This book describes the study of interactions between humans and machines. Human Machine Interaction is a multidisciplinary field with contributions from Human-Computer interaction (HCI), Human-Robot Interaction (HRI), Robotics, Artificial Intelligence (AI), Humanoid robots and exoskeleton control.Published By Wiley Publications,2015
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.[1][2] The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.Published By Wiley Publications,2015
Abstract : Human Skin detection deals with the recognition of skin-colored pixels and regions in a given image. Skin color is often used in human skin detection because it is invariant to orientation and size and is fast to process. A new human skin detection algorithm is proposed in this paper. The three main parameters for recognizing a skin pixel are RGB (Red, Green, Blue), HSV (Hue, Saturation, Value) and YCbCr (Luminance, Chrominance) color models. The objective of proposed algorithm is to improve the recognition of skin pixels in given images. The algorithm not only considers individual ranges of the three color parameters but also takes into ac- count combinational ranges which provide greater accuracy in recognizing the skin area in a given image.2017
Abstract: The problem of identification and elimination of useful technology is a multi-attribute, multi-valued problem which involves both tangible and intangible factors. To select the best useful technology that achieves most of the company requirements ,it is essential to use an appropriate selection approach that takes into consideration the different. quantitative and qualitative parameters of industry objectives and technology benefits. In this paper,FMCDM (Fuzzy-based MultAttribute and Multi-criteria decision Method ) is described and explained . Published in Technia – International Journal of Computing Science and Communication Technologies, IJCSCT Vol. 2, Issue 1, July 2009.
Abstract: In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not only increasing equipment efficiency, but also patient health. The Internet of Things (IoT) is increasingly being recognized by industry and different services mainly in healthcare. This paper describes the various Internet of Things (IoT) enable devices and its practices in the area of healthcare for toddler, children, chronic care, monitoring of critical patients, operation theaters and medicine dispenser.ACM,2016
Abstract: Almost all mobile phones available in the market support the programming language Java i.e. J2ME, but majority of these phones do not support the following file formats - .doc, .docx, .ppt and .rtf. These phones allow only .txt files to be viewed. Presently there is no software that allows java enabled phones to view these files. So users have to convert these files to .txt and in the case of .ppt, they have to convert it into an image. Since these files are important for many users, this causes a lot of inconvenience to them. In this paper we propose a ‘Mobile Office’ application which will make it possible for all java enabled mobile phone users to view the above mentioned files. Moreover, this will opiate the need to convert a .doc, .docx or .rtf file to .txt to be able to view them on the phone. We also describe the approach about how the above file formats can be accessed. This approach will enable these files to be accessed in low end java enabled devices with relative ease. Published in International Journal of Computer Application (IJCA),ISSN:0975 8887, March 2011.
Abstract: The large amount of growth in India's population has increased the demand on the transport systems. In the areas of public transport, it has become essential to consider effective technologies that will ease the system of transport. This paper presents the design of a public transport ticketing system that harnesses the functionality of the existing electronic smart cards into an Android application. This application aims to e the Man Machine.
The aim of this research work is to provides a solution for ERP software selection & elimination. ERP is a way to integrate data and processes of an organization into a centralized system that aims to have a single software solution where the information needed for decision making is shared across different departments. The selection or elimination of technology is a multi-criteria, multi-attribute, decision making problem, which involves both tangible and intangible factors, that can be solved by Fuzzy-Neural model (FNM). which is based on Neural Networks, is a new approach towards solving this problem. We trained the system to make a pair wise comparison of software (ERP) which helps in determining its relative ability to reach the decision goal. Thus FNM Model automates the decision making process by justifying 'Why to select one technology?' and 'Why to eliminate one technology?', which helps in benefitting the growth prospects of any organization.
Selecting an optimum advanced technology system for an organization is one of the most crucial issues in any industry. Any technology system which makes business process more efficient and business management more simplified is one of the important Information System (IS) to the organization. The comprehensive framework is a three-phase approach which introduces two main ideas, one is the adopting of the McCall software quality model which is extracted from technology management essentials, and use the factors of McCall software quality model to be some of the technology selection criteria. Another major point is implementing and proposing a model based on this research using Neuro-Fuzzy algorithm to evaluate advance technology selection. This paper includes the concept of a new multi attribute selection process which combines both the Fuzzy logic (linguistic) and Neural network (integral valuation) methodology to evaluate or estimate a technology for Electronic Toll Collection System. Managers will be able to use this model for selecting a new technology in to their organization.
This paper propose an efficient recommender system using collaborative filtering mechanism with kseparability approach for web based marketing. We follows the collaborative recommender method in which a user rating is aggregation of various characters using matrix but dataset becomes very noisy and difficult to separate. So, the K-Separability approach extends linear separability of data clusters into k>2 segments on the discriminating hyperplane. It can be implemented by single layer or 2-layer perceptron. K-Separability is able to uncover complex statistical dependencies i.e. positive or negative. Finally, We don’t need to filter the neighborhood of the target filter as other systems. All neighborhoods are considered and extremely useful in case of sparse dataset.
Cloud computing is a rising technology which enables convenient, on-demand network access to a shared pool of configurable computing resources. Mobile cloud computing is the availability of cloud computing services in a mobile ecosystem. Mobile cloud computing shares with cloud computing the notion that services is provided by a cloud and accessed through mobile platforms. The paper aims to describe an online mobile cloud based compiler which helps to reduce the problems of portability and storage space and resource constraints by making use of the concept of mobile cloud computing. The ability to use compiler application on mobile devices allows a programmer to get easy access of the code and provides most convenient tool to compile the code and remove the errors. Moreover, a mobile cloud based compiler can be used remotely throughout any network connection (WI-FI/ GPRS) on any Smartphone. Thus, avoiding installation of compilers on computers and reducing the dependency on computers to write and execute programs.
Criminalization may be a general development that has significantly extended in previous few years. In order, to create the activity of the work businesses easy, use of technology is important. Crime investigation analysis is a section records in data mining plays a crucial role in terms of predicting and learning the criminals. In our paper, we've got planned an incorporated version for physical crime as well as cybercrime analysis. Our approach uses data mining techniques for crime detection and criminal identity for physical crimes and digitized forensic tools (DFT) for evaluating cybercrimes. The presented tool named as Comparative Digital Forensic Process tool (CDFPT) is entirely based on digital forensic model and its stages named as Comparative Digital Forensic Process Model (CDFPM). The primary step includes accepting the case details, categorizing the crime case as physical crime or cybercrime and sooner or later storing the data in particular databases. For physical crime analysis we've used kmeans approach cluster set of rules to make crime clusters. The k-means method effects are a lot advantageous by the utilization of GMAPI generation. This provides advanced and consumer-friendly visual-aid to k-means approach for tracing the region of the crime. we have applied KNN for criminal identification with the help of observing beyond crimes and finding similar ones that suit this crime, if no past document is discovered then the new crime sample are introduced to the crime data-set. With the advancements of web, the network form has become much more complicated and attacking methods are further more than that as well. For crime analysis we're detecting the attacks executed on host system through an outsider the usage of assorted digitized forensic tools to produce information security with the help of generating reports for an event which could need any investigation. Our digitized technique aids the development of the society by helping the investigation businesses to follow a custom-built investigative technique in crime analysis and criminal identification as opposed to manually looking the database to analyze criminal activities, and as a result facilitate them in combating crimes.
Criminalization is a social phenomenon, which has drastically increased in last few years. In order, to make the job of the investigating agencies easy, use of technology is important. Digital Forensic investigation is a special field of computer forensic in which the scientific procedures and tools will allow the digital evidence to be admissible in a court of law. However there is not a proper guidance or predefined method which is accepted in court of law for investigation .Some tools or techniques provides partial solution to this .Hence the major objective is to implement the digital forensic tool which is based on digital forensic framework proposed[3]. The digital forensic tool will be a automated report generation tool which will be having facility of history keeper and feedback approach. Our digitized approach aids in the improvement of the society by helping the investigating agencies to follow a customized investigative approach in crime analysis and criminal identification rather than manually searching the database to analyze criminal activities, and thus assist them in combating crimes.
The computer forensic is the about evidence finding from computer or services using its reliability and justification which can be proved in court or in management. To accomplish this task various digital forensic model has been introduced till now. The proposed model ,Comparative Digital Forensic Model (CDFM) provides the authenticate evidence using less efforts because it based on required output only. Initially all models has been reviewed and listed advantages and disadvantages of all finally the CDFM has been developed, using that model very initial user can also understand the basic concept of digital forensic model.
As we know , information is becoming an important corporate resource that must be captured, protected, preserved, and grown. Creating and using knowledge is not limited to information-based companies: it is necessary for all organizations, regardless of industry sector. It's not enough to make good products; companies must make products that are better, less expensive to produce, and more desirable than those of competitors. Using corporate and individual knowledge wisely will help companies do that. In the last few years, companies have downsized and flattened their organizations. Many of the employees who were laid off had been with the company for years. When they walked out the door, they took experience, education, contacts, and information with them. The companies are finding out how important that human resource is to their success. And as companies continue to expand on a global basis and increase their use of technology to connect workers, they have to devise methods of disseminating information quickly to as many people as possible. If an employee in Chicago has experience with a certain production method, it would be silly not to share that information with employees in Singapore so that they don't reinvent the wheel. So as knowledge becomes a central productive and strategic asset, the success of the organization increasingly depends on its ability to gather, produce, maintain, and disseminate knowledge. To understand the concept of knowledge management, think of knowledge as a resource just like buildings, production equipment, product designs, and money. All these resources need to be systematically and actively managed. Bannari Amman Inst.of Technology, 2005.
The security and value of a computer system is compromised whenever an intrusion occurs. Network-based attacks make it difficult for legitimate users to access various network services by purposely occupying or sabotaging network resources and services. This can be done by sending large amounts of network traffic, exploiting well-known faults in networking services, and by overloading network hosts. Intrusion Detection attempts to detect computer attacks by examining various data records observed in processes on the network and is split into two groups, anomaly detection systems and misuse detection systems. Anomaly detection is an attempt to search for malicious behavior that deviates from established normal patterns. Misuse detection is used to identify intrusions that match known attack scenarios.This paper describe the working of various intrusion detection mechanism and its preventive methods. National Conference at Govt.College Engg., A'bad, 2005.
E-coupons can be defined as electronic coupons, the technology for refilling train or air tickets. This emerging concept represents the evaluation of e-coupons system from traditional paper coupons or ticket systems. This paper presents some snapshots from the future point of view from ticket-refilling perspective, with the beneficial effect on customer business and helps customer to run in fast track within a second. K.J.Somaiya College, Mumbai, 2006.
Systolic arrays are multidimensional arrays of processing elements. It is an arrangement of processors in an array where data flows synchronously across the array between neighbors, usually with different data flowing in different directions. One of the many applications of systolic array structure is multiplication of matrices. Different types of matrix multiplication, for example band matrix and sparse matrix multiplication are studied. Algorithms with different efficiencies are tested and researched to find the most efficient technique for the same. All these techniques are studied with respect to their implementation using systolic architecture. In this paper we describe the different techniques that use iteration and propose a new and simpler method using recursion. National Conference on a Recent Advances in Computer Vision and Information Technology's, Government College of Technology, Coimbatore, March 2010.
This paper provides a solution for ERP software selection & elimination. ERP is a way to integrate data and processes of an organization into a centralized system that aims to have a single software solution where the information needed for decision making is shared across different departments. The selection or elimination of technology is a multi-criteria, multi-attribute, decision making problem, which involves both tangible and intangible factors that can be solved by Neuro-Analytical Hierarchy Process (NAHP). NAHP, which is based on Neural Networks, is a completely new approach towards solving this problem. We make a pair wise comparison of software (ERP) which helps in determining its relative ability to reach the decision goal. Thus NAHP automates the decision making process by justifying 'Why to select one technology?' and 'Why to eliminate one technology?' which helps in benefiting the growth prospects of any organization.
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS, using the default messaging system of the mobile. However this limit is often found to be too less under ordinary circumstances and to communicate effectively, often a concatenated message needs to be sent. This, coupled with exorbitant messaging rates adds to the reduced effectiveness and decrease in potential users of the Short Messaging Service. However, in Zip It Up SMS (ZIUS), we have developed our own algorithm, and been successful in compressing more data into the same message. Now every SMS can carry up to an average-best case of 250 characters, which can bring about a change in standards and prove to be a massive boost to the mobile industry.
Total productive maintenance (TPM) is a people-intensive, preventive maintenance system for maximizing equipment effectiveness in the enterprise. The concept of TPM was originally suggested by Nakajima (1988) who proposed overall equipment effectiveness (OEE) as a metric for evaluating the progress of TPM, which is interpreted as the multiplication of availability, performance and quality. This paper aims to study and investigate the implementation of a TPM to improve the OEE in manufacturing enterprises. In today's industrial scenario huge losses occur in the manufacturing shop floor. These losses are due to operators, maintenance personal, process, tooling problems and non-availability of components in time etc. The quality related waste are of significant importance as they matter the company in terms of time, material and the hard earned reputation of the company. There are also other invisible losses like operating the machines below the rated speed, start up loss, break down of the machines and bottle necks in process. Zero oriented concepts such as zero tolerance for losses, defects, break down and zero accidents are becoming a pre-requisite in the manufacturing and assembly industry. In this situation, a TPM is the answer to resolve the above said problems which helps in benefitting the growth prospects of any organization.
Computerized Face Detection, is concerned with the difficult task of converting a video signal of a person to written text. It has several applications like face recognition, simultaneous multiple face processing, biometrics, security, video surveillance, human computer interface, image database management, digital cameras use face detection for autofocus, selecting regions of interest in photo slideshows that use a panand- scale and The Present Paper deals with energy conservation using face detection. Automating the process to a computer requires the use of various image processing techniques. There are various methods that can be used for Face Detection such as Contour tracking methods, Template matching, Controlled background, Model based, Motion based and color based. Basically, the video of the subject are converted into images are further selected manually for processing. However, several factors like poor illumination, movement of face, viewpoint-dependent Physical appearance, Acquisition geometry, Imaging conditions, Compression artifacts makes Face detection difficult. This paper reports an algorithm for conservation of energy using face detection for various devices. The present paper suggests Energy Conservation can be done by Detecting the Face and reducing the brightness of complete image and then adjusting the brightness of the particular area of an image where the face is located using histogram equalization.
Small manufacturing industries based on its unit numbers and the number of involved labors , has the potential to play an important role in India’s Economy. Each industry applying the different process of technology acquisition which has the direct impact on cost variable. Each industry has a set of attributes which influences the result of their investments .These success criteria will differ from company to company and hence there is a need to study, to identify and to evaluate such attributes in order to measure the degree of success to be achieved. This paper demonstrates the use of T-distribution model to create an empirical formula from the first principle for Labor cost and the relationship is thus derived between three variables IATC , EATC and LC namely Intrinsic Acquisition Technology Cost and Extrinsic Acquisition Technology Cost and Labor cost respectively which is explained with the data assumed from the survey in manufacturing industry.
In this paper, we present a simple empirical model that examines the impact of various technologies of the mobile industry and its investments on the quality and pricing decisions made by industry and on the economic performance of these industries. The research is aimed at identifying the trends that govern the mobile and wireless technologies of today. These trends will help us not only understand the direction that these technologies will take in the future but will help us relate their impact on the business scenarios of project planning and management. This model will help customers to buy a new mobile according to their specifications, help the industries to launch new mobiles to meet customer requirements with their available technologies, budget, resources and qualification of the staff. The objective of this research paper is to improve decision making, increase the revenue and improve the GDP of the country.
Filed a patent for Invention Protocol “Skin Image Analysis Software for Skin Diseases” dated 24/02/2016 Time: 17:02:14, Docket No.4737.Application No.: 201621006433
Filed a patent for Invention Project “AUTO-WALAS: An App for Vehicle Management” dated 21/03/2016 Time: 16:03:00, Docket No. 7129, Application No.: 201621009763.
Filed a patent for Invention: Theoritical Concept Of "Business Process Framework In An Enterprise Architecture As Per The Architectural Level" dated 13/05/16 Application No.: 201621011091 A.
24th February 2010, under the national state level seminar on “Artificial Intelligence and its Application” organised by Modern College of Engineering with University of Pune under QIP.
Conducted one month training program on Office Automation in Bharati Vidyapeeth Institute of Technology, Navi Mumbai.
Conducted two days short term course on Data Mining & Warehousing in Sardar Patel college of Engineering, Mumbai.
Conducted Workshop on Network Simulator at Thakur College of Engineering And Technology, Mumbai Conducted a session on Network Simulator 2.0 at ISTE approved workshop in THAKUR ENGG.COLLEGE, Kandivali,Mumbai.
Conducted and trainer for the two-days workshop on Neural network & fuzzy logic from 20th & 21st March, 2009.Coordinated and conducted the 2-days workshop on Neural Network & Fuzzy Logic (NNFL) from 27th to 28th March 2010.
Coordinated 1-day workshop on software testing on 12th march 2010
Conducted a session on PC Assembly organized by CSI S.P.I.T. Chapter on 14th March 2010
Coordinated the 2-days Application development certificate programme (STTP) on Ruby on Rails from 15th Sept to 17th Sept 2012.
This case study was to demonstrate how ICT technologies can be used as a Resource and Force multiplier to leverage the business process agility in the context of Indian Manufacturing and Process Industry. As we know that ,Today the business is changing rapidly over the period. Every Industry need to develop new service offerings and also need to develop new IT-infrastructure to make their business more agile by maximizing the overall operational efficiency. Agility has become the most important key attribute today as Industry faces volatile and uncertain environments. Hence the Industry which operates in highly dynamic environment need business Integration tool to gain competitive advantage. Using a case study approach, this research reports on the investigation of the influence of SAP on business process agility.
Today IT has grown beyond its role as an enabler. ERP are the biggest and most costly software to integrate and major organization buy ERP which focusing on ERP integration for effective and efficient processing, improving productivity ,improving business agility and automation. As a result ERP (Enterprise Resource Planning) applications are being implemented at an increasing speed in different scale firms. Due to the vast variety of available ICT products, designing and executing the product selection process in an efficient and optimal manner is critical. The objective of this case study was to propose a proper selection methodology as per the company’s workflow and hence, identify selection criteria for ERP technology selection and boost their profitability.
MIS-Application is a Patient Management System helpful for the doctors to keep a track over patient's details. It is software where you can manage Patients information like his/her age, disease diagnosed, update patient's record, you can add a new Patient, change their details, take follow ups, etc. It can be handled by different users/doctors depending on the need and also groups of users can be created by granting limited or total access over the system.
Pruritus is defined as an unpleasant sensation that provokes the desire to scratch. Certain systemic diseases have long been known to cause pruritus that ranges in intensity from a mild annoyance to an intractable, disabling condition. Generalized pruritus may be classified into the following categories on the basis of the underlying causative disease: renal pruritus, cholestatic pruritus, hematologic pruritus, endocrine pruritus, pruritus related to malignancy, and idiopathic generalized pruritus.
Today, due to advancement in Mobile technology, it is possible to create on-line Information system for maintaining the records of any activities from the field survey carried out, it is observed that an existing applications require data to be collected from various Health officer of Rural and Urban area, which cause in increasing time for data entries. Hence data entry operation as well as record’s updating is time consuming. Hence the research work was required to design a smart phone application named as “UPSPS” focusing on real time updating of data of any Pension scheme. The project checks if selection of beneficiaries is as per guidelines and the condition of the families that are beneficiaries. Also, to find out key drivers of Pension Yojna by determining factors which are responsible for successful/poor implementation of Yojna. (eg: Transfer of funds, awareness relating to education, health and literacy, readiness of service providers, effectiveness of monitoring system). The project involves suggesting measures and inventions for sustainability and scalability of Pension Yojna. Patent Filed: Filed a patent for Research Protocol titled ‘ MOBILE APP FOR PRASUTITIKAKARAN AND TIKAKARAN “ dated 26/08/2016 ,Application Number: 201621026972 A
Tarang is an android application which assists the user, the EWRs, to understand the Gram Panchayat, the different roles, schemes and laws. In this modern age, technology has become a necessity. Therefore, the application also provides a module ‘E-learning’ to aid the women in learning how to operate and perform basic functions on the computer with the help of materials and videos provided in the application. The users also have additional option of using the application to learn in Hindi or in English ensuring that language would not be a barrier for education the users. With the vivid images and videos, the application is intended to be a fun and educative method to strengthen and ease the transitioning of the women to a EWR.
Dr. Nilakshi Jain, Shah and Anchor Kutchhi Engineering College, India
Dr.Aarti Karande,SPIT, Mumbai, India.
Dr.Seema Kolkur, Thadomal Shahani Engineering College, India
Dr. Anjali Yeole,VESIT,Chembur,Mumbai, India
Dr. Deepak Kapgate, Postdoctoral Researcher:Full time PDF,Srinivas University ,Karnataka, India
Dr. Asha Bharambe, VESIT, Chembur, Mumbai, India.
Dr.Kailas Deadkar, SPIT, Mumbai, India.
Dr.Surekha Arjapure, SPIT, Mumbai, India.
Aditya Das, Software Engineer, Apple, United States
Ananya Navelkar, Software Engineer, Oracle, United States
Anjali Kanvinde, Technology Analyst, Deutsche Bank, India
Anushka Kanawade, Software Engineer, Uber Technologies, United States
Aumkar Gadekar, Technology Analyst, Deutsche Bank, India
Damnik Jain, Software Engineer, JP Morgan, India
Jay Parekh, Software Engineer, ImageKit, India
Jeet Mishra, Analyst, MSCI, India
Jinang Gandhi, Tech Implementation Engineer, MSCI, India
Mahesh Tamse, Technology Analyst, Deutsche Bank, India
Pulin Prabhu, Senior Software Developer, ICICI Lombard, India
Palak Davda, Software Development Engineer, Amazon, India
Parth Dedhia, Machine Learning Engineer, Quantiphi, India
Riya Bakhtiani, Software Development Engineer Intern, Snowflake, United States
Sarah Gawade, Software Engineer, Microsoft, India
Sarah Sonje, MS CS at Georgia Tech | Ex-SDE at Amazon, India
Shreya Oak, Technology Analyst, Deutsche Bank, India
Smruti Varvadekar, Software Development Engineer, Amazon AWS, United States
Sumit Gouthaman, Software Engineer, Google, United States
Tanisha Kulkarni, Developer & Business Analyst, Barclays, India
Tania Rajabally, Graduate Analyst (Technology), Deutsche Bank, India
Tanvi Dhope, Software Engineer, Microsoft, India
Tejas Bhitle, Senior Technology Associate, Morgan Stanley, India
Tejas Chheda, GML SWE @ Meta | MS CS @ UMass Amherst | Grad Student Researcher @ IBM, IESL | ex-ML Intern @ PayPal | JN Tata Scholar
Urvi Bhanushali, Senior Technology Associate, Morgan Stanley, India
Vedant Kumar, MS Data Science student at Columbia University
Rithvika Iyer, MS CS @UT Austin | ex ML engineer at Reliance Jio | Google WTM Scholar APAC 2019
Priyank Singhal, BE Computer from S.P.I.T, Product Lead at Airbnb
I am currently a Professor and Head in Computer Science & Engineering Department[Feb 2023 to till date] and was Ex-HoD [Computer Engineering [Apr 2012 to Oct 2019,Oct 2022 to Feb 2023] ,Ex-Dean of Industry Relations[Jan 2017 to Oct 2022] at Sardar Patel Institute of Technology, Mumbai. With a Ph.D in Technology, Post-doctrate from TISS ,and over 23+ Years of experience in teaching & research, my areas of interest include everything from Soft Computing (Neural Networks, Fuzzy Logic), Computer Networks and more to Human Machine Interaction, Decision Making, Business Intelligence, Mobile Application Development and Technology for a social ,healthcare and rural development. In addition to authoring several books I have conducted several expert seminars on topics like NS2, Neural Network,Machine Learning, Deep Learning,Python Programming, VB.Net and ADO.Net
"AiM4u Software Solutions Pvt.Ltd" is my startup incorporated on 20th June 2023 aimed at developing affordable IT-enabled[tele-medicine] healthcare services mainly focusing on skin related issues and also providing education services via Skill-based Internship Programs in the area of Artificial Intelligence,Computer Vision, Machine Learning and Deep Learning. Our flagship product "DermaLens" is an AI powered Skincare Assistant to check your skin issues ,helps you predict skin diseases(30)and connect with the dermatologists from anywhere, anytime. I have patented 9 innovative ideas,2 copyright of my research work and received 2 patent granted by Indian Patent Office, GoI and 1 Utility Model grant by German patent and trademark office
Post-Doctorate(TISS),Ph.D.(Tech.),M.E.(I.T.),B.E.(Comp.)
Senior Research Fellow (NCW-TISS Project,T.I.S.S.,Mumbai)
Research Fellow(Funded by Tata Trust & MIT(USA)
Completed B.E in Computers from Nagpur University in the year 1997
Completed M.E in Information Technology from Mumbai University in the year 2005.
Completed Ph.D from Mumbai University in the year 2011.
Awarded as a Post-Doctorate from Tata Institute of Social Sciences(T.I.S.S.) in 2016.
Associated with T.I.S.S. as a Senior Research Fellow on the NCW-TISS Project,funded by National Commission for Women,Govt, of India from July 23,2016 to Oct 10, 2016
Research Fellowship with CliX Project at T.I.S.S. ,funded by Tata Trust and M.I.T.(U.S.A.) from Feb 20,2017 to May 19,2017.
Room No.412, 4th Floor, Mon - Fri 09:00 am – 05:30 pm
Department Of Computer Science & Engineering, Sardar Patel Institute Of Technology, Andheri(W), Mumbai 400058.
Copyright © 2023- All Rights Reserved
Designed by Hasti Mehta, Madhura Gore, Neil Daftary , Amit Gaikwad &Dhananjay Kalbande