Faculty Publications

Faculty Publications

 Dr. Sudesh Kumar

Sr. No.

Description

1

Location Based System Using Google Cloud Messaging” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

2

Energy Efficiency Model for Cloud Datacenters” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

3

Modelling and Performance Evaluation of Dynamic Routing Over MANET using NS-2.35 “ ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

4

Enhancing System Performance Utilizing Cache Architecture” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

5

Analysis of Security Issues and their Solutions In Transmitting Images Over Wireless Networks” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

6

Efficient K-Mean Clustering Algorithm for Large Datasets using Data Mining Standard Score Normalization” Published in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10 Oct. 2014 ISSN: 2321-8169, 3161 – 3166. [IMPACT FACTOR(SJIF)=5.098]

7

Comparison of Energy Efficient Clustering Protocols in Wireless Sensor Networks - A Review” Published in   International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10  Oct. 2014 ISSN: 2321-8169 3121 – 3124. [IMPACT FACTOR(SJIF)=5.098]

8

A study of Black Box Testing to generate the test cases and Statement coverage criteria to reduce the test cases” Published in  International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169, 2642 – 2648. [IMPACT FACTOR(SJIF)=5.098]

9

K-Mean Evaluation in Weka Tool and Modifying It using Standard Score Method” Published in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169  2704 – 2706. [IMPACT FACTOR(SJIF)=5.098]

10

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing Protocols” Published in IJITKM Volume 7 • Number 2 Jan– June 2014 pp. 180-184 (ISSN 0973-4414). .[IMPACT FACTOR=1.05 ]

11

Outlier Detection Techniques for Wireless Sensor Networks using     Clustering and Support Vector MachinesPublished in (IJITKM) Volume 7 •  Number 1 • December 2013 pp. 87-91 (ISSN 0973-4414).[IMPACT FACTOR=1.05]

12

Study of Different Clustering Approaches for Outlier Detection” Published in International Journal of Computer Science & Communication (IJCSC)IVolume 4 • Number 2 September 2013 pp.51-54 ISSN 0973-7391. .[IMPACT FACTOR=1.0]

13

CBR Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2”  International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013. [IMPACT FACTOR=1.0]

14

Combinatorial Auction for Grid Computing” published in International Journal of  Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-3, July 2013. [IMPACT FACTOR=1.0]

15

Proposed Model in Grid Computing” published in   International Journal for Management Science and Technology (IJMST) ISSN: 2321-0362 (Print) ISSN: 2320-8848 (Online) Vol. 1; Issue 5 July  2013.

16

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniquespublished in   International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE)   Volume 3, Issue 6, June 2013 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

17

A Performance Analysis of DES and RSA Cryptography” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 3, May – June 2013       ISSN 2278-6856. [IMPACT FACTOR=2.524]

18

TCP Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2” published in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-2, July 2013. [IMPACT FACTOR=1.0]

19

Measuring the Effectiveness of Test Cases in to Java Program by Mutation Testing Tool” published in the(IJCTA) Int.J.Computer Technology & Applications,Vol 3 (6), 1903-1907(Nov-Dec 12)ISSN :2229-6093. [IMPACT FACTOR=2.015]

20

Distinction between secret key and public Key cryptography with existing glitches” published in the Indian Journal Education Information Management, Vol. 1, No. 6 (Sep 2012) ISSN 2277 – 5374. [IMPACT FACTOR=0.355

21

Optimization of Decision Rules in Fuzzy Classification” published in the International Journal of Computer Applications (0975 – 8887) Volume 51– No.3, August 2012. [IMPACT FACTOR=0.821]

22

Comparative Analysis between DES and RSA Algorithm’s” published in the International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

23

Implementation of Intrusion Detection System based on DSR Algorithm in WLAN” published in IJMRS’s International Journal of Engineering Sciences, Vol. 01,Issue 02, June 2012, ISSN: 2277-9698.

24

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Model” published in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

Mr. Durgesh Kumar Srivastava

Sr. No.

Description

1

Analysis of different Hybrid methods for Intrusion Detection System ”, Published in International Journal of Computer Sciences and Engineering, Vol. 7, Issue 5, (UGC Approved Sr. No. 63193), ISSN No. 23472693, May 2019.

2

An Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)”, Published in Journal of Advancements in Robotics, Volume 6, Issue 1, (UGC Approved Sr. No. 47078), ISSN No. 24551872 May, 2019.

3

Performance Evaluation Of Entropy Based Graph Network Intrusion Detection System (E-Ids)”, Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 02-Special Issue, (UGC Approved Sr. No. 26301), ISSN No. 1943-023X, April 2019 (Elsevier Scopus).

4

Mining of Data through various Soft Computing Techniques”, in International Conference on  Advances in Basic Sciences (ICABS 2019), Feb 7-9, 2019 at GDC Memorial College, Bahal, Bhiwani, Haryana.

5

Auction System for Automated E-Commerce: JADE based Multi-agent Application”, Published in International Journal of Engineering & Computer Science (IJECS), Volume. 5 - Issue. 09, Sep, 2016.

6

Evaluating Negotiation Protocols and Negotiation Strategies for Automated E-Commerce” Published in International Journal of Engineering Research & Technology, Volume. 5 - Issue. 07, July, 2016

7

 “Threshold Analysis and Comparison of Sequential and Parallel Divide and Conquer Sorting Algorithms”, Published in International Journal of Computer Applications (0975–8887), Volume 145–No.10, July 2016

8

Efficient Rule Set Generation using K-Map & Rough Set Theory (RST)”, Published in International Journal of Engineering & Technology Innovations (IJETI), ISSN (Online): 2348-0866, Vol. 2 Issue 3, May 2015.

9

A Novel approach for CPU utilization on a multicore paradigm using parallel quick sort”, 3rd IEEE International Conference on Computational Intelligence and Communication Technology 2017.

10

Software Testing In Cloud Computing Environment” Published in International Journal Of Advanced Research in Computer Science And Software Engineering (IJARCSSE-14) , Print: ISSN: 2277 128X , Volume 4, Issue 6, June 2014.

11

Test Case Using Boundary Value Analysis And Eqivalence Class”, International Journal Of Engineering Research & Management Technology (IJERMT), Volume 1, Issue 3, Page No. 125-130.

12

“Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

13

“Data Classification: A ROUGH-SVM Approach”, Contemporary Engineering Sciences, Vol. 3, 2010, no. 2, 77 – 86.

14

“Data Classification using Support Vector Machine (SVM)”, JATIT, Volume 12, Number 1, Feb. 2010, Page No. 1-7.

15

Testing Technology in Industry: A Review”, IJITKM, Volume 2, Number 1, June 2009, Page No. 145-148.

16

Open Source Software (OSS): A new Venue for Civil Engineering Professionals”, National Conference on Recent Trends & Innovation in Civil Engineering (RTICE-2013), Nov 15-16, 2013 (ISBN: 978-81-925840-2-7) in BRCM CET, Bahal, Bhiwani, Haryana.

17

Color based Image Retrieval using Supervised Learning”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26,2013 in BRCM CET, Bahal, Bhiwani, Haryana.

18

“Rules Reduction using Decision Matrix”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26, 2013 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr.Praveen Kanth

Sr. No.

Description

1

A RESEARCH PAPER OF DNA CRYPTOGRAPHY SECURITY ENHANCEMENT”  published in International Journal Of Computer Application ,Volume 5-NO July-August 2015. No.6-October 2015,IJCA-2250-1797.

 2

Enhancement Of Security In DNA Based Cryptography ” published in International Organization Of Scientific Research (IOSR) In Journal Of Computer Engineering, July-August 2015.

 3

A Review Article on Binary Picture Quality and Security using  visual Cryptography”  published in Global  Journal For Current Engineering Research GJCER, Vol 4 (2), 2015, 170- 173 ISSN: 2265-2765.

4

Secure Data Transmission using DNA Encryption” published in International Journal of Advanced Research in Computer Science (IJARCS) ISSN No. 0976-5697 Volume 5, No. 6 ,July-August 2014.

5

“DNA Encryption” published in International Journal of Computer Science and Engineering (IJCSE) ISSN:2278-9960 VOLUME 3, ISSUE 3, May 2014.

6

“Web Crawling Using Location Aware Technique” published in International Journal for  Scientific Research & Development (IJSRD) , VOLUME 1, ISSUE 5, June. 2013.

7

“Mobile Systems and Web Crawler :A Review” , published in IFRSA International Journal of Data Warehousing & Mining  (IIJDWM) , VOLUME 3, ISSUE 2, MAY. 2013.

8

Automation Hierarchical in Business Information and Production” published in  Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

9

"Data Security Using Cryptography Technique in Network" published in Industrial Electronics, Drives & Embedded System (IEDES),2009  in BRCM CET, Bahal, Bhiwani, Haryana. 

10

“Analysis of Software Metrics Used in Software Testing” published in Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr. Sunil Maakar

Sr. No.

Description

1

Sunil Kr Maakar, Yudhvir Singh, Rajeshwar Singh. “Traffic Pattern-Based Performance Comparison of OLSR, DSR and ZRP Routing Protocol in VANET using NS2”. Journal of Mobile Computing, Communications & Mobile Networks, ISSN: 2349-901X (Online) Volume 5, Issue 2, 2018, 25-32.

2

Sunil Kr Maakar, Yudhvir Singh, Rajeshwar Singh. “Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model”, International Journal of Computer Applications (IJCA) 0975-8887, Vol 114 - Number 14, March 2015, 26-31.(Impact Factor - 0.715)

3

Sunil Kr Maakar, Yudhvir Singh, Rajeshwar Singh. “Performance Investigation of OLSR and AODV Routing Protocols for 3D FANET Environment using NS3”. Journal of Communication Engineering & Systems. (UGC Approved, Sr. No. 46690), ISSN No.2321-5151, 2018; 8(2):1–10p.

4

Sunil Kr Maakar, Yudhvir Singh, Rajeshwar Singh. “Considerations and Open Issues in Flying Ad Hoc Network”, International Journal of Scientific Engineering and Research (IJSER), (UGC Approved, Sr. No. 48096) 2017 Vol. 5, Issue 7, ISSN No (Online): 2347-3878, Pages 397-402.

5

DISTRIBUTED FAULT DETECTION MECHANISM IN WIRELESS SENSOR NETWORKS,International Journal of Engineering Applied Sciences and Technology, 2016 Vol. 1, Issue 8, ISSN No. 2455-2143, Pages 240-246.

6

Efficiency Estimation of Soft Handover in 3G Network using OPNET, International Journal of Forensic Computer Science, 10(1), pp. 37-45, 2016.

7

Comparison of Newly Designed Routing Protocol with Existing QOS based Robust Multipath Routing (QRMR) Protocol for MANET” International Journal of Forensic Computer Science, 10(1), pp. 30-36, 2016.

8

A Brief Survey of Mobility Model for FANET”, National Conference on Innovative Trends in Computer Science Engineering (ITCSE-2015), BRCM CET Bahal (Haryana), April 2015.

9

Routing Protocols in FANET: A survey”, National Conference on Innovative Trends in Computer Science Engineering (ITCSE-2015), BRCM CET Bahal (Haryana), April 2015. (Also be published in International Journal of Recent Research Aspects IJRRA ISSN: 2349-7688 Special Issue: Proceeding of NCITCSE 2015.)

10

Concept of Flying Ad-hoc Network: A Survey”, National Conference on Innovative Trends in Computer Science Engineering (ITCSE-2015), BRCM CET Bahal (Haryana), April 2015.

11

Routing Protocols in VANET: A Survey”, National Conference on Innovative Trends in Computer Science Engineering (ITCSE-2015), BRCM CET Bahal (Haryana), April 2015.

12

Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model”, International Journal of Computer Applications (IJCA) 0975-8887, Vol 114 - Number 14, March 2015, 26-31.(Impact Factor - 0.715)

13

Secured and Efficient Ant Based Zone Routing Protocol”, International Journal of wireless personal communications (Springer), September 2014. (Communicated)

14

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing Protocols”, International Journal of IT & Knowledge Management (ISSN: 0973-4414) IJITKM, Volume 7-No. 2, Jan– June 2014, pp. 180-184.

15

A Survey on Different Hybrid Routing Protocols of MANET”, International Journal of Computer Science and Information Technologies (IJCSIT) ISSN: 0975-9646, Vol. 5 (4), 5512-5516, 2014, 5512-5516.

16

A Performance Analysis of DES and RSA Cryptography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2278-6856, Vol 2, Issue 3, May-June 2013, 418-423.

17

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 6, June 2013, 464-471.

18

Comparative Analysis between DES and RSA Algorithm’s”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012, 386-391.

19

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Model” International Journal of Computer Applications (IJCA) 0975-8887, Vol 43 - Number 7, 2012, 13-18.

20

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4), 2011, 1606-1611.

21

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Manhattan Grid Mobility Model”, 3rd IEEE International Conference on Computer Research and Development (ICCRD 2011),March 2011, Shanghai, China.(Accepted)

22

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, 2nd IEEE International Conference on Computer & Communication Technology (ICCCT-2011), MNNIT Allahabad, India, Sep. 2010.(Accepted)

23

Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model”, International Journal of Computer Science Issues (IJCSI) Volume 7, Issue 3, May 2010.

24

Performance Analysis of MANET Routing Protocols using TCP Traffic for Freeway Mobility Model”, International Conference on Wireless Networks ICWN’10, Las Vegas, Nevada, USA, July 2010.

 

Dr. Gundeep Tanwar

Sr. No.

Description

1

Optimization of Apriori Algorithm for High Performance” , Global Journal for Current Engineering Research  , Vol 3 Issue 2 , Sep 2014 , ISSN : 2265 – 2275 , Impact Factor : 1.683

2

A Comparative study of Traditional and Component Software Engineering Approach using models” International Journal on Recent and Innovation Trends in Computing and Communication , Vol 2 Issue 9 ,Sep 2014 ,  ISSN :2321 -8169 , Impact Factor : 5.098

3

A survey on optimization of APRIORI algorithm for high performance” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 ,  Jun 2014 , ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

4

A Review on optimizing COCOTS model in Component based Software Engineering approach” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 , Jun 2014 ,  ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

5

Research Trend in the Direction of Fourth Generation Wireless Mobile Communications : Review” International Journal of Artificial Intelligence and Mechatronics , Vol 2 Issue 6 May- June 2014 , ISSN -2320-5121 .

6

Exemplifying Practical Issues in Resource Management in Cloud Computing” International Journal of  Engineering Research and Technology , Vol 3 Issue 3, March 2014 , ISSN 2278-0181 , Impact Factor : 1.76 , www.ijert.org

7

BPEL based scheduling in multi agent system for business applications” International journal of Information Technology and Knowledge management , Vol 7 , Number 1 , Dec 2013. ISSN-0973-4414 , Impact factor : 1.05 , www.csjournals.com

8

Designing the automatic web tools for small business scale with Case-based reasoning” International Journal of Engineering and Management Research, Vol.-3, Issue-4, August 2013 ISSN No.: 2250-0758 , www.ijemr.net

9

Assignment of Keys in Wireless sensor network based on Activeness of Sensor Node” International Research Journal of Management Science and Technology , www.irjmst.com , ISSN 2250-1959 , Vol 4 Issue 2 , July 2013 , Impact factor : 0.61

10

Tackling Rationing and shortage gaming reason of bullwhip effect with fuzzy logic approach” International Journal of Engineering and Sciences, www.researchinventy.com, ISSN : 2278-4721 ,Vol. 2, Issue 10 , April 2013

11

Managing Order Batching Issue of Supply Chain Management With Multi-Agent System” International Journal of Computational Engineering Research (IJCER) ,www.ijceronline.com, ISSN : 2250-3005 ,Volume  3 Issue 4 , April 2013 .

12

Cloud Computing : Security Issues and Challenges” Global Research Analysis , ISSN : 2277-8160 , Impact Factor : 0.2714 , Vol 2 Issue 3 March 2013 .

13

“Designing CBR-BDI Agent for implementation of Supply Chain system” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622  , Vol. 3, Issue 1, January -February 2013, 1288-1292

14

“Secure Routing Techniques in Mobile Adhoc Network” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 4 No 7 , Nov 2012 .

15

“Intrusion Detection System” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 3 No 6 , Aug 2012 .

16

“Agent oriented programming in trading system automation”, International Journal of Research in IT, Management and Engineering, Vol 2, Issue 8 August 2012 , ISSN:2249-1619

17

“Congestion Control Framework in Ad-Hoc Wireless using Neural Networks in QoS”, International Journal of Research in Computer Engineering & Electronics, Vol 1, No 1 (2012)

Mr. Amit Nain

Sr. No.

Description

1

Routing Protocols in FANET : Survey” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

2

Improved Result by combining two Clustering Techniques” published in International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Volume: 4, Number: 2, Issue: Feb 2014, ISSN: 2277-128X, Impact Factor: 2.08. 

3

Implementation of Modified TIMIP for overlay Networks with Enhanced Handover and QoS” published in the International Journal of Computer Applications Volume 4, Issue 8, and August 2014

4

Comparison of C-Means Algorithm, Clustering & Fuzzy Merging Algorithm” published in International Journal for Scientific Research and Development (IJSRD), Volume: 1, Issue: 5 in July 2013, ISSN [Online]: 2321-0613, Impact Factor: 1.26.

5

Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

6

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Model” published in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

 

 

Mr. Harish Bedi

Sr. No.

Description

1

A Novel Algorithm Based Design Scheme for Embedding Secret Message onto a Steganographic Channel" in International Journal of Electronics Engineering ISSN 0973-7383 pp 161:165(Volume-1,Issue-2,Jan 2009).

2

 “A New Methodology for sensing  Black Hole Nodes in Adhoc network”  in international journal of  computer science and it ISSN 2250-2734 PP 20:26(Volume -3, Issue-1, April 2012).

3

“Energy Efficient Homogeneous vs  Hetrogeneous LEACH” in international journal of Innovative Technology and Exploring Engineering. ISSN 2278-3075 PP 280:283(Volume-2,Issue-5,April 2013).

4

”Wireless Sensor Network LEACH Potocol:A Survey” in International Journal of Emerging Research in Management & Technology ISSN 2278-9359 PP 50:55 (Volume-2,Issue-3,March 2013).

5

“Design Issue for routing protocols in WSNs Based on Classification” in international journal of Application or Innovative in Engineering and Management ISSN 2319-4847 PP 312:320 (Volume-2, Issue-3,March 2013).

6

“Clustering VS Multi-clustering” in international journal of Advanced Engineering Sciences and Technologies. ISSN 2230-7818 PP 049-055 (Volume-12, Issue- 2,2013).

7

“Review on attacks in MANET”, International Interdisciplinary Conference on Contemporary Issues in Commerce, Management, Computer Applications and Social Sciences, ISSN 2277-128X ,PP 794:798(Volume-4, Issue-7,July 2014).

8

“Modified AODV to detect and recover Wormhole Attack” ,IJECS (International Journal of Engineering and Computer Science ) ISSN 2319-7242 PP 8498:8501 (Volume -3, Issue-10, October 2014).

9

“Bluetooth, Wi-Fi and Wi-Max A Review Study” IJARCSSE( International Journal of Advanced Research in Computer Science and Software Engineering ), ISSN: 2277 128X ( Volume4, Issue 7, July 2014).

10

 “Study of Packet Delivery Ratio, Collision Detection Ratio,End to End delay during mobility in various wireless techniques using NS2” IJSR( International Journal of  Science and Research), ISSN: 2319-7064 (Volume3, Issue 9, September 2014).

Mr.Basant Sah

Sr. No.

Description

1

“Performance Metrics in Ad-hoc Network “ entitled  publish in International Journal of Latest Trends in Engineering and Technology  (IJLTET)  ISSN: 2278-621X.

2

“Energy Efficient Routing Protocols in Wireless Sensor Network” entitled publish in    International Journal of Engineering, Science and Metallurgy” JESM Vol.2 , No.3(2012)  ISSN 2249 – 7366.

3

 

Enhancing the Data Hiding  Capacity of Kekre Algorithm Using the

Lempel- Ziv– Welch Technique ” entitled publish in International Journal

advanced Research in Computer Science and Software Engineering  Volume  3 ,

Issue 7,July 2013 ISSN: 2277 128X.

4

Data Hiding Scheme in Digital Image using Steganographic Techniques ” entitled publish in International Journal of Graphics & Image Processing |Vol 3] issue 2|May 2013 .

5

Dynamic CA in Mobile AD-HOC  Network” , entitled  paper present in national conference at BRCM College of Engg. And Tech , Bahal,(Haryana). IEDES -2009.

6

Security in Mobile Ad Hoc Network Using Cryptography Technique “entitled paper present in national conference at BRCM College of Engg. & Tech , Bahal,(Haryana). IEDES -2009.

7


Channeling of 2.4 g Evasions in Germanium Crystal”, entitled paper present in national conference at  BRCM College of Engg. And Tech , Bahal,(Haryana).RDME-2010

8

Java Byte Code Verification" entitled paper presented in national conference

at  BRCM CET,  NCETEC-2010.

9

Quality of Service (QoS) in Wi-Max (IEEE 802.16) “entitled Presented in AICTE Sponsored  international conference at Om institute of management ,Hissar (Haryana). RTCMC-2012.

10

Research of Data Mining based on Neural Network “,entitled Presented in AICTE Sponsored  International conference at Om institute of management, Hissar.(Haryana) RTCMC-2012.

Mr. Deepak Sinwar

Sr. No.

Description

1

Study of Meta, Naïve Bayes and Decision Tree based Classifiers”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue VIII, August 2014, pp. 289-293.

2

Study of Various Normalization Techniques using EM Clustering”, published in Global Journal for Current Engineering   Research (GJCER), ISSN: Vol.3 (1), Page(s): 196-200, 2014.

3

Study of Euclidean and Manhattan Distance Metrics using Simple K-Means Clustering”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue V, May 2014, pp. 270-274.

4

Outlier Detection Techniques for Wireless Sensor Networks using Clustering and Support Vector Machines” published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-7, Number-1, December 2013, pp. 87-91.

5

"Study of Different Clustering Approaches for Outlier Detection" ,published in International Journal of Computer Science & Communication (ISSN 0973-7391), Volume-4, Number-2, September 2013, pp. 51-54.

6

Discovery and Ranking of Outliers using Weighted Association Rule Mining with Clustering” published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-6, Number-2, June 2013, pp. 175-180

7

XML based Information Management in Healthcare, Data Mining and Distributed Systems" published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414) Volume-5, Number-1, Dec 2011, pp. 129-134.

8

Discovery of Weighted Frequent Itemsets based on FP-Tree” in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 45-48, 2010

9

An Improved FP Growth Algorithm for Discovering Frequent Itemsets”,  in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 49-53, 2010

10

Hyper-ellipsoidal Support Vector Machines based Anomaly Detection from Wireless Sensor Networks” in proceedings of AICTE Sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013)” organized by Department of Electronics & Communication Engineering, BRCM College of Engineering & Technology, Bahal, Bhiwani, Haryana on Oct 25-26, 2013.

Dr. Kamal

Sr. No.

Description

1

Security In Ad-hoc Networks” published in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov., 2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

2

“An Overview On Multicast Routing Protocol for Mobile Ad-hoc Networks” published in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

3

“An Outline of Big Data Tools & Technologies” published in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

4

“Packet Dropping Study of Selective Early Discard (SED) Algorithm”, Published in International Forum Of Researchers Students And Academician, Volume-3, Issue-III, August, 2013, ISSN (Online) 2249 –5444 ISSN (Print).

5

An Overview of Web Usages Mining” published in IJLTEMAS (International Journal Of Technology In Engineering Management & Applied Science) online Journal Page No-53-60, Volume-2,Issue-IV,June’2013.

6

“Tool for Automation in Design of Electron Gun and PPM Focusing using Visual C++” Proc. of PDGC-12 2nd IEEE International Conference on Parallel, Distributed and Grid Computing Dec 6-8, 2012.

7

“Delay –Tolerant Network Routing Approaches: A Survey” 1st International Conference on International Conference on Sports Biomechanics & Emerging Technologies March 17-18, 2012.

8

“Opportunistic Network Environment an Overview”, Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

9

Adhoc Network Routing Protocols an Overview” Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

10

“Hierarchical Location Service” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

11

“Tool for Automation in Design of Electron Gun and PPM Focusing using EGUN Software” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

12

Product Life Cycle Management” in International Conference of Maharaja Agrasen Institute of Management & Technology, Jagadhri-8th May, 2010.

13

Data Mining and Pattern Analysis in Web Usages Mining” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

14

“Design of Compiler for Mobile Environment: An Overview” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

15

“Predictive-Hierarchical Location Service for Mobile Ad Hoc Networks” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

16

“Real-Time Scheduling Method: An Overview” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

17

“Process Based Comparison Study of Hypermedia System” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

18

“Knowledge Discovery & Pattern Analysis in Web Usages Mining” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

19

“Web Mining & Knowledge Discovery Usages Mining” National conference on Engineering College Ajmer-13th April,2007.

 

 

 

Dr. Sudesh Kumar

Sr. No.

Description

1

Location Based System Using Google Cloud Messaging” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

2

Energy Efficiency Model for Cloud Datacenters” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

3

Modelling and Performance Evaluation of Dynamic Routing Over MANET using NS-2.35 “ ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

4

Enhancing System Performance Utilizing Cache Architecture” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

5

Analysis of Security Issues and their Solutions In Transmitting Images Over Wireless Networks” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

6

Efficient K-Mean Clustering Algorithm for Large Datasets using Data Mining Standard Score NormalizationPublished in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10 Oct. 2014 ISSN: 2321-8169, 3161 – 3166. [IMPACT FACTOR(SJIF)=5.098]

7

Comparison of Energy Efficient Clustering Protocols in Wireless Sensor Networks - A ReviewPublished in   International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10  Oct. 2014 ISSN: 2321-8169 3121 – 3124. [IMPACT FACTOR(SJIF)=5.098]

8

A study of Black Box Testing to generate the test cases and Statement coverage criteria to reduce the test casesPublished in  International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169, 2642 – 2648. [IMPACT FACTOR(SJIF)=5.098]

9

K-Mean Evaluation in Weka Tool and Modifying It using Standard Score MethodPublished in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169  2704 – 2706. [IMPACT FACTOR(SJIF)=5.098]

10

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing ProtocolsPublished in IJITKM Volume 7 • Number 2 Jan– June 2014 pp. 180-184 (ISSN 0973-4414). .[IMPACT FACTOR=1.05 ]

11

Outlier Detection Techniques for Wireless Sensor Networks using     Clustering and Support Vector MachinesPublished in (IJITKM) Volume 7 •  Number 1 • December 2013 pp. 87-91 (ISSN 0973-4414).[IMPACT FACTOR=1.05]

12

Study of Different Clustering Approaches for Outlier DetectionPublished in International Journal of Computer Science & Communication (IJCSC)IVolume 4 • Number 2 September 2013 pp.51-54 ISSN 0973-7391. .[IMPACT FACTOR=1.0]

13

CBR Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2”  International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013. [IMPACT FACTOR=1.0]

14

Combinatorial Auction for Grid Computingpublished in International Journal of  Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-3, July 2013. [IMPACT FACTOR=1.0]

15

Proposed Model in Grid Computingpublished in   International Journal for Management Science and Technology (IJMST) ISSN: 2321-0362 (Print) ISSN: 2320-8848 (Online) Vol. 1; Issue 5 July  2013.

16

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniquespublished in   International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE)   Volume 3, Issue 6, June 2013 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

17

A Performance Analysis of DES and RSA CryptographyInternational Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 3, May – June 2013       ISSN 2278-6856. [IMPACT FACTOR=2.524]

18

TCP Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2published in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-2, July 2013. [IMPACT FACTOR=1.0]

19

Measuring the Effectiveness of Test Cases in to Java Program by Mutation Testing Tool” published in the(IJCTA) Int.J.Computer Technology & Applications,Vol 3 (6), 1903-1907(Nov-Dec 12)ISSN :2229-6093. [IMPACT FACTOR=2.015]

20

Distinction between secret key and public Key cryptography with existing glitchespublished in the Indian Journal Education Information Management, Vol. 1, No. 6 (Sep 2012) ISSN 2277 – 5374. [IMPACT FACTOR=0.355

21

Optimization of Decision Rules in Fuzzy Classificationpublished in the International Journal of Computer Applications (0975 – 8887) Volume 51– No.3, August 2012. [IMPACT FACTOR=0.821]

22

Comparative Analysis between DES and RSA Algorithm’spublished in the International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

23

Implementation of Intrusion Detection System based on DSR Algorithm in WLANpublished in IJMRS’s International Journal of Engineering Sciences, Vol. 01,Issue 02, June 2012, ISSN: 2277-9698.

24

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Modelpublished in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

 

Dr. Gundeep Tanwar

Sr. No.

Description

1

Optimization of Apriori Algorithm for High Performance” , Global Journal for Current Engineering Research  , Vol 3 Issue 2 , Sep 2014 , ISSN : 2265 – 2275 , Impact Factor : 1.683

2

A Comparative study of Traditional and Component Software Engineering Approach using models” International Journal on Recent and Innovation Trends in Computing and Communication , Vol 2 Issue 9 ,Sep 2014 ,  ISSN :2321 -8169 , Impact Factor : 5.098

3

A survey on optimization of APRIORI algorithm for high performance” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 ,  Jun 2014 , ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

4

A Review on optimizing COCOTS model in Component based Software Engineering approach” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 , Jun 2014 ,  ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

5

Research Trend in the Direction of Fourth Generation Wireless Mobile Communications : Review” International Journal of Artificial Intelligence and Mechatronics , Vol 2 Issue 6 May- June 2014 , ISSN -2320-5121 .

6

Exemplifying Practical Issues in Resource Management in Cloud Computing” International Journal of  Engineering Research and Technology , Vol 3 Issue 3, March 2014 , ISSN 2278-0181 , Impact Factor : 1.76 , www.ijert.org

7

BPEL based scheduling in multi agent system for business applications” International journal of Information Technology and Knowledge management , Vol 7 , Number 1 , Dec 2013. ISSN-0973-4414 , Impact factor : 1.05 , www.csjournals.com

8

Designing the automatic web tools for small business scale with Case-based reasoning” International Journal of Engineering and Management Research, Vol.-3, Issue-4, August 2013 ISSN No.: 2250-0758 , www.ijemr.net

9

Assignment of Keys in Wireless sensor network based on Activeness of Sensor Node” International Research Journal of Management Science and Technology , www.irjmst.com , ISSN 2250-1959 , Vol 4 Issue 2 , July 2013 , Impact factor : 0.61

10

Tackling Rationing and shortage gaming reason of bullwhip effect with fuzzy logic approach” International Journal of Engineering and Sciences, www.researchinventy.com, ISSN : 2278-4721 ,Vol. 2, Issue 10 , April 2013

11

Managing Order Batching Issue of Supply Chain Management With Multi-Agent System” International Journal of Computational Engineering Research (IJCER) ,www.ijceronline.com, ISSN : 2250-3005 ,Volume  3 Issue 4 , April 2013 .

12

Cloud Computing : Security Issues and Challenges” Global Research Analysis , ISSN : 2277-8160 , Impact Factor : 0.2714 , Vol 2 Issue 3 March 2013 .

13

“Designing CBR-BDI Agent for implementation of Supply Chain system” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622  , Vol. 3, Issue 1, January -February 2013, 1288-1292

14

“Secure Routing Techniques in Mobile Adhoc Network” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 4 No 7 , Nov 2012 .

15

“Intrusion Detection System” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 3 No 6 , Aug 2012 .

16

Agent oriented programming in trading system automation”, International Journal of Research in IT, Management and Engineering, Vol 2, Issue 8 August 2012 , ISSN:2249-1619

17

Congestion Control Framework in Ad-Hoc Wireless using Neural Networks in QoS”, International Journal of Research in Computer Engineering & Electronics, Vol 1, No 1 (2012)

Mr. Amit Nain

Sr. No.

Description

1

Routing Protocols in FANET : Survey” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

2

Improved Result by combining two Clustering Techniquespublished in International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Volume: 4, Number: 2, Issue: Feb 2014, ISSN: 2277-128X, Impact Factor: 2.08.

 

3

Implementation of Modified TIMIP for overlay Networks with Enhanced Handover and QoSpublished in the International Journal of Computer Applications Volume 4, Issue 8, and August 2014

4

Comparison of C-Means Algorithm, Clustering & Fuzzy Merging Algorithmpublished in International Journal for Scientific Research and Development (IJSRD), Volume: 1, Issue: 5 in July 2013, ISSN [Online]: 2321-0613, Impact Factor: 1.26.

5

Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

6

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Modelpublished in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

 

 

Mr. Durgesh Kumar Srivastava

Sr. No.

Description

1

Analysis of different Hybrid methods for Intrusion Detection System ”, Published in International Journal of Computer Sciences and Engineering, Vol. 7, Issue 5, (UGC Approved Sr. No. 63193), ISSN No. 23472693, May 2019.

2

An Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)”, Published in Journal of Advancements in Robotics, Volume 6, Issue 1, (UGC Approved Sr. No. 47078), ISSN No. 24551872 May, 2019.

3

Performance Evaluation Of Entropy Based Graph Network Intrusion Detection System (E-Ids)”, Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 02-Special Issue, (UGC Approved Sr. No. 26301), ISSN No. 1943-023X, April 2019 (Elsevier Scopus).

4

Mining of Data through various Soft Computing Techniques”, in International Conference on  Advances in Basic Sciences (ICABS 2019), Feb 7-9, 2019 at GDC Memorial College, Bahal, Bhiwani, Haryana.

5

Auction System for Automated E-Commerce: JADE based Multi-agent Application”, Published in International Journal of Engineering & Computer Science (IJECS), Volume. 5 - Issue. 09, Sep, 2016.

6

Evaluating Negotiation Protocols and Negotiation Strategies for Automated E-Commerce” Published in International Journal of Engineering Research & Technology, Volume. 5 - Issue. 07, July, 2016

7

 “Threshold Analysis and Comparison of Sequential and Parallel Divide and Conquer Sorting Algorithms”, Published in International Journal of Computer Applications (0975–8887), Volume 145–No.10, July 2016

8

Efficient Rule Set Generation using K-Map & Rough Set Theory (RST)”, Published in International Journal of Engineering & Technology Innovations (IJETI), ISSN (Online): 2348-0866, Vol. 2 Issue 3, May 2015.

9

A Novel approach for CPU utilization on a multicore paradigm using parallel quick sort”, 3rd IEEE International Conference on Computational Intelligence and Communication Technology 2017.

10

Software Testing In Cloud Computing EnvironmentPublished in International Journal Of Advanced Research in Computer Science And Software Engineering (IJARCSSE-14) , Print: ISSN: 2277 128X , Volume 4, Issue 6, June 2014.

11

Test Case Using Boundary Value Analysis And Eqivalence Class”, International Journal Of Engineering Research & Management Technology (IJERMT), Volume 1, Issue 3, Page No. 125-130.

12

“Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

13

“Data Classification: A ROUGH-SVM Approach”, Contemporary Engineering Sciences, Vol. 3, 2010, no. 2, 77 – 86.

14

“Data Classification using Support Vector Machine (SVM)”, JATIT, Volume 12, Number 1, Feb. 2010, Page No. 1-7.

15

Testing Technology in Industry: A Review”, IJITKM, Volume 2, Number 1, June 2009, Page No. 145-148.

16

Open Source Software (OSS): A new Venue for Civil Engineering Professionals”, National Conference on Recent Trends & Innovation in Civil Engineering (RTICE-2013), Nov 15-16, 2013 (ISBN: 978-81-925840-2-7) in BRCM CET, Bahal, Bhiwani, Haryana.

17

Color based Image Retrieval using Supervised Learning”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26,2013 in BRCM CET, Bahal, Bhiwani, Haryana.

18

“Rules Reduction using Decision Matrix”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26, 2013 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr.Praveen Kanth

Sr. No.

Description

1

A RESEARCH PAPER OF DNA CRYPTOGRAPHY SECURITY ENHANCEMENT”  published in International Journal Of Computer Application ,Volume 5-NO July-August 2015. No.6-October 2015,IJCA-2250-1797.

 2

Enhancement Of Security In DNA Based Cryptography ” published in International Organization Of Scientific Research (IOSR) In Journal Of Computer Engineering, July-August 2015.

 3

A Review Article on Binary Picture Quality and Security using  visual Cryptography”  published in Global  Journal For Current Engineering Research GJCER, Vol 4 (2), 2015, 170- 173 ISSN: 2265-2765.

4

Secure Data Transmission using DNA Encryption” published in International Journal of Advanced Research in Computer Science (IJARCS) ISSN No. 0976-5697 Volume 5, No. 6 ,July-August 2014.

5

“DNA Encryption” published in International Journal of Computer Science and Engineering (IJCSE) ISSN:2278-9960 VOLUME 3, ISSUE 3, May 2014.

6

“Web Crawling Using Location Aware Technique” published in International Journal for  Scientific Research & Development (IJSRD) , VOLUME 1, ISSUE 5, June. 2013.

7

“Mobile Systems and Web Crawler :A Review” , published in IFRSA International Journal of Data Warehousing & Mining  (IIJDWM) , VOLUME 3, ISSUE 2, MAY. 2013.

8

Automation Hierarchical in Business Information and Production” published in  Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

9

"Data Security Using Cryptography Technique in Network" published in Industrial Electronics, Drives & Embedded System (IEDES),2009  in BRCM CET, Bahal, Bhiwani, Haryana.

 

10

“Analysis of Software Metrics Used in Software Testing” published in Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr. Harish Bedi

Sr. No.

Description

1

A Novel Algorithm Based Design Scheme for Embedding Secret Message onto a Steganographic Channel" in International Journal of Electronics Engineering ISSN 0973-7383 pp 161:165(Volume-1,Issue-2,Jan 2009).

2

 “A New Methodology for sensing  Black Hole Nodes in Adhoc network”  in international journal of  computer science and it ISSN 2250-2734 PP 20:26(Volume -3, Issue-1, April 2012).

3

“Energy Efficient Homogeneous vs  Hetrogeneous LEACH” in international journal of Innovative Technology and Exploring Engineering. ISSN 2278-3075 PP 280:283(Volume-2,Issue-5,April 2013).

4

”Wireless Sensor Network LEACH Potocol:A Survey” in International Journal of Emerging Research in Management & Technology ISSN 2278-9359 PP 50:55 (Volume-2,Issue-3,March 2013).

5

“Design Issue for routing protocols in WSNs Based on Classification” in international journal of Application or Innovative in Engineering and Management ISSN 2319-4847 PP 312:320 (Volume-2, Issue-3,March 2013).

6

“Clustering VS Multi-clustering” in international journal of Advanced Engineering Sciences and Technologies. ISSN 2230-7818 PP 049-055 (Volume-12, Issue- 2,2013).

7

“Review on attacks in MANET”, International Interdisciplinary Conference on Contemporary Issues in Commerce, Management, Computer Applications and Social Sciences, ISSN 2277-128X ,PP 794:798(Volume-4, Issue-7,July 2014).

8

“Modified AODV to detect and recover Wormhole Attack” ,IJECS (International Journal of Engineering and Computer Science ) ISSN 2319-7242 PP 8498:8501 (Volume -3, Issue-10, October 2014).

9

“Bluetooth, Wi-Fi and Wi-Max A Review Study” IJARCSSE( International Journal of Advanced Research in Computer Science and Software Engineering ), ISSN: 2277 128X ( Volume4, Issue 7, July 2014).

10

 “Study of Packet Delivery Ratio, Collision Detection Ratio,End to End delay during mobility in various wireless techniques using NS2” IJSR( International Journal of  Science and Research), ISSN: 2319-7064 (Volume3, Issue 9, September 2014).

Mr.Basant Sah

Sr. No.

Description

1

“Performance Metrics in Ad-hoc Network “ entitled  publish in International Journal of Latest Trends in Engineering and Technology  (IJLTET)  ISSN: 2278-621X.

2

“Energy Efficient Routing Protocols in Wireless Sensor Network” entitled publish in    International Journal of Engineering, Science and Metallurgy” JESM Vol.2 , No.3(2012)  ISSN 2249 – 7366.

3

Enhancing the Data Hiding  Capacity of Kekre Algorithm Using the

Lempel-Ziv–Welch Technique” entitled publish in International Journal

advanced Research in Computer Science and Software Engineering  

Volume  3 , Issue 7,July2013 ISSN: 2277 128X.

4

Data Hiding Scheme in Digital Image using Steganographic Techniques ” entitled publish in International Journal of Graphics & Image Processing |Vol 3] issue 2|May 2013 .

5

Dynamic CA in Mobile AD-HOC  Network” , entitled  paper present in national

conference at BRCM College of Engg. And Tech , Bahal,(Haryana). IEDES -2009.

6

Security in Mobile Ad Hoc Network Using Cryptography Techniqueentitled paper present in national conference at BRCM College of Engg. & Tech , Bahal,(Haryana). IEDES -2009.

7

Channeling of 2.4 g Evasions in Germanium Crystal”, entitled paper present

in national conference at  BRCM College of Engg. And Tech , Bahal,(Haryana).

RDME-2010

8

Java Byte Code Verification" entitled paper presented in national conference

at  BRCM CET,  NCETEC-2010.

9

Quality of Service (QoS) in Wi-Max (IEEE 802.16)entitled Presented in

AICTE Sponsored  international conference at Om institute of management ,

Hissar (Haryana). RTCMC-2012.

10

Research of Data Mining based on Neural Network “,entitled Presented in AICTE Sponsored  International conference at Om institute of management, Hissar.(Haryana) RTCMC-2012.

Mr. Deepak Sinwar

Sr. No.

Description

1

Study of Meta, Naïve Bayes and Decision Tree based Classifiers”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue VIII, August 2014, pp. 289-293.

2

Study of Various Normalization Techniques using EM Clustering”, published in Global Journal for Current Engineering   Research (GJCER), ISSN: Vol.3 (1), Page(s): 196-200, 2014.

3

Study of Euclidean and Manhattan Distance Metrics using Simple K-Means Clustering”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue V, May 2014, pp. 270-274.

4

Outlier Detection Techniques for Wireless Sensor Networks using Clustering and Support Vector Machines” published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-7, Number-1, December 2013, pp. 87-91.

5

"Study of Different Clustering Approaches for Outlier Detection" ,published in International Journal of Computer Science & Communication (ISSN 0973-7391), Volume-4, Number-2, September 2013, pp. 51-54.

6

Discovery and Ranking of Outliers using Weighted Association Rule Mining with Clusteringpublished in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-6, Number-2, June 2013, pp. 175-180

7

XML based Information Management in Healthcare, Data Mining and Distributed Systems" published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414) Volume-5, Number-1, Dec 2011, pp. 129-134.

8

Discovery of Weighted Frequent Itemsets based on FP-Tree” in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 45-48, 2010

9

An Improved FP Growth Algorithm for Discovering Frequent Itemsets”,  in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 49-53, 2010

10

Hyper-ellipsoidal Support Vector Machines based Anomaly Detection from Wireless Sensor Networks” in proceedings of AICTE Sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013)” organized by Department of Electronics & Communication Engineering, BRCM College of Engineering & Technology, Bahal, Bhiwani, Haryana on Oct 25-26, 2013.

Dr. Kamal

Sr. No.

Description

1

Security In Ad-hoc Networkspublished in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov., 2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

2

An Overview On Multicast Routing Protocol for Mobile Ad-hoc Networkspublished in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

3

An Outline of Big Data Tools & Technologies published in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

4

Packet Dropping Study of Selective Early Discard (SED) Algorithm”, Published in International Forum Of Researchers Students And Academician, Volume-3, Issue-III, August, 2013, ISSN (Online) 2249 –5444 ISSN (Print).

5

An Overview of Web Usages Mining published in IJLTEMAS (International Journal Of Technology In Engineering Management & Applied Science) online Journal Page No-53-60, Volume-2,Issue-IV,June’2013.

6

“Tool for Automation in Design of Electron Gun and PPM Focusing using Visual C++” Proc. of PDGC-12 2nd IEEE International Conference on Parallel, Distributed and Grid Computing Dec 6-8, 2012.

7

“Delay –Tolerant Network Routing Approaches: A Survey” 1st International Conference on International Conference on Sports Biomechanics & Emerging Technologies March 17-18, 2012.

8

“Opportunistic Network Environment an Overview”, Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

9

Adhoc Network Routing Protocols an Overview” Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

10

“Hierarchical Location Service” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

11

“Tool for Automation in Design of Electron Gun and PPM Focusing using EGUN Software” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

12

Product Life Cycle Management” in International Conference of Maharaja Agrasen Institute of Management & Technology, Jagadhri-8th May, 2010.

13

Data Mining and Pattern Analysis in Web Usages Mining” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

14

“Design of Compiler for Mobile Environment: An Overview” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

15

“Predictive-Hierarchical Location Service for Mobile Ad Hoc Networks” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

16

“Real-Time Scheduling Method: An Overview” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

17

“Process Based Comparison Study of Hypermedia System” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

18

“Knowledge Discovery & Pattern Analysis in Web Usages Mining” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

19

“Web Mining & Knowledge Discovery Usages Mining” National conference on Engineering College Ajmer-13th April,2007.

Mr. Sunil Maakar

Sr. No.

Description

116

Secured and Efficient Ant Based Zone Routing Protocol”, International Journal of wireless personal communications (Springer), September 2014. (Communicated)

117

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing Protocols”, International Journal of IT & Knowledge Management (ISSN: 0973-4414) IJITKM, Volume 7-No. 2, Jan– June 2014, pp. 180-184.

118

A Survey on Different Hybrid Routing Protocols of MANET”, International Journal of Computer Science and Information Technologies (IJCSIT) ISSN: 0975-9646, Vol. 5 (4), 5512-5516, 2014, 5512-5516.

119

A Performance Analysis of DES and RSA Cryptography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2278-6856, Vol 2, Issue 3, May-June 2013, 418-423.

120

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 6, June 2013, 464-471.

121

Comparative Analysis between DES and RSA Algorithm’s”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012, 386-391.

122

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Model” International Journal of Computer Applications (IJCA) 0975-8887, Vol 43 - Number 7, 2012, 13-18.

123

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4), 2011, 1606-1611.

124

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Manhattan Grid Mobility Model”, 3rd IEEE International Conference on Computer Research and Development (ICCRD 2011),March 2011, Shanghai, China.(Accepted)

125

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, 2nd IEEE International Conference on Computer & Communication Technology (ICCCT-2011), MNNIT Allahabad, India, Sep. 2010.(Accepted)

126

Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model”, International Journal of Computer Science Issues (IJCSI) Volume 7, Issue 3, May 2010.

127

Performance Analysis of MANET Routing Protocols using TCP Traffic for Freeway Mobility Model”, International Conference on Wireless Networks ICWN’10, Las Vegas, Nevada, USA, July 2010.