S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
An Adaptive Approach (Optimized ABC) Algorithm using Square Odd Routing for Minimized Energy ConsumptionAKRITI SHARMA, V P SHARMA, HITESH SHARMA |
|
1 |
2 |
Survey on Continuous Eye on Authorized UserPROF.TRUPTI SURYAWANSHI, DNYANESHWAR CHAVAN, PRATIK BORATE, SURAJ YADAV |
|
3 |
3 |
Prediction of Stock Market Using Data Mining Algorithm Based on Historical PricesDR.S.RADHIMEENAKSHI, K.LATHA |
|
2 |
4 |
Literature Survey on Mobile Adhoc Networks and Routing ProtocolsMADHURI S. HIWALE, SARIKA A. KINARIWALA, SUSHMA D. GHODE |
|
1 |
5 |
A Comparative Analysis of Hyperspectral and Multispectral Image Classification TechniquesP.DOLPHIN DEVI, DR.K.CHITRA |
|
5 |
6 |
Spatio-Temporal Assessment of Vegetation Cover of Jodhpur City and Surrounding AreasS. L. BORANA, S.K.YADAV, S.K.PARIHAR |
|
2 |
7 |
Mapping and Assessment of LU-LC Features of the Jodhpur city using Geoinformatic TechniquesS.K.YADAV, S. L. BORANA, S.K.PARIHAR |
|
1 |
8 |
Honey bee based QoS routing for MANETsH.LOOKMAN SITHIC, S.GNANAM |
|
1 |
9 |
Reliable Link Based Energy Efficient Cluster Routing Scheme for Wireless Sensor NetworksH.LOOKMAN SITHIC, M.LATHA |
|
1 |
10 |
Energy Efficiency with Reconfigurable Data Architecture Line Based DisseminationH.LOOKMAN SITHIC, P.NANDHINI |
|
1 |
11 |
Trust Establishment in Wireless Sensor Network and Forwarding of Packets Using Airport Problem Based Game TheoryJ.ANGEL, T.RAMESH |
|
2 |
12 |
Survey on Linear Convolution in Different types of Multiplier and AdderRAHUL ROCHLANI, SUMIT DUBEY, ANUBHAV PANDEY |
|
1 |
13 |
A Survey on Brain Tumor Detection and Classification TechniquesPROF.NITESH DANGRE, AKSHATA SURAVSE, BHAGYASHREE KAMBLE, SHITAL BARASKAR |
|
1 |
14 |
A Survey on Smart Attendance System Based on Various TechnologiesPROF.A.D.SAWANT, ARTI DONGARE, ICHHA GILBILE, AMITSINGH THAKUR, POOJATEKAWADE |
|
1 |
15 |
Survey Paper on IEEE 14-bus System with FACTS TechnologyRAJESH KUMAR, PROF. PRASHANT GARG, PROF. BALRAM YADAV |
|
1 |
16 |
A Novel Approach for Fingerprint Liveness Detection Using Multi FeaturesMEDA SANJEEVA NAGA ABHINAY, S.ARUNA |
|
1 |
17 |
Leach- Low Energy Adaptive Over Data Communication in WSNP.SUJATHA, N.HYRUNNISHA MCA., M.PHIL |
|
2 |
18 |
A Power Proficient Using Leach Protocol in Wireless Sensor NetworkP.SUJATHA, N.HYRUNNISHA |
|
2 |
19 |
Content-Based File Sharing in Detached MANETs for Existing Social NetworkSANTOSH INCHAL , B NIKET, ANUP KALYANSHETTI |
|
1 |
20 |
A Survey on Personalized Travel Sequence Recommendation on Multi-Source Big Social MediaNEHA GOLIWAR, PROF. S. S. BOBDE, PROF. R.A.PATANKAR |
|
1 |
21 |
A Novel nearest Keyword Search Using Projection and Multi-Scale Hashing Technique in DatasetsT.LAKSHMI NARAYANAMMA, J. RAGHUNATH, T.RAMA MOHAN |
|
3 |
22 |
Privacy Preserving and Efficient Access Control Using Public Verifiable System in Cloud ComputingS.MD.TASNEEM YASMEEN, P. VASANTHI |
|
1 |
23 |
Design of an Android Application for Symptoms Monitoring of Brain Cancer PatientsSHUBHAM R, JUBY BABU, PRATIKSHA YADAV, GOURI KOLAPE |
|
1 |
24 |
User Data Classification with Web Access Behavior Analysis Using Wi-Fi HistoryD. PRIYADARSHINI, SREE DHANYA C |
|
2 |
25 |
A Collaborative Rating Analysis from Sentiment Mining for Mobile AppsDR. R.PRIYA, SNEHA. R |
|
2 |
26 |
Energy Hole Evolution for Continuous Data Gathering in WSNPROF.KANTILAL SHAMLAL CHANDRE |
|
2 |
27 |
Preventing Cyber Crimes by Using Data Mining TechniquesPROF. RUKAIYA SHAIKH, AMAN MEMON, MANOJ KUMAR, ISMAEIL PATHAN |
|
4 |
28 |
Improving Energy Efficieny of Wireless Sensor Networks through Modified Localization AlgorithmsN.MAHESH, S.VIJAYACHITRA |
|
3 |
29 |
A Survey on Proportional Analysis of Tools for the Revealing of ARP PoisoningPRIYANKA LAKHANPAL, PROF. DEEPAK AGRAWAL |
|
1 |
30 |
Electrical Appliances Control and Automation Using Wi-FiK. NAVEEN KUMAR, P. SURENDRANATH, G. MAHESH KUMAR |
|
2 |
31 |
Design of Transpose Form Block Fir Filter for Reconfigurable ApplicationsB. PALLAVI, D. KRISHNA NAIK, S. RAVI KUMAR |
|
1 |
32 |
Efficient Framework for Semantic Query Search Engine in Large-Scale Data Collection for Health Information ExchangeN. RAJA MOHAN REDDY, B. NAGALAKSHMI, A. CHANDRA SEKHAR |
|
7 |
33 |
Enhancing Degraded Handwritten Document Image using Morphological OperatorSANGEETHA.R, RAJKUMAR.T.C |
|
1 |
34 |
A Prototype Model on CBMIR Using Canny Edge Detection and Neural Network for Visual SearchDR. JASMINE SAMRAJ, JEEVITHA K. |
|
2 |
35 |
Secure & Efficient Cloud Storage Middleware for Mobile Cloud ComputingAKANKSHA R. PATIL, VAIBHAV V.SAWANT |
|
1 |
36 |
Design and Development of Security Framework for Data Storage in Public Cloud ModelARCHANA PATEL, PROF. DEEPAK AGRAWAL |
|
1 |
37 |
Named Entity Recognition System for Punjabi Language TextSHAVI JUNEJA |
|
1 |
38 |
A Review on Globalize Internet of Things (IoT) and ApplicationsPROF. GAJANAN P. BABHULKAR, PROF.PRACHITI S.PIMPLE |
|
1 |
39 |
Named Entity Recognition System for Punjabi Language Text using Hybrid ApproachSHAVI JUNEJA |
|
1 |
40 |
Two Layered Privacy Architecture for Big Data FrameworkNAMAVARAM VIJAY, AJAY BABU SRIRAMOJU, RAMESH GADDE |
|
3 |
41 |
Orthodontic Treatment Simulation Using Image Processing TechniquesMANJUSHA ABHIJIT SANKE |
|
1 |
42 |
Survey on Noise Removal in MRI Brain Image for Various FiltersBIJETA RAJ, PROF. ANIL KHANDELWAL |
|
1 |
43 |
An Efficient Nash Auction Euilibrium Model for Resource Provision in Cloud SystemsBARIKI LEELAVATHY, ARVIND T, R.HARI SNGH |
|
2 |
44 |
Mechanism of Privacy Protection in Personalize Web SearchPROF. HANGARGEKAR AJINKYA SURESH, PROF. HOLAMBLE SUSHIL NATHRAO |
|
1 |
45 |
Encrypted Cloud Data with Secure and Dynamic Multi Keyword Ranked Search SchemeMD.AADIL ANSARI, SARIM SHAIKH, S.PATIL |
|
1 |
46 |
Towards Efficient Framework for Semantic Query Search Engine in Large-Scale Data CollectionG.SNEHA, KANTE RAMESH |
|
2 |
47 |
Security and Privacy Issues in Cloud Computing Environment: A Survey PaperNIDHI MISHRA, PROF. PRADEEP TIWARI |
|
1 |
48 |
Survey on Real Time Tracking of Malicious Activities Occurring Internally on the SystemMASHHOOD SAYED, SUPRITI SINHA, RIA MATAPURKAR, DANISH SHAIKH, PROF. KANCHAN WANKHADE |
|
2 |
49 |
Survey on Security issues of Fog ComputingRAHUL NEWARE, NISHI WALDE |
|
1 |
50 |
Convolutional Neural Networks based Sign Language RecognitionKARTHICK ARYA, JAYESH KUDASE |
|
2 |
51 |
Breast Cancer Detection by Kirsch AlgorithmHARDIK ANIL PATIL, AKASH RAJENDRA PATIL, SANKET SANJAY MHATRE |
|
1 |
52 |
An Arduino Based Systematic Approach to Trap CarnapperVISHNU C R, SURAG M T, C. RASEEK |
|
1 |
53 |
EscrowChain: Leveraging Ethereum Blockchain as Escrow in Real EstateNEEL KIRIT, PRIYA SARKAR |
|
1 |
54 |
A Survey on Auto-Speech Casting System for Programming IDE PlatformPOOJA BARADE , MAHESH CHANDE , NEHA DEBADWAR, VARSHA MAHAJAN, PROF.SONALI PATIL |
|
1 |
55 |
Survey on Voice Based Application as Medicine Spotter For Visually ImpairedSNEHAL HODAGE, SHWETA MANGADE, PRIYANKA TOUTI, KOMAL YADAV, PROF. MANGAL KOTKAR |
|
1 |
56 |
Overview and Analysis of SAP ERP SystemAKASH RAJENDRAKUMAR PATIL, SANKET SANJAY MHATRE |
|
1 |
57 |
Study of Intelligent Diagnosis in MachinesVAISHNAVI BADAME, CRYSTAL CHINDWIN, MUGDHA JAMADAGNI, KALYANI NAGARKAR, VINA LOMTE |
|
1 |
58 |
A Shoulder Surfing Resistant Graphical Authentication SystemPALLAVI JHA, SUPRIYA PHAPALE, DHANSHREE KHOPADE, NITIN KALE, MAYUR MURUMKAR |
|
1 |
59 |
Driver Identification Tracker and Vehicle Security System Using Arduino UnoSAURABH SINGH, PRACHI SINGH, PRANAY RAO, HARJEET MATHARU, NISHANT KUMAR |
|
1 |
60 |
A Study on Big Data ComputingVRIND GUPTA, AMAN CHANDOK |
|
1 |
61 |
A Survey on an Efficient Hybrid Algorithm for High Utility Item Set in Parallel Mining Using Tku and Tko.NISHANT SINGH, HARSHIT KUMAR, TANIMA SAHA, DEEPANSHU BHINDA, P.S. RASKAR, P.N RAILKAR |
|
1 |
62 |
Prescription of Food and Medicines Using Neo4jSIDDHESH INAMDAR, PRANAV SAHU, YASH DHOLAKIA |
|
2 |
63 |
Detecting Stress Based on Social Interactions in Social NetworksARGADE MANGAL, GUNJAL AISHWARYA, JADHAV VARSHA, RAJGURU SHILPA, PROF. POKHARKAR S.T |
|
1 |
64 |
Survey on Product Recommendation for Cold-Start using Microblogging InformationSANGALE SULOCHANA, DHOKANE GOKILA, GADE VIDYA, PROF TUPE K.A |
|
1 |
65 |
Efficient Secured Dynamic Searching Technique in Cloud ComputingG SHRUTHI, S S LAKSHMI LAVANYA M |
|
1 |
66 |
Design of 64 Bit Low Power Reversible ComparatorB. KEERTHI PRIYA |
|
2 |
67 |
A Survey on Landslide Detection Using Sensors and an Android ApplicationPRIYANKA BHOSALE, JUI KALE, VAISHNAVI NAVALE, POONAM PAWAR, PROF. NILIMA CHAPKE |
|
1 |
68 |
A LabVIEW Based Optimization of AESAKANSHA ASWANI, PROF. SACHIN MALVIYA |
|
2 |
69 |
Secure Routing For Cooperative Heterogeneous NetworkPATIL MADHURI SHIVAJI, PRO.S.P.PATIL |
|
1 |
70 |
Smart Public Transport System using Android ApplicationHEMANT SHINDE, AMRUTA SHETE, ANJALI KAPARE, KSHITIJA SALKE AND SUCHITA BHOSALE |
|
1 |
71 |
A Survey on Activity Planner using OpenUI5 FrameworkSUHAS BHATTU |
|
1 |
72 |
Survey on Smart Garbage Collection System Using IOTHEMANT SHINDE, MANDAR DIWAKAR, NACHIKET SALVI, RAVIRAJ SARDE, SHANAWAZ SHAIKH |
|
1 |
73 |
Egocentric Activity Recognition using Combined SVMkNN ClassifierK.P.SANAL KUMAR, R.BHAVANI |
|
1 |
74 |
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid CloudsRASHMI RAJENDRA KURKURE, MADHURI ZAWAR |
|
1 |
75 |
PHP Syntactic Analyser and Comparer with Document ComparisonMANOJ SABNIS, NIDHI SHAH, SUKHADA KHATU, RUCHA GUNTOORKAR, RIYA LALWANI |
|
3 |