S.No. |
Title & Authors |
Page |
Downloads |
1. |
Solar Simulator:Hardware implementation to analyse characteristic performance of solar cell
Sarala P. Adhau, Rajashree Thakre, Manisha H. Sabley, Prafulla G. Adhau |
01-06 |
|
2. |
Search Strategy using Multidirectional Search Optimization
Prof. Bikramaditya Das, Dr. Bibhuti Bhusan Pati |
07-11 |
|
3. |
Dynamic Voltage Restorer (Dvr) A Solution to Voltage Sag Mitigation in Power System
Mr. Krunal Borkar, Mr. Pritam Bijwal, Prof. Mr. A. A. Dutta, Prof. Ms. H. B. Sarvaiya |
12-16 |
|
4. |
Line Parameter Sensitivity for Improvement in Power Flow Condition
U. V. Takpire, N. D. Ghawghawe |
17-20 |
|
5. |
Intelligent Controller for Optimum PID Tuning
Prashant P. Mawle, Dr. Prakash Burade |
21-25 |
|
6. |
The Future of the Smart Grid – Market Scenario
Prof. Chandan S. Kamble, Dr. P. G. Burade |
26-28 |
|
7. |
Speed Control of Single Phase Induction Motor Using Micro-Controller
Chaitanya N.Jibhakate, Asstt.Prof.(Mrs.)Vijaya Huchche |
29-32 |
|
8. |
Modeling and Simulation of Five Phase Inverter Fed Im Drive and Three Phase Inverter Fed Im Drive
Rahul B. Shende, Prof. Dinesh D. Dhawale, Prof. Kishor B. Porate |
33-40 |
|
9. |
Comparative Analysis of Different PID Tuning Techniques for Coupled Tanks System
Diwakar Korsane, Dinesh Mute, Abhay Halmare |
41-46 |
|
10. |
Application of Newton Raphson Method for Selective Harmonic Elimination in Multilevel Inverter
Mrs. Sarika D Patil, Mrs. Anuradha Gandhi, Mr.Muneeb Ahmad |
47-51 |
|
11. |
Thorium Based Nuclear Power Plant
Deepak Kumar Jaiswal, A.M. Halmare, Dinesh Mute |
52-58 |
|
12. |
Analysis of Three and Five Level Half-Bridge Modular Multilevel Inverter
Shivpal R Verma, Prof. Preeti V Kapoor |
59-62 |
|
Part 2 |
1. |
ACTIVE AND REACTIVE POWER CONTROL OF WIND TURBINE DRIVEN DFIG
Prof. Hemant P. Thakre, Prof. Vinod R. Kamale |
01-06 |
|
2. |
Design and Optimization Strategy for Hybrid Renewable Energy System
Ms. Jyoti B. Fulzele, Dr. M. B. Daigavane |
07-11 |
|
3. |
SCOTT TRANSFORMER AND DIODE CLAMPED INVERTER FED INDUCTION MOTOR BASED ON FOC
Ms. Snehal M. Khobragade, Prof.B.S.Dani |
12-16 |
|
4. |
Simulation Study of Direct Torque Controlled BLDC Motor Drive
Amruta Patki, Swapnil Bhavarkar, S.B.Bodkhe |
17-21 |
|
5. |
Modelling Of Three Phase Inverter for Voltages Using Switching Function
Ms. P. M. Palpankar, Ms. P. D. Duggal, Mr. P. G. Shewane, Ms. S.R. Waghmare |
22-27 |
|
6. |
Distribution Transformer Due to Non-linear Loads
Vishakha L. Meshram, Mrs. S. V. Umredkar |
28-33 |
|
7. |
Power transformer protection using Clark's transformation and fuzzy logic.
Rupanjali Umre, Prof. V. T. Barhate |
34-39 |
|
8. |
Review on Effect of Partial Shading on Photovoltaic Array Configurations
Ms. Vaishnavi P. Deshpande, Dr. S. B. Bodkhe |
40-43 |
|
9. |
Simulation of Push-Pull Buck Converter
Monika N. Laddhad |
44-46 |
|
10. |
Study and Simulation of Grid Connected Solar System and its Power Control
R.G.Deshbhratar , Abhishek .A.Joshi |
47-50 |
|
Part 3 |
1. |
Harmonic Mitigation Using Hybrid Filters
Manish Kurwale, P.D.Debre, Xma.Pote |
01-04 |
|
2. |
Application of Thyristor Controlled Series Capacitor and its Impact on the Distance protection
R. P. Dhote, P. S. Patil |
05-10 |
|
3. |
PV BASED CHOPPER FED DC DRIVE
Rajesh Rane, Rahul Adle, Prashant Mawle, Rashmi Keswani |
11-16 |
|
4. |
Multicarrier modulation for new Diode Clamped Multilevel Inverter
Bhushan Rane, Gaurav Thool, Sandeep R. Gaigowal |
17-22 |
|
5. |
Designing of Impedance Network of Z-Source Inverter for
Different Control Methods
Ankita Pande, G.N Goyal |
23-27 |
|
6. |
To Improve the Performance Efficiency of AC-DC Converter
Yasoda Rani, S.H.Deshmukh |
28-32 |
|
7. |
A Simple FPGA Based ECG R Wave Peak Detection System For Heart Rate And Heart Rate Variability Calculation
Nakul Nagpal, Mayuri Chawla, Dr. Daniel Phillips |
33-36 |
|
8. |
Multiphase Permanent Magnet Synchronous Motor Drive --- A Comparative Study"
Rohan M.Ingle, Dr.S.B.Bodkhe |
37-43 |
|
9. |
Automatic Synchronisation of Alternator for Small Power Plant
Rohan Ingle, Abhay Halmare |
44-46 |
|
10. |
Performance Study of Multiphase Multilevel Inverter
Rajshree Bansod, Prof. S. C. Rangari |
47-52 |
|
11. |
Advances in Process Automation Computing Platform
Rajeev Limaye |
53-56 |
|
EN |
1. |
Determination of Color, Texture and Edge Features for Content-Based Image Retrieval
Sharvari M. Waikar, Dr.K.B.Khanchandani |
01-04 |
|
2. |
An ARM 7 Based Temperature Measurement System Using CAN Bus
Ms. A.A. Paturkar, Dr.P.T.Karule, Mr. A.S.Dikholkar |
05-10 |
|
3. |
Efficient OFCDM Techniques In 4G
Supriya D. Kubade, Dr.Mr. Santosh Chede, Pravin R.Lakhe |
11-15 |
|
4. |
Design and Implementation of Orthogonal Code Convolution Using Enhanced Error Control Technique
Ms.Smita D.Jirapure, Prof. Sanjay Balwani |
16-20 |
|
5. |
ECG Noise Removal using Adaptive Filtering
Mr. Deepak Bhoyar, Prof .Primal Singh |
21-24 |
|
6. |
VLSI Architecture for Neural Network
Dhananjay Kumar, Dileep Kumar, J.R.Shinde, Amit Kumar, Vineet Kumar |
25-29 |
|
7. |
Comparative study Of Interpolated DFT algorithm
Pravin Patil, Dr.S. Shriramwar, Sumit Vaidya |
30-32 |
|
8. |
Data Hiding Technique for Security by using Image Steganography
Nikhil D. Rahate, Prof. P. R. Rothe |
33-36 |
|
9. |
ZIGBEE AND GSM BASED WIRELESS METER WITH TAMPER DETECTION AND CONTROL SYSTEM
Vivek A. Dongre, Prof. A P. Rathkanthiwar |
37-42 |
|
10. |
Design of complex fuzzy logic arithmetic unit for floating number
Lokesh Tople,
A.B.BAVASKAR |
43-46 |
|
11. |
Design of Mobile Ad hoc Network with Performance evaluation of AODV and DSDV Routing Protocol
Snehal S. Nikam, Prof. R.P. Deshmukh, Prof. P.D. Dorge |
47-51 |
|
12. |
Segmentation of collection of images
Gaurav S. Zarkar, S.B. Shrote |
52-55 |
|
13. |
Design of Sequential Circuit using Low Power Adiabatic Complementary Pass Transistor Logic
Mamta Kumari, Prof. M.L. Keote |
56-61 |
|
14. |
DESIGN AND IMPLEMENTATION OF REAL TIME FACIAL EXPRESSION RECOGNITION SYSTEM
Priyank Prakash Shelare, Nishant Hariprasad Pandey |
62-66 |
|
15. |
Encoding Scheme for Power Reduction in Network on Chip Links
Chetan S.Behere, Somulu Gugulothu |
67-71 |
|
16. |
VLSI Design of Multichannel AMBA AHB
Shraddha Divekar,Archana Tiwari |
72-77 |
|
Part 2 |
1. |
ENHANCING BER PERFORMANCE FOR OFDM
Amol G. Bakane, Prof. Shraddha Mohod |
01-05 |
|
2. |
Design of ARM Based Embedded System for Industrial Application Using TCP/IP Network
Bhushan R. Khangare,Mrs,A. P. Rathakanthiwar |
06-10 |
|
3. |
Digital Image Steganography Using Integer Wavelet Transform On ARM Processor Platform
Mr. Omkar A. Mane*, Dr. S. M. Deokar |
11-16 |
|
4. |
FPGA Implementation of Viterbi Decoder Using Modified Register Exchange Method - An Overview
Surekha Shahare, Dr. S.B.Pokle |
17-21 |
|
5. |
USB to USB and Mobile Data Transfer Without Connecting to PC Using Arm Processor
Sonal N. Kawale, Rahul Dhuture |
22-25 |
|
6. |
Design of Arithmetic Unit for High Speed Performance Using Vedic Mathematics
Rahul Nimje, Sharda Mungale |
26-31 |
|
7. |
Voice Controlled Automated Wheelchair
Kruthik Siddeswarappa, Santosh Hirve, Archana Kumari, Yateesh Lulla |
32-37 |
|
8. |
Design and Development of Remote Monitoring and Controlling System Based on Embedded Web Technology
Pooja Kullarkar, Kanchan Dhote |
38-42 |
|
9. |
A Development on Brain - Machine Interaction Using Brain Waves Electric Signal
Pallavi Shelke, Kanchan Dhote |
43-46 |
|
10. |
Generation of Mathematical Models for various PQ Signals using MATLAB
Ms. Ankita Dandwate, Dr. Prof. K. B. Khanchandani |
47-51 |
|
11. |
CMOS Implementation of Reliable Synchronizer for Multi clock domain System-on-chip
Vivek khetade, Dr. S.S. Limaye2 Sarang Purnaye |
52-57 |
|
12. |
Design of 8 Bit Vedic Multiplier for Real & Complex Numbers Using VHDL
Mr.Swaroop A. Gandewar, Prof. Mamta Sarde |
58-61 |
|
13. |
Enhancement of Power System Performance using FACTS Devices
Mr.C.S.Hiwarkar, Dr.P.G.Burade |
62-67 |
|
14. |
Design of enhanced speed Blowfish Algorithm for cryptography with merged encryption & decryption in VHDL
Mr.Tushar Joshi, Mr. Ravindra Yadav, Mr. Utsav Malviya |
68-71 |
|
15. |
Sonographic Image Quality Enhancement And Assessment Using Segmentation Technique
Vidya G. Dahake, M.S.Pawar, S.N.Nitnaware |
72-78 |
|
Part 3 |
1. |
A Bayesian Technique in Medical Image Segmentation for Classifying Registration
Asst.Prof.Rahul Godghate, Prof. Supratim Saha |
01-05 |
|
2. |
Design of Multi-functional High frequency DDS using HDL for Soft IP core
Ms.Khushboo D. Babhulkar, Mrs.Pradnya J.Suryawanshi |
06-12 |
|
3. |
A Real-Time Multiple Parameter Monitoring System Using Wireless ZigBee Network
Navlesh G. Dose, Kishor A. Ingle, Nita Nimbarte |
13-16 |
|
4. |
Implementation of Vedic Complex Multiplier for Digital Signal Processing
Ms. Rajashri K. Bhongade, Ms. Sharada G. Mungale, Mrs. Karuna Bogawar |
17-21 |
|
5. |
An optimal Reconfigurable Cross Bar Switch for Network On Chip Applications
Khyati Choukse, Prof. Balram Tilande |
22-26 |
|
6. |
Development of Wireless Electrocardiogram Detection System for Personal Health Monitoring
Ms.Vaishnavi V. Mundwaik |
27-29 |
|
7. |
Design and Implementation of a Low Power Wireless Telemetry System for Multisignal Monitoring
Prachi Bramhe, Prof. V. G. Girhepunje |
30-33 |
|
8. |
TISSUE SEGMENTATION AND BIAS CORRECTION IN MRI USING LEVEL SET APPROACH.
DHANASHREE B. SHENDE, S. S. DORLE, VIPIN BHURE |
34-38 |
|
9. |
Design of Flash ADC using Improved Comparator Scheme
Deepika Khaire, Mrs. Prachi Palsodkar |
39-43 |
|
10. |
STEGANOGRAPHY and VISUAL CRYPTOGRAPHY in VIDEOS for SECURE COMMUNICATION Joshua D Augustine, Prof. Soni Chaturvedi, Prof. R.V. Bobate |
44-47 |
|
11. |
A REVIEW ON 4 BIT FLASH ANALOG TO DIGITAL CONVERTOR
Vijay V. Chakole, Prof. S. R. Vaidya, Prof. M. N. Thakre |
48-52 |
|
12. |
Mobile Controlled Robot For Surveillance Application
Anjali Parate , Apurva Parad, Anurag Shinde, Jasmin Untawale |
53-56 |
|
13. |
Adaptive Fingerprint Pore Model for Fingerprint Pore Extraction
Ritesh B.Siriya , Milind M.Mushrif |
57-63 |
|
14. |
WIRELESS SENSOR NETWORKS: AN OVERVIEW
Ms. Poonam Thakur, Prof. R. M. Pethe |
64-69 |
|
15. |
Nios II Based System for the Playing of Wave Files on Cyclone II FPGA.
Praful A. Kothe, Mahadev S. Mahajan |
70-74 |
|
Part 4 |
1. |
Multiscale Intuitionistic Fuzzy Homogeneity Measure
Prajakta. R. Nehare, Yogita. K. Dubey, Milind. M. Mushrif |
01-05 |
|
2. |
Hardware and Software Co-design for Wireless Fire fighting System
Deepak Sharma, Parag Jawarkar |
06-09 |
|
3. |
Development of an Efficient Public Transport System Using Zigbee and RFID
Sohail Mohammed Sheikh, Dr. P.T Karule |
10-13 |
|
4. |
Electronically aided High frequency trading
Dr. S. S. Limaye Principal |
14-18 |
|
5. |
Design Analysis of Ultrawideband Antenna with Enhanced Bandwidt
Ms.Rutuja Deode, Prof.Mr.Supratim Saha |
19-22 |
|
6. |
Leon Processor Architecture Implementation with LIS
P.V. Bhandarkar, Dr.S.S.Limaye |
23-28 |
|
7. |
VHDL Implementation of DSSS-CDMA Transmitter and Receiver (Hash function)
Gaurav P. Channe |
29-34 |
|
8. |
AIRCRAFT FLIGHTS DIRECTION SENSING SYSTEM– A SHORT RANGE WIRELESS APPLICATION
Mahesh Mhatre, Divya Meshram |
35-39 |
|
9. |
REDUCTION of PEAK to AVERAGE POWER RATIO in MIMO-OFDM SYSTEM using PRECODING
Bhavna Singatkar |
40-44 |
|
10. |
Automatic Privileged Vehicle Passing System using Image Processing
Abhijeet Kumar, Abhijit Manwatkar, Ayush Sharma, Sumeet Patel |
45-50 |
|
11. |
The Analysis of Crucial Parameter Determining the Performance of Real Time Operating System VxWorks
Prasanna Hambarde, Shivani Jha, Rachit Varma |
51-55 |
|
12. |
Minimization of Frequency Offset in OFDM System using SOM
KHUSHBOO UMREDKAR, DR. S. V. RATHKANTHIWAR |
56-61 |
|
13. |
Feasibility Analysis of Bilateral Filtering by General Purpose Graphical Processing Unit Computing
Shruti S.Agrawal, C.K.Kurve |
62-65 |
|
14. |
Design of a Printed Monopole 'F-shaped' Antenna
Reema Dhumal, Sachin Khade |
66-67 |
|
15. |
Emotion recognition using Speech Processing Using k-nearest neighbor algorithm
Anuja Bombatkar, Gayatri Bhoyar, Khushbu Morjani, Shalaka Gautam,Vikas Gupta |
68-71 |
|
Part 5 |
1. |
A Novel Approach for Minimization of Phase Noise in OFDM System over Multipath Fading Channel
Chetana P. Chaware, Dr. Shubhangi V. Rathkanthiwar |
01-06 |
|
2. |
An Edge Detection Method Using Back Propagation Neural Network
Ms. Utkarsha Kale, Dr. S. M. Deokar |
07-11 |
|
3. |
Adaptive Filter for Removal of Impulsive Noise and Its Comparison with LMS Algorithm
Bhagyashri B. Sawant, Dr. S. M. Deokar |
12-14 |
|
4. |
An Ethercat Based Digital Module for Programmable Logical Controller
Piyush N Malpe, Manisha Wasnik |
15-19 |
|
5. |
Speaker Recognition Using MFCC and GMM with EM
Apurva Adikane, Minal Moon, Pooja Dehankar, Shraddha Borkar, Sandip Desai |
20-24 |
|
6. |
CMOS Based Low Pass Filter for Biomedical Applications
Preeti R. Lawhale, Prof.Somulu G |
25-30 |
|
7. |
Feature Selectionfor Anomaly-Based Intrusion Detection Using Rough Set Theory
Abhinav S. Raut, Kavita R. Singh |
31-38 |
|
8. |
Low Latency, Area Optimized, High Throughput Double Precision Pipelined Floating Point Multiplier Using VHDL on FPGA
Tushar S.Muratkar |
39-42 |
|
9. |
96acknowledging Gsm Controlled Robot
Vipin D. Vaidya, Sanjay L. Haridas |
43-46 |
|
10. |
Application of Embedded CAN Module
Pratima Bomidwar, Neha Bhoyar, Mayuri Rangari, Shavika Dhoke |
47-49 |
|
11. |
Design and Implementation Power Optimizer Using Quaternary Logic
Swapna Shelote, Mamta Sarda |
50-52 |
|
12. |
Data Collection in Multipath WSN
Mrs. J.M. Bhattad, Shruti S. Joshi |
53-56 |
|
13. |
Energy Consumption Trade Off And Link Stability Issues For Wireless Sensor Network
Shweta S. Shrigadiwar, Prof. A. B. Jirapure |
57-63 |
|
14. |
Reliable Link for Vehicular Adhoc Network
Rohini B. Tellawar, Prof (Mrs)Yogita A. Nafde |
64-67 |
|
15. |
Efficient Noc Architecture with CDMA Switch
Prajakta Arunpant Kherde, Prof. Sunil R. Gupta |
68-71 |
|
Part 6 |
1. |
Compensation of CFO Affected SC-FDMA System
Sneha Shambharkar, Dr. (Mrs).S. W. Warade |
01-04 |
|
2. |
FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL
Y.Aruna, Prof. Bharati Masram |
05-10 |
|
3. |
Performance Evaluation of Various Routing Protocols in Wireless Sensor Networks
Ms. Mrunali Dhande, Dr. C. G. Dethe |
11-13 |
|
4. |
A 7-Bit 75MSPS Low Power Pipeline ADC
Parth Pampattiwar, Sukant Gupta, Sonali Gupta, Prof. M.S. GHUTE, Priyanshi Mishra, Asst. Prof. PRATIK AKHRE |
14-19 |
|
5. |
Design and Optimization of Domino Logic Based ADC for Digital
Synthesis
M. B. Damle, Dr. S. S. Limaye, M. G. Sonwani |
20-24 |
|
6. |
Wireless Mobile Charging Using Rectenna
Apurv Kumbhare, Abhay Kukade, Avani Funde, Pradnya Shendre, Chaitrika Dhoble |
25-28 |
|
7. |
Automatic Segmentation of Cell Nuclei in Breast Histopathology Images and Classification Using Feed Forward Neural Network
Shraddha R. Raut, Dr. S. S. Salankar, Prof. V. R. Bora |
29-33 |
|
8. |
An Efficient Implementation of Median Filter Using Matlab Simulink and Vhdl
Ms. K. R. Katole, Mrs. S.P.Balwir, Ms. N. W.Umredkar |
34-36 |
|
9. |
Design of Labview Based Virtual Instrument for Sing around Technique
A. C. Balharpure, A. S. Pande, S. J. Sharma And S. Rajagopalan |
37-42 |
|
10. |
Bandwidth Enhanced Triangular Microstrip Antenna for Wireless Application
Parmita Patil |
43-45 |
|
11. |
Ber Performance OF Improved Algorithm
Hema R. Kale, Chandrashekhar G.Dethe, Milind M. Mushrif |
46-49 |
|
12. |
Comparative Performance Analysis of High Dimensional Data Reduction Using DWT and PCA
Ms. Sneha R. Burnase, Ms. Shanti Swamy |
50-53 |
|
13. |
A Survey on Counterfeit Paper Currency Recognition and Detection
Shital Mahajan, K.P.Rane |
54-61 |
|
14. |
Embedded Base Meter Reading and Fault Detection System with
Control Circuit
Anmol N. Chaure, Prof. Shubhangi Dhengre |
62-63 |
|
15. |
Edges Detection on Chromosome Image for Segmentation
Adwiti A. Deoghare |
64-68 |
|
Part 7 |
1. |
Efficient Design of Floating Point Matrix Calculations Using Vhdl
Prof. Nicky H. Bellani, Prof. Pratik R. Hajare |
01-07 |
|
2. |
A Survey on Design of Pipelined Single Precision Floating Point Multiplier Based On Vedic Mathematic Technique
R.N.Rajurkar, P.R. Indurkar, S.R.Vaidya |
08-12 |
|
3. |
Pseudo Chaotic Sequence Generator based DS-SS Communication System using FPGA
Amit Tripathi, Abhishek Zade, Rohit Himte |
13-18 |
|
5. |
Review of Viterbi Decoder for Trellis Coded Modulation System
Suraj. R. Irkhede, Dr. S. L. Haridas |
30-35 |
|
6. |
Human Face Recognition Using Wavelet Transform
And Artificial Neural Network
Mrs.Priti D.Neulkar, Mr.Srikanth Herekar |
36-39 |
|
7. |
Performance Analysis for Multipliers Based Correlator
Trupti Menghare, Sudesh Gupta |
40-44 |
|
8. |
Bus Recognition System For Visually Impaired Persons
(VIPs) Using RF Module
Shantanu Agrawal, Anuja Anwane, Prasad Bulankar, Dhiraj K. Thote |
45-49 |
|
9. |
Critical Event Monitoring using Sleep Scheduling in Wireless Sensor Networks
Trupti Thakre, S. M. Choudhary |
50-53 |
|
10. |
EEG Feature Extraction Using Wavelet Techniques For Brain Computer Interface
Kirti A. Joshi, Dr. Narendra Bawane |
54-59 |
|
11. |
Image Retargetting on Video Based Detection
ALOK THAKUR, NEERAJ TIWARI |
60-64 |
|
12. |
Design and Evaluation of Cognitive Radio Ad hoc Networks Over TCP
Ashish Manusmare, Ritu Chauhan |
65-71 |
|
13. |
Feature Selection for Anomaly-Based Intrusion Detection using Rough Set Theory
Abhinav S. Raut, Kavita R. Singh |
72-79 |
|
14. |
A Survey on Impact of Various Network Attacks on Time Synchronization in Cognitive Radio
D.M.Chandran, P.R. Indurkar, S.R.Vaidya |
80-83 |
|
15. |
Feature Extractionof Iris and Fingerprint Images for Multimodal Biometrics Identification
Ms. Pooja P. Choudhari, Dr .MRS.S.P. HINGWAY |
84-86 |
|
CS |
1. |
Building A Secure & Anti-Theft Web Application By Detecting And Preventing Owasp Critical Attacks- A Review
Vibhakti Mate, Milind Tote, Abdulla Shaik |
01-06 |
|
2. |
Improving Bisecting K-means by Applying Natural Language Processing
I.S.Choube, Dr.S.D.Sharma, Prof.Angad Singh |
07-12 |
|
3. |
Early Alert Messaging Using Relative Positioning for Car Accident in Vehicular Ad-hoc Network
Ms. Yogita Raut, Prof. Vaishali Katkar. |
13-20 |
|
4. |
A Survey on Fraud Detection in Internet Banking using HMM and BLAST-SSAHA Hybridization
Ms. Avanti H. Vaidya, Prof. S. W. Mohod |
21-26 |
|
5. |
Active Soft Orthotic Ankle Foot (ASOAF) for Gate Pathologies: a Designing Approach
Ganesh Yenurkar, Rajesh Nasare, Chandrashekhar Gode |
27-32 |
|
6. |
Reliable Routing Approach for Wireless Sensor Networks
Sonali H.Khatwar, Swapnil P Karomore |
33-37 |
|
7. |
Impact on Mixed Attribute Data set
Prutha Deshmukh, Mrs.Swati Kale |
38-42 |
|
8. |
Using K-Means and FCM In Cloud Environment
Mr.Saurabh P.Taley, Prof.J.J.Shah |
43-46 |
|
9. |
Deploying an Application on Cloud and Its Security
Ms. Neha A Puri, Mr. Ajay R Karare, Prof. R.C.Dharmik |
47-52 |
|
10. |
Application of Distributed Network Services Using SSO with Different Security Mechanism
Ms. Shreya B. Pandey, Prof. S. P. Chhaware, Ms. Antara Bhattacharya |
53-56 |
|
11. |
Role of Text Clustering and Document Clustering Techniques in Computer Forensic Analysis: A Review
Mr. Nitin S. Kharat, Prof. Harmeet Khanuja |
57-61 |
|
12. |
To Design and Development of a Cost Effective Electronic Drum Kit
Vikas Barai, Prof. T.H.Nagrare |
62-66 |
|
13. |
Review of Adhoc Routing Protocols for Cognitive Radio Network
Ms.Sampada Apte, Ms.Vaishali Katkar |
67-74 |
|
14. |
Secure Wireless Sensor Network Updates Using OTAP And Performance of Symmetric Encryption Algorithms on Power Consumption
Mr. Charan R. Pote, Mr. Punesh U. Tembhare, Mr. Manoj G. Lade |
75-81 |
|
Part 2 |
1. |
A Novel Topological Approach Using Transferable Belief Model for Distributed Data-Static Version
Pooja .S.Verma, Ms Purnima Soni, Prof S.D. Kamble |
01-05 |
|
2. |
Survey: Fault Tolerance Mechanism with Optimal Topological Changes in WSAN
Nisha M.Katre, Mangala S.Madankar, Punesh U.Tembhare |
06-09 |
|
3. |
Document Clustering with Feature Selection Using Dirichlet Process Mixture Model and Dirichlet Multinomial Allocation Model
Nitesh Timande, Dr. M.B.Chandak, Prof.Manisha.Kamble |
10-16 |
|
4. |
Implementation of Vertical Handover in Heterogeneous Networks
Hoshang Karanjekar, Asst. Prof. Manisha Kamble |
17-22 |
|
5. |
An Approach for Detection of Attack in VANET
Komal B. Sahare, DR. L.G.Malik |
23-29 |
|
6. |
Online Virtual App with Onion Routing
Pooja R. Gadge, Pranjali U. Farkade, Mrunal A. Nimje, Ashwini P. Mankar |
30-37 |
|
7. |
Performance and Analysis of Image Filtering Techniques
Shradha Dakhare, Harshal Chowhan |
38-41 |
|
8. |
Steganography and Visual Cryptography for Secured Data Hiding
Mr. Deepak S. Bhiogade, Prof. Shaikh Phiroj Chhaware |
42-44 |
|
10. |
Identification of Agricultural Pests Using Radial Basis Function Neural Network
Gaurav Kandalkar, Prof.A.V.Deorankar |
52-56 |
|
11. |
Data Publishing In M-Privacy Using Anonymization and Randamization Method
Ms.Priya V. Mundafale, Prof.M.B.Chandak, Prof. Gurudev Sawarkar |
57-60 |
|
12. |
A Neural Network Color Classifier in HSV Color Space
Gargi V. Sangamnerkar, Dr. Kishor K. Bhoyar |
61-66 |
|
13. |
A Neural Network Approach to Gender Classification using Facial Images
Kanchan Tarwani, Dr. K. K. Bhoyar |
67-72 |
|
14. |
Implementation of Low cost VoIP Media Stream Encryption Device using Linux
Mr. Sachin C Malke, Mr. Girish Talmale |
73-79 |
|
15. |
A novel checkpointing approach for mobile devices using Remote Checkpoint Strategy
Ms. Sneha R. Kaware, ** Prof. P. L. Ramteke |
80-83 |
|
16. |
Priority Based Assignment of Shared resources in RTOS
Ms. Raana Syeda, Ms. Manju Ahuja, Ms. Sneha Khatwani, Mrs. Swara Pampatwar |
84-91 |
|
Part 3 |
1. |
Cloud Based Collaboration Tool
Rohini C. Ekghare, Prof. Manish Hadap |
01-05 |
|
2. |
Database Forensic Analysis Using Log Files
Mr. Jitendra R Chavan, Prof. Harmeet Kaur Khanuja |
06-09 |
|
3. |
Implementation of split based encryption technique for securing file transfer over a network
Mrs. Parul Rathor |
10-13 |
|
4. |
Giving Privacy to the Sensitive Labels Present on Social Network
Mr.A.K.Baitule, Prof. Manisha Kamble |
14-18 |
|
5. |
Advanced Security Mechnism In Wireless SensorNetwork-Review
Ms. Bharati A. Karare, Prof. Vaidehi Baporikar |
19-22 |
|
6. |
Security Enhancement in Cloud Computing Using Triple DES Encryption Algorithm
Tony Durgadas Jagyasi, Jagdish Pimple |
23-25 |
|
7. |
Detection of Network Attacks Using Signature Based Approach
Nikhil Mangrulkar, Arvind. R. Bhagat Patil |
26-28 |
|
9. |
Advanced Digital Image Forgery Detection by Using SIFT
Priyanka G. Gomase, Nisha R. Wankhade |
34-38 |
|
10. |
Robust Watermarking of Digital Media
Sonam S. Chankapure*, Prof. Nisha R. Wankhade |
39-42 |
|
11. |
Improving the Quality of Services in Wireless Sensor Network by Improving the Security
Mr. Ajay Ramesh Karare, Prof.S.V.Sonekar, Miss. Kumari Akanksha |
43-47 |
|
12. |
Development of parallel processing application for cluster computing using Artificial Neural Network approach
Minal Dhoke, Prof. Rajesh Dharmik |
48-50 |
|
13. |
Simulationusing Matlab Rules in Neuro-fuzzy Controller Based Washing Machine
Ms. NehaVirkhare, Prof. R.W. Jasutkar |
51-55 |
|
14. |
Design and Development of Multifunctional Robot for Military Purpose Applications
Bhawana D. Parate , Jagruti J. Shah |
56-60 |
|
15. |
IP Traceback Approaches for Detecting Origin of DDoS Cyber Attackers
Mrs. Swati G. Kale, Mr. Vijendrasinh P. Thakur, Mrs. Nisha Wankhade, Ms.V.Nagpurkar |
61-66 |
|
16. |
Secured Digital Watermarking of Colour Images
Piyush.V.Gattani , DR.C.S.Warnekar |
67-69 |
|
17. |
Review of Intrusion Detection Systems (IDS) and Agents Based IDS
Abhilasha D. Kulkarni, Prof. R. B. Joshi |
70-76 |
|
Part 4 |
1. |
Integrated Virtual E-Learning Environment for Disable Person
Ms.Shweta Soni, Prof.M.D.Katkar |
01-04 |
|
2. |
GSM and GPS BASED VEHICLE SECURITY and CONTROLLING SYSTEM
Vikas Singh, Prof. S.P.Karmore |
05-07 |
|
3. |
A Survey on Performance Analysis for Optimization of Storage Reallocation Strategies in Cloud Environment
Pallavi Shelke, Prof. M.B.Gudadhe |
08-13 |
|
4. |
Advanced Computing Architectures and New Programming concept Models
Najim Sheikh, Sipra Sonam, Harshada Mandhare |
14-21 |
|
5. |
Implementation of Intrusion Detection Response System (Idrs) For Reliability Of Cyber Physical Systems (Cps)
Ms. Simrandeep Kaur chana, Prof S.J.Karale |
22-27 |
|
6. |
Design and Development of Driver Fatigue detection system and control of the vehicle system
Miss. Monali Gulhane, Prof. P. S. Mohod |
28-32 |
|
7. |
AIDA Technique for Privacy Protection in Cloud
Kavita Manekar , Prof. A.Bhattacharya, Prof. S.D.Kamble |
33-36 |
|
8. |
Accelerating product time to market using PaaS and Automation tool
Swara Pampatwar, Ritu Godhani, Manisha Ghorpade |
37-40 |
|
9. |
A Search Engine for Personal Mobile
Priya Panjwani, Nitin Raut, Abdulla Shaik |
41-44 |
|
10. |
Content Based Image Retrieval a Comparative Based Analysis for Feature Extraction Approach
Ashwini Vinayak Bhad, Komal Ramteke |
45-51 |
|
11. |
Data Aggregation In Wireless Sensor Network
Mr.Yuoraj Somkuwar, Prof. S.D.Kamble |
52-56 |
|
12. |
Crime Mining From Crime Warehouse
Anjali Vasani, Kamalesh Vasani, Dipika Udasi, Mona Mulchandani |
57-60 |
|
13. |
Creating Materialized View over the Integration of Heterogeneous Databases
Ankush J. Paturde, Anil V. Deorankar |
61-63 |
|
14. |
Mobile Search Browser
Bhushan.U.Bawankar, Amol D Gaikwad |
64-68 |
|
15. |
Ontology Based Approach for Domain Specific Semantic Information Retrieval System
Ms. Pratibha S. Sonakneware, Prof. S. J. Karale |
69-74 |
|
16. |
Querying XML Document using Relational Database System: A Survey
Sohel A Rahi, G.R Bamnote |
75-79 |
|
17. |
Link Prediction In Temporal Mobile Database
Mr. AmolDongre, Mr.Manoj Dhawan, Dr.Ashish Bansal |
80-85 |
|
Part 5 |
1. |
Secret Sharing Schemes: A Review
Miss. Reena S. Satpute, Prof. Amit N. Thakare |
01-03 |
|
2. |
Knowledge Acquisition using Tree Based Machine Learning Model: A Survey
Satvik Satish Bahaley, Dr. M. A. Pund |
04-12 |
|
4. |
Modern Graph Databases Models
Kalyani N.Satone |
19-24 |
|
5. |
An Efficient Method for Fractal Video Compression using Block Matching Motion Estimation
Rakhi Ashok Aswani, Shailesh D.Kamble |
25-28 |
|
6. |
Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Short Signature Scheme
Pooja Motwani, Priyanka Fulare |
29-33 |
|
7. |
Approach by Applying Clustering Algorithm for Document Clustering
Priyanka Khadse, Harshal Chowhan |
34-36 |
|
8. |
Analysis on MPTCP combining Congestion Window Adaptation and Packet Scheduling for Multi-Homed Device
Mr. Prathmesh A. Bhat, Prof. Girish Talmale |
37-43 |
|
9. |
System Interaction by Using Hand Gesture Recognition with Visual Cryptography Scheme
Swati Chamele, Asst. Prof. Hemlata Dakhore, Prof. S.P.Chhaware |
44-47 |
|
10. |
Local Plastic Surgery Face Recognition using Multimodal Biometric Features
Minal Mun, Prof. Anil Deorankar |
48-53 |
|
11. |
Retrieving Non Rigid Configuration for Image Matching
B. C. Hambarde, Dr. P. N. Chatur |
54-59 |
|
12. |
Hand Gesture Recognition of Indian Sign Language to aid Physically impaired People
Neha V. Tavari, Prof. A. V. Deorankar, Dr. P. N. Chatur |
60-66 |
|
13. |
An Efficient Private Search Technique Using SADS Algorithm
Ms. Vrushali S. Sakharkar, Dr .G. R. Bamnote |
67-68 |
|
14. |
Design an Algorithm for Vertical Handover In Heterogeneous Network
Prof. Sagar V. Ghormade, Prof. Minal Ghute |
69-72 |
|
15. |
Modeling and Detaining the Mobile Virus Proliferation over Smartphone
Ashwini L. Gour, Jagdish Pimple |
73-81 |
|
Part 6 |
1. |
An Approach For Secure Image Transmission
Ms. Prakruti Bisen, Prof. Dipak Wajgi |
01-03 |
|
2. |
Vehicle Theft Detection through Face Recognition and Accident Alert & Locator System
Mr. Raj Rai, Prof. Dinesh Katole, Ms. Nayan Rai |
04-08 |
|
3. |
Optimum pixel expansion for threshold colour extended visual cryptography with Ability of Hiding Confidential Data
Veena Hemke1, Ranjana Shende |
09-12 |
|
4. |
Handling Word Sense Disambiguation in Marathi Using a Rule Based Approach
Gauri Dhopavkar, Manali Kshirsagar, Latesh Malik |
13-16 |
|
5. |
Review of Anonymization of Social Networks Concepts And Methods
Priyanka Bhilare, Prof. Rajesh B. Singh |
17-22 |
|
6. |
Review of Semantic Web, Annotation Methods and Automatic Annotation for Web Search Results
Shilpa Jadhao, Prof. R. P. Kulkarni |
23-29 |
|
7. |
Review On-Implementation of Truthful Routing Path Generation in Wsns through Tarf
Ms Premakshi B.Dohe, Mr.Rajesh Shukla |
30-36 |
|
8. |
LOAD REBALANCING IN CLOUDS
Sushma G. Fulewar, Anil N. Jaiswal, Shailesh D. Kamble |
37-41 |
|
Part 7 |
1. |
Semantic Approach For Processing Natural Language Query
Ms. Ankita A. Kendhe, Prof. S. J. Karale |
01-04 |
|
2. |
NLP based Optimization Technique for Performance Improvement of knn
Tejaswini S Channe, Manoj B Chandak |
05-08 |
|
3. |
Identity-Based Cryptosystem for Mobile Network
Akshay V. Fadnis , Ms. S. U. Nimbhorkar |
09-13 |
|
4. |
Intrusion Detection System Using Evolutionary Approach of Genetic Algorithm
Ms. Pooja B. Aher, Prof. Kapil N. Hande |
14-18 |
|
5. |
Secondary Structure Predictions for Long RNA Sequences
Mrs. Ujjwala H. Mandekar, Ms. Pooja B. Aher |
19-23 |
|
6. |
CRIME MINING FROM CRIME WAREHOUSE
Monika Manwani, Neha Tharani, Mona Mulchandani |
24-27 |
|
7. |
Comparative Analysis of Pattern Taxonomy Model used in Text Mining with respect to different Application Domains
Ms. Priya P. Malkhede, Ms. Hemlata Dakhore |
28-32 |
|
8. |
MOBILE CLOUD MULTIMEDIA SERVICES USING ENHANCE BLIND ONLINE SCHEDULING ALGORITHM
Saiyad Sharik Kaji, Prof.M.B.Chandak |
33-38 |
|
9. |
OBJECT BASED DATA STORAGE SYSTEM FOR CLOUD USING DHT AND TPDSS WITH A SELF-DESTRUCTING DATA
Ms. Punam U. Lambat, Mr. G. Rajesh Babu |
39-43 |
|
10. |
An energy economical resolution for giant computation using EAAS cloud
Fazeel Irshad Zama, Dr. Manoj B. Chandak, Harshal C. Chowhan |
44-48 |
|
Part 8 |
1. |
WATER POLLUTION BASED ABRUPT EVENT MONITORING USING KPCA AND SVM
Poonam Tidke, Mr. Sudhakar Parate, Prof.S.P.Chhaware |
01-06 |
|
2. |
DATA MINING FOR MOBILE DEVICES USING WEB SERVICES
R. R. Shelke, Dr. R. V. Dharaskar, Dr. V. M. Thakare |
07-09 |
|
3. |
Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks
Mrs. P. V. Meghare, Prof. P. A. Deshmukh |
10-14 |
|
4. |
Comparative study of Variable length key based visual cryptography and Visual Cryptography with Enveloping by Digital Watermarking.
Suchita Tarare, Akhil Anjikar, Hemant Turkar |
15-17 |
|
5. |
Automated License Plate Recognition System (ALPRS) using Regular Expression
Pranay Meshram, Mohanish Indurkar, Ritu Raj, Neeranjan Chitare |
18-22 |
|
6. |
Analysis of Graphical Based Password
Vishal S Ramteke, Prof .Amol d Gaikwad |
23-27 |
|
7. |
Comparative study for analyzing image segmentation algorithms
Supriya Gupta, Mujeeb Rahman,Vaibhav Bani |
28-33 |
|
8. |
Web Page Suggestion in Web Mining
Aparna Gupta, Prof. Aarti Karndikar |
34-37 |
|
9. |
Palmprint recognition system using an Association extraction methodology of Principal lines
S. S. Patil, A. V. Deorankar, P. N. Chatur |
38-40 |
|
10. |
NitinTo Design and Implement a Novel Method of Encryption Using Modified RSA Algorithm and Chinese Remainder Theorem
Ms. Bhumi J. Patel, Prof. Nitin J. Janwe |
41-45 |
|
Part 9 |
1. |
Predictive Data Mining For Medical Diagnosis: An Overview Of Heart Disease Prediction
Ms. Priti V. Wadal, Dr. S. R. Gupta |
01-04 |
|
2. |
A Review of Energy Efficient In-network Data Aggregation Protocols
Amit S. Bhosale, Jaishri M. Waghmare, Manisha S. Mahindrakar |
05-09 |
|
3. |
Analysis of Improvement in Accuracy for Information Retrieval Using Text Mining
Prashant N. Khetade, Ms.Sulbha Patil, Vinod Nayyar |
10-13 |
|
4. |
A Neural Network Color Classifier in HSV Color Space
Gargi V. Sangamnerkar, Dr. Kishor K. Bhoyar |
14-19 |
|
5. |
A Neural Network Approach to Gender Classification using Facial Images
Kanchan Tarwani, Dr. K. K. Bhoyar |
20-25 |
|
7. |
Design of an Optimized Emotion Detection System from Speech using active Feature Selection-a Review
Suchita VDeshmukh, YogadharPandey |
31-34 |
|
8. |
On The Role of Log Based Metadata in Forensic Analysis of Database Attacks
Shraddha Suratkar, Harmeet Khanuja |
35-41 |
|
9. |
A Review on Mass Spectrometry: Its tools and data analysis for proteomics
Ms. Ashwini Yerlekar, Dr. M. M Kshirsagar, Ms. Priyanka Dudhe |
42-45 |
|
10. |
Design of Self-Balancing Bicycle Using Object State Detection
Mr.Sandeep kumar gupta, Mrs.Veena.Gulhane |
46-49 |
|
11. |
Analysis of Parsing Algorithms in Natural Language Processing
Pankaj V. Nimbalkar, Dr. P. K. Butey |
50-53 |
|
12. |
Concept Based Video Retrieval
Dipali N. Junankar, Nita S. Patil |
54-58 |
|
13. |
Survey on Cluster Ensemble Approach for Categorical Data Clustering
Mr. P. O. Chitnis, Mr. A. M. Bainwad |
59-64 |
|
14. |
Load Balancing Mechanism with Mobile Based Cloud Environment
Rupali Kadu, Swapnili Karmore |
65-69 |
|
15. |
A Virtualized Cloud for storing Mobile data with Location"- A Review
Deepika Bhatia, Amol rangari, Vishal wakodikar |
70-73 |
|
16. |
Design and Implementation of Cloud Based DRM Framework on Android Platform
Ms. Kirti D. Nakhale, Prof S.P. Karmore |
74-79 |
|
17. |
3d Game Design And Developmentof 3d Shooter Game Using Xna
Monika Sarve, Deepak Khatri |
80-84 |
|
18. |
Emergency Medical Services (Ems)
Tanu Mirpuri, Akshay Bhisikar, Ajay Karare |
85-88 |
|
Part 10 |
1. |
Methodology of Password Generator scheme Using Image Fusion
Miss.Snehal A. Mahajan, Prof.Anjali S. Mahajan |
01-03 |
|
2. |
Jamming aware Traffic Allocation in Wireless Mesh Network
for Multiple Path Routing using Portfolio Selection
Sagar P. Tete, Prof. Vaidehi Baporikar |
04-07 |
|
4. |
Anti-Phishing Enabled Web Browser
Akansha Sharma, Kalyani Bomewar, Mona Mulchandani |
12-14 |
|
5. |
Phish Tank-A Phishing Detection Tool
Rohan Saraf, Mayur Khatri, Mona Mulchandani |
15-20 |
|
6. |
A Novel Approach to System Security Against Split Personality Malware
Nisha Balani |
21-28 |
|
7. |
Mining Elementary Repeats from DNA using Suffix Tree in Linear Time
Vishal B. Rathod, Prof.A.V.Deorankar, Dr. P.N.Chatur |
29-33 |
|
8. |
Implementation of the Drowsiness Sensing System
M/S Dhanashree Kumar, M/S Suwarna Hajare |
34-37 |
|
9. |
Deployment of Application and Review of Different Encryption
Algorithm for Cloud Computing
Mr. Ajay R Karare, Ms. Neha A Puri, Prof.M.M.Baig |
38-44 |
|
10. |
An Energy Saving Approach in Wireless Sensor Network
Monika Raghatate, Prof. Dipak Wajgi |
45-48 |
|
11. |
Practical Approach of Fragmentation of Face Components based on Facial Expression
Lekha Parmar, Sanwantry Talreja |
49-52 |
|
12. |
Enhancing Ambient Learning through Multimodal Interfaces and Various Technologies
Ms. Amrita Kungwani, Ms.Mona Mulchandani |
53-58 |
|
13. |
Study and Implementation of Private Cloud
Mayur Ochani, Sneha Rangari |
59-62 |
|
14. |
Study of Clusterization Methods for Random Data
Bhumika Ingale, Ms.Priyanka Fulare |
63-65 |
|
15. |
Review paper on Security Mechanism for Supporting Routing Services on WANET
Ashwini Shendre, P. S. Mohod |
66--69 |
|
16. |
A Bayesian Model Framework for Reconstructing Gene Network
Ms. Sneha S. Borkar, Prof. Rakhi Wajgi |
70-74 |
|
EV |
1. |
Ambient Noise Level Prediction During Festival Season In Metro City Of South East Asian Region
Atul P.Vanerkar, Satish K. Lokhande & Sunil H. Ganatra |
01-12 |
|
2. |
INTRODUCTION OF CREDIT DEFAULT SWAPS: IMPLICATIONS ON MONETARY POLICY AND FINANCIAL STABILITYOF DEVELOPING ECONOMIES LIKE INDIA
Prof. Mahesh S. Chopde, Mr.Kunal G. Padole |
13-23 |
|
3. |
Online Insurance In India: A Long Way To Go
Ms. Supriya M. Lakhangaonkar |
24-26 |
|
4. |
Recruitment And Selection Process Alive Tech Services Nagpur
Nutan Sinha, Bumesh Nimje |
27-30 |
|
5. |
Event Driven Approach for Dynamic Business Process Adaptation
Ram Pradhan |
31-34 |
|
AS |
1. |
Removal of Pb(II) and Zn(II) metal ions by carbonaceous material obtained from industrial waste lignin
R. A. Nandanwar, A. R. Chaudhari, J. D. Ekhe |
01-05 |
|
2. |
Synthesis and Characterization of Nickel Oxide based Nanocomposite Material
A.K.Barve, S.M.Gadegone, M. R. Lanjewar, R.B.Lanjewar |
06-08 |
|
3. |
Synthesis of Iodine Doped Co-ordination Polymer with Salicylic Acid-Biuret-Trioxane Terpolymer
S.M.Gadegone |
09-10 |
|
4. |
Vibration based condition monitoring by using Fast Fourier Transform "A case on a turbine shaft".
Mr. Rahul D. Mankar, Dr. M.M.Gupta |
11-15 |
|
5. |
High Frequency Acoustic Absorption in Acetates and Formates using Artificial Neural Network
Rashmi S. Dashaputre |
16-19 |
|
6. |
Synthesis and Magnetic study of Zirconium–Cobalt Substituted Calcium Hexaferrites
Asmita D. Deshpande, Vivek M. Nanoti, Kishor G. Rewatkar |
20-22 |
|
7. |
Synthesis and X-Ray Diffraction Studies of cis MoO2 (VI) Complexes Derived from Benzoyl Hydrazones
M.A Katkar a , S.N. Rao a, H.D. Junejab |
23-27 |
|
8. |
Computer Assisted Computation Of Compound Linkage Machine Mechanism Using Matlab
Mr. Sunil R. Kewate, Mr.Tejas B. Narwade, Mr.Mayur R. Shimpi, Miss Mansi S. Satbhai |
28-34 |
|
9. |
Synthesis, Characterization and Photocatalytic capability of CdO Nanoparticle for methyl red
A.K.Barve, S.M.Gadegone, M.R. Lanjewar and R.B.Lanjewar |
35-38 |
|