- Terna Engineering College Nerul

advertisement
Department of Computer Engineering
List of Publications
2011-12
1
E-visitor information management system for banking system
National conference on Emerging Technologies & Applications
Sciences,Saraswati COE, Navi Mumbai, Feb 3-4,2011
in
Engineering
&
2
Overview of video Watermarking
National Conference on Nascent Trends in Information Technologies and Communication
Technologies, equinox 11, 27- 29/9/2011
3
Survey on Content Based Image Retrieval Using Relevance Feedback
National Conference on Nascent Trends in Information Technologies and Communication
Technologies, equinox 11, 27- 29 Sept, 2011
4
Multi Modal Image Fusion and its Applications
National Conference on Nascent Trends in Information Technologies and Communication
Technologies, equinox 11, 27- 29 Sept, 2011
5
A study on relationship between shooting conditions and cardboard effect of stereoscopic images
International Conference on recent trends in technology, TCET, Mumbai, 2012, pp.600-604
6
Resolution Enhancement Techniques for Satellite Images
International Conference on recent trends in technology, TCET, Mumbai, 2012.
7
Remote monitoring system based on embedded web server
National conference RACEM, Vidyalankar Institute of Technology, pp 12-15, April-12
8
Smart agriculture model using sensor network with context aware grid computing
National conference, RACEM,Vidyalankar Institute of Technology,pp 28-32, April 2012
9
Performance evaluation of a Wi-Max IEEE 802.16e standard based on BER
International conference held at ICMARS, Jodhpur,pp. 181- December 2011
10
Context aware sensor grid for agriculture
International conference held at ICMARS, Jodhpur pp 211-213, December 2011
11
Acute leukaemia blast counting using RGB, HSI color spaces
IJCA and proceedings of ICCIA 2012, Nashik on 7th&8thFebruary 2012.
12
Comparison of acute leukaemia image segmentation using RGB,HSI and YUV color spaces
International conference & Workshop on Recent Trends in Technology 24th&25thFebruary, 2012
at Thakur college of Engineering pp. 33-36.
13
XML Data Mining using XQuery and Improved Apriori Algorithm
International Journal of Advanced Research in Computer science IJARCS,Volume 3,No 3,MayJune 2012
14
XML Data Mining using XQuery and Apriori Algorithm
International Conference & Workshop on Emerging Trends in Technology : ICWET 2012, at
Thakur College of Engg., Kandivali, pp 905-908, February 24-25, 2012
15
A survey of Hash based approach for Apriori algorithm
International Conference on computational intelligence and engineering applications ICCIEA 2011,
pp 84-87, October 16-17, 2011
16
A Review on Handwritten Document Recognition System
IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology
(ICWET), pp. 35-42, 2012 TCET Mumbai. Published by Foundation of Computer Science (ISBN:
978-0-615-58717-2)
17
Text Line Segmentation of Handwritten Document
National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th
September, 2011
18
Survey of color Visual crytophy
National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th
September 2011 pp. 4-7
19
An implementation of secure file transfer using Blowfish Cryptosystem
National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th
September 2011 pp. 106-108
2012-13
1
Recognition on Road Vehicle Based on EDA Approach
International Journal of Scientific Research in Computer Sci. Applications and Management
Studies, Volume 2, Issue 3, May-2013
2
Survey on Estimation of Distribution Algorithm Techniques
International Research Journal of Computer Science Engineering and Applications, Volume II and
Issue V, May-2013
3
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
International Journal of Recent Trends in Engineering & Technology [ISSN: 2158-5563 (online)]
by the ACEEE, USA.
4
Performance Evaluation of Phish Mail Guard: Phishing Mail Detection Technique by using
Textual and URL analysis
International Journal of Recent Trends in Engineering & Technology [ISSN: 2158-5563 (online)]
by the ACEEE, USA.
5
Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using
Mobile relay
International Journal of Infinite Innovations in Technology, Vol. 1, Issue 2, ISSN:2278-9057
6
Incremental Frequent Pattern Mining
International Journal of Engineering and Advanced Technology (IJEAT)Volume-1, Issue-6,
August 2012
7
Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis
World Congress on Information and Communication Technologies (WICT-2012), 30th Oct - 2nd
Nov 2012, Trivandrum, India Published in IEEE Xplore
8
Cooperative Security Agents for MANET
WICT-2012, 30th Oct - 2nd Nov 2012, Trivandrum, India, Published in IEEE Xplore
9
A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack
4th International Conference on Advances in Recent Technologies in Communication and
Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India.
10
Privacy Preserving in Data Mining Using Hybrid Approach
IEEECICN2012 during 3-5 Nov-2012, Mathura, India. Published in IEEE Xplore
11
Hybrid Approach for DB Intrusion Detection with Reactive Policies
IEEECICN2012 during 3-5 Nov-2012, Mathura, India. Published in IEEE Xplore
12
Comparing performance of Collaborative Filtering Algorithms
International Conference on Communication, Information and Computing Technology (ICCICT2012), SPIT, Mumbai, October 19-20, 2012, Published in IEEE Xplore.
13
Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm
ICCICT-2012, SPIT, Mumbai, October 19-20, 2012, to be Published in IEEE Xplore.
14
Energy Efficient Protocol for Wireless Co-operative Sensor Network
International Journal of Informatics and Communication Technology, 2012. ISSN: 2252-8776
15
Agriculture System Based on Ontology Agrosearch
International Journal of Emerging technology and Advanced Engineering(IJETAE),Vol-2,Issue8,August-2012,ISSN:2250-2459
16
Survey on Ontology Tools
International Journal of Scientific Research in Computer Science Applications and management
studies, Vol-1, Issue-3, Nov-2012,ISSN 2319-1953
17
A survey on code Injection Buffer Overflow Attack
International Conference & Workshop on Recent Trends in Technology-2012
2012),Mumbai, 2012
(TCET
18
Code Injection Buffer Overflow Attack Blocker
International Journal of Electronics communication and Computer Engineering (IJECCE), Vol -3,
Issue- 4, July-2012, ISSN: 2278-4209.
19
Data Leakage and Detection of Guilty Agents
International Journal of Scientific And Engineering Research (IJSER),vol-3, issue-6, June 2012.
20
Detection of Data Leakage and Guilty Agents
National conference on “Advances in Computer Science & Information security (ACSIS-12) “, Jan
6-7,2012 Manipal Institute of Technology,2012
21
Video Fingerprint Extraction Using TIRI – DCT
International Journal of Engineering Research and Development, Volume 7, Issue 4, May 2013,pp
19-23 ijerd.com
22
A Novel Schema to Break Video CAPTCHA
International Journal of Scientific Research in Computer Science Applications and Management
Studies, IJSRCSAMS, Volume 2, Issue 3 May 2013, ISSN 2319 – 1953
23
Content Based Medical Image Retrieval using Relevance Feedback
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
24
Deblurring of Natural Images
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
Content Based Fingerprint Extraction Using TIRI-DCT
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
25
26
Mobile Reverse Auction Agent SystemMoRAAS
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
27
Blob coloring based Indian Car Number Plate Recognition system using Support Vector
Machine
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
28
PAV: Parking Allotment for Vehicles usingVANET
International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 2
March 2013
29
TIRI-DCT based Video Copy Detection System
International Journal of Engineering and Applications Vol.2, Issue 6, Nov Dec 2012
30
Web Application Vulnerabilities
International Conference on Advanced Computer Engineering and Applications, ICACEA-2012,
by IRD, India at Bhopal on 30th Sept.- 2012
31
CBIR Retrieval from Multimedia Information
International Journal of Scientific Research in Computer Science Applications and Management
Studies, IJSRCSAMS, ISSN 2319 - 1953 Vol 1, Issue 2 (Sept 2012)
32
Evaluation of Distance Vector Routing protocols and Opposite Direction Routing method for
Different Road topologies in VANET
International Journal of Computer applications (IJCA), ISSN: 973-93-80872-72-74-0, pp.19-26
Vol.-11-ICRTITCS, February, 2013
33
A Survey On Vehicular Mobility Modeling: Flow Modeling
International Journal of Communication and Network Security (IJCN) ISSN: 2231 – 1882,
Volume-1, Issue-4, December 2012.
34
Road Topology based Performance Analysis of Distance Vector Routing Protocols in VANET
International conference on Advanced Computer Science and Information technology held in Pune
on 20th-21st Oct 2012.
35
Change Detection in Satellite Images
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
36
Forensic Sketch to Photo Matching
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
37
Resolution Enhancement of Satellite images
International Conference on Advanced Computing, TCET, Mumbai, 2013, pp.43-46
38
Blob coloring based Indian car number plate recognition using Support Vector Machine
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
39
Deblurring of Natural Images
Equinox, TEC,11thto 13th March, 2013
40
Virtual Mouse Control Gaze Tracking
International Conference on Emerging Trends in Technology and It’s Application, Yadavrao
Tasgaonkar College of Engg.6-7 March 2013
41
Comparative study of Data Mining Techniques for Image Classification
International Conference on Electronics, Electrical and Computer Science, Sept-2012.
42
PIC 18 based PC as an oscilloscope” at “PIC 18 based PC as an oscilloscope
National Level Conference on technology for physically challenged , LTCOE, 13 Oct 2012
43
Secure Routing Protocols for MANET
IJSRCSAMS , January- 2013
44
Hiding Secret Information using Efficient Audio Steganography Method.
ICETTA, March-2013
45
Efficient Framework for Analyzing Coverage Expansion with Capacity Improvement Using
Mobile Relay
IJIIT, October- 2012
46
Spam detection and Filtering Using Different Methods
IJCA, September 2012, National Conference on Recent Trends in Computer Science, Jawaharlal
Darda Institute of Engg. and Technology, Yavatmal.
47
Survey of Restoration Techniques
IJSRCSAMS, Vol 1 and Issue-3,November 2012
Spam detection using Email Abstraction”
48
International Conference on “Emerging Trends in Technology and its Application”, ICETTA-2013,
06-07/March/2013.
49
Restoring Natural Images
International Conference on Computer Science and Engineering-2013, Pune.
50
Image Segmentation using Fast SRG Algorithm
International Conference on Emerging Trends in Technology and It’s Application, Yadavrao
Tasgaonkar College of Engg.6-7 March 2013
51
A Survey on Data Dissemination in VANET
International Conference on Advanced Computer Sciences, Communication and information
Technologies, Pune, Sept-2012
52
Evaluation of Distance Vector Routing protocols and Opposite Direction Routing method for
Different Road topologies in VANET
International Journal of Computer applications (IJCA), ISSN: 973-93-80872-72-74-0, pp.19-26
Vol.-11-ICRTITCS, February, 2013
53
A Survey On Vehicular Mobility Modeling: Flow Modeling
International Journal of Communication and Network Security (IJCN) ISSN: 2231 – 1882,
Volume-1, Issue-4, December 2012.
54
Road Topology based Performance Analysis of Distance Vector Routing Protocols in VANET
International conference on Advanced Computer Science and Information technology held in Pune
on 20th-21st Oct 2012.
55
Survey on Satellite Image Classification usingNeural Network
International Conference on Electrical Engineering & Computer Science, Chennai, 25th Nov 2012,
ISBN:978-93-82208-38-9 pp.75-78
Mobile reverse Auction Agent System
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11thto 13th March, 2013
56
57
Survey of Energy-efficient MAC protocols for Wireless Sensor Network
National Conference on Nascent Trends in Information & communication Technologies, Equinox,
TEC,11th to 13th March, 2013
2013-14
1
Feature and Opinion Identification for Online Digital Camera Reviews
International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 4, Issue 5, May 2014
2
A Genetic Approach for Processor Scheduling
IEEE International Conference on Recent Advances & Innovations in Engg. Poornima University,
Jaipur, 09 – 11, May 2014.
3
Detecting and Avoiding Black Hole Attack in the MANETs
International Conference on Emerging Trends in Technology and it's Applications, YTCEM,
Karjat, 7th& 8th March 2014.
4
Dynamic Quantum based Genetic Round Robin Algorithm
International Journal of Advanced Research in Computer and Communication Engineering, Vol.
3, Issue 03, March 2014
5
Decision Trees for Uncertain Data Mining
International Journal of Advanced and Innovative Research, Volume 3, Issue 2, February 2014.
6
Clustering in Cloud Computing Environment
International Journal of Advanced and Innovative Research, Volume 2, Issue 11, November 2013.
7
FITM: FEROM Informal Text Mining
International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2, Issue 5, pp. 7681, September-2013
8
Personalized Image Search Optimization
International Journal of Advanced and Innovative Research, Vol. 2, No. 10, pp. 122-126,
September-2013
9
Change Detection in Satellite Images Using DWT and PCA
International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2 Issue 5,
September-2013
10
Forensic sketch-Photo Matching using LFDA
International Journal of soft computing & Engineering, volume 3, Issue 4, Sept-2013
11
Hybrid approach for credit card fraud detection
International Journal of soft computing & Engineering, volume 3, Issue 4, September-2013
12
Forensic sketch to Mugshot Photo Matching
International Research Journal of advanced and innovative research (IJAIR), Volume-2, issue-8,
August 2013
13
Change Detection in Satellite Images Using PCA and K-means Clustering
International Conference on Advances in Communication and Computing Technologies,
PVPPCOE, 10-13, Aug2013.
14
3D-Deformable Model Based Recognition and Labeling on Road Vehicle
International Conference on Advances in Communication and Computing Technologies,
PVPPCOE, 10-13, Aug 2013.
15
A Survey of Satellite Image Enhancement Techniques
International Journal of Advanced and Innovative Research (2278-7844)/ vol 2, Issue 8, pp. 131136, Aug 2013
16
Change Detection in Satellite Images Using DWT and PCA
International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2, Issue 5, pp. 7681, Sept-13
18
Android Based Continuous query Processing
International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 4, Issue 5, May 2014
19
A Survey on Cross Site Scripting Attack Detection
International Journal of Advanced and Innovative Research, Volume 2, Issue 11 November 2013
20
Restoration of Blurred Vehicle License Plates
International Conference on Advances in Communication and Computing Technologies,
PVPPCOE, Mumbai, 10-11 August – 2013
21
Performance Evaluation of CAPTCHA WORD RANKING Algorithm to Break Video
CAPTCHA
International Journal of Computer Application, Vol. 75, Issue 10 August 2013, ISSN: 0975-8887,
pp 30-35
22
Localization & Segmentation of Indian Car Number Plate system: A Projection based
Multistage Approach
International Journal of Scientific and Engineering Research (IJSER), Volume 4, Issue7, July
2013 Edition (ISSN 2229-5518).
23
Image Fusion of Brain Images using Redundant Discrete Wavelet Transform
IJCA, Volume 74/Number 4 2013 (ISBN: 973-93-80876-34-0))
24
Automatic Wheelchair using gesture Recognition
International Journal of engineering and innovative Technology, vol- 2, issue 9, March 2013
ISSN: 2277-3754
25
Location Based Services Cache Replacement Policy for Mobile Environment
International Conference on Advances in Technology and Engineering( ICATE-2013), SVKM’s
NMIMS, Mumbai, Jan 23-25,2013
26
Energy Efficient protocol for Clustered Cooperative Sensor Network
International journal of Advanced Research in Computer Engineering & Technology
(IJARCET),Vol-2,Issue-7,July-2013,PP-2351-2356.
27
Noval Approach for Localization of Indian Car Number Plate Recognition System using
Support Vector Machine
International Journal of Advanced Research in Computer Science and Software
Engineering(IJARCSSE),ISSN: 2277 128X, Volume 3, Issue 8,pp-179-183, August 2013
28
Robust Copy Move Forgery Detection
International Journal of Advanced Innovative Research, Vol. 2, No. 8, pp. 202-206, August-2013.
29
Secure Data Transmission Through Steganography And RSA Cryptography For VOIP
International Conference on Electrical Engineering and Computer Science, June- 2013
30
Hiding Secret Data Through Steganography in VOIP
International Journal of Computer & Communication Technology, June-13
31
Synchronization in Mobile Devices
International journal of Informatics and Communication Technology, August- 2013
32
Data Security through Steganography and Cryptography in VOIP
National conference on Research Trends in Computer Science and Technology (NCRTCST),
November-2013
33
Edge detection on various color space using Histogram Equalization
International Conference on Computer Science and Mechanical Engineering (ICCSME), June2013
34
Dynamic Quantum based Genetic Round Robin Algorithm
International Journal of Advanced Research in Computer and Communication Engineering, Vol.
3, Issue 03, March 2014
35
A Genetic Approach for Processor Scheduling
IEEE International Conference On Recent Advances and Innovations in Engineering, Poornima
University, Jaipur, India, 09-11, May –14, published in IEEE explore
36
Use of Information Tech. in health care sector for improving outcomes.
International Journal of Basic and Clinical Pharmacology, vol. 3, issue 2, April 2014.
37
Satellite Image Classification using Neural Network and Support Vector Machine
International Journal of Advanced and Innovative Research (2278-7844) Vol 2 Issue 10 pp. 77-79,
October-2013
2014-15
1
Secure Routing against Control Packet Dropping Attack
International Journal of Advanced and Innovative Research, Vol. 3, Issue 7, pp. 72-74, July-2014
2
Performance Evaluation of Decision Trees for Uncertain Data Mining
International Journal of Emerging Trends & Technology in Computer Science (ISSN 2278-6858),
Vol 3, Issue 6, December 2014.
3
Comparative Analysis of Methodologies used to address the MANET partitioning problems
International Journal of Engineering and Research & Technology, ISSN: 2278-0181,Vol-4, Issue 5,
May-2015
A Survey on Routing Protocols in Wireless Sensor Networks
1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
4
5
Web Structure Mining Using Breadth First Search with Page Rank Algorithm.
1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
6
Bigdata Analysis Using Columnar Database
1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
7
Self organizing approach for moving object detection and tracking for visual surveillance
International Journal of Engineering and Technical Research (IJETR), Volume 2, Issue 5, ISSN
2321-0869.
8
Medical Image Segmentation
Published in Journal of Advanced And Innovative Research, in IJAIR Volume 2, Issue 10 Oct
2013.
9
Aided Diagnosis System for Skin Cancer Detection
International Conference on Engineering Confluence (Equinox-2014). TEC, Navi Mumbai,
INDIA.
10
Artificial Neural Network for Skin Cancer Detection”
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume
3, Issue 5, September - October 2014
11
4D Password: A Multifactor Authentication Technique
1st International Conference on Engineering Confluence (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
12
Comparative Analysis Of Web Page Ranking Algorithms
1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
13
Survey On Message filtering techniques
International Journal of Advanced and Innovative Research, 2014
14
Continuous Query Processing in Location Based Services
Accepted in IJSER Volume 5, Issue 10 October 2014. (impact factor 3.2)
15
Building Images with Implanting.
1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014,
TEC, Nerul
16
Mobile Tourism Application Based On Situation Awareness
EQUINOX 2014- 1st International Conference on engineering confluence at Terna Engineering
College, Nerul
17
An Efficient Packet Mechanism in Wireless Mobile Networks Using DCIM
EQUINOX 2014- 1st International Conference on engineering confluence at Terna Engineering
College, Nerul
18
Continuous Query Processing in Location Based Services
Accepted in IJSER Volume 5, Issue 10 October 2014. (impact factor 3.2)
19
Human Action Retrieval using MESC Algorithm
EQUINOX 2014- 1st International Conference on engineering confluence at TEC, Nerul
20
A Survey On Glaucoma Detection Techniques.
EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering
College, Nerul in 30 Sept-1 Oct 2014
21
Efficient communication approach inVehicular PKI”,
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 –
Dec 2014. pp.215-220
22
Survey of Digital Image Authentication Techniques
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014E-ISSN:2321-9637
23
Ensuring Authenticity of Gray Scale Document Images
EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering
College, Nerul in 30 Sept-1 Oct 2014
24
A Secret sharing based method for ensuring authenticity of gray scale document images
“International Journal of Engineering Research and General Science”, Volume 3, Issue 3, MayJune, 2015, ISSN 2091-2730
25
Efficient communication approach in Vehicular PKI
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 –
Dec 2014. pp.215-220
26
Acknowledgement based Intrusion Detection System- A Review
EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering
College, Nerul in 30 Sept-1 Oct 2014
27
Efficient communication approach in Vehicular PKI”,
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 –
Dec 2014.pp.215-220
Download