Name & Designation : Dr. Hemraj Saini Faculty


Off - Campus course(s) taught at BITS Pilani in the duration June 2005 – Oct. 2007



Download 396.23 Kb.
Page5/5
Date18.10.2016
Size396.23 Kb.
#533
1   2   3   4   5

Off - Campus course(s) taught at BITS Pilani in the duration June 2005 – Oct. 2007:

COMP CD

COURSE CODE

COURSE

YEAR

SEMESTER

4043

TA ZC142

Computer Programming

2005

1

4042

 SS ZG516

Computer Organization and Software

2005

2

4043

 TA ZC142

Computer Programming

2006

1

4043

 TA ZC142

Computer Programming

2006

2

4125

 POWNT ZC211

Computer Programming

2007

2

4043

 TA ZC142

Computer Programming

2007

2

4043

 TA ZC142

Computer Programming

2007

1

Note:  POWNT ZC211(Computer Programming) course is for the managerial staff of National Thermal Power Corporation (NTPC) a public sector unit of Govt. of India.

Visited Stations:

NTPC, Kahalgoan (Bhihar)

NTPC, Farakka (West Bangal)

NTPC, Talcher (Orissa)

NTPC, Ramagundam (A.P.)

On – Campus course(s) taught at ABV IIITM Gawalior (Jan 2006- July 2006) as a Visiting faculty:

Sr. No

COURSE

STREAM

SEMESTER

YEAR

4043

Design of Analysis of Algorithms

M.Tech.(IT)

Vth

2006

4042

Software Engineering

M.Tech.(IT)

Vth

2006

4043

System Analysis and Design

MBA

IIIrd

2006

Graduate/Under Graduate level Projects Guided to the On-campus Students at BITS Pilani:-

1st Semester (July - Dec. 2006)

COP:-

1) 2003C5PS912,  ADITHYA MADABHUSHI, "Implementing BGP with extended security measures"

2) 2003A7PS060,  GUDURI PADMASWARANA, "Intrusion Detection System"

3) 2003A7PS226,  MANOJ PRASHAD A., "Modeling and Simulation of the Behavior of Malicious Objects"



SOP:-

1) 2003A7PS182, K.B.KARTHIKYAN, "Analysis and Detection of Malicious object and Devising a Defense System"

2) 2003AA7PS032, SUNAINA, "To Incorporate the Intelligent Techniques to Overcome the Spreading of Malicious Objects through the Network Vulnerabilities"

3) 2003AA7PS163, BHAVYA BONTU, "To Incorporate the Intelligent Techniques to Overcome the Spreading of Malicious Objects through the Network Vulnerabilities"

4) 2003AA7PS229, ARVINDHAN P., "Analysis of Loopholes in a Campus Wide Network"

5) 2003B1TS858, DEEPAK PAREEK, "Comparative Study of the Functioning of Computer and Biological Viruses"

6) 2003C6PS411, H ABHTHAHIR, "Study and Modeling of Malicious Objects Existing in Internet" 

2nd Semester (Jan. - Jun. 2006)

FDTS:-

1) 2001A4C6287  DURGA PRASAD K; "scheduling algorithm for embedded systems"



COP:-

1) 2002C6PS334 SUDHEER S.; "Cache Architecture for Embedded Systems"

2) 2002A7PS010 RAJESH; "Performance Evaluation of Flash File System"

LOP:-

1) 2002A7PS104 A SANTOSH KUMAR; "Cache Architecture for Embedded Systems"

2) 2003A3PS117 HEMASUNDAR D; "Implementation of ZigBee Architecture"

3) 2003A8PS210 K RADHA KRISHNA; "Digital VLSI design"

4) 2003A8PS683 CHAPPIDI RAMA KRISHNA RAO; "Implementation of ZigBee Architecture"

1st Semester (July - Dec. 2006)

SOP:-

1) 2003A8PS720 JAyalalitha, “Network audit framework”

2) 2003C6PS456 R. Padama, “Cyber audit framework in MAN”

COP:-

1) 2003A4PS321 S. Thrivani, “Implementation of double Honeypot System”

2) 2003A4B4432 P. Saraswathi, “Implementation of Security Measures on BITSAT Server”

2nd Semester (Jan. - Jun. 2007)

PP-II:-  

1)  2004C6PS234 Omprakash; "Implementation of Signature based detection technique of Malicious Objects”



1st Semester (July - Dec. 2007)

PP-II:-

1) 2005H121234 Sanjeev Sultaniya , "Implementing Firewall for Restricting Malicious Objects”.



2) 2005H121452 Devi Singh, "Implementing Firewall for Restricting Malicious Objects”.

Note: Abbreviations used are as under

FDTS-First Degree Thesis Study SOP-Study Oriented Projects COP-Computer Oriented Projects LOP-Lab Oriented Projects PP-II-Practice Projects-II

PG level (M.Tech.) Projects Guided to the On-campus Students at Orissa Engineering College, Bhubaneswar (BPUT, Rourkela):-

S.No.

Roll No.

Name

Level

Topic

Session

1

0807211001

Deepneel Majumdar

PG (M.Tech.)

Wireless Sensor Networks- An Introduction to Technologies & Architecture

Jan 2009- July 2010

2

0907211002

Ashutosh Das

PG (M.Tech.)

Improvement of searching Technology in search Engine

Jan 2009 - July 2010

PG/UG level Projects Guiding/Guided to the On-campus Students at Jaypee University of Information Technology, Wakanaghat (H.P.). VIIIth Semester ()

S.No.

Roll No.

Name

Level

Topic

Session

1

122209

Tanu Bharadwaj

PG (M.Tech.)

IEEE 802.16: Security Enhancement (Detection, Avoidance and Recovery of Jamming Attacks in Mesh)

July 2012-June 2013

2

91404

Shivam Agarwal

UG (B.Tech.)

Security Enhancement in Image Processing through Hybrid Watermarking Techniques

Jan 2013– July 2013

91426

Ravi Asthana

091419

Arjun

091459

Rajat Bajaj

3

111203

Kainat Singh

UG (B.Tech.)

Efficient Key Management in Wireless Mesh Networks

July 2014-June 2015

4

111239

Sakshi Rana

UG (B.Tech.)

Detecting Attacks in Wireless Mesh Networks

July 2014-June 2015

5

111298

Chitaarth Singh

UG (B.Tech.)

Fairness Management in Wireless Mesh Networks

July 2014-June 2015

6

111408

Shruti Gupta

UG (B.Tech.)

RAS Key Exchange for the Secure Shell (SSH) Transport Layer Protocol

July 2014-June 2015

7

111434

Mitesh Gupta

UG (B.Tech.)

Load Characterization of Elleptic Curve Cryptography and Network Security Algorithm for Constrained Environment

July 2014-June 2015

8

111209

Shreya Garg

UG (B.Tech.)

An Efficient Authentication Protocol Based on Kerberos 5

July 2014-June 2015

9

111248

Ritika Bhatnagar

UG (B.Tech.)

Efficient Multicasting in Wireless Mesh Network using Steiner Tree

July 2014-June 2015

10

111277

Priyanka Fubey

UG (B.Tech.)

Graphical Routing in Peer-to-peer Overley Networks

July 2014-June 2015

11

132214

Ninni singh

PG (M.Tech.)

Efficient and Scalable Key management mechanism using ECC for short memory scalar

multiplication



July 2014-June 2015

12

132215

Abhisek Rao

PG (M.Tech.)

Optimization of symmetric key management process in wireless mesh network

July 2014-June 2015

13

Courses Taught

Prabhat Ranjan

PG (M.Tech.)

Cross Layer Intrusion Detection System for Gray Hole attack in WMN

July 2015-June2016


Related Links



http://www.scopus.com/authid/detail.url?authorId=23095548700

http://juit.ac.in/Department/CSE/faculty_cs&it.php?faculty_id=280

http://scholar.google.co.in/citations?user=Icwu4fAAAAAJ&hl=en&oi=ao

http://www.informatik.uni-trier.de/~ley/pers/hd/s/Saini:Hemraj.html

http://ijact.in/editorial-board-member/

https://sites.google.com/site/drhemraj1977/

http://www.juit.ac.in/iciip_2015/advisory_committee.php
(Hemraj Saini)


Page of



Download 396.23 Kb.

Share with your friends:
1   2   3   4   5




The database is protected by copyright ©ininet.org 2024
send message

    Main page