X

Recent News

Computing Vision March: 2020

Computing Vision March: 2020

The College of Computing Sciences and Information Technology has released its Student Magazi
THE NATIONAL UNITY DAY CELEBRATION

THE NATIONAL UNITY DAY CELEBRATION

CCSIT is one of the topmost institutes for B-tech, BCA, and BSc programmes in the state of Utta
Write up for Fresher’s  Party

Write up for Fresher’s Party

A fresher’s party for the BBA iNurture students was held on 16th October 2019. The objective o
Deepotsav

Deepotsav

On the occasion of Diwali (25TH Oct), Teerthanker Mahaveer University’s engineering college CCS
WORKSHOP ON “NETWORK SECURITY AND ITS CONCEPTS”

WORKSHOP ON “NETWORK SECURITY AND ITS CONCEPTS”

Owing to the growth of digitalization, networking has become a key aspect in today’s world henc
Workshop on Intellectual Property Rights

Workshop on Intellectual Property Rights

Institution’s Innovation Council (IIC) under the aegis of MHRD’s Innovation cell initiative and
RAMGANGA CHOUPAL VISIT

RAMGANGA CHOUPAL VISIT

College of Computing Sciences & Information Technology’s (CCSIT) MCA program students from
Write up for Panel Discussion

Write up for Panel Discussion

On 19th October, Teerthanker Mahaveer University’s College of Computing Sciences & Informat

“International Conference on Advanced Computing (ICAC-2019)” in association with International Journal of Research Trends in Computer Science & Information Technology (IJRTCSIT) (http://www.ijrtcsit.org), Technical Sponsored by Computer Society of India (CSI), sponsored by CETPA Noida and supported by IBM, Microsoft, iNurture,

Read more...

ICAC 2016 Track 2

Saturday, 22 October 2016 by

DN Searching Technique for Social Media Sites Review of Power Consumption for ADHOC Network WINDOW 10 ISSUE Nvidia Tegra 250 Devlopment Kit Iris Scanning: A Comprehensive Review of Identification and Verification Voice Sensing Technology Neural Interfacing Google Wave Smartphone Photography

Read more...

ICAC 2016 Track 1

Saturday, 22 October 2016 by

Cyber World-Digital Extension of Computer Loggers Content Based Image Retrieval Xbox 360system Wearable Gadgets Google Project Tango A Comparative Study of Various Security and Issues in Steganography Techniques Analysis Of Imbalanced Datasets Using Classification Based Techniques Different Aspects of Security:

Read more...

ICAC 2015 Track 4

Saturday, 22 October 2016 by

Analysis of Pollution of Ram Ganga River by Physicochemical Water Parameters Using Regression Analysis Revolution in the Educational Systems by Adopting Cloud Computing in Academic Environment An Approach for Modeling and Analysis of Mobile Agent-Based Software Systems Using UML Statecharts

Read more...

ICAC 2015 Track 3

Saturday, 22 October 2016 by

Multilevel Marketing Pyramid Selling Classification of search engine optimization techniques: A data mining approach Back Propagation Method for Comparing Face Entity with Database Human Errors finding methods using geneteic algoritms Software testing phases Impact on Security issues of Cloud Robots

Read more...

ICAC 2015 Track 2

Saturday, 22 October 2016 by

HIGH LEVEL SYNTHESIS OF A 2D-DWT SYSTEM ARCHITECTURE FOR JPEG 2000 USING FPGAs Analyzing online banking from banker’s perspective Selection of Robust Topology Design in Constrained Environment for Wireless Sensor Network A New LCTnMOS Technique for reduced the Leakage Power

Read more...

ICAC 2015 Track 1

Saturday, 22 October 2016 by

PEER – PEER PACKET PACKET AUTHENTICATION WITH DIGITAL SIGNATURE IN MOBILE ADHOC NETWORK Analysis and mining in social data using neighbors document clustering approach Network Lifetime Optimization Using ACO in Wireless Sensor Network Internet of Life (IoL) Android Based Application:

Read more...

ICAC 2014 Track 4

Saturday, 22 October 2016 by

Difficulty in Handling High Dimensional Data-Please Stand up Evaluate the Contents of Data Warehouse through Tool Causes of Human Errors in Information Security Information and Communication Technology:Booster Dose for Teaching and Learning Skills A Survey on Human Interaction in Meetings

Read more...

ICAC 2014 Track 3

Saturday, 22 October 2016 by

Automatic Ontology Acquisition and Learning A Survey of Fault Tolerance Techniques in Mobile Agents and Mobile Agent System An Elliptic Curve Based Lightweight Signcryption Scheme Using External Protocol Analysis of Big Data security and privacy SMART MEETING SYSTEM: AN APPROACH

Read more...

ICAC 2014 Track 2

Saturday, 22 October 2016 by

A Survey on Liquid Content Aware Image Resizing Technique Sign Language Problem And Solutions For Deaf And Dumb People A review to assess opportunities and security risk challenges in Cloud Computing Remote Sensed Image Analysis for feature extraction using Color

Read more...

Get Social:

TOP