Research Article |
Authors |
Download |
Effectiveness of Earthquake Retrofitting of
Masonry Dome using Base Isolation Technique |
Abhijit Pawar,Hitesh Patil,Hemant Patil |
 |
Velocity distribution through slurry pipeline |
Mrs. Autade N.A.,Mr. Nimbalkar P.T. |
 |
Planning and Design of Green Village |
Prakash Kadave,Prakash Pathak,Sadhana Pawar |
 |
Study of different EMS with SWOT,
energy and cost benefit analysis and star
rating system for integrated EMS with gap
analysis for sustainable development in
construction sector |
Prof. Mrs. Gayatri Rajendra Vaishampayan |
 |
ACCOUNTABLE HYPER TEXT
TRANSFER PROTOCOL (HTTPA) |
Miss. Dipali P. Sapkal ,Mr. Chandrasekhar D. Badgujar |
 |
Improved Web Page Clustering using
Words and Tags |
M.A. Shelke,K.C. Sadavarte,R.K. Dhurjad,N.P. Pandit |
 |
Template Level Concatenation of Iris and Fingerprint in
Multimodal Biometric Identification Systems |
Mr. R. N. Kankrale ,Prof. Mrs. S. D. Sapkal |
 |
REUSABILTY OF CODE WITH ASPECT MINING AND
REFACTORING:A PROPODED APPOACH |
Shivani Waman Borle,Priyanka Nana Kothawade,Vibhuti Vasant Vadje,Priyanka Uday Wani |
 |
Icra – a Unified Tool to Model the Performance of
Linux Block Device Layer using Queuing Theory |
Apoorva Pathak,Reshma Raju,Ashish Kumar Singh,Aarti Goel |
 |
Optimization of Material Supply Chain System
Using Genetic Algorithm – A Proposed System |
Kalyani Devidas Desai,Sanketa Ulhas Khupase,Apurva Satish Kolapkar,Tejal Sudhir Shirke |
 |
Intrusion Detection System Using Data Mining |
Ashish R. Varma Pankaj S. Desai P.R. Bhaladhare |
 |
KNOWLEDGE RETRIEVAL AND DATA MINING |
Mrs. Bhavana Tiple ,Sachin Dhande |
 |
Web-Enabled Ration Distribution and Controlling |
Neha Pardeshi,Trupti Desale,Prajakta Bhagwat,RuchaliAhire |
 |
MEDICAL X-RAY 2D AND 3D IMAGE
VIEWER:ROLE FOR THE MEDICAL IMAGE IN
DICOM STANDARD |
Mrs.B.A.Khivsara ,Mr.Shakadwipi Amol J.,Mr. Nagare Sachin N.,
Mr. Phophaliya Abhijeet ,Mr.Gujrathi Apurv N. |
 |
Content Based Image retrieval System |
Priyanka B. Khairnar ,Aarti A. Khairnar ,Priyanka R. Khandre ,Priyanka S. Mahajan |
 |
DROID M-Learning |
Swapnali Gugale ,Amruta Bafna,Neelam Jain,Rashmi Chhallani,Parag Achaliya |
 |
Steganography &Steganalysis Using Service Oriented
Architecture |
Dipesh Agrawal,Nishant Khare |
 |
I-Query Solver |
Desale Sanket S. ,Gandhi Ankit P. ,Gandhi Viraj V.,Ranwa Nisha M. ,Sanghavi Mahesh R. |
 |
ANDROID APPLICATION USING GPS NAVIGATION |
Bagrecha Komal S., Bramhecha Amit R., Chhajed Sneha S., Chhajed Sneha S., Khivsara B.A. |
 |
AUDIO STEGANOGRAPHY USING LSB |
BANKAR PRIYANKA R., KATARIYA VRUSHABH R., PATIL KOMAL K. ,SHASHIKANT M. PINGLE,
SANGHAVI MAHESH R. |
 |
Vowel Based Smart Access System |
Sanghavi Ekta, Thakkar Pooja ,Raut Madhuri ,Sanap Varsha |
 |
Review on RAP: Protecting Wi-Fi Networks from
Rogue Access Points |
Prof. Pranit S. Thakur, Prof. Vijay B. Patil ,Prof. Abhijit S. Bodhe |
 |
Smart Travel Guide: Application for Android Mobile |
Dadape Jinendra R. ,Jadhav Bhagyashri R. ,Gaidhani Pranav Y.,
Vyavahare Seema U., AchaliyaParag N. |
 |
DATA SECURITY USING CRYPTOGRAPHY,
STEGANOGRAPHY AND LAN MESSAGING
(DSCSL) |
Agrawal Jayesh G., Ashwini Gadge B. ,Dawange Yogesh P.,
Chaube Neha V . ,Achaliya Parag N. |
 |
Class Diagram Extraction Using NLP |
Bhagat S. B. Kapadni P. R. Kapadnis N. Patil D. S. Baheti M. J. |
 |
Distributed Intrusion Alert Aggregation with
Data Stream Modeling |
Rupali Ramdas Shevale, Yogadhar Pandey ,Maheshkumar A. Sali |
 |