High Impact Factor : 4.396 icon | Submit Manuscript Online icon | UGC Approved icon

Conference : NCACSET 2017


No. Title and Author Area Country Page
1 Design and Simulation of Multilayer Microstrip to Stripline transition on LTCC for 20GHz frequency range application
-Rahulkumar Agrawal ; PRIYANKA SHAH;
India
1-3
2 An Approach for Security Information and Event Management with Hadoop MapReduce
-Anand Mehta ; Anand Mehta; Manish Abhishek
India
4-7
3 Improvement in Resource Optimization of Composite SaaS using Genetic Algorithm
-Sejal Sirsikar ; Hiren R. Patel
India
8-10
4 A Survey of Identification of Plant Disease Using Image Processing Techniques and Chameleon Clustering Method
-Shailja Maniya
India
11-14
5 CROP HEALTH MONITORING INFORMATICS SYSTEM BASED ON IOT
-ANKITKUMAR MISHRA ; ADARSH PARIKH;
India
15-20
6 NEXT GENRATION DATA STORAGE (DNA) BHATT
-PRANJAL BHATT
India
21-25
7 A Novel Approach to Recognize Handwritten Gujarati Digits
-Kamal Galdhariya ; Khushali Raval; Shardul Agravat
India
26-29
8 THREAT DETECTION BY DEPLOYING DARKNET
-Reena Aparnathi ; Dr.Vandana Rohokale;
India
30-33
9 Blur Estimation and Identification of Degraded Images
-MONIKA MARU ; MEHUL PARIKH;
India
34-38
10 SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
-Pooja Bavarva ; Yash Punjabi; Rushabh Raolji
India
39-45
11 Intrusion Detection and Prevention in Internet of Things
-Maulik Bhensdadia ; Aditya Kumar Sinha; Gardas Naresh Kumar
India
46-50
12 Security Mechanism for Home Area Network (HAN) in Smart Grid
-Bhargav Rathod ; Dr. Vandana Rohokale; Mr.Naresh Gardas
India
51-58
13 An Optimized Task Scheduling Algorithm in Cloud Computing
-Shrinidhikumari Chaudhari ; Chirag Thaker; Bhavesh Borisaniya
India
59-63
14 Data Storage Security Model using Homomorphic Encryption
-BANSHRI MODHIYA ; Dr.chirag Thakur; Dr.Bhavesh Barisaniya
India
64-67
15 Execution Time Enhancement Through Efficient Task Scheduling Algorithm in Cloud Computing Environment
-Shital Sharma ; Dr, Chirag Thaker;
India
68-72
16 Test Harness for Web Application Attacks
-Kishan Chudasama ; Girish Khilari;
India
73-77
17 Enhancing Selection of Load Balancing Algorithms Dynamically in Cloud Computing
-Satvik Khara ; Umang Thakkar;
India
78-82
18 CLOUD COMPUTING: OPPORTUNITIES IN E-GOVERNANCE PARADIGM
-Niharika Dhandhukiya ; Niharika Dhandhukiya Niharika Dhandhukiya; Aradhna Deshmukh
India
83-86
19 Comparative Study of Different Data Formats for IoT
-Pooja Parmar ; Pooja Parmar; Tushar Champaneria
India
87-89
20 Survey of Various Filtering Methods for Sensor Data
-SUMIT SHUKLA ; TUSHAR CHAMPANERIA;
India
90-92
21 Serendipitous Bookmark Recommendations in a Social Bookmarking System using Behavioral Data Mining
-Hiral Patel ; Hiral Patel; Shital Solanki
India
93-96
22 Semantic Web based Information Extraction
-NIMESHKUMAR PATEL ; Sanjay Shah;
India
97-101
23 A Survey on Tools & Techniques for the Implementation of Ion-Exchange Chromatography
-HEMANG VAIDYA ; Manan Shah;
India
102-106
24 A Novel Approach for solving Matrix Chain Product
-Rajeshkumar Pradhan ; Rajeshkumar Pradhan; Sanjay Shah
India
107-111
25 Notorious ways of exploitation search engine
-SOHESH DOSHI ; Meet Gadhiya; SANKET SUTHAR
India
112-116
26 Survey On Route Optimization for Mobile IP
-BHAVIN FATANIYA ; BHAVIN FATANIYA; CHIRAG RAVAT
India
117-124
27 Google Material Design - The User Interface Development Notion
-Rashi Desai ; Rashi Desai
India
125-127
28 Performance of different equalizers in MIMO - VLC
-Pratik Panchal ; Pratik Panchal; Usha Neelkantan
India
128-132
29 GLIMPSE ON VARIOUS KINDS OF SECURITY THREATS
-Bhumita Panara ; Arpan Patel
India
133-135
30 Offline Handwritten Character Recognition for Gujarati Language
-sumit trivedi ; arun nandurbarkar;
India
136-139
31 Content Based Image Retrieval for Diagnosis of Brain Tumor
-Dhruvisha Patel ; Dhruvisha Patel; Arun Nandurbarkar
India
140-144
32 Design of Frequency Multiplier at 120 GHz for Sub-Millimeter Wave LO Development
-Dhruvi Prajapati ; Dhruvi Prajapati; Usha Neelkantan
India
145-149
33 A Survey on Characteristic Performance on DTNs Protocols
-Pooja Patel ; Pooja Patel; Dhaval Parikh
India
150-154
34 Maintain CIA of internal network in IoT
-Bhavisha Shah ; Aditya kumar Sinha; Vineeta Tiwari
India
155-159
35 UVM Based Verification Environment for Performance Evaluation of DDR4 SDRAM using Memory Controller
-Nausha Kotia ; Prashant Karandikar;
India
160-165
36 BASICS OF AES ALONG WITH NEWLY DERIVED ENCRYPTION LOGICS
-Bhumita Panara ; Arpan Patel;
India
166-170
37 An Effective Way to Handle Failover in Client-Server Architecture
-Jay Raval ; Ravi Raval;
India
171-175
38 A Novel Approach for Image Segmentation based on Histograms computed from Hue-data
-Viraj Mavani ; Ayesha Gurnani; Jhanvi Shah
India
176-179
39 A Hybrid approach for Optical Character Verification
-HIRAL MODI ; MEHUL PARIKH;
India
180-184
40 Human Detection for Night Surveillance using Adaptive Background Subtracted Image
-Yash Khandhediya ; Karishma Sav; Vandit Gajjar
India
185-189
41 Performance Evaluation of Massive MIMO in terms of capacity
-Nikhil Chauhan ; NIKHIL CHAUHAN; KIRAN PARMAR
India
190-194
42 INSIDER ATTACK MITIGATION TECHNIQUE USING HYBRID SECURITY FRAMEWORK ON VANETS
-Dhaval Patel ; Vandana Rohokale;
India
195-199
43 Design of Automatic Pipette Controller
-Khalid Osman ; Adarsh Parikh
India
200-204
44 A Survey of Different Enhancements in Weighted PageRank Algorithm
-Chintan Agravat
India
205-208
45 REAL TIME COLOR SEGMENTATION AND COLOR FILTERATION
-VANDIT GAJJAR
India
209-211
46 Trust-Based Secure On-Demand Multipath Routing Scheme In MANET
-HETALBEN GEVARIYA ; DHAVAL PARIKH;
India
212-219
47 Window Function Analysis for Multi Carrier Transmission
-SAGAR KAVAIYA ; Prof.Usha Neelakantan;
India
220-224
IJSRD Call for Papers & International Journal of Science