Department of Computer Science & Information Technology

Department of Computer Science & Information Technology

Subharti Institute of Technology & Engineering was established in 2005 with the introduction of undergraduate programme on engineering degree level in computer science, electrical, mechanical & electronics engineering. Encouraged by the response and the success of these engineering courses, SITE started Bachelor of Technology in Information Technology specialization by the great efforts by Dr.Jayant Shekhar . It has been continuously engaged in producing well trained & quality IT professionals. In addition to this, the Department has also been catering to the needs of the faculty members & students of other Departments of the college inculcating the basic and the advanced knowledge of Information Technology in their respective fields.Information Technology specialization was introduced with the objective of imparting quality education in the field of Computer Science with rapidly changing technology the department has always produced quality professionals, holding important positions in IT industry in India and abroad.Information Technology course which acquaints those who are interested in computers; with the nuances in the field of information technology. It is a four year full time course which helps to develop a candidate’s personality as software professional. The software development and IT courses taught at the institute are covered with practical exposures. We understand very well that it is paramount to keep the requirements of industry in mind. Like the post-graduation course (M.Tech.) & research, B.Tech. too has industrial training to give an industrial exposure at the learning phase itself. Information Technology department introducing new course M.Tech. in cyber security from 2013 at post graduate level.

Vision and Mission

The main objective of the department is to promote a teaching and learning process that yields advancements in state-of-the-art in computer science and information technology, resulting in integration of research results and innovations into other scientific disciplines leading to new technologies and products as well as to provide qualitative education and generate new knowledge by engaging in cutting-edge research and by offering state-of-the-art undergraduate, postgraduate and doctoral programmes, leading to careers as Computer and IT professionals in the widely diversified domains of industry, government and academia.

Career Scope in Future

Booming IT sector in India has plenty of jobs for fresh computer science graduates. Candidates from top engineering Universities and colleges Like Swami Vivekanand Subharti University get attractive job offers from MNC IT companies. A person having B.Tech in computer science & engineering or information technology can start his career as IT engineer. Career in IT is considered one of the most high-paying jobs and is full of opportunities; particularly when India’s prowess in information technology industry is recognized across the globe. Besides the Computer Engineers have plenty of options to work in IT companies in departments such as design, development, assembly, manufacture and maintenance. The following designations are provided after completing their courses such as:-

· Software Developers

· System Engineers

· System Designer

· System Analyst

· Networking Engineer

· Data Base Administrater

· Software Testing Analyst

· Security analyst

When & How should start?

Engineering is the most hunted after class of 12th in india. Any student from 12th standard with mathematics is eligible to take admission in engineering. Diploma candidate can also take admission in B.Tech 2nd year as lateral entry. However, there is a rigorous selection procedure at place for computer engineers wherein admission to the B.E/ B.Tech courses is extremely competitive in most of the best universities like Swami Vivekanand Subharti University. Students who are passionate about technology and machines can become an engineer by cracking engineering entrance exams. Students may opt for M.E/ M. Tech in Computer Science for further specialization in Computer Science. Almost top universities in Uttar Pradesh such as Swami Vivekanand Subharti University (SVSU, Meerut) offer both graduate and postgraduate engineering courses in the stream of Computer Science & Engineering and Information Technology.

Courses in Computer Science & information Technology

S.NO.

COURSE

Duration

Min. Eligibility criterion

Mode of Admission

1

B.Tech(CS)

4 years

45% in 12th(with PCM/CS)

Through SNET

2

B.Tech(IT)

4 years

45% in 12th(with PCM/CS)

Through SNET

3

M.Tech(CS)

2 years

B.Tech./M.Sc. (CS/EC/Math)

Through SNET

4

M.Tech (Cuber Security)

3 years

B.Tech./M.Sc. (CS/EC/Math)

Through SNET

5.

Ph.D

2 years (min.)

M.ech

As per UGC guidelines

Program Objectives

Within a few years of graduating with a B.Tech degree in Computer Science, our students will demonstrate that they have:

· The ability to design, implement, and analyze computational systems;

· The capability to tackle complex computer science related problems in the real world;

· Contributed towards the advancement of computing science and technology;

· The capacity to work effectively with peers in computational tasks;

· Cognizance of ethical, social, and legal issues pertaining to computer science.

Program Outcomes

The undergraduate academic program in Computer Science will enable our graduates to acquire:

· The ability to design, implement, and test small software programs,

· The ability to design, implement, and test large programming projects;

· Knowledge of the theoretical concepts of computing;

· Knowledge of the fundamental principles of programming languages, systems, and machine architectures;

· Exposure to one or more computer science application areas;

· Technical communication skills in written and oral form;

· The capacity to work as part of a team;

· Awareness of the legal, ethical and societal impact of developments in the field of computer science.

Fee Structure

For fee structure Click Here..

Career Path in Computer Science & Information Technology

Designing And Implementing System Software

• It can be done exclusively by Computer Science graduates with good I.Q. and conceptual knowledge of each subject studied.

• A passion for working with the low level high level languages and the aptitude to use new Modeling Language tools can help achieve the aim.

• One can work for IT companies such as Microsoft, HP, TCS, Wipro, Infosys

Devising new ways to use computers

• This refers to innovation in the application of computer technology.

• A career path in this area can involve advanced graduate work, followed by a position in a research University or industrial research and development laboratory.

• It can involve entrepreneurial activity such as was evident during the dot-com boom of the 1990s or it can involve a combination of the two.

Developing effective ways to solve computing problems

• This refers to the application or development of computer science theory and knowledge of algorithms to ensure the best possible solutions for computationally intensive problems.

• As a practical matter, a career path in the development of new computer science theory typically requires graduate work to the Ph.D. level, followed by a position in a research University or an industrial research and development laboratory.

Labs in Computer Science & Information Technology

Data structure Lab

The objective of this course is to teach students various data structures and to explain them algorithms for performing various operations on these data structures. The different objectives and outcomes of this Lab are given as follows:-

· Demonstrate familiarity with major algorithms and data structures.

· Analyze performance of algorithms.

· Choose the appropriate data structure and algorithm design method for a specified application.

· Determine which algorithm or data structure to use in different scenarios.

· Be familiar with writing recursive methods.

· Demonstrate understanding of the abstract properties of various data structures such as stacks, queues, lists, trees and graphs

· Use various data structures effectively in application programs.

· Demonstrate understanding of various sorting algorithms, including bubble sort, insertion sort, selection sort, heap sort and quick sort.

· Understand and apply fundamental algorithmic problems including Tree traversals, Graph traversals, and shortest paths.

· Demonstrate understanding of various searching algorithms.

C Programming Lab

The different objectives and outcomes of this Lab are given as follows:-

· Understand the basic concept of C Programming, and its different modules that includes conditional and looping expressions, Arrays, Strings, Functions, Pointers, Structures and File programming

· Acquire knowledge about the basic concept of writing a program.

· Role of constants, variables, identifiers, operators, type conversion and other building blocks of C Language.

· Use of conditional expressions and looping statements to solve problems associated with conditions and repetitions.

· Role of Functions involving the idea of modularity.

· Concept of Array and pointers dealing with memory management.

· Structures and unions through which derived data types can be formed

· File Handling for permanent storage of data or record.

OOP lab with JAVA

This subject aims to introduce students to the Java programming language. Upon successful completion of this subject,the students should be able to create Java programs that leverage the object-oriented features of the Java language, such as encapsulation, inheritance and polymorphism; use data types, arrays and other data collections; implement error-handling techniques using exception handling, create and event-driven GUI using Swing components; and implement I/O functionality to read from and write to text files.The different objectives and outcomes of this Lab are given as follows:-

· An understanding of the principles and practice of object oriented analysis and design in the construction of robust, maintainable programs which satisfy their requirements;

· A competence to design, write, compile, test and execute straightforward programs using a high level language;

· An appreciation of the principles of object oriented programming;

· An awareness of the need for a professional approach to design and the importance of good documentation to the finished programs.

· Be able to implement, compile, test and run Java programs comprising more than one class, to address a particular software problem.

· Demonstrate the ability to use simple data structures like arrays in a Java program.

· Be able to make use of members of classes found in the Java API (such as the Math class).

· Demonstrate the ability to employ various types of selection constructs in a Java program. Be able to employ a hierarchy of Java classes to provide a solution to a given set of requirements.

· Introduction to J2EE

· Introduction to Servlets and JS

Web technology Lab

The different objectives and outcomes of this Lab are given as follows:-

· Understand the various steps in designing a creative and dynamic website.

· They will able to write html, JavaScript, CSS and applet codes .

· They will have clear understanding of hierarchy of objects in HTML and XML.

· Finally they can create good, effective and customized websites.

· Know regarding internet related technologies. Systematic way of developing a website.

· Design dynamic and interactive web pages by embedding Java Script code in HTML.Use Java Script to validate user input.

· Know the advantages and use of different types of CSS.

· Understand the HTML and XML DOM. Know how to use Dynamic HTML.

· Use CGI and perl.

· Efficiently write Java applets.

· Understand the fundamentals of VB Script.

· Understand the fundamentals of ASP.

· Understand the fundamentals of AJAX.

· Understand the fundamentals of Web Hosting.

Design & analysis of algorithm Lab

The different objectives and outcomes of this Lab are given as follows:-

· To study paradigms and approaches used to analyze and design algorithms and to appreciate the impact of algorithm design in practice.

· It also ensures that students understand how the worst-case time complexity of an algorithm is defined, how asymptotic notation is used to provide a rough classification of algorithms,

· How a number of algorithms exists for fundamental problems in computer science and engineering work and compare with one another, and how there are stillsome problems for which it is unknown whether there exist efficient algorithms, and how to design efficient algorithms.

· Use different computational models (e.g., divide-and-conquer), order notation and various complexity measures (e.g., running time, disk space) to analyze the complexity/performance of different algorithms.

· Understand the difference between the lower and upper bounds of various problems and their importance in deciding the optimality of an algorithm.

· Use various techniques for efficient algorithm design (divide-and-conquer, greedy, and dynamic algorithms) and be able to apply them while designing algorithms.

· Differentiate between various algorithms for sorting (e.g., insertion, merge, quick-sort, and heap sort), searching (e.g., linear and binary search), and selection (e.g., min, max) and when to use them.

· Augment various data structures (trees and arrays) to support specific applications.

· Know various advanced design and analysis techniques such as greedy algorithms, dynamic programming & Know the concepts of tractable and intractable problems and the classes P, NP and NP-complete problems.

· Gather information about Randomization (Randomization quick sort, Primality testing)

· Analysis of Geometric algorithms (range searching, convex hulls, segment intersections, closest pairs)

· Execution of Numerical algorithms(extended Euclid’s algorithm)

· Know various Text pattern matching, tries, Ukonnen’s algorithm.

Computer organization Lab

By this Lab,Students can understand the architecture of a modern computer with its various processing units. Also the performance measurement of the computer system. In addition to this the memory management system of computer. The different objectives and outcomes of this Lab are given as follows:-

· Students can understand the architecture of modern computer.

· They can analyze the Performance of a computer using performance equation

· Understanding of different instruction types.

· Students can calculate the effective address of an operand by addressing modes

· They can understand how computer stores positive and negative numbers.

· Understanding of how a computer performs arithmetic operation of positive and negative numbers.

· Understanding of how computer stores floating point numbers in IEEE 754 standard.

· Cache memory and its importance.

· Students can understand how cache mapping occurs in computer and can solve various problems related to this.

· Secondary storage organization and problem solving

Software engineering Lab

This course helps to understand theories, methods, and technologies applied for professional software development. The different objectives and outcomes of this Lab are given as follows:-

· To define software engineering and explain its importance

· To discuss the concepts of software products and software processes

· Upon completion of the subject, students will be able to

· The students understands the process tobe followed in the software development life cycle

· find practical solutions to the problems

· solve specific problems alone or in teams

· manage a project from beginning to end

· work independently as well as in teams

· define, formulate and analyze a problem

DBMS Lab

The different objectives and outcomes of this Lab are given as follows:-

· To educate students with fundamental concepts of Data Base Design, Data Models, Different Data Base Languages (SQL/Oracle).

· 2.To analyze Data Base design methodology, OLTP, OLAP and DB connectivity.

· Brief knowledge about SQL Fundamentals.

· Unary & Binary table operations.

· Able to handle with different Data Base languages.

· Table View, Log & Triggers.

· Introduction to different Database packages(Oracle/ MySql/ DB2/ etc)

· Commit & Rollback.

· Handling online Transactions.

· Database connectivity with front-end.

· Embedded and Nested Queries.

Mini Database project

Cryptography & Network security Lab

The different objectives and outcomes of this Lab are given as follows:-

· Understand the basic concept of Cryptography and Network Security,their mathematical models.

· various types ciphers ,DES,AES, message Authentication, digital Signature,System.

· Network security,virus,worms and firewall.

· Acquire knowledge in security issues,services, goals and mechanism.

· Understand mathematical foundation required for various cryptographic Algorithms.

· Identify and classify computer and security threats and develop a security model to prevent, detect and recover from attacks .

· Encrypt and decrypt messages using block ciphers.

· Sign and verify messages using well-known signature generation and verification algorithms.

· Describe and analyze existing authentication protocols for two party communications.

· Analyze key agreement algorithms to identify their weaknesses.

· Develop code to implement a cryptographic algorithm or write an analysis report on any existing security product.

· Understand the SSL or firewall based solution against security threats.

· Describe the ethical issues related to the misuse of computer security.

• Artificial intelligence Lab

The different objectives and outcomes of this Lab are given as follows:-

· Empowering humans to perform collaborative activities in complex and dynamic settings

· Exploiting and integrating information coming from different (and possibly heterogeneous) information sources

· Capturing and Mining Capturing and Mining knowledge from data

· Designing and implementing distributed cognitive systems for information exploitation and collaboration.

• Distributed system Lab

The different objectives and outcomes of this Lab are given as follows:-

· To provide students with contemporary knowledge in parallel and distributed computing.

· To equip students with skills to design and analyze parallel and distributed applications.

· Describe the various design issues in a parallel or distributedcomputing System e.g. system performance and reliability, distributed file system etc.

· Describe and program the communication among processes at different hosts to facilitate parallel and distributed computing.

· Describe and distinguish synchronization and concurrency control for a parallel or distributed computing system.

· Evaluate the impact of network topology on parallel/distributed algorithm formulations and traffic their performance.

· Understand, appreciate and apply parallel and distributed algorithms in problem solving.

· Discuss about the different communication operations and their benefits.

· Master skills to measure the performance metrics of parallel and distributed programs.

· Describe the different principle of message passing programming.

· Uses of Open-MP to simulate and study behavior of parallel programs.

· Case study of parallelism adapted in some system software.

• Operating system Lab

The different objectives and outcomes of this Lab are given as follows:-

· Master functions, structures and history of operating systems

· Master understanding of design issues associated with operating systems

· Master various process management concepts including scheduling, synchronization ,deadlocks

· Be familiar with multithreading

· Master concepts of memory management including virtual memory

· Master system resources sharing among the users

· Master issues related to file system interface and implementation, disk management

· Be familiar with protection and security mechanisms

· Be familiar with various types of operating systems including Unix

• Computer networks Lab

The different objectives and outcomes of this Lab are given as follows:-

· Explain the importance of data communications and the Internet in supporting business communications and daily activities.

· Explain how communication works in data networks and the Internet.

· Recognize the different internetworking devices and their functions.

· Explain the role of protocols in networking.

· Analyze the services and features of the various layers of data networks.

· Design, calculate, and apply subnet masks and addresses to fulfill networking requirements.

· Analyze the features and operations of various application layer protocols such as Http, DNS, and SMTP.

• Computer Forensics Lab

The different objectives and outcomes of this Lab are given as follows:-

· To be able to provide computer, cell phone, mobile & email forensic solutions using computer forensic technologies and tools

· Will be able to provide computer, cell phone, mobile & email forensic solutions using computer forensic technologies and tools

• Cyber Security Lab

The different objectives and outcomes of this Lab are given as follows:-

· Understand the basic concept of Cryptography and Network Security,their mathematical models.

· various types ciphers ,DES,AES, message Authenication,digital Signature,System.

· Network security,virous,worms and firewall.

· Acquire knowledge in security issues,services, goals and mechanism.

· Understand mathematical foundation required for various cryptographic Algorithms.

· Identify and classify computer and security threats and develop a security model to prevent, detect and recover from attacks .

· Encrypt and decrypt messages using block ciphers.

· Sign and verify messages using well-known signature generation and verification algorithms.

· Describe and analyze existing authentication protocols for two party communications.

· Analyze key agreement algorithms to identify their weaknesses.

· Develop code to implement a cryptographic algorithm or write an analysis report on any existing security product.

· Understand the SSL or firewall based solution against security threats.

· Describe the ethical issues related to the misuse of computer security.

Committees

To achieve various objectives, following committees has been formed in the department:

• Technical Committee

• Cultural Committee

• Sports Committee

• Discipline Committee

Placements

Corporates such as TCS , Wipro, Infosys, Satyam, L & T Infotech, HCL visit the University campus every year and recruit students The University has developed special modules to prepare the students to appear for written examinations given by these companies. These modules are handled by its own senior faculty members. The University has hired private enterprises who deal in Personality Development programmes and prepares young students for Group Discussions. The industry offers packages ranging from 2.0 to 3.5 Lacs per annum. In about 3 to 4 years, the earnings of those employed get doubled. For those trained in niche areas of software development such as ERP, VLSI & chip design or having experience in MNCs of repute, the offering from industry is Rs. 4 to 8 Lacs per annum at entry level. Almost 50% of the demand is from the Banking, Finance, Securities, Investment, and Insurance sector.

 

Faculty List:-

  




 

S. No.

Name of faculty

Title of research/article

Name of journal

Peer reviewed or not

Details of publication (Vol, Month, Year, ISSN no.)

1.

Dr. Jayant

Shekhar

A Potential Solution to Mitigate SQL Injection Attack

VSRD-TNTJ International Journal,

Reviewed

Volume I, Issue 3, 2010) ISSN No.: 0976-7967

IP Spoof Prevented Technique to prevent IP Spoofed Attack

VSRD-TNTJ International Journal, I(3

Reviewed

Volume I, Issue 3, 2010 ) ISSN No.: 0976-7967

Classification of SQL Injection Attacks

VSRD-TNTJ International Journal, I(4

Reviewed

Volume I, Issue 4, 2010 ) ISSN No.: 0976-7967

Coalesce Techniques to Secure Web Applications and Database Against SQL Injection Atacks

Electronic Journal of Computer Science and Information Technology (eJCSIT), 3(1)

Reviewed

Volume 3, Issue 1, 2011 ISSN No: 1985-7721

Coalesce Model to Preventing Format String Atacks

International Journal of Computer Science

Reviewed

Volume 3, Issue 1, 2011 ISSN (Online): 1694-0814, Indexed: DBLP

Policy Levels Concerning Database Security

International Journal of Computer Science & Emerging Technologies

Reviewed

Volume 2, Issue 3, 2011 ISSN (Online): 2044-6004

Analysis of Web Mining Applications and Beneficial Areas

IIUM Engineering Journal

Reviewed

Volume 12, Issue 2, 2011 ISSN: 1511-788X

Finite State Machine to Preventing Format String Attacks

ACM SIGSOFT

Reviewed

Volume 36, Issue 5, 2011 ISSN: 01635948, Indexed: DBLP

Network Congestion Control in 4G Technology through iterative Server

International Journal of Computer Science,

Reviewed

Volume 4, Issue 2, 2012 ISSN(Online): 1694-0814, Indexed: DBLP

Malwares Detection and Prevention Using Set Theory

International Journal of Engineering & Technology (IJET),

Reviewed

Volume 5, Issue 2, 2013 ISSN: 0975-4024, Indexed: Scopus

Prevention of SYN Flood DOS Attack

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),

Reviewed

Volume 2, Issue 3, 2013 ISSN: 2278-6856

2.

Amit asthana

Approach to Software Maintainability Prediction versus Performance

International Journal of Computer Science and Telecommunications

Reviewed

[Volume 3, Issue 3, March 2012] ISSN: 2278-6856

Architecture of Wireless Network

International journal of computer science and engineering, , 1(3),

Reviewed

Ijcse may 2012, 11-18..

ISSN: 2278-6856

An Adaptive Steganography Technique for Gray and Colored Images.

JGRCS, 3 (3), March 2012, 41-45. Volume 3, No. 3, March 2012

Reviewed

JGRCS March 2012 ISSN(Online): 1694-0814, Indexed: DBLP

Vertical Handoffs in Fourth Generation Wireless Networks

International Journal of Soft Computing and Engineering (IJSCE)

Reviewed

Ijsce ISSN: 2231-2307, Volume-2, CSIT-2, May ISSN(Online): 1694-0814, Indexed: DBLP 2012

Efficient Approach to Image Registration: Genetic algorithm

International journal advance Research Publication Software Engineering

Reviewed

Ijarps ISSN:2277128X

Intrusion Detection Solution Using Anomaly Detection Scheme

International Journal A.R.S.E

Reviewed

A.R.S.E ISSN: 2251-23227, Volume-2

A HYBRID VANET-WSN SYSTEM FOR DRIVING SAFETY USING EFFICIENT COMMUNICATION PROTOCOL

International Journal Of Advance Research In Science And Engineering http://www.ijarse.com IJARSE,

Reviewed

ijarse Vol. No.2, Issue No.5, May, 2013 ISSN-2319-8354(E)

2nd International Journal conference 2013

Role of technology in nation building

Online Subharti journal

Reviewed

26 to 28 April 2013

1st International Journal conference 2012

ICRTET

Online Subharti journal

Reviewed

28-Nov-12

3.

Saurabh Kumar

Detecting Cross Site Scripting and Prevention Approach

VSRD Technical and Non-Technical Journal

Yes

(International Journal: ISSN No. 0976-7967),October 2010.

Network on Chip design and synthesis outlook

VSRD International Journal of Computer Science & Information Technology

Yes

International Journal: ISSN No. 2231-2471), October 2011

Fastening the communication network for fractal by using divide and conquer methodology of minimum spanning tree algorithm

International Journal of Advanced and Innovative Research(IJAIR)

Yes

June, 2012, vol. 1, issue 1 ISSN: 2278-0181

Finding of spanning tree of a graph by the shortest path algorithm

International Journal of Engineering Research & Technology(IJERT)”,

Yes

vol. 2, issue 6, June, 2013 ISSN: 2278-0181

Finding of shortest path from source to destination by traversing every node in wired network

International Journal of Engineering & Technology(IJET)”,

Yes

vol. 5, no 3, June - July, 2013 ISSN: 0975-4024

A review of XSS vulnerability & defense approach

Sbit journal of science & technology

Yes

Issn 2277-8764, Vol 2, Issue 1, Feb 2013

TPFB: Trusted Path and Friend Behaviour with Thresholds Based Sybil Attack Detection for Social Network

International journal of engineering research and technology

Yes

ISSN: 2278-0181, Vol 3, Issue 4, April, 2014 ISSN: 2278-0181

4.

Anshuman Kumar Saurabh

Survey on Current Security Strategies in Data Warehouse

International Journal of Engineering Science and Technology

Yes

ISSN: 0975-5462, Vol.3 No, Page No. 3484-3488,

April 2011

A New f-IDPS Approach for the Intrusion Detection in High-Speed Network

International Journal of Engineering and Computer Science

Yes

ISSN: 2319-7242, Vol.2 No, Page No. 2120-2124,

June (2013)

Enhanced Security Framework to Develop Secure Data Warehouse

Published in: 2011 4th IEEE International Conference on Computer Science and Information Technology

(IEEE ICCSIT 2011) in Chengdu, China

Yes

978-1-61284-836-5/11/26.00 2011 IEEE

Page no. 319-322

(May 2011)

Identify Malicious Behavior of Node in Mobile

Ad- Hoc Network using Tested

Published in:

International Conference on Recent Trends in Engineering & Technology (ICRTET2012)

Yes

ISBN: 978-81-925922-0-6

Page no.81

(Nov 2012)

Securing Data Using Integrating Fuzzy Logic With Data

Mining: A Review

Published in:

International Conference on Recent Trends in Engineering & Technology (ICRTET2012)

Yes

ISBN: 978-81-925922-0-6

Page no.123

(Nov-2012)

5.

Shriniwas Singh

Enhancement Of Rc6 (Rc6_En) Block Cipher Algorithm And Comparison With Rc5 & Rc6

Journal of Global Research in Computer Science (JGRCS2012)

Yes

[Volume 1, Issue 1

ISSN: 2229-371X

Shortest Path Using Neural Network

International Journal of Advance Research in Science & Engineering

Yes

[Volume 2, Issue 2

ISSN-2319-8354(E)

A Novel Architecture for Effective and Efficient Unit Testing

International Journal of Scientific Research Engineering & Technology (IJSRET)

Yes

[Volume 2, Issue 3ISSN-2278-0882

6.

Deepak Singh Rathore

Approach to Software Maintainability Prediction versus Performance

International Journal of Computer Science and Telecommunications

Yes

[Volume 3, Issue 3, March 2012] ,

ISSN:2047-3338

7

Surabhi Agrawal

Simulation & Modeling of Vector Control

International Journal of Emerging Technology and Advanced Engineering

Yes

ISSN 2250-2459

Special Issue 1, April 2015Volume 5,

Mobile Agent Security in Ad-Hoc Networks

4th National Conference RTMT-2015

YES

ISBN-978-81-923750-3-8

Data Security and Cryptography

Fpstsg-2014

YES

ISSN-0976-9048

8.

Archita Bhatnagar

Enhancement of Security in International data Encryption Algorithm(IDEA) by Increasing its Key Length

International Journal of Advanced Research in Computer and Communication Engineering

YES

Vol. 2, Issue 10, October 2013

ISSN-2278-1021

Augmenting the protection of data in International data Encryption Algorithm(IDEA) by increasing steps of operations

International Journal of Engineering Sciences and research technology

YES

Vol.2 Issue 11 November, 2013

ISSN 2277-9655

Converting International Data Encryption Algorithm (Idea) Into Asymmetric Key Cipher

International Journal of Innovative Research in Science, Engineering and Technology

YES

Vol. 2, Issue 10, October 2013

ISSN: 2319-8753

Performance Evaluation Of Meterpreter's Penetration Power On Various Operating Systems

International Journal on Advanced Computer Theory and Engineering

YES

ISSN (Print) : 2319 – 2526, Volume-1, Issue-1, 2012

Pentesting Windows 8 With Metasploit

International Journal of Research in Engineering and Technology

YES

Vol. 1, No. 4, 2012, ISSN 2277-4378

9.

Er.Ashutosh Kumar

International Journal of Emerging Technology and Advanced Engineering

Web services & Database Services Availability through Multi- Cloud Environment

YES

Volume-4, Issue-5, 2014,

ISSN:2250-2459

International Journal for Technological Research in Engineering

Advance Technique of Vertical Handoff using the application of Spanning Tree in 4G

YES

Volume-2, Issue-10, 2015,

ISSN:2347-4718

VSRD International Journal of Computer Science & Information Technology

Secured Data in Cloud Computing & Environment with secure Process

YES

Volume-5, Issue-5, 2015,

ISSN:2231-2471

10.

Er.Manik Chandra Pandey

Intrusion detection solution using anomaly detection scheme

International Journal Of Advance Research In Science And Engineering

Reviewed

Vol. No.2, Issue No.5, May 2013, ISSN-2319-8354(E)

A hybrid VANET-WSN system for driving safety using efficient COMMUNICATION PROTOCOL

International Journal Of Advance Research In Science And Engineering

Reviewed

Vol. No.2, Issue No.5, May 2013, ISSN-2319-8354(E)

Security and Privacy Concerns in Cloud Computing

International Journal of Research Review in Engineering Science and Technology

Reviewed

Volume-1 Issue-2, September 2012, ISSN 2278- 6643)

A Novel Approach for Effectiveness and Efficiency of Unit Testing for Object Oriented Programs

International Journal of Research Review in Engineering Science and Technology

Reviewed

Volume-1 Issue-2, September 2012, ISSN 2278- 6643)

Assessment Model for Component at Fine Grain Level

International Journal of Research Review in Engineering Science and Technology

Reviewed

Volume-1 Issue-2, September 2012, ISSN 2278- 6643)

A Novel Architecture for

Unit Testing

International Journal of Scientific Research Engineering & Technology

Reviewed

Volume 1, Issue 5, pp 130-133 ,August 2012 , ISSN No: 2278 - 0882

Policy Based Fast Handoff Mechanism for MANET

International Journal of Computational Intelligence & Communication Technology

DIT ,Greater Noida

Reviewed

Volume 1, Issue 1, pp 54-61 ,Jan-June 2012 , ISSN No: 2278-6732

A survey of regression test selection by exclusion

International Journal of Advanced Engineering Science and Technological Research

Reviewed

Volume 2 Issue 1,March-2014, AESTR142144, ISSN No: 2321-1202

A Comparative Study of Data Model Maintainability Metrics

International Journal of Advanced Engineering Science and Technological Research

Reviewed

Volume 2 Issue 1,March-2014, AESTR142144, ISSN No: 2321-1202

Intelligent Multi Criteria Model for Load Balancing in Cloud Environment

International Journal of Scientific Research Engineering & Technology

Reviewed

(IJSRET), ISSN 2278 – 0882

Volume 4, issue 4, May 2015

Mobile Technology in 4G

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

An Approach of Secured Ecommerce Transaction Model without Using Electronic Payment Credit or Debit Card System

international Journal of Scientific Research Engineering & Technology (IJSRET)

Reviewed

Volume 1, issue 1, march 2015, ISSN: 2278–0882

Security Analysis and implementation of Private Cloud infrastructure using Cloud Stack

International Conference on Recent Advances in Computing Communication and Electrical Technology ( RACCET 2015)

Reviewed

Volume 3, issue 1, march 2015, ISSN: 2321-1202

A Model for Selection of Regression Test Cases by Rejection

International Journal of Advanced Engineering Science and Technological Research ISSN: 2321-1202

Reviewed

Volume 2, issue 1, march 2014, ISSN: 2321-1202

Website for Minimizing Testing Challenges of Web Application

2nd International Conference on Role of Technology in Nation Building (ICRTNB-2013) ,SITE,SVSU

Reviewed

Volume 1, issue 1, APRIL 2013, ISBN: 97881925922-1-3

Green IT Trends & Initiatives

2nd International Conference on Role of Technology in Nation Building (ICRTNB-2013) ,SITE,SVSU

Reviewed

Volume 1, issue 1, APRIL 2013, ISBN: 97881925922-1-3

A Maximum Availability Data Guard in oracle Database: A Review

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

Context Based Indexing of Web Document using Ontology

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

4G Network Offers New Challenges & Opportunities

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

Key Challenges in Data Security Lifecycle in the Cloud Computing

International Conference on Recent Trends in Engineering & Technology (ICRTET2012),SITE, SVSU

Reviewed

ICRTET2012, Volume 1, issue 1, November 2012, ISBN: 978-81-925922-0-6

Assessment Model for Component at Fine Grain Level

IJRREST: International Journal of Research Review in Engineering Science and Technology

Reviewed

Volume-1 Issue-2, September 2012, (ISSN 2278- 6643)

Enhancing the Integrity of Dynamic Data Stored in Cloud

International Journal of Engineering Research & Management Technology

Reviewed

Volume-2 Issue-3, MAY 2015, ISSN: 2348-4039

Service Oriented Architecture for Cloud Computing Impact of Intelligence Layer

Journal of Emerging Technologies and Innovative Research

Reviewed

Volume-2 Issue-6, June 2015, ISSN-2349-5162

11.

Er.Ajay Verma

An Approach of Secured Ecommerce Transaction Model without Using Electronic Payment Credit or Debit Card System

international Journal of Scientific Research Engineering & Technology (IJSRET)

Reviewed

Volume 1, issue 1, march 2015, ISSN: 2278–0882

Books Publications from Computer Science & Information Technology Department

Books with ISBN with details:

Type of Publication

Title

Author/s

Name of the Book

ISBN No.

Books with ISBN No.

Digital Logic Design

Dr. Jayant Shekhar

Digital Logic Design

978-81-921055-8-1

Books with ISBN No.

Data Mining and Data Warehousing

Dr. Jayant Shekhar, Dr.Amit Asthana

Data Mining and Data Warehousing

3659118419, 9783659118418

Books with ISBN No.

Steganography : A New Technique To Hide Information Within Image

Amit asthana

Steganography : A New Technique To Hide Information Within Image

A.) 3659130524

B.) ISBN-13: 978-3659130526

Books with ISBN No

Computer Fundamental And Office Automation

Amit asthana

Computer Fundamental And Office Automation

978-93-81481-13-4

Books with ISBN No.

DBMS

Dr.Jayant Shekhar, Manik Chandra Pandey

Database Management System

978-9-38133-5949

Books with ISBN No.

Software Testing

Dr.Jayant Shekhar, Manik Chandra Pandey

Software Testing

978-3-659-49719-3

 

Result analysis:-

  

Syllabus:-

  

Calendar:-