S.No. |
Title |
Year |
Journal |
1 |
Design of an improved data deduplication technique for cloud storage |
2019 |
International Journal of Computer Sciences and Engineering |
2 |
Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering |
2019 |
International Journal of Computer Sciences and Engineering |
3 |
Ensemble Classification Algorithms for Breast Cancer Prognosis |
2019 |
International Journal of Innovative Technology and Exploring Engineering |
4 |
Coordinate Based Link Stability in MANET Using NS2 |
2019 |
International Journal on Future Revolution in Computer Science & Communication Engineering |
5 |
A Novel Approach towards Link Stability in MANET’s Using Coordinate Position |
2019 |
International Journal on Recent and Innovation Trends in Computing and Communication |
6 |
Counter-Terrorism and Crime Detection Using Hybrid Approach of Data Mining, NLP and GEO-Spatial Social Media Analytics |
2020 |
International Journal of Computer Sciences and Engineering |
7 |
GEO-SPATIAL SOCIAL MEDIA ANALYTICS FOR COUNTER-TERRORISM |
2020 |
Advances in Mathematics: Scientific Journal (Scopus Indexed) |
8 |
An Enhanced Proposed Hybrid DTW and HMM approach for Speech Recognition System |
2016 |
International Journal of Control Theory and Applications (Scopus Indexed Journal, UGC approved |
9 |
Analysis of Multi Cloud Storage applications for resource constrained mobile devices |
2016 |
Elsevier Journal Perspective in Sciences |
10 |
Ensuring QoS in Wireless Body Area Network: A Review |
2017 |
Indian Journal of Science and Technology (Scopus Indexed Journal, UGC Approved |
11 |
Comparison of Multi Cloud Storage Systems for Mobile Devices |
2016 |
International Journal of Control Theory and Applications (Scopus Indexed Journal, UGC Approved |
12 |
Design and implementation of an efficient multi cloud storage approach for resource constrained mobile devices |
2018 |
Cluster Computing (Springer, SCI Journal, I.F. 2.04, , UGC Approved) |
13 |
Design of an Efficient Memory Management Model for Mobile Devices using C-RAM |
2018 |
International Journal of Computer Sciences and Engineering (UGC Approved) |
14 |
MWC: An Efficient and Secure Multi Cloud Storage Approach to Leverage Augmentation of Multi Cloud Storage Services on Mobile Devices using Fog Computing |
2018 |
Journal of Super Computing (Springer, SCI Journal, I.F. 1.326, UGC Approved) |
15 |
Multi Cloud Storage Systems for Mobile Devices: Study and Analysis |
2018 |
International Journal of Mobile Learning and Organisation (Scopus Indexed, Inder Science Journal) |
16 |
A Novel Approach for Multi Cloud Storage for Mobile Devices: Study and Analysis |
2018 |
International Journal of Information Technology and Web Engineering (Scopus Indexed) |
17 |
An Efficient and Secure Privacy Preserving Multi Cloud Storage Framework for Mobile Devices |
2019 |
International Journal of Computers and Applications (Taylor and Francis, EI Compendex, Scopus) |
18 |
Design and implementation of enhanced MQS algorithm |
8-10 Oct. 2015 |
International Conference on Green Computing and Internet of Things (ICGCIoT), 2015 |
19 |
Current Challenges and security issues in VANET |
2015 |
International Journal of Science Research and Technology, Vol. 1, Issue 1, pp. 71-74, September 2015 |
20 |
Mobile Sink based NLEACH protocol by using Ant Colony Optimization |
2015 |
International Journal for Science and Technology, Vol 1, Issue 1. |
21 |
A study of various clustering protocols |
2015 |
International conference on Information Technology and Computer Science, July 11-12, 2015 , ISBN 9788193137307 pp 30-35 |
22 |
A Review on Data Aggregation techniques for wireless sensor networks |
2015 |
International conference on Information Technology and Computer Science, July 11-12, 2015 , ISBN 9788193137307 pp 15-20 |
23 |
Non-Frequent pattern mining using FP-weighted tree approach |
2015 |
International conference on Information Technology and Computer Science, July 11-12, 2015 , ISBN 9788193137307 pp 9-14 |
24 |
Review of Decision tree data mining algorithms : ID 3 and C4.5 |
2015 |
International conference on Information Technology and Computer Science, July 11-12, 2015 , ISBN 9788193137307 pp 5-8 |
25 |
Enhanced Stable election protocol using clustering and comparison of various clustering proto-cols in WSN |
2015 |
International conference on Networking and computer application", July 15-16 2015, ISBN 9788193137314 pp 13-17 |
26 |
Comparative Analysis Of Non-Frequent Pattern Mining Approach |
2015 |
International journal of technology enhancements and emerging engineering research, vol 3, issue 06 pp 66 - 69 ISSN 2347-4289 May- June 2015 |
27 |
Comparative Study of Various Clustering Protocols Using WSN |
2015 |
Journal of Basic and Applied Engineering Research (JBAER), Volume 2, Number 5; January-March, 2015 |
28 |
Towards security against Byzantine and Resource consumption attacks on MANET using co-operative Bait Detection Scheme |
2015 |
IEEE International Conference on Electrical, Electronics, Signals, Communication and Optimization(EESCO) - 2015 |
29 |
Rheer: relay Node Based Heer Protocol For Heterogeneous Wsns |
2015 |
International Conference on Futuristic Trends in Computational Analysis and Knowledge Management Technical Co-Sponsor IEEE UP Section |
30 |
Review paper on various clustering protocols used in wireless sensor |
2015 |
IEEE International Conference on Electrical, Electronics, Signals, Communication and Optimization(EESCO) - 2015 |
31 |
An overview of Diverse Protocols and probing of malicious node using AODV in VANET Envi-ronment |
2016 |
3rd International Conference on Computing for sustainable Global Development”, 16-18th March 2016 at Bharati Vidyapeeth’s Institute of Computer Applications and Management(BVICAM), New Delhi |
32 |
Valuable aspects of cloud storage |
2016 |
14th International Conference on Cloud Computing Computer Science and Advances in Information Technology- ICCCCIT 2016 at Lucknow |
33 |
Current trends in cloud storage for resource constrained mobile devices |
2016 |
IEEE International Conference on Wireless communication, Signal processing and Networking (WiSPNET 2016) on 23-25th March, 2016 |
34 |
Analysis of Multi Cloud Storage applications for resource constrained mobile devices |
2016 |
Elsevier Journal Prospective in Sciences |
35 |
Design Of Software Fault Prediction Model Using BR Technique |
3-5 December 2014 |
International Conference on Information and Communication Technologies (Under TEQIP Phase-II) December 3-5 2014,Kochi. The proceedings of ICICT 2014 is published in Elsevier Procedia Computer Science. |
36 |
Adaptive Approach to find a Stable Path between Nodes in MANET |
Aug 2014 |
International Journal of Current Engineering and Technology E-ISSN 2277 – 4106, P-ISSN 2347 - 5161 ©2014 INPRESSCO® , All Rights Reserved Available at http://inpressco.com/category/ijcet |
37 |
COMPARISON OF VARIOUS APPROACHES OF SOFTWARE FAULT PREDICTION: A REVIEW |
July 2014 |
International Journal of Advanced Technology & Engineering Research (IJATER) ISSN No: 2250-3536 Volume 4, Issue 4, July 2014 pp 13 - 16 |
38 |
Challenges and Design Issues in Search Engine and Web Crawler |
June 2014 |
International Journal of Computational Engineering Research (IJCER) ISSN (e): 2250 – 3005 || Vol, 04 || Issue, 6 pp 42-44 |
39 |
Comparative Analysis of Enhanced APRIROI Algorithm with Existing Algorithm |
May 2014 |
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 5 pp 1209– 1213 |
40 |
Design and Implementation of Efficient APRIORI Algorithm |
May 2014 |
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 5 pp 1205– 1208 |
41 |
Comparative Analysis of Load Balancing Algorithms in Cloud Computing |
March 2014 |
IJATER, Volume 4, Issue 2 |
42 |
Review of Association Rule Mining |
March 2014 |
International Journal of Advanced Technology & Engineering Research (IJATER) Volume 4, Issue 2, March 2014 ISSN No: 2250-3536 pp 14-17 |
43 |
A Survey of Duplicate and near Duplicate techniques |
February-2014 |
International Journal of Scientific & Engineering Research, Volume 5, Issue 2 ISSN 2229-5518 pp 1531-1534 |
44 |
Comparative analysis of proposed algorithm with existing load balancing scheduling algorithms in Cloud Computing |
January – February 2014 |
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 3, Issue 1 ISSN 2278-6856 pp 197-200 |
45 |
Design and implementation of an Efficient Scheduling algorithm for load balancing in Cloud Computing |
January – February 2014 |
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 1, ISSN 2278-6856 |
46 |
Comparison of color road extraction using vectorization method with the existing methods |
December 2013 |
International Journal of Advance Research in Computer Science and Management Studies Volume 1, Issue 7, December 2013 ISSN: 2321-7782 (Online) pp 129-135 |
47 |
An Approach to Extract Road from Colour Image using Vectorization |
November 2013 |
International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 11 pp 1292-1298 |
48 |
Latest Trends towards 3G Technologies - WiFi vs WiMax |
December 2013 |
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE COMPUTING ISSN: 2320-088X Volume 2, Issue 12, December 2013 |
49 |
A SURVEY ON ROAD EXTRACTION FROM COLOR IMAGE USING VECTORIZATION |
Oct 2013 |
International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Vol 2 issue 9 pp 453-458 |
50 |
Book on Simplified Approach to Visual Programming using VB.NET |
July 2013 |
Eagle's Publication |
51 |
Book on Unique Approach to Computer Programming and Applications |
July 2013 |
Eagle's Publication |
52 |
Comparative Analysis of Cryptographic Algorithms |
July-Sep 2013 |
International Journal of Advanced Engineering Technologies ISSN 0976-3945 Vol 4 Issue 3 |
53 |
Need and Role of Underwater Acoustic Sensor Networks |
July 2013 |
International Journal of Electronics Communication and Computer Engineering Volume 4 Issue 4 |
54 |
A NOVEL APPROACH FOR IMAGE DENOISING USING WAVELETS |
Volume 2, Issue 2 March – April 2013 |
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ISSN 2278-6856 Volume 2, having impact factor 2.524 |
55 |
A Proposed Non Linear Block Based Approach for Image De-Noising Using Wavelet |
M a y 1 5 , 2 0 1 3 |
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, Vol 5, No 3 Council for Innovative Research ISSN 22773061 |
56 |
Enhancing Cloud Storage Security and Privacy |
April 2013 |
IJAIST having Impact factor 0.135 |
57 |
A nonlinear approach for image denoising using different wavelet thersholding techniques |
April - June 2012 E-ISSN2249-8974 |
International Journal of Advance Engg Research and Studies |
58 |
Road Extraction of Setallite Images using Vestorization method based on triangulation |
April- June 2012 |
International Conference on Recent Trends in Computer Science ICSE 2012 |
59 |
Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing |
January 2013 |
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 having impact factor 0.242 |
60 |
Designing Data Storage Security and Privacy in Cloud Computing |
Dec 2012 |
International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682 Vol.8, No.8, December 2012 having impact factor 0.135 |
61 |
Source Code Analyzer and Translator |
2008 |
2nd National Conference on Challenges and Opportunities in IT(www.rimtengg.com/coit2008/proceedings/SW11.pdf) |
62 |
Failures in Cloud Computing |
May-June 2012 |
International Journal of Engineering Research and Applications |
63 |
A Survey on image Denoising using Thershold Discrete Wavelets |
April-June 2012 |
International Journal of Computer Science & Technology |
64 |
Exposing Cloud Computing Failures |
April-June 2012 |
International Journal of Advanced Engineering Research & Studies |
65 |
Road Extraction From High Resolution Satellite Images By 191 Morphological Direction Filtering and length Filtering |
16-17 May 2012 |
National Conference on Challenges in Emerging Computer Technologies |
66 |
Security issues in Cloud Computing |
2-3 March 2012 |
International Conference on Emerging Dimensions in IT & its applications in industry |
67 |
Vulnerabilities in Cloud Computing |
7-8 April 2012 |
National Conference on Emerging Principles and Practices in Computers and Communication Media |
68 |
Analysis of Privacy Preserving Cloud Storage Frameworks in Cloud Computing |
2011 |
IJCSIT |
69 |
System Simulation: Simplest route to application |
2003 |
National Conference held at BBSBEC, Fatehgarh Sahib |
70 |
Security in Adhoc Networks |
2008 |
National Conference on “ Recent trends in Computer Science & IT” at BCET gurdaspur |
71 |
Bluetooth Based Smart sensor Networks |
2008 |
National Conference on “ Recent trends in Computer Science & IT” at BCET gurdaspur |
72 |
Wireless Mesh Networks |
2008 |
National Conference on “ Recent trends in Computer Science & IT” at BCET gurdaspur |