S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Development of Web Pattern by Web Structure Mining – A ReviewSHAILENDRA PRATAP NIRALA, ABHISHEK SHARMA, BRIJESH PANDAY |
|
3 |
2 |
Implementation of Value Stream Mapping and Kanban Method for Improved and Sustainable Production in Piston IndustryDINESH DANGI, GOURAV PUROHIT |
|
1 |
3 |
Automated Ration Distribution Vending SystemJANANI.S, JAYASURIYA.V, CELESTINA.N, DR.VANATHI.B |
|
1 |
4 |
IOT Based Effective Data Collection and Cost Estimation (IEDE) On the Pollutant Particles in the AirS.SHENBHAGAVADIVU, M.DIVYA, V.KALAITHENDRAL, V.KIRUBA, R.KRITHIKA |
|
3 |
5 |
Balancing of Imbalanced Data Classification Using Enhanced Fuzzy and SMOTE TechniqueCHANCHAL, PERTIK GARG |
|
1 |
6 |
Sentiment Analysis of Tourist Review using Supervised Long Short Term Memory Deep Learning ApproachPRIYANKA THAKUR, DR. RAJIV SHRIVASTAVA |
|
5 |
7 |
Changing Roles of IT Service Management with Cloud Computing & DevOpsDHANASHREE GHOSALKAR, SHWETA PATIL |
|
1 |
8 |
Enterprise Application and Delivery in Cloud ComputingMADULIKA CHAUDHARI, AISHWARYA KANETKAR |
|
1 |
9 |
IOT Based Fault Detection and Automation In Electricity BoardSHREEMAAKANTH, PREETHI, SHREYA MURALIDHARAN, LALITHA |
|
3 |
10 |
Social Sites Mental Disorders Detection via Online Social Media Mining using Machine Learning FrameworkMADHAVI JADHAV, SARITA PATIL, SUVARNA SATKAR |
|
1 |
11 |
A Survey on Speech Recognition in Medical CareSANIYA PARVEEN, PRESILLA R |
|
4 |
12 |
Design of Sierpinski Fractal Monopole AntennaPL.ALAGUMEENAL, MS. R. SINDHUJHA M.TECH., |
|
1 |
13 |
Designing a Waveguide Diplexer for the 5G Mobile NetworkK. AZHAGUVENNILA, N. SOWMIYA B.E., M.E.,, |
|
1 |
14 |
Antenna Designing For 5G CommunicationV.MANIMALA, V. GAYATHRI, R. DHIVYA BHARATHI , R. DINESH KUMAR |
|
5 |
15 |
Network on Chip Based on Adaptive Routing AlgorithmV.MAHESWARI, S. BALASUBRAMANAIM, S. ANISH |
|
1 |
16 |
Efficient Bandwidth Estimation and Minimize the Packet Loss in TCP/IP MANETB.RAGAVI, K.SOWMIYA, G.RANJITH |
|
1 |
17 |
An Enhanced Jamming Attack Detection Using Bittrickle MethodologyK.GAYATHRI, K.RENUGADEVI, L.KIRUTHIKA, J.RATHIKA, D.SREEARTHI |
|
1 |
18 |
Identification and Removal of Jelly Fish Attack in IOTNEHA RANI, MANMEEN KAUR |
|
1 |
19 |
Implementation of 9T SRAM Using Series TechniqueAJAY ADHARSH.S, ASHA.J, NITHYA.A |
|
2 |
20 |
Influence of an Intervention Programme on Health and Hygiene Practices among School Children in Mangalore CityPROF. ASHA RAI.M.G, DR.MAMATHA .B |
|
1 |
21 |
Watermarking Using Three Level Discrete Wavelet TransformR.PAVITHRA, K.POOVAZHAKI, A.SUDHAKAR |
|
1 |
22 |
A Survey on Secure Cloud Computing Using BlockchainPREETI ZIRWAL, NIMISHA BATTISE, BHAVANA KHANDARE, SNEHAL TAYADE, DEEPIKA THAKARE |
|
3 |
23 |
Entrepreneurship and Modernization Mechanism in Internet of ThingsR.KARTHIKEYAN, DR. T. GEETHA., A. KARTHICKRAJA ,. K. ISHWARAYA |
|
2 |
24 |
Security Issues in Mobile Ad Hoc NetworkS. HARIBABU, G. LAVANYA, M. JANANI, J. MALARVIZHI, A. GUNAVATHI, V. LAVANYA |
|
1 |
25 |
Yield Disease Identification Using Pattern Recognition and Image Processing- A SurveyS. HARIBABU, P.GAYATHIRI, V. MADHUBALA, M.MADHUMADHI, D. KIRUTHIKA, V. HAMITHA |
|
1 |
26 |
MATLAB to Measure the Diameter of an Object within an ImageA. ANAND KUMAR, G. GUGAN, K. MANIGANDAN, C. KAVITHA, S. MALINI, A. MYTHILI |
|
2 |
27 |
Home Automation System Embedded in an Internet-Of-Things PlatformVINOD MOTIRAM RATHOD, SUJATA SHANKAR GAWADE, POURNIMA ABHISHEK KAMBLE |
|
4 |
28 |
An Extensive Survey on IOT: Communication Protocols and its ApplicationsSIVARANJANI.R, P.KANAGA PRIYA, M.JANANI |
|
7 |
29 |
Diabetic Retinopathy Using Artificial Neural NetworkABIRAMI.P, DEEPANKUMAR. R, MANOJ.A, MONISHA.D |
|
1 |
30 |
Document Clustering Using Enhanced Tw-K-MeansM.KUMARESAN, G.ASHWITHA, S.BHUVANESWARI, N.PRIYA DHARSHINI, M.UDHAYA |
|
1 |
31 |
Symetric Groups of Authentications and Key Management with Session Based Automated Key UpdationK. GUNALAN, P. MALLIKA, A. GOKILAVANI |
|
1 |
32 |
An Improved DDoS TCP Flood Attack Defence System in a Cloud EnvironmentANUPRIYA DUBEY, PANKAJ JAIN |
|
1 |
33 |
Survey of Hyponym Relation Extraction from Hyperlinks Using Motif Patterns with Feature Combination Extraction ModelG.KEERTHIGA, A.GOKILAVANI |
|
1 |
34 |
A Survey on IoT: Architecture, Communication Technologies and Wireless SensorP. KANAGA PRIYA, R. SIVARANJANI, M.NATARAJ |
|
6 |
35 |
Sentiment Based Comments Rating ApproachK. SARANYA , R. LEEMA ROSLIN , L. HARI HARA PRIYAN |
|
3 |
36 |
Proficient Approach of Artificial Intelligence for Real AppliancesDR. T. GEETHA , K. JEEVA , K.SANGAVI , D.LAVANYA |
|
2 |
37 |
Post Filtering Mechanism in Social NetworkingPOOJA B. BHOR, PROF. SHEETAL THAKARE |
|
3 |
38 |
Smart Solar Panel Efficiency Monitoring SystemK BALAJI, B GOPICHANDRA KUMAR |
|
2 |
39 |
Efficient Methodology and Applications of Dynamic Heterogeneous Grid ComputingR.KARTHIKEYAN, DR. T. GEETHA.,R.DEEPIKA , R.RESHMA |
|
2 |
40 |
A Consolidated and Simulation Analysis of Routing Protocols using Various Mobility Model in MANETASHISH GUPTA |
|
1 |
41 |
Distributed Efficient Economic Analysis of Bigdata using Frequent Pattern HadoopGOKUL BHARATH C, GOWTHAM A, AKILAN S.S, ARAVIND V, DR.S.MADHAVI |
|
2 |
42 |
Efficient Methodology for Emerging and Trending of Big Data Based ApplicationsR.KARTHIKEYAN, DR. T. GEETHA, P. LAVANYA,.S. KALPANA |
|
2 |
43 |
Power Consumption Analysis in Smart Home Using Data AcquisitionPRACHI KULKARNI, D.K.CHITRE |
|
1 |
44 |
Comparative Study on DHT Algorithm using Different Types of TechniqueAKSHAT PANDEY, PROF. RAHUL SHRIVASTAVA |
|
1 |
45 |
Survey Paper on Artificial Intelligence in GamingMOHAMMED BURHANPURWALA , TUSHAR BHARDWAJ , TARUN JAIN , ADITYA PATIL , MADHURI DHARANGUTTIKAR |
|
1 |
46 |
Online System for Event Organization and PlanningKRANTI KOLAMBE, OMKAR MORE, SUDARSHAN MUNDE, ALISHA MANE, KUNAL SHINDE |
|
1 |
47 |
IOT Based Human Less Toll SystemPALLAVI NEHETE, ATHARVA KADAM, GAURAV CHOTALIYA, ANIKET PATTANKUDE, SAURABH MARNE |
|
3 |
48 |
A Mechanism for 3-D Face Detection SystemSURBHI SHARMA, SAMMAH RASHEED, DR.TRAPTY AGARWAL, PALVADI SRINIVAS KUMAR |
|
1 |
49 |
Enlightenment capacity for Powerful Face Recognition mechanism Using DCT algorithmPRAMOD SINGH RATHORE, VISHAL DUTT, POOJA DIXIT |
|
1 |
50 |
A Shape Mechanism along Text Based Advanced Face Detection Methodology Using EFM ModelABHISHEK KUMAR PANDEY, SURBHI SHARMA, SAMMAHRASHEED |
|
1 |
51 |
Huge Haul Temporal Convolutions for Action Recognition: A SurveyKUMAR GAURAV, MANJU PAYAL, ANUJA BANSAL, RADHIKA BAKLIWAL |
|
1 |
52 |
Evolution IOT Concept of Face Recognization: A Survey for Related MethodologiesABHISHEK KUMAR, DR. PRABHAKAR REDDY |
|
2 |
53 |
Intelligent Traffic Management System Based On Internet of Vehicles (IOV)S.SRIDHAR, SAYYEDA FATHIMA, S.BINDU SRI VANI, G.TEJA NANDITHA, K.ANUSHA |
|
1 |
54 |
IOT Based Smart Water Tank Using Android ApplicationsC.SENTHIL KUMAR, C.BHAVANI, S.R.HARSHINI PRIYA, S.JAYALAKSHMI |
|
1 |
55 |
Secure Group Key Agreement Algorithm for Mobile Adhoc NetworksGURUDEEPA G, DR.S.AMUTHA, |
|
5 |
56 |
Acoustic Noise Reduction in Speech Signals Using Microphone Array Beamforming Algorithms DSB, GSC and RGSCT.KRISHNAVENI, SOLOMON GOTHAM, M.BHAVANI, DEEPIKA.A, B.RAMYA SREE |
|
2 |
57 |
A Survey on Agricultural Drones Using IOTDR.D.KAVITHA, B.INDHUJA, L.GAYATHRI, K.DHANALAKSHMI |
|
4 |
58 |
Smart Refrigeration System Based On Embedded SystemMANISHA BARAWKAR, AMEYA KULKARNI, NITAL TAYADE, PRATIK CHISTALKAR |
|
1 |
59 |
Secure Sharing of Personal Health Record in Cloud EnvironmentE.SARANYA, V.TAMILARASI, E.THAVAMANI, E.VIGNESHWARI, T.SATHIS KUMAR |
|
2 |
60 |
Efficient Path Management of Non-Uniform Load Distribution in Wireless Sensor NetworksMUTHUKUMARASAMY.S, KAVITHA.T, NADHIYA.N, PRADEEPA.K |
|
2 |
61 |
A Study on Accident Prevention at Unmanned Level Crossings: A Fail Proof SystemSALMAN S.SHAIKH, UZMASAMAN A.CHANDERKI |
|
3 |
62 |
Women’s Security Wrist Watch: a Techie Approach towards SafetyUZMASAMAN A. CHANDERKI |
|
1 |
63 |
IOT Based Fisherman Border Security Alert SystemM.PRIYADHARSHINI, J.ARUN KUMAR, S.J.GOKULAKRISHNAN |
|
3 |
64 |
Foogle: Advanced Surveillance Technique to Find Missing Person with Face Search SystemDR.B.MUTHUSENTHIL , HAREENI SHREE R T, MADHUBALA J B |
|
2 |
65 |
Bi-Directional People Counting and Ticket ValidationJ BOOBESH, S KARTHICK, S MANIKANDAN |
|
1 |
66 |
Detection of Moving Foreground Object Structure Using Regression MethodKRISHNAPRASANTH.R, LOGESH.D, MANIMARAN.C |
|
1 |
67 |
Water Leakage Detection and Pricing Analytics Using IOTRASHMI RAJALAKSHMI.M, NIVEDITHA.G, SHOBIA INBATHERSINI.I, THENMOZHI.R |
|
3 |
68 |
Identification of Anonymous Identical Users in Multiple Social Media NetworksR.THENMOZHI, P.ANANTHI, R.DIVYA, C.LAVANYA, K.LIVYA |
|
4 |
69 |
Smart Highway System for Future Cities Based on IoTJ.KAVIYA, M.KEERTHIKA, R.KIRUBASRI, S.NIKITHA , S.SEKAR |
|
2 |
70 |
A Review on Speed Breaker and Pit Detection in the Roads Using Arduino Uno and SensorsGOKULAKRISHNAN.G, JUDE FRANGO FELIX.A, KARTHICKEYAN.S, N. LEO BRIGHT TENISSON |
|
1 |
71 |
Performance Analysis of UDP Based on Traffic Classifier Using NS2PROF.R.PRAVEEN KUMAR , AMAL MOHANAN, C.MADHUMITHRA , R.KUMAR |
|
2 |
72 |
Cancer Detection for Brain in MATLAB Using Deep Learning AlgorithmT. VELMURUGAN, S.MANISHA, S.AZHAGU SANGEETHA |
|
2 |
73 |
7:2 Compresser Using MCM Algorithm Based Fir FilterU. RAJASEKARAN, P. MUKIL VISWA, R. DINAGAR, S. MUTHU SOWMIYA |
|
3 |
74 |
Vote from Home: An Immutable Legitimate Blockchain Based E-Voting SystemDR. S. RAVIKUMAR, R.APARNA, J.JAYALAKSHMI, S.MADHUBALA, I.MAIMOON FARHANA |
|
2 |
75 |
Design of Microstrip Antenna for Coupling ReductionMUTHU GANAPATHY.M, NIVETHA.M, SURYA KUMAR.V, RAJESH.N |
|
1 |
76 |
Design and Development of Driver’s Driving Pattern Analysis for Automatic License Issuing SystemSAI CHANDANA M, SAI PRIYA, SARIKA S, SARATHY D, BALAJI K |
|
3 |
77 |
Arrhythmia Recognition and Classification Using ECG Morphology and Segment Feature Analysis using Support Vector MachineR.SHANTHI , M.AHAMED FAHIM HASSAN, R.MANIKANTAN, M.MANSOOR NOUMAN, R.SIVA PRASANNA |
|
3 |
78 |
Automatic Garden Monitoring and ControllingN.RAMYA , S.SNEHA |
|
4 |
79 |
Segmentation of Disease in Betel Leaf Using Image ProcessingB.MONESH, M.GANA PRABHA, S.ANJUTHA, X.GLADISH KIRUBAI, A.STEPHAN SAGAYARAJ |
|
1 |
80 |
Detection of Cucumber for Harvesting Using Color Difference MechanismS.RAMASAMI , B.ABIRAMI , M.GAYATHRI , M.KOWSALYA , P.YAMUNA |
|
2 |
81 |
Smart Healthcare System for Cardiovascular PatientsB.ILAKKIYA, G.ALAGU DEEPIKA, P.NAVEEN PRASATH, M.JOTHI |
|
1 |
82 |
Secret Data Hiding Using ECDSA AlgorithmMRS.M.MEENALOCHINI, M.AMUTHA, R.GOKILAPRIYA, S.MYTHILI, S.NAGESWARI |
|
2 |
83 |
File Secured by Means of Dynamic Key UpdationARUNA DEVI , ANU LEKSHMI, DEEPAK, RAMA LAKSHMI |
|
1 |
84 |
AR Based Assistive System for Detecting Driver Phone in a Moving VehicleK. SARANYA, S. ASHATH ELLIYASH, S. GOKULAKRISHNAN, G. HARI HARAN, P. KAMARAJ |
|
2 |
85 |
Stock Market Trend Prediction using Machine LearningA.AKASH, R.SHANTHI, R.ARAVINTH, V.KURUNJI VENDHAN, D.VEERAPANDI |
|
4 |
86 |
Shamir’s Secret Sharing Scheme to Ensure Privacy in Multicloud Database ModelS.SELVI,M.E.,(PH.D), C.KAYATHIRI, P.SARANYA, R.SUMITHRA, U.MOUNIKA |
|
1 |
87 |
An Efficient Map Reduce Framework for E-Commerce Using Hadoop TechnologyD.KALAIABIRAMI, B.SUGANYA, D.NIVI |
|
1 |
88 |
Smart Priority Based Recommendation System for Elderly PatientsT.GOWTHEESWARAN, T.JAYASURIYA, A.KARTHIKEYAN, P.MULLAIVENDHAN, M.JANANI |
|
4 |
89 |
Handwritten Text Recognition Using 2D-PCA and CNNS.SELVI, NANDHA KUMAR, M. SHANMUGA MANIKANDAN, |
|
1 |
90 |
Effective Periodic Feedback Channel Allocation under Possible Circumstances in Modern Broadband Wireless NetworksK.CHITRA, K.DHARANI, D.GOMATHI, R.K.PRABHU, N.VIJAYKUMAR |
|
1 |
91 |
Semi Dynamic Underwater Wireless Sensor Network Based on Differential Evolution Motion PlanningR.GUNA PRASAD, B.JAIKANTH, D.R.MADHUSUDHANAN , DR.K.GUNASEKARAN |
|
25 |
92 |
Designing and Evaluating a Load Balanced IDS Environment in MANET EnvironmentE.ALWIN RICHARED, R.PRASANTH, K.THULASIRAM, C.P.GOWTHAMI |
|
3 |
93 |
Encrypted Division and Replication of Data Stored in CloudH.AASHIKA PARVEEN, A.BHAVANI, D.BRINDHA, P.HARIPRIYA, R.SHARANYA |
|
2 |
94 |
Random Forest Algorithm in Inferring User Search Goals with Web Page RecommendationDR.A.GNANABASKARAN M.E.., PH.D, J. ADHIPUDRISHWARANATHAN, R. GOWTHAM, S.M. HARISH KUMAR |
|
3 |
95 |
Structure Based User Identification across Social NetworkE.KALLEESHWAR, T.BARANITHARAN, K.JENITH, C.RUKUMANI KHANDHAN |
|
3 |
96 |
Hadoop Service Oriented Youtube Data Analysis Using Map Reducing AlgorithmMR A.RAMU, G.HEMANTH KUMAR, D.MANOJ KUMAR , P.SREEDHAR |
|
1 |
97 |
A Survey on Lightweight Chatting Using BluetoothG LAKSHMI VARA PRASAD, G MANASA, B MANEESHA, E CHANDRIKA, S BALAKRISHNA |
|
3 |
98 |
Utilizing Area Mindful Business Principles for Anticipating Retail keeping money cheatsV.P.GLADIS PUSHPARATHI, B.ABISHIEK, C.H.VISWANATHUDU, C.S.INBASWARAN, A.ASHWIN |
|
3 |
99 |
An Efficient Secured Public Auditing Protocol with Novel Dynamic Structure for Cloud DataVARSHA P, BHAVANI T M, THILAGAVATHY T, AISWARYA S |
|
1 |
100 |
Survey on Pedestrian Detection and Collision PreventionPROF. VINA LOMTE, SHWETA KALBHOR, SAMRUDDHI SAPKAL, SAYALI SATPUTE, SHRUTI MATE |
|
4 |
101 |
A Novel Encryption Scheme to Ensure Hadoop Based Cloud Data SecurityRENU DWIVEDI , PROF. SATPAL SINGH , PROF. SUMIT NEMA |
|
1 |
102 |
Interactive and Dynamic Application for Chef Booking Using Material Design and MEAN Stack (Amma’a Aroma)KARTHIK.R, PRAVEEN.S, RAVIVARMA.A.K, CHITRA.R |
|
1 |
103 |
SEPDP: Secure Effective Provable Data PossessionK.BALACHANDER, G.MOHANAPRASAD, SK.GOUHAR AHAMED, T.KISHORE, M.SANTHOSH KUMAR |
|
1 |
104 |
Real Time Road Accident Information and Insurance Dispute ResolutionSIKHANDINI V.P., VAARUNYAA S, JESIMA BANU SYED MOHAMMED S, MS. K RAMYA |
|
1 |
105 |
Region-Based Secure Emergency Message Broadcasting In VANETDR.S.SOUNDARARAJAN.PH.D, P.K.LOGAPRIYA, A.RAMALEELA, A.H.SUVESHA |
|
3 |
106 |
Secured Data Deduplication in Cloud EnvironmentS.GAYATHRI, P.KOWSALYA, K.MATHUMITHA, P.N.NAGAJOTHI |
|
2 |
107 |
Solid Waste Management and Electricity Generation Using IOTIRIN SHERLY, JENCY PRIYA, DHARANESWARI ,MOHANA PRIYA |
|
1 |
108 |
A Child-Left behind Warning System using GSM and ARM7P SEKHAR, D DURGA PRASAD, L SRAVANI, CH PRAVEEN, G SAI RANI, E MANIKANTA |
|
1 |
109 |
Online Smart Village Monitoring and Adoption Utilizing Android ApplicationM. PALANIAPPAN, M. SATHIYANATHAN, S.DHINESH, S.SELVAKANMANI, M.E.(PH.D.) |
|
1 |
110 |
Reuse or Recycle to Reduce by Using Android TechnologyMR. BATTULA AKHIL TEJA, MR. PANDIRI SAIRAM, MR. SHAIK MANSUR, MR. VIKRAM SRINIVAS ,MR. M.MANUKUMAR |
|
3 |
111 |
An Improved Anatomically Constrained Neural Networks (ACNNS) : Application To Cardiac Image Enhancement And Segmentation Using Fuzzy Based Super Pixel ModelM.DIVYA M.E, M.NANTHINI MUTHUVALLI, M.RATHI PRIYA |
|
1 |
112 |
An Intelligent Hybrid Intrusion Detection System with Virtual FencingT.SHUNMUGA PRIYA, H.RAJALAKSHMI, K.M.ZOHRATH MARZOUQA |
|
2 |
113 |
A Novel Approach of Visual Secret Sharing Schemes for Encrypting Multiple Images using ANFISC.SUJATHA , S.ARCHANA, K.THARANI, C.YUVANIYA |
|
1 |
114 |
An Adaptive fuzzy based Evaluation of Fetal Congenital Heart DefectsU.THIRUNIRAISELVI M.E, T.PAVITHRA, K.PRIYA DHARSHINI |
|
1 |
115 |
Communication Aid for Differently AbledMR.G.ELANGOVN, DIVYA R, SARANYA P, KAVIYA SHRI B. |
|
2 |
116 |
Real Time GPS Based Bus Route Tracking System using AndroidMRS.A.V.KALPANA, M.VIGNESH RAJAN, B.HEMSHARAVANAN, M.R.SURYA NARAYANAN, V.VIJAY KRISHNAA |
|
1 |
117 |
Throughput Enhancement in LTE Network Using Enhanced Genetic AlgorithmDr. KAVITHA B |
|
6 |
118 |
Detecting Dyspraxia through an Augmented Reality Serious Game (ATHYNOS)M.RAJESWARI, P.LOSHIKA, R.PRAVEENA, N.K.PRIYA |
|
1 |
119 |
ChatBot for Technical and Non-Technical QueriesR.DHARANI, R.SAHANA, S.SESHEL SHANMUGHI, L.SAILAJA |
|
1 |
120 |
Remote Frequency Emitter to Block GSM SignalJ.GOPINATH, P.ACHUTHAN, DR.V.DHANAKOTI, K.AJAY |
|
1 |
121 |
Assured Way to Manage Various Controls in CloudDR.E.SUJATHA, S.DIVYA, K.ATCHAYA, M.SAHANA |
|
1 |
122 |
Augmented Reality Based Education ToolDR.R.JOSPHINELEELA, SWETA KUMAR, MAHETHA K RAJAN |
|
4 |
123 |
Implementation of a Two-Wheel Self -Balancing Robot Based on Inverted Pendulum Concept Using Node MCUS.NARESH KUMAR, V.PRABHAKARAN, S.SAKTHIVEL, S.V. DHARANI KUMAR |
|
3 |
124 |
The Phenomenal Strategy for Recommending Digital TV Channels Using CloudDR.R.SUGUMAR, M.AJITH KUMAR, S.ARUNKUMAR, A.ANBU, M.SURIYA KIRAN |
|
1 |
125 |
Distributed Block Chain for Security in an Ecommerce EnvironmentANANDHAPRIYA S, NAVYA JAYAPAL, NANDHINI K, PRANAMITA NANDA |
|
1 |
126 |
Truth Discovery in Social Media Applications Using HadoopDHIVYA S , GOMATHI M , SAKTHI SRIDEVI J, SATHIYA JEBA SUNDAR J S |
|
2 |
127 |
Google Assistant Using Raspberry PiY.V.R.S.KARTHIK, P.SRAVANI, G.SAI MOUNICA, A.PUJITHA, G.SESHA SAI, B.NAGA JYOTHI |
|
2 |
128 |
Secure Crop Disease segmentation and Detection image search on Hadoop EnvironmentAJIT GUND, SAPNA JAGTAP, OMKAR SARGAR, PRATIK KUMBHAR, PROF. J. S PATIL |
|
1 |
129 |
A Review on Implementation of Virtual Mouse Conformation using Hand Gesture TrackingROHIT SHAKYA, ANKUR TANEJA |
|
1 |
130 |
Customer Satisfaction- Aware Profit Optimization Model to Find Multi-Dimension Quality of Service for Cloud Service ProvidersGUNISETTY KIRAN KUMAR, THEJASWINI.M.S |
|
2 |
131 |
An Efficient Novel Technique for Searching Encrypted Data by Improving Privacy and Security on Mobile CloudS. LAVANYA, C. MADHURI YASHODA |
|
2 |
132 |
Profit Aware Load Balancing For Improving Customer Satisfaction Model to Find the Numeric Optimal in Cloud ComputingPELLIMARI VIGNA, J.SUREKHA |
|
1 |
133 |
Emotion Based Music Recommendation SystemMAHALAKSHMI.V, DEEPIKA. K, ISWARIA. N , VIDHYA. A |
|
3 |
134 |
Identifying Gene Disease using Genomic and Proteomic Knowledge BaseSABANA YASMIN.B, SINDHIYA.S , PREMA.V |
|
2 |
135 |
A Smart Bin to Detect the wastage and Provide Automatic Alert SystemKOKILA.S, DEEPALAKSHMI.T, DHANALAKSHMI. K, RAJASEKARAN. T |
|
2 |
136 |
Doctors Assistive System Using Augmented Reality for Critical AnalysisJOSE RAHUL, KISHORE GANTH S.D, KOMBAIYA KUMAR. S, SAMYDURAI.A |
|
2 |
137 |
Intelligent Shopping System Using Li-Fi TechnologyJEBASLIN ROSHIYA.J, KEERTHIKA.M.P, MENAGA.N, MURUGESAN.D |
|
3 |
138 |
Airline Baggage Guidance and Tracking System Using RFID and Internet of ThingsS T AKILASH, Y JAYASEELAN, O BENJAMIN ELIEZER |
|
1 |
139 |
Optimization of Specific Absorption Rate in Human BrainR.OVIYA, MR.G.ANNAMALAI., M.E., |
|
2 |
140 |
Design of Microstrip Array Antenna for 5G CommunicationsA. SANGEETHA, MS. D. RAJESHWARI,M.E., |
|
2 |
141 |
Evolutionary Ai Algorithm for Health Risk PredictionMISS. BHAGYASHREE PATIL, PROF. D. D. PATIL |
|
1 |
142 |
Qualitative Analysis of Online Feedback Analysis of InterviewsSUMAYA MOHAMED YUSUF, PRESILLA R |
|
2 |
143 |
Event Management System with Advanced Features Using e-ApprovalB.SOUNDARIYA, P.SRIRANJANI, M.VISHALI, G.VIVISA , R.UMANESAN |
|
7 |
144 |
Local Body Monitoring System for Sewage, Water storage and GarbageANISH SURYA D, ARAVINTH K, KRISHNA KUMAR C A, VENKATESH S |
|
3 |
145 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud ComputingSHUBHAM NARANDEKAR, SAGAR LAMBTURE, VISHAL KADAM, PRASOON KUSHWAH |
|
1 |
146 |
SNMP Protocol Implementation in Inverter for Parameters MonitoringJAYESH SHITOLE. D, PROF. SUSHEN R. GULHANE |
|
1 |
147 |
A Survey on an Effective Pattern Generation for Disease PredictionLEENA PATIL, KANCHAN DOKE |
|
1 |
148 |
A Web Service Oriented Cloud Architecture for Maintaining Privacy and Auditability of Medical ReportsAMRUTA S.DHANGE, PROF. R. V. ARGIDDI |
|
2 |
149 |
A Study on Automated Billing System Using Radio Frequency Identification TechniquePURVA SANAP, PRACHI SHETTI , NAMIRA SHAIKH, VISHAKHA PAWAR |
|
3 |
150 |
“Third Eye”-Enhancement of Women Safety Using Unmanned Aerial VehicleNARESH KUMAR.B, NAVEEN KUMAR.N.R, NITHYA LAXMI.G, KUMARESAN.G |
|
4 |
151 |
A Solution for Banking Sectors to Make Secure Transaction Using Blockchain TechnologyC.MANIKANDAN, M.SHARMI, R.SUMI, S.THANGAM |
|
1 |
152 |
Analysis of User Review in E-Commerce WebsitesVIVEKA T, PAVITHRA S, RAJESHWARI V, SAHAYA SARANYA S |
|
2 |
153 |
Recognition of Leaf Using Neural NetworkG. KALAIARASI, P.S. HEMALATHA, C. GOKILA, P. ESWARI, S. KANMANI |
|
3 |
154 |
Smart Drinking Water Management Based On IOTGOKUL.R, ABUBAKKAR SIDDIK.S., KUMAR.P., JAYATHILAGAN.J., SARITHA. B |
|
1 |
155 |
IOT Based Vehicular Pollution Monitoring SystemP.DHARANI PRASATH , P.LOGANATHAN , N.MUNIYAPPAN , S.MUTHU KUMAR , T.MANI |
|
2 |
156 |
Forewarner for Agricultural Variety of Pest Attacks (AGROTIS)Dhananjay Dogra, Kartheeswaran.P, VinodhSekar.R, Dr.D.Venkata Subramaniam |
|
2 |
157 |
IOT Security and Privacy Using Encryption AlgorithmsDr. Rajendra Kumar Bharti |
|
2 |