Published: 2015-03-31

DOI: https://doi.org/10.65521/mjret.v2i2.991
DOI: https://doi.org/10.65521/mjret.v2i2.992

VAMPIRE ATTACKS: DETECTION AND ELIMINATION OF DISHONEST NODES IN SENSOR NETWORKS

H.K. Chaudhari, C.S. Jadhav, M.S. Kalane, V.K. Kulkarni

386 - 391

DOI: https://doi.org/10.65521/mjret.v2i2.993

DQF FOR LARGE VOLUME DATA

Uzma Kokalgave, Prof. Soumitra Das

403 - 407

DOI: https://doi.org/10.65521/mjret.v2i2.994

BEST SEARCH AND RETRIEVAL PERFORMANCE EVALUATION WITH LUCENE INDEXING

Sonam Baban Borhade, Prof. Pankaj Agarkar

408 - 418

DOI: https://doi.org/10.65521/mjret.v2i2.995
DOI: https://doi.org/10.65521/mjret.v2i2.996

LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT

Ms. Shilpa D. More, Prof. Arti Mohanpurkar

424 - 431

DOI: https://doi.org/10.65521/mjret.v2i2.997

E-REAL ESTATE WEBSITE

A.P. Chandulkar, A.A. Darekar, S.K. Nanekar, S.V. Pawar

447 - 452

DOI: https://doi.org/10.65521/mjret.v2i2.999

ERP SYSTEM FOR COLLEGE AUTOMATION USING RFID TAGS

Amritha Balachandran, Bharti Chauhan

437 - 446

DOI: https://doi.org/10.65521/mjret.v2i2.1000
DOI: https://doi.org/10.65521/mjret.v2i2.1002

FAULT NODE RECOVERY FOR A WIRELESS SENSOR NETWORK

M.D. Misal, V.A. Narke, S.P. Shinde, G.B. Zaware, Prof.S. Salve

476 - 479

DOI: https://doi.org/10.65521/mjret.v2i2.1003

DISTRIBUTED CO-OPERATIVE CACHING IN SOCIAL WIRELESS NETWORK (SWNET)

S. Inamke, V. Randhire, G. Lahare, N. Shejole

460 - 465

DOI: https://doi.org/10.65521/mjret.v2i2.1004

IMPLEMENTATION OF CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM-FAST

Vinod Wagh, Pankaj Bemberkar, Sonam Nikade, Mahendra Naradhania

453 - 459

DOI: https://doi.org/10.65521/mjret.v2i2.1005
DOI: https://doi.org/10.65521/mjret.v2i2.1006

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER)

Narendra Shewale, Sharad Hadke, Mayur Kharote

470 - 475

DOI: https://doi.org/10.65521/mjret.v2i2.1007

IMPROVING RESOURCE UTILIZATION IN INFRASTRUCTURAL CLOUD

Abhinav Awasthi, Rohan Patil, Magzina Pinto, Vikram Sagadevan

466 - 469

DOI: https://doi.org/10.65521/mjret.v2i2.1008

ATTRIBUTE BASED ENCRYPTION IN PERSONAL HEALTH RECORD

Sourabh S Bhendawade, Ajinkya R Ugale, Ravi S Kurade, Hrushikesh S Kate

486 - 491

DOI: https://doi.org/10.65521/mjret.v2i2.1009