International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-6 June   2017


S.No Paper Title / Authors Download Paper Downloads
1

Intelligent Detection for Cyber Phishing Attacks using Fuzzy Rule-Based Systems

PHOEBE BARRACLOUGH, GERHARD FEHRINGER
3
2

All-Optical 2R Regenerator Non-Linear Optic Based on the Mamyshev Model

FABIO B. DE SOUSA, ELIZETE R. SABINO, FABRÍCIO P. DA LUZ, JORGE E. DE OLIVEIRA, MARCOS B.C. COSTA
1
3

An Enhanced Image Denoising technique using Wavelet Threshold and Genetic Algorithm

SUDAMA SAHU, BHUPENDRA VERMA
1
4

A Review on Application of Adaptive Algorithms in Signal Processing

JYOTI KAURAV, DR. R.P. NARWARIA
3
5

Review of Scheduling Algorithm Followed in Parallel Environment

RAJITA SHARMA, GAGANDEEP SIANI
1
6

Review on Load Balancing Algorithms in Cloud Computing

SHASMITA PANIGRAHI, DHANRAJ POOJARY, DR MURLIDHAR DHANAWADE
2
7

Infrastructure as a Service with Apache CloudStack: A Study

SUPRABHA MAHADIK, NASHRAH GHAWTE, DR. MURLIDHAR DHANAWADE
2
8

DDOS Detection and Denial Using Third Party Application in SDN

ROSHNI MARY THOMAS, DIVYA JAMES
1
9

Design and Implementation of a Network Security Model for Campus Network Using Various Securities

VARSHA, TOMAR KULDEEP
2
10

A Comprehensive Study on Distributed Data Mining and Learning Algorithms

SANJAY KUMAR SEN, DR. B.K. RATHA.
1
11

The Survey – Predicting an Education Performance of Students Based on Data Mining Techniques

M. MAYILVAGANAN, D. KALPANADEVI
3
12

Secure User Data and Images on Content Sharing Sites Using Virtual Password and APP Scheme

PRIYANKA M. LOKHANDE
1
13

Performance Analysis of Real Time Task Scheduling Algorithm

GIRISH S. THAKARE, DR. PRASHANT. R. DESHMUKH
1
14

Parameter Estimation of Nonlinear System - VanderPol Oscillator using Neural Networks

YUGCHHAYA DHOTE
3
15

Performance Comparison of OFDM System with Different Modulation Schemes Using ISP Pulse Shaping Technique

OMKAR PABBATI, DIVYANGNA GANDHI
1
16

Design and Analysis of Low Power Temperature Sensor using Static Latch D Flip-Flop

GANGOTRI PAREEK , GAJENDRA SUJEDIYA
1
17

Optimize Circuit and Compare of 8 X 8 Wallace Tree Multiplier Using GDI and CMOS Technology

PRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA
1
18

Design and Analysis of 8 X 8 Wallace Tree Multiplier using GDI and CMOS Technology

PRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA
1
19

Technique for Sentiment Analysis from Twitter Data

CHANDAN ARORA , DR. RACHNA
3
20

Improved Load Balancing Algorithm for Reducing Idle Iteration in Virtual Machine on Hadoop Distributed File System (HDFS)

G KANMANI, E JAYABALAN
3
21

Speed Estimation of an Induction motor using Model Reference Adaptive Control

GOPI N
1
22

Comparative Analysis of Different Feature Extraction Techniques used in Face Recognition – A Review

NISHA, MAITREYEE DUTTA
2
23

Design A Smart Relay in Advance Metering Infrastructure Using Matlab

NEHA CHAPKE, PROF. SUYOG DAHULE
1
24

Implementation on Overhead Reduction by Spatial Reusability in Multi-Hop Wireless Network

PRAVIN V. JUNGHARE , PROF. U. R. GODASE
1
25

Comparative Study of RGB, HSV & YCbCr Color Model Saliency Map

SHRUTI V. GHINMINE, PROF. AMOL SAPKAL
1
26

Elliptical Curve Cryptography Using RSD

ASHISH S.YADAV
1
27

Analysis of Underwater Data using DNN

DR. S.R.GANORKAR, PRIYANKA A. WANKHADE
1
28

Secure Fragment and Replica Allocation of Data Using Geo-Social Attributes in Cloud

NIDHI JAIN, PROF. ABHIJIT JANARDAN PATANKAR, DR. KSHAMA V. KULHALLI, DR.KOTRAPPA SIRBI
1
29

Cooperative Collision Free Packet Scheduling for Under Water Acoustic Sensor Network Localization

J. SUBBARATNAMMA, U. DHANUNJAYA
4
30

A Novel Dictionary Selection Algorithm to Increase the Instruction Match Rates

K.ISHRATH AFRIN, SRI P.MURALI KRISHNA
1
31

A Framework for Preservation of Cloud User's Data Privacy

PANKAJ SINGHAI, PROF. SAURABH SHARMA
2
32

A Review on Data Security and Privacy Issues in Cloud Computing

AKANKSHA AGRAWAL, DR. NITESH DUBEY
2
33

Survey Paper on Data Privacy Issues of Cloud Computing

SHEFALI RAI, DR. NITESH DUBEY
2
34

A Survey Paper on "Detecting Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems"

PRIYANKA BHAGWAN PATIL, GANESH DHANOKAR
1
35

Pattern Driven Internal Intrusion Detection and Protection System Using Data Mining and Forensic Techniques

DIPALI VIJAY KARCHE, PROF. AMRIT PRIYDARSHI
1
36

Sensitivity Analysis of Immersion Corrosion Parameters in WC–10CO–4Cr Coated Brass Alloy for Extended Surfaces

B. GURUPRASAD, S. GANESAN
1
37

Proposition of a Hybrid Approach for Sentiment Analysis of Travel Domain Data

A SRINIVAS, M HANUMANTHAPPA
2
38

A Systematic study on Load balancing in Distributed Computing

IMMIDISETTY DEEPIKA, BADAM SRUJANA, SALINA ADINARAYANA
5
39

A Survey on Two Level QR Code Authentication Using Image Encoding Technique

TAHEMEENA GUNJARGE, KAILAS TAMBE
1
40

Survey on Aging-Aware Reliable Multiplier Design Using Adaptive Hold Logic

PRATIK CHUNARKAR , DR.M.B.MALI
1
41

Fast Image Transmission by Using Byte Rotation Algorithm in Network Security

APURVA P. WAGHMARE, PROF. P. R. LAKHE
1
42

Effects of ImpingementAngleinErosion Rate of HVOF (WC-Co-Cr) Coated Navel Brassin Water Jet Erosion

K.MURUGAN, S.KARTHIKEYAN
1
43

Enhanced Image Steganography using Texture Synthesis

RASHMI A.SONAWANE, DIPTI SONAWANE
2
44

A Comparative Study on LEACH Protocol for Wireless Sensor Network

DR . S. G. SANTHI , N. TAMILARASI
1
45

Improving Speed and Energy Efficiency of Cognitive Radios using Cross layer Multichannel Routing and Compression

SAPANA E. LOHABARE , SUMIT R.VAIDYA
1
46

Optimizing Energy and Delay in Multichannel Cognitive Radios with Link Maintenance

SAPANA E. LOHABARE , SUMIT R.VAIDYA, P. D.BHIRANGE
1
47

Music and Mood Detection using BoF Approach

HARSHALI NEMADE, DEIPALI GORE
3
48

Selections from the History of Air Pollution and Modelling its Data in Countryside and Urban Environment Using Genetic Algorithm

YUVRAJ KSHIRSAGAR, R.W. GAIKWAD
2
49

A Cooperative Bait Detection Approach in MANET to Detect Collaborative Attacks by Malicious Nodes

SWAPNIL WAGHMARE, PROF. MININATH NIGOT
1
50

Vulnerability Analysis and Tracking of Covert Malicious Software Launching

SURABHI DUBEY
1
51

Behavioral Analysis of Candidates using Sentiment Analysis and Emotion Mining for Recruitment

SAGAR S. PATIL, PRAVIN S. GAME
1
52

Optimal Design and Analysis of 12T MTCMOS and MCAM Using VLSI

SNEHA OAK
1
53

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY
1
54

A Study on Early Prevention and Detection of Breast Cancer using Data Mining Techniques

SUMALATHA.G, ARCHANA.S,
1
55

An Identity Combined With Attribute Based Proxy Uploading and Integrity Checking in Public Cloud

PALLAVI S. KAULAGE, PROF. DR. S. N. KINI
3
56

System Generator based area Reduction of IIR Decimation Filter using Merged Delay Transformation

SMITHA G L, MEHARUNNISA S P
1
57

A Review on Cognitive Radio Detection Technologies

DEEPSHIKHA BHATI
2
58

HuBot – Voice Controlled Human Assistant

HARSH BHATIA, ZARANA MATANI, PRIYANK BHATT, YASHNASARPURI
2
59

A Review on Security Threats and Cryptographic Solutions in Cloud Computing

VARSHA K, RACHEL MATHIAS
2
60

Implementation of deduplication scheme for Encrypted Data in Cloud

AISHWARYA M B , ASHRITHA A, CHETANA C H, MAMATHA S, SNIGDHA SEN
1
61

Low Power and High Speed CI_CSKA Design

SONAL AGRAWAL, SHRADDHA SHRIVASTAWA
2
62

A Review on DCT and DWT based Image Compression Techniques

SUMANDEEP KAUR, ER. ARSHDEEP SINGH
1
63

A Secured body Sensor healthcare Monitoring System for Elderly Peoples

JAHNAVI V , P KOKILA, SHRUTHI T S , SAMRADHA RAO, SUJAN KUMAR
2
64

Survey on Defect Prediction and its Effect on Software Quality

PRABUJEET KAUR, DHARMENDRA LAL GUPTA
3
65

Image Classification using Multikernel Learning Algorithm

HARSHITHA L, DR.V S KRUSHNASAMY
1
66

Measuring Conceptual Object Distance through Sensors using Raspberry pi

CHARULATA INGLE
1
67

Robust Authentication Scheme for Graphical Password

SNEHAL TARKESHWAR AMBADE, PROF. JAGDISH PIMPLE
1
68

IoT based Survey on Healthcare and Agriculture

HARI PRIYA.B, NANDHINI.S
4
69

Adoption of Open source on Darbar Group of Institution - Impact and Challenges

PRAVEEN BADAMI, SHREYAS N KUTTY
2
70

Towards Privacy Preservation of Kernel-Based Data Mining Systems from Insider Collusion Attack

RUPESH SAMANT, U. H. WANASKAR
1
71

A Survey: Different Techniques in Image Super Resolution

JETASHRI J.SHINDE, PROF. A.S.SHIRSAT
2
72

A Survey On "Image Retargeting Quality Assessment: A Backward Registration Approach"

SAMRAH SHEIKH, ANIL. S. SHIRSAT
1
73

A Review on Dynamic Stand-Alone Gas Detection System

DHOKTE RENU GAJANANRAO, M. H. NERKAR, ANCHAL KHADSE
1
74

Shared Spreadable Cloud Data with Efficient Group User Revocation

PHASALE PRIYANKA, DR.RANMALKAR VRUSHALI

Abstract PDF 

3
75

Design and Implementation of (15,7) BCH Encoder Using labVIEW and its Transmission using NI USRP

PROF. M. D. BOBADE, ASHRU JADHAV, RACHANA KHAMAMKAR
4
76

Brain Activity Detection and Analysis Using EEG

VARUN VALLABHAN
1
77

An IOT Based Health Care Monitoring System-A Review

SNEHA N. MALOKAR, SAMADHAN D. MALI
3
78

High Performance 60 GHz LNA Design for Variable Gain Amplifier by Using 150 nm GaAs Technology

ABHISHEK G GADE, DR. SANJEEVANI K SHAH
1
79

Energy Saving Scheme of Wireless Sensor Network with Mobile Sink

MAHESHWARI C.SHINDE, PROF.M.M.WANKHADE
1
80

Interactive Interface for DC Motor using GUI with Raspberry Pi Controller

NITI RAJENDRA PATEL
1
81

Automatic Facet Extraction for Search Navigation

DUHITA PAWAR, PROF. VINA M. LOMTE
1
82

Smart Internet Bot: A Topic-Specific Crawler for locating Deep Data of Web

DEEPALI R. DHAYGUDE, PROF. P. B. MALI
2
83

Video-Based Human Action Recognition: Comparative Analysis of Feature Descriptors and Classifiers

AISHWARYA BUDHKAR, NIKITA PATIL
11
84

Face Aging Effect Using Sparse Representation

SONAL AJMIRE, KARUNA BAGDE, PRABHAKAR RAMTEKE
1
85

A Survey on Securing Logistics System with the Implementation of Digital Signature

MADHURI MALI, PROF. SANTOSH WAGHMODE
2
86

Grain Condition Monitoring and Controlling System-A Review

ANITA M. JADHAV, MAKARAND N. KAKATKAR
1
87

Real Time Parking Guidance System

POOJA POWAR , PROF. RAJENDRA BABAR
1
88

Content Based Publisher/Subscriber Cloud Computing System using Event Matching System

VINOD N. ALONE, SANJAY B. WAYKAR
1
89

Obstacle Detection from Unmanned Surface Vehicle using HOG

KALYANEE G. BARVE, SUNITA.S.LOKHANDE
1
90

Secure Data Analytics for Heart Disease Prediction

RAHUL S. BELLI, PROF. AJAY NADARGI
1
91

A Survey on Dynamic Routing in Wireless Sensor Networks under Black Hole Attack

CHARULATA C. GIRSAWALE , PROF. S. A. SHIRSATH
1
92

Study of Heart Disease Prediction Using Data Mining

GEETIKA SUNIL AGRAWAL, PROF. DINESH D. PATIL
1
93

Implementation on Data Acquisition by Reducing Energy Hole Evolution

SIDDHARTH SUNIL BURSE , PROF. M.V. NIMBALKAR
1
94

Survey and Comparisons of Low Power Multiplier Design in Term of Area, Power, Delay

POONAM P.KOKATE , PROF V.G.RAUT
1
95

Sentiment Analysis and Ranking of the Products based on the Reviews

MONIKA RANI HG, SOURABH JAIN, MOHD DANISH AHMAD, MOHIT SEHRAWAT, RISHABH RAJ
1
96

Implementation of ZHLS-GRP Hybrid Technique for Routing Protocols and BPSO in MANETs

HARSHPREET KAUR, SUKHJEET KAUR
1
97

Mining User-Aware Rare STPs in Document Streams

MR. SOMESH D. KALASKAR, DR. ARCHANA LOMTE
4
98

An Efficient Algorithm For Nearest Location Search Using Skyline Query Processing

POOJA RAO, MANGLESH KHANDELWAL, VINOD KUMAR YADAV
3
99

A Novel Technique in Review Selection Based on Micro Review

MUMTAJ.L.PATEL, PROF S.P.VIDHATE
1
100

Study on Mobile Cloud Computing Security Issues, Challenges and Preventive Measures

PROF. DEEPALI SHAH, PROF. SEEMA BHUVAN, GANESH THITE, TEJNARAYAN CHAUDHARY
4
101

Generation of Power using Perpetual Motion

SHAKUNTHALA, PROF. NAGABHUSHAN, R. RADHA
2
102

A Survey on Early Diagnosis of Lung Cancer using Classification Data Mining Technique

PRICILLA.S, PEBILA SHANI.S
1
103

Vehicular Protected Data Transmission over Dual Authentication Algorithm

UZMA FARHEEN, DR.RUKSAR FATIMA
1
104

Design and Implementation of Hybrid Algorithm for Load Balancing in Cloud Computing Environment

POOJA YADAV, PROF.ABHILASHA VYAS
1
105

Sharing Visual Traffic Information via Vehicular Cloud

DAMPETLA SREEKANTH1, MARI KIRTHIMA
1
106

Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

GHANSHAM R. RATHOD, PROF. SONALIPATIL
1
107

A Survey on Digital Pulse Oximeter

SHILPI
1
108

Entropy Optimized Feature-Based Bag-Of-Words Representation for Information Retrieval

SWAROOP A.KALE, PROF. H.A.HINGOLIWALA
1
109

Network Reconfiguration of Radial Distribution Network with DG using Cuckoo Search Algorithm

ANJALI G, R.CHIDANANDAPPA, DR.T.ANANTHAPADMANABHA
9
110

Survey On: "To Detect Ranking Fraud App with the Help of Discovery of Historical Record"

PRITAM PORATE, M. S. NIMBARTE
1
111

A Survey on "Water Monitoring System"

PRAGYA JAIN
1
112

Dual-Server Hybrid Key Encryption with Multi Keyword Search Scheme for Secure Cloud Storage

SNEHA R. GHORPADE, PROF. DR. S. N. KINI
2
113

A Secure Data Communication System Using Enhanced Cryptography and Steganography

DARSHANA PATIL, PROF. P. M. CHAWAN
1
114

FPGA based OFDM System Implementation using FFT

GAURI P. DESHMUKH, PROF. R. R. HARNE
1
115

Survey on OAuth as Bulwark for Authentication and Sanction

RAHUL RAVINDRA VISHWAKARMA, DR. JAYALEKSHMI K.R
4
116

Approach to an Efficient Vulnerability Management Program

SAMEER NANDA, UMASHANKAR GHUGAR
1
117

A Study on Li-Fi-Internet at the Speed of Light

V.J. RAJAKUMAR, S. BHUVANESHWARI
1
118

Patient's Health Monitoring System in Real Time using Raspberry pi board

YOGESH PANDURANG PARDHI, PROF. SHUBHANGI BORKAR
1
119

Traffic Sign Recognition Using Convolution Neural Networks

S.VISALINI
4
120

Low Phase Noise and Low PowerSelf-Oscillating Mixer in 130-nm CMOS Technology for S-band Applications

KAVITA A. DHUPPE, PROF. S. S. AGRAWAL
1
121

Studies Report on Cyber Law in India & Cybercrime Security

ANURAJ SINGH
2
122

Video Recommendation for user behavior Prediction using Big data Hadoop

SHRADDHA WALWADKAR, PROF. Y. B. GURAV
1
123

A Survey on the Role of Artificial Intelligence in FinTech

SHIVKUMAR GOEL, NIHAAL MEHTA
8
124

Machine Learning Algorithm for Process Performance Testing

BHARATI NADAR, MOHAMMED SAADAN KHAN, AMEYA PARKAR
4
125

Novel Digital Image Watermarking Using LWT-WHT-SVD in YCbCr Color Space

PIYUSH PANDEY, RAKESH KUMAR SINGH
1
126

Micro Controller Based Fault Detection and Protection of Induction Motor

RANA TASNEEM, NAGABHUSHAN PATIL
1
127

A Survey on Smart Phones with Near Field Communication Technology

P.AKALYA
1
128

Non-Linear Modelling and Performance Analysis of Robotic Arm using Fuzzy based Control System

SANDEEP S R, DR. V G SANGAM
1
129

IoT Enabled Smart Solar PV System

BALBHEEM NADPUROHIT, ROOPA KULKARNI, KADAPPA MATAGER, NAGARAJ DEVAR, RAHUL KARNAWADI, EDMUND CARVALHO
4
130

A Review on Event Matching Service for Content-Based Publish/Subscribe Systems

PROF. SAPNA JAIN CHOUDHARY , BHAWNA KOL
3
131

A Survey on Performance Analysis of Clinical Decision Support System

VIKRAM V. KALE, DR. B. R. BOMBADE
2
132

Optimal Load Balancing Technique for Resource Utilization in Cloud Computing Environment

SHRUTI KANOONGO, PROF. MAKARAND SAMVATSAR
1
133

Utilizing Online Reviews as a Source for Demographic Based Product Recommendations

SWATI UDMALE, VIDYA JAGTAP
1
134

Mining Twitter UGC to Analyse Box-Office Bombs

VILAS MAGARE
1
135

Q-Array Dimension for Private Message Sharing and Document Authentication

POONAM A. KHARE
1
136

A Survey Paper on Deduplication on Encrypted Big Data Using HDFS Framework

SABALE NIKITA C, PROF.N.G.PARDESHI
1
137

A Study on Different Attacks on Transport, Network and Data Link Layer in TCP/IP

S.JOSHNA, N.NISHANTH
3
138

Motion Detection In Video Using Local Binary Pattern Matching Algorithm

MANDEEP KAUR, JYOTI ARORA
1
139

Bi-Linear Approach for Efficient Encryption Using Short Ciphertexts

BUSHRA FATIMA, DR.ASMA PARVEEN
1
140

Microaneurysms Detection Digitally Retinal fundus images Automatically

AMIT GOSWAMI, VATSYA TIWARI
2
141

Automation of Water Pumping Station with Retrofitting Using PLC and SCADA Systems

SHAKUNTHALA, R. RADHA, SUMANTH KUMAR
2
142

Development of IoT Solution for Solar Based Charge Controller

TARUN B, DR.VENUGOPAL N
2
143

Secure Deduplication Using Distributed Convergent Key Management

NILAM PATIL, B. K. SARKAR
1
144

Human Detector- Unmanned Ground Vehicle

RUJUTA KULKARNI, VIVEK SABANWAR, SAYLI TODKARI
2
145

Automation of Endurance Testing Machine for C Arm of X Ray Scanner System using PLC

PRATIBHA SHUKLA, R. RADHA, SUNIL MANJUNATH
2
146

Performance Analysis of LBP& CLBP Based Texture Classification

AARTI A. CHAVAN, PROF. S.S. PATIL
5
147

Enhanced the Performance of Visual Cryptography Using Watermarking Technique

RANJAN KUMAR, PROF.AISHWARYA MISHRA
1
148

Supporting Privacy Protection in Personalized Web Search

SHUBHA.G.SANU, PUSHPA.S.TAMASE
1
149

Segmentation of Brain MRI Images using Gene-Fuzzy c Means Clustering Technique

B.PRASANTHI, DR. N.NAGAMALLESWARARAO
1
150

A Review on Multi-communication aided System for Physically Disabled People using Raspberry pi

CHANDRAKANT B.INGOLE, PROF.Y.S.CHINCHOLIKAR
1
151

Efficient Sentiment Analysis Using Hybrid PSO-GA Approach

ARCHANA SONAGI, DEIPALI GORE
3
152

Dynamic Spectrum Allocation for Network Utility and Throughput Maximization in Hybrid Access Cognitive Femtocell Network

SANJYOT GODASE, TRUPTI WAGH
2
153

An Enhanced Fuzzy Approach For Relay Node Selection in Manets

ER.HEMANT SHARMA, ER. NAVNEET KAUR
1
154

A Survey on Video Event Retrieval using Visual State Binary Embedding Model

KANCHAN S. DESHMUKH.
1
155

Robust and Secure Access Schema using Dual Factor Authentication and OTP using Android Interface

CHANNAPPA GOWDA D V
3
156

Detection and Removal of Web Application Vulnerabilities Using WAP Tool

SUJATA JADHAV, DR. B.K. SARKAR
1
157

Parallelized Mapreduce Technique for Improving Performance on Jobs and Resource Allocation

D. KULLAYAPPA , K F BHARATHI
4
158

A Survey on Artificial Intelligence and its Applications

DR. K. F. BHARATI
2
159

Precise Personal Identification by Combining Left and Right Palmprint Images

C. OBULESU, P.MAHESH
1
160

Recurrent Neural Network Approach for Understanding Short Texts

A.RAVINDRANATH REDDY, G. PRADEEP REDDY, P. DILEEPKUMAR REDDY
2
161

A Novel Verifiable Multi-Authority Secret Sharing Method in Cloud Storage

V.ARAVIND KUMAR, M.DHARANI KUMAR
1
162

Data Provenance for Tracking Data in Malicious Environment using LIME

SHEETAL SURYAWANSHI , I.R. SHAIKH
1
163

Image Processing Target tracking Robot using Raspberry pi

PALLAVI P. SARAIKAR, PROF. K.S.INGLE
1
164

Performance Evaluation of Multicore System through Mining Techniques

RAMDAS JARE, PROF. VRUSHALI DESALE
1
165

Big Data Mining from Social Networking Services using Spectral Clustering Algorithm

AZIZKHAN F PATHAN, DR. CHETANA PRAKASH
3
166

A Survey on Direction of Arrival Estimation for Closely Spaced Signal

NILESH B. KALE, D. G. GANAGE
1
167

A Survey of Various Occluded Object Detection Approach

RAMESH KUMAR SAHU, PROF SAVAN KUMAR OAD, DR. RAHUL DUBEY
1
168

Advance Detecting and Preventing Intrusions in Multi-Tier System

SEEMA V. GAJARE, PROF. BABAN H. THOMBRE
1
169

A Review on Cryptography, Data Mining &Machine Learning for Cyber Security

SHIKHA PAANWAAR
1
170

A Review over LTE for Vehicular Networking

SANDEEP SURYAWANSHI, PROF PRAMOD KUMAR PATEL , DR. RAHUL DUBEY
1
171

A Review On Different Image Splicing Techniques

MANISHA PANSARE, PROF. SUCHITA WALKE, PROF. VANITA MANE
2
172

Deliberation on Face Anti-Spoofing Techniques

DEVESHREE R. MORE, PROF.VANITA MANE
2
173

VLSI Implementation of AES 128 Algorithm for Secure Data Transmission

ANKUR CHANGELA
1
174

A Study on Challenges of Big Data and Smart Phone

URMILA KADAM, TRUPTI KALYANKAR, RUSHI DURGE, MAJUSHREE YEWALE
2
175

Multiprotocol Label Switching over IPv4 and IPv6

HARDIK PRAJAPATI
1
176

Identifying Diabetic Risk Factor Using Association rule Mining Based on Bottom up Summarization

JYOTI BHABAD, KISHORSHEDGE
2
177

Overview on Minimizing Distortion in Image Steganography

POONAM TALELE, PROF. VANITA MANE
3
178

Feature Extraction of Malware Infected Files and Malicious Datasets

HEMANT J. CHAUDHARI, PROF. M. S. MAHINDRAKAR
3
179

IOT Based Industrial Monitoring and Fault Detection Using Android

BHAGYASHREE DATTATRAY DAWARE, PROF. HATKAR A.A
1
180

SLIDEGen: Approach to Automatic Slide Generation

VISHAKHA N. PAWAR, PROF. K. N. SHEDGE
1
181

Implementation on Gender-Driven Emotion Recognition through Speech Signals for Ambient Intelligence Applications

RUSHIKESH GADE, S.R.GULHANE
1
182

A Survey on New Optimization Algorithm called Multi Frequency Vibration PSO and its Test Cases

V.SOWJANYA, T.KRANTHI KUMAR, S.SRIDEVI
1
183

Detection of Spam Reviews in Mobiles

SAIESH N. PRABHU VERLEKAR
2
184

Haar Wavelet based Iris Recognition System for Secure Access using MATLAB

PRANALI CHAVHAN, DR. SANTOSH B. PATIL
2
185

Microsoft Kinect and Sensory Data Fusion for Robust SLAM Using ROS

AMRUTHA DILIP SALUNKHE, PROF. M. N. KAKATKAR
1
186

A Review on the Deeper Aspects of 5G Wireless Technology

BHARAT
1
187

Cloud Computing Security Issues and Encryption Techniques: A Review

SIMMI LUTHRA
2
188

Design and Novel Approach for Ternary Decoder and Encoder Circuits

R.N.UMA MAHESH
1
189

Voice Recognition Home Automation System Based On ARM 11

ATUL MADHUKAR BORADE , PROF. PATIL U.V
1
190

Object Detection and Tracking Techniques: A Review

AKANKSHA SHARMA, DR. DEEPAK DEMBLA, SHEKHAR
7
191

Multiple Sensor Fusion and Classification for Moving Object Detection and Tracking

SHUBHAM V. AVACHAR, DR. S. D. LOKHANDE
1
192

Secure Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks

SIDDHARTH C SAWAI, PROF. S. N. SHELKE
1
193

A Speech-Based Just-In-Time Retrieval System

DEVYANI KOLHAL1, PROF. RITESH THAKUR
1
194

Dual Band 'I' Shaped MSA with Diffracted Ground Plane

MADANGOPAL SAHU, PROF. YUDHISHTHIR RAUT, PROF. PRATEEK WANKHADE
3
195

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY
2
196

ICT in Advanced Education for the 21st Century: ICT as Change Specialists for Instruction

DR.LAKSHMI
1
197

Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks- A Survey

NANDHINI, M. PRAVEENA MCA,M.PHIL
1
198

Fractal Image Compression using Modified Tiny Block Size Processing Algorithm and Quantum Search Algorithm

RUTUJA S. MALEWAR, PRASHANT Y. SHENDE
1
199

Improving Efficient Reliability Based Secure Deduplication Technique on Encrypted Big Data

K UMA, E JAYABALAN
3
200

Security and Efficient Routing with Mesh Networks using PASER

TANUSHREE LOTHE, PROF. P. B. MALI
1
201

Otsu Image Segmentation Algorithm: A Review

KHUSHBU, ISHA VATS
2
202

Indoor Navigation System to the Visually Impaired People using Visible Light Communication Technology

MARITA R. MIRANDA
1
203

FPGA Based Brushless DC Motor Control

SNEHAL BETALE, JIGAR LODHA
1
204

Two Level Deduplication Using SHA-256 Algorithm for Resemblance Detection

ROHINI S MAHAJAN, PROF. K. D. BAMANE
7
205

A Survey on Distributed Cooperative Spectrum Sensing for Cognitive Radio Network

VARSHA A. MARTANDE, S. A.SHIRSAT
1
206

Drug Reviews Using Data Mining Model

ABHIMANYU D. SANGALE, PROF. P.N.KALAVADEKAR
3
207

Effective Energy Path Based on PDORP Routing Protocol for WSN

SWAPNALI G. LATAKE, PROF S.V.TODKARI
1
208

A Heuristic Based SLA and Energy Efficient for Virtual Machine Allocation in Cloud Computing

T THILAGAM, M MALATHI
2
209

Implementation of Digital Signature Using Date Time Keyed HMAC Algorithm

MADHURI MALI, PROF. SANTOSH WAGHMODE
1
210

Survey on Token Based Authentication in Cloud Computing

UNNATI AWASTHI, PROF. ASHOK VERMA
1
211

Token Based Authentication Using Hash Key, Session And Javamail Api

UNNATI AWASTHI
1
212

Analysis on Influence of Mobility Models on the Performance of Routing protocols in Wireless Mobile Ad-hoc Networks

MOHINI M. ADE, PROF.S.S.ASOLE
1
213

IoT Based Wireless Sensor Node for Mine Safety Application

PRATIK KINHIKAR, DR.V.N.NITNAWARE, PROF.S.K.SHELKE
1
214

Analysis of Low Power D Flip-Flop and Latches for Reduced Power

AKASH S. BAND, VISHAL D. JAISWAL
1
215

Survey of Segmentation Procedures for Detecting Micro aneurysms

DERE DHANASHRI D , S.B.ANDRE
1
216

Finding Shortest Path in All Tours of a TSP Using Dynamic Candidate Set

SONIA RAJPUT, NAGENDRA KUMAR
1
217

Robot Manipulator for 3D Surgical Instrument Singulation in Cluttered Environment

PRIYANKA PAWAR, CHETAN NEVE
1
218

Secure Multi-Keyword Search Scheme for Cloud Data

VAIBHAVI KULKARNI, PROF. PRIYA PISE
1
219

FPGA Based Brushless DC motor Control

SNEHAL BETALE, JIGAR LODHA
1
220

Detection of Particles from Particle Cluster using Hough Transform

MAYUR G. ARORA, S.S. LOKHANDE
1
221

Stock Market Prediction System using Back Propagation andC4.5 Algorithm

KALYAN DANI, DR.BASANT TIWARI
1
222

Energy Efficient Reliable Data Dissemination in Mobile Coordinated WSN

YOGITA VEER, SACHIN TODKARI
1
223

Cotton Leaves Disease Recognization by Multiple Classifiers

KAJAL P.VISRANI, HARSHAD PATIL
2
224

Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue Stability

DURGA S. NIKAM, PROF. M. M. WANKHADE
1
225

Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue Stability

DURGA S. NIKAM, PROF. M. M. WANKHADE
1
226

Prediction of Diabetes Risk Factor Using Back Propagation and C 4.5 Algorithm

APARNA PHALAK, PRITI SHARMA
2
227

Modified Machine Learning Approach for Diabetes Risk Factor Detection

TEJAL A. PATIL, SWATI A. PATIL
1
228

Improving Direct Mapped Cache using Victim Cache

SUYOG S. KANDALKAR
1
229

Analysing and Predicting Social Impact of Tweets Using Tweet Segmentation

SATISH DHAYTADAK, PROF.VRUSHALI DESALE
2
230

A Fast and Area Efficient Cyclic Redundancy Check-Based Decoder for Software Defined Radio

R.D.FATING, S.S.JAIN
2