Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sandeep Kadam is active.

Publication


Featured researches published by Sandeep Kadam.


International Journal of Computer Applications | 2014

Survey on Methodologies Used for Web Image Search

Dipalee N. Gaikwad; Sandeep Kadam

The image search has becomes an important feature of multimedia. It plays an important role in daily life. Some image search query results are satisfactory and some are unsatisfactory. The web image search mostly depends on the surrounding text of the image. It is difficult to understand the user intention only by query keywords and this leads to irrelevant image search results. In this paper the methods developed by different researchers in the area of web image search are reviewed. These methods vary from textual information search to user feedback. Also some methods are depend on the visual similarities between the images. To improve the result of web image search, strategies like keyword expansion, active re-ranking is also used. This paper focuses on the methods introduced by different authors for development in the area of web image search. General Terms Image Search, User Intention.


International Journal of Computer Applications | 2015

Detection of Suspicious URL in Social Networking Site Twitter: Survey Paper

Jyoti D.Halwar; Sandeep Kadam; Vrushali Desale

Twitter is very popular social networking site used by billions of people to share the information with each other. To communicate with each other over the long distance. But it also attracts the attackers in carrying out different attacks or get the information being shared by the twitter users. Twitter users can send the messages to each other in the form of tweets, that tweets have the size limitation of maximum 140 characters. So to share the web pages URL shorting is used. Attackers send the suspicious URLs in tweets and move the users to malicious pages. This paper presents a survey of different methods used to detect the suspicious URL (sites) in twitter stream. This paper also presents a WARNING BIRD APPLICATION. It is a near real time system to detect the suspicious URLs by classifying them.


International Journal of Computer Applications | 2015

A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud

Kirti Panmand; Sandeep Kadam

Cloud server is a model for enabling suitable, on-demand network access to a shared pool of resources that can be rapidly provisioned and released with cloud service provider communication. However, public appraising for such shared data while conserving uniqueness of system leftovers to be an open challenge. In this paper, the first privacy-conserving mechanism is proposed that allows public appraising on shared data stored in the cloud. In this, ring signature mechanism is used to calculate the authentication information needed to audit the integrity of shared data. With the help of this mechanism, the uniqueness of the signer on each block in shared data is kept secret from a third party auditor (TPA), who is still able to authenticate the integrity of shared data without accessing the complete file.


International Journal of Computer Applications | 2014

Sentiment Classification and Feature based Summarization of Movie Reviews in Mobile Environment

Savita Harer; Sandeep Kadam

framework is designed for sentiment classification and feature based summarization system in a mobile environment. Posting online reviews has become an increasingly popular way for people to share their opinions about specific product or service with other users. It has become a common practice for web technologies to provide the venues and facilities for people to publish their reviews. Sentiment classification and feature based summarization are essential steps for the classification and summarization of movie reviews. System proposed Random forest method for sentiment classification of movie reviews. Identification of movie features and opinion words are both important for feature based summarization. System identified movie features using a novel approach called Latent Semantic Analysis (LSA) and frequency based approach. Then system identified opinion words using part-of-speech (POS) tagging method. The result of LSA is extended to LSA based filtering mechanism to reduce the size of review summary. System design focused on the sentiment classification accuracy and system response time.


International Journal of Computer Applications | 2014

RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud

Sunita R. Patil; Sandeep Kadam

This paper presents various issues related to privacy and security while storing user’s data on untrusted cloud. In today’s world Sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these cloud service providers and cloud security in general. In this paper system proposes a secure multi-owner data sharing scheme, for dynamic group in the cloud. By providing group signature and encryption techniques, any cloud user can securely share data with others. The main objective of this paper include: to provide security for dynamic group system integrates Image based authentication and one time password (OTP) to achieve high level of security. In addition system identified some limitations in the same approach in terms of reliability and scalability .To resolve the drawbacksystem extends the basic MONA by adding the reliability as well as improving the scalability by growing the backup group managers dynamically. In this method System further presenting how system manage the risks like failure of group manager by increasing the number of backup group manager, sagging of group manager in case number of requests more .This method claims required reliability ,security,scalability and most importantly efficiency..


International Journal of Computer Applications | 2014

Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter

Anuradha T. Thakre; Sandeep Kadam

In Mobile Ad Hoc network (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor’s position for effective and truthful communication. However, this MANET process is quite negotiable by attacking mobile node and retrieving their information of respective locations in MANET. Hence it is very essential to have proficient method of discovering neighbors to avoid such attacks for high level security. In recent days, various methods are presented for verifying neighbor positions, but those methods absorbs few limitations with respect to performance. In this paper, “Improving Performance of Neighbor discovery In MANET by Using Threshold value and Time out parameter” the protocol offers false positive and false negative rate improvement within the existence of various attacks for improving the performance of an existing method (NPV) parameters such as; threshold value and time out are introduced. This new protocol fundamentally deals with Mobile Ad Hoc network where a persistent infrastructure is unavailable and the location identification is necessarily learnt via. Node to node communication. Such scenario is highly noticeable because it has a loophole for oppositional nodes to abuse the location based services.


computer and information technology | 2016

Model for Detection of Phishing Sites using Clustering and Bayesian Approach: A Survey

Nilima Ramdas Narad; Sandeep Kadam


International Journal of Computer Applications | 2016

Web Phishing Detection System: Bayesian and Clustering Approach

Nilima Ramdas Narad; Sandeep Kadam


International Journal of Computer Applications | 2015

Refining Image Search through Visual Similarities

Dipalee N. Gaikwad; Sandeep Kadam


International Journal of Computer Applications | 2015

Real Time Detection of Suspicious URLs on Social Networking Sites Twitter

Jyoti D.Halwar; Sandeep Kadam

Collaboration


Dive into the Sandeep Kadam's collaboration.

Researchain Logo
Decentralizing Knowledge