Faculty Publications

Faculty Publications

 

Dr. Sudesh Kumar

Sr. No.

Description

1

Location Based System Using Google Cloud Messaging” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

2

Energy Efficiency Model for Cloud Datacenters” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

3

Modelling and Performance Evaluation of Dynamic Routing Over MANET using NS-2.35 “ ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

4

Enhancing System Performance Utilizing Cache Architecture” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

5

Analysis of Security Issues and their Solutions In Transmitting Images Over Wireless Networks” , National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

6

Efficient K-Mean Clustering Algorithm for Large Datasets using Data Mining Standard Score NormalizationPublished in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10 Oct. 2014 ISSN: 2321-8169, 3161 – 3166. [IMPACT FACTOR(SJIF)=5.098]

7

Comparison of Energy Efficient Clustering Protocols in Wireless Sensor Networks - A ReviewPublished in   International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 10  Oct. 2014 ISSN: 2321-8169 3121 – 3124. [IMPACT FACTOR(SJIF)=5.098]

8

A study of Black Box Testing to generate the test cases and Statement coverage criteria to reduce the test casesPublished in  International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169, 2642 – 2648. [IMPACT FACTOR(SJIF)=5.098]

9

K-Mean Evaluation in Weka Tool and Modifying It using Standard Score MethodPublished in International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 9 Sep. 2014  ISSN: 2321-8169  2704 – 2706. [IMPACT FACTOR(SJIF)=5.098]

10

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing ProtocolsPublished in IJITKM Volume 7 • Number 2 Jan– June 2014 pp. 180-184 (ISSN 0973-4414). .[IMPACT FACTOR=1.05 ]

11

Outlier Detection Techniques for Wireless Sensor Networks using     Clustering and Support Vector MachinesPublished in (IJITKM) Volume 7 •  Number 1 • December 2013 pp. 87-91 (ISSN 0973-4414).[IMPACT FACTOR=1.05]

12

Study of Different Clustering Approaches for Outlier DetectionPublished in International Journal of Computer Science & Communication (IJCSC)IVolume 4 • Number 2 September 2013 pp.51-54 ISSN 0973-7391. .[IMPACT FACTOR=1.0]

13

CBR Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2”  International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013. [IMPACT FACTOR=1.0]

14

Combinatorial Auction for Grid Computingpublished in International Journal of  Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-3, July 2013. [IMPACT FACTOR=1.0]

15

Proposed Model in Grid Computingpublished in   International Journal for Management Science and Technology (IJMST) ISSN: 2321-0362 (Print) ISSN: 2320-8848 (Online) Vol. 1; Issue 5 July  2013.

16

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniquespublished in   International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE)   Volume 3, Issue 6, June 2013 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

17

A Performance Analysis of DES and RSA CryptographyInternational Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 3, May – June 2013       ISSN 2278-6856. [IMPACT FACTOR=2.524]

18

TCP Traffic Based Performance Investigations of DSDV, DSR and AODV Routing Protocols for MANET Using NS2published in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-2, July 2013. [IMPACT FACTOR=1.0]

19

Measuring the Effectiveness of Test Cases in to Java Program by Mutation Testing Tool” published in the(IJCTA) Int.J.Computer Technology & Applications,Vol 3 (6), 1903-1907(Nov-Dec 12)ISSN :2229-6093. [IMPACT FACTOR=2.015]

20

Distinction between secret key and public Key cryptography with existing glitchespublished in the Indian Journal Education Information Management, Vol. 1, No. 6 (Sep 2012) ISSN 2277 – 5374. [IMPACT FACTOR=0.355

21

Optimization of Decision Rules in Fuzzy Classificationpublished in the International Journal of Computer Applications (0975 – 8887) Volume 51– No.3, August 2012. [IMPACT FACTOR=0.821]

22

Comparative Analysis between DES and RSA Algorithm’spublished in the International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012 ISSN: 2277 128X. [IMPACT FACTOR=2.080]

23

Implementation of Intrusion Detection System based on DSR Algorithm in WLANpublished in IJMRS’s International Journal of Engineering Sciences, Vol. 01,Issue 02, June 2012, ISSN: 2277-9698.

24

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Modelpublished in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

 

Dr. Gundeep Tanwar

Sr. No.

Description

25

Optimization of Apriori Algorithm for High Performance” , Global Journal for Current Engineering Research  , Vol 3 Issue 2 , Sep 2014 , ISSN : 2265 – 2275 , Impact Factor : 1.683

26

A Comparative study of Traditional and Component Software Engineering Approach using models” International Journal on Recent and Innovation Trends in Computing and Communication , Vol 2 Issue 9 ,Sep 2014 ,  ISSN :2321 -8169 , Impact Factor : 5.098

27

A survey on optimization of APRIORI algorithm for high performance” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 ,  Jun 2014 , ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

28

A Review on optimizing COCOTS model in Component based Software Engineering approach” International journal of Information Technology and Knowledge management , Vol 7 , Number 2 , Jun 2014 ,  ISSN-0973-4414 , Impact factor : 1.9 , www.csjournals.com

29

Research Trend in the Direction of Fourth Generation Wireless Mobile Communications : Review” International Journal of Artificial Intelligence and Mechatronics , Vol 2 Issue 6 May- June 2014 , ISSN -2320-5121 .

30

Exemplifying Practical Issues in Resource Management in Cloud Computing” International Journal of  Engineering Research and Technology , Vol 3 Issue 3, March 2014 , ISSN 2278-0181 , Impact Factor : 1.76 , www.ijert.org

31

BPEL based scheduling in multi agent system for business applications” International journal of Information Technology and Knowledge management , Vol 7 , Number 1 , Dec 2013. ISSN-0973-4414 , Impact factor : 1.05 , www.csjournals.com

32

Designing the automatic web tools for small business scale with Case-based reasoning” International Journal of Engineering and Management Research, Vol.-3, Issue-4, August 2013 ISSN No.: 2250-0758 , www.ijemr.net

33

Assignment of Keys in Wireless sensor network based on Activeness of Sensor Node” International Research Journal of Management Science and Technology , www.irjmst.com , ISSN 2250-1959 , Vol 4 Issue 2 , July 2013 , Impact factor : 0.61

34

Tackling Rationing and shortage gaming reason of bullwhip effect with fuzzy logic approach” International Journal of Engineering and Sciences, www.researchinventy.com, ISSN : 2278-4721 ,Vol. 2, Issue 10 , April 2013

35

Managing Order Batching Issue of Supply Chain Management With Multi-Agent System” International Journal of Computational Engineering Research (IJCER) ,www.ijceronline.com, ISSN : 2250-3005 ,Volume  3 Issue 4 , April 2013 .

36

Cloud Computing : Security Issues and Challenges” Global Research Analysis , ISSN : 2277-8160 , Impact Factor : 0.2714 , Vol 2 Issue 3 March 2013 .

37

“Designing CBR-BDI Agent for implementation of Supply Chain system” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622  , Vol. 3, Issue 1, January -February 2013, 1288-1292

38

“Secure Routing Techniques in Mobile Adhoc Network” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 4 No 7 , Nov 2012 .

38

“Intrusion Detection System” Journal of Advances in Science and Technology ,ISSN :2230 -9659 , Vol 3 No 6 , Aug 2012 .

40

Agent oriented programming in trading system automation”, International Journal of Research in IT, Management and Engineering, Vol 2, Issue 8 August 2012 , ISSN:2249-1619

41

Congestion Control Framework in Ad-Hoc Wireless using Neural Networks in QoS”, International Journal of Research in Computer Engineering & Electronics, Vol 1, No 1 (2012)

Mr. Amit Nain

Sr. No.

Description

42

Routing Protocols in FANET : Survey” ,  National Conference on Innovative Trends in Computer Science Engineering-2015, 4th April, 2015, BRCM CET, Bahal (Haryana)

43

Improved Result by combining two Clustering Techniquespublished in International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Volume: 4, Number: 2, Issue: Feb 2014, ISSN: 2277-128X, Impact Factor: 2.08.

 

44

Implementation of Modified TIMIP for overlay Networks with Enhanced Handover and QoSpublished in the International Journal of Computer Applications Volume 4, Issue 8, and August 2014

45

Comparison of C-Means Algorithm, Clustering & Fuzzy Merging Algorithmpublished in International Journal for Scientific Research and Development (IJSRD), Volume: 1, Issue: 5 in July 2013, ISSN [Online]: 2321-0613, Impact Factor: 1.26.

46

Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

47

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Modelpublished in the International Journal of Computer Applications (0975 – 8887) Volume 43– No.7, April 2012. [IMPACT FACTOR=0.821]

 

 

Mr. Durgesh Kumar Srivastava

Sr. No.

Description

48

Software Testing In Cloud Computing EnvironmentPublished in International Journal Of Advanced Research in Computer Science And Software Engineering (IJARCSSE-14) , Print: ISSN: 2277 128X , Volume 4, Issue 6, June 2014.

49

Test Case Using Boundary Value Analysis And Eqivalence Class”, International Journal Of Engineering Research & Management Technology (IJERMT), Volume 1, Issue 3, Page No. 125-130.

50

“Rules Reduction Using Decision Matrix”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 10 Oct 2013, ISSN : 2229-3345.

51

“Data Classification: A ROUGH-SVM Approach”, Contemporary Engineering Sciences, Vol. 3, 2010, no. 2, 77 – 86.

52

“Data Classification using Support Vector Machine (SVM)”, JATIT, Volume 12, Number 1, Feb. 2010, Page No. 1-7.

53

Testing Technology in Industry: A Review”, IJITKM, Volume 2, Number 1, June 2009, Page No. 145-148.

54

Open Source Software (OSS): A new Venue for Civil Engineering Professionals”, National Conference on Recent Trends & Innovation in Civil Engineering (RTICE-2013), Nov 15-16, 2013 (ISBN: 978-81-925840-2-7) in BRCM CET, Bahal, Bhiwani, Haryana.

55

Color based Image Retrieval using Supervised Learning”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26,2013 in BRCM CET, Bahal, Bhiwani, Haryana.

56

“Rules Reduction using Decision Matrix”, AICTE sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013), Oct 25-26, 2013 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr.Praveen Kanth

Sr. No.

Description

57

A RESEARCH PAPER OF DNA CRYPTOGRAPHY SECURITY ENHANCEMENT”  published in International Journal Of Computer Application ,Volume 5-NO July-August 2015. No.6-October 2015,IJCA-2250-1797.

 58

Enhancement Of Security In DNA Based Cryptography ” published in International Organization Of Scientific Research (IOSR) In Journal Of Computer Engineering, July-August 2015.

 59

A Review Article on Binary Picture Quality and Security using  visual Cryptography”  published in Global  Journal For Current Engineering Research GJCER, Vol 4 (2), 2015, 170- 173 ISSN: 2265-2765.

60

Secure Data Transmission using DNA Encryption” published in International Journal of Advanced Research in Computer Science (IJARCS) ISSN No. 0976-5697 Volume 5, No. 6 ,July-August 2014.

61

“DNA Encryption” published in International Journal of Computer Science and Engineering (IJCSE) ISSN:2278-9960 VOLUME 3, ISSUE 3, May 2014.

62

“Web Crawling Using Location Aware Technique” published in International Journal for  Scientific Research & Development (IJSRD) , VOLUME 1, ISSUE 5, June. 2013.

63

“Mobile Systems and Web Crawler :A Review” , published in IFRSA International Journal of Data Warehousing & Mining  (IIJDWM) , VOLUME 3, ISSUE 2, MAY. 2013.

64

Automation Hierarchical in Business Information and Production” published in  Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

65

"Data Security Using Cryptography Technique in Network" published in Industrial Electronics, Drives & Embedded System (IEDES),2009  in BRCM CET, Bahal, Bhiwani, Haryana.

 

66

“Analysis of Software Metrics Used in Software Testing” published in Industrial Electronics, Drives & Embedded System (IEDES),2009 in BRCM CET, Bahal, Bhiwani, Haryana.

Mr. Harish Bedi

Sr. No.

Description

67

A Novel Algorithm Based Design Scheme for Embedding Secret Message onto a Steganographic Channel" in International Journal of Electronics Engineering ISSN 0973-7383 pp 161:165(Volume-1,Issue-2,Jan 2009).

68

 “A New Methodology for sensing  Black Hole Nodes in Adhoc network”  in international journal of  computer science and it ISSN 2250-2734 PP 20:26(Volume -3, Issue-1, April 2012).

69

“Energy Efficient Homogeneous vs  Hetrogeneous LEACH” in international journal of Innovative Technology and Exploring Engineering. ISSN 2278-3075 PP 280:283(Volume-2,Issue-5,April 2013).

70

”Wireless Sensor Network LEACH Potocol:A Survey” in International Journal of Emerging Research in Management & Technology ISSN 2278-9359 PP 50:55 (Volume-2,Issue-3,March 2013).

71

“Design Issue for routing protocols in WSNs Based on Classification” in international journal of Application or Innovative in Engineering and Management ISSN 2319-4847 PP 312:320 (Volume-2, Issue-3,March 2013).

72

“Clustering VS Multi-clustering” in international journal of Advanced Engineering Sciences and Technologies. ISSN 2230-7818 PP 049-055 (Volume-12, Issue- 2,2013).

73

“Review on attacks in MANET”, International Interdisciplinary Conference on Contemporary Issues in Commerce, Management, Computer Applications and Social Sciences, ISSN 2277-128X ,PP 794:798(Volume-4, Issue-7,July 2014).

74

“Modified AODV to detect and recover Wormhole Attack” ,IJECS (International Journal of Engineering and Computer Science ) ISSN 2319-7242 PP 8498:8501 (Volume -3, Issue-10, October 2014).

75

“Bluetooth, Wi-Fi and Wi-Max A Review Study” IJARCSSE( International Journal of Advanced Research in Computer Science and Software Engineering ), ISSN: 2277 128X ( Volume4, Issue 7, July 2014).

76

 “Study of Packet Delivery Ratio, Collision Detection Ratio,End to End delay during mobility in various wireless techniques using NS2” IJSR( International Journal of  Science and Research), ISSN: 2319-7064 (Volume3, Issue 9, September 2014).

Mr.Basant Sah

Sr. No.

Description

77

“Performance Metrics in Ad-hoc Network “ entitled  publish in International Journal of Latest Trends in Engineering and Technology  (IJLTET)  ISSN: 2278-621X.

78

“Energy Efficient Routing Protocols in Wireless Sensor Network” entitled publish in    International Journal of Engineering, Science and Metallurgy” JESM Vol.2 , No.3(2012)  ISSN 2249 – 7366.

79

Enhancing the Data Hiding  Capacity of Kekre Algorithm Using the

Lempel-Ziv–Welch Technique” entitled publish in International Journal

advanced Research in Computer Science and Software Engineering  

Volume  3 , Issue 7,July2013 ISSN: 2277 128X.

80

Data Hiding Scheme in Digital Image using Steganographic Techniques ” entitled publish in International Journal of Graphics & Image Processing |Vol 3] issue 2|May 2013 .

81

Dynamic CA in Mobile AD-HOC  Network” , entitled  paper present in national

conference at BRCM College of Engg. And Tech , Bahal,(Haryana). IEDES -2009.

82

Security in Mobile Ad Hoc Network Using Cryptography Techniqueentitled paper present in national conference at BRCM College of Engg. & Tech , Bahal,(Haryana). IEDES -2009.

83

Channeling of 2.4 g Evasions in Germanium Crystal”, entitled paper present

in national conference at  BRCM College of Engg. And Tech , Bahal,(Haryana).

RDME-2010

84

Java Byte Code Verification" entitled paper presented in national conference

at  BRCM CET,  NCETEC-2010.

85

Quality of Service (QoS) in Wi-Max (IEEE 802.16)entitled Presented in

AICTE Sponsored  international conference at Om institute of management ,

Hissar (Haryana). RTCMC-2012.

86

Research of Data Mining based on Neural Network “,entitled Presented in AICTE Sponsored  International conference at Om institute of management, Hissar.(Haryana) RTCMC-2012.

Mr. Deepak Sinwar

Sr. No.

Description

87

Study of Meta, Naïve Bayes and Decision Tree based Classifiers”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue VIII, August 2014, pp. 289-293.

88

Study of Various Normalization Techniques using EM Clustering”, published in Global Journal for Current Engineering   Research (GJCER), ISSN: Vol.3 (1), Page(s): 196-200, 2014.

89

Study of Euclidean and Manhattan Distance Metrics using Simple K-Means Clustering”, published in International Journal for Research in Applied Science and Engineering Technology (IJRASET), ISSN: 2321-9653, Vol. 2 Issue V, May 2014, pp. 270-274.

90

Outlier Detection Techniques for Wireless Sensor Networks using Clustering and Support Vector Machines” published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-7, Number-1, December 2013, pp. 87-91.

91

"Study of Different Clustering Approaches for Outlier Detection" ,published in International Journal of Computer Science & Communication (ISSN 0973-7391), Volume-4, Number-2, September 2013, pp. 51-54.

92

Discovery and Ranking of Outliers using Weighted Association Rule Mining with Clusteringpublished in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414), Volume-6, Number-2, June 2013, pp. 175-180

93

XML based Information Management in Healthcare, Data Mining and Distributed Systems" published in International Journal of Information Technology & Knowledge Management (ISSN 0973-4414) Volume-5, Number-1, Dec 2011, pp. 129-134.

94

Discovery of Weighted Frequent Itemsets based on FP-Tree” in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 45-48, 2010

95

An Improved FP Growth Algorithm for Discovering Frequent Itemsets”,  in proceedings of “Role and Applications of ICT in Inaccessible Areas (RAICTIA-10)” organized under UGC-SAP by Department of Computer Science & Engineering, GJUS&T, HISAR- Haryana (INDIA), Feb 17-18, pp. 49-53, 2010

96

Hyper-ellipsoidal Support Vector Machines based Anomaly Detection from Wireless Sensor Networks” in proceedings of AICTE Sponsored National Conference on Emerging Trends in Electronics & Communication (ETEC-2013)” organized by Department of Electronics & Communication Engineering, BRCM College of Engineering & Technology, Bahal, Bhiwani, Haryana on Oct 25-26, 2013.

Dr. Kamal

Sr. No.

Description

97

Security In Ad-hoc Networkspublished in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov., 2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

98

An Overview On Multicast Routing Protocol for Mobile Ad-hoc Networkspublished in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

99

An Outline of Big Data Tools & Technologies published in IJLTEMAS (International Journal Of Latest Technology In Engineering Management & Applied Science) Nov’2013, Vol 2, Issue XI, ISSN/IBBN No 2278-2540 (Impact Factor 1.356).

100

Packet Dropping Study of Selective Early Discard (SED) Algorithm”, Published in International Forum Of Researchers Students And Academician, Volume-3, Issue-III, August, 2013, ISSN (Online) 2249 –5444 ISSN (Print).

101

An Overview of Web Usages Mining published in IJLTEMAS (International Journal Of Technology In Engineering Management & Applied Science) online Journal Page No-53-60, Volume-2,Issue-IV,June’2013.

102

“Tool for Automation in Design of Electron Gun and PPM Focusing using Visual C++” Proc. of PDGC-12 2nd IEEE International Conference on Parallel, Distributed and Grid Computing Dec 6-8, 2012.

103

“Delay –Tolerant Network Routing Approaches: A Survey” 1st International Conference on International Conference on Sports Biomechanics & Emerging Technologies March 17-18, 2012.

104

“Opportunistic Network Environment an Overview”, Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

105

Adhoc Network Routing Protocols an Overview” Proc. of VCAN-2011 2nd International Conference on VLSI Communication and Networks December 24-25, 2011.

106

“Hierarchical Location Service” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

107

“Tool for Automation in Design of Electron Gun and PPM Focusing using EGUN Software” Proc. of IGTT-11 1st International Conference on Global Trends in Technology: Impact on Industry and Society October 15-16, 2011.

108

Product Life Cycle Management” in International Conference of Maharaja Agrasen Institute of Management & Technology, Jagadhri-8th May, 2010.

109

Data Mining and Pattern Analysis in Web Usages Mining” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

110

“Design of Compiler for Mobile Environment: An Overview” Proc. of KDNS – 2011 1st National Conference on Knowledge Discovery & Network Security Feb 26 – 27, 2011.

111

“Predictive-Hierarchical Location Service for Mobile Ad Hoc Networks” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

112

“Real-Time Scheduling Method: An Overview” Proc. of NCETEC – 2010 2nd National Conference on Emerging Trends in Electronics & Communication Dec 24 – 25, 2010.

113

“Process Based Comparison Study of Hypermedia System” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

114

“Knowledge Discovery & Pattern Analysis in Web Usages Mining” on Recent Developments in Mechanical Engineering in BRCM College of Engineering-19th February, 2010.

115

“Web Mining & Knowledge Discovery Usages Mining” National conference on Engineering College Ajmer-13th April,2007.

Mr. Sunil Maakar

Sr. No.

Description

116

Secured and Efficient Ant Based Zone Routing Protocol”, International Journal of wireless personal communications (Springer), September 2014. (Communicated)

117

Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET’s Routing Protocols”, International Journal of IT & Knowledge Management (ISSN: 0973-4414) IJITKM, Volume 7-No. 2, Jan– June 2014, pp. 180-184.

118

A Survey on Different Hybrid Routing Protocols of MANET”, International Journal of Computer Science and Information Technologies (IJCSIT) ISSN: 0975-9646, Vol. 5 (4), 5512-5516, 2014, 5512-5516.

119

A Performance Analysis of DES and RSA Cryptography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2278-6856, Vol 2, Issue 3, May-June 2013, 418-423.

120

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 6, June 2013, 464-471.

121

Comparative Analysis between DES and RSA Algorithm’s”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012, 386-391.

122

Performance Analysis of Proactive and Reactive MANET Routing Protocols using TCP Traffic for Freeway and Random Waypoint Mobility Model” International Journal of Computer Applications (IJCA) 0975-8887, Vol 43 - Number 7, 2012, 13-18.

123

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4), 2011, 1606-1611.

124

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Manhattan Grid Mobility Model”, 3rd IEEE International Conference on Computer Research and Development (ICCRD 2011),March 2011, Shanghai, China.(Accepted)

125

Traffic Pattern Based Performance Comparison of AODV, DSDV & OLSR MANET Routing Protocols using Freeway Mobility Model”, 2nd IEEE International Conference on Computer & Communication Technology (ICCCT-2011), MNNIT Allahabad, India, Sep. 2010.(Accepted)

126

Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model”, International Journal of Computer Science Issues (IJCSI) Volume 7, Issue 3, May 2010.

127

Performance Analysis of MANET Routing Protocols using TCP Traffic for Freeway Mobility Model”, International Conference on Wireless Networks ICWN’10, Las Vegas, Nevada, USA, July 2010.