Research

Faculty Name Paper Title Journal Name Journal No Volume No Issue No Page No Publication Year Publisher Co-Auther Publish Date
SANJEEV KR.YADAV A New SDLC Framework With Autonomic Computing Elements IEEE – Explore ISSN – 09742239 51 September 2012 Edition. IEEE
SANJEEV KR.YADAV Devnagari Handwriting Recognition using STANN International Journal of Computer Applications ISSN for IJCA Digital Library is 0975 - 8887 70 19 May 2013
SWATI CHAUHAN Survey Paper on Traffic Flow Control using Cellular Automata International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 2 6 June 2013 IJIEASR
POONAM RANA Juxtaposition of load balancing algorithms in cloud computing using cloud Analyst Simulator International Journal of Computer Applications (0975 – 8887) 97 2 21-26 july 2014 IJCA
SANJEEV KR.YADAV Detection of Intrusion Using Evolutionary Soft Computing Techniques IEEE – Explore 978-1-4673-2922-4 691 - 696 Dec 2012 December 2012 Solan 2012-12-06
SANJEEV KR.YADAV Minimizing Maintenance Cost of Software by Injecting Autonomic Computing Elements IEEE Explore 978-1-4673-2922-4 685 - 690 Dec 2012 IEEE 2012-12-06
PARITA JAIN CURRENT STATE OF RESEARCH IN AGILE QUALITY DEVELOPMENT 2016 IEEE Bharati Vidyapeeth’s Institute of Computer Applications and Management 2016-03-16
ASHISH BAJPAI Image Classification using NPR and Comparison of Classification Results 5182-5185 2016 IEEE BVICAM new Delhi 2016-03-16
ARVIND KUMAR A Novel Energy Efficiency Geocast Routing Algorithm for Mobile Ad hoc Networks 2016 IEEE conference BVICAM, New Delhi 2016-03-17
ARVIND KUMAR Analysis of Message Propagation for intelligence Disaster Management through Vehicular Cloud Network 2016 ACM Pacific University, Udaipur 2016-03-05
ANKUR SINGH BIST A novel feature learning for image classification using wrapper approach in GA 484-499 2015 IEEE
ANKUR SINGH BIST Genetic algorithm based weighted extreme learning machine for binary imbalance learning 1-6 2015 IEEE Noida
A. P. SHUKLA Moving Object Tracking of Vehicle Detection”: A Concise Review International Journal of Signal Processing, Image Processing and Pattern Recognition ISSN: 2005-4254 8 3 169-176. 2015
ANUBHAV PATRICK Smart Human Security Framework Using Internet of Things, Fog and Cloud Computing Springer Advances in Intelligent Systems and Computing ISSN: 2194-5357 321 2015 251-263 2015 Springer
SEEMA MAITREY MapReduce:Simplified Data Analysis of Big Data Elsevier 2015 Elsevier SRM University,Ghaziabad 12-03-2015
RUDRANSHU SHARMA Genetic Algorithm Based Weighted Extreme Learning Machine for Binary Imbalance Learning 2015 Noida, India
ANKUR SINGH BIST VIRUS GENERATION KITS: A SURVEY International journal of engineering science and research 4 1 2015
ANKUR SINGH BIST GENETIC ALGORITHM & OPERATORS International journal of engineering science and research 4 2 2015
ANKUR SINGH BIST OUTLIER DETECTION USING INNER AND OUTER RADIUS BASED METHOD ijesrt 4 3 2015
ANKUR SINGH BIST PERIODICITY OF FACIAL PATTERN: A REVIEW 4 3 2015 ijesrt
ANKUR SINGH BIST HYBRID APPROACHES FEATURE SUBSET SELECTION: A REVIEW international journal of engineering research and technology 4 4 2015
ANKUR BHARDWAJ Hand Gesture Recognition with Shape and Color for HCI International Journal on Advances in Computer Science and Information Technology ISSN:2393-9915 2 6 517-521 2015 Krishi Sanskriti
A. P. SHUKLA An Enhanced Cellular Automata based Scheme for Noise Filtering International Journal of Signal Processing, Image Processing and Pattern Recognition ISSN: 2005-4254 7 4 231-242 2014
PRAMOD KR.YADAV An Exhaustive study on Data Mining Techniques in Mining of Multimedia Database 546-550 2014 KIET, GHAZIABAD
POONAM RANA Comparative Analysis of pattern Matching Methodologies 2014 KRISHNA INSTITUTE OF ENGINEERING AND TECHNOLOGY
SANTOSH KUMAR GUPTA Prioritizing Web Links Based on Web Usage and Content Data 2014 IEEE Xplore KIET Ghaziabad 07/02/2014
POONAM RANA Wireless Communication an Application in smart grid an overview 2014 IEEE KRISHNA INSTITUTE OF ENGINEERING AND TECHNOLOGY 28-11-2014
PARITA JAIN Adaptive approach for Information Hiding in WWW Pages 2014 IEEE Xplore KIET 2014-07-02
PARITA JAIN SCICALCULATOR USING SCILAB 2014 ABES
ANKUR SINGH BIST Identification of metamorphic viruses 1163-1168 2014 IEEE Gurgaon
ANJALI YADAV Simulation Tool for Assignment Model: SIMASI International Journal of Computers and Technology ISSN 2277-3061 13 8 4723-4728 2014
JAIVEER SINGH A Review of Pattern Recognition Techniques IJETE 2348–8050 volume-2 1 Page- 31-34 2014
POONAM RANA Cloud Computing overview services and features International Journal of Innovations & Advancement in Computer Science ISSN 2347 – 8616 3 1 49-53 2014 IJIACS
ANKUR SINGH BIST Detection of metamorphic viruses: A survey 1559-1565 2014 IEEE Greater Noida
ANKUR SINGH BIST An effective approach for finding periodicity of a subject in video data 223-229 2014 IEEE Shimla
ANKUR BHARDWAJ A New Method of Edge Detection Using Objective Function and Non- Maxima Repression International Journal of Advance Research and Innovation ISSN 2347 - 3258 01 01 280-284 2014 www.ijari.org New Delhi 2014-02-01
ANKUR SINGH BIST Image Segmentation using Enhanced K-means clustering with divide and Conquer Approach International journal of engineering sciences and research technology 3 7 2014
RAVI SHANKAR SINGHAL A comparative analysis of routing protocol in wireless Sensor Network 385-390 2014 IEEE Xplore KIET Gzb 2014-02-07
ANKUR SINGH BIST Optimization of MIG welding parameters using Artificial Neural Network (ANN) and Genetic Algorithm (GA) International journal of engineering sciences and research technology 3 7 2014
RAVI SHANKAR SINGHAL Genetic Algorithm and Hybrid Genetic Algorithm for Space Allocation Problems-A Review IJCA 10.5120/16585-6283 95 4 NA 2014 IJCA
A. P. SHUKLA Training Two Dimensional Cellular Automata for Some Morphological Operations 2014 IEEE xplore 2014-11-28
SWATI CHAUHAN Evaluation of Fusion Methods: Pan-Sharpening Methods ijecs ISSN:2319-7242 3 11 9142-9146 2014 International Journal Of Engineering And Computer Science
ANKUR SINGH BIST Malware :RFID International journal of engineering sciences and research technology 3 3 2014
ANKUR SINGH BIST Malicious Code Analysis Using Metalanguage International journal of engineering sciences and research technology 3 1 2014
ANKUR SINGH BIST Data Mining Techniques For Computer Virus Detection International journal of engineering sciences and research technology 3 1 2014
VINEET SHARMA Randomized – Distributed Space Time Selection Scheme for Full Duplex Relay Helpers in Development of Next Generation Wimax Network 2014
ANKUR SINGH BIST Spyware Detection Techniques International journal of engineering sciences and research technology 3 2 2014
ANKUR SINGH BIST Data Warehouse in E-Governance International journal of engineering sciences and research technology 3 3 2014
VINEET SHARMA Achieving Query Optimization Using Sparsity Management in OLAP System 2014 KIET
VINEET SHARMA An Efficient & Secure Data Storage in Mobile Cloud Computing Through RSA & Hash Function 2014 KIET
ANKUR SINGH BIST Role of machine learning in Bioinformatics: A Survey“ International journal of engineering sciences and research technology 3 7 2014
RASHMI SHARMA Empirical analysis of object oriented metrics using dimensionality reduction techniqu`es 1-5 2014 IEEE Jaipur 9/05/2014
SANJIV SHARMA Finding Optimal Configuration of DSDV using Particle Swarm Optimization INTERNATIONAL JOURNAL OF COMPUTER APPLICATION 973-93-80883-63-5 104 4 27 2014 INTERNATIONAL JOURNAL OF COMPUTER APPLICATION
ANUBHAV PATRICK A Clustering based Intrusion Detection System for Storage Area Network International Journal of Computer Applications ISSN 0975-8887 88 9 2014 IJCA
TANYA MATHUR Evaluation of Fusion Methods: Pan-Sharpening Methods International Journal of Engineering & Computer Science Vol. 3 - Issue 11 (Novembe e-ISSN: 2319-7242 2014
ANUBHAV PATRICK A Neural Network Based Intrusion Detection System For Pervasive Computing Environment 2014 Elsevier Banglore
ANUBHAV PATRICK A Comparative Study of Cyber Physical Cloud, Cloud of Sensors and Internet of Things: Their Ideology, Similarities and Differences 2014 IEEE Gurgaon 21-Feb-2014
SEEMA MAITREY Comparative analysis of Pattern Matching Methodologies IEEE Xplore 607 – 612 2014 IEEE Xplore Digital Library KIET, Ghaziabad 07-02-2014
ASHISH KOTS The Fuzzy based QMPR Selection for OLSR Routing Protocol Wireless Networks 1572-8196 20 1 1-10 2014 Springer
ASHISH KOTS Implementing and Analyzing an Efficient Version of Counting Sort (E-Counting Sort) International Journal of Computer Applications 0975-8887 98 9 1-2 2014 IJCA
ANKUR SINGH BIST E- Panchayat International journal of engineering science and research 3 3 2014
ANKUR SINGH BIST Data Warehouse in E-Governance international journal of engineering research and technology 3 3 2014
ANKUR SINGH BIST Study of CFG and system call for computer virus detection ijesrt 3 2 2014
ANKUR SINGH BIST Detection of Logic Bombs ijesrt 3 2 2014
ARVIND KUMAR A Survey on challenges in Multipath Routing for Adhoc Networks 381 2014 International Journal of Emerging Technology and Advanced Engineering Lord Krishna College of Engineering, Ghaziabad 2014-02-15
ARVIND KUMAR Achieving query optimization using sparsity management in OLAP system 797-801 2014 IEEE Ghaziabad 2014-02-07
ASHISH BAJPAI Remote Mirroring a Disaster Recovery Technique in Cloud Computing IJARSE ISSN-2319-8354(E) 2 8 166-175 2013 IJARSE
JAIVEER SINGH Web Usage Mining using Self Organized Map IJARCSSE 2277 128X Vol-3 6 532-538 2013 IJARCSSE
SANTOSH KUMAR GUPTA Distributed Process Scheduling Using Genetic Algorithm 2013 IEEE Xplore Amity University, Ghaziabad 26/09/2013
POOJA GUPTA A Significant Study and Comparison of DSDV, AODV and DSR Protocols in MANET using NS2 IJERT Volume 2 Issue 3 2013
ANKUR BHARDWAJ Defect Density Based Maintenance Prediction: A Neural Network Based Approach International Journal of Soft Computing 1816-9503 8 5 335-339 2013 Medwell Journals
SANTOSH KUMAR GUPTA Web Usage Mining Tools & Techniques: A Survey International Journal of Scientific & Engineering Research ISSN 2229-5518 4 6 2013
POOJA GUPTA A Simulation Study and Comparison of DSDV, AODV and DSR Ad-hoc Routing Protocols in MANET 2013 Amity University 11-04-2013
SANTOSH KUMAR GUPTA Web Usage Mining Using Self Organized Map International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 2277 128X 3 6 2013
POONAM RANA Remote Mirroring a Disaster Recovery Technique in Cloud computing” IJARSE ISSN-2319-8354(E). 2 8 166-175 2013 IJARSE
SANTOSH KUMAR GUPTA Materialized View Selection using Two Phase Optimization 2013 Springer (Lecture Notes) Bangalore 18/02/2013
POONAM RANA Revolution in Requirement Analysis by using Association Rule Mining 2013 United Campus , Naini Allahabad 03-08-2013
SANTOSH KUMAR GUPTA Web Content Mining Using Genetic Algorithm 82-93 2013 Springer-Verlag Berlin Heidelberg Mumbai 18/01/2013
ANJALI YADAV Simulation of single server queuing model Science India ISSN 0972-8287 16 6 37-42 2013
ANKUR SINGH BIST Role of Artificial Neural Network in Welding Technology: A Survey IJCA 67 1 2013 Fondation of computer science
SWATI CHAUHAN Survey paper on training of cellular automata for image Survey paper on training of cellular automata for image 2 4 980-985 2013 ijecs
VINEET SHARMA Secure Data Storage in Mobile Cloud Computing International Journal of Scientific and Engineering Research 2229-5518 4 4 2013 International Journal of Scientific and Engineering Research
ANKUR SINGH BIST A Student Information System in Restricted Domains IJCA 70 1 2013 Fondation of computer science
RAVI SHANKAR SINGHAL Test case optimization and prioritization using Risk based Analysis IJRCEE 111613-PB-2013-I-2 1 2 NA 2013 IRJCEE
VINEET SHARMA ANTNET:ACO based routing algorithm IOSR Journal of Computer Engineering 2278-0661 9 4 32-36 2013 IOSR Journal of Computer Engineering
A. P. SHUKLA Training cellular automata for image thinning and thickening 2013 IEEE xplore Amity University 2013-02-26
SWATI CHAUHAN Training of Cellular Automata for Image Filtering 632-639 2013 ELSEVIER Lucknow
A. P. SHUKLA An Enhanced Method for Sketch Drawing 2013 Elsevier
ANKUR SINGH BIST Pattern matching algorithm for computer virus detection International journal of engineering sciences and research technology 2 1 2013
ANKUR SINGH BIST Computer Virus :Open Problem International journal of engineering sciences and research technology 2 1 2013
ANKUR SINGH BIST Malicious codes in Mobile Phones International journal of engineering sciences and research technology 2 12 2013
ANKUR SINGH BIST Code Emulation for Computer Virus Detection International journal of engineering sciences and research technology 2 12 2013
VINEET SHARMA An Approach for Data Storage Security in Mobile Cloud Computiing 2013
TANYA MATHUR Information Retrieval Algorithms and Personalized Information Retrieval Concept International Journal of Computer Applications Volume 66 - Number 6 2013 Published by Foundation of Computer Science, New York, USA.
DISHA MOHINI PATHAK Survey on Routing Protocols with network coding in AD-HOC networks 1-5 2013 Hindustan university, chennai 11-04-2013
ARVIND KUMAR Analyzing performance of AODV routing protocol in mobile ad-hoc network 3182-3187 2013 International journal of advanced research in computer and communication Engineer Delhi 2012-08-08
ANKUR SINGH BIST Classification and identification of Malicious codes Indian Journal of Computer Science & Engineering ISSN : 0976-5166 3 2 282-286 2012
SWATI SHARMA Temperature Prediction using Wavelet Neural Network Research journal of information and technology 1 4 22-30 2012
PARITA JAIN An Emprical Study of Quadratum Puzzle International Journal of Engineering & Science Research Volume-2 1-6 2012
PARITA JAIN Preventing MANETS from Blackhole Attack using Blackhole Node Detection Monitoring System IJCA Foundation of Computer Science FCS Volume 44 15 2012
POONAM RANA COMBINED AND IMPROVED FRAMEWORK OF IAAS AND PAAS IN CLOUD COMPUTING Springer Journal of Advances in Intelligent Systems and Computing 236 831-839 2012 springer jaipur
POOJA GUPTA Facial Expression Recognition through EEG 2012 IMS, Ghaziabad 24-11-2012
ANJALI YADAV Evaluation of component Selection by using Genetic Algorithm ISBN 978-93-81583- 34-0 1 1 106-109 2012 Computer Society of India Gautam Budda University March 2012
ANKUR SINGH BIST Hybrid model for Computer Viruses: an Approach towards Ideal Behavior IJCA 45 17 2012 Fondation of computer science
ANJALI YADAV An Overview of New Approach to software Requirement Elicitation Process ISSN -1941-9414 5 1 420-431 2012 International Conference on Emerging Paradigms and Practice in Information & Comm July 2012
ANKUR SINGH BIST EFFECTIVENESS OF ELLIPTIC CURVE CRYPTOGRAPHY IJETR 1 1 2012
VINEET SHARMA A tool to control distribution of software   ACM SIGSOFT Software Engineering Notes 37 6 1-4 2012   ACM SIGSOFT Software Engineering Notes
SANTOSH KUMAR GUPTA Materialized View Selection using Genetic Algorithm 225-237 2012 Springer Berlin Heidelberg JIIT Noida 06/08/2012
SANTOSH KUMAR GUPTA Materialized View Selection using Iterative Improvement 2012 Springer Berlin Heidelberg Chennai 13/07/2012
VINEET SHARMA Cloud Computing and Protected Storage Services Technique Special Issue of International Journal of Computer Application 973-93-80870-11-7 24-27 2012 Special Issue of International Journal of Computer Application
VINEET SHARMA A Survey on Mobile Cloud Computing Special Issue of International Journal of Computer Applications 975-8887 1-5 2012
SANTOSH KUMAR GUPTA Web Content Mining Techniques: A Survey International Journal of Computer Applications ISSN: 0975 - 8887 47 11 44-50 2012 Foundation of Computer Science, New York, USA.
SANTOSH KUMAR GUPTA Frequency Based Structural Analysis for Document Plagiarism International Journal of Advanced Research in Computer Science ISSN No. 0976-5697 3 3 438-444 2012
VINEET SHARMA A Survey on Process Migration International Journal of Advanced Research in Computer Science 976-5697 3 6 29-34 2012 International Journal of Advanced Research in Computer Science
ANKUR SINGH BIST Sustainability a step forward to land grant pattern International journal of engineering sciences and research technology 1 7 2012
ANKUR SINGH BIST A review : aspect oriented programming International journal of engineering sciences and research technology 1 6 2012
ANKUR SINGH BIST Computer virus biological model International journal of engineering sciences and research technology 1 8 2012
ANKUR SINGH BIST Wave energy collector : Theoretical model for harnessing the potential energy of the ocean waves International journal of engineering sciences and research technology 1 8 2012
ANKUR SINGH BIST Artificial immune system : survey International journal of engineering sciences and research technology 1 9 2012
ANKUR SINGH BIST Kolmogorov complexity International journal of engineering sciences and research technology 1 9 2012
ANKUR SINGH BIST computer virus in network International journal of engineering sciences and research technology 1 10 2012
VINEET SHARMA Public Audit-ability in Cloud Computing 2012 SRM University
VINEET SHARMA A Survey on Mobile Cloud Computing 2012
VINEET SHARMA Cloud Computing & Protected Storage Service Technique 2012
VINEET SHARMA A Survey on Process Migration 2012
SHIVI VERMA “Fault Finding and Removal in Heterogeneous Networks by Remote Mobile Agent” International Journal of Computer Science Information and Engineering Technologies (IJCSIET). ISSN 2277 - 4408 1 2 2012
SHIVI VERMA Fault Tolerant Administration And Control of TCP/IP Based Network Via Mobile Device UNIASCIT ISSN 2250 - 0987 2 1 201-206 2012
SEEMA MAITREY A Survey: Hierarchical Clustering Algorithm in Data Mining International Journal of Engineering & Science Research 2277-2685 2 4 2012 IJESR
Speech Recognition: A Survey International journal of Advanced Research in Computer Science and Electronics Engineering 2277-9043 1 1 2012
ASHISH KOTS Boltzmann machine algorithm based learning of OLSR protocol: An energy efficient approach International Journal of Computer Applications 0975 - 8887 53 13 39-42 2012 IJCA
ANKUR SINGH BIST Fake Id prevention in online chatting International journal of engineering science and research 1 5 2012
ANKUR SINGH BIST Review: computer virus in network ijesrt 1 10 2012
HRIDAY KUMAR GUPTA ” RSA OPERATIONS WITH PERFORMANCE TUNING ” 2011 Nandani Publication KIET Ghaziabad 2011-09-02
PRAMOD KR.YADAV Study of Various Architecture for Network on chip 2011 KIET, GHAZIABAD
PRAMOD KR.YADAV Preserving Security in Routing in Mobile Ad-hoc Environment through Non-Linear Dimensions Reduction techniques International Journal of Advanced Research in Computer Science ISSN No:0976-5697 2 6 508-513 2011
ASHISH BAJPAI pattern recognition by using control chart, hamming network,SVM and genetic Algorithm 2011 Nandani prakashan Pvt ltd 2011-09-02
RAVI SHANKAR SINGHAL The Enhanced Approach for Test Suit Reduction 769-773 2011 Nandani Prakashan Pvt. Ltd. KIET Ghaziabad 2011-09-03
VINEET SHARMA Critical Analysis of Aladdin 2011
SEEMA MAITREY Parallelissm in CURE Clustering for Handling Largr Databases 2011 Haryana 26-02-2011
SWATI SHARMA Pattern Recognition by Using Control Chart, Hamming Network, SVM and GA 2011 02-09-2011
SEEMA MAITREY Antithetical Dimensional Application of View in Data Mining 2011 Marudhar Engineering College, Rajasthan 10-09-2011
SEEMA MAITREY Parallelissm in CURE Clustering Technique 2011 KIET, Ghaziabad 02-09-2011
SEEMA MAITREY Survey of Hierarchical Approach in Data 2011 KIET, Ghaziabad 02-09-2011
ARVIND KUMAR A survey on various protocols for dynamic address assignment in Mobile Ad hoc network 698-704 2011 International Conference on “Issues and challenges in Networking, Intelligence a
VINEET SHARMA A New Look to Traversal Algorithms Using Set Construct International Journal of Computer Science & Engineering 2 5 2010 International Journal of Computer Science & Engineering
VINEET SHARMA Digital Watermarking: Advanced technique in Image and Video Technology 2010
VINEET SHARMA Distributed Media Player 2010
VINEET SHARMA Distributed Coordinator Model and License Key Management for Software Piracy Prevention 2010 IIT Roorkee
VINEET SHARMA Dynamic License Key Management and Piracy Prevention 2010 IMT Ghaziabad
VINEET SHARMA Dynamic Software License Key Management Using Smart Cards 2010
SHIVI VERMA “IVRS enabled electrical machine” 2010 ITM, Bhilwara ITM,Bhilwara
PRAMOD KR.YADAV Granular Computing Based Clustering 2009 MIET, Meerut
VINEET SHARMA Distributed software and license key management “an initiatative to stop software piracy Ubiquitous Computing & Communication Journal 5 1770-1777 2009 Special Issue of Ubiquitous Computing Security Systems
POONAM RANA Survey of Model for object Recognition from NLP” 2009 Institute of Management Studies and Research, Ghaziabad.
VINEET SHARMA Distributed software and license key management 2009 MIET, Meerut
A. P. SHUKLA Real Time vehicle Data Acquition 2009 IEEE Explore IIIT Allahabad
SEEMA MAITREY Grid Computing & its Applications 2008 Ideal Institute of Technology,Ghaziabad 02-05-2008
ARVIND KUMAR Analysis and reduction of Energy consumption in DSR Protocol in MANET 2008 National conference on Computer Science and Information Technology
SANJEEV KR.YADAV Evaluation of Robustness, Accuracy and Speed of SPIRAL for Fast Fingerprint Biometric System International Journal of Computer Applications ISSN 0975-8887 79 16 21-26 October 2013 IJCA Journal
SANJEEV KR.YADAV Simulating Spiking Neuron for Information Theoretic Analysis in Stochastic Neuronal System Advances in Intelligent and Soft Computing Series Volume 174 October 2012 Springer-Verlang, Germany
SEEMA MAITREY Review Paper on Grid Computing in PCTE journal of Computer Science 1 6 1 2009 PCTE
PARITA JAIN Evidence Based Guideline System KIET 2012-07-09
SWATI SHARMA Contribution of data maining in business ITS mohan nagar 2008-10-17
JAIVEER SINGH Review of Security in Materialize View for Data Mining AKGEC GHAZIABAD 2012-03-16
SWATI SHARMA Pattern recognition by using Control Chart,Hamming network, SVM and genetic algorithm Kiet ,gzb
JAIVEER SINGH Enhancement of CURE Clustering Technique in Data Mining 2012-03-16
JAIVEER SINGH Energy Efficient Routing Protocols for MANET 2010-05-08
VINEET SHARMA Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention International Journal of Computer Science and Security 3 6 550-558 International Journal of Computer Science and Security
VINEET SHARMA Tree structured time synchronization protocol in wireless sensor network Ubiquitous Computing & Communication Journal 4 712-717 Ubiquitous Computing & Communication Journal
VINEET SHARMA Ordered Binary Linked List Journal of Experimental Algorithmics, ACM Journal of Experimental Algorithmics, ACM
VINEET SHARMA Security Enhancement of CEBus Protocol by applying Priority on Logical Partitions of Connected Appliances KIET
VINEET SHARMA A Novel Technique to Improve the Performance of Licensed Software in Client/Server Network Environment
VINEET SHARMA Application layer protocols & services Jamia Hamdard, New Delhi
A. P. SHUKLA Image Edge Detection Using Cellular Automata-A Technical Survey” KIET Ghaziabad
A. P. SHUKLA Planted Motif Algorithm-A New Concept IIT Guahati
A. P. SHUKLA Consistency Based Channel Allocation Using Generic Algorithm in Mobile IIIT Allahabad
ANKUR SINGH BIST Static Code Analysis For Identification Of Malicious Codes
Comparative Study of Acoustic Modeling Techniques Elsevier Bangalore 2014-07-24
Filter Bank Optimization for Robust ASR using Simulated Annealing Bangalore 2014-07-24
ANKUR SINGH BIST RECENT TRENDS IN XOR PROBLEM International journal of engineering science and research 4 2