Copyright © 2017- International Journal for Research in Emerging Science and Technology. All Rights Reserved.

Exploring Research and Innovation....
Volume-2 Special Issue-1, March-2015, MEDHA-2015
Title: VULNERABILITY MANAGEMENT IN WEB APPLICATION
Authors: Prof. Amit R. Wasukar, Mohammad Usman and Neha Sakhare
Page: 579-585
Title: Secure Graphical Password based on Hard AI Problem
Authors: Snehal Rajole, Bharati Aware and Swapnil More
Page: 586-589
Title: A Survey Paper on Fault Node Recovery Schemes in Wireless Sensor Network
Authors: Swapnil D. Jadhav and Pavan N. Mundhare
Page: 590-595
Title: Emotion Recognition through Voice Signal using Support Vector Machine
Authors: Akshay S. Utane, Vaibhav J. Babrekar and Ashay I. Rokade
Page: 596-602
Title: Detection of Spoofing Attacks and Data Protection in Wireless Sensor Network: A Review
Authors: Poonam Vinod Wankhade and Prof. Yogesh Bhute
Page: 603-605
Title: Survey on Blur Face Recognition Techniques
Authors: Miss. A. D. Kandelkar and Prof.P.A. Tijare
Page: 606-609
Title: Algebraic Signature for Remote Data Possession Checking in Cloud Storage
Authors: Prof. Sayali M. Jawake, Prof. Monica R. Dhawale and Prof. Mayuri P. Kawalkar
Page: 610-615
Title: An Overview about different Challenges and Security Issues in Wireless Network
Authors: Priyanka M. Lokhande, Shradha A. Thakare and Snehal P. Deulkar
Page: 616-621
Title: A Survey on a novel entropic thresholding technique for Diagnostic Analysis of Microcirculatory Images
Authors: Ms. Pallavi A. Chaudhari and Ms. Pragati Patil
Page: 622-633
Title: Internet of Things: A survey
Authors: Miss. Pooja S. Jadhav and Prof. Prasad P. Lokulwar
Page: 634-640
TitleReview on Open Source Tool: WEKA
Authors: Miss. Pooja P Rathod, Miss. Pooja P Parekar and Prof. Suraj G. Gupta
Page: 641-646