Conference Proceedings
1. Android Application Based Automation for Sales Organization
Authors- Manoj A. Patil, Aishwarya Ashtekar, Nikita Jadhav, Namrata Patil, Radhika Bhosale
2. Comparative Study of Decision Tree and Neural Network for the Analysis of Diabetes Data
Authors- Gauri D. Kalyankar, Shivananda R. Poojara, Nagaraj V. Dharwadkar, Manoj A. Patil
3. IOT Based Waste Management Using Smart Dustbin
Authors- Amrutha P V, Chaithra B N, Kavyashree D R, Pooja S Kumar, Chethan M S
4. Privacy For Location Based Services
Authors- Chaitanya S A, Samarth P Shenoy, Supritha R Maiya, Suryanidhi D, Dr. Mohan H S
5. Information and Communication Technology in Education: Disruptive Innovation
Authors-Dr. P. Pandarinadh, Dr. M. Vinaya Babu, K. Narendra Kumar
6. Association Rule Mining Using Genetic Algorithm
Authors-Ms. Angarkar Sharwari. S
7. Image Encryption Using Enhanced LSB Technique
Authors-K Chetan Sastry, Manjunath Kulkarni, Varun Kumar
8. Kisan Rakshak: An Android Application for Identifying the Vegetables Diseases
Authors-Akhilesh B.M, Pavan Kumar B, Prof. Shrikant Pujar
9. Smart Intrusion Detection System for Home Security
Authors-V. Gayathri, Malatesh S H
10. Multimedia Data Hiding in Video Using Selective Bit Technique
Authors-Harshitha H.P, Navya R Kumar, Sindhu N, Uthpala S, Darshan K R
11. ASF: An Authenticated Security Framework Protecting Routes and Data in MANETs
Authors-Pavan Guptha T H, S Deekshitha, Samarth B, Sushma C
12. An Android Application for Authentication by Learning User Biometric Behavior
Authors-A Saipriya, Aduri Manasa, Chaithra C, S M Amurtha
13. Comparative Assessment of Protocols used for Low-Power Mechanisms in WSNs
Authors-Kevin Devasia
14. SecRBAC: Secure Data in the Clouds
Authors- Chaitra R, Menaka A
15. Smart and Secure Exam Management System for Mobile Learning Environment
Authors- Prashant Jha, Santosh Kumar Pandey, Sayantika Deb, Trisha Chandra
16. Conjunctive Multi Keyword Search Security Model with Proxy Re-Encryption Function in E-Health Clouds
Authors- Megha C S, Samhitha M, Subramani M, Vinod Shivram, Annie Sujith
17. IOT Based Monitoring and Smart Planning of Urban Solid Waste Management
Authors- Abhishek Kumar Singh, Chethan kumar M, Reshma S, Shwetha G H, Rajashekhar BS
18. Involuntary Exclusion of Unnecessary Packets for Smart Terminals in Wireless LAN Environments
Authors- Srinivasa H P, Dr. Kamalesh V N
19. Traffic Clearance System for Ambulance Services
Authors- Farheen Taj, Hafsa Nazia, Jaishmi Balakrishnan, Keerthi .G
20. Executing Disaster Recovery Plan using Site Recovery Manager
Authors- Vishnu Vardhan Rallabhandi, Menaka. A
21. Improving capacities of Fault Tolerance in Virtual Machine in Cloud
Authors- Shameer Basha K.R, Menaka
22. Performance Evaluation of a Metropolitan Air Pollution Sensing System Based on Prototype Design
Authors- Rajesh N S, Ramakrishna E, Sandeep Kumar P, Venkatesh M, P Bindhu Madhavi
23. Smart Art Gallery
Authors- Uday Kant Thakur, Sindhu R, Nivedita P, Ms. Annie Sujith, Auston Pramodh Barboza
24. Fusion Drowsiness Detection System
Authors- Asmita Deshmukh, Usha Verma
25. Centralized Logging, Backup & User Management
Authors- Swapnil Pawar, Pratik Deshmukh, Sandhya Mhetre, Megha Anuse, Vaishnvi Pujari
26. Density Based Traffic Monitoring System Using IOT Technology
Authors- Varsha Rabde, Mayuri Kharge, Priyanka Mane, Shubhashri Salunkhe, Anupama K. Ingale
27. Performance Evaluation And Throughput Maximization Of Wireless Sensor Networks: Survey
Authors- Annie Sujith, Manjusha Kulkarni, Dr. D. Ramya Dorai
28. Interfacing of MATLAB with Arduino for Face Recognition
Authors-Kiran R, M Lohith, Yogesh E, Sai Kumar A, Anitha J
29. Impact Review on IoT, Applications and Avenues through Big data Analytics for Avoiding Possible Attacks
Authors- Manjusha Kulkarni, Annie S
30. Identifying the Behavior of the Dogs Using Their Barks
Authors- T. Raj Kumar
31. Detection of Intrusion through Big data Analytics for Wireless Sensor Networks
Authors-Anitha J, Anil Kumar B
32. Smart Trash Can
Authors-Suraj Mandal, Twinkle Agarwal, Tanisha Raj, Vivek Kumar Anand
33. Assessment of Security Challenges and Remedies in IoT Applications
Authors-Upasana Hebbar, Saniya Sultana, Mrs. Annie Sujith
34. Intelligent Poly House Environment Monitoring System using Intel Galileo and Sensor Network Based on IOT
Authors- Ajith G.S, Lisha Varghese, Girija M.G, Anjusha P.S
35. Protection of Solitude and Encroachment on the Avoidance for Sharing the Medical Data Based on Cloudle
Authors- Uzma Tabassum, Sudarshan .N, Manuswani.V, Bhavya Javagal
36. Bursting of Service-Based Applications Efficiently in Hybrid Clouds
Authors- Navya Uppar, Indudhar B H, Pratheek, Mamatha K
37. Comfort Analysis by Monitoring the Individual Indoors
Authors-Ramasubramanian Raghavan Karthik
38. A Study on Sparse Subset Sum Using Homomorphic Encryption
Authors-Bokobri Lekpeli Koissy Franck Olivier, C.Umarani
39. Why Is Selenium The Most Sought After Automation Testing Tool? – A Study
Authors-Parvathy. S
40. Multi Keyword Ranked Search for Preserving Privacy in Cloud Computing
Authors-Bhavya N Javagal,Nidhi, Shivam Panwar, Rizwan Shariff, Arpan Das
41. A study on applying Reinforcement learning in Intrusion Detection and Prevention System
Authors-R. Arunraj, C. Umarani
42. Song Shuffler Based on Automatic Human Emotion Recognition
Authors-Vinod Unnikrishnan
43. Use of Raspberry Pi to Aggrandize Smart Homes
Authors-Bhavya N Javagal, Shabreen Taj, Vishrutha V Herle
44. Personage-Drone interaction using Emotional Encoding
Authors-Roselin K John, Varada Venugopal, Manjusha K Gowda, Ridhi Patel
45. Performance Analysis of WMSN Based on Distinct Quality Based Routing Protocols
Authors-Dr. P. Bindhu Madhavi
46. An Approach for Detecting Black Hole Attack in AODV Routing Protocol for MANETs
Authors-Vijayashree V, Nisha C P, Suma R, Dr. Siddaraju B
47. Study on Forensic Investigation in Cloud computing using VM Snapshots
Authors-Vikas S V, C. Umarani
48. A Survey on Identity and Access Management
Authors-Shreyas Kanna, C. Umarani
49. Family Location Tracking Application Based on Android Platform
Authors-Janet Philip, Amit Tonshal, Akhil Kumar S, Dr. Mahesh T R
50. Smart Home Automation using Sensors
Authors-Poonguzhali.E, Sindhu S, Safna P P, Chaitra R. P
51. A Novel Approach for Energy Efficient Clustering Cooperative Zone Based Routing Protocol in Wireless Sensor Networks
Authors-Suchithra S, Sathya A, Sowmya B, Suma R, Srinivasa HP
52. Smart Recipe Application for all your Culinary Needs
Authors-Shajan Jacob, Qubin Jose, Sadique Ali Khan, Jabez V, Sejal Nimbhorkar, Maria John
53. Stress Detection and Management using M-Health System
Authors- Monica Sneha, Nandhini M, Prof Ashwini Patil
54. Smart Medication System For Elderly Care
Authors- Archana M,Aishwarya A,Megha M ,Ashwini Patil
55. A Survey on Different Classification Techniques Used in Opinion Mining for Online Reviews
Authors- Poornima S, Shency Roy
56. Survey on Area Based Routing Protocols WSN
Authors-Dr M. Nagendra, Dr P. Bindhu Madhavi
57. Home Automation Using IOT
Authors-Deepak M.C, Harsha H.C, Kanishka P, Afshan Inhas, Harish Naik
58. Pattern Recognition and Classification of Indian Herbal Leaves
Authors-Kashif Akhtar, Kiran Singri, Divyashree P, Monika Banerjee, Roopashree S
59. Indian Herbal Leaf Identification using Artificial Intelligence Approach
Authors- Roopashree S, Anitha J
60. Sentiment Embeddings with Applications to Sentiment Analysis
Authors- Divya M, Gagana M, Lakshmi H S, Neha D M, Sharath P C
61. Computing Rescue Wings using Online & Offline Service Support for Disaster Rescue
Authors- Anam Ubaid, Rafiya Anjum, Samer Zehra, Syed Muzammil, Suma R
A Survey on Monitoring and Controlling Home Devices IoT
Authors- Aishwarya Gowda. H B, Punita.A, Vijayashree M.R, Arun Kumar.N
63. Real Time Audio Broadcast Application
Authors- Abdul Mateen, Abhilash C, Abhishek K, Arun N, Srinivasa H P
64. Efficient Attribute Based Encryption using File Hierarchy scheme in Cloud Computing
Authors- Navya N P, Ramya B, Swetha V S, Tejaswini J,Sebin Joy, Susan George
65. Analysis of Real Time Twitter through Opinion Mining
Authors- Anaswara Elizabeth, Anushree K.U, Lisna C.H,Lalitha.M, Sejal N
66. Access Control in Cloud Computing through Simple, Secure and Efficient Hierarchical Key Assignment
Authors- Syed Ashhar Fazal, Sandeep Kumar Sharma, Rakesh Kumar Ranjan, Shridevi Desai.
67. Deduplication of Data with DOM
Authors- Ayain John, Shruthi S, Silpa , Rashique, Vipul Viswanath
68. Secure Storage of Data in Cloud Based Social Networks
Authors-A. Praveena, Dr. S. Smys
69. A Transforming Framework for Web and Mobile Applications
Authors-R. Deepika
70. Smart Tool Kit For Visually Impaired People
Authors-Aishwarya Sudhindra, Aptha H C, Hemanth Pratap, Indu N
71. Design and Development of a novel Intelligent Shopping Cart
Authors-Shilpa Shree. L
72. MicroApp: An end-user Environment to Generate Pervasive Mobile Applications
Authors- Nadine V Alexandrine, Ramkesh, Nandeesh, Punit Gupta, Dr. D Ramya Dorai