2010 - BVICAM
Transcription
2010 - BVICAM
Welcome INDIACom-2010 4th NATIONAL CONFERENCE ON "COMPUTING FOR NATIONAL DEVELOPMENT“ This disc is designed so that you may locate papers by session or author, as well as with full text search. Papers originated as electronic files and were converted to Adobe Acrobat PDF file format for cross-platform access. Even though the viewing quality on your monitor may vary, all papers print clearly. Thank you and enjoy! Organisers Sponsors Technical Partners Media Partners click on the logo for more information GGSIPU Guru Gobind Singh Indraprastha University established by Government of NCT of Delhi under the provisions of Guru Go bind Singh Indraprastha University Act, 1998 read with its Amendment in 1999.The University is recognized by University Grants Commission (UGC), India under section 12B of UGC Act. The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three years. It has been accredited "A Grade" by NAAC during Feb - March 2007. <For details visit www.ipu.ac.in> IETE The IETE is the National Apex Professional body of Electronics and Telecommunication, Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognized by Ministry of HRD, GoI. IETE Delhi is the largest centre of IETE and conducts coaching classes for the AMIETE and DIPIETE at its premises at Janakpuri, New Delhi. <For details visit www.ietedelhi.org> Bharati Vidyapeeth <For details visit www.bvicam.in> CSI The Computer Society of India, founded in 1965,is a non-profit, professional body where IT professionals meet to exchange views and information, to learn and share ideas. CSI has over 30,000 members to date, consisting of professionals with varied backgrounds. Today it has 62 chapters and 100 plus student branches spread all over the country. Established in late 60s, Delhi Chapter is one of the largest chapters of CSI, having strength of more than 1000 members. Delhi Chapter has been awarded the Best Chapter award for 20052006. <For details visit www.csidelhi.org> Sponsors Technical Partners Media Partners Groups • Group I • Group II • Group III Tracks ( G – I ) • Track #1: Digital World • Track #2: Web Technologies, Computer Networks & Information Security • Track #3: Software Engineering, Database And Data Mining • Track #4: High Performance Computing Tracks ( G – II ) • Track #1: Digital World • Track #2: Web Technologies, Computer Networks & Information Security • Track #3: Software Engineering, Database And Data Mining • Track #4: High Performance Computing Tracks ( G – III ) • Track #1: Digital World • Track #2: Web Technologies, Computer Networks & Information Security • Track #3: Software Engineering, Database And Data Mining • Track #4: High Performance Computing Track 1: Digital World (G - I) 34 Public Entrepreneurship: A Dynamic Strength for Budding Green Technology Puja Gupta and Harsimerjeet Khurana 35 Citizen Centric e-Governance: Problems and Prospects Jyoti Kharade 37 Logic Theory: A Journey from Digital System Design to Knowledge Based System Design Mohd. Sadiq, Sunil and M. Kamil 40 Information and Management Science in Developing Inventory Policies for ServiceSensitive Items Ashok Kumar Sharma Track 1: Digital World (G - I) 43 Software Design Pattern for e-Governance Solution Framework Ajay D. Parikh 46 Managing Knowledge Workers During Turbulent Times Abid Yunus Salati and K. P. Tripathi 57 Web Supported Expert System for Learning Ashwini Kumar 74 Role of Information Technology in Health Care Sampada S. Gulavani and R. V. Kulkarni 97 Core Banking and Its Implementation V. M. Chavan and Anil T. Gaikwad Track 1: Digital World (G - I) 139 Role of ICT in Narrowing the Digital Divide in India Preeti Dubey and Devanand 179 A Conceptual Framework of Ethics in Information Technology V. M. Chavan and K. P. Tripathi 188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State” Jewan Singh, V. Mansotra and Vinod Sharma 192 Education Technology Based Models of Teaching and Learning Iqbal Azam, M. Abul Hasan, Tanvir A. Abbasi, Shabbir Ahmed and M. Suhaib Abbasi Track 1: Digital World (G - I) 205 ICT and Emergency Medical Services K. M. Mital 250 e-Democracy Subhash Chander 263 e-Waste Management M. Abul Hasan, Tanvir A. Abbasi, R. P. Mahapatra, Shabbir Ahmed and M. Suhaib Abbasi 287 Enterprise Collaboration Tool Madhavi pingili and N. Prasanna Balaji 301 Energy Harvesting via Piezoelectricity Tanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and Sumant Katiyal Track 1: Digital World (G - I) 327 Comparison Factors for the Selection of ERP Implementation Strategy Tamanna Siddiqui, Meraj Ahmed Khan and Asma Shibli 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning Jyotirmay Patel and A. K. Solannki 343 Semantic Grid E Learning Platform for Educational System S. A. M. Rizvi, S. Z. Hussain and Muqeem Ahmed 359 Study of Internet Usage in Veterinary and Agricultural Sciences Bharat B. Bhagat, Gautam and Vibhakar Mansotra Track 1: Digital World (G - I) 377 Assessing Adoption of m-CRM in Education Centers Lakshmi Kalyani, Tarun Pandeya and P. N. Pandey 413 Overview of the Grid Technology and eGovernance for e-Health Implementation in Africa Nasreddin B. El Zoghbi, M. V. Lakshmaiah, P. G. V. Suresh Kumar and Nune Sreenivas 415 Technology: Third Medium of Instruction Amrit Kaur 422 Application of Mobile Banking Services in the Bank Area U. S. Pandey and Geetanjali Track 2: Web Technologies, Computer Networks & Information Security (G - I) 17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Avanish Kumar, Abhilasha Sharma and Vanita Ben Dhagat 30 Encryption Strength Lies Beyond Key Length: A Suggestive Approach Vinay Kumar 38 A Novel Scheme for Prevention of Forgery and Alteration in Automated Cheque Payment System Vineeta Khemchandani and Runumi Devi 63 VANET: Application of Mobile Communication in Road Traffic Prashant G. Tandale Track 2: Web Technologies, Computer Networks & Information Security (G - I) 73 Performance Evaluation of Protocols for Secure Routing Over MANET Sunil Taneja, Ashwani Kush and Amandeep Makkar 95 Applying Agile & Web Engineering Technique for Successful Web Management B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin 104 Role of VoIP (Voice over Internet Protocol) in eBusiness and e-Commerce Susanta Kumar Nayak 132 Routing in Ad-hoc Networks Ritika Arora Mehra and Nipur Track 2: Web Technologies, Computer Networks & Information Security (G - I) 167 Analyzing Steganographic Algorithm in Java by Function Point Technique Mohd Abdul Ahad, Esha Saxena and Sunil 172 File Transfer Using Secure Sockets in Linux Environment Abhipal Singh, Gurneet Singh Sethi, Kavleen Kaur Oberoi and Jasleen Kaur 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter Parag Parandkar, Sumant Katiyal and Vaishali Bhale 224 A MAIL Reader in Telugu K. V. N. Sunitha and N. Kalyani Track 2: Web Technologies, Computer Networks & Information Security (G - I) 235 On NTRU Cryptosystems and Timing Attacks Santosh Kumar Yadav, Jaspal Singh Bhatia and Neelima Relan 236 On NTRU Implementation: An Algorithmic Approach Santosh Kumar Yadav and Kuldeep Bhardwaj 239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri Nets Kranthi Kumar Amirineni, Suchismita Chinara and Santanu Kumar Rath 247 Context Aware Multicasting Scheme for Delay Tolerant Mobile Networks Divya. T. V. and T. Sivakumar Track 2: Web Technologies, Computer Networks & Information Security (G - I) 285 Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi Garg, Himanshu Sharma and Sumit Kumar 303 Position Based Multicast Routing Protocol for Ad-hoc Wireless Networks A K Daniel and R Singh 309 Cryptography and Mathematics S. A. M. Rizvi and Neeta Wadhwa 310 A Survey of Gateway Discovery Mechanism in Ad-hoc Networks Saba Naaz and Pravin Chandra 323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR Protocols Vijendra Rai Track 2: Web Technologies, Computer Networks & Information Security (G - I) 325 Demodulation Scheme for the CDMA System H. Umadevi, Chandrakanth H. Gowda, K. S. Gurumurthy 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network Anup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and Nupur Prakesh 336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks A. K. Dwivedi, V. K. Patle and O. P. Vyas 354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile Hosts Shubha Jain, Praveen Kumar Tripathi and Rahul Singh Track 2: Web Technologies, Computer Networks & Information Security (G - I) 363 Role Based and Credentials Based Access Control in Semantic Web Shaily malik 378 Increasing Network Security Using Laws of Networking and Quantum Mechanics Arnab Samanta and Sumit Chauhan 381 Modifications in the Working Model and Handoff Mechanism of MIPv6 B. R. Chandavarkar and G. Ram Mohana Reddy 399 Encryption Through Cascaded Recursive Addition of Blocks and Session Key Rotation P. K. Jha and A. K. Nayak Track 2: Web Technologies, Computer Networks & Information Security (G - I) 400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet Simulator Mohammad Pasha and Mohd. Umar Farooq 414 Multi-hop Streaming in Wireless Distributed Environment Ravinder Nath Rajotia, Ritika Goyal, Priyanka Tayal, Ruchi Dagar, Ruchika Sharma and Rajat Mehrotra 423 A Load Balancing Algo for Web Applications Sameena Naaz, Mohamed Meftah Alrayes and M. Afshar Alam Track 3: Software Engineering, Database And Data Mining (G - I) 39 Application of Data Mining Techniques for Diabetic DataSet Runumi Devi and Vineeta Khemchandani 90 Data Mining: An approach to Increase the Success of E-Commerce Sanjay Manhas, Vinod Sharma and Vibhakar Mansotra 147 Open Source Software Quality – An Issue of Concern Anil Kumar, Vibhakar Mansotra and Dalip Bhat 197 Testing Graphical User Interface Using Decision Based Sequence Diagrams Mahamaya Mohanty Track 3: Software Engineering, Database And Data Mining (G - I) 201 A Novel Software Architecture for Network Security Testing Rajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal, Sidharth Chhabra and Varunn Kaushik 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries Sunanda Chowdhary, Shilpi Joshi, Tapasya Patki, Vipin Sharma, Anshu Chowdhary, A. B. Patki and Vimal Gaur 223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements Specification Ardhendu Mandal 244 Analysis of Time Complexity in Binary Search Tree Pawan Jindal, Amit Kumar and Shishir Kumar Track 3: Software Engineering, Database And Data Mining (G - I) 251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black Tree Pawan Jindal, Amit Kumar and Shishir Kumar 262 Analytical Report on Software Refactoring S. A. M. Rizvi and Zeba Khanam 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure Priyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, Niti Verma, Swati Verma and A. B. Patki 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management Nilesh Mahajan and Bharati Yelikar 283 A Study on Effect of Replication on Databases Suraiya Parveen and Safdar Tanweer Track 3: Software Engineering, Database And Data Mining (G - I) 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit P. K. Srimani and Malini M. Patil 333 Identifying Parameters with Data Collection Methods for Software Development in View of Usability Teena Tiwari and Kshama Paithankar 335 A Study of Concurrency and Recovery Techniques in Databases Amit Kour, Vinod Sharma and V. Mansotra 342 Notifying State Change of Model to Multiple Views Using Observer Pattern in Java S. A. M. Rizvi and Syed Imtiyaz Hassan Track 3: Software Engineering, Database And Data Mining (G - I) 349 Data Mining for Digital Libraries – A New Paradigm Ajendra Isaacs, Rajeev Paulus, Navendu Nitin and Narendra Gupta 351 Secure and User Interactive Information Extraction in Linux Distributions Sunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh Kumar 402 CPN Tools as a Supplement to UML for Validation of Software Requirements Vinai George Biju and Santanu Kumar Rath 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System Gyanendra Kumar, Gupta Shubha Jain, Vishnu Swaroop and A. K. Sharma Track 3: Software Engineering, Database And Data Mining (G - I) 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach P. K. Kapur, Udayan Chanda and Vijay Kumar 450 Software Reliability Growth Modeling for Distributed Environment Using ComponentSpecific Testing-Effort Functions P. K. Kapur, Kalpana Yadav, Avneesh Chauhan and Prashant Johri 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy P. K. Kapur, R. B. Garg, Anu. G. Aggarwal and Abhishek Tandon 454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- Point V. B. Singh P. K. Kapur and Mashaallah Basirzadeh Track 3: Software Engineering, Database And Data Mining (G - I) 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging V. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and Jyotish Kumar 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software Anu G. Aggarwal, P. K. Kapur, Gurjeet Kaur and Ravi Kumar 461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging P. C. Jha, Ritu Arora and P. K. Kapur Track 3: Software Engineering, Database And Data Mining (G - I) 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme P.C.Jha, Shivani Bali and P. K. Kapur Track 4: High Performance Computing (G - I) 20 Providing Security of Fingerprint Images Through Digital Watermarking Tapas Bandyopadhyay, B Bandyopadhyay and B N Chatterjii 48 Search Technique Implementation for Symbolic Reasoning Under Uncertainty Vandana Sharma 54 Trust Aware Load Distribution in a Data Grid Environment Shaik Naseera and K. V. Madhu Murthy 67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker Recognition Akash Tayal, Harshita Sharma and Twinkle Bansal Track 4: High Performance Computing (G - I) 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family Meenakshi Bhat and S. A. M. Rizvi 195 An Overview of Wavelet-Like Transforms and Image Data Hiding Sushil Kumar and S. K. Muttoo 211 Cost Effective Mass Transit Tracking System Shafi Patel, Sumant Katiyal and Parag Parandkar 216 Role and Scope of Support Vector Machine in Bioinformatics Sunanda Chowdhary, Vipin Sharma, A. B. Patki and Vimal Gaur 217 Fuzzy Logic System for Querying a Database Sunanda Chowdhary, Vipin Sharma, A. B. Patki and Suman Mann Track 4: High Performance Computing (G - I) 230 Nonlinear Circuit Modelling Using Volterra Series Harneet Kaur, Manika Babbar, Saumya Tyagi and Akash Tayal 266 An Efficient Solution for Evaluation Problem of HMM Madhusudhana Rao D 269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity Computation Asaad A. M. Al-Salih and Syed I. Ahson 270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video Frames Asaad A. M. Al-Salih and Syed I. Ahson Track 4: High Performance Computing (G - I) 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology Priyanka Pandit, Parag Parandkar, Abhijeet Gorey and Sumant Katiyal 284 Multi-Module Security: Bio-Secure Steganographic System Om Prakash Verma, Amit Madan and Sumit Madan 311 Comparative Study of Ontology Merging Algorithms Apoorva Shukla and Priyanka Bhutani 315 Current-Mode Oscillator Using Single DVCC Anisur Rehman Nasir and S. Naseem Ahmad 318 Low Power Design Strategies for SoCs Anjali Gupta, Atikant Shrivastava, Parag Parandkar and Sumant Katiyal Track 4: High Performance Computing (G - I) 329 Tones and Break Indices for Speech Processing - A Review Archana Agarwal and Anurag Jain 334 Intelligent Control for Power System Applications Mohd. Rihan and Muneeza Afaq 339 Virtual Instrumentation for Biomedical Applications Mohd. Rihan and Arti Agarwal 376 Implementation of the K-Means Method for Single and Multidimensions P. K. Srimani and Udaya Rani S 384 Role of Natural Language Processing in Community Structure Detection Vivek Bhola, Mahesh Grover and Madhavi Sinha Track 4: High Performance Computing (G - I) 406 PRAAT Implementation for Prosody Conversion Maninder Singh Suri, Divya Setia and Anurag Jain 407 Emotion Conversion in Hindi Language Divya Setia, Maninder Singh Suri and Anurag Jain 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System Nandita Sengupta and Jaya Sil Track 1: Digital World (G - II) 29 Rural e-Banking: Gaps, Inefficiencies, Emerging Solution Through Mobile Terminals at Customer Door-Step V. B. Aggarwal, Deepti Sharma and Archana B Saxena 85 Information Technology and Knowledge Management: An Explorative Study Surabhi Deshpande and Sudhanshu Deshpande 96 Designing a Web Education Model for Effective Teaching - Learning Process B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin 146 Telemedicine in India - A Model for Jammu & Kashmir State Vibhakar Mansotra, Dalip Kumar Bhat and Anil Ticku Track 1: Digital World (G - II) 157 E-Commerce : Improving Performance of Customer Knowledge Management Archana Sharma 176 Corporate Strategies Adopted by IT Industry to Beat the Global Crisis Divya Leekha, Himali Natekar and Sayali Shende 411 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University Nand Kumar and Nasreddin B. El Zoghbi 424 Applying Rough-Sets to Assist the Decision Making for ERP Implementation Ajit More and Satyawan Hembade Track 2: Web Technologies, Computer Networks & Information Security (G - II) 26 IPv6 Transition - An Engineering Exercise or a Necessity? Savita Shiwani and G. N. Purohit 27 Web Services: Challenges in 21st Century Harsimerjeet Khurana and Puja Gupta 77 Network Monitoring: Topology, Methods and Issues Mamta Sachdeva and Neeraj Gupta 103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise Network Lalit Saraswat and Pankaj Singh Yadav Track 2: Web Technologies, Computer Networks & Information Security (G - II) 116 Robust Steganography Using Secure Password Protected Scheme Pradeepta Bhattacharya, Dhiraj S. Rajani and Terence Johnson 187 Conserving Energy of WSNs by Using 3Rs Way Raj Kumar and Sharad Goyal 421 Mobility Management Techniques and QoS in Mobile WiMax M. N. Doja and M. Bala Krishna Track 3: Software Engineering, Database And Data Mining (G - II) 58 Natural Relational Algebra: A New Approach for Query Processing Suhasini. M and H. S. Nagalakshmi 59 The State-of-The-Art Concepts in Software Testing Prashanth G. K. 87 A Review of Software Process Models and Methodologies Anand K Pandey and Rashmi Pandey 94 A Methodology for Successful Project Management in Medium Scale Enterprises B.V.Ramanamurthy, K.Srinivasa Babu and Mohammed Sharfuddin Track 3: Software Engineering, Database And Data Mining (G - II) 115 Improving the Effectiveness of Inspection Through Verification and Validation Jayanthi R, Amrutha. V and Jagadeesh. G 136 Aspect Oriented Programming Java RMI Server Inderjit Singh Dhanoa and Dalwinder Singh Salaria 169 A Revitalized Dynamic Slicing Method for Program Testing and Debugging Santosh Kumar Pani and Mahamaya Mohanty 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands D. A. Vidhate, A. K. Patil and D. V. Guleria 280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of College Sachin Bhoite and Suresh Pathare Track 4: High Performance Computing (G - II) 91 Semantic Kernel for Automatic Integration of Semantic Repositories Nadia Imdadi and S. A. M. Rizvi 231 A Novel Edge Detection Technique for Color Images C. Naga Raju, Y. Rajendra kumar, P. Balaram Papana and D. V. M Krishna 234 Need for CCL in Grid Computing Divya Goel and Shivendra Goel 341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech Recognition Safdar Tanweer and Jawed Ahmed Track 4: High Performance Computing (G - II) 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms P. K. Srimani and G. Vakula Rani Track 1: Digital World (G - III) 11 Information Technology Infrastructure Library (ITIL) Tanaji D. Dabade 18 Knowledge Management: Information & Knowledge Sharing Through Intranet Bhavna Bajpai 21 Implementing IT in Disaster Management Sandeep Mathur 50 Towards 21st Century Classrooms: The Quality Requisite! Dheeraj Mehrotra 66 e-Commerce, Taxation in the Age of Birds Without Shadows Rishi Kamal and Gopal Kamal Track 1: Digital World (G - III) 80 Stock Market Expert Niraj Saxena, Yash Hotchandani, Mayank Kulshrestha and Puneet Arora 84 Improving and Sustaining Coconut Productivity: IT - A Means to Economic Benefit Rakesh Vardhan 92 Tomorrows Technology Today Rishi Kamal 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture Mudita Shrivastava, Manisha Kumari, Saba Dalvi and Ashwini Kale Track 1: Digital World (G - III) 100 E - Governance: Whats and Ifs? Sarita Garg 101 Broadband - Wire Line Technology Pallav Parkhe and Ruchi Patle 110 Role of Information Communication Technologies in Education Swati Desai 118 Impact of Speech Applications in HealthCare Organizations Vandana Bhasin 142 Electronic Judicial System Adil Siddiqui, Meenakshi Sharma, Manish and Salil Khare Track 1: Digital World (G - III) 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business Sajjad Akhtar and Madaswamy Moni 162 Information and Communication Technology (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview Harish Kumar Taluja and Anuradha Taluja 165 Identity Begets Identity; Real or Reel? Prema P. Nair 186 Online Voting System Prince and Bhupendra Singh Track 1: Digital World (G - III) 199 Information and Communication Technologies (ICT’s) for Sustainable Development in Agriculture “A Model for J&K State” Jewan Singh and V. Mansotra 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission Rakesh Vardhan, K. Rajashekhar and Md. Arif 272 Status of Use of IT Tools in SMEs in Jammu and Kashmir Roopali Jamwal and Deepshikha Jamwal 274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced by Senior Citizens While Using Mobile Phones Anand Paropkari Track 1: Digital World (G - III) 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G Vinay Kumar Nassa and Mohit Rai 340 Advantages of ERP System in SMEs Rajita Dixit and Deepali Shahane 344 An Efficient Knowledge Base Mutual Linker Framework Syed Mohiuddin, Himayatullah Sharief and T. Eshwar 346 Green Architecture Rajni Gupta and Sanjib K. Sahu Track 1: Digital World (G - III) 357 Knowledge Management in a Research Organization Manju Shree, Shyamalesh Khan, Nnj Hemrom, Selvi S and A K Paul 361 Implementation of Workflows Intuitive Formal Approach in BPO Multiplexing Mayank Kumar, A. B. Patki, Akshay Anand and V. Kumar 371 Critical Evaluation of Applications of Expert Systems Gurvinder Singh, Shreya Dubey and Sumant Katiya 386 Emerging Trends of IT in Healthcare Sector Chandan Kalra Track 1: Digital World (G - III) 396 Neuro-informatics in India - Problems and Trends K. R. Radha Krishnan 403 Information Technology for Education, Health and Development Kanchan Lata Bhardwaj and Navneet Sharma 408 Quandary Elucidating Tactics of Water Resource Management by Information Technology Arvind Jaiswal and S. S. Bhalla 409 A New Generation of Electronic Commerce Harmanpreet Kaur Track 1: Digital World (G - III) 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey Mary Jacintha M, Khanhaiya Singh and P.N.Pandey 467 Significance of IT-enable BPR in Business Enterprise and in Customer end Parimalendu Bandyopadhyay and Joydeep Chowdhury 469 Current Market Scenarios of High demand BPR implementation through BPM software Parimalendu Bandyopadhyay and Joydeep Chowdhury 470 Significance of IT-Enable Human Resource Management Parimalendu Bandyopadhyay and Joydeep Chowdhury Track 2: Web Technologies, Computer Networks & Information Security (G - III) 8 Crawling the Web at Desktop Scales Madhavi Pingili 12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Gupta 24 Personalized Web Search: User Modeling Using Implicit Feedback From Click Through Data Geetanjali Surange 25 Solving Cellular Mobile Network’s Assignment Problem Using Iterative Local Search Algorithm K. Rajalakshmi 33 Consumer Privacy in 2nd Generation eCommerce Sandeep Kautish Track 2: Web Technologies, Computer Networks & Information Security (G - III) 36 A Directed Threshold Signature Scheme with Threshold Verification Sunder Lal and Manoj Kumar 44 Advanced Mobility Models for Mobile Ad-hoc Networks Tanweer Alam 47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty Computation Tonu Sojatia and Zulfa Shaikh 49 Threats and Innovations of Information Security in the 21st Century Deepshikha Bhargava Track 2: Web Technologies, Computer Networks & Information Security (G - III) 52 Strategies for Wavelength Assignment in WDM Optical Networks Arvind Upadhyay and Kavita Thorat 53 Performance of Static Interconnection of Computer Network Through UML Vipin Saxena and Anuradha Sharma 60 Cloud Computing: Its Security & Privacy aspects Deepshikha Jamwal and Kumar Kush 62 Improving QoS in Video Multicasting Deepshikha Jamwal and Kumar Kush 81 Performance Comparison and Improvement of Routing Protocols - DSR Nitin Tyagi Track 2: Web Technologies, Computer Networks & Information Security (G - III) 83 Quality of Service for Mobile Ad-hoc Networks Shallu, Vandna and Kiran 86 A Simulation Study of Content Delivery Network N. Ramachandran and P. Sivaprakasam 88 Performance Analysis of Multi Media Ad-hoc Networks Kiran, Vandna and Shallu 107 Achieving Vertical Scalability: A Hindrance to Cloud Computing Rahul Sharma and Mohit Mathur 111 Wireless Power Transmission: Requirements & Issues Saurabh Saxena and Sanjib K. Sahu Track 2: Web Technologies, Computer Networks & Information Security (G - III) 113 Optimizing Semantic Web Search and Ranking Algorithms Vineet Kr. Sarawat and Sanjib K. Sahu 117 Application of Keystroke Dynamics in Mobile Device Users Authentication T. Santhanam and Shanthi Bhatt 120 On Demand Temporary Route Recovery for Frequent Link Failures in Ad-hoc Networks Kokula Krishna Hari. K 121 Implementation of Weighted Rule Mining Algorithm for Wireless Sensor Networks Kokula Krishna Hari. K 124 Global Positioning System Shalini Goel Track 2: Web Technologies, Computer Networks & Information Security (G - III) 128 Search Engines - "Issues and Improvements" Nitul Kaushik and Archana Saxena 129 e-Mail Services: "Features and Scope" Rahul Gupta and C Komalavalli 130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication System Vikram Bali, Rajkumar Singh Rathore and Amit Sirohi 138 Smart Antenna: “Smartness Going the Way of Technology” Vinay Chopra 158 Dual Firewall Technology for VPN Network Ashish Surywanshi and Akhilesh K Sharma Track 2: Web Technologies, Computer Networks & Information Security (G - III) 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting Peeyush Mathur, Bharat Singh, Raj Kumar Sain and Chandra Shekhar 182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETs Mohd. Umar Farooq and Mohammad Pasha 183 Security and Efficiency in Ad-hoc Mobile Network Shabbir Ahmed, Kavita Bhatnagar and Zubair Ahmed Khan 184 Collaborative Knowledge with Cloud Computing Avijit Dutta Track 2: Web Technologies, Computer Networks & Information Security (G - III) 189 Mobile E-Commerce: Payment System Security Md. Tabrez Nafis 190 Data Security From Malicious Attack: Computer Viruses Narendra Kumar Tyagi and Abhilasha Vyas 193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing Problem Abhishek Khemka and Viranjay M Srivastava 198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous Environment Beneyaz Ara Begum and Animesh Tripathy Track 2: Web Technologies, Computer Networks & Information Security (G - III) 204 Dark Side of Cyber Crime in India: A Case Study Namita Singh, Deepshikha Jamwal and G. S. Sambyal 209 Semantic Search-The New Paradigm of Information Retrieval on World Wide Web Seema D 210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites) Renavikar Ashwini and Ligade Smita 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks Mohan H .S. and A. Raji Reddy Track 2: Web Technologies, Computer Networks & Information Security (G - III) 221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area Architecture Shabbir Ahmad and Zubair Ahmed Khan 222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large Organizations Prashant K. Thete 228 Voice Enabled Mail Reader-VMAIL K. V. N. Sunitha and N. Kalyani 232 Enhanced Security for Audio Signals Using Steganography G. R. Bamnote, S. L. Satarkar, S. S. Agrawal and Sohel Bhura Track 2: Web Technologies, Computer Networks & Information Security (G - III) 237 The Network Security Assessment Instrument to Reduce Software Security Risk N. Prasanna Balaji, U. Sreenivasulu and G. Pramod 241 Potential Air Traffic Congestion Solution Slot Allocation by Auction Method Madhavi Pingili and N. Prasanna Balaji 255 Recovery of Mobile Internet Transactions D. Rama Rao 257 Potential Air Traffic Congestion Solution: Slot Allocation by Auction Method D. Rama Rao 261 Evaluation of Integration Algorithms for Meta Search Engine Bhavsingh Maloth Track 2: Web Technologies, Computer Networks & Information Security (G - III) 275 Automated Remote Data Logger Shruthi. K. R. 278 Secure Routing for Mobile in Ad-hoc Network Rama Rao Tandu and J. Reena Mathigolda 281 Web Science – An Interdisciplinary Approach to Understanding the Web Shikha Nirmal 286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication P. Sowjanya 288 Intrusion Detection Approach to Secure Ad-hoc Networks Tanweer Alam, Parmod Kumar and Sanjeev Tayal Track 2: Web Technologies, Computer Networks & Information Security (G - III) 308 Security Problem in the Film Industry Production and Distribution Process Rajiv Mahajan, Teenum Gupta and Sandeep Kad 312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks Mohit Agrawal, Lalla Atul Singh Chaurasia, Navneet Tiwari and Jatan Saraf 331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto - System Rajiv Ranjan and K. P. Yadav 345 Competent Ranking Algorithm for Web-Based Search Engines Himayatullah Sharief, Syed Mohiuddin and T. Eshwar Track 2: Web Technologies, Computer Networks & Information Security (G - III) 347 AOEB: Energy Aware Routing Scheme for Wireless Sensor Networks Sansar Singh Chauhan and Gautam Dhameja 348 Ad-hoc Networking Protocols a Brief Treatise Ajendra Isaacs, Navendu Nitin, Rajeev Paulus and O. P. Chaudhary 353 Evaluating Web Crawler Algorithms Jyotsna Nigam and Pooja Kherwa 355 New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics P. Elayaraja and M. Sivakumar 356 Secured Remote Method Invocation Framework P. Elayaraja and M. Sivakumar Track 2: Web Technologies, Computer Networks & Information Security (G - III) 368 Laptops Security Application Using RFID Anurag Srivastava and Alok Kumar Dutt 372 An Effective Approach for Disaster Prevention Using GSM Gurvinder Singh, Ravleen Kaur, Katiyal, Anubha Bansal and Pushpendar Singh 374 Evaluation of Network Congestion Controlling Approaches Gurvinder Singh, Sumant Katiyal and ShreyaDubey 375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography Gurvinder Singh, Sudip. K. Dey, Shreya Dubey and Sumant Katiyal Track 2: Web Technologies, Computer Networks & Information Security (G - III) 380 Network Management and Routing Strategies with Mobile Agent Praveena Chaturvedi and Nipur 383 Network Aware Routing Protocol for MANET Ela Kumar and Ravinder Nath Rajotiya 385 GSM Security and Encryption Atikant Shrivastava, Anjali Gupta and Ashish Valuskar 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network A. K. Vatsa, Khushbu Garg, Pankaj Chauhan and Rohit Srivastava Track 2: Web Technologies, Computer Networks & Information Security (G - III) 392 User Interactive Web Content Adaptation for Mobile Devices Prakash K. Mishra, Kapil Baliyan, Deepshikha and S. P. Singh 401 A Practical Approach Towards Development of Applications and Solutions Using Java Agents Nilesh M. Shelke and Rajiv Dharaskar 412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc Networks Sushant Kumar and Bibhudatta Sahoo 452 Comparative Analysis of Structures and Attacks on Various Stream Ciphers Mohammad Ubaidullah Bokhari and Faheem Masoodi Track 3: Software Engineering, Database And Data Mining (G - III) 51 Recent Development in Databases and Future Directions Pradeep Aswal and Rohit Goyal 56 Prioritization of Test Cases for Regression Testing Kapila Kapoor and Geetika Kapoor 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach Asha Gowda Karegowda, M. A. Jayaram and A. S. Manjunath 69 Data Mining and Knowledge Discovery Ankita Jhawar, Ayushi Ameriya and Kanupriya Chaturvedi Track 3: Software Engineering, Database And Data Mining (G - III) 72 Use of Evolutionary Strategies in Software Testing Surjeet Singh and Rakesh Kumar 78 Data Mining with Support Vector Machine Arti Patle and Deepak Singh Chouhan 82 Emerging Techniques for Online Analytical Processing and its Visualization Deepti Nayar and Vijay B. Aggarwal 89 Resource Based Grid Scheduling Algorithm Manjot Bhatia 93 Query Optimization in Homogenous Distributed Database Management System Himanshu Sharma and C. Komalavalli Track 3: Software Engineering, Database And Data Mining (G - III) 105 Commit Protocols and Their Issues in Distributed Databases Vinay Sharma and Vijay B. Aggarwal 106 Query Optimization in Heterogeneous Distributed Databases Akanksha Gupta and Vijay B. Aggarwal 108 A Solution to Load Balancing Problem in Object Oriented Clusters Sumit Khanna and Deepti Sharma 122 Implementation of Multivariate Clustering Methods for Software Development Seetharam. K and Chandrakanth G Pujari Track 3: Software Engineering, Database And Data Mining (G - III) 131 Software Testing vs. Code Inspection: What else for Verification & Validation? Latika Kharb and Rajender Singh 133 Reusability in Component Based Development Process Model in Software Development Jyoti Mahajan, Devanand and V. Mansotra 161 Analysis of Software Threats and Software Security Deepshikha Jamwal and Bhawana Sharma 166 Recent Trends in Associative Rule Mining Shalini Vermani and Ritika Wason 180 Model Testing: Is it Only A Special Case of Software Testing Manoj Kumar Pachariya Track 3: Software Engineering, Database And Data Mining (G - III) 194 Comparison of Different Normal Forms Vinita Rohilla 196 Reliability and N-version Programming in Software Fault Tolerance K. C. Joshi 200 An Analysis of Rural Economic Geography using Spatial Data Mining Techniques V. R. Kanagavalli and K. Raja 203 Software Engineering Challenges: A Case Study P. L. Ramteke and Mohammad Atique 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering Meena. A and Raja. K Track 3: Software Engineering, Database And Data Mining (G - III) 238 Software Testing Scenario N. Prasanna Balaji, U. Sreenivasulu and G. Pramod 249 Hyperion Essbase Technology K B K S Durga 252 Software Metrics Vis–a-Vis Software Vulnerability Deepshikha Jamwal and Bhawana Sharma 254 Software Reuse: A Systematic Review Deepshikha Jamwal 256 A Unit-Test Framework for Database Applications M Srikanth Yadav Track 3: Software Engineering, Database And Data Mining (G - III) 260 Maximum Number of Keys in B –Tree of Height K Pawan Jindal, Amit Kumar and Shishir Kumar 268 Distributed Media Player S. A. M. Rizvi, S Zeeshan Hussian and Vineet Sharma 279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association Rules Jasdeep Singh Malik, Prachi Goyal and Akhilesh K Sharma 304 A Software Tool to Access Evolutionary Algorithms for Data Bhavsingh Maloth Track 3: Software Engineering, Database And Data Mining (G - III) 306 Delete File System Watcher - Storage Optimization Tool Preeti Arora 316 Points-to Analysis of RMI-Based Java Programs Yogesh Pingal, Pallavi Satpule and Sandesh Patil 319 Security Concern Using Aspect Oriented Programming (Aspect C) Kavish Sehgal and Kashyap Rajpal 320 Distributed Query Optimization: Use of Mobile Agents Kodanda Kumar Melpadi 321 An Extended GCLP Algorithm for Hardware Software Partitioning Anurag Srivastava Track 3: Software Engineering, Database And Data Mining (G - III) 326 Data Mining and Business Intelligence Technologies Manmeet Singh Kapoor 352 Data Mining and Audience Intelligence for Advertising Manika Gupta 364 Evaluation System with Oracle 10g Jaswinder Kaur 373 Real Time Operating Systems (RTOS) Ashima Wadhwa 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases Bratin Bhattacharya and Deepa Gangwani Track 3: Software Engineering, Database And Data Mining (G - III) 394 Data Mining in Healthcare Sector K. R. Radha Krishnan 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models R. C. Tripathi, Manohar Lal, A. K. Malviya and Manish Saraswat 418 An Analysis of Rural Economic Geography Using Spatial Data Mining Techniques V. R. Kanagavalli and K. Raja Track 4: High Performance Computing (G - III) 4 Discrete Sequence Wavelet Transform NUC Algorithm Parul Goyal 22 Distributed-Grid Databases Server Design and Implementation for Bio-Molecular Simulations Santosh Kumar 23 Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer R. W. Jasutkar and T. M. Pattewar 42 CMOS Implementation of Cell Signaling for Cell Death Shruti Jain and Pradeep K. Naik Track 4: High Performance Computing (G - III) 55 An Intelligent Blackjack Game Using Reinforcement Learning Algorithms Arvind Singh Chandel and Aruna Tiwari 65 Inorganic Expert: Automation of Inorganic Chemistry Vinay Mathur, Parul Kharub and Yatin Malhotra 68 Managing Information Overload in Distributed Computing Environment Ajay Tiwari and Priyesh Kanungo 75 Lossy Image Compression Using Variable Run Length Encoding Soumya Maitra Track 4: High Performance Computing (G - III) 99 Bio - Informatics G. Gayatri 102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network Shivendra Goel, J. B. Singh and Ashok Kumar Sinha 135 A New Type of Covering Based Generalized Rough Set Debadutta Mohanty 137 Bioinformatics: "Leading the Way to New Advancements" Vinay Chopra Track 4: High Performance Computing (G - III) 144 Reduction of Parasitic Capacitance for Transmission with the Help of CPL Harpreet Parashar, Rachit Patel and Viranjay Mohan Srivastava 145 Parasitic Capacitances in Double Gate MOSFET Priyank Kumar and Viranjay M. Srivastava 148 Circuit Design with Independent Double Gate Transistors Nitant and Viranjay M. Srivastava 163 Project Management Efficiency Using Fuzzy Logic Vinay Kumar Nassa Track 4: High Performance Computing (G - III) 175 Reducing LOC and Cyclomatic Complexity Garima Verma and M. P. Thapaliyal 177 Full Substractor Circuit Design with Independent Double Gate MOSFET Nitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay M. Srivastava 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Shweta, Akash Tayal and Ankita Lathey 202 Volume Based Medical Image Registration by Maximization of Mutual Information T. Senthil Kumar and R. Suganya Track 4: High Performance Computing (G - III) 207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print Images Arunkumar. V and Malathy. C 214 3D Atlas of Human Anatomy for Educational Purposes T. Senthil Kumar and Vijay Sabarish Pankajan 215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes Algorithm Rakesh P. B. and T. Senthil Kumar 219 Use of GA in Solution of TTP Sikander and Kuldeep Kumar Track 4: High Performance Computing (G - III) 226 A New Technique for Detection and Location of Human Faces in Digital Image Satyendra Nath Mandal, Aninda Banerjee, Kumarjit Banerjee and Sourish Banerjee 227 Mr. Tacton (Embedded Red Tacton) Saranya Sivasankaran and Srikkanth Govindaraajan 229 Fuzzy logic - A New Powerful Technology Pooja Gautam 242 Protected Content Based Image Retrieval N. Prasanna Balaji, J. Reena and Korra Bichya 243 Relevance Feedback for Distributed Content Based Image Retrieval N. Prasanna Balaji and J. Reena and Korra Bichya Track 4: High Performance Computing (G - III) 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility P. K. Srimani, Manjula Sanjay and K. Krishna Veni 267 Digital Watermarking: Advanced Technique in Image and Video Technology S. A. M. Rizvi, Vineet Sharma and Anurag Singh Chauhan 271 Bio - Informatics, Bonding Genes With IT Ruchika Gupta 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data A. K. Patil and A. J. Patil Track 4: High Performance Computing (G - III) 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition A. K. Patil and A. J. Patil 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform A. K. Patil and A. J. Patil 313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability Navneet Tiwari, Jatan Saraf and Siddarth Jain 314 Living BEAM Elegant Wizards - The Future of Artificial Intelligence Navneet Tiwari, Sagar Gupta and Puneet Tiwari Track 4: High Performance Computing (G - III) 324 Texture Based Image Retrieval With an Application to CBIR D. N. Verma and Bharti 330 Computing with DNA Shankar B. Kshetry and J. P. Singh 338 A New Approaches for Fingerprint Recognition Based on Fourier Transformed Selected Image (FTSI) Algorithms Praveen Kumar Singh Rathor, Ravi Kumar Ravi and Pankaj Kumar Sharma 362 Application of Genetic Algorithm in Oil Drilling Problem Tanya Jhamb, Anusha Bhatnagar and Nidhi Kohli Track 4: High Performance Computing (G - III) 366 A New Approach of Extraction Transformation Loading Using Pipelining Rajender Singh Chhillar and Barjesh Kochar 379 Bengali-English Relevant Cross Lingual Information Access Using Finite Automata Avishek Banerjee and Swapan Bhattacharyya 388 K-Means Clustering Using WEKA Interface Sapna Jain, M. Afshar Aalam and M. N. Doja 391 Role of EEG Lab for Analyzing Electroencephalogram Signal Ashish B. Sasankar N. G. Bawane and S. T. Bodkhe Track 4: High Performance Computing (G - III) 393 Development of Motherboard Ontology Using Protégé V3.4 Rc2 (Build 529) Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik 397 NAVIGUER R. Bakyalakshmi Nisha and S. Madhumitha 398 Content Based Face Retrieval Zafar G. Sheikh and V. M. Thakare Authors A. B. Patki 216 Role and Scope of Support Vector Machine in Bioinformatics A. B. Patki 217 Fuzzy Logic System for Querying a Database A. B. Patki 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries A. B. Patki 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure A. B. Patki 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing A. J. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data A.J. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition A. J. Patil 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform Authors A. K. Daniel 303 Position Based Multicast Routing Protocol for Ad-hoc Wireless Networks A. K. Dwivedi 336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models 399 Encryption Through Cascaded Recursive Addition of Blocks and Key Rotation of a Session Key (CRABKR) 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition A. K. Malviya A. K. Nayak A. K. Patil A. K. Patil A. K. Patil Authors A. K. Patil A. K. Paul A. K. Sharma A. K. Solanki A. K. Vatsa A. Raji Reddy A. S. Manjunath 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform 357 Knowledge Management in a Research Organization 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and eLearning 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach Authors Abhijeet Gorey 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology Abhijeet Gorey 301 Energy Harvesting via Piezoelectricity Abhilasha Sharma 17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Abhilasha Vyas 190 Data Security From Malicious Attack: Computer Viruses Abhipal Singh 172 File Transfer Using Secure Sockets in Linux Environment Abhishek Khemka 193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing Problem Abhishek Tandon 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy Abid Yunus Salati 46 Managing Knowledge Workers During Turbulent Times Adil Siddiqui 142 Electronic Judicial System Authors Ajay D. Parikh Ajay Tiwari Ajendra Isaacs Ajendra Isaacs Ajit More Akanksha Gupta Akash Tayal Akash Tayal 43 Software Design Pattern for e-Governance Solution Framework 68 Managing Information Overload in Distributed Computing Environment 348 Ad-hoc Networking Protocols a Brief Treatise 349 Data Mining for Digital Libraries – A New Paradigm 424 Applying Rough-Sets to Assist the Decision Making for ERP Implementation 106 Query Optimization in Heterogeneous Distributed Databases 67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker Recognition 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Authors Akash Tayal 230 Nonlinear Circuit Modelling Using Volterra Series Akhil Jindal 201 A Novel Software Architecture for Network Security Testing Akhilesh K Sharma 158 Dual Firewall Technology for VPN Network Akshay Anand 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing Alok Kumar Dutt Amandeep Makkar 368 Laptops Security Application Using RFID 73 Performance Evaluation of Protocols for Secure Routing Over MANET Amit Kour 335 A Study of Concurrency and Recovery Techniques in Databases Amit Kumar 244 Analysis of Time Complexity in Binary Search Tree Amit Kumar 251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black Tree Authors Amit Kumar 260 Maximum Number of Keys in B –Tree of Height K Amit Madan 284 Multi-Module Security: Bio-Secure Steganographic System Amit Sirohi 130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication System Amrit Kaur 415 Technology: Third Medium of Instruction Amrutha. V 115 Improving the Effectiveness of Inspection Through Verification and Validation Anand K Pandey 87 A Review of Software Process Models and Methodologies Anand Paropkari 274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced by Senior Citizens While Using Mobile Phones Anil Kumar 147 Open Source Software Quality – An Issue of Concern Authors Anil T. Gaikwad 97 Core Banking and Its Implementation Anil Ticku 146 Telemedicine in India - A Model for Jammu & Kashmir State Animesh Tripathy 198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous Environment Aninda Banerjee 226 A New Technique for Detection and Location of Human Faces in Digital Image Anisur Rehman 315 Current-Mode Oscillator Using Single DVCC Nasir Anjali Gupta 318 Low Power Design Strategies for SoCs Anjali Gupta 385 GSM Security and Encryption Ankita Jhawar Ankita Lathey 69 Data Mining and Knowledge Discovery 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Authors Anshu Chowdhary 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries Anshul Agrawal 351 Secure and User Interactive Information Extraction in Linux Distributions Anu. G. Aggarwal 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy Anubha Bansal 372 An Effective Approach for Disaster Prevention Using GSM Anup Singh Kushwaha 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network Anuradha Sharma Anuradha Taluja 53 Performance of Static Interconnection of Computer Network Through UML 162 Information and Communication Technology (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview Authors Anurag Jain 329 Tones and Break Indices for Speech Processing - A Review Anurag Jain 406 PRAAT Implementation for Prosody Conversion Anurag Jain 407 Emotion Conversion in Hindi Language Anurag Singh 267 Digital Watermarking: Advanced Technique in Chauhan Image and Video Technology Anurag Srivastava 368 Laptops Security Application Using RFID Anurag Srivastava 321 An Extended GCLP Algorithm for Hardware Software Partitioning Anusha Bhatnagar 362 Application of Genetic Algorithm in Oil Drilling Problem Apoorva Shukla 311 Comparative Study of Ontology Merging Algorithms Archana Agarwal 329 Tones and Break Indices for Speech Processing - A Review Authors Archana B Saxena Archana Saxena 29 Rural e-Banking: Gaps, Inefficiencies, Emerging Solution Through Mobile Terminals at Customer Door-Step 128 Search Engines - "Issues and Improvements“ Archana Sharma 157 E-Commerce : Improving Performance of Customer Knowledge Management Ardhendu Mandal 223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements Specification Arnab Samanta 378 Increasing Network Security Using Laws of Networking and Quantum Mechanics Arti Agarwal 339 Virtual Instrumentation for Biomedical Applications Arti Patle 78 Data Mining with Support Vector Machine Aruna Tiwari 55 An Intelligent Blackjack Game Using Reinforcement Learning Algorithms Arunkumar. V 207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print Images Authors Arvind Jaiswal 408 Quandary Elucidating Tactics of Water Resource Management by Information Technology Arvind Singh Chandel Arvind Upadhyay 55 An Intelligent Blackjack Game Using Reinforcement Learning Algorithms 52 Strategies for Wavelength Assignment in WDM Optical Networks 269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity Computation 270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video Frames 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach 373 Real Time Operating Systems (RTOS) Asaad A. M. Al-Salih Asaad A. M. Al-Salih Asha Gowda Karegowda Ashima Wadhwa Authors Ashish B. Sasankar 391 Role of EEG Lab for Analyzing Electroencephalogram Signal Ashish Gupta 301 Energy Harvesting via Piezoelectricity Ashish Surywanshi 158 Dual Firewall Technology for VPN Network Ashish Valuskar Ashok Kumar Sharma Ashok Kumar Sinha 385 GSM Security and Encryption 40 Information and Management Science in Developing Inventory Policies for ServiceSensitive Items 102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network Ashwini Kale 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture Ashwini Kumar 57 Web Supported Expert System for Learning Asma Shibli 327 Comparison Factors for the Selection of Enterprise Resource Planning (ERP) Implementation Strategy Authors Atikant Shrivastava 318 Low Power Design Strategies for SoCs Atikant Shrivastava 385 GSM Security and Encryption Avanish Kumar 17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Avijit Dutta 184 Collaborative Knowledge with Cloud Computing Avishek Banerjee 379 Bengali-English Relevant Cross Lingual Information Access Using Finite Automata Avneesh Chauhan 450 Software Reliability Growth Modeling for Distributed Environment Using ComponentSpecific Testing-Effort Functions Ayushi Ameriya 69 Data Mining and Knowledge Discovery B Bandyopadhyay 20 Providing Security of Fingerprint Images Through Digital Watermarking B N Chatterjii 20 Providing Security of Fingerprint Images Through Digital Watermarking Authors B. R. Chandavarkar 381 Modifications in the Working Model and Handoff Mechanism of MIPv6 B. V. Ramana Murthy 94 A Methodology for Successful Project Management in Medium Scale Enterprises B. V. Ramana Murthy 95 Applying Agile & Web Engineering Technique for Successful Web Management B. V. Ramana 96 Designing a Web Education Model for Murthy Effective Teaching - Learning Process Barjesh Kochar 366 A New Approach of Extraction Transformation Loading Using Pipelining Beneyaz Ara Begum 198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous Environment 359 Study of Internet Usage in Veterinary and Agricultural Sciences Bharat B. Bhagat Authors Bharat Singh 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting Bharati Yelikar 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management Bharti 324 Texture Based Image Retrieval With an Application to CBIR Bhavna Bajpai 18 Knowledge Management: Information & Knowledge Sharing Through Intranet Bhavsingh Maloth 261 Evaluation of Integration Algorithms for Meta Search Engine Bhavsingh Maloth 304 A Software Tool to Access Evolutionary Algorithms for Data Bhawana Sharma 161 Analysis of Software Threats and Software Security Authors Bhawana Sharma 252 Software Metrics Vis–a-Vis Software Vulnerability Bhupendra Singh 186 Online Voting System Bibhudatta Sahoo 412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc Networks Bratin Bhattacharya 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases C. Komalavalli 93 Query Optimization in Homogenous Distributed Database Management System C. Naga Raju 231 A Novel Edge Detection Technique for Color Images C. S. Rai 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network Chandan Kalra 386 Emerging Trends of IT in Healthcare Sector Chandra Shekhar 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting Authors Chandrakanth G Pujari 122 Implementation of Multivariate Clustering Methods for Software Development Chandrakanth H. Gowda D. A. Vidhate 325 Advanced Demodulation Scheme for the CDMA System 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands 324 Texture Based Image Retrieval With an Application to CBIR 255 Recovery of Mobile Internet Transactions 257 Potential Air Traffic Congestion Solution: Slot Allocation by Auction Method 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands 231 A Novel Edge Detection Technique for Color Images 147 Open Source Software Quality – An Issue of Concern 136 Aspect Oriented Programming Java RMI Server D. N. Verma D. Rama Rao D. Rama Rao D. V. Guleria D. V. M. Krishna Dalip Bhat Dalwinder Singh Salaria Authors Debadutta Mohanty 135 A New Type of Covering Based Generalized Rough Set Deepa Gangwani 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases Deepak Singh Chouhan Deepali Shahane Deepshikha Deepshikha Bhargava Deepshikha Jamwal Deepshikha Jamwal Deepshikha Jamwal 78 Data Mining with Support Vector Machine 340 Advantages of ERP System in SMEs 392 User Interactive Web Content Adaptation for Mobile Devices 49 Threats and Innovations of Information Security in the 21st Century 60 Cloud Computing: Its Security & Privacy aspects 62 Improving QoS in Video Multicasting 161 Analysis Of Software Threats and Software Security Authors Deepshikha Jamwal Deepshikha Jamwal Deepshikha Jamwal Deepshikha Jamwal Deepti Nayar Deepti Sharma Deepti Sharma Devanand 62 Dark Side of Cyber Crime in India: A Case Study 252 Software Metrics Vis–a-Vis Software Vulnerability 254 Software Reuse: A Systematic Review 272 Status of Use of IT Tools in SMEs in Jammu and Kashmir 82 Emerging Techniques for Online Analytical Processing and its Visualization 29 Rural e-Banking: Gaps, Inefficiencies, Emerging Solution Through Mobile Terminals at Customer Door-Step 108 A Solution to Load Balancing Problem in Object Oriented Clusters 133 Reusability in Component Based Development Process Model in Software Development Authors Devanand 139 Role of ICT in Narrowing the Digital Divide in India Dhawal Shrivastava 301 Energy Harvesting via Piezoelectricity Dheeraj Mehrotra 50 Towards 21st Century Classrooms: The Quality Requisite! Dhiraj S. Rajani 116 Robust Steganography Using Secure Password Protected Scheme Divya Goel 234 Need for CCL in Grid Computing Divya Leekha 176 Corporate Strategies Adopted by IT Industry to Beat the Global Crisis Divya Setia 406 PRAAT Implementation for Prosody Conversion Divya Setia 407 Emotion Conversion in Hindi Language Divya. T. V. 247 Context Aware Multicasting Scheme for Delay Tolerant Mobile Networks Ela Kumar 383 Network Aware Routing Protocol for MANET Authors Esha Saxena Faheem Masoodi G. Gayatri G. N. Purohit G. Pramod G. Pramod G. R. Bamnote G. Ram Mohana Reddy G. S. Sambyal 167 Analyzing Steganographic Algorithm in Java by Function Point Technique 452 Comparative Analysis of Structures and Attacks on Various Stream Ciphers 99 Bio - Informatics 26 IPv6 Transition - An Engineering Exercise or a Necessity? 237 The Network Security Assessment Instrument to Reduce Software Security Risk 238 Software Testing Scenario 232 Enhanced Security for Audio Signals Using Steganography 381 Modifications in the Working Model and Handoff Mechanism of MIPv6 204 Dark Side of Cyber Crime in India: A Case Study Authors G. Vakula Rani 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms Garima Verma 175 Reducing LOC and Cyclomatic Complexity Gautam 359 Study of Internet Usage in Veterinary and Agricultural Sciences Gautam Dhameja 347 AOEB: Energy Aware Routing Scheme for Wireless Sensor Networks Geetanjali 422 Application of Mobile Banking Services in the Bank Area Geetanjali Surange 24 Personalized Web Search: User Modeling Using Implicit Feedback From Click Through Data Geetika Kapoor 56 Prioritization of Test Cases for Regression Testing Gopal Kamal 66 e-Commerce, Taxation in the Age of Birds Without Shadows Authors Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System Gurjeet Kaur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software Gurneet Singh Sethi 172 File Transfer Using Secure Sockets in Linux Environment Gurvinder Singh 371 Critical Evaluation of Applications of Expert Systems Gurvinder Singh 372 An Effective Approach for Disaster Prevention Using GSM Gurvinder Singh 374 Evaluation of Network Congestion Controlling Approaches Gurvinder Singh 375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography Authors Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach for Query Processing H. Umadevi 325 Advanced Demodulation Scheme for the CDMA System Harish Kumar 162 Information and Communication Technology Taluja (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview Harmanpreet Kaur 409 A New Generation of Electronic Commerce Harneet Kaur 230 Nonlinear Circuit Modelling Using Volterra Series Harpreet Parashar 144 Reduction of Parasitic Capacitance for Transmission with the Help of CPL Harshita Sharma 67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker Recognition Authors Harsimerjeet Khurana Himali Natekar Himanshu Sharma 34 Public Entrepreneurship: A Dynamic Strength for Budding Green Technology 176 Corporate Strategies Adopted by IT Industry to Beat the Global Crisis 93 Query Optimization in Homogenous Distributed Database Management System Himanshu Sharma 285 Effectiveness of DSDV Protocol Under Hidden Node Environment Himayatullah Sharief 344 An Efficient Knowledge Base Mutual Linker Framework Himayatullah Sharief 345 Competent Ranking Algorithm for Web-Based Search Engines Inderjit Singh Dhanoa 136 Aspect Oriented Programming Java RMI Server Iqbal Azam 192 Education Technology Based Models of Teaching and Learning Authors J. B. Singh J. P. Singh J. Reena J. Reena J. Reena Mathigolda Jagadeesh. G Jasdeep Singh Malik Jasleen Kaur Jaspal Singh Bhatia 102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network 330 Computing with DNA 242 Protected Content Based Image Retrieval 243 Relevance Feedback for Distributed Content Based Image Retrieval 278 Secure Routing for Mobile in Ad-hoc Network 115 Improving the Effectiveness of Inspection Through Verification and Validation 279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association Rules 172 File Transfer Using Secure Sockets in Linux Environment 235 On NTRU Cryptosystems and Timing Attacks Authors Jaswinder Kaur Jatan Saraf Jatan Saraf Jawed Ahmed Jaya Sil Jayanthi R Jewan Singh Jewan Singh 364 Evaluation System with Oracle 10g 312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks 313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability 341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech Recognition 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System 115 Improving the Effectiveness of Inspection Through Verification and Validation 188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State” 199 Information and Communication Technologies (ICT’s) for Sustainable Development in Agriculture “A Model for J&K State” Authors Joydeep Chowdhury Joydeep Chowdhury Jyoti Kharade Jyoti Mahajan Jyotirmay Patel Jyotish Kumar Jyotsna Nigam K B K S Durga 467 Significance of IT-enable BPR in Business Enterprise and in Customer end 469 Current Market Scenarios of High demand BPR implementation through BPM software 35 Citizen Centric e-Governance: Problems and Prospects 133 Reusability in Component Based Development Process Model in Software Development 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and eLearning 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging 353 Evaluating Web Crawler Algorithms 249 Hyperion Essbase Technology Authors K. C. Joshi K. Krishna Veni K. M. Mital K. P. Tripathi K. P. Tripathi K. P. Yadav 196 Reliability and N-version Programming in Software Fault Tolerance 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility 205 ICT and Emergency Medical Services 46 Managing Knowledge Workers During Turbulent Times 179 A Conceptual Framework of Ethics in Information Technology 331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto – System K. R. Radha Krishnan 394 Data Mining in Healthcare Sector K. R. Radha Krishnan K. Raja 396 Neuro-informatics in India - Problems and Trends 200 An Analysis of Rural Economic Geography using Spatial Data Mining Techniques Authors K. Raja K. Rajalakshmi K. Rajashekhar 418 An Analysis of Rural Economic Geography Using Spatial Data Mining Techniques 25 Solving Cellular Mobile Network’s Assignment Problem Using Iterative Local Search Algorithm 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission K. S. Gurumurthy 325 Advanced Demodulation Scheme for the CDMA System K. V. Madhu Murthy 54 Trust Aware Load Distribution in a Data Grid Environment K. V. N. Sunitha 224 A MAIL Reader in Telugu K. V. N. Sunitha 228 Voice Enabled Mail Reader-VMAIL K.Srinivasa Babu 94 A Methodology for Successful Project Management in Medium Scale Enterprises Authors Kalpana Yadav Kanchan Lata Bhardwaj Kanu Priya Aggarwal Kanupriya Chaturvedi Kapil Baliyan Kapila Kapoor Kashyap Rajpal Kavish Sehgal 450 Software Reliability Growth Modeling for Distributed Environment Using ComponentSpecific Testing-Effort Functions 403 Information Technology for Education, Health and Development 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure 69 Data Mining and Knowledge Discovery 392 User Interactive Web Content Adaptation for Mobile Devices 56 Prioritization of Test Cases for Regression Testing 319 Security Concern Using Aspect Oriented Programming (Aspect C) 319 Security Concern Using Aspect Oriented Programming (Aspect C) Authors Kavita Bhatnagar Kavita Thorat Kavleen Kaur Oberoi Khanhaiya Singh Khushbu Garg Kiran Kiran Kodanda Kumar Melpadi Kokula Krishna Hari. K 183 Security and Efficiency in Ad-hoc Mobile Network 52 Strategies for Wavelength Assignment in WDM Optical Networks 172 File Transfer Using Secure Sockets in Linux Environment 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network 83 Quality of Service for Mobile Ad-hoc Networks 88 Performance Analysis of Multi Media Ad-hoc Networks 320 Distributed Query Optimization: Use of Mobile Agents 120 On Demand Temporary Route Recovery for Frequent Link Failures in Ad-hoc Networks Authors Kokula Krishna Hari. K 121 Implementation of Weighted Rule Mining Algorithm for Wireless Sensor Networks Korra Bichya 242 Protected Content Based Image Retrieval Korra Bichya 243 Relevance Feedback for Distributed Content Based Image Retrieval Kranthi Kumar Amirineni 239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri Nets Kshama Paithankar 333 Identifying Parameters with Data Collection Methods for Software Development in View of Usability Kuldeep Bhardwaj 236 On NTRU Implementation: An Algorithmic Approach Kuldeep Kumar 219 Use of GA in Solution of TTP Kumar Kush 60 Cloud Computing: Its Security & Privacy aspects Kumar Kush 62 Improving QoS in Video Multicasting Authors Kumarjit Banerjee Lakshmi Kalyani Lalit Saraswat Lalla Atul Singh Chaurasia Latika Kharb Ligade Smita M Srikanth Yadav M. A. Jayaram 226 A New Technique for Detection and Location of Human Faces in Digital Image 377 Assessing Adoption of m-CRM in Education Centers 103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise Network 312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks 131 Software Testing vs. Code Inspection: What else for Verification & Validation? 210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites) 256 A Unit-Test Framework for Database Applications 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach Authors M. Abul Hasan M. Abdul Hasan M. Afshar Alam M. Afshar Alam M. Bala Krishna M. Kamil M. N. Doja M. N. Doja M. P. Thapaliyal M. Sivakumar 192 Education Technology Based Models of Teaching and Learning 263 e-Waste Management and Hazardous Effects on Environment 388 K-Means Clustering Using WEKA Interface 423 A Dynamic Load Balancing Algorithm for Web Applications 421 Mobility Management Techniques and QoS in Mobile WiMax 37 Logic Theory: A Journey from Digital System Design to Knowledge Based System Design 388 K-Means Clustering Using WEKA Interface 421 Mobility Management Techniques and QoS in Mobile WiMax 175 Reducing LOC and Cyclomatic Complexity 355 New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics Authors M. Sivakumar 356 Secured Remote Method Invocation Framework M. Suhaib Abbasi 192 Education Technology Based Models of Teaching and Learning M. Suhaib Abbasi 263 e-Waste Management and Hazardous Effects on Environment M. V. Lakshmaiah 413 Overview of the Grid Technology and eGovernance for e-Health Implementation in Africa Madaswamy Moni 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business Madhavi Pingili 8 Crawling the Web at Desktop Scales Madhavi Pingili 241 Potential Air Traffic Congestion Solution Slot Allocation by Auction Method Madhavi Pingili 287 Enterprise Collaboration Tool Madhavi Sinha 384 Role of Natural Language Processing in Community Structure Detection Authors Madhusudhana Rao D 266 An Efficient Solution for Evaluation Problem of HMM Mahamaya Mohanty 169 A Revitalized Dynamic Slicing Method for Program Testing and Debugging Mahamaya Mohanty Mahesh Grover 197 Testing Graphical User Interface Using Decision Based Sequence Diagrams 384 Role of Natural Language Processing in Community Structure Detection 207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print Images 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit 77 Network Monitoring: Topology, Methods and Issues 230 Nonlinear Circuit Modelling Using Volterra Series Malathy. C Malini M. Patil Mamta Sachdeva Manika Babbar Authors Manika Gupta 352 Data Mining and Audience Intelligence for Advertising Maninder Singh Suri Maninder Singh Suri 406 PRAAT Implementation for Prosody Conversion 407 Emotion Conversion in Hindi Language Manish Saraswat 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture 89 Resource Based Grid Scheduling Algorithm 357 Knowledge Management in a Research Organization 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility Manisha Kumari Manjot Bhatia Manju Shree Manjula Sanjay Authors Manmeet Singh Kapoor 326 Data Mining and Business Intelligence Technologies Manohar Lal 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models Manoj Kumar 36 A Directed Threshold Signature Scheme with Threshold Verification Manoj Kumar Pachariya 180 Model Testing: Is it Only A Special Case of Software Testing Mary Jacintha M 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey Mashaallah Basirzadeh 454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- Point Mayank Kulshrestha 80 Stock Market Expert Authors Mayank Kumar Md. Arif Md. Tabrez Nafis Meena. A Meenakshi Bhat Meenakshi Gupta 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission 189 Mobile E-Commerce: Payment System Security 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family 12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Sharma 142 Electronic Judicial System Meraj Ahmed Khan 327 Comparison Factors for the Selection of Enterprise Resource Planning (ERP) Implementation Strategy Authors Mohamed Meftah Alrayes 423 A Dynamic Load Balancing Algorithm for Web Applications Mohammad Atique 203 Software Engineering Challenges: A Case Study Mohammad Pasha 182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETs Mohammad Pasha 400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet Simulator Mohammad 452 Comparative Analysis of Structures and Ubaidullah Bokhari Attacks on Various Stream Ciphers Mohammed Sharfuddin 94 A Methodology for Successful Project Management in Medium Scale Enterprises Mohammed Sharfuddin 95 Applying Agile & Web Engineering Technique for Successful Web Management Mohammed Sharfuddin 96 Designing a Web Education Model for Effective Teaching - Learning Process Authors Mohan H .S. Mohd Abdul Ahad Mohd. Rihan Mohd. Rihan Mohd. Sadiq Mohd. Umar Farooq Mohd. Umar Farooq Mohit Agrawal Mohit Mathur 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks 167 Analyzing Steganographic Algorithm in Java by Function Point Technique 334 Intelligent Control for Power System Applications 339 Virtual Instrumentation for Biomedical Applications 37 Logic Theory: A Journey from Digital System Design to Knowledge Based System Design 182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETs 400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet Simulator 312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks 107 Achieving Vertical Scalability: A Hindrance to Cloud Computing Authors Mohit Rai Mudita Shrivastava 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture Muneeza Afaq 334 Intelligent Control for Power System Applications Muqeem Ahmed 343 Semantic Grid E Learning Platform for Educational System N. Kalyani 224 A MAIL Reader in Telugu N. Kalyani 228 Voice Enabled Mail Reader-VMAIL N. Prasanna Balaji 241 Potential Air Traffic Congestion Solution Slot Allocation by Auction Method N. Prasanna Balaji 237 The Network Security Assessment Instrument to Reduce Software Security Risk N. Prasanna Balaji 238 Software Testing Scenario Authors N. Prasanna Balaji 242 Protected Content Based Image Retrieval N. Prasanna Balaji 243 Relevance Feedback for Distributed Content Based Image Retrieval N. Prasanna Balaji 287 Enterprise Collaboration Tool N. Ramachandran 86 A Simulation Study of Content Delivery Network Nadia Imdadi 91 Semantic Kernel for Automatic Integration of Semantic Repositories Namita Singh 204 Dark Side of Cyber Crime in India: A Case Study Nand Kumar 224 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University Nandita Sengupta 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System Narendra Gupta 349 Data Mining for Digital Libraries – A New Paradigm Authors Narendra Kumar Tyagi Nasreddin B. El Zoghbi Nasreddin B. El Zoghbi Navendu Nitin Navendu Nitin Navneet Sharma Navneet Tiwari Navneet Tiwari 190 Data Security From Malicious Attack: Computer Viruses 411 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University 413 Overview of the Grid Technology and eGovernance for e-Health Implementation in Africa 348 Ad-hoc Networking Protocols a Brief Treatise 349 Data Mining for Digital Libraries – A New Paradigm 403 Information Technology for Education, Health and Development 312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop Networks 313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability Authors Navneet Tiwari Neelima Relan Neeraj Gupta Neeta Wadhwa Nidhi Kohli Nikhil Jindal Nilesh M. Shelke Nilesh Mahajan Nipur 314 Living BEAM Elegant Wizards - The Future of Artificial Intelligence 235 On NTRU Cryptosystems and Timing Attacks 77 Network Monitoring: Topology, Methods and Issues 309 Cryptography and Mathematics 362 Application of Genetic Algorithm in Oil Drilling Problem 201 A Novel Software Architecture for Network Security Testing 401 A Practical Approach Towards Development of Applications and Solutions Using Java Agents 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management 132 Routing in Ad-hoc Networks Authors Nipur Niraj Saxena 380 Network Management and Routing Strategies with Mobile Agent 80 Stock Market Expert Nitant 148 Circuit Design with Independent Double Gate Transistors Nitasha Bisht 177 Full Substractor Circuit Design with Independent Double Gate MOSFET Nitesh Kumar 393 Development of Motherboard Ontology Using Protégé V3.4 Rc2 (Build 529) Niti Verma 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure Nitin Tyagi 81 Performance Comparison and Improvement of Routing Protocols - DSR Nitul Kaushik 128 Search Engines - "Issues and Improvements" Nnj Hemrom 357 Knowledge Management in a Research Organization Authors Nune Sreenivas 413 Nupur Prakesh 328 Nutan Jaiswal 177 O. P. Chaudhary O. P. Vyas 348 336 Om Prakash Verma 284 P. Balaram Papana 231 P. C. Jha 461 Overview of the Grid Technology and eGovernance for e-Health Implementation in Africa Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network Full Substractor Circuit Design with Independent Double Gate MOSFET Ad-hoc Networking Protocols a Brief Treatise Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks Multi-Module Security: Bio-Secure Steganographic System A Novel Edge Detection Technique for Color Images Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging Authors P. Elayaraja P. Elayaraja P. G. V. Suresh Kumar P. K. Jha P. K. Kapur P. K. Kapur P. K. Kapur 355 New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics 356 Secured Remote Method Invocation Framework 413 Overview of the Grid Technology and eGovernance for e-Health Implementation in Africa 399 Encryption Through Cascaded Recursive Addition of Blocks and Key Rotation of a Session Key (CRABKR) 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach 450 Software Reliability Growth Modeling for Distributed Environment Using ComponentSpecific Testing-Effort Functions 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy Authors P. K. Kapur 454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- Point P. K. Kapur 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging P. K. Kapur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software P. K. Srimani 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility P. K. Srimani 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms P. K. Srimani 376 Implementation of the K-Means Method for Single and Multidimensions Authors P. K. Srimani 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit P. L. Ramteke 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit P. N. Pandey 377 Assessing Adoption of m-CRM in Education Centers P. Sivaprakasam 86 A Simulation Study of Content Delivery Network P. Sowjanya 286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication P.C.Jha 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme P.K.Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy Authors P.N.Pandey 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey Pallav Parkhe 101 Broadband - Wire Line Technology Pallavi Satpule 316 Points-to Analysis of RMI-Based Java Programs Pankaj Chauhan 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network Pankaj Kumar 338 A New Approaches for Fingerprint Sharma Recognition Based on Fourier Transformed Selected Image (FTSI) Algorithms Pankaj Singh Yadav 103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise Network Parag Parandkar 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter Parag Parandkar 211 Cost Effective Mass Transit Tracking System Authors Parag Parandkar 301 Energy Harvesting via Piezoelectricity Parag Parandkar 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology Parag Parandkar 318 Low Power Design Strategies for SoCs Parimalendu Bandyopadhya 467 Significance of IT-enable BPR in Business Enterprise and in Customer end Parimalendu Bandyopadhya 469 Current Market Scenarios of High demand BPR implementation through BPM software Parmod Kumar 288 Intrusion Detection Approach to Secure Adhoc Networks Parul Goyal Parul Kharub Pawan Jindal 4 Discrete Sequence Wavelet Transform NUC Algorithm 65 Inorganic Expert: Automation of Inorganic Chemistry 244 Analysis of Time Complexity in Binary Search Tree Authors Pawan Jindal Pawan Jindal Peeyush Mathur Pooja Gautam Pooja Kherwa Prachi Goyal Pradeep Aswal Pradeep K. Naik Pradeepta Bhattacharya 251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black Tree 260 Maximum Number of Keys in B –Tree of Height K 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting 229 Fuzzy logic - A New Powerful Technology 353 Evaluating Web Crawler Algorithms 279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association Rules 51 Recent Development in Databases and Future Directions 42 CMOS Implementation of Cell Signaling for Cell Death 116 Robust Steganography Using Secure Password Protected Scheme Authors Prakash K. Mishra 392 User Interactive Web Content Adaptation for Mobile Devices Prashant Johri 450 Software Reliability Growth Modeling for Distributed Environment Using ComponentSpecific Testing-Effort Functions Prashant K. Thete 222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large Organizations Prashanth G. K. 59 The State-of-The-Art Concepts in Software Testing Praveen Kumar 338 A New Approaches for Fingerprint Singh Rathor Recognition Based on Fourier Transformed Selected Image (FTSI) Algorithms Praveen Kumar 354 Discussion of Ad-hoc On Demand Tripathi Distance Vector (AODV) Routing Protocol for Mobile Hosts Praveena 380 Network Management and Routing Strategies Chaturvedi with Mobile Agent Authors Pravin Chandra Preeti Arora Preeti Dubey Prema P. Nair Prince Priyank Kumar Priyanka Bhutani Priyanka Pandit Priyanka Singh Priyanka Tayal 310 A Survey of Gateway Discovery Mechanism in Ad-hoc Networks 306 Delete File System Watcher - Storage Optimization Tool 139 Role of ICT in Narrowing the Digital Divide in India 165 Identity Begets Identity; Real or Reel? 186 Online Voting System 145 Parasitic Capacitances in Double Gate MOSFET 311 Comparative Study of Ontology Merging Algorithms 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology 272 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure 414 Multi-hop Streaming in Wireless Distributed Environment Authors Priyesh Kanungo 68 Managing Information Overload in Distributed Computing Environment Puja Gupta 34 Public Entrepreneurship: A Dynamic Strength for Budding Green Technology Puja Gupta 27 Web Services: Challenges in 21st Century Puneet Arora 80 Stock Market Expert Puneet Kumar 201 A Novel Software Architecture for Network Security Testing Puneet Tiwari 314 Living BEAM Elegant Wizards - The Future of Artificial Intelligence Pushpendar Singh 372 An Effective Approach for Disaster Prevention Using GSM R Singh 303 Position Based Multicast Routing Protocol for Ad-hoc Wireless Networks R. Bakyalakshmi 397 NAVIGUER Nisha Authors R. C. Tripathi R. L. Ujjwal R. P. Mahapatra R. Suganya R. V. Kulkarni R. W. Jasutkar R.B.Garg Rachit Patel Rahul Gupta 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network 263 e-Waste Management and Hazardous Effects on Environment 202 Volume Based Medical Image Registration by Maximization of Mutual Information 74 Role of Information Technology in Health Care 23 Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy 144 Reduction of Parasitic Capacitance for Transmission with the Help of CPL 129 e-Mail Services: "Features and Scope" Authors Rahul Sharma Rahul Singh Raj Kumar Raj Kumar Sain Raja. K Rajat Mehrotra Rajeev Paulus Rajeev Paulus Rajender Singh 107 Achieving Vertical Scalability: A Hindrance to Cloud Computing 354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile Hosts 187 Conserving Energy of WSNs by Using 3Rs Way 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia Broadcasting 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering 414 Multi-hop Streaming in Wireless Distributed Environment 349 Data Mining for Digital Libraries – A New Paradigm 348 Ad-hoc Networking Protocols a Brief Treatise 131 Software Testing vs. Code Inspection: What else for Verification & Validation? Authors Rajender Singh Chhillar 366 A New Approach of Extraction Transformation Loading Using Pipelining Rajita Dixit 340 Advantages of ERP System in SMEs Rajiv Dharaskar 401 A Practical Approach Towards Development of Applications and Solutions Using Java Agents Rajiv Mahajan 308 Security Problem in the Film Industry Production and Distribution Process Rajiv Ranjan 331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto - System Rajkumar Singh Rathore 130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication System Rajni Gupta 346 Green Architecture: Principles and Technologies Authors Rajni Jindal Rakesh Kumar 201 A Novel Software Architecture for Network Security Testing 72 Use of Evolutionary Strategies in Software Testing Rakesh Kumar 351 Secure and User Interactive Information Extraction in Linux Distributions Rakesh P. B 215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes Algorithm Rakesh Vardhan 84 Improving and Sustaining Coconut Productivity: IT - A Means to Economic Benefit Rakesh Vardhan 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission Rama Rao Tandu 278 Secure Routing for Mobile in Ad-hoc Network Rashmi Pandey 87 A Review of Software Process Models and Methodologies Authors Ravi Kumar 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software Ravi Kumar Ravi 338 A New Approaches for Fingerprint Recognition Based on Fourier Transformed Selected Image (FTSI) Algorithms Ravi Prabh 351 Secure and User Interactive Information Extraction in Linux Distributions Ravinder Nath 414 Multi-hop Streaming in Wireless Distributed Rajotia Environment Ravleen Kaur 372 An Effective Approach for Disaster Prevention Using GSM Renavikar Ashwini 210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites) Rishi Kamal 66 e-Commerce, Taxation in the Age of Birds Without Shadows Rishi Kamal 92 Tomorrows Technology Today Ritika Arora Mehra 132 Routing in Ad-hoc Networks Authors Ritika Goyal 414 Multi-hop Streaming in Wireless Distributed Environment Ritika Wason 166 Recent Trends in Associative Rule Mining Ritu Arora 461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging Rohit Goyal 51 Recent Development in Databases and Future Directions Rohit Srivastava 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network Roopali Jamwal 272 Status of Use of IT Tools in SMEs in Jammu and Kashmir Ruchi Dagar 414 Multi-hop Streaming in Wireless Distributed Environment Ruchi Garg 285 Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi Patle 101 Broadband - Wire Line Technology Authors Ruchika Gupta Ruchika Sharma 271 Bio - Informatics, Bonding Genes With IT 414 Multi-hop Streaming in Wireless Distributed Environment Runumi Devi 38 A Novel Scheme for Prevention of Forgery and Alteration in Automated Cheque Payment System Runumi Devi 39 Application of Data Mining Techniques for Diabetic DataSet S Zeeshan Hussian 268 Distributed Media Player S. A. M. Rizvi 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family S. A. M. Rizvi 91 Semantic Kernel for Automatic Integration of Semantic Repositories S. A. M. Rizvi 262 Analytical Report on Software Refactoring S. A. M. Rizvi 267 Digital Watermarking: Advanced Technique in Image and Video Technology S. A. M. Rizvi 268 Distributed Media Player Authors S. A. M. Rizvi S. A. M. Rizvi 309 Cryptography and Mathematics 342 Notifying State Change of Model to Multiple Views Using Observer Pattern in Java S. A. M. Rizvi 343 Semantic Grid E Learning Platform for Educational System S. K. Muttoo 195 An Overview of Wavelet-Like Transforms and Image Data Hiding S. L. Satarkar 232 Enhanced Security for Audio Signals Using Steganography S. Madhumitha 397 NAVIGUER S. Naseem Ahmad 315 Current-Mode Oscillator Using Single DVCC S. P. Singh 392 User Interactive Web Content Adaptation for Mobile Devices S. S. Agrawal 232 Enhanced Security for Audio Signals Using Steganography S. S. Bhalla 408 Quandary Elucidating Tactics of Water Resource Management by Information Technology Authors S. T. Bodkhe S. Z. Hussain Saba Dalvi Saba Naaz Sachin Bhoite Safdar Tanweer Safdar Tanweer Sagar Gupta 391 Role of EEG Lab for Analyzing Electroencephalogram Signal 343 Semantic Grid E Learning Platform for Educational System 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture 310 A Survey of Gateway Discovery Mechanism in Ad-hoc Networks 280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of College 283 A Study on Effect of Replication on Databases 341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech Recognition 314 Living BEAM Elegant Wizards - The Future of Artificial Intelligence Authors Sajjad Akhtar 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business Salil Khare 142 Electronic Judicial System Salman Abdul Moiz 95 Applying Agile & Web Engineering Technique for Successful Web Management Salman Abdul Moiz 96 Designing a Web Education Model for Effective Teaching - Learning Process Sameena Naaz Sampada S. Gulavani 423 A Dynamic Load Balancing Algorithm for Web Applications 74 Role of Information Technology in Health Care Sandeep Dahiya 171 Information Technology Engineering Education in Haryana for a Knowledge Based Society Sandeep Kad 308 Security Problem in the Film Industry Production and Distribution Process Authors Sandeep Kautish 33 Consumer Privacy in 2nd Generation eCommerce Sandeep Mathur 21 Implementing IT in Disaster Management Sandesh Patil 316 Points-to Analysis of RMI-Based Java Programs Sangeeta Rawal 168 e - Learning: The Silent Revolution Sanjay Manhas 90 Data Mining: An approach to Increase the Success of E-Commerce Sanjeev Tayal 288 Intrusion Detection Approach to Secure Adhoc Networks Sanjib K. Sahu 346 Green Architecture: Principles and Technologies Sanjib K. Sahu 111 Wireless Power Transmission: Requirements & Issues Sanjib K. Sahu 113 Optimizing Semantic Web Search and Ranking Algorithms Authors Sansar Singh Chauhan Santanu Kumar Rath Santanu Kumar Rath Santosh Kumar Santosh Kumar Pani Santosh Kumar Yadav Santosh Kumar Yadav 347 AOEB: Energy Aware Routing Scheme for Wireless Sensor Networks 402 CPN Tools as a Supplement to UML for Validation of Software Requirements 239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri Nets 22 Distributed-Grid Databases Server Design and Implementation for Bio-Molecular Simulations 169 A Revitalized Dynamic Slicing Method for Program Testing and Debugging 235 On NTRU Cryptosystems and Timing Attacks 236 On NTRU Implementation: An Algorithmic Approach Authors Sapna Jain Saranya Sivasankaran Sarita Garg Satya Prakash Singh 388 K-Means Clustering Using WEKA Interface 227 Mr. Tacton (Embedded Red Tacton) 100 E - Governance: Whats and Ifs? 465 Qualitative Parametric Comparison of Matrix Multiplication Algorithms in Parallel and Distributed Computing Satyawan Hembade424 Applying Rough-Sets to Assist the Decision Making for ERP Implementation Satyendra Nath 226 A New Technique for Detection and Location Mandal of Human Faces in Digital Image Saumya Tyagi 230 Nonlinear Circuit Modelling Using Volterra Series Saurabh Saxena 111 Wireless Power Transmission: Requirements & Issues Savita Shiwani 26 IPv6 Transition - An Engineering Exercise or a Necessity? Authors Sayali Shende 176 Corporate Strategies Adopted by IT Industry to Beat the Global Crisis Seema D 209 Semantic Search-The New Paradigm of Information Retrieval on World Wide Web Seetharam. K 122 Implementation of Multivariate Clustering Methods for Software Development 357 Knowledge Management in a Research Organization Selvi S Shabbir Ahmed 221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area Architecture Shabbir Ahmed 192 Education Technology Based Models of Teaching and Learning Shabbir Ahmed 263 e-Waste Management and Hazardous Effects on Environment Shabbir Ahmed 183 Security and Efficiency in Ad-hoc Mobile Network Authors Shafi Patel Shaik Naseera 211 Cost Effective Mass Transit Tracking System 54 Trust Aware Load Distribution in a Data Grid Environment Shaily malik 363 Role Based and Credentials Based Access Control in Semantic Web Shalini Goel 124 Global Positioning System Shalini Vermani 166 Recent Trends in Associative Rule Mining Shallu 83 Quality of Service for Mobile Ad-hoc Networks Shallu 88 Performance Analysis of Multi Media Ad-hoc Networks Shankar B. Kshetry 330 Computing with DNA Shanthi Bhatt 117 Application of Keystroke Dynamics in Mobile Device Users Authentication Sharad Goyal 187 Conserving Energy of WSNs by Using 3Rs Way Shikha Nirmal 281 Web Science – An Interdisciplinary Approach to Understanding the Web Authors Shilpi Joshi 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries Shipra Kapoor 177 Full Substractor Circuit Design with Independent Double Gate MOSFET Shishir Kumar 244 Analysis of Time Complexity in Binary Search Tree Shishir Kumar 251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black Tree Shishir Kumar 260 Maximum Number of Keys in B –Tree of Height K Shivani Bali 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme Shivendra Goel 102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network Shivendra Goel 234 Need for CCL in Grid Computing Authors Shreya Dubey 371 Critical Evaluation of Applications of Expert Systems Shreya Dubey 375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography Shreya Dubey 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey Shruthi. K. R. 275 Automated Remote Data Logger Shruti Jain 42 CMOS Implementation of Cell Signaling for Cell Death Shubha Jain 354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile Hosts Shweta 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Shyamalesh Khan 357 Knowledge Management in a Research Organization Authors Siddarth Jain 313 WsVsSenNet: An Era of Enhanced Vision Based Sensing Capability Sikander 219 Use of GA in Solution of TTP Sohel Bhura 232 Enhanced Security for Audio Signals Using Steganography Soumya Maitra Sourish Banerjee 75 Lossy Image Compression Using Variable Run Length Encoding 226 A New Technique for Detection and Location of Human Faces in Digital Image 227 Mr. Tacton (Embedded Red Tacton) Srikkanth Govindaraajan Subhash Chander 250 e-Democracy Suchismita Chinara 239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri Nets Sudhanshu 85 Information Technology and Knowledge Deshpande Management: An Explorative Study Authors Sudip. K. Dey Suhasini. M Suman Mann Sumant Katiyal Sumant Katiyal Sumant Katiyal Sumant Katiyal Sumant Katiyal Sumant Katiyal Sumant Katiyal 375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography 58 Natural Relational Algebra: A New Approach for Query Processing 217 Fuzzy Logic System for Querying a Database 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter 211 Cost Effective Mass Transit Tracking System 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe Technology 301 Energy Harvesting via Piezoelectricity 318 Low Power Design Strategies for SoCs 372 An Effective Approach for Disaster Prevention Using GSM 374 Evaluation of Network Congestion Controlling Approaches Authors Sumant Katiyal 375 Increasing the Efficiency of Echo Hiding Digital Audio Steganography Sumit Chauhan 378 Increasing Network Security Using Laws of Networking and Quantum Mechanics Sumit Khanna 108 A Solution to Load Balancing Problem in Object Oriented Clusters Sumit Kumar 285 Effectiveness of DSDV Protocol Under Hidden Node Environment Sumit Madan 284 Multi-Module Security: Bio-Secure Steganographic System 218 Cyber Crime Management Using Evidence Based Software Engineering Banking and Insurance Industries 217 Fuzzy Logic System for Querying a Database Sunanda Chowdhary Sunanda Chowdhary Sunanda Chowdhary 216 Role and Scope of Support Vector Machine in Bioinformatics Authors Sunder Lal 36 A Directed Threshold Signature Scheme with Threshold Verification Sunil 37 Logic Theory: A Journey from Digital System Design to Knowledge Based System Design Sunil 167 Analyzing Steganographic Algorithm in Java by Function Point Technique Sunil Taneja 73 Performance Evaluation of Protocols for Secure Routing Over MANET Sunit Jaiswal 351 Secure and User Interactive Information Extraction in Linux Distributions Surabhi Deshpande 85 Information Technology and Knowledge Management: An Explorative Study Suraiya Parveen 283 A Study on Effect of Replication on Databases Suresh Pathare 280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of College Surjeet Singh 72 Use of Evolutionary Strategies in Software Testing Authors Susanta Kumar Nayak Sushant Kumar Sushil Kumar Swapan Bhattacharyya Swati Desai Swati Verma Syed I. Ahson Syed I. Ahson 104 Role of VoIP (Voice over Internet Protocol) in e-Business and e-Commerce 412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc Networks 195 An Overview of Wavelet-Like Transforms and Image Data Hiding 379 Bengali-English Relevant Cross Lingual Information Access Using Finite Automata 110 Role of Information Communication Technologies in Education 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure 269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity Computation 270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video Frames Authors Syed Imtiyaz Hassan Syed Mohiuddin Syed Mohiuddin T. Eshwar T. Eshwar T. M. Pattewar T. Santhanam T. Senthil Kumar T. Senthil Kumar 342 Notifying State Change of Model to Multiple Views Using Observer Pattern in Java 344 An Efficient Knowledge Base Mutual Linker Framework 345 Competent Ranking Algorithm for Web-Based Search Engines 345 Competent Ranking Algorithm for Web-Based Search Engines 344 An Efficient Knowledge Base Mutual Linker Framework 23 Real Time Monitoring of Patients Using Bio Signals Through Embedded Computer 117 Application of Keystroke Dynamics in Mobile Device Users Authentication 202 Volume Based Medical Image Registration by Maximization of Mutual Information 214 3D Atlas of Human Anatomy for Educational Purposes Authors T. Senthil Kumar T. Sivakumar Tamanna Siddiqui Tanaji D. Dabade Tanvi Dikshit Tanvir A. Abbasi Tanvir A. Abbasi Tanweer Alam Tanweer Alam 215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes Algorithm 247 Context Aware Multicasting Scheme for Delay Tolerant Mobile Networks 327 Comparison Factors for the Selection of Enterprise Resource Planning (ERP) Implementation Strategy 11 Information Technology Infrastructure Library (ITIL) 301 Energy Harvesting via Piezoelectricity 192 Education Technology Based Models of Teaching and Learning 263 e-Waste Management and Hazardous Effects on Environment 44 Advanced Mobility Models for Mobile Ad-hoc Networks 288 Intrusion Detection Approach to Secure Adhoc Networks Authors Tanya Jhamb Tapas Bandyopadhyay Tapasya Patki Tarun Pandeya Teena Tiwari Teenum Gupta Terence Johnson Tonu Sojatia 362 Application of Genetic Algorithm in Oil Drilling Problem 20 Providing Security of Fingerprint Images Through Digital Watermarking 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries 377 Assessing Adoption of m-CRM in Education Centers 333 Identifying Parameters with Data Collection Methods for Software Development in View of Usability 308 Security Problem in the Film Industry Production and Distribution Process 116 Robust Steganography Using Secure Password Protected Scheme 47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty Computation Authors Twinkle Bansal 67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker Recognition U. S. Pandey 168 e - Learning: The Silent Revolution U. S. Pandey 422 Application of Mobile Banking Services in the Bank Area U. Sreenivasulu 237 The Network Security Assessment Instrument to Reduce Software Security Risk U. Sreenivasulu 238 Software Testing Scenario Udaya Rani S 376 Implementation of the K-Means Method for Single and Multidimensions V. B. Aggarwal V. B. Singh 29 Rural e-Banking: Gaps, Inefficiencies, Emerging Solution Through Mobile Terminals at Customer Door-Step 454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- Point Authors V. K. Patle 336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks V. Kumar 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing V. M. Chavan 97 Core Banking and Its Implementation V. M. Chavan 179 A Conceptual Framework of Ethics in Information Technology V. M. Thakare 398 Content Based Face Retrieval V. Mansotra 133 Reusability in Component Based Development Process Model in Software Development V. Mansotra 188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State” Authors V. Mansotra V. Mansotra V. R. Kanagavalli V. R. Kanagavalli V. S. S. Yadavalli Vaishali Bhale Vandana Bhasin 199 Information and Communication Technologies (ICT’s) for Sustainable Development in Agriculture “A Model for J&K State” 335 A Study of Concurrency and Recovery Techniques in Databases 200 An Analysis of Rural Economic Geography using Spatial Data Mining Techniques 418 An Analysis of Rural Economic Geography Using Spatial Data Mining Techniques 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter 118 Impact of Speech Applications in HealthCare Organizations Authors Vandana Sharma Vandna Vandna Vanita Ben Dhagat Varunn Kaushik Vibhakar Mansotra Vibhakar Mansotra Vibhakar Mansotra Vibhakar Mansotra 48 Search Technique Implementation for Symbolic Reasoning Under Uncertainty 83 Quality of Service for Mobile Ad-hoc Networks 88 Performance Analysis of Multi Media Ad-hoc Networks 17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System 201 A Novel Software Architecture for Network Security Testing 90 Data Mining: An approach to Increase the Success of E-Commerce 146 Telemedicine in India - A Model for Jammu & Kashmir State 147 Open Source Software Quality – An Issue of Concern 359 Study of Internet Usage in Veterinary and Agricultural Sciences Authors Vijay B. Aggarwal Vijay B. Aggarwal Vijay B. Aggarwal Vijay Kumar Vijay Nehra Vijay Sabarish Pankajan Vijendra Rai Vikram Bali 82 Emerging Techniques for Online Analytical Processing and its Visualization 105 Commit Protocols and Their Issues in Distributed Databases 106 Query Optimization in Heterogeneous Distributed Databases 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach 171 Information Technology Engineering Education in Haryana for a Knowledge Based Society 214 3D Atlas of Human Anatomy for Educational Purposes 323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR Protocols and Their Performance Comparison 130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication System Authors Vimal Gaur Vimal Gaur Vinai George Biju Vinay Chopra Vinay Chopra Vinay Kumar Vinay Kumar Nassa Vinay Kumar Nassa 216 Role and Scope of Support Vector Machine in Bioinformatics 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries 402 CPN Tools as a Supplement to UML for Validation of Software Requirements 137 Bioinformatics: "Leading the Way to New Advancements" 138 Smart Antenna: “Smartness Going the Way of Technology” 30 Encryption Strength Lies Beyond Key Length: A Suggestive Approach 163 Project Management Efficiency Using Fuzzy Logic 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G Authors Vinay Mathur 65 Inorganic Expert: Automation of Inorganic Chemistry Vinay Sharma 105 Commit Protocols and Their Issues in Distributed Databases Vineet Kr. Sarawat 113 Optimizing Semantic Web Search and Ranking Algorithms Vineet Sharma 267 Digital Watermarking: Advanced Technique in Image and Video Technology Vineet Sharma 268 Distributed Media Player Vineeta 38 A Novel Scheme for Prevention of Forgery Khemchandani and Alteration in Automated Cheque Payment System Vineeta 39 Application of Data Mining Techniques for Khemchandani Diabetic DataSet Vinita Gupta 393 Development of Motherboard Ontology Using Protégé V3.4 Rc2 (Build 529) Vinita Rohilla 194 Comparison of Different Normal Forms Authors Vinod Sharma Vinod Sharma Vinod Sharma Vipin Saxena Vipin Sharma Vipin Sharma Vipin Sharma Viranjay M Srivastava 90 Data Mining: An approach to Increase the Success of E-Commerce 188 Information and Communication Technologies for strengthening Panchayati Raj in India “A Model for J&K State” 335 A Study of Concurrency and Recovery Techniques in Databases 53 Performance of Static Interconnection of Computer Network Through UML 216 Role and Scope of Support Vector Machine in Bioinformatics 217 Fuzzy Logic System for Querying a Database 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries 193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing Problem Authors Viranjay M. Srivastava Viranjay M. Srivastava Viranjay M. Srivastava Viranjay Mohan Srivastava Vishnu Swaroop 145 Parasitic Capacitances in Double Gate MOSFET 148 Circuit Design with Independent Double Gate Transistors 177 Full Substractor Circuit Design with Independent Double Gate MOSFET 144 Reduction of Parasitic Capacitance for Transmission with the Help of CPL 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System Vivek Bhola 384 Role of Natural Language Processing in Community Structure Detection Vriti Sidana 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure Y. Rajendra kumar 231 A Novel Edge Detection Technique for Color Images Authors Yash Hotchandani 80 Stock Market Expert Yatin Malhotra 65 Inorganic Expert: Automation of Inorganic Chemistry Yogesh Pingal 316 Points-to Analysis of RMI-Based Java Programs Zafar G. Sheikh 398 Content Based Face Retrieval Zeba Khanam 262 Analytical Report on Software Refactoring Zubair Ahmed Khan 183 Security and Efficiency in Ad-hoc Mobile Network Zubair Ahmed Khan 221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area Architecture 47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty Computation Zulfa Shaikh