S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
A Memory Scheduling Algorithm for Multi-core SystemsHYEON-JU YOON |
|
2 |
2 |
A Survey on Classification and Analysis of Chemical Similarity Search in Large DatabasePRADIP A. SARKATE, PROF. A.V.DEORANKAR |
|
1 |
3 |
A Rule Verification and Resolution Framework for Smart BuildingsJAYASHREE S. SOMANI, PROF. V. L. KOLHE |
|
1 |
4 |
Comparison of ICA Non-gaussianity Methods Using Performance Metrics as Correlation Coefficient, Average Execution Time and Computational SpeedSUPRIYA S. ANKUSHE, DR. DHARMPAL DOYE |
|
2 |
5 |
A Literature Survey on Adaptive and Effective Approach for Mobile Wireless Network with Dynamic Cluster Head SelectionVIDYA SHREE K.S, SHRADDHA C |
|
1 |
6 |
Artificial Intelligence in Predicting StrokeSUSHMITHA SURESH, D KHASIM VALI |
|
4 |
7 |
An Efficient Irrigation System with Environmental Data Analysis Using SVM TechniquesDR.M.RAMESHKUMAR, RAMYA.G, |
|
1 |
8 |
Smart Agriculture Monitoring Using Environmental Data Analysis of Support Vector Machines with Weather PredictionSATHYA RAMESH, A.N.KARTHIKEYAN |
|
1 |
9 |
Scalable and Protected Distribution of Delicate Fitness ProceedingsS.PUSHPAVALLI., P.KAMARAJAPANDIYAN |
|
1 |
10 |
An Overview of Security Techniques for Web ApplicationsFATIMA MULLA, VARSHAPRIYA J N |
|
1 |
11 |
Monitoring of Temperature and Humidity of Remote Place using Cloud ComputingMOHD.SADIM, DR. R. K.SHARMA |
|
1 |
12 |
BLE: BluePrint Finder through Android ApplicationSHASHIDHARA D, POORNIMA M |
|
1 |
13 |
Segmentation of Lung Region in CT ImageTHEJASWINI S. B, DR. NAVEENA C |
|
1 |
14 |
Ontological Information on Tumor Knowledge Management Using Text Mining TechniquesP. JYOTSNA, PROF. P. GOVINDARAJULU |
|
1 |
15 |
Network-based Spam Detection and Blocking Framework for Reviews in Online Social MediaHASNA MOHAMMED P. K, JITHA P. B |
|
1 |
16 |
PAPR Reduction of ODFM by using Shifting Null Subcarriers Among Data Subcarrier &Partial Transmit SequenceUDDHAV SHID, R.R.JAGTAP |
|
2 |
17 |
Development of OFDM based Cooperative Communication System for Mitigation of Effect of Carrier Frequency offsetANIL M. JADHAO, DR. ASHOK A. GHATOL |
|
1 |
18 |
Optimizing Handover with MIH in the New Generation Networks systemsSMKM ABBAS AHMAD, SYED UMAR, DR. VALASANI USHA SHREE |
|
2 |
19 |
With Insensitivity of Fuzzy C-Means improvising the SEP Routing ProtocolMD CHAN BASHA , SYED UMAR , SMKM ABBAS AHMAD , DR. VALASANI USHA SHREE |
|
1 |
20 |
Intelligent Realy Based Smart Mode Communications Over Mobile Adhoc NetworksA.ANJALI, M.KIRITHIKA DEVI |
|
1 |
21 |
A Review on Robust Image Transmission with OFDM over an AWGN ChannelYOGITAK. SOSE , PROF.S. P. AWARE |
|
1 |
22 |
Efficient File Resource Allocation Protocol for Lowest Average Query Delay in Mobile Adhoc NetworksD.MYNUDDIN, P. VASANTHI, DR. A.L. SRINIVASULU |
|
1 |
23 |
Classification of Sonar Images Using Neural Network Algorithm: A ReviewPALLAVI RAMAWATAR PARTANI, HEMANT M. BARADKAR |
|
3 |
24 |
The Internet of Things for Healthcare: Applications, Protocols, and SecurityDURGA KINGE, PROF. S.K.GAIKWAD |
|
1 |
25 |
Design of Low Power IC Clock TreeJAWAAZ AHMAD |
|
1 |
26 |
Dazzle Signature with Fractional Key Descriptor for Cloud ComputingGARIMA CHAUCHAN, PARUL KHULLAR |
|
1 |
27 |
A Survey on Protecting Virtualized Infrastructure in Cloud using Amplified Security TechniquesPRIYANKA, DEEPIKA GOYAL |
|
1 |
28 |
Review On Enhanced Counter Measure for Web Site Vulnerabilities with Amplified AlgorithmRASHMI, DEEPIKA GOYAL |
|
1 |
29 |
A Review on Attribute-Based Encryption based Integrity Auditing for Secure Outsourced Storage in CloudSALONI ATRE , MAYANK NAMDEV |
|
1 |
30 |
Monitoring and Controlling Of Poultry Farm Using IOTARCHANA M P, UMA S K, RAGHAVENDRA BABU T M |
|
5 |
31 |
A Review Paper on MERN Stack for Web DevelopmentPRAGATI BHARDWAJ, DR DINESH KUMAR |
|
2 |
32 |
Review on Document Clustering Using K-Means over HadoopMANISHA AGRAWAL, NISHA PANDEY |
|
1 |
33 |
Advanced Web Penetration Testing Using Kali LinuxSUBARNA PANDA, BOKOBRI LEKPELI KOISSY FRANCK OLIVIER |
|
1 |
34 |
Location Aware Query Suggestion Using Baseline and Partition Based AlgorithmsMANDURI SOMASEKHAR, A.CHANDRASEKHAR, J.RAGHUNATH |
|
3 |
35 |
Transaction Confirmation in Bitcoin BlockchainRAJANI KODAGALI, PROF.ANAND PASHUPATHIMATH |
|
2 |
36 |
Review on Accessible Shopping System for Blind and Visually Impaired IndividualsPRIYANKA KARANDE, PROF. JOGDAND S. V. |
|
1 |
37 |
Survey on Facial Expression Recognition and ApproachesANUPATHRA, RAJAKUMAR |
|
1 |
38 |
Intelligent Channel Aware Malicious Free Data Forwarding Scheme Over Wireless Sensor NetworksSHIPHRAH SHARON JAKKULA, T. SUNITHA |
|
1 |
39 |
Energy-Efficient Management In Cognitive Radio Sensor Networks With Quality-Based ActivationMARGAM SUMA, V. VIKAS |
|
2 |
40 |
An Anti-Phishing Framework Based On Visual CryptographyRAZEEM MUSTHAFA V, SUBARNA PANDA |
|
1 |
41 |
Brain Tumor Segmentation Using K-Means Clustering and Fuzzy C-Means Algorithms and Its Area Calculation and Disease Prediction Using Naive-Bayes AlgorithmSONALI MUKUND CHORE, KALPANA MALPE |
|
1 |
42 |
Text-Attentional Convolutional Neural Network for Scene Text DetectionANKITA WANKHADE, KALPANA MALPE |
|
1 |
43 |
A Hybrid Daubechies DWT based Approach for Multiple Image Video WatermarkingGARIMA BHARGAVA, ARUN JHAPATE |
|
1 |
44 |
Cloud Based Secure Document Sharing and Access Control for Corporate UserKANCHAN S. GAJGHATE, PROF. R. V. MANTE, DR. K. P.WAGH |
|
1 |
45 |
Performance Analysis of DOSN Based on Privacy Preserving and Information SharingNIKITA V. GHODPAGE, PROF. R. V. MANTE, DR. K. P. WAGH |
|
2 |
46 |
Sales Forecasting using Linear Regression and Support Vector MachinePINKI, SWATI GUPTA |
|
1 |
47 |
Diabetes Prediction using Linear Regression, Decision Tree & Least Square Support Vector MachineVAISHALI, NISHA PANDEY |
|
1 |
48 |
VANET based Self Adaptive Prioritized Traffic Signal ControlSHAIKH SHARIQUE AHMAD, PROF. HIRALAL SOLUNKE |
|
1 |
49 |
Analysis of Convex Hull's Algorithms and It's ApplicationRASHMI KULKARNI, BHAVANI K |
|
2 |
50 |
Creating Secrets Out of Packet ErasuresSHEETAL MODKE, PROF. PRADNYA KASTURE |
|
1 |
51 |
Enhancement Technique Use for Security of Digital Data in Mobile DevicesNITESH PATIL, AKSHAY KULTHE, KIRAN NAGARKAR , RUPESH SHINDE |
|
2 |
52 |
A Ranking Approach to Extracting Relevant Answer for QA SystemAJINKYA RAMCHANDRA UGALE, V.S WADNE |
|
1 |
53 |
Face Identification and Recognition Using Facial Skin MarksSUDHA MAGDUM, DR PRASHANT P. PATAVARDHAN |
|
1 |
54 |
Automation of Light and Water Control SystemSNEHAL SONAWANE, MANISH DHILE, SIDDHI KATTA, PROF.R.D.KOMATI |
|
1 |
55 |
Survey on Cloud Computing and Security IssuesRAJESWARI, VINITHA R, GREESHMA N |
|
3 |
56 |
An Efficient VLSI Architecture for Data Encryption Using AES Algorithm and Its FPGA ImplementationAKARSH B G, DARSHAN K S, DHEERAJ SHRIDHAR HARIKANT, GIRICHANDRA M TARIKERI, AKALPITA KULKARNI |
|
2 |
57 |
Hadoop MapReduce Authentication and PrivacyPRAJWAL.M.H , PUNEETH.H.V , SUKRUTH.R , CHETAN KASHYAP , RAGHAVENDRA BABU .T.M |
|
2 |
58 |
An Arduino Based Smart Meter for Demand Side Management of Electrical Load Using Real-Time Pricing.DR. JYOTI KOUJALAGI, NADEEM, FATHIMA SHIREEN |
|
1 |
59 |
Vital Parameter Monitoring for Health through IOT Using Biosensors and Medicine BoxRUCHI D. VYAWAHARE, PROF. S.P.TONDARE, PROF. DR. S.P. GAIKWAD |
|
1 |
60 |
Survey on an IOT Based Environment Monitoring System for Smart IndustriesMRUNALI PAWAR, PRAJAKTA WARGHADE, PROF. V.S. KARAMBELKAR |
|
2 |
61 |
Artificial Intelligence and Its Associated ApplicationsPRIYEN DANG, AKASH SONI, RAMESHWAREE KASAR, PRASIKA NAGVEKAR, SOHAM THAKAR, YASH SHAH |
|
1 |
62 |
IoT and GSM Based Smart Security SystemsHAREETA MALANI, SANTOSH YADAV |
|
1 |
63 |
Group Attendance Management System Using Face DetectionANJITHA GEEVARGHESE, DIVYA C, LEKSHMI SASEENDRAN, SHIFA SHAMSUDEEN, SITHU UBAID |
|
1 |
64 |
Medically E-Prescription Diagnosis IntegrationOMKAR MALWADKAR, VISHWAS LATKAR, SUHAS JAGDALE , SUYASH MULE, PROF. PRIYANKA KEDAR |
|
1 |
65 |
Health Related Prediction and Fraud Detection in Health Care System using Data MiningAPARNA KALASKAR, APARNA SHINDE, POOJA BALWADKAR, MAYA BRAMHANE, RESHMA PAWAR |
|
2 |
66 |
Smart Water Management Using PLC & SCADAPROF. MRUNALINI BHANDARKAR, PRANALI BHALEKAR, POONAM BORHADE, SAYALI CHAUDHARI |
|
1 |
67 |
Integration of Renewable Energy into Smart Power Supply System using Solar CellsPROF. MRUNALINI BHANDARKAR, KALYANI KADAM, NIKITA KADAM, SAURABH GANGALE |
|
1 |
68 |
AESC Technique for Scalable Face Image RetrievalKARCHE SONALI NANA, PROF. MULANI A.O. |
|
3 |
69 |
Smart RTO with Automated Tollbooth SystemSHUBHAM VYAVAHARE, NISHANT PARASKAR, DHIRAJ SARADE,VRUSHABH SONAVALE, PROF. JAGRUTI WAGH |
|
1 |
70 |
SMARTCRAWLER: An Efficient Approach to Find Deep-web Pages and Personalized Web SearchRATHOD PRADIP UTTAMRAO, DAWALE UDDHAV SADASHIV, KHEDEKAR PRIYANKA ASHOK, PROF.SUDAM G. PAWAR |
|
2 |
71 |
What's Up Doc: A Doctor Appointment Application System Using AndroidDHARANI KANTILAL PRAJAPATI |
|
1 |
72 |
State Management in Apache Apex using RocksDB incremental checkpointingAKASH JOSHI, AYUSHI JAIN, NEERAJ GOIDANI, PRANOTI BULAKH |
|
2 |
73 |
A Survey on Interactive Social Networking SystemGANGADHAR IMMADI, RONICA K.M, YOGITHA VARSHINEE J, RAMYA GOPALAN |
|
1 |
74 |
Lossless Image Compression Using Huffman Coding AlgorithmJYOTI A. PATIL, DIPALI M. LOHAR, PRACHI M. BADGUJAR, DIPMALA V. PATIL |
|
2 |
75 |
Identify the Deception of the Social Network to Investigate the Relationship between Dependence and Data Mining From Social NetworksTANVI HINGE, SHWETA JAMKHANDI, PROF.MAHENDRA SALUNKE |
|
1 |
76 |
Robust Sclera Recognition with Novel Hough Transform TechniqueDHANUSHA G. R, BHARATI C. BELAGALI, B. P. LIKHITHA, HARSHITHA M, MANJULA G |
|
3 |
77 |
An Approach for Secure Information Sharing Scheme in Mobile Cloud ComputingPRASHANTH S, BHARATH M, HARSHITHA GOWDA C L, AKSHATHA S R |
|
1 |
78 |
Smart Vertical Farm Using IOTABHISHEK A M, CHANDRAKANTH R, MAHESH C, MANOJ M MARIGIRI, RAMYA B K |
|
1 |
79 |
An Automated Car with Distance Sensor Using Raspberry PiAKSHAY C.S, ANUSH.J.KINI, G.PRAMUKH, PRASHANTH.S.PUJAR, PAVITRA BAI S |
|
2 |
80 |
VF-ATM Machine: Accepts Finger Prints, Voice Pin and OTP CodeHARSHAL DESHPANDE, BHAGYODAY TOKE, RAJESH DANGAT, ADITYA DABHADE, PROF.P.P.WAGHRALKAR |
|
1 |
81 |
Analysis of Stack Technology: a Case study of MEAN vs. MERN StackPRAGATI BHARDWAJ |
|
2 |
82 |
A Review on Malware Injection in Cloud ComputingROHIT K RAO, VASUDHA, SHRADDHA BHAT |
|
2 |
83 |
Emulation of BB84 Quantum Key Distribution AlgorithmNIHAL KAUL, HATIM CHATHIWALA, RISHABH SHUKLA, ABBASALI ANTELAWALA |
|
1 |
84 |
Sign to Speech Converter Gloves for Deaf and Dumb PeopleKOMAL VEDE, PRIYANKA VANJARE, PRADNYA GAIKWAD |
|
3 |
85 |
XBEE-RADIOBEE Electrical Appliance Control Network with ArduinoASHISH SURWASE, ASMITA GAVHANE, PROF. S.M.TONDARE |
|
1 |
86 |
Demo: Automated Line Following, Collision Avoiding Material Object Transporter with Facial Recognition and Audio Interface - Vision and BlueprintG.GAYATHRI, TUSAR KANTI MISHRA, RAMESH PALISETTI, ANITHA DEVI KAKI, AKHIL KANAKALA |
|
6 |
87 |
Human Action Recognition System for two Person Interaction using Edge Detection, Colour and Texture Features Classified using KNNRASHI GOYAL, NIKITA PATIL, MALVIKA JADHAV |
|
10 |
88 |
Detection and Prevention of Grayhole Attack by Using Reputation System in MANETAISHWARYA KUNDUR, CHAITALI PARHATE, MRUNALI CHOPADE, SAPNA RAYOU, UMESH TALWARE, JUBBER NADAF |
|
1 |
89 |
Automatic Lane Clearance System for Emergency VehiclesCHANNAGIRE NIKITA, DESHMUKH PALLAVI, DESHMUKH SHIVANI, SHARADA KORE |
|
3 |
90 |
IOT Based Home Security System Using Raspberry PiRUBY DINAKAR, DEEPTHI U SINGH, MIR MOHAMMED ABBAS, MIR RIYA ALEX, ABHISHEK YADAV |
|
1 |
91 |
Renewable Energy using smart Grid Embedded System in an Internet of ThingsGAURI RAUT, PROF. URMILA DESHMUKH |
|
1 |
92 |
A Time and Energy Consumption Efficient Routing Approach for Electric Vehicles in Real-World ConditionsSARIKA LAIPHRAKPAM, D. B. GOTHAWAL |
|
2 |
93 |
Unique Bio-identification for Home-Security on IoTVAIBHAV KALE, ROHIT KASHID, MEGHAN NAGVEKAR, BASWARAJ WALKE, PROF.G.M.GAIKWAD |
|
1 |
94 |
Detection and Classification of Abnormality in the Retinal ImagesRAGHAVENDRA RAVI TEJA, RAJAT P. RAYADURG, RAKSHITH S, DARSHAN K R |
|
4 |
95 |
Using Point Pattern Analysis Techniques to Describe Spatial Arrangement of Points in ImagesBARAA TAHA YASEEN, ZINAH MOHSIN ARKAH, REEM IBRAHIM HASAN, SEFER KURNAZ |
|
2 |
96 |
Opportunities and Challenges to Use ICT in Government School Education of NepalHEMANT DHITAL |
|
14 |
97 |
Brain Tumor Classification and Segmentation using PNN & FCM ClusteringSHILPA B. SANGHAVI, DR. R.J. SHELKE |
|
5 |
98 |
Grape Leaf Disease Detection Using SVM ClassifierSHWETA.S. KOTHAWALE, S.R.BARBADE , PRADNYA .P.MIRAJKAR |
|
8 |
99 |
Automatic Extraction of Policy Networks from Social Networks and SnippetJAYALAKSHMI.D, K.SASIKUMAR |
|
1 |
100 |
A Survey on Design and Implementation of Autonomous Vehicle Communication SystemASMITA KOLI |
|
1 |
101 |
An Intelligent IOT based Waste Dissociation and Monitoring SystemPRIYANKA K, RAGHAVENDRA BABU T M |
|
3 |
102 |
IACO-LB: A Navel Technique for Load Balancing in Cloud ComputingSHIVANI AGGARWAL, ER SUNIL AHUJA |
|
1 |
103 |
Survey on Edge Preserving Denoising FiltersJ. MERCY JEYA RANI |
|
1 |
104 |
A Case Study of Image Classification Based on Deep Learning Using TensorflowJUBIN DIPAKKUMAR KOTHARI |
|
3 |
105 |
Cloud Forensic Investigation using VM Snapshots and Log InformationNILIMA MITRAGOTRI, PROF M.A.NIRGUDE |
|
4 |
106 |
Extract, Refine and Visualise User Behaviour Analysis using Twitter by SVM in Big DataSEEMA FAGNA, SHWETA GAMBHIR |
|
1 |
107 |
Multi-Level Block Trunction Code Algorithm for Random Color ImageAJAY RANJAN, PROF. KAVITA KAMERIKAR |
|
2 |
108 |
Improving Performance of
Basic First Order Difference Operator as a Filter to Remove Base Line Wander
Noise in ECG
Imteyaz Ahmad
|
|
4 |
109 |
Computer Simulation in Solving Chemical Problems of Chemistry Dr. Anil Kumar |
|
3 |