skip presentation

191

Upload: dangnhi

Post on 01-Jan-2017

283 views

Category:

Documents


8 download

TRANSCRIPT

  • This disc is designed so that you may locate papers by session or author, as well as with full text search.Papers originated as electronic files and were converted to Adobe Acrobat PDF file format for cross-platform access. Even though the viewing quality on your monitor may vary, all papers print clearly.Thank you and enjoy!

    WelcomeINDIACom-2010

    4th NATIONAL CONFERENCE ON"COMPUTING FOR NATIONAL

    DEVELOPMENT

  • Organisers

    click on the logo for more information

    Sponsors

    Technical Partners

    Media Partners

    www.bharatividyapeeth.eduwww.csidelhi.orgwww.ietedelhi.orgwww.ipu.ac.in

  • Guru Gobind Singh Indraprastha University established by Government of NCT of Delhi under the provisions of Guru Go bind Singh IndraprasthaUniversity Act, 1998 read with its Amendment in 1999.The University is recognized by University Grants Commission (UGC), India under section 12B of UGC Act.

    The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three years. It has been accredited "A Grade" by NAAC during Feb - March 2007.

    GGSIPU

    www.ipu.ac.in

  • The IETE is the National Apex Professionalbody of Electronics and Telecommunication,Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognized by Ministry of HRD, GoI.

    IETE Delhi is the largest centre of IETE andconducts coaching classes for the AMIETE andDIPIETE at its premises at Janakpuri, New Delhi.

    IETE

  • Bharati Vidyapeeth

    www.bvicam.in

  • The Computer Society of India, founded in 1965,is a non-profit, professional body where IT

    professionals meet to exchange views and information, to learn and share ideas. CSI has

    over 30,000 members to date, consisting of professionals with varied backgrounds. Today it has 62 chapters and 100 plus student branches

    spread all over the country. Established in late 60s, Delhi Chapter is one of the largest chapters of CSI, having strength of more than 1000 members. Delhi Chapter has

    been awarded the Best Chapter award for 2005-2006.

    CSI

    www.csidelhi.org

  • Sponsors

  • Technical Partners

  • Media Partners

  • Groups Group I Group II Group III

  • Tracks ( G I ) Track #1: Digital World Track #2: Web Technologies, Computer

    Networks & Information Security Track #3: Software Engineering, Database

    And Data Mining Track #4: High Performance Computing

  • Tracks ( G II ) Track #1: Digital World Track #2: Web Technologies, Computer

    Networks & Information Security Track #3: Software Engineering, Database

    And Data Mining Track #4: High Performance Computing

  • Tracks ( G III ) Track #1: Digital World Track #2: Web Technologies, Computer

    Networks & Information Security Track #3: Software Engineering, Database

    And Data Mining Track #4: High Performance Computing

  • 34 Public Entrepreneurship: A Dynamic Strength for Budding Green TechnologyPuja Gupta and Harsimerjeet Khurana

    35 Citizen Centric e-Governance: Problems and ProspectsJyoti Kharade

    37 Logic Theory: A Journey from Digital System Design to Knowledge Based System DesignMohd. Sadiq, Sunil and M. Kamil

    40 Information and Management Science in Developing Inventory Policies for Service-Sensitive ItemsAshok Kumar Sharma

    Track 1: Digital World (G - I)

  • 43 Software Design Pattern for e-Governance Solution FrameworkAjay D. Parikh

    46 Managing Knowledge Workers During Turbulent TimesAbid Yunus Salati and K. P. Tripathi

    57 Web Supported Expert System for LearningAshwini Kumar

    74 Role of Information Technology in Health CareSampada S. Gulavani and R. V. Kulkarni

    97 Core Banking and Its ImplementationV. M. Chavan and Anil T. Gaikwad

    Track 1: Digital World (G - I)

  • 139 Role of ICT in Narrowing the Digital Divide in IndiaPreeti Dubey and Devanand

    179 A Conceptual Framework of Ethics in Information TechnologyV. M. Chavan and K. P. Tripathi

    188 Information and Communication Technologies for strengthening Panchayati Raj in India A Model for J&K StateJewan Singh, V. Mansotra and Vinod Sharma

    192 Education Technology Based Models of Teaching and LearningIqbal Azam, M. Abul Hasan, Tanvir A. Abbasi, Shabbir Ahmed and M. Suhaib Abbasi

    Track 1: Digital World (G - I)

  • 205 ICT and Emergency Medical Services K. M. Mital

    250 e-DemocracySubhash Chander

    263 e-Waste Management M. Abul Hasan, Tanvir A. Abbasi, R. P. Mahapatra, Shabbir Ahmed and M. Suhaib Abbasi

    287 Enterprise Collaboration ToolMadhavi pingili and N. Prasanna Balaji

    301 Energy Harvesting via PiezoelectricityTanvi Dikshit, Dhawal Shrivastava, Abhijeet Gorey, Ashish Gupta, Parag Parandkar and Sumant Katiyal

    Track 1: Digital World (G - I)

  • 327 Comparison Factors for the Selection of ERP Implementation StrategyTamanna Siddiqui, Meraj Ahmed Khan and Asma Shibli

    337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-LearningJyotirmay Patel and A. K. Solannki

    343 Semantic Grid E Learning Platform for Educational SystemS. A. M. Rizvi, S. Z. Hussain and Muqeem Ahmed

    359 Study of Internet Usage in Veterinary and Agricultural SciencesBharat B. Bhagat, Gautam and Vibhakar Mansotra

    Track 1: Digital World (G - I)

  • 377 Assessing Adoption of m-CRM in Education CentersLakshmi Kalyani, Tarun Pandeya and P. N. Pandey

    413 Overview of the Grid Technology and e-Governance for e-Health Implementation in AfricaNasreddin B. El Zoghbi, M. V. Lakshmaiah, P. G. V. Suresh Kumar and Nune Sreenivas

    415 Technology: Third Medium of InstructionAmrit Kaur

    422 Application of Mobile Banking Services in the Bank AreaU. S. Pandey and Geetanjali

    Track 1: Digital World (G - I)

  • 17 Maximal Link Mode Algorithm for Task Allocation in Distributed Computing System Avanish Kumar, Abhilasha Sharma and Vanita Ben Dhagat

    30 Encryption Strength Lies Beyond Key Length: A Suggestive ApproachVinay Kumar

    38 A Novel Scheme for Prevention of Forgery and Alteration in Automated Cheque Payment SystemVineeta Khemchandani and Runumi Devi

    63 VANET: Application of Mobile Communication in Road TrafficPrashant G. Tandale

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 73 Performance Evaluation of Protocols for Secure Routing Over MANETSunil Taneja, Ashwani Kush and Amandeep Makkar

    95 Applying Agile & Web Engineering Technique for Successful Web ManagementB. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin

    104 Role of VoIP (Voice over Internet Protocol) in e-Business and e-CommerceSusanta Kumar Nayak

    132 Routing in Ad-hoc NetworksRitika Arora Mehra and Nipur

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 167 Analyzing Steganographic Algorithm in Java by Function Point TechniqueMohd Abdul Ahad, Esha Saxena and Sunil

    172 File Transfer Using Secure Sockets in Linux EnvironmentAbhipal Singh, Gurneet Singh Sethi, Kavleen Kaur Oberoi and Jasleen Kaur

    191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 TransmitterParag Parandkar, Sumant Katiyal and Vaishali Bhale

    224 A MAIL Reader in TeluguK. V. N. Sunitha and N. Kalyani

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 235 On NTRU Cryptosystems and Timing AttacksSantosh Kumar Yadav, Jaspal Singh Bhatia and Neelima Relan

    236 On NTRU Implementation: An Algorithmic Approach Santosh Kumar Yadav and Kuldeep Bhardwaj

    239 Validation of Clustering Algorithms for Mobile Ad-hoc Networks Using Colored Petri NetsKranthi Kumar Amirineni, Suchismita Chinara and Santanu Kumar Rath

    247 Context Aware Multicasting Scheme for Delay Tolerant Mobile NetworksDivya. T. V. and T. Sivakumar

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 285 Effectiveness of DSDV Protocol Under Hidden Node EnvironmentRuchi Garg, Himanshu Sharma and Sumit Kumar

    303 Position Based Multicast Routing Protocol for Ad-hoc Wireless NetworksA K Daniel and R Singh

    309 Cryptography and MathematicsS. A. M. Rizvi and Neeta Wadhwa

    310 A Survey of Gateway Discovery Mechanism in Ad-hoc NetworksSaba Naaz and Pravin Chandra

    323 Simulation of Ad-hoc Networks Using DSDV, AODV and DSR Protocols Vijendra Rai

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 325 Demodulation Scheme for the CDMA SystemH. Umadevi, Chandrakanth H. Gowda, K. S. Gurumurthy

    328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB NetworkAnup Singh Kushwaha, R. L. Ujjwal, C. S. Rai and Nupur Prakesh

    336 Evaluating Impact of Operating System Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor NetworksA. K. Dwivedi, V. K. Patle and O. P. Vyas

    354 Discussion of Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for Mobile HostsShubha Jain, Praveen Kumar Tripathi and RahulSingh

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 363 Role Based and Credentials Based Access Control in Semantic WebShaily malik

    378 Increasing Network Security Using Laws of Networking and Quantum MechanicsArnab Samanta and Sumit Chauhan

    381 Modifications in the Working Model and Handoff Mechanism of MIPv6B. R. Chandavarkar and G. Ram Mohana Reddy

    399 Encryption Through Cascaded Recursive Addition of Blocks and Session Key RotationP. K. Jha and A. K. Nayak

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 400 A Study of Wi-Fi Enabled Vehicular Networks Using QualNet SimulatorMohammad Pasha and Mohd. Umar Farooq

    414 Multi-hop Streaming in Wireless Distributed EnvironmentRavinder Nath Rajotia, Ritika Goyal, Priyanka Tayal, Ruchi Dagar, Ruchika Sharma and Rajat Mehrotra

    423 A Load Balancing Algo for Web ApplicationsSameena Naaz, Mohamed Meftah Alrayes and M. Afshar Alam

    Track 2: Web Technologies, Computer Networks & Information Security (G - I)

  • 39 Application of Data Mining Techniques for Diabetic DataSetRunumi Devi and Vineeta Khemchandani

    90 Data Mining: An approach to Increase the Success of E-CommerceSanjay Manhas, Vinod Sharma and Vibhakar Mansotra

    147 Open Source Software Quality An Issue of ConcernAnil Kumar, Vibhakar Mansotra and Dalip Bhat

    197 Testing Graphical User Interface Using Decision Based Sequence DiagramsMahamaya Mohanty

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 201 A Novel Software Architecture for Network Security TestingRajni Jindal, Puneet Kumar, Akhil Jindal, Nikhil Jindal, Sidharth Chhabra and Varunn Kaushik

    218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance IndustriesSunanda Chowdhary, Shilpi Joshi, Tapasya Patki, Vipin Sharma, Anshu Chowdhary, A. B. Patki and Vimal Gaur

    223 SRS BUILDER 1.0: An Upper Type CASE Tool for Requirements SpecificationArdhendu Mandal

    244 Analysis of Time Complexity in Binary Search TreePawan Jindal, Amit Kumar and Shishir Kumar

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 251 Effect of Insertion and Immediately Deletion of Inserted Node From Red Black TreePawan Jindal, Amit Kumar and Shishir Kumar

    262 Analytical Report on Software RefactoringS. A. M. Rizvi and Zeba Khanam

    273 Introducing Machine Intelligence Quotient as a New COTS Evaluation MeasurePriyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, Niti Verma, Swati Verma and A. B. Patki

    277 A Literature Review of Methods Used in Software Industries for Successful Software Project managementNilesh Mahajan and Bharati Yelikar

    283 A Study on Effect of Replication on DatabasesSuraiya Parveen and Safdar Tanweer

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care UnitP. K. Srimani and Malini M. Patil

    333 Identifying Parameters with Data Collection Methods for Software Development in View of UsabilityTeena Tiwari and Kshama Paithankar

    335 A Study of Concurrency and Recovery Techniques in DatabasesAmit Kour, Vinod Sharma and V. Mansotra

    342 Notifying State Change of Model to Multiple Views Using Observer Pattern in JavaS. A. M. Rizvi and Syed Imtiyaz Hassan

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 349 Data Mining for Digital Libraries A New ParadigmAjendra Isaacs, Rajeev Paulus, Navendu Nitin and Narendra Gupta

    351 Secure and User Interactive Information Extraction in Linux DistributionsSunit Jaiswal, Anshul Agrawal, Ravi Prabh and Rakesh Kumar

    402 CPN Tools as a Supplement to UML for Validation of Software RequirementsVinai George Biju and Santanu Kumar Rath

    419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating SystemGyanendra Kumar, Gupta Shubha Jain, Vishnu Swaroop and A. K. Sharma

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 449 Optimal Allocation of Testing Effort: A Control Theoretic ApproachP. K. Kapur, Udayan Chanda and Vijay Kumar

    450 Software Reliability Growth Modeling for Distributed Environment Using Component-Specific Testing-Effort FunctionsP. K. Kapur, Kalpana Yadav, Avneesh Chauhan and Prashant Johri

    453 Two Dimensional Flexible Software Reliability Growth Model and Related Release PolicyP. K. Kapur, R. B. Garg, Anu. G. Aggarwal and Abhishek Tandon

    454 Instructions Executed Dependent Software Reliability Growth Modeling for Open Source Software by Considering Change- PointV. B. Singh P. K. Kapur and Mashaallah Basirzadeh

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect DebuggingV. S. S. Yadavalli, Anu G. Aggarwal, P. K. Kapur and Jyotish Kumar

    459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular SoftwareAnu G. Aggarwal, P. K. Kapur, Gurjeet Kaur and Ravi Kumar

    461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect DebuggingP. C. Jha, Ritu Arora and P. K. Kapur

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block SchemeP.C.Jha, Shivani Bali and P. K. Kapur

    Track 3: Software Engineering, Database And Data Mining (G - I)

  • 20 Providing Security of Fingerprint Images Through Digital WatermarkingTapas Bandyopadhyay, B Bandyopadhyay and B N Chatterjii

    48 Search Technique Implementation for Symbolic Reasoning Under UncertaintyVandana Sharma

    54 Trust Aware Load Distribution in a Data Grid EnvironmentShaik Naseera and K. V. Madhu Murthy

    67 A Novel Technique Combining Euclidian Distance Measure and DHMM for Automatic Speaker RecognitionAkash Tayal, Harshita Sharma and Twinkle Bansal

    Track 4: High Performance Computing (G - I)

  • 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases FamilyMeenakshi Bhat and S. A. M. Rizvi

    195 An Overview of Wavelet-Like Transforms and Image Data HidingSushil Kumar and S. K. Muttoo

    211 Cost Effective Mass Transit Tracking SystemShafi Patel, Sumant Katiyal and Parag Parandkar

    216 Role and Scope of Support Vector Machine in BioinformaticsSunanda Chowdhary, Vipin Sharma, A. B. Patki and Vimal Gaur

    217 Fuzzy Logic System for Querying a DatabaseSunanda Chowdhary, Vipin Sharma, A. B. Patki and Suman Mann

    Track 4: High Performance Computing (G - I)

  • 230 Nonlinear Circuit Modelling Using Volterra SeriesHarneet Kaur, Manika Babbar, Saumya Tyagi and Akash Tayal

    266 An Efficient Solution for Evaluation Problem of HMMMadhusudhana Rao D

    269 In-door Image Motion Detection with Objects Identification and Position Shift-Velocity ComputationAsaad A. M. Al-Salih and Syed I. Ahson

    270 A Machine Vision System for Motion Analysis and DFT-Velocity Computation in Out-door Video FramesAsaad A. M. Al-Salih and Syed I. Ahson

    Track 4: High Performance Computing (G - I)

  • 282 Performance Enhancement in Satellite Using UltraCMOS and Silicon Heat Pipe TechnologyPriyanka Pandit, Parag Parandkar, Abhijeet Gorey and Sumant Katiyal

    284 Multi-Module Security: Bio-Secure Steganographic SystemOm Prakash Verma, Amit Madan and Sumit Madan

    311 Comparative Study of Ontology Merging AlgorithmsApoorva Shukla and Priyanka Bhutani

    315 Current-Mode Oscillator Using Single DVCCAnisur Rehman Nasir and S. Naseem Ahmad

    318 Low Power Design Strategies for SoCsAnjali Gupta, Atikant Shrivastava, Parag Parandkar and Sumant Katiyal

    Track 4: High Performance Computing (G - I)

  • 329 Tones and Break Indices for Speech Processing - A ReviewArchana Agarwal and Anurag Jain

    334 Intelligent Control for Power System ApplicationsMohd. Rihan and Muneeza Afaq

    339 Virtual Instrumentation for Biomedical ApplicationsMohd. Rihan and Arti Agarwal

    376 Implementation of the K-Means Method for Single and MultidimensionsP. K. Srimani and Udaya Rani S

    384 Role of Natural Language Processing in Community Structure DetectionVivek Bhola, Mahesh Grover and Madhavi Sinha

    Track 4: High Performance Computing (G - I)

  • 406 PRAAT Implementation for Prosody ConversionManinder Singh Suri, Divya Setia and Anurag Jain

    407 Emotion Conversion in Hindi LanguageDivya Setia, Maninder Singh Suri and Anurag Jain

    410 Dimension Reduction Using Rough Set Theory for Intrusion Detection SystemNandita Sengupta and Jaya Sil

    Track 4: High Performance Computing (G - I)

  • 29 Rural e-Banking: Gaps, Inefficiencies,Emerging Solution Through Mobile Terminals at Customer Door-StepV. B. Aggarwal, Deepti Sharma and Archana B Saxena

    85 Information Technology and Knowledge Management: An Explorative StudySurabhi Deshpande and Sudhanshu Deshpande

    96 Designing a Web Education Model for Effective Teaching - Learning Process B. V. Ramana Murthy, Salman Abdul Moiz and Mohammed Sharfuddin

    146 Telemedicine in India - A Model for Jammu & Kashmir StateVibhakar Mansotra, Dalip Kumar Bhat and Anil Ticku

    Track 1: Digital World (G - II)

  • 157 E-Commerce : Improving Performance of Customer Knowledge ManagementArchana Sharma

    176 Corporate Strategies Adopted by IT Industry to Beat the Global CrisisDivya Leekha, Himali Natekar and Sayali Shende

    411 Improving Academic Performance of Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University Nand Kumar and Nasreddin B. El Zoghbi

    424 Applying Rough-Sets to Assist the Decision Making for ERP ImplementationAjit More and Satyawan Hembade

    Track 1: Digital World (G - II)

  • 26 IPv6 Transition - An Engineering Exercise or a Necessity?Savita Shiwani and G. N. Purohit

    27 Web Services: Challenges in 21st CenturyHarsimerjeet Khurana and Puja Gupta

    77 Network Monitoring: Topology, Methods and IssuesMamta Sachdeva and Neeraj Gupta

    103 Comparative Analysis of Various Security Techniques to Protect VoIP System in an Enterprise NetworkLalit Saraswat and Pankaj Singh Yadav

    Track 2: Web Technologies, Computer Networks & Information Security (G - II)

  • 116 Robust Steganography Using Secure Password Protected SchemePradeepta Bhattacharya, Dhiraj S. Rajani and Terence Johnson

    187 Conserving Energy of WSNs by Using 3Rs WayRaj Kumar and Sharad Goyal

    421 Mobility Management Techniques and QoS in Mobile WiMaxM. N. Doja and M. Bala Krishna

    Track 2: Web Technologies, Computer Networks & Information Security (G - II)

  • 58 Natural Relational Algebra: A New Approach for Query ProcessingSuhasini. M and H. S. Nagalakshmi

    59 The State-of-The-Art Concepts in Software TestingPrashanth G. K.

    87 A Review of Software Process Models and MethodologiesAnand K Pandey and Rashmi Pandey

    94 A Methodology for Successful Project Management in Medium Scale EnterprisesB.V.Ramanamurthy, K.Srinivasa Babu and Mohammed Sharfuddin

    Track 3: Software Engineering, Database And Data Mining (G - II)

  • 115 Improving the Effectiveness of Inspection Through Verification and ValidationJayanthi R, Amrutha. V and Jagadeesh. G

    136 Aspect Oriented Programming Java RMI ServerInderjit Singh Dhanoa and Dalwinder Singh Salaria

    169 A Revitalized Dynamic Slicing Method for Program Testing and DebuggingSantosh Kumar Pani and Mahamaya Mohanty

    253 Dynamic Cluster Resource Allocations for Jobs with Known Memory DemandsD. A. Vidhate, A. K. Patil and D. V. Guleria

    280 Students Academic Performance Analysis Using Data Mining Techniques in Higher Education: A Case Study of CollegeSachin Bhoite and Suresh Pathare

    Track 3: Software Engineering, Database And Data Mining (G - II)

  • 91 Semantic Kernel for Automatic Integration of Semantic RepositoriesNadia Imdadi and S. A. M. Rizvi

    231 A Novel Edge Detection Technique for Color ImagesC. Naga Raju, Y. Rajendra kumar, P. Balaram Papana and D. V. M Krishna

    234 Need for CCL in Grid ComputingDivya Goel and Shivendra Goel

    341 The Noise-Robustness of Mel-Frequency Cepstral Coefficients (MFCC) for Speech RecognitionSafdar Tanweer and Jawed Ahmed

    Track 4: High Performance Computing (G - II)

  • 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic AlgorithmsP. K. Srimani and G. Vakula Rani

    Track 4: High Performance Computing (G - II)

  • 11 Information Technology Infrastructure Library (ITIL)Tanaji D. Dabade

    18 Knowledge Management: Information & Knowledge Sharing Through IntranetBhavna Bajpai

    21 Implementing IT in Disaster ManagementSandeep Mathur

    50 Towards 21st Century Classrooms: The Quality Requisite!Dheeraj Mehrotra

    66 e-Commerce, Taxation in the Age of Birds Without ShadowsRishi Kamal and Gopal Kamal

    Track 1: Digital World (G - III)

  • 80 Stock Market ExpertNiraj Saxena, Yash Hotchandani, Mayank Kulshresthaand Puneet Arora

    84 Improving and Sustaining Coconut Productivity: IT - A Means to Economic BenefitRakesh Vardhan

    92 Tomorrows Technology TodayRishi Kamal

    98 Design and Establishment of Information System in Rural Areas for Sustainable AgricultureMudita Shrivastava, Manisha Kumari, Saba Dalviand Ashwini Kale

    Track 1: Digital World (G - III)

  • 100 E - Governance: Whats and Ifs?Sarita Garg

    101 Broadband - Wire Line TechnologyPallav Parkhe and Ruchi Patle

    110 Role of Information Communication Technologies in EducationSwati Desai

    118 Impact of Speech Applications in HealthCare OrganizationsVandana Bhasin

    142 Electronic Judicial SystemAdil Siddiqui, Meenakshi Sharma, Manish and Salil Khare

    Track 1: Digital World (G - III)

  • 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries BusinessSajjad Akhtar and Madaswamy Moni

    162 Information and Communication Technology (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An OverviewHarish Kumar Taluja and Anuradha Taluja

    165 Identity Begets Identity; Real or Reel?Prema P. Nair

    186 Online Voting System Prince and Bhupendra Singh

    Track 1: Digital World (G - III)

  • 199 Information and Communication Technologies (ICTs) for Sustainable Development in Agriculture A Model for J&K StateJewan Singh and V. Mansotra

    248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture MissionRakesh Vardhan, K. Rajashekhar and Md. Arif

    272 Status of Use of IT Tools in SMEs in Jammu and KashmirRoopali Jamwal and Deepshikha Jamwal

    274 HCI Challenges in Using Mobile Devices: A Study of Issues Faced by Senior Citizens While Using Mobile PhonesAnand Paropkari

    Track 1: Digital World (G - III)

  • 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3GVinay Kumar Nassa and Mohit Rai

    340 Advantages of ERP System in SMEsRajita Dixit and Deepali Shahane

    344 An Efficient Knowledge Base Mutual Linker FrameworkSyed Mohiuddin, Himayatullah Sharief and T. Eshwar

    346 Green ArchitectureRajni Gupta and Sanjib K. Sahu

    Track 1: Digital World (G - III)

  • 357 Knowledge Management in a Research OrganizationManju Shree, Shyamalesh Khan, Nnj Hemrom, Selvi S and A K Paul

    361 Implementation of Workflows Intuitive Formal Approach in BPO MultiplexingMayank Kumar, A. B. Patki, Akshay Anand and V. Kumar

    371 Critical Evaluation of Applications of Expert SystemsGurvinder Singh, Shreya Dubey and Sumant Katiya

    386 Emerging Trends of IT in Healthcare SectorChandan Kalra

    Track 1: Digital World (G - III)

  • 396 Neuro-informatics in India - Problems and TrendsK. R. Radha Krishnan

    403 Information Technology for Education, Health and DevelopmentKanchan Lata Bhardwaj and Navneet Sharma

    408 Quandary Elucidating Tactics of Water Resource Management by Information TechnologyArvind Jaiswal and S. S. Bhalla

    409 A New Generation of Electronic CommerceHarmanpreet Kaur

    Track 1: Digital World (G - III)

  • 416 Improving the Quality of Organization Through ERP Systems: Indian Industry SurveyMary Jacintha M, Khanhaiya Singh and P.N.Pandey

    467 Significance of IT-enable BPR in Business Enterprise and in Customer endParimalendu Bandyopadhyay and Joydeep Chowdhury

    469 Current Market Scenarios of High demand BPR implementation through BPM softwareParimalendu Bandyopadhyay and Joydeep Chowdhury

    470 Significance of IT-Enable Human Resource ManagementParimalendu Bandyopadhyay and Joydeep Chowdhury

    Track 1: Digital World (G - III)

  • 8 Crawling the Web at Desktop ScalesMadhavi Pingili

    12 IPv4 vs IPv6 - Next Generation Internet Meenakshi Gupta

    24 Personalized Web Search: User Modeling Using Implicit Feedback From Click Through DataGeetanjali Surange

    25 Solving Cellular Mobile Networks Assignment Problem Using Iterative Local Search AlgorithmK. Rajalakshmi

    33 Consumer Privacy in 2nd Generation e-CommerceSandeep Kautish

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 36 A Directed Threshold Signature Scheme with Threshold Verification Sunder Lal and Manoj Kumar

    44 Advanced Mobility Models for Mobile Ad-hoc NetworksTanweer Alam

    47 Shaping the Traffic to Improve QoS Parameter During Data Privacy in Secure Multiparty ComputationTonu Sojatia and Zulfa Shaikh

    49 Threats and Innovations of Information Security in the 21st Century Deepshikha Bhargava

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 52 Strategies for Wavelength Assignment in WDM Optical NetworksArvind Upadhyay and Kavita Thorat

    53 Performance of Static Interconnection of Computer Network Through UMLVipin Saxena and Anuradha Sharma

    60 Cloud Computing: Its Security & Privacy aspectsDeepshikha Jamwal and Kumar Kush

    62 Improving QoS in Video MulticastingDeepshikha Jamwal and Kumar Kush

    81 Performance Comparison and Improvement of Routing Protocols - DSRNitin Tyagi

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 83 Quality of Service for Mobile Ad-hoc NetworksShallu, Vandna and Kiran

    86 A Simulation Study of Content Delivery NetworkN. Ramachandran and P. Sivaprakasam

    88 Performance Analysis of Multi Media Ad-hoc NetworksKiran, Vandna and Shallu

    107 Achieving Vertical Scalability: A Hindrance to Cloud ComputingRahul Sharma and Mohit Mathur

    111 Wireless Power Transmission: Requirements & IssuesSaurabh Saxena and Sanjib K. Sahu

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 113 Optimizing Semantic Web Search and Ranking AlgorithmsVineet Kr. Sarawat and Sanjib K. Sahu

    117 Application of Keystroke Dynamics in Mobile Device Users AuthenticationT. Santhanam and Shanthi Bhatt

    120 On Demand Temporary Route Recovery for Frequent Link Failures in Ad-hoc NetworksKokula Krishna Hari. K

    121 Implementation of Weighted Rule Mining Algorithm for Wireless Sensor NetworksKokula Krishna Hari. K

    124 Global Positioning SystemShalini Goel

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 128 Search Engines - "Issues and Improvements"Nitul Kaushik and Archana Saxena

    129 e-Mail Services: "Features and Scope"Rahul Gupta and C Komalavalli

    130 A New Approach for Mobility Management in the Wireless Network of a Mobile Communication SystemVikram Bali, Rajkumar Singh Rathore and Amit Sirohi

    138 Smart Antenna: Smartness Going the Way of TechnologyVinay Chopra

    158 Dual Firewall Technology for VPN NetworkAshish Surywanshi and Akhilesh K Sharma

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 178 Next Generation Networks: Enhancing Performance and Security for Providing Mobile Multimedia BroadcastingPeeyush Mathur, Bharat Singh, Raj Kumar Sain and Chandra Shekhar

    182 VAMS: An Effective Approach for Vehicle Assisted Messaging Scheme in VANETsMohd. Umar Farooq and Mohammad Pasha

    183 Security and Efficiency in Ad-hoc Mobile NetworkShabbir Ahmed, Kavita Bhatnagar and Zubair Ahmed Khan

    184 Collaborative Knowledge with Cloud ComputingAvijit Dutta

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 189 Mobile E-Commerce: Payment System SecurityMd. Tabrez Nafis

    190 Data Security From Malicious Attack: Computer VirusesNarendra Kumar Tyagi and Abhilasha Vyas

    193 Wireless Automatic Gate Sensing Alarm and Smoke Alarm Especially for Persons with Hearing ProblemAbhishek Khemka and Viranjay M Srivastava

    198 A Novel Approach for Security Policy Integration and Conflict Reconciliation in a Ubiquitous EnvironmentBeneyaz Ara Begum and Animesh Tripathy

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 204 Dark Side of Cyber Crime in India: A Case StudyNamita Singh, Deepshikha Jamwal and G. S. Sambyal

    209 Semantic Search-The New Paradigm of Information Retrieval on World Wide Web Seema D

    210 Empirical Study of Factors Affecting Success of SNS (Social Networking Sites)Renavikar Ashwini and Ligade Smita

    220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc NetworksMohan H .S. and A. Raji Reddy

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 221 An Architecture Model of Mobile Ad-hoc Network and its Performance in Disaster Area ArchitectureShabbir Ahmad and Zubair Ahmed Khan

    222 Effective Use of EDI and XML Message Exchange for Small/Mid and Large OrganizationsPrashant K. Thete

    228 Voice Enabled Mail Reader-VMAILK. V. N. Sunitha and N. Kalyani

    232 Enhanced Security for Audio Signals Using SteganographyG. R. Bamnote, S. L. Satarkar, S. S. Agrawal and Sohel Bhura

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 237 The Network Security Assessment Instrument to Reduce Software Security RiskN. Prasanna Balaji, U. Sreenivasulu and G. Pramod

    241 Potential Air Traffic Congestion Solution Slot Allocation by Auction MethodMadhavi Pingili and N. Prasanna Balaji

    255 Recovery of Mobile Internet TransactionsD. Rama Rao

    257 Potential Air Traffic Congestion Solution: Slot Allocation by Auction MethodD. Rama Rao

    261 Evaluation of Integration Algorithms for Meta -Search EngineBhavsingh Maloth

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 275 Automated Remote Data LoggerShruthi. K. R.

    278 Secure Routing for Mobile in Ad-hoc NetworkRama Rao Tandu and J. Reena Mathigolda

    281 Web Science An Interdisciplinary Approach to Understanding the Web Shikha Nirmal

    286 Adaptive QoS for Mobile Web Services Through Cross-Layer CommunicationP. Sowjanya

    288 Intrusion Detection Approach to Secure Ad-hoc NetworksTanweer Alam, Parmod Kumar and Sanjeev Tayal

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 308 Security Problem in the Film Industry Production and Distribution ProcessRajiv Mahajan, Teenum Gupta and Sandeep Kad

    312 Performance Analysis and QoS Assessment of Queues Over Multi - Hop NetworksMohit Agrawal, Lalla Atul Singh Chaurasia, Navneet Tiwari and Jatan Saraf

    331 Detecting and Preventing IP Spoofed Attack by RSA Asymmetric Crypto - SystemRajiv Ranjan and K. P. Yadav

    345 Competent Ranking Algorithm for Web-Based Search EnginesHimayatullah Sharief, Syed Mohiuddin and T. Eshwar

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 347 AOEB: Energy Aware Routing Scheme for Wireless Sensor NetworksSansar Singh Chauhan and Gautam Dhameja

    348 Ad-hoc Networking Protocols a Brief TreatiseAjendra Isaacs, Navendu Nitin, Rajeev Paulus and O. P. Chaudhary

    353 Evaluating Web Crawler AlgorithmsJyotsna Nigam and Pooja Kherwa

    355 New Approach and Additional Security to Existing Cryptography Using Cubical CombinatoricsP. Elayaraja and M. Sivakumar

    356 Secured Remote Method Invocation FrameworkP. Elayaraja and M. Sivakumar

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 368 Laptops Security Application Using RFIDAnurag Srivastava and Alok Kumar Dutt

    372 An Effective Approach for Disaster Prevention Using GSMGurvinder Singh, Ravleen Kaur, Katiyal, Anubha Bansal and Pushpendar Singh

    374 Evaluation of Network Congestion Controlling ApproachesGurvinder Singh, Sumant Katiyal and ShreyaDubey

    375 Increasing the Efficiency of Echo Hiding Digital Audio SteganographyGurvinder Singh, Sudip. K. Dey, Shreya Dubey and Sumant Katiyal

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 380 Network Management and Routing Strategies with Mobile AgentPraveena Chaturvedi and Nipur

    383 Network Aware Routing Protocol for MANETEla Kumar and Ravinder Nath Rajotiya

    385 GSM Security and EncryptionAtikant Shrivastava, Anjali Gupta and Ashish Valuskar

    389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile NetworkA. K. Vatsa, Khushbu Garg, Pankaj Chauhan and Rohit Srivastava

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 392 User Interactive Web Content Adaptation for Mobile DevicesPrakash K. Mishra, Kapil Baliyan, Deepshikha andS. P. Singh

    401 A Practical Approach Towards Development of Applications and Solutions Using Java AgentsNilesh M. Shelke and Rajiv Dharaskar

    412 Effect of Rushing Attack on DSR in Wireless Mobile Ad-hoc NetworksSushant Kumar and Bibhudatta Sahoo

    452 Comparative Analysis of Structures and Attacks on Various Stream CiphersMohammad Ubaidullah Bokhari and Faheem Masoodi

    Track 2: Web Technologies, Computer Networks & Information Security (G - III)

  • 51 Recent Development in Databases and Future DirectionsPradeep Aswal and Rohit Goyal

    56 Prioritization of Test Cases for Regression TestingKapila Kapoor and Geetika Kapoor

    64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter ApproachAsha Gowda Karegowda, M. A. Jayaram and A. S. Manjunath

    69 Data Mining and Knowledge DiscoveryAnkita Jhawar, Ayushi Ameriya and Kanupriya Chaturvedi

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 72 Use of Evolutionary Strategies in Software TestingSurjeet Singh and Rakesh Kumar

    78 Data Mining with Support Vector MachineArti Patle and Deepak Singh Chouhan

    82 Emerging Techniques for Online Analytical Processing and its VisualizationDeepti Nayar and Vijay B. Aggarwal

    89 Resource Based Grid Scheduling AlgorithmManjot Bhatia

    93 Query Optimization in Homogenous Distributed Database Management SystemHimanshu Sharma and C. Komalavalli

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 105 Commit Protocols and Their Issues in Distributed DatabasesVinay Sharma and Vijay B. Aggarwal

    106 Query Optimization in Heterogeneous Distributed DatabasesAkanksha Gupta and Vijay B. Aggarwal

    108 A Solution to Load Balancing Problem in Object Oriented ClustersSumit Khanna and Deepti Sharma

    122 Implementation of Multivariate Clustering Methods for Software DevelopmentSeetharam. K and Chandrakanth G Pujari

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 131 Software Testing vs. Code Inspection: What else for Verification & Validation?Latika Kharb and Rajender Singh

    133 Reusability in Component Based Development Process Model in Software DevelopmentJyoti Mahajan, Devanand and V. Mansotra

    161 Analysis of Software Threats and Software Security Deepshikha Jamwal and Bhawana Sharma

    166 Recent Trends in Associative Rule MiningShalini Vermani and Ritika Wason

    180 Model Testing: Is it Only A Special Case of Software TestingManoj Kumar Pachariya

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 194 Comparison of Different Normal FormsVinita Rohilla

    196 Reliability and N-version Programming in Software Fault ToleranceK. C. Joshi

    200 An Analysis of Rural Economic Geography using Spatial Data Mining TechniquesV. R. Kanagavalli and K. Raja

    203 Software Engineering Challenges: A Case StudyP. L. Ramteke and Mohammad Atique

    208 Efficient Implementation of the Minimum Spanning Trees Based ClusteringMeena. A and Raja. K

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 238 Software Testing ScenarioN. Prasanna Balaji, U. Sreenivasulu and G. Pramod

    249 Hyperion Essbase TechnologyK B K S Durga

    252 Software Metrics Visa-Vis Software VulnerabilityDeepshikha Jamwal and Bhawana Sharma

    254 Software Reuse: A Systematic ReviewDeepshikha Jamwal

    256 A Unit-Test Framework for Database ApplicationsM Srikanth Yadav

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 260 Maximum Number of Keys in B Tree of Height KPawan Jindal, Amit Kumar and Shishir Kumar

    268 Distributed Media PlayerS. A. M. Rizvi, S Zeeshan Hussian and Vineet Sharma

    279 A Comprehensive Approach Towards Data Preprocessing Techniques & Association RulesJasdeep Singh Malik, Prachi Goyal and Akhilesh K Sharma

    304 A Software Tool to Access Evolutionary Algorithms for DataBhavsingh Maloth

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 306 Delete File System Watcher - Storage Optimization ToolPreeti Arora

    316 Points-to Analysis of RMI-Based Java ProgramsYogesh Pingal, Pallavi Satpule and Sandesh Patil

    319 Security Concern Using Aspect Oriented Programming (Aspect C)Kavish Sehgal and Kashyap Rajpal

    320 Distributed Query Optimization: Use of Mobile AgentsKodanda Kumar Melpadi

    321 An Extended GCLP Algorithm for Hardware Software PartitioningAnurag Srivastava

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 326 Data Mining and Business Intelligence TechnologiesManmeet Singh Kapoor

    352 Data Mining and Audience Intelligence for AdvertisingManika Gupta

    364 Evaluation System with Oracle 10gJaswinder Kaur

    373 Real Time Operating Systems (RTOS)Ashima Wadhwa

    387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test CasesBratin Bhattacharya and Deepa Gangwani

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 394 Data Mining in Healthcare SectorK. R. Radha Krishnan

    395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) ModelsR. C. Tripathi, Manohar Lal, A. K. Malviya and Manish Saraswat

    418 An Analysis of Rural Economic Geography Using Spatial Data Mining TechniquesV. R. Kanagavalli and K. Raja

    Track 3: Software Engineering, Database And Data Mining (G - III)

  • 4 Discrete Sequence Wavelet Transform NUC AlgorithmParul Goyal

    22 Distributed-Grid Databases Server Design and Implementation for Bio-Molecular SimulationsSantosh Kumar

    23 Real Time Monitoring of Patients Using Bio -Signals Through Embedded ComputerR. W. Jasutkar and T. M. Pattewar

    42 CMOS Implementation of Cell Signaling for Cell DeathShruti Jain and Pradeep K. Naik

    Track 4: High Performance Computing (G - III)

  • 55 An Intelligent Blackjack Game Using Reinforcement Learning AlgorithmsArvind Singh Chandel and Aruna Tiwari

    65 Inorganic Expert: Automation of Inorganic ChemistryVinay Mathur, Parul Kharub and Yatin Malhotra

    68 Managing Information Overload in Distributed Computing EnvironmentAjay Tiwari and Priyesh Kanungo

    75 Lossy Image Compression Using Variable Run Length EncodingSoumya Maitra

    Track 4: High Performance Computing (G - III)

  • 99 Bio - InformaticsG. Gayatri

    102 Traffic Generation Model for Delhi Urban Area Using Artificial Neural NetworkShivendra Goel, J. B. Singh and Ashok Kumar Sinha

    135 A New Type of Covering Based Generalized Rough SetDebadutta Mohanty

    137 Bioinformatics: "Leading the Way to New Advancements"Vinay Chopra

    Track 4: High Performance Computing (G - III)

  • 144 Reduction of Parasitic Capacitance for Transmission with the Help of CPLHarpreet Parashar, Rachit Patel and Viranjay Mohan Srivastava

    145 Parasitic Capacitances in Double Gate MOSFETPriyank Kumar and Viranjay M. Srivastava

    148 Circuit Design with Independent Double Gate TransistorsNitant and Viranjay M. Srivastava

    163 Project Management Efficiency Using Fuzzy LogicVinay Kumar Nassa

    Track 4: High Performance Computing (G - III)

  • 175 Reducing LOC and Cyclomatic ComplexityGarima Verma and M. P. Thapaliyal

    177 Full Substractor Circuit Design with Independent Double Gate MOSFETNitasha Bisht, Shipra Kapoor, Nutan Jaiswal and Viranjay M. Srivastava

    185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique Shweta, Akash Tayal and Ankita Lathey

    202 Volume Based Medical Image Registration by Maximization of Mutual InformationT. Senthil Kumar and R. Suganya

    Track 4: High Performance Computing (G - III)

  • 207 Multimodal Biometrics by Fusion of Finger Vein and Finger Print ImagesArunkumar. V and Malathy. C

    214 3D Atlas of Human Anatomy for Educational PurposesT. Senthil Kumar and Vijay Sabarish Pankajan

    215 A Survey on 3D Face Reconstruction Methods Based on Marching Cubes AlgorithmRakesh P. B. and T. Senthil Kumar

    219 Use of GA in Solution of TTPSikander and Kuldeep Kumar

    Track 4: High Performance Computing (G - III)

  • 226 A New Technique for Detection and Location of Human Faces in Digital ImageSatyendra Nath Mandal, Aninda Banerjee, Kumarjit Banerjee and Sourish Banerjee

    227 Mr. Tacton (Embedded Red Tacton)Saranya Sivasankaran and Srikkanth Govindaraajan

    229 Fuzzy logic - A New Powerful TechnologyPooja Gautam

    242 Protected Content Based Image RetrievalN. Prasanna Balaji, J. Reena and Korra Bichya

    243 Relevance Feedback for Distributed Content -Based Image RetrievalN. Prasanna Balaji and J. Reena and Korra Bichya

    Track 4: High Performance Computing (G - III)

  • 265 Integration of HIS with the Internet Appliance System for the Treatment of Human InfertilityP. K. Srimani, Manjula Sanjay and K. Krishna Veni

    267 Digital Watermarking: Advanced Technique in Image and Video TechnologyS. A. M. Rizvi, Vineet Sharma and Anurag Singh Chauhan

    271 Bio - Informatics, Bonding Genes With ITRuchika Gupta

    276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data A. K. Patil and A. J. Patil

    Track 4: High Performance Computing (G - III)

  • 302 Phase-Based Image Matching Used for an Effective Approach for Iris RecognitionA. K. Patil and A. J. Patil

    305 Primitive Image Transformations Used to Perform a Fast Fourier TransformA. K. Patil and A. J. Patil

    313 WsVsSenNet: An Era of Enhanced Vision Based Sensing CapabilityNavneet Tiwari, Jatan Saraf and Siddarth Jain

    314 Living BEAM Elegant Wizards - The Future of Artificial IntelligenceNavneet Tiwari, Sagar Gupta and Puneet Tiwari

    Track 4: High Performance Computing (G - III)

  • 324 Texture Based Image Retrieval With an Application to CBIRD. N. Verma and Bharti

    330 Computing with DNAShankar B. Kshetry and J. P. Singh

    338 A New Approaches for Fingerprint Recognition Based on Fourier Transformed Selected Image (FTSI) AlgorithmsPraveen Kumar Singh Rathor, Ravi Kumar Ravi and Pankaj Kumar Sharma

    362 Application of Genetic Algorithm in Oil Drilling ProblemTanya Jhamb, Anusha Bhatnagar and Nidhi Kohli

    Track 4: High Performance Computing (G - III)

  • 366 A New Approach of Extraction Transformation Loading Using PipeliningRajender Singh Chhillar and Barjesh Kochar

    379 Bengali-English Relevant Cross Lingual Information Access Using Finite AutomataAvishek Banerjee and Swapan Bhattacharyya

    388 K-Means Clustering Using WEKA InterfaceSapna Jain, M. Afshar Aalam and M. N. Doja

    391 Role of EEG Lab for Analyzing Electroencephalogram SignalAshish B. Sasankar N. G. Bawane and S. T. Bodkhe

    Track 4: High Performance Computing (G - III)

  • 393 Development of Motherboard Ontology Using Protg V3.4 Rc2 (Build 529)Vinita Gupta, Nitesh Kumar and Sanjay Kumar Malik

    397 NAVIGUERR. Bakyalakshmi Nisha and S. Madhumitha

    398 Content Based Face RetrievalZafar G. Sheikh and V. M. Thakare

    Track 4: High Performance Computing (G - III)

  • AuthorsA. B. Patki 216 Role and Scope of Support Vector Machine in

    BioinformaticsA. B. Patki 217 Fuzzy Logic System for Querying a DatabaseA. B. Patki 218 Cyber Crime Management Using Evidence

    Based Software Engineering - Banking and Insurance Industries

    A. B. Patki 273 Introducing Machine Intelligence Quotient as a New COTS Evaluation Measure

    A. B. Patki 361 Implementation of Workflows Intuitive Formal Approach (An Emergency Response Workflow Tool) in BPO Multiplexing

    A. J. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data

    A.J. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition

    A. J. Patil 305 Primitive Image Transformations Used to Perform a Fast Fourier Transform

  • AuthorsA. K. Daniel 303 Position Based Multicast Routing Protocol

    for Ad-hoc Wireless NetworksA. K. Dwivedi 336 Evaluating Impact of Operating System

    Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks

    A. K. Malviya 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models

    A. K. Nayak 399 Encryption Through Cascaded Recursive Addition of Blocks and Key Rotation of a Session Key (CRABKR)

    A. K. Patil 253 Dynamic Cluster Resource Allocations for Jobs with Known Memory Demands

    A. K. Patil 276 A Survey on Segmentation and Modeling of Full Human Body Shape from 3-D Scan Data

    A. K. Patil 302 Phase-Based Image Matching Used for an Effective Approach for Iris Recognition

  • AuthorsA. K. Patil 305 Primitive Image Transformations Used to

    Perform a Fast Fourier TransformA. K. Paul 357 Knowledge Management in a Research

    OrganizationA. K. Sharma 419 Resource Scheduling in Mobile Distributed

    Real Time Database Systems: A New Perception for Operating System

    A. K. Solanki 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning

    A. K. Vatsa 389 A Mechanism for Congestion Control Using XCP Over Wireless Mobile Network

    A. Raji Reddy 220 Evaluating the Performance of Various Architectures for Wireless Ad-hoc Networks

    A. S. Manjunath 64 Feature Subset Selection in Medical Data Mining Using Cascaded GA & CFS: A Filter Approach

  • AuthorsAbhijeet Gorey 282 Performance Enhancement in Satellite Using

    UltraCMOS and Silicon Heat Pipe TechnologyAbhijeet Gorey 301 Energy Harvesting via PiezoelectricityAbhilasha Sharma 17 Maximal Link Mode Algorithm for Task

    Allocation in Distributed Computing System Abhilasha Vyas 190 Data Security From Malicious Attack:

    Computer VirusesAbhipal Singh 172 File Transfer Using Secure Sockets in Linux

    EnvironmentAbhishek Khemka 193 Wireless Automatic Gate Sensing Alarm and

    Smoke Alarm Especially for Persons with Hearing Problem

    Abhishek Tandon 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy

    Abid Yunus Salati 46 Managing Knowledge Workers During Turbulent Times

    Adil Siddiqui 142 Electronic Judicial System

  • AuthorsAjay D. Parikh 43 Software Design Pattern for e-Governance

    Solution FrameworkAjay Tiwari 68 Managing Information Overload in Distributed

    Computing EnvironmentAjendra Isaacs 348 Ad-hoc Networking Protocols a Brief TreatiseAjendra Isaacs 349 Data Mining for Digital Libraries A New

    ParadigmAjit More 424 Applying Rough-Sets to Assist the Decision

    Making for ERP ImplementationAkanksha Gupta 106 Query Optimization in Heterogeneous

    Distributed DatabasesAkash Tayal 67 A Novel Technique Combining Euclidian

    Distance Measure and DHMM for Automatic Speaker Recognition

    Akash Tayal 185 Modeling and Analyzing Wavelet Based Watermarking System Using Game Theoretic Optimization Technique

  • AuthorsAkash Tayal 230 Nonlinear Circuit Modelling Using Volterra

    SeriesAkhil Jindal 201 A Novel Software Architecture for Network

    Security TestingAkhilesh K Sharma 158 Dual Firewall Technology for VPN NetworkAkshay Anand 361 Implementation of Workflows Intuitive Formal

    Approach (An Emergency Response Workflow Tool) in BPO Multiplexing

    Alok Kumar Dutt 368 Laptops Security Application Using RFIDAmandeep Makkar 73 Performance Evaluation of Protocols for

    Secure Routing Over MANETAmit Kour 335 A Study of Concurrency and Recovery

    Techniques in DatabasesAmit Kumar 244 Analysis of Time Complexity in Binary Search

    TreeAmit Kumar 251 Effect of Insertion and Immediately Deletion

    of Inserted Node From Red Black Tree

  • AuthorsAmit Kumar 260 Maximum Number of Keys in B Tree of

    Height KAmit Madan 284 Multi-Module Security: Bio-Secure

    Steganographic SystemAmit Sirohi 130 A New Approach for Mobility Management in

    the Wireless Network of a Mobile Communication System

    Amrit Kaur 415 Technology: Third Medium of InstructionAmrutha. V 115 Improving the Effectiveness of Inspection

    Through Verification and ValidationAnand K Pandey 87 A Review of Software Process Models and

    MethodologiesAnand Paropkari 274 HCI Challenges in Using Mobile Devices: A

    Study of Issues Faced by Senior Citizens While Using Mobile Phones

    Anil Kumar 147 Open Source Software Quality An Issue of Concern

  • AuthorsAnil T. Gaikwad 97 Core Banking and Its ImplementationAnil Ticku 146 Telemedicine in India - A Model for Jammu &

    Kashmir StateAnimesh Tripathy 198 A Novel Approach for Security Policy

    Integration and Conflict Reconciliation in a Ubiquitous Environment

    Aninda Banerjee 226 A New Technique for Detection and Location of Human Faces in Digital Image

    Anisur Rehman 315 Current-Mode Oscillator Using Single DVCCNasirAnjali Gupta 318 Low Power Design Strategies for SoCsAnjali Gupta 385 GSM Security and EncryptionAnkita Jhawar 69 Data Mining and Knowledge DiscoveryAnkita Lathey 185 Modeling and Analyzing Wavelet Based

    Watermarking System Using Game Theoretic Optimization Technique

  • Authors

    Anshu Chowdhary 218 Cyber Crime Management Using Evidence Based Software Engineering - Banking and Insurance Industries

    Anshul Agrawal 351 Secure and User Interactive Information Extraction in Linux Distributions

    Anu. G. Aggarwal 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy

    Anubha Bansal 372 An Effective Approach for Disaster Prevention Using GSM

    Anup Singh 328 Design & Analysis of PHY Aware MAC for Low Kushwaha Power Low Rate UWB NetworkAnuradha Sharma 53 Performance of Static Interconnection of

    Computer Network Through UMLAnuradha Taluja 162 Information and Communication Technology

    (ICT) - A Ram-Ban for Rural Development in Uttar Pradesh : An Overview

  • AuthorsAnurag Jain 329 Tones and Break Indices for Speech

    Processing - A ReviewAnurag Jain 406 PRAAT Implementation for Prosody

    ConversionAnurag Jain 407 Emotion Conversion in Hindi LanguageAnurag Singh 267 Digital Watermarking: Advanced Technique in Chauhan Image and Video TechnologyAnurag Srivastava 368 Laptops Security Application Using RFIDAnurag Srivastava 321 An Extended GCLP Algorithm for Hardware

    Software PartitioningAnusha Bhatnagar 362 Application of Genetic Algorithm in Oil

    Drilling ProblemApoorva Shukla 311 Comparative Study of Ontology Merging

    AlgorithmsArchana Agarwal 329 Tones and Break Indices for Speech

    Processing - A Review

  • AuthorsArchana B Saxena 29 Rural e-Banking: Gaps, Inefficiencies,

    Emerging Solution Through Mobile Terminals at Customer Door-Step

    Archana Saxena 128 Search Engines - "Issues and ImprovementsArchana Sharma 157 E-Commerce : Improving Performance of

    Customer Knowledge ManagementArdhendu Mandal 223 SRS BUILDER 1.0: An Upper Type CASE Tool

    for Requirements SpecificationArnab Samanta 378 Increasing Network Security Using Laws of

    Networking and Quantum MechanicsArti Agarwal 339 Virtual Instrumentation for Biomedical

    ApplicationsArti Patle 78 Data Mining with Support Vector MachineAruna Tiwari 55 An Intelligent Blackjack Game Using

    Reinforcement Learning AlgorithmsArunkumar. V 207 Multimodal Biometrics by Fusion of Finger

    Vein and Finger Print Images

  • AuthorsArvind Jaiswal 408 Quandary Elucidating Tactics of Water

    Resource Management by Information Technology

    Arvind Singh 55 An Intelligent Blackjack Game UsingChandel Reinforcement Learning AlgorithmsArvind Upadhyay 52 Strategies for Wavelength Assignment in

    WDM Optical NetworksAsaad A. M. 269 In-door Image Motion Detection with Objects Al-Salih Identification and Position Shift-Velocity

    ComputationAsaad A. M. 270 A Machine Vision System for Motion Analysis Al-Salih and DFT-Velocity Computation in Out-door

    Video FramesAsha Gowda 64 Feature Subset Selection in Medical Data Karegowda Mining Using Cascaded GA & CFS: A Filter

    ApproachAshima Wadhwa 373 Real Time Operating Systems (RTOS)

  • AuthorsAshish B. Sasankar 391 Role of EEG Lab for Analyzing

    Electroencephalogram SignalAshish Gupta 301 Energy Harvesting via PiezoelectricityAshish Surywanshi 158 Dual Firewall Technology for VPN NetworkAshish Valuskar 385 GSM Security and EncryptionAshok Kumar 40 Information and Management Science in Sharma Developing Inventory Policies for Service-

    Sensitive ItemsAshok Kumar 102 Traffic Generation Model for Delhi Urban Area Sinha Using Artificial Neural NetworkAshwini Kale 98 Design and Establishment of Information

    System in Rural Areas for Sustainable Agriculture

    Ashwini Kumar 57 Web Supported Expert System for LearningAsma Shibli 327 Comparison Factors for the Selection of

    Enterprise Resource Planning (ERP) Implementation Strategy

  • AuthorsAtikant Shrivastava 318 Low Power Design Strategies for SoCsAtikant Shrivastava 385 GSM Security and EncryptionAvanish Kumar 17 Maximal Link Mode Algorithm for Task

    Allocation in Distributed Computing SystemAvijit Dutta 184 Collaborative Knowledge with Cloud

    ComputingAvishek Banerjee 379 Bengali-English Relevant Cross Lingual

    Information Access Using Finite AutomataAvneesh Chauhan 450 Software Reliability Growth Modeling for

    Distributed Environment Using Component-Specific Testing-Effort Functions

    Ayushi Ameriya 69 Data Mining and Knowledge DiscoveryB Bandyopadhyay 20 Providing Security of Fingerprint Images

    Through Digital WatermarkingB N Chatterjii 20 Providing Security of Fingerprint Images

    Through Digital Watermarking

  • AuthorsB. R. Chandavarkar 381 Modifications in the Working Model and

    Handoff Mechanism of MIPv6B. V. Ramana 94 A Methodology for Successful ProjectMurthy Management in Medium Scale EnterprisesB. V. Ramana 95 Applying Agile & Web Engineering Technique Murthy for Successful Web ManagementB. V. Ramana 96 Designing a Web Education Model forMurthy Effective Teaching - Learning ProcessBarjesh Kochar 366 A New Approach of Extraction Transformation

    Loading Using PipeliningBeneyaz Ara 198 A Novel Approach for Security PolicyBegum Integration and Conflict Reconciliation in a

    Ubiquitous EnvironmentBharat B. Bhagat 359 Study of Internet Usage in Veterinary and

    Agricultural Sciences

  • AuthorsBharat Singh 178 Next Generation Networks: Enhancing

    Performance and Security for Providing Mobile Multimedia Broadcasting

    Bharati Yelikar 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management

    Bharti 324 Texture Based Image Retrieval With an Application to CBIR

    Bhavna Bajpai 18 Knowledge Management: Information & Knowledge Sharing Through Intranet

    Bhavsingh Maloth 261 Evaluation of Integration Algorithms for Meta -Search Engine

    Bhavsingh Maloth 304 A Software Tool to Access Evolutionary Algorithms for Data

    Bhawana Sharma 161 Analysis of Software Threats and Software Security

  • AuthorsBhawana Sharma 252 Software Metrics Visa-Vis Software

    VulnerabilityBhupendra Singh 186 Online Voting System Bibhudatta Sahoo 412 Effect of Rushing Attack on DSR in Wireless

    Mobile Ad-hoc NetworksBratin Bhattacharya 387 A Hybrid Black Box Technique for the

    Selection of Optimum Number of Test CasesC. Komalavalli 93 Query Optimization in Homogenous

    Distributed Database Management SystemC. Naga Raju 231 A Novel Edge Detection Technique for Color

    ImagesC. S. Rai 328 Design & Analysis of PHY Aware MAC for Low

    Power Low Rate UWB NetworkChandan Kalra 386 Emerging Trends of IT in Healthcare SectorChandra Shekhar 178 Next Generation Networks: Enhancing

    Performance and Security for Providing Mobile Multimedia Broadcasting

  • AuthorsChandrakanth 122 Implementation of Multivariate ClusteringG Pujari Methods for Software Development

    Chandrakanth 325 Advanced Demodulation Scheme for theH. Gowda CDMA SystemD. A. Vidhate 253 Dynamic Cluster Resource Allocations for

    Jobs with Known Memory DemandsD. N. Verma 324 Texture Based Image Retrieval With an

    Application to CBIRD. Rama Rao 255 Recovery of Mobile Internet TransactionsD. Rama Rao 257 Potential Air Traffic Congestion Solution: Slot

    Allocation by Auction MethodD. V. Guleria 253 Dynamic Cluster Resource Allocations for

    Jobs with Known Memory DemandsD. V. M. Krishna 231 A Novel Edge Detection Technique for Color

    ImagesDalip Bhat 147 Open Source Software Quality An Issue of

    ConcernDalwinder Singh 136 Aspect Oriented Programming Java RMI Salaria Server

  • Authors

    Debadutta Mohanty 135 A New Type of Covering Based Generalized Rough Set

    Deepa Gangwani 387 A Hybrid Black Box Technique for the Selection of Optimum Number of Test Cases

    Deepak Singh 78 Data Mining with Support Vector MachineChouhanDeepali Shahane 340 Advantages of ERP System in SMEsDeepshikha 392 User Interactive Web Content Adaptation for

    Mobile DevicesDeepshikha 49 Threats and Innovations of Information Bhargava Security in the 21st CenturyDeepshikha 60 Cloud Computing: Its Security & Privacy Jamwal aspectsDeepshikha 62 Improving QoS in Video MulticastingJamwalDeepshikha 161 Analysis Of Software Threats and Software Jamwal Security

  • Authors

    Deepshikha 62 Dark Side of Cyber Crime in India: A Case Jamwal StudyDeepshikha 252 Software Metrics Visa-Vis SoftwareJamwal VulnerabilityDeepshikha 254 Software Reuse: A Systematic ReviewJamwalDeepshikha 272 Status of Use of IT Tools in SMEs in Jammu Jamwal and KashmirDeepti Nayar 82 Emerging Techniques for Online Analytical

    Processing and its VisualizationDeepti Sharma 29 Rural e-Banking: Gaps, Inefficiencies,

    Emerging Solution Through Mobile Terminals at Customer Door-Step

    Deepti Sharma 108 A Solution to Load Balancing Problem in Object Oriented Clusters

    Devanand 133 Reusability in Component Based Development Process Model in Software Development

  • Authors

    Devanand 139 Role of ICT in Narrowing the Digital Divide in India

    Dhawal Shrivastava 301 Energy Harvesting via PiezoelectricityDheeraj Mehrotra 50 Towards 21st Century Classrooms: The

    Quality Requisite!Dhiraj S. Rajani 116 Robust Steganography Using Secure

    Password Protected SchemeDivya Goel 234 Need for CCL in Grid ComputingDivya Leekha 176 Corporate Strategies Adopted by IT Industry

    to Beat the Global CrisisDivya Setia 406 PRAAT Implementation for Prosody

    ConversionDivya Setia 407 Emotion Conversion in Hindi LanguageDivya. T. V. 247 Context Aware Multicasting Scheme for Delay

    Tolerant Mobile NetworksEla Kumar 383 Network Aware Routing Protocol for MANET

  • AuthorsEsha Saxena 167 Analyzing Steganographic Algorithm in Java

    by Function Point TechniqueFaheem Masoodi 452 Comparative Analysis of Structures and

    Attacks on Various Stream CiphersG. Gayatri 99 Bio - InformaticsG. N. Purohit 26 IPv6 Transition - An Engineering Exercise or a

    Necessity?G. Pramod 237 The Network Security Assessment Instrument

    to Reduce Software Security RiskG. Pramod 238 Software Testing ScenarioG. R. Bamnote 232 Enhanced Security for Audio Signals Using

    Steganography

    G. Ram Mohana 381 Modifications in the Working Model andReddy Handoff Mechanism of MIPv6G. S. Sambyal 204 Dark Side of Cyber Crime in India: A Case

    Study

  • AuthorsG. Vakula Rani 365 A Comparative Study of Fast Matrix

    Multiplication Methods by Using Vedic Algorithms

    Garima Verma 175 Reducing LOC and Cyclomatic ComplexityGautam 359 Study of Internet Usage in Veterinary and

    Agricultural SciencesGautam Dhameja 347 AOEB: Energy Aware Routing Scheme for

    Wireless Sensor NetworksGeetanjali 422 Application of Mobile Banking Services in the

    Bank AreaGeetanjali Surange 24 Personalized Web Search: User Modeling

    Using Implicit Feedback From Click Through Data

    Geetika Kapoor 56 Prioritization of Test Cases for Regression Testing

    Gopal Kamal 66 e-Commerce, Taxation in the Age of Birds Without Shadows

  • Authors

    Gupta Shubha Jain 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System

    Gurjeet Kaur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

    Gurneet Singh 172 File Transfer Using Secure Sockets in Linux Sethi EnvironmentGurvinder Singh 371 Critical Evaluation of Applications of Expert

    SystemsGurvinder Singh 372 An Effective Approach for Disaster

    Prevention Using GSMGurvinder Singh 374 Evaluation of Network Congestion

    Controlling ApproachesGurvinder Singh 375 Increasing the Efficiency of Echo Hiding

    Digital Audio Steganography

  • Authors

    Gyanendra Kumar 419 Resource Scheduling in Mobile Distributed Real Time Database Systems: A New Perception for Operating System

    H. S. Nagalakshmi 58 Natural Relational Algebra: A New Approach for Query Processing

    H. Umadevi 325 Advanced Demodulation Scheme for the CDMA System

    Harish Kumar 162 Information and Communication Technology Taluja (ICT) - A Ram-Ban for Rural Development in

    Uttar Pradesh : An OverviewHarmanpreet Kaur 409 A New Generation of Electronic CommerceHarneet Kaur 230 Nonlinear Circuit Modelling Using Volterra

    SeriesHarpreet Parashar 144 Reduction of Parasitic Capacitance for

    Transmission with the Help of CPLHarshita Sharma 67 A Novel Technique Combining Euclidian

    Distance Measure and DHMM for Automatic Speaker Recognition

  • AuthorsHarsimerjeet 34 Public Entrepreneurship: A Dynamic Strength Khurana for Budding Green TechnologyHimali Natekar 176 Corporate Strategies Adopted by IT Industry

    to Beat the Global CrisisHimanshu Sharma 93 Query Optimization in Homogenous

    Distributed Database Management SystemHimanshu Sharma 285 Effectiveness of DSDV Protocol Under Hidden

    Node EnvironmentHimayatullah 344 An Efficient Knowledge Base Mutual Linker Sharief FrameworkHimayatullah 345 Competent Ranking Algorithm for Web-Based Sharief Search EnginesInderjit Singh 136 Aspect Oriented Programming Java RMI Dhanoa ServerIqbal Azam 192 Education Technology Based Models of

    Teaching and Learning

  • AuthorsJ. B. Singh 102 Traffic Generation Model for Delhi Urban Area

    Using Artificial Neural NetworkJ. P. Singh 330 Computing with DNAJ. Reena 242 Protected Content Based Image RetrievalJ. Reena 243 Relevance Feedback for Distributed Content -

    Based Image Retrieval

    J. Reena 278 Secure Routing for Mobile in Ad-hoc NetworkMathigoldaJagadeesh. G 115 Improving the Effectiveness of Inspection

    Through Verification and ValidationJasdeep Singh 279 A Comprehensive Approach Towards DataMalik Preprocessing Techniques & Association

    RulesJasleen Kaur 172 File Transfer Using Secure Sockets in Linux

    EnvironmentJaspal Singh 235 On NTRU Cryptosystems and Timing AttacksBhatia

  • AuthorsJaswinder Kaur 364 Evaluation System with Oracle 10gJatan Saraf 312 Performance Analysis and QoS Assessment

    of Queues Over Multi - Hop NetworksJatan Saraf 313 WsVsSenNet: An Era of Enhanced Vision

    Based Sensing CapabilityJawed Ahmed 341 The Noise-Robustness of Mel-Frequency

    Cepstral Coefficients (MFCC) for Speech Recognition

    Jaya Sil 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System

    Jayanthi R 115 Improving the Effectiveness of Inspection Through Verification and Validation

    Jewan Singh 188 Information and Communication Technologies for strengthening Panchayati Raj in India A Model for J&K State

    Jewan Singh 199 Information and Communication Technologies (ICTs) for Sustainable Development in Agriculture A Model for J&K State

  • AuthorsJoydeep 467 Significance of IT-enable BPR in Business Chowdhury Enterprise and in Customer endJoydeep 469 Current Market Scenarios of High demand Chowdhury BPR implementation through BPM softwareJyoti Kharade 35 Citizen Centric e-Governance: Problems and

    ProspectsJyoti Mahajan 133 Reusability in Component Based

    Development Process Model in Software Development

    Jyotirmay Patel 337 Effectiveness of New Technologies for Teaching and Learning: Web 2.0 and e-Learning

    Jyotish Kumar 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging

    Jyotsna Nigam 353 Evaluating Web Crawler AlgorithmsK B K S Durga 249 Hyperion Essbase Technology

  • AuthorsK. C. Joshi 196 Reliability and N-version Programming in

    Software Fault ToleranceK. Krishna Veni 265 Integration of HIS with the Internet Appliance

    System for the Treatment of Human InfertilityK. M. Mital 205 ICT and Emergency Medical Services K. P. Tripathi 46 Managing Knowledge Workers During

    Turbulent TimesK. P. Tripathi 179 A Conceptual Framework of Ethics in

    Information TechnologyK. P. Yadav 331 Detecting and Preventing IP Spoofed Attack

    by RSA Asymmetric Crypto SystemK. R. Radha 394 Data Mining in Healthcare SectorKrishnanK. R. Radha 396 Neuro-informatics in India - Problems and Krishnan TrendsK. Raja 200 An Analysis of Rural Economic Geography

    using Spatial Data Mining Techniques

  • AuthorsK. Raja 418 An Analysis of Rural Economic Geography

    Using Spatial Data Mining TechniquesK. Rajalakshmi 25 Solving Cellular Mobile Networks Assignment

    Problem Using Iterative Local Search Algorithm

    K. Rajashekhar 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission

    K. S. Gurumurthy 325 Advanced Demodulation Scheme for the CDMA System

    K. V. Madhu 54 Trust Aware Load Distribution in a Data Grid Murthy EnvironmentK. V. N. Sunitha 224 A MAIL Reader in TeluguK. V. N. Sunitha 228 Voice Enabled Mail Reader-VMAILK.Srinivasa Babu 94 A Methodology for Successful Project

    Management in Medium Scale Enterprises

  • AuthorsKalpana Yadav 450 Software Reliability Growth Modeling for

    Distributed Environment Using Component-Specific Testing-Effort Functions

    Kanchan Lata 403 Information Technology for Education, Health Bhardwaj and DevelopmentKanu Priya 273 Introducing Machine Intelligence Quotient as Aggarwal a New COTS Evaluation MeasureKanupriya 69 Data Mining and Knowledge DiscoveryChaturvediKapil Baliyan 392 User Interactive Web Content Adaptation for

    Mobile DevicesKapila Kapoor 56 Prioritization of Test Cases for Regression

    TestingKashyap Rajpal 319 Security Concern Using Aspect Oriented

    Programming (Aspect C)Kavish Sehgal 319 Security Concern Using Aspect Oriented

    Programming (Aspect C)

  • AuthorsKavita Bhatnagar 183 Security and Efficiency in Ad-hoc Mobile

    NetworkKavita Thorat 52 Strategies for Wavelength Assignment in

    WDM Optical NetworksKavleen Kaur 172 File Transfer Using Secure Sockets in Linux Oberoi EnvironmentKhanhaiya Singh 416 Improving the Quality of Organization

    Through ERP Systems: Indian Industry SurveyKhushbu Garg 389 A Mechanism for Congestion Control Using

    XCP Over Wireless Mobile NetworkKiran 83 Quality of Service for Mobile Ad-hoc NetworksKiran 88 Performance Analysis of Multi Media Ad-hoc

    NetworksKodanda Kumar 320 Distributed Query Optimization: Use of Mobile Melpadi AgentsKokula Krishna 120 On Demand Temporary Route Recovery for Hari. K Frequent Link Failures in Ad-hoc Networks

  • AuthorsKokula Krishna 121 Implementation of Weighted Rule MiningHari. K Algorithm for Wireless Sensor NetworksKorra Bichya 242 Protected Content Based Image RetrievalKorra Bichya 243 Relevance Feedback for Distributed Content -

    Based Image RetrievalKranthi Kumar 239 Validation of Clustering Algorithms for Mobile Amirineni Ad-hoc Networks Using Colored Petri NetsKshama 333 Identifying Parameters with Data Collection Paithankar Methods for Software Development in View of

    UsabilityKuldeep Bhardwaj 236 On NTRU Implementation: An Algorithmic

    Approach Kuldeep Kumar 219 Use of GA in Solution of TTPKumar Kush 60 Cloud Computing: Its Security & Privacy

    aspectsKumar Kush 62 Improving QoS in Video Multicasting

  • AuthorsKumarjit Banerjee 226 A New Technique for Detection and Location

    of Human Faces in Digital ImageLakshmi Kalyani 377 Assessing Adoption of m-CRM in Education

    CentersLalit Saraswat 103 Comparative Analysis of Various Security

    Techniques to Protect VoIP System in an Enterprise Network

    Lalla Atul Singh 312 Performance Analysis and QoS Assessment Chaurasia of Queues Over Multi - Hop NetworksLatika Kharb 131 Software Testing vs. Code Inspection: What

    else for Verification & Validation?Ligade Smita 210 Empirical Study of Factors Affecting Success

    of SNS (Social Networking Sites)M Srikanth Yadav 256 A Unit-Test Framework for Database

    ApplicationsM. A. Jayaram 64 Feature Subset Selection in Medical Data

    Mining Using Cascaded GA & CFS: A Filter Approach

  • AuthorsM. Abul Hasan 192 Education Technology Based Models of

    Teaching and LearningM. Abdul Hasan 263 e-Waste Management and Hazardous Effects

    on EnvironmentM. Afshar Alam 388 K-Means Clustering Using WEKA InterfaceM. Afshar Alam 423 A Dynamic Load Balancing Algorithm for Web

    ApplicationsM. Bala Krishna 421 Mobility Management Techniques and QoS in

    Mobile WiMaxM. Kamil 37 Logic Theory: A Journey from Digital System

    Design to Knowledge Based System DesignM. N. Doja 388 K-Means Clustering Using WEKA InterfaceM. N. Doja 421 Mobility Management Techniques and QoS in

    Mobile WiMaxM. P. Thapaliyal 175 Reducing LOC and Cyclomatic ComplexityM. Sivakumar 355 New Approach and Additional Security to

    Existing Cryptography Using Cubical Combinatorics

  • AuthorsM. Sivakumar 356 Secured Remote Method Invocation

    FrameworkM. Suhaib Abbasi 192 Education Technology Based Models of

    Teaching and LearningM. Suhaib Abbasi 263 e-Waste Management and Hazardous Effects

    on EnvironmentM. V. Lakshmaiah 413 Overview of the Grid Technology and e-

    Governance for e-Health Implementation in Africa

    Madaswamy Moni 160 FISHNET: An Emerging e-Governance Programme to empower Fishing Communities and Facilitate Fisheries Business

    Madhavi Pingili 8 Crawling the Web at Desktop ScalesMadhavi Pingili 241 Potential Air Traffic Congestion Solution Slot

    Allocation by Auction MethodMadhavi Pingili 287 Enterprise Collaboration ToolMadhavi Sinha 384 Role of Natural Language Processing in

    Community Structure Detection

  • AuthorsMadhusudhana 266 An Efficient Solution for Evaluation Problem Rao D of HMMMahamaya 169 A Revitalized Dynamic Slicing Method for Mohanty Program Testing and DebuggingMahamaya 197 Testing Graphical User Interface UsingMohanty Decision Based Sequence DiagramsMahesh Grover 384 Role of Natural Language Processing in

    Community Structure DetectionMalathy. C 207 Multimodal Biometrics by Fusion of Finger

    Vein and Finger Print ImagesMalini M. Patil 332 Data Stream Mining Using Landmark Stream

    Model for Offline Data Streams: A Case Study of Health Care Unit

    Mamta Sachdeva 77 Network Monitoring: Topology, Methods and Issues

    Manika Babbar 230 Nonlinear Circuit Modelling Using VolterraSeries

  • AuthorsManika Gupta 352 Data Mining and Audience Intelligence for

    AdvertisingManinder Singh 406 PRAAT Implementation for ProsodySuri ConversionManinder Singh 407 Emotion Conversion in Hindi LanguageSuriManish Saraswat 395 Software Reliability Assessment and

    Prediction: Artificial Neural Network (ANN) Models

    Manisha Kumari 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture

    Manjot Bhatia 89 Resource Based Grid Scheduling AlgorithmManju Shree 357 Knowledge Management in a Research

    OrganizationManjula Sanjay 265 Integration of HIS with the Internet Appliance

    System for the Treatment of Human Infertility

  • AuthorsManmeet Singh 326 Data Mining and Business IntelligenceKapoor Technologies

    Manohar Lal 395 Software Reliability Assessment and Prediction: Artificial Neural Network (ANN) Models

    Manoj Kumar 36 A Directed Threshold Signature Scheme with Threshold Verification

    Manoj Kumar 180 Model Testing: Is it Only A Special Case of Pachariya Software Testing

    Mary Jacintha M 416 Improving the Quality of Organization Through ERP Systems: Indian Industry Survey

    Mashaallah 454 Instructions Executed Dependent Software Basirzadeh Reliability Growth Modeling for Open Source

    Software by Considering Change- Point

    Mayank 80 Stock Market ExpertKulshrestha

  • AuthorsMayank Kumar 361 Implementation of Workflows Intuitive Formal

    Approach (An Emergency Response Workflow Tool) in BPO Multiplexing

    Md. Arif 248 ICT Enabled Workflow and Progress Monitoring System for National Horticulture Mission

    Md. Tabrez Nafis 189 Mobile E-Commerce: Payment System Security

    Meena. A 208 Efficient Implementation of the Minimum Spanning Trees Based Clustering

    Meenakshi Bhat 76 In-silico Comprehensive Sequence and Structure Analysis of Proteases Family

    Meenakshi Gupta 12 IPv4 vs IPv6 - Next Generation Internet Meenakshi 142 Electronic Judicial SystemSharmaMeraj Ahmed 327 Comparison Factors for the Selection ofKhan Enterprise Resource Planning (ERP)

    Implementation Strategy

  • AuthorsMohamed Meftah 423 A Dynamic Load Balancing Algorithm for Web Alrayes ApplicationsMohammad Atique 203 Software Engineering Challenges: A Case

    StudyMohammad Pasha 182 VAMS: An Effective Approach for Vehicle

    Assisted Messaging Scheme in VANETsMohammad Pasha 400 A Study of Wi-Fi Enabled Vehicular Networks

    Using QualNet SimulatorMohammad 452 Comparative Analysis of Structures and Ubaidullah Bokhari Attacks on Various Stream CiphersMohammed 94 A Methodology for Successful Project Sharfuddin Management in Medium Scale EnterprisesMohammed 95 Applying Agile & Web Engineering Technique Sharfuddin for Successful Web ManagementMohammed 96 Designing a Web Education Model for Sharfuddin Effective Teaching - Learning Process

  • AuthorsMohan H .S. 220 Evaluating the Performance of Various

    Architectures for Wireless Ad-hoc NetworksMohd Abdul Ahad 167 Analyzing Steganographic Algorithm in Java

    by Function Point TechniqueMohd. Rihan 334 Intelligent Control for Power System

    ApplicationsMohd. Rihan 339 Virtual Instrumentation for Biomedical

    ApplicationsMohd. Sadiq 37 Logic Theory: A Journey from Digital System

    Design to Knowledge Based System DesignMohd. Umar 182 VAMS: An Effective Approach for Vehicle Farooq Assisted Messaging Scheme in VANETsMohd. Umar 400 A Study of Wi-Fi Enabled Vehicular Networks Farooq Using QualNet SimulatorMohit Agrawal 312 Performance Analysis and QoS Assessment

    of Queues Over Multi - Hop NetworksMohit Mathur 107 Achieving Vertical Scalability: A Hindrance to

    Cloud Computing

  • Authors

    Mohit Rai 317 Bringing Wireless Access to the Education: A Comparison of Wi-Fi, WiMAX, MBWA and 3G

    Mudita Shrivastava 98 Design and Establishment of Information System in Rural Areas for Sustainable Agriculture

    Muneeza Afaq 334 Intelligent Control for Power System Applications

    Muqeem Ahmed 343 Semantic Grid E Learning Platform for Educational System

    N. Kalyani 224 A MAIL Reader in TeluguN. Kalyani 228 Voice Enabled Mail Reader-VMAILN. Prasanna Balaji 241 Potential Air Traffic Congestion Solution Slot

    Allocation by Auction MethodN. Prasanna Balaji 237 The Network Security Assessment

    Instrument to Reduce Software Security RiskN. Prasanna Balaji 238 Software Testing Scenario

  • AuthorsN. Prasanna Balaji 242 Protected Content Based Image RetrievalN. Prasanna Balaji 243 Relevance Feedback for Distributed Content -

    Based Image RetrievalN. Prasanna Balaji 287 Enterprise Collaboration ToolN. Ramachandran 86 A Simulation Study of Content Delivery

    NetworkNadia Imdadi 91 Semantic Kernel for Automatic Integration of

    Semantic RepositoriesNamita Singh 204 Dark Side of Cyber Crime in India: A Case

    StudyNand Kumar 224 Improving Academic Performance of

    Students by Using Online Real Time Attendance Monitoring: A Case Study At Al Fateh University

    Nandita Sengupta 410 Dimension Reduction Using Rough Set Theory for Intrusion Detection System

    Narendra Gupta 349 Data Mining for Digital Libraries A New Paradigm

  • AuthorsNarendra Kumar 190 Data Security From Malicious Attack: Tyagi Computer VirusesNasreddin B. El 411 Improving Academic Performance of Zoghbi Students by Using Online Real Time

    Attendance Monitoring: A Case Study At Al Fateh University

    Nasreddin B. El 413 Overview of the Grid Technology and e-Zoghbi Governance for e-Health Implementation in

    AfricaNavendu Nitin 348 Ad-hoc Networking Protocols a Brief TreatiseNavendu Nitin 349 Data Mining for Digital Libraries A New

    ParadigmNavneet Sharma 403 Information Technology for Education,

    Health and DevelopmentNavneet Tiwari 312 Performance Analysis and QoS Assessment

    of Queues Over Multi - Hop NetworksNavneet Tiwari 313 WsVsSenNet: An Era of Enhanced Vision

    Based Sensing Capability

  • AuthorsNavneet Tiwari 314 Living BEAM Elegant Wizards - The Future of

    Artificial IntelligenceNeelima Relan 235 On NTRU Cryptosystems and Timing AttacksNeeraj Gupta 77 Network Monitoring: Topology, Methods and

    IssuesNeeta Wadhwa 309 Cryptography and MathematicsNidhi Kohli 362 Application of Genetic Algorithm in Oil

    Drilling ProblemNikhil Jindal 201 A Novel Software Architecture for Network

    Security TestingNilesh M. Shelke 401 A Practical Approach Towards Development

    of Applications and Solutions Using Java Agents

    Nilesh Mahajan 277 A Literature Review of Methods Used in Software Industries for Successful Software Project management

    Nipur 132 Routing in Ad-hoc Networks

  • Authors

    Nipur 380 Network Management and Routing Strategies with Mobile Agent

    Niraj Saxena 80 Stock Market ExpertNitant 148 Circuit Design with Independent Double Gate

    TransistorsNitasha Bisht 177 Full Substractor Circuit Design with

    Independent Double Gate MOSFETNitesh Kumar 393 Development of Motherboard Ontology Using

    Protg V3.4 Rc2 (Build 529)Niti Verma 273 Introducing Machine Intelligence Quotient as

    a New COTS Evaluation MeasureNitin Tyagi 81 Performance Comparison and Improvement of

    Routing Protocols - DSRNitul Kaushik 128 Search Engines - "Issues and Improvements"Nnj Hemrom 357 Knowledge Management in a Research

    Organization

  • AuthorsNune Sreenivas 413 Overview of the Grid Technology and e-

    Governance for e-Health Implementation in Africa

    Nupur Prakesh 328 Design & Analysis of PHY Aware MAC for Low Power Low Rate UWB Network

    Nutan Jaiswal 177 Full Substractor Circuit Design with Independent Double Gate MOSFET

    O. P. Chaudhary 348 Ad-hoc Networking Protocols a Brief TreatiseO. P. Vyas 336 Evaluating Impact of Operating System

    Architectures on Simulation Results of Routing Mechanisms for Wireless Sensor Networks

    Om Prakash Verma 284 Multi-Module Security: Bio-Secure Steganographic System

    P. Balaram Papana 231 A Novel Edge Detection Technique for Color Images

    P. C. Jha 461 Optimal Testing Time Allocation of Modular Software for Exponential SRGM Incorporating Imperfect Debugging

  • AuthorsP. Elayaraja 355 New Approach and Additional Security to

    Existing Cryptography Using Cubical Combinatorics

    P. Elayaraja 356 Secured Remote Method Invocation Framework

    P. G. V. Suresh 413 Overview of the Grid Technology and e-Kumar Governance for e-Health Implementation in

    AfricaP. K. Jha 399 Encryption Through Cascaded Recursive

    Addition of Blocks and Key Rotation of a Session Key (CRABKR)

    P. K. Kapur 449 Optimal Allocation of Testing Effort: A Control Theoretic Approach

    P. K. Kapur 450 Software Reliability Growth Modeling for Distributed Environment Using Component-Specific Testing-Effort Functions

    P. K. Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy

  • AuthorsP. K. Kapur 454 Instructions Executed Dependent Software

    Reliability Growth Modeling for Open Source Software by Considering Change- Point

    P. K. Kapur 456 Unified Framework For Developing Testing Effort Dependent Software Reliability Growth Models with Change point and Imperfect Debugging

    P. K. Kapur 459 Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

    P. K. Srimani 265 Integration of HIS with the Internet Appliance System for the Treatment of Human Infertility

    P. K. Srimani 365 A Comparative Study of Fast Matrix Multiplication Methods by Using Vedic Algorithms

    P. K. Srimani 376 Implementation of the K-Means Method for Single and Multidimensions

  • AuthorsP. K. Srimani 332 Data Stream Mining Using Landmark Stream

    Model for Offline Data Streams: A Case Study of Health Care Unit

    P. L. Ramteke 332 Data Stream Mining Using Landmark Stream Model for Offline Data Streams: A Case Study of Health Care Unit

    P. N. Pandey 377 Assessing Adoption of m-CRM in Education Centers

    P. Sivaprakasam 86 A Simulation Study of Content Delivery Network

    P. Sowjanya 286 Adaptive QoS for Mobile Web Services Through Cross-Layer Communication

    P.C.Jha 463 Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme

    P.K.Kapur 453 Two Dimensional Flexible Software Reliability Growth Model and Related Release Policy

  • AuthorsP.N.Pandey 416 Improving the Quality of Organization

    Through ERP Systems: Indian Industry Survey

    Pallav Parkhe 101 Broadband - Wire Line TechnologyPallavi Satpule 316 Points-to Analysis of RMI-Based Java

    ProgramsPankaj Chauhan 389 A Mechanism for Congestion Control Using

    XCP Over Wireless Mobile NetworkPankaj Kumar 338 A New Approaches for FingerprintSharma Recognition Based on Fourier Transformed

    Selected Image (FTSI) AlgorithmsPankaj Singh Yadav103 Comparative Analysis of Various Security

    Techniques to Protect VoIP System in an Enterprise Network

    Parag Parandkar 191 Simulation and Synthesis of SONet Synchronous Transport Signal STS-12 Transmitter

    Parag Parandkar 211 Cost Effective Mass Transit Tracking System

  • Authors

    Parag Parandkar 301 Energy Harvesting via PiezoelectricityParag Parandkar 282 Performance Enhancement in Satellite Using

    UltraCMOS and Silicon Heat Pipe TechnologyParag Parandkar 318 Low Power Design Strategies for SoCsParimalendu 467 Significance of IT-enable BPR in Business Bandyopadhya Enterprise and in Customer endParimalendu 469 Current Market Scenarios of High demand Bandyopadhya BPR implementation through BPM softwareParmod Kumar 288 Intrusion Detection Approach to Secure Ad-

    hoc NetworksParul Goyal 4 Discrete Sequence Wavelet Transform NUC

    AlgorithmParul Kharub 65 Inorganic Expert: Automation of Inorganic

    ChemistryPawan Jindal 244 Analysis of Time Complexity in Binary Search

    Tree

  • AuthorsPawan Jindal 251 Effect o