ARCHIVE

Indoor Environment Navigation for Blind with Voice Feedback in Zigbee Network

Authors : Miss. Komal Dive, Miss. Lumbini Fulekar , Miss. Pragati Sahay, Miss. Kiran Kshirsagar, Mr. Rahul Suryavanshi Abstract— The “Implementation of  blind  navigation system”  which focuses on independent mobility of visually impaired or blind people who suffer in an unknown environment without any manual This system employs frequency Identification (RFID) to realize an objective […]

READ MORE

Review on Privacy Preserving in VANET

Authors :Bhagyashree Vaze , Miss Ranjana Shende, Mrs.Vaishali Sahare Abstract–Due to increase in traffic it is very necessary to enhance the efficiency and safety of road traffic. Vehicular ad-hoc networks which are created by applying the principles of mobile ad hoc networks (MANETs),whichallow vehicles to broadcast ad hoc messages to other vehicles and remind drivers […]

READ MORE

Designing and Implementation of Gaming Using Eye

Authors : Vaishnavi kanumalla , Shilpa Kundu , Shraddha kale , Vedanti Bobde, Omesh Kalambe Abstract –Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys […]

READ MORE

Smart Flush System

Authors : Chetan R Patil , Ujwal N Jadhav, Dhananjay J Chaudhari , Tejaswini R Sonawane, Yashashri K Patil , Pritesh J Nikum DOI : 10.46335/IJIES.2025.10.9.10 Abstract –The Smart Flush System is an innovative, low-cost solution designed to optimize water usage for sanitation in rural and resource-constrained areas. By integrating a pressurized mix of air […]

READ MORE

Enhancing Security with Machine Learning: Asymmetric Key Encryption and Federated Learning Approach On Review

Authors : Bhushan Chaudhari , Dr. Nilesh Yuvaraj Choudhary DOI : 10.46335/IJIES.2025.10.9.9 Abstract – The exponential growth of data in the digital era presents challenges for ensuring its security. Traditional methods of encryption, though effective, face limitations when combined with distributed computing and privacy-preserving models. This research explores the integration of machine learning, asymmetric key […]

READ MORE

Secured Data Over The Cloud Storage

Authors : Miss. Himanshi Agrawal, Miss. Nayan Chandekar, Miss. Sanchita Nirwan, Miss. Ashwini Khedekar, Prof.R.D.Kale Abstract— Cloud computing which is associate up growing technology needed a lot of security particularly once it embrace third party as service supplier. To overcome this issue AES (Advance Encryption Standard) that is encoding technique for cloud surroundings with trustworthy third […]

READ MORE

Computation of Traffic Shortest Path Using Dijkstra’s Algorithm

Authors : Diksha Jadhav,Anjali Ramteke,PoojaDongre,Snehal Taraskar,Antara Bhattacharya Abstract-The aim of “Computation of Traffic Shortest Path victimization Dijkstra’s rule ”, is to showcase the route that’sabundant easier to travel from initial location to needed destination with none traffic stops additionally it focuses on typical and reliable path to the shopperthat provides the simplest path from variedvariety […]

READ MORE

Review Paper on Network Conjunction, Decomposition and Aggregation using MapReduce in Big Data Application

Authors : Sayali C. Ambulkar, Ravindra Kale Abstract—The MapReduce programming model streamlines expansive scale information handling on product group by abusing parallel delineate and lessen assignments. Albeit numerous endeavors have been made to enhance the execution of MapReduce employments, they disregard the arrange movement created in the rearrange stage, which assumes a basic part in […]

READ MORE

Implementation of Feature Level Fusion of Face and Ear in Multi-Modal Biometric System

Authors : Shradha D.Jamdar , Prof. Yogesh Golhar Abstract – In this paper discusses a new multimodal biometric based on face and ear. Multi modal biometric system is one of the major areas of study identified with large applications in recognition system. Single modal-biometric systems have to challenge with a variety of problems such as […]

READ MORE

Review Paper On Cryptoleq : Performance and Security

Authors : Miss Meenal P.Talekar, Mr. Ravindra Kale Abstract – The rapid expansion and increased popularity of cloud computing comes with no shortage of privacy communication mainly depends upon digital data communication. Cryptoleq: an abstract machine based on the concept of one instruction set computer, and  performing general-purpose computation on encrypted programs. The addition on […]

READ MORE