X

Consultancy, Research Publications

Consultancy (From Industry)

  • Paliwal Home Furnishings
  • Pine Cone Hill India Pvt. Ltd.
  • Samta Yarns Pvt. Ltd.
  • Sidharth Overseas
  • Curtina Technologies
  • Sunheri Marketing Pvt. Ltd.
  • Shyam Exports
  • Flora Exports

Journal Publications

Title of paper Name of the author/s Department of the teacher Name of journal Year of publication ISSN number
A Review: Role Of Social Media In Aid And Education Kunal Uppal,Shubham,Paramvir Dalal,Priyamvada CSE International Journal of Scientific Research in Engineering and Management(IJSREM) 2021 2582-3930
An Effective Face Recognition System Based On Cloud Based Iot With A Deep Learning Model Deepika Chauhan, Ashok Kumar, Pradeep Bedi, Vijay Anant Athavale, D. Veeraiah, Boppuru Rudra Pratap, CSE Microprocessors & Microsystems 2021 0141-9331
Shared Memory Implementation And Performance Analysis Of Lsb Steganography Based On Chaotic Tent Map Gaurav Gambhir, Jyotsna Kumar Mandal CSE Innovations in Systems and Software Engineering 2021 1614-5054
Suicidal Behaviour Screening Using Machine Learning Techniques Anju Bhandari Gandhi, Devendra Prasad, Umesh Kumar Lilhore CSE International Journal of Biomedical Engineering and Technology 2021 1752-6426,
Multicore Implementation And Performance Analysis Of A Chaos Based Lsb Steganography Technique Gaurav Gambhir, Jyotsna Kumar Mandal CSE Microsystem Technologies 2020 1432-1858
Blockchain Based Business Model For Digital Asset Management In Trustless Collaborative Environment Sumit Kumar Rana, Sanjeev Kumar Rana CSE Journal of critical reviews 2020 2394-5125
Brain Tumour Segmentation- An Application Of Image Processing Arora S., Athavale V, Jain I., Aakriti CSE Advances and Applications in Mathematical Sciences 2020 0974-6803
Innovative Techbin: A Solution For Green City Dhruv Vohra, Gunjan , Anju Gandhi CSE International Journal of Scientific research in Computer Sience and Engineering 2020 2320-7639
Integration Of Blockchain And Iot For Data Storage And Management Athavale V. A., Bansal A., Nalajala S. & Aurelia S CSE Materials Today: Proceedings 2020 2214-7853
Mathematical Model To Analyse The Effect Of Quarantine On Spread And Containment Of Covid-19 Afshan Hassan , Amit Kumar Bindal, Anju Bhandari gandhi , Devendra Prasad CSE Annals of the Romanian Society for Cell Biology 2020 2067-8282
Multi Biometric System For Secure Fingerprint Recognition Rahul Kaushal CSE International Journal of Electronics Engineering 2019 0973-7383
Novel Approach For Raising Security Using Feature Level Fusion Rahul Kaushal CSE International Journal of Electronics Engineering 2019 0973-7384
Fuzzy Based Automated Feedback Collection And Analysis System Karun Handa,Reema Lalit CSE Advances and Applications in Mathematical Sciences 2019 0974-6803
Efficient Epidemic Routing Protocol for Disruption Tolerant Networks Shakti Arora CSE Advanced Journal of Computer Science And Engineering 2019 2393-8390
Integrity verification mechanisms adopted in cloud environment Shakti Arora CSE International Journal of Engineering and Advanced Technology 2019 2249-8958
A Hybrid Approach for Opinion Mining Using Twitter Data Stuti Mehla CSE Journal of Computational and Theoretical Nanoscience 2019 1546-1955
Primary User Avoidance Algorithm For Crahns Using Reinforcement Learning Shiraz Khurana CSE International Journal of Innovative Technology and Exploring Engineering 2019 2278-3075
Granular Privacy Preserving Scheme Over Cloud Environments Shakti Arora CSE Advanced Journal of Computer Science And Engineering 2019 2393-8390
Ddos attacks simulation in cloud computing environment Shakti Arora CSE International Journal of Innovative Technology and Exploring Engineering 2019 2278-3075
An optimized cloud architecture for integrity verification Shakti Arora CSE Journal of computational and Theoretical Nanoscience 2019 1546-1963
Trust evaluation factors in cloud computing with open stack Shakti Arora CSE Journal of computational and Theoretical Nanoscience 2019 1546-1963
 Resolving Problem Of Trust Context In Cloud Computing Shakti Arora CSE International Journal of Engineering Research In Computer Science And Engineering 2018 2394-2320
Fingerprint Authentication System Using Log Gabor Filter Punit Soni CSE International Journal of Advance Research, Ideas And Innovations In Technology 2018 2454-132X
Cost-Based Multi-Qos Job Scheduling Algorithm Using Genetic Approach In Cloud Computing Environment Shakti Arora CSE International Journal of Advanced Science And Research 2018 2455-4227
An integrated approch towrds query based learning on multi objective Ant lion optimization Deepak Kumar CSE Journal of Advanced Research In Dynamical And Control Systems 2018 1943-023X
Amazon Backed File System With Enhanced Storage Feature Volume 6, Issue 2 April 2018 | Shakti Arora CSE The International Journal of Creative Research Thoughts 2018 2320-2882
Iaco-Lb: A Navel Technique For Load Balancing In Cloud Computing Sunil Ahuja CSE International Journal of Innovative Research In Computer And Communication Engineering 2018 2320-9801
Securing Communication In Manet Through E-Gaman Algorithm Shivani CSE International Journal of Creative Research Thoughts 2018 2320-2882
Performance Evaluation Of De-Noised Medical Images After Removing Speckled Noise By Wavelet Transform Arun Kumar CSE International Journal of Biomedical Engineering And Technology 2018 1752-6426
A Comparative Study : Reviewing Performance Of Routing Protocols In Manets Shivani CSE International Journal of Scientific Research In Science, Engineering And Technology 2018 2394-4099
Accuracy Improvement in Intruder Detection using Optimally Selected Features Aastha, Shivani Gaba CSE International Journal of Research In Electronics And Computer Engineering 2018 2348-2281
An Efficient data locality sysytem for big data processing over distributed data centre by using scheduling technique Navneet Kaur, Deepak Kumar and S. C Gupta CSE International Journal of Research And Analytical Reviews 2018 2348-1269
Data decomposition and matrix reduction using binary-PSO to tensor mining Kanika Patel , S.C Gupta and Deepak Kumar CSE International Journal For Research In Engineering Application & Management 2018 2554-9150
An Effective Framework for Security and Performance in Intelligent Vehicular Ad-Hoc Network Rajender Kumar CSE Journal of Advanced Research In Dynamical And Control Systems 2018 1943-023x
Deep Learning Integrated Approach for Collision Avoidance in Internet of Things based Smart Vehicular Networks Rajender Kumar CSE Journal of Advanced Research In Dynamical And Control Systems 2018 1943-023x
Comparative Analysis of Impact of Convolution and Optimize Features on Tweets Sentiment Classification Stuti Mehla CSE Journal of Advanced Research In Dynamical And Control Systems 2018 1943-023X
Adaptive Model For Integrity Verification In Cloud Computing System Shakti Arora CSE International Journal of Advanced Research In Computer Science 2017 0976-5697
Multi-level security mechanism for audio steganography Vikram Bali CSE International Journal of Advanced Research In Education & Technology 2017 0976-6480
readability improvement in java language by using segmentation technique Pooja Kundu CSE International Journal of Innovative Research In Computer And Communication Engineering 2017 2320-9801
Multi-level security mechanism for audio steganography S.C.Gupta CSE International Journal of Advanced Research In Education & Technology 2017 0976-6480
A Mapreduce Based Scalable Discovery And Indexing Of Structured Big Data Hari Singh CSE Future Generation Computer System 2017 2312-739X
Multi-level security mechanism for audio steganography Deepti Dhingra CSE International Journal of Advanced Research In Education & Technology 2017 0976-6480
research of persistence solution based on ORM and hibernate technology Pooja Kundu CSE International Journal of Advanced Research In Computer Science And Software Engineering 2017 2277-128X
A review on CBIR by cascading features & SVM Sandeep jain CSE International Journal of Advanced Research In Computer Science 2017 0976-5697
A Survey to Nature Inspired Soft Computing Deepak Kumar CSE International Journal of Information System Modeling And Design 2017 1947-8186
Literature review on protocols for WSN Anju Gandhi CSE Journal of Network Communications And Emerging Technologies 2017 2395-5317
A Modified Approach to Improve Security and Congestion Control in AODV Routing Protocol against Blackhole Attack Shivani Gaba and Ramesh Kait CSE International Journal on Recent And Innovation Trends In Computing And Communication 2017 2321-8169
Performance Evaluation and Selection of Financial Fraud Detection Models using MCDM Approach Rakesh Garg, Suman CSE International Journal of Recent Research Aspects 2017 2349-7688
Literature Review On An Approach To Detect Packets Using Packet Sniffing Anju Gandhi CSE Journal of Network Communications And Emerging Technologies 2017 2395-5317
Literature Review on Clustering Toplolgy Analysis for Hetrogenous Wireless Sensor Network Anju Gandhi CSE International Journal For Scientific Research & Development 2017 2321-0613
Recommendation Systems: A Review Report Shekhar Singh CSE International Journal of Advanced Research In Computer Science 2017 0976-5697
Security Issues In Mobile Adhoc Networks: Attacks And Their Countermeasures Harish Saini CSE International Journal For Research In Applied Science And Engineering Technology 2017 2321-9653
“Energy Consumption Minimization in WSN using BFO” Anju Gandhi CSE International Journal on Recent And Innovation Trends In Computing And Communication 2017 2321-8169
A Proposal For Predicting Missing Values In A Data Set Using Supervised Learning S.C.Gupta CSE International Journal of Advanced Research In Computer Science 2017 0976-5697
Storage And Retrieval Of Software Component Using Hadoop And Mapreduce Shekhar Singh CSE International Journal of Engineering And Technology (Ijet 2017 0975-4024
Hybridization of Som And Pso For Detecting Fraud In Credit Card Suman, Dharminder Kumar CSE International Journal of Information Systems In The Service Sector (Ijisss) 2017 1935-5688
Mitigation of Jellyfish Attack In Aodv Harish Saini CSE International Journal For Research In Applied Science And Engineering Technology 2017 2321-9653
“PSOGSA Based Improved LEACH Algorithm”, Anju Gandhi CSE International Journal of Research In Electronics And Computer Engineering 2017 2348-2281,
Predicting Missing Values In A Dataset: Challenges And Approaches S.C.Gupta CSE International Journal of Advanced Research In Computer Science 2017 2349-7688
A Novel Gsa-Svm Based Attribute Selection Algorithm For Movie Recommendation Shekhar Singh CSE International Journal of Scientific Research Engineering & Technology (Ijsret) 2017 2278-0882
“Security and DDOS Mechanisms in Internet of Things” Anju Gandhi CSE International Journal of Advanced Research In Computer Science 2017 0976-5697
A study on Quantum Cryptography and key generation method Shally CSE International Journal of Scientific & Engineering Research 2017 2229-5518
A Review About Enhancing Security Of Cloud Server Using Cryptography Shakti Arora CSE International Journal Innovative Research Thoughts 2017 2454-308X
Big Data Analytics In Healthcare: Opportunities, Challenges And Techniques Madhu Gautam CSE International Journal of Social Computing And Cyber-Physical Systems 2017 2040-073X
BPSO optimized k-means clustering approach for data analysis Aakanksha Mahajan CSE International Journal of Computer Applications 2016 0975-8887
Proposal and Implementation of MPLS Fuzzy Traffic Monitor Anju Gandhi CSE International Journal of Advanced Computer Science And Applications 2016 2156-5570
Swarm Computing Techniques, Applications and Models Deepak Kumar CSE Global Journal For Current Engineering Research 2016 2265-2765
A Hybrid Approach using Maximum Entropy and Bayesian Learning for Detecting Delinquency in Financial Industry” Dharminder Kumar, Suman CSE International Journal of Knowledge-Based Organizations (Ijkbo) 2016 2155-6393
Congestion Control using Fuzzy Based LSPs in Multiprotocol Label Switching Networks Anju Gandhi CSE International Journal In Foundations Of Computer Science & Technology 2016 1839-7662
Implementing Cryptographic Algorithm in Term of Privacy in AODV Routing Protocol Sunil Ahuja CSE International Journal of Advance Research In Computer Science And Software Engineering 2016 2277-128X
Data Mining approach to energy efficiency in Wireless Sensor Networks Tanu Sharma CSE International Journal of Engineering Trends & Technology 2016 2231-5381
A Review Paper on Energy Efficiency Routing Protocol for Wireless Sensor Networks Harish Saini CSE International Journal of Advanced Research In Computer Science And Software Engineering 2016 2277-128X
A Review: Proactive and Reactive Routing Protocols of MANET in a Grid using Mobility Sumit KumarRana CSE International Journal For Advance Research In Engineering And Technology 2016 2320-6802
Study of Integrity Based Algorithm in Shakti Arora CSE International Journal of Institutional & Industrial Research 2016 2456-1274
 Decentralized Cloud Computing
 Environment
A Review on Attacks, Application and Routing Protocols of MANET Sunil Ahuja CSE International Journal of Recent Trends In Engineering And Research 2016 2455-1457
Energy Efficient A-LEACH Routing Protocol Harish Saini CSE International Journal of Innovative Research In Computer And Communication Engineering 2016 2320-9801
Analytical Review of Visual Cryptography Scheme Sumit KumarRana CSE International Journal For Advance Research In Engineering And Technology 2016 2320-6802
Efficient Scheduling by Genetic Algorithm and Simulated Annealing Sunil Ahuja CSE International Journal of Advance Research, Ideas And Innovations In Technology 2016 2454-132X
An enhanced Data Mining technique for energy efficiency in Wireless Sensor Networks Tanu Sharma CSE International Journal of Engineering Trends & Technology 2016 2231-5381
Mapreduce Technique: Review and SWOT Analysis Hari Singh CSE International Journal of Engineering Research 2016 2319-6890
Cryptic Techniques Based On Neural Nets Arpana Dureja CSE International Journal of Recent Research Aspects 2016 2349-7688
Securing Image Transmission using Steganography Deepak Kumar CSE Global Journal For Current Engineering Research 2016 2265-2765
Li-Fi (Light Fidelity) Future of Wireless Communication Harish Kumar Saini CSE Iosr Journal Of Mechanical And Civil Engineering 2016 2278-1684
Scalability and Fault Tolerance of MapReduce for Spatial data Hari Singh CSE Global Journal of Engineering Science And Research Management 2016 2349-4506
Novel approach for Integrity Verification in Dynamic Cloud environment Shakti Arora CSE International Journal of Science And Information Security 2016 1947-5500
Design of Fuzzy-based Traffic Provisioning in Software Defined Network Anju Gandhi CSE International Journal of Information Technology Convergence And Services 2016 2074-9015
Design of Fuzzy-based Traffic Provisioning in Software Defined Network Anju Bhandari, V.P. Singh CSE International Journal of Information Technology Convergence And Services 2016 2074-9015
Human Object Detection by HoG, HoB, HoC and BO Features Shekhar Singh CSE International Journal of Computer Applications 2016 0975-8887
Human Object Detection by HoG, HoB, HoC and BO Features S.C.Gupta CSE International Journal of Computer Applications 2016 0975-8887
IGSIM: An Architecture for High Performance Spatial Data Analysis Hari Singh CSE International Journal of Computer Science And Information Security 2016 1947-5500
Elliptic curve efficient power aware routing protocol for manet Pooja Kundu CSE International Journal of Advanced Research In Computer Engineering & Technology 2016 2278–1323
A survey on energy efficient routing protocols in mobile Adhoc network Pooja Kundu CSE International Journal of Advanced Research In Computer And Communication Engineering 2016 2278-1021
Enhanced privacy preserving access control in the cloud Shakti Arora CSE International Journal of Recent Research Aspects 2016 2349-7688
Grid Computing: Review and SWOT Analysis Hari Singh CSE International Journal of Engineering Research 2016 2319-6890
Cloud computing data security-background & Benefits Anjali Chaudhary CSE International Journal of Computer Science & Communication 2015 0973-7391
Performance Analysis of Steganography Algorithms using Spatial and Frequency Domain Sunil Ahuja CSE International Journal of Research In Information Technology 2015 2001-5569
Non-Preemptive Dynamic Scheduling for Prevention of Jobs Starvation in Distributed Systems Sumit KumarRana CSE International Journal of Scientific Research Engineering & Technology 2015 2278-0882
Design And Performance Evaluation Of Advance Visual Crypto System Arpana Dureja CSE International Journal of Advanced Research In Computer Science And Software Engineering 2015 2277-128X
Representation of Concept Hierarchy Using an Efficient Encoding Scheme Ruchika Yadav CSE International Journal of Computer Applications 2015 0975-8887
Data Security in Cloud Computing using Encryption and Steganography Karun Handa,Uma Singh CSE International Journal of Computer Science And Mobile Computing 2015 2320-088X
A survey on various TCP variants in mobile ad-hoc networks Anjali Chaudhary CSE International Journal of Advanced Research In Computer Science And Software Engineering 2015 2277-128X
A review of SaaS profit maximization in cloud computing Hari Singh CSE International Journal of Computer Science And Information Technologies 2015 0975–9646
Cloud Load Balancing Services Survey and Research Challenge Sunil Ahuja CSE International Journal of Advance Research In Computer Science And Software Engineering 2015 2277-128X
An Image Encryption Algorithm for Bulk of Image Data using Henon Chaotic Approach Sunil Ahuja CSE Interntional Journal For Research In Applied Science And Engineering Technology 2015 2321-9653
A Parametric Weighted Approach to Perform Load Balancing in Cloud Environment Amit Batra CSE International Journal of Computer Science And Mobile Computing 2015 2320-088X
Novel approach to ensure data security in cloud computing Anjali Chaudhary CSE International Journal of It & Knowledge Management 2015 0973-4414
Green cloud computing resource managing polocies a survey Shakti Arora CSE International Journal of Science And Research 2015 2319-7064
Survey of Various Image Encryption Methods and Evaluation Matrices Sunil Ahuja CSE International Journal of Computer Sciences And Engineering 2015 2348-8387
Review Of Online And Ofline Character Recognition Arpana Dureja CSE International Journal For Scientific Research & Development 2015 2321-0613
Gradient Controlled-BP Algorithm for Effective Intrusion Detection Shekhar Singh,sc gupta CSE International Journal of Computer Applications 2015 0975-8887
Identifying and classify Factors for Evaluating the Success of Software Developed by COTS Components Vikram Bali CSE International Journal of Computer Engineering And Technology 2015 0976–6375
An Improved Association Rule Mining Technique Using Transposed Database Ruchika Yadav CSE American Scientific Research Journal For Engineering, Technology, And Sciences 2015 2313-4402
Design & Implementation of Data Forwarding Mechanism with Sleep Scheduling in WSN Harish Saini CSE International Journal of Advance Research In Computer And Communication Engineering 2015 2278-1021
Cots Evaluation & Selection Process in Design of Component Based Software System Vikram Bali CSE Global Journal of Computer Science And Technology 2015 0975-4172
ANT-LOAD: A Proficient Meta-Heuristic Cloud Load Balancing Deepti Dhingra CSE International Journal of Computer Applications 2015 0975-8887
Web Health Analyzer for Search Engine Optimization Hari Singh CSE International Journal of Engineering And Technical Research 2015 2321-0869
An overview of anomalous sub population Hari Singh CSE International Journal of Engineering And Technical Research 2015 2321-0869
Profit maximization of SAAS by reusing the available VM Space in Cloud Computing Hari Singh CSE International Journal of Engineering And Computer Science 2015 2319-7242
BPSO optimized k-means clustering approach for medical data analysis Aakanksha Mahajan CSE International Journal of Scientific Research Engineering &Technology 2015 2278-0882
An Improved Multiple-Level Association Rule Mining Algorithm with Boolean Transposed Database Ruchika Yadav CSE International Journal of Computer Science And Information Security 2015 0975–9646
Optimization of Image Using Skeletonization technique with Advanced Algorithm Sumit KumarRana CSE International Journal of Scientific Research Engineering & Technology 2015 2278-0882
Review Of Online And Ofline Character Recognition Arpana Dureja CSE International Journal For Scientific Research And Development 2015 2321-0613
Implementation and classification of anomalous detection with varying parameters Hari Singh CSE International Journal of Research 2015 2348-6848
Black Hole and Flooding Attack against Routing layer in MANETS Harish Saini CSE International Journal For Multi-Disciplinary Engineering And Business Management 2014 2348-2249
Survey on Prevention Methods for DDOS Attacks in MANETS”, in Volume 4, Issue 7, Shakti CSE International Journal of Advanced Research In Computer Science And Software Engineering 2014 2277 128X
Implementation of Database Synchronization Technique between client and server Anjali Chaudhary CSE International Journal of Engineering Science And Innovative Technology 2014 2319-5967
Detection and recovery of coverage holes in WSN using grid based clustering Anjali Chaudhary CSE International Journal of Technology Enhancements And Emerging Engineering Research 2014 2347-4289
Detection and prevention of DDOS attack in Manet by nullifying the broadcasting IP address Shakti Arora CSE Global Journal For Current Engineering Research 2014 2265-2765
Impact of AODV under Black Hole and Flooding Attack Harish Saini CSE International Journal of Computer Science And Mobile Computing 2014 2320-088X
Robust Algorithm to Design Host, watermark Image using Visual Cryptography on Color Image Anju Gandhi, Shivani Sharma CSE International Journal of Advanced Research In Computer Science 2014 0976-5697

Book/Chapter Publications

Name of the Author(s) Title of the book/chapters  published Year of publication ISBN/ISSN number of the proceeding Name of the publisher
Shakti Arora, Vijay Athavale An Intelligent IoT Enabled – Hydroponics System for Round the Year Cultivation of Vegetables. 2021 978-1-53618-958-2 Nova Science Publishers, USA
Sumit Rana Internet of Things/Intelligent amalgamation of blockchain technology with industry 4.0 to improve security 2021 978-036-768-652-9 CRC press Taylor & Francis group
Shakti Arora, Vijay Athavale Artificial­­­ intelligence and Virtual Assistant – Working Model and Comparative Analysis 2020 978-981-15-7130-5 Springer Lecture Notes
Ankit Bansal & Vijay Athavale Big Data and Analytics in Higher Educational Institutions 2020 978-981-15-7130-5 Springer
Shakti Arora Recent Development of Computational Intelligence, Studies In Computational Intelligence Book/A variant of secret Sharing with Poly 1305 2019 978-3-03012500-4 Springer
Sonam Handbook of research on Network Forensics
and Analysis Techniques/Wireless Sensor Networks: A  Technical Survey
2018 978-1-5225-4100-4 IGI GLOBAL
Sumit Rana Scenario of environmental research and development(book)/Investigation Of Smart Home Framework In View Of Cloud Computing And Key Advancements With Iot(Chapter 17) 2018 978-93-5346-498-1 K.D.Ahire
Charu Chhabra Data Mining and Warehousing 2014 978-93-82247-10-4 Genius Publication
Charu Chhabra Internet Programming 2014 978-93-82247-06-7 Genius Publication

Conference Publications

Name of the Author(s) Title of the paper Title of the proceedings of the conference Name of the conference National / international ISBN/ISSN number of the proceeding Name of the publisher
Rajender Kumar Analysis of Covid-19 Pandemic impact International conference on Post Covid Challenges on Life and Livelihood International conference on Post Covid Challenges on Life and Livelihood International   RTU-TEQIP-III Sponsored
Gaurav Gambhir Multi-core Implementation of Chaotic RGB-LSB Steganography Technique International Conference on Parallel, Distributed and Grid Computing (PDGC) International Conference on Parallel, Distributed and Grid Computing (PDGC) International   IEEE
Shakti Arora,Vijay Athavale DeBNet: Multilayer Deep Network for Liveness Detection in Face Recognition System International Conference on Signal Processing and Integrated Networks International Conference on Signal Processing and Integrated Networks International 978-1-7281-5475-6 IEEE
Shiraz Khurana Energy Efficient Multimeric Multichannel Routing Protocol for Cognitive Radio Ad Hoc Network 5th International Conference on Cyber Security & Privacy in Communication Networks (ICCS) 5th International Conference on Cyber Security & Privacy in Communication Networks (ICCS) International    
Gaurav Gambhir Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique International Conference on Computational Intelligence, Communications, and Business Analytics International Conference on Computational Intelligence, Communications, and Business Analytics International   Springer,Singapore
Vikas Sethi An Android Application On Game On Road safety International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Shekhar A Gis-Gps Base New Connection Estimate Generation By Using Mobile &Web Based application International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Ginni Chawla Connecting Delhi: A Complaint Portal For MCD International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Stuti Mehla Capes: A Computherized Application for paperless examination screening International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Deepak Kumar An Efficient Data Locality System For Big Data Processing Over Distributed Data Centre by using scheduling technique International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Deepak Singla Bipedal Locomotives Regarding Safety International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Sandeep S. Bindra Combinational  Fuzzy  Expert system for academic appraisal International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Dr.S.C.Gupta An  Efficient  Data  Locality  System  For  Big  Data Processing Over Distributed Data Centre By Using Scheduling Technique International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Vipin Tomar PVO-Based Multiple Message Segments reversible data hiding International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Anshul Rani Filling The Gaps: Inter Code Smell Relations, Refactoring Sequence And Severity Parameters International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Palak Singhal Comparative Analysis Of Different Mobile Strategies In heterogeneous WSN International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Anju Bhandari Analyzing Social response to specific program International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Anju Bhandari Sentiment Analysis of Twitter using Classifier International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Anju Bhandari Advent Artificial Intelligence Finance Management International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Harish Saini Object detection and Recognition International conference on intelligent systems: Approaches, Technologies and Networks International conference on intelligent systems: Approaches, Technologies and Networks International 978-93-83861-29-4 IGI GLOBAL,Mili Publications
Anju Bhandari Smart Precision Farming System For High Crop Yielding International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Alankrita Aggarwal To Design a Mammogram Edge Detection Algorithm using Artificial Neural Network (ANN) International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Gaurav Gambhir Utilizing Idle Inventory among defence shipyards by information sharing International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International Conference on “Intelligent Systems: Approaches, Technologies and Networks (ISATN-2019)” International 978-93-83861-29-4 Unique Publications
Deepak Kumar Metaheuristic Policies for Discovery Task Programming Matters in Cloud Computing ICCCA (IEEE) ICCCA International 978-1-5386-6947-1 IEEE
Gaurav Gambhir Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique International Conference on Computational Intelligence, Communications, and Business Analytics   International 978-981-13-8580-3 Springer
Aakanksha Mahajan Diagnosis of Diabetes Mellitus using PSO and KNN Classifier International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN) IC3TSN-2017 International 978-1-5386-0627-8 IEEE
Vikram Bali A novel Approach for Blast-Induced Fly-Rock Prediction Based on Particle Swarm Optimization and Artifical Neural Network International Conference on Recent Advancement on Computer and Communication (ICRAC-2017), Springer International Conference on Recent Advancement on Computer and Communication (ICRAC-2017), Springer International 978-981-10-8198-9 Springer
Suman Selection of Optimal Credit Card Fraud Detection Models Using a Coefficient Sum Approach 2017 International Conference on Computing Communication and Automation (ICCCA 2017) International Conference on Computing, Communication and Automation International 978-1-5090-6472-4 IEEE
Aakanksha Mahajan Diagnosis of Diabetes Mellitus using PCA and Genetically optimized Neural Network International Conference on Computing, Communication and Innovation ICCCA-2017 International 978-1-5090-6471-7 IEEE
Vikram Bali A Brief Review of Methods for Prediction of Fly-Rock in Blasting International Conference on Communication, Computing and Networking (ICCCM-2017) International Conference on Communication, Computing and Networking (ICCCM-2017) International 978-8-193-38970-6 NITTTR, CHD
Shivani Gaba and Ramesh Kait A Review of Security Analyses in AODV Routing Protocol Manthan 2017, TEQIP-II Sponsored (RCCT-2017), Mar 2-3 2017 Recent Trends in Computing and Communication Technologies (RCCT), Murthal, National 978-93-86256-54-6 Excel India Publisher
Surjeet Singh Rural communication enhancement using mobile ad-hoc network Confluence 2017 Confluence 2017 International 978-1-5090-3518-2 IEEE
Vikram Bali Genetic programming and K-nearest neighbour classifier based intrusion detection model Confluence 2017 Confluence 2017 International 978-1-5090-3518-2 IEEE
S.C.Gupta Human Object Detection by HoG, HoB, HoC and BO Features Forth International Conference on Parallel, Distributed and Grid Computing Forth International Conference on Parallel, Distributed and Grid Computing International 978-1-5090-3669-1 IEEE
Surjeet Singh Avalanche parameters for deploying sensor nodes in snow bound region SMART-2016 SMART-2016 International 978-1-5090-3543-4 IEEE
Mahima Goyal A Proposed framework for improved identification of implicit aspects in tourism domain using supervised learning technique International Conference on Advances in Information Communication Technology & Computing International Conference on Advances in Information Communication Technology & Computing International 978-1-4503-4213-1 ACM
Hari Singh Spatial Data Analysis with ArcGIS and MapReduce 2016 International Conference on Computing, Communication and Automation (ICCCA) International conference on Conference Computing, Communication and Automation International 978-1-5090-1666-2 IEEE
Pardeep Kamboj Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks ICTCS ’16 Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies ACM conference (ICTCS-2016) International 978-1-4503-3962-9 ACM
Sonam Comprehensive Study of Web Application Attacks and Classification International Conference on Computing for Sustainable Global Development INDIACom-2016; 3rd International Conference, IEEE, March 2016 International 978-9-3805-4421-2 IEEE
Download Brochure