S.No. |
Name of Staff |
Publication Details |
Name of the Journal /Proceeding |
Duration |
1 |
Prof.Dr.S.P.Kadam |
Performance analysis of pre-processing techniques with ensemble of 5 classifier |
International Journal on recent & innovation trends in computing & communication |
2016-17 |
2 |
Prof.V.D.Kulkarni |
Centralized digital media for easy broadcasting |
Imperial Journal of Interdisciplinary Research (IJIR) |
2016-17 |
3 |
Prof.Dr.S.P.Kadam |
Ensembles of classifier for intrusion detection system |
International Journal of engineering & advance technology IJEAT |
2016-17 |
4 |
Prof.K.S.Warke |
A real sense based multilevel security using cloud framework and image processing. |
International journal of engineering research online. |
2016-17 |
5 |
Prof.K.S.Sawant |
Traffic Detection from Real Time Twitter Stream Analysis and Navigation System |
International Journal of Engineering Science and Computing |
2016-17 |
6 |
Prof.K.S.Warke |
Fog Computing based Decoy Technology for Cloud Data Security using Machine Learning |
International journal of Engineering Science & Research Technology |
2016-17 |
7 |
Prof.K.D.Yesugade |
Emotion Based music player with sleep alert system |
IJCTA |
2016-17 |
8 |
Prof.S.A.Pawar |
Traffic Detection from Real Time Twitter Stream Analysis and Navigation System |
International Journal of Engineering Science and Computing |
2016-17 |
9 |
Prof.S.B.Jadhav |
Social media post Analyzer |
International journal of computer Science & information technology research |
2015-16 |
10 |
Prof.K.S.Sawant |
Automated Toll Collection System Using NFC and Theft Vehicle Detection |
International journal of computer Science & information technology research |
2015-16 |
11 |
Prof D.D.Pukale |
Document Image Binarization for Degraded Document Images along with OCR |
Imperial Journal of Interdisciplinary Research (IJIR) |
2015-16 |
12 |
Prof.Dr.S.P.Kadam |
WiFi Network pentest using android application. |
International Journal for Scientific Research & Development |
2015-16 |
13 |
Prof.V.D.Kulkarni |
INAIRDRUMS: A Virtual Percussion Instrument System |
International Journal of Exploring Emerging Trends in Engineering (IJEETE) |
2015-16 |
14 |
Prof.K.S.Warke |
Spam Email Classification and Blocking. |
International Journal of Advance Research in Computer science and Management Studies |
2015-16 |
15 |
Prof.K.S.Sawant |
Automated Toll Collection System Using NFC And Theft Vehicle Detection |
International Journal Of Engineering And Computer Science |
2015-16 |
16 |
Prof.J.D.Jadhav |
Intelligent Device to Device communication for home appliance using IoT. |
International Journal of research in information Technology |
2015-16 |
17 |
Prof.J.D.Jadhav |
Smart Trolley: A fast & smart shopping Experience using android & cloud |
International Journal of Innovative Research & advanced studies |
2015-16 |
18 |
Prof.J.D.Jadhav |
Security in banking sector using cloud computing with TPA. |
International Journal of Innovative Research in technology |
2015-16 |
19 |
Prof.J.D.Jadhav |
Map application using augmented reality technology for smart phones. |
International Journal of Science and engineering Applications |
2015-16 |
20 |
Prof.K.D.Yesugade |
Infrastructure Security Using IDS, IPS & honeypot |
International Engineering Research Journal |
2015-16 |
21 |
Prof.K.D.Yesugade |
Object detection on an android mobile phone which gives voice description |
International journal of advanced research |
2015-16 |
22 |
Prof. A.P.Kadam |
Improving Efficiency of Parallel Mining of Frequent Itemset using Hadoop-HD. |
International Engineering Research Journal |
2014-15 |
23 |
Prof.K.D.Yesugade |
Argo-sense a mobile application for efficient farming system using sensors |
International Journal of engineering |
2014-15 |
24 |
Prof D.D.Pukale |
Image matcher- CBIR System using image sub-blocks and indexing |
International Journal of Computer Science and Information Technologies |
2014-15 |
25 |
Prof.Dr.S.P.Kadam |
A Survey on FAST Feature Subset Selection Algorithm |
International Journal for Scientific Research & Development |
2014-15 |
26 |
Prof.Dr.S.P.Kadam |
An efficient approach for Phishing website detection using visual cryptography and quick response code(QR). |
International journal of computer application |
2014-15 |
27 |
Prof.Dr.S.P.Kadam |
Modern method for phishing website detection using visual cryptography (VC) and quick response code (QR code) |
International journal of engineering research & application |
2014-15 |
28 |
Prof.Dr.S.P.Kadam |
Study of testing of security model for an object oriented design(SMOOD) |
International journal of Scientific Research and Development |
2014-15 |
29 |
Prof.S.B.Jadhav |
Forensic Investigation for database tampering using audit logs |
ESRSA Publication International journal of Engg. Research and Technology |
2014-15 |
30 |
Prof D.D.Pukale |
Image and annotation retrieved Contents and Tags |
International Journal of Specific And research publications |
2013-14 |
31 |
Prof.K.D.Yesugade |
Hand motion recognition |
International Journal of Innovative technology and exploring Engineering |
2013-14 |
32 |
Prof.K.D.Yesugade |
Security Enforcement & query forwarding while preserving system wide privacy |
International journal of computer science & mobile computing |
2013-14 |
33 |
Prof.K.D.Yesugade |
Argo-sense: A cloud enabled mobile app & efficient farming system using WSNs |
International journal for scientific research & development |
2013-14 |
34 |
Prof.K.D.Yesugade |
System Handling using email |
International Journal of Innovative Science and Modern Engineering |
2013-14 |
35 |
Prof.S.A.Deshmukh |
Credit Card Fraud detection using IRIS Biometrics Techniques |
International Journal of Scientific & Engineering Research, |
2013-14 |
36 |
Prof.S.A.Deshmukh |
Credit Card Fraud detection using IRIS Biometrics Techniques |
International Journal on Advanced Technology in Engineering and Science |
2013-14 |
37 |
Prof.Dr.S.P.Kadam |
Cloud setup for college campus with Data Security and Reliability. |
International Journal of Scientific Research |
2012-13 |
38 |
Prof.S.B.Jadhav |
Secure sharing of personal health records using Multi authority attribute based encryption in cloud computing |
International journal of scientific research |
2012-13 |
39 |
Prof.J.D.Jadhav |
A survey on distributed system applications using design pattern |
International Journal of Computer science and technology |
2012-13 |
40 |
Prof.J.D.Jadhav |
Distributed transaction system application using design pattern |
International Journal of soft computing and engineering |
2012-13 |
41 |
Prof.N.I.Dalvi |
Efficient method for detecting inconsistencies in UML design model. |
International journal of advances in management, technology and engineering sciences |
2012-13 |
42 |
Prof D.D.Pukale |
E-voting through biometrics & cryptography steganography technique with conjunction of GSM modem |
International journal of computer applications |
2012-13 |
43 |
Prof.S.A.Pawar |
Agent based testing tool for event driven software |
International journal of engineering research & applications |
2012-13 |