SR.NO | TITLE OF PAPER | NAME OF FACULTY | DEPARTMENT | NAME OF JOURNAL | YEAR OF PUBLICATION | ISSN NUMBER | WEBLINK OF PAPER |
1 |
A BRIEF REVIEW ON DIFFERENT SECURITY MECHANISM IN CLOUD COMPUTING |
PROF.S.S. SANGOLE |
COMPUTER SCIENCE |
IJSRD - INTERNATIONAL JOURNAL FOR SCIENTIFIC RESEARCH & DEVELOPMENT |
2017 |
N/A |
HTTPS://ARCHIVE.ORG/DETAILS/06.SUVIDHASANGOLE |
2 |
IMPLEMENTATION OF SHARED AUTHORITY BASED PRIVACY PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING |
PROF.S.S. SANGOLE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCHOLARLY RESEARCH (IJSR) |
2017 |
2321-0613 |
HTTP://IJSRD.COM/ARTICLE.PHP?MANUSCRIPT=IJSRDV5I60081 |
3 |
COMPARATIVE STUDY ON DIFFERENT ALGORITHMS FOR DETECTING AND RANKING FRAUD IN MOBILE APPLICATION |
PROF S A KALE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCHOLARLY RESEARCH (IJSR) |
2017 |
N/A |
N/A |
4 |
DIFFERENT APPROACHES FOR RANKING FRAUD DETECTION FOR MOBILE |
PROF S A KALE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF INNOVATIONS & ADVANCEMENT IN COMPUTER SCIENCE |
2017 |
N/A |
HTTP://CONFERENCEINFO.ORG/ADMIN/RESOURCES/PROJECT/PAPER/F201801031515000169.PDF |
5 |
APPS APPLICATION : AN ANALYSIS OF COMPARATIVE STUDY ON DIFFERENT ALGORITHMS |
PROF S A KALE |
COMPUTER SCIENCE |
IJIACS |
2017 |
2347 – 8616 |
N/A |
6 |
IMPLEMENTATION ON AN EFFICIENT APPROACH FOR RANKING BASED FRAUD DETECTION IN ANDROID MOBILE MARKET |
PROF S A KALE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCHOLARLY RESEARCH (IJSR) |
2017 |
N/A |
HTTPS://WWW.SCRIBD.COM/DOCUMENT/353070148/06-SUMITKALE |
7 |
REVIEW ON AN EFFICIENT APPROACH FOR RANKING BASED FRAUD DETECTION IN ANDROID MOBILE MARKET" |
PROF S A KALE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCHOLARLY RESEARCH (IJSR) |
2017 |
N/A |
HTTPS://WWW.SCRIBD.COM/DOCUMENT/353069703/4-SUMITKALE |
8 |
TO STUDY PARTICLE SWARM OPTIMIZATION FOR PATH PLANNING FOR IMPROVING THESWARN ALGORITHIM |
PROF C S KSHIRSAGAR |
COMPUTER SCIENCE |
INTERNATIONAL ORGANIZATION OF ENGINEERING RESEARCH & DEVELOPMENT.(IOERD) |
2017 |
2455-9075 |
HTTPS://IOERD.IN/PAGE15.HTML |
9 |
RESEARCH WORK ON PUT INTO EXCUTE FOR PATH PLANNING USING PARTICLE SWARM OPTIMIZATION PSO |
PROF C S KSHIRSAGAR |
COMPUTER SCIENCE |
IORD JOURNAL OF SCIENCE & TECHNOLOGY |
2017 |
2348-0831 |
N/A |
10 |
OFF LINE HANDWRITTEN DEVNAGRI SPECIAL CHARACTER RECOGNITION USING NEURAL NETWORK |
PROF N I JAGTAP |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY |
2016 |
2394-4099 |
HTTP://IJSRSET.COM/IJSRSET1623241 |
11 |
A REVIEW ON OFF-LINE HANDWRITTEN DEVNAGRI SPECIAL CHARACTER RECOGNITION USING NEURAL NETWORK |
PROF N I JAGTAP |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY |
2016 |
2319-507X |
HTTP://WWW.IJPRET.COM/ISSUE.PHP?YEAR=2016&MONTH=4 |
12 |
AUTHENTICITY VERIFICATION FOR SECURITY SYSTEM USING GRADIENT BASED IMAGE RECONSTRUCTION TECHNIQUE |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY |
2015 |
2348-196X |
HTTPS://WWW.GOOGLE.COM/URL?SA=T&SOURCE=WEB&RCT=J&URL=HTTPS://IGMPUBLICATION.ORG/IJMEIT%2520ISSUE/V3-I5/11%2520IJMEIT.PDF&VED=2AHUKEWIXSBIA7D3FAHVFQ48KHWHICPEQFJAAEGQIAXAB&USG=AOVVAW1MMITSHYW6BSP1USASBA8Q&CSHID=1546939079890 |
13 |
INTRUSION DETECTION IN WIRELESS NETWORK USING FUZZY RULES |
PROF K P BHUSARI |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCIENCE AND RESEARCH |
2015 |
2319-7064 |
HTTP://WWW.IJSR.NET/ARCHIVE/V4I4/V4I4_03.PHP |
14 |
PERFORMANCE ENHANCEMENT OF DIMENSION REDUCTION FOR MICROARRAY DATA |
PROF SHUBHANGI KATOLE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF SCIENCE AND RESEARCH |
2015 |
2319-7064 |
HTTPS://WWW.IJSR.NET/ARCHIVE/V4I5/SUB153936.PDF |
15 |
REVIEW ON INTRUSION DETECTION SYSTEM USING FUZZY LOGIC |
PROF K P BHUSARI |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ADVANCES IN ELECTRONICS AND COMPUTER SCIENCE |
2015 |
2393-2835 |
HTTP://IJAECS.IRAJ.IN/VOLUME.PHP?VOLUME_ID=135# |
16 |
APPLICATION OF ARTIFICIAL INTELLIGENCE IN REAL WORLD |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH |
2015 |
2278-7844 |
HTTP://WWW.ADVANCERESEARCHLIBRARY.COM/TEMP/DOWNLOADS/IJAIR/JAN2015/T33.PDF |
17 |
A NEW APPROACH OF MICROARRAY DATA DIMENSION REDUCTION FOR MEDICAL APPLICATIONS |
PROF SHUBHANGI KATOLE |
COMPUTER SCIENCE |
INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEM |
2015 |
N/A |
HTTPS://IEEEXPLORE.IEEE.ORG/DOCUMENT/7124936 |
18 |
GRAPHICAL PASSWORD BY WATERMARKING FOR SECURITY |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNAL JOURNAL OF ENGINEERING RESEARCH AND APPLICATION |
2014 |
2248-9622 |
HTTPS://WWW.GOOGLE.COM/URL?SA=T&SOURCE=WEB&RCT=J&URL=HTTP://WWW.IJERA.COM/PAPERS/VOL4_ISSUE11/PART%2520-%25205/O0411058187.PDF&VED=2AHUKEWJ_TRIK6D3FAHUJUO8KHAG_D4UQFJAAEGQIBRAB&USG=AOVVAW2A8ZSLWWVGBIIRMINP1WCR&CSHID=1546938090649 |
19 |
ENHANCING DATA SECURITY USING HYBRID CRYPTOGRAPHIC ALGORITHM |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ENGINEERING ASSOCIATES |
2014 |
2320-0804 |
HTTP://WWW.ADVANCERESEARCHLIBRARY.COM/TEMP/DOWNLOADS/IJEA/NOV2014/RK1.PDF |
20 |
IMAGE RETRIVAL SYSTEM WITH INTERACTIVE GENETIC ALGORITHM USING DISTANCE |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING |
2014 |
2347-2693 |
HTTPS://WWW.GOOGLE.COM/URL?SA=T&SOURCE=WEB&RCT=J&URL=HTTP://WWW.IJCSEONLINE.ORG/PUB_PAPER/26-IJCSE-00639.PDF&VED=2AHUKEWITH6J7-D3FAHUVKNAKHEZGC8YQFJACEGQIBBAB&USG=AOVVAW2WBD566P1TOZBTDUWDM6BT&CSHID=1546942539413 |
21 |
DESKTOP MONITORING USING SPYDROID |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH AND MANAGEMENT |
2014 |
2349-2058 |
HTTPS://ISSUU.COM/IJERM/DOCS/IJERM0111025 |
22 |
SECURE TECHNIQUE FOR COLLISION AVOIDANCE IN CAR-TO-CAR COMMUNICATION |
PROF V LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGY AND ADVANCED ENGINEERING |
2013 |
N/A |
HTTP://DOCPLAYER.NET/56409134-SECURE-TECHNIQUE-FOR-COLLISION-AVOIDANCE-IN-CAR-TO-CAR-COMMUNICATION.HTML |
23 |
SECURITY REQUIREMENTS FOR CAR TO CAR COMMUNICATION NETWORK |
PROF V P LONKAR |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY |
2013 |
2288-2400 |
HTTP://DOCPLAYER.NET/56409134-SECURE-TECHNIQUE-FOR-COLLISION-AVOIDANCE-IN-CAR-TO-CAR-COMMUNICATION.HTML |
24 |
SQLIA: ATTACK'S BY SQL INJECTION ATTACK AND THEIR DETECTION MECHANISM |
PROF P Y JANE |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY |
2013 |
2278-0181 |
HTTP://WWW.IOSRJOURNALS.ORG/IOSR-JCE/PAPERS/SICETE-VOLUME2/23.PDF |
25 |
A SURVEY OF ENERGY EFFICIENT LOCATION LOCATION BASED MULTIPATH ROUTING IN MANET |
PROF RUCHI GUPTA |
COMPUTER SCIENCE |
INTERNATIONAL JOURNAL OF COMPUTER APPLICATION |
2012 |
0975-8887 |
HTTPS://WWW.IJCAONLINE.ORG/ARCHIVES/VOLUME59/NUMBER11/9595-4217 |