S.No. |
Title of Paper |
Page No. |
1. |
Group Signature Protocol Based on Collective Signature
Protocol and Masking Public Keys Mechanism
Authors: Nikolay Adreevich Moldovyan, Nguyen Hieu Minh, Dao Tuan Hung, Tran Xuan Kien |
1-5 |
2. |
Optimal Design of Structures by the Combined use of
Mathematical Models of Corrosion Destruction
Author: George Filatov |
6-15 |
3. |
Analysis of Glass Fiber Reinforced Structural Insulated Panels (GSIPs) Under High Velocity Impact Loading
Authors: Rahul Kalyankar, Nasim Uddin, Li Dong, Amol Vaidya |
16-27 |
4. |
Vibration Suppression of a Cantilever Beam Using Multi-Mode Dynamic Vibration Absorbers
Authors: Yohan Mendez, Sebastiao Cunha, Rogerio Coimbra, Haylemar Rodriguez |
28-38 |
5. |
The Impact of Location of the Uptake of Telephone Based Healthcare: A UK Case Study
Authors: Erica Cook, Gurch Randhawa, Andy Guppy, Angel Chater, Dong Pang, Shirley Large |
39-47 |
6. |
Gradual Trends of Groundwater Table Depletion with Relevant
Consequences on Water Quality in Dhaka City, Bangladesh
Authors: Md. Mahfujur Rahman, Nazia Nawrin, Mst. Maksuda Akter, Farha Khan, Shamina Nahar,
Md. Tariqul Islam |
48-56 |
7. |
Design and Implementation of a Low-Cost Wireless Platform for Remote Bridge Health Monitoring
Authors: Shraddha Pandey, Mohammad Haider, Nasim Uddin |
57-62 |
8. |
Biomimetics and Its Applications- A Review
Authors: Sheelratan S. Bansode, Rahul B. Hiremath, Somnath Kolgiri, Ranjitsinh A. Deshmukh |
63-72 |
9. |
Review on Optimization Methods for HVAC Systems
Authors: D. Jayakumar, Dr. D. B. Jabaraj |
73-76 |
10. |
Threat of Miscoordination between Recloser-Fuse in Radial
Distribution Networks during Multi DG Interconnections
Authors: Piyushkumar Dodiya, Pragnesh Shah, Ronak Doshi, Dhiraj Shrimali, Akash Faldu |
77-84 |
11. |
Translational attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT
Authors: Ayush Sharma, Dr. Surender Yadav |
85-91 |
12. |
Near Field Communication: A Survey
Authors: Suriya Begum, Rohit Mulay, Ashhar |
92-97 |
13. |
Impact Analysis of DDoS Attacks on Video Streaming Service
Authors: Daljeet Kaur, Monika Sachdeva, Rinkle Mehto |
98-102 |
14. |
To Study the Tripper Movement with VFD in A Coal
Handling Plant of A Coal Based Thermal Power Plant
Author: Niraj Kumar Sahu |
103-106 |
15. |
Routing Protocols to Defend Gray Hole Attacks: A Survey
Authors: Namrata Jain, Yogesh Rathore |
107-111 |
16. |
Validation and Modeling of FEA Welding Simulation and
Parametric Study of TIG Welding Parameter
Authors: Akash B. Chovatiya, P. M. Ravanan, H. S. Mahadik |
112-117 |
17. |
Automatic Vehicle Speed Monitoring Systems Using Networking Principles & Instrumentation Concepts
Authors: S. Vishal, S. Subramanian |
118-124 |
18. |
Review of Industrial Metrology using Machine Vision
Authors: Ketaki N. Joshi, Dr. Bhushan T. Patil |
125-131 |
19. |
Inverted Stud Configuration in Steel Composite Beams
Authors: Akshay Sukhwani, Atul Vaibhav, Shivang Pathak |
132-136 |
20. |
Low-Power High Speed 1-bit Full Adder Circuit Design
Authors: Rohit Tripati, Paresh Rawat |
137-142 |
21. |
Finite Element Discretization of Rivet Structure
Authors: Pravin M. Patil, Sharad Kachave, Ekanath R. Deore |
143-147 |
22. |
Post Tensioned Duct in Concrete May Be Provided by Chemical & Electrical Method in Pre-Stressing.
Authors: Pradeep Nath Mathur, Prof (Dr.) Om Prakesh Reddy, Prof (Dr.) A. K. Sinha |
148-154 |
23. |
Energy Efficient Drives for Industrial Applications
Authors: Rohit S. Agarwal, B.E Narkhede, Chetan S. Borkar |
155-161 |
24. |
Network Security by Proposed DML and a New Data-Length
Authentication Algorithm (DLAA)
Authors: Kiran Kant Priya, Taraun Kumar |
162-166 |
25. |
A Resourceful Technique for Virtual Machine
Migration in Fog Computing
Authors: Ambika Gupta, Manish Kumar Mukhija |
167-170 |
26. |
Data Retrieval with security for Decentralized Disruptiontolerant
Military Networks
Authors: Shradha A Dulange, Dr. Sujatha Terdal |
171-173 |
27. |
Cost Optimization of SPV System
Authors: Bhoomika Awasthi, Anurag Rai, N. K. Shukla |
174-180 |
28. |
FPGA Based Hybrid Power Supply System
Authors: Prashant R. Bhaskar, R. G. Dabhade |
181-183 |
29. |
Modelling and Analysis of a Mini Vertical Axis Wind Turbine
Authors: Amlan Das, Dr. Pradip Kumar Talapatra |
184-194 |
30. |
Code Generation Tool (CGT) and LDAP Integration
Authors: Kavita Arakeri, Prof. Santosh Bandak |
195-198 |
31. |
Influence of Fibre Size on the Compressive Strength of Ultra-High Performance Concrete
Authors: Karim, F.R., Abu Bakar, B.H., Kok Keong, Choong , Aziz, O.Q. |
199-204 |
32. |
Improvement in Security of Wimax using OFDM Technique
Author: Himani Rao |
204-209 |
33. |
Data Hiding with Cryptography and Steganography
Author: Meena kumari |
210-213 |
34. |
Comparative Study of Resource Managing Algorithms in Cloud Computing
Authors: P. K. Suri, Sunita Rani |
210-220 |
35. |
Natural Computing Algorithms – A Survey
Authors: Bharat V. Chawda, Dr. Jayeshkumar Madhubhai Patel |
221-227 |
36. |
Comparision between Rectangular Patch Antenna and
Concentric Equilateral Triangular Patch Antenna Using
Microstrip Feed for Wireless Applications
Authors: A. Manikandan, Dr. S. Uma Maheswari |
221-231 |
37. |
Observer Based Nonlinear Control of Robotic Manipulator
Using Backstepping Approach
Authors: Vishakha Jalaik, B. B. Sharma |
232-239 |
38. |
Design and Analysis of an Ultra Low Power Clocked
Regenerative Comparator
Authors: Avinash Kumar, Navneet Kaur |
240-246 |
39. |
A New Charecterization of Bounded Linear Operators on A Hilbert Space
Authors: U. K. Srivastava, A. U. Talukdar, Md. Shahabuddin, A. S.Pandit |
247-251 |
40. |
An Enhanced Detection of Remote Code Execution Vulnerability: on the JavaScript-to-Java Interface
Authors: Rachana Kamble , Dr. Amit Yadav |
251-257 |