papers by session or author, as well as with fullbvicam.in/indiacom/news/indiacom 2010...

191

Upload: others

Post on 10-Jun-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

8 Study Towards e-Governance Initiatives andThis disc is designed so that you may locate papers by session or author, as well as with full text search. Papers originated as electronic files and were converted to Adobe Acrobat PDF file format for cross-platform access. Even though the viewing quality on your monitor may vary, all papers print clearly. Thank you and enjoy!
Welcome INDIACom-2010
DEVELOPMENT“
Organisers
Sponsors
<For details visit www.ipu.ac.in>
Guru Gobind Singh Indraprastha University established by Government of NCT of Delhi under the provisions of Guru Go bind Singh Indraprastha University Act, 1998 read with its Amendment in 1999.The University is recognized by University Grants Commission (UGC), India under section 12B of UGC Act.
The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three years. It has been accredited "A Grade" by NAAC during Feb - March 2007.
The IETE is the National Apex Professional body of Electronics and Telecommunication, Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognized by Ministry of HRD, GoI.
IETE Delhi is the largest centre of IETE and conducts coaching classes for the AMIETE and DIPIETE at its premises at Janakpuri, New Delhi.
IETE
The Computer Society of India, founded in 1965,is a non-profit, professional body where IT
professionals meet to exchange views and information, to learn and share ideas. CSI has
over 30,000 members to date, consisting of professionals with varied backgrounds. Today it has 62 chapters and 100 plus student branches
spread all over the country. Established in late 60s, Delhi Chapter is one of the largest chapters of CSI, having strength of more than 1000 members. Delhi Chapter has
been awarded the Best Chapter award for 2005- 2006.
Groups • Group I • Group II • Group III
Tracks ( G – I ) • Track #1: Digital World • Track #2: Web Technologies, Computer
Networks & Information Security • Track #3: Software Engineering, Database
And Data Mining • Track #4: High Performance Computing
Tracks ( G – II ) • Track #1: Digital World • Track #2: Web Technologies, Computer
Networks & Information Security • Track #3: Software Engineering, Database
And Data Mining • Track #4: High Performance Computing
Tracks ( G – III ) • Track #1: Digital World • Track #2: Web Technologies, Computer
Networks & Information Security • Track #3: Software Engineering, Database
And Data Mining • Track #4: High Performance Computing
34 Public Entrepreneurship: A Dynamic Strength for Budding Green Technology Puja Gupta and Harsimerjeet Khurana
35 Citizen Centric e-Governance: Problems and Prospects Jyoti Kharade
37 Logic Theory: A Journey from Digital System Design to Knowledge Based System Design Mohd. Sadiq, Sunil and M. Kamil
40 Information and Management Science in Developing Inventory Policies for Service- Sensitive Items Ashok Kumar Sharma
Track 1: Digital World (G - I)
43 Software Design Pattern for e-Governance Solution Framework Ajay D. Parikh
46 Managing Knowledge Workers During Turbulent Times Abid Yunus Salati and K. P. Tripathi
57 Web Supported Expert System for Learning Ashwini Kumar
74 Role of Information Technology in Health Care Sampada S. Gulavani and R. V. Kulkarni
97 Core Banking and Its Implementation V. M. Chavan and Anil T. Gaikwad
Track 1: Digital World (G - I)
139 Role of ICT in Narrowing the Digital Divide in India Preeti Dubey and Devanand
179 A Conceptual Framework of Ethics in Information Technology V. M. Chavan and K. P. Tripathi
188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State” Jewan Singh, V. Mansotra and Vinod Sharma
192 Education Technology Based Models of Teaching and Learning Iqbal Azam, M. Abul Hasan, Tanvir A. Abbasi, Shabbir Ahmed and M. Suhaib Abbasi
Track 1: Digital World (G - I)
205 ICT and Emergency Medical Services K. M. Mital
250 e-Democracy Subhash Chander
263 e-Waste Management M. Abul Hasan, Tanvir A. Abbasi, R. P. Mahapatra, Shabbir Ahmed and M. Suhaib Abbasi
287 Enterprise Collaboration Tool Madhavi pingili and N. Prasanna Balaji
301 Energy Harvesting via Piezoelectricity Tanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and Sumant Katiyal
Track 1: Digital World (G - I)
327 Comparison Factors for the Selection of ERP Implementation Strategy Tamanna Siddiqui, Meraj Ahmed Khan and Asma Shibli
337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning Jyotirmay Patel and A. K. Solannki
343 Semantic Grid E Learning Platform for Educational System S. A. M. Rizvi, S. Z. Hussain and Muqeem Ahmed
359 Study of Internet Usage in Veterinary and Agricultural Sciences Bharat B. Bhagat, Gautam and Vibhakar Mansotra
Track 1: Digital World (G - I)
377 Assessing Adoption of m-CRM in Education Centers Lakshmi Kalyani, Tarun Pandeya and P. N. Pandey
413 Overview of the Grid Technology and e- Governance for e-Health Implementation in Africa Nasreddin B. El Zoghbi, M. V. Lakshmaiah, P. G. V. Suresh Kumar and Nune Sreenivas
415 Technology: Third Medium of Instruction Amrit Kaur
422 Application of Mobile Banking Services in the Bank Area U. S. Pandey and Geetanjali
Track 1: Digital World (G - I)
17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Avanish Kumar, Abhilasha Sharma and Vanita Ben Dhagat
30 Encryption Strength Lies Beyond Key Length: A Suggestive Approach Vinay Kumar
38 A Novel Scheme for Prevention of Forgery and Alteration in Automated Cheque Payment System Vineeta Khemchandani and Runumi Devi
63 VANET: Application of Mobile Communication in Road Traffic Prashant G. Tandale
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
73 Performance Evaluation of Protocols for Secure Routing Over MANET Sunil Taneja, Ashwani Kush and Amandeep Makkar
95 Applying Agile & Web Engineering Technique for Successful Web Management B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin
104 Role of VoIP (Voice over Internet Protocol) in e- Business and e-Commerce Susanta Kumar Nayak
132 Routing in Ad-hoc Networks Ritika Arora Mehra and Nipur
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
167 Analyzing Steganographic Algorithm in Java by Function Point Technique Mohd Abdul Ahad, Esha Saxena and Sunil
172 File Transfer Using Secure Sockets in Linux Environment Abhipal Singh, Gurneet Singh Sethi, Kavleen Kaur Oberoi and Jasleen Kaur
191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter Parag Parandkar, Sumant Katiyal and Vaishali Bhale
224 A MAIL Reader in Telugu K. V. N. Sunitha and N. Kalyani
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
235 On NTRU Cryptosystems and Timing Attacks Santosh Kumar Yadav, Jaspal Singh Bhatia and Neelima Relan
236 On NTRU Implementation: An Algorithmic Approach Santosh Kumar Yadav and Kuldeep Bhardwaj
239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri Nets Kranthi Kumar Amirineni, Suchismita Chinara and Santanu Kumar Rath
247 Context Aware Multicasting Scheme for Delay Tolerant Mobile Networks Divya. T. V. and T. Sivakumar
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
285 Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi Garg, Himanshu Sharma and Sumit Kumar
303 Position Based Multicast Routing Protocol for Ad-hoc Wireless Networks A K Daniel and R Singh
309 Cryptography and Mathematics S. A. M. Rizvi and Neeta Wadhwa
310 A Survey of Gateway Discovery Mechanism in Ad-hoc Networks Saba Naaz and Pravin Chandra
323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR Protocols Vijendra Rai
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
325 Demodulation Scheme for the CDMA System H. Umadevi, Chandrakanth H. Gowda, K. S. Gurumurthy
328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network Anup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and Nupur Prakesh
336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks A. K. Dwivedi, V. K. Patle and O. P. Vyas
354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile Hosts Shubha Jain, Praveen Kumar Tripathi and Rahul Singh
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
363 Role Based and Credentials Based Access Control in Semantic Web Shaily malik
378 Increasing Network Security Using Laws of Networking and Quantum Mechanics Arnab Samanta and Sumit Chauhan
381 Modifications in the Working Model and Handoff Mechanism of MIPv6 B. R. Chandavarkar and G. Ram Mohana Reddy
399 Encryption Through Cascaded Recursive Addition of Blocks and Session Key Rotation P. K. Jha and A. K. Nayak
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet Simulator Mohammad Pasha and Mohd. Umar Farooq
414 Multi-hop Streaming in Wireless Distributed Environment Ravinder Nath Rajotia, Ritika Goyal, Priyanka Tayal, Ruchi Dagar, Ruchika Sharma and Rajat Mehrotra
423 A Load Balancing Algo for Web Applications Sameena Naaz, Mohamed Meftah Alrayes and M. Afshar Alam
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
39 Application of Data Mining Techniques for Diabetic DataSet Runumi Devi and Vineeta Khemchandani
90 Data Mining: An approach to Increase the Success of E-Commerce Sanjay Manhas, Vinod Sharma and Vibhakar Mansotra
147 Open Source Software Quality – An Issue of Concern Anil Kumar, Vibhakar Mansotra and Dalip Bhat
197 Testing Graphical User Interface Using Decision Based Sequence Diagrams Mahamaya Mohanty
Track 3: Software Engineering, Database And Data Mining (G - I)
201 A Novel Software Architecture for Network Security Testing Rajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal, Sidharth Chhabra and Varunn Kaushik
218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries Sunanda Chowdhary, Shilpi Joshi, Tapasya Patki, Vipin Sharma, Anshu Chowdhary, A. B. Patki and Vimal Gaur
223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements Specification Ardhendu Mandal
244 Analysis of Time Complexity in Binary Search Tree Pawan Jindal, Amit Kumar and Shishir Kumar
Track 3: Software Engineering, Database And Data Mining (G - I)
251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black Tree Pawan Jindal, Amit Kumar and Shishir Kumar
262 Analytical Report on Software Refactoring S. A. M. Rizvi and Zeba Khanam
273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure Priyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, Niti Verma, Swati Verma and A. B. Patki
277 A Literature Review of Methods Used in Software Industries for Successful Software Project management Nilesh Mahajan and Bharati Yelikar
283 A Study on Effect of Replication on Databases Suraiya Parveen and Safdar Tanweer
Track 3: Software Engineering, Database And Data Mining (G - I)
332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit P. K. Srimani and Malini M. Patil
333 Identifying Parameters with Data Collection Methods for Software Development in View of Usability Teena Tiwari and Kshama Paithankar
335 A Study of Concurrency and Recovery Techniques in Databases Amit Kour, Vinod Sharma and V. Mansotra
342 Notifying State Change of Model to Multiple Views Using Observer Pattern in Java S. A. M. Rizvi and Syed Imtiyaz Hassan
Track 3: Software Engineering, Database And Data Mining (G - I)
349 Data Mining for Digital Libraries – A New Paradigm Ajendra Isaacs, Rajeev Paulus, Navendu Nitin and Narendra Gupta
351 Secure and User Interactive Information Extraction in Linux Distributions Sunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh Kumar
402 CPN Tools as a Supplement to UML for Validation of Software Requirements Vinai George Biju and Santanu Kumar Rath
419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System Gyanendra Kumar, Gupta Shubha Jain, Vishnu Swaroop and A. K. Sharma
Track 3: Software Engineering, Database And Data Mining (G - I)
449 Optimal Allocation of Testing Effort: A Control Theoretic Approach P. K. Kapur, Udayan Chanda and Vijay Kumar
450 Software Reliability Growth Modeling for Distributed Environment Using Component- Specific Testing-Effort Functions P. K. Kapur, Kalpana Yadav, Avneesh Chauhan and Prashant Johri
453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy P. K. Kapur, R. B. Garg, Anu. G. Aggarwal and Abhishek Tandon
454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- Point V. B. Singh P. K. Kapur and Mashaallah Basirzadeh
Track 3: Software Engineering, Database And Data Mining (G - I)
456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging V. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and Jyotish Kumar
459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software Anu G. Aggarwal, P. K. Kapur, Gurjeet Kaur and Ravi Kumar
461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging P. C. Jha, Ritu Arora and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G - I)
463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme P.C.Jha, Shivani Bali and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G - I)
20 Providing Security of Fingerprint Images Through Digital Watermarking Tapas Bandyopadhyay, B Bandyopadhyay and B N Chatterjii
48 Search Technique Implementation for Symbolic Reasoning Under Uncertainty Vandana Sharma
54 Trust Aware Load Distribution in a Data Grid Environment Shaik Naseera and K. V. Madhu Murthy
67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker Recognition Akash Tayal, Harshita Sharma and Twinkle Bansal
Track 4: High Performance Computing (G - I)
76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family Meenakshi Bhat and S. A. M. Rizvi
195 An Overview of Wavelet-Like Transforms and Image Data Hiding Sushil Kumar and S. K. Muttoo
211 Cost Effective Mass Transit Tracking System Shafi Patel, Sumant Katiyal and Parag Parandkar
216 Role and Scope of Support Vector Machine in Bioinformatics Sunanda Chowdhary, Vipin Sharma, A. B. Patki and Vimal Gaur
217 Fuzzy Logic System for Querying a Database Sunanda Chowdhary, Vipin Sharma, A. B. Patki and Suman Mann
Track 4: High Performance Computing (G - I)
230 Nonlinear Circuit Modelling Using Volterra Series Harneet Kaur, Manika Babbar, Saumya Tyagi and Akash Tayal
266 An Efficient Solution for Evaluation Problem of HMM Madhusudhana Rao D
269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity Computation Asaad A. M. Al-Salih and Syed I. Ahson
270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video Frames Asaad A. M. Al-Salih and Syed I. Ahson
Track 4: High Performance Computing (G - I)
282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology Priyanka Pandit, Parag Parandkar, Abhijeet Gorey and Sumant Katiyal
284 Multi-Module Security: Bio-Secure Steganographic System Om Prakash Verma, Amit Madan and Sumit Madan
311 Comparative Study of Ontology Merging Algorithms Apoorva Shukla and Priyanka Bhutani
315 Current-Mode Oscillator Using Single DVCC Anisur Rehman Nasir and S. Naseem Ahmad
318 Low Power Design Strategies for SoCs Anjali Gupta, Atikant Shrivastava, Parag Parandkar and Sumant Katiyal
Track 4: High Performance Computing (G - I)
329 Tones and Break Indices for Speech Processing - A Review Archana Agarwal and Anurag Jain
334 Intelligent Control for Power System Applications Mohd. Rihan and Muneeza Afaq
339 Virtual Instrumentation for Biomedical Applications Mohd. Rihan and Arti Agarwal
376 Implementation of the K-Means Method for Single and Multidimensions P. K. Srimani and Udaya Rani S
384 Role of Natural Language Processing in Community Structure Detection Vivek Bhola, Mahesh Grover and Madhavi Sinha
Track 4: High Performance Computing (G - I)
406 PRAAT Implementation for Prosody Conversion Maninder Singh Suri, Divya Setia and Anurag Jain
407 Emotion Conversion in Hindi Language Divya Setia, Maninder Singh Suri and Anurag Jain
410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System Nandita Sengupta and Jaya Sil
Track 4: High Performance Computing (G - I)
29 Rural e-Banking: Gaps, Inefficiencies,Emerging Solution Through Mobile Terminals at Customer Door-Step V. B. Aggarwal, Deepti Sharma and Archana B Saxena
85 Information Technology and Knowledge Management: An Explorative Study Surabhi Deshpande and Sudhanshu Deshpande
96 Designing a Web Education Model for Effective Teaching - Learning Process B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin
146 Telemedicine in India - A Model for Jammu & Kashmir State Vibhakar Mansotra, Dalip Kumar Bhat and Anil Ticku
Track 1: Digital World (G - II)
157 E-Commerce : Improving Performance of Customer Knowledge Management Archana Sharma
176 Corporate Strategies Adopted by IT Industry to Beat the Global Crisis Divya Leekha, Himali Natekar and Sayali Shende
411 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University Nand Kumar and Nasreddin B. El Zoghbi
424 Applying Rough-Sets to Assist the Decision Making for ERP Implementation Ajit More and Satyawan Hembade
Track 1: Digital World (G - II)
26 IPv6 Transition - An Engineering Exercise or a Necessity? Savita Shiwani and G. N. Purohit
27 Web Services: Challenges in 21st Century Harsimerjeet Khurana and Puja Gupta
77 Network Monitoring: Topology, Methods and Issues Mamta Sachdeva and Neeraj Gupta
103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise Network Lalit Saraswat and Pankaj Singh Yadav
Track 2: Web Technologies, Computer Networks & Information Security (G - II)
116 Robust Steganography Using Secure Password Protected Scheme Pradeepta Bhattacharya, Dhiraj S. Rajani and Terence Johnson
187 Conserving Energy of WSNs by Using 3Rs Way Raj Kumar and Sharad Goyal
421 Mobility Management Techniques and QoS in Mobile WiMax M. N. Doja and M. Bala Krishna
Track 2: Web Technologies, Computer Networks & Information Security (G - II)
58 Natural Relational Algebra: A New Approach for Query Processing Suhasini. M and H. S. Nagalakshmi
59 The State-of-The-Art Concepts in Software Testing Prashanth G. K.
87 A Review of Software Process Models and Methodologies Anand K Pandey and Rashmi Pandey
94 A Methodology for Successful Project Management in Medium Scale Enterprises B.V.Ramanamurthy, K.Srinivasa Babu and Mohammed Sharfuddin
Track 3: Software Engineering, Database And Data Mining (G - II)
115 Improving the Effectiveness of Inspection Through Verification and Validation Jayanthi R, Amrutha. V and Jagadeesh. G
136 Aspect Oriented Programming Java RMI Server Inderjit Singh Dhanoa and Dalwinder Singh Salaria
169 A Revitalized Dynamic Slicing Method for Program Testing and Debugging Santosh Kumar Pani and Mahamaya Mohanty
253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands D. A. Vidhate, A. K. Patil and D. V. Guleria
280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of College Sachin Bhoite and Suresh Pathare
Track 3: Software Engineering, Database And Data Mining (G - II)
91 Semantic Kernel for Automatic Integration of Semantic Repositories Nadia Imdadi and S. A. M. Rizvi
231 A Novel Edge Detection Technique for Color Images C. Naga Raju, Y. Rajendra kumar, P. Balaram Papana and D. V. M Krishna
234 Need for CCL in Grid Computing Divya Goel and Shivendra Goel
341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech Recognition Safdar Tanweer and Jawed Ahmed
Track 4: High Performance Computing (G - II)
365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms P. K. Srimani and G. Vakula Rani
Track 4: High Performance Computing (G - II)
11 Information Technology Infrastructure Library (ITIL) Tanaji D. Dabade
18 Knowledge Management: Information & Knowledge Sharing Through Intranet Bhavna Bajpai
21 Implementing IT in Disaster Management Sandeep Mathur
50 Towards 21st Century Classrooms: The Quality Requisite! Dheeraj Mehrotra
66 e-Commerce, Taxation in the Age of Birds Without Shadows Rishi Kamal and Gopal Kamal
Track 1: Digital World (G - III)
80 Stock Market Expert Niraj Saxena, Yash Hotchandani, Mayank Kulshrestha and Puneet Arora
84 Improving and Sustaining Coconut Productivity: IT - A Means to Economic Benefit Rakesh Vardhan
92 Tomorrows Technology Today Rishi Kamal
98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture Mudita Shrivastava, Manisha Kumari, Saba Dalvi and Ashwini Kale
Track 1: Digital World (G - III)
100 E - Governance: Whats and Ifs? Sarita Garg
101 Broadband - Wire Line Technology Pallav Parkhe and Ruchi Patle
110 Role of Information Communication Technologies in Education Swati Desai
118 Impact of Speech Applications in HealthCare Organizations Vandana Bhasin
142 Electronic Judicial System Adil Siddiqui, Meenakshi Sharma, Manish and Salil Khare
Track 1: Digital World (G - III)
160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business Sajjad Akhtar and Madaswamy Moni
162 Information and Communication Technology (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview Harish Kumar Taluja and Anuradha Taluja
165 Identity Begets Identity; Real or Reel? Prema P. Nair
186 Online Voting System Prince and Bhupendra Singh
Track 1: Digital World (G - III)
199 Information and Communication Technologies (ICT’s) for Sustainable Development in Agriculture “A Model for J&K State” Jewan Singh and V. Mansotra
248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission Rakesh Vardhan, K. Rajashekhar and Md. Arif
272 Status of Use of IT Tools in SMEs in Jammu and Kashmir Roopali Jamwal and Deepshikha Jamwal
274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced by Senior Citizens While Using Mobile Phones Anand Paropkari
Track 1: Digital World (G - III)
317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G Vinay Kumar Nassa and Mohit Rai
340 Advantages of ERP System in SMEs Rajita Dixit and Deepali Shahane
344 An Efficient Knowledge Base Mutual Linker Framework Syed Mohiuddin, Himayatullah Sharief and T. Eshwar
346 Green Architecture Rajni Gupta and Sanjib K. Sahu
Track 1: Digital World (G - III)
357 Knowledge Management in a Research Organization Manju Shree, Shyamalesh Khan, Nnj Hemrom, Selvi S and A K Paul
361 Implementation of Workflows Intuitive Formal Approach in BPO Multiplexing Mayank Kumar, A. B. Patki, Akshay Anand and V. Kumar
371 Critical Evaluation of Applications of Expert Systems Gurvinder Singh, Shreya Dubey and Sumant Katiya
386 Emerging Trends of IT in Healthcare Sector Chandan Kalra
Track 1: Digital World (G - III)
396 Neuro-informatics in India - Problems and Trends K. R. Radha Krishnan
403 Information Technology for Education, Health and Development Kanchan Lata Bhardwaj and Navneet Sharma
408 Quandary Elucidating Tactics of Water Resource Management by Information Technology Arvind Jaiswal and S. S. Bhalla
409 A New Generation of Electronic Commerce Harmanpreet Kaur
Track 1: Digital World (G - III)
416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey Mary Jacintha M, Khanhaiya Singh and P.N.Pandey
467 Significance of IT-enable BPR in Business Enterprise and in Customer end Parimalendu Bandyopadhyay and Joydeep Chowdhury
469 Current Market Scenarios of High demand BPR implementation through BPM software Parimalendu Bandyopadhyay and Joydeep Chowdhury
470 Significance of IT-Enable Human Resource Management Parimalendu Bandyopadhyay and Joydeep Chowdhury
Track 1: Digital World (G - III)
8 Crawling the Web at Desktop Scales Madhavi Pingili
12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Gupta
24 Personalized Web Search: User Modeling Using Implicit Feedback From Click Through Data Geetanjali Surange
25 Solving Cellular Mobile Network’s Assignment Problem Using Iterative Local Search Algorithm K. Rajalakshmi
33 Consumer Privacy in 2nd Generation e- Commerce Sandeep Kautish
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
36 A Directed Threshold Signature Scheme with Threshold Verification Sunder Lal and Manoj Kumar
44 Advanced Mobility Models for Mobile Ad-hoc Networks Tanweer Alam
47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty Computation Tonu Sojatia and Zulfa Shaikh
49 Threats and Innovations of Information Security in the 21st Century Deepshikha Bhargava
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
52 Strategies for Wavelength Assignment in WDM Optical Networks Arvind Upadhyay and Kavita Thorat
53 Performance of Static Interconnection of Computer Network Through UML Vipin Saxena and Anuradha Sharma
60 Cloud Computing: Its Security & Privacy aspects Deepshikha Jamwal and Kumar Kush
62 Improving QoS in Video Multicasting Deepshikha Jamwal and Kumar Kush
81 Performance Comparison and Improvement of Routing Protocols - DSR Nitin Tyagi
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
83 Quality of Service for Mobile Ad-hoc Networks Shallu, Vandna and Kiran
86 A Simulation Study of Content Delivery Network N. Ramachandran and P. Sivaprakasam
88 Performance Analysis of Multi Media Ad-hoc Networks Kiran, Vandna and Shallu
107 Achieving Vertical Scalability: A Hindrance to Cloud Computing Rahul Sharma and Mohit Mathur
111 Wireless Power Transmission: Requirements & Issues Saurabh Saxena and Sanjib K. Sahu
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
113 Optimizing Semantic Web Search and Ranking Algorithms Vineet Kr. Sarawat and Sanjib K. Sahu
117 Application of Keystroke Dynamics in Mobile Device Users Authentication T. Santhanam and Shanthi Bhatt
120 On Demand Temporary Route Recovery for Frequent Link Failures in Ad-hoc Networks Kokula Krishna Hari. K
121 Implementation of Weighted Rule Mining Algorithm for Wireless Sensor Networks Kokula Krishna Hari. K
124 Global Positioning System Shalini Goel
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
128 Search Engines - "Issues and Improvements" Nitul Kaushik and Archana Saxena
129 e-Mail Services: "Features and Scope" Rahul Gupta and C Komalavalli
130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication System Vikram Bali, Rajkumar Singh Rathore and Amit Sirohi
138 Smart Antenna: “Smartness Going the Way of Technology” Vinay Chopra
158 Dual Firewall Technology for VPN Network Ashish Surywanshi and Akhilesh K Sharma
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting Peeyush Mathur, Bharat Singh, Raj Kumar Sain and Chandra Shekhar
182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETs Mohd. Umar Farooq and Mohammad Pasha
183 Security and Efficiency in Ad-hoc Mobile Network Shabbir Ahmed, Kavita Bhatnagar and Zubair Ahmed Khan
184 Collaborative Knowledge with Cloud Computing Avijit Dutta
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
189 Mobile E-Commerce: Payment System Security Md. Tabrez Nafis
190 Data Security From Malicious Attack: Computer Viruses Narendra Kumar Tyagi and Abhilasha Vyas
193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing Problem Abhishek Khemka and Viranjay M Srivastava
198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous Environment Beneyaz Ara Begum and Animesh Tripathy
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
204 Dark Side of Cyber Crime in India: A Case Study Namita Singh, Deepshikha Jamwal and G. S. Sambyal
209 Semantic Search-The New Paradigm of Information Retrieval on World Wide Web Seema D
210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites) Renavikar Ashwini and Ligade Smita
220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks Mohan H .S. and A. Raji Reddy
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area Architecture Shabbir Ahmad and Zubair Ahmed Khan
222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large Organizations Prashant K. Thete
228 Voice Enabled Mail Reader-VMAIL K. V. N. Sunitha and N. Kalyani
232 Enhanced Security for Audio Signals Using Steganography G. R. Bamnote, S. L. Satarkar, S. S. Agrawal and Sohel Bhura
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
237 The Network Security Assessment Instrument to Reduce Software Security Risk N. Prasanna Balaji, U. Sreenivasulu and G. Pramod
241 Potential Air Traffic Congestion Solution Slot Allocation by Auction Method Madhavi Pingili and N. Prasanna Balaji
255 Recovery of Mobile Internet Transactions D. Rama Rao
257 Potential Air Traffic Congestion Solution: Slot Allocation by Auction Method D. Rama Rao
261 Evaluation of Integration Algorithms for Meta - Search Engine Bhavsingh Maloth
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
275 Automated Remote Data Logger Shruthi. K. R.
278 Secure Routing for Mobile in Ad-hoc Network Rama Rao Tandu and J. Reena Mathigolda
281 Web Science – An Interdisciplinary Approach to Understanding the Web Shikha Nirmal
286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication P. Sowjanya
288 Intrusion Detection Approach to Secure Ad-hoc Networks Tanweer Alam, Parmod Kumar and Sanjeev Tayal
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
308 Security Problem in the Film Industry Production and Distribution Process Rajiv Mahajan, Teenum Gupta and Sandeep Kad
312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks Mohit Agrawal, Lalla Atul Singh Chaurasia, Navneet Tiwari and Jatan Saraf
331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto - System Rajiv Ranjan and K. P. Yadav
345 Competent Ranking Algorithm for Web-Based Search Engines Himayatullah Sharief, Syed Mohiuddin and T. Eshwar
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
347 AOEB: Energy Aware Routing Scheme for Wireless Sensor Networks Sansar Singh Chauhan and Gautam Dhameja
348 Ad-hoc Networking Protocols a Brief Treatise Ajendra Isaacs, Navendu Nitin, Rajeev Paulus and O. P. Chaudhary
353 Evaluating Web Crawler Algorithms Jyotsna Nigam and Pooja Kherwa
355 New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics P. Elayaraja and M. Sivakumar
356 Secured Remote Method Invocation Framework P. Elayaraja and M. Sivakumar
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
368 Laptops Security Application Using RFID Anurag Srivastava and Alok Kumar Dutt
372 An Effective Approach for Disaster Prevention Using GSM Gurvinder Singh, Ravleen Kaur, Katiyal, Anubha Bansal and Pushpendar Singh
374 Evaluation of Network Congestion Controlling Approaches Gurvinder Singh, Sumant Katiyal and ShreyaDubey
375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography Gurvinder Singh, Sudip. K. Dey, Shreya Dubey and Sumant Katiyal
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
380 Network Management and Routing Strategies with Mobile Agent Praveena Chaturvedi and Nipur
383 Network Aware Routing Protocol for MANET Ela Kumar and Ravinder Nath Rajotiya
385 GSM Security and Encryption Atikant Shrivastava, Anjali Gupta and Ashish Valuskar
389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network A. K. Vatsa, Khushbu Garg, Pankaj Chauhan and Rohit Srivastava
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
392 User Interactive Web Content Adaptation for Mobile Devices Prakash K. Mishra, Kapil Baliyan, Deepshikha and S. P. Singh
401 A Practical Approach Towards Development of Applications and Solutions Using Java Agents Nilesh M. Shelke and Rajiv Dharaskar
412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc Networks Sushant Kumar and Bibhudatta Sahoo
452 Comparative Analysis of Structures and Attacks on Various Stream Ciphers Mohammad Ubaidullah Bokhari and Faheem Masoodi
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
51 Recent Development in Databases and Future Directions Pradeep Aswal and Rohit Goyal
56 Prioritization of Test Cases for Regression Testing Kapila Kapoor and Geetika Kapoor
64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach Asha Gowda Karegowda, M. A. Jayaram and A. S. Manjunath
69 Data Mining and Knowledge Discovery Ankita Jhawar, Ayushi Ameriya and Kanupriya Chaturvedi
Track 3: Software Engineering, Database And Data Mining (G - III)
72 Use of Evolutionary Strategies in Software Testing Surjeet Singh and Rakesh Kumar
78 Data Mining with Support Vector Machine Arti Patle and Deepak Singh Chouhan
82 Emerging Techniques for Online Analytical Processing and its Visualization Deepti Nayar and Vijay B. Aggarwal
89 Resource Based Grid Scheduling Algorithm Manjot Bhatia
93 Query Optimization in Homogenous Distributed Database Management System Himanshu Sharma and C. Komalavalli
Track 3: Software Engineering, Database And Data Mining (G - III)
105 Commit Protocols and Their Issues in Distributed Databases Vinay Sharma and Vijay B. Aggarwal
106 Query Optimization in Heterogeneous Distributed Databases Akanksha Gupta and Vijay B. Aggarwal
108 A Solution to Load Balancing Problem in Object Oriented Clusters Sumit Khanna and Deepti Sharma
122 Implementation of Multivariate Clustering Methods for Software Development Seetharam. K and Chandrakanth G Pujari
Track 3: Software Engineering, Database And Data Mining (G - III)
131 Software Testing vs. Code Inspection: What else for Verification & Validation? Latika Kharb and Rajender Singh
133 Reusability in Component Based Development Process Model in Software Development Jyoti Mahajan, Devanand and V. Mansotra
161 Analysis of Software Threats and Software Security Deepshikha Jamwal and Bhawana Sharma
166 Recent Trends in Associative Rule Mining Shalini Vermani and Ritika Wason
180 Model Testing: Is it Only A Special Case of Software Testing Manoj Kumar Pachariya
Track 3: Software Engineering, Database And Data Mining (G - III)
194 Comparison of Different Normal Forms Vinita Rohilla
196 Reliability and N-version Programming in Software Fault Tolerance K. C. Joshi
200 An Analysis of Rural Economic Geography using Spatial Data Mining Techniques V. R. Kanagavalli and K. Raja
203 Software Engineering Challenges: A Case Study P. L. Ramteke and Mohammad Atique
208 Efficient Implementation of the Minimum Spanning Trees Based Clustering Meena. A and Raja. K
Track 3: Software Engineering, Database And Data Mining (G - III)
238 Software Testing Scenario N. Prasanna Balaji, U. Sreenivasulu and G. Pramod
249 Hyperion Essbase Technology K B K S Durga
252 Software Metrics Vis–a-Vis Software Vulnerability Deepshikha Jamwal and Bhawana Sharma
254 Software Reuse: A Systematic Review Deepshikha Jamwal
256 A Unit-Test Framework for Database Applications M Srikanth Yadav
Track 3: Software Engineering, Database And Data Mining (G - III)
260 Maximum Number of Keys in B –Tree of Height K Pawan Jindal, Amit Kumar and Shishir Kumar
268 Distributed Media Player S. A. M. Rizvi, S Zeeshan Hussian and Vineet Sharma
279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association Rules Jasdeep Singh Malik, Prachi Goyal and Akhilesh K Sharma
304 A Software Tool to Access Evolutionary Algorithms for Data Bhavsingh Maloth
Track 3: Software Engineering, Database And Data Mining (G - III)
306 Delete File System Watcher - Storage Optimization Tool Preeti Arora
316 Points-to Analysis of RMI-Based Java Programs Yogesh Pingal, Pallavi Satpule and Sandesh Patil
319 Security Concern Using Aspect Oriented Programming (Aspect C) Kavish Sehgal and Kashyap Rajpal
320 Distributed Query Optimization: Use of Mobile Agents Kodanda Kumar Melpadi
321 An Extended GCLP Algorithm for Hardware Software Partitioning Anurag Srivastava
Track 3: Software Engineering, Database And Data Mining (G - III)
326 Data Mining and Business Intelligence Technologies Manmeet Singh Kapoor
352 Data Mining and Audience Intelligence for Advertising Manika Gupta
364 Evaluation System with Oracle 10g Jaswinder Kaur
373 Real Time Operating Systems (RTOS) Ashima Wadhwa
387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases Bratin Bhattacharya and Deepa Gangwani
Track 3: Software Engineering, Database And Data Mining (G - III)
394 Data Mining in Healthcare Sector K. R. Radha Krishnan
395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models R. C. Tripathi, Manohar Lal, A. K. Malviya and Manish Saraswat
418 An Analysis of Rural Economic Geography Using Spatial Data Mining Techniques V. R. Kanagavalli and K. Raja
Track 3: Software Engineering, Database And Data Mining (G - III)
4 Discrete Sequence Wavelet Transform NUC Algorithm Parul Goyal
22 Distributed-Grid Databases Server Design and Implementation for Bio-Molecular Simulations Santosh Kumar
23 Real Time Monitoring of Patients Using Bio - Signals Through Embedded Computer R. W. Jasutkar and T. M. Pattewar
42 CMOS Implementation of Cell Signaling for Cell Death Shruti Jain and Pradeep K. Naik
Track 4: High Performance Computing (G - III)
55 An Intelligent Blackjack Game Using Reinforcement Learning Algorithms Arvind Singh Chandel and Aruna Tiwari
65 Inorganic Expert: Automation of Inorganic Chemistry Vinay Mathur, Parul Kharub and Yatin Malhotra
68 Managing Information Overload in Distributed Computing Environment Ajay Tiwari and Priyesh Kanungo
75 Lossy Image Compression Using Variable Run Length Encoding Soumya Maitra
Track 4: High Performance Computing (G - III)
99 Bio - Informatics G. Gayatri
102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network Shivendra Goel, J. B. Singh and Ashok Kumar Sinha
135 A New Type of Covering Based Generalized Rough Set Debadutta Mohanty
137 Bioinformatics: "Leading the Way to New Advancements" Vinay Chopra
Track 4: High Performance Computing (G - III)
144 Reduction of Parasitic Capacitance for Transmission with the Help of CPL Harpreet Parashar, Rachit Patel and Viranjay Mohan Srivastava
145 Parasitic Capacitances in Double Gate MOSFET Priyank Kumar and Viranjay M. Srivastava
148 Circuit Design with Independent Double Gate Transistors Nitant and Viranjay M. Srivastava
163 Project Management Efficiency Using Fuzzy Logic Vinay Kumar Nassa
Track 4: High Performance Computing (G - III)
175 Reducing LOC and Cyclomatic Complexity Garima Verma and M. P. Thapaliyal
177 Full Substractor Circuit Design with Independent Double Gate MOSFET Nitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay M. Srivastava
185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Shweta, Akash Tayal and Ankita Lathey
202 Volume Based Medical Image Registration by Maximization of Mutual Information T. Senthil Kumar and R. Suganya
Track 4: High Performance Computing (G - III)
207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print Images Arunkumar. V and Malathy. C
214 3D Atlas of Human Anatomy for Educational Purposes T. Senthil Kumar and Vijay Sabarish Pankajan
215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes Algorithm Rakesh P. B. and T. Senthil Kumar
219 Use of GA in Solution of TTP Sikander and Kuldeep Kumar
Track 4: High Performance Computing (G - III)
226 A New Technique for Detection and Location of Human Faces in Digital Image Satyendra Nath Mandal, Aninda Banerjee, Kumarjit Banerjee and Sourish Banerjee
227 Mr. Tacton (Embedded Red Tacton) Saranya Sivasankaran and Srikkanth Govindaraajan
229 Fuzzy logic - A New Powerful Technology Pooja Gautam
242 Protected Content Based Image Retrieval N. Prasanna Balaji, J. Reena and Korra Bichya
243 Relevance Feedback for Distributed Content - Based Image Retrieval N. Prasanna Balaji and J. Reena and Korra Bichya
Track 4: High Performance Computing (G - III)
265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility P. K. Srimani, Manjula Sanjay and K. Krishna Veni
267 Digital Watermarking: Advanced Technique in Image and Video Technology S. A. M. Rizvi, Vineet Sharma and Anurag Singh Chauhan
271 Bio - Informatics, Bonding Genes With IT Ruchika Gupta
276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data A. K. Patil and A. J. Patil
Track 4: High Performance Computing (G - III)
302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition A. K. Patil and A. J. Patil
305 Primitive Image Transformations Used to Perform a Fast Fourier Transform A. K. Patil and A. J. Patil
313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability Navneet Tiwari, Jatan Saraf and Siddarth Jain
314 Living BEAM Elegant Wizards - The Future of Artificial Intelligence Navneet Tiwari, Sagar Gupta and Puneet Tiwari
Track 4: High Performance Computing (G - III)
324 Texture Based Image Retrieval With an Application to CBIR D. N. Verma and Bharti
330 Computing with DNA Shankar B. Kshetry and J. P. Singh
338 A New Approaches for Fingerprint Recognition Based on Fourier Transformed Selected Image (FTSI) Algorithms Praveen Kumar Singh Rathor, Ravi Kumar Ravi and Pankaj Kumar Sharma
362 Application of Genetic Algorithm in Oil Drilling Problem Tanya Jhamb, Anusha Bhatnagar and Nidhi Kohli
Track 4: High Performance Computing (G - III)
366 A New Approach of Extraction Transformation Loading Using Pipelining Rajender Singh Chhillar and Barjesh Kochar
379 Bengali-English Relevant Cross Lingual Information Access Using Finite Automata Avishek Banerjee and Swapan Bhattacharyya
388 K-Means Clustering Using WEKA Interface Sapna Jain, M. Afshar Aalam and M. N. Doja
391 Role of EEG Lab for Analyzing Electroencephalogram Signal Ashish B. Sasankar N. G. Bawane and S. T. Bodkhe
Track 4: High Performance Computing (G - III)
393 Development of Motherboard Ontology Using Protégé V3.4 Rc2 (Build 529) Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik
397 NAVIGUER R. Bakyalakshmi Nisha and S. Madhumitha
398 Content Based Face Retrieval Zafar G. Sheikh and V. M. Thakare
Track 4: High Performance Computing (G - III)
Authors A. B. Patki 216 Role and Scope of Support Vector Machine in
Bioinformatics A. B. Patki 217 Fuzzy Logic System for Querying a Database A. B. Patki 218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and Insurance Industries
A. B. Patki 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure
A. B. Patki 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
A. J. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data
A.J. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition
A. J. Patil 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform
Authors A. K. Daniel 303 Position Based Multicast Routing Protocol
for Ad-hoc Wireless Networks A. K. Dwivedi 336 Evaluating Impact of Operating System
Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks
A. K. Malviya 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models
A. K. Nayak 399 Encryption Through Cascaded Recursive Addition of Blocks and Key Rotation of a Session Key (CRABKR)
A. K. Patil 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands
A. K. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data
A. K. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition
Authors A. K. Patil 305 Primitive Image Transformations Used to
Perform a Fast Fourier Transform A. K. Paul 357 Knowledge Management in a Research
Organization A. K. Sharma 419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New Perception for Operating System
A. K. Solanki 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e- Learning
A. K. Vatsa 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network
A. Raji Reddy 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks
A. S. Manjunath 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach
Authors Abhijeet Gorey 282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology Abhijeet Gorey 301 Energy Harvesting via Piezoelectricity Abhilasha Sharma 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System Abhilasha Vyas 190 Data Security From Malicious Attack:
Computer Viruses Abhipal Singh 172 File Transfer Using Secure Sockets in Linux
Environment Abhishek Khemka 193 Wireless Automatic Gate Sensing Alarm and
Smoke Alarm Especially for Persons with Hearing Problem
Abhishek Tandon 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Abid Yunus Salati 46 Managing Knowledge Workers During Turbulent Times
Adil Siddiqui 142 Electronic Judicial System
Authors Ajay D. Parikh 43 Software Design Pattern for e-Governance
Solution Framework Ajay Tiwari 68 Managing Information Overload in Distributed
Computing Environment Ajendra Isaacs 348 Ad-hoc Networking Protocols a Brief Treatise Ajendra Isaacs 349 Data Mining for Digital Libraries – A New
Paradigm Ajit More 424 Applying Rough-Sets to Assist the Decision
Making for ERP Implementation Akanksha Gupta 106 Query Optimization in Heterogeneous
Distributed Databases Akash Tayal 67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
Akash Tayal 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique
Authors Akash Tayal 230 Nonlinear Circuit Modelling Using Volterra
Series Akhil Jindal 201 A Novel Software Architecture for Network
Security Testing Akhilesh K Sharma 158 Dual Firewall Technology for VPN Network Akshay Anand 361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
Alok Kumar Dutt 368 Laptops Security Application Using RFID Amandeep Makkar 73 Performance Evaluation of Protocols for
Secure Routing Over MANET Amit Kour 335 A Study of Concurrency and Recovery
Techniques in Databases Amit Kumar 244 Analysis of Time Complexity in Binary Search
Tree Amit Kumar 251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree
Authors Amit Kumar 260 Maximum Number of Keys in B –Tree of
Height K Amit Madan 284 Multi-Module Security: Bio-Secure
Steganographic System Amit Sirohi 130 A New Approach for Mobility Management in
the Wireless Network of a Mobile Communication System
Amrit Kaur 415 Technology: Third Medium of Instruction Amrutha. V 115 Improving the Effectiveness of Inspection
Through Verification and Validation Anand K Pandey 87 A Review of Software Process Models and
Methodologies Anand Paropkari 274 HCI Challenges in Using Mobile Devices: A
Study of Issues Faced by Senior Citizens While Using Mobile Phones
Anil Kumar 147 Open Source Software Quality – An Issue of Concern
Authors Anil T. Gaikwad 97 Core Banking and Its Implementation Anil Ticku 146 Telemedicine in India - A Model for Jammu &
Kashmir State Animesh Tripathy 198 A Novel Approach for Security Policy
Integration and Conflict Reconciliation in a Ubiquitous Environment
Aninda Banerjee 226 A New Technique for Detection and Location of Human Faces in Digital Image
Anisur Rehman 315 Current-Mode Oscillator Using Single DVCC Nasir Anjali Gupta 318 Low Power Design Strategies for SoCs Anjali Gupta 385 GSM Security and Encryption Ankita Jhawar 69 Data Mining and Knowledge Discovery Ankita Lathey 185 Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic Optimization Technique
Authors
Anshu Chowdhary 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries
Anshul Agrawal 351 Secure and User Interactive Information Extraction in Linux Distributions
Anu. G. Aggarwal 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Anubha Bansal 372 An Effective Approach for Disaster Prevention Using GSM
Anup Singh 328 Design & Analysis of PHY Aware MAC for Low Kushwaha Power Low Rate UWB Network Anuradha Sharma 53 Performance of Static Interconnection of
Computer Network Through UML Anuradha Taluja 162 Information and Communication Technology
(ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview
Authors Anurag Jain 329 Tones and Break Indices for Speech
Processing - A Review Anurag Jain 406 PRAAT Implementation for Prosody
Conversion Anurag Jain 407 Emotion Conversion in Hindi Language Anurag Singh 267 Digital Watermarking: Advanced Technique in Chauhan Image and Video Technology Anurag Srivastava 368 Laptops Security Application Using RFID Anurag Srivastava 321 An Extended GCLP Algorithm for Hardware
Software Partitioning Anusha Bhatnagar 362 Application of Genetic Algorithm in Oil
Drilling Problem Apoorva Shukla 311 Comparative Study of Ontology Merging
Algorithms Archana Agarwal 329 Tones and Break Indices for Speech
Processing - A Review
Emerging Solution Through Mobile Terminals at Customer Door-Step
Archana Saxena 128 Search Engines - "Issues and Improvements“ Archana Sharma 157 E-Commerce : Improving Performance of
Customer Knowledge Management Ardhendu Mandal 223 SRS BUILDER 1.0: An Upper Type CASE Tool
for Requirements Specification Arnab Samanta 378 Increasing Network Security Using Laws of
Networking and Quantum Mechanics Arti Agarwal 339 Virtual Instrumentation for Biomedical
Applications Arti Patle 78 Data Mining with Support Vector Machine Aruna Tiwari 55 An Intelligent Blackjack Game Using
Reinforcement Learning Algorithms Arunkumar. V 207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print Images
Authors Arvind Jaiswal 408 Quandary Elucidating Tactics of Water
Resource Management by Information Technology
Arvind Singh 55 An Intelligent Blackjack Game Using Chandel Reinforcement Learning Algorithms Arvind Upadhyay 52 Strategies for Wavelength Assignment in
WDM Optical Networks Asaad A. M. 269 In-door Image Motion Detection with Objects Al-Salih Identification and Position Shift-Velocity
Computation Asaad A. M. 270 A Machine Vision System for Motion Analysis Al-Salih and DFT-Velocity Computation in Out-door
Video Frames Asha Gowda 64 Feature Subset Selection in Medical Data Karegowda Mining Using Cascaded GA & CFS: A Filter
Approach Ashima Wadhwa 373 Real Time Operating Systems (RTOS)
Authors Ashish B. Sasankar 391 Role of EEG Lab for Analyzing
Electroencephalogram Signal Ashish Gupta 301 Energy Harvesting via Piezoelectricity Ashish Surywanshi 158 Dual Firewall Technology for VPN Network Ashish Valuskar 385 GSM Security and Encryption Ashok Kumar 40 Information and Management Science in Sharma Developing Inventory Policies for Service-
Sensitive Items Ashok Kumar 102 Traffic Generation Model for Delhi Urban Area Sinha Using Artificial Neural Network Ashwini Kale 98 Design and Establishment of Information
System in Rural Areas for Sustainable Agriculture
Ashwini Kumar 57 Web Supported Expert System for Learning Asma Shibli 327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP) Implementation Strategy
Authors Atikant Shrivastava 318 Low Power Design Strategies for SoCs Atikant Shrivastava 385 GSM Security and Encryption Avanish Kumar 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System Avijit Dutta 184 Collaborative Knowledge with Cloud
Computing Avishek Banerjee 379 Bengali-English Relevant Cross Lingual
Information Access Using Finite Automata Avneesh Chauhan 450 Software Reliability Growth Modeling for
Distributed Environment Using Component- Specific Testing-Effort Functions
Ayushi Ameriya 69 Data Mining and Knowledge Discovery B Bandyopadhyay 20 Providing Security of Fingerprint Images
Through Digital Watermarking B N Chatterjii 20 Providing Security of Fingerprint Images
Through Digital Watermarking
Authors B. R. Chandavarkar 381 Modifications in the Working Model and
Handoff Mechanism of MIPv6 B. V. Ramana 94 A Methodology for Successful Project Murthy Management in Medium Scale Enterprises B. V. Ramana 95 Applying Agile & Web Engineering Technique Murthy for Successful Web Management B. V. Ramana 96 Designing a Web Education Model for Murthy Effective Teaching - Learning Process Barjesh Kochar 366 A New Approach of Extraction Transformation
Loading Using Pipelining Beneyaz Ara 198 A Novel Approach for Security Policy Begum Integration and Conflict Reconciliation in a
Ubiquitous Environment Bharat B. Bhagat 359 Study of Internet Usage in Veterinary and
Agricultural Sciences
Authors Bharat Singh 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia Broadcasting
Bharati Yelikar 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management
Bharti 324 Texture Based Image Retrieval With an Application to CBIR
Bhavna Bajpai 18 Knowledge Management: Information & Knowledge Sharing Through Intranet
Bhavsingh Maloth 261 Evaluation of Integration Algorithms for Meta - Search Engine
Bhavsingh Maloth 304 A Software Tool to Access Evolutionary Algorithms for Data
Bhawana Sharma 161 Analysis of Software Threats and Software Security
Authors Bhawana Sharma 252 Software Metrics Vis–a-Vis Software
Vulnerability Bhupendra Singh 186 Online Voting System Bibhudatta Sahoo 412 Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc Networks Bratin Bhattacharya 387 A Hybrid Black Box Technique for the
Selection of Optimum Number of Test Cases C. Komalavalli 93 Query Optimization in Homogenous
Distributed Database Management System C. Naga Raju 231 A Novel Edge Detection Technique for Color
Images C. S. Rai 328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network Chandan Kalra 386 Emerging Trends of IT in Healthcare Sector Chandra Shekhar 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia Broadcasting
Authors Chandrakanth 122 Implementation of Multivariate Clustering G Pujari Methods for Software Development
Chandrakanth 325 Advanced Demodulation Scheme for the H. Gowda CDMA System D. A. Vidhate 253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory Demands D. N. Verma 324 Texture Based Image Retrieval With an
Application to CBIR D. Rama Rao 255 Recovery of Mobile Internet Transactions D. Rama Rao 257 Potential Air Traffic Congestion Solution: Slot
Allocation by Auction Method D. V. Guleria 253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory Demands D. V. M. Krishna 231 A Novel Edge Detection Technique for Color
Images Dalip Bhat 147 Open Source Software Quality – An Issue of
Concern Dalwinder Singh 136 Aspect Oriented Programming Java RMI Salaria Server
Authors
Debadutta Mohanty 135 A New Type of Covering Based Generalized Rough Set
Deepa Gangwani 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases
Deepak Singh 78 Data Mining with Support Vector Machine Chouhan Deepali Shahane 340 Advantages of ERP System in SMEs Deepshikha 392 User Interactive Web Content Adaptation for
Mobile Devices Deepshikha 49 Threats and Innovations of Information Bhargava Security in the 21st Century Deepshikha 60 Cloud Computing: Its Security & Privacy Jamwal aspects Deepshikha 62 Improving QoS in Video Multicasting Jamwal Deepshikha 161 Analysis Of Software Threats and Software Jamwal Security
Authors
Deepshikha 62 Dark Side of Cyber Crime in India: A Case Jamwal Study Deepshikha 252 Software Metrics Vis–a-Vis Software Jamwal Vulnerability Deepshikha 254 Software Reuse: A Systematic Review Jamwal Deepshikha 272 Status of Use of IT Tools in SMEs in Jammu Jamwal and Kashmir Deepti Nayar 82 Emerging Techniques for Online Analytical
Processing and its Visualization Deepti Sharma 29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals at Customer Door-Step
Deepti Sharma 108 A Solution to Load Balancing Problem in Object Oriented Clusters
Devanand 133 Reusability in Component Based Development Process Model in Software Development
Authors
Devanand 139 Role of ICT in Narrowing the Digital Divide in India
Dhawal Shrivastava 301 Energy Harvesting via Piezoelectricity Dheeraj Mehrotra 50 Towards 21st Century Classrooms: The
Quality Requisite! Dhiraj S. Rajani 116 Robust Steganography Using Secure
Password Protected Scheme Divya Goel 234 Need for CCL in Grid Computing Divya Leekha 176 Corporate Strategies Adopted by IT Industry
to Beat the Global Crisis Divya Setia 406 PRAAT Implementation for Prosody
Conversion Divya Setia 407 Emotion Conversion in Hindi Language Divya. T. V. 247 Context Aware Multicasting Scheme for Delay
Tolerant Mobile Networks Ela Kumar 383 Network Aware Routing Protocol for MANET
Authors Esha Saxena 167 Analyzing Steganographic Algorithm in Java
by Function Point Technique Faheem Masoodi 452 Comparative Analysis of Structures and
Attacks on Various Stream Ciphers G. Gayatri 99 Bio - Informatics G. N. Purohit 26 IPv6 Transition - An Engineering Exercise or a
Necessity? G. Pramod 237 The Network Security Assessment Instrument
to Reduce Software Security Risk G. Pramod 238 Software Testing Scenario G. R. Bamnote 232 Enhanced Security for Audio Signals Using
Steganography
G. Ram Mohana 381 Modifications in the Working Model and Reddy Handoff Mechanism of MIPv6 G. S. Sambyal 204 Dark Side of Cyber Crime in India: A Case
Study
Authors G. Vakula Rani 365 A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic Algorithms
Garima Verma 175 Reducing LOC and Cyclomatic Complexity Gautam 359 Study of Internet Usage in Veterinary and
Agricultural Sciences Gautam Dhameja 347 AOEB: Energy Aware Routing Scheme for
Wireless Sensor Networks Geetanjali 422 Application of Mobile Banking Services in the
Bank Area Geetanjali Surange 24 Personalized Web Search: User Modeling
Using Implicit Feedback From Click Through Data
Geetika Kapoor 56 Prioritization of Test Cases for Regression Testing
Gopal Kamal 66 e-Commerce, Taxation in the Age of Birds Without Shadows
Authors
Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System
Gurjeet Kaur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software
Gurneet Singh 172 File Transfer Using Secure Sockets in Linux Sethi Environment Gurvinder Singh 371 Critical Evaluation of Applications of Expert
Systems Gurvinder Singh 372 An Effective Approach for Disaster
Prevention Using GSM Gurvinder Singh 374 Evaluation of Network Congestion
Controlling Approaches Gurvinder Singh 375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
Authors
Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System
H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach for Query Processing
H. Umadevi 325 Advanced Demodulation Scheme for the CDMA System
Harish Kumar 162 Information and Communication Technology Taluja (ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An Overview Harmanpreet Kaur 409 A New Generation of Electronic Commerce Harneet Kaur 230 Nonlinear Circuit Modelling Using Volterra
Series Harpreet Parashar 144 Reduction of Parasitic Capacitance for
Transmission with the Help of CPL Harshita Sharma 67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
Authors Harsimerjeet 34 Public Entrepreneurship: A Dynamic Strength Khurana for Budding Green Technology Himali Natekar 176 Corporate Strategies Adopted by IT Industry
to Beat the Global Crisis Himanshu Sharma 93 Query Optimization in Homogenous
Distributed Database Management System Himanshu Sharma 285 Effectiveness of DSDV Protocol Under Hidden
Node Environment Himayatullah 344 An Efficient Knowledge Base Mutual Linker Sharief Framework Himayatullah 345 Competent Ranking Algorithm for Web-Based Sharief Search Engines Inderjit Singh 136 Aspect Oriented Programming Java RMI Dhanoa Server Iqbal Azam 192 Education Technology Based Models of
Teaching and Learning
Authors J. B. Singh 102 Traffic Generation Model for Delhi Urban Area
Using Artificial Neural Network J. P. Singh 330 Computing with DNA J. Reena 242 Protected Content Based Image Retrieval J. Reena 243 Relevance Feedback for Distributed Content -
Based Image Retrieval
J. Reena 278 Secure Routing for Mobile in Ad-hoc Network Mathigolda Jagadeesh. G 115 Improving the Effectiveness of Inspection
Through Verification and Validation Jasdeep Singh 279 A Comprehensive Approach Towards Data Malik Preprocessing Techniques & Association
Rules Jasleen Kaur 172 File Transfer Using Secure Sockets in Linux
Environment Jaspal Singh 235 On NTRU Cryptosystems and Timing Attacks Bhatia
Authors Jaswinder Kaur 364 Evaluation System with Oracle 10g Jatan Saraf 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks Jatan Saraf 313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability Jawed Ahmed 341 The Noise-Robustness of Mel-Frequency
Cepstral Coefficients (MFCC) for Speech Recognition
Jaya Sil 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System
Jayanthi R 115 Improving the Effectiveness of Inspection Through Verification and Validation
Jewan Singh 188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State”
Jewan Singh 199 Information and Communication Technologies (ICT’s) for Sustainable Development in Agriculture “A Model for J&K State”
Authors Joydeep 467 Significance of IT-enable BPR in Business Chowdhury Enterprise and in Customer end Joydeep 469 Current Market Scenarios of High demand Chowdhury BPR implementation through BPM software Jyoti Kharade 35 Citizen Centric e-Governance: Problems and
Prospects Jyoti Mahajan 133 Reusability in Component Based
Development Process Model in Software Development
Jyotirmay Patel 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e- Learning
Jyotish Kumar 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging
Jyotsna Nigam 353 Evaluating Web Crawler Algorithms K B K S Durga 249 Hyperion Essbase Technology
Authors K. C. Joshi 196 Reliability and N-version Programming in
Software Fault Tolerance K. Krishna Veni 265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility K. M. Mital 205 ICT and Emergency Medical Services K. P. Tripathi 46 Managing Knowledge Workers During
Turbulent Times K. P. Tripathi 179 A Conceptual Framework of Ethics in
Information Technology K. P. Yadav 331 Detecting and Preventing IP Spoofed Attack
by RSA Asymmetric Crypto – System K. R. Radha 394 Data Mining in Healthcare Sector Krishnan K. R. Radha 396 Neuro-informatics in India - Problems and Krishnan Trends K. Raja 200 An Analysis of Rural Economic Geography
using Spatial Data Mining Techniques
Authors K. Raja 418 An Analysis of Rural Economic Geography
Using Spatial Data Mining Techniques K. Rajalakshmi 25 Solving Cellular Mobile Network’s Assignment
Problem Using Iterative Local Search Algorithm
K. Rajashekhar 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission
K. S. Gurumurthy 325 Advanced Demodulation Scheme for the CDMA System
K. V. Madhu 54 Trust Aware Load Distribution in a Data Grid Murthy Environment K. V. N. Sunitha 224 A MAIL Reader in Telugu K. V. N. Sunitha 228 Voice Enabled Mail Reader-VMAIL K.Srinivasa Babu 94 A Methodology for Successful Project
Management in Medium Scale Enterprises
Authors Kalpana Yadav 450 Software Reliability Growth Modeling for
Distributed Environment Using Component- Specific Testing-Effort Functions
Kanchan Lata 403 Information Technology for Education, Health Bhardwaj and Development Kanu Priya 273 Introducing Machine Intelligence Quotient as Aggarwal a New COTS Evaluation Measure Kanupriya 69 Data Mining and Knowledge Discovery Chaturvedi Kapil Baliyan 392 User Interactive Web Content Adaptation for
Mobile Devices Kapila Kapoor 56 Prioritization of Test Cases for Regression
Testing Kashyap Rajpal 319 Security Concern Using Aspect Oriented
Programming (Aspect C) Kavish Sehgal 319 Security Concern Using Aspect Oriented
Programming (Aspect C)
Authors Kavita Bhatnagar 183 Security and Efficiency in Ad-hoc Mobile
Network Kavita Thorat 52 Strategies for Wavelength Assignment in
WDM Optical Networks Kavleen Kaur 172 File Transfer Using Secure Sockets in Linux Oberoi Environment Khanhaiya Singh 416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey Khushbu Garg 389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network Kiran 83 Quality of Service for Mobile Ad-hoc Networks Kiran 88 Performance Analysis of Multi Media Ad-hoc
Networks Kodanda Kumar 320 Distributed Query Optimization: Use of Mobile Melpadi Agents Kokula Krishna 120 On Demand Temporary Route Recovery for Hari. K Frequent Link Failures in Ad-hoc Networks
Authors Kokula Krishna 121 Implementation of Weighted Rule Mining Hari. K Algorithm for Wireless Sensor Networks Korra Bichya 242 Protected Content Based Image Retrieval Korra Bichya 243 Relevance Feedback for Distributed Content -
Based Image Retrieval Kranthi Kumar 239 Validation of Clustering Algorithms for Mobile Amirineni Ad-hoc Networks Using Colored Petri Nets Kshama 333 Identifying Parameters with Data Collection Paithankar Methods for Software Development in View of
Usability Kuldeep Bhardwaj 236 On NTRU Implementation: An Algorithmic
Approach Kuldeep Kumar 219 Use of GA in Solution of TTP Kumar Kush 60 Cloud Computing: Its Security & Privacy
aspects Kumar Kush 62 Improving QoS in Video Multicasting
Authors Kumarjit Banerjee 226 A New Technique for Detection and Location
of Human Faces in Digital Image Lakshmi Kalyani 377 Assessing Adoption of m-CRM in Education
Centers Lalit Saraswat 103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an Enterprise Network
Lalla Atul Singh 312 Performance Analysis and QoS Assessment Chaurasia of Queues Over Multi - Hop Networks Latika Kharb 131 Software Testing vs. Code Inspection: What
else for Verification & Validation? Ligade Smita 210 Empirical Study of Factors Affecting Success
of SNS (Social Networking Sites) M Srikanth Yadav 256 A Unit-Test Framework for Database
Applications M. A. Jayaram 64 Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter Approach
Authors M. Abul Hasan 192 Education Technology Based Models of
Teaching and Learning M. Abdul Hasan 263 e-Waste Management and Hazardous Effects
on Environment M. Afshar Alam 388 K-Means Clustering Using WEKA Interface M. Afshar Alam 423 A Dynamic Load Balancing Algorithm for Web
Applications M. Bala Krishna 421 Mobility Management Techniques and QoS in
Mobile WiMax M. Kamil 37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design M. N. Doja 388 K-Means Clustering Using WEKA Interface M. N. Doja 421 Mobility Management Techniques and QoS in
Mobile WiMax M. P. Thapaliyal 175 Reducing LOC and Cyclomatic Complexity M. Sivakumar 355 New Approach and Additional Security to
Existing Cryptography Using Cubical Combinatorics
Authors M. Sivakumar 356 Secured Remote Method Invocation
Framework M. Suhaib Abbasi 192 Education Technology Based Models of
Teaching and Learning M. Suhaib Abbasi 263 e-Waste Management and Hazardous Effects
on Environment M. V. Lakshmaiah 413 Overview of the Grid Technology and e-
Governance for e-Health Implementation in Africa
Madaswamy Moni 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business
Madhavi Pingili 8 Crawling the Web at Desktop Scales Madhavi Pingili 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method Madhavi Pingili 287 Enterprise Collaboration Tool Madhavi Sinha 384 Role of Natural Language Processing in
Community Structure Detection
Authors Madhusudhana 266 An Efficient Solution for Evaluation Problem Rao D of HMM Mahamaya 169 A Revitalized Dynamic Slicing Method for Mohanty Program Testing and Debugging Mahamaya 197 Testing Graphical User Interface Using Mohanty Decision Based Sequence Diagrams Mahesh Grover 384 Role of Natural Language Processing in
Community Structure Detection Malathy. C 207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print Images Malini M. Patil 332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study of Health Care Unit
Mamta Sachdeva 77 Network Monitoring: Topology, Methods and Issues
Manika Babbar 230 Nonlinear Circuit Modelling Using Volterra Series
Authors Manika Gupta 352 Data Mining and Audience Intelligence for
Advertising Maninder Singh 406 PRAAT Implementation for Prosody Suri Conversion Maninder Singh 407 Emotion Conversion in Hindi Language Suri Manish Saraswat 395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN) Models
Manisha Kumari 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture
Manjot Bhatia 89 Resource Based Grid Scheduling Algorithm Manju Shree 357 Knowledge Management in a Research
Organization Manjula Sanjay 265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
Authors Manmeet Singh 326 Data Mining and Business Intelligence Kapoor Technologies
Manohar Lal 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models
Manoj Kumar 36 A Directed Threshold Signature Scheme with Threshold Verification
Manoj Kumar 180 Model Testing: Is it Only A Special Case of Pachariya Software Testing
Mary Jacintha M 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey
Mashaallah 454 Instructions Executed Dependent Software Basirzadeh Reliability Growth Modeling for Open Source
Software by Considering Change- Point
Mayank 80 Stock Market Expert Kulshrestha
Authors Mayank Kumar 361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
Md. Arif 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission
Md. Tabrez Nafis 189 Mobile E-Commerce: Payment System Security
Meena. A 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering
Meenakshi Bhat 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family
Meenakshi Gupta 12 IPv4 vs IPv6 - Next Generation Internet Meenakshi 142 Electronic Judicial System Sharma Meraj Ahmed 327 Comparison Factors for the Selection of Khan Enterprise Resource Planning (ERP)
Implementation Strategy
Authors Mohamed Meftah 423 A Dynamic Load Balancing Algorithm for Web Alrayes Applications Mohammad Atique 203 Software Engineering Challenges: A Case
Study Mohammad Pasha 182 VAMS: An Effective Approach for Vehicle
Assisted Messaging Scheme in VANETs Mohammad Pasha 400 A Study of Wi-Fi Enabled Vehicular Networks
Using QualNet Simulator Mohammad 452 Comparative Analysis of Structures and Ubaidullah Bokhari Attacks on Various Stream Ciphers Mohammed 94 A Methodology for Successful Project Sharfuddin Management in Medium Scale Enterprises Mohammed 95 Applying Agile & Web Engineering Technique Sharfuddin for Successful Web Management Mohammed 96 Designing a Web Education Model for Sharfuddin Effective Teaching - Learning Process
Authors Mohan H .S. 220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks Mohd Abdul Ahad 167 Analyzing Steganographic Algorithm in Java
by Function Point Technique Mohd. Rihan 334 Intelligent Control for Power System
Applications Mohd. Rihan 339 Virtual Instrumentation for Biomedical
Applications Mohd. Sadiq 37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design Mohd. Umar 182 VAMS: An Effective Approach for Vehicle Farooq Assisted Messaging Scheme in VANETs Mohd. Umar 400 A Study of Wi-Fi Enabled Vehicular Networks Farooq Using QualNet Simulator Mohit Agrawal 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks Mohit Mathur 107 Achieving Vertical Scalability: A Hindrance to
Cloud Computing
Authors
Mohit Rai 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G
Mudita Shrivastava 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture
Muneeza Afaq 334 Intelligent Control for Power System Applications
Muqeem Ahmed 343 Semantic Grid E Learning Platform for Educational System
N. Kalyani 224 A MAIL Reader in Telugu N. Kalyani 228 Voice Enabled Mail Reader-VMAIL N. Prasanna Balaji 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method N. Prasanna Balaji 237 The Network Security Assessment
Instrument to Reduce Software Security Risk N. Prasanna Balaji 238 Software Testing Scenario
Authors N. Prasanna Balaji 242 Protected Content Based Image Retrieval N. Prasanna Balaji 243 Relevance Feedback for Distributed Content -
Based Image Retrieval N. Prasanna Balaji 287 Enterprise Collaboration Tool N. Ramachandran 86 A Simulation Study of Content Delivery
Network Nadia Imdadi 91 Semantic Kernel for Automatic Integration of
Semantic Repositories Namita Singh 204 Dark Side of Cyber Crime in India: A Case
Study Nand Kumar 224 Improving Academic Performance of
Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University
Nandita Sengupta 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System
Narendra Gupta 349 Data Mining for Digital Libraries – A New Paradigm
Authors Narendra Kumar 190 Data Security From Malicious Attack: Tyagi Computer Viruses Nasreddin B. El 411 Improving Academic Performance of Zoghbi Students by Using Online Real Time
Attendance Monitoring: A Case Study At Al Fateh University
Nasreddin B. El 413 Overview of the Grid Technology and e- Zoghbi Governance for e-Health Implementation in
Africa Navendu Nitin 348 Ad-hoc Networking Protocols a Brief Treatise Navendu Nitin 349 Data Mining for Digital Libraries – A New
Paradigm Navneet Sharma 403 Information Technology for Education,
Health and Development Navneet Tiwari 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks Navneet Tiwari 313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability
Authors Navneet Tiwari 314 Living BEAM Elegant Wizards - The Future of
Artificial Intelligence Neelima Relan 235 On NTRU Cryptosystems and Timing Attacks Neeraj Gupta 77 Network Monitoring: Topology, Methods and
Issues Neeta Wadhwa 309 Cryptography and Mathematics Nidhi Kohli 362 Application of Genetic Algorithm in Oil
Drilling Problem Nikhil Jindal 201 A Novel Software Architecture for Network
Security Testing Nilesh M. Shelke 401 A Practical Approach Towards Development
of Applications and Solutions Using Java Agents
Nilesh Mahajan 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management
Nipur 132 Routing in Ad-hoc Networks
Authors
Nipur 380 Network Management and Routing Strategies with Mobile Agent
Niraj Saxena 80 Stock Market Expert Nitant 148 Circuit Design with Independent Double Gate
Transistors Nitasha Bisht 177 Full Substractor Circuit Design with
Independent Double Gate MOSFET Nitesh Kumar 393 Development of Motherboard Ontology Using
Protégé V3.4 Rc2 (Build 529) Niti Verma 273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure Nitin Tyagi 81 Performance Comparison and Improvement of
Routing Protocols - DSR Nitul Kaushik 128 Search Engines - "Issues and Improvements" Nnj Hemrom 357 Knowledge Management in a Research
Organization
Authors Nune Sreenivas 413 Overview of the Grid Technology and e-
Governance for e-Health Implementation in Africa
Nupur Prakesh 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network
Nutan Jaiswal 177 Full Substractor Circuit Design with Independent Double Gate MOSFET
O. P. Chaudhary 348 Ad-hoc Networking Protocols a Brief Treatise O. P. Vyas 336 Evaluating Impact of Operating System
Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks
Om Prakash Verma 284 Multi-Module Security: Bio-Secure Steganographic System
P. Balaram Papana 231 A Novel Edge Detection Technique for Color Images
P. C. Jha 461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging
Authors P. Elayaraja 355 New Approach and Additional Security to
Existing Cryptography Using Cubical Combinatorics
P. Elayaraja 356 Secured Remote Method Invocation Framework
P. G. V. Suresh 413 Overview of the Grid Technology and e- Kumar Governance for e-Health Implementation in
Africa P. K. Jha 399 Encryption Through Cascaded Recursive
Addition of Blocks and Key Rotation of a Session Key (CRABKR)
P. K. Kapur 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach
P. K. Kapur 450 Software Reliability Growth Modeling for Distributed Environment Using Component- Specific Testing-Effort Functions
P. K. Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Authors P. K. Kapur 454 Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source Software by Considering Change- Point
P. K. Kapur 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging
P. K. Kapur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software
P. K. Srimani 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility
P. K. Srimani 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms
P. K. Srimani 376 Implementation of the K-Means Method for Single and Multidimensions
Authors P. K. Srimani 332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study of Health Care Unit
P. L. Ramteke 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit
P. N. Pandey 377 Assessing Adoption of m-CRM in Education Centers
P. Sivaprakasam 86 A Simulation Study of Content Delivery Network
P. Sowjanya 286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication
P.C.Jha 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme
P.K.Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Authors P.N.Pandey 416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey
Pallav Parkhe 101 Broadband - Wire Line Technology Pallavi Satpule 316 Points-to Analysis of RMI-Based Java
Programs Pankaj Chauhan 389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network Pankaj Kumar 338 A New Approaches for Fingerprint Sharma Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms Pankaj Singh Yadav103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an Enterprise Network
Parag Parandkar 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter
Parag Parandkar 211 Cost Effective Mass Transit Tracking System
Authors
Parag Parandkar 301 Energy Harvesting via Piezoelectricity Parag Parandkar 282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology Parag Parandkar 318 Low Power Design Strategies for SoCs Parimalendu 467 Significance of IT-enable BPR in Business Bandyopadhya Enterprise and in Customer end Parimalendu 469 Current Market Scenarios of High demand Bandyopadhya BPR implementation through BPM software Parmod Kumar 288 Intrusion Detection Approach to Secure Ad-
hoc Networks Parul Goyal 4 Discrete Sequence Wavelet Transform NUC
Algorithm Parul Kharub 65 Inorganic Expert: Automation of Inorganic
Chemistry Pawan Jindal 244 Analysis of Time Complexity in Binary Search
Tree
Authors Pawan Jindal 251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree Pawan Jindal 260 Maximum Number of Keys in B –Tree of
Height K Peeyush Mathur 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia Broadcasting
Pooja Gautam 229 Fuzzy logic - A New Powerful Technology Pooja Kherwa 353 Evaluating Web Crawler Algorithms Prachi Goyal 279 A Comprehensive Approach Towards Data
Preprocessing Techniques & Association Rules
Pradeep Aswal 51 Recent Development in Databases and Future Directions
Pradeep K. Naik 42 CMOS Implementation of Cell Signaling for Cell Death
Pradeepta 116 Robust Steganography Using Secure Bhattacharya Password Protected Scheme
Authors Prakash K. Mishra 392 User Interactive Web Content Adaptation for
Mobile Devices Prashant Johri 450 Software Reliability Growth Modeling for
Distributed Environment Using Component- Specific Testing-Effort Functions
Prashant K. Thete 222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large Organizations
Prashanth G. K. 59 The State-of-The-Art Concepts in Software Testing
Praveen Kumar 338 A New Approaches for Fingerprint Singh Rathor Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms Praveen Kumar 354 Discussion of Ad-hoc On Demand Tripathi Distance Vector (AODV) Routing Protocol for
Mobile Hosts Praveena 380 Network Management and Routing Strategies Chaturvedi with Mobile Agent
Authors Pravin Chandra 310 A Survey of Gateway Discovery Mechanism
in Ad-hoc Networks Preeti Arora 306 Delete File System Watcher - Storage
Optimization Tool Preeti Dubey 139 Role of ICT in Narrowing the Digital Divide in
India Prema P. Nair 165 Identity Begets Identity; Real or Reel? Prince 186 Online Voting Sys