Archive

SR.NO. TITLE AUTHOR(S) PAGES DOWNLOAD
1 Biometric Cryptosystem: A Literature Review Rushikesh Karnewar, Akash Takawale, Rohit Bhosale, Subham Tathe 1 to 6 Download Here
2 COMPARISON OF DAIRY PERFORMANCE AND CHEESE APTITUDES OF SOME IMPORTED BOVINE BREEDS: Central région of Algeria Lyes OUABDESSELAM, S. ZENIA, A. SAADI, K. HARHOURA 1 to 6 Download Here
3 SOLAR PANEL MULTICHARGER SYSTEM WITH AUTO CUTOFF Priyanka Singre, Rekha Nimbekar, Sumama Khan,Sneha Patil, Prof. Saurav Suman 1 to 6 Download Here
4 REVIEW ON AN EMBEDDED LABORATORY SECURITY MONITORING SYSTEM Gaurav Wankhade,Sachin S. Wankhade,Harshal T.Gujarkar,Vishal Manwar,Prof. Mayur D. Ghatole 1 to 6 Download Here
5 DOCTOR’S KEY Mr. Shubham Katole,Ms. Purvantika Dagwar,Ms. Prajakta Tadas,Mr. Vedprakash Chopade,Prof. Ms. P.V. Bhagat 1 to 6 Download Here
6 REVIEW: A NOVEL MULTILEVEL INVERTER WITH MINIMUM NUMBER OF SWITCHES Ms. Madhur Wasekar,Ms. Rutuja Chafle,Ms. Rutika Maheshkar,Mr. Viplao Titirmare,Prof. Mrs. S. R. Bhavarkar 1 to 6 Download Here
7 ENSURING LOAD BALANCING IN CLOUD IAAS SERVICE Jaishree V. karade, Neha N. Gupta , Piyush M. Gawande, Siddhant R. Bodile , Swapnil Dalvi ,Prof. Dipali Pethe 1 to 6 Download Here
8 GROUP KEY AGREEMENT WITH LOCAL CONNECTIVITY: A REVIEW Shraddha N. Hadeoo, Puja D. Devale ,Dasurya V. Citric,Dixit P. Chopde,Prof. Supriya Sawwashere 1 to 6 Download Here
9 WEB SECURITY MECHANISM TO AVOID WEB ATTACKS Anshul Dubey,Shubham Ramteke,Rupesh Nikam,Prof. Raju Pawar 1 to 6 Download Here
10 REVIEW ON DESIGN & DEVELOPMENT OF HAND TALK FOR DEAF AND MUTE PEOPLE IN HAPTIC ENVIRONMENT Prof. Shyam D. Bawankar,Spursh S. Naredi, Vedika V. Tamhan, Shruti S. Itware, Kartik S. Chauhan,Ravina S. Chaudhari 1 to 6 Download Here
11 A SURVEY ON SYBIL ATTACKS IN SOCIAL NETWORKS Shital A.Meshram, Prof.D.M.Sable 1 to 6 Download Here
12 Packet Dropping Attacks in Wireless Ad Hoc Networks Using Privacy Preserving And Truthful Detection Shraddha Chougule, Shivanjali Desai, Ketaki Bhoyar 1 to 6 Download Here
13 A Framework to improve crop yield in Smart Agriculture using IoT Revanasiddappa Bandi , Suma Swamy , Raghav S 1 to 6 Download Here
14 AN APPROACH FOR ARTIST RECOMMENDATION BASED ON POPULARITY AND SIMILARITY FACTOR Swati Shah,Pragya Shukla 1 to 6 Download Here
15 IMPACT OF VAMPIRE ATTACK ON PERFORMANCE OF WIRELESS SENSOR NETWORKS: A SURVEY Mohit Raikwar, Prakash Mishra 1 to 6 Download Here
16 DESIGNING OUTSOURCING SCHEME WITH IBE REVOCATION IN CLOUD Shivganga Vishal Gavhane, Ketaki N. Bhoyar 1 to 6 Download Here
17 News Recommendation Approach Based on Content Kavita Soni, S.S.Meena, Preetesh Purohit 1 to 6 Download Here
18 Reliable Routing with Optimization in Adhoc Network Vishwanath B Ghali, Sujeet More, Mohammed Mujeeb Arab, Gautam Dematti 1 to 7 Download Here
19 REVIEW PAPER ON DIFFERENCE BETWEEN STRATEGIC RECRUITMENT AND SELECTION Mrs Sharvari Jalamkar 1 to 6 Download Here
20 PARAMETRIC ANALYSIS OF 49 CM2 SERPENTINE FLOW CHANNEL OF POLYMER ELECTROLYTE MEMBRANE FUEL CELL (PEMFC) FOR PERFORMANCE ENHANCEMENT E.Vignesh,T.Rajeshkumar, G.Chockalingam,R.Haridass 1 to 12 Download Here
21 PERFORMANCE IMPROVEMENT OF POLLUTION CONTROL DEVICE USED IN SMALL SCALE FOUNDRY INDUSTRY R.Haridass,K.Ramesh,T.Rajeshkumar,E.Vignesh 1 to 6 Download Here
22 PID Controller Based Electro- Hydraulic Servo System For Hydraulic Presses D.Venkatesa Prabu, R.Nandhakumar, A.Sathishkumar, R.Chandiran 1 to 6 Download Here
23 FROM RESOURCES TO PERFORMANCE: WORK ENGAGEMENT AND RESOURCES Sayed Asad Ullah 1 to 10 Download Here
24 Automobile Digital Security System Arpit Agrawal, Pallavi Mittal 1 to 6 Download Here
25 SURVEY BASED ON ENHANCED TECHNIQUE FOR CONGESTION CONTROL IN VANET WITH SECURE COMMUNICATION Bhagyashri P. Deshpande , Dr.A.S.Alvi 1 to 6 Download Here
26 MATHEMATICAL FORMULATION OF PRESSURE DISTRIBUTION OVER GASKET Atul Kolte 1 to 5 Download Here
27 The Integration of Cloud Computing Technology in Academic Library Operations towards Effective Library Services Haruna Abdu, Abubakar Aliyu, Umeh Paulinus, Mubarak Umar 1 to 6 Download Here
28 A REVIEW ON VERIFYING RESULT CORRECTNESS OF OUTSOURCED FREQUENT ITEMSET MINING IN DATA-MINING SERVICE AS A TECHNIQUE Chaudhari Bhagyashri N, Prof A. N. Nawathe 1 to 6 Download Here
29 A REVIEW ON SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Miss.Tejashree Ajit Rahane , Prof.S.K.Sonkar 1 to 6 Download Here
30 A REVIEW ON IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD Miss.Snehal Phatangare , Prof.S..K.Sonkar 1 to 6 Download Here
31 A Review on Failure Factors and Analysis of Pressure Vessel Swapnil R. Ajmera, Dr.Ramakant K, Shrivastava 1 to 6 Download Here
32 A REVIEW ON ANALYSIS OF STRESS CONCENTRATION FACTOR FOR PLATE Rohit O. Tembhurkar, I. M. Quraishi 1 to 6 Download Here
33 A Review on Importance of Internet of Things For Next Generation Computing Prof. P. A. Pawade, Prof. A. R. Wasukar 1 to 6 Download Here
34 HIDING SECRET IMAGE IN VIDEO Sarita Pandey, Vimal Parganiha 1 to 6 Download Here
35 CONTENT BASE INFORMATION RETRIEVAL TECHNIQUE WITH HYBRID NATURE Divyata Patil , Rasna Sharma 1 to 6 Download Here
36 IMPACT OF SECURITY ISSUES IN CLOUD COMPUTING ENVIRONMENT: A SURVEY Mansi Verma, Prof Nishant Sinha 1 to 6 Download Here
37 PROBLEMS IN PLANNING AND IMPLEMENTING STRATEGIC INFORMATION SYSTEMS: SOME EVIDENCE FROM MALAYSIAN GOVERNMENT AGENCIES Hisyam Harun, Mohd Khairuddin Hashim 1 to 6 Download Here
38 A Survey on Various Routing Attacks on Wireless Sensor Network Bhagyashree Shimpi, Ms.Sameeksha Shrivastava 1 to 6 Download Here
39 A Study for Friend Recommendation based on User Behavior Anuradha Ratnaparkhe, Prof. Vinod Azad 1 to 6 Download Here
40 An Approach to Analyse Software Reusability of Object Oriented Code Amit Gupta, Dr. Pankaj Dashore 1 to 5 Download Here
41 A Study on Arduino Microcontroller & Its Applications Neha Urkude, Mukta Gaur, B.S. Gujar 1 to 6 Download Here
42 Run-Time Analysis of Searching and Hashing Algorithms with C# Sourabh Shastri,Prof. Vibhakar Mansotra, Arjun Singh, Brij Mohan 1 to 6 Download Here