Circulars


Notice (8): Undefined variable: circulars [APP\View\Layouts\site.ctp, line 351]
Code Context


                            <?php

                            foreach ($circulars as $circular) {
$viewFile = 'C:\xampp\htdocs\app\View\Layouts\site.ctp'
$dataForView = array(
	'details' => array(
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		),
		'Department' => array(
			'id' => '2',
			'name' => 'Computer Engineering',
			'description' => '<p>All the computer related courses</p>',
			'created_by' => '1',
			'created_timestamp' => '2014-10-17 20:43:35',
			'facultyList' => 'https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf',
			'Roadmap' => 'https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf',
			'infrastructure' => '/img/not_available'
		),
		'FacultySubject' => array(
			(int) 0 => array(
				[maximum depth reached]
			),
			(int) 1 => array(
				[maximum depth reached]
			),
			(int) 2 => array(
				[maximum depth reached]
			),
			(int) 3 => array(
				[maximum depth reached]
			),
			(int) 4 => array(
				[maximum depth reached]
			),
			(int) 5 => array(
				[maximum depth reached]
			),
			(int) 6 => array(
				[maximum depth reached]
			),
			(int) 7 => array(
				[maximum depth reached]
			),
			(int) 8 => array(
				[maximum depth reached]
			),
			(int) 9 => array(
				[maximum depth reached]
			),
			(int) 10 => array(
				[maximum depth reached]
			)
		),
		'FacultySpecialization' => array(
			(int) 0 => array(
				[maximum depth reached]
			),
			(int) 1 => array(
				[maximum depth reached]
			)
		),
		'FacultyPaper' => array(
			(int) 0 => array(
				[maximum depth reached]
			),
			(int) 1 => array(
				[maximum depth reached]
			),
			(int) 2 => array(
				[maximum depth reached]
			),
			(int) 3 => array(
				[maximum depth reached]
			),
			(int) 4 => array(
				[maximum depth reached]
			),
			(int) 5 => array(
				[maximum depth reached]
			),
			(int) 6 => array(
				[maximum depth reached]
			),
			(int) 7 => array(
				[maximum depth reached]
			),
			(int) 8 => array(
				[maximum depth reached]
			),
			(int) 9 => array(
				[maximum depth reached]
			),
			(int) 10 => array(
				[maximum depth reached]
			),
			(int) 11 => array(
				[maximum depth reached]
			),
			(int) 12 => array(
				[maximum depth reached]
			),
			(int) 13 => array(
				[maximum depth reached]
			),
			(int) 14 => array(
				[maximum depth reached]
			),
			(int) 15 => array(
				[maximum depth reached]
			),
			(int) 16 => array(
				[maximum depth reached]
			),
			(int) 17 => array(
				[maximum depth reached]
			),
			(int) 18 => array(
				[maximum depth reached]
			),
			(int) 19 => array(
				[maximum depth reached]
			),
			(int) 20 => array(
				[maximum depth reached]
			),
			(int) 21 => array(
				[maximum depth reached]
			),
			(int) 22 => array(
				[maximum depth reached]
			),
			(int) 23 => array(
				[maximum depth reached]
			),
			(int) 24 => array(
				[maximum depth reached]
			),
			(int) 25 => array(
				[maximum depth reached]
			),
			(int) 26 => array(
				[maximum depth reached]
			),
			(int) 27 => array(
				[maximum depth reached]
			),
			(int) 28 => array(
				[maximum depth reached]
			),
			(int) 29 => array(
				[maximum depth reached]
			),
			(int) 30 => array(
				[maximum depth reached]
			),
			(int) 31 => array(
				[maximum depth reached]
			),
			(int) 32 => array(
				[maximum depth reached]
			),
			(int) 33 => array(
				[maximum depth reached]
			),
			(int) 34 => array(
				[maximum depth reached]
			),
			(int) 35 => array(
				[maximum depth reached]
			),
			(int) 36 => array(
				[maximum depth reached]
			),
			(int) 37 => array(
				[maximum depth reached]
			),
			(int) 38 => array(
				[maximum depth reached]
			),
			(int) 39 => array(
				[maximum depth reached]
			),
			(int) 40 => array(
				[maximum depth reached]
			),
			(int) 41 => array(
				[maximum depth reached]
			),
			(int) 42 => array(
				[maximum depth reached]
			),
			(int) 43 => array(
				[maximum depth reached]
			),
			(int) 44 => array(
				[maximum depth reached]
			),
			(int) 45 => array(
				[maximum depth reached]
			),
			(int) 46 => array(
				[maximum depth reached]
			),
			(int) 47 => array(
				[maximum depth reached]
			),
			(int) 48 => array(
				[maximum depth reached]
			),
			(int) 49 => array(
				[maximum depth reached]
			),
			(int) 50 => array(
				[maximum depth reached]
			),
			(int) 51 => array(
				[maximum depth reached]
			),
			(int) 52 => array(
				[maximum depth reached]
			),
			(int) 53 => array(
				[maximum depth reached]
			),
			(int) 54 => array(
				[maximum depth reached]
			),
			(int) 55 => array(
				[maximum depth reached]
			),
			(int) 56 => array(
				[maximum depth reached]
			),
			(int) 57 => array(
				[maximum depth reached]
			),
			(int) 58 => array(
				[maximum depth reached]
			),
			(int) 59 => array(
				[maximum depth reached]
			),
			(int) 60 => array(
				[maximum depth reached]
			),
			(int) 61 => array(
				[maximum depth reached]
			),
			(int) 62 => array(
				[maximum depth reached]
			),
			(int) 63 => array(
				[maximum depth reached]
			),
			(int) 64 => array(
				[maximum depth reached]
			),
			(int) 65 => array(
				[maximum depth reached]
			),
			(int) 66 => array(
				[maximum depth reached]
			),
			(int) 67 => array(
				[maximum depth reached]
			),
			(int) 68 => array(
				[maximum depth reached]
			),
			(int) 69 => array(
				[maximum depth reached]
			),
			(int) 70 => array(
				[maximum depth reached]
			),
			(int) 71 => array(
				[maximum depth reached]
			),
			(int) 72 => array(
				[maximum depth reached]
			),
			(int) 73 => array(
				[maximum depth reached]
			),
			(int) 74 => array(
				[maximum depth reached]
			),
			(int) 75 => array(
				[maximum depth reached]
			),
			(int) 76 => array(
				[maximum depth reached]
			),
			(int) 77 => array(
				[maximum depth reached]
			),
			(int) 78 => array(
				[maximum depth reached]
			),
			(int) 79 => array(
				[maximum depth reached]
			),
			(int) 80 => array(
				[maximum depth reached]
			),
			(int) 81 => array(
				[maximum depth reached]
			),
			(int) 82 => array(
				[maximum depth reached]
			),
			(int) 83 => array(
				[maximum depth reached]
			),
			(int) 84 => array(
				[maximum depth reached]
			),
			(int) 85 => array(
				[maximum depth reached]
			),
			(int) 86 => array(
				[maximum depth reached]
			),
			(int) 87 => array(
				[maximum depth reached]
			),
			(int) 88 => array(
				[maximum depth reached]
			),
			(int) 89 => array(
				[maximum depth reached]
			),
			(int) 90 => array(
				[maximum depth reached]
			),
			(int) 91 => array(
				[maximum depth reached]
			),
			(int) 92 => array(
				[maximum depth reached]
			)
		),
		'FacultyResearch' => array(
			(int) 0 => array(
				[maximum depth reached]
			)
		)
	),
	'subs' => array(
		(int) 0 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 1 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 2 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 3 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 4 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 5 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 6 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 7 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 8 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 9 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		),
		(int) 10 => array(
			'FacultySubject' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		)
	),
	'results' => array(
		(int) 0 => array(
			'FacultyResearch' => array(
				[maximum depth reached]
			),
			'Faculty' => array(
				[maximum depth reached]
			)
		)
	),
	'frs' => array(),
	'fpubl' => array(),
	'content_for_layout' => '<style>
@media only screen and (max-width: 600px) {
    #paper {
        magin-left: -75px !important;
    }
}
</style>
<div class="banner">
    <!--  page header section -->
    <div class="page-title">
        <div class="container">
            <div class="row" style="background-color: #0080d5;">
                <div class="col-md-12 ptn-bg">
                    <h2>Computer Engineering </h2>
                    <ol class="breadcrumb">
                        <li><a href="/">Home</a></li>
                        <li class="active">Computer Engineering</li>
                    </ol>
                </div>
            </div>
        </div>
    </div>
</div>
<!--  Main-container start -->

<div class="container things" style="margin:0;width: 100%;" >
    <div class="col-md-12"> <br/><br/>
        <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/>
        <!--  Page Content start -->
        <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;">
            <a href="javascript:window.history.back()">
                <button class="btn">
                    <i class="fa fa-arrow-left"></i>
                    &nbsp;&nbsp;Back
                </button>
            </a>
        </div>
                  
        <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;">
            <div class="col-md-12">
                <div class="col-md-3">
                    <img src="https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg_160.jpg" alt="" />                </div>
                <div class="col-md-8"> <br/> <br/>
                    <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Head of Department<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/>					

                                    </div>
                
                <!-- Modal -->
                <div class="modal fade" id="myModal" role="dialog">
                    <div class="modal-dialog" style="width:850px;">
                        <div class="modal-content">
                            <div class="modal-header">
                                <button type="button" class="close" data-dismiss="modal">&times;</button>
                                <h4 class="modal-title">Dr. Lata Ragha </h4>
                            </div>
                            <div class="modal-body">
                                <object class="displaypdf" data="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-trace').style.display = (document.getElementById('cakeErr641c8f14afe54-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyResume [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>82</b>]<div id="cakeErr641c8f14afe54-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-code').style.display = (document.getElementById('cakeErr641c8f14afe54-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-context').style.display = (document.getElementById('cakeErr641c8f14afe54-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14afe54-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;/</span><span style="color: #0000BB">div</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code></span></pre><pre id="cakeErr641c8f14afe54-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 82
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha" type="application/pdf" width="800px" height="500px">
                                    <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-trace').style.display = (document.getElementById('cakeErr641c8f14b470f-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyResume [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>83</b>]<div id="cakeErr641c8f14b470f-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-code').style.display = (document.getElementById('cakeErr641c8f14b470f-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-context').style.display = (document.getElementById('cakeErr641c8f14b470f-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14b470f-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;p&gt;&lt;b&gt;Error:&lt;/b&gt;:&nbsp;This&nbsp;browser&nbsp;does&nbsp;not&nbsp;support&nbsp;PDFs.&nbsp;Please&nbsp;download&nbsp;the&nbsp;PDF&nbsp;to&nbsp;view&nbsp;it:&nbsp;&lt;a&nbsp;href="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&gt;Download&nbsp;PDF&lt;/a&gt;.&lt;/p&gt;
</span></code></span></pre><pre id="cakeErr641c8f14b470f-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 83
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p>
                                </object>
                            </div>
                            <div class="modal-footer">
                                <button type="button" class="btn btn-default" data-dismiss="modal">Close</button>
                            </div>
                        </div>
                    </div>
                </div>

                <!-- Modal 2 -->
                <div class="modal fade" id="myPublModal" role="dialog">
                    <div class="modal-dialog" style="width:850px;">
                        <div class="modal-content">
                            <div class="modal-header">
                                <button type="button" class="close" data-dismiss="modal">&times;</button>
                                <h4 class="modal-title">Dr. Lata Ragha </h4>
                            </div>
                            <div class="modal-body">
                                <object class="displaypdf" data="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-trace').style.display = (document.getElementById('cakeErr641c8f14b8aeb-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>102</b>]<div id="cakeErr641c8f14b8aeb-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-code').style.display = (document.getElementById('cakeErr641c8f14b8aeb-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-context').style.display = (document.getElementById('cakeErr641c8f14b8aeb-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14b8aeb-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;/</span><span style="color: #0000BB">div</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code></span></pre><pre id="cakeErr641c8f14b8aeb-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 102
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha" type="application/pdf" width="800px" height="500px">
                                    <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-trace').style.display = (document.getElementById('cakeErr641c8f14be646-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>103</b>]<div id="cakeErr641c8f14be646-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-code').style.display = (document.getElementById('cakeErr641c8f14be646-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-context').style.display = (document.getElementById('cakeErr641c8f14be646-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14be646-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;p&gt;&lt;b&gt;Error:&lt;/b&gt;:&nbsp;This&nbsp;browser&nbsp;does&nbsp;not&nbsp;support&nbsp;PDFs.&nbsp;Please&nbsp;download&nbsp;the&nbsp;PDF&nbsp;to&nbsp;view&nbsp;it:&nbsp;&lt;a&nbsp;href="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&gt;Download&nbsp;PDF&lt;/a&gt;.&lt;/p&gt;
</span></code></span></pre><pre id="cakeErr641c8f14be646-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 103
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p>
                                </object>
                            </div>
                            <div class="modal-footer">
                                <button type="button" class="btn btn-default" data-dismiss="modal">Close</button>
                            </div>
                        </div>
                    </div>
                </div>
  
                <!-- Modal content-->
            
            <div class="col-md-12" style="margin-top: 20px;">
                <ul class="nav nav-pills" style="margin-left: 13px;">
                    <!--li class="active"><a href="#subject" role="tab"  data-toggle="tab">Subjects Taught</a></li-->
                    <li><a href="#specialization" role="tab"  data-toggle="tab">Areas of Specialization</a></li>
                    <li><a href="#subject" role="tab"  data-toggle="tab">Subjects Taught</a></li>
                    <!-- <li><a href="#paper" role="tab"  data-toggle="tab">Papers Presented</a></li> -->
                    <li><a href="#research" role="tab"  data-toggle="tab">Research Projects</a></li>
                </ul>
                <div class="tab-content" style="margin: 20px 0px 0px 30px;">
                    <div class="tab-pane row active" id="specialization">
                        <p>1. Computer Networks and Security</p>
<p>2. Routing Protocols</p>
<p>3. Data Mining</p>
<p>4. Parallel and distributed computing</p>
<p>5.&nbsp;System/Information Security</p>                    </div>
                    <div class="tab-pane row" id="subject">
                        <h3>UG Subjects</h3>
                        <hr style="border-bottom:1px solid #9BBA6E;">
                        <table class="table table-striped table-bordered table-condensed">
                            <tr>
                                <th>Sr no</th>
                                <th>Subject</th>
                                <th>Semester</th>
                            </tr>
                                                                <tr>
                                        <td>1</td>
                                        <td>Computer Graphics</td>
                                        <td>IV</td>
                                    </tr>
                                                                        <tr>
                                        <td>2</td>
                                        <td>Computer Networks</td>
                                        <td>V</td>
                                    </tr>
                                                                        <tr>
                                        <td>3</td>
                                        <td>System Programming and Compiler Construction</td>
                                        <td>VI</td>
                                    </tr>
                                                                        <tr>
                                        <td>4</td>
                                        <td>Computer Simulation and Modelling </td>
                                        <td>VII</td>
                                    </tr>
                                                                        <tr>
                                        <td>5</td>
                                        <td>Cryptography and System Security</td>
                                        <td>VII</td>
                                    </tr>
                                                                        <tr>
                                        <td>6</td>
                                        <td>Adhoc Wireless Networks (Elective)</td>
                                        <td>VIII</td>
                                    </tr>
                                                                        <tr>
                                        <td>7</td>
                                        <td>Parallel and Distributed Computing </td>
                                        <td>VIII</td>
                                    </tr>
                                                            </table>
                                                    <h3>PG Subjects</h3>
                            <hr style="border-bottom:1px solid #9BBA6E;">
                            <table class="table table-striped table-bordered table-condensed">
                                <tr>
                                    <th>Sr no</th>
                                    <th>Subject</th>
                                    <th>Semester</th>
                                </tr>
                                                                        <tr>
                                            <td>1</td>
                                            <td>Advanced Computing and Network Design</td>
                                            <td>I</td>
                                        </tr>
                                                                                <tr>
                                            <td>2</td>
                                            <td>Parallel Computing</td>
                                            <td>I</td>
                                        </tr>
                                                                                <tr>
                                            <td>3</td>
                                            <td>Object Oriented Analysis and Design</td>
                                            <td>I</td>
                                        </tr>
                                                                                <tr>
                                            <td>4</td>
                                            <td>Advanced Database Systems</td>
                                            <td>II</td>
                                        </tr>
                                                                    </table>
                        

                    </div>
                    <div class="tab-pane row" id="paper" style="margin-left: -65px;">
                        <table class="table table-striped table-bordered table-condensed">
                            <thead>
                                <tr>
                                    <th>Sr no</th>
                                    <th style="text-align:center;">Title</th>
                                    <th style="text-align:center;">Description</th>

                                </tr>
                            </thead>
                            <tbody style="font-family: dosis;font-style: normal;">
                                <tr><td>1</td><td>A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network<br/></td><td>                                <a href="" target="_blank">
                                    ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.<a><br/></td></tr><tr><td>2</td><td>Enrich Security in MANET by Avoiding Wormhole Attack<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).<a><br/></td></tr><tr><td>3</td><td>A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network<br/></td><td>                                <a href="" target="_blank">
                                    4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore<a><br/></td></tr><tr><td>4</td><td>Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.<a><br/></td></tr><tr><td>5</td><td>Session Management in Internet Services using Continuous Authentication<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.<a><br/></td></tr><tr><td>6</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.<a><br/></td></tr><tr><td>7</td><td>An Efficient Searching Technique for Mobile Cloud on Encrypted Data<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.<a><br/></td></tr><tr><td>8</td><td>Session Management using Continuous Authentication in Internet Services: A Survey<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.<a><br/></td></tr><tr><td>9</td><td>Avoidance of Co-operative black hole attack in AODV in MANET<br/></td><td>                                <a href="" target="_blank">
                                    IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.<a><br/></td></tr><tr><td>10</td><td>Expectation based Aggressor Recognizable proof in MANET<br/></td><td>                                <a href="" target="_blank">
                                    IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore<a><br/></td></tr><tr><td>11</td><td>Session Passwords Using Three Level Authentication System<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29<a><br/></td></tr><tr><td>12</td><td>Supervised Web Forum Crawling<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.<a><br/></td></tr><tr><td>13</td><td>Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET<br/></td><td>                                <a href="" target="_blank">
                                    IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore<a><br/></td></tr><tr><td>14</td><td>A Review of Web Forum Crawling Techniques<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 <a><br/></td></tr><tr><td>15</td><td>Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015<a><br/></td></tr><tr><td>16</td><td>Performance Evaluation of Decision Trees for Uncertain Data Mining<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014<a><br/></td></tr><tr><td>17</td><td>Secure AODV against Control Packet Dropping Attack <br/></td><td>                                <a href="" target="_blank">
                                    2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>18</td><td>Tree Based Routing Mechanism for MANET <br/></td><td>                                <a href="" target="_blank">
                                    2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015<a><br/></td></tr><tr><td>19</td><td>A Survey on Routing Protocols in Wireless Sensor Networks<br/></td><td>                                <a href="" target="_blank">
                                    International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>20</td><td>Web Structure Mining Using Breadth First Search with Page Rank<br/></td><td>                                <a href="" target="_blank">
                                    International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>21</td><td>Bigdata Analysis Using Columnar Database<br/></td><td>                                <a href="" target="_blank">
                                    International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul<a><br/></td></tr><tr><td>22</td><td>Secure Routing against Control Packet Dropping Attack<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.<a><br/></td></tr><tr><td>23</td><td>Feature and Opinion Identification for Online Digital Camera Reviews <br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.<a><br/></td></tr><tr><td>24</td><td>A Genetic Approach for processor Scheduling<br/></td><td>                                <a href="" target="_blank">
                                    IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.<a><br/></td></tr><tr><td>25</td><td>Detecting and Avoiding Black Hole Attack in the MANETs<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat<a><br/></td></tr><tr><td>26</td><td>Dynamic Quantum based Genetic Round Robin Algorithm<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.<a><br/></td></tr><tr><td>27</td><td>Decision Trees for Uncertain Data Mining<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.<a><br/></td></tr><tr><td>28</td><td>Clustering in Cloud Computing Environment<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.<a><br/></td></tr><tr><td>29</td><td>FITM: FEROM Informal Text Mining<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.<a><br/></td></tr><tr><td>30</td><td>Personalized Image Search Optimization<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.<a><br/></td></tr><tr><td>31</td><td>Forensic sketch-Photo Matching using LFDA<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.<a><br/></td></tr><tr><td>32</td><td>Hybrid approach for credit card fraud detection<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.<a><br/></td></tr><tr><td>33</td><td>Forensic sketch to Mugshot Photo Matching<br/></td><td>                                <a href="" target="_blank">
                                    International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.<a><br/></td></tr><tr><td>34</td><td>Change Detection In satellite Images using DWT and PCA<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.<a><br/></td></tr><tr><td>35</td><td>Recognition on Road Vehicle Based on EDA <br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 <a><br/></td></tr><tr><td>36</td><td>Survey on Estimation of Distribution Algorithm Techniques<br/></td><td>                                <a href="" target="_blank">
                                    International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013<a><br/></td></tr><tr><td>37</td><td>Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>38</td><td> Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis<br/></td><td>                                <a href="" target="_blank">
                                    Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.<a><br/></td></tr><tr><td>39</td><td>Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.<a><br/></td></tr><tr><td>40</td><td>Change Detection in Satellite Images Using PCA and K-means Clustering <br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>41</td><td>3D-Deformable Model Based Recognition and Labeling on Road Vehicle <br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. <a><br/></td></tr><tr><td>42</td><td>Security Enabled DSR for Establishing Symmetric Key and Security in MANETS<br/></td><td>                                <a href="" target="_blank">
                                    Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore<a><br/></td></tr><tr><td>43</td><td>Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis<br/></td><td>                                <a href="" target="_blank">
                                    World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>44</td><td>Cooperative Security Agents for MANET<br/></td><td>                                <a href="" target="_blank">
                                    World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore<a><br/></td></tr><tr><td>45</td><td>Hybrid Approach for DB Intrusion Detection with Reactive Policies<br/></td><td>                                <a href="" target="_blank">
                                    IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore<a><br/></td></tr><tr><td>46</td><td>Privacy Preserving in Data Mining Using Hybrid Approach<br/></td><td>                                <a href="" target="_blank">
                                    IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore<a><br/></td></tr><tr><td>47</td><td>A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack<br/></td><td>                                <a href="" target="_blank">
                                    4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET<a><br/></td></tr><tr><td>48</td><td>Comparing performance of Collaborative Filtering Algorithms<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>49</td><td>Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.<a><br/></td></tr><tr><td>50</td><td>Incremental Frequent Pattern Mining<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012<a><br/></td></tr><tr><td>51</td><td>Detection of phishing email using textual and lexical URL analysis <br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Computer Science and Information Technology, pp.105-110, July 2012.<a><br/></td></tr><tr><td>52</td><td>Review of Incremental Association Rule Mining Algorithms<br/></td><td>                                <a href="" target="_blank">
                                    IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.<a><br/></td></tr><tr><td>53</td><td>Association Rule Mining Using Graph and Clustering Technique<br/></td><td>                                <a href="" target="_blank">
                                    Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012<a><br/></td></tr><tr><td>54</td><td>Security in MANETs using Symmetric Keys – A New Approach<br/></td><td>                                <a href="" target="_blank">
                                    International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012<a><br/></td></tr><tr><td>55</td><td>Security in MANETs using Symmetric Keys – A New Approach <br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, <a><br/></td></tr><tr><td>56</td><td>Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.<a><br/></td></tr><tr><td>57</td><td>Hybrid Reactive Database Intrusion Detection System<br/></td><td>                                <a href="" target="_blank">
                                    International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th  - 2012, SBIN:0030366<a><br/></td></tr><tr><td>58</td><td>Need base Security with IDRS for Cloud Computing<br/></td><td>                                <a href="" target="_blank">
                                    International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th  - 2012, SBIN:0030366<a><br/></td></tr><tr><td>59</td><td>Data Integrity and Confidentiality in Outsourced Database<br/></td><td>                                <a href="" target="_blank">
                                    ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012<a><br/></td></tr><tr><td>60</td><td>Integrity and Confidentiality of character query in Outsourced Database<br/></td><td>                                <a href="" target="_blank">
                                    National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India<a><br/></td></tr><tr><td>61</td><td>Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol<br/></td><td>                                <a href="" target="_blank">
                                    5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.<a><br/></td></tr><tr><td>62</td><td>A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack<br/></td><td>                                <a href="" target="_blank">
                                    World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.<a><br/></td></tr><tr><td>63</td><td>User Trust Based Collaborative Filtering Algorithm for Recommendation System<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.<a><br/></td></tr><tr><td>64</td><td>Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>65</td><td>A Flooding Based Distributed Denial of Service Attack Defense Mechanism<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>66</td><td>Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>67</td><td>Multilevel Multidimensional Trust Model for Group based Applications<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.<a><br/></td></tr><tr><td>68</td><td>Identification of New Approach for Runtime Enforcement of Web Service Security<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.<a><br/></td></tr><tr><td>69</td><td>Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. <a><br/></td></tr><tr><td>70</td><td>Dynamic enforcement of web service security<br/></td><td>                                <a href="" target="_blank">
                                    National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.<a><br/></td></tr><tr><td>71</td><td>Detecting Malicious Dropping Attack in the Internet<br/></td><td>                                <a href="" target="_blank">
                                    International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011<a><br/></td></tr><tr><td>72</td><td>An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.<a><br/></td></tr><tr><td>73</td><td>Malicious Dropping Attack in the Internet: Impacts and Solution<br/></td><td>                                <a href="" target="_blank">
                                    International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.<a><br/></td></tr><tr><td>74</td><td>Multiple Route Selector BGP (MRS-BGP)<br/></td><td>                                <a href="" target="_blank">
                                    International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.<a><br/></td></tr><tr><td>75</td><td>Multipath Routing in the Internet<br/></td><td>                                <a href="" target="_blank">
                                    International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.<a><br/></td></tr><tr><td>76</td><td>Performance Improvement of Selective Unidirectional Links in Cluster Based Routing<br/></td><td>                                <a href="" target="_blank">
                                    International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.<a><br/></td></tr><tr><td>77</td><td>Proactive Approach for Dynamic Source Routing Protocol<br/></td><td>                                <a href="" target="_blank">
                                    International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.<a><br/></td></tr><tr><td>78</td><td>Comparative Study of CSS and YASS Stemming Algorithms<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>79</td><td>Hybrid Approach for Optimal Design of Distributed Database System<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, EC2IT-09, KJSCE, 20-21, March, 2009<a><br/></td></tr><tr><td>80</td><td>Different Approaches to Classify Threaten E-Mails<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009<a><br/></td></tr><tr><td>81</td><td>Enhanced Cluster based Routing with Unilinks<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. <a><br/></td></tr><tr><td>82</td><td>Performance Improvement in CBR using Selective Unidirectional Link<br/></td><td>                                <a href="" target="_blank">
                                    International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India <a><br/></td></tr><tr><td>83</td><td>User Agent Based Heterogeneous Distributed Database System<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008<a><br/></td></tr><tr><td>84</td><td>Comparative Study of Secure Internet Routing Protocols<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai<a><br/></td></tr><tr><td>85</td><td>Enhanced BGP Routing for Network Engineering<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>86</td><td>An Enhanced Fault-Tolerant Routing Protocol in the Internet<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai<a><br/></td></tr><tr><td>87</td><td>Multi-Agents in Knowledge Management Systems<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Advances in Computing, February 21-22, 2008, Chikhli, <a><br/></td></tr><tr><td>88</td><td>Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs<br/></td><td>                                <a href="" target="_blank">
                                    SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online <a><br/></td></tr><tr><td>89</td><td>KONCERN - Hand Gesture Recognition System For Physically Impaired<br/></td><td>                                <a href="" target="_blank">
                                    International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. <a><br/></td></tr><tr><td>90</td><td>Security Issues in an Adhoc Networks<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>91</td><td>KONCERN-Hand Gesture Recognition System For Physically Impaired<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai<a><br/></td></tr><tr><td>92</td><td>Wireless Sensor Networks<br/></td><td>                                <a href="" target="_blank">
                                    National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. <a><br/></td></tr><tr><td>93</td><td>BIOMETRICS – IRIS RECOGNITION<br/></td><td>                                <a href="" target="_blank">
                                    National Conference, SFIT, 4-6 Jan-2007, Mumbai.<a><br/></td></tr>                                </tbody>
                        </table>
                    </div>
                    <div class="tab-pane row" id="research">
                        <table class="table table-striped table-bordered table-condensed">
                            <tr>
                                <th>Sr no</th>
                                <th>Name of Research Project</th>
                                <th>Type of Grant</th>
                                <th>Name of funding Organization</th>
                                <th>Amount (Rs.)</th>
                                <th>Duration</th>
                            </tr>
                                                            <tr>
                                    <td>1</td>
                                    <td>M-Vision</td>
                                    <td>Minor </td>
                                    <td>University of Mumbai</td>
                                    <td>Rs. 35000/-</td>
                                    <td>2018-19</td>
                                </tr>
                                                    </table>

                    </div>
                </div>
            </div>
        </div>
    </div>
</div>
</div> ',
	'scripts_for_layout' => '',
	'title_for_layout' => 'Faculties'
)
$details = array(
	'Faculty' => array(
		'id' => '18',
		'department_id' => '2',
		'sr_no' => '1',
		'name' => 'Dr. Lata Ragha',
		'qualification' => 'Ph.D',
		'designation' => 'Head of Department',
		'email_address' => 'lata.ragha@fcrit.ac.in',
		'joining_date' => '2016-12-21',
		'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
		'teaching_staff' => '1',
		'created_timestamp' => '2015-02-03 19:11:43'
	),
	'Department' => array(
		'id' => '2',
		'name' => 'Computer Engineering',
		'description' => '<p>All the computer related courses</p>',
		'created_by' => '1',
		'created_timestamp' => '2014-10-17 20:43:35',
		'facultyList' => 'https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf',
		'Roadmap' => 'https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf',
		'infrastructure' => '/img/not_available'
	),
	'FacultySubject' => array(
		(int) 0 => array(
			'id' => '410',
			'faculty_id' => '18',
			'subject' => 'Computer Graphics',
			'type' => 'Under Graduate',
			'semester' => 'IV',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:47:34'
		),
		(int) 1 => array(
			'id' => '411',
			'faculty_id' => '18',
			'subject' => 'Computer Networks',
			'type' => 'Under Graduate',
			'semester' => 'V',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:47:59'
		),
		(int) 2 => array(
			'id' => '412',
			'faculty_id' => '18',
			'subject' => 'System Programming and Compiler Construction',
			'type' => 'Under Graduate',
			'semester' => 'VI',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:48:32'
		),
		(int) 3 => array(
			'id' => '413',
			'faculty_id' => '18',
			'subject' => 'Cryptography and System Security',
			'type' => 'Under Graduate',
			'semester' => 'VII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:48:54'
		),
		(int) 4 => array(
			'id' => '414',
			'faculty_id' => '18',
			'subject' => 'Computer Simulation and Modelling ',
			'type' => 'Under Graduate',
			'semester' => 'VII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:49:19'
		),
		(int) 5 => array(
			'id' => '415',
			'faculty_id' => '18',
			'subject' => 'Parallel and Distributed Computing ',
			'type' => 'Under Graduate',
			'semester' => 'VIII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:49:49'
		),
		(int) 6 => array(
			'id' => '416',
			'faculty_id' => '18',
			'subject' => 'Adhoc Wireless Networks (Elective)',
			'type' => 'Under Graduate',
			'semester' => 'VIII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:50:23'
		),
		(int) 7 => array(
			'id' => '417',
			'faculty_id' => '18',
			'subject' => 'Advanced Database Systems',
			'type' => 'Post Graduate',
			'semester' => 'II',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:50:50'
		),
		(int) 8 => array(
			'id' => '418',
			'faculty_id' => '18',
			'subject' => 'Object Oriented Analysis and Design',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:51:16'
		),
		(int) 9 => array(
			'id' => '419',
			'faculty_id' => '18',
			'subject' => 'Parallel Computing',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:51:55'
		),
		(int) 10 => array(
			'id' => '420',
			'faculty_id' => '18',
			'subject' => 'Advanced Computing and Network Design',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:52:33'
		)
	),
	'FacultySpecialization' => array(
		(int) 0 => array(
			'id' => '75',
			'faculty_id' => '18',
			'description' => '<p>1. Computer Networks and Security</p>
<p>2. Routing Protocols</p>
<p>3. Data Mining</p>
<p>4. Parallel and distributed computing</p>
<p>5.&nbsp;System/Information Security</p>',
			'created_by' => '1',
			'created_timestamp' => '2015-02-10 15:34:50'
		),
		(int) 1 => array(
			'id' => '85',
			'faculty_id' => '18',
			'description' => '<p>1. Computer Networks and Security</p>
<p>2. Routing Protocols</p>
<p>3. Data Mining</p>
<p>4. Parallel and distributed computing</p>
<p>5. System/Information Security</p>',
			'created_by' => '1',
			'created_timestamp' => '2017-01-18 21:04:32'
		)
	),
	'FacultyPaper' => array(
		(int) 0 => array(
			'id' => '285',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network',
			'description' => 'ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:50:17'
		),
		(int) 1 => array(
			'id' => '286',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Enrich Security in MANET by Avoiding Wormhole Attack',
			'description' => 'International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:50:37'
		),
		(int) 2 => array(
			'id' => '287',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network',
			'description' => '4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:50:53'
		),
		(int) 3 => array(
			'id' => '288',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey',
			'description' => 'International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:51:11'
		),
		(int) 4 => array(
			'id' => '292',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Session Management in Internet Services using Continuous Authentication',
			'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:52:37'
		),
		(int) 5 => array(
			'id' => '293',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data',
			'description' => 'International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:54:09'
		),
		(int) 6 => array(
			'id' => '294',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'An Efficient Searching Technique for Mobile Cloud on Encrypted Data',
			'description' => 'International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:55:05'
		),
		(int) 7 => array(
			'id' => '295',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Session Management using Continuous Authentication in Internet Services: A Survey',
			'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:55:27'
		),
		(int) 8 => array(
			'id' => '296',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Avoidance of Co-operative black hole attack in AODV in MANET',
			'description' => 'IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:55:46'
		),
		(int) 9 => array(
			'id' => '297',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Expectation based Aggressor Recognizable proof in MANET',
			'description' => 'IEEE International Conference on Smart Structures & Systems (ICSSS-2016), March 23 & 24, 2016, Chennai-INDIA, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:56:02'
		),
		(int) 10 => array(
			'id' => '298',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Session Passwords Using Three Level Authentication System',
			'description' => 'International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 15:56:28'
		),
		(int) 11 => array(
			'id' => '299',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Supervised Web Forum Crawling',
			'description' => 'International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:04:31'
		),
		(int) 12 => array(
			'id' => '300',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET',
			'description' => 'IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:05:49'
		),
		(int) 13 => array(
			'id' => '301',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Review of Web Forum Crawling Techniques',
			'description' => 'International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:06:20'
		),
		(int) 14 => array(
			'id' => '302',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems',
			'description' => 'International Journal of Engineering Research & Technology , Volume-4, Issue 05, pp. 38-44, May-2015',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:07:10'
		),
		(int) 15 => array(
			'id' => '303',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Performance Evaluation of Decision Trees for Uncertain Data Mining',
			'description' => 'International Journal of Emerging Trends & Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:07:28'
		),
		(int) 16 => array(
			'id' => '304',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Secure AODV against Control Packet Dropping Attack ',
			'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:08:32'
		),
		(int) 17 => array(
			'id' => '305',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Tree Based Routing Mechanism for MANET ',
			'description' => '2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:08:48'
		),
		(int) 18 => array(
			'id' => '306',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Survey on Routing Protocols in Wireless Sensor Networks',
			'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:09:07'
		),
		(int) 19 => array(
			'id' => '307',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Web Structure Mining Using Breadth First Search with Page Rank',
			'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:09:24'
		),
		(int) 20 => array(
			'id' => '308',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Bigdata Analysis Using Columnar Database',
			'description' => 'International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:09:52'
		),
		(int) 21 => array(
			'id' => '309',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Secure Routing against Control Packet Dropping Attack',
			'description' => 'International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:10:18'
		),
		(int) 22 => array(
			'id' => '310',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Feature and Opinion Identification for Online Digital Camera Reviews ',
			'description' => 'International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:10:37'
		),
		(int) 23 => array(
			'id' => '311',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Genetic Approach for processor Scheduling',
			'description' => 'IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:11:14'
		),
		(int) 24 => array(
			'id' => '312',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Detecting and Avoiding Black Hole Attack in the MANETs',
			'description' => 'International Conference on Emerging Trends in Technology and it's Applications, 7-8th March 2014, YTCEM, Karjat',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:11:33'
		),
		(int) 25 => array(
			'id' => '313',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Dynamic Quantum based Genetic Round Robin Algorithm',
			'description' => 'International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:11:50'
		),
		(int) 26 => array(
			'id' => '314',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Decision Trees for Uncertain Data Mining',
			'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:12:11'
		),
		(int) 27 => array(
			'id' => '315',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Clustering in Cloud Computing Environment',
			'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:13:41'
		),
		(int) 28 => array(
			'id' => '316',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'FITM: FEROM Informal Text Mining',
			'description' => 'International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:13:57'
		),
		(int) 29 => array(
			'id' => '317',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Personalized Image Search Optimization',
			'description' => 'International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:14:14'
		),
		(int) 30 => array(
			'id' => '318',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Forensic sketch-Photo Matching using LFDA',
			'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 242-246, September 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:14:32'
		),
		(int) 31 => array(
			'id' => '319',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Hybrid approach for credit card fraud detection',
			'description' => 'International Journal of soft computing & Engineering, volume 3, Issue 4, pp. 8-11, September 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:14:53'
		),
		(int) 32 => array(
			'id' => '320',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Forensic sketch to Mugshot Photo Matching',
			'description' => 'International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:15:14'
		),
		(int) 33 => array(
			'id' => '321',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Change Detection In satellite Images using DWT and PCA',
			'description' => 'International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:15:39'
		),
		(int) 34 => array(
			'id' => '322',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Recognition on Road Vehicle Based on EDA ',
			'description' => 'International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:15:58'
		),
		(int) 35 => array(
			'id' => '323',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Survey on Estimation of Distribution Algorithm Techniques',
			'description' => 'International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:16:15'
		),
		(int) 36 => array(
			'id' => '324',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining',
			'description' => 'International Journal of Recent Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:16:34'
		),
		(int) 37 => array(
			'id' => '325',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => ' Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis',
			'description' => 'Trends in Engineering & Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:16:59'
		),
		(int) 38 => array(
			'id' => '326',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay',
			'description' => 'International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:17:16'
		),
		(int) 39 => array(
			'id' => '327',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Change Detection in Satellite Images Using PCA and K-means Clustering ',
			'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:17:49'
		),
		(int) 40 => array(
			'id' => '328',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => '3D-Deformable Model Based Recognition and Labeling on Road Vehicle ',
			'description' => 'International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:18:09'
		),
		(int) 41 => array(
			'id' => '329',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security Enabled DSR for Establishing Symmetric Key and Security in MANETS',
			'description' => 'Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:18:28'
		),
		(int) 42 => array(
			'id' => '330',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Phish Mail Guard : Phishing Mail Detection Technique by using Textual & URL analysis',
			'description' => 'World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:18:47'
		),
		(int) 43 => array(
			'id' => '331',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Cooperative Security Agents for MANET',
			'description' => 'World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:19:04'
		),
		(int) 44 => array(
			'id' => '332',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Hybrid Approach for DB Intrusion Detection with Reactive Policies',
			'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:19:24'
		),
		(int) 45 => array(
			'id' => '333',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Privacy Preserving in Data Mining Using Hybrid Approach',
			'description' => 'IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:19:45'
		),
		(int) 46 => array(
			'id' => '334',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack',
			'description' => '4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:20:04'
		),
		(int) 47 => array(
			'id' => '335',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Comparing performance of Collaborative Filtering Algorithms',
			'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:20:22'
		),
		(int) 48 => array(
			'id' => '336',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm',
			'description' => 'International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:20:39'
		),
		(int) 49 => array(
			'id' => '337',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Incremental Frequent Pattern Mining',
			'description' => 'International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:20:59'
		),
		(int) 50 => array(
			'id' => '338',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Detection of phishing email using textual and lexical URL analysis ',
			'description' => 'International Conference on Computer Science and Information Technology, pp.105-110, July 2012.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:21:17'
		),
		(int) 51 => array(
			'id' => '339',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Review of Incremental Association Rule Mining Algorithms',
			'description' => 'IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:22:05'
		),
		(int) 52 => array(
			'id' => '340',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Association Rule Mining Using Graph and Clustering Technique',
			'description' => 'Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:22:27'
		),
		(int) 53 => array(
			'id' => '341',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security in MANETs using Symmetric Keys – A New Approach',
			'description' => 'International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:22:48'
		),
		(int) 54 => array(
			'id' => '342',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security in MANETs using Symmetric Keys – A New Approach ',
			'description' => 'International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:23:05'
		),
		(int) 55 => array(
			'id' => '343',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs',
			'description' => 'International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education & Research, Nashik, 16th -17th March 2012.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:23:24'
		),
		(int) 56 => array(
			'id' => '344',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Hybrid Reactive Database Intrusion Detection System',
			'description' => 'International Conference & Workshop on Emerging Trends in Technology – 2012, February, 24th & 25th  - 2012, SBIN:0030366',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:23:42'
		),
		(int) 57 => array(
			'id' => '345',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Need base Security with IDRS for Cloud Computing',
			'description' => 'International Conference & Workshop On Emerging Trends in Technology – 2012, February, 24th & 25th  - 2012, SBIN:0030366',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:32:10'
		),
		(int) 58 => array(
			'id' => '346',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Data Integrity and Confidentiality in Outsourced Database',
			'description' => 'ICWET-12, February, 24th & 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:32:26'
		),
		(int) 59 => array(
			'id' => '347',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Integrity and Confidentiality of character query in Outsourced Database',
			'description' => 'National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:32:44'
		),
		(int) 60 => array(
			'id' => '348',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol',
			'description' => '5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:33:00'
		),
		(int) 61 => array(
			'id' => '349',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack',
			'description' => 'World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:33:18'
		),
		(int) 62 => array(
			'id' => '350',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'User Trust Based Collaborative Filtering Algorithm for Recommendation System',
			'description' => 'International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:33:37'
		),
		(int) 63 => array(
			'id' => '351',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm',
			'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:33:58'
		),
		(int) 64 => array(
			'id' => '352',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'A Flooding Based Distributed Denial of Service Attack Defense Mechanism',
			'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:34:18'
		),
		(int) 65 => array(
			'id' => '353',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol',
			'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:34:39'
		),
		(int) 66 => array(
			'id' => '354',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Multilevel Multidimensional Trust Model for Group based Applications',
			'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:34:56'
		),
		(int) 67 => array(
			'id' => '355',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Identification of New Approach for Runtime Enforcement of Web Service Security',
			'description' => 'International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:35:12'
		),
		(int) 68 => array(
			'id' => '356',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System',
			'description' => 'International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:35:38'
		),
		(int) 69 => array(
			'id' => '357',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Dynamic enforcement of web service security',
			'description' => 'National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:35:52'
		),
		(int) 70 => array(
			'id' => '358',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Detecting Malicious Dropping Attack in the Internet',
			'description' => 'International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:36:08'
		),
		(int) 71 => array(
			'id' => '359',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word',
			'description' => 'International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:36:26'
		),
		(int) 72 => array(
			'id' => '360',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Malicious Dropping Attack in the Internet: Impacts and Solution',
			'description' => 'International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:36:41'
		),
		(int) 73 => array(
			'id' => '361',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Multiple Route Selector BGP (MRS-BGP)',
			'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:36:58'
		),
		(int) 74 => array(
			'id' => '362',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Multipath Routing in the Internet',
			'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:37:14'
		),
		(int) 75 => array(
			'id' => '363',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Performance Improvement of Selective Unidirectional Links in Cluster Based Routing',
			'description' => 'International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:37:31'
		),
		(int) 76 => array(
			'id' => '364',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Proactive Approach for Dynamic Source Routing Protocol',
			'description' => 'International Conference & Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:38:42'
		),
		(int) 77 => array(
			'id' => '365',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Comparative Study of CSS and YASS Stemming Algorithms',
			'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:38:58'
		),
		(int) 78 => array(
			'id' => '366',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Hybrid Approach for Optimal Design of Distributed Database System',
			'description' => 'National Conference, EC2IT-09, KJSCE, 20-21, March, 2009',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:39:13'
		),
		(int) 79 => array(
			'id' => '367',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Different Approaches to Classify Threaten E-Mails',
			'description' => 'National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:39:29'
		),
		(int) 80 => array(
			'id' => '368',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Enhanced Cluster based Routing with Unilinks',
			'description' => 'National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:39:47'
		),
		(int) 81 => array(
			'id' => '369',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Performance Improvement in CBR using Selective Unidirectional Link',
			'description' => 'International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:40:05'
		),
		(int) 82 => array(
			'id' => '370',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'User Agent Based Heterogeneous Distributed Database System',
			'description' => 'International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:40:21'
		),
		(int) 83 => array(
			'id' => '371',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Comparative Study of Secure Internet Routing Protocols',
			'description' => 'National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:40:36'
		),
		(int) 84 => array(
			'id' => '372',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Enhanced BGP Routing for Network Engineering',
			'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:40:51'
		),
		(int) 85 => array(
			'id' => '373',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'An Enhanced Fault-Tolerant Routing Protocol in the Internet',
			'description' => 'National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:41:08'
		),
		(int) 86 => array(
			'id' => '374',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Multi-Agents in Knowledge Management Systems',
			'description' => 'International Conference on Advances in Computing, February 21-22, 2008, Chikhli, ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:41:26'
		),
		(int) 87 => array(
			'id' => '375',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs',
			'description' => 'SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:41:44'
		),
		(int) 88 => array(
			'id' => '376',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'KONCERN - Hand Gesture Recognition System For Physically Impaired',
			'description' => 'International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:42:01'
		),
		(int) 89 => array(
			'id' => '377',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Security Issues in an Adhoc Networks',
			'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:45:12'
		),
		(int) 90 => array(
			'id' => '378',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'KONCERN-Hand Gesture Recognition System For Physically Impaired',
			'description' => 'National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:45:31'
		),
		(int) 91 => array(
			'id' => '379',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'Wireless Sensor Networks',
			'description' => 'National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. ',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:45:49'
		),
		(int) 92 => array(
			'id' => '380',
			'faculty_id' => '18',
			'sr_no' => '0',
			'title' => 'BIOMETRICS – IRIS RECOGNITION',
			'description' => 'National Conference, SFIT, 4-6 Jan-2007, Mumbai.',
			'link' => '',
			'created_by' => '1',
			'created_timestamp' => '2017-11-29 16:46:06'
		)
	),
	'FacultyResearch' => array(
		(int) 0 => array(
			'id' => '92',
			'faculty_id' => '18',
			'title' => 'M-Vision',
			'grant_type' => 'Minor ',
			'funding_organization' => 'University of Mumbai',
			'amount' => 'Rs. 35000/-',
			'duration' => '2018-19',
			'created_by' => '1',
			'created_timestamp' => '2019-09-16 12:49:53'
		)
	)
)
$subs = array(
	(int) 0 => array(
		'FacultySubject' => array(
			'id' => '420',
			'faculty_id' => '18',
			'subject' => 'Advanced Computing and Network Design',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:52:33'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 1 => array(
		'FacultySubject' => array(
			'id' => '419',
			'faculty_id' => '18',
			'subject' => 'Parallel Computing',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:51:55'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 2 => array(
		'FacultySubject' => array(
			'id' => '418',
			'faculty_id' => '18',
			'subject' => 'Object Oriented Analysis and Design',
			'type' => 'Post Graduate',
			'semester' => 'I',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:51:16'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 3 => array(
		'FacultySubject' => array(
			'id' => '417',
			'faculty_id' => '18',
			'subject' => 'Advanced Database Systems',
			'type' => 'Post Graduate',
			'semester' => 'II',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:50:50'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 4 => array(
		'FacultySubject' => array(
			'id' => '410',
			'faculty_id' => '18',
			'subject' => 'Computer Graphics',
			'type' => 'Under Graduate',
			'semester' => 'IV',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:47:34'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 5 => array(
		'FacultySubject' => array(
			'id' => '411',
			'faculty_id' => '18',
			'subject' => 'Computer Networks',
			'type' => 'Under Graduate',
			'semester' => 'V',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:47:59'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 6 => array(
		'FacultySubject' => array(
			'id' => '412',
			'faculty_id' => '18',
			'subject' => 'System Programming and Compiler Construction',
			'type' => 'Under Graduate',
			'semester' => 'VI',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:48:32'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 7 => array(
		'FacultySubject' => array(
			'id' => '414',
			'faculty_id' => '18',
			'subject' => 'Computer Simulation and Modelling ',
			'type' => 'Under Graduate',
			'semester' => 'VII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:49:19'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 8 => array(
		'FacultySubject' => array(
			'id' => '413',
			'faculty_id' => '18',
			'subject' => 'Cryptography and System Security',
			'type' => 'Under Graduate',
			'semester' => 'VII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:48:54'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 9 => array(
		'FacultySubject' => array(
			'id' => '416',
			'faculty_id' => '18',
			'subject' => 'Adhoc Wireless Networks (Elective)',
			'type' => 'Under Graduate',
			'semester' => 'VIII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:50:23'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	),
	(int) 10 => array(
		'FacultySubject' => array(
			'id' => '415',
			'faculty_id' => '18',
			'subject' => 'Parallel and Distributed Computing ',
			'type' => 'Under Graduate',
			'semester' => 'VIII',
			'created_by' => '1',
			'created_timestamp' => '2018-03-19 09:49:49'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	)
)
$results = array(
	(int) 0 => array(
		'FacultyResearch' => array(
			'id' => '92',
			'faculty_id' => '18',
			'title' => 'M-Vision',
			'grant_type' => 'Minor ',
			'funding_organization' => 'University of Mumbai',
			'amount' => 'Rs. 35000/-',
			'duration' => '2018-19',
			'created_by' => '1',
			'created_timestamp' => '2019-09-16 12:49:53'
		),
		'Faculty' => array(
			'id' => '18',
			'department_id' => '2',
			'sr_no' => '1',
			'name' => 'Dr. Lata Ragha',
			'qualification' => 'Ph.D',
			'designation' => 'Head of Department',
			'email_address' => 'lata.ragha@fcrit.ac.in',
			'joining_date' => '2016-12-21',
			'image' => 'https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg',
			'teaching_staff' => '1',
			'created_timestamp' => '2015-02-03 19:11:43'
		)
	)
)
$frs = array()
$fpubl = array()
$content_for_layout = '<style>
@media only screen and (max-width: 600px) {
    #paper {
        magin-left: -75px !important;
    }
}
</style>
<div class="banner">
    <!--  page header section -->
    <div class="page-title">
        <div class="container">
            <div class="row" style="background-color: #0080d5;">
                <div class="col-md-12 ptn-bg">
                    <h2>Computer Engineering </h2>
                    <ol class="breadcrumb">
                        <li><a href="/">Home</a></li>
                        <li class="active">Computer Engineering</li>
                    </ol>
                </div>
            </div>
        </div>
    </div>
</div>
<!--  Main-container start -->

<div class="container things" style="margin:0;width: 100%;" >
    <div class="col-md-12"> <br/><br/>
        <h1 style="margin-left: 30px;"> Welcome to the Department of Computer Engineering</h1> <br/>
        <!--  Page Content start -->
        <div class="col-md-10 col-md-offset-1" style="margin-bottom: 20px;">
            <a href="javascript:window.history.back()">
                <button class="btn">
                    <i class="fa fa-arrow-left"></i>
                    &nbsp;&nbsp;Back
                </button>
            </a>
        </div>
                  
        <div class="col-md-10 col-md-offset-1" style="border: 1px solid #9bba6e;border-radius: 20px;padding-top: 20px;">
            <div class="col-md-12">
                <div class="col-md-3">
                    <img src="https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg_160.jpg" alt="" />                </div>
                <div class="col-md-8"> <br/> <br/>
                    <b>Name : Dr. Lata Ragha<br/>Qualification : Ph.D<br/>Designation : Head of Department<br/>Email id : lata.ragha@fcrit.ac.in<br/>Date of joining : 21 December 2016</b><br/>					

                                    </div>
                
                <!-- Modal -->
                <div class="modal fade" id="myModal" role="dialog">
                    <div class="modal-dialog" style="width:850px;">
                        <div class="modal-content">
                            <div class="modal-header">
                                <button type="button" class="close" data-dismiss="modal">&times;</button>
                                <h4 class="modal-title">Dr. Lata Ragha </h4>
                            </div>
                            <div class="modal-body">
                                <object class="displaypdf" data="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-trace').style.display = (document.getElementById('cakeErr641c8f14afe54-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyResume [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>82</b>]<div id="cakeErr641c8f14afe54-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-code').style.display = (document.getElementById('cakeErr641c8f14afe54-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14afe54-context').style.display = (document.getElementById('cakeErr641c8f14afe54-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14afe54-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;/</span><span style="color: #0000BB">div</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code></span></pre><pre id="cakeErr641c8f14afe54-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 82
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha" type="application/pdf" width="800px" height="500px">
                                    <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-trace').style.display = (document.getElementById('cakeErr641c8f14b470f-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyResume [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>83</b>]<div id="cakeErr641c8f14b470f-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-code').style.display = (document.getElementById('cakeErr641c8f14b470f-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b470f-context').style.display = (document.getElementById('cakeErr641c8f14b470f-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14b470f-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;p&gt;&lt;b&gt;Error:&lt;/b&gt;:&nbsp;This&nbsp;browser&nbsp;does&nbsp;not&nbsp;support&nbsp;PDFs.&nbsp;Please&nbsp;download&nbsp;the&nbsp;PDF&nbsp;to&nbsp;view&nbsp;it:&nbsp;&lt;a&nbsp;href="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyResume'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&gt;Download&nbsp;PDF&lt;/a&gt;.&lt;/p&gt;
</span></code></span></pre><pre id="cakeErr641c8f14b470f-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 83
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha">Download PDF</a>.</p>
                                </object>
                            </div>
                            <div class="modal-footer">
                                <button type="button" class="btn btn-default" data-dismiss="modal">Close</button>
                            </div>
                        </div>
                    </div>
                </div>

                <!-- Modal 2 -->
                <div class="modal fade" id="myPublModal" role="dialog">
                    <div class="modal-dialog" style="width:850px;">
                        <div class="modal-content">
                            <div class="modal-header">
                                <button type="button" class="close" data-dismiss="modal">&times;</button>
                                <h4 class="modal-title">Dr. Lata Ragha </h4>
                            </div>
                            <div class="modal-body">
                                <object class="displaypdf" data="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-trace').style.display = (document.getElementById('cakeErr641c8f14b8aeb-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>102</b>]<div id="cakeErr641c8f14b8aeb-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-code').style.display = (document.getElementById('cakeErr641c8f14b8aeb-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14b8aeb-context').style.display = (document.getElementById('cakeErr641c8f14b8aeb-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14b8aeb-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;/</span><span style="color: #0000BB">div</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code></span></pre><pre id="cakeErr641c8f14b8aeb-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic enforcement of web service security&#039;,
			&#039;description&#039; =&gt; &#039;National Conference Equinox-2011, TEC, Nerul, 27-29 September, 2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:52&#039;
		),
		(int) 70 =&gt; array(
			&#039;id&#039; =&gt; &#039;358&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting Malicious Dropping Attack in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Network Security, Volume 2 – No.1, pp. 27-31, Jan 2011&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:08&#039;
		),
		(int) 71 =&gt; array(
			&#039;id&#039; =&gt; &#039;359&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Spanning Tree Topology for Wireless Sensor Networks Word&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 1 – No.19, pp. 47-52, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:26&#039;
		),
		(int) 72 =&gt; array(
			&#039;id&#039; =&gt; &#039;360&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Malicious Dropping Attack in the Internet: Impacts and Solution&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Computer Applications, Volume 2 – No.3, pp. 31-35, May 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:41&#039;
		),
		(int) 73 =&gt; array(
			&#039;id&#039; =&gt; &#039;361&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multiple Route Selector BGP (MRS-BGP)&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 Feb 2010, ACM Digital Library, pp. 304-308.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:36:58&#039;
		),
		(int) 74 =&gt; array(
			&#039;id&#039; =&gt; &#039;362&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multipath Routing in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp. 814-819 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:14&#039;
		),
		(int) 75 =&gt; array(
			&#039;id&#039; =&gt; &#039;363&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement of Selective Unidirectional Links in Cluster Based Routing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference, ICETET-09, Nagpur, India, 16-18 December-2009, IEEE Computer Society, pp.1092-1096 Feb-2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:37:31&#039;
		),
		(int) 76 =&gt; array(
			&#039;id&#039; =&gt; &#039;364&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Proactive Approach for Dynamic Source Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology, Thakur College of Engg., Mumbai, 26-27 February 2010.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:42&#039;
		),
		(int) 77 =&gt; array(
			&#039;id&#039; =&gt; &#039;365&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of CSS and YASS Stemming Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:38:58&#039;
		),
		(int) 78 =&gt; array(
			&#039;id&#039; =&gt; &#039;366&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for Optimal Design of Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, EC2IT-09, KJSCE, 20-21, March, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:13&#039;
		),
		(int) 79 =&gt; array(
			&#039;id&#039; =&gt; &#039;367&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Different Approaches to Classify Threaten E-Mails&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, IEIT-09, VIT, Mumbai, October 5-6, 2009&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:29&#039;
		),
		(int) 80 =&gt; array(
			&#039;id&#039; =&gt; &#039;368&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced Cluster based Routing with Unilinks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCICT-09, 6-7 March 2009, DJSCE, Mumbai, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:39:47&#039;
		),
		(int) 81 =&gt; array(
			&#039;id&#039; =&gt; &#039;369&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Improvement in CBR using Selective Unidirectional Link&#039;,
			&#039;description&#039; =&gt; &#039;International Conference Advances in Computing Technologies, 26-27, December-08, GRIET, Hyderabad, India &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:05&#039;
		),
		(int) 82 =&gt; array(
			&#039;id&#039; =&gt; &#039;370&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Agent Based Heterogeneous Distributed Database System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Science and Technology Applications in Industry and Education, Malaysia, 12-13 December, 2008&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:21&#039;
		),
		(int) 83 =&gt; array(
			&#039;id&#039; =&gt; &#039;371&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Study of Secure Internet Routing Protocols&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCA-08, May-2008 at FCRCE, Bandra, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:36&#039;
		),
		(int) 84 =&gt; array(
			&#039;id&#039; =&gt; &#039;372&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enhanced BGP Routing for Network Engineering&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:40:51&#039;
		),
		(int) 85 =&gt; array(
			&#039;id&#039; =&gt; &#039;373&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Enhanced Fault-Tolerant Routing Protocol in the Internet&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, 13-14 March-2008, SIESGST, Navi-Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:08&#039;
		),
		(int) 86 =&gt; array(
			&#039;id&#039; =&gt; &#039;374&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multi-Agents in Knowledge Management Systems&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Computing, February 21-22, 2008, Chikhli, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:26&#039;
		),
		(int) 87 =&gt; array(
			&#039;id&#039; =&gt; &#039;375&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Various approaches used in Balancing inbound Traffic Engineering for Multihomed ASs&#039;,
			&#039;description&#039; =&gt; &#039;SPIT-IEEE Colloquium, February 4-5, 2008, Mumbai, India. Online &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:41:44&#039;
		),
		(int) 88 =&gt; array(
			&#039;id&#039; =&gt; &#039;376&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN - Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Systemics, Cybernetics and Informatics, 02-05, January-2008, Hyderabad, India. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:42:01&#039;
		),
		(int) 89 =&gt; array(
			&#039;id&#039; =&gt; &#039;377&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Issues in an Adhoc Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:12&#039;
		),
		(int) 90 =&gt; array(
			&#039;id&#039; =&gt; &#039;378&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;KONCERN-Hand Gesture Recognition System For Physically Impaired&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, NCDIM-07, 23-24 March- 2007, TSEC, Mumbai&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:31&#039;
		),
		(int) 91 =&gt; array(
			&#039;id&#039; =&gt; &#039;379&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on ICT-07, 1-3 March-2007, DJSCE, Mumbai. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:45:49&#039;
		),
		(int) 92 =&gt; array(
			&#039;id&#039; =&gt; &#039;380&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;BIOMETRICS – IRIS RECOGNITION&#039;,
			&#039;description&#039; =&gt; &#039;National Conference, SFIT, 4-6 Jan-2007, Mumbai.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:46:06&#039;
		)
	),
	&#039;FacultyResearch&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		)
	)
)
$subs = array(
	(int) 0 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 1 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 2 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 3 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 4 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 5 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 6 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 7 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 8 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 9 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	),
	(int) 10 =&gt; array(
		&#039;FacultySubject&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$results = array(
	(int) 0 =&gt; array(
		&#039;FacultyResearch&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;92&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;title&#039; =&gt; &#039;M-Vision&#039;,
			&#039;grant_type&#039; =&gt; &#039;Minor &#039;,
			&#039;funding_organization&#039; =&gt; &#039;University of Mumbai&#039;,
			&#039;amount&#039; =&gt; &#039;Rs. 35000/-&#039;,
			&#039;duration&#039; =&gt; &#039;2018-19&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2019-09-16 12:49:53&#039;
		),
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		)
	)
)
$frs = array()
$fpubl = array()
$date = (int) 1482258600</pre><pre class="stack-trace">include - APP\View\Faculties\faculty_details.ctp, line 102
View::_evaluate() - CORE\Cake\View\View.php, line 954
View::_render() - CORE\Cake\View\View.php, line 916
View::render() - CORE\Cake\View\View.php, line 479
Controller::render() - CORE\Cake\Controller\Controller.php, line 919
Dispatcher::_invoke() - CORE\Cake\Routing\Dispatcher.php, line 193
Dispatcher::dispatch() - CORE\Cake\Routing\Dispatcher.php, line 161
[main] - APP\webroot\index.php, line 105</pre></div></pre>/faculty/18/dr-lata-ragha" type="application/pdf" width="800px" height="500px">
                                    <p><b>Error:</b>: This browser does not support PDFs. Please download the PDF to view it: <a href="<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-trace').style.display = (document.getElementById('cakeErr641c8f14be646-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined index: FacultyPublication [<b>APP\View\Faculties\faculty_details.ctp</b>, line <b>103</b>]<div id="cakeErr641c8f14be646-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-code').style.display = (document.getElementById('cakeErr641c8f14be646-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr641c8f14be646-context').style.display = (document.getElementById('cakeErr641c8f14be646-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr641c8f14be646-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="color: #007700">&lt;</span><span style="color: #0000BB">div&nbsp;</span><span style="color: #007700">class=</span><span style="color: #DD0000">"modal-body"</span><span style="color: #007700">&gt;
</span></span></code>
<code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;object&nbsp;class="displaypdf"&nbsp;data="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$fpubl</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&nbsp;type="application/pdf"&nbsp;width="800px"&nbsp;height="500px"&gt;
</span></code>
<span class="code-highlight"><code><span style="color: #000000">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;p&gt;&lt;b&gt;Error:&lt;/b&gt;:&nbsp;This&nbsp;browser&nbsp;does&nbsp;not&nbsp;support&nbsp;PDFs.&nbsp;Please&nbsp;download&nbsp;the&nbsp;PDF&nbsp;to&nbsp;view&nbsp;it:&nbsp;&lt;a&nbsp;href="<span style="color: #0000BB">&lt;?php&nbsp;</span><span style="color: #007700">echo&nbsp;</span><span style="color: #0000BB">$this</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">Html</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">url</span><span style="color: #007700">(</span><span style="color: #0000BB">$frs</span><span style="color: #007700">[</span><span style="color: #DD0000">'FacultyPublication'</span><span style="color: #007700">][</span><span style="color: #DD0000">'attachment'</span><span style="color: #007700">]);&nbsp;</span><span style="color: #0000BB">?&gt;</span>"&gt;Download&nbsp;PDF&lt;/a&gt;.&lt;/p&gt;
</span></code></span></pre><pre id="cakeErr641c8f14be646-context" class="cake-context" style="display: none;">$viewFile = &#039;C:\xampp\htdocs\app\View\Faculties\faculty_details.ctp&#039;
$dataForView = array(
	&#039;details&#039; =&gt; array(
		&#039;Faculty&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;18&#039;,
			&#039;department_id&#039; =&gt; &#039;2&#039;,
			&#039;sr_no&#039; =&gt; &#039;1&#039;,
			&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
			&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
			&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
			&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
			&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
			&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
			&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
		),
		&#039;Department&#039; =&gt; array(
			&#039;id&#039; =&gt; &#039;2&#039;,
			&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
			&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
			&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
			&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
		),
		&#039;FacultySubject&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultySpecialization&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyPaper&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			),
			(int) 1 =&gt; array(
				[maximum depth reached]
			),
			(int) 2 =&gt; array(
				[maximum depth reached]
			),
			(int) 3 =&gt; array(
				[maximum depth reached]
			),
			(int) 4 =&gt; array(
				[maximum depth reached]
			),
			(int) 5 =&gt; array(
				[maximum depth reached]
			),
			(int) 6 =&gt; array(
				[maximum depth reached]
			),
			(int) 7 =&gt; array(
				[maximum depth reached]
			),
			(int) 8 =&gt; array(
				[maximum depth reached]
			),
			(int) 9 =&gt; array(
				[maximum depth reached]
			),
			(int) 10 =&gt; array(
				[maximum depth reached]
			),
			(int) 11 =&gt; array(
				[maximum depth reached]
			),
			(int) 12 =&gt; array(
				[maximum depth reached]
			),
			(int) 13 =&gt; array(
				[maximum depth reached]
			),
			(int) 14 =&gt; array(
				[maximum depth reached]
			),
			(int) 15 =&gt; array(
				[maximum depth reached]
			),
			(int) 16 =&gt; array(
				[maximum depth reached]
			),
			(int) 17 =&gt; array(
				[maximum depth reached]
			),
			(int) 18 =&gt; array(
				[maximum depth reached]
			),
			(int) 19 =&gt; array(
				[maximum depth reached]
			),
			(int) 20 =&gt; array(
				[maximum depth reached]
			),
			(int) 21 =&gt; array(
				[maximum depth reached]
			),
			(int) 22 =&gt; array(
				[maximum depth reached]
			),
			(int) 23 =&gt; array(
				[maximum depth reached]
			),
			(int) 24 =&gt; array(
				[maximum depth reached]
			),
			(int) 25 =&gt; array(
				[maximum depth reached]
			),
			(int) 26 =&gt; array(
				[maximum depth reached]
			),
			(int) 27 =&gt; array(
				[maximum depth reached]
			),
			(int) 28 =&gt; array(
				[maximum depth reached]
			),
			(int) 29 =&gt; array(
				[maximum depth reached]
			),
			(int) 30 =&gt; array(
				[maximum depth reached]
			),
			(int) 31 =&gt; array(
				[maximum depth reached]
			),
			(int) 32 =&gt; array(
				[maximum depth reached]
			),
			(int) 33 =&gt; array(
				[maximum depth reached]
			),
			(int) 34 =&gt; array(
				[maximum depth reached]
			),
			(int) 35 =&gt; array(
				[maximum depth reached]
			),
			(int) 36 =&gt; array(
				[maximum depth reached]
			),
			(int) 37 =&gt; array(
				[maximum depth reached]
			),
			(int) 38 =&gt; array(
				[maximum depth reached]
			),
			(int) 39 =&gt; array(
				[maximum depth reached]
			),
			(int) 40 =&gt; array(
				[maximum depth reached]
			),
			(int) 41 =&gt; array(
				[maximum depth reached]
			),
			(int) 42 =&gt; array(
				[maximum depth reached]
			),
			(int) 43 =&gt; array(
				[maximum depth reached]
			),
			(int) 44 =&gt; array(
				[maximum depth reached]
			),
			(int) 45 =&gt; array(
				[maximum depth reached]
			),
			(int) 46 =&gt; array(
				[maximum depth reached]
			),
			(int) 47 =&gt; array(
				[maximum depth reached]
			),
			(int) 48 =&gt; array(
				[maximum depth reached]
			),
			(int) 49 =&gt; array(
				[maximum depth reached]
			),
			(int) 50 =&gt; array(
				[maximum depth reached]
			),
			(int) 51 =&gt; array(
				[maximum depth reached]
			),
			(int) 52 =&gt; array(
				[maximum depth reached]
			),
			(int) 53 =&gt; array(
				[maximum depth reached]
			),
			(int) 54 =&gt; array(
				[maximum depth reached]
			),
			(int) 55 =&gt; array(
				[maximum depth reached]
			),
			(int) 56 =&gt; array(
				[maximum depth reached]
			),
			(int) 57 =&gt; array(
				[maximum depth reached]
			),
			(int) 58 =&gt; array(
				[maximum depth reached]
			),
			(int) 59 =&gt; array(
				[maximum depth reached]
			),
			(int) 60 =&gt; array(
				[maximum depth reached]
			),
			(int) 61 =&gt; array(
				[maximum depth reached]
			),
			(int) 62 =&gt; array(
				[maximum depth reached]
			),
			(int) 63 =&gt; array(
				[maximum depth reached]
			),
			(int) 64 =&gt; array(
				[maximum depth reached]
			),
			(int) 65 =&gt; array(
				[maximum depth reached]
			),
			(int) 66 =&gt; array(
				[maximum depth reached]
			),
			(int) 67 =&gt; array(
				[maximum depth reached]
			),
			(int) 68 =&gt; array(
				[maximum depth reached]
			),
			(int) 69 =&gt; array(
				[maximum depth reached]
			),
			(int) 70 =&gt; array(
				[maximum depth reached]
			),
			(int) 71 =&gt; array(
				[maximum depth reached]
			),
			(int) 72 =&gt; array(
				[maximum depth reached]
			),
			(int) 73 =&gt; array(
				[maximum depth reached]
			),
			(int) 74 =&gt; array(
				[maximum depth reached]
			),
			(int) 75 =&gt; array(
				[maximum depth reached]
			),
			(int) 76 =&gt; array(
				[maximum depth reached]
			),
			(int) 77 =&gt; array(
				[maximum depth reached]
			),
			(int) 78 =&gt; array(
				[maximum depth reached]
			),
			(int) 79 =&gt; array(
				[maximum depth reached]
			),
			(int) 80 =&gt; array(
				[maximum depth reached]
			),
			(int) 81 =&gt; array(
				[maximum depth reached]
			),
			(int) 82 =&gt; array(
				[maximum depth reached]
			),
			(int) 83 =&gt; array(
				[maximum depth reached]
			),
			(int) 84 =&gt; array(
				[maximum depth reached]
			),
			(int) 85 =&gt; array(
				[maximum depth reached]
			),
			(int) 86 =&gt; array(
				[maximum depth reached]
			),
			(int) 87 =&gt; array(
				[maximum depth reached]
			),
			(int) 88 =&gt; array(
				[maximum depth reached]
			),
			(int) 89 =&gt; array(
				[maximum depth reached]
			),
			(int) 90 =&gt; array(
				[maximum depth reached]
			),
			(int) 91 =&gt; array(
				[maximum depth reached]
			),
			(int) 92 =&gt; array(
				[maximum depth reached]
			)
		),
		&#039;FacultyResearch&#039; =&gt; array(
			(int) 0 =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;subs&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 1 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 2 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 3 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 4 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 5 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 6 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 7 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 8 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 9 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		),
		(int) 10 =&gt; array(
			&#039;FacultySubject&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;results&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;FacultyResearch&#039; =&gt; array(
				[maximum depth reached]
			),
			&#039;Faculty&#039; =&gt; array(
				[maximum depth reached]
			)
		)
	),
	&#039;frs&#039; =&gt; array(),
	&#039;fpubl&#039; =&gt; array()
)
$details = array(
	&#039;Faculty&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;18&#039;,
		&#039;department_id&#039; =&gt; &#039;2&#039;,
		&#039;sr_no&#039; =&gt; &#039;1&#039;,
		&#039;name&#039; =&gt; &#039;Dr. Lata Ragha&#039;,
		&#039;qualification&#039; =&gt; &#039;Ph.D&#039;,
		&#039;designation&#039; =&gt; &#039;Head of Department&#039;,
		&#039;email_address&#039; =&gt; &#039;lata.ragha@fcrit.ac.in&#039;,
		&#039;joining_date&#039; =&gt; &#039;2016-12-21&#039;,
		&#039;image&#039; =&gt; &#039;https://fcrit.ac.in/cdn/faculty/1519715220-Dr.lata.ragha.jpg&#039;,
		&#039;teaching_staff&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2015-02-03 19:11:43&#039;
	),
	&#039;Department&#039; =&gt; array(
		&#039;id&#039; =&gt; &#039;2&#039;,
		&#039;name&#039; =&gt; &#039;Computer Engineering&#039;,
		&#039;description&#039; =&gt; &#039;&lt;p&gt;All the computer related courses&lt;/p&gt;&#039;,
		&#039;created_by&#039; =&gt; &#039;1&#039;,
		&#039;created_timestamp&#039; =&gt; &#039;2014-10-17 20:43:35&#039;,
		&#039;facultyList&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1560845363-computer.faculty.list.pdf&#039;,
		&#039;Roadmap&#039; =&gt; &#039;https://fcrit.ac.in/cdn/department/1648721033-1560845363.Roadmap.Computer.pdf&#039;,
		&#039;infrastructure&#039; =&gt; &#039;/img/not_available&#039;
	),
	&#039;FacultySubject&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;410&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Graphics&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;IV&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:34&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;411&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Networks&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;V&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:47:59&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;412&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;System Programming and Compiler Construction&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VI&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:32&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;413&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Cryptography and System Security&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:48:54&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;414&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Computer Simulation and Modelling &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:19&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;415&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel and Distributed Computing &#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:49:49&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;416&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Adhoc Wireless Networks (Elective)&#039;,
			&#039;type&#039; =&gt; &#039;Under Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;VIII&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:23&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;417&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Database Systems&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;II&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:50:50&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;418&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Object Oriented Analysis and Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:16&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;419&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Parallel Computing&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:51:55&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;420&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;subject&#039; =&gt; &#039;Advanced Computing and Network Design&#039;,
			&#039;type&#039; =&gt; &#039;Post Graduate&#039;,
			&#039;semester&#039; =&gt; &#039;I&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2018-03-19 09:52:33&#039;
		)
	),
	&#039;FacultySpecialization&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;75&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2015-02-10 15:34:50&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;85&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;description&#039; =&gt; &#039;&lt;p&gt;1. Computer Networks and Security&lt;/p&gt;
&lt;p&gt;2. Routing Protocols&lt;/p&gt;
&lt;p&gt;3. Data Mining&lt;/p&gt;
&lt;p&gt;4. Parallel and distributed computing&lt;/p&gt;
&lt;p&gt;5. System/Information Security&lt;/p&gt;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-01-18 21:04:32&#039;
		)
	),
	&#039;FacultyPaper&#039; =&gt; array(
		(int) 0 =&gt; array(
			&#039;id&#039; =&gt; &#039;285&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Optimization Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;ICTACT Journal on Communication Technology, VOLUME: 08, ISSUE: 03, pp.1559-1565, September 2017.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:17&#039;
		),
		(int) 1 =&gt; array(
			&#039;id&#039; =&gt; &#039;286&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Enrich Security in MANET by Avoiding Wormhole Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Electrical Communication Technology, (ICETECT - 2017), 30 – 31 March 2017, Saveetha University, Chennai, will be published in Scopus indexed journals (IJCTA/Global journal of science/JCHPS).&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:37&#039;
		),
		(int) 2 =&gt; array(
			&#039;id&#039; =&gt; &#039;287&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Spectrum Access Model for Cognitive Radio Wireless Sensor Network&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Electronics and Communication Systems (ICECS-17), 24th – 25th February 2017, Karpagam College of Engineering, Coimbatore, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:50:53&#039;
		),
		(int) 3 =&gt; array(
			&#039;id&#039; =&gt; &#039;288&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Double Face Attack Resistant Trust Management Frameworks in Mobile Ad Hoc Networks: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology (IJIET), ISSN: 2319 - 1058, Volume 8, Issue 1, February 2017, pp.301-307.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:51:11&#039;
		),
		(int) 4 =&gt; array(
			&#039;id&#039; =&gt; &#039;292&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management in Internet Services using Continuous Authentication&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 525-530.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:52:37&#039;
		),
		(int) 5 =&gt; array(
			&#039;id&#039; =&gt; &#039;293&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Innovations in Engineering and Technology, Volume-7, Issue-4, December 2016, pp. 505-512.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:54:09&#039;
		),
		(int) 6 =&gt; array(
			&#039;id&#039; =&gt; &#039;294&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;An Efficient Searching Technique for Mobile Cloud on Encrypted Data&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advance Foundation and Research in Science &amp; Engineering (IJAFRSE), Volume 2, Special Issue, Vivruti 2016, pp.102-108.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:05&#039;
		),
		(int) 7 =&gt; array(
			&#039;id&#039; =&gt; &#039;295&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Management using Continuous Authentication in Internet Services: A Survey&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 9, September 2016, pp.219-223.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:27&#039;
		),
		(int) 8 =&gt; array(
			&#039;id&#039; =&gt; &#039;296&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Avoidance of Co-operative black hole attack in AODV in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 - 25 Mar 2016, SSN College of Engineering, Chennai, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:55:46&#039;
		),
		(int) 9 =&gt; array(
			&#039;id&#039; =&gt; &#039;297&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Expectation based Aggressor Recognizable proof in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Smart Structures &amp; Systems (ICSSS-2016), March 23 &amp; 24, 2016, Chennai-INDIA, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:02&#039;
		),
		(int) 10 =&gt; array(
			&#039;id&#039; =&gt; &#039;298&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Session Passwords Using Three Level Authentication System&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Technical Research and Applications, e-ISSN:2320-8163, Special Issue 41 (AVALON) (March 2016), pp. 26-29&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 15:56:28&#039;
		),
		(int) 11 =&gt; array(
			&#039;id&#039; =&gt; &#039;299&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Supervised Web Forum Crawling&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Development and Research, Volume 4, Issue 1, February 2016, pp.298-302.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:04:31&#039;
		),
		(int) 12 =&gt; array(
			&#039;id&#039; =&gt; &#039;300&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Applied and Theoretical Computing and Communication Technology, 29-31st October 2015, BIT, Davangere, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:05:49&#039;
		),
		(int) 13 =&gt; array(
			&#039;id&#039; =&gt; &#039;301&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Review of Web Forum Crawling Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Computer Science (IJECS), Vol-4 Issue-8 pp.13815-13818, August 2015 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:06:20&#039;
		),
		(int) 14 =&gt; array(
			&#039;id&#039; =&gt; &#039;302&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparative Analysis of Methodologies Used to Address the MANET Partitioning Problems&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Research &amp; Technology , Volume-4, Issue 05, pp. 38-44, May-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:10&#039;
		),
		(int) 15 =&gt; array(
			&#039;id&#039; =&gt; &#039;303&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Evaluation of Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Emerging Trends &amp; Technology in Computer Science, Volume-3, Issue-6, pp. 107-111, December 2014&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:07:28&#039;
		),
		(int) 16 =&gt; array(
			&#039;id&#039; =&gt; &#039;304&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure AODV against Control Packet Dropping Attack &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:32&#039;
		),
		(int) 17 =&gt; array(
			&#039;id&#039; =&gt; &#039;305&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Tree Based Routing Mechanism for MANET &#039;,
			&#039;description&#039; =&gt; &#039;2nd International Conference on Engineering Confluence, Equinox-2015, 30th September and 1st October 2015, TEC, Nerul, published in International Journal of Technical Research and Applications ISSN: 2320-8163, Special Issue 31    PP. 239-244, Sept.-2015&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:08:48&#039;
		),
		(int) 18 =&gt; array(
			&#039;id&#039; =&gt; &#039;306&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Survey on Routing Protocols in Wireless Sensor Networks&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:07&#039;
		),
		(int) 19 =&gt; array(
			&#039;id&#039; =&gt; &#039;307&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Web Structure Mining Using Breadth First Search with Page Rank&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:24&#039;
		),
		(int) 20 =&gt; array(
			&#039;id&#039; =&gt; &#039;308&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Bigdata Analysis Using Columnar Database&#039;,
			&#039;description&#039; =&gt; &#039;International conference on Engg. confluences (Equinox), 30th Sept and 1st Oct 2014, TEC, Nerul&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:09:52&#039;
		),
		(int) 21 =&gt; array(
			&#039;id&#039; =&gt; &#039;309&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Secure Routing against Control Packet Dropping Attack&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278- 7844), Volume 3, Issue 7, pp. 72-74, July 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:18&#039;
		),
		(int) 22 =&gt; array(
			&#039;id&#039; =&gt; &#039;310&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Feature and Opinion Identification for Online Digital Camera Reviews &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, pp. 595-601, May 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:10:37&#039;
		),
		(int) 23 =&gt; array(
			&#039;id&#039; =&gt; &#039;311&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Genetic Approach for processor Scheduling&#039;,
			&#039;description&#039; =&gt; &#039;IEEE International Conference on Recent Advances and Innovations in Engineering, Poornima College of Engg., Jaipur, India, 09-11, May – 2014, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:14&#039;
		),
		(int) 24 =&gt; array(
			&#039;id&#039; =&gt; &#039;312&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detecting and Avoiding Black Hole Attack in the MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Technology and it&#039;s Applications, 7-8th March 2014, YTCEM, Karjat&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:33&#039;
		),
		(int) 25 =&gt; array(
			&#039;id&#039; =&gt; &#039;313&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Dynamic Quantum based Genetic Round Robin Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 03, pp. 5905-5908, March 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:11:50&#039;
		),
		(int) 26 =&gt; array(
			&#039;id&#039; =&gt; &#039;314&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Decision Trees for Uncertain Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 3 Issue 2, pp.101-104, February 2014.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:12:11&#039;
		),
		(int) 27 =&gt; array(
			&#039;id&#039; =&gt; &#039;315&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Clustering in Cloud Computing Environment&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 101 / Volume 2 Issue 11, pp. 415-421, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:41&#039;
		),
		(int) 28 =&gt; array(
			&#039;id&#039; =&gt; &#039;316&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;FITM: FEROM Informal Text Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research (2278-7844) / # 54 / Volume 2, Issue 11, pp. 54-59, November 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:13:57&#039;
		),
		(int) 29 =&gt; array(
			&#039;id&#039; =&gt; &#039;317&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Personalized Image Search Optimization&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Advanced and Innovative Research(2278-7844) / #122 / Volume 2 Issue 10, pp. 122-126, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:14&#039;
		),
		(int) 30 =&gt; array(
			&#039;id&#039; =&gt; &#039;318&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch-Photo Matching using LFDA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 242-246, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:32&#039;
		),
		(int) 31 =&gt; array(
			&#039;id&#039; =&gt; &#039;319&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid approach for credit card fraud detection&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of soft computing &amp; Engineering, volume 3, Issue 4, pp. 8-11, September 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:14:53&#039;
		),
		(int) 32 =&gt; array(
			&#039;id&#039; =&gt; &#039;320&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Forensic sketch to Mugshot Photo Matching&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of advanced and innovative research (IJAIR), Volume-2, Issue-8, pp. 61-65, Aug-2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:14&#039;
		),
		(int) 33 =&gt; array(
			&#039;id&#039; =&gt; &#039;321&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection In satellite Images using DWT and PCA&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering Associates ISSN: 2320 – 0804, Volume 2, Issue 5 pp 76-81, May 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:39&#039;
		),
		(int) 34 =&gt; array(
			&#039;id&#039; =&gt; &#039;322&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Recognition on Road Vehicle Based on EDA &#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS, Vol. 2, Issue 3, May 2013 &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:15:58&#039;
		),
		(int) 35 =&gt; array(
			&#039;id&#039; =&gt; &#039;323&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey on Estimation of Distribution Algorithm Techniques&#039;,
			&#039;description&#039; =&gt; &#039;International Research Journal of Computer Science Engineering and Applications, Vol. II, Issue V, pp. 412-417, May 2013&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:15&#039;
		),
		(int) 36 =&gt; array(
			&#039;id&#039; =&gt; &#039;324&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Recent Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 72-75, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:34&#039;
		),
		(int) 37 =&gt; array(
			&#039;id&#039; =&gt; &#039;325&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039; Performance Evaluation of  Phish Mail Guard: Phishing Mail Detection by using Textual and URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;Trends in Engineering &amp; Technology-IJRTET, Volume 8, No. 1, pp. 23-29, ISSN: 2158-5563, January 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:16:59&#039;
		),
		(int) 38 =&gt; array(
			&#039;id&#039; =&gt; &#039;326&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Efficient Framework for Analyzing Convergence Expansion with Capacity Improvement using Mobile Relay&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Infinite Innovations in Technology, Vol. I, Issue II, ISSN:2278-9057, October 2013.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:16&#039;
		),
		(int) 39 =&gt; array(
			&#039;id&#039; =&gt; &#039;327&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Change Detection in Satellite Images Using PCA and K-means Clustering &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:17:49&#039;
		),
		(int) 40 =&gt; array(
			&#039;id&#039; =&gt; &#039;328&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;3D-Deformable Model Based Recognition and Labeling on Road Vehicle &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Advances in Communication and Computing Technologies, PVPPCOE, 10-13, August 2013. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:09&#039;
		),
		(int) 41 =&gt; array(
			&#039;id&#039; =&gt; &#039;329&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR for Establishing Symmetric Key and Security in MANETS&#039;,
			&#039;description&#039; =&gt; &#039;Tenth International Conference on Wireless and Optical Communications Networks, 26-28, July 2013, Bhopal, pp:1-5, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:28&#039;
		),
		(int) 42 =&gt; array(
			&#039;id&#039; =&gt; &#039;330&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Phish Mail Guard : Phishing Mail Detection Technique by using Textual &amp; URL analysis&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:18:47&#039;
		),
		(int) 43 =&gt; array(
			&#039;id&#039; =&gt; &#039;331&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Cooperative Security Agents for MANET&#039;,
			&#039;description&#039; =&gt; &#039;World Congress on Information and Communication Technologies,  30th Oct - 2nd Nov  2012, Trivandrum, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:04&#039;
		),
		(int) 44 =&gt; array(
			&#039;id&#039; =&gt; &#039;332&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Approach for DB Intrusion Detection with Reactive Policies&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India. IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:24&#039;
		),
		(int) 45 =&gt; array(
			&#039;id&#039; =&gt; &#039;333&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Privacy Preserving in Data Mining Using Hybrid Approach&#039;,
			&#039;description&#039; =&gt; &#039;IEEE-CICN2012 to be held during 3-5 Nov-2012, Mathura, India, IEEE Xplore&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:19:45&#039;
		),
		(int) 46 =&gt; array(
			&#039;id&#039; =&gt; &#039;334&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;4th International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2012, Oct 19-20, 2012; Bangalore, India, IEEE Xplore by IET&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:04&#039;
		),
		(int) 47 =&gt; array(
			&#039;id&#039; =&gt; &#039;335&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Comparing performance of Collaborative Filtering Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:22&#039;
		),
		(int) 48 =&gt; array(
			&#039;id&#039; =&gt; &#039;336&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification for Hotel Reviews by Using NLP and ML Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication, Information and Computing Technology, SPIT, Mumbai, October 19-20, 2012, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:39&#039;
		),
		(int) 49 =&gt; array(
			&#039;id&#039; =&gt; &#039;337&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Incremental Frequent Pattern Mining&#039;,
			&#039;description&#039; =&gt; &#039;International Journal of Engineering and Advanced Technology, Volume-1, Issue-6, pp. 223-228, August 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:20:59&#039;
		),
		(int) 50 =&gt; array(
			&#039;id&#039; =&gt; &#039;338&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Detection of phishing email using textual and lexical URL analysis &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Computer Science and Information Technology, pp.105-110, July 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:21:17&#039;
		),
		(int) 51 =&gt; array(
			&#039;id&#039; =&gt; &#039;339&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Review of Incremental Association Rule Mining Algorithms&#039;,
			&#039;description&#039; =&gt; &#039;IRNet: International Conference on Computer Science and Engineering, Guwahati, 2nd June, 2012, ISBN: 978-93-81693-90-02, pp. 24-28.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:05&#039;
		),
		(int) 52 =&gt; array(
			&#039;id&#039; =&gt; &#039;340&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Association Rule Mining Using Graph and Clustering Technique&#039;,
			&#039;description&#039; =&gt; &#039;Asian Journal of Computer Science and Technology, Vol. 1, No. 1, ISNN: 2249-0701, pp. 47-52, Jan-June 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:27&#039;
		),
		(int) 53 =&gt; array(
			&#039;id&#039; =&gt; &#039;341&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach&#039;,
			&#039;description&#039; =&gt; &#039;International Journal on Global Technology Initiatives,, Volume-1, Issue-1, pp. D58-D65, March 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:22:48&#039;
		),
		(int) 54 =&gt; array(
			&#039;id&#039; =&gt; &#039;342&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security in MANETs using Symmetric Keys – A New Approach &#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Global Technology Initiatives, 29-30 March 2012, Rizvi COE, Mumbai, Published in IJGTI ISBN: 9788192117881, &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:05&#039;
		),
		(int) 55 =&gt; array(
			&#039;id&#039; =&gt; &#039;343&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Security Enabled DSR (SEDSR) - A New Approach for Security in MANETs&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Emerging Trends in Computer Science and Information Tech.,  K. K. Wagh Institute of Engineering Education &amp; Research, Nashik, 16th -17th March 2012.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:24&#039;
		),
		(int) 56 =&gt; array(
			&#039;id&#039; =&gt; &#039;344&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hybrid Reactive Database Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop on Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:23:42&#039;
		),
		(int) 57 =&gt; array(
			&#039;id&#039; =&gt; &#039;345&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Need base Security with IDRS for Cloud Computing&#039;,
			&#039;description&#039; =&gt; &#039;International Conference &amp; Workshop On Emerging Trends in Technology – 2012, February, 24th &amp; 25th  - 2012, SBIN:0030366&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:10&#039;
		),
		(int) 58 =&gt; array(
			&#039;id&#039; =&gt; &#039;346&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Data Integrity and Confidentiality in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;ICWET-12, February, 24th &amp; 25th ISBN: 0030366, published in International Journal of Computer Application, Feb 2012&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:26&#039;
		),
		(int) 59 =&gt; array(
			&#039;id&#039; =&gt; &#039;347&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Integrity and Confidentiality of character query in Outsourced Database&#039;,
			&#039;description&#039; =&gt; &#039;National Conference on Innovative Trends For Technology Developments (Technocon-2012), 6-7 January 2012, Wardha, Maharashtra, India&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:32:44&#039;
		),
		(int) 60 =&gt; array(
			&#039;id&#039; =&gt; &#039;348&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;5th IEEE International Conference of Advanced Networks and Telecommunication Systems, December 18 - 21, 2011, Bangalore, India, IEEE Xplore.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:00&#039;
		),
		(int) 61 =&gt; array(
			&#039;id&#039; =&gt; &#039;349&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack&#039;,
			&#039;description&#039; =&gt; &#039;World Congress On Information and Communication Technologies Mumbai, India, 11th -14th  December 2011, Organized by MIR Labs, USA and University of Mumbai, India, IEEE Xplore, pp. 182 – 186.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:18&#039;
		),
		(int) 62 =&gt; array(
			&#039;id&#039; =&gt; &#039;350&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;User Trust Based Collaborative Filtering Algorithm for Recommendation System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Information Technology, Systems and Management, 17 – 18 December 2011, Indian Institute of Management Kozhikode, Kerala, India.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:37&#039;
		),
		(int) 63 =&gt; array(
			&#039;id&#039; =&gt; &#039;351&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Featured Based Sentiment Classification by using NLP and Machine Learning Algorithm&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:33:58&#039;
		),
		(int) 64 =&gt; array(
			&#039;id&#039; =&gt; &#039;352&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;A Flooding Based Distributed Denial of Service Attack Defense Mechanism&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:18&#039;
		),
		(int) 65 =&gt; array(
			&#039;id&#039; =&gt; &#039;353&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Working Towards a Comprehensive Solution for Securing Inter-domain Routing Protocol&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:39&#039;
		),
		(int) 66 =&gt; array(
			&#039;id&#039; =&gt; &#039;354&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Multilevel Multidimensional Trust Model for Group based Applications&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011 in Association with University of Mumbai and CSI.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:34:56&#039;
		),
		(int) 67 =&gt; array(
			&#039;id&#039; =&gt; &#039;355&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Identification of New Approach for Runtime Enforcement of Web Service Security&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Recent Trends in Information Technology and Computer Science, 9th – 10th Dec-2011.&#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:12&#039;
		),
		(int) 68 =&gt; array(
			&#039;id&#039; =&gt; &#039;356&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&gt; &#039;0&#039;,
			&#039;title&#039; =&gt; &#039;Survey of Intrusion Tolerant Mechanisms for Intrusion Detection System&#039;,
			&#039;description&#039; =&gt; &#039;International Conference on Communication and Computer Technology, 19-20 Nov.-2011, Bangalore, India, pp. 78-82, ISBN – 978-93-81693-03-2. &#039;,
			&#039;link&#039; =&gt; &#039;&#039;,
			&#039;created_by&#039; =&gt; &#039;1&#039;,
			&#039;created_timestamp&#039; =&gt; &#039;2017-11-29 16:35:38&#039;
		),
		(int) 69 =&gt; array(
			&#039;id&#039; =&gt; &#039;357&#039;,
			&#039;faculty_id&#039; =&gt; &#039;18&#039;,
			&#039;sr_no&#039; =&