A Unit of I2OR
IJRECE_H101
IJRECE_H102
IJRECE_H103
IJRECE_H104
IJRECE_H107
IJRECE_H108
IJRECE_H106
IJRECE_H109
IJRECE_H110
IJRECE_H121
IJRECE_H122
IJRECE_H123
IJRECE_H124
IJRECE_H125
IJRECE_H128
IJRECE_H132
IJRECE_H120
IJRECE_H126
IJRECE_H129
IJRECE_H130
IJRECE_H133
IJRECE_H134
IJRECE_H135
IJRECE_H136
IJRECE_H131
IJRECE_H141
IJRECE_H139
Download Paper
IJRECE_H140
Download Paper
IJRECE_H143
Download Paper
IJRECE_H144
Download Paper
IJRECE_H145
Download Paper
IJRECE_H147
Download Paper
IJRECE_H149
Download Paper
IJRECE_H150
Download Paper
IJRECE_H146
Download Paper
IJRECE_H153
Download Paper
IJRECE_H154
Download Paper
IJRECE_H155
Download Paper
IJRECE_H156
Download Paper
IJRECE_H157
Download Paper
IJRECE_H158
Download Paper
IJRECE_H161
IJRECE_H142
IJRECE_H162
IJRECE_H163
IJRECE_H152
IJRECE_H164
IJRECE_H170
IJRECE_H171
IJRECE_H172
IJRECE_H173
IJRECE_H174
IJRECE_H169
Download Paper
IJRECE_H175
Download Paper
IJRECE_H177
Download Paper
IJRECE_H178
Download Paper
IJRECE_H179
Download Paper
IJRECE_H180
Download Paper
IJRECE_H181
IJRECE_H151
IJRECE_H176
IJRECE_H181
Download Paper
IJRECE_H183
Download Paper
IJRECE_H184
Download Paper
IJRECE_H185
Download Paper
IJRECE_H187
Download Paper
IJRECE_H192
Download Paper
IJRECE_H191
IoT BASED GARBAGE MONITORING SYSTEM
Prajakta More, Shelkikar R.P.
Aircraft Tracking System Based on KLT Feature Tracker
Vishal Digambar Bodkhe
IoT Based Patient Health Monitoring System
Pratiksha Nade, R P Shelkikar
Lung Cancer Detection Using Machine Learning
Hardika Sharma, Dr. Narpat Singh Shekhawat
Car Anti-Theft System through Face Recognition using GPS & GSM Module
Snehal Deshmukh, Pranali Devade, Sayali Gadhave, Gayatri Lahamge, Prof.S.A.Hadke
When is P2P Technology Beneficial for IPTV Services?
Gagandeep Singh, Vivek Kumar, Mandeep Kaur, Er. Charanjeet Kaur, Sangeeta
EFFICIENT DETECTION OF BLACK HOLE ATTACKS IN MANETS USING MACHINE LEARNING TECHNIQUES AND NETWORK DYNAMISM | Mohammed Shabaz Hussain, Khaleel Ur Rahman Khan
Detection and Prediction of Rumor Microblogs from Social Networks using Ontology
Abdul Rahiman, Syed Abdul Sattar
Survey Paper Organ Donation Web Application using Block Chain Technology
Prishita Pandey, Aishwarya Padwalkar, Snehal Malusare, Shreeya Waghmare, Prof. Neha Jamadar
Survey on Intrusion Detection System using Machine Learning Approaches
Bhargavi.A, Bhuvaneswari. I, Sushma. J, Chaitanyaharsha. K
Machine Learning Methods for Analysis Fraud Credit Card Transaction
Mr. M Srikanth, Sailaja. B, Krishnaharika KSLM, Sivajyothi. A, Trinadh. K
An Effective Shortest-Path Assistance Reverse Weight Routing over Multi-hop Wireless Network
Chennakesavarao. M, Ramya. A, Nagalakshmi. G, Jayanth. D, Naga Swathi Vishnu .I
An Enhanced Intelligent Intrusion Detection System using Machine Learning
GuruLakshmi .M. V, ShamaKousar. SkI, Sowjanya. P, Teja. Y
Image Classification Using Deep Learning Methodologies
Bellamkonda.Divya, Kandimalla.Bhavya, Koppula.Aruna Kumari, B.V.G.S.Bharath
Analytical Study of Big Data Using Data Analytics in Highly Developed Education Applications
Dogbe Komlan Florient, Ruchika Chandel, Dr. Raman Chadha
Improved Selfish node Detection By AODV with Convex Optimization Approach
Sumiti
An efficient aproach for load balancing on cloud using hybrid method
Gurpreet Kaur, Shivani Ahuja
The Multi – Model Approach for the Detection of Sybil Attack In VANET Using Distance Parameter
TAJINDER SINGH, DR.NAVEEN DHILLON, ER. JASPREET KAUR
Review on Reduction of power loss in distribution electrical system
Puneet Saklani, Harkamaldeep Singh
Review on Reduction of power loss in distribution electrical system
Puneet Saklani, Harkamaldeep Singh
Implementing E-assessment using Open CV in ∞Exams
Dammati.Pavan Kumar, Kocherla Meeravali, Kuruguntla Reshma Reddy
Architecture and Organization of e-Assessment Cloud Solution
Dammati. Pavan Kumar, Boddu Usha Naga Alekhya, Kandhula Sindhuja
Multi-Objective Hyper-Heuristic Improved Support Vector Machines for Big Data Cyber Security
K. Susmitha, B.Manikanta Singh, J.Kiran Kumar, K. Thriven
POTENTIAL CUSTOMER DETECTION-BASED ON PURCHASE BEHAVIOUR
Sujay Thakur, Prockrti Zutshi, Raghav Mahajan, Nyein Wai Han, Mrs. P.N.Adhav
A REAL TIME CONTROLLING COMPUTER THROUGH COLOR VISION BASED TOUCHLESS MOUSE
Aviral Gupta, Dr. Neeta Sharma
Plant Leaf Disease Detection Approach Based On Color and Texture, Using KNN AND SVM
Dr. Pankaj Mohindru, Gagandeep Kaur, Dr. Pooja
A Review Paper on Pattern Recognition System and its Classification
Nassor A. Said, Aman Kumar
Synthesis of Cadmium Sulphide and its investigation for solar cell applications
Sushant Kotwal, Lakhvinder Kaur
A Survey of Point-of-Interest Recommendation in Location-Based Social Networks
B. Naveen Reddy, G. Supriya, K. Dharmateja, B. Siva KrishnA
A Smart Transportation System for Detecting Alcohol Levels and Heart Attacks during the Journey
N. Sivannarayana, Bolla. RajeswariKalyani, Bellam. Pavani, Gollapudi. Venkata Avinash, Gudluri. Anusha
Quality Based Secure Data Sharing with Efficient Revocation in Fog Computing
Dr.k. Satish, P. Venkata Naga Vasanta, Sk. Afroz, N. Aravind, S. Ramya
Survey of Modified Apriori Algorithm for Mining Frequent Item Sets
Parag Verma, Prof. Pooja Trivedi
Text Recognition using Image Processing and Translation
Prof. A.K. Gaikwad, Mayur Pabalkar, Meeraj Ansari, Saket Kolte
Analysisof Students Performance Using Modified K-Means & K-Mediods Algorithm (Machine Learning Techniques) | Aayushi Porwal, Prof. Vishal Sharma
PBSE: A Lightweight Position Based Encryption/ Decryption Algorithm for IoT
Aswathy K, Suresh Kumar N
Predicting Traffic Accidents using machine Learning Algorithms
S.Anil Kumar, A.Umadevi, K.Jyothirmai, D.Venkatareddy, K.Karthik
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment
B. Sai Lakshmi, Ch.Pavani, K.Gireesha, G. Arthi Maneesha
An Approach for Prediction of Obstructive Sleep Apnea
Punam Jagannath Desai, Prof. Dr. Amol. K. Kadam, Prof. Dr. M. S. Bewoor
A Novel Approach for Women Security with Information Fusion for Multi-Sensory Data
Priyanka K. Suryawanshi, Prof. Dr. Amol K. Kadam, Prof. Dr. S. S. Dhotre, Prof. Dr. Pramod. A. Jadhav
A Survey on “A heterogeneous data Summarization System to Generate Automatic Summary of Data using Tweeter API using Tweets, Images” | Priyanka Ravindra Wadagave, Dr. Bindu R. Garg
A Machine Learning Model for Stock Market Prediction
Pranav Bhat
Low Power Optimization of GNRFET based 2 To 4 and 4 to 16 Mixed Logic Decoders
Jyoti Rani, Vishal Anand
Diabetes Prediction Method using the Ensemble Classification
Preety, Er. Parminder Singh, Dr. Naveen Dhillon
Survey on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
S. Vamsidhar, N.Samhitha, R. Yamini, M.Likhitha, S. Manasa sri, M.Nagaraju
Secure Data Validation in Cloud Using Trusted Third Party Module
Mr.M.Ayyapa Chakaravarthi,K.Naga Preethi, K.Siva Nageswarao, I.Divya Jyothi, N.Ganesh
Prediction. Of heart disease using SVM model and KNN Model and Decision tree model
Akhand Pratap Singh, Dr. Bhupal Singh
Automatic Number Plate Detection Using Neural Networks
Deepika Rani, Pratibha, Prof. (Dr.) G.N. Verma
POTHOLE DETECTION AND MESSAGE PASSING SYSTEM
Yamini karpe, Janhavi Tarase, Pratiksha Konde, Savita Kandhare
Effective Prediction of Heart Disease using Machine Learning Approaches | Mr. Ayyapa Chakravarthi. M, Mr.B.Ramesh, S.Lakshmi Durga Bhavani, M. Dhanasri, N. Charan Ajay, M. Mallikharjuna
Improving Super Image Resolution using Convolution Neural Network | Mr.G.Pavan Kumar, Thyagarajan Sravani, Suragani Bala Venkata Ravi Teja, Ponduri Siva Venkata Anil Kumar, Thumati Pavan Kumar, Yannam Lakshmi Kalyani
Social Community Spam Detection Methodologies for Recommending Nodes
I. Sriram murthy, Veluguri varalakshmi, Nambula Veeranjaneyulu, Pendyala pushpa latha, Sanikommu venkata krishna reddy
Implementing a Model to Detect Diabetes using Machine Learning
S. Anil kumar, Netuluri venkata sneha, Nallapu neha reddy, Sanikommu Anuradha, Tangella Yaswanth sai
Automatic Number Plate Detection using Neural Networks
Navita, Ms Sonia Batra
A Security Information and Event Management System by using Cyber Security and Machine Learning
Roshani Sonawane, Yogita varma, Kiran lohakare, Pratiksha kandhare, Prof K.D.Yesugade
A Model to Measure Credibility of Information of Social Platform
Prajakta Vilas Chiddarwar, Prof. Dr. J. Naveen Kumar, Prof. Dr. M. S. Bewoor
Review on Mobile Communication by Clustering with Optimization in OFDM Channel
Aasif Mujtaba, Prof. Sunil K Panjeta
Review on Localization of Nodes in Wireless Sensor Network
Firdos Fatima, Prof. Sunil K Panjeta
Review on Enhance Underwater Images by Reducing Haziness
Asif Ahmad Andrabi, Prof. Sunil K Panjeta
Role of Artificial Intelligence in Serious Computer Games
Dr. K. Satish, K. V. P. M. Anjali, K. Kalyani, I. Durga Swetha, I. Sandeep Varma, A. Venkata Mandeep
Homomorphic Encryption Using Bio-Inspired Method
Satmeer Kaur, Inderdeep Kaur
Process Unstructured Data using Data analysis: Apache Spark and Hadoop
Adjovi Irène Sokegbe, Ayushi Nainwal
A Novel Approach to the PCBAs Defects Detection Using Background Algorithm
Daniel Katz Bonello, Yuzo Iano, Umberto Bonello Neto
A Review paper of Stylish House Applications based on Internet of Things
Ahmad Bilal zia, Ms. Kshamta Chauhan
A Review paper of well-built safety measures for distributed File System
Ajmal Faizy, Mr. Aman Kumar
A New Method For Face Recognition Using Wavelet
Lakhwinder Singh, Sumit Chopra
A Review on Big Data and Security Challenges
Er. Achharpreet Bhalla, Er. Gagandeep Bhalla
Fraud Detection in banking using Novel strategy
Ritesh Patil, Suraj Bhoyar, Abhijeet Salunke, Sumeet Bhingardive, Geeta Atkar
UNSTRUCTURED DATA SECURITY AND PROLIFERATION IN STORAGE LOCATIONS
Virgílio Mendes Fijamo, Ms. Neha Chauhan