Archive

SR.NO. TITLE AUTHOR(S) PAGES DOWNLOAD
1 Optimal Number of Shares For Digital Watermarking Scheme Using Visual Cryptography Jitendra Saturwar, Dr. D.N.Chaudhari 1 to 6 Download Here
2 MULTIOBJECTIVE OPTIMIZATION OF NEURAL NETWORK FOR CLASSIFICATION Priyanka Deshmukh, Kranti Dhage , Sayali Ghate, Shamal Sinare 1 to 5 Download Here
3 Lossless And Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption With Public Key Cryptography Gauri Dhale, Snehal Raut, Laxmi Kokate, Pooja Kore 1 to 6 Download Here
4 COMPARATIVE CONVECTIVE HEAT TRANSFER ANALYSIS THROUGH HELICAL COILS OF DIFFERENT MATERIALS Mr. Yusuf A. Rahman, Prof. A.K.Pitale 1 to 6 Download Here
5 Mouse Functions are Performed by Human Computer Interface Sneha Valecha,Asmita Valave,Priyanka Bardiya,Srinu Dharavath 1 to 5 Download Here
6 Advance Library Management System Praveen Kote,Raman Kolekar, Dnyanesh Metkar, Piyush Mankare 1 to 3 Download Here
7 Performance Analysis of Routing and MAC Protocols In Wireless Sensor Network Bhushan Deshmukh, Nikhil Gehi, Nikhil Jadhav, Ganesh Kumbhar 1 to 5 Download Here
8 META SEARCH ENGINE FOR TRAVELER Richa Bhandari, Tushar chechare, Chadrashekhar kumbhar, Aniket shahane 1 to 5 Download Here
9 Android Based Visitor Management System With Hardware Integration Dinesh R.Kumkale, Pooja S.Patil, Ashish Sharma, Akshay A.Memane 1 to 4 Download Here
10 A Landmine Detection using Swarm Intelligence Arvind Jambe, Omkar Bhosale, Sharad Mandge, Yogesh Landge 1 to 6 Download Here
11 Lossless And Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption With Public Key Cryptography Prof. Vrushali Kondhalkar, Laxmi Kokate, Pooja Kore, Gauri Dhale, Snehal Raut 1 to 5 Download Here
12 THERMAL ANALYSIS OF CYLINDRICAL PERFORATED FINS IN STAGGERED ARRANGEMENT BY CFD Mr. Ashish B. Samarth, Dr. Nishikant W. Kale 1 to 12 Download Here
13 SHIFTED POWER IMPLEMENTATION OF MULTIPLIER FOR HARDWARE NEURAL NETWORK V.Parthasarathy, C.Eswaran, Dr.B.Muralidhara, Dr.H.M.Ravikumar 1 to 8 Download Here
14 Filtering Of Unwanted Messages, Images, And Phish Links On OSN Wall Snehal More ,Hritika Gund ,Shilpa Misal 1 to 5 Download Here
15 SECURE RECOMMENDATION USING USER INTEREST AND SOCIAL CIRCLE NETWORK Ajit Dhaygude, Sushant Shinde,Vishal Jadhav,Gajanan Zanzat,Prof. Dipeeka Aher 1 to 4 Download Here
16 An Auditing Dynamic Trust Scenario Based on User Authorization Chetan Girhe,Amol Yeole,Sagar Zinjurke,Anita Pawar 1 to 4 Download Here
17 Mobile Apps Fraud Detection Technique Based On Global and Local Ranking Asharaf R Bagwan, Mangesh S Bhunde, Riyaz M Shaikh,Prof.Prashant Sagare 1 to 5 Download Here
18 Survey Paper On Designing & Auditing Patients issues From Home Ashwini Ashok Lohar, Priyanka Sanjay Bhambal, Shital Ashok Bobade , Prof.Jayashree Mohadikar 1 to 5 Download Here
19 Securely P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Kavita Rani, Suvarna Pawar, Smita Pathare, Shivkumar Phulari 1 to 5 Download Here
20 Dynamic Space Allocation & Load Balancing on Cloud Environment Pooja Shamshawadi, Sayali Badgujar,Bhagyshri Patil,ProfNilkanth Patil 1 to 5 Download Here
21 Incremental Map Reduce & Keyword-Aware for Mining Evolving Big Data Rahul More, Sheshdhari Shete, SnehalJagtap,Prajakta Shete 1 to 4 Download Here
22 Secure Web Search Engine Using Domain Knowledge and History Based On Re Ranking Vaibhav Kumar, Mayur Bhadrige, Pradnya Raut, Shrinivas Halhalli 1 to 4 Download Here
23 Privacy Protection in Personalized Web Search Based On Profile Veena Shivaputrayya Mannurmath, JayshreePatil,.Sayali Kamble,Prof.Ankita Agarwal 1 to 4 Download Here
24 REVIEW OF CLASSIFICATION/CLUSTERING TECHNIQUES USED IN WEB DATA MINING Nutan Borkar, Shrikant Kulkarni 1 to 8 Download Here