S. No. | Title of the paper | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1. | Web services classification using machine learning models | In Proc: ICEMS-2016, Jaipur National University, Jaipur, 17-19 March 2016 | K. C. Bhardwaj, R. K. Sharma |
2. | A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds | 4th International Conference on Advancements in Engineering & Technology (ICAET-2016) Sangrur, Punjab, India Volume 57 March 18-19, 2016 DOI: 10.1051/matecconf/20165702008 |
Rajesh Kumar Ashok Kumar Anju Sharma |
3. | An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET | 11th IEEE International conference on Green Computing and Communications, GreenCom 2015, Sydney Australia. | Amit Dua, Neeraj Kumar, and Seema Bawa |
4. | Optimal Time Dependent Pricing Model for Smart Cloud with Cost Based Scheduling. | Third International Symposium on Women in Computing and Informatics (WCI '15), Indu Nair (Ed.). ACM, New York, NY, USA, 522-526. | Chetan Chawla and Inderveer Chana |
5. | Energy Conscious Allocation and Scheduling of Deadline-Bound Tasks in ICT Cloud Paradigm | Proceeding of the International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2015), Springer International Publishing, (2015). | Tarandeep Kaur and Inderveer Chana |
6. | Wormhole and Sybil attack in WSN: A review | Computing for Sustainable Global Development (INDIACom), 2015 2nd . | S Goyal, T Bhatia, AK Verma |
7. | Integrated fleet of electric vehicles as a frequency regulation agent in the grid | IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-7 | Rubi Rana,Kuljeet Kaur, Mukesh Singh, Neeraj Kumar, Praveen Kumar |
8. | A novel smart meter for better control over devices including electric vehicles and to enable smart use of power in smart home | IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 | Nand Nandan Arora, Anish Jindal, Mukesh Singh, Neeraj Kumar, Praveen Kumar |
9. | A novel central energy management system for smart grid integrated with renewable energy and electric vehicles | IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 | Sumedha Sharma, Amit Dua, Surya Prakash, Neeraj Kumar, Mukesh Singh |
10 | MongoDB vs SQL : A case study on electricity data | International Conference on Emerging Research in Computing, Information, Communication and Applications, (ERCICA 2015), Bangalore. | Jatin, Shalini Batra |
11 | Topic Sensitive Web Page Ranking Through Graph Database | International Conference on Emerging Research in Computing, Information, Communication and Applications 2015, pp. 519-527 | Alok Gupta, Harkiran Kaur, Shalini Batra |
12 | Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data structure and Graph Database | In 5th International Conference on Advances in Computing and Communications (ICACC-2015) IEEE, 2015 | Ashish Sharma, Shalini Batra |
13 | XML based Wireless Patient Monitoring System using Vehicular AdHoc Networks | 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), October,2015, Liverpool, UK | Avleen Kaur Malhi;Shalini Batra |
14 | Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People | Elsvier Sponsored Twelfth International Conference on Communication Networks, ICCN 2016, August 19– 21, 2016, Bangalore, India | Khushdeep Kaur, Parteek Kumar |
15 | Effect of Rumor propagation on the stock market dynamics using cellular automata | International Conference on Inventive Computation Technologies. IEEE – 2016 | P. Vij and A. Kumar |
16 | Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction”, International Conference on Inventive Computation Technologies | ICICT 2016 | Nikita Tyagi and Ajay Kumar |
17. | “B-cell and T-cell leukemia classification using PCA, Genetic Algorithm , ANN and SVM | 3rd International Conference on Microelectronics Circuit and Systems. | Sakshi Sharma and Ajay Kumar |
18. | An Efficient Trust Management Algorithm in Wireless Sensor Network | Emerging Research in Computing, Information and Applications, ERCICA 2015, Vol. 3, pp. 281-287 | Monia Bajaj, Sukhchandan Randhawa, Sushma Jain |
19. | School Bus Routing Based on Branch & Bournd Approach | Computer Communication and Control (IC4), 2015,pp.1-4 | Yash Kumar, Sushma Jain |
20. | Auction based resource allocation strategy for infrastructure as a service | 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) | Anita Kumari, Sushma Jain |
21. | Adaptive Word Recommender System with Fastest Data Structure for Devanagari Script | IEEE International Symposium on Advanced Computing & Communication, 2015, Assam University, Silchar, Assam, India, Sep 14-15, 2015 | Prem Narayan Yadav, Karun Verma |
22. | Associative Memory Model for Distorted On-line Devanagari Character Recognition | The Fifth International Conference on Advances in Computing and Communications (ACC-2015), 2-4 September 2015 in Kochi, Kerala, India | Gaurav Pagare, Karun Verma |
23. | Spam Filtering Using Hybrid Local-Global Naive Bayes Classifier | International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, 10-13 Aug. 2015, SCMS, Aluva, Kochi PP 829-833 | Rohit Solanki, Karun Verma, Ravinder Kumar |
24. | Securing IoT devices using JavaScript based Sandbox |
International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT-2016), IEEE. |
Ayush Sahu and Ashima Singh |
25. | A novel technique of sentiment detection for microblogging sites |
IEEE-3rd International Conference on Microelectronics, Circuits and Systems, Micro2016 |
Neetika Bansal, Ashima Singh |
26. | A review on Sentiment Analysis using machine learning approaches |
International Conference on Inventive Computation Technologies, ICICT 2016 |
Neetika Bansal, Ashima Singh |
27. | Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter | IEEE International Conference on Inventive Computation Technologies (ICICT 2016) | Mohit Mertiya and Ashima Singh |
28. | Optimization of Load Balancing in Parallel Machines using Ant Colony | ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, Circuits and Systems, 9-10th July, 2016, Kolkata. | Balram Kishan, Ashima Singh |
29. | Optical Character Recognition Using Template Matching and Back Propagation Algorithm | International Conference on Inventive Computation Technologies (ICICT 2016). | Swapnil Desai and Ashima Singh |
30. | Complete Survey of 3D Model Generation | International Conference on Innovations in Information, Embedded and Communication Systems, vol. 4, pp. 2013-2015, March 2016 | K. Jain, H. S. Pannu, V. Bassi |
31. | Mining Data with Categorical Attributes: A Glance | IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 | Maninder Kaur, Avneet kaur |
32. | Evolutionary Approaches For Association Rule Mining : A Survey | IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems, ,2016 | Maninder Kaur, Aanchal Gupta |
33. | A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout | IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems, ,2016 | Maninder Kaur, Amanpreet Singh |
34. | Multimedia Security through LSB Matching | Proceedings of the Second International Conference on Information and Computing, March 2016 | Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj |
35. | A lossless Data Hiding method based on inverted LSB technique | Third International Conference on Image Information Processing, Dec 2015 | Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj |
36. | Enhanced the security of image steganography through image encryption | 2015 Annual IEEE India Conference (INDICON | Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj |
37. | Interpolation based Reversible Data Hiding Scheme for Digital Images | 21st Western Canadian Conference on Computing Education, May 06-07, 2016, Kamloops, BC, Canada | Singara Singh Kasana and Pankaj Garg |
38. | Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey | Innovations In Information Embedded And Communication System Coimbatore ,India,17th-18th March,2016 pp.349-353 | Robin Singla and Sunita Garhwal |
39. | Application of Rough Finite State Automata in Decision Making | International Conference on Emerging Trends in Computing Nasik, India,10th-11th June, 2016 | Swati Gupta and Sunita Garhwal |
40. | Real Time Hand Gesture Recognition Based Interface for Microsoft Word Document Handling | Advances in Intelligent Systems and Computing Series,Springer,2015 | Kapil Yadav and Jhilik Bhattacharya |
41. | Encoded Scene Panorama based Information Flow in a Multi Agent System | Advances in Intelligent Systems and Computing Series, Springer,2015. | Sachin Meena and Jhilik Bhattacharya |
42. | Optimized Virtual Honeynet withImplementation of Host machine as Honeywall | 12th IEEE International Conference, INDICON, 2015 | Gautam, R., Kumar. S, & Bhattacharya J |
43. | SMS Spam Detection for Indian Market | IEEE International Conference on Next Generation Computing Technologies NGCT 15, Dehradun | Sakshi Aggarwal, Sanmeet Kaur |
44. | Antispammer for Mobile Messages, | ICCCT '15 Sixth International Conference on Computer and Communication Technology, Allahabad, India, Sep 2015, | Sakshi Aggarwal, Sanmeet Kaur |
45. | A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm | Poster presentation at Security and Privacy Symposium 2016, Feb 13, 2016 in IIIT Delhi. | Rohini Rajpal, Sanmeet Kaur |
46. | Loan approval prediction based on machine learning approach | National conference on recent trends in computer science and information technology(NCRTCSIT2016,Apr 2016 | Arun Kumar, Ishan Garg, Sanmeet Kaur |
47. | Software Perspective to Underwater Acoustic Sensors Network | International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 187-191, NGCT-2015 (IEEE) | Ghanshyam Maurya, Himanshu Jindal, Sharad Saxena |
48. | Intrusion Detection System based on Software Defined Network Firewall | International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 379-382, NGCT-2015 (IEEE). | Mohd. Abuzar Sayed, Sharad Saxena |
49. | Health Demolition via Social Websites and E-Contents Addiction | Shannon100, LPU, Phagwara. (SCOPUS) | Sharad Saxena, Vishnu Shankar, Deepak Mehta, Shilpi Saxena |
50. | Vector Based Sensor Ranking in Internet of Things | IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), Chennai, India. (SCOPUS) | Neha, Sharad Saxena |
51. | A New Conception of Information Requisition in Web of Things | Shannon100, LPU, Phagwara. (SCOPUS) | Avaneesh K Yadav, Sharad Saxena |
52. | Automated Leukaemia Detection Using Microscopic Images | Procedia Computer Science, Volume 58, 2015, Pages 635-642 | Ashutosh Mishra, Nimesh Patel |
53. | Student Performance Measure By using Different classification methods of data mining | 2016 International conference of advanced communication, control &computing technologies | Neha Chaudhary,Ashutosh Mishra |
54. | S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks | 2016 International Conference on Inventive Computation Technologies (ICICT) | Aditi Hans, Ashutosh Mishra |
55. | Improved Grey Wolf Algorithm for Optimization Problems | International Symposium on Fusion of Science and Technology, New Delhi, 2016, pp. 428-433 | Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra |
56. | Effective Test Case Generation for Load Testing of Web Server using River Formation Dynamics. | International Conference on Electrical, Electronics, Computer Science, Management and Mechanical Engineering under International Institute of Technology and Research. | Gurleen Kaur and Rupinderdeep Kaur |
57. | Implementation of Phonetic Level Speech to text Recognition System for Punjabi Language. | International Conference on Data Science and Engineering. (IEEE), DTU, 13th august, 2016 | Shama Mittal, Rupinderdeep Kaur |
58. | An Assessment of Intelligent Access Tools for Creating Digital Diasporas | International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, Feb. 24-26, 2016. | Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur |
59. | Trust Based Security in Opportunistic Networks: A Survey | IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 634-638. | Gurleen Kaur, Tarunpreet Bhatia |
60. | Artificial Intelligence Based IDS in VANETS: A Review | IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 561-566. | Ritu Rani, Tarunpreet Bhatia |
61. | A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system | IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 639-644. | Mannat Aneja, Tarunpreet Bhatia |
62. | AHP-Based Ranking of Cloud Service Providers | Conference on Information Systems Design and Intelligent Applications, Springer,8th-9th January, 2016, pp 491-499 | Rajanpreet Kaur Chahal, Sarbjeet Singh |
63. | Fuzzy Logic and AHP based Ranking of Cloud Service Providers | Conference on Computational Intelligence in Data Mining, Springer, 5th-6th December, 2015, pp 337-345 | Rajanpreet Kaur Chahal, Sarbjeet Singh |
64. | A review - Fuzzy Time Series Forecasting Model | ICIIECS'16. | Alok Tripathi, HS Pannu |
65. | High-order fuzzy time series forecasting model for advance prediction of temperature | ICICT2016 | Alok Tripathi, HS Pannu |
66. | Enhancement of Image Resolution: A Survey | Communications on Applied Electronics (CAE) July 2016. | Dimple Mittal, HS Pannu |
67. | Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD | ICICT 2016 | Rishika Mehta, HS Pannu |
S. No. | Title of the paper | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1 | Social Media Spam Detection Using Fuzzy String Matching | International Conference on Fuzzy Systems and Social Media, Amity University, Noida, 2015 | Alok Kumar, Maninder Singh |
2 | Analyze university network traffic to explore usage behaviour and to detect malicious activities | 1st International Conference on Next Generation Computing Technologies (NGCT), 2015 | Harleen Gill, Maninder Singh |
3 | Behavior analysis of malware using machine learning | Eighth International Conference on Contemporary Computing (IC3), 2015 | Arshi Dhammi, Maninder Singh |
4 | Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections | International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015 | Pradeep Kumar, Maninder Singh |