List of Papers Presented / Published by our Teachers. IEEE International Advance Computing Conference (IACC-2009), Patiala
|
|
- Stanley Marshall
- 8 years ago
- Views:
Transcription
1 List of Papers Presented / Published by our Teachers S.N Umang, M.N. Hoda, B.V. R. Reddy 2. Shivendra, Divya 3. Deepali Shalini, M.N. Hoda 4. Pankaj Kr., Ganesh Gupta, Umang 5. Amita, Anjana Gupta, Anu Kiran 6. Rashmi, A. K. Saini Vulnerability of Numerous Black Hole Nodes In Mobile Ad-Hoc Networks The Routing Problem Trip Production and Attraction Modeling Using Artificial Neural Network for Meerut Next Generation Cloud Computing Technology AOP with Eclipse Aspect J- Development Tool (AJDT) Evaluation of Secondary School Based on Analytic Hierarchy Process Method How to Tap ERP s Hidden Potential in India? IEEE International Advance Computing Conference (IACC-2009), Patiala IEEE International Advance Computing Conference (IACC-2009), Patiala Nation Development, INDIACom-2009, Delhi Nation Development, INDIACom-2009,Delhi Nation Development, INDIACom-2009, Delhi Nation Development, INDIACom-2009, Delhi 6-7 March, March, Shivendra, Divya Trip Production Model for Meerut 3rd International Conference on Intelligent Systems and Networks, Ambala Feb, Rashmi, M.P., A.K. Saini Strategic Software Engineering Techniques to Upgrade ERP Implementation 2 nd International Conference on Data Management (ICDM), Ghaziabad Feb, 2009
2 9. Umang, A Performance Evaluation of National Conference on Modern Trends in IT, M. N. Hoda, Milind, on Demand Routing Protocols Parul Arora Delhi Jan, Jatin Bhasin, Deepali M. N. Hoda 11. Rashmi,, A.K.Saini Multi-View Modular Test Plan Implementing Best Practices in ERP for Small and Medium Enterprises Next Generation Computing Technologies (NGCT-2008), Ghaziabad IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE- 2008), Tianjin, China Oct, Sep, Shalini, Deepali M.N.Hoda 13. Rahul Jain, Nitin Barthwal, Piyush Oberoi, Deepali M. N. Hoda 14. Mayank Jain, P. Cauvery, Rajat Kalra, Deepali M.N.Hoda The Role of Web Services in i- Banking and the Associated Security Standards Green Pc: Buy Green Save Green (A Helping Hand In Reducing Global Warming) Sub-Optimal Solution To Vertex Cover Problem National Conference on Advanced Computing, Coimbatore 14 th Annual International Sustainable Development Research Conference, Delhi National Conference on Mathematical Modeling, Optimization and Their Applications, Delhi Details of paper Mathematical Modelling Optimization and their Applications Authors: P.C. and M.N.Hoda Publication year 2010 Pages Sep, Sep,
3 Binding Hard Back An Evolutionary Approach to National Conference on Professional Education, Overcome the Challenges Delhi Facing our Educational System 15., Shalini 16. Ganesh Gupta, Umang, Anu Kiran, Amar Deep Gupta 17. Anu Kiran, Umang, Amita 18. Rashmi, M.N.Hoda, A.K.Saini 19. Fady M. Abdulahad, Umang A Provision of Bandwidth Borrowing Schemes for QOS in Wireless Networking Evaluation and Demonstration Board Using 8051 Microcontroller Climbing ERP Ladder With Better Project Planning Comparison between Proactive and Reactive Routing protocols National Conference on Changing Paradigm in Management Practices, Delhi National Conference on Changing Paradigm in Management Practices, Delhi Published in Books of Abstracts for Business and Economic Society (B&ESI) conference, Switzerland by Inderscience National Conference On Issues and challenges in Internet and Mobile Computing, Ghaziabad 24 July, May, May, July, March, M. N. Hoda, Umang, Milind, Parul Arora 21., Rashmi Simulation of AODV, DSR and DSDV Routing Protocols for Mobile Ad-hoc Networks Be Enterprising With ERP National Conference on Challenges and Opportunity in IT (COIT-2008), Punjab 29 March, 2008 Published in Invertis National Journal of Science Journal and Technology, New Delhi 22. M. N. Hoda, How to Secure VOIP National Conference on Innovative March, 2008 Parul Arora, Umang Development in Engineering Applications (IDEA- 08), Punjab 23. Rashmi Security in e-commerce International Conference on Retail Marketing 7 8 March, 2008
4 Globally Emerging and Evolving Trends Lessons for Developing Economy, Delhi 24. Rashmi Indian Retail Market on a High International Conference on Retail Marketing Tide: E-Retailing for Globally Emerging and Evolving Trends Lessons Empowering India for Developing Economy, Delhi 25. Gaurav Manchanda Anshumen Korpal, Shivendra 26. M. N. Hoda, Parul Arora Umang Methodology to Optimize Electromenchanical Architecture With Information Technology Support Security considerations for VOIP Systems 27. A.K. Saini, Rashmi Emerging ERP in e-india : To Revive,To Resolve,To Rejoice 28. Shivendra, Ashok K. Sinha 29. Shivendra, Divya 30. Ankit Ajmani, Deepali M. N. Hoda Trip Generating Modeling Using Artificial Neural Networks e-commerce Challenges in Developing Countries A Comparative Study On Constructive And Non- Constructive Supervised Learning Algorithm For Artificial Neural Networks 7-8 March M.N Hoda, Challenges in securing Voice 40 th Annual Convention of ORSI, Delhi December,
5 Parul Arora, Umang over Internet Protocol 2007 GPS based Vehicle 40 th Annual Convention of ORSI, Delhi December, Deepali 33., Umang 34. Bhagwan Dev, Deepali 35. Sunny Bajaj, Deepali 36. Shivendra, Divya Monitoring System A Study of AD-Hoc Wireless Network Based on Various ADOV Routing Schemes Case Study: Re - Engineering A Structured Application Into A Multi-Tier Application Using UML Software Architecture Drift International Conference on Information and Communication Technology (IICT-2007), Delhi National Conference on Mathematical Modeling, Optimization and Their Applications, Delhi National Conference on Software Engineering (NCSOFT-2007),Cochin Data Mining for CLC National Conference on IT in Multidomain Industry, Pune 37. Parul Arora Optimization of Voice over IP 38. Shivendra Worth of KPO in Retail July, April, April, April April, , Rashmi 40. M. N. Hoda, Umang Stratergic ERP for E-India: A path to Digital Democracy Mitigating Attacks in Routing Protocols
6 41. Umang, Role of ICT in Rural India M. N. Hoda, Milind 42. Bhawana Chugh, Process Model & Method Deepali Identification System 43. Surabhi Anand, Deepali Improvement in Artificial Intelligence Language Prolog National Seminar on Information Warfare: The New Frontiers, Delhi, Published in National Journal of DIAS Times 07 Jan, Umang, M. N. Hoda, B. V. R. Reddy Impact of ICT in Wireless Networks for Indian Rural Development National Seminar on ICT for Productivity ICTP 2006, Gujrat Dec, , Deepali Kamthania Smart Retail Store Product Identification & Position Tracking International Conference on Mobile Ubiquitous & Pervasive Computing, Obcom-2006,Vellore 16-19,Dec , Deepali Kamthania Pervasive Computing_ Current State Issues_ Challenges. 47. Shivendra University Initiatives for Entrepreneurship Education 48., Rashmi 49., Rashmi Total ERP: Mission Possible ERP in India : Bytes of Facts National Conference on Computer Science & Technology, Ghaziabad National Seminar on India Preneurs New Economy, Delhi Drivers Published in National Journal of DIAS Times National Seminar on Latest IT Trends & Technology, Delhi National Seminar on Latest IT Trends & Technology, Delhi Published in National Journal Nov, Nov, Aug, Aug, 2006.
7 of Apeejay Business Review, New Delhi 50. Deepali Kamthania Pervasive computing National Seminar on Latest IT Trends & Intelligent Spaces Technology, Delhi Aug, Anu Kiran, Amita, S. Ramanarayana Reddy 52. Anu Kiran, Amita, S. Ramanarayana Reddy Embedded Systems at a First Glance Explore Design Possibilities of Doing Various Embedded System Experiment on a Single Board using 8051 Micro-Controller and Real Time Interfacing. National Conference on Electronics Circuits and Communication Systems (ECCS-2004), Patiala National Conference on Electronics Circuit and Communication Systems (ECCS-2004), Patiala
Mathematical Modelling, Optimization and. their Applications. P.C. Jha. M.N. Hoda. Narosa Publishing House. New Delhi Chennai Mumbai Kolkata
Mathematical Modelling, Optimization and their Applications P.C. Jha M.N. Hoda Narosa Publishing House New Delhi Chennai Mumbai Kolkata Contents Acknowledgement v 1. Profit Maximization Policy for Manufacturers
More informationA Novel Technique to Isolate and Detect Jamming Attack in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur
More informationHow To Understand And Understand The Science Of Engineering In India
RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.
More informationDr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.
Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. He obtained his M.Tech. (Information Technology) degree from
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationA Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationName Qualification Designation Specialization Experience (in years)
Department of & Name Qualification Designation Specialization Experience (in years) BHANU KAPOOR SUDHIR MAHAJAN SUMEET DUA Master and Doctorate of from Southern Methodist University, Dallas, Texas. BE
More informationA UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in
More informationIntroduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationEnergy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
More informationSecurity protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More information`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan divya@itmindia.edu Ashwani Kush Computer Dept, University College Kurukshetra University India akush@kuk.ac.in
More informationMONTHLY REMINDERS FOR 2013
MONTHLY REMINDERS FOR 2013 Legend: Red IRS Due Dates Green Department of Revenue Due Dates Blue Parish Finance Due Dates Black Second Collections JANUARY 4 Deposit payroll tax for payments on Jan 1 if
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationTECHNOLOGY INNOVATION & ENTREPRENEURSHIP CENTER (TIEC)
TECHNOLOGY INNOVATION & ENTREPRENEURSHIP CENTER (TIEC) Egypt 1.0 Jan25 : an Investment Story!!! Egypt 2.0 Seed Capital on Jan 25 by Young Entrepreneurs (Youth rebels) Innovative (IT /SN Based FB + Twitter)
More informationStudy and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models
Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,
More informationMonalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationTraining Programme 2014
C A PA C I T Y D E V E LO P M E N T P R O G R A M M E S 2 0 1 4 Training Programme 2014 Economic and Social Research Foundation (ESRF) Research Capacity Building Knowledge Management CAPACITY DEVELOPMENT
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More information( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationDESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS
DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS ANIL KUMAR SHARMA 1, SURENDRA KUMAR PATEL 2, & GUPTESHWAR GUPTA 3 1&2 Department of I.T. and Computer Application, Dr. C.V.Raman University, Kota,
More informationTo Study the Various Attacks and Protocols in MANET
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationpersonnel $ $ payroll claim
personnel $ $ claim payroll leave HR entrée by frontier e-hr ABOUT FRONTIER E-HR Frontier e-hr System enables more than 100,000 users in over 600 companies to streamline their HR operations, increase their
More informationMultihop Wireless Networks
Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline
More informationMaipu ivehicle Cloud Introduction
Maipu ivehicle Cloud Introduction Contents 1 2 3 What is Maipu ivehicle Cloud Solution Introduction Product Introduction Case Study Applications Of Maipu ivehicle Solution In current years, We all are
More informationHaihua LI (lihaihua@caict.ac.cn)
Haihua LI (lihaihua@caict.ac.cn) 1 Viewpoints on Industrial Internet 2 Standardization of Industrial Internet 3 Standardization Activities Industrial internet is the deeply integration and integrated applications
More informationEnterprise VoIP Services over Mobile Ad-Hoc Technologies
Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationDESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 216, pp. 54-61, Article ID: IJCET_7_1_7 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationRESUME. Dr. Rudra Prakash Maheshwari. Indian Institute of Technology Roorkee 247 667, India. 25th June, 1960
RESUME DR. R. P. MAHESHWARI Department of Electrical Engineering Indian Institute of Technology Roorkee 247 667, India Phone: +91-1332-285596 (Off.) +91-1332-272611, 285116 (Res.) FAX: +91-1332-273560
More information6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationEducation. Award. Experience. Teaching Assignment. Research Project
Dr. Satwinder Singh Assistant Professor Centre for Computer Science Technology School of Engineering & Technology Central University of Punjab Bathinda-151100 email:satwindercse@gmail.com Education Ph.
More informationTechnology Longowal, Punjab, India
An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science
More informationA Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV
More informationVoIP Market India July 2014
VoIP Market India July 2014 Executive Summary Market Overview The Indian VoIP market is currently valued at INR x1 mn and is expected to attain a CAGR of x2% to reach INR x3 mn by 20-- Mobile VoIP market
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationHow To Understand The City Of Hong Kong
OGCIO Seminar on PSI/Data.One PSI and Big Data Jiannong Cao Department of Computing Hong Kong Polytechnic University Big Data TB (10 12 bytes) PB (10 15 bytes) EB (10 18 bytes) ZB (10 21 bytes)... The
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationSecured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
More informationApplying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS
Applying ICT and IoT to Multifamily Buildings U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS ETS is an Energy Technology, Behavior Management, and
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationA STUDY ON PERFORMANCE OF UNIT-LINKED INSURANCE PLANS (ULIP) OFFERED BY INDIAN PRIVATE INSURANCE COMPANIES
A STUDY ON PERFORMANCE OF UNIT-LINKED INSURANCE PLANS (ULIP) Dr. G Nagarajan * Mr. A. Asif Ali ** Mr. N. Sathyanarayana** OFFERED BY INDIAN PRIVATE INSURANCE COMPANIES Abstract: Indian Insurance Industry
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationCarnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form
Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form Student Name: Jane Doe Date: 9/19/2002 Project Title: Re-Engineer
More informationPerformance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various
More informationIEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
More informationForward-Looking Statements Disclaimer Market and Industry Data
Corporate Overview Forward-Looking Statements Disclaimer Certain statements made in this presentation and the related materials may contain forward-looking statements, which are not historical facts, but
More informationAdopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationGilead Clinical Operations Risk Management Program
Gilead Clinical Operations Risk Management Program Brian J Nugent, Associate Director 1 Agenda Risk Management Risk Management Background, Benefits, Framework Risk Management Training and Culture Change
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationReal Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
More informationCORPORATE PROFILE JANUARY 2015. Innovative Technology Solutions for the Infrastructure Sector
CORPORATE PROFILE JANUARY 2015 Innovative Technology Solutions for the Infrastructure Sector Our vision To be the most innovative, reliable and quality-focussed solutions provider in the Infrastructure
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013
2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014
2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description
More informationReducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
More informationPadma Charan Das Dept. of E.T.C. Berhampur, Odisha, India
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Measuring Quality
More informationARIS 9 Highlights and Outlook
ARIS 9 Highlights and Outlook Karl Wagner Senior Vice President ARIS R&D 2013 Software AG. All rights reserved. ARIS at a Glance 2M END FIRST BPA Solution 25 SUCCESS LEADER YEARS OF 10,000 CUSTOMERS USERS
More information1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationBGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
More informationProviding Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
More informationStorm Clouds Ahead? A risk analysis of Cloud Computing
Storm Clouds Ahead? A risk analysis of Cloud Computing Andy Bolton Chief Executive Officer, Capacitas Abstract Many organisations are now considering using 'Cloud Computing' offerings to meet their scalability
More informationPerformance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationWhite Paper: Efficient Management of Cloud Resources
White Paper: 215, Cloud Point ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties whatsoever including
More informationUniversity of Wisconsin System Strategic Initiatives
University of Wisconsin System Strategic Initiatives April 27,2015 Sasi K. Pillay UWSA CIO 1 Principles Mission Enablement Reduction of Risk Cost-effective Operations 2 The Four Tenets A. Elevate the Professionalism
More informationThe Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
More informationABV- Indian Institute of Information Technology & Management Gwalior (MP)
ABV- Indian Institute of Information Technology & Management Gwalior (MP) Following are the links to various online courses available (through MOOC etc.). This list is prepared by the Doctoral Students
More informationVerizon Managed SD WAN with Cisco IWAN. October 28, 2015
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines
More informationCOURSE CATALOGUE 2013-2014
COURSE CATALOGUE 201-201 Field: COMPUTER SCIENCE Programme: Bachelor s Degree Programme in Computer Science (Informatics) Length of studies: years (6 semesters) Number of ECTS Credits: 180 +0 for the B.Sc.
More informationHow does Big Data disrupt the technology ecosystem of the public cloud?
How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More information