IMPACT FACTOR : 2.117


E-Journal:Current Issue

SR.NO. TITLE DOWNLOAD
1

Design SMS Spamming Detection System
Bhavana P. Alam1, Fazeel Zama2

Download Here
2

Novel Techniques To Safeguard Privacy And Security On Mobile Devices Through Optimal Algorithms
Ruhi Dubey, Garima singh

Download Here
3

IMPLEMENTATION OF EXTENTED APPROACH OF VISUAL SECRET SHARING FOR DIGITAL IMAGES
Khemutai Tighare1, Chetan Bawankar2

Download Here
4

Enhance Path Planning Algorithm And Energy Efficient Data Transmission Using Mobile Anchor nodes In Wireless Sensor Networks
Pranjali D. Dagwar 1, Prof. Chetan Bawankar2

Download Here
5

“MINING OF TEXT DATA FRAMEWORK BY THE USE OF SIDE INFORMATION”
Ms. Neha Tiwari1, Prof. Garima Singh2

Download Here
6

MANET: Low Transmission Power can be raised by using mobility
Mr. Korade Nilesh Bhikaji

Download Here
7

EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE
Priyanka Thomas, Garima Singh

Download Here
8

Result: Design and deployment of secure sharing protocol using TTP via cloud computing
Kamini H. Gonnade,Fazeel Zama.

Download Here
9

Fingerprint compression based on RADON transform
Shubhangi B. Jadhao1, Dhananjay M. Sable2

Download Here
10

RATIONAL DITHER MODULATION ON COMPRESSED AND ENCRYPTED JPEG2000 IMAGES
Mr. Krishna Tayade, Prof. S. S. Bobde

Download Here
11

Implementation Of REA(Reveres Encryption Algorithm)
Amrita A. Kamdi1, Shyam Dube2, Vishvjit Bajpayee3

Download Here
12

Design of Split Radix Fast Fourier Transform
Shalaka Kharabe, S. A. Shirsat

Download Here
13

Simulation Based performance analysis in wireless network
Ravi C. Dhandekar

Download Here
14

DESIGN AND IMPROVE THE EFFICIENCY OF RADIAL TURBINE
1.Vivek Digambar vattamwar, 2.Vidhyadhar Kshirsagar

Download Here
15

Hardware realization of AXI Master & Slave (point to point)
A. S. Kopulwar1, U. R. More2

Download Here
16

ROBUST DWT-BASED AUDIO WATERMARKING IN DETAIL COEFFICIENT
Yugandhara H. Wankhede1, Prof. Samadhan D. Mali2

Download Here
17

Content-based Image Retrieval from Videos using Self Learning Objet Dictionary 
Vrushali A. Wankhede, Prakash S. Mohod

Download Here
18

MODIFICATION OF DRILLING TOOL TO MAKE SQUARE HOLE
Bangar Sunil Kisan1, Prof. Mythili Sreeram.2

Download Here
19

DATA SECURITY IN CLOUD COMPUTING
Mr.Tambre keshav G.1, Prof. Suryawanshi Pramod N.2

Download Here
20

LS-SVM based algorithm for the identification and delineation of QRS complexes in 12 lead ECG using Entropy as a feature
Dr. Swati Sharma,Dr. S. S. Mehta,Devendra Nagal

Download Here
21

A SYSTEM BASED ON MULTIVARIATE CORRELATION ANALYSIS FOR DENIAL-OF-SERVICE ATTACK DETECTION
Mr.Amol Dumbare1, Prof. M. Prashanth2

Download Here
22

Survey on decoding algorithm on belief propagation
Parag S Sardeshpande 1, Makarand M Jadhav2

Download Here
23

AUTONOMOUS LANDING SYSTEM USING IMAGE PROCESSING
Kalyani V. Deshmukh1, Prof. S. D. Mali2

Download Here
24

XML QUERY- ANSWERING SUPPORT USING RSS FEEDS
Jyoti B. Rathi1, Dhananjay M. Sable2

Download Here
25

Evaluation of Bit Error Rate Performance of Reed Muller Block Coded System
M. L. Davkare1, Prof. M.M. Jadhav2

Download Here
26

“EXEMPLAR BASED POSE CORRECTION METHOD FOR MICROSOFT KINECT BASED SYSTEM”
Ms.Priya Ashtankar, M. L. Davkare1, Prof. M.M. Jadhav2

Download Here
27

Gateway to the Cloud
Ms.Jayanti Chaubey , Prof.Mr.Anil Warbhe, Prof.Mr.Shyam Dubey

Download Here
28

Implementation of Clustering And Preprocessing For Web Log Mining
Shital S. Kontamwar, Prof. Shyam Dubey, Prof. Anil Warbhe

Download Here
29

Data security for android devices by using hybrid encryption
Ms.Manju Ahuja 1, Prof.Shyam Dubey2, Prof. Vishwajeet Bajpayee 3

Download Here
30

Password Protected Anti Theft Control System
Ms.Padmaja Adgulwar 1, Prof. Nilesh Chaubey2, Prof.Shyam P Dubey3

Download Here
31

MULTIPLE OBJECTS IN VIDEO SEQUENCES: SEGMENTATION AND TRACKING
Swati Gavande , Prof.Shyam P Dubey , Prof.Nilesh Chaubey

Download Here
32

Analytical Study of Frequent Itemset and Utility Mining Approaches
Sonam Panwar1, Ajay Jangra2

Download Here
33

Trajectory Based Damping of Electromechanical Oscillations
Reeta Rana1, Prof. Naveen Kumar Mucha2

Download Here
34

Methodology Of Multi Factor Authentication Scheme
Ms. Vasundhara V. Bhele , Prof. Shyam Dubey , Prof. Nilesh Chaubey

Download Here