MCA TWO YERAS, LATERAL ENTRY PROGRAMME       INSTITUTE OF TECHNOLOGY AND SCIENCE HAS BEEN RECOGNIZED FOR "NAAC"       NBA ACCREDITED MCA PROGRAMME @ INSTITUTE OF TECHNOLOGY AND SCIENCE, GHAZIABAD       
 

IT Research & Publications

Book Chapters

1. S.K. Pandey, Vineet Kansal “Social Media Analytics An application of Data Mining” , Book chapter of Book Titled “Data Mining in Dianamic Social Networks & Vuzzy Systems” , DOI:10.4018/978-1-4666-4213-3.CH010, 2013.

List of Publication in International Journal

1. Rakesh Roshan, “Ex-Post Investigation of ERP Business Value in an Indian Organization”, International Journal of Innovative Technology and Exploring Engineering(IJITEE), vol. 4, Issue 7, Dec 2014, pp. 56-59, ISSN: 2278-3075.

2. Vaibhav Bansal, Rabins Porwal, “Mobile Commerce: Applications & Services”, International Journal of Multidisciplinary Consortium (IJMC), vol. 1, Issue 1, Jun 2014, pp. 01-09, ISSN: 2349-073X, published by MRES, Delhi, India.

3. Jitendra Singh, Rabins Porwal, S. P. Singh, “Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link”, International Journal of Computer Network and Information Security (IJCNIS), vol. 6, No. 5, Apr. 2014, pp. 21-28, ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), DOI: 10.5815/ijcnis.2014.05.03, published by MECS Publisher, Hong Kong.

4. K. L. Sarkar, Rabins Porwal, “Voice over IP: Improving Call Admission Control with Modified Voice Codec-A new Approach”, International Journal of Trends in Computer Systems Engineering (IJTICSE), vol. 3, issue 2, Feb. 2014, pp. 153-163, ISSN: 2348-1978 (Online), published by Academic Journals Online, India.

5. Rajeev Kumar, Gaurav Kumar “Location Based UML Development – A UML Based Modeling for usage of location based services” International Journal of Computer Engineering & Technolgoy (IJCET), ISSN 0976-6367 (Print) ISSN 0976-6375 (Online) Oct. 2013.

6. Vaibhav Bansal, Rabins Porwal, “Knowledge Patterns from Knowledge Mining”, International Journal of Research and Development in Technology & Management Sciences (IJRDTM)-Kailash, vol. 20, Issue 06, Jun 2013, pp. 01-05, ISBN No. 978-1-62840-997-0, published by MRES, Delhi, India.

7. Chandramani Sharma , “Adaptive real time motion segmentation technique based on statistical background model” International The Imaging Science Journal UK, Volume- 62 June 2014 DOI 10.1179/1743131X13Y.0000000056. Pg. No 285-302 (http://www.maneyonline.com/doi/abs/10.1179/1743131X13Y.0000000056)

8. S. Saxena, C M Sharma “ A context - aware Approach for detecting skin colored pixels in image” International Journal for Computer Science Vol-71, No-17 June 2013.

9. Umang Singh Deepali Jain, Ashish Payal “ Sensor Nodes Based Group Mobility Model (SN-GM) for MANET, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 823 ISSN 2229-5518.

10. Rajeev Kumar and Harsh Dev, “Efficiency Related Parameters in GPS based Vehicle Tracking System working for an Organization”, International Journal of Computer Applications 68(19):31-35. Published by Foundation of Computer Science, New York, USA, April 2013. Volume- 68,Pg. No 0975-8887. http://www.ijcaonline.org/archives/volume68/number19/11690-7393

11. Vijender Kumar Solanki, Kumar Pal Singh and M Venkatesan. “ Firewalls Best Practices in an Organization” in IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC 9-11, November 2012. Published byFoundation of Computer Science, New York, USA(http://www.ijcaonline.org/proceedings/ctngc/number3/9063-1025)

12. S. Saxena, C M Sharma “ Machine learning based approach for human trait Identification from Blog Data “International Journal for computer application, Vol 48 No—10 June -2012 (pp 0975-888)

13. Dr. Vineet Kansal “An Analysis of Mobile Transaction methods and Limitations in execution of M-Commerce Transaction” in International Journal of Computer application ( 975-8887) Vol.43, No.21 April 2012.

14. C.Sharma, R Roshan, R.Porwal “ Intelligent Video Object Classification scheme using offline Feature Extraction and Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256, ISSN (Online) 1694-0814, January 2012.

15. P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

16. P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.

17. Umang, Shruti Goyal, “Incorporation of IDS in real world applications”, Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20, ISSN-2079-8047, EISSN: 22186301 January 2012.

18. Vineet Kansal “An Analysis of Mobile Transaction Methods and Limitations in execution of M Commernce Transaction” in International Journal of Computer Application, Vol. 43, Iss. 21, pp.14-19, ISSN 975-0887, April 2012.

19. Umang “Analytical Study of Existing Methodologies of IDS for False Alarm Rate -A Survey and Taxonomy”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Iss. 4, pp. 393-399, ISSN 2250-2459, April 2012.

20. A. Agrawal & R. A. Khan, “Role of Coupling in Vulnerability Propagation-Object Oriented Design Perspective”, Software Engineering: An International Journal (SEIJ), vol. 2, no.1 March 2012, pp. 60-68.

21. P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

22. P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.


23. Umang, Shruti Goyal, “Incorporation of IDS in real world applications”, Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20, ISSN-2079-8047, EISSN: 22186301 January 2012.

24. C.Sharma, R Roshan, R.Porwal “ Intellegent Video Object Classification scheme using offline Feature Extraction and Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256, ISSN (Online) 1694-0814, January 2012.

25. Dr. Rabins Porwal, “Working Capabilities of A.T.M with parallels redundant central computer” International Journal of Computational Intelligence and Information Security, Vol-2 No 11,pp. 16-26, Nov-2011.

26. Umang, “Secure Routing Protocols In Mobile Adhoc Networks-A Survey And Taxonomy”, International Journal of Reviews in wireless computing, Vol. 7, Iss. 2, pp. 9-17, ISSN 2076-3328, September 2011.

27. Ashish Seth, “Designing a SOA Based Model” ACM SIGSOFT Software Engineering Notes Page 1 Volume 36 Number 5, September 2011.

28. Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Evolution of Technology through Procedural, Object Oriented, Component Based to Service Oriented. The Journal for Computing Teachers.

29. Vidushi Sharma, Nancy Sharma, “Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform”, IFRSA International Journal of Data Warehousing & Mining, pp. no.75-78, Vol 1 Iss. 1, Aug-2011.

30. Dinkar,S.K. and Purwar, R.K., “Time Aware Incremental Page Ranking Based on Personalized Link Structure Analysis”. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2 Iss. 2, pp 383 – 388, ISSN: 2079-2557, published by Science Academy, UK, indexed in Ulrich, Cabell’s Directory, Google Scholar, Journal Seek, EBSCO, Open J-Gate, Computers and Applied Sciences Complete, ProQuest Technology, INSPEC, Scientific Commons, April, 2011.

31. Umang, Reddy B.V.R and Hoda M.N., “Study of Mobile Management Schemes in Mobile Adhoc Networks”, International Journal of Computer Applications, March 2011, Vol. 17, Iss. 7, pp. 42-47, ISSN-0975-8887, DOI: 10.5120/2236-2605.

32. Ashish Seth. “SOA Evolution – A Review” In International Journal of Engineering Sciences, Vol 1, ISSN: 2229-6913, March 2011.

33. Porwal Rabins, “A Survey in sensor’s Drift counteraction using Dynamic Pattern Recognition System”, Vol. 3 No. 1, pp. no 127-132, ISSN :975-3397, Jan 2011.

34. Pandey, SK, Singh G.P., Kansal V, “Study of Object Oriented Analysis & Design Approach’, Journal of Computer Science, Vol 7 Iss. 2, pp. 143-147, Indexed in NY, USA and indexed in Ulrich, DOAJ, Cabell, WAD, ASA, IET-ISI Scient6ific, Genamics, EBSCO, Thomson Gale, ProQuest, SCOPUS, ISSN 1549-3636, Jan 2011.

35. Ashish Seth., “Minimum Spanning Tree-Based Approach for Reliability Estimation of COTS-Based Software Applications” IUP Journal of Computer Science, Vol 4. Iss. 4, pp.13-21, October 2010.

36. Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Aspects of Service Oriented Computing. The Journal for Computing Teachers.

37. Umang S., Reddy, B. V. R., Hoda M. N. "Enhanced Intrusion Detection System for malicious node detection in ad hoc routing protocol using minimal energy consumption", Communications IEE, Vol. 4, Iss. 17, pp. 2084-2094, ISSN- 1751-8628, DOI: 10.1049/iet-com.2009.0616, Nov 2010.

38. Pandey, SK, Singh G.P., Kansal V., “An Alternative approach to Temporary Memory Management in Database using Object Oriented Systems”, International Journal of Computer Science & Network Security, Vol.10 Iss. 10, pp. 158-165, ISSN 1738-7906, Seoul, Korea indexed in Copernicus, Ulrich, Getcited, Open J-gate, Journal Seek, SCRIBD, Google Scholar, October, 2010.

39. A. Agrawal & R. A. Khan, “Securing Vulnerable Software: A Checklist Approach”, The Journal of Computing (TJC), Vol.1 Iss. 2, pp. 33-45, June 2010.

40. A. Agrawal & R.A.Khan, “An Algorithm to Measure Attribute Vulnerability Ratio of an Object Oriented Design” International Journal of Recent Trends in Engineering, Vol.2, Iss.3, pp. 61-63, November 2009.

41. A. Agrawal & R.A.Khan, “A Framework to Detect and Analyze Software Vulnerabilities -Development Phase Perspective” International Journal of Recent Trends in Engineering, Vol. 2, Iss. 2, pp. 82-84, November 2009.

42. A. Agrawal & R.A.Khan, “Measuring the Vulnerability of an Object Oriented Design”, Network Security, Elsevier, Vol. 2009 Iss.10, pp. 13-17, October 2009.
43. A. Agrawal & R. A. Khan, “Impact of Inheritance on Vulnerability Propagation at Design Phase”, ACM SIGESOFT Software Engineering Notes, Vol 34, Iss. 4, pp. 1-5, July 2009.
List of Publication in National Journal

1. Kumar Rajeev, Dr. Vanshraj Uphadhay, published a paper with title “A comparison of the performance of vehicle tracking system depending on location based services”, in IEBRJ bi- annual journal published by IMS Lucknow in April issue 2014, Volume -1, No-1.

2. S.K. & Singh G.P. Study of Significant of Object of object –oriented Paraligm in Modeling in national journal” computing Trends, Vol.1, ISSN:22309152, January 2011.

3. Dinkar, S.K. and Verma, P., ”Knowledge Discovery in Database: Data mining” in the IILM Journal of Science, Technology & Management(CHINTAN), Vol. 2 Iss.1, pp 36-42, March 2009.

4. A. Agrawal, R. A. Khan & S. Chandra, “Software Security Process-Development Life Cycle Perspective”, CSI communications, India, vol. 32, no.5, pp. 39-42, August 2008.

5. Dhar, P., “OOUPS…! How many germs Live on your desk?” in the journal Spark. [Online].http://www.indiabschools.com/sparkjournal_sys1.html, July, 2008.

6. Dhar ,P., “Security Issues for SHE (Smart Home Environment )” in the jounal Spark. [Online].http://www.indiabschools.com/sparkjournal_sys2.html, March, 2008.

7. Pandey, S. K., “Study of status and Legal Framework of cyber crimes-An Indian Prespective” in the Business Journal from FORE, India, Vol. 24 Issue 3, pp. 20-29, ISSN 0970-2385, December, 2007.
8. Dhar, P., “Use of Technology in newspaper printing with special reference to TOI” in the journal Spark[Online]. http://www.indiabschools.com/sparkjournal_sys3.html , April 2007.

9. Pandey, S. K., “Context-Aware Computing: Augmentation of Mobile devices with Awareness of their Context” in the Apeejay Journal of Management and Technology, Jalandhar, India, Vol. 3, Iss.1 pp 85-93, January, 2007.

10. Pandey, S. K., “Information and communication Technology A catalyst for future roadmap of India” in the Journal Business Transaction The road ahead, pp 133-141, INMANTEC publishing House, July, 2006.

11. Pandey, S. K., “Grid Computing: Enabler of Clustering of Distributed Resources” in the IIIM Journal of Management and IT (OORJA), Jaipur, India, issue 2, Vol. 4, pp 55-63, May-August 2006.

12. Pandey, S. K., “Data Mining: Application of Clustering and parallelism” in the Journal of Rajarshi School of Management & Technology, India, issue 2, Vol. 2, pp 60-74, ISSN 0972-1398, June, 2005

13. Pandey, S. K., “The Saga of E-Commerce & Reforms” in the ITS Journal of IT and Management (SYNERGY), Ghaziabad, India, issue 2, Vol. 1, pp 79-85, March 2003.

List of Publication in International Conferences/Seminars

1. Chandramani Sharma, Harish Kumar, “Architectural Framework for implementing Visual Surveillance as a Servic” Proceedings of IEEE International Conference IndiaCom, April – 2014 Pg. No- 296-301. 978-93-80544-12-0/14/$31.00_c 2014 IEEE.

2. Vijender Kumar Solanki, Kumar Pal Singh, M.Venkatesan, Sudhanshu Raghuvanshi “Securing Networks Using Situation-Based Firewall Policy Computations” published in Springer DOI: 10.1007/978-81-322-1665-0_105, pp: 1029-1035, ISBN : 978-81-322-1665-0 in March-2014 through International Conference “Advanced Computing, Networking, and Informatics” conducted by NIT Rourkela.

3. Rajeev Kumar, “Availability and Handling of Data received from GPS Device: In tracking a Vehicle ,” has been accepted for Oral Presentation in International Advance Computing Conference going to be held in ITM Gurgaun Haryana with IEEE sponsorship and paper will be published in IEEE Xplore, 22-23th Feb- 2014, ISBN 978-1-4799-2571-1, DOI 10.1109/IAdCC.2014.6779328.

4. Harsh Dev, Rajeev Kumar, “Optimization Model for Efficiency Parameters of Location Based Services,” has been accepted for Oral Presentation in International Conference on Issues and Challenges in Intelligent Computing Techniques going to be held in KIET Ghaziabad and will be published in IEEE Xplore, 7-8th Feb- 2014., DOI 10.1109/ICICICT.6781287, INSPEC NO.14211019, Pg No.244-247.

5. Vijender Kumar Solanki, Kumar Pal Singh “Firewalls Policies Enhancement Strategies Towards Securing Network” Proceedings of 2013 IEEE International Conference on Information Communication Technology (ICT-2013) 978-1-4673-5758-6/13.

6. Sharma Charamani, “Automatic Human Activity Recognition in Video using Background Modleling and Spatio-temporal Template Matching Based Technique”, ACM International Conference ACAI 2011, Chitkara University, Patiala Punjab, pp 97-101, ACM 978-4503-0635-5/11.10, 2011.

7. A. Seth. “Data warehousing framework for Telecom Revenue Assurance” in International Conference on Issues and Challenges in Networking, Intelligence and computing Technologies (ICNICT 2011) Sep. 2011.

8. A. Agrawal & R.A.Khan, “A Framework for Vulnerability Minimization- Object Oriented Design Perspective”, 2nd International Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society, pp. 499-504.

9. A. Agrawal & R.A.Khan, “Assessing and Improving Encapsulation for Minimizing Vulnerability of an Object Oriented Design”, Communication in Computer and Information Science, Springer-Verlag, vol. 250, no. 2, pp. 531-533, 2011.

10. Umang, B. V. R. Reddy, M. N. Hoda, GNDA: Detecting Good Neighbor nodes in adhoc routing protocol, IEEE Second International Conference on Emerging Applications of Information Technology, 978-0-7695-1/11 $26.00© 2011 IEEE.DOI 10.1109/EAIT.2011.62.

11. Roshan, R, “Weak Passwords Practices and their Impact on the Security Systems of Universities in India: Analysis and Policy” in proceeding of International Conference of Computer Application (ICCA 2010)”, organized by TFRDC, Pondicherry, Research Publishing. pp 217-221, ISBN 978-981-08-7303-5, 24-27, December 2010.

12. Kumar, R., “Geographical Information System to Identify Related and Required Dynamic Information of an Object” in the International Conference organized by Jaipuria Institute, Ghaziabad, India, issue 1, vol. 4, pp 319-329, ISBN 978-81-313-0850-9, February, 2010.

13. Nancy Sharma, Business Intelligence in Health Care Challenges & Solutions, international Conference on IT & Business Intelligence (ITBI 2009), pp. no 23-27, 6th-8th Nov.2009 at Institute of Management Technology, Nagpur, 2009.

14. A. Agrawal, S. Chandra & R. A. Khan, “An Efficient Measurement of Object Oriented Design Vulnerability”, The International Dependability Conference, ARES, IEEE Computer Society, pp. 618- 623, 16-19 March 2009.

15. Bisht, S., “A Comparative study of aspect oriented testing approaches” published in the proceedings of International conference “Innovation in redefining Business Horizons” at IMT, Ghaziabad, India, pp 587-592, ISBN 023-063-716-7, December, 2008.

16. Pandey, S. K., “Architectural Study and Comparison of Data Warehouse Technologies” in the proceedings of International conference ICDM organized by IMT, Ghaziabad, India, pp 418-426, February, 2008.

17. Umang, and Hoda, M. N. “A Study of Adhoc Wireless Network Routing based on Various AODV Routing Schemes”, International Conference on “Information and Communication Technolgy”, organized by DIT, Dehradun in association with Uttarakhand State Council for Science & Technology, Bharat Sanchar Nigam and Institute of Engineers India((IE(I)), pp 873-876, July, 2007.

List of Abstract Publication in International Conferences/Seminars

1. Dhar, P. and Pandita, S. “The Role of Artificial Neural Networks in recognizing handwritten characters” In Sovenir of International Conference on “Innovative Practices in Management and information Technology for Excellence (SRIJAN’2010)”, organized by Maharaja Agrasen Institute of Management & Technology, Jagadhri, Excel India Publishers, pp 136, May, 2010.

2. Dinkar S.K., “Server Based Antiphising” published in International Conference “Quality, Reliability and Infocom Technology”, Vol. 2, pp 142, ISSN 0972-3392, December, 2009.

3. Porwal, R., Shukla, M., Awasthi, A., Moghey, A. and Pandey, P., “Modeling a Single Level Neuron”, in Proceedings of the International Conference on “Innovative Technologies, ICIT-09”, organized by PDM College of Engineering, Bahadurgarh, Haryana, India, in collaboration with IEEE-IMS/ EMBS (Delhi), pp 309-310, June 2009.

4. Umang, ”Emerging Wireless Technologies in Growth & Development of Rural Areas”, 8th International Conference on Interdisciplinary approach in Physical sciences, organized by IAPS, Allahabad, India, pp 45, December, 2005.

5. Pandey, S. K., “Analytical Study of Data Mining Algorithm”, International conference on Interdisciplinary approach in physical Sciences, organized by IAPS, Allahabad, India, pp 37-38, December, 2005.

List of Publication in National Conferences /Seminars

1. Rajeev Kumar, Dr Harish Kumar “Real Tracking Scenarios through Vehicle Tracking System Based On Location Based Services”, IJCA Proceedings on National Conference on Advancement in Computing Technologies and Applications SACTA, 87-92,, Published by Foundation of Computer Science, New York, USA, April 2014. Pg no- 251-255. ISBN-978-81-928-3802-1.

2. Rajeev Kumar, Harsh Dev, “PhD Showcase: Performance Evaluation and modelling of Location based Services in facilitating logistics by Using GPS/GIS through Hand Held Devices”, IJCA Proceedings on National Conference on Advancement in Computing Technologies and Applications ACTA, 29-32,, Published by Foundation of Computer Science, New York, USA, April 2014.pg no- 291-296, ISBN-978-81-928-3802-1.

3. Puja Dhar, Dr.Sarjue Pandita “A Glance into various government and non-government Projects using ICT in development of Rural India” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 232-234, ISBN No.978-81-928-3802-1.

4. K.P. Singh Harish Kumar, Abay N Tripathi “Threats and preventive approaches for Information Integrity in Wireless Networks” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 380-38, ISBN No.978-81-928-3802-1

5. Chandramani Sharma, Harish Kumar “Creation of Video Mosaics from Low Resolution CCTV Footage” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 297-300, ISBN No.978-81-928-3802-1.

6. Chandramani Sharma, Harish Kumar “Smarter Visual Approach for object segmentation and motion Analysis” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 301-303, ISBN No.978-81-928-3802-1.

7. Harsh Dev, Rajeev Kumar, “Optimization approach for Convergence Aspect of Wireless Communication, Positioning Techniques and Spatial Databases in Facilitating Logistics Industry, IJCA Proceedings on National Conference on Next generation Computing Technologies and Applications NGCTA, 29-32,International Journal of Computer Applications (0975 – 8887) Published by Foundation of Computer Science, New York, USA, November 2013.

8. Chandra Mani Sharma, Rabins Porwal, Deepika Sharma, “An Approach to Deformable Object tracking in Video”,in special edition of IJCA Proceedings on 08th National Conference on Next Generation Computing Technologies & Applications (NGCTA-2013), Nov. 2013, pp. 12-16, ISSN (Online): 0975-8887, published by Foundation of Computer Science, New York, USA.

9. Chandra Mani Sharma, Rabins Porwal, Deepika Sharma, “Testing Object-Oriented Software: Issues, State-of-the-art and Future”, in special edition of IJCA Proceedings on 08th National Conference on Next Generation Computing Technologies & Applications (NGCTA-2013), Nov. 2013, pp. 25-28, ISSN (Online): 0975-8887, published by Foundation of Computer Science, New York, USA.

10. K.P. Singh, Gaurav Kumar, A.N. Tripathi “Analytical study of security Threats of Wireless Networks” published in Proceeding of 8th National Conference NGCTA, Oct-2013, International Journal of Computer Application ( 0975-8887).

11. Vijendr Kumar Solanki, Kumar Pal Singh, M.Venkatesan , S.Tamilselvan "A Holistic Approach to Secure Networks Unsing Firewall" has been published in National Conference on "Frontiers of Applied Science and Computer Technology", FACT-2012 (http://www.ijesacbt.org/fact2012/) dated 6-7th Dec 2012 at NIT Trichy. (Conference Proceeding, Vol-1, pp 48-56).

12. Umang, Securing AODV: A Survey in the 6th National Conference on Advancements In Computational Techniques & Applications (ACTA-2011), at I.T.S Management & IT Institute Ghaziabad, pp. no 134-137, ISBN: 978-93-815830-6-7, October 2011.

13. Nancy Kansal, Identifing Capabilities of Data Mining in providing the Quality Technical Education in The Proceeding of 5th National Conference on “ Computing for National Development (INDIACom 2011)” at Bharati Vidya Peeth’s Institute of Computer Applications and Management New Delhi, March 10-11, 2011.

14. Nancy Kansal, Role of ICT in India: Rural Areas and Health Care in National Conference on “Impact of Information Technology on Society” at I.T.S Mohan Nagar Ghaziabad.

15. C. Sharma. “An Automatic Machine Learning and Particle Fitering Based Approach to Real Time Human Tracking in Videos” National Conference on Signal Processing and Real Time operating system (SPRTO, 2011), pp 290-295, HBTI Kanpur, March 26-27, 2011.

16. Saurabh Saxena. “Security Based Cryptographic Schemes for Password based Protocols” in National Conference on Recent Trends in Network Security and Cryptography, PES Institute, pp. 172-176, Octorber 2009.

17. Khanna.A, Siddiqui.Z, “Domain Driven Data Mining” published in the proceedings of the 5th National Conference on “Computing for Nation Development”, organized by BVICAM, New Delhi, pp 1 – 5, ISBN 978-93-80544-00-7, March, 2011.

18. Kumar M , “ERP Issues & Challenges in Successful Implementation” published in the proceedings of National Conference “Emerging Technology in Computer Science(ETCS-2009)”, organized by MIET Meerut, 213-516, -ISBN 977-91-96549-59-18&19, Sept, 2009.

19. Roshan R., “Data Warehousing and Data Marts: Development in Pattern of Data Mart with Feedback or without Feedback” published in “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 331-338, ISBN 978-81-89547-69-1, November, 2009.

20. Bisht, S., “AOP vs OOP" published in the proceedings of National Conference “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 287-290, ISBN 978-81-89547-69-1, November, 2009.

21. Roshan, R., “It is a tool to capture the essence of Human Thinking and communication and make decisions” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 251-259, ISBN 978-81-89547-55-4, April, 2009.

22. Ray, A. , “Server Side Scripting (State Management)” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 231-237, ISBN 978-81-89547-55-4, April, 2009.

23. Kumar M , “Ajax: An Introduction to Web applications for future Modeling” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, pp 209-216, ISBN 978-81-89547-55-4, April, 2009.

24. Porwal, R., Kapoor, S., Singh, L., and Gupta, A., “A Case Study in Testing a JAVA Class”, in Proceedings of the National Conference on “Emerging Trends in Software & Networking Technologies, ETSNT’09”, organized by Amity Institute of Information Technology, Amity University, Noida, India, pp 175-177, April, 2009.

25. Kumar R., “Security attacks and security policy in WLAN” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 163-175, ISBN 978-81-89547-55-4, April, 2009.

26. Saurabh Saxena “ Multidimensional Database for Book sales Data warehouse” in National Confrence on Advance Conputing & Communication Technology, ABES Ghaziabad pp E22-E25, 6-7 February 2009.

27. Kumar, P., Gupta, G., and Umang, “Aspect oriented Programming with Eclipse AspectJ Development Tool (AJDT)”, 3rd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM New Delhi, India, INDIACOM-2009, pp 319-322, ISSN:0973-7529 and ISBN 978-81-904526-0-3, January, 2009.

28. Singh, K.P., Solanki, V. K., “Implementation of Client Server Architecture using Mobile Agents” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 33-45, ISBN 978-81-89547-48-6, October, 2008.

29. Juneja, N., “Load Balancing technique for SMP machine as an improvement in Linux Scheduler” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 163-169, ISBN 978-81-89547-48-6, October 2008.

30. Srivastava, S., “Techniques of High Dimensional Data Reduction” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 259-266, ISBN 978-81-89547-48-6, October, 2008.

31. Bisht, S., “A study on Benefits of Multi-core processors” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 92-99, ISBN 978-81-89547-48-6, October, 2008.

32. Kumar, G., Tiwari, R., Gupta, S. and Srivastava, A., “Modeling Business Process and IT Infrastructure” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 211-216, ISBN 978-81-89547-48-6, October, 2008.

33. Umang, Kumar, R. and Reddy, B.V.R. “Watchdog and Pathrater as a mechanism to make network more secure”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 84-90, March, 2008.

34. Umang, Abdulahad, F.M. and Rai, C.S. “Comparison between Proactive and Reactive Routing Protocols”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 63-66, March, 2008.

35. Arora, P. and Umang, “Security Considerations For VoIP Systems”, 2nd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM, New Delhi, INDIACOM-2008 pp 245-247, ISSN 0973-7529 and ISBN 978-81-904526-0-2, February, 2008.

36. Pandey, S.K., and Dhawan, V. B., “Developments and Trends in Database Technology” in the proceedings of National Seminar on “Impact of IT on Society” organized by ITS, Mohan Nagar, Ghaziabad, India, pp 69-78, ISBN 81-89547-41-0, February, 2008.

37. Kumar, R., “Finite State machine: making simple work of complex functions” in the proceeding of National Seminar on “Impact of IT on Society” organized by ITS, Mohan Nagar, Ghaziabad, India, pp 132-139, ISBN 81-89547-41-0, February, 2008.

38. Singh, K.P., “I-Mode Technologies” in the proceedings of National Seminar on “Impact of IT on Society” organized by ITS, Mohan Nagar, Ghaziabad, India, pp 216-228, ISBN 978-81-89457-41-0, February, 2008.

39. Dinkar, S.K. and Bansal, N., ”Web Mining and Knowledge Discovery in Usage Patterns” in the Proceedings of National Conference on Information Security & Mobile Computing, pp 85-93, Ghaziabad, India, February, 2008.

40. Pachariya, M., “A Frame work for Test Case Generation by Combinatorics Theory” published in the Proceedings of the National Seminar on “Impact of Information Technology on Society (ITOS– 2008 )” being organized by Institute of Technology & Science Mohan Nagar, Ghaziabad, India, pp 388-407, ISBN 978-81-89457-41-7, February, 2008.

41. Tripathi, A. N., “Rural Development with IT Awareness” in the proceedings of National Marketing Seminar on “Reconfiguring Marketing in the changing Business Landscape”, organized by ITS, Mohan Nagar, Ghaziabad, India, pp 225-230, ISBN 81-89547-38-0, January, 2008.

42. Dinkar, S.K. and Bansal, N., ”Semantics of Temporal Databases: A Perspective Approach” in the proceedings of National Conference on “Organizational Transformation Through Information Technology Issues and Challenges”, Indore, India, pp 173-184, September, 2007.

43. Umang and Hoda, M.N., “Mitigating Attacks in Routing Protocol”, Ist National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM, New Delhi, INDIACOM-2007 pp 145-147, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.

44. Umang and Hoda, M.N., “Role Of ICT in Indian Rural Areas”, Ist National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM, New Delhi, INDIACOM-2007 pp 89-92, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.

45. Mechanics and Information Theory” in the proceedings of National conference on Information Technology and Its Application organized by Bharati Vidyapith, New Delhi, India, pp 21-24, April, 2006.

46. Pandey, S.K. and Bagchi, D., “Software Reliability: Critical attribute for a successful Implementation” in the proceedings of National conference on Emerging Computer Technology organized by Hans Raj Mahila Maha Vidyalaya , Jalendhar, India, pp 67-73, September, 2005.

List of Abstract Publication in National Conferences /Seminars

1. C. Sharma IEEE International Conference on Computer and Communication Technology (ICCCT 2011) MNNIT Allahabad Conference on 15-17th Sep 2011 to be published in IEEE Xplore.

2. Ashish Seth , Kirti Seth “ Business Intelligence with ESB” in conference proceeding of Advancement of Technology soft Computing “

3. Seth A. “Human Resources Planning Model For Scientific Institutions”

4. Ashish Seth National Conference on “Advance Computing & Communication Technology pm 6-7 February 2009 organized by ABES Engineering College Ghaziabad

5. Seth A “Data Warehousing framework for Telecom Revenue Assurance “.

6. Umang, “Challenges in Securing VoIP”, 40th Annual Convention of ORSI, organized by Indian National Science Academy, New Delhi, DST and ORSI, pp 126, December, 2007.

7. Umang and Hoda, M.N., “A Performance comparison of Adhoc on Demand Distance Vector Routing Protocol” in the proceedings of National Conference on “Mathematical Modeling, Optimization and their applications”, organized by SEQOMM DU, Delhi, pp 62-63, April, 2007.

8. Umang, Reddy, B. V. R. and Hoda, M. N., “Impact of ICT in Wireless Networks For Indian Rural Development”, National Seminar on “ICT for Productivity, ICTP- 2006” organized by Sardar patel University, Gandhinagar, India, pp 18, December, 2006.

 

Corporate Conscription

Research & Publications

Announcements

Awards & Ranking