Sr. No. | Name of Paper | Name of PG student | Name of Conference |
1 | Cardio Risk: A Novel Machine Learning Based Framework for Cardiac Health Forecasting | Nilam Randive | CSEAi2023 Springer |
2 | Machine Learning Based Hybrid Approach for Stock Analysis Using LSTM and Random Forest | Gauri Kadam | CSEAi2023 Springer |
3 | Hybrid Techniques for Diabetic-Cardio Disease Prediction along with Privacy Preservation | Rahul Kumbhar | VISHWACON2023 |
4 | Efficient & Secure Similarity Search for Encrypted Images over Cloud | Komal Ghorpade | ICRTST 2023 |
5 | Diabetes Prediction using Machine Learning Algorithms | Sneha Jadhav | ICRTST 2023 |
6 | Student Learning and Career Guidance Recommendation System | Ujjwala Shinde | ICMBDC, Pune |
7 | A Review of Different Security Mechanisms in Mobile Cloud Computing | Prajakta Maralkar | International Conference on “The future of work: Redefining Business Management in the Age of Automation & Artificial Intelligence” |
8 | Machine Learning Approaches for Stock Price Forecasting: A Comprehensive Review |
Gauri Kadam | (ICIRPIS) – 2023 |
9 | Predicting Heart Disease with Machine Learning: A Comprehensive Survey and Analysis | Nilam Randive | (ICIRPIS) – 2023 |
10 | Improved Crop-Guru with Genetic Algorithm based Hyper parameter Optimization in Crop Diseases Detection using CNN | Shital Waghmare | ICCM 2023 |
11 | Drone Detection System using Image Processing | Sahil Kalaigar | ICCM 2023 |
12 | User Document Classification using Privacy-Preserving Data Mining | Divyani Palankar | ICCM 2023 |
13 | A Framework for Effective and Accurate Diagnosis of Cardiovascular Disease and Treatment Using Ensemble Approach of Machine Learning | Senha Kumbhar | ICCM 2023 |
14 | A Framework for Secure Database and Similarity Comparison in Android | Aishwarya Phadtare | ICMLBDA 2023 |
15 | A Novel Framework for Detection of Objects from Video Using Deep Learning Technique | Yasmeen Kasam Mulla | ICDSAI – 2023 |
16 | Development of Machine Learning Model using Least Square Support Vector Machine, Differential Evolution and Back Propagation Neural Network to Detect Breast Cancer | Madhura Vankar | SCI-2020 |
17 | Mobile based personalized web search engine using Artificial Neural Networks and Ontology Learning | Priyanka Rajebhosale | ICISS-2018 |
18 | Secure file storage using fragmentation for optimal performance on cloud | sharayu powar | ICISS-2018 |
19 | Intelligent Reverse Dictionary based on clustering | Padmini Shete | ICCUBEA, 2018 |
20 | Building RMS for RD using Wordnet | Padmini Shete | iCATccT 2018 |
21 | Automated Anomaly identification and failure diagnosis | Swapnil Kadam | ICCCCIT 2017 |
22 | Automated Service Discovery and Classification of Web Services with Crawling in Digital Ecosystems | Vaibhav Sawnt | iCETETA 2017 |
23 | Implementing and applying an indexing structure dominant graph for dominant relationship analysis | Sandesh Dhawale | iCETETA 2017 |
24 | An efficient framework for privacy preserving in corelated data based on tree distribution approach | Radhika Gore | ICETETA 2017 |
25 | Development of Machine Learning Model using Least Square Support Vector Machine, differential evolutional back propagation neural network to detect Breast Cancer | Madhura Vankar | iCETETA 2017 |
26 | Identification of Website Key Objects by Combining eye-tracking technologies with web usage mining | Rajesh Gade | iCETETA 2017 |
27 | An enhanced reversible data hiding techniques for coloured images | Nilam Shaikh | iCETETA 2017 |
28 | A Review based Recommendation using Hadoop | Sarika Khot | NCETETA 2016 |
29 | Privacy Preserving Access Control for Relational Data with Accuracy constrained | Poonam Bhoite | ICRIEM-16 |
30 | Extracting brief note from Internet newspaper | Suraj Karale | IEEE , 2016 |
31 | Many-to-Many Data Linkage using Multiple Class Clustering (MCCT): An Approach | Priyanka Hankare | NCETETA 2016 |
32 | Mining infrequent item sets from text by applying recursive learning & fuzzy logic | Prajakta V. Koti | ERCICA 2016 |
33 | Mining infrequent item sets from text by applying recursive learning & fuzzy logic | Stanlee Nagaroor | ERCICA 2016 |
34 | Anomaly identification and failure diagnosis | Swapnil Kadam | CTRD 2k16 |
35 | Enriching Quality of Text Clustering using Side Information Data | Kajal R. Motwani | NCETETA 2016 |
36 | Insider Data Theft Prevention Using Behavior Profiling | Mayuri Bhosale | ICCCES -2016 |
37 | Improving accuracy of mining infrequent item sets using recursive learning & Fuzzy Logic | Prajakta V. Koti | NCETETA 2016 |
38 | Ontology based Access Control Mechanism for Relational Database using Fuzzy Logic | Radhika Gore | NCETETA 2016 |
39 | Email Classification Using Combined Approach | Stanlee Nagaroor | NCETETA 2016 |
40 | Implementation of Elastic AES | Swati More | ICCCES-2016 |
41 | Privacy preserving auditing for shared data in cloud | Kalyani Ghutugade | CAST, 2016 |
42 | Finding the malicious URLs using Search Engines | Amruta Nagaonkar | INDIACom, 2016 |
43 | Multi-user Multi-keyword privacy preserving ranked based search over encrypted cloud data | Deepali Rane | ICPC, 2015 |
44 | Secure & Efficient data Retrieval in Cloud Computing | Anuradha Meharwade | NCETETA 2015 |
45 | A Survey on Data Placement Scheme in Data Intensive Applications | Sarika Khot | NCETETA 2015 |
46 | Automatic Semantic Classification and Categorization of Web Services in Digital Environment | Vaibhav Sawant | ICCCT, 2014 |
47 | User Web Usage Mining for navigation improvisation using semantic related frequent patterns | N. P. Jilhedar | ICCCT, 2014 |
48 | Implementation of PadSteg: A New Steganography method | Dhanashri Dhobale | WCSER 2014 |
49 | De-duplication in Databases | Madhuri Mane | NCETETA, 2014 |
50 | Web Service Integration using Different Syntactic Methods | Praveen Patel | NCETET-2013 |
51 | Add-on Utility to make Google Docs more Secure | Shivani Kale | SICETE, 2013 |
52 | Implementation of Secure Layer to enhance cloud usage | Shivani Kale | NCETETA, 2013 |
53 | Cloud Computing for Improvement of Health System | Poonum Sutar | NCETETA, 2014 |
54 | Improved grid service discovery with rough sets | S. S. Howal | MPGINMC-2012 |
55 | Performance Comparison of DSDV , AODV , DSR , Routing protocols for MANETs | S.D. Khatawkar | IPCSIT , 2012 |
56 | Performance Comparison of DSDV, AODV, DSR, Routing Protocols for MANETs | S. D. Khatawkar | CNCS, 2012 |
57 | An Optimizing Technique for Error Detection in Cloud Computing Environment using CRC-32 Bit Algorithm | Ravi Dalvi | NCAIS,2012 |
58 | Workflow Scheduling Algorithms for Cloud Computing | Prajakta Mane | NCAIS,2012 |
59 | Data Security Mechanism for Cloud | S. B. Patil | ICETT, 2011 |
60 | Application Virtualization for Desktop Management | Jayanti Jadhav | NCAIS,2012 |
61 | A Methodology for Extracting Head Contents from Meaningful Tables in Web Pages | Madhuri Chavan | ICCSNT, 2011 |
62 | Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment |
Sachin Patil | 2011 |
63 | User/Group policies, Security of TTP & Customizable Service Level Agreement to users in Cloud Computing Environment | Mukesh More | 2011 |
64 | Secure Live Migration of Virtual Machine in Cloud Environment | Varsha Patil | 2011 |
65 | Internet-worm Detection System using Netflow | Vidya Mhaske-Dhamdhere | NCAEM-2011 |
66 | Graphical Password used for Data Security | Vidya Mhaske-Dhamdhere | ICST-2011 |
67 | Anomaly Detection using Content Based Payload Partition | A. R. Jakhale | ICISET,2011 |
68 | Detection of Routing Misbehaviour in MANETs | S.D. Khatawkar | IPCSIT , 2011 |
69 | Three dimensional object used for data security | Vidya Mhaske-Dhamdhere | CICN-2010 |
70 | Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance | Dipali Patil | ICM2ST-2010 |
71 | Traffic Regulation on Wireless 802.11 Networks using Multiple Queue Techniques | Radhika Dhanal | ICM2ST-2010 |
72 | Steganography by Hiding Data in TCP/IT Headers | D.D. Dhobale | ICACTE, 2010 |
73 | Secure Control of Remote Electrical Devices using Mobile SMS Services | Kishor Mane | ICAETCT, 2010 |
74 | Three dimensional password for Secure Authentication | Vidya Mhaske-Dhamdhere | NCPC-201o |
75 | Mechanism to mitigate App-DDoS Attacks on Web sites | Manisha Patil | ICCA, 2010 |
Sr.No. | Name of Paper | Name of the student | Name of Journal |
1 | Student Learning and Career Guidance Reccomendation System: A Review | Ujjwala Shinde | Industrial Engineering Journal |
2 | Crop Guru : Deep Learning for Precise and Rapid Plant Disease Diagnosis | Shital Waghmare | Journal of Emerging Technologies and Innovative Research |
3 | Survey on Privacy Preserving using IoT Devices | Shradha Nikam | Journal of Emerging Technologies and Innovative Research |
4 | Diabetes Prediction Using Machine Learning Algorithms | Sneha Jadhav | Journal of Emerging Technologies and Innovative Research |
5 | Review on Encryption of Images onto Cloud | Komal Ghorpade | International Journal of Innovative Research in Technology |
6 | A Review of Different Approaches Used for Cardiovascular Disease Using Machine Learning Techniques | Sneha Kumbhar | Journal of Emerging Technologies and Innovative Research |
7 | Review of Different Techniques used for Cardio-Diabetic Disease Prediction | Rahul Kumbhar | Journal of Emerging Technologies and Innovative Research |
8 | A Review on Database Security Techniques used in Android Operating System | Aishwarya Phadatare | Journal of Emerging Technologies and Innovative Research |
9 | Detection of Objects in Video using Deep Learning | Yasmeen Mulla | IJRERD, 2020 |
10 | Authentication system for identity verification in internet applications using content based image retrieval biometrics and text based passwords with virtual keyboard | Rabiya Shaikh | IERJ 2019 |
11 | Construction and Compression of the Social Inverted Index for Multiple Social Tagging Systems | Vahida D. Havaldar | IOSR-JCE , 2019 |
12 | Multilevel Biometric Based Authentication System | Rabiya Shaikh | JETIR 2019 |
13 | Intelligent Data Mining of Social Media for Improving Health Care | Aradhana. S.Ghorpade | IJIRSET, 2018 |
14 | A review on Fragmentation and Replication related Security in Cloud | Sharayu V. Powar | JETIR 2018 |
15 | A review on Artificial Neural Network and Ontology Learning in Mobile Technology | Priyanka Rajebhosale | JETIR 2018 |
16 | Hybrid Recommendation Approach for Big Data Applications | Pradip Patil | IJIRSET , 2018 |
17 | Heart Disease prediction system using naïve bayes data mining technique | Amruta powar | WJERT 2018 |
18 | Hybrid Recommendation approach for big data applications | Pradip Patil | IJIRSET 2018 |
19 | Analyse Engineering students Twitter post to understand issues and problems in their educational experiences | S. D. Rane | IJLTET, 2017 |
20 | Mining Twitter Data of Rural Area Engineering Colleges for Understanding Issues and Problems in their Educational Experiences | S. D. Rane | IJRASET, 2017 |
21 | Identification of website key objects by combining eye-tracking technologies with web usage mining | Rajesh Gade | IJERT 2017 |
22 | State of the Art Analysis Approach for Identification of the Malignant URLs | Amruta Nagaonkar | IOSR-JCE |
23 | Survey on heart disease prediction system using data mining technique | Amruta powar | IJIERT 2017 |
24 | Dominant Relationship Analysis using dominant graph | Sandesh Dhawale | IJESE 2017 |
25 | Automated service Discovery and classification of web series with crawling in digital ecosystem | Vaibhav Sawant | IJERT, 2017 |
26 | Development pf machine learning model using least square support vector machine, differential evolution and back propagation neural network to detect breast cancer | Madhura vakar | IJERT 2017 |
27 | Survey on intelligent Data Mining of Social Media for improving health Care | Aradhana S. Ghorpade | IJCSIT, 2017 |
28 | An Enhanced Reversible Data Hiding Technique for Coloured Images | Nilam Shaikh | IJRITCC, 2016 |
29 | Website Personalization based on Link Analysis, Navigational Patterns and Web Content |
Atul Pawar | IJCSIT, 2016 |
30 | Extraction of Textual contents applying part whole relation with domain adoption techniques | O. D. Joshi | IJRERD, 2016 |
31 | Privacy Preserving Access Control for Relational Data With Accuracy-Constrained | Poonum Bhoite | IJATES, 2016 |
32 | Anomaly identification and failure diagnosis | Swapnil Kadam | IOSR-JCE, 2016 |
33 | Moving circular range queries on the static data objects in location based advertising application | Yogita Salavi | IJARCCE, 2016 |
34 | Enhancing Quality of Text Clustering based on Side Information data | Kajal Motwani | IJCRA |
35 | Semantic based crawling for automated service discovery and categorization of web services in digital environment | Vaibhav Sawant | IJETER, 2016 |
36 | Location Based Advertising Promotions on Mobile Device | Yogita Salavi | IJCSIT, 2016 |
37 | Robust and Effective Evil Twin Access Point Detection Technique at End User Side | Vibhawari Nanavare | IJIRSET, 2016 |
38 | MCCT: An Approach for Many-to-Many Data Linkage | Priyanka Hankare | IJIRCCE , 2016 |
39 | Boosting Associative Classifier for Protein Subcellular Localization | L. A, Khandare | IJSTM, 2015 |
40 | Anomaly Response System for Relational Database System using Joint Administration Model | K. K. Awale | IRJET, 2015 |
41 | Efficient Clustering of Web Documents Using Hybrid Approach in Datamining | Pralhad Gamare | IJRET, 2015 |
42 | A survey on review based recommendation system | Sarika Khot | IJRITCC, 2015 |
43 | Anomaly Detection and Response System for Relational Databases | K. K. Awale | IJERT, 2015 |
44 | Enhancing Intrusion Detection using CRF and Layered Approached for Discussion forum Web Application | Ketaki Mohan Patil | CIIT-IJ , 2015 |
45 | Integration of partial information hiding technology with multi-level trust privacy preserving data mining | Rajashree Joshi | IJIRSET, 2015 |
46 | Dynamic Heterogeneous Data Processing in IAAS Cloud | Sunny Mohite | IJACSCC, 2015 |
47 | Implementation of Distributed Variable Chunk based Switching in Peer to Peer Network | Shambhuraj Deshmukh | IJCA, 2015 |
48 | System Monitoring using Software Entropy | Rahul Lokhande | IJARECE, 2015 |
49 | Web document clustering using hybrid approach in data mining | Pralhad Gamare | IJRAT, 2015 |
50 | Data hiding with multiple network protocol usage | Dhanashri Dhobale | IJARCCE, 2015 |
51 | Software theft detection for javascript programs based on dynamic birthmark extracted from runtime heap graph | Somanath Salunkhe | IOSR-JCE, 2015 |
52 | Protection of sensitive data for multi-level trust privacy preserving data mining | Rajashree Joshi | IJIRSET, 2015 |
53 | Extending Oauth 2.0 Protocol to Enable Fine Grained Authorization Recommendation Using Multi – criteria Recommendation System | Priyanka Bhosale | IJAERD , 2015 |
54 | WEB Service Integration using Knowledge Discovery in Service (KDS) | Praveenkumar Patel | IJMCR, 2015 |
55 | Website personalization based on link analysis, navigation patterns and web content | Atul Pawar | IJCSIT, 2016 |
56 | Context Aware Video Annotation using Linked Data and Search Educational Video Resources for Supporting Distance Learning | Prasad Phalle | IJARET, 2016 |
57 | Meaningful and unexpanded shares for visual secret sharing schemes | Mr. V.B Phadtare | IJIERT ,2015 |
58 | Different Syntactic Methods and Clustering for Web Service Integration | Praveenkumar Patel | IJIRCCE, 2015 |
59 | Secure and Efficient Data Retrieval in Cloud Computing | Anuradha N. M. | IJERT, 2015 |
60 | Embedded Based Monitoring and Controlling energy efficient wireless sensor network system using distance vector protocol | P. T. Shitole | IJRITCC, 2014 |
61 | Protein Subcellular Localization Prediction through Boosting Associative Classification | L. A, Khandare | IJATES, 2014 |
62 | Efficient Retrieval of Aggregate Data in Uncertain and Probabilistic Databases | V.V. Kheradkar | IJETT, 2014 |
63 | Cloud Computing for Mobile Application | Mandar Kekade | IJARCSSE, 2014 |
64 | Enhancing File and System Security by adding Loadable Kernel Module for Removable Storage Device | Deepak Mahajan | IJATES, 2014 |
65 | Secure data communication using image encryption & compression | Y. M. Kambale | IJARCCE, 2014 |
66 | A Secure Keyless Colored Image Encryption | Nilam Shaikh | IJATES, 2014 |
67 | Trusted Third Party Service For Secure Cloud Data | R.S. Nejkar | IJRET ,2014 |
68 | Data hiding in encrypted compressed image using improved LSB technique | Y. M. Kambale | IJARCSSE, 2014 |
69 | An efficient data mining approach for complex clone detection in software | Swarupa Bongale | IJARCSSE, 2014 |
70 | Implementation of Homeostasis at Network Level | Ranjita Patil | IJMTER, 2014 |
71 | Semantic Similarity Measure using Combination of Random Indexing and Latent Semantic Analysis | Meenakshi Patil | IJERT, 2013 |
72 | A Overview od Advanced Network Protocol Steganography | Dhanashri Dhobale | IJARCC, 2013 |
73 | Near Duplicate Detection In Relational Database | Bhagyashri Kelkar | IJERT , 2013 |
74 | A Novel Approach for Recognized and Overcrowding of Terrorist Websites | P. S. Landge | IJETT, 2013 |
75 | Implementation of Data Privacy and Query Optimization in Data Providing Service Composition | Rashmi Kulkarni | IJCSI , 2013 |
76 | Enriching Search Results Using Ontology | Shobha B. Patil | IJCET , 2013 |
77 | Preserving Privacy using Gradient Descent Methods Applied for Neural Network with Distributed Datasets | Sachin Yadav | IJCSI, 2013 |
78 | Add-on Utility to make Google Docs more Secure | Shivani Kale | IOSRJCE, 2013 |
79 | Automation of Warranty Management System for small-scale Manufacturing Industry | Onkar Joshi | IJERA, 2012 |
80 | Cloud Computing Support for Enhanced Health Applications | Poonum Sutar | IJEIT, 2012 |
81 | Identifying Nearly Duplicate Records in Relational Datatbase | Bhagyashri Kelkar | IJCSITS , 2012 |
82 | Search Result Optimization using Annotors | Vishal Kamble | IJSR , 2012 |
83 | Parallel request handling for grid service discovery with rough sets | S. S. Howal | IJEIT, 2012 |
84 | Improved handover performance by integration of fast handover in hierarchical setup | Dipali Patil | IRACST, 2012 |
85 | Improved grid service discovery with rough sets | S. S. Howal | IJCA, 2012 |
86 | Privacy Management in Cloud by making use of Homomorphic Functions |
S. G. Sutar | IJCA, 2012 |
87 | A novel approach for social network analysis & web mining for counter terrorism | P.S. Landge | IJCSE, 2012 |
88 | Data Integrity Check in Cloud using Dispersal Code | S. P. Patil | IJERT, 2012 |
89 | Migrating process and virtual machine in the cloud: Load balancing and security perspectives | Varsha Patil | IJACSIT, 2012 |
90 | Auto Monitoring Energy-Efficient Wireless Sensor Network System for Graph Farmland | Pramod Shitole | IJARCSEE, 2012 |
91 | Retransmission Steganography in Handling Oversized IP Packets | Dhanashri Dhobale | IJCTE, 2011 |
92 | Data Security Mechanism for Cloud | S. B. Patil | IJCA, 2011 |
93 | Variable Chunk based Parallel Switching to Minimizing File Download Time in P2P Network | Shambhuraj Deshmukh | IJCSI, 2011 |
94 | Mitigating App-DDoS Attacks on Web Servers | Manisha Patil | IJCST, 2011 |
1 | Harnessing Machine Learning for Heart Discese Prediction and Risk Evaluation | Nilam Randive | L-130603/2023 |
2 | Similarity Search for Encrypted ImaGES IN Secure Cloud Computing | Komal Ghorpade | L-133842/2023 |
3 | Drone Detection using Machine Learning and Image Processing | Sahil Kalaigar | L-132983/2023 |
4 | Synergistic Predictive Modeling: LSTM and Random Forest Fusion for Stock Price Forecasting using Machine Learning | Gauri Kadam | L-130872/2023 |
5 | Confidential Health Gradian: A Cutting-edge System for Predicting Diabetic Cardiovascular Risks with Fully Homomorphic Encryption and Fog Computing | Rahul Kumbhar | L-43205/2024 |
6 | Student Learning and Career Guidance Recommention System | Ujjwala Shinde | Diary No 20807/2023-CO/L |
7 | Diabetic Prediction using Machine Learning Algorithm | Sneha Jadhav | Diary No 19980/2023-CO/L |
8 | Smart Agriculture: Depp Learning based Crop Discese Detection and Pesticide Recommendation System | Shital Waghmare | Diary No 20062/2023-CO/L |