S.No. |
Author |
Title |
Publication Details |
Date
|
1 |
Nikhi Chaturvedi |
Novel Approach for K mean algorithm |
The International Journal of Engineering and Science (THE IJES). Volume 2 Issue 10 version 1 |
Oct 2013 |
2 |
Nikhi Chaturvedi |
An Improvement in K-mean Clustering Algorithm Using Better Time and Accuracy |
The International Journal of Programming Languages and Application (THE IJPLA).Volume 3 Paper number 4 |
Oct 2013 |
3 |
Nikhi Chaturvedi |
An improvemed data mining model for predicting medical issues |
IJRASET , Vol 7 |
Oct 2019 |
4 |
Rahul Patel |
The Intregation Of Hetrogeonus Data Source For Quality Based Dynamic Source Integration System |
IJMRA Volume 2, Issue 7 ISSN: 2249-0558 |
July 2012 |
5 |
Rahul Patel |
Fight Against Phishing: A Data Mining Technique |
IJRSR Volume 10 issue 05, pp. 32494-32497 |
May 2019 |
6 |
Rahul Patel |
Phishing URL Classification Using ARM Based Association Rules |
IJCSE Volume 7, Issue 5 |
May 2019 |
7 |
Rahul Patel |
A Survey On Text Mining Techniques |
IJECS, Volume 3, Issue 5 |
May 2014 |
8 |
Ms. Pooja Jain |
An Comparative study of an Efficient Algorithm for the Exemplar Based Image Inpainting” ISBN: 978-81-921320-1-6 National Conference On Research in Emerging Area 29 Jan 2016 |
ISBN: 978-81-921320-1-6 National Conference On Research in Emerging Area |
29 Jan 2016 |
9 |
Ms. Pooja Jain |
A Comprehensive Survey of the Existing Text Clustering Techniques |
International Journal for Scientific Research & Development| Vol. 3, Issue 03, 2015 | ISSN (online): 2321-0613 |
2015 |
10 |
Ms. Pooja Jain |
Performance Evaluation of Secure tunnel technique using IPv6 Transition over IPv4 Channel |
International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015 |
8 Aug 2015 |
11 |
Ms. Pooja Jain |
Performance Evaluation of Audit Policy Role Boundary Model (APRBM) for Enhanced Data Security |
International Journal of Research in Computer Engineering and Electronics. ISSN 2319-376X VOl : 3 ISSUE : 6 (Nov-Dec’14) |
Dec 2014 |
12 |
Juber Mirza |
A Hybrid Cryptographic Technique for Secured Authentication in Cloud Computing |
IJCA , Volume141
|
May 2016 |
13 |
Juber Mirza |
Live Data Stream Classification for Reducing Query Processing Time |
IJSRD,Volume 5 |
April 2017 |
14 |
Juber Mirza |
Social Media Data Sensitivity & Privacy Scanning an Experimental Analysis with Hadoop
|
IJSRD,Volume 5 |
June 2017 |
15 |
Juber Mirza |
Cloud Based Big Data Analytics for Smart Future Cities |
IJSRD,Volume 5 |
January 2018 |
16 |
Mr. Romil Rawat |
“Research dataset Evaluation for Technologies” |
(IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1-Issue 2, December 2012. |
December 2012. |
17 |
Mr. Romil Rawat |
“SQL injection attack Detection using SVM” |
(IJCA), International Journal of Computer Applications (0975 – 8887), Volume 42– No.13, March 2012 |
March 2012 |
18 |
Mr. Romil Rawat |
“Filtration of Web Attacking Parameters: A Approach For Attack Signature Verification” |
(IJEAT) International Journal of Engineering and Advanced Technology (ISSN: 2249 - 8958) , Volume-1, Issue-5, June, 2012 . |
June, 2012 . |
19 |
Mr. Romil Rawat |
“Comparative Effective study of machine learning Techniques” |
(IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1-Issue 2, December 2012 |
December 2012 |
20 |
Mr. Romil Rawat |
“Safe Guard Anomalies against SQL Injection Attacks” |
(IJCA), International Journal of Computer Applications (0975 – 8887),Volume 22-No.2 –May 2011 |
May 2011 |
21 |
Mr. Romil Rawat |
“C-queued technique against Sql-Injection attack” |
International Journal of Advanced Research in Computer Science (IJARCS), ISSN No. 0976-5697, Volume 2, No. 5, Sept-Oct 2011 |
Sept-Oct 2011 |
22 |
Mr. Romil Rawat |
“Key-generator based secure system against sql-injection attack” |
International Journal of Advanced Research in Computer Science (IJARCS), ISSN No. 0976-5697, Volume 2, No. 5, Sept-Oct 2011 |
Sept-Oct 2011 |
23 |
Mr. Romil Rawat |
“FOTIS MODEL: Modeling of Reverse Attack” |
(IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1- Issue 1, November 2012 |
November 2012 |
24 |
Mr. Romil Rawat |
“Web Security Designing Algorithm: A Protective shield” |
(IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1-Issue 2, December 2012. |
December 2012. |
25 |
Mr. Romil Rawat |
“1 to 1 mapping list for SQL –Injection Attack Detection” |
(IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1-Issue 3, January 2013. |
January 2013. |
26 |
Mr. Romil Rawat |
“URLAD (URL attack detection) - using SVM” |
(IJARCSSE) International Journal of Advanced Research in Computer Science and Software Engineering ( ISSN: 2277 128X) , Volume 2, Issue 1, January 2012 |
January 2012 |
27 |
Mr. Romil Rawat |
GEOMETRICAL AND RANDOMIZED-ALGORITHMS OPTIMIZATION FOR CRYPTOGRAPHIC APPLICATIONS |
XVII International Conference on "ALGEBRA, THE THEORY OF NUMBERS AND DISCRETE GEOMETRY: MODERN PROBLEMS, APPLICATIONS, AND PROBLEMS OF HISTORY Tula, September 23-28, 2019, Russia |
September 23-28, 2019, |
28 |
Mr. Romil Rawat |
Study of Phylogenetic for computational analysis of Sleep Apnea syndrome for Patient (Healthcare & Treatment). |
Northwestern University, Evanston, Illinois, USA , OCT 2019 |
Oct- 2019 |
29 |
Mr. Romil Rawat |
University of Padua, Padua, Italy. |
Social Networks Security, Privacy, and Trust ( Presented Research work in colloquium). |
SEPT 2015 |
30 |
Durga Patel |
An Enhanced Approach for Number Plate Detection and Recognition |
Bentham Science Publishers , 2213-2759/20 $58.00+.00 |
01 June 2020 |
31 |
Durga Patel |
Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environment |
Data, Engineering and Applications pp 59-74, Print ISBN 978-981-13-6350-4, Online ISBN 978-981-13-6351-1,Publisher Name Springer, Singapore,DOI https://doi.org/10.1007/978-981-13-6351-1_6 |
24 April 2019 |
32 |
Durga Patel |
A Hash-Based Approach for Document Retrieval by Utilizing Term Features |
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 711),Computational Intelligence in Data Mining pp 617-627,Print ISBN 978-981-10-8054-8,Online ISBN 978-981-10-8055-5,Publisher Name Springer, Singapore,DOI https://doi.org/10.1007/978-981-10-8055-5_55 |
04 July 2018 |
33 |
Durga Patel |
Chapter on Improving E-Commerce Web Applications Through Business Intelligence Techniques |
IGI Global Book Publication, Copyright: © 2018 |Pages: 20 ,DOI: 10.4018/978-1-5225-3646-8.ch005, |
2018 |
34 |
Durga Patel |
Efficient Data Administration |
· "International Journal of Computer Applications ",ISBN:9739380895114, DOI:10.5120/ijca2016912344, |
Dec-2016 |
35 |
Durga Patel |
Load Distribute Across the Cloud Server: Challenges and Algorithms ", Published in "International Journal of Computer Applications |
"International Journal of Computer Applications", ISBN: 973-93-80895-03-6, DOI: 10.5120/ijca2016912333 |
2016 |
36 |
Durga Patel |
Software Reliability: Metrics |
"International Journal of Computer Applications",ISBN- 973-93-80895155,DOI:10.5120/ijca2016912433 |
2016 |
37 |
Durga Patel |
Software Reliability:Models |
"International Journal of Computer Applications", ISBN: 973-9380894709,DOI:10.5120/ijca2016911837 |
Oct 2016 |
38 |
Durga Patel |
Applications of Web Data Mining |
International Journal of Science, Technology & Management (ISSN-2394-1537),Volume5-Issue 2, feb 2016 |
Feb 2016 |
39 |
Shweta Jain |
A Systematic Literature Review of Frequent Pattern Mining Tecniques |
Sanmantrana 2018 |
Feb 2018 |
40 |
Shweta Jain |
Security Based on Biometric Technology in MANET-A Comparative Study & Application |
International Journal of Advanced Research in Computer Science and Software Engineering, ISBN: 2277 128X,Volume 6, Issue 11 |
Nov 2016 |
41 |
Shweta Jain |
Classification of Brain Cancer Using Feature Extraction in Artificial Neural Network |
International Journal of Engineering and Managerial Innovations (IJEMI), ISBN:2321-693X, Volume 1(2) |
Sep 2013 |
42 |
Shweta Jain |
ANN Approach Based On Back Propagation Network and Probabilistic Neural Network to Classify Brain Cancer |
International Journal of Innovative Technology and Exploring Engineering, ISBN: 2278-3075, Volume-3, Issue-3 |
Aug 2013 |
43 |
Shweta Jain |
Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network |
International Journal of Computer Science & Engineering Technology (IJCSET), ISBN: 2229-3345, Vol. 4, No. 07 |
July 2013 |
44 |
Shweta Jain |
Review of Biological Neuron and Artificial Neural Network” published in National Journal of Engineering Science and Management |
National Journal of Engineering Science and Management, ISBN:2249-0264, Vol-2, Issue-2 |
Dec 2012 |
45 |
Sachin Chirgaiya |
Blockchain Technology: A Comprehensive Survey |
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 09-Special Issue DOI: 10.5373/JARDCS/V11/20192690 ISSN 1943-023X |
Aug 2019 |
46 |
Sachin Chirgaiya |
Performance Evaluation of NPA-VM Using Attack Graph Hierarchical Visualization Approach |
International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 6, Digital Library (http://www.ijettjournal.org/archive/ijett-v15p254, pp.) 282-287, ISSN:2231- 5381. |
Sep 2014 |
47 |
Sachin Chirgaiya |
Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach |
International Journal of Computer Application (IJCA) – Volume 99 Number 11, Digital Library,http://www.ijcaonline.org/archives/ volume99/number11/17421-8218, pp. 45- 50. |
Aug 2014 |
48 |
|
Multi -Threaded Web crawler based on Multi keyword web crawling using ontology |
International Conference on Advances & Development in Engineering & Technology, ICADET-2013 . http://www.irdindia.in/ICADET_Indore_Nov/Home.html) |
February 2013 |
49 |
Sachin Chirgaiya |
Shape Recognition & Matching using Chain Code |
International Conference on Advances & Development in Engineering & Technology (ICADET 2013) (http://www.irdindia.in/ICADET_Indore_Nov/Home.html) |
February 2013 |
50 |
Sachin Chirgaiya |
Ontology Based Multi Keyword Web Crawler for Semantic Web Analysis |
International Conference on Electronics Computer Technology (ICECT 2012) (http://www.icect.org/) |
April 2012 |
51 |
Sachin Chirgaiya |
Multi Keyword Crawling for Semantic Web Analysis using Ontology |
International Journal of Engineering Research and Applications (IJERA) (http://ijera.com) |
January 2012 |
52 |
Nitin Rathore |
Securing Ad-Hoc network using Trust Computing |
National Conference on “Recent Advances in Mechtronics, Computing Technology & Management" |
May-2013 |
53 |
Nitin Rathore |
Analysis of Image Segmentation through Edge Detectors |
International Journal of Mathematical Archive-4(9) 1-8 Available online through www.ijma.info ISSN 2229 – 5046. |
September-2013 |
54 |
Nitin Rathore |
Review on Basic Clustering Techniques for Heterogeneous Wireless Sensor Networks |
International Journal of Scientific and Research Publications, Volume 4, Issue 8, ISSN 2250 -3153 |
August-2014 |
55 |
Nitin Rathore |
Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET |
”, International Journal of Computer Applications (0975 –8887) Volume 117 –No.15 |
May 2015 |
56 |
Nitin Rathore |
An Implementation of Modified AODV Protocol in MANET for Mitigation of Blackhole Attack with Varying Node Densities |
International Advanced Research Journal in Science, Engineering and Technology Vol. 2, Issue 12 |
December 2015. |
57 |
Nitin Rathore |
Efficient Heterogeneous Wireless Sensor Network Using Improved Energy Optimization Approach |
International Journal of Science, Engineering and Technology Research (IJSETR) Volume 5, Issue 12, ISSN: 2278 – 7798. |
December 2016 |
58 |
Nitin Rathore |
Requirements for Cloud Based System Architecture from Service Provider View to User View |
Shodh’2017 Doctoral Conference Held at SVVV Indore |
4th March 2017. |
59 |
Nitin Rathore |
Wormhole Attack In MANET: A Study |
International Journal Of Recent Technology Science & Management(IJRTSM), ISSN: 2455-9679. |
Feb 2018 |
60 |
Nitin Rathore |
Security In Data Storage On Cloud Environment Using Blowfish And Digital Signature |
International Journal of Research In Science & Engineering e-ISSN: 2394-8299, p-ISSN: 2394-8280, Volume: 4 Issue: 4 |
August 2018 |
61 |
Nitin Rathore |
Smart Parking Based on IoT |
International Journal Of Recent Technology Science& Management, ISSN: 2455-9679, 3(11) |
Nov 2018 |
62 |
Nitin Rathore |
Implementation of Single Sign-On Authentication for Multiple Clouds |
International Journal Of Research In Electronics And Computer Engineering: VOL. 6 Issue 4 ISSN: 2393-9028 (Print) | ISSN: 2348-2281 (Online) |
December 2018 |
63 |
Nitin Rathore |
Investigations of Microservices Architecture in Edge Computing Environment |
Lecture notes in Networks and Systems, vol. 100. Springer |
Feb2020 |
64 |
Himanshu panadiwal |
PPARM: Privacy Preserving Association Rule Mining Technique for Vertical Partitioning Database |
Journal :SPRINGER AISC, Volume :939 Issue: IBICA 2018 doi :1007/978-3-030-16681-6_27
|
Jan 2019 |
65 |
Himanshu panadiwal |
an implementation of multi-factor authentication scheme for secured cloud data storage framework |
Journal:international journal for science and advance research in technology Volume 2,Issue 7 in July 2016 PAPER ID : IJSARTV2I74611 |
July 2016 |
66 |
Akanksha Pal |
Novel Mechanism for Authentication by using User-Generated Cryptograph |
International Journal of Innovative Research in Computer and Communication Engineering, Volume 4 Issue 12, ISSN - 2320-9801 |
Dec 2016 |
67 |
Akanksha Pal |
A Survey on Various Security Techniques used for Authentication |
International Journal of Innovative Research in Science Engineering and Technology, Volume 5 Issue 11, ISSN - 2319-8753 |
Nov. 2016 |
68 |
Akanksha Pal |
Current Trends in Computing (Book Chapter) |
A Multi-disciplinary International Congress on Innovations in Science, Technology and Management –Challenges and Opportunities, SANMANTRANA |
Feb. 2018 |
69 |
Akanksha Pal |
A Survey on Friend Recommendation Techniques Based on their Interest used for Knowledge Management |
SHODH-2018 2nd Doctoral Conference on “Interdisciplinary Research for Sustainable Development: Opportunities & Challenges” |
March 2018 |
70 |
Akanksha Pal |
Friend Recommendation System by Using Context - Awareness |
International Journal of Advanced Science and Technology Volume 29, ISSN - 2207-6360 |
June 2020 |
71 |
Ankit Jain |
QBTC Model: A model for classification of Queries |
International Journal of Computer Application(0975- 8887), Volume 68 -No. 5,April 2013. |
April 2013 |
72 |
Ankit Jain |
Analysis of Query Based text classification Approach |
International Journal Of Advanced Research in Computer Science and Software Engineering,Volume 2, Issue 8,August 2012 ,ISSN:2277 128X. |
Augest 2012 |
73 |
Shubham Kothari |
PPARM: Privacy Preserving Association Rule Mining Technique for Vertical Partitioning Database |
Innovations in Bio-Inspired Computing and Applications. IBICA 2018.Advances in Intelligent Systems and Computing, vol 939. Springer, Cham, pp 269-278 doi:10.1007/978-3-030-16681-6_27 |
May 2019 |
74 |
Shubham Kothari |
Minimizing the Size of Test Suite using Genetic Algorithm for Object Oriented Program |
International Conference on ICT in Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-5.doi: 10.1109/ICTBIG.2016.7892703 |
April 2017 |
75 |
Shubham Kothari |
Plug N Play Operating System |
International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, April 2013 pp.- 2254-2256 |
April 2013 |
76 |
Sourabh Sharma |
A New Correlation Based Image Fusion Algorithm Using Discrete Wavelet Transform |
International Journal of Engineering Science & Advanced Research, 2015 Dec;1(4):1-6, ISSN No. 2395-0730 |
2015 Dec |
77 |
Sourabh Sharma |
An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization |
Applied Soft Computing, Elsevier 84, 105696 |
November 2019 |
78 |
Mrs. Khushboo Karodiya |
Study of various Video Event Classification Techniques |
International journal of Technology Research and Management |
9 September 2015 |
79 |
Khushboo Karodiya |
Study & Analysis and Issue & Challenges in context of Human Resources Management in SEPM using Apriori algorithm |
International Journal of Innovations in Engineering & Technology IJEBEA |
June-August, 2013. |
80 |
Khushboo Karodiya |
Knowledge Discovery on www” |
Paripex Indian Journal of Research GYAN SANDHAN in PIES Indore |
Mar 2013 |
81 |
Khushboo Karodiya |
An Al & Agile based software development with Scrum methodology |
International journal International association of scientific innovation & Research IJEBA |
Dec 2012 |
82 |
khushboo Karodia |
Result Evaluation of Field Authentication based SQL Injection and XSS Attack Exposure |
EEE, International Conference on Information, Communication, Instrumentation and Control (ICICIC – 2017). In Medicaps- University,Indore |
18th Aug 2017 |
83 |
Manish Sharma |
A Survey on Information Retrieval Models, Techniques and Applications |
International Journal of Emerging Technology and Advanced Engineering |
Nov 2013 |
84 |
Manish Sharma |
An Improving the Effectiveness of Text to Matrix Generator by Using Genetic Algorithm |
International Journal of Computer Engineering and Technologies |
Jan 2014 |
85 |
Manish Sharma |
Applying Genetic Algorithm in Text to Matrix Generator |
International Journal of Computer Science and Information Technologies |
Feb 2014 |
86 |
Manish Sharma |
Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network |
International Journal of Science and Research (IJSR) |
March 2016 |
87 |
Manish Sharma |
Energy Effectual Trust Based Technique for Prevention of Vampire Attack |
International Journal of Scientific Development and Research (IJSDR) |
June 2016 |
88 |
Manish Sharma |
Solar Energy Prediction using LM-Back-propagation in ANN |
IOSR Journal of Computer Engineering (IOSR-JCE) |
Feb 2019 |
89 |
Sanat Jain |
Mining & Optimization of Association Rules Using Effective Algorithm |
International Journal of Emerging Technology and Advanced Engineering (IJETAE). ISSN 2250–2459 Vol. 2 Issue 4 |
April 2012 |
90 |
Sanat Jain |
Optimization of Positive and Negative Association Rules using effective algorithm |
International Conference on Computers and Communication (ICCC-2012). ISBN 978-9381583-21-0 Vol.1 Issue 1 |
January 2012. |
91 |
Sanat Jain |
Optimization of Positive and Negative Association Rules using Modified Genetic algorithm |
National Conference on Advances in Communications & Computing (NCACC-2013). Vol. 1 Issue 1 |
January 2013 |
92 |
Rajesh Kumar Chakrwarti |
Hindi-To-English Machine Translation System for Primary Education |
Doctoral Conference (DocCon-2016), Janardan Rai Nagar Rajasthan Vidyapeeth University, In collaboration with CSI and ACM Udaipur Chapter, Udaipur, Rajasthan |
March 2016 |
93 |
Rajesh Kumar Chakrwarti |
Approaches for Improving Hindi to English Machine Translation System |
Indian Journal of Science and Technology, vol. 10 no. 16, ISSN 0974-6846. DOI: 10.17485/ijst/2017/v10i16/111895 |
April 2017 |
94 |
Rajesh Kumar Chakrwarti |
A new approach for Hindi to English idiom translation |
3rd International Young Scientist Congress (IYSC-2017), Ganpat University, Mehsana Gujrat |
08-09 May 2017 |
95 |
Rajesh Kumar Chakrwarti |
Review of Machine Translation Techniques for Idea of Hindi to English Idiom Translation |
International Journal of Computational Intelligence Research, vol.13, no. 5, ISSN 0973-1873. |
May 2017 |
96 |
Rajesh Kumar Chakrwarti |
Implementation of Hindi to English Idiom Translation System |
International Conference on Advanced Computing Networking and Informatics. “Advances in Intelligent Systems and Computing”, vol. 870, Springer, Singapore, November 2018, ISSN 2194-5357. https://doi.org/10.1007/978-981-13-2673-8_39 |
November 2018 |
97 |
Rajesh Kumar Chakrwarti |
Couplets Translation from English to Hindi Language |
International Conference on Social Networking and Computational Intelligence. “Lecture Notes in Networks and Systems” vol. 100, Springer, Singapore, ISSN 2367-3370. https://doi.org/10.1007/978-981-15-2071-6 |
April 2020 |
98 |
Rajesh Kumar Chakrwarti |
Approach for English to Hindi Couplets Translation |
Annual Convention Computer Society of India (CSI 2020) in conjunction with an International Conference with the theme “Digital Democracy - IT for Change”. “Communications in Computer and Information Science” Springer, Singapore, ISSN 1865-0929. |
|
100 |
Rupali Dave |
Detection of Route Discovery Flooding Attack through Maintaining History Table in MANET |
IJCAT - International Journal of Computing and Technology, Volume 2, Issue 10, |
Oct-15 |
102 |
Rupali Dave |
Security Based on Biometric Technology in MANET-A Comparative Study & Applications |
International Journal of Advanced Research in Computer Science and Software Engineering,2277 128X, |
Nov-16 |
103 |
Rupali Dave |
Performance Based Association Rule-Mining Technique Using Genetic Algorithm |
INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) Volume-19, Number - 01 |
Nov-16 |
104 |
Rupali Dave |
Study of different data mining tools |
IJARCSSE,2277-128X,vol 7,issue 6 |
Jun-16 |
105 |
Rupali Dave |
A Survey on Various Encryption Cryptographic Techniques |
IJCAT - International Journal of Computing and Technology, Volume 3, Issue 2, February 2016 ISSN : 2348 - 6090 |
Feb-16 |
99 |
Rupali Dave |
Website Optimization on Search Engines to Achieve High Page Ranking and Traffic |
INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) ISSN: 2349-4689 Issue 112, Volume 40, Number 01, 2017 |
Nov-17 |
101 |
Rupali Dave |
Survey on Manual and Automation Testing Strategies and Tools for Software Application |
IJARCSSE, ISSN: 2277 128X,Volume 7,issue 4 |
Apr-17 |
106 |
Rupali Dave |
Sentiment Analysis of Data using naïve Bayes classifier with n-gram approach in Hadoop |
International Journal of Advanced Research in Science, Engineering and Technology Vol. 5, Issue 4 , April 2018 |
Apr-18 |
107 |
Pallavi Kala |
Accountability for Electronic Health System |
International Conference on Advanced Computing , Networking and Informatics (ICANI-2018), |
Feb-18 |
108 |
Pallavi Kala |
Hybrid Access Control and Cryptography Model for Preserving Privacy of Electronic Medical Record |
International Journal of Advanced Research in Science, Engineering and Technology,volume 5, |
May 2020 |
109 |
Paridhi Nigam |
A survey on existing web log mining algorithm |
International Journal of Advanced Research inComputer Science and Software Engineering, Volume 5, Issue 9 |
September 2015 |
110 |
Paridhi Nigam |
A comparative analysis of web usage mining technique |
International Journal of Computer Applications (0975 –8887)Volume 152 –No.5, |
October 2016 |
111 |
Paridhi Nigam |
An enhanced approach for web log mining |
International Journal of Technology Research and ManagementISSN (Online): 2348-9006Vol 3Issue 12 |
Dec 2016 |
112 |
Avdesh Kumar Sharma |
Energy Efficient Protocol for Layered Supervision of Communication Model in Wireless Sensor Networks |
IJMIE |
October 2012 |
113 |
Avdesh Kumar Sharma |
Energy Optimization HMLC Scheme for Wireless Communication in Sensor Networks
|
IJECSE |
Nov 2013 |
114 |
Avdesh Kumar Sharma |
A Security Auditing Scheme for Cloud Access Control |
IJSRD |
06-2016 |
115 |
SHYAM SUNDAR MEENA |
Fuzzy Logic based Stock Value Prediction using Fundamental Analysis |
Oriental Journal of Computer Science and Technology Vol.10, no.1, pp. 120-126 |
Mar 2017 |
116 |
SHYAM SUNDAR MEENA |
News Recommendation Approach Based on Conten |
International Journal of Research In Science & Engineering, Vol.3, no.1, pp. 150-155 |
2017 |
117 |
SHYAM SUNDAR MEENA |
Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud |
International Journal of Computer Applications, Vol.155 ,no.03, pp 6-10 |
2016 |
118 |
SHYAM SUNDAR MEENA |
News Recommendation Systems: A Comparative Study |
International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, no. 6, pp. 526-529 |
June 2016 |
119 |
SHYAM SUNDAR MEENA |
Cloud Storage Security using Improved Blowfish Algorithm in open shift cloud |
Proceedings of the National Conference on New Trends and Challenges in Computer Engineering and Technology– NTCCET 2016 |
April, 2016 |
120 |
SHYAM SUNDAR MEENA |
Prediction of Stock Values Based on Fuzzy Logic using Fundamental Analysis |
International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3, no. 10, pp. 5806 - 5810 |
Oct 2015 |
121 |
SHYAM SUNDAR MEENA |
Data Mining Techniques for Stock Market Forecasting: A Survey |
Proceedings of the National Conference on Advances in Computer Science & Technology (ACST- 2015) |
Nov. 2015 |
122 |
SHYAM SUNDAR MEENA |
Efficient Discovery of Frequent Patterns using KFP-Tree from Web-Logs |
International Journal of Computer Applications(IJCA), Vo.l 49, No. 10, pp. 15-18, |
July, 2012 |
123 |
Jayendra Barua, and Rajdeep Niyogi |
Improving Named Entity Recognition and Disambiguation in News Headlines |
International Journal of Intelligent Information and Database Systems (IJIIDS), Vol 12(4), 2019, pp 279-303 |
2020-Jan |
124 |
Jayendra Barua and Dhaval Patel |
Named Entity Classification using Search Engine's Query Suggestions. |
In Proceedings of 39th European Conference on Information Retrieval (ECIR 2017) |
2017-Apr |
125 |
Nivedita Sinha, Jayendra Barua, Dhaval Patel and Rajdeep Niyogi |
Time-aware Relation Mining using News Headlines. |
In proceedings of 6th International Conference on Advances in Computing, Communications and Informatics |
2017-Dec |
126 |
Jayendra Barua and Dhaval Patel |
Discovery, Enrichment, and Disambiguation of Acronyms. |
In Proceedings of 18th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2016). |
2016-Apr |
127 |
Jayendra Barua, Dhaval Patel, and Vikram Goyal |
TiDE: Template-Independent Discourse Data Extraction. |
In Proceedings of 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2015) |
2015-Apr |
128 |
Mohit Thakur, Dhaval Patel, Shrikant Kumar, Jayendra Barua |
NewsInstaMiner: Enriching News Article using Instagram |
In Proceedings of 3rd International Conference on Big Data Analytics (BDA 2014) |
2014-May |
129 |
Jayendra Barua, Dhaval Patel, and Ankur Agarwal |
Removing Noise Content from Online News Articles. |
In Proceedings of 20th International Conference on Management of Data (COMAD 2014) |
2014-Apr |
130 |
Jayendra Barua and Sachin Chirgaiya |
Shape Recognition & Matching using Chain Code |
International Journal on Advanced Computer Theory and Engineering (IJACTE) |
2013-Feb |
131 |
Sachin Chirgaiya and Jayendra Barua |
Multi -Threaded Web Crawler based on Multi keyword Web Crawling using Ontology |
International Journal on Advanced Computer Theory and Engineering (IJACTE) |
2013-Feb |
132 |
ALPESH SONI |
AODV Protocol Improvement with Path Accumulation Feature in Mobile Adhoc Network |
International Journal of Technology Research and Management |
2017-Nov |
133 |
ALPESH SONI |
A Survey of Various Techniques to Secure cloud storage |
National Conference on Security Issues in Network Technologies (NCSI-2012) |
July-2012 |
134 |
ALPESH SONI |
The effect of selfish and malicious node on dsr routing protocol in manet |
2nd International Conference on IT & Business Intelligence (ITBI-10), |
May-2010 |
135 |
AMRATA GUPTA |
A survey: Iris recognition with different techniques |
International journal of software & hardware research in engg,volume 3 issue 1/IJSHRE-3103 |
Jan - 2015 |
136 |
AMRATA GUPTA |
An efficient iris recognition using DCT transforn based on feed forward neural network |
International journal of software & hardware research in engg,volume 3 issue 4/IJSHRE-3404 |
Apr - 2015 |
137 |
Pooja Deshpande |
Efficient Resource Allocation and Scheduling Approach to Enhance the Performance Of Cloud Computing |
International Journal of Software & Hardware Research in engg,Volumne 2 |
June2014 |
138 |
Pooja Deshpande |
A Layered Architecture for Fog Computing for an Effective Real Time Data Processing |
International Journal of Computer Applications (0975 – 8887) Volume 180 – No.36, |
April 2018 |
139 |
Himani Thakur |
Review of Various Two Phase Authentication Mechanism on Ease of Use & Security Enhancement Parameters |
International Conference on Social Networking and Computational Intelligence SPRINGER (scopus) Book: Social Networking and Computational Intelligence pp 671-677 |
Feb. 2020 |
141 |
|
NIL |
NIL |
NIL |
140 |
Himani Thakur |
“Hybrid and Adaptive Authentication Mechanism using Images |
International Journal of Recent Scientific Research, Vol. 10, Issue, 05(A), pp. 30693-30696 |
May, 2019 |
142 |
Sunil Parihar |
“A Novel Framework for Video Search” |
International Journal of Computer Science and Technology, vol. 3, issue 4, pp. 494-496, ISSN: 0976-8491. |
Oct - Dec 2012 |
143 |
Sunil Parihar |
“A Generic Framework for Video Search using Feature Extraction and Annotation”
|
International Journal of Advance Research in Computer Science and Software Engineering, vol. 3, issue 6, pp.1521-1526,ISSN: 2277 128X. |
June-2013 |
144 |
Dibakar Sinha |
Predicting Heart Disease Stage by tuning convergence |
2nd International Conference on Advances in Signal Processing and Artificial Intelligence (ASPAI' 2020), Berlin, Germany, |
June 2020 |
145 |
Vijay Prakash |
A Combinatorial Approach for High Utility Item Set Mining using FRUP and Direct Discovery Approach without Candidate Generation” |
International Journal of Science and Research (IJSR)”,ISSN:2319-7064, Online, Volume 8, Issue 5 |
May 19. |
146 |
Vijay Prakash |
A Comparative Analysis of Various Algorithms for High Utility Itemset Mining” |
International Journal of Science and Research (IJSR)” ISSN:2319-7064, Online, Volume 8, Issue 1 |
Jan 19. |
147 |
Vijay Prakash |
Security parameter of Unified Data protection Model (UDPM) in Cloud Computing” |
International Journal of Application or Innovation in Engineering & Management (IJAIEM)” ISSN 2319 – 4847, Volume 6, Issue 7 in July 2017. |
July 2017. |
148 |
Vijay Prakash |
An efficient management security scheme for distributed network using hierarchical approach with elliptical curve cryptography” |
International Journal of Advance research (IJAR)” ISSN 2320-5407, Vol-4, Issue-5 |
May, 2016 |
149 |
Vijay Prakash |
A Buffer management scheme to control packet loss in MANET” |
IEEE symposium CDAN-16 |
March 16. |
150 |
Vijay Prakash |
Comparison between old & advanced scheme of Buffer Management in Packet queuing for controlling congestion In MANET” |
International Journal of Scientific Research & Development (IJSRD), Vol-3 having ISSN 2321-0613 |
Dec-15. |
151 |
Vijay Prakash |
Web based interface implementation for Ruby, Perl, Python, VB & HTML |
International Research Journal of Engineering & Technology(IRJET), Vol-2 having ISSN 2395-0056 |
October, 2020 |
152 |
Vijay Prakash |
A Novel framework for Composite Network Security Situation Assessment Using HRCAL Approach |
International journal of IJESRT having ISSN 2277-9655 |
May-15. |
153 |
Vijay Prakash |
Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach |
International Journal of Research in Computer Engineering & Electronics ( IJRCEE) ISSN 2319-376X, Vol-3 |
Dec-14. |
154 |
Vijay Prakash |
Implement Security Using Smart Card on Cloud” |
International Journal of Innovations and Advancement of Computer Science ISSN (2347 – 8616, 2347 – 8527, 2348-117X ) |
May-2020 |
155 |
Vijay Prakash |
Fault Tolerance Approach by Using HMM with BAUM-WELCH Algorithm In MCC” |
IEEE Explorer International Conference of WOCN |
July 2013. |
152 |
Vijay Prakash |
Efficient Public Verifiability and Data Dynamics for Storage Security in Hybrid Clouds” |
IEEE International Conference on Computer & Communication Technology (ICCCT-13, paper id. 118,) |
September -2013 |
153 |
Vijay Prakash |
Design and Implementation of a new Location Management Scheme in Mobile Ad Hoc Network” |
ELSEVIER Journal held at Academy of Tech., Aedonagar, Hooghly, West Bengal. |
2013 |
154 |
Vijay Prakash |
An Efficient info-gain Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint |
International Conference on CUBE 2012 by IT-Engineering-Management-Telecom |
Sept 2012. |
155 |
Vijay Prakash |
A New Design Architecture for Location Management using Quadrant Routing Scheme in Mobile Ad Hoc Network” |
International Conference on Computer & Communication Sponsored by IEEE MP Subsection, Institution of Engineers & Computer Society of India held at SISTECH Bhopal M.P & ISBN No. 978-93-81583-21-0. |
2011 |
156 |
Garima Joshi |
A Layered Architecture for Fog Computing for an Effective Real Time Data Processing |
International Journal of Computer Applications (0975 – 8887) Volume 180 – No.36, |
April 2018 |
157 |
Garima Joshi |
A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor |
IJCA June 2014 Edition ISBN : 973-93-80882-54-0 |
June 18, 2014 |
158 |
Garima Joshi |
An Analysis-Prediction architecture for Active living |
Advances in Computer Science & Technology |
February,2014 |
159 |
Garima Joshi |
Big data for mobile computing research |
Computer Applications in Engineering: Emerging Trends and Technologies" organized by The Institution of Engineers (India)In Association |
November 2013 |
160 |
Garima Joshi |
Green Computing, Emerging trends in IT |
Green IT for E Pragti |
April,2011 |
161 |
Lovenish sharma |
Automatic Number plate recognition using Machine |
International Journal of Creative Research Thoughts (IJCRT |
April 2018 |
|
|
learning approach |
|
|
162 |
Lovenish sharma |
Methodology of Adaptive Collaborative Systems |
Emerging Trends In Computer Simulation-2011 |
Nov 2011 |
163 |
Lovenish sharma |
Distributed Context Switching In Complex Adaptive Systems |
Mapping For Excellence: Challenge Ahead-2011 |
Feb 2011 |
164 |
Lovenish sharma |
Complex Adaptive System: Principles vs. Rules |
Emerging Trends In Information Technology &Management (NET-ITM-2011) |
March 2011 |
165 |
Lovenish sharma |
Methodology Of Dynamic Slicing In Object Oriented Program For Debugging |
Recent Trends In The Field Of Science And Technology (RTFST-2011) |
April 2011 |
166 |
Lovenish sharma |
Context Switching In Complex Adaptive System |
Recent Trends In The Field Of Science And Technology (RTFST-2011) |
April 2011 |
167 |
Dinesh Patel |
A GPU based implementation of Robust Face Detection System |
In Procedia Computer Science, Volume 87- Fourth International Conference on Recent Trends in Computer Science & Engineering (ICRTCSE 2016) pp 156-163 |
April, 2016 |
168 |
Archana Choubey |
“Blackhole Detection & Prevention through Neighbors Node Watching IDs in Manet” |
International Conference on Computer Science, Industrial Electronics(ICCSIE) held at Pune, India Paper-ID: IE-CSIE-PUNE-06058-3810 |
06 May, 2018 |
169 |
Archana Choubey |
Selfish Node Attack and Protection in MANET:A Survey |
“challenges of globlization and strategies for competitiveness”, SVIM-Indore |
17 Jan, 2015 |
170 |
Archana Choubey |
Queue Length Based Load Balancing Technique using with AOMDV Protocol in MANET |
IJSER,ISSN 2229-5518,Volume-4 |
01 Oct, 2013 |
171 |
Archana Choubey |
A survey on Load Balancing for Mobile Ad Hoc Networks |
NCRAFT-2013 |
17 Oct 2013 |
172 |
Sonam Mehta |
“Optimization of C5.0 classifier using Bayesian theory” |
IEEE International Conference on Computer Communication and Control(IC4-2015). |
Aug 2015 |
173 |
Sonam Mehta |
“Enhancement of C5.0 classifier by using Bayesian probability theory” |
International Journal of Research in Computer Engineering and Electronics. |
Dec 2014 |