Department of Computer Engineering List of Publications 2011-12 1 E-visitor information management system for banking system National conference on Emerging Technologies & Applications Sciences,Saraswati COE, Navi Mumbai, Feb 3-4,2011 in Engineering & 2 Overview of video Watermarking National Conference on Nascent Trends in Information Technologies and Communication Technologies, equinox 11, 27- 29/9/2011 3 Survey on Content Based Image Retrieval Using Relevance Feedback National Conference on Nascent Trends in Information Technologies and Communication Technologies, equinox 11, 27- 29 Sept, 2011 4 Multi Modal Image Fusion and its Applications National Conference on Nascent Trends in Information Technologies and Communication Technologies, equinox 11, 27- 29 Sept, 2011 5 A study on relationship between shooting conditions and cardboard effect of stereoscopic images International Conference on recent trends in technology, TCET, Mumbai, 2012, pp.600-604 6 Resolution Enhancement Techniques for Satellite Images International Conference on recent trends in technology, TCET, Mumbai, 2012. 7 Remote monitoring system based on embedded web server National conference RACEM, Vidyalankar Institute of Technology, pp 12-15, April-12 8 Smart agriculture model using sensor network with context aware grid computing National conference, RACEM,Vidyalankar Institute of Technology,pp 28-32, April 2012 9 Performance evaluation of a Wi-Max IEEE 802.16e standard based on BER International conference held at ICMARS, Jodhpur,pp. 181- December 2011 10 Context aware sensor grid for agriculture International conference held at ICMARS, Jodhpur pp 211-213, December 2011 11 Acute leukaemia blast counting using RGB, HSI color spaces IJCA and proceedings of ICCIA 2012, Nashik on 7th&8thFebruary 2012. 12 Comparison of acute leukaemia image segmentation using RGB,HSI and YUV color spaces International conference & Workshop on Recent Trends in Technology 24th&25thFebruary, 2012 at Thakur college of Engineering pp. 33-36. 13 XML Data Mining using XQuery and Improved Apriori Algorithm International Journal of Advanced Research in Computer science IJARCS,Volume 3,No 3,MayJune 2012 14 XML Data Mining using XQuery and Apriori Algorithm International Conference & Workshop on Emerging Trends in Technology : ICWET 2012, at Thakur College of Engg., Kandivali, pp 905-908, February 24-25, 2012 15 A survey of Hash based approach for Apriori algorithm International Conference on computational intelligence and engineering applications ICCIEA 2011, pp 84-87, October 16-17, 2011 16 A Review on Handwritten Document Recognition System IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET), pp. 35-42, 2012 TCET Mumbai. Published by Foundation of Computer Science (ISBN: 978-0-615-58717-2) 17 Text Line Segmentation of Handwritten Document National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th September, 2011 18 Survey of color Visual crytophy National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th September 2011 pp. 4-7 19 An implementation of secure file transfer using Blowfish Cryptosystem National Conference-Equinox, Terna Engineering College, Nerul, Navi Mumbai, 27th to 29th September 2011 pp. 106-108 2012-13 1 Recognition on Road Vehicle Based on EDA Approach International Journal of Scientific Research in Computer Sci. Applications and Management Studies, Volume 2, Issue 3, May-2013 2 Survey on Estimation of Distribution Algorithm Techniques International Research Journal of Computer Science Engineering and Applications, Volume II and Issue V, May-2013 3 Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining International Journal of Recent Trends in Engineering & Technology [ISSN: 2158-5563 (online)] by the ACEEE, USA. 4 Performance Evaluation of Phish Mail Guard: Phishing Mail Detection Technique by using Textual and URL analysis International Journal of Recent Trends in Engineering & Technology [ISSN: 2158-5563 (online)] by the ACEEE, USA. 5 Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile relay International Journal of Infinite Innovations in Technology, Vol. 1, Issue 2, ISSN:2278-9057 6 Incremental Frequent Pattern Mining International Journal of Engineering and Advanced Technology (IJEAT)Volume-1, Issue-6, August 2012 7 Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis World Congress on Information and Communication Technologies (WICT-2012), 30th Oct - 2nd Nov 2012, Trivandrum, India Published in IEEE Xplore 8 Cooperative Security Agents for MANET WICT-2012, 30th Oct - 2nd Nov 2012, Trivandrum, India, Published in IEEE Xplore 9 A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack 4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India. 10 Privacy Preserving in Data Mining Using Hybrid Approach IEEECICN2012 during 3-5 Nov-2012, Mathura, India. Published in IEEE Xplore 11 Hybrid Approach for DB Intrusion Detection with Reactive Policies IEEECICN2012 during 3-5 Nov-2012, Mathura, India. Published in IEEE Xplore 12 Comparing performance of Collaborative Filtering Algorithms International Conference on Communication, Information and Computing Technology (ICCICT2012), SPIT, Mumbai, October 19-20, 2012, Published in IEEE Xplore. 13 Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm ICCICT-2012, SPIT, Mumbai, October 19-20, 2012, to be Published in IEEE Xplore. 14 Energy Efficient Protocol for Wireless Co-operative Sensor Network International Journal of Informatics and Communication Technology, 2012. ISSN: 2252-8776 15 Agriculture System Based on Ontology Agrosearch International Journal of Emerging technology and Advanced Engineering(IJETAE),Vol-2,Issue8,August-2012,ISSN:2250-2459 16 Survey on Ontology Tools International Journal of Scientific Research in Computer Science Applications and management studies, Vol-1, Issue-3, Nov-2012,ISSN 2319-1953 17 A survey on code Injection Buffer Overflow Attack International Conference & Workshop on Recent Trends in Technology-2012 2012),Mumbai, 2012 (TCET 18 Code Injection Buffer Overflow Attack Blocker International Journal of Electronics communication and Computer Engineering (IJECCE), Vol -3, Issue- 4, July-2012, ISSN: 2278-4209. 19 Data Leakage and Detection of Guilty Agents International Journal of Scientific And Engineering Research (IJSER),vol-3, issue-6, June 2012. 20 Detection of Data Leakage and Guilty Agents National conference on “Advances in Computer Science & Information security (ACSIS-12) “, Jan 6-7,2012 Manipal Institute of Technology,2012 21 Video Fingerprint Extraction Using TIRI – DCT International Journal of Engineering Research and Development, Volume 7, Issue 4, May 2013,pp 19-23 ijerd.com 22 A Novel Schema to Break Video CAPTCHA International Journal of Scientific Research in Computer Science Applications and Management Studies, IJSRCSAMS, Volume 2, Issue 3 May 2013, ISSN 2319 – 1953 23 Content Based Medical Image Retrieval using Relevance Feedback National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 24 Deblurring of Natural Images National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 Content Based Fingerprint Extraction Using TIRI-DCT National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 25 26 Mobile Reverse Auction Agent SystemMoRAAS National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 27 Blob coloring based Indian Car Number Plate Recognition system using Support Vector Machine National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 28 PAV: Parking Allotment for Vehicles usingVANET International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 2 March 2013 29 TIRI-DCT based Video Copy Detection System International Journal of Engineering and Applications Vol.2, Issue 6, Nov Dec 2012 30 Web Application Vulnerabilities International Conference on Advanced Computer Engineering and Applications, ICACEA-2012, by IRD, India at Bhopal on 30th Sept.- 2012 31 CBIR Retrieval from Multimedia Information International Journal of Scientific Research in Computer Science Applications and Management Studies, IJSRCSAMS, ISSN 2319 - 1953 Vol 1, Issue 2 (Sept 2012) 32 Evaluation of Distance Vector Routing protocols and Opposite Direction Routing method for Different Road topologies in VANET International Journal of Computer applications (IJCA), ISSN: 973-93-80872-72-74-0, pp.19-26 Vol.-11-ICRTITCS, February, 2013 33 A Survey On Vehicular Mobility Modeling: Flow Modeling International Journal of Communication and Network Security (IJCN) ISSN: 2231 – 1882, Volume-1, Issue-4, December 2012. 34 Road Topology based Performance Analysis of Distance Vector Routing Protocols in VANET International conference on Advanced Computer Science and Information technology held in Pune on 20th-21st Oct 2012. 35 Change Detection in Satellite Images National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 36 Forensic Sketch to Photo Matching National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 37 Resolution Enhancement of Satellite images International Conference on Advanced Computing, TCET, Mumbai, 2013, pp.43-46 38 Blob coloring based Indian car number plate recognition using Support Vector Machine National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 39 Deblurring of Natural Images Equinox, TEC,11thto 13th March, 2013 40 Virtual Mouse Control Gaze Tracking International Conference on Emerging Trends in Technology and It’s Application, Yadavrao Tasgaonkar College of Engg.6-7 March 2013 41 Comparative study of Data Mining Techniques for Image Classification International Conference on Electronics, Electrical and Computer Science, Sept-2012. 42 PIC 18 based PC as an oscilloscope” at “PIC 18 based PC as an oscilloscope National Level Conference on technology for physically challenged , LTCOE, 13 Oct 2012 43 Secure Routing Protocols for MANET IJSRCSAMS , January- 2013 44 Hiding Secret Information using Efficient Audio Steganography Method. ICETTA, March-2013 45 Efficient Framework for Analyzing Coverage Expansion with Capacity Improvement Using Mobile Relay IJIIT, October- 2012 46 Spam detection and Filtering Using Different Methods IJCA, September 2012, National Conference on Recent Trends in Computer Science, Jawaharlal Darda Institute of Engg. and Technology, Yavatmal. 47 Survey of Restoration Techniques IJSRCSAMS, Vol 1 and Issue-3,November 2012 Spam detection using Email Abstraction” 48 International Conference on “Emerging Trends in Technology and its Application”, ICETTA-2013, 06-07/March/2013. 49 Restoring Natural Images International Conference on Computer Science and Engineering-2013, Pune. 50 Image Segmentation using Fast SRG Algorithm International Conference on Emerging Trends in Technology and It’s Application, Yadavrao Tasgaonkar College of Engg.6-7 March 2013 51 A Survey on Data Dissemination in VANET International Conference on Advanced Computer Sciences, Communication and information Technologies, Pune, Sept-2012 52 Evaluation of Distance Vector Routing protocols and Opposite Direction Routing method for Different Road topologies in VANET International Journal of Computer applications (IJCA), ISSN: 973-93-80872-72-74-0, pp.19-26 Vol.-11-ICRTITCS, February, 2013 53 A Survey On Vehicular Mobility Modeling: Flow Modeling International Journal of Communication and Network Security (IJCN) ISSN: 2231 – 1882, Volume-1, Issue-4, December 2012. 54 Road Topology based Performance Analysis of Distance Vector Routing Protocols in VANET International conference on Advanced Computer Science and Information technology held in Pune on 20th-21st Oct 2012. 55 Survey on Satellite Image Classification usingNeural Network International Conference on Electrical Engineering & Computer Science, Chennai, 25th Nov 2012, ISBN:978-93-82208-38-9 pp.75-78 Mobile reverse Auction Agent System National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11thto 13th March, 2013 56 57 Survey of Energy-efficient MAC protocols for Wireless Sensor Network National Conference on Nascent Trends in Information & communication Technologies, Equinox, TEC,11th to 13th March, 2013 2013-14 1 Feature and Opinion Identification for Online Digital Camera Reviews International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014 2 A Genetic Approach for Processor Scheduling IEEE International Conference on Recent Advances & Innovations in Engg. Poornima University, Jaipur, 09 – 11, May 2014. 3 Detecting and Avoiding Black Hole Attack in the MANETs International Conference on Emerging Trends in Technology and it's Applications, YTCEM, Karjat, 7th& 8th March 2014. 4 Dynamic Quantum based Genetic Round Robin Algorithm International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, March 2014 5 Decision Trees for Uncertain Data Mining International Journal of Advanced and Innovative Research, Volume 3, Issue 2, February 2014. 6 Clustering in Cloud Computing Environment International Journal of Advanced and Innovative Research, Volume 2, Issue 11, November 2013. 7 FITM: FEROM Informal Text Mining International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2, Issue 5, pp. 7681, September-2013 8 Personalized Image Search Optimization International Journal of Advanced and Innovative Research, Vol. 2, No. 10, pp. 122-126, September-2013 9 Change Detection in Satellite Images Using DWT and PCA International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2 Issue 5, September-2013 10 Forensic sketch-Photo Matching using LFDA International Journal of soft computing & Engineering, volume 3, Issue 4, Sept-2013 11 Hybrid approach for credit card fraud detection International Journal of soft computing & Engineering, volume 3, Issue 4, September-2013 12 Forensic sketch to Mugshot Photo Matching International Research Journal of advanced and innovative research (IJAIR), Volume-2, issue-8, August 2013 13 Change Detection in Satellite Images Using PCA and K-means Clustering International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, Aug2013. 14 3D-Deformable Model Based Recognition and Labeling on Road Vehicle International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, Aug 2013. 15 A Survey of Satellite Image Enhancement Techniques International Journal of Advanced and Innovative Research (2278-7844)/ vol 2, Issue 8, pp. 131136, Aug 2013 16 Change Detection in Satellite Images Using DWT and PCA International Journal of Engineering Associates (2320 – 0804) / # 76 / Volume 2, Issue 5, pp. 7681, Sept-13 18 Android Based Continuous query Processing International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014 19 A Survey on Cross Site Scripting Attack Detection International Journal of Advanced and Innovative Research, Volume 2, Issue 11 November 2013 20 Restoration of Blurred Vehicle License Plates International Conference on Advances in Communication and Computing Technologies, PVPPCOE, Mumbai, 10-11 August – 2013 21 Performance Evaluation of CAPTCHA WORD RANKING Algorithm to Break Video CAPTCHA International Journal of Computer Application, Vol. 75, Issue 10 August 2013, ISSN: 0975-8887, pp 30-35 22 Localization & Segmentation of Indian Car Number Plate system: A Projection based Multistage Approach International Journal of Scientific and Engineering Research (IJSER), Volume 4, Issue7, July 2013 Edition (ISSN 2229-5518). 23 Image Fusion of Brain Images using Redundant Discrete Wavelet Transform IJCA, Volume 74/Number 4 2013 (ISBN: 973-93-80876-34-0)) 24 Automatic Wheelchair using gesture Recognition International Journal of engineering and innovative Technology, vol- 2, issue 9, March 2013 ISSN: 2277-3754 25 Location Based Services Cache Replacement Policy for Mobile Environment International Conference on Advances in Technology and Engineering( ICATE-2013), SVKM’s NMIMS, Mumbai, Jan 23-25,2013 26 Energy Efficient protocol for Clustered Cooperative Sensor Network International journal of Advanced Research in Computer Engineering & Technology (IJARCET),Vol-2,Issue-7,July-2013,PP-2351-2356. 27 Noval Approach for Localization of Indian Car Number Plate Recognition System using Support Vector Machine International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE),ISSN: 2277 128X, Volume 3, Issue 8,pp-179-183, August 2013 28 Robust Copy Move Forgery Detection International Journal of Advanced Innovative Research, Vol. 2, No. 8, pp. 202-206, August-2013. 29 Secure Data Transmission Through Steganography And RSA Cryptography For VOIP International Conference on Electrical Engineering and Computer Science, June- 2013 30 Hiding Secret Data Through Steganography in VOIP International Journal of Computer & Communication Technology, June-13 31 Synchronization in Mobile Devices International journal of Informatics and Communication Technology, August- 2013 32 Data Security through Steganography and Cryptography in VOIP National conference on Research Trends in Computer Science and Technology (NCRTCST), November-2013 33 Edge detection on various color space using Histogram Equalization International Conference on Computer Science and Mechanical Engineering (ICCSME), June2013 34 Dynamic Quantum based Genetic Round Robin Algorithm International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, March 2014 35 A Genetic Approach for Processor Scheduling IEEE International Conference On Recent Advances and Innovations in Engineering, Poornima University, Jaipur, India, 09-11, May –14, published in IEEE explore 36 Use of Information Tech. in health care sector for improving outcomes. International Journal of Basic and Clinical Pharmacology, vol. 3, issue 2, April 2014. 37 Satellite Image Classification using Neural Network and Support Vector Machine International Journal of Advanced and Innovative Research (2278-7844) Vol 2 Issue 10 pp. 77-79, October-2013 2014-15 1 Secure Routing against Control Packet Dropping Attack International Journal of Advanced and Innovative Research, Vol. 3, Issue 7, pp. 72-74, July-2014 2 Performance Evaluation of Decision Trees for Uncertain Data Mining International Journal of Emerging Trends & Technology in Computer Science (ISSN 2278-6858), Vol 3, Issue 6, December 2014. 3 Comparative Analysis of Methodologies used to address the MANET partitioning problems International Journal of Engineering and Research & Technology, ISSN: 2278-0181,Vol-4, Issue 5, May-2015 A Survey on Routing Protocols in Wireless Sensor Networks 1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 4 5 Web Structure Mining Using Breadth First Search with Page Rank Algorithm. 1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 6 Bigdata Analysis Using Columnar Database 1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 7 Self organizing approach for moving object detection and tracking for visual surveillance International Journal of Engineering and Technical Research (IJETR), Volume 2, Issue 5, ISSN 2321-0869. 8 Medical Image Segmentation Published in Journal of Advanced And Innovative Research, in IJAIR Volume 2, Issue 10 Oct 2013. 9 Aided Diagnosis System for Skin Cancer Detection International Conference on Engineering Confluence (Equinox-2014). TEC, Navi Mumbai, INDIA. 10 Artificial Neural Network for Skin Cancer Detection” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume 3, Issue 5, September - October 2014 11 4D Password: A Multifactor Authentication Technique 1st International Conference on Engineering Confluence (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 12 Comparative Analysis Of Web Page Ranking Algorithms 1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 13 Survey On Message filtering techniques International Journal of Advanced and Innovative Research, 2014 14 Continuous Query Processing in Location Based Services Accepted in IJSER Volume 5, Issue 10 October 2014. (impact factor 3.2) 15 Building Images with Implanting. 1st International conference on Engineering confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul 16 Mobile Tourism Application Based On Situation Awareness EQUINOX 2014- 1st International Conference on engineering confluence at Terna Engineering College, Nerul 17 An Efficient Packet Mechanism in Wireless Mobile Networks Using DCIM EQUINOX 2014- 1st International Conference on engineering confluence at Terna Engineering College, Nerul 18 Continuous Query Processing in Location Based Services Accepted in IJSER Volume 5, Issue 10 October 2014. (impact factor 3.2) 19 Human Action Retrieval using MESC Algorithm EQUINOX 2014- 1st International Conference on engineering confluence at TEC, Nerul 20 A Survey On Glaucoma Detection Techniques. EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering College, Nerul in 30 Sept-1 Oct 2014 21 Efficient communication approach inVehicular PKI”, International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 – Dec 2014. pp.215-220 22 Survey of Digital Image Authentication Techniques International Journal of Research in Advent Technology, Vol.2, No.7, July 2014E-ISSN:2321-9637 23 Ensuring Authenticity of Gray Scale Document Images EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering College, Nerul in 30 Sept-1 Oct 2014 24 A Secret sharing based method for ensuring authenticity of gray scale document images “International Journal of Engineering Research and General Science”, Volume 3, Issue 3, MayJune, 2015, ISSN 2091-2730 25 Efficient communication approach in Vehicular PKI International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 – Dec 2014. pp.215-220 26 Acknowledgement based Intrusion Detection System- A Review EQUINOX 2014- 1st International Conference on Engineering Confluence at Terna Engineering College, Nerul in 30 Sept-1 Oct 2014 27 Efficient communication approach in Vehicular PKI”, International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number 5 – Dec 2014.pp.215-220