ONLINE COUNSELLING

MANAV RACHNA INTERNATIONAL INSTITUTE OF RESEARCH AND STUDIES

(Formerly MANAV RACHNA INTERNATIONAL UNIVERSITY )

Deemed to be University under section 3 of the UGC Act,1956

Research Publications in International Journals

Manav Rachna International University
Research Publications of Faculty Members in International Journals
(Duration: From starting of career of individual faculty member till date)
S. No.Title of PaperName of All Author(s) as per publication                                           (Sequence First Name, Middle Name and Last Name)Name of Author(s) as per publication (Sequence First Name, Middle Name and Last Name)Name of Outside Author(s) other than MRIU (Sequence First Name, Middle Name and Last Name)Name of JournalJournal Published from                  (Country Name)Name of PublisherVolume/Issue, Page Number(s) and Year of publication             (In sequence only)Publication MonthPublication Year
MRIU Author-1MRIU Author-2MRIU Author-3MRIU Author-4
1Routing in networks using genetic algorithmDr. Meenakshi , Dr. Suresh KumarDr. MeenakshiDr. Suresh KumarNILNILInt. J. Communication Networks and Distributed Systems, Vol. 20, No. 3, 2018InderscienceVol. 20, No. 3, 2018March2018
2Green Database: An Initiative to Enhance Renewable Energy EfficiencyKarishma Gulati, Deepika KhuranaKarishma GulatiDeepika KhuranaInternational Journal of Scientific Research in Computer Science, Engineering and InformationTechnology (IJSRCSEIT)IndiaTechnoscience AcademyVol-3,Issue3March-April2018
3Natural Language Processing for Hybrid Knowledge Representation.Dr. Poonam Tanwar, Dr. T.V Prasad, Dr. Kamlesh DuttaDr. Poonam TanwarNILNILNILDr. T.V Prasad, Dr. Kamlesh DuttaInt. J. Advanced Intelligence Paradigms, Vol. 10, No. 3, 2018SwitzerlandInderscienceVol. 10, No. 3, PP 223, 235,                        ISSN online: 1755-0394
ISSN print: 1755-0386                         DOI: 10.1504/IJAIP.2018.10011379
March2018
4Dynamic Priority based packet handling protocal fro WBANMadhumita Kathuria, Dr. Sapna GambhirMadhumita KathuriaNILNILNILDr. Sapna GambhirInternational Journal of Computational Systems EngineeringInderscienceVol. 4, Issue 1March2018
5Improvised divide and conquer approach for the LIS problemSeema Rani, Dr Dharmveer Singh RajpootSeema RaniNILNILNILDr Dharmveer Singh RajpootJournal of Discrete AlgorithmsEnglandElsevierVol. 48, pg. 17-26, 2018February2018
6ON THE SECURITY OF OPEN SOURCE SOFTWARE.Prattay Sanyal1 , Shubham Sharma1 , DeepaBura2 and Prasenjit Banerjee2Prattay SanyalShubham SharmaDeepa BuraPrasenjit BanerjeeInternational Journal of advanced Research(IJAR)IndiaIJARVolume 5, Issue 11,pp-1338-1348February2018
7A Novel UML Based Approach for Early Detection of Change Prone ClassesDeepa Bura, Amit Choudhary, R.K. SinghDeepa BuraNILNILNILAmit Choudhary, R.K. SinghInternational Journal of Open Source Software and Processes (IJOSSP)IGI GlobalVol. 8, Issue 3, Article 1.February2018
8Emotion Recognition via EEG using Neural Network ClassifierRashima MahajanRashima MahajanNilNilNilNilSoft Computing Theories and Applications-2016, Vol 2, AISC series of SPRINGERSingaporeSpringer583, 429-438, 2018February2018
9Symmetric wavelet Analysis towards MRI Image CompressionEkta Soni and Rashima MahajanRashima MahajanNilNilNilEkta SoniSoft Computing Theories and Applications-2016, Vol 2, AISC series of SPRINGERSingaporeSpringer583, pp. 533-547, 2018February2018
10A Novel UML Based Approach for Early Detection of Change Prone ClassesDeepa Bura, Amit Choudhary, R.K. SinghDeepa BuraAmit Choudhary, R.K. SinghInternational Journal of Open Source Software and Processes (IJOSSP)United StatesIGI GlobalVol. 8, Issue 3, Article 1.January2018
11Medical Image Contrast Enhancement using Range Limited Weighted Histogram EqualizationMonika Agarwal, Rashima MahajanRashima MahajanNilNilNilMonika AgarwaProcedia Computer Science ElsevierElsevier, Science Direct125, 149-156, 2018January2018
12Mobile devices and Communication Security from Vulnerabilities, Malacious Attacks with its SolutionVaibhav, Himanshu, Ruhani, Poonam NandalVaibhavHimanshuRuhani Poonam NandalJournal of Engineering and Applied SciencesPakistanMedwell JournalsVolume 12 Issue 5, 2018January2018
13Reconstructing missing hourly real-time precipitation data using a novel intermittent sliding window period algorithm for automatic weather station data of IMDHema N, Krishna KantKrishna KantNANANAHema NJournal of Meteorological Research (Springer)NANA31(4), 774-790, doi:10.1007/s13351-017-6084-8.NA2017
14A Novel Approach to Fish Disease Diagnostic System based on Machine LearningShaveta Malik,
Tapas Kumar
Shaveta MalikNILNILNILTapas KumarAdvances in Image and Video processingUKSociety for Science and EducationVolume 5, Issue 1, PP 49-57March2017
15A Survey: Ad-hoc On-Demand Distance Vector ProtocolMeeta SinghNILNILNILNILSudeep KumarInternational Journal of Computer Applications, (0975 – 8887)USAFoundation of Computer ScienceVol. 161, No. 1, PP  38-44March2017
16MOBILE APPLICATION FOR VEHICULAR AUTO LOCKING SYSTEMMayank Dogra,Yuvraj Singh,Neeraj Bhateja , Dr. Meeta SinghMayank DograYuvraj SinghNeeraj BhatejaDr. Meeta SinghInternational Journal of Advanced Research in Computer ScienceIndiaVolume 8, No. 7,  2017July – August2017
17A Teaching Learning Based Optimization Algorithm for Cluster Head Selection in Wireless Sensor NetworksAmita Yadav, Suresh KumarAmita YadavSuresh KumarNILNILNILInternational Journal of Future Generation Communication and NetworkingSouth KoreaSERSCVol. 10, No. 1 (2017), pp. 111-122
http://dx.doi.org/10.14257/ijfgcn.2017.10.1.10
January2017
18A Framework for Real-Time Sentiment Analysis of On-line Micro-texts with Sentiment Drift Detection MethodRitesh Srivastava, M.P.S. BhatiaRitesh SrivastavaNANANAM.P.S. BhatiaInternational Journal of Software Engineering and Its ApplicationsAustraliaSCERCvol. 11, no. 1, pp. 67-76, 2017Feb2017
19A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprintIshan Bhardwaj, Narendra D Londhe, and Sunil Kumar KopparapuIshan BhardwajNILNILNILNarendra D Londhe, and Sunil Kumar KopparapuPattern RecognitionUnited KingdomElseviervol. 62, pp. 214–224, 2017Feb2017
20Design and Implementation of Wireless Body Area Network using physiological parametersSavita Sindhu, Dr. Shruti VashistSavita SindhuDr.Shruti VashisthNILNILNILJournal of Biomedical Engineering and Medical ImagingUK Society for Science and EducationVOLUME 4 NO. 103rd March2017
21BER Based Performance Analysis of 2×1 Alamouti’s Diversity and 4×4 MIMO Diversity with Interleaver and Encoder for BPSK, QPSK and QAMJaya Dagur, Savita SindhuSavita SindhuNILNILNILJaya dagurInternational Journal of Information Engineering and Electronic Business(IJIEEB)HONG KONGMECS PublisherIJIEEB Vol.9, No.1 January 20172017
22A survey on multi-objective task scheduling algorithm in cloud environmentTanvi Gupta, Prof.(Dr.)SSHanda,Prof.(Dr.)Supriya PandaTanvi GuptaProf.(Dr.)Supriya PandaNILNILProf. (Dr.)SSHandaInternational Journal of Computer Science and Information Security (IJCSIS),USVol. 15, No. 12, December 2017,pp144-151430702017
23A Survey on Honey Bee Foraging Behavior and Its  improvised Load Balancing TechniqueTanvi Gupta, Dr.SS.Handa, Dr. Supriya PandaTanvi GuptaProf.(Dr.)Supriya PandaNILNILProf.(Dr.)SS HandaInternational Journal for Research in Applied Science & Engineering Technology (IJRASET)India(UGC Approved)Volume 5 Issue XI November 2017430402017
24A Review on Optimizing Radial Basis Function Neural Network using Nature
Inspired Algorithm
Ms. Tanvi Gupta 1.Prof. Supriya P Panda,Prof.   S.S. Handa  andProf. M.V.Ramana MurthyTanvi GuptaProf.(Dr.)Supriya PandaNILNILProf. (Dr.)SSHanda,Prof. RamanamurthyInternational Journal on Future Revolution in Computer Science & Communication EngineeringIndia(UGC Approved)Volume: 3 Issue: 10,October 2017,pp49-57430092017
25Efficient Data Clustering Algorithm Designed for 2-D datasetHimanika, Vishesh, Poonam NandalHimanika Vishesh Poonam NandalJournal of Engineering and Applied SciencesPakistanMedwell JournalsVolume 12 Issue 21, 2017December2017
26A Review: Analysis and Comparison of Different Detection Techniques of IDPSNavjot Kamboj , Simar Saggu , Aditya Lamba and Meeta SinghNavjot KambojSimar SagguAditya LambaDr. Meeta SinghJournal of Engineering and Applied SciencesPakistanMedwell JournalsVolume 12 Issue 22, 2017December2017
27Real Time EEG based Cognitive Brain Computer Interface for control Applications via Arduino InterfacingRashima MahajanRashima MahajanDipali BansalNilNilNilProcedia Computer Science ElsevierElsevier, Science Direct115, pp. 812-820, 2017November2017
28Medical Images Contrast Enhancement using Quad Weighted Histogram Equalization with Adaptive Gama Correction and Homomorphic FilteringMonika Agarwal, Rashima MahajanRashima MahajanNilNilNilMonika AgarwaProcedia Computer Science ElsevierElsevier, Science Direct115, 509-517, 2017November2017
29Challenges and Issues in Cloud EnvironmentNitin Ayush Yash Poonam NandalPoonam NandalNitinAyushYashNILJournal of Engineering and Applied SciencesUAEMEDWELLVolume: 12, Issue: 11, Page No.: 3008-3013, DOI: 10.3923/jeasci.2017.3008.3013August2017
30Real-time Unspecified Major Sub-Events detection in the Twitter Data Stream That Cause the Change in Sentiment Score of the Targeted EventRitesh Srivastava, M.P.S. BhatiaRitesh SrivastavaNANANAM.P.S. Bhatia IJITWE, IGI Global, USAUSAIGI GlobalVol 12, No.4, pp1-21August2017
31Semantic Analysis Based Approach for Relevant Text Extraction Using OntologyPoonam Chahal, Manjeet Singh, Suresh KumarPoonam ChahalSuresh KumarNILNILNILInternational Journal of Information Retreival ResearchUSAIGI GlobalVolume 7, Issue 4, Pg 19-36July2017
32Off-line Versus On-line Sentiment Analysis Issues with Sentiment Analysis of On-line Micro-textsRitesh Srivastava, M.P.S. BhatiaRitesh SrivastavaNANANAM.P.S. BhatiaIJIRR,  IGI Global, USAUSAIGI GlobalVol. 7, No. 4, pp-1-18July2017
33Challenges with Sentiment Analysis of On-line Micro-textsRitesh Srivastava, M.P.S. BhatiaRitesh SrivastavaNANANAM.P.S. BhatiaInternational Journal of Intelligent Systems and ApplicationsHonk KongMECSVol. 9, No. 7,  PP.31-40, 2017July2017
34Effective Surveillance and Predictive Mapping of Mosquito-Borne Diseases Using Social MediaVinay Kumar Jain, Shishir KumarVinay KumarnilnilnilShishir KumarJournal of Computational ScienceUSAelsevier(doi.org:10.1016/j.jocs.2017.07.003)July2017
35WBAN Mitigation method: Comparison of Diversity Techniques in fadingSavita Sindhu, Dr. Shruti VashistSavita SindhuDr.Shruti VashisthNILNILNILJournal of Biomedical Engineering and Medical ImagingUK Society for Science and EducationVOLUME 4, NO. 3June2017
36Query Information Retreival Process in Social MediaSimran Goyal, Charu VirmaniSimran GoyalCharu VirmaniNILNILNILInternational Journal of Advanced ResearchUnited KingdomIJAR5(6), PP 1691-1696June2017
37Analysis of Various Social Network Management SystemsSaksham kapurSaksham KapurCharu VirmaniNILNILNILInternational Journal of Advanced ResearchUnited KingdomIJAR5(6)PP 1697-1703June2017
38Characterising User Demographics across Social NetworkCharu Virmani, Anuradha PillaiCharu VirmaniNILNILNILAnuradha PillaiInternational Journal of Advanced ResearchUnited KingdomIJAR5(6) PP 2308-2312June2017
39Security breaches in trust management scheme in Mobile Ad-Hoc NetworkBindiya Bhatia, Dr. M.K. Soni, Dr. Parul TomarBindiya BhatiaDr. M. K. SoniNILNILDr. Parul TomarInternational Journal of Advanced ResearchUKIJARVolume 5 issue 6June2017
40An Insight To Load Balancing in Cloud Computing TechnologyKarishma Gulati, Pronika Chawla, Ekta MalhotraKarishma Gulati Pronika ChawlaEkta MalhotraInternational Journal of Latest Trends in Engineering and TechnologyIndiaVol-8,Issue3, Page no-130-134May2017
41Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc NetworksBindiya Bhatia, Dr. M.K. Soni, Dr. Parul TomarBindiya BhatiaDr. M. K. SoniNILNILDr. Parul TomarInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 163 No 7April2017
42Analysis of Prediction Techniques based on classification and regression.Pinki SagarPinki SagarNILNILNILNILInternational Journal of Computer ApplicationsUSAFCSVolume 163 – No 7, PP 47-51April2017
43Simulation and control of a complex nonlinear dynamic behavior of multi-stage evaporator using PID and Fuzzy-PID controllersOm Prakash Verma,Gaurav Manik,Vinay Kumar JainVinay KumarnilnilnilOm Prakash Verma,Gaurav ManikJournal of Computational ScienceUSAElsevier(http://doi.org/10.1016/j.jocs.2017.04.001)March2017
44A Survey: Ad-hoc on Demand Distance Vector (AODV)Meeta Singh, Sudeep KumarSudeep KumarInternational Journal of Computer Applications (0975 – 8887)USAFoundation of Computer ScienceVolume 161 ,38-44, 2017March2017
45Comparative Analysis of Various Similarity Measures for Finding similarity of two documents.Maedeh Afzali, Suresh KumarMaedeh AfzaliSuresh KumarNILNILNILInternational Journal of Database Theory and ApplicationAustraliaSERSCVol.10, No.2 (2017), pp.23-30February2017
46Exploring the Relationships between Design Measures and Change Proneness in Object-Oriented SystemsDeepa Godara, Rakesh Kumar SinghDeepa GodaraDr.  Rakesh Kumar SinghInternational Journal of Software Engineering, Technology and ApplicationsSwitzerlandInderscienceVolume 2 , Issue 1, pp. 64-80,2017January2017
47Trust aware cooperative optimised link state routing protocolPR Vamsi, K KantKrishna KantNANANAP R VamsiAdvanced Computing & Communication Technologies(ACCT)NANANAJanuary2017
48Extraction of Emotions from Multilingual Text Using Intelligent Text Processing and Computational LinguisticsVinay Kumar Jain, Shishir Kumar,Stevan FernandesVinay KumarnilnilnilShishir Kumar,Stevan FernandesJournal of Computational ScienceUSAElsevierVol.21,pp.316-326January2017
49Web Documents Ranked Using Extended Document OntologyPoonam Chahal, Manjeet Singh, Suresh kumarPoonam ChahalSuresh KumarManjeet SinghInternational Journal of Web ScienceInderscienceVolume 3, No 1January2017
50On the Security of Open Source SoftwarePrattay Sanyal , Shubham Sharma , Deepa Bura and Prasenjit Banerjee.Prattay SanyalShubham Sharma Deepa Bura Prasenjit Banerjee.International Journal of advanced Research(IJAR)United KingdomInternational Journal of advanced Research(IJAR)Volume 5, Issue 11, pp-1338-13482017
51A novel Optimization Model for Efficient Packet Classification in WBAN.Madhumita Kathuria and Sapna GambhirMadhumita KathuriaNILNILNIL Sapna Gambhir International Journal of Energy, Information and CommunicationsKOREAScience & Engineering Research Support soCietyVol.7, Issue 4, pp.1-10,  2016Sept2016
52Trust and Location-Aware Routing Protocol for  Wireless Sensor NetworksPR Vamsi, K KantKrishna KantNANANAP R Vamsi IETE Journal of ResearchNATaylor and Francis62(5),634-644NA2016
53Testbed Evaluation Of Self-Adaptive Trust model for cooperative geographic  Routing in wireless sensor networksPR Vamsi, K KantKrishna KantNANANAP R VamsiInternational Journal on  Smart Sensing and Intelligent SystemsNAS2IS9(3):1362-1383NA2016
54Real-Time Rainfall Estimation for Improved Smart Irrigation System Using Nearby Automated Weather StationHema N, Krishna KantKrishna KantNANANAHema N British Journal of Applied Science & Technology.NANA8(5), 1-13, (h5-index [9], h5-median [14]). DOI: 10.9734/BJAST/2016/30934.NA2016
55A Clustering Algorithm with reduced Cluster Head Variation in LEACH ProtocolPayal Khurana Batra, Krishan kantKrishna KantNANANAPayal Khurana BatraInternational Journal of Systems, Control and CommunicationsNANAVol. 7, No.4, 2016NA2016
56An improved cluster head selection algorithm using MAC LayerPayal Khurana Batra, Krishan kantKrishna KantNANANAPayal Khurana BatraInternational Journal of Sensor NetworksNANApp 75-86, Vol. 22, No. 2NA2016
57Extension of K-Modes Algorithm for Generating Clusters AutomaticallySuresh Kumar, Anupama LuthraAnupama LuthraSuresh KumarNILNILNILInternational Journal of Information Technology and Computer Science (IJITCS)HONG KONGMECS Publisher 3, 51-57
Published Online  (http://www.mecs-press.org/)
DOI: 10.5815/ijitcs.2016.03.06
March2016
58Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNsKaebeh Yaeghoobi S.B., M.K. Soni, and S.S. TyagiKaebeh Yaeghoobi S.B.M.K. Soni S.S. TyagiNILNILInternational Journal of Computer Network and Information SecurityHONG KONGMECS Publisher1, 9-17, Published Online (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.01.02January2016
59Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verification SystemIshan Bhardwaj, Narendra D Londhe, and Sunil Kumar KopparapuIshan BhardwajNANANANarendra D Londhe, and Sunil Kumar KopparapuIEEE AccessUSIEEEvol. 5, pp. 595-606, 2016Dec2016
60A Novel Behavioural Biometric Technique for Robust User AuthenticationIshan Bhardwaj, Narendra D Londhe, and Sunil Kumar KopparapuIshan BhardwajNANANANarendra D Londhe, and Sunil Kumar KopparapuIETE Technical ReviewUnited KingdomTaylor and Francisvol. 34(5), pp.478-490, 2017Aug2016
61Improvement of QoS parameters in Dynamic and heterogeneous WBANMadhumita Kathuria, Dr. Sapna GambhirMadhumita KathuriaDr. Sapna GambhirIndonesian Journal of Elecrical Engineering and InformaticsIAESVol. 4 , No. 4December2016
62Performance Optimization in WBAN Using Hybrid BDT and SVM ClassifierMadhumita Kathuria and Sapna GambhirMadhumita KathuriaNILNILNIL Sapna GambhirInternational Journal of Information Technology and Computer ScienceHONG KONGMECS Publisher8(12), Pg 83-90December2016
63An Enhanced Distributed Energy-Efficient Clustering (DEEC) Protocol for Wireless Sensor NetworksAmita Yadav, Suresh KumarAmita YadavSuresh KumarNILNILNILInternational Journal of Future Generation Communication and NetworkingSouth KoreaSERSCVol. 9, No. 11 (2016), pp. 49-58
http://dx.doi.org/10.14257
/ijfgcn.2016.9.11.05
December2016
64A Software Metric for the Activeness of a Local Area  NetworkNidhi Garg, Sachin LakraNidhi GargNILNILNILSachin LakraInternational Journal of Computer Applications (0975 – 8887)USAFoundation of Computer ScienceVolume 156 – No 10December2016
65Empirical Study of Impact of Various  Concept Drifts in Data Stream Mining MethodsVeena Mittal, Indu KashyapVeena MittalIndu KashyapNILNILNILI.J. Intelligent Systems and ApplicationsHONG KONGMECS PublisherIJISA-V8-N12-8December2016
66Trust Aware Cooperative Routing Method for WANETsP. Raghu Vamsi, Krishna KantKrishna KantNANANAP. Raghu VamsiSecurity and Communication NetworkNANANADecember2016
67An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data OutsourcingVasudha Arora, S. S. TyagiVasudha AroraS. S. TyagiNILNILNILInternational Journal of Computer Network and Information SecurityHONG KONGMECS Publisher 11, 65-71 Published Online in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.11.08November2016
68A Lexical Approach for Opinion Mining in TwitterDeebha Mumtaz, Bindiya AhujaDeebha MumtazBindiya AhujaNILNILNILInternational Journal of Education and Management EngineeringHONG KONGMECS Publisher4, 20-29 Published Online July 2016 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2016.04.03July2016
69Vertical Handoff Decision Algorithm based on PRSS and Dwell TimeJyoti Madaan, Indu KashyapJyoti MadaanIndu KashyapNILNILNILInternational Journal of Computer Network and Information SecurityHONG KONGMECS PublisherPP.31-42, DOI: 10.5815/ijcnis.2016.07.05July2016
70LDAT: LFTM based Data Aggregation and Transmission Protocol for Wireless Sensor Networks.Mukesh Kumar. Kamlesh DuttaMukesh KumarNANANAKamlesh DuttaJournal of Trust Management,GermanySpringerVol 3, Issue 2.pp 1-20.July2016
71Comparison Analysis of proposed DPPH Protocol for Wireless Body Area NetworkMadhumita Kathuria and Sapna GambhirMadhumita KathuriaNILNILNIL Sapna GambhirInternational Journal of Computer Applications, (0975 – 8887)USAFoundation of Computer Science Volume 144 , No.10, pp-36-41,  2016.June2016
72Trust Aware Data Aggregation and intrusion Detection System for Wireless Sensor NetworksP. Raghu Vamsi, Krishna KantKrishna KantNANANAP. Raghu VamsiINTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMSNANANAJune2016
73Detecting Sybil Attacks in Wireless sensor Networks using Sequential AnalysisP. Raghu Vamsi, Krishna KantKrishna KantNANANAP. Raghu VamsiINTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMSNANANAJune2016
74Comparison Analysis of edge detection between gray scale and color imageShaveta Malik, Tapas KumarShaveta MalikNILNILNILTapas KumarCommunications on Applied Electronics (CAE) – ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USAUSAFoundation of Computer ScienceVolume 5– No. 2, Pg. 38-43May2016
75Analyzing Multiple Routing ConfigurationMeenakshi Moza, Suresh KumarMeenakshi MozaSuresh KumarNILNILNILInternational Journal of Computer Network and Information SecurityHONG KONGMECS Publisher5, 48-54, Published Online May 2016 in MECS (http://www.mecs-press.org/)May2016
76Various Edge Detection Techniques on different categories of FishShaveta Malik, Tapas KumarShaveta MalikNILNILNILTapas KumarInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 135, No. 7, Pg 6-11February2016
77Survey and Comparative study on Statistical tools for Medical Images”Madhulika, Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar YadavMadhulikaNANANAProf.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar YadavAdvance Science
Letters, American science Publishing.
USAAmerican science Publishing.21NOV2015
78Self adaptive trust model for secure geographic routing  in wireless sensor networksPR Vamsi, K KantKrishna KantNANANAP R VamsiInternational Journal of Intelligent systems and ApplicationsNANA7(3),21NA2015
79Detecting Location-Based Attacks in Wireless Sensor  Networks Using Sequential AnalysisRV Potukuchi, K KantKrishna KantNANANARV PotukuchiIETE Journal of ResearchNANA61 (5), 541-551NA2015
80Cloud based Financial Market Prediction through Genetic Algorithms: A ReviewNitasha Soni, Tapas KumarNitasha SoniNANANADr Tapas KumarInternational Journal of Computer Applications (ISSN: 0975 – 8887) Volume 123 – No.8, August 2015USAFoundation of Computer Science(ISSN: 0975 – 8887) Volume 123 – No.8, August 2015Aug2015
81Design of a novel search engine for prospective question answeringRosy Madaan, A.K. Sharma, Ashutosh DixitRosy MadaanA.K. Sharma, Ashutosh DixitInternational Journal of Information retrieval researchUSAIGI GlobalVol 4  Issue 2420952015
82Improvement in Rebalanced CRT RSASeema Verma, Deepak GargSeema VermaDeepak GargInternational Journal of Information Technology (IAJIT)Jordan (Arab) Zarqa University, JordanVol. 12, No. 6, 524-531, Nov. 2015November2015
83Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc NetworksBindiya Ahuja,
M. K. Soni,
Parul Tomar
Bindiya AhujaM. K. SoniNILNILParul TomarInternational Journal of Computer Network and Information SecurityHONG KONGMECS PublisherVol. 7, No. 11, PP 37-45October2015
84Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud ComputingVasudha Arora,
S. S. Tyagi
Vasudha AroraS. S. TyagiNILNILNILInternational Journal Of Computer ApplicationUSAFoundation of Computer ScienceVolume 127,
No. 12, Pg 46-51.
October2015
85Change Point Detection in the midst of Mutual Exclusive Distributive Clustering ProtocolUrvashi ChughUrvashi ChughNILNILNILNILWulfenia JournalAustriaWulfenia JournalVol 22, No. 10; Pg 311-319October2015
86A Survey Analysis of Routing Protocols in Wireless Sensor NetworksKaebeh Yaeghoobi,
Dr. M. K. Soni,
Dr. S. S. Tyagi
Kaebeh YaeghoobiDr. M. K. SoniDr. S. S. TyagiNILNILInternational Journal of Engineering and Technology (IJET), ISSN 0975-4024GermanyScience Publishing Corporation Inc.Volume 7, No 4, Pg No 1432-1437August2015
87Experimental Analysis of OLSR and DSDV
routing Protocols in Mobile Ad Hoc
Networks
Shelja Sharma,
Suresh Kumar
Shelja SharmaSuresh KumarNILNILNILInternational Journal of Computer Network and Information SecurityHONG KONGMECS PublisherVolume 7,
No. 8, ISSN:
2074-9104
(Online), pg. 21-29
July2015
88Real time man machine interface and control using delebrate eye blinkDipali Bansal, Rashima Mahajan, Sujit Roy, Dheeraj Rathi, Shweta SinghDipali BansalRashima MahajanSujit RoyDheeraj Rathi, Shweta SinghInternational Journal Biomedical Engineering and TechnologySwitzerlandInderscience PublishersVol18,No.4, July 2015July2015
89Performance Analysis of Image Denoisinng using Different  TechniquesSunita Virmani, P.K.SinghalSunita VirmaniNILNILNILP.K.SinghalInternational Journal of Advanced Scientific and Technical ResearchFranceIJASTVol 3,Issue-5,May-June 2015,ISSN 2249-9954June2015
90Relation based measuring of semantic similarity for Web documentsPoonam Chahal, Manjeet Singh, Suresh KumarPoonam Chahal Suresh KumarNILNIL Manjeet SinghInternational Journal Of Computer ApplicationUSAFoundation of Computer ScienceVolume 119 – No.7, 26-29June2015
91Vertical Handoff Decision Strategies in Heterogeneous Wireless NetworksJyoti Madaan, Indu KashyapJyoti Madaan Indu KashyapNILNILNILCommunications on Applied Electronics (CAE) – ISSN : 2394-4714USAFoundation of Computer Science FCSVolume 2 – No.1, 43-50,June 2015JUNE2015
92Simulation Study of Variants of Transmission Control ProtocolMeenakshi Moza , Suresh KumarMeenakshi Moza Suresh KumarNILNILNILFoundation of Computer Science FCSNew York, USAFoundation of Computer Science FCSVolume 2 – No.1, June 2015 ,ISSN : 2394-4714June2015
93Wormhole Attack Detection and Data Aggregation Algorithm for Wireless Sensor Networks, ,.Mukesh Kumar. Kamlesh DuttaMukesh KumarNANANAKamlesh Dutta Int. J. Convergence Computing, , Special Issue on: “Mobile Computing, Wireless Networks and e-Learning”SwitzerlandInderscienceVol. 1, No. 3/4, pp. 202, 215June2015
94Depression Diagnosis and Management using EEG Based Affective Brain Mapping in Real Time’.(Scopus Indexed).Rashima Mahajan, Dipali BansalRashima MahajanDipali BansalNilNilNilInternational Journal of Biomedical EngineeringUSAInderscienceVol. 18, No. 2, 2015 Pp: 115 – 137June2015
95Career Path Suggestion using String Matching and Decision TreesAkshay Nagpal,                              Supriya P PandaSupriya P  PandaNANANAAkshay NagpalInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 117 – No. 7, May 2015May2015
96Online Methods of Learning in concept driftVeena Mittal ,Indu KashyapVeena MittalIndu KashyapNILNILNILInternational Journal of Computer ApplicationsUSAIJCAVolume 117(13):18-22,2015May2015
97DDoS Attacks & Deffence Mechanisms and its Mitigation TechniquesRitu Maheshwari Bansal, Deepika Khurana, Ritika BatejaDeepika KhuranaRitika BatejaRitu Maheshwari BansalInternational Journal of Advanced Technology in Engineering and ScienceVolume No 3, Special Issue no 01,ISSN No 2348-7550April2015
98LEACH-MAC: a new cluster head selection algorithm for   Wireless Sensor NetworksPayal Khurana Batra, Krishan kantKrishna KantNANANAPayal Khurana BatraWireless NetworksNANA 22 (1), 49-60April2015
99Automated cardiac state diagnosis from hybrid features of ECG using neural network classifierRashima Mahajan, Dipali BansalRashima MahajanDipali BansalNilNilNilInternational Journal Biomedical Engineering and TechnologyUSAInderscience PublishersVol 17 No.3, 209-231March2015
100An Overview of Vertical Handoff Decision AlgorithmJyoti Madaan, Indu KashyapJyoti Madaan Indu KashyapNILNILNILInternational Journal of Computer Applications (0975 – 8887)USAFoundation of Computer Science FCSVolume 111 – No 3, 10-15,February 2015February2015
101Survey and Comparative study on Statistical tools for Medical Images”Madhulika, Prof.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar YadavDr. MadhulikaNILNILNILProf.(Dr.) Abhay Bansal, Prof.(Dr.) Divakar YadavAdvance Science
Letters, American science Publishing.
USAAmerican science Publishing. Volume 21, Number 1,  pp. 74-77(4)January2015
102Enhancing Frequency Based Change Proneness Prediction Method Using
Artificial Bee Colony Algorithm
Deepa Bura, Rakesh Kumar SinghDeepa BuraNILNILNILRakesh SinghAdvances in Intelligent and Soft Computing (Springer) SeriesSwitzerlandSpringerVolume 320, pp 535-543September2014
103HTTP Packet Inspection Policy for improving internal Network SecurityKuldeep Tomar, S. S. TyagiS. S. TyagiNILNILNILKuldeep TomarInternational Journal of Computer Network and Information SecurityHONG KONGMECS PublisherVol. 6, No. 11,PP- 35-42Octomber2014
104An improved trusted greedy perimeter stateless  routing for wireless sensor networksPR Vamsi, K KantKrishna KantNANANAPR VamsiInternational Journal of Computer Network and Information SecurityNANA6 (11), 13 -19NA2014
105Analysis of Node Behavior for Multi Channel Environment in Mobile- Ad hoc NetworksKanika Garg, Rishi Pal Singh, RituKanika GargNILNILNILRishi Pal Singh, RituJournal of Next Generation Information TechnologyKoreaAICITVol. 5, No. 2, pp. 32 – 37, 2014July2014
106Performance Evaluation of Secure and Efficient AODV (SE-AODV) using NS2Meeta SinghMeeta SinghNILNILNILNILInternational Journal of Computer Applications (0975 – 8887)USAFoundation of Computer ScienceVol. 97 No. 17, Pg 9-13, 2014July2014
107An Effective Reasoning Algorithm for Question Answering System. (pp. 52-57).Dr. Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh DuttaPoonam TanwarNANANADr. Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh DuttaInternational Journal of Adv. Computer Sc. and Applications, Special Issue on Natural Language Processing, United Kingdom,JapanSAI(IJACSA), Special Issue on Natural Language Processing, Vol 4, No 1, 2014Jan2014
108Hybrid Web-page Segmentation and Block Extraction for Small Screen TerminalsShefali Singhal,Neha GargShefali SinghalNeha GargNILNILNILInternational Journal of Computer Application(IJCA)USAFoundation of Computer Science (FCS)Confluence 2013 – Number 212-13 Jan2014
109Quantifying the Impact of Flood Attack on Transport Layer ProtocolKuldeep Tomar, S. S. TyagiS. S. TyagiNILNILNILKuldeep TomarInternational Journal on  Computational Sciences & Applications (IJCSA)AustraliaWSP, SydneyVol. 4, No. 6, Pg 79-87December2014
110Understanding change proneness in Object Oriented softwareDeepa BuraDeepa BuraNILNILNILNILInternational Journal for Computer ApplicationUSAFoundation of Computer ScienceVol. 107, No. 1,
Pg 7-12
December2014
111Identification of Query Forms for Retrieving the Information from Deep WebNripendra Narayan Das, Ela KumarNN DasNANANAEla KumarTransactions on Machine Learning and Artificial Intelligence,United KingdomTMLAIVolume 2 No 6,  pp: 53-61,  2014December2014
112A Review of Studies on Change Proneness Prediction in Object Oriented SoftwareDeepa Godara, Rakesh Kumar SinghDeepa GodaraDr.  Rakesh Kumar SinghInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVol. 105 No.3 ,pp 35-41,2014November2014
113Simulation And Analysis Of AODV, DSDV And ZRP Protocol In MANETNeha Jain,
Dr. Yogesh Chaba
Neha JainNILNILNILDr. Yogesh ChabaInternational Journal of Computer Science  and Engineering (IJCSE)USAIASET, USAVol. 3, Issue 6, Pg 17-24November2014
114Two queue based scheduling algorithm for CPU SchedulingSrishty Jindal
Priyanka Grover
Srishty JindalPriyanka GroverNILNILNILInternational Journal for Computer ApplicationUSAFoundation of Computer ScienceIssue 5, Volume 105, pg n. 21-24
ISSN (0975-8887)
November2014
115Enhancing  Network Security and Performance using Optimized ACLsKuldeep Tomar, S. S. TyagiS. S. TyagiNILNILNILKuldeep TomarInternational Journal  in Foundations of Computer Science and Technology(IJFCST)AustraliaWSP, SydneyVol. 4, No. 6, Pg 25-35November2014
116Time Quantum based CPU Scheduling AlgorithmMayank Parashar,Amit ChughAmit ChughMayank PrasharNILNILNILInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 98– No.3, July 2014, pg n. 45-48
ISSN (0975-8887)
JULY2014
117A New Hybrid Model for Predicting Change Prone Class in Object Oriented SoftwareDeepa GodaraDeepa GodaraNILNILNILR.K. SinghInternational Journal of Computer
Science and Telecommunications
United KingdomIJCSTVolume 5, Issue 7, Pg 1-6, July 2014July2014
118Real Time Acquisition and analysis of neural response for rehabilitative controlDipali,Rashima Singh,Shweta Singh,Dheeraj Rathee,Sujit RoyDipali BansalRashima SinghShweta SinghDheeraj Rathee,Sujit RoyInternational Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical EngineeringUSAWorld Academy of Science, Engineering and TechnologyVol8,issue 5,2014June2014
119Security Threats in WSN and their CountermeasuresMukesh Kumar. Kamlesh DuttaMukesh KumarNANANAKamlesh DuttaCase Studies in Secure Computing Achievements and Trends, Edited by Biju Issac and Nauman Israr,  pp. 207–238, CRC Press,U.K.Taylor and FrancisChapter 11May2014
120Impact of Wormhole Attack on Data Aggregation in Hierarchical WSN,Mukesh Kumar. Kamlesh DuttaMukesh KumarNANANAKamlesh Dutta International Journal of Electronics and Information Engineering ,TaiwanAsia University, Taiwan Vol. 1, No. 2, pp. 70-77March2014
121A Real Time Set Up for Retrieval of Emotional States from Human Neural ResponsesRashima Mahajan, Dipali Bansal, Shweta SinghRashima MahajanDipali BansalShweta SinghInternational Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical EngineeringUSAWorld Academy of Science, Engineering and Technology8(3), 16 – 21.March 2014March2014
122Real Time Acquisition & Psychoacoustic Analysis of Brain WaveShweta Singh,Dipali Bansal, Rashima MahajanShweta SinghRashima MahajanDipali BansalInternational Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical EngineeringUSAWorld Academy of Science, Engineering and TechnologyVol:8 No:3, 2014March2014
123Dynamic Rule Based Traffic Analysis in NIDSKuldeep Tomar,
S. S. Tyagi, Rachna Gupta
S. S. TyagiNILNILNILKuldeep Tomar,
Rachna Gupta
International Journal of Information & Computation Technology(IJICT)United KingdomInderscience Enterprises Ltd.ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436February2014
124Overview – Snort Intrusion Detection System in Cloud EnvironmentKuldeep Tomar,
S. S. Tyagi, Richa Agrawal
S. S. TyagiNILNILNILKuldeep Tomar,
Richa Agrawal
International Journal of Information & Computation Technology(IJICT)United KingdomInderscience Enterprises Ltd.Volume 4, Number 3 pp. 329-334,(2014), ISSN 0974-2239.February2014
125IDS in cloud environment as service based mannerKuldeep Tomar,
S. S. Tyagi, Priyanka
S. S. TyagiNILNILNILKuldeep Tomar,
Priyanka
International Journal of Information & Computation Technology(IJICT)United KingdomInderscience Enterprises Ltd.Volume 4, Number 3 (2014), ISSN 0974-2239.February2014
126Analysis of ACL in ASA firewallKuldeep Tomar,
S. S. Tyagi, Harsh Chawla
S. S. TyagiNILNILNILKuldeep Tomar,
Harsh Chawla
International Journal of Information & Computation Technology(IJICT)United KingdomInderscience Enterprises Ltd.Volume 4, Number 1 pp. 53-58 (2014), ISSN 0974-2239.February2014
127Study of Protocols Associated Security Attacks and Proposing Simplified Method for ImprovisationKuldeep Tomar,
S. S. Tyagi
S. S. TyagiNILNILNILKuldeep TomarInternational Journal of Information & Computation Technology (IJICT)United KingdomInderscience Enterprises Ltd.ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1395-1402.February2014
128Simulation based performance analysis of ZRP in MANETNeha Jain, Dr.Yogesh ChabaNeha JainNILNILNILDr.Yogesh ChabaInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceIssue 4, Volume 88, pg n. 47-52
ISSN (0975-8887)
February2014
129Efficient and Secure Protocol for Mobile Ad-hoc NetworksMeeta SinghMeeta SinghNILNILNILNILInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 77- number 16,
2013, Pg:  28-33
September2013
130An overview on template matching methodologies and its applicationsN. Perveen, D. Kumar, I. BhardwajIshan BhardwajNILNILNILN. Perveen, D. KumarInt. J. Res. Comput. Commun. TechnolUSANAvol. 2, no. 10, pp. 988–995, 2013Oct2013
131Impact of NP-Complete in Traingle Segments Tree Energy Efficiency Model in Wireless Sensor NetworksKaebehYaeghoobi S. B., M.K. Soni, S.S. Tyagi, Omid Mahdi Ebadati EM.K. SoniS.S. TyagiNILNILKaebehYaeghoobi S. B., Omid Mahdi Ebadati EJournal of Basic and Applied Scientific research(JBASR)EgyptDr. Steph O. Jhanathin, USA
TEXTROAD JOURNALS
Cairo
 ISSN 2090-4304, 3(9), 262-269, 2013NIL2013
132Web Documents Ranked using Genetic AlgorithmsPoonam Chahal, Manjeet SinghPoonam ChahalNILNILNILManjeet SinghInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceIssue 22, Volume 70, pg n. 18-21
ISSN (0975-8887)
May2013
133Deadlock Detection and Recovery in Distributed DatabasesSuresh Kumar, Pooja Sapra, R. K. RathySuresh KumarR. K. RathyNILNILPooja SapraInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVol. 73, No. 1, pp: 32-36, July 2013July2013
134Study and  Analysis of DSR and SASR Protocols in MANETShilpa Shukla,
Shelja Sharma,
Suresh Kumar
Shelja SharmaSuresh KumarNILNILShilpa ShuklaInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 73, No. 10,
July 2013
July2013
135Comparative Study of Different Techniques of Video Steganography (PP 62-67)Praveen, Poonam TanwarPoonam TanwarNANANAPraveen, Poonam TanwarInternational Journal of Information Technology & SystemsNANil, Vol. 1; No. 2: (Jan-June 2013)Jan-june2013
136Facial Expression Recognition by Statistical, Spatial Features and using Decision TreeN. Perveen, D. Kumar, I. BhardwajIshan BhardwajNILNILNILN. Perveen, D. KumarInt. J. Comput. ApplUSA Foundation of Computer Sciencevol. 64, no. 18, pp. 16-21, 2013Jan2013
137Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensor NetworksYashwant Singh, Urvashi ChughUrvashi ChughNILNILNILYashwant SinghInternational Journal of Sensors Wireless Communications and Control,New ZealandBenthum PublicationsVolume 3, Number 2, December 2013, pp. 101-107(7) ISSN: 2210-3279 (Print)
ISSN: 2210-3287 (Online)
December2013
138Analysis of deadlock detection and resolution Techniques in distributed database environmentSuresh Kumar, Himanshi groverSuresh KumarNILNILNILHimanshi groverInternational Journal of Computer Engineering & ScienceUSAIAETVol. 2, No. 1, pp. 17-25, ISSN: 2231–6590September2012
139A Review of Deadlock Detection Techniques based on Diffusion Computation ApproachS. S. Tyagi,
Sonia Singh.
S. S. TyagiNILNILNILSonia SinghInternational Journal of Computer ApplicationsUSAFoundation of Computer ScienceVolume 48, No. 9, Page 28-32, 2012JUNE2012
140Scheduling Algorithms in Mobile Ad Hoc NetworksKanika GargKanika GargNILNILNILNIL International
Journal of Computer Science and Applications (IJCSA)
USAScience and Engineering Publishing CompanyVol. 1, No.5,
July 2012, ISSN – 2278-1080
July2012
141Speaker Dependent and Independent Isolated Hindi Word Recognizer using Hidden Markov Model (HMM)Ishan Bhardwaj, Narendra D LondheIshan BhardwajNILNILNILNarendra D LondheInt. J. Comput. ApplUSA Foundation of Computer Sciencevol. 52, no. 7, pp. 34-40, 2012Jan2012
142An Efficient Location Based Reactive Multi-Path  Routing Protocol for MANETIndu Kashyap, R.K. Rathi, Diwakar PandeyIndu KashyapR.K. RathiNILNILDiwakar PandeyInternational Journal of Computer Applications (0975 – 8887)USAFoundation of Computer ScienceVol 40, issue 9, Page 24-29,
2012
Feb2012
143Performance Evaluation of AODV and DSR using Random Way Point Mobility ModelMeeta SinghMeeta SinghNILNILNILNILInternational Journal of Computer Applications (IJCA)USAFoundation of Computer Science Volume 46 No.19,
2012
 May2012
144A Hindi Speech Actuated Computer Interface for Web SearchKamlesh Sharma, Dr. S. V. A. V. Prasad, Dr. T. V. PrasadKamlesh SharmaNANANADr. S. V. A. V. Prasad, Dr. T. V. PrasadInt. J. of Advanced Computer Sc. App. (IJACSA), Vol. 3, No. 10UKThe SAIVol.(3)Issue(1)October2012
145Implementing Semantic Query Optimization in Relational DatabasesJyoti Mor, Indu KashyapIndu KashyapNILNILNILJyoti MorInternational Journal of Computer Applications (0975 – 888)USAFoundation of Computer ScienceVolume 52– No.9,P-41-46, August 2012August2012
146Hybrid Technique for Effective Knowledge Representation and a Comparative Study, (pp 43-57)Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh DuttaPoonam TanwarNANANAPoonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh DuttaInternational Journal of Computer Sc. & Engg. Survey, India, published by Academy & Industry Research Collaboration Center (AIRCC)NANilVolume 3, No. 4, August 2012.August2012
147Analysis of Query Optimization Techniques in DatabasesJyoti Mor, Indu KashyapIndu KashyapNILNILNILJyoti MorInternational Journal of Computer Applications (0975 – 888)USAFoundation of Computer ScienceVolume 47– No.15, p-9, June 2012June2012
148Survey and Analysis of Devnagari Character Recognition Techniques Using Neural NetworkNeha Sahu, Indu KashyapIndu KashyapNILNILNILNeha SahuInternational Journal of Computer Applications (0975 – 888)USAFoundation of Computer ScienceVolume 47– No.15, P-10-13, June 2012June2012
149Network and information security issuesVandana Batra, Shrutika SuriVandana BatraShrutika SuriNILNILNILInternational Journal of Computer Applications (0975 – 888)USAFoundation of Computer SciencePg 4-5
2012
May2012
150Implementing Edge Detection for Detecting Neurons from Brain to Identify Emotions Madhulika , Abhay Bansal, Amandeep, MadhurimaDr. MadhulikaNILNILNILAbhay Bansal, Amandeep, Madhurima”, International Journal of Computer Applications(USA)(USAFCS® (Foundation of Computer Science)Volume 61(9),pp 1-6January2012
151Structural Brain Atlases: Design, Rationale and Applications in Normal and Pathological CohortsPravat K. Mandal, Rashima Mahajan, Ivo D. DinovRashima MahajanPravat K. Mandal, Ivo D. DinovJournal of Alzheimer’s diseaseUSAIOS PressVol31, 1-20 (2012)January2012
152An Effective knowledge base system Architecture and issues in  representation techniques (PP 430- 435)Poonam Tanwar,Dr T. V. Prasad, DuttaPoonam TanwarNANANAPoonam Tanwar,Dr T. V. Prasad, DuttaInternational Journal of Advancements in Technology,USANAVolume 2,  NO 3, 2011 IC value 4.78Nil2011
153Eye controlled Cursor Movement (PP 81- 84)Poonam Tanwar,PallaviPoonam TanwarNANANAPoonam Tanwar,PallaviInternational Journal IMS Manthan (The Journal of Mgt., Comp. Science & JournalismNANilVol 6, No 2, 2011Nil2011
154A Survey on Link/Node-Disjoint On-Demand Multipath Routing Protocols in MANETSuresh Kumar, Alka Rawat, Preeti BhatiSuresh KumarNILNILNILAlka Rawat, Preeti BhatiMES Journal of Technology and ManagementHONG KONGMESVol. 2, No. 1, pp: 82-85, ISSN 0976 3724, May 2011May2011
155Downloading and Mapping of Web Forms for Information Retrieval from Hidden WebKomal Kumar Bhatia, Rosy Madaan, A.K. SharmaRosy MadaanA.K. Sharma, Komal Kumar BhatiaInternational Journal of Contemporary Research in Engineering and TechnologyIndiaextromind publicationsVol1Jul-Dec 20112011
156Crawling the Deep WebKomal Kumar Bhatia, Rosy Madaan, A.K. SharmaRosy MadaanA.K. Sharma, Komal Kumar BhatiaInternational Journal of Contemporary Research in Engineering and TechnologyIndiaextromind publicationsVol1Jul-Dec 20112011
157Edge detection system using canny algorithm. (PP 1-8)Pallavi, Poonam TanwarPoonam TanwarNANANAPallavi, Poonam TanwarInternational Journal of Advances Engineering and Computing TechnologiesNANilVol 1, issue 1, July 2011July2011
158Performance Comparison between Ant Algorithm and Modified Ant AlgorithmShaveta MalikShaveta MalikNILNILNILNILInternational Journal of Advanced Computer Science and ApplicationsEnglandSAIVol 1, No. 4, Page No. 42-46, 2010OCTOBER2010
159Comparative Study of Three Declarative Knowledge Representation Techniques (PP 2274-2281) Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh DuttaPoonam TanwarNANANA Poonam Tanwar,Dr T. V. Prasad, Dr. Kamlesh Dutta(IJCSE) International Journal on Computer Science and EngineeringNANilVolume 2, No 7, 2010Nil2010
160Automated Mosiacing of Torn Paper Documents. (PP 129- 132)Robin, Sandeep, Poonam TanwarPoonam TanwarNANANARobin, Sandeep, Poonam TanwarInternational Journal of Computer Science & Communication (IJCSC)NANilVolume 1,No -2, 2010Nil2010
161Developing Brain Computer Interface Using Fuzzy Logic. (pp 429-434)Mandeep Kaur, Poonam TanwarPoonam TanwarNANANAMandeep Kaur, Poonam TanwarInternational Journal of Information Technology and Knowledge ManagementNANilVolume 2, No 2, 2010Nil2010
162Performance Analysis of Proactive and Reactive Routing Protocols for Ad hoc NetworkS S Tyagi , R K ChauhanS. S. TyagiNILNILNILR K ChauhanInternational Journal on  Computer Applications (IJCA)USAFoundation of Computer ScienceVol 1, No. 14, Article 6,
2010
FEBRUARY2010
163Framework for Incremental Hidden Web CrawlerRosy Madaan, A.K. Sharma, Ashutosh Dixit, Komal Kumar BhatiaRosy MadaanA.K. Sharma, Ashutosh Dixit, Komal Kumar BhatiaInternational Journal in Computer Science and Engineering (IJCSE)IndiaInderscience publisherVol2 Issue 3402992010
164Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and CryptographyMadhumita KathuriaMadhumita KathuriaNILNILNILNILInternational Journal of Computer Applications(IJCA)USAFoundation of Computer ScienceNo. 8 – Volume 12
2010
December2010
165Quantification of Shape and Texture for Wind AbrasionNathan T. Bridges, AnshumanRazdan, Xuetao Yin, Ronald Greeley, Saif Ali, Rakesh KushunapallySaif AliNANANANathan T. Bridges, AnshumanRazdan, Xuetao Yin, Ronald Greeley, Rakesh KushunapallyGeomorphologyUSAElseviervolume 114, issue 3, pages 213–226January2010
166Compressed Facade Displacement MapsSaif Ali, Jieping Ye, Anshuman Razdan, Peter WonkaSaif AliNANANAJieping Ye, Anshuman Razdan, Peter WonkaIEEE Transactions on Visualization and Computer GraphicsUSAIEEEvolume 15, number 2, pages 262-273March/April2009
167Sub-millimeter Rock Surface Texture as a Measure of Aeolian Abrasion MaturityBridges, N. T.; Razdan, A.; Ali, S.; Kushunapally, R.; Laity, J. E.; Greeley, R.; Eddlemon, E.Saif AliNANANABridges, N. T.; Razdan, A.; Kushunapally, R.; Laity, J. E.; Greeley, R.; Eddlemon, E.AGU Fall MeetingUSAAmerican Geophysical UnionNADec2006
168Site specific automated drip irrigation for palm trees using wireless sensor networkN Hema, K Kant, HB MaringantiKrishna KantNANANAN Hema, HB MaringantiInternational journal of Information Technology, Automation and  Precision FarmingNANANANA2001

Search Courses

Notification

Upcoming Events

Latest Updates