Computer Engineering
- Computer Engineering
- About Department
- From HOD Desk
- Vision & Mission
- PEO & PSO, PO & CO
- Autonomy Constitution
- Faculty Profile
- Lab Facilities
- Innovations in Teaching – Learning
- Research & Publication
- Skill Development
- Faculty Achievement
- Students Achievement
- Student Association
- Placement and Internship
- Center of Excellence
- Life @ Computer
- Downloads
- Newsletters
Paper Published by Faculty
| Title | Publisher |
|---|---|
| Block Chain for Secure Energy Trading on Solar System | IJITEE (Scopus) |
| Spam Review Detection to Increase User Reliability on Reviews for Availing Online Service | IJIRSET |
| Providing Security in Vehicular Adhoc Network Using Cloud Computing by secure key Method | IEEE |
| Study and Implementation of Routing Protocols by using Security Method | IEEE |
| Efficient Query Suggestion System using Users Search History | IEEE |
| Title | Publisher |
|---|---|
| Innominate and Detectable Group Data Sharing in Cloud Computing | IJERA 2019 |
| Emotion Identification between POMS and Multinomial Naïve Bayes Algorithm using Twitter API | IJCSE 2019 |
| Secured Image system using grayscale image Encryption | JETIR 2020 |
| Multiple Authority based security control management with logical cooperation in cloud storage | IJIRSER 2019 |
| Performance Analysis of Intrusion Detection system utilizing deep learning techniques | JGRS 2019 |
| OACD-SA: Online Aspect Category Detection for Sentiment Analysis using Unsupervised Learning | IEEE Conference 2020 |
| R-SA: A Rule-based Expert System for Sentiment Analysis | IEEE Conference 2020 |
| Title | Publisher |
|---|---|
| An Efficient Localization Scheme for Mobile WSN | IJITEE (Scopus) |
| A review on localization techniques in WSN | IJITEE (Scopus) |
| Providing Security in Vehicular Adhoc Network using Cloud Computing by secure key Method | IJITEE (Scopus) |
| Title | Publisher |
|---|---|
| Smart Trolley System | IJRESM – 1294 |
| Modern Logistics Vehicle system using Dynamic Scheduling, Tracking and Security | IJIRCCE, ISSN : 2320 – 9801 |
| Smart Trolley System Using RFID | IJSART ISSN-2395-1052 |
| Title | Publisher |
|---|---|
| Efficient query suggestion system using user search log | ICICET |
| BOTNET ATTACK DETECTION USING REAL TIME PACKET ANALYSIS | ICETT-2k19 |
| Security by fusion of face and fingerprint | ICETT-2k19 |
| Title | Publisher |
|---|---|
| MAINTAINTING SECURITY OF- DATA ACCESS IN CLOUD COMPUTING | ICICET |
| Monitoring of Plants in Poly House using Automation | ICETT-2k19 |
| Poly House Monitoring and Plant Disease Detection | ICETT-2k19 |
| Title | Publisher |
|---|---|
| Touchscreen Mobile Device Owner Identification Using Continuous Successive Gestures | © 2019 JETIR May 2019, Volume 6, Issue 5 |
| “A Survey on Intelligent Data Mining of Social Media for Better Decision Making” | Volume-11, Issue-4, April-2019 in IJRDT. |
| “Intelligent Data Mining of Social Media for Better Decision Making” | IJIRCCE, Volume 7, Issue 3, March 2019 |
| A Survey on Intelligent Data Mining of Social Media for Better Decision Making | INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY |
| Human Social Network Addiction Detection using Social Networking | © 2019 JETIR May 2019, Volume 6, Issue 5 |
| Title | Publisher |
|---|---|
| Gross Domestic Product(GDP) prediction: A Review | ICETT-2k19 |
| Modeling & Forcasting Gross Domestic Product using Linear Regression | ICETT-2k19 |
| A review on different E-Commerce sited with outfit composition | ICETT-2k19 |
| E-commerce sites with outfit composition | IJIRMPS May-2019 |
| Analyzing Different E-commerce Sites with Outfit Composition Using Deep Learning Approach | IJITEE (Scopus) |
| Data retrieval in CBR using Vertical association rules. | ICICET |
| Protest & channels for big data testing | ICICET |
| Title | Publisher |
|---|---|
| Malware Prevention and Detection Systemfor Smartphone-A Machine Learning Approach | CRC Press, Taylor and Francis Group |
| Memory Device & Smart Reminder For Alzheimer Patients | ICETT-2k19 |
| Smart System for Protecting Onion from Different Attack | ICICET 2018 |
| Review Paper on Untwist Blockchain: A Data Handling Process of Blockchain Systems | ICICET 2018 |
| Title | Publisher |
|---|---|
| Survey on Emotion Detection from Text using Automatically Generated Rules | ICETT-2k19 |
| Aspect Category Detection by Supervised and Unsupervised method for Sentiment Analysis on Web Mining |
| Title | Publisher |
|---|---|
| MENTAL DISORDER SYSTEM VIA SOCIAL MEDIA MINING | ICETT-2k19 |
| Title | Publisher |
|---|---|
| Ranking Based Recommendation Using Online Social Users Data | International Conference on Emerging Trends In Technology (ICETT-2K19) |
| Title | Publisher |
|---|---|
| Protest and Channels for Big Data Testing | IEEE 2018 |
| A Big Data: Tools, Systems and Benchmarks | IEEE 2018 |
| A review on Online Supermarket Models and Customer Interpretations | ICICET 2018 |
| A Smart Online Grocery Shop System | ICICET 2018 |
| Performance Optimization in Multi-cloud Computing | ICICET 2018 |
| Title | Publisher |
|---|---|
| Smart System for Protecting Onion from Different Attack | ICICET 2018 |
| Review Paper on Untwist Blockchain: A Data Handling Process of Blockchain Systems | ICICET 2018 |
| Survey On Document Digitaliztion using RFID and fingerprint scanner | ICETT 2K19 |
| Implementation Paper on IOT Based Smart Water and Fertilizer Sprinkle Irrigation System | ICETT 2K19 |
| Document Digitization using RFID & Fingerprint Scanner | ICETT 2K19 |
| Title | Publisher |
|---|---|
| Smart System for Protecting Onion from Different Attack | ICICET 2018 |
| Review Paper on Untwist Blockchain: A Data Handling Process of Blockchain Systems | ICICET 2018 |
| Survey For E-commerce, ChatBot And Augmented Reality | ICETT 2K19 |
| E-commerce: Digital Marketing Using Google Bot And Augmented Reality | ICETT 2K19 |
| Crop disease detection using Image Processing | ICETT 2K19 |
| Title | Publisher |
|---|---|
| Efficient query suggestion system using user search log | ICICET-18 |
| Improved Algorithm for Visual Summarizarion of Image Collections using Crowdsourcing and Infinite Push Ranking | ICETT-2k19 |
| Title | Publisher |
|---|---|
| Efficient query suggestion system using user search log | ICICET-18 |
| Improved Algorithm for Visual Summarizarion of Image Collections using Crowdsourcing and Infinite Push Ranking | ICETT-2k19 |
| Title | Publisher |
|---|---|
| MOBISCHOOL-School Management System Using Android Application” is presented in International Conference on Emerging Trends In Technology (ICETT-2K19) | Accepted for Scopus by IJITEE(International Journal of Innovative Technology and Exploring Engineering ).Publication under process |
| Ransomware-Threat to Organizations | JETIR- Journal of Emerging Technologies and Innovative Research © 2019 JETIR May 2019, Volume 6, Issue 5 |
| Title | Publisher |
|---|---|
| A Big Data: Tools, Systems and Benchmarks. | IEEE 2018 |
| learning techniques in cancer detection a review |
| Title | Publisher |
|---|---|
| Load Balancing In Distributed File Systems Using Clouds | ICETT-2k19 |
| Title | Publisher |
|---|---|
| Block Chain for Secure Energy Trading on Solar System | IJITEE (Scopus) |
| Providing Security in Vehicular Adhoc Network Using Cloud Computing by secure key Method | IEEE |
| Study and Implementation of Routing Protocols by using Security Method | IEEE |
| Efficient Query Suggestion System using Users Search History | IEEE |
