Published: 2018-01-03

Using Image Processing In Security

Shivam Sharma
Full text

Abstract 184  | PDF 96 

Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation

Ms.Ashwini Thool, Prof. Prashant R. Indurkar , Prof.S.M.Sakhare
Full text

Abstract 187  | PDF 31 

Text clustering for computer investigation with search optimization

Jameer Kotwal, Prajkta Varhade, Komal Koli, Roshni Gawande, Varsha Andhale
Full text

Abstract 583  | PDF 36 

Digital Library: Using Hybrid Book Recommendation Engine

Prof. Sulbha Ghadling,Kanchan Belavadi, Shubhangi Bhegade, Pradnya Ghojage, Supriya Kamble
Full text

Abstract 494  | PDF 318 

Review of Social Collaborative Filtering Recommender System’s Methods

Pratibha Yadav, Kumari Seema Rani, Sonia Kumari
Full text

Abstract 359  | PDF 109 

Fast File Downloading Using Network Coding in Distributed System

Prof. Ashvini Jadhav, Pratik P. Raut, Rohan S. Ghorpade, Vishal K. Raut, Chinmay Y. Kale
Full text

Abstract 674  | PDF 47 

A Survey-Decentralized Access Control with Anonymous Authenti-cation and Deduplication of Data Stored in Clouds

Mr. Imran D. Tamboli, Prof. Ranjana R. Badre, Prof. Rajeshwari M. Goudar
Full text

Abstract 583  | PDF 56 

Position Based On Refining Aggregate Recommendation Assortment

L. Pravin Kumar, Ramesh Krishnan
Full text

Abstract 184  | PDF 40 

Bigdata Analysis In Health Care

L. Pravin Kumar, Ramesh Krishnan
Full text

Abstract 225  | PDF 40 

Stability Analysis of A Non Vaccinated Sir Epidemic Model

Prof. Dr. Sumit Kumar Banerjee
Full text

Abstract 200  | PDF 35 

Programming Paradigms in the Context of the Programming Language

Sonia Kumari, Pratibha Yadav Kumari Seema Rani
Full text

Abstract 350  | PDF 302 

A Survey Of Ontology Evaluation Techniques For Data Retrieval

Harsh Shah, Parth Shah, Khushali Deulkar, Assistant Prof
Full text

Abstract 598  | PDF 58 

Comparative Study Of Semantic Search Engines

Vidhi Shah, Akshat Shah , Asst. Prof. Khushali Deulkar
Full text

Abstract 168  | PDF 232 

Cognitive Perspective Of Attribute Hiding Factor Complexity Metric

Francis Thamburaj, A. Aloysius
Full text

Abstract 394  | PDF 65 

Ontology-Based Multi-Document Summarization

Bhakti Mehta ,Varsha Marathe , Priyanka Padvi and Manjusha Shewale
Full text

Abstract 209  | PDF 51 

Lung cancer detection and classification using Support Vector Machine

Niranjan Shukla, Aakash Narayane, Aniket Nigade Krishnakumar Yadav, Mrs Harshada Mhaske
Full text

Abstract 647  | PDF 50 

Third Party Auditing of Data on Cloud With Fine Grained Updates

Ajinkya Sabale, Rohit Prajapati, Sameer Pathan, Sanket Prabhu, Prof .Sanjay Agrawal
Full text

Abstract 182  | PDF 128 

Surveying Smartphone Security for Linux Powered Devices

Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh, Rahul Koti, Mrs. D.A. Phalke(Guide), Mr. Rahul Pawar (Co-Guide)
Full text

Abstract 581  | PDF 61 

Survey on Credit Card Fraud Detection Techniques

Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli
Full text

Abstract 420  | PDF 213 

Robust Construction Of Multiday Itinerary Planning

Ms.P.Jayapriya , Mr.S.Gunasekaran , Ms.S.Nathiya
Full text

Abstract 886  | PDF 34 

Secure data management system for patients and their doctor.

Miss.Revati Wahul, Miss.Eshaa Sood, Miss.Julie Yohannan, Miss.Zahra Budhwani
Full text

Abstract 450  | PDF 135 

Detection of Black Hole Attack in DTN with Authentication

D.Humera, M.VeereshBabu
Full text

Abstract 194  | PDF 85 

Energy Efficient Data Transfer In Mobile Wireless Sensor Network

T . Mary RincyMol , Mrs.A.SahayaPrincyM.Tech
Full text

Abstract 116  | PDF 35 

Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network

M. Sindhuja & Mrs A.Sahaya Princy M.Tech
Full text

Abstract 380  | PDF 77 

Secured Data in Cloud by Using LFSR

Sumalatha Potteti, Ravi Kumar Goura
Full text

Abstract 587  | PDF 84 

P – TSP Seasonal Constrained Model

Vijayalakshmi R, Gurava Raju P, Sundara Murthy
Full text

Abstract 112  | PDF 42