S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Survey on Requirement Elicitation Techniques: It's Effect on Software EngineeringJOSEPH ELIJAH, DR. AMIT MISHRA, ENGR. MATHEW CHUKWU UDO, ABDULRAHMAN ABDULGANIYU, PROF. ABIODUN MUSA AIBINU |
|
2 |
2 |
A Survey On Marketing Performance of Small Scale Vs Large Scale Vendors Using Big Data AnalyticsSHAHANAZ. J. |
|
2 |
3 |
Application of Internet of Things in the Field of Medical and Smart Health CareDIKSHA B. WASANKAR, DR. VIJAY S.GULHANE, L. K. GAUTAM |
|
4 |
4 |
Statistical and Machine Learning Techniques for Prediction of Customer Churn in TelecomDR. T. LEO ALEXANDER, D. MONICA |
|
1 |
5 |
A Convolution Neural Network Based Deep Learning System for Brain Tumor Detection towards MRI Image SegmentationUDAY BELLARY, JAVERIYA SADAF |
|
1 |
6 |
Secret Key Sharing Mechanism for Data Security in CloudANMOL BHATIA, GAURAV GARG |
|
3 |
7 |
DC Motor Speed Control with PID Controller: A ReviewSHIKHA SINGH, MILONI GANATRA, HANSA SHINGRAKHIA, ZALAK PATEL |
|
2 |
8 |
Design and Implementation of Blood Bank Monitoring System Using Raspberry PiK.SRAVANI, B SUJATHA |
|
1 |
9 |
Design and Implementation of E-Blood Donation System Using Location TrackingDEEPTHA HEGDE, AGNUS KURIAKOSE, AMITHA MARIYA MANI, ANJU PHILIP, ANNAMMA P ABRAHAM |
|
1 |
10 |
Design and Implementation of Improved System for College Automation and ManagementMOHITHA H V, ANANDU MOHAN, JEYS REJI, BENCY S BABU, TINTUMOL M G |
|
3 |
11 |
Developing a Face Recognition and Analysis System (FRAS) and its ApplicationsASHIN GUHA MAJUMDER, ANURAG ROY, SUVASISH DASGUPTA, SHALABH AGARWAL |
|
8 |
12 |
Area–Delay–Power Efficient Carry-Select AdderSAREEKA TULSHIRAM DEORE, PROF. DR. P. MALATHI |
|
3 |
13 |
Twitter, Facebook and Google Data Analysis Using Open Source Hadoop Technologies HiveY.SIRISHA, N.ARUN JYOTHI, K.S PARIMALA |
|
2 |
14 |
An Innovative Pliable Distributed Cloud Storage Integrity Checking SchemeULYA SABEEL |
|
2 |
15 |
A Survey on Personalized Web Search Privacy ProtectionDEVIKA P, JITHA K |
|
2 |
16 |
Survey of Healthcare at Household Using Wearable Devices on CloudSHAIK MOHAMMED SAJID, KAVITHA K K |
|
3 |
17 |
An Efficient Fuzzy Based Approach for Hepatitis DetectionANCY SUDHAKAR , RAJALEKSHMY K D, PRINCE ABRAHAM |
|
3 |
18 |
Efficient Semantic Search over Encrypted Data in Cloud ComputingYASH KHARE, ASIF SHAIKH, AKSHAY GOLE, PROF. K. BALA |
|
1 |
19 |
Design and Implementation of Driverless Car to Recognize Traffic LightARPITHA S K, NAGARATHNA |
|
8 |
20 |
A Review on Security Issues in Cloud ComputingK SRI VANI |
|
1 |
21 |
Analysis of 2D to 3D Reconstruction Techniques over Brain MRI A. FARZANA, DR. M. MOHAMED SATHIK |
|
4 |
22 |
Statistical Translation using KNN and N-gram Algorithm for Machine TranslationSHILPA MODANI , PRIYANKA MORE , HARSHAL SHEDGE , U. C. PATKAR |
|
1 |
23 |
Approach for Classification of Neuromuscular Disorder using EMG SignalsAMIT KUMAR SINGH, N K AGRAWAL, SUMIT GUPTA |
|
1 |
24 |
Design and Implementation of Vehicle Emission Testing System using MQ-5 and MQ-7 SensorsAKSHATHA.A, NAGARATHNA |
|
2 |
25 |
Automated Toll Collection System Using RFIDAISHWARYA D SHETTY, JASRIN M.D, JYLES BENNY, SUMIMOL SADASIVAN |
|
1 |
26 |
Real-world Performance Analysis of Ad-hoc wireless NetworkTUSHAR G. DANGAT |
|
2 |
27 |
Implementation of 8X1 Low Power Multiplexer using Transmission GatesPALAPARTHI SURESH, YELITHOTI SRAVANA KUMAR |
|
3 |
28 |
Design and Analysis of Multiplexer using ADIABATIC LogicMOPADA DURGA PRASAD, BOGGARAPU SATISH KUMAR |
|
2 |
29 |
Study of Different Mobility Schemes to Provide Improvement in Wireless Sensor Network with Detection of Node ClonesNEHA SEN |
|
1 |
30 |
XML Query Answering using Data Mining Tree Based ApproachVERSHA, DEEPIKA GARG |
|
2 |
31 |
An Android Based Smart Wheelchair with Health Monitoring using IoT PRATEEK GUPTA, SHUBHAM SAGAR NAYAK, UPASANA, PROF. ATUL B. WANI |
|
1 |
32 |
Analysis of the Multitasking Feature-Virtualization and Virtual Storage in CloudASHIMA NARANG |
|
1 |
33 |
Design and Analysis of Energy Efficient Adders Using Low Power TechniquesBADE GNANESWARI, D.VENKATACHARI |
|
3 |
34 |
An Efficient Fuzzy Logic Classification over Semantically Secure Encrypted DataP. HEMALATHA, DR. S. M. JAGATHEESAN |
|
3 |
35 |
Data Embedding based 4 LSB technique in Image using SteganographyNITIN R. ZINZURKE, PROF. SUHAS M. PATIL |
|
3 |
36 |
A Review on Meta-Material based Soft Horn AntennaPROF.ZALAK PATEL, PROF.MILONI GANATRA, PROF.HANSA SHINGRAKHIA, PROF.SHIKHA SINGH |
|
7 |
37 |
Integrating Personalization and Image based Search System to Enhance Search ResultsSNEHA A. TAKSANDE, PROF. A. V. DEORANKAR |
|
2 |
38 |
High-Performance FIR Filter Architecture for Fixed and Reconfigurable ApplicationsPALLAVI R. YEWALE |
|
1 |
39 |
Automated Elevator-An Attentive Elevator to Elevate using Speech RecognitionCHINTAN PATEL, ANSHUL MAATHUR |
|
2 |
40 |
A Survey on Monitoring and Control system for Food Storage using IoTROHAN WAGLE, MAYUR SHAH, ADITYA KADAM, RAMGOPAL SAHU |
|
5 |
41 |
A New Innovative Approach for Natural Image Denoising Using Genetic Algorithm and ThresholdingS.AAISHA NAZLEEM, L.S.SUBBULAKSHMI |
|
2 |
42 |
A Real Time Monitoring System for Home AutomationAKSHAT SHARMA, ARUNKUMAR T |
|
2 |
43 |
An Efficient and Secure Dynamic Auditing for Regenerating-Code-Based Cloud StorageNARESHKUMAR R.M, SHOAIB ZARIKER |
|
1 |
44 |
Big Data Application in Agriculture to Maximize the Rice Yield Crop Production using Data Mining TechniquesSNEHA N, DR. JHARNA MAJUMDAR |
|
2 |
45 |
Deadline-Aware Sufferage Based task Scheduling in Cloud ComputingALKA VOHRA, SUCHITRA |
|
1 |
46 |
A Survey on Thoughts to Text Using Brainwave PatternsDIPTI PAWAR, KAPIL KAMALE, ISHAAN SINGH, VISHWAJEET KHAROTE, PRAJWAL GOSWAMI |
|
3 |
47 |
Selection of Personal Computer using Modified Fuzzy Analytical Hierarchy ProcessSONIKA SHARMA, MOHINDER SINGH |
|
1 |
48 |
Comparative Study of Image Compression using Discrete Wavelet Transform and Discrete Cosine TransformPRIYA BACHHALIYA, PROF. NITESH KUMAR |
|
1 |
49 |
Automated Security System for Girls Safety Using ARM7SANGEETHA V, NUZHATH ZAIBA, POOJASHREE K.P, REETU T, SHASHWATHI N. BHAT |
|
1 |
50 |
Bluetooth Remote Home Automation System using Internet of ThingsMENAL DAHIYA |
|
1 |
51 |
Detection and Prevention of Black Hole Attack Using Trust Mechanism with various Node DensityHITESH NAGDEV, MAYUR RATHI |
|
2 |
52 |
Energy Efficient Routing Protocol with Greedy Algorithm for WSN ScenariosASHLESHA SONANE, MAYUR RATHI |
|
2 |
53 |
Discovery of Ranking Fraud for Mobile ApplicationsARATI TULE, PROF. RAHUL SHAHANE |
|
1 |
54 |
Implementation of Efficient Parallel Decimal Multiplier Using VerilogCH.TEJASRI, DR.B.NAGA JYOTHI |
|
1 |
55 |
BillSmart- A Smart Billing System using Raspberry Pi and RFIDDR. MARY CHERIAN, DISHA DH, CHAITHRA KB, ANKITA, AISHWARYA |
|
1 |
56 |
Comparative Study of Pattern ClassifiersJAGBEER KAUR, DEEP KAMAL KAUR RANDHAWA |
|
1 |
57 |
Off-Street Parking Space Reservation Using Smart Phone ApplicationAKSHATHA B S, UMA S K |
|
2 |
58 |
Connecting Social Media to E-Commerce Using Cold Start Product RecommendationSALKE SHITAL ARJUN, MORE PRIYANKA GAUTAM, SHINDE SNEHAL MOHAN, SHINDE SAMRUDDHI VINOD, PROF.MILIND R. HEGADE |
|
1 |
59 |
Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing AMREEN DESHMUKH, SHUBHANGI TAKE, SANCHITA DESHMUKH, PROF. H.B.JADHAV |
|
1 |
60 |
A Cost-Effective Home Security Alarm System for Detection of Motion Ashwini M, Uma S K |
|
1 |
61 |
Comprehensive Model Driven Approach for Requirement Management System Pooja Batra Nagpal |
|
1 |
62 |
EduAR: Transforming Education with Augmented Reality Ravi Koshiya, Shantanu Kulkarni, Divvya Mehta, Pratik Malkan, Purnima Ahirao |
|
5 |
63 |
Face Recognition using Sift Key with Optimal Features Selection Model Mandeep Kaur, Jasjit Kaur |
|
2 |
64 |
Performance Analysis of Progressive Coefficients Significance Compression Methods for ROI-based DICOM Image Gunjan Chaudhary, Prof. Yogesh Kumar Mishra |
|
3 |
65 |
Survey on Abandoned Object Detection using Image Processing Dhanashri Adalinge , Damini Patil, Shubhada Dongare, Surabhi Gokodikar , Prof. M. K. Kodmelwar |
|
2 |
66 |
Analysis of Soil Behavior and Prediction of Crop Yield using Data Mining Approach Supriya D M |
|
3 |
67 |
Proximity Aware Clustering in Delay Tolerant Network for Efficient File Search Nikhil Patil, Ashitosh Vidhate, Lakhan Jadhav, Prof.Priya Pise |
|
2 |
68 |
A Novel Multiband Multichannel Variational Approach Based on NLTV Model for Image Inpainting Gaurav Chouhan, Mandeep Singh Saini |
|
1 |
69 |
Packet Scheduling and Self Restriction Schemes for Underwater Acoustic Localization in WSN Keerthi M, Jayashankar M |
|
1 |
70 |
Performance Analysis of Digital Finite Impulse Response Filter Design using Windowing Techniques Prof.Hansa Shingrakhia, Prof.Miloni Ganatra, Prof. Zalak Patel, Prof. Shikha Singh |
|
1 |
71 |
Detection of Different Stages of Lungs Cancer in CT-Scan Images using Image Processing Techniques Priyanka Basak, Asoke Nath |
|
1 |
72 |
A Literature Survey on Mining Health Data to Predict Heart Disease P. Priyanga, Aparna N Venu, Latha Eshappa, M Archana, Navya Shree D P |
|
2 |
73 |
Implementation of Integrated System to Avoid Flood like Situation Tanwid. Deshmukh, DR.A.P. Thakare |
|
1 |
74 |
Anti-Theft Application for Android Smart-Phone Priya Chintawar, Sujata Agrawal |
|
1 |
75 |
Implementation of Partial Generalization for Data Publishing with Minimal Information Loss Urvashi Hiranwar, Amit Pimpalkar |
|
1 |
76 |
Fingerprint Based Driving License System Sarika Fulpagare, Monali Kulkarni, Dipak Deokar, Rahul Deshmukh , D.A.Phalke |
|
1 |
77 |
Amalgamation of Cryptographic Techniques for Secured Data Transmission Meghana V, Aishwarya B, Shobha M.S |
|
2 |
78 |
Electronic Toll Collection System Using RFID Tag Najeeba Tabassum |
|
1 |
79 |
Secured Data Transmission in Mobile Adhoc Networks: An Implementation Using Java Drashti Gautam, Dr. Anurag Sharma |
|
1 |
80 |
Minimization of Network Traffic Using Partition and Aggregation for Data Stored in Cloud P.Priyanga,Tushar.R.Shetty,Utsav.K.P,V.Rahul, Darshan.C |
|
1 |
81 |
CMOS RF Power Amplifier Using Reconfigurable Interstage Network for Envelope TrackingNeha A. Kashiwar, Prof. S. S. Agrawal |
|
1 |
82 |
A Survey on Object Detection and Tracking Algorithms Subhash Nevhal, Dr.Archana Ghotkar |
|
2 |
83 |
Sentiment Analysis using Machine Learning Algorithms: A Survey Kaushik Hande1, Prof. A. G. Phakatkar |
|
1 |
84 |
Medical Records Clustering: A Survey Mangesh Mali, Dr Parag Kulkarni, Prof. Virendra Bagade |
|
2 |
85 |
FPGA Implementation of Gradient Based Edge Detection Algorithms Avinash G. Mahalle, A. M. Shah |
|
2 |
86 |
Enhanced Application of Natural User Interface Using KinectC. Dinesh Kumar, D. Lohitha |
|
1 |
87 |
State of The Art Content Mining Using SCAN TechnologyDr. Anuj Kumar Parashar , Er. Dev Kant Tyagi |
|
1 |
88 |
Detecting Relay Attacks in RFID Using Bloom Filter for Unauthorized ReadingReeta Kumari Ashok Singh, Prof.Anubhav Sharma |
|
4 |
89 |
Development of Auto-Ranging DAS on 32 bit ARM Cortex Processor for X-Ray DetectorsSayali Dilip Kedar, Piyush Saxena, V.K.Dubey, Lekha Das |
|
1 |
90 |
Minimizing Energy of Cluster Based Cooperative Spectrum Sensing in Cognitive Radio Network Using Genetic AlgorithmChanchal Nigam, Rabindra Kumar Singh |
|
2 |
91 |
Energy Efficient Routing Algorithm for Maximizing Network Lifetime of Heterogeneous Wireless Sensor NetworksManish Chandra, Yogesh Kumar Mishra |
|
2 |
92 |
Integration of RFID, NYC and Blockchain Technologies Snehal Johny, Sayali Chavan, Nishi Tiku |
|
1 |
93 |
Energy Efficient and Secured Dynamic Real Time Routing Protocol in Wireless Sensor Networks Chitra.P, Chandrakala.V |
|
1 |
94 |
Fair Routing Across the Wireless Sensor Network Using Deniable Encryption and Load BalancingAshwini A N, Manjunath H R. |
|
1 |
95 |
A Survey on Unidirectional Intermediary Re-Encryption to Preserve Ciphertext for Big Data Storage Roopa S |
|
1 |
96 |
Fusion of Big Data and HealthCare: A ReviewAnkit Chaudhary, Neha Tyagi |
|
2 |
97 |
A Novel Scheme for Estimation of Probability of Inference Mahmood Saif, Rameshwar Rao |
|
1 |
98 |
Secure File System Architecture- Based Session Key Generation in pNFS Sreedevi R |
|
4 |
99 |
A Review on Work Family Conflict of Women Employees in IT Industries Kochumol Abraham, Win Mathew John, Sijo Thomas |
|
6 |
100 |
Detecting Jamming Using RTS CTS Strategy Anita Wakode, Mayuri Halnor, Rashmi Singh, Prof.Aditi Chaturvedi |
|
1 |
101 |
A Sentiment Analysis of Twitter Data using Hadoop Framework Jeevitha, Raksha, Vipin N |
|
2 |
102 |
Recommendation of Cold-Start Product by Socializing E-Commerce Dipali Gavhane, Gitanjali Shelge, Swapnanjali Ubale, Swapnil Shinde |
|
1 |
103 |
A Survey On Smart Parking Systems Using Cloud Based Services Shubham Bhalerao, Umang Mahant, Megh Makwana |
|
2 |
104 |
An Application for Interior Design Using Augmented Reality Noor Farhan Kapdi, Shubham Sangnale, Pramod Ralebhat, Prof. Mandar Mokashi |
|
2 |
105 |
A Survey on Better Tracking Using Digital IntelligenceVinaya Poojari , Rahul Naik, Ramesh Solanki |
|
1 |
106 |
Host Based Internal Intrusion Detection System by Using Data Mining and Forensic Techniques Prof.Rucha Dixit, Pacharne Vrishali, Ghorpade Sayaliraje, Palase Amruta, Avhad Pallavi |
|
1 |
107 |
Mobile based Anti-Phishing Scheme using QR Code Prof. Rukaiya shaikh, Sharma Mala, Ansari Salman, Sher afgan |
|
1 |
108 |
Refined Techniques for Collision Avoidance and Comparison of Different Algorithms Prof.Baltej Kaur, Sakshi Rajendra Waghmare, Snehal Vitthal Bhosale, Chandni Navnath Nagargoje, Dipali Tukaram Kendre |
|
1 |
109 |
An Automated Swarm Based Agriculture Robot Mayur Bawaskar, Nikhil Tehare, Jaywardhan Mane, S.S.Sayyad |
|
1 |
110 |
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Rasika Deodhar, Isha Deshpande, Rutuja Gandhi, Suraj Jadhav, Shital Kakad |
|
1 |
111 |
Financially Assisted Student and Information Management System (FASIM) for Auto-Allocation of Funds Using Mean Stack Implementation Prof. D.S.Zingade, Amruta Gaikwad, Shrushti Thorat, Aemal Shah |
|
1 |
112 |
Single and Multispeaker Voice Recognition in Android Tanmay Naskar, Anket Sah, Akshay Mense, Neha Patekar, Nikhatjahan Kankurti, Dr. Neeta Deshpande, Suvarna Kadam |
|
9 |
113 |
Content Based Image Authentication and RetrievalDeepashree Deshmukh, Divya Holkar, Sayli Mangle, Nikita Navale, Pranjali Kuche |
|
1 |
114 |
Search Recommendation System for Mining Query FacetAkshay Kadam, Sachin Shinde, Rahul Mallesh, A.B.Waghmare |
|
1 |
115 |
Anomaly Detection using 3D Convolution Neural Network Niket Tangadpalliwar, Shubham Thapa, Vinit Rege, Kuldeep Singh, Prof. Priya U. Thakare |
|
2 |
116 |
Security Preserving Friending in Mobile Social Networks Aditya Waghmare, Ashish Kothawade, Prajakta Kakade, Bhagyashri Markad, B. L. Dhote |
|
1 |
117 |
Authorized Auditing of Big Data on Cloud Storage Prof. Vijay Sonawane, Sachin Kore , Rajendra Mane, Ajay Pawar, Punam Adling, Vaishali Gorhe |
|
1 |
118 |
Contactless Vein Structure Sensing Authentication TechnologySakshi Chavan, Saurabh Koli, Mrunali Wankhede, Varsha Dange |
|
1 |
119 |
Design and Implementation of ADDER Circuit using Quantum Dot Cellular Automata (QCA) Koppala Chandra Sekhar, Niddana Prabha |
|
1 |
120 |
Web Based Application for Timetable and Feedback Generation SystemTanuja Padale, Manisha Bhagat, Harshada Mane, Shobha Nangare |
|
1 |
121 |
Feature Specific Sentiment Analysis for Product Reviews Rakshith P, Madhura Geetha S |
|
1 |
122 |
An Implementation of NFC Based Restaurant Table Service Aditya. R, Anirudh. K. R, Karthik. K. S, Mahinder. P, Deepa. S. R |
|
2 |
123 |
An Extensive Approach in Advancement of Software Defined Networking Dr Khushboo Tripathi, Deepthi Sehrawat |
|
1 |
124 |
A Highly Enhanced Deep Learning Method to Deal Cyber browbeat Latha R, Praicy Joseph, Archana D, Nanditha C M, Jayasheela B N |
|
1 |
125 |
Frequent Item Set Generation Using Improved PSO over Generalized Transactional DatasetSweta Mishra, Yamini Chouhan |
|
1 |
126 |
Continuous and Transparent User Identity Verification for Secure Internet Services |
|
2 |
127 |
Automatic Data Replication in Online Social Network Supriya F. Rathod, Prof. A.V. Deorankar |
|
1 |
128 |
Wireless Communication Locker with Advanced Security System using GSM, RFID and OTP Technology Prutha Suroshi, Radhika Hambire, Priteshsingh Chandel, Milana Malvadkar |
|
2 |
129 |
IOT Based Dual Purpose Web Application for Smart Public Transportation Supritha R Kumar, Dr. M C Padma |
|
2 |
130 |
RFID Based Intelligent Book Finder Using Ultra High Frequency SensorNithya.M, Solaiyammal.K |
|
1 |
131 |
Prediction of Breast Cancer Using Mammogram Images by Data mining on the Extracted Features of the processed ImageTarun Gangil, Sneha Prajwal |
|
1 |
132 |
Online Examination System Based On Student Authentication Using LTP& OTPMisal Vijaya Balu, Nare Payal Rajendra, Udare Sanjana Sanjay |
|
1 |
133 |
Augmented Security by TPA in Cloud ComputingSashibala, Deepika Goyal |
|
1 |
134 |
Dynamic Room Allocation and Online Check-in Check-Out form to HostelVidya Myageri, Vaishnavi Katti, Shruti Kulakarni, Vyshnavi.K, Yerraguntla Rajeswari |
|
2 |
135 |
A Child-Left behind Warning System Using Capacitive Sensing PrincipleRakshitha, Anju Mariya George, Blesson Babu, Christeena Joseph, Shilpa T V |
|
5 |
136 |
Auto-Aid Agro Seeding Bot Equip with Machine LearningNikhil Belwate |
|
1 |
137 |
Improving Quality of Satellite Images Using Enhancement Filters and Fuzzy Based Contrast Enhancement TechniqueVijay Tonder, Vivek Shukla, Rohit Miri |
|
2 |
138 |
Data Privacy using Multiparty Computation based on Homomorphic Encryption SchemesV.Satish Kumar, MD.Fayaz |
|
3 |
139 |
Home Automation Control with Web VisualizationAsst. Prof. Anant More, Unmesh Bhalerao, Akshay Bhasal, Ankeet Deshmukh |
|
1 |
140 |
Prepaid Toll Collection Using Barcode ReaderCharul Bhalerao, Shubham Kulkarni, Prof.Anant More |
|
1 |
141 |
A Secure And Dynamic Multi Keyword Ranked Fuzzy Search Scheme Over Encrypted Cloud Data
Kapil Kasture, Rohan Tanpure, Piyush Dhale, Venkatesh Ghalge |
|
1 |
142 |
Social Network Aggregator using Crawler and Document ClusteringNeetu, Deepti Sharma |
|
1 |
143 |
An Initial Imperative Study on Big DataMayushi Chouhan, Makhan Kumbhkar |
|
2 |
144 |
A Framework to Provide Assured QoS on Increasing of Profit using Cloud ComputingPramod Swami, Akshay Sutar, Harshal Patil, Prof. Y.V. Kadam |
|
3 |
145 |
Automated Food Product Status Tracking Mobile ApplicationAnshul Bansal, Durva Deshmukh, Shreyans Kering, Vimal Dev, Shraddha .R. Khonde |
|
6 |
146 |
Load Balancing and Task Scheduling in Multi-Cloud SystemNihar Ranjan, Hemant Nagori, Raviraj Adsul, Rishikesh Shinde, Shubham Ruhatiya |
|
3 |
147 |
MSEB Smart Meter ReadingAjinkya Gaidhane, Akash Gawali , Sanket Salave, S.V.Mogre |
|
1 |
148 |
Solar Powered Lawn Mower for Grass TrimmingAsst. Prof. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble |
|
1 |
149 |
Web Base and Android Base Automatic Dairy SystemSupriya Pathare, Komal Mahangare, Prerana Gayke, Rutuja Dhakne, Deshmukh P. R. |
|
2 |
150 |
Embedded Visual Cryptography for Secret Color Images Sharing Through Stamping Algorithm and OTP Process
N.N.Thorat, Raju U. Jondhale, Lokesh B. Dandgole, Ravi R. Wadikar
|
|
1 |
151 |
Electricity Theft Detection and High Alert Techniques Using PLCProf. Saylee Begampure, Rutuja Gawade, Aditi Yevale, Sonali Bhor |
|
2 |
152 |
Intelligent Interactive Robot with Gesture Recognition and Voice FeedbackProf. Sachin Magadum, Aniket Salve, Atul Shitole, Ajay Wadkar |
|
1 |
153 |
VEDIKALACH IMPLEMENTATION IN VLSIProf. R.U. Shekokar, Abhijeet Honwalkar, Akshay Patil, Swapnil Khalse |
|
1 |
154 |
Solar Powered Lawn Mower for Grass TrimmingProf. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble |
|
1 |
155 |
Accident Detection and Alerting System with Rescue of AmbulanceProf. Varsha Kshirsagar, Ajay Gavhande, Shubham Deshmukh, Yogesh Daswadkar |
|
1 |
156 |
Utilization of the Channels for Multicasting Wireless Multimedia in Wireless Mesh Networks
Shruti Shinde, Prof. Meeta Bakuli |
|
1 |
157 |
Optimal Sitting of PV-Wind-Energy Storage System Integrated Micro Grid Using Artificial Bee Colony Optimization TechniqueDr.Vijay Raviprabakaran, Sowmya Ramachandradurai |
|
1 |
158 |
Comparison of Data Mining Algorithms for Effective PerformanceNikhil Belwate |
|
1 |
159 |
Data Transfer of Touch Devices Using Drag and DropPROF. SWATI. H. PATIL, SHESHANK RANAWARE, SANKET TUPE, ARFAN GHORI, AKSHAY WAGHMODE, GAJANAN JADHAV |
|
1 |
160 |
Comparative E-Business Portal for Different Marketplaces using HadoopProf.A.S.Devare, Prof.N.B.Chopade, Priyanka Chatane, Shweta Doiphode |
|
1 |
161 |
Automatic Accident Detection and Alerting System Based on IOTSurekha Pinnapati, Manjunath Kamath K, Carmal Joseph, Dayana Thomas, Jibin P Babu, Jithin P Babu |
|
2 |
162 |
Privacy-Preserving of Encrypted Cloud Data through Dynamic Multi-Keyword Search Rahul Barate, Rohidas Chorghe, Pankaj Palaskar, Tukaram Sude, Prof Dhanshree Kulkarni |
|
1 |
163 |
VANET System for Traffic ManagementPriyanka Shinde, Dr.S.B.Dhonde |
|
1 |
164 |
E-Traffic Police: A Professional Platform to Increase Efficiency between Government and CitizenPraveen Pandey, Ritika Arya, Shailesh Khandelwal, Piyush Kumar, Prof. N A Dhawas |
|
1 |
165 |
Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks ApplicationsPooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi |
|
1 |
166 |
Literature Survey on Noise and Redundant Data on Web PagesSekhar Babu.Boddu, Prof.Rajasekhara Rao.Kurra |
|
1 |
167 |
Survey on Secure Off-Line Payment Solution for Physical Unclonable FunctionsNamitha J, Bhavya Shree J, Santhosh N, Kiran Kumar N, Himabindu U |
|
1 |
168 |
An Android based Employee Monitoring SystemProf. Mukram Ansari, Shinde Bhagyashri, Pawar Dattatray, Dorage Rahul |
|
1 |
169 |
Advanced Intrusion Detection and Protection System Using System Calls Forensic TechniquesProf. Sheetal Kusal, Madhumati Totre,Varsha Mane,Neha Pimple, Pravin Kumbhar |
|
1 |
170 |
Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks ApplicationsPooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi |
|
1 |
171 |
A Technical Review on Health Monitoring System at Household Using IOTDr. Jitendranath Mungara, Kavitha K K, S Akshya, Vishal Petkar |
|
4 |
172 |
Security in Patient Data Communication using Encryption AlgorithmNikita S. Karekar, Dr. Prof. R. S. Kawitkar |
|
1 |
173 |
Multi-Modal Topic Modeling of Data and Summarization of Events and ReviewsPrajakta Sonone, Prof. A.V.Deorankar |
|
1 |
174 |
JADE Based Bidding System for E-CommercePrince Abraham |
|
3 |
175 |
A Survey of Phishing Website Detection TechniquesJyoti Vaibhav Jadhav, Prof. Krishna Kumar Tripathi |
|
1 |
176 |
Design and Implementation of a Wireless Video Transmission System Using Adaptive Channel Coding TechniquesShilpa.S, Prof.Ruckmani Divakaran |
|
2 |
177 |
Classification of Diseases on the Leaves of CottonDarshana S. wankhade, Vijay L. Agrawal |
|
2 |
178 |
A Survey on Software Defined Network: A New Era of NetworkingSantosh Kumar |
|
1 |
179 |
Classification of Web Search Results Using Modified NaĂŻve Bayesian ApproachBhagyesh P. Asatkar, Prof. K. P. Wagh, Dr. P.N. Chatur |
|
1 |
180 |
Smart Home Security and Safety System using Bluetooth spp pro ModuleP. Naresh, N.Ramesh |
|
1 |
181 |
IOT Based Data Analytics and Web Monitoring of Energy Load Profiling for the HouseholdsSuvidha Biradar, Prof. Rahul Hiware |
|
1 |
182 |
Wi-Fi Embedded Universal Remote via SmartphoneProf. Sarika Khope, Sumit Kumar ojha, Shivani Sanjay Kamble |
|
1 |
183 |
Analysis of Image Restoration by Non Blind Technique using MATLABAvinash Srivastava, Dr. Pankaj Sharma |
|
1 |
184 |
A Survey on Routing Protocols in Mobile Ad-hoc NetworksSherjung, Dr. R. K.Sharma |
|
2 |
185 |
Counter Measure for Web Application Vulnerabilities using Augmented AlgorithmNeha, Sachin Shrivastava |
|
1 |
186 |
Content Based Image Processing Approach on Colored Images using KNN ClassifierManpreet Kaur, Suchitra |
|
1 |
187 |
A Review on Extensible Regular Humanistic Observable Impression Scooping Multivarious Physical FactsSneha D Patil, Dinesh D Patil |
|
1 |
188 |
A New Scheduling Algorithm for Real-Time Communication in LTE NetworksRohit Gore, Mininath Mahanavar, Akshay Khutale, Bhalchandra Mane, Prof. Priyadarshini patil |
|
1 |
189 |
Lung Pattern Classification for Interstitial Lung Diseases Using a Deep Convolutional Neural NetworkNamrata Bondfale, Shweta Banait |
|
2 |
190 |
Survey on Smart Sensors for Power Management in Intelligent Buildings using WSNMitkari P.C, Dr Mane P.B |
|
1 |
191 |
Advanced Healthcare System Using IOTSanjay D. Dhandare, Prof. Dr . S. M. Mule |
|
2 |
192 |
Review on Detection of Pedestrian Crossing for Safe DrivingTushar D. Patil, Prof. Archana B. Kanwade |
|
2 |
193 |
An Overview of Different Mechanisms to Detect Plant Leaf Disease Infected AreaParikshit N. Wankhade , Prof. G. G. Chiddarwar |
|
1 |
194 |
A Fully Digital ASK Demodulator with Digital Calibration for Bioimplantable DevicesAarti Zope, Rashmi Mahajan |
|
1 |
195 |
Automatically Mining Query Facet for Online Content MiningAkriti Verma, Bhagyashri Bhamare, Dipak Sanap, Ravindra Gorde, Prof.Tejaswini Adikane |
|
1 |
196 |
Hybrid Big Data Approach For Secure Authorized DE-duplicationGharge Nitin S., Bhor Ganesh G., Karajange Ganesh M., Jagdale Pravin R., Prof.Kadam Yogesh V |
|
2 |
197 |
Two Dimensional Cryptography Using Modified Pallier Cryptosystem Jadhav Rohini, B. S. Kurhe |
|
1 |
198 |
Twitter Sentiment Analysis of Demonetization on Citizens of INDIA using RShiv Kumar Goel, Sanchita Patil |
|
6 |
199 |
A Survey on Secure E-mailing System with Cryptography Using Fibonacci Series Abdul Quader Quazi, Pavan Y. Maddikar , Kiran K. Tangod |
|
2 |
200 |
Real Time Monitoring of Change in Temperature with CO2 using IOTDr. Jitendranath Mungara, Kavitha K K, Mahesharan P, S Akshya, Shaik Mohammad Sajid, Vishal Petkar |
|
3 |
201 |
An Efficient Technique for Runtime Distributed Web Caching with Knowledge based ClusteringAnkita Sharma |
|
1 |
202 |
A Review on Vehicle Identification and Tracking System in Java and Open-CV and Kohonen’s Neural NetworkMandal Akash, Atri Kapil, Alkute Mahesh |
|
2 |
203 |
IOT Based Monitor and Control of Smart Grid Energy Sources using VLSIPriyanka B. Deshmukh, Prof Hemangi N. Patil |
|
1 |
204 |
Compare Multi View & Multi Modal Image Fusion Based on Edge Preserving Decomposition, Guided Filter, Gabor Wavelet TechniquesM.Hema, Dr. D.Gowri Sankar Reddy |
|
2 |
205 |
Daily Life Activity Tracking on AndroidAyesha Samreen |
|
1 |
206 |
Daily Life Activity Tracking on AndroidAyesha Samreen |
|
1 |
207 |
Performance & Analysis of High Data Rate Wireless Optical Communication for Short Range ApplicationDivya Tyagi, Dr. A.K. Gautam |
|
1 |
208 |
Implementation of Predicting Terrorist Incident Using Real Time Big Data AnalysisShenkar Amol Shivaji, Prof.B.S. Kurhe |
|
1 |
209 |
Leveraging Route Maps by Partial queries with Cache-SupportS Swetha Reddy, M.Hymavathi |
|
1 |
210 |
Ontology Based User Adaptive Web PersonalizationAbhijit Vaidya, Prashant khoje |
|
1 |
211 |
Analysis of Attacks and its prevention using Encryption in Cloud ComputingAnmol Bhatia, Gaurav Garg |
|
1 |
212 |
Review on Configurable and Low-Power Mixed Signal SOC for Portable ECG Monitoring ApplicationsShubhangi S. Dhuma, S.K.Bhatia |
|
1 |
213 |
Multimedia Data Mining Using Deep LearningAditya Welhal, Shambhu Singh, Santosh Hundekar, Pravin Singh, Prof.A.G.Dombe |
|
1 |
214 |
Improved Scaling for Image Quality Enhancement in Digital Image WatermarkingSarvjeet Kamna Devi, Nancy |
|
1 |
215 |
Priority Based Congestion Control Clustering Protocol Using Load Balancing in WSNKamini, Prabhjit Singh |
|
1 |
216 |
An Efficient Data Replication on Cloud Computing using MBFD with Mutual InformationSupriya Kumari, Prof.Shradha Pandit |
|
2 |
217 |
A Survey on Design of Vehicle Diagnostics System Based on Cross Platform ApplicationShivani S. Gawande |
|
1 |
218 |
A Survey on Opportunistic Scheduling for Traffic Networks with Multiple ConstraintsPooja N. Nimbalkar |
|
2 |
219 |
Detecting and Preventing Denial of Sleep Attack using KeyGen (Key Generation) AlgorithmUsha C. Khake, Pooja L. Chelani, Vandana S. Lokhande |
|
1 |
220 |
A Survey on E-Prescription SystemSivaranjani J, S Rajeswari, Dr. Jitendranath Mungara |
|
3 |
221 |
Hand Gestures Recognition System for Deaf, Dumb and Blind PeopleChannaiah Chandana k, Nikhita k, Nikitha P, Bhavani N K, Sudeep J |
|
3 |
222 |
Design and Implementation of Address Generator for WiMAX DeinterleaverRasika Ramchandra Kulkarni, Prof.Preeti Rajput, Dr.V N Nitnawre |
|
1 |
223 |
Review on Amalgamated Metrics Estimation Methods for Software Project ManagementVishakha Sharma, Gaurav Garg |
|
1 |
224 |
Efficient Algorithms for Mining High Utility item sets from Transactional DatabasesSharayu Fukey, P. M. Chawan |
|
1 |
225 |
Mining Social Media Content for Analysing Employees’ Working ExperiencesAnjali Pawar, Rhiddhi Khartadkar , Sankalp Kale, Kiran Naik, , Priyanka R. Rajmane |
|
1 |
226 |
Recognising and Handling Malware Propagation in Large Scale NetworksDr.Jitendranath Mungara, Shwetha KS, Shishir Umesh, Rashmi Priya, Shobitha G |
|
2 |
227 |
Design and Detection of Social Media Botnets using Event-Driven AnalysisPayal Chandak, Prof. H. P. Channe |
|
1 |
228 |
|
|
2 |
229 |
Fault Tolerance and Recovery to Minimizer Energy Consumption in Job AllocationAvneet Kaur, Divyajot Gill |
|
2 |
230 |
Temporal Topic Model for Friend Recommendation SystemJayashri Vijay Thorat |
|
1 |
231 |
License Plate Detection and Recognition Using a HOG Feature Based SVM ClassifierVivek Joy, Binu A., Kuttyamma A. J. |
|
1 |
232 |
Enhanced Energy Efficient Routing Algorithm using Cluster Heads Maximizing Network LifetimeAnjali, Sachin Srivastava |
|
5 |
233 |
Detection of Storm and Signalling Attack in Wireless Sensor NetworkNamrata Sawant |
|
1 |
234 |
Fine Grained Authentication Method for Web Based Cloud ServiceKarishma Tamboli |
|
1 |
235 |
A Review on Comparative Analysis of Indoor and Outdoor Positioning TechnologyRashmi C Chaudhari, Prof. Mahesh M Sadavarte |
|
1 |
236 |
Computer Control with Voice Command (MFCC) using Ad-hoc NetworkPooja, Mukesh Kumar |
|
1 |
237 |
Data Mining Study and Analysis for Semi Structured Data Extraction Using XMLVersha, Deepika Garg |
|
2 |
238 |
Semantic Image Segmentation by Deep Convolution Nets and Watershed TransformationSahana Patil, Sandeep Kumar |
|
1 |
239 |
Optimized Joint Stable Routing and Channel Assignment for Mobile Ad-hoc Cognitive NetworkNavya P, Badarla Sri Pavan |
|
1 |
240 |
Hand Gesture Recognition using DTW and Morphological Feature ExtractionSindhu. K. M, Suresha.H.S |
|
2 |
241 |
IOT Based Architecture for Patient Health Monitoring SystemRakshith Babu H V, Prof. Latha. S |
|
2 |
242 |
Detection of Neovascularization on Optic Disk Region based on Kernalized Fuzzy C-Means and ANN ClassifierVanitha L. B, Prof. Preethi. S |
|
2 |
243 |
Plant leaf Classification using Artificial Neural Network ClassifierSuman S. G, B. K. Deshpande |
|
2 |
244 |
The Improved Image Steganography with Encryption Method and to Overcome the Compression TechniqueAshwini W, Nagraj Kyasa |
|
1 |
245 |
Resisting Black hole Attack in MANETR.Siva Subbiah, Dr. K.E.Kannammal |
|
1 |
246 |
A Comparative Survey on Load Balancing Algorithm in CloudSurbhi Nema, Prof. Saurabh Kapoor |
|
1 |
247 |
A Survey: DDoS Attacks and its Effects on Cloud EnvironmentNishalee Choubey, Prof. Saurabh Kapoor |
|
1 |
248 |
Survey on User Authentication for Cloud ComputingNeha Bairagi, Prof. Saurabh Kapoor |
|
1 |
249 |
Efficiently Resource Allocation In Cloud Scheduling Using Differential EvolutionDolly, Er. Suchitra |
|
1 |
250 |
Survey on Malware Detection in Cloud Computing InfrastructuresNimith Shetty M, Kaushik C Reddy, Gangadhar Immadi |
|
1 |
251 |
EEARP- Enhanced Energy Aware Routing Protocol for WSNsAnshu Verma, Narendra Kumar Gupta |
|
1 |
252 |
Energy Efficient Image Data Offload Mobile Cloud ComputingSridhar S K, Keerthi G, Manjuladevi P, Masarpu Swathi, Nethravathi |
|
1 |
253 |
An Efficient Deduplication and Data Sharing with Dynamic Ownership Management for CloudSukanya Gunjal, Prof. B. S. Kurhe |
|
1 |
254 |
Enable Data Sharing Scheme for Dynamic Groups in the CloudJyoti Pingat, Prof P. R. Ugale |
|
1 |
255 |
An Efficient Coding Scheme for an Optimal Solution for Data Coding in Cloud Storage SystemSupriya Datkhile, Prof. P. R. Ugale |
|
1 |
256 |
Trend Analysis Using Hadoop and Its EcosystemsDeepak Ranjan, Dr. Tripti Arjariya, Dr. Mohit Gangwar |
|
2 |
257 |
Generating Optimal Result for Fraud Detection Using Data MiningPunam Bagul, Sachin Bojewar |
|
2 |
258 |
An Authenticated Trust and Reputation System for Hybrid CloudSindhu B S, H M Sanjay |
|
1 |
259 |
Clustering of Datasets Using K-Means Algorithm in SPARKSubiksha N, Pallavi R Reddy, Mounica B |
|
2 |
260 |
Smart Device: A Smarter Way to find the Packed Food QualityR Suganya |
|
2 |
261 |
SmartCrawler: Proficiently Harvesting DeepWeb Interfaces Using Two Stage Crawler Ghanshyam Patil, Prof. U. H. Wanaskar |
|
1 |
262 |
Analysis of Different Load Flow Technique with Distribution ResourcesPriyal Kumari, Varsha Mehar |
|
1 |
263 |
A Survey of Different Compression Technique for Biomedical Signal (ECG)Saroj Dashariya, Prof. Akhilesh Singh Thakur, Dr. Rahul Dubey |
|
1 |
264 |
A Survey on Image Security using Visual CryptographyFarah Khan, Prof. Deepa Gianchandani |
|
1 |
265 |
A Survey Report on Search Engine Optimization and Network SecurityAnuraj Singh |
|
1 |
266 |
A Review on Video Object TrackingSandhya Tiwari, Prof. Kapil Gupta, Dr. Rahul Dubey |
|
1 |
267 |
A Survey on V/V Secure Communication over VANET DSRCNikhlesh Namdev, Prof Rovin Tiwari, Dr. Rahul Dubey |
|
1 |
268 |
Trusted Computing in Cloud ArchitectureNeelam , Rachna |
|
5 |
269 |
Phishing Techniques and Preventive Measures - A ReviewAeshwarya , Suman kumari |
|
1 |
270 |
Prediction of Stock Market using Neural Network for Increasing AccuracyKaveri Deshmukh, Shubhrata Mahajan, Bhavana Samel, Prof.Chate P.J |
|
1 |
271 |
Usage and Analysis of Estimation Techniques in Software Project Management Vishakha Sharma, Gaurav Garg |
|
1 |
272 |
Sketch Based Image Retrieval using Saliency MatchingSafiya P.C, Niyas N |
|
1 |
273 |
A Survey on “Two-Level QR Code for Document Authentication”Madhuri Mohanrao Jagtap , Prof. S. K. Bhatia |
|
1 |
274 |
An Effective Survey on Mining Weakly Labelled Web Facial Images for Search-Based Face AnnotationPooja P. Gadhave |
|
1 |
275 |
Resource Optimization Based Scheduling Algorithm in Cloud EnvironmentPriyanka Dhurvey, Nagendra Kumar |
|
6 |
276 |
Face Detection Technique Using Neural NetworkShalu Kansal, Suchitra |
|
1 |
277 |
Optimization Techniques for Efficient FPGA Hardware Implementation on IRNSS User ReceiverShachi Varku, Sharanya S Konandur, Swetha A, Akalpita L Kulkarni |
|
3 |
278 |
Design and Implementation of 4-Bit ALU using FinFET TechnologySmt.A.Nagamalli, N.Vivek Naga Bhushanam, O.Nagasai, P.Swathi |
|
2 |
279 |
A Survey on Radiofrequency Tissue AblationHemant Sahu, Davender Singh |
|
1 |
280 |
A Survey on External Security Threat with Defense Mechanism for Wireless Sensor NetworkProf.Sagar Thakare, Manjusha Nimbalkar, Richa Nabar |
|
2 |
281 |
Novel Approach for Image Fusion Using NSCT and Masking TechniqueDeepika M, Thippeswamy K H |
|
1 |
282 |
Improved Rule Mining Classification Algorithm Based on Particle Swarm OptimizationD.Senthil Kumar, Dr.N.Jayaveeran |
|
1 |
283 |
Design an Architecture for Object’s Feature Extraction and Retrieval of a Gray Scale ImagePooja Garg |
|
1 |
284 |
Credit Card Fraud Discovery: A SurveyRitika Wadhwa |
|
1 |
285 |
A Survey on Security Improvements in VM Allocation of Cloud Computing to Defend AttacksRevati Vijay Rajane, Prof.Pradnya Kasture |
|
3 |
286 |
A Secure Method Using Cloud in Anti-Collusion Data Sharing Scheme for Dynamic GroupsNidhi N G, Padmashri A M, Poojitha M, Pooja S, Deepashree N S |
|
2 |
287 |
Offline Kannada Handwritten Word Recognition Using Locality Preserving Projections (LPP)Pooja K Gowda, Chethan S , Harsha J , Rakesh J, Tanushree K N |
|
1 |
288 |
A Study on 4pioneering Technologies Imminent With CybersecurityM.Anitha Priyadharshini, S.Nivedha |
|
1 |
289 |
Performance Evaluation of Neural Network based Cognitive eNodeB in LTE UplinkRajat Urade |
|
1 |
290 |
Review on Fir Filter Designing Using Wavelet TransformKavya Dwivedi, Dr.Ravindra Pratap Narwariya |
|
1 |
291 |
Saliency-based Feature Assessment for Color DeficientsMonali G. Meshram, A. M. Shah |
|
1 |
292 |
A Survey Paper on Cloud Security Issues and ChallengesPankaj Singhai, Prof. Saurabh Sharma |
|
1 |
293 |
Cloud Computing Security Issues and ChallengesAman Shrivastava |
|
1 |
294 |
Innovative Approach towards Interactive Classroom Sessions using an ICT Tool – KahootShibani Kulkarni, Neeta Takawale |
|
3 |
295 |
Implementation of Security System Using IOTAbhijeet Suresh Mendhe, Divya Meshram |
|
1 |
296 |
IIR Filter Design Techniques – A Critical ReviewKratika Chaudhary, Dr Ravindra Pratap Narwaria |
|
1 |
297 |
Safe Drive Assistance SystemDipali Dilip Narwate, Prof.Rashmi Mahajan |
|
1 |
298 |
A Study on Neural Network in Image ProcessingSudhir Kumar, Davender Singh |
|
1 |
299 |
Multi Skill Oriented Spatial CrowdsourcingArun.S.Dalvi, Prof P.N.Kalavadekar |
|
2 |
300 |
Multi-Client Real Time Communication using BrowsersKajal Janghale, Chetali Mahore, Supriya Kakade, Kirti Narbag, Mayuri Thakare, Prof. P. M. Chawan |
|
2 |
301 |
Online Evaluation of Project Report and Technical Paper for Educational InstitutesShweta Monde, Suyog Manore, Tharun Naidu, Karan Manwar, Prashant Lokhande |
|
2 |
302 |
A Survey on A Weighted Method Based Technique for Vertical Handover Decision in Multi Network Wireless EnvironmentSandeep Kumar, Sandeep Goyal |
|
1 |
303 |
Enhancing Grid-FTP Protocol to Facilitate Full-Duplex Data CommunicationRevansiddh Patil , Prof. S.A.Khuba |
|
1 |
304 |
Data security in QR code using SteganographyBhakti Magadum |
|
1 |
305 |
A Critical Review on Image Fusion TechniquesLata Kuswaha , Dr. Vandana Vikas Thakare |
|
1 |
306 |
Video Steganography through RC4 Cryptography with Random Sequence of Data HidingSapna |
|
2 |
307 |
Saliency-based Feature Assessment for Color DeficientsMonali G. Meshram, A. M. Shah |
|
1 |
308 |
Road Navigation Improvement Using Route Data AnalysisFaizal Ahmed, Divakar H.R |
|
1 |
309 |
Hospital Queueing Recommendation System Using Spark Streaming For Big DataSneha Girolla, Sunil Rathod |
|
1 |
310 |
Design and Implementation of a System for University Automation Assessment Raghavendra V, M S Sowmya, Gokul G, Mohammed Inzamamul Mistery, Sahil Jakhar |
|
1 |
311 |
Deduplication and Secure Auditing Of Data in Cloud with Convergent Key ManagementKunal S. Bhutwani, Prof. S. P. Kosbatwar |
|
1 |
312 |
Comparative Analysis of Various Routing Strategies in the Framework of the Proposed Models Mohammad Alhihi |
|
1 |
313 |
To Measure the Performance of DWDM Ring Network Using RZ and NRZ ModulatorsRamandeep Kaur, Dr. Renu Dhir |
|
1 |
314 |
Development & Implementation of Custom Connectivity Protocol for Identification and Tracking of Public Transit Vehicles Using Portable and Station NodesErabathini Chetan Laxmirajam, Dr. Prof. R. S. Kawitkar |
|
1 |
315 |
Achieving Secure, Scalable, Data Group Sharing Using Key Aggregate Searchable Encryption in CloudRajeshree K. Duratkar, Prof. Sonali A. Patil |
|
1 |
316 |
Video Retrieval by Detecting Key Frames in CBVRPoonam V.Patil, Prof.S.V.Bodake |
|
1 |
317 |
A Study and Analysis of Mutual Authentication Security Issues and Solution Schemes in WiMAX 802.16Sher Singh, Gaurav Garg |
|
1 |
318 |
Alignment-Free Fingerprint with iris Cryptosystem Based on Pair-Polar Minutiae Structures with Multiple Fuzzy Vault and Minutia Local Structures Priyanka Vethekar, Dr. Archana Lomte |
|
2 |
319 |
Secure Access to Encrypted Cloud DatabaseChandan M N, Prof. Divakar H.R |
|
3 |
320 |
A Survey on Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social NetworksKirti Nagargoje, Prof. Archana Lomte |
|
2 |
321 |
Image Authentication Using Cryptography and Steganography in Network SecurityDeepak Shailendra Singh , Prof. Mrunali Metri |
|
1 |
322 |
A Review on: Network Traffic Classification using Bi Graph and ProjectionPrital Mahadev Kadam, Prof. Prajakta Satarkar |
|
1 |
323 |
Wireless Environment Monitoring System Using WiFiPuja Patil , Prof. M.K.Kodmelwar |
|
1 |
324 |
Last-Meter Smart Grid Embedded In an Internet-Of-Things PlatformNarendra Kumar Rajwade, Dr. S.D. Lokhande |
|
1 |
325 |
Intelligence Communication Protocol Based Monitoring and Control Home AppliancesThorat Madhuri B, Pokale N.B |
|
2 |
326 |
Survey on Learning Human Emotions from Body Gestures during Social Human–Robot InteractionsDiksha A. Shende, Dr. R. S. Kawitkar |
|
2 |
327 |
Implementation of Forward Security System for Data Sharing With Authenticity and Cost EffectiveMihir Mohapatra, Prof. N.P. Karlekar |
|
1 |
328 |
Brain Tumor Diagnosis Using Deep Neural Network (DNN)Suraj S. Gawande, Vrushali Mendre |
|
2 |
329 |
Survey on Beehive Erasure Codes for Distributed Storage SystemsMugdha Adivarekar, Vina Lomte |
|
1 |
330 |
Intelligent Recommender in Stock MarketMandar Ganesh Deshpande, Ashwin Prabhu, Nishi Tiku |
|
2 |
331 |
Fake Account Detection and Privacy Policy Inference based on content-based classification of User-Uploaded Images on Content Sharing SitesAnant Mandre, Prof. Sonali Patil |
|
1 |
332 |
Secure Data Sharing in Clouds by Using High Level Petri NetsPriti Kanhere, Prof. S.A.Patil |
|
2 |
333 |
Securely Mining UARSTP with Recommendation System in Document StreamsVarsha Ohol, Dr. Arati Dandavate |
|
2 |
334 |
Enhancing Security using Knowledge
Discovery and Data Mining Methods in Cloud Computing
Pankit
Arora, Sachin Bharadwaj |
|
2 |