The Bachelor of Technology (B.Tech.) program in Computer Science and Engineering at our institution is an accredited course by the National Board of Accreditation (NBA). The department takes pride in offering a comprehensive curriculum that equips students with the necessary knowledge and skills to excel in the dynamic field of computer science and engineering. Throughout the program, students receive a strong foundation in core subjects such as algorithms, data structures, computer architecture, programming languages, and software engineering. They also gain exposure to cutting-edge technologies such as artificial intelligence, machine learning, cybersecurity, and big data analytics. With a strong emphasis on practical implementation and hands-on experience, students have ample opportunities to work on real-world projects, participate in internships, and collaborate with industry partners. Furthermore, for those aspiring to pursue advanced research and specialization, the department also offers a Master of Technology (M.Tech.) program in Computer Engineering, providing a pathway for further academic and professional growth.
S.No. | Degree | Specialization/Branch | Current Intake |
---|---|---|---|
1 | B. Tech | Computer Science & Engineering (CSE) | 120 |
2 | M. Tech | Computer Science & Engineering (CSE) | 24 |
Qualification | Education Details | Designation |
---|---|---|
PhD ,MTech,BTech | PhD (Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE) Jaipur | Asst.Professor |
Contact No | ||
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech | M.Tech(Computer Science)GJUS&T | Asst.Professor |
Phone | ||
01452695535 | aps@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E. | M.Tech(SOFTWARE ENGG.)Singhania University , B.E.(COMPUTER ENGG.)Rajasthan University | Asst.Professor |
Phone | ||
9785573706 | anilsharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E. | M.Tech.(CSE)JNU Jodhpur , B.E.(Computer Science Engineering)RU Jaipur | Asst.Professor |
Phone | ||
9929358980 | dalpat@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD ,MTech,BTech | PhD (Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE) Jaipur | Asst.Professor |
Phone | ||
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),M.Tech, B.Tech,UGC-NET,SET,GATE | PhD (Pursuing)(CSE (ECA-Research Center))Bikaner Technical University , M.Tech(CSE)Bhagwant University , B.Tech(CE )MBM Engg. College JNV University Jodhpur , UGC-NET((CS)) , GATE((CSE)) | Asst.Professor |
Phone | ||
monalisameena@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech. | M.Tech.(Computer Science & Engineering)MNNIT Allahabad | Asst.Professor |
Phone | ||
mukeshkhandelwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
Ph.D ,M.Tech,B.E, | Ph.D (CE)Rajasthan Technical University Kota , M.Tech(CSE)Rajasthan Technical University Kota | Asst.Professor |
Phone | ||
pankaj.cse@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E.,UGC NET JUNE-2012,Phd(p), | M.Tech.(computer engg.)MNIT Jaipur , B.E.(computer engg.)University of Rajasthan JAipur , UGC NET JUNE-2012(computer science and applications)UGC , Phd(p)(Computer Science)MNIT Jaipur | Asst.Professor |
Phone | ||
parvatibhurani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,PhD | M.Tech(Computer Engineering)MNIT , PhD(Computer Engineering) Jaipur | Asst.Professor |
Phone | ||
9460178574 | payalawwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E | M.Tech(CS)Banasthali university , B.E(CS)University of Rajasthan Jaipur | Asst.Professor |
Phone | ||
rajnichoudhary@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,M.Tech. | B.E.(CSE)M.B.M. Jodhpur , M.Tech.(CSE)Mody Lakshmangarh | Asst.Professor |
Phone | ||
01452695535 | rbhaskar@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (P),M.Tech.,B.E.,NET JRF,GATE | PhD (P)(ICT)IIT Jodhpur , M.Tech.(CS)MNIT Jaipur , B.E.(IT)GEC Ajmer , NET JRF(CS)MHRD , GATE(CS)99 Percentile AIR 930 | Asst.Professor |
Phone | ||
9929989287 | saurabh@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M. E.,B.E.,Ph. D. | M. E.(CSE)Panjab University Chandigarh , B.E.(CSE)Engineering College Kota (Now RTU , Ph. D.(CSE)RTU | Asst.Professor |
Phone | ||
ssa@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,MTECH | B.E.(CSE)Rajasthan univ jaipur , MTECH(IT)RTU Kota | Asst.Professor |
Phone | ||
tarunakhemwani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD,M.Tech.,B.E.,GATE (IT) | PhD(Computer Engineering) , M.Tech.(Computer Engineering) , B.E.(Information Technology) , GATE (IT)(97.16 Percentile AIR 218 ) | Asst.Professor |
Phone | ||
01452695535 | vps@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc-IT,MCA | Technician | |
Phone | Mobile | |
0145-2695535 | atulbhardwaj@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc(IT), MCA | Programmer Cum System Administrator | |
Phone | Mobile | |
9530252645 | 9530252645 | balveer@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
ITI Diploma in computer | Technician | |
Phone | Mobile | |
94620-3944 | bhupalsingh@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
jitendraverma@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
B.A,ITI | Technician c | |
Phone | Mobile | |
8440010008 | preritgupta@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
satyanarayansharma@gweca.ac.in |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - B |
Incharge Name | Amritpal Singh Yadav |
Technician Name | Atul Bhardwaj |
Description | .Computer System (36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | PARAM - C |
Incharge Name | Monalisa Meena |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | Modrob Project |
---|---|
Room No | New CC Lab - E |
Incharge Name | |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - G |
Incharge Name | Mukesh Kumar Khandelwal |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - H |
Incharge Name | Varun saxena |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized |
Lab Description |
Project Name | |
---|---|
Room No | Research Lab (Param |
Incharge Name | Pankaj Sharma |
Technician Name | Balveer Singh Shekhawat |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector |
Lab Description |
Project Name | TEQIP-III |
---|---|
Room No | New Computer Center |
Incharge Name | Saurabh Maheshwari |
Technician Name | Balveer Singh Shekhawat |
Description | Computer Systems (10) & Netsim software |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - D |
Incharge Name | Dalpat Songara |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - F |
Incharge Name | Anil Kumar Sharma |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board |
Lab Description |
Name of Paper | Journal Name | Year | Author |
---|---|---|---|
Data Hiding Technique for E-Tendering using Steganography | International Journal Of Research in Computer Application & Management (IJRCM) | 12/01/2013 | Saurabh Maheshwari |
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | 07/01/2014 | Saurabh Maheshwari |
Railway Security System based on Wireless Sensor Networks: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Recent Trends in Energy-efficient Clustering in WSNs | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Review on Wireless Sensor Network Techniques for Security in Railways | International Journal of Enhanced Research in Science Technology & Engineering | 05/01/2014 | Saurabh Maheshwari |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Memory flshing in multi join query for query optimization | IJARCSSE | 07/01/2013 | Taruna Khemwani |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | 04/29/2017 | Amritpal Singh Yadav |
A Survey on Test Case Prioritization using APFD Algorithm | International Journal of Scientific Engineering and Technology Research | 12/19/2014 | |
STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers | BIG DATA | 02/14/2020 | Utsav Upadhyay |
An Efficient Speculative Task Detection Algorithm for MapReduce Schedulers | Recent Advances in Computer Science and Communications | 1/1/2020 | Utsav Upadhyay |
A Systematic Review of Automation in Handwritten Character Recognition | International Journal of Applied Engineering Research. (IJAER) | 06/01/2018 | Saurabh Maheshwari |
SIFT based Character Matching Technique for Handwriting Recognition | JASC: Journal of Applied Science and Computations | 03/01/2019 | Saurabh Maheshwari |
A Survey on Cloud Computing Risks and Remedies | International Journal of Computer Applications | 07/26/2019 | Amit Garg |
A Survey of Machine or Deep Learning based Approaches for Apparent Personality Detection | Design Engineering | 12/31/2021 | Amit Garg |
Intelligent portfolio asset prediction enabled by hybrid Jaya-based spotted hyena optimization algorithm | Kybernetes | 11/15/2021 | Meeta Sharma |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | 06/01/2014 | Pankaj Kumar Sharma |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | 09/09/2021 | Meeta Sharma |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | 09/09/2021 | Meeta Sharma |
Detecting The Normal And Injected SQL Query Using Random Forest Classification With Rabin Carp Pattern Matching Algorithm In Web Database | Turkish Journal of Computer and Mathematics Education | 04/14/2021 | Meeta Sharma |
Portfolio optimization and return prediction by integrating modified deep belief network and recurrent neural network | Knowledge Based Systems | 08/17/2022 | Meeta Sharma |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | 01/01/2017 | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | 12/12/2016 | Meeta Sharma |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | 2021-22 | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | - | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | 2013 | Varun Prakash Saxena |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | 2014 | Varun Prakash Saxena |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | 2014 | Varun Prakash Saxena |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | 2015 | Varun Prakash Saxena |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | 2017 | Varun Prakash Saxena |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | 2017 | Varun Prakash Saxena |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | 2019 | Varun Prakash Saxena |
Application of Electronics in Modern Computer Science | Social Science Journal SI No. 239 | 2020 | Varun Prakash Saxena |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | 2020 | Varun Prakash Saxena |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | 2022 | Varun Prakash Saxena |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | 09/15/2017 | Anil Kumar Sharma |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | 02/01/2016 | Payal Awwal |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | 10/01/2017 | Payal Awwal |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | 05/01/2018 | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Springer-Verlag Berlin Heidelberg | Spain | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010, Advances in Soft Computing, 2010 | Springer-Verlag Berlin Heidelberg 2010 | Spain | Saurabh Maheshwari |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
A DCT Based Permuted Image Digital Watermarking Method | TENCON2010 | IEEE | Fukoka Japan | Saurabh Maheshwari |
Improved ID3 Decision Tree Generation using Shared-Memory and Multi-Threading Approach | International Conference on Education Technology and Computer (ICETC 2011) | Elsevier | Changchun, China | Saurabh Maheshwari |
Robust Watermarking through Spatially Disjoint Transformations | Communications in Computer and Information Science | Advances in Computing and Communications, Springer-Verlag Berlin Heidelberg 2011 | Kochi, India | Saurabh Maheshwari |
Robust Multi-modal Watermarking using Visually Encrypted Watermark | 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012 | IEEE | Vienna, Austria | Saurabh Maheshwari |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | IEEE | Indore, India | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | IEEE | Greater Noida, India | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | Saurabh Maheshwari |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Optimal Sensor Nodes Deployment Method Using Bacteria Foraging Algorithm in Wireless Sensor Networks | Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI | Springer International Publishing, Springer AISC series | Hyderabad, India | Saurabh Maheshwari |
Optimization of Topology Update Interval in k-Connected MANETs | 5Th IEEE International conference on Advanced Computing & Communication Technologies, 21-22 Feb-2015 | IEEE | Haryana, India | Shyam Sundar Agrawal |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | IETE | Jaipur, India | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Springer | Durgapur, India | Saurabh Maheshwari |
Android Malicious Application Detection using Permission Vector and Network Traffic Analysis | 2nd International Conference for Convergence in Technology(I2CT 2017) | IEEE | Pune | |
PNSDroid: A Hybrid Approach for Detection of Android Malware | 5th International Conference on Advanced Computing; Networking; Informatics(ICACNI 2017) | Springer | Goa | |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Tenth International conference on contemporary computing | - | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | - | Dalpat Songara |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
“ Space mouse: Intuitive Man Machine Interface in 3-D Environment ” | National conference ET3CS’11 | National conference ET3CS’11 , VCET Bundi | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | IEEE. | MANIT , Bhopal | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Government Women Engineering college, Ajmer | at Government Women Engineering college, Ajmer | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Springer, Singapore, ,Vishwakarma H., Akashe S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems | ICT4SD 2016 GOA | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Jaipur, 2016 | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Springer - Advances in Intelligent Systems and Computing Series Series Editors: Kacprzyk, Janusz | organized by Tribhuvan University , Pulchowk Campus , Nepal | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | ACM International Processing series (SCOPUS) with publishing partner Springer Nature | Poornima Institute of Technology , Jaipur (Raj)- India | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | IEEE | Noida | Payal Awwal |
Survey of challenges in sentiment analysis | Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 3 | ICACNI | Conference | Monalisa Meena |
Hybrid forecasting scheme for enhance prediction accuracy of Spambase dataset | Proceedings of International Conference on Communication and Computational Technologies | Springer Singapore | Conference | Monalisa Meena |
Bagged Random Forest Approach to Classify Sentiments Based on Technical Words | Recent Trends in Communication and Intelligent Systems: Proceedings of ICRTCIS 2019 | Springer Singapore | Conference | Monalisa Meena |
Classification algorithms used in Machine Learning: A review | - | Springer | - | Monalisa Meena |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Book Name | Public Name | Chapter | Year | Faculty Name |
---|---|---|---|---|
Operating Systems-I | V. M. Open University Kota | Process Synchronization, Deadlocks | 2010-11 | Shyam Sundar Agrawal |
Resent Findings in intelligent computing techniques | Springer Nature Singapore | Taxonomy of leaf disease detection and classification. | 2018 | Dalpat Songara |
Role | Project Type | Title | Fund | Faculty Name |
---|---|---|---|---|
National | National | Robotic | wipro | |
National | National | Android | GWECA | |
National | National | “Data Analytics & IoT framework for freeway to emergency services & traffic policing in smart cities” | CRS - AICTE (NPIU, TEQIP-III) | Utsav Upadhyay |
National | National | Data Analytics and IoT framework for freeway to emergency services and traffic policing in smart cities | MHRD AICTE TEQIP-III | Saurabh Maheshwari |
National | National | Development of a convenient and accurate method for sleep monitoring | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
National | National | Performance measurement of security algorithms on IoT devices | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
Patent Name | Area | Patent Agency | Year | Validity | Faculty Name |
---|---|---|---|---|---|
Site | Ajmer | Wipro India | 2016 | 2 year |
Role | Title | Funding | Date From | Date To | Amount | Co Investigator | Faculty Name |
---|---|---|---|---|---|---|---|
Tcs Consultancy | Jobs 2014 | TATA | 03/06/2017 | 03/08/2017 | 2.LAC | - |
Name of Paper | Journal Name | Publisher Name | Faculty Name |
---|---|---|---|
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | Amritpal Singh Yadav | |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | Pankaj Kumar Sharma | |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | Meeta Sharma | |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | Meeta Sharma | |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | IGI Global | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | Meeta Sharma | |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | Varun Prakash Saxena | |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | Varun Prakash Saxena | |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | Varun Prakash Saxena | |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | Varun Prakash Saxena | |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | Varun Prakash Saxena | |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | Varun Prakash Saxena | |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | Varun Prakash Saxena | |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | Varun Prakash Saxena | |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | Varun Prakash Saxena | |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | Anil Kumar Sharma | |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | Payal Awwal | |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | Payal Awwal | |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | Payal Awwal |
Name of Paper | Conference Name | Authore | Faculty Name |
---|---|---|---|
Hindustan Times | seminar 2014 | Ec | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Reena Gunjan, Saurabh Maheshwari, M.S.Gaur, Vijay Laxmi | |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | Anjali Agarwal, Saurabh Maheshwari, and Garima Yadav | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | Anjali Agarwal, Saurabh Maheshwari and Garima Yadav | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | Garima Yadav, Saurabh Maheshwari and Anjali Agarwal | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Vaibhav Mishra, Saurabh Maheshwari, Kavita Choudhary | Saurabh Maheshwari |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Surbhi Saxena, Dalpat Songara | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | Sneha Garg, Dalpat Songara | Dalpat Songara |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | Varun Prakash Saxena, Shruti mathur (2014) | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Varun Prakash Saxena, Swati Sharma (June 2022) | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | Varun Prakash Saxena, Christabell Fredrick | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | Gunjan Doshora, Payal Awwal | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | Rubal Bansal; Saurabh Maheshwari; Payal Awwal | Payal Awwal |
Survey of challenges in sentiment analysis | Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 3 | Sweety Singhal, Monalisa Meena, Saurabh Maheshwari | Monalisa Meena |
Hybrid forecasting scheme for enhance prediction accuracy of Spambase dataset | Proceedings of International Conference on Communication and Computational Technologies | Divyanjali Saini, Monalisa Meena | Monalisa Meena |
Bagged Random Forest Approach to Classify Sentiments Based on Technical Words | Recent Trends in Communication and Intelligent Systems: Proceedings of ICRTCIS 2019 | Sweety Singhal, Monalisa Meena, Saurabh Maheshwari | Monalisa Meena |
Classification algorithms used in Machine Learning: A review | - | Divyanjali Saini, Monalisa Meena | Monalisa Meena |
Group Name | Project Title | Year |
---|---|---|
Nisha Kumari- 18CSE056 Prabha Kumari- 18CSE062 Preksha Gupta- 18CSE066 Rekha Kumari- 19CSE200 | AN AUTOMATED ATTENDANCE SYSTEM USING GROUP IMAGE | 2021-22 |
Sakshi Mehta | Grievance Redressal System | 2018-19 |
MAHIMA SOMANI-13EEMCS049 GURPREET KAUR- 13EEMCS031 DIPTY REGAR- 13EEMCS026 ESHITA PAREEK- 13EEMCS029 | Clean Smart City Ajmer | 2016-17 |
Shriya Agarwal (13EEMCS108) Pallavi Singh (13EEMCS071) Ritu Jain (13EEMCS091) Pooja Kaviya (13EEMCS073) | Food on Way | 2016-17 |
18EEMCS073 Ranu Rawat 18EEMCS082 Ruchika Chordia | INGREDIENT RECIPES GENERATOR | 2022 |
18EEMCS067 Pretisha Choudhary 18EEMCS059 Payal Kumawat 18EEMCS072 Ragini Goyal | BREAST CANCER DETECTION USING MACHINE LEARNING | 2021 |
Nikita Sukhwal (17EEMCS066) Aarti Jaswani (17EEMCS001) Mitasha Sharma (17EEMCS058) | AUTOMATED DOCUMENT VERIFICATION AND VALIDATION | 2021 |
Ishika Soni (17EEMCS032) Mimansa Pancholi (17EEMCS057) | CREDIT CARD FRAUD DETECTION | 2021 |
Amandeep Kaur (17EEMCS004) Anjali Verma (17EEMCS009) Jyana Chauhan (17EEMCS037) | THOUGHT COMPANION | 2021 |
URVASHI MURJANI PARUL SHANKHALA SAKSHI SINGH RASHI ADWANI PRANJAL YADAV | DHARTI MAA:AN ONLINE NURSERY STORE | 2020 |
various | since last 14 years | |
Divya Choudhary and Group | High Tech City | 2016 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | Smart City | 2017 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | QR Code Reader | 2016 |
Apeksha Gaur;Ayushi Jain;Charul Rathore;Charvi Chandela | Symphony music player | 2016 |
12EEMCS120 12EEMCS068 12EEMCS102 12EEMCS101 | Shop Cart | 2016 |
12EEMCS066 12EEMCS075 12EEMCS079 12EEMCS126 | Rajasthan Tour & Travels | 2016 |
12EEMCS022 12EEMCS036 12EEMCS045 | Jewellery Management System | 2016 |
13EEMCS072 13EEMCS077 13EEMCS093 13EEMCS100 | Online:Training & Placement Cell | 2017 |
13EEMCS034 13EEMCS035 13EEMCS023 | “Udaipur:The Lake City” | 2017 |
13EEMCS097 | Hospital Management System | 2016-2017 |
13EEMCS109 | Home Food Delivery Android App | 2016-2017 |
All MCA VI sem Students | MCA industrial Project | 2015-16 |
12IT047,12IT021,12IT016,12IT017 | Report management System | 2015-16 |
12CS088, 12CS074, 12CS121, 12CS114 | Always with you –An app for women security | 2015-16 |
Group Name | Project Title | Year |
---|---|---|
Sweety Singhal | BAGGED RANDOM FOREST APPROACH TO CLASSIFY SENTIMENTS BASED ON TECHNICAL WORDS | 2020 |
Sweety Singhal | Bagged Random Forest Approach to classify sentiments based on Technical Words | 2020 |
Divyanjali Saini | Predictive Analytics of Spam Detection using Hybrid Machine Learning Model on Feature Based | 2022 |
NISHI PATIDAR | Performance Evaluation of preserve cloud storage using classification technique | 2021 |
ANJALI KUMAWAT | Identification of cryptographic vulnerability and malware detection in android | 2017 |
SUNITA KUMAWAT | Hybrid model for intrusion detection and prevention system in cloud computing | 2016 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Prashant Tiwari | LocalizationMethods and Techniques in Wireless Sensor Network | 2014 |
Sandeep Mahato | Captcha based Web and Application Security Methods and Techniques | 2014 |
Anubhav Saxena | Implementation of Fault Attacks on Elliptic Curve Cryptosystems | 2014 |
Shruti mathur | Hybrid Approach of natural language Transliteration | 2013 |
Priya Nalwaya | A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | 2013 |
Deepti Jyotiyana | Fault attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm over Finite field (E(Fp)) | 2016 |
Aayushi Mathur | A Comprehensive approach on RLE and Elliptical Curve Cryptography using Mean Square Error Feature for data security and compression | 2018 |
SWATI SHARMA | Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2022 |
Akanksha Mittal | An Efficient Machine Learning approach for plant leaf disease identification with performance Improvement | Underprocess |
Poonam Acharya | DETECTING THE NORMAL AND INJECTED SQL QUERY USING RANDOM FOREST CLASSIFICATION WITH RABIN CARP PATTERN MATCHING ALGORITHM IN WEB DATABASE | 2021 |
Priyanka Shaktawat | MSA based clustering method for construction of Phylogenetic tree | 2021 |
Rubal Bansal | Energy Efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 2019 |
Priya Jyotiyana | Multilevel Threholding Based Algorithm for Extraction and Classification of Tumor in MRI Images | 2018 |
Manisha Goswami | Leaf Disease Detection and Classification using Various Image Features and Back Propagation Neural Network | 2017 |
sunita kumari | human activity recognition using KINECT | completed in year 2016 |
priyanka soni | Defog the foggy images | completed in year 2015 |
Vaidehi Sharma | Policy aware social miner | 2016 |
Deeksha kumari | Improved image compression technique using ICW-DCT Transformation | 2013 |
Manali Chandani | Synchronization of CSMA-CA | 2014 |
Manali chandanani | Node Scheduling Approach for Synchronized CSMA/CA Channel | 2017 |
Jyoti | New Improved feature extarction approach of IRIS recognisation | 2012-2014 |
Priyanka | Hidden Biometric Security Implementation through Human Brain’s Artificial Macro Structure | 2017 |
Pooja Nag Choudhary | Optimal clustering using Bacteria Foraging | 2015 |
Vaibhav Mishra | Multi-hop multipath routing of videos | 2015 |
Anjali Agarwal | Vein Biometric Recognition And Security | 2015 |
Garima Yadav | Fog Removal from Images | 2014 |
Group Name | Project Title | Year |
---|---|---|
Sem 2016 | Walking Robort | 2018 |
The Bachelor of Technology (B.Tech.) program in Computer Science and Engineering at our institution is an accredited course by the National Board of Accreditation (NBA). The department takes pride in offering a comprehensive curriculum that equips students with the necessary knowledge and skills to excel in the dynamic field of computer science and engineering. Throughout the program, students receive a strong foundation in core subjects such as algorithms, data structures, computer architecture, programming languages, and software engineering. They also gain exposure to cutting-edge technologies such as artificial intelligence, machine learning, cybersecurity, and big data analytics. With a strong emphasis on practical implementation and hands-on experience, students have ample opportunities to work on real-world projects, participate in internships, and collaborate with industry partners. Furthermore, for those aspiring to pursue advanced research and specialization, the department also offers a Master of Technology (M.Tech.) program in Computer Engineering, providing a pathway for further academic and professional growth.
S.No. | Degree | Specialization/Branch | Current Intake |
---|---|---|---|
1 | B. Tech | Computer Science & Engineering (CSE) | 120 |
2 | M. Tech | Computer Science & Engineering (CSE) | 24 |
S.NO | Branch | Degree | Current Intake | Offered by Department |
---|---|---|---|---|
1 | Computer Science & Engineering (CSE) | B.Tech | 120 | Computer Engineering |
2 | Computer Science & Engineering (CSE) | M.Tech | 24 | Computer Engineering |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.(CS) | Asst.Professor | |
Phone | Mobile | |
01452695535 |
Qualification | Education Details | Designation |
---|---|---|
PhD ,MTech,BTech | PhD (Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE) Jaipur | Asst.Professor |
Phone | Mobile | |
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech | M.Tech(Computer Science)GJUS&T | Asst.Professor |
Phone | Mobile | |
01452695535 | aps@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E. | M.Tech(SOFTWARE ENGG.)Singhania University , B.E.(COMPUTER ENGG.)Rajasthan University | Asst.Professor |
Phone | Mobile | |
9785573706 | anilsharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E. | M.Tech.(CSE)JNU Jodhpur , B.E.(Computer Science Engineering)RU Jaipur | Asst.Professor |
Phone | Mobile | |
9929358980 | dalpat@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD ,MTech,BTech | PhD (Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE) Jaipur | Asst.Professor |
Phone | Mobile | |
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),M.Tech, B.Tech,UGC-NET,SET,GATE | PhD (Pursuing)(CSE (ECA-Research Center))Bikaner Technical University , M.Tech(CSE)Bhagwant University , B.Tech(CE )MBM Engg. College JNV University Jodhpur , UGC-NET((CS)) , GATE((CSE)) | Asst.Professor |
Phone | Mobile | |
monalisameena@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech. | M.Tech.(Computer Science & Engineering)MNNIT Allahabad | Asst.Professor |
Phone | Mobile | |
mukeshkhandelwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
Ph.D ,M.Tech,B.E, | Ph.D (CE)Rajasthan Technical University Kota , M.Tech(CSE)Rajasthan Technical University Kota | Asst.Professor |
Phone | Mobile | |
pankaj.cse@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E.,UGC NET JUNE-2012,Phd(p), | M.Tech.(computer engg.)MNIT Jaipur , B.E.(computer engg.)University of Rajasthan JAipur , UGC NET JUNE-2012(computer science and applications)UGC , Phd(p)(Computer Science)MNIT Jaipur | Asst.Professor |
Phone | Mobile | |
parvatibhurani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,PhD | M.Tech(Computer Engineering)MNIT , PhD(Computer Engineering) Jaipur | Asst.Professor |
Phone | Mobile | |
9460178574 | payalawwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E | M.Tech(CS)Banasthali university , B.E(CS)University of Rajasthan Jaipur | Asst.Professor |
Phone | Mobile | |
rajnichoudhary@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,M.Tech. | B.E.(CSE)M.B.M. Jodhpur , M.Tech.(CSE)Mody Lakshmangarh | Asst.Professor |
Phone | Mobile | |
01452695535 | rbhaskar@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (P),M.Tech.,B.E.,NET JRF,GATE | PhD (P)(ICT)IIT Jodhpur , M.Tech.(CS)MNIT Jaipur , B.E.(IT)GEC Ajmer , NET JRF(CS)MHRD , GATE(CS)99 Percentile AIR 930 | Asst.Professor |
Phone | Mobile | |
9929989287 | saurabh@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M. E.,B.E.,Ph. D. | M. E.(CSE)Panjab University Chandigarh , B.E.(CSE)Engineering College Kota (Now RTU , Ph. D.(CSE)RTU | Asst.Professor |
Phone | Mobile | |
ssa@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,MTECH | B.E.(CSE)Rajasthan univ jaipur , MTECH(IT)RTU Kota | Asst.Professor |
Phone | Mobile | |
tarunakhemwani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD,M.Tech.,B.E.,GATE (IT) | PhD(Computer Engineering) , M.Tech.(Computer Engineering) , B.E.(Information Technology) , GATE (IT)(97.16 Percentile AIR 218 ) | Asst.Professor |
Phone | Mobile | |
01452695535 | vps@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc-IT,MCA | Technician | |
Phone | Mobile | |
0145-2695535 | atulbhardwaj@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc(IT), MCA | Programmer Cum System Administrator | |
Phone | Mobile | |
9530252645 | 9530252645 | balveer@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
ITI Diploma in computer | Technician | |
Phone | Mobile | |
94620-3944 | bhupalsingh@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
jitendraverma@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
B.A,ITI | Technician c | |
Phone | Mobile | |
8440010008 | preritgupta@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
satyanarayansharma@gweca.ac.in |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector | Lab Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Project Name | |
---|---|
Room No | PARAM LAB - B |
Incharge Name | Amritpal Singh Yadav |
Technician Name | Atul Bhardwaj |
Description | .Computer System (36) with Internet Facility connected to a centralized server | Lab Description | .Computer System (36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | PARAM - C |
Incharge Name | Monalisa Meena |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server | Lab Description | Computer System (36) with Internet Facility connected to a centralized server |
Project Name | Modrob Project |
---|---|
Room No | New CC Lab - E |
Incharge Name | |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - G |
Incharge Name | Mukesh Kumar Khandelwal |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - H |
Incharge Name | Varun saxena |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized | Lab Description | Computer System(36) with Internet Facility connected to a centralized |
Project Name | |
---|---|
Room No | Research Lab (Param |
Incharge Name | Pankaj Sharma |
Technician Name | Balveer Singh Shekhawat |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector | Lab Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector |
Project Name | TEQIP-III |
---|---|
Room No | New Computer Center |
Incharge Name | Saurabh Maheshwari |
Technician Name | Balveer Singh Shekhawat |
Description | Computer Systems (10) & Netsim software | Lab Description | Computer Systems (10) & Netsim software |
Project Name | |
---|---|
Room No | PARAM LAB - D |
Incharge Name | Dalpat Songara |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box | Lab Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box |
Project Name | |
---|---|
Room No | New CC Lab - F |
Incharge Name | Anil Kumar Sharma |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector | Lab Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board | Lab Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board |
Name of Paper | Journal Name | Year | Author |
---|---|---|---|
Data Hiding Technique for E-Tendering using Steganography | International Journal Of Research in Computer Application & Management (IJRCM) | 12/01/2013 | Saurabh Maheshwari |
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | 07/01/2014 | Saurabh Maheshwari |
Railway Security System based on Wireless Sensor Networks: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Recent Trends in Energy-efficient Clustering in WSNs | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Review on Wireless Sensor Network Techniques for Security in Railways | International Journal of Enhanced Research in Science Technology & Engineering | 05/01/2014 | Saurabh Maheshwari |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Memory flshing in multi join query for query optimization | IJARCSSE | 07/01/2013 | Taruna Khemwani |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | 04/29/2017 | Amritpal Singh Yadav |
A Survey on Test Case Prioritization using APFD Algorithm | International Journal of Scientific Engineering and Technology Research | 12/19/2014 | |
STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers | BIG DATA | 02/14/2020 | Utsav Upadhyay |
An Efficient Speculative Task Detection Algorithm for MapReduce Schedulers | Recent Advances in Computer Science and Communications | 1/1/2020 | Utsav Upadhyay |
A Systematic Review of Automation in Handwritten Character Recognition | International Journal of Applied Engineering Research. (IJAER) | 06/01/2018 | Saurabh Maheshwari |
SIFT based Character Matching Technique for Handwriting Recognition | JASC: Journal of Applied Science and Computations | 03/01/2019 | Saurabh Maheshwari |
A Survey on Cloud Computing Risks and Remedies | International Journal of Computer Applications | 07/26/2019 | Amit Garg |
A Survey of Machine or Deep Learning based Approaches for Apparent Personality Detection | Design Engineering | 12/31/2021 | Amit Garg |
Intelligent portfolio asset prediction enabled by hybrid Jaya-based spotted hyena optimization algorithm | Kybernetes | 11/15/2021 | Meeta Sharma |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | 06/01/2014 | Pankaj Kumar Sharma |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | 09/09/2021 | Meeta Sharma |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | 09/09/2021 | Meeta Sharma |
Detecting The Normal And Injected SQL Query Using Random Forest Classification With Rabin Carp Pattern Matching Algorithm In Web Database | Turkish Journal of Computer and Mathematics Education | 04/14/2021 | Meeta Sharma |
Portfolio optimization and return prediction by integrating modified deep belief network and recurrent neural network | Knowledge Based Systems | 08/17/2022 | Meeta Sharma |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | 01/01/2017 | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | 12/12/2016 | Meeta Sharma |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | 2021-22 | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | - | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | 2013 | Varun Prakash Saxena |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | 2014 | Varun Prakash Saxena |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | 2014 | Varun Prakash Saxena |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | 2015 | Varun Prakash Saxena |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | 2017 | Varun Prakash Saxena |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | 2017 | Varun Prakash Saxena |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | 2019 | Varun Prakash Saxena |
Application of Electronics in Modern Computer Science | Social Science Journal SI No. 239 | 2020 | Varun Prakash Saxena |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | 2020 | Varun Prakash Saxena |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | 2022 | Varun Prakash Saxena |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | 09/15/2017 | Anil Kumar Sharma |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | 02/01/2016 | Payal Awwal |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | 10/01/2017 | Payal Awwal |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | 05/01/2018 | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Springer-Verlag Berlin Heidelberg | Spain | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010, Advances in Soft Computing, 2010 | Springer-Verlag Berlin Heidelberg 2010 | Spain | Saurabh Maheshwari |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
A DCT Based Permuted Image Digital Watermarking Method | TENCON2010 | IEEE | Fukoka Japan | Saurabh Maheshwari |
Improved ID3 Decision Tree Generation using Shared-Memory and Multi-Threading Approach | International Conference on Education Technology and Computer (ICETC 2011) | Elsevier | Changchun, China | Saurabh Maheshwari |
Robust Watermarking through Spatially Disjoint Transformations | Communications in Computer and Information Science | Advances in Computing and Communications, Springer-Verlag Berlin Heidelberg 2011 | Kochi, India | Saurabh Maheshwari |
Robust Multi-modal Watermarking using Visually Encrypted Watermark | 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012 | IEEE | Vienna, Austria | Saurabh Maheshwari |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | IEEE | Indore, India | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | IEEE | Greater Noida, India | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | Saurabh Maheshwari |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Optimal Sensor Nodes Deployment Method Using Bacteria Foraging Algorithm in Wireless Sensor Networks | Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI | Springer International Publishing, Springer AISC series | Hyderabad, India | Saurabh Maheshwari |
Optimization of Topology Update Interval in k-Connected MANETs | 5Th IEEE International conference on Advanced Computing & Communication Technologies, 21-22 Feb-2015 | IEEE | Haryana, India | Shyam Sundar Agrawal |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | IETE | Jaipur, India | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Springer | Durgapur, India | Saurabh Maheshwari |
Android Malicious Application Detection using Permission Vector and Network Traffic Analysis | 2nd International Conference for Convergence in Technology(I2CT 2017) | IEEE | Pune | |
PNSDroid: A Hybrid Approach for Detection of Android Malware | 5th International Conference on Advanced Computing; Networking; Informatics(ICACNI 2017) | Springer | Goa | |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Tenth International conference on contemporary computing | - | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | - | Dalpat Songara |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
“ Space mouse: Intuitive Man Machine Interface in 3-D Environment ” | National conference ET3CS’11 | National conference ET3CS’11 , VCET Bundi | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | IEEE. | MANIT , Bhopal | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Government Women Engineering college, Ajmer | at Government Women Engineering college, Ajmer | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Springer, Singapore, ,Vishwakarma H., Akashe S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems | ICT4SD 2016 GOA | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Jaipur, 2016 | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Springer - Advances in Intelligent Systems and Computing Series Series Editors: Kacprzyk, Janusz | organized by Tribhuvan University , Pulchowk Campus , Nepal | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | ACM International Processing series (SCOPUS) with publishing partner Springer Nature | Poornima Institute of Technology , Jaipur (Raj)- India | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | IEEE | Noida | Payal Awwal |
Survey of challenges in sentiment analysis | Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 3 | ICACNI | Conference | Monalisa Meena |
Hybrid forecasting scheme for enhance prediction accuracy of Spambase dataset | Proceedings of International Conference on Communication and Computational Technologies | Springer Singapore | Conference | Monalisa Meena |
Bagged Random Forest Approach to Classify Sentiments Based on Technical Words | Recent Trends in Communication and Intelligent Systems: Proceedings of ICRTCIS 2019 | Springer Singapore | Conference | Monalisa Meena |
Classification algorithms used in Machine Learning: A review | - | Springer | - | Monalisa Meena |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Book Name | Public Name | Chapter | Year | Faculty Name |
---|---|---|---|---|
Operating Systems-I | V. M. Open University Kota | Process Synchronization, Deadlocks | 2010-11 | Shyam Sundar Agrawal |
Resent Findings in intelligent computing techniques | Springer Nature Singapore | Taxonomy of leaf disease detection and classification. | 2018 | Dalpat Songara |
Role | Project Type | Title | Fund | Faculty Name |
---|---|---|---|---|
National | National | Robotic | wipro | |
National | National | Android | GWECA | |
National | National | “Data Analytics & IoT framework for freeway to emergency services & traffic policing in smart cities” | CRS - AICTE (NPIU, TEQIP-III) | Utsav Upadhyay |
National | National | Data Analytics and IoT framework for freeway to emergency services and traffic policing in smart cities | MHRD AICTE TEQIP-III | Saurabh Maheshwari |
National | National | Development of a convenient and accurate method for sleep monitoring | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
National | National | Performance measurement of security algorithms on IoT devices | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
Patent Name | Area | Patent Agency | Year | Validity | Faculty Name |
---|---|---|---|---|---|
Site | Ajmer | Wipro India | 2016 | 2 year |
Role | Title | Funding | Date From | Date To | Amount | Co Investigator | Faculty Name |
---|---|---|---|---|---|---|---|
Tcs Consultancy | Jobs 2014 | TATA | 03/06/2017 | 03/08/2017 | 2.LAC | - |
Name of Paper | Journal Name | Publisher Name | Faculty Name |
---|---|---|---|
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | Amritpal Singh Yadav | |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | Pankaj Kumar Sharma | |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | Meeta Sharma | |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | Meeta Sharma | |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | IGI Global | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | Meeta Sharma | |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | Varun Prakash Saxena | |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | Varun Prakash Saxena | |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | Varun Prakash Saxena | |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | Varun Prakash Saxena | |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | Varun Prakash Saxena | |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | Varun Prakash Saxena | |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | Varun Prakash Saxena | |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | Varun Prakash Saxena | |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | Varun Prakash Saxena | |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | Anil Kumar Sharma | |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | Payal Awwal | |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | Payal Awwal | |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | Payal Awwal |
Name of Paper | Conference Name | Authore | Faculty Name |
---|---|---|---|
Hindustan Times | seminar 2014 | Ec | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Reena Gunjan, Saurabh Maheshwari, M.S.Gaur, Vijay Laxmi | |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | Anjali Agarwal, Saurabh Maheshwari, and Garima Yadav | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | Anjali Agarwal, Saurabh Maheshwari and Garima Yadav | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | Garima Yadav, Saurabh Maheshwari and Anjali Agarwal | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Vaibhav Mishra, Saurabh Maheshwari, Kavita Choudhary | Saurabh Maheshwari |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Surbhi Saxena, Dalpat Songara | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | Sneha Garg, Dalpat Songara | Dalpat Songara |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | Varun Prakash Saxena, Shruti mathur (2014) | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Varun Prakash Saxena, Swati Sharma (June 2022) | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | Varun Prakash Saxena, Christabell Fredrick | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | Gunjan Doshora, Payal Awwal | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | Rubal Bansal; Saurabh Maheshwari; Payal Awwal | Payal Awwal |
Survey of challenges in sentiment analysis | Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 3 | Sweety Singhal, Monalisa Meena, Saurabh Maheshwari | Monalisa Meena |
Hybrid forecasting scheme for enhance prediction accuracy of Spambase dataset | Proceedings of International Conference on Communication and Computational Technologies | Divyanjali Saini, Monalisa Meena | Monalisa Meena |
Bagged Random Forest Approach to Classify Sentiments Based on Technical Words | Recent Trends in Communication and Intelligent Systems: Proceedings of ICRTCIS 2019 | Sweety Singhal, Monalisa Meena, Saurabh Maheshwari | Monalisa Meena |
Classification algorithms used in Machine Learning: A review | - | Divyanjali Saini, Monalisa Meena | Monalisa Meena |
Group Name | Project Title | Year |
---|---|---|
Nisha Kumari- 18CSE056 Prabha Kumari- 18CSE062 Preksha Gupta- 18CSE066 Rekha Kumari- 19CSE200 | AN AUTOMATED ATTENDANCE SYSTEM USING GROUP IMAGE | 2021-22 |
Sakshi Mehta | Grievance Redressal System | 2018-19 |
MAHIMA SOMANI-13EEMCS049 GURPREET KAUR- 13EEMCS031 DIPTY REGAR- 13EEMCS026 ESHITA PAREEK- 13EEMCS029 | Clean Smart City Ajmer | 2016-17 |
Shriya Agarwal (13EEMCS108) Pallavi Singh (13EEMCS071) Ritu Jain (13EEMCS091) Pooja Kaviya (13EEMCS073) | Food on Way | 2016-17 |
18EEMCS073 Ranu Rawat 18EEMCS082 Ruchika Chordia | INGREDIENT RECIPES GENERATOR | 2022 |
18EEMCS067 Pretisha Choudhary 18EEMCS059 Payal Kumawat 18EEMCS072 Ragini Goyal | BREAST CANCER DETECTION USING MACHINE LEARNING | 2021 |
Nikita Sukhwal (17EEMCS066) Aarti Jaswani (17EEMCS001) Mitasha Sharma (17EEMCS058) | AUTOMATED DOCUMENT VERIFICATION AND VALIDATION | 2021 |
Ishika Soni (17EEMCS032) Mimansa Pancholi (17EEMCS057) | CREDIT CARD FRAUD DETECTION | 2021 |
Amandeep Kaur (17EEMCS004) Anjali Verma (17EEMCS009) Jyana Chauhan (17EEMCS037) | THOUGHT COMPANION | 2021 |
URVASHI MURJANI PARUL SHANKHALA SAKSHI SINGH RASHI ADWANI PRANJAL YADAV | DHARTI MAA:AN ONLINE NURSERY STORE | 2020 |
various | since last 14 years | |
Divya Choudhary and Group | High Tech City | 2016 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | Smart City | 2017 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | QR Code Reader | 2016 |
Apeksha Gaur;Ayushi Jain;Charul Rathore;Charvi Chandela | Symphony music player | 2016 |
12EEMCS120 12EEMCS068 12EEMCS102 12EEMCS101 | Shop Cart | 2016 |
12EEMCS066 12EEMCS075 12EEMCS079 12EEMCS126 | Rajasthan Tour & Travels | 2016 |
12EEMCS022 12EEMCS036 12EEMCS045 | Jewellery Management System | 2016 |
13EEMCS072 13EEMCS077 13EEMCS093 13EEMCS100 | Online:Training & Placement Cell | 2017 |
13EEMCS034 13EEMCS035 13EEMCS023 | “Udaipur:The Lake City” | 2017 |
13EEMCS097 | Hospital Management System | 2016-2017 |
13EEMCS109 | Home Food Delivery Android App | 2016-2017 |
All MCA VI sem Students | MCA industrial Project | 2015-16 |
12IT047,12IT021,12IT016,12IT017 | Report management System | 2015-16 |
12CS088, 12CS074, 12CS121, 12CS114 | Always with you –An app for women security | 2015-16 |
Group Name | Project Title | Year |
---|---|---|
Sweety Singhal | BAGGED RANDOM FOREST APPROACH TO CLASSIFY SENTIMENTS BASED ON TECHNICAL WORDS | 2020 |
Sweety Singhal | Bagged Random Forest Approach to classify sentiments based on Technical Words | 2020 |
Divyanjali Saini | Predictive Analytics of Spam Detection using Hybrid Machine Learning Model on Feature Based | 2022 |
NISHI PATIDAR | Performance Evaluation of preserve cloud storage using classification technique | 2021 |
ANJALI KUMAWAT | Identification of cryptographic vulnerability and malware detection in android | 2017 |
SUNITA KUMAWAT | Hybrid model for intrusion detection and prevention system in cloud computing | 2016 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Prashant Tiwari | LocalizationMethods and Techniques in Wireless Sensor Network | 2014 |
Sandeep Mahato | Captcha based Web and Application Security Methods and Techniques | 2014 |
Anubhav Saxena | Implementation of Fault Attacks on Elliptic Curve Cryptosystems | 2014 |
Shruti mathur | Hybrid Approach of natural language Transliteration | 2013 |
Priya Nalwaya | A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | 2013 |
Deepti Jyotiyana | Fault attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm over Finite field (E(Fp)) | 2016 |
Aayushi Mathur | A Comprehensive approach on RLE and Elliptical Curve Cryptography using Mean Square Error Feature for data security and compression | 2018 |
SWATI SHARMA | Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2022 |
Akanksha Mittal | An Efficient Machine Learning approach for plant leaf disease identification with performance Improvement | Underprocess |
Poonam Acharya | DETECTING THE NORMAL AND INJECTED SQL QUERY USING RANDOM FOREST CLASSIFICATION WITH RABIN CARP PATTERN MATCHING ALGORITHM IN WEB DATABASE | 2021 |
Priyanka Shaktawat | MSA based clustering method for construction of Phylogenetic tree | 2021 |
Rubal Bansal | Energy Efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 2019 |
Priya Jyotiyana | Multilevel Threholding Based Algorithm for Extraction and Classification of Tumor in MRI Images | 2018 |
Manisha Goswami | Leaf Disease Detection and Classification using Various Image Features and Back Propagation Neural Network | 2017 |
sunita kumari | human activity recognition using KINECT | completed in year 2016 |
priyanka soni | Defog the foggy images | completed in year 2015 |
Vaidehi Sharma | Policy aware social miner | 2016 |
Deeksha kumari | Improved image compression technique using ICW-DCT Transformation | 2013 |
Manali Chandani | Synchronization of CSMA-CA | 2014 |
Manali chandanani | Node Scheduling Approach for Synchronized CSMA/CA Channel | 2017 |
Jyoti | New Improved feature extarction approach of IRIS recognisation | 2012-2014 |
Priyanka | Hidden Biometric Security Implementation through Human Brain’s Artificial Macro Structure | 2017 |
Pooja Nag Choudhary | Optimal clustering using Bacteria Foraging | 2015 |
Vaibhav Mishra | Multi-hop multipath routing of videos | 2015 |
Anjali Agarwal | Vein Biometric Recognition And Security | 2015 |
Garima Yadav | Fog Removal from Images | 2014 |
Group Name | Project Title | Year |
---|---|---|
Sem 2016 | Walking Robort | 2018 |