ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
year
name of Students
Title
2
2013-2015Swati S. AtameSinger Identication and Authentication using MFCC
3
2013-2015Mugdha M. ParandeRobust Feature Extraction for speech Recognition
4
2013-2015Poonam PangarkarA Dissertation on Color matching for mobile panorama image stiching
5
2013-2015Bhushan TalekarRising up the marketing Tactics by looking out the key users
6
2013-2015Balmukund DubeyPattern discovery using pattern revealing in text mining
7
2013-2015Shraddha BhattePrivacy protection for video, Image and text Transmission
8
2013-2015Romil GandhiPassword persuasive cued click points
9
2013-2015Pranit GaikwadVeto based malware detection
10
2013-2015Reena MaheUser categorization based on trust analysis for reputation system in E- Commerce
11
2013-2015Jayati PandeyStudy of distributed incomplete Pattern Matching
12
2013-2015Pratiksha DeshmukhWeb Service based file transfer using mtom
13
2013-2015Sonali ChaudhariItem features based on user to item interaction
14
2013-2015Soma BeraA Dissertation Report on Application of speech recognition for mood detection
15
2013-2015Snehal SharkhaneScalable web conferencing usinf WCF
16
2013-2015Priyanka BelondeSymbosis of Neuro Fuzzy System and genetic algorithm in the diagnosis of cardiovascular disease
17
2014-2016Tatwadarshi NagarhalliHindi Text Steganography
18
2014-2016Siddhesh DoiphodeA hybrid indoor positioning system based on wi-fi hotspot and wi-fi fixed nodes
19
2014-2016Sanket PatilTweet data pre-processing and segmentation to name entity recognition
20
2014-2016Neha ThomreIdentification of germplasm accession of cotton using data mining techniques
21
2014-2016Satish RanbhiseEfficient Resource allocation in cloud computing
22
2014-2016Sonali BodekarAn improvised approach for web usage mining with improved FP-TREE
23
2014-2016Rujuta VartakLoad shedding freqent pattern mining using different strategies in data stream
24
2014-2016Sneha MhatreMSE based algorithm for vector quantization using haar sequence
25
2014-2016Komal NaikSecurity breach detection using honeywords and service enhancement using IP tracking.
26
2014-2016Maya GharatEnhancing Speed of map reduce algorithm using pre- processing technique
27
2014-2016Ankita KaduRobust Firely algorithm for Secure data hiding with hidden image compression
28
2014-2016Apeksha NaikTweet analytics and tweet summarization using graph mining
29
2014-2016Mrunal BhogteSpeaker Identification in overlapping speech using GMM and DNN based approach
30
2014-2016Monali PimpaleSeparation of singing voice using nonnegative matrix partial co- factorization for singer identification
31
2014-2016Pooja VartakResult based on actual implementation of security on generic database
32
2014-2016Jha Soni VinitHyperspectral image segmentation and classification least square clustering on fodpso
33
2015-2017Dhanashree Kadu Improved Authentication scheme using presuasive cued click points
34
2015-2017Pratiksha PrajapatiSpeech recognition System
35
2015-2017Nishigandha KarbhariRecommender system using content filtering
36
2015-2017Ankita DoiphodeAn efficient object retrieval system
37
2015-2017Shahista ShaikhImplementation and analysis of perfect difference network using NS-2
38
2015-2017Preeti AwareBlack hole attack prevention on AODV in MANET using hash authentication
39
2015-2017Dnyaneshwar BhabadVideo recommendation using multimedia based information retrival approach and lecture video indexing using speech recognition and optical character recognition
40
2015-2017Jyoti Jadhavphishing website detection using clustering and decision tree based approach
41
2015-2017Amreen ShaikhReputation based trust evalution in sentiment analysis
42
2015-2017Prajakta GosaviImroving sentiment classification using supervised learning
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100