Spvryan's International Journal of Engineering Sciences & Technology (SEST) - ISSN:2394-0905

 

 

Sr. No.

Papers

Author

Guide Name

Full Paper

1.

Stock Market Analysis Based on Artificial Neural Network with Big data

Minal Bharambe

S.C. Dharmadhikari

2.

Enhancing HiveQL Engine Using Map-Join-Reduce

Amruta Kulkarni

S.C. Dharmadhikari

3.

Iceberg Query Evaluation using Compacted Bitmap Vectors

Sagar S. Mane

Emmanuel M

4.

Dual Strategy based Negotiation for Cloud Service During Service Level Agreement

Lissy A

Debajyoti Mukhopadhyay

5.

Multimedia Recommendation System With User Behavior Information

Tejal Arekar

R.S. Sonar

6.

Effective Pattern Discovery and Retrieving Relevant Document for Text Mining

Shivani Gupta

B.P.Vasgi

7.

Data management and Knowledge Discovery using Machine Learning

Sujata Jadhav

S. P. Potdar

8.

A Novel Scalable Document Retrieval Approach Using Relational Keyword Search System

Neelam Pokale,

Jyoti Yemul

9.

Usage-Based Classification and Ranking with Machine Learning Techniques for Recommendations

Praful Koturwar

Sheetal Girase

Debajyoti Mukhopadhyay

10.

Mining Of Complex Data Using Combined Mining Approach

Aniket A. Yadav

P. M. Pawar

11.

Analysis of Classification Algorithms for Prediction of Student Failure Using EDM

Trupti Diwan

Bharati Dixit

12.

Ensemble Classification Of Data Streams

Yamini Kadwe

Vaishali Suryawanshi

13.

Securing Identity in personalized web search

Khwaja Aamer

A. S. Hiwale

14.

An Item-Based Collaborative Filtering using Dimensionality Reduction Techniques on Mahout Framework

Dheeraj Bokde

Sheetal Girase

Debajyoti Mukhopadhyay

15.

User Profiling for Recommendation System

Sumitkumar kanoje

Sheetal Girase

Debajyoti Mukhopadhyay

16.

Intelligent Alerts Addressing For Real Time Database Monitoring System

Bharti Jadhao

S.P.Rangdale

17.

Traffic Congestion Detection By Mining GPS Data

Suhas Kaklij

Sonali Rangdale

18.

Analyzing and Interpreting Variations of Public Sentiments on Social Networking Site: Tweeter

Gurunath Machhale

Rashmi Deshpande

19.

A Novel Discovery of Highly Improved Dataset Using Improved UP Growth Algorithm

Anuja Palhade

Rashmi Deshpande

20.

Enhanced Privacy Preserving Approach for Distributed Databases .

Kalpana K Palve

R. W. Deshpande

21.

Multitrack Algorithm for Updating Streaming Data Warehouses

Madhuri Pandit

Rashmi Deshpande

22.

Knowledge Based History And Location Based User Profile For Web Search Efficiency

Pranali Yewale

Jyoti Pingalkar

23.

Rank Based Query Form Generation for Database Queries

Vinayak Jadhav

Amrit Priyadarshi

24.

An Minimized Multithreaded algorithm of Ranking For master Search on the Internet

R.T Kokare.

Bere S.S

25.

An Approach for Dynamic Characterization of Ensemble classifier for Disease Diagnosis

Sarika

Pachane

Bela Joglekar

26.

A Probabilistic approach for enhancing Text Clustering by including Side information

Atiya Kazi

D.T.Kurian

27.

A Modified Approach For Inferring User Search Goal Using Feedback Session

Harshal Kekan

Dhara T. Kurian

28.

Routing of data packets using ACO in WSN

Vaishali Nikhade

Rohit N. Devikar

29.

A Probabilistic Approach to Study Features in Opinion Mining

Mrunal Pendharkar

Sweta Kale

30.

Medical Image Segmentation using PCA and K-mean Clustering Algorithm

Juilee Anil Katkar

Trupti Baraskar

31.

Context Based Activity Recognition

Megha Sharma

Bela Joglekar

32.

The Role of Virtual Doctor Server on Wireless Body Area Network

Ganesh Borse

HimangiPande

33.

A Text Based Video Retrieval Using Semantic And Visual Approach

Vaidehi K.Bante

Avinash N Bhute

34.

A Novel Mechanism To Check Data Deduplication in a Secure Cloud

Shivganga Mujgond

Nilesh J. Uke

35.

Image Contrast Enhancement

Kunal Dhote

Anjali Chandavale

36.

A Framework for Defense Security Using Smart Phone in Geo Fence

Vyanktesh Dorlikar

Anjali Chandavale

37.

Implementing Adaptive Content Based Image Retrieval System Using Neural Network and SIFT

Pratima Jadhav

Rashmi Phalnikar

38.

Hand Gesture Recognition Using LAB Thresholding Technique

Samata S. Mutha

Kishor Kinage

39.

Image Hiding Using Diverse Image Media

Prajakta Nikam

Kishor Kinage

40.

Recognition of Plant Disease .

Sagar Patil

Anjali Chandavale, Bharati Dixit

41.

A Static Object Detection in Image Sequences

PravinkumarYadav

Aditi Jahagirdar

42.

A Foreground Text Extraction Mechanism For Degraded Document Images Using Adaptive Binarization

Yogeshwar L. Ade

Sonali Rangdale

43.

Medical Image Compression Using Kernel Based Meanshift ROI Technique

Sunil S.Khalane

Trupti Baraskar

44.

Privacy-Maintaining in Outsourced Transaction Databases from Association Rules Mining

Deokate Pallavi

M.M. Waghmare

45.

An Incentive Strategy for the Detection of Selfish Nodes in Delay Tolerant Network

Upendr Malekar

Lalit Kulkarni

46.

Optimal Opportunistic Routing in Mobile Social Network

Pradeep C. Mhaske

D.D.Londhe

47.

Performance Improvement Approaches for Apache Spark

Shrihari. A. Rathod

S. B. Deshmukh

48.

Enhancing Business Process models by Optimizing resource allocation

Tati Pati Sai Krishna

Emmanuel.M

49.

A 3D Atomic Bonds Rendering with DataGlove for Creating Virtual Environment

Prachi Dhavane

Dipak R.Patil

50.

Clustering and Retrieval of Video Content Using Speech and Text Information

Ashwini Kothawade

Dipak R.Patil

51.

Layered Approach For Intrusion Detection in WSN

Mayur Dhaye

Himangi Pande

52.

Energy Efficient Data Transmission in Wireless Sensor Network

Priya S. Satpute

A.R. Panhalkar, R.S. Bhosale

53.

MSEB Service Restoration Using Web Based SCADA Utility

Madhuri Unde

Bharat S. Brkar

54.

Performance measure of OFDM- IDMA system

Manjushri Bhoyar

H. M. Jadhav

55.

Productive outcome ranking for mobile query by singing/humming

Vyankatesh Kharat

Kalpana Thakare

56.

Resource Discovery in Grid Computing using Novel ACO based Algorithm

Laxman J. Deokate

V.V. Puri

57.

Location based Advertisement publishing by using QR codes and Wi-Fi on android mobile phones

Pankaj D Virulkar

Avinash Bhute

58.

Resource Allocation Scheme for Balancing QoS in Wireless Mobile Communication

Omkar Bhalke

T. A. Chavan

59.

Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network

Pooja Mundhe

V. S. Khandekar

60.

Co-operative Diversity in Wireless Ad Hoc Network Using MAC Protocol

Ms. Pagar Arati V.

A.S.Narote

61.

Map Reduce Scheduler with Classification Algorithm to Enhance Hadoop Performance

Mohammad Ghoneem

Lalit Kulkarni

62.

Implementation of IDMA system for estimation of multiple access interference

Pragati N. Chavan

H. M. Jadhav

63.

ECA: Evolutionary Computing Algorithm for E-Halthcare Information System

Sonali Tupe

N. P. Kulkarni

64.

Multitier Clustering approach for improving Energy Consumption in Wireless Sensor Networks

Smita Bachhav

Sumedha Sirsikar

65.

Optimum Path Forest Approach for Image Retrieval based on Context

Shrikant Dhawale

Bela Joglekar

66.

Social Based Routing In Delay Tolerant Network

Chalikwar priti

Milind Penurkar

67.

Energy Efficient Multilevel Data Aggregation technique for adequate redundancy removal in WSN

Samarth Anavatti

Sumedha Sirsikar

68.

Algorithm for Back-up and Authentication of Data Stored on Cloud

Manali Raje

Debajyoti Mukhopadh

69.

Balanced Energy Efficient Hierarchical Tree Based Routing Scheme in WSN

Kaushik Gotefode

Kishor Kolhe

70.

Generating Customer Relationship Management Efficiently Using Homomorphic Encryption

Archana Kale

A. S. Hiwale

71.

A Data Aggregation Protocol to Improve Energy Efficiency in WSN

Snehal Lonare

A. S. Hiwale

72.

Scheduling and Dropping Policies in Delay Tolerant Network

Ruchira More

Milind Penurkar

73.

Energy Efficient Clustering Technique to Improve Network Lifetime of WSN

Kalyani Wankhede

Sumedha Sirsikar

74.

Congestion Control in Delay Tolerant Networks

Peeyush Patil

Milind Penurkar

75.

Substantiation of Web Service Composition Using Automata with Colored Petri Nets

Pratiksha Nandeshwar

Rashmi Deshpande

76.

fMRI For Clustering Interactions In Brain Activity

Kale S.S

Bere S.S

77.

Applying Map reduce Paradigm for Mining In data cube

Gawade Swati

T.A.Dhaigude

78.

Decision Support System On Prediction Of Heart Disease Using Data Mining Techniques

Shinde S. B.

Amrit Priyadarshi

79.

MashQL Querying Language for the Data Web

Taware Priyanka

M.M.Waghmare

80.

A Comparative Study of Image Denoising Methods and Hybrid graph Laplacian Regularised Regression Method

Anjali Bhusagare

Sonali Rangdale

81.

Efficient Motion Estimation using Block Transform Scaling Technique

Ruchi Jain

Trupti Baraskar

82.

Performance Analysis of duty cycle over QOS parameters in WSN

Mohit Chitlange

Vivek S. Deshpande

83.

Analysis of QOS parameters of sensor network to improve Reliability

Ajinkya Nanavati

Vivek S. Deshpande

84.

Analysis Of Crowd sourced Data Using Data Mining Approach For Decision Support

Mayura Nalawade

B.A.Dixit

85.

Enhance Education with Collective Augmented Reality

Sandip S. Kote

Bharat S. Borkar

86.

A Multimodal Sentiment Analysis Scheme to Detect Hidden Sentiments

Vidula Bhat

Vivek Deshpande

Rekha Sugandhi

87.

Enhancing Comparator Extraction for Decision Making Process

Shrutika Narayane

Sudipta Giri

88.

A Novel Approach for Data Intensive Caching for Big Data Application Using Hadoop Framework

Shakil B. Tamboli

Smita Shukla Patel

89.

Data Annotation for Search Result from Web Database

Priyanka Jadhav

Snehal Nargundi

90.

Face Recognition Using Local Patterns

Mukesh D. Rinwa

Bharat S. Borkar

91.

Performance Analysis of Throughput for FCFS Scheduler in WSN

Adwait A. Pathak

Vivek Deshpande

92.

Extraction of Feature Set for Finding Fraud URL Using ANN Classification in Social Network Services

Vaibhav V. Satane

Arindam Dasgupta

Sudeep K. Hase

93.

An Implementation for Enhance the lifetime of wireless sensor Network Using Fault Node Recovery algorithm

Takale Dattatray

Amrit Priyadarshi

94.

Performance Analysis of Multipath Routing in WSN

Devendra Mahajan

Vivek Deshpande

95.

Detection Of Plant Leaf Diseases Using Image Processing And Android O.S.

Renuka R.Kajale

Sonali Rangadale

96.

Advanced Diffusion for Image Authentication

Rupali Lakhotiya

Rashmi Deshpande

97.

Examplar Method For Image Inpainting

Rohit Panchwagh

Rashmi Deshpande

98.

Reversible Data Hiding in Encrypted JPEG Bitstream using LSB based on chaos and the genetic algorithm.

Vaibhav Barve

S. S. Bere

99.

Implementing Dynamic Bayesian Network for Soccer Videos Event Detection & summarization

Rupali Bongane

S. S. Bere

100.

Duplicate video and object detection by video keyframe uisng F-SIFT

Tanvi Gadgi

Amrit Priyadarshi

101.

Video Retrieval using Textual Queries and Spoken Text

Laxmikant Kate

M. M. Waghmare

102.

Boundary Cutting for Packet Classification using Bloom Filters

Namita N. Kothari

Suvarna E. Pawar, A.R. Panhalkar

103.

Automatic Line Scratch Detection and Removal in Digitized Film Sequence.

Mr. Amit Bankar

Bharat S. Borkar, Ashok V. Markad

104.

Trustworthy Resource Scheduling using Openstack in Cloud

Yogesh Jilhawar

Emmanuel M.

105.

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology

Bhavana Adgaonkar

Dipak R.Patil

106.

Securing Enterprise Data using Policies and User Perceptions in the Cloud

Rakhi R. Dighade

S. M. Jaybhaye

107.

Dynamic Key Aggregate Cryptosystem for Secure Data Storage in Cloud

Patil Sagar

Kirti S. Korabu

108.

Confidential and Efficient Query Services in the Cloud Using RASP

Shital V Patil

R S Sonar

109.

Task Scheduling in the Cloud Using Machine Learning Classification

Abhijeet Tikar

S.M.Jaybhaye, G. R. Pathak

110.

Resource Bill Prediction and the Comparison System for Cloud Consumers to achieve Cost Effective Uses

Aditi. A. Irkal

Monika Mishra

111.

Enhancing Secure Access Control for Cloud Storage

Gauri Bandewar

R. H. Borhade

112.

Secure Protocol Based Solution to Avoid Attacks on Live Virtual Machine Migration

Rajesaheb Kadam

113.

A Click Based Graphical Password Scheme Using Hard AI Problems

Pranita Mokal

Rohit N. Devikar

114.

Dynamic balancing of complex event and data recovery in cloud environment

Pranjali Dhore

Kishor Kolhe

115.

Privacy preserving technique to secure cloud

Vitthal S. Gutte

Priya Deshpande

116.

Skewness a challenge for MapReduce in Big Data

Vishal A. Nawale

Priya Deshpande

117.

Dynamic Data Deduplication in Cloud Services

Mohini Vikhe

Kishor Kinage, Jyoti Malhotra

118.

A Conceptual Phenomenon for Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystem.

Rohit Tate

Jyoti Pingalkar

119.

Elasticity of Web Application for Cloud Computing Services

Sushil Deshmukh

Sweta Kale

120.

Cloud Computing Setup for Billing Scheme to Achieve Mutually Authentication

Neha Dodke

Sweta Kale

121.

Secure Way To Outsource Data On Cloud By Using Symmetric Encryption

Ramakrishna Jadhav

Snehal Nargundi

122.

Data Duplication for cloud backup services

Nidhi Panpaliya

Prachi Sorte

123.

Security of Multimedia Data Transmission stored on Cloud Watermark Technique

Ujwala Pawar

Dhara T. Kurian

124.

A Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour

Preeti R. Sawant

Sachin S. Pande

125.

Group Key Authentication against Vampire Attacks in WSN

Shweta Ghate

VivekDeshpande

Anil Hiwale

126.

Cloud Based Social Multimedia for Mobile Users

Anupkumar Tarkase

Nilesh J.Uke

127.

Data Security for Cloud computing Storage System

Jayshree Shinde

U. R. Godase

128.

Data Deduplication using Hybrid Cloud Architecture

Gaurav kakariya

Sonali Rangdale

129.

Network Intrusion Detection technique for Regular Expression Detection using DPI in wireless network.

Girish Wandhare

S. N. Gujar

V. M. Thakare

130.

Cluster Based Secured Data Aggregation In WSN Using Genetics

Balaji Dande

Nilesh J. Uke

131.

Cluster Based Certificate Revocation Scheme In Mobile Ad Hoc Networks

Megha Jarang

M V Nimbalkar

132.

Intrusion Detection in Multitier Web Applications Using DoubleGuard

Neha A. Mohadikar

M. V. Nimbalkar

133.

Authentication Scheme for Smart Grid: A Conceptual Design

Shilpa M.Shelke

Aarti A. Agarkar

134.

PTP Approach in Network Security for Misbehavior Detection

Neha Pathak

R. S. Apare

135.

Protecting Location Privacy for Continuous LBS Query in Distributed Manner

Sneha Desai

B. N. Jagdale

136.

Preserving Source node privacy in wireless sensor Network

Devdatt Nadre

Balaso N. Jagdale

137.

Sink Location Privacy Protection in Wireless Sensor Network

Abhishek Malviya

Balaso N. Jagdale

138.

Security Experiments in Mobile Devices and its Ad-hoc Networks

Smita Suryawanshi

Balaso N. Jagdale

139.

Security Preserving Access Control Mechanism In Public Clouds Using PANDA Security Mechanism

Mrunali Pingale

Jyoti Pingalkar

140.

Enhanced Network Intrusion Detection To Compute High Performance In Witty Environment.

Neha Sutar

Jyoti Pingalkar

141.

Secure Advanced Web Search Personalization

A. A. Patil

Amrit Priyadarshi

142.

Real-Time Data Based Denial-Of-Service Attack Detection Technique Derived From Statistical Traffic Analysis

Sanjivani Bakshi

Sweta Kale

143.

Reversible Data Hiding For Privacy Preservation in Cloud Data Management

Shruti R. Joshi

Prachi Sorte

144.

Hiding User Privacy In Location Based Services Through Clustering

Nilam Khandade

Snehal Nargundi

145.

Recognition of Day Night Activity Using Accelerometer Principals with Aurdino Development Board

Swapna Arote

R.S. Bhosale ,S.E. Pawar

146.

Localization and Key Management in Wireless Sensor Network: A Survey

Amar D. Rana

Ganesh R. Pathak

147.

A study of Different Attacks on Localization in WSN

Yogendra Suralkar

Ganesh R. Pathak

148.

An Efficient High Dimensional Data Clustering Using MapReduce

Avinash Dhanshetti

Tushar Rane

S. T. Patil

149.

Detection of Duplicate Objects in Semi Structured Data like XML

Kiran Lokhande

Tushar Rane

S. T. Patil

150.

Effective Intrusion Detection System using Combination of Data Mining Techniques

Kailas S. Elekar

M.M. Waghmare

151.

Predicting Medicinal Plant Based On Diagnostic Keys and Location Information

Shyam Pundkar

M. M. Waghmare

152.

Automated Test Data Generation for Coupling Based Integration Testing

Amit A. Kadam

Anant M. Bagade

153.

Advancement Based Decision Support Software for a Team-In-The-Loop Experiment: Asset Bundle Selection and Planning

Honey S Goyal

Emmanuel M.

154.

Energy Efficient Face Tracking Scheme for Target Movement Detection in WSN

Ashvini Pawar

S. A. Nagtilak

155.

Content Based Video Retrieval Using Integrated Feature Extraction

Pradeep Chivadshetti

Kishor Sadafale, Kalpana Thakare

156.

Social-Aware Video Pre-fetching for Multimedia Streaming

Nikhil Katore

Nilesh J. Uke

157.

Analysis of Common data from using Machine Learning Mechanism

Priyanka Bhurkunde

K.S. Korabu

158.

Personalization of Mobile Search Engine using Ontology

Snehal D. Jadhav

Vaishali Suryawanshi

159.

Internet Image Search Using Semantic Signature

Sujata S. More

S. C. Dharmadhikari

160.

Owner Secured Data Storage On Cloud and Sharing With Key Aggregate Cryptosystem

Nilesh Deshmukh

Aditi Jahagirdar

161.

Heterogeneous Face Recognition Framework for Person Identification

Sagar C. Saibewar

Bharati Dixit & Anjali Chandavale

162.

A Service Recommendation Method based on User Preferences for Big Data Applications

Nachiket S Bhosale

S. S. Pande

163.

Image Processing Application Based on Map Reduce

Tejashree Gaikwad

S B. Deshmukh

164.

Enhancing Quality of Service (QoS) in Hybrid Wireless Networks by Dynamic Resource Scheduling

Dharurkar Kishori

Dipak R.Patil

165.

Securing Real Social Authentication System from Forest Fire Attacks

Anwaya Patil

Kalpana Thakare

Kishor Sadafale

166.

Hybridization of TDMA and CSMA/CA for Synchronization in Cluster Based Wireless Sensor Networks

Mahadev Khatke

Pratibha Chavan

167.

Privacy protection in personalized web search by hybrid personalization

Khushal Rathod

Pratibha Chavan

168.

Malware Analysis Using Hadoop and MapReduce.

Nilesh Dengle

S.C.Dharmadhikari

169.

Reversible De-Identification for Lossless Image Compression using reversible watermarking

Kiran Kadam

Sonali Rangadale

170.

Derived Extended Matrix Encoding Algorithm for Better Embedding Efficiency

Pritesh Patil

Arindam Das Gupta

171.

ROCloud: Reliability based optimization for cloud migration

Kadlag Rohini

Rohit N. Devikar

172.

Implementing Data Security In Multi Cloud

Renu Shinde

Varsha Khandekar

173.

Increasing Data Privacy in Cloud by Self-Destruction Mechanism

Kshama Bothra

Sudipta Giri

174.

Confidentiality and efficient query services in Cloud

Sapana Vasave

Kishor Kolhe

175.

Automation on Twitter Accounts

Swati Dehade

A.M.Bagade

176.

A Network Security Metric For Measuring Risk and Reranking of Unknown Vulnerability for Zero Day Attacks

Harshpal Gosavi

Anant Bagade

177.

A Novel CAPTCHA Solving Technique Based on Deep Convolutional Neural Networks

Amar U. Khopade

Emmanuel M

178.

Zero Wire Password Authentication System in ATMs Using GSM Technology

Kranti Gule

Rohit N. Devikar

179.

Front Pages

AVCOE, Sangamner