S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
An Improved Approach of Text Steganography in Application with Rotational SymmetryB.RAMAPRIYA |
|
1 |
2 |
Estimation of Nitrogen and Chlorophyll Contents of Leaves Using SVMSHRADDHA SAHURKAR, PROF. B. J.CHILKE |
|
1 |
3 |
Accessing Secured Public Data Storage Using Secure Index in Cloud Computing EnvironmentM RAJASEKAR, DR M KARTHIKEYAN |
|
1 |
4 |
A Survey on Various Underwater Image Enhancement TechniquesSHRINIVAS SHIRKANDE, DR. MADHUKAR J. LENGARE |
|
3 |
5 |
Machine Learning Approach For Spam Tweets DetectionJAGTAP KALYANI LAXMAN, PROF.B.A.KHANSOLE |
|
1 |
6 |
NRE-AODV Routing Protocol to Maximize Network Lifetime of MANET Based on AODVK.MARIAPPAN, DR.M.KARNAN |
|
3 |
7 |
A Survey on Literature Review of the Usability of HCISHUBHANGI T RAUT, DR. ABHA KHANDELWAL, DR. S. B. KISHOR |
|
1 |
8 |
Performance of OFDM system for AWGN, Rayleigh and Rician ChannelPAYAL DUGAD, ASHOK KHEDKAR |
|
1 |
9 |
Minimizing Stealthy Denial of Services in Cloud ComputingDIPALEE BALU RAUT, PROF. AMRIT PRIYADARSHI |
|
3 |
10 |
Review on Text Detection, Extraction and Recognition from Images and VideosS.SHIYAMALA, DR.S.SUGANYA |
|
3 |
11 |
A Survey of Data Mining Clustering AnalysisSUMITHA MUNIAN, PAULRAJ ANANTH K.J |
|
5 |
12 |
An Medical Healthcare Information Sharing With Service Based Cloud EnvironmentS SANTHIYA, DR M KARTHIKEYAN |
|
1 |
13 |
A Review on Healthcare InformaticsDR. G. T. PRABAVATHI, M. SHANTHIPRIYA |
|
1 |
14 |
Wind Turbine Monitoring and Diagnosis Using CANYOGESH BOLEGAVE, PROF. M. U. INAMDAR |
|
1 |
15 |
Privacy Preserving for Data Perturbation Using Cryptography TechniqueA.MALATHI, DR.M.MALATHI |
|
2 |
16 |
A Blind Image Quality Assessment for Visual Quality Perception to Estimate the Quality of the ImagesK. GIRISH CHANDRA, DR. B. PRABHAKARA RAO |
|
1 |
17 |
Performance Analysis of MF Receiver: ReviewBIMLA PANDEY |
|
1 |
18 |
A Survey on Security and Privacy Issues In Cloud ComputingG.PRAVEEN KUMAR, S.KAVITHA |
|
1 |
19 |
Improved EMG Upper Limb Classification FeaturesP.SWETHA |
|
1 |
20 |
Throughput Maximization Using Spatial Reusability in Multi-Hop WirelessPRERNA BORANE, V. K. PATIL |
|
1 |
21 |
Design of Compact Wideband Key-slotted Circular Microstrip Patch Antenna with partial Ground PlaneYEESHU RELHAN, YOGITA |
|
2 |
22 |
Hybrid Technique for Image Compression Using SPIHT and BCH CodesS.VENKATA SAI PRASAD, DR.K.SATYA PRASAD |
|
1 |
23 |
Survey on Artificially Intelligent used in ChatBotA.MARI KIRTHIMA |
|
3 |
24 |
Extraction of Vegetation Regions in High Resolution Satellite Data Based On Spectral Indices and Marker Controlled Watershed SegmentationP.SWATHIKA, A. RAVI RAJA |
|
3 |
25 |
Anti Phishing Website Using Visual CryptographyMANASI ASHOKRAO DESHMUKH, PROF. R. W. DESHPANDE |
|
1 |
26 |
Automated Irrigation System Based on Arduino Controller Using SensorsSARIKA RAKSHAK, PROF. R. W. DESHPANDE |
|
1 |
27 |
Sarcasm Detection on Twitter using Feature-Based ApproachKHAN SHEHLA KULSUM, NAGESH KAMBLE |
|
2 |
28 |
A Survey on Data De-Duplication Methods in Cloud Storage SystemS. LALITHA, N. KAMAL RAJ |
|
1 |
29 |
Shape based Object Classification using Knowledge Vector CodeDR G D JASMIN |
|
1 |
30 |
Multi-Purpose Smart Card- G CardSANJANA.S.U. |
|
1 |
31 |
A Secure Data Storage and Sharing Framework Using Specialized Key in CloudPOOJA SHASHANK POL, PROF. AMRIT PRIYDARSHI |
|
1 |
32 |
Data Hiding in Digital Video for Authentication and Data SecurityNEHA GIRADKAR, DR. SMITA A. NAGTODE |
|
1 |
33 |
A Systematic Approach for Classification of Knee Osteoarthritis Using PNN AlgorithmCHENNUBOINA SOWJANYA |
|
1 |
34 |
Design and Development of Intrusion Detection System for Internet of ThingsTEJAS M. MEHARE, PROF. SNEHAL BHOSALE |
|
1 |
35 |
Analysis of Malware Propagation in Large Scale NetworkANKITA SURESH MANE, PROF. BERE S.S. |
|
2 |
36 |
A Survey on Medical Image Classification TechniquesMANASI KALEKAR |
|
2 |
37 |
A Study on Six Senses of Cognitive ComputingN.SUNDARESWARAN, A.D.C. NAVIN DHINNESH |
|
2 |
38 |
Heart Rate and Respiratory Rate Measurement Using Image ProcessingS.S.LOKHANDE , BINU K NAIR |
|
1 |
39 |
Real - Time Hybrid Contourlet, DCT & SVD Algorithms for Digital Image watermarking, Geometric Applications and Noise AdditionVENKATESWARLU ANANTHANENI, DR. USHA RANI NELAKUDITI |
|
2 |
40 |
A Study on Six Senses of Cognitive ComputingN.SUNDARESWARAN, A.D.C. NAVIN DHINNESH |
|
1 |
41 |
Review Paper on FIR Filter based on Vedic Multiplier and Kogge Stone AdderSEEMA PATIDAR AND PROF. ALOK KUMAR |
|
1 |
42 |
Design and Implementation of Power Efficient Linear Feedback Shift Register for BIST using VerilogAKHILA K, KARUNA N, KAVYA C, YASHA JYOTHI M SHIRUR |
|
2 |
43 |
Block Truncation Coding for Image using Bit Map Technique for 4×4 Block SizeAMIT KUMAR, PROF. NAVNEET KAUR |
|
1 |
44 |
Mobile to Mobile Communication Using Wi-FiJITESH R.SHARMA, M.M.JADHAV |
|
1 |
45 |
A Novel Low-complexity Multiple-input Multiple-output (MIMO) Detector modified for Single-Carrier Frequency Division-Multiple Access (SC-FDMA)V VENKATA SIVA MOULI |
|
1 |
46 |
Discussion of Different types of Noise Removal by Median FilterPALLAV PARMAR, YASHPAL YADAV, AAKANSHA WASNIK |
|
1 |
47 |
A Hybrid Approach for Image Compression using HAAR Wavelet TransformANIL KUMAR MALVIYA, PROF. ARUN KUMAR |
|
1 |
48 |
Survey on Automatic Intrusion Recognition and Tracking for Security SystemsS.S. LOKHANDE, GIRIJA RAJENDRA PANDHARE |
|
4 |
49 |
Systematic Review on Dealing Imbalanced Data –A Machine Learning ApproachSUPRIYA INDUKURI, SUGUNA KANUMURU, SOUNDARYA DANDU, ADINARAYANA SALINA |
|
4 |
50 |
A Study of Big Data Mining Techniques Used to Improve the Performance of Large Data ProcessingG.SUGANYA MCA., |
|
1 |
51 |
Power Efficient Destination Address Generator of Direct Memory Access Controller in Multiprocessor SoCKRITIKA M.SHARMA, AISHWARYA.A, YASHA JYOTHI M SHIRUR |
|
1 |
52 |
Generating Captions for Images Using Multimodal Neural NetworksDHOOMIL SHETA, PARTH PAREKH, NISHANT SHAH, RUTVIK PAREKH, MANAN SHAH1, PROF S. C. SHRAWNE |
|
3 |
53 |
Rainfall Forecasting Using Gaussian Family of Generalized Linear RegressionBHAKTI NARVEKAR, JAY TORASAKAR, CHINMAYA KORE |
|
38 |
54 |
WI-FI enabled Mobile and USB data transfer.SHRUTI RAMANI |
|
2 |
55 |
Digital Menu Card for Restaurant Using Microcontroller 8051and CAN ControllerNITHIN NAIR, VISHAAK NARAYAN, CHAITYA LODAYA, VIJAY JOSHI |
|
2 |
56 |
A Comparative Analysis of Apache hive based on MapReduce and Impala based on distributed query enginePRASAD MITKARI, RUTUJA BANSWAL, AKSHATA SIRSAT, PROF. DAIVASHALA DESHMUKH |
|
5 |
57 |
Distanced Based Routing For Wireless Sensor NetworkRITESH GUJARKAR, PROF. B.J. CHILKE |
|
1 |
58 |
A Novel Efficient Graph Based Model for Content Based Image RetrievalPARAG V.YELORE, S. S. KEMEKAR, PROF. P. R. LAKHE |
|
1 |
59 |
Design of an 8-Bit Array for Client Server Communication for Hash List ArchitectureSHIFALI R. PANDE, PROF. R. H. DESHMUKH |
|
1 |
60 |
Smart School Bus for Children Transportation Safety Enhancement with IOTP.AMBEDKAR, P.SURESH BABU |
|
1 |
61 |
Secure Online Polling System Using Visual CryptographySWATI YOGESH SHINDE, PROF. AMRIT PRIYADARSHI |
|
1 |
62 |
Survey on Data Security Approach in Dynamic Multi Hop CommunicationDR.S.A.UBALE , ANURADHA KHARE |
|
3 |
63 |
A Ranking Model for Instance and Feature Selection Techniques for Improving Bug LocalizationC.S.DEEPTHI, P.GANGADHARA |
|
3 |
64 |
A Hybrid Scheme to Obtaining Low Latency and Low Power Consumption for NoCsV VENKATA SIVA MOULI |
|
1 |
65 |
Two-Factor Data Security Protection Mechanism for Cloud Storage SystemPRIYA J. KHINDRE, SHITAL Y. GAIKWAD |
|
1 |
66 |
Analysis of Big Data in the Data MiningS.SATHIYAKALA JAYAKANTHAN |
|
1 |
67 |
Automated Framework for Skull Damage Detection and Repair Using KNN and Template Matching MethodsNILESH T. GONJARE, DR. RAJENDRA S. KANPHADE, PROF. SAGAR V. JOSHI |
|
2 |
68 |
A Study and Comparison of Wired, Wireless and Optical NetworksHIMANSHU JHA |
|
1 |
69 |
A Survey of Drowsiness Detection System for DriversDR. V. K. KADAM, A.A. SHIRSATH |
|
5 |
70 |
Textual Notifications Using Node.JS and Cloud AntHASEEBA YASEEN, RAKHEEBA TASEEN |
|
1 |
71 |
Face Recognition Techniques: A SurveyVISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA |
|
14 |
72 |
Examine the E-Mail Spam Detecting and Email Spam Filtering TechniquesV.CHARUMATHI MCA, S.THIRUMAL MCA, MPHIL. |
|
2 |
73 |
A Survey on SSO (Single Sign-On) Mechanism for Mobile AppsD. S. BARAVADE, S.A.LAKADE, V.C. DESHMUKH. |
|
4 |
74 |
Learning Search Tasks in Queries using K-meansAHILYA SATHE, PROF. DEEPAK GUPTA |
|
1 |
75 |
Providing Data Security by Hidding Large Amount of Data Using SteganographyKINGSLY.P, AKILA.R |
|
1 |
76 |
Evaluation of Secure Streaming of Files in Cloud EnvironmentNEMI RISHI |
|
1 |
77 |
Securing Vehicular Communication through Trust Management Scheme in VANETSK. KALYAN KUMAR, M.VIJAYA KANTH M.TECH,(PH.D) |
|
1 |
78 |
Simulation and Performance Analysis of a Metamaterial based Dual band Monopole Antenna using Rectangular Complemetary Split Ring Resonator in the Ground plane for GSM900 and Wi-Max ApplicationsMR. PRASANNA PAGA, DR.H.C.NAGARAJ, DR.T.S.RUKMINI |
|
1 |
79 |
Web Mining Using Lexical Chain with Interactive Genetic AlgorithmJYOTI S. PACHARE |
|
1 |
80 |
Web Services Hash Table based Automation TestingCHETAN PHALKE, PROF. K.D.BAMANE |
|
5 |
81 |
Measurability, Adaptability and Efficiency in Data Center Network using Space ShufflingVANISHREE M L |
|
1 |
82 |
Comparative Analysis of FIFO and RED QUEUE ALGORITHM for Congestion Control in MANETMEHAJABEEN FATIMA, NIVEDITA KHARE |
|
1 |
83 |
A Chord Based Decentralized Secure Service Discovery on Peer to Peer NetworksM.SUDHA, R.P. SATHIYA PRIYA |
|
1 |
84 |
Authorization in Data Access User Behaviour Profiling With Duplicate Check Measures in Social NetworkDR. V.VIJAYADEEPA, D.DEEPIKA |
|
1 |
85 |
Collision and Broadcasting Delay Management System in 5G Multimedia NetworksDR. V.VIJAYADEEPA, J.ABIRAMI |
|
1 |
86 |
A Review of Channel Estimation Techniques over MIMO OFDM SystemURMILA SHAH, PROF. HARDIKA KHANDELWAL |
|
1 |
87 |
MR Image Enhancement for Extra Axial Haemorhages ClassificationIQRA RIZVI, NARAYANAN KALLINGAL |
|
2 |
88 |
Domain Based Sentimental Analysis using Naïve Bayes Classification over TwitterGARGI, TAPAS KUMAR |
|
1 |
89 |
Heart Disease Risk Prediction using Pre-processing and Classification of Patients DataK PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA |
|
6 |
90 |
Survey on Brain Tumor Identification Using Segmentation and MRI ImagesP.NARENDRAN, R.DEEPA |
|
1 |
91 |
A Study on Big Data Mining - Concepts, Platforms, Issues and Challenges, Future ScopePEBILA SHANI.S, PRICILLA.S |
|
1 |
92 |
PSO Algorithm Based Reactive Power Optimization Using Matlab ProgrammingNAVEEN KUMAR, DEEPAK KUMAR GOYAL, AP MISRA |
|
1 |
93 |
Optimal and Fast Health Data Clustering Using Hybrid Meta Heuristic AlgorithmV. SHANU, S.VYDEHI |
|
1 |
94 |
A Novel Integrated Method for Detection of Salient Regions in an Image using HDCT and Local Spatial Support by RegressionMD.CHANDINI, DR.B.PRABHAKARA RAO |
|
2 |
95 |
Customer and Employee Perception towards Internet Banking Risk AssessmentDR. MINAKSHI D. BHOSALE |
|
2 |
96 |
Classification
and Feature Extraction in Artificial Intelligence-based Threat Detection using
Analysing Methods
Sakshi Sharma, Natasha Dutta |
|
5 |
97 |
Investigation and Evaluation of Strategic
Approaches Critically before Approving Cloud Computing Service Frameworks
Pankit Arora, Sachin
Bharadwaj
|
|
3 |