Name: Aditi Chhabria
Gender: Female
Department: Computer
Designation: Associate Professor
Date of Joining: 2006-07-17
Area of Specialisation: Big Data Analytics & Human Computer Interaction
Industrial Experience: 0
Teaching Experience: 14
Total Experience: 14
UG Qualification: Computers
UG Year Of Passing: 2005
UG University: Mumbai
UG Class: First Class
PG Qualification: Computers
PG Year Of Passing: 2009
PG University: Mumbai
PG Class: Distinction
PHD Qualification: Pursuing
PHD Year Of Passing: 0
Number of Paper Published => National Conference: 1 International Conference: 19 International Journal: 18
Number of Workshops => Organised: 9 Attended: 11
Number of Talks Delivered => 8
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | NSCFET - RAIT | NaviMumbai, India | Comparative Study of K-means and Efiicient K-means Algorithm | Manali Dhawan,Anagha Patil,Trupti Sarak,Aditi Chhabria | Apr 2017 |
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | International Conference on Advances in Science and Technology (ICAST-2018) | Mumbai | Comparative Study of UP growth and Improved UP growth | Aishwarya Walvakar, Apeksha Shetty, Madhura Bhope, Vimla Jethani | Apr 2018 | |
2) | International Conference on Inventive Communication and Computational Technologies (ICICCT-2018) | Coimbatore | Abstractive Summarization using Graph Based Methods | Chetana Badgujar, Vimla Jethani, Tushar Ghorpade | Feb 2018 | |
3) | Computer Communication and Informatics (ICCCI), 2017 | Coimbatore, India | Diabetic retinopathy detection through image mining for type 2 diabetes | Karkhanis Apurva Anant,Tushar Ghorpade,Vimla Jethani, | 978-1-4673-8855-9 | Feb 2017 |
4) | Automatic Control and Dynamic Optimization Techniques (ICACDOT), IEEE Xplore | Pune, India | Improved ALERT protocol in MANET with strategies to prevent DOS & MITM attacks | Priyanka Patil,Nilesh Marathe,Vimla Jethani, | ISBN: 978-1-5090-2080-5 | Sep 2016 |
5) | Engineering and Technology (ICETECH), IEEE Xplore | Coimbatore, India | Preventing DOS & MITM Attacks in ?anonymous location based efficient routing protocol? in MANET | Priyanka Patil,Nilesh Marathe,Vimla Jethani, | ISBN: 978-1-4673-9915-9 | Sep 2016 |
6) | Automatic Control and Dynamic Optimization Techniques (ICACDOT), IEEE Xplore | Pune, India | Forensic Analysis of financial document using Dempster Shafer approach | Snehal Shejale,Smita Bharne,Vimla Jethani, | ISBN: 978-1-5090-2080-5 | Sep 2016 |
7) | Computing Communication Control and automation (ICCUBEA), IEEE Xplore | Pune, India | Cross Platform C Compiler | Fatima Mulla,Savitha Nair ,Vimla Jethani, | ISBN: 978-1-5090-3291-4 | Aug 2016 |
8) | International Conference on Advances in Information Communication Technology & Computing, Published in Springer | Bikaner, India | Breast Thermograms Analysis for Cancer Detection using Feature Extraction and Data Mining Technique | Pranali Yadav,Vimla Jethani | Article No. 87, ISBN: 978-1-4503-4213-1 | Aug 2016 |
9) | Electrical, Electronics, and Optimization Techniques (ICEEOT), IEEE Xplore | Chennai, India | A Novel Approach based on Intersection and Direction to Optimize Hard Handover in Mobile WiMAX | Rahul Talreja,Vimla Jethani,Nilesh Marathe,Kumkum Saxena | ISBN: 978-1-4673-9939-5 | Mar 2016 |
10) | Computer and Communication Technologies. Advances in Intelligent Systems and Computing | New Delhi | A Novel Methodology to filter out unwanted messages from OSN user?s wall using trust value calculation | Renushree Bodkhe,Tushar Ghorpade,Vimla Jethani, | vol 380. Springer | Sep 2015 |
11) | IEEE International Conference on Computer Communication and Control | Indore, India | Renital Fund Diseases Dignosis using Image Mining | Nilam D. Panse,Tushar Ghorpade,Vimla Jethani, | ISBN: 978-1-4799-8164-9 | Sep 2015 |
12) | IRF, International Conference | Cochin, India | Detection and Resolution of Policy Conflict with Signature Generation Mechanism | Snehal Mumbaikar,Puja Padia,Vimla Jethani, | ISBN: 978-93-84209-43-8 | Aug 2014 |
13) | 4th IEEE International Advance Computing Conference, IEEE Xplore | Gurgaon, India | A Vote Based System To Detect Misbehaving Nodes In MANETs | Rahul Talreja,Vimla Jethani | , ISBN: 978-1-4799-2572-8 | Mar 2014 |
14) | International Conference and Workshop on Electronics and Telecommunication Engineering | Mumbai, India | Comparative Analysis of Methods to Detect Misbehaving Nodes in MANET | Rahul Talreja,Vimla Jethani | Mar 2014 | |
15) | International Conference on Computer Communication and Informatics (ICCCI -2014), IEEE Xplore | Coimbatore, India | QoS in WiMAX Handoff SchemeNetwork by using Improved | Nilesh Yadav,Vimla Jethani | ISBN: 978-1-4799-2353-6 | Jan 2014 |
16) | International Conference on Computer Science and Information Technology | Mumbai, India. | An Improved FP Tree Based Association Rule Mining Technique using Genetic Algorithm | Nilesh Yadav,Vimla Jethani | ISBN: 978-93-82208-56-3 | Jan 2013 |
17) | Fourth International Conference on Computational Intelligence and Communication Networks (CICN2012), IEEE Xplore | Mathura, India | Association Rule Mining using Graph and Clustering Technique | Seema Desai,Satish R. Devane,Vimla Jethani, | ISBN: 978-1-4673-2981-1 | Nov 2012 |
18) | International Conference & Workshop on Emerging Trends in Technology March- 2012 (ICWET2012) | Mumbai, India | High Performance Intrusion Detection using K-means Clustering and Grid Base labelling | Sagar Thakare,Vimla Jethani | Mar 2012 | |
19) | Wireless And Optical Communications Networks WOCN2010 | Colombo, SriLanka | QoS in WiMAX for Real-time Applications by using Improved Handoff Scheme | Vimla Jethani, | ISBN - 978-1-4244-7203-1 | Sep 2010 |
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | International Journal od Advance Research, Ideas and Innovations in Technology | Mumbai | Social Champion Identification | Abhi Salviya, Prince Maurya, Aditi Sakhare, Aditi Chhabria | Volume 4, Issue 2, Pages 1479-1485 | Apr 2018 |
2) | International Journal of Advanced Research in Computer Science (IJARCS) | Analysis based IDS for Mobile Adhoc Network | Pravin Khobragade,Vimla Jethani | Volume 8, No. 5, ISSN No. 0976-5697 | Jun 2017 | |
3) | International Journal of Advanced Research in Computer Science (IJARCS) | Sentiment Analysis of Movie Reviews | Pravin Khobragade,Vimla Jethani | Volume 8, No. 5, ISSN No. 0976-5698 | Jun 2017 | |
4) | International Journal of Computer Science and Information Technology & Security (IJCSITS) | Survey of Privacy Preservation in VANETs | Priyanka Patil,Nilesh Marathe,Vimla Jethani, | ISSN: 2249 ? 9555, Vol. 6, No. 1 | Feb 2016 | |
5) | International Journal of Computer & Mathematical Sciences (IJCMS), | Diabetic Retinopathy Analysis using Image Mining to Detect Type 2 Diabetes | Karkhanis Apurva,Tushar Ghorpade,Vimla Jethani, | ISSN: 2347-8527, Volume 5, Issue 1 | Jan 2016 | |
6) | International Journal of Computer Applications (0975 ? 8887) | Glaucoma and Diabetic Retinopathy Diagnosis using Image Mining | Nilam D. Panse,Tushar Ghorpade,Vimla Jethani, | Volume 117, No. 5 | May 2015 | |
7) | International Journal of Science and Research (IJSR) | Applying Genetic Algorithm to Intrusion Detection System | Vrishali Yewale,Vimla Jethani,Tushar Ghorpade, | ISSN: 2319-7064, Volume 4, Issue 4 | Apr 2015 | |
8) | International Journal on Advanced Computer Engineering and Communication Technology | Reducing Routing Overhead in MANET by Using NCRP Protocol with Cluster Technique | Kavita Gite,Vimla Jethani | Volume 3, Issue 1, ISSN- 2319 ? 2526 | Aug 2014 | |
9) | IOSR Journal of Computer Engineering (IOSR-JCE) | I-Vide: An improved Vision-Based Approach for Deep Web Data Extraction | Mrudula Varade,Vimla Jethani | ISSN: 2278-0061, Volume 16, Issue 1 | Aug 2014 | |
10) | International Journal of Engineering and Research Technology (IJERT) | A Security Framework on SIM based authentication technique for Mobile Financial Services | Kirti Ahirrao,Vimla Jethani | ISSN: 2278- 0181, Volume 3, Issue 8 | Aug 2014 | |
11) | International Journal of Multidisciplinary Educational Research (IJMER) | Scheduling Approaches in Cloud Environment for Data intensive with Security Constraints | Neelam D.Panse,Tushar Ghorpade,Vimla Jethani, | ISSN: 2277-7881, Volume 3, Issue 3 | Mar 2014 | |
12) | International Journal of Engineering, Science and Mathematics | Hybrid Encryption Algorithm Based Improved RSA and Diffie Hellman | Renushree Bodkhe,Vimla Jethani | ISSN: 2320- 0294, Volume 4, Issue 1 | Mar 2014 | |
13) | International Conference on ?Emerging Trends in Technology and It?s Applications? - ICETTA-2014 | Pune, India | A Review of Mining Algorithm to get frequent item sets over data stream | Ms.Kavita R.Gite,Vimla Jethani | Volume 3, Issue 3 | Mar 2014 |
14) | International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) | Frequent Patterns for mining Association rule in Improved Apriori Algorithm | Jyoti B.Deone,Vimla Jethani | Volume 3, Issue 3 | Mar 2014 | |
15) | International Journal of Emerging Technology and Advanced Engineering (IJETAE) | VEGAS RB+: An Optimized Version of TCP VEGAS | Himani Deshpande,Vimla Jethani,Puja Padiya, | ISSN: 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10 | Oct 2013 | |
16) | International Journal of Scientific and Research Publications | Distributed Metadata Management Scheme in HDFS | Mrudula Varade,Vimla Jethani | , ISSN 2250-3153, Volume 3, Issue 5 | May 2013 | |
17) | International Journal of Management and Information Technology (IJMIT) | RBAC+: Protecting Web Databases with access control Mechanisms | Archana Arudkar,Vimla Jethani | ISSN: 2278-5612, Volume 2, No 1 | Nov 2012 | |
18) | Asian Journal of Computer Science and Technology (AJCST) | GCARM: A Combined Approach to Data Mining | Seema Desai,Lata Ragha,Vimla Jethani, | Vol.1, No.1 | Jan 2012 |
No. | Worked As | Name | Organised By | Location | No. of Days | Start Date | End Date |
---|---|---|---|---|---|---|---|
1) | Committee Member | Security Assets for Hacking Anticipation | RAIT | Nerul, Navi Mumbai | 6 | 2017-01-09 | 2017-01-14 |
2) | Committee Member | Security Assets for Hacking Anticipation | RAIT | Nerul, Navi Mumbai | 6 | 2017-01-09 | 2017-01-14 |
3) | Coordinator | Cyber Threats and Security | RAIT | Nerul, Navi Mumbai | 1 | 2015-09-16 | 2015-09-16 |
4) | Coordinator | Cyber Threats and Security | RAIT | Nerul, Navi Mumbai | 1 | 2015-09-16 | 2015-09-16 |
5) | Coordinator | Advanced Technology Trends in Security issues of Adhoc and Sensor Networks | RAIT | Nerul, Navi Mumbai | 3 | 2014-01-23 | 2014-01-25 |
6) | Coordinator | Advanced Technology Trends in Security issues of Adhoc and Sensor Networks | RAIT | Nerul, Navi Mumbai | 3 | 2014-01-23 | 2014-01-25 |
7) | Coordinator | Cloud Computing and Grid Computing | RAIT | Nerul, Navi Mumbai | 2 | 2012-10-19 | 2012-10-20 |
8) | Coordinator | Cloud Computing and Grid Computing | RAIT | Nerul, Navi Mumbai | 2 | 2012-10-19 | 2012-10-20 |
9) | Coordinator | Cyber Crime and Cyber Laws | RAIT | Nerul, Navi Mumbai | 1 | 2012-03-21 | 2012-03-21 |
10) | Coordinator | Cyber Crime and Cyber Laws | RAIT | Nerul, Navi Mumbai | 1 | 2012-03-21 | 2012-03-21 |
11) | Coordinator | Technical Paper Presentation | RAIT | Nerul, Navi Mumbai | 3 | 2012-03-16 | 2012-03-18 |
12) | Coordinator | Technical Paper Presentation | RAIT | Nerul, Navi Mumbai | 3 | 2012-03-16 | 2012-03-18 |
13) | Coordinator | Ethical Hacking | RAIT | Nerul, Navi Mumbai | 2 | 2012-02-04 | 2012-02-05 |
14) | Coordinator | Ethical Hacking | RAIT | Nerul, Navi Mumbai | 2 | 2012-02-04 | 2012-02-05 |
15) | Coordinator | NS2 and its Applications | RAIT | Nerul, Navi Mumbai | 2 | 2010-10-12 | 2013-10-13 |
16) | Coordinator | NS2 and its Applications | RAIT | Nerul, Navi Mumbai | 2 | 2010-10-12 | 2013-10-13 |
17) | Coordinator | Emerging Trends in Pattern Recoginition | RAIT | Nerul, Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
18) | Coordinator | Emerging Trends in Pattern Recoginition | RAIT | Nerul, Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
No. | Name | Organised By | Location | No. of Days | Start Date | End Date |
---|---|---|---|---|---|---|
1) | Emerging Trends in Pattern Recognition | RAIT | Nerul, Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
2) | ISTE-AICTE STTP on Image Processing and Multimedia | K.J. Somaiya College of Engineering | Vidyavihar, Mumbai | 14 | 2007-06-25 | 2007-07-06 |
3) | Network Security | RAIT | Nerul, Navi Mumbai | 2 | 2014-03-14 | 2014-03-15 |
4) | Text Analytics | CDAC-Kharghar | Kharghar - Navi Mumbai | 3 | 2016-06-16 | 2016-06-18 |
5) | Mobility and Pervasive Computing | RAIT | Nerul, Navi Mumbai | 1 | 2016-03-10 | 2016-03-10 |
6) | Object Oriented Software Engineering | IBM and Zensoft Services Pvt. Ltd. | SJCE, Asangaon | 4 | 2010-09-24 | 2010-09-27 |
7) | Adaptive Instruction | C-DAC | Kharghar - Navi Mumbai | 2 | 2011-12-15 | 2011-12-16 |
8) | Ethical Hacking | RAIT & Kyrion Technologies | Nerul, Navi Mumbai | 2 | 2012-02-04 | 2012-02-05 |
9) | Quality Networking (QualNet) | RAIT | Nerul, Navi Mumbai | 2 | 2013-02-22 | 2013-02-23 |
10) | LateX | RAIT | Nerul, Navi Mumbai | 1 | 2013-03-09 | 2013-03-09 |
11) | Cyber Threats and Security | RAIT | Nerul, Navi Mumbai | 1 | 2015-09-16 | 2015-09-16 |
No. | Name | Organised By | Location | Date |
---|---|---|---|---|
1) | DataStructures and Analysis of Algorithms | Traning and Placement Cell, RAIT | Nerul | 2010-10-10 |
2) | Basic Training Course for Police Officers & Men | Navi Mumbai Police Branch and RAIT | Nerul | 2011-06-15 |
3) | Computer Education in Nursing | Dr. D. Y. Patil Institute of Nursing Education | Nerul | 2010-02-15 |
4) | NS2 and it Applications | RAIT | Nerul | 2010-10-12 |
5) | NS2 and it Applications | SIES | Nerul | 2010-04-23 |
6) | NS2 and it Applications | RAIT | Nerul | 2013-10-12 |
7) | Object Oriented Analysis and Design | RAIT | Nerul Navi Mumbai | 2015-08-10 |
8) | Database Management Systems | RAIT | Nerul | 2019-02-01 |