SlideShare a Scribd company logo
CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
Sl.
No
1

Code

2

CS39_DL

3

CS85_DL

4

CS30_SM

5

CS5_RJ

6

CS86_RJ

7

CS13_DL

8

CS14_DL

9

CS16_DL

10

CS17_MH

11

CS19_DL

12

CS20_DL

13

CS21_RJ

14

CS23_RJ

15

CS24_RJ

CS42_DL

Venue-2-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Title
Authors and Affiliation
Cryptographic Primitives for
Multimedia Security
Design of Practical Homomorphic
Schemes
Reconnaissance: an offensive defensive
approach
Effect of Beacons Deployment and
Beacons Radio Range on HiRLoc and
RAL Schemes in Wireless Sensor
Networ
Research Of Load Testing And Result
Application Based on Load Runner

Sakshi Dhall, DTU, Delhi, Saibal K. Pal, DRDO, Delhi, Bhavya Bhatia IGIT, DelhiNitin Jain, DTU, delhi, Saibal K. Pal DRDO, Metcalfe House, Delhi
Amandeep kaur ,Amenable.aman@gmail.com
AIACT&R, Guru Gobind Singh Indraprastha University, Delhi
Ranjit Panigrahi and M.K. Ghose, CSE, SMIT, Sikkim
Email: ranjit.panigrahi@gmail.com, mkghose@smu.edu.in

Dr. Manju Kaushik, Associate Professor (Computer Science and Engineering)
JECRC University, Jaipur, India, Email: manju.kaushik@jecrc.edu.in
Pratibha Fageria, M.Tech (Computer science), JECRC University, Jaipur, India
Email: fageria1405@gmail.com
Bhupendra Sharma?,Sukriti Garg?,Chirag Jainyl,The LNM Institute of Information and
Technology,Malviya
National
Institute
of
Technology,
Jaipur,India.,
Email:
bhupendra.sharma@lnmiit.ac.in

An Approximation of ASER for Square
QAM in
Rayleigh Fading Channel for Dual Hop
Relay Link
Bitcoin & Analysis of its Cryptographic
Saibal K. Pal, DRDO, Delhi
Primitives
Nishu Choudhary, Bansthali University
Venue-4-Date-7th March, 14-Time-2.30 PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Design & Implementation of ECC using
Sanjay Kumar1, S.K. Pal2, Ajay Kumar3, SAG, DRDO, Delhi1,2
Koblitz & ElGamal Method
RAC, DRDO, Delhi3
skparsade@gmail.com1, skptech@yahoo.com2, ak_manaw@redffimail.com3
Optimal Pairing & Design of Pairing
Saibal K. Pal, DRDO, Delhi
Friendly Curves
Rajeev Kumar, Arvind University of Delhi
Design of Secure Passports – Physical,
Amit Tandon, Symbiosis Institute of Technology, Pune
Electronic & Mobile
Saibal K. Pal, DRDO, Metcalfe House, Delhi
Design of a Framework for PKI using
Saibal K. Pal, DRDO, Delhi
Elliptic Curve Cryptography
Nishu Choudhary, Bansthali University
Cryptographic Schemes based on
Sanjay Kumar, Saibal K. Pal, DRDO, Metcalfe House, Delhi,
Elliptic Curves over Integer Rings
Sanjay Kumar Kalindi College, Delhi University, Delhi
SOFTWARE REUSABILITY
Dr. Manju Kaushik and Sonali Jain, CSE
METRICS FRAMEWORK FOR
JECRC University, Jaipur, India
COMPONENT-BASED
SOFTWARE DEVELOPMENT
Possible Threats in VOIP and
Dr. Manju Kaushik Associate Professor (Computer Science & Engineering) JECRC University,
Enhancement of Network Security
Yogesh Bhardwaj M.Tech. (Computer Science) JECRC University, Jaipur, India
A Survey on Web Cache Techniques
Dr. Manju Kaushik , Pramod Saxena and Suyash Raizada, JECRC
used for Web Performance Tuning

Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.

Remarks
CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
16

CS26_UP

17

CS3_UP

18

CS32_RJ

19

CS36_DL

20

CS40_DL

21

CS46_RJ

22

CS50_RJ

23

CS52_RJ

24

CS54_HP

24

CS56_UP

25

CS58_RJ

26

CS6_RJ

27

CS60_TRI

28

CS61_JK

Venue-4-Date-7th March, 14-Time-4.00 PM to 5.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Software Process Models: A
Mr. Vikash Atri, Mr. Ajay Singh, Mr. Subodh Kumar and Mr. Pankaj Varshney, Manglaytan
Comparative Study
University, Aligarh, vkatri777@gmail.com , ajaysingh853@gmail.com
A Framework for Service Categorization
and Requirement Gathering along with
Discovery and Negotiation Threads of
new Services in Service Oriented
Architecture (SOA)
WEB APPLICATION TESTING
USING PENETRATION TESTING
Image Encryption using
3D Chaotic Maps
Biometric based Security Solutions
for Mobile Devices
A COMPARATIVE STUDY OF WEB
SERVICE TESTING TOOLS FOR
FUNCTIONAL REQUIREMENTS
ANDROID AND PATTERN
ANALYSIS

Ashutosh Shukla NIKHIL SHUKLA
Computer Application Department
College of Management Studies, Unnao
DR.VIRENDRA SWARUP GROUP OF
INSTITUTIONS, UNNAO. , 7505426186
Mr. Ajay Kumar#1, Miss. Urmi Chhajed, #Computer Science, JECRC University Jaipur, E-mail
ajay.kumar@jecrcu.edu.in, chhajed.urmi@gmail.com
Bhavya Bhatia, IGIT, delhi, Saibal Pal, DRDO and Sakshi Dhall, DTU, Delhi
Aditi Bhateja, AIT, GGSIP University, Delhi, Saibal K. Pal, A.K. Bhateja DRDO, Metcalfe House,
Delhi
Dr. Manju Kaushik , Garima Singh , JECRC University, Jaipur

Ankit Gangwal [1], Megha Gupta [2] Assistant Professor, Assistant Professor
Dr. Radhakrishnan Institute of Technology, Jaipur, India

Venue-4-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
The Y2K38 Bug
Twinkle Mishra MCA (2014) Banasthali University, Jaipur Campus, Jaipur, India
twinklemishra679@gmail.com
An Efficient Round robin
Mohit Sharma1, Suman Saha2Dept. of CSE, JUIT, Waknaghat, Solan, H.P., INDIA
Minimum Spanning Tree
mailtomskaushik@gmail.com1 , saha.suman@gmail.com2
Algorithm in MapReduce
Framework
Impact of Network Size and Traffic to
Shubham#1, Lalit Sagar#2, Vinay Rishiwal#3 Ideal Institute of technology, Ghaziabad, UP, India.
1
Adhoc Routing Protocols over Different
shubhamr71421@gmail.com, 2lksagar@rediff.com
#3
IDM Models in VANETs
MJP Rohilkhand University, Bareilly, India. 3vinayrishiwal@rediffmail.com
Best image selection for data encryption
Nidhi Garg1,,Rahul Gupta2 JNU(CS),Jaipur, Rajasthan, India
based on the image’s capacity to hide
MIT(IT),Manipal,Karnataka,India, nidhigargjaipur@gmail.com, rahul.gupta.engg@gmail.com
data
Real time smart and robust skin color
Jankey Bhallabh Soni Manipal University Jaipur jankeybhallabhsoni@muj.manipal.edu
detection using openCV
Profile Based Access Control Model in
Suyel Namasudra1, Samir Nath2, Abhishek Majumder3
Cloud
Department of Computer Science & Engineering
Computing Environment
Tripura University (A Central University) Suryamaninagar, Tripura West, India
1suyelnamasudra@gmail.com, 2pranrd2010@gmail.com, 3enggtu@gmail.com
Author Name Disambiguation Using
Tasleem Arif1, M. Asger2, Rashid Ali3 1Department of Information Technology
Two Stage Clustering
BGSB University Rajouri-J&K tasleem.ap@gmail.com
2
School of Mathematical Sciences & Engineering BGSB University Rajouri-J&K

Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
29

CS63_TN

SMART TOOTHY

m_asger@yahoo.com 3College of Computers & Information Technology
Taif University-Saudi Arabia rashidaliamu@rediffmail.com
B.S.Sanjeev kumar1 , K.S.M.Praveen2 , G.Komarasamy3
1,2,3Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam, India

1bssanjeevcse94@gmail.com , 2praveenravi208@gmail.com,
3komarasamyg@bitsathy.ac.in
30

CS65_RJ

SQL Injection Attacks on Web
Applications

CS66_MH

32

CS68_PN

33

CS69_HR

34

CS7_RJ

Challenge and Seurity issues of Cloud
computing in Technical Education

35

CS71_UK

Particle Swarm Optimization Technique
for Discrete Tomography

36

CS72_UP

Impact of Mobility Models on
MANETs Routing Protocols

37

CS73_DL

Efficient and Secured Video Encryption
Scheme for Lightweight Devices

CS77_MH

39

CS78_RJ

1Chandershekhar.sharma@gmail.com
2vinodkrmenaria@gmail.com Dr S.C. Jain Professor in Computer Engineering Department
Technical University Kota, India

Rajasthan Technical University Kota, India 2Scjain1@yahoo.com
DATA SECURITY AND PRIVACY IN Trupti Shah, Prof. M.D. Ingle Dept. of Computer Engineering, JSCOE
WIRELESS BODY AREA
Pune University Pune, Maharashtra, India
NETWORKS
trups13@gmail.com ingle.madhav@gmail.com
Venue-4-Date-8th March, 14-Time-2.30- PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Artificial Neural Networks – A Boon for Gagandeep Jagdev#1,Tejinder Singh#2,Sukhpreet Singh#3
Medical Science and Character
#1 Dept. of Computer Science, Punjabi University Guru Kashi College, Damdama Sahib (PB), India.
Recognition
#2#3Students (M.C.A.), Guru Kashi University, Damdama Sahib (PB), India.
#1gagans137@yahoo.co.in, #2tejindersidhu008@gmail.com, #3sukhis005@gmail.com
Noise Robustness Investigation of
Mamta#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology
Feature Extraction Techniques
Kurukshetra, Indi 1er.mamta.dabra@gmail.com, 2rka15969@gmail.com

31

38

Chandershekhar Sharma#1 Dr S.C. Jain*2 Vinod Kumar Menaria#3 #Research scholar, Rajasthan

Nilam Coudhary[1], Prof.(Dr.)Baldev Singh[2], Tarannum Sheikh[3]
Research Scholar, CSE, SGVU, Jaipur, Rajasthan, India[1] Professor, CSE,VIT, Jaipur, Associate
Professor, CSE, VIT, Jaipur, Rajasthan, India[3]
Narender Kumar, Roopa Kumari2 Department of Computer Sc. Engg, HNB Garhwal
University,Srinagar Uttrakhand, India narenrawal@gmail.com
, narenrawal@gmail.com
Subodh Kumar#1, G.S. Agrawal#, Sudhir Kumar Sharma*2
#
Institute of Computer Applications, Mangalayatan University, Beswan, Aligarh-U.P. (India)
1
Subodh.sharma@mangalayatan.edu.in *IET, Jaipur National University, Jaipur-Raj. (India)
2
sudhir.732000@gmail.com

Rajan Gupta*, Neeharika Chaudhary*, Anika Garg*, Saibal K. Pal*, *Department
of Computer Science, University of Delhi, Delhi - 110007, INDIA **Scientific
Analysis Group Lab, DRDO, Metcalfe House, Delhi - 110054, INDIA Email:
guptarajan2000@gmail.com, neear13@gmail.com

Venue-4-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
A Framework for Design &
Amit Tandon1, Saibal K. Pal21Department of Computer Engineering, Symbiosis International
Management of Secure Societies
UniversitySymbiosis Institute of Technology, Pune, Maharashtra, India,2Scientific Analysis Group,
DRDOMetcalfe House, Delhi, India1amittandon94@gmail.com, 2skptech@yahoo.com
Cloud computing: future pillar for eShivangi Singh, Rishank Singh
governance
School. Of computer Science, Jaipur National University, SADTM Jagatpura, Jaipur-302017, Rajasthan,
India School of Computer Science, Swami Keshvanand institute of technology, management and

Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details
40

CS79_RJ

41

CS80_AP

42

CS81_GJ

43

CS82_PN

44

CS83_RJ

45

CS84_RJ

46

CS87_DL

47

CS88_RJ

48

CS89_HR

49

CS34_RJ

50

CS11_UP

51

CS45_RJ

Numeral Recognition of Four
Scripts: Bengali-Assamese, Gujarati,
Oriya, Nepali
Soft Computing Techniques for Privacy
Preserving Data Mining

IMPROVEMENTS IN AGILE MODEL
USING
HYBRID THEORY FOR SOFTWARE
DEVLOPMENT
IN
SOFTWARE
ENGINEERING
Cryptosystem Identification and Key
Clustering using Artificial Neural
Networks

gramothan, SKIT Ramnagaria, Jaipur-302017, Rajasthan, India, smilingshivangi11@gmail.com
Rishank19@rediffmail.com
1Manubolu Sreenivasulu,2Prasenjit Kumar Das,3Mr. Rishi Mathur, Dept. Of Computer Science &
Engineering,Manipal University Jaipur,Jaipur.manubolusreenivasulu@muj.manipal.edu
2prasenjitkumardas@muj.manipal.edu ,rishimathur@jaipur.manipal.edu
Sridhar Mandapati #1, Raveendra Babu Bhogapathi#2
#1Associate Professor, Department of Computer Applications, R.V.R & J.C College of Engineering,
Guntur, India. mandapati_s@yahoo.com
#2Professor, Department of Computer Science & Engineering, VNR VJIET, Hyderabad, India.
rbhogapathi@yahoo.com
Ratnmala Raval, Haresh M Rathod, Computer Department, RK University
Kasturbadham-Rajkot-Gujrarat- India Ratnmala.Raval@gmail.com Haresh.Rathod@rku.ac.in

AK Bhateja Member of IEEE,Defence Research & Development Organization
Delhi, India, akbhateja@gmail.com Ankita Gupta Department of Electronics and Communication
Thapar UniversitPunjab, Indi, oshu.gupta@gmail.com, Sonali Jain Department of Computer Scienc,
MaharshiDayanand University Rohtak, Indi, sonalijain104@gmail.com
Venue-5-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair:
Energy Efficient Information Collection Sandeep Swami1, Jitendra Singh Yadav2,M. Tech, Department CSE, JECRC University, Jaipur, India
in Wireless Sensor Networks Using ,Assistant Professor, Department CSE, JECRC University, Jaipur, India 2
Adaptive Compressive Sensing Energy sswami2@gmail.com1, jitendra.yadav@jecrcu.edu.in2
Efficiency Scheduling for WSN
A Review on Security Challenges in Aiman Rais1, Pratima Sharma2, Neetu Thomas3,1, 2, 3 Department of Electronics and Communication
Cloud Computing
Engineering,, Jaipur National University, Jaipur, India
Corresponding Author E-mail Id- aimanrais@gmail.com
A Proposed Framework for Enhancing Himanshu Chaudhary1, Aditi Bhateja2 and Javed Ahmed Khan3
Security of SHA-2
AIACT&R, Guru Gobind Singh Indraprastha University, Delhi, India, lavi10000@gmail.com
aditibhateja89@gmail.com, javedahmad1989@gmail.com
An
Intensified
Steganographic Manoj Kumar Sharma #1, Abhishek Gaurav#2
Algorithm for Cover Images Using GI #1 Ph.D. Scholar, Jaipur National University, Rajasthan, India
Algorithmic Approach
#2 B. Tech. CS (3rd year), Jaipur National University, Rajasthan, India
1manoj186@yahoo.co.in, abhishekgaurav.sci@gmail.com
Comparative Study of
Acoustic Rajan Mehla#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology
Modeling Techniques
Kurukshetra, India, rajanmehla@gmail.com, rka15969@gmail.com
Efficient Schema Generator algorithm
Dr. Surender Kumar Yadav and Mr. Rahul Kumar Shrivastava
using Data mining techniques.
JECRC University
Impact of I.T. Innovation in retail sector Mr. Jitendra Singh Lecturer, IBM, Mangalayatan University, Beswan-Aligarh
Seema Gupta Asst. Prof., Mgmt. Deptt., Anand Engineering College, Agra.
Dr. Manju Kaushik, Aditi Jain and Nitesh Dugar, JECRC
CHALLENGES TO BIG DATA
SECURITY AND PRIVACY

Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.

More Related Content

What's hot

Perumal m.e(cse) resume
Perumal   m.e(cse) resumePerumal   m.e(cse) resume
Perumal m.e(cse) resume
Jagadesh Jaga
 
Top research articles in 2020 in the area of Computer Science & Engineering
Top research articles in 2020 in the area of Computer Science &  EngineeringTop research articles in 2020 in the area of Computer Science &  Engineering
Top research articles in 2020 in the area of Computer Science & Engineering
gerogepatton
 
TOP Most Read Articles in Informatics Engineering
TOP Most Read  Articles in Informatics  EngineeringTOP Most Read  Articles in Informatics  Engineering
TOP Most Read Articles in Informatics Engineering
ieijjournal
 
Ankan dutta resume
Ankan dutta resumeAnkan dutta resume
Ankan dutta resume
Ankan Dutta
 
Dr. Ajay Kumar Singh
Dr. Ajay Kumar SinghDr. Ajay Kumar Singh
Dr. Ajay Kumar Singh
Dr. Ajay Kumar Singh
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
aciijournal
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET Journal
 
R.Vinoth Curriculum vitae
R.Vinoth Curriculum vitaeR.Vinoth Curriculum vitae
R.Vinoth Curriculum vitae
vinoth rathinam
 
P1151345302
P1151345302P1151345302
P1151345302
Ashraf Aboshosha
 
P1151351311
P1151351311P1151351311
P1151351311
Ashraf Aboshosha
 
P1151442348
P1151442348P1151442348
P1151442348
Ashraf Aboshosha
 
IRJET- Image to Text Conversion using Tesseract
IRJET-  	  Image to Text Conversion using TesseractIRJET-  	  Image to Text Conversion using Tesseract
IRJET- Image to Text Conversion using Tesseract
IRJET Journal
 
Brv vardhan 2013
Brv vardhan 2013Brv vardhan 2013
Brv vardhan 2013Anup Pravin
 
International Journal of Computer Science and Security Volume (1) Issue (2)
International Journal of Computer Science and Security Volume (1) Issue (2)International Journal of Computer Science and Security Volume (1) Issue (2)
International Journal of Computer Science and Security Volume (1) Issue (2)CSCJournals
 

What's hot (17)

Perumal m.e(cse) resume
Perumal   m.e(cse) resumePerumal   m.e(cse) resume
Perumal m.e(cse) resume
 
Top research articles in 2020 in the area of Computer Science & Engineering
Top research articles in 2020 in the area of Computer Science &  EngineeringTop research articles in 2020 in the area of Computer Science &  Engineering
Top research articles in 2020 in the area of Computer Science & Engineering
 
TOP Most Read Articles in Informatics Engineering
TOP Most Read  Articles in Informatics  EngineeringTOP Most Read  Articles in Informatics  Engineering
TOP Most Read Articles in Informatics Engineering
 
Bhavin_Shah_1.5
Bhavin_Shah_1.5Bhavin_Shah_1.5
Bhavin_Shah_1.5
 
Ankan dutta resume
Ankan dutta resumeAnkan dutta resume
Ankan dutta resume
 
Dr. Ajay Kumar Singh
Dr. Ajay Kumar SinghDr. Ajay Kumar Singh
Dr. Ajay Kumar Singh
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
R.Vinoth Curriculum vitae
R.Vinoth Curriculum vitaeR.Vinoth Curriculum vitae
R.Vinoth Curriculum vitae
 
P1151345302
P1151345302P1151345302
P1151345302
 
P1151351311
P1151351311P1151351311
P1151351311
 
P1151442348
P1151442348P1151442348
P1151442348
 
java fresher
java fresherjava fresher
java fresher
 
IRJET- Image to Text Conversion using Tesseract
IRJET-  	  Image to Text Conversion using TesseractIRJET-  	  Image to Text Conversion using Tesseract
IRJET- Image to Text Conversion using Tesseract
 
vijay
vijayvijay
vijay
 
Brv vardhan 2013
Brv vardhan 2013Brv vardhan 2013
Brv vardhan 2013
 
International Journal of Computer Science and Security Volume (1) Issue (2)
International Journal of Computer Science and Security Volume (1) Issue (2)International Journal of Computer Science and Security Volume (1) Issue (2)
International Journal of Computer Science and Security Volume (1) Issue (2)
 

Viewers also liked

Unlocking Human Potential with Immersive Technology
Unlocking Human Potential with Immersive TechnologyUnlocking Human Potential with Immersive Technology
Unlocking Human Potential with Immersive Technology
WithTheBest
 
B.Tech Seminar schedule dates 8 EC B2 2016
B.Tech Seminar schedule dates 8 EC B2 2016B.Tech Seminar schedule dates 8 EC B2 2016
B.Tech Seminar schedule dates 8 EC B2 2016
Kalyan Acharjya
 
Ovonic unified memory(oum)
Ovonic unified memory(oum)Ovonic unified memory(oum)
Ovonic unified memory(oum)
Rrs Sheeba
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
Hypothesis Testing
Hypothesis TestingHypothesis Testing
Hypothesis Testing
Kalyan Acharjya
 
A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
sanjay kushwaha
 
Seminar on electronic paper
Seminar on electronic paperSeminar on electronic paper
Seminar on electronic paper
mm8560864624
 
Ovonic Unified Memory(Ppt)
Ovonic Unified Memory(Ppt)Ovonic Unified Memory(Ppt)
Ovonic Unified Memory(Ppt)
pratik201289
 
Connector losses Optical Fiber Cable
Connector losses Optical Fiber CableConnector losses Optical Fiber Cable
Connector losses Optical Fiber Cable
Kalyan Acharjya
 
Fiber End Preparations & Splicing
Fiber End Preparations & SplicingFiber End Preparations & Splicing
Fiber End Preparations & Splicing
Kalyan Acharjya
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
Jitendra Sirohiya
 
Keeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of TechnologyKeeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of Technology
coffeyac
 
Introduction to nanophotonics
Introduction to nanophotonicsIntroduction to nanophotonics
Introduction to nanophotonics
ajayrampelli
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Introduction to metamaterials
Introduction to metamaterialsIntroduction to metamaterials
Introduction to metamaterials
Jagadish M
 
86713068 wibree (1)
86713068 wibree (1)86713068 wibree (1)
86713068 wibree (1)
bhatisudesh
 
Fiber fabrication
Fiber fabricationFiber fabrication
Fiber fabrication
Kalyan Acharjya
 
Photodetector (Photodiode)
Photodetector (Photodiode)Photodetector (Photodiode)
Photodetector (Photodiode)
Kalyan Acharjya
 

Viewers also liked (20)

Unlocking Human Potential with Immersive Technology
Unlocking Human Potential with Immersive TechnologyUnlocking Human Potential with Immersive Technology
Unlocking Human Potential with Immersive Technology
 
Ee
EeEe
Ee
 
B.Tech Seminar schedule dates 8 EC B2 2016
B.Tech Seminar schedule dates 8 EC B2 2016B.Tech Seminar schedule dates 8 EC B2 2016
B.Tech Seminar schedule dates 8 EC B2 2016
 
Detail
DetailDetail
Detail
 
Ovonic unified memory(oum)
Ovonic unified memory(oum)Ovonic unified memory(oum)
Ovonic unified memory(oum)
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Hypothesis Testing
Hypothesis TestingHypothesis Testing
Hypothesis Testing
 
A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
 
Seminar on electronic paper
Seminar on electronic paperSeminar on electronic paper
Seminar on electronic paper
 
Ovonic Unified Memory(Ppt)
Ovonic Unified Memory(Ppt)Ovonic Unified Memory(Ppt)
Ovonic Unified Memory(Ppt)
 
Connector losses Optical Fiber Cable
Connector losses Optical Fiber CableConnector losses Optical Fiber Cable
Connector losses Optical Fiber Cable
 
Fiber End Preparations & Splicing
Fiber End Preparations & SplicingFiber End Preparations & Splicing
Fiber End Preparations & Splicing
 
Omega electronics ppt
Omega electronics  pptOmega electronics  ppt
Omega electronics ppt
 
Keeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of TechnologyKeeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of Technology
 
Introduction to nanophotonics
Introduction to nanophotonicsIntroduction to nanophotonics
Introduction to nanophotonics
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Introduction to metamaterials
Introduction to metamaterialsIntroduction to metamaterials
Introduction to metamaterials
 
86713068 wibree (1)
86713068 wibree (1)86713068 wibree (1)
86713068 wibree (1)
 
Fiber fabrication
Fiber fabricationFiber fabrication
Fiber fabrication
 
Photodetector (Photodiode)
Photodetector (Photodiode)Photodetector (Photodiode)
Photodetector (Photodiode)
 

Similar to CHBTAS

International journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and TechnologyInternational journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and Technologypriyanka singh
 
Ramprakash Resume
Ramprakash ResumeRamprakash Resume
Ramprakash Resume
Ram Prakash
 
Sagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar Lachure
 
RESUME Karthik
RESUME KarthikRESUME Karthik
RESUME KarthikKarthik P
 
PERUMAL K resume3
PERUMAL K resume3PERUMAL K resume3
PERUMAL K resume3perumal ks
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
Pradeep resume_
Pradeep  resume_Pradeep  resume_
Pradeep resume_
psk0212
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
sipij
 
RESUME_SHREYAS_CHAROLA
RESUME_SHREYAS_CHAROLARESUME_SHREYAS_CHAROLA
RESUME_SHREYAS_CHAROLAShreyas Patel
 
Raviteja cv
Raviteja cvRaviteja cv
Raviteja cv
Raviteja Gera
 
Dr. Parkavi.A , Resume working-2020-v4
Dr. Parkavi.A , Resume working-2020-v4Dr. Parkavi.A , Resume working-2020-v4
Dr. Parkavi.A , Resume working-2020-v4
Parkavi A
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
sipij
 
E Book - ETEMAS 2023.pdf
E Book - ETEMAS 2023.pdfE Book - ETEMAS 2023.pdf
E Book - ETEMAS 2023.pdf
Jayadatta S
 

Similar to CHBTAS (20)

International journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and TechnologyInternational journal of latest Trends in Engineering and Technology
International journal of latest Trends in Engineering and Technology
 
Profile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore MishraProfile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore Mishra
 
Ramprakash Resume
Ramprakash ResumeRamprakash Resume
Ramprakash Resume
 
Sagar_Lachure_resume-new
Sagar_Lachure_resume-newSagar_Lachure_resume-new
Sagar_Lachure_resume-new
 
RESUME Karthik
RESUME KarthikRESUME Karthik
RESUME Karthik
 
DOC
DOCDOC
DOC
 
sss_CV_2014
sss_CV_2014sss_CV_2014
sss_CV_2014
 
PERUMAL K resume3
PERUMAL K resume3PERUMAL K resume3
PERUMAL K resume3
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
Resume
ResumeResume
Resume
 
Dr. B.M.Patil
Dr. B.M.PatilDr. B.M.Patil
Dr. B.M.Patil
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
Pradeep resume_
Pradeep  resume_Pradeep  resume_
Pradeep resume_
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
RESUME_SHREYAS_CHAROLA
RESUME_SHREYAS_CHAROLARESUME_SHREYAS_CHAROLA
RESUME_SHREYAS_CHAROLA
 
Raviteja cv
Raviteja cvRaviteja cv
Raviteja cv
 
Pramod2016 Mumbai
Pramod2016 MumbaiPramod2016 Mumbai
Pramod2016 Mumbai
 
Dr. Parkavi.A , Resume working-2020-v4
Dr. Parkavi.A , Resume working-2020-v4Dr. Parkavi.A , Resume working-2020-v4
Dr. Parkavi.A , Resume working-2020-v4
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
E Book - ETEMAS 2023.pdf
E Book - ETEMAS 2023.pdfE Book - ETEMAS 2023.pdf
E Book - ETEMAS 2023.pdf
 

More from Kalyan Acharjya

Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
Kalyan Acharjya
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
Kalyan Acharjya
 
Image Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):BasicsImage Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):Basics
Kalyan Acharjya
 
Image Restoration (Order Statistics Filters)
Image Restoration (Order Statistics Filters)Image Restoration (Order Statistics Filters)
Image Restoration (Order Statistics Filters)
Kalyan Acharjya
 
Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)
Kalyan Acharjya
 
Histogram Specification or Matching Problem
Histogram Specification or Matching ProblemHistogram Specification or Matching Problem
Histogram Specification or Matching Problem
Kalyan Acharjya
 
Histogram Equalization
Histogram EqualizationHistogram Equalization
Histogram Equalization
Kalyan Acharjya
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
Kalyan Acharjya
 
Fundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image ComponentsFundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image Components
Kalyan Acharjya
 
Introduction to Image Processing:Image Modalities
Introduction to Image Processing:Image ModalitiesIntroduction to Image Processing:Image Modalities
Introduction to Image Processing:Image Modalities
Kalyan Acharjya
 
Electron Microscopy (SEM & TEM)
Electron Microscopy (SEM & TEM)Electron Microscopy (SEM & TEM)
Electron Microscopy (SEM & TEM)
Kalyan Acharjya
 
Stick Diagram
Stick DiagramStick Diagram
Stick Diagram
Kalyan Acharjya
 
Introduction to VLSI Design
Introduction to VLSI DesignIntroduction to VLSI Design
Introduction to VLSI Design
Kalyan Acharjya
 
Guidlines for ppt Design
Guidlines for ppt DesignGuidlines for ppt Design
Guidlines for ppt Design
Kalyan Acharjya
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication Networks
Kalyan Acharjya
 
Research Methodology and Research Design
Research Methodology and Research DesignResearch Methodology and Research Design
Research Methodology and Research Design
Kalyan Acharjya
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
Kalyan Acharjya
 
digital image processing, image processing
digital image processing, image processingdigital image processing, image processing
digital image processing, image processing
Kalyan Acharjya
 

More from Kalyan Acharjya (18)

Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
 
Image Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):BasicsImage Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):Basics
 
Image Restoration (Order Statistics Filters)
Image Restoration (Order Statistics Filters)Image Restoration (Order Statistics Filters)
Image Restoration (Order Statistics Filters)
 
Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)
 
Histogram Specification or Matching Problem
Histogram Specification or Matching ProblemHistogram Specification or Matching Problem
Histogram Specification or Matching Problem
 
Histogram Equalization
Histogram EqualizationHistogram Equalization
Histogram Equalization
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
Fundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image ComponentsFundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image Components
 
Introduction to Image Processing:Image Modalities
Introduction to Image Processing:Image ModalitiesIntroduction to Image Processing:Image Modalities
Introduction to Image Processing:Image Modalities
 
Electron Microscopy (SEM & TEM)
Electron Microscopy (SEM & TEM)Electron Microscopy (SEM & TEM)
Electron Microscopy (SEM & TEM)
 
Stick Diagram
Stick DiagramStick Diagram
Stick Diagram
 
Introduction to VLSI Design
Introduction to VLSI DesignIntroduction to VLSI Design
Introduction to VLSI Design
 
Guidlines for ppt Design
Guidlines for ppt DesignGuidlines for ppt Design
Guidlines for ppt Design
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication Networks
 
Research Methodology and Research Design
Research Methodology and Research DesignResearch Methodology and Research Design
Research Methodology and Research Design
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
digital image processing, image processing
digital image processing, image processingdigital image processing, image processing
digital image processing, image processing
 

CHBTAS

  • 1. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details Sl. No 1 Code 2 CS39_DL 3 CS85_DL 4 CS30_SM 5 CS5_RJ 6 CS86_RJ 7 CS13_DL 8 CS14_DL 9 CS16_DL 10 CS17_MH 11 CS19_DL 12 CS20_DL 13 CS21_RJ 14 CS23_RJ 15 CS24_RJ CS42_DL Venue-2-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: Title Authors and Affiliation Cryptographic Primitives for Multimedia Security Design of Practical Homomorphic Schemes Reconnaissance: an offensive defensive approach Effect of Beacons Deployment and Beacons Radio Range on HiRLoc and RAL Schemes in Wireless Sensor Networ Research Of Load Testing And Result Application Based on Load Runner Sakshi Dhall, DTU, Delhi, Saibal K. Pal, DRDO, Delhi, Bhavya Bhatia IGIT, DelhiNitin Jain, DTU, delhi, Saibal K. Pal DRDO, Metcalfe House, Delhi Amandeep kaur ,Amenable.aman@gmail.com AIACT&R, Guru Gobind Singh Indraprastha University, Delhi Ranjit Panigrahi and M.K. Ghose, CSE, SMIT, Sikkim Email: ranjit.panigrahi@gmail.com, mkghose@smu.edu.in Dr. Manju Kaushik, Associate Professor (Computer Science and Engineering) JECRC University, Jaipur, India, Email: manju.kaushik@jecrc.edu.in Pratibha Fageria, M.Tech (Computer science), JECRC University, Jaipur, India Email: fageria1405@gmail.com Bhupendra Sharma?,Sukriti Garg?,Chirag Jainyl,The LNM Institute of Information and Technology,Malviya National Institute of Technology, Jaipur,India., Email: bhupendra.sharma@lnmiit.ac.in An Approximation of ASER for Square QAM in Rayleigh Fading Channel for Dual Hop Relay Link Bitcoin & Analysis of its Cryptographic Saibal K. Pal, DRDO, Delhi Primitives Nishu Choudhary, Bansthali University Venue-4-Date-7th March, 14-Time-2.30 PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: Design & Implementation of ECC using Sanjay Kumar1, S.K. Pal2, Ajay Kumar3, SAG, DRDO, Delhi1,2 Koblitz & ElGamal Method RAC, DRDO, Delhi3 skparsade@gmail.com1, skptech@yahoo.com2, ak_manaw@redffimail.com3 Optimal Pairing & Design of Pairing Saibal K. Pal, DRDO, Delhi Friendly Curves Rajeev Kumar, Arvind University of Delhi Design of Secure Passports – Physical, Amit Tandon, Symbiosis Institute of Technology, Pune Electronic & Mobile Saibal K. Pal, DRDO, Metcalfe House, Delhi Design of a Framework for PKI using Saibal K. Pal, DRDO, Delhi Elliptic Curve Cryptography Nishu Choudhary, Bansthali University Cryptographic Schemes based on Sanjay Kumar, Saibal K. Pal, DRDO, Metcalfe House, Delhi, Elliptic Curves over Integer Rings Sanjay Kumar Kalindi College, Delhi University, Delhi SOFTWARE REUSABILITY Dr. Manju Kaushik and Sonali Jain, CSE METRICS FRAMEWORK FOR JECRC University, Jaipur, India COMPONENT-BASED SOFTWARE DEVELOPMENT Possible Threats in VOIP and Dr. Manju Kaushik Associate Professor (Computer Science & Engineering) JECRC University, Enhancement of Network Security Yogesh Bhardwaj M.Tech. (Computer Science) JECRC University, Jaipur, India A Survey on Web Cache Techniques Dr. Manju Kaushik , Pramod Saxena and Suyash Raizada, JECRC used for Web Performance Tuning Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in. Remarks
  • 2. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details 16 CS26_UP 17 CS3_UP 18 CS32_RJ 19 CS36_DL 20 CS40_DL 21 CS46_RJ 22 CS50_RJ 23 CS52_RJ 24 CS54_HP 24 CS56_UP 25 CS58_RJ 26 CS6_RJ 27 CS60_TRI 28 CS61_JK Venue-4-Date-7th March, 14-Time-4.00 PM to 5.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: Software Process Models: A Mr. Vikash Atri, Mr. Ajay Singh, Mr. Subodh Kumar and Mr. Pankaj Varshney, Manglaytan Comparative Study University, Aligarh, vkatri777@gmail.com , ajaysingh853@gmail.com A Framework for Service Categorization and Requirement Gathering along with Discovery and Negotiation Threads of new Services in Service Oriented Architecture (SOA) WEB APPLICATION TESTING USING PENETRATION TESTING Image Encryption using 3D Chaotic Maps Biometric based Security Solutions for Mobile Devices A COMPARATIVE STUDY OF WEB SERVICE TESTING TOOLS FOR FUNCTIONAL REQUIREMENTS ANDROID AND PATTERN ANALYSIS Ashutosh Shukla NIKHIL SHUKLA Computer Application Department College of Management Studies, Unnao DR.VIRENDRA SWARUP GROUP OF INSTITUTIONS, UNNAO. , 7505426186 Mr. Ajay Kumar#1, Miss. Urmi Chhajed, #Computer Science, JECRC University Jaipur, E-mail ajay.kumar@jecrcu.edu.in, chhajed.urmi@gmail.com Bhavya Bhatia, IGIT, delhi, Saibal Pal, DRDO and Sakshi Dhall, DTU, Delhi Aditi Bhateja, AIT, GGSIP University, Delhi, Saibal K. Pal, A.K. Bhateja DRDO, Metcalfe House, Delhi Dr. Manju Kaushik , Garima Singh , JECRC University, Jaipur Ankit Gangwal [1], Megha Gupta [2] Assistant Professor, Assistant Professor Dr. Radhakrishnan Institute of Technology, Jaipur, India Venue-4-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: The Y2K38 Bug Twinkle Mishra MCA (2014) Banasthali University, Jaipur Campus, Jaipur, India twinklemishra679@gmail.com An Efficient Round robin Mohit Sharma1, Suman Saha2Dept. of CSE, JUIT, Waknaghat, Solan, H.P., INDIA Minimum Spanning Tree mailtomskaushik@gmail.com1 , saha.suman@gmail.com2 Algorithm in MapReduce Framework Impact of Network Size and Traffic to Shubham#1, Lalit Sagar#2, Vinay Rishiwal#3 Ideal Institute of technology, Ghaziabad, UP, India. 1 Adhoc Routing Protocols over Different shubhamr71421@gmail.com, 2lksagar@rediff.com #3 IDM Models in VANETs MJP Rohilkhand University, Bareilly, India. 3vinayrishiwal@rediffmail.com Best image selection for data encryption Nidhi Garg1,,Rahul Gupta2 JNU(CS),Jaipur, Rajasthan, India based on the image’s capacity to hide MIT(IT),Manipal,Karnataka,India, nidhigargjaipur@gmail.com, rahul.gupta.engg@gmail.com data Real time smart and robust skin color Jankey Bhallabh Soni Manipal University Jaipur jankeybhallabhsoni@muj.manipal.edu detection using openCV Profile Based Access Control Model in Suyel Namasudra1, Samir Nath2, Abhishek Majumder3 Cloud Department of Computer Science & Engineering Computing Environment Tripura University (A Central University) Suryamaninagar, Tripura West, India 1suyelnamasudra@gmail.com, 2pranrd2010@gmail.com, 3enggtu@gmail.com Author Name Disambiguation Using Tasleem Arif1, M. Asger2, Rashid Ali3 1Department of Information Technology Two Stage Clustering BGSB University Rajouri-J&K tasleem.ap@gmail.com 2 School of Mathematical Sciences & Engineering BGSB University Rajouri-J&K Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
  • 3. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details 29 CS63_TN SMART TOOTHY m_asger@yahoo.com 3College of Computers & Information Technology Taif University-Saudi Arabia rashidaliamu@rediffmail.com B.S.Sanjeev kumar1 , K.S.M.Praveen2 , G.Komarasamy3 1,2,3Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam, India 1bssanjeevcse94@gmail.com , 2praveenravi208@gmail.com, 3komarasamyg@bitsathy.ac.in 30 CS65_RJ SQL Injection Attacks on Web Applications CS66_MH 32 CS68_PN 33 CS69_HR 34 CS7_RJ Challenge and Seurity issues of Cloud computing in Technical Education 35 CS71_UK Particle Swarm Optimization Technique for Discrete Tomography 36 CS72_UP Impact of Mobility Models on MANETs Routing Protocols 37 CS73_DL Efficient and Secured Video Encryption Scheme for Lightweight Devices CS77_MH 39 CS78_RJ 1Chandershekhar.sharma@gmail.com 2vinodkrmenaria@gmail.com Dr S.C. Jain Professor in Computer Engineering Department Technical University Kota, India Rajasthan Technical University Kota, India 2Scjain1@yahoo.com DATA SECURITY AND PRIVACY IN Trupti Shah, Prof. M.D. Ingle Dept. of Computer Engineering, JSCOE WIRELESS BODY AREA Pune University Pune, Maharashtra, India NETWORKS trups13@gmail.com ingle.madhav@gmail.com Venue-4-Date-8th March, 14-Time-2.30- PM to 4.00 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: Artificial Neural Networks – A Boon for Gagandeep Jagdev#1,Tejinder Singh#2,Sukhpreet Singh#3 Medical Science and Character #1 Dept. of Computer Science, Punjabi University Guru Kashi College, Damdama Sahib (PB), India. Recognition #2#3Students (M.C.A.), Guru Kashi University, Damdama Sahib (PB), India. #1gagans137@yahoo.co.in, #2tejindersidhu008@gmail.com, #3sukhis005@gmail.com Noise Robustness Investigation of Mamta#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology Feature Extraction Techniques Kurukshetra, Indi 1er.mamta.dabra@gmail.com, 2rka15969@gmail.com 31 38 Chandershekhar Sharma#1 Dr S.C. Jain*2 Vinod Kumar Menaria#3 #Research scholar, Rajasthan Nilam Coudhary[1], Prof.(Dr.)Baldev Singh[2], Tarannum Sheikh[3] Research Scholar, CSE, SGVU, Jaipur, Rajasthan, India[1] Professor, CSE,VIT, Jaipur, Associate Professor, CSE, VIT, Jaipur, Rajasthan, India[3] Narender Kumar, Roopa Kumari2 Department of Computer Sc. Engg, HNB Garhwal University,Srinagar Uttrakhand, India narenrawal@gmail.com , narenrawal@gmail.com Subodh Kumar#1, G.S. Agrawal#, Sudhir Kumar Sharma*2 # Institute of Computer Applications, Mangalayatan University, Beswan, Aligarh-U.P. (India) 1 Subodh.sharma@mangalayatan.edu.in *IET, Jaipur National University, Jaipur-Raj. (India) 2 sudhir.732000@gmail.com Rajan Gupta*, Neeharika Chaudhary*, Anika Garg*, Saibal K. Pal*, *Department of Computer Science, University of Delhi, Delhi - 110007, INDIA **Scientific Analysis Group Lab, DRDO, Metcalfe House, Delhi - 110054, INDIA Email: guptarajan2000@gmail.com, neear13@gmail.com Venue-4-Date-7th March, 14-Time-12.05 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: A Framework for Design & Amit Tandon1, Saibal K. Pal21Department of Computer Engineering, Symbiosis International Management of Secure Societies UniversitySymbiosis Institute of Technology, Pune, Maharashtra, India,2Scientific Analysis Group, DRDOMetcalfe House, Delhi, India1amittandon94@gmail.com, 2skptech@yahoo.com Cloud computing: future pillar for eShivangi Singh, Rishank Singh governance School. Of computer Science, Jaipur National University, SADTM Jagatpura, Jaipur-302017, Rajasthan, India School of Computer Science, Swami Keshvanand institute of technology, management and Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.
  • 4. CS-Venue No 2 and 4: IAET-2014-Presentation Schedule Details 40 CS79_RJ 41 CS80_AP 42 CS81_GJ 43 CS82_PN 44 CS83_RJ 45 CS84_RJ 46 CS87_DL 47 CS88_RJ 48 CS89_HR 49 CS34_RJ 50 CS11_UP 51 CS45_RJ Numeral Recognition of Four Scripts: Bengali-Assamese, Gujarati, Oriya, Nepali Soft Computing Techniques for Privacy Preserving Data Mining IMPROVEMENTS IN AGILE MODEL USING HYBRID THEORY FOR SOFTWARE DEVLOPMENT IN SOFTWARE ENGINEERING Cryptosystem Identification and Key Clustering using Artificial Neural Networks gramothan, SKIT Ramnagaria, Jaipur-302017, Rajasthan, India, smilingshivangi11@gmail.com Rishank19@rediffmail.com 1Manubolu Sreenivasulu,2Prasenjit Kumar Das,3Mr. Rishi Mathur, Dept. Of Computer Science & Engineering,Manipal University Jaipur,Jaipur.manubolusreenivasulu@muj.manipal.edu 2prasenjitkumardas@muj.manipal.edu ,rishimathur@jaipur.manipal.edu Sridhar Mandapati #1, Raveendra Babu Bhogapathi#2 #1Associate Professor, Department of Computer Applications, R.V.R & J.C College of Engineering, Guntur, India. mandapati_s@yahoo.com #2Professor, Department of Computer Science & Engineering, VNR VJIET, Hyderabad, India. rbhogapathi@yahoo.com Ratnmala Raval, Haresh M Rathod, Computer Department, RK University Kasturbadham-Rajkot-Gujrarat- India Ratnmala.Raval@gmail.com Haresh.Rathod@rku.ac.in AK Bhateja Member of IEEE,Defence Research & Development Organization Delhi, India, akbhateja@gmail.com Ankita Gupta Department of Electronics and Communication Thapar UniversitPunjab, Indi, oshu.gupta@gmail.com, Sonali Jain Department of Computer Scienc, MaharshiDayanand University Rohtak, Indi, sonalijain104@gmail.com Venue-5-Date-8th March, 14-Time-11.15 PM to 1.30 PM : Maximum Time for Each Paper Presentation=15 Min : Chair: Energy Efficient Information Collection Sandeep Swami1, Jitendra Singh Yadav2,M. Tech, Department CSE, JECRC University, Jaipur, India in Wireless Sensor Networks Using ,Assistant Professor, Department CSE, JECRC University, Jaipur, India 2 Adaptive Compressive Sensing Energy sswami2@gmail.com1, jitendra.yadav@jecrcu.edu.in2 Efficiency Scheduling for WSN A Review on Security Challenges in Aiman Rais1, Pratima Sharma2, Neetu Thomas3,1, 2, 3 Department of Electronics and Communication Cloud Computing Engineering,, Jaipur National University, Jaipur, India Corresponding Author E-mail Id- aimanrais@gmail.com A Proposed Framework for Enhancing Himanshu Chaudhary1, Aditi Bhateja2 and Javed Ahmed Khan3 Security of SHA-2 AIACT&R, Guru Gobind Singh Indraprastha University, Delhi, India, lavi10000@gmail.com aditibhateja89@gmail.com, javedahmad1989@gmail.com An Intensified Steganographic Manoj Kumar Sharma #1, Abhishek Gaurav#2 Algorithm for Cover Images Using GI #1 Ph.D. Scholar, Jaipur National University, Rajasthan, India Algorithmic Approach #2 B. Tech. CS (3rd year), Jaipur National University, Rajasthan, India 1manoj186@yahoo.co.in, abhishekgaurav.sci@gmail.com Comparative Study of Acoustic Rajan Mehla#1, R.K. Aggarwal#2 Computer Engineering Department, National Institute of Technology Modeling Techniques Kurukshetra, India, rajanmehla@gmail.com, rka15969@gmail.com Efficient Schema Generator algorithm Dr. Surender Kumar Yadav and Mr. Rahul Kumar Shrivastava using Data mining techniques. JECRC University Impact of I.T. Innovation in retail sector Mr. Jitendra Singh Lecturer, IBM, Mangalayatan University, Beswan-Aligarh Seema Gupta Asst. Prof., Mgmt. Deptt., Anand Engineering College, Agra. Dr. Manju Kaushik, Aditi Jain and Nitesh Dugar, JECRC CHALLENGES TO BIG DATA SECURITY AND PRIVACY Any discrepancies or request send us mail at: iaet.2014@jnujaipur.ac.in.