S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Smart Waste Collection System based on IoT (Internet of Things)SHASHANK SHUKLA, DR. NEERAJ SHUKLA |
|
2 |
2 |
Adaptive Image Registration Based Nonuniformity Correction Algorithm for Image FiltrationSHWETA WANMALI, PROF. R.U. SHEKOKAR |
|
1 |
3 |
An Investigation of Constructivism and Cognitive Load Theory for Computer Programming ToolPAYAL GOHEL, DR. KISHOR ATKOTIYA |
|
1 |
4 |
A Survey on Datamining Based Intrusion Detection SystemB.GAYATHRI, DR. ANTONY SELVADOSS THANAMANI |
|
1 |
5 |
Revocation Methodologies Using Cloud SecurityD. DEEPIKA, DR. ANTONY SELVADOSS THANAMANI |
|
1 |
6 |
Overview of Association Rule Based on Pattern MiningK.DHARANI, DR.ANTONY SELVADOSS THANAMANI |
|
1 |
7 |
Threshold Based Efficient Data Transmission in Hybrid Wireless NetworksN.SAMUNDEESWARI, DR.S. KUMARAVEL, M.NAMASIVAYAM |
|
8 |
8 |
Detecting and Preventing Distrustful URL in Multimedia NetworkR.RAJASEKAR, N.SURESH |
|
2 |
9 |
Ant Based Routing and QoS Effective Data Collection for Mobile Wireless Sensor NetworkL.POONGODI, DR.M.NAMASIVAYAM |
|
6 |
10 |
A Secure Message Exchange and Anti-Jamming Mechanism in MANETK.SRIMUNIRATHINAM, DR.S. KUMARAVEL, M.NAMASIVAYAM |
|
6 |
11 |
Ant-Based On-Demand Clustering Routing Protocol for Mobile Ad Hoc NetworksY.P.BALAGANESH, N.SURESH |
|
1 |
12 |
A Study on Security Aspects of Grid and Cloud ComputingDR. RANJIT D. PATIL, SUJATA P. PATIL, VIDYA H. BANKAR |
|
2 |
13 |
An Exploratory Study of Wi-Fi Security: Wireless Network EncryptionSATYAWAN KUNJIR, YOGESH INGALE, SATISHKUMAR MULGI, RUSHI DURGE, RUSHIKESH KULKARNI |
|
3 |
14 |
Design an Access Control Scheme for the WBANs Using the Given SigncryptionS.SANTHIYA, N.SATHEESKUMAR |
|
1 |
15 |
User Authentication and File Encryption Technique for achieving high Cloud Computing SecuritySANDEEP KUMAR PANDEY, SUJEET KUMAR TIWARI |
|
1 |
16 |
Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning AlgorithmRAJENDRA SONI, SUJEET KUMAR TIWARI |
|
2 |
17 |
Recognize Privacy and Ethical Sensitivity Knowledge by Hiding InferenceGOKULAN.S, SRIDHAR.D MCA., M.PHIL |
|
2 |
18 |
Recommending Learning Path of Student using Machine LearningPRITI B. JADHAV, DR. R. B. INGLE |
|
1 |
19 |
Intelligent Theme Based Integration of Medical CasesMANGESH MALI, DR. PARAG KULKARNI, PROF. VIRENDRA BAGADE |
|
1 |
20 |
A Survey Methods in Adaptive Background Subtraction in ImagesNEHA SAKPAL, MANOJ SABNIS |
|
3 |
21 |
Efficient Consumer Load Management by IOT TechniqueANAND S MELINAMANE |
|
1 |
22 |
Performance Analysis of MIMO Detection under Imperfect CSIPRAGYA VYAS, SHASHANK MANE |
|
2 |
23 |
Implementation of Context Aware Vehicular Handover Algorithm for Service Continuity in Heterogeneous Wireless NetworkSHWETA A. RAMTEKE, PROF. H. A. BHUTE |
|
1 |
24 |
Design of Targeted Advertising for Location Based Services and User Profile Based RecommendationNILIMA B.UMATE, PROF . V.G. BHUJADE |
|
7 |
25 |
Word Matching and Tweet Recognition for User TrackingMRUNALI OMPRAKASH THAKARE, PROF. MRUDULA NIMBARTE |
|
1 |
26 |
Comparative Study of Clustering Algorithms: Filtered Clustering and K-Means Cluttering Algorithm Using WEKAG.THANGARAJU, J.UMARANI, DR.V.POONGODI |
|
3 |
27 |
Sentiment Analysis using Ensemble ClassifierKAUSHIK HANDE |
|
3 |
28 |
Review of Phishing attacks and Anti Phishing ToolsDEEPASHREE K. MEHENDALE, RESHMA S. MASUREKAR, NEETA TAKAWALE, SHIBANI KULKARNI |
|
6 |
29 |
Reviewing Sentiment Analysis and Opinion Mining of Social MediaSHEENU CHOUDHARY, ER. DIPIKA ARORA |
|
2 |
30 |
A Study on Virtual Assistant in Artificial IntelligenceNEETA TAKAWALE, SHIBANI KULKARNI, DEEPASHREE MEHENDALE, RESHMA MASUREKAR, SHWETA AGARWAL |
|
4 |
31 |
Detection and Prevention of Grayhole, Blackhole and Wormhole Attacks in MANET Using IIRDAMANDEEP KAUR GREWAL, ER. GURPREET SINGH |
|
1 |
32 |
A Survey on Intrusion Detection TechniquesDR.V.PRAVEENA, M.SHOWMYAA, B.SATHYA |
|
5 |
33 |
Internet on Things Based Farm Watering SystemPUNAM WARKE |
|
3 |
34 |
Enhancing Power Quality to Sensitive Loads with Microgrid Using Fuzzy Logic ControllerNARASIM REDDY, P. SAIKUMAR |
|
2 |
35 |
Dynamic Proof of Storage Deduplication for Multi-User EnvironmentsM.MRUDHULA, M.V MANIKANTH |
|
1 |
36 |
Implementation of a More Secure Public Cloud ServiceYASH DHOLAKIA, SIDDHI KATE, SIDDHESH INAMDAR |
|
2 |
37 |
Simulation Software Selection using Principal Component AnalysisDR. ASHU GUPTA |
|
1 |
38 |
Comparative Analysis of Wavelet Transform Functions in Image Forgery DetectionMANJIMA MISHRA, DR.PREETI RAI |
|
1 |
39 |
Active RFID and MQTT based Child Health Monitoring systemANAHITA.G, ADITHYA KRISHNAN.G.R, JAGANNATH.S.S.V, LAVANYA SAI NARAYANAN |
|
2 |
40 |
Smart Home Using Bluetooth Low EnergyAAYUSHI KOTHARI, ANAR PANDYA |
|
1 |
41 |
A Survey of Spectrum Sensing Procedures in Cognitive Radio NetworkS.GAYATHRI PRIYA, DR. K.THILAGAM |
|
1 |
42 |
Scaling Factor Analysis of Snowfall Region in Aerial View Based On DBscan Algorithm or Data Clustering AlgorithmM.MAYILVAGANAN, R.MANICKAM |
|
1 |
43 |
Granulated Efficient Access Control for Tracery-Based Using Two-Factor Authentication in Cloud ComputingKASA DEEPA, J.RAGHUNATH, T.RAMAMOHAN |
|
1 |
44 |
Hashing and Enriching Short Texts Query Search Engine through Semantic SignalsPANDITI SANTHI, M.VENKATESH NAIK |
|
1 |
45 |
CA-Cellular Automa for Increase the Network Life Time Using Energy Aware Protocol in WSNA.SHARMILA, S.SIVAKUMAR |
|
2 |
46 |
Vision Based Human Computer Interaction Using Fingertip TrackingSUBHASH NEVHAL |
|
6 |
47 |
A Study on Opportunity and Challenges of EcommerceMALATI V. TRIBHUWAN, ASHWINI SATKAR, ASHWINI PATIL, ROHINI BHOWARE |
|
11 |
48 |
Segmenting Metals in Optical Microstructure Images using Haar FeaturesK. GAJALAKSHMI, S. PALANIVEL, S.SARAVANAN |
|
5 |
49 |
Collision Free Packet Transmission for LocalizationDR. V.VIJAYADEEPA, A. GEETHA |
|
3 |
50 |
Regression Model to Estimate Goals Scored By Football PlayersNEEL NIRAJ PATEL, MOHANRAAM S |
|
1 |
51 |
A Survey on Efficient Multicast Routing Over Secured Packet Maintenance in Wireless NetworksRAJKUMAR KALIMUTHU |
|
3 |
52 |
A Survey on Medically E-Prescription and Diagnosis Integration (MEDI)OMKAR MALWADKAR, SUHAS JAGDALE, VISHWAS LATKAR, YASH MADIKUNT, PRIYANKA KEDAR |
|
1 |
53 |
Efficient Cloud Storage System with Highly Scalable and Security for Big FileH. BINDU MADHAVI, R.SARAVANAN |
|
1 |
54 |
Remotely Sensed Image Approximation Using Tetrolet TransformSONALI SHANTARAM BANDAL, PROF. KALPANA AMRUTKAR |
|
1 |
55 |
Design and Analysis of a Novel СPW Fractal Ultra Wideband Monopole AntennaASHU PRIYA, PROF. GAURAV MORGHARE |
|
1 |
56 |
Weather Forecasting using Map-ReduceB.ANURAG, MANOJ PRAKASH, VAKEESH KANNA, PELASH CHOUDHARY |
|
3 |
57 |
Positioning of Wi-Fi Access Points for Optimum Coverage of Campus Wide NetworkANANT GAVALI, DR.RAMBABU VATTI, SHRADDHA GUPTE |
|
3 |
58 |
Parking Detection System Using IoTSWAPNA S. DESHPANDE, PROF. RENUKA S. GOUND |
|
1 |
59 |
Sharing Secure Data and Self-Destructing Scheme in CloudMOHAMMADI KAMPLEE, PROF B.R. SOLUNKE |
|
1 |
60 |
An Approach to Identify Credit Card Frauds through Support Vector Machine using Kernel TrickER. RITIKA WADHWA, ER. RITIKA MEHRA |
|
1 |
61 |
Android Shopping App using Augmented RealityAPURVA SHINDE |
|
1 |
62 |
Spelling Error Detection and Correction System for Punjabi Unicode using Hybrid ApproachRUPINDER KAUR, ER. JASDEEP SINGH MANN |
|
2 |
63 |
IoT- An Implementation of Top Technology TrendsVEMURI SREE REKHA, DR.R.PADMAVATHY |
|
1 |
64 |
Secrete Data Hiding In H.264/AVC 32 Compressed Video Bitstreams for Private Data ProtectionBHAGYASHRI RAUT, PROF.V.B.RASKAR |
|
1 |
65 |
Android Based Smart Toll System Using QR CodeMACHINDRAVETAL, PRAVIN GORE, NIKHIL PATIL, KIRANSAPATE, MANISHA SINGH |
|
1 |
66 |
Android Based Travel Route Recommendation Using Real Time PositioningPROF. P. R. KULKARNI, POONAM P. SHINDE, SNEHAL R. SONAWANE, ROHINI S. KOR, PRIYANKA S. KHATALE |
|
1 |
67 |
A Survey on E-learning by Using Gamification and Job AssistMINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR, VARSHA DANGE |
|
1 |
68 |
A Survey on Data Analytics, Predictions and Visualization of Crime Patterns in IndiaSHIVAM S. BHIRUD, SHRAVANI S. SWAMI, SHEKHAR S. PATIL, JYOTI SHARMA, SHITAL V. DABHADE |
|
2 |
69 |
Survey on Various Data Encryption Algorithms Used in Cloud SecurityS.SANDHYA , U.RESHMA, DR.V.PRAVEENA |
|
6 |
70 |
A Survey on IoT based Intelligent Fire Escape SystemHANISH SHETTY, YASH DHOLAKIA, KAUSTUBH DESHMUKH, AKSHAY CHILE |
|
1 |
71 |
Designing Efficient Ontologies for Organization DevelopmentDR. ABRAR S. ALVI |
|
1 |
72 |
Dynamic Virtual Machine Consolidation in Cloud Data Centers: A StudyTALVINDER SINGH, VARUN JAIN, SATISH BABU G, AMIT KUMAR |
|
1 |
73 |
Energy Harvesting Medium Access Control in Quality of Service with Wireless Body Area NetworkAGILLA.R, K.BASKAR, C.RADHAKRISHNAN, S.SATHEESH KUMAR |
|
1 |
74 |
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data- ReviewA.ANUSHA PRIYA, S.RANJANI |
|
1 |
75 |
An Exploratory Study of Magento and its FeaturesRUSHI DURGE, TRUPTI KULKARNI, URMILA KADAM, VANDANA NEMANE , RAHUL GAVHNE |
|
3 |
76 |
Audio Watermarking Based Data CryptographySWEETY KUMARI, PRINCY PATHAK |
|
1 |
77 |
Medical Disease Classification by Machine Learning with Cloud ComputingNINDIYA MAHAJAN, GURJEET KAUR |
|
1 |
78 |
Survey on Authentications Issues in Cloud ComputingVATSALA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA |
|
6 |
79 |
An Exclusive Survey on Big Data Analytics, Applications and ToolsRENU DWIVEDI, PROF. SATPAL SINGH, PROF. SUMIT NEMA |
|
1 |
80 |
A Survey Paper on Data Privacy in Cloud ComputingNIVEDITA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA |
|
3 |
81 |
A Survey of Intrusion Detection Systems in Cloud ComputingKIRTI RAMHARIYA, PROF. SOUMYA ASATI, PROF. SUMIT NEMA |
|
2 |
82 |
Review Paper of Digital Image Watermarking using Discrete Wavelet TransformVIPIN KUMAR, PROF. ANSHUL BHATIA |
|
2 |
83 |
Diagnosis of Fatigue using Deep Learning MethodS. Vigneswaran, K. Vinothkumar |
|
2 |