Browsing Research - Dept. of Computer Engg. by Issue Date

Browsing Research - Dept. of Computer Engg. by Issue Date

Sort by: Order: Results:

  • Lokhande, P. S. (Conference ICL2009, 2009-09)
    Use of computers, data communication and data storage devices has become so ubiquitous that most of the crimes or civil disputes have involvement in some way. There will be a large demand for computer forensics in the ...
  • Lokhande, P. S. (International Journal of Computer Applications, 2012-05)
    “ENTERPRISE CONTENT MANAGEMENT SYSTEM” (ECMS) is an extension to CONTENT MANAGEMENT SYSTEM (CMS). In this paper we will see the performance measure and security measure of website that is developed and hosted using three ...
  • Lokhande, P. S. (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-02)
    The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify ...
  • Lokhande, P. S. (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-03)
    Every day new things are added in old and those things should have to be preserve for managing the future, new things are always come with the major question that where should keep the things safely? This concept is ...
  • Lokhande, P. S. (International Journal of Advanced Research in Computer Science and Software Engineering, 2013-11)
    Internet technology is spread widely in a short time span. With the growth of internet electronic data exchange is also increasing; which is responsible for the invention of e-business. The use of e-commerce is also suddenly ...
  • Lokhande, P. S. (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-12)
    “Mobility” is a term which newly acclaimed with the increased used on mobile devices. To support business application on remote places this proposed architecture helped by a mobile intelligent agent. By using mobile devices, ...
  • Lokhande, P. S. (International Journal of Advanced Research in Computer Science and Software Engineering, 2014-03)
    This paper examines botnet behavior and provides the basis for the development of an application tool used to investigate the properties of botnets in large-scale networks. Botnets are breaching security and data safety ...
  • Lokhande, P. S.; Shaikh, Asiya; Shaikh, Tuba; Siddiqui, Maryam; Momin, Alimuddin (IJSRD - International Journal for Scientific Research & Development, 2015)
    Abstract— Alumni portals is providing common platform for every institute. Owing to the need to have all the Alumni (already passed out students) must be connected to the Institute, resulted in sharing their experiences, ...
  • Lokhande, P. S.; Aslam, Fankar; Hawa, Nabeel; Munir, Jumal; Gulamgaus, Murade (International Journal of Advanced Research in Computer Science, 2015-03)
    Web is the most frequently used networking aid which satisfies the requirements of all types of users; it provides a solution for any type of problem definition. While developing a web portal the appearance of web portal ...
  • Lokhande, P. S. (International Research Journal of Engineering and Technology (IRJET), 2015-05)
    Net banking frauds are now a day’s became common, criminals use the various available technologies to con the unaware citizens. Use of Phishing mails, key loggers and mobile phone SIM card cloning is the ...
  • Lokhande, P. S. (International Journal for Scientific Research & Development, 2015-09)
    Web personalization is the process of customizing a web site as per user‘s preferences by using the data mining, taking advantage of the knowledge acquired from the analysis of the user‘s navigational behavior. With ...
  • Lokhande, P. S.; Meshram, B.B. (International Journal of Web Technology, 2015-12)
    Abstract- Web personalization facilitate customizing a web site as per users preferences by using the various data mining techniques, taking advantage of the knowledge acquired from the analysis of the user’s navigational ...
  • Lokhande, P. S.; Meshram, B.B. (The International Journal of Forensic Computer Science, 2015-12-27)
    Cyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives ...
  • Lokhande, P. S. (ACM: Association For Computing Machinery, 2016-03-04)
    Attackers are using various techniques to attack on an E-Commerce site; they do have various options to initiate attack. On other hand web administrators finding it difficult to prioritize the defense mechanism against ...
  • Khan, Suhel (11CO25); Khan, Shoeb (11CO24); Zakariya, Md. Hussian (12CO63); Pathan, Nazim (11CO21); Khan, Mubashir; Gopale, Apeksha (International Journal of Innovative Research in Computer and Communication Engineering, 2016-04)
    The objective of this system is to present an automated system for human face recognition for an organization or institute to mark the attendance of their students or employees. This paper introduces face detection method ...
  • Khan, Tabrez; Magar, Rajendra; Ansari, Zakir; Shaikh, Afzal (K.K.Wagh Institute of engineering education & research, 2019-06-08)
    Academic audit is a methodical and scientific process of designing, implementing, monitoring and reviewing the quality in academic systems in higher education. The academic audit provides a strategic planning and its ...

Search Repository


Advanced Search

Browse

My Account