NATIONAL CONFERENCE IN SOMANY ENGINEERING COLLEGE(NCETICC- 2013)

58
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013 1

Transcript of NATIONAL CONFERENCE IN SOMANY ENGINEERING COLLEGE(NCETICC- 2013)

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

1

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

2

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

3

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

4

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

5

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

6

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

7

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

8

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

9

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

10

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

TECHNICAL ADVISORY COMMITTEESr.no Name Designation E-mail Id Contact No.

1. Prof.(Dr.) SP Khatkar

Director, UIET , MDU [email protected] 9813805666

2. Dr. H.L.Verma

(Dean Academic & Administration, Satya Apeejy University)

[email protected] 9896272466, 9896272433

3. Neha Gupta CSE, S(PG)ITM [email protected] 9467848147

4. Dr. Pramod Kumar

HOD DTU, Bawana , Delhi [email protected] 9013353272

5. Dr. YashPal Singh

Director C.D.L Engg College,Sirsa

[email protected] 9416490800

6. Dr. C.Ram Singla

Advisor, S.(PG).I.T.M [email protected] 9354515505

7. Dr.M L Chandna

Professor,D.T.U,Delhi [email protected] [email protected]

9416738460

8. Prof.(Dr.) Executive Council [email protected] 9868263761

11

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

N.K. Gupta Member,ISTE,New Delhi

9. Col. Prof. B.BSharma

Advisor & Consultant Education Group

[email protected] 9811026636, 9654176405

10. Prof. H.S Panwar

HOD ECE , RD Foundation, Moidinpur, Gaziabad

[email protected] 9927237874

11. Dr. D. Tyagi St. Anne Mary Organization

[email protected] 9891227478

12. Dr. Prof. YP Singh

Director, S(PG)ITM [email protected] 9896582698

13. Prof.(Dr.) R. Murugesan

Ex-VC Anna University,presently Chairman ISTE, Delhi

[email protected] 9443317930

14. Dr. Anup Pradhan

Director Research, Sunrise University, Alwar

[email protected] 8003094326

15. Dr. MN Hoda Director, Bharatiya Vidhya [email protected] 9212022066

16. Prof. MaheshBundele

Director Research, Poornima University, Alwar

[email protected] 9828999440

17. Prof. K. Kr. Keshariwal

HOD ECE, S.(PG).I.T.M [email protected] 8755160157

18. Dr. SC Tyagi Council Member, ComputerSociety Of India, Gaziabad

[email protected] 9811054645

19. Sh. Vikash Bharati

MD Gate Forum,Delhi [email protected] 9910255155

20. Sh. Neeraj Techmentro, Noida [email protected] 9958139080

21. Ravi Gupta Director of BMG Group [email protected] 9812051441

22. Dr. S. Basil Gnanappa

Executive Secretary ISTE [email protected]

011-26513542, 26513615

12

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

23. Dr. DevenderSinghj

Director State Institute of Engg. & Tech.

[email protected] [email protected]

9416012060

24. Vipin Singh Registrar RBIT, Bijnor [email protected] 9756030888

25. Nitin Kumar HOD ECE, Niit Vazirabad, Bijnor

[email protected] 9634080396

26. Abhay Raj Singh

Well Growth Education [email protected] 99710213309457610612

27. Raman Soni Director curriculum( Dev) [email protected]

28. Mr V Sharma Jagannath University viveksharma@jagannathuniversi 9414443034

29. Prof.(Dr)N.S.Gill

Director DDE, MDU,Rohtak [email protected] 9050805136

30. Prof.(Dr.) D. Kumar

HOD, GJU, Hisar [email protected] 9467690800

31. Col. K.C Bhardwaj

President IETE Delhi section

[email protected] 9873279796

32. Dr. Rajeev Yadav

HOD, CSE, GCE ,Bilashpur,Gurgaon

[email protected] 9416133666

34. Dr. Rakesh Kumar Gill

( HOD,GITM, Gurgaon) [email protected] 9355025077

35. Ms. Deepti Bali

Aroma Technology [email protected] 9889260194

36. Mr. Ishan Seth

Dy. HOD, KLSIT, Bijnor [email protected] 9889260194

37. Mr. Pushpender

Dean Academic, S(P.G)ITM, Rewari

[email protected]

8059335388

38. Dr. Sohan Garg

Director C.C.S. University, Meerut (UP)

[email protected] 9536744002

39 Mr. Aakash Gupta

McKinsey & Co. [email protected] 9999675155

13

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

TECHNICAL SESSION COMMITTEE-1

Technical Session Track A-Data communication

14

Sr. No Name Designation

1 Dr.M L Chandna Professor,D.T.U,Delhi

2 Mr.Manish CMC Noida

3 Prof. Krishna Kr. Keshariwal HOD ECE, S.(PG).I.T.M

4 Dr. Anup Pradhan Director Research, Sunrise University, Alwar

5 Prof.(Dr.) N.K. Gupta Executive Council Member, ISTE, New Delhi

6 Prof. Raman Soni Director curriculum Development

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

TECHNICAL SESSION COMMITTEE-2

Technical Session Track B-Computer Communication

Sr.no Name Designation

1 Col. Prof. B.B Sharma Advisor & Consultant Education Group

2 Dr. YashPal Singh Director C.D.L.U Engg. College, Sirsa

3 Ms. Neha Gupta CSE, S(PG)ITM

4 Sh. Vikash Bharati MD Gate Forum,Delhi

5 Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad

15

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

6 Mr. Sandeep Jain Jain computers Rewari

HIDING IMAGE IN AUDIO USING DWT AND LSB

Abstract -- The issue of important information hiding preoccupied the minds of many peopleespecially in business, military and political fields due to the secrecy of their information.Thus, there were always secret means and methods that were pursued to send suchinformation. Later on the spread of internet, information can be sent easily and quickly .Still,at the same time the sent data was easily intercepted and uncovered by hackers. Researchersand scientists have made a lot of research work to solve this problem and to find an effectivemethod for image hiding .The proposed system aims to provide improved robustness, securityby using the concept of DWT (Discrete Wavelet Transform) and LSB (Least Significant Bit)proposed a new method of Audio Steganography. The emphasize will be on the proposedscheme of image hiding in audio and its comparison with simple Least Significant Bitinsertion method for data hiding in audio.

WIRELESS SENSOR NETWORK: SUSPICIOUS NODE DETECTION BY SIGNALSTRENGTH IN WSN

Abstract- A wireless sensor network is a collection of nodes organized into a cooperativenetwork. The more modern networks are bi-directional, also enabling control of sensoractivity. The development of wireless sensor networks was motivated by military applicationssuch as battlefield surveillance; today such networks are used in many industrial andconsumer applications, such as industrial process monitoring and control, machine healthmonitoring, and so on. WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. In this paper we have explained the architecture of Wireless

16

Manuscript Id: 21C001

NIDHI [email protected]

Assistant professor in Department of Computer EngineeringThe Technological Institute of textile & Sciences, Bhiwani

Haryana, India

NEHA [email protected]

Department of Computer Engineering,The Technological Institute of Textile & Sciences Bhiwani

Haryana, India.

Manuscript Id: 21C009

1RISHI VERMA 2 SUNNY 3PUSHPENDER [email protected] [email protected] [email protected] Department of CSA Department of CSA Department of CSECDLU,Sirsa(Haryana)-India CDLU,Sirsa(Haryana)-India Assistant Prof.(SITM,Rewari)-HR

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Sensor Network, its comparison with mobile ad-hoc network, various topologies used inWSN , challenges and how to detect the suspicious nodes in Wireless Sensor Network.

TESTING OF OBJECT-ORIENTED PROGRAMMING SYSTEMS (OOPS)

Abstract- The aim of this paper is to examine the testing of Object-Oriented ProgrammingSystems (OOPS) and to compare and contrast it with the testing of conventionalprogramming language systems. Conventional system testing, object-oriented system testingand the application of conventional testing methods to object-oriented software will beexamined, followed by a look at the differences between testing of conventional (procedural)software and the testing of object oriented software.

ENERGY EFFICIENT WIRELESS COMMUNICATION

Abstract -The explosive growth of high-data-rate applications is leading to more and moreenergy consumption in wireless networks to guarantee quality of service. Telecommunicationnetworks consume increasing amount of energy and contribute a growing fraction to the CO2emissions of ICT industry, and are responsible for approximately 2% of the global energyconsumption. Reducing energy consumption in wireless communications has attractedincreasing attention recently. As data traffic continues to grow due to the proliferation ofsmart phone devices, reducing greenhouse emission by improving the network energyefficiency is becoming increasingly important. Therefore, energy-efficient communicationshave been paid increasing attention under the background of limited energy resource andenvironmental- friendly transmission behaviors. Thus, climate and cost issues now shift theresearch focus of wireless communications to energy consumption and energy efficiency. Inthis article, basic concepts of energy-efficient communications are first introduced and thenexisting fundamental works and advanced techniques for energy efficiency (EE) are

17

Manuscript Id: 21C019

GARIMA [email protected]

M.Tech (CSE) Ist SemesterSomany (PG) Institute of Technology &

Management, Rewari

NEHA [email protected]

Assistant ProfessorDepartment of Computer Science & Engineering,

Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.

Manuscript Id: 21C004

ANITA [email protected],

Department of Computer Science & EngineeringSomany Institute of Technology & Management (PG), Rewari, Haryana

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

summarized, including information-theoretic analysis, orthogonal frequency division multipleaccess (OFDMA) networks, multiple-input multiple-output (MIMO) techniques, relaytransmission, and resource allocation for signaling. Some valuable topics on energy-efficientdesign are also identified for future research.

FACIAL IMAGE RECOGNITION USING DIMENSIONS REDUCTIONSTECHNIQUES PRINCIPLE COMPONENTS ANALYSIS

Abstract—Face recognition is one among the several techniques for identification andverification of an individual. The approach in the present work transforms face images into asmall set of characteristic feature images called eigenfaces, which are the principalcomponents of the initial training set of face images. Recognition is performed by projectinga new image into subspace spanned by eigenfaces, followed by computing the distancebetween the resultant position in the face space and those of known face classes.

REVIEW ON CRYPTOGRAPHY

Abstract: Cryptography is a technique used in day today life for security and protection ofconfidential information. Cryptography is where security engineering meets mathematics. Inthis paper I am discussing modern cryptography algorithms that heavily based on computerscience practice and mathematical theory, making such algorithms hard to break in practiceby any adversary. These algorithms include various Secret key cryptography, public keycryptography algorithms.

18

Manuscript Id: 21C010

SUNNY [email protected]

Lecturer , Dept of CSELoard Krishna Polytechnic, Rohtak

RISHI [email protected]

Assistant Professor, Dept of CSES. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C033

Ekta [email protected]

Department of Computer ScienceSomany Institute of Technology and Management

Haryana (Rewari)

Sangeeta [email protected]

Department of Computer Science Somany Institute of Technology and Management

Haryana (Rewari)

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

JAVA – AN EMERGING FIELD FORWEB APPLICATION DEVELOPMENT IN SAP USINGWEBDYNPRO

Abstract:- In this paper it is going to be discussed the differences between two existingWebDynpro techniques – SAP WebDynpro for ABAP and SAP WebDynpro for JAVA. Bothhave their own pros and cons. So the decision to choose one is best to leave upon theorganizations depending upon the need, suitability and business circumstances. WebDynprois SAP’s own strategic model to create and develop web-based UI applications. Based on thefoundation of MVC architecture, it separates the Model, View and Controller which means itkeeps apart the backend data from user interface and processing logic. Since all the three areindependent so, three developers can work together on the same application which can laterbe merged via interface. WebDynpro has been classified into two UI Technologies –WebDynpro ABAP and WebDynpro JAVA. Both these domains are integrated with runtimeand graphical environment comprising special UI elements which help in building anattractive UI and minimize the coding effort.

ANALYSIS OF WORLD WIDE WEB

19

Manuscript Id: 21C034

PARAS [email protected]

Computer Science Engineering Department,Arya College of Engineering & Research Center,Jaipur, India

Manuscript Id: 21C032

RISHI [email protected]

Assistant ProfessorDepartment Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology & Management,Rewari- 123401.

SUNITA [email protected]

Department Of Computer Science & EngineeringSomany (P.G.) Institute Of Technology & Management,

Rewari- 123401.

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract- The World Wide Web or WWW or W3, commonly known as the web is a system ofinterlinked hypertext documents accessed via the Internet. The W3 project merges networkedinformation retrieval and hypertext to make an easy but powerful global information system.This paper gives the brief introduction of the World Wide Web. This paper defines WorldWide Web, working of World Wide Web. It also focuses on the application of the World WideWeb and the need of World Wide Web. W3’s ability to provide implementation-independentaccess to data and documentation is ideal for a large HEP collaboration. W3 now defines thestate of the art in networked information retrieval, for user support, resource discovery andcollaborative work.

DESIGN AND DEVELOPMENT OF ROUTING PROTOCOLS IN WIRELESS MESHNETWORK

Abstract-- Wireless Mesh Networks (WMN’s) are self Configuring and self Organizingnetworks. Routing in WMS’s is very important issue. For routing purposes Several Routingprotocols have been developed. Due to Dynamic network conditions, routing is the mostcritical part in WMN’s and need to be optimized. The routing strategies developed forWMN’s must efficient to make it an operationally self configurable network. This paperresponds the design consideration to develop a routing protocol keeping the issue ofperformance for WMN’S. In this paper, we have explained the routing challenges design andcriteria concepts for developing a new routing protocol in WMN’s.Here, we have discussedthe key design features for Routing in wireless Mess Networks. Thus, this paper will help toguide the refocus future works in this area.

INTRODUCTION TO CLOUD COMPUTING: A REVIEW

20

Manuscript Id: 21C035

ANITA [email protected]

Department of Computer ScienceSomany Institute of Technology and Management

Haryana (Rewari)

RASHMI SHARMA

Department of Computer Science & EngineeringSomany Institute of Technology & Management (PG), Rewari,

Haryana

Manuscript Id: 21C028

ANJALI

[email protected] of Computer Science & EngineeringSomany Institute of Technology & Management

Rewari, Haryana, INDIA

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract – This paper describes the cloud computing, system and applications .The term“Cloud Computing” has been mentioned for recent few years. It is basically related toprovide a relation between services and users connected through the internet. The main logicbehind the Cloud computing is “Renting instead of buying IT services”. Cloud Computingbecomes a buzz word not only for start-ups but also for the large companies. These largecompanies organize international activities over cloud. Cloud Computing allow to access anyIT service and software present on the cloud.

DIGITAL IMAGE WATERMARKING USING DWT-DCT- VITERBI ALGORITHM

Abstract: Watermarking is a need of digital media. To protect from copyright violation oforiginal media, digital watermarking has been proposed as valid solution for this problem.Watermarking using combined DWT-DCT method is done. It improves the parameters likePSNR, bit error ratio. The purpose of the watermark is to embed some additional informationabout the digital data without visibly modifying it. To make watermarked image moreimmune to attacks during communication channel, Viterbi algorithm is used. The Viterbialgorithm finds the most likely string of text given the acoustic signal. But in our work viterbialgorithm will be used in image watermarking because it is most error correcting algorithmwhich is having comparable complexity. Viterbi decoding is used in transferring of data overnoisy channel in digital communication. This makes image less prone to errors and a fastdecoding method also.

21

Manuscript Id: 21C027

ABHISHEK GUPTA

[email protected] Professor

Department of ECE,Geeta Engineering College,Panipat

NEHA GUPTA

[email protected] Professor,Department of CSE

S(PG)ITM , Rewari

Manuscript Id: 21C031

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

ROUTING CHALLENGES IN WIRELESS MESH NETWORKS

Abstract—Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured networks that employ Cmulti-hop communications to transmit data traffic to andfrom Internet entry points. WMNs are comprised of three types of nodes: access points, meshrouters, and mesh clients. In mesh networks, traffic between mesh nodes and the Internet isrouted over mesh gateways. In this paper, a survey on routing protocols, challenges in routingand applications in wireless mesh networks is conducted. Also we have explained severalmetrics and design concepts for routing protocols in WMNs.

A RELIABLE ROUTING MECHANISAM FOR WIRELESS MESH NETWORKS

Abstract— Since wireless mesh networks are ad-hoc in nature, therefore routing protocolsused for ad-hoc networks like AODV are also used for WMNs by considering only theshortest path to destination. In WMNs data is transferred to and from APs, and due to this,certain problems such as congestion on routes and overloading the APs are taken place. Toobtain a reliable routing path, we have proposed a reliable routing mechanism in this paper.In this paper, we propose a fuzzy logic based, routing algorithm for finding a reliable routingpath in WMNs. In this routing technique for each node, we calculate two parameters, signalpower value and trust value, to find out the lifetime of routes. Each node along routediscovery, stores its signal power value and trust value in RREQ message. In the destinationwith the help of fuzzy logic mechanism, a new parameter reliability value is determined frominputs signal power value and trust value of each route. The path having highest reliabilityvalue is selected as a stable route from source to destination.

22

SONU BHARDWAJ

STUDENT M.TECHDepartment of Computer Science & engineering

Somany (PG) Institute of Technology & Management, Rewari(HR)-India

Manuscript Id: 21C002

Prof. Dr. Sohan [email protected]

Prof. C.C.S. University, Meerut-UP

Er. Pushpender [email protected]

Research ScholarShri Venkateshwara University, Gajraula-UP

Manuscript Id: 21C007

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

REVIEW ON IMPROVE VOICE QUALITY ON VOICE OVER INTERNETPROTOCOL

Abstract - voice over internet protocol (VoIP) is a technology that allows telephone calls tobe made over computer network like internet. The user can make the telephone calls over anIP network using this technology. VOIP converts analog voice signals into digital datapackets and support real-time, two-way transmission of conversation using I.P. This paperwill describe voice over internet protocols to a level that allows discussion of voice qualityissues and security issues. Bandwidth is the major reason of low voice quality in voice overIP. Rather than this, equipments , ATA-Router , phone-frequency , weather condition are alsosome factors that affect the voice quality in VOIP. QoS for VoIP is the strict that can allowyou to make a decent call without suffering from delays, weird sounds, noise and echo. Youwant to converse just like you would over a landline phone. VOIP are basically concernedwith businesses, Quality of services (QOS).

ADVANCEMENT IN LANGUAGES DESIGN USING

PARALLEL COMPUTING FRAMEWORKS

Abstract- Parallel computing simply means using more than one computer processor to solvea problem. Classically, computers have been presented to newcomers as “sequential”systems, where the processor does one step at a time. There are still machines andapplications where this is true, but today most systems have parallel features Supercomputersachieve astounding speed on scientific computations by using amazing numbers ofprocessors. Servers use multiple processors to handle many simultaneous requests in a timelymanner. For example, a web server might use dozens of processors to supply hundreds ofpages per second Multi-core chips include several processor cores on a single computer chip.Even a laptop (or other small system) that uses a multi-core chip is a parallel computer.

23

Puneet saini Ruchika Walia [email protected] [email protected]

Dept. of Computer Science & Engineering Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C030

NIKITA SHARMA

Departmentof CSEArya Engineering College & Research Center

Jaipur, Rajasthan, India

PIYUSH SHARMA

Departmentof CSEArya Engineering College & Research Center

Jaipur, Rajasthan, India

SUDHANSHU VASHISTHA

Departmentof CSEArya Engineering College & Research

CenterJaipur, Rajasthan, India

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

SILENT SOUND TECHNOLOGY USING Electromyography (EMG) - A Review

Abstract- Silent Sound Technology is useful for those who are unable to speak. They can easycommunicate with other people using this technology. Silent Sound technology notices everymovement of lips and transfers it into sound. And it help the people who have lost their voiceto speak .Silent Sound Technology is developed at the Karlsruhe Institute of Technology.Silent sound technology detects every lip movement and then transforms it into sound thatone can easily understand.

CAPABILITY BASED ENCRYPTION SCHEMES

Abstract-At present time, the growth in the networking technology increases day by day andinterchanging of the digital images very frequently. The protection of multimedia data,sensitive information like credit cards, banking transactions and social security numbers isbecoming very important. The protection of these confidential data from unauthorized accesscan be done with different types of encryption techniques. So for providing data securitymany cryptography techniques are there, such as symmetric and asymmetric techniques. Inthis review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamirand Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. There is

24

Manuscript Id: 21C018

INDERPALStudent, M.Tech.

Dept. of CSESomany Institute of Technology and Management

Rewari(HR.) INDIA

Manuscript Id: 21C013

SANGEETA YADAV

[email protected]. of Computer Science & Engineering

S. (P.G.) I.T.M., Rewari-Haryana

Ekta

[email protected]. of Computer Science & Engineering

S. (P.G.) I.T.M., Rewari-Haryana

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

also, a survey on existing work which is used different techniques for image encryption isdone and a general introduction about cryptography is also given.

PROCESS SCHEDULING ALGORITHM

Abstract- The main objective of this paper is to introduce a new CPU algorithm called ANovel CPU Scheduling Algorithm which acts as both preemptive and non-preemptive basedon the arrival time. The proposed algorithm helps to improve the CPU efficiency in real timeuni-processor-multi programming operating system. CPU Scheduling is the basis of multi-programmed operating system. The scheduler is responsible for multiplexing processes on theCPU. There are many scheduling algorithms available for a multi-programmed operatingsystem like FCFS, SJF, Priority, Round Robin etc. In this paper, the results of the existingalgorithms (FCFS, SJF, Priority and Round Robin) are compared with the proposedalgorithm.

SOFT COMPUTING AND TECHNIQUES

Abstract-Soft computing can be a very attractive alternative to a purely digital system, butthere are many traps waiting for researchers trying to apply this new exciting technology. Fornonlinear processing both neural networks and fuzzy systems can be used. Terrifically neuralnetworks should provide much better solutions: smoother surfaces, larger number of inputsand outputs, better generalization abilities, faster processing time, etc. In industrial practice,

25

Manuscript Id: 21C020

NEHA YADAV EKTA

[email protected] [email protected] Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C003

Sushma pachar

[email protected]. of CSE

MITM, JEVRA(HISAR)

Parshant Sharma

[email protected]. of CSE

MITM, JEVRA(HISAR)

DEEPAK KUMAR

[email protected]. of CSE

MITM, JEVRA(HISAR)

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

however, many people are frustrated with neural networks not being aware that the reason fortheir frustrations is wrong learning algorithms and wrong neural network architectures.Having difficulties with neural network training, many industrial practitioners are enlargingneural networks and indeed such But at the same time such excessively large network are notable to respond correctly to new patterns which were not used for training. This paperdescribes how to use effective neural networks and how to avoid all reasons for frustration.

CRYPTOGRAPHY AND SECURITY ANALYSIS

Abstract-Cryptography is the science of writing in secret code and is an ancient art. The needfor secure commercial and private communication has been led by the Information Age,which began in the 1980's. The World Wide Web is an electronic protocol which allowspeople to communicate mail, information, and commerce through a digital medium. This newmethod of information exchange has caused a tremendous need for information security. Athorough understanding of cryptography and encryption will help people develop better waysto protect valuable information as technology becomes faster and more efficient. Asthe Internet and other forms of electronic communication become more prevalent,electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popularcryptography systems used on the Internet is pretty good privacy because it's effective andfree.

REMOTE PROCEDURE CALL IN DISTRIBUTED SYSTEM

Abstract-Remote Procedure Call (RPC) is a powerful technique for constructing distributed,client/server based applications. This survey is to explain RPC mechanism, how to use theSun RPC convert local procedures to remote procedures. An RPC is analogous to a function

26

Manuscript Id: 21C011

[email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

JYOTI [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C014

GAJENDRA YADAV

[email protected] of computer Science & engineering

Somany(PG)Institute of technology & management,rewari(HR)-India

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

call. Like a function call, when an RPC is made, the calling arguments are passed to theremote procedure and the caller waits for a response to be returned from the remoteprocedure. A client who interacts with the user and a server, which interacts with theresources The client makes a procedure call that sends a request to the server and waits. Thethread is blocked from processing until either a reply is received, or it times out. When therequest arrives, the server calls a dispatch routine that performs the requested service, andsends the reply to the client. After the RPC call is completed, the client program continues.RPC specifically supports network applications.

COMPARATIVE STUDY OF WRITER VERIFICATION SYSTEM

Abstract-Writer Verification System (WVS) is the task of determining whether a handwrittentext has been actually written by a certain person or not. The system comprises a handwrittentext and a claimed identity and subsequently decides whether the text has been written by thiswriter or not. The steps followed by WVS are in the order: image acquisition, pre-processing,segmentation, feature extraction & classification and post-processing. There are manyclassifiers present for feature extraction & classification. In the present paper, we will explainWVS, classifiers used in previous work are explained.

SOCIAL NETWORKING: THE VIRTUAL WORLD

Abstract-Social networking belongs to social communication between the people on Web.Actually, the main aim of “social networking” is to study the interaction of the certain

27

Manuscript Id: 21C012

MUDIT [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

RUCHIKA [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C015

ABHIMANU SHARMA

[email protected] of Computer Science & engineering

Somany (PG) Institute of Technology & Management,Rewari(HR)-India

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

community and what step should be follow for their interaction. Social networking refers toall those online services which are available for free to use for all those people who areinterested in making communication with people. There are several free software and webspace which allow users to create a network of people. Using social networking users cancreate their profile, by inserting their personal details. The details of user are not onlycontains vital information, but they also constitutes a lot of other information like user’shobbies, passions, interests, professional background and qualification statistics etc. Therecould be many other factors which could be responsible connect individual in social groupswith more security.

REPLICATION IN MOBILE AD-HOC NETWORK USING HOPFIELD NETWORK

ABSTRACT-Mobile Ad hoc Network (MANET) is a network comprises of mobile nodesconnected without any centralized administration. Each node in the network has the ability toshare a large number of objects with other nodes. The nodes are connected with other nodesto forward a message to other nodes until the search for node that desire meets. This paperrepresents a new replication method to recover the performance in distributed system.Objects are replicated on different nodes in the network to minimize the search for an object.It is observed that mobility of nodes predicted using SOM (Self Organizing Maps) techniqueprovides less accuracy. This paper represents an algorithm that uses the network parametersas input condition to replicate objects into the nodes. The decision for each node will be takenby gathering the input conditions and feed to the Hopfield Neural Network. It is view that itwill provide more accuracy and improve the performance.

ANALYSIS OF NORMALIZATION AND ITS FUTURE SCOPE IN THEMANAGEMENT OF DATABASE

28

Manuscript Id: 21C002

DR. MUKESH KUMAR

[email protected] Science & Engineering Department, The

Technological Institute of Textile & Sciences,

Bhiwani- 127021, India

TANNU CHAWLA

[email protected] Science & Engineering Department, The Technological

Institute of Textile & Sciences,Bhiwani- 127021, India

Manuscript Id: 21C016

RISHI VERMA

[email protected] Professor

Dept. of Computer Science & EngineeringSomany (P.G.) Institute Of Technology and Management,

Rewari

HEENA SHARMA

[email protected] Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology andManagement, Rewari

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

ABSTRACT-Normalization is a major task in relational database design. Normalizationoptimizes database management by reducing or eliminating redundant data and ensuring thatonly related data is stored in a relational database table. This paper describes what databasenormalization is, why it is important, what it does, and why it is used when building adatabase. This paper will also describe what happens to a database, when it has not beennormalized. It goes on then, to describe the first (1NF), second (2NF), third (3NF) and BCNFnormal forms. It focuses on the advantages and disadvantages of normalization, and outlinesthe advantages and disadvantages of using denormalization .It also discuses the future scopeof normalization in database management system.

MANAGEMENT INFORMATION SYSTEM & ITS STRUCTURE

Abstract - Management information system can be used in various forms in organization andbusinesses. some case such as activates, problem solving, organizational and fallow upbusiness opportunities with using it will be possible .management information system is auseful tool that provided organized and summarized information in a proper time to decisionmakers and enable making accurate decision for manager in organization or in proper time todecision maker and enable making accurate decision for manager in organizations or in otherwords, it’s a system that receives data from different units and provide timely and accurateinformation for different levels of mangers for making optimal decision. In this paper weintend to evaluate the components of (MIS) and the role of it in making optimal decisionprocess.

REVIEW ON STUDY OF CLOUD COMPUTING

29

Manuscript Id: 21C041

PRITI YADAV

[email protected] Professor

Department of MBASomany(P.G)Institute of Technology & Management, Rewari.

SUMAN

[email protected] of MBA

Somany(P.G)Institute of Technology & Management, Rewari.

Manuscript Id: 21C018

RAJEEV SHARMA PUSHPENDER SARAO

[email protected] [email protected]. of Computer Science & Engineering Assistant Professor

S. (P.G.) I.T.M., Rewari-Haryana Head, Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract-Cloud computing is a type of computing that relies on sharing computing resourcesthrough network. In cloud computing, the word cloud is used for "the Internet," so the phrasecloud computing means "a type of Internet-based computing," where different services aregiven -- such as servers, storage and applications and so on. In this we are going to studyabout the cloud management, cloud industry, why we use cloud, and also we are going tostudy the infrastructure, platform and software used as a services in the cloud computing.

DATA MINING AS GRAPHS: A NEW TOOL FOR SOCIAL NETWORKS

ABSTRACT- The objective of this study is to investigate the concept of data mining in socialnetworks with special emphasis on the graph structure technique. The major principle part inthis survey is the literature which is the base or background of the field. The base orbackground is further divided in to four major part are The Graph theory, The Socialnetworks, The Online social networks and The Graph mining. The graph mining is furtherdivided in to ten sub themes.

HIDDEN MARKOV MODEL: A USEFUL TOOL IN AUTOMATIC SPEECHRECOGNITION

30

Manuscript Id: 21C021

SOMESH

Somany Institute of Technology and ManagementRewari(HR.) INDIA

Email:- [email protected]

Manuscript Id: 21C024

ASHWANI [email protected]

Department of Computer Science Engineering

Somany (P.G) I. T. M. Rewari

SANTOSH [email protected]

Department of ECESomany (P.G) I. T. M. Rewari

RUCHIKA [email protected]

Department of CSESomany (P.G) I. T. M. Rewari

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract: Speech recognition has been lately used in our smart phones, search engines,security systems etc. When we talk about intelligent system or user-friendly system speechrecognition comes in first choice. The main issue is about recognizing the user’s speech andfor that purpose Hidden Markov Model (HMM) is extensively used. Out of three differentapproaches for speech recognition namely Acoustic-phonetic, Knowledge Based, and PatternRecognition Approach, the later used HMM Model. This paper will present general aspect ofautomatic speech recognition and use of HMM in it. The paper’s study is based on patternrecognition approach and the third phase speech recognition process ‘Recognition’ and HMMis studied in detail.

REVIEW ON MICROSOFT SPEECH REORGANIZATION API

Abstract: The Speech Application Programming Interface or SAPI is an API developedby Microsoft to allow the use of speech recognition and speechsynthesis within Windows applications. To date, a number of versions of the API have beenreleased, which have shipped either as part of a Speech SDK, or as part of theWindows OS itself. Applications that use SAPI include Microsoft Office, MicrosoftAgent and Microsoft Speech Server. In general all versions of the API have been designedsuch that a software developer can write an application to perform speech recognition andsynthesis by using a standard set of interfaces, accessible from a variety of programminglanguages. Speech Recognition and Text-To-Speech engines or adapt existing engines towork with SAPI. In principle, as long as these engines conform to the defined interfaces theycan be used instead of the Microsoft-supplied engines. In general the Speech API is a freelyredistributable component which can be shipped with any Windows application that wishes touse speech technology. Many versions (although not all) of the speech recognition andsynthesis engines are also freely redistributable. There have been two main 'families' of theMicrosoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extrafeatures in each newer version.

DISTRIBUTED COMPUTING

31

Manuscript Id: 21C025

RIPUDAMAN [email protected]

Department of Computer Science & engineeringSomany (PG) Institute of Technology & Management, Rewari (HR)-India

Manuscript Id: 21C029

PREETI YADAV

M.Tech. 3rd Sem.(CSE), S(PG)ITM,Rewari

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract-Ensembles of distributed, heterogeneous resources, or Computational Grids, haveemerged as popular platforms for deploying large-scale and resource-intensive applications.Large collaborative efforts are currently underway to provide the necessary softwareinfrastructure. In this paper we briefly motivate Grid computing and introduce its basicconcepts. We then highlight a number of distributed computing research questions, anddiscuss both the relevance and the shortcomings of previous research results when applied toGrid computing. We choose to focus on issues concerning the dissemination and retrieval ofinformation and data on Computational Grid platforms. We feel that these issues areparticularly critical at this time, and as we can point to preliminary ideas, work, and results inthe Grid community and the distributed computing community. This paper is of interest todistributing computing researchers because Grid computing provides new challenges thatneed to be addressed, as well as actual platforms for experimentation and research.

FACE RECOGINITION TECHNOLGY

Abstract: Recently Face recognition is becoming the part of everyday life .It has receivedsignificant attention, especially during the past several years Face Recognition is the mostcommonly used in our society on network multimedia. In this paper, we have described theimage analysis & processing and video compression and also described the biometrics andclassification of biometrics. Biometrics is the identification of the person on the basis ofbehavioral and anatomical characteristics.

KNOWLEDGE DISCOVERY OF DATA WAREHOUSING

32

Manuscript Id: 21C043

MANU YADAV

[email protected] of Computer Science & Engineering

Somany(PG) Institute of Technology &Management,Rewari(Hry.)-INDIA

Manuscript Id: 21C017

RISHI [email protected]

Assistant ProfessorDepartment Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology & Management,Rewari-Haryana

[email protected]

Department Of Computer Science & EngineeringSomany (P.G.) Institute Of Technology & Management,

Rewari -Haryana

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

ABSTRACT-Data Warehousing and Knowledge Discovery has been widely accepted as akey technology for enterprises and organizations. It is improve to their abilities in dataanalysis, decision support and the automatic extraction of knowledge from data. With theexponentially growing amount of information to be included in the decision making process,the data to be considered becomes more and more complex in both structure and semantics.Data mining and knowledge discovery in databases have been attracting a significant amountof research, industry, and media attention of late. There is an urgent need for a newgeneration of computational theories and tools to assist researchers in extracting usefulinformation from the rapidly growing volumes of digital data. The need for methods andtools that will automate the process of knowledge extraction, or guide the user to subsets ofthe dataset that are of particular interest is becoming prominent.

WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES

Abstract-Wireless mesh networks have the potential to deliver Internet broadband access,wireless local area net- work coverage and network connectivity for stationary or mobilehosts at low costs both for network operators and customers. The core technology involves anetwork of wireless routers relaying each others’ packets in a multihop fashion. Manyvariations on targeted applications and implementation choices offer different opportunities toemerging companies in this emerging area. In this article, we will present an introduction towireless mesh networks and present both the benefits enabled by this technology and themain hurdles that have to be overcome.

COMPARATIVE STUDY OF VARIOUS IMAGE SEGMENTATION METHODS

33

Manuscript Id: 21C037

RAHUL [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C023

RUCHIKA [email protected]

Department of CSESomany(P.G.)Institute of Technology & Management,

Rewari (Haryana)

MUDIT [email protected]

Department of CSESomany(P.G.)Institute of Technology & Management,

Rewari (Haryana)

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract- Segmenting an image to meaningful parts is a fundamental operation in imageprocessing. Image segmentation is the process of partitioning a digital image into multiplesegments. In this paper, various image segmentation methods are explained.

COMPARISON OF CRYPTOGRAPHY AND OTHER DATA HIDING TECHNIQUES

Abstract - Cryptography is a technique of secure communications between a sender and oneor more recipients. In this, sender scrambled a message (plain text into cipher Text) with thehelp of algorithm and the key and sends this message to recipient. Now recipientunscrambled the message (with the same algorithm and a key, which may or may not be sameas the sender’s key) into the original message (cipher text into the plain text). There are twomain kind of cryptography: Symmetric Key Cryptography (also known as private key orsecret key cryptography) and Asymmetric Key Cryptography (also known as public keycryptography). In our paper we are explaining about the cryptography, its different types,substitution methods, transposition methods and also focused on the different algorithms usedfor the symmetric and asymmetric key cryptography. We are also showing the comparison ofcryptography technique with other data hiding techniques like watermarking, steganographyand explaining which one is better for what kind of purpose.

ISSUES AND CHALNGES OF E- LEARNING

34

Manuscript Id: 21C036

JAGDEEP [email protected]

Department of Computer Science & Engineering,Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.

NEHA [email protected]

Assistant ProfessorDepartment of Computer Science & Engineering,

Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.

Manuscript Id: 21C042

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

Abstract- In the E-learning and E-learning, numerous universities and cultural organizationsaround the world have launched initiatives to develop tools for multilingual learning and webpublishing and have given preference to local content. India has different languages anddifferent culture. Most of the knowledge and information related to people, culture, scienceand philosophy of India is available in India languages, which will be useful for learning anddeveloping knowledge base. In India E-learning system and online courses are alreadystarted, but as a multi lingual country, which gives importance to education through regionallanguages, This paper cover the issues of Indian language knowledge base/content base, it’srequirement, and its implication in learning. An integrated multi lingual E-learning system forIndia is proposed in this paper, where importance given to multi lingual course contentcreation.

CRITICAL STUDY ON BIOLOGICAL NEURAL NETWORK & ARTIFICIALNEURAL NETWORK

Abstract - Artificial Neural Networks are inspired by human brain and it also provides newdirections and innovative approach in solving problems & wider the potential of computer’sprocessing. The purpose of this paper is to discuss about the Artificial Neural Networks &how it is linked to our biological neural network, its architecture & applications in modernworld. In applications, we will discuss about direct applications which includes patternclassification, associative memories, optimization, control applications and application areas.At last, we will critically study the performance comparison of human brain and ANN.

35

SAPNA YADAV

[email protected] Professor

Department of MBASomany (PG) Institute of Technology & Management,

Rewari- Haryana, India.

KRISHAN KUMAR

[email protected] of MBA

Somany (PG) Institute of Technology &Management, Rewari- Haryana, India.

Manuscript Id: 21C038

VIRAT

[email protected] of Computer Science & Engineering

Somany(PG) Institute of Technology &Management,Rewari(Hry.)-INDIA

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

SWOT ANALYSIS OF E-COMMERCE

Abstract - This research paper describes the invention and accessibility of internetconnectivity and powerful online tools has resulted a new commerce era that is E-commerce,which has completely revolutionized the conventional concept of business. E-commercedeals with selling and purchasing of goods and services through internet and computernetworks. E-commerce can enhance economic growth, increase business opportunities,competitiveness, better and profitable access to markets. E-Commerce is emerging as a newway of helping business enterprises to complete in the market and thus contributing toeconomic success. In this research paper we will discuss about advanced SWOT analysis ofE-commerce which will comprise of strengths, weaknesses, opportunities and threats facedby e-commerce in current scenario.

IMPACT OF E – BANKING ON TRADITION BANKING SERVICE

Abstract- Internet banking is changing the banking industry having the major effect onbanking relationships. Banking is now no longer confined to branches were one has toapproach branch in person, to withdrew cash and deposit a cheque request a statement ofaccounts. In true internet banking any inquiry or transaction is processed online without anytime. Providing internet banking is increasingly become a “need to have” then a “nice tohave” service. The net banking thus, now is more of a norm rather than an exception in manydeveloped countries due to the fact that it is the cheapest way of providing banking services.This research paper will introduce you to E-Banking, giving the meaning, functions, types,

36

Manuscript Id: 21C039

PRITI

[email protected] professor

Department of MBASomany (PG) Institute of Technology &Management, Rewari- Haryana, India.

NISHA

[email protected] of MBA

Somany (PG) Institute of Technology & Management,Rewari- Haryana, India.

Manuscript Id: 21C040

SANTOSH

[email protected] of MBA

Somany (PG) Institute of Technology & Management,Rewari- Haryana, India.

SAPNA YADAV

[email protected] Professor

Department of MBASomany (PG) Institute of Technology & Management,

Rewari- Haryana, India.

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

advantages and limitations of E-Banking. It will also show the impact of E-Banking ontraditional services and finally the result documentation.

INVISIBLE COMMUNICATION OF SECRET DATA USING VISUALCRYPTOGRAPHY

Abstract- In this paper, we proposed a more secure method for Visual cryptography usingLeast Significant Bits (LSB) information hiding algorithm and based on this, quality will bemanaged by PSNR (Peak Signal to Noise Ratio) and MSE (Mean Squared Error). So mainlywhat we are going to do is that an effort has been made to propose and implement a newsteganography technique for images by modifying existing algorithms. This technique usesLSB steganography as our basis and disperses a secret message over the entire image takenby us to ensure that the secret message cannot be get from the image. When we compare withother existing algorithms, we can easily prove that the difficulty of decoding the proposedalgorithm is high. The system developed for hiding and extracting files based on the methodhas a wide range of adaptivity and good applicability.

37

Manuscript Id: 21C026

SUDHANSHU VASHISTHA

Assistant Professor

Department of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGYJaipur, Rajasthan, India

PIYUSH SHARMA, SUDHANSHUVASHISTHA

Assistant ProfessorDepartment of Computer Science &Engineering

ARYA INSTITUTE OF ENGINEERING ANDTECHNOLOGY

Jaipur, Rajasthan, India

ANCHAL JHAMB

Department of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGYJaipur, Rajasthan, India

MANISH CHOUBISA

Assistant ProfessorDepartment of Computer Science & EngineeringARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGYJaipur, Rajasthan, India

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

SCTP: MULTIHOMING AND MULTISTREAM PROTOCOL

Abstract- SCTP (stream control transmission protocol) is a reliable message orientedtransport layer protocol. It is an IETF standard developed by the Transport Area WorkingGroup (TSVWG). SCTP has been standardized by the IETF(Internet Engineering Task Force)in series of RFCs ,as a reliable transport protocol to transport SS7(Signaling System 7)signaling messages for internet applications such as ISDN over IP, telephony signaling ,media gateway control, IP telephony[5]. SCTP is similar to TCP in many services. They areboth unicast connection-oriented reliable protocols, provide in-sequence packet delivery andcongestion control. SCTP preserves message boundaries and at the same time detects lostdata, and out of order data. It uses 32 bit checksum as opposed to a 16 bit checksum of TCP.Although TCP has traditionally been used, we argue that SCTP provides better services thanTCP in terms of reliability and performance. Due to its attractive features such as multi-streaming and multi-homing. SCTP has received much popularity, in terms of both researchand development [6, 7]. SCTP provides multi-homing in that endpoints can use multiple IPaddresses for the connection. SCTP may be more resistant to Man in The Middle (MITM)and Denial of Service (DoS). Multi-stream does not refer to multiple streams in the TCPsense but rather each stream represents a sequence of messages within a single association.These may be long or short messages which include flags for control of segmentation andreassembly.

38

Manuscript Id: 21C005

SYED YASMEEN [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

GULSHAN [email protected]

Dept. of Computer Science & EngineeringS. (P.G.) I.T.M., Rewari-Haryana

National Conference on Emerging Trends &Innovation in Computer and Communication

NCETICC-2013

2013

39

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id: - 21E006

AN EXTENSIVE ANALYSIS OF ELECTRO-MAGNETIC RADIATION FROM CELLPHONES AND THEIR BASE STATIONS AND THE ASSOCIATED HEALTH EFFECTS

ABSTRACT:-Cell phones have become our closest friend in the sense that we play with themfor hours in a park, footpath and bed or even in our office. But only a few numbers of peopleknow that sleeping with cell phone for more than 18-20 minutes is like sleeping with a snake. Itconstantly releases poison in the form of radiation. In 2013, it has been estimated that there willbe almost as many mobile-cellular subscriptions as people in the world which is around 6.8billion users (according to ITU), 55.8 cores alone in India (according to IBN Live News, India)and nearly 736K cell phone towers to meet the communication demand (according to Dot,India). The revised radiation norms adopted by DoT for 900Mhz,1800 Mhz and 2100Mhz bandare 0.45 W/m2,0.90W/m2 and 1.05W/m2 active from the date 01.09.2012 and SAR limit forhandsets is 1.6W/kg. All over the world, people have been debating about associated health riskdue to radiation from cell phone and cell tower. Radiation effects are divided into thermal andnon-thermal effects. Non-thermal effects are 3 to 4 times more harmful than thermal effects. Thepaper will present the mathematical analysis of radiation from handsets and cell towers and thehealth hazards due to it.

Manuscript id: 21E013

EXTENSIVE STUDY OF INFORMATION AND COMMUNICATION TECHNOLOGYIN THE LIFE OF A COMMON MAN IN INDIAN PERSPECTIVE

ABSTRACT:-Present paper reflects the impact of information and communication technologyin the life of an ordinary person in Indian perspective. The life as a common man have changedon the scale of employment opportunity, availability of the information, socio-political life andtheir economic empowerment besides the stake holders and corporate social responsibility forempowering the common man through the Impact of information technology and other variousperipheral discussion. The study shows the emergent need of information technology to enrichlife of a common man. In buzz words we may say that” for the sake of the nation, let’s hope thishappens sooner rather than later”.

S (PG) ITM Rewari Page 40

Raghu Yadav, Sharvan Kr.Dept. of ECE

S(PG)ITM, Rewari

Santosh DahalDepartment of Electronics & Communication

S(PG)ITM, Rewari

Rajiv DasDepartment of Electronics & Communication

S(PG)ITM, Rewari

Kavita YadavDept. of ECE

S(PG)ITM, Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id: - 21E005DESIGNING OF ENERGY EFFICIENT, NEED BASED HIGH SPEED WIRELESS

DATA TRANSMISSION AND RECEPTION USING VISIBLE LIGHT SPECTRUM(LI-FI)

ABSTRACT: With the advent of the information technology and its extensive utility in allprobable sphere, whole globe have seen the developmental changes and an efficient, transparent,manpower and energy saving system. Information communication technology provides us theconvenient transfer of the data and information from one place to another. As a matter of facttoday utility of Internet has made the revolution in the world .Whether it is a coffee shop, officesor at home. Speed of the internet is major issue. With the advent of technology,, communicationbecame the backbone of ICT. It had made our globe like a town. Today everyone (Business,institutions, organizations, entrepreneurs and individual) is thrust for getting right information atthe right time and right place .Which, requires fast internet connectivity, Technology and largespectrum of channels. Present paper reflects Designing of energy efficient, need based HighSpeed Wireless Data Transmission and Reception using visible light spectrum (Li-Fi)" whichmay affect all lives. It is a technology that may be as fast as 500MBPS (30GBPS per minute) analternative, cost effective and more robust and useful than Wi-Fi. The Visible lightcommunication which may be the future of Internet. A model for the same has been proposed inthe present research paper.

Manuscript id: - 21E012

COMPARATIVE STUDY OF GSM & CDMA

Abstract:-GSM stand for global system mobile .In the world 75% GSM used by the users.CDMA stand for code division multiple accesse. 25% CDMA used by the users. Bothtechnologies provide better services like multimedia message, video, high speed internet accessdigital camera these are some features that we can found on both technologies. GSM technologyis older as compare to CDMA but there are some difference features between GSM &CDMA. InGSM different frequency allocated to different user. In CDMA every use same frequency buthave different code.

S (PG) ITM Rewari Page 41

3 Prof.(Dr.) Y.P.Singh,(Director) ,S(PG) I.T.M. , Rewari , Haryana

2 Er. Deepak Sharma,Ph.D Scholar (ECE)

Faculty of Engg. & Tech.J.N.U. Jodhpur, Rajasthan

1. Er. Abhishek Haridas,Ph.D. Research Scholar,

Sunrise University,

Shruti NagarDept. of ECE

S(PG)ITM, Rewari

Ekta YadavDept. of ECE

S(PG)ITM, Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E002AN EFFECTIVE AND FEASIBLE COMMUNICATION LIGHT FIDELITY: VISIBLE

LIGHT COMMUNICATION (VLC)

ABSTRACT:-Visible light communication is a communication technology which uses light thatis visible to humans as a source of data transmission. This system is easy to access as well asharmless as compared to invisible light spectrum communication. In this article we have tried toilluminate about Visible light communication in brief. After a short introduction and historicaloverview, the technical details are described. Subsequently the most important fields ofapplications and future scopes of VLC system are presented.

Manuscript id:- 21E007INTEL HASWELL MICROPROCESSOR

ABSTRACT:- The main purpose of this paper is to let people know about a very new concept ofIntel Haswell. Intel has said that Haswell will deliver twice the performance of Ivy Bridge, andin some cases will double the battery life of ultra books, which are a new category of thin andlight laptops with battery life of roughly six to eight hours. Intel shed some light on Haswell atits Intel Developer Forum trade show in September, saying its power consumption had been cutto the point where the chips could be used in tablets. Haswell chips will draw a minimum of 10watts of power, while Ivy Bridge's lowest power draw is 17 watts. Intel has splintered futureHaswell chips into two families: 10-watt chips for ultra books that double as tablets, and 15-wattand 17-watt chips designed for other ultra books and laptops.

S (PG) ITM Rewari Page 42

HarishDept. of ECE

S(PG)ITM, Rewari

Amit.Dept. of ECE

S(PG)ITM, Rewari

Prof. (Dr.) Y.P. SinghDirector

S(PG)ITM, Rewari

Rohan Sharma,[email protected]

Kalika Kr.kalikamehra28@gmail

Aditi Agrawal, [email protected]

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id -21E010

IMPACT OF IMAGING TECHNOLOGIES ON HEALTH

ABSTRACT:- Imaging is becoming an increasingly important tool in both research and clinicalcare. The history dates back to 1895 when X-ray imaging came in the picture for the first time.After that there were significant advancements in imaging technology through the developmentslike Computed Tomography (CT)-Scan, Ultra sound, nuclear medicine and magnetic resonanceimaging (MRI). But the major concern in today’s world is about their health effects through theradiation. The radiation through them is very dangerous as they have ionizing effects on ourbody. The high-frequency radiation has enough energy to damage the structure of cells in thebody (including DNA) and has well-documented effects on human health like risk of cancer. Thethyroid gland and bone marrow are particularly sensitive to ionizing radiation, especially inchildren. The paper will include the discussion on high energy radiation through them and theassociated health effects on human body.

Manuscript id -21E015

AN EXTENSIVE STUDY OF ORTHOGONAL FREQUENCY DIVISIONMULTIPLEXING (OFDM) – A boon &backbone to WIRELESS COMMUNICATION

SYSTEM

ABSTRACT:-In the recent advancement communication techniques, OFDM have opened thedeveloped area for further research. Many advantages of OFDM over single carrier scheme is, itsability to cope with severe channel conditions such as attenuation of high frequency in a longcopper wire. OFDM is a multi-carrier modulation technique with densely spaced sub-carriersthat has gained a lot of popularity among the broadband community in the last few years. OFDMhas been shown to be an effective technique to combat multi-path fading in wirelesscommunications. It has been successfully used for HF radio applications. OFDM has chosen asthe standard for digital audio broadcasting and high-speed wireless local area networks. PresentPaper, including introduction to OFDM Modulation its advantages and demerits, and someapplications of OFDM, OFDM techniques for peak-to-average power ratio reduction (PAPR),time and frequency synchronization, and channel estimation will be discussed. We conclude witha brief overview of current application areas.

S (PG) ITM Rewari Page 43

VipinDept. of ECE

S(PG)ITM, Rewari

Lalit KumarDept. of ECE

S(PG)ITM, Rewari

Prof. (Dr.) Y.P. SinghDirector

S(PG)ITM, Rewari

Manjeet Kumar.Dept. of ECE

S(PG)ITM, Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id -21E014

PERFORMANCE ANALYSIS OF WIRELESS SENSOR NETWORK

ABSTRACT:-Wireless sensor network are networks that consists of sensors which aredistributed in ad hoc manner.These sensors work with each other to sense some physicalphenomenon and gathered information to get relevant result. Wireless Sensor network uses theprotocols which have a unique self-organizing capability. In this paper we analyze the difficultyfaced by wireless sensor network and their deficiencies as well their effectiveness.

Manuscript id -21E008

A SURVEY ON WIRELESS SENSOR NETWORK SECURITY

ABSTRACT:-The significant advances of hardware manufacturing technology have boosted thedeployment of Wireless Sensor Networks (WSNs).The WSN are used in many applications inmilitary, ecological, and health-related areas. These applications often include the monitoring ofsensitive information such as enemy movement on the battlefield or the location of personnel ina building. Security is therefore important in WSNs. However, WSNs suffer from manyconstraints, including low computation capability, small memory, limited energy resources andthe use of insecure wireless communication channels. These constraints make security in WSNsa challenge. In this article we present a survey of security issues in WSNs.

S (PG) ITM Rewari Page 44

Charan SinghDept. of ECE

S(PG)ITM, Rewari

Narender Singh.Dept. of ECE

S(PG)ITM, Rewari

Avinash RaiDept. of ECE

S(PG)ITM, Rewari

S.Grace DianaPG Scholar

SNS College of Technology

S.MohanPG Scholar

Nehru Institute of Technology

S.RamyaPG Scholar

Department of CSE-SE

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id -21E011WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES

Rahul yadav

Rahul yABSTRACT:- Wireless mesh networks have the potential to deliver Internet broadbandaccess, wireless local area net- work coverage and network connectivity for stationary ormobile hosts at low costs both for network operators and customers. The core technologyinvolves a network of wireless routers relaying each others’ packets in a multichip fashion.Many variations on targeted applications and implementation choices offer differentopportunities to emerging companies in this emerging area. In this article, we will present anintroduction to wireless mesh networks and present both the benefits enabled by this technologyand the main hurdles that have to be overcome.

Manuscript id:-21E003

GENERAL STUDY OF EMBEDDED SYSTEM AND ITS CRITICAL ASPECT

ABSTRACT:-An embedded system is generally a system within a large system. Modern car andtrucks contains many embedded systems. One embedded system controls ATM, Mobile Phones,Digital Watches, Traffic light Control, Digital Cameras. Even the general purpose personalcomputer itself is made up of numerous embedded systems. Keyboard, mouse, video card,modem, hard drive, floppy drive and sound cards are each an embedded system. Early embeddedsystem applications include unmanned space probes, computerized traffic lights and aircraftflight control systems. In the 1980s, embedded system brought microprocessors into every partof our personal and professional lives. Presently there are numerous gadgets coming out to makeour life easier and comfortable because of advances in embedded system. The paper will includethe general overview and principles of embedded system their applications, recent developments,future research and problems in the system.

S (PG) ITM Rewari Page 45

Rahul YadavDept. of Computer Engineering

S(PG)ITM,Rewari

S.SantoshDept. of ECE

S(PG)ITM, Rewari

Sourabh Dept. of ECE

S(PG)ITM, Rewari

Virat ManavDept. of ECE

S(PG)ITM, Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E004

E-LEARNING BASED ON CLOUD COMPUTING

ABSTRACT:- Education is an emerging practice and it includes various processes andassimilates government’s responsibilities at different levels and ventures of public and ruralsectors. These kinds of facilitation of different rural areas of India are extremely helpful toestablish good education in developing countries having inadequate resources with surplusmanpower and deficit finance .Wireless cloud computing, a collection of multiple wirelesscomputer interface through a digital network, is an excellent model for convenient which isbased on demand network access to share the configurable computing resources. Wireless cloudis used as a resources configuration for rural education in India to be presented in this paper. Theinteroperability between different components of the wireless cloud computing represents eachsegment of development of rural education such as e-learning, virtual classroom lectures-studycentre through proper balancing of teacher-student relational input of rural communication.Simultaneously e-schooling architecture especially for rural education is also presented throughwireless cloud computing taking each block as a distribution of a standard education equally. Aninteroperability of computing i.e. memory, bandwidth and processing capability essential for thecommunicative link between the teacher as sender and the student as receptor specially in India.A quaint based parallel computing simulation approach is also estimated to be presented forimplementation in the paper.

Manuscript id - 21E016

IMPACT OF DIGITAL MEDIA ON LEARNING

ABSTRACT: - Learning is continuous process which means experience of gaining of know-ledge or skill. It is a basic cognitive processes involved in obtaining and storing knowledge.Learning is acquiring new or existing knowledge and may involve synthesizing different types ofinformation. Learning is not compulsory but it is contextual. Teaching and learning is a bipolarprocess in which learner is on one pole and teacher is on other. The methodology of digital mediacan change the level and gravity of learning. Now days we find a wide gap between the ancientand present teaching life process due to the new advance technology and the methodology of

S (PG) ITM Rewari Page 46

Anita Sharma

Department of CSES(PG)ITM,Rewari

Vikram Soni Dept. of ECE

S(PG)ITM, Rewari

S.Santosh B.Tech-7th Sem, ECES(PG)ITM, Rewari

BhavyaDept. of ECE

S(PG)ITM, Rewari

VijayDept. of ECE

S(PG)ITM, Rewari

VikashDept. of ECE

(PG)ITM, Rewari

Ajay SinghDept. of ECE

S(PG)ITM, Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

learning. Present paper exhibits the importance of digital media on learning.

Manuscript id -21E001

INNOVATION IN 4G TECHNOLOGIES

ABSTRACT: 4G is the term used to refer to the next wave of high-speed mobile technologies thatwill be used to replace current 3G networks. The two top contenders are LTE and WiMAX, bothof which are IP based networks that are built from similar, yet incompatible, technologies. Sprintand Clearwire are currently offering 4G WiMAX service in the USA, while Verizon and AT&Thave committed to the use of LTE and are trialing their own 4G networks.The purpose of thispaper is to : Clarify the contents of 4G from a technology perspective, present business benefitsof 4G enabled services and its Future growth

Manuscript id:-21E018

WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES

ABSTRACT: In the modern era mobile phones are basic need of every person as these are thefastest and the easiest medium of communication. The charging of mobile phone batteries hasalways been a problem. Battery lifetime is dependent of the manufacturer Company and alsoprice of phone. Many people complain that their phone’s battery doesn’t have long life-time andthey have to charge it several times in a day. To overcome this problem wireless charging ofmobile phones using microwaves is a very important and useful technique. With this techniqueyou can use your mobile phone without thinking about the battery stand by. This techniqueworks on microwaves. Microwave is sent with the message by the transmitter using antenna atthe frequency of 2.45GHz. There are some additions in mobile phone to apply this technique as asensor, a rectenna circuit and a filter. With this technique the need for separate chargers formobile phones is eliminated and makes charging universal. Thus the more you talk, the more isyour mobile phone charged.

S (PG) ITM Rewari Page 47

Ankur [email protected]

Swati [email protected]

VineyDepartment Of ECES(P.G)ITM,Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E019

Li- Fi TECHNOLOGY

ABSTRACT: Li-Fi (Light-Fidelity) is communication technologies which use light bulbs orLED to transferring data. It uses light as a carrier instead of traditional radio frequency as in Wi-Fi. Its data transferring speed is 10Gbps. Wireless radio frequencies are growing highly, so thatinterference in RF is continued to grow. To overcome this problem in future the Li-Fi (Light –Fidelity) technology came into existence since 2011.Li-Fi .This paper will be focus on Li-Fitechnology and its future scope

Manuscript id:-21E020

AN APPROACH TO SPEECH RECOGNITION - CHALLENGES & CONCEPT

ABSTRACTSpeech is an important, basic, common and efficient form of communication method forinteracting each other. Speech technology and systems in human computer interaction havewitnessed a stable and remarkable advancement over the last two decades. When we talk aboutuser friendly system, speech recognition system comes in the front position. Today, speechtechnologies are commercially available for an unlimited but interesting range of tasks. Thesetechnologies enable machines to respond correctly and reliably to human voices, and provideuseful and valuable services. Recent research concentrates on developing systems that would bemuch more robust against variability in environment, speaker and language. Error continuousSpeech recognition system is still the topic of research and talk of the world, more preciselyamong research scholars ,hence today’s researches mainly focus on ASR systems with a largevocabulary that support speaker independent operation with continuous speech in differentlanguages. This paper gives an overview of the speech recognition system and its recentprogress. The primary objective of this paper is to compare and summarize some of the wellknown methods used in various stages of speech recognition system.

S (PG) ITM Rewari Page 48

ShilpaM. tech, ECE, S (PG)[email protected]

MonikaM. tech, ECE, S (PG)[email protected]

Aswin Tilak Research Scholar

Jodhpur National UniversijtyJodhpur

Email:[email protected]

Prof. (Dr.) Y.P.Singh Director, S(PG)ITM, RewariAffiliated to MD University

Email:[email protected]

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E025

PATCH AND SLOT FOR ANTENNA DESIGN

ABSTRACT- Patch and slot has become a very important in modern wireless communicationantennas. Patch and slots are being used for performance improvement of antenna in wirelesscommunication. Keeping the above fact in mind we had tried to present a complete review onpatch and slots antennas .it has been analyzed in detail, In different size and shapes of slots andpatch are great interest of obtaining optimum results of antenna design , in order to allow theiruse in communication application.

Manuscript id:-21E022

AN EXTENSIVE STUDY OF “WIRELESS POWER TRANSMISSION– A NEXT GENERATION POWER TRANSMISSION SYSTEM

ABSTRACT:- Presently, we present the concept of transmitting power without using wires i.e.,transmitting power as Beneficial as well need based next generation power transmission system.Wireless power transmission Transfer the power from one place to another is in order to reducethe transmission and distribution losses. We also have discussed the technological developmentsin Wireless Power Transmission (WPT). The advantages, disadvantages, biological impacts andapplications of WPT are also presented. Witricity is nothing but the short name of WirelessElectricity. The basic concept behind this is Magnetic Resonance. Two resonant objects of thesame resonant frequency tend to exchange energy efficiently, while dissipating relatively littleenergy in extraneous off-resonant objects. In systems of coupled resonances, there is often ageneral “Strongly Coupled” regime of operation. If one can operate in that regime in a givensystem, the energy transfer is expected to be very efficient. Keeping in view, the need of the hourand nation , let it should happen sooner than later.

S (PG) ITM Rewari Page 49

Meenakshi Saini, Nitin Kathuria & V.K. PandeyM.Tech. Student, Dept. of Elec. & Comm., NIET, Greater Noida

Assistant Professor, Dept. of Elec. & Comm., AIMT, Greater NoidaProfessor, Dept of Elec. & Comm., NIET, Greater Noida

Prof. Yash Pal SinghProfessor & DirectorS.(P.G.)I.T.M.,Rewari

Er. Lince Mathew,Ph.D. Scholar

Jodhpur National University Jodhpur, Rajasthan

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id -21E009AN EXTENSIVE ANALYSIS OF CLOUD COMPUTING AND THE ESTIMATION OF

ENERGY CONSUMPTION IN FUTURE

ABSTRACT:- Cloud computing has recently emerged as a new paradigm for hosting anddelivering services over the Internet. Cloud computing is attractive to business owners as iteliminates the requirement for users to plan ahead for provisioning, and allows enterprises tostart from the small and increase resources only when there is a rise in service demand. Thetotal energy consumption of the wireless cloud is estimated to be between 32 Terawatt hours(TWh) (Lo scenario) and 43 TWh (Hi scenario) in 2015.For comparison, also included is anestimation of the 2012 wireless cloud energy consumption (9.2 TWh) based on demand figuresfor that year. This is an increase of 390% to 460% over 3 years. In this paper, we present asurvey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as challenges and energy demand.

Manuscript id:-21E021

A CPW FED WLAN NOTCHED C-SLOTUWB ANTENNA

ABSTRACT:- A printed, compact, coplanar waveguide fed UWB antenna is presented. Thesalient feature of the antenna is the inherent property of the design to reject the potentialnarrowband interferer WLAN system which operates within 5-6 GHz of frequency band. Theantenna is 26mm X 26mm in dimension on FR4 substrate. Antenna has a triangular ground withC-shaped slot in the T shaped radiating patch. The C shaped slot is responsible for the notchcharacteristics of antenna. The simulated results are fairly good in the desired band(3.1-10.6GHz) of operation.

S (PG) ITM Rewari Page 50

Karan Saini, Avinash YadavDepartment Of ECES(P.G.)I.T.M., Rewari

Santosh Dahal Department Of ECES(P.G.)I.T.M., Rewari

1Vartika Tyagi, 2Nitin Kathuria & 3V.K. Pandey1M.Tech. Student, Dept. of Electronics & Communication, NIET,

Greater Noida2Assistant Professor, Dept. of Electronics & Communication, AIMT,

Greater Noida3Professor, Dept of Elec. & Comm., NIET, Greater Noida

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E023CHALLENGES, PROBLEMS & FUTURE SCOPE OF WIRELESS SENSOR

NETWORK

ABSTRACT:- Sensor networks offer a powerful combination of distributed sensing, computingand communication. They provide countless applications and, at the same time, offer numerouschallenges due to their peculiarities. The distinguishing traits of sensor net- works have a directimpact on the hardware design of the nodes at least four levels: power source, processor,communication hardware, and sensors. Various hardware plat- forms have already beendesigned to test the many ideas spawned by the research com- munity and to implementapplications to virtually all fields of science and technology. Sensor networks offer a powerfulcombination of distributed sensing, computing and communication. We will discuss about thechallenges, problem & future scope of wireless Sensor network.

Manuscript id:-21E024COMPARISION BETWEEN ZIGBEE & BLUETOOTH

Abstract—Zigbee is an alternative device to Bluetooth. Zigbee adopted IEEE 802.15.4 as its physicallayer & medium access protocol . Zigbee technology is simple and low cost wireless communication &networking solution. It standard is wireless mesh networking. It transmits data over longer distance. It isused in application that requires a low data rate long battery life secure networking.

S (PG) ITM Rewari Page 51

Nilmani Bharti, Anup GuptaDepartment Of ECES(P.G.)I.T.M., Rewari

Akash Chauhan, Shalini Department Of ECES(P.G.)I.T.M., Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E027PERFORMANCE OPTIMIZED OF RAYLEIGH WIRELESS CHANNEL WITH

DIFFERENT EQUALIZERS

ABSTRACT:-The paper presents an overview of some important behaviors of equalizer usingdiverse transmitter and receiver antenna systems under Rayleigh channel environments. Allanalysis has been performed under ideal identical independent fading conditions with the help ofMATLAB. In this paper, implementations of different equalizers are also verified for theimprovement of the BER performance. MIMO fading channels are correlated to observe mutualcoupling between antenna elements. Receiver diversity is analyzed especially with the MaximalRatio Combining (MRC) technique and fair comparison is done with Equal Gain Combining(EGC) and Selection- Combing (SC). Further study is done with integration of MaximumLikelihood (ML), Maximum Mean Square Equalization (MMSE) and Zero Forcing (ZF). All theresults obtained are simulated by using the MATLAB, under Rayleigh channel conditions.

Manuscript id:-21E028

STEGANOGRAPHY: - A TECHNIQUE TO HIDE DATA

ABSTRACT: - Steganography is a process of hiding a message in such a way that someonecan’t know the presence of or content of hidden message.The main purpose of steganography isto maintain secret communication between two parties (Sender to Receiver).This paper willshow how steganography is used in (past and present) context understanding of what issteganography and how it can be accomplished with the help of cryptography.

S (PG) ITM Rewari Page 52

Abhilash Saurabh 1, Tazeem Ahmad Khan2 V.K.Pandey 3

1M.Tech Scholar, Department of ECE, NIET, MTU, U.P2Dept. of ECE, AFSET, MD University, Rohtak, Haryana

3Department of ECE, NIET, Gr. Noida, MTU, [email protected], [email protected]

Rachana Kumari, Sheetal Lamba, Rahane PappuDepartment Of ECES(PG)ITM,Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E029

THE OSI REFERENCE MODEL

ABSTRACT:-The International Organization for Standardization (ISO) recognized this And researchedvarious network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) referencemodel. The OSI reference model has standards which ensure vendors greater compatibility andinteroperability between various types of network technologies. The OSI reference model organizesnetwork functions into seven numbered layers.

Manuscript id:-21E030

VISIBLE LIGHT COMMUNICATION

ABSTRACT:-The idea of using light as a communication medium has started with VLC.Here VLC (visible light communication) uses white Light Emitting Diode (LED),which senddata using light at a high speed, which human eyes can’t detect, and a high data rate is achieved(at 100 mbps). LED’s have ability to transfer data signal over freq. 400THz – 800THz andwavelength of 400nm to 700 nm range, which is well suitable for communication medium. Onthe detailed investigation of VLC research, founds that not the no. of research has been done todevelop and utilize this technology for communication use. But the research area is new as VLC,the possibilities are widely open.

S (PG) ITM Rewari Page 53

Sachin Tyagi, Kshitiz VermaDepartment Of ECES(PG)ITM,Rewari

Ravindra Kumar, Rahul GuptaResearch Scholar

Department Of ECES(PG)ITM,RewariS(PG)ITM,Rewari

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21E026

EFFECT OF MOBILITY ON SERVICE FLOWS IN WIMAX NETWORK

Abstract- IEEE 802.16 standard WiMAX (Worldwide Interoperability for Microwave Access) isan attractive alternative to leasing lines from current ISPs or the deployment of new fibernetworks. In this paper a scenario is designed using the QualNet 6.1 simulation package. Thispaper presents a novel approach for performance evaluation of different quality of services asdemanded by evolving applications in the Internet. Important performance metrics considered forthe study are total message received, end to end delay, average jitter and average throughput.

Manuscript id:-21C044

ESCALATION OF INTERNET IN INDIA

[email protected]

Department of Computer Science & engineeringSomany (PG) Institute of Technology & Management, Rewari(HR)-India

Abstract:The Internet today connects more than two billion people worldwide. In this paper we representing the

growth of web users. The Internet already has immense impact on the global economy, contributing an

estimated $1.7 trillion, or just fewer than 3 percent, of global GDPin 2010.Yet half the number of Internet

users lives outside the advanced economies, often in countries thatare quickly developing, have

significant economic potential and are socially and culturally diverse. India has about 120 million people

online today and offers a striking example of the Internet’s growth potential. Indiais adopting the Internet

at a much more rapid pace than advanced economies and even many developing economies, yet 90

percent of its population is currently not connected.India’s base of about 120 million Internet users is

currently the third-largest in the world.India is likely to have the second-largest user base in the

world, and the largest in terms of incremental growth, with 330 million to 370 million Internet

users in 2015.

S (PG) ITM Rewari Page 54

Avni KhatkarUniversity Institute of Engineering and Technology

Maharshi Dayanand University, Rohtak, IndiaEmail- [email protected]

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

Manuscript id:-21C045

INTERNET AS A COMMUNICATION TOOL

Abstract - When looking at the social phenomenon that is arising from the use of Internetcommunications tools, one must consider the properties of the tool that influence human-to-human interaction. The availability of communication through the internet has broughtphenomenal resources into the lives of anyone connected to it.The exciting result is thatcollaborating communicating, and learning is accessible (24x7) around the world. Educators andclassrooms can reach beyond physical boundaries to communicate and share through the use of avariety of tools. These generally fall into two categories, asynchronous and synchronous. Thispaper presents a number of such properties and discusses their importance. In addition, existingInternet communications tools are described both in general and with respect to the properties.

S (PG) ITM Rewari Page 55

PRITI YADAV

[email protected] Professor

Somany (P.G) Institute of Technology &Management

SAPNA YADAV

[email protected] Professor

Somany (P.G) Institute of Technology &Management

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

HOW DATA MINING AND KNOWLEDGE DISCOVERY ARECOUNTERPARTS OF EACH OTHER

Abstract: Data mining and knowledge discovery in databases have become a hot area ofresearch. The amount of data doubling every three years has lead to the rise of new technologies.The paper provides an overview of this emerging field clarifying how data mining andknowledge discovery in databases are related to each other. The paper contains both research andpractice of data mining and knowledge discovery, surveys and tutorials of important areas andtechniques, and detailed descriptions of significant applications. The Coverage includes: Theoryand Foundational Issues, Data Mining Methods, Knowledge Discovery Process, ApplicationIssues.

TCP CUBIC- CONGESTION CONTROL TRANSPORTPROTOCOL

Abstract- This paper enlightens the network congestion and how TCP CUBIC- A variant oftransport control protocol (TCP) increases the performance of congestion control mechanism in along fat network. The paper also presents the algorithm used in LINUX for changing thecongestion window to cubic function. We have also tried to analyze the various advantages ofTCP CUBIC as well as some of its limitations.

Manuscript id:-21C046

S (PG) ITM Rewari Page 56

Manuscript Id: 21C043

VERSHA TOMER

[email protected] of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

SHRUTI JAIN

[email protected] of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

Manuscript Id: 21C006

GULSHAN AMIN GILKAR SYED YASMEEN SAHDAD [email protected] [email protected] Department of CSE Department of CSE SITM. SITM.

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

INTERNET PROTOCOL

PARUL

[email protected] of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

Abstract: In this research, we are summarizes about internet protocol. This functionality dealswith abstraction according to the working procedures of the internetworking .In this we simulates, all the layers of internet protocols ,and then specifies how data must be send ,receives fromsource to destination ,and discuss about connecting various independent networks.

Manuscript id:-21C047

A COMPARISON BETWEEN FOUR MODELS OF SOFTWARE ENGINEERING

RUPALI BHARDWAJ

[email protected] of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

Abstract-Software Development Process also known as SDLC are imperfect models as theycannot be built with mathematical and physical certainty. This research deals with importantissues in computer world. It is concerned with Software management process that examines thearea of development models known as SDLC. It represents four of the development modelsnamely, waterfall, Iterative Waterfall, Prototyping and spiral models. These models haveadvantages and disadvantages as well. Therefore, the main objective of this research is torepresent different models of software development and make a comparison between them toshow the features and defects of each model.

Manuscript id:-21C048

S (PG) ITM Rewari Page 57

National Conference on Emerging Trends & Innovation inComputer and CommunicationNCETICC-2013

2013

SECURITY OF WIRELESS SENSOR NETWORK

NARESH KUMAR

[email protected] Institute of Technology and Management

Rewari(HR.) INDIA

Abstract : Wireless Sensor Networks (WSN) is an emerging technology and day by day it isattracting the attention of researchers with its challenging characteristics and diversifiedapplication domain. The more researchers try to develop further cost and energy efficientcomputing devices and algorithms for WSN, the more challenging it becomes to fit the securityof WSN into that constrained environment. However, security is crucial to the success ofapplying WSN. So, familiarity with the security aspects of WSN is essential before designingWSN system. This paper studies the security problems of WSN based on its resource restricteddesign and deployment characteristics and the security requirements for designing a secureWSN. Also, this study documents the well known attacks at the different layers of WSN andsome counter measures against those attacks. Finally, this paper discusses on some defensivemeasures of WSN giving focus on the key management, link layer and routing security.

Manuscript id:-21C049

STEGANOGRAPHY- A DATA HIDING TECHNIQUE

ABHAY GAUTAM

[email protected] Institute of Technology and Management

Rewari(HR.) INDIA

Abstract - Steganography is a process of hiding a message in such a way that someone can’tknow the Presence of message or content of hidden message.It serves better way of securingmessage then cryptography which only derive the content of message not the existing ofmessage.The main purpose of steganography is to maintain secret communication between twoparties( i.e Sender to receiver).In this paper we have tried to elucidate how digital Images can beused as a carrier to hide message.This paper also analyses the performance of steganographytools.Steganography is useful tools that allows convert transmission of information over thecommunication channel.This paper also describes the advantage of Steganography overcryptography.

S (PG) ITM Rewari Page 58