Vijaya Sagvekar - Academia.edu (original) (raw)
Papers by Vijaya Sagvekar
Global Journal of Engineering, Design & Technology, 2014
The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.
A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better security and better performance in terms of packet delivery using CBPT in the presence of black hole with affordable delay and overhead.
International Journal of Management, IT, and Engineering, 2014
Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a particular information and it gives the best results for the precise search by giving a mined search links.
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastr... more Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this report, firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multihop networks and various techniques that have been proposed to enhance the channel utilization of wireless networks. Index Terms---medium access control ( MAC),mobile ad hoc networks (MANETs), quality of service (QoS),fairness, energy-efficiency. I.
International Journal of Management, IT, and Engineering, 2014
Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a...
Spatial data mining is the discovery of interesting relationships and characteristics that may ex... more Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. To this end, this paper has three main contributions. First, a new clustering method called CLARANS, whose aim is to identify spatial structures that may be present in the data. Experimental results indicate that, when compared with existing clustering methods, CLARANS is very efficient and effective. Second, investigate how CLARANS can handle not only points objects, but also polygon objects efficiently. One of the methods considered, called the IR-approximation, is very efficient in clustering convex and nonconvex polygon objects. Third, building on top of CLARANS, develop two spatial data mining algorithms that aim to discover relationships between spatial and nonspatial attributes. Both algorithms can discover knowledge that is difficult to find with existing spatial data mining algorithms.
The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.
International Journal of Innovative Research in Computer and Communication Engineering, 2015
In this paper we aim to detect the compromised machines in a network that are involved in the spa... more In this paper we aim to detect the compromised machines in a network that are involved in the spamming activities, widely known as spam zombies. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machine, we develop a spam zombie detection system named SPOT by keeping track of outgoing messages in a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test (SPRT), which has bounded false positive and false negative error rates.
Recent Trends in Intensive Computing, 2021
The E-commerce websites have been emerged in a high range of marketing benefits for the users to ... more The E-commerce websites have been emerged in a high range of marketing benefits for the users to publish or share the experience of the received product by posting review that contain useful comments, opinions and feedback on the product. These days, a large number of clients acquire freedoms to look at comparative items in online sites and pick their top choices in computerized retailers, like Amazon.com and Taobao.com. Client audits in online media and electronic trade Websites contain important electronic word data of items. Sentiment Analysis is broadly applied as voice of clients for applications that target showcasing and client care. Sentiment extractors in their most essential structure classify messages as either having a good or negative or once in a while neutral supposition. A typical application of sentiment investigation is the programmed assurance of whether an online review contains a positive or negative review. Subsequently, in this paper, with the use of the strat...
International journal of engineering research and technology, 2018
Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is u... more Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this paper , firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multi-hop networks and various techniques that have been proposed to enhance the channel utilization of wireless
International Journal of Innovative Research in Computer and Communication Engineering, 2013
A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better se...
Global Journal of Engineering, Design & Technology, 2014
The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.
A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better security and better performance in terms of packet delivery using CBPT in the presence of black hole with affordable delay and overhead.
International Journal of Management, IT, and Engineering, 2014
Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a particular information and it gives the best results for the precise search by giving a mined search links.
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastr... more Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this report, firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multihop networks and various techniques that have been proposed to enhance the channel utilization of wireless networks. Index Terms---medium access control ( MAC),mobile ad hoc networks (MANETs), quality of service (QoS),fairness, energy-efficiency. I.
International Journal of Management, IT, and Engineering, 2014
Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a...
Spatial data mining is the discovery of interesting relationships and characteristics that may ex... more Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. To this end, this paper has three main contributions. First, a new clustering method called CLARANS, whose aim is to identify spatial structures that may be present in the data. Experimental results indicate that, when compared with existing clustering methods, CLARANS is very efficient and effective. Second, investigate how CLARANS can handle not only points objects, but also polygon objects efficiently. One of the methods considered, called the IR-approximation, is very efficient in clustering convex and nonconvex polygon objects. Third, building on top of CLARANS, develop two spatial data mining algorithms that aim to discover relationships between spatial and nonspatial attributes. Both algorithms can discover knowledge that is difficult to find with existing spatial data mining algorithms.
The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.
International Journal of Innovative Research in Computer and Communication Engineering, 2015
In this paper we aim to detect the compromised machines in a network that are involved in the spa... more In this paper we aim to detect the compromised machines in a network that are involved in the spamming activities, widely known as spam zombies. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machine, we develop a spam zombie detection system named SPOT by keeping track of outgoing messages in a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test (SPRT), which has bounded false positive and false negative error rates.
Recent Trends in Intensive Computing, 2021
The E-commerce websites have been emerged in a high range of marketing benefits for the users to ... more The E-commerce websites have been emerged in a high range of marketing benefits for the users to publish or share the experience of the received product by posting review that contain useful comments, opinions and feedback on the product. These days, a large number of clients acquire freedoms to look at comparative items in online sites and pick their top choices in computerized retailers, like Amazon.com and Taobao.com. Client audits in online media and electronic trade Websites contain important electronic word data of items. Sentiment Analysis is broadly applied as voice of clients for applications that target showcasing and client care. Sentiment extractors in their most essential structure classify messages as either having a good or negative or once in a while neutral supposition. A typical application of sentiment investigation is the programmed assurance of whether an online review contains a positive or negative review. Subsequently, in this paper, with the use of the strat...
International journal of engineering research and technology, 2018
Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is u... more Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this paper , firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multi-hop networks and various techniques that have been proposed to enhance the channel utilization of wireless
International Journal of Innovative Research in Computer and Communication Engineering, 2013
A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better se...