Recognised Teachers of the University (Master of Engineeing programme in Information Technology)



Similar documents
Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node

Mobile Cloud Computing In Business

The next generation of knowledge and expertise Wireless Security Basics

Depiction of Body Area Network in Cloud Environment

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

The Internet of Things: Opportunities & Challenges

About the Authors Preface Acknowledgements List of Acronyms

Securing MANET Using Diffie Hellman Digital Signature Scheme

Introduction to Cyber Security / Information Security

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Internet of Things (IoT): A vision, architectural elements, and future directions

School of Commerce. National Service Scheme

New Technology Capabilities

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

CHAPTER 1 INTRODUCTION

BSc in Information Technology Degree Programme. Syllabus

TOPOLOGIES NETWORK SECURITY SERVICES

The Masters of Science in Information Systems & Technology

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing

LIST OF FIGURES. Figure No. Caption Page No.

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Network Security Administrator

How To Understand And Understand The Science Of Engineering In India

Wireless Sensor Network: Challenges, Issues and Research

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

24. School of Computer Science & Information Technology and Computer Centre

Master of Science in Information Systems & Security Management. Courses Descriptions

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Doctor of Philosophy in Computer Science

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

IEEE JAVA Project 2012

Bellevue University Cybersecurity Programs & Courses

Weighted Total Mark. Weighted Exam Mark

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

The 5G Infrastructure Public-Private Partnership

Computer/IT Project LIST. Contact:

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

Dept. of Financial Information Security

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Packet Level Authentication Overview

PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.

NFC & Biometrics. Christophe Rosenberger

ISSN: A Review: Image Retrieval Using Web Multimedia Mining

Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Remote Home Security System Based on Wireless Sensor Network Using NS2

Big Data in Transportation Engineering

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

Privacy & Security of Mobile Cloud Computing (MCC)

List of Papers Presented / Published by our Teachers. IEEE International Advance Computing Conference (IACC-2009), Patiala

Lectures for the course: Electronic Commerce Technology (IT 60104)

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Overview of broadband powerline communications

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Wireless Sensor Networks

Mobile and Sensor Systems

Embedded Systems Projects

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Course Syllabus For Operations Management. Management Information Systems

Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network

Enabling the SmartGrid through Cloud Computing

Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

CESG Certification of Cyber Security Training Courses

Logitech Advanced 2.4 GHz Technology

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

NETWORK ADMINISTRATION AND SECURITY

INFORMATION TECHNOLOGY (INFO)

Computer Information Systems

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Transcription:

Recognised Teachers of the University (Master of Engineeing programme in Information Technology) Sr. Name of Faculty Designation 1. Dr. B.K. Mishra Principal 2 Dr. Bijith Marakarkandy Co-ordinator, Associate Professor 3 HOD (IT), Associate Professor 4 Mr. Rajesh S. Bansode MR, Associate Professor 5 Mr. Zahir Aalam T & P Officer, Associate Professor 6 Ms. Sangeeta Vhatkar Assistant Professor

Master of Engineering programme in Information Technology About the Post Graduate Department of Information Technology The department was established in the year 2011. The Department conducts the Master of Engineering programme in Information Technology as per the syllabus prescribed by the University of Mumbai. The department caters to Engineers seeking advanced technical or management foundation or research capabilities with an Industrial perspective in the field of Information Technology. The Department aims to produce academic and industry leaders. Our Offerings Taking up leadership roles in today s technology world requires much more than technical knowledge it requires management and business acumen. Students are advised to take up courses in a cross-disciplinary cohort from the syllabus prescribed by University of Mumbai. Class strength is small thereby allowing students to interact and connect with professors and other industry collaborators. Limited number of Teaching Assistantship and Research Assistantship are offered to students to meet the cost of their studies, other benefits include career advising, placement assistance, access to alumni network and industry connections. Short Term Goals To get the program accredited by NBA. Preparatory courses for students exploring further study opportunities (PhD Entrance Test) Long term goals Dynamic/Collaborative/Interdisciplinary/Cooperative programmes in alliance with industry houses and reputed top universities.

Faculty List of Information Technology Sr. Name of Faculty 1 Dr. Kamal Shah 2 3 Dr. Bijith Marakarkandy 4 Mr. Vikas Kaul 5 Mr. Rajesh S. Bansode 6 Mr. Zahir Aalam Subjects taught 7 Ms. Sangeeta Vhatkar PRACTICALS 8 Mr. Aaditya Desai E-Business Techniques, Data Storage Management and Retrieval, Ethical Hacking and Dig. Forensic, Business Intelligence, Knowledge Management Data Storage Management and Retrieval, Soft Computing E-Business Techniques, Knowledge Management Network Design and Management, Enterprise Sec. & Risk Management Network Design and Management, Enterprise Sec. & Risk Management Usability Engineering, E-Business Techniques, Next Generation Networks Advanced Software Architecture, Advanced Data Mining with BI 9 Mr. Namdeo Badhe Advanced Data Mining with BI 10 Mrs. Vandana Munde Advanced Data Mining with BI, Virtualization and Cloud Computing 11 Mrs. Purvi Sankhe Usability Engineering, Ubiquitous Computing 12 Mrs. Neha Kapadia Advanced Software Architecture

Disertation (A.Y. 2012-13) Batch 2011-2013 Sr. 1 Name of Student Shalini Agarwal (Jain) 2 Vikas Baloda 3 Neha Jain 4 Poonam Joshi Title of Project Performance Evaluation and QoS Analysis of Routing Protocols The antecedents of e- banking adoption in India, decomposed theory of planned behavior using structural equation modeling (SEM) Security Enhancement Algorithm for Data Transmission for Next Generation Networks Securing Anonymous and Confidential Database through Privacy Preserving Updates Name of Guide Mrs. Sangeeta Vhatkar Mr. Bijith M. Dr. B. K. Mishra Mr. Prashant Jawade

Disertation (A.Y. 2012-13) Batch 2011-2013 Sr. Name of Student 5 Anita Lahane 6 Allan Lopes 7 Payal Mishra Title of Project Wireless Image Transmission Scheme Using Turbo Product Coding and Encryption Technique Performance Measurement and Analysis of OFDM model in MATLAB simulink to enhance BER in presence of noise Face Recognition using Multidimensional Clustering on Hyperspectral Face Images Name of Guide Dr. B. K. Mishra Mr. Zahir Aalam

Sr. Name of Student 8 Bhavesh Pandya 9 Shreya Saxena 10 Information Technology Disertation (A.Y. 2012-13) Batch 2011-2013 Amruta P. Pokhare 11 Patel Jignesh Title of Project Multimodal Fusion of Fingerprint & Iris using Hybrid waveletbased feature vector E shopping adoption studies using technical acceptance models Performance of Turbo Product Code in Wireless Communication Hybrid Security algorithm for data transmission using AES-DES Name of Guide Mr. Bijith M. Mrs. Trushita Chaware Mr. Rajesh Bansode 12 Digma Shah Mr. Zahir Aalam 13 Shaikh Aamra P. Improved AES Algorithm Mr. Vikas Kaul based on ECC

Disertation (A.Y. 2012-13) Batch 2011-2013 Sr. Name of Student 14 Suwarna Thakre 15 Leena Thakur 16 Shruti Vaidya 17 Sonali Vaidya 18 Sunil Yadav Title of Project Design and implementation of enhanced application lockbox for mobile device security Inventory analysis using Genetic Algorithm in Supply Chain Management Application of Vector Quantization for Audio Retrieval Real Time Video Surveillance System Knowledge Management in CRM using Data mining Technique Name of Guide Mr. Prashant Jawade Mr. Aaditya Desai Dr. Kamal Shah Dr. Kamal Shah Mr. Aaditya Desai

Batch 2012-2014 Sr. Name of Student 1 Nilesh Bane 2 Jay L. Borade 3 Rashmi Chawla 4 Prerana P. Choudhari Title of Project Performance Improvement of BLAST with use of MSA Techniques to Search Ancestor Relationship among Bioinformatics Sequences Cross Layer Design for Optimizing TCP Performance in Wireless Networks Performance Evaluation and QoS Analysis of MBC Protocol in WSN with Mobile Nodes Security Enhancement for Data Transmission in 3G/4G Networks Name of Guide Dr. Kamal Shah Dr. B. K. Mishra Mrs. Sangeeta Vhatkar Mr. Vikas Kaul

Sr. Information Technology Batch 2012-2014 Name of Student 5 Sejal Demello 6 Deepak Gaikar 7 Shridhar Kamble Title of Project Modeling, Simulation, Performance Analysis and Enhancement of Bluetooth Tracking, Modeling and Predicting the Flow of Information using Social Media Analytics Data Mining and Data Warehousing for Supply Chain Management Name of Guide Mr. Zahir Aalam Mr. Bijith M. Mr. Aaditya Desai 8 Pratik Kanani Hybrid PKDS in 4G Dr Kamal Shah 9 Tanvi Kapdi Disclosing Malicious Traffic for Network Security Dr. Kamal Shah

Batch 2012-2014 Sr. Name of Student 10 Merlin Jacab 11 Rahul Mishra 12 Hetal Rana Title of Project Integration and use of KM with SCM for Effective Decision Making, Forecasting and Policy making Performance Evaluation and QoS Analysis of ECHERP Routing Protocol in Wireless Sensor Networks Performance Evaluation and QoS Analysis of EEPB and IEEPB Routing Protocol in Wireless Sensor Networks Name of Guide Dr. Kamal Shah Mrs. Sangeeta Vhatkar Mrs. Sangeeta Vhatkar

Sr. Information Technology Batch 2012-2014 Name of Student 13 Avani R. Shah 14 Suvidha Swamy 15 Pallavi Vartak 16 Priya Vartak 17 Apeksha Waghmare 18 Vandana Yadav Title of Project Online Signature Recognition using Sectorization of Complex Walsh Plane Security in 3G/4G Networks Hyper Spectral Face Recognition using Hybrid Wavelets Integration of Open ERP with Supply Chain Management Performance Analysis and Enhancement of ISM Band Technologies Finger Knuckle Print Recognition using Hybrid Wavelet Name of Guide Dr. Kamal Shah Mr. Aaditya Desai Mr. Zahir Aalam

Batch 2014-2015 (ME-IT 2 nd Year) Roll Name of Student Synopsis Title Name of Guide 1 DIAS JESSICA Knowledge Management for Mr. Aaditya Desai Predicting sales in Downstream Supply Chain Management 2 D SILVA GODSON Performance Improvement of Online Signature Recognition using Software as a Service Architecture 3 GABHANE MADHUR Design and Modeling of Wearable ECG (Electrocardiogram) monitoring device for Heart Patients Mr. Zahir Aalam

Batch 2014-2015 (ME-IT 2 nd Year) Roll Name of Student Synopsis Title Name of Guide 4 GONSALVES ODILIA Data Mining for Predicting sales of Mr. Aaditya Desai Tourism Industry 5 JOSHI KAUSTUBH Proximity based Collaborative content sharing for smart devices Mr. Zahir Aalam 6 KARTHA AARATI Face Recognition using Orthogonal Transform Coefficients of Hyperspectral Face Images 7 MEHTA SRISHTI Performance Evaluation & QOS Analysis of BCDCP routing protocol in WSN Ms. Sangeeta Vhatkar

Batch 2014-2015 (ME-IT 2 nd Year) Roll Name of Student Synopsis Title Name of Guide 8 MORE SHRADDHA Cache based side channel attack using Mr. Rajesh Bansode AES & RSA 9 PUNJABI JASBIR KAUR Development of Security Enhancement Techniques for 3G / 4G Networks Mr. Vikas Kaul 10 RANA JIGISH Performance Evaluation & QOS Analysis of PDCH routing protocol in WSN 11 SANGHAVI NIDHI Improving the IEEE 802.11 WLAN MAC Layer Handoff Latency to support Multimedia Traffic Ms. Sangeeta Vhatkar Mr. Rajesh Bansode

Batch 2014-2015 (ME-IT 2 nd Year) Roll Name of Student Synopsis Title Name of Guide 12 SASWADE NIKHIL Automation in Cloud Computing Amazon Dr. Kamal Shah Web Services 13 SHAH BINAL A Novel Approach for improving security & performance in Next Generation Network Dr. Kamal Shah 14 SHAH DHVANI End-to-End Encryption based Biometric Security SaaS using Raspberry Pi as a Remote Authentication Node 15 SHARMA PRAGYAMANI E-Shopping adoption : A Structural Equation Modelling Approach Dr. Bijith M.

Batch 2014-2015 (ME-IT 2 nd Year) Roll Name of Student Synopsis Title Name of Guide 16 SHARMA A Predictive Model for Dr. Bijith M. PRIYANKA Analysing sales using sentiment analysis 17 THAKAR HARSHKUMAR Performance Evaluation & QOS Analysis of SPEED routing protocol in WSN Ms. Sangeeta Vhatkar 18 VARTAK KRUNALI Cloud Based CBIR SaaS using Hybrid Wavelet based feature vector