Archive

SR.NO. TITLE AUTHOR(S) PAGES DOWNLOAD
1 A review on Data Mining based Cloud Computing Ms. Aishwarya S. Patil , Ms. Ankita S. Patil 1 to 4 Download Here
2 REVIEW ON “MOBILE CLOUD COMPUTING” Akshay M.Gawande, Prof. Jagruti S.Wankhade 1 to 8 Download Here
3 REVIEW PAPER ON THREATS TO DATABASE SECURITY Mr. Sumit Mangle , Prof. Aditya Bakshi 1 to 7 Download Here
4 INDIAN REGIONAL NAVIGATION SATELLITE SYSTEM Harshada Harde, Prof.M.R.Shahade, Diksha Badnore 1 to 7 Download Here
5 ADVANCED TECHNIQUE USED IN SOLAR DRYER SYSTEM Amol S. Kanwale, Vivek s. Otokar,Vishnu L. Kale, Kushal R. Turankar 1 to 5 Download Here
6 Automated Resume Extraction and Candidate Selection System Miss. Shweta V. Raja, Prof. Satish L. Thombare 1 to 6 Download Here
7 A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service Payal Malekar, Prof. Jagruti S. Wankhede 1 to 6 Download Here
8 REVIEW PAPER ON CLOUD COMPUTING Anantkumar A.kanwale, Prof.Mr.O.V.Chandure 1 to 6 Download Here
9 A Review paper on Student Information Supervision System Ketaki S. Kadam, Onkar V.Chandure 1 to 7 Download Here
10 POLICY AND TECHNOLOGY ON THIRD PARTY WEB TRACKING Miss. Maya A. Kanwale , Mr. Satish L. Thombare 1 to 5 Download Here
11 REVIEW ON: SPY CAMERA IDENTIFICATION AND WOMEN ATTACK RESCUE SYSTEM Ashwagandha. Y Moon , Prof.M.R.Shahade 1 to 7 Download Here
12 SMART TRAVEL GUIDE: APPLICATION FOR MOBILE PHONE Pooja D. Watkar, Prof. M. R. Shahade 1 to 6 Download Here
13 REVIEW ON: IMPROVEMENT OF THE PERFORMANCE OF MOBILE AD HOC NETWORK USING ANT COLONY OPTIMIZATION Miss Sayali R. Parate , Assistant Prof. Jagruti Wankhade 1 to 6 Download Here
14 A REVIEW ON TIME TABLE GENERATOR METHOD Ashwini R. Dhamanwar, Prof. Chaitali S. Suratkar 1 to 6 Download Here
15 SEQUENTIAL PATTERN MINING Dhiraj D.Shirbhate , Vishal B.Rathod 1 to 7 Download Here
16 REVIEW PAPER ON THIRD PARTY APPLICATION FOR ONLINE TRANSACTIONS Rutuparn Bharane, Prof. Priyanka Shirbhate 1 to 7 Download Here
17 DEFINATION OF TABU SEARCH Nishita Thakkar, Poonam Durge, Mona Choutmal, Mrunal Munje 1 to 3 Download Here
18 REVIEW PAPER ON WEB MINING AND ITS APPLICATION Ashvini R. Sulbhewar, Prof. A D Raut 1 to 5 Download Here
19 FUNDAMENTALS OF NETWORK SECURITY& STUDY Sharayu Chormale, Pooja Butale, Gauri Mali 1 to 4 Download Here
20 Review of Internet of Things (IoT): A vision and future directions Kalyani C.Badkas, Prof M.R. Shahade, Upendra S.Ramteke 1 to 6 Download Here
21 REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe, Akshay R Jaisingpure, Pratik S Godbole Dipti S Khode 1 to 5 Download Here
22 A STUDY OF WEB SEARCH PATTERN TO PERSONALISE SEARCH RESULTS AND TECHNIQUES Sharli S. pimpalkhute, Chaitali S. Suratkar 1 to 6 Download Here
23 A STUDY PAPERR ON NETWORK SECURITY Pratik Pawar, Priyanka V. Shirbhate 1 to 5 Download Here
24 REVEIW PAPER ON ROUTING PROTOCOL IN WSN/STUDY Sharvari Koshatwar, Aditya Bakshi 1 to 6 Download Here
25 MOBILE COMPUTING TECHNOLOGY A REVIEW Mr. Kunal B. Karlekar, Mr.S.L.Thombare 1 to 4 Download Here
26 REVIEW ON: PREDICTION OF MISSING ITEM SET IN SHOPPING CART Mr. Shriram V. Yende, Prof. P.V. Shirbhate 1 to 6 Download Here
27 A REVIEW PAPER ON GOOGLE LOON TECHNIQUE Kanchan Kamnani, Chaitali Suratkar 1 to 5 Download Here
28 REVIEW ON RESOURCE VIRTUALIZATION FOR IMPROVING USERS COMPUTATIONREVIEW OF RESOURCE VIRTUALIZATION FOR IMPROVING USERS COMPUTATION Priya G. Nawabasi, Assistant Prof. J. S. Wankhade 1 to 6 Download Here
29 OPTIMIZED DESIGN OF STUDENT ATTENDANCE SYSTEM USING RFID Miss. Shweta P. Mehta, Miss. Nikita Wankhade 1 to 6 Download Here
30 REVIEW ON: PERSONAL SAFETY TRIGGERING APPLICATION Komal D. Naskari1, Prof M. R. Shahade 1 to 5 Download Here
31 CLOUD TERMINAL: SECURE ACCESS TO SENSITIVE APPLICATIONS FROM UNTRUSTED SYSTEMS Rahul s. Lingawar , Siddharth V. Yerawar 1 to 8 Download Here
32 ANDROID APPLICATION TO ACCESS COLLEGE ACTIVITIES Lori Y. Pise, Prof. Aditya P. Bakshi 1 to 5 Download Here
33 REVIEW ON ANDROID BASED SOS EMERGENCY ALERT BUTTON Rajani T. Thakare , Prof. M.R. Shahade 1 to 6 Download Here
34 REVIEW ON WEB CRAWLING CONCEPTS Bhagyashri K. Patre, Prof. A. D. Raut 1 to 5 Download Here
35 A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar, Prof.Chaitali S.Surtakar 1 to 6 Download Here
36 STUDY OF VARIOUS ROUTING PROTOCOL FOR VANET Rajshree S. Gulhane, Prof. Aditya P. Bakshi 1 to 5 Download Here
37 REVIEW ON: DETECTING AND DEFENDING AGAINST THIRD PARTY TRACKING ON THE WEB Miss. Manisha R. Thote , Mr. Satish L. Thombre 1 to 5 Download Here
38 REVIEW ON: DETECTING INTRUSION IN MULTITIER WEB APPLICATION Miss. Snehal D. Chavhan, Mr. Satish L. Thombare2 1 to 4 Download Here
39 A STUDY ON INTERACTIVE WEB BASED TECHNIQUE FOR ACQUIRING HIGH QUALITY FOR TRAINING & PLACEMENT SYSTEM Miss Bhagyashree K. Jadhao, Prof. Onkar V. Chandure 1 to 5 Download Here
40 A REVIEW PAPER ON WiMAX Rasika.S.Ujjainkar, Prof.Ranjeet.M.Shende 1 to 4 Download Here
41 A STUDY PAPER ON COLLEGE COLLEBORATION PORTAL WITH TRAINING AND PLACEMENT Miss. Snehal D. Shriramjwar , Mr. Onkar. V. Chandure 1 to 4 Download Here
42 EXPLORING DATA COMPRESSION FOR WIRELESS SENSOR NODE Mayur Gaikwad, Nitin Janwe 1 to 8 Download Here
43 VAMPIRE ATTACKS INTRUSION DETECTION AND EFFICIENT USE OF SENSOR NODES A REVIEW Ravi R. Dable,Assistant Prof. Satish L. Thombare 1 to 3 Download Here
44 REVIEW PAPER ON CAPCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) Kavita R. Menake, Prof. A D Raut 1 to 4 Download Here
45 REVIEW ON: INTEGRATION OF RFID AND WSN WIH DATA CLEANING Sudesh Ashok Bachwani , J. S. Karnewar 1 to 5 Download Here
46 REVIEW OF NETWORK SECURITY Ruchita B. Thawale, Ranjit M. Shende 1 to 4 Download Here
47 COMPARATIVE ANALYSIS OF XML COMPRESSION TECHNOLOGIES: A REVIEW Hrishikesh C. Belgamwar, Shubham M. Dhore, Priyanka U. Rathod 1 to 7 Download Here
48 STUDY PAPER ON E-RECRUITMENT Surbhi J.Hotwani , Onkar V.Chandure 1 to 7 Download Here
49 UDTF (USER DEFINED TABLE GENERATING FUNCTION) BASED ON HADOOP HYBRID APPROACH OF BIG DATA Ms.Rupali Y.Behare, Prof.S.S.Dandge 1 to 6 Download Here
50 ACTIVE REAL ESTATE MANAGEMENT SYSTEM Miss. Chaitali R. Khivasara, Miss. Chaitali S.Suratkar 1 to 5 Download Here
51 “A REVIEW PAPER ON SECURE SUPPORT FOR MOBILE HEALTHCARE USING MESSAGE DIGEST” Vaibhav Gaikwad, Prof. Aditya Bakshi 1 to 6 Download Here
52 REVIEW PAPER ON ENTERPRISE RESOURCE PLANNING SYSTEMS FOR PROTECTION Sagar S. kaware, Prof.Mr.O.V.Chandure 1 to 5 Download Here
53 AN MESSAGE FILTERING SYSTEM FOR OSN WALL Minal C. Chaudhari1, Prof. Aditya P. Baksh Minal C. Chaudhari1, Prof. Aditya P. Bakshi 1 to 3 Download Here
54 A REVIEW ON HOW ROUTING PROBLEM IS SOLVED USING GENETIC ALGORITHM Ku. Damayanti R. Karale, Prof. Ms. Jagruti S. Wankhade 1 to 6 Download Here
55 REVIEW ON “REMOTE BACKUP SERVICE USING CLOUD” Vishal Suresh Gode, Prof.J.S.Wankhade 1 to 8 Download Here
56 FAKE CURRENCY DETECTION USING IMAGE PROCESSING Sagar S. Lawade, Gayatri S. Hedau, Apurva C. Ramgirwar 1 to 7 Download Here
57 REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse,Chaitali S.Suratkar , Isha M.Shirbhate 1 to 5 Download Here
58 DETECTION OF WEB APPLICATION WORMS Shreyasi Shuddhalwar, Mansi Shuddhalwar, Prachi Dakhole, Sonal Bharre 1 to 5 Download Here
59 A SURVEY ON HOW TO SECURE A NETWORK SYSTEM AGAINST VIRUSES Saket N. Admane, Anushri N. Dhonge 1 to 8 Download Here
60 REVIEW ON HOSPITAL MANAGEMENT SYSTEM Darshana Shah, Aditya Bakshi 1 to 5 Download Here
61 CONCEALED WEAPONE DETECTION USING IMAGE PROCESSING Amit Sahebrao Gawai, Saurabh Baban Ganar 1 to 4 Download Here
62 A STUDY OF CRYPTOGRAPHY IN VIRTUAL PRIVATE NETWORKS Miss. Monika Bhurse,Prof.Chaitali Suratkar 1 to 6 Download Here
63 SECRET SHARING FOR HEALTH DATA IN MULTI-SUPPLYR CLOUDS: A REVIEW Saurabh L. Shrirang , Gaurav S. Sidgur , Akshay U. Lakhadive 1 to 8 Download Here
64 A TECHNICAL PAPER ON MOBILE COMPUTING(3rd GENERATION) Gaurav.R.Sambaskar, Prof.A.D.Raut 1 to 8 Download Here
65 Innovation in traffic management System using Embedded system and RFID Neha R. Lanjewar, Amita S. Raut, Anjali B. Parate , Bhaskar S. Kurzekar 1 to 7 Download Here
66 DATA MINING AND KNOWLEDGE DISCOVERY Asst. Prof. Dhiraj D.Shirbhate, Dr.S.R.Gupta 1 to 6 Download Here
67 INFORMATION FLOW TRACKING SYSTEM ON SMARTPHONE Miss. Pallavi N. Deshmukh , Mr. Satish L. Thombare 1 to 6 Download Here
68 ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar, Ranjit M. Shende 1 to 5 Download Here
69 NETWORK SECURITY: ATTACKS & COMPONENT Harshad J.Tawari, Jagruti S. Wankhade 1 to 5 Download Here
70 REVEIW ON: LOCATION BASED SERVICES IN ANDROID Prachi kohade, Prof.Makarand Shahade 1 to 6 Download Here
71 GOOGLE GLASS DISPLAY Mayuri S. Dahekar,Chaitali S.Navthale 1 to 6 Download Here
72 “SMART TROLLEY USING RFID” Aboli Hanwate , Poonam Thakare 1 to 4 Download Here
73 PREDICTING MOST FAVOURABLE ITEMS IN ONLINE SHOPPING CART Shantanu Deshmukh, Asst. Prof. P.V. Shirbhate, Asst. Prof. S.T. Dhagdi, Asst. Prof. M.R.Shahade 1 to 6 Download Here
74 MOBILE BASED MONITORING OF DRIVING ARRANGEMENTS: A REVIEW Shraddha S. Kawalkar1, Nitu P. Farkade2,Pratik Shirbhate3 1 to 5 Download Here
75 SECURITY IN WEB DATA MINING FRAMEWORK. Akshay P Chindaliya, SatishL.Thombare ,Roger P.David 1 to 8 Download Here