Name: Puja Y Padiya
Gender: Female
Department: Computer
Designation: Associate Professor
Date of Joining: 2007-01-08
Area of Specialisation: Networking and Security
Industrial Experience: 0
Teaching Experience: 14
Total Experience: 14
UG Qualification: B. E. (Computer)
UG Year Of Passing: 2005
UG University: NMU, Jalgaon
UG Class: First Class
PG Qualification: M. E. (Computer)
PG Year Of Passing: 2010
PG University: NMU, Jalgaon
PG Class: First Class
PHD Qualification: Pursuing
PHD Year Of Passing: 0
PHD Class: University of Mumbai
Number of Paper Published => National Conference: 1 International Conference: 32 International Journal: 15
Number of Workshops => Organised: 11 Attended: 28
Number of Talks Delivered => 9
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | NSCFET-2017 | RAIT, India | Finding optimal customers and product recommendation using data mining | Sameer Inge,Prasad Gaikwad,Saptarsi Das,Puja Y. Padiya | xxx | Apr 2017 |
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT) | Delhi, India, India | A generic request/reply based algorith for detection of blackhole attack in manet: Simulation result | Swapnil Bhagat,Puja Padiya,Nilesh Marathe, | 978-1-5090-3038-5 | Jul 2017 |
2) | International conference on Signal Processing, Communication, Power and Embedded System (SCOPES)-2016 | Paralakhemundi, India | Data Analysis of File Forensic Investigation | Priyanka Salunkhe, Smita Bharne,Puja Padiya, | 978-1-5090-4620-1/16/$31.00 ?2016 IEEE | Oct 2016 |
3) | 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) | Paralakhemundi, India | Improve the performance to implement region based statistical traffic pattern discovery system for MANET | Rushali V. Nikhar ; ,Puja Padiya | Date Added to IEEE Xplore: 26 June 2017 ISBN Information: INSPEC Accession Number: 16980790 DOI: 10.1109/SCOPES.2016.7955877 | Oct 2016 |
4) | 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) | Paralakhemundi, India | Detection and Prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network | Supriya Khobragade, Puja Padiya | Date Added to IEEE Xplore: 26 June 2017 ISBN Information: INSPEC Accession Number: 16980766 DOI: 10.1109/SCOPES.2016.7955657 | Oct 2016 |
5) | 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) | Paralakhemundi, India | Multi-phase mouse dynamics authentication system using behavioural biometrics | Pooja S Pilankar,Puja Padiya | Date Added to IEEE Xplore: 26 June 2017 ISBN Information: INSPEC Accession Number: 16980501 DOI: 10.1109/SCOPES.2016.7955786 | Oct 2016 |
6) | International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 | Paralakhemundi, India | Result analysis of optimized MAODV-BB tree based protocol in MANETs | Priyanka Kumbarwar,Puja Padiya | Date Added to IEEE Xplore: 26 June 2017 ISBN Information: INSPEC Accession Number: 16980791 DOI: 10.1109/SCOPES.2016.7955722 | Oct 2016 |
7) | 19 September 2016, Colossal Data Analysis and Networking (CDAN), Symposium on | Indore, India | Indian Sign Language to Forecast Text using Leap Motion Sensor and RF Classifier | Poonam Chavan,Tushar Ghorpade,Puja Padiya, | 978-1-5090-0669-4/16/$31.00 ?2016 IEEE | Sep 2016 |
8) | ICCCCM-2016 | India | Time Efficient Data Discovery and Dissemination Protocol in WSN | Varsha Patil,Puja Padiya | xxx | Sep 2016 |
9) | Inventive Computation Technologies (ICICT) | Coimbatore, India | Design of efficient web vulnerability scanner | Smita Patil,Nilesh Marathe,Puja Padiya, | 10.1109/INVENTIVE.2016.7824873 | Aug 2016 |
10) | 2nd International Conference on Computing, Communication, Control and Automation, ICCUBEA 2016 | Pune, India | Use of ECC to address key escrow and attribute revocation problem Madhusudanan, | Meghana Madhusudanan,Puja Padiya | Date Added to IEEE Xplore: 23 February 2017 ISBN Information: INSPEC Accession Number: 16693084 DOI: 10.1109/ICCUBEA.2016.7860080 | Aug 2016 |
11) | International Conference on Electrical, Electronics, Engineering Trends and Communication, Optimization and Science | Andhra Pradesh, India | Optimized MADOV-BB Tree based Protocol in MANETs | Priyanka Jogdand,Puja Padiya | 2016 | Jun 2016 |
12) | IEEE International Conference on Research Advances in Integrated Navigation Systems | Banglore | For Improving Performance Vision Based Statistical Traffic Pattern Discovery System For MANET | Ms. Rushali V. Nikhar,Puja Padiya | 978-1-4673-8819-8/16/$31.00 ?2016 IEEE | Apr 2016 |
13) | International Conference on Electrical, Electronics and Optimization Techniques | India | Survey of Different IDS using Honeytoken Based Techniques to Mitigate Cyber Threats | Priyanka Jogdand,Puja Padiya | 978-1-4673-9931-5/16/2016 IEEE | Mar 2016 |
14) | IEEE sponsored 3rd International Conference on Electronics and Communication Systems | Coimbatore, India | Malicious Node Detection Systems In MANET | Varsha Patil,Puja Padiya | 978-1-4244-xxxx-x/09/$25.00 ?2016 IEEE | Feb 2016 |
15) | 2016 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016) | Noida, India | Filtering unwanted messages from OSN walls | Priyanka Salunkhe,Smita Bharne,Puja Padiya, | Date Added to IEEE Xplore: 15 August 2016 ISBN Information: INSPEC Accession Number: 16229649 DOI: 10.1109/ICICCS.2016.7542319 | Feb 2016 |
16) | 18th IRF International Conference | Bengaluru | Dead End Free Topology Maintainence Protocol for Sinktrail | Ajay Sirsat,Puja Padiya | ISBN: 978-93-85832-43-7 | Nov 2015 |
17) | International Conference on Applied and Theorotical Computing and Communication Technology | Improved EAACK Scheme for Detection ans Isolation of a Malicious Node in MANET | Ashish Patil,Nilesh Marathe,Puja Padiya, | ISBN: 978-1-4673-9222-8 | Oct 2015 | |
18) | ICAST-2015 | Navi Mumbai | Study of Data Reporting Protocol for Wireless Sensor Networks | Rahul Patil,Puja Padiya | 1 | Sep 2015 |
19) | International Conference on Advances in Science and Technology 2015 | India | Survey of Different Attacks Against Routing Protocols in Ad Hoc Environment | Ashish Patil,Nilesh Marathe,Pooja Padiya, | IJCA-0975 ? 8887 | Sep 2015 |
20) | International Conference onCommunication, Information & Computing Technology (ICCICT), 2015 | ICCICT-Mumbai | Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset | Datta H Deshmukh,Tushar Ghorpade,Puja Padiya, | 978-1-4799-5522-0/15 | Jan 2015 |
21) | Procedia Computer Science | Elsevier | Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function | Ujwala Ravale, Nilesh Marathe, Puja Padiya, | Volume 45 Pages 428-435 | Dec 2014 |
22) | International Conference on Advances in Science & Technology ICAST -2014 | Saraswati Education Society?s Saraswati College of Engineering Kharghar, Navi Mumbai, India | DDOS using Intrusion Detection System in Wireless Mobile Ad hoc Network | YassirFarooqui,Vanita Mane,Puja Padiya, | 11 | Nov 2014 |
23) | IRF International Conference | Cochin, India | Detection and Resolution of Policy Conflict with Signature Generation Mechanism | Snehal Mumbaikar,Vimla Jethani,Puja Padiya, | ISBM-978-93-84209-43-8 | Aug 2014 |
24) | Fourth International Conference on Communication Systems and Network Technologies 2014 | Bhopal | IAMTT; New method for resisting Network Layer Denial of Service Attack on MANET | Mrs. Sheetal Ahir,Nilesh R. Marathe,Puja Padiya, | 1 | Apr 2014 |
25) | International Conference on Electronics and Communication Systems (ICECS'14) | Mumbai | Intrusion Detection System by Improved Preprocessing Methods and Naive Bayes Classifier using NSL-KDD 99 Dataset | Datta H. Deshmukh,Tushar Ghorpade,Puja Padiya, | Feb 2014 | |
26) | Knowledge Collaboration in Engineering (KCE2014) | Khatir College of Engineering, Coimbatore | Analisys of Clustered based DoS Attack Detection in WSN | Yogesh Khairnar,Nilesh Marathe,Puja Padiya, | 0 | Jan 2014 |
27) | International Conference on Emerging Trends in Technology and its Application (ICETTA-2013) | YTIET, Raigad | Securig weblets for Elastic Application of Mobile Cloud Computing | Archana Chougle,Puja Padiya ,Tushar Ghorpade, | ISBN-978-81-923777-7-3 | Mar 2013 |
28) | International Conference on Emerging Trends in Technology and its Application (ICETTA-2013) | YTIET, Raigad | Cloud Computing for Agent based Traffic Management System using Soft Computing Approaches | Datta Deshmukh,Puja Padiya ,Tushar Ghorpade, | ISBN-978-81-923777-7-3 | Mar 2013 |
29) | International Conference and Workshop on Advanced Computing (ICWAC-2013) | Mumbai | Mobile Cloud Computing: challenges and solutions | Archana Chougle,Tushar Ghorpade,Puja Padiya , | 1 | Feb 2013 |
30) | International Conference and Workshop on Advanced Computing (ICWAC-2013) | Mumbai | Survey on Identity Management in Cloud Computing | Ujjawal Rawale,Puja Padiya ,Nilesh Marathe, | 1 | Feb 2013 |
31) | ICWET`10 | TCET, Mumbai. | Incentive and Rebuke Based Reputation Model for Peer to Peer Applications | Puja Agrawal ,Madhumita Chatterjee | 1 | Feb 2010 |
32) | CSCIT-2010 International Conference | Yeshwant Mahavidyalaya, Nanded | Improved Reputation Based Trust Model for Peer to Peer File Sharing Application | Puja Agrawal ,Madhumita Chatterjee | 1 | Jan 2010 |
No. | Conf. Name | Conf. Location | Paper Title | Author Details | Proceeding No | Month & Year |
---|---|---|---|---|---|---|
1) | International Journal of Computer (IJC) | Opinion Mining Using Twitter Feeds for Political Analysis | Manogna Meduru,Antara Mahimkarb,Krishna Subramanianc,Puja Y. Padiya | ISSN 2307-4523 (Print & Online) ? Global Society of Scientific Research and Researchers | Apr 2017 | |
2) | IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) | India | Use of RESTful Web Services in Distributed Computing | Smita Patil,Nilesh Marathe,Puja Padiya, | ISSN: 2249-9555 Vol.6, No.2, Mar-April 2016 | May 2016 |
3) | International Journal of Research in Engineering and Technology | Trust Based Security in MANET | Pooja Pilankar,Puja Padiya | eISSN: 2319-1163 | Feb 2016 | |
4) | International Journal on Recent and Innovation Trends in Computing and Communication | Chembur, India | Different Pre-Authentication Schemes for Achieving Security of Handover in Wimax Network | Ms. Rushali V. Nikhar,Mrs. Puja Padiya | ISSN: 2321-8169 | Jan 2016 |
5) | International Journal of Advanced Computational Engineering and Networking | Misbehaviour Evictions from MANETs | Supriya Kamble,Puja Padiya,Nilesh Marathe, | ISSN: 2320-2106 | Nov 2015 | |
6) | International Journal of Engineering and Innovative Technology | Distributed Intrusion Detection System using Mobile Agent | Supriya Khobragade,Puja Padiya | ISSN: 2277-3754 | Oct 2015 | |
7) | International Journal of Computer Applications (ICAST-2015) | Navi Mumbai | Study of SMS Encryption Techniques | Meghana Madhusudana,Puja Padiya | 0975-887 | Sep 2015 |
8) | International Journal of Advanced Computational Engineering and Networking | IJACEN | EUSOR: AN EXTENDED USOR PROTOCOL FOR MANET | YOGESH KHAIRNAR,NILESH MARATHE,PUJA PADIYA, | Volume 3 Issue 7 Pages 36-38 ISSN: 2320-2106 | Jul 2015 |
9) | IOSR-Journal of Computer Engineering | Volume 17 Issue 3 Pages 1-4 | Comparative Study on Intrusion Detection Systems for Smartphones | Supriya Kamble,Leena Ragha,Puja Padiya, | e-ISSN: 2278-0661 | Jun 2015 |
10) | International Journal of Advances in Electronics and Computer Science | Managing Selfishness and False Alarm in Replica Allotment over MANET | Yassir Farooqui,Puja Padiya | ISSN: 2393-2835 | Jan 2015 | |
11) | International Journal of Science and Research | Publisher IJSR | Comparative Study of DDoS Attack Detection Technique in Cloud Computing Environment | Ajay R Sirsat,Puja Padiya | Volume 3 Issue 12 | Dec 2014 |
12) | IOSR Journal of Computer Engineering, Vol 16, Issue 4 | Customised Ontolology Model for Web Information Gathering using Clustering | Archana Chaugle,Tushar Ghorpade,Puja Padiya, | Jul 2014 | ||
13) | International Journal of Computer Applications, Volume 82 No. 15 | Attribute Reduction based Hybrid Anamoly Intrusion Detection using K-means & SVM Classifier | Ujjawala Rawale,Nilesh Marathe,Puja Padiya, | Nov 2013 | ||
14) | International Journal of Emerging Technology & Advanced Engg. | VEGAS RB+: An Optimized Version of TCP VEGAS | Himani S. Deshpande, Vimla Jethani,Puja Padiya, | Volume 3, Issue 10, October 2013 ( ISSN 2250 ? 2459 (Online)) | Oct 2013 | |
15) | International Journal of Scientific and Research Publications,IJSRP Volume 3, Issue 5 | xx | Web Services Based On SOAP and REST Principles | Snehal Mumbaikar,Puja Padiya | ISSN 2250-3153 | May 2013 |
No. | Worked As | Name | Organised By | Location | No. of Days | Start Date | End Date |
---|---|---|---|---|---|---|---|
1) | Committee Member | National Level workshop on " Security Assests and Hacking Anticipation" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 6 | 2017-01-09 | 2017-01-14 |
2) | Committee Member | National Level workshop on " Security Assests and Hacking Anticipation" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 6 | 2017-01-09 | 2017-01-14 |
3) | Coordinator | Advanced Linux Networking | GnuGroup at RAIT | RAIT | 2 | 2016-01-29 | 2016-01-30 |
4) | Coordinator | Advanced Linux Networking | GnuGroup at RAIT | RAIT | 2 | 2016-01-29 | 2016-01-30 |
5) | Coordinator | National Workshop on Computational Intelligence | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 3 | 2015-03-12 | 2015-03-14 |
6) | Coordinator | National Workshop on Computational Intelligence | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 3 | 2015-03-12 | 2015-03-14 |
7) | Coordinator | AICTE Sponsored National Level Workshop on :Advanced Technology Treands in Security Issues of ADHOC and Sensor Networks" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 3 | 2014-01-23 | 2014-01-25 |
8) | Coordinator | AICTE Sponsored National Level Workshop on :Advanced Technology Treands in Security Issues of ADHOC and Sensor Networks" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 3 | 2014-01-23 | 2014-01-25 |
9) | Coordinator | Linux Enterprise Technologies & Server Application | GNU International Group | RAIT | 2 | 2013-10-23 | 2013-10-24 |
10) | Coordinator | Linux Enterprise Technologies & Server Application | GNU International Group | RAIT | 2 | 2013-10-23 | 2013-10-24 |
11) | Coordinator | Grid Computing and Cloud Computing | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2013-10-19 | 2013-10-20 |
12) | Coordinator | Grid Computing and Cloud Computing | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2013-10-19 | 2013-10-20 |
13) | Committee Member | Training program for students, "Inter-Departmental Technical Competition" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 5 | 2013-09-02 | 2013-09-06 |
14) | Committee Member | Training program for students, "Inter-Departmental Technical Competition" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 5 | 2013-09-02 | 2013-09-06 |
15) | Coordinator | NS2 and its Applications | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2012-10-12 | 2012-10-13 |
16) | Coordinator | NS2 and its Applications | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2012-10-12 | 2012-10-13 |
17) | Committee Member | Cyber Crime and Cyber Laws | Ramrao Adik Institute of Technology | Navi Mumbai | 1 | 2012-03-21 | 2012-03-21 |
18) | Committee Member | Cyber Crime and Cyber Laws | Ramrao Adik Institute of Technology | Navi Mumbai | 1 | 2012-03-21 | 2012-03-21 |
19) | Coordinator | NS2 and its Applications | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2010-10-12 | 2010-10-13 |
20) | Coordinator | NS2 and its Applications | Ramrao Adik Institute of Technology | Navi Mumbai | 2 | 2010-10-12 | 2010-10-13 |
21) | Committee Member | Emerging Trends in Pattern Recognition | Ramrao Adik Institute of Technology | Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
22) | Committee Member | Emerging Trends in Pattern Recognition | Ramrao Adik Institute of Technology | Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
No. | Name | Organised By | Location | No. of Days | Start Date | End Date |
---|---|---|---|---|---|---|
1) | Orientation on "Cloud Computing" BE SEM VIII | Dwarkadas J. Sanghvi College of Engineering | Comp Deot., DJS COE | 1 | 2016-01-13 | 2016-01-13 |
2) | Orientation Program on "Advanced Operating System" of ME SEM-II | Bharati Vidyapeeth College of Engineering | Comp Dept., BVCOE | 1 | 2013-02-25 | 2013-02-25 |
3) | National Symposium on "Distributed and Embedded High Performance Computing" | IITB | VMCC, IITB, Powai | 5 | 2016-06-01 | 2016-06-04 |
4) | High Performance Computing with CUDA, MPI and OpenMP | Vidyalankar Institute of Technology | Wadala, Mumbai | 5 | 2017-02-01 | 2017-02-05 |
5) | GIAN course "Numerical Linear algebra for Engineering Applications" | Veermata Jijabai Technological Institute, Mumbai | Wadala, Mumbai | 5 | 2017-01-26 | 2017-01-30 |
6) | National Level Workshop on "Security Assests and Hacking Anticipation" | Ramaro Adik Institute of Technology | Nerul, Navi Mumbai | 6 | 2017-01-09 | 2017-01-14 |
7) | Workshop on "Network Simulator 3 [NS-3]" | Sinhagad Institute of Technology | Lonavala, Maharashtra | 2 | 2016-12-23 | 2016-12-24 |
8) | Cyber Threats and Security | SKYNET SECURE SOLUTIONS | Ramrao Adik Institute of Technology, Nerul, Navi Mumbai | 1 | 2015-09-16 | 2015-09-16 |
9) | Workshop on Grid Computing and Cloud Computing | Squamis Technology | Ramrao Adik Institute of Technology, Nerul, Navi Mumbai | 2 | 2012-10-19 | 2012-10-20 |
10) | IBM SEED Program "IBM Rational Application Developer, BlueMix) | IBM Software Group at RAIT | Nerul, Navi Mumbai | 4 | 2014-01-17 | 2014-01-24 |
11) | Innovative Practices in Teaching and Learning | Shah and Anchor Kutcchi Engineering College | Chembur, Mumbai | 2 | 2018-01-19 | 2018-01-20 |
12) | STTP on Effective Research Methodology for Ph.D. aspirants of Engineering & Technology | Vidyalankar Institute of Technology | Mumbai | 5 | 2014-07-07 | 2014-07-11 |
13) | Syllabus Revision Meeting of BE/VII/Mobile Computing and Communication (MCC) (Subject Code - CSC702) and Laboratory (Subject Code - CSL702) | Ramrao Adik Institute of Techology | Nerul, Navi Mumbai | 1 | 2017-04-18 | 2017-04-18 |
14) | Quality Networking (QualNet) | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 2 | 2013-02-22 | 2013-02-23 |
15) | Next Generation Computer Networks (ISTE Approved) | Konkan Gyanpeeth College of Engineering | Karjat | 6 | 2007-05-21 | 2007-05-26 |
16) | Advances in Networking and Mobile Computing | Ramrao Adik Institute of Technology | Navi Mumbai | 3 | 2010-03-25 | 2010-03-27 |
17) | Cloud Computing | SIES Graduate School of Technology | Navi Mumbai | 2 | 2012-07-20 | 2012-07-21 |
18) | Emerging Trends in Pattern Recognition | Ramrao Adik Institute of Technology | Navi Mumbai | 3 | 2010-08-19 | 2010-08-21 |
19) | Syllabus Committee Meeting for the Subject: High Performance Computing of BE on behalf of University of Mumbai | Vivekanand Education Society's Institute of Technology | Mumbai | 1 | 2017-04-13 | 2017-04-13 |
20) | Syllabus Revision meeting of BE Sem VI for Subject: Cryptography and System Security" on behalf of University of Mumbai | Pillai College of Engineering | New Panvel, Navi Mumbai | 1 | 2017-04-12 | 2017-04-12 |
21) | Syllabus Revision meeting of BE Sem VIII for Subject: Advanced System Security" on behalf of University of Mumbai | Pillai College of Engineering | New Panvel, Navi Mumbai | 1 | 2017-04-12 | 2017-04-12 |
22) | Syllabus Revision meeting of BE Sem V for Subject: Advanced Operating System" and DLOC-I on behalf of University of Mumbai | Pillai College of Engineering | New Panvel, Navi Mumbai | 1 | 2017-04-11 | 2017-04-11 |
23) | Syllabus Revision meeting of ME Sem I for Subject: Advanced Operating Systems" on behalf of University of Mumbai | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 1 | 2016-06-21 | 2016-06-21 |
24) | Orientation Workshop on "Network Threats and Attack" of Sem VII of Computer Engineering | Lokmanya Tilak College of Engineering | Koparkhairane, Navi Mumbai | 1 | 2015-07-23 | 2015-07-23 |
25) | Orientation Workshop of "Cryptography and System Security" of BE Sem VII of Computer Engineering | Vivekanand Education Society's Institute of Technology | Mumbai | 1 | 2015-07-21 | 2015-07-21 |
26) | Applications of Mathematics in Engineering and Real Life | Engineering Science Dept., RAIT | Ramrao Adik Institute of Technology | 3 | 2018-02-26 | 2018-02-28 |
27) | 4th Wifi Knowledge Summit | IIT-B | Powai, Mumbai | 2 | 2017-09-14 | 2017-09-15 |
28) | Cyber Crime and Cyber Laws | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 1 | 2012-03-21 | 2012-03-21 |
No. | Name | Organised By | Location | Date |
---|---|---|---|---|
1) | NS2 and it Applications | SIES Graduate School of Technology | Nerul, Navi Mumbai | 2010-04-23 |
2) | NS2 and its Apllication | RAIT, nerul | Nerul | 2015-09-08 |
3) | STTP on Emerging Trends in Operating System | Dr. D. Y. Patil Polytechnic | Nerul, Navi Mumbai | 2014-12-15 |
4) | NS2 and its Application | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 2014-10-06 |
5) | Network Simulator | YTIET | Bhivpuri | 2010-10-20 |
6) | NS2 and it Applications | Ramrao Adik Institute of Technology | Navi Mumbai | 2010-10-12 |
7) | Computer Education in Nursing | Dr. D. Y. Patil Institute of Nursing Education for Revised General Nursing & Midwifery | Navi Mumbai | 2012-02-15 |
8) | Expert as a Judge in State Level Paper Presentation Competition "DYP-TECHNO SEM-2016" | Dr. D. Y. Patil Polytechnique | Nerul, Navi Mumbai | 2016-02-23 |
9) | Hands-on Session on "Network Simulator NS2" | Ramrao Adik Institute of Technology | Nerul, Navi Mumbai | 2017-09-23 |