MANAV RACHNA INTERNATIONAL INSTITUTE OF RESEARCH AND STUDIES
(Formerly MANAV RACHNA INTERNATIONAL UNIVERSITY )
Deemed to be University under section 3 of the UGC Act,1956
Research Publications in International Journals
Manav Rachna International University | |||||||||||||
Research Publications of Faculty Members in International Journals | |||||||||||||
(Duration: From starting of career of individual faculty member till date) | |||||||||||||
S. No. | Title of Paper | Name of All Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Outside Author(s) other than MRIU (Sequence First Name, Middle Name and Last Name) | Name of Journal | Journal Published from (Country Name) | Name of Publisher | Volume/Issue, Page Number(s) and Year of publication (In sequence only) | Publication Month | Publication Year | |||
MRIU Author-1 | MRIU Author-2 | MRIU Author-3 | MRIU Author-4 | ||||||||||
1 | Routing in networks using genetic algorithm | Dr. Meenakshi , Dr. Suresh Kumar | Dr. Meenakshi | Dr. Suresh Kumar | NIL | NIL | Int. J. Communication Networks and Distributed Systems, Vol. 20, No. 3, 2018 | Inderscience | Vol. 20, No. 3, 2018 | March | 2018 | ||
2 | Green Database: An Initiative to Enhance Renewable Energy Efficiency | Karishma Gulati, Deepika Khurana | Karishma Gulati | Deepika Khurana | International Journal of Scientific Research in Computer Science, Engineering and InformationTechnology (IJSRCSEIT) | India | Technoscience Academy | Vol-3,Issue3 | March-April | 2018 | |||
3 | Natural Language Processing for Hybrid Knowledge Representation. | Dr. Poonam Tanwar, Dr. T.V Prasad, Dr. Kamlesh Dutta | Dr. Poonam Tanwar | NIL | NIL | NIL | Dr. T.V Prasad, Dr. Kamlesh Dutta | Int. J. Advanced Intelligence Paradigms, Vol. 10, No. 3, 2018 | Switzerland | Inderscience | Vol. 10, No. 3, PP 223, 235, ISSN online: 1755-0394 ISSN print: 1755-0386 DOI: 10.1504/IJAIP.2018.10011379 |
March | 2018 |
4 | Dynamic Priority based packet handling protocal fro WBAN | Madhumita Kathuria, Dr. Sapna Gambhir | Madhumita Kathuria | NIL | NIL | NIL | Dr. Sapna Gambhir | International Journal of Computational Systems Engineering | Inderscience | Vol. 4, Issue 1 | March | 2018 | |
5 | Improvised divide and conquer approach for the LIS problem | Seema Rani, Dr Dharmveer Singh Rajpoot | Seema Rani | NIL | NIL | NIL | Dr Dharmveer Singh Rajpoot | Journal of Discrete Algorithms | England | Elsevier | Vol. 48, pg. 17-26, 2018 | February | 2018 |
6 | ON THE SECURITY OF OPEN SOURCE SOFTWARE. | Prattay Sanyal1 , Shubham Sharma1 , DeepaBura2 and Prasenjit Banerjee2 | Prattay Sanyal | Shubham Sharma | Deepa Bura | Prasenjit Banerjee | International Journal of advanced Research(IJAR) | India | IJAR | Volume 5, Issue 11,pp-1338-1348 | February | 2018 | |
7 | A Novel UML Based Approach for Early Detection of Change Prone Classes | Deepa Bura, Amit Choudhary, R.K. Singh | Deepa Bura | NIL | NIL | NIL | Amit Choudhary, R.K. Singh | International Journal of Open Source Software and Processes (IJOSSP) | IGI Global | Vol. 8, Issue 3, Article 1. | February | 2018 | |
8 | Emotion Recognition via EEG using Neural Network Classifier | Rashima Mahajan | Rashima Mahajan | Nil | Nil | Nil | Nil | Soft Computing Theories and Applications-2016, Vol 2, AISC series of SPRINGER | Singapore | Springer | 583, 429-438, 2018 | February | 2018 |
9 | Symmetric wavelet Analysis towards MRI Image Compression | Ekta Soni and Rashima Mahajan | Rashima Mahajan | Nil | Nil | Nil | Ekta Soni | Soft Computing Theories and Applications-2016, Vol 2, AISC series of SPRINGER | Singapore | Springer | 583, pp. 533-547, 2018 | February | 2018 |
10 | A Novel UML Based Approach for Early Detection of Change Prone Classes | Deepa Bura, Amit Choudhary, R.K. Singh | Deepa Bura | Amit Choudhary, R.K. Singh | International Journal of Open Source Software and Processes (IJOSSP) | United States | IGI Global | Vol. 8, Issue 3, Article 1. | January | 2018 | |||
11 | Medical Image Contrast Enhancement using Range Limited Weighted Histogram Equalization | Monika Agarwal, Rashima Mahajan | Rashima Mahajan | Nil | Nil | Nil | Monika Agarwa | Procedia Computer Science Elsevier | Elsevier, Science Direct | 125, 149-156, 2018 | January | 2018 | |
12 | Mobile devices and Communication Security from Vulnerabilities, Malacious Attacks with its Solution | Vaibhav, Himanshu, Ruhani, Poonam Nandal | Vaibhav | Himanshu | Ruhani | Poonam Nandal | Journal of Engineering and Applied Sciences | Pakistan | Medwell Journals | Volume 12 Issue 5, 2018 | January | 2018 | |
13 | Reconstructing missing hourly real-time precipitation data using a novel intermittent sliding window period algorithm for automatic weather station data of IMD | Hema N, Krishna Kant | Krishna Kant | NA | NA | NA | Hema N | Journal of Meteorological Research (Springer) | NA | NA | 31(4), 774-790, doi:10.1007/s13351-017-6084-8. | NA | 2017 |
14 | A Novel Approach to Fish Disease Diagnostic System based on Machine Learning | Shaveta Malik, Tapas Kumar |
Shaveta Malik | NIL | NIL | NIL | Tapas Kumar | Advances in Image and Video processing | UK | Society for Science and Education | Volume 5, Issue 1, PP 49-57 | March | 2017 |
15 | A Survey: Ad-hoc On-Demand Distance Vector Protocol | Meeta Singh | NIL | NIL | NIL | NIL | Sudeep Kumar | International Journal of Computer Applications, (0975 – 8887) | USA | Foundation of Computer Science | Vol. 161, No. 1, PP 38-44 | March | 2017 |
16 | MOBILE APPLICATION FOR VEHICULAR AUTO LOCKING SYSTEM | Mayank Dogra,Yuvraj Singh,Neeraj Bhateja , Dr. Meeta Singh | Mayank Dogra | Yuvraj Singh | Neeraj Bhateja | Dr. Meeta Singh | International Journal of Advanced Research in Computer Science | India | Volume 8, No. 7, 2017 | July – August | 2017 | ||
17 | A Teaching Learning Based Optimization Algorithm for Cluster Head Selection in Wireless Sensor Networks | Amita Yadav, Suresh Kumar | Amita Yadav | Suresh Kumar | NIL | NIL | NIL | International Journal of Future Generation Communication and Networking | South Korea | SERSC | Vol. 10, No. 1 (2017), pp. 111-122 http://dx.doi.org/10.14257/ijfgcn.2017.10.1.10 |
January | 2017 |
18 | A Framework for Real-Time Sentiment Analysis of On-line Micro-texts with Sentiment Drift Detection Method | Ritesh Srivastava, M.P.S. Bhatia | Ritesh Srivastava | NA | NA | NA | M.P.S. Bhatia | International Journal of Software Engineering and Its Applications | Australia | SCERC | vol. 11, no. 1, pp. 67-76, 2017 | Feb | 2017 |
19 | A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint | Ishan Bhardwaj, Narendra D Londhe, and Sunil Kumar Kopparapu | Ishan Bhardwaj | NIL | NIL | NIL | Narendra D Londhe, and Sunil Kumar Kopparapu | Pattern Recognition | United Kingdom | Elsevier | vol. 62, pp. 214–224, 2017 | Feb | 2017 |
20 | Design and Implementation of Wireless Body Area Network using physiological parameters | Savita Sindhu, Dr. Shruti Vashist | Savita Sindhu | Dr.Shruti Vashisth | NIL | NIL | NIL | Journal of Biomedical Engineering and Medical Imaging | UK | Society for Science and Education | VOLUME 4 NO. 1 | 03rd March | 2017 |
21 | BER Based Performance Analysis of 2×1 Alamouti’s Diversity and 4×4 MIMO Diversity with Interleaver and Encoder for BPSK, QPSK and QAM | Jaya Dagur, Savita Sindhu | Savita Sindhu | NIL | NIL | NIL | Jaya dagur | International Journal of Information Engineering and Electronic Business(IJIEEB) | HONG KONG | MECS Publisher | IJIEEB Vol.9, No.1 | January 2017 | 2017 |
22 | A survey on multi-objective task scheduling algorithm in cloud environment | Tanvi Gupta, Prof.(Dr.)SSHanda,Prof.(Dr.)Supriya Panda | Tanvi Gupta | Prof.(Dr.)Supriya Panda | NIL | NIL | Prof. (Dr.)SSHanda | International Journal of Computer Science and Information Security (IJCSIS), | US | Vol. 15, No. 12, December 2017,pp144-151 | 43070 | 2017 | |
23 | A Survey on Honey Bee Foraging Behavior and Its improvised Load Balancing Technique | Tanvi Gupta, Dr.SS.Handa, Dr. Supriya Panda | Tanvi Gupta | Prof.(Dr.)Supriya Panda | NIL | NIL | Prof.(Dr.)SS Handa | International Journal for Research in Applied Science & Engineering Technology (IJRASET) | India(UGC Approved) | Volume 5 Issue XI November 2017 | 43040 | 2017 | |
24 | A Review on Optimizing Radial Basis Function Neural Network using Nature Inspired Algorithm |
Ms. Tanvi Gupta 1.Prof. Supriya P Panda,Prof. S.S. Handa andProf. M.V.Ramana Murthy | Tanvi Gupta | Prof.(Dr.)Supriya Panda | NIL | NIL | Prof. (Dr.)SSHanda,Prof. Ramanamurthy | International Journal on Future Revolution in Computer Science & Communication Engineering | India(UGC Approved) | Volume: 3 Issue: 10,October 2017,pp49-57 | 43009 | 2017 | |
25 | Efficient Data Clustering Algorithm Designed for 2-D dataset | Himanika, Vishesh, Poonam Nandal | Himanika | Vishesh | Poonam Nandal | Journal of Engineering and Applied Sciences | Pakistan | Medwell Journals | Volume 12 Issue 21, 2017 | December | 2017 | ||
26 | A Review: Analysis and Comparison of Different Detection Techniques of IDPS | Navjot Kamboj , Simar Saggu , Aditya Lamba and Meeta Singh | Navjot Kamboj | Simar Saggu | Aditya Lamba | Dr. Meeta Singh | Journal of Engineering and Applied Sciences | Pakistan | Medwell Journals | Volume 12 Issue 22, 2017 | December | 2017 | |
27 | Real Time EEG based Cognitive Brain Computer Interface for control Applications via Arduino Interfacing | Rashima Mahajan | Rashima Mahajan | Dipali Bansal | Nil | Nil | Nil | Procedia Computer Science Elsevier | Elsevier, Science Direct | 115, pp. 812-820, 2017 | November | 2017 | |
28 | Medical Images Contrast Enhancement using Quad Weighted Histogram Equalization with Adaptive Gama Correction and Homomorphic Filtering | Monika Agarwal, Rashima Mahajan | Rashima Mahajan | Nil | Nil | Nil | Monika Agarwa | Procedia Computer Science Elsevier | Elsevier, Science Direct | 115, 509-517, 2017 | November | 2017 | |
29 | Challenges and Issues in Cloud Environment | Nitin Ayush Yash Poonam Nandal | Poonam Nandal | Nitin | Ayush | Yash | NIL | Journal of Engineering and Applied Sciences | UAE | MEDWELL | Volume: 12, Issue: 11, Page No.: 3008-3013, DOI: 10.3923/jeasci.2017.3008.3013 | August | 2017 |
30 | Real-time Unspecified Major Sub-Events detection in the Twitter Data Stream That Cause the Change in Sentiment Score of the Targeted Event | Ritesh Srivastava, M.P.S. Bhatia | Ritesh Srivastava | NA | NA | NA | M.P.S. Bhatia | IJITWE, IGI Global, USA | USA | IGI Global | Vol 12, No.4, pp1-21 | August | 2017 |
31 | Semantic Analysis Based Approach for Relevant Text Extraction Using Ontology | Poonam Chahal, Manjeet Singh, Suresh Kumar | Poonam Chahal | Suresh Kumar | NIL | NIL | NIL | International Journal of Information Retreival Research | USA | IGI Global | Volume 7, Issue 4, Pg 19-36 | July | 2017 |
32 | Off-line Versus On-line Sentiment Analysis Issues with Sentiment Analysis of On-line Micro-texts | Ritesh Srivastava, M.P.S. Bhatia | Ritesh Srivastava | NA | NA | NA | M.P.S. Bhatia | IJIRR, IGI Global, USA | USA | IGI Global | Vol. 7, No. 4, pp-1-18 | July | 2017 |
33 | Challenges with Sentiment Analysis of On-line Micro-texts | Ritesh Srivastava, M.P.S. Bhatia | Ritesh Srivastava | NA | NA | NA | M.P.S. Bhatia | International Journal of Intelligent Systems and Applications | Honk Kong | MECS | Vol. 9, No. 7, PP.31-40, 2017 | July | 2017 |
34 | Effective Surveillance and Predictive Mapping of Mosquito-Borne Diseases Using Social Media | Vinay Kumar Jain, Shishir Kumar | Vinay Kumar | nil | nil | nil | Shishir Kumar | Journal of Computational Science | USA | elsevier | (doi.org:10.1016/j.jocs.2017.07.003) | July | 2017 |
35 | WBAN Mitigation method: Comparison of Diversity Techniques in fading | Savita Sindhu, Dr. Shruti Vashist | Savita Sindhu | Dr.Shruti Vashisth | NIL | NIL | NIL | Journal of Biomedical Engineering and Medical Imaging | UK | Society for Science and Education | VOLUME 4, NO. 3 | June | 2017 |
36 | Query Information Retreival Process in Social Media | Simran Goyal, Charu Virmani | Simran Goyal | Charu Virmani | NIL | NIL | NIL | International Journal of Advanced Research | United Kingdom | IJAR | 5(6), PP 1691-1696 | June | 2017 |
37 | Analysis of Various Social Network Management Systems | Saksham kapur | Saksham Kapur | Charu Virmani | NIL | NIL | NIL | International Journal of Advanced Research | United Kingdom | IJAR | 5(6)PP 1697-1703 | June | 2017 |
38 | Characterising User Demographics across Social Network | Charu Virmani, Anuradha Pillai | Charu Virmani | NIL | NIL | NIL | Anuradha Pillai | International Journal of Advanced Research | United Kingdom | IJAR | 5(6) PP 2308-2312 | June | 2017 |
39 | Security breaches in trust management scheme in Mobile Ad-Hoc Network | Bindiya Bhatia, Dr. M.K. Soni, Dr. Parul Tomar | Bindiya Bhatia | Dr. M. K. Soni | NIL | NIL | Dr. Parul Tomar | International Journal of Advanced Research | UK | IJAR | Volume 5 issue 6 | June | 2017 |
40 | An Insight To Load Balancing in Cloud Computing Technology | Karishma Gulati, Pronika Chawla, Ekta Malhotra | Karishma Gulati | Pronika Chawla | Ekta Malhotra | International Journal of Latest Trends in Engineering and Technology | India | Vol-8,Issue3, Page no-130-134 | May | 2017 | |||
41 | Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks | Bindiya Bhatia, Dr. M.K. Soni, Dr. Parul Tomar | Bindiya Bhatia | Dr. M. K. Soni | NIL | NIL | Dr. Parul Tomar | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 163 No 7 | April | 2017 |
42 | Analysis of Prediction Techniques based on classification and regression. | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | International Journal of Computer Applications | USA | FCS | Volume 163 – No 7, PP 47-51 | April | 2017 |
43 | Simulation and control of a complex nonlinear dynamic behavior of multi-stage evaporator using PID and Fuzzy-PID controllers | Om Prakash Verma,Gaurav Manik,Vinay Kumar Jain | Vinay Kumar | nil | nil | nil | Om Prakash Verma,Gaurav Manik | Journal of Computational Science | USA | Elsevier | (http://doi.org/10.1016/j.jocs.2017.04.001) | March | 2017 |
44 | A Survey: Ad-hoc on Demand Distance Vector (AODV) | Meeta Singh, Sudeep Kumar | Sudeep Kumar | International Journal of Computer Applications (0975 – 8887) | USA | Foundation of Computer Science | Volume 161 ,38-44, 2017 | March | 2017 | ||||
45 | Comparative Analysis of Various Similarity Measures for Finding similarity of two documents. | Maedeh Afzali, Suresh Kumar | Maedeh Afzali | Suresh Kumar | NIL | NIL | NIL | International Journal of Database Theory and Application | Australia | SERSC | Vol.10, No.2 (2017), pp.23-30 | February | 2017 |
46 | Exploring the Relationships between Design Measures and Change Proneness in Object-Oriented Systems | Deepa Godara, Rakesh Kumar Singh | Deepa Godara | Dr. Rakesh Kumar Singh | International Journal of Software Engineering, Technology and Applications | Switzerland | Inderscience | Volume 2 , Issue 1, pp. 64-80,2017 | January | 2017 | |||
47 | Trust aware cooperative optimised link state routing protocol | PR Vamsi, K Kant | Krishna Kant | NA | NA | NA | P R Vamsi | Advanced Computing & Communication Technologies(ACCT) | NA | NA | NA | January | 2017 |
48 | Extraction of Emotions from Multilingual Text Using Intelligent Text Processing and Computational Linguistics | Vinay Kumar Jain, Shishir Kumar,Stevan Fernandes | Vinay Kumar | nil | nil | nil | Shishir Kumar,Stevan Fernandes | Journal of Computational Science | USA | Elsevier | Vol.21,pp.316-326 | January | 2017 |
49 | Web Documents Ranked Using Extended Document Ontology | Poonam Chahal, Manjeet Singh, Suresh kumar | Poonam Chahal | Suresh Kumar | Manjeet Singh | International Journal of Web Science | Inderscience | Volume 3, No 1 | January | 2017 | |||
50 | On the Security of Open Source Software | Prattay Sanyal , Shubham Sharma , Deepa Bura and Prasenjit Banerjee. | Prattay Sanyal | Shubham Sharma | Deepa Bura | Prasenjit Banerjee. | International Journal of advanced Research(IJAR) | United Kingdom | International Journal of advanced Research(IJAR) | Volume 5, Issue 11, pp-1338-1348 | 2017 | ||
51 | A novel Optimization Model for Efficient Packet Classification in WBAN. | Madhumita Kathuria and Sapna Gambhir | Madhumita Kathuria | NIL | NIL | NIL | Sapna Gambhir | International Journal of Energy, Information and Communications | KOREA | Science & Engineering Research Support soCiety | Vol.7, Issue 4, pp.1-10, 2016 | Sept | 2016 |
52 | Trust and Location-Aware Routing Protocol for Wireless Sensor Networks | PR Vamsi, K Kant | Krishna Kant | NA | NA | NA | P R Vamsi | IETE Journal of Research | NA | Taylor and Francis | 62(5),634-644 | NA | 2016 |
53 | Testbed Evaluation Of Self-Adaptive Trust model for cooperative geographic Routing in wireless sensor networks | PR Vamsi, K Kant | Krishna Kant | NA | NA | NA | P R Vamsi | International Journal on Smart Sensing and Intelligent Systems | NA | S2IS | 9(3):1362-1383 | NA | 2016 |
54 | Real-Time Rainfall Estimation for Improved Smart Irrigation System Using Nearby Automated Weather Station | Hema N, Krishna Kant | Krishna Kant | NA | NA | NA | Hema N | British Journal of Applied Science & Technology. | NA | NA | 8(5), 1-13, (h5-index [9], h5-median [14]). DOI: 10.9734/BJAST/2016/30934. | NA | 2016 |
55 | A Clustering Algorithm with reduced Cluster Head Variation in LEACH Protocol | Payal Khurana Batra, Krishan kant | Krishna Kant | NA | NA | NA | Payal Khurana Batra | International Journal of Systems, Control and Communications | NA | NA | Vol. 7, No.4, 2016 | NA | 2016 |
56 | An improved cluster head selection algorithm using MAC Layer | Payal Khurana Batra, Krishan kant | Krishna Kant | NA | NA | NA | Payal Khurana Batra | International Journal of Sensor Networks | NA | NA | pp 75-86, Vol. 22, No. 2 | NA | 2016 |
57 | Extension of K-Modes Algorithm for Generating Clusters Automatically | Suresh Kumar, Anupama Luthra | Anupama Luthra | Suresh Kumar | NIL | NIL | NIL | International Journal of Information Technology and Computer Science (IJITCS) | HONG KONG | MECS Publisher | 3, 51-57 Published Online (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2016.03.06 |
March | 2016 |
58 | Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs | Kaebeh Yaeghoobi S.B., M.K. Soni, and S.S. Tyagi | Kaebeh Yaeghoobi S.B. | M.K. Soni | S.S. Tyagi | NIL | NIL | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | 1, 9-17, Published Online (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.01.02 | January | 2016 |
59 | Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verification System | Ishan Bhardwaj, Narendra D Londhe, and Sunil Kumar Kopparapu | Ishan Bhardwaj | NA | NA | NA | Narendra D Londhe, and Sunil Kumar Kopparapu | IEEE Access | US | IEEE | vol. 5, pp. 595-606, 2016 | Dec | 2016 |
60 | A Novel Behavioural Biometric Technique for Robust User Authentication | Ishan Bhardwaj, Narendra D Londhe, and Sunil Kumar Kopparapu | Ishan Bhardwaj | NA | NA | NA | Narendra D Londhe, and Sunil Kumar Kopparapu | IETE Technical Review | United Kingdom | Taylor and Francis | vol. 34(5), pp.478-490, 2017 | Aug | 2016 |
61 | Improvement of QoS parameters in Dynamic and heterogeneous WBAN | Madhumita Kathuria, Dr. Sapna Gambhir | Madhumita Kathuria | Dr. Sapna Gambhir | Indonesian Journal of Elecrical Engineering and Informatics | IAES | Vol. 4 , No. 4 | December | 2016 | ||||
62 | Performance Optimization in WBAN Using Hybrid BDT and SVM Classifier | Madhumita Kathuria and Sapna Gambhir | Madhumita Kathuria | NIL | NIL | NIL | Sapna Gambhir | International Journal of Information Technology and Computer Science | HONG KONG | MECS Publisher | 8(12), Pg 83-90 | December | 2016 |
63 | An Enhanced Distributed Energy-Efficient Clustering (DEEC) Protocol for Wireless Sensor Networks | Amita Yadav, Suresh Kumar | Amita Yadav | Suresh Kumar | NIL | NIL | NIL | International Journal of Future Generation Communication and Networking | South Korea | SERSC | Vol. 9, No. 11 (2016), pp. 49-58 http://dx.doi.org/10.14257 /ijfgcn.2016.9.11.05 |
December | 2016 |
64 | A Software Metric for the Activeness of a Local Area Network | Nidhi Garg, Sachin Lakra | Nidhi Garg | NIL | NIL | NIL | Sachin Lakra | International Journal of Computer Applications (0975 – 8887) | USA | Foundation of Computer Science | Volume 156 – No 10 | December | 2016 |
65 | Empirical Study of Impact of Various Concept Drifts in Data Stream Mining Methods | Veena Mittal, Indu Kashyap | Veena Mittal | Indu Kashyap | NIL | NIL | NIL | I.J. Intelligent Systems and Applications | HONG KONG | MECS Publisher | IJISA-V8-N12-8 | December | 2016 |
66 | Trust Aware Cooperative Routing Method for WANETs | P. Raghu Vamsi, Krishna Kant | Krishna Kant | NA | NA | NA | P. Raghu Vamsi | Security and Communication Network | NA | NA | NA | December | 2016 |
67 | An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing | Vasudha Arora, S. S. Tyagi | Vasudha Arora | S. S. Tyagi | NIL | NIL | NIL | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | 11, 65-71 Published Online in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.11.08 | November | 2016 |
68 | A Lexical Approach for Opinion Mining in Twitter | Deebha Mumtaz, Bindiya Ahuja | Deebha Mumtaz | Bindiya Ahuja | NIL | NIL | NIL | International Journal of Education and Management Engineering | HONG KONG | MECS Publisher | 4, 20-29 Published Online July 2016 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2016.04.03 | July | 2016 |
69 | Vertical Handoff Decision Algorithm based on PRSS and Dwell Time | Jyoti Madaan, Indu Kashyap | Jyoti Madaan | Indu Kashyap | NIL | NIL | NIL | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | PP.31-42, DOI: 10.5815/ijcnis.2016.07.05 | July | 2016 |
70 | LDAT: LFTM based Data Aggregation and Transmission Protocol for Wireless Sensor Networks. | Mukesh Kumar. Kamlesh Dutta | Mukesh Kumar | NA | NA | NA | Kamlesh Dutta | Journal of Trust Management, | Germany | Springer | Vol 3, Issue 2.pp 1-20. | July | 2016 |
71 | Comparison Analysis of proposed DPPH Protocol for Wireless Body Area Network | Madhumita Kathuria and Sapna Gambhir | Madhumita Kathuria | NIL | NIL | NIL | Sapna Gambhir | International Journal of Computer Applications, (0975 – 8887) | USA | Foundation of Computer Science | Volume 144 , No.10, pp-36-41, 2016. | June | 2016 |
72 | Trust Aware Data Aggregation and intrusion Detection System for Wireless Sensor Networks | P. Raghu Vamsi, Krishna Kant | Krishna Kant | NA | NA | NA | P. Raghu Vamsi | INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS | NA | NA | NA | June | 2016 |
73 | Detecting Sybil Attacks in Wireless sensor Networks using Sequential Analysis | P. Raghu Vamsi, Krishna Kant | Krishna Kant | NA | NA | NA | P. Raghu Vamsi | INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS | NA | NA | NA | June | 2016 |
74 | Comparison Analysis of edge detection between gray scale and color image | Shaveta Malik, Tapas Kumar | Shaveta Malik | NIL | NIL | NIL | Tapas Kumar | Communications on Applied Electronics (CAE) – ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA | USA | Foundation of Computer Science | Volume 5– No. 2, Pg. 38-43 | May | 2016 |
75 | Analyzing Multiple Routing Configuration | Meenakshi Moza, Suresh Kumar | Meenakshi Moza | Suresh Kumar | NIL | NIL | NIL | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | 5, 48-54, Published Online May 2016 in MECS (http://www.mecs-press.org/) | May | 2016 |
76 | Various Edge Detection Techniques on different categories of Fish | Shaveta Malik, Tapas Kumar | Shaveta Malik | NIL | NIL | NIL | Tapas Kumar | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 135, No. 7, Pg 6-11 | February | 2016 |
77 | Survey and Comparative study on Statistical tools for Medical Images” | Madhulika, Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar Yadav | Madhulika | NA | NA | NA | Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar Yadav | Advance Science Letters, American science Publishing. |
USA | American science Publishing. | 21 | NOV | 2015 |
78 | Self adaptive trust model for secure geographic routing in wireless sensor networks | PR Vamsi, K Kant | Krishna Kant | NA | NA | NA | P R Vamsi | International Journal of Intelligent systems and Applications | NA | NA | 7(3),21 | NA | 2015 |
79 | Detecting Location-Based Attacks in Wireless Sensor Networks Using Sequential Analysis | RV Potukuchi, K Kant | Krishna Kant | NA | NA | NA | RV Potukuchi | IETE Journal of Research | NA | NA | 61 (5), 541-551 | NA | 2015 |
80 | Cloud based Financial Market Prediction through Genetic Algorithms: A Review | Nitasha Soni, Tapas Kumar | Nitasha Soni | NA | NA | NA | Dr Tapas Kumar | International Journal of Computer Applications (ISSN: 0975 – 8887) Volume 123 – No.8, August 2015 | USA | Foundation of Computer Science | (ISSN: 0975 – 8887) Volume 123 – No.8, August 2015 | Aug | 2015 |
81 | Design of a novel search engine for prospective question answering | Rosy Madaan, A.K. Sharma, Ashutosh Dixit | Rosy Madaan | A.K. Sharma, Ashutosh Dixit | International Journal of Information retrieval research | USA | IGI Global | Vol 4 Issue 2 | 42095 | 2015 | |||
82 | Improvement in Rebalanced CRT RSA | Seema Verma, Deepak Garg | Seema Verma | Deepak Garg | International Journal of Information Technology (IAJIT) | Jordan (Arab) | Zarqa University, Jordan | Vol. 12, No. 6, 524-531, Nov. 2015 | November | 2015 | |||
83 | Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks | Bindiya Ahuja, M. K. Soni, Parul Tomar |
Bindiya Ahuja | M. K. Soni | NIL | NIL | Parul Tomar | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | Vol. 7, No. 11, PP 37-45 | October | 2015 |
84 | Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing | Vasudha Arora, S. S. Tyagi |
Vasudha Arora | S. S. Tyagi | NIL | NIL | NIL | International Journal Of Computer Application | USA | Foundation of Computer Science | Volume 127, No. 12, Pg 46-51. |
October | 2015 |
85 | Change Point Detection in the midst of Mutual Exclusive Distributive Clustering Protocol | Urvashi Chugh | Urvashi Chugh | NIL | NIL | NIL | NIL | Wulfenia Journal | Austria | Wulfenia Journal | Vol 22, No. 10; Pg 311-319 | October | 2015 |
86 | A Survey Analysis of Routing Protocols in Wireless Sensor Networks | Kaebeh Yaeghoobi, Dr. M. K. Soni, Dr. S. S. Tyagi |
Kaebeh Yaeghoobi | Dr. M. K. Soni | Dr. S. S. Tyagi | NIL | NIL | International Journal of Engineering and Technology (IJET), ISSN 0975-4024 | Germany | Science Publishing Corporation Inc. | Volume 7, No 4, Pg No 1432-1437 | August | 2015 |
87 | Experimental Analysis of OLSR and DSDV routing Protocols in Mobile Ad Hoc Networks |
Shelja Sharma, Suresh Kumar |
Shelja Sharma | Suresh Kumar | NIL | NIL | NIL | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | Volume 7, No. 8, ISSN: 2074-9104 (Online), pg. 21-29 |
July | 2015 |
88 | Real time man machine interface and control using delebrate eye blink | Dipali Bansal, Rashima Mahajan, Sujit Roy, Dheeraj Rathi, Shweta Singh | Dipali Bansal | Rashima Mahajan | Sujit Roy | Dheeraj Rathi, Shweta Singh | International Journal Biomedical Engineering and Technology | Switzerland | Inderscience Publishers | Vol18,No.4, July 2015 | July | 2015 | |
89 | Performance Analysis of Image Denoisinng using Different Techniques | Sunita Virmani, P.K.Singhal | Sunita Virmani | NIL | NIL | NIL | P.K.Singhal | International Journal of Advanced Scientific and Technical Research | France | IJAST | Vol 3,Issue-5,May-June 2015,ISSN 2249-9954 | June | 2015 |
90 | Relation based measuring of semantic similarity for Web documents | Poonam Chahal, Manjeet Singh, Suresh Kumar | Poonam Chahal | Suresh Kumar | NIL | NIL | Manjeet Singh | International Journal Of Computer Application | USA | Foundation of Computer Science | Volume 119 – No.7, 26-29 | June | 2015 |
91 | Vertical Handoff Decision Strategies in Heterogeneous Wireless Networks | Jyoti Madaan, Indu Kashyap | Jyoti Madaan | Indu Kashyap | NIL | NIL | NIL | Communications on Applied Electronics (CAE) – ISSN : 2394-4714 | USA | Foundation of Computer Science FCS | Volume 2 – No.1, 43-50,June 2015 | JUNE | 2015 |
92 | Simulation Study of Variants of Transmission Control Protocol | Meenakshi Moza , Suresh Kumar | Meenakshi Moza | Suresh Kumar | NIL | NIL | NIL | Foundation of Computer Science FCS | New York, USA | Foundation of Computer Science FCS | Volume 2 – No.1, June 2015 ,ISSN : 2394-4714 | June | 2015 |
93 | Wormhole Attack Detection and Data Aggregation Algorithm for Wireless Sensor Networks, ,. | Mukesh Kumar. Kamlesh Dutta | Mukesh Kumar | NA | NA | NA | Kamlesh Dutta | Int. J. Convergence Computing, , Special Issue on: “Mobile Computing, Wireless Networks and e-Learning” | Switzerland | Inderscience | Vol. 1, No. 3/4, pp. 202, 215 | June | 2015 |
94 | Depression Diagnosis and Management using EEG Based Affective Brain Mapping in Real Time’.(Scopus Indexed). | Rashima Mahajan, Dipali Bansal | Rashima Mahajan | Dipali Bansal | Nil | Nil | Nil | International Journal of Biomedical Engineering | USA | Inderscience | Vol. 18, No. 2, 2015 Pp: 115 – 137 | June | 2015 |
95 | Career Path Suggestion using String Matching and Decision Trees | Akshay Nagpal, Supriya P Panda | Supriya P Panda | NA | NA | NA | Akshay Nagpal | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 117 – No. 7, May 2015 | May | 2015 |
96 | Online Methods of Learning in concept drift | Veena Mittal ,Indu Kashyap | Veena Mittal | Indu Kashyap | NIL | NIL | NIL | International Journal of Computer Applications | USA | IJCA | Volume 117(13):18-22,2015 | May | 2015 |
97 | DDoS Attacks & Deffence Mechanisms and its Mitigation Techniques | Ritu Maheshwari Bansal, Deepika Khurana, Ritika Bateja | Deepika Khurana | Ritika Bateja | Ritu Maheshwari Bansal | International Journal of Advanced Technology in Engineering and Science | Volume No 3, Special Issue no 01,ISSN No 2348-7550 | April | 2015 | ||||
98 | LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks | Payal Khurana Batra, Krishan kant | Krishna Kant | NA | NA | NA | Payal Khurana Batra | Wireless Networks | NA | NA | 22 (1), 49-60 | April | 2015 |
99 | Automated cardiac state diagnosis from hybrid features of ECG using neural network classifier | Rashima Mahajan, Dipali Bansal | Rashima Mahajan | Dipali Bansal | Nil | Nil | Nil | International Journal Biomedical Engineering and Technology | USA | Inderscience Publishers | Vol 17 No.3, 209-231 | March | 2015 |
100 | An Overview of Vertical Handoff Decision Algorithm | Jyoti Madaan, Indu Kashyap | Jyoti Madaan | Indu Kashyap | NIL | NIL | NIL | International Journal of Computer Applications (0975 – 8887) | USA | Foundation of Computer Science FCS | Volume 111 – No 3, 10-15,February 2015 | February | 2015 |
101 | Survey and Comparative study on Statistical tools for Medical Images” | Madhulika, Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar Yadav | Dr. Madhulika | NIL | NIL | NIL | Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar Yadav | Advance Science Letters, American science Publishing. |
USA | American science Publishing. | Volume 21, Number 1, pp. 74-77(4) | January | 2015 |
102 | Enhancing Frequency Based Change Proneness Prediction Method Using Artificial Bee Colony Algorithm |
Deepa Bura, Rakesh Kumar Singh | Deepa Bura | NIL | NIL | NIL | Rakesh Singh | Advances in Intelligent and Soft Computing (Springer) Series | Switzerland | Springer | Volume 320, pp 535-543 | September | 2014 |
103 | HTTP Packet Inspection Policy for improving internal Network Security | Kuldeep Tomar, S. S. Tyagi | S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar | International Journal of Computer Network and Information Security | HONG KONG | MECS Publisher | Vol. 6, No. 11,PP- 35-42 | Octomber | 2014 |
104 | An improved trusted greedy perimeter stateless routing for wireless sensor networks | PR Vamsi, K Kant | Krishna Kant | NA | NA | NA | PR Vamsi | International Journal of Computer Network and Information Security | NA | NA | 6 (11), 13 -19 | NA | 2014 |
105 | Analysis of Node Behavior for Multi Channel Environment in Mobile- Ad hoc Networks | Kanika Garg, Rishi Pal Singh, Ritu | Kanika Garg | NIL | NIL | NIL | Rishi Pal Singh, Ritu | Journal of Next Generation Information Technology | Korea | AICIT | Vol. 5, No. 2, pp. 32 – 37, 2014 | July | 2014 |
106 | Performance Evaluation of Secure and Efficient AODV (SE-AODV) using NS2 | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | International Journal of Computer Applications (0975 – 8887) | USA | Foundation of Computer Science | Vol. 97 No. 17, Pg 9-13, 2014 | July | 2014 |
107 | An Effective Reasoning Algorithm for Question Answering System. (pp. 52-57). | Dr. Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | Poonam Tanwar | NA | NA | NA | Dr. Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | International Journal of Adv. Computer Sc. and Applications, Special Issue on Natural Language Processing, United Kingdom, | Japan | SAI | (IJACSA), Special Issue on Natural Language Processing, Vol 4, No 1, 2014 | Jan | 2014 |
108 | Hybrid Web-page Segmentation and Block Extraction for Small Screen Terminals | Shefali Singhal,Neha Garg | Shefali Singhal | Neha Garg | NIL | NIL | NIL | International Journal of Computer Application(IJCA) | USA | Foundation of Computer Science (FCS) | Confluence 2013 – Number 2 | 12-13 Jan | 2014 |
109 | Quantifying the Impact of Flood Attack on Transport Layer Protocol | Kuldeep Tomar, S. S. Tyagi | S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar | International Journal on Computational Sciences & Applications (IJCSA) | Australia | WSP, Sydney | Vol. 4, No. 6, Pg 79-87 | December | 2014 |
110 | Understanding change proneness in Object Oriented software | Deepa Bura | Deepa Bura | NIL | NIL | NIL | NIL | International Journal for Computer Application | USA | Foundation of Computer Science | Vol. 107, No. 1, Pg 7-12 |
December | 2014 |
111 | Identification of Query Forms for Retrieving the Information from Deep Web | Nripendra Narayan Das, Ela Kumar | NN Das | NA | NA | NA | Ela Kumar | Transactions on Machine Learning and Artificial Intelligence, | United Kingdom | TMLAI | Volume 2 No 6, pp: 53-61, 2014 | December | 2014 |
112 | A Review of Studies on Change Proneness Prediction in Object Oriented Software | Deepa Godara, Rakesh Kumar Singh | Deepa Godara | Dr. Rakesh Kumar Singh | International Journal of Computer Applications | USA | Foundation of Computer Science | Vol. 105 No.3 ,pp 35-41,2014 | November | 2014 | |||
113 | Simulation And Analysis Of AODV, DSDV And ZRP Protocol In MANET | Neha Jain, Dr. Yogesh Chaba |
Neha Jain | NIL | NIL | NIL | Dr. Yogesh Chaba | International Journal of Computer Science and Engineering (IJCSE) | USA | IASET, USA | Vol. 3, Issue 6, Pg 17-24 | November | 2014 |
114 | Two queue based scheduling algorithm for CPU Scheduling | Srishty Jindal Priyanka Grover |
Srishty Jindal | Priyanka Grover | NIL | NIL | NIL | International Journal for Computer Application | USA | Foundation of Computer Science | Issue 5, Volume 105, pg n. 21-24 ISSN (0975-8887) |
November | 2014 |
115 | Enhancing Network Security and Performance using Optimized ACLs | Kuldeep Tomar, S. S. Tyagi | S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar | International Journal in Foundations of Computer Science and Technology(IJFCST) | Australia | WSP, Sydney | Vol. 4, No. 6, Pg 25-35 | November | 2014 |
116 | Time Quantum based CPU Scheduling Algorithm | Mayank Parashar,Amit Chugh | Amit Chugh | Mayank Prashar | NIL | NIL | NIL | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 98– No.3, July 2014, pg n. 45-48 ISSN (0975-8887) |
JULY | 2014 |
117 | A New Hybrid Model for Predicting Change Prone Class in Object Oriented Software | Deepa Godara | Deepa Godara | NIL | NIL | NIL | R.K. Singh | International Journal of Computer Science and Telecommunications |
United Kingdom | IJCST | Volume 5, Issue 7, Pg 1-6, July 2014 | July | 2014 |
118 | Real Time Acquisition and analysis of neural response for rehabilitative control | Dipali,Rashima Singh,Shweta Singh,Dheeraj Rathee,Sujit Roy | Dipali Bansal | Rashima Singh | Shweta Singh | Dheeraj Rathee,Sujit Roy | International Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical Engineering | USA | World Academy of Science, Engineering and Technology | Vol8,issue 5,2014 | June | 2014 | |
119 | Security Threats in WSN and their Countermeasures | Mukesh Kumar. Kamlesh Dutta | Mukesh Kumar | NA | NA | NA | Kamlesh Dutta | Case Studies in Secure Computing Achievements and Trends, Edited by Biju Issac and Nauman Israr, pp. 207–238, CRC Press, | U.K. | Taylor and Francis | Chapter 11 | May | 2014 |
120 | Impact of Wormhole Attack on Data Aggregation in Hierarchical WSN, | Mukesh Kumar. Kamlesh Dutta | Mukesh Kumar | NA | NA | NA | Kamlesh Dutta | International Journal of Electronics and Information Engineering , | Taiwan | Asia University, Taiwan | Vol. 1, No. 2, pp. 70-77 | March | 2014 |
121 | A Real Time Set Up for Retrieval of Emotional States from Human Neural Responses | Rashima Mahajan, Dipali Bansal, Shweta Singh | Rashima Mahajan | Dipali Bansal | Shweta Singh | International Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical Engineering | USA | World Academy of Science, Engineering and Technology | 8(3), 16 – 21.March 2014 | March | 2014 | ||
122 | Real Time Acquisition & Psychoacoustic Analysis of Brain Wave | Shweta Singh,Dipali Bansal, Rashima Mahajan | Shweta Singh | Rashima Mahajan | Dipali Bansal | International Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical Engineering | USA | World Academy of Science, Engineering and Technology | Vol:8 No:3, 2014 | March | 2014 | ||
123 | Dynamic Rule Based Traffic Analysis in NIDS | Kuldeep Tomar, S. S. Tyagi, Rachna Gupta |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Rachna Gupta |
International Journal of Information & Computation Technology(IJICT) | United Kingdom | Inderscience Enterprises Ltd. | ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 | February | 2014 |
124 | Overview – Snort Intrusion Detection System in Cloud Environment | Kuldeep Tomar, S. S. Tyagi, Richa Agrawal |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Richa Agrawal |
International Journal of Information & Computation Technology(IJICT) | United Kingdom | Inderscience Enterprises Ltd. | Volume 4, Number 3 pp. 329-334,(2014), ISSN 0974-2239. | February | 2014 |
125 | IDS in cloud environment as service based manner | Kuldeep Tomar, S. S. Tyagi, Priyanka |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Priyanka |
International Journal of Information & Computation Technology(IJICT) | United Kingdom | Inderscience Enterprises Ltd. | Volume 4, Number 3 (2014), ISSN 0974-2239. | February | 2014 |
126 | Analysis of ACL in ASA firewall | Kuldeep Tomar, S. S. Tyagi, Harsh Chawla |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar, Harsh Chawla |
International Journal of Information & Computation Technology(IJICT) | United Kingdom | Inderscience Enterprises Ltd. | Volume 4, Number 1 pp. 53-58 (2014), ISSN 0974-2239. | February | 2014 |
127 | Study of Protocols Associated Security Attacks and Proposing Simplified Method for Improvisation | Kuldeep Tomar, S. S. Tyagi |
S. S. Tyagi | NIL | NIL | NIL | Kuldeep Tomar | International Journal of Information & Computation Technology (IJICT) | United Kingdom | Inderscience Enterprises Ltd. | ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1395-1402. | February | 2014 |
128 | Simulation based performance analysis of ZRP in MANET | Neha Jain, Dr.Yogesh Chaba | Neha Jain | NIL | NIL | NIL | Dr.Yogesh Chaba | International Journal of Computer Applications | USA | Foundation of Computer Science | Issue 4, Volume 88, pg n. 47-52 ISSN (0975-8887) |
February | 2014 |
129 | Efficient and Secure Protocol for Mobile Ad-hoc Networks | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 77- number 16, 2013, Pg: 28-33 |
September | 2013 |
130 | An overview on template matching methodologies and its applications | N. Perveen, D. Kumar, I. Bhardwaj | Ishan Bhardwaj | NIL | NIL | NIL | N. Perveen, D. Kumar | Int. J. Res. Comput. Commun. Technol | USA | NA | vol. 2, no. 10, pp. 988–995, 2013 | Oct | 2013 |
131 | Impact of NP-Complete in Traingle Segments Tree Energy Efficiency Model in Wireless Sensor Networks | KaebehYaeghoobi S. B., M.K. Soni, S.S. Tyagi, Omid Mahdi Ebadati E | M.K. Soni | S.S. Tyagi | NIL | NIL | KaebehYaeghoobi S. B., Omid Mahdi Ebadati E | Journal of Basic and Applied Scientific research(JBASR) | Egypt | Dr. Steph O. Jhanathin, USA TEXTROAD JOURNALS Cairo |
ISSN 2090-4304, 3(9), 262-269, 2013 | NIL | 2013 |
132 | Web Documents Ranked using Genetic Algorithms | Poonam Chahal, Manjeet Singh | Poonam Chahal | NIL | NIL | NIL | Manjeet Singh | International Journal of Computer Applications | USA | Foundation of Computer Science | Issue 22, Volume 70, pg n. 18-21 ISSN (0975-8887) |
May | 2013 |
133 | Deadlock Detection and Recovery in Distributed Databases | Suresh Kumar, Pooja Sapra, R. K. Rathy | Suresh Kumar | R. K. Rathy | NIL | NIL | Pooja Sapra | International Journal of Computer Applications | USA | Foundation of Computer Science | Vol. 73, No. 1, pp: 32-36, July 2013 | July | 2013 |
134 | Study and Analysis of DSR and SASR Protocols in MANET | Shilpa Shukla, Shelja Sharma, Suresh Kumar |
Shelja Sharma | Suresh Kumar | NIL | NIL | Shilpa Shukla | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 73, No. 10, July 2013 |
July | 2013 |
135 | Comparative Study of Different Techniques of Video Steganography (PP 62-67) | Praveen, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Praveen, Poonam Tanwar | International Journal of Information Technology & Systems | NA | Nil | , Vol. 1; No. 2: (Jan-June 2013) | Jan-june | 2013 |
136 | Facial Expression Recognition by Statistical, Spatial Features and using Decision Tree | N. Perveen, D. Kumar, I. Bhardwaj | Ishan Bhardwaj | NIL | NIL | NIL | N. Perveen, D. Kumar | Int. J. Comput. Appl | USA | Foundation of Computer Science | vol. 64, no. 18, pp. 16-21, 2013 | Jan | 2013 |
137 | Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensor Networks | Yashwant Singh, Urvashi Chugh | Urvashi Chugh | NIL | NIL | NIL | Yashwant Singh | International Journal of Sensors Wireless Communications and Control, | New Zealand | Benthum Publications | Volume 3, Number 2, December 2013, pp. 101-107(7) ISSN: 2210-3279 (Print) ISSN: 2210-3287 (Online) |
December | 2013 |
138 | Analysis of deadlock detection and resolution Techniques in distributed database environment | Suresh Kumar, Himanshi grover | Suresh Kumar | NIL | NIL | NIL | Himanshi grover | International Journal of Computer Engineering & Science | USA | IAET | Vol. 2, No. 1, pp. 17-25, ISSN: 2231–6590 | September | 2012 |
139 | A Review of Deadlock Detection Techniques based on Diffusion Computation Approach | S. S. Tyagi, Sonia Singh. |
S. S. Tyagi | NIL | NIL | NIL | Sonia Singh | International Journal of Computer Applications | USA | Foundation of Computer Science | Volume 48, No. 9, Page 28-32, 2012 | JUNE | 2012 |
140 | Scheduling Algorithms in Mobile Ad Hoc Networks | Kanika Garg | Kanika Garg | NIL | NIL | NIL | NIL | International Journal of Computer Science and Applications (IJCSA) |
USA | Science and Engineering Publishing Company | Vol. 1, No.5, July 2012, ISSN – 2278-1080 |
July | 2012 |
141 | Speaker Dependent and Independent Isolated Hindi Word Recognizer using Hidden Markov Model (HMM) | Ishan Bhardwaj, Narendra D Londhe | Ishan Bhardwaj | NIL | NIL | NIL | Narendra D Londhe | Int. J. Comput. Appl | USA | Foundation of Computer Science | vol. 52, no. 7, pp. 34-40, 2012 | Jan | 2012 |
142 | An Efficient Location Based Reactive Multi-Path Routing Protocol for MANET | Indu Kashyap, R.K. Rathi, Diwakar Pandey | Indu Kashyap | R.K. Rathi | NIL | NIL | Diwakar Pandey | International Journal of Computer Applications (0975 – 8887) | USA | Foundation of Computer Science | Vol 40, issue 9, Page 24-29, 2012 |
Feb | 2012 |
143 | Performance Evaluation of AODV and DSR using Random Way Point Mobility Model | Meeta Singh | Meeta Singh | NIL | NIL | NIL | NIL | International Journal of Computer Applications (IJCA) | USA | Foundation of Computer Science | Volume 46 No.19, 2012 |
May | 2012 |
144 | A Hindi Speech Actuated Computer Interface for Web Search | Kamlesh Sharma, Dr. S. V. A. V. Prasad, Dr. T. V. Prasad | Kamlesh Sharma | NA | NA | NA | Dr. S. V. A. V. Prasad, Dr. T. V. Prasad | Int. J. of Advanced Computer Sc. App. (IJACSA), Vol. 3, No. 10 | UK | The SAI | Vol.(3)Issue(1) | October | 2012 |
145 | Implementing Semantic Query Optimization in Relational Databases | Jyoti Mor, Indu Kashyap | Indu Kashyap | NIL | NIL | NIL | Jyoti Mor | International Journal of Computer Applications (0975 – 888) | USA | Foundation of Computer Science | Volume 52– No.9,P-41-46, August 2012 | August | 2012 |
146 | Hybrid Technique for Effective Knowledge Representation and a Comparative Study, (pp 43-57) | Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | Poonam Tanwar | NA | NA | NA | Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | International Journal of Computer Sc. & Engg. Survey, India, published by Academy & Industry Research Collaboration Center (AIRCC) | NA | Nil | Volume 3, No. 4, August 2012. | August | 2012 |
147 | Analysis of Query Optimization Techniques in Databases | Jyoti Mor, Indu Kashyap | Indu Kashyap | NIL | NIL | NIL | Jyoti Mor | International Journal of Computer Applications (0975 – 888) | USA | Foundation of Computer Science | Volume 47– No.15, p-9, June 2012 | June | 2012 |
148 | Survey and Analysis of Devnagari Character Recognition Techniques Using Neural Network | Neha Sahu, Indu Kashyap | Indu Kashyap | NIL | NIL | NIL | Neha Sahu | International Journal of Computer Applications (0975 – 888) | USA | Foundation of Computer Science | Volume 47– No.15, P-10-13, June 2012 | June | 2012 |
149 | Network and information security issues | Vandana Batra, Shrutika Suri | Vandana Batra | Shrutika Suri | NIL | NIL | NIL | International Journal of Computer Applications (0975 – 888) | USA | Foundation of Computer Science | Pg 4-5 2012 |
May | 2012 |
150 | Implementing Edge Detection for Detecting Neurons from Brain to Identify Emotions | Madhulika , Abhay Bansal, Amandeep, Madhurima | Dr. Madhulika | NIL | NIL | NIL | Abhay Bansal, Amandeep, Madhurima | ”, International Journal of Computer Applications(USA)( | USA | FCS® (Foundation of Computer Science) | Volume 61(9),pp 1-6 | January | 2012 |
151 | Structural Brain Atlases: Design, Rationale and Applications in Normal and Pathological Cohorts | Pravat K. Mandal, Rashima Mahajan, Ivo D. Dinov | Rashima Mahajan | Pravat K. Mandal, Ivo D. Dinov | Journal of Alzheimer’s disease | USA | IOS Press | Vol31, 1-20 (2012) | January | 2012 | |||
152 | An Effective knowledge base system Architecture and issues in representation techniques (PP 430- 435) | Poonam Tanwar,Dr T. V. Prasad, Dutta | Poonam Tanwar | NA | NA | NA | Poonam Tanwar,Dr T. V. Prasad, Dutta | International Journal of Advancements in Technology, | USA | NA | Volume 2, NO 3, 2011 IC value 4.78 | Nil | 2011 |
153 | Eye controlled Cursor Movement (PP 81- 84) | Poonam Tanwar,Pallavi | Poonam Tanwar | NA | NA | NA | Poonam Tanwar,Pallavi | International Journal IMS Manthan (The Journal of Mgt., Comp. Science & Journalism | NA | Nil | Vol 6, No 2, 2011 | Nil | 2011 |
154 | A Survey on Link/Node-Disjoint On-Demand Multipath Routing Protocols in MANET | Suresh Kumar, Alka Rawat, Preeti Bhati | Suresh Kumar | NIL | NIL | NIL | Alka Rawat, Preeti Bhati | MES Journal of Technology and Management | HONG KONG | MES | Vol. 2, No. 1, pp: 82-85, ISSN 0976 3724, May 2011 | May | 2011 |
155 | Downloading and Mapping of Web Forms for Information Retrieval from Hidden Web | Komal Kumar Bhatia, Rosy Madaan, A.K. Sharma | Rosy Madaan | A.K. Sharma, Komal Kumar Bhatia | International Journal of Contemporary Research in Engineering and Technology | India | extromind publications | Vol1 | Jul-Dec 2011 | 2011 | |||
156 | Crawling the Deep Web | Komal Kumar Bhatia, Rosy Madaan, A.K. Sharma | Rosy Madaan | A.K. Sharma, Komal Kumar Bhatia | International Journal of Contemporary Research in Engineering and Technology | India | extromind publications | Vol1 | Jul-Dec 2011 | 2011 | |||
157 | Edge detection system using canny algorithm. (PP 1-8) | Pallavi, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Pallavi, Poonam Tanwar | International Journal of Advances Engineering and Computing Technologies | NA | Nil | Vol 1, issue 1, July 2011 | July | 2011 |
158 | Performance Comparison between Ant Algorithm and Modified Ant Algorithm | Shaveta Malik | Shaveta Malik | NIL | NIL | NIL | NIL | International Journal of Advanced Computer Science and Applications | England | SAI | Vol 1, No. 4, Page No. 42-46, 2010 | OCTOBER | 2010 |
159 | Comparative Study of Three Declarative Knowledge Representation Techniques (PP 2274-2281) | Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | Poonam Tanwar | NA | NA | NA | Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta | (IJCSE) International Journal on Computer Science and Engineering | NA | Nil | Volume 2, No 7, 2010 | Nil | 2010 |
160 | Automated Mosiacing of Torn Paper Documents. (PP 129- 132) | Robin, Sandeep, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Robin, Sandeep, Poonam Tanwar | International Journal of Computer Science & Communication (IJCSC) | NA | Nil | Volume 1,No -2, 2010 | Nil | 2010 |
161 | Developing Brain Computer Interface Using Fuzzy Logic. (pp 429-434) | Mandeep Kaur, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Mandeep Kaur, Poonam Tanwar | International Journal of Information Technology and Knowledge Management | NA | Nil | Volume 2, No 2, 2010 | Nil | 2010 |
162 | Performance Analysis of Proactive and Reactive Routing Protocols for Ad hoc Network | S S Tyagi , R K Chauhan | S. S. Tyagi | NIL | NIL | NIL | R K Chauhan | International Journal on Computer Applications (IJCA) | USA | Foundation of Computer Science | Vol 1, No. 14, Article 6, 2010 |
FEBRUARY | 2010 |
163 | Framework for Incremental Hidden Web Crawler | Rosy Madaan, A.K. Sharma, Ashutosh Dixit, Komal Kumar Bhatia | Rosy Madaan | A.K. Sharma, Ashutosh Dixit, Komal Kumar Bhatia | International Journal in Computer Science and Engineering (IJCSE) | India | Inderscience publisher | Vol2 Issue 3 | 40299 | 2010 | |||
164 | Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography | Madhumita Kathuria | Madhumita Kathuria | NIL | NIL | NIL | NIL | International Journal of Computer Applications(IJCA) | USA | Foundation of Computer Science | No. 8 – Volume 12 2010 |
December | 2010 |
165 | Quantification of Shape and Texture for Wind Abrasion | Nathan T. Bridges, AnshumanRazdan, Xuetao Yin, Ronald Greeley, Saif Ali, Rakesh Kushunapally | Saif Ali | NA | NA | NA | Nathan T. Bridges, AnshumanRazdan, Xuetao Yin, Ronald Greeley, Rakesh Kushunapally | Geomorphology | USA | Elsevier | volume 114, issue 3, pages 213–226 | January | 2010 |
166 | Compressed Facade Displacement Maps | Saif Ali, Jieping Ye, Anshuman Razdan, Peter Wonka | Saif Ali | NA | NA | NA | Jieping Ye, Anshuman Razdan, Peter Wonka | IEEE Transactions on Visualization and Computer Graphics | USA | IEEE | volume 15, number 2, pages 262-273 | March/April | 2009 |
167 | Sub-millimeter Rock Surface Texture as a Measure of Aeolian Abrasion Maturity | Bridges, N. T.; Razdan, A.; Ali, S.; Kushunapally, R.; Laity, J. E.; Greeley, R.; Eddlemon, E. | Saif Ali | NA | NA | NA | Bridges, N. T.; Razdan, A.; Kushunapally, R.; Laity, J. E.; Greeley, R.; Eddlemon, E. | AGU Fall Meeting | USA | American Geophysical Union | NA | Dec | 2006 |
168 | Site specific automated drip irrigation for palm trees using wireless sensor network | N Hema, K Kant, HB Maringanti | Krishna Kant | NA | NA | NA | N Hema, HB Maringanti | International journal of Information Technology, Automation and Precision Farming | NA | NA | NA | NA | 2001 |