SR.NO. | TITLE | DOWNLOAD |
1 | MODULAR OBJECT ORIENTED DYNAMIC LEARNING ENVIRONMENT (MOODLE)
Rahulkumar R. Singh1, Prof. Ankush patil2, Samiksha B. pardhi3, Mayuri p. Solanke4 |
Download Here |
2 | AN EVOLUTION OF OPEN SOURCE E-LEARNING PLATFORMS TRESSING ADAPTATION ISSUE
Umer Khan1, A. D. Patil2, Tushar Shivankar3 , Pallavi Narwade4 |
Download Here |
3 | A REVIEW ON VERY FAST DECISION TREE (VFDT) ALGORITHM ON HADOOP
Harshit Kadhao1, Dr. A. D. Raut2, Nutan Nichat3 |
Download Here |
4 | A Review on Analysis and Implementation of an Ajax-enabled Web Crawler
Mukesh Bhandarkar1, Dr.Atul Raut2,Pooja Gokhare3,Nayan Dhawale4 |
Download Here |
5 |
A Review On Data Migration Ecosystem for Big Data
Nayan Dhawale1, Dr.Atul Raut2, Mukesh Bhandarkar3, Pooja Gokhare4 |
Download Here |
6 | A REVIEW ON DATA SECURITY IN HADOOP DISTRIBUTED FILE SYSTEM Nutan Nichat1, Dr. A. D. Raut2 , Harshit Kadhao3 |
Download Here |
7 | A Review On Big Data Performance Evaluation Analysis Using Apache Pig Pooja Gokhare1, Dr. A. D. Raut2, Mukesh Bhandarkar3,Nayan Dhawale4 |
Download Here |
8 | Review Paper on Insider Threat: Outline for Characterizing
Impact on System
Anagha M. Pawar1, Jagruti S. Wankhade2 , Shivraj N. Borkar3 |
Download Here |
9 | A REVIEW ON:BILL OF MATERIALS Arpit Tiwari1, Prof. J. S. Wankhade2 |
Download Here |
10 | A REVIEW ON: NORMALIZATION Vinod Devatale1, Prof. J. S. Wankhade2 , Virendrakumar Zode3 |
Download Here |
11 | A REVIEW ON HAWK-EYE TECHNOLOGY Aishwarya Pathak1,Prof K. G. Purohit2, Ashish Thakre3, |
Download Here |
12 | A Review on Hadoop Distributed Computing Clusters for Fault Prediction
Piyush Raike1, Prof.K.G.Purohit, Niraj Patharkar3 ,Shubhank Deshmukh4 |
Download Here |
13 | HTML 5: Survey and Idea
Anis A. Bhati1, Prof. M. R. Shahade 2 |
Download Here |
14 | A Review on Digital Audio Broadcasting (DAB)
Rakhshanda Sheikh1, M.S Shahade2, Himani Khokle3 , Kalyani pachare4 |
Download Here |
15 | Review Paper on Defending Against Insider Threat
Aniruddha R. Chaudhari1, Onkar V. Chandure2, Ashish V. Thakre3, Punam D. Chintkuntlawar4 |
Download Here |
16 | REVIEW PAPER ON SECURITY IN DATABASE: THREATS AND CHALLENGES
Ashish V. Thakare1, Onkar V. Chandure2, Punam D. Chintkuntlawar3, Aniruddha R. Chaudhari4 |
Download Here |
17 | TCP/IP Attacks, Defenses and Security Tools Suraj Bakade1, Onkar chandure2 |
Download Here |
18 | Review paper on Mechanism of identifying and extracting data by using clipboard
Monika Raut1, Onkar V. Chandure2, Shriya Thakre3, Shweta Lakhapati4 |
Download Here |
19 | Review Paper on Insider Threat: Outline for Characterizing
Impact on System Punam D. Chintkuntlawar1, Onkar V. Chandure2, Gourav D. Chintkuntlawar3, Akshay M. Aglawe4 |
Download Here |
20 |
Review paper on Key Role of Network Security in Emerging
Network Rohini M. Aglawe1, Onkar V. Chandure2, Prajakta S. Kamble3, Akshay H. Deore4 |
Download Here |
21 | WIRELESS LAN SECURITY
Chetan Kamble1, Prof .S .L .Thombare2 |
Download Here |
22 | A Review On GSM Based Home Security Sujata Ingle1, S.L.Thombare2, Shubham Deshmukh3 , Monika bora4 |
Download Here |
23 | A Review On TCP/IP Protocol
Priya Nimkar1, S.L.Thombare2, Sushant Polkat3, Apurva Wankhade4 |
Download Here |
24 | Wireless Sensor Networks (WSNs)
Akshay Manwar1, Prof. S.L.Thombare2 |
Download Here |
25 | OCULUS RIFT
AyuriLimje1, Swapnil Bamb2, Nikita Uyyalwar3, Akshay Nimbokar4 |
Download Here |
26 | Ethical Hacking
Vivek D.kamdi1, Jayesh Bodkhe2, Chetan Ghyar3 , Aniket Malode4 |
Download Here |
27 | TITLE: A REVIEW ON FAST AND SECURE PROTOCOL
Rakhi Gondchar1, Prof. M.R.Shahade2, kundan sardar3,manas mitra4 |
Download Here |
28 | A Review Implementation of System Application Product (SAP) Materials Management (MM-Module) for Material requirement planning (MRP) in Sugar Industry
Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3 | Download Here |
29 | TITLE: DEVELOPMENT OF ORGANIZATIONAL WEBSITE Panakj D. Mulchandani1, Prof. M. R. Shahade2, Tushar B. Dhore3 , Prof. Rajesh D. Dahiwade4 |
Download Here |
30 | ANALYSIS OF VIRTUAL NETWORK COMPUTING FOR ACCESSING PC ON MOBILE SCREEN
Nainsi A. Raut1, Prof. S. L. Thombare2 |
Download Here |
31 | Review Paper on Introduction to Jamming Attack s and Prevention Techniques using Honey pots in Wireless Networks
Neha D. Khodve1, Komal G.Purohit2, Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3 | Download Here |
32 | SQL Injection
Aishwarya Kawar1, Jagruti Wnakhade2 |
Download Here |
33 | SECURED SOCKET LAYER TECHNOLOGY
Vaishnavi Koshatwar1,Asst,prof. Makarand Shahade2, Rohit Chintawar3,Aditya Pande 4 |
Download Here |
34 | Agriculture Using Cloud Computing and IOT Prof. Ruchita A. Kale1, Prof. Yogita S. Alone2, Prof. Archana B. Pahurkar3, Prof. Yugandhara V. Dhepe4 | Download Here |
35 | Detection of Sybil attack in Wireless network using through IDS Damayanti R. Karale, Dr. Vilas M. Thakare, Dr. Swati S. Sherekar |
Download Here |
36 | Security techniques for Wireless Neural Networks using Soft Computing and Artificial Intelligence
Varad A. Sarve, Dr. Swati S. Sherekar, Dr. Vilas M. Thakare |
Download Here |
37 | Ontology Based Web Image Search
Ms. Arpita S. Baheti1, Dr. Sujata N. Kale2, Dr. Vilas M .Thakare3 Ghanika Funde1, J.S.Wankhede2, Kiran Garghate3 | Download Here |
38 | EMOTION DETECTION THROUGH FACIAL EXPRESSION
Miss B. S. Sawane1, Dr. V. M. Thakare 2, Dr. S. S. Sherekar3 |
Download Here |
39 | Network Security Using Linear Network
Amol G. Nasre1, Dr. Swati S. Sherekar2, Dr. Vilas M.Thakare3 |
Download Here |