+91 9975783998
ceditor@iejrd.com

Current Issue

SR NO
TITLE
AUTHOR'S
PAGE NO'S
DOWNLOAD
1
SECURED PHOTO SHARING IN WEB TECHNOLOGY
Narendra. M. Jathe
1 to 6
2
THE NEXT GEN INTRUCTION PREVENTION SYSTEM FOR WIRELESS LAN
S. V. Athawale,Dr .M. A. Pund
1 to 6
3
ANALYSIS AND DESIGN OF PREDICTION SYSTEM FOR NOISE POLLUTION USING MACHINE LEARNING - A REVIEW
Mr. Abhijeet Ganpat Khadke, Dr. G. R. Bamnote, Prof. S.W. Ahmad
1 to 7
4
OPEN SOURCE INTELLIGENCE AND TECHNIQUES FOR PASSIVE RECONNAISSANCE IN LINUX ENVIRONMENT
Prof. Vinit A. Sinha
1 to 7
5
SMART ELECTRIC BILL PREDICTOR
Mayuri P.Deshmukh, Mr. Kuldeep Ratawa, Siddhant S. Dandale
1 to 4
6
PERFORMANCE COMPARISON OF RULE BASED CLASSIFIER: JRIP AND DECISIONTABLE USING WEKA DATA MINING TOOL ON CAR REVIEWS
Dr. S. R. Kalmegh,Mr. S. A. Ghogare,
1 to 5
7
SURVEY OF RECENT TRENDS IN BLOCKCHAIN TECHNOLOGY
Nilima V. Pardakhe, Dr. Vaishali M. Deshmukh
1 to 7
8
AN OVERVIEW OF CYBER FORENSIC APPROACHES FOR CYBER SECURITY AND DATA SECURITY
M. G. Tingane, M. S. Ali, A. P. Bhagat
1 to 10
9
MERGING AI WITH BLOCKCHAIN FOR SECURE ENVIRONMENT FOR DATA SHARING
Ms. Yogita S. Alone,Dr. G.R.Bamnote
1 to 6
10
AN OVERVIEW AND APPROACH FOR HYBRID IMAGE ENCRYPTION AND COMPRESSION
Prof. Kalyani H. Deshmukh, Prof. Pratik S. Deshmukh
1 to 8
11
SURVEY OF ASSISTIVE TECHNOLOGY FOR THE VISUALLY IMPAIRED AND BLIND PERSONS
Gaurav B. Saboo, Ankush R. Deshmukh, Sumedh P. Ingale
1 to 4
12
THE ANALYSIS OF USER BEHAVIOUR IN WEB APPLICATIONS AND NETWORK SECURITY
Miss.R.S.Maldhure, Dr . S. S. Sherekar, Dr. V. M. Thakare
1 to 8
13
A PRACTICAL APPROACH SCHEMA OF PRIVACY PRESERVING IN DATA STREAMS
Miss A.G.Raut, Dr . S. S. Sherekar, Dr. V. M. Thakare
1 to 6
14
A NEW APPROACH FOR SOCIAL MEDIA NETWORK PRIVACY PROTECTION USING DATA MINING
Ms. P.S.Khorgade, Dr . S. S. Sherekar, Dr. V. M. Thakare
1 to 6
15
RFID BASED INDOOR TRACKING SYSTEM
Prof Anand Chaudhari, Shreyash Bhoyar, Kaushik Bhorjar
1 to 5
16
A SYSTEM TO DETECT ANOMALY IN LIVE FEED OF AUTONOMOUS DRONE SURVEILLANCE USING COMPUTER VISION APPROACH
Sachin S. Deshmukh,Dr. M. S. Ali, Dr. D. G. Harkut, Vikram M. Kakade
1 to 6
17
DECENTRALAND – A BLOCKCHAIN BASED MODEL FOR SMART PROPERTY EXPERIENCE
Prof. A. A. Chaudhari, Disha Laddha, Madhulika Potdar
1 to 5
18
MULTI ACCESS EDGE COMPUTING TECHNOLOGIES FOR HETROGENEOUS INTERNET OF THINGS
Prof. Ankur S. Mahalle, Prof. Snehal H. Kuche, Prof. M.A.Deshmukh
1 to 4
19
DESIGN OF MODEL FOR DATA SECURITY IN CLOUD COMPUTING ENVIRONMENT
Himanshu Kale, Pravin Nerkar, Rupesh Hushangabade
1 to 5
20
A NOVEL APPROACH TO ARTIFICIAL INTELLIGENCE FOR EFFECTIVE KIND OF CYBER SECURITY
Gaurav K. Wadnere, Aditya O. Sable, Smeet D. Thakur
1 to 5
21
ADAPTIVE COMPUTER STRATEGIES IN GAME PLAYING USING ARTIFICIAL INTELLIGENCE
Rupesh Hushangabade,Sneha Kalbande, Noopor Yawale
1 to 5
22
SOCIAL MOBILE ANALYTICS CLOUD- AN INTRODUCTION
Dr. Sumera W.Ahmad, Dr.G.R.Bamnote, Dr.Mohammad Mujahid Iqbal
1 to 8
23
STUDY OF VARIOUS IMPLEMENTED APPROACHES FOR RUMOUR DETECTION OVER SOCIAL MEDIA PLATFORM
Mrs.Shital.M.Mohod, Dr.SwatiS.Sherekar, Dr.V.M.Thakare
1 to 6
24
THE RISKS AND LIMITATIONS OF SECURITY MECHANISMS ON IOT ENVIRONMENTS
Ms. Shilpa B. Sarvaiya, Dr.Swati S.Sherekar, Dr.V.M.Thakare
1 to 7
25
ANALYSIS ON CREDIT CARD FRAUD DETECTION TECHNIQUES BY MACHINE LEARNING APPROACH
Miss. Prajakta Sukhdeve, Prof. M. M. Bartere
1 to 5