S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Survey of Machine Learning ApplicationsNAVDEEP SINGH JAGGI |
|
3 |
2 |
Studying Water Quality Monitoring System Basedon Wireless Sensor Networks (WSNs)NAHED A. ALNAHASH; MOHAMED A. ZOHDY |
|
4 |
3 |
A Secure and Reliable Video Watermarking based on Different Wavelet TransformDHANASHREE S. SHEDGE |
|
2 |
4 |
Enriching Text Clustering through Cognitive Concept Based Model (CCBM) by Ensemble Neural Learning MethodK.SANGEETHA, M.V. SAYINI |
|
1 |
5 |
Face Recognition under Different Lighting Conditions Using Multiple Feature FusionKOTHAMASU JAHNAVI, K.SATYA PRASAD |
|
2 |
6 |
A Survey on Big DataPRACHI JAIN, KANCHAN JHA |
|
2 |
7 |
A Study of Smarthome Tech using IoTS.DEVI MCA., M.PHIL |
|
1 |
8 |
A Comparative Study of Intrusion Detection System tools and TechniquesSONALI NEMADE, MADHURI A. DAREKAR, JYOTI BACHHAV, SUNANYNA SHIVTHARE |
|
2 |
9 |
STBC-OFDM using Compressive Sensing Theory for Wireless SystemsSRISHTI HAJARE, SHASHANK MANE |
|
1 |
10 |
3D Video Compression Using Split AlgorithmGOVTHAM T, PROF. VENKATESHAPPA |
|
1 |
11 |
Design and Implementation of Smart Energy MeterM SWAMY, R PRAVALLIKA |
|
1 |
12 |
Internet of Things for Innovative, Improved and Effective Smart Transport Management System in Smart CityVANI HARAVE, SNEHA BHARTI, R. LATHA |
|
2 |
13 |
A Survey on Plausible Approach to Mitigate Security Challenge in Cloud ComputingEJEM AGBAEZE, DR. NWOKORIE E.C., NJOKU DONATUS, DR. ODII J.N., NWOKOMA F.O. |
|
1 |
14 |
Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm using Improved Max-MinMONIKA MISHRA |
|
1 |
15 |
Betel Leaf Disease Detection Using Histogram of Oriented Gradients and Multiclass SVMDR. S. K. JAYANTHI, C.LALITHA |
|
2 |
16 |
Smart Temperature Sensor Design Using Voltage Controlled Ring OscillatorPRAVEEN KUMAR SHARMA, GAJENDRA SUJEDIYA |
|
1 |
17 |
Personal Authentication Using Finger Vein BiometricPOOJA CHAVAN, WRUSHALI MENDRE |
|
1 |
18 |
Proficient Majority Logic Fault Detection and Correction to Decode Mainstream Logic Design by Using EG-LDPC CodesK PAVAN KUMAR, R VASIM AKRAM |
|
1 |
19 |
Automated Glaucoma Screening based on CDR MeasurementSWAPNALI BHAPKAR, VAISHALI KULKARNI |
|
1 |
20 |
A Review of Mining High Utility PatternsDR. S. MEENAKSHI, P. SHARMILA |
|
1 |
21 |
Server Monitoring Using Windows Management Instrumentation and SNMPK.BHAGYASRI, K.VELAYUDHAM , P. SRIVYSHNAVI |
|
1 |
22 |
An Improvised Recommendation System on Top-N, Unrated and Point of Interest Recommendations Regularized with User Trust and Item RatingsMEENAKSHI, PROF. PRAVIN NIMBALKAR |
|
1 |
23 |
Keen Honeypot based E-Commerce Security ModelB.V.RAMA KRISHNA, B. SUSHMA |
|
1 |
24 |
Live Virtual Reality Streaming for Student PlatformNITA RADHAKRISHNAN |
|
1 |
25 |
An Adaptive Study for Different Methodology for Information HidingNAGESH SHARMA, NARENDRA KUMAR UPADHYAY, NIRMAL KUMAR SARASWAT |
|
6 |
26 |
A Deep Survey on Mutational Testing and Test Adequacy CheckJ SANTHOSH, MINI N |
|
1 |
27 |
Face Recognition Using Enhanced Gradient PatternsVISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA |
|
8 |
28 |
A Study on Wireless Ban Area Network for Health Care ApplicationsAMUTHAVEL.R, LALITHA.R |
|
2 |
29 |
An Algorithmic Study of Link Prediction in Social Network SitesSURYAKUMAR B, DR.E.RAMADEVI |
|
1 |
30 |
A Review on Google Glass TechnologyS.ARCHANA, N.NISHANTH |
|
1 |
31 |
A Review on Privacy Preserving Data Access Control Mechanism in Hybrid CloudsD. VISHWAKSEN REDDY |
|
3 |
32 |
Priority based Job Scheduling Algorithm in Cloud ComputingPAMINI JAIN, PROF. SAPNA CHOUDHARY |
|
1 |
33 |
Speech recognition using PNCC and AANNR. THIRUVENGATANADHAN |
|
1 |
34 |
Data Transmission between Two Laptops Using Optical SourceRITIKA PATHI |
|
1 |
35 |
SLL Reduction of Spherical Array Using ThinningK.NAGA UMA SARASWATHI, PROF. N.VENKATESWARA RAO |
|
1 |
36 |
Enhancing Machine Based Spam Detection Using TwitterSHINDE ASHA ASHOKRAO, SHITAL Y. GAIKWAD |
|
1 |
37 |
An Analysis of Transformation in Teaching and Learning MethodsSHABANA PARVEEN ANSARI, PROF. MONA DESHMUKH |
|
1 |
38 |
Load Balancing and its Challenges in Cloud Computing: A Review PaperJAYA CHOUBEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA |
|
1 |
39 |
A Survey on Web Services Security Concern, Solution and Its LimitationDIVYA PANDEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA |
|
3 |
40 |
Functionalities, Applications, Issues and Types of Data Mining SystemKIRAN KUMAR S V N MADUPU |
|
1 |
41 |
Secure Advanced E-Voting System using NFC and Thumb MatchingSHRADDHA R. HANDE, PROF. R. W. DESHPANDE |
|
1 |
42 |
LAL Methodology to Mitigate Denial of Service Attacks in Fictitious Nodes Used in OLSR ProtocolADITYA KATHERA, ADITHYA. R , G. GOKULNATH, TARUN RAJ MOTURU |
|
5 |
43 |
Overview of Blue Eyes TechnologySAMPURNA J , VINITHA R |
|
2 |
44 |
Analysis on Ransomwares and Prevention ApproachCHITESH RAI TULI, PANKAJ SHARMA, SAKSHI MALHOTRAB.Tech. Student (4th year), Department of Mathematics and Computing, Delhi Technological University, Delhi, India |
|
1 |
45 |
Framework for Key Visibility in Cloud Storage AuditingSAPNA R, RAKESHN, CHANDAN |
|
2 |
46 |
Implementation of a Monitoring Application in AndroidAKSHIT BATHEJA, AISHWARYA KOURANI, EKTA SIRWANI, MAAZ SIRKHOT |
|
2 |
47 |
An Exploratory Study To Find Importance Of Time Management in software Project ManagementVANDANA NEMANE, TRUPTI KULKARNI, PRITI JADHAV, RUSHI DURGE |
|
3 |
48 |
A Survey on Brain FingerprintingBHARTI SHARMA, DEEPESH AGRAWAL, AMOGH GADKARI , BHAVNA GUPTA |
|
1 |
49 |
A New Authorized Secure Schema for Data Deduplication Using Convergent Key in Cloud EnvironmentKOLU JAGADEESH, D.GOUSIYA BEGUM |
|
2 |
50 |
Machine Learning: Intersection of Statistics and Computer ScienceRakesh Rojanala |
|
2 |
51 |
A Novel Hybrid Scheme Based on Virtual Circuit Switching for Reduce Communication Latency and Power of Network on Chip(NoC).MANTRI KULLAYAPPA, DR. N. AV. PRASAD |
|
1 |
52 |
The Architecture of Wireless Sensor Network, its Issues and ApplicationsDIBYAJYOTI SAIKIA |
|
1 |
53 |
PAPR Reduction Using Hybrid Approach in OFDMPREETY MAHAJAN, HARJINDER KAUR, SWEETY |
|
1 |
54 |
Ensemble Model for Movie Success PredictionP.DEEPTHI, S.BHARGAV |
|
1 |
55 |
Deduplication of Encoded Big Data in Cloud StoragePALLAVI G. BANGALE, PROF REKHA KULKARNI |
|
5 |
56 |
Encoding and Decoding of LDPC Codes using Bit Flipping Algorithm in FPGAL. SHIVA NAGENDER RAO, K.VENKATA SATHYAJITH, Y. NAGARAJU YADAV |
|
1 |
57 |
An Approach towards Forming a Domain Dictionary to Ease the Process of Searching for Scholarly PublicationsADITYA KALIVARAPU, M KRANTHI KIRAN |
|
1 |
58 |
Machine Learning in Financial Fraud DetectionMAYURESH PATIL |
|
1 |
59 |
A Secure and Robust Image Watermarking Technique Based on DWT-DCT and Implemented Various Attacks on itTANIYA PANJIYAR, YOGENDRA KATIYAR |
|
2 |
60 |
A Survey on Social Media in EducationA.D.C. NAVIN DHINNESH, N.SUNDARESWARAN |
|
1 |
61 |
Efficient Unflaws of Secure Data Transmission Using s-BGPNITHYA.S, BABU.T.G |
|
1 |
62 |
A Study of Classification Techniques of Data Mining Techniques in Health Related ResearchK PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA |
|
3 |
63 |
Quantifying the Error in CLT for Accurate GRN GenerationShaik Jeelan Basha, L. Rangaswamy |
|
1 |