Spvryan's International Journal of Engineering Sciences & Technology (SEST)

 

 

Sr. No.

Title

Download

1

Combination Of RGB Substitution For Text To Image Encryption Technique Using AES
Sourabh Singh, Anurag Jain
sourabhsingh_tct@yahoo.com

pdf1

2

Thermal Imaging For Breast Cancer Detection: A Controversy
Prof. Rupesh R Joshi, Dr. Kantilal.P.Rane
joshirupesh77@gmail.Com

pdf2

3

Contamination Of Pesticides Residues On Grape Growing Soils In Nashik District
V.B.Gaikwad, Rupali B.patil, R. S. Saler
rupalipatil25878@rediffmail.com

pdf3

4

Advanced Steganography for cover media audio,video,image
Mr.Kiran N Somwanshi,Prof.Dr.A.K.Srivastav
kn.somwanshi@gmail.com

pdf4

5

Finger-Key based user log-on system
Mr. Deepak JijaramUgale
deepakjugale@gmail.com

pdf5

6

Structural Analysis & Optimization of EDM Machine Table
Prof. Chetan Praksh Shinde
Chetan.shinde52@gmail.com

pdf6

7

Attribute Based Encryption In Cloud
Mrs. Deepali A. Gondkar
litake.deepali@gmail.com

pdf7

8

Decision Tree Based IDS Using Wrapper Approach
Mr. Uttam B. Jadhav, Mr. Satyendra Vyas
Uttamjadhav29@gmail.com

pdf8

9

Design of a Cloud Based Emergency Healthcare Service Model
Arindam Banerjee, Prateek Agrawal, R. Rajkumar
arindam.banerjee2012@vit.ac.in

pdf9

10

Wave Transit Time Based Cuff less Long-Term Continuous Blood Pressure Measurement
Revati Shriram, Dr. M. Sundhararajan, Nivedita Daimiwal
revatishriram@yahoo.com

pdf10

11

Secure Data Hiding in Cloud Computing
Harish Bhabad, Malti Nagle
bhabadharish@gmail.com

pdf11

12

Comparative Study of Bow- tie and Bow-tie Slot Antenna for Ku band Application
Esha Johari, Hardesh Kumar Singh
eshajohari.ec07@gmail.com

pdf12

13

Lesion Detection in Retinal Images using Back Propagation Neural Network
Himanshu Saxena, Prof. Rohit Singhal
Er.himanshu1985@gmail.com

pdf13

14

Hand Gesture Robot Control Using Color Recognition System
Deepali N. Aher, Prof. L.K.Chouthmal

pdf14

15

Continuous User Authentication Using Soft Biometric Traits
Mr. Shaunak R. Gaidhani

pdf15

16

Gadgets As Invisible Key For Physical Security In Human Computer Interaction
Sivakumar M, Dr. Arthanari M
sivala@gmail.com

pdf16

17

Bio-reduction of heavy Metals from Effluent of electroplating Industries by Staphylococcus Y1 And Bacillus Species of Microbes.
Pradnya Ingle, R.S.Saler, V.B Gaikwad
rautpradnya16@gmail.com

pdf17

18

SBTAM – Balance between Privacy and Utility using k-anonymity
Prashant Gawande
prashantvsl@gmail.com

pdf18

19

Mining of High Utility Item Sets Using Threshold
Ms. Kanika Khandelwal, Mr. Pratap Singh Patwal
Itsoft.kanika@gmail.com

pdf19

20

Emerging Technology: Cloud Computing & its Associated Issues
Mr. Nikhil Bhalerao, Prof. Pravin Nagare
nsharpfoundation@gmail.com

pdf20

21

Exploration of User’s Surfing Behavior for Recommended System: A Survey
Mr. Ajeetkumar Shankerlal Patel, Prof. Anagha P. Khedkar
ajeetptl86@gmail.com

pdf21

22

Embedding Brain With Smart Devices Using Depreciated Technology
Tratiya Shweta A., MVV Kantipudi Prasad
shwetatratiya@gmail.com

pdf22

23

An Efficient Data Communication Using Conventional Codes
Mrs.Nikam Pratibha Madhavrao, Mr. B.G.Hogade
pragati.sur@rediffmail.com

pdf23

24

Impact of Social Networking Sites in Brand Expansion
Prof. Prashant Tagade, Mr. Nikhil Bhalerao
prashant.tagade@gmail.com

pdf24

25

An Efficient Technique for Improving the Power Signal Spectral Estimation
Kantipudi MVV Prasad, Dr. H.N. Suresh
prasad.bits2@gmail.com

pdf25

26

Information Retrival Using User Preferences In Personalized Mobile Search Engine
Miss.Patil Anuja Akaram, Mrs. Naoghare M.M.
patilanuja.48@gmail.com

pdf26

27

Face Identification from Blurred and Noisy Images Using Modified Facial Deblur Inference (FADEIN) Algorithms
Ratnesh Kumar Shukla, Amit Deogar, Dr. Maitreyee Dutta
ratnesh.nitttr @gmail.com

pdf27