International Journal of Advance Foundation and Research in Computer (IJAFRC) is a scholarly peer-reviewed, interdisciplinary International scientific journal which is currently published Bi-monthly. The purpose of this Journal is to provide an open forum to publish original high quality research papers in the areas of computer science, computer engineering, and computer systems to promote the exchange of research ideas, experiences and results. In the near future, it hopes to be recognized by and included in several well-known international indexes.
SN |
Title of Paper |
Authors |
Download |
1 |
A Survey: Word Sense Disambiguation. |
Nirali Patel, Bhargesh Patel, Rajvi Parikh, Brijesh Bhatt |
Click Here |
2 |
A Survey: Web Recommendation Using Different Approaches of Web Mining Techniques. |
Tejas M. Modi1*, Bhargesh Patel2, Priyanka Panchal3 |
Click Here |
3 |
Accessing Remote Desktop and LAN through Android Smart Phone. |
Pranjal Badgujar, Sujit Korade, Lata Nagalapur, Rakesh Shinde |
Click Here |
4 |
Security Using Cued Click Points And Armstrong Numbers. |
Prasad Bhalekar, Bhargav Patil, Mayur Rajulwar,K.D.Bamane |
Click Here |
5 |
Android Based E-Voting. |
Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane |
Click Here |
6 |
Location Based Tracking Application-Next Generation Whats App. |
Bhagyashri Asawale, Bhagyashri Bhagwat, Suvarna Shivarkar, Pritam Shitole, Kavitha S. |
Click Here |
7 |
An Effective Cost Mechanism In WDM Network. |
Ms. Punam R. Patil1, Mr. Bhushan V. Patil2, Prof. Santosh Varshney3 |
Click Here |
8 |
Data Reduction Algorithm In Wireless Sensor Networks For Heartbeat Monitoring System. |
Tushar Misal, Rahul Kadam, Tejas Borbande, Prajyot Joshi,Ashok Thanage, Pramod Ganjewar |
Click Here |
9 |
Review Report On Security Breaches Using Keylogger And Clickjacking. |
Mrs. Dipti Y. Pawade*, Ms. Abhilasha Lahigude, Ms. Divya Reja |
Click Here |
10 |
Automatic Diagnosis of Malaria Parasites Using Neural Network and Support Vector Machine. |
Miss. Shruti Annaldas1, Prof. S.S.Shirgan2 |
Click Here |
11 |
Fog Computing : Mitigating Insider Data Theft Attack in the Cloud. |
Prof. S .V. Phulari, Gawali Mahesh, Chorghe Vaibhav, Khavale Akshay |
Click Here |
12 |
Authentication Schemes Using Text and Colors. |
Miss. Swati Tidke, Miss.Tejaswini Mutkure,Miss.Priyanka Chaudhari |
Click Here |
13 |
A Brief Comparison Of SISO, MIMO And Modified MIMO System. |
Geetanjali Mudaliar. |
Click Here |
14 |
Improving Quality Of Web Search Engine Using Relevance Feedback Mechanism. |
Pallavi Yadav 1, Pratibha Chavan2 |
Click Here |
15 |
Filtering Unwanted Messages from Online Social Network (OSN) User Walls. |
Miss. Swatee Pachaghare, Miss. Sileksha Nandeshwar , Miss.Monali Admane |
Click Here |
16 |
Smart Queue Management for Hospitals. |
Keshav Nathani, Rahul Suthar, Jay Shelke, Vishwajeet Vatharkar, A.J.Patankar |
Click Here |
17 |
Load Balancing In Multistage Packet Switches. |
Navgire Narsingh , Jadhav Mahadeo, Dhage Anand, Patil Rohini, Prof. Sirdeshpande S. A. |
Click Here |
18 |
Detection of Unknown Vulnerability |
Miss. Monal M. Rathor |
Click Here |
19 |
Survey:Anti-Phishing Framework Using Visual Cryptography On Cloud. |
Vikas Sahare*, Sheetalkumar Jain*,Manish Giri*. |
Click Here |
20 |
A System on Secure Erasure Code-based Cloud Storage with Secure Data Forwarding. |
Ujwala Salunke, Dayanand Kendre, Gauri Gonjari, Dinesh Bhor,Mrs. Minakshi Vharkate |
Click Here |
21 |
Web Restructring For Easy Browsing. |
Kazade Sunita, Raut Dipali , Masal Archana , Palase Priyanka, Prof. Teke A.R. |
Click Here |
22 |
A Review On Vision-Based Real-Time Driver Fatigue Detection System For Efficient Vehicle Control. |
Mr. Ganesh Sanap1, Mr. Sumit Lagad1, Mr. Kunal Lohar1, Ms. Pranali Lokhande2 |
Click Here |
23 |
MUDRA : Manipulating the Undulations of Dexterity(Hand Gestures) for Recognition and Analysis |
Ghuge Sudarshan, Kardile Piyush, More Ajay, Shete Sourabh, Mr.Bhushan Bhokse |
Click Here |
24 |
Secure Authentication by Image Processing and Visual Cryptography for Banking Applications. |
Miss. Alfiya Saiyyad, Miss.Asma Khan, Prof.Madhuri Badole |
Click Here |
25 |
Key-Aggregate Cryptosystem For Scalable Data Sharing in Cloud Storage. |
Miss. Shrutika Sathawane, Miss. Shraddha Meshram, Miss. Monali Admane |
Click Here |