S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
A Review on Plants and Food Grains Disease Detection and Quality Checking using Image Mining TechniquesV.KALAISELVI., R.SHIDDHARTHY |
|
6 |
2 |
Rule Based Parking System Using IOTPATIL M. TOUSHIF LATIF, NEHA P. JOSHI |
|
3 |
3 |
Clustering Algorithms for High Dimensional Data – A SurveyMAITHRI.C, CHANDRAMOULI.H |
|
5 |
4 |
Border Alerting System for Boaters Using Zigbee NetworkJACK RUSSEL FERNANDIS, AMARJEETSINGH THAKUR |
|
4 |
5 |
Encryption Based Lossless and Reversible Data Hiding SurveyAMOL NARKHEDE, PROF.DINESH PATIL |
|
2 |
6 |
A Review on Home Interior DesigningPOOJA VORA, POOJA SHARMA, SHIVAM WAGH, PROF. A. C. TASKAR |
|
3 |
7 |
Review on Smart Student CardPRATIK KADOLI, AKANKSHA BORSE, SHRIDHAR GAIWKAD, AVINASH SINGH, PROF.A.R.GAIDHANI |
|
1 |
8 |
An Embedded Technology Based Automated City Load Shedding Management SchemeABHISHEK PAWAR, ZAINAB MIZWAN |
|
16 |
9 |
Linguistic Search and Fetching Information with Semantic AnnotationDR.K.SELVARAJ, P.VIDHYAVANI |
|
2 |
10 |
Optimize Data Collection in Wireless Sensor Networks Using Multi-Hop Connected ClusteringDR.K.SELVARAJ, S.SATHIYARAJ |
|
1 |
11 |
Video Watermarking by Content Aware Double Sided Embedding Error DiffusionBHAKARE SARIKA BHALCHANDRA, LADGIRE SHRUTI HANUMANT, KANHURKAR MONIKA KAILAS, THITE DHANASHREE BHARAT, PROF. SHASHIKANT GHULE |
|
1 |
12 |
A Review of Detection and Prevention of Attacks from HTTP Server logsMONIKA SONI, SAURABH SHARMA |
|
1 |
13 |
Efficient Two Sided Access Control System in Cloud StorageSTHITIPRAGNYA SABAT, PROF. HINGOLIWALA HYDER ALI |
|
1 |
14 |
Multi-storey Parking Space Management System Using AlgorithmJAINISH ASHISHBHAI DABHI |
|
1 |
15 |
Trace Miniature Objects Using Internet of ThingsSHIVENKUMAR PARMAR |
|
1 |
16 |
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud DataDIPIKA JADHAV, PRASAD NAGARGOJE, VARSHA JARHAD, PROF. S.A. CHIWHANE. |
|
2 |
17 |
A Survey on Educational Data Mining and its TechniquesV.A.MALATHI, C.V.BANUPRIYA |
|
1 |
18 |
Texture Analysis of Segmented MRI Images using GLCMIQRA RIZVI, NARAYANAN KALLINGAL |
|
2 |
19 |
Secure Authentication Scheme against DoS AttacksM.NAGATEJA, D.VENKATA SUBBAIAH |
|
1 |
20 |
A Novel Approach for Detection of Node Failure in Mobile CommunicationN .VISHAL, D.VENKATA SUBBAIAH |
|
1 |
21 |
Automation of New Age Technology Transition to Experienced PeopleS. SRIKANTH, D. VENKATA SUBBAIAH |
|
1 |
22 |
IOT Based Smart Wireless Sensor Network For Industrial AutomationDEEPALI A. WAVRE, V.N.BHONGE |
|
3 |
23 |
Performance Survey on IOT Based Security System for Social SafetyPROF. U.K. THAKUR, BHUPESH MANKAR, DIGVIJAY RAUT , AKASH BOBDE, ISHANT MOON |
|
1 |
24 |
Road Accident Data Analysis Using Machine Learning TechniquesSANNAILA PRAVEEN KUMAR, M. PRASHANTI |
|
1 |
25 |
Detection of Heart Diseases using the Hybrid System of Neuro-Fuzzy LogicMIR TAWSEEF MUSHTAQ, PROFESSOR RUPALI ZAKHMI |
|
6 |
26 |
Short Survey on Graph DatabaseASMITA SHRIVASTAV |
|
1 |
27 |
A Framework to Achieve Data Security and Privacy in Cloud ComputingDIPTI SEN, PROF. PRADEEP TRIPATHI |
|
2 |
28 |
A Survey on Attendance Management System Using Face RecognitionPRANAY DOSHI, KALPESH MAHAJAN, VISHAL BENDE, KAVITA MAHADIK, N.R. GAVAI |
|
3 |
29 |
Survey on: Training and Placement Automation SystemPRATIK BHAVSAR, PROF. PRIYA SURANA, KAUSTUBH APHALE, ALVIS INGLE, PARIJAT KAWALE |
|
6 |
30 |
High Speed 2-D DWT using Modified Distributed Arithmetic and Brent Kung Adder TechniqueASMITA GUPTA, PROF. RAHUL SHRIVASTAVA, DR. PARESH RAWAT |
|
1 |
31 |
A Survey on Detection of Social Network Mental Disorders via Online Social Media MiningTANMAY PRIYADARSHI, HARSH BHAT, PALLAVI SHIVEKAR, SURAJ PALVE , SATYENDRA KOTHARI |
|
2 |
32 |
A Survey Paper on Web Security fear and Impact to E-Commerce SuccessKARISHMA TYAGI, PROF. DEEPAK AGRAWAL |
|
4 |
33 |
Palm-print Authentication Using Fuzzy Logic ApproachSHASHI KANT MISHRA, SRIKANT SINGH |
|
1 |
34 |
Smart Home Using Google AssistantMHANTA PRASAD, GHODKE MAYURI, GAIKWAD SWATI, PROF. K. S. KORE |
|
1 |
35 |
Smart Employee Manager SystemPATIL AKSHAY, DESHMUKH GAURI, DANGE JYOTI, BHATEVAR RESHMA, PROF. N. V. KURHADE |
|
1 |
36 |
Low Power High Speed Body Bias Controlled Current Latch Sense AmplifierGAJENDRA SUJEDIYA |
|
1 |
37 |
Low power Design 6T SRAM Using Different ArchitectureGAJENDRA SUJEDIYA |
|
1 |
38 |
Sentiment Analysis of Twitter tweets through Classification modelKONDRU RAVI, NARESH NELATURI |
|
2 |
39 |
Detecting Media Piracy using AI, ML and Data MiningPROF. VARSHA DANGE, KASTURI KHEDKAR, SHUBHANGI MORE, PAVITRA PHAND, POONAM PAWAR |
|
1 |
40 |
Investigation of Wireless Sensor Network Node Localization with Reduced Power ConsumptionSALIM M. ABDULLAH, JASSIM M. ABDUL-JABBAR |
|
1 |
41 |
Survey on: Rumour Propagation Reduction SystemSHIVANI KANNAN , PROF. PRIYA SURANA , AYUSHI DHARPURE , ANIKET KUTE, DEVANSH BISHT |
|
1 |
42 |
A Study on Image Color spaces and Image Segmentation AlgorithmsSTEPHEN SUHAS PATTA, B.J.M RAVI KUMAR |
|
1 |
43 |
Future Trends, Current Developments in Network Security and Need for Key Management in CloudAnitha Eemani |
|
3 |
44 |
Review of Block Chain in Education SystemANITA DHAMI, DR.MOHD.ZAFAR SHAIKH |
|
2 |
45 |
Sentiment Analysis on Data of Social MediaADITYA ZAWARE, TANMAY KARNAWAT, SNEHA PISEY |
|
1 |
46 |
Environment Friendly Predictive Farming Using IOT and Cloud ComputingSIDDU SRINADH, M.V.PAVAN KUMAR |
|
2 |
47 |
Enhanced and Efficient Scheme for Resource Allocation in the Cloud for Media Streaming ApplicationsDEEPAK ZAMBARE, RAHUL GAIKWAD |
|
1 |
48 |
Identification and Classification of Grain Using Image ProcessingYUGASHREE BHADANE, POOJA KADAM |
|
1 |
49 |
An Efficient Scheme of Crypto System with Steganography for Cloud Security EnvironmentSHOUKET AHMAD KOUCHAY |
|
1 |
50 |
An Automatic System to Enhance Assessment Marking in Tertiary EducationDR. MD. WALIUR RAHMAN MIAH, AMINA SHAIKH, DR. BELAL CHOWDHURY, DR. MD. NASIM AKHTAR |
|
1 |