2010 - BVICAM

Transcription

2010 - BVICAM
Welcome
INDIACom-2010
4th NATIONAL CONFERENCE ON
"COMPUTING FOR NATIONAL
DEVELOPMENT“
This disc is designed so that you may locate
papers by session or author, as well as with full
text search.
Papers originated as electronic files and were
converted to Adobe Acrobat PDF file format for
cross-platform access. Even though the viewing
quality on your monitor may vary, all papers
print clearly.
Thank you and enjoy!
Organisers
Sponsors
Technical Partners
Media Partners
click on the logo for more information
GGSIPU
Guru Gobind Singh Indraprastha University
established by Government of NCT of Delhi under
the provisions of Guru Go bind Singh Indraprastha
University Act, 1998 read with its Amendment in
1999.The University is recognized by University
Grants Commission (UGC), India under section 12B
of UGC Act.
The University has been awarded the ISO
9001:2000 Certification by Standardization,
Testing and Quality Certification Directorate,
Department of Information Technology, Ministry of
Communication and Information Technology,
Government of India, for a period of three years. It
has been accredited "A Grade" by NAAC during
Feb - March 2007.
<For details visit www.ipu.ac.in>
IETE
The IETE is the National Apex Professional
body of Electronics and Telecommunication,
Computer and IT Professionals. The IETE
focuses on advancing the Science and
Technology of Electronics, Computers,
Telecommunication, Information Technology and
related areas. It promotes and conducts
continuing technical education programmes such
as AMIETE and DIPIETE Examinations,
recognized by Ministry of HRD, GoI.
IETE Delhi is the largest centre of IETE and
conducts coaching classes for the AMIETE and
DIPIETE at its premises at Janakpuri, New Delhi.
<For details visit www.ietedelhi.org>
Bharati Vidyapeeth
<For details visit www.bvicam.in>
CSI
The Computer Society of India, founded in
1965,is a non-profit, professional body where IT
professionals meet to exchange views and
information, to learn and share ideas. CSI has
over 30,000 members to date, consisting of
professionals with varied backgrounds. Today it
has 62 chapters and 100 plus student branches
spread all over the country.
Established in late 60s, Delhi Chapter is one of
the largest chapters of CSI, having strength of
more than 1000 members. Delhi Chapter has
been awarded the Best Chapter award for 20052006.
<For details visit www.csidelhi.org>
Sponsors
Technical Partners
Media Partners
Groups
• Group I
• Group II
• Group III
Tracks ( G – I )
• Track #1: Digital World
• Track #2: Web Technologies, Computer
Networks & Information Security
• Track #3: Software Engineering, Database
And Data Mining
• Track #4: High Performance Computing
Tracks ( G – II )
• Track #1: Digital World
• Track #2: Web Technologies, Computer
Networks & Information Security
• Track #3: Software Engineering, Database
And Data Mining
• Track #4: High Performance Computing
Tracks ( G – III )
• Track #1: Digital World
• Track #2: Web Technologies, Computer
Networks & Information Security
• Track #3: Software Engineering, Database
And Data Mining
• Track #4: High Performance Computing
Track 1: Digital World (G - I)
34
Public Entrepreneurship: A Dynamic Strength
for Budding Green Technology
Puja Gupta and Harsimerjeet Khurana
35
Citizen Centric e-Governance: Problems and
Prospects
Jyoti Kharade
37
Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design
Mohd. Sadiq, Sunil and M. Kamil
40
Information and Management Science in
Developing Inventory Policies for ServiceSensitive Items
Ashok Kumar Sharma
Track 1: Digital World (G - I)
43
Software Design Pattern for e-Governance
Solution Framework
Ajay D. Parikh
46
Managing Knowledge Workers During Turbulent
Times
Abid Yunus Salati and K. P. Tripathi
57
Web Supported Expert System for Learning
Ashwini Kumar
74
Role of Information Technology in Health Care
Sampada S. Gulavani and R. V. Kulkarni
97
Core Banking and Its Implementation
V. M. Chavan and Anil T. Gaikwad
Track 1: Digital World (G - I)
139
Role of ICT in Narrowing the Digital Divide in
India
Preeti Dubey and Devanand
179
A Conceptual Framework of Ethics in
Information Technology
V. M. Chavan and K. P. Tripathi
188
Information and Communication Technologies
for strengthening Panchayati Raj in India “A
Model for J&K State”
Jewan Singh, V. Mansotra and Vinod Sharma
192
Education Technology Based Models of
Teaching and Learning
Iqbal Azam, M. Abul Hasan, Tanvir A. Abbasi,
Shabbir Ahmed and M. Suhaib Abbasi
Track 1: Digital World (G - I)
205
ICT and Emergency Medical Services
K. M. Mital
250
e-Democracy
Subhash Chander
263
e-Waste Management
M. Abul Hasan, Tanvir A. Abbasi, R. P. Mahapatra,
Shabbir Ahmed and M. Suhaib Abbasi
287
Enterprise Collaboration Tool
Madhavi pingili and N. Prasanna Balaji
301
Energy Harvesting via Piezoelectricity
Tanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey,
Ashish Gupta, Parag Parandkar and Sumant
Katiyal
Track 1: Digital World (G - I)
327
Comparison Factors for the Selection of
ERP Implementation Strategy
Tamanna Siddiqui, Meraj Ahmed Khan and Asma
Shibli
337
Effectiveness of New Technologies for
Teaching and Learning: Web 2.0 and e-Learning
Jyotirmay Patel and A. K. Solannki
343
Semantic Grid E Learning Platform for
Educational System
S. A. M. Rizvi, S. Z. Hussain and Muqeem Ahmed
359
Study of Internet Usage in Veterinary and
Agricultural Sciences
Bharat B. Bhagat, Gautam and Vibhakar Mansotra
Track 1: Digital World (G - I)
377
Assessing Adoption of m-CRM in Education
Centers
Lakshmi Kalyani, Tarun Pandeya and P. N. Pandey
413
Overview of the Grid Technology and eGovernance for e-Health Implementation in
Africa
Nasreddin B. El Zoghbi, M. V. Lakshmaiah, P. G. V.
Suresh Kumar and Nune Sreenivas
415
Technology: Third Medium of Instruction
Amrit Kaur
422
Application of Mobile Banking Services in the
Bank Area
U. S. Pandey and Geetanjali
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
17
Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System
Avanish Kumar, Abhilasha Sharma and Vanita Ben
Dhagat
30
Encryption Strength Lies Beyond Key Length:
A Suggestive Approach
Vinay Kumar
38
A Novel Scheme for Prevention of Forgery and
Alteration in Automated Cheque Payment
System
Vineeta Khemchandani and Runumi Devi
63
VANET: Application of Mobile Communication
in Road Traffic
Prashant G. Tandale
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
73
Performance Evaluation of Protocols for
Secure Routing Over MANET
Sunil Taneja, Ashwani Kush and Amandeep Makkar
95
Applying Agile & Web Engineering Technique
for Successful Web Management
B. V. Ramana Murthy, Salman Abdul Moiz and
Mohammed Sharfuddin
104
Role of VoIP (Voice over Internet Protocol) in eBusiness and e-Commerce
Susanta Kumar Nayak
132
Routing in Ad-hoc Networks
Ritika Arora Mehra and Nipur
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
167
Analyzing Steganographic Algorithm in Java by
Function Point Technique
Mohd Abdul Ahad, Esha Saxena and Sunil
172
File Transfer Using Secure Sockets in Linux
Environment
Abhipal Singh, Gurneet Singh Sethi, Kavleen Kaur
Oberoi and Jasleen Kaur
191
Simulation and Synthesis of SONet
Synchronous Transport Signal STS-12
Transmitter
Parag Parandkar, Sumant Katiyal and Vaishali
Bhale
224
A MAIL Reader in Telugu
K. V. N. Sunitha and N. Kalyani
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
235
On NTRU Cryptosystems and Timing Attacks
Santosh Kumar Yadav, Jaspal Singh Bhatia and
Neelima Relan
236
On NTRU Implementation: An Algorithmic
Approach
Santosh Kumar Yadav and Kuldeep Bhardwaj
239
Validation of Clustering Algorithms for Mobile
Ad-hoc Networks Using Colored Petri Nets
Kranthi Kumar Amirineni, Suchismita Chinara and
Santanu Kumar Rath
247
Context Aware Multicasting Scheme for Delay
Tolerant Mobile Networks
Divya. T. V. and T. Sivakumar
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
285
Effectiveness of DSDV Protocol Under Hidden
Node Environment
Ruchi Garg, Himanshu Sharma and Sumit Kumar
303
Position Based Multicast Routing Protocol for
Ad-hoc Wireless Networks
A K Daniel and R Singh
309
Cryptography and Mathematics
S. A. M. Rizvi and Neeta Wadhwa
310
A Survey of Gateway Discovery Mechanism in
Ad-hoc Networks
Saba Naaz and Pravin Chandra
323
Simulation of Ad-hoc Networks Using DSDV,
AODV and DSR Protocols
Vijendra Rai
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
325
Demodulation Scheme for the CDMA System
H. Umadevi, Chandrakanth H. Gowda, K. S.
Gurumurthy
328
Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network
Anup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and
Nupur Prakesh
336
Evaluating Impact of Operating System
Architectures on Simulation Results of Routing
Mechanisms for Wireless Sensor Networks
A. K. Dwivedi, V. K. Patle and O. P. Vyas
354
Discussion of Ad-hoc On Demand Distance
Vector (AODV) Routing Protocol for Mobile
Hosts
Shubha Jain, Praveen Kumar Tripathi and Rahul
Singh
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
363
Role Based and Credentials Based Access
Control in Semantic Web
Shaily malik
378
Increasing Network Security Using Laws of
Networking and Quantum Mechanics
Arnab Samanta and Sumit Chauhan
381
Modifications in the Working Model and
Handoff Mechanism of MIPv6
B. R. Chandavarkar and G. Ram Mohana Reddy
399
Encryption Through Cascaded Recursive
Addition of Blocks and Session Key Rotation
P. K. Jha and A. K. Nayak
Track 2: Web Technologies, Computer Networks
& Information Security (G - I)
400
A Study of Wi-Fi Enabled Vehicular Networks
Using QualNet Simulator
Mohammad Pasha and Mohd. Umar Farooq
414
Multi-hop Streaming in Wireless Distributed
Environment
Ravinder Nath Rajotia, Ritika Goyal, Priyanka
Tayal, Ruchi Dagar, Ruchika Sharma and Rajat
Mehrotra
423
A Load Balancing Algo for Web Applications
Sameena Naaz, Mohamed Meftah Alrayes and M.
Afshar Alam
Track 3: Software Engineering, Database And
Data Mining (G - I)
39
Application of Data Mining Techniques for
Diabetic DataSet
Runumi Devi and Vineeta Khemchandani
90
Data Mining: An approach to Increase the
Success of E-Commerce
Sanjay Manhas, Vinod Sharma and Vibhakar Mansotra
147
Open Source Software Quality – An Issue of
Concern
Anil Kumar, Vibhakar Mansotra and Dalip Bhat
197
Testing Graphical User Interface Using
Decision Based Sequence Diagrams
Mahamaya Mohanty
Track 3: Software Engineering, Database And
Data Mining (G - I)
201
A Novel Software Architecture for Network
Security Testing
Rajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal,
Sidharth Chhabra and Varunn Kaushik
218
Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
Sunanda Chowdhary, Shilpi Joshi, Tapasya Patki, Vipin
Sharma, Anshu Chowdhary, A. B. Patki and Vimal Gaur
223
SRS BUILDER 1.0: An Upper Type CASE Tool
for Requirements Specification
Ardhendu Mandal
244
Analysis of Time Complexity in Binary Search
Tree
Pawan Jindal, Amit Kumar and Shishir Kumar
Track 3: Software Engineering, Database And
Data Mining (G - I)
251
Effect of Insertion and Immediately Deletion of
Inserted Node From Red Black Tree
Pawan Jindal, Amit Kumar and Shishir Kumar
262
Analytical Report on Software Refactoring
S. A. M. Rizvi and Zeba Khanam
273
Introducing Machine Intelligence Quotient as a
New COTS Evaluation Measure
Priyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, Niti
Verma, Swati Verma and A. B. Patki
277
A Literature Review of Methods Used in
Software Industries for Successful Software
Project management
Nilesh Mahajan and Bharati Yelikar
283
A Study on Effect of Replication on Databases
Suraiya Parveen and Safdar Tanweer
Track 3: Software Engineering, Database And
Data Mining (G - I)
332
Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study of
Health Care Unit
P. K. Srimani and Malini M. Patil
333
Identifying Parameters with Data Collection
Methods for Software Development in View of
Usability
Teena Tiwari and Kshama Paithankar
335
A Study of Concurrency and Recovery
Techniques in Databases
Amit Kour, Vinod Sharma and V. Mansotra
342
Notifying State Change of Model to Multiple
Views Using Observer Pattern in Java
S. A. M. Rizvi and Syed Imtiyaz Hassan
Track 3: Software Engineering, Database And
Data Mining (G - I)
349
Data Mining for Digital Libraries – A New
Paradigm
Ajendra Isaacs, Rajeev Paulus, Navendu Nitin and
Narendra Gupta
351
Secure and User Interactive Information
Extraction in Linux Distributions
Sunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh
Kumar
402
CPN Tools as a Supplement to UML for
Validation of Software Requirements
Vinai George Biju and Santanu Kumar Rath
419
Resource Scheduling in Mobile Distributed Real
Time Database Systems: A New Perception for
Operating System
Gyanendra Kumar, Gupta Shubha Jain, Vishnu Swaroop
and A. K. Sharma
Track 3: Software Engineering, Database And
Data Mining (G - I)
449
Optimal Allocation of Testing Effort: A Control
Theoretic Approach
P. K. Kapur, Udayan Chanda and Vijay Kumar
450
Software Reliability Growth Modeling for
Distributed Environment Using ComponentSpecific Testing-Effort Functions
P. K. Kapur, Kalpana Yadav, Avneesh Chauhan and
Prashant Johri
453
Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
P. K. Kapur, R. B. Garg, Anu. G. Aggarwal and Abhishek
Tandon
454
Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source
Software by Considering Change- Point
V. B. Singh P. K. Kapur and Mashaallah Basirzadeh
Track 3: Software Engineering, Database And
Data Mining (G - I)
456
Unified Framework For Developing Testing
Effort Dependent Software Reliability Growth
Models with Change point and Imperfect
Debugging
V. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and
Jyotish Kumar
459
Genetic Algorithm Based Optimal Testing Effort
Allocation Problem for Modular Software
Anu G. Aggarwal, P. K. Kapur, Gurjeet Kaur and Ravi
Kumar
461
Optimal Testing Time Allocation of Modular
Software for Exponential SRGM Incorporating
Imperfect Debugging
P. C. Jha, Ritu Arora and P. K. Kapur
Track 3: Software Engineering, Database And
Data Mining (G - I)
463
Fuzzy Approach for Selecting Optimal COTS
Based Software Products Under Consensus
Recovery Block Scheme
P.C.Jha, Shivani Bali and P. K. Kapur
Track 4: High Performance Computing (G - I)
20
Providing Security of Fingerprint Images
Through Digital Watermarking
Tapas Bandyopadhyay, B Bandyopadhyay and B N
Chatterjii
48
Search Technique Implementation for Symbolic
Reasoning Under Uncertainty
Vandana Sharma
54
Trust Aware Load Distribution in a Data Grid
Environment
Shaik Naseera and K. V. Madhu Murthy
67
A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic
Speaker Recognition
Akash Tayal, Harshita Sharma and Twinkle Bansal
Track 4: High Performance Computing (G - I)
76
In-silico Comprehensive Sequence and
Structure Analysis of Proteases Family
Meenakshi Bhat and S. A. M. Rizvi
195
An Overview of Wavelet-Like Transforms and
Image Data Hiding
Sushil Kumar and S. K. Muttoo
211
Cost Effective Mass Transit Tracking System
Shafi Patel, Sumant Katiyal and Parag Parandkar
216
Role and Scope of Support Vector Machine in
Bioinformatics
Sunanda Chowdhary, Vipin Sharma, A. B. Patki and
Vimal Gaur
217
Fuzzy Logic System for Querying a Database
Sunanda Chowdhary, Vipin Sharma, A. B. Patki and
Suman Mann
Track 4: High Performance Computing (G - I)
230
Nonlinear Circuit Modelling Using Volterra
Series
Harneet Kaur, Manika Babbar, Saumya Tyagi and Akash
Tayal
266
An Efficient Solution for Evaluation Problem of
HMM
Madhusudhana Rao D
269
In-door Image Motion Detection with Objects
Identification and Position Shift-Velocity
Computation
Asaad A. M. Al-Salih and Syed I. Ahson
270
A Machine Vision System for Motion Analysis
and DFT-Velocity Computation in Out-door
Video Frames
Asaad A. M. Al-Salih and Syed I. Ahson
Track 4: High Performance Computing (G - I)
282
Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology
Priyanka Pandit, Parag Parandkar, Abhijeet Gorey and
Sumant Katiyal
284
Multi-Module Security: Bio-Secure
Steganographic System
Om Prakash Verma, Amit Madan and Sumit Madan
311
Comparative Study of Ontology Merging
Algorithms
Apoorva Shukla and Priyanka Bhutani
315
Current-Mode Oscillator Using Single DVCC
Anisur Rehman Nasir and S. Naseem Ahmad
318
Low Power Design Strategies for SoCs
Anjali Gupta, Atikant Shrivastava, Parag Parandkar and
Sumant Katiyal
Track 4: High Performance Computing (G - I)
329
Tones and Break Indices for Speech
Processing - A Review
Archana Agarwal and Anurag Jain
334
Intelligent Control for Power System
Applications
Mohd. Rihan and Muneeza Afaq
339
Virtual Instrumentation for Biomedical
Applications
Mohd. Rihan and Arti Agarwal
376
Implementation of the K-Means Method for
Single and Multidimensions
P. K. Srimani and Udaya Rani S
384
Role of Natural Language Processing in
Community Structure Detection
Vivek Bhola, Mahesh Grover and Madhavi Sinha
Track 4: High Performance Computing (G - I)
406
PRAAT Implementation for Prosody
Conversion
Maninder Singh Suri, Divya Setia and Anurag Jain
407
Emotion Conversion in Hindi Language
Divya Setia, Maninder Singh Suri and Anurag Jain
410
Dimension Reduction Using Rough Set Theory
for Intrusion Detection System
Nandita Sengupta and Jaya Sil
Track 1: Digital World (G - II)
29
Rural e-Banking: Gaps, Inefficiencies, Emerging
Solution Through Mobile Terminals at Customer
Door-Step
V. B. Aggarwal, Deepti Sharma and Archana B
Saxena
85
Information Technology and Knowledge
Management: An Explorative Study
Surabhi Deshpande and Sudhanshu Deshpande
96
Designing a Web Education Model for Effective
Teaching - Learning Process
B. V. Ramana Murthy, Salman Abdul Moiz and
Mohammed Sharfuddin
146
Telemedicine in India - A Model for Jammu &
Kashmir State
Vibhakar Mansotra, Dalip Kumar Bhat and Anil
Ticku
Track 1: Digital World (G - II)
157
E-Commerce : Improving Performance of
Customer Knowledge Management
Archana Sharma
176
Corporate Strategies Adopted by IT Industry to
Beat the Global Crisis
Divya Leekha, Himali Natekar and Sayali Shende
411
Improving Academic Performance of Students
by Using Online Real Time Attendance
Monitoring: A Case Study At Al Fateh University
Nand Kumar and Nasreddin B. El Zoghbi
424
Applying Rough-Sets to Assist the Decision
Making for ERP Implementation
Ajit More and Satyawan Hembade
Track 2: Web Technologies, Computer Networks
& Information Security (G - II)
26
IPv6 Transition - An Engineering Exercise or a
Necessity?
Savita Shiwani and G. N. Purohit
27
Web Services: Challenges in 21st Century
Harsimerjeet Khurana and Puja Gupta
77
Network Monitoring: Topology, Methods and
Issues
Mamta Sachdeva and Neeraj Gupta
103
Comparative Analysis of Various Security
Techniques to Protect VoIP System in an
Enterprise Network
Lalit Saraswat and Pankaj Singh Yadav
Track 2: Web Technologies, Computer Networks
& Information Security (G - II)
116
Robust Steganography Using Secure Password
Protected Scheme
Pradeepta Bhattacharya, Dhiraj S. Rajani and
Terence Johnson
187
Conserving Energy of WSNs by Using 3Rs Way
Raj Kumar and Sharad Goyal
421
Mobility Management Techniques and QoS in
Mobile WiMax
M. N. Doja and M. Bala Krishna
Track 3: Software Engineering, Database And
Data Mining (G - II)
58
Natural Relational Algebra: A New Approach for
Query Processing
Suhasini. M and H. S. Nagalakshmi
59
The State-of-The-Art Concepts in Software
Testing
Prashanth G. K.
87
A Review of Software Process Models and
Methodologies
Anand K Pandey and Rashmi Pandey
94
A Methodology for Successful Project
Management in Medium Scale Enterprises
B.V.Ramanamurthy, K.Srinivasa Babu and Mohammed
Sharfuddin
Track 3: Software Engineering, Database And
Data Mining (G - II)
115
Improving the Effectiveness of Inspection
Through Verification and Validation
Jayanthi R, Amrutha. V and Jagadeesh. G
136
Aspect Oriented Programming Java RMI Server
Inderjit Singh Dhanoa and Dalwinder Singh Salaria
169
A Revitalized Dynamic Slicing Method for
Program Testing and Debugging
Santosh Kumar Pani and Mahamaya Mohanty
253
Dynamic Cluster Resource Allocations for Jobs
with Known Memory Demands
D. A. Vidhate, A. K. Patil and D. V. Guleria
280
Students Academic Performance Analysis
Using Data Mining Techniques in Higher
Education: A Case Study of College
Sachin Bhoite and Suresh Pathare
Track 4: High Performance Computing (G - II)
91
Semantic Kernel for Automatic Integration of
Semantic Repositories
Nadia Imdadi and S. A. M. Rizvi
231
A Novel Edge Detection Technique for Color
Images
C. Naga Raju, Y. Rajendra kumar, P. Balaram Papana
and D. V. M Krishna
234
Need for CCL in Grid Computing
Divya Goel and Shivendra Goel
341
The Noise-Robustness of Mel-Frequency
Cepstral Coefficients (MFCC) for Speech
Recognition
Safdar Tanweer and Jawed Ahmed
Track 4: High Performance Computing (G - II)
365
A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic
Algorithms
P. K. Srimani and G. Vakula Rani
Track 1: Digital World (G - III)
11
Information Technology Infrastructure Library
(ITIL)
Tanaji D. Dabade
18
Knowledge Management: Information &
Knowledge Sharing Through Intranet
Bhavna Bajpai
21
Implementing IT in Disaster Management
Sandeep Mathur
50
Towards 21st Century Classrooms: The Quality
Requisite!
Dheeraj Mehrotra
66
e-Commerce, Taxation in the Age of Birds
Without Shadows
Rishi Kamal and Gopal Kamal
Track 1: Digital World (G - III)
80
Stock Market Expert
Niraj Saxena, Yash Hotchandani, Mayank Kulshrestha
and Puneet Arora
84
Improving and Sustaining Coconut
Productivity: IT - A Means to Economic Benefit
Rakesh Vardhan
92
Tomorrows Technology Today
Rishi Kamal
98
Design and Establishment of Information
System in Rural Areas for Sustainable
Agriculture
Mudita Shrivastava, Manisha Kumari, Saba Dalvi
and Ashwini Kale
Track 1: Digital World (G - III)
100
E - Governance: Whats and Ifs?
Sarita Garg
101
Broadband - Wire Line Technology
Pallav Parkhe and Ruchi Patle
110
Role of Information Communication
Technologies in Education
Swati Desai
118
Impact of Speech Applications in HealthCare
Organizations
Vandana Bhasin
142
Electronic Judicial System
Adil Siddiqui, Meenakshi Sharma, Manish and Salil
Khare
Track 1: Digital World (G - III)
160
FISHNET: An Emerging e-Governance
Programme to empower Fishing Communities
and Facilitate Fisheries Business
Sajjad Akhtar and Madaswamy Moni
162
Information and Communication Technology
(ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An Overview
Harish Kumar Taluja and Anuradha Taluja
165
Identity Begets Identity; Real or Reel?
Prema P. Nair
186
Online Voting System
Prince and Bhupendra Singh
Track 1: Digital World (G - III)
199
Information and Communication Technologies
(ICT’s) for Sustainable Development in
Agriculture “A Model for J&K State”
Jewan Singh and V. Mansotra
248
ICT Enabled Workflow and Progress Monitoring
System for National Horticulture Mission
Rakesh Vardhan, K. Rajashekhar and Md. Arif
272
Status of Use of IT Tools in SMEs in Jammu
and Kashmir
Roopali Jamwal and Deepshikha Jamwal
274
HCI Challenges in Using Mobile Devices: A
Study of Issues Faced by Senior Citizens While
Using Mobile Phones
Anand Paropkari
Track 1: Digital World (G - III)
317
Bringing Wireless Access to the Education: A
Comparison of Wi-Fi, WiMAX, MBWA and 3G
Vinay Kumar Nassa and Mohit Rai
340
Advantages of ERP System in SMEs
Rajita Dixit and Deepali Shahane
344
An Efficient Knowledge Base Mutual Linker
Framework
Syed Mohiuddin, Himayatullah Sharief and T.
Eshwar
346
Green Architecture
Rajni Gupta and Sanjib K. Sahu
Track 1: Digital World (G - III)
357
Knowledge Management in a Research
Organization
Manju Shree, Shyamalesh Khan, Nnj Hemrom,
Selvi S and A K Paul
361
Implementation of Workflows Intuitive Formal
Approach in BPO Multiplexing
Mayank Kumar, A. B. Patki, Akshay Anand and V.
Kumar
371
Critical Evaluation of Applications of Expert
Systems
Gurvinder Singh, Shreya Dubey and Sumant Katiya
386
Emerging Trends of IT in Healthcare Sector
Chandan Kalra
Track 1: Digital World (G - III)
396
Neuro-informatics in India - Problems and
Trends
K. R. Radha Krishnan
403
Information Technology for Education, Health
and Development
Kanchan Lata Bhardwaj and Navneet Sharma
408
Quandary Elucidating Tactics of Water
Resource Management by Information
Technology
Arvind Jaiswal and S. S. Bhalla
409
A New Generation of Electronic Commerce
Harmanpreet Kaur
Track 1: Digital World (G - III)
416
Improving the Quality of Organization Through
ERP Systems: Indian Industry Survey
Mary Jacintha M, Khanhaiya Singh and P.N.Pandey
467
Significance of IT-enable BPR in Business
Enterprise and in Customer end
Parimalendu Bandyopadhyay and Joydeep Chowdhury
469
Current Market Scenarios of High demand BPR
implementation through BPM software
Parimalendu Bandyopadhyay and Joydeep Chowdhury
470
Significance of IT-Enable Human Resource
Management
Parimalendu Bandyopadhyay and Joydeep Chowdhury
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
8
Crawling the Web at Desktop Scales
Madhavi Pingili
12
IPv4 vs IPv6 - Next Generation Internet
Meenakshi Gupta
24
Personalized Web Search: User Modeling
Using Implicit Feedback From Click Through
Data
Geetanjali Surange
25
Solving Cellular Mobile Network’s Assignment
Problem Using Iterative Local Search Algorithm
K. Rajalakshmi
33
Consumer Privacy in 2nd Generation eCommerce
Sandeep Kautish
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
36
A Directed Threshold Signature Scheme with
Threshold Verification
Sunder Lal and Manoj Kumar
44
Advanced Mobility Models for Mobile Ad-hoc
Networks
Tanweer Alam
47
Shaping the Traffic to Improve QoS Parameter
During Data Privacy in Secure Multiparty
Computation
Tonu Sojatia and Zulfa Shaikh
49
Threats and Innovations of Information
Security in the 21st Century
Deepshikha Bhargava
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
52
Strategies for Wavelength Assignment in WDM
Optical Networks
Arvind Upadhyay and Kavita Thorat
53
Performance of Static Interconnection of
Computer Network Through UML
Vipin Saxena and Anuradha Sharma
60
Cloud Computing: Its Security & Privacy
aspects
Deepshikha Jamwal and Kumar Kush
62
Improving QoS in Video Multicasting
Deepshikha Jamwal and Kumar Kush
81
Performance Comparison and Improvement of
Routing Protocols - DSR
Nitin Tyagi
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
83
Quality of Service for Mobile Ad-hoc Networks
Shallu, Vandna and Kiran
86
A Simulation Study of Content Delivery
Network
N. Ramachandran and P. Sivaprakasam
88
Performance Analysis of Multi Media Ad-hoc
Networks
Kiran, Vandna and Shallu
107
Achieving Vertical Scalability: A Hindrance to
Cloud Computing
Rahul Sharma and Mohit Mathur
111
Wireless Power Transmission: Requirements &
Issues
Saurabh Saxena and Sanjib K. Sahu
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
113
Optimizing Semantic Web Search and Ranking
Algorithms
Vineet Kr. Sarawat and Sanjib K. Sahu
117
Application of Keystroke Dynamics in Mobile
Device Users Authentication
T. Santhanam and Shanthi Bhatt
120
On Demand Temporary Route Recovery for
Frequent Link Failures in Ad-hoc Networks
Kokula Krishna Hari. K
121
Implementation of Weighted Rule Mining
Algorithm for Wireless Sensor Networks
Kokula Krishna Hari. K
124
Global Positioning System
Shalini Goel
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
128
Search Engines - "Issues and Improvements"
Nitul Kaushik and Archana Saxena
129
e-Mail Services: "Features and Scope"
Rahul Gupta and C Komalavalli
130
A New Approach for Mobility Management in
the Wireless Network of a Mobile
Communication System
Vikram Bali, Rajkumar Singh Rathore and Amit
Sirohi
138
Smart Antenna: “Smartness Going the Way of
Technology”
Vinay Chopra
158
Dual Firewall Technology for VPN Network
Ashish Surywanshi and Akhilesh K Sharma
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
178
Next Generation Networks: Enhancing
Performance and Security for Providing Mobile
Multimedia Broadcasting
Peeyush Mathur, Bharat Singh, Raj Kumar Sain
and Chandra Shekhar
182
VAMS: An Effective Approach for Vehicle
Assisted Messaging Scheme in VANETs
Mohd. Umar Farooq and Mohammad Pasha
183
Security and Efficiency in Ad-hoc Mobile
Network
Shabbir Ahmed, Kavita Bhatnagar and Zubair
Ahmed Khan
184
Collaborative Knowledge with Cloud
Computing
Avijit Dutta
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
189
Mobile E-Commerce: Payment System Security
Md. Tabrez Nafis
190
Data Security From Malicious Attack: Computer
Viruses
Narendra Kumar Tyagi and Abhilasha Vyas
193
Wireless Automatic Gate Sensing Alarm and
Smoke Alarm Especially for Persons with
Hearing Problem
Abhishek Khemka and Viranjay M Srivastava
198
A Novel Approach for Security Policy
Integration and Conflict Reconciliation in a
Ubiquitous Environment
Beneyaz Ara Begum and Animesh Tripathy
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
204
Dark Side of Cyber Crime in India: A Case
Study
Namita Singh, Deepshikha Jamwal and G. S.
Sambyal
209
Semantic Search-The New Paradigm of
Information Retrieval on World Wide Web
Seema D
210
Empirical Study of Factors Affecting Success
of SNS (Social Networking Sites)
Renavikar Ashwini and Ligade Smita
220
Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks
Mohan H .S. and A. Raji Reddy
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
221
An Architecture Model of Mobile Ad-hoc
Network and its Performance in Disaster Area
Architecture
Shabbir Ahmad and Zubair Ahmed Khan
222
Effective Use of EDI and XML Message
Exchange for Small/Mid and Large
Organizations
Prashant K. Thete
228
Voice Enabled Mail Reader-VMAIL
K. V. N. Sunitha and N. Kalyani
232
Enhanced Security for Audio Signals Using
Steganography
G. R. Bamnote, S. L. Satarkar, S. S. Agrawal and
Sohel Bhura
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
237
The Network Security Assessment Instrument
to Reduce Software Security Risk
N. Prasanna Balaji, U. Sreenivasulu and G. Pramod
241
Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method
Madhavi Pingili and N. Prasanna Balaji
255
Recovery of Mobile Internet Transactions
D. Rama Rao
257
Potential Air Traffic Congestion Solution: Slot
Allocation by Auction Method
D. Rama Rao
261
Evaluation of Integration Algorithms for Meta Search Engine
Bhavsingh Maloth
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
275
Automated Remote Data Logger
Shruthi. K. R.
278
Secure Routing for Mobile in Ad-hoc Network
Rama Rao Tandu and J. Reena Mathigolda
281
Web Science – An Interdisciplinary Approach to
Understanding the Web
Shikha Nirmal
286
Adaptive QoS for Mobile Web Services Through
Cross-Layer Communication
P. Sowjanya
288
Intrusion Detection Approach to Secure Ad-hoc
Networks
Tanweer Alam, Parmod Kumar and Sanjeev Tayal
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
308
Security Problem in the Film Industry
Production and Distribution Process
Rajiv Mahajan, Teenum Gupta and Sandeep Kad
312
Performance Analysis and QoS Assessment of
Queues Over Multi - Hop Networks
Mohit Agrawal, Lalla Atul Singh Chaurasia, Navneet
Tiwari and Jatan Saraf
331
Detecting and Preventing IP Spoofed Attack by
RSA Asymmetric Crypto - System
Rajiv Ranjan and K. P. Yadav
345
Competent Ranking Algorithm for Web-Based
Search Engines
Himayatullah Sharief, Syed Mohiuddin and T.
Eshwar
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
347
AOEB: Energy Aware Routing Scheme for
Wireless Sensor Networks
Sansar Singh Chauhan and Gautam Dhameja
348
Ad-hoc Networking Protocols a Brief Treatise
Ajendra Isaacs, Navendu Nitin, Rajeev Paulus and
O. P. Chaudhary
353
Evaluating Web Crawler Algorithms
Jyotsna Nigam and Pooja Kherwa
355
New Approach and Additional Security to
Existing Cryptography Using Cubical
Combinatorics
P. Elayaraja and M. Sivakumar
356
Secured Remote Method Invocation Framework
P. Elayaraja and M. Sivakumar
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
368
Laptops Security Application Using RFID
Anurag Srivastava and Alok Kumar Dutt
372
An Effective Approach for Disaster Prevention
Using GSM
Gurvinder Singh, Ravleen Kaur, Katiyal, Anubha
Bansal and Pushpendar Singh
374
Evaluation of Network Congestion Controlling
Approaches
Gurvinder Singh, Sumant Katiyal and ShreyaDubey
375
Increasing the Efficiency of Echo Hiding Digital
Audio Steganography
Gurvinder Singh, Sudip. K. Dey, Shreya Dubey and
Sumant Katiyal
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
380
Network Management and Routing Strategies
with Mobile Agent
Praveena Chaturvedi and Nipur
383
Network Aware Routing Protocol for MANET
Ela Kumar and Ravinder Nath Rajotiya
385
GSM Security and Encryption
Atikant Shrivastava, Anjali Gupta and Ashish
Valuskar
389
A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network
A. K. Vatsa, Khushbu Garg, Pankaj Chauhan and
Rohit Srivastava
Track 2: Web Technologies, Computer Networks
& Information Security (G - III)
392
User Interactive Web Content Adaptation for
Mobile Devices
Prakash K. Mishra, Kapil Baliyan, Deepshikha and
S. P. Singh
401
A Practical Approach Towards Development of
Applications and Solutions Using Java Agents
Nilesh M. Shelke and Rajiv Dharaskar
412
Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc Networks
Sushant Kumar and Bibhudatta Sahoo
452
Comparative Analysis of Structures and Attacks
on Various Stream Ciphers
Mohammad Ubaidullah Bokhari and Faheem
Masoodi
Track 3: Software Engineering, Database And
Data Mining (G - III)
51
Recent Development in Databases and Future
Directions
Pradeep Aswal and Rohit Goyal
56
Prioritization of Test Cases for Regression
Testing
Kapila Kapoor and Geetika Kapoor
64
Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter
Approach
Asha Gowda Karegowda, M. A. Jayaram and A. S.
Manjunath
69
Data Mining and Knowledge Discovery
Ankita Jhawar, Ayushi Ameriya and Kanupriya Chaturvedi
Track 3: Software Engineering, Database And
Data Mining (G - III)
72
Use of Evolutionary Strategies in Software
Testing
Surjeet Singh and Rakesh Kumar
78
Data Mining with Support Vector Machine
Arti Patle and Deepak Singh Chouhan
82
Emerging Techniques for Online Analytical
Processing and its Visualization
Deepti Nayar and Vijay B. Aggarwal
89
Resource Based Grid Scheduling Algorithm
Manjot Bhatia
93
Query Optimization in Homogenous Distributed
Database Management System
Himanshu Sharma and C. Komalavalli
Track 3: Software Engineering, Database And
Data Mining (G - III)
105
Commit Protocols and Their Issues in
Distributed Databases
Vinay Sharma and Vijay B. Aggarwal
106
Query Optimization in Heterogeneous
Distributed Databases
Akanksha Gupta and Vijay B. Aggarwal
108
A Solution to Load Balancing Problem in Object
Oriented Clusters
Sumit Khanna and Deepti Sharma
122
Implementation of Multivariate Clustering
Methods for Software Development
Seetharam. K and Chandrakanth G Pujari
Track 3: Software Engineering, Database And
Data Mining (G - III)
131
Software Testing vs. Code Inspection: What else
for Verification & Validation?
Latika Kharb and Rajender Singh
133
Reusability in Component Based Development
Process Model in Software Development
Jyoti Mahajan, Devanand and V. Mansotra
161
Analysis of Software Threats and Software
Security
Deepshikha Jamwal and Bhawana Sharma
166
Recent Trends in Associative Rule Mining
Shalini Vermani and Ritika Wason
180
Model Testing: Is it Only A Special Case of
Software Testing
Manoj Kumar Pachariya
Track 3: Software Engineering, Database And
Data Mining (G - III)
194
Comparison of Different Normal Forms
Vinita Rohilla
196
Reliability and N-version Programming in
Software Fault Tolerance
K. C. Joshi
200
An Analysis of Rural Economic Geography
using Spatial Data Mining Techniques
V. R. Kanagavalli and K. Raja
203
Software Engineering Challenges: A Case
Study
P. L. Ramteke and Mohammad Atique
208
Efficient Implementation of the Minimum
Spanning Trees Based Clustering
Meena. A and Raja. K
Track 3: Software Engineering, Database And
Data Mining (G - III)
238
Software Testing Scenario
N. Prasanna Balaji, U. Sreenivasulu and G. Pramod
249
Hyperion Essbase Technology
K B K S Durga
252
Software Metrics Vis–a-Vis Software
Vulnerability
Deepshikha Jamwal and Bhawana Sharma
254
Software Reuse: A Systematic Review
Deepshikha Jamwal
256
A Unit-Test Framework for Database
Applications
M Srikanth Yadav
Track 3: Software Engineering, Database And
Data Mining (G - III)
260
Maximum Number of Keys in B –Tree of Height
K
Pawan Jindal, Amit Kumar and Shishir Kumar
268
Distributed Media Player
S. A. M. Rizvi, S Zeeshan Hussian and Vineet Sharma
279
A Comprehensive Approach Towards Data
Preprocessing Techniques & Association Rules
Jasdeep Singh Malik, Prachi Goyal and Akhilesh K
Sharma
304
A Software Tool to Access Evolutionary
Algorithms for Data
Bhavsingh Maloth
Track 3: Software Engineering, Database And
Data Mining (G - III)
306
Delete File System Watcher - Storage
Optimization Tool
Preeti Arora
316
Points-to Analysis of RMI-Based Java
Programs
Yogesh Pingal, Pallavi Satpule and Sandesh Patil
319
Security Concern Using Aspect Oriented
Programming (Aspect C)
Kavish Sehgal and Kashyap Rajpal
320
Distributed Query Optimization: Use of Mobile
Agents
Kodanda Kumar Melpadi
321
An Extended GCLP Algorithm for Hardware
Software Partitioning
Anurag Srivastava
Track 3: Software Engineering, Database And
Data Mining (G - III)
326
Data Mining and Business Intelligence
Technologies
Manmeet Singh Kapoor
352
Data Mining and Audience Intelligence for
Advertising
Manika Gupta
364
Evaluation System with Oracle 10g
Jaswinder Kaur
373
Real Time Operating Systems (RTOS)
Ashima Wadhwa
387
A Hybrid Black Box Technique for the Selection
of Optimum Number of Test Cases
Bratin Bhattacharya and Deepa Gangwani
Track 3: Software Engineering, Database And
Data Mining (G - III)
394
Data Mining in Healthcare Sector
K. R. Radha Krishnan
395
Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN)
Models
R. C. Tripathi, Manohar Lal, A. K. Malviya and Manish
Saraswat
418
An Analysis of Rural Economic Geography
Using Spatial Data Mining Techniques
V. R. Kanagavalli and K. Raja
Track 4: High Performance Computing (G - III)
4
Discrete Sequence Wavelet Transform NUC
Algorithm
Parul Goyal
22
Distributed-Grid Databases Server Design and
Implementation for Bio-Molecular Simulations
Santosh Kumar
23
Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer
R. W. Jasutkar and T. M. Pattewar
42
CMOS Implementation of Cell Signaling for Cell
Death
Shruti Jain and Pradeep K. Naik
Track 4: High Performance Computing (G - III)
55
An Intelligent Blackjack Game Using
Reinforcement Learning Algorithms
Arvind Singh Chandel and Aruna Tiwari
65
Inorganic Expert: Automation of Inorganic
Chemistry
Vinay Mathur, Parul Kharub and Yatin Malhotra
68
Managing Information Overload in Distributed
Computing Environment
Ajay Tiwari and Priyesh Kanungo
75
Lossy Image Compression Using Variable Run
Length Encoding
Soumya Maitra
Track 4: High Performance Computing (G - III)
99
Bio - Informatics
G. Gayatri
102
Traffic Generation Model for Delhi Urban Area
Using Artificial Neural Network
Shivendra Goel, J. B. Singh and Ashok Kumar
Sinha
135
A New Type of Covering Based Generalized
Rough Set
Debadutta Mohanty
137
Bioinformatics: "Leading the Way to New
Advancements"
Vinay Chopra
Track 4: High Performance Computing (G - III)
144
Reduction of Parasitic Capacitance for
Transmission with the Help of CPL
Harpreet Parashar, Rachit Patel and Viranjay
Mohan Srivastava
145
Parasitic Capacitances in Double Gate MOSFET
Priyank Kumar and Viranjay M. Srivastava
148
Circuit Design with Independent Double Gate
Transistors
Nitant and Viranjay M. Srivastava
163
Project Management Efficiency Using Fuzzy
Logic
Vinay Kumar Nassa
Track 4: High Performance Computing (G - III)
175
Reducing LOC and Cyclomatic Complexity
Garima Verma and M. P. Thapaliyal
177
Full Substractor Circuit Design with
Independent Double Gate MOSFET
Nitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay
M. Srivastava
185
Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic
Optimization Technique
Shweta, Akash Tayal and Ankita Lathey
202
Volume Based Medical Image Registration by
Maximization of Mutual Information
T. Senthil Kumar and R. Suganya
Track 4: High Performance Computing (G - III)
207
Multimodal Biometrics by Fusion of Finger Vein
and Finger Print Images
Arunkumar. V and Malathy. C
214
3D Atlas of Human Anatomy for Educational
Purposes
T. Senthil Kumar and Vijay Sabarish Pankajan
215
A Survey on 3D Face Reconstruction Methods
Based on Marching Cubes Algorithm
Rakesh P. B. and T. Senthil Kumar
219
Use of GA in Solution of TTP
Sikander and Kuldeep Kumar
Track 4: High Performance Computing (G - III)
226
A New Technique for Detection and Location of
Human Faces in Digital Image
Satyendra Nath Mandal, Aninda Banerjee, Kumarjit
Banerjee and Sourish Banerjee
227
Mr. Tacton (Embedded Red Tacton)
Saranya Sivasankaran and Srikkanth Govindaraajan
229
Fuzzy logic - A New Powerful Technology
Pooja Gautam
242
Protected Content Based Image Retrieval
N. Prasanna Balaji, J. Reena and Korra Bichya
243
Relevance Feedback for Distributed Content Based Image Retrieval
N. Prasanna Balaji and J. Reena and Korra Bichya
Track 4: High Performance Computing (G - III)
265
Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
P. K. Srimani, Manjula Sanjay and K. Krishna Veni
267
Digital Watermarking: Advanced Technique in
Image and Video Technology
S. A. M. Rizvi, Vineet Sharma and Anurag Singh
Chauhan
271
Bio - Informatics, Bonding Genes With IT
Ruchika Gupta
276
A Survey on Segmentation and Modeling of Full
Human Body Shape from 3-D Scan Data
A. K. Patil and A. J. Patil
Track 4: High Performance Computing (G - III)
302
Phase-Based Image Matching Used for an
Effective Approach for Iris Recognition
A. K. Patil and A. J. Patil
305
Primitive Image Transformations Used to
Perform a Fast Fourier Transform
A. K. Patil and A. J. Patil
313
WsVsSenNet: An Era of Enhanced Vision Based
Sensing Capability
Navneet Tiwari, Jatan Saraf and Siddarth Jain
314
Living BEAM Elegant Wizards - The Future of
Artificial Intelligence
Navneet Tiwari, Sagar Gupta and Puneet Tiwari
Track 4: High Performance Computing (G - III)
324
Texture Based Image Retrieval With an
Application to CBIR
D. N. Verma and Bharti
330
Computing with DNA
Shankar B. Kshetry and J. P. Singh
338
A New Approaches for Fingerprint Recognition
Based on Fourier Transformed Selected Image
(FTSI) Algorithms
Praveen Kumar Singh Rathor, Ravi Kumar Ravi and
Pankaj Kumar Sharma
362
Application of Genetic Algorithm in Oil Drilling
Problem
Tanya Jhamb, Anusha Bhatnagar and Nidhi Kohli
Track 4: High Performance Computing (G - III)
366
A New Approach of Extraction Transformation
Loading Using Pipelining
Rajender Singh Chhillar and Barjesh Kochar
379
Bengali-English Relevant Cross Lingual
Information Access Using Finite Automata
Avishek Banerjee and Swapan Bhattacharyya
388
K-Means Clustering Using WEKA Interface
Sapna Jain, M. Afshar Aalam and M. N. Doja
391
Role of EEG Lab for Analyzing
Electroencephalogram Signal
Ashish B. Sasankar N. G. Bawane and S. T. Bodkhe
Track 4: High Performance Computing (G - III)
393
Development of Motherboard Ontology Using
Protégé V3.4 Rc2 (Build 529)
Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik
397
NAVIGUER
R. Bakyalakshmi Nisha and S. Madhumitha
398
Content Based Face Retrieval
Zafar G. Sheikh and V. M. Thakare
Authors
A. B. Patki
216 Role and Scope of Support Vector Machine in
Bioinformatics
A. B. Patki
217 Fuzzy Logic System for Querying a Database
A. B. Patki
218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
A. B. Patki
273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
A. B. Patki
361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow
Tool) in BPO Multiplexing
A. J. Patil
276
A Survey on Segmentation and Modeling of
Full Human Body Shape from 3-D Scan Data
A.J. Patil
302
Phase-Based Image Matching Used for an
Effective Approach for Iris Recognition
A. J. Patil
305
Primitive Image Transformations Used to
Perform a Fast Fourier Transform
Authors
A. K. Daniel
303 Position Based Multicast Routing Protocol
for Ad-hoc Wireless Networks
A. K. Dwivedi
336 Evaluating Impact of Operating System
Architectures on Simulation Results of
Routing Mechanisms for Wireless Sensor
Networks
395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN)
Models
399 Encryption Through Cascaded Recursive
Addition of Blocks and Key Rotation of a
Session Key (CRABKR)
253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory Demands
276 A Survey on Segmentation and Modeling of
Full Human Body Shape from 3-D Scan Data
302 Phase-Based Image Matching Used for an
Effective Approach for Iris Recognition
A. K. Malviya
A. K. Nayak
A. K. Patil
A. K. Patil
A. K. Patil
Authors
A. K. Patil
A. K. Paul
A. K. Sharma
A. K. Solanki
A. K. Vatsa
A. Raji Reddy
A. S. Manjunath
305 Primitive Image Transformations Used to
Perform a Fast Fourier Transform
357 Knowledge Management in a Research
Organization
419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New
Perception for Operating System
337 Effectiveness of New Technologies for
Teaching and Learning: Web 2.0 and eLearning
389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network
220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks
64 Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter
Approach
Authors
Abhijeet Gorey
282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology
Abhijeet Gorey
301 Energy Harvesting via Piezoelectricity
Abhilasha Sharma 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System
Abhilasha Vyas
190 Data Security From Malicious Attack:
Computer Viruses
Abhipal Singh
172 File Transfer Using Secure Sockets in Linux
Environment
Abhishek Khemka 193 Wireless Automatic Gate Sensing Alarm and
Smoke Alarm Especially for Persons with
Hearing Problem
Abhishek Tandon 453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Abid Yunus Salati
46 Managing Knowledge Workers During
Turbulent Times
Adil Siddiqui
142 Electronic Judicial System
Authors
Ajay D. Parikh
Ajay Tiwari
Ajendra Isaacs
Ajendra Isaacs
Ajit More
Akanksha Gupta
Akash Tayal
Akash Tayal
43 Software Design Pattern for e-Governance
Solution Framework
68 Managing Information Overload in Distributed
Computing Environment
348 Ad-hoc Networking Protocols a Brief Treatise
349 Data Mining for Digital Libraries – A New
Paradigm
424 Applying Rough-Sets to Assist the Decision
Making for ERP Implementation
106 Query Optimization in Heterogeneous
Distributed Databases
67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic
Speaker Recognition
185 Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic
Optimization Technique
Authors
Akash Tayal
230 Nonlinear Circuit Modelling Using Volterra
Series
Akhil Jindal
201 A Novel Software Architecture for Network
Security Testing
Akhilesh K Sharma 158 Dual Firewall Technology for VPN Network
Akshay Anand
361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow
Tool) in BPO Multiplexing
Alok Kumar Dutt
Amandeep Makkar
368 Laptops Security Application Using RFID
73 Performance Evaluation of Protocols for
Secure Routing Over MANET
Amit Kour
335 A Study of Concurrency and Recovery
Techniques in Databases
Amit Kumar
244 Analysis of Time Complexity in Binary Search
Tree
Amit Kumar
251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree
Authors
Amit Kumar
260 Maximum Number of Keys in B –Tree of
Height K
Amit Madan
284 Multi-Module Security: Bio-Secure
Steganographic System
Amit Sirohi
130 A New Approach for Mobility Management in
the Wireless Network of a Mobile
Communication System
Amrit Kaur
415 Technology: Third Medium of Instruction
Amrutha. V
115 Improving the Effectiveness of Inspection
Through Verification and Validation
Anand K Pandey
87 A Review of Software Process Models and
Methodologies
Anand Paropkari
274 HCI Challenges in Using Mobile Devices: A
Study of Issues Faced by Senior Citizens
While Using Mobile Phones
Anil Kumar
147 Open Source Software Quality – An Issue of
Concern
Authors
Anil T. Gaikwad
97 Core Banking and Its Implementation
Anil Ticku
146 Telemedicine in India - A Model for Jammu &
Kashmir State
Animesh Tripathy
198 A Novel Approach for Security Policy
Integration and Conflict Reconciliation in a
Ubiquitous Environment
Aninda Banerjee
226 A New Technique for Detection and Location
of Human Faces in Digital Image
Anisur Rehman
315 Current-Mode Oscillator Using Single DVCC
Nasir
Anjali Gupta
318 Low Power Design Strategies for SoCs
Anjali Gupta
385 GSM Security and Encryption
Ankita Jhawar
Ankita Lathey
69 Data Mining and Knowledge Discovery
185 Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic
Optimization Technique
Authors
Anshu Chowdhary 218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
Anshul Agrawal
351 Secure and User Interactive Information
Extraction in Linux Distributions
Anu. G. Aggarwal
453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Anubha Bansal
372 An Effective Approach for Disaster Prevention
Using GSM
Anup Singh
Kushwaha
328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network
Anuradha Sharma
Anuradha Taluja
53 Performance of Static Interconnection of
Computer Network Through UML
162 Information and Communication Technology
(ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An Overview
Authors
Anurag Jain
329 Tones and Break Indices for Speech
Processing - A Review
Anurag Jain
406 PRAAT Implementation for Prosody
Conversion
Anurag Jain
407 Emotion Conversion in Hindi Language
Anurag Singh
267 Digital Watermarking: Advanced Technique in
Chauhan
Image and Video Technology
Anurag Srivastava 368 Laptops Security Application Using RFID
Anurag Srivastava 321 An Extended GCLP Algorithm for Hardware
Software Partitioning
Anusha Bhatnagar 362 Application of Genetic Algorithm in Oil
Drilling Problem
Apoorva Shukla
311 Comparative Study of Ontology Merging
Algorithms
Archana Agarwal 329 Tones and Break Indices for Speech
Processing - A Review
Authors
Archana B Saxena
Archana Saxena
29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals
at Customer Door-Step
128 Search Engines - "Issues and Improvements“
Archana Sharma
157 E-Commerce : Improving Performance of
Customer Knowledge Management
Ardhendu Mandal
223 SRS BUILDER 1.0: An Upper Type CASE Tool
for Requirements Specification
Arnab Samanta
378 Increasing Network Security Using Laws of
Networking and Quantum Mechanics
Arti Agarwal
339 Virtual Instrumentation for Biomedical
Applications
Arti Patle
78 Data Mining with Support Vector Machine
Aruna Tiwari
55 An Intelligent Blackjack Game Using
Reinforcement Learning Algorithms
Arunkumar. V
207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print Images
Authors
Arvind Jaiswal
408 Quandary Elucidating Tactics of Water
Resource Management by Information
Technology
Arvind Singh
Chandel
Arvind Upadhyay
55 An Intelligent Blackjack Game Using
Reinforcement Learning Algorithms
52 Strategies for Wavelength Assignment in
WDM Optical Networks
269 In-door Image Motion Detection with Objects
Identification and Position Shift-Velocity
Computation
270 A Machine Vision System for Motion Analysis
and DFT-Velocity Computation in Out-door
Video Frames
64 Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter
Approach
373 Real Time Operating Systems (RTOS)
Asaad A. M.
Al-Salih
Asaad A. M.
Al-Salih
Asha Gowda
Karegowda
Ashima Wadhwa
Authors
Ashish B. Sasankar 391 Role of EEG Lab for Analyzing
Electroencephalogram Signal
Ashish Gupta
301 Energy Harvesting via Piezoelectricity
Ashish Surywanshi 158 Dual Firewall Technology for VPN Network
Ashish Valuskar
Ashok Kumar
Sharma
Ashok Kumar
Sinha
385 GSM Security and Encryption
40 Information and Management Science in
Developing Inventory Policies for ServiceSensitive Items
102 Traffic Generation Model for Delhi Urban Area
Using Artificial Neural Network
Ashwini Kale
98 Design and Establishment of Information
System in Rural Areas for Sustainable
Agriculture
Ashwini Kumar
57 Web Supported Expert System for Learning
Asma Shibli
327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP)
Implementation Strategy
Authors
Atikant Shrivastava 318 Low Power Design Strategies for SoCs
Atikant Shrivastava 385 GSM Security and Encryption
Avanish Kumar
17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System
Avijit Dutta
184 Collaborative Knowledge with Cloud
Computing
Avishek Banerjee
379 Bengali-English Relevant Cross Lingual
Information Access Using Finite Automata
Avneesh Chauhan 450 Software Reliability Growth Modeling for
Distributed Environment Using ComponentSpecific Testing-Effort Functions
Ayushi Ameriya
69 Data Mining and Knowledge Discovery
B Bandyopadhyay
20 Providing Security of Fingerprint Images
Through Digital Watermarking
B N Chatterjii
20 Providing Security of Fingerprint Images
Through Digital Watermarking
Authors
B. R. Chandavarkar 381 Modifications in the Working Model and
Handoff Mechanism of MIPv6
B. V. Ramana
Murthy
94 A Methodology for Successful Project
Management in Medium Scale Enterprises
B. V. Ramana
Murthy
95 Applying Agile & Web Engineering Technique
for Successful Web Management
B. V. Ramana
96 Designing a Web Education Model for
Murthy
Effective Teaching - Learning Process
Barjesh Kochar
366 A New Approach of Extraction Transformation
Loading Using Pipelining
Beneyaz Ara
Begum
198 A Novel Approach for Security Policy
Integration and Conflict Reconciliation in a
Ubiquitous Environment
359 Study of Internet Usage in Veterinary and
Agricultural Sciences
Bharat B. Bhagat
Authors
Bharat Singh
178 Next Generation Networks: Enhancing
Performance and Security for Providing
Mobile Multimedia Broadcasting
Bharati Yelikar
277 A Literature Review of Methods Used in
Software Industries for Successful Software
Project management
Bharti
324 Texture Based Image Retrieval With an
Application to CBIR
Bhavna Bajpai
18 Knowledge Management: Information &
Knowledge Sharing Through Intranet
Bhavsingh Maloth
261 Evaluation of Integration Algorithms for Meta Search Engine
Bhavsingh Maloth
304 A Software Tool to Access Evolutionary
Algorithms for Data
Bhawana Sharma
161 Analysis of Software Threats and Software
Security
Authors
Bhawana Sharma
252 Software Metrics Vis–a-Vis Software
Vulnerability
Bhupendra Singh 186 Online Voting System
Bibhudatta Sahoo 412 Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc Networks
Bratin Bhattacharya 387 A Hybrid Black Box Technique for the
Selection of Optimum Number of Test Cases
C. Komalavalli
93 Query Optimization in Homogenous
Distributed Database Management System
C. Naga Raju
231 A Novel Edge Detection Technique for Color
Images
C. S. Rai
328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network
Chandan Kalra
386 Emerging Trends of IT in Healthcare Sector
Chandra Shekhar 178 Next Generation Networks: Enhancing
Performance and Security for Providing
Mobile Multimedia Broadcasting
Authors
Chandrakanth
G Pujari
122 Implementation of Multivariate Clustering
Methods for Software Development
Chandrakanth
H. Gowda
D. A. Vidhate
325 Advanced Demodulation Scheme for the
CDMA System
253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory Demands
324 Texture Based Image Retrieval With an
Application to CBIR
255 Recovery of Mobile Internet Transactions
257 Potential Air Traffic Congestion Solution: Slot
Allocation by Auction Method
253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory Demands
231 A Novel Edge Detection Technique for Color
Images
147 Open Source Software Quality – An Issue of
Concern
136 Aspect Oriented Programming Java RMI
Server
D. N. Verma
D. Rama Rao
D. Rama Rao
D. V. Guleria
D. V. M. Krishna
Dalip Bhat
Dalwinder Singh
Salaria
Authors
Debadutta Mohanty 135 A New Type of Covering Based Generalized
Rough Set
Deepa Gangwani 387 A Hybrid Black Box Technique for the
Selection of Optimum Number of Test Cases
Deepak Singh
Chouhan
Deepali Shahane
Deepshikha
Deepshikha
Bhargava
Deepshikha
Jamwal
Deepshikha
Jamwal
Deepshikha
Jamwal
78 Data Mining with Support Vector Machine
340 Advantages of ERP System in SMEs
392 User Interactive Web Content Adaptation for
Mobile Devices
49 Threats and Innovations of Information
Security in the 21st Century
60 Cloud Computing: Its Security & Privacy
aspects
62 Improving QoS in Video Multicasting
161 Analysis Of Software Threats and Software
Security
Authors
Deepshikha
Jamwal
Deepshikha
Jamwal
Deepshikha
Jamwal
Deepshikha
Jamwal
Deepti Nayar
Deepti Sharma
Deepti Sharma
Devanand
62 Dark Side of Cyber Crime in India: A Case
Study
252 Software Metrics Vis–a-Vis Software
Vulnerability
254 Software Reuse: A Systematic Review
272 Status of Use of IT Tools in SMEs in Jammu
and Kashmir
82 Emerging Techniques for Online Analytical
Processing and its Visualization
29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals
at Customer Door-Step
108 A Solution to Load Balancing Problem in
Object Oriented Clusters
133 Reusability in Component Based
Development Process Model in Software
Development
Authors
Devanand
139 Role of ICT in Narrowing the Digital Divide in
India
Dhawal Shrivastava 301 Energy Harvesting via Piezoelectricity
Dheeraj Mehrotra
50 Towards 21st Century Classrooms: The
Quality Requisite!
Dhiraj S. Rajani
116 Robust Steganography Using Secure
Password Protected Scheme
Divya Goel
234 Need for CCL in Grid Computing
Divya Leekha
176 Corporate Strategies Adopted by IT Industry
to Beat the Global Crisis
Divya Setia
406 PRAAT Implementation for Prosody
Conversion
Divya Setia
407 Emotion Conversion in Hindi Language
Divya. T. V.
247 Context Aware Multicasting Scheme for Delay
Tolerant Mobile Networks
Ela Kumar
383 Network Aware Routing Protocol for MANET
Authors
Esha Saxena
Faheem Masoodi
G. Gayatri
G. N. Purohit
G. Pramod
G. Pramod
G. R. Bamnote
G. Ram Mohana
Reddy
G. S. Sambyal
167 Analyzing Steganographic Algorithm in Java
by Function Point Technique
452 Comparative Analysis of Structures and
Attacks on Various Stream Ciphers
99 Bio - Informatics
26 IPv6 Transition - An Engineering Exercise or a
Necessity?
237 The Network Security Assessment Instrument
to Reduce Software Security Risk
238 Software Testing Scenario
232 Enhanced Security for Audio Signals Using
Steganography
381 Modifications in the Working Model and
Handoff Mechanism of MIPv6
204 Dark Side of Cyber Crime in India: A Case
Study
Authors
G. Vakula Rani
365 A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic
Algorithms
Garima Verma
175 Reducing LOC and Cyclomatic Complexity
Gautam
359 Study of Internet Usage in Veterinary and
Agricultural Sciences
Gautam Dhameja 347 AOEB: Energy Aware Routing Scheme for
Wireless Sensor Networks
Geetanjali
422 Application of Mobile Banking Services in the
Bank Area
Geetanjali Surange 24 Personalized Web Search: User Modeling
Using Implicit Feedback From Click Through
Data
Geetika Kapoor
56 Prioritization of Test Cases for Regression
Testing
Gopal Kamal
66 e-Commerce, Taxation in the Age of Birds
Without Shadows
Authors
Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New
Perception for Operating System
Gurjeet Kaur
459 Genetic Algorithm Based Optimal Testing
Effort Allocation Problem for Modular
Software
Gurneet Singh
Sethi
172 File Transfer Using Secure Sockets in Linux
Environment
Gurvinder Singh
371 Critical Evaluation of Applications of Expert
Systems
Gurvinder Singh
372 An Effective Approach for Disaster
Prevention Using GSM
Gurvinder Singh
374 Evaluation of Network Congestion
Controlling Approaches
Gurvinder Singh
375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
Authors
Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New
Perception for Operating System
H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach
for Query Processing
H. Umadevi
325 Advanced Demodulation Scheme for the
CDMA System
Harish Kumar
162 Information and Communication Technology
Taluja
(ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An Overview
Harmanpreet Kaur 409 A New Generation of Electronic Commerce
Harneet Kaur
230 Nonlinear Circuit Modelling Using Volterra
Series
Harpreet Parashar 144 Reduction of Parasitic Capacitance for
Transmission with the Help of CPL
Harshita Sharma
67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic
Speaker Recognition
Authors
Harsimerjeet
Khurana
Himali Natekar
Himanshu Sharma
34 Public Entrepreneurship: A Dynamic Strength
for Budding Green Technology
176 Corporate Strategies Adopted by IT Industry
to Beat the Global Crisis
93 Query Optimization in Homogenous
Distributed Database Management System
Himanshu Sharma 285 Effectiveness of DSDV Protocol Under Hidden
Node Environment
Himayatullah
Sharief
344 An Efficient Knowledge Base Mutual Linker
Framework
Himayatullah
Sharief
345 Competent Ranking Algorithm for Web-Based
Search Engines
Inderjit Singh
Dhanoa
136 Aspect Oriented Programming Java RMI
Server
Iqbal Azam
192 Education Technology Based Models of
Teaching and Learning
Authors
J. B. Singh
J. P. Singh
J. Reena
J. Reena
J. Reena
Mathigolda
Jagadeesh. G
Jasdeep Singh
Malik
Jasleen Kaur
Jaspal Singh
Bhatia
102 Traffic Generation Model for Delhi Urban Area
Using Artificial Neural Network
330 Computing with DNA
242 Protected Content Based Image Retrieval
243 Relevance Feedback for Distributed Content Based Image Retrieval
278 Secure Routing for Mobile in Ad-hoc Network
115 Improving the Effectiveness of Inspection
Through Verification and Validation
279 A Comprehensive Approach Towards Data
Preprocessing Techniques & Association
Rules
172 File Transfer Using Secure Sockets in Linux
Environment
235 On NTRU Cryptosystems and Timing Attacks
Authors
Jaswinder Kaur
Jatan Saraf
Jatan Saraf
Jawed Ahmed
Jaya Sil
Jayanthi R
Jewan Singh
Jewan Singh
364 Evaluation System with Oracle 10g
312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks
313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability
341 The Noise-Robustness of Mel-Frequency
Cepstral Coefficients (MFCC) for Speech
Recognition
410 Dimension Reduction Using Rough Set
Theory for Intrusion Detection System
115 Improving the Effectiveness of Inspection
Through Verification and Validation
188 Information and Communication Technologies
for strengthening Panchayati Raj in India “A
Model for J&K State”
199 Information and Communication Technologies
(ICT’s) for Sustainable Development in
Agriculture “A Model for J&K State”
Authors
Joydeep
Chowdhury
Joydeep
Chowdhury
Jyoti Kharade
Jyoti Mahajan
Jyotirmay Patel
Jyotish Kumar
Jyotsna Nigam
K B K S Durga
467 Significance of IT-enable BPR in Business
Enterprise and in Customer end
469 Current Market Scenarios of High demand
BPR implementation through BPM software
35 Citizen Centric e-Governance: Problems and
Prospects
133 Reusability in Component Based
Development Process Model in Software
Development
337 Effectiveness of New Technologies for
Teaching and Learning: Web 2.0 and eLearning
456 Unified Framework For Developing Testing
Effort Dependent Software Reliability Growth
Models with Change point and Imperfect
Debugging
353 Evaluating Web Crawler Algorithms
249 Hyperion Essbase Technology
Authors
K. C. Joshi
K. Krishna Veni
K. M. Mital
K. P. Tripathi
K. P. Tripathi
K. P. Yadav
196 Reliability and N-version Programming in
Software Fault Tolerance
265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
205 ICT and Emergency Medical Services
46 Managing Knowledge Workers During
Turbulent Times
179 A Conceptual Framework of Ethics in
Information Technology
331 Detecting and Preventing IP Spoofed Attack
by RSA Asymmetric Crypto – System
K. R. Radha
Krishnan
394 Data Mining in Healthcare Sector
K. R. Radha
Krishnan
K. Raja
396 Neuro-informatics in India - Problems and
Trends
200 An Analysis of Rural Economic Geography
using Spatial Data Mining Techniques
Authors
K. Raja
K. Rajalakshmi
K. Rajashekhar
418 An Analysis of Rural Economic Geography
Using Spatial Data Mining Techniques
25 Solving Cellular Mobile Network’s Assignment
Problem Using Iterative Local Search
Algorithm
248 ICT Enabled Workflow and Progress
Monitoring System for National Horticulture
Mission
K. S. Gurumurthy 325 Advanced Demodulation Scheme for the
CDMA System
K. V. Madhu
Murthy
54 Trust Aware Load Distribution in a Data Grid
Environment
K. V. N. Sunitha
224 A MAIL Reader in Telugu
K. V. N. Sunitha
228 Voice Enabled Mail Reader-VMAIL
K.Srinivasa Babu
94 A Methodology for Successful Project
Management in Medium Scale Enterprises
Authors
Kalpana Yadav
Kanchan Lata
Bhardwaj
Kanu Priya
Aggarwal
Kanupriya
Chaturvedi
Kapil Baliyan
Kapila Kapoor
Kashyap Rajpal
Kavish Sehgal
450 Software Reliability Growth Modeling for
Distributed Environment Using ComponentSpecific Testing-Effort Functions
403 Information Technology for Education, Health
and Development
273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
69 Data Mining and Knowledge Discovery
392 User Interactive Web Content Adaptation for
Mobile Devices
56 Prioritization of Test Cases for Regression
Testing
319 Security Concern Using Aspect Oriented
Programming (Aspect C)
319 Security Concern Using Aspect Oriented
Programming (Aspect C)
Authors
Kavita Bhatnagar
Kavita Thorat
Kavleen Kaur
Oberoi
Khanhaiya Singh
Khushbu Garg
Kiran
Kiran
Kodanda Kumar
Melpadi
Kokula Krishna
Hari. K
183 Security and Efficiency in Ad-hoc Mobile
Network
52 Strategies for Wavelength Assignment in
WDM Optical Networks
172 File Transfer Using Secure Sockets in Linux
Environment
416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey
389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network
83 Quality of Service for Mobile Ad-hoc Networks
88 Performance Analysis of Multi Media Ad-hoc
Networks
320 Distributed Query Optimization: Use of Mobile
Agents
120 On Demand Temporary Route Recovery for
Frequent Link Failures in Ad-hoc Networks
Authors
Kokula Krishna
Hari. K
121 Implementation of Weighted Rule Mining
Algorithm for Wireless Sensor Networks
Korra Bichya
242 Protected Content Based Image Retrieval
Korra Bichya
243 Relevance Feedback for Distributed Content Based Image Retrieval
Kranthi Kumar
Amirineni
239 Validation of Clustering Algorithms for Mobile
Ad-hoc Networks Using Colored Petri Nets
Kshama
Paithankar
333 Identifying Parameters with Data Collection
Methods for Software Development in View of
Usability
Kuldeep Bhardwaj 236 On NTRU Implementation: An Algorithmic
Approach
Kuldeep Kumar
219 Use of GA in Solution of TTP
Kumar Kush
60 Cloud Computing: Its Security & Privacy
aspects
Kumar Kush
62 Improving QoS in Video Multicasting
Authors
Kumarjit Banerjee
Lakshmi Kalyani
Lalit Saraswat
Lalla Atul Singh
Chaurasia
Latika Kharb
Ligade Smita
M Srikanth Yadav
M. A. Jayaram
226 A New Technique for Detection and Location
of Human Faces in Digital Image
377 Assessing Adoption of m-CRM in Education
Centers
103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an
Enterprise Network
312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks
131 Software Testing vs. Code Inspection: What
else for Verification & Validation?
210 Empirical Study of Factors Affecting Success
of SNS (Social Networking Sites)
256 A Unit-Test Framework for Database
Applications
64 Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter
Approach
Authors
M. Abul Hasan
M. Abdul Hasan
M. Afshar Alam
M. Afshar Alam
M. Bala Krishna
M. Kamil
M. N. Doja
M. N. Doja
M. P. Thapaliyal
M. Sivakumar
192 Education Technology Based Models of
Teaching and Learning
263 e-Waste Management and Hazardous Effects
on Environment
388 K-Means Clustering Using WEKA Interface
423 A Dynamic Load Balancing Algorithm for Web
Applications
421 Mobility Management Techniques and QoS in
Mobile WiMax
37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design
388 K-Means Clustering Using WEKA Interface
421 Mobility Management Techniques and QoS in
Mobile WiMax
175 Reducing LOC and Cyclomatic Complexity
355 New Approach and Additional Security to
Existing Cryptography Using Cubical
Combinatorics
Authors
M. Sivakumar
356 Secured Remote Method Invocation
Framework
M. Suhaib Abbasi 192 Education Technology Based Models of
Teaching and Learning
M. Suhaib Abbasi 263 e-Waste Management and Hazardous Effects
on Environment
M. V. Lakshmaiah 413 Overview of the Grid Technology and eGovernance for e-Health Implementation in
Africa
Madaswamy Moni 160 FISHNET: An Emerging e-Governance
Programme to empower Fishing Communities
and Facilitate Fisheries Business
Madhavi Pingili
8 Crawling the Web at Desktop Scales
Madhavi Pingili
241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method
Madhavi Pingili
287 Enterprise Collaboration Tool
Madhavi Sinha
384 Role of Natural Language Processing in
Community Structure Detection
Authors
Madhusudhana
Rao D
266 An Efficient Solution for Evaluation Problem
of HMM
Mahamaya
Mohanty
169 A Revitalized Dynamic Slicing Method for
Program Testing and Debugging
Mahamaya
Mohanty
Mahesh Grover
197 Testing Graphical User Interface Using
Decision Based Sequence Diagrams
384 Role of Natural Language Processing in
Community Structure Detection
207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print Images
332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study
of Health Care Unit
77 Network Monitoring: Topology, Methods and
Issues
230 Nonlinear Circuit Modelling Using Volterra
Series
Malathy. C
Malini M. Patil
Mamta Sachdeva
Manika Babbar
Authors
Manika Gupta
352 Data Mining and Audience Intelligence for
Advertising
Maninder Singh
Suri
Maninder Singh
Suri
406 PRAAT Implementation for Prosody
Conversion
407 Emotion Conversion in Hindi Language
Manish Saraswat
395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN)
Models
98 Design and Establishment of Information
System in Rural Areas for Sustainable
Agriculture
89 Resource Based Grid Scheduling Algorithm
357 Knowledge Management in a Research
Organization
265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
Manisha Kumari
Manjot Bhatia
Manju Shree
Manjula Sanjay
Authors
Manmeet Singh
Kapoor
326 Data Mining and Business Intelligence
Technologies
Manohar Lal
395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN)
Models
Manoj Kumar
36 A Directed Threshold Signature Scheme with
Threshold Verification
Manoj Kumar
Pachariya
180 Model Testing: Is it Only A Special Case of
Software Testing
Mary Jacintha M
416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey
Mashaallah
Basirzadeh
454 Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source
Software by Considering Change- Point
Mayank
Kulshrestha
80 Stock Market Expert
Authors
Mayank Kumar
Md. Arif
Md. Tabrez Nafis
Meena. A
Meenakshi Bhat
Meenakshi Gupta
361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow
Tool) in BPO Multiplexing
248 ICT Enabled Workflow and Progress
Monitoring System for National Horticulture
Mission
189 Mobile E-Commerce: Payment System
Security
208 Efficient Implementation of the Minimum
Spanning Trees Based Clustering
76 In-silico Comprehensive Sequence and
Structure Analysis of Proteases Family
12 IPv4 vs IPv6 - Next Generation Internet
Meenakshi
Sharma
142 Electronic Judicial System
Meraj Ahmed
Khan
327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP)
Implementation Strategy
Authors
Mohamed Meftah
Alrayes
423 A Dynamic Load Balancing Algorithm for Web
Applications
Mohammad Atique 203 Software Engineering Challenges: A Case
Study
Mohammad Pasha 182 VAMS: An Effective Approach for Vehicle
Assisted Messaging Scheme in VANETs
Mohammad Pasha 400 A Study of Wi-Fi Enabled Vehicular Networks
Using QualNet Simulator
Mohammad
452 Comparative Analysis of Structures and
Ubaidullah Bokhari
Attacks on Various Stream Ciphers
Mohammed
Sharfuddin
94 A Methodology for Successful Project
Management in Medium Scale Enterprises
Mohammed
Sharfuddin
95 Applying Agile & Web Engineering Technique
for Successful Web Management
Mohammed
Sharfuddin
96 Designing a Web Education Model for
Effective Teaching - Learning Process
Authors
Mohan H .S.
Mohd Abdul Ahad
Mohd. Rihan
Mohd. Rihan
Mohd. Sadiq
Mohd. Umar
Farooq
Mohd. Umar
Farooq
Mohit Agrawal
Mohit Mathur
220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc Networks
167 Analyzing Steganographic Algorithm in Java
by Function Point Technique
334 Intelligent Control for Power System
Applications
339 Virtual Instrumentation for Biomedical
Applications
37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design
182 VAMS: An Effective Approach for Vehicle
Assisted Messaging Scheme in VANETs
400 A Study of Wi-Fi Enabled Vehicular Networks
Using QualNet Simulator
312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks
107 Achieving Vertical Scalability: A Hindrance to
Cloud Computing
Authors
Mohit Rai
Mudita Shrivastava
317 Bringing Wireless Access to the Education: A
Comparison of Wi-Fi, WiMAX, MBWA and 3G
98 Design and Establishment of Information
System in Rural Areas for Sustainable
Agriculture
Muneeza Afaq
334 Intelligent Control for Power System
Applications
Muqeem Ahmed
343 Semantic Grid E Learning Platform for
Educational System
N. Kalyani
224 A MAIL Reader in Telugu
N. Kalyani
228 Voice Enabled Mail Reader-VMAIL
N. Prasanna Balaji 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction Method
N. Prasanna Balaji 237 The Network Security Assessment
Instrument to Reduce Software Security Risk
N. Prasanna Balaji 238 Software Testing Scenario
Authors
N. Prasanna Balaji 242 Protected Content Based Image Retrieval
N. Prasanna Balaji 243 Relevance Feedback for Distributed Content Based Image Retrieval
N. Prasanna Balaji 287 Enterprise Collaboration Tool
N. Ramachandran
86 A Simulation Study of Content Delivery
Network
Nadia Imdadi
91 Semantic Kernel for Automatic Integration of
Semantic Repositories
Namita Singh
204 Dark Side of Cyber Crime in India: A Case
Study
Nand Kumar
224 Improving Academic Performance of
Students by Using Online Real Time
Attendance Monitoring: A Case Study At Al
Fateh University
Nandita Sengupta 410 Dimension Reduction Using Rough Set
Theory for Intrusion Detection System
Narendra Gupta
349 Data Mining for Digital Libraries – A New
Paradigm
Authors
Narendra Kumar
Tyagi
Nasreddin B. El
Zoghbi
Nasreddin B. El
Zoghbi
Navendu Nitin
Navendu Nitin
Navneet Sharma
Navneet Tiwari
Navneet Tiwari
190 Data Security From Malicious Attack:
Computer Viruses
411 Improving Academic Performance of
Students by Using Online Real Time
Attendance Monitoring: A Case Study At Al
Fateh University
413 Overview of the Grid Technology and eGovernance for e-Health Implementation in
Africa
348 Ad-hoc Networking Protocols a Brief Treatise
349 Data Mining for Digital Libraries – A New
Paradigm
403 Information Technology for Education,
Health and Development
312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop Networks
313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability
Authors
Navneet Tiwari
Neelima Relan
Neeraj Gupta
Neeta Wadhwa
Nidhi Kohli
Nikhil Jindal
Nilesh M. Shelke
Nilesh Mahajan
Nipur
314 Living BEAM Elegant Wizards - The Future of
Artificial Intelligence
235 On NTRU Cryptosystems and Timing Attacks
77 Network Monitoring: Topology, Methods and
Issues
309 Cryptography and Mathematics
362 Application of Genetic Algorithm in Oil
Drilling Problem
201 A Novel Software Architecture for Network
Security Testing
401 A Practical Approach Towards Development
of Applications and Solutions Using Java
Agents
277 A Literature Review of Methods Used in
Software Industries for Successful Software
Project management
132 Routing in Ad-hoc Networks
Authors
Nipur
Niraj Saxena
380 Network Management and Routing Strategies
with Mobile Agent
80 Stock Market Expert
Nitant
148 Circuit Design with Independent Double Gate
Transistors
Nitasha Bisht
177 Full Substractor Circuit Design with
Independent Double Gate MOSFET
Nitesh Kumar
393 Development of Motherboard Ontology Using
Protégé V3.4 Rc2 (Build 529)
Niti Verma
273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
Nitin Tyagi
81 Performance Comparison and Improvement of
Routing Protocols - DSR
Nitul Kaushik
128 Search Engines - "Issues and Improvements"
Nnj Hemrom
357
Knowledge Management in a Research
Organization
Authors
Nune Sreenivas
413
Nupur Prakesh
328
Nutan Jaiswal
177
O. P. Chaudhary
O. P. Vyas
348
336
Om Prakash Verma 284
P. Balaram Papana 231
P. C. Jha
461
Overview of the Grid Technology and eGovernance for e-Health Implementation in
Africa
Design & Analysis of PHY Aware MAC for
Low Power Low Rate UWB Network
Full Substractor Circuit Design with
Independent Double Gate MOSFET
Ad-hoc Networking Protocols a Brief Treatise
Evaluating Impact of Operating System
Architectures on Simulation Results of
Routing Mechanisms for Wireless Sensor
Networks
Multi-Module Security: Bio-Secure
Steganographic System
A Novel Edge Detection Technique for Color
Images
Optimal Testing Time Allocation of Modular
Software for Exponential SRGM Incorporating
Imperfect Debugging
Authors
P. Elayaraja
P. Elayaraja
P. G. V. Suresh
Kumar
P. K. Jha
P. K. Kapur
P. K. Kapur
P. K. Kapur
355 New Approach and Additional Security to
Existing Cryptography Using Cubical
Combinatorics
356 Secured Remote Method Invocation
Framework
413 Overview of the Grid Technology and eGovernance for e-Health Implementation in
Africa
399 Encryption Through Cascaded Recursive
Addition of Blocks and Key Rotation of a
Session Key (CRABKR)
449 Optimal Allocation of Testing Effort: A Control
Theoretic Approach
450 Software Reliability Growth Modeling for
Distributed Environment Using ComponentSpecific Testing-Effort Functions
453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Authors
P. K. Kapur
454 Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source
Software by Considering Change- Point
P. K. Kapur
456 Unified Framework For Developing Testing
Effort Dependent Software Reliability Growth
Models with Change point and Imperfect
Debugging
P. K. Kapur
459 Genetic Algorithm Based Optimal Testing
Effort Allocation Problem for Modular
Software
P. K. Srimani
265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
P. K. Srimani
365 A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic
Algorithms
P. K. Srimani
376 Implementation of the K-Means Method for
Single and Multidimensions
Authors
P. K. Srimani
332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study
of Health Care Unit
P. L. Ramteke
332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study
of Health Care Unit
P. N. Pandey
377 Assessing Adoption of m-CRM in Education
Centers
P. Sivaprakasam
86 A Simulation Study of Content Delivery
Network
P. Sowjanya
286 Adaptive QoS for Mobile Web Services
Through Cross-Layer Communication
P.C.Jha
463 Fuzzy Approach for Selecting Optimal COTS
Based Software Products Under Consensus
Recovery Block Scheme
P.K.Kapur
453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
Authors
P.N.Pandey
416 Improving the Quality of Organization
Through ERP Systems: Indian Industry
Survey
Pallav Parkhe
101 Broadband - Wire Line Technology
Pallavi Satpule
316 Points-to Analysis of RMI-Based Java
Programs
Pankaj Chauhan
389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network
Pankaj Kumar
338 A New Approaches for Fingerprint
Sharma
Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms
Pankaj Singh Yadav 103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an
Enterprise Network
Parag Parandkar 191 Simulation and Synthesis of SONet
Synchronous Transport Signal STS-12
Transmitter
Parag Parandkar 211 Cost Effective Mass Transit Tracking System
Authors
Parag Parandkar
301 Energy Harvesting via Piezoelectricity
Parag Parandkar
282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology
Parag Parandkar
318 Low Power Design Strategies for SoCs
Parimalendu
Bandyopadhya
467 Significance of IT-enable BPR in Business
Enterprise and in Customer end
Parimalendu
Bandyopadhya
469 Current Market Scenarios of High demand
BPR implementation through BPM software
Parmod Kumar
288 Intrusion Detection Approach to Secure Adhoc Networks
Parul Goyal
Parul Kharub
Pawan Jindal
4 Discrete Sequence Wavelet Transform NUC
Algorithm
65 Inorganic Expert: Automation of Inorganic
Chemistry
244 Analysis of Time Complexity in Binary Search
Tree
Authors
Pawan Jindal
Pawan Jindal
Peeyush Mathur
Pooja Gautam
Pooja Kherwa
Prachi Goyal
Pradeep Aswal
Pradeep K. Naik
Pradeepta
Bhattacharya
251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree
260 Maximum Number of Keys in B –Tree of
Height K
178 Next Generation Networks: Enhancing
Performance and Security for Providing
Mobile Multimedia Broadcasting
229 Fuzzy logic - A New Powerful Technology
353 Evaluating Web Crawler Algorithms
279 A Comprehensive Approach Towards Data
Preprocessing Techniques & Association
Rules
51 Recent Development in Databases and Future
Directions
42 CMOS Implementation of Cell Signaling for
Cell Death
116 Robust Steganography Using Secure
Password Protected Scheme
Authors
Prakash K. Mishra 392 User Interactive Web Content Adaptation for
Mobile Devices
Prashant Johri
450 Software Reliability Growth Modeling for
Distributed Environment Using ComponentSpecific Testing-Effort Functions
Prashant K. Thete 222 Effective Use of EDI and XML Message
Exchange for Small/Mid and Large
Organizations
Prashanth G. K.
59 The State-of-The-Art Concepts in Software
Testing
Praveen Kumar
338 A New Approaches for Fingerprint
Singh Rathor
Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms
Praveen Kumar
354 Discussion of Ad-hoc On Demand
Tripathi
Distance Vector (AODV) Routing Protocol for
Mobile Hosts
Praveena
380 Network Management and Routing Strategies
Chaturvedi
with Mobile Agent
Authors
Pravin Chandra
Preeti Arora
Preeti Dubey
Prema P. Nair
Prince
Priyank Kumar
Priyanka Bhutani
Priyanka Pandit
Priyanka Singh
Priyanka Tayal
310 A Survey of Gateway Discovery Mechanism
in Ad-hoc Networks
306 Delete File System Watcher - Storage
Optimization Tool
139 Role of ICT in Narrowing the Digital Divide in
India
165 Identity Begets Identity; Real or Reel?
186 Online Voting System
145 Parasitic Capacitances in Double Gate
MOSFET
311 Comparative Study of Ontology Merging
Algorithms
282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology
272 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
414 Multi-hop Streaming in Wireless Distributed
Environment
Authors
Priyesh Kanungo
68 Managing Information Overload in Distributed
Computing Environment
Puja Gupta
34 Public Entrepreneurship: A Dynamic Strength
for Budding Green Technology
Puja Gupta
27 Web Services: Challenges in 21st Century
Puneet Arora
80 Stock Market Expert
Puneet Kumar
201 A Novel Software Architecture for Network
Security Testing
Puneet Tiwari
314 Living BEAM Elegant Wizards - The Future of
Artificial Intelligence
Pushpendar Singh 372 An Effective Approach for Disaster Prevention
Using GSM
R Singh
303 Position Based Multicast Routing Protocol for
Ad-hoc Wireless Networks
R. Bakyalakshmi
397 NAVIGUER
Nisha
Authors
R. C. Tripathi
R. L. Ujjwal
R. P. Mahapatra
R. Suganya
R. V. Kulkarni
R. W. Jasutkar
R.B.Garg
Rachit Patel
Rahul Gupta
395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN)
Models
328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB Network
263 e-Waste Management and Hazardous Effects
on Environment
202 Volume Based Medical Image
Registration by Maximization of Mutual
Information
74 Role of Information Technology in Health Care
23 Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer
453 Two Dimensional Flexible Software Reliability
Growth Model and Related Release Policy
144 Reduction of Parasitic Capacitance for
Transmission with the Help of CPL
129 e-Mail Services: "Features and Scope"
Authors
Rahul Sharma
Rahul Singh
Raj Kumar
Raj Kumar Sain
Raja. K
Rajat Mehrotra
Rajeev Paulus
Rajeev Paulus
Rajender Singh
107 Achieving Vertical Scalability: A Hindrance to
Cloud Computing
354 Discussion of Ad-hoc On Demand Distance
Vector (AODV) Routing Protocol for Mobile
Hosts
187 Conserving Energy of WSNs by Using 3Rs
Way
178 Next Generation Networks: Enhancing
Performance and Security for Providing
Mobile Multimedia Broadcasting
208 Efficient Implementation of the Minimum
Spanning Trees Based Clustering
414 Multi-hop Streaming in Wireless Distributed
Environment
349 Data Mining for Digital Libraries – A New
Paradigm
348 Ad-hoc Networking Protocols a Brief Treatise
131 Software Testing vs. Code Inspection: What
else for Verification & Validation?
Authors
Rajender Singh
Chhillar
366 A New Approach of Extraction
Transformation Loading Using Pipelining
Rajita Dixit
340 Advantages of ERP System in SMEs
Rajiv Dharaskar
401 A Practical Approach Towards Development
of Applications and Solutions Using Java
Agents
Rajiv Mahajan
308 Security Problem in the Film Industry
Production and Distribution Process
Rajiv Ranjan
331 Detecting and Preventing IP Spoofed Attack
by RSA Asymmetric Crypto - System
Rajkumar Singh
Rathore
130 A New Approach for Mobility Management in
the Wireless Network of a Mobile
Communication System
Rajni Gupta
346 Green Architecture: Principles and
Technologies
Authors
Rajni Jindal
Rakesh Kumar
201 A Novel Software Architecture for Network
Security Testing
72 Use of Evolutionary Strategies in Software
Testing
Rakesh Kumar
351 Secure and User Interactive Information
Extraction in Linux Distributions
Rakesh P. B
215 A Survey on 3D Face Reconstruction Methods
Based on Marching Cubes Algorithm
Rakesh Vardhan
84 Improving and Sustaining Coconut
Productivity: IT - A Means to Economic
Benefit
Rakesh Vardhan
248 ICT Enabled Workflow and Progress
Monitoring System for National Horticulture
Mission
Rama Rao Tandu
278 Secure Routing for Mobile in Ad-hoc Network
Rashmi Pandey
87 A Review of Software Process Models and
Methodologies
Authors
Ravi Kumar
459 Genetic Algorithm Based Optimal Testing
Effort Allocation Problem for Modular
Software
Ravi Kumar Ravi
338 A New Approaches for Fingerprint
Recognition Based on Fourier Transformed
Selected Image (FTSI) Algorithms
Ravi Prabh
351 Secure and User Interactive Information
Extraction in Linux Distributions
Ravinder Nath
414 Multi-hop Streaming in Wireless Distributed
Rajotia
Environment
Ravleen Kaur
372 An Effective Approach for Disaster Prevention
Using GSM
Renavikar Ashwini 210 Empirical Study of Factors Affecting Success
of SNS (Social Networking Sites)
Rishi Kamal
66 e-Commerce, Taxation in the Age of Birds
Without Shadows
Rishi Kamal
92 Tomorrows Technology Today
Ritika Arora Mehra 132 Routing in Ad-hoc Networks
Authors
Ritika Goyal
414 Multi-hop Streaming in Wireless Distributed
Environment
Ritika Wason
166 Recent Trends in Associative Rule Mining
Ritu Arora
461 Optimal Testing Time Allocation of Modular
Software for Exponential SRGM Incorporating
Imperfect Debugging
Rohit Goyal
51 Recent Development in Databases and Future
Directions
Rohit Srivastava
389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile Network
Roopali Jamwal
272 Status of Use of IT Tools in SMEs in Jammu
and Kashmir
Ruchi Dagar
414 Multi-hop Streaming in Wireless Distributed
Environment
Ruchi Garg
285 Effectiveness of DSDV Protocol Under Hidden
Node Environment
Ruchi Patle
101 Broadband - Wire Line Technology
Authors
Ruchika Gupta
Ruchika Sharma
271 Bio - Informatics, Bonding Genes With IT
414 Multi-hop Streaming in Wireless Distributed
Environment
Runumi Devi
38 A Novel Scheme for Prevention of Forgery
and Alteration in Automated Cheque Payment
System
Runumi Devi
39 Application of Data Mining Techniques for
Diabetic DataSet
S Zeeshan Hussian 268 Distributed Media Player
S. A. M. Rizvi
76 In-silico Comprehensive Sequence and
Structure Analysis of Proteases Family
S. A. M. Rizvi
91 Semantic Kernel for Automatic Integration of
Semantic Repositories
S. A. M. Rizvi
262 Analytical Report on Software Refactoring
S. A. M. Rizvi
267 Digital Watermarking: Advanced Technique in
Image and Video Technology
S. A. M. Rizvi
268 Distributed Media Player
Authors
S. A. M. Rizvi
S. A. M. Rizvi
309 Cryptography and Mathematics
342 Notifying State Change of Model to Multiple
Views Using Observer Pattern in Java
S. A. M. Rizvi
343 Semantic Grid E Learning Platform for
Educational System
S. K. Muttoo
195 An Overview of Wavelet-Like Transforms and
Image Data Hiding
S. L. Satarkar
232 Enhanced Security for Audio Signals Using
Steganography
S. Madhumitha
397 NAVIGUER
S. Naseem Ahmad 315 Current-Mode Oscillator Using Single DVCC
S. P. Singh
392 User Interactive Web Content Adaptation for
Mobile Devices
S. S. Agrawal
232 Enhanced Security for Audio Signals Using
Steganography
S. S. Bhalla
408 Quandary Elucidating Tactics of Water
Resource Management by Information
Technology
Authors
S. T. Bodkhe
S. Z. Hussain
Saba Dalvi
Saba Naaz
Sachin Bhoite
Safdar Tanweer
Safdar Tanweer
Sagar Gupta
391 Role of EEG Lab for Analyzing
Electroencephalogram Signal
343 Semantic Grid E Learning Platform for
Educational System
98 Design and Establishment of Information
System in Rural Areas for Sustainable
Agriculture
310 A Survey of Gateway Discovery Mechanism in
Ad-hoc Networks
280 Students Academic Performance Analysis
Using Data Mining Techniques in Higher
Education: A Case Study of College
283 A Study on Effect of Replication on Databases
341 The Noise-Robustness of Mel-Frequency
Cepstral Coefficients (MFCC) for Speech
Recognition
314 Living BEAM Elegant Wizards - The Future of
Artificial Intelligence
Authors
Sajjad Akhtar
160 FISHNET: An Emerging e-Governance
Programme to empower Fishing Communities
and Facilitate Fisheries Business
Salil Khare
142 Electronic Judicial System
Salman Abdul Moiz
95 Applying Agile & Web Engineering Technique
for Successful Web Management
Salman Abdul Moiz
96 Designing a Web Education Model for
Effective Teaching - Learning Process
Sameena Naaz
Sampada S.
Gulavani
423 A Dynamic Load Balancing Algorithm for Web
Applications
74 Role of Information Technology in Health Care
Sandeep Dahiya
171 Information Technology Engineering
Education in Haryana for a Knowledge Based
Society
Sandeep Kad
308 Security Problem in the Film Industry
Production and Distribution Process
Authors
Sandeep Kautish
33 Consumer Privacy in 2nd Generation eCommerce
Sandeep Mathur
21 Implementing IT in Disaster Management
Sandesh Patil
316 Points-to Analysis of RMI-Based Java
Programs
Sangeeta Rawal
168 e - Learning: The Silent Revolution
Sanjay Manhas
90 Data Mining: An approach to Increase the
Success of E-Commerce
Sanjeev Tayal
288 Intrusion Detection Approach to Secure Adhoc Networks
Sanjib K. Sahu
346 Green Architecture: Principles and
Technologies
Sanjib K. Sahu
111 Wireless Power Transmission: Requirements
& Issues
Sanjib K. Sahu
113 Optimizing Semantic Web Search and
Ranking Algorithms
Authors
Sansar Singh
Chauhan
Santanu Kumar
Rath
Santanu Kumar
Rath
Santosh Kumar
Santosh Kumar
Pani
Santosh Kumar
Yadav
Santosh Kumar
Yadav
347 AOEB: Energy Aware Routing
Scheme for Wireless Sensor
Networks
402 CPN Tools as a Supplement to UML
for Validation of Software
Requirements
239 Validation of Clustering Algorithms
for Mobile Ad-hoc Networks Using
Colored Petri Nets
22 Distributed-Grid Databases Server Design and
Implementation for Bio-Molecular
Simulations
169 A Revitalized Dynamic Slicing
Method for Program Testing and Debugging
235 On NTRU Cryptosystems and Timing Attacks
236 On NTRU Implementation: An Algorithmic
Approach
Authors
Sapna Jain
Saranya
Sivasankaran
Sarita Garg
Satya Prakash
Singh
388 K-Means Clustering Using WEKA Interface
227 Mr. Tacton (Embedded Red Tacton)
100 E - Governance: Whats and Ifs?
465 Qualitative Parametric Comparison of Matrix
Multiplication Algorithms in Parallel and
Distributed Computing
Satyawan Hembade424 Applying Rough-Sets to Assist the Decision
Making for ERP Implementation
Satyendra Nath
226 A New Technique for Detection and Location
Mandal
of Human Faces in Digital Image
Saumya Tyagi
230 Nonlinear Circuit Modelling Using Volterra
Series
Saurabh Saxena
111 Wireless Power Transmission: Requirements
& Issues
Savita Shiwani
26 IPv6 Transition - An Engineering Exercise or a
Necessity?
Authors
Sayali Shende
176 Corporate Strategies Adopted by IT Industry
to Beat the Global Crisis
Seema D
209 Semantic Search-The New Paradigm of
Information Retrieval on World Wide Web
Seetharam. K
122 Implementation of Multivariate Clustering
Methods for Software Development
357 Knowledge Management in a Research
Organization
Selvi S
Shabbir Ahmed
221 An Architecture Model of Mobile Ad-hoc
Network and its Performance in Disaster Area
Architecture
Shabbir Ahmed
192 Education Technology Based Models of
Teaching and Learning
Shabbir Ahmed
263 e-Waste Management and Hazardous Effects
on Environment
Shabbir Ahmed
183 Security and Efficiency in Ad-hoc Mobile
Network
Authors
Shafi Patel
Shaik Naseera
211 Cost Effective Mass Transit Tracking System
54 Trust Aware Load Distribution in a Data Grid
Environment
Shaily malik
363 Role Based and Credentials Based Access
Control in Semantic Web
Shalini Goel
124 Global Positioning System
Shalini Vermani
166 Recent Trends in Associative Rule Mining
Shallu
83 Quality of Service for Mobile Ad-hoc Networks
Shallu
88 Performance Analysis of Multi Media Ad-hoc
Networks
Shankar B. Kshetry 330 Computing with DNA
Shanthi Bhatt
117 Application of Keystroke Dynamics in Mobile
Device Users Authentication
Sharad Goyal
187 Conserving Energy of WSNs by Using 3Rs
Way
Shikha Nirmal
281 Web Science – An Interdisciplinary Approach
to Understanding the Web
Authors
Shilpi Joshi
218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
Shipra Kapoor
177 Full Substractor Circuit Design with
Independent Double Gate MOSFET
Shishir Kumar
244 Analysis of Time Complexity in Binary Search
Tree
Shishir Kumar
251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree
Shishir Kumar
260 Maximum Number of Keys in B –Tree of
Height K
Shivani Bali
463 Fuzzy Approach for Selecting Optimal COTS
Based Software Products Under Consensus
Recovery Block Scheme
Shivendra Goel
102 Traffic Generation Model for Delhi Urban Area
Using Artificial Neural Network
Shivendra Goel
234 Need for CCL in Grid Computing
Authors
Shreya Dubey
371 Critical Evaluation of Applications of Expert
Systems
Shreya Dubey
375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
Shreya Dubey
416 Improving the Quality of Organization
Through ERP Systems: Indian Industry
Survey
Shruthi. K. R.
275 Automated Remote Data Logger
Shruti Jain
42 CMOS Implementation of Cell Signaling for
Cell Death
Shubha Jain
354 Discussion of Ad-hoc On Demand Distance
Vector (AODV) Routing Protocol for Mobile
Hosts
Shweta
185 Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic
Optimization Technique
Shyamalesh Khan 357 Knowledge Management in a Research
Organization
Authors
Siddarth Jain
313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability
Sikander
219 Use of GA in Solution of TTP
Sohel Bhura
232 Enhanced Security for Audio Signals Using
Steganography
Soumya Maitra
Sourish Banerjee
75 Lossy Image Compression Using Variable
Run Length Encoding
226 A New Technique for Detection and Location
of Human Faces in Digital Image
227 Mr. Tacton (Embedded Red Tacton)
Srikkanth
Govindaraajan
Subhash Chander 250 e-Democracy
Suchismita Chinara 239 Validation of Clustering Algorithms for Mobile
Ad-hoc Networks Using Colored Petri Nets
Sudhanshu
85 Information Technology and Knowledge
Deshpande
Management: An Explorative Study
Authors
Sudip. K. Dey
Suhasini. M
Suman Mann
Sumant Katiyal
Sumant Katiyal
Sumant Katiyal
Sumant Katiyal
Sumant Katiyal
Sumant Katiyal
Sumant Katiyal
375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
58 Natural Relational Algebra: A New Approach
for Query Processing
217 Fuzzy Logic System for Querying a Database
191 Simulation and Synthesis of SONet
Synchronous Transport Signal STS-12
Transmitter
211 Cost Effective Mass Transit Tracking System
282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe Technology
301 Energy Harvesting via Piezoelectricity
318 Low Power Design Strategies for SoCs
372 An Effective Approach for Disaster Prevention
Using GSM
374 Evaluation of Network Congestion Controlling
Approaches
Authors
Sumant Katiyal
375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
Sumit Chauhan
378 Increasing Network Security Using Laws of
Networking and Quantum Mechanics
Sumit Khanna
108 A Solution to Load Balancing Problem in
Object Oriented Clusters
Sumit Kumar
285 Effectiveness of DSDV Protocol Under Hidden
Node Environment
Sumit Madan
284 Multi-Module Security: Bio-Secure
Steganographic System
218 Cyber Crime Management Using
Evidence Based Software Engineering Banking and Insurance Industries
217 Fuzzy Logic System for Querying a Database
Sunanda
Chowdhary
Sunanda
Chowdhary
Sunanda
Chowdhary
216 Role and Scope of Support Vector Machine in
Bioinformatics
Authors
Sunder Lal
36 A Directed Threshold Signature Scheme with
Threshold Verification
Sunil
37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System Design
Sunil
167 Analyzing Steganographic Algorithm in Java
by Function Point Technique
Sunil Taneja
73 Performance Evaluation of Protocols for
Secure Routing Over MANET
Sunit Jaiswal
351 Secure and User Interactive Information
Extraction in Linux Distributions
Surabhi Deshpande 85 Information Technology and Knowledge
Management: An Explorative Study
Suraiya Parveen
283 A Study on Effect of Replication on Databases
Suresh Pathare
280 Students Academic Performance Analysis
Using Data Mining Techniques in Higher
Education: A Case Study of College
Surjeet Singh
72 Use of Evolutionary Strategies in Software
Testing
Authors
Susanta Kumar
Nayak
Sushant Kumar
Sushil Kumar
Swapan
Bhattacharyya
Swati Desai
Swati Verma
Syed I. Ahson
Syed I. Ahson
104 Role of VoIP (Voice over Internet Protocol)
in e-Business and e-Commerce
412 Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc Networks
195 An Overview of Wavelet-Like Transforms and
Image Data Hiding
379 Bengali-English Relevant Cross Lingual
Information Access Using Finite
Automata
110 Role of Information Communication
Technologies in Education
273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
269 In-door Image Motion Detection with Objects
Identification and Position Shift-Velocity
Computation
270 A Machine Vision System for Motion Analysis
and DFT-Velocity Computation in Out-door
Video Frames
Authors
Syed Imtiyaz
Hassan
Syed Mohiuddin
Syed Mohiuddin
T. Eshwar
T. Eshwar
T. M. Pattewar
T. Santhanam
T. Senthil Kumar
T. Senthil Kumar
342 Notifying State Change of Model to
Multiple Views Using Observer Pattern in Java
344 An Efficient Knowledge Base Mutual Linker
Framework
345 Competent Ranking Algorithm for Web-Based
Search Engines
345 Competent Ranking Algorithm for Web-Based
Search Engines
344 An Efficient Knowledge Base Mutual Linker
Framework
23 Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer
117 Application of Keystroke Dynamics in Mobile
Device Users Authentication
202 Volume Based Medical Image Registration by
Maximization of Mutual Information
214 3D Atlas of Human Anatomy for Educational
Purposes
Authors
T. Senthil Kumar
T. Sivakumar
Tamanna Siddiqui
Tanaji D. Dabade
Tanvi Dikshit
Tanvir A. Abbasi
Tanvir A. Abbasi
Tanweer Alam
Tanweer Alam
215 A Survey on 3D Face Reconstruction Methods
Based on Marching Cubes Algorithm
247 Context Aware Multicasting Scheme for Delay
Tolerant Mobile Networks
327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP)
Implementation Strategy
11 Information Technology Infrastructure Library
(ITIL)
301 Energy Harvesting via Piezoelectricity
192 Education Technology Based Models of
Teaching and Learning
263 e-Waste Management and Hazardous Effects
on Environment
44 Advanced Mobility Models for Mobile Ad-hoc
Networks
288 Intrusion Detection Approach to Secure Adhoc Networks
Authors
Tanya Jhamb
Tapas
Bandyopadhyay
Tapasya Patki
Tarun Pandeya
Teena Tiwari
Teenum Gupta
Terence Johnson
Tonu Sojatia
362 Application of Genetic Algorithm in Oil
Drilling Problem
20 Providing Security of Fingerprint
Images Through Digital Watermarking
218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
377 Assessing Adoption of m-CRM in Education
Centers
333 Identifying Parameters with Data Collection
Methods for Software Development in View of
Usability
308 Security Problem in the Film Industry
Production and Distribution Process
116 Robust Steganography Using Secure
Password Protected Scheme
47 Shaping the Traffic to Improve QoS Parameter
During Data Privacy in Secure Multiparty
Computation
Authors
Twinkle Bansal
67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic
Speaker Recognition
U. S. Pandey
168 e - Learning: The Silent Revolution
U. S. Pandey
422 Application of Mobile Banking Services in the
Bank Area
U. Sreenivasulu
237 The Network Security Assessment Instrument
to Reduce Software Security Risk
U. Sreenivasulu
238 Software Testing Scenario
Udaya Rani S
376 Implementation of the K-Means Method for
Single and Multidimensions
V. B. Aggarwal
V. B. Singh
29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals
at Customer Door-Step
454 Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source
Software by Considering Change- Point
Authors
V. K. Patle
336 Evaluating Impact of Operating System
Architectures on Simulation Results of
Routing Mechanisms for Wireless Sensor
Networks
V. Kumar
361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow
Tool) in BPO Multiplexing
V. M. Chavan
97 Core Banking and Its Implementation
V. M. Chavan
179 A Conceptual Framework of Ethics in
Information Technology
V. M. Thakare
398 Content Based Face Retrieval
V. Mansotra
133 Reusability in Component Based
Development Process Model in Software
Development
V. Mansotra
188 Information and Communication Technologies
for strengthening Panchayati Raj in India “A
Model for J&K State”
Authors
V. Mansotra
V. Mansotra
V. R. Kanagavalli
V. R. Kanagavalli
V. S. S. Yadavalli
Vaishali Bhale
Vandana Bhasin
199 Information and Communication Technologies
(ICT’s) for Sustainable Development in
Agriculture “A Model for J&K State”
335 A Study of Concurrency and Recovery
Techniques in Databases
200 An Analysis of Rural Economic Geography
using Spatial Data Mining Techniques
418 An Analysis of Rural Economic Geography
Using Spatial Data Mining Techniques
456 Unified Framework For Developing Testing
Effort Dependent Software Reliability Growth
Models with Change point and Imperfect
Debugging
191 Simulation and Synthesis of SONet
Synchronous Transport Signal STS-12
Transmitter
118 Impact of Speech Applications in HealthCare
Organizations
Authors
Vandana Sharma
Vandna
Vandna
Vanita Ben Dhagat
Varunn Kaushik
Vibhakar Mansotra
Vibhakar Mansotra
Vibhakar Mansotra
Vibhakar Mansotra
48 Search Technique Implementation for
Symbolic Reasoning Under Uncertainty
83 Quality of Service for Mobile Ad-hoc Networks
88 Performance Analysis of Multi Media Ad-hoc
Networks
17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System
201 A Novel Software Architecture for Network
Security Testing
90 Data Mining: An approach to Increase the
Success of E-Commerce
146 Telemedicine in India - A Model for Jammu &
Kashmir State
147 Open Source Software Quality – An Issue of
Concern
359 Study of Internet Usage in Veterinary and
Agricultural Sciences
Authors
Vijay B. Aggarwal
Vijay B. Aggarwal
Vijay B. Aggarwal
Vijay Kumar
Vijay Nehra
Vijay Sabarish
Pankajan
Vijendra Rai
Vikram Bali
82 Emerging Techniques for Online Analytical
Processing and its Visualization
105 Commit Protocols and Their Issues in
Distributed Databases
106 Query Optimization in Heterogeneous
Distributed Databases
449 Optimal Allocation of Testing Effort: A Control
Theoretic Approach
171 Information Technology Engineering
Education in Haryana for a Knowledge Based
Society
214 3D Atlas of Human Anatomy for Educational
Purposes
323 Simulation of Ad-hoc Networks Using DSDV,
AODV and DSR Protocols and Their
Performance Comparison
130 A New Approach for Mobility Management in
the Wireless Network of a Mobile
Communication System
Authors
Vimal Gaur
Vimal Gaur
Vinai George Biju
Vinay Chopra
Vinay Chopra
Vinay Kumar
Vinay Kumar
Nassa
Vinay Kumar
Nassa
216 Role and Scope of Support Vector Machine in
Bioinformatics
218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
402 CPN Tools as a Supplement to UML for
Validation of Software Requirements
137 Bioinformatics: "Leading the Way to New
Advancements"
138 Smart Antenna: “Smartness Going the Way of
Technology”
30 Encryption Strength Lies Beyond Key Length:
A Suggestive Approach
163 Project Management Efficiency Using Fuzzy
Logic
317 Bringing Wireless Access to the Education: A
Comparison of Wi-Fi, WiMAX, MBWA and 3G
Authors
Vinay Mathur
65 Inorganic Expert: Automation of Inorganic
Chemistry
Vinay Sharma
105 Commit Protocols and Their Issues in
Distributed Databases
Vineet Kr. Sarawat 113 Optimizing Semantic Web Search and
Ranking Algorithms
Vineet Sharma
267 Digital Watermarking: Advanced Technique in
Image and Video Technology
Vineet Sharma
268 Distributed Media Player
Vineeta
38 A Novel Scheme for Prevention of Forgery
Khemchandani
and Alteration in Automated Cheque Payment
System
Vineeta
39 Application of Data Mining Techniques for
Khemchandani
Diabetic DataSet
Vinita Gupta
393 Development of Motherboard Ontology Using
Protégé V3.4 Rc2 (Build 529)
Vinita Rohilla
194 Comparison of Different Normal Forms
Authors
Vinod Sharma
Vinod Sharma
Vinod Sharma
Vipin Saxena
Vipin Sharma
Vipin Sharma
Vipin Sharma
Viranjay M
Srivastava
90 Data Mining: An approach to Increase the
Success of E-Commerce
188 Information and Communication Technologies
for strengthening Panchayati Raj in India “A
Model for J&K State”
335 A Study of Concurrency and Recovery
Techniques in Databases
53 Performance of Static Interconnection of
Computer Network Through UML
216 Role and Scope of Support Vector Machine in
Bioinformatics
217 Fuzzy Logic System for Querying a Database
218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and
Insurance Industries
193 Wireless Automatic Gate Sensing Alarm and
Smoke Alarm Especially for Persons with
Hearing Problem
Authors
Viranjay M.
Srivastava
Viranjay M.
Srivastava
Viranjay M.
Srivastava
Viranjay Mohan
Srivastava
Vishnu Swaroop
145 Parasitic Capacitances in Double Gate
MOSFET
148 Circuit Design with Independent Double Gate
Transistors
177 Full Substractor Circuit Design with
Independent Double Gate MOSFET
144 Reduction of Parasitic Capacitance for
Transmission with the Help of CPL
419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New
Perception for Operating System
Vivek Bhola
384 Role of Natural Language Processing in
Community Structure Detection
Vriti Sidana
273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation Measure
Y. Rajendra kumar 231 A Novel Edge Detection Technique for Color
Images
Authors
Yash Hotchandani
80 Stock Market Expert
Yatin Malhotra
65 Inorganic Expert: Automation of Inorganic
Chemistry
Yogesh Pingal
316 Points-to Analysis of RMI-Based Java
Programs
Zafar G. Sheikh
398 Content Based Face Retrieval
Zeba Khanam
262 Analytical Report on Software Refactoring
Zubair Ahmed
Khan
183 Security and Efficiency in Ad-hoc Mobile
Network
Zubair Ahmed
Khan
221 An Architecture Model of Mobile Ad-hoc
Network and its Performance in Disaster Area
Architecture
47 Shaping the Traffic to Improve QoS Parameter
During Data Privacy in Secure Multiparty
Computation
Zulfa Shaikh

Similar documents

TechM-Dividend.2007-08

TechM-Dividend.2007-08 BHAVESHBHAI AARATI SABARINATH

More information