S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Context Aware in Intermittently Connected Network RoutingAHMED B. ALTAMIMI |
|
8 |
2 |
A Review on Face Recognition for Faster Processing PowerDEEPAK SHARMA, AMAN KUMAR, ASTHA GAUTAM |
|
5 |
3 |
Literature Review on Fuzzy Score Based Short Text Understanding from Corpus Data Using Semantic DiscoveryS.MANIMEGALAI, D.UMANANDHINI |
|
2 |
4 |
An Enhanced Cross Layer Architecture for Wireless Multihop NetworksK.KALAIARASAN, S.R.KARTHIKEYAN, C.KARTHIKEYAN |
|
2 |
5 |
IOT Based Women Tracking and Security with Auto Defender System: A ReviewROSHNI S. SUNE, M. H. NERKAR |
|
2 |
6 |
A Study on Big Data with Indexing Technique for Searching and Retrieval of Data FastlyPOOJA ANAND, DR. SANDEEP MAAN |
|
6 |
7 |
Review on Car Traffic Sign AnnunciatorG. K. ANDURKAR, SAMATA BANSOD |
|
1 |
8 |
Security in Geo-Social Applications Through Preserving Location PrivacyDHANASHREE PATIL, YOGESHWARI S. BORSE |
|
2 |
9 |
Blockchain based Security Mechanism for Internet of Things (IoT)ZAINIYA MANJIYANI |
|
2 |
10 |
A Generic Strategy for Cold-Start Rating Prediction Problem Using RAPAREVIJAYALAKSHMI S, RAMYA J |
|
2 |
11 |
Security in Vehicular Ad-hoc NetworkYOGITA A. MORE, NILIMA P. PATIL |
|
5 |
12 |
A Review on Hindi Numeral RecognitionPOOJA SINGH, PROF. ROVIN TIWARI |
|
2 |
13 |
A Review on Different Load Flow Technique for LVDC distribution SystemARTI KUSHWAHA, PROF. KAPIL GUPTA |
|
2 |
14 |
Survey on Sign language to Speech ConversionASHISH G. BAIRAGI, Y.D. KAPSE |
|
1 |
15 |
An Approach to Extract Features from Speech Signal for Efficient Recognition of SpeechNARENDRA KUMAR SAINI, VIPRA BOHARA, LAXMI NARAYAN BALAI |
|
3 |
16 |
Efficient Exploitation of All Wireless Networks around Us – The Right ApproachAMIRTHARAJ S, SABAPATHI T |
|
3 |
17 |
A Smart System to Manage and Control Home AppliancesSHAMIMA AKTER, MOHAMMAD JAHANGIR ALAM , DR. MD. NURUL MUSTAFA |
|
2 |
18 |
Hybrid Cryptography Approach for Securing MANETs – A SurveyZUHI SUBEDAR, SATISH DESHPANDE |
|
3 |
19 |
Virtual Remote Lab Access over TCP /IP ServerVAISHALI BOBADE, SHASHANK MANE |
|
1 |
20 |
Biometric Door Lock System over MQTT ProtocallHINGOLIKAR SMITA CHANDULAL |
|
1 |
21 |
Using Text Mining Algorithm to Track Job Seeker Search Patterns in GhanaDELALI KWASI DAKE |
|
1 |
22 |
A Car Breakdown Service Station Locator SystemNEELIMA SUTAR, POOJA DORGE, MONIKA KADAM, PROF. RASHMI TUNDALWAR |
|
1 |
23 |
Artificial Intelligence Using Forward Chaining and Backward ChainingKAJAL JAISINGHANI |
|
2 |
24 |
A Survey on New Approach for Integrity Checking on Cloudstorage DataNEHA R. PATIL, PROF. S. R. PATIL |
|
1 |
25 |
Performance Analysis of RabbitMQ as a Message BusSNEHA SHAILESH, KIRAN JOSHI, KAUSTUBH PURANDARE |
|
1 |
26 |
Artificial Intelligence Corroborated By Blockchain Will Lead To an Unhackable World of MachinesSHREEYASH AMIT YENDE |
|
1 |
27 |
A Comprehensive Survey on Techniques of Reversible Data Hiding in Encrypted ImagesNILAM N. SHAIKH, PRATIBHA S. RANE, PRARTHANA M. MODAK |
|
1 |
28 |
Performance analysis of RabbitMQ as a Message BusSNEHA SHAILESH, KIRAN JOSHI, KAUSTUBH PURANDARE |
|
1 |
29 |
Smart Helmet: A Protective Headgear SystemNILESH M. VERULKAR, SWATI S. PATIL, NAMRATA A. GANDHI, KOMAL B. TODKAR |
|
2 |
30 |
A Survey on E-commerce Trends and Popularity in Indian YouthsARCHANA PATIL |
|
2 |
31 |
Study of Data Deduplication Techniques on CloudPOOJA KHARADE, ZAHEED SHAIKH |
|
1 |
32 |
An Approach to Energy Optimization in WSN Using Hybrid Leach and Bird Swarm AlgorithmKRITIKA VARMA, SAHIL DALWAL |
|
1 |
33 |
Improving Hadoop Performance by Decouple Shuffle and Reduce with MapReduceSINDHUJA.R, PRIYADHARSHINI.P |
|
1 |
34 |
Time Sliced and Priority Based Load BalancerMONIKA CHATURVEDI, PROF. DEEPAK AGRAWAL |
|
1 |
35 |
Automated Detection of Cardiac Arrest using Heart Beat Sensor and Provision of Therapy through Wearable DefibrillatorM. GNANA GURU, S. JOTHIRAJ, M. YOGARAJAN., KUMAR KANDUKURI |
|
11 |
36 |
Android App for Temperature Count with RaspberryRUCHIKA KHADATKAR, KARISHMA BOBDE, GOPAL SAKARKAR |
|
1 |
37 |
Security and Privacy Issues in Cloud Computing Environment: A SurveySRISHTI JAIN , PROF. SATPAL SINGH |
|
5 |
38 |
Design and Analysis of Compact Dual – Band slotted Microstrip Antenna for WLAN ApplicationBADISA GEYA LAKSHMI SOWJANYA, A.VANAJA |
|
1 |
39 |
Power Price Forecasting In the Smart Grid Using Differential Evolution Based SVM ClassifierRAMYA DEVI. C, AMUDHA. L |
|
1 |
40 |
A Review over LTE for Vehicular Ad-Hoc Network using IEEE 802.11pRESHMA CHHATANI, PROF. MOHD AMZAD |
|
3 |
41 |
Analysis of Different Approaches for Recognition of Road Traffic SignsRICHA JAIN, PROF. DEEPA GIANCHANDANI |
|
1 |
42 |
A Survey on Different Features and Technique over LTE-5G TechnologySHWETA CHATURVEDI, PROF. ANOOP TIWARI |
|
1 |
43 |
Review for Higher System Performance over MIMO STBC-OFDM Wireless CommunicationPANKAJ KUMAR BHARTI, DR. PARESH RAWAT |
|
1 |
44 |
Analysis of Colour Reconstruction for 3D RGB-D SystemASHISH MISHRA, DR. BHARTI CHAURASIYA, PROF. ANSHUJ JAIN |
|
2 |
45 |
A Review on Opinion Mining and Sentiment Analysis in Data MiningSONAM SISODIA, JAYSHREE BOADDH, PROF. DURGESH WADBUDE |
|
1 |
46 |
Performance Analysis of NEAHC and NEAHRC Routing Protocol in WSNRAGIBA QARI, ABHISHEK BHARDWAJ, VARSHA SAHNI |
|
2 |
47 |
A Survey on Multi-Keyword Ranked Search Scheme over Encrypted Cloud StorageSHAIKH SANIYA, SHERKAR SHILPA, KULKARNI ADITI, KULKARNI MEDHA, PROF.S.P.VIDHATE |
|
2 |
48 |
Onion Loss Detection, Automatic Roof Opening and Closing against Rain & Optimum Ventilation Providing SystemSAGAR A. PAWAR, PRADIP V. SHINDE |
|
1 |
49 |
Spreadsheet Macro Generation through Query Building ToolEKATA R. KADAM, B. R. SOLUNKE |
|
1 |
50 |
Modulo 2n±1 Adder/Subtractors for DSP ApplicationsVARSHA NARASIMHA MURTHY |
|
1 |
51 |
Comprehensive Study on Negative Effects of Mobile Phone/ Smart Phone on Human HealthASOKE NATH |
|
2 |
52 |
An Integrated Fuzzy ANP and TOPSIS Methodology for Software Selection under MCDM PerspectiveBIJOYETA ROY, SANTANU KR. MISRA |
|
2 |
53 |
Copyrights Protection Techniques:A SurveySHIVAM TIWARI, DR. NEERAJ SHUKLA |
|
1 |
54 |
Enhanced Secure Mechanism for ARP Poisoning and MITM AttackPRIYANKA LAKHANPAL , PROF. DEEPAK AGRAWAL |
|
1 |
55 |
A Framework to Prevent Sniffing Attacks Over NetworkMILKY JHA, RAGHAVENDRA KUMAR |
|
1 |
56 |
Comparison of Different Classification Techniques Using WEKA for Diabetic DiagnosisARKA HALDAR, G.PRUDHVI RAJ , S.V.S.S LAKSHMI |
|
11 |
57 |
Analysis on Image Compression & EncryptionRIDHI JAYESH SHAH, YASHASHRI SUNIL HARYAN |
|
4 |
58 |
Detection of Phishing Website Using Machine LearningRITIKA SAKPAL, SHUBHAM SHIRKE, ADITYA SHINDE, TEJAS SHENOY |
|
4 |
59 |
Accident Reporting and Vehicle Monitoring SystemSHIVANI VYAS, RAJVI SHAH, AMEY TAMHANKAR, HARSHAL VENGURLEKAR |
|
3 |
60 |
BSIOTR Info: An Android Application for College CampusABHISHEK GHATGE, AKSHAY MANAL, KEVAL AVHAD, GORAKSHNATH DAULE, VISHAL MHASE, PROF. AMOL BAVISKAR |
|
1 |
61 |
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret QuestionsSMITA CHOUDHARY, JAYWANT JAGTAP, GINNY PUNJABI, VISHAL BARDE, KRANTI CHOUDHARY |
|
3 |
62 |
Stock Market Prediction in BSE Using Long Short-Term Memory (LSTM) AlgorithmDr.Vijay Reddy Madireddy |
|
4 |
63 |
A Review of Segmentation and Object Detection Methods for Real-Time Image Processing for Detecting PedestriansMITALI MEHTA, VASVI DESAI, ROHAN GUPTA, AVANI SHAH |
|
1 |
64 |
Grammatically Correct Speech by Using Speech RecognitionVRUSHALI BHAMARE, PRIYANKA KALOKHE, KETAKI KULKARNI |
|
2 |
65 |
Emotion Based Music Player through Face Recognition SystemMOHIL PATIL, GITANJALI LABADE, VARSHA SUTAR, SAURABH PATIL, DR.B.K. SARKAR |
|
1 |
66 |
Diagnosis Support System for Lung Cancer Detection Using Artificial IntelligenceK. V. BAWANE, A. V. SHINDE |
|
1 |
67 |
A Survey on Image Processing to Detect and Count the Object using Color Differentiation ConceptVEENETHA.K.C, YOGALAKSHMI.T, VINODHA.D |
|
2 |
68 |
A Survey on Cloud Computing for Big Data ApplicationSINDHU T, VAISHALI M, SUREKA V |
|
1 |
69 |
A Machine Learning Approach to Stock ForecastingDHRUV PATHAK, HIMA KARAN KADALI, PRAYAG SARAIYA |
|
9 |
70 |
BIG DATA Analytics: A Comprehensive Study on Present and Future TrendsASOKE NATH, ANWESHA CHAKRABORTY, TRINA DUTTA, SUSHMITA MONDAL |
|
2 |
71 |
Control and Performance Analysis of Three Tank Flow Control System Using Linear & Non-Linear ControllerARNOB SENAPATI, AKASH MAITRA, SNEHANJALY BATABYAL, ABHISHEK KUMAR KASHYAP |
|
1 |
72 |
Sentiment and Intent Analysis for Business IntelligenceLALIT PATHAK , SANJANA MULCHANDANI , MAYURI KATE, KAJAL KHATWANI , SUJATA KHEDKAR |
|
5 |
73 |
A Survey: User Review Based Recommendation SystemASHISH DHASE, ARATI NALLA, AISHWARYA KALYANARAMAN |
|
1 |
74 |
SupportBot: An Artificial Agent Useful for Gathering College DetailsNIRANJANI V, NIVETHITHA K, PREETHA S, SANGEETHA S |
|
1 |
75 |
User Based Event Retrieval SystemT. ROGER JEES SMITH, P.PAVITHRA, V.PREETHI |
|
1 |
76 |
Survey of Different Load Balancing Approach-Based Algorithms in Cloud Computing: A Comprehensive ReviewMONIKA VERMA, SAURABH SHARMA |
|
1 |
77 |
Privacy Preserving By Third Party Auditing Using Frequent Itemset In Data Mining With Md5 AlgorithmD.J. HANI MARY SHENIHA, G. KRITHIGA, S. KALAIVANI |
|
1 |
78 |
Design and Implementation of Real-Time Secured Industrial Monitoring System Using IoT with an Android ApplicationSUDHA RAJESH, PAVITHRA.P, PRAKALYA.M |
|
2 |
79 |
Utilizing Business Principles for Anticipating Transaction to Prevent Money CheatsS.ARAVIND KUMAR, S.PAUL KINGSLEY, R.SANTHOSH |
|
1 |
80 |
A Productive Arrangement for Smart Card Based on Password-Authentication Using Key AgreementS. GAYATHRI, D. PAVITHRA, T. SIVARANJANI |
|
2 |
81 |
A Survey on Enhanced Social Media Spamming Detection Framework Based Upon Activity and Text AnalysisRAMYA DEVI.K, KAMESHWARAN.T, DINESH KUMAR.P, KALIMUDEEN.S |
|
2 |
82 |
Interactive Virtual Learning Environment for Information Technology AcademiaMAYURI PAWAR, ROOPANSHI PAWAR, ROHAN BHANGALE, SHUBHAM DAHIWALKAR, ABHAY PATIL |
|
17 |
83 |
Survey on Cloud Storage Integration on Mobile Application and Message Passing Using XMPP protocolA. SARAVANA PERUMAL, R. VISHNU RAJAN, M. VENKATA SATHYASAI, DR. G. UMARANI SRIKANTH |
|
2 |