This disc is designed so that you may locate papers by session or author, as well as with full text search.Papers originated as electronic files and were converted to Adobe Acrobat PDF file format for cross-platform access. Even though the viewing quality on your monitor may vary, all papers print clearly.Thank you and enjoy!
WelcomeINDIACom-2010
4th NATIONAL CONFERENCE ON"COMPUTING FOR NATIONAL
DEVELOPMENT
Organisers
click on the logo for more information
Sponsors
Technical Partners
Media Partners
www.bharatividyapeeth.eduwww.csidelhi.orgwww.ietedelhi.orgwww.ipu.ac.in
Guru Gobind Singh Indraprastha University established by Government of NCT of Delhi under the provisions of Guru Go bind Singh IndraprasthaUniversity Act, 1998 read with its Amendment in 1999.The University is recognized by University Grants Commission (UGC), India under section 12B of UGC Act.
The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three years. It has been accredited "A Grade" by NAAC during Feb - March 2007.
GGSIPU
www.ipu.ac.in
The IETE is the National Apex Professionalbody of Electronics and Telecommunication,Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognized by Ministry of HRD, GoI.
IETE Delhi is the largest centre of IETE andconducts coaching classes for the AMIETE andDIPIETE at its premises at Janakpuri, New Delhi.
IETE
Bharati Vidyapeeth
www.bvicam.in
The Computer Society of India, founded in 1965,is a non-profit, professional body where IT
professionals meet to exchange views and information, to learn and share ideas. CSI has
over 30,000 members to date, consisting of professionals with varied backgrounds. Today it has 62 chapters and 100 plus student branches
spread all over the country. Established in late 60s, Delhi Chapter is one of the largest chapters of CSI, having strength of more than 1000 members. Delhi Chapter has
been awarded the Best Chapter award for 2005-2006.
CSI
www.csidelhi.org
Sponsors
Technical Partners
Media Partners
Groups Group I Group II Group III
Tracks ( G I ) Track #1: Digital World Track #2: Web Technologies, Computer
Networks & Information Security Track #3: Software Engineering, Database
And Data Mining Track #4: High Performance Computing
Tracks ( G II ) Track #1: Digital World Track #2: Web Technologies, Computer
Networks & Information Security Track #3: Software Engineering, Database
And Data Mining Track #4: High Performance Computing
Tracks ( G III ) Track #1: Digital World Track #2: Web Technologies, Computer
Networks & Information Security Track #3: Software Engineering, Database
And Data Mining Track #4: High Performance Computing
34 Public Entrepreneurship: A Dynamic Strength for Budding Green TechnologyPuja Gupta and Harsimerjeet Khurana
35 Citizen Centric e-Governance: Problems and ProspectsJyoti Kharade
37 Logic Theory: A Journey from Digital System Design to Knowledge Based System DesignMohd. Sadiq, Sunil and M. Kamil
40 Information and Management Science in Developing Inventory Policies for Service-Sensitive ItemsAshok Kumar Sharma
Track 1: Digital World (G - I)
43 Software Design Pattern for e-Governance Solution FrameworkAjay D. Parikh
46 Managing Knowledge Workers During Turbulent TimesAbid Yunus Salati and K. P. Tripathi
57 Web Supported Expert System for LearningAshwini Kumar
74 Role of Information Technology in Health CareSampada S. Gulavani and R. V. Kulkarni
97 Core Banking and Its ImplementationV. M. Chavan and Anil T. Gaikwad
Track 1: Digital World (G - I)
139 Role of ICT in Narrowing the Digital Divide in IndiaPreeti Dubey and Devanand
179 A Conceptual Framework of Ethics in Information TechnologyV. M. Chavan and K. P. Tripathi
188 Information and Communication Technologies for strengthening Panchayati Raj in India A Model for J&K StateJewan Singh, V. Mansotra and Vinod Sharma
192 Education Technology Based Models of Teaching and LearningIqbal Azam, M. Abul Hasan, Tanvir A. Abbasi, Shabbir Ahmed and M. Suhaib Abbasi
Track 1: Digital World (G - I)
205 ICT and Emergency Medical Services K. M. Mital
250 e-DemocracySubhash Chander
263 e-Waste Management M. Abul Hasan, Tanvir A. Abbasi, R. P. Mahapatra, Shabbir Ahmed and M. Suhaib Abbasi
287 Enterprise Collaboration ToolMadhavi pingili and N. Prasanna Balaji
301 Energy Harvesting via PiezoelectricityTanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and Sumant Katiyal
Track 1: Digital World (G - I)
327 Comparison Factors for the Selection of ERP Implementation StrategyTamanna Siddiqui, Meraj Ahmed Khan and Asma Shibli
337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-LearningJyotirmay Patel and A. K. Solannki
343 Semantic Grid E Learning Platform for Educational SystemS. A. M. Rizvi, S. Z. Hussain and Muqeem Ahmed
359 Study of Internet Usage in Veterinary and Agricultural SciencesBharat B. Bhagat, Gautam and Vibhakar Mansotra
Track 1: Digital World (G - I)
377 Assessing Adoption of m-CRM in Education CentersLakshmi Kalyani, Tarun Pandeya and P. N. Pandey
413 Overview of the Grid Technology and e-Governance for e-Health Implementation in AfricaNasreddin B. El Zoghbi, M. V. Lakshmaiah, P. G. V. Suresh Kumar and Nune Sreenivas
415 Technology: Third Medium of InstructionAmrit Kaur
422 Application of Mobile Banking Services in the Bank AreaU. S. Pandey and Geetanjali
Track 1: Digital World (G - I)
17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Avanish Kumar, Abhilasha Sharma and Vanita Ben Dhagat
30 Encryption Strength Lies Beyond Key Length: A Suggestive ApproachVinay Kumar
38 A Novel Scheme for Prevention of Forgery and Alteration in Automated Cheque Payment SystemVineeta Khemchandani and Runumi Devi
63 VANET: Application of Mobile Communication in Road TrafficPrashant G. Tandale
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
73 Performance Evaluation of Protocols for Secure Routing Over MANETSunil Taneja, Ashwani Kush and Amandeep Makkar
95 Applying Agile & Web Engineering Technique for Successful Web ManagementB. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin
104 Role of VoIP (Voice over Internet Protocol) in e-Business and e-CommerceSusanta Kumar Nayak
132 Routing in Ad-hoc NetworksRitika Arora Mehra and Nipur
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
167 Analyzing Steganographic Algorithm in Java by Function Point TechniqueMohd Abdul Ahad, Esha Saxena and Sunil
172 File Transfer Using Secure Sockets in Linux EnvironmentAbhipal Singh, Gurneet Singh Sethi, Kavleen Kaur Oberoi and Jasleen Kaur
191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 TransmitterParag Parandkar, Sumant Katiyal and Vaishali Bhale
224 A MAIL Reader in TeluguK. V. N. Sunitha and N. Kalyani
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
235 On NTRU Cryptosystems and Timing AttacksSantosh Kumar Yadav, Jaspal Singh Bhatia and Neelima Relan
236 On NTRU Implementation: An Algorithmic Approach Santosh Kumar Yadav and Kuldeep Bhardwaj
239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri NetsKranthi Kumar Amirineni, Suchismita Chinara and Santanu Kumar Rath
247 Context Aware Multicasting Scheme for Delay Tolerant Mobile NetworksDivya. T. V. and T. Sivakumar
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
285 Effectiveness of DSDV Protocol Under Hidden Node EnvironmentRuchi Garg, Himanshu Sharma and Sumit Kumar
303 Position Based Multicast Routing Protocol for Ad-hoc Wireless NetworksA K Daniel and R Singh
309 Cryptography and MathematicsS. A. M. Rizvi and Neeta Wadhwa
310 A Survey of Gateway Discovery Mechanism in Ad-hoc NetworksSaba Naaz and Pravin Chandra
323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR Protocols Vijendra Rai
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
325 Demodulation Scheme for the CDMA SystemH. Umadevi, Chandrakanth H. Gowda, K. S. Gurumurthy
328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB NetworkAnup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and Nupur Prakesh
336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor NetworksA. K. Dwivedi, V. K. Patle and O. P. Vyas
354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile HostsShubha Jain, Praveen Kumar Tripathi and RahulSingh
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
363 Role Based and Credentials Based Access Control in Semantic WebShaily malik
378 Increasing Network Security Using Laws of Networking and Quantum MechanicsArnab Samanta and Sumit Chauhan
381 Modifications in the Working Model and Handoff Mechanism of MIPv6B. R. Chandavarkar and G. Ram Mohana Reddy
399 Encryption Through Cascaded Recursive Addition of Blocks and Session Key RotationP. K. Jha and A. K. Nayak
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet SimulatorMohammad Pasha and Mohd. Umar Farooq
414 Multi-hop Streaming in Wireless Distributed EnvironmentRavinder Nath Rajotia, Ritika Goyal, Priyanka Tayal, Ruchi Dagar, Ruchika Sharma and Rajat Mehrotra
423 A Load Balancing Algo for Web ApplicationsSameena Naaz, Mohamed Meftah Alrayes and M. Afshar Alam
Track 2: Web Technologies, Computer Networks & Information Security (G - I)
39 Application of Data Mining Techniques for Diabetic DataSetRunumi Devi and Vineeta Khemchandani
90 Data Mining: An approach to Increase the Success of E-CommerceSanjay Manhas, Vinod Sharma and Vibhakar Mansotra
147 Open Source Software Quality An Issue of ConcernAnil Kumar, Vibhakar Mansotra and Dalip Bhat
197 Testing Graphical User Interface Using Decision Based Sequence DiagramsMahamaya Mohanty
Track 3: Software Engineering, Database And Data Mining (G - I)
201 A Novel Software Architecture for Network Security TestingRajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal, Sidharth Chhabra and Varunn Kaushik
218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance IndustriesSunanda Chowdhary, Shilpi Joshi, Tapasya Patki, Vipin Sharma, Anshu Chowdhary, A. B. Patki and Vimal Gaur
223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements SpecificationArdhendu Mandal
244 Analysis of Time Complexity in Binary Search TreePawan Jindal, Amit Kumar and Shishir Kumar
Track 3: Software Engineering, Database And Data Mining (G - I)
251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black TreePawan Jindal, Amit Kumar and Shishir Kumar
262 Analytical Report on Software RefactoringS. A. M. Rizvi and Zeba Khanam
273 Introducing Machine Intelligence Quotient as a New COTS Evaluation MeasurePriyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, Niti Verma, Swati Verma and A. B. Patki
277 A Literature Review of Methods Used in Software Industries for Successful Software Project managementNilesh Mahajan and Bharati Yelikar
283 A Study on Effect of Replication on DatabasesSuraiya Parveen and Safdar Tanweer
Track 3: Software Engineering, Database And Data Mining (G - I)
332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care UnitP. K. Srimani and Malini M. Patil
333 Identifying Parameters with Data Collection Methods for Software Development in View of UsabilityTeena Tiwari and Kshama Paithankar
335 A Study of Concurrency and Recovery Techniques in DatabasesAmit Kour, Vinod Sharma and V. Mansotra
342 Notifying State Change of Model to Multiple Views Using Observer Pattern in JavaS. A. M. Rizvi and Syed Imtiyaz Hassan
Track 3: Software Engineering, Database And Data Mining (G - I)
349 Data Mining for Digital Libraries A New ParadigmAjendra Isaacs, Rajeev Paulus, Navendu Nitin and Narendra Gupta
351 Secure and User Interactive Information Extraction in Linux DistributionsSunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh Kumar
402 CPN Tools as a Supplement to UML for Validation of Software RequirementsVinai George Biju and Santanu Kumar Rath
419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating SystemGyanendra Kumar, Gupta Shubha Jain, Vishnu Swaroop and A. K. Sharma
Track 3: Software Engineering, Database And Data Mining (G - I)
449 Optimal Allocation of Testing Effort: A Control Theoretic ApproachP. K. Kapur, Udayan Chanda and Vijay Kumar
450 Software Reliability Growth Modeling for Distributed Environment Using Component-Specific Testing-Effort FunctionsP. K. Kapur, Kalpana Yadav, Avneesh Chauhan and Prashant Johri
453 Two Dimensional Flexible Software Reliability Growth Model and Related Release PolicyP. K. Kapur, R. B. Garg, Anu. G. Aggarwal and Abhishek Tandon
454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- PointV. B. Singh P. K. Kapur and Mashaallah Basirzadeh
Track 3: Software Engineering, Database And Data Mining (G - I)
456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect DebuggingV. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and Jyotish Kumar
459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular SoftwareAnu G. Aggarwal, P. K. Kapur, Gurjeet Kaur and Ravi Kumar
461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect DebuggingP. C. Jha, Ritu Arora and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G - I)
463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block SchemeP.C.Jha, Shivani Bali and P. K. Kapur
Track 3: Software Engineering, Database And Data Mining (G - I)
20 Providing Security of Fingerprint Images Through Digital WatermarkingTapas Bandyopadhyay, B Bandyopadhyay and B N Chatterjii
48 Search Technique Implementation for Symbolic Reasoning Under UncertaintyVandana Sharma
54 Trust Aware Load Distribution in a Data Grid EnvironmentShaik Naseera and K. V. Madhu Murthy
67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker RecognitionAkash Tayal, Harshita Sharma and Twinkle Bansal
Track 4: High Performance Computing (G - I)
76 In-silico Comprehensive Sequence and Structure Analysis of Proteases FamilyMeenakshi Bhat and S. A. M. Rizvi
195 An Overview of Wavelet-Like Transforms and Image Data HidingSushil Kumar and S. K. Muttoo
211 Cost Effective Mass Transit Tracking SystemShafi Patel, Sumant Katiyal and Parag Parandkar
216 Role and Scope of Support Vector Machine in BioinformaticsSunanda Chowdhary, Vipin Sharma, A. B. Patki and Vimal Gaur
217 Fuzzy Logic System for Querying a DatabaseSunanda Chowdhary, Vipin Sharma, A. B. Patki and Suman Mann
Track 4: High Performance Computing (G - I)
230 Nonlinear Circuit Modelling Using Volterra SeriesHarneet Kaur, Manika Babbar, Saumya Tyagi and Akash Tayal
266 An Efficient Solution for Evaluation Problem of HMMMadhusudhana Rao D
269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity ComputationAsaad A. M. Al-Salih and Syed I. Ahson
270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video FramesAsaad A. M. Al-Salih and Syed I. Ahson
Track 4: High Performance Computing (G - I)
282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe TechnologyPriyanka Pandit, Parag Parandkar, Abhijeet Gorey and Sumant Katiyal
284 Multi-Module Security: Bio-Secure Steganographic SystemOm Prakash Verma, Amit Madan and Sumit Madan
311 Comparative Study of Ontology Merging AlgorithmsApoorva Shukla and Priyanka Bhutani
315 Current-Mode Oscillator Using Single DVCCAnisur Rehman Nasir and S. Naseem Ahmad
318 Low Power Design Strategies for SoCsAnjali Gupta, Atikant Shrivastava, Parag Parandkar and Sumant Katiyal
Track 4: High Performance Computing (G - I)
329 Tones and Break Indices for Speech Processing - A ReviewArchana Agarwal and Anurag Jain
334 Intelligent Control for Power System ApplicationsMohd. Rihan and Muneeza Afaq
339 Virtual Instrumentation for Biomedical ApplicationsMohd. Rihan and Arti Agarwal
376 Implementation of the K-Means Method for Single and MultidimensionsP. K. Srimani and Udaya Rani S
384 Role of Natural Language Processing in Community Structure DetectionVivek Bhola, Mahesh Grover and Madhavi Sinha
Track 4: High Performance Computing (G - I)
406 PRAAT Implementation for Prosody ConversionManinder Singh Suri, Divya Setia and Anurag Jain
407 Emotion Conversion in Hindi LanguageDivya Setia, Maninder Singh Suri and Anurag Jain
410 Dimension Reduction Using Rough Set Theory for Intrusion Detection SystemNandita Sengupta and Jaya Sil
Track 4: High Performance Computing (G - I)
29 Rural e-Banking: Gaps, Inefficiencies,Emerging Solution Through Mobile Terminals at Customer Door-StepV. B. Aggarwal, Deepti Sharma and Archana B Saxena
85 Information Technology and Knowledge Management: An Explorative StudySurabhi Deshpande and Sudhanshu Deshpande
96 Designing a Web Education Model for Effective Teaching - Learning Process B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin
146 Telemedicine in India - A Model for Jammu & Kashmir StateVibhakar Mansotra, Dalip Kumar Bhat and Anil Ticku
Track 1: Digital World (G - II)
157 E-Commerce : Improving Performance of Customer Knowledge ManagementArchana Sharma
176 Corporate Strategies Adopted by IT Industry to Beat the Global CrisisDivya Leekha, Himali Natekar and Sayali Shende
411 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University Nand Kumar and Nasreddin B. El Zoghbi
424 Applying Rough-Sets to Assist the Decision Making for ERP ImplementationAjit More and Satyawan Hembade
Track 1: Digital World (G - II)
26 IPv6 Transition - An Engineering Exercise or a Necessity?Savita Shiwani and G. N. Purohit
27 Web Services: Challenges in 21st CenturyHarsimerjeet Khurana and Puja Gupta
77 Network Monitoring: Topology, Methods and IssuesMamta Sachdeva and Neeraj Gupta
103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise NetworkLalit Saraswat and Pankaj Singh Yadav
Track 2: Web Technologies, Computer Networks & Information Security (G - II)
116 Robust Steganography Using Secure Password Protected SchemePradeepta Bhattacharya, Dhiraj S. Rajani and Terence Johnson
187 Conserving Energy of WSNs by Using 3Rs WayRaj Kumar and Sharad Goyal
421 Mobility Management Techniques and QoS in Mobile WiMaxM. N. Doja and M. Bala Krishna
Track 2: Web Technologies, Computer Networks & Information Security (G - II)
58 Natural Relational Algebra: A New Approach for Query ProcessingSuhasini. M and H. S. Nagalakshmi
59 The State-of-The-Art Concepts in Software TestingPrashanth G. K.
87 A Review of Software Process Models and MethodologiesAnand K Pandey and Rashmi Pandey
94 A Methodology for Successful Project Management in Medium Scale EnterprisesB.V.Ramanamurthy, K.Srinivasa Babu and Mohammed Sharfuddin
Track 3: Software Engineering, Database And Data Mining (G - II)
115 Improving the Effectiveness of Inspection Through Verification and ValidationJayanthi R, Amrutha. V and Jagadeesh. G
136 Aspect Oriented Programming Java RMI ServerInderjit Singh Dhanoa and Dalwinder Singh Salaria
169 A Revitalized Dynamic Slicing Method for Program Testing and DebuggingSantosh Kumar Pani and Mahamaya Mohanty
253 Dynamic Cluster Resource Allocations for Jobs with Known Memory DemandsD. A. Vidhate, A. K. Patil and D. V. Guleria
280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of CollegeSachin Bhoite and Suresh Pathare
Track 3: Software Engineering, Database And Data Mining (G - II)
91 Semantic Kernel for Automatic Integration of Semantic RepositoriesNadia Imdadi and S. A. M. Rizvi
231 A Novel Edge Detection Technique for Color ImagesC. Naga Raju, Y. Rajendra kumar, P. Balaram Papana and D. V. M Krishna
234 Need for CCL in Grid ComputingDivya Goel and Shivendra Goel
341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech RecognitionSafdar Tanweer and Jawed Ahmed
Track 4: High Performance Computing (G - II)
365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic AlgorithmsP. K. Srimani and G. Vakula Rani
Track 4: High Performance Computing (G - II)
11 Information Technology Infrastructure Library (ITIL)Tanaji D. Dabade
18 Knowledge Management: Information & Knowledge Sharing Through IntranetBhavna Bajpai
21 Implementing IT in Disaster ManagementSandeep Mathur
50 Towards 21st Century Classrooms: The Quality Requisite!Dheeraj Mehrotra
66 e-Commerce, Taxation in the Age of Birds Without ShadowsRishi Kamal and Gopal Kamal
Track 1: Digital World (G - III)
80 Stock Market ExpertNiraj Saxena, Yash Hotchandani, Mayank Kulshresthaand Puneet Arora
84 Improving and Sustaining Coconut Productivity: IT - A Means to Economic BenefitRakesh Vardhan
92 Tomorrows Technology TodayRishi Kamal
98 Design and Establishment of Information System in Rural Areas for Sustainable AgricultureMudita Shrivastava, Manisha Kumari, Saba Dalviand Ashwini Kale
Track 1: Digital World (G - III)
100 E - Governance: Whats and Ifs?Sarita Garg
101 Broadband - Wire Line TechnologyPallav Parkhe and Ruchi Patle
110 Role of Information Communication Technologies in EducationSwati Desai
118 Impact of Speech Applications in HealthCare OrganizationsVandana Bhasin
142 Electronic Judicial SystemAdil Siddiqui, Meenakshi Sharma, Manish and Salil Khare
Track 1: Digital World (G - III)
160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries BusinessSajjad Akhtar and Madaswamy Moni
162 Information and Communication Technology (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An OverviewHarish Kumar Taluja and Anuradha Taluja
165 Identity Begets Identity; Real or Reel?Prema P. Nair
186 Online Voting System Prince and Bhupendra Singh
Track 1: Digital World (G - III)
199 Information and Communication Technologies (ICTs) for Sustainable Development in Agriculture A Model for J&K StateJewan Singh and V. Mansotra
248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture MissionRakesh Vardhan, K. Rajashekhar and Md. Arif
272 Status of Use of IT Tools in SMEs in Jammu and KashmirRoopali Jamwal and Deepshikha Jamwal
274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced by Senior Citizens While Using Mobile PhonesAnand Paropkari
Track 1: Digital World (G - III)
317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3GVinay Kumar Nassa and Mohit Rai
340 Advantages of ERP System in SMEsRajita Dixit and Deepali Shahane
344 An Efficient Knowledge Base Mutual Linker FrameworkSyed Mohiuddin, Himayatullah Sharief and T. Eshwar
346 Green ArchitectureRajni Gupta and Sanjib K. Sahu
Track 1: Digital World (G - III)
357 Knowledge Management in a Research OrganizationManju Shree, Shyamalesh Khan, Nnj Hemrom, Selvi S and A K Paul
361 Implementation of Workflows Intuitive Formal Approach in BPO MultiplexingMayank Kumar, A. B. Patki, Akshay Anand and V. Kumar
371 Critical Evaluation of Applications of Expert SystemsGurvinder Singh, Shreya Dubey and Sumant Katiya
386 Emerging Trends of IT in Healthcare SectorChandan Kalra
Track 1: Digital World (G - III)
396 Neuro-informatics in India - Problems and TrendsK. R. Radha Krishnan
403 Information Technology for Education, Health and DevelopmentKanchan Lata Bhardwaj and Navneet Sharma
408 Quandary Elucidating Tactics of Water Resource Management by Information TechnologyArvind Jaiswal and S. S. Bhalla
409 A New Generation of Electronic CommerceHarmanpreet Kaur
Track 1: Digital World (G - III)
416 Improving the Quality of Organization Through ERP Systems: Indian Industry SurveyMary Jacintha M, Khanhaiya Singh and P.N.Pandey
467 Significance of IT-enable BPR in Business Enterprise and in Customer endParimalendu Bandyopadhyay and Joydeep Chowdhury
469 Current Market Scenarios of High demand BPR implementation through BPM softwareParimalendu Bandyopadhyay and Joydeep Chowdhury
470 Significance of IT-Enable Human Resource ManagementParimalendu Bandyopadhyay and Joydeep Chowdhury
Track 1: Digital World (G - III)
8 Crawling the Web at Desktop ScalesMadhavi Pingili
12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Gupta
24 Personalized Web Search: User Modeling Using Implicit Feedback From Click Through DataGeetanjali Surange
25 Solving Cellular Mobile Networks Assignment Problem Using Iterative Local Search AlgorithmK. Rajalakshmi
33 Consumer Privacy in 2nd Generation e-CommerceSandeep Kautish
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
36 A Directed Threshold Signature Scheme with Threshold Verification Sunder Lal and Manoj Kumar
44 Advanced Mobility Models for Mobile Ad-hoc NetworksTanweer Alam
47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty ComputationTonu Sojatia and Zulfa Shaikh
49 Threats and Innovations of Information Security in the 21st Century Deepshikha Bhargava
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
52 Strategies for Wavelength Assignment in WDM Optical NetworksArvind Upadhyay and Kavita Thorat
53 Performance of Static Interconnection of Computer Network Through UMLVipin Saxena and Anuradha Sharma
60 Cloud Computing: Its Security & Privacy aspectsDeepshikha Jamwal and Kumar Kush
62 Improving QoS in Video MulticastingDeepshikha Jamwal and Kumar Kush
81 Performance Comparison and Improvement of Routing Protocols - DSRNitin Tyagi
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
83 Quality of Service for Mobile Ad-hoc NetworksShallu, Vandna and Kiran
86 A Simulation Study of Content Delivery NetworkN. Ramachandran and P. Sivaprakasam
88 Performance Analysis of Multi Media Ad-hoc NetworksKiran, Vandna and Shallu
107 Achieving Vertical Scalability: A Hindrance to Cloud ComputingRahul Sharma and Mohit Mathur
111 Wireless Power Transmission: Requirements & IssuesSaurabh Saxena and Sanjib K. Sahu
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
113 Optimizing Semantic Web Search and Ranking AlgorithmsVineet Kr. Sarawat and Sanjib K. Sahu
117 Application of Keystroke Dynamics in Mobile Device Users AuthenticationT. Santhanam and Shanthi Bhatt
120 On Demand Temporary Route Recovery for Frequent Link Failures in Ad-hoc NetworksKokula Krishna Hari. K
121 Implementation of Weighted Rule Mining Algorithm for Wireless Sensor NetworksKokula Krishna Hari. K
124 Global Positioning SystemShalini Goel
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
128 Search Engines - "Issues and Improvements"Nitul Kaushik and Archana Saxena
129 e-Mail Services: "Features and Scope"Rahul Gupta and C Komalavalli
130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication SystemVikram Bali, Rajkumar Singh Rathore and Amit Sirohi
138 Smart Antenna: Smartness Going the Way of TechnologyVinay Chopra
158 Dual Firewall Technology for VPN NetworkAshish Surywanshi and Akhilesh K Sharma
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia BroadcastingPeeyush Mathur, Bharat Singh, Raj Kumar Sain and Chandra Shekhar
182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETsMohd. Umar Farooq and Mohammad Pasha
183 Security and Efficiency in Ad-hoc Mobile NetworkShabbir Ahmed, Kavita Bhatnagar and Zubair Ahmed Khan
184 Collaborative Knowledge with Cloud ComputingAvijit Dutta
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
189 Mobile E-Commerce: Payment System SecurityMd. Tabrez Nafis
190 Data Security From Malicious Attack: Computer VirusesNarendra Kumar Tyagi and Abhilasha Vyas
193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing ProblemAbhishek Khemka and Viranjay M Srivastava
198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous EnvironmentBeneyaz Ara Begum and Animesh Tripathy
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
204 Dark Side of Cyber Crime in India: A Case StudyNamita Singh, Deepshikha Jamwal and G. S. Sambyal
209 Semantic Search-The New Paradigm of Information Retrieval on World Wide Web Seema D
210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites)Renavikar Ashwini and Ligade Smita
220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc NetworksMohan H .S. and A. Raji Reddy
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area ArchitectureShabbir Ahmad and Zubair Ahmed Khan
222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large OrganizationsPrashant K. Thete
228 Voice Enabled Mail Reader-VMAILK. V. N. Sunitha and N. Kalyani
232 Enhanced Security for Audio Signals Using SteganographyG. R. Bamnote, S. L. Satarkar, S. S. Agrawal and Sohel Bhura
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
237 The Network Security Assessment Instrument to Reduce Software Security RiskN. Prasanna Balaji, U. Sreenivasulu and G. Pramod
241 Potential Air Traffic Congestion Solution Slot Allocation by Auction MethodMadhavi Pingili and N. Prasanna Balaji
255 Recovery of Mobile Internet TransactionsD. Rama Rao
257 Potential Air Traffic Congestion Solution: Slot Allocation by Auction MethodD. Rama Rao
261 Evaluation of Integration Algorithms for Meta -Search EngineBhavsingh Maloth
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
275 Automated Remote Data LoggerShruthi. K. R.
278 Secure Routing for Mobile in Ad-hoc NetworkRama Rao Tandu and J. Reena Mathigolda
281 Web Science An Interdisciplinary Approach to Understanding the Web Shikha Nirmal
286 Adaptive QoS for Mobile Web Services Through Cross-Layer CommunicationP. Sowjanya
288 Intrusion Detection Approach to Secure Ad-hoc NetworksTanweer Alam, Parmod Kumar and Sanjeev Tayal
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
308 Security Problem in the Film Industry Production and Distribution ProcessRajiv Mahajan, Teenum Gupta and Sandeep Kad
312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop NetworksMohit Agrawal, Lalla Atul Singh Chaurasia, Navneet Tiwari and Jatan Saraf
331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto - SystemRajiv Ranjan and K. P. Yadav
345 Competent Ranking Algorithm for Web-Based Search EnginesHimayatullah Sharief, Syed Mohiuddin and T. Eshwar
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
347 AOEB: Energy Aware Routing Scheme for Wireless Sensor NetworksSansar Singh Chauhan and Gautam Dhameja
348 Ad-hoc Networking Protocols a Brief TreatiseAjendra Isaacs, Navendu Nitin, Rajeev Paulus and O. P. Chaudhary
353 Evaluating Web Crawler AlgorithmsJyotsna Nigam and Pooja Kherwa
355 New Approach and Additional Security to Existing Cryptography Using Cubical CombinatoricsP. Elayaraja and M. Sivakumar
356 Secured Remote Method Invocation FrameworkP. Elayaraja and M. Sivakumar
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
368 Laptops Security Application Using RFIDAnurag Srivastava and Alok Kumar Dutt
372 An Effective Approach for Disaster Prevention Using GSMGurvinder Singh, Ravleen Kaur, Katiyal, Anubha Bansal and Pushpendar Singh
374 Evaluation of Network Congestion Controlling ApproachesGurvinder Singh, Sumant Katiyal and ShreyaDubey
375 Increasing the Efficiency of Echo Hiding Digital Audio SteganographyGurvinder Singh, Sudip. K. Dey, Shreya Dubey and Sumant Katiyal
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
380 Network Management and Routing Strategies with Mobile AgentPraveena Chaturvedi and Nipur
383 Network Aware Routing Protocol for MANETEla Kumar and Ravinder Nath Rajotiya
385 GSM Security and EncryptionAtikant Shrivastava, Anjali Gupta and Ashish Valuskar
389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile NetworkA. K. Vatsa, Khushbu Garg, Pankaj Chauhan and Rohit Srivastava
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
392 User Interactive Web Content Adaptation for Mobile DevicesPrakash K. Mishra, Kapil Baliyan, Deepshikha andS. P. Singh
401 A Practical Approach Towards Development of Applications and Solutions Using Java AgentsNilesh M. Shelke and Rajiv Dharaskar
412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc NetworksSushant Kumar and Bibhudatta Sahoo
452 Comparative Analysis of Structures and Attacks on Various Stream CiphersMohammad Ubaidullah Bokhari and Faheem Masoodi
Track 2: Web Technologies, Computer Networks & Information Security (G - III)
51 Recent Development in Databases and Future DirectionsPradeep Aswal and Rohit Goyal
56 Prioritization of Test Cases for Regression TestingKapila Kapoor and Geetika Kapoor
64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter ApproachAsha Gowda Karegowda, M. A. Jayaram and A. S. Manjunath
69 Data Mining and Knowledge DiscoveryAnkita Jhawar, Ayushi Ameriya and Kanupriya Chaturvedi
Track 3: Software Engineering, Database And Data Mining (G - III)
72 Use of Evolutionary Strategies in Software TestingSurjeet Singh and Rakesh Kumar
78 Data Mining with Support Vector MachineArti Patle and Deepak Singh Chouhan
82 Emerging Techniques for Online Analytical Processing and its VisualizationDeepti Nayar and Vijay B. Aggarwal
89 Resource Based Grid Scheduling AlgorithmManjot Bhatia
93 Query Optimization in Homogenous Distributed Database Management SystemHimanshu Sharma and C. Komalavalli
Track 3: Software Engineering, Database And Data Mining (G - III)
105 Commit Protocols and Their Issues in Distributed DatabasesVinay Sharma and Vijay B. Aggarwal
106 Query Optimization in Heterogeneous Distributed DatabasesAkanksha Gupta and Vijay B. Aggarwal
108 A Solution to Load Balancing Problem in Object Oriented ClustersSumit Khanna and Deepti Sharma
122 Implementation of Multivariate Clustering Methods for Software DevelopmentSeetharam. K and Chandrakanth G Pujari
Track 3: Software Engineering, Database And Data Mining (G - III)
131 Software Testing vs. Code Inspection: What else for Verification & Validation?Latika Kharb and Rajender Singh
133 Reusability in Component Based Development Process Model in Software DevelopmentJyoti Mahajan, Devanand and V. Mansotra
161 Analysis of Software Threats and Software Security Deepshikha Jamwal and Bhawana Sharma
166 Recent Trends in Associative Rule MiningShalini Vermani and Ritika Wason
180 Model Testing: Is it Only A Special Case of Software TestingManoj Kumar Pachariya
Track 3: Software Engineering, Database And Data Mining (G - III)
194 Comparison of Different Normal FormsVinita Rohilla
196 Reliability and N-version Programming in Software Fault ToleranceK. C. Joshi
200 An Analysis of Rural Economic Geography using Spatial Data Mining TechniquesV. R. Kanagavalli and K. Raja
203 Software Engineering Challenges: A Case StudyP. L. Ramteke and Mohammad Atique
208 Efficient Implementation of the Minimum Spanning Trees Based ClusteringMeena. A and Raja. K
Track 3: Software Engineering, Database And Data Mining (G - III)
238 Software Testing ScenarioN. Prasanna Balaji, U. Sreenivasulu and G. Pramod
249 Hyperion Essbase TechnologyK B K S Durga
252 Software Metrics Visa-Vis Software VulnerabilityDeepshikha Jamwal and Bhawana Sharma
254 Software Reuse: A Systematic ReviewDeepshikha Jamwal
256 A Unit-Test Framework for Database ApplicationsM Srikanth Yadav
Track 3: Software Engineering, Database And Data Mining (G - III)
260 Maximum Number of Keys in B Tree of Height KPawan Jindal, Amit Kumar and Shishir Kumar
268 Distributed Media PlayerS. A. M. Rizvi, S Zeeshan Hussian and Vineet Sharma
279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association RulesJasdeep Singh Malik, Prachi Goyal and Akhilesh K Sharma
304 A Software Tool to Access Evolutionary Algorithms for DataBhavsingh Maloth
Track 3: Software Engineering, Database And Data Mining (G - III)
306 Delete File System Watcher - Storage Optimization ToolPreeti Arora
316 Points-to Analysis of RMI-Based Java ProgramsYogesh Pingal, Pallavi Satpule and Sandesh Patil
319 Security Concern Using Aspect Oriented Programming (Aspect C)Kavish Sehgal and Kashyap Rajpal
320 Distributed Query Optimization: Use of Mobile AgentsKodanda Kumar Melpadi
321 An Extended GCLP Algorithm for Hardware Software PartitioningAnurag Srivastava
Track 3: Software Engineering, Database And Data Mining (G - III)
326 Data Mining and Business Intelligence TechnologiesManmeet Singh Kapoor
352 Data Mining and Audience Intelligence for AdvertisingManika Gupta
364 Evaluation System with Oracle 10gJaswinder Kaur
373 Real Time Operating Systems (RTOS)Ashima Wadhwa
387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test CasesBratin Bhattacharya and Deepa Gangwani
Track 3: Software Engineering, Database And Data Mining (G - III)
394 Data Mining in Healthcare SectorK. R. Radha Krishnan
395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) ModelsR. C. Tripathi, Manohar Lal, A. K. Malviya and Manish Saraswat
418 An Analysis of Rural Economic Geography Using Spatial Data Mining TechniquesV. R. Kanagavalli and K. Raja
Track 3: Software Engineering, Database And Data Mining (G - III)
4 Discrete Sequence Wavelet Transform NUC AlgorithmParul Goyal
22 Distributed-Grid Databases Server Design and Implementation for Bio-Molecular SimulationsSantosh Kumar
23 Real Time Monitoring of Patients Using Bio -Signals Through Embedded ComputerR. W. Jasutkar and T. M. Pattewar
42 CMOS Implementation of Cell Signaling for Cell DeathShruti Jain and Pradeep K. Naik
Track 4: High Performance Computing (G - III)
55 An Intelligent Blackjack Game Using Reinforcement Learning AlgorithmsArvind Singh Chandel and Aruna Tiwari
65 Inorganic Expert: Automation of Inorganic ChemistryVinay Mathur, Parul Kharub and Yatin Malhotra
68 Managing Information Overload in Distributed Computing EnvironmentAjay Tiwari and Priyesh Kanungo
75 Lossy Image Compression Using Variable Run Length EncodingSoumya Maitra
Track 4: High Performance Computing (G - III)
99 Bio - InformaticsG. Gayatri
102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural NetworkShivendra Goel, J. B. Singh and Ashok Kumar Sinha
135 A New Type of Covering Based Generalized Rough SetDebadutta Mohanty
137 Bioinformatics: "Leading the Way to New Advancements"Vinay Chopra
Track 4: High Performance Computing (G - III)
144 Reduction of Parasitic Capacitance for Transmission with the Help of CPLHarpreet Parashar, Rachit Patel and Viranjay Mohan Srivastava
145 Parasitic Capacitances in Double Gate MOSFETPriyank Kumar and Viranjay M. Srivastava
148 Circuit Design with Independent Double Gate TransistorsNitant and Viranjay M. Srivastava
163 Project Management Efficiency Using Fuzzy LogicVinay Kumar Nassa
Track 4: High Performance Computing (G - III)
175 Reducing LOC and Cyclomatic ComplexityGarima Verma and M. P. Thapaliyal
177 Full Substractor Circuit Design with Independent Double Gate MOSFETNitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay M. Srivastava
185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Shweta, Akash Tayal and Ankita Lathey
202 Volume Based Medical Image Registration by Maximization of Mutual InformationT. Senthil Kumar and R. Suganya
Track 4: High Performance Computing (G - III)
207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print ImagesArunkumar. V and Malathy. C
214 3D Atlas of Human Anatomy for Educational PurposesT. Senthil Kumar and Vijay Sabarish Pankajan
215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes AlgorithmRakesh P. B. and T. Senthil Kumar
219 Use of GA in Solution of TTPSikander and Kuldeep Kumar
Track 4: High Performance Computing (G - III)
226 A New Technique for Detection and Location of Human Faces in Digital ImageSatyendra Nath Mandal, Aninda Banerjee, Kumarjit Banerjee and Sourish Banerjee
227 Mr. Tacton (Embedded Red Tacton)Saranya Sivasankaran and Srikkanth Govindaraajan
229 Fuzzy logic - A New Powerful TechnologyPooja Gautam
242 Protected Content Based Image RetrievalN. Prasanna Balaji, J. Reena and Korra Bichya
243 Relevance Feedback for Distributed Content -Based Image RetrievalN. Prasanna Balaji and J. Reena and Korra Bichya
Track 4: High Performance Computing (G - III)
265 Integration of HIS with the Internet Appliance System for the Treatment of Human InfertilityP. K. Srimani, Manjula Sanjay and K. Krishna Veni
267 Digital Watermarking: Advanced Technique in Image and Video TechnologyS. A. M. Rizvi, Vineet Sharma and Anurag Singh Chauhan
271 Bio - Informatics, Bonding Genes With ITRuchika Gupta
276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data A. K. Patil and A. J. Patil
Track 4: High Performance Computing (G - III)
302 Phase-Based Image Matching Used for an Effective Approach for Iris RecognitionA. K. Patil and A. J. Patil
305 Primitive Image Transformations Used to Perform a Fast Fourier TransformA. K. Patil and A. J. Patil
313 WsVsSenNet: An Era of Enhanced Vision Based Sensing CapabilityNavneet Tiwari, Jatan Saraf and Siddarth Jain
314 Living BEAM Elegant Wizards - The Future of Artificial IntelligenceNavneet Tiwari, Sagar Gupta and Puneet Tiwari
Track 4: High Performance Computing (G - III)
324 Texture Based Image Retrieval With an Application to CBIRD. N. Verma and Bharti
330 Computing with DNAShankar B. Kshetry and J. P. Singh
338 A New Approaches for Fingerprint Recognition Based on Fourier Transformed Selected Image (FTSI) AlgorithmsPraveen Kumar Singh Rathor, Ravi Kumar Ravi and Pankaj Kumar Sharma
362 Application of Genetic Algorithm in Oil Drilling ProblemTanya Jhamb, Anusha Bhatnagar and Nidhi Kohli
Track 4: High Performance Computing (G - III)
366 A New Approach of Extraction Transformation Loading Using PipeliningRajender Singh Chhillar and Barjesh Kochar
379 Bengali-English Relevant Cross Lingual Information Access Using Finite AutomataAvishek Banerjee and Swapan Bhattacharyya
388 K-Means Clustering Using WEKA InterfaceSapna Jain, M. Afshar Aalam and M. N. Doja
391 Role of EEG Lab for Analyzing Electroencephalogram SignalAshish B. Sasankar N. G. Bawane and S. T. Bodkhe
Track 4: High Performance Computing (G - III)
393 Development of Motherboard Ontology Using Protg V3.4 Rc2 (Build 529)Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik
397 NAVIGUERR. Bakyalakshmi Nisha and S. Madhumitha
398 Content Based Face RetrievalZafar G. Sheikh and V. M. Thakare
Track 4: High Performance Computing (G - III)
AuthorsA. B. Patki 216 Role and Scope of Support Vector Machine in
BioinformaticsA. B. Patki 217 Fuzzy Logic System for Querying a DatabaseA. B. Patki 218 Cyber Crime Management Using Evidence
Based Software Engineering - Banking and Insurance Industries
A. B. Patki 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure
A. B. Patki 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
A. J. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data
A.J. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition
A. J. Patil 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform
AuthorsA. K. Daniel 303 Position Based Multicast Routing Protocol
for Ad-hoc Wireless NetworksA. K. Dwivedi 336 Evaluating Impact of Operating System
Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks
A. K. Malviya 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models
A. K. Nayak 399 Encryption Through Cascaded Recursive Addition of Blocks and Key Rotation of a Session Key (CRABKR)
A. K. Patil 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands
A. K. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data
A. K. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition
AuthorsA. K. Patil 305 Primitive Image Transformations Used to
Perform a Fast Fourier TransformA. K. Paul 357 Knowledge Management in a Research
OrganizationA. K. Sharma 419 Resource Scheduling in Mobile Distributed
Real Time Database Systems: A New Perception for Operating System
A. K. Solanki 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning
A. K. Vatsa 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network
A. Raji Reddy 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks
A. S. Manjunath 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach
AuthorsAbhijeet Gorey 282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe TechnologyAbhijeet Gorey 301 Energy Harvesting via PiezoelectricityAbhilasha Sharma 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing System Abhilasha Vyas 190 Data Security From Malicious Attack:
Computer VirusesAbhipal Singh 172 File Transfer Using Secure Sockets in Linux
EnvironmentAbhishek Khemka 193 Wireless Automatic Gate Sensing Alarm and
Smoke Alarm Especially for Persons with Hearing Problem
Abhishek Tandon 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Abid Yunus Salati 46 Managing Knowledge Workers During Turbulent Times
Adil Siddiqui 142 Electronic Judicial System
AuthorsAjay D. Parikh 43 Software Design Pattern for e-Governance
Solution FrameworkAjay Tiwari 68 Managing Information Overload in Distributed
Computing EnvironmentAjendra Isaacs 348 Ad-hoc Networking Protocols a Brief TreatiseAjendra Isaacs 349 Data Mining for Digital Libraries A New
ParadigmAjit More 424 Applying Rough-Sets to Assist the Decision
Making for ERP ImplementationAkanksha Gupta 106 Query Optimization in Heterogeneous
Distributed DatabasesAkash Tayal 67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
Akash Tayal 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique
AuthorsAkash Tayal 230 Nonlinear Circuit Modelling Using Volterra
SeriesAkhil Jindal 201 A Novel Software Architecture for Network
Security TestingAkhilesh K Sharma 158 Dual Firewall Technology for VPN NetworkAkshay Anand 361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
Alok Kumar Dutt 368 Laptops Security Application Using RFIDAmandeep Makkar 73 Performance Evaluation of Protocols for
Secure Routing Over MANETAmit Kour 335 A Study of Concurrency and Recovery
Techniques in DatabasesAmit Kumar 244 Analysis of Time Complexity in Binary Search
TreeAmit Kumar 251 Effect of Insertion and Immediately Deletion
of Inserted Node From Red Black Tree
AuthorsAmit Kumar 260 Maximum Number of Keys in B Tree of
Height KAmit Madan 284 Multi-Module Security: Bio-Secure
Steganographic SystemAmit Sirohi 130 A New Approach for Mobility Management in
the Wireless Network of a Mobile Communication System
Amrit Kaur 415 Technology: Third Medium of InstructionAmrutha. V 115 Improving the Effectiveness of Inspection
Through Verification and ValidationAnand K Pandey 87 A Review of Software Process Models and
MethodologiesAnand Paropkari 274 HCI Challenges in Using Mobile Devices: A
Study of Issues Faced by Senior Citizens While Using Mobile Phones
Anil Kumar 147 Open Source Software Quality An Issue of Concern
AuthorsAnil T. Gaikwad 97 Core Banking and Its ImplementationAnil Ticku 146 Telemedicine in India - A Model for Jammu &
Kashmir StateAnimesh Tripathy 198 A Novel Approach for Security Policy
Integration and Conflict Reconciliation in a Ubiquitous Environment
Aninda Banerjee 226 A New Technique for Detection and Location of Human Faces in Digital Image
Anisur Rehman 315 Current-Mode Oscillator Using Single DVCCNasirAnjali Gupta 318 Low Power Design Strategies for SoCsAnjali Gupta 385 GSM Security and EncryptionAnkita Jhawar 69 Data Mining and Knowledge DiscoveryAnkita Lathey 185 Modeling and Analyzing Wavelet Based
Watermarking System Using Game Theoretic Optimization Technique
Authors
Anshu Chowdhary 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries
Anshul Agrawal 351 Secure and User Interactive Information Extraction in Linux Distributions
Anu. G. Aggarwal 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
Anubha Bansal 372 An Effective Approach for Disaster Prevention Using GSM
Anup Singh 328 Design & Analysis of PHY Aware MAC for Low Kushwaha Power Low Rate UWB NetworkAnuradha Sharma 53 Performance of Static Interconnection of
Computer Network Through UMLAnuradha Taluja 162 Information and Communication Technology
(ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview
AuthorsAnurag Jain 329 Tones and Break Indices for Speech
Processing - A ReviewAnurag Jain 406 PRAAT Implementation for Prosody
ConversionAnurag Jain 407 Emotion Conversion in Hindi LanguageAnurag Singh 267 Digital Watermarking: Advanced Technique in Chauhan Image and Video TechnologyAnurag Srivastava 368 Laptops Security Application Using RFIDAnurag Srivastava 321 An Extended GCLP Algorithm for Hardware
Software PartitioningAnusha Bhatnagar 362 Application of Genetic Algorithm in Oil
Drilling ProblemApoorva Shukla 311 Comparative Study of Ontology Merging
AlgorithmsArchana Agarwal 329 Tones and Break Indices for Speech
Processing - A Review
AuthorsArchana B Saxena 29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals at Customer Door-Step
Archana Saxena 128 Search Engines - "Issues and ImprovementsArchana Sharma 157 E-Commerce : Improving Performance of
Customer Knowledge ManagementArdhendu Mandal 223 SRS BUILDER 1.0: An Upper Type CASE Tool
for Requirements SpecificationArnab Samanta 378 Increasing Network Security Using Laws of
Networking and Quantum MechanicsArti Agarwal 339 Virtual Instrumentation for Biomedical
ApplicationsArti Patle 78 Data Mining with Support Vector MachineAruna Tiwari 55 An Intelligent Blackjack Game Using
Reinforcement Learning AlgorithmsArunkumar. V 207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print Images
AuthorsArvind Jaiswal 408 Quandary Elucidating Tactics of Water
Resource Management by Information Technology
Arvind Singh 55 An Intelligent Blackjack Game UsingChandel Reinforcement Learning AlgorithmsArvind Upadhyay 52 Strategies for Wavelength Assignment in
WDM Optical NetworksAsaad A. M. 269 In-door Image Motion Detection with Objects Al-Salih Identification and Position Shift-Velocity
ComputationAsaad A. M. 270 A Machine Vision System for Motion Analysis Al-Salih and DFT-Velocity Computation in Out-door
Video FramesAsha Gowda 64 Feature Subset Selection in Medical Data Karegowda Mining Using Cascaded GA & CFS: A Filter
ApproachAshima Wadhwa 373 Real Time Operating Systems (RTOS)
AuthorsAshish B. Sasankar 391 Role of EEG Lab for Analyzing
Electroencephalogram SignalAshish Gupta 301 Energy Harvesting via PiezoelectricityAshish Surywanshi 158 Dual Firewall Technology for VPN NetworkAshish Valuskar 385 GSM Security and EncryptionAshok Kumar 40 Information and Management Science in Sharma Developing Inventory Policies for Service-
Sensitive ItemsAshok Kumar 102 Traffic Generation Model for Delhi Urban Area Sinha Using Artificial Neural NetworkAshwini Kale 98 Design and Establishment of Information
System in Rural Areas for Sustainable Agriculture
Ashwini Kumar 57 Web Supported Expert System for LearningAsma Shibli 327 Comparison Factors for the Selection of
Enterprise Resource Planning (ERP) Implementation Strategy
AuthorsAtikant Shrivastava 318 Low Power Design Strategies for SoCsAtikant Shrivastava 385 GSM Security and EncryptionAvanish Kumar 17 Maximal Link Mode Algorithm for Task
Allocation in Distributed Computing SystemAvijit Dutta 184 Collaborative Knowledge with Cloud
ComputingAvishek Banerjee 379 Bengali-English Relevant Cross Lingual
Information Access Using Finite AutomataAvneesh Chauhan 450 Software Reliability Growth Modeling for
Distributed Environment Using Component-Specific Testing-Effort Functions
Ayushi Ameriya 69 Data Mining and Knowledge DiscoveryB Bandyopadhyay 20 Providing Security of Fingerprint Images
Through Digital WatermarkingB N Chatterjii 20 Providing Security of Fingerprint Images
Through Digital Watermarking
AuthorsB. R. Chandavarkar 381 Modifications in the Working Model and
Handoff Mechanism of MIPv6B. V. Ramana 94 A Methodology for Successful ProjectMurthy Management in Medium Scale EnterprisesB. V. Ramana 95 Applying Agile & Web Engineering Technique Murthy for Successful Web ManagementB. V. Ramana 96 Designing a Web Education Model forMurthy Effective Teaching - Learning ProcessBarjesh Kochar 366 A New Approach of Extraction Transformation
Loading Using PipeliningBeneyaz Ara 198 A Novel Approach for Security PolicyBegum Integration and Conflict Reconciliation in a
Ubiquitous EnvironmentBharat B. Bhagat 359 Study of Internet Usage in Veterinary and
Agricultural Sciences
AuthorsBharat Singh 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia Broadcasting
Bharati Yelikar 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management
Bharti 324 Texture Based Image Retrieval With an Application to CBIR
Bhavna Bajpai 18 Knowledge Management: Information & Knowledge Sharing Through Intranet
Bhavsingh Maloth 261 Evaluation of Integration Algorithms for Meta -Search Engine
Bhavsingh Maloth 304 A Software Tool to Access Evolutionary Algorithms for Data
Bhawana Sharma 161 Analysis of Software Threats and Software Security
AuthorsBhawana Sharma 252 Software Metrics Visa-Vis Software
VulnerabilityBhupendra Singh 186 Online Voting System Bibhudatta Sahoo 412 Effect of Rushing Attack on DSR in Wireless
Mobile Ad-hoc NetworksBratin Bhattacharya 387 A Hybrid Black Box Technique for the
Selection of Optimum Number of Test CasesC. Komalavalli 93 Query Optimization in Homogenous
Distributed Database Management SystemC. Naga Raju 231 A Novel Edge Detection Technique for Color
ImagesC. S. Rai 328 Design & Analysis of PHY Aware MAC for Low
Power Low Rate UWB NetworkChandan Kalra 386 Emerging Trends of IT in Healthcare SectorChandra Shekhar 178 Next Generation Networks: Enhancing
Performance and Security for Providing Mobile Multimedia Broadcasting
AuthorsChandrakanth 122 Implementation of Multivariate ClusteringG Pujari Methods for Software Development
Chandrakanth 325 Advanced Demodulation Scheme for theH. Gowda CDMA SystemD. A. Vidhate 253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory DemandsD. N. Verma 324 Texture Based Image Retrieval With an
Application to CBIRD. Rama Rao 255 Recovery of Mobile Internet TransactionsD. Rama Rao 257 Potential Air Traffic Congestion Solution: Slot
Allocation by Auction MethodD. V. Guleria 253 Dynamic Cluster Resource Allocations for
Jobs with Known Memory DemandsD. V. M. Krishna 231 A Novel Edge Detection Technique for Color
ImagesDalip Bhat 147 Open Source Software Quality An Issue of
ConcernDalwinder Singh 136 Aspect Oriented Programming Java RMI Salaria Server
Authors
Debadutta Mohanty 135 A New Type of Covering Based Generalized Rough Set
Deepa Gangwani 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases
Deepak Singh 78 Data Mining with Support Vector MachineChouhanDeepali Shahane 340 Advantages of ERP System in SMEsDeepshikha 392 User Interactive Web Content Adaptation for
Mobile DevicesDeepshikha 49 Threats and Innovations of Information Bhargava Security in the 21st CenturyDeepshikha 60 Cloud Computing: Its Security & Privacy Jamwal aspectsDeepshikha 62 Improving QoS in Video MulticastingJamwalDeepshikha 161 Analysis Of Software Threats and Software Jamwal Security
Authors
Deepshikha 62 Dark Side of Cyber Crime in India: A Case Jamwal StudyDeepshikha 252 Software Metrics Visa-Vis SoftwareJamwal VulnerabilityDeepshikha 254 Software Reuse: A Systematic ReviewJamwalDeepshikha 272 Status of Use of IT Tools in SMEs in Jammu Jamwal and KashmirDeepti Nayar 82 Emerging Techniques for Online Analytical
Processing and its VisualizationDeepti Sharma 29 Rural e-Banking: Gaps, Inefficiencies,
Emerging Solution Through Mobile Terminals at Customer Door-Step
Deepti Sharma 108 A Solution to Load Balancing Problem in Object Oriented Clusters
Devanand 133 Reusability in Component Based Development Process Model in Software Development
Authors
Devanand 139 Role of ICT in Narrowing the Digital Divide in India
Dhawal Shrivastava 301 Energy Harvesting via PiezoelectricityDheeraj Mehrotra 50 Towards 21st Century Classrooms: The
Quality Requisite!Dhiraj S. Rajani 116 Robust Steganography Using Secure
Password Protected SchemeDivya Goel 234 Need for CCL in Grid ComputingDivya Leekha 176 Corporate Strategies Adopted by IT Industry
to Beat the Global CrisisDivya Setia 406 PRAAT Implementation for Prosody
ConversionDivya Setia 407 Emotion Conversion in Hindi LanguageDivya. T. V. 247 Context Aware Multicasting Scheme for Delay
Tolerant Mobile NetworksEla Kumar 383 Network Aware Routing Protocol for MANET
AuthorsEsha Saxena 167 Analyzing Steganographic Algorithm in Java
by Function Point TechniqueFaheem Masoodi 452 Comparative Analysis of Structures and
Attacks on Various Stream CiphersG. Gayatri 99 Bio - InformaticsG. N. Purohit 26 IPv6 Transition - An Engineering Exercise or a
Necessity?G. Pramod 237 The Network Security Assessment Instrument
to Reduce Software Security RiskG. Pramod 238 Software Testing ScenarioG. R. Bamnote 232 Enhanced Security for Audio Signals Using
Steganography
G. Ram Mohana 381 Modifications in the Working Model andReddy Handoff Mechanism of MIPv6G. S. Sambyal 204 Dark Side of Cyber Crime in India: A Case
Study
AuthorsG. Vakula Rani 365 A Comparative Study of Fast Matrix
Multiplication Methods by Using Vedic Algorithms
Garima Verma 175 Reducing LOC and Cyclomatic ComplexityGautam 359 Study of Internet Usage in Veterinary and
Agricultural SciencesGautam Dhameja 347 AOEB: Energy Aware Routing Scheme for
Wireless Sensor NetworksGeetanjali 422 Application of Mobile Banking Services in the
Bank AreaGeetanjali Surange 24 Personalized Web Search: User Modeling
Using Implicit Feedback From Click Through Data
Geetika Kapoor 56 Prioritization of Test Cases for Regression Testing
Gopal Kamal 66 e-Commerce, Taxation in the Age of Birds Without Shadows
Authors
Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System
Gurjeet Kaur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software
Gurneet Singh 172 File Transfer Using Secure Sockets in Linux Sethi EnvironmentGurvinder Singh 371 Critical Evaluation of Applications of Expert
SystemsGurvinder Singh 372 An Effective Approach for Disaster
Prevention Using GSMGurvinder Singh 374 Evaluation of Network Congestion
Controlling ApproachesGurvinder Singh 375 Increasing the Efficiency of Echo Hiding
Digital Audio Steganography
Authors
Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System
H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach for Query Processing
H. Umadevi 325 Advanced Demodulation Scheme for the CDMA System
Harish Kumar 162 Information and Communication Technology Taluja (ICT) - A Ram-Ban for Rural Development in
Uttar Pradesh : An OverviewHarmanpreet Kaur 409 A New Generation of Electronic CommerceHarneet Kaur 230 Nonlinear Circuit Modelling Using Volterra
SeriesHarpreet Parashar 144 Reduction of Parasitic Capacitance for
Transmission with the Help of CPLHarshita Sharma 67 A Novel Technique Combining Euclidian
Distance Measure and DHMM for Automatic Speaker Recognition
AuthorsHarsimerjeet 34 Public Entrepreneurship: A Dynamic Strength Khurana for Budding Green TechnologyHimali Natekar 176 Corporate Strategies Adopted by IT Industry
to Beat the Global CrisisHimanshu Sharma 93 Query Optimization in Homogenous
Distributed Database Management SystemHimanshu Sharma 285 Effectiveness of DSDV Protocol Under Hidden
Node EnvironmentHimayatullah 344 An Efficient Knowledge Base Mutual Linker Sharief FrameworkHimayatullah 345 Competent Ranking Algorithm for Web-Based Sharief Search EnginesInderjit Singh 136 Aspect Oriented Programming Java RMI Dhanoa ServerIqbal Azam 192 Education Technology Based Models of
Teaching and Learning
AuthorsJ. B. Singh 102 Traffic Generation Model for Delhi Urban Area
Using Artificial Neural NetworkJ. P. Singh 330 Computing with DNAJ. Reena 242 Protected Content Based Image RetrievalJ. Reena 243 Relevance Feedback for Distributed Content -
Based Image Retrieval
J. Reena 278 Secure Routing for Mobile in Ad-hoc NetworkMathigoldaJagadeesh. G 115 Improving the Effectiveness of Inspection
Through Verification and ValidationJasdeep Singh 279 A Comprehensive Approach Towards DataMalik Preprocessing Techniques & Association
RulesJasleen Kaur 172 File Transfer Using Secure Sockets in Linux
EnvironmentJaspal Singh 235 On NTRU Cryptosystems and Timing AttacksBhatia
AuthorsJaswinder Kaur 364 Evaluation System with Oracle 10gJatan Saraf 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop NetworksJatan Saraf 313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing CapabilityJawed Ahmed 341 The Noise-Robustness of Mel-Frequency
Cepstral Coefficients (MFCC) for Speech Recognition
Jaya Sil 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System
Jayanthi R 115 Improving the Effectiveness of Inspection Through Verification and Validation
Jewan Singh 188 Information and Communication Technologies for strengthening Panchayati Raj in India A Model for J&K State
Jewan Singh 199 Information and Communication Technologies (ICTs) for Sustainable Development in Agriculture A Model for J&K State
AuthorsJoydeep 467 Significance of IT-enable BPR in Business Chowdhury Enterprise and in Customer endJoydeep 469 Current Market Scenarios of High demand Chowdhury BPR implementation through BPM softwareJyoti Kharade 35 Citizen Centric e-Governance: Problems and
ProspectsJyoti Mahajan 133 Reusability in Component Based
Development Process Model in Software Development
Jyotirmay Patel 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning
Jyotish Kumar 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging
Jyotsna Nigam 353 Evaluating Web Crawler AlgorithmsK B K S Durga 249 Hyperion Essbase Technology
AuthorsK. C. Joshi 196 Reliability and N-version Programming in
Software Fault ToleranceK. Krishna Veni 265 Integration of HIS with the Internet Appliance
System for the Treatment of Human InfertilityK. M. Mital 205 ICT and Emergency Medical Services K. P. Tripathi 46 Managing Knowledge Workers During
Turbulent TimesK. P. Tripathi 179 A Conceptual Framework of Ethics in
Information TechnologyK. P. Yadav 331 Detecting and Preventing IP Spoofed Attack
by RSA Asymmetric Crypto SystemK. R. Radha 394 Data Mining in Healthcare SectorKrishnanK. R. Radha 396 Neuro-informatics in India - Problems and Krishnan TrendsK. Raja 200 An Analysis of Rural Economic Geography
using Spatial Data Mining Techniques
AuthorsK. Raja 418 An Analysis of Rural Economic Geography
Using Spatial Data Mining TechniquesK. Rajalakshmi 25 Solving Cellular Mobile Networks Assignment
Problem Using Iterative Local Search Algorithm
K. Rajashekhar 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission
K. S. Gurumurthy 325 Advanced Demodulation Scheme for the CDMA System
K. V. Madhu 54 Trust Aware Load Distribution in a Data Grid Murthy EnvironmentK. V. N. Sunitha 224 A MAIL Reader in TeluguK. V. N. Sunitha 228 Voice Enabled Mail Reader-VMAILK.Srinivasa Babu 94 A Methodology for Successful Project
Management in Medium Scale Enterprises
AuthorsKalpana Yadav 450 Software Reliability Growth Modeling for
Distributed Environment Using Component-Specific Testing-Effort Functions
Kanchan Lata 403 Information Technology for Education, Health Bhardwaj and DevelopmentKanu Priya 273 Introducing Machine Intelligence Quotient as Aggarwal a New COTS Evaluation MeasureKanupriya 69 Data Mining and Knowledge DiscoveryChaturvediKapil Baliyan 392 User Interactive Web Content Adaptation for
Mobile DevicesKapila Kapoor 56 Prioritization of Test Cases for Regression
TestingKashyap Rajpal 319 Security Concern Using Aspect Oriented
Programming (Aspect C)Kavish Sehgal 319 Security Concern Using Aspect Oriented
Programming (Aspect C)
AuthorsKavita Bhatnagar 183 Security and Efficiency in Ad-hoc Mobile
NetworkKavita Thorat 52 Strategies for Wavelength Assignment in
WDM Optical NetworksKavleen Kaur 172 File Transfer Using Secure Sockets in Linux Oberoi EnvironmentKhanhaiya Singh 416 Improving the Quality of Organization
Through ERP Systems: Indian Industry SurveyKhushbu Garg 389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile NetworkKiran 83 Quality of Service for Mobile Ad-hoc NetworksKiran 88 Performance Analysis of Multi Media Ad-hoc
NetworksKodanda Kumar 320 Distributed Query Optimization: Use of Mobile Melpadi AgentsKokula Krishna 120 On Demand Temporary Route Recovery for Hari. K Frequent Link Failures in Ad-hoc Networks
AuthorsKokula Krishna 121 Implementation of Weighted Rule MiningHari. K Algorithm for Wireless Sensor NetworksKorra Bichya 242 Protected Content Based Image RetrievalKorra Bichya 243 Relevance Feedback for Distributed Content -
Based Image RetrievalKranthi Kumar 239 Validation of Clustering Algorithms for Mobile Amirineni Ad-hoc Networks Using Colored Petri NetsKshama 333 Identifying Parameters with Data Collection Paithankar Methods for Software Development in View of
UsabilityKuldeep Bhardwaj 236 On NTRU Implementation: An Algorithmic
Approach Kuldeep Kumar 219 Use of GA in Solution of TTPKumar Kush 60 Cloud Computing: Its Security & Privacy
aspectsKumar Kush 62 Improving QoS in Video Multicasting
AuthorsKumarjit Banerjee 226 A New Technique for Detection and Location
of Human Faces in Digital ImageLakshmi Kalyani 377 Assessing Adoption of m-CRM in Education
CentersLalit Saraswat 103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an Enterprise Network
Lalla Atul Singh 312 Performance Analysis and QoS Assessment Chaurasia of Queues Over Multi - Hop NetworksLatika Kharb 131 Software Testing vs. Code Inspection: What
else for Verification & Validation?Ligade Smita 210 Empirical Study of Factors Affecting Success
of SNS (Social Networking Sites)M Srikanth Yadav 256 A Unit-Test Framework for Database
ApplicationsM. A. Jayaram 64 Feature Subset Selection in Medical Data
Mining Using Cascaded GA & CFS: A Filter Approach
AuthorsM. Abul Hasan 192 Education Technology Based Models of
Teaching and LearningM. Abdul Hasan 263 e-Waste Management and Hazardous Effects
on EnvironmentM. Afshar Alam 388 K-Means Clustering Using WEKA InterfaceM. Afshar Alam 423 A Dynamic Load Balancing Algorithm for Web
ApplicationsM. Bala Krishna 421 Mobility Management Techniques and QoS in
Mobile WiMaxM. Kamil 37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System DesignM. N. Doja 388 K-Means Clustering Using WEKA InterfaceM. N. Doja 421 Mobility Management Techniques and QoS in
Mobile WiMaxM. P. Thapaliyal 175 Reducing LOC and Cyclomatic ComplexityM. Sivakumar 355 New Approach and Additional Security to
Existing Cryptography Using Cubical Combinatorics
AuthorsM. Sivakumar 356 Secured Remote Method Invocation
FrameworkM. Suhaib Abbasi 192 Education Technology Based Models of
Teaching and LearningM. Suhaib Abbasi 263 e-Waste Management and Hazardous Effects
on EnvironmentM. V. Lakshmaiah 413 Overview of the Grid Technology and e-
Governance for e-Health Implementation in Africa
Madaswamy Moni 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business
Madhavi Pingili 8 Crawling the Web at Desktop ScalesMadhavi Pingili 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction MethodMadhavi Pingili 287 Enterprise Collaboration ToolMadhavi Sinha 384 Role of Natural Language Processing in
Community Structure Detection
AuthorsMadhusudhana 266 An Efficient Solution for Evaluation Problem Rao D of HMMMahamaya 169 A Revitalized Dynamic Slicing Method for Mohanty Program Testing and DebuggingMahamaya 197 Testing Graphical User Interface UsingMohanty Decision Based Sequence DiagramsMahesh Grover 384 Role of Natural Language Processing in
Community Structure DetectionMalathy. C 207 Multimodal Biometrics by Fusion of Finger
Vein and Finger Print ImagesMalini M. Patil 332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study of Health Care Unit
Mamta Sachdeva 77 Network Monitoring: Topology, Methods and Issues
Manika Babbar 230 Nonlinear Circuit Modelling Using VolterraSeries
AuthorsManika Gupta 352 Data Mining and Audience Intelligence for
AdvertisingManinder Singh 406 PRAAT Implementation for ProsodySuri ConversionManinder Singh 407 Emotion Conversion in Hindi LanguageSuriManish Saraswat 395 Software Reliability Assessment and
Prediction: Artificial Neural Network (ANN) Models
Manisha Kumari 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture
Manjot Bhatia 89 Resource Based Grid Scheduling AlgorithmManju Shree 357 Knowledge Management in a Research
OrganizationManjula Sanjay 265 Integration of HIS with the Internet Appliance
System for the Treatment of Human Infertility
AuthorsManmeet Singh 326 Data Mining and Business IntelligenceKapoor Technologies
Manohar Lal 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models
Manoj Kumar 36 A Directed Threshold Signature Scheme with Threshold Verification
Manoj Kumar 180 Model Testing: Is it Only A Special Case of Pachariya Software Testing
Mary Jacintha M 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey
Mashaallah 454 Instructions Executed Dependent Software Basirzadeh Reliability Growth Modeling for Open Source
Software by Considering Change- Point
Mayank 80 Stock Market ExpertKulshrestha
AuthorsMayank Kumar 361 Implementation of Workflows Intuitive Formal
Approach (An Emergency Response Workflow Tool) in BPO Multiplexing
Md. Arif 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission
Md. Tabrez Nafis 189 Mobile E-Commerce: Payment System Security
Meena. A 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering
Meenakshi Bhat 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family
Meenakshi Gupta 12 IPv4 vs IPv6 - Next Generation Internet Meenakshi 142 Electronic Judicial SystemSharmaMeraj Ahmed 327 Comparison Factors for the Selection ofKhan Enterprise Resource Planning (ERP)
Implementation Strategy
AuthorsMohamed Meftah 423 A Dynamic Load Balancing Algorithm for Web Alrayes ApplicationsMohammad Atique 203 Software Engineering Challenges: A Case
StudyMohammad Pasha 182 VAMS: An Effective Approach for Vehicle
Assisted Messaging Scheme in VANETsMohammad Pasha 400 A Study of Wi-Fi Enabled Vehicular Networks
Using QualNet SimulatorMohammad 452 Comparative Analysis of Structures and Ubaidullah Bokhari Attacks on Various Stream CiphersMohammed 94 A Methodology for Successful Project Sharfuddin Management in Medium Scale EnterprisesMohammed 95 Applying Agile & Web Engineering Technique Sharfuddin for Successful Web ManagementMohammed 96 Designing a Web Education Model for Sharfuddin Effective Teaching - Learning Process
AuthorsMohan H .S. 220 Evaluating the Performance of Various
Architectures for Wireless Ad-hoc NetworksMohd Abdul Ahad 167 Analyzing Steganographic Algorithm in Java
by Function Point TechniqueMohd. Rihan 334 Intelligent Control for Power System
ApplicationsMohd. Rihan 339 Virtual Instrumentation for Biomedical
ApplicationsMohd. Sadiq 37 Logic Theory: A Journey from Digital System
Design to Knowledge Based System DesignMohd. Umar 182 VAMS: An Effective Approach for Vehicle Farooq Assisted Messaging Scheme in VANETsMohd. Umar 400 A Study of Wi-Fi Enabled Vehicular Networks Farooq Using QualNet SimulatorMohit Agrawal 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop NetworksMohit Mathur 107 Achieving Vertical Scalability: A Hindrance to
Cloud Computing
Authors
Mohit Rai 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G
Mudita Shrivastava 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture
Muneeza Afaq 334 Intelligent Control for Power System Applications
Muqeem Ahmed 343 Semantic Grid E Learning Platform for Educational System
N. Kalyani 224 A MAIL Reader in TeluguN. Kalyani 228 Voice Enabled Mail Reader-VMAILN. Prasanna Balaji 241 Potential Air Traffic Congestion Solution Slot
Allocation by Auction MethodN. Prasanna Balaji 237 The Network Security Assessment
Instrument to Reduce Software Security RiskN. Prasanna Balaji 238 Software Testing Scenario
AuthorsN. Prasanna Balaji 242 Protected Content Based Image RetrievalN. Prasanna Balaji 243 Relevance Feedback for Distributed Content -
Based Image RetrievalN. Prasanna Balaji 287 Enterprise Collaboration ToolN. Ramachandran 86 A Simulation Study of Content Delivery
NetworkNadia Imdadi 91 Semantic Kernel for Automatic Integration of
Semantic RepositoriesNamita Singh 204 Dark Side of Cyber Crime in India: A Case
StudyNand Kumar 224 Improving Academic Performance of
Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University
Nandita Sengupta 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System
Narendra Gupta 349 Data Mining for Digital Libraries A New Paradigm
AuthorsNarendra Kumar 190 Data Security From Malicious Attack: Tyagi Computer VirusesNasreddin B. El 411 Improving Academic Performance of Zoghbi Students by Using Online Real Time
Attendance Monitoring: A Case Study At Al Fateh University
Nasreddin B. El 413 Overview of the Grid Technology and e-Zoghbi Governance for e-Health Implementation in
AfricaNavendu Nitin 348 Ad-hoc Networking Protocols a Brief TreatiseNavendu Nitin 349 Data Mining for Digital Libraries A New
ParadigmNavneet Sharma 403 Information Technology for Education,
Health and DevelopmentNavneet Tiwari 312 Performance Analysis and QoS Assessment
of Queues Over Multi - Hop NetworksNavneet Tiwari 313 WsVsSenNet: An Era of Enhanced Vision
Based Sensing Capability
AuthorsNavneet Tiwari 314 Living BEAM Elegant Wizards - The Future of
Artificial IntelligenceNeelima Relan 235 On NTRU Cryptosystems and Timing AttacksNeeraj Gupta 77 Network Monitoring: Topology, Methods and
IssuesNeeta Wadhwa 309 Cryptography and MathematicsNidhi Kohli 362 Application of Genetic Algorithm in Oil
Drilling ProblemNikhil Jindal 201 A Novel Software Architecture for Network
Security TestingNilesh M. Shelke 401 A Practical Approach Towards Development
of Applications and Solutions Using Java Agents
Nilesh Mahajan 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management
Nipur 132 Routing in Ad-hoc Networks
Authors
Nipur 380 Network Management and Routing Strategies with Mobile Agent
Niraj Saxena 80 Stock Market ExpertNitant 148 Circuit Design with Independent Double Gate
TransistorsNitasha Bisht 177 Full Substractor Circuit Design with
Independent Double Gate MOSFETNitesh Kumar 393 Development of Motherboard Ontology Using
Protg V3.4 Rc2 (Build 529)Niti Verma 273 Introducing Machine Intelligence Quotient as
a New COTS Evaluation MeasureNitin Tyagi 81 Performance Comparison and Improvement of
Routing Protocols - DSRNitul Kaushik 128 Search Engines - "Issues and Improvements"Nnj Hemrom 357 Knowledge Management in a Research
Organization
AuthorsNune Sreenivas 413 Overview of the Grid Technology and e-
Governance for e-Health Implementation in Africa
Nupur Prakesh 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network
Nutan Jaiswal 177 Full Substractor Circuit Design with Independent Double Gate MOSFET
O. P. Chaudhary 348 Ad-hoc Networking Protocols a Brief TreatiseO. P. Vyas 336 Evaluating Impact of Operating System
Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks
Om Prakash Verma 284 Multi-Module Security: Bio-Secure Steganographic System
P. Balaram Papana 231 A Novel Edge Detection Technique for Color Images
P. C. Jha 461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging
AuthorsP. Elayaraja 355 New Approach and Additional Security to
Existing Cryptography Using Cubical Combinatorics
P. Elayaraja 356 Secured Remote Method Invocation Framework
P. G. V. Suresh 413 Overview of the Grid Technology and e-Kumar Governance for e-Health Implementation in
AfricaP. K. Jha 399 Encryption Through Cascaded Recursive
Addition of Blocks and Key Rotation of a Session Key (CRABKR)
P. K. Kapur 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach
P. K. Kapur 450 Software Reliability Growth Modeling for Distributed Environment Using Component-Specific Testing-Effort Functions
P. K. Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
AuthorsP. K. Kapur 454 Instructions Executed Dependent Software
Reliability Growth Modeling for Open Source Software by Considering Change- Point
P. K. Kapur 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging
P. K. Kapur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software
P. K. Srimani 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility
P. K. Srimani 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms
P. K. Srimani 376 Implementation of the K-Means Method for Single and Multidimensions
AuthorsP. K. Srimani 332 Data Stream Mining Using Landmark Stream
Model for Offline Data Streams: A Case Study of Health Care Unit
P. L. Ramteke 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit
P. N. Pandey 377 Assessing Adoption of m-CRM in Education Centers
P. Sivaprakasam 86 A Simulation Study of Content Delivery Network
P. Sowjanya 286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication
P.C.Jha 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme
P.K.Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy
AuthorsP.N.Pandey 416 Improving the Quality of Organization
Through ERP Systems: Indian Industry Survey
Pallav Parkhe 101 Broadband - Wire Line TechnologyPallavi Satpule 316 Points-to Analysis of RMI-Based Java
ProgramsPankaj Chauhan 389 A Mechanism for Congestion Control Using
XCP Over Wireless Mobile NetworkPankaj Kumar 338 A New Approaches for FingerprintSharma Recognition Based on Fourier Transformed
Selected Image (FTSI) AlgorithmsPankaj Singh Yadav103 Comparative Analysis of Various Security
Techniques to Protect VoIP System in an Enterprise Network
Parag Parandkar 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter
Parag Parandkar 211 Cost Effective Mass Transit Tracking System
Authors
Parag Parandkar 301 Energy Harvesting via PiezoelectricityParag Parandkar 282 Performance Enhancement in Satellite Using
UltraCMOS and Silicon Heat Pipe TechnologyParag Parandkar 318 Low Power Design Strategies for SoCsParimalendu 467 Significance of IT-enable BPR in Business Bandyopadhya Enterprise and in Customer endParimalendu 469 Current Market Scenarios of High demand Bandyopadhya BPR implementation through BPM softwareParmod Kumar 288 Intrusion Detection Approach to Secure Ad-
hoc NetworksParul Goyal 4 Discrete Sequence Wavelet Transform NUC
AlgorithmParul Kharub 65 Inorganic Expert: Automation of Inorganic
ChemistryPawan Jindal 244 Analysis of Time Complexity in Binary Search
Tree
AuthorsPawan Jindal 251 Effect o