S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
An Efficient & Secure Access Control System by Combining Data Owner Side User Side for Encrypted Cloud ComputingSTHITIPRAGNYA SABAT, PROF. H. A. HINGOLIWALA |
|
1 |
2 |
Review on Optimised Parallel K-Means Clustering using YARN in HadoopSHESH NARAYAN MISHRA, SHALINI VASHISTH |
|
1 |
3 |
IOT Based Rainfall Monitoring System Using WSN Enabled ArchitectureMR. ONKAR BALASAHEB AMALE, DR. RUPALI PATIL. |
|
3 |
4 |
A Secure Re- Encryption Scheme of Data Sharing for Dynamic Group in the CloudPRANALI CHAVAN, HARSHADA DESHPANDE, RUCHIKA CHANDEKAR, AISHWARYA BHANDARE |
|
1 |
5 |
Review Paper on Adaptive Filter based on Multi-rate Approach and Distributive TechniqueSHALU KHAN, AMJAD KHAN |
|
1 |
6 |
A New Searchable Encryption Approach and Integrity Checking on Cloud DataSWAPNALI BANNE, DR. S. A. UBALE |
|
1 |
7 |
Security and Privacy Preserving of E-Health Data in Cloud Environment: A ReviewAARJU JAIN, DR. ASHOK VERMA |
|
1 |
8 |
A Survey on Deep Feature Learning For Medical Image Analysis for Detection of Brain TumorSHEETAL S. SUTAR, DR. SWAPNAJA A. UBALE |
|
1 |
9 |
Review Paper on Electrical Distribution Network for Loss Reduction and Voltage EnhancementNIKHIL KUMAR JHA, PROF. ASHUTOSH RAI |
|
1 |
10 |
Survey Paper on Filter Optimization MIMO Technique for FBMC for 5G TechnologiesPRAKASH KUMAR JHA, PROF.PRAVESH AASATI, PROF.MUNESHWAR KUMAR |
|
2 |
11 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile CloudMISS. NAMRATA KAKUSTE, PROF. M. D. INGLE |
|
2 |
12 |
Cancer Classification using Principal Component Analysis and Deep Neural NetworksHEENA SINDHANI, DR. KAILASH SHAW |
|
2 |
13 |
Load Balancing of Tasks in Cloud Computing Environment Based on Priority AlgorithmNIDHI PATERIYA, PROF. MAHENDRA KUMAR RAI |
|
10 |
14 |
Review on Intrusion using Web Site Vulnerabilities with K-Nearest NeighbourNEERAJ DAGAR, POOJA YADAV |
|
1 |
15 |
The Content Searching Using SCAN TechnologyNANDINI SHARMA, MAHESH KUMAR |
|
1 |
16 |
Data Privacy Preservation through CryptMDBPROF. BALAJI BODKHE, DEVANGI RAVAL, DIPALI VANJARI, JYOTI SHIRSAT, KAJAL PATIL |
|
2 |
17 |
Study on Extracting Geo-Spatial Information from Open Street Map using Machine LearningANITA JANMEDA, DR.DINESH KUMAR |
|
2 |
18 |
Survey on Phrase Search Scheme over Encrypted Data on Cloud SystemsKOMAL K. SHARMA, PROF. MRUNALINEE PATOLE |
|
1 |
19 |
Feasibility of Implementing Multi-Factor Authentication Schemes in Mobile Cloud ComputingNIKITA BORADE, PROF. DR. J.R. PRASAD |
|
1 |
20 |
Connecting Communities for Emergency Awareness within the Short CircumferenceSREENIVAS SASUBILLI |
|
1 |
21 |
Correlating Critical Care Data from Different Resources to Predict an Effect: Related To a Domain Specific TreatmentKUMAR ATTANGUDI PERICHIAPPAN PERICHAPPAN, SREENIVAS SASUBILLI |
|
2 |
22 |
Customized Sequence of Travel Recommendation Based on Multi-Source Extracting From Social MediaSREENIVAS SASUBILLI |
|
1 |
23 |
Identifying the Useful Data in the Repository to Reduce Data Redundancy and Effective Utilization of Data, Using IOTUDAY SHANKAR SEKHAR, GOPINADH SASUBILLI EY, SENIOR CONSULTANT |
|
2 |
24 |
A Machine Learning Approach for Better Identification of Human Nature Based on the Current Health Care DataGOPINADH SASUBILLI |
|
2 |
25 |
Low Power Consumption forRadix-2 Fast Fourier Transform using DKG Reversible GateJAINENDRA DWIVEDI, PROF. ANSHUJ JAIN |
|
1 |
26 |
A Survey on Packet Droppers and Modifier Using Wireless Sensor NetworkRAGHURAM A S |
|
1 |
27 |
Extracting Geo-Spatial Information from Open Street Map using Machine LearningANITA JANMEDA, DR.DINESH KUMAR |
|
1 |
28 |
Low-Power and Area-Efficient Shift Register Using Pulsed LatchesJACOB B CACKO, GAJENDRA SUJEDIYA |
|
1 |
29 |
A Survey on Packet Droppers and Modifier Using Wireless Sensor NetworkRAGHURAM A S |
|
1 |
30 |
Low Power and High Performance Shift Registers Using Pulsed Latch TechniqueJACOB B CACKO, GAJENDRA SUJEDIYA |
|
1 |
31 |
Improved Genetic and Memetic based Task Scheduling in Cloud Computing EnvironmentASHWINI LOKHANDE , PROF.RAHUL GAIKWAD |
|
2 |
32 |
Credit Card Fraud Detection Using Machine LearningDEVENDRA D. BORSE, PROF. DR. SUHAS. H. PATIL |
|
1 |
33 |
Machine Learning Techniques for Android Malware Detection and CategorizationNEHA SHARMA, POOJA YADAV |
|
1 |
34 |
Review on Empirical Detection of Humanistic Real-Time Behavioral Scooping and Interpretation from Multivariate DataPOONAM PATIL |
|
1 |
35 |
A Practical Framework for Energy-Efficient Node Activation in Heterogeneous LTE NetworksALOK KUMAR BAIRWA, GAJENDRA SUJEDIYA |
|
1 |
36 |
Analysis on Energy Efficient Traffic Load Balancing in Downlink LTE-Advanced Heterogeneous NetworkALOK KUMAR BAIRWA, GAJENDRA SUJEDIYA |
|
1 |
37 |
Plastic Money Fraud Detection Using Ensemble Learning TechnicADITI GAUR, RACHNA |
|
3 |
38 |
Shielding Virtualized Resource in Cloud ComputingAMITA PATHANIA, DR.DINESH KUMAR |
|
2 |
39 |
Product Recommendation System Naïve Bayes & MapR vide TwitterPRIYANKA, SHALINI |
|
1 |
40 |
Attribute Evaluation of Dataset Using Chi-Square Test in Rapid Miner StudioSWATHI RATHI |
|
2 |
41 |
Data Security Threats in Healthcare It Using CloudPRUDHVI MADADI |
|
2 |
42 |
House Hold Price Statistical Analysis through Linear RegressionSWATHI RATHI |
|
1 |
43 |
Heart Disease and Alzheimer Prediction based on Hybrid Classification AlgorithmJAYASHRI J. PATIL, NILESH VANI |
|
2 |
44 |
Credit Card Fraud Detection using Machine Learning ModelAISHWARYA P. SHETTY, FOUZIYA AFREEN, JEETHESH M. RAI, MEGHNA N, ASHA B SHETTY |
|
2 |
45 |
Location Based Agriculture Crop and Price Forecasting Using Data MiningPRATHWINI, RAMYA, SUPRITHA BHANDARY, SWAPNA, BALAJI N |
|
1 |
46 |
Game Playing Agent using Artificial Neural NetworkSHRUTI SANJAY LOKESHWAR, SRIJAN S SHETTY , TAIBA ABDUL KHADER , VARSHA D SHETTY, PRAAHAS AMIN |
|
1 |
47 |
Plant Leaf Disease Detection using Neural NetworksSHARAN SHETTY, SHARVANI, SNEHAL L. BADIGER, SUBRAO S, JANARDHANA D. R |
|
2 |
48 |
Retail Management System Using Big DataAKASH SHINDE, AKSHAY USNALE, MAHESH PATIL , ABHIJIT NAGE, PROF. D. A. GAIKWAD |
|
1 |
49 |
Arduino Based Mini Sketching CNC MachineUDAY SHANKAR SINGH , SHUBHAM SINGH, ABHIJEET MITRA, DHANESHWARI VERMA, PROF.SEEMA MISHRA |
|
2 |
50 |
Simulation of Warehouse Automation using Genetic AlgorithmMANILAL D. L., SACHIN JOSE, VIDYADHEESA D N |
|
3 |
51 |
QR Code Based Watermarking TechniqueATUL WALSE, PRIYANKA PANDEY, RUPESH KUMBHAKARNA, REYNOLD JOSEPH, PROF. VAJID KHAN |
|
1 |
52 |
Efficient Voice Based Mail SystemOMKAR KULKARNI, AKSHAY ALHAT, NAMDEO TEJANKAR, ANITA MAHAJAN |
|
1 |
53 |
Image Steganography Tool Using LSB TechniqueKAUSTUBH RAVAL, PRARTHANA FADIA |
|
1 |
54 |
A Study on Recommendation SystemsDEEKSHYA MOHAPATRA |
|
3 |
55 |
A Survey on Driver’s Drowsiness Detection System Using an Effective Face Expression RecognitionRITENDRA RAVINDRA SAWALE, RAUNAK RAJENDRA BADJATE, KRISHNA RAJENDRA CHANDAK, JAGDISH MALPANI, MS. NITAL ADIKANE |
|
1 |
56 |
Implementation Paper Soldier Health and Position Tracking SystemPALASH TRIPATHI, AADYA APTE, PROF. SWATI PATIL |
|
3 |
57 |
Intra College Communication PlatformSURAJ S. KADAM, AKSHAY S. MANE, ATULKUMAR R.MISHRA, SAMARTH A. POTE, NAGARAJU BOGIRI |
|
1 |
58 |
Tag Based Image Search to Retrieve and Classify Images in Different CategoriesONKAR JADHAV, PARAG DHAVARE, POOJA SANGALE, BHARATI DIXIT |
|
1 |
59 |
Accurate and Efficient Image Forgery Detection Using Local Binary Pattern TechniqueAVINASH DAHIBHATE, SUMIT CHAUDHARI, NIKITA MARATHE, ANKITA NARSALE, PROF. V. M. LOMTE |
|
1 |
60 |
Smart Chatbot for Personalized Travel RecommendationANKITA SABAT, JANAVI CHAUDHARI, SHREYAS MEHENDALE, SIDDHANT KOSABE, S. G. DHENGRE |
|
2 |
61 |
A Survey on Smart Waste Management SystemANITA JANGID, AKHILA H KUMAR, KAUSTUBH PATIL, PROF. ANUJA JADHAV |
|
1 |
62 |
Sign Recognition Using Machine Learning Algorithms for Indian Sign LanguagePROF.VINA LOMTE , SHWETA KALBHOR, SAYALI SATPUTE, SAMRUDDHI SAPKAL ,SHRUTI MATE |
|
1 |
63 |
Advanced Searching Method over Encrypted Cloud Data for Multiple Data Owners to Download File at Particular LocationVIRAJ GHORPADE, AKSHAY KUDALE, PRANAY KUKADKAR, RAM SAKORE,SHRIKANT SALVE |
|
2 |
64 |
Web Service for Multimedia Content Streaming Using Adaptive Transmission Control ProtocolSUPRIYA BHOSALE, PROF. VINAYAK POTTIGAR, PROF. VIJAYSINH CHAVAN |
|
1 |
65 |
Cloud Security with Multi-Keyword Search Over Encrypted Data with Multiple Data OwnersPROF.S. S. DIXIT, SUVENA SHETTY, AKASH TAKALE, MUGDHA AMBATKAR, TANMAY TRIPATHI |
|
2 |
66 |
Efficient Hybrid Algorithm for High Utility Itemset MiningJEEVAN SARAF, VIPUL MUNOT, SAHIL PATIL, DR. VIJAYKUMAR BIDVE |
|
3 |
67 |
Mobile Anti-Theft SecurityAKSHAY CHECHARE, ABHISHEK ADKITTE, NEHARIKA RAZDAN, PRAMOD MHETRE, S.N. FIRAME |
|
3 |
68 |
Text Document Classification by using WordNet Ontology and Neural NetworkTEJASHRI MANE, DHANASHREE GHONE, PRASAD KHADE, MANISHA GAWADE,PROF.MUZAFFAR A.R. SHABAD |
|
1 |
69 |
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud DataDIPIKA JADHAV, PRASAD NAGARGOJE, VARSHA JARHAD |
|
1 |
70 |
Analysis and Classification of Diabetes using Machine LearningSAKSHI BHOSALE, REVATI AKOLE, KALPESH PATIL, RAHUL PATIL |
|
1 |
71 |
Network Intrusion Detection by Evaluating Machine Learning TechniquesARCHANA BORSE, KHUSHBU NEMADE, HARSHALI PATIL, KOMAL PATIL |
|
1 |
72 |
Smart Health Monitoring Using IOTSRINIDHI A, M S SOWMYA, SOWMYA B, CHANDANA K N, AISHWARYA B SHET |
|
2 |
73 |
Android Gadgets Apps Scheduling Across Local and CloudTEJASWINI SATAV, POOJA GAWADE, SONALI AWHALE, RUTUJA HARGUDE, PROF. VIJAY SONAWANE |
|
1 |
74 |
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing with BlockchainARPITA KRISHNA BHAT, PRAKRUTHI K, MATHIYALAGAN R |
|
4 |
75 |
A Network Based Spam Detection Framework for Identifying Trusted Reviews on Social MediaCHAITANYA KALE, PROF. MANISH RAI |
|
3 |
76 |
Smart Mirror: Google Assistant Enabled MirrorRAJAS WAGH, POOJA CHORGE2, APOORV JOSHI, SHREYAS KHARADE, DR.NIHAR RANJAN |
|
1 |
77 |
Blind Assistance Using Android Mobile (OCR)REHAN SHAIKH, KHALID HUSAIN, ABRAR INAMDAR , MS.PRERNA DEVKAR |
|
2 |
78 |
Application of Block Chain for Secured University Results
RUSHIKESH PAWAR, SAMBHAJI JADHAV, PROF. GANESH BANDAL, SAINATH RODGE
|
|
1 |
79 |
Android Based Bike Service Ratting SystemSURAJ GHOLASE, SHUBHAM JADHAV, PROF. SANDEEP GORE, GOVIND KALYANKAR, PRAVIN KATKAR |
|
1 |
80 |
An IOT Based Smart-City Waste Management SystemKUNAL AGRAWAL, SAGAR DATTU CHAVAN, ABHISHEK KULKARNI, TUSHAR THANGE, PROF. POURNIMA MORE |
|
1 |
81 |
Placement Analysis using Data-MiningNATARAJ K B, SMITHA B A, MADHURYA S, HARSHITHA S CHAVAN |
|
2 |
82 |
A Survey on Technology: Brain Computer InterfaceTANMAYI SAMANT |
|
2 |
83 |
Survey Paper on Secure Privacy-Preserving Content-Based Retrieval in Cloud Image RepositoriesREMMY RYNTATHIANG, RAJESH SARWADE, SONAWANE AMOL, SARADE AKSHAY, B. S. KAMBLE |
|
1 |
84 |
Potholes Detection Using Ultrasonic SensorPRANAY KAILAS PATIL, AMIT KUMAR SHARMA, SANVID R REMANE, SAURABH CHAUDHARI, N.M.MORE |
|
1 |
85 |
Advance Cell Detection in Histopathological Images using Convolutional NetworkROHINI V. GHULE, SAKSHI S. PATIL, DARSHANA N. BANKAR. SWAPNALI KUMBHAR, PROF. V.S. GAIKWADAdvance Cell Detection in Histopathological Images using Convolutional NetworkROHINI V. GHULE, SAKSHI S. PATIL, DARSHANA N. BANKAR. SWAPNALI KUMBHAR, PROF. V.S. GAIKWAD |
|
2 |
86 |
Novel Method of Detecting Unhealthy Plant Leaves Using Image ProcessingANKITA CHAUDHARI, PRANALI THORAT, ABOLI KASAR, SANYUKTA PATIL, PROF.D.S.UPLAONKAR |
|
1 |
87 |
Image Tag Assignment and Refinement Using CNNHARSHAL KOTHULE, SAURABH THOMBARE, HARSHADA CHAUDHARI, JAYESH PATIL |
|
1 |
88 |
Scheduling, Tracking and SecurityADITYA MAGAR, SHIVRAJ KHETRI, PRANAV PATIL, GAURAV JANGAM, PROF. PRAKASH KSHIRSAGAR |
|
2 |
89 |
RxMedicus: An Application to Facilitate Consultation in HealthcareAJITH N S, MITUL BIPIN, NIKHIL CHOUDHARY, SAMEER PAISARI |
|
1 |
90 |
Personalize Search Engine Using Elastic SearchSACHIN G. PATIL, RAMANUJ R. KABRA, VISHAL P. NIKUM, PRACHI V. PATIL |
|
1 |
91 |
Garden Monitoring and Maintenance Using IOTCHANDRASHEKAR M.N, MEGHARAJ M.K, VIKAS .V, SAGAR M.P |
|
1 |
92 |
Detection of Power Grid Synchronization FailureRUSHIKESH KATORE, SHIVAM JAGTAP, GAJENDRA NAIKWADI, KAMAL KANT |
|
2 |
93 |
Easy Monitoring and Mentoring of Class Environment using Facial Recognition SystemDILEEP L N, M S SOWMYA, PADMINI N, NAMITHA A, ANEESH SHEKAR G |
|
1 |
94 |
Detecting Mental Disorder of Users via Online Social MediaSONU KUMAR, SAKET RAINA, P.V.AMBEKAR |
|
2 |
95 |
Implementation on Efficient Ranked Multikeyword Search for Sensitive Data in Cloud ComputingVAIJINATH GAYALE, PRATIKSHA TAVHARE, HARSHADASHINDE, AKSHATA DORAGE |
|
1 |
96 |
Development of Automatic Street Lighting using Micro ControllerMRS. SOUMYA K N, BIKASH RAJ DAS, ROUNAK KUMAR VASANI, DARSHIL SANJAY TOLIA |
|
4 |
97 |
Image Classification of Crop Using Neural NetworkSHUBHAM KEJARIWAL, ATHARVA JAHAGIRDAR, NAMRATA RATHOD, DIPALI POTDAR |
|
1 |
98 |
Ontology Extraction for Agriculture Domain Using NLP Techniques and Speech CommandKRUNALI PATEL, BHAWNA JAIN, ASHISH BANKAR, AARYA SARDA |
|
1 |
99 |
Diamond Quality Assessment SystemSHIVANI THAKUR, DHEERAJ TAMBARE, URMEZ PANTHAKI, CYRIL JOSE, GAJANAN. B. AOCHAR |
|
1 |
100 |
Improving the Efficiency of Loan Analyzer Using AIMADHURI MAHAJAN, POOJA BARHATE, JITENDRA BUNDE, HEMANT ZOPE , ASS. PRO. S. D. RAJPUT |
|
1 |
101 |
Finger Movement Controlled Automatic WheelchairRAHUL ADHAV, SHRADDHA PAWSHE, RANJIT METKARI, P.D.CHOKSAY |
|
2 |
102 |
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud ComputingDHAVAL JAIN, PIYUSH DAGA, RAHUL JANGIR, K.B.SATPUTE |
|
4 |
103 |
Smart Assistance System to Improve Agriculture ProductivityAVIRAL SHARMA, K. DARSHAN, KARTHIK V. SHETTY, MATHIYALAGAN.R |
|
3 |
104 |
An Implementation of Fault Node Recovery Algorithm using Genetic Algorithms Wireless Sensor NetworkPhule Udaykumar G, Prof. Dhainje Prakash B |
|
4 |
105 |
Impact of Urban Migration on the Higher Education Opportunities for Tribal Girls from JharkhandDr. Deepali Parashar |
|
4 |