IJARSE (ISSN: 2319-8354)

Volume No.04, Special Issue (01), April 2015, ICDAVIM-15

 Article # Article Title & Authors  

1.


PERFORMANCE ANALYSIS OF SUPERCHARGING PROCESS IN SI ENGINE & CI ENGINE AND APPLICATION OF SUPERCHARGER  (Page: 9-Jan)
Prakash Kumar Sen, Rohit Jaiswal, Shailendra Kumar Bohidar
|PDF

2.


DEVELOPMENT OF ANN FOR FORECASTING OF BSE INDEX   (Page: 16-Oct)
Udit Narayan Bera, Bhavesh B Kunbi
|PDF

3.


STUDY ON A FLAT PLATE SOLAR COLLECTOR: APPLICATION, PERFORMANCE & EFFICIENCY AT DIFFERENT FLOW RATES  (Page: 17-22)
Prakash Kumar Sen, Gayatri Choudhary, Shailendra Kumar Bohidar
|PDF

4.


STUDY ON SOLAR WATER HEATER AND ITS SYSTEM PERFORMANCE  (Page: 23-27)
Prakash Kumar Sen, Nishita Kispotta ,Shailendra Kumar Bohidar
|PDF

5.


STUDY ON ENERGY PERFORMANCE OF SOLAR GREENHOUSE  (Page: 28-33)
Shailendra Kumar Bohidar, Dhaneshwari Sidar, Prakash Kumar Sen
|PDF

6.


SECURE TRUSTWORTHY SERVICE EVALUATION IN SOCIAL NETWORKS  (Page: 34-39)
T.Chindrella Priyadharshini, M.Swarnalatha, P.Mugilan
|PDF

7.


IN A FOUR-STROKE ENGINE EFFECT OF KNOCKING IN SPARK IGNITION   (Page: 40-43)
Prakash Kumar Sen, Chandrakant Singh , Shailendra Kumar Bohidar
|PDF

8.


STUDY OF DESIGN OF CYCLONE SEPARATOR UNDER COLLECTION EFFICIENCY AND AIR DENSITY EFFECT  (Page: 44-52)
Radhe Shyam Verma, Prakash Kumar Sen, Shailendra Kumar Bohidar
Abstract |PDF|HTML

9.


ROLE OF ELECTROSTATIC PRECIPITATOR IN INDUSTRY  (Page: 53-58)
Shailendra Kumar Bohidar, Kheer Sagar Naik, Prakash Kumar Sen
|PDF

10.


AN OVERVIEW: MOBILITY BASED ANCHOR POINT NODE (APN) HYBRID NETWORK  (Page: 59-67)
Soumya S. Hooli, M. S. Shirdhonkar
|PDF

11.


STUDY ABOUT EFFICIENCY IMPROVEMENT OF THERMAL POWER PLANT & ADVANCE TECHNOLOGIES IN DIFFERENT TYPES OF PLANTS  (Page: 68-76)
Kush Jaiswal, Prakash Kumar Sen, Shailendra Kumar Bohidar
|PDF

12.


SURVEY ON FINDING FAULTS USING VIRTULIZED DATACENTERENVIRONMENTAND VIRTULIZATION FAULT TOLERANCE APPROACH TOWORDS MANDATORY SECURITY MONITORING  (Page: 77-84)
Kshamarani Purvimath, Shriharsha S.Veni
|PDF

13.


A NOVEL APPROACH FOR AES ALGORITHM IN IMAGE ENCRYPT?ON  (Page: 85-92)
Sai Charan Dhatrika , Deepika Puvvula , S.Venu Gopal
|PDF

14.


A CRITICAL REVIEW ON THERMAL PROTECTION SYSTEM IN AEROSPACE SHUTTLE  (Page: 93-97)
Shailendra Kumar Bohidar, Jaishri Dubey , Prakash Kumar Sen
|PDF

15.


ROBOTIC SENSOR: CONTACT AND NON-CONTACT SENSOR  (Page: 98-102)
Shailendra Kumar Bohidar, Khemraj Patel, Prakash Kumar Sen
|PDF

16.


A BRIEF STUDY ABOUT ADVANCEMENT IN ROCKET NOZZLE USED IN AIRCRAFT SCIENCE  (Page: 103-108)
Shailendra Kumar Bohidar, Kumar Gaurav, Prakash Kumar Sen
|PDF

17.


CRITERIA OF ARTIFICIAL NEURAL NETWORK IN RECONITION OF PATTERN AND IMAGE AND ITS INFORMATION PROCESSING METHODOLOGY  (Page: 109-117)
Khagesh Kumar Dewangan, Naresh Kumar Dewangan, Purushottam Patel
|PDF

18.


AUTOMATIC INDEXING MECHANISM FOR DRILLING MACHINE  (Page: 118-121)
Ashish Mourya, Chandrashekhar Patil, Priyanka Chavan, Manjur Sande, Sarang Pisal
|PDF

19.


SOLAR OPERATED PESTICIDE SPRAYER  (Page: 122-126)
Pandurang Lad, Virendra Patil , Prashant Patil Tushar Pati, Pravin Patil
|PDF

20.


LAYERS BASED SECURITY ISSUES IN CLOUD COMPUTING   (Page: 127-133)
John Jeya Singh.T, Dr E.Baburaj
|PDF

21.


SECURING DOCUMENT IMAGES USING SECRET SHARING  (Page: 134-139)
Manjusha R. Gaikkwad, Dr. Savita R. Bhosale
|PDF

22.


ANALYSIS OF SATELLITE IMAGES USING DISCRETE WAVELET TRANSFORM FOR BETTER PSNR VALUE  (Page: 140-146)
S.Kannadhasan , K.Venmathi
|PDF

23.


COLLATION OF SECURITY FOR ASSORTED ATTACKS IN WIRELESS SENSOR NETWORKS  (Page: 147-156)
R.M.Dilip Charaan, Dr.R.Ramesh
|PDF

24.


SPAM FILTERING IN MACHINE LEARNING ? A SURVEY   (Page: 157-163)
N.Vijayalakshmi, Dr.P.Vivekanandan, P.Malathi,E.Sivajothi
|PDF

25.


NEUTROSOPHIC LOGIC BASED INCONSISTENT RELATIONAL DATABASE FOR NORMALIZING DATA AND ACCURATE DECISION  (Page: 164-170)
Soumitra De
|PDF

26.


ANALYSIS OF ANNULAR RING SLOT MICROSTRIP ANTENNA FOR MULTIBAND OPERATION   (Page: 171-175)
Alpana Singh, RitikaTandon, Saurabh Khanna
|PDF

27.


A COMPARATIVE STUDY OF CONTENT MANAGEMENT SYSTEMS: JOOMLA, DRUPAL AND WORDPRESS   (Page: 176-183)
R N Sheokand, Vinay
|PDF

28.


STUDY OF CONTENT MANAGEMENT SYSTEM : JOOMLA  (Page: 184-190)
Vinay, R N Sheokand
|PDF

29.


ENERGY CONSERVATION IN INDUCTION FURNACE: A REVIEW  (Page: 191-196)
Rakesh S. Ambade, Bhushan P. Sonkusale, Aditya A. Bhave, Diksha S. Rangari, Yashashree P. Rangari
|PDF

30.


ANALYSIS BASED ON STATISTICS AND HISTOGRAM OF EDGE DETECTION TECHNIQUES  (Page: 197-204)
Toshi Patel, Dimpy Singh, Modassir Anis
|PDF

31.


AN EFFICIENT MECHANISM TO PROTECT CLOUD FROM INTERNET ATTACKS  (Page: 205-214)
Lokashree S , Lokana S , Dr.M V Sathyanarayana
|PDF

32.


DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA USING MULTI-CLOUD STORAGE  (Page: 215-222)
S. Thirumurugan, S. Vignesh
|PDF

33.


CATEGORIZING THE RISK LEVEL OF AUTISTIC CHILDREN USING DATA MINING TECHNIQUES  (Page: 223-230)
Mohana E, Poonkuzhali.S
|PDF

34.


BLUE EYES TECHNOLOGY  (Page: 231-238)
Swati
|PDF

35.


?ONE-STEPSECANT? A GEOMETRICAL SHAPE RECOGNITION ALGORITH   (Page: 239-248)
Anjali Gangwar, Amrita Kaur, Deep Kumar Sharma
|PDF

36.


TRIBOLOGICAL INVESTIGATION OF DETONATION SPRAYED Al2O3, Al2O3-3TiO2 AND Al2O3-13TiO2 COATINGS ON GREY CAST IRON TO ENHANCE ITS WEAR RESISTANCE  (Page: 249-253)
Gobind, Jwala Parshad, Dr. NeelKanth Grover
|PDF

37.


DISTRIBUTED FIREWALL: A WAY OF DATA SECURITY IN LOCAL AREA NETWORK  (Page: 254-260)
Satinder, Vinay
|PDF

38.


PARTICLE FILTER APPLIED IN AIRCRAFT TRACKING SYSTEMS   (Page: 261-267)
Elanthamizhan.R , Deepan Raj.K, Selva Kumar.B, Karthikeyan.L.M
|PDF

39.


COLLABORATION IN MULTICLOUD COMPUTING ENVIRONMENTS: FRAMEWORK AND SECURITY ISSUES  (Page: 268-271)
Reshma Valishettar, Rameshkumar H K
|PDF

40.


STUDY OF SOLAR ENERGY & IT?S APPLICATION IN DAILY LIFE  (Page: 272-278)
Chandan Sharma, Shailendra Kumar Bohidar, Prakash Kumar Sen
|PDF

41.


SURVEY ON SMART GRID SECURITY: THREATS, CHALLENGES AND AUTHENTICATION MECHANISM  (Page: 279-287)
Prof. Pavan D.Mahendarkar, Adiba Maniyar
|PDF

42.


SECURITY WITH WHITE BOX CRYPTOGRAPHY  (Page: 288-292)
Asmita, Ankush
|PDF

43.


EFFICIENT CLASSIFIER FOR PREDICTING STUDENTS KNOWLEDGE LEVEL USING DATA MINING TECHNIQUES  (Page: 293-300)
S.Visalaxi, S.Usha, S.Poonkuzhali
|PDF

44.


NUMERICAL ANALYSIS OF HEAT DISSIPATION OF RECTANGULAR HEAT SINK UNDER NATURAL CONVECTION WITH ORIENTATION EFFECTS  (Page: 301-309)
Prashant Rathod, Hanoca.P.
|PDF

45.


PRIORITIZATION OF MULTIFACETED CRITERIA FOR THE DIFFERENT CO2 REMOVAL TECHNOLOGIES FROM BIOGAS USING ANALYTICAL HIERARCHICAL PROCESS  (Page: 310-320)
Sudeep Yadav, Amitabh K. Srivatava, R.S.Singh
|PDF

46.


IMPROVED METHOD FOR GENDER CLASSIFICATION USING FINGERPRINT  (Page: 321-324)
Shreejith K B, Dr. Mohammed Rafi
|PDF

47.


SURVEY ON SELF-RECONFIGURATION IN CYBER-PHYSICAL SYSTEMS  (Page: 325-332)
Tarannum Kumasgi, Prof. Kiran Patil
|PDF

48.


DESIGN AND PERFORMANCE ANALYSIS OF TRAIN CONTROL SYSTEM WITH AND WITHOUT CO-OPERATIVE RELAYING USING LINK BREAKAGE  (Page: 333-337)
D.K.Harish, Dr.M.Arun
|PDF

49.


PERFORMANCE OF ROUTING PROTOCOLS IN VEHICULAR NETWORKS BY THE VERTICAL HANDOFF STRATEGIES  (Page: 338-344)
N.N.V.R.K.Dinesh, Suresh Nuthalapati
|PDF

50.


SICKLE CELL DETECTION USING MARKER-CONTROLLED WATERSHED SEGMENTATION  (Page: 345-348)
Manjula S, Rashmi M.J and Varsha.D
|PDF

51.


A STUDY OF DOS ATTACKS IN MANET  (Page: 349-353)
Prof. Ajay Kumar Patel
|PDF

52.


ACOUSTIC ECHO CANCELLATION BY USING NPVSS NLMS-UM CASE  (Page: 354-360)
Deman Kosale, H.R. Suryawanshi, V.K. Dwivedi
|PDF

53.


FACE RECOGNITION USING NEURAL NETWORK WITH PCA-MBP ALGORITHM  (Page: 361-367)
Sanjay Singh, Nitin Kumar, Dayashankar Singh
|PDF

54.


BEHAVIOR OF PUMICE LIGHTWEIGHT CONCRETE   (Page: 368-374)
N.Venkata Ramana
|PDF

55.


IMPLEMENTATION OF IRIS RECOGNITION USING FUSION OF HOMOGENEOUS FEATURES  (Page: 375-380)
Deepika R, Vibha S Rao, Prasad M R
|PDF

56.


SURVEY ON CAPTCHA-A NEW WAY OF GRAPHICAL SECURITY  (Page: 381-385)
Priyanka Sajjan , Prof.Santosh S.Dewar
|PDF

57.


A REVIEW ON BAYESIAN NETWORK TECHNIQUES FOR INFERRING GENE REGULATORY NETWORKS  (Page: 386-391)
Paras Bansal, Shailendra Singh, Abhishek
|PDF

58.


HOMOMORPHIC CRYTOGRAPHY DEVELOPMENT USING SCHEMES  (Page: 392-396)
Priyanka, Dinesh
|PDF

59.


2D FIR FILTER BASED EDGE DETECTION OF ANGIOGRAM IMAGES  (Page: 397-403)
J.Swetha , P. Ganesh Kumar,
|PDF

60.


IMPACTS OF CLOUD COMPUTING ON E-COMMERCE BUSINESSES IN INDIA   (Page: 404-411)
Satinder , Niharika
|PDF

61.


STUDY OF CONTENT MANAGEMENT SYSTEM: WORDPRESS  (Page: 412-416)
Vinay , Satinder
|PDF

62.


SOCIAL MOBILITY ANALYTICS CLOUD (SMAC): AN OVERVIEW AND ITS IMPACTS ON SOCIETY  (Page: 417-422)
Dr. AnamikaBhargava, Aruna Verma, Satinder
|PDF

63.


A STUDY OF MACHINE TRANSLATION METHODS AND THEIR CHALLENGES  (Page: 423-429)
Anand Ballabh, Dr. Umesh Chandra Jaiswal
|PDF

64.


SURVING SELF LOADING VIDEO COMPOSITION  (Page: 430-438)
T.Dhanabalan, S. Suresh
|PDF

65.


A FRAMEWORK FOR PRECISE RECOGNITION OF INDIAN PAPER CURRENCY NOTE FOR VISUALLY IMPAIRED USERS  (Page: 439-449)
Aruna D H, Manpreet Bagga, Dr Baljeet Singh
|PDF

66.


IMPROVING TRAFFIC MANAGEMENT USING GENETIC ALGORITHMS AND ANT COLONY OPTIMIZATION METHODS  (Page: 450-457)
Sankar. A, Vijay Sekar. E, M. Yamuna
|PDF

67.


OZONE SIMULATIONS FOR HGB AREA USING DIFFERENT CHEMICAL MECHANISMS WITHCAMX  (Page: 458-465)
Samarita Sarker, Raghava R. Kommalapati, Ziaul Huque
|PDF

68.


ENHANCED SECURE FRAMEWORK FOR HETEROGENEOUS WIRELESS SENSOR NETWORK  (Page: 466-472)
Ms. Varsha Buktare and Dr. Savita R. Bhosale
|PDF

69.


A NOVEL APPROACH FOR IMPROVING TCP CONGESTION RESPONSE IN PACKET REORDERING SCENARIO USING DCR  (Page: 473-479)
Vivek Kumar Kushwaha, K Vinay Kumar
|PDF

70.


SECURING CLOUD DATA USING CRYPTOGRAPHY  (Page: 480-486)
M.Janaki, Dr.M.Ganaga Durga
|PDF

71.


THE INFLUENCE OF SOCIAL MEDIA ON INDIAN STUDENTS AND TEENAGERS  (Page: 487-493)
Kavita
|PDF

72.


REVIEW ON RENDERING RIGID SHADOWS USING HYBRID ALGORITHM  (Page: 494-502)
Nitin Kumar, Sugandha Aggarwal, Rashmi Dubey
|PDF

73.


EFFECT OF PROCESS PARAMETERS ON FRICTION STIR WELDED AA 6061 ALUMINUM ALLOY BUTT JOINTS.  (Page: 503-519)
P.Srinivasulu, Dr.G. Krishnamohan Rao, M.Satyanaraya Guptha
|PDF

74.


A MULTI LAYER AUTHENTICATION APPROACH FOR ROUTING IN MESH NETWORKS  (Page: 520-530)
P.Ramya, A.Komathi
|PDF

75.


STUDY OF VARIOUS NETWORK TYPE SECURITY PROTOCOLS  (Page: 531-543)
Sudhakar Singh, P.K. Khare, Prashant Mor
|PDF

76.


HIDING THE DATA USING STEGANOGRAPHY WITH DIGITAL WATERMARKING  (Page: 544-548)
G.Thirumani Aatthi, A.Komathi
|PDF

77.


SURVEY ON DIGITAL WATERMARKING TECHNIQUES  (Page: 549-553)
Rutuja Sonar, Shivaputra S. Panchal
|PDF

78.


DYNAMIC ALGORITHM IN MOBILE AD-HOC NETWORKFOR SAVING ENERGY CONSUMPTION  (Page: 554-561)
Rajesh Shrivastava, Agnivesh Kumar Agnihotri, Omanand Tiwari
|PDF

79.


ADVANCE TEXT AND COLOR BASED SESSION PASSWORD SECURITY RESISTANT TO SHOULDER SURFING, KEY LOGGER AND MOUSE TRACKER SPYWARE  (Page: 562-568)
Ms. Kiran P.Lokhande, Prof.Sonal Honale
|PDF

80.


INNOVATIVE WAYS OF DATA MANAGEMENT THROUGH CLOUD COMPUTING  (Page: 569-572)
Praveen Kumar Shrivastava Dr. S.M.Ghosh Vibha Sahu
|PDF

81.


AN ENHANCED DETECTION OF MASKED REPLICATION ATTACK IN WIRELESS SENSOR NETWORKS  (Page: 573-581)
Somesh Pal , K. Vinay Kumar
|PDF

82.


PARALLEL OPTIMIZED LIVE VM MIGRATION   (Page: 582-594)
Jayasree P, Meenakshi Sharma
|PDF

83.


TO STUDY LMS & NLMS ALGORITHM FOR ADAPTIVE ECHO CANCELLATION   (Page: 595-600)
Sandip A. Zade , Prof. Sameena Zafar
|PDF

84.


A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA  (Page: 601-606)
U.Pandi Priya, R.Padma Priya
|PDF

85.


CYBER TERRORISM  (Page: 607-613)
Bhawana
|PDF

86.


IDENTIFICATION OF FACTORS IN IMPLEMENTATION OF QUALITY CIRCLE  (Page: 614-618)
Ajay Kalirawna , Rajesh Attri, Nikhil Dev
|PDF

87.


IDENTIFICATION OF BARRIERS AFFECTING IMPLEMENTATION OF 5S  (Page: 619-624)
Sunil Mehra, Rajesh attri, Bhupender Singh
|PDF

88.


INTERNET OF THINGS: OPPORTUNITIES AND CHALLENGES  (Page: 625-628)
Madhavi Dhingra
|PDF

89.


SURVEY ON AMES: ADAPTIVE MOBILE VIDEO STREAMING AND EFFICIENT SOCIAL VIDEO SHARING IN THE CLOUDS  (Page: 629-634)
Laxmi Sharma, Laxmi Shabadi
|PDF

90.


COMMUNITY DETECTION IN SOCIAL NETWORKS USING EXTENDED SELF ORGANIZING MAP ALGORITHM  (Page: 635-642)
Harish Kumar Shakya, Kuldeep singh, Bhaskar Biswas
|PDF

91.


DISTRIBUTED RESTRAINING MALWARE PROPAGATION IN MOBILE SINK ROUTING FOR WIRELESS SENSOR NETWORKS  (Page: 643-647)
M.Sindhuja, A.Komathi
|PDF

92.


WAVELET TRANSFORMATION OVER FOURIER TRANSFORMATION  (Page: 648-651)
Anita, Sanjay, Seema, Shashank, Pratibha Bharti, Dr.Prof.K.K Saini
|PDF

93.


IMPROVED ACCURACY FOR FACIAL FEATURE POINT DETECTION AND FACIAL EXPRESSION RECOGNITION  (Page: 652-658)
V.P. Lakshmi, Dr. P. Marikkannu
|PDF

94.


CLOUD COMPUTING IN HIGHER EDUCATION: OPPORTUNITIES, CHALLENGES AND COUNTER MEASURES  (Page: 659-668)
Meenaakshi N. Munjal
|PDF

95.


VARIOUS WAVELET ALGORITHMS FOR IRIS RECOGNITION  (Page: 669-672)
R.Subha, Dr. M.Pushparani
|PDF

96.


SECURITY ANALYSIS OF NETWORK PROTOCOLS  (Page: 673-677)
Kamlesh, Puneet Rani
|PDF

97.


EXPERIMENTAL ANALYSIS FOR EFFICIENCY OF BIOMASS GASIFIER ON MOISTURE CONTENT  (Page: 678-682)
Venda Prasad Maurya, Anshu, Kunwer Sandeep Singh
|PDF

98.


CLOUD COMPUTING: SECURITY ISSUES AND SECURITY MEASURES  (Page: 683-690)
Disha Bhatnagar, Rajkumar Singh Rathore
|PDF

99.


SURVEY PAPER ON CLOUD COMPUTING  (Page: 691-696)
Kalpana Tiwari, Er. Sachin Chaudhary, Er. Kumar Shanu
|PDF

100.


GREEN COMPUTING: AN EXPLORATION OF APPROACHES & IMPLEMENTATIONS  (Page: 697-702)
Farzana Parveen, Rahul Singh, Preeti Singh
|PDF