Papers Of Computer Technology and IT Department
Paper Id |
Paper Authors |
Paper Title |
CT101 | Aishwarya Surya,Aishwarya Gharde, Deepali Thakare,Utkarsha Barapatre | A REVIEW PAPER ON AN MICRO IMAGE REAL REVERSIBLE OPTICAL REPRODUCTION |
CT102 | Jyoti Rao,Dr. Vikram Patil | Cheating Prevention inVisual Cryptography Scheme using Two Factor Hybrid Codebook |
CT103 | Minal Chandurkar, Pooja Gaikwad , Snehdeep Thakare , Saurabh Kurhade | Text Mining based Web-Crawling and Search Optimization Techniques |
CT104 | Kishan Kumar, Priyanka Dhole, RipunjayTamuli, HarshaTathode, SaurabhiDadwe | Resilient Identity Crime Detection |
CT105 | Jeevantika Lingalwar,Kajal Choudhary,Palak Agrawal,Aboli Patil4 | Data Warehousing and Data Mining |
CT106 | Surbhi Deshmukh,Shweta Rathi,Shilpa Kedia | CITY NEEDS |
CT107 | Mangesh Bhautkar, Aniruddha Bansod, Rakesh Rangari,Abhinav chadrakar | LAPDROID |
CT108 | Brijesh kumar, Mahesh Gupta, Hitesh Kumar, M.R. Markam | DIGITAL IMAGE WATERMARKING |
CT109 | Minal U. Rajankar, Aanchal R. Ganvir, Sakshi R.Satankar, Sneha R. Naik | DECEPTIVE ANSWER PREDICTION |
CT110 | Sayali A Punse,Pallavi S Bhise, Rupali P Jambhulkar | A TRAFFIC DENSITY WITH REAL-TIME VEHICLE LICENSE PLATE DETECTION AND RECOGNITION |
CT111 | Tejaswini Kadu, Preshita Kamdi | Authentication in Smartphone using OTP |
CT112 | Akshay Gudadhe, Neha Panpaliya, Neha Tadas,Surabhi Bobade,Rewti Aglawe | A SURVEY ON EARLY DETECTION AND PREDICTION OF LUNG CANCER |
CT113 | Ashwini Thaware,Jyoti sahu,Kalyani Thakare,Shipra Khedikar,Supriya | VISUAL CRYPTOGRAPHY FOR BANKING APPLICATION |
CT114 | Yazid BENAZZOUZ,Christophe MUNILLA,Ozan GÜNALP,Mathieu GALLISSOT,Levent GÜRGEN | Cloud Based Controlling Mechanism For Android Phone Using IOT |
CT115 | Jayshree Nagpure | Android Teaching Assistant |
CT116 | Ashwini Motghare, Monali Jagtap, Puja Priyadarshini | Web-Based Disease Diagnosis Expert System |
CT117 | Asif Ansari, Amritpal Singh Thethi, Yamini Thawale, Ajit kumar Shandil, Bhagyashree pathrabhe | 4th Generation Android Security |
CT118 | Juili J.Kotangle,Supriya V.HumaneRoshani,A. BomratwarSneha, P. Narule, Aditi R. Pawar | HONEYPOTS OF SECURITY SYSTEM TO IDENTIFY BLACKHAT COMMUNITY IN NETWORK |
CT119 | Chandrashekhar W Gandhare, Gaurav V Wanjare,Sandip P Wandhare, Mohit M Deshpande | Clustering Based Feature Selection Algorithm |
CT120 | Mr. Rupesh Chhatrapal Bichwe | Consistency as a Service: Auditing Cloud Consistency |
CT121 | Mahesh Borikar, Swapnil Ghate, Shubham Lande | Stealthy Attacks in Wireless Ad Hoc Networks |
CT122 | Ashwini Awale, Rupali Kadam, Priti Kumari, Ashwini Belsare, | Design of a Cyber Security Framework for Surveillance Systems |
CT123 | Shruti Urkude, Dhanashri Galgalikar, Priyanka Ahir | AccessMe: Telnet-Based Android Application |
CT124 | SAURABH LOHE, VIKAS UDEPURE, SWATI GOTMARE | EGOVERNANCE IN PANCHAYATI |
CT125 | Surabhi S. Deshmukh, Yugandhara M. Bhoge | A SURVEY PAPER ON AUTOMATED ATTENDANCE MONITORING SYSTEM USING FACE RECOGNITION |
CT126 | Akash B. Thengre, Akshay G. Badge, Abhijeet S.Barley,Govind K. Purve, Sachin S. Wararkar | DEFECT TRACKING SYSTEM |
CT127 | Ankit Patil,Anurag Raut,Shubhanit Somkuwar,Shashank Kamble | MULTIPLE FACE ATTENDANCE SYSTEM |
CT128 | Pradhnya Bhoyar, Akshaya Wankhade, Arpit Sarode, Vicky Pagde | Blue Brain |
CT129 | Nishita. A. Thakkar, Poonam. S. Durge, Mrunal A. Munje, Mona R. Choutmal | DESIGN AND IMPLEMENTATION OF TRAVELLING SALESMAN PROBLEM USING TABU SEARCH ALGORITHM |
CT130 | Prem Thavare ,Aditya Jawatkar ,Siddharth Shete ,Nikhil Dhemre | Centralized Secured Server for Question Banking and Printing using Stegnography |
CT131 | Aniket Gavhale, Punam Pofale, Sayali Baitule, Sushil Samarth | A Review on Efficiency of K-Means Algorithm with Canopy Clustering in Hadoop |
CT132 | Shourya Dey, Pranali Bhagat, Nikita Mahakalkar,Akhil Gotmare | A Survey Paper on Profile-Based Image Recommender System for smartphone |
CT133 | Gajanan D. Bonde, Pooja U. Barwal,Sandhya Rs. Pal, Sumaiya I. Khan, Kiran Ablankar | Indoor Location Detection & An Attendance Using Wi-Fi And Smartphone |
CT134 | Abhijeet Umare Shoheb Shaikh | Utilization of central Repository in Data Warehouse Survey on Intrusion Detection System |
CT135 | Mrunal Funde,Aniket Tare,Shradha Zade,Vaishnavi Khati | Survey on Intrusion Detection System |
CT136 | Shreyasi P. Shuddhalwar,Mansi P. Shuddhalwar,Prachi Dakhole,Sonal Bharre | Modeling and Detection of Web Application Worm |
CT137 | Parveenbano Khan,Mr.Rajat Gabhne ,Shilpa Bisen,Mr.Hitesh Nirwan,Sneha Nagarkar | Sensitive Label Privacy Protection on Social Network Data |
CT138 | Mrunali vaidya, Vaibhav Bansod, Mangesh manwar | A Review on Cryptography Using Armstrong Numbers And Colors |
CT139 | Ankit Dable, Shashank Ranjan, Veena Deshmukh, Bhushan Kawale, Paritosh Nandanwar, Sonali Wakekar | Implementation of Discrete Wavelet Transform and Threshold Decomposition Driven Morphological Filter for Satellite Image Enhancement |
CT140 | PALLAVI SHUKLA, APARNA DHOTE, PRAJAKTA WATKAR,RICHA PARATE | VIRTUALIZATION TECHNIQUES |