S. No. |
Name of Author |
Title of Paper |
Name of Journal |
1 |
A Gopi et al |
Exploring magnetic fluid sensor using dual circular core elliptical cladding photonic crystal fiber |
Results in Physics |
2 |
A. Sampath Kumar et al |
Modified duo binary
Modulation of optical signals generated by silicon-based microring resonator |
Microwave and Optical Technology Letters |
3 |
A. Sampath Kumar et al |
Numerical analysis of circularly polarized modes in coreless photonic crystal fiber |
Results in Physics |
4 |
A. Sampath Kumar et al |
Numerical investigation of temperature dependent water infiltrated D-shaped dual core photonic crystal fiber (D-DC-PCF) for sensing applications |
Results in Physics |
5 |
Sandhya Katiyar et al |
Adaptive Boost Network Lifetime Algorithm for WSN |
International Journal of Computer Science Engineering Techniques |
6 |
Sandhya Katiyar et al |
Extraction of Syntactically Similar Sentences from Huge Corpus for Language Research |
SSRG International Journal of Computer Science and Engineering |
7 |
Sandhya Katiyar et al |
Analysis of learning techniques: Bird Species Classification |
International Journal of Computer Application |
8 |
Sandhya Katiyar et al |
Secure data transmission by MANET |
International Journal of Computer Application |
9 |
Sandhya Katiyar et al |
Secured Audio Encryption using AES Algorithm |
International Journal of Computer Application |
S. No. |
Name of Author |
Title of Paper |
Name of Journal |
1 |
Javed Miya et al |
A Two Factor Authentation System for Touchscreen Mobile Devices Using Static Keystroke Dynamics and Passward |
International Research Journal of Engineering and Technology |
2 |
Jasmine Bedi Khurana et al |
Restricting the Illegal Transaction in Crypto currencies |
International Journal of Computer Applications |
3 |
Jasmine Bedi Khurana et al |
An efficient online examination system using speech recognition |
International Research Journal of Engineering and Technology |
4 |
Swasti Singhal et al |
Intrusion Detection System Using SNORT |
International Research Journal of Engineering and Technology |
5 |
Sanjay Kumar et al |
VANET: A Future Technology |
International Journal of Scientific and Research Publications |
6 |
Sandhya Katiyar et al |
Virtual Heritage: Combining Cultural Heritage and Virtual Reality |
International Journal of Computer Applications |
7 |
Sandhya Katiyar et al |
Adaptive Data Size Compressed Algorithm to Reduce Energy and Provide Route Security using AOMDV Protocol in WSN |
International Journal of Computer Applications |
8 |
Jasmine Bedi Khurana et al |
improvising the global naming system using block chains |
International Journal of Advanced Research in Computer Science and Software Engineering |
9 |
Jasmine Bedi Khurana et al |
The Evolution of improvised cryptocurrency- UVCoin |
International Journal of Computer Applications |
S. No. |
Name of Author |
Title of Paper |
Name of Journal |
1 |
Sandhya Katiyar et al |
“Network Security Described Technology Based on RSA and Biometrics for Authenticity in WSN” |
International Journal of Advanced Research in Computer Science and Software Engineering |
2 |
Sandhya Katiyar et al |
“Exploration of Distance Measurement and Find the Minimal Path Algorithm for Every Node in WSNs Localization” |
International Journal of Innovative Research in Computer and Communication Engineering |
3 |
Sandhya Katiyar et al |
“Performance Enhancement with Multipath Routing in term of Bandwidth and Security on MANETs” |
International Journal of Computer Applications |
4 |
Sandhya Katiyar et al |
“Signature Recognition and Verification System via Neural Networking.” |
International Journal of Scientific and Engineering Research (IJSER) |
5 |
Sandhya Katiyar et al |
Detection and Prevention of Wormhole Attack in Adhoc Network Using AODV Protocol |
International Journal of Computer Science & Mobile Computing |
6 |
Sandhya Katiyar et al |
Image Processing using Steganography |
International Journal of Engineering Science &Computing |
7 |
Swasti Singhal et al |
“Ontology Based Web Crawler for Specific Domain” |
International journal in IJCST vol. 7 |
8 |
Swasti Singhal et al |
“User Authentication Scheme using Session Passwords Based on Color and
Numerical Matrix” |
International Journal for Scientific Research & Development |
9 |
Sanjay Kumar |
International Journal of Computer Applications |
A Journey towards Workflow Scheduling of Cloud Computing |
10 |
Javed Miya et al |
ROI Based Medical Image Compression with Application to MRI Images |
OUREDU Journal |
11 |
Javed Miya et al |
Observations and Performance Evaluation of various Techniques on Medical Images |
International Journal of Applied Engineering Research |
S. No. |
Name of Author |
Title of Paper |
Name of Conference |
1 |
Dharm Raj et al |
Digital Watermarking using Spatial Domain and Triple DES |
IEEE International Conference on “Computing for Sustainable Global Development” |
2 |
Sandhya Katiyar et al |
Building Engineering e-Learning grid to foster Engineering Aptitude and Engineering Attitude by Leveraging ICT |
IEEE International Conference in Green Computing and Inter of Things 2015 |
3 |
Sandhya Katiyar et al |
Comparative Performance Analysis of MANET Routing Protocols in Military Operation Using NS2 |
IEEE International Conference in Green Computing and Inter of Things 2015 |
4 |
Sanjay Kumar et al |
5G Resolution Technology |
IEEE International Conference in Green Computing and Inter of Things 2015 |
5 |
Gagan Gupta et al |
5G Resolution Technology |
IEEE International Conference in Green Computing and Inter of Things 2015 |