+ All Categories
Home > Documents > National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National...

National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National...

Date post: 30-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
53
National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013 1
Transcript
Page 1: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

1  

  

Page 2: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

2  

  

   

Page 3: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

3  

 

    

Page 4: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

4  

 

    

Page 5: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

5  

 

    

Page 6: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

6  

 

Page 7: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

7  

TECHNICAL ADVISORY COMMITTEE Sr.no

Name Designation E‐mail Id Contact  No.

1. Prof.(Dr.) SP Khatkar

Director, UIET , MDU [email protected]   9813805666

2.  Dr. H.L.Verma

(Dean Academic & Administration, Satya Apeejy University)

[email protected]   9896272466, 9896272433 

3.  Neha Gupta CSE, S(PG)ITM [email protected]   9467848147 

4.  Dr. Pramod Kumar

HOD DTU, Bawana , Delhi [email protected]   9013353272

5.  Dr. YashPal Singh

Director C.D.L Engg College, Sirsa

[email protected]   9416490800 

6.  Dr. C.Ram Singla

Advisor, S.(PG).I.T.M [email protected]   9354515505

7.  Dr.M L Chandna

Professor,D.T.U,Delhi [email protected] [email protected]  

9416738460 

8.  Prof.(Dr.) Executive Council [email protected]   9868263761 

Page 8: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

8  

N.K. Gupta Member,ISTE,New Delhi

9.  Col. Prof. B.B Sharma

Advisor & Consultant Education Group

[email protected] 

 

9811026636, 9654176405 

10.  Prof. H.S Panwar

HOD ECE , RD Foundation, Moidinpur, Gaziabad

[email protected] 

 

9927237874 

11.  Dr. D. Tyagi St. Anne Mary Organization [email protected] 

 

9891227478 

12.  Dr. Prof. YP Singh

Director, S(PG)ITM [email protected] 

 

9896582698

13.  Prof.(Dr.) R. Murugesan

Ex-VC Anna University,presently Chairman ISTE, Delhi

[email protected]  9443317930 

14.  Dr. Anup Pradhan

Director Research, Sunrise University, Alwar

[email protected]     8003094326

15.  Dr. MN Hoda Director, Bharatiya Vidhya [email protected]  9212022066 

16.  Prof. Mahesh Bundele

Director Research, Poornima University, Alwar

[email protected] 

 

9828999440

17.  Prof. K. Kr. Keshariwal

HOD ECE, S.(PG).I.T.M [email protected]  8755160157 

18.  Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad

[email protected]   9811054645

19.  Sh. Vikash Bharati

MD Gate Forum,Delhi [email protected]   9910255155 

20.  Sh. Neeraj

Techmentro, Noida

[email protected]   9958139080

21.  Ravi Gupta Director of BMG Group [email protected]   9812051441 

22.  Dr. S. Basil Gnanappa

Executive Secretary ISTE [email protected]  

011‐26513542, 26513615 

23.  Dr. Devender Singhj

Director State Institute of Engg. & Tech.

[email protected]  [email protected]  

9416012060

Page 9: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

9  

24.  Vipin Singh Registrar RBIT, Bijnor [email protected]  9756030888

25.  Nitin Kumar HOD ECE, Niit Vazirabad, Bijnor

[email protected]  9634080396 

26.  Abhay Raj Singh

Well Growth Education [email protected]   99710213309457610612 

27.  Raman Soni Director curriculum( Dev) [email protected]   

28.  Mr V Sharma Jagannath University viveksharma@jagannathuniversi  9414443034 

29.  Prof.(Dr)N.S.Gill

Director DDE, MDU,Rohtak [email protected]     9050805136

30.  Prof.(Dr.) D. Kumar

HOD, GJU, Hisar [email protected]  9467690800 

31.  Col. K.C Bhardwaj

President IETE Delhi section [email protected]  9873279796

32.  Dr. Rajeev Yadav

HOD, CSE, GCE ,Bilashpur,Gurgaon

[email protected]  9416133666 

34.  Dr. Rakesh Kumar Gill

( HOD,GITM, Gurgaon) [email protected]  9355025077 

35.  Ms. Deepti Bali

Aroma Technology [email protected]  9889260194 

36.  Mr. Ishan Seth

Dy. HOD, KLSIT, Bijnor [email protected]   9889260194 

37.  Mr. Pushpender

Dean Academic, S(P.G)ITM, Rewari

[email protected] 

8059335388

38.  Dr. Sohan Garg

Director C.C.S. University, Meerut (UP)

[email protected]   9536744002

39  Mr. Aakash Gupta

McKinsey & Co. [email protected]  9999675155 

Page 10: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

10  

 

   

TECHNICAL SESSION COMMITTEE-1

Technical Session Track A-Data communication

  

Sr. No

Name Designation

1  Dr.M L Chandna

 

Professor,D.T.U,Delhi 

2  Mr.Manish

CMC Noida

3  Prof. Krishna Kr. Keshariwal

HOD ECE, S.(PG).I.T.M

4  Dr. Anup Pradhan Director Research, Sunrise University, Alwar

5  Prof.(Dr.) N.K. Gupta 

Executive Council Member, ISTE, New Delhi 

6  Prof. Raman Soni Director curriculum Development

Page 11: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

11  

TECHNICAL SESSION COMMITTEE-2

Technical Session Track B-Computer Communication

Sr.no

Name Designation

1  Col. Prof. B.B Sharma Advisor & Consultant Education Group

2  Dr. YashPal Singh Director C.D.L.U Engg. College, Sirsa 

3  Ms. Neha Gupta

 

CSE, S(PG)ITM

4  Sh. Vikash Bharati MD Gate Forum,Delhi

5  Dr. SC Tyagi Council Member, Computer Society Of India, Gaziabad

6  Mr. Sandeep Jain Jain computers Rewari

Page 12: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

12  

 

 

HIDING IMAGE IN AUDIO USING DWT AND LSB

Abstract -- The issue of important information hiding preoccupied the minds of many people especially in business, military and political fields due to the secrecy of their information. Thus, there were always secret means and methods that were pursued to send such information. Later on the spread of internet, information can be sent easily and quickly .Still, at the same time the sent data was easily intercepted and uncovered by hackers. Researchers and scientists have made a lot of research work to solve this problem and to find an effective method for image hiding .The proposed system aims to provide improved robustness, security by using the concept of DWT (Discrete Wavelet Transform) and LSB (Least Significant Bit) proposed a new method of Audio Steganography. The emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.

                       

WIRELESS SENSOR NETWORK: SUSPICIOUS NODE DETECTION BY SIGNAL STRENGTH IN WSN

Abstract-  A wireless sensor network is a collection of nodes organized into a cooperative network. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. In this paper we have explained the architecture of Wireless Sensor Network, its comparison with mobile ad-hoc network, various topologies used in WSN , challenges and how to detect the suspicious nodes in Wireless Sensor Network.

NEHA GUPTA [email protected]

Department of Computer Engineering, The Technological Institute of Textile & Sciences Bhiwani

Haryana, India.

NIDHI SHARMA [email protected]

Assistant professor in Department of Computer Engineering The Technological Institute of textile & Sciences, Bhiwani

Haryana, India

1RISHI VERMA 2 SUNNY 3PUSHPENDER [email protected] [email protected] [email protected] Department of CSA Department of CSA Department of CSE CDLU,Sirsa(Haryana)-India CDLU,Sirsa(Haryana)-India Assistant Prof.(SITM,Rewari)-HR

Manuscript Id: 21C001

Manuscript Id: 21C009

Page 13: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

13  

TESTING OF OBJECT-ORIENTED PROGRAMMING SYSTEMS (OOPS)

Abstract- The aim of this paper is to examine the testing of Object-Oriented Programming Systems (OOPS) and to compare and contrast it with the testing of conventional programming language systems. Conventional system testing, object-oriented system testing and the application of conventional testing methods to object-oriented software will be examined, followed by a look at the differences between testing of conventional (procedural) software and the testing of object oriented software.

ENERGY EFFICIENT WIRELESS COMMUNICATION

Abstract -The explosive growth of high-data-rate applications is leading to more and more energy consumption in wireless networks to guarantee quality of service. Telecommunication networks consume increasing amount of energy and contribute a growing fraction to the CO2 emissions of ICT industry, and are responsible for approximately 2% of the global energy consumption. Reducing energy consumption in wireless communications has attracted increasing attention recently. As data traffic continues to grow due to the proliferation of smart phone devices, reducing greenhouse emission by improving the network energy efficiency is becoming increasingly important. Therefore, energy-efficient communications have been paid increasing attention under the background of limited energy resource and environmental- friendly transmission behaviors. Thus, climate and cost issues now shift the research focus of wireless communications to energy consumption and energy efficiency. In this article, basic concepts of energy-efficient communications are first introduced and then existing fundamental works and advanced techniques for energy efficiency (EE) are summarized, including information-theoretic analysis, orthogonal frequency division multiple access (OFDMA) networks, multiple-input multiple-output (MIMO) techniques, relay transmission, and resource allocation for signaling. Some valuable topics on energy-efficient design are also identified for future research.

GARIMA SINGH [email protected]

M.Tech (CSE) Ist Semester Somany (PG) Institute of Technology &

Management, Rewari

NEHA GUPTA [email protected]

Assistant Professor Department of Computer Science & Engineering,

Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

ANITA YADAV [email protected],

Department of Computer Science & Engineering Somany Institute of Technology & Management (PG), Rewari, Haryana

Manuscript Id: 21C019

Manuscript Id: 21C004

Page 14: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

14  

FACIAL IMAGE RECOGNITION USING DIMENSIONS REDUCTIONS TECHNIQUES PRINCIPLE COMPONENTS ANALYSIS

Abstract—Face recognition is one among the several techniques for identification and verification of an individual. The approach in the present work transforms face images into a small set of characteristic feature images called eigenfaces, which are the principal components of the initial training set of face images. Recognition is performed by projecting a new image into subspace spanned by eigenfaces, followed by computing the distance between the resultant position in the face space and those of known face classes.

REVIEW ON CRYPTOGRAPHY

Abstract: Cryptography is a technique used in day today life for security and protection of confidential information. Cryptography is where security engineering meets mathematics. In this paper I am discussing modern cryptography algorithms that heavily based on computer science practice and mathematical theory, making such algorithms hard to break in practice by any adversary. These algorithms include various Secret key cryptography, public key cryptography algorithms.

SUNNY MITTAL [email protected] 

Lecturer , Dept of CSE Loard Krishna Polytechnic, Rohtak 

RISHI VERMA [email protected]

Assistant Professor, Dept of CSE S. (P.G.) I.T.M., Rewari‐Haryana 

Sangeeta Yadav [email protected]

Department of Computer Science Somany Institute of Technology and Management

Haryana (Rewari)

 

Ekta Chaudhary [email protected]

Department of Computer Science Somany Institute of Technology and Management

Haryana (Rewari)

Manuscript Id: 21C010

Manuscript Id: 21C033

Page 15: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

15  

JAVA – AN EMERGING FIELD FORWEB APPLICATION DEVELOPMENT IN SAP USING WEBDYNPRO 

Abstract:- In this paper it is going to be discussed the differences between two existing WebDynpro techniques – SAP WebDynpro for ABAP and SAP WebDynpro for JAVA. Both have their own pros and cons. So the decision to choose one is best to leave upon the organizations depending upon the need, suitability and business circumstances. WebDynpro is SAP’s own strategic model to create and develop web-based UI applications. Based on the foundation of MVC architecture, it separates the Model, View and Controller which means it keeps apart the backend data from user interface and processing logic. Since all the three are independent so, three developers can work together on the same application which can later be merged via interface. WebDynpro has been classified into two UI Technologies – WebDynpro ABAP and WebDynpro JAVA. Both these domains are integrated with runtime and graphical environment comprising special UI elements which help in building an attractive UI and minimize the coding effort.

ANALYSIS OF WORLD WIDE WEB

Abstract- The World Wide Web or WWW or W3, commonly known as the web is a system of interlinked hypertext documents accessed via the Internet. The W3 project merges networked information retrieval and hypertext to make an easy but powerful global information system. This paper gives the brief introduction of the World Wide Web. This paper defines World Wide Web, working of World Wide Web. It also focuses on the application of the World Wide Web and the need of World Wide Web. W3’s ability to provide implementation-independent access to data and documentation is ideal for a large HEP collaboration. W3 now defines the state of the art in networked information retrieval, for user support, resource discovery and collaborative work.

PARAS MAL [email protected]

Computer Science Engineering Department,Arya College of Engineering & Research Center, Jaipur, India

SUNITA KUMARI [email protected] 

Department Of Computer Science & Engineering Somany (P.G.) Institute Of Technology & Management,  

Rewari‐ 123401. 

RISHI VERMA [email protected]

Assistant Professor Department Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology & Management, Rewari- 123401.

 

Manuscript Id: 21C034

Manuscript Id: 21C032

Page 16: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

16  

DESIGN AND DEVELOPMENT OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK

Abstract-- Wireless Mesh Networks (WMN’s) are self Configuring and self Organizing networks. Routing in WMS’s is very important issue. For routing purposes Several Routing protocols have been developed. Due to Dynamic network conditions, routing is the most critical part in WMN’s and need to be optimized. The routing strategies developed for WMN’s must efficient to make it an operationally self configurable network. This paper responds the design consideration to develop a routing protocol keeping the issue of performance for WMN’S. In this paper, we have explained the routing challenges design and criteria concepts for developing a new routing protocol in WMN’s.Here, we have discussed the key design features for Routing in wireless Mess Networks. Thus, this paper will help to guide the refocus future works in this area.

INTRODUCTION TO CLOUD COMPUTING: A REVIEW

Abstract – This paper describes the cloud computing, system and applications .The term “Cloud Computing” has been mentioned for recent few years. It is basically related to provide a relation between services and users connected through the internet. The main logic behind the Cloud computing is “Renting instead of buying IT services”. Cloud Computing becomes a buzz word not only for start-ups but also for the large companies. These large companies organize international activities over cloud. Cloud Computing allow to access any IT service and software present on the cloud.

ANITA SHARMA [email protected]

Department of Computer Science Somany Institute of Technology and Management

Haryana (Rewari)

ANJALI

[email protected] Department of Computer Science & Engineering Somany Institute of Technology & Management

Rewari, Haryana, INDIA

Manuscript Id: 21C035

Manuscript Id: 21C028

RASHMI SHARMA 

Department of Computer Science & Engineering Somany Institute of Technology & Management (PG), Rewari,

Haryana

Page 17: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

17  

DIGITAL IMAGE WATERMARKING USING DWT-DCT- VITERBI ALGORITHM

Abstract: Watermarking is a need of digital media. To protect from copyright violation of original media, digital watermarking has been proposed as valid solution for this problem. Watermarking using combined DWT-DCT method is done. It improves the parameters like PSNR, bit error ratio. The purpose of the watermark is to embed some additional information about the digital data without visibly modifying it. To make watermarked image more immune to attacks during communication channel, Viterbi algorithm is used. The Viterbi algorithm finds the most likely string of text given the acoustic signal. But in our work viterbi algorithm will be used in image watermarking because it is most error correcting algorithm which is having comparable complexity. Viterbi decoding is used in transferring of data over noisy channel in digital communication. This makes image less prone to errors and a fast decoding method also.

ROUTING CHALLENGES IN WIRELESS MESH NETWORKS

Abstract—Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured networks that employ Cmulti-hop communications to transmit data traffic to and from Internet entry points. WMNs are comprised of three types of nodes: access points, mesh routers, and mesh clients. In mesh networks, traffic between mesh nodes and the Internet is routed over mesh gateways. In this paper, a survey on routing protocols, challenges in routing and applications in wireless mesh networks is conducted. Also we have explained several metrics and design concepts for routing protocols in WMNs.

NEHA GUPTA

[email protected] Assistant Professor,Department of CSE

S(PG)ITM , Rewari  

ABHISHEK GUPTA

[email protected] Assistant Professor

Department of ECE,Geeta Engineering College, Panipat

SONU BHARDWAJ

STUDENT M.TECH Department of Computer Science & engineering

Somany (PG) Institute of Technology & Management, Rewari (HR)-India

Manuscript Id: 21C027

Manuscript Id: 21C031

Page 18: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

18  

A RELIABLE ROUTING MECHANISAM FOR WIRELESS MESH NETWORKS

Abstract— Since wireless mesh networks are ad-hoc in nature, therefore routing protocols used for ad-hoc networks like AODV are also used for WMNs by considering only the shortest path to destination. In WMNs data is transferred to and from APs, and due to this, certain problems such as congestion on routes and overloading the APs are taken place. To obtain a reliable routing path, we have proposed a reliable routing mechanism in this paper. In this paper, we propose a fuzzy logic based, routing algorithm for finding a reliable routing path in WMNs. In this routing technique for each node, we calculate two parameters, signal power value and trust value, to find out the lifetime of routes. Each node along route discovery, stores its signal power value and trust value in RREQ message. In the destination with the help of fuzzy logic mechanism, a new parameter reliability value is determined from inputs signal power value and trust value of each route. The path having highest reliability value is selected as a stable route from source to destination.

REVIEW ON IMPROVE VOICE QUALITY ON VOICE OVER INTERNET PROTOCOL

Abstract - voice over internet protocol (VoIP) is a technology that allows telephone calls to be made over computer network like internet. The user can make the telephone calls over an IP network using this technology. VOIP converts analog voice signals into digital data packets and support real-time, two-way transmission of conversation using I.P. This paper will describe voice over internet protocols to a level that allows discussion of voice quality issues and security issues. Bandwidth is the major reason of low voice quality in voice over IP. Rather than this, equipments , ATA-Router , phone-frequency , weather condition are also some factors that affect the voice quality in VOIP. QoS for VoIP is the strict that can allow you to make a decent call without suffering from delays, weird sounds, noise and echo. You want to converse just like you would over a landline phone. VOIP are basically concerned with businesses, Quality of services (QOS).

Er. Pushpender Sarao [email protected]  

Research Scholar Shri Venkateshwara University, Gajraula-UP

Prof. Dr. Sohan Garg [email protected]

Prof. C.C.S. University, Meerut-UP

Puneet saini Ruchika Walia        [email protected]          [email protected]

           Dept. of Computer Science & Engineering                           Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana             S. (P.G.) I.T.M., Rewari‐Haryana

Manuscript Id: 21C007

Manuscript Id: 21C002

Page 19: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

19  

ADVANCEMENT IN LANGUAGES DESIGN USING

PARALLEL COMPUTING FRAMEWORKS  

 

 

 

Abstract- Parallel computing simply means using more than one computer processor to solve a problem. Classically, computers have been presented to newcomers as “sequential” systems, where the processor does one step at a time. There are still machines and applications where this is true, but today most systems have parallel features Supercomputers achieve astounding speed on scientific computations by using amazing numbers of processors. Servers use multiple processors to handle many simultaneous requests in a timely manner. For example, a web server might use dozens of processors to supply hundreds of pages per second Multi-core chips include several processor cores on a single computer chip. Even a laptop (or other small system) that uses a multi-core chip is a parallel computer.

SILENT SOUND TECHNOLOGY USING Electromyography (EMG) - A Review

Abstract- Silent Sound Technology is useful for those who are unable to speak. They can easy communicate with other people using this technology. Silent Sound technology notices every movement of lips and transfers it into sound. And it help the people who have lost their voice to speak .Silent Sound Technology is developed at the Karlsruhe Institute of Technology. Silent sound technology detects every lip movement and then transforms it into sound that one can easily understand.

PIYUSH SHARMA

Departmentof CSE Arya Engineering College & Research Center

Jaipur, Rajasthan, India

SUDHANSHU VASHISTHA

Departmentof CSE Arya Engineering College & Research

Center Jaipur, Rajasthan, India

NIKITA SHARMA

Departmentof CSE Arya Engineering College & Research Center

Jaipur, Rajasthan, India

Manuscript Id: 21C030

INDERPAL Student, M.Tech.

Dept. of CSE Somany Institute of Technology and Management

Rewari(HR.) INDIA

Manuscript Id: 21C018

Page 20: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

20  

CAPABILITY BASED ENCRYPTION SCHEMES

       Abstract-At present time, the growth in the networking technology increases day by day and interchanging of the digital images very frequently. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with different types of encryption techniques. So for providing data security many cryptography techniques are there, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. There is also, a survey on existing work which is used different techniques for image encryption is done and a general introduction about cryptography is also given.

PROCESS SCHEDULING ALGORITHM

Abstract- The main objective of this paper is to introduce a new CPU algorithm called A Novel CPU Scheduling Algorithm which acts as both preemptive and non-preemptive based on the arrival time. The proposed algorithm helps to improve the CPU efficiency in real time uni-processor-multi programming operating system. CPU Scheduling is the basis of multi-programmed operating system. The scheduler is responsible for multiplexing processes on the CPU. There are many scheduling algorithms available for a multi-programmed operating system like FCFS, SJF, Priority, Round Robin etc. In this paper, the results of the existing algorithms (FCFS, SJF, Priority and Round Robin) are compared with the proposed algorithm.

Ekta

[email protected] Dept. of Computer Science & Engineering

S. (P.G.) I.T.M., Rewari-Haryana

SANGEETA YADAV  

[email protected] Dept. of Computer Science & Engineering

S. (P.G.) I.T.M., Rewari-Haryana

NEHA YADAV              EKTA  

[email protected] [email protected] Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana S. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C020

Manuscript Id: 21C013

Page 21: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

21  

SOFT COMPUTING AND TECHNIQUES

Abstract-Soft computing can be a very attractive alternative to a purely digital system, but there are many traps waiting for researchers trying to apply this new exciting technology. For nonlinear processing both neural networks and fuzzy systems can be used. Terrifically neural networks should provide much better solutions: smoother surfaces, larger number of inputs and outputs, better generalization abilities, faster processing time, etc. In industrial practice, however, many people are frustrated with neural networks not being aware that the reason for their frustrations is wrong learning algorithms and wrong neural network architectures. Having difficulties with neural network training, many industrial practitioners are enlarging neural networks and indeed such But at the same time such excessively large network are not able to respond correctly to new patterns which were not used for training. This paper describes how to use effective neural networks and how to avoid all reasons for frustration.

CRYPTOGRAPHY AND SECURITY ANALYSIS Abstract-Cryptography is the science of writing in secret code and is an ancient art. The need for secure commercial and private communication has been led by the Information Age, which began in the 1980's. The World Wide Web is an electronic protocol which allows people to communicate mail, information, and commerce through a digital medium. This new method of information exchange has caused a tremendous need for information security. A thorough understanding of cryptography and encryption will help people develop better ways to protect valuable information as technology becomes faster and more efficient. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is pretty good privacy because it's effective and free.

DEEPAK KUMAR

[email protected] Dept. of CSE

MITM, JEVRA(HISAR)

Parshant Sharma

[email protected] Dept. of CSE

MITM, JEVRA(HISAR) 

Sushma pachar

[email protected] Dept. of CSE

MITM, JEVRA(HISAR) 

JYOTI KUMARI [email protected]

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

Ekta [email protected]

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

Manuscript Id: 21C003

Manuscript Id: 21C011

Page 22: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

22  

REMOTE PROCEDURE CALL IN DISTRIBUTED SYSTEM

Abstract-Remote Procedure Call (RPC) is a powerful technique for constructing distributed, client/server based applications. This survey is to explain RPC mechanism, how to use the Sun RPC convert local procedures to remote procedures. An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling arguments are passed to the remote procedure and the caller waits for a response to be returned from the remote procedure. A client who interacts with the user and a server, which interacts with the resources The client makes a procedure call that sends a request to the server and waits. The thread is blocked from processing until either a reply is received, or it times out. When the request arrives, the server calls a dispatch routine that performs the requested service, and sends the reply to the client. After the RPC call is completed, the client program continues. RPC specifically supports network applications.

COMPARATIVE STUDY OF WRITER VERIFICATION SYSTEM

 

 

 

Abstract-Writer Verification System (WVS) is the task of determining whether a handwritten text has been actually written by a certain person or not. The system comprises a handwritten text and a claimed identity and subsequently decides whether the text has been written by this writer or not. The steps followed by WVS are in the order: image acquisition, pre-processing, segmentation, feature extraction & classification and post-processing. There are many classifiers present for feature extraction & classification. In the present paper, we will explain WVS, classifiers used in previous work are explained.

GAJENDRA YADAV

[email protected] Department of computer Science & engineering

Somany(PG)Institute of technology & management, rewari(HR)-India

 

RUCHIKA WALIA [email protected] 

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana 

 

MUDIT BANSAL [email protected] 

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana 

 

Manuscript Id: 21C014

Manuscript Id: 21C012

Page 23: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

23  

SOCIAL NETWORKING: THE VIRTUAL WORLD

 

Abstract-Social networking belongs to social communication between the people on Web. Actually, the main aim of “social networking” is to study the interaction of the certain community and what step should be follow for their interaction. Social networking refers to all those online services which are available for free to use for all those people who are interested in making communication with people. There are several free software and web space which allow users to create a network of people. Using social networking users can create their profile, by inserting their personal details. The details of user are not only contains vital information, but they also constitutes a lot of other information like user’s hobbies, passions, interests, professional background and qualification statistics etc. There could be many other factors which could be responsible connect individual in social groups with more security.

REPLICATION IN MOBILE AD-HOC NETWORK USING HOPFIELD NETWORK

ABSTRACT-Mobile Ad hoc Network (MANET) is a network comprises of mobile nodes connected without any centralized administration. Each node in the network has the ability to share a large number of objects with other nodes. The nodes are connected with other nodes to forward a message to other nodes until the search for node that desire meets. This paper represents a new replication method to recover the performance in distributed system. Objects are replicated on different nodes in the network to minimize the search for an object. It is observed that mobility of nodes predicted using SOM (Self Organizing Maps) technique provides less accuracy. This paper represents an algorithm that uses the network parameters as input condition to replicate objects into the nodes. The decision for each node will be taken by gathering the input conditions and feed to the Hopfield Neural Network. It is view that it will provide more accuracy and improve the performance.

ABHIMANU SHARMA

[email protected] Department of Computer Science & engineering

Somany (PG) Institute of Technology & Management, Rewari(HR)-India

TANNU CHAWLA

[email protected] Computer Science & Engineering Department, The Technological

Institute of Textile & Sciences, Bhiwani- 127021, India

DR. MUKESH KUMAR

[email protected] Computer Science & Engineering Department, The

Technological Institute of Textile & Sciences, Bhiwani- 127021, India

Manuscript Id: 21C002

Manuscript Id: 21C015

Page 24: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

24  

ANALYSIS OF NORMALIZATION AND ITS FUTURE SCOPE IN THE

MANAGEMENT OF DATABASE

ABSTRACT-Normalization is a major task in relational database design. Normalization optimizes database management by reducing or eliminating redundant data and ensuring that only related data is stored in a relational database table. This paper describes what database normalization is, why it is important, what it does, and why it is used when building a database. This paper will also describe what happens to a database, when it has not been normalized. It goes on then, to describe the first (1NF), second (2NF), third (3NF) and BCNF normal forms. It focuses on the advantages and disadvantages of normalization, and outlines the advantages and disadvantages of using denormalization .It also discuses the future scope of normalization in database management system.

MANAGEMENT INFORMATION SYSTEM & ITS STRUCTURE

Abstract - Management information system can be used in various forms in organization and businesses. some case such as activates, problem solving, organizational and fallow up business opportunities with using it will be possible .management information system is a useful tool that provided organized and summarized information in a proper time to decision makers and enable making accurate decision for manager in organization or in proper time to decision maker and enable making accurate decision for manager in organizations or in other words, it’s a system that receives data from different units and provide timely and accurate information for different levels of mangers for making optimal decision. In this paper we intend to evaluate the components of (MIS) and the role of it in making optimal decision process.

HEENA SHARMA

[email protected] Department Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology and Management, Rewari

RISHI VERMA

[email protected] Assistant Professor 

Dept. of Computer Science & Engineering Somany (P.G.) Institute Of Technology and Management,

Rewari

Manuscript Id: 21C016

SUMAN

[email protected] Depatment of MBA

Somany(P.G)Institute of Technology & Management, Rewari.

PRITI YADAV

[email protected] Assistant Professor

Department of MBA Somany(P.G)Institute of Technology & Management, Rewari.

Manuscript Id: 21C041

Page 25: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

25  

REVIEW ON STUDY OF CLOUD COMPUTING

Abstract-Cloud computing is a type of computing that relies on sharing computing resources through network. In cloud computing, the word cloud is used for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services are given -- such as servers, storage and applications and so on. In this we are going to study about the cloud management, cloud industry, why we use cloud, and also we are going to study the infrastructure, platform and software used as a services in the cloud computing.

 

 

 

DATA MINING AS GRAPHS: A NEW TOOL FOR SOCIAL NETWORKS

ABSTRACT- The objective of this study is to investigate the concept of data mining in social networks with special emphasis on the graph structure technique. The major principle part in this survey is the literature which is the base or background of the field. The base or background is further divided in to four major part are The Graph theory, The Social networks, The Online social networks and The Graph mining. The graph mining is further divided in to ten sub themes.

RAJEEV SHARMA PUSHPENDER SARAO

[email protected] [email protected] Dept. of Computer Science & Engineering Assistant Professor

S. (P.G.) I.T.M., Rewari-Haryana Head, Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

SOMESH

Somany Institute of Technology and Management Rewari(HR.) INDIA

Email:- [email protected] 

Manuscript Id: 21C018

Manuscript Id: 21C021

Page 26: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

26  

HIDDEN MARKOV MODEL: A USEFUL TOOL IN AUTOMATIC SPEECH RECOGNITION

 

  

Abstract: Speech recognition has been lately used in our smart phones, search engines, security systems etc. When we talk about intelligent system or user-friendly system speech recognition comes in first choice. The main issue is about recognizing the user’s speech and for that purpose Hidden Markov Model (HMM) is extensively used. Out of three different approaches for speech recognition namely Acoustic-phonetic, Knowledge Based, and Pattern Recognition Approach, the later used HMM Model. This paper will present general aspect of automatic speech recognition and use of HMM in it. The paper’s study is based on pattern recognition approach and the third phase speech recognition process ‘Recognition’ and HMM is studied in detail.

 

REVIEW ON MICROSOFT SPEECH REORGANIZATION API

Abstract: The Speech Application Programming Interface or SAPI is an API developed by Microsoft to allow the use of speech recognition and speech synthesis within Windows applications. To date, a number of versions of the API have been released, which have shipped either as part of a Speech SDK, or as part of the Windows OS itself. Applications that use SAPI include Microsoft Office, Microsoft Agent and Microsoft Speech Server. In general all versions of the API have been designed such that a software developer can write an application to perform speech recognition and synthesis by using a standard set of interfaces, accessible from a variety of programming languages. Speech Recognition and Text-To-Speech engines or adapt existing engines to work with SAPI. In principle, as long as these engines conform to the defined interfaces they can be used instead of the Microsoft-supplied engines. In general the Speech API is a freely redistributable component which can be shipped with any Windows application that wishes to use speech technology. Many versions (although not all) of the speech recognition and synthesis engines are also freely redistributable. There have been two main 'families' of the Microsoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extra features in each newer version.  

ASHWANI RATHI [email protected]

Department of Computer Science Engineering Somany (P.G) I. T. M. Rewari 

SANTOSH DAHAL [email protected]

Department of ECE Somany (P.G) I. T. M. Rewari 

RUCHIKA WALIA [email protected]

Department of CSE Somany (P.G) I. T. M. Rewari 

RIPUDAMAN SINGH [email protected]

Department of Computer Science & engineering Somany (PG) Institute of Technology & Management, Rewari (HR)-India

Manuscript Id: 21C024

Manuscript Id: 21C025

Page 27: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

27  

DISTRIBUTED COMPUTING

Abstract-Ensembles of distributed, heterogeneous resources, or Computational Grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. In this paper we briefly motivate Grid computing and introduce its basic concepts. We then highlight a number of distributed computing research questions, and discuss both the relevance and the shortcomings of previous research results when applied to Grid computing. We choose to focus on issues concerning the dissemination and retrieval of information and data on Computational Grid platforms. We feel that these issues are particularly critical at this time, and as we can point to preliminary ideas, work, and results in the Grid community and the distributed computing community. This paper is of interest to distributing computing researchers because Grid computing provides new challenges that need to be addressed, as well as actual platforms for experimentation and research.

FACE RECOGINITION TECHNOLGY

Abstract: Recently Face recognition is becoming the part of everyday life .It has received significant attention, especially during the past several years Face Recognition is the most commonly used in our society on network multimedia. In this paper, we have described the image analysis & processing and video compression and also described the biometrics and classification of biometrics. Biometrics is the identification of the person on the basis of behavioral and anatomical characteristics.

PREETI YADAV

M.Tech. 3rd Sem.(CSE), S(PG)ITM,Rewari

Manuscript Id: 21C029 

MANU YADAV

[email protected] Department of Computer Science & Engineering

Somany(PG) Institute of Technology & Management,Rewari(Hry.)-INDIA

Manuscript Id: 21C043

Page 28: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

28  

KNOWLEDGE DISCOVERY OF DATA WAREHOUSING

 

 

ABSTRACT-Data Warehousing and Knowledge Discovery has been widely accepted as a key technology for enterprises and organizations. It is improve to their abilities in data analysis, decision support and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision making process, the data to be considered becomes more and more complex in both structure and semantics. Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist researchers in extracting useful information from the rapidly growing volumes of digital data. The need for methods and tools that will automate the process of knowledge extraction, or guide the user to subsets of the dataset that are of particular interest is becoming prominent.

WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES

Abstract-Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area net- work coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. The core technology involves a network of wireless routers relaying each others’ packets in a multihop fashion. Many variations on targeted applications and implementation choices offer different opportunities to emerging companies in this emerging area. In this article, we will present an introduction to wireless mesh networks and present both the benefits enabled by this technology and the main hurdles that have to be overcome.

AARTI [email protected]

Department Of Computer Science & Engineering Somany (P.G.) Institute Of Technology & Management,

Rewari -Haryana

RISHI VERMA [email protected]

Assistant Professor Department Of Computer Science & Engineering

Somany (P.G.) Institute Of Technology & Management, Rewari‐Haryana 

RAHUL YADAV [email protected] 

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari‐Haryana 

Manuscript Id: 21C017

Manuscript Id: 21C037

Page 29: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

29  

COMPARATIVE STUDY OF VARIOUS IMAGE SEGMENTATION METHODS

 

    Abstract- Segmenting an image to meaningful parts is a fundamental operation in image processing. Image segmentation is the process of partitioning a digital image into multiple segments. In this paper, various image segmentation methods are explained.

COMPARISON OF CRYPTOGRAPHY AND OTHER DATA HIDING

TECHNIQUES

Abstract - Cryptography is a technique of secure communications between a sender and one or more recipients. In this, sender scrambled a message (plain text into cipher Text) with the help of algorithm and the key and sends this message to recipient. Now recipient unscrambled the message (with the same algorithm and a key, which may or may not be same as the sender’s key) into the original message (cipher text into the plain text). There are two main kind of cryptography: Symmetric Key Cryptography (also known as private key or secret key cryptography) and Asymmetric Key Cryptography (also known as public key cryptography). In our paper we are explaining about the cryptography, its different types, substitution methods, transposition methods and also focused on the different algorithms used for the symmetric and asymmetric key cryptography. We are also showing the comparison of cryptography technique with other data hiding techniques like watermarking, steganography and explaining which one is better for what kind of purpose.

MUDIT BANSAL [email protected]

Department of CSE Somany(P.G.)Institute of Technology & Management,

Rewari (Haryana)

RUCHIKA WALIA [email protected]

Department of CSE Somany(P.G.)Institute of Technology & Management,

Rewari (Haryana)

Manuscript Id: 21C023

JAGDEEP KAUR [email protected]

Department of Computer Science & Engineering, Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

Manuscript Id: 21C036

NEHA GUPTA [email protected]

Assistant Professor Department of Computer Science & Engineering,

Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

Page 30: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

30  

ISSUES AND CHALNGES OF E- LEARNING

Abstract- In the E-learning and E-learning, numerous universities and cultural organizations around the world have launched initiatives to develop tools for multilingual learning and web publishing and have given preference to local content. India has different languages and different culture. Most of the knowledge and information related to people, culture, science and philosophy of India is available in India languages, which will be useful for learning and developing knowledge base. In India E-learning system and online courses are already started, but as a multi lingual country, which gives importance to education through regional languages, This paper cover the issues of Indian language knowledge base/content base, it’s requirement, and its implication in learning. An integrated multi lingual E-learning system for India is proposed in this paper, where importance given to multi lingual course content creation.

CRITICAL STUDY ON BIOLOGICAL NEURAL NETWORK & ARTIFICIAL

NEURAL NETWORK

Abstract - Artificial Neural Networks are inspired by human brain and it also provides new directions and innovative approach in solving problems & wider the potential of computer’s processing. The purpose of this paper is to discuss about the Artificial Neural Networks & how it is linked to our biological neural network, its architecture & applications in modern world. In applications, we will discuss about direct applications which includes pattern classification, associative memories, optimization, control applications and application areas. At last, we will critically study the performance comparison of human brain and ANN.

VIRAT

[email protected] Department of Computer Science & Engineering

Somany(PG) Institute of Technology & Management,Rewari(Hry.)-INDIA

Manuscript Id: 21C038

KRISHAN KUMAR

[email protected] Department of MBA

Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

SAPNA YADAV

[email protected] Assistant Professor

Department of MBA Somany (PG) Institute of Technology & Management,

Rewari- Haryana, India.

Manuscript Id: 21C042

Page 31: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

31  

SWOT ANALYSIS OF E-COMMERCE

Abstract - This research paper describes the invention and accessibility of internet connectivity and powerful online tools has resulted a new commerce era that is E-commerce, which has completely revolutionized the conventional concept of business. E-commerce deals with selling and purchasing of goods and services through internet and computer networks. E-commerce can enhance economic growth, increase business opportunities, competitiveness, better and profitable access to markets. E-Commerce is emerging as a new way of helping business enterprises to complete in the market and thus contributing to economic success. In this research paper we will discuss about advanced SWOT analysis of E-commerce which will comprise of strengths, weaknesses, opportunities and threats faced by e-commerce in current scenario.

IMPACT OF E – BANKING ON TRADITION BANKING SERVICE

 

Abstract- Internet banking is changing the banking industry having the major effect on banking relationships. Banking is now no longer confined to branches were one has to approach branch in person, to withdrew cash and deposit a cheque request a statement of accounts. In true internet banking any inquiry or transaction is processed online without any time. Providing internet banking is increasingly become a “need to have” then a “nice to have” service. The net banking thus, now is more of a norm rather than an exception in many developed countries due to the fact that it is the cheapest way of providing banking services. This research paper will introduce you to E-Banking, giving the meaning, functions, types, advantages and limitations of E-Banking. It will also show the impact of E-Banking on traditional services and finally the result documentation.

Manuscript Id: 21C039

NISHA

[email protected] Department of MBA

Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

PRITI

[email protected] Assistant professor

Department of MBA Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

SANTOSH

[email protected] Department of  MBA

Somany (PG) Institute of Technology & Management, Rewari- Haryana, India.

 

SAPNA YADAV

[email protected] Assistant Professor

Department of MBA Somany (PG) Institute of Technology & Management,

Rewari- Haryana, India.

Manuscript Id: 21C040

Page 32: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

32  

INVISIBLE COMMUNICATION OF SECRET DATA USING VISUAL

CRYPTOGRAPHY

Abstract- In this paper, we proposed a more secure method for Visual cryptography using Least Significant Bits (LSB) information hiding algorithm and based on this, quality will be managed by PSNR (Peak Signal to Noise Ratio) and MSE (Mean Squared Error). So mainly what we are going to do is that an effort has been made to propose and implement a new steganography technique for images by modifying existing algorithms. This technique uses LSB steganography as our basis and disperses a secret message over the entire image taken by us to ensure that the secret message cannot be get from the image. When we compare with other existing algorithms, we can easily prove that the difficulty of decoding the proposed algorithm is high. The system developed for hiding and extracting files based on the method has a wide range of adaptivity and good applicability.

Manuscript Id: 21C005

Manuscript Id: 21C026

PIYUSH SHARMA, SUDHANSHU VASHISTHA

Assistant ProfessorDepartment of Computer Science & Engineering

ARYA INSTITUTE OF ENGINEERING AND TECHNOLOGY

Jaipur, Rajasthan, India

SUDHANSHU VASHISTHA

Assistant Professor

Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGY Jaipur, Rajasthan, India

MANISH CHOUBISA

Assistant Professor Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGY Jaipur, Rajasthan, India

ANCHAL JHAMB

Department of Computer Science & Engineering ARYA INSTITUTE OF ENGINEERING AND

TECHNOLOGY Jaipur, Rajasthan, India

Page 33: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013  2013 

 

33  

SCTP: MULTIHOMING AND MULTISTREAM PROTOCOL

 

  

Abstract- SCTP (stream control transmission protocol) is a reliable message oriented transport layer protocol. It is an IETF standard developed by the Transport Area Working Group (TSVWG). SCTP has been standardized by the IETF(Internet Engineering Task Force) in series of RFCs ,as a reliable transport protocol to transport SS7(Signaling System 7) signaling messages for internet applications such as ISDN over IP, telephony signaling , media gateway control, IP telephony[5]. SCTP is similar to TCP in many services. They are both unicast connection-oriented reliable protocols, provide in-sequence packet delivery and congestion control. SCTP preserves message boundaries and at the same time detects lost data, and out of order data. It uses 32 bit checksum as opposed to a 16 bit checksum of TCP. Although TCP has traditionally been used, we argue that SCTP provides better services than TCP in terms of reliability and performance. Due to its attractive features such as multi-streaming and multi-homing. SCTP has received much popularity, in terms of both research and development [6, 7]. SCTP provides multi-homing in that endpoints can use multiple IP addresses for the connection. SCTP may be more resistant to Man in The Middle (MITM) and Denial of Service (DoS). Multi-stream does not refer to multiple streams in the TCP sense but rather each stream represents a sequence of messages within a single association. These may be long or short messages which include flags for control of segmentation and reassembly.

SYED YASMEEN SHAHDAD [email protected]

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

 

GULSHAN AMIN [email protected]

Dept. of Computer Science & Engineering S. (P.G.) I.T.M., Rewari-Haryana

Page 34: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 34  

Manuscript id: - 21E006

AN EXTENSIVE ANALYSIS OF ELECTRO-MAGNETIC RADIATION FROM CELL PHONES AND THEIR BASE STATIONS AND THE ASSOCIATED HEALTH EFFECTS

ABSTRACT:-Cell phones have become our closest friend in the sense that we play with them for hours in a park, footpath and bed or even in our office. But only a few numbers of people know that sleeping with cell phone for more than 18-20 minutes is like sleeping with a snake. It constantly releases poison in the form of radiation. In 2013, it has been estimated that there will be almost as many mobile-cellular subscriptions as people in the world which is around 6.8 billion users (according to ITU), 55.8 cores alone in India (according to IBN Live News, India) and nearly 736K cell phone towers to meet the communication demand (according to Dot, India). The revised radiation norms adopted by DoT for 900Mhz,1800 Mhz and 2100Mhz band are 0.45 W/m2,0.90W/m2 and 1.05W/m2 active from the date 01.09.2012 and SAR limit for handsets is 1.6W/kg. All over the world, people have been debating about associated health risk due to radiation from cell phone and cell tower. Radiation effects are divided into thermal and non-thermal effects. Non-thermal effects are 3 to 4 times more harmful than thermal effects. The paper will present the mathematical analysis of radiation from handsets and cell towers and the health hazards due to it.

Manuscript id: 21E013

EXTENSIVE STUDY OF INFORMATION AND COMMUNICATION TECHNOLOGY IN THE LIFE OF A COMMON MAN IN INDIAN PERSPECTIVE

ABSTRACT:-Present paper reflects the impact of information and communication technology in the life of an ordinary person in Indian perspective. The life as a common man have changed on the scale of employment opportunity, availability of the information, socio-political life and their economic empowerment besides the stake holders and corporate social responsibility for empowering the common man through the Impact of information technology and other various peripheral discussion. The study shows the emergent need of information technology to enrich life of a common man. In buzz words we may say that” for the sake of the nation, let’s hope this happens sooner rather than later”.

Santosh Dahal Department of Electronics & Communication

S(PG)ITM, Rewari

Raghu Yadav, Sharvan Kr. Dept. of ECE

S(PG)ITM, Rewari

Rajiv Das Department of Electronics & Communication

S(PG)ITM, Rewari

Kavita Yadav Dept. of ECE

S(PG)ITM, Rewari

Page 35: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 35  

Manuscript id: - 21E005 DESIGNING OF ENERGY EFFICIENT, NEED BASED HIGH SPEED WIRELESS

DATA TRANSMISSION AND RECEPTION USING VISIBLE LIGHT SPECTRUM (LI-FI)

ABSTRACT: With the advent of the information technology and its extensive utility in all probable sphere, whole globe have seen the developmental changes and an efficient, transparent, manpower and energy saving system. Information communication technology provides us the convenient transfer of the data and information from one place to another. As a matter of fact today utility of Internet has made the revolution in the world .Whether it is a coffee shop, offices or at home. Speed of the internet is major issue. With the advent of technology,, communication became the backbone of ICT. It had made our globe like a town. Today everyone (Business, institutions, organizations, entrepreneurs and individual) is thrust for getting right information at the right time and right place .Which, requires fast internet connectivity, Technology and large spectrum of channels. Present paper reflects Designing of energy efficient, need based High Speed Wireless Data Transmission and Reception using visible light spectrum (Li-Fi)" which may affect all lives. It is a technology that may be as fast as 500MBPS (30GBPS per minute) an alternative, cost effective and more robust and useful than Wi-Fi. The Visible light communication which may be the future of Internet. A model for the same has been proposed in the present research paper.

Manuscript id: - 21E012

COMPARATIVE STUDY OF GSM & CDMA

Abstract:-GSM stand for global system mobile .In the world 75% GSM used by the users. CDMA stand for code division multiple accesse. 25% CDMA used by the users. Both technologies provide better services like multimedia message, video, high speed internet access digital camera these are some features that we can found on both technologies. GSM technology is older as compare to CDMA but there are some difference features between GSM &CDMA. In GSM different frequency allocated to different user. In CDMA every use same frequency but have different code.

3 Prof.(Dr.) Y.P.Singh,(Director) , S(PG) I.T.M. , Rewari , Haryana

Ekta Yadav Dept. of ECE

S(PG)ITM, Rewari

Shruti Nagar Dept. of ECE

S(PG)ITM, Rewari

1. Er. Abhishek Haridas, Ph.D. Research Scholar,

Sunrise University,

2 Er. Deepak Sharma, Ph.D Scholar (ECE)

Faculty of Engg. & Tech. 

Page 36: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 36  

Manuscript id:-21E002 AN EFFECTIVE AND FEASIBLE COMMUNICATION LIGHT FIDELITY: VISIBLE

LIGHT COMMUNICATION (VLC)  

 

ABSTRACT:-Visible light communication is a communication technology which uses light that is visible to humans as a source of data transmission. This system is easy to access as well as harmless as compared to invisible light spectrum communication. In this article we have tried to illuminate about Visible light communication in brief. After a short introduction and historical overview, the technical details are described. Subsequently the most important fields of applications and future scopes of VLC system are presented.

Manuscript id:- 21E007 INTEL HASWELL MICROPROCESSOR

ABSTRACT:- The main purpose of this paper is to let people know about a very new concept of Intel Haswell. Intel has said that Haswell will deliver twice the performance of Ivy Bridge, and in some cases will double the battery life of ultra books, which are a new category of thin and light laptops with battery life of roughly six to eight hours. Intel shed some light on Haswell at its Intel Developer Forum trade show in September, saying its power consumption had been cut to the point where the chips could be used in tablets. Haswell chips will draw a minimum of 10 watts of power, while Ivy Bridge's lowest power draw is 17 watts. Intel has splintered future Haswell chips into two families: 10-watt chips for ultra books that double as tablets, and 15-watt and 17-watt chips designed for other ultra books and laptops.

Amit. Dept. of ECE

S(PG)ITM, Rewari

Harish Dept. of ECE

S(PG)ITM, Rewari

Prof. (Dr.) Y.P. Singh Director

S(PG)ITM, Rewari

Aditi Agrawal, [email protected]

Rohan Sharma, [email protected]

Kalika Kr. kalikamehra28@gmail

Page 37: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 37  

Manuscript id -21E010

IMPACT OF IMAGING TECHNOLOGIES ON HEALTH

ABSTRACT:- Imaging is becoming an increasingly important tool in both research and clinical care. The history dates back to 1895 when X-ray imaging came in the picture for the first time. After that there were significant advancements in imaging technology through the developments like Computed Tomography (CT)-Scan, Ultra sound, nuclear medicine and magnetic resonance imaging (MRI). But the major concern in today’s world is about their health effects through the radiation. The radiation through them is very dangerous as they have ionizing effects on our body. The high-frequency radiation has enough energy to damage the structure of cells in the body (including DNA) and has well-documented effects on human health like risk of cancer. The thyroid gland and bone marrow are particularly sensitive to ionizing radiation, especially in children. The paper will include the discussion on high energy radiation through them and the associated health effects on human body.

Manuscript id -21E015

AN EXTENSIVE STUDY OF ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) – A boon &backbone to WIRELESS COMMUNICATION

SYSTEM  

 

ABSTRACT:-In the recent advancement communication techniques, OFDM have opened the developed area for further research. Many advantages of OFDM over single carrier scheme is, its ability to cope with severe channel conditions such as attenuation of high frequency in a long copper wire. OFDM is a multi-carrier modulation technique with densely spaced sub-carriers that has gained a lot of popularity among the broadband community in the last few years. OFDM has been shown to be an effective technique to combat multi-path fading in wireless communications. It has been successfully used for HF radio applications. OFDM has chosen as the standard for digital audio broadcasting and high-speed wireless local area networks. Present Paper, including introduction to OFDM Modulation its advantages and demerits, and some applications of OFDM, OFDM techniques for peak-to-average power ratio reduction (PAPR), time and frequency synchronization, and channel estimation will be discussed. We conclude with a brief overview of current application areas.

Lalit Kumar Dept. of ECE

S(PG)ITM, Rewari

Vipin Dept. of ECE

S(PG)ITM, Rewari

Manjeet Kumar. Dept. of ECE

S(PG)ITM, Rewari

Prof. (Dr.) Y.P. Singh Director

S(PG)ITM, Rewari

Page 38: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 38  

Manuscript id -21E014

PERFORMANCE ANALYSIS OF WIRELESS SENSOR NETWORK

ABSTRACT:-Wireless sensor network are networks that consists of sensors which are distributed in ad hoc manner.These sensors work with each other to sense some physical phenomenon and gathered information to get relevant result. Wireless Sensor network uses the protocols which have a unique self-organizing capability. In this paper we analyze the difficulty faced by wireless sensor network and their deficiencies as well their effectiveness.

Manuscript id -21E008

A SURVEY ON WIRELESS SENSOR NETWORK SECURITY

ABSTRACT:-The significant advances of hardware manufacturing technology have boosted the deployment of Wireless Sensor Networks (WSNs).The WSN are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we present a survey of security issues in WSNs.

Avinash Rai Dept. of ECE

S(PG)ITM, Rewari

Narender Singh. Dept. of ECE

S(PG)ITM, Rewari

Charan Singh Dept. of ECE

S(PG)ITM, Rewari

S.Mohan PG Scholar

Nehru Institute of Technology

S.Grace Diana PG Scholar

SNS College of Technology 

S.Ramya PG Scholar

Department of CSE-SE

Page 39: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 39  

Manuscript id -21E011

WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES

Rahul yadav

Rahul y ABSTRACT:- Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area net- work coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. The core technology involves a network of wireless routers relaying each others’ packets in a multichip fashion. Many variations on targeted applications and implementation choices offer different opportunities to emerging companies in this emerging area. In this article, we will present an introduction to wireless mesh networks and present both the benefits enabled by this technology and the main hurdles that have to be overcome.

Manuscript id:-21E003

GENERAL STUDY OF EMBEDDED SYSTEM AND ITS CRITICAL ASPECT

ABSTRACT:-An embedded system is generally a system within a large system. Modern car and trucks contains many embedded systems. One embedded system controls ATM, Mobile Phones, Digital Watches, Traffic light Control, Digital Cameras. Even the general purpose personal computer itself is made up of numerous embedded systems. Keyboard, mouse, video card, modem, hard drive, floppy drive and sound cards are each an embedded system. Early embedded system applications include unmanned space probes, computerized traffic lights and aircraft flight control systems. In the 1980s, embedded system brought microprocessors into every part of our personal and professional lives. Presently there are numerous gadgets coming out to make our life easier and comfortable because of advances in embedded system. The paper will include the general overview and principles of embedded system their applications, recent developments, future research and problems in the system.

Sourabh Dept. of ECE

S(PG)ITM, Rewari

Virat Manav Dept. of ECE

S(PG)ITM, Rewari

S.Santosh Dept. of ECE

S(PG)ITM, Rewari

Rahul Yadav Dept. of Computer Engineering

S(PG)ITM,Rewari

Page 40: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 40  

Manuscript id:-21E004

E-LEARNING BASED ON CLOUD COMPUTING

ABSTRACT:- Education is an emerging practice and it includes various processes and assimilates government’s responsibilities at different levels and ventures of public and rural sectors. These kinds of facilitation of different rural areas of India are extremely helpful to establish good education in developing countries having inadequate resources with surplus manpower and deficit finance .Wireless cloud computing, a collection of multiple wireless computer interface through a digital network, is an excellent model for convenient which is based on demand network access to share the configurable computing resources. Wireless cloud is used as a resources configuration for rural education in India to be presented in this paper. The interoperability between different components of the wireless cloud computing represents each segment of development of rural education such as e-learning, virtual classroom lectures-study centre through proper balancing of teacher-student relational input of rural communication. Simultaneously e-schooling architecture especially for rural education is also presented through wireless cloud computing taking each block as a distribution of a standard education equally. An interoperability of computing i.e. memory, bandwidth and processing capability essential for the communicative link between the teacher as sender and the student as receptor specially in India. A quaint based parallel computing simulation approach is also estimated to be presented for implementation in the paper.

Manuscript id - 21E016

IMPACT OF DIGITAL MEDIA ON LEARNING

ABSTRACT: - Learning is continuous process which means experience of gaining of know-ledge or skill. It is a basic cognitive processes involved in obtaining and storing knowledge. Learning is acquiring new or existing knowledge and may involve synthesizing different types of information. Learning is not compulsory but it is contextual. Teaching and learning is a bipolar process in which learner is on one pole and teacher is on other. The methodology of digital media can change the level and gravity of learning. Now days we find a wide gap between the ancient and present teaching life process due to the new advance technology and the

S.Santosh B.Tech-7th Sem, ECE S(PG)ITM, Rewari

Vikram Soni Dept. of ECE

S(PG)ITM, Rewari

Anita Sharma Department of CSE S(PG)ITM,Rewari

Bhavya Dept. of ECE

S(PG)ITM, Rewari

Vikash Dept. of ECE

(PG)ITM, Rewari

Vijay Dept. of ECE

S(PG)ITM, Rewari

Ajay Singh Dept. of ECE

S(PG)ITM, Rewari

Page 41: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 41  

methodology of learning. Present paper exhibits the importance of digital media on learning.

Manuscript id -21E001

INNOVATION IN 4G TECHNOLOGIES

ABSTRACT: 4G is the term used to refer to the next wave of high-speed mobile technologies that will be used to replace current 3G networks. The two top contenders are LTE and WiMAX, both of which are IP based networks that are built from similar, yet incompatible, technologies. Sprint and Clearwire are currently offering 4G WiMAX service in the USA, while Verizon and AT&T have committed to the use of LTE and are trialing their own 4G networks.The purpose of this paper is to : Clarify the contents of 4G from a technology perspective, present business benefits of 4G enabled services and its Future growth

Manuscript id:-21E018

WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES

ABSTRACT: In the modern era mobile phones are basic need of every person as these are the fastest and the easiest medium of communication. The charging of mobile phone batteries has always been a problem. Battery lifetime is dependent of the manufacturer Company and also price of phone. Many people complain that their phone’s battery doesn’t have long life-time and they have to charge it several times in a day. To overcome this problem wireless charging of mobile phones using microwaves is a very important and useful technique. With this technique you can use your mobile phone without thinking about the battery stand by. This technique works on microwaves. Microwave is sent with the message by the transmitter using antenna at the frequency of 2.45GHz. There are some additions in mobile phone to apply this technique as a sensor, a rectenna circuit and a filter. With this technique the need for separate chargers for mobile phones is eliminated and makes charging universal. Thus the more you talk, the more is your mobile phone charged.

Ankur Kaushik [email protected]

Swati Sharma [email protected]

Viney Department Of ECE S(P.G)ITM,Rewari

  Sanjeet Kumar Department Of ECE S(P.G)ITM,Rewari

Page 42: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 42  

Manuscript id:-21E019

Li- Fi TECHNOLOGY

ABSTRACT: Li-Fi (Light-Fidelity) is communication technologies which use light bulbs or LED to transferring data. It uses light as a carrier instead of traditional radio frequency as in Wi-Fi. Its data transferring speed is 10Gbps. Wireless radio frequencies are growing highly, so that interference in RF is continued to grow. To overcome this problem in future the Li-Fi (Light –Fidelity) technology came into existence since 2011.Li-Fi .This paper will be focus on Li-Fi technology and its future scope

Manuscript id:-21E020

AN APPROACH TO SPEECH RECOGNITION - CHALLENGES & CONCEPT

ABSTRACT Speech is an important, basic, common and efficient form of communication method for interacting each other. Speech technology and systems in human computer interaction have witnessed a stable and remarkable advancement over the last two decades. When we talk about user friendly system, speech recognition system comes in the front position. Today, speech technologies are commercially available for an unlimited but interesting range of tasks. These technologies enable machines to respond correctly and reliably to human voices, and provide useful and valuable services. Recent research concentrates on developing systems that would be much more robust against variability in environment, speaker and language. Error continuous Speech recognition system is still the topic of research and talk of the world, more precisely among research scholars ,hence today’s researches mainly focus on ASR systems with a large vocabulary that support speaker independent operation with continuous speech in different languages. This paper gives an overview of the speech recognition system and its recent progress. The primary objective of this paper is to compare and summarize some of the well known methods used in various stages of speech recognition system.

Monika M. tech, ECE, S (PG)ITM [email protected]

Shilpa M. tech, ECE, S (PG)ITM [email protected]

Prof. (Dr.) Y.P.Singh Director, S(PG)ITM, Rewari Affiliated to MD University

Email:[email protected]

Aswin Tilak Research Scholar

Jodhpur National Universijty Jodhpur

Email:[email protected]

Page 43: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 43  

Manuscript id:-21E025

PATCH AND SLOT FOR ANTENNA DESIGN

ABSTRACT- Patch and slot has become a very important in modern wireless communication antennas. Patch and slots are being used for performance improvement of antenna in wireless communication. Keeping the above fact in mind we had tried to present a complete review on patch and slots antennas .it has been analyzed in detail, In different size and shapes of slots and patch are great interest of obtaining optimum results of antenna design , in order to allow their use in communication application.

Manuscript id:-21E022

AN EXTENSIVE STUDY OF “WIRELESS POWER TRANSMISSION – A NEXT GENERATION POWER TRANSMISSION SYSTEM

ABSTRACT:- Presently, we present the concept of transmitting power without using wires i.e., transmitting power as Beneficial as well need based next generation power transmission system. Wireless power transmission Transfer the power from one place to another is in order to reduce the transmission and distribution losses. We also have discussed the technological developments in Wireless Power Transmission (WPT). The advantages, disadvantages, biological impacts and applications of WPT are also presented. Witricity is nothing but the short name of Wireless Electricity. The basic concept behind this is Magnetic Resonance. Two resonant objects of the same resonant frequency tend to exchange energy efficiently, while dissipating relatively little energy in extraneous off-resonant objects. In systems of coupled resonances, there is often a general “Strongly Coupled” regime of operation. If one can operate in that regime in a given system, the energy transfer is expected to be very efficient. Keeping in view, the need of the hour and nation , let it should happen sooner than later.

Meenakshi Saini, Nitin Kathuria & V.K. Pandey M.Tech. Student, Dept. of Elec. & Comm., NIET, Greater Noida

Assistant Professor, Dept. of Elec. & Comm., AIMT, Greater Noida Professor, Dept of Elec. & Comm., NIET, Greater Noida

Er. Lince Mathew, Ph.D. Scholar 

Jodhpur National University                 Jodhpur, Rajasthan

Prof. Yash Pal Singh Professor  & Director S.(P.G.)I.T.M.,Rewari 

Page 44: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 44  

 

Manuscript id ‐21E009 AN EXTENSIVE ANALYSIS OF CLOUD COMPUTING AND THE ESTIMATION OF

ENERGY CONSUMPTION IN FUTURE

ABSTRACT:-  Cloud  computing  has  recently  emerged  as  a  new  paradigm  for  hosting  and delivering  services  over  the  Internet. Cloud  computing  is  attractive  to  business  owners  as  it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start  from  the small and  increase resources only when  there  is a rise  in service demand. The total energy consumption of the wireless cloud is estimated to be between 32 Terawatt hours (TWh)  (Lo  scenario)  and  43  TWh  (Hi  scenario)  in  2015.For  comparison,  also  included  is  an estimation of the 2012 wireless cloud energy consumption (9.2 TWh) based on demand figures for  that year. This  is an  increase of 390%  to 460% over 3 years.  In  this paper, we present a survey of cloud computing, highlighting  its key concepts, architectural principles, state‐of‐the‐art implementation as well as challenges and energy demand.   

Manuscript id:-21E021

A CPW FED WLAN NOTCHED C-SLOT UWB ANTENNA

ABSTRACT:- A printed, compact, coplanar waveguide fed UWB antenna is presented. The salient feature of the antenna is the inherent property of the design to reject the potential narrowband interferer WLAN system which operates within 5-6 GHz of frequency band. The antenna is 26mm X 26mm in dimension on FR4 substrate. Antenna has a triangular ground with C-shaped slot in the T shaped radiating patch. The C shaped slot is responsible

Karan Saini, Avinash Yadav Department Of ECE               S(P.G.)I.T.M., Rewari 

Santosh Dahal  Department Of ECE   S(P.G.)I.T.M., Rewari 

1Vartika Tyagi, 2Nitin Kathuria & 3V.K. Pandey 1M.Tech. Student, Dept. of Electronics &

Communication, NIET, Greater Noida 2Assistant Professor, Dept. of Electronics &

Communication, AIMT, Greater Noida 3Professor, Dept of Elec. & Comm., NIET,

G t N id

Page 45: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 45  

for the notch characteristics of antenna. The simulated results are fairly good in the desired band(3.1-10.6 GHz) of operation.

Manuscript id:-21E023 CHALLENGES, PROBLEMS & FUTURE SCOPE OF WIRELESS SENSOR 

NETWORK    

ABSTRACT:‐   Sensor networks offer a powerful combination of distributed sensing, computing and  communication.  They  provide  countless  applications  and,  at  the  same  time,  offer numerous challenges due to their peculiarities.   The distinguishing traits of sensor net‐ works have a direct  impact on the hardware design of the nodes at  least  four  levels: power source, processor, communication hardware, and sensors. Various hardware plat‐  forms have already been designed to test the many ideas spawned by the research com‐ munity and to implement applications to virtually all fields of science and technology.  Sensor networks offer a powerful combination of distributed sensing, computing and communication. We will discuss about the challenges, problem & future scope of wireless Sensor network.        Manuscript id:‐21E024 

COMPARISION BETWEEN ZIGBEE & BLUETOOTH  

Abstract—Zigbee is an alternative device to Bluetooth. Zigbee adopted IEEE 802.15.4 as its physical layer & medium access protocol . Zigbee technology is simple and low cost wireless communication & networking solution. It standard is wireless mesh networking. It transmits data over longer distance. It is used in application that requires a low data rate long battery life secure networking.

Nilmani Bharti, Anup Gupta Department Of ECE               S(P.G.)I.T.M., Rewari 

Akash Chauhan, Shalini  Department Of ECE               S(P.G.)I.T.M., Rewari 

Page 46: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 46  

Manuscript id:-21E027 PERFORMANCE OPTIMIZED OF RAYLEIGH WIRELESS CHANNEL WITH

DIFFERENT EQUALIZERS

ABSTRACT:-The paper presents an overview of some important behaviors of equalizer using diverse transmitter and receiver antenna systems under Rayleigh channel environments. All analysis has been performed under ideal identical independent fading conditions with the help of MATLAB. In this paper, implementations of different equalizers are also verified for the improvement of the BER performance. MIMO fading channels are correlated to observe mutual coupling between antenna elements. Receiver diversity is analyzed especially with the Maximal Ratio Combining (MRC) technique and fair comparison is done with Equal Gain Combining (EGC) and Selection- Combing (SC). Further study is done with integration of Maximum Likelihood (ML), Maximum Mean Square Equalization (MMSE) and Zero Forcing (ZF). All the results obtained are simulated by using the MATLAB, under Rayleigh channel conditions.

Manuscript id:-21E028

STEGANOGRAPHY: - A TECHNIQUE TO HIDE DATA

ABSTRACT: - Steganography is a process of hiding a message in such a way that someone can’t know the presence of or content of hidden message.The main purpose of steganography is to maintain secret communication between two parties (Sender to Receiver).This paper will show how steganography is used in (past and present) context understanding of what is steganography and how it can be accomplished with the help of cryptography.

Abhilash Saurabh 1, Tazeem Ahmad Khan2 V.K.Pandey 3

1M.Tech Scholar, Department of ECE, NIET, MTU, U.P 2Dept. of ECE, AFSET, MD University, Rohtak, Haryana

3Department of ECE, NIET, Gr. Noida, MTU, U.P [email protected], [email protected]

Rachana Kumari, Sheetal Lamba, Rahane Pappu Department Of ECE S(PG)ITM,Rewari

Page 47: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 47  

Manuscript id:-21E029 THE OSI REFERENCE MODEL

ABSTRACT:-The International Organization for Standardization (ISO) recognized this And researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. The OSI reference model organizes network functions into seven numbered layers.

Manuscript id:-21E030

VISIBLE LIGHT COMMUNICATION

ABSTRACT:-The idea of using light as a communication medium has started with VLC. Here VLC (visible light communication) uses white Light Emitting Diode (LED),which send data using light at a high speed, which human eyes can’t detect, and a high data rate is achieved (at 100 mbps). LED’s have ability to transfer data signal over freq. 400THz – 800THz and wavelength of 400nm to 700 nm range, which is well suitable for communication medium. On the detailed investigation of VLC research, founds that not the no. of research has been done to develop and utilize this technology for communication use. But the research area is new as VLC, the possibilities are widely open.

Sachin Tyagi, Kshitiz Verma Department Of ECE S(PG)ITM,Rewari

Ravindra Kumar, Rahul Gupta Research Scholar

Department Of ECE S(PG)ITM,Rewari

Page 48: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 48  

Manuscript id:-21E026

EFFECT OF MOBILITY ON SERVICE FLOWS IN WIMAX NETWORK

Abstract- IEEE 802.16 standard WiMAX (Worldwide Interoperability for Microwave Access) is an attractive alternative to leasing lines from current ISPs or the deployment of new fiber networks. In this paper a scenario is designed using the QualNet 6.1 simulation package. This paper presents a novel approach for performance evaluation of different quality of services as demanded by evolving applications in the Internet. Important performance metrics considered for the study are total message received, end to end delay, average jitter and average throughput.

Manuscript id:-21C044

ESCALATION OF INTERNET IN INDIA

VinayBansal

[email protected] Department of Computer Science & engineering

Somany (PG) Institute of Technology & Management, Rewari(HR)-India  

Abstract: The Internet today connects more than two billion people worldwide. In this paper we representing the

growth of web users. The Internet already has immense impact on the global economy, contributing an

estimated $1.7 trillion, or just fewer than 3 percent, of global GDPin 2010.Yet half the number of Internet

users lives outside the advanced economies, often in countries thatare quickly developing, have

significant economic potential and are socially and culturally diverse. India has about 120 million people

online today and offers a striking example of the Internet’s growth potential. Indiais adopting the Internet

at a much more rapid pace than advanced economies and even many developing economies, yet 90

percent of its population is currently not connected.India’s base of about 120 million Internet users is

currently the third-largest in the world.India is likely to have the second-largest user base in the

world, and the largest in terms of incremental growth, with 330 million to 370 million Internet

users in 2015.

Avni KhatkarUniversity Institute of Engineering and Technology

Maharshi Dayanand University, Rohtak, India Email- [email protected]

Page 49: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 49  

Manuscript id:-21C045

INTERNET AS A COMMUNICATION TOOL

Abstract - When looking at the social phenomenon that is arising from the use of Internet communications tools, one must consider the properties of the tool that influence human-to-human interaction. The availability of communication through the internet has brought phenomenal resources into the lives of anyone connected to it.The exciting result is that collaborating communicating, and learning is accessible (24x7) around the world. Educators and classrooms can reach beyond physical boundaries to communicate and share through the use of a variety of tools. These generally fall into two categories, asynchronous and synchronous. This paper presents a number of such properties and discusses their importance. In addition, existing Internet communications tools are described both in general and with respect to the properties.

SAPNA YADAV

[email protected] Assistant Professor

Somany (P.G) Institute of Technology & Management

PRITI YADAV

[email protected] Assistant Professor

Somany (P.G) Institute of Technology & Management

Page 50: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 50  

HOW DATA MINING AND KNOWLEDGE DISCOVERY ARE COUNTERPARTS OF EACH OTHER

Abstract: Data mining and knowledge discovery in databases have become a hot area of research. The amount of data doubling every three years has lead to the rise of new technologies. The paper provides an overview of this emerging field clarifying how data mining and knowledge discovery in databases are related to each other. The paper contains both research and practice of data mining and knowledge discovery, surveys and tutorials of important areas and techniques, and detailed descriptions of significant applications. The Coverage includes: Theory and Foundational Issues, Data Mining Methods, Knowledge Discovery Process, Application Issues.

TCP CUBIC- CONGESTION CONTROL TRANSPORT PROTOCOL

Abstract- This paper enlightens the network congestion and how TCP CUBIC- A variant of transport control protocol (TCP) increases the performance of congestion control mechanism in a long fat network. The paper also presents the algorithm used in LINUX for changing the congestion window to cubic function. We have also tried to analyze the various advantages of TCP CUBIC as well as some of its limitations.

SHRUTI JAIN

[email protected] Department of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

VERSHA TOMER

[email protected] Department of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

Manuscript Id: 21C043 

Manuscript Id: 21C006 

GULSHAN AMIN GILKAR SYED YASMEEN SAHDAD [email protected] [email protected] Department of CSE Department of CSE SITM. SITM.

Page 51: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 51  

 

 

Manuscript id:-21C046

INTERNET PROTOCOL

PARUL

[email protected] Department of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

 

Abstract:  In this research, we are summarizes about internet protocol. This functionality deals with abstraction according to the working procedures of the internetworking .In this we simulates , all the layers of internet protocols ,and then specifies how data must be send ,receives from source to destination ,and discuss about connecting various independent networks.

Manuscript id:-21C047 A COMPARISON BETWEEN FOUR MODELS OF SOFTWARE ENGINEERING

RUPALI BHARDWAJ

[email protected] Department of Computer Science & Engineering

Somany Institute of Technology and Management, Rewari

 Abstract-Software Development Process also known as SDLC are imperfect models as they cannot be built with mathematical and physical certainty. This research deals with important issues in computer world. It is concerned with Software management process that examines the area of development models known as SDLC. It represents four of the development models namely, waterfall, Iterative Waterfall, Prototyping and spiral models. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and make a comparison between them to show the features and defects of each model.

Page 52: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 52  

Manuscript id:-21C048 SECURITY OF WIRELESS SENSOR NETWORK

NARESH KUMAR

[email protected] Somany Institute of Technology and Management

Rewari(HR.) INDIA

Abstract : Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. However, security is crucial to the success of applying WSN. So, familiarity with the security aspects of WSN is essential before designing WSN system. This paper studies the security problems of WSN based on its resource restricted design and deployment characteristics and the security requirements for designing a secure WSN. Also, this study documents the well known attacks at the different layers of WSN and some counter measures against those attacks. Finally, this paper discusses on some defensive measures of WSN giving focus on the key management, link layer and routing security.

Manuscript id:-21C049 STEGANOGRAPHY- A DATA HIDING TECHNIQUE

ABHAY GAUTAM

[email protected] Somany Institute of Technology and Management

Rewari(HR.) INDIA

Abstract - Steganography is a process of hiding a message in such a way that someone can’t know the Presence of message or content of hidden message.It serves better way of securing message then cryptography which only derive the content of message not the existing of message.The main purpose of steganography is to maintain secret communication between two parties( i.e Sender to receiver).In this paper we have tried to elucidate how digital Images can be used as a carrier to hide message.This paper also analyses the performance of steganography tools.Steganography is useful tools that allows convert transmission of information over the communication channel.This paper also describes the advantage of Steganography over cryptography.

Page 53: National Conference on Emerging Trends & Innovation in ... 2013 ABSTRACT BOO… · National Conference on Emerging Trends & Innovation in Computer and Communication NCETICC-2013 2013

National Conference on Emerging Trends & Innovation in Computer and CommunicationNCETICC-2013

2013

 

S (PG) ITM Rewari  Page 53  


Recommended