CSE Achievements

Faculty Achievements

Year 2015 - 2016

 

Page Under Updation


Year 2014 - 2015

 

Page Under Updation


Year 2013 - 2014

 

Page Under Updation


Year 2012 - 2013

 

Page Under Updation


Year 2011 - 2012

 

Page Under Updation


Year 2010 - 2011

A). Dr. Durgesh Kumar Mishra:

1. Dr Durgesh Kumar Mishra, Professor and Head (CSE) and Dean (R&D), presented 6 research papers in international conference at ASM 2010, Malaysia and 2 research papers in international journals. He also delivered 3 invited talks at the conference at Dhule, Maharashtra, VNS, Bhopal, Madhya Pradesh & Subodh Institute, Jaipur, Rajasthan.

2. Nominated as Senior Member IEEE Computer Society, Bombay Section of USA.

3. Nominated as Life Member of ISTE & CSI India.

4. Elected as Chairman IEEE Computer Society, Bombay Section of USA.

5. Elected as Vice Chairman Cum Chairman Elect, Computer Society of India.

6. Invited for Tutorial on ‘Secure Multi-party Computation for preserving privacy during Data-Mining’ at IEEE International conference ASM2010, at Kota KinaBalu, Malaysia on 24 – 28 May 2010.

7. Invited for Tutorial on ‘Secure Multi-party Computation for Cloud Computing Paradigm’ at IEEE International conference CIMSIM 2010, at Bali, Indonesia, on 28th – 30th September 2010.

8. Published 6 Research Papers at IEEE International conference ASM2010, at Kota KinaBalu, Malaysia on 24- 28 May 2010.

9. Published 4 Research Papers for IEEE International conference WOCN2010, at Colombo, Srilanka to be held on 6 – 8 September 2010.

10. Published 3 Research Papers at IEEE International conference CIMSIM 2010, at Bali, Indonesia, on 28 – 30 September 2010.

11. Published 2 Research Papers in International Journals.

B). Mr. Rashid Sheikh

1. Nominated as a reviewer of USA based International Journal IJACSA.

2. Published 3 papers in International Conferences at Sri Lanka, Indonesia and Malaysia.

3. Authored ten books on Computer System Architecture and Organisation.

4. Published 5 Research Papers in various national conferences & international journals.

C). Mr. Nilesh Maltare

1. Exploiting Unified Modeling Language in military modeling in an International Conference in Chengdu, China in 2010.

2. Managing Consultancy in mobile ad-hoc networks databases in an International Conference in Bhopal (RDCSIT).

3. Managing Consultancy in mobile ad-hoc networks databases in an International Journal in .

4. Managing Intelligent data broadcast in MANIT in Medicaps Institute, Indore, India. (IIFTR).

5. Managing complexity in engineering education G-set in Anand, Gujarat, India.

6. Simulation of Z-RP protocol in International Journal of Computer Science and Engineering.

D). Mr. Shubham Joshi

1. Presented a Research Paper on ‘Routing Security Through Secure Ad Hoc on Demand Distance Vector Routing protocol for Eliminating Black Hole Attacks in MANET’ in national conference ETCOMP’10 on 26 March 2010 at S D Bansal College of Technology, Indore.

2. Presented a Research Paper on ‘Complexity Minimization to SAODV Protocol for Reducing in MANET’ in national conference ETET’10 on 25 April 2010 at MIT, Ujjain.

3. Presented a Research Paper on ‘Schematize Trust Overlay & Management in Mobile Computing’ in national conference on 6 May 2010 at Pioneer Institute of Professional Studies, Indore.

4. Presented a Research Paper in the 3rd national level Techfest, Armageddon’10, on 5-6 May, 2010 in association with IEEE MP Subsection & CSI Indore Chapter with the capacity of 2500 students across MP.IEEE student branch got permission from IEEE USA to form computer society students chapter and IEEE women in engineering students affinity group. By getting this Acropolis, Indore becomes the first organization in MP, having these three IEEE students brands at one place.

E). Mr. Raman Bhati

1. A comparative analysis of different neural networks for face recognition using PCA AND Wavelets in ICCCT, Allahabad, September 2010.

2. Analysis of Parallelism available in Different Neural Networks for Face Recognition by Data Flow Graph in an International Conference of Artificial Intelligence and Pattern Recognition in Florida, United States of America in July 2010.

3. A Comparative Analysis of Different Neural Networks for Face Recognition Using Principal Component Analysis and Efficient Variable Learning Rate in Asia Modeling Symposium May 2010 Malaysia.

4. Face Recognition using principal component analysis and Back Propagation Neural Networks using efficient variable learning rate in International Conference in Dhule, India in April 2010.

5. A comparative analysis of various network security algorithms in an International conference in Dhule, India in April 2010.

6. A Secure Multiparty Computation Solution to Healthcare Frauds and Abuses in a National Conference in Jaipur in February 2010.

7. A Secure Multiparty Computation Solution to Healthcare Frauds and Abuses in a National Journal in 2010.

8. Face recognition using principal component analysis and single layer Feed Forward Neural Network using efficient variable learning rate in a national journal “Delving” January-June 2009.

F). Ms. Ritu Shrivastav

1. Presented a Research Paper in national conference at Pioneer Institute of Professional Studies, Indore and national conference at Indore Institute of Science & Technology, Indore.

A) Prof. Sanjay Bansal

(1) S. Bansal and S. Sharma, “Identification of Critical Factors for Fast Multiple

Faults Recovery Based on Reassignment of Task in Cluster Computing,” (IJCNS) International Journal of Computer and Network Security, Vol. 2, No. 10, 2010 pp 140-144

(2) S. Bansal and S. Sharma “An Improved Multiple Faults Reassignment Based Recovery in Cluster Computing,” Journal of Computing, vol. 2 november 2010.

(3) S. Bansal ,S Sharma and Ishita Trivedi “A Novel StairCase Replication (SCR)Based Fault Tolerance for MPI Applications” International Conference on Advances in Information Technology and Mobile Communication – AIM 2011 April 21-22, 2011, Nagpur, Maharashtra, India,.Information Technology and Mobile Communication Communications in Computer and Information Science Springer, 2011, Volume 147, Part 3, 445-448, DOI: 10.1007/978-3-642-20573-6_80

(4) S. Bansal and S. Sharma “Identification of Critical Factors in Checkpointing Based Multiple Fault Tolerance for Distributed System, Journal of Emerging Trends in Computing and Information Sciences, Vol.2 No.1, January 2011.

(5) S. Bansal S. Sharma and Ishita Trivedi “A Detailed Review of Fault-Tolerance Techniques in Distributed System ,” International Journal on Internet and Distributed Computing Systems June 2011.

(6) S. Bansal and S. Sharma “A Multiple Fault Tolerant Approach with Improved Performance in Cluster Computing, Accepted in Journal of Emerging Trends in Computing and Information Sciences , Vol.2 Issue 3,March 2011

(7) S. Bansal S. Sharma and Ishita Trivedi , “A SCR Adaptive Algorithm for Multiple Fault Detections for Multiple Faults Tolerance in Distributed System,

” Accepted in, International Journal of Computer Information Systems.

(8) S. Bansal S. Sharma and Ishita Trivedi , “A Fast Adaptive Replication Placement for Multiple Failures in Distributed System,” accepted in First International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA-2011) , Communications in Computer and Information Science (CCIS) Series(Springer).

(9) S. Bansal S. Sharma and Ishita Trivedi, “A Simple Adaptive Algorithm for Multiple Fault Detections for Multiple Faults Tolerance in Distributed System” accepetced in ICDCN 2011 : 12th International Conference on Distributed Computing and Networking China.(unable to go due to financial problem)

(10) S. Bansal S. Sharma and Ishita Trivedi, “A Dynamic Replica Placement Algorithm to Enhance Multiple Failures Capability in Distributed System,” International Journal of Distributed and Parallel systems (IJDPS

(12) S. Bansal and N. Pandey“An Overview of Portable Distributed Techniques,” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, 2010.

B) Ms. Preeti Jain

1. Published a paper on Effective Anomaly Based Intrusion Detection Using RST and SVM in March’2011 at IJCA.

2. Published a paper on Improvement of the False Positive in Intrusion Detection System using Rough Set Theory and Incremental SVM” in 26-27 Mar 2010 at National conference Emerging Trends in Network Security held in BBDIT, Ghaziabad.

C) Anshul Kosarwal

1. Published a paper on “Object Oriented Methodology based Simulator”; at International Conference of Computer Science and Engineering, Hong Kong. [Paper No. ICCSE_24] held on 29th Feb.2012 in Hong Kong.

2. Published a paper on “Innovation Bringing social change” at International Business Conference (Prayaas- VeriZon-2011) held on 8th Jan.2011 at IIT-Bombay, India.

3. Published a paper on “Entrepreneurial world- CleanTech OAARs CORP” at International Business Conference (Conquest-2011) held on 22nd Aug. 2011 at Bits Pilani,India.

4. Published a paper on “Impact of IT on Society” at National Conference for Green IT for E Pragati held on 28 & 29 April 2011 at Truba Institute, Indore.

D) Raman Bhati

Editor:

  • Journal of Technology and Engineering Sciences, ISSN: 0975 5829, since January 2009.
  • Proceedings of NCSEIS, India, since October 2010.

Reviewer:

  • International Conference on Electronics and Optoelectronics(ICEOE2012).
  • National Conference on Software Engineering and Information Security since October 2010.


Year 2009 - 2010

). Dr. Durgesh Kumar Mishra

1. A Glance at Secure Multi-Party Computation for Privacy-Preserving Data Mining, Transaction of International Journal of Computer Science and Engineering, Vol. 1, No. 3, Oct 2009, pp 171-175.

2. Privacy-Preserving K-Secure Sum Protocol, Transaction of International Journal of Computer Science and Information Security ISSN: 1947-5500, Vol. 6, No. 2, Nov 2009, pp 184-188.

3. Privacy-Preserving K-Secure Sum Protocol, Transaction of International Journal of Computer Science and Information Security ISSN: 1947-5500, Vol. 6, No. 2, Nov 2009, pp 184-188.

4. Secure Internet Voting Protocol using Secure Multi-Party Computational Methods, Transaction of Delving: Journal of Technology and Engineering Sciences ISSN: 0975 5829, Vol. 1, No. 1, Jan-June 2009, pp 45-51.

5. Malicious Computation Preservation Protocol for Secure Multi-Party Computation, In the proceeding of International conference IEEE Tencon 2009 Singapore on 23rd November 2009 – 26th November 2009, pp 77.

6. A Secured Multi-Party Protocol to Protect Cyber Space, Accepted for the publication in transaction of Information Security Journal: A Global Perspective, Nov 2009, Tayler & Francis Publisher.

7. A Secure Multi-party Computation Protocol for Malicious Computation Prevention for privacy during Data Mining, Transaction of International Journal of Computer Science and Information Security ISSN: 1947-5500, Vol. 1, No. 1, May 2009, pp 79-85.

8. A Protocol for Secure Multi-Party Computation for Preserving Privacy during Data Mining, Transaction of International Journal of Computer Science and Information Security ISSN: 1947-5500, Vol. 3, No. 1, July 2009, pp 112-116.

9. Performance Analysis of Secure Multi-part computation protocol, Transaction of a National Journal – Mapana: Journal Of sciences, Vol 8, No 1, Jan-June 2009, ISSN – 09753303, pp 35-44

10. Virtual reality based learning in Neno Technology Education, In the proceeding of International convention on Technology enabled learning for territory education in India, Organized by CEC-UGC, New Delhi, DAVV Indore, 6th – 7th Aug 2009, pp 20.

11. Congestion Control during Data Privacy in Secure Multiparty Computation, Accepted for the publication and presentation in the proceeding of IEEE International conference on Emerging Trends in Engineering and Technology, will be held on 16th – 18th Dec 2009 at Nagpur, India.

12. Key Issues of Security and Integrity in Third Party Association Rule Mining, Accepted for the publication and presentation in the proceeding of IEEE International conference on Emerging Trends in Engineering and Technology, will be held on 16th – 18th Dec 2009 at Nagpur, India.

13. A Paramount Pair of Cache Replacement Algorithm on L1 and L2 using multiple Databases with Security, Accepted for the publication and presentation in the proceeding of IEEE International conference on Emerging Trends in Engineering and Technology, will be held on 16th – 18th Dec 2009 at Nagpur, India.

14. Security in Technology Enabled Terotary Education in India, In the proceeding of International convention on Technology enabled learning for territory education in India, Organized by CEC-UGC, New Delhi, DAVV Indore, 6th – 7th Aug 2009, pp 20.

15. Classification Rule Mining through SMC for Preserving Privacy: A Review, In the proceeding of IEEE International conference on Information and Network Technology (ICINT 2009), Perth Australia, 10th – 12th July 2009.

16. A Secure Multiparty Computation Zero Hacking Protocol for E-voting System, In the proceeding of International conference on Security and Identity Management (SIM-2009), Organized by Indian Institute of Management, Ahmadabad and Research Council of UK (RCUK), May 11-12 2009, pp 75-82.

17. Secure Multiparty Computation with multiple Trusted Third Parties, In the proceeding of International conference on Security and Identity Management (SIM-2009), Organized by Indian Institute of Management, Ahmadabad and Research Council of UK (RCUK), May 11-12 2009, pp 83-87.

18. A Novel Protocol for Privacy Preserving Banking Computation using Arithmetic Computation, In the proceeding of International conference on Security and Identity Management (SIM-2009), Organized by Indian Institute of Management, Ahmadabad and Research Council of UK (RCUK), May 11-12 2009, pp 154-159.

19. RFID-: Recent Prospectus and Commercial applications, In the proceeding of International conference on Security and Identity Management (SIM-2009), Organized by Indian Institute of Management, Ahmadabad and Research Council of UK (RCUK), May 11-12 2009, pp 177-184.

20. A Secured Multi-Party Computational Protocol to protect cyberspace” has accepted for the publication in International Journal Information Security Journal: A Global Perspective Published by Taylor and Francis, UK Aug 2009.

21. A Secured Multi-Party Computational Protocol to protect cyberspace for Defense Applications, Accepted for the presentation and publication in 8th European Conference on Information Warfare and Security Military Academy, Lisbon & the University of Minho, Braga, Portugal. 6-7 July 2009

22. Optimizing HPC for Computational Nanotechnology in MCCS Environment, Accepted for the publication and presentation in International conference Electrical Engineering/Electronics, Computer, Telecommunication and Information Technology (ECTI-CON 2009), to be held in Pattaya Chonburi, Thailand, May 6-9, 2009.

23. MPI and PVM based HPC setup for Multi Scale Modeling, In the Proceeding of IEEE International advance computing conference (IACC 09), at Patiala, on 6th – 7th Mar 2009.

24. Complexity Minimization in Secure Multi-Party Computation for Preserving Privacy during Data Mining (Encrypto_Random), Accepted for the presentation and publication in the proceeding of 3rd National conference on Computing for nation development, INDIACom-2009, ISSN Number – 0973-7529, at New Delhi will be held on 26th – 27th Feb 2009.

25. Prevention from The Terrorist Bomb Attacks, Accepted for the presentation and publication in the proceeding of 3rd National conference on Computing for nation development, INDIACom-2009, ISSN Number – 0973-7529, at New Delhi will be held on 26th – 27th Feb 2009.

26. Optimizing HPC and parallelization for Nenotechnology, In the Proceeding of ACM International conference on advance on computing, communication and control 2009 (ICA 09), will be held on 23rd – 34th Jan 2009, pp 246-250.

B). Mr. Kamal K Sethi

1. Presented a Research Paper on ‘Key Issues of Security & Integrity in Third Party Computation’, in international conference on Emerging Trends in Engineering & Technology 2009 (ICETET 2009), organised by G H Raisoni College of Engineering, IEEE Nagpur.

C). Ms. Richa Tiwari Gupta

1. Publish a research paper in the proceedings of IEEE international conference, IACC’09 on the topic “efficient pair of replacement algorithms for L1 & L2 cache for matrix multiplication”, organized by IEEE Delhi Section on 06th-07th March 2009.

2. Publish a research paper in the proceedings of Conference of Information Sciences and systems, CISS’09 on the topic “Efficient pair of replacement Algorithms for L1 & L2 cache”, organized by Johns Hopkins University, USA on 18th -20th March 2009.


Year 2008 - 2009

A). Dr. Durgesh Kumar Mishra

1. A Zero-Hacking Protocol for Secure Multi-party Computation using Multiple Trusted Third Party, In the proceeding of IEEE Tencon 2008 held on Nov 19th – 21st 2008 in University of Hyderabad and organized by IEEE Hyderabad Section.

2. Congestion Control in Privacy Preserving during Data Mining for Secure Multi-party computation, In proceeding of International conference on Cognition and Control, Mandya, Karnataka, India, 10th – 12th Apr 2008.

3. Secure multi-party computation adversaries and minimizing their effects for preserving privacy during data mining, In the proceeding of IndiaCom2008, ISSN Number – 0973-7529, New Delhi, 8th – 09th Feb 2008.

4. Packet sniffing, In the proceeding of IndiaCom2008, ISSN Number – 0973-7529, New Delhi, 8th – 09th Feb 2008.

5. Randomization method for preserving privacy during data Ming, In the proceeding of IndiaCom2008, New Delhi, 8th – 09th Feb 2008.


Student Achievements

Year 2015 - 2016

Page Under Updation


Year 2014 - 2015

Page Under Updation


Year 2013 - 2014

Page Under Updation


Year 2012 - 2013

Page Under Updation


Year 2011 - 2012

Page Under Updation


Year 2010 - 2011

Page Under Updation


Year 2009 - 2010

1 Mr. Satyendra Gupta, student of CS-final year secured 100 percentile in the the Management Aptitude test (MAT’10). He was among the two students from Indore.

2 Following students are qualified in the Management Aptitude test (MAT’10)

CS-Final Year
Student Name Percentile
Mr.Satyendra Gupta 100
Mr.Arpit Jangir 95
Mr. Swapnil Kothari 99.58
Mr. apurv Bhate 99.71
Mr. Akshata Tare 99.36
Mr. Aniket Ghodke 98.66
CS-Third Year
Student Name Percentile
Mr. Sourabh Jagwani 98.27
Mr. Shivendrra Shrivastav 95.18

3. Mr. Swapnil Kothari Student of CSE final yearregistered Success in most prestigious management entrance examination of the nation Common Aptitude Test (CAT’10) secured 91.7 percentile

4. The following students are practiced really hard for the Graduate Aptitude Test in Engineering (GATE’10) and came out with flying colors:

Students Name Percentile All India Rank
Tarun Agrawal 99.30 100
Paridhi Agrawa 92 8665
Pragya Jain 99.39 646
Jyoti Yadav 97 2525
Varun Agrawal 97.7 2438
Prateek Mehta 99.3 761
Prachi Bansal 95 5293
Divya Talreja 92 9250

GRE (Graduate Record Examination)

Students Name Score
Mr. Rohit Pathak 1110/1600
Mr. Ripudaman Singh Kushwah

Certification

Students Name Certified By
Swapnil Bordiya SCJP
Mr. Vaibhav Joshi MCP
Mr. Parvesh Upadhyay ISM


Year 2008 - 2009

1. Paper published in Conferences

(A) Mr. Rohit Pathak of CS Final year:

1 Publish a research paper in the proceedings of ACM International Conference on Computing Communication & Control-09, ICAC3’09 , Mumbai on the topic “Distributive Computing for Reliability Analysis of M.E.M.S. Devices Using MATLAB”, on 23rd -24th January 2009. This paper is also published ACM Digital Library

2 Publish a research paper in the proceedings of IEEE International Advanced Computing Conference, Patiala on the topic “MPI & PVM based HPC setups for Multi-Scale Modeling”, on 6th-7th March 2009. This paper is also published in IEEE Xplore Journal

3 Publish a research paper in the proceedings of 6th IEEE International Conference on Electrical Engineering/Electronics, Computer, Telecommunications, and Information Technology, ECTI-CON’09, Pattaya, Thailand on the topic “Optimizing HPC for Computational Nanotechnology in MCCS Environment”, on 6th-9th May 2009. This paper is also published in IEEE Xplore Journal.

(B) Ms. Neha Koria, Mr. Ravish Bahety and Mr. Nikhil Kapoor Publish a research Paper in the proceedings of, INDIACOM’09, Delhi on the topic “Complexity minimization in Secure Multiparty Computation for privacy Preservation during data mining”, on 26th-27th Feb. 2009. (

C). Mr. Sourabh Khandelwal and Ms. Priyanka Rohira Publish a research paper in the proceedings of TechFest held at BITS, Pilani , on the topic “Wearable Computers”, on 25th March. 2009

(D).Mr. Sanjay Singh Senger, Mr.Ameen Uddin and Mr. Rahul Rathore Publish a research paper in the proceedings of, INDIAcom’09 , Delhi on the topic “prevention from the terrorist bomb attacks ”, on 26th-27th Feb. 2009.

2.The following students are practiced really hard for the Graduate Aptitude Test in Engineering (GATE’09) and came out with flying colors:

Students Name Percentile
Mr. Aniket Banerjee 99.68
Mr. Abhishek Hurkat 99
Mr. Parvesh Upadhyay 98.7
Ms. Sarika Hablani 97
Mr. Sahil Puri 97

4. Following Students registered Success in most prestigious management entrance examination of the nation Common Aptitude Test (CAT’09).

Students Name Percentile
Ms. Swarna Biyani 94.62
Ms. Anshita Maharishi 90


Year 2007 - 2008

Page Under Updation