Ordering Conference Proceedings - National Sea Grant Library
NATIONAL CONFERENCE IN SOMANY ENGINEERING COLLEGE(NCETICC- 2013)
-
Upload
independent -
Category
Documents
-
view
6 -
download
0
Transcript of NATIONAL CONFERENCE IN SOMANY ENGINEERING COLLEGE(NCETICC- 2013)
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
1
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
2
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
3
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
4
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
5
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
6
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
7
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
8
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
9
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
10
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
TECHNICAL ADVISORY COMMITTEESr.no Name Designation E-mail Id Contact No.
1. Prof.(Dr.) SP Khatkar
Director, UIET , MDU [email protected] 9813805666
2. Dr. H.L.Verma
(Dean Academic & Administration, Satya Apeejy University)
[email protected] 9896272466, 9896272433
3. Neha Gupta CSE, S(PG)ITM [email protected] 9467848147
4. Dr. Pramod Kumar
HOD DTU, Bawana , Delhi [email protected] 9013353272
5. Dr. YashPal Singh
Director C.D.L Engg College,Sirsa
[email protected] 9416490800
6. Dr. C.Ram Singla
Advisor, S.(PG).I.T.M [email protected] 9354515505
7. Dr.M L Chandna
Professor,D.T.U,Delhi [email protected] [email protected]
9416738460
8. Prof.(Dr.) Executive Council [email protected] 9868263761
11
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
N.K. Gupta Member,ISTE,New Delhi
9. Col. Prof. B.BSharma
Advisor & Consultant Education Group
[email protected] 9811026636, 9654176405
10. Prof. H.S Panwar
HOD ECE , RD Foundation, Moidinpur, Gaziabad
[email protected] 9927237874
11. Dr. D. Tyagi St. Anne Mary Organization
[email protected] 9891227478
12. Dr. Prof. YP Singh
Director, S(PG)ITM [email protected] 9896582698
13. Prof.(Dr.) R. Murugesan
Ex-VC Anna University,presently Chairman ISTE, Delhi
[email protected] 9443317930
14. Dr. Anup Pradhan
Director Research, Sunrise University, Alwar
[email protected] 8003094326
15. Dr. MN Hoda Director, Bharatiya Vidhya [email protected] 9212022066
16. Prof. MaheshBundele
Director Research, Poornima University, Alwar
[email protected] 9828999440
17. Prof. K. Kr. Keshariwal
HOD ECE, S.(PG).I.T.M [email protected] 8755160157
18. Dr. SC Tyagi Council Member, ComputerSociety Of India, Gaziabad
[email protected] 9811054645
19. Sh. Vikash Bharati
MD Gate Forum,Delhi [email protected] 9910255155
20. Sh. Neeraj Techmentro, Noida [email protected] 9958139080
21. Ravi Gupta Director of BMG Group [email protected] 9812051441
22. Dr. S. Basil Gnanappa
Executive Secretary ISTE [email protected]
011-26513542, 26513615
12
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
23. Dr. DevenderSinghj
Director State Institute of Engg. & Tech.
[email protected] [email protected]
9416012060
24. Vipin Singh Registrar RBIT, Bijnor [email protected] 9756030888
25. Nitin Kumar HOD ECE, Niit Vazirabad, Bijnor
[email protected] 9634080396
26. Abhay Raj Singh
Well Growth Education [email protected] 99710213309457610612
27. Raman Soni Director curriculum( Dev) [email protected]
28. Mr V Sharma Jagannath University viveksharma@jagannathuniversi 9414443034
29. Prof.(Dr)N.S.Gill
Director DDE, MDU,Rohtak [email protected] 9050805136
30. Prof.(Dr.) D. Kumar
HOD, GJU, Hisar [email protected] 9467690800
31. Col. K.C Bhardwaj
President IETE Delhi section
[email protected] 9873279796
32. Dr. Rajeev Yadav
HOD, CSE, GCE ,Bilashpur,Gurgaon
[email protected] 9416133666
34. Dr. Rakesh Kumar Gill
( HOD,GITM, Gurgaon) [email protected] 9355025077
35. Ms. Deepti Bali
Aroma Technology [email protected] 9889260194
36. Mr. Ishan Seth
Dy. HOD, KLSIT, Bijnor [email protected] 9889260194
37. Mr. Pushpender
Dean Academic, S(P.G)ITM, Rewari
8059335388
38. Dr. Sohan Garg
Director C.C.S. University, Meerut (UP)
[email protected] 9536744002
39 Mr. Aakash Gupta
McKinsey & Co. [email protected] 9999675155
13
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
TECHNICAL SESSION COMMITTEE-1
Technical Session Track A-Data communication
14
Sr. No Name Designation
1 Dr.M L Chandna Professor,D.T.U,Delhi
2 Mr.Manish CMC Noida
3 Prof. Krishna Kr. Keshariwal HOD ECE, S.(PG).I.T.M
4 Dr. Anup Pradhan Director Research, Sunrise University, Alwar
5 Prof.(Dr.) N.K. Gupta Executive Council Member, ISTE, New Delhi
6 Prof. Raman Soni Director curriculum Development
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
TECHNICAL SESSION COMMITTEE-2
Technical Session Track B-Computer Communication
Sr.no Name Designation
1 Col. Prof. B.B Sharma Advisor & Consultant Education Group
2 Dr. YashPal Singh Director C.D.L.U Engg. College, Sirsa
3 Ms. Neha Gupta CSE, S(PG)ITM
4 Sh. Vikash Bharati MD Gate Forum,Delhi
5 Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad
15
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
6 Mr. Sandeep Jain Jain computers Rewari
HIDING IMAGE IN AUDIO USING DWT AND LSB
Abstract -- The issue of important information hiding preoccupied the minds of many peopleespecially in business, military and political fields due to the secrecy of their information.Thus, there were always secret means and methods that were pursued to send suchinformation. Later on the spread of internet, information can be sent easily and quickly .Still,at the same time the sent data was easily intercepted and uncovered by hackers. Researchersand scientists have made a lot of research work to solve this problem and to find an effectivemethod for image hiding .The proposed system aims to provide improved robustness, securityby using the concept of DWT (Discrete Wavelet Transform) and LSB (Least Significant Bit)proposed a new method of Audio Steganography. The emphasize will be on the proposedscheme of image hiding in audio and its comparison with simple Least Significant Bitinsertion method for data hiding in audio.
WIRELESS SENSOR NETWORK: SUSPICIOUS NODE DETECTION BY SIGNALSTRENGTH IN WSN
Abstract- A wireless sensor network is a collection of nodes organized into a cooperativenetwork. The more modern networks are bi-directional, also enabling control of sensoractivity. The development of wireless sensor networks was motivated by military applicationssuch as battlefield surveillance; today such networks are used in many industrial andconsumer applications, such as industrial process monitoring and control, machine healthmonitoring, and so on. WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. In this paper we have explained the architecture of Wireless
16
Manuscript Id: 21C001
NIDHI [email protected]
Assistant professor in Department of Computer EngineeringThe Technological Institute of textile & Sciences, Bhiwani
Haryana, India
NEHA [email protected]
Department of Computer Engineering,The Technological Institute of Textile & Sciences Bhiwani
Haryana, India.
Manuscript Id: 21C009
1RISHI VERMA 2 SUNNY 3PUSHPENDER [email protected] [email protected] [email protected] Department of CSA Department of CSA Department of CSECDLU,Sirsa(Haryana)-India CDLU,Sirsa(Haryana)-India Assistant Prof.(SITM,Rewari)-HR
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Sensor Network, its comparison with mobile ad-hoc network, various topologies used inWSN , challenges and how to detect the suspicious nodes in Wireless Sensor Network.
TESTING OF OBJECT-ORIENTED PROGRAMMING SYSTEMS (OOPS)
Abstract- The aim of this paper is to examine the testing of Object-Oriented ProgrammingSystems (OOPS) and to compare and contrast it with the testing of conventionalprogramming language systems. Conventional system testing, object-oriented system testingand the application of conventional testing methods to object-oriented software will beexamined, followed by a look at the differences between testing of conventional (procedural)software and the testing of object oriented software.
ENERGY EFFICIENT WIRELESS COMMUNICATION
Abstract -The explosive growth of high-data-rate applications is leading to more and moreenergy consumption in wireless networks to guarantee quality of service. Telecommunicationnetworks consume increasing amount of energy and contribute a growing fraction to the CO2emissions of ICT industry, and are responsible for approximately 2% of the global energyconsumption. Reducing energy consumption in wireless communications has attractedincreasing attention recently. As data traffic continues to grow due to the proliferation ofsmart phone devices, reducing greenhouse emission by improving the network energyefficiency is becoming increasingly important. Therefore, energy-efficient communicationshave been paid increasing attention under the background of limited energy resource andenvironmental- friendly transmission behaviors. Thus, climate and cost issues now shift theresearch focus of wireless communications to energy consumption and energy efficiency. Inthis article, basic concepts of energy-efficient communications are first introduced and thenexisting fundamental works and advanced techniques for energy efficiency (EE) are
17
Manuscript Id: 21C019
GARIMA [email protected]
M.Tech (CSE) Ist SemesterSomany (PG) Institute of Technology &
Management, Rewari
NEHA [email protected]
Assistant ProfessorDepartment of Computer Science & Engineering,
Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.
Manuscript Id: 21C004
ANITA [email protected],
Department of Computer Science & EngineeringSomany Institute of Technology & Management (PG), Rewari, Haryana
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
summarized, including information-theoretic analysis, orthogonal frequency division multipleaccess (OFDMA) networks, multiple-input multiple-output (MIMO) techniques, relaytransmission, and resource allocation for signaling. Some valuable topics on energy-efficientdesign are also identified for future research.
FACIAL IMAGE RECOGNITION USING DIMENSIONS REDUCTIONSTECHNIQUES PRINCIPLE COMPONENTS ANALYSIS
Abstract—Face recognition is one among the several techniques for identification andverification of an individual. The approach in the present work transforms face images into asmall set of characteristic feature images called eigenfaces, which are the principalcomponents of the initial training set of face images. Recognition is performed by projectinga new image into subspace spanned by eigenfaces, followed by computing the distancebetween the resultant position in the face space and those of known face classes.
REVIEW ON CRYPTOGRAPHY
Abstract: Cryptography is a technique used in day today life for security and protection ofconfidential information. Cryptography is where security engineering meets mathematics. Inthis paper I am discussing modern cryptography algorithms that heavily based on computerscience practice and mathematical theory, making such algorithms hard to break in practiceby any adversary. These algorithms include various Secret key cryptography, public keycryptography algorithms.
18
Manuscript Id: 21C010
SUNNY [email protected]
Lecturer , Dept of CSELoard Krishna Polytechnic, Rohtak
RISHI [email protected]
Assistant Professor, Dept of CSES. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C033
Ekta [email protected]
Department of Computer ScienceSomany Institute of Technology and Management
Haryana (Rewari)
Sangeeta [email protected]
Department of Computer Science Somany Institute of Technology and Management
Haryana (Rewari)
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
JAVA – AN EMERGING FIELD FORWEB APPLICATION DEVELOPMENT IN SAP USINGWEBDYNPRO
Abstract:- In this paper it is going to be discussed the differences between two existingWebDynpro techniques – SAP WebDynpro for ABAP and SAP WebDynpro for JAVA. Bothhave their own pros and cons. So the decision to choose one is best to leave upon theorganizations depending upon the need, suitability and business circumstances. WebDynprois SAP’s own strategic model to create and develop web-based UI applications. Based on thefoundation of MVC architecture, it separates the Model, View and Controller which means itkeeps apart the backend data from user interface and processing logic. Since all the three areindependent so, three developers can work together on the same application which can laterbe merged via interface. WebDynpro has been classified into two UI Technologies –WebDynpro ABAP and WebDynpro JAVA. Both these domains are integrated with runtimeand graphical environment comprising special UI elements which help in building anattractive UI and minimize the coding effort.
ANALYSIS OF WORLD WIDE WEB
19
Manuscript Id: 21C034
PARAS [email protected]
Computer Science Engineering Department,Arya College of Engineering & Research Center,Jaipur, India
Manuscript Id: 21C032
RISHI [email protected]
Assistant ProfessorDepartment Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology & Management,Rewari- 123401.
SUNITA [email protected]
Department Of Computer Science & EngineeringSomany (P.G.) Institute Of Technology & Management,
Rewari- 123401.
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract- The World Wide Web or WWW or W3, commonly known as the web is a system ofinterlinked hypertext documents accessed via the Internet. The W3 project merges networkedinformation retrieval and hypertext to make an easy but powerful global information system.This paper gives the brief introduction of the World Wide Web. This paper defines WorldWide Web, working of World Wide Web. It also focuses on the application of the World WideWeb and the need of World Wide Web. W3’s ability to provide implementation-independentaccess to data and documentation is ideal for a large HEP collaboration. W3 now defines thestate of the art in networked information retrieval, for user support, resource discovery andcollaborative work.
DESIGN AND DEVELOPMENT OF ROUTING PROTOCOLS IN WIRELESS MESHNETWORK
Abstract-- Wireless Mesh Networks (WMN’s) are self Configuring and self Organizingnetworks. Routing in WMS’s is very important issue. For routing purposes Several Routingprotocols have been developed. Due to Dynamic network conditions, routing is the mostcritical part in WMN’s and need to be optimized. The routing strategies developed forWMN’s must efficient to make it an operationally self configurable network. This paperresponds the design consideration to develop a routing protocol keeping the issue ofperformance for WMN’S. In this paper, we have explained the routing challenges design andcriteria concepts for developing a new routing protocol in WMN’s.Here, we have discussedthe key design features for Routing in wireless Mess Networks. Thus, this paper will help toguide the refocus future works in this area.
INTRODUCTION TO CLOUD COMPUTING: A REVIEW
20
Manuscript Id: 21C035
ANITA [email protected]
Department of Computer ScienceSomany Institute of Technology and Management
Haryana (Rewari)
RASHMI SHARMA
Department of Computer Science & EngineeringSomany Institute of Technology & Management (PG), Rewari,
Haryana
Manuscript Id: 21C028
ANJALI
[email protected] of Computer Science & EngineeringSomany Institute of Technology & Management
Rewari, Haryana, INDIA
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract – This paper describes the cloud computing, system and applications .The term“Cloud Computing” has been mentioned for recent few years. It is basically related toprovide a relation between services and users connected through the internet. The main logicbehind the Cloud computing is “Renting instead of buying IT services”. Cloud Computingbecomes a buzz word not only for start-ups but also for the large companies. These largecompanies organize international activities over cloud. Cloud Computing allow to access anyIT service and software present on the cloud.
DIGITAL IMAGE WATERMARKING USING DWT-DCT- VITERBI ALGORITHM
Abstract: Watermarking is a need of digital media. To protect from copyright violation oforiginal media, digital watermarking has been proposed as valid solution for this problem.Watermarking using combined DWT-DCT method is done. It improves the parameters likePSNR, bit error ratio. The purpose of the watermark is to embed some additional informationabout the digital data without visibly modifying it. To make watermarked image moreimmune to attacks during communication channel, Viterbi algorithm is used. The Viterbialgorithm finds the most likely string of text given the acoustic signal. But in our work viterbialgorithm will be used in image watermarking because it is most error correcting algorithmwhich is having comparable complexity. Viterbi decoding is used in transferring of data overnoisy channel in digital communication. This makes image less prone to errors and a fastdecoding method also.
21
Manuscript Id: 21C027
ABHISHEK GUPTA
[email protected] Professor
Department of ECE,Geeta Engineering College,Panipat
NEHA GUPTA
[email protected] Professor,Department of CSE
S(PG)ITM , Rewari
Manuscript Id: 21C031
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
ROUTING CHALLENGES IN WIRELESS MESH NETWORKS
Abstract—Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured networks that employ Cmulti-hop communications to transmit data traffic to andfrom Internet entry points. WMNs are comprised of three types of nodes: access points, meshrouters, and mesh clients. In mesh networks, traffic between mesh nodes and the Internet isrouted over mesh gateways. In this paper, a survey on routing protocols, challenges in routingand applications in wireless mesh networks is conducted. Also we have explained severalmetrics and design concepts for routing protocols in WMNs.
A RELIABLE ROUTING MECHANISAM FOR WIRELESS MESH NETWORKS
Abstract— Since wireless mesh networks are ad-hoc in nature, therefore routing protocolsused for ad-hoc networks like AODV are also used for WMNs by considering only theshortest path to destination. In WMNs data is transferred to and from APs, and due to this,certain problems such as congestion on routes and overloading the APs are taken place. Toobtain a reliable routing path, we have proposed a reliable routing mechanism in this paper.In this paper, we propose a fuzzy logic based, routing algorithm for finding a reliable routingpath in WMNs. In this routing technique for each node, we calculate two parameters, signalpower value and trust value, to find out the lifetime of routes. Each node along routediscovery, stores its signal power value and trust value in RREQ message. In the destinationwith the help of fuzzy logic mechanism, a new parameter reliability value is determined frominputs signal power value and trust value of each route. The path having highest reliabilityvalue is selected as a stable route from source to destination.
22
SONU BHARDWAJ
STUDENT M.TECHDepartment of Computer Science & engineering
Somany (PG) Institute of Technology & Management, Rewari(HR)-India
Manuscript Id: 21C002
Prof. Dr. Sohan [email protected]
Prof. C.C.S. University, Meerut-UP
Er. Pushpender [email protected]
Research ScholarShri Venkateshwara University, Gajraula-UP
Manuscript Id: 21C007
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
REVIEW ON IMPROVE VOICE QUALITY ON VOICE OVER INTERNETPROTOCOL
Abstract - voice over internet protocol (VoIP) is a technology that allows telephone calls tobe made over computer network like internet. The user can make the telephone calls over anIP network using this technology. VOIP converts analog voice signals into digital datapackets and support real-time, two-way transmission of conversation using I.P. This paperwill describe voice over internet protocols to a level that allows discussion of voice qualityissues and security issues. Bandwidth is the major reason of low voice quality in voice overIP. Rather than this, equipments , ATA-Router , phone-frequency , weather condition are alsosome factors that affect the voice quality in VOIP. QoS for VoIP is the strict that can allowyou to make a decent call without suffering from delays, weird sounds, noise and echo. Youwant to converse just like you would over a landline phone. VOIP are basically concernedwith businesses, Quality of services (QOS).
ADVANCEMENT IN LANGUAGES DESIGN USING
PARALLEL COMPUTING FRAMEWORKS
Abstract- Parallel computing simply means using more than one computer processor to solvea problem. Classically, computers have been presented to newcomers as “sequential”systems, where the processor does one step at a time. There are still machines andapplications where this is true, but today most systems have parallel features Supercomputersachieve astounding speed on scientific computations by using amazing numbers ofprocessors. Servers use multiple processors to handle many simultaneous requests in a timelymanner. For example, a web server might use dozens of processors to supply hundreds ofpages per second Multi-core chips include several processor cores on a single computer chip.Even a laptop (or other small system) that uses a multi-core chip is a parallel computer.
23
Puneet saini Ruchika Walia [email protected] [email protected]
Dept. of Computer Science & Engineering Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C030
NIKITA SHARMA
Departmentof CSEArya Engineering College & Research Center
Jaipur, Rajasthan, India
PIYUSH SHARMA
Departmentof CSEArya Engineering College & Research Center
Jaipur, Rajasthan, India
SUDHANSHU VASHISTHA
Departmentof CSEArya Engineering College & Research
CenterJaipur, Rajasthan, India
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
SILENT SOUND TECHNOLOGY USING Electromyography (EMG) - A Review
Abstract- Silent Sound Technology is useful for those who are unable to speak. They can easycommunicate with other people using this technology. Silent Sound technology notices everymovement of lips and transfers it into sound. And it help the people who have lost their voiceto speak .Silent Sound Technology is developed at the Karlsruhe Institute of Technology.Silent sound technology detects every lip movement and then transforms it into sound thatone can easily understand.
CAPABILITY BASED ENCRYPTION SCHEMES
Abstract-At present time, the growth in the networking technology increases day by day andinterchanging of the digital images very frequently. The protection of multimedia data,sensitive information like credit cards, banking transactions and social security numbers isbecoming very important. The protection of these confidential data from unauthorized accesscan be done with different types of encryption techniques. So for providing data securitymany cryptography techniques are there, such as symmetric and asymmetric techniques. Inthis review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamirand Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. There is
24
Manuscript Id: 21C018
INDERPALStudent, M.Tech.
Dept. of CSESomany Institute of Technology and Management
Rewari(HR.) INDIA
Manuscript Id: 21C013
SANGEETA YADAV
[email protected]. of Computer Science & Engineering
S. (P.G.) I.T.M., Rewari-Haryana
Ekta
[email protected]. of Computer Science & Engineering
S. (P.G.) I.T.M., Rewari-Haryana
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
also, a survey on existing work which is used different techniques for image encryption isdone and a general introduction about cryptography is also given.
PROCESS SCHEDULING ALGORITHM
Abstract- The main objective of this paper is to introduce a new CPU algorithm called ANovel CPU Scheduling Algorithm which acts as both preemptive and non-preemptive basedon the arrival time. The proposed algorithm helps to improve the CPU efficiency in real timeuni-processor-multi programming operating system. CPU Scheduling is the basis of multi-programmed operating system. The scheduler is responsible for multiplexing processes on theCPU. There are many scheduling algorithms available for a multi-programmed operatingsystem like FCFS, SJF, Priority, Round Robin etc. In this paper, the results of the existingalgorithms (FCFS, SJF, Priority and Round Robin) are compared with the proposedalgorithm.
SOFT COMPUTING AND TECHNIQUES
Abstract-Soft computing can be a very attractive alternative to a purely digital system, butthere are many traps waiting for researchers trying to apply this new exciting technology. Fornonlinear processing both neural networks and fuzzy systems can be used. Terrifically neuralnetworks should provide much better solutions: smoother surfaces, larger number of inputsand outputs, better generalization abilities, faster processing time, etc. In industrial practice,
25
Manuscript Id: 21C020
NEHA YADAV EKTA
[email protected] [email protected] Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C003
Sushma pachar
[email protected]. of CSE
MITM, JEVRA(HISAR)
Parshant Sharma
[email protected]. of CSE
MITM, JEVRA(HISAR)
DEEPAK KUMAR
[email protected]. of CSE
MITM, JEVRA(HISAR)
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
however, many people are frustrated with neural networks not being aware that the reason fortheir frustrations is wrong learning algorithms and wrong neural network architectures.Having difficulties with neural network training, many industrial practitioners are enlargingneural networks and indeed such But at the same time such excessively large network are notable to respond correctly to new patterns which were not used for training. This paperdescribes how to use effective neural networks and how to avoid all reasons for frustration.
CRYPTOGRAPHY AND SECURITY ANALYSIS
Abstract-Cryptography is the science of writing in secret code and is an ancient art. The needfor secure commercial and private communication has been led by the Information Age,which began in the 1980's. The World Wide Web is an electronic protocol which allowspeople to communicate mail, information, and commerce through a digital medium. This newmethod of information exchange has caused a tremendous need for information security. Athorough understanding of cryptography and encryption will help people develop better waysto protect valuable information as technology becomes faster and more efficient. Asthe Internet and other forms of electronic communication become more prevalent,electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popularcryptography systems used on the Internet is pretty good privacy because it's effective andfree.
REMOTE PROCEDURE CALL IN DISTRIBUTED SYSTEM
Abstract-Remote Procedure Call (RPC) is a powerful technique for constructing distributed,client/server based applications. This survey is to explain RPC mechanism, how to use theSun RPC convert local procedures to remote procedures. An RPC is analogous to a function
26
Manuscript Id: 21C011
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
JYOTI [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C014
GAJENDRA YADAV
[email protected] of computer Science & engineering
Somany(PG)Institute of technology & management,rewari(HR)-India
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
call. Like a function call, when an RPC is made, the calling arguments are passed to theremote procedure and the caller waits for a response to be returned from the remoteprocedure. A client who interacts with the user and a server, which interacts with theresources The client makes a procedure call that sends a request to the server and waits. Thethread is blocked from processing until either a reply is received, or it times out. When therequest arrives, the server calls a dispatch routine that performs the requested service, andsends the reply to the client. After the RPC call is completed, the client program continues.RPC specifically supports network applications.
COMPARATIVE STUDY OF WRITER VERIFICATION SYSTEM
Abstract-Writer Verification System (WVS) is the task of determining whether a handwrittentext has been actually written by a certain person or not. The system comprises a handwrittentext and a claimed identity and subsequently decides whether the text has been written by thiswriter or not. The steps followed by WVS are in the order: image acquisition, pre-processing,segmentation, feature extraction & classification and post-processing. There are manyclassifiers present for feature extraction & classification. In the present paper, we will explainWVS, classifiers used in previous work are explained.
SOCIAL NETWORKING: THE VIRTUAL WORLD
Abstract-Social networking belongs to social communication between the people on Web.Actually, the main aim of “social networking” is to study the interaction of the certain
27
Manuscript Id: 21C012
MUDIT [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
RUCHIKA [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C015
ABHIMANU SHARMA
[email protected] of Computer Science & engineering
Somany (PG) Institute of Technology & Management,Rewari(HR)-India
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
community and what step should be follow for their interaction. Social networking refers toall those online services which are available for free to use for all those people who areinterested in making communication with people. There are several free software and webspace which allow users to create a network of people. Using social networking users cancreate their profile, by inserting their personal details. The details of user are not onlycontains vital information, but they also constitutes a lot of other information like user’shobbies, passions, interests, professional background and qualification statistics etc. Therecould be many other factors which could be responsible connect individual in social groupswith more security.
REPLICATION IN MOBILE AD-HOC NETWORK USING HOPFIELD NETWORK
ABSTRACT-Mobile Ad hoc Network (MANET) is a network comprises of mobile nodesconnected without any centralized administration. Each node in the network has the ability toshare a large number of objects with other nodes. The nodes are connected with other nodesto forward a message to other nodes until the search for node that desire meets. This paperrepresents a new replication method to recover the performance in distributed system.Objects are replicated on different nodes in the network to minimize the search for an object.It is observed that mobility of nodes predicted using SOM (Self Organizing Maps) techniqueprovides less accuracy. This paper represents an algorithm that uses the network parametersas input condition to replicate objects into the nodes. The decision for each node will be takenby gathering the input conditions and feed to the Hopfield Neural Network. It is view that itwill provide more accuracy and improve the performance.
ANALYSIS OF NORMALIZATION AND ITS FUTURE SCOPE IN THEMANAGEMENT OF DATABASE
28
Manuscript Id: 21C002
DR. MUKESH KUMAR
[email protected] Science & Engineering Department, The
Technological Institute of Textile & Sciences,
Bhiwani- 127021, India
TANNU CHAWLA
[email protected] Science & Engineering Department, The Technological
Institute of Textile & Sciences,Bhiwani- 127021, India
Manuscript Id: 21C016
RISHI VERMA
[email protected] Professor
Dept. of Computer Science & EngineeringSomany (P.G.) Institute Of Technology and Management,
Rewari
HEENA SHARMA
[email protected] Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology andManagement, Rewari
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
ABSTRACT-Normalization is a major task in relational database design. Normalizationoptimizes database management by reducing or eliminating redundant data and ensuring thatonly related data is stored in a relational database table. This paper describes what databasenormalization is, why it is important, what it does, and why it is used when building adatabase. This paper will also describe what happens to a database, when it has not beennormalized. It goes on then, to describe the first (1NF), second (2NF), third (3NF) and BCNFnormal forms. It focuses on the advantages and disadvantages of normalization, and outlinesthe advantages and disadvantages of using denormalization .It also discuses the future scopeof normalization in database management system.
MANAGEMENT INFORMATION SYSTEM & ITS STRUCTURE
Abstract - Management information system can be used in various forms in organization andbusinesses. some case such as activates, problem solving, organizational and fallow upbusiness opportunities with using it will be possible .management information system is auseful tool that provided organized and summarized information in a proper time to decisionmakers and enable making accurate decision for manager in organization or in proper time todecision maker and enable making accurate decision for manager in organizations or in otherwords, it’s a system that receives data from different units and provide timely and accurateinformation for different levels of mangers for making optimal decision. In this paper weintend to evaluate the components of (MIS) and the role of it in making optimal decisionprocess.
REVIEW ON STUDY OF CLOUD COMPUTING
29
Manuscript Id: 21C041
PRITI YADAV
[email protected] Professor
Department of MBASomany(P.G)Institute of Technology & Management, Rewari.
SUMAN
[email protected] of MBA
Somany(P.G)Institute of Technology & Management, Rewari.
Manuscript Id: 21C018
RAJEEV SHARMA PUSHPENDER SARAO
[email protected] [email protected]. of Computer Science & Engineering Assistant Professor
S. (P.G.) I.T.M., Rewari-Haryana Head, Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract-Cloud computing is a type of computing that relies on sharing computing resourcesthrough network. In cloud computing, the word cloud is used for "the Internet," so the phrasecloud computing means "a type of Internet-based computing," where different services aregiven -- such as servers, storage and applications and so on. In this we are going to studyabout the cloud management, cloud industry, why we use cloud, and also we are going tostudy the infrastructure, platform and software used as a services in the cloud computing.
DATA MINING AS GRAPHS: A NEW TOOL FOR SOCIAL NETWORKS
ABSTRACT- The objective of this study is to investigate the concept of data mining in socialnetworks with special emphasis on the graph structure technique. The major principle part inthis survey is the literature which is the base or background of the field. The base orbackground is further divided in to four major part are The Graph theory, The Socialnetworks, The Online social networks and The Graph mining. The graph mining is furtherdivided in to ten sub themes.
HIDDEN MARKOV MODEL: A USEFUL TOOL IN AUTOMATIC SPEECHRECOGNITION
30
Manuscript Id: 21C021
SOMESH
Somany Institute of Technology and ManagementRewari(HR.) INDIA
Email:- [email protected]
Manuscript Id: 21C024
ASHWANI [email protected]
Department of Computer Science Engineering
Somany (P.G) I. T. M. Rewari
SANTOSH [email protected]
Department of ECESomany (P.G) I. T. M. Rewari
RUCHIKA [email protected]
Department of CSESomany (P.G) I. T. M. Rewari
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract: Speech recognition has been lately used in our smart phones, search engines,security systems etc. When we talk about intelligent system or user-friendly system speechrecognition comes in first choice. The main issue is about recognizing the user’s speech andfor that purpose Hidden Markov Model (HMM) is extensively used. Out of three differentapproaches for speech recognition namely Acoustic-phonetic, Knowledge Based, and PatternRecognition Approach, the later used HMM Model. This paper will present general aspect ofautomatic speech recognition and use of HMM in it. The paper’s study is based on patternrecognition approach and the third phase speech recognition process ‘Recognition’ and HMMis studied in detail.
REVIEW ON MICROSOFT SPEECH REORGANIZATION API
Abstract: The Speech Application Programming Interface or SAPI is an API developedby Microsoft to allow the use of speech recognition and speechsynthesis within Windows applications. To date, a number of versions of the API have beenreleased, which have shipped either as part of a Speech SDK, or as part of theWindows OS itself. Applications that use SAPI include Microsoft Office, MicrosoftAgent and Microsoft Speech Server. In general all versions of the API have been designedsuch that a software developer can write an application to perform speech recognition andsynthesis by using a standard set of interfaces, accessible from a variety of programminglanguages. Speech Recognition and Text-To-Speech engines or adapt existing engines towork with SAPI. In principle, as long as these engines conform to the defined interfaces theycan be used instead of the Microsoft-supplied engines. In general the Speech API is a freelyredistributable component which can be shipped with any Windows application that wishes touse speech technology. Many versions (although not all) of the speech recognition andsynthesis engines are also freely redistributable. There have been two main 'families' of theMicrosoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extrafeatures in each newer version.
DISTRIBUTED COMPUTING
31
Manuscript Id: 21C025
RIPUDAMAN [email protected]
Department of Computer Science & engineeringSomany (PG) Institute of Technology & Management, Rewari (HR)-India
Manuscript Id: 21C029
PREETI YADAV
M.Tech. 3rd Sem.(CSE), S(PG)ITM,Rewari
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract-Ensembles of distributed, heterogeneous resources, or Computational Grids, haveemerged as popular platforms for deploying large-scale and resource-intensive applications.Large collaborative efforts are currently underway to provide the necessary softwareinfrastructure. In this paper we briefly motivate Grid computing and introduce its basicconcepts. We then highlight a number of distributed computing research questions, anddiscuss both the relevance and the shortcomings of previous research results when applied toGrid computing. We choose to focus on issues concerning the dissemination and retrieval ofinformation and data on Computational Grid platforms. We feel that these issues areparticularly critical at this time, and as we can point to preliminary ideas, work, and results inthe Grid community and the distributed computing community. This paper is of interest todistributing computing researchers because Grid computing provides new challenges thatneed to be addressed, as well as actual platforms for experimentation and research.
FACE RECOGINITION TECHNOLGY
Abstract: Recently Face recognition is becoming the part of everyday life .It has receivedsignificant attention, especially during the past several years Face Recognition is the mostcommonly used in our society on network multimedia. In this paper, we have described theimage analysis & processing and video compression and also described the biometrics andclassification of biometrics. Biometrics is the identification of the person on the basis ofbehavioral and anatomical characteristics.
KNOWLEDGE DISCOVERY OF DATA WAREHOUSING
32
Manuscript Id: 21C043
MANU YADAV
[email protected] of Computer Science & Engineering
Somany(PG) Institute of Technology &Management,Rewari(Hry.)-INDIA
Manuscript Id: 21C017
RISHI [email protected]
Assistant ProfessorDepartment Of Computer Science & Engineering
Somany (P.G.) Institute Of Technology & Management,Rewari-Haryana
Department Of Computer Science & EngineeringSomany (P.G.) Institute Of Technology & Management,
Rewari -Haryana
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
ABSTRACT-Data Warehousing and Knowledge Discovery has been widely accepted as akey technology for enterprises and organizations. It is improve to their abilities in dataanalysis, decision support and the automatic extraction of knowledge from data. With theexponentially growing amount of information to be included in the decision making process,the data to be considered becomes more and more complex in both structure and semantics.Data mining and knowledge discovery in databases have been attracting a significant amountof research, industry, and media attention of late. There is an urgent need for a newgeneration of computational theories and tools to assist researchers in extracting usefulinformation from the rapidly growing volumes of digital data. The need for methods andtools that will automate the process of knowledge extraction, or guide the user to subsets ofthe dataset that are of particular interest is becoming prominent.
WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES
Abstract-Wireless mesh networks have the potential to deliver Internet broadband access,wireless local area net- work coverage and network connectivity for stationary or mobilehosts at low costs both for network operators and customers. The core technology involves anetwork of wireless routers relaying each others’ packets in a multihop fashion. Manyvariations on targeted applications and implementation choices offer different opportunities toemerging companies in this emerging area. In this article, we will present an introduction towireless mesh networks and present both the benefits enabled by this technology and themain hurdles that have to be overcome.
COMPARATIVE STUDY OF VARIOUS IMAGE SEGMENTATION METHODS
33
Manuscript Id: 21C037
RAHUL [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
Manuscript Id: 21C023
RUCHIKA [email protected]
Department of CSESomany(P.G.)Institute of Technology & Management,
Rewari (Haryana)
MUDIT [email protected]
Department of CSESomany(P.G.)Institute of Technology & Management,
Rewari (Haryana)
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract- Segmenting an image to meaningful parts is a fundamental operation in imageprocessing. Image segmentation is the process of partitioning a digital image into multiplesegments. In this paper, various image segmentation methods are explained.
COMPARISON OF CRYPTOGRAPHY AND OTHER DATA HIDING TECHNIQUES
Abstract - Cryptography is a technique of secure communications between a sender and oneor more recipients. In this, sender scrambled a message (plain text into cipher Text) with thehelp of algorithm and the key and sends this message to recipient. Now recipientunscrambled the message (with the same algorithm and a key, which may or may not be sameas the sender’s key) into the original message (cipher text into the plain text). There are twomain kind of cryptography: Symmetric Key Cryptography (also known as private key orsecret key cryptography) and Asymmetric Key Cryptography (also known as public keycryptography). In our paper we are explaining about the cryptography, its different types,substitution methods, transposition methods and also focused on the different algorithms usedfor the symmetric and asymmetric key cryptography. We are also showing the comparison ofcryptography technique with other data hiding techniques like watermarking, steganographyand explaining which one is better for what kind of purpose.
ISSUES AND CHALNGES OF E- LEARNING
34
Manuscript Id: 21C036
JAGDEEP [email protected]
Department of Computer Science & Engineering,Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.
NEHA [email protected]
Assistant ProfessorDepartment of Computer Science & Engineering,
Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.
Manuscript Id: 21C042
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
Abstract- In the E-learning and E-learning, numerous universities and cultural organizationsaround the world have launched initiatives to develop tools for multilingual learning and webpublishing and have given preference to local content. India has different languages anddifferent culture. Most of the knowledge and information related to people, culture, scienceand philosophy of India is available in India languages, which will be useful for learning anddeveloping knowledge base. In India E-learning system and online courses are alreadystarted, but as a multi lingual country, which gives importance to education through regionallanguages, This paper cover the issues of Indian language knowledge base/content base, it’srequirement, and its implication in learning. An integrated multi lingual E-learning system forIndia is proposed in this paper, where importance given to multi lingual course contentcreation.
CRITICAL STUDY ON BIOLOGICAL NEURAL NETWORK & ARTIFICIALNEURAL NETWORK
Abstract - Artificial Neural Networks are inspired by human brain and it also provides newdirections and innovative approach in solving problems & wider the potential of computer’sprocessing. The purpose of this paper is to discuss about the Artificial Neural Networks &how it is linked to our biological neural network, its architecture & applications in modernworld. In applications, we will discuss about direct applications which includes patternclassification, associative memories, optimization, control applications and application areas.At last, we will critically study the performance comparison of human brain and ANN.
35
SAPNA YADAV
[email protected] Professor
Department of MBASomany (PG) Institute of Technology & Management,
Rewari- Haryana, India.
KRISHAN KUMAR
[email protected] of MBA
Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.
Manuscript Id: 21C038
VIRAT
[email protected] of Computer Science & Engineering
Somany(PG) Institute of Technology &Management,Rewari(Hry.)-INDIA
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
SWOT ANALYSIS OF E-COMMERCE
Abstract - This research paper describes the invention and accessibility of internetconnectivity and powerful online tools has resulted a new commerce era that is E-commerce,which has completely revolutionized the conventional concept of business. E-commercedeals with selling and purchasing of goods and services through internet and computernetworks. E-commerce can enhance economic growth, increase business opportunities,competitiveness, better and profitable access to markets. E-Commerce is emerging as a newway of helping business enterprises to complete in the market and thus contributing toeconomic success. In this research paper we will discuss about advanced SWOT analysis ofE-commerce which will comprise of strengths, weaknesses, opportunities and threats facedby e-commerce in current scenario.
IMPACT OF E – BANKING ON TRADITION BANKING SERVICE
Abstract- Internet banking is changing the banking industry having the major effect onbanking relationships. Banking is now no longer confined to branches were one has toapproach branch in person, to withdrew cash and deposit a cheque request a statement ofaccounts. In true internet banking any inquiry or transaction is processed online without anytime. Providing internet banking is increasingly become a “need to have” then a “nice tohave” service. The net banking thus, now is more of a norm rather than an exception in manydeveloped countries due to the fact that it is the cheapest way of providing banking services.This research paper will introduce you to E-Banking, giving the meaning, functions, types,
36
Manuscript Id: 21C039
PRITI
[email protected] professor
Department of MBASomany (PG) Institute of Technology &Management, Rewari- Haryana, India.
NISHA
[email protected] of MBA
Somany (PG) Institute of Technology & Management,Rewari- Haryana, India.
Manuscript Id: 21C040
SANTOSH
[email protected] of MBA
Somany (PG) Institute of Technology & Management,Rewari- Haryana, India.
SAPNA YADAV
[email protected] Professor
Department of MBASomany (PG) Institute of Technology & Management,
Rewari- Haryana, India.
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
advantages and limitations of E-Banking. It will also show the impact of E-Banking ontraditional services and finally the result documentation.
INVISIBLE COMMUNICATION OF SECRET DATA USING VISUALCRYPTOGRAPHY
Abstract- In this paper, we proposed a more secure method for Visual cryptography usingLeast Significant Bits (LSB) information hiding algorithm and based on this, quality will bemanaged by PSNR (Peak Signal to Noise Ratio) and MSE (Mean Squared Error). So mainlywhat we are going to do is that an effort has been made to propose and implement a newsteganography technique for images by modifying existing algorithms. This technique usesLSB steganography as our basis and disperses a secret message over the entire image takenby us to ensure that the secret message cannot be get from the image. When we compare withother existing algorithms, we can easily prove that the difficulty of decoding the proposedalgorithm is high. The system developed for hiding and extracting files based on the methodhas a wide range of adaptivity and good applicability.
37
Manuscript Id: 21C026
SUDHANSHU VASHISTHA
Assistant Professor
Department of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGYJaipur, Rajasthan, India
PIYUSH SHARMA, SUDHANSHUVASHISTHA
Assistant ProfessorDepartment of Computer Science &Engineering
ARYA INSTITUTE OF ENGINEERING ANDTECHNOLOGY
Jaipur, Rajasthan, India
ANCHAL JHAMB
Department of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGYJaipur, Rajasthan, India
MANISH CHOUBISA
Assistant ProfessorDepartment of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND
TECHNOLOGYJaipur, Rajasthan, India
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
SCTP: MULTIHOMING AND MULTISTREAM PROTOCOL
Abstract- SCTP (stream control transmission protocol) is a reliable message orientedtransport layer protocol. It is an IETF standard developed by the Transport Area WorkingGroup (TSVWG). SCTP has been standardized by the IETF(Internet Engineering Task Force)in series of RFCs ,as a reliable transport protocol to transport SS7(Signaling System 7)signaling messages for internet applications such as ISDN over IP, telephony signaling ,media gateway control, IP telephony[5]. SCTP is similar to TCP in many services. They areboth unicast connection-oriented reliable protocols, provide in-sequence packet delivery andcongestion control. SCTP preserves message boundaries and at the same time detects lostdata, and out of order data. It uses 32 bit checksum as opposed to a 16 bit checksum of TCP.Although TCP has traditionally been used, we argue that SCTP provides better services thanTCP in terms of reliability and performance. Due to its attractive features such as multi-streaming and multi-homing. SCTP has received much popularity, in terms of both researchand development [6, 7]. SCTP provides multi-homing in that endpoints can use multiple IPaddresses for the connection. SCTP may be more resistant to Man in The Middle (MITM)and Denial of Service (DoS). Multi-stream does not refer to multiple streams in the TCPsense but rather each stream represents a sequence of messages within a single association.These may be long or short messages which include flags for control of segmentation andreassembly.
38
Manuscript Id: 21C005
SYED YASMEEN [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
GULSHAN [email protected]
Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana
National Conference on Emerging Trends &Innovation in Computer and Communication
NCETICC-2013
2013
39
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id: - 21E006
AN EXTENSIVE ANALYSIS OF ELECTRO-MAGNETIC RADIATION FROM CELLPHONES AND THEIR BASE STATIONS AND THE ASSOCIATED HEALTH EFFECTS
ABSTRACT:-Cell phones have become our closest friend in the sense that we play with themfor hours in a park, footpath and bed or even in our office. But only a few numbers of peopleknow that sleeping with cell phone for more than 18-20 minutes is like sleeping with a snake. Itconstantly releases poison in the form of radiation. In 2013, it has been estimated that there willbe almost as many mobile-cellular subscriptions as people in the world which is around 6.8billion users (according to ITU), 55.8 cores alone in India (according to IBN Live News, India)and nearly 736K cell phone towers to meet the communication demand (according to Dot,India). The revised radiation norms adopted by DoT for 900Mhz,1800 Mhz and 2100Mhz bandare 0.45 W/m2,0.90W/m2 and 1.05W/m2 active from the date 01.09.2012 and SAR limit forhandsets is 1.6W/kg. All over the world, people have been debating about associated health riskdue to radiation from cell phone and cell tower. Radiation effects are divided into thermal andnon-thermal effects. Non-thermal effects are 3 to 4 times more harmful than thermal effects. Thepaper will present the mathematical analysis of radiation from handsets and cell towers and thehealth hazards due to it.
Manuscript id: 21E013
EXTENSIVE STUDY OF INFORMATION AND COMMUNICATION TECHNOLOGYIN THE LIFE OF A COMMON MAN IN INDIAN PERSPECTIVE
ABSTRACT:-Present paper reflects the impact of information and communication technologyin the life of an ordinary person in Indian perspective. The life as a common man have changedon the scale of employment opportunity, availability of the information, socio-political life andtheir economic empowerment besides the stake holders and corporate social responsibility forempowering the common man through the Impact of information technology and other variousperipheral discussion. The study shows the emergent need of information technology to enrichlife of a common man. In buzz words we may say that” for the sake of the nation, let’s hope thishappens sooner rather than later”.
S (PG) ITM Rewari Page 40
Raghu Yadav, Sharvan Kr.Dept. of ECE
S(PG)ITM, Rewari
Santosh DahalDepartment of Electronics & Communication
S(PG)ITM, Rewari
Rajiv DasDepartment of Electronics & Communication
S(PG)ITM, Rewari
Kavita YadavDept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id: - 21E005DESIGNING OF ENERGY EFFICIENT, NEED BASED HIGH SPEED WIRELESS
DATA TRANSMISSION AND RECEPTION USING VISIBLE LIGHT SPECTRUM(LI-FI)
ABSTRACT: With the advent of the information technology and its extensive utility in allprobable sphere, whole globe have seen the developmental changes and an efficient, transparent,manpower and energy saving system. Information communication technology provides us theconvenient transfer of the data and information from one place to another. As a matter of facttoday utility of Internet has made the revolution in the world .Whether it is a coffee shop, officesor at home. Speed of the internet is major issue. With the advent of technology,, communicationbecame the backbone of ICT. It had made our globe like a town. Today everyone (Business,institutions, organizations, entrepreneurs and individual) is thrust for getting right information atthe right time and right place .Which, requires fast internet connectivity, Technology and largespectrum of channels. Present paper reflects Designing of energy efficient, need based HighSpeed Wireless Data Transmission and Reception using visible light spectrum (Li-Fi)" whichmay affect all lives. It is a technology that may be as fast as 500MBPS (30GBPS per minute) analternative, cost effective and more robust and useful than Wi-Fi. The Visible lightcommunication which may be the future of Internet. A model for the same has been proposed inthe present research paper.
Manuscript id: - 21E012
COMPARATIVE STUDY OF GSM & CDMA
Abstract:-GSM stand for global system mobile .In the world 75% GSM used by the users.CDMA stand for code division multiple accesse. 25% CDMA used by the users. Bothtechnologies provide better services like multimedia message, video, high speed internet accessdigital camera these are some features that we can found on both technologies. GSM technologyis older as compare to CDMA but there are some difference features between GSM &CDMA. InGSM different frequency allocated to different user. In CDMA every use same frequency buthave different code.
S (PG) ITM Rewari Page 41
3 Prof.(Dr.) Y.P.Singh,(Director) ,S(PG) I.T.M. , Rewari , Haryana
2 Er. Deepak Sharma,Ph.D Scholar (ECE)
Faculty of Engg. & Tech.J.N.U. Jodhpur, Rajasthan
1. Er. Abhishek Haridas,Ph.D. Research Scholar,
Sunrise University,
Shruti NagarDept. of ECE
S(PG)ITM, Rewari
Ekta YadavDept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E002AN EFFECTIVE AND FEASIBLE COMMUNICATION LIGHT FIDELITY: VISIBLE
LIGHT COMMUNICATION (VLC)
ABSTRACT:-Visible light communication is a communication technology which uses light thatis visible to humans as a source of data transmission. This system is easy to access as well asharmless as compared to invisible light spectrum communication. In this article we have tried toilluminate about Visible light communication in brief. After a short introduction and historicaloverview, the technical details are described. Subsequently the most important fields ofapplications and future scopes of VLC system are presented.
Manuscript id:- 21E007INTEL HASWELL MICROPROCESSOR
ABSTRACT:- The main purpose of this paper is to let people know about a very new concept ofIntel Haswell. Intel has said that Haswell will deliver twice the performance of Ivy Bridge, andin some cases will double the battery life of ultra books, which are a new category of thin andlight laptops with battery life of roughly six to eight hours. Intel shed some light on Haswell atits Intel Developer Forum trade show in September, saying its power consumption had been cutto the point where the chips could be used in tablets. Haswell chips will draw a minimum of 10watts of power, while Ivy Bridge's lowest power draw is 17 watts. Intel has splintered futureHaswell chips into two families: 10-watt chips for ultra books that double as tablets, and 15-wattand 17-watt chips designed for other ultra books and laptops.
S (PG) ITM Rewari Page 42
HarishDept. of ECE
S(PG)ITM, Rewari
Amit.Dept. of ECE
S(PG)ITM, Rewari
Prof. (Dr.) Y.P. SinghDirector
S(PG)ITM, Rewari
Rohan Sharma,[email protected]
Kalika Kr.kalikamehra28@gmail
Aditi Agrawal, [email protected]
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id -21E010
IMPACT OF IMAGING TECHNOLOGIES ON HEALTH
ABSTRACT:- Imaging is becoming an increasingly important tool in both research and clinicalcare. The history dates back to 1895 when X-ray imaging came in the picture for the first time.After that there were significant advancements in imaging technology through the developmentslike Computed Tomography (CT)-Scan, Ultra sound, nuclear medicine and magnetic resonanceimaging (MRI). But the major concern in today’s world is about their health effects through theradiation. The radiation through them is very dangerous as they have ionizing effects on ourbody. The high-frequency radiation has enough energy to damage the structure of cells in thebody (including DNA) and has well-documented effects on human health like risk of cancer. Thethyroid gland and bone marrow are particularly sensitive to ionizing radiation, especially inchildren. The paper will include the discussion on high energy radiation through them and theassociated health effects on human body.
Manuscript id -21E015
AN EXTENSIVE STUDY OF ORTHOGONAL FREQUENCY DIVISIONMULTIPLEXING (OFDM) – A boon &backbone to WIRELESS COMMUNICATION
SYSTEM
ABSTRACT:-In the recent advancement communication techniques, OFDM have opened thedeveloped area for further research. Many advantages of OFDM over single carrier scheme is, itsability to cope with severe channel conditions such as attenuation of high frequency in a longcopper wire. OFDM is a multi-carrier modulation technique with densely spaced sub-carriersthat has gained a lot of popularity among the broadband community in the last few years. OFDMhas been shown to be an effective technique to combat multi-path fading in wirelesscommunications. It has been successfully used for HF radio applications. OFDM has chosen asthe standard for digital audio broadcasting and high-speed wireless local area networks. PresentPaper, including introduction to OFDM Modulation its advantages and demerits, and someapplications of OFDM, OFDM techniques for peak-to-average power ratio reduction (PAPR),time and frequency synchronization, and channel estimation will be discussed. We conclude witha brief overview of current application areas.
S (PG) ITM Rewari Page 43
VipinDept. of ECE
S(PG)ITM, Rewari
Lalit KumarDept. of ECE
S(PG)ITM, Rewari
Prof. (Dr.) Y.P. SinghDirector
S(PG)ITM, Rewari
Manjeet Kumar.Dept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id -21E014
PERFORMANCE ANALYSIS OF WIRELESS SENSOR NETWORK
ABSTRACT:-Wireless sensor network are networks that consists of sensors which aredistributed in ad hoc manner.These sensors work with each other to sense some physicalphenomenon and gathered information to get relevant result. Wireless Sensor network uses theprotocols which have a unique self-organizing capability. In this paper we analyze the difficultyfaced by wireless sensor network and their deficiencies as well their effectiveness.
Manuscript id -21E008
A SURVEY ON WIRELESS SENSOR NETWORK SECURITY
ABSTRACT:-The significant advances of hardware manufacturing technology have boosted thedeployment of Wireless Sensor Networks (WSNs).The WSN are used in many applications inmilitary, ecological, and health-related areas. These applications often include the monitoring ofsensitive information such as enemy movement on the battlefield or the location of personnel ina building. Security is therefore important in WSNs. However, WSNs suffer from manyconstraints, including low computation capability, small memory, limited energy resources andthe use of insecure wireless communication channels. These constraints make security in WSNsa challenge. In this article we present a survey of security issues in WSNs.
S (PG) ITM Rewari Page 44
Charan SinghDept. of ECE
S(PG)ITM, Rewari
Narender Singh.Dept. of ECE
S(PG)ITM, Rewari
Avinash RaiDept. of ECE
S(PG)ITM, Rewari
S.Grace DianaPG Scholar
SNS College of Technology
S.MohanPG Scholar
Nehru Institute of Technology
S.RamyaPG Scholar
Department of CSE-SE
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id -21E011WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES
Rahul yadav
Rahul yABSTRACT:- Wireless mesh networks have the potential to deliver Internet broadbandaccess, wireless local area net- work coverage and network connectivity for stationary ormobile hosts at low costs both for network operators and customers. The core technologyinvolves a network of wireless routers relaying each others’ packets in a multichip fashion.Many variations on targeted applications and implementation choices offer differentopportunities to emerging companies in this emerging area. In this article, we will present anintroduction to wireless mesh networks and present both the benefits enabled by this technologyand the main hurdles that have to be overcome.
Manuscript id:-21E003
GENERAL STUDY OF EMBEDDED SYSTEM AND ITS CRITICAL ASPECT
ABSTRACT:-An embedded system is generally a system within a large system. Modern car andtrucks contains many embedded systems. One embedded system controls ATM, Mobile Phones,Digital Watches, Traffic light Control, Digital Cameras. Even the general purpose personalcomputer itself is made up of numerous embedded systems. Keyboard, mouse, video card,modem, hard drive, floppy drive and sound cards are each an embedded system. Early embeddedsystem applications include unmanned space probes, computerized traffic lights and aircraftflight control systems. In the 1980s, embedded system brought microprocessors into every partof our personal and professional lives. Presently there are numerous gadgets coming out to makeour life easier and comfortable because of advances in embedded system. The paper will includethe general overview and principles of embedded system their applications, recent developments,future research and problems in the system.
S (PG) ITM Rewari Page 45
Rahul YadavDept. of Computer Engineering
S(PG)ITM,Rewari
S.SantoshDept. of ECE
S(PG)ITM, Rewari
Sourabh Dept. of ECE
S(PG)ITM, Rewari
Virat ManavDept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E004
E-LEARNING BASED ON CLOUD COMPUTING
ABSTRACT:- Education is an emerging practice and it includes various processes andassimilates government’s responsibilities at different levels and ventures of public and ruralsectors. These kinds of facilitation of different rural areas of India are extremely helpful toestablish good education in developing countries having inadequate resources with surplusmanpower and deficit finance .Wireless cloud computing, a collection of multiple wirelesscomputer interface through a digital network, is an excellent model for convenient which isbased on demand network access to share the configurable computing resources. Wireless cloudis used as a resources configuration for rural education in India to be presented in this paper. Theinteroperability between different components of the wireless cloud computing represents eachsegment of development of rural education such as e-learning, virtual classroom lectures-studycentre through proper balancing of teacher-student relational input of rural communication.Simultaneously e-schooling architecture especially for rural education is also presented throughwireless cloud computing taking each block as a distribution of a standard education equally. Aninteroperability of computing i.e. memory, bandwidth and processing capability essential for thecommunicative link between the teacher as sender and the student as receptor specially in India.A quaint based parallel computing simulation approach is also estimated to be presented forimplementation in the paper.
Manuscript id - 21E016
IMPACT OF DIGITAL MEDIA ON LEARNING
ABSTRACT: - Learning is continuous process which means experience of gaining of know-ledge or skill. It is a basic cognitive processes involved in obtaining and storing knowledge.Learning is acquiring new or existing knowledge and may involve synthesizing different types ofinformation. Learning is not compulsory but it is contextual. Teaching and learning is a bipolarprocess in which learner is on one pole and teacher is on other. The methodology of digital mediacan change the level and gravity of learning. Now days we find a wide gap between the ancientand present teaching life process due to the new advance technology and the methodology of
S (PG) ITM Rewari Page 46
Anita Sharma
Department of CSES(PG)ITM,Rewari
Vikram Soni Dept. of ECE
S(PG)ITM, Rewari
S.Santosh B.Tech-7th Sem, ECES(PG)ITM, Rewari
BhavyaDept. of ECE
S(PG)ITM, Rewari
VijayDept. of ECE
S(PG)ITM, Rewari
VikashDept. of ECE
(PG)ITM, Rewari
Ajay SinghDept. of ECE
S(PG)ITM, Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
learning. Present paper exhibits the importance of digital media on learning.
Manuscript id -21E001
INNOVATION IN 4G TECHNOLOGIES
ABSTRACT: 4G is the term used to refer to the next wave of high-speed mobile technologies thatwill be used to replace current 3G networks. The two top contenders are LTE and WiMAX, bothof which are IP based networks that are built from similar, yet incompatible, technologies. Sprintand Clearwire are currently offering 4G WiMAX service in the USA, while Verizon and AT&Thave committed to the use of LTE and are trialing their own 4G networks.The purpose of thispaper is to : Clarify the contents of 4G from a technology perspective, present business benefitsof 4G enabled services and its Future growth
Manuscript id:-21E018
WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES
ABSTRACT: In the modern era mobile phones are basic need of every person as these are thefastest and the easiest medium of communication. The charging of mobile phone batteries hasalways been a problem. Battery lifetime is dependent of the manufacturer Company and alsoprice of phone. Many people complain that their phone’s battery doesn’t have long life-time andthey have to charge it several times in a day. To overcome this problem wireless charging ofmobile phones using microwaves is a very important and useful technique. With this techniqueyou can use your mobile phone without thinking about the battery stand by. This techniqueworks on microwaves. Microwave is sent with the message by the transmitter using antenna atthe frequency of 2.45GHz. There are some additions in mobile phone to apply this technique as asensor, a rectenna circuit and a filter. With this technique the need for separate chargers formobile phones is eliminated and makes charging universal. Thus the more you talk, the more isyour mobile phone charged.
S (PG) ITM Rewari Page 47
Ankur [email protected]
Swati [email protected]
VineyDepartment Of ECES(P.G)ITM,Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E019
Li- Fi TECHNOLOGY
ABSTRACT: Li-Fi (Light-Fidelity) is communication technologies which use light bulbs orLED to transferring data. It uses light as a carrier instead of traditional radio frequency as in Wi-Fi. Its data transferring speed is 10Gbps. Wireless radio frequencies are growing highly, so thatinterference in RF is continued to grow. To overcome this problem in future the Li-Fi (Light –Fidelity) technology came into existence since 2011.Li-Fi .This paper will be focus on Li-Fitechnology and its future scope
Manuscript id:-21E020
AN APPROACH TO SPEECH RECOGNITION - CHALLENGES & CONCEPT
ABSTRACTSpeech is an important, basic, common and efficient form of communication method forinteracting each other. Speech technology and systems in human computer interaction havewitnessed a stable and remarkable advancement over the last two decades. When we talk aboutuser friendly system, speech recognition system comes in the front position. Today, speechtechnologies are commercially available for an unlimited but interesting range of tasks. Thesetechnologies enable machines to respond correctly and reliably to human voices, and provideuseful and valuable services. Recent research concentrates on developing systems that would bemuch more robust against variability in environment, speaker and language. Error continuousSpeech recognition system is still the topic of research and talk of the world, more preciselyamong research scholars ,hence today’s researches mainly focus on ASR systems with a largevocabulary that support speaker independent operation with continuous speech in differentlanguages. This paper gives an overview of the speech recognition system and its recentprogress. The primary objective of this paper is to compare and summarize some of the wellknown methods used in various stages of speech recognition system.
S (PG) ITM Rewari Page 48
ShilpaM. tech, ECE, S (PG)[email protected]
MonikaM. tech, ECE, S (PG)[email protected]
Aswin Tilak Research Scholar
Jodhpur National UniversijtyJodhpur
Email:[email protected]
Prof. (Dr.) Y.P.Singh Director, S(PG)ITM, RewariAffiliated to MD University
Email:[email protected]
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E025
PATCH AND SLOT FOR ANTENNA DESIGN
ABSTRACT- Patch and slot has become a very important in modern wireless communicationantennas. Patch and slots are being used for performance improvement of antenna in wirelesscommunication. Keeping the above fact in mind we had tried to present a complete review onpatch and slots antennas .it has been analyzed in detail, In different size and shapes of slots andpatch are great interest of obtaining optimum results of antenna design , in order to allow theiruse in communication application.
Manuscript id:-21E022
AN EXTENSIVE STUDY OF “WIRELESS POWER TRANSMISSION– A NEXT GENERATION POWER TRANSMISSION SYSTEM
ABSTRACT:- Presently, we present the concept of transmitting power without using wires i.e.,transmitting power as Beneficial as well need based next generation power transmission system.Wireless power transmission Transfer the power from one place to another is in order to reducethe transmission and distribution losses. We also have discussed the technological developmentsin Wireless Power Transmission (WPT). The advantages, disadvantages, biological impacts andapplications of WPT are also presented. Witricity is nothing but the short name of WirelessElectricity. The basic concept behind this is Magnetic Resonance. Two resonant objects of thesame resonant frequency tend to exchange energy efficiently, while dissipating relatively littleenergy in extraneous off-resonant objects. In systems of coupled resonances, there is often ageneral “Strongly Coupled” regime of operation. If one can operate in that regime in a givensystem, the energy transfer is expected to be very efficient. Keeping in view, the need of the hourand nation , let it should happen sooner than later.
S (PG) ITM Rewari Page 49
Meenakshi Saini, Nitin Kathuria & V.K. PandeyM.Tech. Student, Dept. of Elec. & Comm., NIET, Greater Noida
Assistant Professor, Dept. of Elec. & Comm., AIMT, Greater NoidaProfessor, Dept of Elec. & Comm., NIET, Greater Noida
Prof. Yash Pal SinghProfessor & DirectorS.(P.G.)I.T.M.,Rewari
Er. Lince Mathew,Ph.D. Scholar
Jodhpur National University Jodhpur, Rajasthan
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id -21E009AN EXTENSIVE ANALYSIS OF CLOUD COMPUTING AND THE ESTIMATION OF
ENERGY CONSUMPTION IN FUTURE
ABSTRACT:- Cloud computing has recently emerged as a new paradigm for hosting anddelivering services over the Internet. Cloud computing is attractive to business owners as iteliminates the requirement for users to plan ahead for provisioning, and allows enterprises tostart from the small and increase resources only when there is a rise in service demand. Thetotal energy consumption of the wireless cloud is estimated to be between 32 Terawatt hours(TWh) (Lo scenario) and 43 TWh (Hi scenario) in 2015.For comparison, also included is anestimation of the 2012 wireless cloud energy consumption (9.2 TWh) based on demand figuresfor that year. This is an increase of 390% to 460% over 3 years. In this paper, we present asurvey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as challenges and energy demand.
Manuscript id:-21E021
A CPW FED WLAN NOTCHED C-SLOTUWB ANTENNA
ABSTRACT:- A printed, compact, coplanar waveguide fed UWB antenna is presented. Thesalient feature of the antenna is the inherent property of the design to reject the potentialnarrowband interferer WLAN system which operates within 5-6 GHz of frequency band. Theantenna is 26mm X 26mm in dimension on FR4 substrate. Antenna has a triangular ground withC-shaped slot in the T shaped radiating patch. The C shaped slot is responsible for the notchcharacteristics of antenna. The simulated results are fairly good in the desired band(3.1-10.6GHz) of operation.
S (PG) ITM Rewari Page 50
Karan Saini, Avinash YadavDepartment Of ECES(P.G.)I.T.M., Rewari
Santosh Dahal Department Of ECES(P.G.)I.T.M., Rewari
1Vartika Tyagi, 2Nitin Kathuria & 3V.K. Pandey1M.Tech. Student, Dept. of Electronics & Communication, NIET,
Greater Noida2Assistant Professor, Dept. of Electronics & Communication, AIMT,
Greater Noida3Professor, Dept of Elec. & Comm., NIET, Greater Noida
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E023CHALLENGES, PROBLEMS & FUTURE SCOPE OF WIRELESS SENSOR
NETWORK
ABSTRACT:- Sensor networks offer a powerful combination of distributed sensing, computingand communication. They provide countless applications and, at the same time, offer numerouschallenges due to their peculiarities. The distinguishing traits of sensor net- works have a directimpact on the hardware design of the nodes at least four levels: power source, processor,communication hardware, and sensors. Various hardware plat- forms have already beendesigned to test the many ideas spawned by the research com- munity and to implementapplications to virtually all fields of science and technology. Sensor networks offer a powerfulcombination of distributed sensing, computing and communication. We will discuss about thechallenges, problem & future scope of wireless Sensor network.
Manuscript id:-21E024COMPARISION BETWEEN ZIGBEE & BLUETOOTH
Abstract—Zigbee is an alternative device to Bluetooth. Zigbee adopted IEEE 802.15.4 as its physicallayer & medium access protocol . Zigbee technology is simple and low cost wireless communication &networking solution. It standard is wireless mesh networking. It transmits data over longer distance. It isused in application that requires a low data rate long battery life secure networking.
S (PG) ITM Rewari Page 51
Nilmani Bharti, Anup GuptaDepartment Of ECES(P.G.)I.T.M., Rewari
Akash Chauhan, Shalini Department Of ECES(P.G.)I.T.M., Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E027PERFORMANCE OPTIMIZED OF RAYLEIGH WIRELESS CHANNEL WITH
DIFFERENT EQUALIZERS
ABSTRACT:-The paper presents an overview of some important behaviors of equalizer usingdiverse transmitter and receiver antenna systems under Rayleigh channel environments. Allanalysis has been performed under ideal identical independent fading conditions with the help ofMATLAB. In this paper, implementations of different equalizers are also verified for theimprovement of the BER performance. MIMO fading channels are correlated to observe mutualcoupling between antenna elements. Receiver diversity is analyzed especially with the MaximalRatio Combining (MRC) technique and fair comparison is done with Equal Gain Combining(EGC) and Selection- Combing (SC). Further study is done with integration of MaximumLikelihood (ML), Maximum Mean Square Equalization (MMSE) and Zero Forcing (ZF). All theresults obtained are simulated by using the MATLAB, under Rayleigh channel conditions.
Manuscript id:-21E028
STEGANOGRAPHY: - A TECHNIQUE TO HIDE DATA
ABSTRACT: - Steganography is a process of hiding a message in such a way that someonecan’t know the presence of or content of hidden message.The main purpose of steganography isto maintain secret communication between two parties (Sender to Receiver).This paper willshow how steganography is used in (past and present) context understanding of what issteganography and how it can be accomplished with the help of cryptography.
S (PG) ITM Rewari Page 52
Abhilash Saurabh 1, Tazeem Ahmad Khan2 V.K.Pandey 3
1M.Tech Scholar, Department of ECE, NIET, MTU, U.P2Dept. of ECE, AFSET, MD University, Rohtak, Haryana
3Department of ECE, NIET, Gr. Noida, MTU, [email protected], [email protected]
Rachana Kumari, Sheetal Lamba, Rahane PappuDepartment Of ECES(PG)ITM,Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E029
THE OSI REFERENCE MODEL
ABSTRACT:-The International Organization for Standardization (ISO) recognized this And researchedvarious network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) referencemodel. The OSI reference model has standards which ensure vendors greater compatibility andinteroperability between various types of network technologies. The OSI reference model organizesnetwork functions into seven numbered layers.
Manuscript id:-21E030
VISIBLE LIGHT COMMUNICATION
ABSTRACT:-The idea of using light as a communication medium has started with VLC.Here VLC (visible light communication) uses white Light Emitting Diode (LED),which senddata using light at a high speed, which human eyes can’t detect, and a high data rate is achieved(at 100 mbps). LED’s have ability to transfer data signal over freq. 400THz – 800THz andwavelength of 400nm to 700 nm range, which is well suitable for communication medium. Onthe detailed investigation of VLC research, founds that not the no. of research has been done todevelop and utilize this technology for communication use. But the research area is new as VLC,the possibilities are widely open.
S (PG) ITM Rewari Page 53
Sachin Tyagi, Kshitiz VermaDepartment Of ECES(PG)ITM,Rewari
Ravindra Kumar, Rahul GuptaResearch Scholar
Department Of ECES(PG)ITM,RewariS(PG)ITM,Rewari
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21E026
EFFECT OF MOBILITY ON SERVICE FLOWS IN WIMAX NETWORK
Abstract- IEEE 802.16 standard WiMAX (Worldwide Interoperability for Microwave Access) isan attractive alternative to leasing lines from current ISPs or the deployment of new fibernetworks. In this paper a scenario is designed using the QualNet 6.1 simulation package. Thispaper presents a novel approach for performance evaluation of different quality of services asdemanded by evolving applications in the Internet. Important performance metrics considered forthe study are total message received, end to end delay, average jitter and average throughput.
Manuscript id:-21C044
ESCALATION OF INTERNET IN INDIA
Department of Computer Science & engineeringSomany (PG) Institute of Technology & Management, Rewari(HR)-India
Abstract:The Internet today connects more than two billion people worldwide. In this paper we representing the
growth of web users. The Internet already has immense impact on the global economy, contributing an
estimated $1.7 trillion, or just fewer than 3 percent, of global GDPin 2010.Yet half the number of Internet
users lives outside the advanced economies, often in countries thatare quickly developing, have
significant economic potential and are socially and culturally diverse. India has about 120 million people
online today and offers a striking example of the Internet’s growth potential. Indiais adopting the Internet
at a much more rapid pace than advanced economies and even many developing economies, yet 90
percent of its population is currently not connected.India’s base of about 120 million Internet users is
currently the third-largest in the world.India is likely to have the second-largest user base in the
world, and the largest in terms of incremental growth, with 330 million to 370 million Internet
users in 2015.
S (PG) ITM Rewari Page 54
Avni KhatkarUniversity Institute of Engineering and Technology
Maharshi Dayanand University, Rohtak, IndiaEmail- [email protected]
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
Manuscript id:-21C045
INTERNET AS A COMMUNICATION TOOL
Abstract - When looking at the social phenomenon that is arising from the use of Internetcommunications tools, one must consider the properties of the tool that influence human-to-human interaction. The availability of communication through the internet has broughtphenomenal resources into the lives of anyone connected to it.The exciting result is thatcollaborating communicating, and learning is accessible (24x7) around the world. Educators andclassrooms can reach beyond physical boundaries to communicate and share through the use of avariety of tools. These generally fall into two categories, asynchronous and synchronous. Thispaper presents a number of such properties and discusses their importance. In addition, existingInternet communications tools are described both in general and with respect to the properties.
S (PG) ITM Rewari Page 55
PRITI YADAV
[email protected] Professor
Somany (P.G) Institute of Technology &Management
SAPNA YADAV
[email protected] Professor
Somany (P.G) Institute of Technology &Management
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
HOW DATA MINING AND KNOWLEDGE DISCOVERY ARECOUNTERPARTS OF EACH OTHER
Abstract: Data mining and knowledge discovery in databases have become a hot area ofresearch. The amount of data doubling every three years has lead to the rise of new technologies.The paper provides an overview of this emerging field clarifying how data mining andknowledge discovery in databases are related to each other. The paper contains both research andpractice of data mining and knowledge discovery, surveys and tutorials of important areas andtechniques, and detailed descriptions of significant applications. The Coverage includes: Theoryand Foundational Issues, Data Mining Methods, Knowledge Discovery Process, ApplicationIssues.
TCP CUBIC- CONGESTION CONTROL TRANSPORTPROTOCOL
Abstract- This paper enlightens the network congestion and how TCP CUBIC- A variant oftransport control protocol (TCP) increases the performance of congestion control mechanism in along fat network. The paper also presents the algorithm used in LINUX for changing thecongestion window to cubic function. We have also tried to analyze the various advantages ofTCP CUBIC as well as some of its limitations.
Manuscript id:-21C046
S (PG) ITM Rewari Page 56
Manuscript Id: 21C043
VERSHA TOMER
[email protected] of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
SHRUTI JAIN
[email protected] of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Manuscript Id: 21C006
GULSHAN AMIN GILKAR SYED YASMEEN SAHDAD [email protected] [email protected] Department of CSE Department of CSE SITM. SITM.
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
INTERNET PROTOCOL
PARUL
[email protected] of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Abstract: In this research, we are summarizes about internet protocol. This functionality dealswith abstraction according to the working procedures of the internetworking .In this we simulates, all the layers of internet protocols ,and then specifies how data must be send ,receives fromsource to destination ,and discuss about connecting various independent networks.
Manuscript id:-21C047
A COMPARISON BETWEEN FOUR MODELS OF SOFTWARE ENGINEERING
RUPALI BHARDWAJ
[email protected] of Computer Science & Engineering
Somany Institute of Technology and Management, Rewari
Abstract-Software Development Process also known as SDLC are imperfect models as theycannot be built with mathematical and physical certainty. This research deals with importantissues in computer world. It is concerned with Software management process that examines thearea of development models known as SDLC. It represents four of the development modelsnamely, waterfall, Iterative Waterfall, Prototyping and spiral models. These models haveadvantages and disadvantages as well. Therefore, the main objective of this research is torepresent different models of software development and make a comparison between them toshow the features and defects of each model.
Manuscript id:-21C048
S (PG) ITM Rewari Page 57
National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013
2013
SECURITY OF WIRELESS SENSOR NETWORK
NARESH KUMAR
[email protected] Institute of Technology and Management
Rewari(HR.) INDIA
Abstract : Wireless Sensor Networks (WSN) is an emerging technology and day by day it isattracting the attention of researchers with its challenging characteristics and diversifiedapplication domain. The more researchers try to develop further cost and energy efficientcomputing devices and algorithms for WSN, the more challenging it becomes to fit the securityof WSN into that constrained environment. However, security is crucial to the success ofapplying WSN. So, familiarity with the security aspects of WSN is essential before designingWSN system. This paper studies the security problems of WSN based on its resource restricteddesign and deployment characteristics and the security requirements for designing a secureWSN. Also, this study documents the well known attacks at the different layers of WSN andsome counter measures against those attacks. Finally, this paper discusses on some defensivemeasures of WSN giving focus on the key management, link layer and routing security.
Manuscript id:-21C049
STEGANOGRAPHY- A DATA HIDING TECHNIQUE
ABHAY GAUTAM
[email protected] Institute of Technology and Management
Rewari(HR.) INDIA
Abstract - Steganography is a process of hiding a message in such a way that someone can’tknow the Presence of message or content of hidden message.It serves better way of securingmessage then cryptography which only derive the content of message not the existing ofmessage.The main purpose of steganography is to maintain secret communication between twoparties( i.e Sender to receiver).In this paper we have tried to elucidate how digital Images can beused as a carrier to hide message.This paper also analyses the performance of steganographytools.Steganography is useful tools that allows convert transmission of information over thecommunication channel.This paper also describes the advantage of Steganography overcryptography.
S (PG) ITM Rewari Page 58