SR NO | NAME | PROJECT TITLE |
1 | Heena Chopade | Hybrid auto text summarization |
2 | Prajakta Kamble | Efficent of privacy Preserving access to sensor data for IOT |
3 | Pankaj Rathod | Improvising Personalised Web Search Using Hybrid Approach. |
4 | Pratik Shah | Trajectory Clustering Algorithm for large Datasets |
5 | Sofia Biju | Improving the lifetime of 6LoWPAN based WSN using Fuzzy logic clustering |
6 | Ashish Taldeokar | Analysing opinion of trading expert to predict behaviour of stock market using machine learning |
SR NO | NAME | DESSERTATION TITLE |
1 | ALMEIDA JOYLINA MICHAEL | Improvising the query processing method in broadcast database system |
2 | BRAHMBHATT NIKUL KRUSHNAKANT | Predicting location of users in mobile environment |
3 | CHORGHE SHARVARI PRAKASH | Antiphishing mechanism for Android phones |
4 | D'BRITTO MAMTA PETER | Design a smart and intelligent interface for physically disabled |
5 | GONSALVES ANCY IGNATIUS | Processing of queries in distributed mobile system |
6 | GUPTA ABHAYKUMAR LAXMINARAYAN | Efficient energy management of a wireless sensor network for increased network lifetime |
7 | HALDANKAR AKASH NEELESH | A cost sensitive classifier for Big data |
8 | KADIWAL SANIF BAHADUR | Wearable wireless real time monitoring device for anywhere,anytime health |
9 | KHAN FARIHA IRFAN | Real time dynamic routing for waste management using IoT for cost effiecient service |
10 | LEMOS JOYCE YOSEPH | Design a smart and intelligent routing network using optimization technique |
11 | MULANI HUDA ABDUL REHMAN | Environmental monitoring using IoT |
12 | NAIK KIRTIDA SUBHASH | Design a smart model for analyzing data from social media to gain competitive |
13 | NAYAK SNEHAL RAMKRISHNA | Location Estimation using range search |
14 | PRABHU GAURAV PANDURANG | Improvised query processing plan |
15 | RANE SUCHITA SAKHARAM | 3D Socio graphical CAPTCHA based on ReCAPTCHA (SGreCAPTCHA) against spammers and Bot |
16 | SAYED TANZILA RAJ MOHAMMED | An hybrid approach to detect phished emails |
17 | SHAIKH SAUBIYA AHMED S. | Cued click Authentication |
18 | SHUKLA PRATYUSHA ASHOKKUMAR | Analysis of Ensemble methods for classification of imbalanced datasets |
SR NO | NAME | DESSERTATION TITLE |
1 | Harshal Dalvi | Trustworthiness Evaluation System in E-commerce Context |
2 | Chirag Desai | Prevention of session Hijacking Attack using Enhanced session binding techniques. |
3 | Krishna kansara | Security Against Sybil Attack in Social Network |
4 | Bansi kantariya | Security protocol for wireless sensor network to prevent node cloning attack. |
5 | Apurva Kulkarni | Coherent Rule Mining using AIR |
6 | Neha Mendjoge | INTELLIGENT TUTORING SYSTEM FOR DATABASE NORMALIZATION |
7 | Lakshmi Mohandas | INTELLIGENT TUTORING SYSTEM FOR LEARNING ENGLISH PUNCTUATION |
8 | Heena Mukadam | Enhanced Data Dissemination In A Mobile Environment |
9 | Nilambari Narkar | Malicious web crawler detection using intrusion detection system |
10 | Ashok Patade | Novel architecture for analysis of mobile botnet detection using Machine Learning for Android. |
SR NO | NAME | DESSERTATION TITLE |
1 | AMBRE AMRUTA | Insider threat detection using Log Analysis and Event Correlation |
2 | DESAI DARSHANA | A deviant load shedding system for data stream mining |
3 | DESAI VAISHALI | Performance evaluation of olsr protocol in MANET under the influence of routing attack |
4 | DEULKAR KHUSHALI | An Improved Memetic Algorithm For Web Mining. |
5 | FARGOSE PRIYANCA | Enhancing Accuracy of Weather Forecasting |
6 | KALE ASHWINI | A Predictive Analysis: For Local Businesses in India |
7 | KANERE KETAN | Real time messaging server using duplex web service |
8 | MAIN WINNIE | Twitterati identification system using a novel mining approach |
9 | MEHTA BHAVDEEP | A Novel Hybrid Approach for Web Content Extraction. |
10 | MODI HIRAL | Enhancement Of Online Web Recommendation System Using A Hybrid Clustering And Pattern Matching Approach |
11 | NAIK SWAPNA | Conservation of energy by prevention of denial_of_sleep attack in WSN,Blocking of rogue nodes by secure authentication in wireles sensor network |
12 | NANDU POOJA | An Enhanced Authentication Mechanism to Secure Reprograming in WSN |
13 | PATEL NENCY | Implementation of Pattern matching algorithm to defend SQLIA |
14 | RANADE APARNA | |
15 | SHAH CHINTAN | |
16 | SHAIKH SAKINA | predicitng users web navigation behavior using hybrid approach |
17 | SYED SHAFAQUE FATMA | An optimized algorithm for association rule mining using fp tree |