The Department of Computer Science is one of the oldest Department of Engineering in CVRU constituents units of the Faculty of Computer Sciences. It was established in the year 2007 with the objective of producing IT professionals of international standard and to primary fulfil requirements of booming IT industry and develop researchers. The Department offers DIPLOMA, UG, PG, and Research Programmes. The department is committed to provide quality higher education on the field of Computer Science & Engineering with the understanding, knowledge and practical competence to participate in a long revolution. The knowledge will enable you to understand and foresee the great changes and challenges that Computer Science presents to the world, now and in the future. Besides teaching there is also doubt removal session. The department has specialized laboratories such as Networking Lab, Advance Programing Lab, Data Base &Unix Lab and Project Lab. The department provides opportunities for carrying project by students under joint supervision of the faculty and experts from industry.
|1||Dr.Rohit Kumar Miri
|Data Mining & ML||11 Years 3 Month||Head & Associate Professor|
|2||Dr. S. R. Tandan
|Soft Computing and ML||10 Years 2 Month||Associate Professor|
|3||Mrs. Amrita Verma
|NLP||12 Years||Assistant Professor|
|4||Mr. Praveen Chouksey
|Image Processing||9 Years||Assistant Professor|
|5||Mr. Sunil Sharma
|Steganography||9 Years||Assistant Professor|
|Network Security & ML Neural Network||11 Years||Assistant Professor|
|Networking||12 Years||Assistant Professor|
|8||Ms. Shagufta Farzana
|Data Mining||9 Years||Assistant Professor|
|Image Processing||2 Years||Assistant Professor|
|10||Mr.Anip Singh Baghel
|-||11 Years||Lab Assistant|
|11||Mr.Ved Prakash Soni
|-||9 Years||Lab Assistant|
|12||Mr.Arun Pratap Singh
|-||9 Years||Lab Assistant|
The 3 years Diploma programme in Computer Science and Engineering is meant for the students who have passed 10th standard. In an outstanding education environment complemented by superior teaching for its students to flourish in the program, the major areas of teaching include Algorithms, System Programming, Operating System, Data Structures, Computer Architecture & Organization, Image Processing, DBMS, Microprocessor, Systems Analysis and Design Computer Networks, Graphics, Computer Maintenances, etc.
Close interaction with the industry has led to the evolution of a teaching system, which produces diligent and erudite engineers. The students get an exposure to various aspects of computer hardware, software and practical handling of computers.
The aim of Diploma Course is to strive for excellence in creating, applying and imparting knowledge in computer science and engineering through comprehensive educational programmes and service to professional societies, the community and the Nation.
The department has highly qualified & dynamic staff to motivate the students through mini projects & competitions. The exhaustive course has been designed to meet the demands of the current trend of an IT industry.
PO1.To prepare students to excel in Information Technology Diploma programme for immediate employment or to succeed in computing industry profession through quality education. (Preparation)
PO2.To provide students with a solid foundation in mathematical, scientific and engineering fundamentals required to solve computing and information technology problems.(Technical Competence)
PO3.To train students with good scientific and Information technology breadth so as to comprehend and create innovative computing and Information technology products and solutions for real life problems. (Scope)
PO4.To inculcate in students professional and ethical attitude, communication skills, team work skills, multi-disciplinary approach and an ability to relate computer engineering issues with social awareness. (Professionalism)
PO5.To provide students with academic environment aware of excellence leadership and the life-long learning needed for a successful profession career as an engineers, technocrat, administrator or an entrepreneur. (Learning Environment)
PO6.To impart world class value based technical education in all aspects of Computer Science and Engineering through state of the art infrastructure and innovative approach.
PO7.To produce ethical, motivated and skilled engineers through theoretical knowledge and practical applications.
PO8.To inculcate ability for tackling simple to complex problems individually as well as in a team.
PO9.To develop globally competent engineers with strong foundations, capable of out of the box thinking so as to adapt to the rapidly changing scenarios requiring socially conscious green computing solutions.
PSO1.Able to apply knowledge of mathematics, science, and in different streams of Engineering.
PSO2.Able to demonstrate skills to use modern engineering tools and software to analyze technical problems.
PSO3.Able to identify, formulate and solve engineering problems related to Information Technology.
PSO4.Able to develop logic and programming skills through immersion in the fundamental programming.
PSO5.Able to demonstrate knowledge of professional and ethical responsibilities.
PSO6.Able to demonstrate effective communication skills of computer subjects, in both oral and written forms.
PSO7.Able to demonstrated leadership and capability to participate in teamwork in an environment with different disciplines of engineering, science and business.
PSO8.Able to develop confidence for self-education, teamwork and ability for life-long learning.
PSO9.Able to use the techniques, skills, and modern engineering tools necessary for engineering practice.
B.E. (Computer Science and Engineering) is a full-time undergraduate Engineering course. The duration of this course is 4 years divided into 8 semesters. Candidates have to pass their 10+2 examinations in science stream or an equivalent examination from a recognized board. Candidates who have passed their higher secondary examination with 55% of marks in science stream are eligible for this course.
B.E. (Computer Science and Engineering) course deals with the construction, design, maintenance, operation of computer software and hardware. This course introduces the software and hardware aspects of both computer applications and computer design.
Admission to B.E. (Computer Science and Engineering) course is based on entrance exam. After completing this course, candidates may get opportunities in the areas like Software Companies Telecommunication Companies, Colleges and Universities, Manufacturing Companies, Financial Services, Aerospace and Defence, Healthcare Sector, Agricultural Sector, Retail Sector, etc. These graduates may work in positions like Application Consultant, Computer Engineer, Network Administrator, System Administrator, Mobile Application Developer, etc. The average salary for these professionals ranges between INR 3 to 15 Lacs per annum based on their experience and expertise in this field.
PO1.Design solutions for complex engineering problems and design system components or processes that meet specified needs with appropriate consideration for public health and safety,cultural, societal and environmental considerations.
PO2.Create, select and apply appropriate techniques, resources and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.
PO3.Understand the impact of professional engineering solutions in societal and environmental contexts and demonstrate knowledge of and need for sustainable development.
PO4.Apply ethical principles and commit to professional ethics and responsibilities and norms of engineering practice.
PO5.An ability to analyze a problem, and identify and deﬁne the computing requirements appropriate to its solution
PO6.An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs
PO7.Individual and team work: Function effectively as an individual and as a memberor leader in diverse teams, and in multidisciplinary settings.
PO8.Communication: Communicate effectively on complex Engineering activitieswith the Engineering Community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO9.Project management and finance: Demonstrate knowledge and understanding ofthe Engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multi-disciplinary environments.
PO10.Life-long learning: Recognize the need for and have the preparation and ability to engage in independent and life- long learning in the broadest context of technological change.
PSO1.Practice as computing professionals (appropriate to the description of the Computer Science and Engineering program described above), conducting research and/or leading, designing, developing, or maintaining projects in various technical areas;
PSO2.Apply the ethical and social aspects of modern computing technology to the design, development, and usage of computing artifacts; and,
PSO3.Enhance their skills and embrace new computing technologies through self-directed professional development and post-graduate training or education.
PSO4.Possess practical and theoretical knowledge of computer science and software engineering sufficient to earn a living and contribute to the economic development of the region, state and nation.
PSO5.Understand and respect the professional standards of ethics expected of computer scientists and software engineers and appreciate the social impact of computing.
M.Tech (Computer Science and Engineering) is a 2-year postgraduate degree course. The course is divided into 4 semesters. The basic eligibility for pursuing M.Tech in Computer Science is a bachelor’s degree in engineering with a minimum of 50% marks. A valid GATE score is also needed.
The future computer professionals efficiently carry out duties comprising of System Development, Data Organization, Software Devices, Supervision Information Systems, Networking and Hardware Engineering, and Application Design and improvement. This course provides job prospects in a number of private sectors like Teaching, Entertainment, Retail, Banking, Finance etc. Students can work as an Application Developer, Business Systems Analyst, Computer Operator, Client Server Systems Manager etc. after completing M. Tech. in Computer Science course.
PO1.Ability to acquire and apply in-depth knowledge in the area of Computer Science and contribute to the state-of-art.
PO2.Ability to Design & Conduct Experiments, as well as analyze & Interpret Data.
PO3.Ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, ethical, manufacturability, and sustainability.
PO4.An ability to function, manage and lead multidisciplinary teams.
PO5.Ability to identify, formulate & solve problems, conduct research and critically examine the outcomes and take corrective actions.
PO6.An understanding of professional and ethical responsibility.
PO7.An ability to communicate effectively.
PO8.To understand the impact of engineering solutions in a global, economic, environmental, and societal context.
PO9.A recognition of the need for, and an ability to engage in life-long learning
PO10. A knowledge of contemporary issues.
PO11.An ability to use the techniques, skills and modern engineering tools necessary for engineering practice.
PSO1.Apply knowledge of recent computing technologies, skills and current tools of computer science and engineering.
PSO2.Ability to design and conduct experiments, as well as to analyze and interpret data
PSO3.Knowledge of contemporary research issues in the different areas of computer science and engineering
PSO4.Ability to explore research gaps, analyze and carry out research in the specialized/emerging areas.
PSO5.Design software systems, components, or processes to meet identified needs within economic, environmental and social constraints.
PSO6.Ability to express/present ideas in an impressive and professional manner.
PSO7.Recognize the need to engage in lifelong learning through continuing education and research.
PSO8.Ability to work in multidisciplinary and multicultural environment.
PSO9.Ability to become entrepreneur based upon societal needs.
PSO10.An understanding of professional, social and ethical responsibilities.
M. Tech. (Software Engineering) is a postgraduate degree course which spans 2 years and these 2 years are divided into 4 semesters. The major areas of focus in the course are the development, designing, modifying and managing the software programs.
This course has a wide scope in terms of career prospects. A lot many engineering courses are as it is very popular in the current times, but software engineering particularly becomes one such course which has a lot of scope in the future to come.
The main reason for its popularity is because of the coming of new technology and the on-going research in the technological field. The technological advancements require software development; hence M.Tech. Software Engineering course has proved itself to be most likely in demand.
PO1.Ability to acquire and apply in-depth knowledge in the area of Digital Communication and contribute to the state-of-art.
PO2.An ability to apply knowledge of mathematics, science and engineering in practice
PO3.An ability to identify, critically analyze, formulate and solve engineering problems with comprehensive knowledge in the area of specialization
PO4.An ability to select modern engineering tools and techniques and use them with dexterity
PO5.An ability to design a system and process to meet desired needs within realistic constraints such as health, safety, security and manufacturability
PO6.An ability to contribute by research and innovation to solve engineering problems
PSO1.An ability to understand the impact of engineering solutions in a contemporary, global, economical, environmental, and societal context for sustainable development
PSO2.An ability to appreciate the importance of goal setting and to recognize the need for life-long reflective learning
PSO3.Exhibit Technical skills necessary to choose careers in the design, installation, testing, management and operation of Software Engineering.
The Department has a well-stocked library with 100 books on a variety of topics in the Computer Science arena. Besides books, the library possesses tools and technology CDs, journals, project and seminar reports, lab manuals and question banks. The collection is strong in all aspects, with special strengths in C programming, Python, Java Programming, Software Engineering, Automata Theory, System Programming, Computer Architecture and Organization, Data Structures, Microprocessors, Database Management System, Java Programming, Computer Networking, Data Security, Artificial Intelligence, Biometric Security, etc. and also books on Digital Electronics, Humanities, Management and Aptitude, etc.. Library has a reading room with newspapers, technical journals and magazines.
IoT-LAB provides full control of network nodes and direct access to the gateways to which nodes are connected, allowing researchers to monitor nodes energy consumption and network-related metrics, e.g. end-to-end delay, throughput or overhead. The facility offers quick experiments deployment, along with easy evaluation, results collection and analysis. Defining complementary testbeds with different node types, topologies and environments allows for coverage of a wide range of real-life use-cases.
UML (or Unified Modeling Language) is a software engineering language that was developed to create a standard way of visualizing the design of a system. And UML Class Diagrams describe the structure of a system by showing the system's classes and how they relate to one another. UML Lab Services« enable you to use model-based software engineering with UML in your StarUML IDE whenever you need it.
The lab Installed with MATLAB software, provides solution to data scientists, automatic control simulation etc. It provides multi paradigm numerical computing environment for solving computer based numerical problems.
The Lab is dedicated for Database related practicals. High configuration computer systems installed with softwares like Oracle Server, MySQL are used by the students to execute their Database related projects and assignments.
Departmental Computer Labs consist of Licensed Software under Microsoft campus agreement and MATLAB with Simulink Performance Tools like Image Processing Tool Box, Neural Network Tool Box, Wavelet Transforms Toolbox, Filter Design Toolbox, and Communication Toolbox.
The lab is installed with all important editors like CodeBlock, Dev C++ provides a dual operating system environment where the students can learn to execute C and C++ programs in all types of environments.
The lab provides requisite environment for Design and Analysis of Algorithms for solving complex problems in the field of computer science. Students execute all data structure and other algorithm related practicals in the lab. The latest platforms/compilers are provided to the students to run their programs.
The students receive hands on practical experience in the field of System Administration, System Engineering, Hacking and Security. Red Hat Linux Administration is the key practice in this lab.
The lab is dedicated for the students to develop their Minor and Major projects. All project related software are installed in this lab to fulfil the requirements of development.
|S.NO||NAME||TITLE||NATIONAL/ INTERNATIONAL||CONFERENCE/ JOURNAL||YEAR|
|1||Dr.Rohit Kumar Miri||Performance Of Novel Based Fuzzy Association Rules To Reduced Computational Data Sets By Row Counts||International||Journal||2016|
|2||Dr.Rohit Kumar Miri||Pseudo Code To Eliminate Unwanted Data Sets For Fuzzy Mining Association Rule||International||Journal||2015|
|3||Dr.Rohit Kumar Miri||A Survey Paper On Association Rule Mining Using Fuzzy Logic||International||Journal||2015|
|4||Dr.Rohit Kumar Miri||Prediction Of Data Sets By Using Fuzzy Mining Association Rule||International||Journal||2015|
|5||Dr.Rohit Kumar Miri||Exploration Of Novel Algorithm For Reduced Computational Time By Using Fuzzy Classification Technique In Data Mining||International||Journal||2013|
|6||Dr.Rohit Kumar Miri||Fuzzy Association Rule By Classification Technique||International||Journal||2016|
|7||Dr.Rohit Kumar Miri||Performance Of Novel Based Fuzzy Association Rules To Reduced Computational Data Sets By Row Counts||International||Journal||2016|
|8||Dr.Rohit Kumar Miri||Positive And Negative Approach For Association Rule In Data Mining Techniques||International||Journal||2016|
|9||Dr.Rohit Kumar Miri||Prediction Of Stock Market Using Financial News Analysis And Supervised Data Mining Technique||International||Journal||2016|
|10||Dr.Rohit Kumar Miri||Web Information Retrieval Using Python And Beautifulsoup||International||Journal||2016|
|11||Dr.Rohit Kumar Miri||An Intrusion Detection System For Identifying Attacks Using Classification Technique||International||Journal||2017|
|12||Dr.Rohit Kumar Miri||Survey On Techniques For Enhancing The Quality Of Satellite Images||International||Journal||2017|
|13||Dr.Rohit Kumar Miri||A Hybrid Technique For Creating Classification Model Using Random Committee And Voted Perceptron Classifier||International||Journal||2017|
|14||Dr.Rohit Kumar Miri||A Method For Mobile Robot To Navigate In Dynamic Environment Using Fuzzy Approach||International||Journal||2017|
|15||Dr.Rohit Kumar Miri||Trapriori Classification Based Algorithm By Fuzzy Techniques To Reduced Time Complexity||International||Journal||2014|
|16||Dr. S. R. Tandan||A Brief Review on Discourse Analysis||International||Conference||2019|
|17||Dr. S. R. Tandan||A Review on Detection of Sarcasm using Machine Learning||International||Conference||2019|
|18||Dr. S. R. Tandan||Development of Anti-Phishing Model for||International||Journal||2015|
|19||Dr. S. R. Tandan||Classification of Phishing E-mail||International||Journal||2015|
|20||Dr. S. R. Tandan||Shielding android application against reverse engineering||International||Journal||2013|
|21||Dr. S. R. Tandan||Stock Market Prediction with Various Technical Indicators Using Neural Network Techniques||International||Journal||2015|
|22||Dr. S. R. Tandan||A Method For Mobile Robot To Navigate In Dynamic Environment Using Fuzzy Approach||International||Journal||2016|
|23||Dr. S. R. Tandan||Trapriori Classification Based Algorithm By Fuzzy Techniques To Reduced Time Complexity||International||Journal||2016|
|24||Dr. S. R. Tandan||Neuro-Fuzzy Based Integrated and Optimized Search Engine for Effective and Reliable Information Retrieval System||International||ACM Conference||2016|
|25||Dr. S. R. Tandan||Development of Virtual Infrastructure in Academic Premises for Better Utilization of Computing Resources||International||Journal||2014|
|26||Dr. S. R. Tandan||A Novel Approach for Face Detection and Recognition with Multi Scale Color Restoration Technique Using Combination of Knowledge Based and Feature Segmentation||International||Journal||2014|
|27||Dr. S. R. Tandan||Cloud Resource Optimization Based on E.C.C.with D.H. and Efficient Scheduling Algorithm||International||Journal||2017|
|28||Dr. S. R. Tandan||N-ary Relation Approach for Open Domain Question Answering System Based on Information Extraction through World Wide Web||International||Journal||2015|
|29||Mrs. Amrita Verma||Knowledge of Word Alignment Position Related To Parallel English-Hindi Sentences.||International||Journal||2013|
|30||Mrs. Amrita Verma||Translation of Speech from Speech: A Review.||International||Journal||2016|
|31||Mrs. Amrita Verma||Internet of Things (IoT): A Review.||International||Journal||2016|
|32||Mr.Amit kumar Dewangan||Identification and Classification of Heart Disease with Feature Selection.||International||Journal|
|33||Mr.Amit kumar Dewangan||An Ensemble Model for Identification of Phishing Website.||International||Journal||2017|
|34||Mr.Amit kumar Dewangan||An Intrusion Detection System for Identifying Attacks using Classification Technique.||International||Journal||2017|
|35||Mr.Amit kumar Dewangan||Analysis and Comparison of Models for Classification of Diabetic Disease.||International||Journal||2017|
|36||Mr.Amit kumar Dewangan||Classification of Heart Disease Using Various Classification Techniques.||International||Journal||2017|
|37||Mr.Amit kumar Dewangan||An Ensemble Model for Classification of Retinopathy Diabetic using Data Mining Technique.||International||Journal||2017|
|38||Mr.Amit kumar Dewangan||Classification of Diabetes Mellitus Using Machine Learning Techniques.||International||Journal||2018|
|39||Mr.Amit kumar Dewangan||An Ensemble Model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set.||International||Journal||2016|
|40||Mr.Amit kumar Dewangan||A Rule Based Http Anomaly Classifier.||International||Journal||2014|
|41||Mr.Amit kumar Dewangan||Classification of Thyroid Disease with Feature Selection Technique.||International||Journal||2014|
|42||Mr.Amit kumar Dewangan||Facial expression recognition: A review.||International||Journal||2016|
|43||Mr.Amit kumar Dewangan||Performance evaluation and implementation of facial expression and emotion recognition system using principal component analysis.||International||Journal||2016|
|44||Mr.Amit kumar Dewangan||Classification of thyroid disease : A survey.||International||Journal||2016|
|45||Mr.Amit kumar Dewangan||Classification of Banknote Authentication using Data Mining Techniques.||International||Journal||2016|
|46||Mr.Amit kumar Dewangan||Classification And Compare of Health Care Datasets using Machine Learning.||International||Journal||2019|
|47||Mr.PraveenChouksey||.Impact Of Using Mobile Sink Routing Protocols For Wireless Sensor NetworksAn Enhance Color Visual Cryptography Scheme||International||Journal||2016|
|48||Mr.PraveenChouksey||Development Of Virtual Infrastructure In Academic Premises for Better Utilization of Computing Resources Computing Resources||International||Journal||2016|
|49||Mr. Sunil Sharma||An Enhance LSB Watermark Approach for Robustness and Security in uncompressed AVI Video||International||Journal||2014|
|50||Mr. Sunil Sharma||An Enhanced Video Watermarking Approach for Robustness And Security Using Pixel And Transform Domain in An Uncompressed Video||International||Journal||2014|
|51||Mr. Sunil Sharma||A New Approach for Congestion Control for TCP/AQM System in Wireless Network Environment||International||Journal||2015|
|52||Mr. Sunil Sharma||Robust PID Controllers for Time Delay Systems in Wireless Network Environment||International||Journal||2015|
|53||Mr. Sunil Sharma||A Novel Video Watermarking Method for Reliability and Security in an Avi Video Using Least Significant Bit||International||Journal||2017|
|54||Mr. Sunil Sharma||A Survey on Video Watermarking Method for Reliability and Security in Video Using Least Significant Bit||International||Journal||2016|
|55||Mr. Sunil Sharma||A Survey paper on face detection and recognition with Genetic Algorithm||International||Journal||2016|
|56||Mr. Sunil Sharma||Face Detection and Recognition through Skin and Color Based Approach Using Genetic Algorithm||International||Journal||2016|
|57||Mr. Sunil Sharma||A Video Watermarking Approach Using 2-Level Wavelet Transforms Technique and Secure from Removal Attacks||International||Journal||2016|
|58||Mr.Vivek Shukla||A Rule Based Approach for Detecting Phishing Attacks||International||Journal||2014|
|59||Mr.Vivek Shukla||Improving Quality of Satellite Images Using Enhancement Filters and Fuzzy Based Contrast Enhancement Technique||International||Journal||2015|
|60||Mr.VivekShukla||Survey on Techniques for Enhancing the Quality of Satellite Images||International||Journal||2016|
|61||Mr.VivekShukla||Evaluating Scheduling Algorithm In Grid Computing||International||Journal||2017|
|62||Mr.VivekShukla||Google Colab Based Analysis of Web Links using Python Library||International||Journal||2018|
|63||Mrs.YuktiKesharwani||Spam mail filtering through data mining approach-A comparative performance analysis||International||Journal|
|64||Mrs.YuktiKesharwani||Comparative study on E-mail spam classifier using feature selection techniques||International||Journal||2015|
|65||Mrs.YuktiKesharwani||An efficient classifier using multilayer perceptron for classification of liver patient||International||Journal||2016|
|66||Mrs.YuktiKesharwani||Node Placement Methodology for wireless Sensor Networks :A Survey||International||Journal|
|67||Mrs.YuktiKesharwani||Enhanced Data mining Technique for Intrusion Detection using Data mining tool||International||Journal||2018|
|68||Mrs.YuktiKesharwani||Validating Human Behaviour Profile By Fuzzy Control Logic||International||Journal||2018|
|69||Mrs.YuktiKesharwani||Spam mail filtering through data mining approach-A comparative performance analysis||International||Journal|
|70||MS. ShaguftaFarzana||Prediction of Stock Market Using Financial News Analysis and Supervised Data Mining Technique||International||Journal||2018|
|71||MS. ShaguftaFarzana||Intrusion Detection Using Decision Tree Based Data Mining Technique||International||Journal||2016|
|72||MS. ShaguftaFarzana||Enhanced Academic Performance Evaluation Technique Using Fuzzy System||International||Journal||2016|
|73||MS. ShaguftaFarzana||Prediction of Stock Market Price Using Classification Rules and Graph Based Analysis||International||Journal||2013|
|74||MS. ShaguftaFarzana||Using text mining and rule based techniques for prediction of stock market price||International||Journal||2014|
|75||Ms.ShubhangiPathak||A cryptographic approach for security and protection of image using basic color space||International||Journal||2017|
|S.NO||NAME||TITLE||NATIONAL/ INTERNATIONAL||CONFERENCE/ JOURNAL||YEAR|
|1||Shivanee Pandey||Diagnosis And Classification Of Hypothyroid Disease Using Data Mining Techniques||International||Journal||2011|
|2||Niharika Vaishnav||A Bird’s Eye View of Anti-Phishing Techniques for Classification of Phishing E-Mails||International||Journal||2015|
|3||Richa Handa||Stock Market Prediction with Various Technical Indicators Using Neural Network Techniques||International||Journal||2015|
|4||Sudipta Ghosh||Shielding Android Application Against Reverse Engineering||International||Journal||2013|
|5||Roma Yadav||Web content mining applications and methods-a survey||International||Journal||2015|
|6||Sudipta Ghosh||Securing Android Application with Anti-Reversing Techniques||International||Journal||2015|
|7||Roma Yadav||N-ary Relation Approach for Open Domain Question Answering System Based on Information Extraction through World Wide Web||International||Journal||2015|
|8||Poonam Gupta||Decision Tree Applied For Detecting Intrusion||International||Journal||2013|
|9||Ashima Sahu||Attention Analysis of Candidates for Creating Virtual Interactive E- Classroom||International||Journal||2013|
|10||Khushboo Sharma||AN Optimized Parallel Confidence Measures Algorithm on Web Log Data||International||Journal||2013|
|11||Shikha Gupta||Modeling of Election Algorithm for Coordinator Selection Using Neuro Fuzzy Approach in Distributed Computing Environment||International||Journal||2013|
|12||Asha Miri||Pseudo Code to Eliminate Unwanted Data Sets for Fuzzy Mining Association Rule||International||Journal||2015|
|13||Gaurav Rai||Enhanced Security Technique in WAP & WEP Based Wireless (Wi-Fi) Network for the Protection against Unauthorized Users||International||Journal||2013|
|14||Glori Gunjan Bagh||Current Approaches and Challenges for Skin Cancer Detection||International||Journal||2013|
|15||Pushpa Sharma||Fraud Detection And Integrity Of Database Without Using Pl-SQL Logic||International||Journal||2013|
|16||Shubhangi Gupta||Modeling Of Election Algorithm For Coordinator Selection Using NeuroFuzzy Approach In Distributed Computing Environment||International||Journal||2015|
|17||Gaurav Singhal||IAA (Internet access account) based security modal for detection and prevention of cyber crime||International||Journal||2013|
|18||Abhishek Shukla||A Review on Web-Based Fuzzy Neural Networks for Stock Prediction||International||Journal||2015|
|19||Ashima Sahu||Smart E-Classroom||International||Journal||2013|
|20||Shubhangi Gupta||MVC Model 2 Architecture with AJAX Technology Makes Web More Efficient and More Powerful By Reducing Web Traffic and Man Power Load||International||Journal||2015|
|1||2017-19||Mr. Navneet Jaiswal||Data mining association rule by using R for market prediction||Dr. Rohit miri|
|2||2013-15||Ms. Roma Yadav||N-ary Relation Based Open Domain QAS||Dr.S.R.Tandan|
|3||2014-16||Ms. Niharika Vaishnav||Development of Anti Phishing Model for Classification of Phishing e-Mail||Dr.S.R.Tandan|
|4||2016-18||Ms. Akanksha Sharma||Cloud Computing Framework Based on Elliptical Curve Cryptography and DH Protocol with Scheduling Algorithm||Dr. S.R.Tandan|
|5||2017-19||Ms. Shamsa Kauser Yasini||Google Colab Based Analysis of Web Links using Python Library||Mr. Vivek Shukla|
|6||2015-17||Ms. Pooja Shrivastava||An efficient classifier using multilayer perceptron for classification of liver patient||Mrs Yukti Kesharwani|
|7||2017-19||Mr. Suryakant Pandey||Classification And Compare Of Health Care Datasets Using Machine Learning||Mr. Praveen chouksey|
|8||2017-19||Mr. Sudesh Dhiwar||Development of Robust Model for Classification of Banknote Authentication||Mr. Amit Kumar Dewangan|
|1||Dr.Rohit Miri||Artificial Intelligence and Machine Learning||19-28 April, 2019||RNTU, Bhopal (M.P.)|
|2||Dr. S. R. Tandan||Artificial Intelligence and Machine Learning||19-28 April, 2019||RNTU, Bhopal (M.P.)|
|3||Mr.Amit Kumar Dewangan||Artificial Intelligence and Machine Learning||19-28 April, 2019||RNTU, Bhopal (M.P.)|
|4||Ms. Amrita Verma||Saksham-Teaching with Technology of Microsoft||29-30 Dec 2017.||Dr. C.V. Raman University|
|5||Mr Vivek Shukla||Saksham-Teaching with Technology of Microsoft||29-30 Dec 2017.||Dr. C.V. Raman University|
|6||Mrs Yukti Kesharwani||Saksham-Teaching with Technology of Microsoft||29-30 Dec 2017.||Dr. C.V. Raman University|
|1||Dr.Rohit Miri||A-View||2nd - 5th January, 2012||Amrita University, Kollam, Kerala|
|2||Dr.Rohit Miri||Java EE7 Enterprise Application Development,||27th- 31st January, 2015||O.P Jindal Institute of Technology, Raigarh (C.G.)|
|3||Dr.Rohit Miri||MATLAB||09th -15th Feb, 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|4||Dr.Rohit Miri||Object Oriented Modelling and Designing with UML||15th -20th March, 2011||Dr. C.V. Raman University, Bilaspur|
|5||Dr.Rohit Miri||Java Python Blender||9/2/2018||Dr.C.V. Raman University|
|6||Dr.Rohit Miri||Advanced CPP||6/3/2019||Dr.C.V. Raman University|
|7||Dr.Rohit Miri||PHP and Mysql||17-2-2018||Dr.C.V. Raman University|
|8||Dr. S. R. Tandan||AI and Machine Learning||17th – 21st Dec, 2018||Remote Center IIT Roorkee Venue - AtalBihari Vajpayee University, Bilaspur (C.G)|
|9||Dr. S. R. Tandan||Object Oriented Modelling and Designing with UML||15th -20th March, 2011||Dr. C.V. Raman University, Bilaspur|
|10||Dr. S. R. Tandan||A-View||2nd - 5th January, 2012||Amrita University, Kollam, Kerala|
|11||Dr. S. R. Tandan||Java EE7 Enterprise Application Development,||27th- 31st January, 2015||O.P Jindal Institute of Technology, Raigarh (C.G.)|
|12||Dr. S. R. Tandan||MATLAB||09th -15th Feb, 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|13||Dr. S. R. Tandan||Experiential Faculty Development Programme||15th -16th December, 2015||Dr C V Raman University|
|14||Dr. S. R. Tandan||Java Python Blender||9/2/2018||Dr.C.V. Raman University|
|15||Dr. S. R. Tandan||Advanced CPP||6/3/2019||Dr.C.V. Raman University|
|16||Dr. S. R. Tandan||PHP and Mysql||17-2-2018||Dr.C.V. Raman University|
|17||Dr. S. R. Tandan||PHP ,WordPress & Joomla||2016||Dr C V Raman University|
|18||Dr. S. R. Tandan||Internet of Things||2017||Dr C V Raman University|
|19||Dr. S. R. Tandan||Data Analytics using R||2018||Dr C V Raman University|
|20||Mrs. Amrita Verma||Technology Enhanced Leaning||Feb-13||Dr C V Raman University|
|21||Mrs. Amrita Verma||Ethical Hacking & Cyber Security||19th-20th, September 2013||Dr C V Raman University|
|22||Mrs. Amrita Verma||Web Development Using PHP||21-22 Feb 2014||Dr. C.V. Raman University, Bilaspur|
|23||Mrs. Amrita Verma||Experiential Faculty Development Programme||15th -16th December, 2015||Dr C V Raman University|
|24||Mrs. Amrita Verma||MATLAB||21-27 Feb 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|25||Mrs. Amrita Verma||Big Data Analytics with Hadoop||13th-14th Feb 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|26||Mrs. Amrita Verma||Teaching Learning Evolution||2nd-7th January 2017||Dr. C.V. Raman University, Bilaspur|
|27||Mrs. Amrita Verma||Empowering Academic Skills & Research||8th – 13 th January 2018||Dr. C.V. Raman University, Bilaspur|
|28||Mrs. Amrita Verma||Data Analytics using R||27-28 July 2018.||Dr C V Raman University|
|29||Mrs. Amrita Verma||Experiential Faculty Development Programme||15th -16th December, 2015||Dr C V Raman University|
|30||Mr. Vivek Shukla||Object Oriented Modelling and Designing with UML||15th -20th March, 2011||Dr. C.V. Raman University, Bilaspur|
|31||Mr. Vivek Shukla||MATLAB||09th -15th Feb, 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|32||Mr. Vivek Shukla||Ethical Hacking||19th-20th, September 2013||Dr C V Raman University|
|33||Mr. Vivek Shukla||National Program on Technology Enhanced Learning(NPTEL)||July 29, 2013||Dr C V Raman University|
|34||Mr. Vivek Shukla||PHP ,WordPress & Joomla||2016||Dr C V Raman University|
|35||Mr. Vivek Shukla||Internet of Things||2017||Dr C V Raman University|
|36||Mr. Vivek Shukla||Data Analytics using R||2018||Dr C V Raman University|
|37||Mr. Vivek Shukla||Java Python Blender||9/2/2018||Dr.C.V. Raman University|
|38||Mr. Vivek Shukla||Advanced CPP||6/3/2019||Dr.C.V. Raman University|
|39||Mr. Vivek Shukla||PHP and Mysql||2/17/2018||Dr.C.V. Raman University|
|40||Mrs. YuktiKesharwani||Experiential Faculty Development Programme||15th -16th December, 2015||Dr C V Raman University|
|41||Mrs. Yukti Kesharwani||Object Oriented Modelling and Designing with UML||15th -20th March, 2011||Dr. C.V. Raman University, Bilaspur|
|42||Mrs. Yukti Kesharwani||MATLAB||09th -15th Feb, 2015||Dr. C.V. Raman University, Bilaspur (C.G)|
|1||Dr. Rohit Miri||International Conference on Technological Quality Enhanced E-Learning||2nd – 5th January, 2012||Amrita University, Kollam, Kerala|
|2||Dr. Rohit Miri||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th December 2011||Dr. C.V. Raman University, Kota, Bilaspur,|
|3||Dr. Rohit Miri||Role of Universities in Vocational Education and Skill Development||2011||Dr C V Raman University, Kota Bilaspur CG India|
|4||Dr. Rohit Miri||International Conference on Information and Communication Technology for Competitive Strategies||November, 2014||Udaipur, Rajasthan|
|5||Dr. Rohit Miri||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|6||Dr. S. R. Tandan||Role of Universities in Vocational Education & Skill Development||22nd October, 2011||Scope College of Engineering, Bhopal|
|7||Dr. S. R. Tandan||International Conference on Technological Quality Enhanced E-Learning||2nd – 5th January, 2012||Amrita University, Kollam, Kerala|
|8||Dr. S. R. Tandan||National Level Technical Symposium on Innovations in Science & Technology||March, 2011||All Saint’s College of Technology, Bhopal,|
|9||Dr. S. R. Tandan||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th December 2011||Dr. C.V. Raman University, Kota, Bilaspur,|
|10||Dr. S. R. Tandan||National Conference on Application of Computer in Rural Development||2009||CiT, Rajnandgaon, CG|
|11||Dr. S. R. Tandan||Role of Universities in Vocational Education and Skill Development||2011||Dr C V Raman University, Kota Bilaspur CG India|
|12||Dr. S. R. Tandan||International Conference on Information and Communication Technology for Competitive Strategies||November, 2014||Udaipur, Rajasthan|
|13||Dr. S. R. Tandan||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|14||Ms. Amrita Verma||National Conference on EMERGING TRENDS IN ELECTRONICS & TELECOMMUNICATION ENGG.||27 jan ,2012.||Chouksey engineering college,Bilaspur (C.G.)|
|15||Ms. Amrita Verma||National Conference on LANGUGE TECHNOLOGY REPRESENTING UNDESSTANDING OF MACHINE TRANSLATION||12-13 SEP ,2013.||Chouksey engineering college,Bilaspur (C.G.)|
|16||Ms. Amrita Verma||International Conference on CYBER SECURITY, SMART GRID COMPUTING AND ENVIRONMENTAL PROTECTION TECHNOLOGIES||16th – 17th December 2013||ITM University, Raipur (C.G.)|
|17||Mr. Vivek Shukla||Vadik Ganit.||2010||Dr C V Raman University, Kota Bilaspur CG India.|
|18||Mr. Vivek Shukla||Providing Network Security byUsingCryptographyTechnique||2011||Dr C V Raman University, Kota Bilaspur CG India.|
|19||Mr. Vivek Shukla||Role of Tourism Industry in Economic Development of CG.||2011||CG Raipur|
|20||Mr. Vivek Shukla||Role of Universities in Vocational Education and Skill Development.||2012||Dr C V Raman University, Kota Bilaspur CG India.|
|21||Mr. Vivek Shukla||National Conference on Emerging Technologies and Practices in e-Governance.||2010||CG Raipur.|
|22||Mr. Vivek Shukla||National Conference on Integral Education||2011||Dr C V Raman University, Kota Bilaspur CG India.|
|23||Mrs Yukti Kesharwani||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th December 2011||Dr. C.V. Raman University, Kota, Bilaspur,|
|24||Mrs Yukti Kesharwani||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|25||Mrs Yukti Kesharwani||Carbon Footprint||2009||CSIT College|
|26||Mrs Yukti Kesharwani||Comparative Study on Different Email Spam Specifier||2014||RKDF College Bhopal|
|27||Mrs Yukti Kesharwani||An Anti Spam System using Neural Network||2013||Central College of Engineering & Management|
|28||Mrs Yukti Kesharwani||National Conference on Application of Computer in Rural Development||2009||CiT, Rajnandgaon, CG|
|29||Mrs Yukti Kesharwani|
|30||Mrs Yukti Kesharwani||Spam mail filtering using data mining technique.||2013||Chouksey Engineering College|
|31||Mr Amit Kumar Dewangan||Text Pre-processing and classification usingMachine Learning Technique.||22-23 February 2019||Dr. C. V. Raman University, Kota, Bilaspur|
|32||Mr Amit Kumar Dewangan||Big Data And Market Basket Analysis : A Survey||August 04-05, 2018||Morden Technology and Management Institute(MTMI)|
|33||Mr Amit Kumar Dewangan||Design & Implementation of IDS using Honeypot For detection HTTP Attacks||14-15 Feb 2014||AISECT University , BHOPAL|
|34||Mr Amit Kumar Dewangan||Enriching Quality In Higher Education Paradigm||5-7 August 2019||AUROPATH, Society House, Puduchery|
|35||Mr Amit Kumar Dewangan||Innovation in Science & Technology||2011||All Sain’s College Of Technology|
|36||Mr Sunil Sharma||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th||Dr. C.V. Raman University, Kota, Bilaspur,|
|37||Mr Sunil Sharma||Role of Universities in Vocational Education and Skill Development||2011||Dr C V Raman University, Kota Bilaspur CG India|
|38||Mr Sunil Sharma||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|39||Mr Sunil Sharma||National Conference on Advances in Computer Science and Information Technology||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|40||Mr Praveen Chousey||National Conference on Application of Computer in Rural Development||2009||CiT, Rajnandgaon, CG|
|41||Mr Praveen Chousey||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th||Dr. C.V. Raman University, Kota, Bilaspur,|
|42||Mr Praveen Chousey||Role of Universities in Vocational Education and Skill Development||2011||Dr C V Raman University, Kota Bilaspur CG India|
|43||Mr Praveen Chousey||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|44||Mr Praveen Chousey||National Conference on Advances in Computer Science and Information Technology||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|45||Ms Shagufta Farzana||National Conference on Application of Computer in Rural Development||2009||CiT, Rajnandgaon, CG|
|46||Ms Shagufta Farzana||National Conference on Emerging Technologies and Practices in e-Governance||9th -10th December 2011||Dr. C.V. Raman University, Kota, Bilaspur,|
|47||Ms Shagufta Farzana||Role of Universities in Vocational Education and Skill Development||2011||Dr C V Raman University, Kota Bilaspur CG India|
|48||Ms Shagufta Farzana||National Conference on Emerging Trends In Electronics & Telecommunication Engineering||27 jan ,2012.||Chouksey engineering college,Bilaspur (C.G.)|
|49||Ms Shagufta Farzana||National Conference on Integral Education||28th - 29th January, 2015||Dr C V Raman University|
|50||Ms Shagufta Farzana||National Conference on Advances in Computer Science and Information Technology||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|1||Dr. Rohit Miri||National Seminar on Vedic Mathematics||2009||Dr. C.V. Raman University, Kota, Bilaspur|
|2||Dr. Rohit Miri||National Conference on Advances in Computer Science and Information Technology||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|3||Dr. Rohit Miri||Competition on Ethical Hacking & Cyber Security by IIT Mumbai||2016||Dr. C.V. Raman University, Kota, Bilaspur|
|4||Dr. S. R. Tandan||National Seminar on Green Computing||December, 2008||Birla Institute of Technology, Mesra, Ranchi|
|5||Dr. S. R. Tandan||National Seminar on Vedic Mathematics||2009||Dr. C.V. Raman University, Kota, Bilaspur|
|6||Dr. S. R. Tandan||National Conference on Advances in Computer Science and Information Technology||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|7||Ms. Amrita Verma||Vision 2020 On Advancement In Electronics And Communication Technology With Special Theme On Anao Technology, 2007||2-3 December 2007||Scope College of Engineering, Bhopal|
|8||Ms. Amrita Verma||Vedic Mathematics||25th – 26th February, 2010||Dr. C.V. Raman University, Kota, Bilaspur|
|9||Ms. Amrita Verma||COMMUNICATION SKILL : A GATEWAY TO THE GLOBAL WORLD||3rd February, 2012.||Dr. C.V. Raman University, Kota, Bilaspur|
|10||Mr.Vivek Shukla||National Seminar on Vedic Mathematics.||2009||Dr. C.V. Raman University, Kota, Bilaspur|
|11||Mr.Vivek Shukla||Competition on Ethical Hacking & Cyber Security by IIT Mumbai||2016||Dr. C.V. Raman University, Kota, Bilaspur|
|12||Mr.Vivek Shukla||National Conference on Advances in Computer Science and Information Technology.||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|13||Mrs. Yukti Kesharwani||National Seminar on Vedic Mathematics.||2009||Dr. C.V. Raman University, Kota, Bilaspur|
|14||Mrs. Yukti Kesharwani||Competition on Ethical Hacking & Cyber Security by IIT Mumbai||2016||Dr. C.V. Raman University, Kota, Bilaspur|
|15||Mrs. Yukti Kesharwani||National Conference on Advances in Computer Science and Information Technology.||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|16||Mr. Amit Kumar Dewangan||TPS (Technical Poster Session)||2007||IIT Delhi|
|17||Ms Shagufta Farzana||Classroom Taeching.||2017||Dr. C.V. Raman University, Kota, Bilaspur|
|18||Ms Shagufta Farzana||Teaching Learning Evaluation.||2017||Dr. C.V. Raman University, Kota, Bilaspur|
|19||Ms Shagufta Farzana||National Conference on Advances in Computer Science and Information Technology.||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|20||Ms. Shubhangi Pathak||Experimental Faculty Development Programme.||2018||Dr. C.V. Raman University, Kota, Bilaspur|
|21||Ms. Shubhangi Pathak||National Conference on Advances in Computer Science and Information Technology.||2019||Dr. C.V. Raman University, Kota, Bilaspur|
|S.No.||Name||Name of Award/Achiement||Organization/Venue||Year|
|1||Dr.Rohit Miri||UGC NET||UGC||2013|
|2||Dr.Rohit Miri||CG SET||CG Vyapam||2014|
|3||Dr.Rohit Miri||GATE||IIT, Kharagpur||2006|
|4||Dr. S R Tandan||UGC NET||UGC||2018|
|5||Dr. S R Tandan||CG SET||CG Vyapam||2018|
|6||Dr. S R Tandan||GATE||IIT, Kanpur||2007|
|7||Mr. Amit Dewangan||UGC NET||UGC||2015,2017|
|8||Mr. Amit Dewangan||GATE||IIT, Madras||2011|
|S.No||Name||Membership||Name of Organization|
|1||Dr.Rohit Miri||2378||Computer Society of India|
|2||Dr.Rohit Miri||195403||Internet Society|
|3||Dr.Rohit Miri||20180717002||Science and Engineering Institute|
|4||Dr.Rohit Miri||1523||The Society of Digital Information and Wireless Communications|
|5||Dr.Rohit Miri||AM101000582334||Institute of Research Engineers and Doctors|
|6||Dr. S. R. Tandan||216951||IAENG – International Association of Engineers|
|7||Dr. S. R. Tandan||AM101000582343||Universal Association of Computer and Electronics Engineers Associate|
|8||Dr. S. R. Tandan||21782||The Society of Digital Information and Wireless Communication|
|9||Dr. S. R. Tandan||195506||Internet Society|
|3||Mrs. Amrita Verma||201014||IAENG – International Association of Engineers|
|4||Mrs. Amrita Verma||SMIN61249350||IFERP – Institute For Engineering Research And Publication|
|5||Mr.Amit Kumar Dewangan||1807||Vigyan Bharti|
|10||Mrs.Yukti Kesharwani||197326||Internet Society|
|13||MS. Shagufta Farzana||197328||Internet Society|
CVRU © 2021 Design & Developed By AISECT Web Center All rights reserved.