130

Welcome [] › news › INDIACom 2009 Proceedings › pdfs › INDIACom.pdfTrack 2: High Performance Computing (C – I) 146 A Heuristic Algorithm for Locating Mobile Clients in Reduced

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

  • WelcomeINDIACom 2009

    3rd NATIONAL CONFERENCE ON "COMPUTING FOR NATIONAL DEVELOPMENT "

    This disc is designed so that you may locatepapers by session or author, as well as with fulltext search.Papers originated as electronic files and wereconverted to Adobe Acrobat PDF file format forconverted to Adobe Acrobat PDF file format forcross-platform access. Even though theviewing quality on your monitor may vary, all

    i t l lpapers print clearly.Thank you and enjoy!

  • Organisers

    Sponsors

    Technical Partners

    Media Partners

    click on the logo for more information

  • GGSIPUGuru Gobind Singh Indraprastha University

    established by Government of NCT of Delhi under the provisions of Guru Gobind Singh under the provisions of Guru Gobind Singh Indraprastha University Act, 1998 read with its Amendment in 1999.The University is

    i d b U i it G t C i i recognised by University Grants Commission (UGC), India under section 12B of UGC Act.

    The University has been awarded the ISO The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology Ministry Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three

    h b d d " d " byears. It has been accredited "A Grade" by NAAC during Feb - March 2007.

    www.ipu.ac.in

  • IETEThe IETE is the National Apex Professional

    body of Electronics and Telecommunication, Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics Computers Telecommunication Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognised by Ministry of HRD GoIof HRD, GoI.

    IETE Delhi is the largest centre of IETE and conducts coaching classes for the AMIETE and conducts coaching classes for the AMIETE and DIPIETE at its premises at Janakpuri, New Delhi.

  • Bharati Vidyapeeth

  • CSI

    The Computer Society of India, founded in 1965,is a non profit professional body where ITis a non-profit, professional body where ITprofessionals meet to exchange views andinformation, to learn and share ideas. CSI hasover 30,000 members to date, consisting ofprofessionals with varied backgrounds. Today ithas 62 chapters and 100 plus student brancheshas 62 chapters and 100 plus student branchesspread all over the country.

    Established in late 60s Delhi Chapter is one ofEstablished in late 60s, Delhi Chapter is one ofthe largest chapters of CSI, having strength ofmore than 1000 members. Delhi Chapter hasb d d h h d fbeen awarded the Best Chapter award for 2005-2006.

  • Sponsors

  • Technical Partners

  • Media Partners

  • Categories

    • Category I

    • Category II

    • Category III, IVg y ,

  • Tracks (C - I)• Track #1: Digital World

    T k #2 W b T h l i C N k• Track #2: Web Technologies, Computer Network

    And Information Security

    • Track #3 : Software Engineering & ERP

    • Track #4: High Performance Computing

  • Tracks (C – II)• Track #1: Digital World

    T k #2 W b T h l i C N k • Track #2: Web Technologies, Computer Networks

    And Information Security

    • Track #3 : Software Engineering & ERP

    • Track #4: High Performance Computing

  • Tracks (C - III, IV)• Track #1: Digital World

    T k #2 W b T h l i C N k • Track #2: Web Technologies, Computer Networks

    And Information Security

    • Track #3 : Software Engineering & ERP

    • Track #4: High Performance Computing

  • Track 1: Digital World (C – I)

    8 e-Readiness and Awareness Measurement Study Towards e-Governance Initiatives and Services at UttarakhandServices at UttarakhandDurgesh Pant and M.K Sharma

    18 e-GovernancePankaj K. Mudholkar and Megha Mudholkar

    30 Application of "Wireless Regional Area Network" in Creating Community NetworkNetwork in Creating Community NetworkMalaya Dutta Borah and Ganesh Chandra Deka

    45 Effect of e-Readiness Score on Knowledge IndexIndexAvijit Dutta

    47 e-Readiness in e-CommerceD.Sangheetha, R.Lalitha and D. VenkataRamana Raju

  • Track 1: Digital World (C – I)

    56 A Study of ICT in the Area of Agriculture and Rural Development in J&K StateD d P dh d S j J l Devanand Padha and Sanjay Jamwal

    80 Internet Banking Systems in India: Analysis of Security IssuesDevanand Padha and Deepshika Jamwal

    81 Biotelemetry Based Wireless Patient Monitoring SystemMonitoring SystemParag Parag Parandkar, Sumant Katiyal and Gurvinder Singh

    i d l i f i i l83 Design and Implementation of a Digital Signature Solution for e-Governance Compliant DIGITALGOV System on Enterprise Wide Area N t k (E WAN)Network (E-WAN)C.S.Rai and Jitender Chugh

  • Track 1: Digital World (C – I)

    103 ICT as an Stimulus for Development in Developing CountriesDevanand Padha and Sanjay JamwalDevanand Padha and Sanjay Jamwal

    114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke PatientsyAnees Ahmad, Hilal Ahmed and Saba Hilal

    115 SeedNet India Portal - A National Initiative of I f i S i Q li S d Information Services on Quality Seeds to Indian Farmers for Agricultural Productivity IncreaseMadaswamy Moni, Syed Usman and V. Rajeswari

    121 Digital Divide in Education-A Concern for J&K StateStateMansotra V., Sambyal G.S. and Vinod Sharma

  • Track 1: Digital World (C – I)

    122 Decision Support System for Disaster MangementVivek Kumar Pandey and Poorna GoyalVivek Kumar Pandey and Poorna Goyal

    125 Use of IT for Disaster Management and MitigationgBhavika Varma, Jeetendra Pande and V. K. Joshi

    134 A Study of ICT Penetration in Health Care S f J&K SSystem for J&K StateDalip Kumar Bhat and Vibhakar Mansotra

    148 Minor Irrigation Census Computerization: A 148 Minor Irrigation Census Computerization: A Step Towards ICT for Micro Level Planning in Water Resources Management and Planning to Achieve Rural Prosperityp yAjay kumar Gupta, Kishore Kumar and Madaswamy Moni

  • Track 1: Digital World (C – I)

    156 IT for Sustainable Agriculture Development in IndiaVidya Kumbhar

    168 Technological Perspective in Education: Revolution not EvolutionRevolution not EvolutionChandan Kalra and Rajni Johar

    179 Prevention from the Terrorist Bombs AttacksAmeen Uddin, Rahul Rathor and Sanjay Singh Senger

    182 Emerging Issues and Problems of 182 g gDisinvestment in Public EnterprisesAradhana, Sardar Singh and Manoj Kumar Singh

    192 e Learning Approach for Effective ESOL 192 e-Learning Approach for Effective ESOL TeachingMohammad Ubaidullah Bokhari and Salma Kuraishy

  • Track 1: Digital World (C – I)

    196 I.T in Faculty Improvement with a Bearing on Learning MethodologiesAshok SharmaAshok Sharma

    209 Analysis of e-Education: Developing as a Potential Learning System in Jammu Region: g y gIndiaNamita Singh and Deepshikha Jamwal

    210 Issues and Influences of e-Commerce in 210 Issues and Influences of e-Commerce in Developing CountriesDeepshikha Jamwal, Ranbireshwar Singh Jamwal and Devanand Padhaand Devanand Padha

    218 Role of e-Learning in a Developing Country like IndiaDeepshikha Aggarwal

  • Track 1: Digital World (C – I)

    228 Delivering Health Care in Rural India Using Information TechnologyRavish Saggar and Shubhra SaggarRavish Saggar and Shubhra Saggar

    230 Evaluation of Secondary School based on Analytic Hierarchy Process MethodAmita Goel, Anjana Gupta and Anukiran Jain

    238 Contact less Vehicle Identification Based on Services Oriented ArchitectureAjay D. Parikh

    239 e-Government and e-Governance : The Effective ICT ToolsEffective ICT ToolsGangadhar V. Kayande Patil and Rakesh S Patil

    254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh University, TripoliNand Kumar and Nasreddin B. El Zoghbi

  • Track 2: High Performance Computing (C – I)

    4 Autosurveillance using GSMDimple Dalby and Bobin Kuruvilla Sunny

    12 Fuzzy Logic Based Routing Strategies in VANETsShalini jain, Shweta Taneja and Deepak Jainj , j p

    28 Harmonic Content Discovery in Adhoc and Peer to Peer NetworksSh bbi Ah d T i Ah d Abb i V K Shabbir Ahmed, Tanvir Ahmad Abbasi, V.Kannan and Mohammad Usaid Abbasi

    32 Vulnerability AssessmentsMonika Sainger and Manish Mahajan

    48 An intelligent Overlay Search in UP2PD S h th d R L lithD.Sangheetha and R. Lalitha

  • Track 2: High Performance Computing (C – I)

    59 Comparison of Routing Protocols for Mobile Ad-hoc NetworksMukta GahlotMukta Gahlot

    60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile C tiComputingNarendra Kumar, Mohd Ahmad Mansoori, Mukesh Chand, Noor Mohd, Rakesh Sharma and Shahnawaz H iHusain

    61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc NetworkMohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd, Rakesh Sharma and Shahnawaz Husain

    67 Image Based Steganography Methods with High PayloadS K Mutto and Sushil kumarS.K Mutto and Sushil kumar

  • Track 2: High Performance Computing (C – I)

    75 Principle of Graph Theoretic Approach to Digital SteganographyS.K Mutto and Vinay Kumar

    85 Cybercrimes, cibercrimicals, cyberethics and other legal issuesM dh i M dh lik d B bit Y dMadhurima, Madhulika and Babita Yadav

    89 J2ME Applications to Implement Computer Graphics on Mobile DevicesGraphics on Mobile DevicesJaswinder Singh and Roshi Saxena

    97 A Survey of QoS in Mobile Ad-Hoc NetworksM.Asger and Sanjay Jamwal

    109 Efficient Certificate Revocation Lists In Public Key InfrastructureKey InfrastructureShalini Vermani

  • Track 2: High Performance Computing (C – I)

    111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic AlphabetsArun Kumar Chaturvedi and Chaitali Arun Kumar Chaturvedi and Chaitali

    112 Internet Protocol Version-6 (IPV6)Preeti Arora

    116 Image Security Enhancement through Watermarking and Cryptographic MeasuresB Bandyopadhay Tapas Bandyopadhay and B N B. Bandyopadhay, Tapas Bandyopadhay and B.N. Chatterjee

    118 A Survey on Steganography in AudioHitesh Singh, Pradeep Kumar Singh and Kriti Saroha

    119 A Survey on Text Based SteganographyHit h Si h P d K Si h d K iti S hHitesh Singh, Pradeep Kumar Singh and Kriti Saroha

  • Track 2: High Performance Computing (C – I)

    123 Analysis of 802.1X Authentication Protocol for General DeploymentJeetendra Pande and Kavita UpadhyayJeetendra Pande and Kavita Upadhyay

    124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data MiningDurgesh Mishra, Neha Koria, Nikhil Kapoor and Ravish Bahetyy

    130 Route Optimization In Mobile Adhoc Networks with Genetic AlgorithmsRakesh Kumar and Vijay DhirRakesh Kumar and Vijay Dhir

    144 Online Scheme towards Secured Inter Banking Fund TransferAakash Roy, Ajeet Kumar, Debasis Mitra, Debasish Jana and Radha Tamal Goswami

  • Track 2: High Performance Computing (C – I)

    146 A Heuristic Algorithm for Locating Mobile Clients in Reduced Time and CostVandana SharmaVandana Sharma

    162 A RMS Based Hierarchical Approach for IP Address Configuration in MANETgMohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd, Rakesh Sharma and Shahnawaz Husain

    163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for WirelessThreshold Selected Mapping for WirelessPankaj Kumar, R. K. nagaria and T.N. Sharma

    165 Fault Tolerant Computing: A Network R li bilit A hReliability ApproachK.C.Joshi and Dherendra P.Singh

  • Track 2: High Performance Computing (C – I)

    195 Hierarchical Classification of Security in IT EnvironmentSmiriti Jain and Maya IngleSmiriti Jain and Maya Ingle

    203 Teenage Security Considerations in Pervasive EnvironmentAnamika Bhargava and Saba Hilal

    217 An Overview of the Cryptographic Algorithms d th i I l t ti i FPGAand their Implementations using FPGAs

    Mohd. Ajmal Kafeel

    221 Lackadaisical Approach in Designing and its 221 Lackadaisical Approach in Designing and its Adverse Impact on Web Database SecuritySupria Madan

    231 Perspectives of Symmetric CryptographyDharmendra Kumar and Santosh Kumar Yadav

  • Track 2: High Performance Computing (C – I)

    232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Pattern (RCBP)Pattern (RCBP)J. K. Mandal, J. Pal Choudhury, Satyendra Nath Mandal and Uttam Kr. Mondal

    252 M lti l R ti ith S lf H li T h i 252 Multiple Routing with Self-Healing Technique for Quality of Support(QoS) in MANETNitesh Tomar

    253 Spin Protocol in Sensor Networks: An OverviewM K Tiwari O P Vyas and Bhawana NarainM.K.Tiwari, O.P.Vyas and Bhawana Narain

    258 Performance Analysis of High Speed Data Networks using Priority DisciplineA. K. Pal, Anu Chaudhary and K. Bhatia

  • Track 2: High Performance Computing (C – I)

    259 Reducing Network Traffic in Secure Multi-Party Computation

    261 User Authentication from the Remote Autonomous Object

    D. K. Mishra and Samiksha Shukla

    Autonomous ObjectK.K.Goyal and Kuldeep Bhardwaj

    266 Bluetooth based Electrical Measurement 266 Bluetooth based Electrical Measurement SystemMohd. Rihan and Priyanka Varshney

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    3 The Object Model of the JNUOS Operating SystemP C SaxenaP C Saxena

    22 Software ReliabilityAmitabh Yadav and Raees Ahmad Khan

    44 Emergence of Testing Maturity ModelRaees Ahmad Khan and Harish Kumar

    46 Development of Knowledge Engineering Based 46 Development of Knowledge Engineering Based Model of Insurance SectorA.K.Saini and Seema Rani

    55 A Comparative Analysis of Sorting Algorithms in two Opposite ExtremeDinesh .J.Prajati and Mahesh H.Panchalj

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    72 Requirements Traceability Matrix in Component Based DevelopmentDevendra Tayal Anita Yadav and Yogesh SinghDevendra Tayal, Anita Yadav and Yogesh Singh

    77 Analysis of Software Development Terms and User Satisfaction LevelDeepshika Jamwal and Devanand Padha

    78 Issues & Factors Evaluation of Software Quality ModelsQuality ModelsDeepshika Jamwal and Ranbireshwar S. Jamwal

    88 Promotion of an Expert System in Technical & Team Talent TrainingTeam Talent TrainingRachita Taxak and Ashwini Kumar

    90 Interpretability of Data Sources - Providing p y gInformationAbhilasha Vyas

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal LanguageA Sh i t M j D b i S P T i thi Anurag Shrivastava, Manuj Darbari, S. P. Tripathi, Shubha Mishra and Vivek Kumar Singh

    158 Agent Based Approach of Service Oriented Architecture for Business ModelingArchana Bhatnagar, O. P. Rishi and Ashok Sharma

    161 Software Testing: An Effective Method to 161 Software Testing: An Effective Method to Improve Software QualityArti Rana and Divya Arora

    164 Effect of Bussiness Constraints in Software Development ProductivityDevanand, Jyoti Mahajan and V. Mansotra

    171 Recent Trends in Database and Future DirectionsPradeep Aswal and Manish PandeyPradeep Aswal and Manish Pandey

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    174 Smart Card Operating System: Past, Present and FuturePoonam Sachdeva

    185 Data Integration and Management SolutionsH. R. Shashidhar, Manjunath B., R. Mageshwaran and A J Prasadand A. J. Prasad

    186 Computerized Human Resource System in Steel PlantA kit M l i Ni l H S j K d K Ankit Malviya, Niral Hemrom, Sanjay Kumar and K. C. Kothari

    208 Performance Evaluation of Disk Scheduling gAlgorithm and File Allocation MethodsArchana Wamanrao Bhade and Mir. Sidique Ali

    190 Challenges of Implementing HRIS in a Public 190 Challenges of Implementing HRIS in a Public Sector EnterpriseAnkit Malviya, Niral Hemrom, Sanjay Kumar and K. C KothariC. Kothari

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    199 Implementation of Integrated Refractory Information System at Steel PlantManju Shree Selvi S Shyamalesh Khan and K C Manju Shree, Selvi S., Shyamalesh Khan and K. C. Kothari

    201 A Comparative Study of Software R i t T l f S S ft Requirements Tools for Secure Software DevelopmentMohammad Ubaidullah Bokhari and Shams Tabrez

    204 Software Design Testability Factors: A New PerspectiveMohd Nazir and Raees A. Khan

    205 AOP with Eclipse AspectJ Development Tool (AJDT)Ganesh Gupta Pankaj Kumar and UmangGanesh Gupta, Pankaj Kumar and Umang

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    215 Lackadaisical Approach in Designing and its Adverse Impact on Web Database SecuritySupriya Madan

    225 A Qualitative Comparison of Three Change l i h i f bjImpact Analysis Techniques for Object

    Oriented SystemsAvadhesh Kumar, Laxmi Ahuja and Naresh Kumar

    235 A Novel Technique to Improve the Performance of Licensed Software in Client/Server Network Environment/S.A.M. Rizvi and Syed Imtiyaz Hassan

    240 Achieving Loose Coupling between Different Components of Model-View-Controller for Components of Model-View-Controller for Web Based ApplicationS. A. M. Rizvi and Syed Imtiyaz Hassan

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    241 Why Knowledge and Knowledge ManagementSumit Pandey and Aasho Balla

    242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software CompaniesAnurag Srivastava, Diwakar Yagyasen, Manoj Darbari and V.K.Singh

    249 Feature Extraction of Legacy Systems through Aspect Oriented ProgrammingS A M Rizvi and Zeba KhanamS. A. M. Rizvi and Zeba Khanam

    260 Managing ERP Implementation to Deliver Value- A Project Management Perspective

    h h d bhB. Manjunath, K. Anantha Padmanabha, R. Mageshwaran and A.J. Prasad

  • Track 3: Changing Architecture and Programming Paradigm (C – I)263 Knowledge Based Grid : Characteristics and

    StrategiesS.A.M. Rizvi and Muqeem AhmedS.A.M. Rizvi and Muqeem Ahmed

    265 Regression Testing of a Relational DatabaseKapila Kapoor and Rajiv Chopra

    268 How to Tap ERP’s Hidden Potential in India?Rashmi Jha and A.K.Sinha

    275 Assessing Software Reliability Growth with 275 Assessing Software Reliability Growth with Different Combinations For Distributed Environment Using ANN ApproachDeepak Kumar P K Kapur and Sunil K KhatriDeepak Kumar, P K Kapur and Sunil K. Khatri

    278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect DebuggingDeepak Kumar, P. C. Jha, P. K. Kapur, S. S. Handa

  • Track 3: Changing Architecture and Programming Paradigm (C – I)

    284 Modeling Software Reliability Growth in Distributed Environment Using Unified ApproachApproachOmpal Singh, P. K. Kapur and Prashant Johri

    288 A New Approach For Developing Testing Effort D d t S ft R li bilit G th M d lDependent Software Reliability Growth ModelsP.K. Kapur, Anu G. Aggarwal and Ravi Kumar

    292 Distribution Based Change-Point Problem with 292 Distribution Based Change Point Problem with Two Types of Imperfect Debugging in Software ReliabilityP K Kapur Sameer Anand V B SinghP. K. Kapur, Sameer Anand, V. B. Singh

    302 Optimal Component Selection For Fault Tolerance COTS Based Software System Under C R Bl k S hConsensus Recovery Block SchemeP. C. Jha, P. K. Kapur and Shivani Vaid

  • Track 4: Other Emerging Technologies (C – I)

    10 Fuzzy Logic Based Decision Maker System for Choosing CarsJasleen Kaur SethiJasleen Kaur Sethi

    13 Web Document Clustering for Finding Expertise in Research AreaAnil Kumar, T. Jaya Lakshmi

    19 Problems and Facets of Multi-Agent SystemsHarsimerjeet KhuranaHarsimerjeet Khurana

    25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsI h N th Jh d R k h Si hIsh Nath Jha and Rakesh Singh

    31 Novel FPGA Based Hardware Realization of Arbitrary FunctionsMohammad Usaid Abbasi, Tanvir Ahmad Abbasi, V.Kannan and Shabbir Ahmad

  • Track 4: Other Emerging Technologies (C – I)

    39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa A K Mishra Chaitali Rajendra Sharma and Sujata A.K.Mishra, Chaitali, Rajendra Sharma and Sujata Pulugugurta

    41 Design of an Intelligent-Agent Based T h i f S l i I t Technique for Solving Interprocess Synchronization ProblemDeepshikha Bhargava and Madhavi Sinha

    43 Data Cubing Algorithms- Comparative Study of Data Cubing AlgorithmsBeena Mahar

    49 The Robot and Human Emotional Interface -Towards Automatic Techniques of Emotional AssessmentAssessmentSaba Hilal

  • Track 4: Other Emerging Technologies (C – I)

    51 Kinematics Based Polygon ApproximationSumit Kumar and Nihar Rajan Roy

    52 Digital Image Watermarking using 2D Wavelet TransformS. C. Tamane

    54 A New Model to Perform Extraction Transformation Loading Barjesh Kochar and Rajinder Singh ChillarBarjesh Kochar and Rajinder Singh Chillar

    63 Game Theory: Modeling and Analyzing Conflicting Security Applications by E b ddi R ti litEmbedding RationalityAkash Tayal, Ankita Lathey, Ashwini Kumar and Shweta.

    66 Alchemi .NET Framework in Grid ComputingVijay Dhir

  • Track 4: Other Emerging Technologies (C – I)

    68 Implementing Grid Computing - Optimizing Resources to Meet Business RequirementsRashmi DesaiRashmi Desai

    69 Mixed Signal Hardware Description Languages VHDL-AMS and Verilog AMS- Compared and ContrastedContrastedParag Parandkar and Sumant Katiyal

    70 Adaptable Power Data Compression / i h iDecompression Technique

    Parag Parandkar, Sumant Katiyal and Gurvinder Singh

    76 Forecasting Daily Nifty Stock Returns with Artificial Neural NetworkAshutosh Kumar Bhatt and Durgesh PantAshutosh Kumar Bhatt and Durgesh Pant

    84 Personalization Issues in Pervasive ApplicationsS it K hik d S b Hil lSarita Kaushik and Saba Hilal

  • Track 4: Other Emerging Technologies (C – I)

    87 Geospatial Application on Web Service Oriented ArchitectureSeema Rani and Vandana SharmaSeema Rani and Vandana Sharma

    95 Analysis of Watermarking TechniquesJyoti Aroray

    101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) ProteinDwijendra K Gupta Ashutosh Mani Manish Dwivedi Dwijendra K. Gupta, Ashutosh Mani, Manish Dwivedi and Vijay Tripati

    102 An Evolutionary Analysis of Lysosomal A i d M b P i 1 (LAMP 1)Associated Membrane Protein-1 (LAMP-1)Ashutosh Mani, Manish Dwivedi and Vijay Tripati

    105 Evolutionary Account of GPI Anchor Proteins : 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based ApproachDwijendra K. Gupta, Manish Dwivedi and Vijay TripatiTripati

  • Track 4: Other Emerging Technologies (C – I)

    106 More than Data Warehouse- An Insight to Customer InformationDeepshikha Kalra and Ritu AggrawalDeepshikha Kalra and Ritu Aggrawal

    110 Data Mining – A Tool in Support of Interpretation of Low Pressure System Movement over Indian RegionKavita Pabreja

    126 Performance Comparison of Class AB 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOSFahad Ali Usmani Mohd Hasan and Naushad AlamFahad Ali Usmani, Mohd. Hasan and Naushad Alam

    136 Preprocessing for Click Stream Data MiningAnne Gutschmidt, Clemens H. Cap, O. P. Vyas and S. Shrivastava

    139 Delay Testable Enhanced Scan FlipflopShifaly Sharma and Amit Prakash SinghShifaly Sharma and Amit Prakash Singh

  • Track 4: Other Emerging Technologies (C – I)

    140 Suitability of Web usage Mining for Web Content SyndicationAnne Gutschmidt Clemens H Cap Kavita Das and Anne Gutschmidt, Clemens H. Cap, Kavita Das and O. P.Vyas

    157 A Comparative Study of Pectinase and Pectin 157 p yLyase Seuences from Plant and Microbial Sources using ClustalWEesha Ingle,Neha Gorani and Maya IngleEesha Ingle,Neha Gorani and Maya Ingle

    160 A study on Applications and Techniques used in Web Usage MiningSeema D.

    173 Variable Precision Rough Set based Decision T ee ModelTree ModelRajini Jain and Vardana Kalra

  • Track 4: Other Emerging Technologies (C – I)

    181 An Approach to Very low bit rate Speech CodingHari Kumar Singh, Sanjeev Sharma and Yash Vir Hari Kumar Singh, Sanjeev Sharma and Yash Vir Singh

    191 Optimizing HPC and Parallelization for NanotechnologyNanotechnologyRohit Pathak, Satyadhar Joshi and D. K. Mishra

    197 Knowledge Discovery in Spatial DatabasesMamta Dahiya

    200 Data Warehouse Architectural Design - using Parallel Processing on the Distributed Parallel Processing on the Distributed Environment for Effective Load Balancing and Data SharingAnshu SalujaAnshu Saluja

    202 Parallel Model Combination using Wideband Filters in Automatic Speech RecognitionM k hi Sh d S lil KhMeenakshi Sharma and Salil Khare

  • Track 4: Other Emerging Technologies (C – I)

    207 Digital Tampering Detection Techniques: A ReviewKusam Pawannesh Abrol and DevanandKusam, Pawannesh Abrol and Devanand

    216 Similarity Measures for Real World Data MiningH. S. Nagalakshmi and Suhasini M.

    222 Problem Solving Using Nature’s Way - Genetic Al ithAlgorithmMamta Madan

    251 Content Based Image Retrieval Techniques251 Content Based Image Retrieval TechniquesShikha Nirmal

    255 Detection of Stegoimages: A Comparative 255 g g pStudy of ClassifiersGaurav K. Rajput, R. K. Agrawal

  • Track 4: Other Emerging Technologies (C – I)

    256 Synthesizing High Frequency Association Rules for Determining Service Quality in Hospitals by Weighting Method Hospitals by Weighting Method Anirban Chakrabarty, Sonal G. Rawat

    247 Web Warehousing and e-GovernmentK.M. Alaskar, K.P. Tripati and Rajendra Kumbhar

    264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary Associated with Biosynthesis of Secondary MetabolitesS.A.M. Rizvi and Meenakshi Bhat

    267 P i All ti F A h i 267 Premium Allocation - Fuzzy Approach in Insurance Business Pooja Pathak and Sanjeev Kumar

    269 Next Generation Cloud Computing TechnologyShalini Singh,Deepali Kamthania and M.N.Hoda

  • Track 1: Digital World (C – II)

    9 The IT Security: The Quality ConcernDheeraj Mehrotra

    107 Implementing Web VotingDushyant Dutta and Ritika Jasrotia

    128 E-Governance-Today & TomorrowLava NautiyalLava Nautiyal

    234 Technology we InventA KaurA. Kaur

    236 e-Banking in India Prospects and OportunitiesR.P. Tulsian, Sanjeev Kumar and T.K. Sharmaj

    306 Changing Face of the Indian Financial MarketSanjeev Mittal,N.K.Gupta and Sudesh Kumar SharmaSharma

  • Track 1: Digital World (C – II)

    250 Impact of e-Governance in Rural & Urban Areas of PunjabSubhash Chander Sunil Kumar and Vikram SinghSubhash Chander, Sunil Kumar and Vikram Singh

  • Track 2: High Performance Computing (C – II)

    1 Telecommunications in India - Changing TrendsJeetendra Pande and Nihar Ranjan PandeJeetendra Pande and Nihar Ranjan Pande

    11 Trust Management in Adhoc NetworksM.V.Kulkarni and ShreejiThankappan

    62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile ComputingShahnawaz Husain, Mohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd and Rakesh Sharma

    100 Optical Technology and NetworksAshish A. Bardekar, Asmita Bardekar and S. N. SawalkarSawalkar

    193 Energy Efficient Watermarking on Mobile DevicesA D d Af S lt K hk h T bA.Damodaram,Afreen Sultana,Kahkashan Tabassum

  • Track 2: High Performance Computing (C – II)

    220 Network and Information SecurityR. HemaC i i S d f i bil d223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)Charu Arora and Devendra Singh

  • Track 3: Changing Architecture and Programming Paradigm (C – II)

    92 A Framework for Software Safety Metrics in Critical SystemsM. Ben Swarup and P. Seetha RamaiahM. Ben Swarup and P. Seetha Ramaiah

    94 Growing Need for KPO in IndiaDivya Goel and Shivendra Goel

    169 Jena: An Open Source Java toolkit : An OverviewHarish Kumar Taluja, P.S. Bedi and Anuradha Taluja

    176 Effort Estimation Techniques in Component Based Development - A Critical ReviewArun Sharma and Kirti SethArun Sharma and Kirti Seth

    213 Inheritance and AggregationDeepak Abhyankar and Maya Ingle

    219 Goldplating Software: Another Step to Customer GratitudeDeepak Jain, Shalini Jain and Shweta TanejaDeepak Jain, Shalini Jain and Shweta Taneja

  • Track 3: Changing Architecture and Programming Paradigm (C – II)

    224 How Database Technology can be made Omnipresent and Universal?Pooja Gautam and Shubhra Gautam SharmaPooja Gautam and Shubhra Gautam Sharma

    248 A Road Map of Autonomous Software Agent ArchitecturesGopal Sakarkar and V M ThakareGopal Sakarkar and V. M. Thakare

  • Track 4: Other Emerging Technologies (C – II)

    38 Multi Level Fuzzy Association Rules for Entity Relationship ModelsAshwani Kush, Praveen Arora and R.K ChauhanAshwani Kush, Praveen Arora and R.K Chauhan

    104 Gaining Value to Business Through Business IntelligenceJameela Bano and Rafia NaseerJameela Bano and Rafia Naseer

    108 Genetic Algorithm: Mimicking Natural EvolutionBarjesh Kochar and Chitra Relhan

    227 Extracting and Predicting Information from Data using Datamining Tool – SPSSData using Datamining Tool SPSSBarjesh Kochar, Nidhi Khurana and Rajender S. Chhillar

    243 Comparison between Human Vision and 243 Comparison between Human Vision and Computer Vision Integrated Approach based on PCA for Face Detection and RecognitionZ f G Sh ikh d V M Th kZafar G.Sheikh and V.M. Thakare

  • Track 1: Digital World (C – III, IV)

    17 KM-ICT or Effective Rural DevelopmentVaishali Patil, Harshali Patil and Pooja Raundale

    27 R l f IT i M d T ffi M t27 Role of IT in Modern Traffic ManagementNavendu

    29 e-Waste Disposal : The Challenges for 29 po g oEnvironmentGanesh Chandra Deka and Malaya Dutta Bora

    86 Infrastructure Management Services:Enabling 86 Infrastructure Management Services:Enabling IT to Activate the BusinessDavinder Pal Singh

    93 The Scope of Usage of ICTs in the Development of Sustainable LivelihoodChhavi

    96 E-Governance in India:A Model of Good GovernancePramod UniyalPramod Uniyal

  • Track 1: Digital World (C – III, IV)

    117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Maintaining Agricultural Output and Food Rajeswari, Sanjay Agnihotri and Madaswamy Moni

    141 Appropriation of Social Media Tools and E t C i ti D i i Emergent Communication Dynamics in OrganisationsPrema P. Nair

    151 Rescuing Disaster Risk Management from Disasters:The ICT WayBhoomi Guptap

    166 Mainstreaming ICT for Water Availability and Requirements Analysis at Village Level – A Perspective and Prospective of DISNIC-PLAN Perspective and Prospective of DISNIC PLAN Project in the era of e-Governance in IndiaSameena Mukjija, Madaswamy Moni and Kishore KumarKumar

  • Track 1: Digital World (C – III, IV)

    175 Ontologies in Business Application DomainsArun Sharma and Laxmi Ahuja

    i hi l C bl d i l184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity IncreaseTulika Debnath, Girish Chandra, Anjani Kumar Choubey and Madaswamy Moni

    206 IT and Consumer Rights: Safeguarding 06 g g gConsumer Rights in the Emerging Internet WorldShivani Verma and Snigdha Singhg g

  • Track 2: High Performance Computing (C – III, IV)

    15 Revolution of Optical Ethernet in Metropolitan Area NetworkL lit S tLalit Saraswat

    23 Detection of Routing Misbehavior in Mobile Ad Hoc NetworksHoc NetworksR.Balakrishna, U.Rajeswar Rao and N.Geethanjali

    50 Security in Mobile Adhoc Networks50 yShaily Malik

    53 Industrial Applications of ZigbeeAshish Sharma, Jaspal Singh and Sumit Soman

    57 Analysis for the Enhacement of System Life Ti f Wi l S N t kTime of Wireless Sensor NetworkBirendra Kumar and Ashish Payal

  • Track 2: High Performance Computing (C – III, IV)

    58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANETBi d K S t Sh kl Abhi h k K Birendra Kumar, Suneet Shukla, Abhishek Kumar Mishra and Navin Prakash

    65 A Survey of Simulation in Sensor NetworkChandresh Pratap Singh, O.P.Vyas and Manoj Ku. Tiwari

    99 Evaluating Improved Performance Moble Ad-99 Evaluating Improved Performance Moble Adhoc NetworksAkhilesh K. Sharma

    149 M bil C ti149 Mobile ComputingShakuntala Choudhary

    150 Privacy Issues in Wireless Sensor Networks150 acy ssues e ess e so e o sSachin Gupta

  • Track 2: High Performance Computing (C – III, IV)

    170 Securing Wireless Sensor Network and Detecting Compromised NodeH.K.Soni, Anand Dohare and Dinesh Lal

    180 A New Key Exchange Mechanism for SIPKapila AroraKapila Arora

    188 Challenges in Managing Hetrogeneous Networks by Using Mobile Agent TechnologyB R P k h d D R hB.R.Prakash and D.Ramesh

    198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc NetworksM.N.Doja and Mohd. Amjad

    233 Review of Hashing as Security Tool in Wireless 233 Review of Hashing as Security Tool in Wireless Ad Hoc NetworksAshwani Kush

  • Track 3: Changing Architecture and Programming Paradigm (C – III, IV)

    79 Compartive Analysis of Different Software Quality ModelsRanbireshwar S Jamwal Deepshikha Jamwal and Ranbireshwar S. Jamwal,Deepshikha Jamwal and Devanand Padha

    127 Issues in Usability Measurement for Object-Oriented SystemOriented SystemSanjay Kr.Dubey and A.K. Malviya

    153 Component Based Software Testing: p gIssue,Problem and SolutionAnurag Dixit

    155 SQL Injection: A Threat to Database Security155 SQL Injection: A Threat to Database SecurityS.K. Pandey and Pramod Dhiman

    189 Reuse Metrics Implementation on Proposed Component Based Development ModelNaveeta Adlakha

  • Track 3: Changing Architecture and Programming Paradigm (C – III, IV)

    262 A Study of Object Oriented Software Reliability ModelsA.M. Sherry, A.K.Malviya and R.C.Tripathi

  • Track 4: Other Emerging Technologies (C – III, IV)

    5 The Vector Floating-Point Unit in a Synergistic Processor Element of a CELL ProcessorV. Tholkapian and K. N. Vijeyakumar

    6 P6 Binary Floating-Point UnitK. N. Vijeyakumar and V. Tholkapiyan

    7 Comparative Study of Turbo Decoding TechniquesPrabhu Raj.N. and M.Yuvaraj

    26 Automated Tool for Microarray Analysis of Differentially Expressed GenesVadivu G.

    33 An Analytical Model of SH-LED for Gas Sensor Instrumentation in Mid-infrared (2-5µm) RegionRupender Singh

  • Track 4: Other Emerging Technologies (C – III, IV)

    35 To improve the Peformance of Digital Circuits in VLSIRupender Singh

    64 A New 2-D RA Method of Representation and Analysis of a DNA SequenceRajendra Bharti and Archana Verma

    82 Information Measure in the Non Linear Time Series a Comparative StudyArchana Gahlaut

    91 Knowledge Discovery and Data Mining for the FutureChhavi

    98 Analysis of Leading Zero Counting and Anticipation logic for High-Speed Floating Point UnitsK.N.Vijeyakumar and V. Tholkapiyan

  • Track 4: Other Emerging Technologies (C – III, IV)

    135 Homology Modeling of Semaphorins 3A ProteinAshutosh Khanna, Ganesh Gupta and Sarika Sahu

    138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English AlphabetsPankaj Lathar, Sumeet Gill and Manu Pratap Singh

    159 Dictionary Based Bangla-English Relevant Cross Lingual Information Access Using Intelligent Semantic TechniquesAbishek Banerjee and Swapan Bhattacharyya

    183 Artificial Erythrocytes-Models and DesignJitesh B.Dundas

    226 Integrated Approach for Multiple Face Detection and Recognition Based on Principal Component Analysis (PCA)Zafar G. Sheikh and V. M. Thakare

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    A. Damodaram 193 Energy Efficient Watermarking on Mobile DevicesDevices

    A. J. Prasad 185 Data Integration and Management Solutions

    A. J. Prasad 260 Managing ERP Implementation to Deliver Value- A Project Management PerspectiveValue- A Project Management Perspective

    A. K. Pal 258 Performance Analysis of High Speed Data Networks using Priority Discipline

    A Kaur 234 Technology we InventA. Kaur 234 Technology we Invent

    A.K Mishra 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa

    A.K. Malviya 127 Issues in Usability Measurement for Object-y y jOriented System

    A.K.Malviya 262 A Study of Object Oriented Software Reliability Models

    A.K.Saini 46 Development of Knowledge Engineering Based Model of Insurance Sector

    A.M. Sherry 262 A Study of Object Oriented Software Reliability ModelsReliability Models

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Aakas Sharma 212 Top Five Things to Ensure in ECM Upgrade or MigrationMigration

    Aakash Roy 144 Online Scheme towards Secured Inter Banking Fund Transfer

    Aashoo Bhalla 241 Why Knowledge and Knowledge ManagementAashoo Bhalla 241 Why Knowledge and Knowledge Management

    Abhilasha Vyas 90 Interpretability of Data Sources - Providing Information:

    Abhishek Kumar 58 Analysis for the Prevention of Black Hole Abhishek Kumar Mishra

    58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET

    Afreen Sultana 193 Energy Efficient Watermarking on Mobile Devices

    Ajay D. Parikh 238 Contact less Vehicle Identification Based on Services Oriented Architecture

    Ajay Kumar Gupta 148 Minor Irrigation Census Computerization: A Step towards ICT for Micro level Planning in Step towards ICT for Micro level Planning in Water Resources Management and Planning to Achieve Rural Prosperity

    Ajeet Kumar 144 Online Scheme towards Secured Inter Banking Fund Transfer

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Akash Tayal 63 Game Theory: Modeling and Analyzing C fli ti S it A li ti b Conflicting Security Applications by Embedding Rationality

    Akhilesh K. Sharma 99 Evaluating Improved Performance Mobile Ad-Hoc Networks

    Ameen Uddin 179 Prevention from the Terrorist Bombs Attacks

    Amit Prakash Singh 139 Delay Testable Enhanced Scan Flipflop

    Amita Goel 230 Evaluation of Secondary School based on Amita Goel 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method

    Amitabh Yadav 22 Software Reliability

    Anamika Bhargava 203 Teenage Security Considerations in Pervasive Anamika Bhargava 203 Teenage Security Considerations in Pervasive Environment

    Anand Dohare 170 Securing Wireless Sensor Network and Detecting Compromised Node

    Anees Ahmad 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients

    Anil Kumar 13 Web Document Clustering for Finding Expertise in Research AreaExpertise in Research Area

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Anirban Chakrabarty

    256 Synthesizing High Frequency Association Rules for Determining Service Quality in Chakrabarty Rules for Determining Service Quality in Hospitals by Weighting Method

    Anita Yadav 72 Requirements Traceability Matrix in Component Based Developmentp p

    Anjana Gupta 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method

    Anjani Kumar 184 NavKrishi Portal:An ICT Enabled Agriculture Choubey Extension Reforms in India to Empower

    Farming Community for Productivity Increase

    Ankit Malviya 186 Computerized Human Resource System in Steel PlantSteel Plant

    Ankit Malviya 190 Challenges of Implementing HRIS in a Public Sector Enterprise

    Ankita Lathey 63 Game Theory: Modeling and Analyzing y y g y gConflicting Security Applications by Embedding Rationality

    Anne Gutschmidt 136 Preprocessing for Click Stream Data Mining

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Anne Gutschmidt 140 Suitability of Web usage Mining for Web Anne Gutschmidt 140 Suitability of Web usage Mining for Web Content Syndication

    Anshu Saluja 200 Data Warehouse Architectural Design - using Parallel Processing on the Distributed En ironment for Effecti e Load Balancing and Environment for Effective Load Balancing and Data Sharing

    Anu Chaudhary 258 Performance Analysis of High Speed Data Networks using Priority Disciplineg y p

    Anu G. Aggarwal 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models

    Anukiran Jain 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method

    Anuradha Taluja 169 Jena: An Open Source Java toolkit : An OverviewOverview

    Anurag Dixit 153 Component Based Software Testing: Issue,Problem and Solution

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Anurag Shrivastava 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal System Sequence Diagrams as a Formal Language

    Anurag Shrivastava 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement g g yFramework for Medium and Small Scale Software Companies

    Aradhana 182 Emerging Issues and Problems of Disinvestment in Public EnterprisesDisinvestment in Public Enterprises

    Archana Bhatnagar 158 Agent Based Approach of Service Oriented Architecture for Business Modeling

    Archana Gahlaut 82 Information Measure in the Non Linear Time Archana Gahlaut 82 Information Measure in the Non Linear Time Series a Comparative Study

    Archana Verma 64 A New 2-D RA Method of Representation and Analysis of a DNA Sequence

    Archana Wamanrao Bhade

    208 Performance Evaluation of Disk Scheduling Algorithm and File Allocation Methods

    Arti Rana 161 Software Testing: An Effective Method to I S ft Q litImprove Software Quality

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Arun Kumar Chaturvedi

    111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic AlphabetsChaturvedi Messages Transmitted by Phonetic Alphabets

    Arun Sharma 175 Ontologies in Business Application Domains

    Arun Sharma 176 Effort Estimation Techniques in Component Based Development - A Critical ReviewBased Development - A Critical Review

    Ashish A. Bardekar 100 Optical Technology and Networks

    Ashish Payal 57 Analysis for the Enhacement of System Life Time of Wireless Sensor NetworkTime of Wireless Sensor Network

    Ashish Sharma 53 Agent Based Approach of Service Oriented Architecture for Business Modeling

    Ashok Sharma 158 Agent Based Approach of Service Oriented g ppArchitecture for Business Modeling

    Ashok Sharma 196 I.T in Faculty Improvement with a Bearing on Learning Methodologies

    Ashutosh Khanna 135 Homology Modeling of Semaphorins 3A Protein

    Ashutosh Kumar Bhatt

    76 Forecasting Daily Nifty Stock Returns with Artificial Neural NetworkBhatt Artificial Neural Network

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Ashutosh Mani 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) Protein

    Ashutosh Mani 102 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)Associated Membrane Protein 1 (LAMP 1)

    Ashutosh Mani 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach

    Ashwani Kumar 63 Game Theory: Modeling and Analyzing y g y gConflicting Security Applications by Embedding Rationality

    Ashwani Kush 38 Multi Level Fuzzy Association Rules for Entity Relationship ModelsRelationship Models

    Ashwani Kush 233 Review of Hashing as Security Tool in Wireless Ad Hoc Networks

    Ashwini Kumar 88 Promotion of an Expert System in Technical & Ashwini Kumar 88 Promotion of an Expert System in Technical & Team Talent Training

    Asmita Bardekar 100 Optical Technology and Networks

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Avadhesh Kumar 225 A Qualitative Comparison of Three Change Impact Analysis Techniques for Object Impact Analysis Techniques for Object Oriented Systems

    Avijit Dutta 45 Effect of e-Readiness Score on Knowledge Index

    Avishek Banerjee 159 Dictionary Based Bangla-English Relevant Cross Lingual Information Access Using Intelligent Semantic Techniques

    B. Bandyopadhyay 116 Image Security Enhancement through Watermarking and Cryptographic Measures

    B. Manjunath 260 Managing ERP Implementation to Deliver Value- A Project Management PerspectiveValue A Project Management Perspective

    B. N. Chatterjee 116 Image Security Enhancement through Watermarking and Cryptographic Measures

    B.R.Prakash 188 Challenges in Managing Hetrogeneous g g g gNetworks by Using Mobile Agent Technology

    Babita Yadav 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issues

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Barjesh Kochar 54 A New Model to Perform Extraction Transformation Loading Transformation Loading

    Barjesh Kochar 108 Genetic Algorithm: Mimicking Natural Evolution

    Barjesh Kochar 227 Extracting and Predicting Information from Barjesh Kochar 227 Extracting and Predicting Information from Data using Datamining Tool - SPSS

    Beena Mahar 43 Data Cubing Algorithms- Comparative Study of Data Cubing Algorithms

    Bhavika Varma 125 Use of IT for Disaster Management and Mitigation

    Bhawana Narain 253 Spin Protocol in Sensor Networks: An O iOverview

    Bhoomi Gupta 151 Rescuing Disaster Risk Management from Disasters:The ICT Way

    Bi d K 57 A l i f th E h t f S t Lif Birendra Kumar 57 Analysis for the Enhacement of System Life Time of Wireless Sensor Network

    Birendra Kumar 58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Bobin Kuruvilla Sunny

    4 Autosurveillance using GSMSunny

    C.S.Rai 83 Design and Implementation of a Digital Signature Solution for e-Governance Compliant DIGITALGOV System on Enterprise p y pWide Area Network (E-WAN)

    Chaitali 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa

    Chandan Kalra 167 IT in Healthcare Sector

    Chandan Kalra 168 Technological Perspective in Education: Revolution not Evolution

    Ch d h P t 65 A S f Si l ti i S N t kChandresh Pratap Singh

    65 A Survey of Simulation in Sensor Network

    Charu Arora 223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)( )

    Chennnakeshav Adya

    20 The Key of Competitive Knowledge in a Consulting Firm-Knowledge Management and its Implementation Using KPO and Innovation NetworksInnovation Networks

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Chhavi 91 Knowledge Discovery and Data Mining for the FutureFuture

    Chhavi 93 The Scope of Usage of ICTs in the Development of Sustainable Livelihood

    Chitra Relhan 108 Genetic Algorithm: Mimicking Natural Chitra Relhan 108 Genetic Algorithm: Mimicking Natural Evolution

    Clemens H. Cap 136 Preprocessing for Click Stream Data Mining

    Clemens H. Cap 140 Suitability of Web usage Mining for Web Content Syndication

    D. K. Mishra 259 Reducing Network Traffic in Secure Multi-Party ComputationParty Computation

    D. K. Mishra 191 Optimizing HPC and Parallelization for Nanotechnology

    D.K. Sharma 236 e-Banking in India Prospects and g pOportunities

    D. VenkataRamana Raju

    47 e-Readiness in e-Commerce

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    D.Sangheetha 47 e-Readiness in e-Commerce

    D.Ramesh 188 Challenges in Managing Hetrogeneous Networks by Using Mobile Agent Technology

    D.Sangheetha 48 An intelligent Overlay Search in UP2P

    Dalip Kumar Bhat 134 A Study of ICT Penetration in Health Care System for J&K State

    Davinder Pal Singh 86 Infrastructure Management S i E bli IT t A ti t th B iServices:Enabling IT to Activate the Business

    Debasis Mitra 144 Online Scheme towards Secured Inter Banking Fund Transfer

    Debasish Jana 144 Online Scheme towards Secured Inter Debasish Jana 144 Online Scheme towards Secured Inter Banking Fund Transfer

    Deepak Abhyankar 213 Inheritance and Aggregation

    D k J i 12 F L i B d R ti St t i i Deepak Jain 12 Fuzzy Logic Based Routing Strategies in VANETs

    Deepak Kumar 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect yp pDebugging

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Deepak Jain 219 Goldplating Software: Another Step to Customer GratitudeCustomer Gratitude

    Deepali Kamthania 269 Next Generation Cloud Computing Tech

    Deepshikha 41 Design of an Intelligent Agent Based Deepshikha Bhargava

    41 Design of an Intelligent-Agent Based Technique for Solving Interprocess Synchronization Problem

    Deepshika Jamwal 77 Analysis of Software Development Terms and User Satisfaction Level

    Deepshika Jamwal 78 Issues & Factors Evaluation of Software Quality Models

    Deepshika Jamwal 80 Internet Banking Systems in India: Analysis of Security Issues

    Deepshika Jamwal 218 Role of e-Learning in a Developing Country like Indialike India

    Deepshikha Jamwal 209 Analysis of e-Education: Developing as a Potential Learning System in Jammu Region: India

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Deepshikha Jamwal 210 Issues and Influences of e-Commerce in Developing CountriesDeveloping Countries

    Deepshikha Kalra 106 More than Data Warehouse- An Insight to Customer Information

    Devanand 164 Effect of Bussiness Constraints in Software Devanand 164 Effect of Bussiness Constraints in Software Development Productivity

    Devanand 207 Digital Tampering Detection Techniques: A Review

    Devanand Padha 56 A Study of ICT in the Area of Agriculture and Rural Development in J&K State

    Devanand Padha 77 Analysis of Software Development Terms and U S ti f ti L lUser Satisfaction Level

    Devanand Padha 80 Internet Banking Systems in India: Analysis of Security Issues

    Devanand Padha 103 ICT as an Stimulus for Development in Devanand Padha 103 ICT as an Stimulus for Development in Developing Countries

    Devanand Padha 210 Issues and Influences of e-Commerce in Developing Countries

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Devendra Singh 223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)Networks (MANETS)

    Devendra Tayal 72 Requirements Traceability Matrix in Component Based Development

    231Dharmendra Kumar 231 Perspectives of Symmetric Cryptography

    Dheeraj Mehrotra 9 The IT Security: The Quality Concern

    Dhirendra P. Singh 165 Fault Tolerant Computing: A Network Reliability Approach

    Dimple Dalby 4 Autosurveillance using GSM

    Dinesh .J.Prajati 55 A Comparative Analysis of Sorting Algorithms in two Opposite Extreme

    Dinesh Lal 170 Securing Wireless Sensor Network and Detecting Comp omised NodeDetecting Compromised Node

    Divya Arora 161 Software Testing: An Effective Method to Improve Software Quality

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Divya Goel 94 Growing Need for KPO in India

    Diwakar Yagyasen 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software CompaniesSoftware Companies

    Durgesh Kumar Mishra

    179 Prevention from the Terrorist Bombs Attacks

    Durgesh Mishra 124 Complexity Minimization in Secure Multi-Durgesh Mishra 124 Complexity Minimization in Secure MultiParty Computation for Preserving Privacy during Data Mining

    Durgesh Pant 8 e-Readiness and Awareness Measurement St d T d G I iti ti d Study Towards e-Governance Initiatives and Services at Uttarakhand

    Durgesh Pant 76 Forecasting Daily Nifty Stock Returns with Artificial Neural Network

    Dushyant Dutta 107 Implementing Web Voting

    Dwijendra K. Gupta 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) finger and BTB domain containing 7A) Protein

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Dwijendra .K.Gupta 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach: A Bioinformatics Based Approach

    Dwijendra .K.Gupta 192 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)

    Fahad Ali Usmani 126 Performance Comparison of Class AB Fahad Ali Usmani 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOS

    Ganesh Chandra 29 e-Waste Disposal : The Challenges for Deka Environment

    Ganesh Chandra Deka

    30 Application of "Wireless Regional Area Network" in Creating Community Network

    G h G t 37 AOP ith E li D l t T l (AJDT)Ganesh Gupta 37 AOP with Eclipse Development Tool (AJDT)

    Ganesh Gupta 135 Homology Modeling of Semaphorins 3A Protein

    Ganesh Gupta 215 AOP with Eclipse AspectJ Development Tool (AJDT)

    Gangadhar V. Kayande Patil

    239 e-Government and e-Governance : The Effective ICT ToolsKayande Patil Effective ICT Tools

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Gaurav K. Rajput 255 Detection of Stegoimages: A Comparative Study of ClassifiersStudy of Classifiers

    Gautam Dhameja 111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic Alphabets

    Girish Chandra 184 NavKrishi Portal:An ICT Enabled Agriculture Girish Chandra 184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity Increase

    Gopal Sakarkar 248 A Road Map of Autonomous Software Agent p p gArchitectures

    Gurvinder Singh 70 Adaptable Power Data Compression / Decompression Technique

    Gurvinder Singh 81 Biotelemetry Based Wireless Patient Monitoring System

    H. R. Shashidhar 185 Data Integration and Management Solutions

    H. S. Nagalakshmi 216 Similarity Measures for Real World Data Mining

    H.Chandrasekhran 39 In-Silico tRNA Prediction and Comparative A l i f P l T i hAnalysis of Populus Trichocarpa

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    H.K.Soni 170 Securing Wireless Sensor Network and Detecting Compromised Node

    Hari Kumar Singh 181 An Approach to Very low bit rate Speech Coding

    44Harish Kumar 44 Emergence of Testing Maturity Model

    Harish Kumar Taluja 169 Jena: An Open Source Java toolkit : An Overview

    Harshali Patil 17 KM-ICT or Effective Rural Development

    Harsimerjeet Khurana

    19 Problems and Facets of Multi-Agent Systems

    Hilal Ahmed 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients

    Hitesh Singh 118 A Survey on Steganography in Audio

    Hitesh Singh 119 A Survey on Text Based Steganography

    Ish Nath Jha 25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsInteraction of Mobile Robots

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    J. K. Mandal 232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Literature with Reconstructing Characters Bit Pattern (RCBP)

    J. Pal Choudhury 232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit gPattern (RCBP)

    Jameela Bano 104 Gaining Value to Business Through Business Intelligence

    Jasleen Kaur Sethi 10 Fuzzy Logic Based Decision Maker System for Choosing Cars

    Jaspal Singh 53 Industrial Applications of Zigbee

    Jaswinder Singh 89 J2ME Applications to Implement Computer Graphics on Mobile Devices

    Jeetendra Pande 123 Analysis of 802.1X Authentication Protocol for General Deploymentfor General Deployment

    Jeetendra Pande 125 Use of IT for Disaster Management and Mitigation

    Jeetendra Pande 1 Telecommunications in India - Changing g gTrends

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Jitender Chugh 83 Design and Implementation of a Digital Signature Solution for e-Governance Signature Solution for e Governance Compliant DIGITALGOV System on Enterprise Wide Area Network (E-WAN)

    Jitesh B.Dundas 183 Artificial Erythrocytes-Models and Design

    Jolly Parikh 167 IT in Healthcare Sector

    Jyoti Arora 95 Analysis of Watermarking Techniques

    Jyoti Mahajan 164 Effect of Bussiness Constraints in Software y jDevelopment Productivity

    K. Anantha Padmanabha

    260 Managing ERP Implementation to Deliver Value- A Project Management Perspective

    K. Bhatia 258 Performance Analysis of High Speed Data Networks using Priority Discipline

    K. C. Kothari 186 Computerized Human Resource System in Steel PlantSteel Plant

    K. C. Kothari 190 Challenges of Implementing HRIS in a Public Sector Enterprise

    K. C. Kothari 199 Implementation of Integrated Refractory K. C. Kothari 199 Implementation of Integrated Refractory Information System at Steel Plant

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    K. K. Goyal 261 Role of MANET in Disaster Management

    K. M. Alaskar 247 Web Warehousing and e-Government

    K. N. Vijeyakumar 5 The Vector Floating-Point Unit in a Synergistic Processor Element of a CELL Processor

    K. N. Vijeyakumar 6 P6 Binary Floating-Point Unit

    K. P. Tripathi 247 Web Warehousing and e-Governmentp g

    K. Paithankar 205 Collaborative Effect of Usability Heuristics and Characteristics

    K C Joshi 165 Fault Tolerant Computing: A Network K.C. Joshi 165 Fault Tolerant Computing: A Network Reliability Approach

    K.N.Vijeyakumar 98 Analysis of Leading Zero Counting and Anticipation logic for High-Speed Floating Point Units

    Kahkashan Tabassum

    193 Energy Efficient Watermarking on Mobile Devices

    K il A 180 A N K E h M h i f SIPKapila Arora 180 A New Key Exchange Mechanism for SIP

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Kapila Kapoor 265 Regression Testing of a Relational Database

    Kavita Das 140 Suitability of Web usage Mining for Web Content Syndication

    Kavita Pabreja 110 Data Mining – A Tool in Support of I i f L P S Interpretation of Low Pressure System Movement over Indian Region

    Kavita Upadhyay 123 Analysis of 802.1X Authentication Protocol for General Deploymentfor General Deployment

    Kirti Seth 176 Effort Estimation Techniques in Component Based Development - A Critical Review

    Kishore Kumar 148 Minor Irrigation Census Computerization: A g pStep towards ICT for Micro level Planning in Water Resources Management and Planning

    Kishore Kumar 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of DISNIC-PLAN Project in the era of e-Governance in India

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Kriti Saroha 118 A Survey on Steganography in Audio

    Kriti Saroha 119 A Survey on Text Based Steganography

    Kuldeep Bhardwaj 261 User Authentication from the Remote Autonomous Object

    Kusam 207 Digital Tampering Detection Techniques: A Review

    Lalit Saraswat 15 Revolution of Optical Ethernet in Metropolitan Area Network

    Lava Nautiyal 128 E-Governance-Today & Tomorrow

    M. Ben Swarup 92 A Framework for Software Safety Metrics in M. Ben Swarup 92 A Framework for Software Safety Metrics in Critical Systems

    M. K. Tiwari 253 Spin Protocol in Sensor Networks: An Overview

    M. N. Hoda 269 Next Generation Cloud Computing Technology

    M.Asger 97 A Survey of QoS in Mobile Ad-Hoc Networks

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    M.K Sharma 8 e-Readiness and Awareness Measurement Study Towards e Governance Initiatives and Study Towards e-Governance Initiatives and Services at Uttarakhand

    M.N.Doja 198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc Networks

    M.V.Kulkarni 11 Trust Management in Adhoc Networks

    M.Yuvaraj 7 Comparative Study of Turbo Decoding T h iTechniques

    Madaswamy Moni

    115 SeedNet India Portal - A National Initiative of Info Services on Quality Seeds to Indian Farmers for Agri Productivity IncreaseFarmers for Agri Productivity Increase

    Madaswamy Moni

    117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in IndiaFood Production in India

    Madaswamy Moni

    148 Minor Irrigation Census Computerization: A Step towards ICT for Micro level Planning in Water Resources Management and Planning g gto Achieve Rural Prosperity

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Madaswamy Moni 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of DISNIC-PLAN Project in the era of e-Governance in India

    M d M i 184 N K i hi P t l A ICT E bl d A i lt Madaswamy Moni 184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity Increase

    Madhavi Sinha 41 Design of an Intelligent-Agent Based g g gTechnique for Solving Interprocess Synchronization Problem

    Madhulika 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issuesand other Legal Issues

    Madhurima 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issues

    Mahesh H Panchal 55 A Comparative Analysis of Sorting Algorithms Mahesh H.Panchal 55 A Comparative Analysis of Sorting Algorithms in two Opposite Extreme

    Malaya Dutta Borah 29 e-Waste Disposal : The Challenges for Environment

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Malaya Dutta Borah 90 Application of "Wireless Regional Area Network" in Creating Community NetworkNetwork" in Creating Community Network

    Mamta Dahiya 197 Knowledge Discovery in Spatial Databases

    Mamta Madan 222 Problem Solving Using Nature’s Way -Genetic AlgorithmGenetic Algorithm

    Manish Dwivedi 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) Protein

    Manish Dwivedi 102 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)

    Manish Dwivedi 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach

    Manish Mahajan 32 Vulnerability Assessments

    Manish Pandey 171 Recent Trends in Database and Future yDirections

    Manju Shree 199 Implementation of Integrated Refractory Information System at Steel Plant

    Manjunath B. 185 Data Integration and Management Solutions

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Manoj Ku. Tiwari 65 A Survey of Simulation in Sensor Network

    Manoj Kumar Singhi 182 Emerging Issues and Problems of Disinvestment in Public Enterprises

    Mansotra V 121 Digital Divide in Education A Concern for J&K Mansotra V. 121 Digital Divide in Education-A Concern for J&K State

    Manu Pratap Singh 138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English Alphabets

    Manuj Darbari 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal System Sequence Diagrams as a Formal Language

    Manuj Darbari 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software Companies

    Mashaallah Basirzadeh

    275 Assessing Software Reliability Growth with Different Combinations For Distributed Basirzadeh Different Combinations For Distributed Environment Using ANN Approach

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Maya Ingle 195 Hierarchical Classification of Security in IT EnvironmentEnvironment

    Maya Ingle 205 Collaborative Effect of Usability Heuristics and Characteristics

    Maya Ingle 213 Inheritance and Aggregation

    Meenakshi Bhat 264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary y yMetabolites

    Meenakshi Sharma 202 Parallel Model Combination using Wideband Filters in Automatic Speech Recognition

    Megha Mudholkar 18 e-Governance

    Mir. Sadique Ali 208 Performance Evaluation of Disk Scheduling Algorithm and File Allocation Methods

    Mohammad Ubaidullah Bokhari

    192 e-Learning Approach for Effective ESOL Teaching

    Mohammad Ubaidullah Bokhari

    201 A Comparative Study of Software Requirements Tools for Secure Software Ubaidullah Bokhari Requirements Tools for Secure Software Development

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Mohammad Usaid Abbasi

    28 Harmonic Content Discovery in Adhoc and Peer to Peer NetworksAbbasi Peer to Peer Networks

    Mohammad Usaid Abbasi

    31 Novel FPGA Based Hardware Realization of Arbitrary Functions

    Mohd Ahmad 61 Performance Comparison between SQL Mohd Ahmad Mansoori

    61 Performance Comparison between SQL Server 2000 and Oracle 10g

    Mohd Ahmad Mansoori

    60 e-Governance: Government for the People

    Mohd Ahmad Mansoori

    62 Application of Analytic Hierarchy Process in Environmental Performance Assessment and its Implementation using MATLAB Program

    Mohd Ahmad Mansoori

    162 Software Optimal Release Policy and Reliability Growth Modeling

    Mohd AJmal Kafeel 71 Automation of Libraries Through ICT Mohd AJmal Kafeel Automation of Libraries Through ICT Applications, a Tool to Empower National Development

    Mohd Nazir 204 Speech Recognition Tools in Local Language for Kissan Helpfor Kissan Help

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Mohd. Ajmal Kafeel 217 A Better Performed Transaction Reduction Algorithm for Mining Frequent Itemsets from Algorithm for Mining Frequent Itemsets from Large Voluminous Database

    Monika Sainger 32 Vulnerability Assessments

    N Venkatesan 198 Quality of Service Using Link availability and N. Venkatesan 198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc Networks

    Narina Thakur 126 Performance Comparison of Class AB a a a u e o a ce Co pa so o C assOperational Amplifiers at 32nm in Technologies beyond CMOS

    Narendra Kumar 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Channel Assignment Problem in Mobile Computing

    Narinder Singh 266 Bluetooth based Electrical Measurement System

    Nasib Singh Gill 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Nasib Singh Gill 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc NetworkDetection System in Mobile Adhoc Network

    Mukesh Chand 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET

    Mukta Gahlot 59 Comparison of Routing Protocols for Mobile Mukta Gahlot 59 Comparison of Routing Protocols for Mobile Ad-hoc Networks

    Muqeem ahmed 263 Knowledge Based Grid : Characteristics and Strategies

    N.Geethanjali 23 Detection of Routing Misbehavior in Mobile Ad Hoc Networks

    Namita Singh 209 Analysis of e-Education: Developing as a P t ti l L i S t i J R i Potential Learning System in Jammu Region: India

    Nand Kumar 254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh g g yUniversity, Tripoli

    Narendra Kumar 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Narendra Kumar 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing

    Narendra Kumar 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET

    Narendra Kumar Tyagi

    90 Interpretability of Data Sources - Providing Information:

    Naresh Chauhan 44 Emergence of Testing Maturity Model

    Naresh Kumar 225 A Qualitative Comparison of Three Change Impact Analysis Techniques for Object Oriented Systems

    Nasreddin B. El Zoghbi

    254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh University, Tripoli

    Naushad Alam 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOS

    Naveeta Adlakha 189 Reuse Metrics Implementation on Proposed Component Based Development Model

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Navendu 27 Role of IT in Modern Traffic Management

    Navin Prakash 58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET

    Neha Koria 124 Complexity Minimization in Secure Multi-p yParty Computation for Preserving Privacy during Data Mining

    Nidhi Khurana 227 Extracting and Predicting Information from g gData using Datamining Tool - SPSS

    Nihar Ranjan Roy 51 Kinematics Based Polygon Approximation

    Nikhil K 124 C l i Mi i i i i S M l iNikhil Kapoor 124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data Mining

    Ni l H 186 C t i d H R S t i Niral Hemrom 186 Computerized Human Resource System in Steel Plant

    Niral Hemrom 190 Challenges of Implementing HRIS in a Public Sector Enterprisep

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Nitesh Tomar 252 Multiple Routing with Self-Healing Technique for Quality of Support(QoS) in MANETfor Quality of Support(QoS) in MANET

    Noor Mohd 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computingp g

    Noor Mohd 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network

    Noor Mohd 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing

    Noor Mohd 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANETAddress Configuration in MANET

    O. P. Rishi 158 Agent Based Approach of Service Oriented Architecture for Business Modeling

    O P Vyas 136 Preprocessing for Click Stream Data MiningO. P. Vyas 136 Preprocessing for Click Stream Data Mining

    O. P. Vyas 253 Spin Protocol in Sensor Networks: An Overview

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    O. P. Vyas 140 Suitability of Web usage Mining for Web Content SyndicationContent Syndication

    O. P. Vyas 65 A Survey of Simulation in Sensor Network

    Ompal Singh 284 Modeling Software Reliability Growth in Distributed Environment Using Unified Distributed Environment Using Unified Approach

    P C Saxena 3 The Object Model of the JNUOS Operating System

    P.K. Kapur 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models

    P K K 275 A i S ft R li bilit G th ith P K Kapur 275 Assessing Software Reliability Growth with Different Combinations For Distributed Environment Using ANN Approach

    P. C. Jha 278 On The Development of Flexible Discrete pSRGM with Two Types of Imperfect Debugging

    P. C. Jha 302 Optimal Component Selection For Fault Tolerance COTS Based Software System Tolerance COTS Based Software System Under Consensus Recovery Block Scheme

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    P. K. Kapur 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect SRGM with Two Types of Imperfect Debugging

    P. K. Kapur 292 Distribution Based Change-Point Problem with Two Types of Imperfect Debugging in yp p gg gSoftware Reliability

    P. K. Kapur 302 Optimal Component Selection For Fault Tolerance COTS Based Software System Under Consensus Recovery Block SchemeUnder Consensus Recovery Block Scheme

    P. K. Kapur 284 Modeling Software Reliability Growth in Distributed Environment Using Unified Approach

    P. S. Bedi 169 Jena: An Open Source Java toolkit : An Overview

    P. Seetha Ramaiah 92 A Framework for Software Safety Metrics in C iti l S tCritical Systems

    Pankaj K. Mudholkar

    18 e-Governance

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Pankaj Kumar 215 AOP with Eclipse Development Tool (AJDT)

    Pankaj Kumar Sharma

    163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for Wireless Communication Systems

    Pankaj Lathar 138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English Alphabets

    Parag Parandkar 81 Biotelemetry Based Wireless Patient Monitoring System

    Parag Parandkar 69 Mixed Signal Hardware Description Languages VHDL-AMS and Verilog AMS- Compared and Contrasted

    Parag Parandkar 70 Adaptable Power Data Compression / Decompression Technique

    Pawanesh Abrol 207 Digital Tampering Detection Techniques: A Review

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Pinaki Chakraborty 3 The Object Model of the JNUOS Operating SystemSystem

    Pooja Gautam 224 How Database Technology can be made Omnipresent and Universal

    Pooja Pathak 267 Premium Allocation - Fuzzy Approach in Insurance Business

    Pooja Raundale 17 KM-ICT or Effective Rural Development

    Poonam Sachdeva 174 Smart Card Operating System: Past, Present and Future

    Poorna Goyal 122 Decision Support System for Disaster Mangement

    Prabhu Raj.N. 7 Comparative Study of Turbo Decoding Techniques

    Pradeep Aswal 171 Recent Trends in Database and Future Directions

    Pradeep Kumar Singh

    118 A Survey on Steganography in AudioSingh

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Pradeep Kumar Singh

    119 A Survey on Text Based SteganographySingh

    Pramod Dhiman 155 SQL Injection: A Threat to Database Security

    Pramod Uniyal 96 E-Governance in India:A Model of Good Governance

    Prashant Johri 284 Modeling Software Reliability Growth in Distributed Environment Using Unified ApproachApproach

    Praveen Arora 38 Multi Level Fuzzy Association Rules for Entity Relationship Models

    Preeti Arora 112 Internet Protocol Version-6 (IPV6)( )

    Prema P. Nair 141 Appropriation of Social Media Tools and Emergent Communication Dynamics in Organisations

    R. Kumar 266 Bluetooth based Electrical Measurement System

    R. Hema 220 Network and Information Security

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    R. K. Agrawal 255 Detection of Stegoimages: A Comparative Study of ClassifiersStudy of Classifiers

    R. K. Nagaria 163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for g pp gWireless Communication Systems

    R. Lalitha 48 An intelligent Overlay Search in UP2P

    R Mageshwaran 185 Data Integration and Management SolutionsR. Mageshwaran 185 Data Integration and Management Solutions

    R. Mageshwaran 260 Managing ERP Implementation to Deliver Value- A Project Management Perspective

    Rafi U. Zaman 236 e-Banking in India Prospects and Oportunities

    R.Balakrishna 23 Detection of Routing Misbehavior in Mobile d kAd Hoc Networks

    Rafia Naseer 104 Gaining Value to Business Through Business Intelligence

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Rahul Rathor 179 Prevention from the Terrorist Bombs Attacks

    Rajender S. Chhillar 227 Extracting and Predicting Information from Data using Datamining Tool - SPSS

    Rajendra Bharti 64 A New 2-D RA Method of Representation and Rajendra Bharti 64 A New 2 D RA Method of Representation and Analysis of a DNA Sequence

    Rajendra Kumbhar 247 Web Warehousing and e-Government

    Rajendra Sharma 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa

    Rajeswari 117 Knowledge Portal for Rainfed Farming Rajeswari 117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in India

    Rajinder Singh Chillar

    54 A New Model to Perform Extraction Transformation Loading

    Rajiv Chopra 265 Regression Testing of a Relational Database

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Rajni Jain 173 Variable Precision Rough Set based Decision Tree ModelTree Model

    Rajni Johar 168 Technological Perspective in Education: Revolution not Evolution

    Rakesh Kumar 130 Route Optimization In Mobile Adhoc Rakesh Kumar 130 Route Optimization In Mobile Adhoc Networks with Genetic Algorithms

    Rakesh S Patil 239 e-Government and e-Governance : The Effective ICT Tools

    Rakesh Sharma 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing

    Rakesh Sharma 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network

    Rakesh Sharma 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Interference Ratio for different kind of Antenna in Mobile Computing

    Rakesh Sharma 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Rakesh Singh 25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsInteraction of Mobile Robots

    Ranbireshwar S. Jamwal

    78 Issues & Factors Evaluation of Software Quality Models

    Ranbireshwar S. Jamwal

    210 Issues and Influences of e-Commerce in Developing Countries

    Rashmi Desai 68 Implementing Grid Computing - Optimizing Resources to Meet Business RequirementsResources to Meet Business Requirements

    Ravi Kumar 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models

    Ravish Bahety 124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data Mining

    Ravish Saggar 228 Delivering Health Care in Rural India Using Information Technology

    Ritika Jasrotia 107 Implementing Web Voting

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Ritu Aggrawal 106 More than Data Warehouse- An Insight to Customer InformationCustomer Information

    Rohit Pathak 191 Optimizing HPC and Parallelization for Nanotechnology

    Roshi Saxena 89 J2ME Applications to Implement Computer Graphics on Mobile Devices

    Rupender Singh 33 An Analytical Model of SH-LED for Gas Sensor Instrumentation in Mid-infrared (2-5µm) Instrumentation in Mid infrared (2 5µm) Region

    Rupender Singh 35 To improve the Peformance of Digital Circuits in VLSI

    S. A . M. Rizvi 235 A Novel Technique to Improve the Performance of Licensed Software in Client/Server Network Environment

    S A M Rizvi 240 Achieving Loose Coupling between Different S. A. M. Rizvi 240 Achieving Loose Coupling between Different Components of Model-View-Controller for Web Based Application

    S. A. M. Rizvi 249 Feature Extraction of Legacy Systems through Aspect Oriented Programming

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y ZS.A.M Rizvi 263 Knowledge Based Grid : Characteristics and

    StrategiesStrategies

    S.A.M Rizvi 264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary Metabolites

    S. C. Tamane 52 Digital Image Watermarking using 2D Wavelet Transform

    S. N. Sawalkar 100 Optical Technology and Networks

    S. P. Tripathi 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal Language

    S S H d 278 O Th D l t f Fl ibl Di t S. S. Handa 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect Debugging

    S. Shrivastava 136 Preprocessing for Click Stream Data Miningp g g

    S.K Mutto 67 Image Based Steganography Methods with High Payload

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    S.K Mutto 75 Principle of Graph Theoretic Approach to Digital SteganographyDigital Steganography

    S.K. Pandey 155 SQL Injection: A Threat to Database Security

    Saba Hilai 49 The Robot and Human Emotional Interface -Towards Automatic Techniques of Emotional qAssessment

    Saba Hilal 84 Personalization Issues in Pervasive Applications

    Saba Hilal 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients

    Saba Hilal 203 Teenage Security Considerations in Pervasive E i tEnvironment

    Sachin Gupta 150 Privacy Issues in Wireless Sensor Networks

    Salil Khare 202 Parallel Model Combination using Wideband Filters in Automatic Speech RecognitionFilters in Automatic Speech Recognition

    Salma Kuraishy 192 e-Learning Approach for Effective ESOL Teaching

    Sambyal G S 121 Digital Divide in Education-A Concern for J&K Sambyal G.S. 121 Digital Divide in Education-A Concern for J&K State

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Sameena Mukjija 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of

    Sameer Anand 292 Distribution Based Change-Point Problem with Two Types of Imperfect Debugging in yp p gg gSoftware Reliability

    Samiksha Shukla 259 Reducing Network Traffic in Secure Multi-Party Computation

    Sanjay Agnihotri 117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in India

    Sanjay Jamwal 97 A Survey of QoS in Mobile Ad-Hoc Networks

    Sanjay Jamwal 103 ICT as an Stimulus for Development in Developing Countries

    Sanjay Jamwal 56 A Study of ICT in the Area of Agriculture and Rural Development in J&K State

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Sanjay Kr.Dubey 127 Issues in Usability Measurement for Object-Oriented SystemOriented System

    Sanjay Kumar 186 Computerized Human Resource System in Steel Plant

    Sanjay Kumar 190 Challenges of Implementing HRIS in a Public Sector Enterprise

    Sanjay Singh 179 Prevention from the Terrorist Bombs AttacksSanjay Singh Senger

    179 Prevention from the Terrorist Bombs Attacks

    Sanjeev Kumar 236 e-Banking in India Prospects and Oportunities

    Sanjeev Kumar 267 Premium Allocation - Fuzzy Approach in Insurance Business

    Sanjeev Sharma 181 An Approach to Very low bit rate Speech CodingCoding

    Santosh Kumar Yadav

    231 Perspectives of Symmetric Cryptography

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Sardar Singh 182 Emerging Issues and Problems of Disinvestment in Public EnterpriseDisinvestment in Public Enterprise

    Sarika Sahu 135 Homology Modeling of Semaphorins 3A Protein

    Sarita Kaushik 84 Personalization Issues in Pervasive Sarita Kaushik 84 Personalization Issues in Pervasive Applications

    Satyadhar Joshi 191 Optimizing HPC and Parallelization for Nanotechnology

    Satyendra Nath Mandal

    232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Pattern (RCBP)

    S D 160 A t d A li ti d T h i d Seema D. 160 A study on Applications and Techniques used in Web Usage Mining

    Seema Rani 46 Development of Knowledge Engineering Based Model of Ins ance SectoBased Model of Insurance Sector

    Seema Rani 87 Geospatial Application on Web Service Oriented Architecture

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Selvi S 199 Implementation of Integrated Refractory Information System at Steel PlantInformation System at Steel Plant

    Shabbir Ahmed 28 Harmonic Content Discovery in Adhoc and Peer to Peer Networks

    Shabbir Ahmed 31 Novel FPGA Based Hardware Realization of Shabbir Ahmed 31 Novel FPGA Based Hardware Realization of Arbitrary Functions

    Shahnawaz Husain 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing

    Shahnawaz Husain 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network

    Shahnawaz Husain 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing

    Shahnawaz Husain 162 A RMS Based Hierarchical Approach for IP Shahnawaz Husain 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET

    Shaily Malik 50 Security in Mobile Adhoc Networks

    Shakuntala 149 Mobile ComputingShakuntala Choudhary

    149 Mobile Computing

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Shalini jain 12 Fuzzy Logic Based Routing Strategies in VANETsVANETs

    Shalini jain 219 Goldplating Software: Another Step to Customer Gratitude

    Shalini Singh 269 Next Generation Cloud Computing TechnologyShalini Singh 269 Next Generation Cloud Computing Technology

    Shalini Vermani 190 Efficient Certificate Revocation Lists In Public Key Infrastructure

    Sh T b 201 A C ti St d f S ft Shams Tabrez 201 A Comparative Study of Software Requirements Tools for Secure Software Development

    Shifaly Sharma 139 Delay Testable Enhanced Scan Flipflopy y p p

    Shikha Nirmal 251 Content Based Image Retrieval Techniques

    Shivani Vaid 302 Optimal Component Selection For Fault T l COTS B d S ft S t Tolerance COTS Based Software System Under Consensus Recovery Block Scheme

    Shivani Verma 206 IT and Consumer Rights:Safeguarding Consumer Rights in the Emerging Internet Consumer Rights in the Emerging Internet World

  • AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    Shivendra Goel 94 Growing Need for KPO in India

    Shalini jain 219 Goldplating Software: Another Step to Customer Gratitude

    ShreejiThankappan 11 Trust Management in Adhoc Networks

    Shubha mishra 131 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal Language

    Shubhra Gautam 224 How Database Technology can be made Shubhra Gautam Sharma

    224 How Database Technology can be made Omnipresent and Universal?

    Shubhra Saggar 228 Delivering Health Care in Rural India Using Information Technology

    Shweta 63 Game Theory: Modeling and Analyzing Conflicting Security Applications by Embedding Rationality

    Shweta Taneja 12 Fuzzy Logic Based Routing Strategies in