International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Design and Analysis of Multiband Asymmetrical U-Slot Patch AntennaB. JYOTHI, M. SARANYA3 |
8 | |
2 | Neural Network in Big Data AnalysisRAJU B N4 |
3 | |
3 | Discrete Element Simulation of Centrifuging Mode of Granular Particles and Their Heat Transfer in a Rotating CylinderS.H.OLEENA8 |
2 | |
4 | Predicting Crime Incidents Systematic Approaches and Crime Analysis for Crime ReductionSHARMELI J, SETHUKARSI T9 |
1 | |
5 | Communal Stance for Mining E-Commerce Site by Evaluating Customers Review and FeedbackGOTIVADA SOUJANYA12 |
2 | |
6 | Automatic Object Removal Using Exemplar Based Image Inpainting Algorithm and Survey.SARASWATI, PROF. A S. AWATI13 |
1 | |
7 | A Study on Association Rule Mining Algorithms Used in Web Usage MiningDHANA PRAVEENA A, SELVI V14 |
2 | |
8 | A Multilevel Procedural Big Data analysis of Weather PredictionGARG AVANTI , SAURABH SINGH18 |
2 | |
9 | Authorized Deduplication Technique for Encrypted Data with DARE Scheme in a Twin Cloud EnvironmentNEHA S.CHAVAN, NILESH WANI19 |
1 | |
10 | Efficient Unflaws of Private and Public Verification Using ID-DPDP in Multi Cloud StoragePRADEEPA .S, VIJAYALAKSHMI .K20 |
1 | |
11 | A Survey on Emotions Generation using Text Mining for Social Networking WebsitesNAYANA MORE, DEEPALI JADHAV23 |
5 | |
12 | GPU-Accelerated Cloud Computing for Multimedia ApplicationsNIROSY.J, DR. R.KALAISELVI25 |
1 | |
13 | An Integrated Fuzzy ANP and TOPSIS Methodology for Software Selection under MCDM PerspectiveBIJOYETA ROY, SANTANU KR. MISRA26 |
1 | |
14 | A Machine Learning Approach for Understanding Student Learning Experience Using Naive Bayes ClassificationV. ABINAYA, DR. B. SRINIVASAN34 |
2 | |
15 | A Survey of Internet of Things (IoT) - Applications, Merits, Demerits & ChallengesKAVYASHREE E D, VIDYASHREE H D, ANIL KUMAR B H37 |
4 | |
16 | Implementation of Graphical Authentication System for Shoulder Surfing AttacksKEERTHANA M.M, ARCHANA MR69 |
2 | |
17 | Improved Hand Gesture Recognition with SVM, HOG and HMMGOPINADH SASUBILLI, UDAY SHANKAR SEKHAR70 |
1 | |
18 | Safeguarding the Data by Matching Two Shares of CaptchaSATHIYA.V , SUJEE.I, SUBHASHINI.M, UMA MAHESWARI.N71 |
3 | |
19 | Internet of Things Based Smart Vehicular Parking SystemWRUSHALI DINKAR DESHMUKH, POURNIMA ABHISHEK KAMBLE81 |
2 | |
20 | A Review on TCP Flood, DDOS Attack in Cloud Environment & Their SolutionsSONIYA LAZARUS, PROF. DEEPAK PARANJAPE107A |
1 | |
21 | 4G Advanced LTE Device to Device Communication for Connected Vehicle ApplicationDEEPTHY J118 |
1 | |
22 | A Study of Online Interactive Data Mining Tool (OIIDM) used for clustering, Incremental Clustering, Classification, Association MiningRUSHIKESH M. SHETE, PALASH M. GOURSHETTIWAR121 |
1 | |
23 | Enhancing Information Extraction Performance for E-Commerce SystemsSUDHANSHU CHOUREY , PROF. PRASHANT KUMAR KOSHTA130 |
2 | |
24 | Dual Water Marking Embedding using Frequency Domain TechniqueSHIVAM TIWARI , DR. NEERAJ SHUKLA131 |
3 | |
25 | A Privacy Preserving and Content Based Image Retrieval from Cloud using Gabor Features and HOGRAJU B N5 |
2 | |
26 | An Efficient Approach to Aggregate Big Data in Wireless Sensor NetworkRAJU B N6 |
1 | |
27 | An Efficient Approach in Image Secuirty using Secret Fragment Visible Mosaic ImageRAJU B N7 |
1 | |
28 | Efficient Data Collection Using Secure Hybrid RFID and WSNRENUKA D. BEHERE, PROF. S. P. BHOLANE10 |
2 | |
29 | Early Diagnosis of Breast Cancer Using SVMMANISHA GAHIRWAL, SWITA FULWANI, KANCHAN MANIK, NEHA NAVALE, ADITI PARAB.11 |
2 | |
30 | Forecasting of Infrastructure Contingency from Synthetic Aperture Radar Images Using Hybrid Entropy Decomposition and Support Vector MachineS.ARAVIND KUMAR, P.YATISH KUMAR APPU, P.VENKETRAMAN15 |
1 | |
31 | Emissary Camcord Revealer : Spy Cam DetectorBHUVANESHWARI S, DEIVANAI C, JAYASHREE R, JESSIE JANNET JAQUILIN J, MALATHI MALLAIAH M16 |
2 | |
32 | Educational Platform for Pre-Primary Students using Image Processing and Machine LearningADITI JAHAGIRDAR, ABHISHEK PAWAR, HRUSHABH KEDARI, SRUSHTI BORADE, SURABHI KHILARI17 |
1 | |
33 | A Survey: Protection of Big Data Using Third Party Auditing and Data De-duplicationPROF. N. KIRTI, RAVI MOHITE, KHUSHAL KHULE, CHAITALI SHINDE21 |
2 | |
34 | Explosion Detection and Drainage Monitoring by Automation SystemDHANALAKSHMI.G, AKILA.S, FRANCISCA LITTLE FLOWER.M, HARIBALAMBIKA.R22 |
2 | |
35 | An Efficient Pursuit Plan over Scrambled Information on Portable CloudDILLIBAI. R, SANDRA JOHNSON24 |
1 | |
36 | Wheel Chair Based on the Concept of Artificial IntelligenceDRISHTI SHISHODIYA, PRIYEN DANG, YASH SHAH, DIPESH AGRE, SOHAM THAKER, MEET GADOYA27 |
1 | |
37 | Intelligent Accessing of Remote System using H2O Flow for Future PredictionJENNIFER D, SWATHI.P.I , SWETHA.K , SUSHMETHA.G.L28 |
2 | |
38 | An Asset Finder Using Arduino Pro MiniSASWATI BHATTACHARYA , HAYMON RAI29 |
1 | |
39 | A Study on Design of an Adaptive System for Stabilization of A 3D Printer Using 3D Pen & GCODE LanguageBHUSHAN MHASKE, ANKIT PANCHAL, NEHA PATIL, PRIYA PATIL, NILESH RATHOD30 |
2 | |
40 | Development of an IOT based Visitor Detection SystemR.JEENA, G.DEEPIKA, HARINI P, KIRTHANA K31 |
2 | |
41 | Study of Metadata Management in Learning Objects using Cloud E-LearningPRIYANKA BHADORIA31A |
1 | |
42 | Implementation of Microcontroller Managed Module for Automatic Ventilation of Vehicle Interior and Fire ControlS. G. PATIL, A. V. SHINDE32 |
1 | |
43 | PANACEA – A Cloud based Decision Making System for Blood Donation ServiceADITYA SRIKAR B, AJAY HENRY C, DR. VIGNESHWARI S33 |
2 | |
44 | Solid Waste Management and Automated Data Processing System Using Multi-SensorsHEMAMALINI.B, ISHWARYA LAKSHMI.C, MANISHA DEVI.R, DR.P.SARAVANAN,35 |
1 | |
45 | Home Automation using Bluetooth and IOTAMAR PAWAR, RAHUL SHARAN, RAHUL PATIL, SANDIP CHAVAN36 |
4 | |
46 | Heuristic Based Approach for Fraud Detection using Machine LearningNIDA KHAN, MANLIV KAUR, RIDDHI PANCHAL, PRASHANT KUMAR RAI, NILESH RATHOD38 |
3 | |
47 | Detection of Malware and Fraud Ranking Using Fairplay SystemP.KEERTHI, M.KIRAN KUMAR, T.KALPANA, P.KARTHISHA. SK.AFRIN39 |
1 | |
48 | Advanced Security System for Bike Rider's SafetyI.VANADANA, P.SEKHAR, P.MONICA SIRI, G.RAJESWARI, G.MAHIMA, D.PRATHYUSHA40 |
1 | |
49 | Android to PC Chatting & Sharing ApplicationPROF.R.P.JARE, AISHWARYA YELWANDE, POOJA MOTE, KAJAL PASALKAR, SIDDHESHLANDE41 |
1 | |
50 | 'HUDWAY'-Car Navigation with Advanced Automated GPS SystemMS. MONIKA KUTE, AADITYA PARDESHI, RITIK KHANDELWAL, ANKEET DOLWALNI, SACHIN INGALE42 |
1 | |
51 | Analysis of Fruit Infection Detection Using Image Processing and Cloud ComputingRAMYA.R, SANGEETHA.J, SANGEETHA.L, SANTHOSH.C, RAMESH KUMAR.A43 |
2 | |
52 | Control of Photograph Sharing On the Web Social Interpersonal OrganisationDHARANI.R, VIDHYA LAKSHMI.T, DEEBIKA.S, SUPRIYA .R44 |
3 | |
53 | Symptoms Wise Disease Inference System Using Data Mining TechniqueTEJAL P. BURANGE, PRASHANT N. CHATUR45 |
1 | |
54 | Designing of BCH Decoder Using Novel Folding TechniqueGANDHAM NAVYA, THOTA CHIRANJEEVI, ANUMUKONDA SIREESHA, BANDARU JAYA KRISHNA, PENNERU SINDHU TEJA46 |
5 | |
55 | Ingenious Design of Bus Tracking and Fuel Monitoring System Including Breath AnalyzerR.JOSPHINE LEELA, M.ALAGGUARAVIND, R.SARAVANAN, R.VIGNESH47 |
3 | |
56 | IOT Based Smart Garbage Monitoring and Alert System Using Arduino UNOK.HARIKA, MUNEERUNNISA, V.RAJASEKHAR, P.VENKATESWARA RAO, L.J.N SREELAKSHMI48 |
6 | |
57 | Prevention of Post Harvest LossesA.JOSHI, DENNY PAUL, NIJANTHAN M.S, VGVSS TEJA49 |
4 | |
58 | Virtually Controlled Mini-Car Using KinectD SRI RAMA MURTHY , CHALAMALASETTY PURNA SAI RAMANI, AMBATI SESHA SAI AKHIL, BANDREDDY SUPRIYA, VISSAMSETTI MANIKANTA, NALLAMOTHU VENKATESWARA RAO50 |
1 | |
59 | An Intelligent Data Sharing Over Crypto Cloud Environment with Enhanced Key NatureSEETHA.B51 |
1 | |
60 | Bandwidth Aware Routing For Improving Quality of Service in AODVSASIKUMAR. N, HEMA SWATHI.S52 |
1 | |
61 | Exploration Risk Factors and Prediction of Heart Disease Using Mining TechniquesSOWMIYA.T, DR. V. SAI SHANMUGA RAJA53 |
3 | |
62 | Face Recognition Based on Kinship Using Distance Learning ApproachDIVYA DHARSHINI .N, GOMATHY NAYAGAM. M54 |
2 | |
63 | Intelligent Cloud Service Selection Using Multi-Merkle B-Cloud Tree StrategiesPRABAVATHI.K, KARTHIKA.GB55 |
1 | |
64 | Intelligent Number Plate Recognition System for Avoiding Vehicle SCAMSM.KARTHIKAIPRIYAN, A.SYED IBRAHIM, S.GOBINATH , S.JOHN JOSEPH, S.SARAVANAKUMAR56 |
2 | |
65 | Intelligent Prediction of Lung Cancer via MRI/CT Images Using Morphological Neural Network AnalysisVIJAYALAKSHMI.N, ILAYARAJA.V57 |
2 | |
66 | Retinal Image Processing Using Neural Networks for Disease PredictionDIVYA. K, ELAVARASI. D58 |
1 | |
67 | Shoulder Surfing Resistant and Graphical Authentication SystemR.ANANDA PADMANATHAN, K.RAJMOHAN, S.JEYAJEEVANRAM, S.JOHN JOSEPH, S.SARAVANAKUMAR59 |
8 | |
68 | IOT Based Healthcare and Medical Knowledge Extraction System for Medical Big DataKUNAL SHARAD RAGHORTE, SIMPI, A.U. GAHANKARI, GOPAL SAKARKAR60 |
1 | |
69 | Efficient Cloud Data Sharing With Strong Key Analysis Using Intelligent Crypto SystemJ.DHIVYA, S.AANJAN KUMAR61 |
2 | |
70 | Attribute Based Intelligent Data Management Scheme over Cloud with Duplication-Free Data LogicK.PRIYA, P.PONVASAN62 |
1 | |
71 | Intelligent Cloud Service Selection Using Multi-Merkle B-Cloud Tree StrategiesK.SARU NIVEDHA, P.PONVASAN63 |
1 | |
72 | A Study on Design of Extra Sensory PerceptionHARSH MOHILE, JIGNESH PATIL, MEHUL VALANTRA, PROF.ANUSHREE DESHMUKH64 |
3 | |
73 | AES Based Cryptography System for Secured CommunicationV.V.VALLI KANAKADURGA , P.V.V.N.D.P.SUNIL , T.HARIKA , NAHEED SULTHANA , T.MAHESHBABU65 |
1 | |
74 | A Review on Partially Homomorphic Encryption Scheme used in Cloud ComputingNIVEDITA W. WASANKAR, A.V. DEORANKAR66 |
1 | |
75 | Deep Convolutional Neural Networks- A ReviewTASNEEM GORACH67 |
3 | |
76 | Group Message Privacy and Data SharingRITU DHARMIK, POOJA LIKHAR , KAUSTUBH DESHMUKH , MADHURI DUBEY68 |
1 | |
77 | Multi-Cloud Selection for Verifible IndexG.YESHWIN, G.UPENDRA, S.PRINCE MARY72 |
1 | |
78 | Multilevel Thresholding in Compression for Wireless Device NetworkV.JAYAKRISHNA, P.AMBIKANADH REDDY, M.SARAVANAN73 |
3 | |
79 | A Study on Diabetic Retinopathy Using Exudate SegmentationBHUVANESHWARI.S, JOSHNA.S74 |
2 | |
80 | A Study on Design of Crime rate visualization using data miningAVINASH PATIL, DIPESH PATIL, ARVIND SHARMA, PAVAN GUJJAR75 |
5 | |
81 | Design of Low-Power High-Performance 2-4 and 4-16 Mixed Logic Line DecodersD KOMALI, S.SRIDHAR, J.SAIBABU, B.ROHINI KUMAR, MD.AMEENA76 |
3 | |
82 | Digital Ordering System for Hotel Management Using Virtual RealityD.KALAIARASI, P. PRAVEEN KUMAR, B.J.ASHWIN KUMAR, M.BALAJI77 |
1 | |
83 | Initiatives of 5G Vision and 5G StandardizationAdithya Vuppula78 |
3 | |
84 | Stress Detection System Based On Social Interactions in Social NetworksSNEHAL SHELKE, RESHMA SONAR79 |
2 | |
85 | A Cloud-Based Smart Vehicle Parking System for Smart CitiesKOMAL MHOKAR, PRIYANKA MODAK , NEHA PRAJAPATI, SHRADDHA TUPE80 |
2 | |
86 | High Performance Packet Capturing Using Data Plane Development Kit (DPDK)SAYALI DIVEKAR, HARDIKA SHAH, NIRANJAN KULKARNI, SONALI ARGADE82 |
2 | |
87 | Authorized Public Auditing Scheme for Shared Data with Cloud UsersDHANALAKSHMI.G, NANDHINI.P, RAJESWARI.N, RAVEENA.B83 |
2 | |
88 | Wildlife Intrusion and Early Fire Detection System Using IoTS.IRIN SHERLY, M.HARIPUSHPAM, B.INFANTINA RINIE, D.JYOTSNA DEVI84 |
1 | |
89 | Mouse Controlling using a Web Cam based on Color DetectionSHRUTI K. SUTAR, PRATIKSHA V. LOLE, AMRUTA B. LOHAR , PROF. KALBANDE M. S85 |
1 | |
90 | Algorithms for Inferring User Search Goals Using Feedback SessionRUTUJA R. DHAMDHERE, GAYATRI A. DUKALE, SNEHAL J. DIVATE, RACHANA M. KENDRE, SADIYA N. KHAN, PROF. JANGAM D. Y86 |
1 | |
91 | Passive IP Traceback: Using Path Backscatter for IP SpoofersKAMTHE RIYA S, MARDHEKAR SAYALI N, SHAIKH ASIYA Q, PACHPANDE AKSHADA, PROF. JANGAM D. Y87 |
4 | |
92 | Design of Hardware accelerator for Singular Value DecompositionV.BINDU MADHAVI, SAKINA, M.NEELAVENI, P.SURESH BABU, V.NAGA BABU, P.V.V.N.D.P.SUNIL88 |
1 | |
93 | Digital Ordering System for Hotel Management Using Virtual RealityD.KALAIARASI, P. PRAVEEN KUMAR, B.J.ASHWIN KUMAR, M.BALAJI89 |
1 | |
94 | Parking Guidance System Using Internet of ThingsSHRUTHI, RANJITHA D, GANARAJ K90 |
2 | |
95 | A Review Paper on Speed Control of DC Motor & Virtual InstrumentationSTEFFI MARY S, MOHAMMED SHAFFI J91 |
2 | |
96 | An Approach to Remote Sensing Application Using Cloud ComputingAAKANKSHA AUNDHKAR, NUTAN CHOPDE, PRAMILA PARKALE, PROF. VINA M. LOMTE92 |
4 | |
97 | Arduino Based Interaction between Blind, Deaf and Dumb PeopleR.JEENA, ATTUR KEERTHANA, R.MEENAKSHI, K.PRIYA93 |
2 | |
98 | A Survey on Credit Card Fraud DetectionSAMPURNA J, RASHMI R, K.S.SHWETHA, JITENDRANATH MUNGARA94 |
2 | |
99 | Boiler along with DSS compressor automated by PLC and SCADAARUL KUMAR, SACHINN R, RAJA G., HARISH BABU T95 |
2 | |
100 | Design and Simulation of 4 Element MIMO antennas for Wireless ApplicationSNEHAL SURWASE, DHANASHREE YADAV, SHRADDHA SHINDE, PROF. ASHISH JADHAV96 |
2 | |
101 | Overview Study of IoT Healthcare ModelsANJALI YEOLE, SANKET MHATRE, AKASH PATIL, YOHANTH SHETTY, SAMEER UDGIRKAR97 |
5 | |
102 | A Hybrid Approach to Preserving Privacy in Data Mining using L-K-C and personalized PrivacyRAHUL PANDEY, SHILPA JAIN98 |
1 | |
103 | Augmented Reality in RestaurantKUNAL RAUT, PRIYANKA KHARE, AISHWARYA KAMBLE, SACHIN DESHPANDE99 |
11 | |
104 | Text Pattern Mining and Clustering By Using Fuzzy C Means AlgorithmLITHIYA SARA BABU, C.NAMITHA, M.PREETHISHILPA, S.RAJESWARI, S.TAMIL SELVI101 |
1 | |
105 | Stock Price Trend Forecasting Using Supervised Learning MethodsB.S.V.S PAVAN KUMAR, M.S.CHAITANYA, S.NAGADEVI101 |
1 | |
106 | Design and Development of Digital Seed Counter and Seed Blockage Detector in Mechanical Seed PlanterPROF. ANGHA EKBOTE, KALYANI DESHPANDE, JASMIN MULLA102 |
2 | |
107 | Automatic Predict Personality Based on Structure of HandwritingNAIM SHAIKH, RISHABH KUMAR, DEEPAK TIDKE, ROHIT BORUDE, RAKESH BADODEKAR103 |
1 | |
108 | IoT Based Greenhouse Monitoring using Data Compressive Sensing Protocol in WSN: a reviewKRANTI NIKAM, DR. S. P. MOHANI104 |
1 | |
109 | Effective Meeting Management Using Android Application with IOT Deepali Joshi, Ashwini Kotkar, Saloni Wani, Gayatri Yeole Student, Department of Computer Engineering, Guru Gobind Singh Polytechnic, Nasik, Maharashtra, India 105 |
7 | |
110 | Collective Data-Sanitization for Personal Sensitive Information ProtectionPRANJALI KOTHAWADE106 |
2 | |
111 | Regional Language Driven Presentation toolSHARAYU PURANIK107 |
1 | |
112 | Haptic Navigation and Protecting Aid for the Visually ImpairedN. REVATHI, P.A.N. VANAJA, J. KEERTHI, B. SAHITHI SINGH, P. KRISHNANJANEYA, P. SEKHAR108 |
1 | |
113 | Design and Implementation of Prototype of Underwater Submarine for Surveillance by Using GSM TechnologySHIVANI JADHAV, PRAJAKTA KARAPE, SHWETA JADHAV, ASHISH JADHAV109 |
3 | |
114 | Wireless Controlled Kinaesthetic Surgical Light SystemV. YAMINI, K. G. VENKATA KRISHNA, G. L. D. BHAVANI, K. VISALI, K. MOHAN110 |
2 | |
115 | A Survey on Smart Crawler: to discover Deep-Web PagesMAYURI BHOIR, SHRADDHA SASANE, SHRADDHA HULLE, SHILPA CHAVADALLAVAR, M. M. BIDWE111 |
1 | |
116 | An Algorithm of Top-K High Utility Item Sets Mining Over Data StreamMONIKA PAL, M.V.NIMBALKAR112 |
2 | |
117 | A Survey on Steganography with 3D Password SecurityRUTIKA KATE, SHRUTI KHAIRE, JANHAVI SHINDE, NIKITA JOSHI, PROF. V. R. SONAR113 |
1 | |
118 | Minimum Replication of User Data Integrating Anti Collusion Scheme in Cloud GroupsM.MAHENDRAN, M.MULK RAJ, M.GABRIEL, V.SIRANJEEVI114 |
2 | |
119 | National e-Scholarship Scheme/PortalSARANYA E, LOGA SRI JK, KRITHIKA S, SIVA.S, VISHWANATH.R.SAssistant Professor, Department of Computer Science and Software Engineering, Sri Eshwar College of Engineering, Coimbatore, India. 115 |
1 | |
120 | Review of Cloud Computing in Higher EducationL.UDHAYA, B.NANDHINI, S.SURYA116 |
1 | |
121 | Smart Wearable Device Using Arduino GSM ShieldKOTA SRINIVASA RAO, KARRI YATHESHVAMSI NAIDU, MUDADLA ASHA, GULLIPALLI SAILAJA117 |
1 | |
122 | A Review on Searching Encrypted Data over CloudDIPTI D. MEHARE, PROF. A. V. DEORANKAR119 |
2 | |
123 | A Survey: Time Prediction System for the Patients in Hospital Using Parallel Patient Treatment Time Prediction AlgorithmPROF ANJALI PHALTANE, MEGHA WAGHMARE, NOORIN SAYED120 |
1 | |
124 | Co-operative NOMA in 5G SystemsTAMMANA SAI SREE, D SRI RAMA MURTHY, NANDYALA SIVA SURYA KUMAR, KARNA JAHNAVI, GOLLA NAGA VENKATA SAI KUMARI, KANCHARLA PAVITHRA122 |
2 | |
125 | Detection of Disease in Paddy Crop Using Image ProcessingK.G.VENKATA KRISHNA, P.NAGA HARIKA, P.RAMYA, N.MADHURI SAI TULASI, B.SOMASEKHAR, P.SWETHA123 |
3 | |
126 | RAPARE: Mitigating Cold-Start Recommendation Problem by Rating ComparisonBHAGYASHREE BENDALE, HIRALAL SOLUNKE124 |
1 | |
127 | A Survey Paper on Detection and Controlling Measures on Net-spam on Social MediaSHRADDHA AUTADE, KIRAN PAWAR, MRUNALI DONDE, HIMANSHU SINGHAL, PRASHANT AHIRE125 |
2 | |
128 | An Novel Distributed Load Balancing Technique with Multiple Cloud Architecture to Avoid Congestion and HotspotK.KIRUTHIKA, G.GAYATHRI, M.EVANGELIN, TRIBURSIYA, HARINI SRI126 |
1 | |
129 | A Survey on Intelligent student career guide Chat BotK.CHETHAN, N.M.DIVYA PRAKASH, P.LOGANATHAN, A.LALLITHASHR127 |
1 | |
130 | Collaboratively Improving the Performance of Multi-Domain Sentiment Classifiers for Multiple DomainsV. CHUDAAMANI, B. SUNDAR RAJ, B. DIVYA RUPINI, DR. AR. ARUNACHALAM128 |
2 | |
131 | Design of Arduino Based Flood Detection System Using Barometric Pressure SensorAMOL RATHOD, RAJU SHINDE, RAHUL HILALPURE, PROF. SUJIT A. INAMDAR129 |
3 | |
132 | Power Efficient Sense Amplifier Using CMOS 130nm TechnologyV.BHANDHAVI, S.SRIDHAR, M.RAMYA, G.MOUNIKA, T.POOJITHA, R.MAHESH REDDY133 |
4 | |
133 | Exploring Generative Adversarial Networks (GANs) for Realistic Image SynthesisMOHIT MITTAL133 |
2 |