Consultancy (From Industry)
- Paliwal Home Furnishings
- Pine Cone Hill India Pvt. Ltd.
- Samta Yarns Pvt. Ltd.
- Sidharth Overseas
- Curtina Technologies
- Sunheri Marketing Pvt. Ltd.
- Shyam Exports
- Flora Exports
Conferences
Faculty Name | Title of the Paper | Name of Conference |
Sonam | Comprehensive Study of Web Application Attacks and Classification | INDIACom-2016; 3rd International Conference, IEEE, March 2016 |
Pardeep Kamboj | Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks | ACM conference (ICTCS-2016) |
Hari Singh | Spatial Data Analysis with ArcGIS and MapReduce | International conference on Conference Computing, Communication and Automation |
Mahima Goyal | A Proposed framework for improved identification of implicit aspects in tourism domain using supervised learning technique | International Conference on Advances in Information Communication Technology & Computing |
Surjeet Singh | Avalanche parameters for deploying sensor nodes in snow bound region | SMART-2016 |
S.C.Gupta | Human Object Detection by HoG, HoB, HoC and BO Features | Forth International Conference on Parallel, Distributed and Grid Computing |
Vikram Bali | Genetic programming and K-nearest neighbour classifier based intrusion detection model | Confluence 2017 |
Surjeet Singh | Rural communication enhancement using mobile ad-hoc network | Confluence 2017 |
Shivani Gaba and Ramesh Kait | A Review of Security Analyses in AODV Routing Protocol | Recent Trends in Computing and Communication Technologies (RCCT), Murthal, |
Vikram Bali | A Brief Review of Methods for Prediction of Fly-Rock in Blasting | International Confrence on Communication, Computing and Networking (ICCCM-2017) |
Aakanksha Mahajan | Diagnosis of Diabetes Mellitus using PCA and Genetically optimized Neural Network | International Conference on Computing, Communication and Innovation ICCCA-2017 |
Suman | Selection of Optimal Credit Card Fraud Detection Models Using a Coefficient Sum Approach | International Conference on Computing, Communication and Automation |
Vikram Bali | A novel Approach for Blast-Induced Fly-Rock Prediction Based on Particle Swarm Optimization and Artifical Neural Network | International Confrence on Recent Advancement on Computer and Communication (ICRAC-2017), Springer |
Aakanksha Mahajan | Diagnosis of Diabetes Mellitus using PSO and KNN Classifier | IC3TSN-2017 |
Gaurav Gambhir | Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique | |
Deepak Kumar | Metaheuristic Policies for Discovery Task Programming Matters in Cloud Computing | ICCCA |
Gaurav Gambhir | Utilizing Idle Inventory among defence shipyards by information sharing | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Alankrita Aggarwal | To Design a Mammogram Edge Detection Algorithm using Artificial Neural Network (ANN) | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Anju Bhandari | Smart Precision Farming System For High Crop Yielding | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Harish Saini | Object detection and Recognition | International conference on intelligent systems: Approaches, Technologies and Networks |
Kunal Uppal | CAPES:A Computerized Application for Paper Less Examination Screening | Intelligent Systems:Approaches,Technologies and Networks |
Kunal Uppal | Dashboard for AICTE Initiatives and Schemes | Intelligent Systems:Approaches,Technologies and Networks |
Anju Bhandari | Advent Artificial Intelligence Finance Management | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Anju Bhandari | Sentiment Analysis of Twitter using Classifier | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Anju Bhandari | Analyzing Social response to specific program | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Karun Handa | Fuzzy Based Automated Feedback Collection And analysis system | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Palak Singhal | Comparative Analysis Of Different Mobile Strategies In heterogeneous WSN | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Anshul Rani | Filling The Gaps: Inter Code Smell Relations, Refactoring Sequence And Severity Parameters | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Vipin Tomar | PVO-Based Multiple Message Segments reversible data hiding | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Dr.S.C.Gupta | An Efficient Data Locality System For Big Data Processing Over Distributed Data Centre By Using Scheduling Technique | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Sandeep S. Bindra | Combinational Fuzzy Expert system for academic appraisal | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Deepak Singla | Bipedal Locomotives Regarding Safety | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Punit Soni | Overview of Agile Practices | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Deepak Kumar | An Efficient Data Locality System For Big Data Processing Over Distributed Data Centre by using scheduling technique | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Stuti Mehla | Capes: A Computherized Application for paperless examination screening | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Ginni Chawla | Connecting Delhi: A Complaint Portal For MCD | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Shekhar | A Gis-Gps Base New Connection Estimate Generation By Using Mobile &Web Based application | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Vikas Sethi | An Android Application On Game On Road safety | International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” |
Research Paper’s & Journal’s
Faculty Name | Title of the Paper | Name of Journal | Date/Month of Publication |
Shakti Arora | Green cloud computing resource managing polocies a survey | International Journal of Science And Research | Jul-15 |
Sunil Ahuja | Survey of Various Image Encryption Methods and Evaluation Matrices | International Journal of Computer Sciences And Engineering | Jul-15 |
Arpana Dureja | Review Of Online And Ofline Character Recognition | International Journal For Scientific Research & Development | Jul-15 |
Shekhar Singh,sc gupta | Gradient Controlled-BP Algorithm for Effective Intrusion Detection | International Journal of Computer Applications | Aug-15 |
Vikram Bali | Identifying and classify Factors for Evaluating the Success of Software Developed by COTS Components | International Journal of Computer Engineering And Technology | Aug-15 |
Ruchika Yadav | An Improved Association Rule Mining Technique Using Transposed Database | American Scientific Research Journal For Engineering, Technology, And Sciences | Aug-15 |
Harish Saini | Design & Implementation of Data Forwarding Mechanism with Sleep Scheduling in WSN | International Journal of Advance Research In Computer And Communication Engineering | Aug-15 |
Vikram Bali | Cots Evaluation & Selection Process in Design of Component Based Software System | Global Journal of Computer Science And Technology | Aug-15 |
Deepti Dhingra | ANT-LOAD: A Proficient Meta-Heuristic Cloud Load Balancing | International Journal of Computer Applications | Aug-15 |
Hari Singh | Web Health Analyzer for Search Engine Optimization | International Journal of Engineering And Technical Research | Aug-15 |
Hari Singh | An overview of anomalous sub population | International Journal of Engineering And Technical Research | Aug-15 |
Hari Singh | Profit maximization of SAAS by reusing the available VM Space in Cloud Computing | International Journal of Engineering And Computer Science | Aug-15 |
Aakanksha Mahajan | BPSO optimized k-means clustering approach for medical data analysis | International Journal of Scientific Research Engineering &Technology | Aug-15 |
Ruchika Yadav | An Improved Multiple-Level Association Rule Mining Algorithm with Boolean Transposed Database | International Journal of Computer Science And Information Security | Aug-15 |
Sumit KumarRana | Optimization of Image Using Skeletonization technique with Advanced Algorithm | International Journal of Scientific Research Engineering & Technology | Aug-15 |
Arpana Dureja | Review Of Online And Ofline Character Recognition | International Journal For Scientific Research And Development | Aug-15 |
Hari Singh | Implementation and classification of anomalous detection with varying parameters | International Journal of Research | Sep-15 |
Aakanksha Mahajan | BPSO optimized k-means clustering approach for data analysis | International Journal of Computer Applications | Jan-16 |
Anju Gandhi | Proposal and Implementation of MPLS Fuzzy Traffic Monitor | International Journal of Advanced Computer Science And Applications | Jan-16 |
Deepak Kumar | Swarm Computing Techniques, Applications and Models | Global Journal For Current Engineering Research | Mar-16 |
Dharminder Kumar, Suman | A Hybrid Approach using Maximum Entropy and Bayesian Learning for Detecting Delinquency in Financial Industry” | International Journal of Knowledge-Based Organizations (Ijkbo) | Mar-16 |
Anju Gandhi | Congestion Control using Fuzzy Based LSPs in Multiprotocol Label Switching Networks | International Journal In Foundations Of Computer Science & Technology | Mar-16 |
Sunil Ahuja | Implementing Cryptographic Algorithm in Term of Privacy in AODV Routing Protocol | International Journal of Advance Research In Computer Science And Software Engineering | Apr-16 |
Tanu Sharma | Data Mining approach to energy efficiency in Wireless Sensor Networks | International Journal of Engineering Trends & Technology | Apr-16 |
Harish Saini | A Review Paper on Energy Efficiency Routing Protocol for Wireless Sensor Networks | International Journal of Advanced Research In Computer Science And Software Engineering | Apr-16 |
Sumit KumarRana | A Review: Proactive and Reactive Routing Protocols of MANET in a Grid using Mobility | International Journal For Advance Research In Engineering And Technology | Apr-16 |
Shakti Arora | Study of Integrity Based Algorithm in Decentralized Cloud Computing Environment |
International Journal of Institutional & Industrial Research | Apr-16 |
Sunil Ahuja | A Review on Attacks, Application and Routing Protocols of MANET | International Journal of Recent Trends In Engineering And Research | May-16 |
Harish Saini | Energy Efficient A-LEACH Routing Protocol | International Journal of Innovative Research In Computer And Communication Engineering | May-16 |
Sumit KumarRana | Analytical Review of Visual Cryptography Scheme | International Journal For Advance Research In Engineering And Technology | May-16 |
Sunil Ahuja | Efficient Scheduling by Genetic Algorithm and Simulated Annealing | International Journal of Advance Research, Ideas And Innovations In Technology | Jun-16 |
Tanu Sharma | An enhanced Data Mining technique for energy efficiency in Wireless Sensor Networks | International Journal of Engineering Trends & Technology | Jun-16 |
Hari Singh | Mapreduce Technique: Review and SWOT Analysis | International Journal of Engineering Research | Jun-16 |
Arpana Dureja | Cryptic Techniques Based On Neural Nets | International Journal of Recent Research Aspects | Jun-16 |
Deepak Kumar | Securing Image Transmission using Steganography | Global Journal For Current Engineering Research | Jul-16 |
Harish Kumar Saini | Li-Fi (Light Fidelity) Future of Wireless Communication | Iosr Journal Of Mechanical And Civil Engineering | Aug-16 |
Hari Singh | Scalability and Fault Tolerance of MapReduce for Spatial data | Global Journal of Engineering Science And Research Management | Aug-16 |
Shakti Arora | Novel approach for Integrity Verification in Dynamic Cloud environment | International Journal of Science And Information Security | Aug-16 |
Anju Gandhi | Design of Fuzzy-based Traffic Provisioning in Software Defined Network | International Journal of Information Technology Convergence And Services | Sep-16 |
Anju Bhandari, V.P. Singh | Design of Fuzzy-based Traffic Provisioning in Software Defined Network | International Journal of Information Technology Convergence And Services | Sep-16 |
Shekhar Singh, S.C.Gupta | Human Object Detection by HoG, HoB, HoC and BO Features | International Journal of Computer Applications | Oct-16 |
Hari Singh | IGSIM: An Architecture for High Performance Spatial Data Analysis | International Journal of Computer Science And Information Security | Nov-16 |
Pooja Kundu | Elliptic curve efficient power aware routing protocol for manet | International Journal of Advanced Research In Computer Engineering & Technology | Dec-16 |
Pooja Kundu | A survey on energy efficient routing protocols in mobile Adhoc network | International Journal of Advanced Research In Computer And Communication Engineering | Dec-16 |
Shakti Arora | Enhanced privacy preserving access control in the cloud | International Journal of Recent Research Aspects | Dec-16 |
Shakti Arora | Adaptive Model For Integrity Verification In Cloud Computing System | International Journal of Advanced Research In Computer Science | Feb-17 |
Hari Singh | Grid Computing: Review and SWOT Analysis | International Journal of Engineering Research | Mar-17 |
S.C.Gupta, Vikram Bali,Deepti Dhingra | Multi-level security mechanism for audio steganography | International Journal of Advanced Research In Education & Technology | Mar-17 |
Pooja Kundu | readability improvement in java language by using segmentation technique | International Journal of Innovative Research In Computer And Communication Engineering | Mar-17 |
Hari Singh | A Mapreduce Based Scalable Discovery And Indexing Of Structured Big Data | Future Generation Computer System | Apr-17 |
Pooja Kundu | research of persistence solution based on ORM and hibernate technology | International Journal of Advanced Research In Computer Science And Software Engineering | Apr-17 |
Sandeep jain | A review on CBIR by cascading features & SVM | International Journal of Advanced Research In Computer Science | Apr-17 |
Deepak Kumar | A Survey to Nature Inspired Soft Computing | International Journal of Information System Modeling And Design | Jun-17 |
Anju Gandhi | Literature review on protocols for WSN | Journal of Network Communications And Emerging Technologies | Jun-17 |
Shivani Gaba and Ramesh Kait | A Modified Approach to Improve Security and Congestion Control in AODV Routing Protocol against Blackhole Attack | International Journal on Recent And Innovation Trends In Computing And Communication | Jun-17 |
Rakesh Garg, Suman | Performance Evaluation and Selection of Financial Fraud Detection Models using MCDM Approach | International Journal of Recent Research Aspects | Jun-17 |
Anju Gandhi | Literature Review On An Approach To Detect Packets Using Packet Sniffing | Journal of Network Communications And Emerging Technologies | Jul-17 |
Anju Gandhi | Literature Review on Clustering Toplolgy Analysis for Hetrogenous Wireless Sensor Network | International Journal For Scientific Research & Development | Jul-17 |
Shekhar Singh | Recommendation Systems: A Review Report | International Journal of Advanced Research In Computer Science | Aug-17 |
Harish Saini | Security Issues In Mobile Adhoc Networks: Attacks And Their Countermeasures | International Journal For Research In Applied Science And Engineering Technology | Aug-17 |
Anju Gandhi | “Energy Consumption Minimization in WSN using BFO” | International Journal on Recent And Innovation Trends In Computing And Communication | Aug-17 |
S.C.Gupta | A Proposal For Predicting Missing Values In A Data Set Using Supervised Learning | International Journal of Advanced Research In Computer Science | Sep-17 |
Shekhar Singh | Storage And Retrieval Of Software Component Using Hadoop And Mapreduce | International Journal of Engineering And Technology (Ijet | Sep-17 |
Suman, Dharminder Kumar | Hybridization of Som And Pso For Detecting Fraud In Credit Card | International Journal of Information Systems In The Service Sector (Ijisss) | Sep-17 |
Harish Saini | Mitigation of Jellyfish Attack In Aodv | International Journal For Research In Applied Science And Engineering Technology | Sep-17 |
Anju Gandhi | “PSOGSA Based Improved LEACH Algorithm”, | International Journal of Research In Electronics And Computer Engineering | Sep-17 |
S.C.Gupta | Predicting Missing Values In A Dataset: Challenges And Approaches | International Journal of Advanced Research In Computer Science | Oct-17 |
Shekhar Singh | A Novel Gsa-Svm Based Attribute Selection Algorithm For Movie Recommendation | International Journal of Scientific Research Engineering & Technology (Ijsret) | Oct-17 |
Anju Gandhi | “Security and DDOS Mechanisms in Internet of Things” | International Journal of Advanced Research In Computer Science | Nov-17 |
Shally | A study on Quantum Cryptography and key generation method | International Journal of Scientific & Engineering Research | Dec-17 |
Shakti Arora | A Review About Enhancing Security Of Cloud Server Using Cryptography | International Journal Innovative Research Thoughts | Dec-17 |
Madhu Gautam | Big Data Analytics In Healthcare: Opportunities, Challenges And Techniques | International Journal of Social Computing And Cyber-Physical Systems | Dec-17 |
Shakti Arora | Resolving Problem Of Trust Context In Cloud Computing | International Journal of Engineering Research In Computer Science And Engineering | Jan-18 |
Punit Soni | Fingerprint Authentication System Using Log Gabor Filter | International Journal of Advance Research, Ideas And Innovations In Technology | Feb-18 |
Shakti Arora | Cost-Based Multi-Qos Job Scheduling Algorithm Using Genetic Approach In Cloud Computing Environment | International Journal of Advanced Science And Research | Mar-18 |
Deepak Kumar | An integrated approch towrds query based learning on multi objective Ant lion optimization | Journal of Advanced Research In Dynamical And Control Systems | Apr-18 |
Shakti Arora | Amazon Backed File System With Enhanced Storage Feature Volume 6, Issue 2 April 2018 | | The International Journal of Creative Research Thoughts | Apr-18 |
Sunil Ahuja | Iaco-Lb: A Navel Technique For Load Balancing In Cloud Computing | International Journal of Innovative Research In Computer And Communication Engineering | Apr-18 |
Shivani | Securing Communication In Manet Through E-Gaman Algorithm | International Journal of Creative Research Thoughts | Apr-18 |
Arun Kumar | Performance Evaluation Of De-Noised Medical Images After Removing Speckled Noise By Wavelet Transform | International Journal of Biomedical Engineering And Technology | May-18 |
Shivani | A Comparative Study : Reviewing Performance Of Routing Protocols In Manets | International Journal of Scientific Research In Science, Engineering And Technology | Jun-18 |
Aastha, Shivani Gaba | Accuracy Improvement in Intruder Detection using Optimally Selected Features | International Journal of Research In Electronics And Computer Engineering | Sep-18 |
Navneet Kaur, Deepak Kumar and S. C Gupta | An Efficient data locality sysytem for big data processing over distributed data centre by using scheduling technique | International Journal of Research And Analytical Reviews | Oct-18 |
Kanika Patel , S.C Gupta and Deepak Kumar | Data decomposition and matrix reduction using binary-PSO to tensor mining | International Journal For Research In Engineering Application & Management | Oct-18 |
Rajender Kumar | An Effective Framework for Security and Performance in Intelligent Vehicular Ad-Hoc Network | Journal of Advanced Research In Dynamical And Control Systems | Nov-18 |
Rajender Kumar | Deep Learning Integrated Approach for Collision Avoidance in Internet of Things based Smart Vehicular Networks | Journal of Advanced Research In Dynamical And Control Systems | Nov-18 |
Stuti Mehla | Comparative Analysis of Impact of Convolution and Optimize Features on Tweets Sentiment Classification | Journal of Advanced Research In Dynamical And Control Systems | Nov-18 |
Shakti Arora | Efficient Epidemic Routing Protocol for Disruption Tolerant Networks | Advanced Journal of Computer Science And Engineering | Jul-19 |
Stuti Mehla | A Hybrid Approach for Opinion Mining Using Twitter Data | Journal of Computational and Theoretical Nanoscience | Sep-19 |
Shakti Arora | GRANULAR PRIVACY PRESERVING SCHEME OVER CLOUD ENVIRONMENTS | Advanced Journal of Computer Science And Engineering | Oct-19 |