Number of research papers per teacher in the Journals ... fileNumber of research papers per teacher...
Transcript of Number of research papers per teacher in the Journals ... fileNumber of research papers per teacher...
Number of research papers per teacher in the Journals notified on UGC website during the last five years
Sr. No. Title of paper Name of the author/s Department of the
teacher
Name of journal Year of publication ISSN number Link of the
recognition
in UGC
enlistment of
the Journal
1 Data Mining for
Internet of Things
Sindhu M R Computer International Journal of
current Trends in Science and
Technology
2017 ISSN
09769730
http://curre
ntsciences.i
nfo/index.p
hp/ctst/artic
le/view/195
2 Convolution Neural
Networks by Image
Net
Dr. Vikram K., Dr. P
Gouda
Computer International Journal of
Emerging Trends in Science
and Technology
2017 ISSN 2348-
9480
http://ijetst.
in/article/v4-
i9/30%20ije
tst.pdf
3 Integrated
Ecosystems Using
Converting
Technology
Dr. Vikram K., Poonam
Gupta
Computer Recent Trends in Computer
Science and Software
Technology
2017 NA http://www
.mantechpu
blications.co
m/editorial_
board.html
4 Evaluation of
Project Work Using
Clustering and
Pattern Mining of
Online Collaborative
Data
Nikitaben P. Shelke,
Poonam Gupta
Computer International Journals of
Advanced Research in
Computer Science and
Software Engineering
2017 ISSN: 2277-
128X
file:///C:/Us
ers/sunita/D
ownloads/3
88-969-1-
PB%20(1).p
df
5 Database Query
Optimization using
Genetic Algorithm
Megha Auti,Sandeep
Gore
Computer International Journal of
Research in Engineering and
Technology
2017 ISSN No.
0976-5697
http://www
.ijarcs.info/i
ndex.php/Ija
rcs/article/d
ownload/50
23/4334
6 A Survey on Internal
Intrusion Detection
and Protection
System
Urmila Biradar Computer International Journal for
Research in Applied Science
& Engineering Technology
2017 --- https://ww
w.ijraset.co
m/print-
certificate.p
hp?member
=1170
7 Enhanced Indexing
and Scraping for
Educational Search
Engine using Web
Usage Mining
Ramkrishna
Gaikwad,Mansi
Bhonsle
Computer International Journal of
Engineering Research in
Computer Science and
Engineering(IJERCSE)
2017 ISSN (Online)
2394-2320
https://ww
w.technoare
te.org/com
mon_abstra
ct/pdf/IJERC
SE/v5/i3/Ext
_07425.pdf
8 A Personalized Web
Search for Relevant
Web Pages: A
Survey
Arti Wardekar,
Poonam Gupta
Computer International Journal of
Engineering Research in
Computer Science and
Engineering(IJERCSE)
2017 ISSN (Online)
2394-2320
https://ww
w.technoare
te.org/com
mon_abstra
ct/pdf/IJERC
SE/v5/i3/Ext
_20371.pdf
9 Automatic
detection of fake
profiles in online
social networks
S M Kulkarni,Vidya
Dhamdhere
Computer Open access international
journal of science &
engineering
2017 ISSN (Online)
2456-3293
http://oaijse
.com/Volum
eArticles/Ful
lTextPDF/18
8_14.AUTO
MATIC_DET
ECTION_OF
_FAKE_PRO
FILES_IN_O
NLINE_SOCI
AL_NETWO
RKS.pdf
10 Malicious Tweet
Detection and
Disaster Reporting
Using Topic and
User Behavior
Analysis
Dhanshree Deosarkar,
Sandeep Gore
Computer International Journal of
Engineering Research in
Computer Science and
Engineering(IJERCSE)
2017 ISSN (Online)
2394-2320
https://ww
w.technoare
te.org/com
mon_abstra
ct/pdf/0/v5/
i3/Ext_6378
9.pdf
11 Multi-attribute tab
based image search
by social re-ranking
Sarika
Shinde,Manjushri
Mahajan
Computer Open access international
journal of science &
engineering
2017 ISSN (Online)
2456-3293
http://oaijse
.com/Volum
eArticles/Ful
lTextPDF/18
7_13.MULTI-
ATTRIBUTE_
TAG_BASED
_IMAGE_SE
ARCH_BY_S
OCIAL.pdf
12 Novel image
reranking using data
mining and image
processing
technique
Sarika
Shinde,Manjushri
Mahajan
Computer International journal of
advance scientific research
and engineering trends
2017 ISSN (Online)
2456-0774
http://www
.ijasret.com
/VolumeArti
cles/FullText
PDF/213_2.
Novel_Imag
e_Re-
ranking_Usi
ng_Data_Mi
ning_and_I
mage_Proce
ssing_Techn
iques.pdf
13 Analysis of End-to-
End Delay in
Vehicular Networks
Poonam Gupta,Priyali
Phukale
Computer International Journal of
Science and Research (IJSR)
2016 2319-7064 https://ww
w.ijsr.net/ar
chive/v5i9/
ART201618
20.pdf
14 Comparative
analysis of routing
protocols in hybrid
wireless network
Poonam Gupta, Neha
Rathod
Computer International journal of
computer trends and
technology
2016 2231-2803 http://www
.ijcttjournal.
org/archives
/ijctt-
v41p116
15 Web log analysis
using request
dependency graph
& primary request
Mansi Bhonsle,Preeti
Patil
Computer International Journal of
Science, Engineering and
technology, volume:-4,Issue:-
3
2016 2348-4098 http://www
.ijset.in/wp-
content/upl
oads/2016/
06/10.2348.
ijset051605
22.pdf
16 Secure Fine grain
updations in cloud
using public auditing
Mansi Bhonsle,Tanuja
Sali
Computer International Journal of
Engineering and Research-
Volume-5,Issue 7
2016 2319-6890 https://ww
w.scribd.co
m/documen
t/31900206
1/Secure-
Fine-grains-
Updates-in-
Cloud-using-
Public-
Auditing
17 REGENARATION OF
the cloud data with
preserve privacy
and public auditing
to reduce
computational
overhead
Mansi Bhonsle, Sonali
Chemate
Computer International Journal of
Engineering and computing
2016 2321-3361 https://ww
w.scribd.co
m/documen
t/31900206
1/Secure-
Fine-grains-
Updates-in-
Cloud-using-
Public-
Auditing
18 Energy Efficient and
Guaranteed packet
delivery in Mobile
Adhoc Network
Urmila Biradar,Girish
Khorate
Computer International Journal on
recent and innovation trends
in computing and
communication, volume:-
4,Issue:-7
2016 2321-8169 https://ww
w.scribd.co
m/documen
t/34234298
8/Energy-
Efficient-
and-
Guaranteed-
Packet-
Delivery-in-
Mobile-Ad-
Hoc-
Networks
19 Efficient binary
cutting packet
classification
Ganesh Bandal,Priti
Rathil
Computer International Journal on
recent and innovation trends
in computing and
communication, volume:-
4,Issue:-7
2016 2321-8169 https://ww
w.scribd.co
m/documen
t/34234300
5/Efficient-
binary-
cutting-
packet-
classificatio
n
20 Survey paper of
novel approach
towards
multidimensional
packet classification
Ganesh Bandal, Priti
Rathi
Computer International journal of
science and research
2016 2319-7064 https://ww
w.scribd.co
m/documen
t/34234300
5/Efficient-
binary-
cutting-
packet-
classificatio
n
21 A novel technique
for Cloud computing
data security and
public auditing
Nivedita Kadam,Amir
Ali
Computer International Journal on
recent and innovation trends
in computing and
communication,volume:-
4,Issue:-7
2016 2321-8169 http://www
.Internation
al Journal
on Recent
and
innovation
trends in
computing
and
communicat
ion..org/do
wnload/bro
wse/Volume
_4_Issues/J
uly_16_Volu
me_4_Issue
_7/1469160
737_21-07-
2016.pdf
22 A neighbor
coverage using
Probabilistic
Rebroadcast in
Mobile Ad-hoc
network
Sunita
Nandgave,Vikram Patil
Computer international Journal of
Scientific Research in
Science, Engineering and
Technology ,volume:-1,Issue:-
6
2016 2395-1990 https://ww
w.semantics
cholar.org/p
aper/A-
Neighbour-
Coverage-
using-
Probalistic-
Rebroadcast-
Patil-
Nandgave/7
344548227b
f30ec26a56
d3857b6e04
622698880
23 A survey on botnet
: behaviour,Life
cycle,detection and
prevention
B.padmavathi,Bhan
Sengar
Computer IJCTA 2016 0974-5572 https://doc
player.net/8
3568526-A-
survey-on-
botnet-
behavior-life-
cycle-
detection-
and-
prevention.
html
24 Detecting
overlapping nodes
in MLM network
chain to cluster
several
communities
Mughda
Kirkire,Sukahda Vader
Computer International journal of
computing trends and
technology
2016 2231-2803 http://www
.ijcttjournal.
org/archives
/ijctt-
v42p115
25 An Analytical Survey
on Policy making for
Software Defined
Networks
Geeta Atkar,Abhijeet
jamle
Computer International journal of
computing trends and
technology
2016 2231-2803 http://www
.ijcttjournal.
org/archives
/ijctt-
v42p114
26 Survey on mobile
cloud based Food
calorie
measurement
Seema Udgirkar,Diptee
Kumbhar
Computer International journal of
innovative research in
computer and
communication engineering
2016 2320-9801 http://www
.ijircce.com/
upload/201
6/november
/77_31_Sur
vey.pdf
27 A survey on black
hole attacks
Pornima More,Asha
Chudhary
Computer International journal of
computer trends and
technology
2016 2331-2803 http://www
.ijcttjournal.
org/archives
28 A survey on
software data
reduction technique
for bug triage
process
Pornima More ,Snehal
Chopade
Computer International journal of
application or innovation in
engineering and
management
2016 2319-4847 http://www
.ijaiem.org
29 Shared Image
Privacy Preserving
Using Adaptive
Prediction
Mohini Shind
,Dr.Tanuja Dhope
Computer International Journal of
Engineering Research (IJER),,
Volume 5 Issue 1, January
2016,pp.435-437, ISSN
(Online):
2016 2319-7064 https://ww
w.ijsr.net/ar
chive/v5i1/
NOV152673
30 Empowering Users
with Adaptive
Privacy Policies for
the Uploaded
Images
Mohini Shind
,Dr.Tanuja Dhope
Computer International Journal of
Engineering Research (IJER)
2016 2319-6890 http://www
.indianjourn
als.com/ijor.
aspx?target
=ijor:ijer&vo
lume=5&iss
ue=7&articl
e=017
31 Energy Aware
Clustering and
Routing in WSN
Sneha Kamble,Tanuja
Dhope
Computer Int.Journal of Engineering
Technology, Management
and Applied
Sciences(IJETMAS)
2016 2349-4476 www.ijetma
s.com/admi
n/resources
/project/pa
per/f201602
1014550866
73.pdf
32 An Efficient
Clustering for Data
Aggregation with
Reliable Routing in
WSN
Sneha Kamble,Tanuja
Dhope
Computer International Journal of
Engineering Research (IJER)
2016 2349-4476 https://ww
w.ijsr.net/ar
chive/v5i2/
NOV152848
.pd
33 A system based on
Naive Bayesian for
Denial-Of-Service
Attack detection
Sana
Chaughule,Dr.Tanuja
S.Dhope
Computer International Journal on
Recent and Innovation
Trends in Computing and
Communication( IJRITCC
2016 2321-8169 http://www
.ijritcc.org/d
ownload/br
owse/Volu
me_4_Issue
s/January_1
34 A Novel Technique
for Cloud
Computing Data
Security and Public
Auditing
Amir Ali,N.N.Kadam Computer International Journal on
Recent and innovation trends
in computing and
communication.
2016 ISSN: 2321-
8169
http://www
.Internation
al Journal
on Recent
and
innovation
trends in
computing
and
communicat
ion..org/do
wnload/bro
wse/Volume
_4_Issues/J
uly_16_Volu
me_4_Issue
_7/1469160
737_21-07-
2016.pdf
35 Detecting
Overlapping Nodes
In MLM Network
Chain to Cluster
Serval Communities
M.S.Kirkire Computer International Journal of
Computer Trends and
Technology
2016 Not available http://www
.Internation
al Journal of
Computer
Trends and
Technologyj
ournal.org/2
016/Volume
42/nuMSBe
r-
2/Internatio
nal Journal
of
Computer
Trends and
Technology-
V42P115.pd
f
36 A Survey on
Different Duplicate
Detection Methods
T Meshram,
N.N.Kadam
Computer International Journal of
Science and research
2016 Not available https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v5i
12/ART2016
3644.pdf
37 Privacy Preserving
Content Based
Image Retrieval
with Load Balanced
Framework
Manjushri A. Mahajan Computer International Journal of
Engineering Research
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
http://ijer.ir
ponline.in/ij
er/publicati
on/v5s6/IJE
R_2016_613
38 Mining of E-
commerce
Feedback
Comments for Multi-
dimensional Trust
Evaluation
P Kumbhar, M.
Mahajan
Computer International Journal of
Engineering Research
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
http://ijer.ir
ponline.in/ij
er/publicati
on/v5s6/IJE
R_2016_628
39 Dual Sentiment
Analysis Using
Adaboost Algorithm
Sentiment Analysis
B R Jdhav, M. Mahajan Computer International Journal of
Engineering Science and
Computing
2016 2321 3361 http://ijesc.
org/upload/
ec38253650
3e46f46ab8
9eadd4fe8d
d5.Dual%20
Sentiment%
20Analysis%
20Using%20
Adaboost%2
0Algorithm
%20Sentime
nt%20Analy
sis.pdf
40 Survey on EMI:
Privacy-Preserving
Public Auditing for
Regenerating-Code-
Based Cloud Storage
B.Padmavathi, Mayuri
Lingayat
Computer International Journal of
Engineering Science and
Computing
5
2016 ISSN
(Online):
2319-7064
www.ijer.in/
ijer/publicat
ion/v5s7/IJE
R_2016_720
41 A Survey on
Blackhole Attacks
Asha
Chaudhary,P.M.More
Computer International Journal of
Computer Trends and
Technology
2016 Not available http://www
.ijcttjournal.
org/2016/V
olume41/nu
mber-
2/IJCTT-
V41P117.pd
f
42 A Survey on
Software Data
Reduction
Techniques for Bug
Triage Process
Snehal
ChopadeP.M.More
Computer International Journal of
Application or Innovation in
Engineering & Management
2016 2016 http://www
.ijaiem.org/
Volume5Iss
ue11/IJAIE
M-2016-11-
21-17.pdf
43 A Survey on
Multimedia
Communication
Using Sequence
Number Field
S. Surwase,
S. Amane,
R. Kamble,
R. Adhav
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2016 ISSN(Online):
2320-9801
ISSN (Print):
2320-9798
https://ijircc
e.com/uplo
ad/2016/no
vember/104
_A%20SURV
EY.pdf
44 A Survey Data
Securitry in Cloud
Computing Based
on RSA
K.Temgire
P.Kambale
D.Chavan,
L.Dehade
Computer International Engineering
Research Journal
2016 --- http://www
.ierjournal.o
rg/pupload/
vol2iss5/A%
20Survey%2
0Data%20Se
curity%20in
%20Cloud%
20Computin
g%20Based
%20on%20R
SA.pdf
45 A Survey on
BotShark -
Detection and
Prevention of Peer-
to-Peer Botnets by
Tracking
Conversation using
CART
Pooja
Pondkule,B.Padmavath
i
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2016 ISSN 2395-
1621
https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v5i
11/ART2016
3102.pdf
46 TIME AND SPACE
BOUND
ENCRYPTION CLOAK
H.Makhamale, U
Biradar
Computer Journal of Emerging
Technologies and Innovative
Research
2016 (ISSN-2349-
5162)
www.jetir.o
rg/papers/J
ETIR160504
5.pdf
47 A Survey on Optimal
Web Service
Selection
D. Gumfawar,M.
Mahajan
Computer International Journal of
Science and Research
2016 ISSN-2349-
5162
https://ww
w.ijsr.net/ar
chive/v5i11/
ART201631
73.pdf
48 Secure Vehicular
Traffic Re-routing
System using SCMS
in connected cars
P. Mhatre,M. Mahajan Computer International Journal of
Science and Research
2016 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v6i1/
ART201642
40.pdf
49 A Survey on
Automatic Field
Irrigation System
N. Deshpande, S.
Sontake, A. Gaikwad,
M. Mahajan
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2016 ISSN(Online):
2320-9801
ISSN (Print):
2320-9798
https://ww
w.ijircce.co
m/upload/2
016/novem
ber/38_A%2
0Survey.pdf
50 Privacy Aware
Authentication
Scheme for
Distributed Mobile
Cloud
V.S.Dhamdhere Computer International Journal of
Engineering Research)
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
www.ijer.in/
ijer/publicat
ion/v5s5/IJE
R_2016_516
51 College Attendance
Reporting Tool
V. Khare, A. Giri, R.
Deshmane, M.
Mahajan
Computer International Engineering
Research Journal
2016 ISSN 2395-
1621
http://www
.ierjournal.o
rg/vol2iss3/
College%20
Attendance
%20Reporti
ng%20Tool.
52 College Attendance
Reporting Tool
V. Khare, A. Giri, R.
Deshmane, M.
Mahajan
Computer International Engineering
Research Journal
2016 ISSN 2395-
1621
http://www
.ierjournal.o
rg/vol2iss1/
21.College%
20Attendan
ce%20Repor
ting%20Tool
53 A Survey on Cloud
Based Secure Self
Destruction
Accessibility with
Time and Location
S. Sant, V. Chavan, G.
Jagdale, M. Mahajan
Computer International Journal of
Scientific Engineering and
Research (IJSER)
2016 ISSN
(Online):
2347-3878
http://www
.ijser.in/arch
ives/v4i10/1
2101601.pd
f
54 Efficient Method for
Edit
Recommendation
using Hybrid History
Mining and
Relevance Feedback
Shilpa Singh,
B.Padmavathi
Computer International Journal of
Science and Research
(International Journal of
Science and research)
5
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
11/NOV151
715.pdf
55 Control cloud data
access privilege with
abe scheme and
efficient user
revocation
Shilpa Singh,
B.Padmavathi
Computer International Journal of
Engineering Science and
Computing
2016 Not available ijesc.org/.../
49eb4f8165
f29006b1eb
6842b33e49
28.Control%
20Cloud%20
Data%20A..
56 Controlling Access
Privilege and User
Revocation of Fully
Anonymous Cloud
data
C. Kathar,
V.S.Dhamdhere
Computer International Journal of
Engineering Research)
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
10/SUB1590
75.pdf
57 Feature Selection
for Security
evaluation against
Attack In
Adversarial
Environment
S. Jadhav,
V.S.Dhamdhere
Computer International Journal of
Engineering Research)
2016 ISSN:2319-
6890)(online
),2347-
5013(print)
paper.resea
rchbib.com/
view/paper/
86272
58 Balancing power in
smartphone video
streaming
Sunita
Nandgave,Snehal
Barvakar
Computer International Journal of
Engineering Research
2016 2319-7064 http://ijer.in
/publication
/v5/094.pdf
59 Energy Efficient and
Guaranteed Packet
Delivery in Mobile
Ad Hoc Networks
Urmila Biradar,Girish
Khorate
Computer International Journal of
Science and research
2016 2321-8169 https://ww
w.scribd.co
m/documen
t/34234298
8/Energy-
Efficient-
and-
Guaranteed-
Packet-
Delivery-in-
Mobile-Ad-
Hoc-
Networks
60 Log Based Feedback
Method For Online
Web Image Ranking
Using Query Specific
Semantic Signatures
Shweta Damahe,
Tanuja Dhope
Computer Inter Jour.on Recent and
Innovation Trends in
Computing and
Communication (IJRITCC),
2015 2321-8169 www.ijritcc.
org/downlo
ad/1437372
100.pdf
61 Unbalance
Assignment
Problem by Using
Modified Approach
Jammer G. Kotwal,
Tanuja S. Dhope
Computer Int. Journal of Advanced
Research in Computer
Science and Software
Engineering (IJARCSSE
2015 2277 128x. https://ww
w.ijarcsse.c
om/docs/pa
pers/Volum
e_5/7_July2
015/V5I7-
0261.pdf
62 Hybrid Method for
Online Web Image
Ranking Using
Query Sepecific
Semantic Signatures
Shweta Damahe,
Tanuja Dhope
Computer International Journal of
Science and Research (IJSR)
2015 2319-7064 www.ijsr.ne
t/archive/v4
i6/SUB1561
90.pdf
63 Secure
Management with
IDS Framework for
Power System
Delivery
Ashish Uplenchwar,
Tanuja Dhope
Computer Int.Journal of Innovatative
Research in Computer &
Communication
Engg.(IJIRCCE
2015 2320-9801 www.ijircce.
com/upload
/2015/may/
16_Secure.p
df
64 Proxy Side Web
Prefetching Scheme
for Efficient
Bandwidth Usage:
Data Mining
Approach
P.V.Gupta,S.S.
Chaudhari
Computer International Research
Journal of Engineering and
Technology
2015 e-ISSN: 2395-
0056
https://ww
w.irjet.net/a
rchives/V2/i
9/IRJET-
V2I9201.pdf
65 Review of Dual
Sentiment Analysis
M. Mahajan,B. R.
Jadhav
Computer International Journal of
Science and Research
2015 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v4i11/
NOV151708
66 Hybrid cryptography
for secure superior
malicious behavior
detection and
prevention system
for manet’s
V.S.Dhamdhere,S.
jethe
Computer International journal of
innovative research in sci.,
engg and technology
2015 ISSN(Online)
: 2319-8753
ISSN (Print) :
2347-6710
https://ww
w.ijirset.co
m/upload/2
015/july/11
7_Hybrid.pd
67 Node verification to
prohibit flooding
attack in mobile ad-
hoc network
V.S.Dhamdhere,A.Wan
jari
Computer International journal for
research in emerging science
and technology
2015 E-ISSN: 2349-
7610
ijrest.net/do
wnloads/vol
ume-2/issue-
7/pid-ijrest-
27201518.p
df
68 Securing Mobile
User Data in Cloud
Computing
Environment
P.V.Gupta,M.M.
Chavan
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 Not getting www.ijsr.ne
t/archive/v4
i7/v4i7_02.p
hp
69 Secure Privacy
Enhanced Approach
in Web
Personalization
M.S.Bhonsle,T.Deshmu
kh
Computer International Journal of
Computer Engineering &
Application(IJCEA)
2015 ISSN 2321-
3469
www.ierjour
nal.org/volu
me2issue3.p
hp
70 Responsibility
Handler TPA:
Auditing and
Repairing of Data in
Cloud Storage
B.Padmavathi,S.Singh Computer International Journal of
Science and Research
(International Journal of
Science and research)
4
2015 Locked https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
12/NOV150
41202.pdf
71 Image Recapture
Discovery
Algorithms: A
Survey
P.V.Gupta,P.Sanas Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v4i11/
NOV151302
72 Secured Search
Optimization using
Dynamic Query
Form
M.S.Bhonsle,P.
Dagade
Computer International Journal of
Computer Sci. and Mobile
Computing
2015 ISSN
2320–088Xhttp://www
.Internation
al Journal of
Computer
Science and
Mobile
Computing.c
om/docs/pa
pers/June20
15/V4I6201
599a61.pdf
73 A Face As A Mouse
For Disabled Person
S.P.Patil,S.Dongare Computer International Journal of
Computer Science and
Mobile Computing
2015 2320–088X http://Inter
national
Journal of
Computer
Science and
Mobile
Computing.c
om/docs/pa
pers/July20
15/V4I7201
538.pdf
74 Dynamic Load
Balancing and Self-
load Migration with
Delay Queue in DVE
S.P.Patil,K.Pagar Computer International Journal on
Recent and innovation trends
in computing and
communication.
2015 2321-8169 http://www
.Internation
al Journal
on Recent
and
innovation
trends in
computing
and
communicat
ion..org/do
wnload/143
7719206.pd
f
75 POLICY
OPTIMIZATION AND
ANAMOLY
DETECTION OF
FIREWALL
G.B.Atkar,A.Kachare Computer International Journal of
Science and research
2015 Not available http://www
.Internation
al Journal of
Science and
research.net
/archive/v4i
7/SUB15616
2.pdf
76 Node verification to
prohibit flooding
attack in mobile ad-
hoc network
V.S.Dhamdhere,A.Wan
jari
Computer International journal for
research in emerging science
and technology
2015 E-ISSN: 2349-
7610
ijrest.net/do
wnloads/vol
ume-2/issue-
7/pid-ijrest-
27201518.p
df
77 Hybrid cryptography
for secure intrusion
detection system
for manaets.
V.S.Dhamdhere,S.
jethe
Computer International journal of
innovations & advancement
in computer science
2015 ISSN(Online)
: 2319-8753
ISSN (Print) :
2347-6710
https://ww
w.ijirset.co
m/upload/2
015/july/10
2_A_Hybrid.
78 Study of Controlling
Cloud Data Access
Privilege and
Attribute Based
Data Sharing with
Attribute
Revocation
V.S.Dhamdhere,N.Shel
ke
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 ISSN
(Online):
2319-7064
www.ijer.in/
ijer/publicat
ion/v5s5/IJE
R_2016_511
79 Survey: IoT
Vehicular
Information
Network
P Dhar, P.V.Gupta Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v4i11/
NOV151174
80 Improvised Method
of FAST clustering
based feature
selection Technique
Algorithm for High
Diamensional Data
A.Godse,P.V.Gupta Computer International Journal of
Application or Innovation in
Engineering and
Management
2015 ISSN 2319 -
4847
www.ijaiem.
org/Volume
4Issue6/IJAI
EM-2015-06-
30-52.pd
81 Discovery of
Infrequent
Weighted Itemset
with High Utility
K.Bhandwalkar,M.S.Bh
onsle
Computer International Journal of
Computer Sci. and Mobile
Computing
2015 ISSN
2320–088Xwww.ijcsmc
.com/docs/
papers/June
2015/V4I62
01599a53.p
df
82 Word replacement
recognition using
Sentence Oddity, K
gram and NGD
S Bhosale,
V.S.Dhamdhere
Computer International Journal of
Application or Innovation in
Engineering & Management
(IJAIEM)
2015 ISSN 2319-
4847
www.ijaiem.
org/pabstra
ct2.php?pid
=IJAIEM-
2015-10-29-
39
83 Fast and Space
Efficient Data
Placement Scheme
in Hadoop
EnvironmentInterna
tional
N B Sutar, P.V.Gupta Computer Journal of Innovations &
Advancement in Computer
Science
2015 ISSN 2347 – 8616
www.acade
micscience.c
o.in/admin/
resources/p
roject/.../f2
0151009144
4361604.pd
84 Survey on Privacy
Preservation in
Content Based
Information
Retrieval
Manjushri A.
Mahajan,B. V. Khapli
Computer International Journal of
Science and Research
2015 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v4i10/
SUB159272
1.pdf
85 A Survey on
Extended MI
technique for Edit
Recommendation
using Hybrid History
Mining and
Relevance Feedback
B.Padmavathi,S.Patil Computer International Journal of
Science and Research
2015 ISSN
(Online):
2319-7064
https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
11/NOV151
715.pdf
86 A Review of Privacy
Protection of Cloud
Storage and
Steganography
Techniques
A. Ranjan,M.S.Bhonsle Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 Not available https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
11/NOV151
653.pdf
87 Trust Evaluation by
Mining of E-
commerce
Feedback
Comments
P Kumbhar,M.
Mahajan
Computer International Journal of
Science and Research
2015 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v4i11/
NOV151637
88 A survey paper of
data access privilege
scheme in cloud
storage server for
user privacy
problem
B. padmavathi, Mayuri
Lingayat
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 ISSN: 2231-
2803
www.Intern
ational
Journal of
Computer
Trends and
Technologyj
ournal.org/a
rchives/Inte
rnational
Journal of
Computer
Trends and
Technology-
v28p140
89 Study of Evasion
Attack using Feature
Selection in
Adversarial
Environment
V.S.Dhamdhere,S.Jadh
av
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2015 ISSN
(Online):
2319-7064
www.Intern
ational
Journal of
Science and
research.net
/archive/v4i
10/v4i10_01
.php
90 Survey on
Distributed Mobile
Cloud Computing
Services: Signature
Scheme for a
Privacy-Aware
Authentication
V.S.Dhamdhere,N.Shel
ke
Computer International Journal of
Application or Innovation in
Engineering & Management
(IJAIEM)
2015 ISSN
(Online):
2319-7064
https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v4i
10/SUB1590
75.pdf
91 Word replacement
recognition using
Sentence Oddity, K
gram and NGD
V.S.Dhamdhere,M.
S.bhonsle
Computer International Journal of
Application or Innovation in
Engineering & Management
(IJAIEM)
2015 ISSN-2319-
4847
www.ijaiem.
org/pabstra
ct2.php?pid
=IJAIEM-
2015-10-29-
39
92 Website Structure
improvement
through web mining
B.Padmavathi Computer International Journal of
Scientific and Engineering
Research
2015 ISSN 2091-
2730
pnrsolution.
org/Datacen
ter/Vol3/Iss
ue2/252.pdf
93 Improved Web
Prediction
Algorithm Using
Web Log Data
M.S.Bhonsle Computer International Journal Of
Innovative Researchin
Computer and
Communication Engineering
2015 ISSN(Online):
2320-9801
https://ww
w.ijircce.co
m/upload/2
015/may/17
6_ResultPap
er.pdf
94 Clustering of
Documents for
Forensic Analysis
M. Kirkire Computer International Journal of
Computer Applications
2015 Not available http://www
.rspublicatio
n.com/Inter
national
Journal of
Computer
Applications
/Internation
al Journal of
Computer
Applications
_index.htm
95 Application of WSN
to Intelligent Home
Automation and
Power Monitoring
Using Android
Smart Phone- A
Survey
V.S.Dhamdhere Computer International Journal of
Computer Science and
Mobile Computing
2015 ISSN
2320–088Xwww.Intern
ational
Journal of
Computer
Science and
Mobile
Computing.c
om
96 A survey on
Clustering Based
Feature Selection
Technique
Algorithm for High
Diamensional Data
P.V.Gupta Computer International Journal of
Emerging Trends &
Technology in Computer
Science
2015 ISSN 2278-
6856
https://ww
w.ijsr.net/ar
chive/v3i12/
U1VCMTQ0
NDI=.pdf
97 A survey on
Clustering based
Feature selection
Techniqie algorithm
for high dimentional
data
Poonam
Gupta,Avinash Godse
Computer International Journal of
Emerging trends and
technology in computer
science
2015 2278-6856 http://www
.ijettcs.org/
pabstract.ph
p?vol=Volu
me4Issue1&
pid=IJETTCS-
2015-01-06-
18
98 Website Structure
improvement
through web mining
C.Shejul, B.
Padmavathi
Computer International Journal of
Scientific and Engineering
Research
2015 2091-2730 http://pnrso
lution.org/D
atacenter/V
ol3/Issue2/
99 Improved Web
Prediction
Algorithm Using
Web Log Data
M.S.Bhonsle,M. Jarkad Computer International Journal Of
Innovative Researchin
Computer and
Communication Engineering
2015 2320-9801 https://ww
w.ijircce.co
m/upload/2
015/may/17
6_ResultPap
er.pdf
100 Clustering of
Documents for
Forensic Analysis
M.S.Kirkire,S.George Computer International Journal of
Computer Applications
2015 2250-1797 https://doc
player.net/1
6382171-
Clustering-
of-
documents-
for-forensic-
analysis.htm
l
101 Application of WSN
to Intelligent Home
Automation and
Power Monitoring
Using Android
Smart Phone- A
Survey
V.S.Dhamdhere,S.Kul Computer International Journal of
Computer Science and
Mobile Computing
2015 ISSN
2320–088Xwww.Intern
ational
Journal of
Computer
Science and
Mobile
Computing.c
om
102 A survey on
Clustering Based
Feature Selection
Technique
Algorithm for High
Diamensional Data
Poonam
gupta,A.Godse
Computer International Journal of
Emerging Trends &
Technology in Computer
Science
2015 2278-6856 http://www
.ijettcs.org/
Volume4Iss
ue1/IJETTCS-
2015-01-06-
18.pdf
103 Trust Evaluation by
Mining of E-
commerce
Feedback
Comments
M. Mahajan,P.
Kumbhar
Computer International Journal of
Science and Research
2015 2319-7064 https://ww
w.ijsr.net/ar
chive/v4i11/
NOV151637
104 Secure
Management with
IDS Framework for
Power System
Delivery
Dr.Tanuja
Dhope,Ashish
Uplenchwar
Computer Int.Journal of Innovatative
Research in Computer &
Communication
Engg.(IJIRCCE
2015 2320-9801 http://www
.rroij.com/o
pen-
access/secu
re-
managemen
t-with-ids-
framework-
forpower-
system-
delivery.pdf
105 Accomplishing
Service Similarity In
user centric
location based
Query for Privacy”
Pushaplata(Trupti)
Bhangadkar, Tanuja S.
Dhope
Computer Int.Jour.of Advance research
in Computer Science and
management Studies
(IJARCSMS)
2015 2321-7782 www.ijarcs
ms.com/doc
s/paper/vol
ume3/issue
6/V3I6-
0087.pdf
106 Efficient distributed
accountability
framework for
generic file types
Mayuri
Lingayat,Priyanka
More
Computer international journal of
computer engineering and
applications
2015 2321-3469 http://www
.ijcea.com/
wp-
content/upl
oads/2015/
06/19-Miss.-
Priyanka-
More.pdf
107 Effective product
ranking method
based on opinion
mining
Mayuri Lingayat,
Madhavi Kulkarni
Computer International Journal of
Computer APPLICATIONS
2015 0975–8887 https://pdfs.
semanticsch
olar.org/8ce
9/a3e788d8
1a44d4bd97
a2cd2cd12a
0fe65d0e.p
df
108 Optimizing the
algorithm for secure
and dynamic cloud
Strorage using MHT
S.S.sambare, Amit
Kumar
Computer Internationl Journal of
Computer Applications
2015 0975 –8887 https://pdfs.
semanticsch
olar.org/606
e/6b9cf7be
a2541f1c09
2eb4b8a0bb
a9063530.p
df
109 A survey on packet
scheduling schema
in Wireless Sensor
Network
S.S.sambare Computer International Journal of
Innovation and
Advancenement in Computer
Science
2015 2347-8616 https://pdfs.
semanticsch
olar.org/9be
c/d8d052e0
fdab843864
82ec2cf48f5
66c090f.pdf
110 A survey on sybil
attacks with
solution in MANET
S.S.sambare, M.Mulla Computer International Journal of
Innovation and
Advancenement in Computer
Science
2015 2347–8616 http://acad
emicscience
.co.in/admin
/resources/
project/pap
er/f2015011
5142133980
7.pdf
111 Secrecy Preserving
In a Location Proof
Updating System
Mrs. Sunita S.
Nandgave,Balasaheb
Waghmode
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2015 2320-9801 http://www
.ijircce.com/
upload/201
5/july/21_S
ECRECY.pdf
112 One stop
Government portal
Sunita Nandgave,Neha
shinde
Computer International Engineering
Research Journal (IERJ)
2015 2395-1621 http://www
.ierjournal.o
rg/vol1iss11
/13One%20
Stop%20Go
vernment%
20Portal%2
0.pdf
113 Improvised method
of FAST Clustering
based Feature
Selection Technique
Algorithm for High
Dimensional Data
Poonam
Gupta,Avinash Godse
Computer International journals of
Application or Innovation in
Engg & Mgmt
2015 2319-4847 http://www
.ijaiem.org/
Volume4Iss
ue6/IJAIEM-
2015-06-30-
52.pdf
114 A survey on
clustering based
feature selection
technique algorithm
for high dimensional
data
Poonam
Gupta,Avinash Godse
Computer International journals of
emerging trends &
technology in computer
science
2015 2278-6856 http://www
.ijettcs.org/
pabstract.ph
p?vol=Volu
me4Issue1&
pid=IJETTCS-
2015-01-06-
18
115 An effective
technique for
removal of facila
Duplication by SBFA
Ayesha Butalia
,Deepika Patil
Computer International journal of
recent and innovation trends
in Computing and
Communication
2015 2321-8169 http://www
.ijritcc.org/d
ownload/14
33921207.p
df
116 Privacy Aware
Authentication
Schema for
Distributed Mobile
Cloud Computing
Vidya
Dhamdhere,Chaitali
Katahr
Computer International Journal of
Engineering Research &
Technology
2015 2347-5013 https://pdfs.
semanticsch
olar.org/caa
b/0ede8dee
1ec615e45e
4033b46d38
f754d5d4.p
df
117 Hybrid cryptography
for secure intrusion
detection system
for manaets.
Vidya
Dhamdhere,Shreyas
Jathe
Computer International journal of
innovations & advancement
in computer science
2015 2347-8616 https://pdfs.
semanticsch
olar.org/ed4
8/6a75b16d
fb1ed3daa9
dcee8b276e
5b2e1614.p
df?_ga=2.20
463288.125
4299151.15
43043554-
970558370.
1542866061
118 Asterisk VoIP
Private Branch
Exchange
Vidya
Dhamdhere,Sonali
Golhar
Computer International Journal of
Advanced Research in
Computer Science and
Software Engineering
2015 2277-6488 http://ijarcs
se.com/Bef
ore_August
_2017/docs
/papers/Vol
ume_5/6_Ju
ne2015/V5I
6-0158.pdf
119 Secured Search
Optimization Using
Dynamic Query
Form
Mansi
Bhonsle,Prajakta
Dagade
Computer International Journal of
Computer Science and
Mobile Computing
2015 2320-088X http://www
.irjet.in/volu
me-5-issue-
05
120 Discovery of
Infrequent
Weighted Itemset
With High Utility
Mansi Bhonsle,Kalyani
Bhandwalkar
Computer International Journal of
Computer Science and
Mobile Computing
2015 2320-088X https://ww
w.semantics
cholar.org/p
aper/Discov
ery-of-
Infrequent-
Weighted-
Itemset-
with-High-
Bhandwalka
r-
Bhonsle/04
30522a7086
e7194c7c54
cb8eb897bf
b1f9ea10
121 improved web
prediction algorithm
using web log data
Mansi Bhonsle,Megha
Jarkad
Computer international journal of
innovative research in
computer
2015 2320-9798 http://www
.ijircce.com/
upload/201
5/may/176_
ResultPaper.
122 K-means for parallel
Architectures
B.Padmavathi,Rahul
Ghudji
Computer International Journal of
Advanced Research in
Computer Science and
Software Engineering
2015 2277-128X https://ww
w.semantics
cholar.org/p
aper/K-
Means-for-
Parallel-
Architecture
s-Ghudji-
Padmavathi
/a747b0957
a9e92f50da
dbd5af4a14
4d70010e06
d
123 Efficient distributed
accountability
framework for
generic file types
Mayuri
Lingayat,Priyanka
More
Computer international journal of
computer engineering and
applications
2015 2321-3469 http://www
.ijcea.com/
wp-
content/upl
oads/2015/
06/19-Miss.-
Priyanka-
More.pdf
124 Study of various
Machine Learning
Methods for
Opinion Mining and
Semtiment
Classification
Mayuri
Lingayat,Madhavi
Kulkarni
Computer international journal of
innovationa & advancement
in computer science
2015 2347-8616 https://pdfs.
semanticsch
olar.org/8ce
9/a3e788d8
1a44d4bd97
a2cd2cd12a
0fe65d0e.p
df
125 Profile ranking using
user influence and
content relevance
with classification
using sentiment
analysis
Sindhu M.R.,Ashwini
Shidore
Computer International Journal of
Computer Science and
Mobile Computing
2015 2320-088X https://doc
player.net/4
0850673-
Profile-
ranking-
using-user-
influence-
and-content-
relevance-
with-
classificatio
n-using-
sentiment-
analysis.htm
l
126 Design of TLM Equ.
Circuit of two
element micro strip
Patch Antenna
Array
Tanuja Dhope,Meenal
Jadhav
Computer First International
Conference on
Computing,Communication,C
ontrol and Automation
2015 978-1-4799-
6892-3
https://dl.ac
m.org/citati
on.cfm?id=2
862394&pre
flayout=flat
127 Secure
Management with
IDS frame work for
power system
delivery
Tanuja Dhope,Ashish
Uplenchwar
Computer Imternational journal of
computer application
2015 2320-9801 http://www
.rroij.com/o
pen-
access/secu
re-
managemen
t-with-ids-
framework-
forpower-
system-
delivery.pdf
128 Hybrid method for
onlineweb image
ranking using query
specific semantic
signatures
Tanuja Dhope,Shweta
Dhamale
Computer International Journal of
Science and research
2015 2319-7064 https://ww
w.ijsr.net/ar
chive/v4i6/S
UB156190.p
df
129 Secure
Management with
IDS Framework for
Power System
Delivery
Ashish Uplenchwar,
Tanuja Dhope
Computer Int.Journal of Innovatative
Research in Computer &
Communication
Engg.(IJIRCCE
2015 2320-9801 www.ijircce.
com/upload
/2015/may/
16_Secure.p
df
130 An efficient method
for
authenticatingshort
encrypted message
in MAC's
Vilas
Khedekar,AlokKaramol
Sanjay
Computer International Journal of
Scientific Engineering and
Technology Research
2015 2319-8885 http://www
.ijritcc.org/d
ownload/14
37459854.p
df
131 Secure image
Transfer using
Clustering and
permutation based
approach
Riyaz Kazi,Navnath
Pokale
Computer International journal of
advanced research in
computer engineering and
technology
2015 2278-1323 http://ijarce
t.org/wp-
content/upl
oads/IJARCE
T-VOL-4-
ISSUE-6-
2933-
2937.pdf
132 Optimizing the
algorithm for secure
and dynamic cloud
Strorage using MHT
S.S.sambare,Amit
Kumar
Computer Internationl Journal of
Computer Applications
2015 0975-8887 https://pdfs.
semanticsch
olar.org/606
e/6b9cf7be
a2541f1c09
2eb4b8a0bb
a9063530.p
df
133 A survey on packet
scheduling schema
in Wireless Sensor
Network
S.S.sambare, Amit
Kumar
Computer International Journal of
Innovation and
Advancenement in Computer
Science
2015 2347-8616 https://pdfs.
semanticsch
olar.org/9be
c/d8d052e0
fdab843864
82ec2cf48f5
66c090f.pdf
134 A survey on sybil
attacks with
solution in MANET
S.S.sambare,M Mulla Computer International Journal of
Innovation and
Advancenement in Computer
Science
2015 2347-8616 http://acad
emicscience
.co.in/admin
/resources/
project/pap
er/f2015011
5142133980
7.pdf
135 Associate
Documents Using
Person Name &Alias
Based Bipolarization
Base on PCA
Sindhu M.R.,Rachan
Sable
Computer IJERA 2015 2321-7782 http://www
.ijarcsms.co
m/docs/pap
er/volume3
/issue6/V3I
6-0004.pdf
136 Covert Channel
using TCP/IP
protocol suit.
S.P.Patil,M.chugule Computer International Journal of
Emerging Technology and
Advanced Engineering
2014 Not available Account
Suspended
137 To prepare a
Forecasting Proxy
Server to Improve
Hits Using SVM
P.V.Gupta,S.Temgire Computer International Journal of
Computer Science and
Information Technologies
2014 Not available https://ww
w.semantics
cholar.org/..
./To-
Prepare-a-
Forecasting-
Proxy-
Server-to-
Improve
Hits Using
SVM…
138 Proxy-side web
prefetching scheme
for efficient
bandwidth usage: A
probilistic Method
P.V.Gupta,S.S.
Chaudhari
Computer International Journal of
Engineering Research &
Technology (IJERT)
2014 ISSN: 2278-
0181
https://ww
w.researchg
ate.net/publ
ication/287
994621_PR
OXY_SIDE_
WEB_PREFE
TCHING_SC
HEME_FOR_
EFFICIENT_B
ANDWIDTH
_USAGE_DA
TA_MINING
_APPROACH
139 Evading flooding
attack in manet
using node
authentication
V.S.Dhamdhere,A
Wanjari
Computer International journal of
science and research
2014 2319-7064 https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v3i
12/U1VCMT
QyNzY=.pdf
140 A study of Semantic
Middleware for
Internet of Things
P.V.Gupta,V.Avchat Computer Internationl Journal of
Advanced Research in
Computer Science and
Software Engineering
2014 ISSN: 2277
128X
https://ww
w.semantics
cholar.org/p
aper/A-
Study-of-
Semantic-
Middleware-
for-Internet-
of-Avachat-
Gupta/2d4d
bb9d2d3a7e
6db17c7607
1d20613285
96a0c5
141 Intrusion detection
system by using k-
means, c 4.5,fnn ,
svm classifier
V.S.Dhamdhere,Megha
na Solunkhe
Computer International journal of
imerging trends &
techonology in computer
science
2014 ISSN 2278-
6856
http://www
.Internation
al Journal of
Emerging
Trends &
Technology
in Computer
Science.org/
Volume3Iss
ue6/Interna
tional
Journal of
Emerging
Trends &
Technology
in Computer
Science-
2014-11-02-
10.pdf
142 Intrusion detection
technique using
data mining
approach
V.S.Dhamdhere,M.Sola
nki
Computer Internaional journal of
innovative research in
computer and
communication engg.
2014 ISSN(Online):
2320-9801
ISSN (Print):
2320-9798
https://ijircc
e.com/uplo
ad/2014/no
veMSBer/9_
Intrusion.pd
f
143 A Survey on data
storage security in
Mobile Computing
Environment
P.V.Gupta,M.M.
Chavan
Computer International Journal of
Science and Research
(International Journal of
Science and research)
2014 ISSN
(Online):
2319-7064
https://ww
w.ijsr.net/ar
chive/v3i11/
T0NUMTQx
NTQ4.pdf
144 DDoS attack
detection based on
Chaos Theory and
Artificial neural
network
B.Padmavathi,M.Anjali Computer International Journal of
Computer Science and
Information Technologies
2014 ISSN-0975-
9646
http://ijcsit.
com/docs/V
olume%205
/vol5issue0
6/ijcsit2014
050681.pdf
145 Study of Infrequent
itemset mining
Techniques
M.S.Bhonsle,K.Bhandw
alkar
Computer International Journal of
Engineering Research and
General Science
2014 ISSN 2091-
2730
http://ijergs
.org/files/do
cuments/ST
UDY-88.pdf
146 Analysis of security
techniques applied
in database
outsourcing
A R
Pathak,B.Padmavathi
Computer International Journal of
Computer Science and
Information Technologies
2014 ISSSN 0975-
9646
Internationa
l Journal of
Computer
Science and
Information
Technologie
s.com/docs/
Volume%20
5/vol5issue
01/
Internationa
l Journal of
Computer
Science and
Information
Technologie
s201405011
43.pdf
147 Overciew on
Dynamic
Personalized
recommendation on
Web Based Services
M.S.Bhonsle,T
Deshmukh
Computer International journal of
Engineering Technology and
Computer Research
2014 NA ijetcr.org/in
dex.php/arc
hive/90-
volume-2-
issue-5
148 Espionage on
Search Optimization
using Dynamic
Query Form
M.S.Bhonsle,P. Dagade Computer International Journal of
Engineering Research and
General Science
2014 ISSN 2091-
2730
www.ijergs.
org/files/do
cuments/ES
P-47.pdf
149 Survey on types of
threats due to RAP
and solutions in IEEE
802.11 WLAN
V.S.Dhamdhere,G.B.Ba
ndal
Computer International Journal of
Emerging Trends &
Technology in Computer
Science
2014 ISSN 2278-
6856
www.Intern
ational
Journal of
Computer
Technology
and
Electronics
Engineering.
org/files/VO
LUME2ISSU
E5/Internati
onal Journal
of
Computer
Technology
and
Electronics
Engineering
_1012_02.p
df
150 A Review on Various
Visual
Cryptography
Schemes
N.S.Soradge Computer International Journal of
Computer Science and
Business Informatics
2014 ISSN: 1694-
2108
http://www
.ijcsbi.org/in
dex.php/ijcs
bi/article/vi
ew/335
151 Review of Lifetime
Maximizing
Approaches for
Wireless Sensor
Network
S M
Jagtap,V.S.Dhamdhere
Computer International Journal of
Engineering Research &
Technology (IJERT
2014 ISSN: 2278-
0181
https://ww
w.ijert.org/..
./review-of-
lifetime-
maximizing-
approaches-
for-wireless-
senso
152 Improvement in
performance of chip-
multiprocessor
using effective
dynamic cache
compression
scheme
Poonam A,
B.Padmavathi
Computer International Journal of
Engineering Research and
General Science
2014 ISSN 2091-
2730
ijergs.org/fil
es/documen
ts/Improve
ment-53.pdf
153 Survey on
Application layer
DDoS attack
Anjali B, B.Padmavathi Computer International Journal of
Computer Science and
Information Technologies
2014 ISSN:0975-
9646
Internationa
l Journal of
Computer
Science and
Information
Technologie
s.com/docs/
Volume%20
5/vol5issue
06/
Internationa
l Journal of
Computer
Science and
Information
Technologie
s201405060
9.pdf
154 A review of privacy
preserving
techniques in
wireless sensor
network
S M Gaikwad,
V.S.Dhamdhere
Computer Network and Complex
Systems
2014 ISSN 2225-
0603
(Online)
https://ww
w.iiste.org/J
ournals/ind
ex.php/NCS
/article/vie
w/11735/12
092
155 Review;Firewall
Privacy Preservation
By Packet Filtering
Management
G.B.Atkar, A.Kachare Computer International Journal of
Science and research 2014
2014 1982-1985 https://ww
w.Internatio
nal Journal
of Science
and
research.net
/archive/v3i
11/T0NUMT
QxNTE2.pdf
156 Survey of
Approximate
Shortest Distance
Computing Using
Improved Shortest
Path Tree
M.S.Bhonsle, S.
Malode
Computer International Journal of
Science And Research 2014
2014 2319-7064 https://ww
w.Internatio
nal Journal
of Science
and
research.net
/v3i11_04.p
hp
157 A Study On Online
Web Log Prediction
System Using Web
Mining
Technologies
M.S.Bhonsle,M.Jarkad Computer International Journal Of
Innovative Research in
Computer and
Communication Engineering
2014
2014 2320-9801 https://ww
w.ijircce.co
m/upload/2
014/noveM
SBer/38G_A
%20Study.p
df
158 Review paper on
retriveal magnets
for facial duplication
by search based
face annotation
Deepika patil,ayesha
butalia
Computer International Journal of
Science and Research (IJSR)
2014 2319-7065 https://ww
w.ijsr.net/v3
i11_05.php
159 Key management
with improved
location aided
cluster based
routing protocol in
manets
yogita wankhede,
Vidya Dhamdhere
Computer Springer Internation
Publishing switzerland
2014 NA https://link.
springer.co
m/chapter/
10.1007/97
8-3-319-
12012-6_76
160 Bi-model fusion
model for
recognizing stable
and unstable
sentiments
M. Ingale, ayesha
butalia
Computer IJACKD journal of research 2014 2278-5698 http://ghrie
t.raisoni.net
/ijackd/imag
es/Bi-
Modal_Fusi
on.pdf
161 survey on data
sharing in the cloud
using distributed
accountability
Mayuri Lingayat Computer international journal of
emerging technology and
advanced engineering,
2014 2250-2459 https://pdfs.
semanticsch
olar.org/c92
3/01618b5e
2382b84bdf
6ebc04185a
27503b9c.p
df?_ga=2.20
1805841.12
54299151.1
543043554-
970558370.
1542866061
162 Study of various
Machine Learning
Methods for
Opinion Mining and
Semtiment
Classification
Mayuri Lingayat Computer international journal of
innovationa & advancement
in computer science
2014 2347-8616 http://acad
emicscience
.co.in/admin
/resources/
project/pap
er/f2014111
1141570173
2.pdf
163 Survey on data
Sharing in the cloud
using distributed
accountability
Mayuri
Lingayat,Priyanka
More
Computer international journal of
emerging technology and
advanced engineering,
2014 2250-2459 https://pdfs.
semanticsch
olar.org/c92
3/01618b5e
2382b84bdf
6ebc04185a
27503b9c.p
df?_ga=2.25
9415050.12
54299151.1
543043554-
970558370.
1542866061
164 privacy-preserving
public auditing for
secure cloud
storage using
elgamal public key
encryption
algorithm.
Shrinivas Gadge,Rahul
V badhe
Computer international journal of
science and research
2014 2319-7064 https://ww
w.ijsr.net/ar
chive/v3i12/
U1VCMTQ1
MTk=.pdf
165 Extractive Multi
document
Summarizer
Algorithim
Arti Deshpande, Amit
S. Zore
Computer International Journal of
Engineering Research &
Technology
2014 0975-9646 http://citese
erx.ist.psu.e
du/viewdoc
/download?
doi=10.1.1.6
40.6686&re
p=rep1&typ
e=pdf
166 Data Cube
Materialization
using Map Reduce
Rohit Kawale,Sarita
Patil
Computer International Journal of
Innovative Research in
Computer and
Communication Engg.
2014 2320-9801 http://www
.rroij.com/o
pen-
access/data-
cube-
materializati
on-using-
map-
reduce.pdf
167 Survey on Web Log
Analysis from
Central Database
System using E-Web
Miner Algorithm
Mukul Chavan,Sarita
Patil
Computer International Journal of
Innovations & Advancement
in Computer Science, IJIACS
2014 2347–8616 http://acad
emicscience
.co.in/admin
/resources/
project/pap
er/f2014120
2141753552
2.pdf
168 A Survey on Secure
Sharing In Cloud
Computing
Anksha Maliye,Sarita
Patil
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2014 2320-9801 http://www
.rroij.com/o
pen-
access/a-
survey-on-
secure-
sharing-in-
cloudcompu
ting.pdf
169 ROBUST Wireless
Reprogramming
Method Using
Diffrential Approach
for wireless sensor
Networks.
Ujawala banarkar,
M.U.kharat
Computer IJCET 2014 6367 https://ww
w.slideshare
.net/iaeme/
robust-
wireless-
reprogramm
ing-method-
using-
differential-
approach-
for-wireless-
sensor-
networks
170 Online Network
Intrusion Detection
System Using VFDT
Poonam
Gupta,Sandeep Gore
Computer International Journal of
Emerging Technology and
Advanced Engineering
2014 2250-2459 https://pdfs.
semanticsch
olar.org/96a
d/953e7475
a0caad57bc
ab17e3bc29
59db7dcd.p
df?_ga=2.35
667360.125
4299151.15
43043554-
970558370.
1542866061
171 Node clone
detection with
Scalable key pre-
distribution scheme
for WSN
Mrs. Sunita S.
Nandgave ,Rekha Aher
Computer International Journal of
Science and Research (IJSR)
2014 2319-7064 https://pdfs.
semanticsch
olar.org/f55
8/e4ca378b
30a52e010f
b4b80b8751
970d0473.p
df?_ga=2.22
2067736.12
54299151.1
543043554-
970558370.
1542866061
172 Privacy Preserving
in a Location Proof
Updating System
Using Android
Mrs. Sunita S.
Nandgave,Balasaheb
Waghmode
Computer International Journal of
Engineering Research and
General Science Volume 2,
Issue 6, October-November,
2014
2014 2091-2730 http://www
.ijergs.org/fi
les/docume
nts/PRIVACY-
46.pdf
173 Load Balancing in
Public Cloud
Mrs. Sunita S.
Nandgave,Renuka
Joshi
Computer International Journal of
Advance Research in
Computer Science and
Management Studies
2014 2321-7782 http://www
.ijarcsms.co
m/docs/pap
er/volume2
/issue11/V2
I11-
0064.pdf
174 A Survey on
Information
Extraction in Web
Searches Using Web
Services
Neelam Maind,Mrs.
Sunita S. Nandgave
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2014 2320-9801 http://www
.ijircce.com/
upload/201
4/november
/38J_A%20s
urvey.pdf
175 To prepare a
Forecasting Proxy
Server to Improve
Hits Using SVM
P.V.Gupta,Suvarna
Temgire
Computer IJCSIT 2014 0975-9646 http://citese
erx.ist.psu.e
du/viewdoc
/download?
doi=10.1.1.6
44.7852&re
p=rep1&typ
e=pdf
176 QOS provision in a
cloud based
multimedia storage
system
Manjushri
Mahajan,Minal Padwal
Computer International Journal of
innovative Research in
Computer and
Communication Engineering
2014 2320-9798 http://www
.ijettcs.org/
Volume4Iss
ue1/IJETTCS-
2015-01-06-
18.pdf
177 Bi-model fusion
model for
recognizing stable
and unstable
sentiments
M. Ingale, ayesha
butalia
Computer IJACKD journal of research 2014 2278-5698 http://ghrie
t.raisoni.net
/ijackd/imag
es/Bi-
Modal_Fusi
on.pdf
178 Key management
with improved
location aided
cluster based
routing protocol in
manets
yogita wankhede,
Vidya Dhamdhere
Computer Springer Internation
Publishing switzerland
2014 NA https://link.
springer.co
m/chapter/
10.1007/97
8-3-319-
12012-6_76
179 Review of liferime
Maximizing
Approach For WSN
Vidya
Dhamdhere,Supriya
Jagtap
Computer International Journal of
Engineering Research &
Technology
2014 2278-0181 https://ww
w.google.co
m/search?q
=Review+of
+liferime+M
aximizing+A
pproach+Fo
r+WSN%2B
Vidya+Dha
mdhere%2C
Supriya+Jagt
ap&ie=utf-
8&oe=utf-
8&client=fir
efox-b-ab
180 Survey of
approximate
shortest Distance
Computing Using
Improved Shortest
path tree
Mansi Bhonsle,Sonali
Malode
Computer International Journal of
Science and Research
2014 2319-7064 https://ww
w.Internatio
nal Journal
of Science
and
research.net
/v3i11_04.p
hp
181 Espionge on search
Optimization using
Dynamic query form
Mansi
Bhonsle,Prajakta
Dagade
Computer International Journal of
Engineeing research and
general Science
2014 2091-2730 http://ijergs
.org/files/do
cuments/ES
P-47.pdf
182 Website Strucure
Improvement
through Web
Mining
B.Padmavathi,Chhaya
Shejul
Computer International Journal of
Engineeing research and
general Science
2014 2091-2730 http://www
.rroij.com/o
pen-
access/a-
study-on-
online-web-
log-
prediction-
systemusing-
web-mining-
technologie
s-a-
review.pdf
183 Survey on
Application layer
DDoS Attacks
B.Padmavathi,Anjali M Computer International Journal of
computer Science and
Information Technology
2014 0975-9646 http://ijcsit.
com/docs/V
olume%205
/vol5issue0
6/ijcsit2014
050609.pdf
184 DDoS Attack
Detection based on
chaos the and
Artificial Neural
Network
B.Padmavathi,Anjali M Computer International Journal of
computer Science and
information technology
2014 0975-9646 https://pdfs.
semanticsch
olar.org/4d0
b/28b1f355
966a2d8eec
8e9fb52d4ff
6483aff.pdf
185 survey on data
sharing in the cloud
using distributed
accountability
Mayuri
Lingayat,Priyanka
More
Computer international journal of
emerging technology and
advanced engineering,
2014 2229-3345 http://www
.ijcset.com/
docs/IJCSET
14-05-10-
057.pdf
186 Survey on data
Sharing in the cloud
using distributed
accountability
Mayuri
Lingayat,Priyanka
More
Computer international journal of
emerging technology and
advanced engineering,
2014 2250-2459 https://pdfs.
semanticsch
olar.org/c92
3/01618b5e
2382b84bdf
6ebc04185a
27503b9c.p
df?_ga=2.20
0694190.12
54299151.1
543043554-
970558370.
1542866061
187 Node clone
detection with
scalable key
predistribution
scheme for WSN
Sunita
Nandgave,Rekha Aher
Computer International Journal of
science and research
2014 2319-7064 http://www
.academicsci
ence.co.in/a
dmin/resour
ces/project/
paper/f2015
0622143503
1735.pdf
188 Privacy Preserving
in a location proof
updating system
using andriod
Sunita Nandgave,B. A.
Waghmode
Computer INTERNATIONAL Journal of
Engineering research and
general science
2014 2091-2730 http://www
.ijergs.org/fi
les/docume
nts/PRIVACY-
46.pdf
189 a novel approach
for scalability in pre-
key distribution
using unital
algorithm
Sunita
Nandagave,Rekha Aher
Computer international journal of
innovationa & advancement
in computer science
2014 2347-8616 http://www
.ijergs.org/fi
les/docume
nts/PRIVACY-
46.pdf
190 a survey on
information
extraction in web
searches using web
services
Sunita Nandgave,Nilam
Maind
Computer international journal of
innovative research in
computer and
communication engineering
2014 2320-9798 http://www
.rroij.com/o
pen-
access/a-
survey-on-
information-
extraction-
in-
websearche
s-using-web-
services.pdf
191 Load balancing in
public cloud
Sunita
Nandgave,Renuka
Joshi
Computer International Journal of
Advanced Research in
Computer Science and
Management studies
2014 2321-7545 http://www
.ijarcsms.co
m/docs/pap
er/volume2
/issue11/V2
I11-
0064.pdf
192 Review on Finding
Relevant Content &
Influencial Users
Based on
Information
Diffusion
Sindhu M.R., Ashwini
Shidore
Computer International Journal of Engg.
Research & General
Science(IJERGS)
2014 2091-2730 http://www
.ijergs.org/fi
les/docume
nts/REVIEW-
143.pdf
193 Detecting Critical
Link and Critical
Node Vulnerability
for Network
Vulnerability
Assessment
Arti Deshpande,Savita
Dhurde
Computer International Journal of
Innovative Research in
Computr and communication
engineering
2014 2320-9798 http://www
.ijircce.com/
upload/201
4/november
/37_Detecti
ng.pdf
194 Extractive Multi
document
Summarizer
Algorithim
Arti Deshpande,Amit
Zore
Computer International Journal of
Engineering Research &
Technology
2014 0975-9646 http://citese
erx.ist.psu.e
du/viewdoc
/download?
doi=10.1.1.6
40.6686&re
p=rep1&typ
e=pdf
195 Data Cube
Materialization
using Map Reduce
Sarita Patil,Kawhale
Rohitkumar
Computer International Journal of
Innovative Research in
Computer and
Communication Engg.
2014 2320-9798 http://www
.rroij.com/o
pen-
access/data-
cube-
materializati
on-using-
map-
reduce.pdf
196 Survey on Web Log
Analysis from
Central Database
System using E-Web
Miner Algorithm
Sarita Patil,Mukul
Chavan
Computer International Journal of
Innovations & Advancement
in Computer Science, IJIACS
2014 2347-8616 http://acad
emicscience
.co.in/admin
/resources/
project/pap
er/f2014120
2141753552
2.pdf
197 A Survey on Secure
Sharing In Cloud
Computing
Sarita Patil,Akansha
Maliye
Computer International Journal of
Innovative Research in
Computer and
Communication Engineering
2014 2320-9798 http://www
.rroij.com/o
pen-
access/a-
survey-on-
secure-
sharing-in-
cloudcompu
ting.pdf
198 ROBUST Wireless
Reprogramming
Method Using
Diffrential Approach
for wireless sensor
Networks.
M.U.kharat,Ujwala
Bhanarkar
Computer IJCET 2014 0976-6367 https://ww
w.slideshare
.net/iaeme/
robust-
wireless-
reprogramm
ing-method-
using-
differential-
approach-
for-wireless-
sensor-
networks
199 enforcing secure
and privacy-
preserving
information
brokering with
dynamic load
balancing in
distributed
information sharing
Urmila Biradar,Jyoti
More
Computer international journal of
innovations & advancement
in computer science
2014 2347-8616 https://doc
player.net/2
167961-
Enforcing-
secure-and-
privacy-
preserving-
information-
brokering-
with-
dynamic-
load-
balancing-in-
distributed-
information-
sharing.html
200 A survey on secure
sharing in cloud
Computing
Sarita Patil,Akansha
Maliye
Computer international journal of
innovative research in
computer
2014 2320-9801 http://www
.rroij.com/o
pen-
access/a-
survey-on-
secure-
sharing-in-
cloudcompu
ting.pdf
201 Review paper on
retriveal magnets
for facial duplication
by search based
face annotation
Deepika patil,ayesha
butalia
Computer International Journal of
Science and Research (IJSR)
2014 2319-7065 https://ww
w.ijsr.net/v3
i11_05.php
202 Survey of
Algorithms for
Sentence Extraction
& Text
Summarization
Bhavna Lanjewar,
B.Padmavathi
Computer International Journal of Data
Warehousing & Mining
2013 NA NA
203 Secure Improved
Location Aided
Cluster Based
Routing Protocol in
MANETs
Y
Wankhede,V.S.Dhamd
here
Computer International Journal of
Advanced Research in
2013 https://www
.researchgat
e.net/publica
tion/283024
495_Key_Ma
nagement_w
ith_Improve
d_Location_
Aided_Cluste
r_Based_Rou
ting_Protoco
l_in_MANETs
www.ijarcss
e.com/docs
/papers/Vol
ume_3/11_
NoveMSBer
2013/V3I11-
0444.pd
204 Review on Web
Prefetching
Techniques
Arti
Wardekar,P.V.Gupta
Computer IJTEEER 2013 ISSN2347-
4299
https://issu
u.com/ijtee
e/docs/revi
ew-on-web-
prefetching-
technique
205 Review on Web
Prefetching
Techniques
P.V.Gupta,Suvarna
Temgire
Computer International Journal Of
Technology Enhancements
And Emerging Engineering
Research(IJTEEE
2013 2347-4289 https://pdfs.
semanticsch
olar.org/f1d
0/b3982e8f
3dc4fb4647
3d5be4baed
94fbbf9d.pd
f
206 Review on Web
Prefetching
Techniques
Poonam
Gupta,Suvarna
Temgire
Computer International Journal Of
Technology Enhancements
And Emerging Engineering
Research(IJTEEE
2013 ISSN2347-
4299
https://issu
u.com/ijtee
e/docs/revi
ew-on-web-
prefetching-
technique
207 Detection of routing
misbehavior in
MANET suing
improved 2ACK
Poonam Gupta,Sarita
Chopade
Computer IOSRJournal CE 2013 2278-0661 http://www
.iosrjournals
.org/iosr-
jce/papers/
Vol9-
Issue1/K091
5360.pdf
208 Use of Multiple ant
colony optimization
for load balancing in
peer to peer
networks
Manjushri Mahajan,
G.T.Chavan
Computer International Journal on
Computer Engineering and
Technology (IJCET)
2013 0976-6367 http://www
.iaeme.com
/MasterAd
min/Upload
Folder/USE
%20OF%20
MULTIPLE%
20ANT%20C
OLONY%20
OPTIMIZATI
ON%20FOR
%20LOAD%
20BALANCI
NG%20IN%2
0PEER%20T
O%20PEER
%20N%5CU
SE%20OF%2
0MULTIPLE
%20ANT%2
0COLONY%2
0OPTIMIZAT
ION%20FOR
%20LOAD%
20BALANCI
NG%20IN%2
0PEER%20T
O%20PEER
209 Load Balancing in
p2p networks using
DHT based system
& Ant based system
:A comparison
G.T.Chavan,Manjushri
Mahajan
Computer International journal of
engineering research &
applications(IJERA)
2013 2248-9622 https://pdfs.
semanticsch
olar.org/ebc
2/887e224a
e560c67a4f
9b9fad3a84
e26eafd1.pd
f
210 Energy Efficient
Routing Protocols
for Wireless sensor
Network: A survey
Vidya
Dhamdhere,Tanaji
Dhaigude
Computer International journal of
engineering research &
applications(IJERA)
2013 2319-5967 https://pdfs.
semanticsch
olar.org/57d
2/3043debb
33bcb3a839
d1e05e2f97
e466b6e8.p
df
211 Personalized Web
directory :A
knowledge
Discovery approch
Manasi
Bhosale,Madhavi
Darokar
Computer International Journal on
Computer Technology &
Electronics Engg.
2013 2278-0181 file:///C:/Us
ers/Sswapni
l/Download
s/IJERTV2IS
60112.pdf
212 Dynamically
optimized cost
based task
scheduling in cloud
computing
Manasi Bhosale,Yogita
Chawala
Computer International journal of
engineering research &
Technology(IJERT)
2013 2278-6856 http://www
.academicsci
ence.co.in/a
dmin/resour
ces/project/
paper/f2015
0622143503
1735.pdf
213 Neighbour Change
Ratio And Route
Stability Based
Stable Path
Selection Protocol
In UWB MANETs
Sunita Nandagave Computer International Journal of
Engineering Research and
Industrial Application (IJERIA)
2013 0974-1518 http://www
.ascent-
journal.com
214 Survey of
confidentiality and
integrity in
outsourced
databases
Ajitram pathak Computer International Journal of
Scientific Engineering and
Technology
2013 2277-1581 https://ww
w.researchg
ate.net/publ
ication/324
866190_Sur
vey_of_conf
identiality_a
nd_integrity
_in_outsour
ced_databas
es
215 Clustering Algorithm
Technique
Sindhu M. R.,Rachana
Sable
Computer International Journal of
Enhanced Research in
Management & Computer
Applications
2013 2319-7471 https://pdfs.
semanticsch
olar.org/332
a/ed5c7b8f
08614d7f1f
756e091910
ed04cc95.p
df
216 Automated
negotiation and
behaviour
prediction
Mohammad Irfan Bala,
Shital Vij
Computer International Jurnal of
Engineering Research and
Technology(IJERT)
2013 2278-0181 https://ww
w.inderscien
ceonline.co
m/doi/abs/
10.1504/IJIP
T.2015.0743
39
217 Review:Firewall
Privacy Preservation
By Packet Filtering
Management
Geeta Atkar,Akshay
Kachare
Computer International Journal of
science and research
2012 2319-7064 https://ww
w.ijsr.net/ar
chive/v3i11/
T0NUMTQx
NTE2.pdf
218 A study on online
web log prediction
system using web
mining technologies
Mansi Bhonsle,Megha
Jarkad
Computer International journal of
innovative research in
computer
2320-9798 http://www
.rroij.com/o
pen-
access/a-
study-on-
online-web-
log-
prediction-
systemusing-
web-mining-
technologie
s-a-
review.php?
aid=47267
219 Effective product
ranking method
based on opinion
mining
Mayuri
Lingayat,Madhavi
Kulkarni
Computer International Journal of
Computer APPLICATIONS
0975-8887 https://pdfs.
semanticsch
olar.org/8ce
9/a3e788d8
1a44d4bd97
a2cd2cd12a
0fe65d0e.p
df