Faculty Details

Prof. Priyanka Panchal
- Assistant Professor
- ppanchal@mbit.edu.in
- 02692-230823
- 9574718686
Total Experience
Teaching | 14 Years 1 Month |
Industry | — |
Membership
Life Time Member of Indian Society for Technical Education (ISTE) : LM127658 |
Specialization Area | : | Data Mining,Graphics Designing, Web Development,Social Media Network with Big Data |
Subject Taught | : | Computer Organization & Architecture,Computer Programming and Utilization,Information and Network Security,Data Compression and Data Retrieval,Operating System,Computer Graphics,Web Technology And Programming,Android Programming,Data warehousing And Data Mining,Data Structure,Design Engineering, Visual Basic Application and Programming |
Academic Qualification
Qualification | Specialization | University | Passing Year | Class |
---|---|---|---|---|
PhD | CE/IT | |||
M.E. | Information technology | Gujarat Technological University | 2013 | Distinction |
B.E. | Information technology | Sardar Patel University | 2009 | First |
Experience Details
18th July, 2011 to till dates. | Working as Assistant Professor in Department of Information Technology |
Publication Details
International / National Journal: |
|
---|---|
International / National Conference: |
|
Activities
STTP: |
|
---|---|
Workshop: |
|
Seminar: |
|
Conference attended: |
|
Events organized: |
|
Computer Networks (3150710)
Course Outcome
- Explain the basic terminologies used in networking and layered architecture of computer networks.
- Comprehend basic protocols of the application layer and how they can be used to assist in network design and implementation.
- Describe and implement the essential principles of a connection less and connection-oriented protocols used for reliable data transfer, flow control and congestion control.
- Design network architecture, assign IP addressing and apply various routing algorithms to find shortest paths for network-layer packet delivery.
- Illustrate different link layer terminologies like error detection-correction, Multiple access protocol and Link layer addressing used in network.
Sr. No. | Type | Link |
---|---|---|
1. | Learning Material | Click Here |
2. | Quiz | Click Here |
3. | Assignment | Click Here |
4. | Mid Semester Exam | Click Here |
5. | MOOC | Click Here |
6. | Laboratory Handout | Click Here |
Information and Network Security (2170709)
Course Outcome
- Define the concepts of Information security and their use.
- Describe the principles of symmetric and asymmetric cryptography.
- Understand and apply the various symmetric key algorithms.
- Understand and apply the various asymmetric key algorithms.
- Understand the concepts of hashing with algorithms and apply them.
- Understand and use the message authentication and its requirements.
- Understand the concepts of digital signature and digital certificates.
- List and explain various digital signature algorithms.
- Understand and use the various key management and remote authentication mechanisms.
- Understand the concept transport layer security.
Sr. No. | Type | Link |
---|---|---|
1. | Learning Material | Click Here |
2. | Quiz | Click Here |
3. | Assignment | Click Here |
4. | Mid Semester Exam | Click Here |
5. | MOOC | Click Here |
6. | Laboratory Handout | Click Here |
Computer Organization & Architecture (3140707)
Course Outcome
- Identify and explain the basic structure and functional units of a digital computer.
- Write assembly language programs and identify the role and working of various functional units of a computer for executing instructions.
- Design processing unit using the concepts of ALU and control logic design.
- Design circuits for interfacing memory and I/O with processor.
- Comprehend the features and performance parameters of different types of computer architectures.
Sr. No. | Type | Link |
---|---|---|
1. | Learning Material | Click Here |
2. | Quiz | Click Here |
3. | Assignment | Click Here |
4. | Mid Semester Exam | Click Here |
5. | MOOC | Click Here |
6. | Laboratory Handout | Click Here |
Cryptography and Network security (3161606)
Course Outcome
- Define terms related to cryptography, hashing, message authentication code, digital signature.
- Describe and discuss symmetric key cryptography algorithms, public key cryptography algorithms, hashing algorithms, Message authentication code generation algorithms, digital signature algorithms, key generation and key management, issues in web security and solution, issues in Transport layer security and solution.
- Demonstrate the generation of keys and execution of symmetric and public key algorithms from given data.
- Implement cryptography solution for given security problem by identifying strength and weaknesses of algorithms based on cryptanalytic and brute force attack.
Sr. No. | Type | Link |
---|---|---|
1. | Learning Material | Click Here |
2. | Quiz | Click Here |
3. | Assignment | Click Here |
4. | Mid Semester Exam | Click Here |
5. | MOOC | Click Here |
6. | Laboratory Handout | Click Here |