M. Tech Guidance
·
Guide of Amit Sangwan (2010-12 Batch) – Performance Evaluation of Real Time
Intrusion Detection and Prevention System using Snort.
·
Guide of Smiley (2010-12 Batch) – Crypto-Compression Integration – A new
Approach for Information Security.
·
Guide of Manupriya Hasija (2011-13 Batch) – Modified Multi-Level Queue Scheduling
Approach.
·
Guide of Kusum Yadav (2011-13 Batch) – An Enhanced and Hybrid Approach on
Digital Watermarking.
·
Guide of Meenakshi (2012-14 Batch) – Implementing & Enhancing QoS during
Handover in 3G / UMTS Network using OPNET.
·
Guide of Monika (2012-14 Batch) – Distributed Computing Systems: An
Approach for Efficient Communication Through Messages using Qualnet.
·
Guide of Sudesh (2012-14 Batch) – A Two Stage Hybrid
Model For Image Encryption And Compression To Enhance Security And Efficiency.
·
Guide of Nisha (2012-14 Batch) – A Three
Dimensional Model for Image Based Information Security.
·
Guide of Anju (2013-15 Batch) – Association Rule Generation for Knowledge Retrieval Scheme from
Big Data for Industry.
·
Guide of Neha (2013-15 Batch) – Extended Bellman Ford Algorithm with
Optimized Time of Computation.
· Guide of Ketan Singh Tanwar (2014-16 Batch) – Implementation of Big-Data on Hadoop over Single and Pseudo Distributed Node.
· Guide of Moni Tanwar (2014-16 Batch) – Enhancing the Diffie-Hellman Algorithm using Fermet’s Theorem.
· Guide of Ketan Singh Tanwar (2014-16 Batch) – Implementation of Big-Data on Hadoop over Single and Pseudo Distributed Node.
· Guide of Moni Tanwar (2014-16 Batch) – Enhancing the Diffie-Hellman Algorithm using Fermet’s Theorem.
No comments:
Post a Comment