S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Predicting Cancer Using Linear Regression and Naïve BayesPOOJA BHATI, DR. DINESH KUMAR |
|
4 |
2 |
Employee Management and Work Performance Measurement SystemPROF. P. M. MANE, ASHUTOSH DAS, ANIKET BIDKAR, DHANASHREE PISAL, SHRADDHA NAIK |
|
3 |
3 |
Protecting Virtualized Infrastructure in Cloud using Amplified Security TechniquesPRIYANKA, DEEPIKA GOYAL |
|
1 |
4 |
Deadline-aware Alternate Heuristic Technique for Cloud Task SchedulingHIMANI AGGARWAL, ER AMRITA CHAUDHARY |
|
2 |
5 |
Arduino Controlled Automated Writing Robotic ArmMILIND BAVISKAR, LAKSHMAN KORRA |
|
1 |
6 |
Unipath and Multipath Reactive Routing Protocol in MANET with Fixed Pause Time and Varying SpeedVANDANA VERMA, PROF. SHIVENDU DUBEY |
|
2 |
7 |
Document Clustering Using K-Means videHadoopMANISHA AGRAWAL, NISHA PANDEY |
|
1 |
8 |
Review of Fingerprint Recognition Methods and SystemREENA MITTAL, DEEPIKA ARORA |
|
2 |
9 |
Emotion Recognition from Hindi Speech SignalMEENAKSHI SINGH, PARUL KHULLAR |
|
1 |
10 |
Efficient Data Security by combination of Cryptography and SteganographyPUJA, DR. DINESH KUMAR |
|
1 |
11 |
Enhanced XSS/SQL Injection Techniques for Web Site Vulnerabilities with Amplified AlgorithmRASHMI, DEEPIKA GOYAL |
|
1 |
12 |
Implementation of Global Localization of Intelligent Vehicle in Lane Level via Lane Marking Detection and Shape RegistrationNIKITA.A.WADE, ABHIJEET. V. SHINDE |
|
1 |
13 |
Amplified Semantic Parsing of Open Street Map using KNNPOONAM DEVI, RACHNA |
|
1 |
14 |
A Review on Vehicular Ad Hoc Networks Their Applications and ProtocolsMAHAK GOEL, DEEPIKA ARORA |
|
1 |
15 |
SEO-Search Engines Optimizations for Web Pages Using Content Based RankingB.KARTHIKA., R.RATHI, G.SIVAKUMAR |
|
2 |
16 |
Analysis of Total Harmonic Distortion Using Neuro Fuzzy in Renewable Energy SystemsVINOTHINI |
|
1 |
17 |
An Overview on Paddy Crops Ailments Detection and Prevention Utilizing Image ProcessingPROF. B.H. PANSAMBAL, SNEHA J. SONTATE |
|
1 |
18 |
A Survey Paper on Quality Assessment On Blind Video Integrity OracleJYOTI GOVINDRAO SURYAWANSHI, DR. S.F.SAYYAD |
|
1 |
19 |
Secure Data Sharing for Mobile Cloud Using A Trivial Sharing MethodMUKUNTHAN B, M G DINESH |
|
1 |
20 |
A Survey on Blind Spot Detection System Using Vision Sensor and Deep Learning AlgorithmN KUNAN, FAIZ HABEEB K, N TUTURAJA |
|
1 |
21 |
Isolation-Preserving Key for Range QueriesT.ABILASHA., K.CHANDRAMOHAN, DR. R.UMAMAHESHWARI |
|
1 |
22 |
Ad-Hoc Method for Social Data Collection Using FoursquareSHAMEENA V, SENTILKUMAR |
|
4 |
23 |
Data Transfer through Secured Routing Model in WSNAISWARYA P.S, MS.K.SINDHUJA |
|
1 |
24 |
Secured Data Transfer Cloud Encrypted Outsourced Data with Accurateness EnhancementMISHA MATHEW , MS.S.BRINDHA |
|
1 |
25 |
Image Re Rank In User Clicks And Future SearchSUDHISHNA K.S, MR.S.SENTHIL PRABHU |
|
3 |
26 |
Machine Learning Model for Human Activity Recognition by Smartphone DatasetKHUSHBU DEWANGAN, ABHISHEK KUMAR DEWANGAN |
|
2 |
27 |
Analysis of Machine Learning Techniques for Intrusion DetectionANJUM KHAN, ANJANA NIGAM |
|
1 |
28 |
Improving Web Search by Analysing Various FacetsGUNJAN H. DESHMUKH, GOVINDA BORSE |
|
1 |
29 |
Reactive Routing Protocols under V2V Communication in VANETsSNEHA AWASTHI, PROF. SHIVENDU DUBEY |
|
2 |
30 |
A Survey on Entity Extraction from the Web Pages Methodology and ApplicationK.B.ANUSHA |
|
3 |
31 |
Finding Top-k competitors using Differential EvaluationRANI R. RAUT, PROF. R. V. MANTE, DR. K. P. WAGH |
|
1 |
32 |
Keyword Aware Representative Travel Route Recommendation with Places of InterestPUJA P. PATIL, PROF. RAVI V. MANTE, DR.K. P. WAGH |
|
1 |
33 |
An Ameliorated Methodology of Implementing Task Scheduler on a Multi Core ProcessorSAVITHA P, VARUNISH P, GEETA S N |
|
2 |
34 |
Detecting Spam Comments Using Spam Word Dictionary and NLP TechniqueROHINI D. WARKAR, PROF.I.R. SHAIKH |
|
1 |
35 |
EM-CURE Algorithm for DDOS Attack DetectionPRIANKA P. NARODE, PROF.I.R.SHAIKH |
|
1 |
36 |
Review on Map and Reduced based Semantic Parsing of Open Street Map using KNNPOONAM DEVI, RACHNA |
|
1 |
37 |
Co-Extracting Opinion Words and Opinion Targets from Online Reviews by Topic RelationDIPALI SATAV, SHAILAJA JADHAV |
|
1 |
38 |
Implementation of Phase Shifted Semi-Bridgeless PFC ConverterDIGAMBAR SUTAR |
|
2 |
39 |
Single Phase Grid-Connected Inverter for PV System with MPPTNIKHITA KADAM, PROF. A. P. KINGE |
|
2 |
40 |
Survey on Various 3D Brain Image Reconstruction Methods based on MRIVIDHYA K, DR. MALA C PATIL |
|
1 |
41 |
Implementation of Cloud based Image Scaling and Cropping using Modified Paillier CryptosystemNEHA TAYADE, P.M. CHOURAGADE |
|
1 |
42 |
A Survey on Deep Learning Approaches in HealthcareAMIT S. WALE, PROF. SHILPA S. SONAWANI |
|
1 |
43 |
A Survey on Routing Protocols of Internet of ThingsGAURI S. RAPATE, DR. N C NAVEEN |
|
4 |
44 |
Technique for Secured Search on Encrypted Information based on Similarity Join QueriesSHITAL P. PATIL, PROF. P. B. MALI |
|
1 |
45 |
A Survey on Geo Social Media Data Analysis for Product ReviewNITHIN N V, PROF. GEORGE PHILIP C |
|
1 |
46 |
Providing Protection on Cloud Video Surveillance Using Blowfish AlgorithmSWATI SURYAWANSHI , VAISHALI KOLHE |
|
1 |
47 |
Cluster Data using Various Clustering AlgorithmsMAYURI K. BOTRE, DR.KAILASH SHAW |
|
2 |
48 |
Optimized Transit Alert System with Real Time DataPRABHAKAR BHOSALE, PROF. M.S. OTARI |
|
1 |
49 |
An Effective Algorithm & Comparison of Various Techniques using J48 ClassifierSHIVA SHARMA, U. DATTA |
|
1 |
50 |
Enhancement of Voice Technology over Ad-Hoc Network (MANET)DOLLY SHARMA, NISHA PANDEY |
|
1 |
51 |
Investigation for LTE and WLAN Conjunction in NS3MANJULA R, HEMANTH KUMAR A R |
|
2 |
52 |
Enhanced Scheme for Mitigating Jamming Attacks in MANETsMADHVI, NISHA PANDEY |
|
1 |
53 |
Compact and High Speed Hardware Implementation of CLEFIAPANKAJ V. JADHAV, VISHNU SURYAWANSHI |
|
1 |
54 |
Survey on Various Unsupervised Learning Techniques for Anomaly DetectionASHWINI ATHAWALE, MRS. DEEPALI M. GOHIL |
|
1 |
55 |
Travel Sequence Recommendation by Mining User Social Interest and Travelogs DataKISHORI P. THAKARE , HIRALAL B. SALUNKHE |
|
1 |
56 |
Two Phase Neural Network Model for Weather Forecast Along-with Logistic and Linear RegressionANIL KUMAR, PRAVEEN SHARMA |
|
1 |
57 |
Speech Enhancement System using FIR FilterNAGESH B. KALE, R. R. HARNE |
|
1 |
58 |
Survey on IOT based Home Automation System using ATMEGA 48 MicrocontrollerAMITH P S, APOORVA T, GOVINDARAJU H V |
|
1 |
59 |
E-Learning by Using Gamification and Job AssistMINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR ,VARSHA DANGE |
|
1 |
60 |
Seeker's Satisfaction in Community QA SystemHARSHAL SHASHIKANT ANANDAS, KHAN MUBASSHIRA NOORMOHAMMED, SANYUKTA SATISH NIRMAL, NILAMBARI RAHUL PARDESHI. |
|
1 |
61 |
Game Theoretic Study on Channel-Based Authentication in MIMO SystemsPROF. JYOTI RAGHATWAN, ALKA TAUR, |
|
1 |
62 |
Use of SDN for Detecting and Mitigating Link Flooding AttackPROF. KANCHAN VARPE, KOMAL KHANDALE |
|
1 |
63 |
Privacy Protection in Healthcare System and avoidance Intrusion Detection based CloudletKAVITA V. DUBEY, PROF.VINA M. LOMTE |
|
1 |
64 |
Smart Public Transport System Using Android ApplicationAMRUTA SHETE, ANJALI KAPARE, KSHITIJA SALKE, SUCHITA BHOSALE, HEMANT SHINDE |
|
3 |
65 |
Cloud Based CMIS with Offline SynchronizationREKHA M, BHARATHI K, CYNTHIA A, NOORUN NAZIRA |
|
1 |
66 |
Helmet and Triple Riding Detection on Motorcyclists using Image ProcessingPRADEEP MAIYA, SHARATH KUMAR R, SHREYAS P V, VISHWA PRAKASH H V, POORNIMA M |
|
3 |
67 |
An Implementation of Smart Attendance System Based on Face Recognition Using Android ApplicationARTI DONGARE, ICHHA GILBILE, POOJA TEKAWADE, AMITSINGH THAKUR, A.D.SAWANT |
|
1 |
68 |
Authority Identification Using KeystrokeSHREENAND SADANAND TAMHANKAR, SANKET GULABRAO JAMBHULKAR, ANIKET NURIYA RATHOD , PRAJAKTA ANANT SHELAR , ANIKET GAUTAM GAIKWAD, PROF. G.S.KOTHAWALE, R.T.WAGHMODE |
|
4 |
69 |
Online Service for Engineering Project Title Verification Based on Content AnalysisSHUBHAM PODHADE, SAILY DEORE, MOHINI PANDEY, PADMANABH SAOJI, PROF M. L. BANGARE |
|
2 |
70 |
Trust and Reliability Control by Continuous Auditing: Ensuring Cloud SecurityNAGORAV KOLHE, HARSHAD KHANEKAR, VISHAL JAWADWAR, PRIYANKA DHERE, PROF. MOHOLKAR K.P. |
|
1 |
71 |
Smart Ration Card SystemAISHAWARYA VARPE, SONAWANE SHRADDHA, WALAKE NIKITA, B.R.BAVISKAR |
|
1 |
72 |
Vehicle Repair and Puncture Service AppANKIT CHOUDHARI, BALU GOBADE, AKSHAY KHATALE, ANAND NARNAWARE, PROF. S.B. JADHAV |
|
3 |
73 |
Autonomous RC Car Using Neural Network and Deep LearningHIMANSHU SHARMA, MRIDUL CHAUDHARY, NITESH MANJWANI, RUCHI KULKARNI, AMITA JAJOO |
|
3 |
74 |
Health Care System Using Qr-Code StrategyPRADIP SHEWALE, KARAN JAVERI, PIYUSH GANDHI, MOHAMMADJAID INAMDAR, RIYAJ MUJAWAR |
|
3 |
75 |
Brain Tumor Detection and ClassificationSASNA M.S, AMRIN SHEIK UMMER, JOEL K.J, RAMEESA M.A, BINISH M.C |
|
2 |
76 |
Production Improvement using Predictive PlanningPRATIK BURHADE, AMAN KHADE, DEVENDRA GAIKWAD, SHARVARI JIWANE, SUSHILA AGHAV |
|
4 |
77 |
Smart Attendance System using face detection On Raspberry piVISHAL D. BIKKAD, PROF.DR.S.B.SONKAMBLE, SNEHAL A.MANE, SURABHI S. SARADA |
|
2 |
78 |
Solar Powered Non-Invasive Pulse Oximeter and Heart Rate MeterSRUSHTI CHAVAN, PRARTHANA GADEKAR, MANJUNATH PATIL, S.P. TONDARE, S.P. GAIKWAD |
|
2 |
79 |
Solving Student Migration Issues in InterstateFORTUNE SINGH BISTA, TEJASVI GOEL, MANISHA GUNJAL, AISHWARYA MUNDHE, S. J. PATIL |
|
1 |
80 |
Plant Disease Detection Using Image Processing (Rural Development)PRASAD C. SHINDE, PANKAJ NEVASE, SWAPNIL INGOLE, PROF. U. C. PATKAR |
|
1 |
81 |
Efficient Diagnosis of Breast Cancer PatientsMUKTAI ITANKAR, VAISHNAVI BANDEWAR, NIKITA DESARDA, ANTARA DARBESHWAR |
|
1 |
82 |
An Implementation on Securing Aggregate Queries for DNA DatabasesAKSHAY BHARAM, ASHUTOSH TEKNUR, PROF. SHAILAJA JADHAV, SHUBHAM SHINDE, SANKET WANKHEDE |
|
1 |
83 |
Implementation Paper on Rain Water Drain out Machine from Pit or BasementSNEHAL JADHAV, RUPALI NAVALE, SENHA PATHAK, TRIVENI THIKEKAR, PROF. K.B KUNTE |
|
1 |
84 |
Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy PreservingAMIT DEORE, SURAJSINGH MALAS, VAIBHAV PAWDE, PROF. ILA SAVANT |
|
2 |
85 |
Privacy-Preserving Multi-Keyword Similarity Search Over Encrypted DataSHUBHANGI J. WAGH, AISHWARYA G. PATIL, ARPITA D. PATIL , PALLAVI G. PATIL |
|
2 |
86 |
Random Forest -A Machine Learning Algorithm to Predict Number of bicycles in Bicycle Rental SystemHARISH MANGHNANI, MINAL VANAGE, AKSHATA NAIK, SHALINI WANKHEDE |
|
2 |
87 |
Smart Public Transport Using IOT TechnologyRAHIL KHAN, FAISAL KHAN, GAURAV PINGALE, ADVAIT KHUTWAD |
|
1 |
88 |
Type III Digital Compensator Design for Buck ConverterSHREYAS R H, VISHRUTHA G, SHUBHA RAO K |
|
2 |
89 |
Feasibility of Using Machine Learning to Access Control on non-Educational LinksSHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHAB TANDEL, PROF .PRASHANT ABHONKAR |
|
1 |
90 |
Secure De Duplication over the Cloud Environment Using Multi Authority Attribute Based EncryptionVINA M LOMTE, ASHLESHA D GAIKWAD |
|
1 |
91 |
Implementing Collaborative Filtering Approach in Online Event Recommendation SystemROHAN KATARIYA, V KRISHNA MOHAN, SHUBHAM SURYAWANSHI, RUTURAJ DHANESHWAR, GEETHA CHILLARGE |
|
1 |
92 |
NaturalJava: An Efficient Interface for Interpreting Natural Language into Java CodeASHWINI G. BARI, MOHIT L. PATIL, GAYATRI V. GAIKWAD, SUSHIL D. KARANDIKAR |
|
1 |
93 |
Two-Factor Data Security Protection Mechanism for Cloud Storage SystemDEEPAK KUMBHAR, VIJAYA KADAM, PALLAVI KADAM, VARSHA SHINDE, NAVNATH BAGAL |
|
1 |
94 |
Inference Attack on Users Browsing History with Friend Recommendation System in TwitterSWATI KAMBLE, DHANASHREE PHALKE |
|
1 |
95 |
Providing Secure Healthcare System on CloudKOMAL PANGARE, APOORVA KUKADE, RUTUJA MANE, PROF. MADHURA SANAP |
|
1 |
96 |
High- Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age EstimationPRIYANKA S. NIKAM, NEETA A. DESHPANDE |
|
3 |
97 |
Mining Facets for Queries from Their Search ResultsPROF. P.M.GORE, PRATHMESH KADAM, GAURAV PATIL, RAVI KHARAT, AMOL MORE |
|
1 |
98 |
Two-Factor Data Security Protection Mechanism for Cloud Storage SystemONKAR DEHANE, SUPRIYA SANAP, PARVATI MOHITE, POOJA SUTAR, POOJA VENGURLEKAR |
|
1 |
99 |
Active Trust Secure and Trustable Routing in Wireless Ad-hoc NetworksT.ARIVANANTHAM, RAHUL KARMORE, NIKITA SATKAR, PRIYANKA GHADGE, KARISHMA SHETE |
|
5 |
100 |
Confidential and Essential Two-Cloud Secure Database for Numeric-Related SQL Range QueriesPROFESSOR, M.E.SANAP, KOMAL BHUJBAL, SHITAL GADEKAR , NITIN GAIKWAD , SHUBHAM GHODKE |
|
1 |
101 |
Traffic Management System Using QR CodeNIKHIL ANKAM, POOJA KUMARI, NIDHI KUMARI, DYNANESHWARI BHALSHANKAR, PROF.H.M. KUTE |
|
1 |
102 |
Controlling of Welding Fixture using PLCMAYUR P. KHARAD, ABHIJEET A. CHAVAN, AKSHAY T. JAIWAL |
|
2 |
103 |
Similarity Based and Transfer Learning Based Data Fusion Using ClassifierYOGESH SHINDE, NIKHIL GHULE, RUBINA SHAIKH, PROF. ASHISH RAMDASI |
|
1 |
104 |
An Efficient Way of Clearing the Garbage System Using Wireless SensorsKEERTHANA M, KOKILA S, KANAKAMBIKA RG, M S SHOBA, DR. JITTENDRANATH MUNGARA |
|
1 |
105 |
Solar Tracking with Temp. & VTG MeterJYOTI PATIL, AVANTI KUNALE, NIKITA PATIL, PROF.C.M.BUKEY |
|
1 |
106 |
Energy Efficient Network Encoding By Creating Secrets of Packet Erasure Using Network Node Is Jamming RandomlyRUPALI TONAPE, NEHA NHAYADE, KIRTI DALVI, GULSHAN SINGH, TRUPTI DANGE |
|
1 |
107 |
Enhancing Cosmetic Products Quality Using MRF and K-MeansPRACHI KUNJIR, MADHURA ARGADE, DURGESHWARI RANE |
|
1 |
108 |
Data Acquisition from Heart through Wireless TelemetryMAMTA, MOHINI PANDEY, PRERNA BISEN, S.P. TONDARE, DR. S.P.GAIKWAD |
|
2 |
109 |
Plant Leaf Disease Detection Based on Image Processing Using MATLABRASHMI SOLLAPURE, LAXMI KARADIGUDDI, PRIYANKA HANASI, SOUMYA DADDI, PROF.BHARATI KALE |
|
2 |
110 |
Spatial Reusability-Aware Routing in Multi -Hop Wireless NetworksIRANNA M , KALPANA C, NETRAVATI J, ARAVIND P, BHARATI K |
|
3 |
111 |
Microcontroller Based Library Books Location Searching SystemPRIYANKA MANE, MINHAJ MOMIN, BHAGYASHRI MANDE, PROF.S.M.TONDARE |
|
2 |
112 |
A Survey and Analysis of Reliable Data Packet Delivery Ratio in Wireless Sensor NetworkR.RAJKUMAR, SUNDARAMURTHY.B |
|
1 |
113 |
Cyber Security Methods for Vehicle Networks Challenges and Solution Using UAVs NetworksMURUGESAN S, DR. NITHYA, R.BHARANIDHARAN |
|
1 |
114 |
Big Data Vertical Grouping Attributes Dynamic Load-Balancing Using BluemixAGILASRI.A, DR. NITHYA, M.ANNAMALAI, MURUGESAN S, |
|
1 |
115 |
Improvement of Direction Decision Algorithm based on Bird's Eye View Transform for Self-Driving CarsHYEON-SEOK JEONG, SEOK-HO IM1HYEON-JU YOON |
|
1 |
116 |
Smart Shoes: A Safe Future for the BlindSHLESHA KHURSADE, MALAVIKA KARUNAN, IBTISAM SAYYAD, SALONI MOHANTY, PROF. B.B. GITE |
|
2 |
117 |
Data Security Scheme: Share and Audit Our Data into Cloud using EncryptionASHVINI JANGAM, PROF. NILESH SABLE |
|
1 |
118 |
Wireless Fetal Heartrate Monitoring SystemYATEEN RAJE, AKSHITA BAJPAI , SHINOO SWAPNIL , PROF. A. R. PATIL , PROF. HARSHADA MHETRE |
|
2 |
119 |
Swasth Suvidha: An IOT Based Health Monitoring SystemSANKET MHATRE, AKASH PATIL, YOHANTH SHETTY, SAMEER UDGIRKAR |
|
3 |
120 |
Feature Learning and Collaborative Tagging Using Non-Personalized Social Media Images and TagsPRIYANKA S. PADWAL, DR. NEETA A. DESHPANDE |
|
2 |
121 |
A Advanced Approach to Construct E-Learning QA SystemSHUBHANGI SURESH PAWAR, PROF.R.H.KULKARNI. |
|
1 |
122 |
3D Perspective View for Cinema SeatSAGAR A. NANGARE, CHETNA ACHAR |
|
1 |