Transcript of papers by session or author, as well as with fullbvicam.in/INDIACom/news/INDIACom 2010...
8 Study Towards e-Governance Initiatives andThis disc is designed
so that you may locate papers by session or author, as well as with
full text search. Papers originated as electronic files and were
converted to Adobe Acrobat PDF file format for cross-platform
access. Even though the viewing quality on your monitor may vary,
all papers print clearly. Thank you and enjoy!
Welcome INDIACom-2010
DEVELOPMENT“
Organisers
Sponsors
<For details visit www.ipu.ac.in>
Guru Gobind Singh Indraprastha University established by Government
of NCT of Delhi under the provisions of Guru Go bind Singh
Indraprastha University Act, 1998 read with its Amendment in
1999.The University is recognized by University Grants Commission
(UGC), India under section 12B of UGC Act.
The University has been awarded the ISO 9001:2000 Certification by
Standardization, Testing and Quality Certification Directorate,
Department of Information Technology, Ministry of Communication and
Information Technology, Government of India, for a period of three
years. It has been accredited "A Grade" by NAAC during Feb - March
2007.
The IETE is the National Apex Professional body of Electronics and
Telecommunication, Computer and IT Professionals. The IETE focuses
on advancing the Science and Technology of Electronics, Computers,
Telecommunication, Information Technology and related areas. It
promotes and conducts continuing technical education programmes
such as AMIETE and DIPIETE Examinations, recognized by Ministry of
HRD, GoI.
IETE Delhi is the largest centre of IETE and conducts coaching
classes for the AMIETE and DIPIETE at its premises at Janakpuri,
New Delhi.
IETE
The Computer Society of India, founded in 1965,is a non-profit,
professional body where IT
professionals meet to exchange views and information, to learn and
share ideas. CSI has
over 30,000 members to date, consisting of professionals with
varied backgrounds. Today it has 62 chapters and 100 plus student
branches
spread all over the country. Established in late 60s, Delhi Chapter
is one of the largest chapters of CSI, having strength of more than
1000 members. Delhi Chapter has
been awarded the Best Chapter award for 2005- 2006.
Groups • Group I • Group II • Group III
Tracks ( G – I ) • Track #1: Digital World • Track #2: Web
Technologies, Computer
Networks & Information Security • Track #3: Software
Engineering, Database
And Data Mining • Track #4: High Performance Computing
Tracks ( G – II ) • Track #1: Digital World • Track #2: Web
Technologies, Computer
Networks & Information Security • Track #3: Software
Engineering, Database
And Data Mining • Track #4: High Performance Computing
Tracks ( G – III ) • Track #1: Digital World • Track #2: Web
Technologies, Computer
Networks & Information Security • Track #3: Software
Engineering, Database
And Data Mining • Track #4: High Performance Computing
34 Public Entrepreneurship: A Dynamic Strength for Budding Green
Technology Puja Gupta and Harsimerjeet Khurana
35 Citizen Centric e-Governance: Problems and Prospects Jyoti
Kharade
37 Logic Theory: A Journey from Digital System Design to Knowledge
Based System Design Mohd. Sadiq, Sunil and M. Kamil
40 Information and Management Science in Developing Inventory
Policies for Service- Sensitive Items Ashok Kumar Sharma
Track 1: Digital World (G - I)
43 Software Design Pattern for e-Governance Solution Framework Ajay
D. Parikh
46 Managing Knowledge Workers During Turbulent Times Abid Yunus
Salati and K. P. Tripathi
57 Web Supported Expert System for Learning Ashwini Kumar
74 Role of Information Technology in Health Care Sampada S.
Gulavani and R. V. Kulkarni
97 Core Banking and Its Implementation V. M. Chavan and Anil T.
Gaikwad
Track 1: Digital World (G - I)
139 Role of ICT in Narrowing the Digital Divide in India Preeti
Dubey and Devanand
179 A Conceptual Framework of Ethics in Information Technology V.
M. Chavan and K. P. Tripathi
188 Information and Communication Technologies for strengthening
Panchayati Raj in India “A Model for J&K State” Jewan Singh, V.
Mansotra and Vinod Sharma
192 Education Technology Based Models of Teaching and Learning
Iqbal Azam, M. Abul Hasan, Tanvir A. Abbasi, Shabbir Ahmed and M.
Suhaib Abbasi
Track 1: Digital World (G - I)
205 ICT and Emergency Medical Services K. M. Mital
250 e-Democracy Subhash Chander
263 e-Waste Management M. Abul Hasan, Tanvir A. Abbasi, R. P.
Mahapatra, Shabbir Ahmed and M. Suhaib Abbasi
287 Enterprise Collaboration Tool Madhavi pingili and N. Prasanna
Balaji
301 Energy Harvesting via Piezoelectricity Tanvi Dikshit, Dhawal
Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and
Sumant Katiyal
Track 1: Digital World (G - I)
327 Comparison Factors for the Selection of ERP Implementation
Strategy Tamanna Siddiqui, Meraj Ahmed Khan and Asma Shibli
337 Effectiveness of New Technologies for Teaching and Learning:
Web 2.0 and e-Learning Jyotirmay Patel and A. K. Solannki
343 Semantic Grid E Learning Platform for Educational System S. A.
M. Rizvi, S. Z. Hussain and Muqeem Ahmed
359 Study of Internet Usage in Veterinary and Agricultural Sciences
Bharat B. Bhagat, Gautam and Vibhakar Mansotra
Track 1: Digital World (G - I)
377 Assessing Adoption of m-CRM in Education Centers Lakshmi
Kalyani, Tarun Pandeya and P. N. Pandey
413 Overview of the Grid Technology and e- Governance for e-Health
Implementation in Africa Nasreddin B. El Zoghbi, M. V. Lakshmaiah,
P. G. V. Suresh Kumar and Nune Sreenivas
415 Technology: Third Medium of Instruction Amrit Kaur
422 Application of Mobile Banking Services in the Bank Area U. S.
Pandey and Geetanjali
Track 1: Digital World (G - I)
17 Maximal Link Mode Algorithm for Task Allocation in Distributed
Computing System Avanish Kumar, Abhilasha Sharma and Vanita Ben
Dhagat
30 Encryption Strength Lies Beyond Key Length: A Suggestive
Approach Vinay Kumar
38 A Novel Scheme for Prevention of Forgery and Alteration in
Automated Cheque Payment System Vineeta Khemchandani and Runumi
Devi
63 VANET: Application of Mobile Communication in Road Traffic
Prashant G. Tandale
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
73 Performance Evaluation of Protocols for Secure Routing Over
MANET Sunil Taneja, Ashwani Kush and Amandeep Makkar
95 Applying Agile & Web Engineering Technique for Successful
Web Management B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed
Sharfuddin
104 Role of VoIP (Voice over Internet Protocol) in e- Business and
e-Commerce Susanta Kumar Nayak
132 Routing in Ad-hoc Networks Ritika Arora Mehra and Nipur
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
167 Analyzing Steganographic Algorithm in Java by Function Point
Technique Mohd Abdul Ahad, Esha Saxena and Sunil
172 File Transfer Using Secure Sockets in Linux Environment Abhipal
Singh, Gurneet Singh Sethi, Kavleen Kaur Oberoi and Jasleen
Kaur
191 Simulation and Synthesis of SONet Synchronous Transport Signal
STS-12 Transmitter Parag Parandkar, Sumant Katiyal and Vaishali
Bhale
224 A MAIL Reader in Telugu K. V. N. Sunitha and N. Kalyani
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
235 On NTRU Cryptosystems and Timing Attacks Santosh Kumar Yadav,
Jaspal Singh Bhatia and Neelima Relan
236 On NTRU Implementation: An Algorithmic Approach Santosh Kumar
Yadav and Kuldeep Bhardwaj
239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks
Using Colored Petri Nets Kranthi Kumar Amirineni, Suchismita
Chinara and Santanu Kumar Rath
247 Context Aware Multicasting Scheme for Delay Tolerant Mobile
Networks Divya. T. V. and T. Sivakumar
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
285 Effectiveness of DSDV Protocol Under Hidden Node Environment
Ruchi Garg, Himanshu Sharma and Sumit Kumar
303 Position Based Multicast Routing Protocol for Ad-hoc Wireless
Networks A K Daniel and R Singh
309 Cryptography and Mathematics S. A. M. Rizvi and Neeta
Wadhwa
310 A Survey of Gateway Discovery Mechanism in Ad-hoc Networks Saba
Naaz and Pravin Chandra
323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR
Protocols Vijendra Rai
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
325 Demodulation Scheme for the CDMA System H. Umadevi,
Chandrakanth H. Gowda, K. S. Gurumurthy
328 Design & Analysis of PHY Aware MAC for Low Power Low Rate
UWB Network Anup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and Nupur
Prakesh
336 Evaluating Impact of Operating System Architectures on
Simulation Results of Routing Mechanisms for Wireless Sensor
Networks A. K. Dwivedi, V. K. Patle and O. P. Vyas
354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing
Protocol for Mobile Hosts Shubha Jain, Praveen Kumar Tripathi and
Rahul Singh
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
363 Role Based and Credentials Based Access Control in Semantic Web
Shaily malik
378 Increasing Network Security Using Laws of Networking and
Quantum Mechanics Arnab Samanta and Sumit Chauhan
381 Modifications in the Working Model and Handoff Mechanism of
MIPv6 B. R. Chandavarkar and G. Ram Mohana Reddy
399 Encryption Through Cascaded Recursive Addition of Blocks and
Session Key Rotation P. K. Jha and A. K. Nayak
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet
Simulator Mohammad Pasha and Mohd. Umar Farooq
414 Multi-hop Streaming in Wireless Distributed Environment
Ravinder Nath Rajotia, Ritika Goyal, Priyanka Tayal, Ruchi Dagar,
Ruchika Sharma and Rajat Mehrotra
423 A Load Balancing Algo for Web Applications Sameena Naaz,
Mohamed Meftah Alrayes and M. Afshar Alam
Track 2: Web Technologies, Computer Networks & Information
Security (G - I)
39 Application of Data Mining Techniques for Diabetic DataSet
Runumi Devi and Vineeta Khemchandani
90 Data Mining: An approach to Increase the Success of E-Commerce
Sanjay Manhas, Vinod Sharma and Vibhakar Mansotra
147 Open Source Software Quality – An Issue of Concern Anil Kumar,
Vibhakar Mansotra and Dalip Bhat
197 Testing Graphical User Interface Using Decision Based Sequence
Diagrams Mahamaya Mohanty
Track 3: Software Engineering, Database And Data Mining (G -
I)
201 A Novel Software Architecture for Network Security Testing
Rajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal, Sidharth
Chhabra and Varunn Kaushik
218 Cyber Crime Management Using Evidence Based Software
Engineering - Banking and Insurance Industries Sunanda Chowdhary,
Shilpi Joshi, Tapasya Patki, Vipin Sharma, Anshu Chowdhary, A. B.
Patki and Vimal Gaur
223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements
Specification Ardhendu Mandal
244 Analysis of Time Complexity in Binary Search Tree Pawan Jindal,
Amit Kumar and Shishir Kumar
Track 3: Software Engineering, Database And Data Mining (G -
I)
251 Effect of Insertion and Immediately Deletion of Inserted Node
From Red Black Tree Pawan Jindal, Amit Kumar and Shishir
Kumar
262 Analytical Report on Software Refactoring S. A. M. Rizvi and
Zeba Khanam
273 Introducing Machine Intelligence Quotient as a New COTS
Evaluation Measure Priyanka Singh, Vriti Sidana, Kanu Priya
Aggarwal, Niti Verma, Swati Verma and A. B. Patki
277 A Literature Review of Methods Used in Software Industries for
Successful Software Project management Nilesh Mahajan and Bharati
Yelikar
283 A Study on Effect of Replication on Databases Suraiya Parveen
and Safdar Tanweer
Track 3: Software Engineering, Database And Data Mining (G -
I)
332 Data Stream Mining Using Landmark Stream Model for Offline Data
Streams: A Case Study of Health Care Unit P. K. Srimani and Malini
M. Patil
333 Identifying Parameters with Data Collection Methods for
Software Development in View of Usability Teena Tiwari and Kshama
Paithankar
335 A Study of Concurrency and Recovery Techniques in Databases
Amit Kour, Vinod Sharma and V. Mansotra
342 Notifying State Change of Model to Multiple Views Using
Observer Pattern in Java S. A. M. Rizvi and Syed Imtiyaz
Hassan
Track 3: Software Engineering, Database And Data Mining (G -
I)
349 Data Mining for Digital Libraries – A New Paradigm Ajendra
Isaacs, Rajeev Paulus, Navendu Nitin and Narendra Gupta
351 Secure and User Interactive Information Extraction in Linux
Distributions Sunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh
Kumar
402 CPN Tools as a Supplement to UML for Validation of Software
Requirements Vinai George Biju and Santanu Kumar Rath
419 Resource Scheduling in Mobile Distributed Real Time Database
Systems: A New Perception for Operating System Gyanendra Kumar,
Gupta Shubha Jain, Vishnu Swaroop and A. K. Sharma
Track 3: Software Engineering, Database And Data Mining (G -
I)
449 Optimal Allocation of Testing Effort: A Control Theoretic
Approach P. K. Kapur, Udayan Chanda and Vijay Kumar
450 Software Reliability Growth Modeling for Distributed
Environment Using Component- Specific Testing-Effort Functions P.
K. Kapur, Kalpana Yadav, Avneesh Chauhan and Prashant Johri
453 Two Dimensional Flexible Software Reliability Growth Model and
Related Release Policy P. K. Kapur, R. B. Garg, Anu. G. Aggarwal
and Abhishek Tandon
454 Instructions Executed Dependent Software Reliability Growth
Modeling for Open Source Software by Considering Change- Point V.
B. Singh P. K. Kapur and Mashaallah Basirzadeh
Track 3: Software Engineering, Database And Data Mining (G -
I)
456 Unified Framework For Developing Testing Effort Dependent
Software Reliability Growth Models with Change point and Imperfect
Debugging V. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and
Jyotish Kumar
459 Genetic Algorithm Based Optimal Testing Effort Allocation
Problem for Modular Software Anu G. Aggarwal, P. K. Kapur, Gurjeet
Kaur and Ravi Kumar
461 Optimal Testing Time Allocation of Modular Software for
Exponential SRGM Incorporating Imperfect Debugging P. C. Jha, Ritu
Arora and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G -
I)
463 Fuzzy Approach for Selecting Optimal COTS Based Software
Products Under Consensus Recovery Block Scheme P.C.Jha, Shivani
Bali and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G -
I)
20 Providing Security of Fingerprint Images Through Digital
Watermarking Tapas Bandyopadhyay, B Bandyopadhyay and B N
Chatterjii
48 Search Technique Implementation for Symbolic Reasoning Under
Uncertainty Vandana Sharma
54 Trust Aware Load Distribution in a Data Grid Environment Shaik
Naseera and K. V. Madhu Murthy
67 A Novel Technique Combining Euclidian Distance Measure and DHMM
for Automatic Speaker Recognition Akash Tayal, Harshita Sharma and
Twinkle Bansal
Track 4: High Performance Computing (G - I)
76 In-silico Comprehensive Sequence and Structure Analysis of
Proteases Family Meenakshi Bhat and S. A. M. Rizvi
195 An Overview of Wavelet-Like Transforms and Image Data Hiding
Sushil Kumar and S. K. Muttoo
211 Cost Effective Mass Transit Tracking System Shafi Patel, Sumant
Katiyal and Parag Parandkar
216 Role and Scope of Support Vector Machine in Bioinformatics
Sunanda Chowdhary, Vipin Sharma, A. B. Patki and Vimal Gaur
217 Fuzzy Logic System for Querying a Database Sunanda Chowdhary,
Vipin Sharma, A. B. Patki and Suman Mann
Track 4: High Performance Computing (G - I)
230 Nonlinear Circuit Modelling Using Volterra Series Harneet Kaur,
Manika Babbar, Saumya Tyagi and Akash Tayal
266 An Efficient Solution for Evaluation Problem of HMM
Madhusudhana Rao D
269 In-door Image Motion Detection with Objects Identification and
Position Shift-Velocity Computation Asaad A. M. Al-Salih and Syed
I. Ahson
270 A Machine Vision System for Motion Analysis and DFT-Velocity
Computation in Out-door Video Frames Asaad A. M. Al-Salih and Syed
I. Ahson
Track 4: High Performance Computing (G - I)
282 Performance Enhancement in Satellite Using UltraCMOS and
Silicon Heat Pipe Technology Priyanka Pandit, Parag Parandkar,
Abhijeet Gorey and Sumant Katiyal
284 Multi-Module Security: Bio-Secure Steganographic System Om
Prakash Verma, Amit Madan and Sumit Madan
311 Comparative Study of Ontology Merging Algorithms Apoorva Shukla
and Priyanka Bhutani
315 Current-Mode Oscillator Using Single DVCC Anisur Rehman Nasir
and S. Naseem Ahmad
318 Low Power Design Strategies for SoCs Anjali Gupta, Atikant
Shrivastava, Parag Parandkar and Sumant Katiyal
Track 4: High Performance Computing (G - I)
329 Tones and Break Indices for Speech Processing - A Review
Archana Agarwal and Anurag Jain
334 Intelligent Control for Power System Applications Mohd. Rihan
and Muneeza Afaq
339 Virtual Instrumentation for Biomedical Applications Mohd. Rihan
and Arti Agarwal
376 Implementation of the K-Means Method for Single and
Multidimensions P. K. Srimani and Udaya Rani S
384 Role of Natural Language Processing in Community Structure
Detection Vivek Bhola, Mahesh Grover and Madhavi Sinha
Track 4: High Performance Computing (G - I)
406 PRAAT Implementation for Prosody Conversion Maninder Singh
Suri, Divya Setia and Anurag Jain
407 Emotion Conversion in Hindi Language Divya Setia, Maninder
Singh Suri and Anurag Jain
410 Dimension Reduction Using Rough Set Theory for Intrusion
Detection System Nandita Sengupta and Jaya Sil
Track 4: High Performance Computing (G - I)
29 Rural e-Banking: Gaps, Inefficiencies,Emerging Solution Through
Mobile Terminals at Customer Door-Step V. B. Aggarwal, Deepti
Sharma and Archana B Saxena
85 Information Technology and Knowledge Management: An Explorative
Study Surabhi Deshpande and Sudhanshu Deshpande
96 Designing a Web Education Model for Effective Teaching -
Learning Process B. V. Ramana Murthy, Salman Abdul Moiz and
Mohammed Sharfuddin
146 Telemedicine in India - A Model for Jammu & Kashmir State
Vibhakar Mansotra, Dalip Kumar Bhat and Anil Ticku
Track 1: Digital World (G - II)
157 E-Commerce : Improving Performance of Customer Knowledge
Management Archana Sharma
176 Corporate Strategies Adopted by IT Industry to Beat the Global
Crisis Divya Leekha, Himali Natekar and Sayali Shende
411 Improving Academic Performance of Students by Using Online Real
Time Attendance Monitoring: A Case Study At Al Fateh University
Nand Kumar and Nasreddin B. El Zoghbi
424 Applying Rough-Sets to Assist the Decision Making for ERP
Implementation Ajit More and Satyawan Hembade
Track 1: Digital World (G - II)
26 IPv6 Transition - An Engineering Exercise or a Necessity? Savita
Shiwani and G. N. Purohit
27 Web Services: Challenges in 21st Century Harsimerjeet Khurana
and Puja Gupta
77 Network Monitoring: Topology, Methods and Issues Mamta Sachdeva
and Neeraj Gupta
103 Comparative Analysis of Various Security Techniques to Protect
VoIP System in an Enterprise Network Lalit Saraswat and Pankaj
Singh Yadav
Track 2: Web Technologies, Computer Networks & Information
Security (G - II)
116 Robust Steganography Using Secure Password Protected Scheme
Pradeepta Bhattacharya, Dhiraj S. Rajani and Terence Johnson
187 Conserving Energy of WSNs by Using 3Rs Way Raj Kumar and Sharad
Goyal
421 Mobility Management Techniques and QoS in Mobile WiMax M. N.
Doja and M. Bala Krishna
Track 2: Web Technologies, Computer Networks & Information
Security (G - II)
58 Natural Relational Algebra: A New Approach for Query Processing
Suhasini. M and H. S. Nagalakshmi
59 The State-of-The-Art Concepts in Software Testing Prashanth G.
K.
87 A Review of Software Process Models and Methodologies Anand K
Pandey and Rashmi Pandey
94 A Methodology for Successful Project Management in Medium Scale
Enterprises B.V.Ramanamurthy, K.Srinivasa Babu and Mohammed
Sharfuddin
Track 3: Software Engineering, Database And Data Mining (G -
II)
115 Improving the Effectiveness of Inspection Through Verification
and Validation Jayanthi R, Amrutha. V and Jagadeesh. G
136 Aspect Oriented Programming Java RMI Server Inderjit Singh
Dhanoa and Dalwinder Singh Salaria
169 A Revitalized Dynamic Slicing Method for Program Testing and
Debugging Santosh Kumar Pani and Mahamaya Mohanty
253 Dynamic Cluster Resource Allocations for Jobs with Known Memory
Demands D. A. Vidhate, A. K. Patil and D. V. Guleria
280 Students Academic Performance Analysis Using Data Mining
Techniques in Higher Education: A Case Study of College Sachin
Bhoite and Suresh Pathare
Track 3: Software Engineering, Database And Data Mining (G -
II)
91 Semantic Kernel for Automatic Integration of Semantic
Repositories Nadia Imdadi and S. A. M. Rizvi
231 A Novel Edge Detection Technique for Color Images C. Naga Raju,
Y. Rajendra kumar, P. Balaram Papana and D. V. M Krishna
234 Need for CCL in Grid Computing Divya Goel and Shivendra
Goel
341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients
(MFCC) for Speech Recognition Safdar Tanweer and Jawed Ahmed
Track 4: High Performance Computing (G - II)
365 A Comparative Study of Fast Matrix Multiplication Methods by
Using Vedic Algorithms P. K. Srimani and G. Vakula Rani
Track 4: High Performance Computing (G - II)
11 Information Technology Infrastructure Library (ITIL) Tanaji D.
Dabade
18 Knowledge Management: Information & Knowledge Sharing
Through Intranet Bhavna Bajpai
21 Implementing IT in Disaster Management Sandeep Mathur
50 Towards 21st Century Classrooms: The Quality Requisite! Dheeraj
Mehrotra
66 e-Commerce, Taxation in the Age of Birds Without Shadows Rishi
Kamal and Gopal Kamal
Track 1: Digital World (G - III)
80 Stock Market Expert Niraj Saxena, Yash Hotchandani, Mayank
Kulshrestha and Puneet Arora
84 Improving and Sustaining Coconut Productivity: IT - A Means to
Economic Benefit Rakesh Vardhan
92 Tomorrows Technology Today Rishi Kamal
98 Design and Establishment of Information System in Rural Areas
for Sustainable Agriculture Mudita Shrivastava, Manisha Kumari,
Saba Dalvi and Ashwini Kale
Track 1: Digital World (G - III)
100 E - Governance: Whats and Ifs? Sarita Garg
101 Broadband - Wire Line Technology Pallav Parkhe and Ruchi
Patle
110 Role of Information Communication Technologies in Education
Swati Desai
118 Impact of Speech Applications in HealthCare Organizations
Vandana Bhasin
142 Electronic Judicial System Adil Siddiqui, Meenakshi Sharma,
Manish and Salil Khare
Track 1: Digital World (G - III)
160 FISHNET: An Emerging e-Governance Programme to empower Fishing
Communities and Facilitate Fisheries Business Sajjad Akhtar and
Madaswamy Moni
162 Information and Communication Technology (ICT) - A Ram-Ban for
Rural Development in Uttar Pradesh : An Overview Harish Kumar
Taluja and Anuradha Taluja
165 Identity Begets Identity; Real or Reel? Prema P. Nair
186 Online Voting System Prince and Bhupendra Singh
Track 1: Digital World (G - III)
199 Information and Communication Technologies (ICT’s) for
Sustainable Development in Agriculture “A Model for J&K State”
Jewan Singh and V. Mansotra
248 ICT Enabled Workflow and Progress Monitoring System for
National Horticulture Mission Rakesh Vardhan, K. Rajashekhar and
Md. Arif
272 Status of Use of IT Tools in SMEs in Jammu and Kashmir Roopali
Jamwal and Deepshikha Jamwal
274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced
by Senior Citizens While Using Mobile Phones Anand Paropkari
Track 1: Digital World (G - III)
317 Bringing Wireless Access to the Education: A Comparison of
Wi-Fi, WiMAX, MBWA and 3G Vinay Kumar Nassa and Mohit Rai
340 Advantages of ERP System in SMEs Rajita Dixit and Deepali
Shahane
344 An Efficient Knowledge Base Mutual Linker Framework Syed
Mohiuddin, Himayatullah Sharief and T. Eshwar
346 Green Architecture Rajni Gupta and Sanjib K. Sahu
Track 1: Digital World (G - III)
357 Knowledge Management in a Research Organization Manju Shree,
Shyamalesh Khan, Nnj Hemrom, Selvi S and A K Paul
361 Implementation of Workflows Intuitive Formal Approach in BPO
Multiplexing Mayank Kumar, A. B. Patki, Akshay Anand and V.
Kumar
371 Critical Evaluation of Applications of Expert Systems Gurvinder
Singh, Shreya Dubey and Sumant Katiya
386 Emerging Trends of IT in Healthcare Sector Chandan Kalra
Track 1: Digital World (G - III)
396 Neuro-informatics in India - Problems and Trends K. R. Radha
Krishnan
403 Information Technology for Education, Health and Development
Kanchan Lata Bhardwaj and Navneet Sharma
408 Quandary Elucidating Tactics of Water Resource Management by
Information Technology Arvind Jaiswal and S. S. Bhalla
409 A New Generation of Electronic Commerce Harmanpreet Kaur
Track 1: Digital World (G - III)
416 Improving the Quality of Organization Through ERP Systems:
Indian Industry Survey Mary Jacintha M, Khanhaiya Singh and
P.N.Pandey
467 Significance of IT-enable BPR in Business Enterprise and in
Customer end Parimalendu Bandyopadhyay and Joydeep Chowdhury
469 Current Market Scenarios of High demand BPR implementation
through BPM software Parimalendu Bandyopadhyay and Joydeep
Chowdhury
470 Significance of IT-Enable Human Resource Management Parimalendu
Bandyopadhyay and Joydeep Chowdhury
Track 1: Digital World (G - III)
8 Crawling the Web at Desktop Scales Madhavi Pingili
12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Gupta
24 Personalized Web Search: User Modeling Using Implicit Feedback
From Click Through Data Geetanjali Surange
25 Solving Cellular Mobile Network’s Assignment Problem Using
Iterative Local Search Algorithm K. Rajalakshmi
33 Consumer Privacy in 2nd Generation e- Commerce Sandeep
Kautish
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
36 A Directed Threshold Signature Scheme with Threshold
Verification Sunder Lal and Manoj Kumar
44 Advanced Mobility Models for Mobile Ad-hoc Networks Tanweer
Alam
47 Shaping the Traffic to Improve QoS Parameter During Data Privacy
in Secure Multiparty Computation Tonu Sojatia and Zulfa
Shaikh
49 Threats and Innovations of Information Security in the 21st
Century Deepshikha Bhargava
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
52 Strategies for Wavelength Assignment in WDM Optical Networks
Arvind Upadhyay and Kavita Thorat
53 Performance of Static Interconnection of Computer Network
Through UML Vipin Saxena and Anuradha Sharma
60 Cloud Computing: Its Security & Privacy aspects Deepshikha
Jamwal and Kumar Kush
62 Improving QoS in Video Multicasting Deepshikha Jamwal and Kumar
Kush
81 Performance Comparison and Improvement of Routing Protocols -
DSR Nitin Tyagi
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
83 Quality of Service for Mobile Ad-hoc Networks Shallu, Vandna and
Kiran
86 A Simulation Study of Content Delivery Network N. Ramachandran
and P. Sivaprakasam
88 Performance Analysis of Multi Media Ad-hoc Networks Kiran,
Vandna and Shallu
107 Achieving Vertical Scalability: A Hindrance to Cloud Computing
Rahul Sharma and Mohit Mathur
111 Wireless Power Transmission: Requirements & Issues Saurabh
Saxena and Sanjib K. Sahu
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
113 Optimizing Semantic Web Search and Ranking Algorithms Vineet
Kr. Sarawat and Sanjib K. Sahu
117 Application of Keystroke Dynamics in Mobile Device Users
Authentication T. Santhanam and Shanthi Bhatt
120 On Demand Temporary Route Recovery for Frequent Link Failures
in Ad-hoc Networks Kokula Krishna Hari. K
121 Implementation of Weighted Rule Mining Algorithm for Wireless
Sensor Networks Kokula Krishna Hari. K
124 Global Positioning System Shalini Goel
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
128 Search Engines - "Issues and Improvements" Nitul Kaushik and
Archana Saxena
129 e-Mail Services: "Features and Scope" Rahul Gupta and C
Komalavalli
130 A New Approach for Mobility Management in the Wireless Network
of a Mobile Communication System Vikram Bali, Rajkumar Singh
Rathore and Amit Sirohi
138 Smart Antenna: “Smartness Going the Way of Technology” Vinay
Chopra
158 Dual Firewall Technology for VPN Network Ashish Surywanshi and
Akhilesh K Sharma
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
178 Next Generation Networks: Enhancing Performance and Security
for Providing Mobile Multimedia Broadcasting Peeyush Mathur, Bharat
Singh, Raj Kumar Sain and Chandra Shekhar
182 VAMS: An Effective Approach for Vehicle Assisted Messaging
Scheme in VANETs Mohd. Umar Farooq and Mohammad Pasha
183 Security and Efficiency in Ad-hoc Mobile Network Shabbir Ahmed,
Kavita Bhatnagar and Zubair Ahmed Khan
184 Collaborative Knowledge with Cloud Computing Avijit Dutta
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
189 Mobile E-Commerce: Payment System Security Md. Tabrez
Nafis
190 Data Security From Malicious Attack: Computer Viruses Narendra
Kumar Tyagi and Abhilasha Vyas
193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm
Especially for Persons with Hearing Problem Abhishek Khemka and
Viranjay M Srivastava
198 A Novel Approach for Security Policy Integration and Conflict
Reconciliation in a Ubiquitous Environment Beneyaz Ara Begum and
Animesh Tripathy
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
204 Dark Side of Cyber Crime in India: A Case Study Namita Singh,
Deepshikha Jamwal and G. S. Sambyal
209 Semantic Search-The New Paradigm of Information Retrieval on
World Wide Web Seema D
210 Empirical Study of Factors Affecting Success of SNS (Social
Networking Sites) Renavikar Ashwini and Ligade Smita
220 Evaluating the Performance of Various Architectures for
Wireless Ad-hoc Networks Mohan H .S. and A. Raji Reddy
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
221 An Architecture Model of Mobile Ad-hoc Network and its
Performance in Disaster Area Architecture Shabbir Ahmad and Zubair
Ahmed Khan
222 Effective Use of EDI and XML Message Exchange for Small/Mid and
Large Organizations Prashant K. Thete
228 Voice Enabled Mail Reader-VMAIL K. V. N. Sunitha and N.
Kalyani
232 Enhanced Security for Audio Signals Using Steganography G. R.
Bamnote, S. L. Satarkar, S. S. Agrawal and Sohel Bhura
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
237 The Network Security Assessment Instrument to Reduce Software
Security Risk N. Prasanna Balaji, U. Sreenivasulu and G.
Pramod
241 Potential Air Traffic Congestion Solution Slot Allocation by
Auction Method Madhavi Pingili and N. Prasanna Balaji
255 Recovery of Mobile Internet Transactions D. Rama Rao
257 Potential Air Traffic Congestion Solution: Slot Allocation by
Auction Method D. Rama Rao
261 Evaluation of Integration Algorithms for Meta - Search Engine
Bhavsingh Maloth
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
275 Automated Remote Data Logger Shruthi. K. R.
278 Secure Routing for Mobile in Ad-hoc Network Rama Rao Tandu and
J. Reena Mathigolda
281 Web Science – An Interdisciplinary Approach to Understanding
the Web Shikha Nirmal
286 Adaptive QoS for Mobile Web Services Through Cross-Layer
Communication P. Sowjanya
288 Intrusion Detection Approach to Secure Ad-hoc Networks Tanweer
Alam, Parmod Kumar and Sanjeev Tayal
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
308 Security Problem in the Film Industry Production and
Distribution Process Rajiv Mahajan, Teenum Gupta and Sandeep
Kad
312 Performance Analysis and QoS Assessment of Queues Over Multi -
Hop Networks Mohit Agrawal, Lalla Atul Singh Chaurasia, Navneet
Tiwari and Jatan Saraf
331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric
Crypto - System Rajiv Ranjan and K. P. Yadav
345 Competent Ranking Algorithm for Web-Based Search Engines
Himayatullah Sharief, Syed Mohiuddin and T. Eshwar
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
347 AOEB: Energy Aware Routing Scheme for Wireless Sensor Networks
Sansar Singh Chauhan and Gautam Dhameja
348 Ad-hoc Networking Protocols a Brief Treatise Ajendra Isaacs,
Navendu Nitin, Rajeev Paulus and O. P. Chaudhary
353 Evaluating Web Crawler Algorithms Jyotsna Nigam and Pooja
Kherwa
355 New Approach and Additional Security to Existing Cryptography
Using Cubical Combinatorics P. Elayaraja and M. Sivakumar
356 Secured Remote Method Invocation Framework P. Elayaraja and M.
Sivakumar
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
368 Laptops Security Application Using RFID Anurag Srivastava and
Alok Kumar Dutt
372 An Effective Approach for Disaster Prevention Using GSM
Gurvinder Singh, Ravleen Kaur, Katiyal, Anubha Bansal and
Pushpendar Singh
374 Evaluation of Network Congestion Controlling Approaches
Gurvinder Singh, Sumant Katiyal and ShreyaDubey
375 Increasing the Efficiency of Echo Hiding Digital Audio
Steganography Gurvinder Singh, Sudip. K. Dey, Shreya Dubey and
Sumant Katiyal
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
380 Network Management and Routing Strategies with Mobile Agent
Praveena Chaturvedi and Nipur
383 Network Aware Routing Protocol for MANET Ela Kumar and Ravinder
Nath Rajotiya
385 GSM Security and Encryption Atikant Shrivastava, Anjali Gupta
and Ashish Valuskar
389 A Mechanism for Congestion Control Using XCP Over Wireless
Mobile Network A. K. Vatsa, Khushbu Garg, Pankaj Chauhan and Rohit
Srivastava
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
392 User Interactive Web Content Adaptation for Mobile Devices
Prakash K. Mishra, Kapil Baliyan, Deepshikha and S. P. Singh
401 A Practical Approach Towards Development of Applications and
Solutions Using Java Agents Nilesh M. Shelke and Rajiv
Dharaskar
412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc
Networks Sushant Kumar and Bibhudatta Sahoo
452 Comparative Analysis of Structures and Attacks on Various
Stream Ciphers Mohammad Ubaidullah Bokhari and Faheem Masoodi
Track 2: Web Technologies, Computer Networks & Information
Security (G - III)
51 Recent Development in Databases and Future Directions Pradeep
Aswal and Rohit Goyal
56 Prioritization of Test Cases for Regression Testing Kapila
Kapoor and Geetika Kapoor
64 Feature Subset Selection in Medical Data Mining Using Cascaded
GA & CFS: A Filter Approach Asha Gowda Karegowda, M. A. Jayaram
and A. S. Manjunath
69 Data Mining and Knowledge Discovery Ankita Jhawar, Ayushi
Ameriya and Kanupriya Chaturvedi
Track 3: Software Engineering, Database And Data Mining (G -
III)
72 Use of Evolutionary Strategies in Software Testing Surjeet Singh
and Rakesh Kumar
78 Data Mining with Support Vector Machine Arti Patle and Deepak
Singh Chouhan
82 Emerging Techniques for Online Analytical Processing and its
Visualization Deepti Nayar and Vijay B. Aggarwal
89 Resource Based Grid Scheduling Algorithm Manjot Bhatia
93 Query Optimization in Homogenous Distributed Database Management
System Himanshu Sharma and C. Komalavalli
Track 3: Software Engineering, Database And Data Mining (G -
III)
105 Commit Protocols and Their Issues in Distributed Databases
Vinay Sharma and Vijay B. Aggarwal
106 Query Optimization in Heterogeneous Distributed Databases
Akanksha Gupta and Vijay B. Aggarwal
108 A Solution to Load Balancing Problem in Object Oriented
Clusters Sumit Khanna and Deepti Sharma
122 Implementation of Multivariate Clustering Methods for Software
Development Seetharam. K and Chandrakanth G Pujari
Track 3: Software Engineering, Database And Data Mining (G -
III)
131 Software Testing vs. Code Inspection: What else for
Verification & Validation? Latika Kharb and Rajender
Singh
133 Reusability in Component Based Development Process Model in
Software Development Jyoti Mahajan, Devanand and V. Mansotra
161 Analysis of Software Threats and Software Security Deepshikha
Jamwal and Bhawana Sharma
166 Recent Trends in Associative Rule Mining Shalini Vermani and
Ritika Wason
180 Model Testing: Is it Only A Special Case of Software Testing
Manoj Kumar Pachariya
Track 3: Software Engineering, Database And Data Mining (G -
III)
194 Comparison of Different Normal Forms Vinita Rohilla
196 Reliability and N-version Programming in Software Fault
Tolerance K. C. Joshi
200 An Analysis of Rural Economic Geography using Spatial Data
Mining Techniques V. R. Kanagavalli and K. Raja
203 Software Engineering Challenges: A Case Study P. L. Ramteke and
Mohammad Atique
208 Efficient Implementation of the Minimum Spanning Trees Based
Clustering Meena. A and Raja. K
Track 3: Software Engineering, Database And Data Mining (G -
III)
238 Software Testing Scenario N. Prasanna Balaji, U. Sreenivasulu
and G. Pramod
249 Hyperion Essbase Technology K B K S Durga
252 Software Metrics Vis–a-Vis Software Vulnerability Deepshikha
Jamwal and Bhawana Sharma
254 Software Reuse: A Systematic Review Deepshikha Jamwal
256 A Unit-Test Framework for Database Applications M Srikanth
Yadav
Track 3: Software Engineering, Database And Data Mining (G -
III)
260 Maximum Number of Keys in B –Tree of Height K Pawan Jindal,
Amit Kumar and Shishir Kumar
268 Distributed Media Player S. A. M. Rizvi, S Zeeshan Hussian and
Vineet Sharma
279 A Comprehensive Approach Towards Data Preprocessing Techniques
& Association Rules Jasdeep Singh Malik, Prachi Goyal and
Akhilesh K Sharma
304 A Software Tool to Access Evolutionary Algorithms for Data
Bhavsingh Maloth
Track 3: Software Engineering, Database And Data Mining (G -
III)
306 Delete File System Watcher - Storage Optimization Tool Preeti
Arora
316 Points-to Analysis of RMI-Based Java Programs Yogesh Pingal,
Pallavi Satpule and Sandesh Patil
319 Security Concern Using Aspect Oriented Programming (Aspect C)
Kavish Sehgal and Kashyap Rajpal
320 Distributed Query Optimization: Use of Mobile Agents Kodanda
Kumar Melpadi
321 An Extended GCLP Algorithm for Hardware Software Partitioning
Anurag Srivastava
Track 3: Software Engineering, Database And Data Mining (G -
III)
326 Data Mining and Business Intelligence Technologies Manmeet
Singh Kapoor
352 Data Mining and Audience Intelligence for Advertising Manika
Gupta
364 Evaluation System with Oracle 10g Jaswinder Kaur
373 Real Time Operating Systems (RTOS) Ashima Wadhwa
387 A Hybrid Black Box Technique for the Selection of Optimum
Number of Test Cases Bratin Bhattacharya and Deepa Gangwani
Track 3: Software Engineering, Database And Data Mining (G -
III)
394 Data Mining in Healthcare Sector K. R. Radha Krishnan
395 Software Reliability Assessment and Prediction: Artificial
Neural Network (ANN) Models R. C. Tripathi, Manohar Lal, A. K.
Malviya and Manish Saraswat
418 An Analysis of Rural Economic Geography Using Spatial Data
Mining Techniques V. R. Kanagavalli and K. Raja
Track 3: Software Engineering, Database And Data Mining (G -
III)
4 Discrete Sequence Wavelet Transform NUC Algorithm Parul
Goyal
22 Distributed-Grid Databases Server Design and Implementation for
Bio-Molecular Simulations Santosh Kumar
23 Real Time Monitoring of Patients Using Bio - Signals Through
Embedded Computer R. W. Jasutkar and T. M. Pattewar
42 CMOS Implementation of Cell Signaling for Cell Death Shruti Jain
and Pradeep K. Naik
Track 4: High Performance Computing (G - III)
55 An Intelligent Blackjack Game Using Reinforcement Learning
Algorithms Arvind Singh Chandel and Aruna Tiwari
65 Inorganic Expert: Automation of Inorganic Chemistry Vinay
Mathur, Parul Kharub and Yatin Malhotra
68 Managing Information Overload in Distributed Computing
Environment Ajay Tiwari and Priyesh Kanungo
75 Lossy Image Compression Using Variable Run Length Encoding
Soumya Maitra
Track 4: High Performance Computing (G - III)
99 Bio - Informatics G. Gayatri
102 Traffic Generation Model for Delhi Urban Area Using Artificial
Neural Network Shivendra Goel, J. B. Singh and Ashok Kumar
Sinha
135 A New Type of Covering Based Generalized Rough Set Debadutta
Mohanty
137 Bioinformatics: "Leading the Way to New Advancements" Vinay
Chopra
Track 4: High Performance Computing (G - III)
144 Reduction of Parasitic Capacitance for Transmission with the
Help of CPL Harpreet Parashar, Rachit Patel and Viranjay Mohan
Srivastava
145 Parasitic Capacitances in Double Gate MOSFET Priyank Kumar and
Viranjay M. Srivastava
148 Circuit Design with Independent Double Gate Transistors Nitant
and Viranjay M. Srivastava
163 Project Management Efficiency Using Fuzzy Logic Vinay Kumar
Nassa
Track 4: High Performance Computing (G - III)
175 Reducing LOC and Cyclomatic Complexity Garima Verma and M. P.
Thapaliyal
177 Full Substractor Circuit Design with Independent Double Gate
MOSFET Nitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay M.
Srivastava
185 Modeling and Analyzing Wavelet Based Watermarking System Using
Game Theoretic Optimization Technique Shweta, Akash Tayal and
Ankita Lathey
202 Volume Based Medical Image Registration by Maximization of
Mutual Information T. Senthil Kumar and R. Suganya
Track 4: High Performance Computing (G - III)
207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print
Images Arunkumar. V and Malathy. C
214 3D Atlas of Human Anatomy for Educational Purposes T. Senthil
Kumar and Vijay Sabarish Pankajan
215 A Survey on 3D Face Reconstruction Methods Based on Marching
Cubes Algorithm Rakesh P. B. and T. Senthil Kumar
219 Use of GA in Solution of TTP Sikander and Kuldeep Kumar
Track 4: High Performance Computing (G - III)
226 A New Technique for Detection and Location of Human Faces in
Digital Image Satyendra Nath Mandal, Aninda Banerjee, Kumarjit
Banerjee and Sourish Banerjee
227 Mr. Tacton (Embedded Red Tacton) Saranya Sivasankaran and
Srikkanth Govindaraajan
229 Fuzzy logic - A New Powerful Technology Pooja Gautam
242 Protected Content Based Image Retrieval N. Prasanna Balaji, J.
Reena and Korra Bichya
243 Relevance Feedback for Distributed Content - Based Image
Retrieval N. Prasanna Balaji and J. Reena and Korra Bichya
Track 4: High Performance Computing (G - III)
265 Integration of HIS with the Internet Appliance System for the
Treatment of Human Infertility P. K. Srimani, Manjula Sanjay and K.
Krishna Veni
267 Digital Watermarking: Advanced Technique in Image and Video
Technology S. A. M. Rizvi, Vineet Sharma and Anurag Singh
Chauhan
271 Bio - Informatics, Bonding Genes With IT Ruchika Gupta
276 A Survey on Segmentation and Modeling of Full Human Body Shape
from 3-D Scan Data A. K. Patil and A. J. Patil
Track 4: High Performance Computing (G - III)
302 Phase-Based Image Matching Used for an Effective Approach for
Iris Recognition A. K. Patil and A. J. Patil
305 Primitive Image Transformations Used to Perform a Fast Fourier
Transform A. K. Patil and A. J. Patil
313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability
Navneet Tiwari, Jatan Saraf and Siddarth Jain
314 Living BEAM Elegant Wizards - The Future of Artificial
Intelligence Navneet Tiwari, Sagar Gupta and Puneet Tiwari
Track 4: High Performance Computing (G - III)
324 Texture Based Image Retrieval With an Application to CBIR D. N.
Verma and Bharti
330 Computing with DNA Shankar B. Kshetry and J. P. Singh
338 A New Approaches for Fingerprint Recognition Based on Fourier
Transformed Selected Image (FTSI) Algorithms Praveen Kumar Singh
Rathor, Ravi Kumar Ravi and Pankaj Kumar Sharma
362 Application of Genetic Algorithm in Oil Drilling Problem Tanya
Jhamb, Anusha Bhatnagar and Nidhi Kohli
Track 4: High Performance Computing (G - III)
366 A New Approach of Extraction Transformation Loading Using
Pipelining Rajender Singh Chhillar and Barjesh Kochar
379 Bengali-English Relevant Cross Lingual Information Access Using
Finite Automata Avishek Banerjee and Swapan Bhattacharyya
388 K-Means Clustering Using WEKA Interface Sapna Jain, M. Afshar
Aalam and M. N. Doja
391 Role of EEG Lab for Analyzing Electroencephalogram Signal
Ashish B. Sasankar N. G. Bawane and S. T. Bodkhe
Track 4: High Performance Computing (G - III)
393 Development of Motherboard Ontology Using Protégé V3.4 Rc2
(Build 529) Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik
397 NAVIGUER R. Bakyalakshmi Nisha and S. Madhumitha
398 Content Based Face Retrieval Zafar G. Sheikh and V. M.
Thakare
Track 4: High Performance Computing (G - III)
Authors A. B. Patki 216 Role and Scope of Support Vector Machine
in
Bioinformatics A. B. Patki 217 Fuzzy Logic System for Querying a
Database A. B. Patki 218 Cyber Crime Management Using
Evidence
Based Software Engineering - Banking and Insurance Industries
A. B. Patki 273 Introducing Machine Intelligence Quotient as a New
COTS Evaluation Measure
A. B. Patki 361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow Tool) in BPO
Multiplexing
A. J. Patil 276 A Survey on Segmentation and Modeling of Full Human
Body Shape from 3-D Scan Data
A.J. Patil 302 Phase-Based Image Matching Used for an Effective
Approach for Iris Recognition
A. J. Patil 305 Primitive Image Transformations Used to Perform a
Fast Fourier Transform
Authors A. K. Daniel 303 Position Based Multicast Routing
Protocol
for Ad-hoc Wireless Networks A. K. Dwivedi 336 Evaluating Impact of
Operating System
Architectures on Simulation Results of Routing Mechanisms for
Wireless Sensor Networks
A. K. Malviya 395 Software Reliability Assessment and Prediction:
Artificial Neural Network (ANN) Models
A. K. Nayak 399 Encryption Through Cascaded Recursive Addition of
Blocks and Key Rotation of a Session Key (CRABKR)
A. K. Patil 253 Dynamic Cluster Resource Allocations for Jobs with
Known Memory Demands
A. K. Patil 276 A Survey on Segmentation and Modeling of Full Human
Body Shape from 3-D Scan Data
A. K. Patil 302 Phase-Based Image Matching Used for an Effective
Approach for Iris Recognition
Authors A. K. Patil 305 Primitive Image Transformations Used
to
Perform a Fast Fourier Transform A. K. Paul 357 Knowledge
Management in a Research
Organization A. K. Sharma 419 Resource Scheduling in Mobile
Distributed
Real Time Database Systems: A New Perception for Operating
System
A. K. Solanki 337 Effectiveness of New Technologies for Teaching
and Learning: Web 2.0 and e- Learning
A. K. Vatsa 389 A Mechanism for Congestion Control Using XCP Over
Wireless Mobile Network
A. Raji Reddy 220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks
A. S. Manjunath 64 Feature Subset Selection in Medical Data Mining
Using Cascaded GA & CFS: A Filter Approach
Authors Abhijeet Gorey 282 Performance Enhancement in Satellite
Using
UltraCMOS and Silicon Heat Pipe Technology Abhijeet Gorey 301
Energy Harvesting via Piezoelectricity Abhilasha Sharma 17 Maximal
Link Mode Algorithm for Task
Allocation in Distributed Computing System Abhilasha Vyas 190 Data
Security From Malicious Attack:
Computer Viruses Abhipal Singh 172 File Transfer Using Secure
Sockets in Linux
Environment Abhishek Khemka 193 Wireless Automatic Gate Sensing
Alarm and
Smoke Alarm Especially for Persons with Hearing Problem
Abhishek Tandon 453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Abid Yunus Salati 46 Managing Knowledge Workers During Turbulent
Times
Adil Siddiqui 142 Electronic Judicial System
Authors Ajay D. Parikh 43 Software Design Pattern for
e-Governance
Solution Framework Ajay Tiwari 68 Managing Information Overload in
Distributed
Computing Environment Ajendra Isaacs 348 Ad-hoc Networking
Protocols a Brief Treatise Ajendra Isaacs 349 Data Mining for
Digital Libraries – A New
Paradigm Ajit More 424 Applying Rough-Sets to Assist the
Decision
Making for ERP Implementation Akanksha Gupta 106 Query Optimization
in Heterogeneous
Distributed Databases Akash Tayal 67 A Novel Technique Combining
Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
Akash Tayal 185 Modeling and Analyzing Wavelet Based Watermarking
System Using Game Theoretic Optimization Technique
Authors Akash Tayal 230 Nonlinear Circuit Modelling Using
Volterra
Series Akhil Jindal 201 A Novel Software Architecture for
Network
Security Testing Akhilesh K Sharma 158 Dual Firewall Technology for
VPN Network Akshay Anand 361 Implementation of Workflows Intuitive
Formal
Approach (An Emergency Response Workflow Tool) in BPO
Multiplexing
Alok Kumar Dutt 368 Laptops Security Application Using RFID
Amandeep Makkar 73 Performance Evaluation of Protocols for
Secure Routing Over MANET Amit Kour 335 A Study of Concurrency and
Recovery
Techniques in Databases Amit Kumar 244 Analysis of Time Complexity
in Binary Search
Tree Amit Kumar 251 Effect of Insertion and Immediately
Deletion
of Inserted Node From Red Black Tree
Authors Amit Kumar 260 Maximum Number of Keys in B –Tree of
Height K Amit Madan 284 Multi-Module Security: Bio-Secure
Steganographic System Amit Sirohi 130 A New Approach for Mobility
Management in
the Wireless Network of a Mobile Communication System
Amrit Kaur 415 Technology: Third Medium of Instruction Amrutha. V
115 Improving the Effectiveness of Inspection
Through Verification and Validation Anand K Pandey 87 A Review of
Software Process Models and
Methodologies Anand Paropkari 274 HCI Challenges in Using Mobile
Devices: A
Study of Issues Faced by Senior Citizens While Using Mobile
Phones
Anil Kumar 147 Open Source Software Quality – An Issue of
Concern
Authors Anil T. Gaikwad 97 Core Banking and Its Implementation Anil
Ticku 146 Telemedicine in India - A Model for Jammu &
Kashmir State Animesh Tripathy 198 A Novel Approach for Security
Policy
Integration and Conflict Reconciliation in a Ubiquitous
Environment
Aninda Banerjee 226 A New Technique for Detection and Location of
Human Faces in Digital Image
Anisur Rehman 315 Current-Mode Oscillator Using Single DVCC Nasir
Anjali Gupta 318 Low Power Design Strategies for SoCs Anjali Gupta
385 GSM Security and Encryption Ankita Jhawar 69 Data Mining and
Knowledge Discovery Ankita Lathey 185 Modeling and Analyzing
Wavelet Based
Watermarking System Using Game Theoretic Optimization
Technique
Authors
Anshu Chowdhary 218 Cyber Crime Management Using Evidence Based
Software Engineering - Banking and Insurance Industries
Anshul Agrawal 351 Secure and User Interactive Information
Extraction in Linux Distributions
Anu. G. Aggarwal 453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Anubha Bansal 372 An Effective Approach for Disaster Prevention
Using GSM
Anup Singh 328 Design & Analysis of PHY Aware MAC for Low
Kushwaha Power Low Rate UWB Network Anuradha Sharma 53 Performance
of Static Interconnection of
Computer Network Through UML Anuradha Taluja 162 Information and
Communication Technology
(ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An
Overview
Authors Anurag Jain 329 Tones and Break Indices for Speech
Processing - A Review Anurag Jain 406 PRAAT Implementation for
Prosody
Conversion Anurag Jain 407 Emotion Conversion in Hindi Language
Anurag Singh 267 Digital Watermarking: Advanced Technique in
Chauhan Image and Video Technology Anurag Srivastava 368 Laptops
Security Application Using RFID Anurag Srivastava 321 An Extended
GCLP Algorithm for Hardware
Software Partitioning Anusha Bhatnagar 362 Application of Genetic
Algorithm in Oil
Drilling Problem Apoorva Shukla 311 Comparative Study of Ontology
Merging
Algorithms Archana Agarwal 329 Tones and Break Indices for
Speech
Processing - A Review
Emerging Solution Through Mobile Terminals at Customer
Door-Step
Archana Saxena 128 Search Engines - "Issues and Improvements“
Archana Sharma 157 E-Commerce : Improving Performance of
Customer Knowledge Management Ardhendu Mandal 223 SRS BUILDER 1.0:
An Upper Type CASE Tool
for Requirements Specification Arnab Samanta 378 Increasing Network
Security Using Laws of
Networking and Quantum Mechanics Arti Agarwal 339 Virtual
Instrumentation for Biomedical
Applications Arti Patle 78 Data Mining with Support Vector Machine
Aruna Tiwari 55 An Intelligent Blackjack Game Using
Reinforcement Learning Algorithms Arunkumar. V 207 Multimodal
Biometrics by Fusion of Finger
Vein and Finger Print Images
Authors Arvind Jaiswal 408 Quandary Elucidating Tactics of
Water
Resource Management by Information Technology
Arvind Singh 55 An Intelligent Blackjack Game Using Chandel
Reinforcement Learning Algorithms Arvind Upadhyay 52 Strategies for
Wavelength Assignment in
WDM Optical Networks Asaad A. M. 269 In-door Image Motion Detection
with Objects Al-Salih Identification and Position
Shift-Velocity
Computation Asaad A. M. 270 A Machine Vision System for Motion
Analysis Al-Salih and DFT-Velocity Computation in Out-door
Video Frames Asha Gowda 64 Feature Subset Selection in Medical Data
Karegowda Mining Using Cascaded GA & CFS: A Filter
Approach Ashima Wadhwa 373 Real Time Operating Systems (RTOS)
Authors Ashish B. Sasankar 391 Role of EEG Lab for Analyzing
Electroencephalogram Signal Ashish Gupta 301 Energy Harvesting via
Piezoelectricity Ashish Surywanshi 158 Dual Firewall Technology for
VPN Network Ashish Valuskar 385 GSM Security and Encryption Ashok
Kumar 40 Information and Management Science in Sharma Developing
Inventory Policies for Service-
Sensitive Items Ashok Kumar 102 Traffic Generation Model for Delhi
Urban Area Sinha Using Artificial Neural Network Ashwini Kale 98
Design and Establishment of Information
System in Rural Areas for Sustainable Agriculture
Ashwini Kumar 57 Web Supported Expert System for Learning Asma
Shibli 327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP) Implementation Strategy
Authors Atikant Shrivastava 318 Low Power Design Strategies for
SoCs Atikant Shrivastava 385 GSM Security and Encryption Avanish
Kumar 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System Avijit Dutta 184
Collaborative Knowledge with Cloud
Computing Avishek Banerjee 379 Bengali-English Relevant Cross
Lingual
Information Access Using Finite Automata Avneesh Chauhan 450
Software Reliability Growth Modeling for
Distributed Environment Using Component- Specific Testing-Effort
Functions
Ayushi Ameriya 69 Data Mining and Knowledge Discovery B
Bandyopadhyay 20 Providing Security of Fingerprint Images
Through Digital Watermarking B N Chatterjii 20 Providing Security
of Fingerprint Images
Through Digital Watermarking
Authors B. R. Chandavarkar 381 Modifications in the Working Model
and
Handoff Mechanism of MIPv6 B. V. Ramana 94 A Methodology for
Successful Project Murthy Management in Medium Scale Enterprises B.
V. Ramana 95 Applying Agile & Web Engineering Technique Murthy
for Successful Web Management B. V. Ramana 96 Designing a Web
Education Model for Murthy Effective Teaching - Learning Process
Barjesh Kochar 366 A New Approach of Extraction
Transformation
Loading Using Pipelining Beneyaz Ara 198 A Novel Approach for
Security Policy Begum Integration and Conflict Reconciliation in
a
Ubiquitous Environment Bharat B. Bhagat 359 Study of Internet Usage
in Veterinary and
Agricultural Sciences
Authors Bharat Singh 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia
Broadcasting
Bharati Yelikar 277 A Literature Review of Methods Used in Software
Industries for Successful Software Project management
Bharti 324 Texture Based Image Retrieval With an Application to
CBIR
Bhavna Bajpai 18 Knowledge Management: Information & Knowledge
Sharing Through Intranet
Bhavsingh Maloth 261 Evaluation of Integration Algorithms for Meta
- Search Engine
Bhavsingh Maloth 304 A Software Tool to Access Evolutionary
Algorithms for Data
Bhawana Sharma 161 Analysis of Software Threats and Software
Security
Authors Bhawana Sharma 252 Software Metrics Vis–a-Vis
Software
Vulnerability Bhupendra Singh 186 Online Voting System Bibhudatta
Sahoo 412 Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc Networks Bratin Bhattacharya 387 A Hybrid Black Box
Technique for the
Selection of Optimum Number of Test Cases C. Komalavalli 93 Query
Optimization in Homogenous
Distributed Database Management System C. Naga Raju 231 A Novel
Edge Detection Technique for Color
Images C. S. Rai 328 Design & Analysis of PHY Aware MAC for
Low
Power Low Rate UWB Network Chandan Kalra 386 Emerging Trends of IT
in Healthcare Sector Chandra Shekhar 178 Next Generation Networks:
Enhancing
Performance and Security for Providing Mobile Multimedia
Broadcasting
Authors Chandrakanth 122 Implementation of Multivariate Clustering
G Pujari Methods for Software Development
Chandrakanth 325 Advanced Demodulation Scheme for the H. Gowda CDMA
System D. A. Vidhate 253 Dynamic Cluster Resource Allocations
for
Jobs with Known Memory Demands D. N. Verma 324 Texture Based Image
Retrieval With an
Application to CBIR D. Rama Rao 255 Recovery of Mobile Internet
Transactions D. Rama Rao 257 Potential Air Traffic Congestion
Solution: Slot
Allocation by Auction Method D. V. Guleria 253 Dynamic Cluster
Resource Allocations for
Jobs with Known Memory Demands D. V. M. Krishna 231 A Novel Edge
Detection Technique for Color
Images Dalip Bhat 147 Open Source Software Quality – An Issue
of
Concern Dalwinder Singh 136 Aspect Oriented Programming Java RMI
Salaria Server
Authors
Debadutta Mohanty 135 A New Type of Covering Based Generalized
Rough Set
Deepa Gangwani 387 A Hybrid Black Box Technique for the Selection
of Optimum Number of Test Cases
Deepak Singh 78 Data Mining with Support Vector Machine Chouhan
Deepali Shahane 340 Advantages of ERP System in SMEs Deepshikha 392
User Interactive Web Content Adaptation for
Mobile Devices Deepshikha 49 Threats and Innovations of Information
Bhargava Security in the 21st Century Deepshikha 60 Cloud
Computing: Its Security & Privacy Jamwal aspects Deepshikha 62
Improving QoS in Video Multicasting Jamwal Deepshikha 161 Analysis
Of Software Threats and Software Jamwal Security
Authors
Deepshikha 62 Dark Side of Cyber Crime in India: A Case Jamwal
Study Deepshikha 252 Software Metrics Vis–a-Vis Software Jamwal
Vulnerability Deepshikha 254 Software Reuse: A Systematic Review
Jamwal Deepshikha 272 Status of Use of IT Tools in SMEs in Jammu
Jamwal and Kashmir Deepti Nayar 82 Emerging Techniques for Online
Analytical
Processing and its Visualization Deepti Sharma 29 Rural e-Banking:
Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals at Customer
Door-Step
Deepti Sharma 108 A Solution to Load Balancing Problem in Object
Oriented Clusters
Devanand 133 Reusability in Component Based Development Process
Model in Software Development
Authors
Devanand 139 Role of ICT in Narrowing the Digital Divide in
India
Dhawal Shrivastava 301 Energy Harvesting via Piezoelectricity
Dheeraj Mehrotra 50 Towards 21st Century Classrooms: The
Quality Requisite! Dhiraj S. Rajani 116 Robust Steganography Using
Secure
Password Protected Scheme Divya Goel 234 Need for CCL in Grid
Computing Divya Leekha 176 Corporate Strategies Adopted by IT
Industry
to Beat the Global Crisis Divya Setia 406 PRAAT Implementation for
Prosody
Conversion Divya Setia 407 Emotion Conversion in Hindi Language
Divya. T. V. 247 Context Aware Multicasting Scheme for Delay
Tolerant Mobile Networks Ela Kumar 383 Network Aware Routing
Protocol for MANET
Authors Esha Saxena 167 Analyzing Steganographic Algorithm in
Java
by Function Point Technique Faheem Masoodi 452 Comparative Analysis
of Structures and
Attacks on Various Stream Ciphers G. Gayatri 99 Bio - Informatics
G. N. Purohit 26 IPv6 Transition - An Engineering Exercise or
a
Necessity? G. Pramod 237 The Network Security Assessment
Instrument
to Reduce Software Security Risk G. Pramod 238 Software Testing
Scenario G. R. Bamnote 232 Enhanced Security for Audio Signals
Using
Steganography
G. Ram Mohana 381 Modifications in the Working Model and Reddy
Handoff Mechanism of MIPv6 G. S. Sambyal 204 Dark Side of Cyber
Crime in India: A Case
Study
Authors G. Vakula Rani 365 A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic Algorithms
Garima Verma 175 Reducing LOC and Cyclomatic Complexity Gautam 359
Study of Internet Usage in Veterinary and
Agricultural Sciences Gautam Dhameja 347 AOEB: Energy Aware Routing
Scheme for
Wireless Sensor Networks Geetanjali 422 Application of Mobile
Banking Services in the
Bank Area Geetanjali Surange 24 Personalized Web Search: User
Modeling
Using Implicit Feedback From Click Through Data
Geetika Kapoor 56 Prioritization of Test Cases for Regression
Testing
Gopal Kamal 66 e-Commerce, Taxation in the Age of Birds Without
Shadows
Authors
Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New Perception for Operating
System
Gurjeet Kaur 459 Genetic Algorithm Based Optimal Testing Effort
Allocation Problem for Modular Software
Gurneet Singh 172 File Transfer Using Secure Sockets in Linux Sethi
Environment Gurvinder Singh 371 Critical Evaluation of Applications
of Expert
Systems Gurvinder Singh 372 An Effective Approach for
Disaster
Prevention Using GSM Gurvinder Singh 374 Evaluation of Network
Congestion
Controlling Approaches Gurvinder Singh 375 Increasing the
Efficiency of Echo Hiding
Digital Audio Steganography
Authors
Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed Real
Time Database Systems: A New Perception for Operating System
H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach for
Query Processing
H. Umadevi 325 Advanced Demodulation Scheme for the CDMA
System
Harish Kumar 162 Information and Communication Technology Taluja
(ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An Overview Harmanpreet Kaur 409 A New Generation
of Electronic Commerce Harneet Kaur 230 Nonlinear Circuit Modelling
Using Volterra
Series Harpreet Parashar 144 Reduction of Parasitic Capacitance
for
Transmission with the Help of CPL Harshita Sharma 67 A Novel
Technique Combining Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
Authors Harsimerjeet 34 Public Entrepreneurship: A Dynamic Strength
Khurana for Budding Green Technology Himali Natekar 176 Corporate
Strategies Adopted by IT Industry
to Beat the Global Crisis Himanshu Sharma 93 Query Optimization in
Homogenous
Distributed Database Management System Himanshu Sharma 285
Effectiveness of DSDV Protocol Under Hidden
Node Environment Himayatullah 344 An Efficient Knowledge Base
Mutual Linker Sharief Framework Himayatullah 345 Competent Ranking
Algorithm for Web-Based Sharief Search Engines Inderjit Singh 136
Aspect Oriented Programming Java RMI Dhanoa Server Iqbal Azam 192
Education Technology Based Models of
Teaching and Learning
Authors J. B. Singh 102 Traffic Generation Model for Delhi Urban
Area
Using Artificial Neural Network J. P. Singh 330 Computing with DNA
J. Reena 242 Protected Content Based Image Retrieval J. Reena 243
Relevance Feedback for Distributed Content -
Based Image Retrieval
J. Reena 278 Secure Routing for Mobile in Ad-hoc Network Mathigolda
Jagadeesh. G 115 Improving the Effectiveness of Inspection
Through Verification and Validation Jasdeep Singh 279 A
Comprehensive Approach Towards Data Malik Preprocessing Techniques
& Association
Rules Jasleen Kaur 172 File Transfer Using Secure Sockets in
Linux
Environment Jaspal Singh 235 On NTRU Cryptosystems and Timing
Attacks Bhatia
Authors Jaswinder Kaur 364 Evaluation System with Oracle 10g Jatan
Saraf 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks Jatan Saraf 313 WsVsSenNet: An
Era of Enhanced Vision
Based Sensing Capability Jawed Ahmed 341 The Noise-Robustness of
Mel-Frequency
Cepstral Coefficients (MFCC) for Speech Recognition
Jaya Sil 410 Dimension Reduction Using Rough Set Theory for
Intrusion Detection System
Jayanthi R 115 Improving the Effectiveness of Inspection Through
Verification and Validation
Jewan Singh 188 Information and Communication Technologies for
strengthening Panchayati Raj in India “A Model for J&K
State”
Jewan Singh 199 Information and Communication Technologies (ICT’s)
for Sustainable Development in Agriculture “A Model for J&K
State”
Authors Joydeep 467 Significance of IT-enable BPR in Business
Chowdhury Enterprise and in Customer end Joydeep 469 Current Market
Scenarios of High demand Chowdhury BPR implementation through BPM
software Jyoti Kharade 35 Citizen Centric e-Governance: Problems
and
Prospects Jyoti Mahajan 133 Reusability in Component Based
Development Process Model in Software Development
Jyotirmay Patel 337 Effectiveness of New Technologies for Teaching
and Learning: Web 2.0 and e- Learning
Jyotish Kumar 456 Unified Framework For Developing Testing Effort
Dependent Software Reliability Growth Models with Change point and
Imperfect Debugging
Jyotsna Nigam 353 Evaluating Web Crawler Algorithms K B K S Durga
249 Hyperion Essbase Technology
Authors K. C. Joshi 196 Reliability and N-version Programming
in
Software Fault Tolerance K. Krishna Veni 265 Integration of HIS
with the Internet Appliance
System for the Treatment of Human Infertility K. M. Mital 205 ICT
and Emergency Medical Services K. P. Tripathi 46 Managing Knowledge
Workers During
Turbulent Times K. P. Tripathi 179 A Conceptual Framework of Ethics
in
Information Technology K. P. Yadav 331 Detecting and Preventing IP
Spoofed Attack
by RSA Asymmetric Crypto – System K. R. Radha 394 Data Mining in
Healthcare Sector Krishnan K. R. Radha 396 Neuro-informatics in
India - Problems and Krishnan Trends K. Raja 200 An Analysis of
Rural Economic Geography
using Spatial Data Mining Techniques
Authors K. Raja 418 An Analysis of Rural Economic Geography
Using Spatial Data Mining Techniques K. Rajalakshmi 25 Solving
Cellular Mobile Network’s Assignment
Problem Using Iterative Local Search Algorithm
K. Rajashekhar 248 ICT Enabled Workflow and Progress Monitoring
System for National Horticulture Mission
K. S. Gurumurthy 325 Advanced Demodulation Scheme for the CDMA
System
K. V. Madhu 54 Trust Aware Load Distribution in a Data Grid Murthy
Environment K. V. N. Sunitha 224 A MAIL Reader in Telugu K. V. N.
Sunitha 228 Voice Enabled Mail Reader-VMAIL K.Srinivasa Babu 94 A
Methodology for Successful Project
Management in Medium Scale Enterprises
Authors Kalpana Yadav 450 Software Reliability Growth Modeling
for
Distributed Environment Using Component- Specific Testing-Effort
Functions
Kanchan Lata 403 Information Technology for Education, Health
Bhardwaj and Development Kanu Priya 273 Introducing Machine
Intelligence Quotient as Aggarwal a New COTS Evaluation Measure
Kanupriya 69 Data Mining and Knowledge Discovery Chaturvedi Kapil
Baliyan 392 User Interactive Web Content Adaptation for
Mobile Devices Kapila Kapoor 56 Prioritization of Test Cases for
Regression
Testing Kashyap Rajpal 319 Security Concern Using Aspect
Oriented
Programming (Aspect C) Kavish Sehgal 319 Security Concern Using
Aspect Oriented
Programming (Aspect C)
Authors Kavita Bhatnagar 183 Security and Efficiency in Ad-hoc
Mobile
Network Kavita Thorat 52 Strategies for Wavelength Assignment
in
WDM Optical Networks Kavleen Kaur 172 File Transfer Using Secure
Sockets in Linux Oberoi Environment Khanhaiya Singh 416 Improving
the Quality of Organization
Through ERP Systems: Indian Industry Survey Khushbu Garg 389 A
Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network Kiran 83 Quality of Service for
Mobile Ad-hoc Networks Kiran 88 Performance Analysis of Multi Media
Ad-hoc
Networks Kodanda Kumar 320 Distributed Query Optimization: Use of
Mobile Melpadi Agents Kokula Krishna 120 On Demand Temporary Route
Recovery for Hari. K Frequent Link Failures in Ad-hoc
Networks
Authors Kokula Krishna 121 Implementation of Weighted Rule Mining
Hari. K Algorithm for Wireless Sensor Networks Korra Bichya 242
Protected Content Based Image Retrieval Korra Bichya 243 Relevance
Feedback for Distributed Content -
Based Image Retrieval Kranthi Kumar 239 Validation of Clustering
Algorithms for Mobile Amirineni Ad-hoc Networks Using Colored Petri
Nets Kshama 333 Identifying Parameters with Data Collection
Paithankar Methods for Software Development in View of
Usability Kuldeep Bhardwaj 236 On NTRU Implementation: An
Algorithmic
Approach Kuldeep Kumar 219 Use of GA in Solution of TTP Kumar Kush
60 Cloud Computing: Its Security & Privacy
aspects Kumar Kush 62 Improving QoS in Video Multicasting
Authors Kumarjit Banerjee 226 A New Technique for Detection and
Location
of Human Faces in Digital Image Lakshmi Kalyani 377 Assessing
Adoption of m-CRM in Education
Centers Lalit Saraswat 103 Comparative Analysis of Various
Security
Techniques to Protect VoIP System in an Enterprise Network
Lalla Atul Singh 312 Performance Analysis and QoS Assessment
Chaurasia of Queues Over Multi - Hop Networks Latika Kharb 131
Software Testing vs. Code Inspection: What
else for Verification & Validation? Ligade Smita 210 Empirical
Study of Factors Affecting Success
of SNS (Social Networking Sites) M Srikanth Yadav 256 A Unit-Test
Framework for Database
Applications M. A. Jayaram 64 Feature Subset Selection in Medical
Data
Mining Using Cascaded GA & CFS: A Filter Approach
Authors M. Abul Hasan 192 Education Technology Based Models
of
Teaching and Learning M. Abdul Hasan 263 e-Waste Management and
Hazardous Effects
on Environment M. Afshar Alam 388 K-Means Clustering Using WEKA
Interface M. Afshar Alam 423 A Dynamic Load Balancing Algorithm for
Web
Applications M. Bala Krishna 421 Mobility Management Techniques and
QoS in
Mobile WiMax M. Kamil 37 Logic Theory: A Journey from Digital
System
Design to Knowledge Based System Design M. N. Doja 388 K-Means
Clustering Using WEKA Interface M. N. Doja 421 Mobility Management
Techniques and QoS in
Mobile WiMax M. P. Thapaliyal 175 Reducing LOC and Cyclomatic
Complexity M. Sivakumar 355 New Approach and Additional Security
to
Existing Cryptography Using Cubical Combinatorics
Authors M. Sivakumar 356 Secured Remote Method Invocation
Framework M. Suhaib Abbasi 192 Education Technology Based Models
of
Teaching and Learning M. Suhaib Abbasi 263 e-Waste Management and
Hazardous Effects
on Environment M. V. Lakshmaiah 413 Overview of the Grid Technology
and e-
Governance for e-Health Implementation in Africa
Madaswamy Moni 160 FISHNET: An Emerging e-Governance Programme to
empower Fishing Communities and Facilitate Fisheries Business
Madhavi Pingili 8 Crawling the Web at Desktop Scales Madhavi
Pingili 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method Madhavi Pingili 287 Enterprise
Collaboration Tool Madhavi Sinha 384 Role of Natural Language
Processing in
Community Structure Detection
Authors Madhusudhana 266 An Efficient Solution for Evaluation
Problem Rao D of HMM Mahamaya 169 A Revitalized Dynamic Slicing
Method for Mohanty Program Testing and Debugging Mahamaya 197
Testing Graphical User Interface Using Mohanty Decision Based
Sequence Diagrams Mahesh Grover 384 Role of Natural Language
Processing in
Community Structure Detection Malathy. C 207 Multimodal Biometrics
by Fusion of Finger
Vein and Finger Print Images Malini M. Patil 332 Data Stream Mining
Using Landmark Stream
Model for Offline Data Streams: A Case Study of Health Care
Unit
Mamta Sachdeva 77 Network Monitoring: Topology, Methods and
Issues
Manika Babbar 230 Nonlinear Circuit Modelling Using Volterra
Series
Authors Manika Gupta 352 Data Mining and Audience Intelligence
for
Advertising Maninder Singh 406 PRAAT Implementation for Prosody
Suri Conversion Maninder Singh 407 Emotion Conversion in Hindi
Language Suri Manish Saraswat 395 Software Reliability Assessment
and
Prediction: Artificial Neural Network (ANN) Models
Manisha Kumari 98 Design and Establishment of Information System in
Rural Areas for Sustainable Agriculture
Manjot Bhatia 89 Resource Based Grid Scheduling Algorithm Manju
Shree 357 Knowledge Management in a Research
Organization Manjula Sanjay 265 Integration of HIS with the
Internet Appliance
System for the Treatment of Human Infertility
Authors Manmeet Singh 326 Data Mining and Business Intelligence
Kapoor Technologies
Manohar Lal 395 Software Reliability Assessment and Prediction:
Artificial Neural Network (ANN) Models
Manoj Kumar 36 A Directed Threshold Signature Scheme with Threshold
Verification
Manoj Kumar 180 Model Testing: Is it Only A Special Case of
Pachariya Software Testing
Mary Jacintha M 416 Improving the Quality of Organization Through
ERP Systems: Indian Industry Survey
Mashaallah 454 Instructions Executed Dependent Software Basirzadeh
Reliability Growth Modeling for Open Source
Software by Considering Change- Point
Mayank 80 Stock Market Expert Kulshrestha
Authors Mayank Kumar 361 Implementation of Workflows Intuitive
Formal
Approach (An Emergency Response Workflow Tool) in BPO
Multiplexing
Md. Arif 248 ICT Enabled Workflow and Progress Monitoring System
for National Horticulture Mission
Md. Tabrez Nafis 189 Mobile E-Commerce: Payment System
Security
Meena. A 208 Efficient Implementation of the Minimum Spanning Trees
Based Clustering
Meenakshi Bhat 76 In-silico Comprehensive Sequence and Structure
Analysis of Proteases Family
Meenakshi Gupta 12 IPv4 vs IPv6 - Next Generation Internet
Meenakshi 142 Electronic Judicial System Sharma Meraj Ahmed 327
Comparison Factors for the Selection of Khan Enterprise Resource
Planning (ERP)
Implementation Strategy
Authors Mohamed Meftah 423 A Dynamic Load Balancing Algorithm for
Web Alrayes Applications Mohammad Atique 203 Software Engineering
Challenges: A Case
Study Mohammad Pasha 182 VAMS: An Effective Approach for
Vehicle
Assisted Messaging Scheme in VANETs Mohammad Pasha 400 A Study of
Wi-Fi Enabled Vehicular Networks
Using QualNet Simulator Mohammad 452 Comparative Analysis of
Structures and Ubaidullah Bokhari Attacks on Various Stream Ciphers
Mohammed 94 A Methodology for Successful Project Sharfuddin
Management in Medium Scale Enterprises Mohammed 95 Applying Agile
& Web Engineering Technique Sharfuddin for Successful Web
Management Mohammed 96 Designing a Web Education Model for
Sharfuddin Effective Teaching - Learning Process
Authors Mohan H .S. 220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks Mohd Abdul Ahad 167
Analyzing Steganographic Algorithm in Java
by Function Point Technique Mohd. Rihan 334 Intelligent Control for
Power System
Applications Mohd. Rihan 339 Virtual Instrumentation for
Biomedical
Applications Mohd. Sadiq 37 Logic Theory: A Journey from Digital
System
Design to Knowledge Based System Design Mohd. Umar 182 VAMS: An
Effective Approach for Vehicle Farooq Assisted Messaging Scheme in
VANETs Mohd. Umar 400 A Study of Wi-Fi Enabled Vehicular Networks
Farooq Using QualNet Simulator Mohit Agrawal 312 Performance
Analysis and QoS Assessment
of Queues Over Multi - Hop Networks Mohit Mathur 107 Achieving
Vertical Scalability: A Hindrance to
Cloud Computing
Authors
Mohit Rai 317 Bringing Wireless Access to the Education: A
Comparison of Wi-Fi, WiMAX, MBWA and 3G
Mudita Shrivastava 98 Design and Establishment of Information
System in Rural Areas for Sustainable Agriculture
Muneeza Afaq 334 Intelligent Control for Power System
Applications
Muqeem Ahmed 343 Semantic Grid E Learning Platform for Educational
System
N. Kalyani 224 A MAIL Reader in Telugu N. Kalyani 228 Voice Enabled
Mail Reader-VMAIL N. Prasanna Balaji 241 Potential Air Traffic
Congestion Solution Slot
Allocation by Auction Method N. Prasanna Balaji 237 The Network
Security Assessment
Instrument to Reduce Software Security Risk N. Prasanna Balaji 238
Software Testing Scenario
Authors N. Prasanna Balaji 242 Protected Content Based Image
Retrieval N. Prasanna Balaji 243 Relevance Feedback for Distributed
Content -
Based Image Retrieval N. Prasanna Balaji 287 Enterprise
Collaboration Tool N. Ramachandran 86 A Simulation Study of Content
Delivery
Network Nadia Imdadi 91 Semantic Kernel for Automatic Integration
of
Semantic Repositories Namita Singh 204 Dark Side of Cyber Crime in
India: A Case
Study Nand Kumar 224 Improving Academic Performance of
Students by Using Online Real Time Attendance Monitoring: A Case
Study At Al Fateh University
Nandita Sengupta 410 Dimension Reduction Using Rough Set Theory for
Intrusion Detection System
Narendra Gupta 349 Data Mining for Digital Libraries – A New
Paradigm
Authors Narendra Kumar 190 Data Security From Malicious Attack:
Tyagi Computer Viruses Nasreddin B. El 411 Improving Academic
Performance of Zoghbi Students by Using Online Real Time
Attendance Monitoring: A Case Study At Al Fateh University
Nasreddin B. El 413 Overview of the Grid Technology and e- Zoghbi
Governance for e-Health Implementation in
Africa Navendu Nitin 348 Ad-hoc Networking Protocols a Brief
Treatise Navendu Nitin 349 Data Mining for Digital Libraries – A
New
Paradigm Navneet Sharma 403 Information Technology for
Education,
Health and Development Navneet Tiwari 312 Performance Analysis and
QoS Assessment
of Queues Over Multi - Hop Networks Navneet Tiwari 313 WsVsSenNet:
An Era of Enhanced Vision
Based Sensing Capability
Authors Navneet Tiwari 314 Living BEAM Elegant Wizards - The Future
of
Artificial Intelligence Neelima Relan 235 On NTRU Cryptosystems and
Timing Attacks Neeraj Gupta 77 Network Monitoring: Topology,
Methods and
Issues Neeta Wadhwa 309 Cryptography and Mathematics Nidhi Kohli
362 Application of Genetic Algorithm in Oil
Drilling Problem Nikhil Jindal 201 A Novel Software Architecture
for Network
Security Testing Nilesh M. Shelke 401 A Practical Approach Towards
Development
of Applications and Solutions Using Java Agents
Nilesh Mahajan 277 A Literature Review of Methods Used in Software
Industries for Successful Software Project management
Nipur 132 Routing in Ad-hoc Networks
Authors
Nipur 380 Network Management and Routing Strategies with Mobile
Agent
Niraj Saxena 80 Stock Market Expert Nitant 148 Circuit Design with
Independent Double Gate
Transistors Nitasha Bisht 177 Full Substractor Circuit Design
with
Independent Double Gate MOSFET Nitesh Kumar 393 Development of
Motherboard Ontology Using
Protégé V3.4 Rc2 (Build 529) Niti Verma 273 Introducing Machine
Intelligence Quotient as
a New COTS Evaluation Measure Nitin Tyagi 81 Performance Comparison
and Improvement of
Routing Protocols - DSR Nitul Kaushik 128 Search Engines - "Issues
and Improvements" Nnj Hemrom 357 Knowledge Management in a
Research
Organization
Authors Nune Sreenivas 413 Overview of the Grid Technology and
e-
Governance for e-Health Implementation in Africa
Nupur Prakesh 328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network
Nutan Jaiswal 177 Full Substractor Circuit Design with Independent
Double Gate MOSFET
O. P. Chaudhary 348 Ad-hoc Networking Protocols a Brief Treatise O.
P. Vyas 336 Evaluating Impact of Operating System
Architectures on Simulation Results of Routing Mechanisms for
Wireless Sensor Networks
Om Prakash Verma 284 Multi-Module Security: Bio-Secure
Steganographic System
P. Balaram Papana 231 A Novel Edge Detection Technique for Color
Images
P. C. Jha 461 Optimal Testing Time Allocation of Modular Software
for Exponential SRGM Incorporating Imperfect Debugging
Authors P. Elayaraja 355 New Approach and Additional Security
to
Existing Cryptography Using Cubical Combinatorics
P. Elayaraja 356 Secured Remote Method Invocation Framework
P. G. V. Suresh 413 Overview of the Grid Technology and e- Kumar
Governance for e-Health Implementation in
Africa P. K. Jha 399 Encryption Through Cascaded Recursive
Addition of Blocks and Key Rotation of a Session Key (CRABKR)
P. K. Kapur 449 Optimal Allocation of Testing Effort: A Control
Theoretic Approach
P. K. Kapur 450 Software Reliability Growth Modeling for
Distributed Environment Using Component- Specific Testing-Effort
Functions
P. K. Kapur 453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Authors P. K. Kapur 454 Instructions Executed Dependent
Software
Reliability Growth Modeling for Open Source Software by Considering
Change- Point
P. K. Kapur 456 Unified Framework For Developing Testing Effort
Dependent Software Reliability Growth Models with Change point and
Imperfect Debugging
P. K. Kapur 459 Genetic Algorithm Based Optimal Testing Effort
Allocation Problem for Modular Software
P. K. Srimani 265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
P. K. Srimani 365 A Comparative Study of Fast Matrix Multiplication
Methods by Using Vedic Algorithms
P. K. Srimani 376 Implementation of the K-Means Method for Single
and Multidimensions
Authors P. K. Srimani 332 Data Stream Mining Using Landmark
Stream
Model for Offline Data Streams: A Case Study of Health Care
Unit
P. L. Ramteke 332 Data Stream Mining Using Landmark Stream Model
for Offline Data Streams: A Case Study of Health Care Unit
P. N. Pandey 377 Assessing Adoption of m-CRM in Education
Centers
P. Sivaprakasam 86 A Simulation Study of Content Delivery
Network
P. Sowjanya 286 Adaptive QoS for Mobile Web Services Through
Cross-Layer Communication
P.C.Jha 463 Fuzzy Approach for Selecting Optimal COTS Based
Software Products Under Consensus Recovery Block Scheme
P.K.Kapur 453 Two Dimensional Flexible Software Reliability Growth
Model and Related Release Policy
Authors P.N.Pandey 416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey
Pallav Parkhe 101 Broadband - Wire Line Technology Pallavi Satpule
316 Points-to Analysis of RMI-Based Java
Programs Pankaj Chauhan 389 A Mechanism for Congestion Control
Using
XCP Over Wireless Mobile Network Pankaj Kumar 338 A New Approaches
for Fingerprint Sharma Recognition Based on Fourier
Transformed
Selected Image (FTSI) Algorithms Pankaj Singh Yadav103 Comparative
Analysis of Various Security
Techniques to Protect VoIP System in an Enterprise Network
Parag Parandkar 191 Simulation and Synthesis of SONet Synchronous
Transport Signal STS-12 Transmitter
Parag Parandkar 211 Cost Effective Mass Transit Tracking
System
Authors
Parag Parandkar 301 Energy Harvesting via Piezoelectricity Parag
Parandkar 282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology Parag Parandkar 318 Low
Power Design Strategies for SoCs Parimalendu 467 Significance of
IT-enable BPR in Business Bandyopadhya Enterprise and in Customer
end Parimalendu 469 Current Market Scenarios of High demand
Bandyopadhya BPR implementation through BPM software Parmod Kumar
288 Intrusion Detection Approach to Secure Ad-
hoc Networks Parul Goyal 4 Discrete Sequence Wavelet Transform
NUC
Algorithm Parul Kharub 65 Inorganic Expert: Automation of
Inorganic
Chemistry Pawan Jindal 244 Analysis of Time Complexity in Binary
Search
Tree
Authors Pawan Jindal 251 Effect of Insertion and Immediately
Deletion
of Inserted Node From Red Black Tree Pawan Jindal 260 Maximum
Number of Keys in B –Tree of
Height K Peeyush Mathur 178 Next Generation Networks:
Enhancing
Performance and Security for Providing Mobile Multimedia
Broadcasting
Pooja Gautam 229 Fuzzy logic - A New Powerful Technology Pooja
Kherwa 353 Evaluating Web Crawler Algorithms Prachi Goyal 279 A
Comprehensive Approach Towards Data
Preprocessing Techniques & Association Rules
Pradeep Aswal 51 Recent Development in Databases and Future
Directions
Pradeep K. Naik 42 CMOS Implementation of Cell Signaling for Cell
Death
Pradeepta 116 Robust Steganography Using Secure Bhattacharya
Password Protected Scheme
Authors Prakash K. Mishra 392 User Interactive Web Content
Adaptation for
Mobile Devices Prashant Johri 450 Software Reliability Growth
Modeling for
Distributed Environment Using Component- Specific Testing-Effort
Functions
Prashant K. Thete 222 Effective Use of EDI and XML Message Exchange
for Small/Mid and Large Organizations
Prashanth G. K. 59 The State-of-The-Art Concepts in Software
Testing
Praveen Kumar 338 A New Approaches for Fingerprint Singh Rathor
Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms Praveen Kumar 354 Discussion of
Ad-hoc On Demand Tripathi Distance Vector (AODV) Routing Protocol
for
Mobile Hosts Praveena 380 Network Management and Routing Strategies
Chaturvedi with Mobile Agent
Authors Pravin Chandra 310 A Survey of Gateway Discovery
Mechanism
in Ad-hoc Networks Preeti Arora 306 Delete File System Watcher -
Storage
Optimization Tool Preeti Dubey 139 Role of ICT in Narrowing the
Digital Divide in
India Prema P. Nair 165 Identity Begets Identity; Real or Reel?
Prince 186 Online Voting Sys