Bachelor of Technology in Computer Science & Engineering is a four year undergraduate course from Bikaner Technical University, Bikaner. The program offers an opportunity for the students to gain in depth knowledge leading to a successful career in Computer Technology.
S.No. | Degree | Specialization/Branch | Current Intake |
---|---|---|---|
1 | B. Tech | Computer Science & Engineering (CSE) | 120 |
2 | M. Tech | Computer Science & Engineering (CSE) | 24 |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),MTech,BTech | PhD (Pursuing)(Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE)Mody Institute of Technical Science | Asst.Professor |
Contact No | ||
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech | M.Tech(Computer Science)GJUS&T | Asst.Professor |
Phone | ||
01452695535 | aps@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E. | M.Tech(SOFTWARE ENGG.)Singhania University , B.E.(COMPUTER ENGG.)Rajasthan University | Asst.Professor |
Phone | ||
9785573706 | anilsharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E. | M.Tech.(CSE)JNU Jodhpur , B.E.(Computer Science Engineering)RU Jaipur | Asst.Professor |
Phone | ||
9929358980 | dalpat@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),MTech,BTech | PhD (Pursuing)(Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE)Mody Institute of Technical Science | Asst.Professor |
Phone | ||
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.Tech,M.Tech,PhD | B.Tech(Computer Science & Engineering)Jai Narayan Vyas University , M.Tech(Computer Science & Engineering)Bhagwant University , PhD(Computer Science & Engineering)Bikaner Technical University | Asst.Professor |
Phone | ||
monalisameena@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech. | M.Tech.(Computer Science & Engineering)MNNIT Allahabad | Asst.Professor |
Phone | ||
mukeshkhandelwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
Ph.D (Pursuing),M.Tech,,Polytechnic Diploma | Ph.D (Pursuing)(CE)Rajasthan Technical University Kota , M.Tech(Computer science & Engineering)Rajasthan Technical University Kota | Asst.Professor |
Phone | ||
pankaj.cse@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E.,UGC NET JUNE-2012,Phd(p), | M.Tech.(computer engg.)MNIT Jaipur , B.E.(computer engg.)University of Rajasthan JAipur , UGC NET JUNE-2012(computer science and applications)UGC , Phd(p)(Computer Science)MNIT Jaipur | Asst.Professor |
Phone | ||
parvatibhurani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,PhD | M.Tech(Computer Engineering)MNIT , PhD(Computer Engineering) Jaipur | Asst.Professor |
Phone | ||
9460178574 | payalawwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E | M.Tech(CS)Banasthali university , B.E(CS)University of Rajasthan Jaipur | Asst.Professor |
Phone | ||
rajnichoudhary@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,M.Tech. | B.E.(CSE)M.B.M. Jodhpur , M.Tech.(CSE)Mody Lakshmangarh | Asst.Professor |
Phone | ||
01452695535 | rbhaskar@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (P),M.Tech.,B.E.,NET JRF,GATE | PhD (P)(ICT)IIT Jodhpur , M.Tech.(CS)MNIT Jaipur , B.E.(IT)GEC Ajmer , NET JRF(CS)MHRD , GATE(CS)99 Percentile AIR 930 | Asst.Professor |
Phone | ||
9929989287 | saurabh@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M. E.,B.E.,Ph. D. | M. E.(CSE)Panjab University Chandigarh , B.E.(CSE)Engineering College Kota (Now RTU , Ph. D.(CSE)RTU | Asst.Professor |
Phone | ||
ssa@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,MTECH | B.E.(CSE)Rajasthan univ jaipur , MTECH(IT)RTU Kota | Asst.Professor |
Phone | ||
tarunakhemwani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD,M.Tech.,B.E.,GATE (IT) | PhD(Computer Engineering) , M.Tech.(Computer Engineering) , B.E.(Information Technology) , GATE (IT)(97.16 Percentile AIR 218 ) | Asst.Professor |
Phone | ||
01452695535 | vps@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc-IT,MCA | Technician | |
Phone | Mobile | |
0145-2695535 | atulbhardwaj@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc(IT), MCA | Programmer Cum System Administrator | |
Phone | Mobile | |
9530252645 | 9530252645 | balveer@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
ITI Diploma in computer | Technician | |
Phone | Mobile | |
94620-3944 | bhupalsingh@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
jitendraverma@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
B.A,ITI | Technician | |
Phone | Mobile | |
8440010008 | preritgupta@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
satyanarayansharma@gweca.ac.in |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - B |
Incharge Name | Amritpal Singh Yadav |
Technician Name | Atul Bhardwaj |
Description | .Computer System (36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | PARAM - C |
Incharge Name | Monalisa Meena |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | Modrob Project |
---|---|
Room No | New CC Lab - E |
Incharge Name | |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - G |
Incharge Name | Mukesh Kumar Khandelwal |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - H |
Incharge Name | Varun saxena |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized |
Lab Description |
Project Name | |
---|---|
Room No | Research Lab (Param |
Incharge Name | Pankaj Sharma |
Technician Name | Balveer Singh Shekhawat |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector |
Lab Description |
Project Name | TEQIP-III |
---|---|
Room No | New Computer Center |
Incharge Name | Saurabh Maheshwari |
Technician Name | Balveer Singh Shekhawat |
Description | Computer Systems (10) & Netsim software |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - D |
Incharge Name | Dalpat Songara |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - F |
Incharge Name | Anil Kumar Sharma |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server |
Lab Description |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Lab Description |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board |
Lab Description |
Name of Paper | Journal Name | Year | Author |
---|---|---|---|
Data Hiding Technique for E-Tendering using Steganography | International Journal Of Research in Computer Application & Management (IJRCM) | 12/01/2013 | Saurabh Maheshwari |
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | 07/01/2014 | Saurabh Maheshwari |
Railway Security System based on Wireless Sensor Networks: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Recent Trends in Energy-efficient Clustering in WSNs | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Review on Wireless Sensor Network Techniques for Security in Railways | International Journal of Enhanced Research in Science Technology & Engineering | 05/01/2014 | Saurabh Maheshwari |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Memory flshing in multi join query for query optimization | IJARCSSE | 07/01/2013 | Taruna Khemwani |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | 04/29/2017 | Amritpal Singh Yadav |
A Survey on Test Case Prioritization using APFD Algorithm | International Journal of Scientific Engineering and Technology Research | 12/19/2014 | |
STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers | BIG DATA | 02/14/2020 | Utsav Upadhyay |
An Efficient Speculative Task Detection Algorithm for MapReduce Schedulers | Recent Advances in Computer Science and Communications | 1/1/2020 | Utsav Upadhyay |
A Systematic Review of Automation in Handwritten Character Recognition | International Journal of Applied Engineering Research. (IJAER) | 06/01/2018 | Saurabh Maheshwari |
SIFT based Character Matching Technique for Handwriting Recognition | JASC: Journal of Applied Science and Computations | 03/01/2019 | Saurabh Maheshwari |
A Survey on Cloud Computing Risks and Remedies | International Journal of Computer Applications | 07/26/2019 | Amit Garg |
A Survey of Machine or Deep Learning based Approaches for Apparent Personality Detection | Design Engineering | 12/31/2021 | Amit Garg |
Intelligent portfolio asset prediction enabled by hybrid Jaya-based spotted hyena optimization algorithm | Kybernetes | 11/15/2021 | Meeta Sharma |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | 06/01/2014 | Pankaj Kumar Sharma |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | 09/09/2021 | Meeta Sharma |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | 09/09/2021 | Meeta Sharma |
Detecting The Normal And Injected SQL Query Using Random Forest Classification With Rabin Carp Pattern Matching Algorithm In Web Database | Turkish Journal of Computer and Mathematics Education | 04/14/2021 | Meeta Sharma |
Portfolio optimization and return prediction by integrating modified deep belief network and recurrent neural network | Knowledge Based Systems | 08/17/2022 | Meeta Sharma |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | 01/01/2017 | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | 12/12/2016 | Meeta Sharma |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | 2021-22 | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | - | Dalpat Songara |
Importance of Multicast Virtual Private Networks based on RFC 2547 | ” International Journal of Computer Applications (IJCA) | 2010 | Varun Prakash Saxena |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | 2013 | Varun Prakash Saxena |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | 2014 | Varun Prakash Saxena |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | 2014 | Varun Prakash Saxena |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | 2015 | Varun Prakash Saxena |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | 2017 | Varun Prakash Saxena |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | 2017 | Varun Prakash Saxena |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | 2019 | Varun Prakash Saxena |
Application of Electronics in Modern Computer Science | Social Science Journal SI No. 239 | 2020 | Varun Prakash Saxena |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | 2020 | Varun Prakash Saxena |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | 2022 | Varun Prakash Saxena |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | 09/15/2017 | Anil Kumar Sharma |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | 02/01/2016 | Payal Awwal |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | 10/01/2017 | Payal Awwal |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | 05/01/2018 | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Springer-Verlag Berlin Heidelberg | Spain | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010, Advances in Soft Computing, 2010 | Springer-Verlag Berlin Heidelberg 2010 | Spain | Saurabh Maheshwari |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
A DCT Based Permuted Image Digital Watermarking Method | TENCON2010 | IEEE | Fukoka Japan | Saurabh Maheshwari |
Improved ID3 Decision Tree Generation using Shared-Memory and Multi-Threading Approach | International Conference on Education Technology and Computer (ICETC 2011) | Elsevier | Changchun, China | Saurabh Maheshwari |
Robust Watermarking through Spatially Disjoint Transformations | Communications in Computer and Information Science | Advances in Computing and Communications, Springer-Verlag Berlin Heidelberg 2011 | Kochi, India | Saurabh Maheshwari |
Robust Multi-modal Watermarking using Visually Encrypted Watermark | 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012 | IEEE | Vienna, Austria | Saurabh Maheshwari |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | IEEE | Indore, India | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | IEEE | Greater Noida, India | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | Saurabh Maheshwari |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Optimal Sensor Nodes Deployment Method Using Bacteria Foraging Algorithm in Wireless Sensor Networks | Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI | Springer International Publishing, Springer AISC series | Hyderabad, India | Saurabh Maheshwari |
Optimization of Topology Update Interval in k-Connected MANETs | 5Th IEEE International conference on Advanced Computing & Communication Technologies, 21-22 Feb-2015 | IEEE | Haryana, India | Shyam Sundar Agrawal |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | IETE | Jaipur, India | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Springer | Durgapur, India | Saurabh Maheshwari |
Android Malicious Application Detection using Permission Vector and Network Traffic Analysis | 2nd International Conference for Convergence in Technology(I2CT 2017) | IEEE | Pune | |
PNSDroid: A Hybrid Approach for Detection of Android Malware | 5th International Conference on Advanced Computing; Networking; Informatics(ICACNI 2017) | Springer | Goa | |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Tenth International conference on contemporary computing | - | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | - | Dalpat Songara |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
“ Space mouse: Intuitive Man Machine Interface in 3-D Environment ” | National conference ET3CS’11 | National conference ET3CS’11 , VCET Bundi | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | IEEE. | MANIT , Bhopal | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Government Women Engineering college, Ajmer | at Government Women Engineering college, Ajmer | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Springer, Singapore, ,Vishwakarma H., Akashe S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems | ICT4SD 2016 GOA | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Jaipur, 2016 | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Springer - Advances in Intelligent Systems and Computing Series Series Editors: Kacprzyk, Janusz | organized by Tribhuvan University , Pulchowk Campus , Nepal | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | ACM International Processing series (SCOPUS) with publishing partner Springer Nature | Poornima Institute of Technology , Jaipur (Raj)- India | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | IEEE | Noida | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Book Name | Public Name | Chapter | Year | Faculty Name |
---|---|---|---|---|
Operating Systems-I | V. M. Open University Kota | Process Synchronization, Deadlocks | 2010-11 | Shyam Sundar Agrawal |
Resent Findings in intelligent computing techniques | Springer Nature Singapore | Taxonomy of leaf disease detection and classification. | 2018 | Dalpat Songara |
Role | Project Type | Title | Fund | Faculty Name |
---|---|---|---|---|
National | National | Robotic | wipro | |
National | National | Android | GWECA | |
National | National | “Data Analytics & IoT framework for freeway to emergency services & traffic policing in smart cities” | CRS - AICTE (NPIU, TEQIP-III) | Utsav Upadhyay |
National | National | Data Analytics and IoT framework for freeway to emergency services and traffic policing in smart cities | MHRD AICTE TEQIP-III | Saurabh Maheshwari |
National | National | Development of a convenient and accurate method for sleep monitoring | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
National | National | Performance measurement of security algorithms on IoT devices | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
Patent Name | Area | Patent Agency | Year | Validity | Faculty Name |
---|---|---|---|---|---|
Site | Ajmer | Wipro India | 2016 | 2 year |
Role | Title | Funding | Date From | Date To | Amount | Co Investigator | Faculty Name |
---|---|---|---|---|---|---|---|
Tcs Consultancy | Jobs 2014 | TATA | 03/06/2017 | 03/08/2017 | 2.LAC | - |
Name of Paper | Journal Name | Publisher Name | Faculty Name |
---|---|---|---|
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | Amritpal Singh Yadav | |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | Pankaj Kumar Sharma | |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | Meeta Sharma | |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | Meeta Sharma | |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | IGI Global | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | Meeta Sharma | |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | Varun Prakash Saxena | |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | Varun Prakash Saxena | |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | Varun Prakash Saxena | |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | Varun Prakash Saxena | |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | Varun Prakash Saxena | |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | Varun Prakash Saxena | |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | Varun Prakash Saxena | |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | Varun Prakash Saxena | |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | Varun Prakash Saxena | |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | Anil Kumar Sharma | |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | Payal Awwal | |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | Payal Awwal | |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | Payal Awwal |
Name of Paper | Conference Name | Authore | Faculty Name |
---|---|---|---|
Hindustan Times | seminar 2014 | Ec | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Reena Gunjan, Saurabh Maheshwari, M.S.Gaur, Vijay Laxmi | |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | Anjali Agarwal, Saurabh Maheshwari, and Garima Yadav | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | Anjali Agarwal, Saurabh Maheshwari and Garima Yadav | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | Garima Yadav, Saurabh Maheshwari and Anjali Agarwal | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Vaibhav Mishra, Saurabh Maheshwari, Kavita Choudhary | Saurabh Maheshwari |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Surbhi Saxena, Dalpat Songara | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | Sneha Garg, Dalpat Songara | Dalpat Songara |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | Varun Prakash Saxena, Shruti mathur (2014) | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Varun Prakash Saxena, Swati Sharma (June 2022) | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | Varun Prakash Saxena, Christabell Fredrick | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | Gunjan Doshora, Payal Awwal | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | Rubal Bansal; Saurabh Maheshwari; Payal Awwal | Payal Awwal |
Group Name | Project Title | Year |
---|---|---|
Nisha Kumari- 18CSE056 Prabha Kumari- 18CSE062 Preksha Gupta- 18CSE066 Rekha Kumari- 19CSE200 | AN AUTOMATED ATTENDANCE SYSTEM USING GROUP IMAGE | 2021-22 |
Sakshi Mehta | Grievance Redressal System | 2018-19 |
MAHIMA SOMANI-13EEMCS049 GURPREET KAUR- 13EEMCS031 DIPTY REGAR- 13EEMCS026 ESHITA PAREEK- 13EEMCS029 | Clean Smart City Ajmer | 2016-17 |
Shriya Agarwal (13EEMCS108) Pallavi Singh (13EEMCS071) Ritu Jain (13EEMCS091) Pooja Kaviya (13EEMCS073) | Food on Way | 2016-17 |
18EEMCS073 Ranu Rawat 18EEMCS082 Ruchika Chordia | INGREDIENT RECIPES GENERATOR | 2022 |
18EEMCS067 Pretisha Choudhary 18EEMCS059 Payal Kumawat 18EEMCS072 Ragini Goyal | BREAST CANCER DETECTION USING MACHINE LEARNING | 2021 |
Nikita Sukhwal (17EEMCS066) Aarti Jaswani (17EEMCS001) Mitasha Sharma (17EEMCS058) | AUTOMATED DOCUMENT VERIFICATION AND VALIDATION | 2021 |
Ishika Soni (17EEMCS032) Mimansa Pancholi (17EEMCS057) | CREDIT CARD FRAUD DETECTION | 2021 |
Amandeep Kaur (17EEMCS004) Anjali Verma (17EEMCS009) Jyana Chauhan (17EEMCS037) | THOUGHT COMPANION | 2021 |
URVASHI MURJANI PARUL SHANKHALA SAKSHI SINGH RASHI ADWANI PRANJAL YADAV | DHARTI MAA:AN ONLINE NURSERY STORE | 2020 |
various | since last 14 years | |
Divya Choudhary and Group | High Tech City | 2016 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | Smart City | 2017 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | QR Code Reader | 2016 |
Apeksha Gaur;Ayushi Jain;Charul Rathore;Charvi Chandela | Symphony music player | 2016 |
12EEMCS120 12EEMCS068 12EEMCS102 12EEMCS101 | Shop Cart | 2016 |
12EEMCS066 12EEMCS075 12EEMCS079 12EEMCS126 | Rajasthan Tour & Travels | 2016 |
12EEMCS022 12EEMCS036 12EEMCS045 | Jewellery Management System | 2016 |
13EEMCS072 13EEMCS077 13EEMCS093 13EEMCS100 | Online:Training & Placement Cell | 2017 |
13EEMCS034 13EEMCS035 13EEMCS023 | “Udaipur:The Lake City” | 2017 |
13EEMCS097 | Hospital Management System | 2016-2017 |
13EEMCS109 | Home Food Delivery Android App | 2016-2017 |
All MCA VI sem Students | MCA industrial Project | 2015-16 |
12IT047,12IT021,12IT016,12IT017 | Report management System | 2015-16 |
12CS088, 12CS074, 12CS121, 12CS114 | Always with you –An app for women security | 2015-16 |
Group Name | Project Title | Year |
---|---|---|
Sweety Singhal | BAGGED RANDOM FOREST APPROACH TO CLASSIFY SENTIMENTS BASED ON TECHNICAL WORDS | 2020 |
Sweety Singhal | Bagged Random Forest Approach to classify sentiments based on Technical Words | 2020 |
Divyanjali Saini | Predictive Analytics of Spam Detection using Hybrid Machine Learning Model on Feature Based | 2022 |
NISHI PATIDAR | Performance Evaluation of preserve cloud storage using classification technique | 2021 |
ANJALI KUMAWAT | Identification of cryptographic vulnerability and malware detection in android | 2017 |
SUNITA KUMAWAT | Hybrid model for intrusion detection and prevention system in cloud computing | 2016 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Prashant Tiwari | LocalizationMethods and Techniques in Wireless Sensor Network | 2014 |
Sandeep Mahato | Captcha based Web and Application Security Methods and Techniques | 2014 |
Anubhav Saxena | Implementation of Fault Attacks on Elliptic Curve Cryptosystems | 2014 |
Shruti mathur | Hybrid Approach of natural language Transliteration | 2013 |
Priya Nalwaya | A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | 2013 |
Deepti Jyotiyana | Fault attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm over Finite field (E(Fp)) | 2016 |
Aayushi Mathur | A Comprehensive approach on RLE and Elliptical Curve Cryptography using Mean Square Error Feature for data security and compression | 2018 |
SWATI SHARMA | Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2022 |
Akanksha Mittal | An Efficient Machine Learning approach for plant leaf disease identification with performance Improvement | Underprocess |
Poonam Acharya | DETECTING THE NORMAL AND INJECTED SQL QUERY USING RANDOM FOREST CLASSIFICATION WITH RABIN CARP PATTERN MATCHING ALGORITHM IN WEB DATABASE | 2021 |
Priyanka Shaktawat | MSA based clustering method for construction of Phylogenetic tree | 2021 |
Rubal Bansal | Energy Efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 2019 |
Priya Jyotiyana | Multilevel Threholding Based Algorithm for Extraction and Classification of Tumor in MRI Images | 2018 |
Manisha Goswami | Leaf Disease Detection and Classification using Various Image Features and Back Propagation Neural Network | 2017 |
sunita kumari | human activity recognition using KINECT | completed in year 2016 |
priyanka soni | Defog the foggy images | completed in year 2015 |
Vaidehi Sharma | Policy aware social miner | 2016 |
Deeksha kumari | Improved image compression technique using ICW-DCT Transformation | 2013 |
Manali Chandani | Synchronization of CSMA-CA | 2014 |
Manali chandanani | Node Scheduling Approach for Synchronized CSMA/CA Channel | 2017 |
Jyoti | New Improved feature extarction approach of IRIS recognisation | 2012-2014 |
Priyanka | Hidden Biometric Security Implementation through Human Brain’s Artificial Macro Structure | 2017 |
Pooja Nag Choudhary | Optimal clustering using Bacteria Foraging | 2015 |
Vaibhav Mishra | Multi-hop multipath routing of videos | 2015 |
Anjali Agarwal | Vein Biometric Recognition And Security | 2015 |
Garima Yadav | Fog Removal from Images | 2014 |
Group Name | Project Title | Year |
---|---|---|
Sem 2016 | Walking Robort | 2018 |
Bachelor of Technology in Computer Science & Engineering is a four year undergraduate course from Bikaner Technical University, Bikaner. The program offers an opportunity for the students to gain in depth knowledge leading to a successful career in Computer Technology.
S.No. | Degree | Specialization/Branch | Current Intake |
---|---|---|---|
1 | B. Tech | Computer Science & Engineering (CSE) | 120 |
2 | M. Tech | Computer Science & Engineering (CSE) | 24 |
S.NO | Branch | Degree | Current Intake | Offered by Department |
---|---|---|---|---|
1 | Computer Science & Engineering (CSE) | B.Tech | 120 | Computer Engineering |
2 | Computer Science & Engineering (CSE) | M.Tech | 24 | Computer Engineering |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.(CS) | Asst.Professor | |
Phone | Mobile | |
01452695535 |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),MTech,BTech | PhD (Pursuing)(Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE)Mody Institute of Technical Science | Asst.Professor |
Phone | Mobile | |
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech | M.Tech(Computer Science)GJUS&T | Asst.Professor |
Phone | Mobile | |
01452695535 | aps@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E. | M.Tech(SOFTWARE ENGG.)Singhania University , B.E.(COMPUTER ENGG.)Rajasthan University | Asst.Professor |
Phone | Mobile | |
9785573706 | anilsharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E. | M.Tech.(CSE)JNU Jodhpur , B.E.(Computer Science Engineering)RU Jaipur | Asst.Professor |
Phone | Mobile | |
9929358980 | dalpat@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (Pursuing),MTech,BTech | PhD (Pursuing)(Computer Science)Bikaner Technical University , MTech(VLSI Design)MNIT , BTech(CSE)Mody Institute of Technical Science | Asst.Professor |
Phone | Mobile | |
01452695535 | meetasharma@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.Tech,M.Tech,PhD | B.Tech(Computer Science & Engineering)Jai Narayan Vyas University , M.Tech(Computer Science & Engineering)Bhagwant University , PhD(Computer Science & Engineering)Bikaner Technical University | Asst.Professor |
Phone | Mobile | |
monalisameena@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech. | M.Tech.(Computer Science & Engineering)MNNIT Allahabad | Asst.Professor |
Phone | Mobile | |
mukeshkhandelwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
Ph.D (Pursuing),M.Tech,,Polytechnic Diploma | Ph.D (Pursuing)(CE)Rajasthan Technical University Kota , M.Tech(Computer science & Engineering)Rajasthan Technical University Kota | Asst.Professor |
Phone | Mobile | |
pankaj.cse@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech.,B.E.,UGC NET JUNE-2012,Phd(p), | M.Tech.(computer engg.)MNIT Jaipur , B.E.(computer engg.)University of Rajasthan JAipur , UGC NET JUNE-2012(computer science and applications)UGC , Phd(p)(Computer Science)MNIT Jaipur | Asst.Professor |
Phone | Mobile | |
parvatibhurani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,PhD | M.Tech(Computer Engineering)MNIT , PhD(Computer Engineering) Jaipur | Asst.Professor |
Phone | Mobile | |
9460178574 | payalawwal@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M.Tech,B.E | M.Tech(CS)Banasthali university , B.E(CS)University of Rajasthan Jaipur | Asst.Professor |
Phone | Mobile | |
rajnichoudhary@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,M.Tech. | B.E.(CSE)M.B.M. Jodhpur , M.Tech.(CSE)Mody Lakshmangarh | Asst.Professor |
Phone | Mobile | |
01452695535 | rbhaskar@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD (P),M.Tech.,B.E.,NET JRF,GATE | PhD (P)(ICT)IIT Jodhpur , M.Tech.(CS)MNIT Jaipur , B.E.(IT)GEC Ajmer , NET JRF(CS)MHRD , GATE(CS)99 Percentile AIR 930 | Asst.Professor |
Phone | Mobile | |
9929989287 | saurabh@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
M. E.,B.E.,Ph. D. | M. E.(CSE)Panjab University Chandigarh , B.E.(CSE)Engineering College Kota (Now RTU , Ph. D.(CSE)RTU | Asst.Professor |
Phone | Mobile | |
ssa@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
B.E.,MTECH | B.E.(CSE)Rajasthan univ jaipur , MTECH(IT)RTU Kota | Asst.Professor |
Phone | Mobile | |
tarunakhemwani@gweca.ac.in |
Qualification | Education Details | Designation |
---|---|---|
PhD,M.Tech.,B.E.,GATE (IT) | PhD(Computer Engineering) , M.Tech.(Computer Engineering) , B.E.(Information Technology) , GATE (IT)(97.16 Percentile AIR 218 ) | Asst.Professor |
Phone | Mobile | |
01452695535 | vps@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc-IT,MCA | Technician | |
Phone | Mobile | |
0145-2695535 | atulbhardwaj@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
M.Sc(IT), MCA | Programmer Cum System Administrator | |
Phone | Mobile | |
9530252645 | 9530252645 | balveer@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
ITI Diploma in computer | Technician | |
Phone | Mobile | |
94620-3944 | bhupalsingh@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
jitendraverma@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
B.A,ITI | Technician | |
Phone | Mobile | |
8440010008 | preritgupta@gweca.ac.in |
Education Details | Qualification | Designation |
---|---|---|
Phone | Mobile | |
satyanarayansharma@gweca.ac.in |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector | Lab Description | Project .Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Project Name | |
---|---|
Room No | PARAM LAB - B |
Incharge Name | Amritpal Singh Yadav |
Technician Name | Atul Bhardwaj |
Description | .Computer System (36) with Internet Facility connected to a centralized server | Lab Description | .Computer System (36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | PARAM - C |
Incharge Name | Monalisa Meena |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server | Lab Description | Computer System (36) with Internet Facility connected to a centralized server |
Project Name | Modrob Project |
---|---|
Room No | New CC Lab - E |
Incharge Name | |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - G |
Incharge Name | Mukesh Kumar Khandelwal |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - H |
Incharge Name | Varun saxena |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | Computer System(36) with Internet Facility connected to a centralized | Lab Description | Computer System(36) with Internet Facility connected to a centralized |
Project Name | |
---|---|
Room No | Research Lab (Param |
Incharge Name | Pankaj Sharma |
Technician Name | Balveer Singh Shekhawat |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector | Lab Description | .Computer System(36) with Internet Facility connected to a centralized server 2.Projector |
Project Name | TEQIP-III |
---|---|
Room No | New Computer Center |
Incharge Name | Saurabh Maheshwari |
Technician Name | Balveer Singh Shekhawat |
Description | Computer Systems (10) & Netsim software | Lab Description | Computer Systems (10) & Netsim software |
Project Name | |
---|---|
Room No | PARAM LAB - D |
Incharge Name | Dalpat Songara |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box | Lab Description | Computer System(36) with Internet Facility connected to a centralized server. 2. 55 inch UHD TV with Swayam Prabha Set Top box |
Project Name | |
---|---|
Room No | New CC Lab - F |
Incharge Name | Anil Kumar Sharma |
Technician Name | Bhupal Singh |
Description | Computer System(36) with Internet Facility connected to a centralized server | Lab Description | Computer System(36) with Internet Facility connected to a centralized server |
Project Name | |
---|---|
Room No | PARAM LAB - A |
Incharge Name | Meeta Sharma |
Technician Name | Atul Bhardwaj |
Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector | Lab Description | Computer System (36) with Internet Facility connected to a centralized server. 2.Projector |
Project Name | |
---|---|
Room No | New CC Lab - I |
Incharge Name | Parvati Bhurani |
Technician Name | Prerit Gupta |
Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board | Lab Description | .Computer System(36) with Internet Facility connected to a centralized server 2. Digital podium with camera and digital board |
Name of Paper | Journal Name | Year | Author |
---|---|---|---|
Data Hiding Technique for E-Tendering using Steganography | International Journal Of Research in Computer Application & Management (IJRCM) | 12/01/2013 | Saurabh Maheshwari |
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | 07/01/2014 | Saurabh Maheshwari |
Railway Security System based on Wireless Sensor Networks: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Recent Trends in Energy-efficient Clustering in WSNs | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | 02/01/2014 | Saurabh Maheshwari |
Review on Wireless Sensor Network Techniques for Security in Railways | International Journal of Enhanced Research in Science Technology & Engineering | 05/01/2014 | Saurabh Maheshwari |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | 06/01/2014 | Saurabh Maheshwari |
Memory flshing in multi join query for query optimization | IJARCSSE | 07/01/2013 | Taruna Khemwani |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | 04/29/2017 | Amritpal Singh Yadav |
A Survey on Test Case Prioritization using APFD Algorithm | International Journal of Scientific Engineering and Technology Research | 12/19/2014 | |
STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers | BIG DATA | 02/14/2020 | Utsav Upadhyay |
An Efficient Speculative Task Detection Algorithm for MapReduce Schedulers | Recent Advances in Computer Science and Communications | 1/1/2020 | Utsav Upadhyay |
A Systematic Review of Automation in Handwritten Character Recognition | International Journal of Applied Engineering Research. (IJAER) | 06/01/2018 | Saurabh Maheshwari |
SIFT based Character Matching Technique for Handwriting Recognition | JASC: Journal of Applied Science and Computations | 03/01/2019 | Saurabh Maheshwari |
A Survey on Cloud Computing Risks and Remedies | International Journal of Computer Applications | 07/26/2019 | Amit Garg |
A Survey of Machine or Deep Learning based Approaches for Apparent Personality Detection | Design Engineering | 12/31/2021 | Amit Garg |
Intelligent portfolio asset prediction enabled by hybrid Jaya-based spotted hyena optimization algorithm | Kybernetes | 11/15/2021 | Meeta Sharma |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | 06/01/2014 | Pankaj Kumar Sharma |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | 09/09/2021 | Meeta Sharma |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | 09/09/2021 | Meeta Sharma |
Detecting The Normal And Injected SQL Query Using Random Forest Classification With Rabin Carp Pattern Matching Algorithm In Web Database | Turkish Journal of Computer and Mathematics Education | 04/14/2021 | Meeta Sharma |
Portfolio optimization and return prediction by integrating modified deep belief network and recurrent neural network | Knowledge Based Systems | 08/17/2022 | Meeta Sharma |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | 01/01/2017 | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | 12/12/2016 | Meeta Sharma |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | 2021-22 | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | - | Dalpat Songara |
Importance of Multicast Virtual Private Networks based on RFC 2547 | ” International Journal of Computer Applications (IJCA) | 2010 | Varun Prakash Saxena |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | 2013 | Varun Prakash Saxena |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | 2014 | Varun Prakash Saxena |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | 2014 | Varun Prakash Saxena |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | 2015 | Varun Prakash Saxena |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | 2017 | Varun Prakash Saxena |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | 2017 | Varun Prakash Saxena |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | 2019 | Varun Prakash Saxena |
Application of Electronics in Modern Computer Science | Social Science Journal SI No. 239 | 2020 | Varun Prakash Saxena |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | 2020 | Varun Prakash Saxena |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | 2022 | Varun Prakash Saxena |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | 2015 | Varun Prakash Saxena |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | 09/15/2017 | Anil Kumar Sharma |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | 02/01/2016 | Payal Awwal |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | 10/01/2017 | Payal Awwal |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | 05/01/2018 | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Springer-Verlag Berlin Heidelberg | Spain | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010, Advances in Soft Computing, 2010 | Springer-Verlag Berlin Heidelberg 2010 | Spain | Saurabh Maheshwari |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
A DCT Based Permuted Image Digital Watermarking Method | TENCON2010 | IEEE | Fukoka Japan | Saurabh Maheshwari |
Improved ID3 Decision Tree Generation using Shared-Memory and Multi-Threading Approach | International Conference on Education Technology and Computer (ICETC 2011) | Elsevier | Changchun, China | Saurabh Maheshwari |
Robust Watermarking through Spatially Disjoint Transformations | Communications in Computer and Information Science | Advances in Computing and Communications, Springer-Verlag Berlin Heidelberg 2011 | Kochi, India | Saurabh Maheshwari |
Robust Multi-modal Watermarking using Visually Encrypted Watermark | 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012 | IEEE | Vienna, Austria | Saurabh Maheshwari |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | IEEE | Indore, India | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | IEEE | Greater Noida, India | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | Saurabh Maheshwari |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Optimal Sensor Nodes Deployment Method Using Bacteria Foraging Algorithm in Wireless Sensor Networks | Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI | Springer International Publishing, Springer AISC series | Hyderabad, India | Saurabh Maheshwari |
Optimization of Topology Update Interval in k-Connected MANETs | 5Th IEEE International conference on Advanced Computing & Communication Technologies, 21-22 Feb-2015 | IEEE | Haryana, India | Shyam Sundar Agrawal |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | IETE | Jaipur, India | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Springer | Durgapur, India | Saurabh Maheshwari |
Android Malicious Application Detection using Permission Vector and Network Traffic Analysis | 2nd International Conference for Convergence in Technology(I2CT 2017) | IEEE | Pune | |
PNSDroid: A Hybrid Approach for Detection of Android Malware | 5th International Conference on Advanced Computing; Networking; Informatics(ICACNI 2017) | Springer | Goa | |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Tenth International conference on contemporary computing | - | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | - | Dalpat Songara |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
Web based Security Protocol for Embedded System | National Conference Mandi- Gobindgarh 2007 | National Conference Mandi- Gobindgarh | Mandi- Gobindgarh | Varun Prakash Saxena |
“ Space mouse: Intuitive Man Machine Interface in 3-D Environment ” | National conference ET3CS’11 | National conference ET3CS’11 , VCET Bundi | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
LUHN’S Algorithm a mathematical tool for Fraud detection and investigation | National conference ET3CS’11 | conference ET3CS’11, VCET BUNDI | VCET BUNDI | Varun Prakash Saxena |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | IEEE. | MANIT , Bhopal | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | IEEE Computer Society | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Government Women Engineering college, Ajmer | at Government Women Engineering college, Ajmer | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Springer, Singapore, ,Vishwakarma H., Akashe S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems | ICT4SD 2016 GOA | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Jaipur, 2016 | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Springer - Advances in Intelligent Systems and Computing Series Series Editors: Kacprzyk, Janusz | organized by Tribhuvan University , Pulchowk Campus , Nepal | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | ACM International Processing series (SCOPUS) with publishing partner Springer Nature | Poornima Institute of Technology , Jaipur (Raj)- India | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | IEEE | Noida | Payal Awwal |
Name of Paper | Conference Name | Proceeding In | Venue | Faculty Name |
---|---|---|---|---|
Hindustan Times | seminar 2014 | Mca | MNIT, Jodhpur | |
A Rotation and Cropping Invariant Additive Symmetric Watermarking Method | 1st International Conference on Computer Engineering and Technology (ICCET10) IEEE Region 10 Conference | IEEE | Jodhpur (India) | |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | IEEE | Ajmer, India | |
Railway Track Breakage Detection using Vibration Estimating Sensor Network | 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI), WCI | IEEE | Greater Noida, India | |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | IEEE | Jaipur | Payal Awwal |
Book Name | Public Name | Chapter | Year | Faculty Name |
---|---|---|---|---|
Operating Systems-I | V. M. Open University Kota | Process Synchronization, Deadlocks | 2010-11 | Shyam Sundar Agrawal |
Resent Findings in intelligent computing techniques | Springer Nature Singapore | Taxonomy of leaf disease detection and classification. | 2018 | Dalpat Songara |
Role | Project Type | Title | Fund | Faculty Name |
---|---|---|---|---|
National | National | Robotic | wipro | |
National | National | Android | GWECA | |
National | National | “Data Analytics & IoT framework for freeway to emergency services & traffic policing in smart cities” | CRS - AICTE (NPIU, TEQIP-III) | Utsav Upadhyay |
National | National | Data Analytics and IoT framework for freeway to emergency services and traffic policing in smart cities | MHRD AICTE TEQIP-III | Saurabh Maheshwari |
National | National | Development of a convenient and accurate method for sleep monitoring | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
National | National | Performance measurement of security algorithms on IoT devices | RTU (ATU) TEQIP-III | Saurabh Maheshwari |
Patent Name | Area | Patent Agency | Year | Validity | Faculty Name |
---|---|---|---|---|---|
Site | Ajmer | Wipro India | 2016 | 2 year |
Role | Title | Funding | Date From | Date To | Amount | Co Investigator | Faculty Name |
---|---|---|---|---|---|---|---|
Tcs Consultancy | Jobs 2014 | TATA | 03/06/2017 | 03/08/2017 | 2.LAC | - |
Name of Paper | Journal Name | Publisher Name | Faculty Name |
---|---|---|---|
Computational Grid as Connected World | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Automated Brain Tumor Detection in Medical Brain Images and Clinical Parameters using Data Mining Techniques: A Review | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
Security Issues In Grid Computing | International Journal on Computational Sciences & Applications (IJCSA) | Saurabh Maheshwari | |
Multi-Hop Video Routing Methods: State of the Art | International Journal of Computer Applications | Published by Foundation of Computer Science, New York, USA | Saurabh Maheshwari |
A New Approach for Regression Test case prioritization using branch coverage, Decision Coverage and Critical Coverage techniques. | International journal on recent and innovation trends in computing & communication | Amritpal Singh Yadav | |
An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET | International Journal of Computer Applications | Pankaj Kumar Sharma | |
Review of Machine Learning Techniques for Plant Leaf Disease Identification | Journal of Information and Computational Science | Meeta Sharma | |
An Efficient Machine Learning Approach for Image Based Plant Leaf Disease Identification with Performance Improvement | High technology Letters | Meeta Sharma | |
A Survey on Synchronization Approach in MAC Layer Protocols | International Journal of Business Data Communications and Networking (IJBDCN) | IGI Global | Meeta Sharma |
Node Synchronization Approach to Access CSMA/CA Channel | International Journal of Advanced Studies in Computers, Science and Engineering | Meeta Sharma | |
Review of AI Techniques for COVID-19 Diagnosis | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Compliance Engineering Journal, An UGC Care Approved Group -II Journal | Dalpat Songara |
An efficient Approach based on Deep Learning for COVID-19 Diagnosis and Prediction in Artificial Intelligence. | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Journal of Information and Computational Science. An UGC Care -II Certified Journal | Dalpat Songara |
Load Balancing using N-Queens Problem | International Journal of Engineering Research & Technology (IJERT) | Varun Prakash Saxena | |
A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | International Journal of Advance Research in Science & Engineering (IJARSE) | Varun Prakash Saxena | |
Improving the Quality of English-Hindi Name Entity Transliteration | International Journals of Computer Application (IJCA) | Varun Prakash Saxena | |
Implementation of Fault Attacks on Elliptic Curve Cryptosystems | International Journal of Research in Advent Technology (IJRAT) | Varun Prakash Saxena | |
Data Compression and Security in Elliptic Curve Cryptography with Run Length Encoding | International Journal of Computer Science and Network | Varun Prakash Saxena | |
A comprehensive approach on RLE and ECC (Elliptical Curve Cryptography) using Mean Square Error (MSE) feature | 2017 International Journal of Computer Science and Information Security (IJCSIS)1 | Varun Prakash Saxena | |
Comparative Analysis On Sign Language Recognition System | 2019 INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH | Varun Prakash Saxena | |
The Role of Artificial Intelligence in Internet Of Things | 2020 International PEER Reviewed Journal Of Business Innovation and Research (Shiksha Soudha) | Varun Prakash Saxena | |
Fusion Neural Image Captioning Approach for Incorporating Visual and Textual Features | Journal of The Maharaja Sayajirao University of Baroda | Varun Prakash Saxena | |
A Survey of LocalizationMethods and Techniques in Wireless Sensor Networks | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Wireless Sensor Networks:Introduction, Advantages,Applications and Research Challenges | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Securing Web Services and Applications using Captcha Security | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
A Survey of Captcha based Web and Application Security Methods and Techniques | HCTL Open International Journal of Technology Innovations and Research (IJTIR) | Varun Prakash Saxena | |
Identification of Cryptographic Vulnerability and Malware Detection in Android | International journal of Information security and privacy | Anil Kumar Sharma | |
An Overview of Particle Swarm Optimization And Bat Algorithm For Data Clustering. | International Journal of Trend in Research and Development | Payal Awwal | |
A review on privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud | International journal of Computer Science and Mobile Computing | Payal Awwal | |
Privacy Preserving in TPA using Blowfish Encryption and shmir 's Secret sharing for Secure Cloud | International Journal of Engineering Science Invention | Payal Awwal |
Name of Paper | Conference Name | Authore | Faculty Name |
---|---|---|---|
Hindustan Times | seminar 2014 | Ec | |
Permuted Image DCT Watermarking | Computational Intelligence in Security for Information Systems 2010 | Reena Gunjan, Saurabh Maheshwari, M.S.Gaur, Vijay Laxmi | |
A Review on Vein Biometric Recognition using Geometric Pattern Matching Techniques | 2014 Conference on IT in Business, Industry and Government (CSIBIG) | Anjali Agarwal, Saurabh Maheshwari, and Garima Yadav | Saurabh Maheshwari |
Vein Biometric Security using Irreversible Curve Fitting Accounting for Minimum Storage | Signal 2014 International Conference on Propagation and Computer Technology (ICSPCT) | Anjali Agarwal, Saurabh Maheshwari and Garima Yadav | |
Fog Removal Techniques from Images: A Comparative Review and Future Directions | 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT) | Garima Yadav, Saurabh Maheshwari and Anjali Agarwal | |
Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement Using Contrast Limited Adaptive Histogram Equalization of Digitally Filtered Image: Performance Improvement | 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), WCI | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Foggy Image Enhancement In Spatial Domain Using Contrast Limited Adaptive Histogram Equalization | IETE Zonal Seminar Future Trends in Communication Technologies (IETE-2014) | Garima Yadav, Saurabh Maheshwari, Anjali Agarwal | Saurabh Maheshwari |
Multi-Hop Secured Video Transmission using Dual-Channel Dual-Path Routing against Packet Copy Attack | International Conference on Intelligent Computing & Applications 2014 (ICICA 2014) | Vaibhav Mishra, Saurabh Maheshwari, Kavita Choudhary | Saurabh Maheshwari |
Design of people counting system using MATLAB | Tenth International conference on contemporary computing | Surbhi Saxena, Dalpat Songara | Dalpat Songara |
The Winner Decision Model of Tic Tac Toe Game by Using Multi tape Turing Machine | International Conference on Advance in computing, Communications and Informatics (ICACCI) Sep 21-24. 2016. IEEE | Sneha Garg, Dalpat Songara | Dalpat Songara |
Hybrid Approach to English-Hindi Name Entity Transliteration | IEEE , MANIT , Bhopal | Varun Prakash Saxena, Shruti mathur (2014) | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A Cryptographic Approach Based On Integrating Running key in Feedback Mode Of ElGamal System | Sixth International Conference on Computational Intelligence and Communication Networks | Varun Prakash Saxena, Priya Nalwaya ,Pulkit Nalwaya | Varun Prakash Saxena |
A study of implementation using Elliptic Curve Cryptography based smart card | ” National Conference on “Digital Forensic and Cyber Security" | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
“A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. , | ICT4SD 2016 GOA | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm | 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) | Varun Prakash Saxena , Deepti Jyotiyana | Varun Prakash Saxena |
Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2nd International Conference on Sentiment Analysis and Deep Learning (ICSADL 2022) | Varun Prakash Saxena, Swati Sharma (June 2022) | Varun Prakash Saxena |
Fusion Techniques in Neural Network Model for Image Captioningfrom | Internation Confrence on Information Management & Machine Intelligence (ICIMMI-2022) c | Varun Prakash Saxena, Christabell Fredrick | Varun Prakash Saxena |
Adaptive Particle Swarm Optimization Employing Fuzzy Logic. | IEEE International Conference on Recent Advances and Innovations in Engineering | Gunjan Doshora, Payal Awwal | Payal Awwal |
Energy-efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) | Rubal Bansal; Saurabh Maheshwari; Payal Awwal | Payal Awwal |
Group Name | Project Title | Year |
---|---|---|
Nisha Kumari- 18CSE056 Prabha Kumari- 18CSE062 Preksha Gupta- 18CSE066 Rekha Kumari- 19CSE200 | AN AUTOMATED ATTENDANCE SYSTEM USING GROUP IMAGE | 2021-22 |
Sakshi Mehta | Grievance Redressal System | 2018-19 |
MAHIMA SOMANI-13EEMCS049 GURPREET KAUR- 13EEMCS031 DIPTY REGAR- 13EEMCS026 ESHITA PAREEK- 13EEMCS029 | Clean Smart City Ajmer | 2016-17 |
Shriya Agarwal (13EEMCS108) Pallavi Singh (13EEMCS071) Ritu Jain (13EEMCS091) Pooja Kaviya (13EEMCS073) | Food on Way | 2016-17 |
18EEMCS073 Ranu Rawat 18EEMCS082 Ruchika Chordia | INGREDIENT RECIPES GENERATOR | 2022 |
18EEMCS067 Pretisha Choudhary 18EEMCS059 Payal Kumawat 18EEMCS072 Ragini Goyal | BREAST CANCER DETECTION USING MACHINE LEARNING | 2021 |
Nikita Sukhwal (17EEMCS066) Aarti Jaswani (17EEMCS001) Mitasha Sharma (17EEMCS058) | AUTOMATED DOCUMENT VERIFICATION AND VALIDATION | 2021 |
Ishika Soni (17EEMCS032) Mimansa Pancholi (17EEMCS057) | CREDIT CARD FRAUD DETECTION | 2021 |
Amandeep Kaur (17EEMCS004) Anjali Verma (17EEMCS009) Jyana Chauhan (17EEMCS037) | THOUGHT COMPANION | 2021 |
URVASHI MURJANI PARUL SHANKHALA SAKSHI SINGH RASHI ADWANI PRANJAL YADAV | DHARTI MAA:AN ONLINE NURSERY STORE | 2020 |
various | since last 14 years | |
Divya Choudhary and Group | High Tech City | 2016 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | Smart City | 2017 |
Nidhi Saxena;Nisha Meena;Hansa Gurjar; Shivani Sharma | QR Code Reader | 2016 |
Apeksha Gaur;Ayushi Jain;Charul Rathore;Charvi Chandela | Symphony music player | 2016 |
12EEMCS120 12EEMCS068 12EEMCS102 12EEMCS101 | Shop Cart | 2016 |
12EEMCS066 12EEMCS075 12EEMCS079 12EEMCS126 | Rajasthan Tour & Travels | 2016 |
12EEMCS022 12EEMCS036 12EEMCS045 | Jewellery Management System | 2016 |
13EEMCS072 13EEMCS077 13EEMCS093 13EEMCS100 | Online:Training & Placement Cell | 2017 |
13EEMCS034 13EEMCS035 13EEMCS023 | “Udaipur:The Lake City” | 2017 |
13EEMCS097 | Hospital Management System | 2016-2017 |
13EEMCS109 | Home Food Delivery Android App | 2016-2017 |
All MCA VI sem Students | MCA industrial Project | 2015-16 |
12IT047,12IT021,12IT016,12IT017 | Report management System | 2015-16 |
12CS088, 12CS074, 12CS121, 12CS114 | Always with you –An app for women security | 2015-16 |
Group Name | Project Title | Year |
---|---|---|
Sweety Singhal | BAGGED RANDOM FOREST APPROACH TO CLASSIFY SENTIMENTS BASED ON TECHNICAL WORDS | 2020 |
Sweety Singhal | Bagged Random Forest Approach to classify sentiments based on Technical Words | 2020 |
Divyanjali Saini | Predictive Analytics of Spam Detection using Hybrid Machine Learning Model on Feature Based | 2022 |
NISHI PATIDAR | Performance Evaluation of preserve cloud storage using classification technique | 2021 |
ANJALI KUMAWAT | Identification of cryptographic vulnerability and malware detection in android | 2017 |
SUNITA KUMAWAT | Hybrid model for intrusion detection and prevention system in cloud computing | 2016 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Punita Panwar | Load Balancing using N-Queens Problem | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Pawan Gupta | Energy Efficent Distance Based Routing Protocol with Load balancing in wireess sensor network | 2012 |
Prashant Tiwari | LocalizationMethods and Techniques in Wireless Sensor Network | 2014 |
Sandeep Mahato | Captcha based Web and Application Security Methods and Techniques | 2014 |
Anubhav Saxena | Implementation of Fault Attacks on Elliptic Curve Cryptosystems | 2014 |
Shruti mathur | Hybrid Approach of natural language Transliteration | 2013 |
Priya Nalwaya | A Novel Cryptographic Approach Based On Feedback Mode Of Elgamal System | 2013 |
Deepti Jyotiyana | Fault attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm over Finite field (E(Fp)) | 2016 |
Aayushi Mathur | A Comprehensive approach on RLE and Elliptical Curve Cryptography using Mean Square Error Feature for data security and compression | 2018 |
SWATI SHARMA | Hybrid Sign Language learning approach using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn) | 2022 |
Akanksha Mittal | An Efficient Machine Learning approach for plant leaf disease identification with performance Improvement | Underprocess |
Poonam Acharya | DETECTING THE NORMAL AND INJECTED SQL QUERY USING RANDOM FOREST CLASSIFICATION WITH RABIN CARP PATTERN MATCHING ALGORITHM IN WEB DATABASE | 2021 |
Priyanka Shaktawat | MSA based clustering method for construction of Phylogenetic tree | 2021 |
Rubal Bansal | Energy Efficient Multilevel Clustering Protocol for Underwater Wireless Sensor Networks | 2019 |
Priya Jyotiyana | Multilevel Threholding Based Algorithm for Extraction and Classification of Tumor in MRI Images | 2018 |
Manisha Goswami | Leaf Disease Detection and Classification using Various Image Features and Back Propagation Neural Network | 2017 |
sunita kumari | human activity recognition using KINECT | completed in year 2016 |
priyanka soni | Defog the foggy images | completed in year 2015 |
Vaidehi Sharma | Policy aware social miner | 2016 |
Deeksha kumari | Improved image compression technique using ICW-DCT Transformation | 2013 |
Manali Chandani | Synchronization of CSMA-CA | 2014 |
Manali chandanani | Node Scheduling Approach for Synchronized CSMA/CA Channel | 2017 |
Jyoti | New Improved feature extarction approach of IRIS recognisation | 2012-2014 |
Priyanka | Hidden Biometric Security Implementation through Human Brain’s Artificial Macro Structure | 2017 |
Pooja Nag Choudhary | Optimal clustering using Bacteria Foraging | 2015 |
Vaibhav Mishra | Multi-hop multipath routing of videos | 2015 |
Anjali Agarwal | Vein Biometric Recognition And Security | 2015 |
Garima Yadav | Fog Removal from Images | 2014 |
Group Name | Project Title | Year |
---|---|---|
Sem 2016 | Walking Robort | 2018 |