Department of Computer Science & Engineering

RESEARCH PUBLICATION RECORD


S.No. Author Title Publication Details

Date

1 Nikhi Chaturvedi  Novel Approach for K mean algorithm  The International Journal of Engineering and Science (THE IJES). Volume 2 Issue 10 version 1  Oct 2013
2 Nikhi Chaturvedi  An Improvement in K-mean Clustering Algorithm Using Better Time and Accuracy The International Journal of Programming Languages and Application (THE IJPLA).Volume 3 Paper number 4 Oct 2013
3 Nikhi Chaturvedi  An improvemed data mining model for predicting medical issues  IJRASET , Vol 7  Oct 2019
4 Rahul Patel The Intregation Of Hetrogeonus Data Source
For Quality Based Dynamic Source Integration System
IJMRA Volume 2, Issue 7 ISSN: 2249-0558 July 2012
5 Rahul Patel Fight Against Phishing: A Data Mining Technique IJRSR Volume 10 issue 05, pp. 32494-32497 May 2019
6 Rahul Patel Phishing URL Classification Using ARM Based Association Rules  IJCSE Volume 7, Issue 5 May 2019
7 Rahul Patel A Survey On Text Mining Techniques IJECS, Volume 3, Issue 5 May 2014
8 Ms. Pooja Jain  An Comparative study of an  Efficient Algorithm for the Exemplar Based Image Inpainting” ISBN: 978-81-921320-1-6 National Conference On Research in Emerging Area   29 Jan 2016  ISBN: 978-81-921320-1-6 National Conference On Research in Emerging Area   29 Jan 2016
9 Ms. Pooja Jain A Comprehensive Survey of the Existing Text Clustering Techniques International Journal for Scientific Research & Development| Vol. 3, Issue 03, 2015 | ISSN (online): 2321-0613  2015
10 Ms. Pooja Jain Performance Evaluation of Secure tunnel technique using IPv6 Transition over IPv4 Channel International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015 8 Aug 2015
11 Ms. Pooja Jain Performance Evaluation of Audit Policy Role Boundary Model (APRBM) for Enhanced Data Security  International Journal of Research in Computer Engineering and Electronics. ISSN 2319-376X VOl : 3 ISSUE : 6 (Nov-Dec’14)  Dec 2014
12  Juber Mirza  A Hybrid Cryptographic Technique for Secured Authentication in Cloud Computing IJCA , Volume141

May 2016
13  Juber Mirza  Live Data Stream Classification for Reducing Query Processing Time  IJSRD,Volume 5 April 2017
14  Juber Mirza  Social Media Data Sensitivity & Privacy Scanning an Experimental   Analysis with Hadoop
IJSRD,Volume 5 June 2017
15  Juber Mirza  Cloud Based Big Data Analytics for Smart Future Cities IJSRD,Volume 5 January 2018
16 Mr. Romil Rawat “Research dataset Evaluation for Technologies”  (IJCAM) International Journal of Computer Architecture
and Mobility, (ISSN 2319-9229) Volume 1-Issue 2, December 2012. 
December 2012. 
17 Mr. Romil Rawat “SQL injection attack Detection using SVM” (IJCA), International Journal of Computer Applications (0975 –
8887), Volume 42– No.13, March 2012
March 2012
18 Mr. Romil Rawat “Filtration of Web Attacking Parameters: A Approach For Attack Signature Verification”  (IJEAT) International Journal of Engineering and Advanced Technology (ISSN: 2249 -
8958) , Volume-1, Issue-5, June, 2012 . 
June, 2012 . 
19 Mr. Romil Rawat “Comparative Effective study of machine learning Techniques” (IJCAM) International Journal of Computer Architecture and Mobility, (ISSN 2319-9229)
Volume 1-Issue 2, December 2012
December 2012
20 Mr. Romil Rawat “Safe Guard Anomalies against SQL Injection Attacks”   (IJCA), International Journal of Computer
Applications (0975 – 8887),Volume 22-No.2 –May 2011
May 2011
21 Mr. Romil Rawat “C-queued technique against Sql-Injection attack”  International Journal of Advanced Research in Computer
Science (IJARCS), ISSN No. 0976-5697, Volume 2, No. 5, Sept-Oct 2011
Sept-Oct 2011
22 Mr. Romil Rawat “Key-generator based secure system against sql-injection attack”   International Journal of Advanced Research in
Computer Science (IJARCS), ISSN No. 0976-5697, Volume 2, No. 5, Sept-Oct 2011
Sept-Oct 2011
23 Mr. Romil Rawat “FOTIS MODEL: Modeling of Reverse Attack”  (IJCAM)
International Journal of Computer Architecture and Mobility, (ISSN 2319-9229) Volume 1-
Issue 1, November 2012
November 2012
24 Mr. Romil Rawat “Web Security Designing Algorithm: A Protective shield”   (IJCAM) International Journal of Computer Architecture
and Mobility, (ISSN 2319-9229) Volume 1-Issue 2, December 2012.
December 2012.
25 Mr. Romil Rawat  “1 to 1 mapping list for SQL –Injection Attack Detection”  (IJCAM) International Journal of Computer Architecture and Mobility,
(ISSN 2319-9229) Volume 1-Issue 3, January 2013. 
January 2013. 
26 Mr. Romil Rawat “URLAD (URL attack detection) - using SVM” (IJARCSSE) International Journal of
Advanced Research in Computer Science and Software Engineering ( ISSN: 2277 128X) ,
Volume 2, Issue 1, January 2012
January 2012
27 Mr. Romil Rawat GEOMETRICAL AND RANDOMIZED-ALGORITHMS OPTIMIZATION FOR CRYPTOGRAPHIC APPLICATIONS XVII International Conference on "ALGEBRA, THE THEORY OF NUMBERS AND DISCRETE GEOMETRY: MODERN PROBLEMS, APPLICATIONS, AND PROBLEMS OF HISTORY Tula, September 23-28, 2019, Russia  September 23-28, 2019, 
28 Mr. Romil Rawat Study of Phylogenetic for computational analysis of Sleep Apnea syndrome for Patient (Healthcare & Treatment). Northwestern University, Evanston, Illinois, USA , OCT 2019 Oct- 2019
29 Mr. Romil Rawat University of Padua, Padua, Italy.   Social Networks Security, Privacy, and Trust ( Presented  Research work in colloquium).         SEPT        2015
30 Durga Patel  An Enhanced Approach for Number Plate Detection and Recognition  Bentham Science Publishers , 2213-2759/20 $58.00+.00 01 June 2020
31 Durga Patel  Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environment Data, Engineering and Applications pp 59-74, Print ISBN
978-981-13-6350-4, Online ISBN
978-981-13-6351-1,Publisher Name
Springer, Singapore,DOI
https://doi.org/10.1007/978-981-13-6351-1_6
24 April 2019
32 Durga Patel  A Hash-Based Approach for Document Retrieval by Utilizing Term Features Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 711),Computational Intelligence in Data Mining pp 617-627,Print ISBN
978-981-10-8054-8,Online ISBN
978-981-10-8055-5,Publisher Name
Springer, Singapore,DOI
 
https://doi.org/10.1007/978-981-10-8055-5_55
04 July 2018
33 Durga Patel              Chapter on  Improving E-Commerce Web Applications Through Business Intelligence Techniques IGI Global Book Publication, Copyright: © 2018 |Pages: 20 ,DOI: 10.4018/978-1-5225-3646-8.ch005,  2018
34 Durga Patel  Efficient Data Administration · "International Journal of Computer Applications ",ISBN:9739380895114, DOI:10.5120/ijca2016912344,  Dec-2016
35 Durga Patel  Load Distribute Across the Cloud Server: Challenges and Algorithms ", Published in "International Journal of Computer Applications "International Journal of Computer Applications", ISBN: 973-93-80895-03-6, DOI: 10.5120/ijca2016912333 2016
36 Durga Patel  Software Reliability: Metrics "International Journal of Computer Applications",ISBN- 973-93-80895155,DOI:10.5120/ijca2016912433 2016
37 Durga Patel  Software Reliability:Models "International Journal of Computer Applications", ISBN: 973-9380894709,DOI:10.5120/ijca2016911837 Oct 2016
38 Durga Patel  Applications of Web Data Mining International Journal of Science, Technology & Management (ISSN-2394-1537),Volume5-Issue 2, feb 2016 Feb 2016
39 Shweta Jain A Systematic Literature Review of Frequent Pattern Mining Tecniques Sanmantrana 2018 Feb 2018
40 Shweta Jain Security Based on Biometric Technology in MANET-A Comparative Study & Application International Journal of Advanced Research in Computer Science and Software Engineering, ISBN: 2277 128X,Volume 6, Issue 11 Nov 2016
41 Shweta Jain Classification of Brain Cancer Using Feature Extraction in Artificial Neural Network International Journal of Engineering and Managerial Innovations (IJEMI), ISBN:2321-693X, Volume 1(2) Sep 2013
42 Shweta Jain ANN Approach Based On Back Propagation Network and Probabilistic Neural Network to Classify Brain Cancer International Journal of Innovative Technology and Exploring Engineering, ISBN: 2278-3075, Volume-3, Issue-3 Aug 2013
43 Shweta Jain Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network International Journal of Computer Science & Engineering Technology (IJCSET), ISBN: 2229-3345, Vol. 4, No. 07 July 2013
44 Shweta Jain Review of Biological Neuron and Artificial Neural Network” published in National Journal of Engineering Science and Management National Journal of Engineering Science and Management, ISBN:2249-0264, Vol-2, Issue-2 Dec 2012
45 Sachin Chirgaiya Blockchain Technology: A Comprehensive Survey Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 09-Special Issue DOI: 10.5373/JARDCS/V11/20192690
ISSN 1943-023X
Aug 2019
46 Sachin Chirgaiya Performance Evaluation of NPA-VM Using Attack Graph Hierarchical Visualization Approach International Journal of Engineering Trends and Technology (IJETT) – Volume 15 Number 6, Digital Library (http://www.ijettjournal.org/archive/ijett-v15p254, pp.) 282-287, ISSN:2231- 5381. Sep 2014
47 Sachin Chirgaiya Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach  International Journal of Computer Application (IJCA) – Volume 99 Number 11, Digital Library,http://www.ijcaonline.org/archives/ volume99/number11/17421-8218, pp. 45- 50. Aug 2014
48   Multi -Threaded Web crawler based on Multi keyword web crawling using ontology International Conference on Advances & Development in Engineering & Technology, ICADET-2013 . http://www.irdindia.in/ICADET_Indore_Nov/Home.html) February 2013
49 Sachin Chirgaiya Shape Recognition & Matching using Chain Code International Conference on Advances & Development in Engineering & Technology (ICADET 2013)   (http://www.irdindia.in/ICADET_Indore_Nov/Home.html) February 2013
50 Sachin Chirgaiya Ontology Based Multi Keyword Web Crawler for Semantic Web Analysis  International Conference on Electronics Computer Technology (ICECT 2012)   (http://www.icect.org/) April 2012
51 Sachin Chirgaiya Multi Keyword Crawling for Semantic Web Analysis using Ontology  International Journal of Engineering Research and Applications (IJERA)   (http://ijera.com) January 2012
52 Nitin Rathore Securing Ad-Hoc network using Trust Computing National Conference on “Recent Advances in Mechtronics, Computing Technology & Management" May-2013
53 Nitin Rathore Analysis of Image Segmentation through Edge Detectors International Journal of Mathematical Archive-4(9) 1-8 Available online through www.ijma.info ISSN 2229 – 5046. September-2013
54 Nitin Rathore Review on Basic Clustering Techniques for Heterogeneous Wireless Sensor Networks International Journal of Scientific and Research Publications, Volume 4, Issue 8, ISSN 2250 -3153 August-2014
55 Nitin Rathore Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET ”, International Journal of Computer Applications (0975 –8887) Volume 117 –No.15 May 2015
56 Nitin Rathore An Implementation of Modified AODV Protocol in MANET for Mitigation of Blackhole Attack with Varying Node Densities International Advanced Research Journal in Science, Engineering and Technology Vol. 2, Issue 12 December 2015.
57 Nitin Rathore Efficient Heterogeneous Wireless Sensor Network Using Improved Energy Optimization Approach International Journal of Science, Engineering and Technology Research (IJSETR) Volume 5, Issue 12,  ISSN: 2278 – 7798. December 2016
58 Nitin Rathore Requirements for Cloud Based System Architecture from Service Provider View to User View Shodh’2017 Doctoral Conference Held at SVVV Indore 4th March 2017.
59 Nitin Rathore Wormhole Attack In MANET: A Study International Journal Of Recent Technology Science & Management(IJRTSM), ISSN: 2455-9679. Feb 2018
60 Nitin Rathore Security In Data Storage On Cloud Environment Using Blowfish And Digital Signature International Journal of Research In Science & Engineering e-ISSN: 2394-8299, p-ISSN: 2394-8280, Volume: 4 Issue: 4  August 2018
61 Nitin Rathore Smart Parking Based on IoT International Journal Of Recent Technology Science& Management, ISSN: 2455-9679, 3(11) Nov 2018
62 Nitin Rathore Implementation of Single Sign-On Authentication for Multiple Clouds International Journal Of Research In Electronics And Computer Engineering: VOL. 6 Issue 4  ISSN: 2393-9028 (Print) | ISSN: 2348-2281 (Online) December 2018
63 Nitin Rathore Investigations of Microservices Architecture in Edge Computing Environment Lecture notes in Networks and Systems, vol. 100. Springer Feb2020
64 Himanshu panadiwal PPARM: Privacy Preserving Association Rule Mining Technique for Vertical Partitioning Database Journal
:SPRINGER AISC, Volume :939
 Issue:
IBICA 2018
doi
:1007/978-3-030-16681-6_27
Jan 2019
65 Himanshu panadiwal an implementation of multi-factor authentication scheme for secured cloud data storage framework Journal:international journal for science and advance research in
 technology Volume 2,Issue 7 in July 2016 PAPER ID :
 IJSARTV2I74611
July 2016
66 Akanksha Pal Novel Mechanism for Authentication by using User-Generated Cryptograph International Journal of Innovative Research in Computer and Communication Engineering, Volume 4 Issue 12, ISSN - 2320-9801 Dec 2016
67 Akanksha Pal A Survey on Various Security Techniques used for Authentication International Journal of Innovative Research in Science Engineering and Technology, Volume 5 Issue 11, ISSN - 2319-8753 Nov. 2016
68 Akanksha Pal Current Trends in Computing (Book Chapter) A Multi-disciplinary International Congress on Innovations in Science, Technology and Management –Challenges and Opportunities, SANMANTRANA Feb. 2018
69 Akanksha Pal A Survey on Friend Recommendation Techniques Based on their Interest used for Knowledge Management SHODH-2018 2nd Doctoral Conference on “Interdisciplinary Research for Sustainable Development:
Opportunities & Challenges”
March 2018
70 Akanksha Pal Friend Recommendation System by Using Context - Awareness International Journal of Advanced Science and Technology Volume 29, ISSN - 2207-6360 June 2020
71 Ankit Jain  QBTC Model: A model for classification of Queries International Journal of
Computer Application(0975-
8887), Volume 68 -No.
5,April 2013.
April 2013
72 Ankit Jain  Analysis of Query Based text classification Approach  International Journal Of Advanced Research in Computer Science and
Software Engineering,Volume 2, Issue 8,August 2012 ,ISSN:2277
128X.
Augest 2012
73 Shubham Kothari PPARM: Privacy Preserving Association Rule Mining Technique for Vertical Partitioning Database Innovations in Bio-Inspired Computing and Applications. IBICA 2018.Advances in Intelligent Systems and Computing, vol 939. Springer, Cham, pp 269-278 doi:10.1007/978-3-030-16681-6_27 May 2019
74 Shubham Kothari Minimizing the Size of Test Suite using Genetic Algorithm for Object Oriented Program International Conference on ICT in Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-5.doi: 10.1109/ICTBIG.2016.7892703 April 2017
75 Shubham Kothari Plug N Play Operating System International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, April 2013 pp.- 2254-2256 April 2013
76 Sourabh Sharma A New Correlation Based Image Fusion Algorithm Using Discrete Wavelet Transform International Journal of Engineering Science & Advanced Research, 2015 Dec;1(4):1-6, ISSN No. 2395-0730 2015 Dec
77 Sourabh Sharma An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization Applied Soft Computing, Elsevier 84, 105696 November 2019
78 Mrs. Khushboo Karodiya Study of various Video Event Classification Techniques International journal of Technology Research and Management 9 September 2015
79 Khushboo Karodiya Study & Analysis and Issue & Challenges in context of Human Resources Management in SEPM using Apriori algorithm International Journal of Innovations in Engineering & Technology IJEBEA June-August, 2013.
80 Khushboo Karodiya Knowledge Discovery on www” Paripex  Indian Journal of Research GYAN SANDHAN in PIES Indore Mar 2013
81 Khushboo Karodiya An Al & Agile based software development with Scrum methodology International journal International association of scientific innovation & Research IJEBA Dec 2012
82 khushboo Karodia Result Evaluation of Field Authentication based SQL Injection and XSS Attack Exposure EEE, International Conference on Information, Communication, Instrumentation and Control (ICICIC – 2017). In Medicaps- University,Indore 18th Aug  2017
83 Manish Sharma A Survey on Information Retrieval Models, Techniques and Applications  International Journal of Emerging Technology and Advanced Engineering Nov 2013
84 Manish Sharma An Improving the Effectiveness of Text to Matrix Generator by Using Genetic Algorithm  International Journal of Computer Engineering and Technologies Jan 2014
85 Manish Sharma Applying Genetic Algorithm in Text to Matrix Generator   International Journal of Computer Science and Information Technologies Feb 2014
86 Manish Sharma Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network International Journal of Science and Research (IJSR) March 2016
87 Manish Sharma Energy Effectual Trust Based Technique for Prevention of Vampire Attack International Journal of Scientific Development and Research (IJSDR) June 2016
88 Manish Sharma Solar Energy Prediction using LM-Back-propagation in ANN IOSR Journal of Computer Engineering (IOSR-JCE) Feb 2019
89 Sanat Jain Mining & Optimization of Association Rules Using Effective Algorithm International Journal of Emerging Technology and Advanced Engineering (IJETAE). ISSN 2250–2459 Vol. 2 Issue 4 April 2012
90 Sanat Jain Optimization of Positive and Negative Association Rules using effective algorithm International Conference on Computers and Communication (ICCC-2012). ISBN 978-9381583-21-0 Vol.1 Issue 1 January 2012.
91 Sanat Jain Optimization of Positive and Negative Association Rules using Modified Genetic algorithm National Conference on Advances in Communications & Computing (NCACC-2013). Vol. 1 Issue 1 January 2013
92 Rajesh Kumar Chakrwarti Hindi-To-English Machine Translation System for Primary Education Doctoral Conference (DocCon-2016),  Janardan Rai Nagar Rajasthan Vidyapeeth University, In collaboration with CSI and ACM Udaipur Chapter, Udaipur, Rajasthan March 2016
93 Rajesh Kumar Chakrwarti Approaches for Improving Hindi to English Machine Translation System Indian Journal of Science and Technology, vol. 10 no. 16, ISSN 0974-6846. DOI: 10.17485/ijst/2017/v10i16/111895 April 2017
94 Rajesh Kumar Chakrwarti A new approach for Hindi to English idiom translation 3rd International Young Scientist Congress (IYSC-2017), Ganpat University, Mehsana Gujrat 08-09 May 2017
95 Rajesh Kumar Chakrwarti Review of Machine Translation Techniques for Idea of Hindi to English Idiom Translation International Journal of Computational Intelligence Research, vol.13, no. 5,  ISSN 0973-1873. May 2017
96 Rajesh Kumar Chakrwarti Implementation of Hindi to English Idiom Translation System International Conference on Advanced Computing Networking and Informatics. “Advances in Intelligent Systems and Computing”, vol. 870, Springer, Singapore, November 2018, ISSN 2194-5357. https://doi.org/10.1007/978-981-13-2673-8_39 November 2018
97 Rajesh Kumar Chakrwarti Couplets Translation from English to Hindi Language International Conference on Social Networking and Computational Intelligence. “Lecture Notes in Networks and Systems” vol. 100, Springer, Singapore, ISSN 2367-3370. https://doi.org/10.1007/978-981-15-2071-6 April 2020
98 Rajesh Kumar Chakrwarti Approach for English to Hindi Couplets Translation Annual Convention Computer Society of India (CSI 2020) in conjunction with an International Conference with the theme “Digital Democracy - IT for Change”. “Communications in Computer and Information Science” Springer, Singapore, ISSN 1865-0929.  
100 Rupali Dave Detection of Route Discovery Flooding Attack through Maintaining History Table in MANET IJCAT - International Journal of Computing and Technology, Volume 2, Issue 10, Oct-15
102 Rupali Dave Security Based on Biometric Technology in MANET-A
 Comparative Study & Applications
International Journal of Advanced Research in
Computer Science and Software Engineering,2277 128X,
Nov-16
103 Rupali Dave Performance Based Association Rule-Mining Technique Using Genetic Algorithm INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) Volume-19, Number - 01 Nov-16
104 Rupali Dave Study of different data mining tools IJARCSSE,2277-128X,vol 7,issue 6 Jun-16
105 Rupali Dave A Survey on Various Encryption Cryptographic Techniques IJCAT - International Journal of Computing and Technology, Volume 3, Issue 2, February 2016 ISSN : 2348 - 6090 Feb-16
99 Rupali Dave Website Optimization on Search Engines to Achieve High Page Ranking and Traffic INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) ISSN: 2349-4689 Issue 112, Volume 40, Number 01, 2017 Nov-17
101 Rupali Dave Survey on Manual and Automation Testing Strategies and Tools for Software Application IJARCSSE, ISSN: 2277 128X,Volume 7,issue 4 Apr-17
106 Rupali Dave Sentiment Analysis of Data using naïve Bayes classifier with n-gram approach in Hadoop International Journal of Advanced Research in Science, Engineering and Technology Vol. 5, Issue 4 , April 2018 Apr-18
107 Pallavi Kala Accountability for Electronic Health System International Conference on Advanced Computing , Networking
and Informatics (ICANI-2018),
Feb-18
108 Pallavi Kala Hybrid Access Control and Cryptography Model for Preserving Privacy of Electronic Medical Record International Journal of Advanced Research in Science, Engineering and Technology,volume 5, May 2020
109 Paridhi Nigam A survey on existing web log mining algorithm International Journal of Advanced Research inComputer Science and Software Engineering, Volume 5, Issue 9 September 2015
110 Paridhi Nigam A comparative analysis of web usage mining technique International Journal of Computer Applications (0975 –8887)Volume 152 –No.5, October 2016
111 Paridhi Nigam An enhanced approach for web log mining International Journal of Technology Research and ManagementISSN (Online): 2348-9006Vol 3Issue 12 Dec 2016
112 Avdesh Kumar Sharma Energy Efficient Protocol for Layered Supervision of Communication Model in Wireless Sensor Networks IJMIE October 2012
113 Avdesh Kumar Sharma Energy Optimization HMLC Scheme for
Wireless Communication in Sensor
Networks
IJECSE Nov 2013
114 Avdesh Kumar Sharma A Security Auditing Scheme for Cloud Access Control IJSRD 06-2016
115 SHYAM SUNDAR MEENA Fuzzy Logic based Stock Value Prediction using Fundamental Analysis Oriental Journal of Computer Science and Technology Vol.10, no.1, pp. 120-126 Mar 2017
116 SHYAM SUNDAR MEENA News Recommendation Approach Based on Conten International Journal of Research In Science & Engineering, Vol.3, no.1, pp. 150-155 2017
117 SHYAM SUNDAR MEENA Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud International Journal of Computer Applications, Vol.155 ,no.03, pp 6-10 2016
118 SHYAM SUNDAR MEENA News Recommendation Systems: A Comparative Study International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 5, no. 6, pp. 526-529
June 2016
119 SHYAM SUNDAR MEENA Cloud Storage Security using Improved Blowfish Algorithm in open shift cloud Proceedings of the National Conference on
New Trends and Challenges in Computer Engineering and Technology– NTCCET 2016
April, 2016
120 SHYAM SUNDAR MEENA Prediction of Stock Values Based on Fuzzy Logic using Fundamental Analysis International Journal on Recent and Innovation Trends in
Computing and Communication, Vol. 3, no. 10, pp. 5806 - 5810 
Oct 2015
121 SHYAM SUNDAR MEENA Data Mining Techniques for Stock Market Forecasting: A Survey Proceedings of the National Conference on Advances in Computer
Science & Technology (ACST- 2015)
Nov. 2015
122 SHYAM SUNDAR MEENA Efficient Discovery of Frequent Patterns using KFP-Tree from Web-Logs International Journal of Computer Applications(IJCA), Vo.l 49, No. 10, pp. 15-18, July, 2012
123 Jayendra Barua, and Rajdeep Niyogi Improving Named Entity Recognition and Disambiguation in News Headlines International Journal of Intelligent Information and Database Systems (IJIIDS), Vol 12(4), 2019, pp 279-303 2020-Jan
124 Jayendra Barua and Dhaval Patel Named Entity Classification using Search Engine's Query Suggestions. In Proceedings of 39th European Conference on Information Retrieval (ECIR 2017) 2017-Apr
125 Nivedita Sinha, Jayendra Barua, Dhaval Patel and Rajdeep Niyogi Time-aware Relation Mining using News Headlines. In proceedings of 6th International Conference on Advances in Computing, Communications and Informatics 2017-Dec
126 Jayendra Barua and Dhaval Patel Discovery, Enrichment, and Disambiguation of Acronyms. In Proceedings of 18th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2016). 2016-Apr
127 Jayendra Barua, Dhaval Patel, and Vikram Goyal TiDE: Template-Independent Discourse Data Extraction. In Proceedings of 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2015) 2015-Apr
128 Mohit Thakur, Dhaval Patel, Shrikant Kumar, Jayendra Barua NewsInstaMiner: Enriching News Article using Instagram In Proceedings of 3rd International Conference on Big Data Analytics (BDA 2014) 2014-May
129 Jayendra Barua, Dhaval Patel, and Ankur Agarwal Removing Noise Content from Online News Articles. In Proceedings of 20th International Conference on Management of Data (COMAD 2014) 2014-Apr
130 Jayendra Barua and Sachin Chirgaiya Shape Recognition & Matching using Chain Code International Journal on Advanced Computer Theory and Engineering (IJACTE) 2013-Feb
131 Sachin Chirgaiya and Jayendra Barua Multi -Threaded Web Crawler based on Multi keyword Web Crawling using Ontology International Journal on Advanced Computer Theory and Engineering (IJACTE) 2013-Feb
132 ALPESH SONI AODV Protocol Improvement with Path Accumulation Feature in Mobile Adhoc Network International Journal of Technology Research and Management 2017-Nov
133 ALPESH SONI A Survey of Various Techniques to Secure cloud storage National Conference on Security Issues in Network Technologies (NCSI-2012) July-2012
134 ALPESH SONI The effect of selfish and malicious node on dsr routing protocol in manet 2nd International Conference on IT & Business Intelligence (ITBI-10), May-2010
135 AMRATA GUPTA  A survey: Iris recognition with different techniques  International journal of software & hardware research in engg,volume 3 issue 1/IJSHRE-3103  Jan - 2015
136 AMRATA GUPTA  An efficient iris recognition using DCT transforn based on feed forward neural network  International journal of software & hardware research in engg,volume 3 issue 4/IJSHRE-3404  Apr - 2015
137 Pooja Deshpande  Efficient Resource Allocation and Scheduling Approach to Enhance the Performance Of Cloud Computing International Journal of Software & Hardware Research in engg,Volumne 2  June2014
138  Pooja Deshpande  A Layered Architecture for Fog Computing for an Effective Real Time Data Processing International Journal of Computer Applications (0975 – 8887)
Volume 180 – No.36, 
April 2018
139 Himani Thakur Review of Various Two Phase Authentication Mechanism on Ease of Use & Security Enhancement Parameters International Conference on Social Networking and Computational Intelligence SPRINGER (scopus)
Book: Social Networking and Computational Intelligence pp 671-677
Feb. 2020
141   NIL NIL NIL
140 Himani Thakur “Hybrid and Adaptive Authentication Mechanism using Images International Journal of Recent Scientific Research, Vol. 10, Issue, 05(A), pp. 30693-30696 May, 2019
142 Sunil Parihar “A Novel Framework for Video Search” International Journal of Computer Science and Technology, vol. 3, issue 4, pp. 494-496, ISSN: 0976-8491. Oct - Dec 2012
143 Sunil Parihar “A Generic Framework for Video Search using Feature Extraction and Annotation”
International Journal of Advance Research in Computer Science and Software Engineering, vol. 3, issue 6, pp.1521-1526,ISSN: 2277 128X. June-2013
144 Dibakar Sinha Predicting Heart Disease Stage by tuning convergence 2nd International Conference on Advances in Signal Processing and Artificial
Intelligence (ASPAI' 2020), Berlin, Germany,
June 2020
145 Vijay Prakash  A Combinatorial Approach for High Utility Item Set Mining using FRUP and Direct Discovery Approach without Candidate Generation”   International Journal of Science and Research (IJSR)”,ISSN:2319-7064, Online, Volume 8, Issue 5   May 19.
146 Vijay Prakash A Comparative Analysis of Various Algorithms for High Utility Itemset Mining”   International Journal of Science and Research (IJSR)” ISSN:2319-7064, Online, Volume 8, Issue 1 Jan 19.
147 Vijay Prakash  Security parameter of Unified Data protection Model (UDPM) in Cloud Computing”  International Journal of Application or Innovation in Engineering & Management (IJAIEM)” ISSN 2319 – 4847, Volume 6, Issue 7 in July 2017. July 2017.
148 Vijay Prakash An efficient management security scheme for distributed network using hierarchical approach with elliptical curve cryptography”  International Journal of Advance research (IJAR)” ISSN 2320-5407, Vol-4, Issue-5  May, 2016
149 Vijay Prakash A Buffer management scheme to control packet loss in MANET” IEEE symposium CDAN-16   March 16.
150 Vijay Prakash Comparison between old & advanced scheme of Buffer Management in Packet queuing for controlling congestion In MANET” International Journal of Scientific Research & Development (IJSRD), Vol-3 having ISSN 2321-0613 Dec-15.
151 Vijay Prakash Web based interface implementation for Ruby, Perl, Python, VB & HTML International Research Journal of Engineering & Technology(IRJET), Vol-2 having ISSN 2395-0056 October, 2020
152 Vijay Prakash A Novel framework for Composite Network Security Situation Assessment Using HRCAL Approach  International journal of IJESRT having ISSN 2277-9655  May-15.
153 Vijay Prakash Performance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach International Journal of Research in Computer Engineering & Electronics ( IJRCEE) ISSN 2319-376X, Vol-3  Dec-14.
154 Vijay Prakash Implement Security Using Smart Card on Cloud”  International Journal of Innovations and Advancement of Computer Science ISSN (2347 – 8616, 2347 – 8527, 2348-117X ) May-2020
155 Vijay Prakash Fault Tolerance Approach by Using HMM with BAUM-WELCH Algorithm In MCC”  IEEE Explorer International Conference of WOCN  July 2013.
152 Vijay Prakash Efficient Public Verifiability and Data Dynamics for Storage Security in Hybrid Clouds”   IEEE International Conference on Computer & Communication Technology (ICCCT-13, paper id. 118,)  September -2013
153 Vijay Prakash Design and Implementation of a new Location Management Scheme in Mobile Ad Hoc Network”  ELSEVIER Journal held at Academy of Tech., Aedonagar, Hooghly, West Bengal. 2013
154 Vijay Prakash An Efficient info-gain Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint International Conference on CUBE 2012 by IT-Engineering-Management-Telecom   Sept 2012.
155 Vijay Prakash A New Design Architecture for Location Management using Quadrant Routing Scheme in Mobile Ad Hoc Network”  International Conference on Computer & Communication Sponsored by IEEE MP Subsection, Institution of Engineers & Computer Society of India held at SISTECH Bhopal M.P & ISBN No. 978-93-81583-21-0. 2011
156 Garima Joshi A Layered Architecture for Fog Computing for an Effective Real Time Data Processing International Journal of Computer Applications (0975 – 8887)
Volume 180 – No.36, 
April 2018
157 Garima Joshi A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor IJCA June 2014 Edition ISBN : 973-93-80882-54-0 June 18, 2014
158 Garima Joshi An Analysis-Prediction architecture for Active living
Advances in Computer Science & Technology
February,2014
159 Garima Joshi Big data for mobile computing research Computer Applications in Engineering: Emerging Trends and Technologies" organized by The Institution of Engineers (India)In Association November 2013
160 Garima Joshi Green Computing, Emerging trends in IT Green IT for E Pragti April,2011
161 Lovenish sharma Automatic Number plate recognition using Machine International Journal of Creative Research Thoughts (IJCRT April 2018
    learning approach    
162 Lovenish sharma Methodology of Adaptive Collaborative Systems Emerging Trends In Computer Simulation-2011 Nov 2011
163 Lovenish sharma Distributed Context Switching In Complex Adaptive Systems Mapping For Excellence: Challenge Ahead-2011 Feb 2011
164 Lovenish sharma Complex Adaptive System: Principles vs. Rules Emerging Trends In Information Technology &Management (NET-ITM-2011) March 2011
165 Lovenish sharma Methodology Of Dynamic Slicing In Object Oriented Program For Debugging Recent Trends In The Field Of Science And Technology (RTFST-2011) April 2011
166 Lovenish sharma Context Switching In Complex Adaptive System Recent Trends In The Field Of Science And Technology (RTFST-2011) April 2011
167 Dinesh Patel A GPU based implementation of Robust Face Detection System In Procedia Computer Science, Volume 87- Fourth International Conference on Recent Trends in Computer Science & Engineering (ICRTCSE 2016) pp 156-163 April, 2016
168 Archana Choubey “Blackhole Detection &
Prevention through Neighbors Node Watching IDs in Manet”
International Conference on Computer Science, Industrial Electronics(ICCSIE) held at Pune, India Paper-ID: IE-CSIE-PUNE-06058-3810 06 May, 2018
169 Archana Choubey Selfish Node Attack and Protection in MANET:A Survey “challenges of globlization and strategies for competitiveness”, SVIM-Indore 17 Jan, 2015
170 Archana Choubey Queue Length Based Load Balancing Technique using with AOMDV Protocol in MANET IJSER,ISSN 2229-5518,Volume-4 01 Oct, 2013
171 Archana Choubey A survey on Load Balancing for Mobile Ad Hoc Networks NCRAFT-2013 17 Oct 2013
172 Sonam Mehta “Optimization of C5.0 classifier using Bayesian theory”  IEEE International Conference on Computer Communication and Control(IC4-2015). Aug 2015
173 Sonam Mehta “Enhancement of C5.0 classifier by using Bayesian probability theory” International Journal of Research in Computer Engineering and Electronics. Dec 2014