These papers are been selected by our review commitee members:-
1. Software Testing: The Final Step in Software Engineering - A. Tiwari, P. Diwan, A.Shrivastava
2. THE ROLE OF DIGITAL SIGNAL PROCESSORS - Shivi Chaturvedi
3. SECURITY PROTOCOL FOR SENSOR NETWORKS(SPINS) - VIDYA KADAM
4. COMPERITIVE STUDY: THE PULL-PUSH ALGORITHM - Preeti Diwan, Diwakar Singh, Anshu Shivastava, Anju Singh, Amit Tiwari.
5. Computation of Order Statistics of Nakagami-m fading channel - Keerti Tiwari, Anjana Jain
6. American sign language recognition through hand gesture - Nayan Baseshankar, Parul Shukla, Shruti Sinha, Mrunal Bodele.
7. Reducing blocking artifacts using denoising algorithm with shape adaptive DCT in color images- C.S.Rawat, Dr. S Meher.
8. AN ACKNOWLEDGEMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOUR IN MANETs - Ashish Kumar, Vidya Kadam, Shital Pawar, Subodh Kumar.
9. Impact of Nano Technology on Humans and Environment - Chandrabhan prajapati, R.P. Kori.
10. Gesture Based Interaction: A review - Anupma Yadav, Neeraj Verma.
11. Business Analytics & Intelligent Agents as Data Mining Tools in Knowledge Management - Lavneet Singh, Savleen Singh.
12. DETECTING PHISHING WEBPAGES WITH VISUAL SIMILARITYASSESSMENT BASED ON EARTH MOVERS DISTANCE - Y.B.N.SINDHU, CH.LALITHA, P.LEELA KRISHNA, N.KINNERA.
13. 2D APPROACH ON DYNAMIC CPU SCHEDULING IN REAL–TIME DATABASE SYSTEM- N Ghodichor, Nitin J. Janwe, S.S.Patil.
14. EBG Substrates for Enhancing Microstrip Patch Antenna Performance - Harish Kumar Mishra, Dr.R.L.Yadava, Dr.R.K.Jately.
15. PROTECTION OF DATABASE SECURITY VIACOLLABORATIVE INFERENCE DETECTION- A. Manasa, Ch.Anusha, G. N. Sukanya, D. Ujwala Poornima.
16. A Routing Protocol for Lifetime Maximization of Mobile Ad Hoc Network - Pooja Sharma, Pawan Bhadana.
17. On The Feasibility of a New Defense Layer ForWireless Sensor Networks Using RF Ranging- P.Aslesha, P.L.Madhuri, M.Ancy, M.Nancy.
18. Comparative Analysis of High Speed Logic Design Style- Er.Sailesh Singh Chouhan, Er. Payal Soni.
19. Digital Image Compression Techniques- Chesta Jain, Vijay Chaudhary.
20. Computation of Order Statistics of Nakagami-m fading channel- Keerti Tiwari, Anjana Jain.
21. Mining FIS in Association Rule Algorithm: Modified Apriori- Anshu Shrivastava, Prof. Diwakar Singh, Preeti Diwan, Amit Tiwari.
22. MULTIPLE ROOT MODEL OF TREE BASICALLY CONSTRUCTED BY FOREST (a disjoint set of trees)- Mayank sharma.
23. Nano Machines: The Dream of Future - Chandrabhan prajapati, R.P. Kori.
24. New Design an Aspect of Multilingual Document Editor - Dr. W.U. Khan, Kalpna Dhurve.
25. Robotics & Industrial Automation - Soni Changlani.
26. CHANNEL ALLOCATION SCHEMES FOR CELLULAR NETWORKS - Shivi Chaturvedi,
Poonam Sharma.
27. Cloud Computing- Preeti Bhardwaj.
28. COMPERITIVE STUDY: THE PULL-PUSH ALGORITHM- Preeti Diwan, Diwakar Singh,
Anju Singh, Anshu Shivastava, Amit Tiwari.
29. Network Security and cryptography- Manish Sethiya.
30. Security Constrained Optimal Power Flow and Pollution ControlBy Swarm Intelligence in Interconnected Power System - K.K.Swarnkar, Dr.S.Wadhwani and Dr.A.K.Wadhwani.
31. TURBO CODING FOR 4G SYSTEMS: DESIGN ISSUES AND
SOLUTIONS - Renu Tomar.
32. Reasoning in machines through suspended judgment and situation based interpretation- F. Masooma Nigar.
33. High-Level Perception aiding artificial intelligence- Richa bala.
34. Security issues in MobileADHOC networks - Mamta Narwariya, Sangheeta Mishra.
35. A REVIEW PAPER ON “STEGANOGRAPHY TO AVOID OBSERVATION- Mamta Narwaria, Arun Agarwal.
36. A Distributed Self-adjusting tree of O(log n) for object retrieval protocols- Ms.Neelam Joshi, Mr. K.K.Joshi.
37. MEDICAL IMAGE PROCESSING FOR HUMAN BONE MODELING- K. V. Nemade,
Dr. V. K. Tripathi, Dr. R. M. Warkhedkar.
[Note: Review comments and registration form will be mailed shortly .]