S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
A Survey on Electronic Monitoring Systems for Healthcare ApplicationsG RAMPRABU, M DEEPA |
|
1 |
2 |
Design and Implementation of Low Power FFT Processor for OFDM Wireless CommunicationGAJENDRA SUJEDIYA |
|
1 |
3 |
Web Search Strategies and Retrieval Effectiveness: An Empirical StudyRAJESH JAIN |
|
1 |
4 |
A Survey on Social Image Re-ranking Scheme Using Image AnnotationSANJAYKUMAR J KHANDARE, PROF. PRAVIN. P. NIMBALKAR |
|
1 |
5 |
Secure Sharing Hospital Data Using Visual Cryptography.CHITRA KALPESH VASVANI, SNEHAL KOLTE |
|
3 |
6 |
Securing E-Voting System using BlockchainKOMAL K. SHARMA, PROF. MRUNALINEE PATOLE |
|
2 |
7 |
Modelling Framework for Design Pattern Using Design Pattern Modelling LanguageAKASH MANE, PROF.SONALI RANGADALE |
|
2 |
8 |
Continuous Top-K Monitoring on Document StreamsRAHUL V. MUNDHE, PROF. K. B. MANWADE |
|
1 |
9 |
A Methodology for Secure Sharing of Personal Health Records in Cloud EnvironmentSUPRIYA PATIL, PROF. SANDIP D. SATAV |
|
4 |
10 |
Moving Vehicle Detection and CountingRAHUL BADEKAR, JAYA DEWAN |
|
1 |
11 |
A New Protocal for Fine-Grained Friend Matching In Social NetworkingP.PADMAVATHI, P.VASANTHI |
|
1 |
12 |
A New Threshold Multi-Authority CP-ABE Access Control Scheme in Public Cloud StorageCHANGALA PRIYANKA, J.RAGHUNATH |
|
1 |
13 |
Intelligent Supply Chain Systems – A Research Framework Using Internet of Things (IoT)PARTHASARATHI RAMAKRISHNAN, YONGSHENG MA |
|
3 |
14 |
Railway Track Inspection Using Arduino and Image ProcessingFLAVITA JANICE PINTO, VIDYA K M |
|
2 |
15 |
A Novel Approach for Intrusion Detection System Using Genetic AlgorithmANIL DHANKHAR |
|
1 |
16 |
Predictive Analysis of Market Trends for Stock Price Predictions Using Machine Learning and Deep LearningNIRMALA CHOUDHARY |
|
1 |
17 |
Load Balancing of Data in Cloud Computing Using Packet Size: A Survey PaperBHUSHAN D. PATIL, PROF. R. B. WAGH |
|
2 |
18 |
Soil Properties Prediction using Ensemble Regression TechniqueSMRITI SINGHATIYA, DR.SHIVNATH GHOSH |
|
2 |
19 |
Information Security in Cloud Storage Space with an Enhanced Auditing ProtocolPRAKASH KRISHNA SHINDE, AMRISH ASHOKRAO PATIL, SAMEER IQBAL TAMBOLI |
|
4 |
20 |
Cluster Head Selection using Particle Swarm Optimization in Wireless Sensor NetworkARKA HALDAR, PROF. KUDA. NAGESWARA RAO |
|
1 |
21 |
A Novel Approach to Process Small HDFS Files using Apache SparkPRIYANKA DUKALE |
|
2 |
22 |
Age and Gender Identification by Indian Multilingual Speech Sample: A ReviewBARKHA SHRIVASTAVA, VINAY JAIN |
|
1 |
23 |
Intelligent Systems that Emerges ‘Visual Generic Object Recognition’MANSI PATEL |
|
2 |
24 |
Cell Breathing Technique for Load Balancing in Datacenter NetworksYAZHINI.S, DR.N.UMADEVI |
|
1 |
25 |
Content based Image Classification using Support Vector Machine Algorithm DR.VIJAY REDDY MADIREDDY |
|
2 |
26 |
Effective Storage Architecture for Evaluation of Duplication in CloudMUTHULAKSHMI.C, N.C.SACHITHANANTHAM |
|
1 |
27 |
A Multi-agent based Cyber Physical System for Smart CampusPOOJA S AHUJA |
|
1 |
28 |
A Review on Different Techniques of Parking AutomationROMA JAIN , JIJO S. NAIR |
|
2 |
29 |
Feature Selection and Ensemble Clustering Mechanism for High Dimensional Imbalanced Class Data Using Harmony Search Technique.AVHAD ANKITA V., DR. KSHIRSAGAR D. B. |
|
1 |
30 |
Solving Linear Programming Problem using ANN based Hybrid ModelL.R.ARAVIND BABU |
|
1 |
31 |
A Partial Residue to Decimal Converter for the Moduli Set {2n- 1,2n,2n,-1}ALHASSAN ABDUL-BARIK |
|
1 |
32 |
Freeware Framework for Performance Testing of Software Web ApplicationsMOHAMMED ABDUL RAZACK MANIYAR, SURESH KOPPULA, DR. MOHD KHALID MUBASHIR UZ ZAFAR |
|
2 |
33 |
Intrusion Detection System Using SVM Classifier for Detecting DoS Attack in Cloud PlatformKIRTI RAMHARIYA, PROF. SATPAL SINGH |
|
1 |
34 |
Energy Efficient Multipath Routing Protocol based on Particle Swarm Optimization for WSNROSHNI JHA, DR.SHIVNATH GHOSH |
|
3 |
35 |
Online News Popularity Prediction using Deep Neural Network with Reduced FeaturesSHIVANGI BHARGAVA, DR.SHIVNATH GHOSH |
|
1 |
36 |
Secure and Efficient Ranked Keyword Cover Search in Cloud ComputingSANDHYARANI GALPHADE, PROF.D.R.PATIL |
|
1 |
37 |
A Methodology for Secure Sharing of Personal Health Records in Cloud EnvironmentSUPRIYA PATIL, PROF. SANDIP D. SATAV |
|
3 |
38 |
Keyword based Trip Planner with Optimized Route using TSP AlgorithmGAURAV WADGHULE, HARSHAL WAGHMODE, TEJASHREE SHAH, ABHIJEET PANCHAL |
|
15 |
39 |
A Survey on Anomaly Based Detection and Prevention of Phishing Attack in an Online Banking SystemMANISH GANESHKAR, DEVENDRA PATIL, NIHAL RAJPUROHIT , CHETAN PAGAR |
|
1 |
40 |
Review on Design and Implementation of Clinical Document Architecture for Health Information Exchange based on Cloud ComputingSHARYU C. KALE, PROF. MAHIP M. BARTERE, DR. H. R. DESHMUKH |
|
1 |
41 |
Implementation on Sentiment Analysis of Bollywood Movies Reviews by Using ML-Classifier AlgorithmN. S. MAGAR, S. N. DESHMUKH |
|
4 |
42 |
Development of Application to Recognise Hand Written Digit at run timeAFFSAN ABBRAR, DR. PRANAM PAUL |
|
3 |
43 |
An overview of Machine Learning Techniques for Student Performance AnalysisNILESH MACHALE, ASHITOSH DHAWARE, AMRUTA KHANDARE, PROF. S. R. VISPUTE |
|
1 |
44 |
Study on Various Tools of Google TechnologySUJITHA.S |
|
2 |
45 |
Survey on Real Time Hand Gesture Recognition Using Different Algorithms Based on Indian Sign LanguageSHUBHAM RAJE, ANURAG RAI, NAVEEN KUMAR SINGH, C.S.WASVAND |
|
2 |
46 |
A Comparative Study of Methods to Improve Visibility in Low Light ImagesABHISHEK GAIWKAD, TEJAS GAJARE, DIPAK BANGE, ADITYA KHADSE, PROF. DR. J. S. UMALE |
|
3 |
47 |
Survey on Anti-Phishing TechniquesPOOJA SHINDE, RADHIKA KHAMKAR, NEHA SAPKAL, POOJARANI GURAV |
|
1 |
48 |
Content Curation Engine for Youtube Learning AnalyticsPROF. Y.K.SHARMA, ALI ZAIDI, ANVAY JOSHI, VISHAL JAISWAL, ATHARVA ASHTAPUTRE |
|
1 |
49 |
Big Data Analytics for Uncertain Data Using Different Classification Techniques: A SurveyDEVASHRI KULKARNI, VEDIKA JOSHI, SUVARNA MACHPALLE, VAISHNAVI ALURKAR |
|
2 |
50 |
A Secure Re- Encryption Scheme of Data Sharing for Dynamic Group in the CloudHARSHADA DESHPANDE, RUCHIKA CHANDEKAR, PRANALI CHAVAN, AISHWARYA BHANDARE, SHWETA B. GUJA |
|
2 |
51 |
Fast Phrase Search for Encrypted Cloud StorageVARSHA PAWAR, POOJA PAWAR, SHALAKA SHEWALE, SHRUTIKA VAIRAL, A. P. TIKAR |
|
1 |
52 |
Survey On-Demand Valet Service System using Mobile ApplicationPRANALI PATIL, AKASH ARAWADE, PRAJAKTA JADHAV, SEEMA GAWADE, PROF.JYOTI DESHMUKH |
|
1 |
53 |
A Survey on Analysis of Video File Container Using Feature DescriptorKHATIB ABULAIS, SWARUP FUSE, RAHUL BHUTRA, PARAG JOSHI, SHAFALI GUPTA |
|
2 |
54 |
A Survey on Automatic Detection and Classification of Gastric Cancer using Deep LearningPROF. AKSHITA CHANCHLANI, ANJALI BHATT, PRAJAKTA AWAGHADE, SUMIT CHAUHAN, SUJAY PASALKAR |
|
4 |
55 |
Automatic Light Intensity ControlMANISH SHARMA, PRATIK PAWAR, SHUBHAM DASHPUTE, VARUN LALWANI, SANTOSH WAGHMODE |
|
1 |
56 |
Malicious Posts Detection Mechanism in Social NetworksGURUNATH AADE, RAHUL KAPSE, EKTAUKEY |
|
1 |
57 |
Automated Toll Booth Management System using QR Code ScannerSHUBHAM OBEROI |
|
2 |
58 |
Proposed IoT Approach to Ameliorate Traffic ConditionsSHUBHAM DESHPANDE, REVATI GANORKAR, MAYUR GIRI, GAURANG SUKI, ARADDHANA DESHMUKH |
|
2 |
59 |
Feature Extraction of the T Peak and Its AnalysisPRIYANKA MAYAPUR |
|
1 |
60 |
Intelligent Recommendation System for Skill Upgradation Based on Behavioral AnalysisVINITA S. PATIL |
|
1 |
61 |
A Survey on Cloud Computing Levels and Their Security ModelsASHWINI R. DHANGE, RASHMI K. DIXIT |
|
3 |
62 |
Vehicle Overloading Detection and Protection using Raspberry Pi and IOT ApplicationSHARDUL SINGH GURJAR, DR. RAVI MISHRA, |
|
1 |
63 |
A Novel Approach to Facet mining of Query with QD MinerPATIL NILANJANA N., PROF.SAMIR S .SHAIKH |
|
1 |
64 |
A Survey on Security of Smart Office by Automation SystemPOORNIMA PATIL, ANAND DESHMUKH, ASHUTOSH MOHANTY, SAUMITRA KULKARNI, KRISHNENDU NAIR |
|
2 |
65 |
Gujarat Travel Guide-An Innovative Application to Seamlessly Explore Cities of GujaratKHUSHALI UPADHYAY |
|
1 |
66 |
Smart Cognitive Bot for Attendance Marking Using Principal Component Analysis AlgorithmSURAJ RAWAT |
|
1 |
67 |
Review on Improved ReLu 70A Piecewise Activation Function used in Deep learning AlgorithmsANUSHA CHITNENI, KARUNAKAR POTHUGANTI |
|
1 |
68 |
Survey on a Car Breakdown Service Station Locator SystemPROF.AMOL D. SAWANT, SUNIL BHAKAL, POOJA SABLE, PRIYANKA JANGAM, SOUNDARYA GOSAWI |
|
3 |
69 |
Survey on IOT Based Bridge Monitoring SystemPROF.N.W.DANGARE, GHADGE SONALI, KHANDGE TEJAS, PATHARE NISHA, PATIL LAXMAN |
|
7 |
70 |
Survey on Univariate and Multivariate Electrocardiography Signal Classification using Machine LearningDR. PRADEEP KALE T |
|
1 |
71 |
Auditing For Secure Cloud Storage Scheme with Secured Key Exchanging TechniqueKANAGALAKSHMI.K, N.C.SACHITHANANTHAM |
|
2 |
72 |
Application
of Machine Learning with Big Data
Umang |
|
2 |
73 |
Automated Teller MachineDr. Archana Verma |
|
3 |