Paper publications: A.Y
|
|
- Branden Sanders
- 5 years ago
- Views:
Transcription
1 Paper s: A.Y a. Faculty Name: Dr. Mrs. Neeta Deshpande Dr. Mrs. Neeta A. Deshapande C0 Classification over Encrepated rational Data Double Faced Data Hiding in images &^ Videos using RIT approach A survey on online symptons information and health related question for disease inference system A survey on single and multi speaker voice recognition in Android Feature Learning and Collaborative Tagging Using Non- Personalized Social Media Images and Tags Pharmabot - A Recommenda tion on General Medicines Survey A survey on Convolutional Neural Networks July-17 September-17 March-18 January-18 June-18 June-18 Volume 4, Issue 7, Volume 4, Issue 9, Volume 3, Issue 2, Volume 3, Issue 1, Volume 6, Issue 5, Volume 6, Issue 6, 1-5 Volume 6, Issue 6, 1-5 e-isssn e-isssn e-isssn e-isssn ISSN() : ISSN() : ISSN() :
2 b. Faculty Name: Dr. Kailash Shaw 6. Dr. Kailash Shaw Speaker dependent speech emotion recognition using MFCC and Support Vector Machine A Survey on Image Enhancement Techniques Using Aesthetic Community A Survey on Road Detection for Autonomous Vehicles A semi-supervised rough set and random forest approach for pattern classification of gene expression data Medical Data Privacy and Disease Prediction Using Advance Encryption and Machine Learning Approach Pinterest Recommendation- Location Based Application Name of (NC/I C/NJ/I J) IC July September-17 March-18 Volume -6, Issue -1 Volume 7, Issue Pune January June c. Faculty Name: Dr. Vinayak Kottawar Dr. Vinayak Kottawar Extraction of whole and torn meniscus in MRI images and detection of meniscal tear Automatic articular cartilage segmentation with multiple model (NC/IC/N J/) of Issue, Pages IC 10/05/ IC 10/05/
3 d. Faculty Name: Mrs. D.A. Phalke Mrs. D.A. Phalke Sentiment Analysis with Multilayes Perceptron using Emoticon Space Model Source camera based image retrieval from Internet using Simplified Total Variation Optimize Video Encryption for Transmission Automatic Emergency Service System With QR-Code Literature survey on Automatic Emergency Service System A Systematic review of near duplicate video retrieval techniques Inference Attack on Users Browsing History with friend recommendati on system in IC & IC & July-18 July-18 23/02/2018 & 24/02/ /05/2018-9/5/2018 Vol: 4, Issue: 7, Pp No.: ( ) Vol: 4, Issue: 7, Pp No.: ( ) Vol: 7, Issue: 5, Pp No.: ( ) Vol: 5, Issue: 5, Pp No.: ( ) PP: Vol: 118, No: 24, Pp No.: (1-11) Vol.: 6, Issue: 5, pp. No: ( ) ISSN() : , ISSN() : , ISSN() : , ISSN() : , ISSN: , ISBN: ISSN: (online version) ISSN() : , IC-Dr. D Y Patil Institute of MCA, Akurdi, Pune D Y Patil College of Engg. Akurdi, Pune
4 8. Twitter Survey on Inference Attack on Users Browsing History with friend recommendati on system in Twitter Jun-18 Vol.: 7, Issue: 6, pp. No: ( ) ISSN() : , e. Faculty Name: Mrs. V.L. Kolhe Mrs. V.L. Kolhe Location based services using productive filtering and review analysis securing Constrained IOTs data Fine-Grained Knowledge sharing mechanism with hierarchcal structure using iterative d- ihmm Functional Assocition rule mining using cooperative coevolutionary deep neural networks Majority Vote Point Classification of Network Data based on Multivariate Correlation Analysis Event Information Extraction From E- Mail And Updating Event In Calendar Survey on Hand Gestures Recognition using Leap Motion Controller Name of (NC/I C/NJ/I J) July-18 July-18 July-18 Jul-18 Jun Jun-18 Volume 6 Issue 1 Volume 5 Issue8 Volume 4 Issue 6 Volume 4 Issue 7 VOLUME 5, ISSUE 6 Volume 4 Issue Volume : 6, Issue : ISSN (online):
5 Controlling the Drone with Hand Gestures by using LEAP Motion Controller Controlling the Drone with Hand Gestures by using LEAP Motion A survey on image scrambling encryption technique Providing Protection on Cloud Video Surveillance using blowfish algorithm A Rule Verification and Resolution Framework for Smart Buildings Quering Databases Using Natural Language Interface DYPC OE Akurdi online online Volume 118 No ISSN: Apr-08 March-18 Volume:3 issue:3 Volume:6 issue:5 Volume:6 issue:4 Volume:5 issue:3 DYPCOE Akurdi online online f. Faculty Name: Mrs. D. B. Gothawal Mrs. D.B. Gothawal A Survey on Human Activity Recognition Survey Of The Selfish Node Detection In The Mobile Ad-Hoc Network Spam Detection on Collection of Twitter Data Using Naive Bayes Algorithm Survey on Various Unsupervised Learning Techniques for Anomaly Detection Selfish node detection in packet Name of (NC/I C/NJ/I J) 11 th January th January 2017 June-18 May 2018 July Volume 2 Issue 7 VOLUME 5 ISSUE 1 Vol. 7, Issue 6, Vol. 6, Issue 5 Volume 4, Issue 7, ISSN Print ISSN() : , ISSN() : , e-issn (O): ,p-
6 6. 7. routing for MANET using global watchdog Security issues in IoT layers and its applications : A Review Energy Efficient Human Activity Recognition using Hybrid Mobile Application Development Approach May 24, 2018 (IF: 0.456) July Volume 118 No. 24 Volume 4, Special Issue ISSN (P): ISSN: ISSN: ( E) (P) g. Faculty Name: Mrs. D. A. Chaudhari Mrs. D. A. Chaudhari Survey on Information Retrieval Query on cloud Dtata Prediction of Presence of Heart Disease Using Wearable Device Review on Multi Keword top - K Search over encrypted cloud Data Survey on Smart Swim Aqua Monitor IC 30th-31st May Volume 3,Issue 5 Volume 2 Issue 12 Volume 3,Issue 5 E-ISBN no: Nashik g. Faculty Name: Mrs. Shantiguru Image Classification using Naive Volume 4, e-issn (O): Mrs. Bayes Model June-17 Issue 6, Shantiguru for Deep online Head Pose Estimation Fuzzy June-17 Volume 4, e-issn (O): online
7 Keyword Search for MultipleData Owners in Cloud Computing Issue 6, h. Faculty Name: Mrs. Nilam Patil Mining Opinion Targets and Opinion Words using Word Alignment model with Positive and Negative Reviews (NC/IC/N J/) June Mrs. Nilam Patil Privacy Preservation of Messages in Vehicular Adhoc Network USEA: unified society enhancement application for society management Malware detection in android using system calls through machine learning approaches Improve Performance Of Hadoop Using Efficient Data Aware Caching For Big Data Jun Volume 5, Issue 5 Volume 5, Issue 5 Volume 2, Issue
8 i. Faculty Name: Mrs. Pallavi Ghaste Mrs. Pallavi Ghaste A high computational IOT device through splitting and concatenate approach A high computational IOT device through Splitting and Concatenate approach Implementation of High Computational Model Using Splitting and Concatenate Approach on Raspberry Pi Data Partitioning and Parallel Frequent Itemset Mining using Hadoop Environment. Efficient Parallel Mining Of Frequent Itemsets Using MapReduce in Hadoop (NC/IC/ NJ/) Jan-Feb 2018 IC Feb 2018 April-17 May 2017 ISAR Volume 1 Issue Volume: 05 Issue: 05 May-2018 Volume: 05 Issue: 05 May-2018 Volume: 05 Issue: 05 May-2018 ISSN e-issn: p-issn: ISSN() : ISSN(Onlin e): ISSN (Print): j. Faculty Name: Mr. Rahul pawar Mr. Rahul Pawar Ontplogy Mapping Using Natural Language Processing for crop Cultivation Ontplogy Mapping Using Natural Language (NC/IC/N J/) 01/09/2017 Vol-3, Issue IC 01/09/ Nagpur
9 6. Processing for crop Cultivation Minimal con ICT Algorithm for solving N queen Problem Anomaly Detection on Linux Powered devices using machine learning Detection of malicious Applications on Linux Powered devices using SVM Classifiers Detection of malicious Applications on Linux Powered devices using SVM Classifiers February-17 Vol-2 Isuue RRC November Pune IC Pune Vol-8 Isuue k. Faculty Name: Mr. Rahul Ghotekar Mr. Rahul Ghotekar Sentiment Analysis Sentiment Analysis the Challenges in Wireless Sensor Network the Challenges in Wireless Sensor Network IC March Pune April-17 Vol 5 Issue 2 ISSN X IC March Pune April-17 Vol 5 Issue 2 ISSN X
10 l. Faculty Name: Mrs. Aditi Kalia Mrs. Aditi Kalia the Challenges in Wireless Sensor Network the Challenges in Wireless Sensor Network Applications of Cloud Computing in Perilous Mechanical Industries IC March-17 Pune April-17 Vol 5 Issue 2 ISSN X IC m. Faculty Name: Mrs. Suvarna Kadam Mrs. Suvarna Kadam Review of Distributed Ledgers: The technological Advances behind cryptocurrenc y IC March Pune n. Faculty Name: Mrs. Vishaka Metre Mrs. Vishaka Metre Hierarchical Document Clustering based on Cosine Similarity measure Optimization of Document IC Sept Aurangabad, MH IC Aug PCCOE, Pune
11 Clustering using UNL Document Vector Generation and Swarm Intelligence o. Faculty Name: Mrs. Soniya Bastwade Mrs. Soniya Bastwade Sentiment Analysis Sentiment Analysis IC 03/17 04/17 Volume Isuue ISSN ISSN X Navsahyadri group of institutes, Pune p. Faculty Name: Mrs. Vrushali Uttarwar Mrs. Vrushali Uttarwar User Preference Based Network Selection in Wireless Networks Alleviation of DDoS attack using advance technique 12/12/2017 Volume:04 Pages: IC 13/07/ e-issn: p- ISSN: Accession Number: Bangalore, India q. Faculty Name: Mrs. Ekta Chaudhari Mrs. Ekta Chaudhari Biometrics Authenticati on Technique in Cloud Computing Secure Data Aggregation in WSN using Jan-17 Vol 5, Issue IC Feb Bengaluru
12 Iterative Review Paper on Intelligent Toll Tax System for the Mar-18 Vol 4, Issue r. Faculty Name: Mr. Suraj Kurde Mr. Suraj Kurde Big data Architecture, Application, And Security Survey on Technologic al applications of Internet of Things in health Monitoring System IC Jul May Vol 2, Iissue Pune s. Faculty Name: Mr. Pramod Deshmukh Mr. Pramod Deshmukh Hierarchical Document Clustering based on Cosine Similarity measure Optimizatio n of Document Clustering using UNL Document Vector Generation and Swarm IC Oct IC Aug Aurangabad, MH PCCOE, Pune
13 Intelligence t. Faculty Name: Mrs. Pooja Deshpande Mrs. Pooja Deshpande Survey on Various Routing Protocols for effective Bandwidth optimization in MANET June 2018 Volume 6,Pages: u. Faculty Name: Mr. Jayant Shimpi Mr. Jayant Shimpi Ontology Mapping Using Natural Language Processing For CORP Cultivation. IC 2 March- April 2017 Vol 3 Issue 2 [ ] SMT. Radhijatai Pandav College of Engg,Nagpur v. Faculty Name: Mrs. Neha Patil Mrs. Neha Patil Providing Highly accurate service recommendati on over big data using adaptive system Providing Highly accurate service recommendati on foe semantic clustering over big data 2 March- April 2017 Volume =4 Issue=2 Pages= Volume =4 Issue=7 Pages= e-issn:
DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationVoid main Technologies
SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationPROJECT LIST
Real time training provided by experts from Microsoft,VMware & Top MNCs. Complete corporate style of training and 100% clean working projects Contact :9738928926 Website :www.hopelight.in Address : MG
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationAll India Shri Shivaji Memorable Society s COLLEGE OF ENGINEERING, PUNE. RESUME
All India Shri Shivaji Memorable Society s COLLEGE OF ENGINEERING, PUNE. RESUME. Name of the Teaching Staff: - Bhakti Amit Patil 2. Designation: - Assistant Professor. Department: - Computer Engineering
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationD.JAYAPRAKASH. Consultancy Work
D.JAYAPRAKASH Assistant Professor, Department of Computer Science and Engineering,, Omalur, Tamilnadu, India. Experience: 9.0 Years E-Mail: jayaprakash.cse@dgct.ac.in Contact No: +91 9894337244 Experience
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationInformation Extraction of Important International Conference Dates using Rules and Regular Expressions
ISBN 978-93-84422-80-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-2017) Pattaya (Thailand) Dec. 28-29, 2017 Information Extraction of Important
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationIEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST
2017-18 IEEE 2017-18 SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST TECHNOFIST a leading academic project s providing company established in Bangalore since 2007. With perfect infrastructure,
More informationSRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR
SRM UNIVERSITY RAMAPURAMCAMPUS PUBLICATIONS IN INDEXED JOURNALS ACADEMIC YEAR 2016-2017 S.No Title of Paper First Author Other Authors Name of Journal 1 An Energy Aware Invasive Weed Optimization Based
More informationVelammal Engineering College Department of Computer Science and Engineering
Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal
More informationSmart Band for Women Security Based on Internet of Things (IOT)
Smart Band for Women Security Based on Internet of Things (IOT) S. A. More 1, R. D. Borate 2, S. T. Dardige 3, S. S. Salekar 4, Prof. D. S. Gogawale 5 ABSTRACT 1,2,3,4 U. G. Students, Department of Computer
More informationANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining
ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, 2014 ISSN 2278 5485 EISSN 2278 5477 discovery Science Comparative Study of Classification Algorithms Using Data Mining Akhila
More informationClassification and Optimization using RF and Genetic Algorithm
International Journal of Management, IT & Engineering Vol. 8 Issue 4, April 2018, ISSN: 2249-0558 Impact Factor: 7.119 Journal Homepage: Double-Blind Peer Reviewed Refereed Open Access International Journal
More informationA Study on Association Rule Mining Using ACO Algorithm for Generating Optimized ResultSet
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 11, November 2013,
More informationA Survey And Comparative Analysis Of Data
A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th
More informationJAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE
CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword
More informationAd-hoc Trusted Information Exchange Scheme for Location Privacy in VANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationProfessional Excellence Summary
Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.
More informationClassifying Twitter Data in Multiple Classes Based On Sentiment Class Labels
Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),
More informationKeywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition
More informationSemantic Video Indexing
Semantic Video Indexing T-61.6030 Multimedia Retrieval Stevan Keraudy stevan.keraudy@tkk.fi Helsinki University of Technology March 14, 2008 What is it? Query by keyword or tag is common Semantic Video
More informationSermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.
Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity
More informationExperience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25
Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop
More informationA Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique
More informationSession Schedule(Computer & IT) SESSION - I
SESSI - I DATE: 10/3/2017 TIME: 12.15 P.M. to 1.45 P.M. LOCATI:C-229 SR NO. PAPER ID TITLE AUTHOR 1 17NC333 Clustering for Keyword Extraction in Document Conversation Shivangi. B. Chothani, Prof. Chintan
More informationHYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS
HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,
More informationAll India Shivaji Memorable Society s. COLLEGE OF ENGINEERING, Pune RESUME
All India Shivaji Memorable Society s COLLEGE OF ENGINEERING, Pune RESUME 1. Name of the teaching Staff: - Mr Shashakant V. Athawale 2. Designation: - Assistant Professor 3. Department: Computer Engineering
More informationBig Data - Security with Privacy
Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN
More informationBig Data Security Internal Threat Detection. The Critical Role of Machine Learning.
Big Data Security Internal Threat Detection The Critical Role of Machine Learning Objectives 1.Discuss internal user risk management challenges in Big Data Environment 2.Discuss why machine learning is
More informationIntroduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.
Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How
More informationA STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES
A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationResearch Papers Published in Refereed International Journals
List of Publications [38] Research Papers Published in Refereed International Journals 1. H S Guruprasad, H D Maheshappa, Dynamic Load Sharing Policy in Distributed VoD using agents, International Journal
More informationIEEE Project Titles
www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud
More informationDATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions
DATA MINING 1. ITDDM01 Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowd sourcing 2. ITDDM02 An Approach for Building Efficient and Accurate Social Recommender Systems using Individual
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationChallenges for Data Driven Systems
Challenges for Data Driven Systems Eiko Yoneki University of Cambridge Computer Laboratory Data Centric Systems and Networking Emergence of Big Data Shift of Communication Paradigm From end-to-end to data
More informationFrequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management
Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationM2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol
Advances in Wireless Communications and Networks 2017; 3(4): 39-44 http://www.sciencepublishinggroup.com/j/awcn doi: 10.11648/j.awcn.20170304.12 M2M Communication in Ad-Hoc WSNs for Industrial Suma Manuvinakurike
More informationPart I: Data Mining Foundations
Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?
More informationCybersecurity is a Team Sport
Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month
More informationADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW
ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW 1 Mustafa Mohammed Hassan Mustafa* 2 Atika Malik * 3 Amir Mohammed Talib Faculty of Engineering, Future University,
More informationSURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE
International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE Nikita Chavan 1,Mehzabin Shaikh
More informationCOMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES
COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,
More informationModelling Structures in Data Mining Techniques
Modelling Structures in Data Mining Techniques Ananth Y N 1, Narahari.N.S 2 Associate Professor, Dept of Computer Science, School of Graduate Studies- JainUniversity- J.C.Road, Bangalore, INDIA 1 Professor
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationMachine Learning using MapReduce
Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous
More informationREMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationLibrary. Summary Report
Library Summary Report 217-218 Prepared by: Library Staff December 218 Table of Contents Introduction..1 New Books.2 Print Circulation.3 Interlibrary Loan 4 Information Literacy 5 Reference Statistics.6
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
More informationProject Progress Report
ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee
More informationPrediction of Crop Yield using Machine Learning
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 05 Issue: 02 Feb-2018 www.irjet.net p-issn: 2395-0072 Prediction of Crop Yield using Machine Learning Rushika
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationContents. Preface to the Second Edition
Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationCS6220: DATA MINING TECHNIQUES
CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining
More informationBig Data Analytics for Host Misbehavior Detection
Big Data Analytics for Host Misbehavior Detection Miguel Pupo Correia joint work with Daniel Gonçalves, João Bota (Vodafone PT) 2016 European Security Conference June 2016 Motivation Networks are complex,
More informationMODAInnovations. Complete Academic Project Solutions IEEE PROJECTS
S NO MODAInnovations BIG DATA / HADOOP: 1 SOCIALQ&A: AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM 2 PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING 3 NETSPAM:
More informationZone-based Proactive Source Routing Protocol for Ad-hoc Networks
2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath
More informationMobile Sensor Swapping for Network Lifetime Improvement
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Mobile
More informationBing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer
Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures Springer Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web
More informationProwess Improvement of Accuracy for Moving Rating Recommendation System
2017 IJSRST Volume 3 Issue 1 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology Prowess Improvement of Accuracy for Moving Rating Recommendation System P. Damodharan *1,
More informationData Clustering Frame work using Hadoop
Volume: 05 Issue: 09 Sep 2018 www.irjet.net p-issn: 2395-0072 Data Clustering Frame work using Hadoop Malik Sadaf Allauddin 1, Abu Sufyan Malik 2 1B.Tech, Dept. of IT, Pillai HOC College of Engineering
More informationSentiment Analysis of Customers using Product Feedback Data under Hadoop Framework
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 1083-1091 Research India Publications http://www.ripublication.com Sentiment Analysis of Customers
More informationA SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS
A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationDISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING
DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING Ms. Pooja Bhise 1, Prof. Mrs. Vidya Bharde 2 and Prof. Manoj Patil 3 1 PG Student, 2 Professor, Department
More informationFlow-based Anomaly Intrusion Detection System Using Neural Network
Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data
More informationMODAInnovations Complete Academic Project Solutions
MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In
More informationHigh Performance Computing on MapReduce Programming Framework
International Journal of Private Cloud Computing Environment and Management Vol. 2, No. 1, (2015), pp. 27-32 http://dx.doi.org/10.21742/ijpccem.2015.2.1.04 High Performance Computing on MapReduce Programming
More informationFiltering of Unstructured Text
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 12 (December 2015), PP.45-49 Filtering of Unstructured Text Sudersan Behera¹,
More information1. Discovering Important Nodes through Graph Entropy The Case of Enron Database
1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR
More informationANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE
ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE Full Name (With qualification) Designation Department E Mail Area of Interest V. FRANCIS DENSIL RAJ, MCA.,M.PHIL.,
More informationNeural Networks. Single-layer neural network. CSE 446: Machine Learning Emily Fox University of Washington March 10, /10/2017
3/0/207 Neural Networks Emily Fox University of Washington March 0, 207 Slides adapted from Ali Farhadi (via Carlos Guestrin and Luke Zettlemoyer) Single-layer neural network 3/0/207 Perceptron as a neural
More informationBiodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),
Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date
More informationA Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2
A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,
More informationCAP 6412 Advanced Computer Vision
CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationA Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks
A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationAIMMS Function Reference - Date Time Related Identifiers
AIMMS Function Reference - Date Time Related Identifiers This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com Aimms 3.13 Date-Time
More informationJAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing
JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.
More informationTable Of Contents: xix Foreword to Second Edition
Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data
More informationMEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering
MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and List of conference papers presented by faculties during the year - S.No. Date Level Name of the Journal/Conference Title of
More informationWhat is Text Mining? Sophia Ananiadou National Centre for Text Mining University of Manchester
National Centre for Text Mining www.nactem.ac.uk University of Manchester Outline Aims of text mining Text Mining steps Text Mining uses Applications 2 Aims Extract and discover knowledge hidden in text
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 17 Artificial Neural Network in Classification A Comparison Dr. J. Jegathesh Amalraj * Assistant
More information