Department of Information Technology

Publications


Research Publication of Faculties :

PAPERS PUBLISHED IN INTERNATIONAL JOURNAL

MAIN AUTHOR

  1. Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, “Identification of Efficient Peers in P2P Computing Systems for Real Time Applications”, Published in International Journal of Peer to Peer Networks (IJP2P) Vol.3, No 6, November 2012.
  2. Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, “Investigation of Peer Grouping Methods in Peer-to-Peer Computing Networks”, Published in International Journal of Computer Applications (IJCA) ,Vol 83 – N0. 13, Dec. 2013, pp. 37-41, http://www.ijcaonline.org/archives/volume83/number13/14512-2892ISBN : 973-93-80879-13-2 AS CO-AUTHOR [1] Shruti Sharma, Jigyasudube. “A survey paper on Frame work for classification of uncertain data”, Published in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 3 Issue 5, May 2014 pp 1921-1925,ISSN: 2278 – 1323 [2] Krutika Rani Sahu and JigyasuDubey. “A Survey on Phishing Attacks”. Published in International Journal of Computer Applications (IJCA), Vol 88-No 10, pp 42-45, February 2014
  3. Anjana Tiwari, Jigyasu Dubey. “Content Based Image Retrieval with Wavelet and Gabor Transform mixing based on modulation factor”, Published in International Journal of Scientific & Engineering Research – IJSER, Volume 4, Issue 9, pp 1480-1484, September 2013, ISSN 2229-5518
  4. Piyush Vyas, Jigyasu Dubey, “An Efficient Methodological Study for Optimization of Negative Association Rule Mining” Published in International Journal of Computer Applications® (IJCA). 0975-8887
  5. Gaurav Sharma, Jigyasu Dubey, “An Approach to Rigid Minimum Residual Power Level of Nodes in Multi-Hop Wireless Network”, Published in International Journal of Computer Applications® (IJCA), 0975 – 8887, Volume 59– No.7, December 2012, pp. 20-24.

PAPERS PUBLISHED IN INTERNATIONAL CONFERENCE

MAIN AUTHOR

  1. Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, “Bayesian Network Based Trust Model with Time Window for Pure P2P Computing System,” Published in Proceedings of 1stIEEE Global Conference on Wireless Computing and Networking (GCWCN-2014), going to held on 22-24 December 2014, Lonavala Pune.
  2. Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, “A Framework for Pure Peer-to-Peer Computing System”, Published in Proceedings of Ninth IEEE and IFIP International ConferenceWireless and Optical Communications Networks WOCN2012 Next Generation Internet, held during 20th, 21st and 22nd of September 2012, INDORE, India, 978-1-4673-1987-4.
  3. Jigyasu Dubey, Dr. (Mrs.) VrindaTokekar, “Identification of Reliable Peer Groups in Peer-to-Peer Computing Systems”, published in proceedings of Third International Conference on Advances in Communication, Network, and Computing – CNC 2012,LNICST Volume No.108,pp. 233-237, Bangalore, India, 978-1-936968-61-9.
  4. Jigyasu Dubey, Vrinda Tokekar, “P2PCS-A Pure Peer-to-Peer Computing System for Large Scale Computation Problems”, In proceedings of IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), pp. 582-585,Gwalior, India, Oct-2011,978-0-7695-4587-5/11 .
  5. Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar,Anand Rajavat, “A Study of P2P Computing Networks”, Published in Proceedings of International Conference on Computer Engineering and Technology (ICCET’10) pp 623-627,13-14 Nov. 2010, JIET group of Institution, Jodhpur, India, ISBN No 978-81-920748-1-8 .
  6. Anand Rajavat, Jigyasu Dubey, “Identification of Risk Engineering Issues in Reengineering Process of Software Systems”, Published in Proceedings of International Conference on Computer Engineering and Technology (ICCET’10), pp 314-319, 13-14 Nov. 2010, JIET group of Institution, Jodhpur, India, ISBN No 978-81-920748-1-8 .
  7. Jigyasu Dubey, Anand Rajavat, “HWTRS: Hand Written Text Recognition System”, Published in Proceedings ofInternational Conference on Computer Application 2010(ICCA’10), 24-27 Dec.2010, Pondicherry, India, ISBN: 978-981-08-7618-0.
  8. AnandRajavat, JigyasuDubey, “Issues and Challenges of Software Reengineering Process “, Published in Proceedings ofInternational Conference on Computer Application 2010(ICCA’10), 24-27 Dec.2010, Pondicherry, India, ISBN: 978-981-08-7618-0.
  9. Jigyasu Dubey, Anand Rajavat, “Text Recognition Method for Hand Written Hindi text in Images”, Published in Proceeding ofInternational Conference on Data Engineering and Management(ICDEM 2008),pp.388-391,Feb 9, 2008, Bishop Heber College Tiruchirappalli , India.
  10. Anand Rajavat, Jigyasu Dubey, “A new look of ERP Implementation Lifecycle”, Published in Proceedings of International Conference onData Engineering and Management (ICDEM 2008), Feb 9, 2008, Bishop Heber College Tiruchirappalli , India.

AS CO-AUTHOR

  1. Piyush Vyas,Jigyasu Dubey, “An Effective Method for Association Rule Mining through Modified Genetic Algorithm” Published in Proceedings of IEEE -Nirma University International Conference on Engineering, NUiCON-2012, Dec. 2012, ISBN 978-1-4673-1719-1/12
  2. Jitendra Kumar Patel, Jigyasu Dubey, “Mobile Ad hoc Network Performance Improvement Using Strategical RED”, Published in Proceedings of Ninth IEEE and IFIP International Conference Wireless and Optical Communications Networks WOCN2012 Next Generation Internet, held during 20th, 21st and 22nd of September 2012, INDORE, India, 978-1-4673-1987-4.

PAPERS PUBLISHED IN NATIONAL CONFERENCE

  1. Jigyasu Dubey,Sarthak Saxena, Satish K. Shukla, Shabbir Husain, “D.T.E. Counselling- Issues Dealt And Issues Present”, Published in Proceedings of National Conference on Emerging Technologies and Practices in E-Governance, 9-10 December 2010 Dr. C. V. Raman University, Bilaspur (CG) (Technically sponsored by - IEEE MP Subsection and IEEE Computer Society, Mumbai Chapter).
  2. Jigyasu Dubey, Anand Rajavat, “Security Issues in P2P Networks”, Published in Proceedings of National Conference on Software & Emerging Technologies, 8th& 9th Sep. 2006,ChoukseyEngineeringCollege, Bilaspur(C.G.).
  3. Anand Rajavat, Jigyasu Dubey, “Framework of Software Reengineering Process”, Published in Proceedings of National Conference on Software & Emerging Technologies, 8th& 9th Sep. 2006,ChoukseyEngineeringCollege, Bilaspur(C.G.).
  4. Jigyasu Dubey, Anand Rajavat, “Framework of Distributed computing over peer to peer networks”, Published in Proceedings of National Conference on Computing and Application (NACCA’06), Organized by NationalEngineeringCollege, K.R. nager, Kovilpatti, Tamil Nadu.
  5. Jigyasu Dubey, Anand Rajavat, “Distributed computing over peer to peer networks”, Published in Proceedings of National Conference on Cyber Security, Data Mining and ICT for the Society, 18-19 January 2006,Guru Ghasidas University, Bilaspur,Chhattisgarh.
  6. Anand Rajavat, Jigyasu Dubey, “The Role of Reengineering process for software organization”, Published in Proceedings of National Conference on Cyber Security, Data Mining and ICT for the Society, 18-19 January 2006, GuruGhasidasUniversity, Bilaspur,Chhattisgarh.
  7. Anand Rajavat, Jigyasu Dubey, “Generic Source of Risk & Risk Management Process”, Selected in National Conference on Computer Applcation-07 at Haryana College of Technology & Management, Kaithal(Haryana).

 

S.No. Author Title Publication Details Date
1 Sachin Yele “Wireless Sensor/Actuator Network Design for Heterogeneous and Dynamic Environment with control Mechanism” International Journal of computer Engg. And Information Technology, Vol.13 , No. 18 , pp. 1-5 June 2009
2 Sachin Yele A Data Mining Content Based Clustering Technique for E-Mail Content Refinement” International Journal of Advanced Engg. And Application January 2011
3 Sachin Yele “Web Usage Mining for Pattern Discovery (A Review Paper)” International Journal of Advanced Engg. And Application”, Vol. 01 January 2011
4 Sachin Yele Network Intrusion Detection System in Real Time With Data Mining Approach” INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND COMPUTER APPLICATIONS (IJCECA) June 2011
5 Sachin Yele “Subjective Content Accessibility using Database Approach for Digital Library” International Journal on Computer Science and Engineering (IJCSE) August 2011
6 Sachin Yele “Multilayer Database Approach for web page content & Information Discovery” International Journal of Communication, Computation and Innovation- IJCCI August 2011
7 Sachin Yele A Review Study of Mining Frequent Patterns from Weighted Traversals on Graph Using Confidence Interval Priority” International Journal of Computer Science and System Analysis Vol. 06 January 2012
8 Sachin Yele “Five Steps of Achieving a Good Quality Clustering” International Journal of Innovative Trends in Engineering (IJITE) Vol.04 November 2016
9 Sachin Yele “An Implementation of Novel Approach for Information Extraction using Ontology” International Journal of Science Progress & Research (IJSPR) Vol. 23 March 2015.
10 Sachin Yele “A software cost & effort estimation for web based application” 6th National Conference on Information Technology & Energy Management, February 2010
11 Sachin Yele “A Model for Network Packet Classification with Intrusion detection and Analysis using data mining techniques” 1st National Conference on Emerging Trends in Computing  ETCOMP-2010, SD Bansal College of Technology Indore March 2010,
12 Sachin Yele “A Data Mining Approach for Bioinformatics System” National Conference on Recent Trends in Soft Computing and Networks Lakshmi Narain College of Technology, Bhopal, India. March 2010,
13 Sachin Yele “A Trust Model for Wireless Sensor Network Health Monitoring using Fuzzy Logic” National Conference on Recent Trends in Soft Computing and Networks  Lakshmi Narain College of Technology, Bhopal, India. March- 2010,
14 Sachin Yele “A Study of Software Reliability Metrics” 4th National Conference on IT- Contemporary and Future Technologies for Social Change , ITM Universe Gwalior, India. March 2011
15 Sachin Yele “Data Mining as a Facilitator for Web” 4th National Conference on IT- Contemporary and Future Technologies for Social Change  ITM Universe Gwalior, India. March- 2011,
16 Sachin Yele “A Book Recommendation System for Cloud Computing: A Review” National Conference on Recent Trends in Computer Technology NCRTCT- 2017,. SIMS, Indore March 2017
17 Sachin Yele Challenges and Security issues in Big Data – A Review International Conference on Transforming Libraries and Information Centers in Digital Era March 2019
18 Sachin Yele "Multilayered Database Approach using Natural Language Processing:- A Review" International Conference on Operations Management March 2020
19 Manoj Dhawan “Improving Classification Precision of Feature Selection using Genetic Programming”  IJARCSMS,Vol. 3, Issue , page no.220-226, ISSN(Online): 2321-7782 10th Oct 2015
20 Manoj Dhawan “Optimizing Energy Consumption in Wireless Sensor Network Through Distributed Weighted Clustering Algorithm” IEEE International Conference on Computer Communication and Control (IC4-2015) to be held during  in Indore, M.P,India 11th Sept 2015
21 Manoj Dhawan “An Efficient RSA Based Technique for the Encryption and Decryption”  IJCSIT, Volume 6(3) , 2015, page no. 2006-2009, ISSN 0975-9646 May 2015
22 Manoj Dhawan "Review of Link Prediction in Temporal Mobile Database” International Conference on Systemics, Cybernatics and Informatics (ICSCI-2014) under the aegis of Pentagram Research Centre, India at Hyderabad in the Session CI-4.1 of the conference 3rd June 2014
23 Manoj Dhawan " SVITS-HDR a new Image Encryption Technique to encrypt high definition images " International Journal of Engineering Research & Technology (IJERT) , Vol.2 - Issue 10 (October - 2013), page no. 3572-3576 ISSN: 2278-0181  Oct 2013
24 Manoj Dhawan "A Modified Version of Extended Play fair Cipher (8X8)"  IJECS , Volume 2, page no. 956- 961, ISSN : 2319-7242  4th April 2013
25 Manoj Dhawan “An Enhance Security of Play fair Cipher Substitution Using A Simple Columnar Transposition Technique With Multiple Rounds (SCTTMR)”  IJRCM , Volume 2 Issue 8, 10 , page no.75- 78, ISSN : 2231-5756  10th August 2012
26 Manoj Dhawan “Effort Shrinkage Mechanism For Security” National Conference on Emerging Technology” to be held in SIMS, Indore  19th Nov, 2010
27 Rahul Anjana An robust approach for secure sharing using Cloud computing IJCSIT, ISSN:0975-9646, Volume 5, Page no 2250-2255 Nov 2016
28 Rahul Anjana Result Evaluation of an Robust Approach for Secure Sharing Using Cloud Computing IJCSIT, ISSN:0975-9646, Volume 8, Page no 447-454         April 2017
28 Bharat Pahadiya ontology and its research     Rishiraj Institute of technology indore under (RGTMS2011) 22 Nov 2011.
29 Bharat Pahadiya an approach for comparative research between ontology building & learning tools for information extraction & retrieval. international journal of electronic communication and computer engineering volume 2 issue 2 ,2011 ISSN 2249-071x Nov 2011
30 Bharat Pahadiya A survey on load based routing techniques in wireless ad hoc network” international conference on IT in Business,Industry and government organized at the SAIT Indore IEEE conference Mar 2014
31 Bharat Pahadiya “An Energy Efficient Cloud Computing Using VM scheduling Algorithm” ISSN 2347 – 7539 July 2014 International journal of research in Engineering technology & management July 2014
32 Bharat Pahadiya Enhancing the Power Consumption of the Data Centers in Energy Efficient Cloud Computing” ISSN 2250-2459 Volume 5,Issue 5,May 2015 International journal of Emerging technology & Advanced Engineering May 2015
33 Bharat Pahadiya Detection and Removal of Vampire Attack in Wireless Sensor Network International Journal of Computer Applications (0975 – 8887) Volume 126 – No.7, September 2015 Sep 2015
34 Bharat Pahadiya An Advanced Technique of Image Matching Using SIFT and SURF International Journal of Advanced Research in Computer and Communication Engineering May 2016
35 Bharat Pahadiya A load Aware Routing Technique Using AODV Modification Second International conference on Smart Trends For Information Technology and Computer Communications (SMART COM- 2017) Springer CCIS publication Aug 2017
36 Gaurav Shrivastava Analysis of Cryptosystem using DES with RSA,  VSRD International Journal of Computer Science and Information Technology, Volume.1 (7), Page No 465-470, 1 October 2011, ISSN: 2231-2471. Oct 2011
37 Gaurav Shrivastava An Integrated Encryption Scheme Used in Bluetooth Communication Mechanism,  VSRD International Journal of Computer Science and Information Technology, Volume. 1 (8), Page No. 567-572, 6 November 2011, ISSN: 2231-2471. November 2011
38 Gaurav Shrivastava Secure File Transmission Scheme Based on Hybrid Encryption Technique,  IJMRA International Journal of Management, IT & Engineering Volume. 2 (Issue 1), Page No. 224 – 238, 1 January 2012, ISSN: 2249-0558. Jan2012
39 Gaurav Shrivastava An Enhance Security of Play Fair Cipher Using a Simple Columnar Transposition Technique With Multiple Rounds (SCTTMR),  International Journal of Research in Commerce, IT & Management, Volume No. 2 (Issue 8), Page No. 75 – 78, 10 August 2012, ISSN: 2231 - 1009 Aug 2012
40 Gaurav Shrivastava A MODIFIED VERSION OF EXTENDED PLAFAIR CIPHER (8X8), International Journal of Engineering And Computer Science, Volume 2 Issue 4, Page No. 956 -961, 1 May 2013, ISSN: 2319-7242 May 2013
41 Gaurav Shrivastava Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique,  International Journal of Engineering Sciences & Research Technology (IJESRT), Vol. 2 Issue 6, Page No- 1475-1478, 1 June 2013, ISSN: 2277-9655. June 2013
42 Gaurav Shrivastava Effective Diagnosis of Diseases through Symptoms Using Artificial Intelligence and Neural Network, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Page No. 2229-2231, Jul-Aug 2013, ISSN: 2248-9622. July 2013
43 Gaurav Shrivastava An Approach for Effective Diagnosis of Diseases,  International Journal of Information & Computation Technology, Volume 4, Number 16 (2014) Page No. 1711-1717, 2014, ISSN 0974-2239 Jan 2014
44 Gaurav Shrivastava RAI-DD: Reliability, Availability Identification & Dynamic Decision Based Replica Distribution for Cloud Computing, International Journal of Computer Science and Information Technologies, Vol-5 Issue-4, AUG 2014 Page No. 5497-5502, ISSN 0975-9646 Aug 2014
45 Gaurav Shrivastava A Novel Method of Video Steganography Using Variable LSB,  International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 7, Page No. 462-464, July 2015, ISSN 2250-2459. Jul 2015
46 Gaurav Shrivastava A review on Attribute Selection for Intrusion Detection System with Evolutionary Algorithm,  Engineering Universe for Scientific Research and Management, Vol-7, Issue-8, 2015 Page No. 1-5, August 2015, ISSN 2394-6172. Aug 2015
47 Gaurav Shrivastava A review on Attribute Selection for Intrusion Detection System with Evolutionary Algorithm,  Engineering Universe for Scientific Research and Management, Vol-7, Issue-8, 2015 Page No. 1-5, August 2015, ISSN 2394-6172. Aug 2015
48 Gaurav Shrivastava A Hybrid Model for Intrusion Detection Based on Genetic Clustering and PSO Algorithm, International journal of Master of Engineering Research and Technology, Vol-2, Issue-9, 2015 Page No. 155-160, SEP 2015, ISSN 2394-6172 Sep 2015
49 Gaurav Shrivastava Performance Evaluation of Reliability, Availability Identification & Dynamic Decision Based Replica Distribution for Cloud Computing International Journal of Advance Research in Computer Science and Management Studies, Volume 5, Issue 5, May 2017, Page No. 74-84, ISSN: 2321-7782, Impact Factor: 6.047 May 2017
50 Sumit Nigam “Optimizing Processing Cost of Cloud Computing using Genetic Algorithm” International Journal of Research in Science & Engineering, Vol. 3, Issue 5 Sept-Oct 2017, ISSN:2394-8299 October 2017
51 Sumit Nigam “A Survey to Analyze the Impact of DDOS Attack on Cloud Computing Environment” International Journal of Research in Science & Engineering, Vol. 3,Issue 5 Sept-Oct 2017, ISSN:2394-8299 October 2017
52 Sumit Nigam “Performance Testing of a Hybrid Algorithm based on Throttled and ESCE Load Balancing Algorithm” International Journal of Research in Science & Engineering Vol. 2, Issue 6, 2016, ISSN:2394-8299 June 2016
53 Sumit Nigam “A Survey of Network Intrusion Detection using Soft Computing Techniques” International Journal for Scientific Research and Development Vol. 1, Issue 6, 2013, ISSN:2321-0613 June 2013
54 rahul choudhary nil nil nil
55 Jitendra Sharma Offline Enhancement of website using Web Mining ACCST Research Journal in Vol VIII, Issue 3 July 2010
56 Jitendra Sharma Analysis of Different types of RSS Reader National Multi-Conference on CGTTM 2011
57 Jitendra Sharma A Review on Grid System and Mobile Devices IJRETM, Volume I, Issue I October-2013
58 Jitendra Sharma Comparative Study of Different Techniques for License Plate Recognition JACOTECH Journal  Dec-2013
59 Jitendra Sharma A Hybrid Technique for License Plate recognition based on Feature Selection of Wavelet Transform and Artificial Neural Network ICROIT-2014, IEEE International Conference Feb-2014
60 Jitendra Sharma Facial Expression Recognition Using LBP Template of Facial Parts and Multilayer Neural Network I-SMAC 2017, IEEE organized by SCAD Institute of Technology Feb-2017
61 Jitendra Sharma Automatic Facial Expression Recognition: A Survey Based on Feature Extraction and Classification Techniques International Conference on ICT in Business , Industry and Government 2016 and accepted for IEEE Explorer at SAIT, Indore Nov-2016
62 Jitendra Sharma A Review on Cloud Security Issues IJCESR in Vol III, Issue –I 2016
63 Jitendra Sharma A Review on Security Issues of VANET EXCEL Publication  2018
64 Jitendra Sharma A LOAD AWARE ROUTING TECHNIQUE USING AODV MODIFICATION SMARTCOM 2017 (SPRINGER) 2017
65 Richa Jain Study of Location based Energy Efficient AODVRouting Protocols” MANET,International Journal of Computer Technology & Applications,Vol. 4 (1), 87-91 IJCTA | Jan-Feb 2013.
66 Richa Jain A Novel Energy threshold based Location AidedRouting in MANET  International Journal of Computer Science& Information Technologies, Vol. 4 (2) ,392 – 397 IJCSIT | March-April 2013.
67 Richa Jain “Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud “  International Journal of Computer Science& Information Technologies, Vol. 6 (2) ,1408 – 1414 IJCSIT | March-April 2015 .
68 Richa Jain “A Simplified Rule Based Distributed Information Flow Control for Cloud Computing” International Journal of Computer Science & Information Technologies, Vol. 6 (2) ,1401 – 1407 IJCSIT | March-April 2015
69 Jayesh Surana Energy Saving VOIP over Wireless LAN IEEE International Conference on Adv. in Engg. Science and management, EGS Pillay Engineering Collage, Nagapatinnum March 2012
70 Jayesh Surana A Survey on Different Techniques for Data Classification and Information Extraction from the Websites IJARCSSE, Volume 3, Issue 11 November 2013
71 Jayesh Surana ADVANCE APPROACH FOR DATA CLASSIFICATION USING DISTRIBUTED ASSOCIATION RULES IJMIE, Volume 3, Issue 12 December 2013
72 Jayesh Surana A Literature Survey on Biometric Gait Recognition Methods and Fuzzy Logic IJRATE Volume 1 issue 3  December 2013
73 Jayesh Surana A Novel Method of Gait Recognition Using Fuzzy Inference System IJRATE, Volume 2, Issue 3,  ISSN: 2347 - 7806 June 2014
74 Jayesh Surana Implementation and Comparative Study of Improved Apriori Algoritham for Association Pattern Mining ieeeforum, ICEECMPE, Paper ID IE-EECMPEKOL-11066-1007 June 2016
75 Jayesh Surana An Implementation of Modified AOMDV Routing Protocol in Different Wireless Networks Internation Conference on ICT in Buisness, Indusrty and Government November 16
76 Jayesh Surana Design and Implementation a Smart E-Voting Model: Decentralization using BlockChain IJSRCSEIT UGC Journal No: 64718 July 2019
77 Anand S Gadwal Reverse Engineering: A journey from code to design International Conference (IEEE) on Network and Computer Science, Kanyakumari, India 2011
78 A Review of Content Based Webpage Ranking Algorithms National Conference on Advance in Computer Science & Technology, Indore, India. 2014
79 Improving web search user query relevance using content based page rank IEEE International Conference on Computer Communication and Control (IC4-2015). 2015
80 Hybrid security using digital signature and RSA encryption for aodv in MANET International Journal of Computer Science and Information Technology (IJCSIT 2630-2635-2015). 2015
81 Hadoop Multi Node Cluster Resource Analysis IEEE International Conference on Colossal Data analysis and Networking (CDAN-2016). 2016
82 Wormhole attack detection techniques- a review International Journal of Computer Science and Technology (IJCST 0976-8491). 2016
83 Detection of hidden tunnel attack in mobile ad-hoc network International Journal of Science and Research (IJSR 2319-7046). 2016
84 Secure Data Replication in Distributed System using RSA & SHA-1 algorithm International Journal of Research and scientific innovation (IJRSI 2321-2705). 2017