ICRRTET 2016 Track
Conference Issue: Icrrtet Track Papers
International Conference on Research and Recent Trends in Engineering and Technology (ICRRTET 2016) Organized By: "Sai Polytechnic"
Special Issue published by:
International Journal on Recent and Innovation Trends in Computing and Communication
1. A Secure and Smarter Solution to the Network Security for a Smart City Using SMARTIE
Authors: Ashwin V. Didolkar, Fazeel I. Z. Zama,
Page No.: 01 - 06
2. 3D Password with Session Based Technique for Login Security in Smartphone
Authors: Bharti Yerne, Prof. Fazeel. A. Z.Qureshi
Page No.: 07 - 09
3. Optimisation of Lane Tracking using Hybrid Kalman and Particle Filter Algorithm
Authors: Manisha Lande
Page No.: 10 - 13
Authors: Minal D. Kamble, Prof. N.M. Dhande
Page No.: 14 - 19
Authors: Monali D.Akhare, Prof.N. M. Kandoi
Page No.: 20 - 25
6. A System for the Retrieval of Images from Large Database
Authors: Mukunda Waghmare, Prof. Kailash Patidar
Page No.: 26 - 29
7. Design Ids for Web Security Mechanism against Injection and Multiple Attacks
Authors: Ms. Aboli Vairagade, Prof. D.M. Sable, Prof. V. R. Wadhankar
Page No.: 30 - 34
8. Recycling Fuel Using Solar Energy
Authors: Mr. Niraj G. Bandewar, Miss. Shyamali S. Shendekar
Page No.: 35 - 37
9. A Review Paper on Tweet segmentation and its Application to Named Entity Recognition
Authors: Miss. Anuja A. Thete, Prof. J.S. Karnewar
Page No.: 38 - 42
10. Intrusion Detection System by using FC-ANN
Authors: Mr.Parag B Patil, Prof. Vaibhav P Narkhede
Page No.: 43 - 47
11. Design and Failure Analysis of Crushing Cage for (PULP) Continuous Loading
Authors: Mr. Parmeshwar S. Solanki, Dr. R. P. Chopade
Page No.: 48 - 51
12. Mobile App Recommendation & Ranking Fraud Detection on Relationship among Rating Review & Ranking
Authors: Neha.S.Hete , Prof. D.M.Sable
Page No.: 52 - 54
13. A Survey, Improving Security in Group Based Data Sharing.
Authors: Poonam S. Makeshwar, Prof P.P. Rewagad
Page No.: 55 - 57
Authors: MinalH. Kawalkar, Fazeel.A.Z.Qureshi
Page No.: 58 - 60
15. Design of Building Integrated Photovoltaic System and Energy Storage Using DC Network Distribution
Authors: Megha Gajanan Nagapure, Prof. A. M. Jain
Page No.: 61 - 63
16. Enhancing Smart Home User Behavior with Improved Data Mining Techniques
Authors: Miss. Pranjali Channe
Page No.: 64 - 66
Authors: Mr.Rushi R. Durge, Mr.Hanumant P. Jagtap
Page No.: 67 - 70
Authors: Prachee U. Ketkar, Dr. Pradip M. Jawandhiya
Page No.: 71 - 75
19. Workload Aware Partitioning and Load Balancing in Cloud Computing
Authors: SujataTambat, V P Narkhede
Page No.: 76 - 78
20. A Survey on Robust Watermarking in Non Blind Method
Authors: Apeksha B. Bongirwar, Prof. Fazeel. A. Z. Qureshi
Page No.: 79 - 83
21. Sketch Path Algorithm by using Shortest Distance Computing Mechanism
Authors: Miss. Swati Ramteke, Prof. Komal Ramteke
Page No.: 84 - 89
22. Personalized Web based B2B Services using Fuzzy Approach: A Review
Authors: Snehal D. Mahanur, Prof. J. S. Karnewar
Page No.: 90 - 96
23. Fuel Cell – A Viable Nonconventional Technology of Future
Authors: Mr. Sachin. M. Dandage, Prof. K.R. Sontakke
Page No.: 97 - 102
24. Bfriend Network to Share Personalized Geo-Specific Photo with Tag Recommendation
Authors: Raksha P Shinde, Saiyad Sharik Kaji
Page No.: 103 - 105
Authors: Shubhangi Baba Dongarkar, Prof. S. S. Dhamal
Page No.: 106 - 108
26. Data Retrieval from Multiple Heterogeneous Databases using Content Aggregation
Authors: Mangesh S. Khode, Prof. Mayur S. Dhait
Page No.: 109 - 111
27. Advanced Steganography for Hiding Data and Image using Audio-Video
Authors: Miss Madhuri R. Shende, Prof. Amit Welekar,
Page No.: 112 - 117
28. A Load Balancing System Based on Cloud Partitioning for the Hybrid Public Cloud
Authors: Mr. Jagdish R. Yadav, Mr. Rajkumar R. Yadav, Mr. Rahul R. Papalkar
Page No.: 118 - 120
29. Intrusion Detection System (IDS) framework for Digital Network
Authors: Mr. Ashish K. Uplenchwar, Dr. Tanuja Dhope
Page No.: 121 - 126
30. A Survey on Adaptive Policy Prediction of user Uploaded Images on Data Sharing Sites
Authors: Miss.Yugandhara K. Nade, Prof. J. S. Karnewar
Page No.: 127 - 130
31. Convergence Study for Finite Element Analysis on Bone used for Dental Implant
Authors: Mrs. Archana N. Mahajan, Dr Ms Kshitija N. Kadamis
Page No.: 131 - 135
32. A Review: Design and Approach for Finding the Similarity Between The Document
Authors: Ms. Shilpa Satone, Prof. Jayant Adhikari
Page No.: 136 - 138
33. Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access
Authors: Ashwini Khodwe, Prof. V.R. Wadhankar
Page No.: 139 - 142
Authors: Mayuri Ganjudde
Page No.: 143 - 146
35. A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad Hoc Networks
Authors: Shafiqua C. Pathan, Prof. D. S. Dabhade, Prof. Dhananjay M. Sable
Page No.: 147 - 150
36. Security user Data in Local Connectivity using Multicast key Agreement
Authors: Shahela A. Khan, Prof. Dhananjay M. Sable, Prof. D. S. Dabhade
Page No.: 151 - 153
Authors: Ms. Kanchan Babanrao Korke, Prof. V. K. Barbuddhe
Page No.: 154 - 158
38. Way to the Development of Energy Efficient and Clean Cities
Authors: Prashant P. Meshram, Dr. Z.J.Khan, Prof. U.B.Vaidya
Page No.: 159 - 163
39. A Survey: Improving Efficiency of Mobile Search Engine Using Personalization
Authors: Miss. Puja N. Vilayatkar, Prof. R. R. Shelke
Page No.: 164 - 168
40. A Review: An Improved Two Stage Crawler forEfficient Search Engine
Authors: Ms. Roshni S. Nagrale, Prof. R. R. Shelke
Page No.: 169 - 172
41. Failure Investigation & Analysis of Agricultural 9 Tyne Cultivator Used In Various Soil Condition
Authors: Umesh N. Galat, Ajay N. Ingale
Page No.: 173 - 179
42. A Survey Paper on Online Shortest Path Computation for Users Based on Traffic Analysis
Authors: Sharyu Waghmare, Prof. Nutan Dhande
Page No.: 180 - 183
43. Security in Data Sharing Application for Decentralized Military Network
Authors: Priyanka Mehkare, Prof. Mayur Dhait
Page No.: 184 - 186
44. Group Key Agreement with Local Connectivity using multicast key Management
Authors: Sharyu Awachat, Jayant Adhikari
Page No.: 187 - 188
45. Secure Hash Based Distributed De-duplication Systems
Authors: Poonam N. Patel, Prof. Parul Bhanarkar
Page No.: 189 - 192
46. Design an Approach for Finding the Similarity between the Documents
Authors: Miss. Shilpa A. Satone, Prof. Jayant Rohankar
Page No.: 193 - 195
47. A Review: An Image Mining Approach For Thunderstrome Detection Using Saliency Maps
Authors: Miss. Pranali S. Doifode, Prof. Jayant Rohankar
Page No.: 196 - 197
48. An Image Mining Approach For Thunderstorm Detection Using Saliency Maps
Authors: Miss. Pranali S. Doifode, Prof. Jayant Rohankar
Page No.: 198 - 200
49. A Review: Framework for Effective Data Processing using Flaw Traige
Authors: Nikita Hiwse, Prof.Roshani Talmale
Page No.: 201 - 203
50. Framework for Effective Data Processing Using Flaw Traige
Authors: Nikita Hiwse, Prof.Roshani Talmale
Page No.: 204 - 207
51. A Review: MoMoRo:- Providing Mobility Support for Low Power Wireless Application
Authors: Mr. Vishal Aloni, Prof. Kanchan Dhote
Page No.: 208 - 209
52. Providing Mobility Support for Low Power Wireless Application (LPWA): MoMoRo
Authors: Mr. Vishal Aloni, Prof. Kanchan Dhote
Page No.: 210 - 212
53. Case Study For Use of Laterite as Additive in Kilns for Cement Manufacturing
Authors: Devanand S. Satpudke, Prof. Prashant Ashutkar
Page No.: 213 - 215
54. Designing a Tool for Securing User Profile Using Location Based Service
Authors: Pooja Ingle, Prof. Parul Bhanarkar
Page No.: 216 - 217
55. Designing Security Method for Cloud Storage Using Key Aggregate Cryptosystem
Authors: Bharti P.Khond, Prof. Parul Bhanarkar
Page No.: 218 - 220
56. Implementation of Solar Panel Based Multi Mobile Charger with Auto Cut Off of Power
Authors: Miss. Swati M. Karemore, Prof. Amit Welekar
Page No.: 221 - 223
Authors: Namrata M. Gaurkar, Prof. Parul Bhanarkar
Page No.: 224 - 225
58. Design of Privacy Policy Inference Engine for Social Networking Sites
Authors: Mamta S. Dandekar , Jayant Rohankar
Page No.: 226 - 228
59. Optimal Confrontation Location Decision Based on User Privacy
Authors: Dipali D. Kosare, Prof. D. M. Sable, Prof. D. S. Dabhade
Page No.: 229 - 232
60. Security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access
Authors: Ashwini Khodwe, Prof. V.R. Wadhankar
Page No.: 233 - 237
61. Privacy Hardening by Policy Generation & Secure Sharing on Content Distribution Sites
Authors: Nada Sayed, Prof. V. R. Wadhankar, Prof. Deepali Khatwar
Page No.: 238 - 240
62. Data Extraction from Multiple Web Databases With Comparative Study
Authors: Ms. Amruta Pise, Prof. Jayant Adhikari
Page No.: 241 - 242
63. An Approach Comparative Study of ACM, FCM, SHFCM
Authors: Miss Prajakta Dilip Borkar, Prof. Amit Welekar
Page No.: 243 - 246
64. Implementation of Web Security Mechanisms using Vulnerability & Attack Injection
Authors: Neha Waghale, Prof. Parul Bhanarkar
Page No.: 247 - 249
65. Image and Video Search Engine with Re-Ranking and Recommendation
Authors: Ms. Shital Patil, Prof. Roshani Talmale
Page No.: 250 - 253
66. Securing Cloud Computing using Attribute based Signatures and Image based Key Generation
Authors: Mr. Tejas Kshirsagar, Prof. Sulabha Patil
Page No.: 254 - 257
67. Comparative Study On Data Warehouse And Big Data
Authors: Ms. Ashwini S. Rupnawar, Mr.Yogesh D. Shinde
Page No.: 258 - 261
68. Grid Synchronization using Voltage Control
Authors: Prof. Nitin P. Choudhary, Shubham Damahe, Apurv Wankhede, Vivek kumar Musale
Page No.: 262 - 265
69. A study on Work-Life Balance in Working Women
Authors: Ms. Shital H. Rathod, Mrs.Sunayana Shivthare
Page No.: 266 - 268
70. An Review of Reverse Auctions
Authors: Prof. Ashwini Jagdale, Prof. Pritam Rajmane
Page No.: 269 - 273
Authors: Mr. Sahadeo K. Narnaware, Mr. R. K. Dhatrak
Page No.: 274 - 277
72. Design a Wideband CMOS Low Noise Amplifier with Simplified T-match Filter
Authors: Miss. Sneha P. Sawarkar, Prof. B. Vidhale
Page No.: 278 - 280
73. Use of Social Media in Education: Positive and Negative impact on the students
Authors: Mrs. Vishranti Raut, Mrs. Prafulla Patil
Page No.: 281 - 285
74. “To study the scope of E-Business and its applications in the era of E-Commerce”
Authors: Mr. Satyavan M Kunjir, Ms. Vidhya R. Gage
Page No.: 286 - 289
75. Personalized Web Search Engine using Data Extraction from Multiple Web Databases
Authors: Prajakta Kishorrao Khodke, Prof. Ms. P. V. Kale
Page No.: 290 - 292
76. Analysis of Stock Market by Using Big Data Analytic Technology
Authors: Varunesh Nichante, Prof. Sulabha Patil
Page No.: 293 - 295
Authors: Ashvin Selokar, Prof. Parul Bhanarkar
Page No.: 296 - 299
78. Detection of Mechanical Faults on Transformer Winding using Frequency Response Analysis (FRA)
Authors: Rohini D. Jiwane, Prof. T. N. Date
Page No.: 300 - 304
79. A Review: Analysis of stock market by using big data analytic technology
Authors: Varunesh Nichante, Prof. Sulabha Patil
Page No.: 305 - 306
80. Queue length estimation using connected vehicle technology for adaptive signal control
Authors: Mr. Ravindra Patle, Prof. Kanchan Dhote
Page No.: 307 - 310
81. A Review: Queue length estimation using connected vehicle technology for adaptive signal control
Authors: Mr. Ravindra Patle, Prof. Kanchan Dhote
Page No.: 311 - 312
Authors: Mr. Javed Khan, Prof. Parul Bhanarkar
Page No.: 313 - 316
Authors: Mr. Javed Khan, Prof. Parul Bhanarkar
Page No.: 317 - 319
84. Raspberry Pi-2 Based Anti-Theft System for Car Logo
Authors: Chaitali N. Surkar, Prof. Amit Welekar
Page No.: 320 - 324
85. AgriField - An Agricultural Initiative
Authors: Bhushan G. Bandre, Rashmi R. Khalatkar, Prof. Sunny G. Gandhi
Page No.: 325 - 326
86. Review on Agri Field an Agricultural Initiative
Authors: Mayuri Ingole, Mayuri Dandhare, Payal Bhute
Page No.: 327 - 330
87. General Structure Design for Fast Image Processing Algorithms Based upon FPGA DSP Slice
Authors: Prof. Pranali R. Dandekar, Prof. Mohini Upasani, Prof. Punam Khandar
Page No.: 331 - 334
88. Histogram : An Approach towards image Retrieval
Authors: Prof. Mohini Upasani, Prof. Punam Khandar, Prof. Pranali Dandekar
Page No.: 335 - 338
89. Improved Association Rule Mining with Positive and Negative Integration
Authors: Prof. Punam Khandar, Prof. Pranali Dandekar, Prof. Mohini Upasani
Page No.: 339 - 341
Authors: Sameer Raut
Page No.: 342 - 345