International Journal of Advance and Innovative Research Volume 7, Issue 1 (XIV): January – March 2020 |
||
---|---|---|
Sr. No | Contents | Page No |
1 | Mobile Cloud Computing– Advantages, Challenges, and Needs Punit Harpalani |
1 – 5 |
2 | To detect and understand brain tumor using a Soft-computing Assisted Tool Amar Dashrath Dhuri |
6 – 10 |
3 | Cloud Cryptography Ayesha Ansari |
11 – 16 |
4 | Testing Internet of Things Maulik Chandan |
17 – 22 |
5 | Can Cyber Insurance Safeguard Companies from Data Privacy Breaches? Mihir Patel |
23 – 26 |
6 | ANATOMY OF VIRTUALIZATION Tejas Prakash Tamboskar |
27 – 29 |
7 | A Benchmark Study of Cashless Digital Applications: Paytm vs PhonePe Mitali Kumbhani and Dr. Neelam Naik |
30 – 33 |
8 | Sentiment analysis on abrogation of article 370 Tanoop Aravindakshan and Dr. Neelam Naik |
34 – 38 |
9 | Data Security in cloud computing using encryption Sunita Vinod Gupta |
39 – 43 |
10 | Usage analysis using PlayStore and AppStore Apps Harshali Patil, Lavina Jadhav and Sarala Mary |
44 – 51 |
11 | Network Function Virtualization Overview, Architecture and Use-cases Sooraj Shravan Prajapati |
52 – 55 |
12 | Should people get chip implanted under their skin? Tvisa Manish Kadakia |
56 – 60 |
13 | Personalized Learning Siddhi Thakkar, Rahul Rathod and Smruti Nanavaty |
61 – 65 |
14 | A Holistic Study On Effects Of Video Gaming On The Mental Health Dhara Vara and Prashant Chaudhary |
66 – 68 |
15 | Acne Assessment and it’s Influence on Self-Esteem Siddhi S. Kamath and Smruti Nanavaty |
69 – 76 |
16 | A Comparative Study of Current Trending Online Streaming Giants (Netflix vs. Amazon Prime) Mayur N Jadav and Prashant Choudhary |
77 - 81 |
17 | Online System Implementation in India: Assessment of Security issues (A TRANCE ON BALLOT MORE COMPELLING THAN BULLET) Bhakti Desai and Dr. Manisha Divate |
82 – 86 |
18 | Data Lake: A New Philosophy in Big Data Era Shrikant Ghanshyam Pandey |
87 – 90 |
19 | A Review on Various Soft Computing Techniques in the Domain of Handwriting Recognition Muzammil Aleem Khan |
91 – 93 |
20 | Use of Machine Learning Techniques in Digital Forensic for File Type Classification Dr. Manisha Divate |
94 – 97 |
21 | Security Challenges and Risk Estimation for IoT- based Applications Dr. Neelam Naik |
98 – 102 |
22 | Cloud Security and Forensics Using Apache Zookeeper Neha Vora |
103 – 107 |
23 | Study of Strength of WhatsApp Encryption and Vulnerability Testing of Messages by Reverse Engineering Akash Patil and Suchita Jijabrao Sonawane |
108 – 112 |
24 | Chatbots and Forensics: Risks and Opportunities Silpa Nair and Kuldeep U. Kawar |
113 – 116 |
25 | GOING ONLINE: FROM LEATHER WALLET TO MOBILE WALLET Dr. Deepak R. Gupta and Dr. Pooja Basu |
117 – 120 |
26 | A Study on Assessing Awareness related to Organ Donation Vidhi Kayada and Bhupendra Kesaria |
121 – 124 |
27 | Detecting Invisible: Windows Registry Attacks Akhilesh Vas and Milind Meshram |
125 – 130 |
28 | Overview of Web Application Security Attacks: Forensic Investigation Needa Ashraf Petkar |
131 – 137 |
29 | Ransomware Attacks Forensic Investigation Aditya Ramesh Ogania |
138 – 146 |
30 | Analysis of Malware in VirusTotal and risk associated with disclosure of Personal data Tanushree Suresh Pai and Neeta Khobragade |
147 – 155 |
31 | CLOUD COMPUTING ARCHITECTURE Sachin Maurya |
156 – 160 |
32 | A COMPARATIVE STUDY OF CURRENT TRENDING ONLINE FOOD DELIVERY APPLICATION (i.e. ZOMATO VS. SWIGGY) Aamina Qureshi and Prof. Rajesh Maurya |
161 – 164 |
33 | FAKE NEWS DETECTION, TECHNOLOGY: BLOCKCHAIN Priya Shah and Neelam Naik |
165 – 169 |
34 | A COMPARATIVE STUDY OF SINGLE INVESTMENT OPTION AND DIVERSIFICATION OF PORTFOLIO Akash Kale and Prashant Chaudhary |
170 – 173 |
35 | VIRTUAL REALITY THERAPY FOR TREATMENT OF PHOBIA Yashvi Mehta and Smruti Nanavaty |
174 – 179 |
36 | A SURVEY ON CHOICE OF ELECTRICAL SERVICE PROVIDER BASED ON CUSTOMER SATISFACTION (TATA VS ADANI) Vaibhav Dubey and Prashant Choudhary |
180 – 183 |