Papers for Issue
Volume:4 Issue:2 Feb ' 2017
Volume:4 Issue:2 Feb ' 2017
Sr No. | Paper Title | Abstract | Page No | Download |
---|---|---|---|---|
1 | A Survey On Android Applications For Personal Security
Author(s):
Shree varsha.K , Seetha.G , Sasikala.S , Umarani srikanth.G.
|
1-7 | ||
2 | SECURE TRANSMISSION OF DATA OVER INTERNET USING ELGAMMAL ALGORITHM
Author(s):
PATHMINI C , REKHA P , SANGEETHA B , BALAKRISHNAN C.
|
8-13 | ||
3 | Overview of Superconductors: Theory and Applications
Author(s):
A. JOHN PETER , SARITA NAYAK.
|
14-26 | ||
4 | A Survey of IoT based Vehicle Theft Detection
Author(s):
Kanimozhi.K , D.Mukesh , M.Ashok.
|
27-30 | ||
5 | SECURING SHARED DATA IN PUBLIC CLOUD WITH USING REVERSIBLE DATA HIDING
Author(s):
Durga.S , Jayashree.S.
|
31-34 | ||
6 | DISTRIBUTED QUERY OPTIMIZATION USING HILL CLIMBING ALGORITHM FOR COMPLEX CHURCH DATABASES
Author(s):
Esiefarienrhe Michael Bukohwo1 , Philemon Uten Emmoh , Choji Davou Nyab.
|
35-40 | ||
7 | ANDROID APPLICATION FOR COLLEGE MANAGEMENT SYSTEM (M-INSPROPLUS)
Author(s):
K.vivek Thangtam , T.Shyam Kumar , V.Yogesh Kumar , S.Prabhu.
|
41-44 | ||
8 | EXPERIMENTAL ANALYSIS OF EXCHANGER FIN TUBES TO INCREASE FURNACE PERFORMANCE
Author(s):
VIVEK BHARAT KHADE.
|
45-50 | ||
9 | Study of An approach for Surveillance video summary based on Objects
Author(s):
Ajay Barsagade , Dr. A.S. Alvi.
|
51-58 | ||
10 | A Survey on Two Tier Security with Data Sharing and Data Integrity Inspection in Cloud
Author(s):
B.RESHMA , B.SANJANA , M.PREETHA.
|
59-64 | ||
11 | A SURVEY ON PROVIDING LOCATION PRIVACY PROTECTION
Author(s):
G.Saravanan , R.Sanjay , G.Sundaramurthy , R.Geetha.
|
65-70 | ||
12 | Web based Digital Library Management System
Author(s):
H S Vijaya Kumar , Vikas S M , M. A. Jayaram.
|
71-75 | ||
13 | Design And Fabrication Of River Cleaning Machine
Author(s):
prof. Ketan.V.Dhande , Vishal Sayaji Garde , Pranav Boob , Abhijeet Billade , Akash lahane.
|
76-80 | ||
14 | A STUDY OF WELFARE PRACTICES IN SMALL AND MEDIUM SIZED ENTERPRISES IN MYSORE AND BANGALORE REGION
Author(s):
Ravi K. S , Dr. SantoshKumar. A. N .
|
81-84 | ||
15 | “Comparing Coating and Uncoating on a Cutting Tools” – A Review
Author(s):
CHANDRESH P RANA , Bhavesh K Mishra , Kshatriya Abhishek , Nihir Patel.
|
85-91 | ||
16 | Voice Recognition Based Call and Notification Android App
Author(s):
N.Vignesh , R.Shyam , K.Vignesh , C.Balakrishnan.
|
92-96 | ||
17 | Figuring out how to Rank Relevant Files for Bug Reports utilizing Domain Knowledge
Author(s):
Mohammad Zohaib.
|
97-100 | ||
18 | A Survey on Attack Detection Techniques in Delay Tolerant Network
Author(s):
Rajashri Mitharam Chaudhari , Mr. M. P. Patil.
|
101-109 | ||
19 | EFFECT OF PARTIAL REPLACEMENT OF SILICA FUME FOR CEMENT ON THE STRENGTH PARAMETERS OF PARTIALLY CINDER BASED LIGHT WEIGHT AGGREGATE CONCRETE
Author(s):
N.SANDHYA RANI , Dr.G.VANI.
|
110-117 | ||
20 | Frequency and Stiffness Analysis of Cracked Bolted Composite Geometries under the Application of Shock Load
Author(s):
Mariyam Sattar.
|
118-127 | ||
21 | Analysis of Causes of Delay in Any Construction Project
Author(s):
Vidya M. Patil , Aniket M. Undale , Govinda M. Singh , Sangram S. Patil , Sushant T. Sathe , Vaibhav H. Pisal.
|
128-134 | ||
22 | Panoramic Image Stitching based on Feature Extraction and Correlation
Author(s):
ARYA MARY K.J.
|
135-143 | ||
23 | Finite Element Analysis of PEEK composite connecting rod for HONDA CD110 IC Engine
Author(s):
RAJ KUMAR , NISHANT SAXENA , ARVIND SINGH.
|
144-152 | ||
24 | AN OVERVIEW OF IDENTIFICATION OF FRAUDULENT AND GENUINE USERS IN ONLINE ADVERTISING MARKET
Author(s):
KARTHIK.M , SASI KUMAR.E , SATHISH KUMAR.R , MANI.A.
|
153-156 | ||
25 | DIAGNOSIS SUPPORT SYSTEM FOR LUNG CANCER DETECTION BY USING ARTIFICIAL INTELLIGENCE:A Review
Author(s):
Ms Komal V. Bawane , Mr Pankaj M. Pandit , Mr Chetan Thote.
|
157-160 |