Published: 2017-04-04

Color Scheme Authentication for Session Password

Indhu D, Surya G, Abirami A
Full text

Abstract 510  | PDF 105 

Face Recognition Using PCA

K.V.Bhuvaneshwari, A.Abirami, N.Sripriya
Full text

Abstract 503  | PDF 355 

Social Uni-Books Web Service

Abhinav Mohite ,Avadhoot Khadake Preetam Kamat, , Akash Tawade Omkar More , Mr. P.A.Patel
Full text

Abstract 536  | PDF 47 

Transient Stability Analysis of IEEE-9 Bus Electrical Power System

RohitPatrik RupeshShrikhande SurajKamdi
Full text

Abstract 659  | PDF 1304 

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Prof.Ashok Kalal, Mr. Piyush Kumar Jha, Mr. Kunal Jondhalekar, Mr. Pavan Pandey Ms. Himanshu Thakur
Full text

Abstract 659  | PDF 629 

ECIES for Group Key Establishment in WSN for Secure Multicast Communication

Miss.P.Prasanna Laxmi Mrs. M.Anupama
Full text

Abstract 589  | PDF 160 

Image Enhancement using Mathematical Morphology

Payal T. Gadare Prof. Nitin Raut
Full text

Abstract 687  | PDF 55 

Enhanced Public Auditing for Code-Based Multi-server Cloud

Sonal N. Kotangale Pushpa D. Chudhari Prof. Shraddha D. Agnihotri
Full text

Abstract 474  | PDF 60 

Sentiment Analysis in Today’s Trend: A Review

Surendra Kumar Dr.Harsh Kumar Dhruba Jyoti Kalita
Full text

Abstract 727  | PDF 115 

A Mobile Based Smart Healthcare System

Sumed Khicha, Prakshali Patil Prerana Roy , Pooja Sinkar J P Rankhambe
Full text

Abstract 1259  | PDF 161 

A Survey of Multilingual Document Clustering

Mrs.Kavita Moholkar
Full text

Abstract 589  | PDF 119 

IoT Based Automated Smart Home

Pranay Saha, Prashant Kumar Rashmi K.A
Full text

Abstract 905  | PDF 118 

Enhancing A Medbox for Health Precautions Using IOT

Mrs.D.Jennifer Sreenidhi R Vinitha S, Thilakavathy B
Full text

Abstract 503  | PDF 258 

Improving performance of Virtual Machines by Virtio bridge Bypass for PCI devices

Shirley Kotian, Kirti Menon Kirti Menon, Utsav Mundada, Neeraj Vilas Auti
Full text

Abstract 344  | PDF 304 

Error-based Adaptive Update Rate in multi-function Phased-array Radar Using IMM Target-Tracking Algorithm

Ali zamani , Mohamadreza Moniri Hamada Reza fatemi Mofrad
Full text

Abstract 565  | PDF 60 

Implementation of 3D Campus View

V. A. Dhotre, S. J. Mulani ,R. A. Takalikar, P. P. Keskar, S. D. Shinde, K. S. Nagtilak
Full text

Abstract 325  | PDF 134 

Study of machine learning based recommendation techniques used by Ecommerce

Dr. Geetanjali Amarawat Awanit Kumar, Abdul Hamid Qureshi
Full text

Abstract 370  | PDF 138 

Hierarchical Messaging Application for Android Using Salesforce

Mr. Swapnil Manekar, Prof. Prashant Borkar Mr. Vedprakash Hirwani
Full text

Abstract 348  | PDF 61 

Detecting Malicious Facebook Applications

Nayana K N, Anjana Sharma
Full text

Abstract 1458  | PDF 263 

Minimising the Execution Time of Selection Sort Algorithm

Manish Kumar, Ms. Monika Malhotra Ms. Monika Malhotra
Full text

Abstract 859  | PDF 299 

Footstep Power Generation System

G.Dhanalakshmi ,T.Manjulai M.Mirunalini S.Sangeetha Mary
Full text

Abstract 684  | PDF 2302 

IOT Based Waste Monitoring For Smart City

Shambala S Salunkhe Madhuri D Yadav Vrushali V Kulkarni
Full text

Abstract 1318  | PDF 205 

Survey on Educational Data Mining Techniques

P V V Satya Eswara Rao S K Sankar
Full text

Abstract 968  | PDF

Ethical Hacking and Hacking Attacks

Aman Gupta, Abhineet Anand
Full text

Abstract 2092  | PDF 610 

Internet Banking System & Security Analysis

Rahul Kumar, Dr. Abhineet Anand
Full text

Abstract 676  | PDF 268 

A survey on IoT and Security issues of RFID

Nidhi Singh, Juhi Bhatt, Kamlesh C. Purohit
Full text

Abstract 294  | PDF 221 

Security Analysis with respect to Wireless Sensor Network – Review

K.Sethu Selvam Dr.S.P.Rajagopalan
Full text

Abstract 503  | PDF 262 

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani Prof P Suresh Varma
Full text

Abstract 895  | PDF 84 

Spectrum Monitoring In OFDM-Based Cr Networks By Window Based Energy Ratio Algorithm

Aswathy Anilkumar Revathy G Nair, Jismi Babu
Full text

Abstract 405  | PDF 54 

Customer Complaint Analysis Using Hadoop (Consumer Analysis)

Y. Sudha Laxmi, A. Mahendar, Dr. Sheikh gouse
Full text

Abstract 1187  | PDF 238 

Video Surveillance Using Adaptive-Rate Compressive Sensing

Rajalakshmi S1 , Dhanya Narayan Anjaly Krishnan
Full text

Abstract 344  | PDF 52 

A Perfect Partner for Event Marketing

B. Lakshmi, P.V.L.Parimala M. Prasanna Lakshmi B. Srinivas
Full text

Abstract 565  | PDF 82 

Data Integration among Sensor Nodes Using Wireless Toolkit

K. David Raju Shreya Valluri V Harika Naidu
Full text

Abstract 713  | PDF 52 

Anticipating Human Activities from Surveillance Videos

Shanmughapriya Murugesan, Ranjith Balakrishnan
Full text

Abstract 441  | PDF 82 

Data Leakage Detection Using Cloud Computing

Abhijeet Singh Abhineet Anand
Full text

Abstract 1538  | PDF 721 

Image Processing Based Student Attendance System using Raspberry PI

P Prudhvi Kiran Ravi Kumar G2
Full text

Abstract 1259  | PDF 1052 

Personalized Book Recommendation System

Jayanti Rathnavel Kavita Kelkar
Full text

Abstract 624  | PDF 654 

Flexible Data Processing Using Apache PIG

k. vikram , J. Sredevi, J. Sindhu J. Shravya , K. Akrutha
Full text

Abstract 720  | PDF 68