Call For Paper Volume:4 Issue:6 Jun'2017

Papers for Issue

Volume:2 Issue:7 Jul ' 2015

Sr No. Paper Title Abstract Page No Download
1 Modeling and Simulation of Controller for Solar Photovoltaic System
Author(s): Manish Kumar , Y.K.Vijay , M.Rizwan.

View

1-8 pdf
2 Exergy Analysis of Window Air Conditioning (VCR) System with Refrigerant R22 and R407C
Author(s): MEHUL TANDEL , PRAKASH PATEL , NIKUL PATEL , CHETAN UNDHAD.

View

9-13 pdf
3 Efficient Novel Sentence Level Text Clustering
Author(s): K.N.S.Deepika , Dr.Ch.Kavitha.

View

14-19 pdf
4 Rehabilitation of Bridges carried out in India under NHDP Programme
Author(s): AMARENDRA JALTARE , KETAN B. jibhenkar.

View

20-23 pdf
5 Secure Transmission of Images using Encryption
Author(s): Santhi Mol P. , Anjana P. Nair.

View

24-27 pdf
6 Multi-font Optical Character Recognition System for Printed Telugu Text
Author(s): jayaram.

View

28-34 pdf
7 Study of various Link Failure Detection Techniques and Link Recovery Mechanisms in Wireless Mesh Networks
Author(s): Ms.Swarooprani H.Manoor , Mr.Deepakraj R.Mangalwede.

View

35-37 pdf
8 Review Paper on Study of Velocity Adaptive HO scheme for mobile wiMAX
Author(s): Sneha Bhardwaj , Seema Sabharwal.

View

38-43 pdf
9 A Review on Energy Absorber in Side Impact Crash
Author(s): A.G.Patil , R.V.Patil .

View

44-49 pdf
10 Efficient Pattern-Based Query search in Text Documents
Author(s): Rosemary Varghese , Kala Karun.

View

50-54 pdf
11 COMPARATIVE STUDY ON EFFECT OF FLY ASH AND RICE HUSK ASH ON STRENGTH CHARACTERSTICS OF PAVEMENT QUALITY CONCRETE
Author(s): Rohit Siwach , S S Kajal , Nikita Rajpal.

View

55-63 pdf
12 A Survey on Fingerprint Compression Methods
Author(s): Lakshmipriya. S.

View

64-67 pdf
13 A Composite Algorithm for String Matching
Author(s): Neha R Dalal , Poonam Jadhav.

View

68-73 pdf
14 How enhanced computer aids will improvise Consumer satisfaction online
Author(s): Poonam Jadhav , Neha Dalal.

View

74-76 pdf
15 Comparison between Network Coverage Strategies in WSN
Author(s): Poonam Sharma , Sonia Jangra.

View

77-84 pdf
16 Data Transformation Method For Discrimination Prevention Along With Privacy Preserving
Author(s): Aswathi Babu , Mrs.Vidhya Gopinath.

View

85-88 pdf
17 DC Shunt Motor Speed Control and analysis using Ziegler-Nichols Algorithm with PID Controller
Author(s): Yogesh Sharma , Yogesh Sharma , Ashis patra .

View

89-96 pdf
18 CHANNEL ANALYSIS OF OFDM SYSTEMS USING DWT AND DFT
Author(s): K.NAGARAJAN , P.KUMAR , S. DAISON STALLON , M.MOHAMED KASIM.

View

97-101 pdf
19 Mitigation of Voltage Flickers using Shunt FACTS device
Author(s): Gurunadh Doneparthy , P Gopi.

View

102-109 pdf
20 Blocking the mobile phones signals with the help of jammer
Author(s): Harshita K.Wankhede , Kunal Wankhede , Manoj A.Jethwa3 , Jyotsana J.Bhiwgade.

View

110-114 pdf
21 Survey on Image Encryption, Data Hiding and Secret Fragment Visible Mosaic Image Creation Techniques
Author(s): Nithya Susan Abraham , Priya Nair.

View

115-118 pdf
22 Review on Thermoelectric Refrigeration: Applications and Technology
Author(s): Mr. Sagar D. Patil , Prof. Kiran D. Devade.

View

119-129 pdf
23 Surface Computing – An Integrated Approach
Author(s): Dipti R. Takalkar.

View

130-132 pdf
24 MORPHOMETRIC ANALYSIS STUDY OF LAXMI ODHA BASIN, SANGLI DISTRICT, MAHARASHTRA, INDIA
Author(s): P. A. Pisal , PANDURANG PISAL , A. S. Yadav , B. S. Sawant .

View

133-136 pdf
25 Energy Efficient Sleep Scheduling for Improvement of Critical Event Monitoring in WSN
Author(s): Ms. Sneha Mohanrao Patil , Mrs. Archana B. Kanwade.

View

137-143 pdf
26 Short Term Load Forecasting Based on Influencing Factors Using ANN.
Author(s): Sweta Shah , Dr. H. N. Nagaraja.

View

144-151 pdf
27 Emission Reduction Technique from Thermal Power Plant by Load Dispatch
Author(s): Sanjay R. Vyas , Dr. Rajeev Gupta.

View

152-156 pdf
28 Enhancing The Spam Detection Technique Using Naïve Bayes Classifier Algorithm
Author(s): harpreet kaur.

View

157-167 pdf
29 Treatment of textile dyes for color and COD removal by pretreatment with Ozonation followed by Granular Activated Carbon
Author(s): Kunal Dipak Sambrekar , M. Bhargavi.

View

168-177 pdf
30 A Review on Design, Analysis and Optimization of Pivot of Rocker Arm
Author(s): Amol D. Ambare. , Dr.Sanjay B. Zope .

View

178-184 pdf
31 Improvement of Power Quality Using Advanced Series Active Power Filters
Author(s): V.PRAVEEN , V.PRAVEEN , P.Sudheer kumar.

View

185-191 pdf
32 A New Machine Learning Crawling Algorithm For OnlineWeb Forums
Author(s): M Sandeep Singh , Dhanalakshmi , M Arjun.

View

192-195 pdf
33 ATM WITH AN EYE USING 3D FACE RECOGNITION METHOD
Author(s): R.LAKSHMI.

View

196-201 pdf
34 Residents maintenance priority and reasons for sustainable maintenance management of heritage building in Nasik, India
Author(s): mohit sharad shinde , Prof. M.C. Aher , Prof. R.V. Devalkar.

View

202-206 pdf
35 Effect of Nano Silica and Steel Fiber on Properties of Concrete
Author(s): Ahmed S. Elboghdadi , Hala M. Elkady , Hamed M. Salem , Ahmed M. Farahat.

View

207-217 pdf
36 A HBBO WITH DE FOR POWER SYSTEM PROBLEM
Author(s): G.SRIKANTH , A.LUMANI.

View

218-225 pdf
37 SMART GRID PROTECTION
Author(s): Mahendra.G.Mathukiya , Kalpesh R.Ranipa.

View

226-230 pdf
38 A Virtual Grid Routing Design and Implementation Using Matlab
Author(s): preetinder kaur , simarpreet kaur.

View

231-237 pdf
39 Crime Scene Hammer Transfer Stain Pattern Interpretation
Author(s): Prof (Dr.) Samir Kumar Bandyopadhyay Nabanita Basu** , Nabanita Basu.

View

238-251 pdf
40 FILTERING OF URLS USING WEBCRAWLER
Author(s): Arya Babu , Misha Ravi.

View

252-259 pdf
41 QUALITY ASSURANCE OF LINKS IN WSN BY USING CODE DISSEMINATION
Author(s): E GAYATRI , N.LAKSHMI CHAITANYA , V.SYAMASUDHA.

View

260-265 pdf
42 EXTENDING DEFENSE-IN-DEPTH STRATEGY USING RISK MANAGEMENT PROCESS FOR DATA PRIVACY
Author(s): m.vijaya keerthi , V. Sreenatha Sarma.

View

266-270 pdf
43 PROVIDING MESSAGE AUTHENTICATION AND SOURCE PROTECTION AGAINST DATA IN SENSOR NETWORKS
Author(s): L.Naga Keerthi , V.Sreenatha Sarma.

View

271-274 pdf
44 Selecting Most Appropriate DIFC: Decentralised Information Flow Control Model
Author(s): S. Ashok Kumar , K. Koteswar Rao.

View

275-280 pdf
45 A Fill Controlling Design Based on Reasoning Partitioning Data Access
Author(s): S.Sai Abhishta Roy , B.Sudhakar.

View

281-286 pdf
46 EXPERIMENTAL INVESTIGATION ON EFFECT OF CUTTING PARAMETERS ON SURFACE ROUGHNESS AND MACHINING TIME IN TURNING EN31 HARDENED STEEL UNDER FLOODED AND MQL CONDITIONS
Author(s): Arif Pathan , Dr.M.S.Kadam .

View

287-296 pdf
47 THE OPTICAL STUDIES OF COPPER OXIDE THIN FILM
Author(s): Dr.Chishty S.Q. , Mohd.Khizar , Afzal Hussain , Firdous Quadri.

View

297-302 pdf
48 Filtering Unwanted Text from OSN User Walls Using Static Dataset
Author(s): Shilpa Radhakrishnan , Misha Ravi.

View

303-306 pdf
49 Black-Box Modeling of A Process Simulator Using Wireless Temperature Measurements
Author(s): Adnan ALDEMİR , Mustafa ALPBAZ.

View

307-316 pdf
50 The Impact of the Three Pushes Takeoffs Angel’s Phases and their Distributions Strides Lengths On the Performance in Triple Jump
Author(s): Zerf Mohammed.

View

317-323 pdf
51 Effect of the velocity radial non-uniformity in the column apparatuses
Author(s): Boyan Boyadjiev , Christo Boyadjiev.

View

324-332 pdf
52 CAD for Lung Cancer Detection: A Review
Author(s): Rakesh Kumar Khare , G R Sinha , Sushil Kumar.

View

333-338 pdf
53 Enhanced ECLAT algorithm for frequent item set mining using ECLAT- A review
Author(s): Bharati Suvalka.

View

339-342 pdf
54 Literature Survey On Dewarping Of Document Images
Author(s): Dhanya M , Jayalakshmi.

View

343-347 pdf
55 Secure Extreme Programming Model (SXP) on Data Mining Applications: SXP-DM Methodology
Author(s): Mr. Sandepaga Vijay Hemanth , K NAGARAJU .

View

348-353 pdf
56 AN EFFECTIVE FRAMEWORK FOR PROVIDING SECURITY ON SMARTPHONES
Author(s): MUPPALA MANASA , N.LAKSHMI CHAITANYA.

View

354-361 pdf
57 Stream Cipher and Block Cipher Based Performance Analysis of Symmetric Cryptography Algorithms: AES and DES
Author(s): Dr. Preeti Mehta , Ms. Monika Bansal , Ms. Akanksha Upadhyaya.

View

362-366 pdf
58 Inverse free electron laser and accelerating electrons with applied oscillatory voltages
Author(s): Baran Nikrah , Mohadeseh.

View

367-370 pdf
59 ACQoS: ANT COLONY OPTIMIZATION AND QUALITY OF SERVIEC BASED PROTOCOL FOR ADHOC NETWORKS
Author(s): Shivani , Shivani , Gagandeep Singh.

View

371-381 pdf
60 OPTIMIZATION OF CASP-CUSUM SCHEMES BASED ON TRUNCATED ERLANGIAN DISTRIBUTION
Author(s): Narayana Murthy B. R , Akhtar P. Md , Venkata Ramudu B.

View

382-391 pdf
61 Semantic Resource Management Algorithm Based Data Retrieval Technique in Data Mining
Author(s): N Sivashanmugam , C Jothivenkateswaran.

View

392-396 pdf
62 Implementation of Image Compression Using Hybrid DWT- DCT Algorithms
Author(s): G Buela Divya , M. Krupa Swaroopa Rani.

View

397-403 pdf
63 Fast Rerouting Algorithms for Routing Protocols in IP Networks
Author(s): Depavath Harinath , M.V.Ramana Murthy.

View

404-413 pdf
64 An Image Processing Oriented Optical Mark Reader Based on Modify Multi-Connect Architecture MMCA
Author(s): Rusul Hussein Hasan , Emad I Abdul Kareem.

View

414-423 pdf
65 Arduino Based Water Billing System for Domestic Purpose
Author(s): Ravi Hosamani , Ravi Bagade.

View

424-431 pdf
66 A Study on Nano Powdered Rubber as an Friction Materials
Author(s): Landge Nilesh Baburao , Yendhe Vikram Sampat , Mande Anil Chandrabhan.

View

432-438 pdf
67 JET BLAST DEFLECTOR FENCE
Author(s): Ms. BHAGYASHREE S. ZOPE , Dr. R.S.TALIKOTI.

View

439-448 pdf
68 A Review on Cache Memory with Multiprocessor System
Author(s): Chirag R. Patel , Rajesh H. Davda.

View

449-455 pdf
69 Intra Frame Coding for Advanced Video Coding Standard to reduce Bitrate and obtain consistent PSNR Using Gaussian Pulse
Author(s): Manjanaik.N , Dr.Manjunath.R.

View

456-467 pdf
70 Enhancing Energy Efficiency in Wireless Sensor Network
Author(s): Abdul Razak Qureshi , prof. R.K. Krishna.

View

468-472 pdf
71 An Evaluation of Classification Methods in Network Packet Protocol status Model for KDD Cup 99 Dataset
Author(s): Apurva Tiwari , Sanjiv Sharma.

View

473-493 pdf
72 Performance comparision of 2×1 and 2×2 Differential STBC and Implementation of DSTBC on Digital Video Broadcasting Sattelite
Author(s): Mrs.Mona B Jadav , Mrs. Sharda Shweta.

View

494-502 pdf
73 A Survey on Face-Sketch Matching Techniques
Author(s): Reshma C Mohan , M. Jayamohan , Arya Raj S.

View

503-507 pdf
74 Performance Evaluation of AQM Algorithms for PGM based group communication in Centralised Multicasting Network
Author(s): Shaveta Khepra , Ashish Kumar.

View

508-515 pdf
75 An approach to classification of retinal vessels using neural network pattern recoginition
Author(s): M. Divya , Dr. C. Senthamarai , D. Chitra.

View

516-519 pdf
76 New Technology for Memory Tests Design
Author(s): Vladimir Ryabtsev , MUDAR ALMADI.

View

520-526 pdf
77 Survey and Analysis of Current methods of Steganography
Author(s): Prof (Dr.) Samir Kumar Bandyopadhyay Nabanita Basu** , Madhulina Das .

View

527-536 pdf
78 Increasing the Reactivity of Silica Fume Particles Using Indirect Sonication: Effect of Process Parameters
Author(s): Muhammad S. El-Feky , M. M. Hashem , Mohamed I. Serag , Hala El-Kady.

View

537-557 pdf

Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

International Conference on Recent Trends in Engineering and Technology published by IJMTER

May 10, 2016
Prof. Rahulkumar M. Sonar Program Director, ICRTET'2015 Conference Venue: SNJB's Late Sau. K. B. Jain College of Engineering Chandwad

National Conference on “Advances in Engineering and Technology for Sustainable Development” @ Government Polytechnic, Nagpur (MS) , Published By IJMTER

February 24, 2015
Currently Being Held @ Government Polytechnic, Nagpur (MS), INDIA Date: 27th February,2015 Published & Proceeding By: IJMTER Published in Volume-2 , Issue- 2 February-2015

We welcome innovative Research from Researcher.

September 30, 2014

Welcome to International Journal of Modern Trends in Engineering and Research

July 21, 2014