+91- 8971640053 RATE2017@tjohngroup.com

Conference Proceedings

1. Android Application Based Automation for Sales Organization

Authors- Manoj A. Patil, Aishwarya Ashtekar, Nikita Jadhav, Namrata Patil, Radhika Bhosale

Full Text

2. Comparative Study of Decision Tree and Neural Network for the Analysis of Diabetes Data

Authors- Gauri D. Kalyankar, Shivananda R. Poojara, Nagaraj V. Dharwadkar, Manoj A. Patil

Full Text

3. IOT Based Waste Management Using Smart Dustbin

Authors- Amrutha  P VChaithra B NKavyashree D RPooja  S KumarChethan M S

Full Text

4. Privacy For Location Based Services

Authors- Chaitanya S A, Samarth P Shenoy, Supritha R Maiya, Suryanidhi D, Dr. Mohan H S

Full Text

5. Information and Communication Technology in Education: Disruptive Innovation

Authors-Dr. P. PandarinadhDr. M. Vinaya Babu, K. Narendra Kumar

Full Text

6. Association Rule Mining Using Genetic Algorithm

Authors-Ms. Angarkar Sharwari. S

Full Text

7. Image Encryption Using Enhanced LSB Technique

Authors-K Chetan Sastry, Manjunath Kulkarni, Varun Kumar

Full Text

8. Kisan Rakshak: An Android Application for Identifying the Vegetables Diseases

Authors-Akhilesh B.M, Pavan Kumar B, Prof. Shrikant Pujar

Full Text

9. Smart Intrusion Detection System for Home Security

Authors-V. Gayathri, Malatesh S H

Full Text

10. Multimedia Data Hiding in Video Using Selective Bit Technique

Authors-Harshitha H.P, Navya R Kumar, Sindhu N, Uthpala S, Darshan K R

Full Text

11. ASF: An Authenticated Security Framework Protecting Routes and Data in MANETs

Authors-Pavan Guptha T H, S Deekshitha, Samarth B, Sushma C

Full Text

12. An Android Application for Authentication by Learning User Biometric Behavior

Authors-A Saipriya, Aduri Manasa, Chaithra C, S M Amurtha

Full Text

13. Comparative Assessment of Protocols used for Low-Power Mechanisms in WSNs

Authors-Kevin Devasia

Full Text

14. SecRBAC: Secure Data in the Clouds

Authors- Chaitra R, Menaka A

Full Text

15. Smart and Secure Exam Management System for Mobile Learning Environment

Authors- Prashant Jha, Santosh Kumar Pandey, Sayantika Deb, Trisha Chandra

Full Text

16. Conjunctive Multi Keyword Search Security Model with Proxy Re-Encryption Function in E-Health Clouds

Authors- Megha C S, Samhitha M, Subramani M, Vinod Shivram, Annie Sujith

Full Text

17. IOT Based Monitoring and Smart Planning of Urban Solid Waste Management

Authors- Abhishek Kumar Singh, Chethan kumar M, Reshma  S, Shwetha G H, Rajashekhar BS

Full Text

18. Involuntary Exclusion of Unnecessary Packets for Smart Terminals in Wireless LAN Environments

Authors- Srinivasa H P, Dr. Kamalesh V N

Full Text

19. Traffic Clearance System for Ambulance Services

Authors- Farheen Taj, Hafsa Nazia, Jaishmi Balakrishnan, Keerthi .G

Full Text

20. Executing Disaster Recovery Plan using Site Recovery Manager

Authors- Vishnu Vardhan Rallabhandi, Menaka. A

Full Text

21. Improving capacities of Fault Tolerance in Virtual Machine in Cloud

Authors- Shameer Basha K.R, Menaka

Full Text

22. Performance Evaluation of a Metropolitan Air Pollution Sensing System Based on Prototype Design

Authors- Rajesh N S, Ramakrishna E, Sandeep Kumar P, Venkatesh M, P Bindhu Madhavi

Full Text

23. Smart Art Gallery

Authors- Uday Kant Thakur, Sindhu R, Nivedita P, Ms. Annie Sujith,  Auston Pramodh Barboza

Full Text

24. Fusion Drowsiness Detection System

Authors- Asmita Deshmukh, Usha Verma

Full Text

25. Centralized Logging, Backup & User Management

Authors- Swapnil Pawar, Pratik Deshmukh, Sandhya Mhetre, Megha Anuse, Vaishnvi Pujari

Full Text

26. Density Based Traffic Monitoring System Using IOT Technology

Authors- Varsha Rabde, Mayuri Kharge, Priyanka Mane, Shubhashri Salunkhe, Anupama K. Ingale

Full Text

27. Performance Evaluation And Throughput Maximization Of Wireless Sensor Networks: Survey

Authors- Annie Sujith, Manjusha Kulkarni, Dr. D. Ramya Dorai

Full Text

28. Interfacing of MATLAB with Arduino for Face Recognition

Authors-Kiran R, M Lohith, Yogesh E, Sai Kumar A, Anitha J

Full Text

29. Impact Review on IoT, Applications and Avenues through Big data Analytics for Avoiding Possible Attacks

Authors- Manjusha Kulkarni, Annie S

Full Text

30. Identifying the Behavior of the Dogs Using Their Barks

Authors- T. Raj Kumar

Full Text

31. Detection of Intrusion through Big data Analytics for Wireless Sensor Networks

Authors-Anitha J, Anil Kumar B

Full Text

32. Smart Trash Can

Authors-Suraj Mandal, Twinkle Agarwal, Tanisha Raj, Vivek Kumar Anand

Full Text

33. Assessment of Security Challenges and Remedies in IoT Applications

Authors-Upasana Hebbar, Saniya Sultana, Mrs. Annie Sujith

Full Text

34. Intelligent Poly House Environment Monitoring System using Intel Galileo and Sensor Network Based on IOT

Authors- Ajith G.S, Lisha Varghese, Girija M.G, Anjusha P.S

Full Text

35. Protection of Solitude and Encroachment on the Avoidance for Sharing the Medical Data Based on Cloudle

Authors- Uzma Tabassum, Sudarshan .N, Manuswani.V, Bhavya Javagal

Full Text

36. Bursting of Service-Based Applications Efficiently in Hybrid Clouds

Authors- Navya Uppar, Indudhar B H, Pratheek, Mamatha K

Full Text

37. Comfort Analysis by Monitoring the Individual Indoors

Authors-Ramasubramanian Raghavan Karthik

Full Text

38. A Study on Sparse Subset Sum Using Homomorphic Encryption

Authors-Bokobri Lekpeli Koissy Franck Olivier, C.Umarani

Full Text

39. Why Is Selenium The Most Sought After Automation Testing Tool? – A Study

Authors-Parvathy. S

Full Text

40. Multi Keyword Ranked Search for Preserving Privacy in Cloud Computing

Authors-Bhavya N Javagal,Nidhi, Shivam Panwar, Rizwan Shariff, Arpan Das

Full Text

41. A study on applying Reinforcement learning in Intrusion Detection and Prevention System

Authors-R. Arunraj, C. Umarani

Full Text

42. Song Shuffler Based on Automatic Human Emotion Recognition

Authors-Vinod Unnikrishnan

Full Text

43. Use of Raspberry Pi to Aggrandize Smart Homes

Authors-Bhavya N Javagal, Shabreen Taj, Vishrutha V Herle

Full Text

44. Personage-Drone interaction using Emotional Encoding

Authors-Roselin K John, Varada Venugopal, Manjusha K Gowda, Ridhi Patel

Full Text

45. Performance Analysis of WMSN Based on Distinct Quality Based Routing Protocols

Authors-Dr. P. Bindhu Madhavi

Full Text

46. An Approach for Detecting Black Hole Attack in AODV Routing Protocol for MANETs

Authors-Vijayashree V, Nisha C P, Suma R, Dr. Siddaraju B

Full Text

47. Study on Forensic Investigation in Cloud computing using VM Snapshots

Authors-Vikas S V, C. Umarani

Full Text

48. A Survey on Identity and Access Management

Authors-Shreyas Kanna, C. Umarani

Full Text

49. Family Location Tracking Application Based on Android Platform

Authors-Janet Philip, Amit Tonshal, Akhil Kumar S, Dr. Mahesh T R

Full Text

50. Smart Home Automation using Sensors

Authors-Poonguzhali.E, Sindhu S, Safna P P, Chaitra R. P

Full Text

51. A Novel Approach for Energy Efficient Clustering Cooperative Zone Based Routing Protocol in Wireless Sensor Networks

Authors-Suchithra S, Sathya A, Sowmya B, Suma R, Srinivasa HP

Full Text

52. Smart Recipe Application for all your Culinary Needs

Authors-Shajan Jacob, Qubin Jose, Sadique Ali Khan, Jabez V, Sejal Nimbhorkar, Maria John

Full Text

53. Stress Detection and Management using M-Health System

Authors- Monica Sneha, Nandhini M, Prof Ashwini Patil

Full Text

54. Smart Medication System For Elderly Care

Authors- Archana M,Aishwarya A,Megha M ,Ashwini Patil

Full Text

55. A Survey on Different Classification Techniques Used in Opinion Mining for Online Reviews

Authors- Poornima S, Shency Roy

Full Text

56. Survey on Area Based Routing Protocols WSN

Authors-Dr M. Nagendra, Dr P. Bindhu Madhavi

Full Text

57. Home Automation Using IOT

Authors-Deepak M.C, Harsha H.C, Kanishka P, Afshan Inhas, Harish Naik

Full Text

58. Pattern Recognition and Classification of Indian Herbal Leaves

Authors-Kashif Akhtar, Kiran Singri, Divyashree P, Monika Banerjee, Roopashree S

Full Text

59. Indian Herbal Leaf Identification using Artificial Intelligence Approach

Authors- Roopashree S, Anitha J

Full Text

60. Sentiment Embeddings with Applications to Sentiment Analysis

Authors- Divya M, Gagana M, Lakshmi H S, Neha D M, Sharath P C

Full Text

61. Computing Rescue Wings using Online & Offline Service Support for Disaster Rescue

Authors- Anam Ubaid, Rafiya Anjum, Samer Zehra, Syed Muzammil, Suma R

Full Text

A Survey on Monitoring and Controlling Home Devices IoT

Authors- Aishwarya Gowda. H B, Punita.A, Vijayashree M.R, Arun Kumar.N

Full Text

63. Real Time Audio Broadcast Application

Authors- Abdul Mateen, Abhilash C, Abhishek K, Arun N, Srinivasa H P

Full Text

64. Efficient Attribute Based Encryption using File Hierarchy scheme in Cloud Computing

Authors- Navya N P, Ramya  B, Swetha V S, Tejaswini J,Sebin Joy, Susan George

Full Text

65. Analysis of Real Time Twitter through Opinion Mining

Authors- Anaswara Elizabeth, Anushree K.U, Lisna C.H,Lalitha.M, Sejal N

Full Text

66. Access Control in Cloud Computing through Simple, Secure and Efficient Hierarchical Key Assignment

Authors- Syed Ashhar Fazal, Sandeep Kumar Sharma, Rakesh Kumar Ranjan, Shridevi Desai.

Full Text

67. Deduplication of Data with DOM

Authors- Ayain John, Shruthi S, Silpa , Rashique, Vipul Viswanath

Full Text

68. Secure Storage of Data in Cloud Based Social Networks

Authors-A. Praveena, Dr. S. Smys

Full Text

69. A Transforming Framework for Web and Mobile Applications

Authors-R. Deepika

Full Text

70. Smart Tool Kit For Visually Impaired People

Authors-Aishwarya Sudhindra, Aptha H C, Hemanth Pratap, Indu N

Full Text

71. Design and Development of a novel Intelligent Shopping Cart

Authors-Shilpa Shree. L

Full Text

72. MicroApp: An end-user Environment to Generate Pervasive Mobile Applications

Authors- Nadine V Alexandrine, Ramkesh, Nandeesh, Punit Gupta, Dr. D Ramya Dorai

Full Text