E-Journal:Current Issue

SR.NO. TITLE DOWNLOAD
1 MODULAR OBJECT ORIENTED DYNAMIC LEARNING ENVIRONMENT (MOODLE)
Rahulkumar R. Singh1, Prof. Ankush patil2, Samiksha B. pardhi3, Mayuri p. Solanke4
Download Here
2 AN EVOLUTION OF OPEN SOURCE E-LEARNING PLATFORMS TRESSING ADAPTATION ISSUE
Umer Khan1, A. D. Patil2, Tushar Shivankar3 , Pallavi Narwade4
Download Here
3 A REVIEW ON VERY FAST DECISION TREE (VFDT) ALGORITHM ON HADOOP
Harshit Kadhao1, Dr. A. D. Raut2, Nutan Nichat3
Download Here
4 A Review on Analysis and Implementation of an Ajax-enabled Web Crawler
Mukesh Bhandarkar1, Dr.Atul Raut2,Pooja Gokhare3,Nayan Dhawale4
Download Here
5 A Review On Data Migration Ecosystem for Big Data
Nayan Dhawale1, Dr.Atul Raut2, Mukesh Bhandarkar3, Pooja Gokhare4
Download Here
6 A REVIEW ON DATA SECURITY IN HADOOP DISTRIBUTED FILE SYSTEM
Nutan Nichat1, Dr. A. D. Raut2 , Harshit Kadhao3
Download Here
7 A Review On Big Data Performance Evaluation Analysis Using Apache Pig
Pooja Gokhare1, Dr. A. D. Raut2, Mukesh Bhandarkar3,Nayan Dhawale4
Download Here
8 Review Paper on Insider Threat: Outline for Characterizing Impact on System
Anagha M. Pawar1, Jagruti S. Wankhade2 , Shivraj N. Borkar3
Download Here
9 A REVIEW ON:BILL OF MATERIALS
Arpit Tiwari1, Prof. J. S. Wankhade2
Download Here
10 A REVIEW ON: NORMALIZATION
Vinod Devatale1, Prof. J. S. Wankhade2 , Virendrakumar Zode3
Download Here
11 A REVIEW ON HAWK-EYE TECHNOLOGY
Aishwarya Pathak1,Prof K. G. Purohit2, Ashish Thakre3,
Download Here
12 A Review on Hadoop Distributed Computing Clusters for Fault Prediction
Piyush Raike1, Prof.K.G.Purohit, Niraj Patharkar3 ,Shubhank Deshmukh4
Download Here
13 HTML 5: Survey and Idea
Anis A. Bhati1, Prof. M. R. Shahade 2
Download Here
14 A Review on Digital Audio Broadcasting (DAB)
Rakhshanda Sheikh1, M.S Shahade2, Himani Khokle3 , Kalyani pachare4
Download Here
15 Review Paper on Defending Against Insider Threat
Aniruddha R. Chaudhari1, Onkar V. Chandure2, Ashish V. Thakre3, Punam D. Chintkuntlawar4
Download Here
16 REVIEW PAPER ON SECURITY IN DATABASE: THREATS AND CHALLENGES
Ashish V. Thakare1, Onkar V. Chandure2, Punam D. Chintkuntlawar3, Aniruddha R. Chaudhari4
Download Here
17 TCP/IP Attacks, Defenses and Security Tools
Suraj Bakade1, Onkar chandure2
Download Here
18 Review paper on Mechanism of identifying and extracting data by using clipboard
Monika Raut1, Onkar V. Chandure2, Shriya Thakre3, Shweta Lakhapati4
Download Here
19 Review Paper on Insider Threat: Outline for Characterizing Impact on System
Punam D. Chintkuntlawar1, Onkar V. Chandure2, Gourav D. Chintkuntlawar3, Akshay M. Aglawe4
Download Here
20 Review paper on Key Role of Network Security in Emerging Network
Rohini M. Aglawe1, Onkar V. Chandure2, Prajakta S. Kamble3, Akshay H. Deore4
Download Here
21 WIRELESS LAN SECURITY
Chetan Kamble1, Prof .S .L .Thombare2
Download Here
22 A Review On GSM Based Home Security
Sujata Ingle1, S.L.Thombare2, Shubham Deshmukh3 , Monika bora4
Download Here
23 A Review On TCP/IP Protocol
Priya Nimkar1, S.L.Thombare2, Sushant Polkat3, Apurva Wankhade4
Download Here
24 Wireless Sensor Networks (WSNs)
Akshay Manwar1, Prof. S.L.Thombare2
Download Here
25 OCULUS RIFT
AyuriLimje1, Swapnil Bamb2, Nikita Uyyalwar3, Akshay Nimbokar4
Download Here
26 Ethical Hacking
Vivek D.kamdi1, Jayesh Bodkhe2, Chetan Ghyar3 , Aniket Malode4
Download Here
27 TITLE: A REVIEW ON FAST AND SECURE PROTOCOL
Rakhi Gondchar1, Prof. M.R.Shahade2, kundan sardar3,manas mitra4
Download Here
28 A Review Implementation of System Application Product (SAP) Materials Management (MM-Module) for Material requirement planning (MRP) in Sugar Industry
Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3
Download Here
29 TITLE: DEVELOPMENT OF ORGANIZATIONAL WEBSITE
Panakj D. Mulchandani1, Prof. M. R. Shahade2, Tushar B. Dhore3 , Prof. Rajesh D. Dahiwade4
Download Here
30 ANALYSIS OF VIRTUAL NETWORK COMPUTING FOR ACCESSING PC ON MOBILE SCREEN
Nainsi A. Raut1, Prof. S. L. Thombare2
Download Here
31 Review Paper on Introduction to Jamming Attack s and Prevention Techniques using Honey pots in Wireless Networks
Neha D. Khodve1, Komal G.Purohit2,
Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3
Download Here
32 SQL Injection
Aishwarya Kawar1, Jagruti Wnakhade2
Download Here
33 SECURED SOCKET LAYER TECHNOLOGY
Vaishnavi Koshatwar1,Asst,prof. Makarand Shahade2, Rohit Chintawar3,Aditya Pande 4
Download Here
34 Agriculture Using Cloud Computing and IOT
Prof. Ruchita A. Kale1, Prof. Yogita S. Alone2, Prof. Archana B. Pahurkar3, Prof. Yugandhara V. Dhepe4
Download Here
35 Detection of Sybil attack in Wireless network using through IDS
Damayanti R. Karale, Dr. Vilas M. Thakare, Dr. Swati S. Sherekar
Download Here
36 Security techniques for Wireless Neural Networks using Soft Computing and Artificial Intelligence
Varad A. Sarve, Dr. Swati S. Sherekar, Dr. Vilas M. Thakare
Download Here
37 Ontology Based Web Image Search
Ms. Arpita S. Baheti1, Dr. Sujata N. Kale2, Dr. Vilas M .Thakare3
Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3
Download Here
38 EMOTION DETECTION THROUGH FACIAL EXPRESSION
Miss B. S. Sawane1, Dr. V. M. Thakare 2, Dr. S. S. Sherekar3
Download Here
39 Network Security Using Linear Network
Amol G. Nasre1, Dr. Swati S. Sherekar2, Dr. Vilas M.Thakare3
Download Here