1 |
A Survey on Different Techniques for Verification of Frequent Itemset Mining in Cloud
PANDIT JYOTIKUMARI, YASH SINGH, SHAILESH MAHANTA, ADITI KALIA
|
|
|
2 |
A Survey on Hospital Management System Using Smart Card and Cloud Infrastructure
PRATIK AGARWAL, ABHAYA KOTHARI, MANGESH KADAM, ABHIJEET BANGERA
|
|
|
3 |
Automatic Student Performance Analysis and Monitoring
SNEHAL KEKANE, DIPIKA KHAIRNAR, ROHINI PATIL, PROF. S. R. VISPUTE, PROF. N. GAWANDE
|
|
|
4 |
A Survey on Internet of Things Based Home Automation System
POOJA N.PAWAR, SHRUTI RAMACHANDRAN, NISHA P.SINGH, VARSHA V.WAGH
|
|
|
5 |
A Survey- Indoor Navigation Using Inertial Mobile Phone Sensors
AYUSH MAHAJAN, AKASH SASIKUMAR, PRIYANKA NARWAT, MEENAKSHI SHARMA, PRIYANKA NEVREKAR
|
|
|
6 |
Analysis and Mapping of Traffic Spots in City Transportation using Android System
RAHUL DHIWAR, MANISHA KANDEWAD, PRIYA RELEKAR, AAKANKSHA INGLE
|
|
|
7 |
A Survey on Phishing Detection and Prevention Technique
GAURAV KOTHARI, KRISHNA KUMAR, RAKHI GULWANE
|
|
|
8 |
Survey of Animation of 3D Human Model by Using Motion Capture
KOKARE SUPRIYA, SHERE SONALI, RAUT SMITA, BANSODE PRIYANKA
|
|
|
9 |
Secure Data Framework for Multi-Owner Architecture Using Threshold Cryptography
PRASAD BANGAR, KUNDAN RANDIVE, JINESH JAIN
|
|
|
10 |
A Survey on Novel Hybrid Recommendation Mechanism for Mobile Query Retrieve Effective Results Rankin
PRANAYA SUDRIK, NALINI LANGHE, PRANALI PHANASE
|
|
|
11 |
RDIB Technique for Degraded Document Images
UMESH SONAWANE, AJAY WAGH, BHANDARI PRITAM
|
|
|
12 |
Effective Video Inpainting Based on Super-Resolution Algorithm
SONALI GADGE, GOKUL KADNAR
|
|
|
13 |
A Survey On Avoid Shoulder Surfing Attack Using MultiColor Password
PRIYANKA R. WAJAGE, PRIYANKA D. BORHADE, PRIYANKA S. DAHITULE
|
|
|
14 |
A Survey on Selection of Efficient Web Service Based on Service Quality
ARUN . S, ARAVIND SRINIVAS C. V, JOHITH SUNDAR
|
|
|
15 |
A Survey on Different Approaches for Translation of Image to Text and Speech Synthesis
ABHILESH KUMAR, TUSHAR PADALE, SAHEBRAO SOURATE
|
|
|
16 |
Abandoned Object Detection in Video Surveillance
SUYASH JAGTAP, SAURABH PARKHI, VISHAL PITHE, SHUBHAM MENKUDLE
|
|
|
17 |
Face Based Attendance System using Convolutional Neural Network
RAJVI LANDGE, ADHISHREE AUCHARE, AIMAN SHAIKH, PROF. NILUFAR ZAMAN
|
|
|
18 |
Information Protection Using Data Classification Procedure in the Cloud Computing
SIDDHARTH PATEL, SAKSHI NEMA
|
|
|
19 |
Smart System of Using E-License
YUKTA GAJARE, PRAGATI BHOR, ASHWINI NALAWADE
|
|
|
20 |
Novel Approach to Construct QA Systems
TUSHAR SHEDAGE, HONEY VYAS
|
|
|
21 |
Role of Indian National Congress in Freedom Movement of India
DR. GIRISH SINGH
|
|
|
22 |
Faster And Inclusive Development: Towards A Sociological Approach Of Human-Society Sustainab
MAHENDRA THORY
|
|
|
23 |
Women Thinking in Mythological Literature
DR.SANJU GARG
|
|
|