Published: 2017-04-04

Color Scheme Authentication for Session Password

Indhu D, Surya G, Abirami A
Full text

Abstract 218  | PDF 79 

Face Recognition Using PCA

K.V.Bhuvaneshwari, A.Abirami, N.Sripriya
Full text

Abstract 228  | PDF 294 

Social Uni-Books Web Service

Abhinav Mohite ,Avadhoot Khadake Preetam Kamat, , Akash Tawade Omkar More , Mr. P.A.Patel
Full text

Abstract 173  | PDF 27 

Transient Stability Analysis of IEEE-9 Bus Electrical Power System

RohitPatrik RupeshShrikhande SurajKamdi
Full text

Abstract 249  | PDF 984 

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Prof.Ashok Kalal, Mr. Piyush Kumar Jha, Mr. Kunal Jondhalekar, Mr. Pavan Pandey Ms. Himanshu Thakur
Full text

Abstract 220  | PDF 517 

ECIES for Group Key Establishment in WSN for Secure Multicast Communication

Miss.P.Prasanna Laxmi Mrs. M.Anupama
Full text

Abstract 189  | PDF 80 

Image Enhancement using Mathematical Morphology

Payal T. Gadare Prof. Nitin Raut
Full text

Abstract 235  | PDF 34 

Enhanced Public Auditing for Code-Based Multi-server Cloud

Sonal N. Kotangale Pushpa D. Chudhari Prof. Shraddha D. Agnihotri
Full text

Abstract 154  | PDF 36 

Sentiment Analysis in Today’s Trend: A Review

Surendra Kumar Dr.Harsh Kumar Dhruba Jyoti Kalita
Full text

Abstract 261  | PDF 79 

A Mobile Based Smart Healthcare System

Sumed Khicha, Prakshali Patil Prerana Roy , Pooja Sinkar J P Rankhambe
Full text

Abstract 577  | PDF 116 

A Survey of Multilingual Document Clustering

Mrs.Kavita Moholkar
Full text

Abstract 208  | PDF 80 

IoT Based Automated Smart Home

Pranay Saha, Prashant Kumar Rashmi K.A
Full text

Abstract 468  | PDF 81 

Enhancing A Medbox for Health Precautions Using IOT

Mrs.D.Jennifer Sreenidhi R Vinitha S, Thilakavathy B
Full text

Abstract 159  | PDF 167 

Improving performance of Virtual Machines by Virtio bridge Bypass for PCI devices

Shirley Kotian, Kirti Menon Kirti Menon, Utsav Mundada, Neeraj Vilas Auti
Full text

Abstract 117  | PDF 215 

Error-based Adaptive Update Rate in multi-function Phased-array Radar Using IMM Target-Tracking Algorithm

Ali zamani , Mohamadreza Moniri Hamada Reza fatemi Mofrad
Full text

Abstract 199  | PDF 41 

Implementation of 3D Campus View

V. A. Dhotre, S. J. Mulani ,R. A. Takalikar, P. P. Keskar, S. D. Shinde, K. S. Nagtilak
Full text

Abstract 96  | PDF 85 

Study of machine learning based recommendation techniques used by Ecommerce

Dr. Geetanjali Amarawat Awanit Kumar, Abdul Hamid Qureshi
Full text

Abstract 149  | PDF 67 

Hierarchical Messaging Application for Android Using Salesforce

Mr. Swapnil Manekar, Prof. Prashant Borkar Mr. Vedprakash Hirwani
Full text

Abstract 106  | PDF 39 

Detecting Malicious Facebook Applications

Nayana K N, Anjana Sharma
Full text

Abstract 675  | PDF 216 

Minimising the Execution Time of Selection Sort Algorithm

Manish Kumar, Ms. Monika Malhotra Ms. Monika Malhotra
Full text

Abstract 328  | PDF 176 

Footstep Power Generation System

G.Dhanalakshmi ,T.Manjulai M.Mirunalini S.Sangeetha Mary
Full text

Abstract 318  | PDF 1912 

IOT Based Waste Monitoring For Smart City

Shambala S Salunkhe Madhuri D Yadav Vrushali V Kulkarni
Full text

Abstract 656  | PDF 155 

Survey on Educational Data Mining Techniques

P V V Satya Eswara Rao S K Sankar
Full text

Abstract 456  | PDF

Ethical Hacking and Hacking Attacks

Aman Gupta, Abhineet Anand
Full text

Abstract 1265  | PDF 507 

Internet Banking System & Security Analysis

Rahul Kumar, Dr. Abhineet Anand
Full text

Abstract 279  | PDF 220 

A survey on IoT and Security issues of RFID

Nidhi Singh, Juhi Bhatt, Kamlesh C. Purohit
Full text

Abstract 125  | PDF 160 

Security Analysis with respect to Wireless Sensor Network – Review

K.Sethu Selvam Dr.S.P.Rajagopalan
Full text

Abstract 200  | PDF 232 

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani Prof P Suresh Varma
Full text

Abstract 351  | PDF 62 

Spectrum Monitoring In OFDM-Based Cr Networks By Window Based Energy Ratio Algorithm

Aswathy Anilkumar Revathy G Nair, Jismi Babu
Full text

Abstract 149  | PDF 35 

Customer Complaint Analysis Using Hadoop (Consumer Analysis)

Y. Sudha Laxmi, A. Mahendar, Dr. Sheikh gouse
Full text

Abstract 701  | PDF 170 

Video Surveillance Using Adaptive-Rate Compressive Sensing

Rajalakshmi S1 , Dhanya Narayan Anjaly Krishnan
Full text

Abstract 109  | PDF 31 

A Perfect Partner for Event Marketing

B. Lakshmi, P.V.L.Parimala M. Prasanna Lakshmi B. Srinivas
Full text

Abstract 207  | PDF 51 

Data Integration among Sensor Nodes Using Wireless Toolkit

K. David Raju Shreya Valluri V Harika Naidu
Full text

Abstract 244  | PDF 28 

Anticipating Human Activities from Surveillance Videos

Shanmughapriya Murugesan, Ranjith Balakrishnan
Full text

Abstract 161  | PDF 55 

Data Leakage Detection Using Cloud Computing

Abhijeet Singh Abhineet Anand
Full text

Abstract 986  | PDF 534 

Image Processing Based Student Attendance System using Raspberry PI

P Prudhvi Kiran Ravi Kumar G2
Full text

Abstract 707  | PDF 812 

Personalized Book Recommendation System

Jayanti Rathnavel Kavita Kelkar
Full text

Abstract 236  | PDF 423 

Flexible Data Processing Using Apache PIG

k. vikram , J. Sredevi, J. Sindhu J. Shravya , K. Akrutha
Full text

Abstract 222  | PDF 37