SURESH ANGADI EDUCATION FOUNDATIONS

ANGADI INSTITUTE OF TECHNOLOGY AND MANAGEMENT

Approved by AICTE, New Delhi, Affiliated to VTU, Belagavi.
Accredited by *NBA and NAAC
AITM
Faculty ImageName: Dr. Dhanashree K
Faculty ID: FCCS38
Department: Computer Science & Engineering
Email:
Phone:
Designation: Professor
Date Of Joining: 2021-11-15
Orchid ID:
Scholar:

Book / Book Chapter

S.NoTitlePublisherYear of publicationISBNBook ChapterLink
1Cyber Threat Detection and Mitigation Using Artificial Intelligence – A Cyber-physical PerspectiveWiley2024848Chapter
2Enhancing Security in Cloud Computing Using Artificial IntellingenceWiley2024848Chapter

FDP Attended

S.NoTopicOrganizerNo of daysPlaceYear
1Blockchain:The next Frontier in cybersecurity and privacyorganizer5place2024
2Recent Trends In Multidisciplinary Researchorganizer5place2024

Journal Publications

S.NoTitleName of journalPublisherVol no issue noISSNPage noYearWebsite linkInternational nationalIndexingImpact factorSNIPSJRH indexCitations
1Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methodsCOMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024.Vol. 21, Number 06, pp. 1–152024https://zenodo.org/records/11466500International0
2Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methodsCOMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024.Vol. 21, Number 06, pp. 1–152024https://zenodo.org/records/11466500International0
3Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methodsCOMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024.Vol. 21, Number 06, pp. 1–152024https://zenodo.org/records/11466500International0
4Secure Cloud Deduplication on Hybrid Cloud Storage ArchitectureSecure Cloud Deduplication on Hybrid Cloud Storage ArchitectureMiss Aparna Ajit Patil, Dhanashree Kulkarni1100975-888729-322015https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational50
5Brief Survey on Opinion Mining TechniquesBrief Survey on Opinion Mining TechniquesSwapnil B Mulay, Dhanashree Kulkarni97588870https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoNational50
6Tiling based Compression for Reducing Memory Occupancy of Embedded ApplicationsTiling based Compression for Reducing Memory Occupancy of Embedded ApplicationsDhanashree Kulkarni172231-5381152-1552014https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational50
7Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping AttackUnobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping AttackRajani Patil, Dhanashree Kulkarni22349-6967216-2222015https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational50
8Secure Cloud Deduplication on Hybrid Cloud Storage ArchitectureSecure Cloud Deduplication on Hybrid Cloud Storage ArchitectureInternational Journal of Computer Applications1100975-888729-322015https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational0
9Brief Survey on Opinion Mining TechniquesBrief Survey on Opinion Mining Techniques97588870https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoNational0
10Tiling based Compression for Reducing Memory Occupancy of Embedded ApplicationsTiling based Compression for Reducing Memory Occupancy of Embedded ApplicationsInternational Journal of Computer Trends and Technology (IJCTT)17/32231-5381152-1552014https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational0
11Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping AttackUnobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping AttackInternational Journal of Emerging Trend in Engineering and Basic Sciences (IJEEBS) 2/12349-6967216-2222015https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=aoInternational0
12 IMPLEMENTATION OF SARCASM DETECTION ON TWITTER DATA IMPLEMENTATION OF SARCASM DETECTION ON TWITTER DATA0https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
13INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENTINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENTINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT2349-51979-112015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International2.138 0
14A Protective Mechanism to Avoid Eavesdropping Attack in MANETA Protective Mechanism to Avoid Eavesdropping Attack in MANETInternational Journal on Recent and Innovation Trends in Computing and Communication3/4 2321-8169,2356 – 2361 2356-23612015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
15Secure Data Deduplication on Hybrid Cloud Storage ArchitectureSecure Data Deduplication on Hybrid Cloud Storage ArchitectureInternational Journal on Recent and Innovation Trends in Computing and Communication 3/5 2321-8169,2906-2909 2906-29092015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
16A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: SurveyA Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: SurveyFoundation of Computer Science107/200975 – 888731-332014https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
17K-Most Demanding Products Discovery with Maximum Expected CustomersK-Most Demanding Products Discovery with Maximum Expected Customers Foundation of Computer Science124/150975 – 888713-162015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
18An Unobservable On-demand Routing Protocol with Trust Management MechanismAn Unobservable On-demand Routing Protocol with Trust Management MechanismFoundation of Computer Science122/140975 – 88876-132015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
19TRACKING MOVING TARGET LOCATION OF MOBILE SENSOR NAVIGATION USING ANT COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORKTRACKING MOVING TARGET LOCATION OF MOBILE SENSOR NAVIGATION USING ANT COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORK INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT2/112349- 51979-112015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International 2.1380
20Brief Survey on Opinion Mining TechniquesBrief Survey on Opinion Mining Techniques2016https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
21Disease detection for multilabel big dataset using MLAM, Naive Bayes, Adaboost classificationDisease detection for multilabel big dataset using MLAM, Naive Bayes, Adaboost classificationInternational Research Journal of Engineering and Technology4/122395-0056, 2395-00721766-17712017https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
22Product Review Using Naive BayesProduct Review Using Naive Bayes6/62018https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
23Privacy, Confidentiality And Authorization Preserving Rfid System For Toll ApplicationPrivacy, Confidentiality And Authorization Preserving Rfid System For Toll Application13/31258-12652020https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
24 PREDICTING ELECTION RESULTS WITH SOCIAL MEDIA SENTIMENT ANALYSIS: EMPLOYING ADVANCED MACHINE LEARNING METHODS PREDICTING ELECTION RESULTS WITH SOCIAL MEDIA SENTIMENT ANALYSIS: EMPLOYING ADVANCED MACHINE LEARNING METHODS21/61462 28152024https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
25 Cyber Threat Detection and Mitigation Using Artificial Intelligence–A Cyber‐physical Perspective Cyber Threat Detection and Mitigation Using Artificial Intelligence–A Cyber‐physical PerspectiveJohn Wiley & Sons, Inc. 107-1332024https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International0
26Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning AlgorithmsIntrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning AlgorithmsInternational Journal of Science and Research(IJSR) 5/22319-7064 1612-16172016https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International 6.14 5.611 1
27Word Sense Disambiguation for Lexicon-based Sentiment Analysis in HindiWord Sense Disambiguation for Lexicon-based Sentiment Analysis in HindiWebology19/11735-188X 592-6002022https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80National1
28A Greedy Algorithm Approach for Mobile Social NetworkA Greedy Algorithm Approach for Mobile Social NetworkFoundation of Computer Science111/160975 – 88871-32015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International2
29Review on urea prediction system using fuzzy logicReview on urea prediction system using fuzzy logic32017https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International2
30Specifying context free grammar for Marathi sentencesSpecifying context free grammar for Marathi sentencesInternational Journal of Computer Applications 99/140975 – 888738-412014https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80National4
31Influence maximization on mobile social network using location based community greedy algorithmInfluence maximization on mobile social network using location based community greedy algorithmFoundation of Computer Science122/190975 – 888728-312015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International4
32Towards enhancement of the lexicon approach for Hindi sentiment analysisTowards enhancement of the lexicon approach for Hindi sentiment analysisSpringer Singapore2445-4512022https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International5
33A survey on: secure data deduplication on hybrid cloud storage architectureA survey on: secure data deduplication on hybrid cloud storage architectureInternational Journal of Computer Applications110/30975 – 888729-322015https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International6
34Extensive study of text based methods for opinion miningExtensive study of text based methods for opinion miningIEEE523-5272018https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International8
35Sentiment analysis in Hindi—A survey on the state-of-the-art techniquesSentiment analysis in Hindi—A survey on the state-of-the-art techniquesACM21/11-462021https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International24
36Enhancing Security in Cloud Computing Using Artificial Intelligence (AI)Enhancing Security in Cloud Computing Using Artificial Intelligence (AI)John Wiley & Sons, Inc.179-2202024https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80International24

Patents

S.NoTitleYear of publicationStatus
1Artificial intelligence -based medical testing equipment for cancer classification using gene profiles .2024filed