S.No. |
Author |
Title |
Publication Details |
Date |
1 |
Sachin Yele |
“Wireless Sensor/Actuator Network Design for Heterogeneous and Dynamic Environment with control Mechanism” |
International Journal of computer Engg. And Information Technology, Vol.13 , No. 18 , pp. 1-5 |
June 2009 |
2 |
Sachin Yele |
“A Data Mining Content Based Clustering Technique for E-Mail Content Refinement” |
International Journal of Advanced Engg. And Application |
January 2011 |
3 |
Sachin Yele |
“Web Usage Mining for Pattern Discovery (A Review Paper)” |
International Journal of Advanced Engg. And Application”, Vol. 01 |
January 2011 |
4 |
Sachin Yele |
“Network Intrusion Detection System in Real Time With Data Mining Approach” |
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND COMPUTER APPLICATIONS (IJCECA) |
June 2011 |
5 |
Sachin Yele |
“Subjective Content Accessibility using Database Approach for Digital Library” |
International Journal on Computer Science and Engineering (IJCSE) |
August 2011 |
6 |
Sachin Yele |
“Multilayer Database Approach for web page content & Information Discovery” |
International Journal of Communication, Computation and Innovation- IJCCI |
August 2011 |
7 |
Sachin Yele |
“A Review Study of Mining Frequent Patterns from Weighted Traversals on Graph Using Confidence Interval Priority” |
International Journal of Computer Science and System Analysis Vol. 06 |
January 2012 |
8 |
Sachin Yele |
“Five Steps of Achieving a Good Quality Clustering” |
International Journal of Innovative Trends in Engineering (IJITE) Vol.04 |
November 2016 |
9 |
Sachin Yele |
“An Implementation of Novel Approach for Information Extraction using Ontology” |
International Journal of Science Progress & Research (IJSPR) Vol. 23 |
March 2015. |
10 |
Sachin Yele |
“A software cost & effort estimation for web based application” |
6th National Conference on Information Technology & Energy Management, |
February 2010 |
11 |
Sachin Yele |
“A Model for Network Packet Classification with Intrusion detection and Analysis using data mining techniques” |
1st National Conference on Emerging Trends in Computing ETCOMP-2010, SD Bansal College of Technology Indore |
March 2010, |
12 |
Sachin Yele |
“A Data Mining Approach for Bioinformatics System” |
National Conference on Recent Trends in Soft Computing and Networks Lakshmi Narain College of Technology, Bhopal, India. |
March 2010, |
13 |
Sachin Yele |
“A Trust Model for Wireless Sensor Network Health Monitoring using Fuzzy Logic” |
National Conference on Recent Trends in Soft Computing and Networks Lakshmi Narain College of Technology, Bhopal, India. |
March- 2010, |
14 |
Sachin Yele |
“A Study of Software Reliability Metrics” |
4th National Conference on IT- Contemporary and Future Technologies for Social Change , ITM Universe Gwalior, India. |
March 2011 |
15 |
Sachin Yele |
“Data Mining as a Facilitator for Web” |
4th National Conference on IT- Contemporary and Future Technologies for Social Change ITM Universe Gwalior, India. |
March- 2011, |
16 |
Sachin Yele |
“A Book Recommendation System for Cloud Computing: A Review” |
National Conference on Recent Trends in Computer Technology NCRTCT- 2017,. SIMS, Indore |
March 2017 |
17 |
Sachin Yele |
Challenges and Security issues in Big Data – A Review |
International Conference on Transforming Libraries and Information Centers in Digital Era |
March 2019 |
18 |
Sachin Yele |
"Multilayered Database Approach using Natural Language Processing:- A Review" |
International Conference on Operations Management |
March 2020 |
19 |
Manoj Dhawan |
“Improving Classification Precision of Feature Selection using Genetic Programming” |
IJARCSMS,Vol. 3, Issue , page no.220-226, ISSN(Online): 2321-7782 |
10th Oct 2015 |
20 |
Manoj Dhawan |
“Optimizing Energy Consumption in Wireless Sensor Network Through Distributed Weighted Clustering Algorithm” |
IEEE International Conference on Computer Communication and Control (IC4-2015) to be held during in Indore, M.P,India |
11th Sept 2015 |
21 |
Manoj Dhawan |
“An Efficient RSA Based Technique for the Encryption and Decryption” |
IJCSIT, Volume 6(3) , 2015, page no. 2006-2009, ISSN 0975-9646 |
May 2015 |
22 |
Manoj Dhawan |
"Review of Link Prediction in Temporal Mobile Database” |
International Conference on Systemics, Cybernatics and Informatics (ICSCI-2014) under the aegis of Pentagram Research Centre, India at Hyderabad in the Session CI-4.1 of the conference |
3rd June 2014 |
23 |
Manoj Dhawan |
" SVITS-HDR a new Image Encryption Technique to encrypt high definition images " |
International Journal of Engineering Research & Technology (IJERT) , Vol.2 - Issue 10 (October - 2013), page no. 3572-3576 ISSN: 2278-0181 |
Oct 2013 |
24 |
Manoj Dhawan |
"A Modified Version of Extended Play fair Cipher (8X8)" |
IJECS , Volume 2, page no. 956- 961, ISSN : 2319-7242 |
4th April 2013 |
25 |
Manoj Dhawan |
“An Enhance Security of Play fair Cipher Substitution Using A Simple Columnar Transposition Technique With Multiple Rounds (SCTTMR)” |
IJRCM , Volume 2 Issue 8, 10 , page no.75- 78, ISSN : 2231-5756 |
10th August 2012 |
26 |
Manoj Dhawan |
“Effort Shrinkage Mechanism For Security” |
National Conference on Emerging Technology” to be held in SIMS, Indore |
19th Nov, 2010 |
27 |
Rahul Anjana |
An robust approach for secure sharing using Cloud computing |
IJCSIT, ISSN:0975-9646, Volume 5, Page no 2250-2255 |
Nov 2016 |
28 |
Rahul Anjana |
Result Evaluation of an Robust Approach for Secure Sharing Using Cloud Computing |
IJCSIT, ISSN:0975-9646, Volume 8, Page no 447-454 |
April 2017 |
28 |
Bharat Pahadiya |
ontology and its research |
Rishiraj Institute of technology indore under (RGTMS2011) |
22 Nov 2011. |
29 |
Bharat Pahadiya |
an approach for comparative research between ontology building & learning tools for information extraction & retrieval. |
international journal of electronic communication and computer engineering volume 2 issue 2 ,2011 ISSN 2249-071x |
Nov 2011 |
30 |
Bharat Pahadiya |
A survey on load based routing techniques in wireless ad hoc network” |
international conference on IT in Business,Industry and government organized at the SAIT Indore IEEE conference |
Mar 2014 |
31 |
Bharat Pahadiya |
“An Energy Efficient Cloud Computing Using VM scheduling Algorithm” ISSN 2347 – 7539 July 2014 |
International journal of research in Engineering technology & management |
July 2014 |
32 |
Bharat Pahadiya |
Enhancing the Power Consumption of the Data Centers in Energy Efficient Cloud Computing” ISSN 2250-2459 Volume 5,Issue 5,May 2015 |
International journal of Emerging technology & Advanced Engineering |
May 2015 |
33 |
Bharat Pahadiya |
Detection and Removal of Vampire Attack in Wireless Sensor Network |
International Journal of Computer Applications (0975 – 8887) Volume 126 – No.7, September 2015 |
Sep 2015 |
34 |
Bharat Pahadiya |
An Advanced Technique of Image Matching Using SIFT and SURF |
International Journal of Advanced Research in Computer and Communication Engineering |
May 2016 |
35 |
Bharat Pahadiya |
A load Aware Routing Technique Using AODV Modification |
Second International conference on Smart Trends For Information Technology and Computer Communications (SMART COM- 2017) Springer CCIS publication |
Aug 2017 |
36 |
Gaurav Shrivastava |
Analysis of Cryptosystem using DES with RSA, |
VSRD International Journal of Computer Science and Information Technology, Volume.1 (7), Page No 465-470, 1 October 2011, ISSN: 2231-2471. |
Oct 2011 |
37 |
Gaurav Shrivastava |
An Integrated Encryption Scheme Used in Bluetooth Communication Mechanism, |
VSRD International Journal of Computer Science and Information Technology, Volume. 1 (8), Page No. 567-572, 6 November 2011, ISSN: 2231-2471. |
November 2011 |
38 |
Gaurav Shrivastava |
Secure File Transmission Scheme Based on Hybrid Encryption Technique, |
IJMRA International Journal of Management, IT & Engineering Volume. 2 (Issue 1), Page No. 224 – 238, 1 January 2012, ISSN: 2249-0558. |
Jan2012 |
39 |
Gaurav Shrivastava |
An Enhance Security of Play Fair Cipher Using a Simple Columnar Transposition Technique With Multiple Rounds (SCTTMR), |
International Journal of Research in Commerce, IT & Management, Volume No. 2 (Issue 8), Page No. 75 – 78, 10 August 2012, ISSN: 2231 - 1009 |
Aug 2012 |
40 |
Gaurav Shrivastava |
A MODIFIED VERSION OF EXTENDED PLAFAIR CIPHER (8X8), |
International Journal of Engineering And Computer Science, Volume 2 Issue 4, Page No. 956 -961, 1 May 2013, ISSN: 2319-7242 |
May 2013 |
41 |
Gaurav Shrivastava |
Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique, |
International Journal of Engineering Sciences & Research Technology (IJESRT), Vol. 2 Issue 6, Page No- 1475-1478, 1 June 2013, ISSN: 2277-9655. |
June 2013 |
42 |
Gaurav Shrivastava |
Effective Diagnosis of Diseases through Symptoms Using Artificial Intelligence and Neural Network, |
International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Page No. 2229-2231, Jul-Aug 2013, ISSN: 2248-9622. |
July 2013 |
43 |
Gaurav Shrivastava |
An Approach for Effective Diagnosis of Diseases, |
International Journal of Information & Computation Technology, Volume 4, Number 16 (2014) Page No. 1711-1717, 2014, ISSN 0974-2239 |
Jan 2014 |
44 |
Gaurav Shrivastava |
RAI-DD: Reliability, Availability Identification & Dynamic Decision Based Replica Distribution for Cloud Computing, |
International Journal of Computer Science and Information Technologies, Vol-5 Issue-4, AUG 2014 Page No. 5497-5502, ISSN 0975-9646 |
Aug 2014 |
45 |
Gaurav Shrivastava |
A Novel Method of Video Steganography Using Variable LSB, |
International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 7, Page No. 462-464, July 2015, ISSN 2250-2459. |
Jul 2015 |
46 |
Gaurav Shrivastava |
A review on Attribute Selection for Intrusion Detection System with Evolutionary Algorithm, |
Engineering Universe for Scientific Research and Management, Vol-7, Issue-8, 2015 Page No. 1-5, August 2015, ISSN 2394-6172. |
Aug 2015 |
47 |
Gaurav Shrivastava |
A review on Attribute Selection for Intrusion Detection System with Evolutionary Algorithm, |
Engineering Universe for Scientific Research and Management, Vol-7, Issue-8, 2015 Page No. 1-5, August 2015, ISSN 2394-6172. |
Aug 2015 |
48 |
Gaurav Shrivastava |
A Hybrid Model for Intrusion Detection Based on Genetic Clustering and PSO Algorithm, |
International journal of Master of Engineering Research and Technology, Vol-2, Issue-9, 2015 Page No. 155-160, SEP 2015, ISSN 2394-6172 |
Sep 2015 |
49 |
Gaurav Shrivastava |
Performance Evaluation of Reliability, Availability Identification & Dynamic Decision Based Replica Distribution for Cloud Computing |
International Journal of Advance Research in Computer Science and Management Studies, Volume 5, Issue 5, May 2017, Page No. 74-84, ISSN: 2321-7782, Impact Factor: 6.047 |
May 2017 |
50 |
Sumit Nigam |
“Optimizing Processing Cost of Cloud Computing using Genetic Algorithm” |
International Journal of Research in Science & Engineering, Vol. 3, Issue 5 Sept-Oct 2017, ISSN:2394-8299 |
October 2017 |
51 |
Sumit Nigam |
“A Survey to Analyze the Impact of DDOS Attack on Cloud Computing Environment” |
International Journal of Research in Science & Engineering, Vol. 3,Issue 5 Sept-Oct 2017, ISSN:2394-8299 |
October 2017 |
52 |
Sumit Nigam |
“Performance Testing of a Hybrid Algorithm based on Throttled and ESCE Load Balancing Algorithm” |
International Journal of Research in Science & Engineering Vol. 2, Issue 6, 2016, ISSN:2394-8299 |
June 2016 |
53 |
Sumit Nigam |
“A Survey of Network Intrusion Detection using Soft Computing Techniques” |
International Journal for Scientific Research and Development Vol. 1, Issue 6, 2013, ISSN:2321-0613 |
June 2013 |
54 |
rahul choudhary |
nil |
nil |
nil |
55 |
Jitendra Sharma |
Offline Enhancement of website using Web Mining |
ACCST Research Journal in Vol VIII, Issue 3 |
July 2010 |
56 |
Jitendra Sharma |
Analysis of Different types of RSS Reader |
National Multi-Conference on CGTTM |
2011 |
57 |
Jitendra Sharma |
A Review on Grid System and Mobile Devices |
IJRETM, Volume I, Issue I |
October-2013 |
58 |
Jitendra Sharma |
Comparative Study of Different Techniques for License Plate Recognition |
JACOTECH Journal |
Dec-2013 |
59 |
Jitendra Sharma |
A Hybrid Technique for License Plate recognition based on Feature Selection of Wavelet Transform and Artificial Neural Network |
ICROIT-2014, IEEE International Conference |
Feb-2014 |
60 |
Jitendra Sharma |
Facial Expression Recognition Using LBP Template of Facial Parts and Multilayer Neural Network |
I-SMAC 2017, IEEE organized by SCAD Institute of Technology |
Feb-2017 |
61 |
Jitendra Sharma |
Automatic Facial Expression Recognition: A Survey Based on Feature Extraction and Classification Techniques |
International Conference on ICT in Business , Industry and Government 2016 and accepted for IEEE Explorer at SAIT, Indore |
Nov-2016 |
62 |
Jitendra Sharma |
A Review on Cloud Security Issues |
IJCESR in Vol III, Issue –I |
2016 |
63 |
Jitendra Sharma |
A Review on Security Issues of VANET |
EXCEL Publication |
2018 |
64 |
Jitendra Sharma |
A LOAD AWARE ROUTING TECHNIQUE USING AODV MODIFICATION |
SMARTCOM 2017 (SPRINGER) |
2017 |
65 |
Richa Jain |
Study of Location based Energy Efficient AODVRouting Protocols” |
MANET,International Journal of Computer Technology & Applications,Vol. 4 (1), 87-91 IJCTA | |
Jan-Feb 2013. |
66 |
Richa Jain |
A Novel Energy threshold based Location AidedRouting in MANET |
International Journal of Computer Science& Information Technologies, Vol. 4 (2) ,392 – 397 IJCSIT | |
March-April 2013. |
67 |
Richa Jain |
“Decentralized Firewall as a Service (D-FAAS) Applicability Model with Improved Queuing Using Dynamic Support for Cloud “ |
International Journal of Computer Science& Information Technologies, Vol. 6 (2) ,1408 – 1414 IJCSIT | |
March-April 2015 . |
68 |
Richa Jain |
“A Simplified Rule Based Distributed Information Flow Control for Cloud Computing” |
International Journal of Computer Science & Information Technologies, Vol. 6 (2) ,1401 – 1407 IJCSIT | |
March-April 2015 |
69 |
Jayesh Surana |
Energy Saving VOIP over Wireless LAN |
IEEE International Conference on Adv. in Engg. Science and management, EGS Pillay Engineering Collage, Nagapatinnum |
March 2012 |
70 |
Jayesh Surana |
A Survey on Different Techniques for Data Classification and Information Extraction from the Websites |
IJARCSSE, Volume 3, Issue 11 |
November 2013 |
71 |
Jayesh Surana |
ADVANCE APPROACH FOR DATA CLASSIFICATION USING DISTRIBUTED ASSOCIATION RULES |
IJMIE, Volume 3, Issue 12 |
December 2013 |
72 |
Jayesh Surana |
A Literature Survey on Biometric Gait Recognition Methods and Fuzzy Logic |
IJRATE Volume 1 issue 3 |
December 2013 |
73 |
Jayesh Surana |
A Novel Method of Gait Recognition Using Fuzzy Inference System |
IJRATE, Volume 2, Issue 3, ISSN: 2347 - 7806 |
June 2014 |
74 |
Jayesh Surana |
Implementation and Comparative Study of Improved Apriori Algoritham for Association Pattern Mining |
ieeeforum, ICEECMPE, Paper ID IE-EECMPEKOL-11066-1007 |
June 2016 |
75 |
Jayesh Surana |
An Implementation of Modified AOMDV Routing Protocol in Different Wireless Networks |
Internation Conference on ICT in Buisness, Indusrty and Government |
November 16 |
76 |
Jayesh Surana |
Design and Implementation a Smart E-Voting Model: Decentralization using BlockChain |
IJSRCSEIT UGC Journal No: 64718 |
July 2019 |
77 |
Anand S Gadwal |
Reverse Engineering: A journey from code to design |
International Conference (IEEE) on Network and Computer Science, Kanyakumari, India |
2011 |
78 |
A Review of Content Based Webpage Ranking Algorithms |
National Conference on Advance in Computer Science & Technology, Indore, India. |
2014 |
79 |
Improving web search user query relevance using content based page rank |
IEEE International Conference on Computer Communication and Control (IC4-2015). |
2015 |
80 |
Hybrid security using digital signature and RSA encryption for aodv in MANET |
International Journal of Computer Science and Information Technology (IJCSIT 2630-2635-2015). |
2015 |
81 |
Hadoop Multi Node Cluster Resource Analysis |
IEEE International Conference on Colossal Data analysis and Networking (CDAN-2016). |
2016 |
82 |
Wormhole attack detection techniques- a review |
International Journal of Computer Science and Technology (IJCST 0976-8491). |
2016 |
83 |
Detection of hidden tunnel attack in mobile ad-hoc network |
International Journal of Science and Research (IJSR 2319-7046). |
2016 |
84 |
Secure Data Replication in Distributed System using RSA & SHA-1 algorithm |
International Journal of Research and scientific innovation (IJRSI 2321-2705). |
2017 |