Call For Paper Volume:4 Issue:7 Jul'2017 |

Papers for Issue

Volume:2 Issue:3 Mar ' 2015

Sr No. Paper Title Abstract Page No Download
1 Collaborative Based Clustering On Big Data Using HACE Theorem
Author(s): N.SARAVANAN , Chinnadurai.S , Dinesh Raj.R , Suguna.G.

View

1-6 pdf
2 A Systematic Review of Different Task Scheduling Algorithms in Cloud Computing
Author(s): Miteshkumar Girishbhai Patel , Upendra R.Bhoi.

View

7-11 pdf
3 A Review on Edge Detection Techniques Based on FPGA
Author(s): Umang I. patel , HIna patel.

View

12-18 pdf
4 ROOM SURVIELLANCE USING KEY FRAME EXTRACTION TECHNIQUE
Author(s): Sumeet Akhade , Akash Dakhore , Pradip Gosavi , Prof. Mrs. Preeti Shende.

View

19-22 pdf
5 A Heuristic Approach For Secure Communication in Mobile Ad-hoc Network
Author(s): Elakkiya.E , Sakthivel.S.

View

23-27 pdf
6 Malicious Detection In Manet Using Enhanced Adaptive Acknowledgement
Author(s): Vinodhini.C , Sakthivel.S.

View

28-32 pdf
7 Analysis Of Double-Tail Comparator With Reduced Delay
Author(s): Dhivya Bharathi.M , Thilakavathi.S.

View

33-38 pdf
8 Review on FPGA Based Digital Watermarking Techniques for Video Authent
Author(s): Parmar Dilipkumar B.

View

39-43 pdf
9 Result Analysis using CROI with JPEG and WAVELET on Natural Images
Author(s): Sejal Thakkar.

View

44-55 pdf
10 A Study on Improvement of Transient Stability using STATCOM in DFIG based Wind Farm
Author(s): Patel Vimal , Ravikumar Paliwal.

View

56-61 pdf
11 A SYSTEM TO ASSIST PEOPLE IN PROBLEMS AND WATCH AROUND
Author(s): Nrattanjay R Rane , Nidhi Priya , Om Prakash , P V Sindhoory , Mrs. Bhat Geetalaxmi Jayram (Associate Professor).

View

62-65 pdf
12 A REVIEW PAPER ON AN ENHANCEMENT TO PROJECTED SEQUENTIAL PATTERN MINING ON PREFIXSPAN ALGORITHM
Author(s): Rahul Saxena , Tanvi Varma.

View

66-70 pdf
13 Study About A Fast And Adaptive Signal Estimation Algorithm For Power Oscillations Component In Power Systems
Author(s): Sanjaysinh Raulji , Ajit Rathod.

View

71-79 pdf
14 Genetic based Semantic CBMANET
Author(s): Abhishek Naranje , Prateek Singh.

View

80-89 pdf
15 An Approach to choose Systems Engineering using Research Methodology
Author(s): Ritesh G. Patankar , Manoj P Parmar , Nilesh D. Patel .

View

90-95 pdf
16 Clustering Based Collaborative Filtering (CluBCF) Using HACE Theorem for Big Data
Author(s): Suguna. G , Karthik. R.

View

96-102 pdf
17 Review on Wavelet Based Image Fusion Techniques
Author(s): Anjali Bhatt , Dhara Dharsandia , Kalpa Mori.

View

103-110 pdf
18 Authenticating Secret Key-Exchange Between Two Parties
Author(s): DINESH RAJ.R , SARAVANA KUMAR.S , SARAVANAN.N.

View

111-115 pdf
19 Cloud Search Service: Using Multi-Keyword Search Query
Author(s): D.Packialakshmi , R.K.Sindhuja , K.Ramadevi.

View

116-119 pdf
20 Monitoring a Patient Using Wireless Sensor Networks and Internet of Things
Author(s): P.Janani , S.Jagadeeswari , Dr.N.Purushothaman.

View

120-123 pdf
21 A Smart Edu-Analysis using Ontology based Framework
Author(s): D.Rajalakshmi , J.Saranya , R.Rajasekar.

View

124-127 pdf
22 Security Enhancement for Databases Using Multifactor Authentication
Author(s): K. Nandhini , T. Narmadha , J. Vijayaraj.

View

128-130 pdf
23 ANALYSIS OF CHANNEL PERFORMANCE IN RATE AND POWER ALLOCATION SYSTEM FOR MIMO COGNITIVE RADIO NETWORKS
Author(s): E.VIDHYA , Ms.D.SATHYAKALA.

View

131-139 pdf
24 MPT BASED AUTONOMOUS WIND HYDRO HYBRID SYSTEM USING SCIG AND DFIG
Author(s): Hinduja D , Balaji G.

View

140-148 pdf
25 ANALYSIS OF VISIBLE LIGHT COMMUNICATION AND OFDMA SYSTEMS
Author(s): T.KANMANI , N.SARANYA.

View

149-157 pdf
26 Android Based Human Monitoring and Image Tracking With Sms Alert
Author(s): M.Ganapathy , G.Bharanidharan , G.Senthilkumar AP/IT.

View

158-161 pdf
27 Solving Nurse Rostering Problem Using Ant Colony Optimization Approach
Author(s): Ms. Lokare Pooja S. , Ms. Mahind Rupali N..

View

162-170 pdf
28 A NOVEL DYNAMIC AND SECURE AUTHENTICATION SYSTEM USING ACCELEROMETER SENSOR
Author(s): PRABHUKAVIN.B , Dr.S.UMA , DONBYNTALANG DEWKHAID , KARTHIKEYAN.M.

View

171-175 pdf
29 Captcha as Graphical Password with ClickText and AnimalGrid Session PW
Author(s): Priyanka .S , Nithya .S.

View

176-184 pdf
30 ACCIDENT ALERT SYSTEMS
Author(s): PRAJAKTA M , Farha Amreen , Pooja HN.

View

185-188 pdf
31 LBA-Location Based Alarm
Author(s): K.Jayamalini , Anjali Dwivedi , Priyanka Darji , Kunal Jadhav.

View

189-193 pdf
32 Wheel slip control of electric vehicle with conditional controllers
Author(s): ARUN PANDIAN.S , Murali Babu. B.

View

194-200 pdf
33 Carrier Interference Ratio Analysis and Cancellation scheme For OFDM System Affected by Frequency Offset or Phase Offset
Author(s): RAKSHITA R. NARNAWARE , MITHILESH MAHENDRA , MAMTA SARDE.

View

201-206 pdf
34 Android based Application’s Session Scheduler
Author(s): K. Jayamalini , Zubeen Sayed , Poonam Yadav , Waman Shirodkar.

View

207-209 pdf
35 MULTI-MODULE BIOMETRICS SYSTEM USING FACE AND EAR DETECTION
Author(s): Priti Shende , Adesh Tayade , Shrikant Taware , Amol Thorat.

View

210-212 pdf
36 Text Analytics for Big Data
Author(s): Dr Sharvari Tamane.

View

213-218 pdf
37 GENERATION OF SELF ACTING CODE FROM SINGLE DIMENSION FLOW CHART
Author(s): I.ILAYARANIMANGAMMAL , S.PALANIYAPPAN , S.ANBU SELVAN.

View

219-228 pdf
38 DESIGN AND COST OPTIMISATION OF PLATE HEAT EXCHANGER
Author(s): Christy Prakash , Delin Kuriakose , Benji Zachariah , Amith Francis.

View

229-234 pdf
39 A Survey on the Architecture for an Efficient Memory Built in Self-Test For Configurable Embedded SRAM Memory
Author(s): NISHA O. S. , Dr.K. SIVA SANKAR.

View

235-244 pdf
40 Vibration Analysis of Two Wheeler’s Silencer by Using FEM Package and FFT Analyzer
Author(s): Mr.S.H.Kondo , Prof.V.D.Wakchaure.

View

245-250 pdf
41 Techniques to prevent the users from Phishing Attack
Author(s): R.Sathya , J.Vijayaraj , N.Purushotaman.

View

251-255 pdf
42 Analysis of Load Balancing Algorithms In Cloud Environment
Author(s): K.Karthika , S.Muthukumar.

View

256-263 pdf
43 Optimal Pricing and Load Balancing Approach for Computational Grid
Author(s): Dr.P.Suresh , Dr. P. Keerthika , S. Nandhini.

View

264-272 pdf
44 AGENT ORIENTED LEADERSHIP SELECTION:A REVIEW
Author(s): Atrakesh Pandey , Mohd Arif , Mohd. Shahid Husain.

View

273-278 pdf
45 Concrete with ALCCOFINE and fly ash an Economical and Environment Friendly Approach
Author(s): Ansari Ubaidurrahman Salik , Chaudhri I M , Phatangre R.R. , Ghuge N.P..

View

279-285 pdf
46 On the of decay processes MHD turbulence
Author(s): Manish Kumar Singh.

View

286-294 pdf
47 Frequent Pattern Mining Based on Maximum and Minimum Count Approach for Different Computing Environments
Author(s): Parag Moteria , Dr Y.R.Ghodasara.

View

295-307 pdf
48 Colour Object Counting and Sorting Mechanism Using IPA
Author(s): Mr.Avadhoot Ramgonda Telepatil , Prashant M. Jadhav.

View

308-316 pdf
49 Adaptive Equalization System for Wireless Communication Using White LED
Author(s): V.R.Rajamohan , P.Ranjith , Mr.S.Gnanavel.

View

317-320 pdf
50 SIMPLE AND FAST ALGORITHM FOR DETECTING FOVEA REGION BY THRESHOLDING METHOD
Author(s): RENJI KURIAKOSE , T.Vandarkuzhali.

View

321-327 pdf
51 CIPHER SMS:RELIABLE AND SECURE SMS TRANSMISSION USING ANDROID
Author(s): k.lavanya , d.gomathi , M.S udhaya.

View

328-331 pdf
52 An Object Segmentation Method For Surveillance Application
Author(s): P.Nivetha , M.Padmapriya , S.Gnanavel M.E,(Ph.d).

View

332-334 pdf
53 Evaluation of Web Security Mechanisms Using Vait
Author(s): Anantharaman R , Hariharan M , Mohammed Ansar Ali M.A.

View

335-338 pdf
54 DECOMPOSITION AND RESTORATION OF CARTOON PLUS TEXTURE IMAGES FOR MISSING PIXELS
Author(s): Prabakaran.P , T.Vino , DURAIMURUGAN .

View

337-341 pdf
55 Enhancing Security System and Fault Tolerant Scheduling for Computational Grid
Author(s): P.Suresh , P.Keerthika , S.Nandhini.

View

339-346 pdf
56 Mobile Agents for Distributed Information Retrieval
Author(s): ALTAF HUSAIN , SHREEDHAR YADAWAD , RANGANATH YADAWAD.

View

347-354 pdf
57 A Model for load balancing for the Public Cloud by cloud partitioning technique
Author(s): Priyanka Shinde , Prof. P.M.Chawan .

View

355-359 pdf
58 Efficient way to forecast share market
Author(s): Neha Gaikwad , Harshada Kore , Samata Gandhi , Prof. A. S. More.

View

360-367 pdf
59 HUMAN FACIAL EXPRESSION RECOGNIZATION
Author(s): Poonam D.Bagal , Poonam M.Ghadage , Shruti S.Shinde , Ashvini S.Zadbuke.

View

368-373 pdf
60 A Novel Apriori Algorithm for Association Rules Mining
Author(s): Raj Jaiswal , Ranu Soni.

View

374-378 pdf
61 RISK ASSESSMENT OF WATER DISTRIBUTION NETWORK FOR CAST IRON PIPES USING STATISTICAL MODELING TECHNIQUE
Author(s): Dr. Reena Popawala.

View

379-387 pdf
62 AN EFFICIENT DATA HIDING IN A VIDEO FILE USING FMO
Author(s): S.R.Hariharan , N.Bharath , S.Rajasekar.

View

388-395 pdf
63 Omnipresent information Accessing for Medical Services using IoT
Author(s): V.Vinoth Kumar , B.Udhaya Kumar , S.Rajasekar.

View

396-405 pdf
64 An Approach to develop Encryption Algorithm to enhance Data Security in private cloud computing
Author(s): Upadhyay Vishal Kiritbhai , Dr. Vinod L Desai.

View

406-414 pdf
65 Achieving privacy and security over Encrypted cloud data using Triple-DES
Author(s): Ramya M , Nithiya G,Student. , Priyadharshani D,Student. , Sangeetha R, Assistant professor/IT..

View

415-419 pdf
66 Cloud Computing Security Issue And Barriers
Author(s): Upadhyay Vishal Kiritbhai , Dr. Vinod L Desai.

View

420-428 pdf
67 Integration of Renewable Energy Sources in Smart Grid Systems
Author(s): Anil K Jain , Toshi Mandloi.

View

429-434 pdf
68 Recognizing faces from videos using Clustering, Re-ranking & Fusion
Author(s): Prachi Sharad Vispute , Nisha Deoram Sonawane , charushila Uttam Mahale , Mazhar Shaikh.

View

435-438 pdf
69 DESIGN AND ANALYSIS OF SURFACE TO SURFACE MISSILE
Author(s): Srikanth Bashetty , Likhitha Chodisetti.

View

439-449 pdf
70 Automatic Monitoring and Controlling System for Environmental Parameters Using Web Server on Raspberry Pi
Author(s): Mr. Nitin Kare , Mr.Amol Bhosale , Mr.Akshay Nashte , Mr.Ranjit Raut.

View

450-455 pdf
71 IMPROVED NAVIGATION AND SECURITY USING TEAM ALGORITHM IN VANET
Author(s): M.SHARMILA , S.SARANYA , M.SHARMILA DEVI , K.YOGA NANDHINI.

View

456-462 pdf
72 Efficient Throttled Load Balancing Algorithm in Cloud Environment
Author(s): Durgesh Patel , Anand S Rajawat.

View

463-480 pdf
73 Comparative study of Waterfall model with RAD model
Author(s): Sunil D. Mone.

View

481-484 pdf
74 Pollution Monitoring and Alert System inside a car
Author(s): Shyma Sasidharan.

View

485-488 pdf
75 DESIGN AND ANALYSIS OF C-D NOZZLE INCREASE THE EFFICIENCY USING CFD
Author(s): satheesh c.

View

489-494 pdf
76 CLASSIFICATION OF CAROTID PLAQUE USING ULTRASOUND IMAGE FEATURE ANALYSIS
Author(s): V.Bhuvaneshwari , D.Sasikala.

View

495-504 pdf
77 DYNAMIC SPECTRUM ALLOCATION TO MAXIMIZE EFFICIENCY IN COGNITIVE RADIO NETWORKS
Author(s): Bhuvaneswari B , Dr.T.Meeradevi , T.Ramya.

View

505-512 pdf
78 Controlling of disturbed voltage due to the combination of linear and nonlinear load by using a DSTATCOM topology
Author(s): Mr. Pawan. S. Mane , Prof. J. O. Chandle.

View

513-520 pdf
79 SECURE DATA TRANSMISSION BASED ON THE TRAFFIC DEPENDENCY ON COOPERATIVE ENVIRONMENT
Author(s): Ms.R.Sangeetha , suganya.A , ramya.M , ranjani.B.

View

521-526 pdf
80 A SURVEY ON VIDEO SEGMENTATION THE FUTURE ROADMAP
Author(s): ABHISHEK KUNDU , Prof. NITIN.JANWE.

View

527-534 pdf
81 License Plate Recognition using Hopfield Neural Networks
Author(s): Gurjinder Pal Singh , Navneet Bawa.

View

535-540 pdf
82 REFINING USER SEARCH GOALS WITH FEEDBACK SESSION AND CAP
Author(s): RAJESH M. KAMBLE , HRIDAYNATH P. KHANDAGALE.

View

541-544 pdf
83 Review on Digital Writing Instrument using Gesture Recognition
Author(s): shital arjun shivdas , Madhura Raste , Bhagyshri patil.

View

545-548 pdf
84 Thermodynamic, adsorption and electrochemical studies for corrosion inhibition of carbon steel by Terminalia chebula leaf extract in 0.5 M HCl medium
Author(s): Dr. A. Leema Rose , S. Vidhya .

View

549-562 pdf
85 AMR and SCADA in Outage Management System for MSEDCL
Author(s): Mrs. Patil Sangita B. , Bapu K. Patil.

View

563-566 pdf
86 Study and Analysis of Cluster Optimization Algorithms: PSO And CI
Author(s): Mr. Mahesh S. Bhosale , R. V. Mane.

View

567-571 pdf
87 INDEXING ON UNCERTAN DATA USING U-QUADTREE
Author(s): Mr. Sangram Tukaram Patil , Mrs. R. J. Deshmukh.

View

572-578 pdf
88 Highly Secure Authentication Scheme: A Review
Author(s): Rahul N Bora , Madhuri Zawar.

View

579-582 pdf
89 Data Warehousing and Data Mining for any Education Organization
Author(s): Ranu Soni , Raj Jaiswal.

View

583-588 pdf
90 Modeling Data Mining Techniques with Financial Applications
Author(s): Prof. S. Golash , R. K. Yadav , Mogal Rihan Beig Hamja Beig.

View

589-597 pdf
91 Secure messaging using image steganography
Author(s): Priyanka Chandrakant Sahute , Swati Vijakaumar Waghnare , Supriya Arjun Patil , Ashwini Mahadev Diwate.

View

598-607 pdf
92 Human Identification Using Finger Dorsal Pattern
Author(s): Supriya Sanjay Kshirsagar , Pooja Moon , Pooja Korde , Bhagyashree Suryawanshi.

View

608-611 pdf
93 Minimizing Content Service Cost In DC Using Content Multihoming
Author(s): B.M.Brinda , R.Jayashree , N.Nandhini.

View

612-616 pdf
94 Trust Enhancing Approach for Cloud Environment
Author(s): Palvinder Singh , Anurag Jain.

View

617-621 pdf
95 Comparative Analysis of BER Performance under QAM-OFDM System Over AWGN and Rayleigh Fading Channel
Author(s): CHANDRAKANT TIWARI , Mr. ABHISHEK GARG.

View

622-630 pdf
96 Structural and Dielectric Characterization of Ni-Zn Nanoferrite by Solution
Author(s): M.J.Gothe , A.P.Bhat, , K.G.Rewatkar , P.S.Sawadh.

View

631-637 pdf
97 Asynchronous VLSI DESIGN: An Overview
Author(s): Jayesh Diwan , Rutul Patel , Kavita Jain.

View

638-641 pdf
98 ADVANCE EMAIL SECURITY AND FEATURES
Author(s): S. Dharmadurai , A. Dhanaseelan , Mr.R.Venkatesh.

View

642-644 pdf
99 Fault Detection and Protection of Transformer by Using Microcontroller
Author(s): Suraj Karpe , Shelar Sandeep D , Garkad Shraddha H , Lakade Shruti S.

View

645-651 pdf
100 SIMULATION AND MODELLING OF SEVEN BUS SYSTEM WITH USING POWER WORLD SIMULATOR
Author(s): Mahendra G.Mathukiya , Mahadev R.Hadial.

View

652-657 pdf
101 A Review on analysing parametric effect in SAW
Author(s): Hinal B.Thakker , Prof. A. J. Patel.

View

658-660 pdf
102 Privacy-Preserving Authentication through proxy re-encryption method in Cloud Computing
Author(s): DHIVYABHARATHI.S , Mr.T.K.P.RAJAGOPAL.

View

661-665 pdf
103 PREDICTING THYROID DISEASE USING DATAMINING TECHNIQUE
Author(s): Dr. G. Rasitha Banu MCA., M.Phil., Ph.D., , M.Baviya MCA.,.

View

666-670 pdf
104 Improved gain of dual polarized printed dipole antenna for base station applications.
Author(s): ELAMATHI.T , V.VIJAYA KUMAR.

View

671-675 pdf
105 Improved Edge Detection Scheme for Segmentation in MRI Kidney Image Registration
Author(s): SrimaDevi.S , Sathiya.A , Saranya.B.

View

676-682 pdf
106 Enhanced Non-Parametric Summarization Using Concept Evolution
Author(s): Balaji.R , Jayanthi.S , Dinesh Raj.R , Dhivya.E.

View

683-687 pdf
107 Performance Analysis of Wireless Local Area Network
Author(s): Rafik Momin.

View

688-693 pdf

Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

Conference organizers are invited to submit conference proposals. Contact: info.ijmter@gmail.com

July 3, 2017

International Conference on Recent Trends in Engineering and Technology published by IJMTER

May 10, 2016
Prof. Rahulkumar M. Sonar Program Director, ICRTET'2015 Conference Venue: SNJB's Late Sau. K. B. Jain College of Engineering Chandwad

National Conference on “Advances in Engineering and Technology for Sustainable Development” @ Government Polytechnic, Nagpur (MS) , Published By IJMTER

February 24, 2015
Currently Being Held @ Government Polytechnic, Nagpur (MS), INDIA Date: 27th February,2015 Published & Proceeding By: IJMTER Published in Volume-2 , Issue- 2 February-2015

We welcome innovative Research from Researcher.

September 30, 2014

Welcome to International Journal of Modern Trends in Engineering and Research

July 21, 2014