|
|
Efficient Software Issue Tracking System Using NB Classifier |
Ashwini Rakshe, Sayali Suryawanshi, Shubhangi Nighul, Bhavana Patil, U.H.Wanaskar |
Page No. : 2281-2283 |
Download |
|
|
Advance Detecting & Preventing Intrusions In Multi Tier System |
Seema Gajare, Prof.Baban Thombre |
Page No. : 1988-1992 |
Download |
|
|
The Survey of AIS & Accident Pattern |
Shekhar Gurav, Ayush Varma, Vrushali Gosavi |
Page No. : 1993-1995 |
Download |
|
|
A Survey of Dual Sentiment Analysis of User Comment |
Prof. R.N.Phursule, Tarika Shete, Ashwini Darekar, Tejashri Khawle, Ashwini Jadhav |
Page No. : 1996-1998 |
Download |
|
|
A Survey Generation of Mobile wireless technology |
Prashant Wakhare |
Page No. : 1999-2001 |
Download |
|
|
Smart Agriculture System Using IOT |
Vinayak Waghmare, Shubham Shrivastav, Chetan Waman, Sachin Sude |
Page No. : 2002-2005 |
Download |
|
|
Digitization of Police System Using LBS and Data Mining |
Amir Shaik, Aarif Tamboli, Faizan Sayeed, Saiprasad Randale |
Page No. : 2006-2009 |
Download |
|
|
Real Time Digital Medical Assistance |
Sunanda Kadam |
Page No. : 2010-2012 |
Download |
|
|
Behaviour of Steel Fiber Reinforced Self Compacting Concrete in Short Column |
Akshay V. Deshmukh, Rashmi S. Unone, Priya S. Deshmukh |
Page No. : 2013-2015 |
Download |
|
|
Secure Data Sharing In Cloud: A Review |
Prof. Shital B. Jadhav, Neetal A. Revankar, Sanjli S. Raorane, Payal B. Oswal, Vaishnavi D. Sagale |
Page No. : 2016-2019 |
Download |
|
|
A Survey Of Sign Language Recognition |
Gauri Hanwate, Gayatri Tatkar, Rutwik Patwardhan, Pooja Sutar |
Page No. : 2020-2022 |
Download |
|
|
A Survey Of E-Commerce Gateway |
Anish Dange, Shreeyash Ghag, Vishal Jain, Soumitra Sane |
Page No. : 2023-2025 |
Download |
|
|
Prediction of Movies Box Office Performance Using Social Media |
PRATIK DHANAWADE, RITESH PATIL, REENA CHOUGULE, KIRTI ADWANT |
Page No. : 2026-2029 |
Download |
|
|
A Survey on Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
Gayatri Purnale, Prof. Archana Jadhav |
Page No. : 2030-2033 |
Download |
|
|
A Survey on Group Data Sharing using Key-Aggregate Searchable Encryption (KASE) Technique in cloud |
Amruta Nerlekar, Ankita Patil, Prof. Rugraj Purohit |
Page No. : 2034-2036 |
Download |
|
|
OPoR: Enabling Proof of Retrievability in Cloud Computing for Secure Data Storage |
Ankita Patil, Amruta Nerlekar, Prof. Priyadarshani Kalokhe |
Page No. : 2037-2040 |
Download |
|
|
IoT Based Real Time Water Level and Contamination Monitoring System with Android Interface |
Aishwarya Bangale, Ruchee Dandekar, Prerna Madke, U. H. Wanaskar |
Page No. : 2041-2043 |
Download |
|
|
FOG COMPUTING USING DECOY TECHNIQUE |
Rupesh R Bhairat, Ajit N Ghagare, Yogesh K Nath |
Page No. : 2044-2046 |
Download |
|
|
Ingenious Pushcart |
Ms. Aarti Prakash Ahuja, Ms. Anusha Dilip Patil, Mr. Rohit Deepak Haryani, Prof. Muzaffar A.R. Shabad |
Page No. : 2047-2049 |
Download |
|
|
Review Paper on Keyring Managing for Information Security using Mobile Computing |
Disha Vyavahare, Renuka Satpute, Kapil Sane, Priyanka Chavan |
Page No. : 2050-2056 |
Download |
|
|
Tag Based Caption and Information Generation |
Mr. Pratik Bhakkad, Ms. Priyanka Bhavsar, Ms. Kshitija Chinchkar, Prof. M.A.R.Shabad |
Page No. : 2057-2059 |
Download |
|
|
A Secure Re- Encryption with key Distribution Scheme for data sharing in Unreliable Cloud Environment |
Vaibhav Mahode, Shubham Chaudhari, Rohan Vanga, Akshay Patil |
Page No. : 2060-2062 |
Download |
|
|
Allusive Study of Performance Progression Techniques for Hadoop |
Sumit S. Shitole, Yash A. Bonde, Vrushali V. Khodade, Gunjan D. Deswal, Prof. Mohan V. Pawar, Prof. Ravindra P. Bachate |
Page No. : 2063-2068 |
Download |
|
|
A Survey on Mechanism of Ranking Fraud for Mobile Apps Applications |
Rakesh Saini, Juber Shaikh, Harshal Shirole, Vilas Pawar |
Page No. : 2069-2071 |
Download |
|
|
LAN Monitoring System |
Pavan Shinde, Rohit Pankhe, Vaibhav Tekale, Santosh Sawant, Prof. H.U. Joshi |
Page No. : 2072-2074 |
Download |
|
|
A Survey on: Duplicate File in Cloud Storage Environment |
Pandurang Gavhane, Sarika Jadhav, Ashvini Shelar, Rupali Borhade |
Page No. : 2075-2077 |
Download |
|
|
A Survey on ITIL Framework |
Rutuja Narhe, Swapnali Naik, Amruta Pimpale, Sayali Satkar |
Page No. : 2078-2080 |
Download |
|
|
Android based vehicle monitoring and controlling system |
Swati Sonawale, Kajal Chavan, Sneha Gambhire, Asmita Jadhav, Asmita Rawool |
Page No. : 2081-2084 |
Download |
|
|
Effect on Location Privacy Preservation Level by Time varying Population Density |
Nawale Prajakta P., Kolekar Rutumbhara B., Saptarshi Priyanka S., Alhat Shubhangi B. |
Page No. : 2085-2087 |
Download |
|
|
Brain Tumor Detection Using Image Processing |
Bhushan Pawar, Siddhi Ganbote, Snehal Shitole, Mansi Sarode |
Page No. : 2088-2092 |
Download |
|
|
Remote Access & Control Desktop through Smart Phone |
Arshad Momin, Sadaf Mulla, Fawwad Khan, Shahrukh Shaikh, Swapnil Shinde |
Page No. : 2093-2095 |
Download |
|
|
A Survey on Data Self-Destruction System for Cloud Storage Networks |
Vaishali Hargude, Jyoti Ohol, Sonal Rahinj, Smita Wangale |
Page No. : 2096-2099 |
Download |
|
|
A survey on Honeyd: A system for analysis of network attacks |
Nikita A. Mane, Vinod B. Thorat, Kunal N. Shirke, Prof. Mrs. Premlatha G. |
Page No. : 2100-2102 |
Download |
|
|
A Survey: Dynamic Allocation of Slots for Map Reduce Workload |
Dhananjay A. Ahire, Narayan K. Dongare, Pooja P. Wankhede, Chiranjivi D. Mane, Prof. Devendra Gadekar |
Page No. : 2103-2107 |
Download |
|
|
A Survey on Anomaly based Intrusion Detection using K-means Classifier in Hadoop |
Neha Dhanawade, Meghana Mohite, Dhiraj Bahakar, Pratibha Gitte |
Page No. : 2108-2110 |
Download |
|
|
Time Based Self Destruction System for Secure Data Sharing in Cloud |
Nitin P. Jadhav, Sumit Surwase, Satyajit Biradar, Balaji Mane, Prakash Phadatare, Prof. Shweta Shanwad |
Page No. : 2111-2114 |
Download |
|
|
An Imroved Method For LSB & BPCS Using Visual Crptography |
Tamboli Jannat, Kurapati Varsha, More Rani, Mayank Bhaskar |
Page No. : 2115-2116 |
Download |
|
|
Review on Performance and Emission Characteristics of SI Engine by using Magnetic Flux for alternative fuels |
Nilesh R. Pawar, Sanjeev Reddy K. Hudgika |
Page No. : 2117-2119 |
Download |
|
|
Review on Performance and Emission Characteristics of Cl Engine by using Nanoparticles with Blended Biodiesel in Diesel Fuel |
Swapnil V. Ghogardare, Sanjeev Reddy K. Hudgikar |
Page No. : 2120-2122 |
Download |
|
|
Data Transfer Using Touch and Cloud |
Sheshank.S.Ranaware, Sanket Tupe, Akshay Waghmode, Gajanan Jadhav, Arfan Ghori, Prof. Swati. H. Patil |
Page No. : 2123-2126 |
Download |
|
|
Load Balancing and Deduplication |
Bhagyashree Mahajan, Pooja Kumbhar, Pratiksha Ladkat, Poonam Dambare, Prof. Dolly Chandani |
Page No. : 2127-2130 |
Download |
|
|
Traffic Rule violation Detection System |
Pritee Chandre, Priyanka Fulsaundar, Karishma Gundalwar, Chaitanya Kunkulol, Shalini Wankhade |
Page No. : 2131-2135 |
Download |
|
|
Human Detection using UAV |
Vaishali N Bobade, Dhananjay B agale, Ketan C lonikar, Rohit M Binjagermath, Prof. Suhas Kothawade |
Page No. : 2136-2138 |
Download |
|
|
Survey Paper on Carousel attack and Stretch attack on WSN |
Atul Sontakke, Rahul Jaybhaye, Vivek bagade, Sanket Chavan |
Page No. : 2139-2142 |
Download |
|
|
Online Recommendation of Electronic Goods Using NLP &GPS |
Akshata Kharade, Mamta Khillare, Bhagyashree Mohod, Pragya Pragati |
Page No. : 2143-2145 |
Download |
|
|
Security For Message By Combining Steganography And Visual Cryptography |
Komal Shedge, Prajakta Sonawane, Mamta Dhaurkar, Karishma Shaikh |
Page No. : 2146-2148 |
Download |
|
|
Novel Security trend Using Graphical Password |
Pritesh Patil |
Page No. : 2153-2156 |
Download |
|
|
Survey On Web Mining For Users Behavior Information from Central Database System |
Miss. Poonam S. Jadhavar, Prof. Varsha Dange |
Page No. : 2157-2161 |
Download |
|
|
Queue Control System Using Android |
Sujit Pasalkar, Ankit Kharade, Mangesh Nikam, Prakash Jagade |
Page No. : 2162-2164 |
Download |
|
|
Digital Ration Card Using Biometrics GSM And RFID Tags |
Priyanka Nandurkar, Nayankumar Sali, Birappa Dafale, Deepak Chavan |
Page No. : 2165-2167 |
Download |
|
|
Dual Sentiment Analysis & Opinion Mining |
Narayan Hari Singh, Mazhar Shaikh, Vishal Kalburgi, Abdul Majid Ansari, Megha Kharche |
Page No. : 2168-2171 |
Download |
|
|
Load Balancing and Task Scheduling Using Genetic Algorithm |
Pranjali Dube, Tabasssum Nakhawa, Sruthi Ramesh, Priyanka Kolte |
Page No. : 2172-2174 |
Download |
|
|
Optimization Framework for Map Reduce Clusters on Hadoop’s Configuration |
Trupti Mali, Prof. Deepti Varshney |
Page No. : 2175-2180 |
Download |
|
|
Review Paper on Dynamic Multi keyword Ranked Search over Encrypted Cloud Data |
Gaurav Lonkar, Pratik Rajput, Ruturaj Sawant, Amir Shaikh, Prof. V. S. Wadne |
Page No. : 2181-2183 |
Download |
|
|
Advance Data Theft Detection using Fuzzy Inference System |
Shraddha Veer, Prof. S. N. Shelke |
Page No. : 2184-2186 |
Download |
|
|
Face Recognition for Authentication on Social Networking Site |
Bhagyashri Dhawle, Prof. S.B. Rathod |
Page No. : 2187-2189 |
Download |
|
|
Municipal Waste Collection System |
Akash Naik, Amol Khirade, Amar Harde, Ashwini Choudhari |
Page No. : 2190-2192 |
Download |
|
|
Enforcing Security in Cloud For Key Exposures |
Kedar Mulay, Arul Mudaliar, Avinash Pujari, Sangram Shitole, Prof.Reshma Patil |
Page No. : 2193-2195 |
Download |
|
|
IOT based Electronic Voting Machine |
Prof. Vineeta Philip, Diksha Biradar, Puja Butla, Mayuri Deshpande |
Page No. : 2196-2198 |
Download |
|
|
Survey On Efficient user revocation for dynamic groups using cloud |
V.A.Patil, Pratiksha Kute, Pritam Pardeshi, Smrutigandha Pathare |
Page No. : 2199-2201 |
Download |
|
|
Experimental comparison of Static, Dynamic Analysis of Steel, Composite Mono Leaf Spring for Shifting Natural Frequency to Reduce the Vibrations |
Mr.Swami Vijay Dayanand, Mr.Raut L.B. |
Page No. : 2202-2207 |
Download |
|
|
Health Monitoring System using Wearable Sensors and Cloud Processing |
Omkar Waghe, Aboli Vanarase, Shalaka Sonawane, Nikhil Ranpise |
Page No. : 2208-2210 |
Download |
|
|
Augmented Reality based multipurpose application for 3D interface |
Prof. S. A. Chiwhane, Prof. D. U. Mishra, Kajal Adsul, Gauri Sawant, Swati Shende, Priynka Waghmare |
Page No. : 2211-2213 |
Download |
|
|
Design Development and Analysis of Variable Displacement Pump |
R.R.Kolhe, Prof.S.S.Pimpale |
Page No. : 2214-2218 |
Download |
|
|
A Survey on Road Traffic Event Detection from tweets Stream Analysis |
Harshali Masalkar, Prof.Sachin Godse |
Page No. : 2219-2222 |
Download |
|
|
Location Based Cloud EcoSystem Using Fog Computing |
Piyanka B. Bachhav, Rani N. Pasalkar, Mayuri M. Shinde, Snehal Y. Jagtap, Prof. Mrs. Nancy A. Peter |
Page No. : 2223-2227 |
Download |
|
|
Predict PC Data Using Artificial Neural Network and Support Vector Machine |
Harshali S. Lidhure |
Page No. : 2228-2231 |
Download |
|
|
Augumented Reality Based Application for 3D Interface |
Pooja Shingare, Amol Shinde, Shital Sonawale, Pooja Nakil |
Page No. : 2232-2234 |
Download |
|
|
A Survey on: Advanced Security Using IDS, IPS and Honeypot in Network System |
Mayur Patel, Abhishek Shinde, Akshay Kalbande, Nishudan Jagtap,Prof. Manisha Singh |
Page No. : 2235-2237 |
Download |
|
|
A Survey of Image Mining and its Applications |
Ashlesh N. Mandke, Dr Rajesh S. Prasad |
Page No. : 2238-2241 |
Download |
|
|
Secure Overlay Cloud Storage System |
Saurabh Satish Patil |
Page No. : 2242-2245 |
Download |
|
|
Smart Card based Ration Distribution System |
Shraddha Lende, Snehal Kalgawkar, Shital Kale, Sara Frushi |
Page No. : 2246-2248 |
Download |
|
|
A Survey on Load Balancing in Multi-Cloud Environment |
Karishma Gidge, Prof. S.B. Rathod |
Page No. : 2249-2252 |
Download |
|
|
A Review on Implementing Secure Encryption Algorithm for Online Transaction System |
Pallavi Patil, Prof. S.T.Waghmode |
Page No. : 2253-2255 |
Download |
|
|
A Survey on Detection Deduplication Encrypted Files in Cloud |
Komal Pawar, Prof. S.T.Waghmode |
Page No. : 2256-2258 |
Download |
|
|
Improve Performance of Hadoop using Efficient Data Aware Caching for Big Data |
Amit A. Khodaskar., Prof.Thombare B.H |
Page No. : 2259-2262 |
Download |
|
|
Online Email Filtering with Voice Generation |
Akshay Neharkar, Akshay Garudkar, Shubhada Gahukar, Mote Rameshwari |
Page No. : 2263-2265 |
Download |
|
|
A Survey of Semantic Approach to Detect Security Issues in Online Social Networks |
Jyoti Bhos, Prof. R.N. Phursule |
Page No. : 2266-2268 |
Download |
|
|
Design and Implementation of Automated Blood Bank using Embedded System |
Akshay Pisal, Deepak Mandale, Sunil Margale, Vishal Khatate |
Page No. : 2269-2271 |
Download |
|
|
Mobile Based Electricity Billing Generation |
Ms. Snehal Pandit, Ms. Jyoti Tupe, Ms. Shaheen Shaikh |
Page No. : 2272-2275 |
Download |
|
|
Data Mining and Forensic Techniques for Internal Intrusion Detection and Protection System |
Miss. Poonam S. Jadhavar, Prof. Varsha Dange |
Page No. : 2276-2280 |
Download |
|
|
Efficient Software Issue Tracking System Using NB Classifier |
Ashwini Rakshe, Sayali Suryawanshi, Shubhangi Nighul, Bhavana Patil, U.H.Wanaskar |
Page No. : 2281-2283 |
Download |
|
|
Identification of Anomalous User Behavior in Twitter |
Anjali Changale, Anjali Ghutke, Sonali Takke, Shital Peddawad |
Page No. : 2284-2286 |
Download |