S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Intelligent Detection for Cyber Phishing Attacks using Fuzzy Rule-Based SystemsPHOEBE BARRACLOUGH, GERHARD FEHRINGER |
|
3 |
2 |
All-Optical 2R Regenerator Non-Linear Optic Based on the Mamyshev ModelFABIO B. DE SOUSA, ELIZETE R. SABINO, FABRÍCIO P. DA LUZ, JORGE E. DE OLIVEIRA, MARCOS B.C. COSTA |
|
1 |
3 |
An Enhanced Image Denoising technique using Wavelet Threshold and Genetic AlgorithmSUDAMA SAHU, BHUPENDRA VERMA |
|
1 |
4 |
A Review on Application of Adaptive Algorithms in Signal ProcessingJYOTI KAURAV, DR. R.P. NARWARIA |
|
3 |
5 |
Review of Scheduling Algorithm Followed in Parallel EnvironmentRAJITA SHARMA, GAGANDEEP SIANI |
|
1 |
6 |
Review on Load Balancing Algorithms in Cloud ComputingSHASMITA PANIGRAHI, DHANRAJ POOJARY, DR MURLIDHAR DHANAWADE |
|
2 |
7 |
Infrastructure as a Service with Apache CloudStack: A StudySUPRABHA MAHADIK, NASHRAH GHAWTE, DR. MURLIDHAR DHANAWADE |
|
2 |
8 |
DDOS Detection and Denial Using Third Party Application in SDNROSHNI MARY THOMAS, DIVYA JAMES |
|
1 |
9 |
Design and Implementation of a Network Security Model for Campus Network Using Various SecuritiesVARSHA, TOMAR KULDEEP |
|
2 |
10 |
A Comprehensive Study on Distributed Data Mining and Learning AlgorithmsSANJAY KUMAR SEN, DR. B.K. RATHA. |
|
1 |
11 |
The Survey – Predicting an Education Performance of Students Based on Data Mining TechniquesM. MAYILVAGANAN, D. KALPANADEVI |
|
3 |
12 |
Secure User Data and Images on Content Sharing Sites Using Virtual Password and APP SchemePRIYANKA M. LOKHANDE |
|
1 |
13 |
Performance Analysis of Real Time Task Scheduling AlgorithmGIRISH S. THAKARE, DR. PRASHANT. R. DESHMUKH |
|
1 |
14 |
Parameter Estimation of Nonlinear System - VanderPol Oscillator using Neural NetworksYUGCHHAYA DHOTE |
|
3 |
15 |
Performance Comparison of OFDM System with Different Modulation Schemes Using ISP Pulse Shaping TechniqueOMKAR PABBATI, DIVYANGNA GANDHI |
|
1 |
16 |
Design and Analysis of Low Power Temperature Sensor using Static Latch D Flip-FlopGANGOTRI PAREEK , GAJENDRA SUJEDIYA |
|
1 |
17 |
Optimize Circuit and Compare of 8 X 8 Wallace Tree Multiplier Using GDI and CMOS TechnologyPRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA |
|
1 |
18 |
Design and Analysis of 8 X 8 Wallace Tree Multiplier using GDI and CMOS TechnologyPRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA |
|
1 |
19 |
Technique for Sentiment Analysis from Twitter DataCHANDAN ARORA , DR. RACHNA |
|
3 |
20 |
Improved Load Balancing Algorithm for Reducing Idle Iteration in Virtual Machine on Hadoop Distributed File System (HDFS)G KANMANI, E JAYABALAN |
|
3 |
21 |
Speed Estimation of an Induction motor using Model Reference Adaptive ControlGOPI N |
|
1 |
22 |
Comparative Analysis of Different Feature Extraction Techniques used in Face Recognition – A ReviewNISHA, MAITREYEE DUTTA |
|
2 |
23 |
Design A Smart Relay in Advance Metering Infrastructure Using MatlabNEHA CHAPKE, PROF. SUYOG DAHULE |
|
1 |
24 |
Implementation on Overhead Reduction by Spatial Reusability in Multi-Hop Wireless NetworkPRAVIN V. JUNGHARE , PROF. U. R. GODASE |
|
1 |
25 |
Comparative Study of RGB, HSV & YCbCr Color Model Saliency MapSHRUTI V. GHINMINE, PROF. AMOL SAPKAL |
|
1 |
26 |
Elliptical Curve Cryptography Using RSDASHISH S.YADAV |
|
1 |
27 |
Analysis of Underwater Data using DNNDR. S.R.GANORKAR, PRIYANKA A. WANKHADE |
|
1 |
28 |
Secure Fragment and Replica Allocation of Data Using Geo-Social Attributes in CloudNIDHI JAIN, PROF. ABHIJIT JANARDAN PATANKAR, DR. KSHAMA V. KULHALLI, DR.KOTRAPPA SIRBI |
|
1 |
29 |
Cooperative Collision Free Packet Scheduling for Under Water Acoustic Sensor Network LocalizationJ. SUBBARATNAMMA, U. DHANUNJAYA |
|
4 |
30 |
A Novel Dictionary Selection Algorithm to Increase the Instruction Match RatesK.ISHRATH AFRIN, SRI P.MURALI KRISHNA |
|
1 |
31 |
A Framework for Preservation of Cloud User's Data PrivacyPANKAJ SINGHAI, PROF. SAURABH SHARMA |
|
2 |
32 |
A Review on Data Security and Privacy Issues in Cloud ComputingAKANKSHA AGRAWAL, DR. NITESH DUBEY |
|
2 |
33 |
Survey Paper on Data Privacy Issues of Cloud ComputingSHEFALI RAI, DR. NITESH DUBEY |
|
2 |
34 |
A Survey Paper on "Detecting Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems"PRIYANKA BHAGWAN PATIL, GANESH DHANOKAR |
|
1 |
35 |
Pattern Driven Internal Intrusion Detection and Protection System Using Data Mining and Forensic TechniquesDIPALI VIJAY KARCHE, PROF. AMRIT PRIYDARSHI |
|
1 |
36 |
Sensitivity Analysis of Immersion Corrosion Parameters in WC–10CO–4Cr Coated Brass Alloy for Extended SurfacesB. GURUPRASAD, S. GANESAN |
|
1 |
37 |
Proposition of a Hybrid Approach for Sentiment Analysis of Travel Domain DataA SRINIVAS, M HANUMANTHAPPA |
|
2 |
38 |
A Systematic study on Load balancing in Distributed ComputingIMMIDISETTY DEEPIKA, BADAM SRUJANA, SALINA ADINARAYANA |
|
5 |
39 |
A Survey on Two Level QR Code Authentication Using Image Encoding TechniqueTAHEMEENA GUNJARGE, KAILAS TAMBE |
|
1 |
40 |
Survey on Aging-Aware Reliable Multiplier Design Using Adaptive Hold LogicPRATIK CHUNARKAR , DR.M.B.MALI |
|
1 |
41 |
Fast Image Transmission by Using Byte Rotation Algorithm in Network SecurityAPURVA P. WAGHMARE, PROF. P. R. LAKHE |
|
1 |
42 |
Effects of ImpingementAngleinErosion Rate of HVOF (WC-Co-Cr) Coated Navel Brassin Water Jet ErosionK.MURUGAN, S.KARTHIKEYAN |
|
1 |
43 |
Enhanced Image Steganography using Texture SynthesisRASHMI A.SONAWANE, DIPTI SONAWANE |
|
2 |
44 |
A Comparative Study on LEACH Protocol for Wireless Sensor NetworkDR . S. G. SANTHI , N. TAMILARASI |
|
1 |
45 |
Improving Speed and Energy Efficiency of Cognitive Radios using Cross layer Multichannel Routing and CompressionSAPANA E. LOHABARE , SUMIT R.VAIDYA |
|
1 |
46 |
Optimizing Energy and Delay in Multichannel Cognitive Radios with Link MaintenanceSAPANA E. LOHABARE , SUMIT R.VAIDYA, P. D.BHIRANGE |
|
1 |
47 |
Music and Mood Detection using BoF ApproachHARSHALI NEMADE, DEIPALI GORE |
|
3 |
48 |
Selections from the History of Air Pollution and Modelling its Data in Countryside and Urban Environment Using Genetic AlgorithmYUVRAJ KSHIRSAGAR, R.W. GAIKWAD |
|
2 |
49 |
A Cooperative Bait Detection Approach in MANET to Detect Collaborative Attacks by Malicious NodesSWAPNIL WAGHMARE, PROF. MININATH NIGOT |
|
1 |
50 |
Vulnerability Analysis and Tracking of Covert Malicious Software LaunchingSURABHI DUBEY |
|
1 |
51 |
Behavioral Analysis of Candidates using Sentiment Analysis and Emotion Mining for RecruitmentSAGAR S. PATIL, PRAVIN S. GAME |
|
1 |
52 |
Optimal Design and Analysis of 12T MTCMOS and MCAM Using VLSISNEHA OAK |
|
1 |
53 |
Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARY |
|
1 |
54 |
A Study on Early Prevention and Detection of Breast Cancer using Data Mining TechniquesSUMALATHA.G, ARCHANA.S, |
|
1 |
55 |
An Identity Combined With Attribute Based Proxy Uploading and Integrity Checking in Public CloudPALLAVI S. KAULAGE, PROF. DR. S. N. KINI |
|
3 |
56 |
System Generator based area Reduction of IIR Decimation Filter using Merged Delay TransformationSMITHA G L, MEHARUNNISA S P |
|
1 |
57 |
A Review on Cognitive Radio Detection TechnologiesDEEPSHIKHA BHATI |
|
2 |
58 |
HuBot – Voice Controlled Human AssistantHARSH BHATIA, ZARANA MATANI, PRIYANK BHATT, YASHNASARPURI |
|
2 |
59 |
A Review on Security Threats and Cryptographic Solutions in Cloud ComputingVARSHA K, RACHEL MATHIAS |
|
2 |
60 |
Implementation of deduplication scheme for Encrypted Data in CloudAISHWARYA M B , ASHRITHA A, CHETANA C H, MAMATHA S, SNIGDHA SEN |
|
1 |
61 |
Low Power and High Speed CI_CSKA DesignSONAL AGRAWAL, SHRADDHA SHRIVASTAWA |
|
2 |
62 |
A Review on DCT and DWT based Image Compression TechniquesSUMANDEEP KAUR, ER. ARSHDEEP SINGH |
|
1 |
63 |
A Secured body Sensor healthcare Monitoring System for Elderly PeoplesJAHNAVI V , P KOKILA, SHRUTHI T S , SAMRADHA RAO, SUJAN KUMAR |
|
2 |
64 |
Survey on Defect Prediction and its Effect on Software QualityPRABUJEET KAUR, DHARMENDRA LAL GUPTA |
|
3 |
65 |
Image Classification using Multikernel Learning AlgorithmHARSHITHA L, DR.V S KRUSHNASAMY |
|
1 |
66 |
Measuring Conceptual Object Distance through Sensors using Raspberry piCHARULATA INGLE |
|
1 |
67 |
Robust Authentication Scheme for Graphical PasswordSNEHAL TARKESHWAR AMBADE, PROF. JAGDISH PIMPLE |
|
1 |
68 |
IoT based Survey on Healthcare and AgricultureHARI PRIYA.B, NANDHINI.S |
|
4 |
69 |
Adoption of Open source on Darbar Group of Institution - Impact and ChallengesPRAVEEN BADAMI, SHREYAS N KUTTY |
|
2 |
70 |
Towards Privacy Preservation of Kernel-Based Data Mining Systems from Insider Collusion AttackRUPESH SAMANT, U. H. WANASKAR |
|
1 |
71 |
A Survey: Different Techniques in Image Super ResolutionJETASHRI J.SHINDE, PROF. A.S.SHIRSAT |
|
2 |
72 |
A Survey On "Image Retargeting Quality Assessment: A Backward Registration Approach"SAMRAH SHEIKH, ANIL. S. SHIRSAT |
|
1 |
73 |
A Review on Dynamic Stand-Alone Gas Detection SystemDHOKTE RENU GAJANANRAO, M. H. NERKAR, ANCHAL KHADSE |
|
1 |
74 |
Shared Spreadable Cloud Data with Efficient Group User RevocationPHASALE PRIYANKA, DR.RANMALKAR VRUSHALIAbstract PDF |
|
3 |
75 |
Design and Implementation of (15,7) BCH Encoder Using labVIEW and its Transmission using NI USRPPROF. M. D. BOBADE, ASHRU JADHAV, RACHANA KHAMAMKAR |
|
4 |
76 |
Brain Activity Detection and Analysis Using EEGVARUN VALLABHAN |
|
1 |
77 |
An IOT Based Health Care Monitoring System-A ReviewSNEHA N. MALOKAR, SAMADHAN D. MALI |
|
3 |
78 |
High Performance 60 GHz LNA Design for Variable Gain Amplifier by Using 150 nm GaAs TechnologyABHISHEK G GADE, DR. SANJEEVANI K SHAH |
|
1 |
79 |
Energy Saving Scheme of Wireless Sensor Network with Mobile SinkMAHESHWARI C.SHINDE, PROF.M.M.WANKHADE |
|
1 |
80 |
Interactive Interface for DC Motor using GUI with Raspberry Pi ControllerNITI RAJENDRA PATEL |
|
1 |
81 |
Automatic Facet Extraction for Search NavigationDUHITA PAWAR, PROF. VINA M. LOMTE |
|
1 |
82 |
Smart Internet Bot: A Topic-Specific Crawler for locating Deep Data of WebDEEPALI R. DHAYGUDE, PROF. P. B. MALI |
|
2 |
83 |
Video-Based Human Action Recognition: Comparative Analysis of Feature Descriptors and ClassifiersAISHWARYA BUDHKAR, NIKITA PATIL |
|
11 |
84 |
Face Aging Effect Using Sparse RepresentationSONAL AJMIRE, KARUNA BAGDE, PRABHAKAR RAMTEKE |
|
1 |
85 |
A Survey on Securing Logistics System with the Implementation of Digital SignatureMADHURI MALI, PROF. SANTOSH WAGHMODE |
|
2 |
86 |
Grain Condition Monitoring and Controlling System-A ReviewANITA M. JADHAV, MAKARAND N. KAKATKAR |
|
1 |
87 |
Real Time Parking Guidance SystemPOOJA POWAR , PROF. RAJENDRA BABAR |
|
1 |
88 |
Content Based Publisher/Subscriber Cloud Computing System using Event Matching SystemVINOD N. ALONE, SANJAY B. WAYKAR |
|
1 |
89 |
Obstacle Detection from Unmanned Surface Vehicle using HOGKALYANEE G. BARVE, SUNITA.S.LOKHANDE |
|
1 |
90 |
Secure Data Analytics for Heart Disease PredictionRAHUL S. BELLI, PROF. AJAY NADARGI |
|
1 |
91 |
A Survey on Dynamic Routing in Wireless Sensor Networks under Black Hole AttackCHARULATA C. GIRSAWALE , PROF. S. A. SHIRSATH |
|
1 |
92 |
Study of Heart Disease Prediction Using Data MiningGEETIKA SUNIL AGRAWAL, PROF. DINESH D. PATIL |
|
1 |
93 |
Implementation on Data Acquisition by Reducing Energy Hole EvolutionSIDDHARTH SUNIL BURSE , PROF. M.V. NIMBALKAR |
|
1 |
94 |
Survey and Comparisons of Low Power Multiplier Design in Term of Area, Power, DelayPOONAM P.KOKATE , PROF V.G.RAUT |
|
1 |
95 |
Sentiment Analysis and Ranking of the Products based on the ReviewsMONIKA RANI HG, SOURABH JAIN, MOHD DANISH AHMAD, MOHIT SEHRAWAT, RISHABH RAJ |
|
1 |
96 |
Implementation of ZHLS-GRP Hybrid Technique for Routing Protocols and BPSO in MANETsHARSHPREET KAUR, SUKHJEET KAUR |
|
1 |
97 |
Mining User-Aware Rare STPs in Document StreamsMR. SOMESH D. KALASKAR, DR. ARCHANA LOMTE |
|
4 |
98 |
An Efficient Algorithm For Nearest Location Search Using Skyline Query ProcessingPOOJA RAO, MANGLESH KHANDELWAL, VINOD KUMAR YADAV |
|
3 |
99 |
A Novel Technique in Review Selection Based on Micro ReviewMUMTAJ.L.PATEL, PROF S.P.VIDHATE |
|
1 |
100 |
Study on Mobile Cloud Computing Security Issues, Challenges and Preventive MeasuresPROF. DEEPALI SHAH, PROF. SEEMA BHUVAN, GANESH THITE, TEJNARAYAN CHAUDHARY |
|
4 |
101 |
Generation of Power using Perpetual MotionSHAKUNTHALA, PROF. NAGABHUSHAN, R. RADHA |
|
2 |
102 |
A Survey on Early Diagnosis of Lung Cancer using Classification Data Mining TechniquePRICILLA.S, PEBILA SHANI.S |
|
1 |
103 |
Vehicular Protected Data Transmission over Dual Authentication AlgorithmUZMA FARHEEN, DR.RUKSAR FATIMA |
|
1 |
104 |
Design and Implementation of Hybrid Algorithm for Load Balancing in Cloud Computing EnvironmentPOOJA YADAV, PROF.ABHILASHA VYAS |
|
1 |
105 |
Sharing Visual Traffic Information via Vehicular CloudDAMPETLA SREEKANTH1, MARI KIRTHIMA |
|
1 |
106 |
Multi-Keyword Ranked Search Scheme over Encrypted Cloud DataGHANSHAM R. RATHOD, PROF. SONALIPATIL |
|
1 |
107 |
A Survey on Digital Pulse OximeterSHILPI |
|
1 |
108 |
Entropy Optimized Feature-Based Bag-Of-Words Representation for Information RetrievalSWAROOP A.KALE, PROF. H.A.HINGOLIWALA |
|
1 |
109 |
Network Reconfiguration of Radial Distribution Network with DG using Cuckoo Search AlgorithmANJALI G, R.CHIDANANDAPPA, DR.T.ANANTHAPADMANABHA |
|
9 |
110 |
Survey On: "To Detect Ranking Fraud App with the Help of Discovery of Historical Record"PRITAM PORATE, M. S. NIMBARTE |
|
1 |
111 |
A Survey on "Water Monitoring System"PRAGYA JAIN |
|
1 |
112 |
Dual-Server Hybrid Key Encryption with Multi Keyword Search Scheme for Secure Cloud StorageSNEHA R. GHORPADE, PROF. DR. S. N. KINI |
|
2 |
113 |
A Secure Data Communication System Using Enhanced Cryptography and SteganographyDARSHANA PATIL, PROF. P. M. CHAWAN |
|
1 |
114 |
FPGA based OFDM System Implementation using FFTGAURI P. DESHMUKH, PROF. R. R. HARNE |
|
1 |
115 |
Survey on OAuth as Bulwark for Authentication and SanctionRAHUL RAVINDRA VISHWAKARMA, DR. JAYALEKSHMI K.R |
|
4 |
116 |
Approach to an Efficient Vulnerability Management ProgramSAMEER NANDA, UMASHANKAR GHUGAR |
|
1 |
117 |
A Study on Li-Fi-Internet at the Speed of LightV.J. RAJAKUMAR, S. BHUVANESHWARI |
|
1 |
118 |
Patient's Health Monitoring System in Real Time using Raspberry pi boardYOGESH PANDURANG PARDHI, PROF. SHUBHANGI BORKAR |
|
1 |
119 |
Traffic Sign Recognition Using Convolution Neural NetworksS.VISALINI |
|
4 |
120 |
Low Phase Noise and Low PowerSelf-Oscillating Mixer in 130-nm CMOS Technology for S-band ApplicationsKAVITA A. DHUPPE, PROF. S. S. AGRAWAL |
|
1 |
121 |
Studies Report on Cyber Law in India & Cybercrime SecurityANURAJ SINGH |
|
2 |
122 |
Video Recommendation for user behavior Prediction using Big data HadoopSHRADDHA WALWADKAR, PROF. Y. B. GURAV |
|
1 |
123 |
A Survey on the Role of Artificial Intelligence in FinTechSHIVKUMAR GOEL, NIHAAL MEHTA |
|
8 |
124 |
Machine Learning Algorithm for Process Performance TestingBHARATI NADAR, MOHAMMED SAADAN KHAN, AMEYA PARKAR |
|
4 |
125 |
Novel Digital Image Watermarking Using LWT-WHT-SVD in YCbCr Color SpacePIYUSH PANDEY, RAKESH KUMAR SINGH |
|
1 |
126 |
Micro Controller Based Fault Detection and Protection of Induction MotorRANA TASNEEM, NAGABHUSHAN PATIL |
|
1 |
127 |
A Survey on Smart Phones with Near Field Communication TechnologyP.AKALYA |
|
1 |
128 |
Non-Linear Modelling and Performance Analysis of Robotic Arm using Fuzzy based Control SystemSANDEEP S R, DR. V G SANGAM |
|
1 |
129 |
IoT Enabled Smart Solar PV SystemBALBHEEM NADPUROHIT, ROOPA KULKARNI, KADAPPA MATAGER, NAGARAJ DEVAR, RAHUL KARNAWADI, EDMUND CARVALHO |
|
4 |
130 |
A Review on Event Matching Service for Content-Based Publish/Subscribe SystemsPROF. SAPNA JAIN CHOUDHARY , BHAWNA KOL |
|
3 |
131 |
A Survey on Performance Analysis of Clinical Decision Support SystemVIKRAM V. KALE, DR. B. R. BOMBADE |
|
2 |
132 |
Optimal Load Balancing Technique for Resource Utilization in Cloud Computing EnvironmentSHRUTI KANOONGO, PROF. MAKARAND SAMVATSAR |
|
1 |
133 |
Utilizing Online Reviews as a Source for Demographic Based Product RecommendationsSWATI UDMALE, VIDYA JAGTAP |
|
1 |
134 |
Mining Twitter UGC to Analyse Box-Office BombsVILAS MAGARE |
|
1 |
135 |
Q-Array Dimension for Private Message Sharing and Document AuthenticationPOONAM A. KHARE |
|
1 |
136 |
A Survey Paper on Deduplication on Encrypted Big Data Using HDFS FrameworkSABALE NIKITA C, PROF.N.G.PARDESHI |
|
1 |
137 |
A Study on Different Attacks on Transport, Network and Data Link Layer in TCP/IPS.JOSHNA, N.NISHANTH |
|
3 |
138 |
Motion Detection In Video Using Local Binary Pattern Matching AlgorithmMANDEEP KAUR, JYOTI ARORA |
|
1 |
139 |
Bi-Linear Approach for Efficient Encryption Using Short CiphertextsBUSHRA FATIMA, DR.ASMA PARVEEN |
|
1 |
140 |
Microaneurysms Detection Digitally Retinal fundus images AutomaticallyAMIT GOSWAMI, VATSYA TIWARI |
|
2 |
141 |
Automation of Water Pumping Station with Retrofitting Using PLC and SCADA SystemsSHAKUNTHALA, R. RADHA, SUMANTH KUMAR |
|
2 |
142 |
Development of IoT Solution for Solar Based Charge ControllerTARUN B, DR.VENUGOPAL N |
|
1 |
143 |
Secure Deduplication Using Distributed Convergent Key ManagementNILAM PATIL, B. K. SARKAR |
|
1 |
144 |
Human Detector- Unmanned Ground VehicleRUJUTA KULKARNI, VIVEK SABANWAR, SAYLI TODKARI |
|
2 |
145 |
Automation of Endurance Testing Machine for C Arm of X Ray Scanner System using PLCPRATIBHA SHUKLA, R. RADHA, SUNIL MANJUNATH |
|
2 |
146 |
Performance Analysis of LBP& CLBP Based Texture ClassificationAARTI A. CHAVAN, PROF. S.S. PATIL |
|
5 |
147 |
Enhanced the Performance of Visual Cryptography Using Watermarking TechniqueRANJAN KUMAR, PROF.AISHWARYA MISHRA |
|
1 |
148 |
Supporting Privacy Protection in Personalized Web SearchSHUBHA.G.SANU, PUSHPA.S.TAMASE |
|
1 |
149 |
Segmentation of Brain MRI Images using Gene-Fuzzy c Means Clustering TechniqueB.PRASANTHI, DR. N.NAGAMALLESWARARAO |
|
1 |
150 |
A Review on Multi-communication aided System for Physically Disabled People using Raspberry piCHANDRAKANT B.INGOLE, PROF.Y.S.CHINCHOLIKAR |
|
1 |
151 |
Efficient Sentiment Analysis Using Hybrid PSO-GA ApproachARCHANA SONAGI, DEIPALI GORE |
|
3 |
152 |
Dynamic Spectrum Allocation for Network Utility and Throughput Maximization in Hybrid Access Cognitive Femtocell NetworkSANJYOT GODASE, TRUPTI WAGH |
|
2 |
153 |
An Enhanced Fuzzy Approach For Relay Node Selection in ManetsER.HEMANT SHARMA, ER. NAVNEET KAUR |
|
1 |
154 |
A Survey on Video Event Retrieval using Visual State Binary Embedding ModelKANCHAN S. DESHMUKH. |
|
1 |
155 |
Robust and Secure Access Schema using Dual Factor Authentication and OTP using Android InterfaceCHANNAPPA GOWDA D V |
|
3 |
156 |
Detection and Removal of Web Application Vulnerabilities Using WAP ToolSUJATA JADHAV, DR. B.K. SARKAR |
|
1 |
157 |
Parallelized Mapreduce Technique for Improving Performance on Jobs and Resource AllocationD. KULLAYAPPA , K F BHARATHI |
|
4 |
158 |
A Survey on Artificial Intelligence and its ApplicationsDR. K. F. BHARATI |
|
2 |
159 |
Precise Personal Identification by Combining Left and Right Palmprint ImagesC. OBULESU, P.MAHESH |
|
1 |
160 |
Recurrent Neural Network Approach for Understanding Short TextsA.RAVINDRANATH REDDY, G. PRADEEP REDDY, P. DILEEPKUMAR REDDY |
|
2 |
161 |
A Novel Verifiable Multi-Authority Secret Sharing Method in Cloud StorageV.ARAVIND KUMAR, M.DHARANI KUMAR |
|
1 |
162 |
Data Provenance for Tracking Data in Malicious Environment using LIMESHEETAL SURYAWANSHI , I.R. SHAIKH |
|
1 |
163 |
Image Processing Target tracking Robot using Raspberry piPALLAVI P. SARAIKAR, PROF. K.S.INGLE |
|
1 |
164 |
Performance Evaluation of Multicore System through Mining TechniquesRAMDAS JARE, PROF. VRUSHALI DESALE |
|
1 |
165 |
Big Data Mining from Social Networking Services using Spectral Clustering AlgorithmAZIZKHAN F PATHAN, DR. CHETANA PRAKASH |
|
3 |
166 |
A Survey on Direction of Arrival Estimation for Closely Spaced SignalNILESH B. KALE, D. G. GANAGE |
|
1 |
167 |
A Survey of Various Occluded Object Detection ApproachRAMESH KUMAR SAHU, PROF SAVAN KUMAR OAD, DR. RAHUL DUBEY |
|
1 |
168 |
Advance Detecting and Preventing Intrusions in Multi-Tier SystemSEEMA V. GAJARE, PROF. BABAN H. THOMBRE |
|
1 |
169 |
A Review on Cryptography, Data Mining &Machine Learning for Cyber SecuritySHIKHA PAANWAAR |
|
1 |
170 |
A Review over LTE for Vehicular NetworkingSANDEEP SURYAWANSHI, PROF PRAMOD KUMAR PATEL , DR. RAHUL DUBEY |
|
1 |
171 |
A Review On Different Image Splicing TechniquesMANISHA PANSARE, PROF. SUCHITA WALKE, PROF. VANITA MANE |
|
2 |
172 |
Deliberation on Face Anti-Spoofing TechniquesDEVESHREE R. MORE, PROF.VANITA MANE |
|
2 |
173 |
VLSI Implementation of AES 128 Algorithm for Secure Data TransmissionANKUR CHANGELA |
|
1 |
174 |
A Study on Challenges of Big Data and Smart PhoneURMILA KADAM, TRUPTI KALYANKAR, RUSHI DURGE, MAJUSHREE YEWALE |
|
2 |
175 |
Multiprotocol Label Switching over IPv4 and IPv6HARDIK PRAJAPATI |
|
1 |
176 |
Identifying Diabetic Risk Factor Using Association rule Mining Based on Bottom up SummarizationJYOTI BHABAD, KISHORSHEDGE |
|
2 |
177 |
Overview on Minimizing Distortion in Image SteganographyPOONAM TALELE, PROF. VANITA MANE |
|
3 |
178 |
Feature Extraction of Malware Infected Files and Malicious DatasetsHEMANT J. CHAUDHARI, PROF. M. S. MAHINDRAKAR |
|
3 |
179 |
IOT Based Industrial Monitoring and Fault Detection Using AndroidBHAGYASHREE DATTATRAY DAWARE, PROF. HATKAR A.A |
|
1 |
180 |
SLIDEGen: Approach to Automatic Slide GenerationVISHAKHA N. PAWAR, PROF. K. N. SHEDGE |
|
1 |
181 |
Implementation on Gender-Driven Emotion Recognition through Speech Signals for Ambient Intelligence ApplicationsRUSHIKESH GADE, S.R.GULHANE |
|
1 |
182 |
A Survey on New Optimization Algorithm called Multi Frequency Vibration PSO and its Test CasesV.SOWJANYA, T.KRANTHI KUMAR, S.SRIDEVI |
|
1 |
183 |
Detection of Spam Reviews in MobilesSAIESH N. PRABHU VERLEKAR |
|
2 |
184 |
Haar Wavelet based Iris Recognition System for Secure Access using MATLABPRANALI CHAVHAN, DR. SANTOSH B. PATIL |
|
2 |
185 |
Microsoft Kinect and Sensory Data Fusion for Robust SLAM Using ROSAMRUTHA DILIP SALUNKHE, PROF. M. N. KAKATKAR |
|
1 |
186 |
A Review on the Deeper Aspects of 5G Wireless TechnologyBHARAT |
|
1 |
187 |
Cloud Computing Security Issues and Encryption Techniques: A ReviewSIMMI LUTHRA |
|
2 |
188 |
Design and Novel Approach for Ternary Decoder and Encoder CircuitsR.N.UMA MAHESH |
|
1 |
189 |
Voice Recognition Home Automation System Based On ARM 11ATUL MADHUKAR BORADE , PROF. PATIL U.V |
|
1 |
190 |
Object Detection and Tracking Techniques: A ReviewAKANKSHA SHARMA, DR. DEEPAK DEMBLA, SHEKHAR |
|
7 |
191 |
Multiple Sensor Fusion and Classification for Moving Object Detection and TrackingSHUBHAM V. AVACHAR, DR. S. D. LOKHANDE |
|
1 |
192 |
Secure Data Aggregation for Wireless Sensor Networks in the Presence of Collusion AttacksSIDDHARTH C SAWAI, PROF. S. N. SHELKE |
|
1 |
193 |
A Speech-Based Just-In-Time Retrieval SystemDEVYANI KOLHAL1, PROF. RITESH THAKUR |
|
1 |
194 |
Dual Band 'I' Shaped MSA with Diffracted Ground PlaneMADANGOPAL SAHU, PROF. YUDHISHTHIR RAUT, PROF. PRATEEK WANKHADE |
|
3 |
195 |
Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARY |
|
2 |
196 |
ICT in Advanced Education for the 21st Century: ICT as Change Specialists for InstructionDR.LAKSHMI |
|
1 |
197 |
Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks- A SurveyNANDHINI, M. PRAVEENA MCA,M.PHIL |
|
1 |
198 |
Fractal Image Compression using Modified Tiny Block Size Processing Algorithm and Quantum Search AlgorithmRUTUJA S. MALEWAR, PRASHANT Y. SHENDE |
|
1 |
199 |
Improving Efficient Reliability Based Secure Deduplication Technique on Encrypted Big DataK UMA, E JAYABALAN |
|
3 |
200 |
Security and Efficient Routing with Mesh Networks using PASERTANUSHREE LOTHE, PROF. P. B. MALI |
|
1 |
201 |
Otsu Image Segmentation Algorithm: A ReviewKHUSHBU, ISHA VATS |
|
2 |
202 |
Indoor Navigation System to the Visually Impaired People using Visible Light Communication TechnologyMARITA R. MIRANDA |
|
1 |
203 |
FPGA Based Brushless DC Motor ControlSNEHAL BETALE, JIGAR LODHA |
|
1 |
204 |
Two Level Deduplication Using SHA-256 Algorithm for Resemblance DetectionROHINI S MAHAJAN, PROF. K. D. BAMANE |
|
7 |
205 |
A Survey on Distributed Cooperative Spectrum Sensing for Cognitive Radio NetworkVARSHA A. MARTANDE, S. A.SHIRSAT |
|
1 |
206 |
Drug Reviews Using Data Mining ModelABHIMANYU D. SANGALE, PROF. P.N.KALAVADEKAR |
|
3 |
207 |
Effective Energy Path Based on PDORP Routing Protocol for WSNSWAPNALI G. LATAKE, PROF S.V.TODKARI |
|
1 |
208 |
A Heuristic Based SLA and Energy Efficient for Virtual Machine Allocation in Cloud ComputingT THILAGAM, M MALATHI |
|
2 |
209 |
Implementation of Digital Signature Using Date Time Keyed HMAC AlgorithmMADHURI MALI, PROF. SANTOSH WAGHMODE |
|
1 |
210 |
Survey on Token Based Authentication in Cloud ComputingUNNATI AWASTHI, PROF. ASHOK VERMA |
|
1 |
211 |
Token Based Authentication Using Hash Key, Session And Javamail ApiUNNATI AWASTHI |
|
1 |
212 |
Analysis on Influence of Mobility Models on the Performance of Routing protocols in Wireless Mobile Ad-hoc NetworksMOHINI M. ADE, PROF.S.S.ASOLE |
|
1 |
213 |
IoT Based Wireless Sensor Node for Mine Safety ApplicationPRATIK KINHIKAR, DR.V.N.NITNAWARE, PROF.S.K.SHELKE |
|
1 |
214 |
Analysis of Low Power D Flip-Flop and Latches for Reduced PowerAKASH S. BAND, VISHAL D. JAISWAL |
|
1 |
215 |
Survey of Segmentation Procedures for Detecting Micro aneurysmsDERE DHANASHRI D , S.B.ANDRE |
|
1 |
216 |
Finding Shortest Path in All Tours of a TSP Using Dynamic Candidate SetSONIA RAJPUT, NAGENDRA KUMAR |
|
1 |
217 |
Robot Manipulator for 3D Surgical Instrument Singulation in Cluttered EnvironmentPRIYANKA PAWAR, CHETAN NEVE |
|
1 |
218 |
Secure Multi-Keyword Search Scheme for Cloud DataVAIBHAVI KULKARNI, PROF. PRIYA PISE |
|
1 |
219 |
FPGA Based Brushless DC motor ControlSNEHAL BETALE, JIGAR LODHA |
|
1 |
220 |
Detection of Particles from Particle Cluster using Hough TransformMAYUR G. ARORA, S.S. LOKHANDE |
|
1 |
221 |
Stock Market Prediction System using Back Propagation andC4.5 AlgorithmKALYAN DANI, DR.BASANT TIWARI |
|
1 |
222 |
Energy Efficient Reliable Data Dissemination in Mobile Coordinated WSNYOGITA VEER, SACHIN TODKARI |
|
1 |
223 |
Cotton Leaves Disease Recognization by Multiple ClassifiersKAJAL P.VISRANI, HARSHAD PATIL |
|
2 |
224 |
Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue StabilityDURGA S. NIKAM, PROF. M. M. WANKHADE |
|
1 |
225 |
Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue StabilityDURGA S. NIKAM, PROF. M. M. WANKHADE |
|
1 |
226 |
Prediction of Diabetes Risk Factor Using Back Propagation and C 4.5 AlgorithmAPARNA PHALAK, PRITI SHARMA |
|
2 |
227 |
Modified Machine Learning Approach for Diabetes Risk Factor DetectionTEJAL A. PATIL, SWATI A. PATIL |
|
1 |
228 |
Improving Direct Mapped Cache using Victim CacheSUYOG S. KANDALKAR |
|
1 |
229 |
Analysing and Predicting Social Impact of Tweets Using Tweet SegmentationSATISH DHAYTADAK, PROF.VRUSHALI DESALE |
|
2 |
230 |
A Fast and Area Efficient Cyclic Redundancy Check-Based Decoder for Software Defined RadioR.D.FATING, S.S.JAIN |
|
2 |