Department of Computer Engineering

Student Publications

Name of Student

Title of Paper

Name  of Journal / Conference

National/ International

Year of Publication

1

Poonam N. Railkar,

“Smartphone-based Context Aware Proactive System for Profile Translation
(S-CAPSPT),”

In Springer journal of Communications in mobile computing

International

2013-2014

2

Shinde Jyoti R,

“Double Guard: Detecting Intrusions in Multi-Tier Web Applications,”

Scholarly Research Journal for Interdisciplinary Studies

International

2013-2014

3

Priyanka N Kamble

“Decision Theory based Auto-delegation (DTA-d) scheme for Ubiquitous Computing,”

International Journal of Computer Applications 79(7):1-6,Foundation of Computer Science, New York, USA.

International

2013-2014

4

Poonam Railkar,

“Review and Reputation based Trust Score Calculation for WLAN (RRTSC),”

International Journal of Computer Applications 79(7):1-6,
Foundation of
Computer Science,
New York, USA

International

2013-2014

5

Shruti Utpat,

“Secure authentication protocol for ubiquitous computing,”

International Journal of Computer Applications 79(7):1-6,
Foundation of Computer Science, New York, USA.

International

2013-2014

6

G. S. Bhamare,

“Enhancement of Color Image in RGB Space”

International Journal of Engineering Research & Technology (IJERT)2014

International

2013-2014

7

Vaibhav Bharati

“Advanced Cooperative Provable Data Possession Based data Intergrity verification for multi-Cloud Storage”

International Journal Of Computer Applications

International

2013-2014

8

Piyush Sonewar

“A survey of Intrusion Detection System for Web Application”

International journal of Engg research & Technology

International

2013-2014

9

Sonali Thosar

“Privacy preserving integrity verification for securing cloud storage”

International journal of Engg research & Technology

International

2013-2014

10

R Kagade,

“Robust Topology, Self-Scheduling Approach Based on Remaining Energy for WSN”

(IJCSIT) International Journal of Computer Science and Information Technologies

International

2013-2014

11

Sonia Pise,
Pooja Patil,
Snehal Yadav, Manjushri Sarode,

“Green Could Computing for Smart Phones through Multimedia Cloud”

International Journal of Computer Information Systems,

International

2013-2014

12

Anuse Ambuja,

“Detection And Prevention of Misbehaving Users in Anonymizing Networks”

(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (6), 1034-1037 , 2013

International

2013-2014

13

Madhura Sanap,

“Bin SDR : Effective Algorithm for Wireless Sensor-actor Network”

ICACNI , Advances in Intelligent Systems and Computing, Springer Vol. 243,June 2013

International

2013-2014

14

Pramod Mane

“Watchdog Three Tier Technique to secure WSN”

International Journal of
Computer and Information Technology

International

2013-2014

15

Rajendra Navale,

“An efficient Load balancing algorithm for energy utilization in WSN”

International Journal of computer Applications Nov 2013

International

2013-2014

16

Rajendra Navale,

“A Distributed topology control technique for low interference and load balancing for energy utilization in WSN”

International Journal of Scientific and Engg. Research July 2013

International

2013-2014

17

Ashwini Borude

“Next Generation
Vehicular Traffic Management By
VANET using
OLSR protocol”

International Journal of Information Technology and Sys. (IJITS)

International

2013-2014

18

S. P. Dugam

“An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks”

”.International
Journal of Computer Applications

International

2013-2014

19

Anuja gaikwad

“Enhancement Of BFF Algorithm For Energy Aware Path  Selection  In FISH Network.”

International Journal on Computer Science and Technology (IJCST)

International

2013-2014

20

R. Dayma

“Optimal Traffic Engineering in Link State Routing Protocols”

International Journal of Computer Applications. (IJCA)

International

2013-2014

21

Prashant Dhangar, Amit magar,Yogesh Waghmare

“Lightweight DNS for Multipurpose and Multifunctional Devices.”

International Journal of Engineering and Innovative Technology(IJEIT 201304-1758)

International

2013-2014

22

Ankita Shinde

“Classification based on Predictive Association Rule for Discrimination Prevention”

International Journal of Computer Applications

International

2013-2014

23

Snehal Pise

“Security of Personal Health Records through Attribute Based Encryption in Cloud Computing”

International Journal of Engineering Research and Technology (IJERT)

International

2013-2014

24

Shantanu Sasane

“Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS”

International Journal of Engineering Research & Technology (IJERT

International

2013-2014

25

Ms. Manali Dubal

“On Pseudo-Random Number Generation using Elliptic Curve Cryptography”

International Symposium on Security in Computing and Communications (SSCC’13),22 – 24 SJCE, Mysore, India.

International

2013-2014

26

Priyanka Takalkar

“Secure Data Transmission Model in MANET”

SSCC
http://www.ijcaonline.org/archives/volume67/number24/11736-7366

International

2013-2014

27

Priyanka Takalkar

“Futuristic Trolley for Intelligent Billing with amalgamation of RFID and ZIGBEE”

http://www.ijcaonline.org/proceedings/icrtet/number5/11792-1357

International

2013-2014

28

Shruti Utpat,

“A SIP Based Authentication
Scheme for RFID Systems”

International journal of advance engineering and technology(IJARCET)

International

2013-2014

29

Arti Naik

“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network”

Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and  Computing

International

2013-2014

30

 

Arti R. Naik

“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network”

(IJARCET)
Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and  Computing

International

2013-2014

31

 

Arti Naik,

“Weather Prediction Using Error Minimization Algorithm on Feed forward Artificial Neural Network”

Intelligent Computing, Networking, and Informatics Advances in Intelligent Systems and  Computing

International

2013-2014

32

PriyankaTakalkar,

“Secure Data Transmission Model in MANET”

International Journal of Computer application

International

2013-2014

33

PriyankaTakalkar

“Trust Based Secure Data Transmission model in MANET”

International Journal of Emerging Technology in advanced Engineering

International

2013-2014

34

PriyankaTakalkar,

“Secure Data Transmission Model in MANET”

International Journal of Computer application

International

2013-2014

35

PriyankaTakalkar,

“Trust Based Secure Data Transmission model in MANET”

International Journal of Emerging Technology in advanced Engineering

International

2013-2014

36

Shweta Bora, Arpita Dixit, Sonali Chemate, Nikita Kolpekwar

Real Time Carpooling System for Android Platform

IJEIT

International

2013-2014

37

S.Y. Kulkarni

Tracing Replicated Mobile Nodes in Wireless Sensor  Network

International Journal of Engineering Practices

International

2012-2013

38

P. N.Railkar,

Proposed secure context aware profile translation

IJITS

International

2012-2013

39

P. N. Railkar,

Proposed profile translation in context aware proactive system

IJCSE

International

2012-2013

40

Sachin Babar

“ Localization and tracking for wireless sensor network “

Journal of advances in Engineering Sciences

 

2012-2013

41

Sachin Babar,

Proposed on Device Capability based Authentication using AES-GCM for Internet of Things(IoT)

3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems

International

2012-2013

42

P. N. Railkar,

Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones

IACC-2013

International

2012-2013

43

R. A. Kudale

Green Routing for WSN-2012

International Journal for Science & research Publication

International

2012-2013

44

M. Sanap

Effective  Performance analysis for Bin Periodic algorithm for WSAN -2012

IJCSIT

International

2012-2013

45

Dnyanada S. Patil,

“Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11,”

International Journal of Computer Applications
April 2013, Published by Foundation of Computer Science, New York, USA.

International

2012-2013

46

Poonam N. Railkar,

“Activity Modelling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart phones,”

International Journal of Computer Applications
May 2013, Published by Foundation of Computer Science, New York, USA.

International

2012-2013

47

Ketaki Shah, AnujaRaundal, GouriBhandari, SantwanaRathi, PoonamRailkar,

“Proposed profile translation In context aware proactive system,”

Indian Journal of Computer Science and Engineering (IJCSE) Dec 2012-Jan 2013.

National

2012-2013

48

Priti Rathi,

“Certificate Revocation In Mobile Ad Hoc Networks,”

In International Journal of Application or Innovation in Engineering & Management (IJAIEM)
ISSN 2319 – 4847, Volume 2, Issue 1, January 2013

International

2012-2013

49

Jitendra Ingale,

 

 

“Android Based WS Security and MVC Based UI Representation of Data,”

International Journal of Computer Science, Engineering and Information Technology, Volume: 3 - volume NO: 1 - Issue: February 2013

International

2012-2013

50

Madhuri Patil,

“A Novel Approach to improve Detection rate and Search Efficiency of NIDS”

International Journal of Computational Engineering Research January-2013

International

2012-2013

51

Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya

“abt[agile billing trolley] with aggregation of rfid and zigbee”

ICRTET
Mar 24, 2013ICRTET

International

2012-2013

52

Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya

“FUTURISTIC TROLLEY FOR INTELLIGENT BILLING WITH AMALGAMATION OF RFID AND ZIGBEE”

Fe\ 22, 2013ICRTET

International

2012-2013

53

Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya

Intelligent Billing trolley with coalesce of RFID & ZIGBEE

ICRTET

International

2012-2013

54

Alay Patel, Vijaya Gawande, Varsha Jalkote, Manish Bharadya

Trenchant Shopping Trolley with congregation of RFID and Zigbee

IOSR JCE

International

2012-2013

55

Sagar Latake

“Trust Opportunistic Multicast Routing (TOMR) Protocol in Multihop Wireless Network”

ICRTET


May 03, 2013

 

International

2012-2013

56

Sagar Latake

 

“Tree, Mesh Structure Based and Stateless Multicast Routing Protocols in Wireless Networks”

IJCSIT


May 03, 2013

 

International

2012-2013

57

Ms. Manali Dubal

“Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture”

International Journal of Computer Applications (0975 – 8887) Volume 69– No.24, May 2013

International

2012-2013

58

S.P.Dugam,

“An Overview of a Method for Increasing Performance and Energy Efficiency of Geographic Routing Protocol in Sensor Networks”

International
Journal of Computer Applications

International

2012-2013

59

Manali Dubal

 

Data security analysis and security extension for smart card using java card

IJATI Vol-2, No.2, DOI:10.512/ijait.2012,2204

International

2012-2013

60

Sonal Dhamak, Purvaja Khatod, Vikalpa Landge, Snha Kamble

HMM based enhanced security system for ATM payment

IRACST-2012 ISSN-2250-3498 VOL-2,No.3

International

2012-2013

61

Kushal Palesha, Swapnil Patel, Sumit Wani

Android based healthcare monitoring system on mobile cloud

NCPCI 2013, Pune

International

2012-2013

62

Madhura Sanap

 

 

Experimental analysis for bin periodic algo. & bin free algo. For wireless sensor N/W

International conference on Emerging trends in electrical comm. & info. Technology 2012 ISBN:81-312-3411-2 Pub:Elserier Ltd.

International

2012-2013

63

G.Bobhate

Reduction of the semantic gap using Pseudo elevance feedback algorithm

International conference on Advanced Engg. & Technology, Pune ISBN-978-93-82702-11-5

International

2012-2013

64

G.Bobhate

Improvement of quality of an image by using Gabor wavelet texture

International conference of computer science and information technology, Nagpur ISBN-978-82208-60-0

International

2012-2013

65

S.Y.Kulkarni

Mobile Replication Attack in Wireless Sensor Network

IJSRP International Journal of Scientific & Research Publication
ISSN No: 2250-3153
Vol -2,Issue-
4th Apr. 2012

International

2011-2012

66

Manish Ranglani

Data Integrity Proofs

International Conference On (ICSE-2012)
Apr 2012

International

2011-2012

67

R.A.Kudale

Green Routing for Wireless Sensor & Actor Network

C-PGCON-12
PG Conference Pune
21th-22nd Apr. 2012

National

2011-2012

68

S.Y.Kulkarni

Identification of Mobile Replica Node in WSN

C-PGCON-12
PG Conference Pune
21th -22nd Apr. 2012

National

2011-2012

69

Mr. Ritesh Dayama

Optimizing Link State Routing Protocol

C-PGCON-12
PG Conference Pune
21 th-22nd Apr. 2012

National

2011-2012

70

NishabenVaghela

IP Based Object Identification using RFID in Ubiquitous Computing

C-PGCON-12
PG Conference Pune
21th-22nd Apr. 2012

National

2011-2012

71

Nitesh Kumar, Jatin Kakani, Rahul Dalal

M-torrent-torrent for java supported mobile phones

International journal of wireless communication
Vol-2,April 2012

International

2011-2012

72

Akhil Mangla

Idea generation algorithm based system

Advanced Materials Research
Trans tech publication, Switzerland
403-408
2012
ISSN No: 1022-6680

International

2010-2011

 

Top