MANAV RACHNA INTERNATIONAL INSTITUTE OF RESEARCH AND STUDIES
(Formerly MANAV RACHNA INTERNATIONAL UNIVERSITY )
Deemed to be University under section 3 of the UGC Act,1956
National Conferences
Manav Rachna International Institute of Research & Studies | |||||||||||||||
Research Publications of Faculty Members in National Conferences / Seminars / Workshops | |||||||||||||||
(Duration: From starting of career of individual faculty member till date) | |||||||||||||||
S. No. | Title of Paper | Name of All Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Outside Author(s) other than MRIU (Sequence First Name, Middle Name and Last Name) | Name of Conference | Venue of Conference | Proceeding or Abstract | Abstract Detail- Page Number, year of publication (If applicable) | Proceeding Detail- Page Number, year of publication (If applicable) | Paper Presented in Conference or Not (WRITE Y or N) | Publication /Presentation Month | Publication /Presentation Year | |||
MRIU Author-1 | MRIU Author-2 | MRIU Author-3 | MRIU Author-4 | ||||||||||||
1 | Wireless Body Area Network (WBAN) : Standards and Medical Application | Ashveer Singh , Abhishek Nath, Yashu Meel, Savita Sindhu | Ashveer Singh | Abhishek Nath | Yashu Meel | Savita Sindhu | National Conference on Advances in Material Science & IOTfor Smart Enviornment Monitoring ans Sustainabilty | Lingaya’s Vidhyapeeth | Abstract | PP 67 | NA | Y | March | 2018 | |
2 | Cyber Warriors: Tradeoffs between attack and defense of information system | Ayushi Sinha, Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | Ayushi Singh | NA | NA | NA | InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | MRIIRS, FARIDABAD | NA | NA | Proceeding of InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | Y | March | 2018 |
3 | A detailed study of Bigdata in Healthcare:Case study of Brenda and IBM Watson | Dipesh Jain, Vivek Kumar, Darpan Khanduja, Ritika Bateja,Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | Dipesh Jain | Vivek Kumar | Darpan Khanuja, Ritika Bayeja | NA | InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | MRIIRS, FARIDABAD | NA | NA | Proceeding of InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | Y | March | 2018 |
4 | Success Of Blockchain And Bitcoin | Chirag Madan, Rajat Garg, Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | Chirag Madan | Rajat Garg | NA | NA | InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | MRIIRS, FARIDABAD | NA | NA | Proceeding of InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | Y | March | 2018 |
5 | Social Networking Analysis: A case study in Tools | Tushar Kaushik, Sarthak Singhal, Jayant Mandan , Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | Tushar Kaushik | Sarthak Singhal | Jayant Madan | NA | InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | MRIIRS, FARIDABAD | NA | NA | Proceeding of InterSquad Cyber Intelligence Pvt. Ltd (ISCI – India) | Y | March | 2018 |
6 | A Review on “Future of Artificial Intelligence in Big Data” | Dr Kamlesh Sharma, Smriti Jha,Anamika, Vijaya jyoti | Dr. Kamlesh Sharma | NA | NA | NA | Smriti Jha,Anamika, Vijaya jyoti | Two days National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | Lingaya`s University Faridabad | NA | NA | Proceedings of National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | N | February | 2018 |
7 | A Comparative Study Of Big Data Processing Tools | Deepika Khurana, Vandana Batra | Deepika Khurana | Vandana Batra | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 3 | NA | Y | May | 2017 |
8 | Next Generation Of Big Data Visualization With Augmented Virtual Reality | Rachna Behl, Geetika Chawla | Rachna Behl | Geetika Chawla | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 11 | NA | Y | May | 2017 |
9 | An Extensive Review Of Learning Techniques In Data Stream Mining | Veena Mittal, Indu Kashyap | Veena Mittal | Indu Kashyap | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 12 | NA | Y | May | 2017 |
10 | Interest Measure Based Associative Classification In Data Mining | Ochin Sharma , Suresh Kumar, Nisheeth Joshi | Ochin Sharma | Suresh Kumar | NIL | NIL | Nisheeth Joshi | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 15 | NA | Y | May | 2017 |
11 | A Novel Hybrid DOM and Geometric Layout Model based Approach for Web Page Segmentation | Priyanka Grover, Poonam Katyal | Priyanka Grover | Poonam Katyal | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 16 | NA | Y | May | 2017 |
12 | Analysis And Development Of Load Balancing Algorithms In Cloud Computing | Deepa Bura, Meeta Singh, Poonam Nandal | Deepa Bura | Meeta Singh | Poonam Nandal | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 9 | NA | Y | May | 2017 |
13 | Performance Analysis of Olympic Runner | Shweta Sharma, Yachi kathuria, Subhrojeet Mukherjee, Ashutosh Mishra | Shweta Sharma | Yachi kathuria | Subhrojeet Mukherjee | Ashutosh Mishra | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 10 | NA | Y | May | 2017 |
14 | Analysis of IRIS Recognition algorithms | Shubham Chopra, Satyam Bhardwaj, Ram Narayan, Rohit Rajput, Vandana Batra | Shubham Chopra | Satyam Bhardwaj | Rohit Rajput | Vandana Batra | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 8 | NA | Y | May | 2017 |
15 | Home Automation Using Artificial Intelligence | Sahil Verma, Rohandeep Khurana,Vedant Sood, Meeta Singh | Sahil Verma | Rohandeep Khurana | Vedant Sood | Meeta Singh | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 13 | NA | Y | May | 2017 |
16 | Survey paper on Web Application Vulnerability Prediction | Shobha Tyagi | Shobha Tyagi | NIL | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 7 | NA | Y | May | 2017 |
17 | Query processing in Social Networks | Simran Goyal, Charu Pujara | Simran Goyal | Charu Pujara | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 18 | NA | Y | May | 2017 |
18 | Network Security: Internal and External attacks | Ujjwal Sharma, Princi Sharma, Vivek Rawal, Priti Narwal | Ujjwal Sharma | Princi Sharma | Vivek Rawal | Priti Narwal | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 8 | NA | Y | May | 2017 |
19 | Social Network | Saksham Kapur, Charu Pujara | Saksham Kapur | Charu Pujara | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 6 | NA | Y | May | 2017 |
20 | Social Media- A Mode for Cyber Attacks | Surbhi Jain, Ashwarya Arora, Jatin Gandhi, Shelja Sharma | Surbhi Jain | Ashwarya Arora | Jatin Gandhi | Shelja Sharma | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 20 | NA | Y | May | 2017 |
21 | Concurrency Control in Distributed Databases | Anchit, Sakshi Singh, Rachna Behl | Anchit | Sakshi Singh | Rachna Behl | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 33 | NA | Y | May | 2017 |
22 | A Comprehensive Study of Data Preprocessing Techniques | Divyanshu Verma, Mohit Goyal, Vandana Batra | Divyanshu Verma | Mohit Goyal | Vandana Batra | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 33 | NA | Y | May | 2017 |
23 | A Review of several possible internal/external attacks in cloud computing and their countermeasures | Prabhat Rajput, Purab Parashar, Shivam Pahwa, Preeti Narwal | Prabhat Rajput | Purab Parashar | Shivam Pahwa | Preeti Narwal | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 29 | NA | Y | May | 2017 |
24 | A Novel Divide and Conquer Approach to Identify LIS | Seema Rani, Dharmveer Singh Rajpoot | Seema Rani | NIL | NIL | NIL | Dharmveer Singh Rajpoot | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 11 | NA | Y | May | 2017 |
25 | A novel approach to RFID based Automated Parking Charges Collection System | Shradha Verma, Nidhi Garg, Shweta Sharma, Indu Kashyap | Shradha Verma | Nidhi Garg | Shweta Sharma | Indu Kashyap | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 14 | NA | Y | May | 2017 |
26 | Approach for regression Testing based on conditional premise | Ritu, Anuradha, Deepika, Charu Pujara | Ritu | Anuradha | Deepika | Charu Pujara | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 19 | NA | Y | May | 2017 |
27 | Prediction of Water level using Time Series on Badkhal Lake | Neeru Singh, Supriya Panda | Neeru Singh | Supriya Panda | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 21 | NA | Y | May | 2017 |
28 | Clustering & Event Detection in wireless sensor networks | Urvashi Chugh, Amit Chugh | Urvashi Chugh | Amit Chugh | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 18 | NA | Y | May | 2017 |
29 | A Comparative Analysis of Distance and Similarity Measures used for Text Document Clustering | Maedeh Afzali, Suresh Kumar | Maedeh Afzali | Suresh Kumar | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 17 | NA | Y | May | 2017 |
30 | Machine Learning for Big Data | Shefali Singhal | Shefali Singhal | NIL | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 21 | NA | Y | May | 2017 |
31 | E-Commerce in Digital India | Shilpa Bhatia, Sarthak Matta, Bindiya Ahuja, Monika Bhatia | Shilpa Bhatia | Sarthak Matta | Bindiya Ahuja | Monika Bhatia | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 24 | NA | Y | May | 2017 |
32 | Steganography Scheme Using Non-Dominated Sorting Genetic Algorithm | Pinki Kumari, Indu Kashyap | Pinki Kumari | Indu Kashyap | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 30 | NA | Y | May | 2017 |
33 | Experimental Review of Different Homomorphic Encryption Schemes for Integrity Verification of Data | Kanika Garg, Indu Kashyap | Kanika Garg | Indu Kashyap | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 31 | NA | Y | May | 2017 |
34 | Feature Subset Selection for Twitter Spam Detection | Harshita Tiwary, Indu Kashyap | Harshita Tiwary | Indu Kashyap | NIL | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 32 | NA | Y | May | 2017 |
35 | Predominance of Hybrid Routing Protocols in MANET | Deepa Mehta, Indu Kashyap, Sherin Zafar | Deepa Mehta | Indu Kashyap | NIL | NIL | Sherin Zafar | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | PP 34 | NA | Y | May | 2017 |
36 | Analysis And Development Of Load Balancing Algorithms In Cloud Computing | Deepa Bura, Meeta Singh, Poonam Nandal | Deepa Bura | Meeta Singh | Poonam Nandal | NIL | NIL | National Conference on Networking, Cloud Computing, Analytics & Computing Technology (NCNCAC) | MRIU | Abstract | NA | Y | May | 2017 | |
37 | Cloud Computing: A silver lining in the dark | Dr. Kamlesh Sharma, Abhigna B.S, Divya Arora | Dr. Kamlesh Sharma | NA | NA | NA | Abhigna B.S, Divya Arora | Two days National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | Lingaya`s University Faridabad | NA | NA | Proceedings of National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | N | January | 2017 |
38 | Speech Enabled System for Robot | Dr Kamlesh Sharma, Rishabh Anand | Dr. Kamlesh Sharma | NA | NA | NA | Rishabh Anand | Two days National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | Lingaya`s University Faridabad | NA | NA | Proceedings of National Conference on Innovation and Technology in “Cloud Computing and Information Security” (NC3IS-2016) | N | December | 2016 |
39 | Page Rank Algorithm | Dr. Kamelsh Sharma, Ritu | Dr. Kamlesh Sharma | NA | NA | NA | Ritu | National Conference on Interdisciplinary Research in Science & Technology | Lingaya’s GVKS Institute of Management & Technology Faridabad | NA | NA | Proceedings of National Conference on Interdisciplinary Research in Science & Technology | N | March | 2016 |
40 | Classification of the Devanagari Script Document using k-NN | M.K.Shukla, A. K. Dubey, S. Verma, G. Sharma, and V. Vashisht | Seema Verma | NIL | NIL | NIL | M.K.Shukla, A. K. Dub G. Sharma and V. Vashisht | ICEMS-2016 -International Conference on Recent Trends in Engineering and Material Sciences, March 17 | Jaipur National University | Abstract | 2016 | N | March | 2016 | |
41 | Adaptive Techniques for Image Analysis in Visual Inspection Systems | A. K. Dubey, M.K.Shukla, V. Vashisht, G. Sharma and S. Verma | Seema Verma | NIL | NIL | NIL | A. K. Dubey, M.K.Shukla, V. Vashisht, G. Sharma and S. Verma | ICEMS-2016 -International Conference on Recent Trends in Engineering and Material Sciences, March 17 | Jaipur National University | Abstract | 2016 | N | March | 2016 | |
42 | Comparative Study, Design and Performance Analysis of Circular Microstrip Antenna using DGS and DMS for Bandwidth Enhancement | Sunita Virmani | Sunita Virmani | NIL | NIL | NIL | NIL | 2015 Recent Advances in Microwave Engineering | MITS,Gwalior | Proceeding | NA | 2015 | N | Feb | 2015 |
43 | Efficient and Accurate Human Heart Rate Analysis During Distinct Cardiac States | Rashima Mahajan | Dipali Bansal | NIL | NIL | NIL | National Conference ETEEE | Jamia Milia Islamia | Proceeding | NA | Proceeding of National Conference ETEEE | Y | Feb | 2015 | |
44 | Gain Enhancement of an Elliptical Microstrip Patch Antenna Using a Cylindrical Electromagnetic Crystal Substrate | Sunita Virmani, P.K.Singhal | Sunita Virmani | NIL | NIL | NIL | P.K.Singhal | National Conference on Recent Advances in Communication Engineering | MITS,Gwalior | Proceeding | NA | 4-5 Dec | Y | December | 2015 |
45 | Improvement in Rebalanced RSA Variant | Seema Verma, Manoj Kumar | Seema Verma | NIL | NIL | NIL | Manoj Kumar | International Conference on Recent Developments in Science, engineering and Technology (REDSET-2015) | GD Goenka University, Gurgaon | Proceeding | 283-286, 2015 | N | October | 2015 | |
46 | Natural Computing: A Review | Anil Chopra | Anil Chopra | NIL | NIL | NIL | NIL | National Conference on Emerging Trends in Information Technology | IITM, Delhi | Proceeding | NA | 2014 | Y March 17, 2014 |
March | 2014 |
47 | A Comparative study of Question Answering Systems | Rosy Madaan | Rosy Madaan | NIL | NIL | NIL | NA | RTCSIT-2013 | Echelon Institute of Technology, Faridabad | Proceeding | Y | October | 2013 | ||
48 | “Distributed Denial of SErvice Attacks Mitigation & Packet Filtering Techniques” |
Ritu Maheshwari, Dr. C. Rama Krishna | Ritu Maheshwari | NIL | NIL | NIL | Dr. C. Rama Krishna | Innovations and Knowledge Discovery in Computing Technologies (IKDCT-2013) |
BHaddal Institutes, IET Bhaddal Technical Campus, Ropar, Punjab |
Proceeding | NA | 2013 | YES, 13th August 2013 | August | 2013 |
49 | Hypothesis Based Intrusion Detection Model for Improvising a Zone | S. S. Tyagi, Kuldeep Tomar, Rachna Gupta. |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Rachna Gupta. |
National Conference on Advanced Computing Technologies, Department of Computer Science & Applications |
Maharshi Dyanand University, Rohtak, |
Proceeding | NA | Volume II, P-169. 2013 |
YES March 30, 2013 |
March | 2013 |
50 | Development of Replica Management for Improvisation Heavy Traffic Load Failure | S. S. Tyagi, Kuldeep Tomar, Poonam |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Poonam |
National Conference on Advanced Computing Technologies, Department of Computer Science & Applications |
Maharshi Dyanand University, Rohtak, |
Proceeding | NA | Volume II, P-192. 2013 |
YES March 30, 2013 |
March | 2013 |
51 | A Cost Efficient Architecture for the Mobile Clients using the modern computing technology: Mobile Cloud Computing | Prateek Jain, Dr. Uma Shankar Pandey | Prateek Jain | NIL | NIL | NIL | Dr. Uma Shankar Pandey | Indiacom | Bharti vidyapeeth, BVICAM | NA | NA | 2013 | Y | MArch | 2013 |
52 | Dual band microstrip patch antenna | Monika, Sunita, Shruti | Monika | Sunita | Ms.Shruti | NIL | NIL | 2012 COMMUNE Conference on Advancements in Communication & Computing Systems | Gurgaon | Proceeding | NA | 2012 | N | NIL | 2012 |
53 | Survey on Weak Cache Consistency Mechanisms | Rosy Madaan | Rosy Madaan | NIL | NIL | NIL | NA | RTCSIT-2012 | Echelon Institute of Technology, Faridabad | Proceeding | Y | October | 2012 | ||
54 | Implementation of Semaphores to solve synchronization problems | Rosy Madaan | Rosy Madaan | NIL | NIL | NIL | NA | RTEEE-2012 | Echelon Institute of Technology, Faridabad | Proceeding | Y | October | 2012 | ||
55 | Ranking blog pages | Rosy Madaan, A.K. Sharma, Ashutosh Dixit, Deepti Kapri, Renu Mudgal | Rosy Madaan | NIL | NIL | NIL | A.K. Sharma, Ashutosh Dixit, Deepti Kapri, Renu Mudgal | RTEEE-2012 | Echelon Institute of Technology, Faridabad | Proceeding | Y | October | 2012 | ||
56 | Web Page Summarization Techniques: A Comparative Review | Rosy Madaan, A.K. Sharma, Ashutosh Dixit, Renu Mudgal, Deepti Kapri | Rosy Madaan | NIL | NIL | NIL | A.K. Sharma, Ashutosh Dixit, Renu Mudgal, Deepti Kapri | RTCSIT-2012 | Echelon Institute of Technology, Faridabad | Proceeding | Y | October | 2012 | ||
57 | “Cloud Computing Based E-LEarning Services”, | Ritu Maheshwari | Ritu Maheshwari | NIL | NIL | NIL | NIL | National Seminar on ICT in Technical Education |
organised by National Institute of Technical Teachers’ Training and Research (NITTTR), Chandigarh |
Proceeding | NA | 2012 | YES, 6th Sept 2012 | September | 2012 |
58 | A novel approach to detect near-duplicates by optimizing rendering phase TDW-matrix based Algorithm using Lemmatization | Tanvi Gupta,Latha Banda | Tanvi Gupta | NIL | NIL | NIL | Latha Banda | NCDMW 2012 | Lingaya’s University | Proceeding | NA | Page 646, 2012 | N | April | 2012 |
59 | Proposing model towards progress of reliability in autonomic network” | Amit Chugh and, Urvashi Chugh | Amit Chugh | Urvashi Chugh | NIL | NIL | NIL | National Conference on “DMDW 2012” at Lingaya’s University | Lingaya’s University | Proceeding | NA | PP-374-376 13-14Apr 2012 | Y | April | 2012 |
60 | Wsnort: A Hybrid Snort System for Intrusion Detection using Genetic Algorithms in wireless environment. | Divya, Amit Chugh |
Amit Chugh | NIL | NIL | NIL | DIVYA | National Conference on “DMDW 2012” at Lingaya’s University | Lingaya’s University | Proceeding | NA | PP-430-435 Apr 2012 | N | April | 2012 |
61 | Enhancing performance of database using UML2.0 class diagrams | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | National Conference on Business Intelligence and Data Warehousing | USIT,GGSIPU ,Delhi | Proceeding | NA | 17th March 2012 | N | March | 2012 |
62 | Priority Based Scheduling for Cloud Metascheduler | Prateek Jain, Dr. Vidushi Sharma | Prateek Jain | NIL | NIL | NIL | Dr. Vidushi sharma | Commune, CACCS | ITS, Greater Noida | NA | NA | 2012 | Y | March | 2012 |
63 | Noval Design of Multiband Fractal Antenna | Vimlesh Singh, Priyanka Bansal, Sunita Virmani & P.K Singhal | Vimlesh Singh | Priyanka Bansal | Sunita Virmani | NIL | P.K Singhal | NCEC- 2011 | MITS Gwalior | Proceeding | NA | 16-17 Dec 2011 | Y | December | 2011 |
64 | Data Aggregation and Energy Balancing by Efficient Cluster Head Selection in Wireless Sensor Networks | S. S. Tyagi Priti Narwal |
Priti Narwal | S. S. Tyagi | NIL | NIL | NIL | IEEE sponsored National Conference on Future Mobile Radio Systems | FET, MRIU | Proceeding | NA | 2011 | N | September | 2011 |
65 | Comparative Study based on Public Key Cryptosystems | S. S. Tyagi Arun Kumar |
Arun Kumar | S. S. Tyagi | NIL | NIL | NIL | IEEE sponsored National Conference on Future Mobile Radio Systems | FET, MRIU | Proceeding | NA | 2011 | N | September | 2011 |
66 | Samart microstrip antenna for mobile wireless communication systems- An overview | Sunita virmani | Sunita virmani | NIL | NIL | NIL | NIL | National Conference on Future mobile systems | MRIU | Proceeding | NA | 17/9/11 | 17/9/11 | September | 2011 |
67 | Smart microstrip antenna for mobile wireless communication systems- An overview | Sunita virmani | Sunita virmani | NIL | NIL | NIL | NIL | National Conference on Future mobile systems | MRIU | Proceeding | NA | One day(17/9/11 | N | September | 2011 |
68 | Smart microstrip antenna for mobile wireless communication systems- An overview | Sunita virmani | Sunita virmani | NIL | NIL | NIL | NIL | National Conference on Future mobile systems | MRIU | Proceeding | NA | 17 September 2011 | N | September | 2011 |
69 | DDS Schemes for Data Allocation. Comparison Study. | Vandna Batra,Amarjeet Sangwan, Sunil Kumari | Vandna Batra | NIL | NIL | NIL | Amarjeet Sangwan, Sunil Kumari | National Conference on Advances in Computational Intelligence | SPGOI, Rohtak | Proceeding | NA | 2011 | Y 9 july,2011 |
July | 2011 |
70 | Advanced Functional Dependencies in Schema Transformation | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | National conference on Engineering Application (NCEA-2011) | St. Soldier institute of Engg. And Technology, Jalandhar | Proceeding | NA | 2011 | N | April | 2011 |
71 | Mobile AdHoc Network: Optimization of Routing Algorithms for Mobility Model | Meeta Singh | Meeta Singh | Dr. A.K. Yadav | INDIACom-2011 | Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi | Proceeding | N | March | 2011 | |||||
72 | A Performance Analysis of Data Encryption Algorithms | S.S.Tyagi, Arun Kumar |
Arun Kumar | S. S. Tyagi | NIL | NIL | NIL | National Conference on Recent Trends in Engineering & Mathematical Sciences. | ACME, Faridabad,February 24th-25th 2011 |
Proceeding | NA | Pg 56-59 2011 |
N | February | 2011 |
73 | A Performance Comparison for Cast and RC5 Encryption Algorithms | S.S.Tyagi, Arun Kumar, Anju Gera |
Arun Kumar | S. S. Tyagi | NIL | NIL | Anju Gera | National Conference on Recent Trends in Engineering & Mathematical Sciences. |
ACME, Faridabad,February 24th-25th 2011 |
Proceeding | NA | Pg 26-30 2011 |
N | February | 2011 |
74 | Implementation of an Ad hoc routing module for video transfer |
S.S.Tyagi, Ajeet Pratap Singh, Neha Sharma |
S.S.Tyagi | Ajeet Pratap Singh | NIL | NIL | Neha Sharma | National Conference on Communication, Networks & Security, 26th-27th Feb 2011 | IET, Alwar | Proceeding | NA | 2011 | N | February | 2011 |
75 | Mobile Ad Hoc Networks: An adaptive routing protocol for video transfer | S.S.Tyagi, Ajeet Pratap Singh, Neha Sharma |
S.S.Tyagi | Ajeet Pratap Singh | NIL | NIL | Neha Sharma | National Conference on Communication, Networks & Security, 26th-27th Feb 2011 | IET, Alwar | Proceeding | NA | 2011 | N | February | 2011 |
76 | A Study Based on Asymmetric Key Algorithms |
S. S. Tyagi, Arun Kumar |
Arun Kumar | S. S. Tyagi | NIL | NIL | NIL | National Seminar of AIC-2011 |
DCTM, Palwal |
Proceeding | NA | 40664 | N | February | 2011 |
77 | Energy efficient protocols for cluster head selection in wireless sensor networks |
S. S. Tyagi, Priti Narwal |
Priti Narwal | S. S. Tyagi | NIL | NIL | NIL | National Seminar of AIC-2011, 26th-27th Feb 2011 |
DCTM, Palwal |
Proceeding | NA | 40664 | N | February | 2011 |
78 | Developing Intelligent Interactive agent applications using Mix-Initiative Reasoning | Surjeet Dalal | Surjeet Dalal | NIL | NIL | NIL | NIL | National Conference on Knowledge Discovery and Network Security |
Om Institute of Tech. & Management, Hisar | Proceeding | NA | 2011 | N | February | 2011 |
79 | Designing New Scheduling Architecture with less complex and improve QoS of IEEE 802.6 | Surjeet Dalal | Surjeet Dalal | NIL | NIL | NIL | NIL | National Conference on Knowledge Discovery and Network Security | Om Institute of Tech. & Management, Hisar | Proceeding | NA | 2011 | N | February | 2011 |
80 | Review of MIMO Technology in LTE Advanced for 4G Wireless Systems | Abhiruchi Passi, Sunita Virmani | Abhiruchi Passi | Sunita Virmani | NIL | NIL | NIL | National Conference on Electronics and Communication | MITS, Gwalior | Proceeding | NA | 22-24 Dec, 2010 | Y | December | 2010 |
81 | Energy aware routing Protocol for Wireless Sensor Networks | Abhiruchi Passi, Sunita Virmani | Abhiruchi Passi | Sunita Virmani | NIL | NIL | NIL | National Conference on Electronics and Communication | MITS, Gwalior | Proceeding | NA | 22-24 Dec, 2010 | Y | December | 2010 |
82 | Comparison of Image Synthesized through Texture Transfer |
Shobha Tyagi | Shobha Tyagi | NIL | NIL | NIL | NIL | NCAKM Conference | Lingayas University, Faridabad |
Proceeding | NA | 2010 | N | November | 2010 |
83 | MRI Segmentation using K-means |
Shobha Tyagi | Shobha Tyagi | NIL | NIL | NIL | NIL | NCAKM Conference organized by Lingayas University, Faridabad | Lingayas University Faridabad |
Proceeding | NA | 2010 | N | November | 2010 |
84 | Improving software development using fuzzy logic | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | National Conference On Information, Computational Technologies and e-Governance NCICTG 2010 | Alwar,Rajasthan | Proceeding | NA | 2010 | N | November | 2010 |
85 | Routing Optimization for MANET | Meeta Singh, Poonam Nandal | Meeta Singh | Poonam Nandal | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:23-29, October,2010 | N | October | 2010 |
86 | Routing Discovery for Mobile Ad-hoc Network | Meeta Singh, Poonam Nandal | Meeta Singh | Poonam Nandal | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:92-97, October,2010 | N | October | 2010 |
87 | Development of Hybrid S/w Component Manitenance Measures | Meeta Singh, Poonam Nandal | Meeta Singh | Poonam Nandal | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:291-302, October,2010 | N | October | 2010 |
88 | A Bottom-up Tree Based Parsing Approach | Poonam Nandal,Meeta Singh | Poonam Nandal | Meeta Singh | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:303-310, Oct0ber,2010 | N | October | 2010 |
89 | Routing Optimization for MANET | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:23-29, October,2010 | N | October | 2010 |
90 | Routing Discovery for Mobile Ad-hoc Network | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:92-97, October,2010 | N | October | 2010 |
91 | Development of Hybrid S/w Component Manitenance Measures | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:291-302, October,2010 | N | October | 2010 |
92 | A Bottom-up Tree Based Parsing Approach | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National Conference on Emerging Computing Technologies (NCECT-2010) | ITS, Ghaziabad | Proceeding | NA | Page no.:303-310, Oct0ber,2010 | N | October | 2010 |
93 | Mobile Adhoc Networks | Rachna Behl, Charu Pujara |
Rachna Behl | Charu Pujara | NIL | NIL | NIL | National Conference on Role of Information and Software Technologies | DAV, NIT, Faridabad |
Proceeding | NA | NIL | YES July 26-27, 2010 |
July | 2010 |
94 | LRDA and its Significance in S/W Quality Management |
Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | National Women’s conference on exploring Potentialities of women in engineering(EPWIE-2010) | CIT, Changa, Anand, Gujarat | Proceeding | NA | 2010 | N | July | 2010 |
95 | “Analysis of FIPM and FTP –DS” | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | National Conference on Role of Information and Software Technologies | D.A.V. Contenary College, Faridabad. |
Proceeding | NA | 2010 | N | July | 2010 |
96 | “Analysis of FIPM and SFA-PR algorithm based on frequent data in data mining regression technique” | Priyanka Grover, Pinky Sagar | Priyanka Grover | Pinky Sagar | NIL | NIL | NIL | National Conference on Role of Information and Software Technologies | D.A.V. Contenary College, Faridabad. |
Proceeding | NA | 2010 | N | July | 2010 |
97 | Real world problem in Automatic Speech Recognition | Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | National conference on Emerging Trends in Information Technology and Communication System |
BSAITM,Faridabad | Proceeding | NA | 2010 | Y July 2010 |
July | 2010 |
98 | Ant Colony Optimization and its Application | Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | National conference on Emerging Trends in Information Technology and Communication System |
BSAITM,Faridabad | Proceeding | NA | 2010 | Y July 2010 |
July | 2010 |
99 | Applying business intelligence in intelligent agent applications | Surjeet Dalal, Keshav Jindal, Amit Mahal | Surjeet Dalal | NIL | NIL | NIL | Keshav Jindal, Amit Mahal | National Conference on Role of information & Software Technologies (IT-2010) | DAV Centenary College Faridabad | Proceeding | NA | 26-27 July 2010, pp 50-52 | Y July 2012 |
July | 2010 |
100 | Data Mining: How to mining knowledge from text | Surjeet Dalal, Keshav Jindal, Amit Mahal | Surjeet Dalal | NIL | NIL | NIL | Keshav Jindal, Amit Mahal | National Conference on Role of information & Software Technologies (IT-2010) | DAV Centenary College Faridabad | Proceeding | NA | 26-27 July 2010, pp 50-52 | Y July 2013 |
July | 2010 |
101 | Energy Aware Routing Protocol for Wireless Sensor Network (WSNs) |
Sunita, Abhiruchi | Sunita | Abhiruchi | NIL | NIL | NIL | 2010 National Conference on electronics and Communication MITS Gwalior | MITS,Gwalior | Proceeding | NA | 2010 | Y | June | 2010 |
102 | Security Issues in Near Field Communication | Abhiruchi Passi, Sunita Virmani, Deepak Batra | Abhiruchi Passi | Sunita Virmani | Deepak Batra | NIL | NIL | National Conference on Advanced Computing and Communication Technology | Vaish College of Engineering, Rohtak | Proceeding | NA | 25-26th June, 2010 | Y | June | 2010 |
103 | Ant Colony Optimization for solving Travelling salesman Problem | Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | National Conference organized by Jaipuria Institute of Management., Vasundhra, Ghaziabad. | Jaipuria Institute of Management., Vasundhra, Ghaziabad. |
Proceeding | NA | 2010 | Y June 2010 |
June | 2010 |
104 | Improvement in Ant Colony Optimization for solving Travelling Salesman Problem |
Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | NCAKM Conference organized by Lingayas University, Faridabad | Lingayas University, Faridabad |
Proceeding | NA | 2010 | Y June 2010 |
June | 2010 |
105 | “Non Linear based prediction method for one dimensional stream data” . | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | National Conference ACCT-2010 | VCE, Rohtak. | Proceeding | NA | 2010 | N | June | 2010 |
106 | A Cross-Layer Neighbor-Assisted Handoff Scheme for Wimax Network | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | National Conference on Advanced Computing & Communication. Technology. ACCT-2010 | Vaish College of Engineering, Rohtak |
Proceeding | NA | 2010 | N | June | 2010 |
107 | Designing of business tool using intelligent agent | Surjeet Dalal, Vivek Jaglan, Susheel Kumar | Surjeet Dalal | NIL | NIL | NIL | Vivek Jaglan, Susheel Kumar | National Conference Advanced Computing & Communication tech (ACCT-2010) | Vaish College of Engineering, Rohtak | Proceeding | NA | 25-26 June 2010, pp 751-754 | Y June 2011 |
June | 2010 |
108 | Design of Middleware for Effective battery power utilization in mobile Devices |
Lalit Kumar , Kuldeep Dhania , Sunil Kumar | Lalit Kumar | NIL | NIL | NIL | Kuldeep Dhania , Sunil Kumar | Advanced Computing & Communication Technologies |
Vaish College of Engg, Rohtak |
Proceeding | NA | June, 2010 | No | June | 2010 |
109 | Optimal Plam Dorsa Vein Pattern segmentation using pattern maker algorithm | Madhumita Kathuria, Ranjeeta Mittal, Arti Negi | Madhumita Kathuria | Ranjeeta Mittal | Arti Negi | NIL | NIL | National Conference on Advance computing and Communication Technology | Vaish college of engineering,Rohtak | Proceeding | NA | 25-26 june 2010 | Y | June | 2010 |
110 | Performance Enhancement of Authentication System using multimedia Biometric | Madhumita Kathuria, Ranjeeta Mittal, Arti Negi | Madhumita Kathuria | Ranjeeta Mittal | Arti Negi | NIL | NIL | National Conference on Advance computing and Communication Technology | Vaish college of engineering,Rohtak | Proceeding | NA | 25-26 june 2010 | Y | June | 2010 |
111 | Reducing the effect of noise on image | Madhumita Kathuria, Ranjeeta Mittal, Arti Negi | Madhumita Kathuria | Ranjeeta Mittal | Arti Negi | NIL | NIL | National Conference on Advance computing and Communication Technology | Vaish college of engineering,Rohtak | Proceeding | NA | 25-26 june 2010 | Y | June | 2010 |
112 | “Non Linear Regression based prediction method for one dimensional stream data”. | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | National conference on Emerging Trends In Computer Science & Information Technology | Al-Falah School of Engineering & Technology, Faridabad |
Proceeding | NA | 2010 | N | April | 2010 |
113 | Comparision of AODV & DSR Routing Protocols Using Simulation | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National conference on Emerging Trends In Information Technology & Communication Systems | BSAITM,Faridabad | Proceeding | NA | April,2010 | N | April | 2010 |
114 | An Energy Efficient Middleware Protocol for Mobile Devices in Ubiquitous computing |
Lalit Kumar , Kuldeep Dhania , Sunil Kumar | Lalit Kumar | NIL | NIL | NIL | Kuldeep Dhania , Sunil Kumar | “E-Manthan -2010” National Conference on Electronics Comm. & Instrumentation Collaboration with IETE |
College of Science & Engineering, Jhansi |
Proceeding | NA | April, 2010 | No | April | 2010 |
115 | Real World Problems in Automatic Speech Recognition | Karishma Gulati | Karishma Gulati | NIL | NIL | NIL | NIL | National Conference on Emerging Trends in Information Technology & Communication Systems | B.S. Anangpuria Educational Institutes,Village Alampur, Faridabad | Proceeding | NA | Page no.-106,Year-2010 | Y | APRIL | 2010 |
116 | Ant Coloby Optimization And Its Applications | Shaveta Malik,Karishma Gulati | Shaveta Malik | Karishma Gulati | NIL | NIL | NIL | National Conference on Emerging Trent in Information Technology & Communication Systems | B.S. Anangpuria Educational Institutes,Village Alampur, Faridabad | Proceeding | NA | Page no.-166,Year-2010 | Y | APRIL | 2010 |
117 | Power Saving Protocols for Multi Hop Mobile Ad Hoc Networks | Abhiruchi Passi, Sunita Virmani | Abhiruchi Passi | Sunita Virmani | NIL | NIL | NIL | National Conference on Wireless Communication and VLSI Design | Gwalior Engineering College, Gwalior | Proceeding | NA | 27-28 March, 2010 | Yes, 27th March, 2010 | March | 2010 |
118 | The expeditional of Web Mining | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | National Conference on Advances in Knowledge Management | Lingayas University, Faridabad |
Proceeding | NA | 2010 | N | March | 2010 |
119 | Improving Software Engineering measurement using Fuzzy Logic | Karishma Gulati,Pawan Bhadana | Pawan Bhadana | Karishma Gulati | NIL | NIL | NIL | National Conference onInnvation:a way to keep ahead | Jaipuria Group of Institutions, Ghaziabad | Proceeding | NA | Page no-95, Year-2010 | Y | MARCH | 2010 |
120 | Speech Recognition Using HMM/ANN Hybrid Approach for Punjabi To English conversion | Karishma Gulati | Karishma Gulati | NIL | NIL | NIL | NIL | National Conference on Advances in Knowledge Management(NCAKM) | Lingaya’s University, Faridabad | Proceeding | NA | Page no.-328, Year-2010 | Y | FEBRUARY | 2010 |
121 | Image Processing | Poonam Katyal | Poonam Katyal | NIL | NIL | NIL | NIL | National Conference on IT, (28 Feb- 1 March 2009) | DAV College of Engg., Amritsar. | Proceeding | NA | 2009 | N | March | 2009 |
122 | “Improved Security in Wi-Fi N/W” | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | National Conference on Future Communication paradigms in 21st century | HIET Kaithal | Proceeding | NA | 2009 | N | March | 2009 |
123 | Voice Traffic Broadcast in Mobile Adhoc Network | Neeraj Sharma | Neeraj Sharma | NIL | NIL | NIL | NIL | NCACNIT-09 | GJUS&T Hisar | Proceeding | NA | 2009 | Y | March | 2009 |
124 | Flooding Attacks Prevention in Ad Hoc Networks | Neeraj Sharma, Anuj Sharma, Sanjay Singhal | Neeraj Sharma | NIL | NIL | NIL | Anuj Sharma, Sanjay Singhal | NCACNIT-09 | GJUS&T Hisar | Proceeding | NA | 2009 | Y | March | 2009 |
125 | Speech Recognition from Hindi to English | Shanu Garg | Shanu Garg | NIL | NIL | NIL | NIL | National conference on Soft Computing and Artificial Intelligence |
Lingaya’s University | Proceeding | NA | 2009 | Y 16 January 2009 |
January | 2009 |
126 | An efficient top-down tree based parsing algorithm | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National conference on Emerging Trends In Computer Science & Information Technology | Al-Falah School of Engineering & Technology,Faridabad | Proceeding | NA | September,2008 | N | September | 2008 |
127 | Analysis of Microsoft Passport Protocol | S. S. Tyagi , Anil Kumar, R. K. Chauhan |
S. S. Tyagi | NIL | NIL | NIL | Anil Kumar, R. K. Chauhan |
National Conference on Future Trends in Software Development | MRCE | Proceeding | NA | July 2008 |
N | July | 2008 |
128 | Secure Routing in Adhoc Network | S. S. Tyagi , R. K. Chauhan |
S. S. Tyagi | NIL | NIL | NIL | R. K. Chauhan | National Seminar on Latest Trends in Comm. Technologies | DCE, Gurgaon | Proceeding | NA | 2007 | N | March | 2007 |
129 | Software Component Maintenance Measures | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | National conference on Emerging Trends In Software Engineering | N.C.College Of Engineering, Israna, Panipat | Proceeding | NA | 2006 | N | July | 2006 |
Guidelines regarding withdrawal and refund of fee for UG, PG and Ph.D for Academic Session 2023-24 – Click here