Back to Top

About

To associate myself with a professionally run business organization, that has potential for growth, both organizational and personal, in dynamic environment o f IT industry, and to contribute to each & every success of organization honestly & ethically.

View more >>

Skills

Experience

Organization
Assistant Professor

H.S.B.P.V.Ts, Parikrama Group of Institutions, Faculty of Engineering,...

Sep-2009 to Present
Organization
Software Engineer

Onika Interactive Goregaon(W), Mumbai

Sep-2007 to Aug-2009
Organization
Lecturer

P.D.V.V.P. College of Engineering, Ahmednagar

Sep-2007 to Aug-2009

Education

placeholder
Raja Mahindra C.O.E. Ibrahimpatnam, R.R. Dist -501506.

M. Tech. in Computer Science & Engineering

Passout Year: 2013
placeholder
T.P.C.T . College of Engineering, Osmanabad

B.E. in Computer Science & Engineering

Passout Year: 2005
placeholder
M. S. Board Aurangabad.

H.S.C.

Passout Year: 2000
placeholder
Dr. A .P.J. Abdul Kalam University, Dewas B ypass Road Indore M .P.

Ph.D. in Computer Science & Engineering

Pursuing
placeholder
Shri Ram Vidyalaya, Pimpalgaon Malvi AhmedNagar.

S.S.C.

Pursuing

Publication

  • dott image February, 2018

Digital Image with QR Image Sharing by Diverse Image Media with Secret Key

Journal : International Journal of Computer Engineering and Applications [IJCEA ]

Digital Image Sharing by Diverse Image Media

Journal : International Journal for Science and Advance R esearch in Technology [IJSART]

A review on Location Aware Keywo rd Query Suggestion Based on Document Proxy

Journal : International Journal of Innovative Research In Communication Engineering [IJIRCCE]

Visual Cryptography in Internet Voting System

Journal : International Publisher for Advanced Scientific Journals (IPASJ)

  • dott image September, 2015

Examination of a New Defense Mechanism: Honeywords

Journal : International Journal of Engineering Trends a nd Technology (IJETT)

A Remote smart data backup techn ique using cloud computing

Journal : International Engineering Research Journal (IERJ)

Stock Prediction by using Artificial Neural Network approach

Journal : International Engineering Research Journal (IERJ)

A Face Recognition System by Embedded Hidden Markov Model and Discriminating Set Approach

Journal : International Journal of Modern Education and Co mputer Science, 2014, 7, 25 -30 Published Online July 2014 in MECS

Towards More Realistic Mobility Model in Vehicular Ad Hoc Network

Journal : International Journal of Computer Science and Information Security

Intelligent Password Authentication for Avoiding Shoulder Surfing and Brute Force Attacks

Journal : International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME15 Conference Proceedings

Projects

Aug-2008 to Mar-2009

Service Management and Report Tracking ( SMART)

Client: Tata Communication (Service Management) . Aug 08- Mar 09 Project Title : Service Management and Report Tracking ( SMART). Designation : Developer cum Application architect . Team Size : 2 Members . Environment : Front -End: JSP, Servlet, Java Script, HTML , Database -End: Oracle9i . Roles & Responsibilities Core member of the integration module of Tata Communication project. Involved in complete design, development, testing of Application.
...see more
Jan-2008 to Mar-2008

Trap shooter (Duck hunt) Mobile Game

Project Title : Trap shooter (Duck hunt) Mobile Game Designation : Team Member . Team Size : 2 Members . Environment : Application -End: J2me Tool: J2me Wireless Toolkit Roles & Res ponsibilities Understand the requirements and specification Programming and developing some of the features
...see more
Apr-2008 to Jun-2008

Ping pong

Project Title : Ping pong Designation : Team Member . Team Size : 2 Members . Environment : Application -End: J2me Tool: J2me Wireless Toolkit Roles & Responsibilities Understand the requirements and specification Programming and developing some of t he features
...see more
Nov-2007 to Jan-2008

Frisbee Dog

Project Title : Frisbee Dog Designation : Team Member . Team Size : 2 Members . Enviro nment : Application -End: J2me Tool: J2me Wireless Toolkit Roles & Responsibilities Understand the requirements and specification Programming and developing some of the features
...see more
Apr-2009 to Aug-2009

Online Quote System

Client: Tata Communic ation (Sales Department) . Apr 09- August2009 Project Title : Online Quote System. Designation : Developer cum Appl ication architect . Team Size : 2 Members . Environment : Front -End: JSP, Servlet, Java Script, HTML , Google Maps. Database -End: MSSQL Server2005 , Oracle9i . Roles & Responsibilities Core member of the integration module of Tata Communication project. Involved in complete design, development, testing of Application.
...see more
Jan-1970 to Jan-1970

Automated Resume Tracking system

Projec t Title : Automated Resume Tracking system Designation : Developer cum Application architect . Team Size : 3 Members . Environment : Front End: JSP, Servlet, Java Script, And HTML. Database -End: MS -Access This web based application which maintains th e details of Candidates, Clients, and Interview/Test Schedule. With this consultancy users can handle short listings of candidates according to requirements criteria and generating the resumes and call Letters in Report Format by using Crystal reports. Aut o mailer facility sends/receives appropriate reminders, responses, interview call letters and other details to/form user. Roles & Responsibilities Core member of the integration module of this project. Involve in complete designing, development and testing of Integration Application.
...see more
Jan-1970 to Jan-1970

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Project Title : Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Designation : Developer cum Application architect . Team Size : 1 Members Environment : Front End: JS P, Servlet, Java Script, And HTML. Database -End: MS -Access Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conv entional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS ) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster -based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the pos itions of multiple attackers. We evaluated our techniques through two Test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 p ercent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. Roles & Responsibilities Core member of the integration module of this project. Involve in complete designing, development and testing of Integration Application.
...see more

Conference/Seminar/STTP/FDP/Symposium/Workshop

National Level Conference on Computing and Technology - [NCCT -2017]

Hosted By:

VACOE ,

Ahmednagar, Maharashtra, India
Presented paper in National Level Conference on Computing and Technology - [NCCT -2017] on titled A review on Location Aware Keyword Q uery Suggestion Based on Document Proxy at VACOE, Ahmednagar.
...see more

National Level Conference on Machine Learning & High Performance Computing -2016 (NCMLHPC -216)

Hosted By:

Computer Society of India (CSI) ,

Pune, Maharashtra, India
Presented paper in National Level Conference on Machine Learning & High Performance Computing -2016 (NCMLHPC -216) in Association with Computer Society of India at MAEERs MIT COE, Pune.
...see more

INTELLIGENT PASSWORD AUTHENTICATION FOR AVOIDING SHOULDER SURFING AND BRUTE FORCE ATTACKS

Hosted By:

,

Ahmednagar, Maharashtra, India
Presente d paper in International Level Conference on INTELLIGENT PASSWORD AUTHENTICATION FOR AVOIDING SHOULDER SURFING AND BRUTE FORCE ATTACKS at VACOE, Ahmednagar.
...see more

State Level Conference on Image Processing, VLSI & Embedded Systems

Hosted By:

,

Ahmednagar, Maharashtra, India
Presented paper in State Level Conference on Image Processing, VLSI & Embedded Systems at PDVVP C OE, Ahmednagar.

Scholar9 Profile ID

S9-082024-0902963

Publication
Publication

(10)

Review Request
Article Reviewed

(0)

Citations
Citations

(0)

Network
Network

(1)

Conferences
Conferences/Seminar

(4)