Personal Information
Organization / Workplace
Pune Area, India India
Industry
Marine / Shipbuilding
About
Presently working as Sr. Assistant Professor at TMI. Consultancy experience at WIPRO,Infosys, Mahindra and Mahindra, IGB systems pvt. ltd.Holding copyright of 7 web based software's PPC (Production Planning & Control), Holding copyright of an educational ERP (consisting modules like HR,Administration, Transport, Inventory,ERM,CRM,Hostel management,Online examination,Technical forum) .Handled many web based projects with .NET framework 4.5 and SQL server 2014.Professional in the field of Embedded systems.
Specialties:
Deep understanding of Software Development Life Cycle (SDLC), current and latest Web Design trends.Research in deep learning and cyber security
Contact Details
Tags
1. introduction
it and business
e-commerce: concepts electronic communication
dbms
technical issues
data independence
three schema architecture
public key algorithms
private key algorithms
hashing techniques
dig cash.
cryptographic applications
representation
digital signature. 4. protocols for transactions.
encryption
call by value
categories of functions
introduction user defined functions in c
concept of pointer & pointer to pointer
declaration of pointers & pointer to pointer
introduction to pointers
strlen()
strcat()
strncat()
strcmp()
strncmp()
strrev()
strstr()
strnstr()
strcpy()
strncpy()
introduction need of an array types of an array de
network security standardization in information se
traffic analysis
active attack
review of attacks
mechanisms and services
osi security architecturem
network security model summary
learning to write programs using selection conditi
operations 1. maximum and minimum values in matrix
sub arrays
accessing elements
representation and operation on arrays arrays: cre
understanding arrays in matlab
using matlab documentation introduction to the cou
introduction to the matlab environment
problem solving
programming languages types
computers and programming
chapter – 12 electronic commerce
chapter – 11 structures and unions
chapter – 10 pointers
chapter – 9 user defined functions
chapter – 8 strings
chapter – 7 arrays
chapter – 6 decision making and looping
chapter – 5 decision control instructions
chapter – 4 data types and operators
chapter – 3 18 introduction to c
chapter – 2 computer software
chapter – 1 introduction to computer
secure shell (ssh) protocol for secure remote logi
review of ssl protocol
mime and mime headers
pgp
e-mail system architecture
direct recursive and indirect recursive functions
formal arguments
actual arguments
software development steps
types of software
computer software
basic computer organization
bcd
ex 3
ascii
multiplication and division complements of binary
subtraction
introduction number systems types of number system
file handling summary
arrays
switch) looping statements
m file conditional statements (if
results
commands
matlab introduction ide
rsa and oaep diffe-hellman key exchange and its se
block ciphering confusion and diffusion theory und
its phases and its supported channel types. o demo
o review of pgp - authentication and confidentiali
distribution of symmetric and asymmetric key digit
modes of operation and its applications multiple e
chprng review of bbs stream ciphering rc4 algorith
prng
its types and usage. trng
random numo galois field polynomial arithmetic exa
groups and rings o one example each in classical s
classical encryption o breaking the cryptosystem r
o cryptography
call by reference
in c language declarations/initialization of chara
introduction to strings
introduction overview of loop statement for loop
hierarchical planning
partial order planning
implementation using goal stack
strips
searching planning blocks world
problem formulation
problem solving agents
structure of agents
the nature of environments
concept of rationality
intelligent agents and environments
types of production systems
problem characteristics
production systems
state space search
knowledge base systems
representation of knowledge
non-ai & ai techniques
a.i. representation
fundamentals of artificial intelligence introducti
computer network topology
types of computer network
computer network
basic internet terminology
internet evolution
statements
structure of a c program
1.history of c language
set-secure electronic transaction. cyber cash
security issues. 3. security technologies: cryptog
internet and intranets. 2. edi to e-commerce. conc
set-secure electronic transaction. cyber cash
security issues. 3. security technologies: crypto
internet and intranets. 2. edi to e-commerce. co
& clustering.
collaborative filtering
classification
examples regression
transformation
architecture and features spark: resilient distri
introduction quick recap spark machine learning (o
memory hierarchy ram memory chip organization rom
rom)[m] 1.8 demonstrate procedure for installation
ram
and explain precautions to avoid an improper shut
printer)[m] 1.3demonstrate keyboard layout and fu
scanner
ups to the computer and checking all connections.
power cables
monitor
mouse
usb storage)[d] operate computer and its periphe
dvd-roms
cd-roms
introduction introduction to hashing internal hash
bcnf
3nf
nf
introduction 3nf and bcnf decomposition requiremen
ddl statements
grouping relational calculus concepts introduction
introduction relational query languages formal que
class hierarchies
er concepts and notations
steps in database design process
users of dbms
structure of dbms
transactions
queries
describing and storing data in dbms
disadvantages of dbms
advantages of dbms over file systems
traditional file systems
database system environment
database systems
that describe solution of a problem.
1 planning the computer program 2 uses of algorith
simple c programs.
expressions
operators and precedence
input & output statements
variables &constants
basic data types
an introduction to ai
introduction overview of loop statement for loop w
types hbase hive pig big table and graph database
introduction hadoop distributed file system (hdfs)
hadoop1 limitations
1. name node 2. data node 3. secondary name node 4
introduction hadoop: introduction hadoop: architec
embedding excel to word. applications : to create
and rename files and folders. 3. use “formatting
find
topics to be covered : 1. create and save document
guidelines for er to relational mapping. mapping r
what is relational model characteristics relationa
notations with appropriate examples. how to model
etc) er notations class hierarchies er concepts
associations
attributes
steps in database design process er concepts (enti
file system vs dbms/rdbms three schema architecure
dbms architecture.
advantages of using dbms over traditional file sys
sharing online content with students using edpuzzl
if- elseif and switch case statements in matlab
if-else
writing programs involving if statement
logical operations
choosing from multiple alternatives exercises in
conditional statements (if statement)
sdlc
projectors) and of storage devices (hard disks
speakers
printer
output devices (monitor
and touch screen scanners
pen
1.1explain types of input devices (keyboard
functions
private
nested functions recursive functions
primary and sub-functions
anonymous functions
user defined functions
body in .dll files
declared in header file
library functions
functions predefined functions
4.global variables
3.local variable
2.formal arguments
1.actual arguments
introduction user defined functions in matlab cate
introduction plotting basic 2-d plots. the plot co
operations maximum and minimum values in matrix po
accessing elements sub arrays
arrays array creation
cyber security and bct in marine marine education
dl working of ai system scope of ai
ml
See more
- Presentations
- Documents
- Infographics