Your IP : 216.73.216.40


Current Path : /var/www/html/vijayk/
Upload File :
Current File : /var/www/html/vijayk/index.html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Home Page</TITLE>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="Microsoft FrontPage 5.0" name=GENERATOR>
<style type="text/css">
body,td,th {
	color: #000;
	text-align: justify;
}
a:link {
	color: #00F;
}
a:visited {
	color: #00F;
}
a:hover {
	color: #00F;
}
a:active {
	color: #00F;
}
body {
	background-color: #FFFFFF;
}
</style>
<style type="text/css">
<!--
p.MsoNormal {
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:0in;
line-height:115%;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
}

-->
</style>
</HEAD>
<BODY bgcolor="#FFFFFF" text="#000000" link="#0000FF" vlink="#E31D2F" alink="#0000FF" >

<table width="900" border=0 align="center">
  
  <tr><td height="531" colspan="2" align="left" valign="top"><div align="center">
    
   <hr>
   <table border=0>
      <tr>
        <td width="128" align="left" valign="top">&nbsp;
			</td>
        <td width="82" align="right" valign="top"><strong><img src="pics/logo.gif" alt="Logo" width="82" height="79" align="top"></strong></td>
        <td colspan="3" align="center" valign="top"><h2><strong>Indian Institute of Information Technology,  Allahabad</strong></h2>
          <strong>An Institute of National Importance and Center of Excellence in IT established by Govt. of India</strong><strong><br>
          Deoghat, Jhalwa, Allahabad - 211015 (U.P.), India</strong></h2></td>
      </tr>
      <tr>
        <td colspan="5" align="left" valign="top"><hr></td>
        </tr>
        <tr>
          <td colspan="2" align="left" valign="top"><p align="left"><img src="vkc.jpg" width="206" height="194" alt=""/></p>
            </td>
          <td width="256" align="left" valign="top"><p><strong><font size="5" color="#C00000">Dr. <b>V. K. Chaurasiya</font></strong><br>
              <font size = 5> <b>Associate Professor</b></font><br>
              </font></p>
            <p><font size="3"><strong>Department of Information Technology, IIIT Allahabad</strong><br>
            </font></p>
            <p><font size="3"><strong>Office : Room  No. 4204, <br>Computer Center - II 
              <br>
              Phone : +91-532-2922005 <br>
            Email:</strong></font><font size="3"><a href="mailto:vijayk@iiita.ac.in"><strong>vijayk@iiita.ac.in; <br></strong></a><strong><a href="mailto:gmail.com">vijay.chaurasiya@gmail.com</a></strong></font>
            <br>
            <a href="Vijay_Chaurasiya.pdf" title="Dr. Vijay Kumar Chaurasiya" target="new"><strong>Curriculam Vitae</strong></a></p></td>
          <td width="410" rowspan="2" align="left" valign="top" ><blockquote>
            <p><strong><font size="5" color="#C00000">Profile</font></strong></p>
            <p style="text-align:justify;">Dr. Chaurasiya is working as Associate  Professor in the Department of Information Technology at Indian Institute of  Information Technology, Allahabad. He received Ph.D. Degree in Information  Technology (Wireless Sensor Networks) from IIIT, Allahabad in 2010, Master's Degree in Wireless Communication and  Computing from IIIT, Allahabad in 2004  and Bachelor&rsquo;s Degree in Computer Science and Engineering from MIET, Meerut in  2001. He has published more than 35 papers in reputed International Journals  and Conferences in the area of Network Protocols, Cloud Computing, IoT Protocols, Routing Techniques, Clustering, Localization, Machine Learning and Image Processing.  His current research interests include IoT Protocols  and Application, Resource Management in Wireless Sensor Networks, Routing Protocols  for Wireless Networks, Network Security, Load Balancing, Data Analytics and  Information Security. He has supervised more than 30 Master theses. He is a  professional member of Association for Computing Machinery (ACM), Institute  of Electrical and Electronics Engineers (IEEE) and Vijnana Bharati (VIBHA).</p>
          </blockquote></td>
          </tr>
      <tr>
        <td colspan="3" align="left" valign="top"><hr>
          <p><b><font size="4" color="#C00000"><strong>Academic Qualifications</strong></font></b></p>
          <ul type="disc">
            <span style="text-align: justify"><li><strong>Ph.D. in Information Technology, </strong>in the area of Wireless Sensor Networks from <strong><em>Indian Institute of Information Technology,</em> A<em>llahabad, (U.P.), India</em></strong> in July 2010.(<a href="http://www.iiita.ac.in">http://www.iiita.ac.in</a>). </li>
            <li><strong>M. Tech. in Information Technology,</strong> with specialization in Wireless Communication and Computing, from<strong> <em>Indian Institute of</em> <em>Information       Technology,</em> <em>Allahabad, (U.P.), India</em></strong> in June 2004. (<a href="http://www.iiita.ac.in">http://www.iiita.ac.in</a>).</li>
            <li><strong>B.Tech. in Computer Science and Engineering, </strong>from <em><strong>MIET, Meerut, (U.P.) India</strong></em> in August 2001. (<a href="http://www.miet.ac.in">http://www.miet.ac.in</a>).</li>
          </ul></td>
        </tr>
      <tr>
        <td colspan="6" align="left" valign="top"><hr>
          <p><b><font size="4" color="#C00000">Professional Activities</font></b> <br>
            <font size="3">Teacher, Author, Consultant &amp; Researcher.</font></p>
          <hr></td>
        </tr>
   </table>
    
  </tr>
  <tr>
    <td colspan="2"  align="left" valign="top"><strong><font size="4" color="#C00000">Teaching</font></strong></td>
  </tr>
  <tr>
    <td width="477" height="156" valign="top"><ul>
      <li>Wireless Networks (IWNS-630E) (2018, 2017, 2016)</li>
      <li>Computer Networks (ICNW-532 C) (2018, 2017, 2016, 2015)</li>
      <li>Discrete Mathematics (IDMA-230 C) (2018, 2017, 2016)</li>
      <li>Intorduction to Programming in C (IITP-132C)(2018, 2017)</li>
      <li>Database Management  (DM4-232MS)</li>
      <li>Network &amp; Network Security (NNS-322MB)(NNS-122MS)</li>
      <li>Protocol Implementation (M.Tech -WCC)</li>
    </ul>
    <hr></td>
    <td width="483" valign="top" ><ul>
      <li>Networking Technology (NT-332MB)</li>
      <li>Internet Technology (IT-232MS)</li>
      <li>Object Oriented Methedology (OOM-222MB)</li>
      <li>Software Architecture (M.Tech-SE) (SA-232)</li>
      <li>Storage Technology &amp; Networking (STN-630)</li>
      <li>Database Management System (DMS-122MB)</li>
      <li>Database Security (DBS-322MS)</li>
    </ul>
    <hr></td>
  </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><font size="4" color="#C00000"><strong>Research 
        Interests</strong></font></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><font size="3" >Internet of Things (IoT) Protocols and Applications, Wireless Networks, Wireless Sensor Networks, Computer Networks, Routing Protocols and Reseaource Management in Netwroks.</font><hr></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><font size="4" color="#C00000"><strong>Head/Member of Research Labs</strong></font></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><ol>
          <li><a href="https://profile.iiita.ac.in/vijayk/iot/" title="https://profile.iiita.ac.in/venkat/nsc/" target="new">Internet of Things (IoT)  and Wireless Networks Research Lab</a></li>
          <li><a href="https://ccc.iiita.ac.in/" title="Center for Cognitive Computing" target="new">Center for Cognitive Computing</a></li>
          <li><a href="https://profile.iiita.ac.in/venkat/nsc/" title="https://profile.iiita.ac.in/venkat/nsc/" target="new">Network Security & Cryptography (NSC) Lab</a></li>
        </ol><hr></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><font size="4" color="#C00000"><strong>Funded Research Projects</strong></font></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><ol>
          <li>RFID based Real Time Traffic  Management System using Internet-of-Things (IoT) Protocols
          funded by IIIT Allahabad.</li>
          <li> Road Roughness Analyzer using Internet-of-Things (IoT) Protocols funded by DIC, MHRD, GoI.</li>
          <li>Health Monitoring System using Internet-of-Things (IoT) Protocols funded by DIC, MHRD, GoI.</li>
          <li> Hindi to English Machine  Translation System for Judicial Domain funded by the Ministry of Electronics and Information Technology (MeitY), GoI.</li>
          <li>AVIRAL funded by IIIT Allahabad.</li>
          <li>Educaion through IT/ITES funded  by MCIT, GoI.</li>
          <li>Education  through ICT Funded  by: AICTE, GoI.</li>
        </ol><hr></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><font size="4" color="#C00000"><strong>Ph.D. Students</strong></font></td>
      </tr>
      <tr>
        <td height="175" colspan="2"  align="left" valign="top"><p><strong>Present</strong></p>
          <ol>
            <li><a href="htto://profile.iiita.ac.in/vijayk/shishupal.html" title="Mr. Shishupal Kumar">Mr. Shishupal Kumar</a></li>
            <li><a href="htto://profile.iiita.ac.in/vijayk/shivangi.html">Ms. Shivangi Raman</a></li>
          </ol>
          <p><strong>Past</strong></p>
          <ol>
            <li><a href="htto://profile.iiita.ac.in/vijayk/adita.html" title="Mr. Aditya Kishore Saxena" target="new">Mr. Aditya Kishore Saxena</a><strong> (Completed in April 2017)</strong></li>
          </ol>          <hr></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><strong><font color="#C00000" size="4">Awards and Recognitions</font></strong></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><ol start="1" type="1">
          <li>Certificate of Appreciation for organizing       Wireless Communication and Sensor Network Conference- 2007 (WCSN-2007),       from IIIT Allahabad on 31 Dec, 2007, 2008, 2009, 2010, 2011, 2012, 2013       and 2014.</li>
          <li>Certificate       of Participation&nbsp; from The Institute       for Business and Finance Research on 27 May, 2011</li>
          <li>Certificate       of Appreciation for IITM Workshop and Conference&nbsp; from IIIT Allahabad on 31 Dec, 2010</li>
          <li>Certificate       of Participation from MANIT, Bhopal on 14 Dec, 2017</li>
          <li>Certificate       of Appreciation (Science Conclave 2008) from IIIT Allahabad on 25 Dec,       2008</li>
          <li>Certificate       of Appreciation for organizing Sensitization -cum-Awareness Program for       Technology Information Facilitation from DSIR, New Delhi and IIIT       Allahabad on 27 Oct, 2007.</li>
        </ol><hr></td>
      </tr>
      <tr>
        <td colspan="2"  align="left" valign="top"><strong><font color="#C00000" size="4">Publications</font></strong></td>
    </tr>
  
         <tr>
          <td height="1716" colspan="2" valign="top"><p><font color="#C00000" size="4"><strong>A. International Journals [SCI] </strong></font></p>
            <ol>
              <li>Chaurasiya, V.K.,  Lal, N., A Popularity based Content Eviction scheme via Betweenness-centrality  caching Approach for Content-centric Networking (CCN), under review in IEEE  Transactions on Cloud Computing. </li>
              <li>Chaurasiya, V.K. and  Saxena, &quot;A novel multi-resolution approach for fingerprint based age-group  estimation using Gabor wavelet&quot;, Under review in International Journal of  Pattern Recognition and Artificial Intelligence, World Scientific. </li>
              <li>Chaurasiya, V.K. and  Saxena, A.K., 2017. Multi-resolution texture analysis for fingerprint based  age-group estimation. <em>Multimedia Tools and Applications</em>, pp.1-27. </li>
              <li>Chaurasiya, V.K., Jain, N. and Nandi, G.C.,  2014. A novel distance estimation approach for 3D localization in wireless  sensor network using multi dimensional scaling. <em>Information Fusion</em>, <em>15</em>,  pp.5-18. </li>
              <li>Chaurasiya V.K., Kesarwani A., Gupta C.,  Tripathi M.M., Gupta V., Gupta R., (2011) Integrating ILM, E-Discovery and DPA  1998 for Effective Information Processing. In: Venugopal K.R., Patnaik L.M.  (eds) Computer Networks and Intelligent Computing. Communications in Computer  and Information Science, vol 157. Springer, Berlin, Heidelberg.
              </li></ol><hr>
            <p><font color="#C00000" size="4"><strong>B. International Journals  [SCOPUS] </strong></font></p>
            <ol>
              <li>Chaurasiya, V.K., Saxena, A.K. and Sharma, S.,  2015. Neural network based human age-group estimation in curvelet domain. <em>Procedia  Computer Science</em>, <em>54</em>, pp.781-789. </li>
              <li>Chaurasiya, V.K., Lal, N., Kumar, S. and Saxena,  A., 2015. Detection of malicious node behaviour via I-watchdog protocol in  mobile Ad Hoc network with DSDV routing scheme. <em>Procedia Computer Science</em>, <em>49</em>, pp.264-273. </li>
              <li>Chaurasiya, V.K., Gupta, R., Pinto, A.A., Verma,  S., Singh, S. and Srivastava, P., 2011, Securing Cloud System via Internal  Control Management, in Proceedings of the World Congress on Engineering 2011,  Vol I, pp.481-484. </li>
            </ol><hr>
            <p><font color="#C00000" size="4"><strong>C. International Journals [Others] </strong></font></p>
            <ol>
              <li>Chaurasiya, V.K. and Kumar, S., Prevention of  Denial-of-Service Attack in Wireless Sensor Network via NS-2, published in:  International Journal of Computer and Communication System Engineering  (IJCCSE), Vol. 2 (5), 2015, 708-715. </li>
              <li>Chaurasiya, V.K., Samvedi, A. and Owlak, S. and,  2014. Improved Secure Address Resolution Protocol. arXiv preprint  arXiv:1406.2930. </li>
              <li>Chaurasiya, V.K., Chaturvedi, T., Dwivedi, P.  and Singh, N., 2013. Whistleblowers' Protection Act 2011, India: A Critical  Analysis. International Journal of Advanced Research in Computer Science, 4(8).<strong> [UGC Approved Journal, indexed in EBSCO, DOAJ etc] </strong></li>
              <li>Chaurasiya, V.K.,  Singh, S.P. and Sethi, J., 2014. Need of Impact Calculation and Measured for  Healthcare Privacy Breaches in India, published in: The ISSA Journal, Volume  12, Issue 5, pp 32-38, May 2014. </li>
              <li>Chaurasiya,  V.K., Dwivedi, S. and Gupta, W., 2013. Mapping  of Data Security Council of India Security Framework with ISO/IEC 27002:2005  and COBIT 4.1, Journal of Global Research in Computer Science, Volume 4, No. 4,  147-154, 2013. <strong>[indexed in DOAJ]. </strong></li>
              <li>Chaurasiya, V.K., Govil, S.B., Thyagarajan, K.,  Srinivasan, K., and Das, S., 2012. An approach to identify the optimal cloud in  cloud federation. International Journal of Cloud Computing and Services  Science, 1(1), p.35. [<strong>indexed in CiteFactor]. </strong></li>
              <li>.K. Chaurasiya, J. Thomas, K. Raman, S. Das,  Resource Leasing Cloud Computing Model: A Win-Win Strategy for Resource Owners  and Cloud Service Providers, Published in: Journal of Computing. Volume 4,  Issue 5, May 2012. <strong>[DOAJ Journal] </strong></li>
              <li>Chaurasiya, V.K., Sinha, A., Jaiswal, A. and  Gupta, R., 2011. SAS 70 TO SSAE 16/ISAE 3402: An Insight into Outsourcing  Security and Process Controls and Significance of New Service Audit Standards. <em>ISSN  1931-0285 CD ISSN 1941-9589 ONLINE</em>, p.315.<strong> [Indexed in American Economic  Association&rsquo;s Econlit, e-JEL and JEL]. </strong></li>
              <li>Chaurasiya, V.K., Ardhapurkar, S., Srivastava,  T., Sharma, S., and Vaish, A., 2010. Privacy and data protection in cyberspace  in Indian environment. <em>International Journal of Engineering Science and  Technology</em>.<strong> [DOAJ Journal].</strong></li>
            </ol><hr>
<p><font color="#C00000" size="4"><strong>D. International Conferences &nbsp;</strong></font></p>
            <ol>
              <li>Chaurasiya, V.K., Saxena, A.K. and Sharma, S.,  2015, May. Human age-group estimation using curvelet features. In Advances in  Computing and Communication Engineering (ICACCE), 2015 Second International  Conference on (pp. 610-615). IEEE. </li>
              <li>Chaurasiya, V.K., and Saxena, A.K., 2014,  December. Fingerprint based human age group estimation. In India Conference  (INDICON), 2014 Annual IEEE (pp. 1-4). IEEE. </li>
              <li>Chaurasiya, V.K.,&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Diwakar, A., Kumar, V., 2014, A quantized Model for Computer  Forensic Investigation, published in: Proceedings of 6th&nbsp;IRF International Conference, Chennai, India,  10th May. 2014, pp. 20-25. </li>
              <li>Chaurasiya, V.K., Raman, S. and Venkatesan, S.,  2012, October. Performance comparison of various information retrieval models  used in search engines. In <em>Communication, Information &amp; Computing  Technology (ICCICT), 2012 International Conference on</em> (pp. 1-4). IEEE. </li>
              <li>Chaurasiya, V.K., Kumar, A., Srivastava, A.,  Bansal, S. and Raheja, M., 2012, Basel III and the Requirement for Capital  Inclusion: A Case of India, Published in: 5th International  Conference on Management and Behavioral Sciences, &ldquo;An Interdisciplinary  Conference&rdquo; June, 2012, Society of Management and Behavioral Sciences. </li>
              <li>Chaurasiya, V.K., Chandra, M., Kumar, N., Gupta,  R., Kumar, S. and Srivastava, V., 2011, April. Protection from paging and  signaling attack in 3G CDMA networks. In <em>Emerging Trends in Networks and  Computer Communications (ETNCC), 2011 International Conference on</em> (pp.  406-410). IEEE. </li>
              <li>Chaurasiya, V.K., Srivastava, V., Keshri, A.K.,  Roy, A.D. and Gupta, R., 2011, April. Advanced port knocking authentication  scheme with QRC using AES. In <em>Emerging Trends in Networks and Computer  Communications (ETNCC), 2011 International Conference on</em> (pp. 159-163).  IEEE. </li>
              <li>Chaurasiya, V.K., Kesarwani, A., Gupta, C.,  Tripathi, M.M., Gupta, V. and Gupta, R., 2011, April. Implementation of Chinese  wall model in cloud computing for enhanced security. In <em>Emerging trends in  networks and computer communications (etncc), 2011 international conference on</em> (pp. 411-413). IEEE. </li>
              <li>Chaurasiya, V.K., Gupta, R., Banerji, S.G. and  S. Mohanty, 2011, Information Security Governance is Critical to Wider  Corporate Governance Demands - An Indian Perspective, in Proceedings of International  Conference on Economics, Trade and Development,&nbsp;  (ICETD 2011), Vol. 7, pp:65-68, Bali, Indonesia, April 1-3, 2011. </li>
              <li>Chaurasiya, V.K., Srivastava, P., Singh, S.,  Pinto, A.A., Verma, S. and Gupta, R., 2011, June. An architecture based on  proactive model for security in cloud computing. In <em>Recent Trends in  Information Technology (ICRTIT), 2011 International Conference on</em> (pp.  661-666). IEEE. </li>
              <li>Chaurasiya, V.K., Srivastava, S., Chandra, S.  and Saxena, S., 2010, Honeypot Placement in Network Architecture to Enhancing  the Efficiency of IDS System, in Proceedings of First International Conference  On&nbsp; Management Of Technologies &amp;  Information security &ldquo;ICMIS 2010&rdquo;. Jan 21-24, 2010, IIIT Allahabad, India. </li>
              <li>Chaurasiya, V.K., Lavavanshi, R.L., Verma, S.,  Nandi, G.C. and Srivastava, A.K., 2009, March. Localization in wireless sensor  networks using directional antenna. In <em>Advance Computing Conference, 2009.  IACC 2009. IEEE International</em> (pp. 131-134). IEEE. </li>
              <li>Chaurasiya, V.K., Pathak, A., Biswas, A., Dev,  S. and Srivastava, A., 2009, A different approach to risk assessment, in  Proceedings of International Conference on Management Technology and  Applications (ICMTA 2009), 8-11 Aug,2009, Beijing, China. </li>
              <li>Chaurasiya, V.K., Kumar, S.R., Verma, S. and  Nandi, G.C., 2008, December. Traffic based clustering in wireless sensor  network. In <em>Wireless Communication and Sensor Networks, 2008. WCSN 2008.  Fourth International Conference on</em> (pp. 83-88). IEEE. </li>
              <li>Chaurasiya, V.K., Dhiwal, A.D., Gautam, S. and  Singh, A.K., 2008, December. MailZoro-email based P2P file sharing. In <em>Networks,  2008. ICON 2008. 16th IEEE International Conference on</em> (pp. 1-5). IEEE. <strong>[Tier  1 Conference]. </strong></li>
              <li>Chaurasiya, V.K., Dhyani, P. and Munot, S.,  2007, December. Linux highly available (HA) fault-tolerant servers. In <em>Information  Technology,(ICIT 2007). 10th International Conference on</em> (pp. 223-226).  IEEE.<strong> [Tier 1 Conference]. </strong></li>
              <li>Chaurasiya, &nbsp;&nbsp;&nbsp; V.K.,  Dwivedi, S., Shah, Homana, A.M. and Herbst, L., 2006, Heterogeneous Wireless  Devices: Networking for Monitoring Application, in Proceedings of International  conference on Wireless Communication and Sensor Networks( WCSN), 2006,  Allahabad, India. </li>
              <li>Chaurasiya, V.K. and Dwivedi, S., 2005, Managing  and Accessing Sensor Network from Internet Browser, in Proceedings of  International conference on Wireless Communication and Sensor Networks (WCSN),  2005, Allahabad, India. </li>
           </ol><hr></td>
        </tr>
         <tr>
           <td colspan="2" valign="top"><font color="#C00000" size="4"><strong>Conferences, Workshops and Seminars Organized</strong></font></td>
         </tr>
         <tr>
           <td colspan="2" valign="top"><ol>
             <li>Organizing a Workshop on IoT using Raspberry Pi       during 11-12 November 2017 in IIIT Allahabad.&nbsp;</li>
             <li>Member of organizing committee of International       Conference on Bioinformatics and Systems Biology (BSB-2016). </li>
             <li>Member       of organizing committee of IEEE UP Section Conference on Electrical,       Computer and Electronics EEE UPCON-2015. </li>
             <li>Member       of organizing committee of 7th International conference on Intelligent       Human Computer Interaction (IHCI-2015).</li>
             <li>Member       of organizing committee and one of the track coordinator of First       International Conference on Management of Technologies &amp; Information       Security ICMIS 2010. </li>
             <li>Organized       IEEE sponsored Conference on Wireless Communication and Sensor Networks       WCSN-2009. </li>
             <li>Member       of Organizing Committee of 2 days workshop on Information security (2009).</li>
             <li>Member       of the organizing committee if first science conclave Dec, 2009. </li>
             <li>Organized       short term training course on Data Digitization, Data Warehousing and Data       Mining.</li>
             <li>Member       of the organizing committee of second science conclave Dec, 2009.</li>
             <li>Organized       IEEE sponsored Conference on Wireless Communication and Sensor Networks       WCSN-2008. </li>
             <li>Member       of organizing committee of seminar on IT-Vision 2020 organized at       IIIT-Allahabad India in Sep, 2007. </li>
             <li>Member       of organizing committee of seminar on Information Awareness Program       organized at IIIT-Allahabad India in Nov 2007. </li>
             <li>Member       of organizing committee of International conference on WCSN organized at       IIIT-Allahabad India in Dec, 2007.</li>
             <li>Member       of organizing committee of International conference on WCSN organized at       IIIT-Allahabad India in Dec, 2006. </li>
             <li>Member       of organizing committee of International conference on WCSN organized at       IIIT-Allahabad India in Dec, 2005.</li>
           </ol><hr></td>
         </tr>
         <tr>
           <td colspan="2" valign="top"><font color="#C00000" size="4"><strong>Conferences, Workshops and Seminars Attended</strong></font></td>
         </tr>
         <tr>
           <td colspan="2" valign="top"><ol>
             <li>Attended as one of the track chair       International Conference on Bioinformatics and Systems Biology (BSB-2016). </li>
             <li>Attended       IEEE UP Section Conference on Electrical, Computer and Electronics EEE       UPCON-2015.</li>
             <li>Attended       7th International conference on Intelligent Human Computer Interaction       (IHCI-2015) </li>
             <li>Attended       as one of the track chair of First International Conference on Management       of Technologies &amp; Information Security ICMIS 2010. </li>
             <li>Attended       5 days of technical training program on Storage Technology organized by       EMC2 at Amity University, Noida (2009).</li>
             <li>Attended       5 days of short term training program on Information Security and Cyber       Law organized by MANIT, Bhopal (2008).</li>
             <li>Attended       National Seminar on IPR issues and effect on Indian pharmaceutical       industries Indian Institute of Information Technology, Allahabad. </li>
             <li>Attended IEEE  sponsored Conference on Wireless Communication and Sensor Networks WCSN-2006 as  the organizer.</li>
             <li>Attended       International seminar on I.T Trends at IIIT, Allahabad. </li>
             <li><span style="text-align: justify">             Attended International seminar on Intelligent Signal  Processing and Robotics, IIIT-Allahabad</span>. </li>
           </ol>     <hr>      </td>
         </tr>
         <tr>
           <td colspan="2" valign="top"><CENTER>
<font color=BLACK size=2>For more information on the website contact the <A HREF="mailto:vijayk@iiita.ac.in">webmaster</A></font></CENTER><hr></td>
         </tr>
        
</table>
<p><br>
</p>
     
</BODY>
</HTML>