S.No. |
Title and Authors of Paper |
Page.No. |
01 |
A Robust Image Restoration by Using Dark channel Removal Method
Ankit Jain, Prof. Mahima Jain |
208-213 |
02 |
Analysis of various Barriers to implementation of Web based Technology in education: Literature Review
Dr. S. V. Deshmukh, Dr. V. P. Deshmukh |
214-217 |
03 |
AUTOMATIC BUS FARE COLLECTION SYSTEM USING RFID
Sunitha Nandhini.A, Sangeetha.G, VidhyaJanani.J |
218-223 |
04 |
A Review on Secure Data Sharing in Cloud Computing Environment
B.V.Varshini, M.Vigilson Prem, J.Geethapriya |
224-228 |
05 |
An Efficient Mix-Zone based Secure Location Proof Activities in Urban Areas
Kiruthiga N, Sandhiya M, Saranya P,Tharani Priyangha M |
229-234 |
06 |
OPTIMAL CIRCULAR DISTRIBUTION CLUSTERING THROUGH GROUND TRUTH INFERENCE IN CROWDSOURCING
Ms M.DhivyaShree, V. Deepa , R. Kausalya |
235-240 |
07 |
Nature of Cyber Crimes and Legislation in the Republic of Tunisia
Ahmed Ben Ayed |
241-244 |
08 |
IoT Based Lecture Delivery System Using Raspberry Pi
Shaik Yusuf Baji Saheb, Gharade Abdul Mueed,Haider Choudhary,Ziauddin Ansari |
245-247 |
09 |
HELPLINE ON EMERGENCIES FOR PUBLIC SECURITY
Revathi A.R, Allwin P, Rajesh R, Tharak R, Venkatesh M |
248-252 |
10 |
MULTI CLOUD STORAGE USING SPLIT ALGORITHM
Mr P.Madhavan, M.Anitha, P.M.Dhravya, N.Keerthana |
253-256 |
11 |
SMART CRAWLER FOR EFFICIENTLY HARVESTING DEEP WEB INTERFACE
Rizwan k Shaikh,Deepali pagare, Dhumne Pooja, Bhaviskar Ashutosh |
257-262 |
12 |
Internet of Things: Security Threats
Diksha Sopori, Tanaya Pawar, Manjiri Patil, Roopkala Ravindran |
263-267 |
13 |
Data Mining Techniques for College Information System
Ravina.H.Popli,Dr. Anjali Raut |
268-271 |
14 |
E-Healthcare by using Cloud Computing
Miss. Nayan N. Khandekar,Dr. Anjali Raut |
272-273 |
15 |
Innovative Broadcast Key Scheme for Cryptosystem in Online Cloud Data Sharing
Rigam Sowmiya.R, Ramkumar.M.O |
274-277 |
16 |
A Survey on Short Text Interpretation with Semantic Knowledge
Ms.Namrutha Mohan |
278-280 |
17 |
Sentimental Analysis for Product and Movie Review Data
Aashna Rukhsaar , Dr.Anjali B.Raut |
281-285 |
18 |
WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE
Ms.S.Muthukakshmi, R. Surya , M. Umira Taj |
286-290 |
19 |
Transmission Line Monitoring System
Prof P.H.Zodape,Chakradeo Shubham,Rohan Shailendrakumar,Shaha Pritesh |
291-293 |
20 |
A SURVEY ON AN IMPROVED KEY AGREEMENT PROTOCOL FOR TELECARE MEDICINE SYSTEM
K. Prem Kumar, P.Gayathri |
294-296 |
21 |
NotifyMe – An Android Application for Student Service Administration
Divya R. Sharma, Hetankshi B. Desai, Karan C. Parmar, Rohan S. Sawant, Prof. Jyotsna Gharat |
297-300 |
22 |
A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS
S.Siamala Devi, N.Kokila, M.Nagamuthulakshmi, R.Priya |
301-307 |
23 |
Image Retrieval System for Peer To Peer Network Using Color and Bit Pattern
J. Saariya Nowsheen |
308-310 |
24 |
A SECURE AGGREGATE KEY CLOUD STORAGE SYSTEM WITH PRIORITY QUEUE BASED SEGMENTATION
R. Rasheeda Begum, M.O.Ramkumar |
311-313 |
25 |
FILE SEARCH BASED ON RANKING SCHEME OVER ENCRYPTED CLOUD
Ms.M.Malathi, S.Sathya Priya, S.Surekha |
314-319 |
26 |
Structural Design Optimization using Basic T-Norm and T-Conorm based Intuitionistic Fuzzy Optimization Technique
Samir Dey, Tapan Kumar Roy |
320-328 |
27 |
Automobile Radar System using Processing IDE
Anshul Caplish, Sagar Juneja, Shyam Goswami, Prof. Shekher Sengar |
329-332 |
28 |
Location based rewarding system with security and privacy
Shailesh Dinde, Nilesh Mali, Vinod Kumbhar, Ashitosh Kharade, Ganesh Chinche, Akshay Kangle |
333-337 |
29 |
A Brief Discussion About Client-Server System
Sawan Gupta, Sahil Narang, Shubham Arora,Prof. Shruti Jindal |
338-341 |
30 |
SOIL AREA NETWORK FORLANDSLIDE PREDICTION AND PREVENTION SYSTEM BASED ON ARM CORTEX M3
Shabna. B, Aswini. R Asst Prof |
342-349 |
31 |
A Survey on Adaptive Video Streaming Technologies
Suzen Saju Kallungal |
350-352 |
32 |
SPEECH AUTOMIZATION
Reetu Kumari, Reema chauhan,Shaili Sarvaiya |
353-357 |
33 |
Messenger Bot for Business Interaction
Ishaque Molla, Akshay Lakade |
358-360 |
34 |
An Efficient Sketch Based Image Retrieval Using Re-Ranking Method
E.MERLIN MERCY, M.HEMALATHA, R.GIRIJA, S.HEMALATHA |
361-365 |
35 |
An Efficient Moving Object Detection using Pixelization Dilate and Different Threshold Setting
Sampath kumar A, Saravanan N, Sudharsan G, Thangarasu R |
366-370 |
36 |
A SURVEY ON PREDICTION OF HEART DISEASES USING BIG DATA ALGORITHMS
MsS.Suguna, Sakthi Sakunthala, N. S.Sanjana , S.S.Sanjhana |
371-378 |
37 |
DATA CONFIDENTIALITY ON SEMI SUPERVISED CLUSTERING
Ms.D.Ranjani, Santhiya.G , Swetha Narayanan , Vibisha.V |
379-385 |
38 |
DEPLOYING WIRELESS SENSOR NETWORKS WITH FAULT-TOLERANCE FOR ENERGY EFFICIENT CLUSTERING
PL.Rajarajeswari,A.Preetha,B.Poovitha, T.M.Nivetha |
386-392 |
39 |
COMPARATIVE ANALYSIS OF HEPATITIS DISEASE USING VARIOUS CLUSTERING ALGORITHM
R.UMA.,M.PAVITHRA |
393-398 |
40 |
RELATIVE EXPLORATION OF WEBSITE RANKING USING CLUSTERING ALGORITHMS
A. Angel, R.Uma |
399-403 |
41 |
Real Time Tracking System
Keshav Agrawal, Shradha Devarkar, Sakshi Salokhe, Sujay Ramesh, Vidya Pujari |
404-408 |
42 |
Multi file security through hybrid mobile application
M.SRIDHARAN |
409-411 |
|
Remaining Papers will be available soon…. |
|