Paper publications: A.Y

Size: px
Start display at page:

Download "Paper publications: A.Y"

Transcription

1 Paper s: A.Y a. Faculty Name: Dr. Mrs. Neeta Deshpande Dr. Mrs. Neeta A. Deshapande C0 Classification over Encrepated rational Data Double Faced Data Hiding in images &^ Videos using RIT approach A survey on online symptons information and health related question for disease inference system A survey on single and multi speaker voice recognition in Android Feature Learning and Collaborative Tagging Using Non- Personalized Social Media Images and Tags Pharmabot - A Recommenda tion on General Medicines Survey A survey on Convolutional Neural Networks July-17 September-17 March-18 January-18 June-18 June-18 Volume 4, Issue 7, Volume 4, Issue 9, Volume 3, Issue 2, Volume 3, Issue 1, Volume 6, Issue 5, Volume 6, Issue 6, 1-5 Volume 6, Issue 6, 1-5 e-isssn e-isssn e-isssn e-isssn ISSN() : ISSN() : ISSN() :

2 b. Faculty Name: Dr. Kailash Shaw 6. Dr. Kailash Shaw Speaker dependent speech emotion recognition using MFCC and Support Vector Machine A Survey on Image Enhancement Techniques Using Aesthetic Community A Survey on Road Detection for Autonomous Vehicles A semi-supervised rough set and random forest approach for pattern classification of gene expression data Medical Data Privacy and Disease Prediction Using Advance Encryption and Machine Learning Approach Pinterest Recommendation- Location Based Application Name of (NC/I C/NJ/I J) IC July September-17 March-18 Volume -6, Issue -1 Volume 7, Issue Pune January June c. Faculty Name: Dr. Vinayak Kottawar Dr. Vinayak Kottawar Extraction of whole and torn meniscus in MRI images and detection of meniscal tear Automatic articular cartilage segmentation with multiple model (NC/IC/N J/) of Issue, Pages IC 10/05/ IC 10/05/

3 d. Faculty Name: Mrs. D.A. Phalke Mrs. D.A. Phalke Sentiment Analysis with Multilayes Perceptron using Emoticon Space Model Source camera based image retrieval from Internet using Simplified Total Variation Optimize Video Encryption for Transmission Automatic Emergency Service System With QR-Code Literature survey on Automatic Emergency Service System A Systematic review of near duplicate video retrieval techniques Inference Attack on Users Browsing History with friend recommendati on system in IC & IC & July-18 July-18 23/02/2018 & 24/02/ /05/2018-9/5/2018 Vol: 4, Issue: 7, Pp No.: ( ) Vol: 4, Issue: 7, Pp No.: ( ) Vol: 7, Issue: 5, Pp No.: ( ) Vol: 5, Issue: 5, Pp No.: ( ) PP: Vol: 118, No: 24, Pp No.: (1-11) Vol.: 6, Issue: 5, pp. No: ( ) ISSN() : , ISSN() : , ISSN() : , ISSN() : , ISSN: , ISBN: ISSN: (online version) ISSN() : , IC-Dr. D Y Patil Institute of MCA, Akurdi, Pune D Y Patil College of Engg. Akurdi, Pune

4 8. Twitter Survey on Inference Attack on Users Browsing History with friend recommendati on system in Twitter Jun-18 Vol.: 7, Issue: 6, pp. No: ( ) ISSN() : , e. Faculty Name: Mrs. V.L. Kolhe Mrs. V.L. Kolhe Location based services using productive filtering and review analysis securing Constrained IOTs data Fine-Grained Knowledge sharing mechanism with hierarchcal structure using iterative d- ihmm Functional Assocition rule mining using cooperative coevolutionary deep neural networks Majority Vote Point Classification of Network Data based on Multivariate Correlation Analysis Event Information Extraction From E- Mail And Updating Event In Calendar Survey on Hand Gestures Recognition using Leap Motion Controller Name of (NC/I C/NJ/I J) July-18 July-18 July-18 Jul-18 Jun Jun-18 Volume 6 Issue 1 Volume 5 Issue8 Volume 4 Issue 6 Volume 4 Issue 7 VOLUME 5, ISSUE 6 Volume 4 Issue Volume : 6, Issue : ISSN (online):

5 Controlling the Drone with Hand Gestures by using LEAP Motion Controller Controlling the Drone with Hand Gestures by using LEAP Motion A survey on image scrambling encryption technique Providing Protection on Cloud Video Surveillance using blowfish algorithm A Rule Verification and Resolution Framework for Smart Buildings Quering Databases Using Natural Language Interface DYPC OE Akurdi online online Volume 118 No ISSN: Apr-08 March-18 Volume:3 issue:3 Volume:6 issue:5 Volume:6 issue:4 Volume:5 issue:3 DYPCOE Akurdi online online f. Faculty Name: Mrs. D. B. Gothawal Mrs. D.B. Gothawal A Survey on Human Activity Recognition Survey Of The Selfish Node Detection In The Mobile Ad-Hoc Network Spam Detection on Collection of Twitter Data Using Naive Bayes Algorithm Survey on Various Unsupervised Learning Techniques for Anomaly Detection Selfish node detection in packet Name of (NC/I C/NJ/I J) 11 th January th January 2017 June-18 May 2018 July Volume 2 Issue 7 VOLUME 5 ISSUE 1 Vol. 7, Issue 6, Vol. 6, Issue 5 Volume 4, Issue 7, ISSN Print ISSN() : , ISSN() : , e-issn (O): ,p-

6 6. 7. routing for MANET using global watchdog Security issues in IoT layers and its applications : A Review Energy Efficient Human Activity Recognition using Hybrid Mobile Application Development Approach May 24, 2018 (IF: 0.456) July Volume 118 No. 24 Volume 4, Special Issue ISSN (P): ISSN: ISSN: ( E) (P) g. Faculty Name: Mrs. D. A. Chaudhari Mrs. D. A. Chaudhari Survey on Information Retrieval Query on cloud Dtata Prediction of Presence of Heart Disease Using Wearable Device Review on Multi Keword top - K Search over encrypted cloud Data Survey on Smart Swim Aqua Monitor IC 30th-31st May Volume 3,Issue 5 Volume 2 Issue 12 Volume 3,Issue 5 E-ISBN no: Nashik g. Faculty Name: Mrs. Shantiguru Image Classification using Naive Volume 4, e-issn (O): Mrs. Bayes Model June-17 Issue 6, Shantiguru for Deep online Head Pose Estimation Fuzzy June-17 Volume 4, e-issn (O): online

7 Keyword Search for MultipleData Owners in Cloud Computing Issue 6, h. Faculty Name: Mrs. Nilam Patil Mining Opinion Targets and Opinion Words using Word Alignment model with Positive and Negative Reviews (NC/IC/N J/) June Mrs. Nilam Patil Privacy Preservation of Messages in Vehicular Adhoc Network USEA: unified society enhancement application for society management Malware detection in android using system calls through machine learning approaches Improve Performance Of Hadoop Using Efficient Data Aware Caching For Big Data Jun Volume 5, Issue 5 Volume 5, Issue 5 Volume 2, Issue

8 i. Faculty Name: Mrs. Pallavi Ghaste Mrs. Pallavi Ghaste A high computational IOT device through splitting and concatenate approach A high computational IOT device through Splitting and Concatenate approach Implementation of High Computational Model Using Splitting and Concatenate Approach on Raspberry Pi Data Partitioning and Parallel Frequent Itemset Mining using Hadoop Environment. Efficient Parallel Mining Of Frequent Itemsets Using MapReduce in Hadoop (NC/IC/ NJ/) Jan-Feb 2018 IC Feb 2018 April-17 May 2017 ISAR Volume 1 Issue Volume: 05 Issue: 05 May-2018 Volume: 05 Issue: 05 May-2018 Volume: 05 Issue: 05 May-2018 ISSN e-issn: p-issn: ISSN() : ISSN(Onlin e): ISSN (Print): j. Faculty Name: Mr. Rahul pawar Mr. Rahul Pawar Ontplogy Mapping Using Natural Language Processing for crop Cultivation Ontplogy Mapping Using Natural Language (NC/IC/N J/) 01/09/2017 Vol-3, Issue IC 01/09/ Nagpur

9 6. Processing for crop Cultivation Minimal con ICT Algorithm for solving N queen Problem Anomaly Detection on Linux Powered devices using machine learning Detection of malicious Applications on Linux Powered devices using SVM Classifiers Detection of malicious Applications on Linux Powered devices using SVM Classifiers February-17 Vol-2 Isuue RRC November Pune IC Pune Vol-8 Isuue k. Faculty Name: Mr. Rahul Ghotekar Mr. Rahul Ghotekar Sentiment Analysis Sentiment Analysis the Challenges in Wireless Sensor Network the Challenges in Wireless Sensor Network IC March Pune April-17 Vol 5 Issue 2 ISSN X IC March Pune April-17 Vol 5 Issue 2 ISSN X

10 l. Faculty Name: Mrs. Aditi Kalia Mrs. Aditi Kalia the Challenges in Wireless Sensor Network the Challenges in Wireless Sensor Network Applications of Cloud Computing in Perilous Mechanical Industries IC March-17 Pune April-17 Vol 5 Issue 2 ISSN X IC m. Faculty Name: Mrs. Suvarna Kadam Mrs. Suvarna Kadam Review of Distributed Ledgers: The technological Advances behind cryptocurrenc y IC March Pune n. Faculty Name: Mrs. Vishaka Metre Mrs. Vishaka Metre Hierarchical Document Clustering based on Cosine Similarity measure Optimization of Document IC Sept Aurangabad, MH IC Aug PCCOE, Pune

11 Clustering using UNL Document Vector Generation and Swarm Intelligence o. Faculty Name: Mrs. Soniya Bastwade Mrs. Soniya Bastwade Sentiment Analysis Sentiment Analysis IC 03/17 04/17 Volume Isuue ISSN ISSN X Navsahyadri group of institutes, Pune p. Faculty Name: Mrs. Vrushali Uttarwar Mrs. Vrushali Uttarwar User Preference Based Network Selection in Wireless Networks Alleviation of DDoS attack using advance technique 12/12/2017 Volume:04 Pages: IC 13/07/ e-issn: p- ISSN: Accession Number: Bangalore, India q. Faculty Name: Mrs. Ekta Chaudhari Mrs. Ekta Chaudhari Biometrics Authenticati on Technique in Cloud Computing Secure Data Aggregation in WSN using Jan-17 Vol 5, Issue IC Feb Bengaluru

12 Iterative Review Paper on Intelligent Toll Tax System for the Mar-18 Vol 4, Issue r. Faculty Name: Mr. Suraj Kurde Mr. Suraj Kurde Big data Architecture, Application, And Security Survey on Technologic al applications of Internet of Things in health Monitoring System IC Jul May Vol 2, Iissue Pune s. Faculty Name: Mr. Pramod Deshmukh Mr. Pramod Deshmukh Hierarchical Document Clustering based on Cosine Similarity measure Optimizatio n of Document Clustering using UNL Document Vector Generation and Swarm IC Oct IC Aug Aurangabad, MH PCCOE, Pune

13 Intelligence t. Faculty Name: Mrs. Pooja Deshpande Mrs. Pooja Deshpande Survey on Various Routing Protocols for effective Bandwidth optimization in MANET June 2018 Volume 6,Pages: u. Faculty Name: Mr. Jayant Shimpi Mr. Jayant Shimpi Ontology Mapping Using Natural Language Processing For CORP Cultivation. IC 2 March- April 2017 Vol 3 Issue 2 [ ] SMT. Radhijatai Pandav College of Engg,Nagpur v. Faculty Name: Mrs. Neha Patil Mrs. Neha Patil Providing Highly accurate service recommendati on over big data using adaptive system Providing Highly accurate service recommendati on foe semantic clustering over big data 2 March- April 2017 Volume =4 Issue=2 Pages= Volume =4 Issue=7 Pages= e-issn:

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

PROJECT LIST

PROJECT LIST Real time training provided by experts from Microsoft,VMware & Top MNCs. Complete corporate style of training and 100% clean working projects Contact :9738928926 Website :www.hopelight.in Address : MG

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

All India Shri Shivaji Memorable Society s COLLEGE OF ENGINEERING, PUNE. RESUME

All India Shri Shivaji Memorable Society s COLLEGE OF ENGINEERING, PUNE. RESUME All India Shri Shivaji Memorable Society s COLLEGE OF ENGINEERING, PUNE. RESUME. Name of the Teaching Staff: - Bhakti Amit Patil 2. Designation: - Assistant Professor. Department: - Computer Engineering

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

D.JAYAPRAKASH. Consultancy Work

D.JAYAPRAKASH. Consultancy Work D.JAYAPRAKASH Assistant Professor, Department of Computer Science and Engineering,, Omalur, Tamilnadu, India. Experience: 9.0 Years E-Mail: jayaprakash.cse@dgct.ac.in Contact No: +91 9894337244 Experience

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

Information Extraction of Important International Conference Dates using Rules and Regular Expressions

Information Extraction of Important International Conference Dates using Rules and Regular Expressions ISBN 978-93-84422-80-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-2017) Pattaya (Thailand) Dec. 28-29, 2017 Information Extraction of Important

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST 2017-18 IEEE 2017-18 SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST TECHNOFIST a leading academic project s providing company established in Bangalore since 2007. With perfect infrastructure,

More information

SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR

SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR 2016-2017 S.No Title of Paper First Author Other Authors Name of Journal 1 An Energy Aware Invasive Weed Optimization Based

More information

Velammal Engineering College Department of Computer Science and Engineering

Velammal Engineering College Department of Computer Science and Engineering Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal

More information

Smart Band for Women Security Based on Internet of Things (IOT)

Smart Band for Women Security Based on Internet of Things (IOT) Smart Band for Women Security Based on Internet of Things (IOT) S. A. More 1, R. D. Borate 2, S. T. Dardige 3, S. S. Salekar 4, Prof. D. S. Gogawale 5 ABSTRACT 1,2,3,4 U. G. Students, Department of Computer

More information

ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining

ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, 2014 ISSN 2278 5485 EISSN 2278 5477 discovery Science Comparative Study of Classification Algorithms Using Data Mining Akhila

More information

Classification and Optimization using RF and Genetic Algorithm

Classification and Optimization using RF and Genetic Algorithm International Journal of Management, IT & Engineering Vol. 8 Issue 4, April 2018, ISSN: 2249-0558 Impact Factor: 7.119 Journal Homepage: Double-Blind Peer Reviewed Refereed Open Access International Journal

More information

A Study on Association Rule Mining Using ACO Algorithm for Generating Optimized ResultSet

A Study on Association Rule Mining Using ACO Algorithm for Generating Optimized ResultSet Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 11, November 2013,

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Professional Excellence Summary

Professional Excellence Summary Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.

More information

Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels

Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),

More information

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm. Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition

More information

Semantic Video Indexing

Semantic Video Indexing Semantic Video Indexing T-61.6030 Multimedia Retrieval Stevan Keraudy stevan.keraudy@tkk.fi Helsinki University of Technology March 14, 2008 What is it? Query by keyword or tag is common Semantic Video

More information

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer. Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity

More information

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25 Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop

More information

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique

More information

Session Schedule(Computer & IT) SESSION - I

Session Schedule(Computer & IT) SESSION - I SESSI - I DATE: 10/3/2017 TIME: 12.15 P.M. to 1.45 P.M. LOCATI:C-229 SR NO. PAPER ID TITLE AUTHOR 1 17NC333 Clustering for Keyword Extraction in Document Conversation Shivangi. B. Chothani, Prof. Chintan

More information

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,

More information

All India Shivaji Memorable Society s. COLLEGE OF ENGINEERING, Pune RESUME

All India Shivaji Memorable Society s. COLLEGE OF ENGINEERING, Pune RESUME All India Shivaji Memorable Society s COLLEGE OF ENGINEERING, Pune RESUME 1. Name of the teaching Staff: - Mr Shashakant V. Athawale 2. Designation: - Assistant Professor 3. Department: Computer Engineering

More information

Big Data - Security with Privacy

Big Data - Security with Privacy Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN

More information

Big Data Security Internal Threat Detection. The Critical Role of Machine Learning.

Big Data Security Internal Threat Detection. The Critical Role of Machine Learning. Big Data Security Internal Threat Detection The Critical Role of Machine Learning Objectives 1.Discuss internal user risk management challenges in Big Data Environment 2.Discuss why machine learning is

More information

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.

Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How

More information

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Research Papers Published in Refereed International Journals

Research Papers Published in Refereed International Journals List of Publications [38] Research Papers Published in Refereed International Journals 1. H S Guruprasad, H D Maheshappa, Dynamic Load Sharing Policy in Distributed VoD using agents, International Journal

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions DATA MINING 1. ITDDM01 Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowd sourcing 2. ITDDM02 An Approach for Building Efficient and Accurate Social Recommender Systems using Individual

More information

Machine Learning in WAN Research

Machine Learning in WAN Research Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network

More information

Challenges for Data Driven Systems

Challenges for Data Driven Systems Challenges for Data Driven Systems Eiko Yoneki University of Cambridge Computer Laboratory Data Centric Systems and Networking Emergence of Big Data Shift of Communication Paradigm From end-to-end to data

More information

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

M2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol

M2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol Advances in Wireless Communications and Networks 2017; 3(4): 39-44 http://www.sciencepublishinggroup.com/j/awcn doi: 10.11648/j.awcn.20170304.12 M2M Communication in Ad-Hoc WSNs for Industrial Suma Manuvinakurike

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Cybersecurity is a Team Sport

Cybersecurity is a Team Sport Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month

More information

ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW

ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW 1 Mustafa Mohammed Hassan Mustafa* 2 Atika Malik * 3 Amir Mohammed Talib Faculty of Engineering, Future University,

More information

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE Nikita Chavan 1,Mehzabin Shaikh

More information

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES

COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,

More information

Modelling Structures in Data Mining Techniques

Modelling Structures in Data Mining Techniques Modelling Structures in Data Mining Techniques Ananth Y N 1, Narahari.N.S 2 Associate Professor, Dept of Computer Science, School of Graduate Studies- JainUniversity- J.C.Road, Bangalore, INDIA 1 Professor

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Machine Learning using MapReduce

Machine Learning using MapReduce Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous

More information

REMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD

REMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Library. Summary Report

Library. Summary Report Library Summary Report 217-218 Prepared by: Library Staff December 218 Table of Contents Introduction..1 New Books.2 Print Circulation.3 Interlibrary Loan 4 Information Literacy 5 Reference Statistics.6

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

Project Progress Report

Project Progress Report ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee

More information

Prediction of Crop Yield using Machine Learning

Prediction of Crop Yield using Machine Learning International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 05 Issue: 02 Feb-2018 www.irjet.net p-issn: 2395-0072 Prediction of Crop Yield using Machine Learning Rushika

More information

Machine Learning in WAN Research

Machine Learning in WAN Research Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Contents. Preface to the Second Edition

Contents. Preface to the Second Edition Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

CS6220: DATA MINING TECHNIQUES

CS6220: DATA MINING TECHNIQUES CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining

More information

Big Data Analytics for Host Misbehavior Detection

Big Data Analytics for Host Misbehavior Detection Big Data Analytics for Host Misbehavior Detection Miguel Pupo Correia joint work with Daniel Gonçalves, João Bota (Vodafone PT) 2016 European Security Conference June 2016 Motivation Networks are complex,

More information

MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS

MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS S NO MODAInnovations BIG DATA / HADOOP: 1 SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM 2 PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING 3 NETSPAM:

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Mobile Sensor Swapping for Network Lifetime Improvement

Mobile Sensor Swapping for Network Lifetime Improvement International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Mobile

More information

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer

Bing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures Springer Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web

More information

Prowess Improvement of Accuracy for Moving Rating Recommendation System

Prowess Improvement of Accuracy for Moving Rating Recommendation System 2017 IJSRST Volume 3 Issue 1 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology Prowess Improvement of Accuracy for Moving Rating Recommendation System P. Damodharan *1,

More information

Data Clustering Frame work using Hadoop

Data Clustering Frame work using Hadoop Volume: 05 Issue: 09 Sep 2018 www.irjet.net p-issn: 2395-0072 Data Clustering Frame work using Hadoop Malik Sadaf Allauddin 1, Abu Sufyan Malik 2 1B.Tech, Dept. of IT, Pillai HOC College of Engineering

More information

Sentiment Analysis of Customers using Product Feedback Data under Hadoop Framework

Sentiment Analysis of Customers using Product Feedback Data under Hadoop Framework International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 1083-1091 Research India Publications http://www.ripublication.com Sentiment Analysis of Customers

More information

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING

DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING Ms. Pooja Bhise 1, Prof. Mrs. Vidya Bharde 2 and Prof. Manoj Patil 3 1 PG Student, 2 Professor, Department

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

High Performance Computing on MapReduce Programming Framework

High Performance Computing on MapReduce Programming Framework International Journal of Private Cloud Computing Environment and Management Vol. 2, No. 1, (2015), pp. 27-32 http://dx.doi.org/10.21742/ijpccem.2015.2.1.04 High Performance Computing on MapReduce Programming

More information

Filtering of Unstructured Text

Filtering of Unstructured Text International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 12 (December 2015), PP.45-49 Filtering of Unstructured Text Sudersan Behera¹,

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE

ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE Full Name (With qualification) Designation Department E Mail Area of Interest V. FRANCIS DENSIL RAJ, MCA.,M.PHIL.,

More information

Neural Networks. Single-layer neural network. CSE 446: Machine Learning Emily Fox University of Washington March 10, /10/2017

Neural Networks. Single-layer neural network. CSE 446: Machine Learning Emily Fox University of Washington March 10, /10/2017 3/0/207 Neural Networks Emily Fox University of Washington March 0, 207 Slides adapted from Ali Farhadi (via Carlos Guestrin and Luke Zettlemoyer) Single-layer neural network 3/0/207 Perceptron as a neural

More information

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering), Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date

More information

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,

More information

CAP 6412 Advanced Computer Vision

CAP 6412 Advanced Computer Vision CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

AIMMS Function Reference - Date Time Related Identifiers

AIMMS Function Reference - Date Time Related Identifiers AIMMS Function Reference - Date Time Related Identifiers This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms 3.13 Date-Time

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and List of conference papers presented by faculties during the year - S.No. Date Level Name of the Journal/Conference Title of

More information

What is Text Mining? Sophia Ananiadou National Centre for Text Mining University of Manchester

What is Text Mining? Sophia Ananiadou National Centre for Text Mining   University of Manchester National Centre for Text Mining www.nactem.ac.uk University of Manchester Outline Aims of text mining Text Mining steps Text Mining uses Applications 2 Aims Extract and discover knowledge hidden in text

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 17 Artificial Neural Network in Classification A Comparison Dr. J. Jegathesh Amalraj * Assistant

More information