national conference on emerging trends & innovation in ... 2013 abstract book.pdf · national...
TRANSCRIPT
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
1
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
2
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
3
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
4
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
5
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
6
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
7
TECHNICAL ADVISORY COMMITTEE Sr.no
Name Designation E‐mail Id Contact No.
1. Prof.(Dr.) SP Khatkar
Director, UIET , MDU [email protected] 9813805666
2. Dr. H.L.Verma
(Dean Academic & Administration, Satya Apeejy University)
[email protected] 9896272466, 9896272433
3. Neha Gupta CSE, S(PG)ITM [email protected] 9467848147
4. Dr. Pramod Kumar
HOD DTU, Bawana , Delhi [email protected] 9013353272
5. Dr. YashPal Singh
Director C.D.L Engg College, Sirsa
[email protected] 9416490800
6. Dr. C.Ram Singla
Advisor, S.(PG).I.T.M [email protected] 9354515505
7. Dr.M L Chandna
Professor,D.T.U,Delhi [email protected] [email protected]
9416738460
8. Prof.(Dr.) Executive Council [email protected] 9868263761
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
8
N.K. Gupta Member,ISTE,New Delhi
9. Col. Prof. B.B Sharma
Advisor & Consultant Education Group
9811026636, 9654176405
10. Prof. H.S Panwar
HOD ECE , RD Foundation, Moidinpur, Gaziabad
9927237874
11. Dr. D. Tyagi St. Anne Mary Organization [email protected]
9891227478
12. Dr. Prof. YP Singh
Director, S(PG)ITM [email protected]
9896582698
13. Prof.(Dr.) R. Murugesan
Ex-VC Anna University,presently Chairman ISTE, Delhi
[email protected] 9443317930
14. Dr. Anup Pradhan
Director Research, Sunrise University, Alwar
[email protected] 8003094326
15. Dr. MN Hoda Director, Bharatiya Vidhya [email protected] 9212022066
16. Prof. Mahesh Bundele
Director Research, Poornima University, Alwar
9828999440
17. Prof. K. Kr. Keshariwal
HOD ECE, S.(PG).I.T.M [email protected] 8755160157
18. Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad
[email protected] 9811054645
19. Sh. Vikash Bharati
MD Gate Forum,Delhi [email protected] 9910255155
20. Sh. Neeraj
Techmentro, Noida
[email protected] 9958139080
21. Ravi Gupta Director of BMG Group [email protected] 9812051441
22. Dr. S. Basil Gnanappa
Executive Secretary ISTE [email protected]
011‐26513542, 26513615
23. Dr. Devender Singhj
Director State Institute of Engg. & Tech.
[email protected] [email protected]
9416012060
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
9
24. Vipin Singh Registrar RBIT, Bijnor [email protected] 9756030888
25. Nitin Kumar HOD ECE, Niit Vazirabad, Bijnor
[email protected] 9634080396
26. Abhay Raj Singh
Well Growth Education [email protected] 99710213309457610612
27. Raman Soni Director curriculum( Dev) [email protected]
28. Mr V Sharma Jagannath University viveksharma@jagannathuniversi 9414443034
29. Prof.(Dr)N.S.Gill
Director DDE, MDU,Rohtak [email protected] 9050805136
30. Prof.(Dr.) D. Kumar
HOD, GJU, Hisar [email protected] 9467690800
31. Col. K.C Bhardwaj
President IETE Delhi section [email protected] 9873279796
32. Dr. Rajeev Yadav
HOD, CSE, GCE ,Bilashpur,Gurgaon
[email protected] 9416133666
34. Dr. Rakesh Kumar Gill
( HOD,GITM, Gurgaon) [email protected] 9355025077
35. Ms. Deepti Bali
Aroma Technology [email protected] 9889260194
36. Mr. Ishan Seth
Dy. HOD, KLSIT, Bijnor [email protected] 9889260194
37. Mr. Pushpender
Dean Academic, S(P.G)ITM, Rewari
8059335388
38. Dr. Sohan Garg
Director C.C.S. University, Meerut (UP)
[email protected] 9536744002
39 Mr. Aakash Gupta
McKinsey & Co. [email protected] 9999675155
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
10
TECHNICAL SESSION COMMITTEE-1
Technical Session Track A-Data communication
Sr. No
Name Designation
1 Dr.M L Chandna
Professor,D.T.U,Delhi
2 Mr.Manish
CMC Noida
3 Prof. Krishna Kr. Keshariwal
HOD ECE, S.(PG).I.T.M
4 Dr. Anup Pradhan Director Research, Sunrise University, Alwar
5 Prof.(Dr.) N.K. Gupta
Executive Council Member, ISTE, New Delhi
6 Prof. Raman Soni Director curriculum Development
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
11
TECHNICAL SESSION COMMITTEE-2
Technical Session Track B-Computer Communication
Sr.no
Name Designation
1 Col. Prof. B.B Sharma Advisor & Consultant Education Group
2 Dr. YashPal Singh Director C.D.L.U Engg. College, Sirsa
3 Ms. Neha Gupta
CSE, S(PG)ITM
4 Sh. Vikash Bharati MD Gate Forum,Delhi
5 Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad
6 Mr. Sandeep Jain Jain computers Rewari
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
12
HIDING IMAGE IN AUDIO USING DWT AND LSB
Abstract -- The issue of important information hiding preoccupied the minds of many people especially in business, military and political fields due to the secrecy of their information. Thus, there were always secret means and methods that were pursued to send such information. Later on the spread of internet, information can be sent easily and quickly .Still, at the same time the sent data was easily intercepted and uncovered by hackers. Researchers and scientists have made a lot of research work to solve this problem and to find an effective method for image hiding .The proposed system aims to provide improved robustness, security by using the concept of DWT (Discrete Wavelet Transform) and LSB (Least Significant Bit) proposed a new method of Audio Steganography. The emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.
WIRELESS SENSOR NETWORK: SUSPICIOUS NODE DETECTION BY SIGNAL STRENGTH IN WSN
Abstract- A wireless sensor network is a collection of nodes organized into a cooperative network. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. In this paper we have explained the architecture of Wireless Sensor Network, its comparison with mobile ad-hoc network, various topologies used in WSN , challenges and how to detect the suspicious nodes in Wireless Sensor Network.
NEHA GUPTA [email protected]
Department of Computer Engineering, The Technological Institute of Textile & Sciences Bhiwani
Haryana, India.
NIDHI SHARMA [email protected]
Assistant professor in Department of Computer Engineering The Technological Institute of textile & Sciences, Bhiwani
Haryana, India
1RISHI VERMA 2 SUNNY 3PUSHPENDER [email protected] [email protected] [email protected] Department of CSA Department of CSA Department of CSE CDLU,Sirsa(Haryana)-India CDLU,Sirsa(Haryana)-India Assistant Prof.(SITM,Rewari)-HR
Manuscript Id: 21C001
Manuscript Id: 21C009
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
13
TESTING OF OBJECT-ORIENTED PROGRAMMING SYSTEMS (OOPS)
Abstract- The aim of this paper is to examine the testing of Object-Oriented Programming Systems (OOPS) and to compare and contrast it with the testing of conventional programming language systems. Conventional system testing, object-oriented system testing and the application of conventional testing methods to object-oriented software will be examined, followed by a look at the differences between testing of conventional (procedural) software and the testing of object oriented software.
ENERGY EFFICIENT WIRELESS COMMUNICATION
Abstract -The explosive growth of high-data-rate applications is leading to more and more energy consumption in wireless networks to guarantee quality of service. Telecommunication networks consume increasing amount of energy and contribute a growing fraction to the CO2 emissions of ICT industry, and are responsible for approximately 2% of the global energy consumption. Reducing energy consumption in wireless communications has attracted increasing attention recently. As data traffic continues to grow due to the proliferation of smart phone devices, reducing greenhouse emission by improving the network energy efficiency is becoming increasingly important. Therefore, energy-efficient communications have been paid increasing attention under the background of limited energy resource and environmental- friendly transmission behaviors. Thus, climate and cost issues now shift the research focus of wireless communications to energy consumption and energy efficiency. In this article, basic concepts of energy-efficient communications are first introduced and then existing fundamental works and advanced techniques for energy efficiency (EE) are summarized, including information-theoretic analysis, orthogonal frequency division multiple access (OFDMA) networks, multiple-input multiple-output (MIMO) techniques, relay transmission, and resource allocation for signaling. Some valuable topics on energy-efficient design are also identified for future research.
GARIMA SINGH [email protected]
M.Tech (CSE) Ist Semester Somany (PG) Institute of Technology &
Management, Rewari
NEHA GUPTA [email protected]
Assistant Professor Department of Computer Science & Engineering,
Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
ANITA YADAV [email protected],
Department of Computer Science & Engineering Somany Institute of Technology & Management (PG), Rewari, Haryana
Manuscript Id: 21C019
Manuscript Id: 21C004
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
14
FACIAL IMAGE RECOGNITION USING DIMENSIONS REDUCTIONS TECHNIQUES PRINCIPLE COMPONENTS ANALYSIS
Abstract—Face recognition is one among the several techniques for identification and verification of an individual. The approach in the present work transforms face images into a small set of characteristic feature images called eigenfaces, which are the principal components of the initial training set of face images. Recognition is performed by projecting a new image into subspace spanned by eigenfaces, followed by computing the distance between the resultant position in the face space and those of known face classes.
REVIEW ON CRYPTOGRAPHY
Abstract: Cryptography is a technique used in day today life for security and protection of confidential information. Cryptography is where security engineering meets mathematics. In this paper I am discussing modern cryptography algorithms that heavily based on computer science practice and mathematical theory, making such algorithms hard to break in practice by any adversary. These algorithms include various Secret key cryptography, public key cryptography algorithms.
SUNNY MITTAL [email protected]
Lecturer , Dept of CSE Loard Krishna Polytechnic, Rohtak
RISHI VERMA [email protected]
Assistant Professor, Dept of CSE S. (P.G.) I.T.M., Rewari‐Haryana
Sangeeta Yadav [email protected]
Department of Computer Science Somany Institute of Technology and Management
Haryana (Rewari)
Ekta Chaudhary [email protected]
Department of Computer Science Somany Institute of Technology and Management
Haryana (Rewari)
Manuscript Id: 21C010
Manuscript Id: 21C033
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
15
JAVA – AN EMERGING FIELD FORWEB APPLICATION DEVELOPMENT IN SAP USING WEBDYNPRO
Abstract:- In this paper it is going to be discussed the differences between two existing WebDynpro techniques – SAP WebDynpro for ABAP and SAP WebDynpro for JAVA. Both have their own pros and cons. So the decision to choose one is best to leave upon the organizations depending upon the need, suitability and business circumstances. WebDynpro is SAP’s own strategic model to create and develop web-based UI applications. Based on the foundation of MVC architecture, it separates the Model, View and Controller which means it keeps apart the backend data from user interface and processing logic. Since all the three are independent so, three developers can work together on the same application which can later be merged via interface. WebDynpro has been classified into two UI Technologies – WebDynpro ABAP and WebDynpro JAVA. Both these domains are integrated with runtime and graphical environment comprising special UI elements which help in building an attractive UI and minimize the coding effort.
ANALYSIS OF WORLD WIDE WEB
Abstract- The World Wide Web or WWW or W3, commonly known as the web is a system of interlinked hypertext documents accessed via the Internet. The W3 project merges networked information retrieval and hypertext to make an easy but powerful global information system. This paper gives the brief introduction of the World Wide Web. This paper defines World Wide Web, working of World Wide Web. It also focuses on the application of the World Wide Web and the need of World Wide Web. W3’s ability to provide implementation-independent access to data and documentation is ideal for a large HEP collaboration. W3 now defines the state of the art in networked information retrieval, for user support, resource discovery and collaborative work.
PARAS MAL [email protected]
Computer Science Engineering Department,Arya College of Engineering & Research Center, Jaipur, India
SUNITA KUMARI [email protected]
Department Of Computer Science & Engineering Somany (P.G.) Institute Of Technology & Management,
Rewari‐ 123401.
RISHI VERMA [email protected]
Assistant Professor Department Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology & Management, Rewari- 123401.
Manuscript Id: 21C034
Manuscript Id: 21C032
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
16
DESIGN AND DEVELOPMENT OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
Abstract-- Wireless Mesh Networks (WMN’s) are self Configuring and self Organizing networks. Routing in WMS’s is very important issue. For routing purposes Several Routing protocols have been developed. Due to Dynamic network conditions, routing is the most critical part in WMN’s and need to be optimized. The routing strategies developed for WMN’s must efficient to make it an operationally self configurable network. This paper responds the design consideration to develop a routing protocol keeping the issue of performance for WMN’S. In this paper, we have explained the routing challenges design and criteria concepts for developing a new routing protocol in WMN’s.Here, we have discussed the key design features for Routing in wireless Mess Networks. Thus, this paper will help to guide the refocus future works in this area.
INTRODUCTION TO CLOUD COMPUTING: A REVIEW
Abstract – This paper describes the cloud computing, system and applications .The term “Cloud Computing” has been mentioned for recent few years. It is basically related to provide a relation between services and users connected through the internet. The main logic behind the Cloud computing is “Renting instead of buying IT services”. Cloud Computing becomes a buzz word not only for start-ups but also for the large companies. These large companies organize international activities over cloud. Cloud Computing allow to access any IT service and software present on the cloud.
ANITA SHARMA [email protected]
Department of Computer Science Somany Institute of Technology and Management
Haryana (Rewari)
ANJALI
[email protected] Department of Computer Science & Engineering Somany Institute of Technology & Management
Rewari, Haryana, INDIA
Manuscript Id: 21C035
Manuscript Id: 21C028
RASHMI SHARMA
Department of Computer Science & Engineering Somany Institute of Technology & Management (PG), Rewari,
Haryana
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
17
DIGITAL IMAGE WATERMARKING USING DWT-DCT- VITERBI ALGORITHM
Abstract: Watermarking is a need of digital media. To protect from copyright violation of original media, digital watermarking has been proposed as valid solution for this problem. Watermarking using combined DWT-DCT method is done. It improves the parameters like PSNR, bit error ratio. The purpose of the watermark is to embed some additional information about the digital data without visibly modifying it. To make watermarked image more immune to attacks during communication channel, Viterbi algorithm is used. The Viterbi algorithm finds the most likely string of text given the acoustic signal. But in our work viterbi algorithm will be used in image watermarking because it is most error correcting algorithm which is having comparable complexity. Viterbi decoding is used in transferring of data over noisy channel in digital communication. This makes image less prone to errors and a fast decoding method also.
ROUTING CHALLENGES IN WIRELESS MESH NETWORKS
Abstract—Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured networks that employ Cmulti-hop communications to transmit data traffic to and from Internet entry points. WMNs are comprised of three types of nodes: access points, mesh routers, and mesh clients. In mesh networks, traffic between mesh nodes and the Internet is routed over mesh gateways. In this paper, a survey on routing protocols, challenges in routing and applications in wireless mesh networks is conducted. Also we have explained several metrics and design concepts for routing protocols in WMNs.
NEHA GUPTA
[email protected] Assistant Professor,Department of CSE
S(PG)ITM , Rewari
ABHISHEK GUPTA
[email protected] Assistant Professor
Department of ECE,Geeta Engineering College, Panipat
SONU BHARDWAJ
STUDENT M.TECH Department of Computer Science & engineering
Somany (PG) Institute of Technology & Management, Rewari (HR)-India
Manuscript Id: 21C027
Manuscript Id: 21C031
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
18
A RELIABLE ROUTING MECHANISAM FOR WIRELESS MESH NETWORKS
Abstract— Since wireless mesh networks are ad-hoc in nature, therefore routing protocols used for ad-hoc networks like AODV are also used for WMNs by considering only the shortest path to destination. In WMNs data is transferred to and from APs, and due to this, certain problems such as congestion on routes and overloading the APs are taken place. To obtain a reliable routing path, we have proposed a reliable routing mechanism in this paper. In this paper, we propose a fuzzy logic based, routing algorithm for finding a reliable routing path in WMNs. In this routing technique for each node, we calculate two parameters, signal power value and trust value, to find out the lifetime of routes. Each node along route discovery, stores its signal power value and trust value in RREQ message. In the destination with the help of fuzzy logic mechanism, a new parameter reliability value is determined from inputs signal power value and trust value of each route. The path having highest reliability value is selected as a stable route from source to destination.
REVIEW ON IMPROVE VOICE QUALITY ON VOICE OVER INTERNET PROTOCOL
Abstract - voice over internet protocol (VoIP) is a technology that allows telephone calls to be made over computer network like internet. The user can make the telephone calls over an IP network using this technology. VOIP converts analog voice signals into digital data packets and support real-time, two-way transmission of conversation using I.P. This paper will describe voice over internet protocols to a level that allows discussion of voice quality issues and security issues. Bandwidth is the major reason of low voice quality in voice over IP. Rather than this, equipments , ATA-Router , phone-frequency , weather condition are also some factors that affect the voice quality in VOIP. QoS for VoIP is the strict that can allow you to make a decent call without suffering from delays, weird sounds, noise and echo. You want to converse just like you would over a landline phone. VOIP are basically concerned with businesses, Quality of services (QOS).
Er. Pushpender Sarao [email protected]
Research Scholar Shri Venkateshwara University, Gajraula-UP
Prof. Dr. Sohan Garg [email protected]
Prof. C.C.S. University, Meerut-UP
Puneet saini Ruchika Walia [email protected] [email protected]
Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana S. (P.G.) I.T.M., Rewari‐Haryana
Manuscript Id: 21C007
Manuscript Id: 21C002
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
19
ADVANCEMENT IN LANGUAGES DESIGN USING
PARALLEL COMPUTING FRAMEWORKS
Abstract- Parallel computing simply means using more than one computer processor to solve a problem. Classically, computers have been presented to newcomers as “sequential” systems, where the processor does one step at a time. There are still machines and applications where this is true, but today most systems have parallel features Supercomputers achieve astounding speed on scientific computations by using amazing numbers of processors. Servers use multiple processors to handle many simultaneous requests in a timely manner. For example, a web server might use dozens of processors to supply hundreds of pages per second Multi-core chips include several processor cores on a single computer chip. Even a laptop (or other small system) that uses a multi-core chip is a parallel computer.
SILENT SOUND TECHNOLOGY USING Electromyography (EMG) - A Review
Abstract- Silent Sound Technology is useful for those who are unable to speak. They can easy communicate with other people using this technology. Silent Sound technology notices every movement of lips and transfers it into sound. And it help the people who have lost their voice to speak .Silent Sound Technology is developed at the Karlsruhe Institute of Technology. Silent sound technology detects every lip movement and then transforms it into sound that one can easily understand.
PIYUSH SHARMA
Departmentof CSE Arya Engineering College & Research Center
Jaipur, Rajasthan, India
SUDHANSHU VASHISTHA
Departmentof CSE Arya Engineering College & Research
Center Jaipur, Rajasthan, India
NIKITA SHARMA
Departmentof CSE Arya Engineering College & Research Center
Jaipur, Rajasthan, India
Manuscript Id: 21C030
INDERPAL Student, M.Tech.
Dept. of CSE Somany Institute of Technology and Management
Rewari(HR.) INDIA
Manuscript Id: 21C018
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
20
CAPABILITY BASED ENCRYPTION SCHEMES
Abstract-At present time, the growth in the networking technology increases day by day and interchanging of the digital images very frequently. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with different types of encryption techniques. So for providing data security many cryptography techniques are there, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. There is also, a survey on existing work which is used different techniques for image encryption is done and a general introduction about cryptography is also given.
PROCESS SCHEDULING ALGORITHM
Abstract- The main objective of this paper is to introduce a new CPU algorithm called A Novel CPU Scheduling Algorithm which acts as both preemptive and non-preemptive based on the arrival time. The proposed algorithm helps to improve the CPU efficiency in real time uni-processor-multi programming operating system. CPU Scheduling is the basis of multi-programmed operating system. The scheduler is responsible for multiplexing processes on the CPU. There are many scheduling algorithms available for a multi-programmed operating system like FCFS, SJF, Priority, Round Robin etc. In this paper, the results of the existing algorithms (FCFS, SJF, Priority and Round Robin) are compared with the proposed algorithm.
Ekta
[email protected] Dept. of Computer Science & Engineering
S. (P.G.) I.T.M., Rewari-Haryana
SANGEETA YADAV
[email protected] Dept. of Computer Science & Engineering
S. (P.G.) I.T.M., Rewari-Haryana
NEHA YADAV EKTA
[email protected] [email protected] Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C020
Manuscript Id: 21C013
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
21
SOFT COMPUTING AND TECHNIQUES
Abstract-Soft computing can be a very attractive alternative to a purely digital system, but there are many traps waiting for researchers trying to apply this new exciting technology. For nonlinear processing both neural networks and fuzzy systems can be used. Terrifically neural networks should provide much better solutions: smoother surfaces, larger number of inputs and outputs, better generalization abilities, faster processing time, etc. In industrial practice, however, many people are frustrated with neural networks not being aware that the reason for their frustrations is wrong learning algorithms and wrong neural network architectures. Having difficulties with neural network training, many industrial practitioners are enlarging neural networks and indeed such But at the same time such excessively large network are not able to respond correctly to new patterns which were not used for training. This paper describes how to use effective neural networks and how to avoid all reasons for frustration.
CRYPTOGRAPHY AND SECURITY ANALYSIS Abstract-Cryptography is the science of writing in secret code and is an ancient art. The need for secure commercial and private communication has been led by the Information Age, which began in the 1980's. The World Wide Web is an electronic protocol which allows people to communicate mail, information, and commerce through a digital medium. This new method of information exchange has caused a tremendous need for information security. A thorough understanding of cryptography and encryption will help people develop better ways to protect valuable information as technology becomes faster and more efficient. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is pretty good privacy because it's effective and free.
DEEPAK KUMAR
[email protected] Dept. of CSE
MITM, JEVRA(HISAR)
Parshant Sharma
[email protected] Dept. of CSE
MITM, JEVRA(HISAR)
Sushma pachar
[email protected] Dept. of CSE
MITM, JEVRA(HISAR)
JYOTI KUMARI [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
Ekta [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C003
Manuscript Id: 21C011
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
22
REMOTE PROCEDURE CALL IN DISTRIBUTED SYSTEM
Abstract-Remote Procedure Call (RPC) is a powerful technique for constructing distributed, client/server based applications. This survey is to explain RPC mechanism, how to use the Sun RPC convert local procedures to remote procedures. An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling arguments are passed to the remote procedure and the caller waits for a response to be returned from the remote procedure. A client who interacts with the user and a server, which interacts with the resources The client makes a procedure call that sends a request to the server and waits. The thread is blocked from processing until either a reply is received, or it times out. When the request arrives, the server calls a dispatch routine that performs the requested service, and sends the reply to the client. After the RPC call is completed, the client program continues. RPC specifically supports network applications.
COMPARATIVE STUDY OF WRITER VERIFICATION SYSTEM
Abstract-Writer Verification System (WVS) is the task of determining whether a handwritten text has been actually written by a certain person or not. The system comprises a handwritten text and a claimed identity and subsequently decides whether the text has been written by this writer or not. The steps followed by WVS are in the order: image acquisition, pre-processing, segmentation, feature extraction & classification and post-processing. There are many classifiers present for feature extraction & classification. In the present paper, we will explain WVS, classifiers used in previous work are explained.
GAJENDRA YADAV
[email protected] Department of computer Science & engineering
Somany(PG)Institute of technology & management, rewari(HR)-India
RUCHIKA WALIA [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana
MUDIT BANSAL [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana
Manuscript Id: 21C014
Manuscript Id: 21C012
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
23
SOCIAL NETWORKING: THE VIRTUAL WORLD
Abstract-Social networking belongs to social communication between the people on Web. Actually, the main aim of “social networking” is to study the interaction of the certain community and what step should be follow for their interaction. Social networking refers to all those online services which are available for free to use for all those people who are interested in making communication with people. There are several free software and web space which allow users to create a network of people. Using social networking users can create their profile, by inserting their personal details. The details of user are not only contains vital information, but they also constitutes a lot of other information like user’s hobbies, passions, interests, professional background and qualification statistics etc. There could be many other factors which could be responsible connect individual in social groups with more security.
REPLICATION IN MOBILE AD-HOC NETWORK USING HOPFIELD NETWORK
ABSTRACT-Mobile Ad hoc Network (MANET) is a network comprises of mobile nodes connected without any centralized administration. Each node in the network has the ability to share a large number of objects with other nodes. The nodes are connected with other nodes to forward a message to other nodes until the search for node that desire meets. This paper represents a new replication method to recover the performance in distributed system. Objects are replicated on different nodes in the network to minimize the search for an object. It is observed that mobility of nodes predicted using SOM (Self Organizing Maps) technique provides less accuracy. This paper represents an algorithm that uses the network parameters as input condition to replicate objects into the nodes. The decision for each node will be taken by gathering the input conditions and feed to the Hopfield Neural Network. It is view that it will provide more accuracy and improve the performance.
ABHIMANU SHARMA
[email protected] Department of Computer Science & engineering
Somany (PG) Institute of Technology & Management, Rewari(HR)-India
TANNU CHAWLA
[email protected] Computer Science & Engineering Department, The Technological
Institute of Textile & Sciences, Bhiwani- 127021, India
DR. MUKESH KUMAR
[email protected] Computer Science & Engineering Department, The
Technological Institute of Textile & Sciences, Bhiwani- 127021, India
Manuscript Id: 21C002
Manuscript Id: 21C015
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
24
ANALYSIS OF NORMALIZATION AND ITS FUTURE SCOPE IN THE
MANAGEMENT OF DATABASE
ABSTRACT-Normalization is a major task in relational database design. Normalization optimizes database management by reducing or eliminating redundant data and ensuring that only related data is stored in a relational database table. This paper describes what database normalization is, why it is important, what it does, and why it is used when building a database. This paper will also describe what happens to a database, when it has not been normalized. It goes on then, to describe the first (1NF), second (2NF), third (3NF) and BCNF normal forms. It focuses on the advantages and disadvantages of normalization, and outlines the advantages and disadvantages of using denormalization .It also discuses the future scope of normalization in database management system.
MANAGEMENT INFORMATION SYSTEM & ITS STRUCTURE
Abstract - Management information system can be used in various forms in organization and businesses. some case such as activates, problem solving, organizational and fallow up business opportunities with using it will be possible .management information system is a useful tool that provided organized and summarized information in a proper time to decision makers and enable making accurate decision for manager in organization or in proper time to decision maker and enable making accurate decision for manager in organizations or in other words, it’s a system that receives data from different units and provide timely and accurate information for different levels of mangers for making optimal decision. In this paper we intend to evaluate the components of (MIS) and the role of it in making optimal decision process.
HEENA SHARMA
[email protected] Department Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology and Management, Rewari
RISHI VERMA
[email protected] Assistant Professor
Dept. of Computer Science & Engineering Somany (P.G.) Institute Of Technology and Management,
Rewari
Manuscript Id: 21C016
SUMAN
[email protected] Depatment of MBA
Somany(P.G)Institute of Technology & Management, Rewari.
PRITI YADAV
[email protected] Assistant Professor
Department of MBA Somany(P.G)Institute of Technology & Management, Rewari.
Manuscript Id: 21C041
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
25
REVIEW ON STUDY OF CLOUD COMPUTING
Abstract-Cloud computing is a type of computing that relies on sharing computing resources through network. In cloud computing, the word cloud is used for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services are given -- such as servers, storage and applications and so on. In this we are going to study about the cloud management, cloud industry, why we use cloud, and also we are going to study the infrastructure, platform and software used as a services in the cloud computing.
DATA MINING AS GRAPHS: A NEW TOOL FOR SOCIAL NETWORKS
ABSTRACT- The objective of this study is to investigate the concept of data mining in social networks with special emphasis on the graph structure technique. The major principle part in this survey is the literature which is the base or background of the field. The base or background is further divided in to four major part are The Graph theory, The Social networks, The Online social networks and The Graph mining. The graph mining is further divided in to ten sub themes.
RAJEEV SHARMA PUSHPENDER SARAO
[email protected] [email protected] Dept. of Computer Science & Engineering Assistant Professor
S. (P.G.) I.T.M., Rewari-Haryana Head, Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
SOMESH
Somany Institute of Technology and Management Rewari(HR.) INDIA
Email:- [email protected]
Manuscript Id: 21C018
Manuscript Id: 21C021
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
26
HIDDEN MARKOV MODEL: A USEFUL TOOL IN AUTOMATIC SPEECH RECOGNITION
Abstract: Speech recognition has been lately used in our smart phones, search engines, security systems etc. When we talk about intelligent system or user-friendly system speech recognition comes in first choice. The main issue is about recognizing the user’s speech and for that purpose Hidden Markov Model (HMM) is extensively used. Out of three different approaches for speech recognition namely Acoustic-phonetic, Knowledge Based, and Pattern Recognition Approach, the later used HMM Model. This paper will present general aspect of automatic speech recognition and use of HMM in it. The paper’s study is based on pattern recognition approach and the third phase speech recognition process ‘Recognition’ and HMM is studied in detail.
REVIEW ON MICROSOFT SPEECH REORGANIZATION API
Abstract: The Speech Application Programming Interface or SAPI is an API developed by Microsoft to allow the use of speech recognition and speech synthesis within Windows applications. To date, a number of versions of the API have been released, which have shipped either as part of a Speech SDK, or as part of the Windows OS itself. Applications that use SAPI include Microsoft Office, Microsoft Agent and Microsoft Speech Server. In general all versions of the API have been designed such that a software developer can write an application to perform speech recognition and synthesis by using a standard set of interfaces, accessible from a variety of programming languages. Speech Recognition and Text-To-Speech engines or adapt existing engines to work with SAPI. In principle, as long as these engines conform to the defined interfaces they can be used instead of the Microsoft-supplied engines. In general the Speech API is a freely redistributable component which can be shipped with any Windows application that wishes to use speech technology. Many versions (although not all) of the speech recognition and synthesis engines are also freely redistributable. There have been two main 'families' of the Microsoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extra features in each newer version.
ASHWANI RATHI [email protected]
Department of Computer Science Engineering Somany (P.G) I. T. M. Rewari
SANTOSH DAHAL [email protected]
Department of ECE Somany (P.G) I. T. M. Rewari
RUCHIKA WALIA [email protected]
Department of CSE Somany (P.G) I. T. M. Rewari
RIPUDAMAN SINGH [email protected]
Department of Computer Science & engineering Somany (PG) Institute of Technology & Management, Rewari (HR)-India
Manuscript Id: 21C024
Manuscript Id: 21C025
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
27
DISTRIBUTED COMPUTING
Abstract-Ensembles of distributed, heterogeneous resources, or Computational Grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. In this paper we briefly motivate Grid computing and introduce its basic concepts. We then highlight a number of distributed computing research questions, and discuss both the relevance and the shortcomings of previous research results when applied to Grid computing. We choose to focus on issues concerning the dissemination and retrieval of information and data on Computational Grid platforms. We feel that these issues are particularly critical at this time, and as we can point to preliminary ideas, work, and results in the Grid community and the distributed computing community. This paper is of interest to distributing computing researchers because Grid computing provides new challenges that need to be addressed, as well as actual platforms for experimentation and research.
FACE RECOGINITION TECHNOLGY
Abstract: Recently Face recognition is becoming the part of everyday life .It has received significant attention, especially during the past several years Face Recognition is the most commonly used in our society on network multimedia. In this paper, we have described the image analysis & processing and video compression and also described the biometrics and classification of biometrics. Biometrics is the identification of the person on the basis of behavioral and anatomical characteristics.
PREETI YADAV
M.Tech. 3rd Sem.(CSE), S(PG)ITM,Rewari
Manuscript Id: 21C029
MANU YADAV
[email protected] Department of Computer Science & Engineering
Somany(PG) Institute of Technology & Management,Rewari(Hry.)-INDIA
Manuscript Id: 21C043
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
28
KNOWLEDGE DISCOVERY OF DATA WAREHOUSING
ABSTRACT-Data Warehousing and Knowledge Discovery has been widely accepted as a key technology for enterprises and organizations. It is improve to their abilities in data analysis, decision support and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision making process, the data to be considered becomes more and more complex in both structure and semantics. Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist researchers in extracting useful information from the rapidly growing volumes of digital data. The need for methods and tools that will automate the process of knowledge extraction, or guide the user to subsets of the dataset that are of particular interest is becoming prominent.
WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES
Abstract-Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area net- work coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. The core technology involves a network of wireless routers relaying each others’ packets in a multihop fashion. Many variations on targeted applications and implementation choices offer different opportunities to emerging companies in this emerging area. In this article, we will present an introduction to wireless mesh networks and present both the benefits enabled by this technology and the main hurdles that have to be overcome.
AARTI [email protected]
Department Of Computer Science & Engineering Somany (P.G.) Institute Of Technology & Management,
Rewari -Haryana
RISHI VERMA [email protected]
Assistant Professor Department Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology & Management, Rewari‐Haryana
RAHUL YADAV [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana
Manuscript Id: 21C017
Manuscript Id: 21C037
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
29
COMPARATIVE STUDY OF VARIOUS IMAGE SEGMENTATION METHODS
Abstract- Segmenting an image to meaningful parts is a fundamental operation in image processing. Image segmentation is the process of partitioning a digital image into multiple segments. In this paper, various image segmentation methods are explained.
COMPARISON OF CRYPTOGRAPHY AND OTHER DATA HIDING
TECHNIQUES
Abstract - Cryptography is a technique of secure communications between a sender and one or more recipients. In this, sender scrambled a message (plain text into cipher Text) with the help of algorithm and the key and sends this message to recipient. Now recipient unscrambled the message (with the same algorithm and a key, which may or may not be same as the sender’s key) into the original message (cipher text into the plain text). There are two main kind of cryptography: Symmetric Key Cryptography (also known as private key or secret key cryptography) and Asymmetric Key Cryptography (also known as public key cryptography). In our paper we are explaining about the cryptography, its different types, substitution methods, transposition methods and also focused on the different algorithms used for the symmetric and asymmetric key cryptography. We are also showing the comparison of cryptography technique with other data hiding techniques like watermarking, steganography and explaining which one is better for what kind of purpose.
MUDIT BANSAL [email protected]
Department of CSE Somany(P.G.)Institute of Technology & Management,
Rewari (Haryana)
RUCHIKA WALIA [email protected]
Department of CSE Somany(P.G.)Institute of Technology & Management,
Rewari (Haryana)
Manuscript Id: 21C023
JAGDEEP KAUR [email protected]
Department of Computer Science & Engineering, Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
Manuscript Id: 21C036
NEHA GUPTA [email protected]
Assistant Professor Department of Computer Science & Engineering,
Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
30
ISSUES AND CHALNGES OF E- LEARNING
Abstract- In the E-learning and E-learning, numerous universities and cultural organizations around the world have launched initiatives to develop tools for multilingual learning and web publishing and have given preference to local content. India has different languages and different culture. Most of the knowledge and information related to people, culture, science and philosophy of India is available in India languages, which will be useful for learning and developing knowledge base. In India E-learning system and online courses are already started, but as a multi lingual country, which gives importance to education through regional languages, This paper cover the issues of Indian language knowledge base/content base, it’s requirement, and its implication in learning. An integrated multi lingual E-learning system for India is proposed in this paper, where importance given to multi lingual course content creation.
CRITICAL STUDY ON BIOLOGICAL NEURAL NETWORK & ARTIFICIAL
NEURAL NETWORK
Abstract - Artificial Neural Networks are inspired by human brain and it also provides new directions and innovative approach in solving problems & wider the potential of computer’s processing. The purpose of this paper is to discuss about the Artificial Neural Networks & how it is linked to our biological neural network, its architecture & applications in modern world. In applications, we will discuss about direct applications which includes pattern classification, associative memories, optimization, control applications and application areas. At last, we will critically study the performance comparison of human brain and ANN.
VIRAT
[email protected] Department of Computer Science & Engineering
Somany(PG) Institute of Technology & Management,Rewari(Hry.)-INDIA
Manuscript Id: 21C038
KRISHAN KUMAR
[email protected] Department of MBA
Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
SAPNA YADAV
[email protected] Assistant Professor
Department of MBA Somany (PG) Institute of Technology & Management,
Rewari- Haryana, India.
Manuscript Id: 21C042
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
31
SWOT ANALYSIS OF E-COMMERCE
Abstract - This research paper describes the invention and accessibility of internet connectivity and powerful online tools has resulted a new commerce era that is E-commerce, which has completely revolutionized the conventional concept of business. E-commerce deals with selling and purchasing of goods and services through internet and computer networks. E-commerce can enhance economic growth, increase business opportunities, competitiveness, better and profitable access to markets. E-Commerce is emerging as a new way of helping business enterprises to complete in the market and thus contributing to economic success. In this research paper we will discuss about advanced SWOT analysis of E-commerce which will comprise of strengths, weaknesses, opportunities and threats faced by e-commerce in current scenario.
IMPACT OF E – BANKING ON TRADITION BANKING SERVICE
Abstract- Internet banking is changing the banking industry having the major effect on banking relationships. Banking is now no longer confined to branches were one has to approach branch in person, to withdrew cash and deposit a cheque request a statement of accounts. In true internet banking any inquiry or transaction is processed online without any time. Providing internet banking is increasingly become a “need to have” then a “nice to have” service. The net banking thus, now is more of a norm rather than an exception in many developed countries due to the fact that it is the cheapest way of providing banking services. This research paper will introduce you to E-Banking, giving the meaning, functions, types, advantages and limitations of E-Banking. It will also show the impact of E-Banking on traditional services and finally the result documentation.
Manuscript Id: 21C039
NISHA
[email protected] Department of MBA
Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
PRITI
[email protected] Assistant professor
Department of MBA Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
SANTOSH
[email protected] Department of MBA
Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.
SAPNA YADAV
[email protected] Assistant Professor
Department of MBA Somany (PG) Institute of Technology & Management,
Rewari- Haryana, India.
Manuscript Id: 21C040
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
32
INVISIBLE COMMUNICATION OF SECRET DATA USING VISUAL
CRYPTOGRAPHY
Abstract- In this paper, we proposed a more secure method for Visual cryptography using Least Significant Bits (LSB) information hiding algorithm and based on this, quality will be managed by PSNR (Peak Signal to Noise Ratio) and MSE (Mean Squared Error). So mainly what we are going to do is that an effort has been made to propose and implement a new steganography technique for images by modifying existing algorithms. This technique uses LSB steganography as our basis and disperses a secret message over the entire image taken by us to ensure that the secret message cannot be get from the image. When we compare with other existing algorithms, we can easily prove that the difficulty of decoding the proposed algorithm is high. The system developed for hiding and extracting files based on the method has a wide range of adaptivity and good applicability.
Manuscript Id: 21C005
Manuscript Id: 21C026
PIYUSH SHARMA, SUDHANSHU VASHISTHA
Assistant ProfessorDepartment of Computer Science & Engineering
ARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY
Jaipur, Rajasthan, India
SUDHANSHU VASHISTHA
Assistant Professor
Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGY Jaipur, Rajasthan, India
MANISH CHOUBISA
Assistant Professor Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGY Jaipur, Rajasthan, India
ANCHAL JHAMB
Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGY Jaipur, Rajasthan, India
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013
33
SCTP: MULTIHOMING AND MULTISTREAM PROTOCOL
Abstract- SCTP (stream control transmission protocol) is a reliable message oriented transport layer protocol. It is an IETF standard developed by the Transport Area Working Group (TSVWG). SCTP has been standardized by the IETF(Internet Engineering Task Force) in series of RFCs ,as a reliable transport protocol to transport SS7(Signaling System 7) signaling messages for internet applications such as ISDN over IP, telephony signaling , media gateway control, IP telephony[5]. SCTP is similar to TCP in many services. They are both unicast connection-oriented reliable protocols, provide in-sequence packet delivery and congestion control. SCTP preserves message boundaries and at the same time detects lost data, and out of order data. It uses 32 bit checksum as opposed to a 16 bit checksum of TCP. Although TCP has traditionally been used, we argue that SCTP provides better services than TCP in terms of reliability and performance. Due to its attractive features such as multi-streaming and multi-homing. SCTP has received much popularity, in terms of both research and development [6, 7]. SCTP provides multi-homing in that endpoints can use multiple IP addresses for the connection. SCTP may be more resistant to Man in The Middle (MITM) and Denial of Service (DoS). Multi-stream does not refer to multiple streams in the TCP sense but rather each stream represents a sequence of messages within a single association. These may be long or short messages which include flags for control of segmentation and reassembly.
SYED YASMEEN SHAHDAD [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
GULSHAN AMIN [email protected]
Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 34
Manuscript id: - 21E006
AN EXTENSIVE ANALYSIS OF ELECTRO-MAGNETIC RADIATION FROM CELL PHONES AND THEIR BASE STATIONS AND THE ASSOCIATED HEALTH EFFECTS
ABSTRACT:-Cell phones have become our closest friend in the sense that we play with them for hours in a park, footpath and bed or even in our office. But only a few numbers of people know that sleeping with cell phone for more than 18-20 minutes is like sleeping with a snake. It constantly releases poison in the form of radiation. In 2013, it has been estimated that there will be almost as many mobile-cellular subscriptions as people in the world which is around 6.8 billion users (according to ITU), 55.8 cores alone in India (according to IBN Live News, India) and nearly 736K cell phone towers to meet the communication demand (according to Dot, India). The revised radiation norms adopted by DoT for 900Mhz,1800 Mhz and 2100Mhz band are 0.45 W/m2,0.90W/m2 and 1.05W/m2 active from the date 01.09.2012 and SAR limit for handsets is 1.6W/kg. All over the world, people have been debating about associated health risk due to radiation from cell phone and cell tower. Radiation effects are divided into thermal and non-thermal effects. Non-thermal effects are 3 to 4 times more harmful than thermal effects. The paper will present the mathematical analysis of radiation from handsets and cell towers and the health hazards due to it.
Manuscript id: 21E013
EXTENSIVE STUDY OF INFORMATION AND COMMUNICATION TECHNOLOGY IN THE LIFE OF A COMMON MAN IN INDIAN PERSPECTIVE
ABSTRACT:-Present paper reflects the impact of information and communication technology in the life of an ordinary person in Indian perspective. The life as a common man have changed on the scale of employment opportunity, availability of the information, socio-political life and their economic empowerment besides the stake holders and corporate social responsibility for empowering the common man through the Impact of information technology and other various peripheral discussion. The study shows the emergent need of information technology to enrich life of a common man. In buzz words we may say that” for the sake of the nation, let’s hope this happens sooner rather than later”.
Santosh Dahal Department of Electronics & Communication
S(PG)ITM, Rewari
Raghu Yadav, Sharvan Kr. Dept. of ECE
S(PG)ITM, Rewari
Rajiv Das Department of Electronics & Communication
S(PG)ITM, Rewari
Kavita Yadav Dept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 35
Manuscript id: - 21E005 DESIGNING OF ENERGY EFFICIENT, NEED BASED HIGH SPEED WIRELESS
DATA TRANSMISSION AND RECEPTION USING VISIBLE LIGHT SPECTRUM (LI-FI)
ABSTRACT: With the advent of the information technology and its extensive utility in all probable sphere, whole globe have seen the developmental changes and an efficient, transparent, manpower and energy saving system. Information communication technology provides us the convenient transfer of the data and information from one place to another. As a matter of fact today utility of Internet has made the revolution in the world .Whether it is a coffee shop, offices or at home. Speed of the internet is major issue. With the advent of technology,, communication became the backbone of ICT. It had made our globe like a town. Today everyone (Business, institutions, organizations, entrepreneurs and individual) is thrust for getting right information at the right time and right place .Which, requires fast internet connectivity, Technology and large spectrum of channels. Present paper reflects Designing of energy efficient, need based High Speed Wireless Data Transmission and Reception using visible light spectrum (Li-Fi)" which may affect all lives. It is a technology that may be as fast as 500MBPS (30GBPS per minute) an alternative, cost effective and more robust and useful than Wi-Fi. The Visible light communication which may be the future of Internet. A model for the same has been proposed in the present research paper.
Manuscript id: - 21E012
COMPARATIVE STUDY OF GSM & CDMA
Abstract:-GSM stand for global system mobile .In the world 75% GSM used by the users. CDMA stand for code division multiple accesse. 25% CDMA used by the users. Both technologies provide better services like multimedia message, video, high speed internet access digital camera these are some features that we can found on both technologies. GSM technology is older as compare to CDMA but there are some difference features between GSM &CDMA. In GSM different frequency allocated to different user. In CDMA every use same frequency but have different code.
3 Prof.(Dr.) Y.P.Singh,(Director) , S(PG) I.T.M. , Rewari , Haryana
Ekta Yadav Dept. of ECE
S(PG)ITM, Rewari
Shruti Nagar Dept. of ECE
S(PG)ITM, Rewari
1. Er. Abhishek Haridas, Ph.D. Research Scholar,
Sunrise University,
2 Er. Deepak Sharma, Ph.D Scholar (ECE)
Faculty of Engg. & Tech.
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 36
Manuscript id:-21E002 AN EFFECTIVE AND FEASIBLE COMMUNICATION LIGHT FIDELITY: VISIBLE
LIGHT COMMUNICATION (VLC)
ABSTRACT:-Visible light communication is a communication technology which uses light that is visible to humans as a source of data transmission. This system is easy to access as well as harmless as compared to invisible light spectrum communication. In this article we have tried to illuminate about Visible light communication in brief. After a short introduction and historical overview, the technical details are described. Subsequently the most important fields of applications and future scopes of VLC system are presented.
Manuscript id:- 21E007 INTEL HASWELL MICROPROCESSOR
ABSTRACT:- The main purpose of this paper is to let people know about a very new concept of Intel Haswell. Intel has said that Haswell will deliver twice the performance of Ivy Bridge, and in some cases will double the battery life of ultra books, which are a new category of thin and light laptops with battery life of roughly six to eight hours. Intel shed some light on Haswell at its Intel Developer Forum trade show in September, saying its power consumption had been cut to the point where the chips could be used in tablets. Haswell chips will draw a minimum of 10 watts of power, while Ivy Bridge's lowest power draw is 17 watts. Intel has splintered future Haswell chips into two families: 10-watt chips for ultra books that double as tablets, and 15-watt and 17-watt chips designed for other ultra books and laptops.
Amit. Dept. of ECE
S(PG)ITM, Rewari
Harish Dept. of ECE
S(PG)ITM, Rewari
Prof. (Dr.) Y.P. Singh Director
S(PG)ITM, Rewari
Aditi Agrawal, [email protected]
Rohan Sharma, [email protected]
Kalika Kr. kalikamehra28@gmail
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 37
Manuscript id -21E010
IMPACT OF IMAGING TECHNOLOGIES ON HEALTH
ABSTRACT:- Imaging is becoming an increasingly important tool in both research and clinical care. The history dates back to 1895 when X-ray imaging came in the picture for the first time. After that there were significant advancements in imaging technology through the developments like Computed Tomography (CT)-Scan, Ultra sound, nuclear medicine and magnetic resonance imaging (MRI). But the major concern in today’s world is about their health effects through the radiation. The radiation through them is very dangerous as they have ionizing effects on our body. The high-frequency radiation has enough energy to damage the structure of cells in the body (including DNA) and has well-documented effects on human health like risk of cancer. The thyroid gland and bone marrow are particularly sensitive to ionizing radiation, especially in children. The paper will include the discussion on high energy radiation through them and the associated health effects on human body.
Manuscript id -21E015
AN EXTENSIVE STUDY OF ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) – A boon &backbone to WIRELESS COMMUNICATION
SYSTEM
ABSTRACT:-In the recent advancement communication techniques, OFDM have opened the developed area for further research. Many advantages of OFDM over single carrier scheme is, its ability to cope with severe channel conditions such as attenuation of high frequency in a long copper wire. OFDM is a multi-carrier modulation technique with densely spaced sub-carriers that has gained a lot of popularity among the broadband community in the last few years. OFDM has been shown to be an effective technique to combat multi-path fading in wireless communications. It has been successfully used for HF radio applications. OFDM has chosen as the standard for digital audio broadcasting and high-speed wireless local area networks. Present Paper, including introduction to OFDM Modulation its advantages and demerits, and some applications of OFDM, OFDM techniques for peak-to-average power ratio reduction (PAPR), time and frequency synchronization, and channel estimation will be discussed. We conclude with a brief overview of current application areas.
Lalit Kumar Dept. of ECE
S(PG)ITM, Rewari
Vipin Dept. of ECE
S(PG)ITM, Rewari
Manjeet Kumar. Dept. of ECE
S(PG)ITM, Rewari
Prof. (Dr.) Y.P. Singh Director
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 38
Manuscript id -21E014
PERFORMANCE ANALYSIS OF WIRELESS SENSOR NETWORK
ABSTRACT:-Wireless sensor network are networks that consists of sensors which are distributed in ad hoc manner.These sensors work with each other to sense some physical phenomenon and gathered information to get relevant result. Wireless Sensor network uses the protocols which have a unique self-organizing capability. In this paper we analyze the difficulty faced by wireless sensor network and their deficiencies as well their effectiveness.
Manuscript id -21E008
A SURVEY ON WIRELESS SENSOR NETWORK SECURITY
ABSTRACT:-The significant advances of hardware manufacturing technology have boosted the deployment of Wireless Sensor Networks (WSNs).The WSN are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we present a survey of security issues in WSNs.
Avinash Rai Dept. of ECE
S(PG)ITM, Rewari
Narender Singh. Dept. of ECE
S(PG)ITM, Rewari
Charan Singh Dept. of ECE
S(PG)ITM, Rewari
S.Mohan PG Scholar
Nehru Institute of Technology
S.Grace Diana PG Scholar
SNS College of Technology
S.Ramya PG Scholar
Department of CSE-SE
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 39
Manuscript id -21E011
WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES
Rahul yadav
Rahul y ABSTRACT:- Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area net- work coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. The core technology involves a network of wireless routers relaying each others’ packets in a multichip fashion. Many variations on targeted applications and implementation choices offer different opportunities to emerging companies in this emerging area. In this article, we will present an introduction to wireless mesh networks and present both the benefits enabled by this technology and the main hurdles that have to be overcome.
Manuscript id:-21E003
GENERAL STUDY OF EMBEDDED SYSTEM AND ITS CRITICAL ASPECT
ABSTRACT:-An embedded system is generally a system within a large system. Modern car and trucks contains many embedded systems. One embedded system controls ATM, Mobile Phones, Digital Watches, Traffic light Control, Digital Cameras. Even the general purpose personal computer itself is made up of numerous embedded systems. Keyboard, mouse, video card, modem, hard drive, floppy drive and sound cards are each an embedded system. Early embedded system applications include unmanned space probes, computerized traffic lights and aircraft flight control systems. In the 1980s, embedded system brought microprocessors into every part of our personal and professional lives. Presently there are numerous gadgets coming out to make our life easier and comfortable because of advances in embedded system. The paper will include the general overview and principles of embedded system their applications, recent developments, future research and problems in the system.
Sourabh Dept. of ECE
S(PG)ITM, Rewari
Virat Manav Dept. of ECE
S(PG)ITM, Rewari
S.Santosh Dept. of ECE
S(PG)ITM, Rewari
Rahul Yadav Dept. of Computer Engineering
S(PG)ITM,Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 40
Manuscript id:-21E004
E-LEARNING BASED ON CLOUD COMPUTING
ABSTRACT:- Education is an emerging practice and it includes various processes and assimilates government’s responsibilities at different levels and ventures of public and rural sectors. These kinds of facilitation of different rural areas of India are extremely helpful to establish good education in developing countries having inadequate resources with surplus manpower and deficit finance .Wireless cloud computing, a collection of multiple wireless computer interface through a digital network, is an excellent model for convenient which is based on demand network access to share the configurable computing resources. Wireless cloud is used as a resources configuration for rural education in India to be presented in this paper. The interoperability between different components of the wireless cloud computing represents each segment of development of rural education such as e-learning, virtual classroom lectures-study centre through proper balancing of teacher-student relational input of rural communication. Simultaneously e-schooling architecture especially for rural education is also presented through wireless cloud computing taking each block as a distribution of a standard education equally. An interoperability of computing i.e. memory, bandwidth and processing capability essential for the communicative link between the teacher as sender and the student as receptor specially in India. A quaint based parallel computing simulation approach is also estimated to be presented for implementation in the paper.
Manuscript id - 21E016
IMPACT OF DIGITAL MEDIA ON LEARNING
ABSTRACT: - Learning is continuous process which means experience of gaining of know-ledge or skill. It is a basic cognitive processes involved in obtaining and storing knowledge. Learning is acquiring new or existing knowledge and may involve synthesizing different types of information. Learning is not compulsory but it is contextual. Teaching and learning is a bipolar process in which learner is on one pole and teacher is on other. The methodology of digital media can change the level and gravity of learning. Now days we find a wide gap between the ancient and present teaching life process due to the new advance technology and the
S.Santosh B.Tech-7th Sem, ECE S(PG)ITM, Rewari
Vikram Soni Dept. of ECE
S(PG)ITM, Rewari
Anita Sharma Department of CSE S(PG)ITM,Rewari
Bhavya Dept. of ECE
S(PG)ITM, Rewari
Vikash Dept. of ECE
(PG)ITM, Rewari
Vijay Dept. of ECE
S(PG)ITM, Rewari
Ajay Singh Dept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 41
methodology of learning. Present paper exhibits the importance of digital media on learning.
Manuscript id -21E001
INNOVATION IN 4G TECHNOLOGIES
ABSTRACT: 4G is the term used to refer to the next wave of high-speed mobile technologies that will be used to replace current 3G networks. The two top contenders are LTE and WiMAX, both of which are IP based networks that are built from similar, yet incompatible, technologies. Sprint and Clearwire are currently offering 4G WiMAX service in the USA, while Verizon and AT&T have committed to the use of LTE and are trialing their own 4G networks.The purpose of this paper is to : Clarify the contents of 4G from a technology perspective, present business benefits of 4G enabled services and its Future growth
Manuscript id:-21E018
WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES
ABSTRACT: In the modern era mobile phones are basic need of every person as these are the fastest and the easiest medium of communication. The charging of mobile phone batteries has always been a problem. Battery lifetime is dependent of the manufacturer Company and also price of phone. Many people complain that their phone’s battery doesn’t have long life-time and they have to charge it several times in a day. To overcome this problem wireless charging of mobile phones using microwaves is a very important and useful technique. With this technique you can use your mobile phone without thinking about the battery stand by. This technique works on microwaves. Microwave is sent with the message by the transmitter using antenna at the frequency of 2.45GHz. There are some additions in mobile phone to apply this technique as a sensor, a rectenna circuit and a filter. With this technique the need for separate chargers for mobile phones is eliminated and makes charging universal. Thus the more you talk, the more is your mobile phone charged.
Ankur Kaushik [email protected]
Swati Sharma [email protected]
Viney Department Of ECE S(P.G)ITM,Rewari
Sanjeet Kumar Department Of ECE S(P.G)ITM,Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 42
Manuscript id:-21E019
Li- Fi TECHNOLOGY
ABSTRACT: Li-Fi (Light-Fidelity) is communication technologies which use light bulbs or LED to transferring data. It uses light as a carrier instead of traditional radio frequency as in Wi-Fi. Its data transferring speed is 10Gbps. Wireless radio frequencies are growing highly, so that interference in RF is continued to grow. To overcome this problem in future the Li-Fi (Light –Fidelity) technology came into existence since 2011.Li-Fi .This paper will be focus on Li-Fi technology and its future scope
Manuscript id:-21E020
AN APPROACH TO SPEECH RECOGNITION - CHALLENGES & CONCEPT
ABSTRACT Speech is an important, basic, common and efficient form of communication method for interacting each other. Speech technology and systems in human computer interaction have witnessed a stable and remarkable advancement over the last two decades. When we talk about user friendly system, speech recognition system comes in the front position. Today, speech technologies are commercially available for an unlimited but interesting range of tasks. These technologies enable machines to respond correctly and reliably to human voices, and provide useful and valuable services. Recent research concentrates on developing systems that would be much more robust against variability in environment, speaker and language. Error continuous Speech recognition system is still the topic of research and talk of the world, more precisely among research scholars ,hence today’s researches mainly focus on ASR systems with a large vocabulary that support speaker independent operation with continuous speech in different languages. This paper gives an overview of the speech recognition system and its recent progress. The primary objective of this paper is to compare and summarize some of the well known methods used in various stages of speech recognition system.
Monika M. tech, ECE, S (PG)ITM [email protected]
Shilpa M. tech, ECE, S (PG)ITM [email protected]
Prof. (Dr.) Y.P.Singh Director, S(PG)ITM, Rewari Affiliated to MD University
Email:[email protected]
Aswin Tilak Research Scholar
Jodhpur National Universijty Jodhpur
Email:[email protected]
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 43
Manuscript id:-21E025
PATCH AND SLOT FOR ANTENNA DESIGN
ABSTRACT- Patch and slot has become a very important in modern wireless communication antennas. Patch and slots are being used for performance improvement of antenna in wireless communication. Keeping the above fact in mind we had tried to present a complete review on patch and slots antennas .it has been analyzed in detail, In different size and shapes of slots and patch are great interest of obtaining optimum results of antenna design , in order to allow their use in communication application.
Manuscript id:-21E022
AN EXTENSIVE STUDY OF “WIRELESS POWER TRANSMISSION – A NEXT GENERATION POWER TRANSMISSION SYSTEM
ABSTRACT:- Presently, we present the concept of transmitting power without using wires i.e., transmitting power as Beneficial as well need based next generation power transmission system. Wireless power transmission Transfer the power from one place to another is in order to reduce the transmission and distribution losses. We also have discussed the technological developments in Wireless Power Transmission (WPT). The advantages, disadvantages, biological impacts and applications of WPT are also presented. Witricity is nothing but the short name of Wireless Electricity. The basic concept behind this is Magnetic Resonance. Two resonant objects of the same resonant frequency tend to exchange energy efficiently, while dissipating relatively little energy in extraneous off-resonant objects. In systems of coupled resonances, there is often a general “Strongly Coupled” regime of operation. If one can operate in that regime in a given system, the energy transfer is expected to be very efficient. Keeping in view, the need of the hour and nation , let it should happen sooner than later.
Meenakshi Saini, Nitin Kathuria & V.K. Pandey M.Tech. Student, Dept. of Elec. & Comm., NIET, Greater Noida
Assistant Professor, Dept. of Elec. & Comm., AIMT, Greater Noida Professor, Dept of Elec. & Comm., NIET, Greater Noida
Er. Lince Mathew, Ph.D. Scholar
Jodhpur National University Jodhpur, Rajasthan
Prof. Yash Pal Singh Professor & Director S.(P.G.)I.T.M.,Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 44
Manuscript id ‐21E009 AN EXTENSIVE ANALYSIS OF CLOUD COMPUTING AND THE ESTIMATION OF
ENERGY CONSUMPTION IN FUTURE
ABSTRACT:- Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. The total energy consumption of the wireless cloud is estimated to be between 32 Terawatt hours (TWh) (Lo scenario) and 43 TWh (Hi scenario) in 2015.For comparison, also included is an estimation of the 2012 wireless cloud energy consumption (9.2 TWh) based on demand figures for that year. This is an increase of 390% to 460% over 3 years. In this paper, we present a survey of cloud computing, highlighting its key concepts, architectural principles, state‐of‐the‐art implementation as well as challenges and energy demand.
Manuscript id:-21E021
A CPW FED WLAN NOTCHED C-SLOT UWB ANTENNA
ABSTRACT:- A printed, compact, coplanar waveguide fed UWB antenna is presented. The salient feature of the antenna is the inherent property of the design to reject the potential narrowband interferer WLAN system which operates within 5-6 GHz of frequency band. The antenna is 26mm X 26mm in dimension on FR4 substrate. Antenna has a triangular ground with C-shaped slot in the T shaped radiating patch. The C shaped slot is responsible
Karan Saini, Avinash Yadav Department Of ECE S(P.G.)I.T.M., Rewari
Santosh Dahal Department Of ECE S(P.G.)I.T.M., Rewari
1Vartika Tyagi, 2Nitin Kathuria & 3V.K. Pandey 1M.Tech. Student, Dept. of Electronics &
Communication, NIET, Greater Noida 2Assistant Professor, Dept. of Electronics &
Communication, AIMT, Greater Noida 3Professor, Dept of Elec. & Comm., NIET,
G t N id
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 45
for the notch characteristics of antenna. The simulated results are fairly good in the desired band(3.1-10.6 GHz) of operation.
Manuscript id:-21E023 CHALLENGES, PROBLEMS & FUTURE SCOPE OF WIRELESS SENSOR
NETWORK
ABSTRACT:‐ Sensor networks offer a powerful combination of distributed sensing, computing and communication. They provide countless applications and, at the same time, offer numerous challenges due to their peculiarities. The distinguishing traits of sensor net‐ works have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware plat‐ forms have already been designed to test the many ideas spawned by the research com‐ munity and to implement applications to virtually all fields of science and technology. Sensor networks offer a powerful combination of distributed sensing, computing and communication. We will discuss about the challenges, problem & future scope of wireless Sensor network. Manuscript id:‐21E024
COMPARISION BETWEEN ZIGBEE & BLUETOOTH
Abstract—Zigbee is an alternative device to Bluetooth. Zigbee adopted IEEE 802.15.4 as its physical layer & medium access protocol . Zigbee technology is simple and low cost wireless communication & networking solution. It standard is wireless mesh networking. It transmits data over longer distance. It is used in application that requires a low data rate long battery life secure networking.
Nilmani Bharti, Anup Gupta Department Of ECE S(P.G.)I.T.M., Rewari
Akash Chauhan, Shalini Department Of ECE S(P.G.)I.T.M., Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 46
Manuscript id:-21E027 PERFORMANCE OPTIMIZED OF RAYLEIGH WIRELESS CHANNEL WITH
DIFFERENT EQUALIZERS
ABSTRACT:-The paper presents an overview of some important behaviors of equalizer using diverse transmitter and receiver antenna systems under Rayleigh channel environments. All analysis has been performed under ideal identical independent fading conditions with the help of MATLAB. In this paper, implementations of different equalizers are also verified for the improvement of the BER performance. MIMO fading channels are correlated to observe mutual coupling between antenna elements. Receiver diversity is analyzed especially with the Maximal Ratio Combining (MRC) technique and fair comparison is done with Equal Gain Combining (EGC) and Selection- Combing (SC). Further study is done with integration of Maximum Likelihood (ML), Maximum Mean Square Equalization (MMSE) and Zero Forcing (ZF). All the results obtained are simulated by using the MATLAB, under Rayleigh channel conditions.
Manuscript id:-21E028
STEGANOGRAPHY: - A TECHNIQUE TO HIDE DATA
ABSTRACT: - Steganography is a process of hiding a message in such a way that someone can’t know the presence of or content of hidden message.The main purpose of steganography is to maintain secret communication between two parties (Sender to Receiver).This paper will show how steganography is used in (past and present) context understanding of what is steganography and how it can be accomplished with the help of cryptography.
Abhilash Saurabh 1, Tazeem Ahmad Khan2 V.K.Pandey 3
1M.Tech Scholar, Department of ECE, NIET, MTU, U.P 2Dept. of ECE, AFSET, MD University, Rohtak, Haryana
3Department of ECE, NIET, Gr. Noida, MTU, U.P [email protected], [email protected]
Rachana Kumari, Sheetal Lamba, Rahane Pappu Department Of ECE S(PG)ITM,Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 47
Manuscript id:-21E029 THE OSI REFERENCE MODEL
ABSTRACT:-The International Organization for Standardization (ISO) recognized this And researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. The OSI reference model organizes network functions into seven numbered layers.
Manuscript id:-21E030
VISIBLE LIGHT COMMUNICATION
ABSTRACT:-The idea of using light as a communication medium has started with VLC. Here VLC (visible light communication) uses white Light Emitting Diode (LED),which send data using light at a high speed, which human eyes can’t detect, and a high data rate is achieved (at 100 mbps). LED’s have ability to transfer data signal over freq. 400THz – 800THz and wavelength of 400nm to 700 nm range, which is well suitable for communication medium. On the detailed investigation of VLC research, founds that not the no. of research has been done to develop and utilize this technology for communication use. But the research area is new as VLC, the possibilities are widely open.
Sachin Tyagi, Kshitiz Verma Department Of ECE S(PG)ITM,Rewari
Ravindra Kumar, Rahul Gupta Research Scholar
Department Of ECE S(PG)ITM,Rewari
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 48
Manuscript id:-21E026
EFFECT OF MOBILITY ON SERVICE FLOWS IN WIMAX NETWORK
Abstract- IEEE 802.16 standard WiMAX (Worldwide Interoperability for Microwave Access) is an attractive alternative to leasing lines from current ISPs or the deployment of new fiber networks. In this paper a scenario is designed using the QualNet 6.1 simulation package. This paper presents a novel approach for performance evaluation of different quality of services as demanded by evolving applications in the Internet. Important performance metrics considered for the study are total message received, end to end delay, average jitter and average throughput.
Manuscript id:-21C044
ESCALATION OF INTERNET IN INDIA
VinayBansal
[email protected] Department of Computer Science & engineering
Somany (PG) Institute of Technology & Management, Rewari(HR)-India
Abstract: The Internet today connects more than two billion people worldwide. In this paper we representing the
growth of web users. The Internet already has immense impact on the global economy, contributing an
estimated $1.7 trillion, or just fewer than 3 percent, of global GDPin 2010.Yet half the number of Internet
users lives outside the advanced economies, often in countries thatare quickly developing, have
significant economic potential and are socially and culturally diverse. India has about 120 million people
online today and offers a striking example of the Internet’s growth potential. Indiais adopting the Internet
at a much more rapid pace than advanced economies and even many developing economies, yet 90
percent of its population is currently not connected.India’s base of about 120 million Internet users is
currently the third-largest in the world.India is likely to have the second-largest user base in the
world, and the largest in terms of incremental growth, with 330 million to 370 million Internet
users in 2015.
Avni KhatkarUniversity Institute of Engineering and Technology
Maharshi Dayanand University, Rohtak, India Email- [email protected]
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 49
Manuscript id:-21C045
INTERNET AS A COMMUNICATION TOOL
Abstract - When looking at the social phenomenon that is arising from the use of Internet communications tools, one must consider the properties of the tool that influence human-to-human interaction. The availability of communication through the internet has brought phenomenal resources into the lives of anyone connected to it.The exciting result is that collaborating communicating, and learning is accessible (24x7) around the world. Educators and classrooms can reach beyond physical boundaries to communicate and share through the use of a variety of tools. These generally fall into two categories, asynchronous and synchronous. This paper presents a number of such properties and discusses their importance. In addition, existing Internet communications tools are described both in general and with respect to the properties.
SAPNA YADAV
[email protected] Assistant Professor
Somany (P.G) Institute of Technology & Management
PRITI YADAV
[email protected] Assistant Professor
Somany (P.G) Institute of Technology & Management
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 50
HOW DATA MINING AND KNOWLEDGE DISCOVERY ARE COUNTERPARTS OF EACH OTHER
Abstract: Data mining and knowledge discovery in databases have become a hot area of research. The amount of data doubling every three years has lead to the rise of new technologies. The paper provides an overview of this emerging field clarifying how data mining and knowledge discovery in databases are related to each other. The paper contains both research and practice of data mining and knowledge discovery, surveys and tutorials of important areas and techniques, and detailed descriptions of significant applications. The Coverage includes: Theory and Foundational Issues, Data Mining Methods, Knowledge Discovery Process, Application Issues.
TCP CUBIC- CONGESTION CONTROL TRANSPORT PROTOCOL
Abstract- This paper enlightens the network congestion and how TCP CUBIC- A variant of transport control protocol (TCP) increases the performance of congestion control mechanism in a long fat network. The paper also presents the algorithm used in LINUX for changing the congestion window to cubic function. We have also tried to analyze the various advantages of TCP CUBIC as well as some of its limitations.
SHRUTI JAIN
[email protected] Department of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
VERSHA TOMER
[email protected] Department of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Manuscript Id: 21C043
Manuscript Id: 21C006
GULSHAN AMIN GILKAR SYED YASMEEN SAHDAD [email protected] [email protected] Department of CSE Department of CSE SITM. SITM.
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 51
Manuscript id:-21C046
INTERNET PROTOCOL
PARUL
[email protected] Department of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Abstract: In this research, we are summarizes about internet protocol. This functionality deals with abstraction according to the working procedures of the internetworking .In this we simulates , all the layers of internet protocols ,and then specifies how data must be send ,receives from source to destination ,and discuss about connecting various independent networks.
Manuscript id:-21C047 A COMPARISON BETWEEN FOUR MODELS OF SOFTWARE ENGINEERING
RUPALI BHARDWAJ
[email protected] Department of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Abstract-Software Development Process also known as SDLC are imperfect models as they cannot be built with mathematical and physical certainty. This research deals with important issues in computer world. It is concerned with Software management process that examines the area of development models known as SDLC. It represents four of the development models namely, waterfall, Iterative Waterfall, Prototyping and spiral models. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and make a comparison between them to show the features and defects of each model.
National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013
2013
S (PG) ITM Rewari Page 52
Manuscript id:-21C048 SECURITY OF WIRELESS SENSOR NETWORK
NARESH KUMAR
[email protected] Somany Institute of Technology and Management
Rewari(HR.) INDIA
Abstract : Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. However, security is crucial to the success of applying WSN. So, familiarity with the security aspects of WSN is essential before designing WSN system. This paper studies the security problems of WSN based on its resource restricted design and deployment characteristics and the security requirements for designing a secure WSN. Also, this study documents the well known attacks at the different layers of WSN and some counter measures against those attacks. Finally, this paper discusses on some defensive measures of WSN giving focus on the key management, link layer and routing security.
Manuscript id:-21C049 STEGANOGRAPHY- A DATA HIDING TECHNIQUE
ABHAY GAUTAM
[email protected] Somany Institute of Technology and Management
Rewari(HR.) INDIA
Abstract - Steganography is a process of hiding a message in such a way that someone can’t know the Presence of message or content of hidden message.It serves better way of securing message then cryptography which only derive the content of message not the existing of message.The main purpose of steganography is to maintain secret communication between two parties( i.e Sender to receiver).In this paper we have tried to elucidate how digital Images can be used as a carrier to hide message.This paper also analyses the performance of steganography tools.Steganography is useful tools that allows convert transmission of information over the communication channel.This paper also describes the advantage of Steganography over cryptography.