International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-6 June   2017


S.No Paper Title / Authors Download Paper Downloads
1

Intelligent Detection for Cyber Phishing Attacks using Fuzzy Rule-Based Systems

PHOEBE BARRACLOUGH, GERHARD FEHRINGER
1
4
2

All-Optical 2R Regenerator Non-Linear Optic Based on the Mamyshev Model

FABIO B. DE SOUSA, ELIZETE R. SABINO, FABRÍCIO P. DA LUZ, JORGE E. DE OLIVEIRA, MARCOS B.C. COSTA
2
1
3

An Enhanced Image Denoising technique using Wavelet Threshold and Genetic Algorithm

SUDAMA SAHU, BHUPENDRA VERMA
4
1
4

A Review on Application of Adaptive Algorithms in Signal Processing

JYOTI KAURAV, DR. R.P. NARWARIA
5
3
5

Review of Scheduling Algorithm Followed in Parallel Environment

RAJITA SHARMA, GAGANDEEP SIANI
7
1
6

Review on Load Balancing Algorithms in Cloud Computing

SHASMITA PANIGRAHI, DHANRAJ POOJARY, DR MURLIDHAR DHANAWADE
8
2
7

Infrastructure as a Service with Apache CloudStack: A Study

SUPRABHA MAHADIK, NASHRAH GHAWTE, DR. MURLIDHAR DHANAWADE
9
2
8

DDOS Detection and Denial Using Third Party Application in SDN

ROSHNI MARY THOMAS, DIVYA JAMES
10
1
9

Design and Implementation of a Network Security Model for Campus Network Using Various Securities

VARSHA, TOMAR KULDEEP
12
2
10

A Comprehensive Study on Distributed Data Mining and Learning Algorithms

SANJAY KUMAR SEN, DR. B.K. RATHA.
48
1
11

The Survey – Predicting an Education Performance of Students Based on Data Mining Techniques

M. MAYILVAGANAN, D. KALPANADEVI
49
3
12

Secure User Data and Images on Content Sharing Sites Using Virtual Password and APP Scheme

PRIYANKA M. LOKHANDE
59
1
13

Performance Analysis of Real Time Task Scheduling Algorithm

GIRISH S. THAKARE, DR. PRASHANT. R. DESHMUKH
68
1
14

Parameter Estimation of Nonlinear System - VanderPol Oscillator using Neural Networks

YUGCHHAYA DHOTE
78
3
15

Performance Comparison of OFDM System with Different Modulation Schemes Using ISP Pulse Shaping Technique

OMKAR PABBATI, DIVYANGNA GANDHI
79
1
16

Design and Analysis of Low Power Temperature Sensor using Static Latch D Flip-Flop

GANGOTRI PAREEK , GAJENDRA SUJEDIYA
83
1
17

Optimize Circuit and Compare of 8 X 8 Wallace Tree Multiplier Using GDI and CMOS Technology

PRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA
84
1
18

Design and Analysis of 8 X 8 Wallace Tree Multiplier using GDI and CMOS Technology

PRADEEP KUMAR KUMAWAT, GAJENDRA SUJEDIYA
85
1
19

Technique for Sentiment Analysis from Twitter Data

CHANDAN ARORA , DR. RACHNA
93
3
20

Improved Load Balancing Algorithm for Reducing Idle Iteration in Virtual Machine on Hadoop Distributed File System (HDFS)

G KANMANI, E JAYABALAN
116
3
21

Speed Estimation of an Induction motor using Model Reference Adaptive Control

GOPI N
195
1
22

Comparative Analysis of Different Feature Extraction Techniques used in Face Recognition – A Review

NISHA, MAITREYEE DUTTA
196
2
23

Design A Smart Relay in Advance Metering Infrastructure Using Matlab

NEHA CHAPKE, PROF. SUYOG DAHULE
197
1
24

Implementation on Overhead Reduction by Spatial Reusability in Multi-Hop Wireless Network

PRAVIN V. JUNGHARE , PROF. U. R. GODASE
198
1
25

Comparative Study of RGB, HSV & YCbCr Color Model Saliency Map

SHRUTI V. GHINMINE, PROF. AMOL SAPKAL
200
1
26

Elliptical Curve Cryptography Using RSD

ASHISH S.YADAV
201
1
27

Analysis of Underwater Data using DNN

DR. S.R.GANORKAR, PRIYANKA A. WANKHADE
202
1
28

Secure Fragment and Replica Allocation of Data Using Geo-Social Attributes in Cloud

NIDHI JAIN, PROF. ABHIJIT JANARDAN PATANKAR, DR. KSHAMA V. KULHALLI, DR.KOTRAPPA SIRBI
203
1
29

Cooperative Collision Free Packet Scheduling for Under Water Acoustic Sensor Network Localization

J. SUBBARATNAMMA, U. DHANUNJAYA
205
4
30

A Novel Dictionary Selection Algorithm to Increase the Instruction Match Rates

K.ISHRATH AFRIN, SRI P.MURALI KRISHNA
206
1
31

A Framework for Preservation of Cloud User's Data Privacy

PANKAJ SINGHAI, PROF. SAURABH SHARMA
207
2
32

A Review on Data Security and Privacy Issues in Cloud Computing

AKANKSHA AGRAWAL, DR. NITESH DUBEY
208
2
33

Survey Paper on Data Privacy Issues of Cloud Computing

SHEFALI RAI, DR. NITESH DUBEY
209
2
34

A Survey Paper on "Detecting Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems"

PRIYANKA BHAGWAN PATIL, GANESH DHANOKAR
210
1
35

Pattern Driven Internal Intrusion Detection and Protection System Using Data Mining and Forensic Techniques

DIPALI VIJAY KARCHE, PROF. AMRIT PRIYDARSHI
212
1
36

Sensitivity Analysis of Immersion Corrosion Parameters in WC–10CO–4Cr Coated Brass Alloy for Extended Surfaces

B. GURUPRASAD, S. GANESAN
213A
1
37

Proposition of a Hybrid Approach for Sentiment Analysis of Travel Domain Data

A SRINIVAS, M HANUMANTHAPPA
214
2
38

A Systematic study on Load balancing in Distributed Computing

IMMIDISETTY DEEPIKA, BADAM SRUJANA, SALINA ADINARAYANA
216
5
39

A Survey on Two Level QR Code Authentication Using Image Encoding Technique

TAHEMEENA GUNJARGE, KAILAS TAMBE
218
1
40

Survey on Aging-Aware Reliable Multiplier Design Using Adaptive Hold Logic

PRATIK CHUNARKAR , DR.M.B.MALI
219
1
41

Fast Image Transmission by Using Byte Rotation Algorithm in Network Security

APURVA P. WAGHMARE, PROF. P. R. LAKHE
220
1
42

Effects of ImpingementAngleinErosion Rate of HVOF (WC-Co-Cr) Coated Navel Brassin Water Jet Erosion

K.MURUGAN, S.KARTHIKEYAN
220A
1
43

Enhanced Image Steganography using Texture Synthesis

RASHMI A.SONAWANE, DIPTI SONAWANE
221
3
44

A Comparative Study on LEACH Protocol for Wireless Sensor Network

DR . S. G. SANTHI , N. TAMILARASI
222
1
45

Improving Speed and Energy Efficiency of Cognitive Radios using Cross layer Multichannel Routing and Compression

SAPANA E. LOHABARE , SUMIT R.VAIDYA
223
1
46

Optimizing Energy and Delay in Multichannel Cognitive Radios with Link Maintenance

SAPANA E. LOHABARE , SUMIT R.VAIDYA, P. D.BHIRANGE
224
1
47

Music and Mood Detection using BoF Approach

HARSHALI NEMADE, DEIPALI GORE
225
3
48

Selections from the History of Air Pollution and Modelling its Data in Countryside and Urban Environment Using Genetic Algorithm

YUVRAJ KSHIRSAGAR, R.W. GAIKWAD
226
2
49

A Cooperative Bait Detection Approach in MANET to Detect Collaborative Attacks by Malicious Nodes

SWAPNIL WAGHMARE, PROF. MININATH NIGOT
227
1
50

Vulnerability Analysis and Tracking of Covert Malicious Software Launching

SURABHI DUBEY
230
1
51

Behavioral Analysis of Candidates using Sentiment Analysis and Emotion Mining for Recruitment

SAGAR S. PATIL, PRAVIN S. GAME
231
1
52

Optimal Design and Analysis of 12T MTCMOS and MCAM Using VLSI

SNEHA OAK
233
1
53

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY
155
1
54

A Study on Early Prevention and Detection of Breast Cancer using Data Mining Techniques

SUMALATHA.G, ARCHANA.S,
6
1
55

An Identity Combined With Attribute Based Proxy Uploading and Integrity Checking in Public Cloud

PALLAVI S. KAULAGE, PROF. DR. S. N. KINI
11
3
56

System Generator based area Reduction of IIR Decimation Filter using Merged Delay Transformation

SMITHA G L, MEHARUNNISA S P
18
1
57

A Review on Cognitive Radio Detection Technologies

DEEPSHIKHA BHATI
23
3
58

HuBot – Voice Controlled Human Assistant

HARSH BHATIA, ZARANA MATANI, PRIYANK BHATT, YASHNASARPURI
28
3
59

A Review on Security Threats and Cryptographic Solutions in Cloud Computing

VARSHA K, RACHEL MATHIAS
31
2
60

Implementation of deduplication scheme for Encrypted Data in Cloud

AISHWARYA M B , ASHRITHA A, CHETANA C H, MAMATHA S, SNIGDHA SEN
41
1
61

Low Power and High Speed CI_CSKA Design

SONAL AGRAWAL, SHRADDHA SHRIVASTAWA
42
2
62

A Review on DCT and DWT based Image Compression Techniques

SUMANDEEP KAUR, ER. ARSHDEEP SINGH
43
1
63

A Secured body Sensor healthcare Monitoring System for Elderly Peoples

JAHNAVI V , P KOKILA, SHRUTHI T S , SAMRADHA RAO, SUJAN KUMAR
44
2
64

Survey on Defect Prediction and its Effect on Software Quality

PRABUJEET KAUR, DHARMENDRA LAL GUPTA
46
3
65

Image Classification using Multikernel Learning Algorithm

HARSHITHA L, DR.V S KRUSHNASAMY
50
2
66

Measuring Conceptual Object Distance through Sensors using Raspberry pi

CHARULATA INGLE
52
1
67

Robust Authentication Scheme for Graphical Password

SNEHAL TARKESHWAR AMBADE, PROF. JAGDISH PIMPLE
62
1
68

IoT based Survey on Healthcare and Agriculture

HARI PRIYA.B, NANDHINI.S
65
4
69

Adoption of Open source on Darbar Group of Institution - Impact and Challenges

PRAVEEN BADAMI, SHREYAS N KUTTY
67
2
70

Towards Privacy Preservation of Kernel-Based Data Mining Systems from Insider Collusion Attack

RUPESH SAMANT, U. H. WANASKAR
76
2
71

A Survey: Different Techniques in Image Super Resolution

JETASHRI J.SHINDE, PROF. A.S.SHIRSAT
80
2
72

A Survey On "Image Retargeting Quality Assessment: A Backward Registration Approach"

SAMRAH SHEIKH, ANIL. S. SHIRSAT
81
1
73

A Review on Dynamic Stand-Alone Gas Detection System

DHOKTE RENU GAJANANRAO, M. H. NERKAR, ANCHAL KHADSE
82
1
74

Shared Spreadable Cloud Data with Efficient Group User Revocation

PHASALE PRIYANKA, DR.RANMALKAR VRUSHALI

Abstract PDF 

87
3
75

Design and Implementation of (15,7) BCH Encoder Using labVIEW and its Transmission using NI USRP

PROF. M. D. BOBADE, ASHRU JADHAV, RACHANA KHAMAMKAR
72
4
76

Brain Activity Detection and Analysis Using EEG

VARUN VALLABHAN
89
1
77

An IOT Based Health Care Monitoring System-A Review

SNEHA N. MALOKAR, SAMADHAN D. MALI
103
3
78

High Performance 60 GHz LNA Design for Variable Gain Amplifier by Using 150 nm GaAs Technology

ABHISHEK G GADE, DR. SANJEEVANI K SHAH
106
1
79

Energy Saving Scheme of Wireless Sensor Network with Mobile Sink

MAHESHWARI C.SHINDE, PROF.M.M.WANKHADE
108
1
80

Interactive Interface for DC Motor using GUI with Raspberry Pi Controller

NITI RAJENDRA PATEL
115
1
81

Automatic Facet Extraction for Search Navigation

DUHITA PAWAR, PROF. VINA M. LOMTE
118
1
82

Smart Internet Bot: A Topic-Specific Crawler for locating Deep Data of Web

DEEPALI R. DHAYGUDE, PROF. P. B. MALI
119
2
83

Video-Based Human Action Recognition: Comparative Analysis of Feature Descriptors and Classifiers

AISHWARYA BUDHKAR, NIKITA PATIL
126
11
84

Face Aging Effect Using Sparse Representation

SONAL AJMIRE, KARUNA BAGDE, PRABHAKAR RAMTEKE
132
1
85

A Survey on Securing Logistics System with the Implementation of Digital Signature

MADHURI MALI, PROF. SANTOSH WAGHMODE
135
2
86

Grain Condition Monitoring and Controlling System-A Review

ANITA M. JADHAV, MAKARAND N. KAKATKAR
140
1
87

Real Time Parking Guidance System

POOJA POWAR , PROF. RAJENDRA BABAR
141
1
88

Content Based Publisher/Subscriber Cloud Computing System using Event Matching System

VINOD N. ALONE, SANJAY B. WAYKAR
158
1
89

Obstacle Detection from Unmanned Surface Vehicle using HOG

KALYANEE G. BARVE, SUNITA.S.LOKHANDE
159
1
90

Secure Data Analytics for Heart Disease Prediction

RAHUL S. BELLI, PROF. AJAY NADARGI
160
1
91

A Survey on Dynamic Routing in Wireless Sensor Networks under Black Hole Attack

CHARULATA C. GIRSAWALE , PROF. S. A. SHIRSATH
167
1
92

Study of Heart Disease Prediction Using Data Mining

GEETIKA SUNIL AGRAWAL, PROF. DINESH D. PATIL
185
1
93

Implementation on Data Acquisition by Reducing Energy Hole Evolution

SIDDHARTH SUNIL BURSE , PROF. M.V. NIMBALKAR
199
1
94

Survey and Comparisons of Low Power Multiplier Design in Term of Area, Power, Delay

POONAM P.KOKATE , PROF V.G.RAUT
204
1
95

Sentiment Analysis and Ranking of the Products based on the Reviews

MONIKA RANI HG, SOURABH JAIN, MOHD DANISH AHMAD, MOHIT SEHRAWAT, RISHABH RAJ
211
1
96

Implementation of ZHLS-GRP Hybrid Technique for Routing Protocols and BPSO in MANETs

HARSHPREET KAUR, SUKHJEET KAUR
215
1
97

Mining User-Aware Rare STPs in Document Streams

MR. SOMESH D. KALASKAR, DR. ARCHANA LOMTE
232
4
98

An Efficient Algorithm For Nearest Location Search Using Skyline Query Processing

POOJA RAO, MANGLESH KHANDELWAL, VINOD KUMAR YADAV
13
3
99

A Novel Technique in Review Selection Based on Micro Review

MUMTAJ.L.PATEL, PROF S.P.VIDHATE
14
1
100

Study on Mobile Cloud Computing Security Issues, Challenges and Preventive Measures

PROF. DEEPALI SHAH, PROF. SEEMA BHUVAN, GANESH THITE, TEJNARAYAN CHAUDHARY
15
4
101

Generation of Power using Perpetual Motion

SHAKUNTHALA, PROF. NAGABHUSHAN, R. RADHA
16
2
102

A Survey on Early Diagnosis of Lung Cancer using Classification Data Mining Technique

PRICILLA.S, PEBILA SHANI.S
17
1
103

Vehicular Protected Data Transmission over Dual Authentication Algorithm

UZMA FARHEEN, DR.RUKSAR FATIMA
19
1
104

Design and Implementation of Hybrid Algorithm for Load Balancing in Cloud Computing Environment

POOJA YADAV, PROF.ABHILASHA VYAS
20
1
105

Sharing Visual Traffic Information via Vehicular Cloud

DAMPETLA SREEKANTH1, MARI KIRTHIMA
21
1
106

Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

GHANSHAM R. RATHOD, PROF. SONALIPATIL
22
1
107

A Survey on Digital Pulse Oximeter

SHILPI
24
1
108

Entropy Optimized Feature-Based Bag-Of-Words Representation for Information Retrieval

SWAROOP A.KALE, PROF. H.A.HINGOLIWALA
25
1
109

Network Reconfiguration of Radial Distribution Network with DG using Cuckoo Search Algorithm

ANJALI G, R.CHIDANANDAPPA, DR.T.ANANTHAPADMANABHA
26
9
110

Survey On: "To Detect Ranking Fraud App with the Help of Discovery of Historical Record"

PRITAM PORATE, M. S. NIMBARTE
27
1
111

A Survey on "Water Monitoring System"

PRAGYA JAIN
29
1
112

Dual-Server Hybrid Key Encryption with Multi Keyword Search Scheme for Secure Cloud Storage

SNEHA R. GHORPADE, PROF. DR. S. N. KINI
30
2
113

A Secure Data Communication System Using Enhanced Cryptography and Steganography

DARSHANA PATIL, PROF. P. M. CHAWAN
32
1
114

FPGA based OFDM System Implementation using FFT

GAURI P. DESHMUKH, PROF. R. R. HARNE
33
1
115

Survey on OAuth as Bulwark for Authentication and Sanction

RAHUL RAVINDRA VISHWAKARMA, DR. JAYALEKSHMI K.R
34
4
116

Approach to an Efficient Vulnerability Management Program

SAMEER NANDA, UMASHANKAR GHUGAR
35
1
117

A Study on Li-Fi-Internet at the Speed of Light

V.J. RAJAKUMAR, S. BHUVANESHWARI
36
1
118

Patient's Health Monitoring System in Real Time using Raspberry pi board

YOGESH PANDURANG PARDHI, PROF. SHUBHANGI BORKAR
37
1
119

Traffic Sign Recognition Using Convolution Neural Networks

S.VISALINI
38
4
120

Low Phase Noise and Low PowerSelf-Oscillating Mixer in 130-nm CMOS Technology for S-band Applications

KAVITA A. DHUPPE, PROF. S. S. AGRAWAL
39
1
121

Studies Report on Cyber Law in India & Cybercrime Security

ANURAJ SINGH
40
3
122

Video Recommendation for user behavior Prediction using Big data Hadoop

SHRADDHA WALWADKAR, PROF. Y. B. GURAV
45
1
123

A Survey on the Role of Artificial Intelligence in FinTech

SHIVKUMAR GOEL, NIHAAL MEHTA
47
9
124

Machine Learning Algorithm for Process Performance Testing

BHARATI NADAR, MOHAMMED SAADAN KHAN, AMEYA PARKAR
51
4
125

Novel Digital Image Watermarking Using LWT-WHT-SVD in YCbCr Color Space

PIYUSH PANDEY, RAKESH KUMAR SINGH
53
1
126

Micro Controller Based Fault Detection and Protection of Induction Motor

RANA TASNEEM, NAGABHUSHAN PATIL
54
1
127

A Survey on Smart Phones with Near Field Communication Technology

P.AKALYA
55
1
128

Non-Linear Modelling and Performance Analysis of Robotic Arm using Fuzzy based Control System

SANDEEP S R, DR. V G SANGAM
56
1
129

IoT Enabled Smart Solar PV System

BALBHEEM NADPUROHIT, ROOPA KULKARNI, KADAPPA MATAGER, NAGARAJ DEVAR, RAHUL KARNAWADI, EDMUND CARVALHO
57
4
130

A Review on Event Matching Service for Content-Based Publish/Subscribe Systems

PROF. SAPNA JAIN CHOUDHARY , BHAWNA KOL
58
3
131

A Survey on Performance Analysis of Clinical Decision Support System

VIKRAM V. KALE, DR. B. R. BOMBADE
60
2
132

Optimal Load Balancing Technique for Resource Utilization in Cloud Computing Environment

SHRUTI KANOONGO, PROF. MAKARAND SAMVATSAR
61
1
133

Utilizing Online Reviews as a Source for Demographic Based Product Recommendations

SWATI UDMALE, VIDYA JAGTAP
63
1
134

Mining Twitter UGC to Analyse Box-Office Bombs

VILAS MAGARE
64
1
135

Q-Array Dimension for Private Message Sharing and Document Authentication

POONAM A. KHARE
66
1
136

A Survey Paper on Deduplication on Encrypted Big Data Using HDFS Framework

SABALE NIKITA C, PROF.N.G.PARDESHI
69
1
137

A Study on Different Attacks on Transport, Network and Data Link Layer in TCP/IP

S.JOSHNA, N.NISHANTH
70
3
138

Motion Detection In Video Using Local Binary Pattern Matching Algorithm

MANDEEP KAUR, JYOTI ARORA
71
1
139

Bi-Linear Approach for Efficient Encryption Using Short Ciphertexts

BUSHRA FATIMA, DR.ASMA PARVEEN
73
1
140

Microaneurysms Detection Digitally Retinal fundus images Automatically

AMIT GOSWAMI, VATSYA TIWARI
74
2
141

Automation of Water Pumping Station with Retrofitting Using PLC and SCADA Systems

SHAKUNTHALA, R. RADHA, SUMANTH KUMAR
75
2
142

Development of IoT Solution for Solar Based Charge Controller

TARUN B, DR.VENUGOPAL N
77
2
143

Secure Deduplication Using Distributed Convergent Key Management

NILAM PATIL, B. K. SARKAR
88
1
144

Human Detector- Unmanned Ground Vehicle

RUJUTA KULKARNI, VIVEK SABANWAR, SAYLI TODKARI
90
2
145

Automation of Endurance Testing Machine for C Arm of X Ray Scanner System using PLC

PRATIBHA SHUKLA, R. RADHA, SUNIL MANJUNATH
91
2
146

Performance Analysis of LBP& CLBP Based Texture Classification

AARTI A. CHAVAN, PROF. S.S. PATIL
92
5
147

Enhanced the Performance of Visual Cryptography Using Watermarking Technique

RANJAN KUMAR, PROF.AISHWARYA MISHRA
94
1
148

Supporting Privacy Protection in Personalized Web Search

SHUBHA.G.SANU, PUSHPA.S.TAMASE
95
1
149

Segmentation of Brain MRI Images using Gene-Fuzzy c Means Clustering Technique

B.PRASANTHI, DR. N.NAGAMALLESWARARAO
96
1
150

A Review on Multi-communication aided System for Physically Disabled People using Raspberry pi

CHANDRAKANT B.INGOLE, PROF.Y.S.CHINCHOLIKAR
97
1
151

Efficient Sentiment Analysis Using Hybrid PSO-GA Approach

ARCHANA SONAGI, DEIPALI GORE
98
3
152

Dynamic Spectrum Allocation for Network Utility and Throughput Maximization in Hybrid Access Cognitive Femtocell Network

SANJYOT GODASE, TRUPTI WAGH
99
2
153

An Enhanced Fuzzy Approach For Relay Node Selection in Manets

ER.HEMANT SHARMA, ER. NAVNEET KAUR
100
1
154

A Survey on Video Event Retrieval using Visual State Binary Embedding Model

KANCHAN S. DESHMUKH.
101
1
155

Robust and Secure Access Schema using Dual Factor Authentication and OTP using Android Interface

CHANNAPPA GOWDA D V
102
3
156

Detection and Removal of Web Application Vulnerabilities Using WAP Tool

SUJATA JADHAV, DR. B.K. SARKAR
104
1
157

Parallelized Mapreduce Technique for Improving Performance on Jobs and Resource Allocation

D. KULLAYAPPA , K F BHARATHI
105
4
158

A Survey on Artificial Intelligence and its Applications

DR. K. F. BHARATI
107
2
159

Precise Personal Identification by Combining Left and Right Palmprint Images

C. OBULESU, P.MAHESH
109
1
160

Recurrent Neural Network Approach for Understanding Short Texts

A.RAVINDRANATH REDDY, G. PRADEEP REDDY, P. DILEEPKUMAR REDDY
110
2
161

A Novel Verifiable Multi-Authority Secret Sharing Method in Cloud Storage

V.ARAVIND KUMAR, M.DHARANI KUMAR
111
1
162

Data Provenance for Tracking Data in Malicious Environment using LIME

SHEETAL SURYAWANSHI , I.R. SHAIKH
112
1
163

Image Processing Target tracking Robot using Raspberry pi

PALLAVI P. SARAIKAR, PROF. K.S.INGLE
113
1
164

Performance Evaluation of Multicore System through Mining Techniques

RAMDAS JARE, PROF. VRUSHALI DESALE
114
1
165

Big Data Mining from Social Networking Services using Spectral Clustering Algorithm

AZIZKHAN F PATHAN, DR. CHETANA PRAKASH
117
3
166

A Survey on Direction of Arrival Estimation for Closely Spaced Signal

NILESH B. KALE, D. G. GANAGE
120
1
167

A Survey of Various Occluded Object Detection Approach

RAMESH KUMAR SAHU, PROF SAVAN KUMAR OAD, DR. RAHUL DUBEY
122
1
168

Advance Detecting and Preventing Intrusions in Multi-Tier System

SEEMA V. GAJARE, PROF. BABAN H. THOMBRE
121
1
169

A Review on Cryptography, Data Mining &Machine Learning for Cyber Security

SHIKHA PAANWAAR
123
1
170

A Review over LTE for Vehicular Networking

SANDEEP SURYAWANSHI, PROF PRAMOD KUMAR PATEL , DR. RAHUL DUBEY
124
1
171

A Review On Different Image Splicing Techniques

MANISHA PANSARE, PROF. SUCHITA WALKE, PROF. VANITA MANE
125
2
172

Deliberation on Face Anti-Spoofing Techniques

DEVESHREE R. MORE, PROF.VANITA MANE
127
2
173

VLSI Implementation of AES 128 Algorithm for Secure Data Transmission

ANKUR CHANGELA
128
1
174

A Study on Challenges of Big Data and Smart Phone

URMILA KADAM, TRUPTI KALYANKAR, RUSHI DURGE, MAJUSHREE YEWALE
129
2
175

Multiprotocol Label Switching over IPv4 and IPv6

HARDIK PRAJAPATI
130
1
176

Identifying Diabetic Risk Factor Using Association rule Mining Based on Bottom up Summarization

JYOTI BHABAD, KISHORSHEDGE
131
2
177

Overview on Minimizing Distortion in Image Steganography

POONAM TALELE, PROF. VANITA MANE
133
3
178

Feature Extraction of Malware Infected Files and Malicious Datasets

HEMANT J. CHAUDHARI, PROF. M. S. MAHINDRAKAR
134
3
179

IOT Based Industrial Monitoring and Fault Detection Using Android

BHAGYASHREE DATTATRAY DAWARE, PROF. HATKAR A.A
136
1
180

SLIDEGen: Approach to Automatic Slide Generation

VISHAKHA N. PAWAR, PROF. K. N. SHEDGE
137
1
181

Implementation on Gender-Driven Emotion Recognition through Speech Signals for Ambient Intelligence Applications

RUSHIKESH GADE, S.R.GULHANE
138
1
182

A Survey on New Optimization Algorithm called Multi Frequency Vibration PSO and its Test Cases

V.SOWJANYA, T.KRANTHI KUMAR, S.SRIDEVI
139
1
183

Detection of Spam Reviews in Mobiles

SAIESH N. PRABHU VERLEKAR
142
2
184

Haar Wavelet based Iris Recognition System for Secure Access using MATLAB

PRANALI CHAVHAN, DR. SANTOSH B. PATIL
143
2
185

Microsoft Kinect and Sensory Data Fusion for Robust SLAM Using ROS

AMRUTHA DILIP SALUNKHE, PROF. M. N. KAKATKAR
144
1
186

A Review on the Deeper Aspects of 5G Wireless Technology

BHARAT
145
1
187

Cloud Computing Security Issues and Encryption Techniques: A Review

SIMMI LUTHRA
146
2
188

Design and Novel Approach for Ternary Decoder and Encoder Circuits

R.N.UMA MAHESH
147
1
189

Voice Recognition Home Automation System Based On ARM 11

ATUL MADHUKAR BORADE , PROF. PATIL U.V
148
1
190

Object Detection and Tracking Techniques: A Review

AKANKSHA SHARMA, DR. DEEPAK DEMBLA, SHEKHAR
149
7
191

Multiple Sensor Fusion and Classification for Moving Object Detection and Tracking

SHUBHAM V. AVACHAR, DR. S. D. LOKHANDE
150
1
192

Secure Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks

SIDDHARTH C SAWAI, PROF. S. N. SHELKE
151
1
193

A Speech-Based Just-In-Time Retrieval System

DEVYANI KOLHAL1, PROF. RITESH THAKUR
152
1
194

Dual Band 'I' Shaped MSA with Diffracted Ground Plane

MADANGOPAL SAHU, PROF. YUDHISHTHIR RAUT, PROF. PRATEEK WANKHADE
154
3
195

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY

Study of Four Wave Mixing Effect on Wavelength Division Multiplexing Optical Fiber Communication System

MOHIT TYAGI, AMIT CHAUDHARY
155
2
196

ICT in Advanced Education for the 21st Century: ICT as Change Specialists for Instruction

DR.LAKSHMI
156
1
197

Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks- A Survey

NANDHINI, M. PRAVEENA MCA,M.PHIL
157
1
198

Fractal Image Compression using Modified Tiny Block Size Processing Algorithm and Quantum Search Algorithm

RUTUJA S. MALEWAR, PRASHANT Y. SHENDE
161
2
199

Improving Efficient Reliability Based Secure Deduplication Technique on Encrypted Big Data

K UMA, E JAYABALAN
162
3
200

Security and Efficient Routing with Mesh Networks using PASER

TANUSHREE LOTHE, PROF. P. B. MALI
163
5
201

Otsu Image Segmentation Algorithm: A Review

KHUSHBU, ISHA VATS
164
3
202

Indoor Navigation System to the Visually Impaired People using Visible Light Communication Technology

MARITA R. MIRANDA
165
1
203

FPGA Based Brushless DC Motor Control

SNEHAL BETALE, JIGAR LODHA
166
1
204

Two Level Deduplication Using SHA-256 Algorithm for Resemblance Detection

ROHINI S MAHAJAN, PROF. K. D. BAMANE
168
7
205

A Survey on Distributed Cooperative Spectrum Sensing for Cognitive Radio Network

VARSHA A. MARTANDE, S. A.SHIRSAT
169
1
206

Drug Reviews Using Data Mining Model

ABHIMANYU D. SANGALE, PROF. P.N.KALAVADEKAR
170
3
207

Effective Energy Path Based on PDORP Routing Protocol for WSN

SWAPNALI G. LATAKE, PROF S.V.TODKARI
171
1
208

A Heuristic Based SLA and Energy Efficient for Virtual Machine Allocation in Cloud Computing

T THILAGAM, M MALATHI
172
2
209

Implementation of Digital Signature Using Date Time Keyed HMAC Algorithm

MADHURI MALI, PROF. SANTOSH WAGHMODE
173
1
210

Survey on Token Based Authentication in Cloud Computing

UNNATI AWASTHI, PROF. ASHOK VERMA
174
1
211

Token Based Authentication Using Hash Key, Session And Javamail Api

UNNATI AWASTHI
175
1
212

Analysis on Influence of Mobility Models on the Performance of Routing protocols in Wireless Mobile Ad-hoc Networks

MOHINI M. ADE, PROF.S.S.ASOLE
176
1
213

IoT Based Wireless Sensor Node for Mine Safety Application

PRATIK KINHIKAR, DR.V.N.NITNAWARE, PROF.S.K.SHELKE
177
1
214

Analysis of Low Power D Flip-Flop and Latches for Reduced Power

AKASH S. BAND, VISHAL D. JAISWAL
178
1
215

Survey of Segmentation Procedures for Detecting Micro aneurysms

DERE DHANASHRI D , S.B.ANDRE
179
1
216

Finding Shortest Path in All Tours of a TSP Using Dynamic Candidate Set

SONIA RAJPUT, NAGENDRA KUMAR
180
1
217

Robot Manipulator for 3D Surgical Instrument Singulation in Cluttered Environment

PRIYANKA PAWAR, CHETAN NEVE
181
1
218

Secure Multi-Keyword Search Scheme for Cloud Data

VAIBHAVI KULKARNI, PROF. PRIYA PISE
182
1
219

FPGA Based Brushless DC motor Control

SNEHAL BETALE, JIGAR LODHA
183
1
220

Detection of Particles from Particle Cluster using Hough Transform

MAYUR G. ARORA, S.S. LOKHANDE
184
1
221

Stock Market Prediction System using Back Propagation andC4.5 Algorithm

KALYAN DANI, DR.BASANT TIWARI
186
1
222

Energy Efficient Reliable Data Dissemination in Mobile Coordinated WSN

YOGITA VEER, SACHIN TODKARI
187
1
223

Cotton Leaves Disease Recognization by Multiple Classifiers

KAJAL P.VISRANI, HARSHAD PATIL
188
2
224

Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue Stability

DURGA S. NIKAM, PROF. M. M. WANKHADE
189
1
225

Secure and Energy Efficient Data Transmission for Wireless Sensor Network with Queue Stability

DURGA S. NIKAM, PROF. M. M. WANKHADE
189
1
226

Prediction of Diabetes Risk Factor Using Back Propagation and C 4.5 Algorithm

APARNA PHALAK, PRITI SHARMA
190
2
227

Modified Machine Learning Approach for Diabetes Risk Factor Detection

TEJAL A. PATIL, SWATI A. PATIL
191
1
228

Improving Direct Mapped Cache using Victim Cache

SUYOG S. KANDALKAR
192
1
229

Analysing and Predicting Social Impact of Tweets Using Tweet Segmentation

SATISH DHAYTADAK, PROF.VRUSHALI DESALE
193
2
230

A Fast and Area Efficient Cyclic Redundancy Check-Based Decoder for Software Defined Radio

R.D.FATING, S.S.JAIN
194
2