Menu

Publications

Journal:

2018:
1. Paramita De, Sekhar Mandal, Partha Bhowmick and Bhabatosh Chanda. Robust Vectorization Method for Electrical Circuit Drawings using Component Morphology" in International Journal on Pattern Analysis and Applications (PAAA), 2018. Accepted.

2017::
1. Paramita De, Sekhar Mandal and Partha Bhowmick. Hierarchical Vectorization of Electrical Drawings in Document Images by Connectivity Analysis of Symbols and Super-components" in International Journal of Pattern Recognition and Image Analysis (PRIA), Volume 27, No. 2, pp. 308-324, 2017.
2. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Protection of Key in Private Key Cryptography” paper published in “International Journal of Advanced Research”, Volume 5, Issue 2, Feb 2017.
3. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Algorithm for Protection of Key in Private Key Cryptography” paper published in “International Journal of Engineering Research in Computer Science and Engineering”, Volume 4, Issue 3, Mar 2017.
4. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Hybrid Key Cryptography: A Tool for Security” paper published in “International Journal of Innovative Research in Science,Engineering and Technology”, Volume 6, Issue 3, Mar 2017.
5. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Methods for Protection of Key in Private KeyCryptography” paper published in “International Journal of Innovative Research in Computer Science & Technology”, Volume 5, Issue 2, Mar 2017.
6. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Information Security: A Saga of Security Measures” paper published in “International Journal Of Engineering And Computer Science”, Volume 6, Issue 3, Mar 2017.
7. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav,”Function Codes for Protection of Key in Private Cryptography” paper accepted and presented in International Conference ABLAZE-2017,Mar 2017 at Amity University by IEEE and DST.
8. Neha Tyagi,Priyanka Chaudhary,Priyanka Tripathi,Tanu Varshney, “Combating Mind Wandering in The Area of Academics” paper published in NIER Journal and presented in International conference on Advancement in Electrical,Electronics & Computer Engineering(ICAEECE-2017).
9. Neha Tyagi,L.K Tyagi “Fusion Of Cloud Computing And Wearables: Change In The Era Of Health Care” paper accepted and presented in International Conference ABLAZE-2017,Mar 2017 at Amity University by IEEE and DST.
10. Neha Tyagi,Vishal Tyagi,Runjhun Saxena,Harsh Tyagi,Nikita,”An Approach towards Data Security” paper accepted and presented in International Conference ABLAZE-2017,Mar 2017 at Amity University by IEEE and DST.
11. Neha Tyagi,Kishan Agarwal,Nishant Upadhyay,Mukesh Kumar,Brij Bhushan Gupta,Deepak Kumar,”Security Issues,Research and Challenges in Cloud Computing”paper published in International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) in Vol 4, Issue 2, February 2017.

2016::
1. A.P. Sirivastava et.al. “Stability Analysis of SIDR model for worm propagation in Wireless Sensor Network”, is published in Indian Journal of Science & Technology (IJST),Vol9(31),DOI:10.17485/ijst/2016/v9i31/98453,August2016,URL,http://www.indjst.org/index.php/indjst/article/view/98453/72508. (ISSN (Print) : 0974-6846, ISSN (Online) : 0974-5645) (Scopus Indexed).
2. A.P. Sirivastava et.al. “A Frame Structure: Cluster Finding and Multidimensional Conception of Programmed Data Mining Using Intelligent Agents ”, is published in International Journal of Innovative Research in Computer Science &Technology"(IJIRCST), Volume-4, Issue-3, May-2016. (ISSN: 2347- 5552).
3. Pardeep Malik, “Heuristic Prediction for L1 Data Cache Misses for Low Power Cache Memory to Reduce the Cache Miss Penalty.” Int. J. for Scientic Research & Development, Vol. 4, Issue 7, Sept. 2016.
4. H. pandey, S. lade, V. Bhandari, “ Balance Key algorithm for Uniform Coverage in Heterogeneous Wireless Sensor Networks,”IJCTEE,1(2).
5. P. Shukla, H. Pandey, “Modelling and Analysis of Customer-Product Relationship for Revenue Growth of Online Telecom Industry,” IRJET,3(11),2016.
6. Paramita De, Sekhar Mandal, Partha Bhowmick and Amit Das. ASKME: Adaptive Sampling with Knowledge Driven Vectorization of Mechanical Engineering Drawings" in International Journal on Document Analysis and Recognition (IJDAR), Volume 19, Issue 1, pp 11-29, March 2016.
7. Shukla, H. Pandey, “Algorithm for generating sub keys basins from a new substitution block cipher algorithm,”IRJET, 3(11), 2016.
8. U. K Srivastava, H. Pandey, “ Hybrid image compression using DCT and Fuzzy logic,”IJARIIT, 2(6), 2016.
9. S. K. Srivastava, H. Pandey, “Medical image watermarking with patient details as watermark,” IJARIIT, 2(6), 2016.

2015:
1. A.P. Sirivastava et.al. “Performance Analysis of Proactive, Reactive and Hybrid Routing Protocol in MANET”, is published in International Journal of Advances in Electrical and Electronics Engineering (IJAEEE), Volume-4, Number-1, 2015. (ISSN: 2319-1112).
2. Manoj Kumar Tyagi, L. S. S. Reddy, Srinivasan M., “Application of State-Space Approach to Traditional Software Project Tracking,” International Journal of Applied Engineering Research, Volume 10, Number 16, 2015, pp. 36318-36323. (Scopus Indexed)
3. AY. Bala Tripura Sundari, D.S.V.S.Sasi Kumar Hari, Manoj Kumar Tyagi, “A study on Data Security using Deterministic Matrix Approach Method of Steganography”, International journal of Modern Sciences and Engineering technology, Vol. 2, Issue 1, 2015, pp. 8-17.
4. A Tiwari, A. Arya, and S. Shukla, “Digital Watermarking Analysis Using Dct & Dwt,” International Journal of Emerging Technology and Innovative Engineering, vol. 1, no. 6, Jun. 2015.
5. A Tiwari, A. Arya, and S. Shukla, “Digital Watermarking Encryption and Decryption Using DWT,” International Research Journal of Engineering and Technology (IRJET), vol. 2, May 2015.
6. Ajay Sikandar and Sushil Kumar “Energyefficient clustering in heterogeneous wireless sensor networks using degree of connectivity”,International Journal of Computer Network and Communication, Vol. 7, No.2, 2015, pp. 19-31.
7. NehaTyagi, Ajay Rana“Comparative Study of JAVA & APEX” in British Journal of Science,Vol.12(2) ,pp(98-103), 2015. http://www.ajournal.co.uk/BSArticles12(2).htm
8. NehaTyagi, Ajay Rana“Fuel Your Growth with Integration: Hybrid Cloud Computing” International Journal of Applied Engineering Research: Volume 10, Number 13 (2015), pp.32761-32762. http://www.ripublication.com/Volume/ijaerv10n13.htm
9. Prem Chand and M K Soni. Article: “Effect of variation in Constraints on the performance of MANET Routing Protocol under realistic environment” has been communicated to International Journal of Computer Applications in Technology, Inderscience Journal, UK.
10. Prem Chand et al., “A Hybrid Defogging Technique based on Anisotropic Diffusion and IDCP using Guided Filter,” International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 7, pp. 123 – 140, 2015.
11. Prem Chand et al., “An in-Depth Analyses of Various Defogging Techniques,” International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 10, pp. 279-296.
12. Ramanath Dutta, Paramita De, Sekhar Mandal, and Bhabatosh Chanda. Detection and Identification of Logic-gates from Document Images using Mathematical Morphology" in Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG-2015), IEEE Press, pp.1-4, Dec. 16-19, 2015.
13. Paramita De, Sekhar Mandal, Partha Bhowmick and Bhabatosh Chanda. Topological Simplification of Electrical Circuits by Super-component Analysis" in International conference on Document Analysis and Recognition (ICDAR-2015). IEEE press, pp. 211-215, Aug. 23-26, 2015.
14. Paramita De, Sekhar Mandal, Amit Das and Bhabatosh Chanda. Detection of Electrical Circuit Elements from Document Images" in Proc. of 22nd International Conference on Document Recognition and Retrieval (DRR-2015), SPIE, pp. 94020O-94020O-11, Feb. 11-12, 2015.
15. Ajay Sikandar and sushil Kumar “Performance analysis of channel access model for MAC in randomly distributed wireless sensor networks”, International Journal of Computer Network and Communication, Vol.5, No.2, 2014, pp.99-109.

2014:
1. A.P. Sirivastava et.al. “Fast and Effective Searches of Personal Names in an International Environment”, is published in International Journal of Innovative Research in Engineering & Management (IJIREM), Volume-1, Issue-1, July-2014. (ISSN: 2350 - 0557).
2. A.P. Sirivastava et.al.“Robust audio watermarking using direct sequence spread spectrum” in International Journal of Trends in Computer Science , volume 1, Issue 1, 2014, (ISSN-2348-5205).
3. Harish Kumar, Dr. Anil Kumar Solanki “Artificial Neural Network approach for student’s behavior analysis” paper published in International Journal of Soft Computing and Engineering ISSN No2231-2307 for Feb 2014 Issue.
4. S. Shukla, R. Dhir and R. Rani, "Digital Image Mosaicing using Optimized KD-Tree Search," International Journal of Engineering Research & Technology (IJERT),vol. 3 ,Issue 8, August- 2014.
5. Manoj Kumar Tyagi, Srinivasan M., L. S. S. Reddy, “Traditional and hybrid software project tracking technique formulation: state space approach with initial state uncertainty,” CSI Transactions on ICT, June 2014, Volume 2, Issue 2, pp 141-151. (Springer Journal)
6. S. Malik, S. Wadhwa “Premature Convergence in Genetic Algorithm using Ellite Selection Scheme: Review paper,” IJARET, 2(V),2014.
7. Lalita, S. Wadhwa “A Survey on Various Methods Audio Steganography” IJARET, 2(4), 2014.
8. A.Chhoker, S. Wadhwa “Time Efficient implementation of Edge Detection with Good Quality Edge,” IJCSMS, 14(5), 2014.
9. S. Rashid, S. Wadhwa “ A Noval Approach to Detect Intrution using Diffie Hellman and Blow Fish,” IJCSMC.
10. Ritu Dewan, “Comparison of Various Interpolation based Image Zooming Techniques” International Journal of Advanced Research in Computer Science and Software Engineering.
11. Ritu Dewan, n “Text Segmentation in Handwritten Punjabi Documents” In International Journal of Engineering Sciences, Vol.3, December 2014.
12. A.K. Sirohi,et.al, “Multiple Kernel Learning for Stock Price Direction Prediction “ IEEE,ICAETR, Unnao, 2014.
13. Prem Chand and M K Soni. Article: “Effect of variation in Constraints on the performance of MANET Routing Protocol” has been published in IEEE-Xplore digital library in Feb-March 2014.

2013:
1. A.P. Srivastava et.al. “Itemset Mining over Large Transactional Tables on the Relational Databases”, is published in International Journal of Innovative Research in Computer Science & Technology"(IJIRCST), Volume-1, Issue-1, September-2013. (ISSN: 2347- 5552).
2. A.P. Srivastava et.al. “Wireless Grid and Intruder Detection Server”, is published in International Journal of Innovative Research in Computer Science & Technology"(IJIRCST), Volume-1, Issue-1, September-2013. (ISSN: 2347- 5552).
3. A.P. Srivastava et.al. “Secure Image Logging System towards Cyber Forensic”, is published in International Journal of Innovative Research in Computer Science & Technology"(IJIRCST), Volume-1, Issue-2, September-2013. (ISSN: 2347- 5552).
4. Manoj Kumar Tyagi, Srinivasan M., L. S. S. Reddy, “Design of Traditional/Hybrid Software Project Tracking Technique: State Space Approach” WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, Issue 11, Volume 10, November 2013. Impact Factor for 2014 (ISI Web of Knowledge): 0.042 (Scopus Indexed)
5. Manoj Kumar Tyagi, Balanagu.Raviteja, “The Implementation of Automatic Fire Rescuing and Information System in a Train using Zigbee and Sensors Networks” International Journal of Computer Trends and Technology (IJCTT) - volume4, Issue5–May 2013.
6. S. Wadhwa, S. Choudhari “ Base Station Controlled and Energy Efficient Centralized Hierarchical Routing Protocol in wireless Sensor Networks,”IJCST, 4(2), 2013.
7. Prem Chand and M K Soni. Article: “Performance Review of Routing Protocols in Mobile Ad-hoc Network” has been published in International Journal of Engineering Research and technology. ISSN-0974-3154, Volume-6, Number-6. 2013.
8. Prem Chand and M K Soni. Article: “Performance Evaluation of Mobile Ad hoc Network in Presence of Selfish Nodes under Realistic Environment” has been presented and published in the proceedings of International Conference sponsored by Inderscience publishers held in Panipat in November-2013.
9. Prem Chand,M.K.Soni,"A Novel Routing Scheme for Mobile Ad Hoc Network", IJCNIS, vol.5, no.4, pp.17-24,2013.DOI: 10.5815/ijcnis.2013.04.03.

2012:
1. Manoj Kumar Tyagi, M.Pushpa Rekha K. Vamsikrishnareddy A. Sudhakar,“A novel method of optimized Resource Allocation for Software Release Planning,” Advances in Mechanical Engineering and its Applications (AMEA),Vol. 1, No. 2, 2012, pp. 29-32.
2. Manoj Kumar Tyagi, Kalyan Chavali, Bakka Lidiya, “Intrusion Detection and Remedial Action, Advances in Mechanical Engineering and its Applications ,Vol. 1, No. 2, 2012, pp. 22-28.
3. Manoj Kumar Tyagi, Balanagu Raviteja, Rammohanarao Koduri,, Gangi Raghu Ram,“Warehouse Monitoring and Management with the help of WSNs and Solar Energy” International Journal of Engineering Science & Advancd Technology Volume-2, Issue-3,pp. 503 – 507, May-Jun 2012.
4. Koneru. Anuradha, Manoj Kumar Tyagi, “A novel method of face recognition using LBP,LTP and Gabor features” International journal of Emerging Trends in Engineering and Development Issue 2 Vol 4, pp. 349-355, May 2012.
5. P. Lavanya, Manoj Kumar Tyagi, K.Poornima, N.Mahesh “Nymble: Intercepts Misbehaving Users” Advances in Computer Science and its Applications( ACSA), Vol. 1, No. 2, pp. 155-163, June 2012.
6. S. Raj & R. kumar, “Credit Card Transaction Fraud Detection Method Based on Support Vector Machine,”International Journal of Pure & applied Research in Engineering & Technology, 2012; Volume 1(4).
7. S. Raj & R. kumar, “Security Enhancement of Web Database Using the Technique of Negative Database”.International Journal of Pure & applied Research in Engineering & Technology, Vol 1(4): 137-146, 2012.
8. S. Raj & R. kumar, “Design & Analysis of Credit Card Fraud Detection Based on Hidden Markov Model (HMM),”.IJEIT Journal, Vol 2, Issue 3, September 2012.
9. Prem Chand and M K Soni. Article: Performance Comparison of AODV and DSR On-demand Routing Protocols for Mobile Ad-Hoc Networks. International Journal of Computer Applications 49(18):1-5, July 2012. Published by Foundation of Computer Science, New York, USA.
10. Prem Chand and M K Soni. Article: QoS Performance Analysis of MANET with Bandwidth Estimation. International Journal of Computer Applications 49(18):18-21, July 2012. Published by Foundation of Computer Science, New York, USA.
11. Koneru. Anuradha, Manoj Kumar Tyagi “Enhanced Local Texture Feature Sets For Face Using KLDA And Gradient Face Features” [IJESAT] International Journal of Engineering Science & Advancd Technology Volume - 2, Special Issue - 1, 52 – 55, Jan-Feb 2012.
12. Harish Kumar, Dr. Anil Kumar Solanki “Effective cleaning of educational website usage patterns and predicting their next visit” paper published in (Volume 53 Nov 12) International Journal (USA) IJCA (Impact Factor=0.814) ISSN NO 0975-8887.
13. Harish Kumar, Dr. Anil Kumar Solanki “Analysis of educational web pattern using adaptive Markov chain for next page access prediction” paper published in (Vol. 9 No. 7 JUL 2011) International Journal (USA) IJCSIS (Impact Factor=0.423) ISSN NO1646-3692.
14. A.P Srivastava “Improving Ant Colony Optimization algorithm for data clustering”, ACM Digital Library, USA. http://portal.acm.org/citation.cfm?doid=1741906.1742026.
15. A.P. Srivastava et.al. “Impact of IT Capacity Variation on Business Ratios” is published in Wisdom Journal of VSBM Journal in December 2011.
16. A.P. Srivastava et.al. “Effective Aggregation – based OLAP Mining of Evolving Data Marts” is published in Technical Journal of LBSIMDS in September 2010.
17. M.Srinivasan, H. Anitharaj ,D. Haritha, D.Siva Krishna, Manoj Kumar Tyagi, “Deriative Free Filters for Target Motion Analysis with Bearings Only Measurement” , IETECH Journal of Information Systems 2008.

Conference

1. Dr.Harish Kumar, Dr Anil Kumar Solanki “Network Reliability Measurement using Artificial Neural Approach” published and presented paper in International Conference BEST-16 at BIET Jhansi.
2. A.P Srivastava et.al. “Analysis of SIDR model for worm propagation in Wireless Sensor Network” is published in the proceedings of International Conference on “Green Computing and Engineering Technologies (ICGCET 2016)”, Department of Energy Technology, Aalborg University, Esbjerg, Denmark on August 18, 2016.
3. A.P Srivastava et.al. International Conference on “Green Computing and Engineering Technologies (ICGCET 2016)”, conducted by Department of Energy Technology, Aalborg University, Esbjerg, Denmark, received best paper award.
4. P. Bassi, et.al. “A Noval Framework of Extracting Geospatial information using SPARQL Quary & Multiple Header Extration Sources,” ICRCWIP, PIET, 2015.
5. R. Yadav, A. K Turuk, “ Distribution of Genetic algorithms using hadoop Map reduce,” International conference on Communication , Information& Computing, 2015.
6. Ajay Sikandar, Sushil Kumar and Ghyani Umesh Kumar Murya “Optimizing Delay for MAC in Randomly Distributed Wireless Sensor Networks,” International Conference on advance Computing, Networking and informatics (ICACNI), Springer, Vol.243pp. 609-618. [ISBN: 978-81-322-1664-3]
7. Ajay Sikandar and Sushil Kumar “Performance Analysis of Interference Aware Power Control Scheme for TDMA in Wireless Sensor Networks” International Conference on advance Computing, Networking and informatics (ICACNI), Springer, vol. 28, pp. 95-101,2014. [ISBN: 978-3-319-07349-1]
8. Harish Kumar, Dr. Anil Kumar Solanki “An efficient approach for student’s behavior analysis with support of clustering techniques” paper selected and presented in International Conference ICIIE 2014, Malaysia (IEEE Conference) for March 2014.
9. Paramita De, Sekhar Mandal, Amit Das and Partha Bhowmick. A New Approach to Detect and Classify Graphic Primitives in Engineering Drawings" in Proc. of International Conference of Emerging Applications in Information Technology (EAIT-2014), IEEE CS Press, pp. 243-248, Dec. 19-21, 2014.
10. Paramita De, Sekhar Mandal and Partha Bhowmick. Identification of Annotations for Circuit Symbols in Electrical Diagrams of Document Images" in Proc. of Fifth International Conference on Signal and Image Processing (ICSIP-2014), IEEE Press, pp. 297-302, Jan. 8-10, 2014.
11. Paras Bassi et. Al. ” Analytical & Empirical Analysis of External Sorting Algorithms”-IEEE proceedings in ICDMIC-.2014, IGIT, Delhi, India.
12. Paras Bassi et. Al. ” A Novel Approach to Reduce Digital Piracy”-IJCST- 1st International Conference of Advancement in Information Technology-ICAIT-2013, Jaipur, India.
13. A.P. Srivastava et.al. “A Merging Algorithm for Data Retrieval” is published in the proceedings of International Conference on “Cloud Computing, Data Science and Compliance for Business Excellence Confluence 2012”, Amity University, Noida, INDIA on September 27 & 28, 2012.
14. A.P. Srivastava et.al. “Image Logging System for Digital Evidence in Web forensic and Law Enforcement” is published in the proceedings of International Conference on “Cloud Computing, Data Science and Compliance for Business Excellence Confluence 2012”, Amity University, Noida, INDIA on September 27 & 28, 2012.
15. A.P. Srivastava et.al. “Securing Web Services Using Intruder Detection & Integrated Access Control Mechanism” is published in the proceedings of International Conference on “Cloud Computing, Data Science and Compliance for Business Excellence Confluence 2012”, Amity University, Noida, INDIA on September 27 & 28, 2012.
16. Paras Bassi et.al. “Performance Analysis of Ad hoc On-Demand Distance Vector Routing and Dynamic Source Routing using NS2 Simulation” Springer’s-LNCS proceedings of Second International Conference on Advances in Information Technology and Mobile Communication, AIM-2012, Bangalore, India.
17. Paras Bassi et. al. “Performance Analysis of TCP & UDP in co-located variable Bandwidth environment sharing same transmission links” Springer’s- LNCS proceedings of The Fifth International Conference on Network Security and Applications, CNSA-2012, Chennai, India.
18. Paras Bassi et. al. “Performance Analysis of TCP Congestion Control Variants Using Dynamic State Routing in Wireless Ad-Hoc Network” Springer’s-LNCS proceedings Third International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2012, Bangalore, India.
19. Harish Kumar, Dr. Anil Kumar Solanki “Hierarchical clustering with WEBASTRO for user behavior analysis and web site modification” paper published in International Conference WISM'13-AICI'13, China (IEEE Conference)for Sep2013
20. Harish Kumar, Dr. Anil Kumar Solanki “Advance clustering technique based on Markov chain for predicting next user movement” Paper presented and published in Third International Conference on Advances in Information Technology and Mobile Communication – AIM 2013 Springer Conference (LNCS).
21. Prem Chand and M K Soni. Article: “Performance Review of Routing Protocols in Mobile Ad-hoc Network ” has been presented in National Conference “RTETMSD” held on 13/8/2013 at MVN University, Palwal.
22. Pardeep Malik “Fast Web Cache Indexing using a Distributed Adaptive Cache Update Algorithm for the dynamic Scalable Routers” International Conference on Recent Trends of Computer Technology in Academia (ICRTCTA 2012) , Vol. 1, JRNRV University, Udaipur, April 2012.
23. Pardeep Malik, Anamika “A Prediction based Cache Migration Using Inverted list to Maintain the Data Element Frequencies” International Conference on Recent Trends of Computer Technology in Academia (ICRTCTA 2012), Vol. 1, JRNRV University, Udaipur, April 2012.
24. Harish Kumar, Dr. Anil Kumar Solanki “New approach of web usage mining for e-educational web sites” paper published in (ETCSIT-2011) International Conference, Gulzar group of Institution, Khanna (Punjab).
25. Harish Kumar, Anuradha Taluja “New Approach for secure Audio Steganography using LSB and Fibonacci number” Paper published and presented in National Conference organized by Department of Computer Science & Engineering, Bhartiya Vidya Peeth, Delhi. INDIACOM 11.
26. Paramita De, Sekhar Mandal and Partha Bhowmick. Recognition of Electrical Symbols in Document Images using Morphology and Geometric Analysis" in Proc. of International Conference of Image Information Processing (ICIIP-2011) IEEE Press, pp. 1-6, Nov. 3-5, 2011.
27. P.C. vashist et.al. “Use of RFID technology in modern libraries” has been presentation at the National conference on “Managing Libraries in New Information Environment” organized by Asia-Pacific Institute of Management , New Delhi during 07th and 8th January 2011.
28. Prem Chand Vashist and Deepak Kumar, Article: “A proposal for traffic redistribution in internet connected MANETs with mobile gateways”, presented in National Conference “RTEMS-2011” at ACME Palwal.
29. A.P. Srivastava et.al. “Employing Multidimensional form of OLAP (MOLAP) in Education System” is published in the proceedings of International Conference on RECENT ADVANCES IN MECHANICAL ENGINEERING (ICRAME – 2010)”,NI University, Kumaracoil, Nagercoil , Tamilnadu, INDIA on April 8 & 9, 2010.
30. A.P. Srivastava et.al. “Identifying Attack Models for Safe and Sound Recommendation” is published in the proceedings of International Conference on Data Management (ICDM 2010, March 11-12, 2010) in IMT Ghaziabad,
31. A.P. Srivastava et.al. “Mining of Web Documents Using Link Structures and Fuzzy Concept Networks” is published in the proceedings of 12th International Conference- INBUSH on 25th February 2010, at Amity International Business School, Noida.
32. A.P. Srivastava et.al."Automatic Metadata Extraction from Web Sources” is is published in the proceedings of International Conference on Digital Libraries (‘Digital Libraries: Shaping the Information Paradigm’.) ICDL 2010 to be held in New Delhi during 23-26 February 2010 organized by The Energy and Resources Institute(TERI)
33. A.P. Srivastava et.al. “Improving Ant Colony Optimization algorithm for data clustering” is is published in the proceedings of International Conference & workshop on Emerging trends in Technology 2010 (ICWET 2010) on February 26-27,2010 in co-operation with ACM SIGART & SIGARCH USA. Paper is uploaded in ACM digital library
34. A.P. Srivastava et.al. “Detecting Profile Injection Attacks in Web-Based Recommender System” is published in the proceedings of International Conference on Mathematics and Computer Science (ICMCS 2010)- in Loyola College, Chennai on February 2-6, 2010.
35. A.P. Srivastava et.al. “New Ant Colony Optimization Meta-Heuristic Algorithm to Tackle Large Optimization Problem Compute” is published in the proceedings of International Conference on contemporary Information management trend (Compute 2010) - Third Annual Conference of ACM Bangalore Chapter on January 22-23, 2010.
36. A.P. Srivastava et.al. “A Quantitative Approach to Perk Up Navigation Efficiency“is published in the proceedings of the 1st International Conference on Management of Technologies and Information Security, ICMIS 2010 on January 21-24,2010 at IIIT Allahabad.
37. Harish Kumar, Anuradha Taluja “Audio Steganography step toward the secure data transmission”Paper published and presented in National Conference organized by ITS Ghaziabad, held on OCT 2010.
38. S. Raj “Improved Binary Image by using Euclidean DistanceTransformation”.International Conferenceb on Reliability Infocom Technology and Optimization, 2010, CSI Delhi.
39. Harish Kumar, Dr. Anil Kumar Solanki “Clustering technique for web site improvement: an overview”Published and presented a paper INDIACOMM-10 National Conference ISSN 0973-7529, 2010.
40. P.C. Vashist et.al. “Ad-hoc transport protocol for mobile Ad-hoc networks” International Conference, SRIJAN?10 on 8th May-2010.
41. P.C. Vashist et.al. “Power based routing for wireless mobile Ad-hoc networks” has presented in International Conference, SRIJAN?10 on 8th May-2010.
42. Prem Chand Vashist and Deepak Kumar, Article: “Transport protocol for mobile Ad-hoc network” has been presented in National Conference „CFTCSE-2010? at AITM Palwal.
43. Harish Kumar, Anuradha Taluja “New approach to network management architecture” in ITBT09 (National Conference) on May 2009. Organized by Department of computer science & engineering, Ajay Kumar Garg Engineering College, Ghaziabad.
44. Harish Kumar, Anuradha Taluja “JENA: An open source java tool kit: an overview” Published and presented in INDIACOM 09 (National Conference) in Feb 2009 Organized by Department of Computer Science & Engineering, Bhartiya Vidya Peeth, Delhi.
45. M.Srinivasan , M. K. Tyagi, K.Radha Rani, M. Suman, and B.Loveswara Rao, “An Iterated Extended Risk – Sensitive Filters for Nonlinear Filtering Problems”, ICCC 2008,IEEE 6th International Conference on Computational Cybernatics, November 27-29, 2008,pp119-122, Stara Lensa, Slovakia. (Scopus Indexed)
46. M.Srinivasan, H. Anitharaj , D. Haritha, D.Siva Krishna, Manoj Kumar Tyagi ,“Extended Risk Sensitive Filters and its Application to Target Tracking Problems” ,international conference sponsored by IEEE Hyderabad on RF AND SIGNAL PROCESSING SYSTEMS hosted by Koneru Lakshmaiah College of Engineering,Vijaywada On 1-2,Feb 2008 pp354-360.
47. Manoj Kumar Tyagi ,“Software Reliability An Emerging Problem in Software Engineering” National Conferene on Advanced Computing Technologies hosted by Dhananlakshmi Srinivasan Engineering College ,Perambalur, Tamilnadu on 20th March 2008 pp72-76.
48. Paramita De, Subhabrata Barman. Performance study of a Novel prole based Location Management technique in PCS Network" in Proc. of National Conference on research and development in Hardware and System (CSI-RDHS 2008), pp. 83-86, Jun. 20-21, 2008.
49. A.P Srivastava et.al. “Virtual Knowledge Structure In A Web-Base Education” is published in the International Conference on INNOVATIVE COMPUTING, INFORMATION AND COMMUNICATION TECHNOLOGY – ICICT’09 . on Dec 16-18, 2009 at Sri Sai Ram Engineering College, (SSEC), Chennai, India.
50. A.P Srivastava et.al. “Simulation Environment Models For Mobile Ad Hoc Network Evaluation” is published in the International Conferences on Advances in Computer Vision and Information Technology (ACVIT-09) 16-19 Dec 2009.in collaboration with IEEE , IETE & IACSIT- Singapore.
51. A.P Srivastava et.al. “Scanning the Node using the Modified Column Mobility Model” is published in the International Conferences on Advances in Computer Vision and Information Technology (ACVIT-09) 16-19 Dec 2009 in collaboration with IEEE, IETE & IACSIT- Singapore.
52. A.P Srivastava et.al. “Geocasting in Mobile Ad Hoc Networks” is published in the International Conferences on Advances in Computer Vision and Information Technology (ACVIT-09) 16-19 Dec 2009.in collaboration with IEEE ,IETE & IACSIT- Singapore.
53. A.P Srivastava et.al. “A Boundless Simulation Area Mobility Model for an AdHoc Network” is published in the International Conferences on Advances in Computer Vision and Information Technology (ACVIT-09) 16-19 Dec 2009.in collaboration with IEEE , IETE & IACSIT- Singapore.
54. A.P Srivastava et.al. “Modeling Business Process and IT Infrastructure” proceedings in the National conference on Next Generation Computing Technologies at I.T.S, Ghaziabad on 17-18 Oct, 2008. Published in the proceedings.
55. A.P Srivastava et.al. “Knowledge Management in Higher Education” is published in the proceedings of national HR conference on “HR Agenda for Urbanization Excellence” at ITS, Mohan Nagar, Ghaziabad.
56. A.P Srivastava et.al. “A Genetic Algorithm Based Approach for Component Selection” is published in the proceedings of National Conference on Software Engineering (NCSE'09)
57. M.Srinivasan, M.Suman, D. Haritha, Manoj Kumar Tyagi ,H. Anitharaj “Derivative Free Filters for Target Motion Analysis with Bearings Only Measurement” ,IET UK Chennai International Conference on Information and Communication Technology in Electrical Sciences hosted by Dr M.G.R. University,Chennai on 20-22,Dec. 2007, vol 1,pp 93-99.
58. P.C. vashist et.al. “Generating Automatic Query for IR from hidden web” National Conference on Artificial Intelligence (1st and 2nd June 2007) at VPCOE, Baramati, Pune.
59.Manoj Kumar Tyagi ,B.Kathiravan, Dr. V.Kannan, M.Sundarajan, “Introduction to Virtual Machine Technology for Computer Systems” National Conference on "Emerging Areas of Computer Science & Engineering" organized by Sreenidhi Institute of Science & Technology, Ghatkesar, Hyderabad A.P.on Nov. 21-22,2005,page 113-117.

 

Plot No. 2, Knowledge Park III, Greater Noida, Distt. G.B.Nagar, U.P., India -201306

Helpline No. 8010-000-234

Privacy PolicyTerms and ConditionsSite Map © 2018 - All Rights Reserved.