Research and Publications IT upto 2014

Research and Publications IT upto 2014

Research and Publications IT upto 2014

Sno.Name of the JournalTitle of paperAuthor(s)National / Inter NationalVolume/IssuePage no.Month/Year
1International Journal of Computer science & Information TechnologyPerformance Analysis of Congestion in Wireless NetworkAnjali Sharma, Manish MahajanInternational JournalVol: 2 Issue 10.pp. 823-826Nov, 2012
2International Journal of Computer Applications”,published by Foundation of Computer Science, New York“Implementation Failures of an Information System: A NeuroComputing Approach”Dr.Bikram Pal Kaur & Dr.Himanshu aggrawalInternational JournalVolume 58, Issue 21; pp:26-33, November 2012;pp:26-33,November 2012
3“Information System Planning Failures in Indian Telecommunication Industry “at the 2012 ,International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE’12),International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE’12), July 16-19, 2012, at Monte Carlo Resort, Las Vegas, USADr.Bikram Pal Kaur & Dr.Himanshu aggrawalAttended and presented in PROCEEDINGS OFTHE 2012 INTERNATIONAL CONFERENCE ONE-LEARNING, E-BUSINESS, ENTERPRISE INFORMATIONSYSTEMS, & E-GOVERNMENTwww.world-academy-of-science.orgJuly 16-19, 2012, at Monte Carlo Resort, Las Vegas, USA.pp.121-128July 16-19, 2012
4International Journal of Engineering Research & Technology (IJERT)An experiment on performance Assessment of WPAN Networks suing 802.15 standardGurdeep Kaur,Manish MahajanInternational JournalVol. 1 Issue 8PP: 1-8October 2012
5International journal of Research in Computer & Communication Technology (IJRCCT)A COMPARATIVE SIMULATION PLATFORM FOR IEEE 802.11 AND IEEE 802.15 STANDARDS IN TREE TOPOLOGYGurdeep Kaur,Manish MahajanInternational JournalVol-1 Issue 5.PP: 213-217October 2012
6International Journal of Computer Networks and Communications(IJCNC)An efficient novel key management scheme using NchooseK algorithm for wireless sensor n/ws.Harjot bawa, Parminder SinghInternationalVol.4, No.6121-136Nov 2012
7International Conference on electrical Engineering & Computer Science ‘2012. (ICEECS-2012)Security Implementation on IAAS based Cloud.Jasmeen Kaur,Manish MahajanInternational conferenceMay, 2012
8International Conference on Recent Trends in Computer Science (ICSE, 2012)Improving Cloud Security Using EncryptionJasmeen Kaur,Manish MahajanInternational conference2nd july 2012
9IJCAComparsion of thyroid Segmentation algorithmJaspreet KaurInternationalvolume 502012
10International Journal of Innovations in Engineering and Technology (IJIET)Strengthening the Encryption Mechanism in WEP ProtocolJaspreet Singh , Sandeep Singh KangInternational JournalVol 1 No.3pp.12-16OCT 2012
11International Journal of Soft Computing and Engineering (IJSCE)Security Enhancement in WEP by Implementing Elliptic Curve Cryptography TechniqueJaspreet Singh , Sandeep Singh KangInternational JournalVol 2 , Issue 5186-190November 2012
12International Journal of Computer Science and Information Technology & Security (IJCSITS)Information Technology & Security (IJCSITS) Accessing Google maps in smart phones without availability of GPSKaran Mahajan,Manish MahajanInternational JournalVol. 2, No.5pp. 213-214October 2012.
13International Journal of Computer science & Information TechnologyImplementing Various Encryption Algorithms to Enhance the Data Security of Cloud in Cloud ComputingMandeep Kaur, Manish MahajanInternational JournalVol: 2 Issue 10.pp. 56-59Nov, 2012
14International Journal of Engineering and Advanced Technology (IJEAT)A mathematical approach to avoid congestion &to analyse snoop behavior in wired cum wireless n/w.Maninder Kaur, Parminder SinghInternationalVolume 2,Issue 2347-352Dec 2012
15International Journal of Distributed and Parallel Systems (IJDPS)Enhancement of TCP Performance with the help of snoop Protocol in Wireless NetworkManinder kaur, Parminder SinghInternationalVol.3, No.619-147Nov 2012
16International Journal of Engineering and Advanced Technology (IJEAT)A Mathematical Approach to Avoid Congestion and To Analyize Snoop Behaviour In Wired Cum Wireless NetworkManinder Kaur,Parminder SinghInternationalVolume-2,Issue-2347-352Dec 2012
17Recent Advances in IT & IT Management (RAITM’12) Journal of Information and Operations ManagementSteganography in RGB image with improved intensity equalization of pixels.Manish MahajanInternational conference / INT. JournalVolume 3, Issue 1PP: 265–269February, 2012
18International Journal of Computer Network and Information SecurityAdaptive Steganography: A survey of Recent Statistical Aware Steganography TechniquesManish MahajanInternational JournalVolume 4, No.10PP: 76-92September 2012
19International Journal of Computer ApplicationsAn Improved Technique to Compute Visual Attention Map Based upon Wavelet DomainManish MahajanInternational JournalVolume 60, No.12PP: 36-42December 2012.
20International Journal of Engineering Research & Technology (IJERT)ENERGY EFFICIENCY IN CHAIN-BASED HIERARCHICAL DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKSNamisha Bhateja, Sachin MajithiaInternationalVol. 1, Issue 10December, 2012
21International Journal of Science and Research (IJSR)Medial Axis Transformation based Skeletonzation of Image Patterns using Image Processing TechniquesNavjot kaur, Parminder SinghInternationalVol 1,Issue-3220-223Dec 2012
22International Journal of Computer Science & CommunicationContent Based image Retrieval by comparing Color and shape features.Pooja Verma,Manish MahajanInternational JournalVol No: 2 Issue 2PP: 641-643July-December 2012
23International journal of Computer Science & CommunicationRetrieval of better results using shape techniques for content based retrievalPooja Verma,Manish MahajanInternational JournalVol No: 3 Issue 2PP: 254-257Jan-Jun 2012
24International Conference on Advancement in Engineering Studies & Technology (ICAEST)Performance Evaluation of Reusable Function Oriented Software ComponentsPratibha Verma,Manish MahajanInternational conference15th JULY, 2012
25International Journal of Engineering Research & Technology (IJERT)EFFICIENT END TO END ROUTING USING RSSI & SIMULATED ANNEALINGRevti Kaura, Sachin MajithiaInternationalVol. 1 , Issue 10December, 2012
26CiiT International Journal of Wireless CommunicationDATA SECURITY IN MOBILE COMMUNICATIONSachin Majithia, Dinesh KumarInternationalISSN 0974 – 9640Feburary-2012
27International Journal of Wireless networks and CommunicationsComparing various Routing Securities Strategies of Wireless NetworksShikha Bansal,Manish MahajanInternational JournalVol: 4 No: 1PP 49-58.Jan – Dec 2012
28International Journal of Computer Science and Information Technology & Security (IJCSITS)Accessing Google maps in smart phones without availability of GPSKaran Mahajan,Manish MahajanInternational JournalVol. 2, No.5,pp. 213-214October 2012
29National Conference on Challenges in Emerging Computer Technologies(CECT’2012)IMPROVING SECURITY IN WI-MAX TECHNOLOGYKamalpreet Kaur , Sachin Majithia, Namisha BhatejaNationalVol.1286-288May, 2012
30National Conference on Challenges in Emerging Computer Technologies(CECT’2012)FAULT TOLERANCE IN CHAIN BASED HIERARCHAL DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKSNamisha Bhateja, Sachin Majithia, Kamalpreet KaurNationalVol.1274-277May, 2012
31National Conference on Challenges in Emerging Computer Technologies(CECT’2012)IMPROVING END-TO-END ROUTING PERFORMANCE OF SIMULATED ANNEALING IN SENSOR NETWORKS (USING LEACH-M PROTOCOL)Revti Kaura, Sachin MajithiaNationalVol.1pp.278-285May, 2012
32Advanced Materials and Their Applications In The Era Of Globalization.(AMAEG’2012)Optical fibreManisha SharmaNational Conferenceoctober,2012
33Challenges In Emerging Computer Technologies (CECT’2012)Underwater Wireless Communication For Underwater Wireless Sensor NetworksManisha SharmaNational Conferenceaugust,2012
34Structuring Innovation Through Quality (SITQ’2013)A Survey: fundamentals Of Digital Image SteganographyManisha SharmaNational ConferenceSeptember,2012