Academic Year 2014-2015  

  • Title :- Preserving privacy of data in Distributed Systems using Homomorphic Encryption
    Paper:- presented and published
    Level :- international

    By: mrs. namrata patel
    Organizer :- ICACIE2019
    Venue :- Online
    Date: 11/03/2020

    Abstract​— ​Distributed systems like cloud platforms are being used widely in recent times. However, such platforms face a major issue of data storage on cloud in terms of security. If data on the cloud is not encrypted, it can be accessed by unauthorized members. This violates the confidentiality of the data. If data is stored in an encrypted format, every authorized party member will have to decrypt the data first in order to perform operations on it, and then encrypt it back to upload it on the distributed platform. This has to be done every time every member performs operations on data. Needles to say, it complicates the entire procedure of sharing data and a lot of time is wasted in encrypting and decrypting data even for small operations like searching and sorting. ​To avoid these complications, this paper suggests a way to store data on cloud by homomorphically encrypting it. Homomorphic encryption allows user to compute on encrypted data without the need of decrypting it. In this paper Elliptic Curve Cryptography(ECC) is used for homomorphic encryption of data. The size of the cipher text generated by ECC is smaller than the cipher text generated by other encryption schemes. As cloud is mostly used for storing databases this paper further employs searching and sorting techniques on the encrypted data.

  • Title :- Image Mining using Multiple Features
    Paper:- presented and published
    Level :- international

    By: dr. varsha patil
    Organizer :- Springer
    Venue :- Bhubaneswar, Odisha
    Date: 23/02/2019

    This paper discusses an image mining algorithm for efficient and accurate image retrieval. The proposed method uses multiple image features combination. Color feature in the form of 1st order, 2nd order and 3rd order moment is calculated on a sub-block. These moments calculates statistics features over a local region. The computed first order moment is considered as mean. Standard deviation and skewness is considered as second order and third order moment respectively. These features are calculated for images and stored in database. For texture extraction, Center Symmetric Local Binary Pattern (CSLBP) feature is used. CSLBP is straightforward in computation and it is also rotation consistent. CSLBP generates histogram of 16 bin for one sub-block. In order to capture minute details around local region, Laplacian of Gaussian (LoG) is used as a weight factor during CSLBP histogram construction. This weight factor makes texture feature more powerful and increases its discrimination power. Resultant weighted histogram is quantized and binary result is stored in database. For test image, its texture and color features compared with stored texture and color features. Based on color and texture feature’s correlation with test image, results are retrieved. Our results clearly shows that, by incorporating the multiple features as well as local weight factor, the proposed image mining gives desirable retrieval results.

  • Title :- Development of Facility Layout for Medium-Scale Industry Using Systematic Layout Planning
    Paper:- presented and published
    Level :- international

    By: mr. onkar potadar
    Organizer :- D J Sanghvi College of Engineering, Vile Parle, Mumbai
    Venue :- D J Sanghvi College of Engineering, Vile Parle, Mumbai
    Date: 20/07/2018

    Paper Titled "Development of Facility Layout for Medium-Scale Industry Using Systematic Layout Planning", Presented in the conference.

  • Title :- Cryptographic Techniques for Wireless Sensor Networks: A Survey
    Paper:- presented and published
    Level :- international

    By: ms. priyanka kadam
    Organizer :- IEEE Bombay Section
    Venue :- SNDT juhu mumbai
    Date: 10/09/2015

    The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).

  • Title :- Thinking, Pairing, and Sharing to Improve Learning and Engagement in a Data Structures and Algorithms (DSA) Class
    Paper:- presented and published
    Level :- international

    By: dr. deepti patil
    Organizer :- Taipei, Taiwan
    Venue :- Taiwan
    Date: 10/04/2015

    IEEE International Conference on Learning and Teaching in Computing and Engineering (LaTiCE), 2015.

  • Title :- A Novel Approach to Detect Android Malware
    Paper:- presented and published
    Level :- international

    By: ms. bushra shaikh
    Organizer :- DJ Sanghvi COE, Andheri
    Venue :- DJ Sanghvi COE, Andheri
    Date: 26/03/2015

    This paper proposes a system which would help the users in analysing and removing such harmful apps and thereby protecting their security and privacy. This is achieved by analysing the various permissions used by an application that it has requested during installation. The overall process of analysing apps is done using clustering and classification techniques. The major objective of the proposed system is to detect and remove the malwares that are present in the user's Android device.

  • Title :- Impact of retransmission policies on performance of concurrent multipath transfers in wireless heterogeneous networks
    Paper:- presented and published
    Level :- international

    By: dr. shubhangi kharche
    Organizer :- IEEE International Conference on Advances in Electronics Computers and Communications
    Venue :- Reva University Bangalore
    Date: 11/10/2014

    Mobile devices with oodles of interfaces communicating concurrently through multi-homed access networks with a blend of wired and wireless transmission parameters need efficient data delivery. To suffice the need this paper investigates the impact of various retransmission policies, viz. RTX-SAME, RTX-ASAP, RTX-LOSSRATE, RTX-SSTRESH, RTX-CWND, AllRtxSame, AllRtxAlt and FrSameRtoAlt on the throughput of concurrent multipath transfers (CMT). The performance analysis for the first five policies being extended with partial reliability extension of Stream Control Transmission Protocol (PR-SCTP). The simulation was conducted using NS-2.35 on a multi-homed heterogeneous network with wired links and WiMAX, 3G, 4G and 5G specifications supporting wireless links. The paper validates that among the five basic retransmission policies RTX-ASAP performs best both for CMT using SCTP and for CMT using PR-SCTP. AllRtxAlt performs best for aggressive fail over case under dissimilar path loss rates.

  • Title :- A Comprehensive Overview Of ARM Algorithms In Real Time Inter Transactions
    Paper:- presented and published
    Level :- international

    By: ms. kranti bade
    Organizer :- International Journal of Current Engineering and Technology
    Venue :- online journal
    Date: 25/08/2014

    Association rule discovery from large databases is one of the tedious tasks in data mining. Most of the previous studies on mining association rules are on mining intra transaction associations, i.e., the associations among items within the same transaction where the notion of the transaction could be the items bought by the same customer, the events happened on the same day, etc. Mining intertransaction associations has more challenges on efficient processing than mining intratransaction associations because the number of potential association rules becomes extremely large after the boundary of transactions is broken. In this paper, we reviewed the notion of intertransaction association rule mining given by algorithms such as EH-Apriori and FITI. FTTI generates many unnecessary combinations of items because the set of extended items is much larger than the set of items. Thus, In order to provide efficient approach of g-based intertransaction association rule mining is used, where this group of transactions are following certain constraints. This paper helps to do comparative study of algorithms which will help in analyzing the predictions on stock market data.

  • Title :- Student Model for an Intelligent Language Tutoring System.
    Paper:- presented and published
    Level :- international

    By: dr. deepti patil
    Organizer :- Greece
    Venue :- Greece
    Date: 08/07/2014

    Advanced Learning Technologies (ICALT), IEEE 17th International Conference on Advanced Learning Technologies (ICALT 2014), Athens, Greece, July 2014.

  • Title :- Hybrid Air Conditioning System
    Paper:- presented and published
    Level :- international

    By: mr. ajay hundiwale
    Organizer :- ISHPC 2014
    Venue :- University of Maryland, College Park USA
    Date: 23/04/2014

    M V Rane and A S Hundiwale (2014) on ‘Hybrid Air Conditioning System’ in ISHPC 2014 at Center for Environmental Energy, Engineering, University of Maryland, College Park USA.

  • Title :- Cryptography based on Color Substitution
    Paper:- presented and published
    Level :- international

    By: dr. aparna bannore
    Organizer :- International Journal of Computer Applications
    Venue :- Computer Lab
    Date: 01/01/2014

    The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong. Computer SciencePublished 2014 DOI:10.5120/15967-5355

  • Title :- Association Rule Mining Using Graph and Clustering Technique
    Paper:- presented and published
    Level :- international

    By: ms. seema redekar
    Organizer :- IEEE International conference
    Venue :- Delhi
    Date: 03/11/2012

    Presented and published paper in IEEE Inernational Conference, “Comutational Intelligence and Communication Networks”(CICN-2012) at Mathura on 3-5 November, 2012.

  • Title :- Catalytic oxidation of alcohols using TBHP as an oxidant over LaMO3 (M = Cr, Mn, Co, Ni, Fe) perovskites
    Paper:- presented and published
    Level :- international

    By: dr. savita katiyar
    Organizer :-
    Venue :- Pune University, Pune, India
    Date: 05/07/2010

    Presented as poster at International Conference on “Emerging Trends in Chemistry” January 5-7, 2010, Pune University, Pune, India.

  • Title :- 2. Investigations of fluctuations on phase transitions in light nuclei
    Paper:- presented and published
    Level :- international

    By: dr. g. kanthi mathi
    Organizer :- DAE-BRNS
    Venue :- BARC, Mumbai
    Date: 08/12/2009

    Phase transitions in high spin nuclei

  • Title :- Chemoselective O-tert-butoxycarbonylation of hydroxy compounds using NaLaTiO4 as a heterogeneous and reusable catalyst
    Paper:- presented and published
    Level :- international

    By: dr. savita katiyar
    Organizer :-
    Venue :- Karnatak University, Dharwad, Karnataka, India
    Date: 23/11/2008

    Presented as oral at International Conference on “Recent Advances in Chemistry” November 23- 27, 2008, Karnatak University, Dharwad, Karnataka, India.

  • Title :- Improvement in return loss of hybrid ring equal power divider using T EBG
    Paper:- presented and published
    Level :- international

    By: ms. pranavi mhatre
    Organizer :- Terna Engineering College
    Venue :- Terna College
    Date: 30/09/2007

    Improvement in return loss of hybrid ring equal power divider using T EBG is presented in paper.