skip navigation
International Journal of Advance and Innovative Research
Volume 7, Issue 1 (XIV): January – March 2020
Sr. No Contents Page No
1 Mobile Cloud Computing– Advantages, Challenges, and Needs
Punit Harpalani
1 – 5
2 To detect and understand brain tumor using a Soft-computing Assisted Tool
Amar Dashrath Dhuri
6 – 10
3 Cloud Cryptography
Ayesha Ansari
11 – 16
4 Testing Internet of Things
Maulik Chandan
17 – 22
5 Can Cyber Insurance Safeguard Companies from Data Privacy Breaches?
Mihir Patel
23 – 26
6 ANATOMY OF VIRTUALIZATION
Tejas Prakash Tamboskar
27 – 29
7 A Benchmark Study of Cashless Digital Applications: Paytm vs PhonePe
Mitali Kumbhani and Dr. Neelam Naik
30 – 33
8 Sentiment analysis on abrogation of article 370
Tanoop Aravindakshan and Dr. Neelam Naik
34 – 38
9 Data Security in cloud computing using encryption
Sunita Vinod Gupta
39 – 43
10 Usage analysis using PlayStore and AppStore Apps
Harshali Patil, Lavina Jadhav and Sarala Mary
44 – 51
11 Network Function Virtualization Overview, Architecture and Use-cases
Sooraj Shravan Prajapati
52 – 55
12 Should people get chip implanted under their skin?
Tvisa Manish Kadakia
56 – 60
13 Personalized Learning
Siddhi Thakkar, Rahul Rathod and Smruti Nanavaty
61 – 65
14 A Holistic Study On Effects Of Video Gaming On The Mental Health
Dhara Vara and Prashant Chaudhary
66 – 68
15 Acne Assessment and it’s Influence on Self-Esteem
Siddhi S. Kamath and Smruti Nanavaty
69 – 76
16 A Comparative Study of Current Trending Online Streaming Giants (Netflix vs. Amazon Prime)
Mayur N Jadav and Prashant Choudhary
77 - 81
17 Online System Implementation in India: Assessment of Security issues (A TRANCE ON BALLOT MORE COMPELLING THAN BULLET)
Bhakti Desai and Dr. Manisha Divate
82 – 86
18 Data Lake: A New Philosophy in Big Data Era
Shrikant Ghanshyam Pandey
87 – 90
19 A Review on Various Soft Computing Techniques in the Domain of Handwriting Recognition
Muzammil Aleem Khan
91 – 93
20 Use of Machine Learning Techniques in Digital Forensic for File Type Classification
Dr. Manisha Divate
94 – 97
21 Security Challenges and Risk Estimation for IoT- based Applications
Dr. Neelam Naik
98 – 102
22 Cloud Security and Forensics Using Apache Zookeeper
Neha Vora
103 – 107
23 Study of Strength of WhatsApp Encryption and Vulnerability Testing of Messages by Reverse Engineering
Akash Patil and Suchita Jijabrao Sonawane
108 – 112
24 Chatbots and Forensics: Risks and Opportunities
Silpa Nair and Kuldeep U. Kawar
113 – 116
25 GOING ONLINE: FROM LEATHER WALLET TO MOBILE WALLET
Dr. Deepak R. Gupta and Dr. Pooja Basu
117 – 120
26 A Study on Assessing Awareness related to Organ Donation
Vidhi Kayada and Bhupendra Kesaria
121 – 124
27 Detecting Invisible: Windows Registry Attacks
Akhilesh Vas and Milind Meshram
125 – 130
28 Overview of Web Application Security Attacks: Forensic Investigation
Needa Ashraf Petkar
131 – 137
29 Ransomware Attacks Forensic Investigation
Aditya Ramesh Ogania
138 – 146
30 Analysis of Malware in VirusTotal and risk associated with disclosure of Personal data
Tanushree Suresh Pai and Neeta Khobragade
147 – 155
31 CLOUD COMPUTING ARCHITECTURE
Sachin Maurya
156 – 160
32 A COMPARATIVE  STUDY OF CURRENT TRENDING ONLINE FOOD DELIVERY APPLICATION (i.e. ZOMATO VS. SWIGGY)
Aamina Qureshi and Prof. Rajesh Maurya
161 – 164
33 FAKE NEWS DETECTION, TECHNOLOGY: BLOCKCHAIN
Priya Shah and Neelam Naik
165 – 169
34 A COMPARATIVE STUDY OF SINGLE INVESTMENT OPTION AND DIVERSIFICATION OF PORTFOLIO
Akash Kale and Prashant Chaudhary
170 – 173
35 VIRTUAL REALITY THERAPY FOR TREATMENT OF PHOBIA
Yashvi Mehta and Smruti Nanavaty
174 – 179
36 A SURVEY ON CHOICE OF ELECTRICAL SERVICE PROVIDER BASED ON CUSTOMER SATISFACTION (TATA VS ADANI)
Vaibhav Dubey and Prashant Choudhary
180 – 183

Volume 7, Issue 1 (XIV): January – March 2020