Professor & Principal
Operating Systems, Computer Networks, Computer Network & Internet, Computer Communication Networks, Data Communications, Assembly language Programming, Computer Graphics, Multimedia Technologies, Switching Theory & Logic Design, Computer Architecture
34 Year
0 Year
Computer Networks, Data Mining, Databases, Operating System
National :59, International : 154
Computer Science & Engineering
E-mail.: grbamnote@mitra.ac.in Mob. No.: 9421741516
| Sr.No | Paper Name | Paper Link |
|---|---|---|
| 1 | Implementing and Evaluating Collaborative Filtering (CF) Using Clustering | Click Here |
| 2 | Collaborative Filtering Implementation and Evaluation Using Clustering | Click Here |
| 3 | A Hybrid Clustering Based Collaborative Filtering (CF) Approach | Click Here |
| 4 | Enhancement of Hybrid Tagger by using Rule Based Approach†Paper Accepted for Oral Presentation & Publication in Proceedings in n ACM - International Conference Proceedings Series (ICPS) ISBN Number by ACM - ICPS for Proceeding Volume: 978-1-4503-396 | Click Here |
| 5 | Natural Language based Self Learning feedback Analysis System†Paper Accepted for Oral Presentation & Publication in Proceedings of the Second International Conference on Computer and Communication Technologies, Advances in Intelligent Systems and Comp | Click Here |
| 6 | Evaluating and Implementing Collaborative Filtering Systems Using Apache Mahout | Click Here |
| 7 | Efficient Binary Classifier for Prediction of Diabetes using Data Pre-processing and Support Vector Machine†, Presented and Published in the Proceedings of FICTA 2014: Springer-Advances of Intelligent Systems and Computing Vol. 327, ISBN No: 978-3-319- | Click Here |
| 8 | Design of Classifier for Detection of Diabetes Mellitus using Genetic Programming†Presented and Published in the Proceedings of FICTA 2014: Springer-Advances of Intelligent Systems and Computing Vol. 327, ISBN No: 978-3-319-1933-5, Nov 2014. | Click Here |
| 9 | Compact binary evolutions with the Z4c formulation | Click Here |
| 10 | Continuous and semicontinuous monitoring techniques for particulate matter mass and chemical components: A synthesis of findings from EPA’s particulate matter supersites … | Click Here |
| 11 | Mathematical modeling and control of an electrically-heated catalyst | Click Here |
| 12 | Securing peer-to-peer mobile communications using public key cryptography: New security strategy | Click Here |
| 13 | Discovering latent semantics in web documents using fuzzy clustering | Click Here |
| 14 | Credit card fraud detection using hidden Markov model | Click Here |
| 15 | A software comparison of RSA and ECC | Click Here |
| 16 | Design of classifier for detection of diabetes mellitus using genetic programming | Click Here |
| 17 | A genetic programming approach for detection of diabetes | Click Here |
| 18 | Advances in computer vision and information technology | Click Here |
| 19 | Bright's Ango-Saxon Reader | Click Here |
| 20 | Computer vision and information technology: advances and applications | Click Here |
| 21 | Evaluating and implementing collaborative filtering systems using apache mahout | Click Here |
| 22 | A novel method for clustering tweets in twitter | Click Here |
| 23 | Query optimization in object oriented databases through detecting independent subqueries | Click Here |
| 24 | Shortest path finding using a star algorithm and minimum weight node first principle | Click Here |
| 25 | Towards hybrid online on-demand querying of realtime data with stateful complex event processing | Click Here |
| 26 | A survey on energy depletion attacks in wireless sensor networks | Click Here |
| 27 | Introduction to query processing and optimization | Click Here |
| 28 | Data leakage detection and data prevention using algorithm | Click Here |
| 29 | Enhancement of GSM Security using elliptic curve cryptography algorithm | Click Here |
| 30 | Whale–crow optimization (WCO)-based optimal regression model for software cost estimation | Click Here |
| 31 | Quick interactive image search in huge databases using Content-Based image retrieval | Click Here |
| 32 | Prediction of hidden knowledge from clinical database using data mining techniques | Click Here |
| 33 | Web document clustering using fuzzy equivalence relations | Click Here |
| 34 | Multilevel haar wavelet transform and histogram usage in content based image retrieval system | Click Here |
| 35 | An Empirical Study: XML Parsing using Various Data Structures | Click Here |
| 36 | Awareness of malicious social engineering among Facebook users | Click Here |
| 37 | Query processing in distributed database through data distribution | Click Here |
| 38 | An Empirical Study of XML Parsers across Applications | Click Here |
| 39 | Super speed data traveller USB 3.0 | Click Here |
| 40 | Multilevel haar wavelet transform and histogram based relevant image retrieval system | Click Here |
| 41 | Efficient binary classifier for prediction of diabetes using data preprocessing and support vector machine | Click Here |
| 42 | Fuzzy logic based query optimization in distributed database | Click Here |
| 43 | Profiling short tandem repeats from short reads | Click Here |
| 44 | Cross site scripting: An overview | Click Here |
| 45 | An overview of character recognition focused on offline handwriting | Click Here |
| 46 | Mobile data offloading techniques and related issues | Click Here |
| 47 | DESIGN AND DEVELOPMENT OF AN EFFICIENT XML PARSING ALGORITHM: A REVIEW | Click Here |
| 48 | Overview of space-filling curves and their applications in scheduling | Click Here |
| 49 | Analysis of firewall technology in computer network security | Click Here |
| 50 | Mobile data offloading the growing need with its solutions and challenges | Click Here |
| 51 | Transforming the automotive industry with connected cars | Click Here |
| 52 | Predictive Modeling of Clinical Data using Soft Computing-Diabetes A Case Study. | Click Here |
| 53 | Query optimization of OODBMS: semantic matching of cached queries using normalization | Click Here |
| 54 | Distributed database: A survey | Click Here |
| 55 | Improving query processing performance using optimization techniques for object-oriented DBMS | Click Here |
| 56 | Identification of AIDS Disease Severity Using Genetic Algorithm | Click Here |
| 57 | Query optimization in OODBMS: identifying subquery for complex query management | Click Here |
| 58 | Optimization of Large Join Query using Heuristic Greedy Algorithm | Click Here |
| 59 | Forensic analysis algorithm: By using the tiled bitmap with audit log mechanism | Click Here |
| 60 | A novel disk scheduling algorithm in real-time database systems | Click Here |
| 61 | Mobile Agent Based Distributed System Computing in Network | Click Here |
| 62 | Cross layer design for routing in multi-hop wireless networks | Click Here |
| 63 | A novel disk scheduling approach for real-time database systems | Click Here |
| 64 | Review on Content Based Image Retrieval Using Texture and Color Features | Click Here |
| 65 | Natural language-based self-learning feedback analysis system | Click Here |
| 66 | Query optimization in object oriented DBMS: direct navigation | |
| 67 | Mobile Multimedia Traffic Analysis: Clients Can Waste Network Bandwidth | Click Here |
| 68 | An Overview to SQL Injection Attacks and its Countermeasures | Click Here |
| 69 | Mobile Device Management A Functional Overview | Click Here |
| 70 | Komparasi Algoritma Backpropagation, Nearest Neighbor Dan Desicion Tree Untuk Mendeteksi Penyakit Demam Berdarah Pada Pasien Opname | Click Here |
| 71 | Soft clustering: An overview | Click Here |
| 72 | Comparison of pre-processing and feature extraction techniques for Alzheimer detection using MRI images | Click Here |
| 73 | Role of Deep Learning in Disaster Prediction | Click Here |
| 74 | Prediction of next mobile access gateway by tracking locations of mobile node | Click Here |
| 75 | Implementing and evaluating collaborative filtering (CF) using clustering | Click Here |
| 76 | QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR QUERY MANAGEMENT | Click Here |
| 77 | Design and development of xml parser using tree-branch symbiosis algorithm-review | Click Here |
| 78 | Peer-To-Peer Ad Hoc Network: an Overview | Click Here |
| 79 | Clustering method based on fuzzy equivalence relation | Click Here |
| 80 | Query Optimization in OODBMS: Decomposition of Query and cached for Wider Query Management | Click Here |
| 81 | An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects | Click Here |
| 82 | Access of Encrypted Personal Record in Cloud | Click Here |
| 83 | Predicting Climatic Parameters Using the ARIMA Time Series and LSTM Deep Learning Models for Vidarbha Region | Click Here |
| 84 | A hybrid clustering based collaborative filtering (cf) approach | Click Here |
| 85 | CBIR using saliency mapping and sift algorithm | Click Here |
| 86 | An empirical evaluation of optimization parameters in xml parsing for performance enhancement | Click Here |
| 87 | Analysis of Query Using Join and Semi-join | Click Here |
| 88 | Mosix the Operating System that Support Multiple Cluster Environment with its Advancements & Features | Click Here |
| 89 | Extracting Spread-Spectrum Hidden Data from an Image | Click Here |
| 90 | A Comparative Study of XML Parsers across Application | Click Here |
| 91 | Flexible, Trusted and Private Personal Storage System in cloud computing | Click Here |
| 92 | Query Optimization in OODBMS using Query Decomposition and Query Caching | Click Here |
| 93 | Query Optimization In Distributed Database System | Click Here |
| 94 | A Review of Clinical Queries for Electronic Health Record. | Click Here |
| 95 | Performance Evaluation of Network on Chip Architecture using NS-2. | Click Here |
| 96 | Performance Evaluation of Machine and Deep Transfer Learning Techniques for the Classification of Alzheimer Disease Using MRI Images | Click Here |
| 97 | Prediction of nMAG in PMIPv6 with the Help of MN Positions | Click Here |
| 98 | Removal of Unnecessary Files using Predictive Data Mining Method | Click Here |
| 99 | Secure Electronic Health Record Storage System Using Attribute Based Encryption Technique | Click Here |
| 100 | An Analysis of Security and Privacy in Cloud Based Electronic Health Record Systems | Click Here |
| 101 | Bio-metric authentication using non-expanded inverted share image visual cryptography | Click Here |
| 102 | Efficient Data Embedding and Data Encryption in video Stream | Click Here |
| 103 | Data Hiding in Video Stream by Efficient Data Embedding | Click Here |
| 104 | Enhancement of Hybrid Tagger by using Rule Based Approach | Click Here |
| 105 | Identification of Deleterious SNPs in TACR1 Gene Using Genetic Algorithm | Click Here |
| 106 | A Sem-link Classifier for Web Document Clustering. | Click Here |
| 107 | The Advantages of Elliptic Curve Cryptography for Security in Wireless Ad Hoc Network. | Click Here |
| 108 | Integrated Development Environment for generation of middleware for hybrid processors based embedded systems | Click Here |
| 109 | Sustainable Computing | Click Here |
| 110 | A FRAMEWORK FOR KNOWLEDGE REPRESENTATION OF INFORMATION SYSTEM | Click Here |
| 111 | Reviews on Authoring tools | Click Here |
| 112 | A Secure Database by using SAD Algorithm | Click Here |
| 113 | CLOUD COMPUTING | Click Here |
| 114 | Programmer Protocol for Identification and Defense of Latest Web Application Security Threats using Open Source Tools | Click Here |
| 115 | Study on Various Cloud Storage Systems | Click Here |
| 116 | CSI Report: WTISD-2012: World Telecommunication and Information Society Day | Click Here |
| 117 | Vector Space Model in Clustering Web Documents. | Click Here |
| 118 | Optimization of Data Streaming Inputs Using Miner Algorithms | Click Here |
| 119 | QUERY TRANSLATION FROM SQL-XML ENVIRONMENT | Click Here |
| 120 | ISSUES IN CACHING TECHNIQUES TO IMPROVE SYSTEM PERFORMANCE IN CHIP MULTIPROCESSORS | Click Here |
| 121 | Performance issues of real time Kernels | Click Here |
| 122 | Fuzzy Clustering in Web Content Mining | Click Here |
| 123 | Fuzzy Clustering in Web Content Mining | Click Here |
| 124 | Camera calibration Using Receptive fields | Click Here |
| 125 | SY Amdani GR Bamnote HR Deshmukh SA Bhura | Click Here |
| 126 | Dynamic Approach for CPU Scheduling in Real Time Database | Click Here |
| 127 | TECHNIQUES FOR EFFICIENTLY SERVING DATA AND DYNAMIC DATA AT WEBSERVERS USING INTERNET AND INTRANET TECHNOLOGY | Click Here |
| 128 | KA SNOVER and MD COOPER, Upper limits for isospin-forbidden?,-decays of T~ 2 in 2 Ne..... A2~(1976) McDONALD, AB, see COSTA A2~(1976) 2 | Click Here |
| 129 | An Anglo-Saxon Reader: Edited, with Notes, a Complete Glossary, a Chapter on Versification, and an Outline of Anglo-saxon Grammar | Click Here |
| 130 | Various Privacy and Security Issues in Online Social Networks | Click Here |
| 131 | 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)| 978-1-6654-7224-1/22/$31.00© 2022 IEEE| DOI: 10.1109/CCiCT56684. 2022 … | Click Here |
| 132 | Review Paper on Crop Yield Recommendation System | Click Here |
| 133 | Predication of Students Performance Using Data Mining | Click Here |
| 134 | Need of Boosted GMM in Speech Emotion Recognition System Implemented Using Gaussian Mixture Model | Click Here |
| 135 | INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY | Click Here |
| 136 | Querying XML Document using Relational Database System: A Survey | Click Here |
| 137 | Application of Feature Descriptors For Remote Sensing Image Retrieval | Click Here |
| 138 | An Efficient Approach to Encrypted Cloud Database | Click Here |
| 139 | Knowledge Sharing in Collaborative Environment | Click Here |
| 140 | Authentication Using Palmprint | Click Here |
| 141 | A Review on Feature Descriptors for Remote Sensing Image Retrieval | Click Here |
| 142 | Acharya, Anal 567 Achuthan, Krishnashree 429, 495 Addanki, P. 823 Agrawal, Rishabh 659 | Click Here |
| 143 | Clustering Technique in Data Mining | Click Here |
| 144 | Design of Optimization in Object–Oriented Queries | Click Here |
| 145 | Web Mining: Knowledge Discovery on the Web | Click Here |
| 146 | Implementation of Optimization in Object-Oriented Queries | Click Here |
| 147 | ICCUBEA 2015 | Click Here |
| 148 | Framework for Multi-Task Scheduling in Distributed Systems using Mobil Agent | Click Here |
| 149 | 2D Approach for CPU Scheduling in Real Time Database System | Click Here |
| 150 | Furtherance of Elliptic Curve Cryptography Algorithm in the field of GSM security | Click Here |
| 151 | EFFECTIVE IMPLEMENTATION OF QUERY OPTIMIZATION THROUGH PERFORMANCE TUNING TECHNIQUES ON WEB | Click Here |
| 152 | Optimization for a Distributed Query | Click Here |
| 153 | Selectivity Evaluation in Distributed Database Query Operations: Static vs Dynamic Techniques | Click Here |
| 154 | Dynamic Estimation of Intermediate Fragment Size in a Distributed Database Query | Click Here |
| 155 | An Efficient on Demand Load Sharing Routing Protocol for Ad Hoc Networks using RSS with Cross Layer Design | Click Here |
| 156 | Prediction of the Blood Glucose Metabolism in Diabetic Patients Using a Neural Network | Click Here |
| 157 | Predicting Medical Diseases Using Data Mining | Click Here |
| 158 | Last Date of Paper Submission is 30 November, 2018 Authors can directly submit your research paper to editor@ ijritcc. org Authors can request for fast publicaton, So that … | Click Here |
| 159 | DESIGN OF FILE SYSTEM ARCHITECTURE WITH CLUSTER FORMATION ALONG WITH MOUNT TABLE | Click Here |
| 160 | on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 | Click Here |
| 161 | WIGIG-The Wireless Technology | Click Here |
| 163 | International Journal Technology & R | Click Here |
| 164 | no. Paper-ID | Click Here |
| 165 | INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY | Click Here |
| 166 | Review on Various Application of Cloud computing in Agriculture sector Agriculture sector | Click Here |
| 167 | A Survey on Feature Mining In Customer Reviews Using Soft Computing | Click Here |
| 168 | EFFICIENT CACHE PARTITIONING TECHNIQUE FOR CHIP MULTIPROCESSORS | Click Here |
| 169 | Network Security Using Multiserver Authentication Network Security Using Multiserver Authentication | Click Here |
| 170 | Enhancing Retrieval Accuracy using Voting Annotation Technique via “K-Means Algorithm” | Click Here |
| 171 | Access to Encrypted Data in Cloud Database | Click Here |
| 172 | Performance Enhancement of XML Parsing By Using Artificial Neural Network | Click Here |
| Sr.No | Portfolio Name | Start Date | End Date |
|---|---|---|---|
| 1 | Implementing and Evaluating Collaborative Filtering (CF) Using Clustering | 2013-08-15 | 2013-08-15 |
| 2 | Senate Member, Sant Gadge Baba Amravati University, Amravati | 2005-09-01 | 08/31/2010 |
| 3 | Member Board of studies. | 2007-09-01 | Till date |
| 4 | Head, Department of Computer Science & Engineering | 2009-04-30 | 07/30/2015 |
| 5 | Head (Additional Charge) , Department of MCA | 2010-08-06 | 09/26/2011 |
| 6 | Coordinator College Time Table | 1995-07-01 | 06/30/2001 |
| 7 | Hostel Warden | 1990-08-08 | 04/31/1994 |
| 8 | Course Coordinator M.E. (Part Time) CSE | 1998-12-01 | 04/30/2009 |