Vijaya Sagvekar - Academia.edu (original) (raw)

Papers by Vijaya Sagvekar

Research paper thumbnail of A Paper Study On Cloud Enabled File Synchronizer

Global Journal of Engineering, Design & Technology, 2014

The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.

Research paper thumbnail of An Efficient Technique for Preventing Cooperative Blackhole Attack in Manet Using Aodv Protocol

A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better security and better performance in terms of packet delivery using CBPT in the presence of black hole with affordable delay and overhead.

Research paper thumbnail of Opinion identification from web documents

International Journal of Management, IT, and Engineering, 2014

Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a particular information and it gives the best results for the precise search by giving a mined search links.

Research paper thumbnail of A Systematic Approach for the Prediction of Personality Based on Attention Enhanced GCNN and LSTM Approach

2023 2nd International Conference on Edge Computing and Applications (ICECAA)

Research paper thumbnail of Enhancement of Back off Algorithm in CSMA/CA

Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastr... more Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this report, firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multihop networks and various techniques that have been proposed to enhance the channel utilization of wireless networks. Index Terms---medium access control ( MAC),mobile ad hoc networks (MANETs), quality of service (QoS),fairness, energy-efficiency. I.

Research paper thumbnail of Opinion identification from web documents

International Journal of Management, IT, and Engineering, 2014

Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a...

Research paper thumbnail of Performance assessment of CLARANS: A Method for Clustering Objects for Spatial Data Mining

Spatial data mining is the discovery of interesting relationships and characteristics that may ex... more Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. To this end, this paper has three main contributions. First, a new clustering method called CLARANS, whose aim is to identify spatial structures that may be present in the data. Experimental results indicate that, when compared with existing clustering methods, CLARANS is very efficient and effective. Second, investigate how CLARANS can handle not only points objects, but also polygon objects efficiently. One of the methods considered, called the IR-approximation, is very efficient in clustering convex and nonconvex polygon objects. Third, building on top of CLARANS, develop two spatial data mining algorithms that aim to discover relationships between spatial and nonspatial attributes. Both algorithms can discover knowledge that is difficult to find with existing spatial data mining algorithms.

Research paper thumbnail of A Paper Study On Cloud Enabled File Synchronizer

The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.

Research paper thumbnail of A Study Paper on Detecting Spam Zombies

International Journal of Innovative Research in Computer and Communication Engineering, 2015

In this paper we aim to detect the compromised machines in a network that are involved in the spa... more In this paper we aim to detect the compromised machines in a network that are involved in the spamming activities, widely known as spam zombies. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machine, we develop a spam zombie detection system named SPOT by keeping track of outgoing messages in a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test (SPRT), which has bounded false positive and false negative error rates.

Research paper thumbnail of Study on Product Opinion Analysis for Customer Satisfaction on E-Commerce Websites

Recent Trends in Intensive Computing, 2021

The E-commerce websites have been emerged in a high range of marketing benefits for the users to ... more The E-commerce websites have been emerged in a high range of marketing benefits for the users to publish or share the experience of the received product by posting review that contain useful comments, opinions and feedback on the product. These days, a large number of clients acquire freedoms to look at comparative items in online sites and pick their top choices in computerized retailers, like Amazon.com and Taobao.com. Client audits in online media and electronic trade Websites contain important electronic word data of items. Sentiment Analysis is broadly applied as voice of clients for applications that target showcasing and client care. Sentiment extractors in their most essential structure classify messages as either having a good or negative or once in a while neutral supposition. A typical application of sentiment investigation is the programmed assurance of whether an online review contains a positive or negative review. Subsequently, in this paper, with the use of the strat...

Research paper thumbnail of Enhancement of Back-off Algorithm in CSMA/CA: A Study

International journal of engineering research and technology, 2018

Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is u... more Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this paper , firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multi-hop networks and various techniques that have been proposed to enhance the channel utilization of wireless

Research paper thumbnail of An Efficient Technique for Preventingcooperative Blackhole Attack Inmanet Using Aodv Protocol

International Journal of Innovative Research in Computer and Communication Engineering, 2013

A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better se...

Research paper thumbnail of A Paper Study On Cloud Enabled File Synchronizer

Global Journal of Engineering, Design & Technology, 2014

The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.

Research paper thumbnail of An Efficient Technique for Preventing Cooperative Blackhole Attack in Manet Using Aodv Protocol

A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better security and better performance in terms of packet delivery using CBPT in the presence of black hole with affordable delay and overhead.

Research paper thumbnail of Opinion identification from web documents

International Journal of Management, IT, and Engineering, 2014

Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a particular information and it gives the best results for the precise search by giving a mined search links.

Research paper thumbnail of A Systematic Approach for the Prediction of Personality Based on Attention Enhanced GCNN and LSTM Approach

2023 2nd International Conference on Edge Computing and Applications (ICECAA)

Research paper thumbnail of Enhancement of Back off Algorithm in CSMA/CA

Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastr... more Abstract-- Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this report, firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multihop networks and various techniques that have been proposed to enhance the channel utilization of wireless networks. Index Terms---medium access control ( MAC),mobile ad hoc networks (MANETs), quality of service (QoS),fairness, energy-efficiency. I.

Research paper thumbnail of Opinion identification from web documents

International Journal of Management, IT, and Engineering, 2014

Generally, search engine retrieves the information using PageRank, Distance vector algorithm, cra... more Generally, search engine retrieves the information using PageRank, Distance vector algorithm, crawling, etc. on the basis of the user's query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user's query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’ which is based on the concept of user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search results. It takes an opinion from the user on the results given by search engine in different web documents. in response to the user's multiple queries by downloading the pages in background, which saves the user's time of searching a...

Research paper thumbnail of Performance assessment of CLARANS: A Method for Clustering Objects for Spatial Data Mining

Spatial data mining is the discovery of interesting relationships and characteristics that may ex... more Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. To this end, this paper has three main contributions. First, a new clustering method called CLARANS, whose aim is to identify spatial structures that may be present in the data. Experimental results indicate that, when compared with existing clustering methods, CLARANS is very efficient and effective. Second, investigate how CLARANS can handle not only points objects, but also polygon objects efficiently. One of the methods considered, called the IR-approximation, is very efficient in clustering convex and nonconvex polygon objects. Third, building on top of CLARANS, develop two spatial data mining algorithms that aim to discover relationships between spatial and nonspatial attributes. Both algorithms can discover knowledge that is difficult to find with existing spatial data mining algorithms.

Research paper thumbnail of A Paper Study On Cloud Enabled File Synchronizer

The power of internet, distributed files system and information of personal data gain a supreme-i... more The power of internet, distributed files system and information of personal data gain a supreme-importance in current era in result of which the number of user –managed devices continues to increase and the need for synchronizing multiple file hierarchies distributed over devices with ad hoc connectivity is becoming a significant important issue. In this project paper ,here presenting a built with efficient cloud based synchronization of any arbitrary number of distributed file system across the mobile devices. The different types of files can be effectively upload and sync with no human intervention efforts. This paper concern with many issues with distributed mobile based connecting file devices.

Research paper thumbnail of A Study Paper on Detecting Spam Zombies

International Journal of Innovative Research in Computer and Communication Engineering, 2015

In this paper we aim to detect the compromised machines in a network that are involved in the spa... more In this paper we aim to detect the compromised machines in a network that are involved in the spamming activities, widely known as spam zombies. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machine, we develop a spam zombie detection system named SPOT by keeping track of outgoing messages in a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test (SPRT), which has bounded false positive and false negative error rates.

Research paper thumbnail of Study on Product Opinion Analysis for Customer Satisfaction on E-Commerce Websites

Recent Trends in Intensive Computing, 2021

The E-commerce websites have been emerged in a high range of marketing benefits for the users to ... more The E-commerce websites have been emerged in a high range of marketing benefits for the users to publish or share the experience of the received product by posting review that contain useful comments, opinions and feedback on the product. These days, a large number of clients acquire freedoms to look at comparative items in online sites and pick their top choices in computerized retailers, like Amazon.com and Taobao.com. Client audits in online media and electronic trade Websites contain important electronic word data of items. Sentiment Analysis is broadly applied as voice of clients for applications that target showcasing and client care. Sentiment extractors in their most essential structure classify messages as either having a good or negative or once in a while neutral supposition. A typical application of sentiment investigation is the programmed assurance of whether an online review contains a positive or negative review. Subsequently, in this paper, with the use of the strat...

Research paper thumbnail of Enhancement of Back-off Algorithm in CSMA/CA: A Study

International journal of engineering research and technology, 2018

Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is u... more Mobile ad hoc networks (MANETs) are useful in environment where fixed network infrastructure is unavailable. To function normally, MANETs demand an efficient and distributed medium access control (MAC) protocol. However, characteristics of MANETs such as radio link vulnerability, mobility, limited power pose great challenges on MAC design. Through this paper , firstly identifying the challenges that are facing MAC in MANETs. Then presenting discussion on the problems with IEEE 802.11, especially those relevant in a singlehop and multi-hop networks and various techniques that have been proposed to enhance the channel utilization of wireless

Research paper thumbnail of An Efficient Technique for Preventingcooperative Blackhole Attack Inmanet Using Aodv Protocol

International Journal of Innovative Research in Computer and Communication Engineering, 2013

A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile device... more A mobile ad-hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. As there is no fixed infrastructure in MANET, mobile nodes need to communicate with each other by exchanging control and data packets to provide assured functionality to the network. For making communication possible in MANET, different routing protocols are used. Ad-hoc On demand Distance Vector (AODV) protocol is the principle routing protocol used in MANET. The AODV protocol is threaded by a security problem called cooperative black hole attack, in which all malicious nodes introduces themselves as having shortest path to the destination node. In this paper an approach has been proposed to prevent cooperative black hole attack using cooperative black hole prevention technique (CBPT). It works on the concept of using Three_Hop_Away_Information_Table (THAIT) and three routes from Source to three_hop_away node. The goal of this paper is to provide better se...