Academic Year 2015-2016  

  • Title :- Teaching and Learning of Divergent and Convergent Thinking through Open-Problem Solving in a Data Structures Course
    Paper:- presented and published
    Level :- international

    By: dr. deepti patil
    Organizer :- IITB
    Venue :- IITB
    Date: 13/04/2016

    IEEE International Conference on Learning and Teaching in Computing and Engineering (LaTiCE), 2016.


  • Title :- Adaptive echo cancellation in VoIP network
    Paper:- presented and published
    Level :- international

    By: ms. priyanka kadam
    Organizer :-
    Venue :- Coimbatore, India
    Date: 17/03/2016

    In VoIP communication acoustic echo is one of the important issue which reduces the quality communication. To solve this problem adaptive filters are consider as an efficient solution. In this paper adaptive filters like LMS, NLMS RLS and dual-H filter are used for echo cancellation. Acoustic echo canceller is simulated by using MATLAB. To improve overall performance of VoIP network along with echo cancellation we tried to remove background noise. This paper also includes effect of packet drop, tail circuit delay and dual talk on VoIP network.


  • Title :- Use of proxy signature in e-governance
    Paper:- presented and published
    Level :- international

    By: dr. aparna bannore
    Organizer :- Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
    Venue :- Auditorium,Pacific college,Udiapur,India
    Date: 04/03/2016

    E-Governance aims at producing citizen centric services ensuring services transparency with various government agencies. The process of approving or disapproving the application is marked by digitally signing and forwarding the e-documents. Present digital signature scheme provides the required security using identity based authentication mechanism, but in case of delegating power to third party authority for short period requires additional scheme ie Proxy signature system a variant of digital signature. Furthermore the identity based authentication scheme required to be changed to role base authentication using proxy signatures to protect from signature forgery attack and misuse by delegated authority.