S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Application of Data Mining for understanding Supply Chain Management in Retailing
ASHISH B. PATEL
|
|
6 |
2 |
Application of Data Mining for understanding Storefront Operations in RetailingASHISH B. PATEL |
|
3 |
3 |
OTP over SMS: Time Delay Issues and CausesDHANASHRI GHOSALKAR, SHWETA PATIL |
|
1 |
4 |
D2H vs IP Video Delivery ComparisonAISHWARYA KANETKAR, MADULIKA CHAUDHARI |
|
1 |
5 |
A Critical Study of ICT Implementation in School Education with Special Reference to the Selected Schools of Satara DistrictANITA A. PATIL, DR. A.V. NIKAM |
|
1 |
6 |
Face Spoofing Detection Using Machine Learning ApproachRAGHAVENDRA R J, DR. R SANJEEV KUNTE |
|
3 |
7 |
Data Protection and Reliability in Public Cloud Computing Based on RSA Partial Homomorphic CryptographyANJANI KUSHWAHA, PROF. DEEPAK AGRAWAL, PROF. AKSHAT KHASKALAM |
|
1 |
8 |
Fake News Detection using Convolution Neural Network in Deep LearningS.ANANTH, DR.K.RADHA, DR.S.PREMA, K.NIRAJAN |
|
5 |
9 |
Design and Analysis of Novel Charge Pump Architecture for Phase Locked LoopMANOJ SHARMA, GAJENDRA SUJEDIYA |
|
1 |
10 |
Design and implemented low power Conventional Wallace Multiplier in CMOS TechnologyNEHA BAYA, RAHUL MOUD |
|
5 |
11 |
Design and Analysis of a Conventional Wallace Multiplier in 180nm CMOS TechnologyNEHA BAYA, RAHUL MOUD |
|
3 |
12 |
Review on Extracting Geo-Spatial Information From Open Street Map using Expat Semantic Parser and Support Vector MachineANITA JANMEDA, DR.DINESH KUMAR |
|
1 |
13 |
Data Security in Cloud Computing Using Cryptographic Algorithms: A ReviewCHANDRIKA, ER. SAHIL DALWAL |
|
1 |
14 |
Review on Acoustic Performance of Muffler Unit by Changing Its Cross-SectionSHRUTI S. MANWATKAR, PROF. R. G. GORE |
|
2 |
15 |
Design and Analysis of a Conventional Wallace Multiplier in 180nm CMOS TechnologyNEHA BAYA, RAHUL MOUD |
|
1 |
16 |
Review on Extracting Geo-Spatial Information From Open Street Map using Expat Semantic Parser and Support Vector MachineANITA JANMEDA, DR.DINESH KUMAR |
|
1 |
17 |
Data Security in Cloud Computing Using Cryptographic Algorithms: A ReviewCHANDRIKA, ER. SAHIL DALWAL |
|
1 |
18 |
Review on Acoustic Performance of Muffler Unit by Changing Its Cross-SectionSHRUTI S. MANWATKAR, PROF. R. G. GORE |
|
1 |
19 |
A Study on Product Recommendation System vide Machine Learning using Big DataPRIYANKA, SHALINI |
|
1 |
20 |
Relevance Feedback Using Auditing Scheme in Content-based Image Retrieval in Cloud Computing EnvironmentSONALI PANCHAL, SHITAL GAIKWAD |
|
1 |
21 |
Search History in Ranking Page Based on User Preference SuggestionS.SASIREKA, C.MARIYAMMAL |
|
1 |
22 |
Optimized Load Sharing using Enhanced Genetic Algorithm in LTE NetworkDr. Kavitha B |
|
4 |
23 |
Human Age Estimation through Face Recognition using Stacked Neural Network based Deep Learning ApproachKHEMCHANDRA PATEL, DR. KAMLESH NAMDEV |
|
3 |
24 |
A Study on Weather Forecasting using Machine Learning in Big DataKAVITA DEVI, NANDANI SHRAMA |
|
1 |
25 |
An Epigrammatic Study on NLP -Tools, Challenges and it’s ApplicationsKAVYASHREE E D, SOWMYA SHREE P, ANIL KUMAR C J, KIRAN B |
|
4 |
26 |
Social Partitioning and Replication Middleware for Scaling Online NetworksBEEGUM SUFIYA .J.S |
|
2 |
27 |
Efficient Method for Video Summarization Using Support Vector MachineMAHANTHESHA NAIK H, DR.GIRIJAMMA.H.A |
|
1 |
28 |
Solution for Sustainable Clean Energy: Smart GridSHERYL BERNARD |
|
1 |
29 |
Survey Paper on Pipelined Distributed Arithmetic-Based Multi-rate Approach based Adaptive FilterVIKASH NIGAM, JITENDRA KUMAR MISHRA |
|
1 |
30 |
A Hybrid Feature Extraction Approach for Human Action Recognition System based on Skeleton DataTIN ZAR WINT CHO, MAY THU WIN |
|
1 |
31 |
A Review on TCP Flood, DDOS Attack in Cloud Environment & Their SolutionsANUPRIYA DUBEY, PROF. PANKAJ JAIN |
|
1 |
32 |
An Improved Authentication System Using Finger Vein ImagingN.ANGAYARKANNI, DR.V.SAI SHANMUGARAJA |
|
4 |
33 |
Efficient Double Encryption in Cloud ComputingS.DURGA, P.ALAGUSUNDARAM |
|
2 |
34 |
Empirical Analysis of Skin Cancer Identification Using Multi- SVM ClassifierM.ISHWARYA, J.SUDHA |
|
2 |
35 |
Multi Attribute-Based Proxy Re-Encryption Method for Cloud Storage Security Improvement and Performance StrategiesK. PUSHPARAJ M.TECH.,, C. ARUL JOHNSI |
|
1 |
36 |
Energy Efficient and Secured Cloud Data Handling with Multi-User Access Control StrategiesK.NITHYA, S. ILAKKIYA |
|
1 |
37 |
Estimation of Student Performance Using Artificial Intelligence with LMS StrategiesC.PALANICHAMY, DR. R.KAVITHA, V.PODHUM PONNU |
|
1 |
38 |
Efficient File Download Time Reduction System for Multi-Client Fog/Cloud EnvironmentK.PRIYANGA, V.JANAKIRAMAN |
|
2 |
39 |
PhishFind - An Enhanced Adaptive Neuro-Fuzzy Inference System Phishing Detection over Fog NetworksB.SEETHA, V.ILAYARAJA |
|
5 |
40 |
Effective Energy Preserved Data Transmission Scheme over Wireless Sensor Network EnvironmentC.SRUTHI, P.PONVASAN |
|
1 |
41 |
Implementation of Enterprise CA Organization Based on PKIKARISHMA TYAGI, PROF. DEEPAK AGRAWAL |
|
2 |
42 |
Capabilities and Key Benefits of Sap NetWeaver GatewayYeshwanth Valaboju |
|
3 |
43 |
Experimental Analysis of Network Based Malware and Spam Prediction and Declining ModelR.VIMALASREE, P.PONVASAN |
|
1 |
44 |
Effective Skin Cancer Identification Scheme Using Multi-SVM (MSVM) StrategiesM.KIRITHIKA DEVI, DR. R.KAVITHA, M.VINITHA |
|
1 |
45 |
Designing and Implementation of Charge Pump for Fast-Locking and Low-Power PLLNITESH PAREEK, RAHUL MOUD
|
|
1 |
46 |
Web Services Security Concern, Solution and Its Limitation: A SurveyPREETI PATEL, SAURABH SHARMA |
|
2 |
47 |
A Survey Paper on Opinion mining using Association Rule mining techniques together with Removing Stop words, Emoji’s and Negation HandlingSUNAYANA PARIKH
|
|
2 |
48 |
Modified VM-Assign Load Balancing Algorithm of Cloud Computing in CloudSimPRITHPAL MOHINI SINGH, SHAVETA ANGURALA |
|
1 |
49 |
A System to Counteract Sniffing Assaults Over SystemSONIYA LAZARUS, PROF. DEEPAK PARANJAPE |
|
1 |
50 |
Water Quality Monitoring System Based on IOTSHALAKA V. SHINDE, SUSHANT MURUMKAR, AMOL GAGARE, SAGAR PALWE |
|
1 |
51 |
Survey on IOT Assisted Farming and Crop SelectionNIKITA BAGUL, DEEPIKA SHINDE, POOJA CHAUHAN, ALISHA WAGHMARE, PROF. AMRIN SHEIKH |
|
2 |
52 |
Design & Development of ARM-7 Based Embedded System for Temperature IndicatorSUDHINDRA.F, ANNARAO.S.J, VANI.R.M |
|
2 |
53 |
A Survey on an Effective Video Provisioning Scheme for Content Delivery NetworkSURAJ B. PATIL, PROF. SANTOSH T. WAGHMODE |
|
1 |
54 |
An Unique Approach for Private Keyword Search Over Encrypted Data in Cloud ComputingG.VASAVISUDHA, N.ASHAJYOTHI |
|
1 |
55 |
Multi-Scale Hashing of Nearest Keyword Search in Multi-Dimensional DatasetsCHINNI BALAVIJAYA DURGA, DR. G. RAMA MOHAN BABU.M.TECH.,PH.D |
|
1 |
56 |
Implementing an I2C Master Bus Controller in a FPGAMANGESH SHINDE |
|
1 |
57 |
An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots: An OverviewRAHILA A. SAYEDA, PROF. SHARDHA KHONDE
|
|
2 |
58 |
Online Subjective Answer Text Matching Using Semantic Approach: An OverviewSHWETA V. DEOTARE, PROF. RUBEENA A. KHAN |
|
2 |
59 |
Leveraging File Replication in Data-Intensive Clusters with Energy AdaptabilityANKITA D. GAIKWAD, PROF.K.N.SHEDGE |
|
1 |
60 |
Survey on Forecasting Events over Social Media using Chrono-Spatial ModelANKIT KABRA, PROF. M. P. WANKHADE |
|
1 |
61 |
A Survey on Emotion Recognition on TwitterNIRMALA N. PANSARE, PROF. KURHADE N. V. |
|
2 |
62 |
A Survey on Computer Vision and Image ProcessingTANMAYI SAMANT |
|
3 |
63 |
Artificial Intelligence and Its Related Application in the Cognitive LearningANURAG SINGH, KRISHNA YADAV, AMOGH CHAVAN, PRANAY RAO, YASH SHAH, SOHAM THAKER |
|
6 |
64 |
Automated Pesticide Spraying, Bird Repellent and Watering System for AgricultureB.AISHWARYA, S.DILIP KUMAR |
|
1 |
65 |
Smart Supply Chain Management System for Apple fruits in IndiaRICHA OJHA, RISHABH OJHA, AMBER JAIN, PANKAJ JAIN |
|
1 |
66 |
A Survey on Emotion Based Music Recommendation System Using Facial RecognitionSAHIL THOOL, SHUBHAM GHODE, SAURABH SHAH, OMKAR NATE, Y.V.DONGRE |
|
6 |
67 |
A Review of an Online Fund Transfer System by Using Steganography and Visual CryptographySONALI M. BHAKARE, HIRENDRA R. HAJARE, CHHAYA C. PRASADB.E Student, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India Asst. Professor & HOD, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India B.E Student, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India |
|
2 |
68 |
Intelligent Fine-Grained Data Access with Attribute Based Reencryption Norms over Cloud PlatformC. SRIDEVI, V.MANJU |
|
5 |
69 |
Human Age Estimation through Face Recognition using Stacked Neural Network based Deep Learning ApproachKHEMCHANDRA PATEL, DR. KAMLESH NAMDEV |
|
2 |
70 |
Essentiality of Computer Basics for ChildrenDr. Abhilasha Alha |
|
2 |