63
13 Power Flow in PMSG Connected Wind Energy Conversion System through Current Source Converter Using Space Vector Modulation Technique B.D. Srinivasa Rao, Ch. Hemanth Kumar, V. Srikanth Babu 64-69
14 Feature based Opinion mining - towards Performance Measure Ravikiran Kalava, G.Anil Kumar, Ch.Vasavi 70-73
15 A Comparative Study of Amazon Web Service and Windows Azure Rajeev BV, Vinod Baliga, Arun kumar 74-81
16 Association Rule Mining Analyzation Using Column Oriented Database D. P. Rana, N. J. Mistry, M. M. Raghuwanshi 82-87
17 Comparative Analysis of Clustering Techniques for Real Dataset Kishor T. Mane, Vandana G. Pujari 88-91
18 Complexity analysis of MIMO sphere decoder using radius choice and increasing radius algorithms Suneeta V. Budihal, Rajeshwari M. Banakar 92-99
19 Development of Wireless Monitoring System for Neonatal Intensive Care Unit N.S. Joshi, R.K. Kamat , P.K. Gaikwad 100-103
20 Controller Design for Supercapacitor as Energy Storage in Medium Voltage AC System Pankaj Govind Hiray, B. E. Kushare 104-108
21 A Complete Analysis and Dynamic Simulations of Superconducting Quantum Interference Device (SQUID) Logic gates Kurapati Srinivas 109-114
22 Design of Structured Regular LDPC Codes without Short Cycles using Gray Code Representations Vibha Kulkarni, K. Jaya Sankar 115-120
23 Reconfiguration Challenges & Design Techniques in Software Defined Radio M. S. Karpe, A. M. Lalge, S. U. Bhandari 121-126
24 Software Defined Radio Principles and Platforms A.M.Lalge , M.S.Karpe , S.U.Bhandari 127-132
25 E-Governance services using Cloud Computing Services A.Rakesh Phanindra, V. B. Narasimha, M. L. Saikumar 133-138
26 Watchdog Technology to impose Information Authentication in Mobile Cloud over SaaS & PaaS Layers Vineet Guha, Rajeev Kumar Shrivastava, Manish Shrivastava 139-144
27 Multitenant Software as a Service: Application Development Approach Suhas Gajakosh, Mukta Takalikar 145-149
28 Object recognition with ORB and its Implementation on FPGA A.V.Kulkarni, J.S.Jagtap, V.K.Harpale 150-156
29 A Variable Length Distributed Source Coding Algorithm for WSNs K S Shivaprakasha, Muralidhar Kulkarni 157-162
30 Multi Way Feedback Encryption Standard (MWFES): Ver-I Purnendu Mukherjee, Prabal Banerjee, Asoke Nath 163-169
31 Defect Detection Efficiency: A Combined approach Rashmi N, Suma V 170-175
32 Emotion Recognition with Speech for Call Centres using LPC and Spectral Analysis Rashmirekha Ram, Hemanta Kumar Palo, Mihir Narayan Mohanty 176-181
33 Improving Tiled Bitmap Algorithm for Detection and Analysis of Tampered Database G. N. Dhanokar, S. P. Patil 182-187
34 Implementation of RC4 Stream Cipher Using FPGA S. C. Wagaj, Chetan Bagul, Ramkrushna Chaudhari 188-191
35 Task Cost Based Approach for Grid Service Reliability Modeling on Fault Recovery Nana Kacharu Zalte 192-197
36 An Application of Fuzzy Logic for Expert Selection Prajakta C. Dhote, Pradeep K. Butey 198-202
37 Modern Encryption Standard version IV: (MES-IV) Asoke Nath, Payel Pal 203-210
38 Face Recognition using Depth Map Generation for Smart phones Anshu Sisodhiya, Ankita Jain, R M Banakar 211-216
39 Executable UML plug-in for Eclipse A. M. Magar, N. J. Uke 217-220
40 A review of Opportunistic Routing for Wireless Ad-hoc Networks Nusrat Anjum, Sanjay Thakur 221-225
41 Interactive 3D Remote Visualization of Medical Volume Data in Distributed Environment Alok Pratap Singh, Piyush Kumar, Anupam Agrawal 226-232
42 Media Access Protocol in Vehicular Ad-Hoc Networks: A Survey Deepma Jain, Gaurav Shrivastava 233-237
43 Stability of n- Homomorphisms, n- Derivations of A n-Dimensional Additive Functional Equation in C*- Ternary Algebras M. Arunkumar, T. Namachivayam 238-243
44 Modern Encryption Standard version V: (MES-V) Asoke Nath, Bidhusundar Samanta 244-251
45 Field Programmable Gate Array based Simultaneous Temperature-Visualization on Video Graphics Array Monitor for Multi-Sensor Data Acquisition System P.K. Gaikwad 252-257
46 Perturbation of n-Dimensional Quadratic Functional Equation: A Fixed Point Approach S. Murthy, M. Arunkumar and G. Ganapathy 258-263
47 The improves energetic yield of high temperature fuel cell (MCFC) using advance techniques in modeling and optimization analysis S. K. Dhakad, S.C.Soni, Pankaj Agarwal 264-266
48 Result Analysis of Image Denoising Method based on Fourth-Order Partial Differential Equations Anand Swaroop Khare, Ravi Mohan, Sumit Sharma 267-271
49 Diabetic Retinopathy using Image Processing Detection, Classification and Analysis Snehal P. Savarkar , Namrata Kalkar , S.L.Tade 272-275
50 Concrete Structure Analysis and Classification using Image Processing Rashmi R.A, A.D Mane, S.L Tade 276-281
51 Green Computing and Green Technology based teaching learning and administration in Higher Education Institutions Shalabh Agarwal, KaustuviBasu , Asoke Nath 282-290
52 3-D Drawing Digital Pen V. S. Kayastha, V. N. Supe, S. U. Bhandari 291-295
53 New Median Based Adaptive and Robust Digital Image Secured System Shivani Maheshwari, Pushpendra Singh Tomar, Manish Shrivastava 296-301
54 Importance of Network Security in Internet of Things Bhagyashri H. Katole, Suresh V. 302-306
55 Error Code Correction Using Reed Solomon Codes: A Review Anshul Sarawagi, Manish Shrivastava 307-311
56 Minimal Routing Cooperation using Route Weight for MANET Neha Tripathi, Vivek Kumar, K.S. Raghuwanshi 312-318
57 Simulation of Airbag Impact on the Eye Using Finite Element Analysis Ravi Varma N., Darshana M. Jibhakate, Ankita Pravin Khawas 319-323
58 Best Path Finding using Location aware AODV for MANET Anagha Raich, Amarsinh Vidhate 324-328
59 Review on High Performance Energy Efficient Multicore Embedded Computing Archana S. Shinde, Swapnali B. Bhosale, Ashok R. Suryawanshi 329-335
60 Regression Analysis and Statistical Approach on Socio-Economic Data Syeda Farha Shazmeen, Mirza Mustafa Ali Baig, M. Reena Pawar 336-340
61 Identification & Detection System for Animals from their Vocalization A. D. Mane, Rashmi R. A., S. L. Tade 341-346
62 Secured Cloud Data with IA Prasad N H, Lakshmi Narayan B N, Pradeep Kumar S 347-350
63 E-Mine: A Web Mining Technique for Relevant Data Regions Vaishnavi J. Deshmukh, Anuja K. Pande, Sapna.Kaushik, Pallavi B. Rathod, Payal.Pawade 351-356
64 Thermoelectric Power Generation as an Alternative Green Technology of Energy Harvesting Ravi R.Nimbalkar, Sanket S. Kshirsagar 357-362
65 Comparative Analysis of Multipath Routing Techniques and Design of Secure Energy Aware Routing Algorithm for Wireless Sensor Network Simran R. Khiani,C. G. Dethe,V. M. Thakare 363-369
66 Speaker Verification Using I-Vectors N.S.Kalkar, S.P.Savarkar, RajaniP.K 370-378
67 Survey on Security aspect of WSN Gaurish Edake, Ganesh Pathak 379-383
68 A3 (Authenticate Auditor & Avail) for Preserving Integrity of Data in Cloud Computing Sagar Shivaji Sawant, Suhit Sukhadeo Kalubarme 384-389
69 Comparative Study on Image Segmentation Algorithms G. Evelin Suji , Y.V.S. Lakshmi , G. Wiselin Jiji 390-395
70 Hybrid Meta-heuristic Pattern Classification Rashmi G. Dukhi, Pratibha Mishra 396-400
71 Result Analysis of Bit-Error Rate (BER) of the MC DS-CDMA System Rishi Choubey, Ravi Mohan, Sumit Sharma 401-405
72 Implementation of wavelet family on biomedical images compression Monika shukla, Sonika arrora, Mangal singh 406-411
73 Result discussion with in MIMO-OFDM Systems with Multiple Antennas Jitendra Kumar Daksh, Ravi Mohan, Sumit Sharma 412-416
74 Design of Fuzzy Inference System for Contrast Enhancement of Color Images Nutan Y. Suple , Sudhir M. Kharad 417-421
75 Implementation of Fast Deblurring Process on Segments of Image by Blind Deconvolution Algorithm Neetin Kumar, Manish Shrivastava 422-425
76 An Assessment of the Impact of Dimensionality Reduction on the Speed and Accuracy of Hyperspectral Image Classification Abhineet Singh, Savita Verma, Mangal Raj, Anupam Agrawal 426-431
77 Optimization of Variable Speed Wind Turbine Using Pi Controller J.S.Sathiyanarayanan, A. Senthil kumar 432-436