S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Curvelet Image Fusion Using Decision Tree AlgorithmMUZAFAR AHMAD DAR, ASHISH SHARMA |
|
7 |
2 |
Key-Aggregate Cryptosystem for Scalable data Sharing with Time Server and Integrity Auditing in CloudstorageRUTUJA RAJKUMAR ANDHALE, PROF. SHYAM GUPTA |
|
4 |
3 |
A Survey on Social Media Based Personalized Travel Sequence RecommendationSUMIT MAHAVIR BOPALKAR, H.U.JOSHI |
|
1 |
4 |
Knowledge Management Process in ERP based Product Companies: Field ExperimentS. MALA |
|
10 |
5 |
Implementation of Robust Router Design for Area Critical ApplicationsD.VARA PRASAD, P.K. SURESH |
|
2 |
6 |
An Efficient Dynamic Authenticated Secure Routing Using Secure Elliptic Curve Cryptography in MANETV.DEEPADHARSINI, VR. NAGARAJAN |
|
2 |
7 |
Privacy-Preserving over Encrypted Data using Similarity JoinsTAMBE BHAGYASHRI, PROF. TODKARI S.V |
|
1 |
8 |
Enhanced DNA Cryptography for Wireless Body Sensor NetworksALI ABO AJEEB, AHMAD MAHMOD, BOUSHRA MAALA, AHMAD S. AHMAD |
|
5 |
9 |
Power Search Algorithm for Economic Load Dispatch Problems Considering Valve Point Loading EffectsPRAKASH A, RAVICHANDRAN C S |
|
3 |
10 |
The New Service Brokering Algorithm in Cloud Computing Based on ACOSUREKHA DIXIT, NAGENDRA KUMAR |
|
1 |
11 |
A Survey on a Novel Approach to Recommend the Places by Using User's Social Media Point of InterestSONAWANE LEENA MAHENDRA, DR. M.A.PRADHAN |
|
2 |
12 |
Personalized and Efficient Search over Encrypted Data on Cloud: A SurveySHAMAL JAMDADE, PROF. POONAM LAMBHATE |
|
1 |
13 |
Multi -Way Encryption Using Elliptic Curve CryptographyDR. NILAMBAR SETHI, BINAYAK PANDA |
|
1 |
14 |
Aspect Based Sentiment Analysis for User Generated ReviewsVAISHALI DUSANE , PROF. DR. S.A.ITKAR |
|
1 |
15 |
Leveraging SDN and WEBRTC for Rogue Access Point SecurityPROF. KANCHAN VARPE, KOMAL KHANDALE |
|
1 |
16 |
Development of Sensitivity Classification Approach for Personalized Privacy Preservation in Data Publishing (PPPDP)D.P. MANOJ KUMAR, DR. Y.P GOWRAMMA, |
|
2 |
17 |
A Study on Green Computing: Need of Technological WorldKHUSHALI GOHAR, VEDANSH DUBEY |
|
5 |
18 |
A Survey on Disease Prediction by Machine Learning Over Big Data from Healthcare CommunitiesSANTOSH S SHINDE, PROF. SHWETA JOSHI |
|
1 |
19 |
Home Security System using RFID's and Fingerprint MechanismTHAKUR RAHUL SINGH |
|
1 |
20 |
Load Balancing and its Challenges in Cloud Computing: A Review PaperSUMIT LAL, PROF. SAURABH SHARMA |
|
1 |
21 |
A Survey on Searching Trajectories by Regions of InterestPROF.VAIBHAV MUDDEBIHALKAR, AJINKYA DIWATE, SHUBHAM MANE, SHRADHA SEVADA |
|
1 |
22 |
Twitter User Social Circle Detection Using Multi-View Network StructureSNEHA RANI , PREM RANJAN, SAGAR KUMAR, CIBA TEMBHARE, SMITA KHOT |
|
4 |
23 |
Revocable Multi-Authority Scheme For Secure Data Access Control in Cloud StorageJYOTI RAVASAHEB PATIL, ASSIST. PROF. P. M. MANE |
|
2 |
24 |
Isolation and Purification of Fibrinolytic Enzyme from Microbial SourceTIBAMANSOUR, DR.ASHA SALUNKE |
|
1 |
25 |
Multimedia Data Mining-A SurveyPRACHI KOHADE, DR. K. S. THAKARE |
|
2 |
26 |
Reducing Energy Consumption in WBSNs using Statistic Test to detect Duplicated DataSALEH MASSOUD, YOUSSEF SOBH AHMAD, MOTHANNA ALKUBEILY, AHMAD S. AHMAD |
|
1 |
27 |
Review on Security Protocols in VANETYOGITA A. MORE, NILIMA P. PATIL |
|
4 |
28 |
A Survey on Two-Level QR Code for Private Message Sharing and Document Authentication Using SteganographyHARSHADA JAHAGIRDAR, HIMANGI JALGAONKAR, MADULIKA CHAUDHARI, ANJALI, ILA SAVANT |
|
1 |
29 |
Human Membrane Protein Classification Using KNN Multi Label Classifier (KNNMLC)NIJIL RAJ N, DR.T.MAHALEKSHMI |
|
1 |
30 |
Text to Speech Conversion for Vocally DisableATHARVA CHOGLE, SHWETA BAVISKAR |
|
4 |
31 |
A Competent and Speedy Symmetric Key Production with improved Latency Using Matrix Array Symmetric Key EncryptionBRAJESH KUMAR, SANTOSH KUMAR |
|
1 |
32 |
A Revolutionary Change in Education Sector: Cloud ComputingNEERAJ HARJANI , SUREN SUGHAND , TWINKLE MOTWANI , SIMRAN DEMBLA |
|
6 |
33 |
Digital Colour Image Compression using Block Truncation CodeDEV PRAKASH SINGH, DR. VINEETA SAXENA NIGAM |
|
1 |
34 |
Detection and Control of Urban Emergency Events using Social Media Big DataVAIBHAV MESHRAM, VISHAL TIWARI, MATESH DIVEKAR, SHUBHAM PAWAR, PRF. G.M. GAIKWAD |
|
1 |
35 |
A Survey on A Time-Specified Ciphertext-Policy Attribute-Based Encryption with Circuit's Technique in Cloud ComputingSURAJ LOLAGE, HEMA MANGTANI, KOMAL DONGARE, AKASH LABADE , PROF.SHIKHA PACHOULY |
|
1 |
36 |
A Study of DDoS Attacks Detection Using Supervised Machine Learning and a Comparative Cross-ValidationWEDAD ALAWAD, MOHAMED ZOHDY, DEBATOSH DEBNATH |
|
2 |
37 |
A Review Study of Cyber Security in Different Networking Dimension to Minimize Network and Data IntrusionAKHILESH NAGAR, MUKESH BHARDWAJ, APARNA SHARMA, NAGESH SHARMA |
|
5 |
38 |
Performance Evaluation of IDEA encryption model under different Fading ChannelsJAGRUTI A. PATIL, PROF. MANISH M. PATIL |
|
2 |
39 |
A Novel Approach for Resolution Recommendation for Generated TicketsPROF. V.R.GHULE, PRATIK PATIL, AMIT KUCHAN, MANGESH WAYGAND, SAI GOTETI |
|
1 |
40 |
Secure Dynamic Fragment and Replica Allocation of Data with Optimal Performance and Security in CloudASHWINI YOGESH ANIKHINDI, PROF M K KODMELWAR |
|
1 |
41 |
Elephant Vocalization Direction of Arrival Estimation under Acoustic Sensor Network with Impact of Error Rectification MethodM.DEVAKI |
|
1 |
42 |
Review on Bit Error Rate Analysis in Multicast Multiple Input Multiple Output SystemsSONAL SONAWANE, S. M. PATIL |
|
1 |
43 |
Optimal Load Balancing in Cloud Computing by Efficient Utilization of Virtual MachinesMONIKA CHATURVEDI, PROF. DEEPAK AGRAWAL |
|
1 |
44 |
A Survey on Data Protection in Cloud StorageSAKSHI NEMA, PROF. PRASHANT KUMAR KOSHTA |
|
2 |
45 |
A Survey on IoT Based Intelligent Road Traffic and Transport Management SystemsC N SIVA SUBRAMANIYAM, K.SIVARAMAN, S.SHREYAS RAMACHANDRAN, A.K.VEERARAGHAVAN |
|
1 |
46 |
Smart Lighting in Street Lights Based On IOTTANUJA MAGAR, ARTI BABAR, SUPRIYA GHATSHILE, PRAGATI JAGTAP, DEEPAK UPLAONKAR |
|
2 |
47 |
Sudoku Puzzle Detection using Image Processing Techniques and Solving: A Literature SurveyPARITOSH PUJARI, SAURABH THORAT, SURAJ THOPAT E, YASH SHAH, PRASAD KHARADE |
|
1 |
48 |
Comparative Study of Different Password Managers and Insight of Bilateral Password ManagerSHUBHAM AGARWAL, IKHLAS SHAIKH, UJJAWAL TRIPATHI, SHUBHANGI KHADE |
|
1 |
49 |
Identification System based on Biometric Concept Using Human EyeSAURABH SINGH, ARSHI KHAN, SAURABH MAYDEO, SAURABH BURANGE, PRIYEN DANG, SHIVAM SHUKLA |
|
3 |
50 |
Biometric Fingerprint based Attendance Monitoring SystemPRIYEN DANG, ANURAG SINGH, ROHAN NAYAK, SAURABH BURANGE, PRANAY RAO, CHIRAG RAO |
|
1 |
51 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the CloudTRUPTI D. GANGASAGAR, ASST. PROF. SHITAL Y. GAIKWAD |
|
1 |
52 |
A Survey on Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling ApproachMINAL PATIL, MADHAVI S. DAROKAR |
|
4 |
53 |
Sentiment Analysis Using a Supervised Joint Topic Modeling ApproachANURADHA.R.S, NATARAJAN.B |
|
6 |
54 |
Summarization and Sentiment Analysis of Social ContentBHAGYASHRI B. KAMANKAR, MANESH P. PATIL |
|
2 |
55 |
Image Steganography Methods Based on Pixel Value Differencing: Review and Proposal for Enhancing the Security of Five Pixel Pair AlgorithmNAYANA KOLHE, HARISH BARAPATRE |
|
1 |
56 |
Two Factor Based Secure Data Sharing In KIDS SystemSAYALI PATIL, NILESH WANI |
|
1 |
57 |
Physical-Layer Cryptography through Massive MIMOPROF. JYOTI RAGHATWAN, ALKA TAUR |
|
1 |
58 |
Fake Currency Detection and its associated ClassificationPRIYEN DANG, ANURAG SINGH, SAURABH MAYDEO, SAURABH BURANGE, AMEYA KASBEKAR, HARJEET MATHARU |
|
4 |
59 |
Exploiting Channel-Aware Reputation System for Packet Drop Attack Detection in Wireless Ad-hoc NetworkASHWINI PRAKASH MORE, PROF. DEEPAK GUPTA |
|
1 |
60 |
Understanding of Quality of Service in Web Services – A ReviewABHISHEK SHARMA, SWATI PATEL, BRIJESH PANDEY |
|
4 |
61 |
A Survey on Product Recommendation Systems Using Social Data and Microblogging InformationKANCHAN BAGDE, PROF. JYOTI PATIL |
|
1 |
62 |
Medical Data Sharing For Protection and Intrusion Avoidance in CloudletSNEHAL GITE, PATIL S. H |
|
1 |
63 |
A Novel Approach on Effective Implication of Object Oriented Based SoftwareSWATI PATEL, DEEPALI VERMA, BRIJESH PANDEY |
|
2 |
64 |
Review on Algorithms for Video Quality MeasurementSWATI RAJU SHINDE, PROF. DR. B. D. PHULPAGAR |
|
1 |
65 |
A Survey on Mining Query Facets for Search ResultsPOOJA SHIVAJI MEHESARE, PROF. D.V.GORE |
|
1 |
66 |
A Survey on a New Approach to Travel Recommendation Using Dynamic Topic Model and Matrix Factorization BasedHARSHVARDHAN HANMNATRAO PATIL, PROF. S.D. SATAV |
|
2 |
67 |
A Survey on Mining Algorithm to Archive High Utility Item Set Using TKO With TKU.SAKSHI KARNAWAT |
|
3 |
68 |
Review Paper on Image Compression using Discrete Wavelet Transform and Discrete Cosine TransformPOOJA SUBHASH PATIL, PROF. KAMAL NIWARIA, DR. MANISH JAIN |
|
1 |
69 |
Re-Encryption and Replication for Sharing Data on Cloud with Third Party AuditorMANOJ V. MOHITE, YOGESH S.PATIL, DINESH D. PATIL |
|
1 |
70 |
Secure Energy Efficient Routing Using Jamming To Resist Networking EavesdroppersSHEETAL MODKE, PROF. PRADNYA KASTURE |
|
2 |
71 |
A Secure Scheme against Replication Attack for Heterogeneous Sensor NetworksAMRUTA GAIKWAD, PROF. RACHANA SATAO |
|
2 |
72 |
Medical Image Modalities in Lung Cancer DetectionVIJAYALAXMI MEKALI |
|
2 |
73 |
IoT Based Health Monitoring System using Raspberry Pi and ArduinoKARTIKEE UPLENCHWAR, ADITI VEDALANKAR |
|
8 |
74 |
WSN Based Smart Power Monitoring and Controlling System for Home AutomationPALLAVI JOSHI, PROF. SARITA VARMA, PROF M S KHAN, PROF MRUNMAYI JOSHI |
|
5 |
75 |
Quantifying the Error in CLT for Accurate GRN GenerationShaik Jeelan Basha, L. Rangaswamy |
|
5 |
76 |
India-Nepal relations (1950 to present): A general overviewDr. Sucheta Gupta |
|
4 |
77 |
A Very Safe and Effective Way to Protect Privacy in Cloud Data Storage
Configurations
Pankit Arora, Sachin Bharadwaj |
|
2 |