S.No
|
PAPER TITLE
|
AUTHOR'S NAME
|
|
Theme 1: Web Applications & Network Security.
|
1
|
Medium Access Control in Wireless Sensor Networks
|
Dr. Banta Singh Jangra, Vijeta Kumawat
|
2
|
A Robust Approach to Detect SQL Injection Attacks
|
Jyoti Agrawal, Mukesh Kumar Gupta
|
3
|
K-N Secrete Sharing Scheme of Visual Cryptography Using 2x2 Blocks Replacement
|
Vinita Sharma, Vipin Gupta
|
4
|
Static Analysis Tools to Detect of Cross-site Scripting Vulnerabilities: A Survey
|
Priya Sharma
|
5
|
Exploring Web Analytics Tools for Blog Analysis
|
Dr. Arvind K Sharma, Shubhra Saxena
|
6
|
4
An Overview to Cryptography
|
Surbhi Chauhan, Shrayansha Mathur, Nidhi Jain
|
7
|
SQL Injection Attacks on Web Applications
|
Rahul Saxena, Dinesh Kumar, Sonali Vyas, Isha Shingari
|
8
|
A Classification of SQL Injection Attacks and Countermeasures
|
Akash Arora, Alok Kumar, Aman Agrawal
|
9
|
Phishing & Anti-Phishing Techniques
|
Himmat Singh Bhati1, Himanshu Singh Chouhan2
|
10
|
Cryptography in our Daily Lives and it's Future
|
Vijeta Kumawat, Siraj Khan, Yash Mathur, Archit Mishra
|
11
|
A Phishing Prevention System Using USB for Secure Login
|
Amit Solanki, S.R. Dogiwal
|
12
|
A New Approach for Secured Stenganography Using Genetic Algorithm
|
Akanksha Gaur, Vipin Jain, Sunil K. Sharma
|
13
|
Inadequacy in 4-Way Handshake Key Handover Process and Remedy
|
Kapil Dev Sharma1, Pankaj Dadheech
|
14
|
Congestion Control: Challenges
|
Rahul Kumar Khatwani, Rajat Sharma, Mayank Joshi , Manoj KumarVerma
|
15
|
Study and Deployment of Network Administration and Management Application
|
Devendra Rohila, Ms. Neha Jain
|
16
|
Security Breaches in Social Networking
|
\
Subham Kumar Gupta, Anil Kumar Prajapati
|
17
|
Comparative Analysis of Text Steganography Approaches
|
Angela Joseph, Saurabh Ranjan Srivastava
|
18
|
A Survey of Advanced Encryption Algorithm
|
Gaurav Kumar Vyas, Saurabh Ranjan Srivastava
|
19
|
Context Based Searching for Web Content Classification
|
Rekha Singhal, Saurabh Ranjan Srivastava
|
20
|
Alexa V/s Page Rank: All about Links and Traffic
|
Divya Vaidya, Neha Jain
|
21
|
Text Steganographic Methodologies: Comparison and Review
|
Ankita Sharma, Anjana Sangwan
|
22
|
A Taxonomy & Comparative Study of SQL Injection Prevention Techniques
|
Kailash Soni, Mukesh Kumar Gupta, Dolly Mittal
|
|
Theme 2: Data Mining, Data Warehousing & Knowledge Discovery.
|
1
|
Searching in Geographical Dataset by using Modified k-mean Clustering Algorithm
|
Anita Kumari Kumawat, Mr. Saurabh Ranjan Srivastava
|
2
|
Data Mining: Controversies and Dispute
|
Priyanka Sharma, Anurag Bhatnagar
|
3
|
Parser Implementation for SQL Based on JavaCC
|
Dolly Mittal
|
4
|
Data Mining and Statistics
|
Aabhas Sharma, Arpit Shukla, Aayush Sharma
|
5
|
Database in Memory
|
Rahul Kumar Khatawani, Rajat Sharma, Mayank Joshi, Manoj Verma
|
6 |
Problems in Data Warehousing |
Asha Bidiyasar, Saurabh Ranjan Srivastava |
7 |
SPARQL Semantics & Execution Analysis Using Apache-Jena and Fuseki Server Interface |
Poonam Malpani, Mehul Mahrishi, Paras Bassi |
|
Theme 3: Artificial Intelligence, Fuzzy Logic & Genetic Algorithms. |
1 |
Artificial Intelligence for Human Intelligence Turk and Now Clowder | Vijeta Kumawat, Ganesh Sharma, Anjana Sharma, Krishnakant Sharma |
2 |
Single Layer & Multilayer Feed-Forward Neural Networks: A Case Study | Mahender Kumar Beniwal, Pankaj Dadheech, Sushila Bishnoi, Kailash Soni |
3 |
Adaptive Fuzzy Logic Speed Controller with Torque Adapted Gains Function for PMSM Drive | Manisha Khandelwal, Girija Khandelwal |
4 |
Brain-Computer Interface: The Future Technology | Girish Rathi, Neha Jain |
5 |
Technologies Based on Natural User Interface | Deeba Khanam, Sunil Dhankhar |
6 |
A GSM, Speech Health Monitoring System | Vaishali Jain, Sunil Dhankhar |
|
Theme 4: Software Engineering & Software Product Development. |
.
1 |
A Comparative Study of Various Approaches Developed to Solve Travelling Salesman Problem Efficiently Er | . Neha Mathur, Er. Pankaj Daheech, Er. Divya Mathur, Er. Shruti Mathur |
2 |
A Study on Linked Lists | Vijeta Kumawat, Meghana Nagaraj, Kunal Taneja |
3 |
Reliability Assessment for Real Time COTS | Meenakshi Bhagtani, Anuradha Raheja, Reema Ajmera |
4 |
Software Development with Roles | Riddam Jain, Shubham Gupta, Anjana Sangwan |
5 |
A Study on Inheritance Using Object Oriented Programming | VijetaKumawat, Ajeet Jain |
6 |
Comparison of Slicing and Its Relevance Used with Implementation of CCDD Approach: Review | Deepti Tak, Nikhil Vijay |
|
Theme 5: Image Processing & Pattern Recognition. |
1 |
Algorithm for Optical Character Recognition in Matlab | Anoop Singh Poonia, Soma Mukherjee, Niraj Kumar Singh |
2 |
Hybrid Digital Watermarking Based on Key Dependent Basis Function | Anjietha Khanna, Richa Rawal |
3 |
Performance Analysis of Feature Extraction Techniques for Face Recognition | Shubhlakshmi Agarwal, Sandeep Kumar Gupta, Richa Khyalia, Jayati |
4 |
Robust Watermarking of Grayscale Images Using Feature Extraction and DWT | Rekha Bhandari, Neha Janu, Sushila Bishnoi, Vijeta Khicha |
5 |
Efficient Web Search Using Meta Data with Relative Smoothness Using CBIR | Kanak Giri, Pankaj Dadheech, Mahender Kumar Beniwal |
6 |
Thresholding Technique for Small Image Recognition from Large Image | Mrs. Priyanka Bhardwaj |
7 |
Improved Pattern Matching Algorithm Based on IDS | Jyoti Kumawat, Kailash soni, Ruchika Khandelwal |
8 |
An Efficient Parallelogram Window Based Disparity Map Determination | Atul Kumar Verma, Lalbabu Purbey |
9 |
A Review on Various Image Enhancement Technique | Aaditya Vishal Soni, Mrs. Ankita Gupta |
.
|
Theme 6: Mobile & Pervasive Computing. |
1 |
Impact Analysis and Detection Method of Malicious Node Misbehavior over Mobile Ad Hoc Networks | Priyanka Jain, Mehul Maharshi |
2 |
Five Pen PC Technology | Sonal Saxena1 |
3 |
Underwater Sensor Networks Design, Challenges and Applications-A Survey | Vinod Kumar Menaria, Anurag Bhatnagar, Naveen Jain |
4 |
To Investigate the Performance of IEEE 802.11 Wireless Technology MANET Protocol Under Random Walk and Random Way Point Model | Sitaram Gupta, Nilam Choudhary, Aaskran Bisnoi |
5 |
Performance Analysis of Different Routing Protocols in Wireless Sensor Network Using Different Network Parameters | Sultan Singh Saini, Vipin Jain, Satish Kumar Alaria |
6 |
Green Computing: A New Approach to Save Energy and Minimization of E-Waste | Satish Kumar Alaria, S. R. Dogiwal |
7 |
Wireless Ad-hoc Network: Challenges, Security & Issues | Satish Kumar Alaria, Dr. Vijay Kumar |
8 |
Securing Bluetooth Communications | Amit Sharma, Apoorva Jain, Aditi Gupta |
9 |
Green Computing-A Step to Eco friendly Technology | Aditya Kumar, Akshita Jain, Amit Kumar Singh |
10 |
Real Time Frame Complexity Analysis for Mobile Video Communication | Neeraj Dhawan, Ritesh Kumar Ravi |
11 |
An Improvement of MAC Protocol for Wireless Ad-hoc Networks | Satish Kumar Alaria, Sultan Singh Saini, Manish, Vivek Sharma |
12 |
On-Grid Photovoltaic Solar Energy System and its Energy Storage Ways | Sunil Parashar, Sunil Dhankhar |
13 |
Magnetic Levitating Train | Jyoti Kumawat, Sarthak Gupta, Nitesh Chhabra |
14 |
Wireless Sensor Network Security | Chirag Lalwani, Neha Jain |
15 |
Smart Switch: Optimize for Green Networks | Ritesh Kumar Ravi |
.
|
Theme 7: High Performance Computing. |
1 |
Database Architecture of OLTP in the SaaS-Based Multi-Tenant Educational Enterprise Resource Planning | Tosif Khan |
2 |
Improved EDF Algorithm for Fault Tolerance with Energy Minimization | Sakshi Verma, Narendra Singh, Arvind Kumar, Bashir Alam |
3 |
Open Stack: An Open Source Solution towards Implementing Private Cloud | Manish, Sunil Dhankar |
4 |
Study of Various Cloud Security Threats and Their Control Measures | Navneet Kumar Verma, Mudit Khetan, Siddharth Mukherji |
5 |
Cloud Computing: Evolution of Cloud among IT teams | Shrayansha Mathur, Surbhi Chauhan, Nidhi Jain, Vinod Kumar Menaria |
6 |
A Review of Various Scheduling Algorithms for Context Aware Services in Cloud | Girish Sharma |
7 |
Lifetime Enhancement of LEACH Protocol | Nidhi Gupta, Isha Goyal, Khilak Kashyap |
8 |
SWIFT: An Open Source Solution towards Object Storage of Cloud | Manish, Vivek Sharma, Hitesh Kumari Yadav, Satish Kumar Alaria |
9 |
Multi-Tenant Data Management in Software as a Service (SaaS) | Riya Jhalani |
10 |
An Improved Recommendation Algorithm Based on Content Syndication and User Clustering | Rajat Gupta |
11 |
Dynamic Resource Allocation and Management Using OpenStack | Rakesh Kumar, Bhanu Bhushan Parashar |
12 |
Study and Comparison of Various Cloud Simulators Available in the Cloud Computing | Samrath Sharma |
13 |
Open Source Virtualization Management Using Ganeti Platform | Rakesh Kumar, Sonu Agarwal, Muskan Bansal, Anurag Mishra |
14 |
Efficient Page Ranking Using ROCK Clustering Algorithm | Neelam Gupta |
15 |
Comparative Study of Several Clustering Algorithms | Priyanka Sharma |
16 |
Study on Cloud ERP Using Software Engineering Techniques | Uma Shiwani, Kailash Soni |
17 |
Cloud Computing: Evolving Networks | Rishank Singh |
18 |
Memory Management Technique for Paging on Distributed Shared Memory Framework | Brijesh Babal, Kamal Jangir, Ayush Goyal |
19 |
Holographic Memory Device: A Review | Nilam Choudhary, Baldev Singh, Tarannum Sheikh |
20 |
Comparative Study of LEACH Protocol | Nidhi Gupta, Sanjay Sharma, Deepesh Kumawat, Vikram Kumar Purohit |
21 |
Modified LEACH Protocol | Nidhi Gupta |
.
|
Theme 8: Big Data Analytics. |
1 |
Bigtable: A Hierarchical Architecture with Speech Recognition | Madhu Joshi, Saurabh Ranjan Srivastava |
2 |
Big Data Hadoop | Govind Rander, Arvind Malav |
3 |
Challenges and solutions in Big Data Analytics | Manoj Kumar Nama, Pankaj Dadheech |
4 |
Big Data: Tools & Techniques for Improving Existing Business Model | Anamika Pandey, Sidharth Jain, Shashank Agarwal, Sunil Kumar Jangir |
5 |
Big Data: A New Dimension in Business Intelligence | Anamika Pandey, Seema Sharma, Neha Sharma, Neha Gupta |