Research Publications

Sr. No. Name of Paper Name of PG student Name of Conference
1 Cardio Risk: A Novel Machine Learning Based Framework for Cardiac Health Forecasting Nilam Randive CSEAi2023 Springer
2 Machine Learning Based Hybrid Approach for Stock Analysis  Using LSTM and Random Forest Gauri Kadam CSEAi2023 Springer
3 Hybrid Techniques for Diabetic-Cardio Disease Prediction along with Privacy Preservation Rahul Kumbhar VISHWACON2023
4 Efficient & Secure Similarity Search for Encrypted Images over Cloud Komal Ghorpade ICRTST 2023
5 Diabetes Prediction using Machine Learning Algorithms Sneha Jadhav ICRTST 2023
6 Student Learning and Career Guidance Recommendation System Ujjwala Shinde ICMBDC, Pune
7 A Review of Different Security Mechanisms in Mobile Cloud Computing Prajakta Maralkar International Conference on “The future of work: Redefining Business Management in the Age of Automation & Artificial Intelligence”
8 Machine Learning Approaches for Stock Price Forecasting: A
Comprehensive Review
Gauri Kadam (ICIRPIS) – 2023
9 Predicting Heart Disease with Machine Learning: A Comprehensive Survey and Analysis Nilam Randive (ICIRPIS) – 2023
10 Improved Crop-Guru with Genetic Algorithm based Hyper parameter Optimization in Crop Diseases Detection using CNN Shital Waghmare ICCM 2023
11 Drone Detection System using Image Processing Sahil Kalaigar ICCM 2023
12 User Document Classification using Privacy-Preserving Data Mining Divyani Palankar ICCM 2023
13 A Framework for Effective and Accurate Diagnosis of Cardiovascular Disease and Treatment Using Ensemble Approach of Machine Learning Senha Kumbhar ICCM 2023
14 A Framework for Secure Database and Similarity Comparison in Android Aishwarya Phadtare ICMLBDA 2023
15 A Novel Framework for Detection of Objects from Video Using Deep Learning Technique Yasmeen Kasam Mulla ICDSAI – 2023
16 Development of Machine Learning Model using Least Square Support Vector Machine, Differential Evolution and Back Propagation Neural Network to Detect Breast Cancer Madhura Vankar SCI-2020
17 Mobile based personalized web search engine using Artificial Neural Networks and Ontology Learning Priyanka Rajebhosale ICISS-2018
18 Secure file storage using fragmentation for optimal performance on cloud sharayu powar ICISS-2018
19 Intelligent Reverse Dictionary based on clustering Padmini Shete  ICCUBEA, 2018
20 Building RMS for RD using Wordnet Padmini Shete iCATccT 2018
21 Automated Anomaly identification and failure diagnosis Swapnil Kadam ICCCCIT 2017
22 Automated Service Discovery and Classification of Web Services with Crawling in Digital Ecosystems Vaibhav Sawnt iCETETA 2017
23 Implementing and applying an indexing structure dominant graph for dominant relationship analysis Sandesh Dhawale iCETETA 2017
24 An efficient framework for privacy preserving in corelated data based on tree distribution approach Radhika Gore ICETETA 2017
25 Development of Machine Learning Model using Least Square Support Vector Machine, differential evolutional back propagation neural network to detect Breast Cancer Madhura Vankar iCETETA 2017
26 Identification of Website Key Objects by Combining eye-tracking technologies with web usage mining Rajesh Gade iCETETA 2017
27 An enhanced reversible data hiding techniques for coloured images Nilam Shaikh iCETETA 2017
28 A Review based Recommendation using Hadoop Sarika Khot NCETETA 2016
29 Privacy Preserving Access Control for Relational Data with Accuracy constrained Poonam Bhoite ICRIEM-16
30 Extracting brief note from Internet newspaper Suraj Karale IEEE , 2016
31 Many-to-Many Data Linkage using Multiple Class Clustering (MCCT): An Approach Priyanka Hankare NCETETA 2016
32 Mining infrequent item sets from text by applying recursive learning & fuzzy logic Prajakta V. Koti ERCICA 2016
33 Mining infrequent item sets from text by applying recursive learning & fuzzy logic Stanlee Nagaroor ERCICA 2016
34 Anomaly identification and failure diagnosis Swapnil Kadam CTRD 2k16
35 Enriching Quality of Text Clustering using Side Information Data Kajal R. Motwani NCETETA 2016
36 Insider Data Theft Prevention Using Behavior Profiling Mayuri Bhosale ICCCES -2016
37 Improving accuracy of mining infrequent item sets using recursive learning & Fuzzy Logic Prajakta V. Koti NCETETA 2016
38 Ontology based Access Control Mechanism for Relational Database using Fuzzy Logic Radhika Gore NCETETA 2016
39 Email Classification Using Combined Approach Stanlee Nagaroor NCETETA 2016
40 Implementation of Elastic AES Swati More ICCCES-2016
41 Privacy preserving auditing for shared data in cloud Kalyani Ghutugade  CAST, 2016
42 Finding the malicious URLs using Search Engines Amruta Nagaonkar INDIACom, 2016
43 Multi-user Multi-keyword privacy preserving ranked based search over encrypted cloud data Deepali Rane ICPC, 2015
44 Secure & Efficient data Retrieval in Cloud Computing Anuradha Meharwade NCETETA 2015
45 A Survey on Data Placement Scheme in Data Intensive Applications Sarika Khot NCETETA 2015
46 Automatic Semantic Classification and Categorization of Web Services in Digital Environment Vaibhav Sawant ICCCT, 2014
47 User Web Usage Mining for navigation improvisation using semantic related frequent patterns N. P. Jilhedar ICCCT, 2014
48 Implementation of PadSteg: A New Steganography method Dhanashri Dhobale WCSER 2014
49 De-duplication in Databases Madhuri Mane NCETETA, 2014
50 Web Service Integration using Different Syntactic Methods Praveen Patel NCETET-2013
51 Add-on Utility to make Google Docs more Secure Shivani Kale SICETE, 2013
52 Implementation of Secure Layer to enhance cloud usage Shivani Kale NCETETA, 2013
53 Cloud Computing for Improvement of Health System Poonum Sutar NCETETA, 2014
54 Improved grid service discovery with rough sets S. S. Howal MPGINMC-2012
55 Performance Comparison of DSDV , AODV , DSR , Routing protocols for MANETs S.D. Khatawkar IPCSIT , 2012
56 Performance Comparison of DSDV, AODV, DSR, Routing Protocols for MANETs S. D. Khatawkar CNCS, 2012
57 An Optimizing Technique for Error Detection in Cloud Computing Environment using CRC-32 Bit Algorithm Ravi Dalvi NCAIS,2012
58 Workflow Scheduling Algorithms for Cloud Computing Prajakta Mane NCAIS,2012
59 Data Security Mechanism for Cloud S. B. Patil  ICETT, 2011
60 Application Virtualization for Desktop Management Jayanti Jadhav NCAIS,2012
61 A Methodology for Extracting Head Contents from Meaningful Tables in Web Pages Madhuri Chavan ICCSNT, 2011
62 Public Verifiability of Stored Data in Cloud using
Disassembly of Data Segment
Sachin Patil 2011
63 User/Group policies, Security of TTP & Customizable Service Level Agreement to users in Cloud Computing Environment Mukesh More 2011
64 Secure Live Migration of Virtual Machine in Cloud Environment Varsha Patil 2011
65 Internet-worm Detection System using Netflow Vidya Mhaske-Dhamdhere NCAEM-2011
66 Graphical Password used for Data Security Vidya Mhaske-Dhamdhere ICST-2011
67 Anomaly Detection using Content Based Payload Partition A. R. Jakhale ICISET,2011
68 Detection of Routing Misbehaviour in MANETs S.D. Khatawkar IPCSIT , 2011
69 Three dimensional object used for data security Vidya Mhaske-Dhamdhere CICN-2010
70 Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance Dipali Patil ICM2ST-2010
71 Traffic Regulation on Wireless 802.11 Networks using Multiple Queue Techniques Radhika Dhanal ICM2ST-2010
72 Steganography by Hiding Data in TCP/IT Headers D.D. Dhobale ICACTE, 2010
73 Secure Control of Remote Electrical Devices using Mobile SMS Services Kishor Mane ICAETCT, 2010
74 Three dimensional password for Secure Authentication Vidya Mhaske-Dhamdhere NCPC-201o
75 Mechanism to mitigate App-DDoS Attacks on Web sites Manisha Patil ICCA, 2010
Sr.No. Name of Paper Name of the student Name of Journal
1 Student Learning and Career Guidance Reccomendation System: A Review Ujjwala Shinde Industrial Engineering Journal
2 Crop Guru : Deep Learning for Precise and Rapid Plant Disease Diagnosis Shital Waghmare Journal of Emerging Technologies and Innovative Research
3 Survey on Privacy Preserving using IoT Devices Shradha Nikam Journal of Emerging Technologies and Innovative Research
4 Diabetes Prediction Using Machine Learning Algorithms Sneha Jadhav Journal of Emerging Technologies and Innovative Research
5 Review on Encryption of Images onto Cloud Komal Ghorpade International Journal of Innovative Research in Technology
6 A Review of Different Approaches Used for Cardiovascular Disease Using Machine Learning Techniques Sneha Kumbhar Journal of Emerging Technologies and Innovative Research
7 Review of Different Techniques used for Cardio-Diabetic Disease Prediction Rahul Kumbhar Journal of Emerging Technologies and Innovative Research
8 A Review on Database Security Techniques used in Android Operating System Aishwarya Phadatare Journal of Emerging Technologies and Innovative Research
9 Detection of Objects in Video using Deep Learning Yasmeen Mulla IJRERD, 2020
10 Authentication system for identity verification in internet applications using content based image retrieval biometrics and text based passwords with virtual keyboard Rabiya Shaikh  IERJ 2019
11 Construction and Compression of the Social Inverted Index for Multiple Social Tagging Systems Vahida D. Havaldar IOSR-JCE , 2019
12 Multilevel Biometric Based Authentication System Rabiya Shaikh JETIR 2019
13 Intelligent Data Mining of Social Media for Improving Health Care Aradhana. S.Ghorpade IJIRSET, 2018
14 A review on Fragmentation and Replication related Security in Cloud Sharayu V. Powar JETIR  2018
15 A review on Artificial Neural Network and Ontology Learning in Mobile Technology Priyanka Rajebhosale JETIR 2018
16 Hybrid Recommendation Approach for Big Data Applications Pradip Patil IJIRSET , 2018
17 Heart Disease prediction system using naïve bayes data mining technique Amruta powar WJERT 2018
18 Hybrid Recommendation approach for big data applications Pradip Patil IJIRSET 2018
19 Analyse Engineering students Twitter post to understand issues and problems in their educational experiences S. D. Rane IJLTET, 2017
20 Mining Twitter Data of Rural Area Engineering Colleges for Understanding Issues and Problems in their Educational Experiences S. D. Rane IJRASET, 2017
21 Identification of website key objects by combining eye-tracking technologies with web usage mining Rajesh Gade IJERT 2017
22 State of the Art Analysis Approach for Identification of the Malignant URLs Amruta Nagaonkar IOSR-JCE
23 Survey on heart disease prediction system using data mining technique Amruta powar IJIERT 2017
24 Dominant Relationship Analysis using dominant graph Sandesh Dhawale IJESE 2017
25 Automated service Discovery and classification of web series with crawling in digital ecosystem Vaibhav Sawant IJERT, 2017
26 Development pf machine learning model using least square support vector machine, differential evolution and back propagation neural network to detect breast cancer Madhura vakar IJERT 2017
27 Survey on intelligent Data Mining of Social Media for improving health Care Aradhana S. Ghorpade IJCSIT, 2017
28 An Enhanced Reversible Data Hiding Technique for Coloured Images Nilam Shaikh IJRITCC, 2016
29 Website Personalization based on Link Analysis,
Navigational Patterns and Web Content
Atul Pawar IJCSIT, 2016
30 Extraction of Textual contents applying part whole relation with domain adoption techniques O. D. Joshi IJRERD, 2016
31 Privacy Preserving Access Control for Relational Data With Accuracy-Constrained Poonum Bhoite IJATES, 2016
32 Anomaly identification and failure diagnosis Swapnil Kadam IOSR-JCE, 2016
33 Moving circular range queries on the static data objects in location based advertising application Yogita Salavi IJARCCE, 2016
34 Enhancing Quality of Text Clustering based on Side Information data Kajal Motwani IJCRA
35 Semantic based crawling for automated service discovery and categorization of web services in digital environment Vaibhav Sawant IJETER, 2016
36 Location Based Advertising Promotions on Mobile Device Yogita Salavi IJCSIT, 2016
37 Robust and Effective Evil Twin Access Point Detection Technique at End User Side Vibhawari Nanavare IJIRSET, 2016
38 MCCT: An Approach for Many-to-Many Data Linkage Priyanka Hankare IJIRCCE , 2016
39 Boosting Associative Classifier for Protein Subcellular Localization L. A, Khandare IJSTM, 2015
40 Anomaly Response System for Relational Database System using Joint Administration Model K. K. Awale IRJET, 2015
41 Efficient Clustering of Web Documents Using Hybrid Approach in Datamining Pralhad Gamare IJRET, 2015
42 A survey on review based recommendation system Sarika Khot IJRITCC, 2015
43 Anomaly Detection and Response System for Relational Databases K. K. Awale IJERT, 2015
44 Enhancing Intrusion Detection using CRF and Layered Approached for Discussion forum Web Application Ketaki Mohan Patil CIIT-IJ , 2015
45 Integration of partial information hiding technology with multi-level trust privacy preserving data mining Rajashree Joshi IJIRSET, 2015
46 Dynamic Heterogeneous Data Processing in IAAS Cloud Sunny Mohite IJACSCC, 2015
47 Implementation of Distributed Variable Chunk based Switching in Peer to Peer Network Shambhuraj Deshmukh IJCA, 2015
48 System Monitoring using Software Entropy Rahul Lokhande IJARECE, 2015
49 Web document clustering using hybrid approach in data mining Pralhad Gamare IJRAT, 2015
50 Data hiding with multiple network protocol usage Dhanashri Dhobale IJARCCE, 2015
51 Software theft detection for javascript programs based on dynamic birthmark extracted from runtime heap graph Somanath Salunkhe IOSR-JCE, 2015
52 Protection of sensitive data for multi-level trust privacy preserving data mining Rajashree Joshi IJIRSET, 2015
53 Extending Oauth 2.0 Protocol to Enable Fine Grained Authorization Recommendation Using Multi – criteria Recommendation System Priyanka Bhosale IJAERD , 2015
54 WEB Service Integration using Knowledge Discovery in Service (KDS) Praveenkumar Patel IJMCR, 2015
55 Website personalization based on link analysis, navigation patterns and web content Atul Pawar IJCSIT, 2016
56 Context Aware Video Annotation using Linked Data and Search Educational Video Resources for Supporting Distance Learning Prasad Phalle IJARET, 2016
57 Meaningful and unexpanded shares for visual secret sharing schemes Mr. V.B Phadtare IJIERT ,2015
58 Different Syntactic Methods and Clustering for Web Service Integration Praveenkumar Patel IJIRCCE, 2015
59 Secure and Efficient Data Retrieval in Cloud Computing Anuradha N. M. IJERT, 2015
60 Embedded Based Monitoring and Controlling energy efficient wireless sensor network system using distance vector protocol P. T. Shitole IJRITCC, 2014
61 Protein Subcellular Localization Prediction through Boosting Associative Classification L. A, Khandare IJATES, 2014
62 Efficient Retrieval of Aggregate Data in Uncertain and Probabilistic Databases V.V. Kheradkar IJETT, 2014
63 Cloud Computing for Mobile Application Mandar Kekade IJARCSSE, 2014
64 Enhancing File and System Security by adding Loadable Kernel Module for Removable Storage Device Deepak Mahajan IJATES, 2014
65 Secure data communication using image encryption & compression Y. M. Kambale IJARCCE, 2014
66 A Secure Keyless Colored Image Encryption Nilam Shaikh IJATES, 2014
67 Trusted Third Party Service For Secure Cloud Data R.S. Nejkar IJRET ,2014
68 Data hiding in encrypted compressed image using improved LSB technique Y. M. Kambale IJARCSSE, 2014
69 An efficient data mining approach for complex clone detection in software Swarupa Bongale IJARCSSE, 2014
70 Implementation of Homeostasis at Network Level Ranjita Patil IJMTER, 2014
71 Semantic Similarity Measure using Combination of Random Indexing and Latent Semantic Analysis Meenakshi Patil IJERT, 2013
72 A Overview od Advanced Network Protocol Steganography Dhanashri Dhobale IJARCC, 2013
73 Near Duplicate Detection In Relational Database Bhagyashri Kelkar IJERT , 2013
74 A Novel Approach for Recognized and Overcrowding of Terrorist Websites P. S. Landge IJETT, 2013
75 Implementation of Data Privacy and Query Optimization in Data Providing Service Composition Rashmi Kulkarni IJCSI , 2013
76 Enriching Search Results Using Ontology Shobha B. Patil IJCET , 2013
77 Preserving Privacy using Gradient Descent Methods Applied for Neural Network with Distributed Datasets Sachin Yadav IJCSI, 2013
78 Add-on Utility to make Google Docs more Secure Shivani Kale IOSRJCE, 2013
79 Automation of Warranty Management System for small-scale Manufacturing Industry Onkar Joshi IJERA, 2012
80 Cloud Computing Support for Enhanced Health Applications Poonum Sutar IJEIT, 2012
81 Identifying Nearly Duplicate Records in Relational Datatbase Bhagyashri Kelkar IJCSITS , 2012
82 Search Result Optimization using Annotors Vishal Kamble IJSR , 2012
83 Parallel request handling for grid service discovery with rough sets S. S. Howal IJEIT, 2012
84 Improved handover performance by integration of fast handover in hierarchical setup Dipali Patil IRACST, 2012
85 Improved grid service discovery with rough sets S. S. Howal IJCA, 2012
86 Privacy Management in Cloud by making use of
Homomorphic Functions
S. G. Sutar IJCA, 2012
87 A novel approach for social network analysis & web mining for counter terrorism P.S. Landge IJCSE, 2012
88 Data Integrity Check in Cloud using Dispersal Code S. P. Patil IJERT, 2012
89 Migrating process and virtual machine in the cloud: Load balancing and security perspectives Varsha Patil IJACSIT, 2012
90 Auto Monitoring Energy-Efficient Wireless Sensor Network System for Graph Farmland Pramod Shitole IJARCSEE, 2012
91 Retransmission Steganography in Handling Oversized IP Packets Dhanashri Dhobale IJCTE, 2011
92 Data Security Mechanism for Cloud S. B. Patil IJCA, 2011
93 Variable Chunk based Parallel Switching to Minimizing File Download Time in P2P Network Shambhuraj Deshmukh IJCSI, 2011
94 Mitigating App-DDoS Attacks on Web Servers Manisha Patil IJCST, 2011
1 Harnessing Machine Learning for Heart Discese Prediction and Risk Evaluation Nilam Randive L-130603/2023
2 Similarity Search for Encrypted ImaGES IN Secure Cloud Computing Komal Ghorpade L-133842/2023
3 Drone Detection using Machine Learning and Image Processing Sahil Kalaigar L-132983/2023
4 Synergistic Predictive Modeling: LSTM and Random Forest Fusion for Stock Price Forecasting using Machine Learning Gauri Kadam L-130872/2023
5 Confidential Health Gradian: A Cutting-edge System for Predicting Diabetic Cardiovascular Risks with Fully Homomorphic Encryption and Fog Computing Rahul Kumbhar L-43205/2024
6 Student Learning and Career Guidance Recommention System Ujjwala Shinde Diary No 20807/2023-CO/L
7 Diabetic Prediction using Machine Learning Algorithm Sneha Jadhav Diary No 19980/2023-CO/L
8 Smart Agriculture: Depp Learning based Crop Discese Detection and Pesticide Recommendation System Shital Waghmare Diary No 20062/2023-CO/L