S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Review on Various Submerged Image Enhancement TechniquesS.KARTHIK, B.REUBEN, V.ANNAPOORANI |
|
5 |
2 |
Content Based Image Retrieval using the Hybrid Method of SURF, SVM and BAYESIAN with Color Histogram ProcessingMIR TAWSEEF MUSHTAQ, PROFESSOR RUPALI ZAKHMI |
|
25 |
3 |
Harvester and Collector Bot Based Harvesting SystemSRIDHATTA JAYARAM AITHAL |
|
6 |
4 |
Ensemble Methodology Approach for Improving Anomaly Detection AccuracyANUJA SAWANT |
|
2 |
5 |
A Survey on Data Mining Techniques in Social Network DataT.SURESHKUMAR, G.VADIVEL |
|
7 |
6 |
Vehicle Identification Number (VIN)– A SurveySANJYOT KAJALE |
|
4 |
7 |
A Proposed Method to Personalize and Extract the Hidden Knowledge Through Web Usage Mining and Pattern DiscoveryRUCHIKA KALAL, MANISH TIWARI |
|
2 |
8 |
A Proposed Method to Personalize and Extract the Hidden Knowledge Through Web Usage Mining and Pattern Discovery Using Web Usage Mining and Pattern RecoveryRUCHIKA KALAL, MANISH TIWARI |
|
1 |
9 |
Secure Text/Image Data Communication by Image Steganography into Video Sample using Wavelet TechniqueA.SRIVIDYA, SWATI VERMA |
|
1 |
10 |
Deep Learning Approach for Text Generation Using RNN Encoder-Decoder for Q&AJIVAN Y. PATIL |
|
3 |
11 |
A Survey on Industrial Control System attacks and preventive measuresAMRUTHA MOHANDAS, CHINJU K |
|
4 |
12 |
Remote Process Automation of Ticketing Using OtrsN.SAI SUSMITHA NAIDU, D.VENKATA SUBBAIAH |
|
4 |
13 |
Methodology for Gender Identification and Age Recognition through Multiple Indian Language Speech SignalMANISHA, VINAY JAIN |
|
1 |
14 |
Challenges in Active StoragePRITEE HULULE |
|
1 |
15 |
Review on Challenges in Various Storage Architectures in Cloud ComputingAMRUTA MAGDUM |
|
2 |
16 |
Detection of Malware Using Machine Learning AlgorithmsVRUSHAL R PATIL, SHITAL JADHAV |
|
2 |
17 |
Bottom-up Approach for Performance Testing of Software Applications or ProductsMOHAMMED ABDUL RAZACK MANIYAR, MOHD ABDUL HAKEEM, DR. MOHD KHALID MUBASHIRUZ ZAFAR |
|
1 |
18 |
Gaining Intuition of SSL / TLS Protocol Version 1.2 for Building LibrariesAISHWARYA RADHAKRISHNAN |
|
1 |
19 |
Searching the Hyperparameter Space for Tuning of Neural NetworksAISHWARYA RADHAKRISHNAN |
|
2 |
20 |
TILT OR TOUCH? AN EVALUATION OF STEERING CONTROL OF RACING GAME ON TABLET OR SMARTPHONEMUHAMMAD SUHAIB |
|
1 |
21 |
VANET Based Message Authentication on Data Analysis for Avoiding Road AccidentPRIYANKA DAWANE, K.S.INGLE |
|
1 |
22 |
Big Data Analytics Using Support Vector Machine AlgorithmDR.T.GEETHA, R.KARTHIKEYAN, B.ANITHA, M.ARUNA, R.DEEPIKA |
|
2 |
23 |
An Internet of Things Using Automatic Detection with Wireless Sensor NetworkR.KARTHIKEYAN, A.JEEVA, G.SOWNDARYA, P.POORANI, K.SANGAVI |
|
4 |
24 |
Survey on Global Access of User's Information Stored on the Cloud with the Help of FingerprintHAARIS MOTA, GUFARAN MUJAWAR, S. RAZA JOHAR, PROF. SONALI PATIL |
|
2 |
25 |
A Review on Advertisement View ability Prediction on the Web portalsV.MALARKKODI, S.SHENBAGAVADIVU |
|
2 |
26 |
A Survey on Fog Computing and Its SecurityNEETHUMOL KUMAR, ANANDHU PAVITHRAN |
|
2 |
27 |
A Survey Paper on Data Mining TechniquesPROF. S.P VANJARI, RUTUJA BURATE, GAYATRI KESKAR, PRIYA DHANURE, SADANAND GADVE |
|
1 |
28 |
Auto Accident Detection and Alert SystemHAFIZA MAHRUKH SHAHZADI, HAFIZA MARIA RAFIQUE, SHAZIA RIAZ |
|
5 |
29 |
A Survey on Smart Street Using Solar and IOT based Light ManagementSHAIKH NAVED, SHAIKH ABUZAR, KHAN SAKIR, KAMBLE J.R |
|
1 |
30 |
Survey Paper: Modern Logistics Vehicle System Using Tracking and SecuritySAIKRISHNA PAMU, RAJEEV MEWATI, AKANKSHA DUBEY, TUSHAR BABAR, KAILAS KARNEKAR |
|
4 |
31 |
An Advanced Approach of Text Mining for Analysis of Road AccidentsDISHA JAIN, SITANSHU JAIN |
|
2 |
32 |
Cryptocurrency Mining using Amazon Web ServicesASHKA ALKESHKUMAR SONI |
|
1 |
33 |
Smart Bowling Action Monitoring System Using WSNS.NAVEENA, A.S.RENUGADEVI, DR.L.MALATHI |
|
1 |
34 |
A Survey Paper on Cloud Security IssuesANJANI KUSHWAHA, PROF. DEEPAK AGRAWAL, PROF. AKSHAT KHASKALAM |
|
2 |
35 |
Topology Based Random Key Predistribution for Energy Saving in Wireless Sensor NetworkDR.K.SELVARAJ, P.JAYANTHI |
|
1 |
36 |
Composite Ratio Environment Based Re-Configurability Video Streaming 4g TechnologiesDR.K.SELVARAJ, R.RAJKUMAR |
|
1 |
37 |
A Survey Paper on Smart Library SystemVAISHNAVI GHODAKE, SWAPNALI CHAVAN, MRUNAL GAIKWAD,PROF. SHITAL BACHPALLE |
|
2 |
38 |
Analysis on Transport Layer Protocols and Its DevelopmentsKETULKUMAR GOVINDBHAI CHAUDHARI |
|
1 |
39 |
A Mapreducing Based on Skytree and SVM Classification for Big Data Using Hadoop EnvironmentDR.K.SELVARAJ, N.GEETHA |
|
1 |
40 |
Survey on Visually Impaired Assistance using Android Mobile (OCR)SHAIKH REHAN, ABRAR INAMDAR, KHALID HUSAIN, PROF. PRERANA DEOKAR |
|
1 |
41 |
Survey on Image Security in Social Media using Digital Watermarking with Embedded MetadataBILAL SAYYAD, MUBARAK SACHE, VASEEMAKRAM SAYYED, PROF. SONALI PATIL |
|
2 |
42 |
Pothole Detection System Based on Android Device and Ultrasonic SensorASHWINI KHARDE, PROF. KORE K. S, AKSHADA KOLHE, ASHWINI MUTHAL |
|
1 |
43 |
Identity Based Cloud Storage Security SystemSHAIKH NIKKHATPARVIN, KARISHMA MANIYAR, SNEHAL TAWHARE, PROF. GHOLAP P. S |
|
1 |
44 |
Performance Analysis of Video Steganography TechniquesSHREE RAKSHA |
|
2 |
45 |
Numerical Methods for Solving Differential EquationsDr. Anurag Singh |
|
2 |