International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-5 May   2017


S.No Paper Title / Authors Download Paper Downloads
1

Survey on Requirement Elicitation Techniques: It's Effect on Software Engineering

JOSEPH ELIJAH, DR. AMIT MISHRA, ENGR. MATHEW CHUKWU UDO, ABDULRAHMAN ABDULGANIYU, PROF. ABIODUN MUSA AIBINU
2
2

A Survey On Marketing Performance of Small Scale Vs Large Scale Vendors Using Big Data Analytics

SHAHANAZ. J.
2
3

Application of Internet of Things in the Field of Medical and Smart Health Care

DIKSHA B. WASANKAR, DR. VIJAY S.GULHANE, L. K. GAUTAM
4
4

Statistical and Machine Learning Techniques for Prediction of Customer Churn in Telecom

DR. T. LEO ALEXANDER, D. MONICA
1
5

A Convolution Neural Network Based Deep Learning System for Brain Tumor Detection towards MRI Image Segmentation

UDAY BELLARY, JAVERIYA SADAF
1
6

Secret Key Sharing Mechanism for Data Security in Cloud

ANMOL BHATIA, GAURAV GARG
3
7

DC Motor Speed Control with PID Controller: A Review

SHIKHA SINGH, MILONI GANATRA, HANSA SHINGRAKHIA, ZALAK PATEL
2
8

Design and Implementation of Blood Bank Monitoring System Using Raspberry Pi

K.SRAVANI, B SUJATHA
1
9

Design and Implementation of E-Blood Donation System Using Location Tracking

DEEPTHA HEGDE, AGNUS KURIAKOSE, AMITHA MARIYA MANI, ANJU PHILIP, ANNAMMA P ABRAHAM
1
10

Design and Implementation of Improved System for College Automation and Management

MOHITHA H V, ANANDU MOHAN, JEYS REJI, BENCY S BABU, TINTUMOL M G
3
11

Developing a Face Recognition and Analysis System (FRAS) and its Applications

ASHIN GUHA MAJUMDER, ANURAG ROY, SUVASISH DASGUPTA, SHALABH AGARWAL
8
12

Area–Delay–Power Efficient Carry-Select Adder

SAREEKA TULSHIRAM DEORE, PROF. DR. P. MALATHI
3
13

Twitter, Facebook and Google Data Analysis Using Open Source Hadoop Technologies Hive

Y.SIRISHA, N.ARUN JYOTHI, K.S PARIMALA
2
14

An Innovative Pliable Distributed Cloud Storage Integrity Checking Scheme

ULYA SABEEL
2
15

A Survey on Personalized Web Search Privacy Protection

DEVIKA P, JITHA K
2
16

Survey of Healthcare at Household Using Wearable Devices on Cloud

SHAIK MOHAMMED SAJID, KAVITHA K K
3
17

An Efficient Fuzzy Based Approach for Hepatitis Detection

ANCY SUDHAKAR , RAJALEKSHMY K D, PRINCE ABRAHAM
3
18

Efficient Semantic Search over Encrypted Data in Cloud Computing

YASH KHARE, ASIF SHAIKH, AKSHAY GOLE, PROF. K. BALA
1
19

Design and Implementation of Driverless Car to Recognize Traffic Light

ARPITHA S K, NAGARATHNA
8
20

A Review on Security Issues in Cloud Computing

K SRI VANI
1
21

Analysis of 2D to 3D Reconstruction Techniques over Brain MRI 

A. FARZANA, DR. M. MOHAMED SATHIK 
4
22

Statistical Translation using KNN and N-gram Algorithm for Machine Translation

SHILPA MODANI , PRIYANKA MORE , HARSHAL SHEDGE , U. C. PATKAR
1
23

Approach for Classification of Neuromuscular Disorder using EMG Signals

AMIT KUMAR SINGH, N K AGRAWAL, SUMIT GUPTA
1
24

Design and Implementation of Vehicle Emission Testing System using MQ-5 and MQ-7 Sensors

AKSHATHA.A, NAGARATHNA
2
25

Automated Toll Collection System Using RFID

AISHWARYA D SHETTY, JASRIN M.D, JYLES BENNY, SUMIMOL SADASIVAN
1
26

Real-world Performance Analysis of Ad-hoc wireless Network

TUSHAR G. DANGAT
2
27

Implementation of 8X1 Low Power Multiplexer using Transmission Gates

PALAPARTHI SURESH, YELITHOTI SRAVANA KUMAR
3
28

Design and Analysis of Multiplexer using ADIABATIC Logic

MOPADA DURGA PRASAD, BOGGARAPU SATISH KUMAR
2
29

Study of Different Mobility Schemes to Provide Improvement in Wireless Sensor Network with Detection of Node Clones

NEHA SEN
1
30

XML Query Answering using Data Mining Tree Based Approach

VERSHA, DEEPIKA GARG
2
31

An Android Based Smart Wheelchair with Health Monitoring using IoT 

PRATEEK GUPTA, SHUBHAM SAGAR NAYAK, UPASANA, PROF. ATUL B. WANI
1
32

Analysis of the Multitasking Feature-Virtualization and Virtual Storage in Cloud

ASHIMA NARANG
1
33

Design and Analysis of Energy Efficient Adders Using Low Power Techniques

BADE GNANESWARI, D.VENKATACHARI
3
34

An Efficient Fuzzy Logic Classification over Semantically Secure Encrypted Data

P. HEMALATHA, DR. S. M. JAGATHEESAN
3
35

Data Embedding based 4 LSB technique in Image using Steganography

NITIN R. ZINZURKE, PROF. SUHAS M. PATIL
3
36

A Review on Meta-Material based Soft Horn Antenna

PROF.ZALAK PATEL, PROF.MILONI GANATRA, PROF.HANSA SHINGRAKHIA, PROF.SHIKHA SINGH
7
37

Integrating Personalization and Image based Search System to Enhance Search Results

SNEHA A. TAKSANDE, PROF. A. V. DEORANKAR
2
38

High-Performance FIR Filter Architecture for Fixed and Reconfigurable Applications

PALLAVI R. YEWALE
1
39

Automated Elevator-An Attentive Elevator to Elevate using Speech Recognition

CHINTAN PATEL, ANSHUL MAATHUR
2
40

A Survey on Monitoring and Control system for Food Storage using IoT

ROHAN WAGLE, MAYUR SHAH, ADITYA KADAM, RAMGOPAL SAHU
5
41

A New Innovative Approach for Natural Image Denoising Using Genetic Algorithm and Thresholding

S.AAISHA NAZLEEM, L.S.SUBBULAKSHMI   
2
42

A Real Time Monitoring System for Home Automation

AKSHAT SHARMA, ARUNKUMAR T
2
43

An Efficient and Secure Dynamic Auditing for Regenerating-Code-Based Cloud Storage

NARESHKUMAR R.M, SHOAIB ZARIKER
1
44

Big Data Application in Agriculture to Maximize the Rice Yield Crop Production using Data Mining Techniques

SNEHA N, DR. JHARNA MAJUMDAR
2
45

Deadline-Aware Sufferage Based task Scheduling in Cloud Computing

ALKA VOHRA, SUCHITRA
1
46

A Survey on Thoughts to Text Using Brainwave Patterns

DIPTI PAWAR, KAPIL KAMALE, ISHAAN SINGH, VISHWAJEET KHAROTE, PRAJWAL GOSWAMI
3
47

Selection of Personal Computer using Modified Fuzzy Analytical Hierarchy Process

SONIKA SHARMA, MOHINDER SINGH
1
48

Comparative Study of Image Compression using Discrete Wavelet Transform and Discrete Cosine Transform

PRIYA BACHHALIYA, PROF. NITESH KUMAR
1
49

Automated Security System for Girls Safety Using ARM7

SANGEETHA V, NUZHATH ZAIBA, POOJASHREE K.P, REETU T, SHASHWATHI N. BHAT
1
50

Bluetooth Remote Home Automation System using Internet of Things

MENAL DAHIYA
1
51

Detection and Prevention of Black Hole Attack Using Trust Mechanism with various Node Density

HITESH NAGDEV, MAYUR RATHI
2
52

Energy Efficient Routing Protocol with Greedy Algorithm for WSN Scenarios

ASHLESHA SONANE, MAYUR RATHI
2
53

Discovery of Ranking Fraud for Mobile Applications

ARATI TULE, PROF. RAHUL SHAHANE
1
54

Implementation of Efficient Parallel Decimal Multiplier Using Verilog

CH.TEJASRI, DR.B.NAGA JYOTHI
1
55

BillSmart- A Smart Billing System using Raspberry Pi and RFID

DR. MARY CHERIAN, DISHA DH, CHAITHRA KB, ANKITA, AISHWARYA
1
56

Comparative Study of Pattern Classifiers

JAGBEER KAUR, DEEP KAMAL KAUR RANDHAWA
1
57

Off-Street Parking Space Reservation Using Smart Phone Application

AKSHATHA B S, UMA S K
2
58

Connecting Social Media to E-Commerce Using Cold Start Product Recommendation

SALKE SHITAL ARJUN, MORE PRIYANKA GAUTAM, SHINDE SNEHAL MOHAN, SHINDE SAMRUDDHI VINOD, PROF.MILIND R. HEGADE
1
59

Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing 

AMREEN DESHMUKH, SHUBHANGI TAKE, SANCHITA DESHMUKH, PROF. H.B.JADHAV
1
60

A Cost-Effective Home Security Alarm System for Detection of Motion 

Ashwini M, Uma S K
1
61

Comprehensive Model Driven Approach for Requirement Management System 

Pooja Batra Nagpal
1
62

EduAR: Transforming Education with Augmented Reality 

Ravi Koshiya, Shantanu Kulkarni, Divvya Mehta, Pratik Malkan, Purnima Ahirao
5
63

Face Recognition using Sift Key with Optimal Features Selection Model 

Mandeep Kaur, Jasjit Kaur
2
64

Performance Analysis of Progressive Coefficients Significance Compression Methods for ROI-based DICOM Image 

Gunjan Chaudhary, Prof. Yogesh Kumar Mishra
3
65

Survey on Abandoned Object Detection using Image Processing 

Dhanashri Adalinge , Damini Patil, Shubhada Dongare, Surabhi Gokodikar , Prof. M. K. Kodmelwar
2
66

Analysis of Soil Behavior and Prediction of Crop Yield using Data Mining Approach 

Supriya D M 
3
67

Proximity Aware Clustering in Delay Tolerant Network for Efficient File Search 

Nikhil Patil, Ashitosh Vidhate, Lakhan Jadhav, Prof.Priya Pise
2
68

A Novel Multiband Multichannel Variational Approach Based on NLTV Model for Image Inpainting 

Gaurav Chouhan, Mandeep Singh Saini
1
69

Packet Scheduling and Self Restriction Schemes for Underwater Acoustic Localization in WSN 

Keerthi M, Jayashankar M
1
70

Performance Analysis of Digital Finite Impulse Response Filter Design using Windowing Techniques 

Prof.Hansa Shingrakhia, Prof.Miloni Ganatra, Prof. Zalak Patel, Prof. Shikha Singh
1
71

Detection of Different Stages of Lungs Cancer in CT-Scan Images using Image Processing Techniques 

Priyanka Basak, Asoke Nath
1
72

A Literature Survey on Mining Health Data to Predict Heart Disease 

P. Priyanga, Aparna N Venu, Latha Eshappa, M Archana, Navya Shree D P 
2
73

Implementation of Integrated System to Avoid Flood like Situation 

Tanwid. Deshmukh, DR.A.P. Thakare
1
74

Anti-Theft Application for Android Smart-Phone 

Priya Chintawar, Sujata Agrawal
1
75

Implementation of Partial Generalization for Data Publishing with Minimal Information Loss 

Urvashi Hiranwar, Amit Pimpalkar
1
76

Fingerprint Based Driving License System 

Sarika Fulpagare, Monali Kulkarni, Dipak Deokar, Rahul Deshmukh , D.A.Phalke
1
77

Amalgamation of Cryptographic Techniques for Secured Data Transmission 

Meghana V, Aishwarya B, Shobha M.S
2
78

Electronic Toll Collection System Using RFID Tag 

Najeeba Tabassum
1
79

Secured Data Transmission in Mobile Adhoc Networks: An Implementation Using Java 

Drashti Gautam, Dr. Anurag Sharma
1
80

Minimization of Network Traffic Using Partition and Aggregation for Data Stored in Cloud 

P.Priyanga,Tushar.R.Shetty,Utsav.K.P,V.Rahul, Darshan.C
1
81

CMOS RF Power Amplifier Using Reconfigurable Interstage Network for Envelope Tracking

Neha A. Kashiwar, Prof. S. S. Agrawal
1
82

A Survey on Object Detection and Tracking Algorithms 

Subhash Nevhal, Dr.Archana Ghotkar
2
83

Sentiment Analysis using Machine Learning Algorithms: A Survey 

Kaushik Hande1, Prof. A. G. Phakatkar
1
84

Medical Records Clustering: A Survey 

Mangesh Mali, Dr Parag Kulkarni, Prof. Virendra Bagade
2
85

FPGA Implementation of Gradient Based Edge Detection Algorithms 

Avinash G. Mahalle, A. M. Shah
2
86

Enhanced Application of Natural User Interface Using Kinect

C. Dinesh Kumar, D. Lohitha
1
87

State of The Art Content Mining Using SCAN Technology

Dr. Anuj Kumar Parashar  , Er. Dev Kant Tyagi
1
88

Detecting Relay Attacks in RFID Using Bloom Filter for Unauthorized Reading

Reeta Kumari Ashok Singh, Prof.Anubhav Sharma
4
89

Development of Auto-Ranging DAS on 32 bit ARM Cortex Processor for X-Ray Detectors

Sayali Dilip Kedar, Piyush Saxena, V.K.Dubey, Lekha Das
1
90

Minimizing Energy of Cluster Based Cooperative Spectrum Sensing in Cognitive Radio Network Using Genetic Algorithm

Chanchal Nigam, Rabindra Kumar Singh
2
91

Energy Efficient Routing Algorithm for Maximizing Network Lifetime of Heterogeneous Wireless Sensor Networks

Manish Chandra, Yogesh Kumar Mishra
2
92

Integration of RFID, NYC and Blockchain Technologies 

Snehal Johny, Sayali Chavan, Nishi Tiku
1
93

Energy Efficient and Secured Dynamic Real Time Routing Protocol in Wireless Sensor Networks 

Chitra.P, Chandrakala.V
1
94

Fair Routing Across the Wireless Sensor Network Using Deniable Encryption and Load Balancing

Ashwini A N, Manjunath H R.
1
95

A Survey on Unidirectional Intermediary Re-Encryption to Preserve Ciphertext for Big Data Storage 

Roopa S
1
96

Fusion of Big Data and HealthCare: A Review

Ankit Chaudhary, Neha Tyagi
2
97

A Novel Scheme for Estimation of Probability of Inference 

Mahmood Saif, Rameshwar Rao
1
98

Secure File System Architecture- Based Session Key Generation in pNFS 

Sreedevi R
4
99

A Review on Work Family Conflict of Women Employees in IT Industries 

Kochumol Abraham, Win Mathew John, Sijo Thomas
6
100

Detecting Jamming Using RTS CTS Strategy 

Anita Wakode, Mayuri Halnor, Rashmi Singh, Prof.Aditi Chaturvedi
1
101

A Sentiment Analysis of Twitter Data using Hadoop Framework 

Jeevitha, Raksha, Vipin N
2
102

Recommendation of Cold-Start Product by Socializing E-Commerce 

Dipali Gavhane, Gitanjali Shelge, Swapnanjali Ubale, Swapnil Shinde
1
103

A Survey On Smart Parking Systems Using Cloud Based Services 

Shubham Bhalerao, Umang Mahant, Megh Makwana
2
104

An Application for Interior Design Using Augmented Reality 

Noor Farhan Kapdi, Shubham Sangnale, Pramod Ralebhat, Prof. Mandar Mokashi
2
105

A Survey on Better Tracking Using Digital Intelligence

Vinaya Poojari , Rahul  Naik, Ramesh Solanki
1
106

Host Based Internal Intrusion Detection System by Using Data Mining and Forensic Techniques 

Prof.Rucha Dixit, Pacharne Vrishali, Ghorpade Sayaliraje, Palase Amruta, Avhad Pallavi
1
107

Mobile based Anti-Phishing Scheme using  QR Code 

Prof. Rukaiya shaikh, Sharma Mala, Ansari Salman, Sher afgan
1
108

Refined Techniques for Collision Avoidance and Comparison of Different Algorithms  

Prof.Baltej Kaur, Sakshi Rajendra Waghmare, Snehal Vitthal Bhosale, Chandni Navnath Nagargoje, Dipali Tukaram Kendre
1
109

An Automated Swarm Based Agriculture Robot 

Mayur Bawaskar, Nikhil Tehare, Jaywardhan Mane, S.S.Sayyad
1
110

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence 

Rasika Deodhar, Isha Deshpande, Rutuja Gandhi, Suraj Jadhav, Shital Kakad
1
111

Financially Assisted Student and Information Management System (FASIM) for Auto-Allocation of Funds Using Mean Stack Implementation 

Prof. D.S.Zingade, Amruta Gaikwad, Shrushti Thorat, Aemal Shah
1
112

Single and Multispeaker Voice Recognition in Android 

Tanmay Naskar, Anket Sah, Akshay Mense, Neha Patekar,  Nikhatjahan Kankurti, Dr. Neeta Deshpande, Suvarna Kadam
9
113

Content Based Image Authentication and Retrieval

Deepashree Deshmukh, Divya Holkar, Sayli Mangle, Nikita Navale, Pranjali Kuche
1
114

Search Recommendation System for Mining Query Facet

Akshay Kadam, Sachin Shinde, Rahul Mallesh, A.B.Waghmare
1
115

Anomaly Detection using 3D Convolution Neural Network 

Niket Tangadpalliwar, Shubham Thapa, Vinit Rege, Kuldeep Singh, Prof. Priya U. Thakare
2
116

Security Preserving Friending in Mobile Social Networks 

Aditya Waghmare, Ashish Kothawade, Prajakta Kakade, Bhagyashri Markad, B. L. Dhote
1
117

Authorized Auditing of Big Data on Cloud Storage 

Prof. Vijay Sonawane, Sachin  Kore , Rajendra Mane, Ajay Pawar, Punam Adling, Vaishali Gorhe
1
118

Contactless Vein Structure Sensing Authentication Technology

Sakshi Chavan, Saurabh Koli, Mrunali Wankhede, Varsha Dange
1
119

Design and Implementation of ADDER Circuit using Quantum Dot Cellular Automata (QCA) 

Koppala Chandra Sekhar, Niddana Prabha
1
120

Web Based Application for Timetable and Feedback Generation System

Tanuja Padale, Manisha Bhagat, Harshada Mane, Shobha Nangare
1
121

Feature Specific Sentiment Analysis for Product Reviews 

Rakshith P, Madhura Geetha S
1
122

An Implementation of NFC Based Restaurant Table Service 

Aditya. R, Anirudh. K. R, Karthik. K. S, Mahinder. P, Deepa. S. R
2
123

An Extensive Approach in Advancement of Software Defined Networking  

Dr Khushboo Tripathi, Deepthi Sehrawat
1
124

A Highly Enhanced Deep Learning Method to Deal Cyber browbeat 

Latha R, Praicy Joseph, Archana D, Nanditha C M, Jayasheela B N
1
125

Frequent Item Set Generation Using Improved PSO over Generalized Transactional Dataset

Sweta Mishra, Yamini Chouhan
1
126

Continuous and Transparent User Identity 

Verification for Secure Internet Services
2
127

Automatic Data Replication in Online Social Network 

Supriya F. Rathod, Prof. A.V. Deorankar
1
128

Wireless Communication Locker with Advanced Security System using GSM, RFID and OTP Technology 

Prutha Suroshi, Radhika Hambire, Priteshsingh Chandel, Milana Malvadkar
2
129

IOT Based Dual Purpose Web Application for Smart Public Transportation 

Supritha R Kumar, Dr. M C Padma
2
130

RFID Based Intelligent Book Finder Using Ultra High Frequency Sensor

Nithya.M, Solaiyammal.K
1
131

Prediction of Breast Cancer Using Mammogram Images by Data mining on the Extracted Features of the processed Image

Tarun Gangil,  Sneha Prajwal
1
132

Online Examination System Based On Student Authentication Using LTP& OTP

Misal Vijaya Balu, Nare Payal Rajendra, Udare Sanjana Sanjay
1
133

Augmented Security by TPA in Cloud Computing

Sashibala, Deepika Goyal
1
134

Dynamic Room Allocation and Online Check-in Check-Out form to Hostel

Vidya Myageri, Vaishnavi Katti, Shruti Kulakarni, Vyshnavi.K, Yerraguntla Rajeswari
2
135

A Child-Left behind Warning System Using Capacitive Sensing Principle

Rakshitha, Anju Mariya George, Blesson Babu, Christeena Joseph, Shilpa T V
5
136

Auto-Aid Agro Seeding Bot Equip with Machine Learning

Nikhil Belwate
1
137

Improving Quality of Satellite Images Using Enhancement Filters and Fuzzy Based Contrast Enhancement Technique

Vijay Tonder, Vivek Shukla, Rohit Miri
2
138

Data Privacy using Multiparty Computation based on Homomorphic Encryption Schemes

V.Satish Kumar, MD.Fayaz
3
139

Home Automation Control with Web Visualization

Asst. Prof. Anant More, Unmesh Bhalerao, Akshay Bhasal, Ankeet Deshmukh
1
140

Prepaid Toll Collection Using Barcode Reader

Charul Bhalerao, Shubham Kulkarni, Prof.Anant More
1
141

A Secure And Dynamic Multi Keyword Ranked Fuzzy Search Scheme Over Encrypted Cloud Data


Kapil Kasture, Rohan Tanpure, Piyush Dhale, Venkatesh Ghalge
1
142

Social Network Aggregator using Crawler and Document Clustering

Neetu, Deepti Sharma
1
143

An Initial Imperative Study on Big Data

Mayushi Chouhan, Makhan Kumbhkar
2
144

A Framework to Provide Assured QoS on Increasing of Profit using Cloud Computing

Pramod Swami, Akshay Sutar, Harshal Patil, Prof. Y.V. Kadam
3
145

Automated Food Product Status Tracking Mobile Application

Anshul Bansal, Durva Deshmukh, Shreyans Kering, Vimal Dev, Shraddha .R. Khonde
6
146

Load Balancing and Task Scheduling in Multi-Cloud System

Nihar Ranjan, Hemant Nagori, Raviraj Adsul, Rishikesh Shinde, Shubham Ruhatiya
3
147

MSEB Smart Meter Reading

Ajinkya Gaidhane, Akash Gawali , Sanket Salave, S.V.Mogre
1
148

Solar Powered Lawn Mower for Grass Trimming

Asst. Prof. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble
1
149

Web Base and Android Base Automatic Dairy System

Supriya Pathare, Komal Mahangare, Prerana Gayke, Rutuja Dhakne, Deshmukh P. R.
2
150


Embedded Visual Cryptography for Secret Color Images Sharing Through Stamping Algorithm and OTP Process


N.N.Thorat, Raju U. Jondhale, Lokesh B. Dandgole, Ravi R. Wadikar


1
151

Electricity Theft Detection and High Alert Techniques Using PLC

Prof. Saylee Begampure, Rutuja Gawade, Aditi Yevale, Sonali Bhor
2
152

Intelligent Interactive Robot with Gesture Recognition and Voice Feedback

Prof. Sachin  Magadum, Aniket Salve, Atul Shitole, Ajay Wadkar
1
153

VEDIKALACH IMPLEMENTATION IN VLSI

Prof. R.U. Shekokar, Abhijeet Honwalkar, Akshay Patil, Swapnil Khalse
1
154

Solar Powered Lawn Mower for Grass Trimming

Prof. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble
1
155

Accident Detection and Alerting System with Rescue of Ambulance

Prof. Varsha Kshirsagar, Ajay Gavhande, Shubham Deshmukh, Yogesh Daswadkar
1
156

Utilization of the Channels for Multicasting Wireless Multimedia in Wireless Mesh Networks


Shruti Shinde, Prof. Meeta Bakuli
1
157

Optimal Sitting of PV-Wind-Energy Storage System Integrated Micro Grid Using Artificial Bee Colony Optimization Technique

Dr.Vijay Raviprabakaran, Sowmya Ramachandradurai
1
158

Comparison of Data Mining Algorithms for Effective Performance

Nikhil Belwate
1
159

Data Transfer of Touch Devices Using Drag and Drop

PROF. SWATI. H. PATIL, SHESHANK RANAWARE, SANKET TUPE, ARFAN GHORI, AKSHAY WAGHMODE, GAJANAN JADHAV
1
160

Comparative E-Business Portal for Different Marketplaces using Hadoop

Prof.A.S.Devare, Prof.N.B.Chopade, Priyanka Chatane, Shweta Doiphode
1
161

Automatic Accident Detection and Alerting System Based on IOT

Surekha Pinnapati, Manjunath Kamath K, Carmal Joseph, Dayana Thomas, Jibin P Babu, Jithin P Babu
2
162

Privacy-Preserving of Encrypted Cloud Data through Dynamic Multi-Keyword Search 

Rahul  Barate, Rohidas Chorghe, Pankaj Palaskar, Tukaram Sude, Prof Dhanshree Kulkarni
1
163

VANET System for Traffic Management

Priyanka Shinde, Dr.S.B.Dhonde
1
164

E-Traffic Police: A Professional Platform to Increase Efficiency between Government and Citizen

Praveen Pandey, Ritika Arya, Shailesh Khandelwal, Piyush Kumar, Prof. N A Dhawas
1
165

Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks Applications

Pooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi
1
166

Literature Survey on Noise and Redundant Data on Web Pages

Sekhar Babu.Boddu, Prof.Rajasekhara Rao.Kurra
1
167

Survey on Secure Off-Line Payment Solution for Physical Unclonable Functions

Namitha J, Bhavya Shree J, Santhosh N, Kiran Kumar N,  Himabindu U
1
168

An Android based Employee Monitoring System

Prof. Mukram Ansari, Shinde Bhagyashri, Pawar Dattatray, Dorage Rahul
1
169

Advanced Intrusion Detection and Protection System Using System Calls Forensic Techniques

Prof. Sheetal Kusal, Madhumati Totre,Varsha Mane,Neha Pimple, Pravin Kumbhar
1
170

Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks Applications

Pooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi
1
171

A Technical Review on Health Monitoring System at Household Using IOT

Dr. Jitendranath Mungara, Kavitha K K, S Akshya, Vishal Petkar
4
172

Security in Patient Data Communication using Encryption Algorithm

Nikita S. Karekar, Dr. Prof. R. S. Kawitkar
1
173

Multi-Modal Topic Modeling of Data and Summarization of Events and Reviews

Prajakta Sonone, Prof. A.V.Deorankar
1
174

JADE Based Bidding System for E-Commerce

Prince Abraham
3
175

A Survey of Phishing Website Detection Techniques

Jyoti Vaibhav Jadhav, Prof. Krishna Kumar Tripathi
1
176

Design and Implementation of a Wireless Video Transmission System Using Adaptive Channel Coding Techniques

Shilpa.S, Prof.Ruckmani Divakaran
2
177

Classification of Diseases on the Leaves of Cotton

Darshana S. wankhade, Vijay L. Agrawal
2
178

A Survey on Software Defined Network: A New Era of Networking

Santosh Kumar
1
179

Classification of Web Search Results Using Modified NaĂŻve Bayesian Approach

Bhagyesh P. Asatkar, Prof. K. P. Wagh, Dr. P.N. Chatur
1
180

Smart Home Security and Safety System using Bluetooth spp pro Module

P. Naresh, N.Ramesh
1
181

IOT Based Data Analytics and Web Monitoring of Energy Load Profiling for the Households

Suvidha Biradar, Prof. Rahul Hiware
1
182

Wi-Fi Embedded Universal Remote via Smartphone

Prof. Sarika Khope, Sumit Kumar ojha, Shivani Sanjay Kamble
1
183

Analysis of Image Restoration by Non Blind Technique using MATLAB

Avinash Srivastava, Dr. Pankaj Sharma
1
184

A Survey on Routing Protocols in Mobile Ad-hoc Networks

Sherjung, Dr. R. K.Sharma
2
185

Counter Measure for Web Application Vulnerabilities using Augmented Algorithm

Neha, Sachin Shrivastava 
1
186

Content Based Image Processing Approach on Colored Images using KNN Classifier

Manpreet Kaur, Suchitra
1
187

A Review on Extensible Regular Humanistic Observable Impression Scooping Multivarious Physical Facts

Sneha D Patil, Dinesh D Patil
1
188

A New Scheduling Algorithm for Real-Time Communication in LTE Networks

Rohit Gore, Mininath Mahanavar, Akshay Khutale, Bhalchandra Mane, Prof. Priyadarshini patil
1
189

Lung Pattern Classification for Interstitial Lung Diseases Using a Deep Convolutional Neural Network

Namrata Bondfale, Shweta Banait 
2
190

Survey on Smart Sensors for Power Management in Intelligent Buildings using WSN

Mitkari P.C, Dr Mane P.B 
1
191

Advanced Healthcare System Using IOT

Sanjay D. Dhandare, Prof. Dr . S. M. Mule
2
192

Review on Detection of Pedestrian Crossing for Safe Driving

Tushar D. Patil, Prof. Archana B. Kanwade
2
193

An Overview of Different Mechanisms to Detect Plant Leaf Disease Infected Area

Parikshit N. Wankhade , Prof. G. G. Chiddarwar
1
194

A Fully Digital ASK Demodulator with Digital Calibration for Bioimplantable Devices

Aarti Zope, Rashmi Mahajan
1
195

Automatically Mining Query Facet for Online Content Mining

Akriti Verma, Bhagyashri Bhamare, Dipak Sanap, Ravindra Gorde, Prof.Tejaswini Adikane
1
196

Hybrid Big Data Approach For Secure Authorized DE-duplication

Gharge Nitin S., Bhor Ganesh G., Karajange Ganesh M., Jagdale Pravin R., Prof.Kadam Yogesh V
2
197

Two Dimensional Cryptography Using Modified Pallier Cryptosystem 

Jadhav Rohini, B. S. Kurhe
1
198

Twitter Sentiment Analysis of Demonetization on Citizens of INDIA using R

Shiv Kumar Goel, Sanchita Patil
6
199

A Survey on Secure E-mailing System with Cryptography Using Fibonacci Series 

Abdul Quader Quazi, Pavan Y. Maddikar , Kiran K. Tangod
2
200

Real Time Monitoring of Change in Temperature with CO2 using IOT

Dr. Jitendranath Mungara, Kavitha K K, Mahesharan P, S Akshya, Shaik Mohammad Sajid, Vishal Petkar
3
201

An Efficient Technique for Runtime Distributed Web Caching with Knowledge based Clustering

Ankita Sharma
1
202

A Review on Vehicle Identification and Tracking System in Java and Open-CV and Kohonen’s Neural Network

Mandal Akash, Atri Kapil, Alkute Mahesh
2
203

IOT Based Monitor and Control of Smart Grid Energy Sources using VLSI

Priyanka B. Deshmukh, Prof Hemangi N. Patil 
1
204

Compare Multi View & Multi Modal Image Fusion Based on Edge Preserving Decomposition, Guided Filter, Gabor Wavelet Techniques

M.Hema, Dr. D.Gowri Sankar Reddy 
2
205

Daily Life Activity Tracking on Android

Ayesha Samreen
1
206

Daily Life Activity Tracking on Android

Ayesha Samreen 
1
207

Performance & Analysis of High Data Rate Wireless Optical Communication for Short Range Application

Divya Tyagi, Dr. A.K. Gautam 
1
208

Implementation of Predicting Terrorist Incident Using Real Time Big Data Analysis

Shenkar Amol Shivaji, Prof.B.S. Kurhe 
1
209

Leveraging Route Maps by Partial queries with Cache-Support

S Swetha Reddy, M.Hymavathi 
1
210

Ontology Based User Adaptive Web Personalization

Abhijit Vaidya, Prashant khoje
1
211

Analysis of Attacks and its prevention using Encryption in Cloud Computing

Anmol Bhatia, Gaurav Garg 
1
212

Review on Configurable and Low-Power Mixed Signal SOC for Portable ECG Monitoring Applications

Shubhangi S. Dhuma, S.K.Bhatia 
1
213

Multimedia Data Mining Using Deep Learning

Aditya Welhal, Shambhu Singh, Santosh Hundekar, Pravin Singh, Prof.A.G.Dombe 
1
214

Improved Scaling for Image Quality Enhancement in Digital Image Watermarking

Sarvjeet Kamna Devi, Nancy 
1
215

Priority Based Congestion Control Clustering Protocol Using Load Balancing in WSN

Kamini, Prabhjit Singh 
1
216

An Efficient Data Replication on Cloud Computing using MBFD with Mutual Information

Supriya Kumari, Prof.Shradha Pandit 
2
217

A Survey on Design of Vehicle Diagnostics System Based on Cross Platform Application

Shivani S. Gawande 
1
218

A Survey on Opportunistic Scheduling for Traffic Networks with Multiple Constraints

Pooja N. Nimbalkar
2
219

Detecting and Preventing Denial of Sleep Attack using KeyGen (Key Generation) Algorithm

Usha C. Khake, Pooja L. Chelani, Vandana S. Lokhande
1
220

A Survey on E-Prescription System

Sivaranjani J, S Rajeswari, Dr. Jitendranath Mungara 
3
221

Hand Gestures Recognition System for Deaf, Dumb and Blind People

Channaiah Chandana k, Nikhita k, Nikitha P, Bhavani N K, Sudeep J 
3
222

Design and Implementation of Address Generator for WiMAX Deinterleaver

Rasika Ramchandra Kulkarni, Prof.Preeti Rajput, Dr.V N Nitnawre 
1
223

Review on Amalgamated Metrics Estimation Methods for Software Project Management

Vishakha Sharma, Gaurav Garg
1
224

Efficient Algorithms for Mining High Utility item sets from Transactional Databases

Sharayu Fukey, P. M. Chawan 
1
225

Mining Social Media Content for Analysing Employees’ Working Experiences

Anjali Pawar, Rhiddhi Khartadkar , Sankalp Kale, Kiran Naik, , Priyanka R. Rajmane 
1
226

Recognising and Handling Malware Propagation in Large Scale Networks

Dr.Jitendranath Mungara, Shwetha KS, Shishir Umesh, Rashmi Priya, Shobitha G 
2
227

Design and Detection of Social Media Botnets using Event-Driven Analysis

Payal Chandak, Prof. H. P. Channe
1
228


2
229

Fault Tolerance and Recovery to Minimizer Energy Consumption in Job Allocation

Avneet Kaur, Divyajot Gill  
2
230

Temporal Topic Model for Friend Recommendation System

Jayashri  Vijay Thorat 
1
231

License Plate Detection and Recognition Using a HOG Feature Based SVM Classifier

Vivek Joy, Binu A., Kuttyamma A. J. 
1
232

Enhanced Energy Efficient Routing Algorithm using Cluster Heads Maximizing Network Lifetime

Anjali, Sachin Srivastava 
5
233

Detection of Storm and Signalling Attack in Wireless Sensor Network

Namrata Sawant 
1
234

Fine Grained Authentication Method for Web Based Cloud Service

Karishma Tamboli 
1
235

A Review on Comparative Analysis of Indoor and Outdoor Positioning Technology

Rashmi C Chaudhari, Prof. Mahesh M Sadavarte 
1
236

Computer Control with Voice Command (MFCC) using Ad-hoc Network

Pooja, Mukesh Kumar
1
237

Data Mining Study and Analysis for Semi Structured Data Extraction Using XML

Versha, Deepika Garg
2
238

Semantic Image Segmentation by Deep Convolution Nets and Watershed Transformation

Sahana Patil, Sandeep Kumar 
1
239

Optimized Joint Stable Routing and Channel Assignment for Mobile Ad-hoc Cognitive Network

Navya P, Badarla Sri Pavan 
1
240

Hand Gesture Recognition using DTW and Morphological Feature Extraction

Sindhu. K. M, Suresha.H.S
2
241

IOT Based Architecture for Patient Health Monitoring System

Rakshith Babu H V, Prof. Latha. S 
2
242

Detection of Neovascularization on Optic Disk Region based on Kernalized Fuzzy C-Means and ANN Classifier

Vanitha L. B, Prof. Preethi. S 
2
243

Plant leaf Classification using Artificial Neural Network Classifier

Suman S. G, B. K. Deshpande 
2
244

The Improved Image Steganography with Encryption Method and to Overcome the Compression Technique

Ashwini W, Nagraj Kyasa 
1
245

Resisting Black hole Attack in MANET

R.Siva Subbiah, Dr. K.E.Kannammal 
1
246

A Comparative Survey on Load Balancing Algorithm in Cloud

Surbhi Nema, Prof. Saurabh Kapoor
1
247

A Survey: DDoS Attacks and its Effects on Cloud Environment

Nishalee Choubey, Prof. Saurabh Kapoor
1
248

Survey on User Authentication for Cloud Computing

Neha Bairagi, Prof. Saurabh Kapoor
1
249

Efficiently Resource Allocation In Cloud Scheduling Using Differential Evolution

Dolly, Er. Suchitra
1
250

Survey on Malware Detection in Cloud Computing Infrastructures

Nimith Shetty M, Kaushik C Reddy, Gangadhar Immadi
1
251

EEARP- Enhanced Energy Aware Routing Protocol for WSNs

Anshu Verma, Narendra Kumar Gupta
1
252

Energy Efficient Image Data Offload Mobile Cloud Computing

Sridhar S K, Keerthi G, Manjuladevi P, Masarpu Swathi, Nethravathi
1
253

An Efficient Deduplication and Data Sharing with Dynamic Ownership Management for Cloud

Sukanya Gunjal, Prof. B. S. Kurhe
1
254

Enable Data Sharing Scheme for Dynamic Groups in the Cloud

Jyoti Pingat, Prof P. R. Ugale
1
255

An Efficient Coding Scheme for an Optimal Solution for Data Coding in Cloud Storage System

Supriya Datkhile, Prof. P. R. Ugale
1
256

Trend Analysis Using Hadoop and Its Ecosystems

Deepak Ranjan, Dr. Tripti Arjariya, Dr. Mohit Gangwar
2
257

Generating Optimal Result for Fraud Detection Using Data Mining

Punam Bagul, Sachin Bojewar
2
258

An Authenticated Trust and   Reputation System for Hybrid Cloud

Sindhu B S, H M Sanjay
1
259

Clustering of Datasets Using K-Means Algorithm in SPARK

Subiksha N, Pallavi R Reddy, Mounica B
2
260

Smart Device: A Smarter Way to find the Packed Food Quality

R Suganya
2
261

SmartCrawler: Proficiently Harvesting DeepWeb Interfaces Using Two Stage Crawler 

Ghanshyam Patil, Prof. U. H. Wanaskar 
1
262

Analysis of Different Load Flow Technique with Distribution Resources

Priyal Kumari, Varsha Mehar
1
263

A Survey of Different Compression Technique for Biomedical Signal (ECG)

Saroj Dashariya, Prof. Akhilesh Singh Thakur, Dr. Rahul Dubey
1
264

A Survey on Image Security using Visual Cryptography

Farah Khan, Prof. Deepa Gianchandani
1
265

A Survey Report on Search Engine Optimization and Network Security

Anuraj Singh
1
266

A Review on Video Object Tracking

Sandhya Tiwari, Prof. Kapil Gupta, Dr. Rahul Dubey
1
267

A Survey on V/V Secure Communication over VANET DSRC

Nikhlesh Namdev, Prof Rovin Tiwari, Dr. Rahul Dubey
1
268

Trusted Computing in Cloud Architecture

Neelam , Rachna
5
269

Phishing Techniques and Preventive Measures - A Review

Aeshwarya , Suman kumari
1
270

Prediction of Stock Market using Neural Network for Increasing Accuracy

Kaveri Deshmukh, Shubhrata Mahajan, Bhavana Samel, Prof.Chate P.J
1
271

Usage and Analysis of Estimation Techniques in Software Project Management 

Vishakha Sharma, Gaurav Garg
1
272

Sketch Based Image Retrieval using Saliency Matching

Safiya P.C,  Niyas N
1
273

A Survey on “Two-Level QR Code for Document Authentication”

Madhuri Mohanrao Jagtap , Prof. S. K. Bhatia 
1
274

An Effective Survey on Mining Weakly Labelled Web Facial Images for Search-Based Face Annotation

Pooja P. Gadhave
1
275

Resource Optimization Based Scheduling Algorithm in Cloud Environment

Priyanka Dhurvey, Nagendra Kumar
6
276

Face Detection Technique Using Neural Network

Shalu Kansal, Suchitra
1
277

Optimization Techniques for Efficient FPGA Hardware Implementation on IRNSS User Receiver

Shachi Varku, Sharanya S Konandur, Swetha A, Akalpita L Kulkarni
3
278

Design and Implementation of 4-Bit ALU using FinFET Technology

Smt.A.Nagamalli, N.Vivek Naga Bhushanam, O.Nagasai, P.Swathi
2
279

A Survey on Radiofrequency Tissue Ablation

Hemant Sahu, Davender Singh
1
280

A Survey on External Security Threat with Defense Mechanism for Wireless Sensor Network

Prof.Sagar Thakare, Manjusha Nimbalkar, Richa Nabar
2
281

Novel Approach for Image Fusion Using NSCT and Masking Technique

Deepika M, Thippeswamy K H
1
282

Improved Rule Mining Classification Algorithm Based on Particle Swarm Optimization

D.Senthil Kumar, Dr.N.Jayaveeran
1
283

Design an Architecture for Object’s Feature Extraction and Retrieval of a Gray Scale Image

Pooja Garg
1
284

Credit Card Fraud Discovery: A Survey

Ritika Wadhwa
1
285

A Survey on Security Improvements in VM Allocation of Cloud Computing to Defend Attacks

Revati Vijay Rajane, Prof.Pradnya Kasture
3
286

A Secure Method Using Cloud in Anti-Collusion Data Sharing Scheme for Dynamic Groups

Nidhi N G, Padmashri A M, Poojitha M, Pooja S, Deepashree N S
2
287

Offline Kannada Handwritten Word Recognition Using Locality Preserving Projections (LPP)

Pooja K Gowda, Chethan S , Harsha J  , Rakesh J, Tanushree K N
1
288

A Study on 4pioneering Technologies Imminent With Cybersecurity

M.Anitha Priyadharshini, S.Nivedha
1
289

Performance Evaluation of Neural Network based Cognitive eNodeB in LTE Uplink

Rajat Urade
1
290

Review on Fir Filter Designing Using Wavelet Transform

Kavya Dwivedi, Dr.Ravindra Pratap Narwariya
1
291

Saliency-based Feature Assessment for Color Deficients

Monali G. Meshram, A. M. Shah
1
292

A Survey Paper on Cloud Security Issues and Challenges

Pankaj Singhai, Prof. Saurabh Sharma
1
293

Cloud Computing Security Issues and Challenges

Aman Shrivastava
1
294

Innovative Approach towards Interactive Classroom Sessions using an ICT Tool – Kahoot

Shibani Kulkarni, Neeta Takawale
3
295

Implementation of Security System Using IOT

Abhijeet Suresh Mendhe, Divya Meshram
1
296

IIR Filter Design Techniques – A Critical Review

Kratika Chaudhary, Dr Ravindra  Pratap  Narwaria
1
297

Safe Drive Assistance System

Dipali Dilip Narwate, Prof.Rashmi Mahajan
1
298

A Study on Neural Network in Image Processing

Sudhir Kumar, Davender Singh
1
299

Multi Skill Oriented Spatial Crowdsourcing

Arun.S.Dalvi, Prof P.N.Kalavadekar
2
300

Multi-Client Real Time Communication using Browsers

Kajal Janghale, Chetali Mahore, Supriya Kakade, Kirti Narbag, Mayuri Thakare, Prof. P. M. Chawan
2
301

Online Evaluation of Project Report and Technical Paper for Educational Institutes

Shweta Monde, Suyog Manore, Tharun Naidu, Karan Manwar, Prashant Lokhande
2
302

A Survey on A Weighted Method Based Technique for Vertical Handover Decision in Multi Network Wireless Environment

Sandeep Kumar, Sandeep Goyal
1
303

Enhancing Grid-FTP Protocol to Facilitate Full-Duplex Data Communication

Revansiddh Patil , Prof. S.A.Khuba 
1
304

Data security in QR code using Steganography

Bhakti Magadum
1
305

A Critical Review on Image Fusion Techniques

Lata Kuswaha , Dr. Vandana Vikas Thakare
1
306

Video Steganography through RC4 Cryptography with Random Sequence of Data Hiding

Sapna
2
307

Saliency-based Feature Assessment for Color Deficients

Monali G. Meshram, A. M. Shah
1
308

Road Navigation Improvement Using Route Data Analysis

Faizal Ahmed, Divakar H.R
1
309

Hospital Queueing Recommendation System Using Spark Streaming For Big Data

Sneha  Girolla, Sunil Rathod
1
310

Design and Implementation of a System for University Automation Assessment 

Raghavendra V, M S Sowmya, Gokul G, Mohammed Inzamamul Mistery, Sahil Jakhar
1
311

Deduplication and Secure Auditing Of Data in Cloud with Convergent Key Management

Kunal S. Bhutwani, Prof. S. P. Kosbatwar 
1
312

Comparative Analysis of Various Routing Strategies in the Framework of the Proposed Models 

Mohammad Alhihi
1
313

To Measure the Performance of DWDM Ring Network Using RZ and NRZ Modulators

Ramandeep Kaur, Dr. Renu Dhir
1
314

Development & Implementation of Custom Connectivity Protocol for Identification and Tracking of Public Transit Vehicles Using Portable and Station Nodes

Erabathini Chetan Laxmirajam, Dr. Prof. R. S. Kawitkar
1
315

Achieving Secure, Scalable, Data Group Sharing Using Key Aggregate Searchable Encryption in Cloud

Rajeshree K. Duratkar, Prof. Sonali A. Patil
1
316

Video Retrieval by Detecting Key Frames in CBVR

Poonam V.Patil, Prof.S.V.Bodake
1
317

A Study and Analysis of Mutual Authentication Security Issues and Solution Schemes in WiMAX 802.16

Sher Singh, Gaurav  Garg
1
318

Alignment-Free Fingerprint with iris Cryptosystem Based on Pair-Polar Minutiae Structures with Multiple Fuzzy Vault and Minutia Local Structures 

Priyanka Vethekar, Dr. Archana  Lomte
2
319

Secure Access to Encrypted Cloud Database

Chandan M N, Prof. Divakar H.R
3
320

A Survey on Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks

Kirti Nagargoje, Prof. Archana Lomte
2
321

Image Authentication Using Cryptography and Steganography in Network Security

Deepak Shailendra Singh , Prof. Mrunali Metri
1
322

A Review on: Network Traffic Classification using Bi Graph and Projection

Prital Mahadev Kadam, Prof. Prajakta Satarkar
1
323

Wireless Environment Monitoring System Using WiFi

Puja Patil , Prof. M.K.Kodmelwar
1
324

Last-Meter Smart Grid Embedded In an Internet-Of-Things Platform

Narendra Kumar Rajwade, Dr. S.D. Lokhande
1
325

Intelligence Communication Protocol Based Monitoring and Control Home Appliances

Thorat Madhuri B, Pokale N.B
2
326

Survey on Learning Human Emotions from Body Gestures during Social Human–Robot Interactions

Diksha A. Shende, Dr. R. S. Kawitkar
2
327

Implementation of Forward Security System for Data Sharing With Authenticity and Cost Effective

Mihir Mohapatra, Prof. N.P. Karlekar
1
328

Brain Tumor Diagnosis Using Deep Neural Network (DNN)

Suraj S. Gawande, Vrushali Mendre
2
329

Survey on Beehive Erasure Codes for Distributed Storage Systems

Mugdha Adivarekar, Vina Lomte
1
330

Intelligent Recommender in Stock Market

Mandar Ganesh Deshpande, Ashwin Prabhu, Nishi Tiku
2
331

Fake Account Detection and Privacy Policy Inference based on content-based classification of User-Uploaded Images on Content Sharing Sites

Anant Mandre, Prof. Sonali Patil
1
332

Secure Data Sharing in Clouds by Using High Level Petri Nets

Priti Kanhere, Prof. S.A.Patil
2
333

Securely Mining UARSTP with Recommendation System in Document Streams

Varsha Ohol, Dr. Arati Dandavate
2
334

Enhancing Security using Knowledge Discovery and Data Mining Methods in Cloud Computing

Pankit Arora, Sachin Bharadwaj
2