12.07.2015 Views

Papers Published - MVJ College of Engineering

Papers Published - MVJ College of Engineering

Papers Published - MVJ College of Engineering

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Achievements from the Department<strong>of</strong> Computer Science & <strong>Engineering</strong><strong>Papers</strong> <strong>Published</strong> By Faculty<strong>Papers</strong> <strong>Published</strong> by Dr. M Pauline“A Fuzzy Based Approach for the Enhanced General SystemCharacteristics to Estimate Effort <strong>of</strong> the S<strong>of</strong>tware Projects”, TRIC-2014, 20 th October,Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE“Layered Model to Estimate Effort, Performance and Cost <strong>of</strong> theS<strong>of</strong>tware Projects” IJCA-2013“Fuzzy based Analysis <strong>of</strong> S<strong>of</strong>tware Effort and Cost Estimation usingIntermediate Cocomo and Cocomo II” ICTACT-2013“Comparison <strong>of</strong> available methods to estimate effort and cost withthe proposed method”<strong>Papers</strong> <strong>Published</strong> by Dr. Lokesh N SIterative- Equalization for Single-Carrier Transmission over AdaptiveMultiuser Receivers Scheme for MIMO OFDM, TRIC-2014, 20thOctober, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CEAn Approach to optimize the quality <strong>of</strong> service in Mobile wirelessnetwork " - IJWNA -2014.Power Optimized Physical Layer Modeling For WirelessCommunication, --International Journal <strong>of</strong> Advanced Research inComputer Science and S<strong>of</strong>tware <strong>Engineering</strong> June-2014<strong>Papers</strong> <strong>Published</strong> by Ms. Sreedevi NChinese Remainder Theorem for energy efficient Packet forwardingin Wireless Sensor networks, TRIC-2014, 20th October, Dept <strong>of</strong> CSE,<strong>MVJ</strong>CEAttribute Based Encryption for Scalable and Secure Sharing <strong>of</strong>Medical Records in Cloud Computing Design and Implementation –IJIRCCE-2013Secure Sharing <strong>of</strong> Personal Medical Records: Survey--IJSRCSAMS,2013Routing protocol for wireless sensor networks--IJPCSS, 2013<strong>Papers</strong> <strong>Published</strong> by Mr. Sharavana KApplying virtualization technology on multi-core embedded systemsfor ----Intel system.—IJCSET-2014A survey on deploying hpc in the cloud using volunteer computing—IJIRCCE--2014.A Survey on Privacy Preservation against Traffic Analysis in WirelessNetwork by HEF on GEVs--IJSRCSAMS-- 2013<strong>Papers</strong> <strong>Published</strong> by Mr. Srikanth S PEpvds algorithm for enhanced data delivery in vehicular networks—IJSRCSAMS—2013Regional climate model simulation in hpc environment—IJSRCSAMS—2013Design <strong>of</strong> service pricing optimization in cloud cache—IJSRCSAMS—2013<strong>Papers</strong> <strong>Published</strong> by Ms. Pramela DeviA survey on Genetic Algorithm based Cryptography, TRIC-2014, 20th October, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CEA symmetric key encryption technique using genetic algorithm---IJCSIT- 2014A public key cryptosystem using ecc and genetic algorithm--IJERT –2014<strong>Papers</strong> <strong>Published</strong> by Ms. Sindhuja KA survey on Genetic Algorithm based Cryptography, TRIC-2014, 20th October, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CEA symmetric key encryption technique using genetic algorithm---IJCSIT- 2014A public key cryptosystem using ecc and genetic algorithm--IJERT –2014<strong>Papers</strong> <strong>Published</strong> by Ms. Sanchari SahaA survey on localizing spo<strong>of</strong>ers in multithreaded wireless bodyarea network, TRIC-2014, 20th October, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE“State <strong>of</strong> the Art in WBAN Security & Open Research Isuues”IJRITCC, Volume 2 Isuue 7, July 2014“Reducing carbon emission in cloud environment usingefficient resource allocation methods”, IJCSNS-2014.“A Survey on Protecting Information Brokerage System againstIntruders” IJEIT-2013“ZIGBEE OPNET Modeler: An efficient performance analyzerfor wireless sensor networks”IJESRT-2013“Optimal Price Distribution Strategy for Mobile ServiceProviders”.-IJCTT -2013“An active safety measure technique to monitor driver fatiguestate” JEST-M, -2013<strong>Papers</strong> <strong>Published</strong> by Ms. Annapoorani GAnalysis <strong>of</strong> intrusion detection system based on k-meansalgorithm and particle swarm optimization--IJERT- 2014<strong>Papers</strong> <strong>Published</strong> by Ms. Tamilarasi RMultiple spo<strong>of</strong>ing attacker detection & localization in wirelessnetworks-IJEIT -2014<strong>Papers</strong> <strong>Published</strong> by Ms. Sharmila VOptimal CRC Polynomial Design for Satellite NavigationMessages in International Journal in IJEA-00047 --2014Clustering <strong>of</strong> Time Evolving Authors Network to Discover withMultiple Expertise in International Conference in AMC <strong>College</strong><strong>of</strong> engineering, Bangalore on 21st & 22nd March 2013


<strong>Papers</strong> <strong>Published</strong> by Ms. Santhiya MHadoop and Big Data Processing<strong>Papers</strong> <strong>Published</strong> by Ms. Besty haris<strong>Papers</strong> <strong>Published</strong> by Ms. Madhuleena DasBiclustering <strong>of</strong> gene expression data using a two phase method, IJCA,volume 103, issue 13, October-2014.Wolf Routing to Detect Vampire Attacks in Wireless SensorNetworks, TRIC-2014, 20 th October,Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE<strong>Papers</strong> <strong>Published</strong> by Ms. Manju Khanna‘Modal Logic as Applied to Consumer Market ‘, IJITR, Volume No 2,Issue No 1, December-January 2014<strong>Papers</strong> <strong>Published</strong> by Ms. Krishna Sowjanya“Privilege Separation and Isolation <strong>of</strong> Advertisements in AndroidApplications” International Journal <strong>of</strong> Latest <strong>Engineering</strong>,Management and Applied Science, Volume III , issue VII, July 2014<strong>Papers</strong> <strong>Published</strong> by Ms. Neha Patwari“Privilege Separation and Isolation <strong>of</strong> Advertisements in AndroidApplications” International Journal <strong>of</strong> Latest <strong>Engineering</strong>,Management and Applied Science, Volume III , issue VII, July 2014.<strong>Papers</strong> <strong>Published</strong> by Ms. Supriya V SulladFinancial Transaction via Mobile, TRIC-2014, 20th October, Dept <strong>of</strong>CSE, <strong>MVJ</strong>CE<strong>Papers</strong> <strong>Published</strong> by Ms. Jisha JoseSpeckle and contrast enhancement <strong>of</strong> ultra sound images usinganisotropic diffusion with jsd operator”-BIOMEDICAL ENGINEERINGLETTERS, SPRINGER-VERLANG , JUNE 2013 (VOLUME 3, NO 2)<strong>Papers</strong> <strong>Published</strong> by Ms. ShruthiObtaining a path with maximum allowed flow rate between sourceand destination—IJSR-2013.<strong>Papers</strong> <strong>Published</strong> by Ms. Alpana DahiyaVehicular Ad hoc Networks (VANETS): Simulation and Simulators,International Journal <strong>of</strong> Research in Management, Science &Technology (E-ISSN: 2321-3264) Vol. 2, No. 1, April 2014.Intelligent Vehicular Networks - ITS, Second International Conferenceon “Evolution in Science and Technology and Eyne on EducationalMethodologies (ESTEEM-2013)” March 03rd-04th, 2013.Security Threads In Vanet, Second International Conferenceon “Evolution in Science and Technology and Eyne on EducationalMethodologies (ESTEEM-2013)” March 03rd-04th, 2013.<strong>Papers</strong> <strong>Published</strong> by Ms. Madhusmitha DasImproved Dynamic Response <strong>of</strong> DSTATCOM using GeneticAlgorithm” IISTE, ISSN 2222-1719 (paper), ISSN 2222-2863 (online),vol 3 No. 3, 2013.<strong>Papers</strong> <strong>Published</strong> by Ms. Kavyashree5G – A Vision 2020, TRIC-2014, 20th October, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE"Dynamic collaboration" International conference on Computation <strong>of</strong>Power, Energy, Information and Communication (ICCPEIC-2013)17 th and 18th, April (2013),<strong>Papers</strong> <strong>Published</strong> by Mr. DharmalingamTBP: A Threshold Based Priority Scheduling in Cloud ComputingEnvironment”, International Journal <strong>of</strong> Innovative Science,<strong>Engineering</strong> & Technology, Vol. 1 Issue 4, June 2014.“Reducing Power Consumption And Increasing The Efficiency InCloud Data Centers”, International Journal <strong>of</strong> Innovative Science,<strong>Engineering</strong> & Technology, Vol. 1 Issue 4, June 2014.


Book <strong>Published</strong> By FacultyAchievements from theDepartment <strong>of</strong>Computer Science & <strong>Engineering</strong>Book <strong>Published</strong> by Mrs. Sanchari Saha“Object Oriented Modeling & Design Pattern”, Sanchari Saha, 2ndEdition, 2014, ISBN: 978-81-9271598-8, <strong>Published</strong> by-SIP Page-Turner’s, a publication division <strong>of</strong> SIP page turner’s.


Achievements from the Department<strong>of</strong> Computer Science & <strong>Engineering</strong><strong>Papers</strong> <strong>Published</strong> By Students<strong>Papers</strong> <strong>Published</strong> by Mr. Abhilash KV (PG)Reducing Carbon Emission in Cloud Environment Using EfficientResource Allocation Methods—ICCIT-2014A survey on resource management in cloud computing—IJCSIT--2014Automated resource management system in cloud computing—TRIC—2013<strong>Papers</strong> <strong>Published</strong> by Ms. Chitrashree Kurtkoti (PG)Message Authentication and Source Privacy using ECC in WSN-IJERT-2014.<strong>Papers</strong> <strong>Published</strong> by Mr. Lakkireddy Rahul reddy (PG)Deployment <strong>of</strong> Virtual HPC clusters on demand from volunteercomputing resources—IJARCCE—2014A Survey on Deploying HPC in the Cloud Using VolunteerComputing—IJCEA—2014<strong>Papers</strong> <strong>Published</strong> by Mr. MadhuSudana H A (PG)A Survey on Protecting Information Brokerage System againstIntruders—IJEIT—2013Preserving Privacy <strong>of</strong> Information Brokering Systems in DistributedInformation Sharing—TRIC-2013Design <strong>of</strong> the Protecting Information Brokerage System AgainstIntruders—IJARCST—2014<strong>Papers</strong> <strong>Published</strong> by Mr. Suresh Chogula (PG)Survey on Traffic Redundancy and Elimination Approach forReducing Cloud Bandwidth and Costs-IJCSET—2014Design <strong>of</strong> Traffic Redundancy and Elimination Approach for ReducingCloud Bandwidth and Costs—IJIRCCE—2014<strong>Papers</strong> <strong>Published</strong> by Mr. Jaharlal Sarkar (PG)Multiple spo<strong>of</strong>ing attacks detection & localization in wirelessnetwork—IJEIT--2014<strong>Papers</strong> <strong>Published</strong> by Mr. Anand Kulkarni (PG)Universal Mobile Web Service—ICCIT-2014<strong>Papers</strong> <strong>Published</strong> by Mr. Madhusudan S (PG)Detection <strong>of</strong> Network Intrusion and Countermeasure Selection inCloud Systems- IOSR-JCE—2014PCSV: Private Cloud Security using VLANs—TRIC-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Srinivas Babu (PG)GENTEEL NETWORK: Condensing Dissipation <strong>of</strong> Power andNetwork Power Enforcement—ICCIT-2014<strong>Papers</strong> <strong>Published</strong> by MS. Deepika S Haliyal (PG)Two Way User Authentication Using Biometric Based Scheme forWireless Sensor Networks---IJEIT-2014“Biometric-Based User Authentication Scheme For Wireless SensorNetwork”—TRIC-2013<strong>Papers</strong> <strong>Published</strong> by Ms. Sunita tiwari (PG)A Survey on Distance Bounding Protocol for attacks and frauds inRTLS system—IJEIT-2014Real-Time Location Systems Security using Distance Bounding—IJRES-2014Distance bounding: a secure solution for attacks & frauds in real timelocation systems<strong>Papers</strong> <strong>Published</strong> by Ms. Bharati madani (PG)Attribute Based Encryption for Scalable and Secure Sharing <strong>of</strong>Medical Records in Cloud Computing Design and Implementation—IJIRCCE--2013Secure Sharing <strong>of</strong> Personal Medical Records: Survey—IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Mayur.p.auradker (PG)EPDVS Algorithm for Enhanced Data Delivery in Vehicular Networks.–IJSRCSAMS-2013A Survey on Vehicular Networks to propose EPDVSImplementation—ICACIT--2013<strong>Papers</strong> <strong>Published</strong> by Ms. Neetha (PG)Achieving Data Privacy and Security for Multi Shares using MultiClouds Computing-IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Pavan Mulgund (PG)A Survey On Tying Data To Geographic Locations In Mobile-Disconnected Networks Using Boomerang Protocol—IJARCCE-2013A Design Of Efficient Management Of Geocache In Mobile-Disconnected Networks Using Trajectory-Based Approach-IJSRCSAMS-2013Overview Architecture Of Audit Services In Cloud Storages-- DesignInnovations for 3Cs Compute-Communicate- Control--2014Overview Architecture Of Audit Services In Cloud Storages-- DesignInnovations for 3Cs Compute-Communicate- Control--2014


<strong>Papers</strong> <strong>Published</strong> by Mr. Praveen S G (PG)Efficient Node Energy Based Encryption And False Data Injection InWSN-IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Ms. Rachana M (PG)Energy Efficient and Reliable CRT Based Packet Forwarding Techniquein Wireless Sensor Networks—IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Rakesh V S (PG)A Survey on Underwater Sensor Network Architecture and Protocols—IJCSET-2013Design <strong>of</strong> Multiple path transmission for Acoustic Sensor Networks -IJCIS-2013<strong>Papers</strong> <strong>Published</strong> by Ms. Shruthi B M (PG)Secure Network Discovery for Trust Aware Routing Against SevereAttacks in WSNs--IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Somashekhar P (PG)Design <strong>of</strong> Service Pricing Optimisation in Cloud Cache-IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Sreedhar Kulkarni (PG)A Survey on Privacy Preservation against Traffic Analysis in WirelessNetwork by HEF on GEV’s –IJSRCSAMS-2013Privacy Preservation against Traffic Analysis in Wireless NetworkHEF On GEV’s.-IJIRCCE-2013<strong>Papers</strong> <strong>Published</strong> by Mr. Rakesh Sharma (PG)Exploiting Jamming Caused by the Neighbor Changes for JammerLocalization Technique-IJSRCSAMS-2013<strong>Papers</strong> <strong>Published</strong> by MS. Divya Alapati (PG)Secure and Energy-Efficient Cooperative Video Distribution overWireless Networks –IJCSMC-2013Design <strong>of</strong> secure and energy-efficient cooperative video distributionover wireless networks –IJRIT-2013<strong>Papers</strong> <strong>Published</strong> by Pushpalatha k v, Rathnavathi kumari, Swathi(UG)Android Based Alcoholic Monitoring System -- Compute-Communicate-Control, National Conference, 5th May,2014 Held At <strong>MVJ</strong>CE,Bangalore<strong>Papers</strong> <strong>Published</strong> by Vinod kumar m, Sachin wade, Paramesha v,Darshan m c (UG)Spoc : A Secure & Privacy Preserving Opportunistic ComputingFramework For Mobile Healthcare Emergency-- National LevelConference Held At Anaadyantha, Nitte Meenakshi Institute OfTechnology Bangalore, May 2014<strong>Papers</strong> <strong>Published</strong> by Raghava sharma, Satish kumar m,Suresh kumar b, S Sathish (UG)E-Book search engine-- National Level Conference Held AtAnaadyantha, Nitte Meenakshi Institute Of TechnologyBangalore, May 2014<strong>Papers</strong> <strong>Published</strong> by Ramya p, Shruthi r, Sheethal r, Shirisham s (UG)Efficient Fuzzy Type Ahead Searching Xml Data-- Compute-Communicate-Control, National Conference, 5th May,2014 HeldAt <strong>MVJ</strong>CE, Bangalore<strong>Papers</strong> <strong>Published</strong> by Sandeep v s, Tonmoy mukherjee (UG)Mid-Criteria Implementation on Optimal Route for Road Networks-- Compute-Communicate-Control, National Conference, 5thMay,2014 Held At <strong>MVJ</strong>CE, Bangalore<strong>Papers</strong> <strong>Published</strong> by Roshan neupane, Vandana b, Yogeshneupane, Vanshaj sheth (UG)Remote ATM Security -- Compute-Communicate-Control,National Conference, 5th May,2014 Held At <strong>MVJ</strong>CE, Bangalore<strong>Papers</strong> <strong>Published</strong> by Divya B L (PG)Removing Path-Switching Cost in Video Delivery over MultiplePaths in Mobile Networks, TRIC-2014, 20 th October-2014, Dept <strong>of</strong>CSE, <strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Archana Bhaskar (PG)Workload Scheduling Optimization for Multimedia CloudComputing, TRIC-2014, 20 th October-2014, Dept <strong>of</strong> CSE,<strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Rizwana C (PG)Cloud Based Delegate Log-Management using secure LoggingAs a Service, TRIC-2014, 20 th October-2014, Dept <strong>of</strong> CSE,<strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Prakruthi T G (PG)Depress Phishing by 3D CAPTCHA with OTP, TRIC-2014, 20 thOctober-2014, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Sreetama Banerjee, Anshit Srivastav, SAmit Kumar (UG)MULTI-DESTINATION PROTOCOL-An alternate approach toSMTP, TRIC-2014, 20 th October-2014, Dept <strong>of</strong> CSE, <strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Rubia Ahmed, Tanusree G, Sohinipal(UG)Near Field Communication, TRIC-2014, 20 th October-2014, Dept<strong>of</strong> CSE, <strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Swetha R V, Vyshali Bhat UG)Blue brain Project, TRIC-2014, 20 th October-2014, Dept <strong>of</strong> CSE,<strong>MVJ</strong>CE.<strong>Papers</strong> <strong>Published</strong> by Smriti singh, swati kharpor, tahseenfarook (UG)Age <strong>of</strong> green computing, TRIC-2014, 20 th October-2014, Dept <strong>of</strong>CSE, <strong>MVJ</strong>CE.


Applications Developed By StudentsAPP developed by S Amit Kumar & Aanchal VermaAPP name: Top Football ClubsAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/top-footballclubs/01c8c7a0-c87f-4f46-90d4-d3e7a23c1aa8APP developed by Sreetama Banerjee & Sreya SahaAPP name: Adven_ralineAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/advenraline/ec35543f-27ed-46bf-a5dd-da13c518537dAPP developed by Vyshali Bhat & Shwetha R VAPP name: Bangalore hangoutAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/bangalorehangouts/e632866c-104b-4fd2-837a-47ab69e9a86aAPP developed by Subodh Kumar, Abhishek Yadav & SonamYadavAPP name: Indian sweet ReceipesAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/indian-sweetrecipes/2276e4e3-90c0-4299-8812-fdde6377461aAPP developed by Manjunath NeelgarAPP name: National AnthemesAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/anthems-<strong>of</strong>nations/a3eb9ea6-45d5-4a84-b147-c32eb5ff4825APP developed by Manjunath NeelgarAPP name: Anthemes <strong>of</strong> NationsAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/anthems-<strong>of</strong>nations/a3eb9ea6-45d5-4a84-b147-c32eb5ff4825APP developed by Niveditha C H MAPP developed by Deep Roy & Soham AdhikariAPP name: Movies NowAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/moviesnow/41480925-09ad-4913-9fdd-08abe0239527APP name: My Reel WorldAPP-link: http://apps.micros<strong>of</strong>t.com/windows/app/my-reel-worldtv/a5a7383c-b242-43c9-a868-d4b0aebc5033APP developed by Anshit SrivastavaAPP name: Legendary AuthorsAPP-link:http://apps.micros<strong>of</strong>t.com/windows/app/legendaryauthors/01339b71-05a2-421e-b60a-5688edfc731bAPP developed by Deep DuttaAPP name: Chemistry for KidsAPP-link:http://apps.micros<strong>of</strong>t.com/windows/en-us/app/3d983dcddff1-45cf-b820-33534e6d12bcAchievementsfromDepartment<strong>of</strong>ComputerScience&<strong>Engineering</strong>APP developed by Apoorva Sharma & Deep RoyAPP name: Haut coutureAPP-link: http://apps.micros<strong>of</strong>t.com/windows/en-us/app/hautecouture/4e326cfc-3514-420f-a486-3e69e0a065d4APP developed by Yatheesha M JAPP name: Movie partnerAPP-link: http://apps.micros<strong>of</strong>t.com/windows/en-us/app/hautecouture/4e326cfc-3514-420f-a486-3e69e0a065d4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!