ICAET 2015 Track 1
Conference Issue: Track 1 Papers
International Conference on "Advances in Engineering & Technology (ICAET– 2015)"
Special Issue published by:
International Journal on Recent and Innovation Trends in Computing and Communication
1. Review on Novel Protocol for Secure Mining in horizontally Distributed Database
Authors: Nidhi Kumari, Sonali Bodkhe
Page No.: 01 - 04
2. A Review of Sybil Attack in Mobile Adhoc Network
Authors: Ms. Yamini D. Malkhede, Prof.Purnima Selokar Ms Yamini D Purnima Prof Selokar .
Page No.: 05 - 08
3. Cloud Computing Framework for Agro – Advisory System
Authors: Mr. Roshan S. Bhanuse, Mr. Rajesh C. Dharmik
Page No.: 09 - 11
4. Exploring the R Envinronment for Text Mining of Twitter Data
Authors: Mr. A. R. Ukalkar
Page No.: 12 - 14
5. A Review on Clustering Techniques using Side-Information for Mining
Authors: Firdous Sadaf M.Ismail, Prof. Amol G. Muley
Page No.: 15 - 17
6. Energy Consumption on Android Phone Web Browsing in 3G network
Authors: Prof. Prachi Jaini, Prof. Prachi Jaini Prajakta Kulkarni
Page No.: 18 - 21
7. Sentiment Analysis on Social Networking: A Literature Review
Authors: Prof. Durgesh M. Sharma, Mr. Manish S. Sharma
Page No.: 22 - 27
Authors: Ms.Shraddha Agnihotri, Prof.Anil Bende
Page No.: 28 - 32
9. Tracing out Human Body from Image with Implementation of Coarse of Fine Strategy
Authors: Ms.Priyanka Thakare, Prof.Anil Bende
Page No.: 33 - 37
10. Cloud Based Teaching and Learning Environment for Smart Education
Authors: Mrs. Snehal Narale, Mrs. S.M.Barhate
Page No.: 38 - 41
12. Pattern recognition based techniques for fruit sorting: A survey
Authors: Jyoti Jhawar, Amol G. Muley
Page No.: 46 - 49
13. Big Data Analytics Tools: A Review
Authors: V. P. Mahatme, Yogeshwary Sarode, Shital Radke
Page No.: 50 - 53
14. Quality Analysis & Product Management of Agriculture Field using Cloud Computing
Authors: Vaishali Madane, Abhijeet Bajapayee
Page No.: 54 - 55
15. A Review on Automated One-to-many Data Linkage
Authors: Shahid Anwar, Prof Rushi Longadge, Prof Deepak Kapgate
Page No.: 56 - 59
16. Using Location Services in Android And Track Mobile And User Information
Authors: Venu Sahu, Mr. Bhupesh Kumar Dewangan
Page No.: 60 - 61
17. Big Data Issues and Challenges
Authors: Mrs. Sneha Gupta, Mr. Manoj S. Chaudhari
Page No.: 62 - 67
Authors: Devbrat Sahu, Mrs. Deepty Dubey
Page No.: 68 - 69
19. Hole Detection and Healing for Improving Coverage in WSNs
Authors: Renuka Kadu, Prachi Jaini
Page No.: 70 - 73
20. Extended Scheme of Visual Secret Sharing for Digital Images
Authors: Khemutai K. Tighare, Chetan Bawankar
Page No.: 74 - 76
21. Tamper Protection for High-Efficiency Video
Authors: Ms. Bhagyashri L. Gabhane, Mrs. Leena H. Patil, Mr. Praful V. Barekar
Page No.: 77 - 80
22. A Survey on Crypto-Steganography
Authors: Shristi Mishra, Ms.Prateeksha pandey
Page No.: 81 - 84
23. A Survey Paper On Single Image Dehazing
Authors: Vinkey Sahu, Mrs.Manjusha Singh
Page No.: 85 - 88
24. Reversible Data Hiding in Encrypted Image using Visual Cryptography
Authors: Nuzhat Ansari, Prof. Rahila Shaikh
Page No.: 89 - 92
25. Green Computing: The approaches to Go Green
Authors: B.A.Deshpande, Rasika Kuware
Page No.: 93 - 95
26. A Survey Paper on Image Retrieval Based on Colour Feature
Authors: Suraksha Ransingh, Mrs Manjusha Singh
Page No.: 96 - 98
27. Effective Method for Image Classification with view Consistency Using Genetic Algorithm
Authors: Dnyaneshwar D. Sonewane, Prof. Amit Pimpalkar
Page No.: 99 - 101
28. HealthCare Monitoring and Alerting System Using Cloud Computing
Authors: Jubi Rana (Author), Abhijeet Bajpayee (Author)
Page No.: 102 - 105
29. Retinal Disease Diagnosis by AVR calculation on Retinal Images
Authors: Minakshee K. Chandankhede, Prof.Leena H. Patil, Prof.Praful V. Barekar
Page No.: 106 - 109
30. A System To Provide Efficient Recommendation Based On Side Information Clustering- A Review
Authors: Nikita P.Katariya, Prof. M. S. Chaudhari
Page No.: 110 - 113
31. Gist Generation of Hindi Document Using Statistical Method A REVIEW PAPER
Authors: Mrs. A.N.Pimpalshende, Dr. A.R. Mahajan
Page No.: 114 - 116
32. Skillful Storyteller for Color Commentary in Sports
Authors: Ms. Amruta Waghulkar , Dr.A.R.Mahajan
Page No.: 117 - 120
33. A Survey of Virtual Machine Placement Algorithms in Cloud Computing Environment
Authors: Yuvaraj B R, K. Palanivel
Page No.: 121 - 126
34. Video Magnification for Revealing Subtle Temporal Variations
Authors: Mayur Khante, Kishor K. Bhoyar
Page No.: 127 - 131
35. A Sketch Based Face Matching Approach for IR and Optical Images Using CFDA
Authors: Sujata M. Kullarkar, Anjali R. Mahajan
Page No.: 132 - 135
36. Analyzing and Optimizing Power Consumption for Android Based Devices .
Authors: Mr. Abhay R. Rewatkar, Mr. Gajanan Patle, Ms.Titiksha Bhagat
Page No.: 136 - 138
37. Secured Collaboration in Multicloud Computing with End to End Data Protection
Authors: Ruchika Chaudhari
Page No.: 139 - 142
38. Association Rules Mining in Distributed Databases
Authors: Shubhangi A. Ramteke
Page No.: 143 - 146
39. Review on Contrast Enhancement Techniques: Depth Perspective
Authors: Mr. Ashish B. Umredkar, Prof. A. R. Mahajan
Page No.: 147 - 150
40. Design and structure of Tools for the Removal and Replacement of Engine Valve Stem Seals: A Review
Authors: Mr.Swapnil.S.Marathe , Mr. N. Y. Mohite
Page No.: 151 - 154
41. Particle Filter Based Object Tracking
Authors: Sanjay S. Sakharkar, S.D.Kamble, Dr. A.S.Khobragade
Page No.: 155 - 158
42. Compressive Tracking With Heavy Occlusion Avoidance - A Review
Authors: Jayashree Baskaran, Pradheeba Ulaganathan
Page No.: 159 - 164
43. Betterment of Fingerprint Template Protection Schemes – A Review
Authors: Pradheeba Ulaganathan, Jayashree Baskaran
Page No.: 165 - 171
44. Security Increases with Kerberos in Graphical User Authentication System
Authors: Ms. Preeti Ramtekkar, Mrs. Leena H. Patil, Mrs. Uma patel
Page No.: 172 - 174
45. Multimodality fusion based on LBP for Image retrieval
Authors: Ms. Vaishali B. Khobragade, Mrs. Leena H. Patil, Mrs. Uma Patel
Page No.: 175 - 177
46. A Hybrid of Apriori and FP Tree on Association Rule Mining
Authors: Vidisha H. Zodape , Prof. Leena H. Patil
Page No.: 178 - 183
47. Extended Text and Color Based Session Password Security against Shoulder Surfing and Spyware
Authors: Ms.Kiran P. Lokhande Ms.Vimmi Gajbhiye
Page No.: 184 - 188
48. Proficient Technique for Backup and Restore Data in Android
Authors: Pratap P.Nayadkar, Balu L.Parne
Page No.: 189 - 192
49. Discrete Wavelet Transforms Algorithm Used for Automatic Signature Authentication
Authors: Ms.Prajakta Randive, A.S. Sambare
Page No.: 193 - 195
50. A Review on Efficient Data Transmission in Wireless Relay Networks using Beamforming
Authors: Megha G. Paserkar, Shrikant D. Zade
Page No.: 196 - 199
51. Phishing Detection using Text, Image and Tag Classification Approach
Authors: Pankaj H. Gawale, D. R. Patil
Page No.: 200 - 204
52. Web Spam Detection using Link ,Content and Reovery Degree Features
Authors: Rahul C. Patil, D.R. Patil
Page No.: 205 - 208
53. Survey on Touch less Computer Control System Using Hand Gesture Recognition
Authors: Ms.Hemlata S.Bondre, Prof.Jagdish Pimple
Page No.: 209 - 213
54. Lane Change Guidance System
Authors: Ketkee V.Deshpande, M.Tech(CSE),,Prof.S.D.Zade (Asst.Prof.)
Page No.: 214 - 217
55. An Efficient System for Monitoring of Human Body using M2M System with Android
Authors: Vijay S. Gulhane , Zameshkumar J. Balhare
Page No.: 218 - 222
56. Clustering for web log mining using modified k-means algorithm
Authors: Miss Ruchika Patil, Prof. Amreen Khan
Page No.: 223 - 227
57. Text Mining in Radiology Reports
Authors: Ms.Anuradha k. Bodile, Dr.Manali Kshirsagar
Page No.: 228 - 231
58. A Review of Adaptation SVM(A-SVM) in Grid Environment
Authors: Manjiri V. Kotpalliwar , Prof. Rakhi Wajgi
Page No.: 232 - 236
59. Enhancing efficency of image retrieval using reranking methods
Authors: Nishant N. Chavan, Deepa Parasar
Page No.: 237 - 240
Authors: Priyanka Deelip Wagh, D. R. Patil
Page No.: 241 - 244
61. A Review on Different Scheduling Algorithms for Workflows in
Authors: Mr. Bhushan M. Bhalerao, Mr. Shailendra W. Shende
Page No.: 245 - 248
62. Analysis of Frequent Item sets and Pattern Sets Mining Algorithms
Authors: Javeriya Naaz Ishtiyaque Syed, Rajeshri R.Shelke
Page No.: 249 - 253
63. EOG Based BCI For Disabled People To Access Electrical Appliances
Authors: Sanjay P.Pande, Prof.Vaidehi Baporikar
Page No.: 254 - 256
64. Survey on Hybrid IDS for Mobile Ad-hoc Networks
Authors: Mangesh Bhusari, Ashish Sambare, Sachin Jain
Page No.: 257 - 260
65. Improvement in Accuracy for Information Retrieval Using Text Mining
Authors: Prashant N. Khetade, Mr.Shashank Moghe, Vinod Nayyar
Page No.: 261 - 263
66. Privacy-preserving Association Rules on Horizontally Partitioned Distributed Data
Authors: Mohammed Anwarul Siddique, Prof. Garima Singh
Page No.: 264 - 268
67. Recovery of Nodes Failure in Wireless Sensor Network Using CASER Protocol and DARA:Review
Authors: Roshni M. Bhave, Prof. Vijay Bagdi
Page No.: 269 - 272
68. A Review on Secured SMS Transmission and authentication at user end
Authors: SandeepKumar Laxman Sahu, Prof Mr Vijay Bagdi(HOD)
Page No.: 273 - 277
69. Impact of Variable Links on Standard Particle Swarm Optimization
Authors: Mrs Snehal Mohan Kamalapur, Dr. Varsha Hemant Patil
Page No.: 278 - 283
70. Highly Secured Data Encryption in Decentralized Wireless Network
Authors: Amol G. Dhoke, Prof. P S. Kulkarni
Page No.: 284 - 286
71. Video Steganography Using Pixel Intensity Value and LSB Technique
Authors: Dr.ManishShrivastava, Richa Ranjanand, SushmitaKumari
Page No.: 287 - 290
72. Data Mining – A necessity for Crime Detection
Authors: Prof.Neha Mishra, Prof.Pooja Shelke
Page No.: 291 - 294
73. Voice Analysis: Various Computational Techniques
Authors: Smt. P A Alamelu, Leena Govind Gahane
Page No.: 295 - 300
Authors: Kanchan Dhote, Dr.G.M.Asutkar
Page No.: 301 - 306
Authors: Sneha H. Rathi
Page No.: 307 - 312
76. Streamlining the Process of Medical Representative in Pharmaceutical Industry using GPS Technology
Authors: Mr. Anand Sankhemr, Siddhesh Doiphode, Prof. Sanjay Jadhav
Page No.: 313 - 315
Authors: Harsha P. Kubade, Deepali M. Khatwar
Page No.: 316 - 318
78. K-Meansusing OpenMP: An Approach
Authors: Prateek Swamy, Dr. M. M Raghuwanshi, Ashish Gholghate
Page No.: 319 - 322
79. Review On-A Knock Based Security System
Authors: Ms. Gunjan Jewani, Prof. Shubhangi Borkar
Page No.: 323 - 326
80. Design and Development of Decision Making Model for Spam email Classification Using Neural Network
Authors: "Ms. Dipalee Patil, Prof. Anil Turukmane
Page No.: 327 - 330
81. Predicting User Behavior using Enhanced Data Mining Approach for Prediction in Smarthome
Authors: Ms Sonam Sheikh, Prof. Abhijeet Bajpayee
Page No.: 331 - 334
82. Alert Me App!An Android Based Mobile Application To Save Human Life
Authors: Ritesh Shrivastava, Santosh Kumar Sahu, Mujeeb Rahaman T.
Page No.: 335 - 337
83. Human Computer Interaction Using Hand Data Glove and Wii Remote
Authors: Prof. Humera N. Syed, Prof. M.S. Khatib, Prof. Kamlesh Kelwade, Prof. Abdul Razzaque
Page No.: 338 - 341
84. PTQL to SQL Query Transformation Using Incremental Information Extraction and RDBMS
Authors: Vrushali Patil, Prof. R. B. Wagh
Page No.: 342 - 345
85. Study on Enhanced Fault Tolerance in WSAN with Minimal Topology Changes
Authors: Mr. Perraju P. Tetali, Prof. Garima Singh
Page No.: 346 - 350
86. Energy Efficient Routing Protocol for Sensor Networks: A Review
Authors: Priyanka Gomkar, Rashmi Jain
Page No.: 351 - 355
87. ERP Application for Limestone Mining Industry
Authors: Suraj Sarda, Toshish Akhand, Sumit Rathod, Khushbu Prajapati, Prof.Bharat Kapse
Page No.: 356 - 358
88. Classification of Controversial News Issues Based on Disputant Relation: A Survey
Authors: Priya P.Raut, Nitin N.Patil
Page No.: 359 - 362
89. Design and Implementation of Electro-Oculography
Authors: Prof. Farheena Shaikh,Prof. Naisha Taban Khan, Prof. Qudsiya Naaz, Prof. Saima Zareen Ansari
Page No.: 363 - 367
90. Controlling Traffic Light Signals to Implement Traffic Scheduling Using Density Calculation
Authors: Farheena Shaikh,Naisha Taban Khan,Saima Zareen Ansari
Page No.: 368 - 372
91. Efficient Scheme for Adaptive Routing in MANETs and Comparing Routing Protocols AODV and DSR
Authors: Naisha Taban Khan, Saima Zareen Ansari, Farheena Shaikh
Page No.: 373 - 377
92. Comparative Study of various training algorithms of Artificial Neural Networks on Diabetes dataset
Authors: Sumi Alice Saji, Balachandran K
Page No.: 378 - 382
93. Clipboard Oraganizer And Manager-For Windows Platform
Authors: Pratik R. Tambekar
Page No.: 383 - 386
94. Current Data Mining Trends, Techniques ,Applications and Issues
Authors: Ms. TASNEEM HASAN, Ms. SADIA PATKA
Page No.: 387 - 390
95. Analysis of User Authentication Methods & Impact on Identification Especially in Banking
Authors: Abdul Samad Shaikh, Mohammed Waseem Ashfaque
Page No.: 391 - 398
96. The Design of advanced High Performance Encryption Algorithm by using Symmetric Cryptography
Authors: Prof Surbhi R.Khare, Prof.Syaed Rehan, Prof .P.N.Vithalkar
Page No.: 399 - 403
97. Text Mining Techniques, Applications and Challenging issues
Authors: Sadia Patka, Nazish Khan, Tasneem Hasan
Page No.: 404 - 408
98. Cross Layer Intrusion Detection Systen in Wireless Ad hoc Network- A Reviwe
Authors: Trupti K. Marve, Nilesh U. Sambhe
Page No.: 409 - 412
99. Providing Data Security in Cloud Computing Using Elliptical Curve Cryptography
Authors: Ms. Priyanka Sharda
Page No.: 413 - 417
100. Efficient Data Collection in Wireless Sensor Networks using Spatial Correlation Algorithm
Authors: Mr. Amit S. Bhosale, Mr. Sanjay R Khajure, Mr. Manish S. Sharma
Page No.: 418 - 423
101. MLMS Base Information Security in Combination with HLSB Data Hiding Method
Authors: Ms. Ekata S. Bele, Prof. Chetan Bawankar
Page No.: 424 - 426
102. Identifying Text,Visual Objects of Traffic Panels using Text Detection Algorithm
Authors: Ms.Shrutika Tingne , Prof.S.D.Zade , Prof.P.V.Barekar
Page No.: 427 - 429
103. Real Time Traffic Handling Using Ring Broadcasting in VANET
Authors: Mohammad Almas Ansari, Nazish Khan,
Page No.: 430 - 435
104. A Review on Identity and Access Management for Multitier Cloud Infrastructure by using Kerberos
Authors: Mr. Merajul Haque Farooqui, Prof. Kemal U. Koche
Page No.: 436-439
Authors: Shraddha Ramteke, Mrs. Deepty Dubey
Page No.: 440-442
106. Review on Intrusion Tolerance Multipath Routing in Heterogeneous Wireless Sensor
Authors: Suchit Gajbhiye
Page No.: 443-445
107. Intrusion Detection Systems and Security Aspects for Mobile Ad Hoc Networks
Authors: Naveed Zishan, Vikrant Chole
Page No.: 446 - 448
108. Parsing and Compiler design Techniques for Compiler Applications
Authors: Prof. Rajesh Babu, Prof. Vishal Tiwari, Prof. Jiwan Dehakar
Page No.: 449 - 453
109. Privacy Preserving Data Storage And Auditabillity In Mobile-Access Of Health Data On Clouds
Authors: Mr. Saquib Ahmed, Prof. jagdish pimple
Page No.: 454 - 458
110. A Survey on Document Clustering For Identifying Criminal
Authors: Ms. H. N. Gangavane, Prof. Ms. M. C. Nikose
Page No.: 459 - 463
111. An Energy Aware Link Failure Management in Wireless Sensor Networks
Authors: Sangita Patra, Buddhadeb Sau
Page No.: 464 - 471
112. Performance Evaluation of Channel Assignment In Wireless Network Using Genetic Algorithm
Authors: Imran Ahmad, Prof. Parmalik Kumar, Prof. Sandeep Singh, Tapesh Bharti
Page No.: 472 - 475
113. Open Cloud-Based PaaS Architecture for Service-Oriented Mobile Robots
Authors: Petri Oksa, Pekka Loula
Page No.: 476 - 481
114. An Overview of Network Traffic Classification Methods
Authors: Ms. Zeba Atique Shaikh, Prof.Dr.D.G. Harkut
Page No.: 482 - 488