Assistant Professor
"Block Chain Fundamentals , Distributed Ledger Technology, Theory of Computation, Data Structure, Design Analysis & Algorithm, Discrete Structure & Graph Theory."
13 Year
0 Year
Block Chain, Security, Machine Learning
National :4, International : 16
Blockchain Fundamentals
E-mail.: nvpardakhe@mitra.ac.in Mob. No.: 9096061792
| Sr.No | Paper Name | Paper Link |
|---|---|---|
| 1 | A REVIEW PAPER ON COMPARISON AND ANALYSIS OF DIFFERENT ATTACK AND INTRUSION DETECTION SYSTEM | Click Here |
| 2 | A REVIEW: MANET ROUTING PROTOCOLS AND DIFFERENT TYPES OF ATTACKS IN MANET | Click Here |
| 3 | VANET: A NEW APPROACH FOR SIMULATION OF ROAD ACCIDENCE MONITORING | Click Here |
| 4 | Analysis of Various Topology Based Routing Protocols in VANET | Click Here |
| 5 | A Survey - Different Models in Cloud Computing | Click Here |
| 6 | An Efficient Approach For Indexing Web Pages Using Page Ranking Algorithm For The Enhancement Of Web Search Engine Results Results | Click Here |
| 7 | Enhancement of the Web Search Engine Results using Page Ranking Algorithm | Click Here |
| 8 | Enhancement of Web Search Engine Results Using Keyword Frequency Based Ranking | Click Here |
| 9 | Analysis of Various Web Page Ranking Algorithms in Web Structure Mining | Click Here |
| 10 | Detecting Shortest Path Using Vehicular Routing Protocol | Click Here |
| 11 | Public Integrity Auditing through Trusted Third Party Auditor for Storage Security in Cloud Computing | Click Here |
| 12 | An Efficient Approach for Enhancing Web Search Results Delivery | Click Here |
| 13 | ANALYSIS OF MOBILE USER BEHAVIOR FOR APP DOWNLOADS USING DATA MINING TECHNIQUES | Click Here |
| 14 | A Review on Data Storage Security and Privacy Protection Issues in Cloud Computing | Click Here |
| 15 | OPTIMIZATION PARAMETERS IN WIRELESS NETWORKS | Click Here |
| 16 | A Review Paper on Online Restaurant Management System | Click Here |
| 17 | Study and Analysis of Various Options for Utilization of Bandwidth Optimally in Wireless Networks | Click Here |
| 18 | Machine learning and blockchain techniques used in healthcare system | Click Here |
| 19 | A Review: MANET routing protocols and different types of attacks in MANET | Click Here |
| 20 | Analysis of various web page ranking algorithms in web structure mining | Click Here |
| 21 | Analysis of various topology based routing protocols in VANET | Click Here |
| 22 | A Review Paper on Online Restaurant Management System | Click Here |
| 23 | Enhancement of web search engine results using keyword frequency based ranking | Click Here |
| 24 | A survey-Different models in cloud computing | Click Here |
| 25 | A Review Paper On Comparison And Analysis Of Different Attack And Intrusion Detection System | Click Here |
| 26 | A Secure EHR Protection Strategy by Hybrid Encryption Scheme with Permissioned Blockchain | Click Here |
| 27 | Consortium-Based Algorithm for Access Control and Pattern Analysis Models | Click Here |
| 28 | Use of Blockchain for Securing Electronic Health Records During COVID-19 Pandemic | Click Here |
| 29 | Design and Development of Blockchain-Based Security and Privacy-Preserving System | Click Here |
| 30 | Enhancement of the Web Search Engine Results using Page Ranking Algorithm | Click Here |
| 31 | Public Integrity Auditing through Trusted Third Party Auditor for Storage Security in Cloud Computing | Click Here |
| 32 | An Efficient Approach for Enhancing Web Search Results Delivery | Click Here |
| 33 | An Iris Recognition System: A good Idea for Security | Click Here |
| Sr.No | Portfolio Name | Start Date | End Date |
|---|---|---|---|
| 1 | Teacher Guardian Incharge | 2015-08-15 | Till Date |
| 2 | Attendance Analysis Incharge | 2016-08-19 | Till Date |
| 3 | Class Teacher | 2017-06-22 | Till Date |
| 4 | DTPC Member | 2018-02-01 | Till Date |
| 5 | Peer to Peer Activity Incharge | 2016-12-08 | Till Date |