| SR NO | NAME | PROJECT TITLE |
| 1 | Heena Chopade | Hybrid auto text summarization |
| 2 | Prajakta Kamble | Efficent of privacy Preserving access to sensor data for IOT |
| 3 | Pankaj Rathod | Improvising Personalised Web Search Using Hybrid Approach. |
| 4 | Pratik Shah | Trajectory Clustering Algorithm for large Datasets |
| 5 | Sofia Biju | Improving the lifetime of 6LoWPAN based WSN using Fuzzy logic clustering |
| 6 | Ashish Taldeokar | Analysing opinion of trading expert to predict behaviour of stock market using machine learning |
| SR NO | NAME | DESSERTATION TITLE |
| 1 | ALMEIDA JOYLINA MICHAEL | Improvising the query processing method in broadcast database system |
| 2 | BRAHMBHATT NIKUL KRUSHNAKANT | Predicting location of users in mobile environment |
| 3 | CHORGHE SHARVARI PRAKASH | Antiphishing mechanism for Android phones |
| 4 | D'BRITTO MAMTA PETER | Design a smart and intelligent interface for physically disabled |
| 5 | GONSALVES ANCY IGNATIUS | Processing of queries in distributed mobile system |
| 6 | GUPTA ABHAYKUMAR LAXMINARAYAN | Efficient energy management of a wireless sensor network for increased network lifetime |
| 7 | HALDANKAR AKASH NEELESH | A cost sensitive classifier for Big data |
| 8 | KADIWAL SANIF BAHADUR | Wearable wireless real time monitoring device for anywhere,anytime health |
| 9 | KHAN FARIHA IRFAN | Real time dynamic routing for waste management using IoT for cost effiecient service |
| 10 | LEMOS JOYCE YOSEPH | Design a smart and intelligent routing network using optimization technique |
| 11 | MULANI HUDA ABDUL REHMAN | Environmental monitoring using IoT |
| 12 | NAIK KIRTIDA SUBHASH | Design a smart model for analyzing data from social media to gain competitive |
| 13 | NAYAK SNEHAL RAMKRISHNA | Location Estimation using range search |
| 14 | PRABHU GAURAV PANDURANG | Improvised query processing plan |
| 15 | RANE SUCHITA SAKHARAM | 3D Socio graphical CAPTCHA based on ReCAPTCHA (SGreCAPTCHA) against spammers and Bot |
| 16 | SAYED TANZILA RAJ MOHAMMED | An hybrid approach to detect phished emails |
| 17 | SHAIKH SAUBIYA AHMED S. | Cued click Authentication |
| 18 | SHUKLA PRATYUSHA ASHOKKUMAR | Analysis of Ensemble methods for classification of imbalanced datasets |
| SR NO | NAME | DESSERTATION TITLE |
| 1 | Harshal Dalvi | Trustworthiness Evaluation System in E-commerce Context |
| 2 | Chirag Desai | Prevention of session Hijacking Attack using Enhanced session binding techniques. |
| 3 | Krishna kansara | Security Against Sybil Attack in Social Network |
| 4 | Bansi kantariya | Security protocol for wireless sensor network to prevent node cloning attack. |
| 5 | Apurva Kulkarni | Coherent Rule Mining using AIR |
| 6 | Neha Mendjoge | INTELLIGENT TUTORING SYSTEM FOR DATABASE NORMALIZATION |
| 7 | Lakshmi Mohandas | INTELLIGENT TUTORING SYSTEM FOR LEARNING ENGLISH PUNCTUATION |
| 8 | Heena Mukadam | Enhanced Data Dissemination In A Mobile Environment |
| 9 | Nilambari Narkar | Malicious web crawler detection using intrusion detection system |
| 10 | Ashok Patade | Novel architecture for analysis of mobile botnet detection using Machine Learning for Android. |
| SR NO | NAME | DESSERTATION TITLE |
| 1 | AMBRE AMRUTA | Insider threat detection using Log Analysis and Event Correlation |
| 2 | DESAI DARSHANA | A deviant load shedding system for data stream mining |
| 3 | DESAI VAISHALI | Performance evaluation of olsr protocol in MANET under the influence of routing attack |
| 4 | DEULKAR KHUSHALI | An Improved Memetic Algorithm For Web Mining. |
| 5 | FARGOSE PRIYANCA | Enhancing Accuracy of Weather Forecasting |
| 6 | KALE ASHWINI | A Predictive Analysis: For Local Businesses in India |
| 7 | KANERE KETAN | Real time messaging server using duplex web service |
| 8 | MAIN WINNIE | Twitterati identification system using a novel mining approach |
| 9 | MEHTA BHAVDEEP | A Novel Hybrid Approach for Web Content Extraction. |
| 10 | MODI HIRAL | Enhancement Of Online Web Recommendation System Using A Hybrid Clustering And Pattern Matching Approach |
| 11 | NAIK SWAPNA | Conservation of energy by prevention of denial_of_sleep attack in WSN,Blocking of rogue nodes by secure authentication in wireles sensor network |
| 12 | NANDU POOJA | An Enhanced Authentication Mechanism to Secure Reprograming in WSN |
| 13 | PATEL NENCY | Implementation of Pattern matching algorithm to defend SQLIA |
| 14 | RANADE APARNA | |
| 15 | SHAH CHINTAN | |
| 16 | SHAIKH SAKINA | predicitng users web navigation behavior using hybrid approach |
| 17 | SYED SHAFAQUE FATMA | An optimized algorithm for association rule mining using fp tree |