International Journal of Advance Foundation and Research in Computer (IJAFRC)

International Journal of Advance Foundation and Research in Computer (IJAFRC) is a scholarly peer-reviewed, interdisciplinary International scientific journal which is currently published Bi-monthly. The purpose of this Journal is to provide an open forum to publish original high quality research papers in the areas of computer science, computer engineering, and computer systems to promote the exchange of research ideas, experiences and results. In the near future, it hopes to be recognized by and included in several well-known international indexes.

Continue Reading »

Reviewer Login Here

Reviwer Login Form


Author Login Here

Author Login Form


Volume 2, Special Issue NCRTIT 2015.

Page 1     Page 2     Page 3     Page 4     Page 5     Page 6     Page 7


Title of Paper




Load Rebalancing for Distributed File Systems in Clouds.

Smita Salunkhe, S. S. Sannakki

Click Here


A Survey on Digital Image Watermarking.

Pranesh Kulkarni, S. S. Sannakki

Click Here


Classification of Pomegranate Diseases Based on Back Propagation Neural Network

S. S. Sannakki, V. S. Rajpurohit

Click Here


An Approach for Detection and Classification of Leaf Spot Diseases Affecting Pomegranate Crop

S. S. Sannakki, V. S. Rajpurohit

Click Here


Literature Survey On Syntax Parser For English Language Using Grammar Rules.

Shraddha Anantpure, Hinal Jain, Neha Alhat, Smita Bhor, Prof. Shanti Guru

Click Here


Fuzzy Inventory Model for Time-Varying Demand with Time Dependent Deterioration.

Dr R . Mohan*, S. Petricia Leema Roseline

Click Here


Secure Key Generation For Publisher/Subscriber Module In Broker Less System.

Pravin Parandwal, Ravindra Ramole, Samir Zinjade

Click Here


Encryption of  Images by Random Grids : An Overview

1=Prof. Kapil Tajane,Prof. Rahul Pitale,Mr. Mayur Tajane

Click Here


A Survey Of Sentiment Analysis On Big Data

Yousuf Syed, Vishal Sonawane, Raghav Gupta, Harsha Mare, Mahesh Pawaskar.

Click Here


Review On Incremental Encrypted Backup For Cloud

Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain

Click Here


Gaze Based Learning and Access for Search Engine

Mr.Dinesh Bodewar,  Mr.Yogesh Bande, Mr.Prasad Telkikar, Ms. Sayali Meshram

Click Here


IBS: Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

Mrs. Sapana Borole, Mrs. Disha Sharma, Ms. Priyanka Desai, Ms. Priyanka Kau, Ms.Swapnali Manohar, Mr. Vikram Yadav.

Click Here


A System to Filter Unwanted Messages from OSN User Walls.

Bhushan Jagtap,Rahul Rathod,Vitthal Anpat,Utsav, Mrs. Amita Jajoo

Click Here


A Study on Advanced Security Techniques to Provide Security for Social Networking as Data Mining

Jayant S. Rohankar

Click Here


Recommendation System And Search System Using SOLR

Ankit Kodalikar, Sourabh Bhavsar, Sujata Suhag

Click Here


Python Based Software Complexity Calculator using Halstead Metrics.

Mrs. Dipti Y. Pawade*, Mr. Mehul Metha, Mr. Karan Shah, Ms. Jasmi Rathod

Click Here


Overview of Secure Mining in Horizontally Distributed Databases.

1Sharad Bhojane ,2Prof. B.P. Kolhe

Click Here


Automatic Animal Detection And Warning System.

Sajid Shaikh1, Mayur Jadhav2,Naveen Nehe3 and Prof. Usha Verma4.

Click Here


Computer Based Object Oriented Analysis And Design From Requirement Specification.

Ms. Snehal Sarangi, Anil Shimpee, Suvidhya Lohar

Click Here


Dynamic Webpage Segmentation Implemented Using Hybrid Approach on Proxy Server.

Abhishek   Yadav, Ashish Thete, Durgesh Parlewar, Sachin Thaware, Shubhangi Kale

Click Here


Secure Server Verification Using Visual Cryptography.

Dnyaneshwari Thakur, Pritee Zingare, Suhel Shaikh, Sumedh Daundkar,Mrs Kavitha.S

Click Here


Self Determining Trustworthiness of Peer to Peer Networks for Online Networking Activities.

Sukanya Gunjal, Sonam Hadawale, Sonali Thorat, Prof.Prutha Ardhapure

Click Here


Modes of Visual Secret Sharing.

Monica Khedkar, Jyoti Patil, Ashwini Kamble, Prof. Ratanraj

Click Here


Efficient User Revocation In Cloud Using Proxy Server.

Yogesh Belekar, Madhukar Verma, Pappu Tormal

Click Here


Reserving Room Before Encryption of Images & Videos For Reversible Data Hiding.

Supriya Bhalekar, Aakanksha Jumle, Kamesh Gangawani, Ratnaraj Kumar

Click Here