Menu

Category: Volume2_Issue1

PAGE RANKING BASED ON COMBINING TAG AND VALUE SIMILARITY

Pawan Kote , Saurabh Munde , Vikas Jagadale , Chaitali Thakur Prof.Supriya Bhosale5 Read Documents

Reversible Data Hiding system for Encrypted Image by Reserving Room

Chaitrali Chormale , Prof. R. B Singh Read Documents

Fast Image Segmentation Using Fixation Method

Sagar Kajale , Nitesh Sawant , Sagar Pawar , Vishal Walunj Read Documents

PREVENTION AND DETECTION OF SQL INJECTION ATTACK AND INTRUSION (USING PATTERN MATCHING ALGORITHM)

Abhilasha Kumari ,Pooja Jambhale , Pragati kakade , Avinash kharade Read Documents

Secure intrusion and detection system for detection and localization of multiple spoofing attacks.

Sayali Hire , Nikita Chitnis ,Radhika Umrani , Sakshi Khanna , Prof Supriya Bhosale Read Documents

Efficient Two-Server Password-Only Authenticated Key Exchange in Cross Domain

Kirtee Chaudhari , Priya . Chopade ,Veena Dhumal , Disha Gawade , Seema Shabadi Read Documents

Image Fusion using Wavelet Transform for Telemedicine

Patil Hanmant Venketrao1 , Dr. S. D. Shirbahadurkar Read Documents

AN APROACH TO HETEROGENEOUS DATABASE MIGRATION

Vaghole Pandharinath,Patil Kiran , Gaikwad Shilpa , Shinde Shrinath Read Documents

Privacy Protection in Personalized Web Search

Guided By SharmilaChopade Read Documents