Title of paper |
Name of the author/s |
Department of the teacher |
Name of journal |
Year of publication |
ISSN number |
A Review: Role Of Social Media In Aid And Education |
Kunal Uppal,Shubham,Paramvir Dalal,Priyamvada |
CSE |
International Journal of Scientific Research in Engineering and Management(IJSREM) |
2021 |
2582-3930 |
An Effective Face Recognition System Based On Cloud Based Iot With A Deep Learning Model |
Deepika Chauhan, Ashok Kumar, Pradeep Bedi, Vijay Anant Athavale, D. Veeraiah, Boppuru Rudra Pratap, |
CSE |
Microprocessors & Microsystems |
2021 |
0141-9331 |
Shared Memory Implementation And Performance Analysis Of Lsb Steganography Based On Chaotic Tent Map |
Gaurav Gambhir, Jyotsna Kumar Mandal |
CSE |
Innovations in Systems and Software Engineering |
2021 |
1614-5054 |
Suicidal Behaviour Screening Using Machine Learning Techniques |
Anju Bhandari Gandhi, Devendra Prasad, Umesh Kumar Lilhore |
CSE |
International Journal of Biomedical Engineering and Technology |
2021 |
1752-6426, |
Multicore Implementation And Performance Analysis Of A Chaos Based Lsb Steganography Technique |
Gaurav Gambhir, Jyotsna Kumar Mandal |
CSE |
Microsystem Technologies |
2020 |
1432-1858 |
Blockchain Based Business Model For Digital Asset Management In Trustless Collaborative Environment |
Sumit Kumar Rana, Sanjeev Kumar Rana |
CSE |
Journal of critical reviews |
2020 |
2394-5125 |
Brain Tumour Segmentation- An Application Of Image Processing |
Arora S., Athavale V, Jain I., Aakriti |
CSE |
Advances and Applications in Mathematical Sciences |
2020 |
0974-6803 |
Innovative Techbin: A Solution For Green City |
Dhruv Vohra, Gunjan , Anju Gandhi |
CSE |
International Journal of Scientific research in Computer Sience and Engineering |
2020 |
2320-7639 |
Integration Of Blockchain And Iot For Data Storage And Management |
Athavale V. A., Bansal A., Nalajala S. & Aurelia S |
CSE |
Materials Today: Proceedings |
2020 |
2214-7853 |
Mathematical Model To Analyse The Effect Of Quarantine On Spread And Containment Of Covid-19 |
Afshan Hassan , Amit Kumar Bindal, Anju Bhandari gandhi , Devendra Prasad |
CSE |
Annals of the Romanian Society for Cell Biology |
2020 |
2067-8282 |
Multi Biometric System For Secure Fingerprint Recognition |
Rahul Kaushal |
CSE |
International Journal of Electronics Engineering |
2019 |
0973-7383 |
Novel Approach For Raising Security Using Feature Level Fusion |
Rahul Kaushal |
CSE |
International Journal of Electronics Engineering |
2019 |
0973-7384 |
Fuzzy Based Automated Feedback Collection And Analysis System |
Karun Handa,Reema Lalit |
CSE |
Advances and Applications in Mathematical Sciences |
2019 |
0974-6803 |
Efficient Epidemic Routing Protocol for Disruption Tolerant Networks |
Shakti Arora |
CSE |
Advanced Journal of Computer Science And Engineering |
2019 |
2393-8390 |
Integrity verification mechanisms adopted in cloud environment |
Shakti Arora |
CSE |
International Journal of Engineering and Advanced Technology |
2019 |
2249-8958 |
A Hybrid Approach for Opinion Mining Using Twitter Data |
Stuti Mehla |
CSE |
Journal of Computational and Theoretical Nanoscience |
2019 |
1546-1955 |
Primary User Avoidance Algorithm For Crahns Using Reinforcement Learning |
Shiraz Khurana |
CSE |
International Journal of Innovative Technology and Exploring Engineering |
2019 |
2278-3075 |
Granular Privacy Preserving Scheme Over Cloud Environments |
Shakti Arora |
CSE |
Advanced Journal of Computer Science And Engineering |
2019 |
2393-8390 |
Ddos attacks simulation in cloud computing environment |
Shakti Arora |
CSE |
International Journal of Innovative Technology and Exploring Engineering |
2019 |
2278-3075 |
An optimized cloud architecture for integrity verification |
Shakti Arora |
CSE |
Journal of computational and Theoretical Nanoscience |
2019 |
1546-1963 |
Trust evaluation factors in cloud computing with open stack |
Shakti Arora |
CSE |
Journal of computational and Theoretical Nanoscience |
2019 |
1546-1963 |
 Resolving Problem Of Trust Context In Cloud Computing |
Shakti Arora |
CSE |
International Journal of Engineering Research In Computer Science And Engineering |
2018 |
2394-2320 |
Fingerprint Authentication System Using Log Gabor Filter |
Punit Soni |
CSE |
International Journal of Advance Research, Ideas And Innovations In Technology |
2018 |
2454-132X |
Cost-Based Multi-Qos Job Scheduling Algorithm Using Genetic Approach In Cloud Computing Environment |
Shakti Arora |
CSE |
International Journal of Advanced Science And Research |
2018 |
2455-4227 |
An integrated approch towrds query based learning on multi objective Ant lion optimization |
Deepak Kumar |
CSE |
Journal of Advanced Research In Dynamical And Control Systems |
2018 |
1943-023X |
Amazon Backed File System With Enhanced Storage Feature Volume 6, Issue 2 April 2018 | |
Shakti Arora |
CSE |
The International Journal of Creative Research Thoughts |
2018 |
2320-2882 |
Iaco-Lb: A Navel Technique For Load Balancing In Cloud Computing |
Sunil Ahuja |
CSE |
International Journal of Innovative Research In Computer And Communication Engineering |
2018 |
2320-9801 |
Securing Communication In Manet Through E-Gaman Algorithm |
Shivani |
CSE |
International Journal of Creative Research Thoughts |
2018 |
2320-2882 |
Performance Evaluation Of De-Noised Medical Images After Removing Speckled Noise By Wavelet Transform |
Arun Kumar |
CSE |
International Journal of Biomedical Engineering And Technology |
2018 |
1752-6426 |
A Comparative Study : Reviewing Performance Of Routing Protocols In Manets |
Shivani |
CSE |
International Journal of Scientific Research In Science, Engineering And Technology |
2018 |
2394-4099 |
Accuracy Improvement in Intruder Detection using Optimally Selected Features |
Aastha, Shivani Gaba |
CSE |
International Journal of Research In Electronics And Computer Engineering |
2018 |
2348-2281 |
An Efficient data locality sysytem for big data processing over distributed data centre by using scheduling technique |
Navneet Kaur, Deepak Kumar and S. C Gupta |
CSE |
International Journal of Research And Analytical Reviews |
2018 |
2348-1269 |
Data decomposition and matrix reduction using binary-PSO to tensor mining |
Kanika Patel , S.C Gupta and Deepak Kumar |
CSE |
International Journal For Research In Engineering Application & Management |
2018 |
2554-9150 |
An Effective Framework for Security and Performance in Intelligent Vehicular Ad-Hoc Network |
Rajender Kumar |
CSE |
Journal of Advanced Research In Dynamical And Control Systems |
2018 |
1943-023x |
Deep Learning Integrated Approach for Collision Avoidance in Internet of Things based Smart Vehicular Networks |
Rajender Kumar |
CSE |
Journal of Advanced Research In Dynamical And Control Systems |
2018 |
1943-023x |
Comparative Analysis of Impact of Convolution and Optimize Features on Tweets Sentiment Classification |
Stuti Mehla |
CSE |
Journal of Advanced Research In Dynamical And Control Systems |
2018 |
1943-023X |
Adaptive Model For Integrity Verification In Cloud Computing System |
Shakti Arora |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
0976-5697 |
Multi-level security mechanism for audio steganography |
Vikram Bali |
CSE |
International Journal of Advanced Research In Education & Technology |
2017 |
0976-6480 |
readability improvement in java language by using segmentation technique |
Pooja Kundu |
CSE |
International Journal of Innovative Research In Computer And Communication Engineering |
2017 |
2320-9801 |
Multi-level security mechanism for audio steganography |
S.C.Gupta |
CSE |
International Journal of Advanced Research In Education & Technology |
2017 |
0976-6480 |
A Mapreduce Based Scalable Discovery And Indexing Of Structured Big Data |
Hari Singh |
CSE |
Future Generation Computer System |
2017 |
2312-739X |
Multi-level security mechanism for audio steganography |
Deepti Dhingra |
CSE |
International Journal of Advanced Research In Education & Technology |
2017 |
0976-6480 |
research of persistence solution based on ORM and hibernate technology |
Pooja Kundu |
CSE |
International Journal of Advanced Research In Computer Science And Software Engineering |
2017 |
2277-128X |
A review on CBIR by cascading features & SVM |
Sandeep jain |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
0976-5697 |
A Survey to Nature Inspired Soft Computing |
Deepak Kumar |
CSE |
International Journal of Information System Modeling And Design |
2017 |
1947-8186 |
Literature review on protocols for WSN |
Anju Gandhi |
CSE |
Journal of Network Communications And Emerging Technologies |
2017 |
2395-5317 |
A Modified Approach to Improve Security and Congestion Control in AODV Routing Protocol against Blackhole Attack |
Shivani Gaba and Ramesh Kait |
CSE |
International Journal on Recent And Innovation Trends In Computing And Communication |
2017 |
2321-8169 |
Performance Evaluation and Selection of Financial Fraud Detection Models using MCDM Approach |
Rakesh Garg, Suman |
CSE |
International Journal of Recent Research Aspects |
2017 |
2349-7688 |
Literature Review On An Approach To Detect Packets Using Packet Sniffing |
Anju Gandhi |
CSE |
Journal of Network Communications And Emerging Technologies |
2017 |
2395-5317 |
Literature Review on Clustering Toplolgy Analysis for Hetrogenous Wireless Sensor Network |
Anju Gandhi |
CSE |
International Journal For Scientific Research & Development |
2017 |
2321-0613 |
Recommendation Systems: A Review Report |
Shekhar Singh |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
0976-5697 |
Security Issues In Mobile Adhoc Networks: Attacks And Their Countermeasures |
Harish Saini |
CSE |
International Journal For Research In Applied Science And Engineering Technology |
2017 |
2321-9653 |
âEnergy Consumption Minimization in WSN using BFOâ |
Anju Gandhi |
CSE |
International Journal on Recent And Innovation Trends In Computing And Communication |
2017 |
2321-8169 |
A Proposal For Predicting Missing Values In A Data Set Using Supervised Learning |
S.C.Gupta |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
0976-5697 |
Storage And Retrieval Of Software Component Using Hadoop And Mapreduce |
Shekhar Singh |
CSE |
International Journal of Engineering And Technology (Ijet |
2017 |
0975-4024 |
Hybridization of Som And Pso For Detecting Fraud In Credit Card |
Suman, Dharminder Kumar |
CSE |
International Journal of Information Systems In The Service Sector (Ijisss) |
2017 |
1935-5688 |
Mitigation of Jellyfish Attack In Aodv |
Harish Saini |
CSE |
International Journal For Research In Applied Science And Engineering Technology |
2017 |
2321-9653 |
âPSOGSA Based Improved LEACH Algorithmâ, |
Anju Gandhi |
CSE |
International Journal of Research In Electronics And Computer Engineering |
2017 |
2348-2281, |
Predicting Missing Values In A Dataset: Challenges And Approaches |
S.C.Gupta |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
2349-7688 |
A Novel Gsa-Svm Based Attribute Selection Algorithm For Movie Recommendation |
Shekhar Singh |
CSE |
International Journal of Scientific Research Engineering & Technology (Ijsret) |
2017 |
2278-0882 |
âSecurity and DDOS Mechanisms in Internet of Thingsâ |
Anju Gandhi |
CSE |
International Journal of Advanced Research In Computer Science |
2017 |
0976-5697 |
A study on Quantum Cryptography and key generation method |
Shally |
CSE |
International Journal of Scientific & Engineering Research |
2017 |
2229-5518 |
A Review About Enhancing Security Of Cloud Server Using Cryptography |
Shakti Arora |
CSE |
International Journal Innovative Research Thoughts |
2017 |
2454-308X |
Big Data Analytics In Healthcare: Opportunities, Challenges And Techniques |
Madhu Gautam |
CSE |
International Journal of Social Computing And Cyber-Physical Systems |
2017 |
2040-073X |
BPSO optimized k-means clustering approach for data analysis |
Aakanksha Mahajan |
CSE |
International Journal of Computer Applications |
2016 |
0975-8887 |
Proposal and Implementation of MPLS Fuzzy Traffic Monitor |
Anju Gandhi |
CSE |
International Journal of Advanced Computer Science And Applications |
2016 |
2156-5570 |
Swarm Computing Techniques, Applications and Models |
Deepak Kumar |
CSE |
Global Journal For Current Engineering Research |
2016 |
2265-2765 |
A Hybrid Approach using Maximum Entropy and Bayesian Learning for Detecting Delinquency in Financial Industryâ |
Dharminder Kumar, Suman |
CSE |
International Journal of Knowledge-Based Organizations (Ijkbo) |
2016 |
2155-6393 |
Congestion Control using Fuzzy Based LSPs in Multiprotocol Label Switching Networks |
Anju Gandhi |
CSE |
International Journal In Foundations Of Computer Science & Technology |
2016 |
1839-7662 |
Implementing Cryptographic Algorithm in Term of Privacy in AODV Routing Protocol |
Sunil Ahuja |
CSE |
International Journal of Advance Research In Computer Science And Software Engineering |
2016 |
2277-128X |
Data Mining approach to energy efficiency in Wireless Sensor Networks |
Tanu Sharma |
CSE |
International Journal of Engineering Trends & Technology |
2016 |
2231-5381 |
A Review Paper on Energy Efficiency Routing Protocol for Wireless Sensor Networks |
Harish Saini |
CSE |
International Journal of Advanced Research In Computer Science And Software Engineering |
2016 |
2277-128X |
A Review: Proactive and Reactive Routing Protocols of MANET in a Grid using Mobility |
Sumit KumarRana |
CSE |
International Journal For Advance Research In Engineering And Technology |
2016 |
2320-6802 |
Study of Integrity Based Algorithm in |
Shakti Arora |
CSE |
International Journal of Institutional & Industrial Research |
2016 |
2456-1274 |
 Decentralized Cloud Computing |
 Environment |
A Review on Attacks, Application and Routing Protocols of MANET |
Sunil Ahuja |
CSE |
International Journal of Recent Trends In Engineering And Research |
2016 |
2455-1457 |
Energy Efficient A-LEACH Routing Protocol |
Harish Saini |
CSE |
International Journal of Innovative Research In Computer And Communication Engineering |
2016 |
2320-9801 |
Analytical Review of Visual Cryptography Scheme |
Sumit KumarRana |
CSE |
International Journal For Advance Research In Engineering And Technology |
2016 |
2320-6802 |
Efficient Scheduling by Genetic Algorithm and Simulated Annealing |
Sunil Ahuja |
CSE |
International Journal of Advance Research, Ideas And Innovations In Technology |
2016 |
2454-132X |
An enhanced Data Mining technique for energy efficiency in Wireless Sensor Networks |
Tanu Sharma |
CSE |
International Journal of Engineering Trends & Technology |
2016 |
2231-5381 |
Mapreduce Technique: Review and SWOT Analysis |
Hari Singh |
CSE |
International Journal of Engineering Research |
2016 |
2319-6890 |
Cryptic Techniques Based On Neural Nets |
Arpana Dureja |
CSE |
International Journal of Recent Research Aspects |
2016 |
2349-7688 |
Securing Image Transmission using Steganography |
Deepak Kumar |
CSE |
Global Journal For Current Engineering Research |
2016 |
2265-2765 |
Li-Fi (Light Fidelity) Future of Wireless Communication |
Harish Kumar Saini |
CSE |
Iosr Journal Of Mechanical And Civil Engineering |
2016 |
2278-1684 |
Scalability and Fault Tolerance of MapReduce for Spatial data |
Hari Singh |
CSE |
Global Journal of Engineering Science And Research Management |
2016 |
2349-4506 |
Novel approach for Integrity Verification in Dynamic Cloud environment |
Shakti Arora |
CSE |
International Journal of Science And Information Security |
2016 |
1947-5500 |
Design of Fuzzy-based Traffic Provisioning in Software Defined Network |
Anju Gandhi |
CSE |
International Journal of Information Technology Convergence And Services |
2016 |
2074-9015 |
Design of Fuzzy-based Traffic Provisioning in Software Defined Network |
Anju Bhandari, V.P. Singh |
CSE |
International Journal of Information Technology Convergence And Services |
2016 |
2074-9015 |
Human Object Detection by HoG, HoB, HoC and BO Features |
Shekhar Singh |
CSE |
International Journal of Computer Applications |
2016 |
0975-8887 |
Human Object Detection by HoG, HoB, HoC and BO Features |
S.C.Gupta |
CSE |
International Journal of Computer Applications |
2016 |
0975-8887 |
IGSIM: An Architecture for High Performance Spatial Data Analysis |
Hari Singh |
CSE |
International Journal of Computer Science And Information Security |
2016 |
1947-5500 |
Elliptic curve efficient power aware routing protocol for manet |
Pooja Kundu |
CSE |
International Journal of Advanced Research In Computer Engineering & Technology |
2016 |
2278â1323 |
A survey on energy efficient routing protocols in mobile Adhoc network |
Pooja Kundu |
CSE |
International Journal of Advanced Research In Computer And Communication Engineering |
2016 |
2278-1021 |
Enhanced privacy preserving access control in the cloud |
Shakti Arora |
CSE |
International Journal of Recent Research Aspects |
2016 |
2349-7688 |
Grid Computing: Review and SWOT Analysis |
Hari Singh |
CSE |
International Journal of Engineering Research |
2016 |
2319-6890 |
Cloud computing data security-background & Benefits |
Anjali Chaudhary |
CSE |
International Journal of Computer Science & Communication |
2015 |
0973-7391 |
Performance Analysis of Steganography Algorithms using Spatial and Frequency Domain |
Sunil Ahuja |
CSE |
International Journal of Research In Information Technology |
2015 |
2001-5569 |
Non-Preemptive Dynamic Scheduling for Prevention of Jobs Starvation in Distributed Systems |
Sumit KumarRana |
CSE |
International Journal of Scientific Research Engineering & Technology |
2015 |
2278-0882 |
Design And Performance Evaluation Of Advance Visual Crypto System |
Arpana Dureja |
CSE |
International Journal of Advanced Research In Computer Science And Software Engineering |
2015 |
2277-128X |
Representation of Concept Hierarchy Using an Efficient Encoding Scheme |
Ruchika Yadav |
CSE |
International Journal of Computer Applications |
2015 |
0975-8887 |
Data Security in Cloud Computing using Encryption and Steganography |
Karun Handa,Uma Singh |
CSE |
International Journal of Computer Science And Mobile Computing |
2015 |
2320-088X |
A survey on various TCP variants in mobile ad-hoc networks |
Anjali Chaudhary |
CSE |
International Journal of Advanced Research In Computer Science And Software Engineering |
2015 |
2277-128X |
A review of SaaS profit maximization in cloud computing |
Hari Singh |
CSE |
International Journal of Computer Science And Information Technologies |
2015 |
0975â9646 |
Cloud Load Balancing Services Survey and Research Challenge |
Sunil Ahuja |
CSE |
International Journal of Advance Research In Computer Science And Software Engineering |
2015 |
2277-128X |
An Image Encryption Algorithm for Bulk of Image Data using Henon Chaotic Approach |
Sunil Ahuja |
CSE |
Interntional Journal For Research In Applied Science And Engineering Technology |
2015 |
2321-9653 |
A Parametric Weighted Approach to Perform Load Balancing in Cloud Environment |
Amit Batra |
CSE |
International Journal of Computer Science And Mobile Computing |
2015 |
2320-088X |
Novel approach to ensure data security in cloud computing |
Anjali Chaudhary |
CSE |
International Journal of It & Knowledge Management |
2015 |
0973-4414 |
Green cloud computing resource managing polocies a survey |
Shakti Arora |
CSE |
International Journal of Science And Research |
2015 |
2319-7064 |
Survey of Various Image Encryption Methods and Evaluation Matrices |
Sunil Ahuja |
CSE |
International Journal of Computer Sciences And Engineering |
2015 |
2348-8387 |
Review Of Online And Ofline Character Recognition |
Arpana Dureja |
CSE |
International Journal For Scientific Research & Development |
2015 |
2321-0613 |
Gradient Controlled-BP Algorithm for Effective Intrusion Detection |
Shekhar Singh,sc gupta |
CSE |
International Journal of Computer Applications |
2015 |
0975-8887 |
Identifying and classify Factors for Evaluating the Success of Software Developed by COTS Components |
Vikram Bali |
CSE |
International Journal of Computer Engineering And Technology |
2015 |
0976â6375 |
An Improved Association Rule Mining Technique Using Transposed Database |
Ruchika Yadav |
CSE |
American Scientific Research Journal For Engineering, Technology, And Sciences |
2015 |
2313-4402 |
Design & Implementation of Data Forwarding Mechanism with Sleep Scheduling in WSN |
Harish Saini |
CSE |
International Journal of Advance Research In Computer And Communication Engineering |
2015 |
2278-1021 |
Cots Evaluation & Selection Process in Design of Component Based Software System |
Vikram Bali |
CSE |
Global Journal of Computer Science And Technology |
2015 |
0975-4172 |
ANT-LOAD: A Proficient Meta-Heuristic Cloud Load Balancing |
Deepti Dhingra |
CSE |
International Journal of Computer Applications |
2015 |
0975-8887 |
Web Health Analyzer for Search Engine Optimization |
Hari Singh |
CSE |
International Journal of Engineering And Technical Research |
2015 |
2321-0869 |
An overview of anomalous sub population |
Hari Singh |
CSE |
International Journal of Engineering And Technical Research |
2015 |
2321-0869 |
Profit maximization of SAAS by reusing the available VM Space in Cloud Computing |
Hari Singh |
CSE |
International Journal of Engineering And Computer Science |
2015 |
2319-7242 |
BPSO optimized k-means clustering approach for medical data analysis |
Aakanksha Mahajan |
CSE |
International Journal of Scientific Research Engineering &Technology |
2015 |
2278-0882 |
An Improved Multiple-Level Association Rule Mining Algorithm with Boolean Transposed Database |
Ruchika Yadav |
CSE |
International Journal of Computer Science And Information Security |
2015 |
0975â9646 |
Optimization of Image Using Skeletonization technique with Advanced Algorithm |
Sumit KumarRana |
CSE |
International Journal of Scientific Research Engineering & Technology |
2015 |
2278-0882 |
Review Of Online And Ofline Character Recognition |
Arpana Dureja |
CSE |
International Journal For Scientific Research And Development |
2015 |
2321-0613 |
Implementation and classification of anomalous detection with varying parameters |
Hari Singh |
CSE |
International Journal of Research |
2015 |
2348-6848 |
Black Hole and Flooding Attack against Routing layer in MANETS |
Harish Saini |
CSE |
International Journal For Multi-Disciplinary Engineering And Business Management |
2014 |
2348-2249 |
Survey on Prevention Methods for DDOS Attacks in MANETSâ, in Volume 4, Issue 7, |
Shakti |
CSE |
International Journal of Advanced Research In Computer Science And Software Engineering |
2014 |
2277 128X |
Implementation of Database Synchronization Technique between client and server |
Anjali Chaudhary |
CSE |
International Journal of Engineering Science And Innovative Technology |
2014 |
2319-5967 |
Detection and recovery of coverage holes in WSN using grid based clustering |
Anjali Chaudhary |
CSE |
International Journal of Technology Enhancements And Emerging Engineering Research |
2014 |
2347-4289 |
Detection and prevention of DDOS attack in Manet by nullifying the broadcasting IP address |
Shakti Arora |
CSE |
Global Journal For Current Engineering Research |
2014 |
2265-2765 |
Impact of AODV under Black Hole and Flooding Attack |
Harish Saini |
CSE |
International Journal of Computer Science And Mobile Computing |
2014 |
2320-088X |
Robust Algorithm to Design Host, watermark Image using Visual Cryptography on Color Image |
Anju Gandhi, Shivani Sharma |
CSE |
International Journal of Advanced Research In Computer Science |
2014 |
0976-5697 |