|
|
To Develop New Techniques and Algorithm for Code Clone Detection |
Prajakta R. Ashtaputre, Prof. C. S. Kulkarni |
Page No. : 1372-1374 |
Download |
|
|
Multi-owner Data Sharing using Visual Cryptography |
ShaharukhPathan, Saood khan, Pramodmahale |
Page No. : 1375-1377 |
Download |
|
|
Advance Two Tier Web Application System |
Mr.Mane Gajanan, Ms.Guriya Kumari, Mr.Hiwant Dilip, Mr.Singh Deepak, Prof. Miss.MinaxiDoorwar |
Page No. : 1378-1380 |
Download |
|
|
Survey On Android Malware Detection |
Hemant Chavan, Abhinay Chaudhari, Amol Shivpure, Ankita Ghodke |
Page No. : 1381-1383 |
Download |
|
|
Privacy Preserving KNN Classification Over Secure Encryped Database |
Miss. Megha Savekar, Prof. Patil S.A. |
Page No. : 1384-1387 |
Download |
|
|
Tcp/ip based multi-device programming circuit using arm |
Mrs. R.M. Mandi, Shantanu Tikale, Rajeshwar Rozatkar, Sukanya Suradkar |
Page No. : 1388-1391 |
Download |
|
|
Multimedia Content Protection System for Cloud Based Multimedia |
Priyanka V. Padwal, Prof. Sable N.P. |
Page No. : 1392-1396 |
Download |
|
|
Review: Secure Multi-keyword Ranked Search over Encrypted Cloud Data |
Siddheshwar S. Metkari, Dr. S.B. Sonkamble |
Page No. : 1397-1400 |
Download |
|
|
Private Frequent Itemset Mining Using PFP Growth Algorithm(Transaction Splitting) |
Nikita C. Khandare, Shrikant Nagure |
Page No. : 1401-1404 |
Download |
|
|
Smart Trolley Follower Using Vision Based Technique |
Monish Lalchandani, RohitBhonsle, AdityaTulpule, SwapnilSatpute, Prof. SeemaUdgirkar |
Page No. : 1405-1408 |
Download |
|
|
Survey on Problem Reporting to Respective Authorities |
Akshay Mali,Govind Sukane,Dnyaneshwar Parsewar, prof.Pawan Kumar,Prof. Nagesh Sordage |
Page No. : 1409-1411 |
Download |
|
|
A Novel Secure Group Sharing Framework For Public cloud |
Sandhya Chavare, Prof.Deepak Uplaonkar |
Page No. : 1412-1414 |
Download |
|
|
One Stop Government Portal |
Prof. Sunita Nandgave, Mrunali Deshmukha, Sunita Chavan, Sonali Ghanwat, Neha Shinde |
Page No. : 1415-1418 |
Download |
|
|
A Survey on Product Aspect Ranking |
PradnyaZende, RakhiSatpute, PoonamPanchal, Prof. Sandeep Gore |
Page No. : 1419-1422 |
Download |
|
|
Neuro Fuzzy Based Algorithm For Thickness Computation In Trabecular Bone |
T.Amutha, G.Nandhini, R.Sundaresan |
Page No. : e 1423-1429 |
Download |
|
|
A Review Of Diagnosing Techniques And Fault Anlaysis In Induction Machines |
D.Babukannan, S.Selvaraj, B.Jegatheeskumar |
Page No. : 1430-1434 |
Download |
|
|
Prediction And Analysis Of Bend Force And Spring back Effect On Stainless Steel, Aluminium Sheet In Air Bending Process Using Fea |
Mr.G.Prakashkanna, Mr.P.Lakshmanan, Mr. B.Murugesh |
Page No. : 1435-1445 |
Download |
|
|
Brain Tumor Identification And Segmentation In Mri Images |
B.Jegatheeskumar, D.Babukannan, S.Selvaraj |
Page No. : 1446-1449 |
Download |
|
|
Energy Delay Efficient Adaptive Filter Using Dlms Algorithm |
S.Mahalakshmi, R.Sundaresan, S.Narkees Begam |
Page No. : 1450-1453 |
Download |
|
|
An Operating Condition For Maximizing Tyre Derived Liquid Fuel In Fluidized Bed Using Surface Response Methodology |
S.R.Murali, R.Sundaresan, P.Sivakumar |
Page No. : 1454-1459 |
Download |
|
|
Design of Non uniform cache architecture for Embedded Processors Using Matrix based Lossless Compression Standard |
G.Nandhini, T.Amutha, R.Sundaresan |
Page No. : 1460-1463 |
Download |
|
|
Embedded System Integrated Into A Wireless Sensor Network For Online Dynamic Torque And Efficiency Monitoring And Controlling In Induction Motors |
S.Narkees Begam, S.Mahalakshmi, R.Sundaresan |
Page No. : 1464-1468 |
Download |
|
|
Text Analysis of Users Feedback In Data Mining |
S.Selvaraj, B.Jegatheeskumar, D.Babukannan |
Page No. : 1469-1472 |
Download |
|
|
Energy Efficient Routing Protocol in Wireless Sensor Networks |
P.Sivakumar, R.Sundaresan |
Page No. : 1473-1476 |
Download |
|
|
Data Hiding And Compression Of Images Using Smvq Algorithm |
R.Sundaresan, S.NarkeesBegam, S.Mahalakshmi |
Page No. : 1477-1486 |
Download |
|
|
A New Generation Pocket Finder System Based On Mobile Network Consisting Of Android Mobile Terminal |
S.R.Ghadge, Prof.P.B.Ghewari |
Page No. : 1487-1489 |
Download |
|
|
Design and Development of Arduino Based Gesture Controlled Robotic Arm |
B.S.Suryavanshi, Prof.Dr.S.R.Patil |
Page No. : 1490-1492 |
Download |
|
|
Mining Social Networking site for Digging Students Emotional Behaviour |
Vidya Shendge, Sagar Manisha, Nayantara Daure, Prof. Suvarna Satkar |
Page No. : 1493-1495 |
Download |
|
|
Automatic Purging of Secure Data in Cloud Computing |
Mangesh C. Swami |
Page No. : 1496-1499 |
Download |
|
|
A Survey Paper on Intrusion Detection System with Deceptive Virtual Hosts for Industrial Control Networks |
Ms. Smita Boharpi, Prof.Sonal Fatangare |
Page No. : 1500-1503 |
Download |
|
|
Detecting Tunneled Video Streams Using Traffic Analysis |
Vidya Sudam Waghmare, Prof.Yashwant Ingle |
Page No. : 1504-1506 |
Download |
|
|
Survey Paper on Detecting Phishing Attacks Using PhishStorm |
Sucheta Shinde, Swarupa Kamble |
Page No. : 1507-1510 |
Download |
|
|
Survey on Data Mining and Information Security in Big Data Using HACE Theorem |
Rajneeshkumar Pandey, Prof. Uday A. Mande |
Page No. : 1511-1513 |
Download |
|
|
Mobile Profile Changer and Monitoring System |
Kiran Khandve , Vishnu Bhat , Sagar Avhad, Prof.Bajirao S.Shirole |
Page No. : 1514-1516 |
Download |
|
|
Survey and Analysis of Automated Civil Construction Material Tracking |
Saurabh Badjate, Prof. Pranay Khare |
Page No. : 1517-1520 |
Download |
|
|
Casestudy on the life cycle cost of Energy Efficient building |
Mr.Avinash Chate, Prof. Pranay Khare |
Page No. : 1521-1524 |
Download |
|
|
Securing Software as a Service Model for Cloud Computing |
Smita D. Patil, Pushpa B. Didwagh, Tanvi V. Mhaske, Trupti B. Yadav |
Page No. : 1525-1527 |
Download |
|
|
Review: Public Auditing Securing Multi Owner Data In Cloud Using Multiple Third Parties With Efficient User Revocation |
Atul S Rakate, Dr. D. M. Yadav |
Page No. : 1528-1531 |
Download |
|
|
An Automation System by Using Raspberry Pi as a Sensor Web-Node |
Mr. Lavhkare Dnyandeo S. , Prof. S. Pratap Singh |
Page No. : 1532-1536 |
Download |
|
|
A Review on a Novel Approach for Secure Authorized Deduplication Using Hybrid Cloud |
Akash Dodke |
Page No. : 1537-1540 |
Download |
|
|
Overview of Question Categorisation Techniques |
Asha Bharat Sattane |
Page No. : 1541-1544 |
Download |
|
|
Automatic Student Profiling Based on Learning Style Models in eLearning - A Survey |
Ritesh R. Dhote |
Page No. : 1545-1548 |
Download |
|
|
Optimization of Frequent Representative Pattern Sets using FP Growth Algorithm |
Preeti C. Tarange, Prof. Rajesh H. Kulkarni |
Page No. : 1549-1552 |
Download |
|
|
Sensor Based Transport System |
Ketan Ichake, Dipak Shinde, Bhupendrasing Girase, Amit Biradar, Prof. Mansi Bhonsle |
Page No. : 1553-1555 |
Download |
|
|
Master-key based AES Encryption with Enhanced Multi-keyword Ranked Search for Cloud Data |
Mahesh M. Sapate |
Page No. : 1556-1559 |
Download |
|
|
Secure Search of Cloud Data by Encrypted Relevance Scores |
Leena S. Shewale |
Page No. : 1560-1563 |
Download |
|
|
Survey on Efficient Cryptograghic Techniques and Lightweight Encryption Design |
Shalini, Vidya Lokhande, Ravinder, Ashwini Veer, Prof. NiveditaKadam |
Page No. : 1564-1568 |
Download |
|
|
Survey on Virtual Keyboard using Rough Draft |
Lokesh Patil, Vijay Ghodekar, Shraddha Chorghe, Prof. Sarita Patil |
Page No. : 1569-1571 |
Download |
|
|
Homomorphic Encryption for Data Mining in Cloud Security |
Mr. Sagar M Kale, Mr. Ketan Balharpure, Mr. Sourabh Bhakkad, Mr.Pranav Hendre |
Page No. : 1572-1576 |
Download |
|
|
Indian Sign Language Interpretation Using Camera |
Samruddhi Naik, Kartik Poshattiwar, Minal Kapadnis |
Page No. : 1581-1584 |
Download |
|
|
Depth Sensing Cameras – A Comparative Study |
Samruddhi Naik |
Page No. : 1585-1590 |
Download |
|
|
Vehicle Servicing Application |
Anupam Ankalkhope, Baban Mhaske, Sachin Chavan, Roshan Chafale, Prof. Bharati Kale |
Page No. : 1591-1593 |
Download |
|
|
Driver fatigue detection system using Android application |
Kajal Karbhal, Madhumati Kavale, Supriya Kumbhar, Nikhil Lohar |
Page No. : 1594-1596 |
Download |
|
|
A Survey On Cache Management And Scheduling Policies |
Ashwinee S. Chavan, Prof. Vilas S. Gaikwad |
Page No. : 1597-1599 |
Download |
|
|
A Survey On Clustering Algorithms |
Kaushalya D. Korake, Prof. Vilas S. Gaikwad |
Page No. : 1600-1602 |
Download |
|
|
“Screen Sharer”: Application for Android Mobiles |
Yadav Amar, Phulari Aniket, Yelpale Sachin, Thorat Pratima |
Page No. : 1603-1605 |
Download |
|
|
Survey on Securing Privacy and Protecting Content of Location Based Queries |
Ashwini B.Lothe, R. S .Apare |
Page No. : 1606-1609 |
Download |
|
|
A survey paper on Docker Containers for a consistent IoT development |
Amit Bijave, Sagar Ippalpalli, Rajat Kamble, Rohan Modi, Prof. Deepali Javale |
Page No. : 1610-1613 |
Download |
|
|
Design and development of pzt material as energy harvester which converts vibration energy into electrical energy |
Vinayak R.Ghatage, Prof.S.G.Kolgiri |
Page No. : 1614-1616 |
Download |
|
|
A survey on farmkart: E-farming Interface |
Abhay Sharma, Ashutosh Marampalle, Imran Pathan, Gopal Mishra, Prof. Ganesh Bandal |
Page No. : 1617-1619 |
Download |
|
|
Fog Computing Mitigating Insider Data theft attacks in Cloud |
Ajinkya Dev, Tausif Firoj, Praveen Kumar, Shirshak Khandelwal, Prof. Sunita Nandgave |
Page No. : 1620-1623 |
Download |
|
|
Web Bandwidth Monitoring and Reduction with Firewall Operation |
Mangesh Vasekar, Yogesh Bagade, Mukund Shirsath, Kunal Rawade, Prof. Manisha Singh |
Page No. : 1624-1627 |
Download |
|
|
Application of Finite Element Analysis on Heavy Duty Vehicle (Generic) Chassis |
Vaibhav Sapkal, Dr.N.K.Nath |
Page No. : 1628-1637 |
Download |
|
|
Data Reduction For Energy Minimization in Wireless Sensor Network |
Tejesh Bhosale, Kunal Prasad, Vishnu Domkondwar, Dipika Dapurkar |
Page No. : 1638-1641 |
Download |
|
|
A Keyword Aware Service Recommendation Method For Hotel Recommendation using Big data |
Anjali Yadav, R.B Thakur |
Page No. : 1642-1644 |
Download |
|
|
I-Farm: Intelligent farm |
Gaikwad Anjali, Swapnali Shinde, Ghodke Agraja, Kumavat Mina |
Page No. : 1645-1648 |
Download |
|
|
Android based application for an attendance monitoring |
Miss Renuka Hawanna , Miss Urmila Pawar, Miss Pooja Sashte |
Page No. : 1649-1652 |
Download |
|
|
Securing Online Social Networks From Contemporary Threats |
Aakash Khalse , Harshada Rathod, Ganesh Musmuse, Pradip Shilkande |
Page No. : 1653-1656 |
Download |
|
|
Dynamic fire detection system based on android Using zigbee |
Sunny S Ghodeswar , Sagar S Ghodke, Nishad S. Ghate, Aniket S. Hambarde |
Page No. : 1657-1659 |
Download |
|
|
A Survey on Data Harboring Approach for Heterogeneous Network Security |
Shubham Choudhary, Nikhil Gandhi, Aditya Anthony, Rahul Kolte, Prof. Ganesh Bandal |
Page No. : 1660-1662 |
Download |
|
|
Real Time Credit Card Transaction Analysis |
Anushree Naik, Kalyani Phulmamdikar, Shreya Pradhan, Sayali Thorat, Prof. Sachin V. Dhande |
Page No. : 1663-1666 |
Download |
|
|
Gold Market Analyzer |
Rutuja Chavan, Sonali Gadkari, Kiran Kothule, Bhagyashree Mahale, Prof.Bajirao S.Shirole |
Page No. : 1667-1669 |
Download |
|
|
CNP: Secure Online Transaction Processing Approach |
Tanaji Biradar, Sachin Memane, Akshay Jadhav, Sameer Dabir, Prof. A. R. Uttarkar |
Page No. : 1670-1672 |
Download |
|
|
Infology Categorization by Data Acquisition |
Tanmay Sardesai, Dheeraj Shetty, Jay kumar Bhati, Kiran Sabale, Prof. Sandeep Gore |
Page No. : 1673-1675 |
Download |
|
|
A Survey On Online Security Authentication Using Visual Cryptographic |
Akshay Digrase, Abhinav Vare, Sushant, Prof. Navdeep Bagga |
Page No. : 1676-1679 |
Download |
|
|
Graphical-Based Password Keystroke Dynamic Authentication System for Android/Touch-screen Phone |
Pooja Paigude, Pooja Parekh, Samruddhi Taware, Raavi Vaidya |
Page No. : 1680-1683 |
Download |
|
|
Bait Alarm: Anti-Phishing using visual similarities |
Pritesh Patil, Aditya Suryawanshi, Sanket Deshmukh, Prof. Mansi Bhonsle |
Page No. : 1684-1686 |
Download |
|
|
Intelligent Vehicle Tracking System Using GPS on Android Smartphone |
Pradnya Botre , Bharat Dhangar , Gaurav Gandhi , Saurabh Joshi |
Page No. : 1687-1689 |
Download |
|
|
Multimodal Based Face Recogntion |
Akshay Pardeshi, Saurabh Kasar, Suraj Singh, Shubham Bhosale, Prof. Sindhu M. R |
Page No. : 1690-1693 |
Download |
|
|
Secure E-Payment System using Visual Cryptography |
Kaustubh Gandhi, Sandip Bhasme, Arvind Abu, Prof.Ritu Phadnis |
Page No. : 1694-1696 |
Download |
|
|
Android Based Automated Wheelchair |
Shruti Katkar, Apeksha Gadilkar, Priyanka Durge, Kalyani Jadhav |
Page No. : 1697-1700 |
Download |
|
|
Solar Operating Traveling Sprinkler For Irrigation |
Gore Jayashari, Patil Mansi, Torkadi Urmila, Yede Sushama, Prof. Prerna Jain |
Page No. : 1701-1703 |
Download |
|
|
Android Power Management & Ways to Reduce the Power Consumption in an Android Smartphone |
Varsha Shinde, Rani Magar, Shailendra Kumar Pandey, Prof.Suvarna Bhatsangave, Prof B. Padmavathi |
Page No. : 1704-1707 |
Download |
|
|
Microcontroller based four quadrant speed control system |
Priyanka Mohekar, Pallavi Tonape |
Page No. : 1708-1711 |
Download |
|
|
Intelligent Backup System |
Rashmi Mandave, Shrinivas Dube, Vaibhav Chhajed, Pratik Bobde, Mrs. Shikha Pachouly |
Page No. : 1712-1715 |
Download |
|
|
Smart City - City Management and Rating Government Services Based on Crowd Sourced Data |
Hrishikesh Ghodke, Akshay Bhole, Ashish Bonde |
Page No. : 1716-1726 |
Download |