Research Publication in National Journals
Manav Rachna International Institute of Research and Studies | ||||||||||||||
Research Publications of Faculty Members in National Journals | ||||||||||||||
(Duration: From starting of career of individual faculty member till date) | ||||||||||||||
S. No. | Title of Paper | Name of All Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Author(s) as per publication (Sequence First Name, Middle Name and Last Name) | Name of Outside Author(s) other than MRIU (Sequence First Name, Middle Name and Last Name) | Name of Journal | Journal Published from (Country Name) | Name of Publisher | Volume/Issue, Page Number(s) and Year of publication (In sequence only) | Publication Month | Publication Year | ||||
MRIU Author-1 | MRIU Author-2 | MRIU Author-3 | MRIU Author-4 | |||||||||||
1 | Semantic Similarity between Web Documents using ontology | Poonam Chahal , Manjeet Singh, Suresh Kumar | Poonam Chahal | Suresh Kumar | NIL | NIL | Manjeet Singh | Journal of The Institution of Engineers (India): Series B Electrical, Electronics & Telecommunication and Computer Engineering |
India | SPRINGER | ISSN: 2250-2106 | March | 2018 | |
2 | Review for Best Multidimensional Index Structure | Dr. krishan kumar Mr. Ochin Sharma | Dr. Krishan Kumar | Mr. Ochin Sharma | NIL | NIL | NA | International Journal of Creative Research Thoughts (IJCRT) | Volume 6, Issue 1 | March 2018 | | 2018 | |||
3 | Spatial Data Mining For Finding Nearest Neighbor And Outlier Detection |
Ms. Srishty Jindal, Dr. Kamlesh Sharma | Ms. Srishty Jindal | Dr. Kamlesh Sharma | NIL | NIL | NA | International Journal of Latest Trends in Engineering and Technology (IJLTET) | India | IJLTET | Vol.(8)Issue(1) | January | 2017 | |
4 | Web Recognition of Spoken Hindi | Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | NIL | NIL | NIL | NIL | Indian Journal of Science and Technology | India | Indian Society for Education and Environment and co-published by Informatics (India) Ltd | Vol 10(35) | September | 2017 | |
5 | Diversity Techniques in Wireless Body Area Network | Savita Sindhu , Dr.Shruti Vashist | Savita Sindhu | Dr.Shruti Vashist | NIL | NIL | NIL | International Journal of Engineering and Technology (IJET) |
India | Engg Journals Publications | Vol. 9, No.3, pp 2111-2118 | July | 2017 | |
6 | An Efficient Hierarchical Parsing Technique Using LR | Dr. Poonam Nandal, Deepa Bura, Dr. Meeta Singh | Dr. Poonam Nandal | Deepa Bura | Dr. Meeta Singh | NIL | NIL | International Journal of Advanced Research in Computer Science | India | IJARCS | Volume 8, No. 5, June 2017, pages: 999-1002 | June | 2017 | |
7 | A Review: Credit Card Fraud Detection using various machine learning techniques | Deepika Kaushik, Indu Kashyap, Simple Sharma | Deepika Kaushik | Indu Kashyap | Simple Sharma | NIL | NIL | International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) | India | IJARECE | Vol 6, Issue 6, PP 515-521 | June | 2017 | |
8 | Extracting Information from Social Network using NLP | Charu Virmani, Dr. Anuradha Pillai, Dr. Dimple Juneja | Charu Virmani | NIL | NIL | NIL | Dr. Anuradha Pillai, Dr. Dimple Juneja | International Journal of Computational Intelligence Research | India | RIP Publication | Vol 13 no 4, pp 621-630 | MAY | 2017 | |
9 | X-Ray Diffraction Studies for Identification of Polyethylene Terephthalate Fibres . | Devi Singh, Hitendra K. Malik, Chinmay K. Gupta and Varsha Singh | Dr. Devi Singh | Chinmay K. Gupta | Varsha Singh | NIL | Hitendra K. Malik | Indian Journal of Science and Technology | India | IJST | Vol 10(17),pp1-4, May 2017 | MAY | 2017 | |
10 | An insight to Load Balancing for Cloud Computing Technology | Ekta Malhotra, Karishma Arora, Pronika Chawla | Ekta Malhotra | Karishma Arora | Pronika Chawla | NIL | NIL | International Journal of Latest Trends in Engg. And Tech. (IJLTET) | India | IJLTET | Vol 6, Issue 3, PP 130-134 | May | 2017 | |
11 | Geospatial Expat Parser using K-means for querying Open Street Map | Alka Setiya, Rachna Behl | Alka Setiya | Rachna Behl | NIL | NIL | NIL | International Education and Research Journal | India | IERJ | Vol 3, Issue 5, PP 530 – 533 | May | 2017 | |
12 | Routing Optimization in Cloud Networks | Deepa Mehta, Indu Kashyap | Deepa Mehta | Indu Kashyap | NIL | NIL | Sherin Zafar | International Journal of Advanced Research in Computer Science | India | IJARCS | Volume 8, No. 2, ISSN No-0976-5697, PP | March | 2017 | |
13 | Information Security in Cloud Computing: A systematic Literature Review and Analysis | S. S. Tyagi | S. S. Tyagi | NIL | NIL | NIL | Dinesh Taneja | International Journal of Scientific Engineering and Technology | India | Innovative Research Publications | Volume No. 6, Issue No. 1, pp: 50-55 |
January | 2017 | |
14 | An Impact of Digitalized Technologies Transformation in Healthcare Using Mobile Cloud Computing | Rahul Sharma, Prateek Jain | Prateek Jain | NIL | NIL | NIL | Rahul sharma | Indian Journal of Science and Technology | India | Informatics Publishing Ltd. | 9,16 | Sep | 2016 | |
15 | Optimum Hedging Tool of Portfolio Management Using Artificial Intelligence and Cloud Computing In Indian Stock Market | Nitasha Soni, Tapas Kumar | Nitasha Soni | NA | NA | NA | Dr Tapas Kumar | International Journal of Computer Science and Information Security , ISSN 1947 5500 IJCSIS November 2016, Volume 14 No. 11, SCI Index, Thomsonreuters -ISSN: 1947-5500, Google Scholar | NA | NA | ISSN 1947 5500 IJCSIS November 2016, Volume 14 No. 11, SCI Index, Thomsonreuters -ISSN: 1947-5500, Google Scholar | Dec | 2016 | |
16 | A Hybrid of Improved Weighted Round Robin and Least Load Algorithm to optimize the load balancing in cloud computing environment | Tanvi Gupta,M.V.Ramana Murthy, Prof. S S Handa | Tanvi Gupta | S S Handa | NIL | NIL | M.V. Ramana Murthy | IJERAS(International Journal of Engineering Research and Applied Science) | INDIA | IJERAS | ISSN : 2455-9660, Volume-01, Issue-04, June 2016 | July | 2016 | |
17 | Review on Big Graph Partitioning for Recommendation Systems | Chitra Setia, Supriya P Panda | Supriya P Panda | NIL | NIL | NIL | Chitra Setia | International Journal of Advanced Research in Computer Science and Software Engineering | India | IJARCSSE | Vol 6 ,Issue 1, January-2016 : Paper ID: V6I1-0262 | January | 2016 | |
18 | Major encounters to search the social netwok | Charu Virmani, Dr. Anuradha Pillai, Dr. Dimple Juneja | Charu Virmani | NIL | NIL | NIL | Dr. Anuradha Pillai, Dr. Dimple Juneja | International Journal of Advanced Research in Computer Science and Software Engineering | India | IJARCSSE | Vol 7 ,Issue 6, June-2017 : Paper ID: V716-0142A | January | 2016 | |
19 | A Tour Towards Sentiments Analysis using Data Mining | Dr. Poonam Tanwar, Nazar, Santosh, Seema | Poonam Tanwar | NA | NA | NA | Dr. Poonam Tanwar, Nazar, Santosh, Seema | International Journal of Engg. Research and Technology | India | IRPH | Vol. 5, No 12, 2016 | Dec | 2016 | |
20 | Towards the adoption of modern software development approach: Component Based Software Engineering | Prateek Jain | Prateek Jain | NIL | NIL | NIL | NIL | Indian Journal of Science and Technology | India | Informatics Publishing Ltd. | 9,32,2016 | Aug | 2016 | |
21 | A model based on effective and intelligent sentiment mining: review paper | Rajni Bhalla, Prateek Jain | Prateek Jain | NIL | NIL | NIL | Rajni Bhalla | Indian Journal of Science and Technology | India | Informatics Publishing Ltd. | 9,32,2016 | Aug | 2016 | |
22 | A Review: Comparative Analysis of various Data Mining Techniques | Pinki Sagar, Monika Goyal | Pinki Sagar | Monika Goyal | NIL | NIL | NIL | International Journal of Computer Sciences and Engineering | India | IJCSE | Volume-04/ Issue-12, Pg no. 56-60, Dec 2016 | December | 2016 | |
23 | LIS using Backtracking and Branch and Bound Approaches | Seema Rani, Dharamveer Singh Rajpoot | NIL | NIL | NIL | NIL | Dharamveer Singh Rajpoot | CSI Transactions on ICT-Springer Journal | India | Springer International Publishing AG | 108, Pg No. 1-7 | December | 2016 | |
24 | Speech Enabled System for Robot | Dr. Kamlesh Sharma and et. Al. | Dr. Kamlesh Sharma | NIL | NIL | NIL | Rishabh Anand | International Journal of Scientific & Engineering Research | India | ISSN 2229-5518 | Vol (7) Issue (10) | December | 2016 | |
25 | Cloud Computing: A silver lining in the dark | Dr. Kamlesh Sharma and et. Al. | Dr. Kamlesh Sharma | NIL | NIL | NIL | Abhigna B.S | International Journal of Scientific & Engineering Research | India | ISSN 2229-5518 | Vol (7) Issue (10) | December | 2016 | |
26 | Analysis of On-body Antenna Distance on Reflection coefficient and SAR values for WBAN using PSO | KG Dangi, Supriya Panda | Supriya Panda | NIL | NIL | NIL | KG Dangi | International Journal of Control Theory and Applications | India | Serial Publications Ltd. | Vol.10,November 6,2016,pp 737-743 | November | 2016 | |
27 | Performance Analysis of Patient Monitoring Wireless Body Area Networks using Queueing Models | Kusum Grewal, Supriya P Panda | Supriya P Panda | NIL | NIL | NIL | Kusum Grewal | International Journal of Applied Engineering Research (IJAER) | India | Research India Publication | ISSN 0973-4562 Volume 11, Number 9 (2016) pp 6671-6675 (SCOPUS indexed) | June | 2016 | |
28 | A survey of Bluetooth and ZigBee WPAN standards | Mohit Yadav , Kusum Grewal Dangi, Supriya P Panda | Supriya P Panda | NIL | NIL | NIL | Mohit Yadav , Kusum Grewal Dangi | International Journal of Engineering Development and Research | India | IJERD | Volume 4, Issue 2 ISSN: 2321-9939 pp 651-654, May,2016 | May | 2016 | |
29 | •, “A proposed quantitative approach to classify brain MRI” | Madhulika, Abhay Bansal, Divakar Yadav | Dr. Madhulika | NIL | NIL | NIL | Abhay Bansal, Divakar Yadav | International Journal of System Assurance Engineering and Management, Springer. | India | Springer | 8(33) | May | 2016 | |
30 | Stock Market Forecasting using Algorithm Selector Based on Genetic Algorithms in Cloud | Nitasha Soni, Tapas Kumar | Nitasha Soni | NA | NA | NA | Dr Tapas Kumar | International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 21 (2015) pp 42336-42339 , Scopus index journal | India | RIP Publication | ISSN 0973-4562 Volume 10, Number 21 (2015) pp 42336-42339 , Scopus index journal | Nov | 2015 | |
31 | Regression Based Data Mining Techniques For Frequent data stream (One Dimensional and two Dimensional Stream Data) | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | International Journal of Computer Science and Engineering (IJCSE) | India | Engg Journals Publications | Volume 3, Issue 9 Page No (144-148), E-ISSN: 2347-2693 |
September | 2015 | |
32 | A Review of Computerized Payroll System | Kritika, Shilpa, Nitasha Soni | NA | NA | Nitasha Soni | NA | Kritika, Shilpa | International Journal of Advanced Research in Computer and Communication Engineering , IJARCCE, Vol. 4, Issue 1, January 2015 , ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 | India | NA | Vol. 4, Issue 1, January 2015 , ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 | Jan | 2015 | |
33 | Database Security: Threats and Security Techniques | Deepika, Niotasha Soni | NA | NA | Nitasha Soni | NA | Deepika | International Journal of Advanced Research in Computer Science and Software Engineering, IJARCSSE, Volume 5, Issue 5, MAY 2015, ISSN: 2277 128X | India | NA | Volume 5, Issue 5, MAY 2015, ISSN: 2277 128X | May | 2015 | |
34 | a prioritized service scheme with qos provisioning in a cloud computing system | Prateek Jain, Dr. Uma Shankar Pandey | Prateek Jain | NIL | NIL | NIL | Dr. Uma Shankar Pandey | International Journal on Recent and Innovation Trends in Computing and Communication | India | Auricle Technologies Pvt. Ltd | 3,654-661,2015 | Feb | 2015 | |
35 | Design of a novel search engine for prospective question answering | Rosy Madaan, A.K. Sharma, Ashutosh Dixit | Rosy Madaan | A.K. Sharma, Ashutosh Dixit | International Journal of Information retrieval research | USA | IGI Global | Vol 4 Issue 2 | 42095 | 2015 | ||||
36 | Voice Based Cloud Computing as a Next Generation Architecture | Dr. Kamlesh Sharma | Dr. Kamlesh Sharma | NA | NA | NA | NA | JNCET (Journal of Network Communication and Emerging Technology) | India | JNCET | Vol. (5) Issues 2 | December | 2015 | |
37 | A Proposed Stratification Approach for MRI Images. | Madhulika, Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Madhulika | NA | NA | NA | Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Indian Journal of Science & Technology | India | Indian Academy of Science | 8(12) | September | 2015 | |
38 | A Proposed Stratification Approach for MRI Images. | Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Dr. Madhulika | NIL | NIL | NIL | Bansal, A., Yadav, D., & Gupta, P. | Indian Journal of Science & Technology | India | Indian Academy of Science | 8(12), pp1-10 | September | 2015 | |
39 | Proposed Algorithm to Blotch Grey Matter from Tumored and Non Tumored Brain MRI Images | Madhulika, Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Madhulika | NA | NA | NA | Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Indian Journal of Science & Technology | India | Indian Academy of Science | 8(17) | August | 2015 | |
40 | Proposed Algorithm to Blotch Grey Matter from Tumored and Non Tumored Brain MRI Images | Bhatia, M., Bansal, A., Yadav, D., & Gupta, P. | Dr. Madhulika | NIL | NIL | NIL | Bansal, A., Yadav, D., & Gupta, P. | Indian Journal of Science & Technology | India | Indian Academy of Science | 8(17)pp1-10 | August | 2015 | |
41 | How Internet of things and green Building can lead to a zero energy Building | Dr. kamlesh Sharma, Ms. Anika Singh | Dr. Kamlesh Sharma | NA | NA | NA | Ms. Anika Singh | International Journal of Latest Trends in Engineering and Technology (IJLTET) | India | IJLTET | Vol.(5)Issue(4) | July | 2015 | |
42 | Performance Analysis of various Codec Schemes of VOIP over WiMAX | Sheetal, Shradha Verma |
Sheetal | Shradha Verma | NIL | NIL | NIL | International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) | INDIA | IJARCET | Volume 4 Issue 6, 2514-2518 | JUNE | 2015 | |
43 | A Detailed Review on Voice over Internet Protocol (VoIP) | Sheetal, Shradha Verma |
Sheetal | Shradha Verma | NIL | NIL | NIL | International Journal of Engineering Trends and Technology (IJETT) | INDIA | IJETT | Volume 23, Number 4, 161-166 |
MAY | 2015 | |
44 | Efficient Content based Spam Filtering using Bayesian Method | Himanshu Gupta, Vasudha Arora | Himanshu Gupta | Vasudha Arora | NIL | NIL | NIL | International Journal for Scientific Research and Development | INDIA | IJSRD | Vol. 3, Issue 3,1048-1051 | MAY | 2015 | |
45 | Decision Support system using classifiers for predicting student’s Academic Performance | Kritika Mandiretta, Simple Sharma | Kritika Mendiretta | Simple Sharma | NIL | NIL | NIL | International Journal for Scientific Research and Development | INDIA | IJSRD | Vol. 3, Issue 3,1028-1030 | MAY | 2015 | |
46 | Data Security in Proactive Network using Secret Sharing Mechanism | Himanshu Gupta, Vasudha Arora | Himanshu Gupta | Vasudha Arora | NIL | NIL | NIL | International Journal of Innovative Research in Computer and Communication Engineering | INDIA | Ess & Ess Research Publications | Vol. 3, Issue 4, Pg 2812-2817 | APRIL | 2015 | |
47 | BETC (Black-Hole Eradication Technique Based On Clustering) For Securing Manet Based AODV | Sonam Yadav, Kanika L. Choudhary |
Sonam Yadav | NIL | NIL | NIL | Kanika L. Choudhary | International Journal of Advanced Research In Science And Engineering IJARSE, ISSN-2319-8354(E) | INDIA | A R Research publication | Vol. No.4, Special Issue (01), 1710-1716 | MARCH | 2015 | |
48 | Autoconf: Automated configuration File for Honeyd | Dr. Poonam Tanwar, Aman | Poonam Tanwar | NA | NA | NA | Dr. Poonam Tanwar, Aman | IJAESTR | INDIA | IJAESTR | Volume 3, Issue 1, March 2015 | March | 2015 | |
49 |
|
Neha Virmani, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Neha Virmani, Poonam Tanwar | International Journal of Engineering Research and Technology (IJERT) | INDIA | IRPH | Volume 8, No.1, 2015 | March | 2015 | |
50 | Analysis of “DPHCF-RTT” Packet Filtering Technique against DPHCF & DCHCF Techniques. | Dr. Anil Rajput, Ms. Ritu Maheshwari Bansal | Ritu Maheshwari Bansal | NIL | NIL | NIL | Dr. Anil Rajput | International Journal of Advance Research in Science and Engineering ISSN: 2319-8354(E) | India | A R Research publication | Vol. No.4, Special Issue (02), Pg No. 325-330. |
February | 2015 | |
51 | Deep Web Search in Data Mining for Data Extraction | Nripendra Narayan Das, Dimpy | NN Das | NA | NA | NA | Dimpy | International Journal Of Research In Management, Science & Technology | INDIA | IJRMST | Volume 2 , No. 3 , 2014, pp:30-35 | January | 2015 | |
52 | DEALING WITH HETEROGENEITY OF DATA AND KNOWLEDGE USING OBJECT MODELING. | Pandey, S. K, Madhulika | Dr. Madhulika | NIL | NIL | NIL | Pandey, S. K, | International Journal of Advances in Engineering & Technology, | India | NA | 7(6) 1-6 | January | 2015 | |
53 | A Collation: Implementing Mono And Hybrid Approaches for Feature Extraction”, |
Surabhi Aggarwal, Madhulika | Dr. Madhulika | NIL | NIL | NIL | Surabhi Aggarwal, | International journal of applied engineering research, Research India publications. | India | Research India Publications | 10(6) 15671-15678 | January | 2015 | |
54 | Implementation of UML2. 0 Based Change Proneness Prediction in OO Software through Dependency | Deepa Godara, Rakesh Kumar Singh | Deepa Godara | Dr. Rakesh Kumar Singh | International Journal of Current Engineering and Technology | India | Inpressco | Vol.4, No.5, pp 3562-3566, Oct 2014 | OCTOBER | 2014 | ||||
55 | Security Issues in High Performance Transfer Protocol-UDT | Nidhi Gupta, Shanu Garg | Shanu Garg | NIL | NIL | NIL | Nidhi Gupta | International Journal of Advanced Research in Computer Science & Technology (IJARCST) |
India | IJARCST | Vol. 2, Issue 2, Ver. 2, Pg 274-276, 2014 | July | 2014 | |
56 | Identity and Access Management in Cloud Computing |
Sonam Sudha, Vasudha Arora |
Vasudha Arora | NIL | NIL | NIL | Sonam Sudha | International Journal For Research In Applied Science And Engineering Technology (IJRASET) |
INDIA | IJRASET | Vol. 2 No. 7, Pg 146-153 |
July | 2014 | |
57 | A Hybrid Technique for Image Retrieval Using Canny and Neural Network | Pallavi, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Pallavi, Poonam Tanwar | International Journal of Engineering Research and Technology (IJERT) | INDIA | IRPH | Vol 3, No (1), January, 2014 | Jan | 2014 | |
58 | A New Era of Research & Development: Cloud Computing | Prateek Jain, Dr. Uma Shankar Pandey | Prateek Jain | NIL | NIL | NIL | Dr. Uma Shankar Pandey | International Journal of Advanced Research in Computer Science and Software Engineering | India | Advance Academic Publisher | 42014 | Dec | 2014 | |
59 | Automatic extraction of data from deep web page | Nripendra Narayan Das, Ela Kumar, | NN Das | NA | NA | NA | Ela Kumar, | International Journal of Computer and Mathematical Sciences | INDIA | IJCMS | Volume 3 Issue 1, 2014 , pp 86-91 | April | 2014 | |
60 |
|
Meenakshi Moza ,Suresh Kumar | Meenakshi Moza | Suresh Kumar | NIL | NIL | NIL | Journal of Environmental Science, Computer Science and Engineering & Technology | India | Scientific and Academic Association Publication House | Vol.4.No.1, 13-18 | December | 2014 | |
61 | Improving the initial centroids of K-Means Clustering Algorithm to Generalize its Applicability | Monika Goyal, Suresh Kumar | Monika Goyal | Suresh Kumar | NIL | NIL | NIL | Journal of The Institution of Engineers(India) | India | Springer | Volume 95 / Issue 4, Pg 345-350, 2014 | December | 2014 | |
62 | Relevant Information Retrieval From Deep Web Page | Nripendra Narayan Das, Ela Kumar, | NN Das | NA | NA | NA | Ela Kumar, | International Journal Of Research In Management, Science & Technology | INDIA | IJRMST | Volume 2 , No. 3 , 2014, pp:30-34 | December | 2014 | |
63 | Brief Survey On DNA Sequence Mining | Nripendra Narayan Das, Poonam | NN Das | NA | NA | NA | Poonam | International Journal of Computer Science and Mobile Computing | INDIA | IJCSMC | Vol. 2, Issue. 11, 2013, pg.129-134 | December | 2014 | |
64 | A Review on Textural Features Based Computer Aided Diagnostic System for Mammogram Mass Classification Using GLCM & RBFNN | Neha Tripathi, Supriya P Panda | Supriya P Panda | NIL | NIL | NIL | Neha Tripathi | International Journal of Engineering Trends and Technology (IJETT) | INDIA | IJETT | Vol 17 Number-9 , PP 462-464 ,2014 | November | 2014 | |
65 | Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET | Sanghita Deka, Madhumita Kathuria | Sanghita Deka | Madhumita Kathuria | NIL | NIL | NIL | International Journal of Science, Engineering and Technology Research (IJSETR) |
India | IJSETR | Volume 3, Issue 6, Pg 1837-1842 | June | 2014 | |
66 | Study of QOS Parameters Using OFDM Based PHY | Bakul Choudhary, Meenakshi Moza, Romika Choudhary | Meenakshi Moza | Romika Choudhary | NIL | NIL | Bakul | International Journal of Scientific and Engineering Research(IJSER) | INDIA | International Journal of Scientific & Engineering Research | Volume 5, Issue 6, June-2014 | June | 2014 | |
67 | An Efficient Web Page Ranking for Semantic Web | Poonam Chahal , Manjeet Singh, Suresh Kumar | Poonam Chahal | Suresh Kumar | NIL | NIL | Manjeet Singh | Journal of The Institution of Engineers (India): Series B Electrical, Electronics & Telecommunication and Computer Engineering |
INDIA | SPRINGER | ISSN 2250-2106 J. Inst. Eng. India Ser. B DOI 10.1007/s40031-014-0070-7 |
May | 2014 | |
68 | Review and Analysis of Hashing Techniques | Sangeeta Raheja Shradha Verma |
Shradha Verma | NIL | NIL | NIL | Sangeeta Raheja | International Journal of Advanced Research in Computer Science and Software Engineering | India | IJARCSSE | Vol. 4, Issue 5, Pg 292-295 | May | 2014 | |
69 | Comparative study of Hashing Algorithm Using Cryptographic and Steganography with Audio Files | Sangeeta Raheja Shradha Verma |
Shradha Verma | NIL | NIL | NIL | Sangeeta Raheja | International Journal of Advanced Research in Computer Science and Software Engineering | India | IJARCSSE | Vol. 4, Issue 5, Pg 296-298 | May | 2014 | |
70 | Retrieval of Data from hidden Web using web agent | Nripendra Narayan Das, Ela Kumar, | NN Das | NA | NA | NA | Ela Kumar, | Journal of Computer Technology & Applications | INDIA | STM Journal | Volume 5, Issue 2, 2014, pp:26-34 | MAY | 2014 | |
71 | Comparative analysis of stegnography for coloured images | Shrutika Suri, Himani Joshi, Vishakha Manocha, Akash Tyagi. | Shrutika Suri | NIL | NIL | NIL | Himani Joshi, Vishakha Manocha, Akash Tyagi. | International Journal of Computational Science and Engineering | INDIA | Research India Publication | ISSUE-4 VOL 2, APRIL 2014 | April | 2014 | |
72 | Gesture recognition using artificial neural network | Khusboo Arora, Shrutika Suri, Divya Arora, Vaishali Pandey. | Shrutika Suri | NIL | NIL | NIL | Khusboo Arora, Divya Arora, Vaishali Pandey. | International Journal of Computational Science and Engineering | INDIA | Research India Publication | ISSUE-4 VOL 2, APRIL 2014 | April | 2014 | |
73 | Comparative study of intrusion detection system | Mehak Arora, Shrutika Suri, Mansi Bhutani | Shrutika Suri | NIL | NIL | NIL | Mehak Arora, Shrutika Suri, Mansi Bhutani | International Journal of Computational Science and Engineering | INDIA | Research India Publication | ISSUE-4 VOL 2, APRIL 2014 | April | 2014 | |
74 | Comparative Study of Techniques to Improve QOS in Networks | Meenakshi Moza ,Suresh Kumar | Meenakshi Moza | Suresh Kumar | NIL | NIL | NIL | International Journal of Emerging Technology and Advanced Engineering | India | International Journal of Emerging Technology and Advanced Engineering | Volume 4, Issue 1 | January | 2014 | |
75 | A Review of Efficient Clustering Algorithms used in MANET | Ms. Kanika Garg, Mr. Lalit Kumar |
Ms. Kanika Garg, | Mr. Lalit Kumar | NIL | NIL | NIL | International Journal of Computer Science and Engineering (IJCSE) | India | Engg Journals Publications | Vol : 2, Issue-4, 2013, Pg: 49-56 |
September | 2013 | |
76 | Approaches of Page Ranking Algorithms | Nripendra Narayan Das, Ela Kumar, | NN Das | NA | NA | NA | Ela Kumar, | International Journal of Computer Application | INDIA | Foundation of Computer Science | Vol 82 ,2013 , pp 34-38. | November | 2013 | |
77 | Detection and Resolution of Deadlocks in Multi-Level Secure Databases | Suresh Kumar, Pooja Sapra, R. K. Rathy | Suresh Kumar | R. K. Rathy | NIL | NIL | Pooja Sapra | International Journal of Engineering and Technology (IJET) | India | Engg Journals Publications | Vol. 5, No. 3, pp. 3001-3006, ISSN: 0975-4024, May 2013 | May | 2013 | |
78 | Study and Analysis of DSDV, AODVand DSR | Shilpa Shukla, Shelja Sharma |
Shelja Sharma | NIL | NIL | NIL | Shilpa Shukla | International Journal of Advanced Research in Computer and Communication Engineering | India | B. Shanmugasundaram | Volume 2, Issue 5, May 2013 | May | 2013 | |
79 | Analysis of Different Regression Testing Approaches | Ms. Chandna Bharti, Ms. Shradha Verma |
Ms. Shradha Verma | NIL | NIL | NIL | Ms. Chandna Bharti | International Journal of Advanced Research in Computer and Communication Engineering | India | B. Shanmugasundaram | Vol. 2, Issue 5, Pg 2150-2155, 2013 | May | 2013 | |
80 | Optimal-Ant Colony Optimization in Swarm Intelligence | Anita, S S Tyagi |
S. S. Tyagi | NIL | NIL | NIL | Anita | MR International Journal of Engineering and Technology. | India | MR Publishers | Vol. 5 No. 1, Pg No. 1-4, 2013 |
June | 2013 | |
81 | Design of Efficient K-Means Clustering Algorithm With Improved Initial Centroids | Kumar Suresh, Afzali Maedeh | Suresh Kumar | NIL | NIL | NIL | Afzali Maedeh | MR International Journal of Engineering and Technology. | India | MRPH | Vol. 5, No. 1, PP. 33-38, 2013 |
June | 2013 | |
82 | Comparative study and analysis of data centric routing protocols in wireless sensor network based on energy consumption | Vasudha Arora, Priyanka Mangla | Vasudha Arora | NIL | NIL | NIL | Priyanka Mangla | International journal of scientific and research publications (IJSRP) | India | IJSRP | Volume 3 Issue 6 June 2013 | June | 2013 | |
83 | Position Estimation Using localization Technique in wireless sensor networks | Priti Narwal, S. S. Tyagi | Priti Narwal | S. S. Tyagi | NIL | NIL | NIL | International Journal of Application or innovation in Engineering and Management (IJAIEM) | India | IPASJ | ISSN 2319-4847, Volume 2, Issue 6, June 2013. | JUNE | 2013 | |
84 | Survey on Data-Centric protocols of WSN | S.S. Tyagi, Geetika Dhand | S. S. Tyagi | NIL | NIL | NIL | Geetika Dhand | International Journal of Application or Innovation in Engineering & Management (IJAIEM) | India | IPASJ | Volume 2, Issue 2, Page 279-284, ISSN 2319 – 4847 2013 |
February | 2013 | |
85 | Performance of Handover in Mobile IP Networks | S. S. Tyagi, Khaled Mahmood Al-Adhal |
S. S. Tyagi | NIL | NIL | NIL | Khaled Mahmood Al-Adhal |
International Journal of Engineering and Research and Applications (IJERA) | India | IJERA | ISSN: 2248-9622, Vol 3, Issue 6, November-December 2013 | DECEMBER | 2013 | |
86 | Ontology Based Approach for Finding Semantic Similarity between Web documents | Suresh Kumar, Poonam Nandal, Manjeet Singh | Suresh Kumar | Poonam Nandal | NIL | NIL | Manjeet Singh | International Journal of Current Engineering and Technology | India | Inpressco | Vol. 3, No. 5, PP. 1925-1931, ISSN 2277-4106, December 2013 | December | 2013 | |
87 | Analysis of Techniques for Mitigating DoS Attacks in MANET | Pooja, S. S. Tyagi | S. S. Tyagi | NIL | NIL | NIL | Pooja | International Journal of Engineering Research & Technology (IJERT) | India | ESRSA Publications Pvt. Ltd. |
ISSN:2278-0181, vol.2, issue 4, April 2013 | April | 2013 | |
88 | A Study on Association Rule Mining Using ACO Algorithm for Generating Optimized Result Set | Nripendra Narayan Das, Anjali Saini | NN Das | NA | NA | NA | Anjali Saini | International Journal of Computer Science and Mobile Computing | INDIA | IJCSMC | Vol. 2, Issue. 11, 2013, pg.123 – 128 | November | 2013 | |
89 | Mitigation of Distributed Denial of Service Attacks using probability based Distributed Hop Count Filtering and Round Trip Time | Ritu Maheshwari, Dr. C. Rama Krishna | Ritu Maheshwari | NIL | NIL | NIL | Dr. C. Rama Krishna | International Journal of Engineering Research and Technology (IJERT) |
India | ESRSA Publications Pvt. Ltd. |
Vol 2, Issue 7, July 2013 |
July | 2013 | |
90 | Recent innovations in Distributed Systems: Challenges and Benefits” | Madhulika Amandeep, Madhurima | Dr. Madhulika | NIL | NIL | NIL | Madhurima, Amandeep | International journal of computational engineering and management, | India | NA | 16(4) 35-39 | July | 2013 | |
91 | Enhancing Data Security In Cloud Storage | SUNITA SHARMA & AMIT CHUGH | AMIT CHUGH | NIL | NIL | NIL | SUNITA SHARMA | INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING |
India | B. Shanmugasundaram | ISSN (Online): 2278 – 1021 Volume 2, Issue 5 Page No 2132-2134 | May | 2013 | |
92 | Ranking Techniques in Search Engines | Rajat Chaudhari, Charu Pujara |
Charu Pujara | NIL | NIL | NIL | Rajat Chaudhari | International Journal of New Innovations in Engg. And Technology | India | IJNIET | Vol. 1, Issue 4, Pg 1-6 | April | 2013 | |
93 | Differentiate Clustering Approaches for Outlier Detection | NEERAJ BANSAL & AMIT CHUGH | AMIT CHUGH | NIL | NIL | NIL | NEERAJ BANSAL | INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING | India | B. Shanmugasundaram | ISSN (Online): 2320 – 9801 Volume 1, Issue 2, Page No. 193-196 | April | 2013 | |
94 | A Nobel Hybrid Approach for Edge Detection | Pallavi, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Pallavi, Poonam Tanwar | International Journal of Computer Science & Engineering Survey (IJCSES) | India | AIRCC | Vol 4, No (2), April, 2013 | April | 2013 | |
95 | A Cluster based technique for securingrouting protocol AODV against black hole attack in MANET | Sonam Yadav, Kanika L. Choudhary |
Sonam Yadav | NIL | NIL | NIL | Kanika L. Choudhary | Inetrnational Journal of Distributed and Parallel Systems | India | IJDPS | Vol. 4,No.2,2013 | March | 2013 | |
96 | Hindi Speech enabled Windows applications using Microsoft SAPI | Kamlesh Sharma, Dr. S. V. A. V. Prasad, Dr. T. V. Prasad | Dr. Kamlesh Sharma | NA | NA | NA | Dr. S. V. A. V. Prasad, Dr. T. V. Prasad | Int. J. of Computer Engg. and Tech. (IJCET) | India | IJCET | Vol.(4)Issue(2) | March | 2013 | |
97 | Analysis of Satellite Images using Artificial Neural Network | Priyanka Sharma, Urvashi Mutreja | Urvashi Mutreja | NIL | NIL | NIL | Priyanka Sharma | International Journal of Soft Computing and Engineering (IJSCE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | ISSN: 2231-2307, Volume-2, Issue-6, January 2013,Page No. 276-278 | January | 2013 | |
98 | Mobile IP: A study of Issues, Challenges, And Comparision of IPV4 and IPV6 | S. S. Tyagi, Khaled Mahmood Al-Adhal | S. S. Tyagi | NIL | NIL | NIL | Khaled Mahmood Al-Adhal | International Journal of Engineering and Research and Applications (IJERA) | India | IJERA | ISSN: 2248-9622, Vol 2, Issue 6, Pages 616-621 | NOVEMBER | 2012 | |
99 | Development of Association Rule Based Prediction Model for Web Documents | Simple Sharma | Simple Sharma | NIL | NIL | NIL | NIL | International Journal of Computer Science and Technology (IJCST) | India | Cosmic Journals | VOL 3 ISSUE 1-VER. 1 | MARCH | 2012 | |
100 | Performance Comparisons of Ad-hoc Networks routing protocols using NS-2 | S. S. Tyagi, Ginni, Indu Kashyap |
S. S. Tyagi | Indu Kashyap | NIL | NIL | Ginni | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | Volume 1 Issue 1, 2012 , ISSN: 2278-3075 |
JUNE | 2012 | |
101 | Comparative study of Fault Management Algorithm in Wireless Sensor Networks | Charu Virmani, Khushboo Garg |
Charu Virmani | NIL | NIL | NIL | Khushboo Garg | International Journal of Engineering Research and Technology | India | ESRSA Publications Pvt. Ltd. |
Vol-1, Issue-3 2012 | JUNE | 2012 | |
102 | Comparative study of various Page Ranking Algorithms in Web Structure Mining (WSM) | Neelam Tyagi, Simple Sharma |
Simple Sharma | NIL | NIL | NIL | Neelam Tyagi | International Journal of Innovative Technology and Exploring Engineering (IJITEE). | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | ISSN : 2278-3075, Volume-1, Issue-1, 2012 |
JUNE | 2012 | |
103 | Comparative Study of various technology employed in Image Steganography | Charu Pujara, Preeti Singh |
Charu Pujara | NIL | NIL | NIL | Preeti Singh | International Journal of Engineering and Advanced Technology | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | Vol-1, Issue-1, 2012 | JUNE | 2012 | |
104 | On Demand secure routing in mobile adhoc networks based on fidelity | Charu Pujara, Mayank Bansal |
Charu Pujara | NIL | NIL | NIL | Mayank Bansal | International Journal of Electronics and Computer Science Engineering | India | IJECSE | Vol-1, Issue-3, 2012 | JUNE | 2012 | |
105 | Performance of Ad-hoc Network Protocol in different Network sizes | S. S. Tyagi, Ginni |
S. S. Tyagi | NIL | NIL | NIL | Ginni | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | ISSN: 2278-3075, Volume-1, Issue-2, July 2012 | JULY | 2012 | |
106 | Analysis of Effectiveness of Concurrency Control Techniques in Databases | Rachna Behl, Ruchi |
Rachna Behl | NIL | NIL | NIL | Ruchi | International Journal of Engineering Research and Technology | India | ESRSA Publications Pvt. Ltd. |
Vol-1, Issue-5, 2012 | JULY | 2012 | |
107 | Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page |
Neelam Tyagi, Simple Sharma | Simple Sharma | NIL | NIL | NIL | Neelam Tyagi | International Journal of Soft Computing and Engineering (IJSCE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | ISSN: 2231-2307, Volume-2, Issue-3 | JULY | 2012 | |
108 | A hybrid model for detection and elimination of near-duplicates based on web provenance for effective web search | Tanvi Gupta,Latha Banda | Tanvi Gupta | NIL | NIL | NIL | Latha Banda | International Journal of Advances in Engineering & Technology (IJAET) | India | IJAET | Volume4 Issue1,pp-192-205 2012 | July | 2012 | |
109 | HONEYMAZE: A Hybrid Intrusion Detection System | Amit Chugh, Divya |
Amit Chugh | NIL | NIL | NIL | Divya | International Journal of Advances in Engineering & Technology (IJAET) | India | IJAET | Vol-4 Issue 1, pp 366-375 2012 |
February | 2012 | |
110 | GHIDS: A Hybrid Honeypot System using Genetic Algorithms | Amit Chugh, Divya |
Amit Chugh | NIL | NIL | NIL | Divya | International Journal of Computer Technology and Applications | India | TECHNOPARK PUBLICATIONS | Vol-3 Issue 1, pp 187-191 2012 |
February | 2012 | |
111 | An enhanced approach to optimize web search based on provenance using fuzzy equivalence relation by lemmatization | Tanvi Gupta, Divya | Tanvi Gupta | NIL | NIL | NIL | Divya | International Journal of Research in IT and Management | India | IJRIM | Volume 2 Issue 2, pp-160-165, 2012 | February | 2012 | |
112 | HBRO – Hybrid BRO system for intrusion detection in wireless environment. | Tanvi Gupta, Divya | Tanvi Gupta | NIL | NIL | NIL | Divya | International Journal of Research in IT and Management | India | IJRIM | Volume 2 Issue 2, pp-152-159, 2012 | February | 2012 | |
113 | A novel Approach to detect the near-duplicates by refining Provenance Matrix. | Tanvi Gupta,Latha Banda | Tanvi Gupta | NIL | NIL | NIL | Latha Banda | International Journal of Computer Technology and Applications (IJCTA) | India | TECHNOPARK PUBLICATIONS | Page no-231 2012 |
Feb | 2012 | |
114 | Terrain Identification using Co-Clustered Model of The Swarm Intelligence & Segmentation Technique | Ritesh Srivastaval, Shivani Agarwal, Ankit Goel, Vipul Gupta | Ritesh Srivastava | NA | NA | NA | Shivani Agarwal, Ankit Goel, Vipul Gupta | International Journal of Computer Science and Information Technology | India | IJCSIT | Vol 2. No. 1., 2012 | Feb | 2012 | |
115 | Deadlock Detection Techniques in Distributed Database Systems | Suresh Kumar, Swati Gupta | Suresh Kumar | NIL | NIL | NIL | Swati Gupta | MR International Journal of Engineering & Technology | India | MRPH | Vol. 4, No. 2, pp. 36-42, ISSN: 0975-4997, December 2012 | December | 2012 | |
116 | Simulation of an SNMP Agent: Operations, Analysis and Results | S. S. Tyagi, Pradeep Kumar. |
S. S. Tyagi | NIL | NIL | NIL | Pradeep Kumar. | International Journal of Electronics and Computer Science and Engineering (IJECSE) |
India | IJECSE | Volume 1, No. 4, Page 1919-1927, 2012 |
AUGUST | 2012 | |
117 | Comparative study of Network Monitoring Tools | Shrutika Suri, Vandana Batra. |
Shrutika Suri | Vandana Batra | NIL | NIL | NIL | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | ISSN: 2278-3075, Volume-1, Issue-3, August 2012 | AUGUST | 2012 | |
118 | Optimization for Keyword-Based Queries by using Web Search Engine | Nripendra Narayan Das, Monika Gupta | NN Das | NA | NA | NA | Monika Gupta | International Journal Of Computer Science & Technology | INDIA | IJCST | Vol. 3, Iss ue 2, 2012, pp148-151. | April | 2012 | |
119 | Security Issues and Research of Vehicular Ad-Hoc Networks (VANET) | Kusum Mehta | Kusum Mehta | NA | NA | NA | NA | International Jornal Of Research in Computer Engineering and Electronics (IJRCEE) | India | IJRCEE | Volume 1, No.2, 2014, pg n. 1-5 ISSN 2319-376X |
October | 2012 | |
120 | Implementing Constraints in Entity-Relationship Models for Enhancing Normalization | Deepa Bura, RK Singh | Deepa Bura | NIL | NIL | NIL | R.K. Singh | IUP journal of Information Technology | INDIA | ICFAI University | Vol. VIII, No. II, June 2012 issue.Pages46-57 | JUNE | 2012 | |
121 |
|
Mukesh Chawla, Kamlesh Dutta, Navneet Verma | Mukesh Chawla | NA | NA | NA | Kamlesh Dutta, Navneet Verma | International Journal of Multidisciplinary and Scientific Emerging Research | India | IJESM | Vol.2, No.3, pp. 708-713 | May | 2012 | |
122 | An Efficient approach for Identifying Functional Dependencies in a Database Class | Deepa Bura,Devendra Tayal | Deepa Bura | NIL | NIL | NIL | Devendra Tayal | IUP journal of Information Technology | INDIA | ICFAI University | Vol. VIII, No. 1, March 2012 issue.Pages36-47 | MARCH | 2012 | |
123 | Risk Based Testing: A Fuzzy Approach | Ochin, Jugnu Gaur | Ochin | NIL | NIL | NIL | Jugnu Gaur | International Journal of Computer Science and Engineering (IJCSE) | India | Engg Journals Publications | Vol. 3 No. 10 , p 3346-3354, 2011 |
OCTOBER | 2011 | |
124 | Optimizing Web Search based on Web Provenance using Fuzzy Equivalence Relation in web document clustering | Tanvi Gupta | Tanvi Gupta | NIL | NIL | NIL | NIL | IJESS | India | IJESS | Volume 1 Issue 2 Page no 43 nov 2011 | NOVEMBER | 2011 | |
125 | Study of Route Re-construction mechanism in DSDV based routing Protocol | Shelja Sharma, R. K Rathy, Suresh Kumar |
Shelja Sharma | R. K Rathy | Suresh Kumar | NIL | NIL | International Journal of Computer Engineering Science | India | IJCES | Vol. 1, Issue 2, ISSN : 2250:3439, 2011 | NOVEMBER | 2011 | |
126 | Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model | Suresh Kumar, Suman Kumari, R K Rathy | Suresh Kumar | R K Rathy | NIL | NIL | Suman Kumari | International Journal of Computer Science and Information Technologies | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | Vol. 2, No. 4, ISSN : 0975-9646, 2011 | June | 2011 | |
127 | Density Based Protocol for Head Selection In Wireless Sensor Networks | Priti Narwal, S. S. Tyagi | Priti Narwal | S. S. Tyagi | NIL | NIL | NIL | International Journal of Soft Computing and Engineering (IJSCE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | Volume 1, Issue 3, page 42-46, 2011 | JULY | 2011 | |
128 | A Comparative Study of Public Key Cryptosystem based on ECC and RSA | Arun Kumar, S. S. Tyagi | Arun Kumar | S. S. Tyagi | NIL | NIL | NIL | International Journal on Computer Science and Engineering (IJCSE) | India | Engg Journals Publications | Vol 3, Issue 5, page 1904-1909, 2011 |
JULY | 2011 | |
129 | Security Enhancement in Elliptic Key Cryptography Using Character Based Method | Arun Kumar, S. S. Tyagi | Arun Kumar | S. S. Tyagi | NIL | NIL | NIL | International Journal of Soft Computing and Engineering (IJSCE) | India | Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.| | Volume 1, Issue 3, page 37-41, 2011 | JULY | 2011 | |
130 | Downloading and Mapping of Web Forms for Information Retrieval from Hidden Web | Komal Kumar Bhatia, Rosy Madaan, A.K. Sharma | Rosy Madaan | A.K. Sharma, Komal Kumar Bhatia | International Journal of Contemporary Research in Engineering and Technology | India | extromind publications | Vol1 | Jul-Dec 2011 | 2011 | ||||
131 | Crawling the Deep Web | Komal Kumar Bhatia, Rosy Madaan, A.K. Sharma | Rosy Madaan | A.K. Sharma, Komal Kumar Bhatia | International Journal of Contemporary Research in Engineering and Technology | India | extromind publications | Vol1 | Jul-Dec 2011 | 2011 | ||||
132 | Optimizing Filtering Phase for Near-Duplicate Detection of Web Pages using TDW-Matrix | Tanvi Gupta | Tanvi Gupta | NIL | NIL | NIL | NIL | IJRIME | India | IJRIME | Volume1 Issue5 ,Page no 38 2011 |
Dec | 2011 | |
133 | A Comparative Analysis of DCT & LSB Image Steganographic Algorithms. | Smriti Gupta, Ajeet Pratap singh. | Smriti Gupta | Ajeet Pratap Singh | NIL | NIL | NIL | Invertis Journal of Science & Technology. | India | IC Journals | Vol. 9, 2011 | Dec | 2011 | |
134 | Traffic Pattern Based Performance Analysis of Routing Protocols in Adhoc Networks | Suresh Kumar, R K Rathy, D Pandey | Suresh Kumar | R K Rathy | NIL | NIL | D Pandey | Journal of International Academy of Physical Sciences. | India | International Academy of Physical Sciences | Vol. 15, No.1, pp. 123-140, ISSN 0974 – 9373 | AUGUST | 2011 | |
135 | Cross Browser Incompatibility : Reasons and Solution | Ochin, Jugnu Gaur | Ochin | NIL | NIL | NIL | Jugnu Gaur | International Journal of Software Engineering & Applications (IJSEA) | India | AIRCC Publishing Corporation | ISSN : 0975 – 9018 July-Aug Edition, 2011 |
AUGUST | 2011 | |
136 | Robots with Biological Brain | Ochin, Jugnu Gaur | Ochin | NIL | NIL | NIL | Jugnu Gaur | International Journal of Computer Trends and Technology | India | Seventh Sense Research Group (SSRG) | Volume 1 Issue 3, p -199-203 , 2011 |
AUGUST | 2011 | |
137 | An Overview of Efficient Computation of Page Rank | Madhu Bala, Simple Bathla | Simple Bathla | NIL | NIL | NIL | Madhu Bala | International Journal of Computer Science and Information Technologies, IJCSIT 2011 |
India | TECH SCIENCE PUBLICATIONS | Volume 2, Issue 4,2011, Pg No. 1639-1643 |
AUGUST | 2011 | |
138 | Enhancing Security of Agent-oriented Techniques program code using JAR files | Surjeet Dalal | Surjeet Dalal | NIL | NIL | NIL | Vivek Jaglan, Dr S. Srinivasan | International Journal of Computer Science and Engineering | India | Engg Journals Publications | Vol. 3 No. 4, April 2011 pp. 1627-1632 | APRIL | 2011 | |
139 | Improving Performance of Business Intelligence Through Case Based Reasoning | Surjeet Dalal | Surjeet Dalal | NIL | NIL | NIL | Vivek Jaglan, Dr S. Srinivasan | International Journal of Engineering Science and Technology | India | Engg Journals Publications | Vol. 3 No. 4, April 2011, pp 2880-2886 | APRIL | 2011 | |
140 | A New Flavor of Outsourcing in Clouds | Supriya Panda | Supriya Panda | NIL | NIL | NIL | NIL | Dronacharya Research Journal | INDIA | Dronacharya Research Journal | Volume III,Issue II July – Dec., 2011,pp 74-81 | December | 2011 | |
141 | Intelligent Decision Support Systems For Admission Management In Higher Education Institutes | Rajan Vohra, Nripendra Narayan Das | NN Das | NA | NA | NA | Rajan Vohra | International Journal of Artificial Intelligence & Applications | INDIA | IJAIA | volume 2, Number 4, 2011, pp 63-70 | October | 2011 | |
142 | Attack prevention methods for DDOS Attacks in MANETs |
Prabha Rani, Neeraj Sharma | Neeraj Sharma | NIL | NIL | NIL | Prabha Rani | Asian Journal Of Computer Science And Information Technology1:1 (2011) 18 – 21(ISSN:2249-5126) | India | Innovative Journal | Vol 1, No 1, 2011 | August | 2011 | |
143 | Decision making Under uncertainty: dynamic perspective with Temporal reasoning | Supriya Panda | Supriya Panda | NIL | NIL | NIL | NIL | Dronacharya Research Journal | INDIA | Dronacharya Research Journal | Vol.III, Issue 1,Jan-June,2011,pp127-132 | June | 2011 | |
144 | An Improved Framework for Enhancing QoS in MIPv6 |
Shilpy Gupta, Amit Sharma,Mohit Chowdhary | Shilpy Gupta | Amit Sharma | Mohit Chowdhary | NIL | NIL | International Journal on Computer Science and Engineering (IJCSE) | India | Engg Journals Publications | Vol. 3 Page No. 2 | February | 2011 | |
145 | Object tracking in a video sequence using Mean-Shift Based Approach: An Implementation using MATLAB7 | Madhulika ,Madhurima | Dr. Madhulika | NIL | NIL | NIL | Madhurima, | IJCEM International Journal of Computational Engineering & Management | India | KS Technologies | Vol 11(1) pp45-50 | January | 2011 | |
146 | Web Log Mining: An Enhancement to Server Performance and Sight Navigation | Heena Goyal, Nidhi , ShilpaYadav, N.N.Das | NN Das | NA | NA | NA | Heena Goyal, Nidhi , ShilpaYadav, | International Journal of Advances in Computer Networks and its Security | INDIA | IJACNS | Volume1, 2011, pp 173-176 | 2011 | ||
147 | Clustering of High Dimensional Data with Canopies | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | International Journal of Information Sciences and Application | India | International Research Publication House | Vol 2, Issue 2, 2011 |
NOVEMBER | 2010 | |
148 | Development of an Algorithm for reducing errors during The prediction of stream data | Pinki Sagar | Pinki Sagar | NIL | NIL | NIL | NIL | International Journal of Information Sciences and Application | India | International Research Publication House | Vol 1, Issue 1, 2010 |
NOVEMBER | 2010 | |
149 | Simulation Based Comparison of Routing Protocols for Mobile Ad hoc Network | S.S Tyagi , R K Chauhan |
S. S. Tyagi | NIL | NIL | NIL | R K Chauhan | MR International Journal of Engineering and Technology, ISSN 0975-4997 | India | MR Publishers | Vol.2, No.1, June 2010, Pages 61-68 | JUNE | 2010 | |
150 | Framework for Incremental Hidden Web Crawler | Rosy Madaan, A.K. Sharma, Ashutosh Dixit, Komal Kumar Bhatia | Rosy Madaan | A.K. Sharma, Ashutosh Dixit, Komal Kumar Bhatia | International Journal in Computer Science and Engineering (IJCSE) | India | Inderscience publisher | Vol2 Issue 3 | 40299 | 2010 | ||||
151 | TCP/IP Security Protocol Suite for Grid Computing Architecture | Vikas Kamra & Amit Chugh | Amit Chugh | NIL | NIL | NIL | Vikas Kamra | Communications in Computer & information science | India | Springer | CCIS 169, PP 30-35, 2011 | July | 2010 | |
152 | Security in High Performance computing | Urvashi Chugh & Amit Chugh | Urvashi Chugh | Amit Chugh | NIL | NIL | NIL | Communications in Computer & information science | India | Springer | Volume 70,2010 PP 552-556 | July | 2010 | |
153 | A Survey of Secure Routing Protocols for Mobile Ad hoc Network | S S Tyagi , R K Chauhan | S. S. Tyagi | NIL | NIL | NIL | R K Chauhan | International Transactions in Applied Sciences ISSN 0974-7273 | India | Association for the Advancement in Combinatorial Sciences. | Vol 1, No. 3, page 333-340, 2010 |
SEPTEMBER | 2009 | |
154 | Review of two different perspectives using a Rule based Fuzzy Logic Approach | Poonam Tanwar, Mandeep Kaur | Poonam Tanwar | NA | NA | NA | Poonam Tanwar. Mandeep Kaur | Lingaya’s journal of Professional Studies | India | Lingaya’s Publishing House | vol 2,8,2009 | Oct | 2009 | |
155 | Performance Comparison of two reactive routing protocols for Ad-hoc Network | R.K. Rathy, Suresh Kumar | R.K. Rathy | Suresh Kumar | NIL | NIL | NIL | M.R. International journal of Engg. & Technology | India | MR Publishers | Vol. 1, No. 1, pp 15-18, 2009 | JUNE | 2009 | |
156 | Computer and Electronics in Agriculture: Automatic Monitoring System for Field Information | Mr. K.P Singh, Poonam Tanwar | Poonam Tanwar | NA | NA | NA | Mr. K.P Singh, Poonam Tanwar | Lingaya’s journal of Professional Studies | India | Lingaya’s Publishing House | vol 2,1,2009 | Jan | 2009 | |
157 | Advanced Intrusion Detection System for Network Security | S.S Tyagi , R K Chauhan |
S. S. Tyagi | NIL | NIL | NIL | R K Chauhan | International Transactions in Mathematical Sciences and Computer ISSN-0974-5068 | India | Association for the Advancement in Combinatorial Sciences. | Vol 2, No. 2, page 319-331, 2010 |
DECEMBER | 2009 | |
158 | A Simulative Investigation: PSNR/Compression ratio directs the selection of compression technique | Rashima Mahajan, Gurpadam Singh | Rashima Mahajan | Gurpadam Singh | Engineering Today | India | Engineering Today | 11, 213-218, 2009 | August | 2009 | ||||
159 | Implementing a decision support model in primary health care | Rajan Vohra, Nripendra Narayan Das, Gunjan Pahuja | NN Das | NA | NA | NA | Rajan Vohra, Gunjan Pahuja | International Journal of Information Technology and knowledge Management | INDIA | IJITKM | Volume 2. No. 1., 2009, pp. 163-166 | July | 2009 | |
160 | Ethics and problems behind smart AI | Supriya Panda | Supriya Panda | NIL | NIL | NIL | NIL | Dronacharya Research Journal | INDIA | Dronacharya Research Journal | Vol.1, 2009, pp 135- 142. | June | 2009 | |
161 | Transform Coding Based Image Compression Techniques – A Simulative Investigation | Rashima Mahajan, Gurpadam Singh | Rashima Mahajan | NA | NA | NA | NA | CIIT International Journal of Digital Image Processing | India | CIIT, OJS | Vol 1, 10-17, 2009 | March | 2009 | |
162 | Designing a model driven Decision Support system for Primary Health Care | Rajan Vohra, Nripendra Narayan Das, Meghna Sharma | NN Das | NA | NA | NA | Rajan Vohra, Meghna Sharma | International Journal of Information Technology and knowledge Management | INDIA | IJITKM | Volume 1. No. 2., 2008, pp. 463-468, | July | 2008 |