Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
WelcomeINDIACom 2009
3rd NATIONAL CONFERENCE ON "COMPUTING FOR NATIONAL DEVELOPMENT "
This disc is designed so that you may locatepapers by session or author, as well as with fulltext search.Papers originated as electronic files and wereconverted to Adobe Acrobat PDF file format forconverted to Adobe Acrobat PDF file format forcross-platform access. Even though theviewing quality on your monitor may vary, all
i t l lpapers print clearly.Thank you and enjoy!
Organisers
Sponsors
Technical Partners
Media Partners
click on the logo for more information
GGSIPUGuru Gobind Singh Indraprastha University
established by Government of NCT of Delhi under the provisions of Guru Gobind Singh under the provisions of Guru Gobind Singh Indraprastha University Act, 1998 read with its Amendment in 1999.The University is
i d b U i it G t C i i recognised by University Grants Commission (UGC), India under section 12B of UGC Act.
The University has been awarded the ISO The University has been awarded the ISO 9001:2000 Certification by Standardization, Testing and Quality Certification Directorate, Department of Information Technology Ministry Department of Information Technology, Ministry of Communication and Information Technology, Government of India, for a period of three
h b d d " d " byears. It has been accredited "A Grade" by NAAC during Feb - March 2007.
www.ipu.ac.in
IETEThe IETE is the National Apex Professional
body of Electronics and Telecommunication, Computer and IT Professionals. The IETE focuses on advancing the Science and Technology of Electronics Computers Telecommunication Electronics, Computers, Telecommunication, Information Technology and related areas. It promotes and conducts continuing technical education programmes such as AMIETE and DIPIETE Examinations, recognised by Ministry of HRD GoIof HRD, GoI.
IETE Delhi is the largest centre of IETE and conducts coaching classes for the AMIETE and conducts coaching classes for the AMIETE and DIPIETE at its premises at Janakpuri, New Delhi.
Bharati Vidyapeeth
CSI
The Computer Society of India, founded in 1965,is a non profit professional body where ITis a non-profit, professional body where ITprofessionals meet to exchange views andinformation, to learn and share ideas. CSI hasover 30,000 members to date, consisting ofprofessionals with varied backgrounds. Today ithas 62 chapters and 100 plus student brancheshas 62 chapters and 100 plus student branchesspread all over the country.
Established in late 60s Delhi Chapter is one ofEstablished in late 60s, Delhi Chapter is one ofthe largest chapters of CSI, having strength ofmore than 1000 members. Delhi Chapter hasb d d h h d fbeen awarded the Best Chapter award for 2005-2006.
Sponsors
Technical Partners
Media Partners
Categories
• Category I
• Category II
• Category III, IVg y ,
Tracks (C - I)• Track #1: Digital World
T k #2 W b T h l i C N k• Track #2: Web Technologies, Computer Network
And Information Security
• Track #3 : Software Engineering & ERP
• Track #4: High Performance Computing
Tracks (C – II)• Track #1: Digital World
T k #2 W b T h l i C N k • Track #2: Web Technologies, Computer Networks
And Information Security
• Track #3 : Software Engineering & ERP
• Track #4: High Performance Computing
Tracks (C - III, IV)• Track #1: Digital World
T k #2 W b T h l i C N k • Track #2: Web Technologies, Computer Networks
And Information Security
• Track #3 : Software Engineering & ERP
• Track #4: High Performance Computing
Track 1: Digital World (C – I)
8 e-Readiness and Awareness Measurement Study Towards e-Governance Initiatives and Services at UttarakhandServices at UttarakhandDurgesh Pant and M.K Sharma
18 e-GovernancePankaj K. Mudholkar and Megha Mudholkar
30 Application of "Wireless Regional Area Network" in Creating Community NetworkNetwork in Creating Community NetworkMalaya Dutta Borah and Ganesh Chandra Deka
45 Effect of e-Readiness Score on Knowledge IndexIndexAvijit Dutta
47 e-Readiness in e-CommerceD.Sangheetha, R.Lalitha and D. VenkataRamana Raju
Track 1: Digital World (C – I)
56 A Study of ICT in the Area of Agriculture and Rural Development in J&K StateD d P dh d S j J l Devanand Padha and Sanjay Jamwal
80 Internet Banking Systems in India: Analysis of Security IssuesDevanand Padha and Deepshika Jamwal
81 Biotelemetry Based Wireless Patient Monitoring SystemMonitoring SystemParag Parag Parandkar, Sumant Katiyal and Gurvinder Singh
i d l i f i i l83 Design and Implementation of a Digital Signature Solution for e-Governance Compliant DIGITALGOV System on Enterprise Wide Area N t k (E WAN)Network (E-WAN)C.S.Rai and Jitender Chugh
Track 1: Digital World (C – I)
103 ICT as an Stimulus for Development in Developing CountriesDevanand Padha and Sanjay JamwalDevanand Padha and Sanjay Jamwal
114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke PatientsyAnees Ahmad, Hilal Ahmed and Saba Hilal
115 SeedNet India Portal - A National Initiative of I f i S i Q li S d Information Services on Quality Seeds to Indian Farmers for Agricultural Productivity IncreaseMadaswamy Moni, Syed Usman and V. Rajeswari
121 Digital Divide in Education-A Concern for J&K StateStateMansotra V., Sambyal G.S. and Vinod Sharma
Track 1: Digital World (C – I)
122 Decision Support System for Disaster MangementVivek Kumar Pandey and Poorna GoyalVivek Kumar Pandey and Poorna Goyal
125 Use of IT for Disaster Management and MitigationgBhavika Varma, Jeetendra Pande and V. K. Joshi
134 A Study of ICT Penetration in Health Care S f J&K SSystem for J&K StateDalip Kumar Bhat and Vibhakar Mansotra
148 Minor Irrigation Census Computerization: A 148 Minor Irrigation Census Computerization: A Step Towards ICT for Micro Level Planning in Water Resources Management and Planning to Achieve Rural Prosperityp yAjay kumar Gupta, Kishore Kumar and Madaswamy Moni
Track 1: Digital World (C – I)
156 IT for Sustainable Agriculture Development in IndiaVidya Kumbhar
168 Technological Perspective in Education: Revolution not EvolutionRevolution not EvolutionChandan Kalra and Rajni Johar
179 Prevention from the Terrorist Bombs AttacksAmeen Uddin, Rahul Rathor and Sanjay Singh Senger
182 Emerging Issues and Problems of 182 g gDisinvestment in Public EnterprisesAradhana, Sardar Singh and Manoj Kumar Singh
192 e Learning Approach for Effective ESOL 192 e-Learning Approach for Effective ESOL TeachingMohammad Ubaidullah Bokhari and Salma Kuraishy
Track 1: Digital World (C – I)
196 I.T in Faculty Improvement with a Bearing on Learning MethodologiesAshok SharmaAshok Sharma
209 Analysis of e-Education: Developing as a Potential Learning System in Jammu Region: g y gIndiaNamita Singh and Deepshikha Jamwal
210 Issues and Influences of e-Commerce in 210 Issues and Influences of e-Commerce in Developing CountriesDeepshikha Jamwal, Ranbireshwar Singh Jamwal and Devanand Padhaand Devanand Padha
218 Role of e-Learning in a Developing Country like IndiaDeepshikha Aggarwal
Track 1: Digital World (C – I)
228 Delivering Health Care in Rural India Using Information TechnologyRavish Saggar and Shubhra SaggarRavish Saggar and Shubhra Saggar
230 Evaluation of Secondary School based on Analytic Hierarchy Process MethodAmita Goel, Anjana Gupta and Anukiran Jain
238 Contact less Vehicle Identification Based on Services Oriented ArchitectureAjay D. Parikh
239 e-Government and e-Governance : The Effective ICT ToolsEffective ICT ToolsGangadhar V. Kayande Patil and Rakesh S Patil
254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh University, TripoliNand Kumar and Nasreddin B. El Zoghbi
Track 2: High Performance Computing (C – I)
4 Autosurveillance using GSMDimple Dalby and Bobin Kuruvilla Sunny
12 Fuzzy Logic Based Routing Strategies in VANETsShalini jain, Shweta Taneja and Deepak Jainj , j p
28 Harmonic Content Discovery in Adhoc and Peer to Peer NetworksSh bbi Ah d T i Ah d Abb i V K Shabbir Ahmed, Tanvir Ahmad Abbasi, V.Kannan and Mohammad Usaid Abbasi
32 Vulnerability AssessmentsMonika Sainger and Manish Mahajan
48 An intelligent Overlay Search in UP2PD S h th d R L lithD.Sangheetha and R. Lalitha
Track 2: High Performance Computing (C – I)
59 Comparison of Routing Protocols for Mobile Ad-hoc NetworksMukta GahlotMukta Gahlot
60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile C tiComputingNarendra Kumar, Mohd Ahmad Mansoori, Mukesh Chand, Noor Mohd, Rakesh Sharma and Shahnawaz H iHusain
61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc NetworkMohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd, Rakesh Sharma and Shahnawaz Husain
67 Image Based Steganography Methods with High PayloadS K Mutto and Sushil kumarS.K Mutto and Sushil kumar
Track 2: High Performance Computing (C – I)
75 Principle of Graph Theoretic Approach to Digital SteganographyS.K Mutto and Vinay Kumar
85 Cybercrimes, cibercrimicals, cyberethics and other legal issuesM dh i M dh lik d B bit Y dMadhurima, Madhulika and Babita Yadav
89 J2ME Applications to Implement Computer Graphics on Mobile DevicesGraphics on Mobile DevicesJaswinder Singh and Roshi Saxena
97 A Survey of QoS in Mobile Ad-Hoc NetworksM.Asger and Sanjay Jamwal
109 Efficient Certificate Revocation Lists In Public Key InfrastructureKey InfrastructureShalini Vermani
Track 2: High Performance Computing (C – I)
111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic AlphabetsArun Kumar Chaturvedi and Chaitali Arun Kumar Chaturvedi and Chaitali
112 Internet Protocol Version-6 (IPV6)Preeti Arora
116 Image Security Enhancement through Watermarking and Cryptographic MeasuresB Bandyopadhay Tapas Bandyopadhay and B N B. Bandyopadhay, Tapas Bandyopadhay and B.N. Chatterjee
118 A Survey on Steganography in AudioHitesh Singh, Pradeep Kumar Singh and Kriti Saroha
119 A Survey on Text Based SteganographyHit h Si h P d K Si h d K iti S hHitesh Singh, Pradeep Kumar Singh and Kriti Saroha
Track 2: High Performance Computing (C – I)
123 Analysis of 802.1X Authentication Protocol for General DeploymentJeetendra Pande and Kavita UpadhyayJeetendra Pande and Kavita Upadhyay
124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data MiningDurgesh Mishra, Neha Koria, Nikhil Kapoor and Ravish Bahetyy
130 Route Optimization In Mobile Adhoc Networks with Genetic AlgorithmsRakesh Kumar and Vijay DhirRakesh Kumar and Vijay Dhir
144 Online Scheme towards Secured Inter Banking Fund TransferAakash Roy, Ajeet Kumar, Debasis Mitra, Debasish Jana and Radha Tamal Goswami
Track 2: High Performance Computing (C – I)
146 A Heuristic Algorithm for Locating Mobile Clients in Reduced Time and CostVandana SharmaVandana Sharma
162 A RMS Based Hierarchical Approach for IP Address Configuration in MANETgMohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd, Rakesh Sharma and Shahnawaz Husain
163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for WirelessThreshold Selected Mapping for WirelessPankaj Kumar, R. K. nagaria and T.N. Sharma
165 Fault Tolerant Computing: A Network R li bilit A hReliability ApproachK.C.Joshi and Dherendra P.Singh
Track 2: High Performance Computing (C – I)
195 Hierarchical Classification of Security in IT EnvironmentSmiriti Jain and Maya IngleSmiriti Jain and Maya Ingle
203 Teenage Security Considerations in Pervasive EnvironmentAnamika Bhargava and Saba Hilal
217 An Overview of the Cryptographic Algorithms d th i I l t ti i FPGAand their Implementations using FPGAs
Mohd. Ajmal Kafeel
221 Lackadaisical Approach in Designing and its 221 Lackadaisical Approach in Designing and its Adverse Impact on Web Database SecuritySupria Madan
231 Perspectives of Symmetric CryptographyDharmendra Kumar and Santosh Kumar Yadav
Track 2: High Performance Computing (C – I)
232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Pattern (RCBP)Pattern (RCBP)J. K. Mandal, J. Pal Choudhury, Satyendra Nath Mandal and Uttam Kr. Mondal
252 M lti l R ti ith S lf H li T h i 252 Multiple Routing with Self-Healing Technique for Quality of Support(QoS) in MANETNitesh Tomar
253 Spin Protocol in Sensor Networks: An OverviewM K Tiwari O P Vyas and Bhawana NarainM.K.Tiwari, O.P.Vyas and Bhawana Narain
258 Performance Analysis of High Speed Data Networks using Priority DisciplineA. K. Pal, Anu Chaudhary and K. Bhatia
Track 2: High Performance Computing (C – I)
259 Reducing Network Traffic in Secure Multi-Party Computation
261 User Authentication from the Remote Autonomous Object
D. K. Mishra and Samiksha Shukla
Autonomous ObjectK.K.Goyal and Kuldeep Bhardwaj
266 Bluetooth based Electrical Measurement 266 Bluetooth based Electrical Measurement SystemMohd. Rihan and Priyanka Varshney
Track 3: Changing Architecture and Programming Paradigm (C – I)
3 The Object Model of the JNUOS Operating SystemP C SaxenaP C Saxena
22 Software ReliabilityAmitabh Yadav and Raees Ahmad Khan
44 Emergence of Testing Maturity ModelRaees Ahmad Khan and Harish Kumar
46 Development of Knowledge Engineering Based 46 Development of Knowledge Engineering Based Model of Insurance SectorA.K.Saini and Seema Rani
55 A Comparative Analysis of Sorting Algorithms in two Opposite ExtremeDinesh .J.Prajati and Mahesh H.Panchalj
Track 3: Changing Architecture and Programming Paradigm (C – I)
72 Requirements Traceability Matrix in Component Based DevelopmentDevendra Tayal Anita Yadav and Yogesh SinghDevendra Tayal, Anita Yadav and Yogesh Singh
77 Analysis of Software Development Terms and User Satisfaction LevelDeepshika Jamwal and Devanand Padha
78 Issues & Factors Evaluation of Software Quality ModelsQuality ModelsDeepshika Jamwal and Ranbireshwar S. Jamwal
88 Promotion of an Expert System in Technical & Team Talent TrainingTeam Talent TrainingRachita Taxak and Ashwini Kumar
90 Interpretability of Data Sources - Providing p y gInformationAbhilasha Vyas
Track 3: Changing Architecture and Programming Paradigm (C – I)
129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal LanguageA Sh i t M j D b i S P T i thi Anurag Shrivastava, Manuj Darbari, S. P. Tripathi, Shubha Mishra and Vivek Kumar Singh
158 Agent Based Approach of Service Oriented Architecture for Business ModelingArchana Bhatnagar, O. P. Rishi and Ashok Sharma
161 Software Testing: An Effective Method to 161 Software Testing: An Effective Method to Improve Software QualityArti Rana and Divya Arora
164 Effect of Bussiness Constraints in Software Development ProductivityDevanand, Jyoti Mahajan and V. Mansotra
171 Recent Trends in Database and Future DirectionsPradeep Aswal and Manish PandeyPradeep Aswal and Manish Pandey
Track 3: Changing Architecture and Programming Paradigm (C – I)
174 Smart Card Operating System: Past, Present and FuturePoonam Sachdeva
185 Data Integration and Management SolutionsH. R. Shashidhar, Manjunath B., R. Mageshwaran and A J Prasadand A. J. Prasad
186 Computerized Human Resource System in Steel PlantA kit M l i Ni l H S j K d K Ankit Malviya, Niral Hemrom, Sanjay Kumar and K. C. Kothari
208 Performance Evaluation of Disk Scheduling gAlgorithm and File Allocation MethodsArchana Wamanrao Bhade and Mir. Sidique Ali
190 Challenges of Implementing HRIS in a Public 190 Challenges of Implementing HRIS in a Public Sector EnterpriseAnkit Malviya, Niral Hemrom, Sanjay Kumar and K. C KothariC. Kothari
Track 3: Changing Architecture and Programming Paradigm (C – I)
199 Implementation of Integrated Refractory Information System at Steel PlantManju Shree Selvi S Shyamalesh Khan and K C Manju Shree, Selvi S., Shyamalesh Khan and K. C. Kothari
201 A Comparative Study of Software R i t T l f S S ft Requirements Tools for Secure Software DevelopmentMohammad Ubaidullah Bokhari and Shams Tabrez
204 Software Design Testability Factors: A New PerspectiveMohd Nazir and Raees A. Khan
205 AOP with Eclipse AspectJ Development Tool (AJDT)Ganesh Gupta Pankaj Kumar and UmangGanesh Gupta, Pankaj Kumar and Umang
Track 3: Changing Architecture and Programming Paradigm (C – I)
215 Lackadaisical Approach in Designing and its Adverse Impact on Web Database SecuritySupriya Madan
225 A Qualitative Comparison of Three Change l i h i f bjImpact Analysis Techniques for Object
Oriented SystemsAvadhesh Kumar, Laxmi Ahuja and Naresh Kumar
235 A Novel Technique to Improve the Performance of Licensed Software in Client/Server Network Environment/S.A.M. Rizvi and Syed Imtiyaz Hassan
240 Achieving Loose Coupling between Different Components of Model-View-Controller for Components of Model-View-Controller for Web Based ApplicationS. A. M. Rizvi and Syed Imtiyaz Hassan
Track 3: Changing Architecture and Programming Paradigm (C – I)
241 Why Knowledge and Knowledge ManagementSumit Pandey and Aasho Balla
242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software CompaniesAnurag Srivastava, Diwakar Yagyasen, Manoj Darbari and V.K.Singh
249 Feature Extraction of Legacy Systems through Aspect Oriented ProgrammingS A M Rizvi and Zeba KhanamS. A. M. Rizvi and Zeba Khanam
260 Managing ERP Implementation to Deliver Value- A Project Management Perspective
h h d bhB. Manjunath, K. Anantha Padmanabha, R. Mageshwaran and A.J. Prasad
Track 3: Changing Architecture and Programming Paradigm (C – I)263 Knowledge Based Grid : Characteristics and
StrategiesS.A.M. Rizvi and Muqeem AhmedS.A.M. Rizvi and Muqeem Ahmed
265 Regression Testing of a Relational DatabaseKapila Kapoor and Rajiv Chopra
268 How to Tap ERP’s Hidden Potential in India?Rashmi Jha and A.K.Sinha
275 Assessing Software Reliability Growth with 275 Assessing Software Reliability Growth with Different Combinations For Distributed Environment Using ANN ApproachDeepak Kumar P K Kapur and Sunil K KhatriDeepak Kumar, P K Kapur and Sunil K. Khatri
278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect DebuggingDeepak Kumar, P. C. Jha, P. K. Kapur, S. S. Handa
Track 3: Changing Architecture and Programming Paradigm (C – I)
284 Modeling Software Reliability Growth in Distributed Environment Using Unified ApproachApproachOmpal Singh, P. K. Kapur and Prashant Johri
288 A New Approach For Developing Testing Effort D d t S ft R li bilit G th M d lDependent Software Reliability Growth ModelsP.K. Kapur, Anu G. Aggarwal and Ravi Kumar
292 Distribution Based Change-Point Problem with 292 Distribution Based Change Point Problem with Two Types of Imperfect Debugging in Software ReliabilityP K Kapur Sameer Anand V B SinghP. K. Kapur, Sameer Anand, V. B. Singh
302 Optimal Component Selection For Fault Tolerance COTS Based Software System Under C R Bl k S hConsensus Recovery Block SchemeP. C. Jha, P. K. Kapur and Shivani Vaid
Track 4: Other Emerging Technologies (C – I)
10 Fuzzy Logic Based Decision Maker System for Choosing CarsJasleen Kaur SethiJasleen Kaur Sethi
13 Web Document Clustering for Finding Expertise in Research AreaAnil Kumar, T. Jaya Lakshmi
19 Problems and Facets of Multi-Agent SystemsHarsimerjeet KhuranaHarsimerjeet Khurana
25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsI h N th Jh d R k h Si hIsh Nath Jha and Rakesh Singh
31 Novel FPGA Based Hardware Realization of Arbitrary FunctionsMohammad Usaid Abbasi, Tanvir Ahmad Abbasi, V.Kannan and Shabbir Ahmad
Track 4: Other Emerging Technologies (C – I)
39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa A K Mishra Chaitali Rajendra Sharma and Sujata A.K.Mishra, Chaitali, Rajendra Sharma and Sujata Pulugugurta
41 Design of an Intelligent-Agent Based T h i f S l i I t Technique for Solving Interprocess Synchronization ProblemDeepshikha Bhargava and Madhavi Sinha
43 Data Cubing Algorithms- Comparative Study of Data Cubing AlgorithmsBeena Mahar
49 The Robot and Human Emotional Interface -Towards Automatic Techniques of Emotional AssessmentAssessmentSaba Hilal
Track 4: Other Emerging Technologies (C – I)
51 Kinematics Based Polygon ApproximationSumit Kumar and Nihar Rajan Roy
52 Digital Image Watermarking using 2D Wavelet TransformS. C. Tamane
54 A New Model to Perform Extraction Transformation Loading Barjesh Kochar and Rajinder Singh ChillarBarjesh Kochar and Rajinder Singh Chillar
63 Game Theory: Modeling and Analyzing Conflicting Security Applications by E b ddi R ti litEmbedding RationalityAkash Tayal, Ankita Lathey, Ashwini Kumar and Shweta.
66 Alchemi .NET Framework in Grid ComputingVijay Dhir
Track 4: Other Emerging Technologies (C – I)
68 Implementing Grid Computing - Optimizing Resources to Meet Business RequirementsRashmi DesaiRashmi Desai
69 Mixed Signal Hardware Description Languages VHDL-AMS and Verilog AMS- Compared and ContrastedContrastedParag Parandkar and Sumant Katiyal
70 Adaptable Power Data Compression / i h iDecompression Technique
Parag Parandkar, Sumant Katiyal and Gurvinder Singh
76 Forecasting Daily Nifty Stock Returns with Artificial Neural NetworkAshutosh Kumar Bhatt and Durgesh PantAshutosh Kumar Bhatt and Durgesh Pant
84 Personalization Issues in Pervasive ApplicationsS it K hik d S b Hil lSarita Kaushik and Saba Hilal
Track 4: Other Emerging Technologies (C – I)
87 Geospatial Application on Web Service Oriented ArchitectureSeema Rani and Vandana SharmaSeema Rani and Vandana Sharma
95 Analysis of Watermarking TechniquesJyoti Aroray
101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) ProteinDwijendra K Gupta Ashutosh Mani Manish Dwivedi Dwijendra K. Gupta, Ashutosh Mani, Manish Dwivedi and Vijay Tripati
102 An Evolutionary Analysis of Lysosomal A i d M b P i 1 (LAMP 1)Associated Membrane Protein-1 (LAMP-1)Ashutosh Mani, Manish Dwivedi and Vijay Tripati
105 Evolutionary Account of GPI Anchor Proteins : 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based ApproachDwijendra K. Gupta, Manish Dwivedi and Vijay TripatiTripati
Track 4: Other Emerging Technologies (C – I)
106 More than Data Warehouse- An Insight to Customer InformationDeepshikha Kalra and Ritu AggrawalDeepshikha Kalra and Ritu Aggrawal
110 Data Mining – A Tool in Support of Interpretation of Low Pressure System Movement over Indian RegionKavita Pabreja
126 Performance Comparison of Class AB 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOSFahad Ali Usmani Mohd Hasan and Naushad AlamFahad Ali Usmani, Mohd. Hasan and Naushad Alam
136 Preprocessing for Click Stream Data MiningAnne Gutschmidt, Clemens H. Cap, O. P. Vyas and S. Shrivastava
139 Delay Testable Enhanced Scan FlipflopShifaly Sharma and Amit Prakash SinghShifaly Sharma and Amit Prakash Singh
Track 4: Other Emerging Technologies (C – I)
140 Suitability of Web usage Mining for Web Content SyndicationAnne Gutschmidt Clemens H Cap Kavita Das and Anne Gutschmidt, Clemens H. Cap, Kavita Das and O. P.Vyas
157 A Comparative Study of Pectinase and Pectin 157 p yLyase Seuences from Plant and Microbial Sources using ClustalWEesha Ingle,Neha Gorani and Maya IngleEesha Ingle,Neha Gorani and Maya Ingle
160 A study on Applications and Techniques used in Web Usage MiningSeema D.
173 Variable Precision Rough Set based Decision T ee ModelTree ModelRajini Jain and Vardana Kalra
Track 4: Other Emerging Technologies (C – I)
181 An Approach to Very low bit rate Speech CodingHari Kumar Singh, Sanjeev Sharma and Yash Vir Hari Kumar Singh, Sanjeev Sharma and Yash Vir Singh
191 Optimizing HPC and Parallelization for NanotechnologyNanotechnologyRohit Pathak, Satyadhar Joshi and D. K. Mishra
197 Knowledge Discovery in Spatial DatabasesMamta Dahiya
200 Data Warehouse Architectural Design - using Parallel Processing on the Distributed Parallel Processing on the Distributed Environment for Effective Load Balancing and Data SharingAnshu SalujaAnshu Saluja
202 Parallel Model Combination using Wideband Filters in Automatic Speech RecognitionM k hi Sh d S lil KhMeenakshi Sharma and Salil Khare
Track 4: Other Emerging Technologies (C – I)
207 Digital Tampering Detection Techniques: A ReviewKusam Pawannesh Abrol and DevanandKusam, Pawannesh Abrol and Devanand
216 Similarity Measures for Real World Data MiningH. S. Nagalakshmi and Suhasini M.
222 Problem Solving Using Nature’s Way - Genetic Al ithAlgorithmMamta Madan
251 Content Based Image Retrieval Techniques251 Content Based Image Retrieval TechniquesShikha Nirmal
255 Detection of Stegoimages: A Comparative 255 g g pStudy of ClassifiersGaurav K. Rajput, R. K. Agrawal
Track 4: Other Emerging Technologies (C – I)
256 Synthesizing High Frequency Association Rules for Determining Service Quality in Hospitals by Weighting Method Hospitals by Weighting Method Anirban Chakrabarty, Sonal G. Rawat
247 Web Warehousing and e-GovernmentK.M. Alaskar, K.P. Tripati and Rajendra Kumbhar
264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary Associated with Biosynthesis of Secondary MetabolitesS.A.M. Rizvi and Meenakshi Bhat
267 P i All ti F A h i 267 Premium Allocation - Fuzzy Approach in Insurance Business Pooja Pathak and Sanjeev Kumar
269 Next Generation Cloud Computing TechnologyShalini Singh,Deepali Kamthania and M.N.Hoda
Track 1: Digital World (C – II)
9 The IT Security: The Quality ConcernDheeraj Mehrotra
107 Implementing Web VotingDushyant Dutta and Ritika Jasrotia
128 E-Governance-Today & TomorrowLava NautiyalLava Nautiyal
234 Technology we InventA KaurA. Kaur
236 e-Banking in India Prospects and OportunitiesR.P. Tulsian, Sanjeev Kumar and T.K. Sharmaj
306 Changing Face of the Indian Financial MarketSanjeev Mittal,N.K.Gupta and Sudesh Kumar SharmaSharma
Track 1: Digital World (C – II)
250 Impact of e-Governance in Rural & Urban Areas of PunjabSubhash Chander Sunil Kumar and Vikram SinghSubhash Chander, Sunil Kumar and Vikram Singh
Track 2: High Performance Computing (C – II)
1 Telecommunications in India - Changing TrendsJeetendra Pande and Nihar Ranjan PandeJeetendra Pande and Nihar Ranjan Pande
11 Trust Management in Adhoc NetworksM.V.Kulkarni and ShreejiThankappan
62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile ComputingShahnawaz Husain, Mohd Ahmad Mansoori, Mukesh Chand, Narendra Kumar, Noor Mohd and Rakesh Sharma
100 Optical Technology and NetworksAshish A. Bardekar, Asmita Bardekar and S. N. SawalkarSawalkar
193 Energy Efficient Watermarking on Mobile DevicesA D d Af S lt K hk h T bA.Damodaram,Afreen Sultana,Kahkashan Tabassum
Track 2: High Performance Computing (C – II)
220 Network and Information SecurityR. HemaC i i S d f i bil d223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)Charu Arora and Devendra Singh
Track 3: Changing Architecture and Programming Paradigm (C – II)
92 A Framework for Software Safety Metrics in Critical SystemsM. Ben Swarup and P. Seetha RamaiahM. Ben Swarup and P. Seetha Ramaiah
94 Growing Need for KPO in IndiaDivya Goel and Shivendra Goel
169 Jena: An Open Source Java toolkit : An OverviewHarish Kumar Taluja, P.S. Bedi and Anuradha Taluja
176 Effort Estimation Techniques in Component Based Development - A Critical ReviewArun Sharma and Kirti SethArun Sharma and Kirti Seth
213 Inheritance and AggregationDeepak Abhyankar and Maya Ingle
219 Goldplating Software: Another Step to Customer GratitudeDeepak Jain, Shalini Jain and Shweta TanejaDeepak Jain, Shalini Jain and Shweta Taneja
Track 3: Changing Architecture and Programming Paradigm (C – II)
224 How Database Technology can be made Omnipresent and Universal?Pooja Gautam and Shubhra Gautam SharmaPooja Gautam and Shubhra Gautam Sharma
248 A Road Map of Autonomous Software Agent ArchitecturesGopal Sakarkar and V M ThakareGopal Sakarkar and V. M. Thakare
Track 4: Other Emerging Technologies (C – II)
38 Multi Level Fuzzy Association Rules for Entity Relationship ModelsAshwani Kush, Praveen Arora and R.K ChauhanAshwani Kush, Praveen Arora and R.K Chauhan
104 Gaining Value to Business Through Business IntelligenceJameela Bano and Rafia NaseerJameela Bano and Rafia Naseer
108 Genetic Algorithm: Mimicking Natural EvolutionBarjesh Kochar and Chitra Relhan
227 Extracting and Predicting Information from Data using Datamining Tool – SPSSData using Datamining Tool SPSSBarjesh Kochar, Nidhi Khurana and Rajender S. Chhillar
243 Comparison between Human Vision and 243 Comparison between Human Vision and Computer Vision Integrated Approach based on PCA for Face Detection and RecognitionZ f G Sh ikh d V M Th kZafar G.Sheikh and V.M. Thakare
Track 1: Digital World (C – III, IV)
17 KM-ICT or Effective Rural DevelopmentVaishali Patil, Harshali Patil and Pooja Raundale
27 R l f IT i M d T ffi M t27 Role of IT in Modern Traffic ManagementNavendu
29 e-Waste Disposal : The Challenges for 29 po g oEnvironmentGanesh Chandra Deka and Malaya Dutta Bora
86 Infrastructure Management Services:Enabling 86 Infrastructure Management Services:Enabling IT to Activate the BusinessDavinder Pal Singh
93 The Scope of Usage of ICTs in the Development of Sustainable LivelihoodChhavi
96 E-Governance in India:A Model of Good GovernancePramod UniyalPramod Uniyal
Track 1: Digital World (C – III, IV)
117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Maintaining Agricultural Output and Food Rajeswari, Sanjay Agnihotri and Madaswamy Moni
141 Appropriation of Social Media Tools and E t C i ti D i i Emergent Communication Dynamics in OrganisationsPrema P. Nair
151 Rescuing Disaster Risk Management from Disasters:The ICT WayBhoomi Guptap
166 Mainstreaming ICT for Water Availability and Requirements Analysis at Village Level – A Perspective and Prospective of DISNIC-PLAN Perspective and Prospective of DISNIC PLAN Project in the era of e-Governance in IndiaSameena Mukjija, Madaswamy Moni and Kishore KumarKumar
Track 1: Digital World (C – III, IV)
175 Ontologies in Business Application DomainsArun Sharma and Laxmi Ahuja
i hi l C bl d i l184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity IncreaseTulika Debnath, Girish Chandra, Anjani Kumar Choubey and Madaswamy Moni
206 IT and Consumer Rights: Safeguarding 06 g g gConsumer Rights in the Emerging Internet WorldShivani Verma and Snigdha Singhg g
Track 2: High Performance Computing (C – III, IV)
15 Revolution of Optical Ethernet in Metropolitan Area NetworkL lit S tLalit Saraswat
23 Detection of Routing Misbehavior in Mobile Ad Hoc NetworksHoc NetworksR.Balakrishna, U.Rajeswar Rao and N.Geethanjali
50 Security in Mobile Adhoc Networks50 yShaily Malik
53 Industrial Applications of ZigbeeAshish Sharma, Jaspal Singh and Sumit Soman
57 Analysis for the Enhacement of System Life Ti f Wi l S N t kTime of Wireless Sensor NetworkBirendra Kumar and Ashish Payal
Track 2: High Performance Computing (C – III, IV)
58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANETBi d K S t Sh kl Abhi h k K Birendra Kumar, Suneet Shukla, Abhishek Kumar Mishra and Navin Prakash
65 A Survey of Simulation in Sensor NetworkChandresh Pratap Singh, O.P.Vyas and Manoj Ku. Tiwari
99 Evaluating Improved Performance Moble Ad-99 Evaluating Improved Performance Moble Adhoc NetworksAkhilesh K. Sharma
149 M bil C ti149 Mobile ComputingShakuntala Choudhary
150 Privacy Issues in Wireless Sensor Networks150 acy ssues e ess e so e o sSachin Gupta
Track 2: High Performance Computing (C – III, IV)
170 Securing Wireless Sensor Network and Detecting Compromised NodeH.K.Soni, Anand Dohare and Dinesh Lal
180 A New Key Exchange Mechanism for SIPKapila AroraKapila Arora
188 Challenges in Managing Hetrogeneous Networks by Using Mobile Agent TechnologyB R P k h d D R hB.R.Prakash and D.Ramesh
198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc NetworksM.N.Doja and Mohd. Amjad
233 Review of Hashing as Security Tool in Wireless 233 Review of Hashing as Security Tool in Wireless Ad Hoc NetworksAshwani Kush
Track 3: Changing Architecture and Programming Paradigm (C – III, IV)
79 Compartive Analysis of Different Software Quality ModelsRanbireshwar S Jamwal Deepshikha Jamwal and Ranbireshwar S. Jamwal,Deepshikha Jamwal and Devanand Padha
127 Issues in Usability Measurement for Object-Oriented SystemOriented SystemSanjay Kr.Dubey and A.K. Malviya
153 Component Based Software Testing: p gIssue,Problem and SolutionAnurag Dixit
155 SQL Injection: A Threat to Database Security155 SQL Injection: A Threat to Database SecurityS.K. Pandey and Pramod Dhiman
189 Reuse Metrics Implementation on Proposed Component Based Development ModelNaveeta Adlakha
Track 3: Changing Architecture and Programming Paradigm (C – III, IV)
262 A Study of Object Oriented Software Reliability ModelsA.M. Sherry, A.K.Malviya and R.C.Tripathi
Track 4: Other Emerging Technologies (C – III, IV)
5 The Vector Floating-Point Unit in a Synergistic Processor Element of a CELL ProcessorV. Tholkapian and K. N. Vijeyakumar
6 P6 Binary Floating-Point UnitK. N. Vijeyakumar and V. Tholkapiyan
7 Comparative Study of Turbo Decoding TechniquesPrabhu Raj.N. and M.Yuvaraj
26 Automated Tool for Microarray Analysis of Differentially Expressed GenesVadivu G.
33 An Analytical Model of SH-LED for Gas Sensor Instrumentation in Mid-infrared (2-5µm) RegionRupender Singh
Track 4: Other Emerging Technologies (C – III, IV)
35 To improve the Peformance of Digital Circuits in VLSIRupender Singh
64 A New 2-D RA Method of Representation and Analysis of a DNA SequenceRajendra Bharti and Archana Verma
82 Information Measure in the Non Linear Time Series a Comparative StudyArchana Gahlaut
91 Knowledge Discovery and Data Mining for the FutureChhavi
98 Analysis of Leading Zero Counting and Anticipation logic for High-Speed Floating Point UnitsK.N.Vijeyakumar and V. Tholkapiyan
Track 4: Other Emerging Technologies (C – III, IV)
135 Homology Modeling of Semaphorins 3A ProteinAshutosh Khanna, Ganesh Gupta and Sarika Sahu
138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English AlphabetsPankaj Lathar, Sumeet Gill and Manu Pratap Singh
159 Dictionary Based Bangla-English Relevant Cross Lingual Information Access Using Intelligent Semantic TechniquesAbishek Banerjee and Swapan Bhattacharyya
183 Artificial Erythrocytes-Models and DesignJitesh B.Dundas
226 Integrated Approach for Multiple Face Detection and Recognition Based on Principal Component Analysis (PCA)Zafar G. Sheikh and V. M. Thakare
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A. Damodaram 193 Energy Efficient Watermarking on Mobile DevicesDevices
A. J. Prasad 185 Data Integration and Management Solutions
A. J. Prasad 260 Managing ERP Implementation to Deliver Value- A Project Management PerspectiveValue- A Project Management Perspective
A. K. Pal 258 Performance Analysis of High Speed Data Networks using Priority Discipline
A Kaur 234 Technology we InventA. Kaur 234 Technology we Invent
A.K Mishra 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa
A.K. Malviya 127 Issues in Usability Measurement for Object-y y jOriented System
A.K.Malviya 262 A Study of Object Oriented Software Reliability Models
A.K.Saini 46 Development of Knowledge Engineering Based Model of Insurance Sector
A.M. Sherry 262 A Study of Object Oriented Software Reliability ModelsReliability Models
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Aakas Sharma 212 Top Five Things to Ensure in ECM Upgrade or MigrationMigration
Aakash Roy 144 Online Scheme towards Secured Inter Banking Fund Transfer
Aashoo Bhalla 241 Why Knowledge and Knowledge ManagementAashoo Bhalla 241 Why Knowledge and Knowledge Management
Abhilasha Vyas 90 Interpretability of Data Sources - Providing Information:
Abhishek Kumar 58 Analysis for the Prevention of Black Hole Abhishek Kumar Mishra
58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET
Afreen Sultana 193 Energy Efficient Watermarking on Mobile Devices
Ajay D. Parikh 238 Contact less Vehicle Identification Based on Services Oriented Architecture
Ajay Kumar Gupta 148 Minor Irrigation Census Computerization: A Step towards ICT for Micro level Planning in Step towards ICT for Micro level Planning in Water Resources Management and Planning to Achieve Rural Prosperity
Ajeet Kumar 144 Online Scheme towards Secured Inter Banking Fund Transfer
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Akash Tayal 63 Game Theory: Modeling and Analyzing C fli ti S it A li ti b Conflicting Security Applications by Embedding Rationality
Akhilesh K. Sharma 99 Evaluating Improved Performance Mobile Ad-Hoc Networks
Ameen Uddin 179 Prevention from the Terrorist Bombs Attacks
Amit Prakash Singh 139 Delay Testable Enhanced Scan Flipflop
Amita Goel 230 Evaluation of Secondary School based on Amita Goel 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method
Amitabh Yadav 22 Software Reliability
Anamika Bhargava 203 Teenage Security Considerations in Pervasive Anamika Bhargava 203 Teenage Security Considerations in Pervasive Environment
Anand Dohare 170 Securing Wireless Sensor Network and Detecting Compromised Node
Anees Ahmad 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients
Anil Kumar 13 Web Document Clustering for Finding Expertise in Research AreaExpertise in Research Area
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Anirban Chakrabarty
256 Synthesizing High Frequency Association Rules for Determining Service Quality in Chakrabarty Rules for Determining Service Quality in Hospitals by Weighting Method
Anita Yadav 72 Requirements Traceability Matrix in Component Based Developmentp p
Anjana Gupta 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method
Anjani Kumar 184 NavKrishi Portal:An ICT Enabled Agriculture Choubey Extension Reforms in India to Empower
Farming Community for Productivity Increase
Ankit Malviya 186 Computerized Human Resource System in Steel PlantSteel Plant
Ankit Malviya 190 Challenges of Implementing HRIS in a Public Sector Enterprise
Ankita Lathey 63 Game Theory: Modeling and Analyzing y y g y gConflicting Security Applications by Embedding Rationality
Anne Gutschmidt 136 Preprocessing for Click Stream Data Mining
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Anne Gutschmidt 140 Suitability of Web usage Mining for Web Anne Gutschmidt 140 Suitability of Web usage Mining for Web Content Syndication
Anshu Saluja 200 Data Warehouse Architectural Design - using Parallel Processing on the Distributed En ironment for Effecti e Load Balancing and Environment for Effective Load Balancing and Data Sharing
Anu Chaudhary 258 Performance Analysis of High Speed Data Networks using Priority Disciplineg y p
Anu G. Aggarwal 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models
Anukiran Jain 230 Evaluation of Secondary School based on Analytic Hierarchy Process Method
Anuradha Taluja 169 Jena: An Open Source Java toolkit : An OverviewOverview
Anurag Dixit 153 Component Based Software Testing: Issue,Problem and Solution
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Anurag Shrivastava 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal System Sequence Diagrams as a Formal Language
Anurag Shrivastava 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement g g yFramework for Medium and Small Scale Software Companies
Aradhana 182 Emerging Issues and Problems of Disinvestment in Public EnterprisesDisinvestment in Public Enterprises
Archana Bhatnagar 158 Agent Based Approach of Service Oriented Architecture for Business Modeling
Archana Gahlaut 82 Information Measure in the Non Linear Time Archana Gahlaut 82 Information Measure in the Non Linear Time Series a Comparative Study
Archana Verma 64 A New 2-D RA Method of Representation and Analysis of a DNA Sequence
Archana Wamanrao Bhade
208 Performance Evaluation of Disk Scheduling Algorithm and File Allocation Methods
Arti Rana 161 Software Testing: An Effective Method to I S ft Q litImprove Software Quality
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Arun Kumar Chaturvedi
111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic AlphabetsChaturvedi Messages Transmitted by Phonetic Alphabets
Arun Sharma 175 Ontologies in Business Application Domains
Arun Sharma 176 Effort Estimation Techniques in Component Based Development - A Critical ReviewBased Development - A Critical Review
Ashish A. Bardekar 100 Optical Technology and Networks
Ashish Payal 57 Analysis for the Enhacement of System Life Time of Wireless Sensor NetworkTime of Wireless Sensor Network
Ashish Sharma 53 Agent Based Approach of Service Oriented Architecture for Business Modeling
Ashok Sharma 158 Agent Based Approach of Service Oriented g ppArchitecture for Business Modeling
Ashok Sharma 196 I.T in Faculty Improvement with a Bearing on Learning Methodologies
Ashutosh Khanna 135 Homology Modeling of Semaphorins 3A Protein
Ashutosh Kumar Bhatt
76 Forecasting Daily Nifty Stock Returns with Artificial Neural NetworkBhatt Artificial Neural Network
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ashutosh Mani 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) Protein
Ashutosh Mani 102 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)Associated Membrane Protein 1 (LAMP 1)
Ashutosh Mani 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach
Ashwani Kumar 63 Game Theory: Modeling and Analyzing y g y gConflicting Security Applications by Embedding Rationality
Ashwani Kush 38 Multi Level Fuzzy Association Rules for Entity Relationship ModelsRelationship Models
Ashwani Kush 233 Review of Hashing as Security Tool in Wireless Ad Hoc Networks
Ashwini Kumar 88 Promotion of an Expert System in Technical & Ashwini Kumar 88 Promotion of an Expert System in Technical & Team Talent Training
Asmita Bardekar 100 Optical Technology and Networks
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Avadhesh Kumar 225 A Qualitative Comparison of Three Change Impact Analysis Techniques for Object Impact Analysis Techniques for Object Oriented Systems
Avijit Dutta 45 Effect of e-Readiness Score on Knowledge Index
Avishek Banerjee 159 Dictionary Based Bangla-English Relevant Cross Lingual Information Access Using Intelligent Semantic Techniques
B. Bandyopadhyay 116 Image Security Enhancement through Watermarking and Cryptographic Measures
B. Manjunath 260 Managing ERP Implementation to Deliver Value- A Project Management PerspectiveValue A Project Management Perspective
B. N. Chatterjee 116 Image Security Enhancement through Watermarking and Cryptographic Measures
B.R.Prakash 188 Challenges in Managing Hetrogeneous g g g gNetworks by Using Mobile Agent Technology
Babita Yadav 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issues
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Barjesh Kochar 54 A New Model to Perform Extraction Transformation Loading Transformation Loading
Barjesh Kochar 108 Genetic Algorithm: Mimicking Natural Evolution
Barjesh Kochar 227 Extracting and Predicting Information from Barjesh Kochar 227 Extracting and Predicting Information from Data using Datamining Tool - SPSS
Beena Mahar 43 Data Cubing Algorithms- Comparative Study of Data Cubing Algorithms
Bhavika Varma 125 Use of IT for Disaster Management and Mitigation
Bhawana Narain 253 Spin Protocol in Sensor Networks: An O iOverview
Bhoomi Gupta 151 Rescuing Disaster Risk Management from Disasters:The ICT Way
Bi d K 57 A l i f th E h t f S t Lif Birendra Kumar 57 Analysis for the Enhacement of System Life Time of Wireless Sensor Network
Birendra Kumar 58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Bobin Kuruvilla Sunny
4 Autosurveillance using GSMSunny
C.S.Rai 83 Design and Implementation of a Digital Signature Solution for e-Governance Compliant DIGITALGOV System on Enterprise p y pWide Area Network (E-WAN)
Chaitali 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa
Chandan Kalra 167 IT in Healthcare Sector
Chandan Kalra 168 Technological Perspective in Education: Revolution not Evolution
Ch d h P t 65 A S f Si l ti i S N t kChandresh Pratap Singh
65 A Survey of Simulation in Sensor Network
Charu Arora 223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)( )
Chennnakeshav Adya
20 The Key of Competitive Knowledge in a Consulting Firm-Knowledge Management and its Implementation Using KPO and Innovation NetworksInnovation Networks
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chhavi 91 Knowledge Discovery and Data Mining for the FutureFuture
Chhavi 93 The Scope of Usage of ICTs in the Development of Sustainable Livelihood
Chitra Relhan 108 Genetic Algorithm: Mimicking Natural Chitra Relhan 108 Genetic Algorithm: Mimicking Natural Evolution
Clemens H. Cap 136 Preprocessing for Click Stream Data Mining
Clemens H. Cap 140 Suitability of Web usage Mining for Web Content Syndication
D. K. Mishra 259 Reducing Network Traffic in Secure Multi-Party ComputationParty Computation
D. K. Mishra 191 Optimizing HPC and Parallelization for Nanotechnology
D.K. Sharma 236 e-Banking in India Prospects and g pOportunities
D. VenkataRamana Raju
47 e-Readiness in e-Commerce
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D.Sangheetha 47 e-Readiness in e-Commerce
D.Ramesh 188 Challenges in Managing Hetrogeneous Networks by Using Mobile Agent Technology
D.Sangheetha 48 An intelligent Overlay Search in UP2P
Dalip Kumar Bhat 134 A Study of ICT Penetration in Health Care System for J&K State
Davinder Pal Singh 86 Infrastructure Management S i E bli IT t A ti t th B iServices:Enabling IT to Activate the Business
Debasis Mitra 144 Online Scheme towards Secured Inter Banking Fund Transfer
Debasish Jana 144 Online Scheme towards Secured Inter Debasish Jana 144 Online Scheme towards Secured Inter Banking Fund Transfer
Deepak Abhyankar 213 Inheritance and Aggregation
D k J i 12 F L i B d R ti St t i i Deepak Jain 12 Fuzzy Logic Based Routing Strategies in VANETs
Deepak Kumar 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect yp pDebugging
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Deepak Jain 219 Goldplating Software: Another Step to Customer GratitudeCustomer Gratitude
Deepali Kamthania 269 Next Generation Cloud Computing Tech
Deepshikha 41 Design of an Intelligent Agent Based Deepshikha Bhargava
41 Design of an Intelligent-Agent Based Technique for Solving Interprocess Synchronization Problem
Deepshika Jamwal 77 Analysis of Software Development Terms and User Satisfaction Level
Deepshika Jamwal 78 Issues & Factors Evaluation of Software Quality Models
Deepshika Jamwal 80 Internet Banking Systems in India: Analysis of Security Issues
Deepshika Jamwal 218 Role of e-Learning in a Developing Country like Indialike India
Deepshikha Jamwal 209 Analysis of e-Education: Developing as a Potential Learning System in Jammu Region: India
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Deepshikha Jamwal 210 Issues and Influences of e-Commerce in Developing CountriesDeveloping Countries
Deepshikha Kalra 106 More than Data Warehouse- An Insight to Customer Information
Devanand 164 Effect of Bussiness Constraints in Software Devanand 164 Effect of Bussiness Constraints in Software Development Productivity
Devanand 207 Digital Tampering Detection Techniques: A Review
Devanand Padha 56 A Study of ICT in the Area of Agriculture and Rural Development in J&K State
Devanand Padha 77 Analysis of Software Development Terms and U S ti f ti L lUser Satisfaction Level
Devanand Padha 80 Internet Banking Systems in India: Analysis of Security Issues
Devanand Padha 103 ICT as an Stimulus for Development in Devanand Padha 103 ICT as an Stimulus for Development in Developing Countries
Devanand Padha 210 Issues and Influences of e-Commerce in Developing Countries
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Devendra Singh 223 Comparision Study of IDs in Mobile Ad Hoc Networks (MANETS)Networks (MANETS)
Devendra Tayal 72 Requirements Traceability Matrix in Component Based Development
231Dharmendra Kumar 231 Perspectives of Symmetric Cryptography
Dheeraj Mehrotra 9 The IT Security: The Quality Concern
Dhirendra P. Singh 165 Fault Tolerant Computing: A Network Reliability Approach
Dimple Dalby 4 Autosurveillance using GSM
Dinesh .J.Prajati 55 A Comparative Analysis of Sorting Algorithms in two Opposite Extreme
Dinesh Lal 170 Securing Wireless Sensor Network and Detecting Comp omised NodeDetecting Compromised Node
Divya Arora 161 Software Testing: An Effective Method to Improve Software Quality
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Divya Goel 94 Growing Need for KPO in India
Diwakar Yagyasen 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software CompaniesSoftware Companies
Durgesh Kumar Mishra
179 Prevention from the Terrorist Bombs Attacks
Durgesh Mishra 124 Complexity Minimization in Secure Multi-Durgesh Mishra 124 Complexity Minimization in Secure MultiParty Computation for Preserving Privacy during Data Mining
Durgesh Pant 8 e-Readiness and Awareness Measurement St d T d G I iti ti d Study Towards e-Governance Initiatives and Services at Uttarakhand
Durgesh Pant 76 Forecasting Daily Nifty Stock Returns with Artificial Neural Network
Dushyant Dutta 107 Implementing Web Voting
Dwijendra K. Gupta 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) finger and BTB domain containing 7A) Protein
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Dwijendra .K.Gupta 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach: A Bioinformatics Based Approach
Dwijendra .K.Gupta 192 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)
Fahad Ali Usmani 126 Performance Comparison of Class AB Fahad Ali Usmani 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOS
Ganesh Chandra 29 e-Waste Disposal : The Challenges for Deka Environment
Ganesh Chandra Deka
30 Application of "Wireless Regional Area Network" in Creating Community Network
G h G t 37 AOP ith E li D l t T l (AJDT)Ganesh Gupta 37 AOP with Eclipse Development Tool (AJDT)
Ganesh Gupta 135 Homology Modeling of Semaphorins 3A Protein
Ganesh Gupta 215 AOP with Eclipse AspectJ Development Tool (AJDT)
Gangadhar V. Kayande Patil
239 e-Government and e-Governance : The Effective ICT ToolsKayande Patil Effective ICT Tools
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Gaurav K. Rajput 255 Detection of Stegoimages: A Comparative Study of ClassifiersStudy of Classifiers
Gautam Dhameja 111 An Encryption and Decryption Algorithm for Messages Transmitted by Phonetic Alphabets
Girish Chandra 184 NavKrishi Portal:An ICT Enabled Agriculture Girish Chandra 184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity Increase
Gopal Sakarkar 248 A Road Map of Autonomous Software Agent p p gArchitectures
Gurvinder Singh 70 Adaptable Power Data Compression / Decompression Technique
Gurvinder Singh 81 Biotelemetry Based Wireless Patient Monitoring System
H. R. Shashidhar 185 Data Integration and Management Solutions
H. S. Nagalakshmi 216 Similarity Measures for Real World Data Mining
H.Chandrasekhran 39 In-Silico tRNA Prediction and Comparative A l i f P l T i hAnalysis of Populus Trichocarpa
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H.K.Soni 170 Securing Wireless Sensor Network and Detecting Compromised Node
Hari Kumar Singh 181 An Approach to Very low bit rate Speech Coding
44Harish Kumar 44 Emergence of Testing Maturity Model
Harish Kumar Taluja 169 Jena: An Open Source Java toolkit : An Overview
Harshali Patil 17 KM-ICT or Effective Rural Development
Harsimerjeet Khurana
19 Problems and Facets of Multi-Agent Systems
Hilal Ahmed 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients
Hitesh Singh 118 A Survey on Steganography in Audio
Hitesh Singh 119 A Survey on Text Based Steganography
Ish Nath Jha 25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsInteraction of Mobile Robots
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
J. K. Mandal 232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Literature with Reconstructing Characters Bit Pattern (RCBP)
J. Pal Choudhury 232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit gPattern (RCBP)
Jameela Bano 104 Gaining Value to Business Through Business Intelligence
Jasleen Kaur Sethi 10 Fuzzy Logic Based Decision Maker System for Choosing Cars
Jaspal Singh 53 Industrial Applications of Zigbee
Jaswinder Singh 89 J2ME Applications to Implement Computer Graphics on Mobile Devices
Jeetendra Pande 123 Analysis of 802.1X Authentication Protocol for General Deploymentfor General Deployment
Jeetendra Pande 125 Use of IT for Disaster Management and Mitigation
Jeetendra Pande 1 Telecommunications in India - Changing g gTrends
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Jitender Chugh 83 Design and Implementation of a Digital Signature Solution for e-Governance Signature Solution for e Governance Compliant DIGITALGOV System on Enterprise Wide Area Network (E-WAN)
Jitesh B.Dundas 183 Artificial Erythrocytes-Models and Design
Jolly Parikh 167 IT in Healthcare Sector
Jyoti Arora 95 Analysis of Watermarking Techniques
Jyoti Mahajan 164 Effect of Bussiness Constraints in Software y jDevelopment Productivity
K. Anantha Padmanabha
260 Managing ERP Implementation to Deliver Value- A Project Management Perspective
K. Bhatia 258 Performance Analysis of High Speed Data Networks using Priority Discipline
K. C. Kothari 186 Computerized Human Resource System in Steel PlantSteel Plant
K. C. Kothari 190 Challenges of Implementing HRIS in a Public Sector Enterprise
K. C. Kothari 199 Implementation of Integrated Refractory K. C. Kothari 199 Implementation of Integrated Refractory Information System at Steel Plant
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
K. K. Goyal 261 Role of MANET in Disaster Management
K. M. Alaskar 247 Web Warehousing and e-Government
K. N. Vijeyakumar 5 The Vector Floating-Point Unit in a Synergistic Processor Element of a CELL Processor
K. N. Vijeyakumar 6 P6 Binary Floating-Point Unit
K. P. Tripathi 247 Web Warehousing and e-Governmentp g
K. Paithankar 205 Collaborative Effect of Usability Heuristics and Characteristics
K C Joshi 165 Fault Tolerant Computing: A Network K.C. Joshi 165 Fault Tolerant Computing: A Network Reliability Approach
K.N.Vijeyakumar 98 Analysis of Leading Zero Counting and Anticipation logic for High-Speed Floating Point Units
Kahkashan Tabassum
193 Energy Efficient Watermarking on Mobile Devices
K il A 180 A N K E h M h i f SIPKapila Arora 180 A New Key Exchange Mechanism for SIP
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kapila Kapoor 265 Regression Testing of a Relational Database
Kavita Das 140 Suitability of Web usage Mining for Web Content Syndication
Kavita Pabreja 110 Data Mining – A Tool in Support of I i f L P S Interpretation of Low Pressure System Movement over Indian Region
Kavita Upadhyay 123 Analysis of 802.1X Authentication Protocol for General Deploymentfor General Deployment
Kirti Seth 176 Effort Estimation Techniques in Component Based Development - A Critical Review
Kishore Kumar 148 Minor Irrigation Census Computerization: A g pStep towards ICT for Micro level Planning in Water Resources Management and Planning
Kishore Kumar 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of DISNIC-PLAN Project in the era of e-Governance in India
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kriti Saroha 118 A Survey on Steganography in Audio
Kriti Saroha 119 A Survey on Text Based Steganography
Kuldeep Bhardwaj 261 User Authentication from the Remote Autonomous Object
Kusam 207 Digital Tampering Detection Techniques: A Review
Lalit Saraswat 15 Revolution of Optical Ethernet in Metropolitan Area Network
Lava Nautiyal 128 E-Governance-Today & Tomorrow
M. Ben Swarup 92 A Framework for Software Safety Metrics in M. Ben Swarup 92 A Framework for Software Safety Metrics in Critical Systems
M. K. Tiwari 253 Spin Protocol in Sensor Networks: An Overview
M. N. Hoda 269 Next Generation Cloud Computing Technology
M.Asger 97 A Survey of QoS in Mobile Ad-Hoc Networks
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
M.K Sharma 8 e-Readiness and Awareness Measurement Study Towards e Governance Initiatives and Study Towards e-Governance Initiatives and Services at Uttarakhand
M.N.Doja 198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc Networks
M.V.Kulkarni 11 Trust Management in Adhoc Networks
M.Yuvaraj 7 Comparative Study of Turbo Decoding T h iTechniques
Madaswamy Moni
115 SeedNet India Portal - A National Initiative of Info Services on Quality Seeds to Indian Farmers for Agri Productivity IncreaseFarmers for Agri Productivity Increase
Madaswamy Moni
117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in IndiaFood Production in India
Madaswamy Moni
148 Minor Irrigation Census Computerization: A Step towards ICT for Micro level Planning in Water Resources Management and Planning g gto Achieve Rural Prosperity
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Madaswamy Moni 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of DISNIC-PLAN Project in the era of e-Governance in India
M d M i 184 N K i hi P t l A ICT E bl d A i lt Madaswamy Moni 184 NavKrishi Portal:An ICT Enabled Agriculture Extension Reforms in India to Empower Farming Community for Productivity Increase
Madhavi Sinha 41 Design of an Intelligent-Agent Based g g gTechnique for Solving Interprocess Synchronization Problem
Madhulika 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issuesand other Legal Issues
Madhurima 85 Cyber Crimes, Cyber Criminals, Cyber Ethics and other Legal Issues
Mahesh H Panchal 55 A Comparative Analysis of Sorting Algorithms Mahesh H.Panchal 55 A Comparative Analysis of Sorting Algorithms in two Opposite Extreme
Malaya Dutta Borah 29 e-Waste Disposal : The Challenges for Environment
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Malaya Dutta Borah 90 Application of "Wireless Regional Area Network" in Creating Community NetworkNetwork" in Creating Community Network
Mamta Dahiya 197 Knowledge Discovery in Spatial Databases
Mamta Madan 222 Problem Solving Using Nature’s Way -Genetic AlgorithmGenetic Algorithm
Manish Dwivedi 101 Bioinformatics based Study on Zbtb7 (zinc finger and BTB domain containing 7A) Protein
Manish Dwivedi 102 An Evolutionary Analysis of Lysosomal Associated Membrane Protein-1 (LAMP-1)
Manish Dwivedi 105 Evolutionary Account of GPI Anchor Proteins : A Bioinformatics Based Approach
Manish Mahajan 32 Vulnerability Assessments
Manish Pandey 171 Recent Trends in Database and Future yDirections
Manju Shree 199 Implementation of Integrated Refractory Information System at Steel Plant
Manjunath B. 185 Data Integration and Management Solutions
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Manoj Ku. Tiwari 65 A Survey of Simulation in Sensor Network
Manoj Kumar Singhi 182 Emerging Issues and Problems of Disinvestment in Public Enterprises
Mansotra V 121 Digital Divide in Education A Concern for J&K Mansotra V. 121 Digital Divide in Education-A Concern for J&K State
Manu Pratap Singh 138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English Alphabets
Manuj Darbari 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal System Sequence Diagrams as a Formal Language
Manuj Darbari 242 An Efficient Evaluation of Requirements Engineering Maturity Measurement Framework for Medium and Small Scale Software Companies
Mashaallah Basirzadeh
275 Assessing Software Reliability Growth with Different Combinations For Distributed Basirzadeh Different Combinations For Distributed Environment Using ANN Approach
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Maya Ingle 195 Hierarchical Classification of Security in IT EnvironmentEnvironment
Maya Ingle 205 Collaborative Effect of Usability Heuristics and Characteristics
Maya Ingle 213 Inheritance and Aggregation
Meenakshi Bhat 264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary y yMetabolites
Meenakshi Sharma 202 Parallel Model Combination using Wideband Filters in Automatic Speech Recognition
Megha Mudholkar 18 e-Governance
Mir. Sadique Ali 208 Performance Evaluation of Disk Scheduling Algorithm and File Allocation Methods
Mohammad Ubaidullah Bokhari
192 e-Learning Approach for Effective ESOL Teaching
Mohammad Ubaidullah Bokhari
201 A Comparative Study of Software Requirements Tools for Secure Software Ubaidullah Bokhari Requirements Tools for Secure Software Development
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Mohammad Usaid Abbasi
28 Harmonic Content Discovery in Adhoc and Peer to Peer NetworksAbbasi Peer to Peer Networks
Mohammad Usaid Abbasi
31 Novel FPGA Based Hardware Realization of Arbitrary Functions
Mohd Ahmad 61 Performance Comparison between SQL Mohd Ahmad Mansoori
61 Performance Comparison between SQL Server 2000 and Oracle 10g
Mohd Ahmad Mansoori
60 e-Governance: Government for the People
Mohd Ahmad Mansoori
62 Application of Analytic Hierarchy Process in Environmental Performance Assessment and its Implementation using MATLAB Program
Mohd Ahmad Mansoori
162 Software Optimal Release Policy and Reliability Growth Modeling
Mohd AJmal Kafeel 71 Automation of Libraries Through ICT Mohd AJmal Kafeel Automation of Libraries Through ICT Applications, a Tool to Empower National Development
Mohd Nazir 204 Speech Recognition Tools in Local Language for Kissan Helpfor Kissan Help
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Mohd. Ajmal Kafeel 217 A Better Performed Transaction Reduction Algorithm for Mining Frequent Itemsets from Algorithm for Mining Frequent Itemsets from Large Voluminous Database
Monika Sainger 32 Vulnerability Assessments
N Venkatesan 198 Quality of Service Using Link availability and N. Venkatesan 198 Quality of Service Using Link availability and Energy Optimization in Mobile Ad-Hoc Networks
Narina Thakur 126 Performance Comparison of Class AB a a a u e o a ce Co pa so o C assOperational Amplifiers at 32nm in Technologies beyond CMOS
Narendra Kumar 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Channel Assignment Problem in Mobile Computing
Narinder Singh 266 Bluetooth based Electrical Measurement System
Nasib Singh Gill 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Nasib Singh Gill 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc NetworkDetection System in Mobile Adhoc Network
Mukesh Chand 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET
Mukta Gahlot 59 Comparison of Routing Protocols for Mobile Mukta Gahlot 59 Comparison of Routing Protocols for Mobile Ad-hoc Networks
Muqeem ahmed 263 Knowledge Based Grid : Characteristics and Strategies
N.Geethanjali 23 Detection of Routing Misbehavior in Mobile Ad Hoc Networks
Namita Singh 209 Analysis of e-Education: Developing as a P t ti l L i S t i J R i Potential Learning System in Jammu Region: India
Nand Kumar 254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh g g yUniversity, Tripoli
Narendra Kumar 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Narendra Kumar 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing
Narendra Kumar 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET
Narendra Kumar Tyagi
90 Interpretability of Data Sources - Providing Information:
Naresh Chauhan 44 Emergence of Testing Maturity Model
Naresh Kumar 225 A Qualitative Comparison of Three Change Impact Analysis Techniques for Object Oriented Systems
Nasreddin B. El Zoghbi
254 Teaching Programming Language to Engineering Students: Case Study of Al Fateh University, Tripoli
Naushad Alam 126 Performance Comparison of Class AB Operational Amplifiers at 32nm in Technologies beyond CMOS
Naveeta Adlakha 189 Reuse Metrics Implementation on Proposed Component Based Development Model
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Navendu 27 Role of IT in Modern Traffic Management
Navin Prakash 58 Analysis for the Prevention of Black Hole Attack in AODV Protocol for MANET
Neha Koria 124 Complexity Minimization in Secure Multi-p yParty Computation for Preserving Privacy during Data Mining
Nidhi Khurana 227 Extracting and Predicting Information from g gData using Datamining Tool - SPSS
Nihar Ranjan Roy 51 Kinematics Based Polygon Approximation
Nikhil K 124 C l i Mi i i i i S M l iNikhil Kapoor 124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data Mining
Ni l H 186 C t i d H R S t i Niral Hemrom 186 Computerized Human Resource System in Steel Plant
Niral Hemrom 190 Challenges of Implementing HRIS in a Public Sector Enterprisep
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Nitesh Tomar 252 Multiple Routing with Self-Healing Technique for Quality of Support(QoS) in MANETfor Quality of Support(QoS) in MANET
Noor Mohd 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computingp g
Noor Mohd 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network
Noor Mohd 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing
Noor Mohd 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANETAddress Configuration in MANET
O. P. Rishi 158 Agent Based Approach of Service Oriented Architecture for Business Modeling
O P Vyas 136 Preprocessing for Click Stream Data MiningO. P. Vyas 136 Preprocessing for Click Stream Data Mining
O. P. Vyas 253 Spin Protocol in Sensor Networks: An Overview
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
O. P. Vyas 140 Suitability of Web usage Mining for Web Content SyndicationContent Syndication
O. P. Vyas 65 A Survey of Simulation in Sensor Network
Ompal Singh 284 Modeling Software Reliability Growth in Distributed Environment Using Unified Distributed Environment Using Unified Approach
P C Saxena 3 The Object Model of the JNUOS Operating System
P.K. Kapur 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models
P K K 275 A i S ft R li bilit G th ith P K Kapur 275 Assessing Software Reliability Growth with Different Combinations For Distributed Environment Using ANN Approach
P. C. Jha 278 On The Development of Flexible Discrete pSRGM with Two Types of Imperfect Debugging
P. C. Jha 302 Optimal Component Selection For Fault Tolerance COTS Based Software System Tolerance COTS Based Software System Under Consensus Recovery Block Scheme
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
P. K. Kapur 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect SRGM with Two Types of Imperfect Debugging
P. K. Kapur 292 Distribution Based Change-Point Problem with Two Types of Imperfect Debugging in yp p gg gSoftware Reliability
P. K. Kapur 302 Optimal Component Selection For Fault Tolerance COTS Based Software System Under Consensus Recovery Block SchemeUnder Consensus Recovery Block Scheme
P. K. Kapur 284 Modeling Software Reliability Growth in Distributed Environment Using Unified Approach
P. S. Bedi 169 Jena: An Open Source Java toolkit : An Overview
P. Seetha Ramaiah 92 A Framework for Software Safety Metrics in C iti l S tCritical Systems
Pankaj K. Mudholkar
18 e-Governance
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pankaj Kumar 215 AOP with Eclipse Development Tool (AJDT)
Pankaj Kumar Sharma
163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for Wireless Communication Systems
Pankaj Lathar 138 Analysis of Soft Computing Technology to Minimize The Local Minima Problem in Pattern Recognition for Hand Written English Alphabets
Parag Parandkar 81 Biotelemetry Based Wireless Patient Monitoring System
Parag Parandkar 69 Mixed Signal Hardware Description Languages VHDL-AMS and Verilog AMS- Compared and Contrasted
Parag Parandkar 70 Adaptable Power Data Compression / Decompression Technique
Pawanesh Abrol 207 Digital Tampering Detection Techniques: A Review
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pinaki Chakraborty 3 The Object Model of the JNUOS Operating SystemSystem
Pooja Gautam 224 How Database Technology can be made Omnipresent and Universal
Pooja Pathak 267 Premium Allocation - Fuzzy Approach in Insurance Business
Pooja Raundale 17 KM-ICT or Effective Rural Development
Poonam Sachdeva 174 Smart Card Operating System: Past, Present and Future
Poorna Goyal 122 Decision Support System for Disaster Mangement
Prabhu Raj.N. 7 Comparative Study of Turbo Decoding Techniques
Pradeep Aswal 171 Recent Trends in Database and Future Directions
Pradeep Kumar Singh
118 A Survey on Steganography in AudioSingh
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pradeep Kumar Singh
119 A Survey on Text Based SteganographySingh
Pramod Dhiman 155 SQL Injection: A Threat to Database Security
Pramod Uniyal 96 E-Governance in India:A Model of Good Governance
Prashant Johri 284 Modeling Software Reliability Growth in Distributed Environment Using Unified ApproachApproach
Praveen Arora 38 Multi Level Fuzzy Association Rules for Entity Relationship Models
Preeti Arora 112 Internet Protocol Version-6 (IPV6)( )
Prema P. Nair 141 Appropriation of Social Media Tools and Emergent Communication Dynamics in Organisations
R. Kumar 266 Bluetooth based Electrical Measurement System
R. Hema 220 Network and Information Security
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
R. K. Agrawal 255 Detection of Stegoimages: A Comparative Study of ClassifiersStudy of Classifiers
R. K. Nagaria 163 An Improvement of Peak-to-Average Power Ratio (PAPR) Reduction in OFDM System Using Threshold Selected Mapping for g pp gWireless Communication Systems
R. Lalitha 48 An intelligent Overlay Search in UP2P
R Mageshwaran 185 Data Integration and Management SolutionsR. Mageshwaran 185 Data Integration and Management Solutions
R. Mageshwaran 260 Managing ERP Implementation to Deliver Value- A Project Management Perspective
Rafi U. Zaman 236 e-Banking in India Prospects and Oportunities
R.Balakrishna 23 Detection of Routing Misbehavior in Mobile d kAd Hoc Networks
Rafia Naseer 104 Gaining Value to Business Through Business Intelligence
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Rahul Rathor 179 Prevention from the Terrorist Bombs Attacks
Rajender S. Chhillar 227 Extracting and Predicting Information from Data using Datamining Tool - SPSS
Rajendra Bharti 64 A New 2-D RA Method of Representation and Rajendra Bharti 64 A New 2 D RA Method of Representation and Analysis of a DNA Sequence
Rajendra Kumbhar 247 Web Warehousing and e-Government
Rajendra Sharma 39 In-Silico tRNA Prediction and Comparative Analysis of Populus Trichocarpa
Rajeswari 117 Knowledge Portal for Rainfed Farming Rajeswari 117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in India
Rajinder Singh Chillar
54 A New Model to Perform Extraction Transformation Loading
Rajiv Chopra 265 Regression Testing of a Relational Database
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Rajni Jain 173 Variable Precision Rough Set based Decision Tree ModelTree Model
Rajni Johar 168 Technological Perspective in Education: Revolution not Evolution
Rakesh Kumar 130 Route Optimization In Mobile Adhoc Rakesh Kumar 130 Route Optimization In Mobile Adhoc Networks with Genetic Algorithms
Rakesh S Patil 239 e-Government and e-Governance : The Effective ICT Tools
Rakesh Sharma 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing
Rakesh Sharma 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network
Rakesh Sharma 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Interference Ratio for different kind of Antenna in Mobile Computing
Rakesh Sharma 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Rakesh Singh 25 Speech Enabled Intelligent Human Computer Interaction of Mobile RobotsInteraction of Mobile Robots
Ranbireshwar S. Jamwal
78 Issues & Factors Evaluation of Software Quality Models
Ranbireshwar S. Jamwal
210 Issues and Influences of e-Commerce in Developing Countries
Rashmi Desai 68 Implementing Grid Computing - Optimizing Resources to Meet Business RequirementsResources to Meet Business Requirements
Ravi Kumar 288 A New Approach For Developing Testing Effort Dependent Software Reliability Growth Models
Ravish Bahety 124 Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data Mining
Ravish Saggar 228 Delivering Health Care in Rural India Using Information Technology
Ritika Jasrotia 107 Implementing Web Voting
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ritu Aggrawal 106 More than Data Warehouse- An Insight to Customer InformationCustomer Information
Rohit Pathak 191 Optimizing HPC and Parallelization for Nanotechnology
Roshi Saxena 89 J2ME Applications to Implement Computer Graphics on Mobile Devices
Rupender Singh 33 An Analytical Model of SH-LED for Gas Sensor Instrumentation in Mid-infrared (2-5µm) Instrumentation in Mid infrared (2 5µm) Region
Rupender Singh 35 To improve the Peformance of Digital Circuits in VLSI
S. A . M. Rizvi 235 A Novel Technique to Improve the Performance of Licensed Software in Client/Server Network Environment
S A M Rizvi 240 Achieving Loose Coupling between Different S. A. M. Rizvi 240 Achieving Loose Coupling between Different Components of Model-View-Controller for Web Based Application
S. A. M. Rizvi 249 Feature Extraction of Legacy Systems through Aspect Oriented Programming
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y ZS.A.M Rizvi 263 Knowledge Based Grid : Characteristics and
StrategiesStrategies
S.A.M Rizvi 264 In-silico Analysis of Regulatory Network Associated with Biosynthesis of Secondary Metabolites
S. C. Tamane 52 Digital Image Watermarking using 2D Wavelet Transform
S. N. Sawalkar 100 Optical Technology and Networks
S. P. Tripathi 129 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal Language
S S H d 278 O Th D l t f Fl ibl Di t S. S. Handa 278 On The Development of Flexible Discrete SRGM with Two Types of Imperfect Debugging
S. Shrivastava 136 Preprocessing for Click Stream Data Miningp g g
S.K Mutto 67 Image Based Steganography Methods with High Payload
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
S.K Mutto 75 Principle of Graph Theoretic Approach to Digital SteganographyDigital Steganography
S.K. Pandey 155 SQL Injection: A Threat to Database Security
Saba Hilai 49 The Robot and Human Emotional Interface -Towards Automatic Techniques of Emotional qAssessment
Saba Hilal 84 Personalization Issues in Pervasive Applications
Saba Hilal 114 Rehabilitation Robotics - Innovations in Tertiary Prevention of Stroke Patients
Saba Hilal 203 Teenage Security Considerations in Pervasive E i tEnvironment
Sachin Gupta 150 Privacy Issues in Wireless Sensor Networks
Salil Khare 202 Parallel Model Combination using Wideband Filters in Automatic Speech RecognitionFilters in Automatic Speech Recognition
Salma Kuraishy 192 e-Learning Approach for Effective ESOL Teaching
Sambyal G S 121 Digital Divide in Education-A Concern for J&K Sambyal G.S. 121 Digital Divide in Education-A Concern for J&K State
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Sameena Mukjija 166 Mainstreaming ICT for Water Availability and Requirements Analysis (WARA) at Village Requirements Analysis (WARA) at Village Level – A Perspective and Prospective of
Sameer Anand 292 Distribution Based Change-Point Problem with Two Types of Imperfect Debugging in yp p gg gSoftware Reliability
Samiksha Shukla 259 Reducing Network Traffic in Secure Multi-Party Computation
Sanjay Agnihotri 117 Knowledge Portal for Rainfed Farming Systems and Watershed Development: A Step Towards Maintaining Agricultural Output and Food Production in India
Sanjay Jamwal 97 A Survey of QoS in Mobile Ad-Hoc Networks
Sanjay Jamwal 103 ICT as an Stimulus for Development in Developing Countries
Sanjay Jamwal 56 A Study of ICT in the Area of Agriculture and Rural Development in J&K State
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Sanjay Kr.Dubey 127 Issues in Usability Measurement for Object-Oriented SystemOriented System
Sanjay Kumar 186 Computerized Human Resource System in Steel Plant
Sanjay Kumar 190 Challenges of Implementing HRIS in a Public Sector Enterprise
Sanjay Singh 179 Prevention from the Terrorist Bombs AttacksSanjay Singh Senger
179 Prevention from the Terrorist Bombs Attacks
Sanjeev Kumar 236 e-Banking in India Prospects and Oportunities
Sanjeev Kumar 267 Premium Allocation - Fuzzy Approach in Insurance Business
Sanjeev Sharma 181 An Approach to Very low bit rate Speech CodingCoding
Santosh Kumar Yadav
231 Perspectives of Symmetric Cryptography
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Sardar Singh 182 Emerging Issues and Problems of Disinvestment in Public EnterpriseDisinvestment in Public Enterprise
Sarika Sahu 135 Homology Modeling of Semaphorins 3A Protein
Sarita Kaushik 84 Personalization Issues in Pervasive Sarita Kaushik 84 Personalization Issues in Pervasive Applications
Satyadhar Joshi 191 Optimizing HPC and Parallelization for Nanotechnology
Satyendra Nath Mandal
232 A New Method of Cryptography for English Literature with Reconstructing Characters Bit Pattern (RCBP)
S D 160 A t d A li ti d T h i d Seema D. 160 A study on Applications and Techniques used in Web Usage Mining
Seema Rani 46 Development of Knowledge Engineering Based Model of Ins ance SectoBased Model of Insurance Sector
Seema Rani 87 Geospatial Application on Web Service Oriented Architecture
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Selvi S 199 Implementation of Integrated Refractory Information System at Steel PlantInformation System at Steel Plant
Shabbir Ahmed 28 Harmonic Content Discovery in Adhoc and Peer to Peer Networks
Shabbir Ahmed 31 Novel FPGA Based Hardware Realization of Shabbir Ahmed 31 Novel FPGA Based Hardware Realization of Arbitrary Functions
Shahnawaz Husain 60 A Fair Allocation Heuristic Approach For Fixed Channel Assignment Problem in Mobile Computing
Shahnawaz Husain 61 A Proposed RSM Approach for Intrusion Detection System in Mobile Adhoc Network
Shahnawaz Husain 62 Simulation and Comparison of Cochannel Interference Ratio for different kind of Antenna in Mobile Computing
Shahnawaz Husain 162 A RMS Based Hierarchical Approach for IP Shahnawaz Husain 162 A RMS Based Hierarchical Approach for IP Address Configuration in MANET
Shaily Malik 50 Security in Mobile Adhoc Networks
Shakuntala 149 Mobile ComputingShakuntala Choudhary
149 Mobile Computing
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shalini jain 12 Fuzzy Logic Based Routing Strategies in VANETsVANETs
Shalini jain 219 Goldplating Software: Another Step to Customer Gratitude
Shalini Singh 269 Next Generation Cloud Computing TechnologyShalini Singh 269 Next Generation Cloud Computing Technology
Shalini Vermani 190 Efficient Certificate Revocation Lists In Public Key Infrastructure
Sh T b 201 A C ti St d f S ft Shams Tabrez 201 A Comparative Study of Software Requirements Tools for Secure Software Development
Shifaly Sharma 139 Delay Testable Enhanced Scan Flipflopy y p p
Shikha Nirmal 251 Content Based Image Retrieval Techniques
Shivani Vaid 302 Optimal Component Selection For Fault T l COTS B d S ft S t Tolerance COTS Based Software System Under Consensus Recovery Block Scheme
Shivani Verma 206 IT and Consumer Rights:Safeguarding Consumer Rights in the Emerging Internet Consumer Rights in the Emerging Internet World
AuthorsA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shivendra Goel 94 Growing Need for KPO in India
Shalini jain 219 Goldplating Software: Another Step to Customer Gratitude
ShreejiThankappan 11 Trust Management in Adhoc Networks
Shubha mishra 131 Fingerprint Verification ATM Interface System Sequence Diagrams as a Formal Language
Shubhra Gautam 224 How Database Technology can be made Shubhra Gautam Sharma
224 How Database Technology can be made Omnipresent and Universal?
Shubhra Saggar 228 Delivering Health Care in Rural India Using Information Technology
Shweta 63 Game Theory: Modeling and Analyzing Conflicting Security Applications by Embedding Rationality
Shweta Taneja 12 Fuzzy Logic Based Routing Strategies in