Research and Publications CSE-2016 | CGC | Landran
Research and Publications CSE-2016

Research and Publications CSE-2016

Sno.Name of FacultyTitle of PaperName of JournalEvent Attended(Conference,Paper Presentation)National /InternationalVol. No.Issue No.Page No.ISSN/ISBNSCI/ScopusDate of Publication
1Ms. Amandeep KaurHoneypot: A Security Tool in Intrusion DetectionIJCSTPublishedInternationalVol-2Issue-5N/AN/AN/AMay-16
2Ms. Amandeep KaurData Privacy In Healthcare Networks With Secure Key Exchange MechanismIJCSTPublishedInternationalVOL-3ISSUE-2N/AN/AN/AFeb-16
3Mr. Amandeep UmmatA study an analysis of Wireless Network SystemIJCSTPublishedInternationalVOL 7Issue 4N/AN/AN/ANov-16
4Mr. Amandeep UmmatResearch Paper on Object Oriented Software EngineeringIJCSTPublishedInternationalVOL 7Issue 4N/AN/AN/ANov-16
5Mr. Amandeep UmmatAutomatic Sppech Recognition:A reviewIJCSTPublishedInternationalVOL 7Issue 4N/AN/AN/ANov-16
6Mr. Amandeep UmmatResearch Paper on Big Data and HadoopIJCSTPublishedInternationalVOL 7Issue 4N/AN/AN/ANov-16
7Mr.Anurag JainScalable and Trustworthy Load Balancing Technique for Cloud EnvironmentInternational Journal of Engineering & Technology (IJET)PublishedInternational8(2)8(2)N/AN/ASCOPUSApr-16
8Mr.Anurag JainA Survey on Cloud ComputingINTERNATIONAL JOURNAL OF INNOVATIVE TRENDS IN ENGINEERING (IJITE)PublishedInternational20(2)20(2)N/AN/AN/AAug-16
9Mr.Anurag JainBasics of Cloud ComputingInternational Research Journal of Engineering and Technology (IRJET),PublishedInternational3(7)3(7)N/AN/AN/AJul-16
10Mr.Anurag JainParticle Swarm Optimization Based Task Scheduling for Cloud ComputingInternational Journal of Advanced Research in Computer Engineering & Technology (IJARCET),PublishedInternational5(8)5(8)N/AN/AN/AAug-16
11Ms.Bharti ChhabraA survey on emerging sensor technologies for ground water detectionIJCSTPublishedInternationalVOL. 4ISSUE 3N/AN/AN/AJULY.-SEPT. 2016
12Ms.Bharti ChhabraA review on load balancing Algorithm for Fault Recovery in cloud computingIJCSTPublishedInternationalVolume 4Issue 4N/AN/AN/AAugust, 2016
13Ms.Bharti ChhabraAn Analytical Survey on the Satellite based Natural Terrain Feature Identification TechniquesIJRECEPublishedInternationalVolume 4Issue 4p.p. 91-95N/AN/AYear 2016
14Ms.Bharti ChhabraAn Analytical Survey on the Plant Leaf Disease Detection TechniquesIJRECEPublishedInternationalVolume 4Issue 4p.p. 86-90N/AN/AYear 2016
15Ms.Bharti ChhabraA Review of Virtual Side Channel attack in Cloud Computing ArchitectureIJRECEPublishedInternationalVol. 4Issue 3p.p, 137-141N/AN/AJuly- Sept 2016
16Ms.Bharti ChhabraA Survey of the Elliptic curve cryptography attacks, advantages and DisadvantagesIJRECEPublishedInternationalVOL. 4ISSUE 3pp 96-100N/AN/AJULY-SEPT. 2016
17Ms.Bharti ChhabraA Survey on Emerging Sensor Technologies for Groundwater DetectionIJRECEPublishedInternationalVOL. 4ISSUE 3pp 90-95N/AN/AJULY.-SEPT. 2016
18Ms.Bhushan DuaOverview of Cloud ComputingIJCSTPublishedInternationalVol 7Issue 4, Ver -1 /td>N/AN/AN/AOct – Dec 2016
19Ms.Bhushan DuaBiometric Authentication in Computer SecurityIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
20Ms.Bhushan DuaChallenges and Issues in Adhoc NetworkIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/A/td>Oct – Dec 2016
21Ms. Deepi JohalA Framework for Data Migration between Various Types of Relational Database Management SystemsIJCSTPublishedInternationalVol 7Issue 4 Ver -1N/AN/AN/AOct-Dec 2016
22Ms. Deepi JohalAutomated Identification of Hard Exudates and Cotton Wool Spots using Biomedical Image ProcessingIJCSTPublishedInternationalVol 7Issue 4, Ver -1N/AN/AN/AOct-Dec 2016
23Ms. Deepi JohalBig Data Management: Characteristics, Challenges and SolutionsIJCSTPublishedInternationalVol 7Issue 4 Ver -1N/AN/AN/AOct-Dec 2016
24Ms. Deepi JohalBiometric Authentication in Computer SecurityIJCSTPublishedInternationalVol 7Issue 4 Ver -1N/AN/AN/AOct-Dec 2016
25Ms. Dolly SharmaDesign & development of android based bot for medicine & food distribution to patientsSpringer ChapterPublishedInternationalvol-479vol-479N/AN/AISI, SCOPUSMay-16
26Dr. Devendra PrasadNADS: Neighbor Assisted Deployment Scheme for Optimal Placement ofIJCSTPublishedInternationalN/AN/AN/A2016
27Dr. Devendra PrasadSensor Nodes to Achieve Blanket Coverage in Wireless Sensor NetworkIJCSTPublishedInternationalN/AN/AN/A2016
28Dr. Devendra PrasadPolicy for planned placement of sensor nodes in large scale wireless sensor network.IJCSTPublishedInternationalN/AN/AN/A2016
29Mr. Jashanpreet SinghDistributed Denial of Service (DDoS) attack prevention using Fuzzy LogicIJA-ERAPublishedInternationalVolume – 2Issue – 6N/AN/AN/AOctober – 2016
30Mr. Jashanpreet SinghComprehensive Survey on DDOS attack with its mitigation TechniquesIJCSEPublishedInternationalVol. 8 No.9N/AN/AN/ASep-16
31Ms. Jaspreet KaurA Study and Analysis on Wireless Network SystemIJCSTPublishedInternationalVol 7Issue 4, Ver -1 (Oct-Dec 2016)N/AN/AN/AOct-Dec 2016
32Ms. Jaspreet KaurResearch Paper on Object Oriented Software EngineeringIJCSTPublishedInternationalVol 7Issue 4 Ver -1N/AN/AN/AOct – Dec 2016
33Ms. Jaspreet KaurAutomatic Speech Recognition: A ReviewIJCSTPublishedInternationalVol 7Issue 4 Ver -1N/AN/AN/AOct – Dec 2016
34Ms. Jaspreet KaurResearch Paper on Big Data and HadoopIJCSTPublishedInternationalVol 7, Issue 4, Ver -1N/AN/AN/AOct-Dec 2016
35Ms. Nafiza MannReview Study: The Effect of Various Attacks on Zone Routing Protocol in MANETIJCSTPublishedInternationalN/AN/AN/A16-Mar
36Ms. Nafiza MannStudy the impact of different attacks on zone routing protocol in MANETIJCSTPublishedInternationalvol 4issue 3N/AN/AN/AMay-16
37Ms. Nafiza MannPerformance Analysis of Jellyfish Reorder Attack on Zone routing protocol in MANETIJCSTPublishedInternationalVolume 4Issue 3N/AN/AN/AJune, 2016
38Ms. Nafiza MannA Comparative Testing from UML Design using Activity DiagramIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
39Ms. Nafiza MannAn Enhanced Frequent Pattern Analysis Technique from the Web Log DataIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
40Ms. Nafiza MannChallenges and Issues in Adhoc NetworkIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
41Ms. Nafiza MannOverview of Cloud ComputingIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
42Ms. Nafiza MannComputer Networks And It’s TopologiesIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. – DEC. 2016
43Ms. Nafiza MannImportance of Data Quality in Existing systemsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. – DEC. 2016
44Ms. Nafiza MannFuzzy and SVM based Power System Stabilizer for Single Machine Infinite Bus SystemIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. – DEC. 2016
45Ms. Nafiza MannGlobal High Dimension Outlier Algorithm for Efficient Clustering and Outlier DetectionIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. – DEC. 2016
46Ms. Nafiza MannJamming Avoidance using RED approach and cognitive networks in MANETsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. – DEC. 2016
47Ms. Nafiza MannSecurity Issues and Their Techniques in DBMS – A Novel SurveyIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT. -DEC. 2016
48Ms. Nafiza MannAnalysis of Spatial Multiplexing in MIMO SystemsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/A4 OCT. – DEC. 2016
49Ms. Nafiza MannVehicular Ad-hoc Network, A ReviewIJCSTPublishedInternationalVOL. 4 OCT. – DEC. 2016ISSUE 4N/AN/AN/AOCT. – DEC. 2016
50Ms. Nafiza MannIJCSTPublishedInternationalN/AN/AN/A
51Ms. Navjot kaurResearch Paper on Object Oriented Software EngineeringIJCSTPublishedInternationalVol 7Issue 4 Ver-1N/AN/AN/AOct – Dec 2016
52Ms. Navjot kaurAutomatic Speech Recognition: A ReviewIJCSTPublishedInternationalVol 7Issue 4, Ver-1N/AN/AN/AOct – Dec 2016
53Ms. Navjot kaurResearch Paper on Big Data and HadoopIJCSTPublishedInternationalVol 7Issue 4, Ver-1N/AN/AN/AOct – Dec 2016
54Ms. Navjot kaurA Study and Analysis on Wireless Network SystemIJCSTPublishedInternationalVol 7Issue 4, Ver-1N/AN/AN/AOct – Dec 2016
55Ms. Navneet Kaur“Survey of UDP, TCP for video streaming in WiMAX”IJCSTPublishedInternationalVolume4Issue3,N/AN/AN/AMay-16
56Ms. Navneet Kaur“Dissect the performance of network layer routing protocols (AODV, DSDV and ZRP) for video streaming over Worldwide Interoperability of Microwaves Access”IJCSTPublishedInternationalVolume11Number10N/AN/AN/A2016
57Ms. Navneet KaurA Framework for Data Migration between Various Types of Relational Database Management SystemsIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
58Ms. Navneet KaurA Study and Analysis on Wireless Network SystemIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
59Ms. Navneet KaurAn Enhanced Frequent Pattern Analysis Technique from the Web Log DataIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
60Ms. Navneet KaurResearch Paper on Object Oriented Software EngineeringIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
61Ms. Navneet KaurAutomated Identification of Hard Exudates and Cotton Wool Spots using Biomedical Image ProcessingIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
62Ms. Navneet KaurAutomatic Speech Recognition: A ReviewIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
63Ms. Navneet KaurResearch Paper on Big Data and HadoopIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
64Ms. Navneet KaurBig Data Management: Characteristics, Challenges and SolutionsIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
65Ms. Navneet KaurBiometric Authentication in Computer SecurityIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
66Ms. Navneet KaurA Comparative Testing from UML Design using Activity DiagramIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOct – Dec 2016
67Ms. Navneet KaurDynamic Annotation System for Content Based Image Retrieval using Back Propagation Classification TechniqueIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOct – Dec 2016
68Ms. Navneet KaurFuzzy and SVM based Power System Stabilizer for Single Machine Infinite Bus SystemIJCSTPublishedInternationalVOL.ISSUE 4N/AN/AN/AOct – Dec 2016
69Ms. Navneet KaurGlobal High Dimension Outlier Algorithm for Efficient Clustering and Outlier DetectionIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOct – Dec 2016
70Ms. Navneet KaurJamming Avoidance using RED approach and cognitive networks in MANETsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOct – Dec 2016
71Ms. Navneet KaurSecurity Issues and Their Techniques in DBMS – A Novel SurveyIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOct – Dec 2016
72Ms. Navneet KaurAnalysis of Spatial Multiplexing in MIMO SystemsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOct – Dec 2016
73Ms. Navneet KaurRuntime Optimization of 802.11 based wireless Mesh Network by Multi-Radio Multi-ChannelIJCSTPublishedInternationalvol 5issue 9N/AN/AN/ASep-16
74Mr.Parveen SharmaThe Study and Comparison between AODV, OLSR and DSR Routing Protocols and Attacks in Mobile Ad-Hoc NetworkIJCSTPublishedInternationalN/AN/AN/AN/AN/ASep-16
75Ms. Sheilly PaddaHoneypot: A Security Tool in Intrusion DetectionIJAEMSPublishedInternationalVol-2Issue-5N/AN/AN/AMay-16
76Ms. Sheilly PaddaA Review On Action retrieval :A brief SurveyNAIRJCPublishedInternationalVol 2Issue 6N/AN/AN/AJun-16
77Ms. Sonali GuptaHoneypot: A Security Tool in Intrusion DetectionIJCSTPublishedInternationalVol-2Issue-5N/AN/AN/AMay-16
78Ms. Tanisha SainiA Reliable Vertical Handover Approach in Wireless Sensor Network using Re-association ProceduresIJCSTPublishedInternationalVolume 4Issue 4N/AN/AN/AAugust, 2016
79Ms. Tanisha SainiTechnique to Reduce Energy Consumption in Wireless Sensor Network- A ReviewIJCSTPublishedInternationalVolume 4Issue 3N/AN/AN/AMarch, 2016
80Ms. Tanisha SainiTO PROPOSE A TECHNIQUE FOR FAULT TOLERANCE IN WIRELESS SENSOR NETWORKSIJCSTPublishedInternationalVolume 7Issue 5N/AN/AN/ASeptember–October 2016
81Ms. Tanisha SainiStudy of Energy Efficient and Fault Tolerant LEACH Protocol for WSN-A ReviewIJCSTPublishedInternationalVol 4Issue No 4N/AN/AN/AJuly, 2016
82Ms. Tanisha SainiA Review on Detection And Prevention of Prankster attack Using Evolutionary Algorithm in VANETsIJCSTPublishedInternationalVol. 8 no. 6N/AN/AN/AJun-16
83Ms. Tanisha SainiDefense against Prankster Attack in VANET Using Genetic AlgorithmIJCSTPublishedInternationalVol 9(35),N/AN/AN/ASep-16
84Ms. Tanisha SainiImportance of Data Quality in Existing systemsIJCSTPublishedInternationalVOL. 4ISSUE 4N/AN/AN/AOCT- DEC 2016
85Ms. Tanisha SainiA Framework for Data Migration between Various Types of Relational Database Management SystemsIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOCT-DEC 2016
86Ms. Tanisha SainiAutomated Identification of Hard Exudates and Cotton Wool Spots using Biomedical Image ProcessingIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOCT -DEC 2016
87Ms. Tanisha SainiBig Data Management: Characteristics, Challenges and SolutionsIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOCT.-DEC. 2016
88Ms. Tanisha SainiBiometric Authentication in Computer SecurityIJCSTPublishedInternationalVol. 7Issue 4N/AN/AN/AOCT-DEC 2016
89Ms. Vaishali M WadhwaAttendedNAAdvances in Science and TechnologiesnationalNANAN/ANAN/A27-28th April, 2016 at MMU, Mulana
90Ms. Navneet KaurReview of transport layer protocols for video streaming over WimaxNAEmerging areas in computer sciences & communication engineering-2016nationalNANAN/APID-1015 in 2016N/A4/1/2016, CU Gharua
91Mr. Rajeev SharmaA Principle of Voice-over-IP and Consistent hashing using Joust using Heterogeneous Communication Model SimulatorNAAdvances in computer SciencesnationalNANAN/ANAN/A9-Apr-16
92Ms. Iqbaldeep KaurOntology based Retrieval of ComponentsIndian Journal of Science and TechnologyPublishedInternationalIssue No. 4848, December, 2016 PP. 1-11ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645SCOPUSDecember 2016
93Mr. Anurag JainParticle Swarm Optimization Based Task Scheduling for Cloud ComputingInternational Journal of Advanced Research in Computer Engineering & Technology (IJARCET)PublishedInternational582269-22752278 – 1323N/AAug 2016
94Mr. Anurag JainBasics of Cloud ComputingInternational Research Journal of Engineering and Technology (IRJET)PublishedInternational371514-15172395-0072N/AJuly 2016
95Mr. Anurag JainA Survey on Cloud ComputingINTERNATIONAL JOURNAL OF INNOVATIVE TRENDS IN ENGINEERING (IJITE)PublishedInternational20292-962395-2946N/AAug 2016
96Mr. Gurbaj SinghChallenges and Issues in Adhoc NetworkInternational Journal of Computer Science & TechnologyPublishedInternational74N/A0976-8491N/AOct – Dec 2016
97Mr. Gurbaj SinghOverview of Cloud ComputingInternational Journal of Computer Science & TechnologyPublishedInternational74N/A0976-8491N/AOct – Dec 2016
98Mr. Gurbaj SinghComputer Networks And It’s TopologiesInternational Journal of Research in Electronics and Computer EngineeringPublishedInternational44N/A2393-9028N/AOct – Dec 2016
99Ms. Ramanpreet KaurAutomated Vehicle Detection & Classification with Probabilistic Neural NetworkInternational Journal of Advance Research , Ideas and Innovations in Technology.PublishedInternational261-42454-132XN/ANovember 2016
100Ms. Ravpreet KaurRandom Pattern Based Sequential Bit (Rap-SeB) Steganography with Crytography for Video EmbeddingInternational Journal of Modern Education & Computer Science (IJMECS)PublishedInternational8951-59, Date- 8/9/2016ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)N/ASeptember 2016
101Ms. Sheilly PaddaA Review On Action retrieval: A brief SurveyNorth Asian International Research Journal ConsortiumPublishedInternationalVol2Issue 63-12ISSN: 2454-7514N/AJune 2016
102Ms. Sheilly PaddaVideo Retrieval Using Action Mapping Between Frames Based On word Bag Features and Structural content MatchingNorth Asian International Research Journal ConsortiumPublishedInternationalvol2Issue 11ISSN:2454-7514.N/ANovember 16
103Mr. Amandeep UmmatStudy and analysis on Wireless Network SystemInternational Journal of Computer Science & TechnologyPublishedInternationalVol-7Issue 40976-8491N/AOCT- Dec 2016
104Mr. Amandeep UmmatResearch Paper on Object Oriented Software EngineeringInternational Journal of Computer Science & TechnologyPublishedInternationalVol-7Issue 40976-8491N/AOCT- Dec 2016
105Mr. Amandeep UmmatAutomatic Speec Recognition: A ReviewInternational Journal of Computer Science & TechnologyPublishedInternationalVol-7Issue 40976-8491N/AOCT- Dec 2016
106Mr. Amandeep UmmatResearch Paper on Big Data and HadoopInternational Journal of Computer Science & TechnologyPublishedInternationalVol-7Issue 40976-8491N/AOCT- Dec 2016
107Ms. Tanisha SainiStudy of Energy Efficient and Fault Tolerant LEACH Protocol for WSN-A ReviewIJMCSAPublishedInternationalVol-4Issue 432-352321-2632N/AJuly, 2016
108Ms. Tanisha SainiA Review on Detection And Prevention of Prankster attack Using Evolutionary Algorithm in VANETsIJCSEPublishedInternationalVol 8N/A179-1840975-3397N/AJun-16
109Ms. Tanisha SainiA Reliable Vertical Handover Approach in Wireless Sensor Network using Re-association ProceduresIJMCSPublishedInternationalVol-4Issue 411-152320-7868N/AAugust, 2016
110Ms. Tanisha SainiA fast handoff technique in VANET to decrease delay in network using mobile nodesIJECETPublishedInternationalVol-7Issue 6101-1069766472N/ANov-Dec 2016
111Ms. Tanisha SainiTo propose a technique for fault toleranace in wireless sensor networkIJCETPublishedInternationalVol-7Issue 51-80976-6375N/ASep-Oct 2016
112Ms. Tanisha SainiDefense against prankster attack using genetic algorithmIJSTPublishedInternationalVol 9Issue 350974-5645SCOPUSSep 2016
113Ms. Tanisha SainiBig data management: characterstics, challenges and solutionsIJCSTPublishedInternationalVol-7Issue 454-570976-8491N/AOCt-Dec 2016
114Ms. Tanisha SainiAutomated identification of hard enodates and cotton wool spots using bio medical image processingIJCSTPublishedInternationalVol-7Issue 439-420976-8491N/AOCt-Dec 2016
115Ms. Tanisha SainiVehicular ad hoc network-A ReviewIJRECEPublishedInternationalVol-4Issue 472-752348-2281N/AOCt-Dec 2016
116Ms. Nafiza MannPerformance Analysis of Jellyfish Reorder Attack on Zone routing protocol in MANETIJMCSPublishedInternationalVol-4Issue 3167-1702320-7868N/AJune 2016
117Ms. Nafiza MannComputer Networks And It’s TopologiesIJRECEPublishedInternationalVol-4Issue 436-392348-2281N/AOct-Dec 2016
118Ms. Nafiza MannImportance of Data Quality in Existing systemsIJRECEPublishedInternationalVol-4Issue 440-442348-2281N/AOct-Dec 2016
119Ms. Nafiza MannFuzzy and SVM based Power System Stabilizer for Single Machine Infinite Bus SystemIJRECEPublishedInternationalVol-4Issue 450-542348-2281N/AOct-Dec 2016
120Ms. Nafiza MannGlobal High Dimension Outlier Algorithm for Efficient Clustering and Outlier DetectionIJRECEPublishedInternationalVol-4Issue 455-592348-2281N/AOct-Dec 2016
121Ms. Nafiza MannJamming AvoidanceREDapproach and cognitive networks in MANETsIJRECEPublishedInternationalVol-4Issue 460-642348-2281N/AOct-Dec 2016
122Ms. Nafiza MannSecurity Issues and Their Techniques in DBMS – A Novel SurveyIJRECEPublishedInternationalVol-4Issue 463-682348-2281N/AOct-Dec 2016
123Ms. Nafiza Mann“ Vehicular Ad-hoc Network, A ReviewIJRECEPublishedInternationalVol-4Issue 472-752348-2281N/AOct-Dec 2016
124Ms. Nafiza MannAnalysis of Spatial Multiplexing in MIMO SystemsIJRECEPublishedInternationalVol-4Issue-469-712348-2281N/AOct-Dec 2016
125Ms. Nafiza MannAn Enhanced Frequent Pattern Analysis Technique from the Web Log DataIJCSTPublishedInternationalVol-7Issue-433-35: 0976-8491N/AOct-Dec 2016
126Ms. Nafiza MannOverview of Cloud ComputingIJCSTPublishedInternationalVol-7Issue-466-690976-8491N/AOct-Dec 2016
127Ms. Nafiza MannA Comparative Testing from UML Design using Activity DiagramIJCSTPublishedInternationalVol-7Issue-470-760976-8491N/AOct-Dec 2016
128Ms. Nafiza MannBiometric Authentication in Computer SecurityIJCSTPublishedInternationalVol-7Issue-458-620976-8491N/AOct-Dec 2016
129Dr.Gagan D.JindalLocal mesh ternary patterns: A new descriptor for MRI and CT biomedical image indexing and retrievalTaylor & Francis Journal (TCIV)PublishedInternationalVol-151-15ISSN: 2168-1163N/AJuly 2016
130Dr.Gagan D.JindalDirectional Local Ternary Quantized Extrema Pattern: A New Descriptor for Biomedical Image Indexing and RetrievalELSEVIER JournalPublishedInternationalVol.191895–1909ISSN: 2215-0986N/AJune 2016
131Dr. Devendra PrasadPolicy for planned placement of sensor nodes in large scale wireless sensor networkKSII Transactions on Internet and Information Systems.PublishedInternationalvol. 10no. 7N/AeISSN: 1976-7277SCIJuly 2016.
132Ms. Isha VatsComparison survey on different types of stenographyICRTCPublishedInternationalvol 4N/AN/AN/AN/A30-31 Aug 2016
133Ms. Isha VatsImage Enhancement, Deblurring and Noise Removal by GSR AlgorithmIJCTAPublishedInternationalN/AN/A583-593N/AN/ASep 2016
134Ms. Isha VatsFuzzy and SVM based Power System Stabilizer for Single Machine Infinite Bus SystemIJRECEPublishedInternationalVol 4Issue 450-542348-2281N/ADec 2016
135Ms. Isha VatsGlobal High Dimension Outlier Algorithm for Efficient Clustering and Outlier DetectionIJRECEPublishedInternationalVol 4Issue 455-592348-2281N/ADec 2016
136Ms. Isha VatsJamming Avoidance using RED approach and cognitive networks in MANETsIJRECEPublishedInternationalVol 4Issue 460-642348-2281N/ADec 2016
137Ms. Isha Vats“ Security Issues and Their Techniques in DBMS – A Novel SurveyIJRECEPublishedInternationalVol 4Issue 463-682348-2281N/ADec 2016
138Ms. Isha VatsAnalysis of Spatial Multiplexing in MIMO SystemsIJRECEPublishedInternationalVol 4Issue 469-712348-2281N/ADec 2016
139Ms. Isha VatsAn Enhanced Frequent Pattern Analysis Technique from the Web Log DataIJCSTPublishedInternationalVol 7Issue 433-35: 0976-8491N/AOct-Dec 2016
140Ms. Isha VatsA Comparative Testing from UML Design using Activity DiagramIJCSTPublishedInternationalVol 7Issue 470-760976-8491N/AOct-Dec 2016