International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Survey on Requirement Elicitation Techniques: It's Effect on Software EngineeringJOSEPH ELIJAH, DR. AMIT MISHRA, ENGR. MATHEW CHUKWU UDO, ABDULRAHMAN ABDULGANIYU, PROF. ABIODUN MUSA AIBINU1 |
3 | |
2 | A Survey On Marketing Performance of Small Scale Vs Large Scale Vendors Using Big Data AnalyticsSHAHANAZ. J.2 |
2 | |
3 | Application of Internet of Things in the Field of Medical and Smart Health CareDIKSHA B. WASANKAR, DR. VIJAY S.GULHANE, L. K. GAUTAM3 |
4 | |
4 | Statistical and Machine Learning Techniques for Prediction of Customer Churn in TelecomDR. T. LEO ALEXANDER, D. MONICA4 |
1 | |
5 | A Convolution Neural Network Based Deep Learning System for Brain Tumor Detection towards MRI Image SegmentationUDAY BELLARY, JAVERIYA SADAF5 |
1 | |
6 | Secret Key Sharing Mechanism for Data Security in CloudANMOL BHATIA, GAURAV GARG6 |
3 | |
7 | DC Motor Speed Control with PID Controller: A ReviewSHIKHA SINGH, MILONI GANATRA, HANSA SHINGRAKHIA, ZALAK PATEL7 |
2 | |
8 | Design and Implementation of Blood Bank Monitoring System Using Raspberry PiK.SRAVANI, B SUJATHA8 |
4 | |
9 | Design and Implementation of E-Blood Donation System Using Location TrackingDEEPTHA HEGDE, AGNUS KURIAKOSE, AMITHA MARIYA MANI, ANJU PHILIP, ANNAMMA P ABRAHAM9 |
4 | |
10 | Design and Implementation of Improved System for College Automation and ManagementMOHITHA H V, ANANDU MOHAN, JEYS REJI, BENCY S BABU, TINTUMOL M G10 |
4 | |
11 | Developing a Face Recognition and Analysis System (FRAS) and its ApplicationsASHIN GUHA MAJUMDER, ANURAG ROY, SUVASISH DASGUPTA, SHALABH AGARWAL11 |
8 | |
12 | Area–Delay–Power Efficient Carry-Select AdderSAREEKA TULSHIRAM DEORE, PROF. DR. P. MALATHI12 |
3 | |
13 | Twitter, Facebook and Google Data Analysis Using Open Source Hadoop Technologies HiveY.SIRISHA, N.ARUN JYOTHI, K.S PARIMALA13 |
2 | |
14 | An Innovative Pliable Distributed Cloud Storage Integrity Checking SchemeULYA SABEEL14 |
2 | |
15 | A Survey on Personalized Web Search Privacy ProtectionDEVIKA P, JITHA K15 |
2 | |
16 | Survey of Healthcare at Household Using Wearable Devices on CloudSHAIK MOHAMMED SAJID, KAVITHA K K17 |
3 | |
17 | An Efficient Fuzzy Based Approach for Hepatitis DetectionANCY SUDHAKAR , RAJALEKSHMY K D, PRINCE ABRAHAM18 |
3 | |
18 | Efficient Semantic Search over Encrypted Data in Cloud ComputingYASH KHARE, ASIF SHAIKH, AKSHAY GOLE, PROF. K. BALA19 |
1 | |
19 | Design and Implementation of Driverless Car to Recognize Traffic LightARPITHA S K, NAGARATHNA20 |
8 | |
20 | A Review on Security Issues in Cloud ComputingK SRI VANI21 |
1 | |
21 | Analysis of 2D to 3D Reconstruction Techniques over Brain MRIA. FARZANA, DR. M. MOHAMED SATHIK22 |
5 | |
22 | Statistical Translation using KNN and N-gram Algorithm for Machine TranslationSHILPA MODANI , PRIYANKA MORE , HARSHAL SHEDGE , U. C. PATKAR23 |
1 | |
23 | Approach for Classification of Neuromuscular Disorder using EMG SignalsAMIT KUMAR SINGH, N K AGRAWAL, SUMIT GUPTA24 |
1 | |
24 | Design and Implementation of Vehicle Emission Testing System using MQ-5 and MQ-7 SensorsAKSHATHA.A, NAGARATHNA25 |
2 | |
25 | Automated Toll Collection System Using RFIDAISHWARYA D SHETTY, JASRIN M.D, JYLES BENNY, SUMIMOL SADASIVAN26 |
1 | |
26 | Real-world Performance Analysis of Ad-hoc wireless NetworkTUSHAR G. DANGAT27 |
2 | |
27 | Implementation of 8X1 Low Power Multiplexer using Transmission GatesPALAPARTHI SURESH, YELITHOTI SRAVANA KUMAR28 |
3 | |
28 | Design and Analysis of Multiplexer using ADIABATIC LogicMOPADA DURGA PRASAD, BOGGARAPU SATISH KUMAR29 |
2 | |
29 | Study of Different Mobility Schemes to Provide Improvement in Wireless Sensor Network with Detection of Node ClonesNEHA SEN30 |
1 | |
30 | XML Query Answering using Data Mining Tree Based ApproachVERSHA, DEEPIKA GARG31 |
2 | |
31 | An Android Based Smart Wheelchair with Health Monitoring using IoTPRATEEK GUPTA, SHUBHAM SAGAR NAYAK, UPASANA, PROF. ATUL B. WANI32 |
1 | |
32 | Analysis of the Multitasking Feature-Virtualization and Virtual Storage in CloudASHIMA NARANG33 |
1 | |
33 | Design and Analysis of Energy Efficient Adders Using Low Power TechniquesBADE GNANESWARI, D.VENKATACHARI34 |
3 | |
34 | An Efficient Fuzzy Logic Classification over Semantically Secure Encrypted DataP. HEMALATHA, DR. S. M. JAGATHEESAN35 |
3 | |
35 | Data Embedding based 4 LSB technique in Image using SteganographyNITIN R. ZINZURKE, PROF. SUHAS M. PATIL36 |
3 | |
36 | A Review on Meta-Material based Soft Horn AntennaPROF.ZALAK PATEL, PROF.MILONI GANATRA, PROF.HANSA SHINGRAKHIA, PROF.SHIKHA SINGH37 |
7 | |
37 | Integrating Personalization and Image based Search System to Enhance Search ResultsSNEHA A. TAKSANDE, PROF. A. V. DEORANKAR38 |
2 | |
38 | High-Performance FIR Filter Architecture for Fixed and Reconfigurable ApplicationsPALLAVI R. YEWALE39 |
1 | |
39 | Automated Elevator-An Attentive Elevator to Elevate using Speech RecognitionCHINTAN PATEL, ANSHUL MAATHUR40 |
2 | |
40 | A Survey on Monitoring and Control system for Food Storage using IoTROHAN WAGLE, MAYUR SHAH, ADITYA KADAM, RAMGOPAL SAHU41 |
6 | |
41 | A New Innovative Approach for Natural Image Denoising Using Genetic Algorithm and ThresholdingS.AAISHA NAZLEEM, L.S.SUBBULAKSHMI42 |
2 | |
42 | A Real Time Monitoring System for Home AutomationAKSHAT SHARMA, ARUNKUMAR T43 |
2 | |
43 | An Efficient and Secure Dynamic Auditing for Regenerating-Code-Based Cloud StorageNARESHKUMAR R.M, SHOAIB ZARIKER44 |
1 | |
44 | Big Data Application in Agriculture to Maximize the Rice Yield Crop Production using Data Mining TechniquesSNEHA N, DR. JHARNA MAJUMDAR45 |
2 | |
45 | Deadline-Aware Sufferage Based task Scheduling in Cloud ComputingALKA VOHRA, SUCHITRA46 |
1 | |
46 | A Survey on Thoughts to Text Using Brainwave PatternsDIPTI PAWAR, KAPIL KAMALE, ISHAAN SINGH, VISHWAJEET KHAROTE, PRAJWAL GOSWAMI47 |
3 | |
47 | Selection of Personal Computer using Modified Fuzzy Analytical Hierarchy ProcessSONIKA SHARMA, MOHINDER SINGH48 |
1 | |
48 | Comparative Study of Image Compression using Discrete Wavelet Transform and Discrete Cosine TransformPRIYA BACHHALIYA, PROF. NITESH KUMAR49 |
1 | |
49 | Automated Security System for Girls Safety Using ARM7SANGEETHA V, NUZHATH ZAIBA, POOJASHREE K.P, REETU T, SHASHWATHI N. BHAT50 |
1 | |
50 | Bluetooth Remote Home Automation System using Internet of ThingsMENAL DAHIYA51 |
1 | |
51 | Detection and Prevention of Black Hole Attack Using Trust Mechanism with various Node DensityHITESH NAGDEV, MAYUR RATHI52 |
2 | |
52 | Energy Efficient Routing Protocol with Greedy Algorithm for WSN ScenariosASHLESHA SONANE, MAYUR RATHI53 |
2 | |
53 | Discovery of Ranking Fraud for Mobile ApplicationsARATI TULE, PROF. RAHUL SHAHANE54 |
1 | |
54 | Implementation of Efficient Parallel Decimal Multiplier Using VerilogCH.TEJASRI, DR.B.NAGA JYOTHI55 |
1 | |
55 | BillSmart- A Smart Billing System using Raspberry Pi and RFIDDR. MARY CHERIAN, DISHA DH, CHAITHRA KB, ANKITA, AISHWARYA56 |
3 | |
56 | Comparative Study of Pattern ClassifiersJAGBEER KAUR, DEEP KAMAL KAUR RANDHAWA57 |
1 | |
57 | Off-Street Parking Space Reservation Using Smart Phone ApplicationAKSHATHA B S, UMA S K58 |
2 | |
58 | Connecting Social Media to E-Commerce Using Cold Start Product RecommendationSALKE SHITAL ARJUN, MORE PRIYANKA GAUTAM, SHINDE SNEHAL MOHAN, SHINDE SAMRUDDHI VINOD, PROF.MILIND R. HEGADE59 |
1 | |
59 | Predicting Bus Arrival Time with Mobile Phone Based Participatory SensingAMREEN DESHMUKH, SHUBHANGI TAKE, SANCHITA DESHMUKH, PROF. H.B.JADHAV60 |
1 | |
60 | A Cost-Effective Home Security Alarm System for Detection of MotionAshwini M, Uma S K61 |
1 | |
61 | Comprehensive Model Driven Approach for Requirement Management SystemPooja Batra Nagpal62 |
1 | |
62 | EduAR: Transforming Education with Augmented RealityRavi Koshiya, Shantanu Kulkarni, Divvya Mehta, Pratik Malkan, Purnima Ahirao63 |
5 | |
63 | Face Recognition using Sift Key with Optimal Features Selection ModelMandeep Kaur, Jasjit Kaur64 |
2 | |
64 | Performance Analysis of Progressive Coefficients Significance Compression Methods for ROI-based DICOM ImageGunjan Chaudhary, Prof. Yogesh Kumar Mishra65 |
3 | |
65 | Survey on Abandoned Object Detection using Image ProcessingDhanashri Adalinge , Damini Patil, Shubhada Dongare, Surabhi Gokodikar , Prof. M. K. Kodmelwar66 |
2 | |
66 | Analysis of Soil Behavior and Prediction of Crop Yield using Data Mining ApproachSupriya D M67 |
3 | |
67 | Proximity Aware Clustering in Delay Tolerant Network for Efficient File SearchNikhil Patil, Ashitosh Vidhate, Lakhan Jadhav, Prof.Priya Pise68 |
2 | |
68 | A Novel Multiband Multichannel Variational Approach Based on NLTV Model for Image InpaintingGaurav Chouhan, Mandeep Singh Saini69 |
1 | |
69 | Packet Scheduling and Self Restriction Schemes for Underwater Acoustic Localization in WSNKeerthi M, Jayashankar M70 |
1 | |
70 | Performance Analysis of Digital Finite Impulse Response Filter Design using Windowing TechniquesProf.Hansa Shingrakhia, Prof.Miloni Ganatra, Prof. Zalak Patel, Prof. Shikha Singh71 |
1 | |
71 | Detection of Different Stages of Lungs Cancer in CT-Scan Images using Image Processing TechniquesPriyanka Basak, Asoke Nath72 |
1 | |
72 | A Literature Survey on Mining Health Data to Predict Heart DiseaseP. Priyanga, Aparna N Venu, Latha Eshappa, M Archana, Navya Shree D P73 |
2 | |
73 | Implementation of Integrated System to Avoid Flood like SituationTanwid. Deshmukh, DR.A.P. Thakare74 |
1 | |
74 | Anti-Theft Application for Android Smart-PhonePriya Chintawar, Sujata Agrawal75 |
1 | |
75 | Implementation of Partial Generalization for Data Publishing with Minimal Information LossUrvashi Hiranwar, Amit Pimpalkar76 |
1 | |
76 | Fingerprint Based Driving License SystemSarika Fulpagare, Monali Kulkarni, Dipak Deokar, Rahul Deshmukh , D.A.Phalke77 |
1 | |
77 | Amalgamation of Cryptographic Techniques for Secured Data TransmissionMeghana V, Aishwarya B, Shobha M.S78 |
2 | |
78 | Electronic Toll Collection System Using RFID TagNajeeba Tabassum79 |
1 | |
79 | Secured Data Transmission in Mobile Adhoc Networks: An Implementation Using JavaDrashti Gautam, Dr. Anurag Sharma80 |
1 | |
80 | Minimization of Network Traffic Using Partition and Aggregation for Data Stored in CloudP.Priyanga,Tushar.R.Shetty,Utsav.K.P,V.Rahul, Darshan.C81 |
1 | |
81 | CMOS RF Power Amplifier Using Reconfigurable Interstage Network for Envelope TrackingNeha A. Kashiwar, Prof. S. S. Agrawal82 |
1 | |
82 | A Survey on Object Detection and Tracking AlgorithmsSubhash Nevhal, Dr.Archana Ghotkar83 |
2 | |
83 | Sentiment Analysis using Machine Learning Algorithms: A SurveyKaushik Hande1, Prof. A. G. Phakatkar84 |
1 | |
84 | Medical Records Clustering: A SurveyMangesh Mali, Dr Parag Kulkarni, Prof. Virendra Bagade85 |
2 | |
85 | FPGA Implementation of Gradient Based Edge Detection AlgorithmsAvinash G. Mahalle, A. M. Shah87 |
2 | |
86 | Enhanced Application of Natural User Interface Using KinectC. Dinesh Kumar, D. Lohitha88 |
1 | |
87 | State of The Art Content Mining Using SCAN TechnologyDr. Anuj Kumar Parashar , Er. Dev Kant Tyagi90 |
1 | |
88 | Detecting Relay Attacks in RFID Using Bloom Filter for Unauthorized ReadingReeta Kumari Ashok Singh, Prof.Anubhav Sharma91 |
4 | |
89 | Development of Auto-Ranging DAS on 32 bit ARM Cortex Processor for X-Ray DetectorsSayali Dilip Kedar, Piyush Saxena, V.K.Dubey, Lekha Das92 |
1 | |
90 | Minimizing Energy of Cluster Based Cooperative Spectrum Sensing in Cognitive Radio Network Using Genetic AlgorithmChanchal Nigam, Rabindra Kumar Singh93 |
2 | |
91 | Energy Efficient Routing Algorithm for Maximizing Network Lifetime of Heterogeneous Wireless Sensor NetworksManish Chandra, Yogesh Kumar Mishra94 |
2 | |
92 | Integration of RFID, NYC and Blockchain TechnologiesSnehal Johny, Sayali Chavan, Nishi Tiku95 |
1 | |
93 | Energy Efficient and Secured Dynamic Real Time Routing Protocol in Wireless Sensor NetworksChitra.P, Chandrakala.V96 |
1 | |
94 | Fair Routing Across the Wireless Sensor Network Using Deniable Encryption and Load BalancingAshwini A N, Manjunath H R.97 |
1 | |
95 | A Survey on Unidirectional Intermediary Re-Encryption to Preserve Ciphertext for Big Data StorageRoopa S98 |
1 | |
96 | Fusion of Big Data and HealthCare: A ReviewAnkit Chaudhary, Neha Tyagi99 |
4 | |
97 | A Novel Scheme for Estimation of Probability of InferenceMahmood Saif, Rameshwar Rao100 |
1 | |
98 | Secure File System Architecture- Based Session Key Generation in pNFSSreedevi R101 |
4 | |
99 | A Review on Work Family Conflict of Women Employees in IT IndustriesKochumol Abraham, Win Mathew John, Sijo Thomas102 |
8 | |
100 | Detecting Jamming Using RTS CTS StrategyAnita Wakode, Mayuri Halnor, Rashmi Singh, Prof.Aditi Chaturvedi103 |
1 | |
101 | A Sentiment Analysis of Twitter Data using Hadoop FrameworkJeevitha, Raksha, Vipin N104 |
2 | |
102 | Recommendation of Cold-Start Product by Socializing E-CommerceDipali Gavhane, Gitanjali Shelge, Swapnanjali Ubale, Swapnil Shinde105 |
1 | |
103 | A Survey On Smart Parking Systems Using Cloud Based ServicesShubham Bhalerao, Umang Mahant, Megh Makwana106 |
2 | |
104 | An Application for Interior Design Using Augmented RealityNoor Farhan Kapdi, Shubham Sangnale, Pramod Ralebhat, Prof. Mandar Mokashi107 |
2 | |
105 | A Survey on Better Tracking Using Digital IntelligenceVinaya Poojari , Rahul Naik, Ramesh Solanki108 |
1 | |
106 | Host Based Internal Intrusion Detection System by Using Data Mining and Forensic TechniquesProf.Rucha Dixit, Pacharne Vrishali, Ghorpade Sayaliraje, Palase Amruta, Avhad Pallavi109 |
1 | |
107 | Mobile based Anti-Phishing Scheme using QR CodeProf. Rukaiya shaikh, Sharma Mala, Ansari Salman, Sher afgan110 |
1 | |
108 | Refined Techniques for Collision Avoidance and Comparison of Different AlgorithmsProf.Baltej Kaur, Sakshi Rajendra Waghmare, Snehal Vitthal Bhosale, Chandni Navnath Nagargoje, Dipali Tukaram Kendre112 |
1 | |
109 | An Automated Swarm Based Agriculture RobotMayur Bawaskar, Nikhil Tehare, Jaywardhan Mane, S.S.Sayyad112 |
1 | |
110 | Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial IntelligenceRasika Deodhar, Isha Deshpande, Rutuja Gandhi, Suraj Jadhav, Shital Kakad113 |
1 | |
111 | Financially Assisted Student and Information Management System (FASIM) for Auto-Allocation of Funds Using Mean Stack ImplementationProf. D.S.Zingade, Amruta Gaikwad, Shrushti Thorat, Aemal Shah114 |
1 | |
112 | Single and Multispeaker Voice Recognition in AndroidTanmay Naskar, Anket Sah, Akshay Mense, Neha Patekar, Nikhatjahan Kankurti, Dr. Neeta Deshpande, Suvarna Kadam115 |
9 | |
113 | Content Based Image Authentication and RetrievalDeepashree Deshmukh, Divya Holkar, Sayli Mangle, Nikita Navale, Pranjali Kuche116 |
1 | |
114 | Search Recommendation System for Mining Query FacetAkshay Kadam, Sachin Shinde, Rahul Mallesh, A.B.Waghmare117 |
1 | |
115 | Anomaly Detection using 3D Convolution Neural NetworkNiket Tangadpalliwar, Shubham Thapa, Vinit Rege, Kuldeep Singh, Prof. Priya U. Thakare118 |
2 | |
116 | Security Preserving Friending in Mobile Social NetworksAditya Waghmare, Ashish Kothawade, Prajakta Kakade, Bhagyashri Markad, B. L. Dhote119 |
1 | |
117 | Authorized Auditing of Big Data on Cloud StorageProf. Vijay Sonawane, Sachin Kore , Rajendra Mane, Ajay Pawar, Punam Adling, Vaishali Gorhe120 |
1 | |
118 | Contactless Vein Structure Sensing Authentication TechnologySakshi Chavan, Saurabh Koli, Mrunali Wankhede, Varsha Dange121 |
1 | |
119 | Design and Implementation of ADDER Circuit using Quantum Dot Cellular Automata (QCA)Koppala Chandra Sekhar, Niddana Prabha122 |
1 | |
120 | Web Based Application for Timetable and Feedback Generation SystemTanuja Padale, Manisha Bhagat, Harshada Mane, Shobha Nangare123 |
1 | |
121 | Feature Specific Sentiment Analysis for Product ReviewsRakshith P, Madhura Geetha S124 |
1 | |
122 | An Implementation of NFC Based Restaurant Table ServiceAditya. R, Anirudh. K. R, Karthik. K. S, Mahinder. P, Deepa. S. R7 |
2 | |
123 | An Extensive Approach in Advancement of Software Defined NetworkingDr Khushboo Tripathi, Deepthi Sehrawat126 |
1 | |
124 | A Highly Enhanced Deep Learning Method to Deal Cyber browbeatLatha R, Praicy Joseph, Archana D, Nanditha C M, Jayasheela B N127 |
1 | |
125 | Frequent Item Set Generation Using Improved PSO over Generalized Transactional DatasetSweta Mishra, Yamini Chouhan128 |
1 | |
126 | Continuous and Transparent User IdentityVerification for Secure Internet Services129 |
2 | |
127 | Automatic Data Replication in Online Social NetworkSupriya F. Rathod, Prof. A.V. Deorankar130 |
1 | |
128 | Wireless Communication Locker with Advanced Security System using GSM, RFID and OTP TechnologyPrutha Suroshi, Radhika Hambire, Priteshsingh Chandel, Milana Malvadkar131 |
2 | |
129 | IOT Based Dual Purpose Web Application for Smart Public TransportationSupritha R Kumar, Dr. M C Padma132 |
2 | |
130 | RFID Based Intelligent Book Finder Using Ultra High Frequency SensorNithya.M, Solaiyammal.K133 |
1 | |
131 | Prediction of Breast Cancer Using Mammogram Images by Data mining on the Extracted Features of the processed ImageTarun Gangil, Sneha Prajwal134 |
1 | |
132 | Online Examination System Based On Student Authentication Using LTP& OTPMisal Vijaya Balu, Nare Payal Rajendra, Udare Sanjana Sanjay137 |
1 | |
133 | Augmented Security by TPA in Cloud ComputingSashibala, Deepika Goyal135 |
1 | |
134 | Dynamic Room Allocation and Online Check-in Check-Out form to HostelVidya Myageri, Vaishnavi Katti, Shruti Kulakarni, Vyshnavi.K, Yerraguntla Rajeswari136 |
2 | |
135 | A Child-Left behind Warning System Using Capacitive Sensing PrincipleRakshitha, Anju Mariya George, Blesson Babu, Christeena Joseph, Shilpa T V138 |
5 | |
136 | Auto-Aid Agro Seeding Bot Equip with Machine LearningNikhil Belwate139 |
1 | |
137 | Improving Quality of Satellite Images Using Enhancement Filters and Fuzzy Based Contrast Enhancement TechniqueVijay Tonder, Vivek Shukla, Rohit Miri140 |
4 | |
138 | Data Privacy using Multiparty Computation based on Homomorphic Encryption SchemesV.Satish Kumar, MD.Fayaz141 |
3 | |
139 | Home Automation Control with Web VisualizationAsst. Prof. Anant More, Unmesh Bhalerao, Akshay Bhasal, Ankeet Deshmukh142 |
1 | |
140 | Prepaid Toll Collection Using Barcode ReaderCharul Bhalerao, Shubham Kulkarni, Prof.Anant More143 |
1 | |
141 | A Secure And Dynamic Multi Keyword Ranked Fuzzy Search Scheme Over Encrypted Cloud DataKapil Kasture, Rohan Tanpure, Piyush Dhale, Venkatesh Ghalge144 |
1 | |
142 | Social Network Aggregator using Crawler and Document ClusteringNeetu, Deepti Sharma145 |
1 | |
143 | An Initial Imperative Study on Big DataMayushi Chouhan, Makhan Kumbhkar147 |
2 | |
144 | A Framework to Provide Assured QoS on Increasing of Profit using Cloud ComputingPramod Swami, Akshay Sutar, Harshal Patil, Prof. Y.V. Kadam148 |
3 | |
145 | Automated Food Product Status Tracking Mobile ApplicationAnshul Bansal, Durva Deshmukh, Shreyans Kering, Vimal Dev, Shraddha .R. Khonde149 |
6 | |
146 | Load Balancing and Task Scheduling in Multi-Cloud SystemNihar Ranjan, Hemant Nagori, Raviraj Adsul, Rishikesh Shinde, Shubham Ruhatiya150 |
3 | |
147 | MSEB Smart Meter ReadingAjinkya Gaidhane, Akash Gawali , Sanket Salave, S.V.Mogre151 |
1 | |
148 | Solar Powered Lawn Mower for Grass TrimmingAsst. Prof. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble152 |
1 | |
149 | Web Base and Android Base Automatic Dairy SystemSupriya Pathare, Komal Mahangare, Prerana Gayke, Rutuja Dhakne, Deshmukh P. R.153 |
2 | |
150 | Embedded Visual Cryptography for Secret Color Images Sharing Through Stamping Algorithm and OTP ProcessN.N.Thorat, Raju U. Jondhale, Lokesh B. Dandgole, Ravi R. Wadikar |
1 | |
151 | Electricity Theft Detection and High Alert Techniques Using PLCProf. Saylee Begampure, Rutuja Gawade, Aditi Yevale, Sonali Bhor155 |
2 | |
152 | Intelligent Interactive Robot with Gesture Recognition and Voice FeedbackProf. Sachin Magadum, Aniket Salve, Atul Shitole, Ajay Wadkar156 |
1 | |
153 | VEDIKALACH IMPLEMENTATION IN VLSIProf. R.U. Shekokar, Abhijeet Honwalkar, Akshay Patil, Swapnil Khalse157 |
1 | |
154 | Solar Powered Lawn Mower for Grass TrimmingProf. Mrunali P. Makwana, Vynkatesh Pandit, Saurabh Sindphalkar, Vinayak Kamble158 |
1 | |
155 | Accident Detection and Alerting System with Rescue of AmbulanceProf. Varsha Kshirsagar, Ajay Gavhande, Shubham Deshmukh, Yogesh Daswadkar159 |
1 | |
156 | Utilization of the Channels for Multicasting Wireless Multimedia in Wireless Mesh NetworksShruti Shinde, Prof. Meeta Bakuli160 |
1 | |
157 | Optimal Sitting of PV-Wind-Energy Storage System Integrated Micro Grid Using Artificial Bee Colony Optimization TechniqueDr.Vijay Raviprabakaran, Sowmya Ramachandradurai161 |
1 | |
158 | Comparison of Data Mining Algorithms for Effective PerformanceNikhil Belwate162 |
1 | |
159 | Data Transfer of Touch Devices Using Drag and DropPROF. SWATI. H. PATIL, SHESHANK RANAWARE, SANKET TUPE, ARFAN GHORI, AKSHAY WAGHMODE, GAJANAN JADHAV163 |
1 | |
160 | Comparative E-Business Portal for Different Marketplaces using HadoopProf.A.S.Devare, Prof.N.B.Chopade, Priyanka Chatane, Shweta Doiphode164 |
1 | |
161 | Automatic Accident Detection and Alerting System Based on IOTSurekha Pinnapati, Manjunath Kamath K, Carmal Joseph, Dayana Thomas, Jibin P Babu, Jithin P Babu165 |
2 | |
162 | Privacy-Preserving of Encrypted Cloud Data through Dynamic Multi-Keyword SearchRahul Barate, Rohidas Chorghe, Pankaj Palaskar, Tukaram Sude, Prof Dhanshree Kulkarni166 |
1 | |
163 | VANET System for Traffic ManagementPriyanka Shinde, Dr.S.B.Dhonde167 |
1 | |
164 | E-Traffic Police: A Professional Platform to Increase Efficiency between Government and CitizenPraveen Pandey, Ritika Arya, Shailesh Khandelwal, Piyush Kumar, Prof. N A Dhawas168 |
1 | |
165 | Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks ApplicationsPooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi169 |
1 | |
166 | Literature Survey on Noise and Redundant Data on Web PagesSekhar Babu.Boddu, Prof.Rajasekhara Rao.Kurra170 |
1 | |
167 | Survey on Secure Off-Line Payment Solution for Physical Unclonable FunctionsNamitha J, Bhavya Shree J, Santhosh N, Kiran Kumar N, Himabindu U171 |
1 | |
168 | An Android based Employee Monitoring SystemProf. Mukram Ansari, Shinde Bhagyashri, Pawar Dattatray, Dorage Rahul173 |
1 | |
169 | Advanced Intrusion Detection and Protection System Using System Calls Forensic TechniquesProf. Sheetal Kusal, Madhumati Totre,Varsha Mane,Neha Pimple, Pravin Kumbhar174 |
1 | |
170 | Implementation of Access Control Protocol with Node Privacy in Wireless Sensor Networks ApplicationsPooja Patil, N. S. Sirdeshpande, Giridhar. S. Sudi175 |
1 | |
171 | A Technical Review on Health Monitoring System at Household Using IOTDr. Jitendranath Mungara, Kavitha K K, S Akshya, Vishal Petkar176 |
4 | |
172 | Security in Patient Data Communication using Encryption AlgorithmNikita S. Karekar, Dr. Prof. R. S. Kawitkar177 |
1 | |
173 | Multi-Modal Topic Modeling of Data and Summarization of Events and ReviewsPrajakta Sonone, Prof. A.V.Deorankar178 |
1 | |
174 | JADE Based Bidding System for E-CommercePrince Abraham179 |
3 | |
175 | A Survey of Phishing Website Detection TechniquesJyoti Vaibhav Jadhav, Prof. Krishna Kumar Tripathi180 |
1 | |
176 | Design and Implementation of a Wireless Video Transmission System Using Adaptive Channel Coding TechniquesShilpa.S, Prof.Ruckmani Divakaran181 |
2 | |
177 | Classification of Diseases on the Leaves of CottonDarshana S. wankhade, Vijay L. Agrawal182 |
2 | |
178 | A Survey on Software Defined Network: A New Era of NetworkingSantosh Kumar183 |
1 | |
179 | Classification of Web Search Results Using Modified NaĂŻve Bayesian ApproachBhagyesh P. Asatkar, Prof. K. P. Wagh, Dr. P.N. Chatur184 |
1 | |
180 | Smart Home Security and Safety System using Bluetooth spp pro ModuleP. Naresh, N.Ramesh185 |
1 | |
181 | IOT Based Data Analytics and Web Monitoring of Energy Load Profiling for the HouseholdsSuvidha Biradar, Prof. Rahul Hiware186 |
1 | |
182 | Wi-Fi Embedded Universal Remote via SmartphoneProf. Sarika Khope, Sumit Kumar ojha, Shivani Sanjay Kamble187 |
1 | |
183 | Analysis of Image Restoration by Non Blind Technique using MATLABAvinash Srivastava, Dr. Pankaj Sharma188 |
1 | |
184 | A Survey on Routing Protocols in Mobile Ad-hoc NetworksSherjung, Dr. R. K.Sharma189 |
2 | |
185 | Counter Measure for Web Application Vulnerabilities using Augmented AlgorithmNeha, Sachin Shrivastava190 |
1 | |
186 | Content Based Image Processing Approach on Colored Images using KNN ClassifierManpreet Kaur, Suchitra191 |
1 | |
187 | A Review on Extensible Regular Humanistic Observable Impression Scooping Multivarious Physical FactsSneha D Patil, Dinesh D Patil192 |
1 | |
188 | A New Scheduling Algorithm for Real-Time Communication in LTE NetworksRohit Gore, Mininath Mahanavar, Akshay Khutale, Bhalchandra Mane, Prof. Priyadarshini patil193 |
1 | |
189 | Lung Pattern Classification for Interstitial Lung Diseases Using a Deep Convolutional Neural NetworkNamrata Bondfale, Shweta Banait194 |
6 | |
190 | Survey on Smart Sensors for Power Management in Intelligent Buildings using WSNMitkari P.C, Dr Mane P.B195 |
1 | |
191 | Advanced Healthcare System Using IOTSanjay D. Dhandare, Prof. Dr . S. M. Mule196 |
2 | |
192 | Review on Detection of Pedestrian Crossing for Safe DrivingTushar D. Patil, Prof. Archana B. Kanwade197 |
2 | |
193 | An Overview of Different Mechanisms to Detect Plant Leaf Disease Infected AreaParikshit N. Wankhade , Prof. G. G. Chiddarwar198 |
1 | |
194 | A Fully Digital ASK Demodulator with Digital Calibration for Bioimplantable DevicesAarti Zope, Rashmi Mahajan199 |
1 | |
195 | Automatically Mining Query Facet for Online Content MiningAkriti Verma, Bhagyashri Bhamare, Dipak Sanap, Ravindra Gorde, Prof.Tejaswini Adikane200 |
1 | |
196 | Hybrid Big Data Approach For Secure Authorized DE-duplicationGharge Nitin S., Bhor Ganesh G., Karajange Ganesh M., Jagdale Pravin R., Prof.Kadam Yogesh V201 |
2 | |
197 | Two Dimensional Cryptography Using Modified Pallier CryptosystemJadhav Rohini, B. S. Kurhe202 |
2 | |
198 | Twitter Sentiment Analysis of Demonetization on Citizens of INDIA using RShiv Kumar Goel, Sanchita Patil203 |
6 | |
199 | A Survey on Secure E-mailing System with Cryptography Using Fibonacci SeriesAbdul Quader Quazi, Pavan Y. Maddikar , Kiran K. Tangod204 |
2 | |
200 | Real Time Monitoring of Change in Temperature with CO2 using IOTDr. Jitendranath Mungara, Kavitha K K, Mahesharan P, S Akshya, Shaik Mohammad Sajid, Vishal Petkar205 |
3 | |
201 | An Efficient Technique for Runtime Distributed Web Caching with Knowledge based ClusteringAnkita Sharma206 |
1 | |
202 | A Review on Vehicle Identification and Tracking System in Java and Open-CV and Kohonen’s Neural NetworkMandal Akash, Atri Kapil, Alkute Mahesh207 |
2 | |
203 | IOT Based Monitor and Control of Smart Grid Energy Sources using VLSIPriyanka B. Deshmukh, Prof Hemangi N. Patil208 |
1 | |
204 | Compare Multi View & Multi Modal Image Fusion Based on Edge Preserving Decomposition, Guided Filter, Gabor Wavelet TechniquesM.Hema, Dr. D.Gowri Sankar Reddy209 |
2 | |
205 | Daily Life Activity Tracking on AndroidAyesha Samreen210 |
1 | |
206 | Daily Life Activity Tracking on AndroidAyesha Samreen210 |
1 | |
207 | Performance & Analysis of High Data Rate Wireless Optical Communication for Short Range ApplicationDivya Tyagi, Dr. A.K. Gautam211 |
1 | |
208 | Implementation of Predicting Terrorist Incident Using Real Time Big Data AnalysisShenkar Amol Shivaji, Prof.B.S. Kurhe212 |
1 | |
209 | Leveraging Route Maps by Partial queries with Cache-SupportS Swetha Reddy, M.Hymavathi213 |
1 | |
210 | Ontology Based User Adaptive Web PersonalizationAbhijit Vaidya, Prashant khoje214 |
1 | |
211 | Analysis of Attacks and its prevention using Encryption in Cloud ComputingAnmol Bhatia, Gaurav Garg215 |
1 | |
212 | Review on Configurable and Low-Power Mixed Signal SOC for Portable ECG Monitoring ApplicationsShubhangi S. Dhuma, S.K.Bhatia216 |
1 | |
213 | Multimedia Data Mining Using Deep LearningAditya Welhal, Shambhu Singh, Santosh Hundekar, Pravin Singh, Prof.A.G.Dombe217 |
1 | |
214 | Improved Scaling for Image Quality Enhancement in Digital Image WatermarkingSarvjeet Kamna Devi, Nancy218 |
1 | |
215 | Priority Based Congestion Control Clustering Protocol Using Load Balancing in WSNKamini, Prabhjit Singh219 |
1 | |
216 | An Efficient Data Replication on Cloud Computing using MBFD with Mutual InformationSupriya Kumari, Prof.Shradha Pandit220 |
2 | |
217 | A Survey on Design of Vehicle Diagnostics System Based on Cross Platform ApplicationShivani S. Gawande221 |
1 | |
218 | A Survey on Opportunistic Scheduling for Traffic Networks with Multiple ConstraintsPooja N. Nimbalkar222 |
2 | |
219 | Detecting and Preventing Denial of Sleep Attack using KeyGen (Key Generation) AlgorithmUsha C. Khake, Pooja L. Chelani, Vandana S. Lokhande223 |
1 | |
220 | A Survey on E-Prescription SystemSivaranjani J, S Rajeswari, Dr. Jitendranath Mungara224 |
3 | |
221 | Hand Gestures Recognition System for Deaf, Dumb and Blind PeopleChannaiah Chandana k, Nikhita k, Nikitha P, Bhavani N K, Sudeep J225 |
4 | |
222 | Design and Implementation of Address Generator for WiMAX DeinterleaverRasika Ramchandra Kulkarni, Prof.Preeti Rajput, Dr.V N Nitnawre226 |
1 | |
223 | Review on Amalgamated Metrics Estimation Methods for Software Project ManagementVishakha Sharma, Gaurav Garg227 |
1 | |
224 | Efficient Algorithms for Mining High Utility item sets from Transactional DatabasesSharayu Fukey, P. M. Chawan228 |
1 | |
225 | Mining Social Media Content for Analysing Employees’ Working ExperiencesAnjali Pawar, Rhiddhi Khartadkar , Sankalp Kale, Kiran Naik, , Priyanka R. Rajmane229 |
1 | |
226 | Recognising and Handling Malware Propagation in Large Scale NetworksDr.Jitendranath Mungara, Shwetha KS, Shishir Umesh, Rashmi Priya, Shobitha G230 |
2 | |
227 | Design and Detection of Social Media Botnets using Event-Driven AnalysisPayal Chandak, Prof. H. P. Channe231 |
2 | |
228 | 3 | ||
229 | Fault Tolerance and Recovery to Minimizer Energy Consumption in Job AllocationAvneet Kaur, Divyajot Gill233 |
2 | |
230 | Temporal Topic Model for Friend Recommendation SystemJayashri Vijay Thorat234 |
1 | |
231 | License Plate Detection and Recognition Using a HOG Feature Based SVM ClassifierVivek Joy, Binu A., Kuttyamma A. J.235 |
1 | |
232 | Enhanced Energy Efficient Routing Algorithm using Cluster Heads Maximizing Network LifetimeAnjali, Sachin Srivastava236 |
5 | |
233 | Detection of Storm and Signalling Attack in Wireless Sensor NetworkNamrata Sawant237 |
1 | |
234 | Fine Grained Authentication Method for Web Based Cloud ServiceKarishma Tamboli238 |
1 | |
235 | A Review on Comparative Analysis of Indoor and Outdoor Positioning TechnologyRashmi C Chaudhari, Prof. Mahesh M Sadavarte239 |
1 | |
236 | Computer Control with Voice Command (MFCC) using Ad-hoc NetworkPooja, Mukesh Kumar240 |
1 | |
237 | Data Mining Study and Analysis for Semi Structured Data Extraction Using XMLVersha, Deepika Garg241 |
2 | |
238 | Semantic Image Segmentation by Deep Convolution Nets and Watershed TransformationSahana Patil, Sandeep Kumar242 |
1 | |
239 | Optimized Joint Stable Routing and Channel Assignment for Mobile Ad-hoc Cognitive NetworkNavya P, Badarla Sri Pavan243 |
1 | |
240 | Hand Gesture Recognition using DTW and Morphological Feature ExtractionSindhu. K. M, Suresha.H.S244 |
2 | |
241 | IOT Based Architecture for Patient Health Monitoring SystemRakshith Babu H V, Prof. Latha. S245 |
2 | |
242 | Detection of Neovascularization on Optic Disk Region based on Kernalized Fuzzy C-Means and ANN ClassifierVanitha L. B, Prof. Preethi. S246 |
2 | |
243 | Plant leaf Classification using Artificial Neural Network ClassifierSuman S. G, B. K. Deshpande247 |
2 | |
244 | The Improved Image Steganography with Encryption Method and to Overcome the Compression TechniqueAshwini W, Nagraj Kyasa248 |
1 | |
245 | Resisting Black hole Attack in MANETR.Siva Subbiah, Dr. K.E.Kannammal249 |
1 | |
246 | A Comparative Survey on Load Balancing Algorithm in CloudSurbhi Nema, Prof. Saurabh Kapoor250 |
1 | |
247 | A Survey: DDoS Attacks and its Effects on Cloud EnvironmentNishalee Choubey, Prof. Saurabh Kapoor251 |
1 | |
248 | Survey on User Authentication for Cloud ComputingNeha Bairagi, Prof. Saurabh Kapoor252 |
1 | |
249 | Efficiently Resource Allocation In Cloud Scheduling Using Differential EvolutionDolly, Er. Suchitra253 |
1 | |
250 | Survey on Malware Detection in Cloud Computing InfrastructuresNimith Shetty M, Kaushik C Reddy, Gangadhar Immadi254 |
1 | |
251 | EEARP- Enhanced Energy Aware Routing Protocol for WSNsAnshu Verma, Narendra Kumar Gupta255 |
1 | |
252 | Energy Efficient Image Data Offload Mobile Cloud ComputingSridhar S K, Keerthi G, Manjuladevi P, Masarpu Swathi, Nethravathi256 |
2 | |
253 | An Efficient Deduplication and Data Sharing with Dynamic Ownership Management for CloudSukanya Gunjal, Prof. B. S. Kurhe257 |
1 | |
254 | Enable Data Sharing Scheme for Dynamic Groups in the CloudJyoti Pingat, Prof P. R. Ugale258 |
1 | |
255 | An Efficient Coding Scheme for an Optimal Solution for Data Coding in Cloud Storage SystemSupriya Datkhile, Prof. P. R. Ugale259 |
1 | |
256 | Trend Analysis Using Hadoop and Its EcosystemsDeepak Ranjan, Dr. Tripti Arjariya, Dr. Mohit Gangwar260 |
2 | |
257 | Generating Optimal Result for Fraud Detection Using Data MiningPunam Bagul, Sachin Bojewar261 |
2 | |
258 | An Authenticated Trust and Reputation System for Hybrid CloudSindhu B S, H M Sanjay262 |
1 | |
259 | Clustering of Datasets Using K-Means Algorithm in SPARKSubiksha N, Pallavi R Reddy, Mounica B263 |
2 | |
260 | Smart Device: A Smarter Way to find the Packed Food QualityR Suganya264 |
2 | |
261 | SmartCrawler: Proficiently Harvesting DeepWeb Interfaces Using Two Stage CrawlerGhanshyam Patil, Prof. U. H. Wanaskar265 |
1 | |
262 | Analysis of Different Load Flow Technique with Distribution ResourcesPriyal Kumari, Varsha Mehar266 |
1 | |
263 | A Survey of Different Compression Technique for Biomedical Signal (ECG)Saroj Dashariya, Prof. Akhilesh Singh Thakur, Dr. Rahul Dubey267 |
1 | |
264 | A Survey on Image Security using Visual CryptographyFarah Khan, Prof. Deepa Gianchandani268 |
1 | |
265 | A Survey Report on Search Engine Optimization and Network SecurityAnuraj Singh269 |
1 | |
266 | A Review on Video Object TrackingSandhya Tiwari, Prof. Kapil Gupta, Dr. Rahul Dubey270 |
1 | |
267 | A Survey on V/V Secure Communication over VANET DSRCNikhlesh Namdev, Prof Rovin Tiwari, Dr. Rahul Dubey271 |
1 | |
268 | Trusted Computing in Cloud ArchitectureNeelam , Rachna272 |
5 | |
269 | Phishing Techniques and Preventive Measures - A ReviewAeshwarya , Suman kumari273 |
1 | |
270 | Prediction of Stock Market using Neural Network for Increasing AccuracyKaveri Deshmukh, Shubhrata Mahajan, Bhavana Samel, Prof.Chate P.J274 |
1 | |
271 | Usage and Analysis of Estimation Techniques in Software Project ManagementVishakha Sharma, Gaurav Garg275 |
1 | |
272 | Sketch Based Image Retrieval using Saliency MatchingSafiya P.C, Niyas N276 |
1 | |
273 | A Survey on “Two-Level QR Code for Document Authentication”Madhuri Mohanrao Jagtap , Prof. S. K. Bhatia277 |
1 | |
274 | An Effective Survey on Mining Weakly Labelled Web Facial Images for Search-Based Face AnnotationPooja P. Gadhave278 |
1 | |
275 | Resource Optimization Based Scheduling Algorithm in Cloud EnvironmentPriyanka Dhurvey, Nagendra Kumar279 |
6 | |
276 | Face Detection Technique Using Neural NetworkShalu Kansal, Suchitra280 |
1 | |
277 | Optimization Techniques for Efficient FPGA Hardware Implementation on IRNSS User ReceiverShachi Varku, Sharanya S Konandur, Swetha A, Akalpita L Kulkarni281 |
3 | |
278 | Design and Implementation of 4-Bit ALU using FinFET TechnologySmt.A.Nagamalli, N.Vivek Naga Bhushanam, O.Nagasai, P.Swathi282 |
2 | |
279 | A Survey on Radiofrequency Tissue AblationHemant Sahu, Davender Singh283 |
1 | |
280 | A Survey on External Security Threat with Defense Mechanism for Wireless Sensor NetworkProf.Sagar Thakare, Manjusha Nimbalkar, Richa Nabar284 |
2 | |
281 | Novel Approach for Image Fusion Using NSCT and Masking TechniqueDeepika M, Thippeswamy K H285 |
1 | |
282 | Improved Rule Mining Classification Algorithm Based on Particle Swarm OptimizationD.Senthil Kumar, Dr.N.Jayaveeran286 |
1 | |
283 | Design an Architecture for Object’s Feature Extraction and Retrieval of a Gray Scale ImagePooja Garg287 |
1 | |
284 | Credit Card Fraud Discovery: A SurveyRitika Wadhwa288 |
1 | |
285 | A Survey on Security Improvements in VM Allocation of Cloud Computing to Defend AttacksRevati Vijay Rajane, Prof.Pradnya Kasture289 |
3 | |
286 | A Secure Method Using Cloud in Anti-Collusion Data Sharing Scheme for Dynamic GroupsNidhi N G, Padmashri A M, Poojitha M, Pooja S, Deepashree N S290 |
2 | |
287 | Offline Kannada Handwritten Word Recognition Using Locality Preserving Projections (LPP)Pooja K Gowda, Chethan S , Harsha J , Rakesh J, Tanushree K N291 |
1 | |
288 | A Study on 4pioneering Technologies Imminent With CybersecurityM.Anitha Priyadharshini, S.Nivedha292 |
1 | |
289 | Performance Evaluation of Neural Network based Cognitive eNodeB in LTE UplinkRajat Urade293 |
1 | |
290 | Review on Fir Filter Designing Using Wavelet TransformKavya Dwivedi, Dr.Ravindra Pratap Narwariya294 |
1 | |
291 | Saliency-based Feature Assessment for Color DeficientsMonali G. Meshram, A. M. Shah295 |
1 | |
292 | A Survey Paper on Cloud Security Issues and ChallengesPankaj Singhai, Prof. Saurabh Sharma296 |
2 | |
293 | Cloud Computing Security Issues and ChallengesAman Shrivastava297 |
1 | |
294 | Innovative Approach towards Interactive Classroom Sessions using an ICT Tool – KahootShibani Kulkarni, Neeta Takawale298 |
3 | |
295 | Implementation of Security System Using IOTAbhijeet Suresh Mendhe, Divya Meshram299 |
1 | |
296 | IIR Filter Design Techniques – A Critical ReviewKratika Chaudhary, Dr Ravindra Pratap Narwaria300 |
1 | |
297 | Safe Drive Assistance SystemDipali Dilip Narwate, Prof.Rashmi Mahajan301 |
1 | |
298 | A Study on Neural Network in Image ProcessingSudhir Kumar, Davender Singh302 |
1 | |
299 | Multi Skill Oriented Spatial CrowdsourcingArun.S.Dalvi, Prof P.N.Kalavadekar303 |
2 | |
300 | Multi-Client Real Time Communication using BrowsersKajal Janghale, Chetali Mahore, Supriya Kakade, Kirti Narbag, Mayuri Thakare, Prof. P. M. Chawan304 |
2 | |
301 | Online Evaluation of Project Report and Technical Paper for Educational InstitutesShweta Monde, Suyog Manore, Tharun Naidu, Karan Manwar, Prashant Lokhande305 |
2 | |
302 | A Survey on A Weighted Method Based Technique for Vertical Handover Decision in Multi Network Wireless EnvironmentSandeep Kumar, Sandeep Goyal306 |
1 | |
303 | Enhancing Grid-FTP Protocol to Facilitate Full-Duplex Data CommunicationRevansiddh Patil , Prof. S.A.Khuba307 |
1 | |
304 | Data security in QR code using SteganographyBhakti Magadum308 |
1 | |
305 | A Critical Review on Image Fusion TechniquesLata Kuswaha , Dr. Vandana Vikas Thakare309 |
1 | |
306 | Video Steganography through RC4 Cryptography with Random Sequence of Data HidingSapna310 |
2 | |
307 | Saliency-based Feature Assessment for Color DeficientsMonali G. Meshram, A. M. Shah311 |
1 | |
308 | Road Navigation Improvement Using Route Data AnalysisFaizal Ahmed, Divakar H.R312 |
1 | |
309 | Hospital Queueing Recommendation System Using Spark Streaming For Big DataSneha Girolla, Sunil Rathod313 |
1 | |
310 | Design and Implementation of a System for University Automation AssessmentRaghavendra V, M S Sowmya, Gokul G, Mohammed Inzamamul Mistery, Sahil Jakhar314 |
1 | |
311 | Deduplication and Secure Auditing Of Data in Cloud with Convergent Key ManagementKunal S. Bhutwani, Prof. S. P. Kosbatwar315 |
1 | |
312 | Comparative Analysis of Various Routing Strategies in the Framework of the Proposed ModelsMohammad Alhihi316 |
1 | |
313 | To Measure the Performance of DWDM Ring Network Using RZ and NRZ ModulatorsRamandeep Kaur, Dr. Renu Dhir317 |
1 | |
314 | Development & Implementation of Custom Connectivity Protocol for Identification and Tracking of Public Transit Vehicles Using Portable and Station NodesErabathini Chetan Laxmirajam, Dr. Prof. R. S. Kawitkar318 |
1 | |
315 | Achieving Secure, Scalable, Data Group Sharing Using Key Aggregate Searchable Encryption in CloudRajeshree K. Duratkar, Prof. Sonali A. Patil319 |
1 | |
316 | Video Retrieval by Detecting Key Frames in CBVRPoonam V.Patil, Prof.S.V.Bodake320 |
1 | |
317 | A Study and Analysis of Mutual Authentication Security Issues and Solution Schemes in WiMAX 802.16Sher Singh, Gaurav Garg321 |
1 | |
318 | Alignment-Free Fingerprint with iris Cryptosystem Based on Pair-Polar Minutiae Structures with Multiple Fuzzy Vault and Minutia Local StructuresPriyanka Vethekar, Dr. Archana Lomte322 |
2 | |
319 | Secure Access to Encrypted Cloud DatabaseChandan M N, Prof. Divakar H.R323 |
3 | |
320 | A Survey on Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social NetworksKirti Nagargoje, Prof. Archana Lomte324 |
2 | |
321 | Image Authentication Using Cryptography and Steganography in Network SecurityDeepak Shailendra Singh , Prof. Mrunali Metri325 |
1 | |
322 | A Review on: Network Traffic Classification using Bi Graph and ProjectionPrital Mahadev Kadam, Prof. Prajakta Satarkar326 |
1 | |
323 | Wireless Environment Monitoring System Using WiFiPuja Patil , Prof. M.K.Kodmelwar327 |
1 | |
324 | Last-Meter Smart Grid Embedded In an Internet-Of-Things PlatformNarendra Kumar Rajwade, Dr. S.D. Lokhande328 |
1 | |
325 | Intelligence Communication Protocol Based Monitoring and Control Home AppliancesThorat Madhuri B, Pokale N.B329 |
2 | |
326 | Survey on Learning Human Emotions from Body Gestures during Social Human–Robot InteractionsDiksha A. Shende, Dr. R. S. Kawitkar330 |
2 | |
327 | Implementation of Forward Security System for Data Sharing With Authenticity and Cost EffectiveMihir Mohapatra, Prof. N.P. Karlekar331 |
1 | |
328 | Brain Tumor Diagnosis Using Deep Neural Network (DNN)Suraj S. Gawande, Vrushali Mendre332 |
2 | |
329 | Survey on Beehive Erasure Codes for Distributed Storage SystemsMugdha Adivarekar, Vina Lomte333 |
1 | |
330 | Intelligent Recommender in Stock MarketMandar Ganesh Deshpande, Ashwin Prabhu, Nishi Tiku334 |
2 | |
331 | Fake Account Detection and Privacy Policy Inference based on content-based classification of User-Uploaded Images on Content Sharing SitesAnant Mandre, Prof. Sonali Patil335 |
1 | |
332 | Secure Data Sharing in Clouds by Using High Level Petri NetsPriti Kanhere, Prof. S.A.Patil336 |
2 | |
333 | Securely Mining UARSTP with Recommendation System in Document StreamsVarsha Ohol, Dr. Arati Dandavate337 |
2 | |
334 |
Enhancing Security using Knowledge Discovery and Data Mining Methods in Cloud Computing Pankit Arora, Sachin Bharadwaj 338 |
2 |