Conference Issue: Track 1 Cse Papers

International Conference On Emanations in Modern Technology and Engineering (ICEMTE 2017) 04 - 05 March, 2017, Organized by:- " Shree L.R.Tiwari College Of Engg, Kanakia Park, Mira Road(E),Thane"

Special Issue published by:

International Journal on Recent and Innovation Trends in Computing and Communication

 

1. Website marketing using Search Engine Optimization  

Authors: Neelam Phadni,Omkar Phadnis

Page No.: 01 - 05

 

2. Mobile Commerce: Big Source of Big Data  

Authors: Archana M. Naware

Page No.: 06 - 09

 

3. Detection of Phishing Websites using URL and terms in the Webpage  

Authors: Chris D’Souza, Vinayak Shinde

Page No.: 10 - 12

 

4. Dictionary Learning Classification for Multi-Label Image Annotation: A Survey  

Authors: Yogini B. Bhadane, Nitin N. Patil

Page No.: 13 - 17

 

5. Identification of Unauthentic Records from Real World Entity Set: A Survey  

Authors: More Dipalee Aba, Nitin N. Patil

Page No.: 18 - 21

 

6. A Review on Botnet Detection Techniques  

Authors: Mitali Lade, Dr. J. W. Bakal, K. Jayamalini

Page No.: 22 - 24

 

7. A Survey of Botnet and Botnet Detection Techniques  

Authors: Mitali Lade, Dr. J. W. Bakal, K. Jayamalini

Page No.: 25 - 30

 

8. A Review on Feature Extraction Techniques Using Color, Texture and Shape Features  

Authors: Ankita Doiphode, Arun Kulkarni, Sunil Yadav

Page No.: 31 - 34

 

9. A Survey on Feature Extraction using Color, Texture and Shape Features  

Authors: Ankita Doiphode, Arun Kulkarni, Sunil Yadav

Page No.: 35 - 40

 

10. A Survey of Digital Watermarking Techniques and its Classification  

Authors: Ms.Ankita Kadu, Prof.Arun Kulkarni, Prof. Deepali Patil

Page No.: 41 - 44

 

11. Survey of Trust Management Schemes for Clustered Wireless Network  

Authors: Alka Phadatare, N.P.Chawande

Page No.: 45 - 47

 

12. Review of Video Stabilization Techniques  

Authors: Prof. Asmita Deshmukh, Ms. Patil Sampada Dattatrey

Page No.: 48 - 50

 

13. Survey of Digital Video Stabilization Algorithm  

Authors: Prof. Asmita Deshmukh, Ms. Patil Sampada Dattatrey

Page No.: 51 - 52

 

14. A Review on Routing Techniques in Wireless Sensor Networks  

Authors: Pratik S. Sankhe, Dr. J. W. Bakal, Madhuri Gedam

Page No.: 53 - 55

 

15. Different Graphical Password Authentication Techniques  

Authors: Dhanashree Kadu, Shanthi Therese, Anil Chaturvedi

Page No.: 56 - 58

 

16. Improved Authentication Scheme Using Persuasive Cued Click Points  

Authors: Dhanashree Kadu, Shanthi Therese, Anil Chaturvedi

Page No.: 59 - 61

 

17. Recommender System in Machine Learning  

Authors: Nishigandha Karbhari, Prof. Asmita Deshmukh, Prof. Vinayak D. Shinde

Page No.: 62 - 65

 

18. Handling Big Data using Hadoop  

Authors: Nishigandha Karbhari, Dr. Vinayak D. Shinde

Page No.: 66 - 68

 

19. Survey on Sentiment Analysis  

Authors: Amreen Shaikh, Madhuri Rao

Page No.: 69 - 73

 

20. Issues in Mobile Virtualization Techniques: A Review  

Authors: Shweta Shirsat

Page No.: 74 - 77

 

21. Web Usage Mining – Tools, Data Preparation Methods and Comparative Study on Implementation Techniques  

Authors: K.Jayamalini, Dr.M.Ponnavaikko

Page No.: 78 - 80

 

22. A Brief Introduction to Anomaly Detection and its Techniques  

Authors: Tatwadarshi P. Nagarhalli, Ashwini M. Save

Page No.: 81 - 85

 

23. A Survey paper on Techniques used for Community Detection in Social Networks  

Authors: Apeksha P. Naik, Sachin Bojewar

Page No.: 86 - 90

 

24. A Survey on Perfect Difference Network  

Authors: Ms. Shahista Sheikh, Prof. Dilip Motwani

Page No.: 91 - 93

 

25. Web Services Recommendation and Visualization for Custom-Made QoS  

Authors: Prof. Komal A. Champanerkar, Prof. Aabha A. Patil

Page No.: 94 - 98

 

26. Result Analysis of Ave and Max Classification Algorithms  

Authors: Maya A.Gharat, Sharamila S.Gaikwad

Page No.: 099 - 104

 

27. Algorithms And Techniques on Travel-Time Prediction Systems  

Authors: Abhijeet B.Waghmare, Prof.D.D.Gatade

Page No.: 105 - 109

 

28. Honeyword Generation Approach Using ASCII Values for Security Enhancement  

Authors: Ms. Koma lNaik, Prof. Varsha Bhosale, Prof. Vinayak D.Shinde

Page No.: 110 - 113

 

29. Malicious user detection using honeyword and IP tracking  

Authors: Ms. Komal Naik, Prof. Varsha Bhosale, Prof. Vinayak D.Shinde

Page No.: 114 - 117

 

30. Pricision Agriculture  

Authors: Prof. Aabha A. Patil, Prof. Komal A. Champanerkar

Page No.: 118 - 123

 

31. Mining Data Stream for Load Shedding  

Authors: Rujuta Vartak, Dr. Madhuri Rao, Prof. Jayamalini k

Page No.: 124 - 127

 

32. Robust and Secure Data Hiding Technique using FA and DWT  

Authors: Ms.Ankita Kadu, Prof. Arun Kulkarni, Prof. Deepali Patil

Page No.: 128 - 131

 

33. MSE based Algorithm for Vector Quantization using Walsh Sequence  

Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam

Page No.: 132 - 137

 

34. MSE based Algorithm for Vector Quantization using Walsh Sequence  

Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam

Page No.: 138 - 143

 

35. A Codebook Generation Algorithm in Vector Quantization: A Survey  

Authors: Sneha Rahul Mhatre, Prof. Arun Kulkarni, Prof. Madhuri Gedam

Page No.: 144 - 147

 

36. Load Shedding using Transactional Algorithm in Data Stream  

Authors: Rujuta Vartak, Dr. Madhuri Rao, Prof. Jayamalini k

Page No.: 148 - 150

 

37. A Survey on Sentiment Analysis Algorithms and Techniques  

Authors: Prajakta Gosavi, Vaishali Shirsath

Page No.: 151 - 155

 

38. A Novel Approach for Web Usage Mining Using Improved FP-Tree With Map-Reduce  

Authors: Sonali Bodekar, Prof. Asmita Deshmukh

Page No.: 156 - 160

 

39. Research Issues in Web Mining  

Authors: Pallavi Kamalakar Bhoir, Prof. Neha Jain

Page No.: 161 - 163

 

40. Survey on Sentiment Analysis  

Authors: Amreen Shaikh, Madhuri Rao

Page No.: 164 - 167

 

41. Reputation based Trust Evaluation in Sentiment Analysis  

Authors: Amreen Shaikh, Madhuri Rao

Page No.: 168 - 171

 

42. Tweet data Preprocessing and Segmentation to NER  

Authors: Mr. Sanket Patil, Prof. Varsha Wangikar, Prof. K. Jayamalini

Page No.: 172 - 175

 

43. Semantic Subgraph Generation for Hindi Text Document using PSO  

Authors: Ragini Mishra

Page No.: 176 - 178

 

44. Comparative Analysis of Techniques For Sentiment Classification  

Authors: Prajakta Gosavi, Vaishali Shirsath

Page No.: 179 - 183

 

45. Early Detection Of Lung Cancer Using Various Techniques  

Authors: Neha Thombre, Seema Kolkur

Page No.: 184 - 187

 

46. A Study on Gait Analysis for Human Identification  

Authors: Chris D’Souza, Sharmila Gaikwad, Vinayak Shinde

Page No.: 188 - 191

 

47. Black hole Attack Prevention on AODV in MANET  

Authors: Mrs. Preeti. A. Aware, Mrs. Amarja Adgaonkar

Page No.: 192 - 195

 

48. Model for Migration into a Cloud for Educational Institutions  

Authors: Dr. Vinayak D. Shinde

Page No.: 196 - 199

 

49. Improved Approach for Preprocessing Data  

Authors: Mr. Sanket Patil, Prof. Varsha Wangikar, Prof. K.Jayamalini

Page No.: 200 - 204

 

50. Introduction to Deep Learning  

Authors: Anjali D.Dwivedi, K.jayamalini

Page No.: 205 - 209

 

51. Speaker Identification techniques in Overlapping Speech Analysis: A Review  

Authors: Mrunal Bhogte, Prof. Shanthi Therese, Prof. Madhuri Gedam

Page No.: 210 - 213

 

52. An Improvised Approach for Web Usage Mining With Improved FP-Tree  

Authors: Sonali Bodekar, Prof. Asmita Deshmukh, Prof. Anil Chaturvedi

Page No.: 214 - 217

 

53. Modelling Rainfall Prediction Using Data Mining Method - A Bayesian Approach  

Authors: Mr.Chetan J. Janbandhu, Prof. Praful D.Meshram, Prof. Madhuri N. Gedam

Page No.: 218 - 220

 

54. Automated web pages data mining and recommendation system using K-NN classification method  

Authors: Pallavi Kamalakar Bhoir, Prof. Neha Jain

Page No.: 221 - 223

 

55. Data Mining With Big Data  

Authors: Dnyaneshwar T. Bhabad, Madhuri Gedam, Jyoti V. Jadhav

Page No.: 224 - 226

 

56. Multimedia Information Retrieval for Lecture Video using Automatic Speech Recognition and Optical Character Recognition  

Authors: Dnyaneshwar T. Bhabad, Shanthi Therese, Madhuri Gedam

Page No.: 227 - 229

 

57. Survey on Application of Semantic Web on Massive Open Online Course (MOOC) using Linked Data- part 1  

Authors: Anjali D.Dwivedi, Varsha Bhosale

Page No.: 230 - 233

 

58. Predictive Analytics: A Step Ahead For Education System  

Authors: Sunil Yadav

Page No.: 234 - 236

 

59. A Survey on Routing Techniques in Wireless Sensor Networks  

Authors: Pratik S. Sankhe, Dr. J. W. Bakal, Madhuri Gedam

Page No.: 237 - 239

 

60. Internet of Things Based System for Water Resource Engineering  

Authors: Sonali Deshmukh, Praveen Barapatre

Page No.: 240 - 242

 

61. Scalable Storage System for Big Data  

Authors: Nikita Deshmukh, Prof. Madhuri Gedam

Page No.: 243 - 248

 

62. Text Mining  

Authors: Yatisha Bhoir, Prof.Madhuri Gedam

Page No.: 249 - 253

 

63. Voice Controlled Robotic Vehicle with Long Distance Speech Recognition  

Authors: Krishnendu.S.Nair, Shekhar Mane

Page No.: 254 - 257

 

64. Virtual Touch Wall by Kinect: Review  

Authors: Ms. Ashvini Ganesh singh Bais, Prof. Pritish A. Tijare

Page No.: 258 - 261

 

65. Digital Interaction with kinect: review  

Authors: Ms. Yogita Gunvantraj Kothari, Dr. Avinash D. Gawande, Prof . Ketki R Ingole

Page No.: 262 - 265

 

66. Smart Forms for Dynamic Queries over Large Databases  

Authors: Vishal kumar Patel, Sharmila Gaikwad, Vinayak shinde

Page No.: 266 - 268

 

67. Computing Trustworthy Reputation in E-Commerce Environments  

Authors: Akshata Raut, Prof. Vinayak Shinde

Page No.: 269 - 272

 

68. Effective Methods and Techniques in Text Mining  

Authors: Akshata Raut, Prof. Vinayak Shinde

Page No.: 273 - 276

 

69. A Survey on Popularity of Chat-Bots  

Authors: Neha Jain, Ashish Jain

Page No.: 277 - 280

 

70. Comparative study of Prediction Algorithm  

Authors: Shraddha Painjane, Prof. Sachin Bojewar

Page No.: 281 - 283

 

71. Various Techniques for Fetal ECG Signal Monitoring  

Authors: Usha S. Patil, Prof. Nasneen Ansari

Page No.: 284 - 287

 

72. Imputation and Regression Techniques to Estimate Missing Values Using Big Data Analytics  

Authors: Prof. Deepali Patil

Page No.: 288 - 290

 

73. Implementation & Latency Analysis of Perfect Difference Network (PDN) in Wired Environment  

Authors: Mrs. Shahista Sheikh, Prof. Dilip Motwani

Page No.: 291 - 294

 

74. Implementation of Crowd Sourced Work Stealing Mechanism  

Authors: Prof. Sharmila Rathod, Shabnam Noorani

Page No.: 295 - 299

 

75. A Survey On Differentiated Service Architecture For The Internet  

Authors: Ms. Dimpal S. Sutar, Mrs. Sudha Gupta

Page No.: 300 - 304

 

76. Use of Natural language processing for accessing the Graphical User Interface and Relational Database  

Authors: Sampada Watane, Riteshri Nagmote, Mangesh Watane

Page No.: 305 - 308

 

77. Identification of Trustworthy Sellers and Buyers in E-commerce  

Authors: Anas Dange, Prof. Seema Kolkur, Dr. Vinayak D. Shinde

Page No.: 309 - 312

 

78. World of Payment towards Mobile Payments  

Authors: Akshata Churi, Prof. Madhuri Gedam

Page No.: 313 - 316

 

79. Color Matching for Mobile Panorama Image Stitching  

Authors: Poonam M. Pangarkar, V. B. Gaikwad

Page No.: 317 - 324

 

80. A Study of Consensus Problem in Multiagent System  

Authors: Supriya More, Sharmila Gaikwad

Page No.: 325 - 330

 

81. Image Steganography: Hiding Audio Signal in Image Using Discrete Wavelet Transform  

Authors: Ms. Asawari S. Shinde, Dr. Archana B. Patankar

Page No.: 331 - 334

 

82. Cloud Adoption in Various Domains and Factors Influencing Its Adoption  

Authors: Mahesh S. Kavre, Vaibhav S. Narwane and Rakesh D. Raut

Page No.: 335 - 338

 

83. Hybrid Cryptographic Algorithm for Enhancing Security of Text  

Authors: Bhavik Rana, Sunil Wankhade

Page No.: 339 - 344

 

84. Stock Investment Returns Prediction: A Comparison of ANN and ARIMA  

Authors: Shraddha Painjane, Prof. Sachin Bojewar, Prof. Deepali Patil

Page No.: 345 - 347

 

85. Similarity Measures of web pages using Cosine Similarity  

Authors: Prof. Uma Goradiya, Prof. Bhavin Goradiya

Page No.: 348 - 351

 

86. Segmentation of Singing Voice and Musical Accompaniment in Audio Mixture Signal  

Authors: Ms. Monali R. Pimpale, Prof. Shanthi Therese, Prof. Vinayak Shinde

Page No.: 352 - 355

 

87. Survey on: Separation techniques for separation of Singing Voice from Music Accompaniment  

Authors: Ms. Monali R. Pimpale, Prof. Shanthi Therese, Prof. Vinayak Shinde

Page No.: 356 - 359

 

88. ChatOps: Automate IT operations using Chatbots  

Authors: Prof. Aarti Puthran, Mr. Ritesh Puthran

Page No.: 360 - 362

 

89. Friend Recommendation Technique by Improving Marketing Tactics in Social Network  

Authors: Mr. Umesh Mohite, Prof. Nilima Nikam

Page No.: 363 - 366

 

90. A Full Fledged Application-based Cane For Blind And Visually Impaired People  

Authors: Rohan Chaubey, Manodeep Roy, Shratik Mishra, Yedhukrishnan Pillai

Page No.: 367 - 368

 

91. Silent & Fan-Less Mini-PC using Case for Passive Cooling  

Authors: Jasmohan Singh Narula, Siddhivinayak Zaveri, Rohan Chaubey, Dhruv Nagpal

Page No.: 369 - 374

 

92. Use of Data Mining For Integration of Different Food Ordering Websites  

Authors: Mayur Salvi, Toshal Tambave, Rajesh Gaikwad

Page No.: 375 - 377

 

93. Inside Out: Android Forensics Survey and its Existing Vulnerabilities Penetration Testing Tools  

Authors: Revati Dalvi, Ria Lulla, Rutuja Chaudhari, Aishwarya Bargal, Komal Deolalkar

Page No.: 378 - 388

 

94. Detection of Video Piracy Using Invisible Watermarking  

Authors: Shivani Singh, Aakash Kumar Chawla, Sukhman Kaur Sidhu, Jay Soni

Page No.: 389 - 390