Asian Journal of Engineering and Technology Innovation
ISSN Online: 1247-7385
E-mail: editor@ajetijournal.com
Archive
2022
Volume 10, Issue 2, 2022
Close articles-
Electrodynamics of Compressible Ether
Nikolai Magnitskii
Volume 10, Issue 1, 2022
Open articles-
The Efficiency Analysis of Project Optimization Selection of AL2O3 Metallization
Shiu-Wan Hung, Wen-Min Lu, Ting-Ko Chen
2021
Volume 9, Issue 2, 2021
Close articles-
Bike Pool: An Android Based Application
Lamont Bridle, Nichols Bie
Volume 9, Issue 1, 2021
Open articles-
A Study on Human–Robot Computer Interactive System
Jin Luo, Yang Li, Xi Chen -
Maximum Electric Receptacle Trailing of Wireless Power Transfer
Carrara Lazarus, Dinis Schaller -
A Review on Social Impact Index in Engineering for Additional Property Outcomes
Albert Panaousis -
A Comparative Study on The Electrochemical Oxidation of Natural Organic Matter Using BDD and MMO Electrodes
Shasvat Rathod#, Robert Liang#, Azar Fattahi#, Monika R. Snowdon#, Mark R. Servos# and Norman Zhou#
2020
Volume 8, Issue 2, 2020
Close articlesVolume 8, Issue 1, 2020
Open articles-
Separate deposition of two types of metal nanoparticles on support material for enhancing catalytic activity
Tomokazu Kiyonaga -
A Survey on Energy-Efficient Mac Protocols for Wireless Body Area Networks
Vinothini T and Senthilkumar
2019
Volume 7, Issue 2, 2019
Close articles-
Screening of Diabetic Retinopathy Images in LabView
Purushottama T L and Kishore C
Volume 7, Issue 1, 2019
Open articles-
Ghost Detection and Removal in HDR Images
Vidhya. R, Monika. K, Shwetha. M, Swetha. K. N, Pavithra. P
2018
Volume 6, Issue 2, 2018
Close articles-
Face Expression Recognition System: A Survey
Nandan Raj .R and Dr. Mallikarjun .M Kodabagi -
An Ensemble approach for Classification of Glioma using MR
Ashwini V D, Divya R, Chaitra A, Dheeraj D -
Survey on faster storing and retrieval of medical images
Likith S and Nirmala S Guptha -
Design and Implementation of Image Encryption using Chaos Theory
Veena H N and Naveen Chandra Gowda -
Biometric Identification Through Ear, Palm and Dorsal Vein Patterns
Hamsini A Kumar, Kavya M, Malavathi V -
Secure of Data on stored Cloud from Decentralized Access Control with Anonymous Authentication
Vikas A V and Prof. Nirmala S Guptha -
A Survey of Analysing the Internet DNSSEC traffic for resolving platform optimisation and performance improvement
R Venkateswara Rao and Mr. G C Sathish -
Safeguarding Against DoS Attacks: A Brief Study on Software Puzzle
Manaswini Kolluru and Bijay Kumar Jyotishi -
Chatbot on Serverless/Lamba Architecture
Nandan.A and Prof.Shilpa Choudary -
A survey on Voltage Factor in Smart Grids
Ranjitha K and Malikarjuna M -
Backup and Recovery for File System and Databases
Malatesh Karibisti and Prof. Meenakshi Sundaram -
Analysis of Security Model for Cloud Computing against DDoS
Karnik Pooja Jagdish, Jyoti Kiran Mirji and Shilpa Chaudhari
Volume 6, Issue 1, 2018
Open articles-
A survey on Balancing the Load of Big Data for Preserving Privacy Access in Cloud
Mrs. Anooja Ali and Sumalatha D.P -
Secure Sharing of Data in Cloud through Key Aggregation
LakshmiKantha K.N and Mr. A. Ananda Shankar -
Performance Analysis of Parallel Cellular Automata Model using OpenMp and PThread Programming Constructs
Padmaja Annapureddy, Manjushree Sahana V and Shilpa Chaudhari -
OpenStack Post Deployment Config, Logs and Metrics Management System
Mahesh D N, Pavithra P -
Nyasacart (WEB) Application for Connecting Online Shopping Services along with Real Estate Business Services
Priyanka Pinto, Venkatesh Prasad, Arun S Patil -
Real Time Air Quality Measurement Using Low Power Wide Area Technology
Kiran Kumar P N, Rahul Baruah, Saugata Dey, Pradeep K R, Firoz Vahab
2017
Volume 5, Issue 2, 2017
Close articles-
Frameworks for Parking Systems: A Survey
Santhosh G and Sathish G C -
Rapid Entire Body Postural Analysis Assessment Device for Computer Operators using IOT
Rajashekhar C Davanagere and Mrs. Thanuja K -
Reed Solomon codes for enhancing the security in IOT based Home Automation
Rekha K B, Naveen Chandra Gowda -
Near Field Communication (NFC) ? Wave is the new way forward
Manjushree Sahana V , Padmaja Annapureddy and Shilpa Chaudhari -
IoT Based Digital Smart Home
B S Archana, Deepthi S, Pooja K M, Tanuja T P and Vittal S -
Electronic Banking System for Rural and Less Connected Areas Using Arm Processor
Kiran Kumar P.N, Amrita Rajak, Robin, Roshan Banjare -
Density Based Traffic Control System Using Microcontroller
Jothsna R and Krupa T Naik -
Data Communication between GUI and PLL device using TCP/IP embedded system interface
Amay Prabhakar Kamat and Abhiroop Biswas -
Analysis of PSO Clustering Algorithm for Underwater Acoustic Sensor Networks
Vani Krishnaswamy, Shyam Sunder, Shubham Sharma, Swapnil Siddharth, Sandeep P -
Cross Layer Energy Optimization Methods in Wireless Sensor Networks: A Review
Sanjeev Kumar, Satyam Pandey, Shivand, Vithal, Rajeev Ranjan -
Wireless clustering using Raspberry pi
Ranjitha U.N and Meghana, Narendra,Sagar, Shridhar -
Review of Application Specific LTE Resource Scheduler
Shilpa Chaudhari and Anand Kulkarni -
Distributed Computing Platform on Ad-Hoc Network of Mobile Devices
Keshava Krishna Raja S and Dr. Prabhakar M -
Comparative Analysis of MAC Scheduling Algorithms in Underwater Acoustic Sensor Networks
Vani Krishnaswamy, Prerana N D, Swetha V -
C2C communication for Road Safety: Applications and Challenges
Padma Priya P, Preethi K, Radhika N, Rajeev Ranjan, Kanaiya VK -
RLEC: Recursive Leach based Energy Conservation in WSN?s using clustering technique
Prof. Raghavendra Reddy and Prof. G. C. Sathish -
Investigation on Evolutionary Scheduling Algorithm for Provisioning QOS on WiMAX Network
Sharana Basaiah PM and Ravi Shankar H -
An Energy efficient Routing Protocols in Wireless Sensor Networks: A Survey
Chaitra B, Rekha B N and Vishwanath.R.Hulipalled -
Visualization of Checkout Data of a Spacecraft based on Time-Series Database
Mallikarjuna Shastry P.M, Sheena Jose and Rashmi Shekar -
Decision support system for cancer diseases using text and opinion mining techniques.
Ashok Kumar M and A.Ananda Shankar -
Continuous Integration using DevOps The future of Information Technology
Akshata S Mahashabde and Kiran Kumari Patil -
Comparative Analysis of the Different Compilers
Sindhuja. L and Nirmala Gupta -
Deduplication & Optimize Task Scheduling in Cloud
Machala Rama Krishna and Mr. Mylara Reddy -
CoprHD: Bypassing the virtual layer of storage abstraction for advanced users
Udaya Rani V and Maheshchandra. C. S -
Computing Satisfiability Degree of Prepositional Formula
Pragya Verma,Saurabh, S Hubham, Gulshan Banu -
A Survey on Variant Approaches to Secure Cloud Storage System Data
Sajida Tabasum U and Mrs. K Anitha -
A Survey on Integration and Migration of Heterogeneous
Priya Badarinath, Ajeet A.C and Dheeraj D. -
A Survey on Demand Response Management - an approach for load balancing in Smart Grids
AmreenKhanam and Mr. Malikarjuna M -
A survey on Data Confidentiality in Cloud Storage environments
Cloud storage service, an Internet hosting service aimed at offering consumers the possibility to upload their files to the service providers’ facilities and access them at any time, from anywhere via Internet, becomes a better way of providing individuals and organizations with a set of services and facilities to store and/or share their files. As such, it has led to a specialised cloud computing business and service delivery model known as Storage-as-a-Service. However, since cloud consumers’ important files have to be stored in the cloud storage service providers’ premises, the confidentiality of these stored files becomes a real issue. In this paper, different solutions to solve this issue have been proposed. -
Spacecraft Checkout Test Data Retrieval and Playback Software
Preeti Patil, SunilKumar S Manvi and Sheena Jose -
Semantic Web Search Engine for Accurate Outcomes Using Ontology- A Survey
Bhagyashree Tolnur, Ashwinkumar.U.M, Jyothi Kiran Mirji -
Overcoming the Challenges in Liver Tumor Imaging and Classification
Thejesha B.R, Ms. Nirmala S. Gupta -
Design and Implementation of CodGen Using NLP
Priyanka, Priyanka HL, Priyanka P, Ruchika and Naveen Chandra Gowda -
Application of classification algorithms in predicting diabetes
Pavan Movva and Dr. Kiran Kumari Patil -
A Survey on Methods of Service Recommendations
Pratheek Shrivatsav. R and Manjunath. P C -
A Survey On Comparison of Fast Nonparametric clustering algorithm
Chaitali Choudhury, Nirmala Guptha
Volume 5, Issue 1, 2017
Open articles-
Spam Blocker for Online Social Network
Seema Pralhad Jaybhaye
2016
Volume 4, Issue 2, 2016
Close articles-
Securing Numerical Relational Dataset using Robust and Reversible Watermarking Approach based on Genetic Algorithm
Nicy Jose -
Software Defined Radio: Advancement to Cognitive Radio and Basic challenges in Spectrum Sensing
Vikash Kumar, Nataraj Urs H D, R Venkata Siva Reddy -
Detection of Fraud Using Ranking for Mobile Apps
Nandini B, A.Ananda Shankar -
Survey on the Downtime of the CNC Machines and Usage of Raspberry Pi
Anil C N, Lalitha L.A, Shekar K V -
Improving the Performance and Accuracy of Image Segmentation Using Modified FCM Algorithm
-
Application of Wireless Sensor & Mobile Technology in Education Using BLE Beacon
Geetha Shirol, Bijay Kumar Jyotishi -
Multi-Hop Clustering Hybrid Architecture in VANET for Safety Message Propagation
Roopa A M, Shobha Biradar -
Zone Based Malignant Node Detection and Revocation in Mobile WSN by Sequential Hypothesis Testing (SHT)
Pradeep.K.M , Shobha Biradar -
Localization of WSN using IDV and Trilateration Algorithm
Sharon Priya S, Anooja Ali -
Intrusion Detection Using Passive Infrared Sensor(PIR)
Pampapathi B S, Manjunath P C -
An Encryption cum Hash Function Using Permutation Parity Machine
Shiffin N, Y Sree Chaitanya, Rajat Pandey, Ravi Jha -
A Survey of WLAN Positioning for Mobile Devices based on Time of Flight
Anup T Dhate, Vani K -
Comparative Analysis of MAC Scheduling Algorithms in Long Term Evolution Networks using NS3
Mohnish Jha, Kumar Prateek,Nitin Jaiswal, Abhinav Anand, Shilpa Chaudhari -
A Survey on Analytical Architecture of Real-Time Big Data for Remote Sensing Applications
Raghavendra, Ashwinkumar U M -
Security for EMV Card Data in Payment Systems
Satish Kabade,and Meenakshi Sundaram -
Opinion Extraction of Raw Data based on Classification Model
Pooja J, Sushma Ravindra -
Survey Paper on Combination of LB Optimisation and ICIC in LTE Self-Organizing Networks
Raiman S, Shreekant Jere -
Survey on Social Network of Vehicles Under IOT
Manjunath S, Sathish G C, Deepasree C E -
Performance Investigation Survey on Different Scheduling Techniques for QoS in 802.16e Networks
Sudhakar T, Ravishankar H -
Smart Lighting System To Reduce Energy Consumption
Mallikarjun M Kodabagi, Reshmabanu M Nadaf -
QoS Challenges in Wireless Sensor Networks
Mallikarjun M Kodabagi, Shrutidevi B Patil, Basavaraj B Patil -
Survey on Various Downlink Resources Allocation Scheduling Schemes Proposed in Long Term Evolution
Heena Kauser, Shilpa Shashikant Chaudhari -
Detection of Malwares, APTs and Their Propagation in an Enterprise Network Using the Combination of Scoring Model and Process-Network-File Approach
Srikanth P Vasist, Sailaja Thota -
Survey on Different Routing and Wavelength Assignment Techniques in WDM Optical Networks
Shashma. M, Shrikant S Tangade -
Asset Data Linkage USING Artificial Intelligence Method of Machine Learning
Krishna M V -
Design of Secured Cloud Based Condition Monitoring of Wind Turbine Parameters Using IOT
Ambarish K J, Bharathi S H -
Analyzing Log Files to Find Hit Count Through the Utilization of Hadoop MapReduce in Cloud Computing Environmen
Anil G, Aditya K Naik, B C Puneet, Gaurav V, Supreeth S -
A Survey on Defined Circle Friend Recommendation Policy for Growing Social Media
Shamily Varghese E, Sushma Ravindra Y -
Rural Healthcare Using Crowdsourcing
Syeda Sadia Tabassum, Sathish G C, Akram Pasha -
A Survey on Data Retrieval Techniques Over Encrypted Cloud Storage
Arpitha T V, Mallikarjuna Shastry -
Agriculture Management for Farmers Support Over Cloud Fashion
Shijo M Ulahannan -
Application of Parallel Glowworm Swarm Optimization Algorithm for Data Clustering on Large Datasets
Hajira Tabasum M Akram Pasha -
A Study on the Problems of Implementing CRM and ERP in Conventional Business Environment
Animesh Yadav, Shruthi G -
A Survey on Biomedical Named Entity Extraction
Almas Tasneem Archana B -
Smart Kitchen Inventory
Vikas Kumar, G C Sathish -
User Authentication Using Text - Prompted Technique
Laxmi Doddappagol, Geetha B -
A Survey on Techniques Used in Blood Splatter Analysis
Naveen G, Sarvamangala D R -
A Survey on Estimation of Time on Hadoop Cluster for Data Computation
Mohan Kumar M K, Akram Pasha -
Detecting Truthfulness of Packet Dropping Attacks in WANETs
Sanma S Shetty
Volume 4, Issue 1, 2016
Open articles-
Solar Powered Smart Irrigation System
-
Interleaved DC-DC Boost Converter with Novel Isolation Technique
-
RE Sources and Grid Integration: A Review of Policies and Incentives
-
Design and Simulation of Incremental Conductance MPPT algorithm for PV applications
-
Analysis and Effect of Distributed Generation placing in Distribution System Operational Planning
-
Grid Interacted Solar PV Power Plant for Grameen Banks
-
Hybrid Power System of Renewable Energy Systems for energy security
-
Electrical Distribution System Strengthening by Implementation of Accelerated Power Development and Reforms Programme
-
Evaluation of Line Parameters for Multi-phase Transmission System
-
Smart Grid- A Panacea to Indian Power Sector
-
Fuzzy Multi-Agent Based Distributed Control Scheme for Voltage Regulation in Smart Grids
2015
Volume 3, Issue 2, 2015
Close articles-
Image Enhancement using Bayer Filter and Parallel Level Set Method
Roshni Debnath, Chitranshi Singh, Deepsanakr Roy, Ramendra Singh Rathaur, Dipalee Chaudhari -
Clarification of Image by Parallel Level Sets
Mohini Padwal, Namrata Borole, Ashwini Gayake -
Mobile cloud Computing using Machine Server
Deepali. B. Gothawal ,Deepali Patil, Sneha Chavan, Tejaswini Chandekar,Rohit Koti -
Enhanced cloud Data recovery technique using Seed Block Algorithm (SBA) and RSA Encryption
D.A Phalke, Onkar Kulkarni, Abhijit Fulsagar,Harish Rane, Ajinkya Chothave -
Interactive Projector
Bhavya Shetty, Rachana Gowda, Jyoti Sanap, Ashish Manwatkar -
Content Based Image Retrieval System using a freehand Sketch and Match Images
Ashwini Tapkeer, Nikhil Deshmukh, Reshma Patil, Vaibhav Mondhe, Sarika Deokate -
Accident Locator using GPS and GSM Technology
Ashish Manwatkar, Irfan Patil, Jayraj Tekale, Vinayak Kamble, Nikhil Gotur
Volume 3, Issue 1, 2015
Open articles-
Low Rate DoS Attack Detection Mechanisms
Sumit Pote, Ashish Nikalaje,Rahul Bhalerao, Prashant Gade, Kunal halkandar -
Image Enhancement using Bayer Filter and Parallel Level Set Method
-
Mining social media data using Naive Bayes algorithm
Rajeshri Thorat, Ekta Pawar, Pranali Shendekar, Kajal Lokhande, Apeksha Mengade -
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Seema Pralhad Jaybhaye -
Minimum Consistent Subset Cover Problem : A Minimization view Of Data Mining
Madhugandha Bhosale -
Petroleum Gases Measurement System With Remote Monitoring using TCP/IP
Rutuja Pradhan, Sangeeta Mitkari, Ashwini Sonawane, Pooja Nage -
Secured Robust Video Data Hiding
Rizwan Mehdi, Sachin Bhalake, Shashikant Nagdive, Avinash Kidangumuruppel -
Automated Irrigation System using WSN
Deepak Dharrao, Laxman Kolape, Sanjeet Pawar, Aniket Patange -
Markerless Augmented Reality For Interior Designing Using Android
Akash Shedole, Sagar Satpute, Abhijit Singh, Gaurav Pingale -
Defeating SQL injection using Data cleansing algorithm
Digambar Patil, Abhishek Bhardwaj, Laxman Teli, Dattatray Lugade, , Vijay Girange -
Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions
Ragina Nair, Digambar Patil, Bhavana Dhobale,Rutuja Pachkude -
Sherlock: Monitoring Sensors? Broadcasted Data to Optimize Smartphone Environment
Apurva Bhosale, Abhijit Kale, Neha Sanas
2014
Volume 2, Issue 5, 2014
Close articles-
Automation of HR Interview System Using ′Jess′ Inference System
Hardik patel, Swati verma , Inshu rani, Abhilasha bhalke -
Enhance Recommendation by Providing Location Privacy in GeoSocial Application
Reena Gandhi, Charushila Kapde, Priyanka Kumbhar, Bindu Pandit, Prof. S. S. Sambare -
Event Characterization and Prediction Based on Temporal Patterns Using Mrps in Dynamic Data System
Deepak Dharra, Abhishek Iyer, Nitika Gulhane, Sultana Parveen Khan, Vishal Dond -
Color Image Tampering Detection And Repairing of Tampered Block
Vaibhav Malave, Sarika Deokate, Vikas Nagargoje, Namdev Kadam, Sourabh Aglave -
Survey Paper on Vector valued image processing using parallel level sets
Chitrashi Singh, Deep Shankar Roy,Ramendra Singh Rathore, Roshani Debnath -
Cloud-Assisted Mobile Access of Health Data
Vaishali Patil,Swati Deshmane,Rajesh Dabade,Amruta Gadekar -
Cloud Based Customer Relationship Management
Suraj Borge, Gaurav Waghmare, Surabhi Gupta, Lena Pawar -
Palm Authentication using Biometric Security Systems
Darshan Parate, Mansi Tanna, Kajal Singh -
K-Zero Day Security: Network security metric for risk measurement of unknown vulnerability
Mehul Das, Shubham Tripathi, Vikram Jaygude, Mr. Ramnath Banerjee -
Location Privacy in Geosocial Application
Ravi Ranjan, Pinkee Singh, Priyanka Patil, Mangesh Manke
Volume 2, Issue 4, 2014
Open articles-
Design novel Self-Monitoring For Wireless Sensor Networks
Miss Aparna A Tathod, Prof. Navin Shrivastawa, Prof. Wasudeo Rahane -
SCADA a tool to increase efficiency of water treatment plant
Sunil L. Andhare , Prasad J. Palkar -
Computer aided optimization of machining parameters for single pass turning process
Sunil L. Andhare , Prasad J. Palkar
Volume 2, Issue 3, 2014
Open articles-
Using Klein Gordon Equation to Study Spin Zero Atoms
Saeed Mohammadi, Maryam Mounesi -
Energy Levels Calculations of 19F and 21F Isotopes
S. Mohammadi, Elham Kafash -
Back bendinginTungsten (W) Isotopes
S. Mohammadi, Banafsheh Nemati Giv -
Calculation of the Energy Levels of 25Na-27Na Isotopes
S. Mohammadi, Sima Zamani -
Design of a Wireless Local Area Network for A 3-Floors Library
S.F. Kolawole
Volume 2, Issue 2, 2014
Open articles-
Survey of An Automated Recognition of Fake or Destroyed Indian Currency Notes
Mohd Mudassir Mohd Ismail, Mr. Ashutosh. B. Makone -
Leaf Recognition Algorithm Using Neural Network Based Image Processing
Ekshinge Sandip Sambhaji, D.B Andore -
Survey of An Accelerometer-Based Digital Pen for Handwritten Digit and Gesture Recognition
Sachin Ashok Waghmare , Shilpa.P. Kodgire
Volume 2, Issue 1, 2014
Open articles-
EnergySaving on Nano Particles
S. Mohammadi -
Optimization of Turning Parameters Such as Speed Rate, Feed Rate, Depth of Cut for Surface Roughness by Taguchi Method
Taquiuddin Quazi, Pratik gajanan more -
Nuclear Shape Changesin Odd-A Promethium Isotopes (Pm)
S. Mohammadi, R. Shaheidari
2013
Volume 1, Issue 2, 2013
Close articles-
Breast Tumors Ultrasound Images Classification Using Genetic Neural Algorithm
Ahmad Taha Abdulsadda
Volume 1, Issue 1, 2013
Open articles-
Reviwe of design aspects of major components of Automotive Seat
Pachling Vishwanath K., Prof. Chaitanya S. V. -
Surface Temperature and NDVI Generation and Relation between Them: Application of Remote Sensing
Rezaul Roni -
Product Lifecycle- Knowledge Management
Sankalp Vivek Giridhar , Kakandikar Ganesh M. -
Reverse Engineering of Miniaturized Product: Syringe Needle
Patil Archana S, Kakandikar G.M. -
Implementing RFID Technology for Vehicle Tracking in Bangladesh
K M Akkas Ali, A K M Zaidi Satter, and Khaled Shohel
