Archive

SR.NO. TITLE AUTHOR(S) DOWNLOAD
1 Biometric Cryptosystem: A Literature Review Rushikesh Karnewar, Akash Takawale, Rohit Bhosale, Subham Tathe Download Here
2 COMPARISON OF DAIRY PERFORMANCE AND CHEESE APTITUDES OF SOME IMPORTED BOVINE BREEDS: Central région of Algeria Lyes OUABDESSELAM, S. ZENIA, A. SAADI, K. HARHOURA Download Here
3 SOLAR PANEL MULTICHARGER SYSTEM WITH AUTO CUTOFF Priyanka Singre, Rekha Nimbekar, Sumama Khan,Sneha Patil, Prof. Saurav Suman Download Here
4 REVIEW ON AN EMBEDDED LABORATORY SECURITY MONITORING SYSTEM Gaurav Wankhade,Sachin S. Wankhade,Harshal T.Gujarkar,Vishal Manwar,Prof. Mayur D. Ghatole Download Here
5 DOCTOR’S KEY Mr. Shubham Katole,Ms. Purvantika Dagwar,Ms. Prajakta Tadas,Mr. Vedprakash Chopade,Prof. Ms. P.V. Bhagat Download Here
6 REVIEW: A NOVEL MULTILEVEL INVERTER WITH MINIMUM NUMBER OF SWITCHES Ms. Madhur Wasekar,Ms. Rutuja Chafle,Ms. Rutika Maheshkar,Mr. Viplao Titirmare,Prof. Mrs. S. R. Bhavarkar Download Here
7 ENSURING LOAD BALANCING IN CLOUD IAAS SERVICE Jaishree V. karade, Neha N. Gupta , Piyush M. Gawande, Siddhant R. Bodile , Swapnil Dalvi ,Prof. Dipali Pethe Download Here
8 GROUP KEY AGREEMENT WITH LOCAL CONNECTIVITY: A REVIEW Shraddha N. Hadeoo, Puja D. Devale ,Dasurya V. Citric,Dixit P. Chopde,Prof. Supriya Sawwashere Download Here
9 WEB SECURITY MECHANISM TO AVOID WEB ATTACKS Anshul Dubey,Shubham Ramteke,Rupesh Nikam,Prof. Raju Pawar Download Here
10 REVIEW ON DESIGN & DEVELOPMENT OF HAND TALK FOR DEAF AND MUTE PEOPLE IN HAPTIC ENVIRONMENT Prof. Shyam D. Bawankar,Spursh S. Naredi, Vedika V. Tamhan, Shruti S. Itware, Kartik S. Chauhan,Ravina S. Chaudhari Download Here
11 A SURVEY ON SYBIL ATTACKS IN SOCIAL NETWORKS Shital A.Meshram, Prof.D.M.Sable Download Here
12 Packet Dropping Attacks in Wireless Ad Hoc Networks Using Privacy Preserving And Truthful Detection Shraddha Chougule, Shivanjali Desai, Ketaki Bhoyar Download Here
13 A Framework to improve crop yield in Smart Agriculture using IoT Revanasiddappa Bandi , Suma Swamy , Raghav S Download Here
14 AN APPROACH FOR ARTIST RECOMMENDATION BASED ON POPULARITY AND SIMILARITY FACTOR Swati Shah,Pragya Shukla Download Here
15 IMPACT OF VAMPIRE ATTACK ON PERFORMANCE OF WIRELESS SENSOR NETWORKS: A SURVEY Mohit Raikwar, Prakash Mishra Download Here
16 DESIGNING OUTSOURCING SCHEME WITH IBE REVOCATION IN CLOUD Shivganga Vishal Gavhane, Ketaki N. Bhoyar Download Here
17 News Recommendation Approach Based on Content Kavita Soni, S.S.Meena, Preetesh Purohit Download Here
18 Reliable Routing with Optimization in Adhoc Network Vishwanath B Ghali, Sujeet More, Mohammed Mujeeb Arab, Gautam Dematti Download Here
19 REVIEW PAPER ON DIFFERENCE BETWEEN STRATEGIC RECRUITMENT AND SELECTION Mrs Sharvari Jalamkar Download Here
20 PARAMETRIC ANALYSIS OF 49 CM2 SERPENTINE FLOW CHANNEL OF POLYMER ELECTROLYTE MEMBRANE FUEL CELL (PEMFC) FOR PERFORMANCE ENHANCEMENT E.Vignesh,T.Rajeshkumar, G.Chockalingam,R.Haridass Download Here
21 PERFORMANCE IMPROVEMENT OF POLLUTION CONTROL DEVICE USED IN SMALL SCALE FOUNDRY INDUSTRY R.Haridass,K.Ramesh,T.Rajeshkumar,E.Vignesh Download Here
22 PID Controller Based Electro- Hydraulic Servo System For Hydraulic Presses D.Venkatesa Prabu, R.Nandhakumar, A.Sathishkumar, R.Chandiran Download Here
23 FROM RESOURCES TO PERFORMANCE: WORK ENGAGEMENT AND RESOURCES Sayed Asad Ullah Download Here
24 Automobile Digital Security System Arpit Agrawal, Pallavi Mittal Download Here
25 SURVEY BASED ON ENHANCED TECHNIQUE FOR CONGESTION CONTROL IN VANET WITH SECURE COMMUNICATION Bhagyashri P. Deshpande , Dr.A.S.Alvi Download Here
26 MATHEMATICAL FORMULATION OF PRESSURE DISTRIBUTION OVER GASKET Atul Kolte Download Here
27 A REVIEW ON VERIFYING RESULT CORRECTNESS OF OUTSOURCED FREQUENT ITEMSET MINING IN DATA-MINING SERVICE AS A TECHNIQUE Chaudhari Bhagyashri N, Prof A. N. Nawathe Download Here
28 A REVIEW ON SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Miss.Tejashree Ajit Rahane , Prof.S.K.Sonkar Download Here
29 A REVIEW ON IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD Miss.Snehal Phatangare , Prof.S..K.Sonkar Download Here
30 A Review on Failure Factors and Analysis of Pressure Vessel Swapnil R. Ajmera, Dr.Ramakant K, Shrivastava Download Here
31 A REVIEW ON ANALYSIS OF STRESS CONCENTRATION FACTOR FOR PLATE Rohit O. Tembhurkar, I. M. Quraishi Download Here
32 A Review on Importance of Internet of Things For Next Generation Computing Prof. P. A. Pawade, Prof. A. R. Wasukar Download Here
33 HIDING SECRET IMAGE IN VIDEO Sarita Pandey, Vimal Parganiha Download Here
34 CONTENT BASE INFORMATION RETRIEVAL TECHNIQUE WITH HYBRID NATURE Divyata Patil , Rasna Sharma Download Here
35 IMPACT OF SECURITY ISSUES IN CLOUD COMPUTING ENVIRONMENT: A SURVEY Mansi Verma, Prof Nishant Sinha Download Here
36 PROBLEMS IN PLANNING AND IMPLEMENTING STRATEGIC INFORMATION SYSTEMS: SOME EVIDENCE FROM MALAYSIAN GOVERNMENT AGENCIES Hisyam Harun, Mohd Khairuddin Hashim Download Here
37 A Survey on Various Routing Attacks on Wireless Sensor Network Bhagyashree Shimpi, Ms.Sameeksha Shrivastava Download Here
38 A Study for Friend Recommendation based on User Behavior Anuradha Ratnaparkhe, Prof. Vinod Azad Download Here
39 An Approach to Analyse Software Reusability of Object Oriented Code Amit Gupta, Dr. Pankaj Dashore Download Here