S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
A Review on Image based Indian Sign Language RecognitionRAVI PATEL |
|
9 |
2 |
A Survey on Digital Forensics to Address Big Data ChallengesRADHA DHEKANE |
|
1 |
3 |
A Web-Based Online Auction System: A SurveyMANASI BHAMARE, ARATI CHAME, GAURAV MORE, PROF. AMOL RINDHE |
|
1 |
4 |
Biometric Door Lock System Using MQTT ProtocolHINGOLIKAR SMITA CHANDULAL, PATANGE A.D |
|
2 |
5 |
Survey on ABS Supporting Secure Deduplication of Encrypted Data in CloudPRIYANKA BHOSALE, PROF. S. H. PATIL |
|
1 |
6 |
A Review Paper on Voice Assisted Text Reading and Google Home Smart Socket Control System for Visually Impaired Persons Using Raspberry PiCHAITALI HANDE, PROF. VIJAY WADHANKAR |
|
3 |
7 |
Detection and Identification of Artificially Ripened Fruits using MATLABSWATI KHANDARKAR, PROF. VIJAY WADHANKAR |
|
2 |
8 |
A Survey on Novel Approach for Multi-Authority Attribute-Based Encryption for Data SecurityVIKRAMSINH RAJENDRA GHATGE, PRASHANT M. MANE |
|
1 |
9 |
Data Mining: A Study on Various Applications and TechniquesASHISH B. PATEL |
|
5 |
10 |
Application of Data Mining for Customer Behaviour and Customer Relationship Management in Retail MarketingASHISH B. PATEL |
|
2 |
11 |
Defending Against RREQ Flooding Attack in AODV in MANETsSUHAIL MEHRAJ, ER. RUPALI ZAKHMI |
|
2 |
12 |
Malicious Posts Detection Mechanism in Social NetworksGURUNATH AADE, RAHUL KAPSE, EKTA UKEY |
|
1 |
13 |
Information Protection Using Data Classification Procedure in the Cloud ComputingSIDDHARTH PATEL, SAKSHI NEMA, PRASHANT KUMAR KOSHTA, SAURABH SHARMA |
|
1 |
14 |
A Survey on Big Data Process Models for E-Business, E-Management, E-Learning, and E-EducationANISH KUMAR VARUDHARAJULU, YONGSHENG MA |
|
3 |
15 |
Multilevel and Multi-class Support Vector Machine based on Affinity Propagation Clustering for Intrusion DetectionSHINEE SINGH, S. K. SHRIVASTAVA |
|
1 |
16 |
Enhanced Privacy Policy Prediction for User-Uploaded Images on Content Sharing SitesRUPALI NARKHEDE, MADHURI ZAWAR |
|
1 |
17 |
Intelligent and Effective Smart Helmet with EEG and ECG Analyzing StrategiesJ MERIN JOSHIBA, R.D.S TERESE SHEEBA, J. JOSEPHINE SHARMILA, N.S BENILA, P. BRINDHA, |
|
3 |
18 |
Automatic Toll Collection System based on Embedded systemMINAL MOHITE, PROF. VIJAY WADHANKAR |
|
2 |
19 |
Secure Reversible Image Data Hiding Over Encrypted Domain via Key ModulationP.SUDHA, R.RADHA |
|
1 |
20 |
Smart System of Using E-LicenseYUKTA GAJARE, PRAGATI BHOR, ASHWINI NALAWADE, REETIKA RANDHANVAN, PRITI KUDAL |
|
5 |
21 |
Survey of Data and Storage Security in Cloud ComputingROSHNI AGRAWAL, PROF. SAURABH SHARMA |
|
1 |
22 |
Semantic Image Segmentation with Contextual Hierarchical ModelsK.SARASWATHI, C.TAMILSELVI |
|
1 |
23 |
Detection and Prevention of Attacks from HTTP Server logsSANDEEP KUMAR TIWARI, MONIKA SONI, SAURABH SHARMA |
|
2 |
24 |
A Heuristic Approach for Web Content ExtractionTANVI LALIT SARDARE, DR. DAYANAND R. INGLE |
|
2 |
25 |
Traffic and Energy Efficient Encrypted SearchTANVI LALIT SARDARE, DR. DAYANAND R. INGLE |
|
2 |
26 |
A Survey on Machine Learning Techniques for Android Malware Detection and CategorizationNEHA SHARMA, POOJA YADAV |
|
1 |
27 |
Effort Estimation for Performance Testing of Software ApplicationsMOHAMMED ABDUL RAZACK MANIYAR, MOHD ABDUL HAKEEM, DR. MOHD KHALID MUBASHIR UZ ZAFAR |
|
2 |
28 |
Design and Implementation of Data Compression with Hybrid to Optimized SizeRAJENDRA CHOUDHARY, DR. AAKASH SAXENA |
|
1 |
29 |
Most Trending Topics with Pre-learned Knowledge in TwitterLEENA PATIL, KANCHAN DOKE |
|
1 |
30 |
Novel Approach to Construct QA SystemsTUSHAR SHEDAGE, HONEY VYAS, ANUJA ZANJE, SANKET ZURMURE |
|
1 |
31 |
Study on different Transmission Control Protocols Used in Wireless NetworksSWATHI P, KARUNAKAR POTHUGANTI |
|
1 |
32 |
2D Position Detection of an Object Using Accelerometer DataPARMAR DURVISHA M |
|
1 |
33 |
Zero APT Technique for Evaluation of RESTORING Unbalanced VoltagesKIRTI JAWALBANKAR, K.CHANDRA OBULA REDDY |
|
1 |
34 |
A Review on Shielding Virtualized Resource in Cloud Computing using Augmented Protection TechniquesAMITA PATHANIA, DR. DINESH KUMAR |
|
2 |
35 |
Speaker Independent and text Independent Emotion Recognition System Based on Random Forest ClassifierMAY MON LYNN, CHAW SU |
|
1 |
36 |
Survey on Reversible Watermarking Techniques on Relational DatabaseJAISHRI CHAUDHARI, NILESH CHAUDHARI |
|
1 |
37 |
Semantic Hashing to Understanding short text using Neural NetworksSUNKARA MOHAN KRISHNA, GURU RAJ |
|
5 |
38 |
Implementation of Reversible Watermarking Techniques on Relational DatabaseJAISHRI CHAUDHARI, NILESH CHAUDHARI |
|
1 |
39 |
Routing Protocol for Low-Power and Lossy Networks (RPL) in IoT applications: A ReviewJUBIN DIPAKKUMAR KOTHARI |
|
2 |
40 |
AI Going Wrong Reasons behind Wrong ResponsesAKASH GHOSH, RIZWAN CHANDARKI |
|
2 |