Published: 2017-12-30

An Approach to Utilize Memory Streams for efficient Memory Management

Manish(Student) , Sunil Dhankar (Reader)

Abstract 85  | PDF

Dynamic parallel K-Means Algorithm Based On Dunn’s Index Method

Hitesh Kumari Yadav Sunil Dhankar

Abstract 98  | PDF

“Tourist App”- to find a locations

Ms.Swati Kute, Ms.Shrutika Dhawane Ms.Swati Kaware, Ms. Yogita Kale, Prof. Shinde S.R

Abstract 46  | PDF

“Formation of E-Commerce Recommendation (E-Shop)”

Ms.Bawake Shraddha N Ms.Barse Stella N ,Kote G.B Ms. Chechre Pritam ,Mr. Chaudhari Suraj

Abstract 96  | PDF

Real-Time Carpooling Application for Android Platform

Nayana M. Nale, Shilpa, R. Landge, Shradha A. Darekar, Suvarna B. Gadhave, Yogesh S. Jorwekar

Abstract 83  | PDF

“Review On- Efficient Data Transfer For Mobile Devices By Using Ad-Hoc Network”

Gunjal Sarla.P. (BE Student), Mandlik Rupali.M. (BE Student), Bhalerao Butkar.U.D (Assistant Professor & Guide

Abstract 59  | PDF

Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites

A.Praveena, Dr.S.Smys

Abstract 79  | PDF

Optimization of Dynamic Packet Length in Wireless Sensor Network

Mr. Sudip Tembhurne 1, Mr. Sachin Deshpa

Abstract 96  | PDF

Modified Random Walk Algorithm to Improve the Efficiency of Word Sense Disambiguation (WSD)

Rashmi S, Hanumanthappa M

Abstract 86  | PDF

Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud

MS. Gayatri D Patwardhan, Prof.B. W. Balkhande

Abstract 85  | PDF

Boundless Communication

Kanika Sluja1, Satinder Kaur2

Abstract 93  | PDF

A review: Issues and Challenges in Big Data from Analytic and Storage perspectives

1Zaharaddeen Karami Lawal 2Rufai Yusuf Zakari, 3Mansur Zakariyya Shuaibu, 4Alhassan Bala

Abstract 89  | PDF

Insights to Sensor Technology and it’s Applications

Prof. Mayuri Bapat

Abstract 70  | PDF

Security Ecosystem in IoT & Cloud

Pokuri Rajani, Parupally Anuja Reddy

Abstract 44  | PDF

Power performance analysis on secure and efficient authentication protcols in mobile devices

S Kharthikeyana, K Azarudeenb , S Samsude

Abstract 42  | PDF

Overview of Classification and Risk Evaluation in Multi-dimensional Datasets

Dr. K. Kavitha

Abstract 59  | PDF

Inferring User Search Goals with feedback Sessions using Fuzzy K-Means Algorithm

Mr.Gajanan Patil, Miss.Sonal Patil

Abstract 46  | PDF

Medium Valuation Method for Massive MIMO Using Gaussian Mixture Bayesian Learning

M.Sakthivel P.Agila P.Anitha

Abstract 37  | PDF

Web Search Result Clustering using IFCWR Algorithm

Arun Kumar Pal1, Ashwini Londhe2, Nitin Patil3 Vinod Bankar4

Abstract 53  | PDF

Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique

Dimple Lalwani , Manasi Sawant2, Mitali Rane3, Vandana Jogdande4 , S.B.Ware5

Abstract 53  | PDF

Copy Detection of Multimedia Contents in Cloud

R. Amirtharathna, Mrs. P.Vijayasarathy

Abstract 68  | PDF

Bluetooth Technology

Jagjeet Kaur1, Ramandeep Kaur2, Manpreet Kaur3

Abstract 135  | PDF

Multi Criteria Recommendation System for Material Management

Mr. Rahul Samant Mr. Sachin Deshpande Mr. Anil Jadhao

Abstract 35  | PDF

Fog Computing: Securing the cloud and preventing insider attacks in the cloud.

Aatish B. Shah, Jai Kannan, Deep Utkal Shah Prof. S.B.Ware, Prof. R.S.Badodekar

Abstract 116  | PDF

Variants Of Resource Allocation Problem

Vijaya Goel

Abstract 57  | PDF

A Review of Damaged Manuscripts Using Binarization Techniques.

Prajakta. S. Jadhav1 Preeti. P. Dapkekar2, Shubhangi. M. Jadh Kartik. K. Kondalkar 4,Shabnam S. Shaikh

Abstract 36  | PDF

Patient Parameter Monitoring System using Raspberry Pi

Pooja Navdeti1, Sumita Parte2 , Prachi Talashilkar3, Jagruti Patil4 , Dr. Vaishali Khairnar5

Abstract 41  | PDF

Sanative Chatbot For Health Seekers

V.Manoj Kumar1 A.Keerthana2, M.Madhumitha3, S.Valliammai4, V.Vinithasri

Abstract 785  | PDF

Multipurpose Card Using Rfid Technology

J.Subhash M.E., S. Gayathri, D. Gayathri

Abstract 47  | PDF

System Automation And Production Monitoring In Industries Using Arduino With IoT Technology

Ms. Nithya.S1, Mr.Arjun.C2 Mr.Ashok.M3, Mr.Jeevanantham.B4

Abstract 52  | PDF

Advanced Secure Voting System with IoT

Ms. Nithya.S1, Mr.Ashwin.C2 Mr.Karthikeyan.C3, Mr.Ajith kumar.M4

Abstract 63  | PDF

Advance Dynamic Malware Analysis Using Api Hooking

Ajay Kumar , Shubham Goyal

Abstract 73  | PDF

Comparison: Wireshark on different parameters

Ajay Kumar, Jai Bhagwan Yadav

Abstract 75  | PDF

Analysis of Security threats in ad hoc cloud

Mrs. Salini Suresh, Dr.L.Manjunath Rao

Abstract 34  | PDF

File Encryption System Based on Symmetric Key Cryptography

Ajay Kumar, Ankit Kumar

Abstract 42  | PDF

Smart Energy Meter Using Android Application And Gsm Network

Diya Elizabeth Paul Prof . Alpha Vijayan

Abstract 207  | PDF