Published: 2018-01-03

Using Image Processing In Security

Shivam Sharma

Abstract 43  | PDF

Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation

Ms.Ashwini Thool, Prof. Prashant R. Indurkar , Prof.S.M.Sakhare

Abstract 47  | PDF

Text clustering for computer investigation with search optimization

Jameer Kotwal, Prajkta Varhade, Komal Koli, Roshni Gawande, Varsha Andhale

Abstract 42  | PDF

Digital Library: Using Hybrid Book Recommendation Engine

Prof. Sulbha Ghadling,Kanchan Belavadi, Shubhangi Bhegade, Pradnya Ghojage, Supriya Kamble

Abstract 42  | PDF

Re-Ranking Based Image Categorization Using Saliency Driven Nonlinear Diffusion Filtering -A Review

Ms. Nisha Barsagade, Prof. Mr. Mayur Dhait

Abstract 42  | PDF

Review of Social Collaborative Filtering Recommender System’s Methods

Pratibha Yadav, Kumari Seema Rani, Sonia Kumari

Abstract 54  | PDF

Fast File Downloading Using Network Coding in Distributed System

Prof. Ashvini Jadhav, Pratik P. Raut, Rohan S. Ghorpade, Vishal K. Raut, Chinmay Y. Kale

Abstract 57  | PDF

A Survey-Decentralized Access Control with Anonymous Authenti-cation and Deduplication of Data Stored in Clouds

Mr. Imran D. Tamboli, Prof. Ranjana R. Badre, Prof. Rajeshwari M. Goudar

Abstract 44  | PDF

Position Based On Refining Aggregate Recommendation Assortment

L. Pravin Kumar, Ramesh Krishnan

Abstract 44  | PDF

Bigdata Analysis In Health Care

L. Pravin Kumar, Ramesh Krishnan

Abstract 45  | PDF

A Survey paper on An Effective Analytical Approaches for Detecting Outlier in Continuous Time Variant Data Stream

Mr. Raghav M. Purankar , Prof. Pragati Patil

Abstract 54  | PDF

Stability Analysis of A Non Vaccinated Sir Epidemic Model

Prof. Dr. Sumit Kumar Banerjee

Abstract 53  | PDF

Programming Paradigms in the Context of the Programming Language

Sonia Kumari, Pratibha Yadav Kumari Seema Rani

Abstract 80  | PDF

A Survey Of Ontology Evaluation Techniques For Data Retrieval

Harsh Shah, Parth Shah, Khushali Deulkar, Assistant Prof

Abstract 38  | PDF

A Review Of Inferring Latent Attributes From Twitter

Surabhi Singh Ludu

Abstract 34  | PDF

The Interdisciplinary Nature Of Knowledge Discovery Databases And Data Mining

T. Bharathi

Abstract 49  | PDF

Comparative Study Of Semantic Search Engines

Vidhi Shah, Akshat Shah , Asst. Prof. Khushali Deulkar

Abstract 43  | PDF

Cognitive Perspective Of Attribute Hiding Factor Complexity Metric

Francis Thamburaj, A. Aloysius

Abstract 43  | PDF

Ontology-Based Multi-Document Summarization

Bhakti Mehta ,Varsha Marathe , Priyanka Padvi and Manjusha Shewale

Abstract 39  | PDF

Lung cancer detection and classification using Support Vector Machine

Niranjan Shukla, Aakash Narayane, Aniket Nigade Krishnakumar Yadav, Mrs Harshada Mhaske

Abstract 41  | PDF

Third Party Auditing of Data on Cloud With Fine Grained Updates

Ajinkya Sabale, Rohit Prajapati, Sameer Pathan, Sanket Prabhu, Prof .Sanjay Agrawal

Abstract 35  | PDF

The Future Generation Intelligent System Need For Human Memory To Detect Crime Using Virtual Brain Technology.

R.Uma, S.Kavitha, V.Ilakkiya

Abstract 38  | PDF

Surveying Smartphone Security for Linux Powered Devices

Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh, Rahul Koti, Mrs. D.A. Phalke(Guide), Mr. Rahul Pawar (Co-Guide)

Abstract 48  | PDF

Gamma Corrected Bright Channel Filtering Based Fast Single Image De-hazing

Navjot Kaur, Dr. Lalita Bhutani

Abstract 33  | PDF

Survey on Credit Card Fraud Detection Techniques

Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli

Abstract 133  | PDF

Robust Construction Of Multiday Itinerary Planning

Ms.P.Jayapriya , Mr.S.Gunasekaran , Ms.S.Nathiya

Abstract 45  | PDF

Secure data management system for patients and their doctor.

Miss.Revati Wahul, Miss.Eshaa Sood, Miss.Julie Yohannan, Miss.Zahra Budhwani

Abstract 53  | PDF

Detection of Black Hole Attack in DTN with Authentication

D.Humera, M.VeereshBabu

Abstract 44  | PDF

Energy Efficient Data Transfer In Mobile Wireless Sensor Network

T . Mary RincyMol , Mrs.A.SahayaPrincyM.Tech

Abstract 36  | PDF

Performance Analysis of JPEG2000 for Different Wavelets Transforms in satellite images

P.Krishnamoorthy, V.P.Ajay

Abstract 36  | PDF

Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network

M. Sindhuja & Mrs A.Sahaya Princy M.Tech

Abstract 35  | PDF

Providing Lifetime Optimization and Security in Wireless Sensor Network

Sindhuja.R, Mrs.Vidhya.S

Abstract 47  | PDF

Secured Data in Cloud by Using LFSR

Sumalatha Potteti, Ravi Kumar Goura

Abstract 31  | PDF

P – TSP Seasonal Constrained Model

Vijayalakshmi R, Gurava Raju P, Sundara Murthy

Abstract 27  | PDF

Dynamic and intelligent classifier for efficient retrieval from web mining

M.Parvathi MCA, M.Phil, S.Thabasu Kannan M.TECh, Ph.D, MBA

Abstract 25  | PDF

Hybrid visual servoing for tracking multiple targets with a swarm of mobile robots

Gossaye Mekonnen Alemu

Abstract 35  | PDF

A Survey of Commonly Used Cryptographic Algorithms in Information Security

Manjula G., and Dr. Mohan H.S.

Abstract 31  | PDF

Study of Classification of Diseases by Genetic Algorithm for Multiclass Support Vector Machine Using Hadoop

Mr.Ankit R. Deshmukh , Prof.S.P.Akarte

Abstract 27  | PDF

HIGHLY SECURE REVERSIBLE WATERMARKING MECHANISM USING REVERSIBLE DE-IDENTIFICATON

Fasiha Shereen, B A Sharath Manohar

Abstract 27  | PDF

Performance Measures for a three-unit compact circuit

Ashish Namdeo ,V.K. Pathak, Anil Tiwari

Abstract 40  | PDF

Comparisons Of Restored Blurred-Noisy Dental Images Using Wiener Filter And Lucy-Richardson Technique.

Aanchal Joseph, Mr. Sandeep B. Patil

Abstract 27  | PDF