Copyright © 2017- International Journal for Research in Emerging Science and Technology. All Rights Reserved.

Exploring Research and Innovation....


hit counter html

Started from Apr 2015


Volume-2 Special Issue-1, March-2015, MEDHA-2015

Title:  VULNERABILITY MANAGEMENT IN WEB APPLICATION       

Authors: Prof. Amit R. Wasukar, Mohammad Usman and Neha Sakhare 

Page:  579-585

1

2

3

4

5

6

7

8

9

10

Title:  Secure Graphical Password based on Hard AI Problem      

Authors: Snehal Rajole, Bharati Aware and Swapnil More  
Page:  586-589

Title:  A Survey Paper on Fault Node Recovery Schemes in Wireless Sensor Network   

Authors: Swapnil D. Jadhav and Pavan N. Mundhare   
Page:  590-595

Title:  Emotion Recognition through Voice Signal using Support Vector Machine    

Authors: Akshay S. Utane, Vaibhav J. Babrekar and Ashay I. Rokade  
Page:  596-602

Title:  Detection of Spoofing Attacks and Data Protection in Wireless Sensor Network: A Review  

Authors: Poonam Vinod Wankhade and Prof. Yogesh Bhute  

Page:  603-605

Title:  Survey on Blur Face Recognition Techniques       

Authors: Miss. A. D. Kandelkar and Prof.P.A. Tijare  
Page:  606-609

Title:  Algebraic Signature for Remote Data Possession Checking in Cloud Storage   

Authors: Prof. Sayali M. Jawake, Prof. Monica R. Dhawale and Prof. Mayuri P. Kawalkar 

Page:  610-615

Title:  An Overview about different Challenges and Security Issues in Wireless Network   

Authors: Priyanka M. Lokhande, Shradha A. Thakare and Snehal P. Deulkar 
Page:  616-621

Title:  A Survey on a novel entropic thresholding technique for Diagnostic Analysis of Microcirculatory Images  

Authors: Ms. Pallavi A. Chaudhari and Ms. Pragati Patil 
Page:  622-633

11

Title:  Internet of Things: A survey         

Authors: Miss. Pooja S. Jadhav   and Prof. Prasad P. Lokulwar 
Page:  634-640

TitleReview on Open Source Tool: WEKA
Authors: Miss. Pooja P Rathod, Miss. Pooja P Parekar and Prof. Suraj G. Gupta    

Page:  641-646