Trulli Trulli Trulli Trulli


Welcome to the Department of Computer Engineering




Name : Dr. Lata Ragha
Qualification : Ph.D
Designation : Prof. & Dean Students Affairs and Alumni
Email id : lata.ragha@fcrit.ac.in
Date of joining : 21 December 2016


1. Computer Networks and Security

2. Routing Protocols

3. Data Mining

4. Parallel and distributed computing

5. System/Information Security

UG Subjects


Sr no Subject Semester
1 Computer Graphics IV
2 Computer Networks V
3 System Programming and Compiler Construction VI
4 Computer Simulation and Modelling VII
5 Cryptography and System Security VII
6 Adhoc Wireless Networks (Elective) VIII
7 Parallel and Distributed Computing VIII

PG Subjects


Sr no Subject Semester
1 Advanced Computing and Network Design I
2 Parallel Computing I
3 Object Oriented Analysis and Design I
4 Advanced Database Systems II
Sr No Title Description
1A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network
ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.
2Enrich Security in MANET by Avoiding Wormhole Attack
International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).
3A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network
4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore
4Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey
International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.
5Session Management in Internet Services using Continuous Authentication
International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.
6An Efficient Searching Technique for Mobile Cloud on Encrypted Data
International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.
7An Efficient Searching Technique for Mobile Cloud on Encrypted Data
International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.
8Session Management using Continuous Authentication in Internet Services: A Survey
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.
9Avoidance of Co-operative black hole attack in AODV in MANET
IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.
10Expectation based Aggressor Recognizable proof in MANET
IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore
11Session Passwords Using Three Level Authentication System
International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29
12Supervised Web Forum Crawling
International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.
13Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET
IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore
14A Review of Web Forum Crawling Techniques
International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015
15Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems
International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015
16Performance Evaluation of Decision Trees for Uncertain Data Mining
International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014
17Secure AODV against Control Packet Dropping Attack
2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015
18Tree Based Routing Mechanism for MANET
2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015
19A Survey on Routing Protocols in Wireless Sensor Networks
International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul
20Web Structure Mining Using Breadth First Search with Page Rank
International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul
21Bigdata Analysis Using Columnar Database
International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul
22Secure Routing against Control Packet Dropping Attack
International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.
23Feature and Opinion Identification for Online Digital Camera Reviews
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.
24A Genetic Approach for processor Scheduling
IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.
25Detecting and Avoiding Black Hole Attack in the MANETs
International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat
26Dynamic Quantum based Genetic Round Robin Algorithm
International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.
27Decision Trees for Uncertain Data Mining
International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.
28Clustering in Cloud Computing Environment
International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.
29FITM: FEROM Informal Text Mining
International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.
30Personalized Image Search Optimization
International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.
31Forensic sketch-Photo Matching using LFDA
International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.
32Hybrid approach for credit card fraud detection
International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.
33Forensic sketch to Mugshot Photo Matching
International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.
34Change Detection In satellite Images using DWT and PCA
International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.
35Recognition on Road Vehicle Based on EDA
International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013
36Survey on Estimation of Distribution Algorithm Techniques
International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013
37Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.
38 Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis
Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.
39Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay
International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.
40Change Detection in Satellite Images Using PCA and K-means Clustering
International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013.
413D-Deformable Model Based Recognition and Labeling on Road Vehicle
International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013.
42Security Enabled DSR for Establishing Symmetric Key and Security in MANETS
Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore
43Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis
World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore
44Cooperative Security Agents for MANET
World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore
45Hybrid Approach for DB Intrusion Detection with Reactive Policies
IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore
46Privacy Preserving in Data Mining Using Hybrid Approach
IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore
47A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack
4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET
48Comparing performance of Collaborative Filtering Algorithms
International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.
49Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm
International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.
50Incremental Frequent Pattern Mining
International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012
51Detection of phishing email using textual and lexical URL analysis
International Conference on Computer Science and Information Technology, pp.105-110, July 2012.
52Review of Incremental Association Rule Mining Algorithms
IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.
53Association Rule Mining Using Graph and Clustering Technique
Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012
54Security in MANETs using Symmetric Keys – A New Approach
International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012
55Security in MANETs using Symmetric Keys – A New Approach
International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881,
56Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs
International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.
57Hybrid Reactive Database Intrusion Detection System
International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366
58Need base Security with IDRS for Cloud Computing
International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366
59Data Integrity and Confidentiality in Outsourced Database
ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012
60Integrity and Confidentiality of character query in Outsourced Database
National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India
61Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol
5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.
62A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack
World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.
63User Trust Based Collaborative Filtering Algorithm for Recommendation System
International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.
64Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm
International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.
65A Flooding Based Distributed Denial of Service Attack Defense Mechanism
International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.
66Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol
International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.
67Multilevel Multidimensional Trust Model for Group based Applications
International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.
68Identification of New Approach for Runtime Enforcement of Web Service Security
International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.
69Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System
International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2.
70Dynamic enforcement of web service security
National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.
71Detecting Malicious Dropping Attack in the Internet
International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011
72An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word
International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.
73Malicious Dropping Attack in the Internet: Impacts and Solution
International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.
74Multiple Route Selector BGP (MRS-BGP)
International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.
75Multipath Routing in the Internet
International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.
76Performance Improvement of Selective Unidirectional Links in Cluster Based Routing
International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.
77Proactive Approach for Dynamic Source Routing Protocol
International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.
78Comparative Study of CSS and YASS Stemming Algorithms
National Conference, EC2IT-09, KJSCE, 20-21, March, 2009
79Hybrid Approach for Optimal Design of Distributed Database System
National Conference, EC2IT-09, KJSCE, 20-21, March, 2009
80Different Approaches to Classify Threaten E-Mails
National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009
81Enhanced Cluster based Routing with Unilinks
National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India.
82Performance Improvement in CBR using Selective Unidirectional Link
International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India
83User Agent Based Heterogeneous Distributed Database System
International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008
84Comparative Study of Secure Internet Routing Protocols
National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai
85Enhanced BGP Routing for Network Engineering
National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai
86An Enhanced Fault-Tolerant Routing Protocol in the Internet
National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai
87Multi-Agents in Knowledge Management Systems
International Conference on Advances in Computing, February 21-22, 2008, Chikhli,
88Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs
SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online
89KONCERN - Hand Gesture Recognition System For Physically Impaired
International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India.
90Security Issues in an Adhoc Networks
National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai
91KONCERN-Hand Gesture Recognition System For Physically Impaired
National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai
92Wireless Sensor Networks
National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai.
93BIOMETRICS – IRIS RECOGNITION
National Conference, SFIT, 4-6 Jan-2007, Mumbai.
Sr No Name of Research Project Type of Grant Name of funding Organization Amount (Rs.) Duration
1 M-Vision Minor University of Mumbai Rs. 35000/- 2018-19

Fr. C. Rodrigues Institute of Technology

Agnel Technical Education Complex
Sector 9-A, Vashi, Navi Mumbai,
Maharashtra, India
PIN - 400703

  • (022) 27661924 , 27660619, 27660714, 27660715
  • (022) 27660619
  • principal@fcrit.ac.in


Sitemap

 

Visitors Count

web counter
Trulli Trulli Trulli Trulli

©FCRIT, Vashi. All rights reserved.

This website is best viewed in Chrome and Mozilla Firefox in 1366x768 screen resolution.

Developer Team