Menu

Publications

Journal

[1] Reshu Agarwal, Mandeep Mittal, Sarla Pareek, “Optimal ordering policy with inventory classification using data mining techniques”, Handbook of Research on Promoting Business Process Improvement through Inventory Control Techniques, Indexed in Scopus, pp. 305-326, DOI: 10.4018/978-1-5225-3232-3.ch017
[2] Mandeep Mittal, Charushi Nagpal, Nandini Malhotra, Annu Lambora, Reshu Agarwal, Sumil Mehta, “Genetic Model for Supply Chain Inventory Optimization”, International Journal of Supply Chain and Operations Resilience, Vol. 3(3), pp. 248-259, DOI:10.1504/IJSCOR.2018.10014509
[3] Reshu Agarwal, Mandeep Mittal, Sarla Pareek, Biswajit Sarkar, “Ordering Policy using multi-level association rule mining”, International Journal of Information Systems and Supply Chain Management, Indexed in Scopus, WOS, Vol. 11(4), pp. 84-101, DOI: 10.4018/IJISSCM.2018100105
[4] Rajendra Kumar, Abhishek Kumar, Mukul Gupta, Kshitiz Agrawal, Shylaja V. Karatangi, Amrita Rai, Reshu Agarwal, “ Design and Implementation of Smart Market Infrastructure”, Indexed in Index Copernicus, Journal of Microcontroller Engineering and Applications, Vol. 5(1), pp. 11-18.
[5] Arti Gautam, Rajat Pratap,Annu Malik,Reshu Agarwal,Govind kumar Rahul,Shylaja Karatangi, "A Review Study-In Image Retrieval Bridging of Semantic Gap ", Journal of Information Technology and Sciences, Vol.4(3) ,pp 11-15.
[6] Reshu Agarwal, Mandeep Mittal and Sarla Pareek, “Optimal ordering policy with inventory classification using data mining techniques. Promoting Business Process Improvement through Inventory Control Techniques”. (pp. 305-326) IGI Global, 2018.
[7] Dr. Reshu Agarwal, “Optimal order quantity and inventory classification using Clustering” , International Journal of Applied Management Sciences and Engineering (IJAMSE), IGI Global, ISSN: 2327-7483|EISSN: 2327-7491, 2017.

[8] Reshu Agarwal, “ Ordering policy and inventory classification using temporal association rule mining”, Journal of Productivity Management and Assessment Technologies, ISSN 2160-9837, 2017.

[9] Reshu Agarwal, Mandeep Mittl, Sarla Pareek, “Optimal inventory classification using data mining techniques”, Optimal Inventory Control and Management Techniques, ISBN13:9781466698888, 2016.
[10] Reshu Agarwal, Mandeep Mittal and Sarla pareek , “ Optimal inventory classification using data mining techniques. Optimal Inventory Control and Management Techniques”. (pp.236-255) IGI Global Publisher,2016.
[11] Reshu Agarwal, Mandeep Mittal, Sarla Pareek, “Loss profit estimation using association rule mining with clustering, Management Science Letters,2015.
[12] Reshu Agarwal, “EOQ estimation for imperfect quality items using association rule mining with clustering”, Decision Science Letters, ISSN 1929-5812 (Online) - ISSN 1929-5804 (Print), 2015.
[13] Mandeep Mittal, Sarla pareek, Reshu Agarwal, “Loss profit estimation using temporal association rule mining” , International Journal of Business Analytics, ISSN: 2334-4547, 2015.
[14] Mandeep Mittal, Sarla Pareek, Reshu Agarwal, “Ordering policy using temporal association rule mining”, International Journal of Data Science, ISSN online: 2053-082X, ISSN print: 2053-0811, 2015.
[15] Madhu Sharma Gaur, Bhasker Pant, “Pervasive m-Healthcare Framework for Diabetes”, Journal of Graphic Era University Vol. 5 , Issue 2 , 69- 83 , 201 7 ISSN: 0975 – 1416 (Print), 2456 – 4281(online), http://www.geujournals.com/assets/2-jgeu-16-019-sharma-v52-6983.pdf.
[16] Madhu S. Gaur, Bhaskar Pant, “Trusted and Secure Clustering in Mobile Pervasive Environment", Springer Open Journal, Human-Centric Computing and Information Sciences (HCIS), October 2015.DOI: 10.1186/s13673-015-0050-1. https://hcis-journal.springeropen.com/articles/10.1186/s13673-015-0050-1
[17] Madhu S. Gaur, Bhaskar Pant, "Trust Metric based Soft Security in Mobile Pervasive Envi-ronment", International Journal of Computer Network and Information Security(IJCNIS), , ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), DOI: 10.5815/IJCNIS Published By MECS Publisher IJCNIS, Vol. 6, No. 10, Sep 2014. http://www.mecs-press.org/ijcnis/ijcnis-v6-n10/IJCNIS-V6-N10-8.pdf
[18] Deepak Gupta et.al. “Security Metrics: Expectations & the Reality”, is published in International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 5, Issue 3, March 2015 (ISSN: 2277 128X).
[19] Sandeep Srivastava “Building a Data ware house step by step” in online published International Journal of Engineering and Management Research. http://www.ijemr.net/DOC/Building%20a%20Data%20Warehouse%20step%20by%20step%20(28-34)76412c1a-08de-4e2e-af75-8e12f7980d5e.pdf
[20] Sandeep Srivastava “Mobile Agents: Objective, Platforms and Architecture (The Cutting Edge of Wireless Technology) ” in online published International Journal of Science and Research (IJSR). https://www.ijsr.net/archive/v5i10/ART20162078.pdf
[21] Lalan Kumar, “Watermark Technique for Relation Database Using Multi Bit” ,International Journal of Engineering Science and Research ,ISSN 2277-2685 , April 2013.

Conference

[1] Madhu S. Gaur, Bhaskar Pant, "Impact of Signal-Strength on Trusted and Secure Clustering in Mobile Pervasive Environment”, Published by Elsevier B.V. Procedia Computer Science, Science direct, (ICRTC-2015), Volume 57 Pages 178–188, 2015. doi:10.1016/j.procs.2015.07.418., https://www.sciencedirect.com/science/article/pii/S187705091501947X
[2] Madhu S. Gaur, Bhaskar Pant, “A Bio-Inspired Trusted Clustering for Mobile pervasive Environment”, Published by Springer series Advances in Intelligent Systems and Computing AISC, ISSN-2194-5357, Proceedings of the Third International Conference on Soft Computing for Problem Solving (SocPros2013), Volume 259, pp. 553-564, March 2014,. https://download.e-bookshelf.de/download/0003/9329/60/L-G-0003932960-0013274693.pdf
[3] Madhu S. Gaur, Navneet K Gaur “Integrated Security metrics in Mobile Pervasive Environment”, in a National Conference On “Network Security Issues and Resource Optimization” Graphic Era Univ., Dehradun, Sponsored by UCOST, Uttarakhand, on published in Conf. proceeding Paper Id- MCA/CONF/NIS-17- Page 146-156, October 27-28, 2012.
[4] Madhu S. Gaur, Navneet K Gaur ,“ User-Activity-Centric Approach to Diminish Security & Trust Barrier in Mobile Pervasive Environment”, First International Conference On "Convergence Of Science & Engineering In Education And Research, A Global Perspective In The New Millennium" 21-23 April 2010 organized by Dayanand Sagar Institutions, Bangalore, India, on “published in Conference proceeding.
[5] Madhu S Gaur, Navneet K Gaur , “User-Centric Trust Assessment to Enhance Security of Pervasive Environment” in 3rd International Conference on ICDM at IMT Ghaziabad, Jointly organized by IMT, Univ. of Saskatchewan & Nanyang Technology University, on in Conf proceeding Published By: MACMILLAN Publishers INDIA LTD, ISBN : 0230 63637, 2010, Pages: 230-236.
[6] Madhu S. Gaur, Navneet K Gaur, “Traditional Security and Cryptography cut offs for Secure and Trusted Distributed Pervasive Environment”, in an International Conference on Trends and Advances in Computation and Engineering, Feb. 25th - 26th, 2010 (Trace2010) Barkatullah University Institute Of Technology, Bhopal, India, Proceeding published in “International Journal of Computer Sciences, Systems Engineering and Information Technology” By : Serials Publications, ISSN: 0974-580, Volume 3, Number 1 January-June 2010 Pages: 229-239
[7] Madhu S. Gaur, Navneet K Gaur, Nidhi sharma, “Impact of IT in Corporate Governance” in Three days UGC Sponsored, National Conference on Emerging trends in IT, Corporate Gov-ernance, Hindu Kanya College, Kapurthala.
[8] Gaurav Bhatia,Tinku Singh,Imact of IT in rural development”,National Confrence on “Information Technology Trends in Engineering Application”, IEEE sponsored DESC Bengaluru, NEC 2009,19-21 March 2009 Ramashankar Yadav, Shailendra Singh,Shalini Raghav “A SURVEY OF CLOUD COMPUTING”, March 2010.

 

Plot No.2 , APJ Abdul Kalam Road, Knowledge Park 3, Greater Noida, Uttar Pradesh, India, 201306

Helpline No. 8010-000-234