No. |
Title and Author |
Area |
Country |
Page |
1 |
Design and Simulation of Multilayer Microstrip to Stripline transition on LTCC for 20GHz frequency range application
-Rahulkumar Agrawal ; PRIYANKA SHAH;
|
|
India |
1-3 |
2 |
An Approach for Security Information and Event Management with Hadoop MapReduce
-Anand Mehta ; Anand Mehta; Manish
Abhishek
|
|
India |
4-7 |
3 |
Improvement in Resource Optimization of Composite SaaS using Genetic Algorithm
-Sejal Sirsikar ; Hiren R. Patel
|
|
India |
8-10 |
4 |
A Survey of Identification of Plant Disease Using Image Processing Techniques and Chameleon Clustering Method
-Shailja Maniya
|
|
India |
11-14 |
5 |
CROP HEALTH MONITORING INFORMATICS SYSTEM BASED ON IOT
-ANKITKUMAR MISHRA ; ADARSH PARIKH;
|
|
India |
15-20 |
6 |
NEXT GENRATION DATA STORAGE (DNA) BHATT
-PRANJAL BHATT
|
|
India |
21-25 |
7 |
A Novel Approach to Recognize Handwritten Gujarati Digits
-Kamal Galdhariya ; Khushali Raval; Shardul
Agravat
|
|
India |
26-29 |
8 |
THREAT DETECTION BY DEPLOYING DARKNET
-Reena Aparnathi ; Dr.Vandana Rohokale;
|
|
India |
30-33 |
9 |
Blur Estimation and Identification of Degraded Images
-MONIKA MARU ; MEHUL PARIKH;
|
|
India |
34-38 |
10 |
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
-Pooja Bavarva ; Yash Punjabi; Rushabh
Raolji
|
|
India |
39-45 |
11 |
Intrusion Detection and Prevention in Internet of Things
-Maulik Bhensdadia ; Aditya Kumar Sinha; Gardas
Naresh Kumar
|
|
India |
46-50 |
12 |
Security Mechanism for Home Area Network (HAN) in Smart Grid
-Bhargav Rathod ; Dr. Vandana Rohokale; Mr.Naresh Gardas
|
|
India |
51-58 |
13 |
An Optimized Task Scheduling Algorithm in Cloud Computing
-Shrinidhikumari Chaudhari ; Chirag Thaker; Bhavesh
Borisaniya
|
|
India |
59-63 |
14 |
Data Storage Security Model using Homomorphic Encryption
-BANSHRI MODHIYA ; Dr.chirag Thakur; Dr.Bhavesh
Barisaniya
|
|
India |
64-67 |
15 |
Execution Time Enhancement Through Efficient Task Scheduling Algorithm in Cloud Computing Environment
-Shital Sharma ; Dr, Chirag Thaker;
|
|
India |
68-72 |
16 |
Test Harness for Web Application Attacks
-Kishan Chudasama ; Girish Khilari;
|
|
India |
73-77 |
17 |
Enhancing Selection of Load Balancing Algorithms Dynamically in Cloud Computing
-Satvik Khara ; Umang Thakkar;
|
|
India |
78-82 |
18 |
CLOUD COMPUTING: OPPORTUNITIES IN E-GOVERNANCE PARADIGM
-Niharika Dhandhukiya ; Niharika Dhandhukiya Niharika Dhandhukiya; Aradhna
Deshmukh
|
|
India |
83-86 |
19 |
Comparative Study of Different Data Formats for IoT
-Pooja Parmar ; Pooja Parmar; Tushar
Champaneria
|
|
India |
87-89 |
20 |
Survey of Various Filtering Methods for Sensor Data
-SUMIT SHUKLA ; TUSHAR CHAMPANERIA;
|
|
India |
90-92 |
21 |
Serendipitous Bookmark Recommendations in a Social Bookmarking System using Behavioral Data Mining
-Hiral Patel ; Hiral Patel; Shital
Solanki
|
|
India |
93-96 |
22 |
Semantic Web based Information Extraction
-NIMESHKUMAR PATEL ; Sanjay Shah;
|
|
India |
97-101 |
23 |
A Survey on Tools & Techniques for the Implementation of Ion-Exchange Chromatography
-HEMANG VAIDYA ; Manan Shah;
|
|
India |
102-106 |
24 |
A Novel Approach for solving Matrix Chain Product
-Rajeshkumar Pradhan ; Rajeshkumar Pradhan; Sanjay
Shah
|
|
India |
107-111 |
25 |
Notorious ways of exploitation search engine
-SOHESH DOSHI ; Meet Gadhiya; SANKET
SUTHAR
|
|
India |
112-116 |
26 |
Survey On Route Optimization for Mobile IP
-BHAVIN FATANIYA ; BHAVIN FATANIYA; CHIRAG
RAVAT
|
|
India |
117-124 |
27 |
Google Material Design - The User Interface Development Notion
-Rashi Desai ; Rashi Desai
|
|
India |
125-127 |
28 |
Performance of different equalizers in MIMO - VLC
-Pratik Panchal ; Pratik Panchal; Usha
Neelkantan
|
|
India |
128-132 |
29 |
GLIMPSE ON VARIOUS KINDS OF SECURITY THREATS
-Bhumita Panara ; Arpan Patel
|
|
India |
133-135 |
30 |
Offline Handwritten Character Recognition for Gujarati Language
-sumit trivedi ; arun nandurbarkar;
|
|
India |
136-139 |
31 |
Content Based Image Retrieval for Diagnosis of Brain Tumor
-Dhruvisha Patel ; Dhruvisha Patel; Arun
Nandurbarkar
|
|
India |
140-144 |
32 |
Design of Frequency Multiplier at 120 GHz for Sub-Millimeter Wave LO Development
-Dhruvi Prajapati ; Dhruvi Prajapati; Usha
Neelkantan
|
|
India |
145-149 |
33 |
A Survey on Characteristic Performance on DTNs Protocols
-Pooja Patel ; Pooja Patel; Dhaval
Parikh
|
|
India |
150-154 |
34 |
Maintain CIA of internal network in IoT
-Bhavisha Shah ; Aditya kumar Sinha; Vineeta
Tiwari
|
|
India |
155-159 |
35 |
UVM Based Verification Environment for Performance Evaluation of DDR4 SDRAM using Memory Controller
-Nausha Kotia ; Prashant Karandikar;
|
|
India |
160-165 |
36 |
BASICS OF AES ALONG WITH NEWLY DERIVED ENCRYPTION LOGICS
-Bhumita Panara ; Arpan Patel;
|
|
India |
166-170 |
37 |
An Effective Way to Handle Failover in Client-Server Architecture
-Jay Raval ; Ravi Raval;
|
|
India |
171-175 |
38 |
A Novel Approach for Image Segmentation based on Histograms computed from Hue-data
-Viraj Mavani ; Ayesha Gurnani; Jhanvi
Shah
|
|
India |
176-179 |
39 |
A Hybrid approach for Optical Character Verification
-HIRAL MODI ; MEHUL PARIKH;
|
|
India |
180-184 |
40 |
Human Detection for Night Surveillance using Adaptive Background Subtracted Image
-Yash Khandhediya ; Karishma Sav; Vandit
Gajjar
|
|
India |
185-189 |
41 |
Performance Evaluation of Massive MIMO in terms of capacity
-Nikhil Chauhan ; NIKHIL CHAUHAN; KIRAN
PARMAR
|
|
India |
190-194 |
42 |
INSIDER ATTACK MITIGATION TECHNIQUE USING HYBRID SECURITY FRAMEWORK ON VANETS
-Dhaval Patel ; Vandana Rohokale;
|
|
India |
195-199 |
43 |
Design of Automatic Pipette Controller
-Khalid Osman ; Adarsh Parikh
|
|
India |
200-204 |
44 |
A Survey of Different Enhancements in Weighted PageRank Algorithm
-Chintan Agravat
|
|
India |
205-208 |
45 |
REAL TIME COLOR SEGMENTATION AND COLOR FILTERATION
-VANDIT GAJJAR
|
|
India |
209-211 |
46 |
Trust-Based Secure On-Demand Multipath Routing Scheme In MANET
-HETALBEN GEVARIYA ; DHAVAL PARIKH;
|
|
India |
212-219 |
47 |
Window Function Analysis for Multi Carrier Transmission
-SAGAR KAVAIYA ; Prof.Usha Neelakantan;
|
|
India |
220-224 |