1 |
Modified Single Pass Clustering with Variable Threshold Approach |
International Journal of Innovative Computing, Information and Control 11(1), 375-86, 2014 |
Mamta Mittal; V P Singh; R K Sharma |
2 |
Validation of k-means and threshold based clustering methods |
International Journal of Advancements in Technology, 5(2), 153-60, 2014 |
Mamta Mittal; VP Singh; R K Sharma |
3 |
Predicting gender using IRIS images |
Res Journal of Recent Sciences 3(4), 20-26, 2014 |
Atul Bansal; R Agarwal; R K Sharma |
4 |
Regression models for the prediction of compressive strength of concrete with and without fly ash |
International Journal of Latest Trends in Engg and Tech, 3(4), 400-6, 2014 |
Palika Chopra; Maneek Kumar; R K Sharma |
5 |
Predicting compressive strength of concrete for varying workability using regression models |
International Journal of Engg and Applied Sciences, 6(4), 10-22, 2014 |
Palika Chopra; Maneek Kumar; R K Sharma |
6 |
Segmentation of isolated and touching characters in offline handwritten Gurmukhi script documents |
International Journal of Information Tech and Comp Science, 2, 58-63, 2014 |
Munish Kumar; M K Jindal; R K Sharma |
7 |
A Query-Context oriented Approach to Semantic Search on Web |
International Journal of Artificial Intelligence and Knowledge Discovery Vol.5, Issue 1, Jan 2015. |
Vikas Jindal, Seema Bawa, Shalini Batra |
8 |
Web presence of Indian Digital Culture |
Digital Technology and Culture, June 2015, De Gruyter |
Seemu Sharma, Hitashi Lomash, Seema Bawa |
9 |
An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks |
Mobile Netw Appl (2015) 20:181–200 DOI 10.1007/s11036-015-0588-1, Published online: 18 March 2015 © Springer Science+Business Media New York 2015. |
Amit Dua, Neeraj Kumar, Seema Bawa |
10 |
Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks |
IT Convergence Practice, 2(3), pp. 24-33, 2014. |
Vishal Sharma Rajesh Kumar |
11 |
A Secure Opportunistic service dissemination over Flying Ad Hoc Networks. |
ACM security Symposium , IIT Delhi Feb. 2015 |
Vishal Sharma Rajesh Kumar |
12 |
Feasibility of Public Key Cryptography in Wireless Sensor Networks. |
International Journal of Theoretical Physics and Cryptography, Vol. 7, 2014 |
Mandal Murari, Gaurav Sharma, Suman Bala, and Anil K. Verma. |
13 |
Modified Single Pass Clustering with Variable Threshold Approach |
International Journal of Innovative Computing, Information and Control, pg375-386, 11(1), 2015 |
Mamta Mittal, R.K.Sharma and V. P. Singh |
14 |
A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM |
CIT Journal of Computing and Information Technology, pp. 45-55 Vol 22 2014 |
Bhawna Mallick, Deepak Garg, P S Grover |
15 |
Recommender System using Collaborative Filtering and Demographic Characteristics of Users |
International Journal of Recent and Innovative Trends in Computing and Communication (IJRITCC) ISSN 2321-8169 |
Shano Solanki and Shalini Batra |
16 |
Data Mining – Techniques, Methods and Algorithms: A Review on Tools and their Validity |
International Journal of Computer Applications, Vol. 113, No. 18, pp. 22-29, March 2015(Impact factor 0.715). |
Mansi Gera, Shivani Goel |
17 |
Image Super Resolution using Fusion of Images |
International Journal of Image and Data Fusion, Vol. 6, pp. 1-11, 2015 DOI:10.1080/19479832.2015.1046954 |
Chirag Garg, Singara Singh Kasana |
18 |
Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations |
Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 |
Tannu Singla, Ajay Kumar, Sunita Garhwal |
19 |
A Cuckoo Search based Approach for solving Standard Cell Placement Problem |
Journal of VLSI Design Tools & Technology,4,1-7,2014Maninder Kaur, Amanpreet Singh |
Maninder Kaur, Amanpreet Singh |
20 |
Recognition of Multi-Stroke Based Online Handwritten Gurmukhi Aksharas |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, Springer, 2015, 85, 159-168 |
Kumar, R.; Sharma, R. K. & Sharma, A. |
21 |
Enhancement of Compatibility and Performance of Component Based Softwares by Deactivating Non-Participating / Non-Functional Components |
European Journal of engineering and technology |
Jasneet Chawla and Ashima Singh |
22 |
Cost reduction techniques of CBSE Software while retaining high performance |
International Journal of Business Management and Scientific Research |
Neeraj Gupta and Ashima Singh |
23 |
A Survey on Regression Test Techniques of Component-Based Softwares |
International Journal of Advanced Research in Computer Science and Software Engineering . |
Jasneet Chawla and Ashima Singh |
24 |
Scrutinize: Fault Monitoring for Preventing System Failure in Cloud Computing |
International Journal of Innovations & Advancement in Computer Science IJIACS,PP: 211-219, Volume 4, 2015. |
Anu and Anju Bala |
25 |
Fault Tolerance Against Crash Failures of Name Nodes of Hadoop By Using Load balancing Techniques |
International Journal of Engineering Research and Technology, Volume 8, 2015 |
Rajeev Kapoor, Ms. Anju Bala |
26 |
A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. |
Computer Fraud & Security, 2015(2), 10-16. |
Sanmeet Kaur, & Maninder Singh |
27 |
Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations |
Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 |
Tannu Singla, Ajay Kumar, Sunita Garhwal |
28 |
Video compression using steganographic Techniques |
International Journal of Innovations & Advancement in Computer Science , Vol. 4,40-46, May 2015. |
Sachin Meena and Jhilik Bhattacharya |
29 |
HCI System for Windows Application |
International Journal of Innovations & Advancement in Computer Science , Vol. 4,47-53, May 2015 |
Kapil Yadav and Jhilik Bhattacharya |
30 |
Differential Search for Multiobjective Problems |
Procedia Computer Science, Vol. 48, pp. 22-28, 2015 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
31 |
Comparative Analysis of MySQL and MongoDB : A Case Study of Hospital Management System |
International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1515-1526. |
Dhulfiqar Hazim, Karamjit Kaur |
32 |
Comparative analysis of ECC and RSA for Document-oriented database MongoDB |
International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1555-1560. |
Saurabh Singh, Karamjit Kaur |
33 |
Steganography Technique for JPEG2000 Compressed Images using Histogram in Wavelet Domain |
International Journal of Security and its Applications, Vol 8, Issue 6, pp. 211-224, 2014.(Scopus indexed) |
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia |
34 |
Energy Efficient Load Balanced Multipath Routing in MANET |
International Journal Of Engineering And Computer Science, vol. 4, pp. 12557-12562, 2015. |
Simranjeet Kaur, Suveg Moudgil, Tarunpreet Bhatia |
35 |
Simulation Analysis of MANET Routing Protocols under Different Mobility Models |
International Journal of Wireless Communications and Network Technologies, vol. 4, pp. 1-8, 2015. |
Munish Sharma, Manish Kansal, Tarunpreet Bhatia |