Published: 2017-04-04

Color Scheme Authentication for Session Password

Indhu D, Surya G, Abirami A
Full text

Abstract 135  | PDF 69 

Face Recognition Using PCA

K.V.Bhuvaneshwari, A.Abirami, N.Sripriya
Full text

Abstract 144  | PDF 272 

Social Uni-Books Web Service

Abhinav Mohite ,Avadhoot Khadake Preetam Kamat, , Akash Tawade Omkar More , Mr. P.A.Patel
Full text

Abstract 31  | PDF 19 

Transient Stability Analysis of IEEE-9 Bus Electrical Power System

RohitPatrik RupeshShrikhande SurajKamdi
Full text

Abstract 117  | PDF 842 

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Prof.Ashok Kalal, Mr. Piyush Kumar Jha, Mr. Kunal Jondhalekar, Mr. Pavan Pandey Ms. Himanshu Thakur
Full text

Abstract 69  | PDF 444 

ECIES for Group Key Establishment in WSN for Secure Multicast Communication

Miss.P.Prasanna Laxmi Mrs. M.Anupama
Full text

Abstract 36  | PDF 55 

Image Enhancement using Mathematical Morphology

Payal T. Gadare Prof. Nitin Raut
Full text

Abstract 37  | PDF 24 

Enhanced Public Auditing for Code-Based Multi-server Cloud

Sonal N. Kotangale Pushpa D. Chudhari Prof. Shraddha D. Agnihotri
Full text

Abstract 32  | PDF 21 

Sentiment Analysis in Today’s Trend: A Review

Surendra Kumar Dr.Harsh Kumar Dhruba Jyoti Kalita
Full text

Abstract 52  | PDF 66 

A Mobile Based Smart Healthcare System

Sumed Khicha, Prakshali Patil Prerana Roy , Pooja Sinkar J P Rankhambe
Full text

Abstract 272  | PDF 94 

A Survey of Multilingual Document Clustering

Mrs.Kavita Moholkar
Full text

Abstract 62  | PDF 62 

IoT Based Automated Smart Home

Pranay Saha, Prashant Kumar Rashmi K.A
Full text

Abstract 230  | PDF 61 

Enhancing A Medbox for Health Precautions Using IOT

Mrs.D.Jennifer Sreenidhi R Vinitha S, Thilakavathy B
Full text

Abstract 38  | PDF 110 

Improving performance of Virtual Machines by Virtio bridge Bypass for PCI devices

Shirley Kotian, Kirti Menon Kirti Menon, Utsav Mundada, Neeraj Vilas Auti
Full text

Abstract 40  | PDF 186 

Error-based Adaptive Update Rate in multi-function Phased-array Radar Using IMM Target-Tracking Algorithm

Ali zamani , Mohamadreza Moniri Hamada Reza fatemi Mofrad
Full text

Abstract 31  | PDF 27 

Implementation of 3D Campus View

V. A. Dhotre, S. J. Mulani ,R. A. Takalikar, P. P. Keskar, S. D. Shinde, K. S. Nagtilak
Full text

Abstract 36  | PDF 62 

Study of machine learning based recommendation techniques used by Ecommerce

Dr. Geetanjali Amarawat Awanit Kumar, Abdul Hamid Qureshi
Full text

Abstract 86  | PDF 52 

Hierarchical Messaging Application for Android Using Salesforce

Mr. Swapnil Manekar, Prof. Prashant Borkar Mr. Vedprakash Hirwani
Full text

Abstract 38  | PDF 25 

Detecting Malicious Facebook Applications

Nayana K N, Anjana Sharma
Full text

Abstract 338  | PDF 193 

Minimising the Execution Time of Selection Sort Algorithm

Manish Kumar, Ms. Monika Malhotra Ms. Monika Malhotra
Full text

Abstract 62  | PDF 134 

Footstep Power Generation System

G.Dhanalakshmi ,T.Manjulai M.Mirunalini S.Sangeetha Mary
Full text

Abstract 139  | PDF 1597 

IOT Based Waste Monitoring For Smart City

Shambala S Salunkhe Madhuri D Yadav Vrushali V Kulkarni
Full text

Abstract 349  | PDF 135 

Survey on Educational Data Mining Techniques

P V V Satya Eswara Rao S K Sankar
Full text

Abstract 203  | PDF

Ethical Hacking and Hacking Attacks

Aman Gupta, Abhineet Anand
Full text

Abstract 939  | PDF 424 

Internet Banking System & Security Analysis

Rahul Kumar, Dr. Abhineet Anand
Full text

Abstract 113  | PDF 209 

A survey on IoT and Security issues of RFID

Nidhi Singh, Juhi Bhatt, Kamlesh C. Purohit
Full text

Abstract 78  | PDF 124 

Security Analysis with respect to Wireless Sensor Network – Review

K.Sethu Selvam Dr.S.P.Rajagopalan
Full text

Abstract 71  | PDF 214 

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani Prof P Suresh Varma
Full text

Abstract 26  | PDF 48 

Spectrum Monitoring In OFDM-Based Cr Networks By Window Based Energy Ratio Algorithm

Aswathy Anilkumar Revathy G Nair, Jismi Babu
Full text

Abstract 42  | PDF 25 

Customer Complaint Analysis Using Hadoop (Consumer Analysis)

Y. Sudha Laxmi, A. Mahendar, Dr. Sheikh gouse
Full text

Abstract 480  | PDF 146 

Video Surveillance Using Adaptive-Rate Compressive Sensing

Rajalakshmi S1 , Dhanya Narayan Anjaly Krishnan
Full text

Abstract 40  | PDF 25 

A Perfect Partner for Event Marketing

B. Lakshmi, P.V.L.Parimala M. Prasanna Lakshmi B. Srinivas
Full text

Abstract 39  | PDF 37 

Data Integration among Sensor Nodes Using Wireless Toolkit

K. David Raju Shreya Valluri V Harika Naidu
Full text

Abstract 34  | PDF 21 

Anticipating Human Activities from Surveillance Videos

Shanmughapriya Murugesan, Ranjith Balakrishnan
Full text

Abstract 31  | PDF 43 

Data Leakage Detection Using Cloud Computing

Abhijeet Singh Abhineet Anand
Full text

Abstract 737  | PDF 419 

Image Processing Based Student Attendance System using Raspberry PI

P Prudhvi Kiran Ravi Kumar G2
Full text

Abstract 492  | PDF 685 

Personalized Book Recommendation System

Jayanti Rathnavel Kavita Kelkar
Full text

Abstract 75  | PDF 331 

Flexible Data Processing Using Apache PIG

k. vikram , J. Sredevi, J. Sindhu J. Shravya , K. Akrutha
Full text

Abstract 25  | PDF 27