ICEMTE 2017 Track 1 (CSE)
Conference Issue: Track 1 Cse Papers
International Conference On Emanations in Modern Technology and Engineering (ICEMTE 2017) 04 - 05 March, 2017, Organized by:- " Shree L.R.Tiwari College Of Engg, Kanakia Park, Mira Road(E),Thane"
Special Issue published by:
International Journal on Recent and Innovation Trends in Computing and Communication
1. Website marketing using Search Engine Optimization
Authors: Neelam Phadni,Omkar Phadnis
Page No.: 01 - 05
2. Mobile Commerce: Big Source of Big Data
Authors: Archana M. Naware
Page No.: 06 - 09
3. Detection of Phishing Websites using URL and terms in the Webpage
Authors: Chris D’Souza, Vinayak Shinde
Page No.: 10 - 12
4. Dictionary Learning Classification for Multi-Label Image Annotation: A Survey
Authors: Yogini B. Bhadane, Nitin N. Patil
Page No.: 13 - 17
5. Identification of Unauthentic Records from Real World Entity Set: A Survey
Authors: More Dipalee Aba, Nitin N. Patil
Page No.: 18 - 21
6. A Review on Botnet Detection Techniques
Authors: Mitali Lade, Dr. J. W. Bakal, K. Jayamalini
Page No.: 22 - 24
7. A Survey of Botnet and Botnet Detection Techniques
Authors: Mitali Lade, Dr. J. W. Bakal, K. Jayamalini
Page No.: 25 - 30
8. A Review on Feature Extraction Techniques Using Color, Texture and Shape Features
Authors: Ankita Doiphode, Arun Kulkarni, Sunil Yadav
Page No.: 31 - 34
9. A Survey on Feature Extraction using Color, Texture and Shape Features
Authors: Ankita Doiphode, Arun Kulkarni, Sunil Yadav
Page No.: 35 - 40
10. A Survey of Digital Watermarking Techniques and its Classification
Authors: Ms.Ankita Kadu, Prof.Arun Kulkarni, Prof. Deepali Patil
Page No.: 41 - 44
11. Survey of Trust Management Schemes for Clustered Wireless Network
Authors: Alka Phadatare, N.P.Chawande
Page No.: 45 - 47
12. Review of Video Stabilization Techniques
Authors: Prof. Asmita Deshmukh, Ms. Patil Sampada Dattatrey
Page No.: 48 - 50
13. Survey of Digital Video Stabilization Algorithm
Authors: Prof. Asmita Deshmukh, Ms. Patil Sampada Dattatrey
Page No.: 51 - 52
14. A Review on Routing Techniques in Wireless Sensor Networks
Authors: Pratik S. Sankhe, Dr. J. W. Bakal, Madhuri Gedam
Page No.: 53 - 55
15. Different Graphical Password Authentication Techniques
Authors: Dhanashree Kadu, Shanthi Therese, Anil Chaturvedi
Page No.: 56 - 58
16. Improved Authentication Scheme Using Persuasive Cued Click Points
Authors: Dhanashree Kadu, Shanthi Therese, Anil Chaturvedi
Page No.: 59 - 61
17. Recommender System in Machine Learning
Authors: Nishigandha Karbhari, Prof. Asmita Deshmukh, Prof. Vinayak D. Shinde
Page No.: 62 - 65
18. Handling Big Data using Hadoop
Authors: Nishigandha Karbhari, Dr. Vinayak D. Shinde
Page No.: 66 - 68
19. Survey on Sentiment Analysis
Authors: Amreen Shaikh, Madhuri Rao
Page No.: 69 - 73
20. Issues in Mobile Virtualization Techniques: A Review
Authors: Shweta Shirsat
Page No.: 74 - 77
Authors: K.Jayamalini, Dr.M.Ponnavaikko
Page No.: 78 - 80
22. A Brief Introduction to Anomaly Detection and its Techniques
Authors: Tatwadarshi P. Nagarhalli, Ashwini M. Save
Page No.: 81 - 85
23. A Survey paper on Techniques used for Community Detection in Social Networks
Authors: Apeksha P. Naik, Sachin Bojewar
Page No.: 86 - 90
24. A Survey on Perfect Difference Network
Authors: Ms. Shahista Sheikh, Prof. Dilip Motwani
Page No.: 91 - 93
25. Web Services Recommendation and Visualization for Custom-Made QoS
Authors: Prof. Komal A. Champanerkar, Prof. Aabha A. Patil
Page No.: 94 - 98
26. Result Analysis of Ave and Max Classification Algorithms
Authors: Maya A.Gharat, Sharamila S.Gaikwad
Page No.: 099 - 104
27. Algorithms And Techniques on Travel-Time Prediction Systems
Authors: Abhijeet B.Waghmare, Prof.D.D.Gatade
Page No.: 105 - 109
28. Honeyword Generation Approach Using ASCII Values for Security Enhancement
Authors: Ms. Koma lNaik, Prof. Varsha Bhosale, Prof. Vinayak D.Shinde
Page No.: 110 - 113
29. Malicious user detection using honeyword and IP tracking
Authors: Ms. Komal Naik, Prof. Varsha Bhosale, Prof. Vinayak D.Shinde
Page No.: 114 - 117
Authors: Prof. Aabha A. Patil, Prof. Komal A. Champanerkar
Page No.: 118 - 123
31. Mining Data Stream for Load Shedding
Authors: Rujuta Vartak, Dr. Madhuri Rao, Prof. Jayamalini k
Page No.: 124 - 127
32. Robust and Secure Data Hiding Technique using FA and DWT
Authors: Ms.Ankita Kadu, Prof. Arun Kulkarni, Prof. Deepali Patil
Page No.: 128 - 131
33. MSE based Algorithm for Vector Quantization using Walsh Sequence
Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam
Page No.: 132 - 137
34. MSE based Algorithm for Vector Quantization using Walsh Sequence
Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam
Page No.: 138 - 143
35. A Codebook Generation Algorithm in Vector Quantization: A Survey
Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam
Page No.: 144 - 147
36. Load Shedding using Transactional Algorithm in Data Stream
Authors: Rujuta Vartak, Dr. Madhuri Rao, Prof. Jayamalini k
Page No.: 148 - 150
37. A Survey on Sentiment Analysis Algorithms and Techniques
Authors: Prajakta Gosavi, Vaishali Shirsath
Page No.: 151 - 155
38. A Novel Approach for Web Usage Mining Using Improved FP-Tree With Map-Reduce
Authors: Sonali Bodekar, Prof. Asmita Deshmukh
Page No.: 156 - 160
39. Research Issues in Web Mining
Authors: Pallavi Kamalakar Bhoir, Prof. Neha Jain
Page No.: 161 - 163
40. Survey on Sentiment Analysis
Authors: Amreen Shaikh, Madhuri Rao
Page No.: 164 - 167
41. Reputation based Trust Evaluation in Sentiment Analysis
Authors: Amreen Shaikh, Madhuri Rao
Page No.: 168 - 171
42. Tweet data Preprocessing and Segmentation to NER
Authors: Mr. Sanket Patil, Prof. Varsha Wangikar, Prof. K. Jayamalini
Page No.: 172 - 175
43. Semantic Subgraph Generation for Hindi Text Document using PSO
Authors: Ragini Mishra
Page No.: 176 - 178
44. Comparative Analysis of Techniques For Sentiment Classification
Authors: Prajakta Gosavi, Vaishali Shirsath
Page No.: 179 - 183
45. Early Detection Of Lung Cancer Using Various Techniques
Authors: Neha Thombre, Seema Kolkur
Page No.: 184 - 187
46. A Study on Gait Analysis for Human Identification
Authors: Chris D’Souza, Sharmila Gaikwad, Vinayak Shinde
Page No.: 188 - 191
47. Black hole Attack Prevention on AODV in MANET
Authors: Mrs. Preeti. A. Aware, Mrs. Amarja Adgaonkar
Page No.: 192 - 195
48. Model for Migration into a Cloud for Educational Institutions
Authors: Dr. Vinayak D. Shinde
Page No.: 196 - 199
49. Improved Approach for Preprocessing Data
Authors: Mr. Sanket Patil, Prof. Varsha Wangikar, Prof. K.Jayamalini
Page No.: 200 - 204
50. Introduction to Deep Learning
Authors: Anjali D.Dwivedi, K.jayamalini
Page No.: 205 - 209
51. Speaker Identification techniques in Overlapping Speech Analysis: A Review
Authors: Mrunal Bhogte, Prof. Shanthi Therese, Prof. Madhuri Gedam
Page No.: 210 - 213
52. An Improvised Approach for Web Usage Mining With Improved FP-Tree
Authors: Sonali Bodekar, Prof. Asmita Deshmukh, Prof. Anil Chaturvedi
Page No.: 214 - 217
53. Modelling Rainfall Prediction Using Data Mining Method - A Bayesian Approach
Authors: Mr.Chetan J. Janbandhu, Prof. Praful D.Meshram, Prof. Madhuri N. Gedam
Page No.: 218 - 220
54. Automated web pages data mining and recommendation system using K-NN classification method
Authors: Pallavi Kamalakar Bhoir, Prof. Neha Jain
Page No.: 221 - 223
Authors: Dnyaneshwar T. Bhabad, Madhuri Gedam, Jyoti V. Jadhav
Page No.: 224 - 226
Authors: Dnyaneshwar T. Bhabad, Shanthi Therese, Madhuri Gedam
Page No.: 227 - 229
57. Survey on Application of Semantic Web on Massive Open Online Course (MOOC) using Linked Data- part 1
Authors: Anjali D.Dwivedi, Varsha Bhosale
Page No.: 230 - 233
58. Predictive Analytics: A Step Ahead For Education System
Authors: Sunil Yadav
Page No.: 234 - 236
59. A Survey on Routing Techniques in Wireless Sensor Networks
Authors: Pratik S. Sankhe, Dr. J. W. Bakal, Madhuri Gedam
Page No.: 237 - 239
60. Internet of Things Based System for Water Resource Engineering
Authors: Sonali Deshmukh, Praveen Barapatre
Page No.: 240 - 242
61. Scalable Storage System for Big Data
Authors: Nikita Deshmukh, Prof. Madhuri Gedam
Page No.: 243 - 248
62. Text Mining
Authors: Yatisha Bhoir, Prof.Madhuri Gedam
Page No.: 249 - 253
63. Voice Controlled Robotic Vehicle with Long Distance Speech Recognition
Authors: Krishnendu.S.Nair, Shekhar Mane
Page No.: 254 - 257
64. Virtual Touch Wall by Kinect: Review
Authors: Ms. Ashvini Ganesh singh Bais, Prof. Pritish A. Tijare
Page No.: 258 - 261
65. Digital Interaction with kinect: review
Authors: Ms. Yogita Gunvantraj Kothari, Dr. Avinash D. Gawande, Prof . Ketki R Ingole
Page No.: 262 - 265
66. Smart Forms for Dynamic Queries over Large Databases
Authors: Vishal kumar Patel, Sharmila Gaikwad, Vinayak shinde
Page No.: 266 - 268
67. Computing Trustworthy Reputation in E-Commerce Environments
Authors: Akshata Raut, Prof. Vinayak Shinde
Page No.: 269 - 272
68. Effective Methods and Techniques in Text Mining
Authors: Akshata Raut, Prof. Vinayak Shinde
Page No.: 273 - 276
69. A Survey on Popularity of Chat-Bots
Authors: Neha Jain, Ashish Jain
Page No.: 277 - 280
70. Comparative study of Prediction Algorithm
Authors: Shraddha Painjane, Prof. Sachin Bojewar
Page No.: 281 - 283
71. Various Techniques for Fetal ECG Signal Monitoring
Authors: Usha S. Patil, Prof. Nasneen Ansari
Page No.: 284 - 287
72. Imputation and Regression Techniques to Estimate Missing Values Using Big Data Analytics
Authors: Prof. Deepali Patil
Page No.: 288 - 290
73. Implementation & Latency Analysis of Perfect Difference Network (PDN) in Wired Environment
Authors: Mrs. Shahista Sheikh, Prof. Dilip Motwani
Page No.: 291 - 294
74. Implementation of Crowd Sourced Work Stealing Mechanism
Authors: Prof. Sharmila Rathod, Shabnam Noorani
Page No.: 295 - 299
75. A Survey On Differentiated Service Architecture For The Internet
Authors: Ms. Dimpal S. Sutar, Mrs. Sudha Gupta
Page No.: 300 - 304
Authors: Sampada Watane, Riteshri Nagmote, Mangesh Watane
Page No.: 305 - 308
77. Identification of Trustworthy Sellers and Buyers in E-commerce
Authors: Anas Dange, Prof. Seema Kolkur, Dr. Vinayak D. Shinde
Page No.: 309 - 312
78. World of Payment towards Mobile Payments
Authors: Akshata Churi, Prof. Madhuri Gedam
Page No.: 313 - 316
79. Color Matching for Mobile Panorama Image Stitching
Authors: Poonam M. Pangarkar, V. B. Gaikwad
Page No.: 317 - 324
80. A Study of Consensus Problem in Multiagent System
Authors: Supriya More, Sharmila Gaikwad
Page No.: 325 - 330
81. Image Steganography: Hiding Audio Signal in Image Using Discrete Wavelet Transform
Authors: Ms. Asawari S. Shinde, Dr. Archana B. Patankar
Page No.: 331 - 334
82. Cloud Adoption in Various Domains and Factors Influencing Its Adoption
Authors: Mahesh S. Kavre, Vaibhav S. Narwane and Rakesh D. Raut
Page No.: 335 - 338
83. Hybrid Cryptographic Algorithm for Enhancing Security of Text
Authors: Bhavik Rana, Sunil Wankhade
Page No.: 339 - 344
84. Stock Investment Returns Prediction: A Comparison of ANN and ARIMA
Authors: Shraddha Painjane, Prof. Sachin Bojewar, Prof. Deepali Patil
Page No.: 345 - 347
85. Similarity Measures of web pages using Cosine Similarity
Authors: Prof. Uma Goradiya, Prof. Bhavin Goradiya
Page No.: 348 - 351
86. Segmentation of Singing Voice and Musical Accompaniment in Audio Mixture Signal
Authors: Ms. Monali R. Pimpale, Prof. Shanthi Therese, Prof. Vinayak Shinde
Page No.: 352 - 355
87. Survey on: Separation techniques for separation of Singing Voice from Music Accompaniment
Authors: Ms. Monali R. Pimpale, Prof. Shanthi Therese, Prof. Vinayak Shinde
Page No.: 356 - 359
88. ChatOps: Automate IT operations using Chatbots
Authors: Prof. Aarti Puthran, Mr. Ritesh Puthran
Page No.: 360 - 362
89. Friend Recommendation Technique by Improving Marketing Tactics in Social Network
Authors: Mr. Umesh Mohite, Prof. Nilima Nikam
Page No.: 363 - 366
90. A Full Fledged Application-based Cane For Blind And Visually Impaired People
Authors: Rohan Chaubey, Manodeep Roy, Shratik Mishra, Yedhukrishnan Pillai
Page No.: 367 - 368
91. Silent & Fan-Less Mini-PC using Case for Passive Cooling
Authors: Jasmohan Singh Narula, Siddhivinayak Zaveri, Rohan Chaubey, Dhruv Nagpal
Page No.: 369 - 374
92. Use of Data Mining For Integration of Different Food Ordering Websites
Authors: Mayur Salvi, Toshal Tambave, Rajesh Gaikwad
Page No.: 375 - 377
93. Inside Out: Android Forensics Survey and its Existing Vulnerabilities Penetration Testing Tools
Authors: Revati Dalvi, Ria Lulla, Rutuja Chaudhari, Aishwarya Bargal, Komal Deolalkar
Page No.: 378 - 388
94. Detection of Video Piracy Using Invisible Watermarking
Authors: Shivani Singh, Aakash Kumar Chawla, Sukhman Kaur Sidhu, Jay Soni
Page No.: 389 - 390