Vol. 5 No. 3 (2016)

Published: 2017-12-30

Articles

  • An Approach to Utilize Memory Streams for efficient Memory Management

    Manish(Student) , Sunil Dhankar (Reader)
    323
    274
  • Dynamic parallel K-Means Algorithm Based On Dunn’s Index Method

    Hitesh Kumari Yadav Sunil Dhankar
    328
    305
  • “Tourist App”- to find a locations

    Ms.Swati Kute, Ms.Shrutika Dhawane Ms.Swati Kaware, Ms. Yogita Kale, Prof. Shinde S.R
    313
    251
  • “Formation of E-Commerce Recommendation (E-Shop)”

    Ms.Bawake Shraddha N Ms.Barse Stella N ,Kote G.B Ms. Chechre Pritam ,Mr. Chaudhari Suraj
    323
    240
  • Real-Time Carpooling Application for Android Platform

    Nayana M. Nale, Shilpa, R. Landge, Shradha A. Darekar, Suvarna B. Gadhave, Yogesh S. Jorwekar
    453
    363
  • “Review On- Efficient Data Transfer For Mobile Devices By Using Ad-Hoc Network”

    Gunjal Sarla.P. (BE Student), Mandlik Rupali.M. (BE Student), Bhalerao Butkar.U.D (Assistant Professor & Guide
    356
    264
  • Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites

    A.Praveena, Dr.S.Smys
    352
    261
  • Optimization of Dynamic Packet Length in Wireless Sensor Network

    Mr. Sudip Tembhurne 1, Mr. Sachin Deshpa
    257
    258
  • Modified Random Walk Algorithm to Improve the Efficiency of Word Sense Disambiguation (WSD)

    Rashmi S, Hanumanthappa M
    271
    270
  • Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud

    MS. Gayatri D Patwardhan, Prof.B. W. Balkhande
    280
    296
  • Boundless Communication

    Kanika Sluja1, Satinder Kaur2
    346
    291
  • A review: Issues and Challenges in Big Data from Analytic and Storage perspectives

    1Zaharaddeen Karami Lawal 2Rufai Yusuf Zakari, 3Mansur Zakariyya Shuaibu, 4Alhassan Bala
    298
    262
  • Insights to Sensor Technology and it’s Applications

    Prof. Mayuri Bapat
    245
    288
  • Security Ecosystem in IoT & Cloud

    Pokuri Rajani, Parupally Anuja Reddy
    250
    274
  • Power performance analysis on secure and efficient authentication protcols in mobile devices

    S Kharthikeyana, K Azarudeenb , S Samsude
    273
    245
  • Overview of Classification and Risk Evaluation in Multi-dimensional Datasets

    Dr. K. Kavitha
    317
    264
  • Inferring User Search Goals with feedback Sessions using Fuzzy K-Means Algorithm

    Mr.Gajanan Patil, Miss.Sonal Patil
    347
    236
  • Medium Valuation Method for Massive MIMO Using Gaussian Mixture Bayesian Learning

    M.Sakthivel P.Agila P.Anitha
    283
    203
  • Web Search Result Clustering using IFCWR Algorithm

    Arun Kumar Pal1, Ashwini Londhe2, Nitin Patil3 Vinod Bankar4
    241
    258
  • Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique

    Dimple Lalwani , Manasi Sawant2, Mitali Rane3, Vandana Jogdande4 , S.B.Ware5
    386
    236
  • Copy Detection of Multimedia Contents in Cloud

    R. Amirtharathna, Mrs. P.Vijayasarathy
    239
    240
  • Bluetooth Technology

    Jagjeet Kaur1, Ramandeep Kaur2, Manpreet Kaur3
    366
    329
  • Multi Criteria Recommendation System for Material Management

    Mr. Rahul Samant Mr. Sachin Deshpande Mr. Anil Jadhao
    359
    274
  • Fog Computing: Securing the cloud and preventing insider attacks in the cloud.

    Aatish B. Shah, Jai Kannan, Deep Utkal Shah Prof. S.B.Ware, Prof. R.S.Badodekar
    338
    254
  • Variants Of Resource Allocation Problem

    Vijaya Goel
    300
    215
  • A Review of Damaged Manuscripts Using Binarization Techniques.

    Prajakta. S. Jadhav1 Preeti. P. Dapkekar2, Shubhangi. M. Jadh Kartik. K. Kondalkar 4,Shabnam S. Shaikh
    389
    245
  • Patient Parameter Monitoring System using Raspberry Pi

    Pooja Navdeti1, Sumita Parte2 , Prachi Talashilkar3, Jagruti Patil4 , Dr. Vaishali Khairnar5
    347
    542
  • Sanative Chatbot For Health Seekers

    V.Manoj Kumar1 A.Keerthana2, M.Madhumitha3, S.Valliammai4, V.Vinithasri
    1486
    410
  • Multipurpose Card Using Rfid Technology

    J.Subhash M.E., S. Gayathri, D. Gayathri
    239
    270
  • System Automation And Production Monitoring In Industries Using Arduino With IoT Technology

    Ms. Nithya.S1, Mr.Arjun.C2 Mr.Ashok.M3, Mr.Jeevanantham.B4
    327
    414
  • Advanced Secure Voting System with IoT

    Ms. Nithya.S1, Mr.Ashwin.C2 Mr.Karthikeyan.C3, Mr.Ajith kumar.M4
    320
    263
  • Advance Dynamic Malware Analysis Using Api Hooking

    Ajay Kumar , Shubham Goyal
    326
    445
  • Comparison: Wireshark on different parameters

    Ajay Kumar, Jai Bhagwan Yadav
    314
    461
  • Analysis of Security threats in ad hoc cloud

    Mrs. Salini Suresh, Dr.L.Manjunath Rao
    222
    266
  • File Encryption System Based on Symmetric Key Cryptography

    Ajay Kumar, Ankit Kumar
    282
    228
  • Smart Energy Meter Using Android Application And Gsm Network

    Diya Elizabeth Paul Prof . Alpha Vijayan
    471
    384