SNO | Title of the Thesis | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1 | Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine | International Conf on Systems Engineering 330; pp.747-53; 2014 UNLV, USA, Springer Int Publishing | Karun Verma; R K Sharma |
2 | Offline Handwritten Gurmukhi Character Recognition System using RBF-SVM | International Workshop on Doc Analysis and Recognition; 2014; IISc Bengaluru | Munish Kumar;MK Jindal; R K Sharma |
3 | Performance Analysis of NoSQL Databases having Hadoop Integration | International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, 1-2 Aug, 2014 | Aayush, Seema Bawa |
4 | Experimental Comparison of Three Scheduling Algorithms for Energy Efficiency in Cloud Computing | IEEE International Conference of Cloud Computing in Emerging Markets (CCEM), 2014.pp:1-6, DOI: 10.1109/CCEM .2014. 7015491 | Goyal, S.; Bawa, S.; Singh, B |
5 | An opportunistic cross layer design for efficient service dissemination over flying ad hoc networks (FANETs)." - | In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, Coimbatore, pp. 1551-1557. IEEE, Feb.-2015. | Vishal Sharma Rajesh Kumar |
6 | A Secure Opportunistic service dissemination over Flying Ad Hoc Networks. | ACM security Symposium , IIT Delhi Feb. 2015 | Vishal Sharma Rajesh Kumar |
7 | Multilingual text summarization with UNL | International Conference on Advances in Computer Engineering and Applications (ICACEA), March 2015. | Sherry, Parteek Bhatia, |
8 | Adaptive probabilistic skip graph | IEEE International Advance Computing Conference, June 2015 | Amit Goyal, Shalini Batra |
9 | Progressive Alignment using Shortest Common Supersequence | International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1113-1117, September 24-27, 2014 | Ankush Garg, Deepak Garg |
10 | Bootstrap Sequential Projection Multi Kernel Locality Sensitive Hashing | International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 213-218 September 24-27, 2014 | Harsham Mehta, Deepak Garg |
11 | Maximal pattern matching with flexible wildcard gaps and one-off constraint | International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 1107-1112 September 24-27, 2014 | Anu Dahiya, Deepak Garg |
12 | Applying Data Mining Techniques in Job Recommender System for Considering Candidate Job Preferences | International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1458-1465 | Anika Gupta, Deepak Garg |
13 | Evaluating Quality Score of New Advertisements | International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.13-17 September 24-27, 2014) | Sohil Jain, Deepak Garg |
14 | Multistage learning model for better learning: A cognitive science perspective | 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), at Thapar Institute of Engineering & Technology, Patiala IEEE Xplore 386 - 389 on December 19-20, 2014 | Shivani Goel, Deepak Garg |
15 | Variable Bid Fee: An Online Auction Shill Bidding Prevention Methodology | 5th IEEE International Advance Computing Conference (IACC- 2015) at BMS College of Engineering, Bengaluru, Karnatka, India IEEE Xplore pp. 381-386 June 12-13, 2015 | Dhanmeet Kaur, Deepak Garg |
16 | Wormhole and Sybil Attack In WSN: a Review | INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 216-220, 2015. arnumber=7100491 | Svarika Goyal, Tarunpreet Bhatia and A.K.Verma, |
17 | Jellyfish Attack in MANETs: A Review” | IEEE International Conference On Electrical, Computer and Communication technologies (ICECCT),SVS College of Engineering, Coimbatore, Tamilnadu , India, pp. 1373-1377, 2015. | Kaur Simran, Kaur Rupinderdeep, Verma A.K, |
18 | Preventing Faults: Fault Monitoring and Proactive Fault Tolerance in Cloud Computing | ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. | Anu and Anju Bala |
19 | Multi-level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment | ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. | Dr. Anju Bala and Dr. Inderveer Chana |
20 | Heart Disease Prediction Model in Cloud Environment | ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. |
Anju Bala, Shikhar Malhotra, Nishant Gupta and Naman Ahuja |
21 | Fingerprint recognition password scheme using BFO | International Conference on Advances in Computing, Communications and Informatics (ICACCI, Sept. 2014 ), pg 1942-1946 | Harpreet Singh, Brar; V. P. Singh |
22 | Detection of alphanumeric shellcodes using similarity index | International Conference on Advances in Computing, Communications and Informatics (ICACCI, Sept. 2014 ), pg 1573-1577 | Nidhi Verma;Vishal Mishra and V. P. Singh |
23 | A 3 level model for implementing MOOC in India | 2nd IEEE International Conference on MOOCs Innovation and Technology in Education (IEEE-MITE 2014), Thapar Institute of Engineering & Technology, Patiala pp. 132-137 | Aman Sharma, Rinkle Rani |
24 | Analysis and Visualization of Twitter Data using R | The 1 st International Conference ‘INBUSH ERA 2015’ Theme: Futuristic trends in computational analysis and knowledge management Amity University Greater Noida On 25 - 27 February, 2015 | Aman Sharma, Rinkle Rani |
25 | IoT solutions for 3-D visualization of Twitter data | IEEE IACC-2015BMS College of Engineering, Bangalore 12-13 June, 2015 pp. 839-843 | Aman Sharma, Rinkle Rani |
26 | Analysis and Visualization of Professional’s LinkedIn Data | Springer International Conference on Emerging Research in Computing, Information, Communication and Applications Nitte Meenakshi Institute of Technology, Bangalore ERCICA-2015 31 July - 01 August, 2015 pp. 1-9 | Puneet Garg Rinkle Rani Sumit Miglani |
27 | Big Data: An Introduction, Challenges & Analysis using Splunk | International conference on Advances in Computer Science and Information Technology (ACSIT), pp. 464-468, April 2015. | Satyam Gupta, Rinkle Rani |
28 | Performance analysis of LEACH and its variants | Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, IEEE, Karpagam College of Engineering, Coimbatore, 26-27th Feb, 2015, pp. 630-634. | Simmi Kansal, Tarunpreet Bhatia, Shivani Goel |
29 | Trust based energy efficient routing in LEACH for wireless sensor network | Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE, Noorul Islam University, Tamil Nadu 23-24th April, 2015, pp. 361-365. | Arzoo Miglani, Tarunpreet Bhatia, Shivani Goel |
30 | Intelligent Agent in Scheduler Cum Emailer Application | Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE, Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 260-266(Elsevier). | Rupal Bansal, Shivani Goel |
31 | Speech Emotion Classification using EEMD, SVM and ANN | Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE , Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 336-341(Elsevier) | Manisha, Shivani Goel |
32 | Multistage Learning Model for Better Learning: A Cognitive Science Perspective | IEEE international Conference on MOOC, Innovation and Technology in Education 2014, Organized by Thapar Institute of Engineering & Technology, Patiala, Dec 19-20, 2014, pp. 386-389 | Shivani Goel, Deepak Garg |
33 | A Comprehensive Study on Clustering Approaches for Big Data Mining | International Conference on Electronic and Communication Systems (ICECS), organized by Karpagam College of Engineering, Coimbtore, 26-27th Feb, 2015, pp. 1333-1338 | Divya Pandove, Shivani Goel |
34 | A Model for Predicting the Eligibility for Placement of Students Using Data Mining Technique | International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 114-117 (IEEE Explore) | Mansi Gera and Shivani Goel |
35 | CSAAES: An Expert System for Cyber Security Attack Awareness | International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 242-245, IEEE Explore | Cheshta Rani and Shivani Goel |
36 | Challenges and Issues in Underwater Acoustics Sensor Network | International Conference on Parallel Distributed and Grid Computing (PDGC2014), December 11-13, 2014, Solan, pp 251-255 | Himanshu Jindal, Sharad Saxena, Singara Singh Kasana |
37 | A Noval Image Zooming Approach using Wavelet Coefficients | Recent Cognizance in Wireless Communication & Image Processing (ICRCWIP2014), January 16-17, 2015, Jaipur. | Himanshu Jindal, Singara Singh Kasana, Sharad, Saxena |
38 | Tree Based Energy Efficient Routing Scheme for Body Area Network | International Conference on Advances in Computer Engineering and Applications (ICACEA, IMS Engineering College, Ghaziabad, India, March 2015,pp.140-147 | Priya Juneja and Sushma Jain |
39 | Fuzzy Based Expert System for Diabetes Diagnosis and Insulin Dosage Control | International Conference on Computing, Communication and Automation (ICCCA), Galgotias University, Noida, 2015, pp. 262-267 | Neeru Lalka and Sushma Jain |
40 | Selecting a set of appropriate metrics for detecting code clones | 2014 Seventh International Conference on Contemporary Computing (IC3),Noida, Aug. 7, 2014 to Aug. 9, 2014, pp. 484-488. | Geetika Bansal ,Rajkumar Tekchandani |
41 | An approach to rank code clones for efficient clone management | 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bangalore, 10-11 Oct. 2014, 1 - 5 | R.Garg, Rajkumar Tekchandani |
42 | A Hybrid Approach to Detect Code Clones | In Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), India, August 2014. | Surbhi Sonika , Rajkumar Tekchandani |
43 | Enhanced MFCC algorithm using look up table and Kaiser window | Proceedings of Second IRF International Conference on 10th August 2014, Cochin, India, pp.144-149. | Vikram Ojha, Rajkumar Tekchandani. |
44 | Automated Leukaemia Detection Using Microscopic Images | Procedia Computer Science, Volume 58, 2015, Pages 635-642 | Ashutosh Mishra, Nimesh Patel |
45 | Multi agent paradigm used to complexity measure for perfective software maintenance | Computer Science and Engineering (APWC on CSE), 2014 Asia-Pacific World Congress, Fiji, 2014. IEEE Xplore: DOI: 10.1109/APWCCSE.2014.7053834 | Ashutosh Mishra, Vinayak Srivastava |
46 | Securing mobile agent's information in ad-hoc network | CONFLUENCE-2014 pp. 442-446, (IEEE), Amity University, Noida | Jasleen Kaur, Sharad Saxena, Mohd Abuzar Sayeed |
47 | Challenges and issues in underwater acoustics sensor networks: A review | International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan | Jindal Himanshu, Saxena Sharad, Singh Singara |
48 | Acoustic communication characteristics in UWDBCSN | International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan | Saxena Sharad, Mehta Deepak, Kaur Jasminder, Jindal Himanshu |
49 | A Survey- Academic Demolition via Internet Addiction | 2nd International Conference on Computing for Sustainable Global Development (INDIACom-2015), pp 210-215 (IEEE), Bharti Vidyapeeth, New Delhi | Vishal Kohli, Sharad Saxena, Jagdish Patni |
50 | Dependncy Mapper and ACO based Efficient Job Scheduling and Load Balancing in Green Clouds | IC3I, Mysore, Nov.27-29 | Supriya Kinger, Anju Sharma |
51 | SQL2Neo: Moving Health-care Data from Relational to Graph Databases | Advance Computing Conference (IACC), 2015 IEEE International , vol., no., pp.721,725, 12-13 June 2015 doi: 10.1109/IADCC.2015.7154801 |
Manpreet Singh, Karamjit Kaur |
52 | Integration of heterogeneous databases | Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in, vol., no., pp.1033,1038, 19-20 March 2015 doi: 10.1109/ICACEA.2015.7164859 | Binny Garg, Karamjit Kaur |
53 | Jellyfish Attack in MANETs: A Review | ICECCT 2015, Coimbatore (IEEE) | Simranpreet Kaur, Anil Kumar Verma, Rupinderdeep Kaur |
54 | A Context Sensitive Thresholding Technique for Automatic Image Segmentation | ICCIDM 2014 Conference, VSSUT, Odhisa, India, December 20-21(2014),Computational Intelligence in Data Mining - Volume 2,Smart Innovation, Systems and Technologies Volume 32, 2015, pp 19-25 | Anshu Singla, Swarnajyoti Patra. |
55 | Bringing closer to the Cultural Roots through Cultural Computing: Detailed Analysis of movie ‘Chaar Sahibzaade’ | National Conference on Advances in Engineering, Technology & Management (AETM’15) MMU Ambala, 4th April 2015, pp 09-14 | Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur |
56 | Topic sensitive web page ranking through. Graph database | Third International conference on emerging research in computing, information, communication and applications ercica-2015, NITTE Meenakshi Institute of Technology Yelahanka, bangalore-560 064. India, 31st July 2015, pp 519-527 | Alok Gupta, Harkiran Kaur, Shalini Batra |
57 | Wormhole and Sybil Attack in WSN: A Review | INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, Bharati Vidyapeeth, New Delhi, 11 – 13 March 2015. pp. 166-170. | Svarika Goyal, Tarunpreet Bhatia, A.K Verma |
58 | A Hybrid Approach for Data Clustering using Expectation-Maximization and Parameter Adaptive Harmony Search Algorithm. | International Conference on Future Computational Technologies,Singapore, 2015, pp.61-67. | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
59 | Swarm Intelligence and Flocking Behaviour | ICAET-2015, BGIET, Sangrur, Date: 20-21 March 2015, Paper ID:183 | Himani , Ashish Girdhar |
60 | Chapter titled “Trust Calculation using Fuzzy Logic in Cloud Computing” | Book titled “Handbook of Research on Security Considerations in Cloud Computing” | Ms. Rajanpreet Kaur Chahal, Dr. Sarbjeet Singh |