RTIT
this site the web

Selected Papers

These papers are been selected by our review commitee members:-

1. Software Testing: The Final Step in Software Engineering - A. Tiwari, P. Diwan, A.Shrivastava

2. THE ROLE OF DIGITAL SIGNAL PROCESSORS - Shivi Chaturvedi

3. SECURITY PROTOCOL FOR SENSOR NETWORKS(SPINS) - VIDYA KADAM

4. COMPERITIVE STUDY: THE PULL-PUSH ALGORITHM - Preeti Diwan, Diwakar Singh, Anshu Shivastava, Anju Singh, Amit Tiwari.

5. Computation of Order Statistics of Nakagami-m fading channel - Keerti Tiwari, Anjana Jain

6. American sign language recognition through hand gesture - Nayan Baseshankar, Parul Shukla, Shruti Sinha, Mrunal Bodele.

7. Reducing blocking artifacts using denoising algorithm with shape adaptive DCT in color images- C.S.Rawat, Dr. S Meher.

8. AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETs - Ashish Kumar, Vidya Kadam, Shital Pawar, Subodh Kumar.

9. Impact of Nano Technology on Humans and Environment - Chandrabhan prajapati, R.P. Kori.

10. Gesture Based Interaction: A review - Anupma Yadav, Neeraj Verma.

11. Business Analytics & Intelligent Agents as Data Mining Tools in Knowledge Management - Lavneet Singh, Savleen Singh.

12. DETECTING PHISHING WEBPAGES WITH VISUAL SIMILARITYASSESSMENT BASED ON EARTH MOVERS DISTANCE - Y.B.N.SINDHU, CH.LALITHA, P.LEELA KRISHNA, N.KINNERA.

13. 2D APPROACH ON DYNAMIC CPU SCHEDULING IN REAL–TIME DATABASE SYSTEM- N Ghodichor, Nitin J. Janwe, S.S.Patil.

14. EBG Substrates for Enhancing Microstrip Patch Antenna Performance - Harish Kumar Mishra, Dr.R.L.Yadava, Dr.R.K.Jately.

15. PROTECTION OF DATABASE SECURITY VIACOLLABORATIVE INFERENCE DETECTION- A. Manasa, Ch.Anusha, G. N. Sukanya, D. Ujwala Poornima.

16. A Routing Protocol for Lifetime Maximization of Mobile Ad Hoc Network - Pooja Sharma, Pawan Bhadana.

17. On The Feasibility of a New Defense Layer ForWireless Sensor Networks Using RF Ranging- P.Aslesha, P.L.Madhuri, M.Ancy, M.Nancy.

18. Comparative Analysis of High Speed Logic Design Style- Er.Sailesh Singh Chouhan, Er. Payal Soni.

19. Digital Image Compression Techniques- Chesta Jain, Vijay Chaudhary.

20. Computation of Order Statistics of Nakagami-m fading channel- Keerti Tiwari, Anjana Jain.

21. Mining FIS in Association Rule Algorithm: Modified Apriori- Anshu Shrivastava, Prof. Diwakar Singh, Preeti Diwan, Amit Tiwari.

22. MULTIPLE ROOT MODEL OF TREE BASICALLY CONSTRUCTED BY FOREST (a disjoint set of trees)- Mayank sharma.

23. Nano Machines: The Dream of Future - Chandrabhan prajapati, R.P. Kori.

24. New Design an Aspect of Multilingual Document Editor - Dr. W.U. Khan, Kalpna Dhurve.

25. Robotics & Industrial Automation - Soni Changlani.

26. CHANNEL ALLOCATION SCHEMES FOR CELLULAR NETWORKS - Shivi Chaturvedi,
Poonam Sharma.

27. Cloud Computing- Preeti Bhardwaj.

28. COMPERITIVE STUDY: THE PULL-PUSH ALGORITHM- Preeti Diwan, Diwakar Singh,
Anju Singh, Anshu Shivastava, Amit Tiwari.

29. Network Security and cryptography- Manish Sethiya.

30. Security Constrained Optimal Power Flow and Pollution ControlBy Swarm Intelligence in Interconnected Power System - K.K.Swarnkar, Dr.S.Wadhwani and Dr.A.K.Wadhwani.

31. TURBO CODING FOR 4G SYSTEMS: DESIGN ISSUES AND
SOLUTIONS - Renu Tomar.

32. Reasoning in machines through suspended judgment and situation based interpretation- F. Masooma Nigar.

33. High-Level Perception aiding artificial intelligence- Richa bala.

34. Security issues in MobileADHOC networks - Mamta Narwariya, Sangheeta Mishra.

35. A REVIEW PAPER ON “STEGANOGRAPHY TO AVOID OBSERVATION- Mamta Narwaria, Arun Agarwal.

36. A Distributed Self-adjusting tree of O(log n) for object retrieval protocols- Ms.Neelam Joshi, Mr. K.K.Joshi.

37. MEDICAL IMAGE PROCESSING FOR HUMAN BONE MODELING- K. V. Nemade,
Dr. V. K. Tripathi, Dr. R. M. Warkhedkar.

[Note: Review comments and registration form will be mailed shortly .]