Sr. No. |
Name of the Students |
Title of the Paper |
Month & Year |
Year 2015-16 |
|||
1 |
Ms. Gauri Bandevar |
Role Based Encryption with efficient Access Control in Cloud storage International Conference on “Internet of Things, Next Generation Networks and Cloud Computing 2016” (ICINC) |
26-28th Feb. 2016. |
2 |
Mr. Shrikant Shinde M.E.(Second Year)
|
A Survey on Data Aggregation Techniques in Wireless Sensor Networks, IJSRD International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online): 2321-0613 |
Jan 2016 |
3 |
Mr. Shakil B. Tamboli M.E |
“A NOVEL APPROACH TO IMPROVE PERFORMANCE OF HADOOP USING EFFICIENT DATA AWARE CACHING FOR BIG DATA APPLICATION”, NTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY |
July 2015 |
4 |
Mrs.Neelam Pokale |
“ A Novel Document Retrieval Scheme using Relational Keyword Search System” |
July 2015 |
5 |
Ms. Pooja Mundhe ME |
“ Light Weiht Energy Efficient Encryption Scheme for Vehicular Adhoc Network” |
|
6 |
Ms Ashivini Pawar ME
|
Energy Efficient Target Tracking Scheme for Wireless Sensor Networks |
Feb 2016 |
7 |
BE. Nehal Kadu Mugdha Shirlekar Sukanya Kadu Suyog Akolkar |
Preventing Shoulder Surfing Attacks by Changing Flow of Card Payment System |
Mar 2016 |
8 |
BE. Prathmesh Chavan Dhanashree Kadu Tejas Kale Shivraj Kadam
|
Building Office Tools for Firefox OS |
April 2016 |
9 |
Ms. Preeti Doke ME |
A Survey on CAPTCHA as Graphical Password
|
Dec 2015 |
10 |
Mr. Omkar Bhalke ME
|
Physical Resource Block Allocation scheme- a novel approach for balancing QoS in wireless mobile communication |
Feb2016 |
11 |
Sumit Mirase |
Latent Dirichlet Allocation Approach for Friend Recommendation in Microblogging System |
April 2016 |
12 |
Manjushree Masane |
Dynamic Virtual Machine Consolidation In Cloud data Centers Using clustering of PMs
|
April 2016 |
13 |
Sanmita Indurkar |
Performance Analysis Of Different MAC Protocol Varying Node Density(ND) inWireless Sensor Network(WSN)
|
April 2016 |
Year 2014-15 |
|||
1 |
Neelam Pokale |
A Novel Scalable Document Retrieval Approach Using Relational Keyword Search System |
March 2015 |
2 |
Aniket A. Yadav |
Mining Of Complex Data Using Combined Mining Approach |
March 2015 |
3 |
Omkar Bhalke |
Resource Allocation Scheme for Balancing QoS in Wireless Mobile Communication |
March 2015 |
4 |
Pooja Mundhe |
Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network |
March 2015 |
5 |
Pagar Arati V. |
Co-operative Diversity in Wireless Ad Hoc Network Using MAC Protocol |
March 2015 |
6 |
Sonali Tupe |
ECA: Evolutionary Computing Algorithm for E-Healthcare Information System |
March 2015 |
7 |
Shakil B. Tamboli |
A Novel Approach for Data Intensive Caching for Big Data Application Using Hadoop Framework |
March 2015 |
8 |
Aditi. A. Irkal |
Resource Bill Prediction and the Comparison System for Cloud Consumers to achieve Cost Effective Uses |
March 2015 |
9 |
Gauri Bandewar |
Enhancing Secure Access Control for Cloud Storage |
March 2015 |
10 |
Rajesaheb R. Kadam |
Secure Protocol Based Solution to Avoid Attacks on Live Virtual Machine Migration |
March 2015 |
11 |
Girish M. Wandhare |
Network Intrusion Detection technique for Regular Expression Detection using DPI in wireless network |
March 2015 |
12 |
Neha Pathak |
PTP Approach in Network Security for Misbehavior Detection |
March 2015 |
13 |
Ashvini Pawar |
Energy Efficient Face Tracking Scheme for Target Movement Detection in Wireless Sensor Networks |
March 2015 |
Year 2013-14 |
|||
1 |
Khushbu Samani |
“A Brief Review Of Segmentation Methods For Medical Images” |
Jan 2014
|
2 |
Khushbu Samani |
“Lagrangian Duality Technique For Improving Segmentation Of Medical Images Using Label Fusion” |
April 2014
|
3 |
Khushbu Samani |
“Improving Segmentation Of Medical Images Using Label Fusion And Lagranian Duality Technique”
|
Jun 2014
|
4 |
Aruna Singh |
“Survey on Insider Threat Detection” |
March 2014
|
5 |
Aruna Singh |
“Applying Modified K-Nearest Neighbor To Detect Insider Threat In Collaborative Information Systems” |
June 2014
|
6 |
Aruna Singh |
“Insider Threat Detection in Collaborative Information Systems” |
March 2014
|
7 |
Amarish Chaudhari |
“Spam Zombie Detection And Blocking Mechanism “ |
25th December 2013
|
8 |
Amarish Chaudhari |
“Spam Zombie Detection And Blocking Mechanism with Efficient Content Filtering Mechanism“ |
March 2014
|
9 |
Amarish Chaudhari |
“Spam Zombie Detection And Blocking With Efficient Content Filtering And User Feedback Mechanism“ |
July 2014
|
10 |
Komal Nazirkar |
“A Survey on Content Based Filtering of Undesirable Messages and Blocking of Misbehaving Users from OSN User Walls” |
Jan 2014
|
11 |
Komal Nazirkar |
“Filtering Of Undesirable Message & Blocking of Mechanism for OSN User Walls” |
March 2014
|
12 |
Komal Nazirkar |
“Implementation of Content based Filtering of Undesirable messages & Blocking mechanism for OSN Users”
|
July 2014
|
13 |
Radhika Bhosale |
“ Security flaws in an improved password authentication and update scheme based on Elliptic Curve Cryptography” |
23-24 Oct 2013s |
14 |
Radhika Bhosale |
Prevention Scheme for offline password guessing attack based on ECC |
March 2014
|
15 |
Radhika Bhosale |
Verifier based prevention for an offline password guessing attack using ECC |
July 2014
|
16 |
Dhanshri Joshi |
“Algorithmic Solution To Reduce Storage Overhead On Cloud Based System”
|
July 2014
|
17 |
Dhanshri Joshi |
“A Novel Scheme To Reduce Storage Overhead On Cloud System”
|
March 2014
|
18 |
Sagar Badjate
|
“Develop Efficient Technique of Cost Estimation Model for Software Applications”
|
Feb 2014
|
19 |
Sagar Badjate |
“Develop Hybrid Technique of Cost Estimation Model for Software Applications”
|
Oct13-March 2014
|
20 |
Vidya Chachar |
“Resource Utilization Algorithm For Green Cloud Computing with Global Collaboration” |
Oct13-March 2014
|
21 |
Vidya Chachar |
Energy Efficient Request Pool for Green Cloud Computing with Global Collaboration” |
July 2014
|
22 |
Snehal Sonawane |
“Load Distribution and Balancing over Cloud using Cloud Partitioning “ |
June 2014
|
23 |
Snehal Sonawane |
“Dynamic Load Distribution and Balancing using Cloud Partitioning ‘’ |
June 2014
|
24 |
Apurwa Khandare |
“Video Based Face Recognition: A Survey”
|
May 2014
|
25 |
Apurwa Khandare |
“Movie 2 Comics: With An Effective Script Face Mapping Through PCA Based Face Recognition”
|
June 2014
|
26 |
Apurwa Khandare |
“Movie 2 Comics: With An Effective Script Face Mapping Through PCA Based Face Recognition”
|
April 2014
|
27 |
Sayali Sapkal |
“Lossless Medical Image Compression”
|
Feb 2013
|
28 |
Sayali Sapkal |
“Development and Evolution of web Crawlers: current status and Future Perspectives” |
Feb 2013
|
29 |
Kirtimalini Kakade |
“Improving Efficiency of GEO-Distributed Data Sets using PACT”
|
June 2014
|
30 |
Kirtimalini Kakade |
“Implementation of Parallelization Contract Mechanism Extension of Map Reduce Framework for the Efficient Execution Time over Geo-distributed dataset” |
July 2014
|
31 |
Kirtimalini Kakade |
“Improving Efficiency Of Geo-Distributed System Using PACT” |
July 2014 |
Year 2012-13 |
|||
1 |
Chavan Sachindra |
Secure CRM Cloud Service using RC5 Algorithm |
Nov-13 |
2 |
Kale Sonali |
“Development of Multitenant SaaS Framework at single instance and with zero effort multitenancy” |
22-25 Aug. 2013 |
3 |
Kale Sonali |
Implementation of SaaS Multitenancy in cloud computing” |
Jan-13 |
4 |
Naskar Ankita |
Using Cloud Computing to provide Data Mining Services” |
29-31 Jan 2013 |
5 |
Naskar Ankita |
Using Cloud Computing to provide Data Mining Services |
Mar-13 |
6 |
Naskar Ankita |
Realization of Resourceful Data Mining Services Using Cloud Computing |
July 2013 |
7 |
Patil Pooja |
PHRModel using Cloud Computing and Attibute Based Encryption |
Mar-13 |
8 |
Sadafal Poonam |
Secure Clustering Algorithm for WSN |
22-24 Feb 13 |
9 |
Sadafal Poonam |
Secure Clustering Algorithm for WSN |
Dec-13 |
10 |
Salunkhe Rahul |
Anycast Technique to Maximize the Life time of WSN |
22-24 Feb 13 |
11 |
Salunkhe Rahul |
Energy Aware Anycast Technique to Maximize Life time of WSN |
Dec-13 |
12 |
Shivale Nitin |
CBSD Effort /Cost Estimation using Fuzzy Logic |
7-8 March 13 |
13 |
Shivale Nitin |
Comparision Study on methods of Software size measure |
Jun-13 |
14 |
Rina Waghmode |
A Collective Study of PCA and Neural Network Based on COCOMO for |
Jul-13 |