Faculty

Dr. Gajendra. R. Bamnote

Professor & Principal

Qualification :- Ph.D, M.E, B.E (Computer Science & Engg)

Subject Tought

Operating Systems, Computer Networks, Computer Network & Internet, Computer Communication Networks, Data Communications, Assembly language Programming, Computer Graphics, Multimedia Technologies, Switching Theory & Logic Design, Computer Architecture

Teaching Experience

34 Year

Industrial Experience

0 Year

Area of Interest

Computer Networks, Data Mining, Databases, Operating System

Papers Published

National :59, International : 154

Teaching

Computer Science & Engineering

Contact

E-mail.: grbamnote@mitra.ac.in Mob. No.: 9421741516

Sr.No Paper Name Paper Link
1 Implementing and Evaluating Collaborative Filtering (CF) Using Clustering Click Here
2 Collaborative Filtering Implementation and Evaluation Using Clustering Click Here
3 A Hybrid Clustering Based Collaborative Filtering (CF) Approach Click Here
4 Enhancement of Hybrid Tagger by using Rule Based Approach†Paper Accepted for Oral Presentation & Publication in Proceedings in n ACM - International Conference Proceedings Series (ICPS) ISBN Number by ACM - ICPS for Proceeding Volume: 978-1-4503-396 Click Here
5 Natural Language based Self Learning feedback Analysis System†Paper Accepted for Oral Presentation & Publication in Proceedings of the Second International Conference on Computer and Communication Technologies, Advances in Intelligent Systems and Comp Click Here
6 Evaluating and Implementing Collaborative Filtering Systems Using Apache Mahout Click Here
7 Efficient Binary Classifier for Prediction of Diabetes using Data Pre-processing and Support Vector Machine†, Presented and Published in the Proceedings of FICTA 2014: Springer-Advances of Intelligent Systems and Computing Vol. 327, ISBN No: 978-3-319- Click Here
8 Design of Classifier for Detection of Diabetes Mellitus using Genetic Programming†Presented and Published in the Proceedings of FICTA 2014: Springer-Advances of Intelligent Systems and Computing Vol. 327, ISBN No: 978-3-319-1933-5, Nov 2014. Click Here
9 Compact binary evolutions with the Z4c formulation Click Here
10 Continuous and semicontinuous monitoring techniques for particulate matter mass and chemical components: A synthesis of findings from EPA’s particulate matter supersites … Click Here
11 Mathematical modeling and control of an electrically-heated catalyst Click Here
12 Securing peer-to-peer mobile communications using public key cryptography: New security strategy Click Here
13 Discovering latent semantics in web documents using fuzzy clustering Click Here
14 Credit card fraud detection using hidden Markov model Click Here
15 A software comparison of RSA and ECC Click Here
16 Design of classifier for detection of diabetes mellitus using genetic programming Click Here
17 A genetic programming approach for detection of diabetes Click Here
18 Advances in computer vision and information technology Click Here
19 Bright's Ango-Saxon Reader Click Here
20 Computer vision and information technology: advances and applications Click Here
21 Evaluating and implementing collaborative filtering systems using apache mahout Click Here
22 A novel method for clustering tweets in twitter Click Here
23 Query optimization in object oriented databases through detecting independent subqueries Click Here
24 Shortest path finding using a star algorithm and minimum weight node first principle Click Here
25 Towards hybrid online on-demand querying of realtime data with stateful complex event processing Click Here
26 A survey on energy depletion attacks in wireless sensor networks Click Here
27 Introduction to query processing and optimization Click Here
28 Data leakage detection and data prevention using algorithm Click Here
29 Enhancement of GSM Security using elliptic curve cryptography algorithm Click Here
30 Whale–crow optimization (WCO)-based optimal regression model for software cost estimation Click Here
31 Quick interactive image search in huge databases using Content-Based image retrieval Click Here
32 Prediction of hidden knowledge from clinical database using data mining techniques Click Here
33 Web document clustering using fuzzy equivalence relations Click Here
34 Multilevel haar wavelet transform and histogram usage in content based image retrieval system Click Here
35 An Empirical Study: XML Parsing using Various Data Structures Click Here
36 Awareness of malicious social engineering among Facebook users Click Here
37 Query processing in distributed database through data distribution Click Here
38 An Empirical Study of XML Parsers across Applications Click Here
39 Super speed data traveller USB 3.0 Click Here
40 Multilevel haar wavelet transform and histogram based relevant image retrieval system Click Here
41 Efficient binary classifier for prediction of diabetes using data preprocessing and support vector machine Click Here
42 Fuzzy logic based query optimization in distributed database Click Here
43 Profiling short tandem repeats from short reads Click Here
44 Cross site scripting: An overview Click Here
45 An overview of character recognition focused on offline handwriting Click Here
46 Mobile data offloading techniques and related issues Click Here
47 DESIGN AND DEVELOPMENT OF AN EFFICIENT XML PARSING ALGORITHM: A REVIEW Click Here
48 Overview of space-filling curves and their applications in scheduling Click Here
49 Analysis of firewall technology in computer network security Click Here
50 Mobile data offloading the growing need with its solutions and challenges Click Here
51 Transforming the automotive industry with connected cars Click Here
52 Predictive Modeling of Clinical Data using Soft Computing-Diabetes A Case Study. Click Here
53 Query optimization of OODBMS: semantic matching of cached queries using normalization Click Here
54 Distributed database: A survey Click Here
55 Improving query processing performance using optimization techniques for object-oriented DBMS Click Here
56 Identification of AIDS Disease Severity Using Genetic Algorithm Click Here
57 Query optimization in OODBMS: identifying subquery for complex query management Click Here
58 Optimization of Large Join Query using Heuristic Greedy Algorithm Click Here
59 Forensic analysis algorithm: By using the tiled bitmap with audit log mechanism Click Here
60 A novel disk scheduling algorithm in real-time database systems Click Here
61 Mobile Agent Based Distributed System Computing in Network Click Here
62 Cross layer design for routing in multi-hop wireless networks Click Here
63 A novel disk scheduling approach for real-time database systems Click Here
64 Review on Content Based Image Retrieval Using Texture and Color Features Click Here
65 Natural language-based self-learning feedback analysis system Click Here
66 Query optimization in object oriented DBMS: direct navigation
67 Mobile Multimedia Traffic Analysis: Clients Can Waste Network Bandwidth Click Here
68 An Overview to SQL Injection Attacks and its Countermeasures Click Here
69 Mobile Device Management A Functional Overview Click Here
70 Komparasi Algoritma Backpropagation, Nearest Neighbor Dan Desicion Tree Untuk Mendeteksi Penyakit Demam Berdarah Pada Pasien Opname Click Here
71 Soft clustering: An overview Click Here
72 Comparison of pre-processing and feature extraction techniques for Alzheimer detection using MRI images Click Here
73 Role of Deep Learning in Disaster Prediction Click Here
74 Prediction of next mobile access gateway by tracking locations of mobile node Click Here
75 Implementing and evaluating collaborative filtering (CF) using clustering Click Here
76 QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR QUERY MANAGEMENT Click Here
77 Design and development of xml parser using tree-branch symbiosis algorithm-review Click Here
78 Peer-To-Peer Ad Hoc Network: an Overview Click Here
79 Clustering method based on fuzzy equivalence relation Click Here
80 Query Optimization in OODBMS: Decomposition of Query and cached for Wider Query Management Click Here
81 An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects Click Here
82 Access of Encrypted Personal Record in Cloud Click Here
83 Predicting Climatic Parameters Using the ARIMA Time Series and LSTM Deep Learning Models for Vidarbha Region Click Here
84 A hybrid clustering based collaborative filtering (cf) approach Click Here
85 CBIR using saliency mapping and sift algorithm Click Here
86 An empirical evaluation of optimization parameters in xml parsing for performance enhancement Click Here
87 Analysis of Query Using Join and Semi-join Click Here
88 Mosix the Operating System that Support Multiple Cluster Environment with its Advancements & Features Click Here
89 Extracting Spread-Spectrum Hidden Data from an Image Click Here
90 A Comparative Study of XML Parsers across Application Click Here
91 Flexible, Trusted and Private Personal Storage System in cloud computing Click Here
92 Query Optimization in OODBMS using Query Decomposition and Query Caching Click Here
93 Query Optimization In Distributed Database System Click Here
94 A Review of Clinical Queries for Electronic Health Record. Click Here
95 Performance Evaluation of Network on Chip Architecture using NS-2. Click Here
96 Performance Evaluation of Machine and Deep Transfer Learning Techniques for the Classification of Alzheimer Disease Using MRI Images Click Here
97 Prediction of nMAG in PMIPv6 with the Help of MN Positions Click Here
98 Removal of Unnecessary Files using Predictive Data Mining Method Click Here
99 Secure Electronic Health Record Storage System Using Attribute Based Encryption Technique Click Here
100 An Analysis of Security and Privacy in Cloud Based Electronic Health Record Systems Click Here
101 Bio-metric authentication using non-expanded inverted share image visual cryptography Click Here
102 Efficient Data Embedding and Data Encryption in video Stream Click Here
103 Data Hiding in Video Stream by Efficient Data Embedding Click Here
104 Enhancement of Hybrid Tagger by using Rule Based Approach Click Here
105 Identification of Deleterious SNPs in TACR1 Gene Using Genetic Algorithm Click Here
106 A Sem-link Classifier for Web Document Clustering. Click Here
107 The Advantages of Elliptic Curve Cryptography for Security in Wireless Ad Hoc Network. Click Here
108 Integrated Development Environment for generation of middleware for hybrid processors based embedded systems Click Here
109 Sustainable Computing Click Here
110 A FRAMEWORK FOR KNOWLEDGE REPRESENTATION OF INFORMATION SYSTEM Click Here
111 Reviews on Authoring tools Click Here
112 A Secure Database by using SAD Algorithm Click Here
113 CLOUD COMPUTING Click Here
114 Programmer Protocol for Identification and Defense of Latest Web Application Security Threats using Open Source Tools Click Here
115 Study on Various Cloud Storage Systems Click Here
116 CSI Report: WTISD-2012: World Telecommunication and Information Society Day Click Here
117 Vector Space Model in Clustering Web Documents. Click Here
118 Optimization of Data Streaming Inputs Using Miner Algorithms Click Here
119 QUERY TRANSLATION FROM SQL-XML ENVIRONMENT Click Here
120 ISSUES IN CACHING TECHNIQUES TO IMPROVE SYSTEM PERFORMANCE IN CHIP MULTIPROCESSORS Click Here
121 Performance issues of real time Kernels Click Here
122 Fuzzy Clustering in Web Content Mining Click Here
123 Fuzzy Clustering in Web Content Mining Click Here
124 Camera calibration Using Receptive fields Click Here
125 SY Amdani GR Bamnote HR Deshmukh SA Bhura Click Here
126 Dynamic Approach for CPU Scheduling in Real Time Database Click Here
127 TECHNIQUES FOR EFFICIENTLY SERVING DATA AND DYNAMIC DATA AT WEBSERVERS USING INTERNET AND INTRANET TECHNOLOGY Click Here
128 KA SNOVER and MD COOPER, Upper limits for isospin-forbidden?,-decays of T~ 2 in 2 Ne..... A2~(1976) McDONALD, AB, see COSTA A2~(1976) 2 Click Here
129 An Anglo-Saxon Reader: Edited, with Notes, a Complete Glossary, a Chapter on Versification, and an Outline of Anglo-saxon Grammar Click Here
130 Various Privacy and Security Issues in Online Social Networks Click Here
131 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)| 978-1-6654-7224-1/22/$31.00© 2022 IEEE| DOI: 10.1109/CCiCT56684. 2022 … Click Here
132 Review Paper on Crop Yield Recommendation System Click Here
133 Predication of Students Performance Using Data Mining Click Here
134 Need of Boosted GMM in Speech Emotion Recognition System Implemented Using Gaussian Mixture Model Click Here
135 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Click Here
136 Querying XML Document using Relational Database System: A Survey Click Here
137 Application of Feature Descriptors For Remote Sensing Image Retrieval Click Here
138 An Efficient Approach to Encrypted Cloud Database Click Here
139 Knowledge Sharing in Collaborative Environment Click Here
140 Authentication Using Palmprint Click Here
141 A Review on Feature Descriptors for Remote Sensing Image Retrieval Click Here
142 Acharya, Anal 567 Achuthan, Krishnashree 429, 495 Addanki, P. 823 Agrawal, Rishabh 659 Click Here
143 Clustering Technique in Data Mining Click Here
144 Design of Optimization in Object–Oriented Queries Click Here
145 Web Mining: Knowledge Discovery on the Web Click Here
146 Implementation of Optimization in Object-Oriented Queries Click Here
147 ICCUBEA 2015 Click Here
148 Framework for Multi-Task Scheduling in Distributed Systems using Mobil Agent Click Here
149 2D Approach for CPU Scheduling in Real Time Database System Click Here
150 Furtherance of Elliptic Curve Cryptography Algorithm in the field of GSM security Click Here
151 EFFECTIVE IMPLEMENTATION OF QUERY OPTIMIZATION THROUGH PERFORMANCE TUNING TECHNIQUES ON WEB Click Here
152 Optimization for a Distributed Query Click Here
153 Selectivity Evaluation in Distributed Database Query Operations: Static vs Dynamic Techniques Click Here
154 Dynamic Estimation of Intermediate Fragment Size in a Distributed Database Query Click Here
155 An Efficient on Demand Load Sharing Routing Protocol for Ad Hoc Networks using RSS with Cross Layer Design Click Here
156 Prediction of the Blood Glucose Metabolism in Diabetic Patients Using a Neural Network Click Here
157 Predicting Medical Diseases Using Data Mining Click Here
158 Last Date of Paper Submission is 30 November, 2018 Authors can directly submit your research paper to editor@ ijritcc. org Authors can request for fast publicaton, So that … Click Here
159 DESIGN OF FILE SYSTEM ARCHITECTURE WITH CLUSTER FORMATION ALONG WITH MOUNT TABLE Click Here
160 on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 Click Here
161 WIGIG-The Wireless Technology Click Here
163 International Journal Technology & R Click Here
164 no. Paper-ID Click Here
165 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Click Here
166 Review on Various Application of Cloud computing in Agriculture sector Agriculture sector Click Here
167 A Survey on Feature Mining In Customer Reviews Using Soft Computing Click Here
168 EFFICIENT CACHE PARTITIONING TECHNIQUE FOR CHIP MULTIPROCESSORS Click Here
169 Network Security Using Multiserver Authentication Network Security Using Multiserver Authentication Click Here
170 Enhancing Retrieval Accuracy using Voting Annotation Technique via “K-Means Algorithm” Click Here
171 Access to Encrypted Data in Cloud Database Click Here
172 Performance Enhancement of XML Parsing By Using Artificial Neural Network Click Here
Sr.No Portfolio Name Start Date End Date
1 Implementing and Evaluating Collaborative Filtering (CF) Using Clustering 2013-08-15 2013-08-15
2 Senate Member, Sant Gadge Baba Amravati University, Amravati 2005-09-01 08/31/2010
3 Member Board of studies. 2007-09-01 Till date
4 Head, Department of Computer Science & Engineering 2009-04-30 07/30/2015
5 Head (Additional Charge) , Department of MCA 2010-08-06 09/26/2011
6 Coordinator College Time Table 1995-07-01 06/30/2001
7 Hostel Warden 1990-08-08 04/31/1994
8 Course Coordinator M.E. (Part Time) CSE 1998-12-01 04/30/2009