Archive

SR.NO. TITLE AUTHOR(S) PAGES DOWNLOAD
1 REVIEW OF CLASSIFICATION/CLUSTERING TECHNIQUES USED IN WEB DATA MINING Nutan Borkar, Shrikant Kulkarni 1 to 8 Download Here
2 Privacy Protection in Personalized Web Search Based On Profile Veena Shivaputrayya Mannurmath, JayshreePatil,.Sayali Kamble,Prof.Ankita Agarwal 1 to 4 Download Here
3 Secure Web Search Engine Using Domain Knowledge and History Based On Re Ranking Vaibhav Kumar, Mayur Bhadrige, Pradnya Raut, Shrinivas Halhalli 1 to 4 Download Here
4 Incremental Map Reduce & Keyword-Aware for Mining Evolving Big Data Rahul More, Sheshdhari Shete, SnehalJagtap,Prajakta Shete 1 to 4 Download Here
5 Dynamic Space Allocation & Load Balancing on Cloud Environment Pooja Shamshawadi, Sayali Badgujar,Bhagyshri Patil,ProfNilkanth Patil 1 to 5 Download Here
6 Securely P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Kavita Rani, Suvarna Pawar, Smita Pathare, Shivkumar Phulari 1 to 5 Download Here
7 Survey Paper On Designing & Auditing Patients issues From Home Ashwini Ashok Lohar, Priyanka Sanjay Bhambal, Shital Ashok Bobade , Prof.Jayashree Mohadikar 1 to 5 Download Here
8 Mobile Apps Fraud Detection Technique Based On Global and Local Ranking Asharaf R Bagwan, Mangesh S Bhunde, Riyaz M Shaikh,Prof.Prashant Sagare 1 to 5 Download Here
9 An Auditing Dynamic Trust Scenario Based on User Authorization Chetan Girhe,Amol Yeole,Sagar Zinjurke,Anita Pawar 1 to 4 Download Here
10 SECURE RECOMMENDATION USING USER INTEREST AND SOCIAL CIRCLE NETWORK Ajit Dhaygude, Sushant Shinde,Vishal Jadhav,Gajanan Zanzat,Prof. Dipeeka Aher 1 to 4 Download Here
11 Filtering Of Unwanted Messages, Images, And Phish Links On OSN Wall Snehal More ,Hritika Gund ,Shilpa Misal 1 to 5 Download Here
12 SHIFTED POWER IMPLEMENTATION OF MULTIPLIER FOR HARDWARE NEURAL NETWORK V.Parthasarathy, C.Eswaran, Dr.B.Muralidhara, Dr.H.M.Ravikumar 1 to 8 Download Here
13 THERMAL ANALYSIS OF CYLINDRICAL PERFORATED FINS IN STAGGERED ARRANGEMENT BY CFD Mr. Ashish B. Samarth, Dr. Nishikant W. Kale 1 to 12 Download Here
14 Lossless And Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption With Public Key Cryptography Prof. Vrushali Kondhalkar, Laxmi Kokate, Pooja Kore, Gauri Dhale, Snehal Raut 1 to 5 Download Here
15 A Landmine Detection using Swarm Intelligence Arvind Jambe, Omkar Bhosale, Sharad Mandge, Yogesh Landge 1 to 6 Download Here
16 Android Based Visitor Management System With Hardware Integration Dinesh R.Kumkale, Pooja S.Patil, Ashish Sharma, Akshay A.Memane 1 to 4 Download Here
17 META SEARCH ENGINE FOR TRAVELER Richa Bhandari, Tushar chechare, Chadrashekhar kumbhar, Aniket shahane 1 to 5 Download Here
18 Performance Analysis of Routing and MAC Protocols In Wireless Sensor Network Bhushan Deshmukh, Nikhil Gehi, Nikhil Jadhav, Ganesh Kumbhar 1 to 5 Download Here
19 Advance Library Management System Praveen Kote,Raman Kolekar, Dnyanesh Metkar, Piyush Mankare 1 to 3 Download Here
20 Mouse Functions are Performed by Human Computer Interface Sneha Valecha,Asmita Valave,Priyanka Bardiya,Srinu Dharavath 1 to 5 Download Here
21 COMPARATIVE CONVECTIVE HEAT TRANSFER ANALYSIS THROUGH HELICAL COILS OF DIFFERENT MATERIALS Mr. Yusuf A. Rahman, Prof. A.K.Pitale 1 to 6 Download Here
22 Lossless And Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption With Public Key Cryptography Gauri Dhale, Snehal Raut, Laxmi Kokate, Pooja Kore 1 to 6 Download Here
23 MULTIOBJECTIVE OPTIMIZATION OF NEURAL NETWORK FOR CLASSIFICATION Priyanka Deshmukh, Kranti Dhage , Sayali Ghate, Shamal Sinare 1 to 5 Download Here
24 Optimal Number of Shares For Digital Watermarking Scheme Using Visual Cryptography Jitendra Saturwar, Dr. D.N.Chaudhari 1 to 6 Download Here