Spvryan's International Journal of Engineering Sciences & Technology (SEST)

 

 

Sr. No.

Title

Download

1

Security Assessment of desktop-PC using cloud based AV
Sahil Sakhala, Kshitij Khakurdikar
sahils1210@gmail.com

pdf1

2

IRM: Integrated File Replication and Consistency Maintenance in cloud environment using Hadoop and map reduce Technique
Ashish R. Varma, Dr. A. K. Shrivastava

pdf2

3

Combining Natural Language Processing and Software Engineering
Dr. Prasanth Yalla, Nakul Sharma
yallaprasanth@gmail.com

pdf3

4

Off-droid Communication Network
Mr. Ganesh Namdeo Dawange, Mr. Ajay Vijay Shinde, Miss. Kaveri Prakash Gaidhani, Mr. Ganesh Nandalal Aware
ganeshdawange16@gmail.com, gaidhanikaveri@gmail.com

pdf4

5

Arithmetic Logic Unit Design using Vedic Mathematics
Avinash Patil, Y V Chavan, Sushma Wadar
apatil@aitpune.edu.in

pdf5

6

Redundancy Management of Multipath Routing for Intrusion Tolerance of Packet Loss by Malicious Node in HWSN
Mr. Digamber T. Bodake, Prof. Nilesh R. Wankhade
digambertb@gmail.com, nileshrw@yahoo.com

pdf6

7

Survey on Geographic Routing in VANET
Ms. Prajakta V. Ambekar, Prof. Nilesh R. Wankhade
Prajakta160188@gmail.com, nileshrw@yahoo.com

pdf7

8

Elevated Drop- An Efficient Drop Buffer Management Policy for DTN Routing Protocols
Abhishek Sharma, Vipin Jain, Pratipal Singh, Mukesh Gupta
abtiwari51@gmail.com

pdf8

9

Web Application Security Approach against Online Password Guessing Attacks Using CAPTCHA
Ms Rohini B. Varne, R. V. Mane
rohini_varne@rediffmail.com

pdf9

10

Iridodialysis: Open Challenges and Issues in Iris Recognition
Ms. Kavita Khobragade, Dr. K. V. Kale
kavitanand@rediffmail.com

pdf10

11

Gesture Controlled Robot Using Support Vector Machines in Real Time Environment
Nikhil More
nikhilmoreetc@gmail.com

pdf11

12

Clean Glass Approach: Improving Transparency in Software Industry
Ashish Agrawal, Malay Tripathi, Sadhana Singh, L.S.Maurya
agarwal.ashish01@gmail.com

pdf12

13

Implementation of a tool for effective selection of classification algorithm to build classifier model using WEKA
Ms. Varsha C. Belokar, Prof. Rohit Singhal
Varsha30belokar@gmail.com

pdf13

14

Implementation of Translation algorithm to generate UML diagrams from Database Modeling
Mr. Pankaj Suresh Kulkarni, Prof. Basant Verma
pankajkulkarni1985@gmail.com

pdf14

15

Sophisticated Deception Recognition Exploitation Hidden Morkov Model
Pushpak Khapke, Rahul Derle, Sandip Kote
Pushpak.khapke@gmail.com

pdf15

16

Characteristic Specific Sentiment Analysis An Innovative Thanks To Product Review
Pushpak Khapke, Krushna Borude Sandip Kote
Pushpak.khapke@gmail.com

pdf16

17

Advance Multi Exploitation And Multi Snap Shotting On Iaas Cloud Surroundings
Amol Wale, Rahul Derle, Umesh Wadnere
waleamol@gmail.com

pdf17

18

A Survey On Network Watching And Administration Victimisation Email And Humanoid Phone
Umesh Wadnere, Rahul Derle, Krushna Borude
wadnereumesh@hotmail.com

pdf18

19

Modified Image Search Supported Searchers Preference Prediction Phone
Krushna Borude, Amol Wale, Umesh Wadnere
Borude.krushna@gmail.com

pdf19

20

Advanced Fraud Detection Using Hidden Morkov Model
Pushpak Khapke, Sandip Kote, Rahul Derle
pushpak.khapke@gmail.com

pdf20

21

Feature Specific Sentiment Analysis An Innovative Way To Product Review
Pushpak Khapke, Krushna Borude, Sandip Kote
Pushpak.khapke@gmail.com

pdf21

22

Advance Multideployment and Multisnapshotting on IaaS Cloud Environments
Amol Wale, Umesh Wadnere, Rahul Derle
waleamol@gmail.com

pdf22

23

A Survey on Network Monitoring and Administration Using Email and Android Phone
Umesh Wadnere, Rahul Derle, Krushna Borude
wadnereumesh@hotmail.com

pdf23

24

Personalized Image Search based on Searchers Preference Prediction
Krushna Borude, Amol Wale, Umesh Wadnere
Borude.krushna@gmail.com

pdf24

25

Highly Developed Authentication System In 3D Environments
Pushpak Khapke, Amol Wale, Sandip Kote
Pushpak.khapke@gmail.com

pdf25

26

Review on Accurate Multiple View 3D Reconstruction Using Depth Map
Merging
Ms. Deepaly Satpute, Ms. Ranjana Shende
sdeepaly@gmail.com

pdf26

27

TuCP Nested Tunnel Header Compression with Flow Context
Swati A. Sagar, Deepali B. Gothawal
swati_sagar309@rediffmail.com

pdf27

28

Generating Automated Test Cases using Model Based Testing
Prof. Kirti Patil, Prof. M. M. Ganeshwade
Kirti.patil2004@gmail.com

pdf28

29

Privacy Preserving in Data Mining using Perturbation Technique
Vishal R. Shinde, Abhijit J. Patankar
mailme.vishalshinde@rediffmail.com

pdf29

30

Location Privacy Preservation & Monitoring Approach in Wireless Sensor Network
Mr.Rohit Kumar Singhal, Dr. Sudhir Dawra
mtechrohit@gmail.com

pdf13