Sr.No |
Date |
Name of Topic |
Name of Event |
Name of Expert and Address |
Total No. of Students Participated |
1 |
25th February 2019 |
Hadoop & Mongo DB |
Workshop |
Dr.Sujoy Bhattacharya. |
95 |
2 |
06th February 2019 |
Website Development and Updating |
Workshop |
Mr.Devidas S. Thosar |
53 |
3 |
06th February 2019 |
Python Programming |
Workshop |
Ms.Priyanka S. Hase |
45 |
4 |
17th-18th July 2018 |
Java Programming and Its Scope |
Workshop |
Mr. Sunil Joshi(Chief Technical officer ) V2 Data Solution , Nashik |
70 |
5 |
10th July 2018 |
Internship & Opportunities in IT Industry |
Workshop |
Mr. Prasad Mahamuni, Founder of Dreampath, Navi Mumbai |
72 |
6 |
04th July 2018 |
Applications of IoT, Raspberry Pi, Aurdino in Industry |
Workshop |
Mr. Ketan K Sadhu from Sigma Trainers & Kit, Ahmedabad, Gujrat.
|
24 |
7 |
08th October 2018 |
Swachandi Kase jagave |
Workshop |
Dr. Shankar Borhade CIDCO College, Nashik |
113 |
Sr.No |
Date |
Name of Topic |
Name of Event |
Name of Expert and Address |
Total No. of Students Participated |
1 |
19th June 2017 |
Internet of Things |
Seminar |
Mr. Nilesh Dalavi & Team Infinityflair Ltd, Nashik |
103 |
2 |
05th July 2017 |
Android Development |
Workshop |
Mr. Prakash A Khande CEO- Emerging Technology , Nashik |
74 |
3 |
05th July 2017 |
Career Guidance Seminar |
Seminar |
Mr. Krishna Handge Director, Wow Infotech, Nashik. |
47 |
4 |
06th July 2017 |
Awareness on Project Development Based Learning , Skill Development & Placement |
Seminar |
Mr. Sunil Joshi Mr. So-So. Bandopadhyay Opulent Pvt Ltd, Pune & Nashik. |
51 |
5 |
28th July 2017 |
Red Hat Linux |
Seminar |
Mr. Aditya and Ms. Amrin Khayz- Director IRT Academy Nashik |
33 |
6 |
16th August 2017 |
Software Testing |
Seminar |
Mr. Rajiv Shirsalkar ,CEO- Lo tech Ltd, Nashik |
21 |
7 |
23rd August 2017 |
Seminar on Quantitative Aptitude & Exam Preparation |
Seminar |
Mr. Akansh Rastogi,FACE Software solution, Pune |
48 |
8 |
29th - 31st August 2017 |
CISCO Networking & Cyber Security |
Workshop |
Mr.Abhijit Bakale,Sr. Network Engineer | Public Speaker | Security Consultant |
16 |
9 |
11th - 13th September 2017 |
CISCO Networking & Cyber Security |
Workshop |
Mr. Vedant Rathi -CEO Udyogwardhini, Nashik |
26 |
10 |
22nd January 2018 |
Red hat Linux |
Workshop |
Mr. Tushar and Mr. Dushyant Joshi (IRT Technologies Pvt Ltd , Nashik) |
76 |
11 |
27th-28th February 2018 |
Blood Donation Camp |
Blood Donation Camp |
Delve 2K18 National Level technical Event |
54 |
12 |
19th March 2018 |
Latex |
Workshop |
Mr. Chetan Puri |
22 |
13 |
9th June 2018 |
Seminar on How to write resume and How to face interview and its challenges ?? |
Seminar |
Mr. Mahesh Lokare Infosys, Pune |
38 |
Sr.No |
Date |
Name of Topic |
Name of Event |
Name of Expert and Address |
Total No. of Students Participated |
1 |
26th-27th September 2013 |
Cyber Crime & Security |
Seminar |
Dr.Harnold D’Costa and Ms.Varsha Shinde,IQSS Pune |
105 |
2 |
30th September 2013 and 01st October 2013 |
MATLAB |
Workshop |
Prof.Devare,Assistant Professor,SSVPS,Dhule. |
42 |
3 |
10th November 2013 |
Hadoop |
Workshop |
Prof.Prerna Pingale,PVG,COE,Nashik |
60 |
4 |
20t21th February 2014 |
Delve 2K14 National Level technical Event (National Symposium) |
National Symposium |
Mr.Ashok Kataria and Mr.Sanghavi,Ashoka Buidcom,Nashik. |
2000 |
5 |
15th March 2014 |
NS3 |
Workshop |
Dr.Anil Holambe,Professor,COE,Osmanabad |
34 |
Sr.No |
Name of Staff |
Paper Title |
Name of Journal/Conference |
Published Year |
1 |
Mr. D. S. Thosar |
Cloud Security Using Graph Encryption |
IJERM |
2017-18 |
2 |
Mr. D. S. Thosar |
Taking In A Profound Single Picture Differentiate Enhancer From Multi-Introduction Pictures |
IJERM |
2017-18 |
3 |
Mr. D. S. Thosar |
An Overview On Programming Characterize Remote Sensor Arrange Challenges: Wireless Sensor Network. |
IJERM |
2017-18 |
4 |
Ms. Puja A. Chavan |
Ubiquitous Computing Applications And Projects: A Survey |
IJA-ERA |
2017-18 |
5 |
Ms. P.S. Tambe |
Analysis And Detection Of Suspicous Chats In Terrorism Using Word Substitution |
IJERM |
2017-18 |
6 |
Ms. P.S. Tambe |
Andriod Application For Employee Monitoring And Tracking System |
IJERM |
2017-18 |
7 |
Mr. D. S. Thosar |
Mobile-Based Health Care System Using Wireless Sensor Network |
IJERM |
2017-18 |
8 |
Mr. D. S. Thosar |
Ex-Cogitate Millimeter Waves In 5g Network For Smartphone |
IJERM |
2017-18 |
9 |
Mr. D. S. Thosar |
Review On Decentralized Access Control With Anonymous Authentication |
IJERM |
2017-18 |
10 |
Mr. D. S. Thosar |
Online Ticket Substantiation Using 2d Barcode Based Android Application System |
IJERM |
2017-18 |
11 |
Mr. D. S. Thosar |
Efficient Web Search Based On User Interest And Browsing History |
IJERM |
2017-18 |
12 |
Mr. D. S. Thosar |
Result Analysis: Decentralized Access Control With Anonymous Authentication |
IJERM |
2017-18 |
Sr.No |
Name of Staff |
Paper Title |
Name of Journal/Conference |
Published Year |
1 |
Mr. R S. Bhalerao |
Universal Network Of Intelligent Traffic System |
IJSRD |
2016-17 |
2 |
Mr. R S. Bhalerao |
Pedestrian Detection By Fusing 3d Points And Color Images |
IJARIIE |
2016-17 |
3 |
Ms.T.P.Aher |
Bug Triage With Software Data |
IJARCET |
2016-17 |
4 |
Ms.T.P.Aher |
A Literature Review On Bug Triage With Software Data Reduction Techniques |
IJMETR |
2016-17 |
5 |
Mr.Gagare G.J. |
Cyber Emotion Extraction Using Intrinsic And Extrinsic Domains: An Aid For Product Aspect Ranking |
IJIRCCE |
2016-17 |
5 |
Mr.Gagare G.J. |
Cyber Emotion Extraction Using Intrinsic And Extrinsic Domains: An Aid For Product Aspect Ranking |
IJIRCCE |
2016-17 |
6 |
Mr.Patole U.R. |
A Powerful Technique For Maintaining Privacy Of Images On Content Sharing Sites |
IJARIIE |
2016-17 |
7 |
Mr.C.G.Puri. |
Extract User Tweet Post Location & Detect Social And Disastrous Event Using Ner & Pos Tags |
IJECE |
2016-17 |
8 |
Mr.Shedge K.N. |
Review Persual In A Cross Language Framework |
IJCA |
2016-17 |
9 |
Mr.Shedge K.N. |
Data Hiding Techniques In Video For Data Security |
IJIRSET |
2016-17 |
10 |
Mr.Shedge K.N. |
Institute Staff Managment Using Android Phone |
IJIRCCE |
2016-17 |
11 |
Mr.Tambe P.M. |
A Survey On: Android System For Public Services |
IRJET |
2016-17 |
12 |
Mr.Rokade S.M. |
Video Liveness Verification And Content Base Video Retrieval |
IJSTMR |
2016-17 |
13 |
Mr.Thosar D.S. |
Social Set Analysis: A New Approach To Big Data Analysis |
IJIR |
2016-17 |
14 |
Mr.Thosar D.S. |
Detecting Malicious Facebook Applications Using Machine Learning Algorithm |
IJIR |
2016-17 |
15 |
Mr.Thosar D.S. |
Design And Development Of Obstacle Detection System For Ground Clearance Vehicle |
IJIR |
2016-17 |
16 |
Mr.Thosar D.S. |
Design And Development Of Obstacle Detection System For Ground Clearance Vehicle |
IJIR |
2016-17 |
17 |
Mr.Thosar D.S. |
Big Data Opinion Analysis System For Social Set |
IJARIIE |
2016-17 |
18 |
Mr.Shedge K.N. |
Digital Copyright Protection For Multimedia |
IJIR |
2016-17 |
19 |
Mr.Shedge K.N. |
Mobile Theft Tracking Application |
IRJET |
2016-17 |
20 |
Mr.Shedge K.N. |
Digital Copyright Protection For Multimedia |
IJARIIE |
2016-17 |
21 |
Mr.Shedge K.N. |
Advertisement Recommendation Using Social Media |
IJIR |
2016-17 |
22 |
Mr.Nangare R.B. |
Ranking Fraud Detection System For Mobile Apps |
IJARIIE |
2016-17 |
23 |
Mr.Nangare R.B. |
A Survey On: Load Balancing And De-Duplication In Cloud Computing |
IJARIIE |
2016-17 |
24 |
Mr.Nangare R.B. |
Facepattern: A New Technique For Better Graphical Password |
IJARIIE |
2016-17 |
25 |
Mr.Wagh M.B. |
Smart Parking System Using Gsm |
IJIR |
2016-17 |
26 |
Mr.Bhosale R.B. |
Intelligent Traffic Signal Controller Using Rfid |
IJARIIE |
2016-17 |
27 |
Ms.T.P.Aher |
Content Based Smart Crawler For Efficiently Harvesting Deep Web Interface |
IJARIIE |
2016-17 |
28 |
Ms.Aher P.S. |
Buzybeenewz: Android Application For News Recommendation |
IJARIIE |
2016-17 |
29 |
Mr.Tambe P.M. |
Aspas: An Android Application |
IJARIIE |
2016-17 |
30 |
Mr.U.R. Patole |
Android Application For Single Phase Motor Control Using Ivrs & Gsm System. |
IJARIIE |
2016-17 |
31 |
Mr.U.R. Patole |
Android Application For Single Phase Motor Control Using Ivrs & Gsm System. |
IJARIIE |
2016-17 |
32 |
Mr.Rokade S.M. |
Android Application For Single Phase Motor Control Using Ivrs & Gsm System. |
IJARIIE |
2016-17 |
33 |
Mr.Bhosale R.B. |
An Efficient Nearest Keyword Set Search In Multidimensional Dataset |
IRJET |
2016-17 |
Sr.No |
Name of Staff |
Paper Title |
Name of Journal/Conference |
Published Year |
1 |
Mr. Shedge K.N. |
Word Segmntation Method For Hand Written Documents Based On Structed Learning |
IRJET |
2015-16 |
2 |
Mr. Shedge K.N. |
A Review On Hybrid Approach For Game Tree Search On Gpu And Cpu |
IJIRCCE |
2015-16 |
3 |
Mr. Thosar D.S. |
A Survey On Secured Biometrics Based Automatic Voting Machine |
IJIRCCE |
2015-16 |
4 |
Mr. Shedge K.N. |
Carp : Cptcha As A Graphical Password Based Authenticaiton Scheme |
IJARCCE |
2015-16 |
5 |
Mr. Shedge K.N. |
Analyzing The Views And Reviews In A Cross Language Framework |
IJARSE |
2015-16 |
6 |
Mr. Bhalerao R.S. |
Face Detection, Reorganization And Tracking From Video |
IJIFR |
2015-16 |
7 |
Mr. Shedge K.N. |
Multicloud Architecuter To Enhancce Security And Privacy By Using Attribute Based Encryption |
IJMER |
2015-16 |
8 |
Mr. Shedge K.N. |
A Novel Graphical Password Based Authentication Method Using Captcha |
IJIFR |
2015-16 |
9 |
Ms.Gaikawad P.B. |
Cloud Based Service Migration With Qos |
IJETER |
2015-16 |
10 |
Ms.Gaikawad P.B. |
E-Farming An Interface For Indian Farming |
IRJET |
2015-16 |
11 |
Mr.Bhalerao R.S. |
Public Auditing Of Dynamic Big Data Storage |
IJIFR |
2015-16 |
12 |
Mr.Bhosale R.B. |
Multi-Decision Tree Based Intrusion Detection System |
IJSETR |
2015-16 |
13 |
Ms.Naoghare M.M. |
Keyword Query Search Using Kerg |
IJSR |
2015-16 |
14 |
Ms.Chavan P.A. |
Video Scene Text Deblurring Using Text-Specific Multiscale Dictionaries: A Survey |
IJSETR |
2015-16 |
15 |
Mr.Gade S.A. |
Multitier Web Application & Internal Database Security By Double Guard |
IJETAE |
2015-16 |
16 |
Mr.Gade S.A. |
Accessing Cloud Services Using Graphical |
IRJET |
2015-16 |
17 |
Mr.Gade S.A. |
Minutiae Fingerprint Reconstruction To Image |
IRJET |
2015-16 |
18 |
Mr.Gade S.A. |
Security For Data Storage In Cloud Computing |
IJESRT |
2015-16 |
19 |
Mr.D.P. Umbarkar . |
A Low Power Consumption Scheme For Wireless Network |
IRJET |
2015-16 |
20 |
Mr.Gagare G.J. |
Different Approaches For The Removal Of Different Valued Salt And Pepper Noise In Images Using Spartan 3 |
IJARCCE |
2015-16 |
21 |
Mr.Gagare G.J. |
Multimedia Based Information Retrival Approach For Lecture Video Indexing Based On Video Segmentation And Optical Character Recognition |
IJARCCE |
2015-16 |
22 |
Mr.Gagare G.J. |
Towards Effective Troubleshooting With Data Truncation |
IJARCCE |
2015-16 |
23 |
Mr.Gagare G.J. |
Extraction And Analysis Of Cuber Emotions: A Tool For Global Marketing |
JRRET |
2015-16 |
24 |
Mr.Thosar D.S. |
Bus Tracking And Bus Failure Detection System Using GPS |
IRJET |
2015-16 |
25 |
Mr.Rokade S.M. |
Multimedia Answer Generation Using Live Web Resources |
IJMER |
2015-16 |
26 |
Mr.Rokade S.M. |
Preprocessing Imbalanced Dataset Using Oversampling |
JRRET |
2015-16 |
27 |
Mr.Rokade S.M. |
Implementation Concept For Advanced Client Repudiation Diverge Auditor In Public Cloud |
IJERGS |
2015-16 |
28 |
Mr.Pokharkar S.T. |
Internal & External Database Security In Three Tire Web Application By Double Guard |
IJIFR |
2015-16 |
29 |
Mr.Pokharkar S.T. |
Automatic Computerized Control Of Canal In Irrigation |
IRJET |
2015-16 |
30 |
Mr.Puri C.G. |
Segment-Based Real Time Event Extraction From Twitter Using Named Entity Recognition & Microsoft Web N-Gram Services |
IJIFR |
2015-16 |
31 |
Mr.Dhote S.B. |
User Profile Based Friend Recommendation System For Social Network
|
IJMER |
2015-16 |
Sr.No |
Name of Staff |
Paper Title |
Name of Journal/Conference |
Published Year |
1 |
Mr. Rokade S.M. |
Multimedia Answer Generation: Enhancing Text Qa With Media Information |
IJIFR |
2014-15 |
2 |
Mr. Rokade S.M. |
Real Time Indian Sign Language Recognition System To Aid Deaf-Dumb People Using Color Edge Detection Algorithm |
IJESRT |
2014-15 |
3 |
Mr. Rokade S.M. |
Saliency Approach To Extract Object From Video Via Kinect Sensor |
IJETIE |
2014-15 |
4 |
Ms.Gaikawad P.B. |
Review Of Qos Based Service Populating For Cloud Based Mobile Apps |
IJCSIT |
2014-15 |
5 |
Ms.Gaikawad P.B. |
Providing More Security Using Graphical Password: Carp |
IJIFR |
2014-15 |
6 |
Ms.Naoghare M.M. |
Applications Of Elliptic Curve Cryptography |
IJCSIT |
2014-15 |
7 |
Ms.Naoghare M.M. |
Analysis And Modelling Of Advanced Content Based Mobile Search Engine |
IJCTEE |
2014-15 |
8 |
Ms.Naoghare M.M. |
Secure Intrusion Detection System Against Ddos In Manets Using Acknowledgement |
IJCTET |
2014-15 |
9 |
Ms.Naoghare M.M. |
Advanced Content Based Mobile Search Engine |
IJSR |
2014-15 |
10 |
Ms.Naoghare M.M. |
An Improved Technique For Document Clustering |
IJTRA |
2014-15 |
11 |
Ms.Naoghare M.M. |
Routing Keyword Search Using Kerg |
IJSR |
2014-15 |
12 |
Ms.Naoghare M.M. |
Performance Measurement Of Keyword Search System |
IJSR |
2014-15 |
13 |
Mr.Puri C.G. |
3d Touchless Fingerprint Recognition With Identical Twin Fingerprints |
IJMER |
2014-15 |
14 |
Mr.Thosar D.S. |
User Monitoring System Using LAN |
IJERT |
2014-15 |
15 |
Mr.Thosar D.S. |
Secure Knn Query Processing In Entrusted Cloud Environments |
Asian Journal Convergence inTechnology |
2014-15 |
16 |
Mr.Thosar D.S. |
User Controlling System Using LAN |
Asian Journal Convergence inTechnology |
2014-15 |
17 |
Mr.Thosar D.S. |
An Execution Of Intrusion Detection System By Using Genetic Algorithm |
IJIFR |
2014-15 |
18 |
Mr.Shedge K.N. |
Virtualization Technique To Optimize Cloud Resources For Delivering Secured And Simplified Iptv Service |
IJCSMC |
2014-15 |
19 |
Mr.Shedge K.N. |
Finding Dos Attack Detection Using Multivariate Correlation Analysis |
IJIFR |
2014-15 |
20 |
Mr.Shedge K.N. |
Multi-Cloud Environment Cryptosystem For Scalable Data Sharing |
IJIFR |
2014-15 |
21 |
Mr.Shedge K.N. |
Multicloud Architecture To Enhance Security And Privacy |
IJIFR |
2014-15 |
22 |
Mr.Patole U.R. |
Autonomous Encoding Of Packets In Wireless Sensor Network |
IJEATE |
2014-15 |
23 |
Mr.Pokharkar S.T. |
HTTP And Database Protection In Multi Tier Application |
IJIFR |
2014-15 |
24 |
Mr.Pokharkar S.T. |
Enhancing Security Of HTTP & Database In Multitier Web Application |
IJIFR |
2014-15 |
25 |
Mr.Bhosale R.B. |
Cooperative Machine Learning For Intrusion Detection System |
IJSER |
2014-15 |
26 |
Mr.Tambe P.M. |
Tgi Module For Social Tagging System |
IJARCET |
2014-15 |
Sr.No |
Name of Staff |
Paper Title |
Name of Journal/Conference |
Published Year |
1 |
Mr.Gade S.A. |
Front End And Back End Database Protection From Intruders In Distributed Web Application |
IJEATE |
2013-14 |
2 |
Mr.Gade S.A. |
Gsm Networked Dtmf Based Smart Password Entry System |
IJMER |
2013-14 |
3 |
Mr.Gade S.A. |
Pccp Technique As A Safety Provider Against Issue Of Highly Impacting Online Password Guessing Attacks |
IJETAE |
2013-14 |
4 |
Mr.Puri C.G. |
Web Based Admission System |
IJEATE |
2013-14 |
5 |
Mr.Londhe S.V. |
Bluetooth File Transfer With Breakpoint |
IJMER |
2013-14 |
6 |
Mr.Rokade S.M. |
Document Clustering For Forensic Analysis & Investigation |
IJMER |
2013-14 |
7 |
Mr.Rokade S.M. |
Applying Qos Base Data Replication Attributes In Clouds |
IJMER |
2013-14 |
8 |
Ms.Naoghare M.M. |
A Review Of Intrusion Detection System For Web Based Application |
IJMER |
2013-14 |
9 |
Ms.Naoghare M.M. |
Efficiently Securing Privacy Of User Information In Cloudbased Health Monitoring System |
IJMER |
2013-14 |
10 |
Ms.Kuyate Pooja. |
Auditing Protocols A New Approach For Security Of Cloud Data |
IJMER |
2013-14 |
11 |
Ms.Gaikawad P.B. |
Cloud Based Mobile Service Delivery Using Qos Mechanism |
IJMER |
2013-14 |