Notice (8): Undefined variable: circulars [APP\View\Layouts\site.ctp, line 473]Code Context
<?php
foreach ($circulars as $circular) {
$viewFile = 'C:\xampp\htdocs\app\View\Layouts\site.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array(), 'content_for_layout' => '<style> @media only screen and (max-width: 600px) { #paper { magin-left: -75px !important; } } </style> <div class="banner"> <!-- page header section --> <div class="page-title"> <div class="container"> <div class="row"> <div class="col-md-12 ptn-bg"> <h2>Computer Engineering </h2> <ol class="breadcrumb"> <li><a href="/">Home</a></li> <li class="active">Computer Engineering</li> </ol> </div> </div> </div> </div> </div> <!-- Main-container start --> <div class="container things" style="margin:0;width: 100%;" > <div class="col-md-12"> <br/><br/> <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/> <!-- Page Content start --> <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;"> <a href="javascript:window.history.back()"> <button class="btn"> <i class="fa fa-arrow-left"></i> Back </button> </a> </div> <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;"> <div class="col-md-12"> <div class="col-md-3"> <img src="https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg_160.jpg" alt="" /> </div> <div class="col-md-8"> <br/> <br/> <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Prof. & Dean Students Affairs and Alumni<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myModal">Bio-Data</button> <br> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myPublModal">Publications</button> </div> <!-- Modal 1 --> <div class="modal fade" id="myModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal 2 --> <div class="modal fade" id="myPublModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-trace').style.display = (document.getElementById('cakeErr674f42834fcad-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>104</b>]<div id="cakeErr674f42834fcad-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-code').style.display = (document.getElementById('cakeErr674f42834fcad-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-context').style.display = (document.getElementById('cakeErr674f42834fcad-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr674f42834fcad-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">div </span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">> </span></span></code> <code><span style="color: #000000"> <object class="displaypdf" data="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>" type="application/pdf" width="800px" height="500px"> </span></code> <span class="code-highlight"><code><span style="color: #000000"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>">Download PDF</a>.</p> </span></code></span></pre><pre id="cakeErr674f42834fcad-context" class="cake-context" style="display: none;">$viewFile = 'C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array() ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5.&nbsp;System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 104 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::render() - CORE\Cake\View\View.php, line 479 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal content--> <div class="col-md-12" style="margin-top: 20px;"> <ul class="nav nav-pills" style="margin-left: 13px;"> <!--li class="active"><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li--> <li class="active"><a href="#onlineprofile" role="tab" data-toggle="tab">Online Profile</a></li> <li><a href="#specialization" role="tab" data-toggle="tab">Areas of Specialization</a></li> <li><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li> <li><a href="#paper" role="tab" data-toggle="tab">Papers Presented</a></li> <li><a href="#research" role="tab" data-toggle="tab">Research Projects</a></li> </ul> <div class="tab-content" style="margin: 20px 0px 0px 30px;"> <div class="tab-pane row active" id="onlineprofile"> </div> <div class="tab-pane row" id="specialization"> <p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p> </div> <div class="tab-pane row" id="subject"> <h3>UG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Computer Graphics</td> <td>IV</td> </tr> <tr> <td>2</td> <td>Computer Networks</td> <td>V</td> </tr> <tr> <td>3</td> <td>System Programming and Compiler Construction</td> <td>VI</td> </tr> <tr> <td>4</td> <td>Computer Simulation and Modelling </td> <td>VII</td> </tr> <tr> <td>5</td> <td>Cryptography and System Security</td> <td>VII</td> </tr> <tr> <td>6</td> <td>Adhoc Wireless Networks (Elective)</td> <td>VIII</td> </tr> <tr> <td>7</td> <td>Parallel and Distributed Computing </td> <td>VIII</td> </tr> </table> <h3>PG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Advanced Computing and Network Design</td> <td>I</td> </tr> <tr> <td>2</td> <td>Parallel Computing</td> <td>I</td> </tr> <tr> <td>3</td> <td>Object Oriented Analysis and Design</td> <td>I</td> </tr> <tr> <td>4</td> <td>Advanced Database Systems</td> <td>II</td> </tr> </table> </div> <div class="tab-pane row" id="paper" style="margin-left: -65px;"> <table class="table table-striped table-bordered table-condensed"> <thead> <tr> <th>Sr No</th> <th style="text-align:center;">Title</th> <th style="text-align:center;">Description</th> </tr> </thead> <tbody style="font-family: dosis;font-style: normal;"> <tr><td>1</td><td>A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.<a><br/></td></tr><tr><td>2</td><td>Enrich Security in MANET by Avoiding Wormhole Attack<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).<a><br/></td></tr><tr><td>3</td><td>A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> 4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore<a><br/></td></tr><tr><td>4</td><td>Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.<a><br/></td></tr><tr><td>5</td><td>Session Management in Internet Services using Continuous Authentication<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.<a><br/></td></tr><tr><td>6</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.<a><br/></td></tr><tr><td>7</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.<a><br/></td></tr><tr><td>8</td><td>Session Management using Continuous Authentication in Internet Services: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.<a><br/></td></tr><tr><td>9</td><td>Avoidance of Co-operative black hole attack in AODV in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.<a><br/></td></tr><tr><td>10</td><td>Expectation based Aggressor Recognizable proof in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore<a><br/></td></tr><tr><td>11</td><td>Session Passwords Using Three Level Authentication System<br/></td><td> <a href="" target="_blank"> International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29<a><br/></td></tr><tr><td>12</td><td>Supervised Web Forum Crawling<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.<a><br/></td></tr><tr><td>13</td><td>Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore<a><br/></td></tr><tr><td>14</td><td>A Review of Web Forum Crawling Techniques<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 <a><br/></td></tr><tr><td>15</td><td>Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015<a><br/></td></tr><tr><td>16</td><td>Performance Evaluation of Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014<a><br/></td></tr><tr><td>17</td><td>Secure AODV against Control Packet Dropping Attack <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>18</td><td>Tree Based Routing Mechanism for MANET <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>19</td><td>A Survey on Routing Protocols in Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>20</td><td>Web Structure Mining Using Breadth First Search with Page Rank<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>21</td><td>Bigdata Analysis Using Columnar Database<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>22</td><td>Secure Routing against Control Packet Dropping Attack<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.<a><br/></td></tr><tr><td>23</td><td>Feature and Opinion Identification for Online Digital Camera Reviews <br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.<a><br/></td></tr><tr><td>24</td><td>A Genetic Approach for processor Scheduling<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.<a><br/></td></tr><tr><td>25</td><td>Detecting and Avoiding Black Hole Attack in the MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat<a><br/></td></tr><tr><td>26</td><td>Dynamic Quantum based Genetic Round Robin Algorithm<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.<a><br/></td></tr><tr><td>27</td><td>Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.<a><br/></td></tr><tr><td>28</td><td>Clustering in Cloud Computing Environment<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.<a><br/></td></tr><tr><td>29</td><td>FITM: FEROM Informal Text Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.<a><br/></td></tr><tr><td>30</td><td>Personalized Image Search Optimization<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.<a><br/></td></tr><tr><td>31</td><td>Forensic sketch-Photo Matching using LFDA<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.<a><br/></td></tr><tr><td>32</td><td>Hybrid approach for credit card fraud detection<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.<a><br/></td></tr><tr><td>33</td><td>Forensic sketch to Mugshot Photo Matching<br/></td><td> <a href="" target="_blank"> International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.<a><br/></td></tr><tr><td>34</td><td>Change Detection In satellite Images using DWT and PCA<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.<a><br/></td></tr><tr><td>35</td><td>Recognition on Road Vehicle Based on EDA <br/></td><td> <a href="" target="_blank"> International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 <a><br/></td></tr><tr><td>36</td><td>Survey on Estimation of Distribution Algorithm Techniques<br/></td><td> <a href="" target="_blank"> International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013<a><br/></td></tr><tr><td>37</td><td>Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>38</td><td> Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis<br/></td><td> <a href="" target="_blank"> Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>39</td><td>Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay<br/></td><td> <a href="" target="_blank"> International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.<a><br/></td></tr><tr><td>40</td><td>Change Detection in Satellite Images Using PCA and K-means Clustering <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>41</td><td>3D-Deformable Model Based Recognition and Labeling on Road Vehicle <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>42</td><td>Security Enabled DSR for Establishing Symmetric Key and Security in MANETS<br/></td><td> <a href="" target="_blank"> Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore<a><br/></td></tr><tr><td>43</td><td>Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>44</td><td>Cooperative Security Agents for MANET<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>45</td><td>Hybrid Approach for DB Intrusion Detection with Reactive Policies<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore<a><br/></td></tr><tr><td>46</td><td>Privacy Preserving in Data Mining Using Hybrid Approach<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore<a><br/></td></tr><tr><td>47</td><td>A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack<br/></td><td> <a href="" target="_blank"> 4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET<a><br/></td></tr><tr><td>48</td><td>Comparing performance of Collaborative Filtering Algorithms<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>49</td><td>Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>50</td><td>Incremental Frequent Pattern Mining<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012<a><br/></td></tr><tr><td>51</td><td>Detection of phishing email using textual and lexical URL analysis <br/></td><td> <a href="" target="_blank"> International Conference on Computer Science and Information Technology, pp.105-110, July 2012.<a><br/></td></tr><tr><td>52</td><td>Review of Incremental Association Rule Mining Algorithms<br/></td><td> <a href="" target="_blank"> IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.<a><br/></td></tr><tr><td>53</td><td>Association Rule Mining Using Graph and Clustering Technique<br/></td><td> <a href="" target="_blank"> Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012<a><br/></td></tr><tr><td>54</td><td>Security in MANETs using Symmetric Keys – A New Approach<br/></td><td> <a href="" target="_blank"> International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012<a><br/></td></tr><tr><td>55</td><td>Security in MANETs using Symmetric Keys – A New Approach <br/></td><td> <a href="" target="_blank"> International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, <a><br/></td></tr><tr><td>56</td><td>Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.<a><br/></td></tr><tr><td>57</td><td>Hybrid Reactive Database Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>58</td><td>Need base Security with IDRS for Cloud Computing<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>59</td><td>Data Integrity and Confidentiality in Outsourced Database<br/></td><td> <a href="" target="_blank"> ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012<a><br/></td></tr><tr><td>60</td><td>Integrity and Confidentiality of character query in Outsourced Database<br/></td><td> <a href="" target="_blank"> National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India<a><br/></td></tr><tr><td>61</td><td>Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> 5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.<a><br/></td></tr><tr><td>62</td><td>A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack<br/></td><td> <a href="" target="_blank"> World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.<a><br/></td></tr><tr><td>63</td><td>User Trust Based Collaborative Filtering Algorithm for Recommendation System<br/></td><td> <a href="" target="_blank"> International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.<a><br/></td></tr><tr><td>64</td><td>Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>65</td><td>A Flooding Based Distributed Denial of Service Attack Defense Mechanism<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>66</td><td>Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>67</td><td>Multilevel Multidimensional Trust Model for Group based Applications<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>68</td><td>Identification of New Approach for Runtime Enforcement of Web Service Security<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.<a><br/></td></tr><tr><td>69</td><td>Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. <a><br/></td></tr><tr><td>70</td><td>Dynamic enforcement of web service security<br/></td><td> <a href="" target="_blank"> National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.<a><br/></td></tr><tr><td>71</td><td>Detecting Malicious Dropping Attack in the Internet<br/></td><td> <a href="" target="_blank"> International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011<a><br/></td></tr><tr><td>72</td><td>An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.<a><br/></td></tr><tr><td>73</td><td>Malicious Dropping Attack in the Internet: Impacts and Solution<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.<a><br/></td></tr><tr><td>74</td><td>Multiple Route Selector BGP (MRS-BGP)<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.<a><br/></td></tr><tr><td>75</td><td>Multipath Routing in the Internet<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.<a><br/></td></tr><tr><td>76</td><td>Performance Improvement of Selective Unidirectional Links in Cluster Based Routing<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.<a><br/></td></tr><tr><td>77</td><td>Proactive Approach for Dynamic Source Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.<a><br/></td></tr><tr><td>78</td><td>Comparative Study of CSS and YASS Stemming Algorithms<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>79</td><td>Hybrid Approach for Optimal Design of Distributed Database System<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>80</td><td>Different Approaches to Classify Threaten E-Mails<br/></td><td> <a href="" target="_blank"> National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009<a><br/></td></tr><tr><td>81</td><td>Enhanced Cluster based Routing with Unilinks<br/></td><td> <a href="" target="_blank"> National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. <a><br/></td></tr><tr><td>82</td><td>Performance Improvement in CBR using Selective Unidirectional Link<br/></td><td> <a href="" target="_blank"> International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India <a><br/></td></tr><tr><td>83</td><td>User Agent Based Heterogeneous Distributed Database System<br/></td><td> <a href="" target="_blank"> International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008<a><br/></td></tr><tr><td>84</td><td>Comparative Study of Secure Internet Routing Protocols<br/></td><td> <a href="" target="_blank"> National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai<a><br/></td></tr><tr><td>85</td><td>Enhanced BGP Routing for Network Engineering<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>86</td><td>An Enhanced Fault-Tolerant Routing Protocol in the Internet<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>87</td><td>Multi-Agents in Knowledge Management Systems<br/></td><td> <a href="" target="_blank"> International Conference on Advances in Computing, February 21-22, 2008, Chikhli, <a><br/></td></tr><tr><td>88</td><td>Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs<br/></td><td> <a href="" target="_blank"> SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online <a><br/></td></tr><tr><td>89</td><td>KONCERN - Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. <a><br/></td></tr><tr><td>90</td><td>Security Issues in an Adhoc Networks<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>91</td><td>KONCERN-Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>92</td><td>Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. <a><br/></td></tr><tr><td>93</td><td>BIOMETRICS – IRIS RECOGNITION<br/></td><td> <a href="" target="_blank"> National Conference, SFIT, 4-6 Jan-2007, Mumbai.<a><br/></td></tr> </tbody> </table> </div> <div class="tab-pane row" id="research"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr No</th> <th>Name of Research Project</th> <th>Type of Grant</th> <th>Name of funding Organization</th> <th>Amount (Rs.)</th> <th>Duration</th> </tr> <tr> <td>1</td> <td>M-Vision</td> <td>Minor </td> <td>University of Mumbai</td> <td>Rs. 35000/-</td> <td>2018-19</td> </tr> </table> </div> <!-- Added on 28OCT23 ~rbk --> </div> </div> </div> </div> </div> </div> ', 'scripts_for_layout' => '', 'title_for_layout' => 'Faculties' ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $content_for_layout = '<style> @media only screen and (max-width: 600px) { #paper { magin-left: -75px !important; } } </style> <div class="banner"> <!-- page header section --> <div class="page-title"> <div class="container"> <div class="row"> <div class="col-md-12 ptn-bg"> <h2>Computer Engineering </h2> <ol class="breadcrumb"> <li><a href="/">Home</a></li> <li class="active">Computer Engineering</li> </ol> </div> </div> </div> </div> </div> <!-- Main-container start --> <div class="container things" style="margin:0;width: 100%;" > <div class="col-md-12"> <br/><br/> <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/> <!-- Page Content start --> <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;"> <a href="javascript:window.history.back()"> <button class="btn"> <i class="fa fa-arrow-left"></i> Back </button> </a> </div> <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;"> <div class="col-md-12"> <div class="col-md-3"> <img src="https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg_160.jpg" alt="" /> </div> <div class="col-md-8"> <br/> <br/> <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Prof. & Dean Students Affairs and Alumni<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myModal">Bio-Data</button> <br> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myPublModal">Publications</button> </div> <!-- Modal 1 --> <div class="modal fade" id="myModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal 2 --> <div class="modal fade" id="myPublModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-trace').style.display = (document.getElementById('cakeErr674f42834fcad-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>104</b>]<div id="cakeErr674f42834fcad-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-code').style.display = (document.getElementById('cakeErr674f42834fcad-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-context').style.display = (document.getElementById('cakeErr674f42834fcad-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr674f42834fcad-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">div </span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">> </span></span></code> <code><span style="color: #000000"> <object class="displaypdf" data="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>" type="application/pdf" width="800px" height="500px"> </span></code> <span class="code-highlight"><code><span style="color: #000000"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>">Download PDF</a>.</p> </span></code></span></pre><pre id="cakeErr674f42834fcad-context" class="cake-context" style="display: none;">$viewFile = 'C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array() ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5.&nbsp;System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 104 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::render() - CORE\Cake\View\View.php, line 479 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal content--> <div class="col-md-12" style="margin-top: 20px;"> <ul class="nav nav-pills" style="margin-left: 13px;"> <!--li class="active"><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li--> <li class="active"><a href="#onlineprofile" role="tab" data-toggle="tab">Online Profile</a></li> <li><a href="#specialization" role="tab" data-toggle="tab">Areas of Specialization</a></li> <li><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li> <li><a href="#paper" role="tab" data-toggle="tab">Papers Presented</a></li> <li><a href="#research" role="tab" data-toggle="tab">Research Projects</a></li> </ul> <div class="tab-content" style="margin: 20px 0px 0px 30px;"> <div class="tab-pane row active" id="onlineprofile"> </div> <div class="tab-pane row" id="specialization"> <p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p> </div> <div class="tab-pane row" id="subject"> <h3>UG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Computer Graphics</td> <td>IV</td> </tr> <tr> <td>2</td> <td>Computer Networks</td> <td>V</td> </tr> <tr> <td>3</td> <td>System Programming and Compiler Construction</td> <td>VI</td> </tr> <tr> <td>4</td> <td>Computer Simulation and Modelling </td> <td>VII</td> </tr> <tr> <td>5</td> <td>Cryptography and System Security</td> <td>VII</td> </tr> <tr> <td>6</td> <td>Adhoc Wireless Networks (Elective)</td> <td>VIII</td> </tr> <tr> <td>7</td> <td>Parallel and Distributed Computing </td> <td>VIII</td> </tr> </table> <h3>PG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Advanced Computing and Network Design</td> <td>I</td> </tr> <tr> <td>2</td> <td>Parallel Computing</td> <td>I</td> </tr> <tr> <td>3</td> <td>Object Oriented Analysis and Design</td> <td>I</td> </tr> <tr> <td>4</td> <td>Advanced Database Systems</td> <td>II</td> </tr> </table> </div> <div class="tab-pane row" id="paper" style="margin-left: -65px;"> <table class="table table-striped table-bordered table-condensed"> <thead> <tr> <th>Sr No</th> <th style="text-align:center;">Title</th> <th style="text-align:center;">Description</th> </tr> </thead> <tbody style="font-family: dosis;font-style: normal;"> <tr><td>1</td><td>A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.<a><br/></td></tr><tr><td>2</td><td>Enrich Security in MANET by Avoiding Wormhole Attack<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).<a><br/></td></tr><tr><td>3</td><td>A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> 4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore<a><br/></td></tr><tr><td>4</td><td>Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.<a><br/></td></tr><tr><td>5</td><td>Session Management in Internet Services using Continuous Authentication<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.<a><br/></td></tr><tr><td>6</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.<a><br/></td></tr><tr><td>7</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.<a><br/></td></tr><tr><td>8</td><td>Session Management using Continuous Authentication in Internet Services: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.<a><br/></td></tr><tr><td>9</td><td>Avoidance of Co-operative black hole attack in AODV in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.<a><br/></td></tr><tr><td>10</td><td>Expectation based Aggressor Recognizable proof in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore<a><br/></td></tr><tr><td>11</td><td>Session Passwords Using Three Level Authentication System<br/></td><td> <a href="" target="_blank"> International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29<a><br/></td></tr><tr><td>12</td><td>Supervised Web Forum Crawling<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.<a><br/></td></tr><tr><td>13</td><td>Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore<a><br/></td></tr><tr><td>14</td><td>A Review of Web Forum Crawling Techniques<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 <a><br/></td></tr><tr><td>15</td><td>Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015<a><br/></td></tr><tr><td>16</td><td>Performance Evaluation of Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014<a><br/></td></tr><tr><td>17</td><td>Secure AODV against Control Packet Dropping Attack <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>18</td><td>Tree Based Routing Mechanism for MANET <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>19</td><td>A Survey on Routing Protocols in Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>20</td><td>Web Structure Mining Using Breadth First Search with Page Rank<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>21</td><td>Bigdata Analysis Using Columnar Database<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>22</td><td>Secure Routing against Control Packet Dropping Attack<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.<a><br/></td></tr><tr><td>23</td><td>Feature and Opinion Identification for Online Digital Camera Reviews <br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.<a><br/></td></tr><tr><td>24</td><td>A Genetic Approach for processor Scheduling<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.<a><br/></td></tr><tr><td>25</td><td>Detecting and Avoiding Black Hole Attack in the MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat<a><br/></td></tr><tr><td>26</td><td>Dynamic Quantum based Genetic Round Robin Algorithm<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.<a><br/></td></tr><tr><td>27</td><td>Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.<a><br/></td></tr><tr><td>28</td><td>Clustering in Cloud Computing Environment<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.<a><br/></td></tr><tr><td>29</td><td>FITM: FEROM Informal Text Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.<a><br/></td></tr><tr><td>30</td><td>Personalized Image Search Optimization<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.<a><br/></td></tr><tr><td>31</td><td>Forensic sketch-Photo Matching using LFDA<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.<a><br/></td></tr><tr><td>32</td><td>Hybrid approach for credit card fraud detection<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.<a><br/></td></tr><tr><td>33</td><td>Forensic sketch to Mugshot Photo Matching<br/></td><td> <a href="" target="_blank"> International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.<a><br/></td></tr><tr><td>34</td><td>Change Detection In satellite Images using DWT and PCA<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.<a><br/></td></tr><tr><td>35</td><td>Recognition on Road Vehicle Based on EDA <br/></td><td> <a href="" target="_blank"> International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 <a><br/></td></tr><tr><td>36</td><td>Survey on Estimation of Distribution Algorithm Techniques<br/></td><td> <a href="" target="_blank"> International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013<a><br/></td></tr><tr><td>37</td><td>Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>38</td><td> Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis<br/></td><td> <a href="" target="_blank"> Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>39</td><td>Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay<br/></td><td> <a href="" target="_blank"> International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.<a><br/></td></tr><tr><td>40</td><td>Change Detection in Satellite Images Using PCA and K-means Clustering <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>41</td><td>3D-Deformable Model Based Recognition and Labeling on Road Vehicle <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>42</td><td>Security Enabled DSR for Establishing Symmetric Key and Security in MANETS<br/></td><td> <a href="" target="_blank"> Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore<a><br/></td></tr><tr><td>43</td><td>Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>44</td><td>Cooperative Security Agents for MANET<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>45</td><td>Hybrid Approach for DB Intrusion Detection with Reactive Policies<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore<a><br/></td></tr><tr><td>46</td><td>Privacy Preserving in Data Mining Using Hybrid Approach<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore<a><br/></td></tr><tr><td>47</td><td>A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack<br/></td><td> <a href="" target="_blank"> 4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET<a><br/></td></tr><tr><td>48</td><td>Comparing performance of Collaborative Filtering Algorithms<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>49</td><td>Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>50</td><td>Incremental Frequent Pattern Mining<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012<a><br/></td></tr><tr><td>51</td><td>Detection of phishing email using textual and lexical URL analysis <br/></td><td> <a href="" target="_blank"> International Conference on Computer Science and Information Technology, pp.105-110, July 2012.<a><br/></td></tr><tr><td>52</td><td>Review of Incremental Association Rule Mining Algorithms<br/></td><td> <a href="" target="_blank"> IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.<a><br/></td></tr><tr><td>53</td><td>Association Rule Mining Using Graph and Clustering Technique<br/></td><td> <a href="" target="_blank"> Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012<a><br/></td></tr><tr><td>54</td><td>Security in MANETs using Symmetric Keys – A New Approach<br/></td><td> <a href="" target="_blank"> International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012<a><br/></td></tr><tr><td>55</td><td>Security in MANETs using Symmetric Keys – A New Approach <br/></td><td> <a href="" target="_blank"> International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, <a><br/></td></tr><tr><td>56</td><td>Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.<a><br/></td></tr><tr><td>57</td><td>Hybrid Reactive Database Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>58</td><td>Need base Security with IDRS for Cloud Computing<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>59</td><td>Data Integrity and Confidentiality in Outsourced Database<br/></td><td> <a href="" target="_blank"> ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012<a><br/></td></tr><tr><td>60</td><td>Integrity and Confidentiality of character query in Outsourced Database<br/></td><td> <a href="" target="_blank"> National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India<a><br/></td></tr><tr><td>61</td><td>Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> 5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.<a><br/></td></tr><tr><td>62</td><td>A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack<br/></td><td> <a href="" target="_blank"> World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.<a><br/></td></tr><tr><td>63</td><td>User Trust Based Collaborative Filtering Algorithm for Recommendation System<br/></td><td> <a href="" target="_blank"> International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.<a><br/></td></tr><tr><td>64</td><td>Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>65</td><td>A Flooding Based Distributed Denial of Service Attack Defense Mechanism<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>66</td><td>Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>67</td><td>Multilevel Multidimensional Trust Model for Group based Applications<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>68</td><td>Identification of New Approach for Runtime Enforcement of Web Service Security<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.<a><br/></td></tr><tr><td>69</td><td>Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. <a><br/></td></tr><tr><td>70</td><td>Dynamic enforcement of web service security<br/></td><td> <a href="" target="_blank"> National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.<a><br/></td></tr><tr><td>71</td><td>Detecting Malicious Dropping Attack in the Internet<br/></td><td> <a href="" target="_blank"> International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011<a><br/></td></tr><tr><td>72</td><td>An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.<a><br/></td></tr><tr><td>73</td><td>Malicious Dropping Attack in the Internet: Impacts and Solution<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.<a><br/></td></tr><tr><td>74</td><td>Multiple Route Selector BGP (MRS-BGP)<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.<a><br/></td></tr><tr><td>75</td><td>Multipath Routing in the Internet<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.<a><br/></td></tr><tr><td>76</td><td>Performance Improvement of Selective Unidirectional Links in Cluster Based Routing<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.<a><br/></td></tr><tr><td>77</td><td>Proactive Approach for Dynamic Source Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.<a><br/></td></tr><tr><td>78</td><td>Comparative Study of CSS and YASS Stemming Algorithms<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>79</td><td>Hybrid Approach for Optimal Design of Distributed Database System<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>80</td><td>Different Approaches to Classify Threaten E-Mails<br/></td><td> <a href="" target="_blank"> National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009<a><br/></td></tr><tr><td>81</td><td>Enhanced Cluster based Routing with Unilinks<br/></td><td> <a href="" target="_blank"> National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. <a><br/></td></tr><tr><td>82</td><td>Performance Improvement in CBR using Selective Unidirectional Link<br/></td><td> <a href="" target="_blank"> International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India <a><br/></td></tr><tr><td>83</td><td>User Agent Based Heterogeneous Distributed Database System<br/></td><td> <a href="" target="_blank"> International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008<a><br/></td></tr><tr><td>84</td><td>Comparative Study of Secure Internet Routing Protocols<br/></td><td> <a href="" target="_blank"> National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai<a><br/></td></tr><tr><td>85</td><td>Enhanced BGP Routing for Network Engineering<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>86</td><td>An Enhanced Fault-Tolerant Routing Protocol in the Internet<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>87</td><td>Multi-Agents in Knowledge Management Systems<br/></td><td> <a href="" target="_blank"> International Conference on Advances in Computing, February 21-22, 2008, Chikhli, <a><br/></td></tr><tr><td>88</td><td>Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs<br/></td><td> <a href="" target="_blank"> SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online <a><br/></td></tr><tr><td>89</td><td>KONCERN - Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. <a><br/></td></tr><tr><td>90</td><td>Security Issues in an Adhoc Networks<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>91</td><td>KONCERN-Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>92</td><td>Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. <a><br/></td></tr><tr><td>93</td><td>BIOMETRICS – IRIS RECOGNITION<br/></td><td> <a href="" target="_blank"> National Conference, SFIT, 4-6 Jan-2007, Mumbai.<a><br/></td></tr> </tbody> </table> </div> <div class="tab-pane row" id="research"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr No</th> <th>Name of Research Project</th> <th>Type of Grant</th> <th>Name of funding Organization</th> <th>Amount (Rs.)</th> <th>Duration</th> </tr> <tr> <td>1</td> <td>M-Vision</td> <td>Minor </td> <td>University of Mumbai</td> <td>Rs. 35000/-</td> <td>2018-19</td> </tr> </table> </div> <!-- Added on 28OCT23 ~rbk --> </div> </div> </div> </div> </div> </div> ' $scripts_for_layout = '' $title_for_layout = 'Faculties'include - APP\View\Layouts\site.ctp, line 473 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::renderLayout() - CORE\Cake\View\View.php, line 543 View::render() - CORE\Cake\View\View.php, line 487 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105
Warning (2): Invalid argument supplied for foreach() [APP\View\Layouts\site.ctp, line 473]Code Context
<?php
foreach ($circulars as $circular) {
$viewFile = 'C:\xampp\htdocs\app\View\Layouts\site.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array(), 'content_for_layout' => '<style> @media only screen and (max-width: 600px) { #paper { magin-left: -75px !important; } } </style> <div class="banner"> <!-- page header section --> <div class="page-title"> <div class="container"> <div class="row"> <div class="col-md-12 ptn-bg"> <h2>Computer Engineering </h2> <ol class="breadcrumb"> <li><a href="/">Home</a></li> <li class="active">Computer Engineering</li> </ol> </div> </div> </div> </div> </div> <!-- Main-container start --> <div class="container things" style="margin:0;width: 100%;" > <div class="col-md-12"> <br/><br/> <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/> <!-- Page Content start --> <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;"> <a href="javascript:window.history.back()"> <button class="btn"> <i class="fa fa-arrow-left"></i> Back </button> </a> </div> <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;"> <div class="col-md-12"> <div class="col-md-3"> <img src="https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg_160.jpg" alt="" /> </div> <div class="col-md-8"> <br/> <br/> <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Prof. & Dean Students Affairs and Alumni<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myModal">Bio-Data</button> <br> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myPublModal">Publications</button> </div> <!-- Modal 1 --> <div class="modal fade" id="myModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal 2 --> <div class="modal fade" id="myPublModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-trace').style.display = (document.getElementById('cakeErr674f42834fcad-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>104</b>]<div id="cakeErr674f42834fcad-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-code').style.display = (document.getElementById('cakeErr674f42834fcad-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-context').style.display = (document.getElementById('cakeErr674f42834fcad-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr674f42834fcad-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">div </span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">> </span></span></code> <code><span style="color: #000000"> <object class="displaypdf" data="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>" type="application/pdf" width="800px" height="500px"> </span></code> <span class="code-highlight"><code><span style="color: #000000"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>">Download PDF</a>.</p> </span></code></span></pre><pre id="cakeErr674f42834fcad-context" class="cake-context" style="display: none;">$viewFile = 'C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array() ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5.&nbsp;System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 104 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::render() - CORE\Cake\View\View.php, line 479 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal content--> <div class="col-md-12" style="margin-top: 20px;"> <ul class="nav nav-pills" style="margin-left: 13px;"> <!--li class="active"><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li--> <li class="active"><a href="#onlineprofile" role="tab" data-toggle="tab">Online Profile</a></li> <li><a href="#specialization" role="tab" data-toggle="tab">Areas of Specialization</a></li> <li><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li> <li><a href="#paper" role="tab" data-toggle="tab">Papers Presented</a></li> <li><a href="#research" role="tab" data-toggle="tab">Research Projects</a></li> </ul> <div class="tab-content" style="margin: 20px 0px 0px 30px;"> <div class="tab-pane row active" id="onlineprofile"> </div> <div class="tab-pane row" id="specialization"> <p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p> </div> <div class="tab-pane row" id="subject"> <h3>UG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Computer Graphics</td> <td>IV</td> </tr> <tr> <td>2</td> <td>Computer Networks</td> <td>V</td> </tr> <tr> <td>3</td> <td>System Programming and Compiler Construction</td> <td>VI</td> </tr> <tr> <td>4</td> <td>Computer Simulation and Modelling </td> <td>VII</td> </tr> <tr> <td>5</td> <td>Cryptography and System Security</td> <td>VII</td> </tr> <tr> <td>6</td> <td>Adhoc Wireless Networks (Elective)</td> <td>VIII</td> </tr> <tr> <td>7</td> <td>Parallel and Distributed Computing </td> <td>VIII</td> </tr> </table> <h3>PG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Advanced Computing and Network Design</td> <td>I</td> </tr> <tr> <td>2</td> <td>Parallel Computing</td> <td>I</td> </tr> <tr> <td>3</td> <td>Object Oriented Analysis and Design</td> <td>I</td> </tr> <tr> <td>4</td> <td>Advanced Database Systems</td> <td>II</td> </tr> </table> </div> <div class="tab-pane row" id="paper" style="margin-left: -65px;"> <table class="table table-striped table-bordered table-condensed"> <thead> <tr> <th>Sr No</th> <th style="text-align:center;">Title</th> <th style="text-align:center;">Description</th> </tr> </thead> <tbody style="font-family: dosis;font-style: normal;"> <tr><td>1</td><td>A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.<a><br/></td></tr><tr><td>2</td><td>Enrich Security in MANET by Avoiding Wormhole Attack<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).<a><br/></td></tr><tr><td>3</td><td>A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> 4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore<a><br/></td></tr><tr><td>4</td><td>Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.<a><br/></td></tr><tr><td>5</td><td>Session Management in Internet Services using Continuous Authentication<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.<a><br/></td></tr><tr><td>6</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.<a><br/></td></tr><tr><td>7</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.<a><br/></td></tr><tr><td>8</td><td>Session Management using Continuous Authentication in Internet Services: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.<a><br/></td></tr><tr><td>9</td><td>Avoidance of Co-operative black hole attack in AODV in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.<a><br/></td></tr><tr><td>10</td><td>Expectation based Aggressor Recognizable proof in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore<a><br/></td></tr><tr><td>11</td><td>Session Passwords Using Three Level Authentication System<br/></td><td> <a href="" target="_blank"> International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29<a><br/></td></tr><tr><td>12</td><td>Supervised Web Forum Crawling<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.<a><br/></td></tr><tr><td>13</td><td>Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore<a><br/></td></tr><tr><td>14</td><td>A Review of Web Forum Crawling Techniques<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 <a><br/></td></tr><tr><td>15</td><td>Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015<a><br/></td></tr><tr><td>16</td><td>Performance Evaluation of Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014<a><br/></td></tr><tr><td>17</td><td>Secure AODV against Control Packet Dropping Attack <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>18</td><td>Tree Based Routing Mechanism for MANET <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>19</td><td>A Survey on Routing Protocols in Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>20</td><td>Web Structure Mining Using Breadth First Search with Page Rank<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>21</td><td>Bigdata Analysis Using Columnar Database<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>22</td><td>Secure Routing against Control Packet Dropping Attack<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.<a><br/></td></tr><tr><td>23</td><td>Feature and Opinion Identification for Online Digital Camera Reviews <br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.<a><br/></td></tr><tr><td>24</td><td>A Genetic Approach for processor Scheduling<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.<a><br/></td></tr><tr><td>25</td><td>Detecting and Avoiding Black Hole Attack in the MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat<a><br/></td></tr><tr><td>26</td><td>Dynamic Quantum based Genetic Round Robin Algorithm<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.<a><br/></td></tr><tr><td>27</td><td>Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.<a><br/></td></tr><tr><td>28</td><td>Clustering in Cloud Computing Environment<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.<a><br/></td></tr><tr><td>29</td><td>FITM: FEROM Informal Text Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.<a><br/></td></tr><tr><td>30</td><td>Personalized Image Search Optimization<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.<a><br/></td></tr><tr><td>31</td><td>Forensic sketch-Photo Matching using LFDA<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.<a><br/></td></tr><tr><td>32</td><td>Hybrid approach for credit card fraud detection<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.<a><br/></td></tr><tr><td>33</td><td>Forensic sketch to Mugshot Photo Matching<br/></td><td> <a href="" target="_blank"> International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.<a><br/></td></tr><tr><td>34</td><td>Change Detection In satellite Images using DWT and PCA<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.<a><br/></td></tr><tr><td>35</td><td>Recognition on Road Vehicle Based on EDA <br/></td><td> <a href="" target="_blank"> International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 <a><br/></td></tr><tr><td>36</td><td>Survey on Estimation of Distribution Algorithm Techniques<br/></td><td> <a href="" target="_blank"> International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013<a><br/></td></tr><tr><td>37</td><td>Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>38</td><td> Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis<br/></td><td> <a href="" target="_blank"> Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>39</td><td>Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay<br/></td><td> <a href="" target="_blank"> International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.<a><br/></td></tr><tr><td>40</td><td>Change Detection in Satellite Images Using PCA and K-means Clustering <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>41</td><td>3D-Deformable Model Based Recognition and Labeling on Road Vehicle <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>42</td><td>Security Enabled DSR for Establishing Symmetric Key and Security in MANETS<br/></td><td> <a href="" target="_blank"> Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore<a><br/></td></tr><tr><td>43</td><td>Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>44</td><td>Cooperative Security Agents for MANET<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>45</td><td>Hybrid Approach for DB Intrusion Detection with Reactive Policies<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore<a><br/></td></tr><tr><td>46</td><td>Privacy Preserving in Data Mining Using Hybrid Approach<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore<a><br/></td></tr><tr><td>47</td><td>A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack<br/></td><td> <a href="" target="_blank"> 4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET<a><br/></td></tr><tr><td>48</td><td>Comparing performance of Collaborative Filtering Algorithms<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>49</td><td>Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>50</td><td>Incremental Frequent Pattern Mining<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012<a><br/></td></tr><tr><td>51</td><td>Detection of phishing email using textual and lexical URL analysis <br/></td><td> <a href="" target="_blank"> International Conference on Computer Science and Information Technology, pp.105-110, July 2012.<a><br/></td></tr><tr><td>52</td><td>Review of Incremental Association Rule Mining Algorithms<br/></td><td> <a href="" target="_blank"> IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.<a><br/></td></tr><tr><td>53</td><td>Association Rule Mining Using Graph and Clustering Technique<br/></td><td> <a href="" target="_blank"> Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012<a><br/></td></tr><tr><td>54</td><td>Security in MANETs using Symmetric Keys – A New Approach<br/></td><td> <a href="" target="_blank"> International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012<a><br/></td></tr><tr><td>55</td><td>Security in MANETs using Symmetric Keys – A New Approach <br/></td><td> <a href="" target="_blank"> International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, <a><br/></td></tr><tr><td>56</td><td>Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.<a><br/></td></tr><tr><td>57</td><td>Hybrid Reactive Database Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>58</td><td>Need base Security with IDRS for Cloud Computing<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>59</td><td>Data Integrity and Confidentiality in Outsourced Database<br/></td><td> <a href="" target="_blank"> ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012<a><br/></td></tr><tr><td>60</td><td>Integrity and Confidentiality of character query in Outsourced Database<br/></td><td> <a href="" target="_blank"> National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India<a><br/></td></tr><tr><td>61</td><td>Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> 5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.<a><br/></td></tr><tr><td>62</td><td>A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack<br/></td><td> <a href="" target="_blank"> World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.<a><br/></td></tr><tr><td>63</td><td>User Trust Based Collaborative Filtering Algorithm for Recommendation System<br/></td><td> <a href="" target="_blank"> International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.<a><br/></td></tr><tr><td>64</td><td>Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>65</td><td>A Flooding Based Distributed Denial of Service Attack Defense Mechanism<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>66</td><td>Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>67</td><td>Multilevel Multidimensional Trust Model for Group based Applications<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>68</td><td>Identification of New Approach for Runtime Enforcement of Web Service Security<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.<a><br/></td></tr><tr><td>69</td><td>Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. <a><br/></td></tr><tr><td>70</td><td>Dynamic enforcement of web service security<br/></td><td> <a href="" target="_blank"> National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.<a><br/></td></tr><tr><td>71</td><td>Detecting Malicious Dropping Attack in the Internet<br/></td><td> <a href="" target="_blank"> International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011<a><br/></td></tr><tr><td>72</td><td>An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.<a><br/></td></tr><tr><td>73</td><td>Malicious Dropping Attack in the Internet: Impacts and Solution<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.<a><br/></td></tr><tr><td>74</td><td>Multiple Route Selector BGP (MRS-BGP)<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.<a><br/></td></tr><tr><td>75</td><td>Multipath Routing in the Internet<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.<a><br/></td></tr><tr><td>76</td><td>Performance Improvement of Selective Unidirectional Links in Cluster Based Routing<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.<a><br/></td></tr><tr><td>77</td><td>Proactive Approach for Dynamic Source Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.<a><br/></td></tr><tr><td>78</td><td>Comparative Study of CSS and YASS Stemming Algorithms<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>79</td><td>Hybrid Approach for Optimal Design of Distributed Database System<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>80</td><td>Different Approaches to Classify Threaten E-Mails<br/></td><td> <a href="" target="_blank"> National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009<a><br/></td></tr><tr><td>81</td><td>Enhanced Cluster based Routing with Unilinks<br/></td><td> <a href="" target="_blank"> National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. <a><br/></td></tr><tr><td>82</td><td>Performance Improvement in CBR using Selective Unidirectional Link<br/></td><td> <a href="" target="_blank"> International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India <a><br/></td></tr><tr><td>83</td><td>User Agent Based Heterogeneous Distributed Database System<br/></td><td> <a href="" target="_blank"> International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008<a><br/></td></tr><tr><td>84</td><td>Comparative Study of Secure Internet Routing Protocols<br/></td><td> <a href="" target="_blank"> National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai<a><br/></td></tr><tr><td>85</td><td>Enhanced BGP Routing for Network Engineering<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>86</td><td>An Enhanced Fault-Tolerant Routing Protocol in the Internet<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>87</td><td>Multi-Agents in Knowledge Management Systems<br/></td><td> <a href="" target="_blank"> International Conference on Advances in Computing, February 21-22, 2008, Chikhli, <a><br/></td></tr><tr><td>88</td><td>Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs<br/></td><td> <a href="" target="_blank"> SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online <a><br/></td></tr><tr><td>89</td><td>KONCERN - Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. <a><br/></td></tr><tr><td>90</td><td>Security Issues in an Adhoc Networks<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>91</td><td>KONCERN-Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>92</td><td>Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. <a><br/></td></tr><tr><td>93</td><td>BIOMETRICS – IRIS RECOGNITION<br/></td><td> <a href="" target="_blank"> National Conference, SFIT, 4-6 Jan-2007, Mumbai.<a><br/></td></tr> </tbody> </table> </div> <div class="tab-pane row" id="research"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr No</th> <th>Name of Research Project</th> <th>Type of Grant</th> <th>Name of funding Organization</th> <th>Amount (Rs.)</th> <th>Duration</th> </tr> <tr> <td>1</td> <td>M-Vision</td> <td>Minor </td> <td>University of Mumbai</td> <td>Rs. 35000/-</td> <td>2018-19</td> </tr> </table> </div> <!-- Added on 28OCT23 ~rbk --> </div> </div> </div> </div> </div> </div> ', 'scripts_for_layout' => '', 'title_for_layout' => 'Faculties' ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $content_for_layout = '<style> @media only screen and (max-width: 600px) { #paper { magin-left: -75px !important; } } </style> <div class="banner"> <!-- page header section --> <div class="page-title"> <div class="container"> <div class="row"> <div class="col-md-12 ptn-bg"> <h2>Computer Engineering </h2> <ol class="breadcrumb"> <li><a href="/">Home</a></li> <li class="active">Computer Engineering</li> </ol> </div> </div> </div> </div> </div> <!-- Main-container start --> <div class="container things" style="margin:0;width: 100%;" > <div class="col-md-12"> <br/><br/> <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/> <!-- Page Content start --> <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;"> <a href="javascript:window.history.back()"> <button class="btn"> <i class="fa fa-arrow-left"></i> Back </button> </a> </div> <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;"> <div class="col-md-12"> <div class="col-md-3"> <img src="https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg_160.jpg" alt="" /> </div> <div class="col-md-8"> <br/> <br/> <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Prof. & Dean Students Affairs and Alumni<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myModal">Bio-Data</button> <br> <button class="btn btn-default btn-yellow" data-toggle="modal" data-target="#myPublModal">Publications</button> </div> <!-- Modal 1 --> <div class="modal fade" id="myModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal 2 --> <div class="modal fade" id="myPublModal" role="dialog"> <div class="modal-dialog" style="width:850px;"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal">×</button> <h4 class="modal-title">Dr. Lata Ragha </h4> </div> <div class="modal-body"> <object class="displaypdf" data="https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf" type="application/pdf" width="800px" height="500px"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-trace').style.display = (document.getElementById('cakeErr674f42834fcad-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>104</b>]<div id="cakeErr674f42834fcad-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-code').style.display = (document.getElementById('cakeErr674f42834fcad-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr674f42834fcad-context').style.display = (document.getElementById('cakeErr674f42834fcad-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr674f42834fcad-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">div </span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">> </span></span></code> <code><span style="color: #000000"> <object class="displaypdf" data="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>" type="application/pdf" width="800px" height="500px"> </span></code> <span class="code-highlight"><code><span style="color: #000000"> <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$this</span><span style="color: #007700">-></span><span style="color: #0000BB">Html</span><span style="color: #007700">-></span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]); </span><span style="color: #0000BB">?></span>">Download PDF</a>.</p> </span></code></span></pre><pre id="cakeErr674f42834fcad-context" class="cake-context" style="display: none;">$viewFile = 'C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp' $dataForView = array( 'details' => array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ) ), 'FacultySpecialization' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ) ), 'FacultyPaper' => array( (int) 0 => array( [maximum depth reached] ), (int) 1 => array( [maximum depth reached] ), (int) 2 => array( [maximum depth reached] ), (int) 3 => array( [maximum depth reached] ), (int) 4 => array( [maximum depth reached] ), (int) 5 => array( [maximum depth reached] ), (int) 6 => array( [maximum depth reached] ), (int) 7 => array( [maximum depth reached] ), (int) 8 => array( [maximum depth reached] ), (int) 9 => array( [maximum depth reached] ), (int) 10 => array( [maximum depth reached] ), (int) 11 => array( [maximum depth reached] ), (int) 12 => array( [maximum depth reached] ), (int) 13 => array( [maximum depth reached] ), (int) 14 => array( [maximum depth reached] ), (int) 15 => array( [maximum depth reached] ), (int) 16 => array( [maximum depth reached] ), (int) 17 => array( [maximum depth reached] ), (int) 18 => array( [maximum depth reached] ), (int) 19 => array( [maximum depth reached] ), (int) 20 => array( [maximum depth reached] ), (int) 21 => array( [maximum depth reached] ), (int) 22 => array( [maximum depth reached] ), (int) 23 => array( [maximum depth reached] ), (int) 24 => array( [maximum depth reached] ), (int) 25 => array( [maximum depth reached] ), (int) 26 => array( [maximum depth reached] ), (int) 27 => array( [maximum depth reached] ), (int) 28 => array( [maximum depth reached] ), (int) 29 => array( [maximum depth reached] ), (int) 30 => array( [maximum depth reached] ), (int) 31 => array( [maximum depth reached] ), (int) 32 => array( [maximum depth reached] ), (int) 33 => array( [maximum depth reached] ), (int) 34 => array( [maximum depth reached] ), (int) 35 => array( [maximum depth reached] ), (int) 36 => array( [maximum depth reached] ), (int) 37 => array( [maximum depth reached] ), (int) 38 => array( [maximum depth reached] ), (int) 39 => array( [maximum depth reached] ), (int) 40 => array( [maximum depth reached] ), (int) 41 => array( [maximum depth reached] ), (int) 42 => array( [maximum depth reached] ), (int) 43 => array( [maximum depth reached] ), (int) 44 => array( [maximum depth reached] ), (int) 45 => array( [maximum depth reached] ), (int) 46 => array( [maximum depth reached] ), (int) 47 => array( [maximum depth reached] ), (int) 48 => array( [maximum depth reached] ), (int) 49 => array( [maximum depth reached] ), (int) 50 => array( [maximum depth reached] ), (int) 51 => array( [maximum depth reached] ), (int) 52 => array( [maximum depth reached] ), (int) 53 => array( [maximum depth reached] ), (int) 54 => array( [maximum depth reached] ), (int) 55 => array( [maximum depth reached] ), (int) 56 => array( [maximum depth reached] ), (int) 57 => array( [maximum depth reached] ), (int) 58 => array( [maximum depth reached] ), (int) 59 => array( [maximum depth reached] ), (int) 60 => array( [maximum depth reached] ), (int) 61 => array( [maximum depth reached] ), (int) 62 => array( [maximum depth reached] ), (int) 63 => array( [maximum depth reached] ), (int) 64 => array( [maximum depth reached] ), (int) 65 => array( [maximum depth reached] ), (int) 66 => array( [maximum depth reached] ), (int) 67 => array( [maximum depth reached] ), (int) 68 => array( [maximum depth reached] ), (int) 69 => array( [maximum depth reached] ), (int) 70 => array( [maximum depth reached] ), (int) 71 => array( [maximum depth reached] ), (int) 72 => array( [maximum depth reached] ), (int) 73 => array( [maximum depth reached] ), (int) 74 => array( [maximum depth reached] ), (int) 75 => array( [maximum depth reached] ), (int) 76 => array( [maximum depth reached] ), (int) 77 => array( [maximum depth reached] ), (int) 78 => array( [maximum depth reached] ), (int) 79 => array( [maximum depth reached] ), (int) 80 => array( [maximum depth reached] ), (int) 81 => array( [maximum depth reached] ), (int) 82 => array( [maximum depth reached] ), (int) 83 => array( [maximum depth reached] ), (int) 84 => array( [maximum depth reached] ), (int) 85 => array( [maximum depth reached] ), (int) 86 => array( [maximum depth reached] ), (int) 87 => array( [maximum depth reached] ), (int) 88 => array( [maximum depth reached] ), (int) 89 => array( [maximum depth reached] ), (int) 90 => array( [maximum depth reached] ), (int) 91 => array( [maximum depth reached] ), (int) 92 => array( [maximum depth reached] ) ), 'FacultyResearch' => array( (int) 0 => array( [maximum depth reached] ) ), 'FacultyOnlineProfile' => array() ), 'subs' => array( (int) 0 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 1 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 2 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 3 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 4 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 5 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 6 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 7 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 8 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 9 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ), (int) 10 => array( 'FacultySubject' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'results' => array( (int) 0 => array( 'FacultyResearch' => array( [maximum depth reached] ), 'Faculty' => array( [maximum depth reached] ) ) ), 'frs' => array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fpubl' => array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), 'fonlprof' => array() ) $details = array( 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ), 'Department' => array( 'id' => '2', 'name' => 'Computer Engineering', 'description' => '<p>All the computer related courses</p>', 'created_by' => '1', 'created_timestamp' => '2014-10-17 20:43:35', 'facultyList' => 'https://fcrit.ac.in/cdn/department/1681367023-1560845363.computer.faculty.list.2.pdf', 'Roadmap' => 'https://fcrit.ac.in/cdn/department/1681367023-Roadmap.Computer.pdf', 'infrastructure' => '/img/not_available' ), 'FacultySubject' => array( (int) 0 => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), (int) 1 => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), (int) 2 => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), (int) 3 => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), (int) 4 => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), (int) 5 => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), (int) 6 => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), (int) 7 => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), (int) 8 => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), (int) 9 => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), (int) 10 => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ) ), 'FacultySpecialization' => array( (int) 0 => array( 'id' => '75', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5.&nbsp;System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2015-02-10 15:34:50' ), (int) 1 => array( 'id' => '85', 'faculty_id' => '18', 'description' => '<p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p>', 'created_by' => '1', 'created_timestamp' => '2017-01-18 21:04:32' ) ), 'FacultyPaper' => array( (int) 0 => array( 'id' => '285', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network', 'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:17' ), (int) 1 => array( 'id' => '286', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack', 'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:37' ), (int) 2 => array( 'id' => '287', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network', 'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:50:53' ), (int) 3 => array( 'id' => '288', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey', 'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:51:11' ), (int) 4 => array( 'id' => '292', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management in Internet Services using Continuous Authentication', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:52:37' ), (int) 5 => array( 'id' => '293', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:54:09' ), (int) 6 => array( 'id' => '294', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data', 'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:05' ), (int) 7 => array( 'id' => '295', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:27' ), (int) 8 => array( 'id' => '296', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET', 'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:55:46' ), (int) 9 => array( 'id' => '297', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Expectation based Aggressor Recognizable proof in MANET', 'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:02' ), (int) 10 => array( 'id' => '298', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Session Passwords Using Three Level Authentication System', 'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 15:56:28' ), (int) 11 => array( 'id' => '299', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Supervised Web Forum Crawling', 'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:04:31' ), (int) 12 => array( 'id' => '300', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET', 'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:05:49' ), (int) 13 => array( 'id' => '301', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Review of Web Forum Crawling Techniques', 'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:06:20' ), (int) 14 => array( 'id' => '302', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems', 'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:10' ), (int) 15 => array( 'id' => '303', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:07:28' ), (int) 16 => array( 'id' => '304', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure AODV against Control Packet Dropping Attack ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:32' ), (int) 17 => array( 'id' => '305', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Tree Based Routing Mechanism for MANET ', 'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:08:48' ), (int) 18 => array( 'id' => '306', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:07' ), (int) 19 => array( 'id' => '307', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Web Structure Mining Using Breadth First Search with Page Rank', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:24' ), (int) 20 => array( 'id' => '308', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Bigdata Analysis Using Columnar Database', 'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:09:52' ), (int) 21 => array( 'id' => '309', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Secure Routing against Control Packet Dropping Attack', 'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:18' ), (int) 22 => array( 'id' => '310', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ', 'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:10:37' ), (int) 23 => array( 'id' => '311', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Genetic Approach for processor Scheduling', 'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:14' ), (int) 24 => array( 'id' => '312', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs', 'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:33' ), (int) 25 => array( 'id' => '313', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm', 'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:11:50' ), (int) 26 => array( 'id' => '314', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Decision Trees for Uncertain Data Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:12:11' ), (int) 27 => array( 'id' => '315', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Clustering in Cloud Computing Environment', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:41' ), (int) 28 => array( 'id' => '316', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'FITM: FEROM Informal Text Mining', 'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:13:57' ), (int) 29 => array( 'id' => '317', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Personalized Image Search Optimization', 'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:14' ), (int) 30 => array( 'id' => '318', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch-Photo Matching using LFDA', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:32' ), (int) 31 => array( 'id' => '319', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid approach for credit card fraud detection', 'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:14:53' ), (int) 32 => array( 'id' => '320', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Forensic sketch to Mugshot Photo Matching', 'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:14' ), (int) 33 => array( 'id' => '321', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection In satellite Images using DWT and PCA', 'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:39' ), (int) 34 => array( 'id' => '322', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Recognition on Road Vehicle Based on EDA ', 'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:15:58' ), (int) 35 => array( 'id' => '323', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey on Estimation of Distribution Algorithm Techniques', 'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:15' ), (int) 36 => array( 'id' => '324', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining', 'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:34' ), (int) 37 => array( 'id' => '325', 'faculty_id' => '18', 'sr_no' => '0', 'title' => ' Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis', 'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:16:59' ), (int) 38 => array( 'id' => '326', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay', 'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:16' ), (int) 39 => array( 'id' => '327', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:17:49' ), (int) 40 => array( 'id' => '328', 'faculty_id' => '18', 'sr_no' => '0', 'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ', 'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:09' ), (int) 41 => array( 'id' => '329', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS', 'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:28' ), (int) 42 => array( 'id' => '330', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:18:47' ), (int) 43 => array( 'id' => '331', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Cooperative Security Agents for MANET', 'description' => 'World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:04' ), (int) 44 => array( 'id' => '332', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:24' ), (int) 45 => array( 'id' => '333', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach', 'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:19:45' ), (int) 46 => array( 'id' => '334', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack', 'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:04' ), (int) 47 => array( 'id' => '335', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparing performance of Collaborative Filtering Algorithms', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:22' ), (int) 48 => array( 'id' => '336', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm', 'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:39' ), (int) 49 => array( 'id' => '337', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Incremental Frequent Pattern Mining', 'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:20:59' ), (int) 50 => array( 'id' => '338', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detection of phishing email using textual and lexical URL analysis ', 'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:21:17' ), (int) 51 => array( 'id' => '339', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Review of Incremental Association Rule Mining Algorithms', 'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:05' ), (int) 52 => array( 'id' => '340', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Association Rule Mining Using Graph and Clustering Technique', 'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:27' ), (int) 53 => array( 'id' => '341', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach', 'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:22:48' ), (int) 54 => array( 'id' => '342', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security in MANETs using Symmetric Keys – A New Approach ', 'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:05' ), (int) 55 => array( 'id' => '343', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs', 'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:24' ), (int) 56 => array( 'id' => '344', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Reactive Database Intrusion Detection System', 'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:23:42' ), (int) 57 => array( 'id' => '345', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Need base Security with IDRS for Cloud Computing', 'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:10' ), (int) 58 => array( 'id' => '346', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Data Integrity and Confidentiality in Outsourced Database', 'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:26' ), (int) 59 => array( 'id' => '347', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Integrity and Confidentiality of character query in Outsourced Database', 'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:32:44' ), (int) 60 => array( 'id' => '348', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol', 'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:00' ), (int) 61 => array( 'id' => '349', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack', 'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:18' ), (int) 62 => array( 'id' => '350', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System', 'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:37' ), (int) 63 => array( 'id' => '351', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:33:58' ), (int) 64 => array( 'id' => '352', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:18' ), (int) 65 => array( 'id' => '353', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:39' ), (int) 66 => array( 'id' => '354', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multilevel Multidimensional Trust Model for Group based Applications', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:34:56' ), (int) 67 => array( 'id' => '355', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security', 'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:12' ), (int) 68 => array( 'id' => '356', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System', 'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:38' ), (int) 69 => array( 'id' => '357', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Dynamic enforcement of web service security', 'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:35:52' ), (int) 70 => array( 'id' => '358', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Detecting Malicious Dropping Attack in the Internet', 'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:08' ), (int) 71 => array( 'id' => '359', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word', 'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:26' ), (int) 72 => array( 'id' => '360', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution', 'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:41' ), (int) 73 => array( 'id' => '361', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multiple Route Selector BGP (MRS-BGP)', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:36:58' ), (int) 74 => array( 'id' => '362', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multipath Routing in the Internet', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:14' ), (int) 75 => array( 'id' => '363', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing', 'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:37:31' ), (int) 76 => array( 'id' => '364', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Proactive Approach for Dynamic Source Routing Protocol', 'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:42' ), (int) 77 => array( 'id' => '365', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of CSS and YASS Stemming Algorithms', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:38:58' ), (int) 78 => array( 'id' => '366', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Hybrid Approach for Optimal Design of Distributed Database System', 'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:13' ), (int) 79 => array( 'id' => '367', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Different Approaches to Classify Threaten E-Mails', 'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:29' ), (int) 80 => array( 'id' => '368', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced Cluster based Routing with Unilinks', 'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:39:47' ), (int) 81 => array( 'id' => '369', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Performance Improvement in CBR using Selective Unidirectional Link', 'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:05' ), (int) 82 => array( 'id' => '370', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'User Agent Based Heterogeneous Distributed Database System', 'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:21' ), (int) 83 => array( 'id' => '371', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Comparative Study of Secure Internet Routing Protocols', 'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:36' ), (int) 84 => array( 'id' => '372', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Enhanced BGP Routing for Network Engineering', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:40:51' ), (int) 85 => array( 'id' => '373', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet', 'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:08' ), (int) 86 => array( 'id' => '374', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Multi-Agents in Knowledge Management Systems', 'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:26' ), (int) 87 => array( 'id' => '375', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs', 'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:41:44' ), (int) 88 => array( 'id' => '376', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired', 'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:42:01' ), (int) 89 => array( 'id' => '377', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Security Issues in an Adhoc Networks', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:12' ), (int) 90 => array( 'id' => '378', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired', 'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:31' ), (int) 91 => array( 'id' => '379', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'Wireless Sensor Networks', 'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:45:49' ), (int) 92 => array( 'id' => '380', 'faculty_id' => '18', 'sr_no' => '0', 'title' => 'BIOMETRICS – IRIS RECOGNITION', 'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.', 'link' => '', 'created_by' => '1', 'created_timestamp' => '2017-11-29 16:46:06' ) ), 'FacultyResearch' => array( (int) 0 => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ) ), 'FacultyOnlineProfile' => array() ) $subs = array( (int) 0 => array( 'FacultySubject' => array( 'id' => '420', 'faculty_id' => '18', 'subject' => 'Advanced Computing and Network Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:52:33' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 1 => array( 'FacultySubject' => array( 'id' => '419', 'faculty_id' => '18', 'subject' => 'Parallel Computing', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:55' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 2 => array( 'FacultySubject' => array( 'id' => '418', 'faculty_id' => '18', 'subject' => 'Object Oriented Analysis and Design', 'type' => 'Post Graduate', 'semester' => 'I', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:51:16' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 3 => array( 'FacultySubject' => array( 'id' => '417', 'faculty_id' => '18', 'subject' => 'Advanced Database Systems', 'type' => 'Post Graduate', 'semester' => 'II', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:50' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 4 => array( 'FacultySubject' => array( 'id' => '410', 'faculty_id' => '18', 'subject' => 'Computer Graphics', 'type' => 'Under Graduate', 'semester' => 'IV', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:34' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 5 => array( 'FacultySubject' => array( 'id' => '411', 'faculty_id' => '18', 'subject' => 'Computer Networks', 'type' => 'Under Graduate', 'semester' => 'V', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:47:59' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 6 => array( 'FacultySubject' => array( 'id' => '412', 'faculty_id' => '18', 'subject' => 'System Programming and Compiler Construction', 'type' => 'Under Graduate', 'semester' => 'VI', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:32' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 7 => array( 'FacultySubject' => array( 'id' => '414', 'faculty_id' => '18', 'subject' => 'Computer Simulation and Modelling ', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:19' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 8 => array( 'FacultySubject' => array( 'id' => '413', 'faculty_id' => '18', 'subject' => 'Cryptography and System Security', 'type' => 'Under Graduate', 'semester' => 'VII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:48:54' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 9 => array( 'FacultySubject' => array( 'id' => '416', 'faculty_id' => '18', 'subject' => 'Adhoc Wireless Networks (Elective)', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:50:23' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ), (int) 10 => array( 'FacultySubject' => array( 'id' => '415', 'faculty_id' => '18', 'subject' => 'Parallel and Distributed Computing ', 'type' => 'Under Graduate', 'semester' => 'VIII', 'created_by' => '1', 'created_timestamp' => '2018-03-19 09:49:49' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $results = array( (int) 0 => array( 'FacultyResearch' => array( 'id' => '92', 'faculty_id' => '18', 'title' => 'M-Vision', 'grant_type' => 'Minor ', 'funding_organization' => 'University of Mumbai', 'amount' => 'Rs. 35000/-', 'duration' => '2018-19', 'created_by' => '1', 'created_timestamp' => '2019-09-16 12:49:53' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) ) $frs = array( 'FacultyResume' => array( 'id' => '521', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultyresume/1730109061-Lata.Faculty.Profile.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fpubl = array( 'FacultyPublication' => array( 'id' => '38', 'faculty_id' => '18', 'attachment' => 'https://fcrit.ac.in/cdn/facultypublication/1730109093-Publications.Nov.2024.pdf' ), 'Faculty' => array( 'id' => '18', 'department_id' => '2', 'sr_no' => '1', 'name' => 'Dr. Lata Ragha', 'qualification' => 'Ph.D', 'designation' => 'Prof. & Dean Students Affairs and Alumni', 'email_address' => 'lata.ragha@fcrit.ac.in', 'joining_date' => '2016-12-21', 'image' => 'https://fcrit.ac.in/cdn/faculty/1709032558-Dr.Lata.Ragha.jpg', 'teaching_staff' => '1', 'created_timestamp' => '2015-02-03 19:11:43' ) ) $fonlprof = array() $date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 104 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::render() - CORE\Cake\View\View.php, line 479 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p> </object> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <!-- Modal content--> <div class="col-md-12" style="margin-top: 20px;"> <ul class="nav nav-pills" style="margin-left: 13px;"> <!--li class="active"><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li--> <li class="active"><a href="#onlineprofile" role="tab" data-toggle="tab">Online Profile</a></li> <li><a href="#specialization" role="tab" data-toggle="tab">Areas of Specialization</a></li> <li><a href="#subject" role="tab" data-toggle="tab">Subjects Taught</a></li> <li><a href="#paper" role="tab" data-toggle="tab">Papers Presented</a></li> <li><a href="#research" role="tab" data-toggle="tab">Research Projects</a></li> </ul> <div class="tab-content" style="margin: 20px 0px 0px 30px;"> <div class="tab-pane row active" id="onlineprofile"> </div> <div class="tab-pane row" id="specialization"> <p>1. Computer Networks and Security</p> <p>2. Routing Protocols</p> <p>3. Data Mining</p> <p>4. Parallel and distributed computing</p> <p>5. System/Information Security</p> </div> <div class="tab-pane row" id="subject"> <h3>UG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Computer Graphics</td> <td>IV</td> </tr> <tr> <td>2</td> <td>Computer Networks</td> <td>V</td> </tr> <tr> <td>3</td> <td>System Programming and Compiler Construction</td> <td>VI</td> </tr> <tr> <td>4</td> <td>Computer Simulation and Modelling </td> <td>VII</td> </tr> <tr> <td>5</td> <td>Cryptography and System Security</td> <td>VII</td> </tr> <tr> <td>6</td> <td>Adhoc Wireless Networks (Elective)</td> <td>VIII</td> </tr> <tr> <td>7</td> <td>Parallel and Distributed Computing </td> <td>VIII</td> </tr> </table> <h3>PG Subjects</h3> <hr style="border-bottom:1px solid #9BBA6E;"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr no</th> <th>Subject</th> <th>Semester</th> </tr> <tr> <td>1</td> <td>Advanced Computing and Network Design</td> <td>I</td> </tr> <tr> <td>2</td> <td>Parallel Computing</td> <td>I</td> </tr> <tr> <td>3</td> <td>Object Oriented Analysis and Design</td> <td>I</td> </tr> <tr> <td>4</td> <td>Advanced Database Systems</td> <td>II</td> </tr> </table> </div> <div class="tab-pane row" id="paper" style="margin-left: -65px;"> <table class="table table-striped table-bordered table-condensed"> <thead> <tr> <th>Sr No</th> <th style="text-align:center;">Title</th> <th style="text-align:center;">Description</th> </tr> </thead> <tbody style="font-family: dosis;font-style: normal;"> <tr><td>1</td><td>A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.<a><br/></td></tr><tr><td>2</td><td>Enrich Security in MANET by Avoiding Wormhole Attack<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).<a><br/></td></tr><tr><td>3</td><td>A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network<br/></td><td> <a href="" target="_blank"> 4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore<a><br/></td></tr><tr><td>4</td><td>Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.<a><br/></td></tr><tr><td>5</td><td>Session Management in Internet Services using Continuous Authentication<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.<a><br/></td></tr><tr><td>6</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.<a><br/></td></tr><tr><td>7</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td> <a href="" target="_blank"> International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.<a><br/></td></tr><tr><td>8</td><td>Session Management using Continuous Authentication in Internet Services: A Survey<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.<a><br/></td></tr><tr><td>9</td><td>Avoidance of Co-operative black hole attack in AODV in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.<a><br/></td></tr><tr><td>10</td><td>Expectation based Aggressor Recognizable proof in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore<a><br/></td></tr><tr><td>11</td><td>Session Passwords Using Three Level Authentication System<br/></td><td> <a href="" target="_blank"> International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29<a><br/></td></tr><tr><td>12</td><td>Supervised Web Forum Crawling<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.<a><br/></td></tr><tr><td>13</td><td>Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore<a><br/></td></tr><tr><td>14</td><td>A Review of Web Forum Crawling Techniques<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 <a><br/></td></tr><tr><td>15</td><td>Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015<a><br/></td></tr><tr><td>16</td><td>Performance Evaluation of Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014<a><br/></td></tr><tr><td>17</td><td>Secure AODV against Control Packet Dropping Attack <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>18</td><td>Tree Based Routing Mechanism for MANET <br/></td><td> <a href="" target="_blank"> 2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31 PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>19</td><td>A Survey on Routing Protocols in Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>20</td><td>Web Structure Mining Using Breadth First Search with Page Rank<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>21</td><td>Bigdata Analysis Using Columnar Database<br/></td><td> <a href="" target="_blank"> International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>22</td><td>Secure Routing against Control Packet Dropping Attack<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.<a><br/></td></tr><tr><td>23</td><td>Feature and Opinion Identification for Online Digital Camera Reviews <br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.<a><br/></td></tr><tr><td>24</td><td>A Genetic Approach for processor Scheduling<br/></td><td> <a href="" target="_blank"> IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.<a><br/></td></tr><tr><td>25</td><td>Detecting and Avoiding Black Hole Attack in the MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat<a><br/></td></tr><tr><td>26</td><td>Dynamic Quantum based Genetic Round Robin Algorithm<br/></td><td> <a href="" target="_blank"> International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.<a><br/></td></tr><tr><td>27</td><td>Decision Trees for Uncertain Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.<a><br/></td></tr><tr><td>28</td><td>Clustering in Cloud Computing Environment<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.<a><br/></td></tr><tr><td>29</td><td>FITM: FEROM Informal Text Mining<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.<a><br/></td></tr><tr><td>30</td><td>Personalized Image Search Optimization<br/></td><td> <a href="" target="_blank"> International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.<a><br/></td></tr><tr><td>31</td><td>Forensic sketch-Photo Matching using LFDA<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.<a><br/></td></tr><tr><td>32</td><td>Hybrid approach for credit card fraud detection<br/></td><td> <a href="" target="_blank"> International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.<a><br/></td></tr><tr><td>33</td><td>Forensic sketch to Mugshot Photo Matching<br/></td><td> <a href="" target="_blank"> International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.<a><br/></td></tr><tr><td>34</td><td>Change Detection In satellite Images using DWT and PCA<br/></td><td> <a href="" target="_blank"> International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.<a><br/></td></tr><tr><td>35</td><td>Recognition on Road Vehicle Based on EDA <br/></td><td> <a href="" target="_blank"> International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 <a><br/></td></tr><tr><td>36</td><td>Survey on Estimation of Distribution Algorithm Techniques<br/></td><td> <a href="" target="_blank"> International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013<a><br/></td></tr><tr><td>37</td><td>Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining<br/></td><td> <a href="" target="_blank"> International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>38</td><td> Performance Evaluation of Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis<br/></td><td> <a href="" target="_blank"> Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>39</td><td>Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay<br/></td><td> <a href="" target="_blank"> International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.<a><br/></td></tr><tr><td>40</td><td>Change Detection in Satellite Images Using PCA and K-means Clustering <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>41</td><td>3D-Deformable Model Based Recognition and Labeling on Road Vehicle <br/></td><td> <a href="" target="_blank"> International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>42</td><td>Security Enabled DSR for Establishing Symmetric Key and Security in MANETS<br/></td><td> <a href="" target="_blank"> Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore<a><br/></td></tr><tr><td>43</td><td>Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>44</td><td>Cooperative Security Agents for MANET<br/></td><td> <a href="" target="_blank"> World Congress on Information and Communication Technologies, 30th Oct - 2nd Nov 2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>45</td><td>Hybrid Approach for DB Intrusion Detection with Reactive Policies<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore<a><br/></td></tr><tr><td>46</td><td>Privacy Preserving in Data Mining Using Hybrid Approach<br/></td><td> <a href="" target="_blank"> IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore<a><br/></td></tr><tr><td>47</td><td>A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack<br/></td><td> <a href="" target="_blank"> 4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET<a><br/></td></tr><tr><td>48</td><td>Comparing performance of Collaborative Filtering Algorithms<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>49</td><td>Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>50</td><td>Incremental Frequent Pattern Mining<br/></td><td> <a href="" target="_blank"> International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012<a><br/></td></tr><tr><td>51</td><td>Detection of phishing email using textual and lexical URL analysis <br/></td><td> <a href="" target="_blank"> International Conference on Computer Science and Information Technology, pp.105-110, July 2012.<a><br/></td></tr><tr><td>52</td><td>Review of Incremental Association Rule Mining Algorithms<br/></td><td> <a href="" target="_blank"> IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.<a><br/></td></tr><tr><td>53</td><td>Association Rule Mining Using Graph and Clustering Technique<br/></td><td> <a href="" target="_blank"> Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012<a><br/></td></tr><tr><td>54</td><td>Security in MANETs using Symmetric Keys – A New Approach<br/></td><td> <a href="" target="_blank"> International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012<a><br/></td></tr><tr><td>55</td><td>Security in MANETs using Symmetric Keys – A New Approach <br/></td><td> <a href="" target="_blank"> International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, <a><br/></td></tr><tr><td>56</td><td>Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs<br/></td><td> <a href="" target="_blank"> International Conference on Emerging Trends in Computer Science and Information Tech., K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.<a><br/></td></tr><tr><td>57</td><td>Hybrid Reactive Database Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>58</td><td>Need base Security with IDRS for Cloud Computing<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th - 2012, SBIN:0030366<a><br/></td></tr><tr><td>59</td><td>Data Integrity and Confidentiality in Outsourced Database<br/></td><td> <a href="" target="_blank"> ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012<a><br/></td></tr><tr><td>60</td><td>Integrity and Confidentiality of character query in Outsourced Database<br/></td><td> <a href="" target="_blank"> National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India<a><br/></td></tr><tr><td>61</td><td>Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> 5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.<a><br/></td></tr><tr><td>62</td><td>A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack<br/></td><td> <a href="" target="_blank"> World Congress On Information and Communication Technologies Mumbai, India, 11th -14th December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.<a><br/></td></tr><tr><td>63</td><td>User Trust Based Collaborative Filtering Algorithm for Recommendation System<br/></td><td> <a href="" target="_blank"> International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.<a><br/></td></tr><tr><td>64</td><td>Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>65</td><td>A Flooding Based Distributed Denial of Service Attack Defense Mechanism<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>66</td><td>Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>67</td><td>Multilevel Multidimensional Trust Model for Group based Applications<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>68</td><td>Identification of New Approach for Runtime Enforcement of Web Service Security<br/></td><td> <a href="" target="_blank"> International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.<a><br/></td></tr><tr><td>69</td><td>Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System<br/></td><td> <a href="" target="_blank"> International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. <a><br/></td></tr><tr><td>70</td><td>Dynamic enforcement of web service security<br/></td><td> <a href="" target="_blank"> National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.<a><br/></td></tr><tr><td>71</td><td>Detecting Malicious Dropping Attack in the Internet<br/></td><td> <a href="" target="_blank"> International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011<a><br/></td></tr><tr><td>72</td><td>An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.<a><br/></td></tr><tr><td>73</td><td>Malicious Dropping Attack in the Internet: Impacts and Solution<br/></td><td> <a href="" target="_blank"> International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.<a><br/></td></tr><tr><td>74</td><td>Multiple Route Selector BGP (MRS-BGP)<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.<a><br/></td></tr><tr><td>75</td><td>Multipath Routing in the Internet<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.<a><br/></td></tr><tr><td>76</td><td>Performance Improvement of Selective Unidirectional Links in Cluster Based Routing<br/></td><td> <a href="" target="_blank"> International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.<a><br/></td></tr><tr><td>77</td><td>Proactive Approach for Dynamic Source Routing Protocol<br/></td><td> <a href="" target="_blank"> International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.<a><br/></td></tr><tr><td>78</td><td>Comparative Study of CSS and YASS Stemming Algorithms<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>79</td><td>Hybrid Approach for Optimal Design of Distributed Database System<br/></td><td> <a href="" target="_blank"> National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>80</td><td>Different Approaches to Classify Threaten E-Mails<br/></td><td> <a href="" target="_blank"> National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009<a><br/></td></tr><tr><td>81</td><td>Enhanced Cluster based Routing with Unilinks<br/></td><td> <a href="" target="_blank"> National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. <a><br/></td></tr><tr><td>82</td><td>Performance Improvement in CBR using Selective Unidirectional Link<br/></td><td> <a href="" target="_blank"> International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India <a><br/></td></tr><tr><td>83</td><td>User Agent Based Heterogeneous Distributed Database System<br/></td><td> <a href="" target="_blank"> International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008<a><br/></td></tr><tr><td>84</td><td>Comparative Study of Secure Internet Routing Protocols<br/></td><td> <a href="" target="_blank"> National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai<a><br/></td></tr><tr><td>85</td><td>Enhanced BGP Routing for Network Engineering<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>86</td><td>An Enhanced Fault-Tolerant Routing Protocol in the Internet<br/></td><td> <a href="" target="_blank"> National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>87</td><td>Multi-Agents in Knowledge Management Systems<br/></td><td> <a href="" target="_blank"> International Conference on Advances in Computing, February 21-22, 2008, Chikhli, <a><br/></td></tr><tr><td>88</td><td>Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs<br/></td><td> <a href="" target="_blank"> SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online <a><br/></td></tr><tr><td>89</td><td>KONCERN - Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. <a><br/></td></tr><tr><td>90</td><td>Security Issues in an Adhoc Networks<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>91</td><td>KONCERN-Hand Gesture Recognition System For Physically Impaired<br/></td><td> <a href="" target="_blank"> National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>92</td><td>Wireless Sensor Networks<br/></td><td> <a href="" target="_blank"> National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. <a><br/></td></tr><tr><td>93</td><td>BIOMETRICS – IRIS RECOGNITION<br/></td><td> <a href="" target="_blank"> National Conference, SFIT, 4-6 Jan-2007, Mumbai.<a><br/></td></tr> </tbody> </table> </div> <div class="tab-pane row" id="research"> <table class="table table-striped table-bordered table-condensed"> <tr> <th>Sr No</th> <th>Name of Research Project</th> <th>Type of Grant</th> <th>Name of funding Organization</th> <th>Amount (Rs.)</th> <th>Duration</th> </tr> <tr> <td>1</td> <td>M-Vision</td> <td>Minor </td> <td>University of Mumbai</td> <td>Rs. 35000/-</td> <td>2018-19</td> </tr> </table> </div> <!-- Added on 28OCT23 ~rbk --> </div> </div> </div> </div> </div> </div> ' $scripts_for_layout = '' $title_for_layout = 'Faculties'include - APP\View\Layouts\site.ctp, line 473 View::_evaluate() - CORE\Cake\View\View.php, line 954 View::_render() - CORE\Cake\View\View.php, line 916 View::renderLayout() - CORE\Cake\View\View.php, line 543 View::render() - CORE\Cake\View\View.php, line 487 Controller::render() - CORE\Cake\Controller\Controller.php, line 919 Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193 Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161 [main] - APP\webroot\index.php, line 105
AGNEL CHARITIES
FR. C. RODRIGUES INSTITUTE OF TECHNOLOGYAgnel Technical Education Complex
Sector 9-A, Vashi, Navi Mumbai,
Maharashtra, India
PIN - 400703
 (An Autonomous Institute & Permanently Affiliated to University of Mumbai)
AGNEL CHARITIES'
FR. C. RODRIGUES INSTITUTE OF TECHNOLOGYAgnel Technical Education Complex Sector 9-A, Vashi, Navi Mumbai, Maharashtra, India PIN - 400703
AGNEL CHARITIES'
F.C.R.I.T1. Computer Networks and Security
2. Routing Protocols
3. Data Mining
4. Parallel and distributed computing
5. System/Information Security
Sr no | Subject | Semester |
---|---|---|
1 | Computer Graphics | IV |
2 | Computer Networks | V |
3 | System Programming and Compiler Construction | VI |
4 | Computer Simulation and Modelling | VII |
5 | Cryptography and System Security | VII |
6 | Adhoc Wireless Networks (Elective) | VIII |
7 | Parallel and Distributed Computing | VIII |
Sr no | Subject | Semester |
---|---|---|
1 | Advanced Computing and Network Design | I |
2 | Parallel Computing | I |
3 | Object Oriented Analysis and Design | I |
4 | Advanced Database Systems | II |
Sr No | Name of Research Project | Type of Grant | Name of funding Organization | Amount (Rs.) | Duration |
---|---|---|---|---|---|
1 | M-Vision | Minor | University of Mumbai | Rs. 35000/- | 2018-19 |
Agnel Technical Education Complex
Sector 9-A, Vashi, Navi Mumbai,
Maharashtra, India
PIN - 400703
Visitors Count
©FCRIT, Vashi. All rights reserved.
This website is best viewed in Chrome and Mozilla Firefox in 1366x768 screen resolution.