Quick Links

Explore

Notice Board

Training & Placement Cell

Career Develoment Cell

Skill Development Cell

entrepreneur Development Cell

Consultancy Work

Alumni Cell

Virtual Lab

Training and Placement Cell

Training & Placement Officer : Prof. Mane Sambhaji
Training & Placement Coordinator : Prof. Lengare Abhay
T&P Coordinator CSE Dept. : Prof. Mr. Rathod Manoj
T&P Coordinator Civil Dept. : Prof. Desai Sheetalkumar
T&P Coordinator Electronics Dept. : Prof. Mrs. Thorat Roopa
T&P Coordinator Mech. Dept. : Prof. Ghatge Dayanand
T&P Coordinator Prod. Dept. : Prof. Shaikh Aamir

The Training and placement Cell constitutes of Training and Placement Officer as a head and the Departmental Training and Placement officers as coordinators for each department. Training and Placement coordinator coordinates training session for each class in two hours a week, which is included in academic timetable. Department Coordinator also maintains student data of the department and helps TPO in campus recruitment drive process.

We conduct following Training programs through T & P cell at our campus
  • Communication skills Improvement
  • Aptitude test preparations
  • Group Discussions
  • Confidence Building
  • Personal Interview Techniques

Training & Placement Cell helps students for their placements in right company. We have approached multiple companies for placement. Companies look for candidate with good communication skills and equally good technical knowledge. The Institute provides training for Gate, CAT and other competitive examinations.


Faculty Publications
Sr.No

Name of the author/s

Title of paper

Name of journal

Year of publication

Publisher

1

Dr. Shabina Sayyed

Study of PANA Architecture and its Applicability on Emerging Network Environments for Secure Network Access

International Journal of Scientific and Research Publications

Issue 7, July 2013

2

Study Of Protocol For Carrying Authentication For Network Access (PANA) And Its Functionality (For Achieviwork Layer)Network Security In The

3

Open Source Implementation Of Protocol Carrying An Authentication For Secure Network Access On Ietf Standards”

4

Analysis Of Protocol For Carrying Authentication For Network Access (PANA) And Its Applicability On Emerging Network SecurityNetwork Environment For Achieving

Journal Of Information, Knowledge And Research In Computer Science And Applications

& issue 2 Oct 2015

 

5

A Survey of Stygnographi review paper

Research Revolution

018

AGCOE

6

text-align:center;line-height:normal'> >“Review: Apache Spark and Big Data  Analytics for Solving Real World Problems”

'>International Journal of Computer Science Trends and Technology

SSN 2278-6856

'> 

7

>Decision Tree & K-Means Clustering Algorithm Network Traffic Intrusion Detection System’

'>International Journal of Emerging Trends and Technology  in Computer Science

SSN: 2347-8578 Mar - Apr 2016

'> 

8

>Recent Approach for Grape Leaf Disease Detection & Predication

'>CFP1803-PRG978-1-5386-4303-7

018

'>IEEE Madras Section

9

text-align:center;line-height:normal'> >Internet Security Using Iptable

'>ISSN:2319-507X, Vol-2(8).

014

'>ICETCSE 2014 BNCOE

10

text-align:center;line-height:normal'> >A survey of Black hole attack in MANET

'>ISSN 2250-3153, Vol 03 Issue 07

3-Jul

'>IJSRP

11

>A survey of Black hole attack in MANET

'>Paper Id –IJETR/02/2504 Vol 02 Issue 09

ep-14

'>IJETR

12

text-align:center;line-height:normal'> >Recognition of ASL using Hand Gestures

'>International Journal of Emerging Trends & Technology in Computer Science

olume 2, Issue 5, September- October 2013.

'> 

13

text-align:center;line-height:normal'> >Parallel Approaches for Nurse Rostering

'>International Journal of Innovative Research and Studies (IJIRS),Volume 3, .

ul-14

'>IJIRS

14

>Parallel Genetic Algorithm on GPGPU

'>International Journal for Scientific Research & Development| Vol. 3, Issue 05, 2015 Page No. 491 – 494

015

'>IJSRD

15

text-align:center;line-height:normal'> >Web Based Classroom Systems

'>IJIERT Vol 2
Issue 8

nbsp;

'>IJIERT

16

text-align:center;line-height:normal'> >Study of Evasion Attack using Feature Selection in Adversarial Environment

'>International Journal of Science and Research Volume4, Issue10, October 2015

ct-15

'> 

17

>Feature Selection for Security Evaluation against attack in Adversarial Environment

'>International Journal of Engineering and Research Volume5, Issue5,April 2016

pr-16

'> 

18

Privacy Recommendations & Ranking of User images on Content Sharing Sites.

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'> text-align:center;line-height:normal'> 19

text-align:center;line-height:normal'>

ANALYSIS AND DESIGN OF SOFTWARE RELIABILITY GROWTH MODEL USING BUG CYCLE AND DUPLICATE DETECTION TECHNIQUES

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'> text-align:center;line-height:normal'> 20

text-align:center;line-height:normal'>

Refinement of Discovered Patterns for the Text Mining                          

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'>

Nashik

21

text-align:center;line-height:normal'>

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Techniques

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'> text-align:center;line-height:normal'> 22

A Secure Role Based Access Policy for PHR Patient-Centric Model of Health Information Exchange Using Homomorphic Encryption

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'> text-align:center;line-height:normal'> 23

text-align:center;line-height:normal'>

A Static Object Detection in Image Sequences by Self Organizing Background Subtraction

text-align:center;line-height:normal'> class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt; t-align:center;line-height:normal'> text-align:center;line-height:normal'>