Published: 2015-09-30

ANDROID BASED METER READING USING OCR

Sonali Thonge, Vrushali Veer, Shobha Nale, Nayan Chondhe

631 - 635

DOI: https://doi.org/10.65521/mjret.v2i4.1039

TRUST MANAGEMENT IN P2P SYSTEMS USING SORT MODEL

Vaibhav Naik, Amol Gangawane, Sujit Mendhe, Vikas Kapre

642 - 647

DOI: https://doi.org/10.65521/mjret.v2i4.1042

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Maharudra V. Phalke, Atul D. Khude, Ganesh T. Bodkhe, Sudam A. Chole

648 - 657

DOI: https://doi.org/10.65521/mjret.v2i4.1043

A SECURE NFC APPLICATION FOR CREDIT TRANSFER USING MOBILE PHONES

Sanket Tadas, Abhishek Kuwad, Pankaj Thorat, Ajay Gunjal, Abhishek Kamble

636 - 641

DOI: https://doi.org/10.65521/mjret.v2i4.1047

POWER FACTOR CORRECTION FOR 1 PHASE INDUCTION MOTOR USING PLC

Sujit Desai, Nikhil Lalpurwala, Vinayak Salokhe

658 - 662

DOI: https://doi.org/10.65521/mjret.v2i4.1050

DYNAMIC LOAD BALANCING SCHEME FOR ITERATIVE APPLICATIONS

Rahul S. Wankhade, Darshan M. Marathe, Girish P. Nikam, Milind R. Jawale

663 - 668

DOI: https://doi.org/10.65521/mjret.v2i4.1051

ENABLING DYNAMIC DATA AND INDIRECT MUTUAL TRUST FOR STANDALONE STORAGE SYSTEM

Jayavant B. Somase, Om V. Kanade, Shivprasad R. Kankatte, Uddhav T. Kale

687 - 691

DOI: https://doi.org/10.65521/mjret.v2i4.1053

NEAR FIELD COMMUNICATION BASED ANDROID API HEALTHCARE SYSTEM

Bankar Kartik, Joshi Bhargav, Mungal Mahajan, Subhash Rathod

681 - 686

DOI: https://doi.org/10.65521/mjret.v2i4.1054

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Sudhanshi Sharma, Umesh Kumar

669 - 675

DOI: https://doi.org/10.65521/mjret.v2i4.1056

INFORMATION PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH FOR IMPROVING RETRIEVAL EFFECTIVENESS

Ravindra S Ambekar, Deepak D. Devde, Yoginath A Kasture, Bhushan M. More

676 - 680

DOI: https://doi.org/10.65521/mjret.v2i4.1064

TIMETABLE SCHEDULING USING GENETIC ALGORITHM

Prof. R.V. Dagade, Sayyad Shaha Hassan, Pratik Devhare, Srujan Khilar

692 - 696

DOI: https://doi.org/10.65521/mjret.v2i4.1066
DOI: https://doi.org/10.65521/mjret.v2i4.1069

KNOWLEDGE MANAGEMENT USED TO SUSTAIN FOR COMPETITIVE ADVANTAGE

Patil Nitin Yashwant, Dr. R.M. Warkhedkar

706 - 715

DOI: https://doi.org/10.65521/mjret.v2i4.1073

A SURVEY PAPER ON DATA LINEAGE IN MALICIOUS ENVIRONMENTS

Bhamare Ghanashyam, Desai Kiran, Khatal Supriya

720 - 724

DOI: https://doi.org/10.65521/mjret.v2i4.1075

NEED OF PRIVACY PRESERVATION IN CLOUD DATABASES

Niraja Jain, Dr B Raghu, Dr V Khanaa, Dr A V Deshpande

743 - 750

DOI: https://doi.org/10.65521/mjret.v2i4.1077

SMART AND SECURE PERSONALIZED WEB SEARCH

Avinash Gholap, Tushar Burde, Vikas Chaudhari, Nikhil Dalavi, Prof.Laxmi Madhuri

716 - 719

DOI: https://doi.org/10.65521/mjret.v2i4.1079

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA

Suryakant Kadam, Prof. Pankaj Agarkar

751 - 756

DOI: https://doi.org/10.65521/mjret.v2i4.1081

TO STUDY MULTI DIMENTIONAL TRUST BY DATA MINING E-COMMERCE FEEDBACK COMMENT SYSTEM

Suraj Gund, Akash Gaykwad, Akshada Patil, Payal Nikam, Prof. Pankaj Agarkar

762 - 767

DOI: https://doi.org/10.65521/mjret.v2i4.1083

REVIEW ON AUDITING OF DYNAMIC BIGDATA ON CLOUD WITH FINED GRAINED UPGRADES

Shubham Burghate, Akash Chourange, Rahul Ghyar, Akshay Dighe, Prof. Yogesh Thorat

737 - 742

DOI: https://doi.org/10.65521/mjret.v2i4.1102

MALWARE PROTECTION FOR EXTERNAL DEVICES

Shubham Bhasme, Swarupa Sathe, Ambar Lonkar, Prof.Laxmi Madhuri

757 - 761

DOI: https://doi.org/10.65521/mjret.v2i4.1106
DOI: https://doi.org/10.65521/mjret.v2i4.1109

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse

783 - 787

DOI: https://doi.org/10.65521/mjret.v2i4.1111

A SURVEY PAPER ON KEY AGGREGATE CRYPTO SYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE

Darekar Dnyaneshwar, Ghadge Sagar, Khetmalis Varsha, Choramale Rupali, Prof. Gunaware Nilesh.G

725 - 730

DOI: https://doi.org/10.65521/mjret.v2i4.1113

PERSON IDENTIFICATION USING IRIS RECOGNITION USING FASTEST SEARCHING ALGORITHM

Shivani Bakshi, Karishma Bavne, Ruchita Rahate, Madhuri Satare, Prof. Pankaj Agarkar

768 - 775

DOI: https://doi.org/10.65521/mjret.v2i4.1114

A SECURE MODEL FOR DETECTING ORIGIN FORGERY AND PACKET DROP ATTACKS IN WSN

Meghraj Kadam, Sagar Dakhore, Keshav Chavan, Amol Bandga, Prof.Mandar Mokashi

823 - 828

DOI: https://doi.org/10.65521/mjret.v2i4.1116

DETECTION OF PHISHING URL USING TEXT FEATURE EXTRACTION

Abhinav R. Jagtap, Mahesh s. Adhav, Harshad S. Phalak, Mayur D. Kadhane, Prof. Nitin Hambir

776 - 782

DOI: https://doi.org/10.65521/mjret.v2i4.1117

ENERGY-EFFICIENT CLUSTERING PROTOCOLS FOR WIRELESS SENSOR NETWORKS:A SURVEY

Prajakta Sutar, Anjali Patil, Sheetal Chouhan, Ashwini Raut, Prof.Soumitra Das

794 - 799

DOI: https://doi.org/10.65521/mjret.v2i4.1118

INFORMATION HIDING IN THE ENCRYPTED VIDEO STREAM BY CODE WORD

Jakhalekar Priyanka R, Prof. Pankaj Agarkar

800 - 805

DOI: https://doi.org/10.65521/mjret.v2i4.1119
DOI: https://doi.org/10.65521/mjret.v2i4.1171
DOI: https://doi.org/10.65521/mjret.v2i4.1173

AUTOMATIC WHITE BOARD ERASER

Ms.Jadhav Vaishali, Ms.Chavan Mukteshvar, Ms.Jadhav Dhammapooja, Ms.Waghmare Anita, Prof. Soumitra Das

812 - 816

DOI: https://doi.org/10.65521/mjret.v2i4.1178

ELIMINATE DUPLICATE URLs USING MULTIPLE ALIGNMENT OF SEQUENCES

Jayashri Waman, Prof. Pankaj Agarkar

806 - 811

DOI: https://doi.org/10.65521/mjret.v2i4.1180

A NEW ENERGY EFFICIENT VERTICAL HANDOVER ALGORITHM IN HETEROGENEOUS NETWORKS

Akanksha Bhalerao- Kulkarni, Prof. Soumitra Das

841 - 845

DOI: https://doi.org/10.65521/mjret.v2i4.1183
DOI: https://doi.org/10.65521/mjret.v2i4.1185
DOI: https://doi.org/10.65521/mjret.v2i4.1187

NEW OPINION MINING TECHNIQUE FOR ONLINE PRODUCT REVIEWS AND FEATURES

Miss Lovenika Kushwaha, Prof. Sunil Damodar Rathod

852 - 858

DOI: https://doi.org/10.65521/mjret.v2i4.1189
DOI: https://doi.org/10.65521/mjret.v2i4.1192