MAKE AN ENQUIRY
Home > Papers Presented
Title Author Date Paper Status Level Organizer Description
FAULT TOLERANT SCHEDULING IN MIXED CRITICAL SYSTEMS: A CASE STUDY MRS. PREETI GODABOLE 2020-05-25 PRESENTED AND PUBLISHED INTERNATIONAL Paper is based on achieving resiliency in real time systems
A STUDY ON CLUSTERING OF RASPBERRY PI. PROF. SONAL HUTKE 2020-05-16 PRESENTED AND PUBLISHED INTERNATIONAL DMCOE ICATE-2020
IMPLEMENTATION OF RFID SYSTEM FOR VARIOUS APPLICATIONS AND ITS PERFORMANCE PARAMETERS MRS. VANDANA SAWANT 2020-03-19 PRESENTED AND PUBLISHED INTERNATIONAL TERNA COLLEGE OF ENGINEERING Paper is about antenna design for Implementation of RFID system for various applications and its performance parameters
IMPLEMENTATION OF RFID SYSTEM FOR VARIOUS APPLICATIONS AND ITS PERFORMANCE PARAMETERS MRS. VANDANA SAWANT 2020-03-19 PRESENTED AND PUBLISHED INTERNATIONAL TERNA COLLEGE OF ENGINEERING Paper is about antenna design for Implementation of RFID system for various applications and its performance parameters
IMPLEMENTATION OF RFID SYSTEMS FOR VARIOUS APPLICATIONS AND ITS PERFORMANCE PARAMETERS MR. SENTHILKUMAR D 2020-03-19 PRESENTED INTERNATIONAL TERNA ENGINEERING COLLEGE, NERUL, NAVI MUMBAI In this paper, the crucial performance parameters of radio frequency identification (RFID) system, used in various applications are discussed. The effect of operating frequency and polarization of the antenna used in RFID system is studied. RFID systems operating at low frequency (LF), high frequency (HF) and ultra-high frequency (UHF) are designed and performance parameters of these systems are compared. Also, a simple, low cost, circularly polarized (CP) microstrip patch antennas (MPAs) are designed to enhance the read range of UHF reader. These antennas are designed, using air and a low cost and commercially available, 1.59mm thick FR4 substrate. It is revealed from the measurement that, the UHF reader, with proposed antenna, offers longer read range, as compared to the in-built antenna in UHF reader.
IMPLEMENTATION OF RFID SYSTEMS FOR VARIOUS APPLICATIONS AND ITS PERFORMANCE PARAMETERS MR. SENTHILKUMAR D 2020-03-19 PRESENTED INTERNATIONAL TERNA ENGINEERING COLLEGE, NERUL, NAVI MUMBAI In this paper, the crucial performance parameters of radio frequency identification (RFID) system, used in various applications are discussed. The effect of operating frequency and polarization of the antenna used in RFID system is studied. RFID systems operating at low frequency (LF), high frequency (HF) and ultra-high frequency (UHF) are designed and performance parameters of these systems are compared. Also, a simple, low cost, circularly polarized (CP) microstrip patch antennas (MPAs) are designed to enhance the read range of UHF reader. These antennas are designed, using air and a low cost and commercially available, 1.59mm thick FR4 substrate. It is revealed from the measurement that, the UHF reader, with proposed antenna, offers longer read range, as compared to the in-built antenna in UHF reader.
PREPARATION AND CHARACTERIZATION OF SR DOPED SNO2 FOR IMPROVEMENT IN PHOTOCATALYSIS DR. G. KANTHI MATHI 2020-02-28 PRESENTED NATIONAL THAKUR COLLEGE OF ENGINEERING Sr doped SnO2 nanoparticles is prepared with the objective of investigating various properties like photocatalysis and gas sensing. The sample is prepared using a facile wet chemical route for different doping concentration and XRD, SEM, EDAX analysis has been done which reveals the presence of Sn, Sr and O elements in the synthesized samples. Interestingly, Sr doping in SnO2 nanoparticles exhibits a critical role in improving photocatalysis since Sr doping considerably changes the morphology, size of the particle, surface area and porosity of pristine SnO2.
"BLOCKCHAIN TO PREVENT FRAUDULENT ACTIVITIES: BUYING AND SELLING PROPERTY USING BLOCKCHAIN" MS. BUSHRA SHAIKH 2020-02-26 PRESENTED INTERNATIONAL RVS TECHNICAL CAMPUS &IEEE "BlockChain to Prevent Fraudulent Activities: Buying and Selling Property Using BlockChain" in 5th International Conference on Inventive Computation Technologies (ICICT-2020)
ADAPTIVE MEAN FILTER TECHNIQUE FOR REMOVAL OF HIGH DENSITY SALT AND PEPPER NOISE MS. SWATI RANE 2020-01-11 PRESENTED INTERNATIONAL International Conference on Computing in Engineering and Technology
SMART CAR PARKING SYSTEM USING WIRELESS SENSOR NETWORKS MS. LEENA LADGE 2020-01-08 PRESENTED INTERNATIONAL JCT COLLEGE OF ENGINEERINGAND TECHNOLOGY, 4th International IEEE Conference
TEXT MINING IN HEALTHCARE MRS. PRANITA MAHAJAN 2019-12-25 PRESENTED AND PUBLISHED INTERNATIONAL ICDECS-2019 "Text Mining in Healthcare", International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-2S, December 2019
IMPLEMENTATION OF BLOCKCHAIN FOR PAYROLL TAXATION MS. SUVARNA CHAURE 2019-12-22 PRESENTED AND PUBLISHED INTERNATIONAL International Conference on Research and development in Engg and technology ICRDETMS-2019 ISBN-13-9781677031795
PRESERVING PRIVACY OF DATA IN DISTRIBUTED SYSTEMS USING HOMOMORPHIC ENCRYPTION MS. KALYANI PAMPATTIWAR 2019-12-21 PRESENTED INTERNATIONAL RAMA DEVI WOMEN'S UNIVERSITY BHUBANESWAR, INDIA 4th International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2019)
PRESERVING PRIVACY OF DATA IN DISTRIBUTED SYSTEMS USING HOMOMORPHIC ENCRYPTION MS. MASOODA MOHAMED MODAK 2019-12-17 PRESENTED AND PUBLISHED INTERNATIONAL RAMA DEVI WOMEN'S UNIVERSITY, BHUBANESWAR, INDIA Springer Conference
DESIGN, ANALYSIS, SIMULATION AND IMPLEMENTATION OF 4D QUADRATURE FSK MODULATOR PROF. BIJU PILLAI 2019-11-22 PRESENTED AND PUBLISHED INTERNATIONAL IEEE Biju Balakrishnan "Design, Analysis, Simulation and Implementation of 4D Quadrature FSK modulator" in the 4th IEEE International Conference on Information Systems and Computer Networks ( IEEE ISCON 2019) at GLA University, Mathura, India, 21-22, November 2019.
DESIGN, ANALYSIS, SIMULATION AND IMPLEMENTATION OF 3D POLAR FSK MODULATOR PROF. BIJU PILLAI 2019-10-20 PRESENTED AND PUBLISHED INTERNATIONAL IEEE Biju Balakrishnan " Design, Analysis, Simulation and Implementation of 3D Polar FSK modulator" in the IEEE sponsored Global Conference for Advancement in Technology( IEEE GCAT- 2019) at Bangalore, 18-20, October 2019.
CHAT BOT USING API : HUMAN TO MACHINE CONVERSATION MR. SUNIL PUNJABI 2019-10-18 PRESENTED AND PUBLISHED NATIONAL IEEE BENGALURU SECTION Presented and published paper "Chat bot Using API : Human To Machine Conversation" IEEE Global conference for advancement in technology, Bangalore, India, 18th Oct to 20th Oct, 2019
GIS BASED FIR AND SOS SYSTEM DR. RIZWANA SHAIKH 2019-07-26 PRESENTED AND PUBLISHED INTERNATIONAL ANURAG GROUP OF INSTITUTION, HYDRABAD International Conference on Intelligent computing and Smart Communication Technologies, August 2019.
MAIBOLI - A PROGRAMMING LANGUAGE SOLUTION BASED ON MARATHI DEVANAGARI SCRIPT MS. BUSHRA SHAIKH 2019-07-26 PRESENTED AND PUBLISHED INTERNATIONAL IIT, BOMBAY Maiboli is a proposed programming language solution based on Marathi Devanagari script. It aims to bring the knowledge of programming to common individuals who find language as a barrier while learning programming. Here, the proposed system will be based on Python programming language and it will cover up basic libraries required for one to learn programming as a concept. This research paper serves insights of how Maiboli as a programming method, will serve for the well being of common individuals residing in areas where Marathi Language is dominant.
DETECTION OF DYSLEXIA USING EYE TRACKING MEASURES MS. MASOODA MOHAMED MODAK 2019-07-21 PRESENTED AND PUBLISHED INTERNATIONAL ANURAG GROUP OF INSTITUTIONS (FORMERLY CVSR COLLEGE OF ENGINEERING) VENKATAPUR (V International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue- 6S4, April 2019
PREDICTIVE MAINTENANCE OF HEAVY COMMERCIAL VEHICLES USING MACHINE LEARNING AND DATA ANALYTICS MS. MASOODA MOHAMED MODAK 2019-07-21 PRESENTED INTERNATIONAL IJICS IJICS,volume 6,issue 4
Title Author Date Paper Status Level Organizer Description
APPLICATION OF GRAY LEVEL CO-OCCURRENCE MATRIX AS A FEATURE EXTRACTION TECHNIQUE TO MONITOR WEAR OF CUTTING TOOL MR. PRASHANT AMBADEKAR 2019-09-27 PRESENTED AND PUBLISHED INTERNATIONAL EQUINOX 2018: 4TH INTERNATIONAL CONFERENCE ON ENGINEERING CONFLUENCE AT TERNA COLLEGE OF ENGINEERING The traditional methods make use of sensors to monitor the wear of a cutting tool. The application of digital image processing in determining tool wear is gaining importance. GLCM is the most widely used higher order statistical technique for feature extraction to monitor tool wear. Contrast and homogeneity has been proved as the two best texture descriptors of GLCM. The accuracy of GLCM largely depends on the orientation of the pixels considered to obtain these descriptors. This paper presents the effect of varying pixel pair spacing (pps) and pixel pair direction (ppd) on contrast and homogeneity. An attempt is made to provide one of the solutions to consider the orientation of the pixels while computing GLCM.
STRESS ANALYSIS OF TYPE-II TROCHANTERIC FRACTURE FEMER BONE IMPLANTATION WITH PROSTHETIC PLATE AND SCREWS USING FINITE ELEMENT METHOD PROF. CHANDAN CHAUDHARI 2019-06-14 PRESENTED INTERNATIONAL ICESTMM"19 The use of finite element method (FEM) has grown to a more importance in the field of biomedical engineering. Although increased computational performance allow us to create more complex geometries in the field of orthopedic surgery. These computational methods help us to explore effect of various bio- materials on the sub-trochanteric fracture femur bone. In this study the type II sub trochanteric femur bone were modeled based on the dimensions. The femur bone is longest and strongest bone in the human body. It needs to support maximum weight of the body in between hip joint and knee joint. The femur bone contained linear elastic, isotropic, homogeneous material of calcium phosphate. The main objective of this study is to rectify the behavior of sub-trochanteric fracture femur bone for a man of age 48 years with prosthetic bone plate and screws under compression loading condition. Results were analyzed on the prosthetic plates and screws for Type II sub-trochanteric fracture femur bone i.e. (The fracture is within 2.5 cm of the lesser trochanter) during static loading condition with different bio materials. The comparison was made with various screws and plates made by various bio-materials which concluded in the implementation of the materials having minimum Von-misses stress, deformation of the fractured femur bone. On the basis of the results obtained, an alternative grade is examined and comparison has been made with the existing grade of titanium.
INTELLIGENT HIRING WITH FACIAL EXPRESSION DETECTION AND REPORT GENERATION MS. KALYANI PAMPATTIWAR 2019-05-01 PRESENTED AND PUBLISHED INTERNATIONAL JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS(JASC) "Intelligent Hiring with Facial Expression Detection and Report Generation", JASC, Volume VI, Issue V, May/2019, ISSN NO: 1076-5131
THE NEXTGEN BOT MS. KALYANI PAMPATTIWAR 2019-04-01 PRESENTED AND PUBLISHED INTERNATIONAL JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS(JASC) "THE NEXTGEN BOT" JASC, Volume VI, Issue IV, April/2019, ISSN NO: 1076-5131, Page No:3661
ENHANCING MANUFACTURING OF SEMI-CONDUCTORS BY PREDICTING POTENTIAL PERFORMANCE USING AN INTELLIGENT SYSTEM. DR. PRADIP PATIL 2019-01-10 PRESENTED AND PUBLISHED INTERNATIONAL GURU NANAK INSTITUTIONS, HYDRABAD, TELANGANA, INDIA. A modern manufacturing process is normally under constant surveillance by monitoring the variable and signals (if any) collected from process estimation points and sensors. However, all of these signals may not be useful in monitoring a specific system. The measured signals contain a combination of useful information, irrelevant information as well as some amount of noise. Very often, we find that useful information is buried in the latter two. Engineers typically have a much larger number of signals than are actually required. If we consider each type of signal as a feature, then dimension reduction/feature selection may be applied to identify the most relevant signals. In this paper, we will see how we can determine whether semi-conductors will pass or fail in a house line test, by extracting the most important features obtained during the manufacturing of the semi-conductors, and then evaluating their performance. This will enable an increase in process throughput, decreased time to learning, and reduce the per unit production costs.
CRITICAL STUDY OF TOOL CONDITION MONITORING RELATED TO SENSOR AND IMAGE PROCESSING BASED METHODS MR. PRASHANT AMBADEKAR 2018-12-21 PRESENTED INTERNATIONAL 4TH INTERNATIONAL CONFERENCE ON PRODUCTION AND INDUSTRIAL ENGINEERING, CPIE - 2016 AT NIT JALANDHAR The aim of tool condition monitoring is to keep surveillance on the cutting tool during machining. TCM is becoming increasingly important as it influence the process economy and quality of machined part. This paper presents the overview of various techniques for data acquisition, data processing and classification techniques reported in the literature for tool condition monitoring. The monitoring methods may use sensors or vision system to acquire signal from the process. More emphasis is given on image processing based monitoring techniques than sensors based techniques that are less accurate. The integration of sensor and image processing based techniques are elaborated as novel work in this paper. The work also provides a platform for researchers who wish to execute their study in the area of TCM.
APPLICATION OF GABOR FILTER FOR MONITORING WEAR OF SINGLE POINT CUTTING TOOL MR. PRASHANT AMBADEKAR 2018-12-21 PRESENTED AND PUBLISHED INTERNATIONAL RTIP2R2018: THE SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN IMAGE PROCESSING & PATTERN RECOGNITION AT SOLAPUR UNIVERSITY Tremendous use of sophisticated computer aided manufacturing systems necessitates monitoring of tools. Monitoring of tools facilitates to reduce machine tool downtime, increases quality of the product, provide better surface finish and reduces cost. Sophisticated digital image processing algorithms and availability of high resolution cameras has enabled automated monitoring of tools. To exactly predict the tool wear is a challenging task due to its complexity involved in the algorithm that facilitates extraction of features. In this paper, tool wear monitoring through texture feature extraction using Gabor filter is presented. Gabor filter has demonstrated better multi-resolution properties that facilitate texture feature extraction. Statistical parameters such mean, standard deviation, variance, skew and kurtosis are calculated to measure the tool wear. Experimental results demonstrate better tool wear prediction as compared to other algorithms.
EVALUATION OF METAL SCRAP BASED COMPOSITES MR. GANESH KADAM 2018-12-14 PRESENTED AND PUBLISHED INTERNATIONAL TECHNO SOCIETAL - SVERI'S COE PANDHARPUR Ganesh S. Kadam, Swapnil T. Firake, Evaluation of Metal Scrap based Composites, Proceedings (Springer) of 2nd International Conference on Advanced Technologies for Societal Applications (2018) - Techno-Societal 2018, 14-15th December 2018, SVERI's College of Engineering Pandharpur, Solapur, Maharashtra, India.
TECHNOLOGY ENHANCED LEARNING (TEL) ENVIRONMENT TO DEVELOP EXPANSIONIST-REDUCTIONIST (ER) THINKING SKILLS THROUGH SOFTWARE DESIGN PROBLEM SOLVING. DR. DEEPTI PATIL 2018-12-13 PRESENTED AND PUBLISHED INTERNATIONAL IIT MADRAS IEEE Tenth International Conference on Technology for Education (T4E), 2018.
A SMART AND PROGNOSTIC APPROACH TO PARK VEHICLES USING IOT MS. MASOODA MOHAMED MODAK 2018-12-01 PRESENTED INTERNATIONAL JASC IOT based Appliation
A SMART AND PROGNOSTIC APPROACH TO PARK VEHICLES USING IOT MS. KALYANI PAMPATTIWAR 2018-12-01 PRESENTED AND PUBLISHED INTERNATIONAL JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS(JASC) " A smart and prognostic approach to park vehicles using IOT", JASC, Volume V, Issue XII, Dec 2018, DOI: 16.10089/JASC
"EXPLOITING LEAN-GREEN-SIX SIGMA STRATEGIES FOR COMPETITIVE ADVANTAGE" PROF. LOKPRIYA GAIKWAD 2018-11-30 PRESENTED AND PUBLISHED NATIONAL NITIE., MUMBAI Exploiting Lean-Green-Six Sigma manufacturing practices that help to the manufacturing organization for Competitive Advantage.
SMART INTELLIGENT SYSTEM FOR WOMEN AND CHILD SECURITY MR. SUNIL PUNJABI 2018-11-03 PRESENTED AND PUBLISHED INTERNATIONAL Presented and published paper "Smart Intelligent system for Women and Child security" IEEE 9th Annual Information Technology, Electronics, and Mobile communication Conference, 1-3 Nov 2018 at Vancouver, BC, Canada.
SMART INTELLIGENT SYSTEM FOR WOMEN AND CHILD SECURITY MS. SUVARNA CHAURE 2018-11-01 PRESENTED AND PUBLISHED INTERNATIONAL IEEE 9th Annual Information Technology, Electronics, and Mobile communication Conference at Vancouver, BC, Canada.
LEAN - GREEN - SIX SIGMA APPROACH IN GLOBAL MANUFACTURING USING INDUSTRY 4.0" PROF. LOKPRIYA GAIKWAD 2018-09-27 PRESENTED AND PUBLISHED INTERNATIONAL IIIE Presented an integrated Lean - Green - Six Sigma approach in global manufacturing using Industry 4.0 in current scenario.
ROLE OF LEAN MANUFACTURING PRACTICES IN GREENER PRODUCTION: A WAY TO REACH SUSTAINABILITY PROF. LOKPRIYA GAIKWAD 2018-09-27 PRESENTED AND PUBLISHED INTERNATIONAL IIIE Role of Lean Manufacturing practices in Greener production to attain the organizational goal of sustainability.
IMPROVING QUALITY OF SERVICE OF WSN NETWORK BY DADA AGGRIGATION MS. PRIYANKA KADAM 2018-09-26 PRESENTED AND PUBLISHED INTERNATIONAL 4TH INTERNATIONAL CONFERENCE ON ENGINEERING CONFLUENCE & INAUGURATION OF LOTFI ZADEH CENTER OF EXCELLENCE IN HEALTH SCIENCE AND TECHNOLOGY (LZCODE) - EQUINOX 2018 Data aggregation is a very crucial technique in WSNs. Data aggregation helps in reducing the energy consumption by eliminating redundancy. Currently, most of the existing works focus on constructing DATs according to different user requirements under the Deterministic Network Model (DNM).due to the existence of many probabilistic lossy links in WSNs so the current work which spend lots of efforts on aggregation, so we mainly focus on DAT construction problem. The proposed, we focus on constructing a LoadBalanced Data Aggregation Tree (LBDAT) under the PNM, we define two new metrics potential load, and actual load. First we identify MIS(Independent nodes with respect to the root node) and connected MIS (Connecting Nodes). Finally, we calculate Load-Balanced Parent Node Assignment (LBPNA) structure by identifying links to be used across neighbouring nodes. The tree structure identified here will be utilized for communication across the leaf and root node of the network.
KINEMATIC SYNTHESIS OF OVERLAY WELDING STATION OF ELBOW DR. PRADIP PATIL 2018-09-26 PRESENTED AND PUBLISHED INTERNATIONAL TERNA COLLEGE OF ENGINEERING The purpose of this paper is to find the trajectory of serial manipulator for clad welding for an inside surface of an elbow.
A SURVEY OF NON LOCAL MEANS IMAGE DENOISING TECHNIQUE AND ITS VARIANTS MS. SWATI RANE 2018-09-21 PRESENTED AND PUBLISHED INTERNATIONAL International Conference on Innovations in Engineering , Technology and Sciences
AN IOT BASED SYSTEM FOR WATER QUALITY MONITORING MRS. PRANITA MAHAJAN 2018-09-07 PRESENTED INTERNATIONAL IEEE CHENNAI CHAPTER Potable water quality is important socioeconomic aspects. Many researchers developed various systems to ensure clean drinking water. The traditional system works by manually collecting the samples; manually analysis is done in laboratory causing delay and manual errors. Existing systems may reduce the errors but incur delay as analysis is not done at user site. A system is needed which will dynamically monitor and ensure water quality to users. Proposed system has various sensors to check and ensure water quality such as pH, temperature, conductivity, turbidity, ORP, Nitrate and free residual chlorine. Data is collected through sensors and send for further processing. LEDs deployed on the system are for general users to immediately identify about the quality of the water. The system aims to reduce the delay in existing systems by deploying indictors on system itself so that the person using the system will be able to decide whether water is safe to drink or not, which can avoid further health hazards. Implemented system is economical and dynamic in nature. Use of LEDs on system makes it user friendly and even common people can assure quality of water. System is specially designed for public places like schools and colleges
KINEMATIC SYNTHESIS OF OVERLAY WELDING STATION OF ELBOW DR. RUPENDRA NEHETE 2018-08-26 PRESENTED INTERNATIONAL TERNA ENGINEERING COLLEGE, NAVI MUMBAI EQUINOX 2018-4th INTERNATIONAL CONFERENCE ON ENGINEERING CONFLUENCE, TPCT's
REAL TIME POTHOLE DETECTION USING ANDROID SMARTPHONE AND IOT BASED APPROACH DR. RIZWANA SHAIKH 2018-01-28 PRESENTED INTERNATIONAL IEEE International Conference On Electrical, Electronics, Computers, Communication
PUBLIC AUDITING FOR SHARED DATA IN CLOUD STORAGE WITH AN EFFECTIVE USER DISMISSAL MRS. SAMUNDISWARY SRINIVASAN 2018-01-06 PRESENTED AND PUBLISHED INTERNATIONAL DEPT OF E & TC ENGINEERING,DBATU Cloud computing security-pucblic auditing
Title Author Date Paper Status Level Organizer Description
NUMERICAL AND EXPERIMENTAL ANALYSIS OF HEAT TRANSFER COEFFICIENT WITH OPTIMUM PRESSURE DROP IN TURBULATOR FITTED PIPE MR. AJAY HUNDIWALE 2018-04-10 PRESENTED AND PUBLISHED N/A IJCRT JOURNAL A S Hundiwale and et al. (2018), on 'NUMERICAL AND EXPERIMENTAL ANALYSIS OF HEAT TRANSFER COEFFICIENT WITH OPTIMUM PRESSURE DROP IN TURBULATOR FITTED PIPE' International Journal of Creative Research Thoughts (IJCRT), ISSN: 2320-2882, Volume 6, Issue 2
AUTO WASTE SEGREGATOR MS. VAISHALI MANGRULKAR 2018-04-07 PRESENTED AND PUBLISHED INTERNATIONAL DATTA MEGHE COLLEGE OF ENGINEERING Published paper in proceedings of International conference on Advanced Trends in Engineering(ICATE-2K18) April 2018
A SECURE E-GOVERNANCE MODEL USING ROLE-BASED DELEGATION DR. APARNA BANNORE 2018-02-12 PRESENTED AND PUBLISHED INTERNATIONAL THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY E-governance services are widespread with the Digital India drive. These services allow the confidential documents of citizens being stored with government in secured manner. Authorized users are allowed to access these documents. Currently, digital signatures are used as a means of authentication. For the purpose of improving the efficiency and transparency of the e-governance system, the task delegation can be performed. We propose the novel method of role delegation by using proxy signature scheme in forward secure manner. The proposed method is designed using elliptic curve cryptosystem (ECC) to make it suitable for portable devices. DOI https://doi.org/10.1007/978-981-13-1165-9_82
APPLICATIONS OF ELZAKI TRANSFORM TO SOLVE INTEGRAL EQUATIONS MR. MAHESH BIRADAR 2018-02-03 PRESENTED AND PUBLISHED NATIONAL VAIDYANATH COLLEGE, PARLI VAIJNATH Presented A Paper Entitled " Applications of Elzaki Transform To Solve Integral Equations" In The National Conference On " Recent Trends In Mathematics"
TEST CASE ANALYSIS OF ANDROID APPLICATION ANALYZER MS. BUSHRA SHAIKH 2018-01-19 PRESENTED AND PUBLISHED INTERNATIONAL DJ SANGHVI COE, ANDHERI An Android Application Analyzer (AAA) is a tool that helps user to detect malware in Android devices. In addition, it also provides provision to remove detected malware. The system detects various types of existing malware using a novel approach by learning behavior of Android Apps based on its permissions. Android Apps are generally using combination of permissions to perform their desired actions on the device such as reading from or writing to internal/external storage, accessing network or Bluetooth etc. In most of the cases, the malicious Apps use combination of permissions that may pose a risk to user. The implemented? system learns these malicious permissions of Apps by using data mining algorithm such as clustering and classification and classifies them either into harmful or safe. The paper discusses the test cases that show how the system is accurately able to classify malware by increasing the number of clusters size.
SMART TRASH - AN EFFICIENT WAY FOR MONITORING SOLID WASTE MS. SUVARNA CHAURE 2017-12-29 PRESENTED AND PUBLISHED INTERNATIONAL International Conference on Current Trends in Computer, Electrical, Electronics & Communication(ICCTCEEC) - 2017 ,(In press)Karnataka, IEEE
DYNAMIC MODELING AND SIMULATION OF DOUBLE-WISHBONE SUSPENSION SYSTEM USED IN ALL-TERRAIN VEHICLE(ATV) DR. PRADIP PATIL 2017-12-21 PRESENTED INTERNATIONAL V.J.T.I. MUMBAI Dynamic modelling and simulation of half-car model of ATV is developed to study the behaviour under different surface condition. The traditional approach for analyzing any suspension model is by considering the displacement of tyres in vertical direction neglecting the turning effect of suspension arms. The approach starts with the development of a fast and accurate vehicle model in MATLAB (Simulink) combined for testing the major parameters including the turning effect of suspension arms. The concurrence of the results with experimental testing shall offer validation.
ECC BASED PROXY SIGNATURE SCHEME WITH FORWARD SECURITY DR. APARNA BANNORE 2017-12-20 PRESENTED AND PUBLISHED INTERNATIONAL SPRINGER PUBLICATION ,ICIIT 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGIES, , ANNA UNIVERSITY, CHENNAI, TAMILNADU, INDIA The Proxy signatures have fascinated many applications which entail delegating signing rights or power of decision making to parties. Applications demanding multilevel authority delegation can be implemented using forward secured proxy systems distinctly from traditional use of forward secrecy in terms of protecting the signed documents from leakage by key exposure attack. In pre-sent decade, focus shift from using traditional desktop environment to portable mobile devices as well secured IOT's using digital signature or proxy signature. Elliptic curve cryptography (ECC) based proxy signature algorithms with forward secrecy is the effective alternative to the traditional digital signature scheme in constrained resources. In this paper, our exclusive focus is on forward secure proxy signature scheme using ECC which deals with proxy key pair generation and forward secure the proxy secret key.
PREPARATION AND TESTING OF COMPOSITES USING WASTE GROUNDNUT SHELLS AND COIR FIBRES MR. ONKAR POTADAR 2017-12-11 PRESENTED AND PUBLISHED INTERNATIONAL DBATU, LONERE Paper Titled "Preparation and Testing of Composites using Waste Groundnut Shells and Coir Fibres" Presented. https://doi.org/10.1016/j.promfg.2018.02.013
PREPARATION AND TESTING OF COMPOSITES USING WASTE GROUNDNUT SHELLS AND COIR FIBRES MR. GANESH KADAM 2017-12-11 PRESENTED AND PUBLISHED INTERNATIONAL ICMMD - MIT AURANGABAD AND DBATU LONERE Onkar V. Potadar, Ganesh S. Kadam, Preparation and Testing of Composites using Waste Groundnut Shells and Coir Fibres, Proceedings of 2nd International Conference on Materials, Manufacturing and Design Engineering (2017) - iCMMD 2017, 11-12th December 2017, Marathwada Institute of Technology (MIT), Aurangabad, Maharashtra, India.
GREEN COMPOSITES USING WASTE METAL SCRAP AND BIO-FIBRES MR. ONKAR POTADAR 2017-12-07 PRESENTED INTERNATIONAL IIT MADRAS Paper Presented at COPEN10 - 2017 at IIT Madras
GREEN COMPOSITES USING WASTE METAL SCRAP AND BIO-FIBRES MR. GANESH KADAM 2017-12-06 PRESENTED AND PUBLISHED INTERNATIONAL COPEN - IIT MADRAS Ganesh S. Kadam, Onkar V. Potadar, Green Composites using Waste Metal Scrap and Bio-fibres, Proceedings of 10th International Conference on Precision, Meso, Micro and Nano Engineering (2017) - COPEN-10: 2017, 6-9th December 2017, IIT Madras, Chennai, India.
A CONCEPTUAL FRAMEWORK FOR MANUFACTURING ORGANIZATION TO IMPLEMENT GREEN MANUFACTURING PROF. LOKPRIYA GAIKWAD 2017-12-03 PRESENTED INTERNATIONAL ASIA PACIFIC INDUSTRIAL ENGINEERING & MANAGEMENT SYSTEMS CONFERENCE Proceedings of the Asia Pacific Industrial Engineering & Management Systems Conference (APIEMS 2017), 3-6 Decemeber 2017, Yogyakarta, Indonesia.
BANDWIDTH COMPARISION FOR SIP AND IAX PROTOCOL THROUGH ASTERISK MS. PRIYANKA KADAM 2017-10-10 PRESENTED AND PUBLISHED INTERNATIONAL CDAC MUMBAI Initially Internet is used for data communicationbut now a days with the help of VoIP technology we are able to transmit voice and video streams over the internet. This paper describes IP-PBX server based on Asterisk. Asterisk is one of the first open source PBX software. Traditional EPABX system have many disadvantages over Internet Protocol Private Branch Exchange (IP-PBX). This paper contain brief introduction about SIP and IAX protocol along with its channel configuration in Asterisk. Bandwidth comparisons of SIP and IAX calls with two different codecs G.711 and GSM is done by online erlag's B software
PRESCRIPTIVE ANALYTICS FOR CUSTOMER RECOMMENDATION SYSTEM MRS. ANINDITA KHADE 2017-09-21 PRESENTED INTERNATIONAL EQUINOX Prescriptive Analytics for customer recommendation system
LEAN SIX SIGMA APPLICATIONS PROF. LOKPRIYA GAIKWAD 2017-09-21 PRESENTED INTERNATIONAL TCOE 3rd international Conference on Engineering Confluence (Equinox 2017), at Terna College of Engineering, Nerul, Sept. 21 - 23, 2017.
ULTRASONIC NAVIGATION BASED BLIND AID FOR THE VISUALLY IMPAIRED USING SENSORS DR. LAKSHMI KONDAKA 2017-09-21 PRESENTED AND PUBLISHED INTERNATIONAL SAVEETHA ENGINEERING COLLEGE, CHENNAI. "Ultrasonic navigation based blind aid for the visually impaired using sensors", IEEE conference organized on 21st and 22nd September,2017 by Saveetha Engineering college, Chennai.
SMART TRASH: AN EFFICIENT WAY FOR MONITORING SOLID WASTE MANAGEMENT MRS. UJWALA RAVALE 2017-09-07 PRESENTED INTERNATIONAL 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), IEEE "SMART TRASH - An Efficient Way of Solid Waste Management", International Conference on Current Trends in Computer, Electrical and Electronics Communication (ICCTCEEC- AUG 2017), IEEE.
SMART TRASH: AN EFFICIENT WAY FOR MONITORING MRS. NAMRATA PATEL 2017-09-06 PRESENTED AND PUBLISHED INTERNATIONAL CTCEEC Solid waste management is primary issue in modern cities due to increase population, change in our lifestyle and increased in number of industries. As we have seen number of times the dustbins get overflowed and the concerned people don't get the information within a time and due to which filthy condition formed around the surroundings, at the same time bad smell spread out due to waste, bad look of the city which paves the way for air pollution and to some harmful diseases around the locality which is easily spreadable. It creates unhygienic condition for the people and creates bad ugliness around the surroundings. This leads in spreading some deadly diseases & human illness, to avoid such a situation we are planning to design Solid Waste Management using Smart Bin. This will help to provide a better standard of living for people. Also the waste generated can be forwarded to recycling centers as well as biodegradation centers according to the type of waste.The major advantage of this proposed system is it will stop the dustbin overflowing around the road side and localities as smart bins are used in real time.
MEASURING DATA SECURITY FOR A CLOUD SERVICE DR. RIZWANA SHAIKH 2017-08-17 PRESENTED INTERNATIONAL 3rd International Conference On Computing, Communication And Automation (ICCUBEA-2017).
EFFECT OF RADIO LINK AND NETWORK LAYER PARAMETERS ON PERFORMANCE OF ZOLERTIA Z1 MOTES BASED 6LOWPAN DR. SHUBHANGI KHARCHE 2017-07-05 PRESENTED AND PUBLISHED INTERNATIONAL IEEE 8TH ICCCNT Unbeknownst the characteristics of radio link parameters and their effect on network performance it becomes difficult to work around the various constraints in low power lossy networks also known as IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN). Based on thorough experiments carried out on the test bed of real zolertia Z1 motes enabled with contiki operating system, the effect of link and network layer parameters on 6LoWPAN performance is analyzed. The performance of 6LoWPAN depends firstly on link metrics viz; radio signal strength indication (RSSI), packet reception ratio (PRR), packet error rate (PER) and link quality indication (LQI). Secondly on node metrics viz; energy consumption, memory occupancy and thirdly on network level metric viz; routing protocol convergence time, control overhead. It is found that the RPL protocol convergence time depends on both the link metrics RSSI and the channel check rate (CCR). Most importantly the node metric; energy consumption is found to be inversely proportional to the link metric RSSI. It is observed that the energy consumption in radio listening state is higher on an average by the factors of 11.64 and 24.66 than in radio transmitting and processing states respectively.
FATHOM: TEL ENVIRONMENT TO DEVELOP DIVERGENT AND CONVERGENT THINKING SKILLS IN SOFTWARE DESIGN DR. DEEPTI PATIL 2017-07-03 PRESENTED AND PUBLISHED INTERNATIONAL ADVANCED LEARNING TECHNOLOGIES (ICALT), 2017 IEEE 17TH INTERNATIONAL CONFERENCE ON. IEEE, 2017. Advanced Learning Technologies (ICALT), 2017 IEEE 17th International Conference on. IEEE, 2017.
PUBLIC AUDITING FOR SHARED DATA IN CLOUD WITH SAFE USER REVOCATION MRS. SAMUNDISWARY SRINIVASAN 2017-04-21 PRESENTED AND PUBLISHED INTERNATIONAL INTERNATION CONFERENCE ON ELECTRONICS COMMUNICATION AND AEROSPACE TECHNOLOGY Cloud computing security-Data Auditing
OBJECT STORAGE ARCHITECTURE IN CLOUD FOR UNSTRUCTURED DATA MRS. SAMUNDISWARY SRINIVASAN 2017-01-19 PRESENTED AND PUBLISHED INTERNATIONAL JCT COLLEGE OF ENGINEERING AND TECHNOLOGY Object storage-unstructured data
SMART THRASH :AN EFFICIENT WAY TO MONITOR SOLID WASTE MRS. ANINDITA KHADE 2016-06-01 PRESENTED INTERNATIONAL CTCEEC Smart Thrash :An efficient way to monitor solid waste
Title Author Date Paper Status Level Organizer Description
N- DIMENSIONAL POLAR FSK PROF. BIJU PILLAI 2017-03-23 PRESENTED AND PUBLISHED INTERNATIONAL IEEE Biju Balakrishnan "N- Dimensional Polar FSK," in the IEEE sponsored 6th International Conference on Computation of Power, Energy, Information & Communication, ICCPEIC-2017 at Melmaruvathur, Chennai, March 22-23, pp.018-022.
N- DIMENSIONAL QUADRATURE FREQUENCY SHIFT KEYING PROF. BIJU PILLAI 2017-03-23 PRESENTED AND PUBLISHED INTERNATIONAL IEEE Biju Balakrishnan "N- Dimensional Quadrature Frequency Shift Keying," in the IEEE sponsored 6th International Conference on Computation of Power, Energy, Information & Communication, ICCPEIC-2017 at Melmaruvathur, Chennai, March 22-23, pp. 049-052.
BANDWIDTH AND POWER EFFICIENT 3- DIMENSIONAL FSK PROF. BIJU PILLAI 2017-02-25 PRESENTED AND PUBLISHED INTERNATIONAL ICWET 2017 1. Biju Balakrishnan "Bandwidth and power efficient 3- Dimensional FSK," in the International Conference and Workshop on Electronics and Telecommunication Engineering, ICWET-2017 at Mumbai, February 24-25, pp. 56-61.
POWER AND SPECTRALLY EFFICIENT 4-DIMENSIONAL QUADRATURE FREQUENCY SHIFT KEYING PROF. BIJU PILLAI 2017-02-25 PRESENTED AND PUBLISHED INTERNATIONAL ICWET 2017 2. Biju Balakrishnan "Power and Spectrally Efficient 4-Dimensional Quadrature Frequency Shift Keying," in the International Conference and Workshop on Electronics and Telecommunication Engineering, ICWET-2017 at Mumbai, February 24-25, pp. 52-55.
DEVELOPMENT OF GEAR MEASURING MODEL FOR GEOMETRICAL MEASUREMENT OF SPUR GEARS MR. ONKAR POTADAR 2016-12-20 PRESENTED INTERNATIONAL DBATU, LONERE Paper Presented titled' Development of Gear Measuring Model for Geometrical Measurement of Spur Gears'.
IMAGE HASHING BY LOG-QCSLBP DR. VARSHA PATIL 2016-11-27 PRESENTED INTERNATIONAL ACM This paper presents an image hashing algorithm for authentication and tampering based on texture features. Center Symmetric Local Binary Pattern (CSLBP) feature is computationally simple, rotation invariant which works in spatial domain. In CSLBP, number of histogram bin for each sub block of an image is 16, unlike 256 bin in Local Binary Pattern (LBP). In our proposed method, flipped difference is used to generate a histogram of only 8 bin, for each sub block. Resultant method with 8 bin histogram has less discrimination power. To enhance discrimination power, Laplacian of Gaussian (LoG) is used as a weight factor during histogram construction. LoG is used to find a characteristic scale for a given image location. LoG is a second order derivative edge detection operator which performs well in presence of noise. In our previous papers, we tried various local descriptors like magnitude of difference, standard deviation, coefficient correlation as a weight factor, to enhance the success rate of compressed CSLBP. Proposed LoG-QCSLBP gives good results for JPEG, salt & pepper noise, brightness plus, increase/decrease contrast. In the results section, we compared all variants of compressed CSLBP. Results clearly show that by incorporating the weight of a local descriptor, discrimination power of compressed CSLBP is enhanced.
NODE LEVEL ENERGY CONSUMPTION ANALYSIS IN 6LOWPAN NETWORK USING REAL AND EMULATED ZOLERTIA Z1 MOTES DR. SHUBHANGI KHARCHE 2016-11-08 PRESENTED AND PUBLISHED INTERNATIONAL IEEE 10TH ANTS In IPv6 Over Low Power Wireless Personal Area Networks (6LoWPAN) the network reliability, availability and lifespan depends on the energy consumed by the wireless sensor motes as well as the network as a whole. In order to improve the aforementioned parameters the energy consumption must be kept at minimum. The mote and network level energy consumption is evaluated, analyzed for real and emulated Zolertia Z1 motes so as to know the factors on which it depends. The mote level energy consumption is evaluated based on the amount of current drawn and the supply voltage for the time spent by the mote in processing, transmitting and receiving the packets. To ease the evaluation on per mote basis a small scale 6LoWPAN is considered. The network level energy consumption is evaluated based on the routing protocol overhead, the neighbor discovery protocol (NDP) overhead, the received signal strength indication (Received Signal Strength Indication), the positions of the motes, the percentage duty cycle and various states of motes like processing, receiving and transmitting. Three major observations are drawn from the experiments and simulations; First, maximum energy is consumed at the mote level in receiving state and found to be higher than that in transmitting and processing states on an average by 10.94 and 27.24 percent respectively. Second, energy consumed at the network level depends on the composite effect of the received signal strength, average overhead bytes in control as well as in data packets, the percentage duty cycle of the motes and activities carried out by the motes in various states. Third, the data transmission efficiency of the motes depends on the received signal strengths.
JAYANT NARLIKAR AND INDIAN SCIENCE FICTION" DR. RAMKISHAN BHISE 2016-09-25 PRESENTED INTERNATIONAL MSK SINGH DEGREE COLLEGE OF ARTS&COMMERCE, KALYAN (W)AND M.G.E&W SOCIETY'S CENTER FOR HUMANITIES AND CULTURAL STUDIES , KALYAN Paper presented in one day Interdisciplinary National Conference on "Recent Trends in Humanities and commerce" on 25th September 2016 organized by MSK Singh degree college of Arts&commerce, Kalyan (W)and M.G.E&W society's Center for Humanities and cultural studies , Kalyan paper entitled as "Jayant Narlikar and Indian science fiction".
INTEGRATED APPROACH OF LEAN AND SIX SIGMA STRATEGIES TO IMPROVE OPERATIONAL PERFORMANANCE IN MANUFACTURING INDUSTRIES: A CASE STUDY PROF. LOKPRIYA GAIKWAD 2016-09-23 PRESENTED INTERNATIONAL FACULTY OF SCIENCE AND TECHNOLOGY, ICFAI FOUNDATION OF HIGHER EDUCATION, HYDERABAD, TELANGANA, INDIA 1st International Conference on Emerging Trends in Mechanical Engineering (ICETiME-2016) ), September 23-24, 2016 at Faculty of Science and Technology, ICFAI Foundation of Higher Education, Hyderabad, Telangana, India.
IMAGE HASHING BY SDQ-CSLBP DR. VARSHA PATIL 2016-09-23 PRESENTED AND PUBLISHED INTERNATIONAL INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) Approach for image hashing is to use powerful feature descriptor which captures essence of an image. Applications of image hashing lies in the area of content authentication, structural tampering detection, retrieval and recognition. Hashing is a compact summarized information of an image. Center Symmetric Local Binary Pattern (CSLBP) is one of the powerful texture feature descriptor which captures the smallest amount of change. Using CSLBP, appressed hash code can be obtained for an image. If CSLBP feature is weighted by a boost factor, it will enhance success rate of an image hashing. The proposed method of SDQ-CSLBP extract texture feature using CSLBP with standard deviation as weight factor. Standard deviation which represents local contrast is also a powerful descriptor. Resultant histogram of CSLBP is of 16 bin for each block of an image. Further it can be compressed to 8 bin by using the flipped difference concept. Without a weight factor, compressed CSLBP has low discrimination power. Experimental results show that the proposed method is robust against content preserving manipulation and sensitive to content changing and structural tampering.
"THEME OF ARTIFICIAL INTELLIGENCE IN JAYANT NARLIKAR'S SCIENCE FICTION" DR. RAMKISHAN BHISE 2016-09-23 PRESENTED INTERNATIONAL HIGHER EDUCATION & RESEARCH SOCIETY, NAVI MUMBAI Paper presented in International conference on "Literature, culture and world peace" organized by Higher Education & Research Society, Navi Mumbai at Pune on 23rd and 24th September 2016 paper entitled as "Theme of Artificial Intelligence in Jayant Narlikar's Science Fiction"
14N NQR SPECTROMETER FOR EXPLOSIVE DETECTION: A REVIEW DR. PREETI HEMNANI 2016-09-10 PRESENTED AND PUBLISHED INTERNATIONAL IIIT PUNE The explosive detection via NQR is based on presence of 14 N as all explosives usually contain nitrogen. The detected nitrogen nuclei contained in explosives and other nitrogen containing materials gives different frequencies and also different explosives have their own NQR frequencies, explosives can be detected and uniquely identified by 14 N NQR frequency. A Review on research and development in the field of detection of 14 N using NQR has been presented in this paper.
EXPERT SYSTEM FOR GENERATING TEACHING PLAN BASED ON MEASURABLE LEARNING OBJECTIVES AND ASSESSMENT DR. DEEPTI PATIL 2016-07-27 PRESENTED AND PUBLISHED INTERNATIONAL UNIVERSITY OF TEXAS, USA IEEE 16th International Conference on Advanced Learning Technologies (ICALT), 2016.
"NEW PERSPECTIVES IN CANADIAN STUDIES". DR. RAMKISHAN BHISE 2016-07-24 PRESENTED NATIONAL INDIAN COUNCIL OF LITERARY, SOCIAL, EDUCATIONAL AND CULTURAL RESEARCH AND UGC-HRDC, GUJARAT UNIVERSITY AHMEDABAD, GUJARAT, Paper presented in one day National Seminar on Canadian Studies organized by Indian Council of Literary, Social, Educational and Cultural Research and UGC-HRDC, Gujarat University Ahmedabad, Gujarat, India.24th July 2016paper entitled "New perspectives in Canadian studies".
IMAGE HASHING USING AQ-CSLBP WITH DOUBLE BIT QUANTIZATION DR. VARSHA PATIL 2016-06-09 PRESENTED AND PUBLISHED INTERNATIONAL IEEE This paper presents a novel image hashing method for authentication and tampering detection. Creation, modification and transfer of multimedia data becomes an easy task due to digitization. Integrity is very important for crucial and sensitive matters like medical records, legal matters, scientific research, forensic investigations and government documents. Image hashing is one of the popular method to maintain integrity of image. We proposed AQ-CSLBP (Average Compressed Center Symmetric Local Binary Pattern) as a feature descriptor for image hashing. First, image is divided into sub blocks, AQ-CSLBP is applied on each sub block to generate 8 bin histogram as a feature. Then, we used double bit quantization to generate hash code for the image. The proposed method is compared with the existing methods by way of quantitative analysis, it has been proved that the proposed method works well in authentication scenario with less hash length and more discrimination power.
IMAGE HASHING BY CCQ-CSLBP DR. VARSHA PATIL 2016-01-19 PRESENTED AND PUBLISHED INTERNATIONAL IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE) Recent trends and also statistics show that the hashing concept has been gaining importance because its application lies in the area of authentication, retrieval and recognition. The proposed hashing method CCQ-CSLBP (Compressed CSLBP with Correlation Coefficient) for authentication utilized correlation coefficient as a weight factor in CSLBP. CSLBP is a texture operator, whose performance is better than LBP, in terms of rotation invariance, differentiation power and less number of histogram bin. In CSLBP, histogram of each sub block is represented by 16 bin. Reduction in number of histogram bin is achieved by the flipped difference concept. Proposed method takes the advantage of correlation coefficient as a boosting factor during histogram construction, to increase the discrimination power of compressed CSLBP. With the use of correlation coefficient, results of CSLBP improved, in terms TPR and FPR. CCQ-CSLBP is evaluated, based on normalized hamming distance and ROC characteristics.
FPGA BASED RF PULSE GENERATOR FOR NQR/NMR SPECTROMETER DR. PREETI HEMNANI 2015-09-08 PRESENTED INTERNATIONAL RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY, KOCHI, INDIA A FPGA based radio frequency source and pulse programmer for NQR is described. With the use of direct digital synthesis (DDS), the RF source has the ability to yield RF signal with short switching time and high resolution in frequency and phase. To facilitate the generation of RF pulses, pulse programmer implemented in FPGA, is also used as auxiliary controller of DDS. The pulse programmer controls the DDS to generate RF pulses according to predefined parameters.
Title Author Date Paper Status Level Organizer Description
TEACHING AND LEARNING OF DIVERGENT AND CONVERGENT THINKING THROUGH OPEN-PROBLEM SOLVING IN A DATA STRUCTURES COURSE DR. DEEPTI PATIL 2016-04-13 PRESENTED AND PUBLISHED INTERNATIONAL IITB IEEE International Conference on Learning and Teaching in Computing and Engineering (LaTiCE), 2016.
ADAPTIVE ECHO CANCELLATION IN VOIP NETWORK MS. PRIYANKA KADAM 2016-03-17 PRESENTED AND PUBLISHED INTERNATIONAL In VoIP communication acoustic echo is one of the important issue which reduces the quality communication. To solve this problem adaptive filters are consider as an efficient solution. In this paper adaptive filters like LMS, NLMS RLS and dual-H filter are used for echo cancellation. Acoustic echo canceller is simulated by using MATLAB. To improve overall performance of VoIP network along with echo cancellation we tried to remove background noise. This paper also includes effect of packet drop, tail circuit delay and dual talk on VoIP network.
"VOICE CODING FOR VOIP NETWORK: A SURVEY" MS. PRIYANKA KADAM 2016-03-17 PRESENTED INTERNATIONAL IEEE Voice Coding for VoIP Network: A Survey
"CONVERSION OF SCIENTIFIC TRUTH TO NARRATIVE FICTION BY JAYANT NARLIKAR IN SHORT STORY 'BLACK HOLE'. DR. RAMKISHAN BHISE 2016-03-13 PRESENTED INTERNATIONAL ACS COLLEGE OF DHARNGAON, JALGAON Paper Presented in International conference on "contemporary Indian Languages and literature' on 13th and 14th March 2016 at ACS College of Dharngaon, Jalgaon paper entitled "Conversion of scientific truth to Narrative fiction by Jayant Narlikar in short story 'Black hole'.
"RATIONALITY VS SENTIMENTALITY IN JAYANT NARLIKAR'S GANPATI IDOL WITH RIGHT TRUNK" DR. RAMKISHAN BHISE 2016-03-05 PRESENTED NATIONAL INSTITUTE OF ADVANCED STUDIES IN ENGLISH AUNDH, PUNE Paper presented in National conference on "Recent Trends in English studies and Research organized Institute of Advanced Studies in English Aundh, Pune on 5th and 6th March 2016 paper entitled as "Rationality vs sentimentality in Jayant narlikar'sGanpati Idol with Right Trunk"
USE OF PROXY SIGNATURE IN E-GOVERNANCE DR. APARNA BANNORE 2016-03-04 PRESENTED AND PUBLISHED INTERNATIONAL PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR COMPETITIVE STRATEGIES E-Governance aims at producing citizen centric services ensuring services transparency with various government agencies. The process of approving or disapproving the application is marked by digitally signing and forwarding the e-documents. Present digital signature scheme provides the required security using identity based authentication mechanism, but in case of delegating power to third party authority for short period requires additional scheme ie Proxy signature system a variant of digital signature. Furthermore the identity based authentication scheme required to be changed to role base authentication using proxy signatures to protect from signature forgery attack and misuse by delegated authority.
"RATIONALITY VS SENTIMENTALITY IN JAYANT NARLIKAR'S 'BLACKHOLE'." DR. RAMKISHAN BHISE 2016-03-04 PRESENTED NATIONAL BVDU PUNE'S YASHWANTRAOMOHITE COLLEGE OF ARTS, SCIENCE, AND COMMERCE , PUNE Paper presented in National conference on "Indian English literature in the 21st century organized by BVDU Pune's yashwantraoMohite college of Arts, science, and commerce , Pune on 4th March 2016 paper entitled as "Rationality vs sentimentality in Jayant narlikar's 'Blackhole'."
"SCREEN ADAPTION OF BOLLYWOOD MOVIE: DEVDAS" DR. RAMKISHAN BHISE 2016-02-27 PRESENTED NATIONAL VIVEKANAND COLLEGE, SAMARTH NAGAR, AURANGABAD Paper presented in One Day National Seminar on Film and Literature" on 27 Feb. 2016 Organized by Vivekanand College, Samarth Nagar, Aurangabad paper entitled as "Screen Adaption of Bollywood movie: Devdas"
PERFORMING CUSTOMER BEHAVIOUR ANALYSIS USING BIG DATA ANALYTICS MRS. ANINDITA KHADE 2016-02-26 PRESENTED INTERNATIONAL ICCCV 2016 Performing Customer Behaviour Analysis using Big data analytics
SUSTAINABILITY IN SUPPLY CHAIN MANAGEMENT: A LITERATURE REV PROF. LOKPRIYA GAIKWAD 2015-11-27 PRESENTED INTERNATIONAL SARDAR VALLABHBHAI PATEL NATIONAL INSTITUTE OF TECHNOLOGY, SURAT, 3rd international Conference on Industrial Engineering (ICIE 2015), at Sardar Vallabhbhai Patel National Institute of Technology, Surat, Novemeber 26 - 28, 2015
INTEGRATED APPROACH OF LEAN - GREEN MANUFACTURING PRACTICES FOR SUSTAINABLE FUTURE OF LIFE AND BUSINESS PROF. LOKPRIYA GAIKWAD 2015-11-26 PRESENTED INTERNATIONAL SARDAR VALLABHBHAI PATEL NATIONAL INSTITUTE OF TECHNOLOGY, SURAT 3rd international Conference on Industrial Engineering (ICIE 2015), at Sardar Vallabhbhai Patel National Institute of Technology, Surat, Novemeber 26 - 28, 2015.
Title Author Date Paper Status Level Organizer Description
PRESERVING PRIVACY OF DATA IN DISTRIBUTED SYSTEMS USING HOMOMORPHIC ENCRYPTION MRS. NAMRATA PATEL 2020-03-11 PRESENTED AND PUBLISHED INTERNATIONAL ICACIE2019 Abstract​— ​Distributed systems like cloud platforms are being used widely in recent times. However, such platforms face a major issue of data storage on cloud in terms of security. If data on the cloud is not encrypted, it can be accessed by unauthorized members. This violates the confidentiality of the data. If data is stored in an encrypted format, every authorized party member will have to decrypt the data first in order to perform operations on it, and then encrypt it back to upload it on the distributed platform. This has to be done every time every member performs operations on data. Needles to say, it complicates the entire procedure of sharing data and a lot of time is wasted in encrypting and decrypting data even for small operations like searching and sorting. ​To avoid these complications, this paper suggests a way to store data on cloud by homomorphically encrypting it. Homomorphic encryption allows user to compute on encrypted data without the need of decrypting it. In this paper Elliptic Curve Cryptography(ECC) is used for homomorphic encryption of data. The size of the cipher text generated by ECC is smaller than the cipher text generated by other encryption schemes. As cloud is mostly used for storing databases this paper further employs searching and sorting techniques on the encrypted data.
INVESTIGATIONS OF LATITUDINAL TEC VARIATION DURING GEOMAGNETIC STORMS IN THE INDIAN SUB-CONTINENT IN THE EQUINOX MONT MS. SUMITRA IYER 2019-12-06 PRESENTED INTERNATIONAL SRM DELHI 5th International Conference on Intelligent Computing and Applications (ICICA-2019),
IMAGE MINING USING MULTIPLE FEATURES DR. VARSHA PATIL 2019-02-23 PRESENTED AND PUBLISHED INTERNATIONAL SPRINGER This paper discusses an image mining algorithm for efficient and accurate image retrieval. The proposed method uses multiple image features combination. Color feature in the form of 1st order, 2nd order and 3rd order moment is calculated on a sub-block. These moments calculates statistics features over a local region. The computed first order moment is considered as mean. Standard deviation and skewness is considered as second order and third order moment respectively. These features are calculated for images and stored in database. For texture extraction, Center Symmetric Local Binary Pattern (CSLBP) feature is used. CSLBP is straightforward in computation and it is also rotation consistent. CSLBP generates histogram of 16 bin for one sub-block. In order to capture minute details around local region, Laplacian of Gaussian (LoG) is used as a weight factor during CSLBP histogram construction. This weight factor makes texture feature more powerful and increases its discrimination power. Resultant weighted histogram is quantized and binary result is stored in database. For test image, its texture and color features compared with stored texture and color features. Based on color and texture feature’s correlation with test image, results are retrieved. Our results clearly shows that, by incorporating the multiple features as well as local weight factor, the proposed image mining gives desirable retrieval results.
DEVELOPMENT OF FACILITY LAYOUT FOR MEDIUM-SCALE INDUSTRY USING SYSTEMATIC LAYOUT PLANNING MR. ONKAR POTADAR 2018-07-20 PRESENTED AND PUBLISHED INTERNATIONAL D J SANGHVI COLLEGE OF ENGINEERING, VILE PARLE, MUMBAI Paper Titled "Development of Facility Layout for Medium-Scale Industry Using Systematic Layout Planning", Presented in the conference. https://doi.org/10.1007/978-981-13-2490-1_43
SCIENCE FICTION: LITERATURE OF FUTURE DR. RAMKISHAN BHISE 2015-10-09 PRESENTED INTERNATIONAL N.G.ACHARYA AND D.K. MARATHE, COLLEGE , CHEMBUR IN COLLABORATION WITH CENTER FOR HUMANITIES AND CULTURAL STUDIES, KALYAN Paper presented International conference on “New Trends in Humanities, Gender and cultural studies ” hosted by N.G.Acharya and D.K. Marathe, college , Chembur In collaboration with Center for Humanities and cultural studies, Kalyan on 09th and 10th October 2015 paper entitled as “science fiction: Literature of Future”.
CRYPTOGRAPHIC TECHNIQUES FOR WIRELESS SENSOR NETWORKS: A SURVEY MS. PRIYANKA KADAM 2015-09-10 PRESENTED AND PUBLISHED INTERNATIONAL IEEE BOMBAY SECTION The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).
THINKING, PAIRING, AND SHARING TO IMPROVE LEARNING AND ENGAGEMENT IN A DATA STRUCTURES AND ALGORITHMS (DSA) CLASS DR. DEEPTI PATIL 2015-04-10 PRESENTED AND PUBLISHED INTERNATIONAL TAIPEI, TAIWAN IEEE International Conference on Learning and Teaching in Computing and Engineering (LaTiCE), 2015.
A NOVEL APPROACH TO DETECT ANDROID MALWARE MS. BUSHRA SHAIKH 2015-03-26 PRESENTED AND PUBLISHED INTERNATIONAL DJ SANGHVI COE, ANDHERI This paper proposes a system which would help the users in analysing and removing such harmful apps and thereby protecting their security and privacy. This is achieved by analysing the various permissions used by an application that it has requested during installation. The overall process of analysing apps is done using clustering and classification techniques. The major objective of the proposed system is to detect and remove the malwares that are present in the user's Android device.
FEATURE SELECTION BASED HYBRID ANOMALY INTRUSION DETECTION SYSTEM USING K MEANS AND RBF KERNEL FUNCTION MRS. UJWALA RAVALE 2015-03-15 PRESENTED INTERNATIONAL INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA-2015) Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function, International Conference on Advanced Computing Technologies and Applications (ICACTA-2015, Procedia Computer Science 45 ( 2015 ) 428 - 435, Elsevier.
TRUST MODEL FOR MEASURING SECURITY STRENGTH OF CLOUD COMPUTING SERVICE DR. RIZWANA SHAIKH 2015-03-15 PRESENTED INTERNATIONAL Procedia Computer Science Journal, Volume 45, Pages 380-389, ISSN : 1877-0509, 2015.
TRUST MODEL FOR MEASURING SECURITY STRENGTH OF CLOUD COMPUTING SERVICE DR. RIZWANA SHAIKH 2015-03-15 PRESENTED INTERNATIONAL Procedia Computer Science Journal, Volume 45, Pages 380-389, ISSN : 1877-0509, 2015.
IMPACT OF RETRANSMISSION POLICIES ON PERFORMANCE OF CONCURRENT MULTIPATH TRANSFERS IN WIRELESS HETEROGENEOUS NETWORKS DR. SHUBHANGI KHARCHE 2014-10-11 PRESENTED AND PUBLISHED INTERNATIONAL IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS COMPUTERS AND COMMUNICATIONS Mobile devices with oodles of interfaces communicating concurrently through multi-homed access networks with a blend of wired and wireless transmission parameters need efficient data delivery. To suffice the need this paper investigates the impact of various retransmission policies, viz. RTX-SAME, RTX-ASAP, RTX-LOSSRATE, RTX-SSTRESH, RTX-CWND, AllRtxSame, AllRtxAlt and FrSameRtoAlt on the throughput of concurrent multipath transfers (CMT). The performance analysis for the first five policies being extended with partial reliability extension of Stream Control Transmission Protocol (PR-SCTP). The simulation was conducted using NS-2.35 on a multi-homed heterogeneous network with wired links and WiMAX, 3G, 4G and 5G specifications supporting wireless links. The paper validates that among the five basic retransmission policies RTX-ASAP performs best both for CMT using SCTP and for CMT using PR-SCTP. AllRtxAlt performs best for aggressive fail over case under dissimilar path loss rates.
"MAN AND MACHINE RELATIONSHIP IN JAYANT NARLIKAR'S SCIENCE FICTION" DR. RAMKISHAN BHISE 2014-09-12 PRESENTED INTERNATIONAL HIGHER EDUCATION & RESEARCH SOCIETY, NAVI MUMBAI Paper presented in International conference on "Fourth world literature and culture' organized by Higher Education & Research Society, Navi Mumbai at Pune on 12th and 13th September 2014 paper entitled as "Man and machine relationship in Jayant Narlikar's science fiction'
A COMPREHENSIVE OVERVIEW OF ARM ALGORITHMS IN REAL TIME INTER TRANSACTIONS MS. KRANTI BADE 2014-08-25 PRESENTED AND PUBLISHED INTERNATIONAL INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND TECHNOLOGY Association rule discovery from large databases is one of the tedious tasks in data mining. Most of the previous studies on mining association rules are on mining intra transaction associations, i.e., the associations among items within the same transaction where the notion of the transaction could be the items bought by the same customer, the events happened on the same day, etc. Mining intertransaction associations has more challenges on efficient processing than mining intratransaction associations because the number of potential association rules becomes extremely large after the boundary of transactions is broken. In this paper, we reviewed the notion of intertransaction association rule mining given by algorithms such as EH-Apriori and FITI. FTTI generates many unnecessary combinations of items because the set of extended items is much larger than the set of items. Thus, In order to provide efficient approach of g-based intertransaction association rule mining is used, where this group of transactions are following certain constraints. This paper helps to do comparative study of algorithms which will help in analyzing the predictions on stock market data.
STUDENT MODEL FOR AN INTELLIGENT LANGUAGE TUTORING SYSTEM. DR. DEEPTI PATIL 2014-07-08 PRESENTED AND PUBLISHED INTERNATIONAL GREECE Advanced Learning Technologies (ICALT), IEEE 17th International Conference on Advanced Learning Technologies (ICALT 2014), Athens, Greece, July 2014.
HYBRID AIR CONDITIONING SYSTEM MR. AJAY HUNDIWALE 2014-04-23 PRESENTED AND PUBLISHED INTERNATIONAL ISHPC 2014 M V Rane and A S Hundiwale (2014) on 'Hybrid Air Conditioning System' in ISHPC 2014 at Center for Environmental Energy, Engineering, University of Maryland, College Park USA.
JAYANT NARLIKAR AND INDIAN SCIENCE FICTION". DR. RAMKISHAN BHISE 2014-01-22 PRESENTED NATIONAL MAHATMA PHULEARTS, SCIENCE AND COMMERCE COLLEGE, PANVEL.DIST.-RAIGAD Paper presented in one day National Seminar on "Thematic Aspects in post-independence Indian English Literature "on 22nd January 2014 organized by Mahatma phuleArts, science and commerce college, Panvel.Dist.-Raigad the paper entitled "Jayant Narlikar and Indian science fiction'.
"THE THEME OF SCIENTIFIC REALISM IN JAYANT NARLIKARS SELECTED SCIENCE FICTION IN ENGLISH" DR. RAMKISHAN BHISE 2014-01-08 PRESENTED NATIONAL BALWANT COLLEGE, VITA,DIST.SANGALI Paper presented in National seminar on "Reflections on post-independence Indian English literature "organized by Balwant college, vita,Dist.sangali on 8th and 9th January-2014 paper entitled as "The theme of scientific realism in Jayant Narlikars selected science fiction in English'.
CRYPTOGRAPHY BASED ON COLOR SUBSTITUTION DR. APARNA BANNORE 2014-01-01 PRESENTED AND PUBLISHED INTERNATIONAL INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong. Computer SciencePublished 2014 DOI:10.5120/15967-5355
"RENDITION OF THE HISTORY IN AMITAV GHOSH'S - THE GLASS PALACE." DR. RAMKISHAN BHISE 2013-09-06 PRESENTED INTERNATIONAL HIGHER EDUCATION & RESEARCH SOCIETY, NAVI MUMBAI Paper presented in International seminar on' South Asian literature and culture "organized by Higher Education & Research Society, Navi Mumbai at Pune on 6th and 7th September 2013 paper entitled "Rendition of the history in Amitav Ghosh's 'the Glass Palace.'
THE THEME OF LOVE & MARRIAGE IN ANITA DESAI'S "CRY THE PEACOCK". DR. RAMKISHAN BHISE 2013-03-29 PRESENTED NATIONAL K.K.WAGHARTS, SCIENCE AND COMMERCE COLLEGE, PIMPALGAON(B) DIST. NASHIK (MS) Paper presented in National conference on "Indian Writing in English' by K.K.WaghArts, science and commerce college, Pimpalgaon(B) Dist. Nashik (MS) held from 29th and 30th March 2013 paper entitled "The theme of love & Marriage in Anita Desai's "Cry the Peacock'.
"A BRIEF ACCOUNT OF ORIGIN & DEVELOPMENT OF SCIENCE FICTION IN HINDI LANGUAGE" DR. RAMKISHAN BHISE 2013-02-01 PRESENTED INTERNATIONAL BHARATIVIDYAPEETHSYASHWANTRAOMOHITE COLLEGE, PUNE (MS) IN ASSOCIATION WITH VIGYANPRASAR NEW DELHI,MARATHIVIDNYANPARISHAD,MUMBAI& IASFS 14. Paper presented in First World Conference on 'Science Fiction Studies in India' by Bharatividyapeeth'sYashwantraoMohite College, Pune (MS) in association with VigyanPrasar New Delhi,MarathividnyanParishad,Mumbai& IASFS held from 1st and 2nd Feb.,2013 Papers entitled as "Evolution & Development of Science Fiction as a Genre' and "A Brief Account of Origin & Development of Science Fiction in Hindi Language'
ASSOCIATION RULE MINING USING GRAPH AND CLUSTERING TECHNIQUE MS. SEEMA REDEKAR 2012-11-03 PRESENTED AND PUBLISHED INTERNATIONAL IEEE INTERNATIONAL CONFERENCE Presented and published paper in IEEE Inernational Conference, "Comutational Intelligence and Communication Networks'(CICN-2012) at Mathura on 3-5 November, 2012.
"BEST PRACTICES IN TEACHING-LEARNING PROCESS OF ELT: A CELTA PERSPECTIVE". DR. RAMKISHAN BHISE 2012-10-05 PRESENTED AND PUBLISHED NATIONAL SHRI SHIVAJICOLLEGE, PARBHANI(MS) Paper presented in the Two Day National Seminar on "Best Practices and Student Involvement in Quality Enhancement' by Shri ShivajiCollege, Parbhani(MS) held from 5- 6 October 2012 paper entitled as "Best Practices in Teaching-Learning process of ELT: A CELTA Perspective'.
"EVOLUTION & DEVELOPMENT OF SCIENCE FICTION AS A GENRE" DR. RAMKISHAN BHISE 2012-02-01 PRESENTED INTERNATIONAL BHARATIVIDYAPEETHSYASHWANTRAOMOHITE COLLEGE, PUNE (MS) IN ASSOCIATION WITH VIGYANPRASAR NEW DELHI, MARATHIVIDNYANPARISHAD, MUMBAI& IASFS Paper presented in First World Conference on 'Science Fiction Studies in India' by Bharatividyapeeth'sYashwantraoMohite College, Pune (MS) in association with VigyanPrasar New Delhi, MarathividnyanParishad, Mumbai& IASFS held from 1st and 2nd Feb. 2013 Papers entitled as "Evolution & Development of Science Fiction as a Genre' and "A Brief Account of Origin & Development of Science Fiction in Hindi Language'
1. MICROSCOPIC STUDIES ON LEVEL DENSITY AND SPIN CUT OFF FACTOR DR. G. KANTHI MATHI 2011-12-26 PRESENTED AND PUBLISHED NATIONAL DAE-BRNS Nuclear level density and spin cut off factor calculations for high spin nuclei
SYSTEMATIC STUDY ON SHAPE EVOLUTIONS IN SUPERDEFORMED NUCLEI DR. G. KANTHI MATHI 2010-12-08 PRESENTED AND PUBLISHED NATIONAL DAE-BRNS Phase and Shape characterisitics of superdeformed nuclei
CATALYTIC OXIDATION OF ALCOHOLS USING TBHP AS AN OXIDANT OVER LAMO3 (M = CR, MN, CO, NI, FE) PEROVSKITES DR. SAVITA KATIYAR 2010-07-05 PRESENTED AND PUBLISHED INTERNATIONAL Presented as poster at International Conference on "Emerging Trends in Chemistry' January 5-7, 2010, Pune University, Pune, India.
2. INVESTIGATIONS OF FLUCTUATIONS ON PHASE TRANSITIONS IN LIGHT NUCLEI DR. G. KANTHI MATHI 2009-12-08 PRESENTED AND PUBLISHED INTERNATIONAL DAE-BRNS Phase transitions in high spin nuclei
CATALYTIC ACTIVITY STUDIES ON STRUCTURALLY ORDERED MATERIALS DR. SAVITA KATIYAR 2009-02-13 PRESENTED AND PUBLISHED LOCAL Presented as oral at "Research Scholars' Meet (RSM-2009)' February 13-14, 2009, Ramnarain Ruia College, Mumbai, India.
CHEMOSELECTIVE O-TERT-BUTOXYCARBONYLATION OF HYDROXY COMPOUNDS USING NALATIO4 AS A HETEROGENEOUS AND REUSABLE CATALYST DR. SAVITA KATIYAR 2008-11-23 PRESENTED AND PUBLISHED INTERNATIONAL Presented as oral at International Conference on "Recent Advances in Chemistry' November 23- 27, 2008, Karnatak University, Dharwad, Karnataka, India.
IMPROVEMENT IN RETURN LOSS OF HYBRID RING EQUAL POWER DIVIDER USING T EBG MS. PRANAVI MHATRE 2007-09-30 PRESENTED AND PUBLISHED INTERNATIONAL TERNA ENGINEERING COLLEGE Improvement in return loss of hybrid ring equal power divider using T EBG is presented in paper.

Important Links

© 2021 SIES Graduate School Of Technology. All Rights Reserved.
TOP