International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Intelligent Detection for Cyber Phishing Attacks using Fuzzy Rule-Based SystemsPHOEBE BARRACLOUGH, GERHARD FEHRINGER1 |
4 | |
2 | All-Optical 2R Regenerator Non-Linear Optic Based on the Mamyshev ModelFABIO B. DE SOUSA, ELIZETE R. SABINO, FABRÍCIO P. DA LUZ, JORGE E. DE OLIVEIRA, MARCOS B.C. COSTA2 |
1 | |
3 | An Enhanced Image Denoising technique using Wavelet Threshold and Genetic AlgorithmSUDAMA SAHU, BHUPENDRA VERMA4 |
1 | |
4 | A Review on Application of Adaptive Algorithms in Signal ProcessingJYOTI KAURAV, DR. R.P. NARWARIA5 |
3 | |
5 | Review of Scheduling Algorithm Followed in Parallel EnvironmentRAJITA SHARMA, GAGANDEEP SIANI7 |
1 | |
6 | Review on Load Balancing Algorithms in Cloud ComputingSHASMITA PANIGRAHI, DHANRAJ POOJARY, DR MURLIDHAR DHANAWADE8 |
2 | |
7 | Infrastructure as a Service with Apache CloudStack: A StudySUPRABHA MAHADIK, NASHRAH GHAWTE, DR. MURLIDHAR DHANAWADE9 |
2 | |
8 | DDOS Detection and Denial Using Third Party Application in SDNROSHNI MARY THOMAS, DIVYA JAMES10 |
1 | |
9 | Design and Implementation of a Network Security Model for Campus Network Using Various SecuritiesVARSHA, TOMAR KULDEEP12 |
2 | |
10 | A Comprehensive Study on Distributed Data Mining and Learning AlgorithmsSANJAY KUMAR SEN, DR. B.K. RATHA.48 |
1 | |
11 | The Survey – Predicting an Education Performance of Students Based on Data Mining TechniquesM. MAYILVAGANAN, D. KALPANADEVI49 |
3 | |
12 | Secure User Data and Images on Content Sharing Sites Using Virtual Password and APP SchemePRIYANKA M. LOKHANDE59 |
1 | |
13 | Performance Analysis of Real Time Task Scheduling AlgorithmGIRISH S. THAKARE, DR. PRASHANT. R. DESHMUKH68 |
1 | |
14 | Parameter Estimation of Nonlinear System - VanderPol Oscillator using Neural NetworksYUGCHHAYA DHOTE78 |
3 | |
15 | Performance Comparison of OFDM System with Different Modulation Schemes Using ISP Pulse Shaping TechniqueOMKAR PABBATI, DIVYANGNA GANDHI79 |
1 | |
16 | Design and Analysis of Low Power Temperature Sensor using Static Latch D Flip-FlopGANGOTRI PAREEK , GAJENDRA SUJEDIYA83 |
1 | |
17 | Optimize Circuit and Compare of 8 X 8 Wallace Tree Multiplier Using GDI and CMOS TechnologyPRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA84 |
1 | |
18 | Design and Analysis of 8 X 8 Wallace Tree Multiplier using GDI and CMOS TechnologyPRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA85 |
1 | |
19 | Technique for Sentiment Analysis from Twitter DataCHANDAN ARORA , DR. RACHNA93 |
3 | |
20 | Improved Load Balancing Algorithm for Reducing Idle Iteration in Virtual Machine on Hadoop Distributed File System (HDFS)G KANMANI, E JAYABALAN116 |
3 | |
21 | Speed Estimation of an Induction motor using Model Reference Adaptive ControlGOPI N195 |
1 | |
22 | Comparative Analysis of Different Feature Extraction Techniques used in Face Recognition – A ReviewNISHA, MAITREYEE DUTTA196 |
2 | |
23 | Design A Smart Relay in Advance Metering Infrastructure Using MatlabNEHA CHAPKE, PROF. SUYOG DAHULE197 |
1 | |
24 | Implementation on Overhead Reduction by Spatial Reusability in Multi-Hop Wireless NetworkPRAVIN V. JUNGHARE , PROF. U. R. GODASE198 |
1 | |
25 | Comparative Study of RGB, HSV & YCbCr Color Model Saliency MapSHRUTI V. GHINMINE, PROF. AMOL SAPKAL200 |
1 | |
26 | Elliptical Curve Cryptography Using RSDASHISH S.YADAV201 |
1 | |
27 | Analysis of Underwater Data using DNNDR. S.R.GANORKAR, PRIYANKA A. WANKHADE202 |
1 | |
28 | Secure Fragment and Replica Allocation of Data Using Geo-Social Attributes in CloudNIDHI JAIN, PROF. ABHIJIT JANARDAN PATANKAR, DR. KSHAMA V. KULHALLI, DR.KOTRAPPA SIRBI203 |
1 | |
29 | Cooperative Collision Free Packet Scheduling for Under Water Acoustic Sensor Network LocalizationJ. SUBBARATNAMMA, U. DHANUNJAYA205 |
4 | |
30 | A Novel Dictionary Selection Algorithm to Increase the Instruction Match RatesK.ISHRATH AFRIN, SRI P.MURALI KRISHNA206 |
1 | |
31 | A Framework for Preservation of Cloud User's Data PrivacyPANKAJ SINGHAI, PROF. SAURABH SHARMA207 |
2 | |
32 | A Review on Data Security and Privacy Issues in Cloud ComputingAKANKSHA AGRAWAL, DR. NITESH DUBEY208 |
2 | |
33 | Survey Paper on Data Privacy Issues of Cloud ComputingSHEFALI RAI, DR. NITESH DUBEY209 |
2 | |
34 | A Survey Paper on "Detecting Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems"PRIYANKA BHAGWAN PATIL, GANESH DHANOKAR210 |
1 | |
35 | Pattern Driven Internal Intrusion Detection and Protection System Using Data Mining and Forensic TechniquesDIPALI VIJAY KARCHE, PROF. AMRIT PRIYDARSHI212 |
1 | |
36 | Sensitivity Analysis of Immersion Corrosion Parameters in WC–10CO–4Cr Coated Brass Alloy for Extended SurfacesB. GURUPRASAD, S. GANESAN213A |
1 | |
37 | Proposition of a Hybrid Approach for Sentiment Analysis of Travel Domain DataA SRINIVAS, M HANUMANTHAPPA214 |
2 | |
38 | A Systematic study on Load balancing in Distributed ComputingIMMIDISETTY DEEPIKA, BADAM SRUJANA, SALINA ADINARAYANA216 |
5 | |
39 | A Survey on Two Level QR Code Authentication Using Image Encoding TechniqueTAHEMEENA GUNJARGE, KAILAS TAMBE218 |
1 | |
40 | Survey on Aging-Aware Reliable Multiplier Design Using Adaptive Hold LogicPRATIK CHUNARKAR , DR.M.B.MALI219 |
1 | |
41 | Fast Image Transmission by Using Byte Rotation Algorithm in Network SecurityAPURVA P. WAGHMARE, PROF. P. R. LAKHE220 |
1 | |
42 | Effects of ImpingementAngleinErosion Rate of HVOF (WC-Co-Cr) Coated Navel Brassin Water Jet ErosionK.MURUGAN, S.KARTHIKEYAN220A |
1 | |
43 | Enhanced Image Steganography using Texture SynthesisRASHMI A.SONAWANE, DIPTI SONAWANE221 |
3 | |
44 | A Comparative Study on LEACH Protocol for Wireless Sensor NetworkDR . S. G. SANTHI , N. TAMILARASI222 |
1 | |
45 | Improving Speed and Energy Efficiency of Cognitive Radios using Cross layer Multichannel Routing and CompressionSAPANA E. LOHABARE , SUMIT R.VAIDYA223 |
1 | |
46 | Optimizing Energy and Delay in Multichannel Cognitive Radios with Link MaintenanceSAPANA E. LOHABARE , SUMIT R.VAIDYA, P. D.BHIRANGE224 |
1 | |
47 | Music and Mood Detection using BoF ApproachHARSHALI NEMADE, DEIPALI GORE225 |
3 | |
48 | Selections from the History of Air Pollution and Modelling its Data in Countryside and Urban Environment Using Genetic AlgorithmYUVRAJ KSHIRSAGAR, R.W. GAIKWAD226 |
2 | |
49 | A Cooperative Bait Detection Approach in MANET to Detect Collaborative Attacks by Malicious NodesSWAPNIL WAGHMARE, PROF. MININATH NIGOT227 |
1 | |
50 | Vulnerability Analysis and Tracking of Covert Malicious Software LaunchingSURABHI DUBEY230 |
1 | |
51 | Behavioral Analysis of Candidates using Sentiment Analysis and Emotion Mining for RecruitmentSAGAR S. PATIL, PRAVIN S. GAME231 |
1 | |
52 | Optimal Design and Analysis of 12T MTCMOS and MCAM Using VLSISNEHA OAK233 |
1 | |
53 | Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARY155 |
1 | |
54 | A Study on Early Prevention and Detection of Breast Cancer using Data Mining TechniquesSUMALATHA.G, ARCHANA.S,6 |
1 | |
55 | An Identity Combined With Attribute Based Proxy Uploading and Integrity Checking in Public CloudPALLAVI S. KAULAGE, PROF. DR. S. N. KINI11 |
3 | |
56 | System Generator based area Reduction of IIR Decimation Filter using Merged Delay TransformationSMITHA G L, MEHARUNNISA S P18 |
1 | |
57 | A Review on Cognitive Radio Detection TechnologiesDEEPSHIKHA BHATI23 |
3 | |
58 | HuBot – Voice Controlled Human AssistantHARSH BHATIA, ZARANA MATANI, PRIYANK BHATT, YASHNASARPURI28 |
3 | |
59 | A Review on Security Threats and Cryptographic Solutions in Cloud ComputingVARSHA K, RACHEL MATHIAS31 |
2 | |
60 | Implementation of deduplication scheme for Encrypted Data in CloudAISHWARYA M B , ASHRITHA A, CHETANA C H, MAMATHA S, SNIGDHA SEN41 |
1 | |
61 | Low Power and High Speed CI_CSKA DesignSONAL AGRAWAL, SHRADDHA SHRIVASTAWA42 |
2 | |
62 | A Review on DCT and DWT based Image Compression TechniquesSUMANDEEP KAUR, ER. ARSHDEEP SINGH43 |
1 | |
63 | A Secured body Sensor healthcare Monitoring System for Elderly PeoplesJAHNAVI V , P KOKILA, SHRUTHI T S , SAMRADHA RAO, SUJAN KUMAR44 |
2 | |
64 | Survey on Defect Prediction and its Effect on Software QualityPRABUJEET KAUR, DHARMENDRA LAL GUPTA46 |
3 | |
65 | Image Classification using Multikernel Learning AlgorithmHARSHITHA L, DR.V S KRUSHNASAMY50 |
2 | |
66 | Measuring Conceptual Object Distance through Sensors using Raspberry piCHARULATA INGLE52 |
1 | |
67 | Robust Authentication Scheme for Graphical PasswordSNEHAL TARKESHWAR AMBADE, PROF. JAGDISH PIMPLE62 |
1 | |
68 | IoT based Survey on Healthcare and AgricultureHARI PRIYA.B, NANDHINI.S65 |
4 | |
69 | Adoption of Open source on Darbar Group of Institution - Impact and ChallengesPRAVEEN BADAMI, SHREYAS N KUTTY67 |
2 | |
70 | Towards Privacy Preservation of Kernel-Based Data Mining Systems from Insider Collusion AttackRUPESH SAMANT, U. H. WANASKAR76 |
2 | |
71 | A Survey: Different Techniques in Image Super ResolutionJETASHRI J.SHINDE, PROF. A.S.SHIRSAT80 |
2 | |
72 | A Survey On "Image Retargeting Quality Assessment: A Backward Registration Approach"SAMRAH SHEIKH, ANIL. S. SHIRSAT81 |
1 | |
73 | A Review on Dynamic Stand-Alone Gas Detection SystemDHOKTE RENU GAJANANRAO, M. H. NERKAR, ANCHAL KHADSE82 |
1 | |
74 | Shared Spreadable Cloud Data with Efficient Group User RevocationPHASALE PRIYANKA, DR.RANMALKAR VRUSHALI87 |
3 | |
75 | Design and Implementation of (15,7) BCH Encoder Using labVIEW and its Transmission using NI USRPPROF. M. D. BOBADE, ASHRU JADHAV, RACHANA KHAMAMKAR72 |
4 | |
76 | Brain Activity Detection and Analysis Using EEGVARUN VALLABHAN89 |
1 | |
77 | An IOT Based Health Care Monitoring System-A ReviewSNEHA N. MALOKAR, SAMADHAN D. MALI103 |
3 | |
78 | High Performance 60 GHz LNA Design for Variable Gain Amplifier by Using 150 nm GaAs TechnologyABHISHEK G GADE, DR. SANJEEVANI K SHAH106 |
1 | |
79 | Energy Saving Scheme of Wireless Sensor Network with Mobile SinkMAHESHWARI C.SHINDE, PROF.M.M.WANKHADE108 |
1 | |
80 | Interactive Interface for DC Motor using GUI with Raspberry Pi ControllerNITI RAJENDRA PATEL115 |
1 | |
81 | Automatic Facet Extraction for Search NavigationDUHITA PAWAR, PROF. VINA M. LOMTE118 |
1 | |
82 | Smart Internet Bot: A Topic-Specific Crawler for locating Deep Data of WebDEEPALI R. DHAYGUDE, PROF. P. B. MALI119 |
2 | |
83 | Video-Based Human Action Recognition: Comparative Analysis of Feature Descriptors and ClassifiersAISHWARYA BUDHKAR, NIKITA PATIL126 |
11 | |
84 | Face Aging Effect Using Sparse RepresentationSONAL AJMIRE, KARUNA BAGDE, PRABHAKAR RAMTEKE132 |
1 | |
85 | A Survey on Securing Logistics System with the Implementation of Digital SignatureMADHURI MALI, PROF. SANTOSH WAGHMODE135 |
2 | |
86 | Grain Condition Monitoring and Controlling System-A ReviewANITA M. JADHAV, MAKARAND N. KAKATKAR140 |
1 | |
87 | Real Time Parking Guidance SystemPOOJA POWAR , PROF. RAJENDRA BABAR141 |
1 | |
88 | Content Based Publisher/Subscriber Cloud Computing System using Event Matching SystemVINOD N. ALONE, SANJAY B. WAYKAR158 |
1 | |
89 | Obstacle Detection from Unmanned Surface Vehicle using HOGKALYANEE G. BARVE, SUNITA.S.LOKHANDE159 |
1 | |
90 | Secure Data Analytics for Heart Disease PredictionRAHUL S. BELLI, PROF. AJAY NADARGI160 |
1 | |
91 | A Survey on Dynamic Routing in Wireless Sensor Networks under Black Hole AttackCHARULATA C. GIRSAWALE , PROF. S. A. SHIRSATH167 |
1 | |
92 | Study of Heart Disease Prediction Using Data MiningGEETIKA SUNIL AGRAWAL, PROF. DINESH D. PATIL185 |
1 | |
93 | Implementation on Data Acquisition by Reducing Energy Hole EvolutionSIDDHARTH SUNIL BURSE , PROF. M.V. NIMBALKAR199 |
1 | |
94 | Survey and Comparisons of Low Power Multiplier Design in Term of Area, Power, DelayPOONAM P.KOKATE , PROF V.G.RAUT204 |
1 | |
95 | Sentiment Analysis and Ranking of the Products based on the ReviewsMONIKA RANI HG, SOURABH JAIN, MOHD DANISH AHMAD, MOHIT SEHRAWAT, RISHABH RAJ211 |
1 | |
96 | Implementation of ZHLS-GRP Hybrid Technique for Routing Protocols and BPSO in MANETsHARSHPREET KAUR, SUKHJEET KAUR215 |
1 | |
97 | Mining User-Aware Rare STPs in Document StreamsMR. SOMESH D. KALASKAR, DR. ARCHANA LOMTE232 |
4 | |
98 | An Efficient Algorithm For Nearest Location Search Using Skyline Query ProcessingPOOJA RAO, MANGLESH KHANDELWAL, VINOD KUMAR YADAV13 |
3 | |
99 | A Novel Technique in Review Selection Based on Micro ReviewMUMTAJ.L.PATEL, PROF S.P.VIDHATE14 |
1 | |
100 | Study on Mobile Cloud Computing Security Issues, Challenges and Preventive MeasuresPROF. DEEPALI SHAH, PROF. SEEMA BHUVAN, GANESH THITE, TEJNARAYAN CHAUDHARY15 |
4 | |
101 | Generation of Power using Perpetual MotionSHAKUNTHALA, PROF. NAGABHUSHAN, R. RADHA16 |
2 | |
102 | A Survey on Early Diagnosis of Lung Cancer using Classification Data Mining TechniquePRICILLA.S, PEBILA SHANI.S17 |
1 | |
103 | Vehicular Protected Data Transmission over Dual Authentication AlgorithmUZMA FARHEEN, DR.RUKSAR FATIMA19 |
1 | |
104 | Design and Implementation of Hybrid Algorithm for Load Balancing in Cloud Computing EnvironmentPOOJA YADAV, PROF.ABHILASHA VYAS20 |
1 | |
105 | Sharing Visual Traffic Information via Vehicular CloudDAMPETLA SREEKANTH1, MARI KIRTHIMA21 |
1 | |
106 | Multi-Keyword Ranked Search Scheme over Encrypted Cloud DataGHANSHAM R. RATHOD, PROF. SONALIPATIL22 |
1 | |
107 | A Survey on Digital Pulse OximeterSHILPI24 |
1 | |
108 | Entropy Optimized Feature-Based Bag-Of-Words Representation for Information RetrievalSWAROOP A.KALE, PROF. H.A.HINGOLIWALA25 |
1 | |
109 | Network Reconfiguration of Radial Distribution Network with DG using Cuckoo Search AlgorithmANJALI G, R.CHIDANANDAPPA, DR.T.ANANTHAPADMANABHA26 |
9 | |
110 | Survey On: "To Detect Ranking Fraud App with the Help of Discovery of Historical Record"PRITAM PORATE, M. S. NIMBARTE27 |
1 | |
111 | A Survey on "Water Monitoring System"PRAGYA JAIN29 |
1 | |
112 | Dual-Server Hybrid Key Encryption with Multi Keyword Search Scheme for Secure Cloud StorageSNEHA R. GHORPADE, PROF. DR. S. N. KINI30 |
2 | |
113 | A Secure Data Communication System Using Enhanced Cryptography and SteganographyDARSHANA PATIL, PROF. P. M. CHAWAN32 |
1 | |
114 | FPGA based OFDM System Implementation using FFTGAURI P. DESHMUKH, PROF. R. R. HARNE33 |
1 | |
115 | Survey on OAuth as Bulwark for Authentication and SanctionRAHUL RAVINDRA VISHWAKARMA, DR. JAYALEKSHMI K.R34 |
4 | |
116 | Approach to an Efficient Vulnerability Management ProgramSAMEER NANDA, UMASHANKAR GHUGAR35 |
1 | |
117 | A Study on Li-Fi-Internet at the Speed of LightV.J. RAJAKUMAR, S. BHUVANESHWARI36 |
1 | |
118 | Patient's Health Monitoring System in Real Time using Raspberry pi boardYOGESH PANDURANG PARDHI, PROF. SHUBHANGI BORKAR37 |
1 | |
119 | Traffic Sign Recognition Using Convolution Neural NetworksS.VISALINI38 |
4 | |
120 | Low Phase Noise and Low PowerSelf-Oscillating Mixer in 130-nm CMOS Technology for S-band ApplicationsKAVITA A. DHUPPE, PROF. S. S. AGRAWAL39 |
1 | |
121 | Studies Report on Cyber Law in India & Cybercrime SecurityANURAJ SINGH40 |
3 | |
122 | Video Recommendation for user behavior Prediction using Big data HadoopSHRADDHA WALWADKAR, PROF. Y. B. GURAV45 |
1 | |
123 | A Survey on the Role of Artificial Intelligence in FinTechSHIVKUMAR GOEL, NIHAAL MEHTA47 |
9 | |
124 | Machine Learning Algorithm for Process Performance TestingBHARATI NADAR, MOHAMMED SAADAN KHAN, AMEYA PARKAR51 |
4 | |
125 | Novel Digital Image Watermarking Using LWT-WHT-SVD in YCbCr Color SpacePIYUSH PANDEY, RAKESH KUMAR SINGH53 |
1 | |
126 | Micro Controller Based Fault Detection and Protection of Induction MotorRANA TASNEEM, NAGABHUSHAN PATIL54 |
1 | |
127 | A Survey on Smart Phones with Near Field Communication TechnologyP.AKALYA55 |
1 | |
128 | Non-Linear Modelling and Performance Analysis of Robotic Arm using Fuzzy based Control SystemSANDEEP S R, DR. V G SANGAM56 |
1 | |
129 | IoT Enabled Smart Solar PV SystemBALBHEEM NADPUROHIT, ROOPA KULKARNI, KADAPPA MATAGER, NAGARAJ DEVAR, RAHUL KARNAWADI, EDMUND CARVALHO57 |
4 | |
130 | A Review on Event Matching Service for Content-Based Publish/Subscribe SystemsPROF. SAPNA JAIN CHOUDHARY , BHAWNA KOL58 |
3 | |
131 | A Survey on Performance Analysis of Clinical Decision Support SystemVIKRAM V. KALE, DR. B. R. BOMBADE60 |
2 | |
132 | Optimal Load Balancing Technique for Resource Utilization in Cloud Computing EnvironmentSHRUTI KANOONGO, PROF. MAKARAND SAMVATSAR61 |
1 | |
133 | Utilizing Online Reviews as a Source for Demographic Based Product RecommendationsSWATI UDMALE, VIDYA JAGTAP63 |
1 | |
134 | Mining Twitter UGC to Analyse Box-Office BombsVILAS MAGARE64 |
1 | |
135 | Q-Array Dimension for Private Message Sharing and Document AuthenticationPOONAM A. KHARE66 |
1 | |
136 | A Survey Paper on Deduplication on Encrypted Big Data Using HDFS FrameworkSABALE NIKITA C, PROF.N.G.PARDESHI69 |
1 | |
137 | A Study on Different Attacks on Transport, Network and Data Link Layer in TCP/IPS.JOSHNA, N.NISHANTH70 |
3 | |
138 | Motion Detection In Video Using Local Binary Pattern Matching AlgorithmMANDEEP KAUR, JYOTI ARORA71 |
1 | |
139 | Bi-Linear Approach for Efficient Encryption Using Short CiphertextsBUSHRA FATIMA, DR.ASMA PARVEEN73 |
1 | |
140 | Microaneurysms Detection Digitally Retinal fundus images AutomaticallyAMIT GOSWAMI, VATSYA TIWARI74 |
2 | |
141 | Automation of Water Pumping Station with Retrofitting Using PLC and SCADA SystemsSHAKUNTHALA, R. RADHA, SUMANTH KUMAR75 |
2 | |
142 | Development of IoT Solution for Solar Based Charge ControllerTARUN B, DR.VENUGOPAL N77 |
2 | |
143 | Secure Deduplication Using Distributed Convergent Key ManagementNILAM PATIL, B. K. SARKAR88 |
1 | |
144 | Human Detector- Unmanned Ground VehicleRUJUTA KULKARNI, VIVEK SABANWAR, SAYLI TODKARI90 |
2 | |
145 | Automation of Endurance Testing Machine for C Arm of X Ray Scanner System using PLCPRATIBHA SHUKLA, R. RADHA, SUNIL MANJUNATH91 |
2 | |
146 | Performance Analysis of LBP& CLBP Based Texture ClassificationAARTI A. CHAVAN, PROF. S.S. PATIL92 |
5 | |
147 | Enhanced the Performance of Visual Cryptography Using Watermarking TechniqueRANJAN KUMAR, PROF.AISHWARYA MISHRA94 |
1 | |
148 | Supporting Privacy Protection in Personalized Web SearchSHUBHA.G.SANU, PUSHPA.S.TAMASE95 |
1 | |
149 | Segmentation of Brain MRI Images using Gene-Fuzzy c Means Clustering TechniqueB.PRASANTHI, DR. N.NAGAMALLESWARARAO96 |
1 | |
150 | A Review on Multi-communication aided System for Physically Disabled People using Raspberry piCHANDRAKANT B.INGOLE, PROF.Y.S.CHINCHOLIKAR97 |
1 | |
151 | Efficient Sentiment Analysis Using Hybrid PSO-GA ApproachARCHANA SONAGI, DEIPALI GORE98 |
3 | |
152 | Dynamic Spectrum Allocation for Network Utility and Throughput Maximization in Hybrid Access Cognitive Femtocell NetworkSANJYOT GODASE, TRUPTI WAGH99 |
2 | |
153 | An Enhanced Fuzzy Approach For Relay Node Selection in ManetsER.HEMANT SHARMA, ER. NAVNEET KAUR100 |
1 | |
154 | A Survey on Video Event Retrieval using Visual State Binary Embedding ModelKANCHAN S. DESHMUKH.101 |
1 | |
155 | Robust and Secure Access Schema using Dual Factor Authentication and OTP using Android InterfaceCHANNAPPA GOWDA D V102 |
3 | |
156 | Detection and Removal of Web Application Vulnerabilities Using WAP ToolSUJATA JADHAV, DR. B.K. SARKAR104 |
1 | |
157 | Parallelized Mapreduce Technique for Improving Performance on Jobs and Resource AllocationD. KULLAYAPPA , K F BHARATHI105 |
4 | |
158 | A Survey on Artificial Intelligence and its ApplicationsDR. K. F. BHARATI107 |
2 | |
159 | Precise Personal Identification by Combining Left and Right Palmprint ImagesC. OBULESU, P.MAHESH109 |
1 | |
160 | Recurrent Neural Network Approach for Understanding Short TextsA.RAVINDRANATH REDDY, G. PRADEEP REDDY, P. DILEEPKUMAR REDDY110 |
2 | |
161 | A Novel Verifiable Multi-Authority Secret Sharing Method in Cloud StorageV.ARAVIND KUMAR, M.DHARANI KUMAR111 |
1 | |
162 | Data Provenance for Tracking Data in Malicious Environment using LIMESHEETAL SURYAWANSHI , I.R. SHAIKH112 |
1 | |
163 | Image Processing Target tracking Robot using Raspberry piPALLAVI P. SARAIKAR, PROF. K.S.INGLE113 |
1 | |
164 | Performance Evaluation of Multicore System through Mining TechniquesRAMDAS JARE, PROF. VRUSHALI DESALE114 |
1 | |
165 | Big Data Mining from Social Networking Services using Spectral Clustering AlgorithmAZIZKHAN F PATHAN, DR. CHETANA PRAKASH117 |
3 | |
166 | A Survey on Direction of Arrival Estimation for Closely Spaced SignalNILESH B. KALE, D. G. GANAGE120 |
1 | |
167 | A Survey of Various Occluded Object Detection ApproachRAMESH KUMAR SAHU, PROF SAVAN KUMAR OAD, DR. RAHUL DUBEY122 |
1 | |
168 | Advance Detecting and Preventing Intrusions in Multi-Tier SystemSEEMA V. GAJARE, PROF. BABAN H. THOMBRE121 |
1 | |
169 | A Review on Cryptography, Data Mining &Machine Learning for Cyber SecuritySHIKHA PAANWAAR123 |
1 | |
170 | A Review over LTE for Vehicular NetworkingSANDEEP SURYAWANSHI, PROF PRAMOD KUMAR PATEL , DR. RAHUL DUBEY124 |
1 | |
171 | A Review On Different Image Splicing TechniquesMANISHA PANSARE, PROF. SUCHITA WALKE, PROF. VANITA MANE125 |
2 | |
172 | Deliberation on Face Anti-Spoofing TechniquesDEVESHREE R. MORE, PROF.VANITA MANE127 |
2 | |
173 | VLSI Implementation of AES 128 Algorithm for Secure Data TransmissionANKUR CHANGELA128 |
1 | |
174 | A Study on Challenges of Big Data and Smart PhoneURMILA KADAM, TRUPTI KALYANKAR, RUSHI DURGE, MAJUSHREE YEWALE129 |
2 | |
175 | Multiprotocol Label Switching over IPv4 and IPv6HARDIK PRAJAPATI130 |
1 | |
176 | Identifying Diabetic Risk Factor Using Association rule Mining Based on Bottom up SummarizationJYOTI BHABAD, KISHORSHEDGE131 |
2 | |
177 | Overview on Minimizing Distortion in Image SteganographyPOONAM TALELE, PROF. VANITA MANE133 |
3 | |
178 | Feature Extraction of Malware Infected Files and Malicious DatasetsHEMANT J. CHAUDHARI, PROF. M. S. MAHINDRAKAR134 |
3 | |
179 | IOT Based Industrial Monitoring and Fault Detection Using AndroidBHAGYASHREE DATTATRAY DAWARE, PROF. HATKAR A.A136 |
1 | |
180 | SLIDEGen: Approach to Automatic Slide GenerationVISHAKHA N. PAWAR, PROF. K. N. SHEDGE137 |
1 | |
181 | Implementation on Gender-Driven Emotion Recognition through Speech Signals for Ambient Intelligence ApplicationsRUSHIKESH GADE, S.R.GULHANE138 |
1 | |
182 | A Survey on New Optimization Algorithm called Multi Frequency Vibration PSO and its Test CasesV.SOWJANYA, T.KRANTHI KUMAR, S.SRIDEVI139 |
1 | |
183 | Detection of Spam Reviews in MobilesSAIESH N. PRABHU VERLEKAR142 |
2 | |
184 | Haar Wavelet based Iris Recognition System for Secure Access using MATLABPRANALI CHAVHAN, DR. SANTOSH B. PATIL143 |
2 | |
185 | Microsoft Kinect and Sensory Data Fusion for Robust SLAM Using ROSAMRUTHA DILIP SALUNKHE, PROF. M. N. KAKATKAR144 |
1 | |
186 | A Review on the Deeper Aspects of 5G Wireless TechnologyBHARAT145 |
1 | |
187 | Cloud Computing Security Issues and Encryption Techniques: A ReviewSIMMI LUTHRA146 |
2 | |
188 | Design and Novel Approach for Ternary Decoder and Encoder CircuitsR.N.UMA MAHESH147 |
1 | |
189 | Voice Recognition Home Automation System Based On ARM 11ATUL MADHUKAR BORADE , PROF. PATIL U.V148 |
1 | |
190 | Object Detection and Tracking Techniques: A ReviewAKANKSHA SHARMA, DR. DEEPAK DEMBLA, SHEKHAR149 |
7 | |
191 | Multiple Sensor Fusion and Classification for Moving Object Detection and TrackingSHUBHAM V. AVACHAR, DR. S. D. LOKHANDE150 |
1 | |
192 | Secure Data Aggregation for Wireless Sensor Networks in the Presence of Collusion AttacksSIDDHARTH C SAWAI, PROF. S. N. SHELKE151 |
1 | |
193 | A Speech-Based Just-In-Time Retrieval SystemDEVYANI KOLHAL1, PROF. RITESH THAKUR152 |
1 | |
194 | Dual Band 'I' Shaped MSA with Diffracted Ground PlaneMADANGOPAL SAHU, PROF. YUDHISHTHIR RAUT, PROF. PRATEEK WANKHADE154 |
3 | |
195 | Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARYStudy of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication SystemMOHIT TYAGI, AMIT CHAUDHARY155 |
2 | |
196 | ICT in Advanced Education for the 21st Century: ICT as Change Specialists for InstructionDR.LAKSHMI156 |
1 | |
197 | Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks- A SurveyNANDHINI, M. PRAVEENA MCA,M.PHIL157 |
1 | |
198 | Fractal Image Compression using Modified Tiny Block Size Processing Algorithm and Quantum Search AlgorithmRUTUJA S. MALEWAR, PRASHANT Y. SHENDE161 |
2 | |
199 | Improving Efficient Reliability Based Secure Deduplication Technique on Encrypted Big DataK UMA, E JAYABALAN162 |
3 | |
200 | Security and Efficient Routing with Mesh Networks using PASERTANUSHREE LOTHE, PROF. P. B. MALI163 |
5 | |
201 | Otsu Image Segmentation Algorithm: A ReviewKHUSHBU, ISHA VATS164 |
3 | |
202 | Indoor Navigation System to the Visually Impaired People using Visible Light Communication TechnologyMARITA R. MIRANDA165 |
1 | |
203 | FPGA Based Brushless DC Motor ControlSNEHAL BETALE, JIGAR LODHA166 |
1 | |
204 | Two Level Deduplication Using SHA-256 Algorithm for Resemblance DetectionROHINI S MAHAJAN, PROF. K. D. BAMANE168 |
7 | |
205 | A Survey on Distributed Cooperative Spectrum Sensing for Cognitive Radio NetworkVARSHA A. MARTANDE, S. A.SHIRSAT169 |
1 | |
206 | Drug Reviews Using Data Mining ModelABHIMANYU D. SANGALE, PROF. P.N.KALAVADEKAR170 |
3 | |
207 | Effective Energy Path Based on PDORP Routing Protocol for WSNSWAPNALI G. LATAKE, PROF S.V.TODKARI171 |
1 | |
208 | A Heuristic Based SLA and Energy Efficient for Virtual Machine Allocation in Cloud ComputingT THILAGAM, M MALATHI172 |
2 | |
209 | Implementation of Digital Signature Using Date Time Keyed HMAC AlgorithmMADHURI MALI, PROF. SANTOSH WAGHMODE173 |
1 | |
210 | Survey on Token Based Authentication in Cloud ComputingUNNATI AWASTHI, PROF. ASHOK VERMA174 |
1 | |
211 | Token Based Authentication Using Hash Key, Session And Javamail ApiUNNATI AWASTHI175 |
1 | |
212 | Analysis on Influence of Mobility Models on the Performance of Routing protocols in Wireless Mobile Ad-hoc NetworksMOHINI M. ADE, PROF.S.S.ASOLE176 |
1 | |
213 | IoT Based Wireless Sensor Node for Mine Safety ApplicationPRATIK KINHIKAR, DR.V.N.NITNAWARE, PROF.S.K.SHELKE177 |
1 | |
214 | Analysis of Low Power D Flip-Flop and Latches for Reduced PowerAKASH S. BAND, VISHAL D. JAISWAL178 |
1 | |
215 | Survey of Segmentation Procedures for Detecting Micro aneurysmsDERE DHANASHRI D , S.B.ANDRE179 |
1 | |
216 | Finding Shortest Path in All Tours of a TSP Using Dynamic Candidate SetSONIA RAJPUT, NAGENDRA KUMAR180 |
1 | |
217 | Robot Manipulator for 3D Surgical Instrument Singulation in Cluttered EnvironmentPRIYANKA PAWAR, CHETAN NEVE181 |
1 | |
218 | Secure Multi-Keyword Search Scheme for Cloud DataVAIBHAVI KULKARNI, PROF. PRIYA PISE182 |
1 | |
219 | FPGA Based Brushless DC motor ControlSNEHAL BETALE, JIGAR LODHA183 |
1 | |
220 | Detection of Particles from Particle Cluster using Hough TransformMAYUR G. ARORA, S.S. LOKHANDE184 |
1 | |
221 | Stock Market Prediction System using Back Propagation andC4.5 AlgorithmKALYAN DANI, DR.BASANT TIWARI186 |
1 | |
222 | Energy Efficient Reliable Data Dissemination in Mobile Coordinated WSNYOGITA VEER, SACHIN TODKARI187 |
1 | |
223 | Cotton Leaves Disease Recognization by Multiple ClassifiersKAJAL P.VISRANI, HARSHAD PATIL188 |
2 | |
224 | Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue StabilityDURGA S. NIKAM, PROF. M. M. WANKHADE189 |
1 | |
225 | Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue StabilityDURGA S. NIKAM, PROF. M. M. WANKHADE189 |
1 | |
226 | Prediction of Diabetes Risk Factor Using Back Propagation and C 4.5 AlgorithmAPARNA PHALAK, PRITI SHARMA190 |
2 | |
227 | Modified Machine Learning Approach for Diabetes Risk Factor DetectionTEJAL A. PATIL, SWATI A. PATIL191 |
1 | |
228 | Improving Direct Mapped Cache using Victim CacheSUYOG S. KANDALKAR192 |
1 | |
229 | Analysing and Predicting Social Impact of Tweets Using Tweet SegmentationSATISH DHAYTADAK, PROF.VRUSHALI DESALE193 |
2 | |
230 | A Fast and Area Efficient Cyclic Redundancy Check-Based Decoder for Software Defined RadioR.D.FATING, S.S.JAIN194 |
2 |