Published: 2017-04-04

Color Scheme Authentication for Session Password

Indhu D, Surya G, Abirami A
Full text

Abstract 447  | PDF 99 

Face Recognition Using PCA

K.V.Bhuvaneshwari, A.Abirami, N.Sripriya
Full text

Abstract 443  | PDF 337 

Social Uni-Books Web Service

Abhinav Mohite ,Avadhoot Khadake Preetam Kamat, , Akash Tawade Omkar More , Mr. P.A.Patel
Full text

Abstract 479  | PDF 42 

Transient Stability Analysis of IEEE-9 Bus Electrical Power System

RohitPatrik RupeshShrikhande SurajKamdi
Full text

Abstract 560  | PDF 1200 

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Prof.Ashok Kalal, Mr. Piyush Kumar Jha, Mr. Kunal Jondhalekar, Mr. Pavan Pandey Ms. Himanshu Thakur
Full text

Abstract 606  | PDF 589 

ECIES for Group Key Establishment in WSN for Secure Multicast Communication

Miss.P.Prasanna Laxmi Mrs. M.Anupama
Full text

Abstract 522  | PDF 136 

Image Enhancement using Mathematical Morphology

Payal T. Gadare Prof. Nitin Raut
Full text

Abstract 622  | PDF 50 

Enhanced Public Auditing for Code-Based Multi-server Cloud

Sonal N. Kotangale Pushpa D. Chudhari Prof. Shraddha D. Agnihotri
Full text

Abstract 418  | PDF 54 

Sentiment Analysis in Today’s Trend: A Review

Surendra Kumar Dr.Harsh Kumar Dhruba Jyoti Kalita
Full text

Abstract 663  | PDF 108 

A Mobile Based Smart Healthcare System

Sumed Khicha, Prakshali Patil Prerana Roy , Pooja Sinkar J P Rankhambe
Full text

Abstract 1169  | PDF 148 

A Survey of Multilingual Document Clustering

Mrs.Kavita Moholkar
Full text

Abstract 536  | PDF 109 

IoT Based Automated Smart Home

Pranay Saha, Prashant Kumar Rashmi K.A
Full text

Abstract 815  | PDF 112 

Enhancing A Medbox for Health Precautions Using IOT

Mrs.D.Jennifer Sreenidhi R Vinitha S, Thilakavathy B
Full text

Abstract 449  | PDF 241 

Improving performance of Virtual Machines by Virtio bridge Bypass for PCI devices

Shirley Kotian, Kirti Menon Kirti Menon, Utsav Mundada, Neeraj Vilas Auti
Full text

Abstract 293  | PDF 266 

Error-based Adaptive Update Rate in multi-function Phased-array Radar Using IMM Target-Tracking Algorithm

Ali zamani , Mohamadreza Moniri Hamada Reza fatemi Mofrad
Full text

Abstract 508  | PDF 54 

Implementation of 3D Campus View

V. A. Dhotre, S. J. Mulani ,R. A. Takalikar, P. P. Keskar, S. D. Shinde, K. S. Nagtilak
Full text

Abstract 277  | PDF 116 

Study of machine learning based recommendation techniques used by Ecommerce

Dr. Geetanjali Amarawat Awanit Kumar, Abdul Hamid Qureshi
Full text

Abstract 297  | PDF 113 

Hierarchical Messaging Application for Android Using Salesforce

Mr. Swapnil Manekar, Prof. Prashant Borkar Mr. Vedprakash Hirwani
Full text

Abstract 293  | PDF 53 

Detecting Malicious Facebook Applications

Nayana K N, Anjana Sharma
Full text

Abstract 1324  | PDF 242 

Minimising the Execution Time of Selection Sort Algorithm

Manish Kumar, Ms. Monika Malhotra Ms. Monika Malhotra
Full text

Abstract 783  | PDF 252 

Footstep Power Generation System

G.Dhanalakshmi ,T.Manjulai M.Mirunalini S.Sangeetha Mary
Full text

Abstract 623  | PDF 2147 

IOT Based Waste Monitoring For Smart City

Shambala S Salunkhe Madhuri D Yadav Vrushali V Kulkarni
Full text

Abstract 1212  | PDF 190 

Survey on Educational Data Mining Techniques

P V V Satya Eswara Rao S K Sankar
Full text

Abstract 895  | PDF

Ethical Hacking and Hacking Attacks

Aman Gupta, Abhineet Anand
Full text

Abstract 1872  | PDF 581 

Internet Banking System & Security Analysis

Rahul Kumar, Dr. Abhineet Anand
Full text

Abstract 608  | PDF 256 

A survey on IoT and Security issues of RFID

Nidhi Singh, Juhi Bhatt, Kamlesh C. Purohit
Full text

Abstract 253  | PDF 199 

Security Analysis with respect to Wireless Sensor Network – Review

K.Sethu Selvam Dr.S.P.Rajagopalan
Full text

Abstract 441  | PDF 256 

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani Prof P Suresh Varma
Full text

Abstract 819  | PDF 77 

Spectrum Monitoring In OFDM-Based Cr Networks By Window Based Energy Ratio Algorithm

Aswathy Anilkumar Revathy G Nair, Jismi Babu
Full text

Abstract 357  | PDF 49 

Customer Complaint Analysis Using Hadoop (Consumer Analysis)

Y. Sudha Laxmi, A. Mahendar, Dr. Sheikh gouse
Full text

Abstract 1080  | PDF 213 

Video Surveillance Using Adaptive-Rate Compressive Sensing

Rajalakshmi S1 , Dhanya Narayan Anjaly Krishnan
Full text

Abstract 289  | PDF 47 

A Perfect Partner for Event Marketing

B. Lakshmi, P.V.L.Parimala M. Prasanna Lakshmi B. Srinivas
Full text

Abstract 511  | PDF 75 

Data Integration among Sensor Nodes Using Wireless Toolkit

K. David Raju Shreya Valluri V Harika Naidu
Full text

Abstract 662  | PDF 46 

Anticipating Human Activities from Surveillance Videos

Shanmughapriya Murugesan, Ranjith Balakrishnan
Full text

Abstract 380  | PDF 76 

Data Leakage Detection Using Cloud Computing

Abhijeet Singh Abhineet Anand
Full text

Abstract 1428  | PDF 647 

Image Processing Based Student Attendance System using Raspberry PI

P Prudhvi Kiran Ravi Kumar G2
Full text

Abstract 1095  | PDF 975 

Personalized Book Recommendation System

Jayanti Rathnavel Kavita Kelkar
Full text

Abstract 582  | PDF 577 

Flexible Data Processing Using Apache PIG

k. vikram , J. Sredevi, J. Sindhu J. Shravya , K. Akrutha
Full text

Abstract 669  | PDF 64