International Journal of Recent Trends in Engineering & Research

online ISSN

Volume:2 Issue:3 Mar ' 2016

Sr No. Paper Title Abstract Page No Download
1
Effect of Pt Doping on ZnO Nanoparticles
Author(s): M.G.Thakare , C. G. Dighavkar , j. S. Aher.
1-5
2
6-13
3
Review Paper on Reduction Techniques of PAPR in VLC OFDM System
Author(s): Amol J. Bhakte , Amol J. Bhakte , Kiran D. Bondre.
14-17
4
Nitrate and Nitrite Removal from Wastewater-a Review
Author(s): Sunil Jayant Kulkarni.
18-20
5
Survey paper on Prediction of Heart Disease Using Data Mining Technique
Author(s): Pratiksha Rajpure , Sanavar Bangi , Pradnya Gaikwad , Pooja Ghadak.
21--24
6
25-34
7
A Survey on mobility Models & Its Applications
Author(s): Prof. Vikas Kumar Jain , Prof. Raju Sharma , Prof. Bhavana Gupta.
35-41
8
42-45
9
DDoS Spyware for Cloud Computing Environment
Author(s): Prof. Harish Barapatre , Jai Deshmukh , Vikrant Kapse , Pritam Patil.
46-56
10
Energy and Exergy Analysis of CFBC Boilers
Author(s): Pallavi Pathi , Twinkle Mishra , Subhasis Padhi.
57-62
11
Performance Improvement of Delay based road oriented routing protocol for VANET
Author(s): PAYAL BALDEO KAMBLE , KAMLESH A KALBANDE.
63-66
12
67-73
13
CCOS Detection and Security in Wireless Sensor Network
Author(s): Shanmugam Shoba M , Bhuvitha R , Sandeep R , Sameer S Nayak , Shailaja C.
74-75
14
Association Classifier for predictive analysis in health care mining
Author(s): Grijesh kumar Patwa , Deepak Maurya , Piyush singh , Suryaprakash yadav , Sunil Yadav , Sunny Bhavar Sall .
76-78
15
79-83
16
AGENT BASED SCHEDULING PROCESS IN CLOUDS
Author(s): K.RAMADEVI , M.SOWNDHARYA , F.STEPHY.
84-88
17
SNM AND READ STABILITY ANALYSIS OF 7TSRAM CELL ON 45NM TECHNOLOGY
Author(s): Mahendra Singh Rajput , Gunakesh Sharma.
89-92
18
Micro-Environment Sensing For Smartphone’s
Author(s): Pooja Ravindra Salvi , Priyanka Bhimaji Kale , Pratiksha Anil Wavale , Anuja Dilipsing Girase.
93-96
19
VOICE RESPONSE SYSTEM FOR WIRELESS
Author(s): VENKATESAN , SANDHIYA , SOWMIYA.
97-100
20
ENSURING INTEGRITY FOR DATA EXCHANGE BY USING DATA COLORING PROCESS
Author(s): S.GUNA SUNDHARI , M.JAGATHA , S.KANMANI , M.KARPAGAM , Mr .G.SENTHIL KUMAR.
101-103
21
SPOKEN DIALOGUE SYSTEM USING SPEECH RECOGNITION TECHNOLOGY
Author(s): S.Azhagu vediappan , J.Baskaran , M.Gopalakrishnan , G.senthil kumar.
104-107
22
VOICE BASED GMAIL ACCOUNT
Author(s): A.SHAZIYA BANU , E.SHARMILA , M.A.MOHAMMED ANSAR ALI.
108-117
23
SOFTWARE TESTING WITH DIFFERENT PHASES OF SDLC
Author(s): Preeti Yadav , Ajay Kumar.
118-123
24
124-130
25
A system for measuring and ranking an overall performance of college by using online data
Author(s): Aniket Anil Nikam , Suraj Kishor Upare , Ujjawal Anand , Vikki Kumar.
131-136
26
137-140
27
Cloud resource Allocation: A step ahead Optimized Greedy Prioritization Approach
Author(s): Shagun Agarwal , Shubhankar Saxena , Ajay Shanker Singh , Thirunavukkarasu K.
141-145
28
Severity grading for diabetic retinopathy
Author(s): NAVEENRAJ M , HARIPRIYA K , KEERTHANA N , MOHANA PRIYA K , MOUNIKA R.
146-150
29
Voice Based Shapes Recognition using Mel Frequency Cepstrum Coefficents
Author(s): Dr.P.Banumathi , Rajanaveen S V , Saberi R S , Thilak Vasu Deva K.
151-155
30
Survey paper on Smart Parking System based on Internet of Things
Author(s): Vishwanath Y , Aishwarya D Kuchalli , Debarupa Rakshit.
156-160
31
SLEEP – DISORDERED BREATHING
Author(s): P. Ouzounakis1, , C. Iliadis , A. Monios , L. Kourkouta.
161-165
32
CAPTCHA: A New Security Approach by Using Graphical Password
Author(s): Mohammad Hayat , Pritesh A. Patil , Azad Mehatkar , Sraddha Bose.
166-171
33
Mobile Cloud Computing With A Private Authentication Scheme
Author(s): Mrs. Kavitha K K , B L Gopinath , C U Kushalappa , Dilip Kumar H.
172-176
34
A Survey on Multimedia Content Protection on Cloud
Author(s): Chaya M , K.Thippeswamy.
177-181
35
A SURVEY ON ANALYSIS AND CLASSIFICATION OF WORKLOAD IN CLOUD
Author(s): Chethan N , Mrs. Pushpalatha R.
182-189
36
Intelligent tactical robotics
Author(s): Samana jafri , Abbas Zair Naqvi , Manish Singh , Akhilesh Thorat.
190-197
37
Analysis of Safety Management System in the Construction Industries
Author(s): MOHANA PRIYA M , KOTHAI P S , KOHILAMBAL E.
198-203
38
A Survey Of Different Topologies for Network-on-Chip Architecture
Author(s): Shuchi A Parkhani , Vaishali A. Tehre.
204-209
39
SINGLE BIT VERIFICATION MECHANISM TO IDENTIFY THE PACKET DROPPERS AND MODIFIERS
Author(s): Rajagopal T K P , Aravind G , Kanmani S , Mohammed Bagurudheen M.
210-213
40
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES USING MODIFIED AES ALGORITHM
Author(s): Sharmila V , S.Vijayananth , M.Sabitha , M.Swapna.
214-216
41
Arithmetic Examination of Iris Code and Its Sanctuary Connotation
Author(s): Dr.P.Banumathi , Gokulprasath.M , Gowtham Raj.M , Maruthamuthu.C.
217-219
42
DETECTION OF FRAUDULENT REVIEW AND RATING IN E-COMMERCE SERVICE
Author(s): S.P.VIDHYAPRIYA , Safia mahmoodha. S , Saranya.P , Boopathi.A , Sabarisan.G.
220-223
43
Re-encryption based key management with de-duplication mechanism for cloud
Author(s): Akshat Vaidya , Parth Bhimani , Debashish Dwivedi , Mayur Phanse.
224-227
44
A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Author(s): BALASUBRAMANIYAM R , M TAMILSELVAN , C S VIGNESH , R PRAVEEN KUMAR.
228-230
45
SUSPICIOUS MOVEMENT DETECTION AND TRACKING BASED ON COLOR HISTOGRAM
Author(s): T.K.P. Rajagopal , S.Praveen , V.Gokulprasath , A.Tamilarasan.
231-233
46
Enhancing Google Search Engine using Semantic Data Search
Author(s): Karthika.K , Bhuvaneshwari.B , Jaya Priya.J , Saravana Kumar.K.
234-237
47
GEOGRAPHICAL INFORMATION SYSTEM OF K-NEAREST NEIGHBOR UERIES OVER MOVING OBJECTS
Author(s): T.K.P.Rajagopal , P.Ditto Samson , S.Siva Kumar , K.Shriram.
238-240
48
241-247
49
A DISTRIBUTED MODIFIED BIN BACKING FOR COMPUTING INFRASTRUCTURE USING SMARTPHONES
Author(s): Ms.Rajaambika , P.M Anusree , P Dinesh Kumar , J Santhosh Kumar.
248-251
50
A Survey on Copy-Move Image Forgery Detection
Author(s): Miss Sonali Navale.
252-258
51
Distance Related Acccess Query Opinion on Document Concurrency
Author(s): V.V.RAMYASHREE , Prabavathi.A , Salini.R , Santhana Bharathi.J.
257-261
52
262-267
53
Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
Author(s): D.Ravi , Clint.v.jeffrey , M.Manikandan , K.Mathanprasad.
268-272
54
Evaluation of material procurement process in construction industry
Author(s): E.Kohilambal , Dr.P.S.Kothai , M.Mohana Priya.
273-276
55
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Author(s): Bharathi.S , Christina jenifer.S , Venkatesan.S.
277-280
56
MEDICAL REMAINDER AND PREDICATOR APP
Author(s): Menaka.T , Gomathi.N , Venkatesan.S.
281-284
57
Web Service composition based on ranking
Author(s): R.Punitha gowri , D.Amuthavalli , A.Manikandan , K.Lingeswar.
285-287
58
DATA MINING TECHNIQUES IN CLOUD COMPUTING: A SURVEY
Author(s): Thirunavukkarasu K , Digvijay Singh , Mohd. Asif , Dr. Ajay S. Singh.
288-296
59
GRAPHICAL PASSWORD AUTHENTICATION USING CUED CLICK POINTS (CCP) ALGORITHM
Author(s): RAJAAMBIKA S , CHOWMIYA C , GOWHTAM P , GOWHTAM RAJ T , JANANI V.
297-300
60
Automated Fare Collection for Public Transport Using GPS & Smart Card
Author(s): Sharmila V , Yamuna Devi M , Veera Muthu G , Hari Kalidas P.
301-304
61
Cluster based boosting algorithm for efficient recommender system
Author(s): D.Ravi , R.DEEPIKA , R.JAI GAYATIRI , S.JAYA SURYA.
305-308
62
HUMAN BEHAVIORAL ANALYSIS FOR PSYCHOLOGICAL DEFECTS USING SPEECH AND LANGUAGE
Author(s): REKHA.M , RAMBA.M , SELVALAKSHMI.G , NAGARAJAN.G.
309-312
63
ATOM: A Semi-supervised algorithm with adaptive classification technique for review analysis
Author(s): R.Bala Subramaniam , M.Manoj Kumar , G.Nithya Priya , S.Kausalya.
313-316
64
Restricting Untrusted Browsers’ Communication in Web-RTC
Author(s): Pooja Birajdar , Sagar Soni , Nandkishor Surashe , Vishal Telsang.
317-323
65
CLASSIFICATION OF SEMANTICALLY SECURED ENCRYPTED RELATIONALDATA USING DATAMINING TECHNIQUES
Author(s): P.BANUMATHI , PREETHA .G , KUNGUMARAJ .M , JAGADEESH KUMAR .T.
324-326
66
Optimal Resources provisioning for Federated Cloud Load handling using Flow Fairness Scheme
Author(s): Ravi D , HariBaskar J , Naveen Chakaravarthy S , Ram Kumar R.
327-330
67
Secured Real Time Data Sharing Between Salesfore.com and Heroku for Better Business Analysis.
Author(s): Rishikesh K. Jadhav , Prof. Pritesh A. Patil , Pranita K. Gujar , Pralesha P. Jadhav.
331-338
68
Estimation of Road Surface Roughness Condition from Android Smartphone Sensors
Author(s): KavitaDarawade , PrashantKarmare , SaileeKothmire , NageshPanchal.
339-346
69
Privacy Preserving Data Leakage Detection
Author(s): S.P.Vidhya Priya , A.Aravinthan , P.Nancy Prathiba , R.Poornima.
347-351
70
AUTOCORRECTION AND ATTESTATION BASED INTEGRITY VERIFICATION STRATEGY FOR CLOUD DATA
Author(s): T.K.P.RAJGOPAL , T.MOHANAPRIYA , V.NAVEENPRASHAATH , S.REVATHI.
352-354
71
Limits in Design of Public Cloud
Author(s): Sumedh Kumar , Shefali Gupta , Dr. Ajay S. Singh , Thirunavukkarasu K.
355-357
72
Efficient Human detection and tracking system in videos using Fuzzy logic
Author(s): Prof Rajavikram Reddy , Bilal Shethwala , Mustafa Shaikh , Arham Chowdhry.
358-362
73
IMPLEMENTATION OF SECURED PALM PRINT ENCRYPTION USING MULTIBIOMETRICS
Author(s): Ms.A.Kaviya , Mr.R.Vengadesan , Mr.M.Vignesh.
363-365
74
MANAGING CLOUD COMPUTING
Author(s): Rohan Singh , Neelanshuni Singh.
366-370
75
Cloud API
Author(s): ARPIT TAPWAL , RUSHESH SHARMA , Dr.Ajay Shankar Singh , Thirunavukkarasu K .
371-375
76
Incremental Short Text Summarization On Comments In Real Time From Social Network Services
Author(s): S.Dhivyabharathi , K.Suriya , R.Shalini , R.Vinitha.
376-380
77
PERSONAL HEALTH MANAGEMENT IN CLOUD USING BLOWFISH ALGORITHM
Author(s): DHIVYABHARATHI S , SAHAYA SALIMA S , PREM KUMAR D , RAKESH R.
381-386
78
An automatic ppt generation using data mining
Author(s): T.K.P Rajagopal , S.Shanthini , R.Sudarvizhi , S.Thangaraju.
387-389
79
THE EFFECTIVENESS OF WOUND ASSESSMENT SYSTEM
Author(s): S.P VIDHYA PRIYA , N.SATHYA PRIYA , G.NIRMAL , P.PRAKASH.
390-392
80
Infrastructure as a service based disaster sensing
Author(s): T.K.P Rajagopal M.E.,M.TECH.,Ph.D , E.Arun kumar , S.Maria , R.Narmatha.
393-398
81
SMART CITY
Author(s): T.SAKTHISREE , S.KARTHIKEYAN , V.SIVARANJANI , S.THILEEPAN.
399-403
82
Cloud computing in mobile applications
Author(s): Akshit Gupta , Rahul Srivastav , Dr. Ajay Shankar Singh , S. Aravinth kumar.
404-411
83
Cloud Interoperability
Author(s): Shaurya Chauhan , Parul Sinha , Thirunavukkarasu K , Dr. Ajay S. Singh.
412-416
84
417-422
85
An Approach to Malware Analysis and Reporting by Machine Learning
Author(s): O. Gireesha , L. Venkateswara Reddy.
423-427
86
A New AlgorithmforSolving Fuzzy Transportation Problems with TrapezoidalFuzzy Numbers
Author(s): SRINIVASAN , Dr. S. Muruganandam , Srinivasan.
428-437
87
INTELLIGENT INTRUSION DETECTION SYSTEM FOR PRIVATE CLOUD
Author(s): Abhilash Ashu , Kumar Ankit , Dr. Ajay S. Singh , S.Aravinthkumar.
438-444
88
CLOUD COMPUTING CHALLENGES
Author(s): Richa Singh , Shakti Bhati , Dr. Ajay S. Singh.
445-449
89
32 bit PIC EVALUATION BOARD
Author(s): YUVARANI P , SOWMYAA V , YASWANT KUMAR V , S.SRI RAJA MARKANDAYAN , GOWRI DEVI B.
450-453
90
ASSESSMENT OF LEARNING OUTCOME IN EDUCATION
Author(s): V. V. RAMYASREE , RAJKUMAR S , SANGEETHA E , VIMAL J.
454-457
91
Advanced querying and information retrieval
Author(s): M.SANDHYA , Mr. D.ANIL.
458-464
92
DECOBA: Utilizing Developers Communities in Bug Assignment
Author(s): Mayuresh Tanaji Raskar , Ajinkya Ujwal Gurav , Abhilash Suryakant Pandey , Prof. Harish Barapatre.
465-487
93
GENERALISED v-ρ INVEXITY AND NON-LINEAR PROGRAMMING
Author(s): L. Venkateswara Reddy , L Venkateswara Reddy , Devanandam. Dola , B. Satyanarayana.
488-494
94
A SURVEY ON CLOUD COMPUTING FROM BANKING SYSTEM PERSPECTIVE
Author(s): Samridhi Gupta , Satwik Sabharwal , Thirunavukkarasu K , Dr. Ajay S. Singh.
495-498
95
499-505
96
Influence of Iterative Parameter Calculations on the Response of Micro-strip Band-pass Filter with Parallel Line Couplings
Author(s): Fatema Itarsiwala , Awij A.R. Shaikh , Ameem Ahmed Khan , Sushruta Shetty.
506-511
97
512-520
98
FOREST CONSERVATION AND PLANNING FOR SAGRESHWAR WILDLIFE SANCTUARY USING GEOSPATIAL TECHNIQUES
Author(s): Sachin Panhalkar , Sachin. R. Lokhande , Ashok B. Koli , Trupti D. Kolekar , Pragati S. Magdum , Amol P. Jarag .
521-529
99
Remote Monitoring and Control for Rural Water Distribution System using GSM
Author(s): Jipson ML , Kanagaraj K , Prasobhkumar.K , Radhika.P , Deepak.B.
530-536