Dr. Urjita Thakar

  • Designation: Professor 
  • Employee ID: 196
  • Qualification: Ph.D.
  • : 0731-2582401
  • : This email address is being protected from spambots. You need JavaScript enabled to view it.
  • : Detailed Profile
About Faculty: Dr. Urjita Thakar is working as Head of Computer Engineering Department SGSITS,Indore since 01 December 2016 . She has been working in the area of Information Security and Algorithms.
Education and Qualification:

. No.  

Degree

Specialization

Year

University/Board

1 Ph.D. Computer Science and  Engineering 23-09-2013 RGPV, Bhopal
2 M.E. Computer  Engineering 1997 Devi Ahilya VishwaVidyalaya, Indore
3 B.E Computer Engineering 1990 Devi Ahilya VishwaVidyalaya, Indore

4

HSC

PCM

1984

M.P. Board of Secondary Education

Work Experience:

S.NO.

Designation

Department

Employer  Name

         Duration of Employment

From

To

1.

Professor

Computer Engineering

SGSITS Indore

 23 September 2013 

Till Date

2 Associate Professor Computer Engineering SGSITS Indore 1st Jan 2006  22 Sept 2013 
3 Reader Computer Engineering SGSITS Indore 31st May 2002  31st December 2005 
  Senior Lecturer Computer Engineering SGSITS Indore 31st May 1997 30th May 2002
4 Lecturer Computer Engineering SGSITS Indore 28th Feb 1991  30th May 1997 
Research Details:
  • Dr. Urjita Thakar is doing research in the field of Information and Cyber Security.
  • She has Guided various research based projects of  BE, ME and Ph.D students.
  • She is actively involved in doing research since 1997.
  • She  has published various research papers in the renowned journals and conferences.
PhD Supervision:

S.No.

Name

Year of Admission

Status

    Title

University

Association as Guide/ Co-Guide

 Mr. Atul Purohit  Completed Feb 2020 nvestigations in integrating customer loyality program management application within an outside organazations boundries

Pacific Academy of Higher Education& Research University, Udaipur (Raj)

 Guide

1.

Neha Sehta

2017

RDC cleared

Investigation in meta learning approaches to algorithm sections for optimization problems

Rajiv Gandhi Technical University, Bhopal

Guide

2.

Ashok Kumar Mewafarosh

2017

RDC cleared

Web user intent discovery using machine learning technology

Rajiv Gandhi Technical University, Bhopal

Guide

3.

Yashowardhan Kelkar

2018

Coursework Completed

 

Rajiv Gandhi Technical University, Bhopal

Guide

4.

Surendra Gupta

2018

RDC cleared

Sub- investigation in multiview machine learing

Devi Ahilya University, Indore

Co-guide

5.

Deepali Kelkar

2019

Coursework Completed

 

Rajiv Gandhi Technical University, Bhopal

Guide

6.

Anushree Pandya

2019

Coursework Completed

 

Rajiv Gandhi Technical University, Bhopal

Guide

7.

Sudarshan Varma

2020

Course work in Progress

 

Devi Ahilya University, Indore

Co-guide

8.

Aditya Sinha

2019

Coursework Completed

 

Rajiv Gandhi Technical University, Bhopal

Guide

Publications:

(i)     International Journal

S.No.

Title of Research Paper

Details of Journal and Year/Issue No.

Remarks,

if any

1.

Genetic Algorithm For Solving the Travelling Sales Person Problem Using Neighbour-Baased Constructive Cross Over Problem

International Journal of Engineering Sceinces and Reseearch Technology, (Thomson Reuters ResearcherID), 7(4), ISSN: 2277-9655, Pp 101-110, April 2018.

 

2

Use of ICT in Customer Loyalty Programs: A State of the Art Review

International Journal for Research in Applied Science & Engineering Technology (IJRASET)ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887, Volume 6 Issue VI, June 2018- Available at www.ijraset.com, Pp: 1010-1020 2018-19.

 

3

Challenges and Opportunities in Integrating Multiple ICT Systems for Contemporary Loyalty Program Management

International Journal for Research in Electronics and Computer Engineering (IJRECE), ISSN: 2393-9028 (P RINT ), ISSN: 2348-2281 (O NLINE ), VOL. 6, ISSUE 3, Pp:2059-2067, JULY - SEPTEMBER 2018.

 

4

Dynamic Simulated Annealing for solving the Traveling Salesman Problem with Cooling Enhancer and Modified Acceptance Probability.

 International Journal of Scientific and Research Publications (IJSRP). 8. 213-220. 10.29322/IJSRP.8.3.2018.p7531.

 

5

A Novel Approach to Prevent Information Leakage on OSN based on Trust Clearance

I J C T A, 9(40), ISSN: 0974-5572, 2016, pp. 571-579, International Science Press.

 

 

6

Finding Community in Social Network Based on Profile Attributes

I J C T A, 9(40), ISSN: 0974-5572, 2016, pp. 587-596, International Science Press

 

7

Prevention Against CSRF Attack Using Client Server Mutual Authentication Technique

International Research Journal of Engineering and Technology (IRJET),www.irjet.net, e-ISSN: 2395-0056, p-ISSN: 2395-0072, Volume: 04 Issue: 11, Nov -2017

 

8

A Signature-based Clustering Approach for Record Matching from Multiple Databases

 International Journal of Computational Engineering & Management (IJCEM), (Volume 20 Issue 6, November 2017) www.ijcem.org,ISSN: 2230-7893, UGC APPROVED INTERNATIONAL JOURNAL

 

9

Classifying Web Services based on QoS Parameters using Extended Dataset

International Journal of Computer Applications 74(8):33-36,. Published by Foundation of Computer Science, New York, USA, ISSN No. 0975-8887, Impact Factor 0.821, July 2013

 

10

Constant Time contention Resolution, MAC Scheme for Multi-Rate Ad-Hoc Network

International Journal of Advance Research in Computer Science and Engineering, ISSN 2320-9194, Volume 1, Issue 7, Pp 20-27, July 2013,

 

11

A Methodology to Compose Web Services using Compatible Components based on QoS and Security Requirements of the Users

International Journal of Computer Applications, Published by Foundation of Computer Science, New York, USA, ISSN No. 0975-8887, 46(10):30- 37, May 2012.

 

12

A Comparative Study of Rate Matching and IG-MAC Schemes In Multi-Rate Ad Hoc Networks

IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN:2249-955, Vol. 2, No.1, Pp 4-11, 2012

 

13

OLearner - An Ontology Based Learning Content Management System to Support Semantic Search and Contribution of Learning Objects

Journal of Algorithms & Computational Technology Vol. 4 No. 4, ISSN 1748-3018 (Print), Multi-Science Publishing Co. Ltd, U.K., pp.587-605, December 2010

 

14

A Scheme for Execution of a Complex service in an Environment where Services are Vulnerable to Intrusion Attacks

Journal of Information Assurance and Security (JIAS), Vol. 5 Issue 1, ISSN 1554-1010, Publisher: Dynamic Publishers Inc., USA, pp. 579-587, 2010

 

 

15

Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services

International Journal of Network Security & Its Applications (IJNSA), 2 Number 3, Publisher: Academy & Industry Research Collaboration Center (AIRCC), pp. 190-205, ISSN: 0974–9330 (Online), ISSN 0975-2307 (Print), July 2010

 

16

An Approach to Discover Web Service Providers based on  Security Support

International Journal of Web Applications, Vol. 1, No.2, ISSN 0974-7710(Print), ISSN 0974-7729 (Online), Publisher: Digital Information Research Foundation, USA, pp. 47-56, June 2009

 

17

Performance Evaluation and Comparison of Routing Protocols of Mobile Ad-hoc Networks (MANETs) using Qualnet

International Journal of Computer and Electronics Engineering, ISSN 0973-7448, Publisher: Research Science Press, India, 2009

 

18

A Novel Scheme for Selection of Confidentiality and Integrity Levels in Web Services Based E-commerce Applications

International Journal of Computer and Electronic Engineering, Vol. 1, No. 1, ISSN: 0975-4202, Publisher: Research Science Press, India, pp.13-25, Jan-June 2009

 

 

19

A Comparative Experimental Study of Routing Protocols for Mobile AdHoc Networks (MANETs) Using GlomoSim

Special Issue of International Journal of Lateral Computing, Vol 3,No.1, ISSN No. 0973-208X, Pp51- 61, 2006.

 

 

(ii) National Journal:

S.No.

Title of Research Paper

Name of Journal and Year/Issue No.

Publication as main author or co-author

Remarks,

if any

1

A State Transition Analysis Technique (STAT) Based Intrusion Detection System for Mail Transport Agent

Varah Mihir Journal of Computer and Information Sciences, Vol. 2 No.1&2, Pages: 37-56, ISSN No. 0973-3639, 2007.

 

 

 






(II)International Conference :


 S.No.         

Title of Paper

Detail of Conference

Organizing Society/  Institute

Remarks

 

1.

Finding Customer Loyalty Based on Weighted RFMD Clustering Model.

Proceedings of 4th International Conference on Next Generation Computing Technologies (NGCT-2018) in Springer Communications in Computer and Information Science (CCIS) ISSN No.: 1865-0929, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, November.

University of Petroleum and Energy Studies, Dehradun, Uttarakhand, November.

 

2

An Efficient and Scalable Record Linkage Approach to Identify Falsified Applications in e-Governance Databases

 2018 International Conference on Computer Communication and Informatics (ICCCI -2018),Jan. 04 – 06, 2018, Coimbatore, INDIA .

 

(ICCCI -2018)

 

 

3

Distance Based Oversampling Method to Solve Multi-class Imbalance Problem

7th IEEE International Conference on Communication Systems and Network Technologies (CSNT-2017),Nov 11-13, 2017 at Nagpur, India.

 

Organized by IIIT, Nagpur

 

 

4

A mechanism for Operation Level Role Based Access Control in Web Services,

 7th IEEE International Conference on Communication Systems and Network Technologies (CSNT-2017)  Nagpur,Nov 11-13, 2017 at Nagpur, India.

Organized by IIIT,

 

5

Finding Community in Social Network Based on Profile Attributes

2nd International Conference SCESM 2017,27-28 Jan 2017.

 

 

6

A Novel Approach for Sensitive Information Sharing on Online Social Networks based on Trust Clearance,

 2nd  International Conference SCESM 2017,27-28 Jan 2017.

 

 

7

On Composition of SOAP Based and RESTful Services

IEEE 6th International Conference on Advanced Computing (IACC),  ISBN Information:INSPEC Accession Number: 16232684, DOI: 10.1109/IACC.2016.99,2016,27-28 Feb. 2016, Bhimavaram, India

IEEE,

 

8

A User Action Based Approach to Determine Trustworthiness among Users in Social Network

International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC),  ISBN Information:INSPEC Accession Number: 17238701, DOI: 10.1109/I-SMAC.2017.8058327.2017, 10-11 Feb. 2017, Palladam, India .

IEEE

 

9

A Framework To Integrate Multiple Cloud Storage Services And Provide Consistent Feature Set

2014 Annual IEEE India Conference (INDICON), Pages: 1 - 5, DOI: 10.1109/INDICON.2014.7030416.2014

 

 

10

Design of Composite Web Service to Obtain Best QoS

LNCS Springer-Verlag Berlin Heidelberg; International Conference on Information System, Design and Intelligent Applications (INDICON 2012),

 

 

11

Web Shield: A Modified Firewall to Detect Malicious Request

LNCS, Springer-Verlag Berlin Heidelberg; International Conference on Information System, Design and Intelligent Applications (INDICON 2012), Pages: 497-506,2012

 

Springer

 

12

An Approach to Improve Performance of a Packet-Filtering Firewall

 Proceedings of IEEE International Conference on wireless Networks WCON-2012,August 2012

IEEE International Conference

 

13

Efficiency Enhanced Association Rule Mining Technique

Springer-Verlag Berlin Heidelberg; International Conference on “Parallel, Distributed Computing Technologies and Application” (PDCTA2011), Manonmaniam Sundharanar University, Tirunelveli,Tirunelveli, India, 2011

 

Manonmaniam Sundharanar University, Tirunelveli,

 

14

Semi-Supervised Classification for Intrusion Detection Systems in Networks,

IEEE Xplore, Proceedings of International Conference on Cybernetics and Intelligent Systems (CIS- 2010),2010

IEEE

 

15

A Higher Accuracy Classifier based on Semi-Supervised Learning,

IEEE Xplore, 2010 IEEE International Conference on Computational Intelligence and Communication Networks,2010

IEEE

 

16

User Requirement Based Service Discovery for Event Planning System,

IEEE Proceedings of International Conference on Emerging Trends in Engineering and Technology,2009

IEEE

 

17

Securing Web Services Communication using Authentication and Confidentiality,

Proceedings of International Conference on Emerging Trends in Computing,2009

 

 

18

Ontology Based E-Learning System to Support Semantic Search

Proceedings of 2nd  International Conference on Semantic e-Business and Enterprise Computing (SEEC),2009

 

 

19

An Ontology Driven Rule Based Composition Framework to Extend Domain of Trust of Business Process.

Proceedings of International Conference on Semantic e-Business and Enterprise Computing (SEEC); Kingston University, London,2008

Kingston University, London

 

20

An Architecture for Ontology Based Learning Content Management System to Support Semantic Search for Learning Objects.

Proceedings of International Conference on Semantic e-Business and Enterprise Computing (SEEC).2008

Kingston University, London,

 

21

Design and Development of a Semantically Enriched Travel Web service.

 Proceedings of International Conference on Semantic e-Business and Enterprise Computing (SEEC); Pages: 60-65, Kingston University.2008

Kingston University, London

 

22

Intrusion Attack Pattern Analysis and Signature Extraction for web Services Using Honeypots.

IEEE Proceedings of First International Conference on Emerging Trends in Engineering and Technology.2008

IEEE

 

23

A User Guided Approach for Selection of Security Level in Composite Web Service.

Proceedings of International Conference on e-Business; Pages: 119-123.Bangkok, 2006

King Mongkut University, Bangkok

 

24

A Security Agent for Client Side Sensitive information Protection.

Proceedings of International Conference on e-Business; Pages: 124-130, King Mongkut University, Bangkok.Bangkok, 2006

King Mongkut University, Bangkok.

 

25

A User Authentication and Identification Method for Toll Collection System

International Workshop on Applied Information Technology 2005, IAIT’05.2005

 

 

26

HoneyAnalyzer – Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot.

 Second International Conference on Innovations in Information Technology (IIT’05),  Pages: 1-7.September 26-28, 2005,

 Dubai-UAE

 

27

Parallel Processing over a Network of Workstation

International Conference on Knowledge Management (imaze-2002).

 

 

28

Automatic Validation of Data During Entry Using ActiveX Control,

International Conference on Knowledge Management (imaze-2002).

 

 

29

Interaction: A Glue between Industry and the Institute

International Conference on Technical Education in 21st Century, Challenges and Strategies, Pages-161-167,1998

Org. by DTE, Madhya Pradesh,

 

Testing & Consultancy:

S. No.

Industry/ Organization

Period

1.           

Ideavate Solutions Pvt Ltd, Indore/USA

2011-12

2.           

Supra Computers Pvt. Ltd., Indore

1997-98

3.           

Takshshila Computers, Indore

1996-97

4.           

Optel India Ltd., Indore

1996-97

5.           

Impetus Ltd., Indore/USA

1995-96

Other Details:

Details of Conference/Seminar/Winter Summer Schools/Training Organized

S.No.

Title of Course

Duration Period of Course

Role

1.       

24th Annual Convention of ISTE in Dec 1992.

Dec 1992

Member of Organizing Committee

2.       

International Conference on Automation (ICAUTO’95)

14-16 Dec 1995

Member of Organizing Committee

3.       

International Conference on Technical Education in 21st Century (ICTE-21)

8-10 Jan 1998

Member of Organizing Committee

4.       

Regional Conferences under the banner of CSI, Indore Chapter  COMPUTING-2005

14-15 May 2005

Member of Organizing Committee

5.       

National Conference on Emerging Trends in Information Technology

18-20 Dec 2007

Convener, Organizing Committee

6.       

Two Week ISTE workshop on’ Effective Teaching / Learning of Computer Programming’ in collaboration with IITB under NMECT

14-24 December, 2009

Remote Center Coordinator and Course Coordinator

7.       

Two Week ISTE workshop on’ Data Base Management Systems’ in collaboration with IITB under NMECT

13-23 December, 2010

Network Coordinator

8.       

Two week ISTE Workshop on Software Development Techniques for Teachers  of Engineering and Science Institutes

5 Nov- 4 Dec 2011(weekends)

Network Coordinator

9.       

Two week ISTE Workshop on ’Writing Papers for Technical Conferences’, scheduled in collaboration with IITB under NMECT

Feb18-19, 2012

Remote Center Coordinator and Workshop Coordinator

10.   

Two week ISTE Workshop Computation  Fluid Dynamics

12-22, June,  2012

Remote Center Coordinator

11

Two week ISTE Workshop Introduction to Research Methodologies

25 June -4 July 2012

Remote Center Coordinator




Invited Lectures/Expert Talks/Chairmanships at Conferences

 S.No.  

Date

Topic

Address of performing event

Conducted Under

1.

16 th -17 th September and 7 th -8 th October, 2017

Pedagogy for Online and Blended Teaching –Learning Process

Indian Institute  of Technology, Bombay

2.

18 th September 2017

Applications of Computer Science

Shri Vaishnav Institute of Management, Indore

3.

19 th -20 th August  2017

Foundation Program in ICT for Education

Indian Institute  of Technology, Bombay

4.

30 th March 2017

Orientation Workshop for Remote Centre Coordinators

Indian Institute  of Technology, Bombay

National Mission on Education through ICT(MHRD)

5.

25 th March, 2017

Emerging Trends in Quality Management and IT Education

Shri Vaishnav Institute of Management, Indore

6.

16 th March 2017

Intellectual Property Rights

Shri G.S.Institute of Technology &Science, Indore

7.

30 th January- 4 th Februray 2017

CMOS, Mixed Signal and Radio frequency VLSI Design

Indian Institute of Technology, Kharagpur

National Mission on Education through ICT (MHRD)

8.

16 th September 2016

Subject Expert in the Search Committee

Shri Vaishnav Institute of Technology and Science, Indore

9

3 th March 2016

10.

8 th -18 th December 2015

Engineering Physics

Indian Institute of Technology, Bombay

National Mission on Education through ICT (MHRD)

11.

23 th &24 th September 2015

Emerging Trends & Technologies Series VI

Sushila Devi Bansal College of Engineering, Indore

IEEE MP- Subsection




               S.No                Professional Society                  Membership Number                          Status                       
1 IEEE 41559137 Annual
2 CSI IND00055827 Life  Member

Details of Responsibilities held in Institutional administration and development works.
  • Member BoS, Computer Sc. & Engg, RGPV, Bhopal
  • At Institute Level
  1. Head, Department of Computer Engineering
  2. In-Charge, Computer Center
  3. Chairman/Member, CWN Committee
  4. Member, Discipline Committee
  5. Member, Women Development Cell
  6. Member, Discipline Committee
  7. Assistant Supdtt., Semester Examinations
  8. Member, Academic Council
  9. Remote Center Coordinator for conducting ISTE workshops in collaboration with IIT, Bombay under NMEICT, MHRD, Govt. of India
  • At Department Level
  1. Coordinator of Accreditation related work for the department.
  2. Board of Studies- Agenda, Contacting Expert, Coordinating modifications in schemes syllabi with other faculty members, Preparing Minutes
  3. Department Stores in-charge- Involved in annual stock verification, write off related activities.
  4. Member of DPC
  5. Member, Exam Sub-committee
  6. Practical exam
  7. Compiling short of attendance and Detention related information
  8. Coordinating M.E. Dissertation viva-voce exams,
  9. Lab in-charge- Hardware Lab
  10. Coordinating Expert Lectures in the department
  11. In charge of Distance Education Program running in collaboration with IIT Bombay- Presently only Workshops, Winter/Summer Schools are being run during May-June and Nove-Dec every year.
  12. Coordinating with QIP Ph.D. candidates
  13. Industry-Institute Interaction- MoU etc.