|
|
An Efficient Certificateless Encryption for Secure Data Sharing Over the Network Using AES-128 and AES-256 |
Sudhir Dhongade,Shrikant Bhandare,Amol Davare,Rudraksh Chandel |
Page No. : 589-592 |
Download |
|
|
Study of Urban Land Management Techniques Followed in India |
Avinash Satashia |
Page No. : 593-595 |
Download |
|
|
Secure Data Mining Using Homomorphic Encryption |
Raunak Joshi,Bharat Gutal |
Page No. : 596-598 |
Download |
|
|
Frequent Itemsets Parallel Mining Algorithms |
Suraj Ghadge,Pravin Durge,Vishal Bhosale,Sumit Mishra |
Page No. : 599-604 |
Download |
|
|
Friend book Recommendation System |
Harsha Chaudhari, Nilam Darekar, Harshal Wani, Vishal Raut |
Page No. : 605-608 |
Download |
|
|
An Recommendation Based Process Modelling Support Method And User Experience |
Dhadge Anjali R,Gawali Sunita S,Gore Pooja R,Prof. Ms.Sonali Patil |
Page No. : 609-612 |
Download |
|
|
Knowledge Discovery From Social Media Data For Education Enhancement |
Ms.Neha Dubey, Ms.Aakankshi, Ms.Neelam Borde |
Page No. : 617-619 |
Download |
|
|
A Secure E-Voting System Using Face Recognition and Dactylogram |
Patil Rahul H,Tarte Babita B, Wadekar Sapana S, Zurunge Bhakti S,Prof. Phursule R. |
Page No. : 620-623 |
Download |
|
|
Hand Gesture Recognition Using Flex Sensors |
D. K. Barbole,Dr. D. V. Jadhav |
Page No. : 624-628 |
Download |
|
|
Web Crawler Extracting The Web Data |
Mr. Shaikh Sarfrajnawaj Rajmohammod ,Mr. Ghadage Pramod Dnyandeo,Miss.Pachpute Priyanka Arun,Miss.Marathe Supriya Shivaji |
Page No. : 629-632 |
Download |
|
|
Credit Card Fraud Detection & Prevention System |
Sunny Kadam,Yogiraj Anpat,Harshal Badgujar,Vikram Kharade,Prof. Vaishali Bhorde |
Page No. : 633-635 |
Download |
|
|
A Survey Paper on Keyword Search Mechanism for RDF Graph Model |
Manisha Bhaik,Shyam Gadekar,Nikhil Gumaste,Laxmikant Suryawanshi |
Page No. : 636-640 |
Download |
|
|
Design and Implementation of Microcontroller Based SMPS Using Solar Energy |
Swati Bhosale,Prof.B.V.Pawar |
Page No. : 641-644 |
Download |
|
|
A Web Based Data Extraction Using Hierarchical (DOM Tree) Approach |
Nagawade Megha Prabhakar,Narawade Shubhada Maruti,Shinde Manjusha Bhagwat,Prof. B. R. Burghate |
Page No. : 645-648 |
Download |
|
|
Wi-Fi Message Broadcasting |
Sneha Zagade,Anagha Deshmukh,Pooja Khaire,Prof. Rinku Badgujar |
Page No. : 649-651 |
Download |
|
|
Defect Detection In PCB By Using Hough Transform |
Shivkumar Wadewale,Prof V.M.Joshi |
Page No. : 652-656 |
Download |
|
|
Analysis of Implementation Of Various Smart Energy Meters |
Chaudhary,B.V.Pawar |
Page No. : 657-661 |
Download |
|
|
Skin Lesions Detection Using Statistical Texture |
B. M. Barbole,Dr. D. V. Jadhav |
Page No. : 662-666 |
Download |
|
|
Analysis of Various Techniques Used For Monitoring Health care System |
Suraj Choudhary,B. V. Pawar |
Page No. : 667-671 |
Download |
|
|
ARM11 based Network Gateway for Critical Patient Monitoring System using LAB View Simulation |
Suraj Choudhary,B.V.Pawar |
Page No. : 672-676 |
Download |
|
|
ARM 11 Based Distributed Electrical Energy Monitoring And Feedback Control using Labview Simulation |
Manisha Chaudhary, B.V.Pawar |
Page No. : 677-681 |
Download |
|
|
Secure Key Management Using Session Based Encryption and Re-Encryption System |
Shraddha Banne,Maitreyee Shende,Sneha Gade,Shravani Varute |
Page No. : 682-685 |
Download |
|
|
Intelligent Social Contact Management System |
Mohini A. Nimbalkar,Namrata B. Shekokare,Shraddha B. Divekar |
Page No. : 686-688 |
Download |
|
|
User Domain Analysis Using Social Media |
Pranjali D. Maske,Anju W. Patil,Mahananda R. Tidke,Prof. Rinku A. Badgujar |
Page No. : 689-692 |
Download |
|
|
Data Security Using Crypto Stenography For Sharing Scalable Data |
Mr.Kshirsagar Sopan B,Miss.Karad Vandana A,Miss.Chaskar Kanchan J,Mr.Tayade Bhushan S |
Page No. : 693-699 |
Download |
|
|
Captcha as Graphical Passwords and Authentication for High Security in Cloud |
Miss.Kakade Priyanka Suresh,Miss.Jaykar Sonali Bhaskar,Miss.Lavand Dipali Shamrao,Mr.Randive Digvijay |
Page No. : 700-703 |
Download |
|
|
Document Clustering using k means Algorithms |
Pradeep T. Bhutare,Chaitanya P. Shewale,Ankush B. Bharekar,Akshay S. Pandav |
Page No. : 704-707 |
Download |
|
|
A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining |
Prof.Priya U.Thakare,Pravin Varpe,Dipa Shedage,Jayshri Raykar |
Page No. : 708-711 |
Download |
|
|
Data Mining In E-Commerce Security |
Kiran More,Bhagyashri Nanaware,Seema Misal,Prof. M. J. Arote |
Page No. : 712-714 |
Download |
|
|
Android Railway Ticketing with GPS as Ticket Checker and using QR Code scanner |
Bhandekar Ankita,Chougule Madhuri,Gade Prajakta,Prof. M. J. Arote |
Page No. : 715-718 |
Download |
|
|
Features Preserving Video Event Detection using Relative Motion Histogram of Bag of Visual Words |
Ms. Arifa U. Mulani,Ms. Swati B. Wadghule,Ms. Varsha V. Mahajan,Prof. Radha S. Shirbhate |
Page No. : 719-722 |
Download |