Cse 2231 Assignments Abroad

HOD Computer Science & Engineering Department

Dr. Sitendra Tamrakar

Publications:

Book Series / Chapters:

  1. “Implementation of a Fast and Efficient Secure Image Transposable Algorithm through Pixel Color Transformations Using 16 *16 Quantization Table”, Springer‟s book series “Smart Innovation, Systems and Technologies”, 2017 edition.

IEEE Sponsored Conference Publications:

  1. “An effective access from cloud data using attribute based encryption,” in Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015 International Conference on , vol., no., pp.212-218, 25-27 Feb. 2015.
  2. “Recent traffic allocation methods in MANET: A review,” in Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), vol., no., pp.220-226, 26-27 Sept. 2013.
  3. “VOIP and data storage in wireless GSM modem over MANET area,” in Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on , vol., no., pp.31-36, 25-26 March 2013.

SCI Sponsored Conference Publications:

  1. “MANET Parameter Analysis and its Impact on Next Generation Network”, in International Conference on Recent Trends in Computer Science and Electronics, 02-03 January 2017, Kuala Lumpur, Malaysia.
  2. “Execution of an Efficient Image Denoising Technique for Natural images using Independent Component Analysis” in International Conference on Sustainable Computing Techniques in Engineering, Science and Management (SCESM) 27, 28 January 2017, Belagavi, India.
  3. “Mutual Authentication in Cloud System using Two Level Security with One Time Password”, in International Conference on Sustainable Computing Techniques in Engineering, Science and Management (SCESM) 27, 28 January 2017, Belagavi, India.

International Journal Publications:

  1. “MANET Parameter Analysis and its Impact on Next Generation Network”, International Journal of Future Generation Communication and Networking, Vol. 9, No. 12 (2016), pp. 231-240 (UGC Approved)
  2. “An extensive Review of Webs Caching Techniques to Reduce Cache Pollution”, Imperial Journal of Interdisciplinary Research, Vol-3, Issue-1, 2016, pp 111-118.
  3. “Robust Face Label Graph Matching for Movie Character Identification”, International Journal of Computer Application, Volume 125 – No.12, September 2015, pp 37-40. (UGC Approved)
  4. “A Review of Intrusion-Detection System- Clustering and classification using RBF and SOM Networks” International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 7, July 2015 pp 502-505. (UGC Approved)
  5. “Role of Wavelet Analysis in Image Noise Removal” published in International Journal of Emerging Research in Management & Technology Volume-4, Issue-1, Jan 2015, pp 12-15. (UGC Approved)
  6. “An Efficient Approach to enhance the clustering and classification ensembles technique based on RBF and SOM Network” published in International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June-2015, pp 1277-1283.
  7. “An Efficient Methodology for Cloud Computing to Retrieve Data” published in International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 11, November 2014, pp 383-387. (UGC Approved)
  8. “Restoration and Enhancement of Underwater Image based on Wavelength Compensation and Image Dehazing Technique” published in IOSR Journal of Computer Engineering Volume 16, Issue 6, Ver. IV (Nov – Dec. 2014), pp 46-52. (UGC Approved)
  9. “Reconstruction and Restoration of Underwater Image: Study and Realization” published in International Journal of Engineering Research & Technology, Vol. 3 Issue 11, November-2014, pp 581-585. (UGC Approved)
  10. “Optimal and Fast Denoising of AWGN using Cluster based and Filtering Approach” published in International Journal of Computer Applications, Volume 89 – No 9, March 2014, PP 12-14.
  11. “A Preliminary study of denoising technique” published in Elixir International Journal, Volume 67, 2014, PP 21442-21444. (UGC Approved)
  12. “An Image de-noising technique using bayes thresholding & neural network fitting” published in International Journal of Image Processing and Applications Vol. 4, No. 2 July-December 2013, pp 73-78, International Science Press.
  13. “Improved AODV based on Load and Delay for Route Discovery in MANET” published in IOSR Journal of Computer Engineering Volume 14, Issue 2 (Sep. – Oct. 2013), PP 32-40. (UGC Approved)
  1. “Universal Artificial Intelligence for Intelligent Agents: An Approach to Super Intelligent Agents” published in IOSR Journal of Computer Engineering Volume 12, Issue 6 (Jul. – Aug. 2013), PP 43-48. (UGC Approved)
  2. “A Modified FP-Tree Algorithm for Generating Frequent Access Patterns” published in Journal of Environmental Science, Computer Science and Engineering & Technology, June – August 2013; Vol.2.No.3, 506-517. (UGC Approved)
  3. “Role of Artificial Neural Networks in Digital Image Processing: A review” published in JECET Volume 02, No. 03 (June-Aug. 2013), PP 908-913. (UGC Approved)
  4. “A Novel Approach to Mine Frequent Item sets of Process Models for Dyeing Process using Association Rule Mining” published in International Journal of Computational Engineering Research Vol, 03 Issue 5, pp 77-83, May 2013. (UGC Approved)
  5. “Data Hiding by Neural Network and Retrieval Encrypted Image, Text, Audio and Video Files” published in International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 5, pp 153-158, May 2013. (UGC Approved)
  6. “Modified Apriori Algorithm For Predefind Support And Confidence In Cloud Computing Environment For Frequent Pattern Mining” published in International Journal of Engineering Research & Technology, Vol. 2 Issue 5, May – 2013, pp 836-840. (UGC Approved)
  7. “A new approach to mine frequent item sets of process models for cloud computing using association rule mining.” published in International Journal of Engineering Science and Innovative Technology Volume 2, Issue 2, March 2013 pp 506-511.
  8. “Proposed Energy Saving Scheme for Wireless Ad-hoc Sensor Network” published in International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, pp 55 – 57. (UGC Approved)
  9. “A block based encryption model to improve avalanche effect for data security” published in International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013, pp 1-4. (UGC Approved)
  10. “QOS Provisoning Scheme for Wireless Ad-hoc Sensor Networks” published in International Journal of Computer Science and Information Technologies, Vol. 4 (2), 2013, 334 – 337. (UGC Approved)
  11. “Web Information Extraction: Tag Density and Keyword Approach” published in International Journal of Computer Application, Volume 61– No.12, January 2013, pp 28-30. (UGC Approved)
  12. “Receiver Location Privacy in MANET by using cyclic technique for node ID generation” published in International Journal of Advanced Research in Computer Science and Electronics Engineering, Volume 1, Issue 10, December 2012, pp 97-104.
  13. “An evaluation of a few Image noise removal techniques” published in Association for International Journal in Computer Science & Electronics, Dec 2012 Volume I Issue I, pp 10-13.
  14. “A Survey of Web Usage Mining based on Fuzzy Clustering and HMM” published in International Journal of Computer Science and Information Technologies, Vol. 3 (4), 2012, 4858-4862. (UGC Approved)
  15. “A Survey of intrusion detection system for improving detection rate” published in RJSEM – Vol 1, (2)
  16. “Design and investigation of topology control algorithms to organize MANET” published in International Journal of Information Technology Vol. 2 (3), Jan-June 2010.
  17. “Secured Receiver Location Privacy Based on Cyclic Chain Shift Technique in Mobile Ad Hoc Networks” published in International Journal of Computer Science and Information Technologies, Vol. 3 (5), 2012, 5143 – 5148. (UGC Approved)
  18. “Web Usage Mining & Pre-Fetching Based on Hidden Markov Model & Fuzzy Clustering.” published in International Journal of Computer Science and Information Technologies, Vol. 3 (4), 2012, 4874-4877. (UGC Approved)

International Conferences Publications:

  1. “Optimal Denoising using K-means clustering”, in 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, March 01, 02 – 2014, Maulana Azad National Institute of Technology, Bhopal, M.P. India.
  2. “VOIP and data storage in wireless GSM modem over MANET area” in IEEE – International Conference on Research and Development Prospects on Engineering and Technology, published by IEEE xplore, March 29, 30 – 2013 Vol.4, pp 42-48.
  3. “Soft Computing & Wavelet Transform Based Image De-noising Techniques: A Review” in International Conference on Reliability, Infocom Technologies and Optimization, January 29-31, 2013, IEEE CSI, Amity University, Noida, India.
  4. “VOIP Communication and Data Storage in Wireless GSM Modem Over MANET Area” in International Conference on Reliability, Infocom Technologies and Optimization, January 29-31, 2013, IEEE CSI, Amity University, Noida, India.

National Conferences Publications:

  1. “A comparative study on de-speckling of ultrasound image using image processing” in NCAMSE-2017 at CCET Bhilai India.
  2. “An MCDS Based Routing Scheme to Prevent Broadcast Redundancy in Mobile Ad Hoc Networks” in NCETE-2009 at SIRT Bhopal India.
  3. “A minimum connected dominating set based routing to improve mobile ad hoc network operations” in RDAMIT- 2009 at JIET Guna, India.
  4. “Recognition of handwritten Hindi character using a kohonen neural network” in NCTS-2008 at BIT Durg India.
  5. “Web mining research: a survey” in NCETIT-2007 at SCGITS Indore India.
  6. “Security policies for securing computer systems” in NCTS-2007 at BIT Durg India.

packagecomponents.queue;importjava.util.Comparator;/*** {@code QueueKernel} enhanced with secondary methods.** @param <T>* type of {@code Queue} entries* @mathdefinitions <pre>* IS_TOTAL_PREORDER (* r: binary relation on T* ) : boolean is* for all x, y, z: T* ((r(x, y) or r(y, x)) and* (if (r(x, y) and r(y, z)) then r(x, z)))** IS_SORTED (* s: string of T,* r: binary relation on T* ) : boolean is* for all x, y: T where (<x, y> is substring of s) (r(x, y))* </pre>*/publicinterfaceWaitingLine<T> extendsWaitingLineKernel<T> {/*** Finds and returns position of {@code customer} contained in* {@code this}* * @param customer* entry whose position should be found in {@code this}* @return the position of{@code customer} in {@code this}* @aliases reference {@code customer}* @requires <pre>* {@code this contains customer}* </pre>* @ensures <pre> {@code position = position of customer in this} </pre>*/int positionCustomer(T customer);/*** Removes {@code customer} from {@code this}* ** @param customer* entry to be removed from {@code this}* @return removedCustomer entry removed from {@code this}

One thought on “Cse 2231 Assignments Abroad

Leave a Reply

Your email address will not be published. Required fields are marked *