|
|
A Survey Paper On An Improved Scheduling Algorithm For Task Offloading on cloud |
Akash Kandarkar,Aditya Tornekar,Rahul Sawkar,Madhurika Joshi |
Page No. : 723-727 |
Download |
|
|
Video Compression Using FPGA |
Sonali M. Wararkar,Prof. V.M.Joshi |
Page No. : 728-731 |
Download |
|
|
A P2P Technology Based On Relational Database In Cloud Computing |
Akshata Desai,Zeenat Kalambkar,Uma Madake,Megha Jadhav |
Page No. : 732-735 |
Download |
|
|
Evaluating Public Opinion Variation on twitter |
Pallavi Darekar,Kalyani More,Tanuj Deshmukh,Prof. R.S.Shirbhate |
Page No. : 736-738 |
Download |
|
|
Reducing the Effort of Bug Report to Assigning Developers |
Thavare Manisha G,Kute Deepali R,Khedkar Priya S,Prof. Vrunda Bhusari |
Page No. : 739-742 |
Download |
|
|
Security Challenges in Cloud Computing Infrastructures |
Tehseen Shaikh,Aishwarya Shingare,Pooja Dhere,Prof. Y K. Patil |
Page No. : 743-745 |
Download |
|
|
Security Email Filtering Using User Prediction |
Swapnil Mahale,Shyam Manzarte,Kedar Joshi,Shridhan Patil |
Page No. : 746-748 |
Download |
|
|
Crime detection through Image Retrieval system |
Nikhil Bagade,Ashwinkumar Vispute,Prathamesh Thorat,Prachi Gaikwad |
Page No. : 749-751 |
Download |
|
|
Implementation and Comparison of Existing Formulae for Energy Detection based Spectrum Sensing in Cognitive Radio Network |
Mrs.Meena A. Deshmukh,Mrs.Vaishali M. Joshi |
Page No. : 752-755 |
Download |
|
|
Cloud Information Accountability (CIA) framework based on Information Accountability |
Mr. Borse Sagar Ravindra,Mr. Dengale Pritam Vijay,Mr. Dorge Yogesh Walmik,Miss.Jagtap Priyanka Raosaheb |
Page No. : 756-760 |
Download |
|
|
Natural Frequency Analysis of Epoxy Glass Fibre Composite Cantilever Plates |
Tapeshda R. Bobade,Dr.G.V.Shah |
Page No. : 761-765 |
Download |
|
|
Comparative Strength Analysis of Composite Material Bar with Steel Through Experimentation and FEA |
Mr.R.S.Nagmode,Prof.V.P.Mali |
Page No. : 766-769 |
Download |
|
|
Effective Online Knowledge Sharing using Refined Search |
Atanu Samadder,Mandar Kale,Shivender Singh,Sayali Jojare |
Page No. : 774-778 |
Download |
|
|
Market Basket Analysis using Data Mining |
Basod Sagar,Raut Sagar,Nitesh Singh,Mungase Ganesh |
Page No. : 779-781 |
Download |
|
|
A Filtering Dispensable Messages From Social Networking Sites User Walls |
Prof. Shilpa P. Bunjkar,Amol Chaudhari,Avinash Waghmare,Sachin Bhosale,Sahil Dhar |
Page No. : 782-784 |
Download |
|
|
A Survey Paper on Advance Security in Cloud by Cypher Deletion using Self-Destruction |
Swapnil Jumale,Darshan Kuyate,Pranav Bansod,Kanhaiya Ufade,Prof. Vaishali Bhorde |
Page No. : 785-787 |
Download |
|
|
Different modes of Discovery of Network nodes using SNMP and Reconciliation |
Divyani Vade,Hemlata Eglambe,Megha Temgire,Prof. Radha Shirbhate |
Page No. : 788-790 |
Download |
|
|
Quaternion Matrix Approach For Color Image With Vector Sparse Representation |
Roshana Date,Tejashri Gavate,Ankita Thorat,Prof. Milind Hegade |
Page No. : 791-794 |
Download |
|
|
Secure Transaction An Credit Card Fraud Detection System Using Visual Cryptography |
Prajakta Akole,Nikita Mane,Komal Shinde,Prof. Swati A. Khodke |
Page No. : 795-798 |
Download |
|
|
Security System For Multi-Tier Web Application |
Snehal Gaikwad,Pratiksha Ingavale,Shruti Yewale |
Page No. : 799-802 |
Download |
|
|
Smart Traffic App Using Android Phone |
Mehra Varsha,Kodgire Nikita,Mehetre Komal,Prof. A.G.Baviskar |
Page No. : 803-805 |
Download |
|
|
De-Duplication & Secure Authorized Data Using Hybrid Cloud |
Nimgire Reshma,Kemdarne Snehal,Tambe Tejas,Prof. G. M. Bhandari |
Page No. : 806-810 |
Download |
|
|
Implementation of Efficient algorithm for exact Hausdorff Distance |
Wardole Trupti N,Waghole Ashwini W,Zarekar Snehal K,Prof. Sonali A. Patil |
Page No. : 811-814 |
Download |
|
|
Text Mining using Hybrid Algorithms |
Trushagni Bhoi,Sayali Shinde,Kajal Kajale,Prof. Nitin Shivale |
Page No. : 815-818 |
Download |
|
|
Trinity Unsupervised Web Data Extraction Using Ternary Trees |
Sathe Namrata,Shinde Nutan,Kodulkar Awantika,Prof. Mr. Nitin Shivale |
Page No. : 819-822 |
Download |
|
|
Email Based System For Visually Impaired People |
Sonali.U. Singh,Komal.M.Patil,Nidhi.S.Shrivas,Prof. S.A.Shanwad |
Page No. : 823-827 |
Download |
|
|
Fraud prevention by visual secret sharing multicomponent using Hybrid codebook |
Pranjali Mahajan,Swati Rupnwar,Sneha Tekale |
Page No. : 828-832 |
Download |
|
|
Image-Based Geographical Location Estimation Using Web Cameras |
Puja R. Patil,Vrushali T. Thorve,Minal Pawar,Pooja R. Patil |
Page No. : 833-836 |
Download |
|
|
Seed Block Algorithm A smart technique for Data Back-up and Recovery in Cloud Computing |
Ms. Mayuri Tidke,Ms. Vijayshree Jadhav,Ms. Sonali Parab,Ms. Shubhrata Patil,Prof. Y. K. Patil |
Page No. : 837-840 |
Download |
|
|
PC -Z Security using Eigen face and Adaboost |
Dwarkadas Badak,Rahul Chitnis,Vishal Dhavale,Govardhan Kunthe |
Page No. : 841-847 |
Download |
|
|
Proximity evaluation app for Face-to-Face Proximity evaluation Using Bluetooth on Smart phones |
Madhuja Bhole,Radhika Kale,Suchitra deokate,Prof. Milind Hegade |
Page No. : 848-852 |
Download |
|
|
Fusion Based Strategies to Combine Hazy Images Into Single Image |
Shikha Yadav,Nikita Borade,Anuradha Badgujar,Prof. Sonali A. Patil |
Page No. : 853-855 |
Download |
|
|
Double Guard Detecting intrusions in Multitier web application with security |
Amit Patil,Vishal Thorat,Amit Mane |
Page No. : 856-860 |
Download |
|
|
Content Based Mechanism for Social Network using Machine Learning |
Akshata Thorat,Priyanka Ghule,Snehal Dabhade,Prof. Megha Jadhav |
Page No. : 861-864 |
Download |
|
|
Measurement Study of Video Quality Using Users Feedback |
Shital Deshmukh,Shubhangi Gaikwad,Jyoti Markad,Prof. Swati.Khodke |
Page No. : 865-867 |
Download |
|
|
Android Based Health Application in Cloud Computing For Blood Bank |
Sayali Dhond,Pradnya Randhavan,Bhagyashali Munde,Rajnandini Patil,Prof. Vikas Patil |
Page No. : 868-870 |
Download |
|
|
Visualization of Streaming Data Using Social media |
Sagar Galande,Akash Nalla,Sarika Devghare,Shweta Kadam,Prof. V. Punna Rao |
Page No. : 871-873 |
Download |
|
|
A Survey Paper on Biomedical Data Collection and Processing System |
Shubham Saxena,Parul Singh,Shubham Lungare,Sameer Keluskar |
Page No. : 874-877 |
Download |
|
|
A Novel Methodology for Direct and Indirect Discrimination Prevention in Data Mining |
Karan Sisodiya,Mahesh Todkari,Prashant Kesarkar,Abhishek Sadhu,Prof.Y. B. Gurav |
Page No. : 878-882 |
Download |
|
|
Web Application framework for GNUKhata using MVC Technology |
Sandbhor Devdas B,Pardeshi Madan G,Kamble Aarti C,Pandhare Bhagyashri H |
Page No. : 883-885 |
Download |
|
|
A Survey on Stock Market Prediction |
Vikas Chaurpagar,Vijay Gavhane,Kumar Jagtap |
Page No. : 886-889 |
Download |
|
|
Security and Privacy in Information Brokering System |
Hrushikesh Bhosale,Amit Chaudhari,Amar Karande,Ranjit Phadatare |
Page No. : 890-892 |
Download |
|
|
Providing Rank in Search Engine Through User Behavior |
Shinde Suchitra,Bagade Priyanka,Bhor Gandhali,Prof. Bharat Burghate |
Page No. : 893-895 |
Download |
|
|
Detection and Recovery of Errors on Cloud in Efficient Time using Hadoop |
Priyanka Shahapure,Priyanka Pagar,Pallavi Sabde,Snehal Sable,Prof.Vikas A. Patil |
Page No. : 896-898 |
Download |
|
|
Virtual Keyboard and Virtual Mouse |
Jahangir Shahabadi,Krutika Jadhav,Sayali Mane,Fahad Jagirdar |
Page No. : 899-901 |
Download |
|
|
Implementing Incremental Data Migration for Multidatabase System |
Priyanka Bhole,Arati Vidhate,Prajkta Kaudare,Monika Kute |
Page No. : 902-905 |
Download |
|
|
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System |
Nikhil Nakhwa,Tushar Khude,Shashikant Dighe,Shankar Kate |
Page No. : 906-910 |
Download |
|
|
A Survey Paper on Personalised Recommendation System for Commercial Websites |
Mr.Vivek Sharma,Miss.Nidhi Reshi,Miss.Chaital Garde |
Page No. : 911-914 |
Download |
|
|
An Interactive Computer Environment Using Speech Recognition |
Purva shelar,Sushrut Singatkar,Megha Tangade,Vijay Varma |
Page No. : 915-918 |
Download |
|
|
A Medical WEB portal Effective relationship Management between Patients and Doctors |
Darekar Rutuja Arun,Pandarkar Aarti Anil,Shinde Priyanka Milind,Prof. Bharat Burghate |
Page No. : 919-921 |
Download |
|
|
Efficient Data Hiding Scheme Using Audio Steganography |
Ankita Navagire,Ashwini Navghare,Ayush Porwal,Jhalak Swami,Prof. Santosh Darade |
Page No. : 922-925 |
Download |
|
|
Intrusion Detection System for Integrity Checking with ID-DPDP |
Mayur Kudale,Gaurav Katte,Priyanka Gire |
Page No. : 926-929 |
Download |
|
|
Malware Application Detection System for Android |
Omkar Bhor,Dhananjay Gandole,Vikram Ghule,Mahesh Garje |
Page No. : 930-933 |
Download |
|
|
Study of Interactive Database Exploration |
Aashish Bhagwat,Mahesh Langote,Vishal Shelke,Mohini Phajge,Prof. Vinod Wadne |
Page No. : 934-936 |
Download |
|
|
Distributed Hybrid System For File Sharing |
Naina Kumari,Abhishek Nair,Yashwant Padekar,Vinod Thorat |
Page No. : 937-940 |
Download |
|
|
A Survey Paper on Bandwidth Shifting and Allocation using Mobile Cloud Environment |
Neha Patil,Shraddha Chavanke,Karishma Ganjoo,Prof. G.M.Bhandari |
Page No. : 941-943 |
Download |
|
|
Click-through Data In Web Search Engine |
Prof.B .D.Shendkar,Vikas Yadav,Radhika Sadistap,Vaishali Sutar,Akshay Shirbhate |
Page No. : 944-946 |
Download |
|
|
A Survey on Ubiquitous Car Monitoring System |
Spurti Shinde,Aditya Rathor,Kalpita Kunte,Akash Sangle,Vrushabh Sonigara |
Page No. : 947-953 |
Download |
|
|
Health Surveillance Using ZigBee and GSM |
Someshwar Mashalkar,Saurabh Thote,Pravin Harsure,Prof. Kanchan Varpe |
Page No. : 954-956 |
Download |
|
|
Big data security using hybrid cloud |
Mr.V.P Rao,Gaurav Khandar,Manas Kulkarni,Shubham Nayab,Gaurav Shahane |
Page No. : 957-659 |
Download |
|
|
Robot Control Design using ANDROID Application for Surveillance |
Pradnya Gautam Gadve,Gauri Nandkishorsingh Bais,Pradnya Jagdish Dhadge,Prof. Prashant B. Jawalkar |
Page No. : 960-963 |
Download |
|
|
Ambient Occlusion In Moving Images Using Kalman Filter |
Rakhi Saini,Sweta Kadam,Pooja Gaikwad,Prof. Swati Khodke |
Page No. : 964-967 |
Download |
|
|
Smart City Parking System |
Ahteshamul huq osmani,Ashwini Gawade,Minal Nikam,Swati Wavare |
Page No. : 968-970 |
Download |