S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors |
---|---|---|---|
1. | Trust Models in Cloud Computing: A Review | International Journal of Wireless and Microwave Technologies, Vol. 7, No. 4, pp. 14-27, 2017 | Ritu, Sukhchandan Randhawa, Sushma Jain |
2. | A Comparative Analysis of Optimization Solvers. | Journal of Statistics and Management Systems,20 (4), pp.623-635,2017 | Rimmi Anand, Divya Agarwal and Vijay Kumar |
3. | A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks | Recent Patents on Engineering, vol 11, 2017 | Tarunpreet Bhatia, A.K. Verma, Gaurav Sharma, Suman Bala |
4. | A review on Data mining based Intrusion Detection Systems | "International Journal of Control Theory Applications",2017 | Vidhi, Rajanpreet Kaur Chahal, Niyati Baliyan |
5. | A Survey on Scheduling techniques in Cloud Computing | International Journal of Recent Trends in Engineering and Research (IJRTER) journal,vol. 3, no. 7, pp. 303-311,2017 | Pratisha Sharma, Dr. InderveerChana and Dr. AnjuBala |
6. | A Variational framework for low dose sinogram restoration | Int. J. Biomedical Engineering and Technology (IJBET), Vol 24, No. 4, Pp356-367, 2017 | Shailendra Tiwari |
7. | An Automatic Leaf Disease Detection System for Legume Species | Journal of Biology and Today's World, 6(6), 115-122, 2017 | Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
8. | An Energy Efficient and Trust Aware Framework for Secure Routing in Leach for Wireless Sensor Networks | Scalable Computing: Practice and Experience, 207-218 & 17, 2017 | Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava |
9. | An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor | Scalable Computing: Practice and Experience, 2017 | Miglani, Arzoo, Tarunpreet Bhatia, Gaurav Sharma, and Gulshan Shrivastava |
10. | Android GUI testing and tools | International Journal of Research in Computer Science (IJRCS),Volume 04, Issue 2 Paper 22, ISSN no. 2349-3828, Page No. 97-99, 2017 | Sumit Pal, Ashish Aggarwal |
11. | Application wise Annotations on Intelligent Database Techniques | Journal for Research, 19-21, Vol. 3 Issue 10, 2017 | Supreet Kaur, Harkiran Kaur |
12. | Commentary Upon Role of Neural Networks in Supervised Machine Learning | International Journal of Advanced in Management, Technology and Engineering Sciences,160-166, Vol. 7 Issue 12, 2017 | Palak Bansal, Harkiran Kaur |
13. | Comparing UWDBCSN Clustering with LNCA for Node Replication Attack | Journals of Mobile Computing, Communication & Mobile Networks, 41-49, (4), 2017 | Harpreet Kaur, Sharad Saxena |
14. | COMPREHENSIVE REVIEW OF AES AND RSA SECURITY ALGORITHMS IN CLOUD COMPUTING | Global Journal of Engineering Science and Research Management ,63-68, 4(12), 2017 | Shubham Kansal, Harkiran Kaur |
15. | Design of Reliable Capacitated Facility Protection in Distribution Centres | Procedia Computer Science, 115, pp.312-321 , 2017 | Rimmi Anand, and Vijay Kumar |
16. | Grey Wolf-based Clustering Technique. | Journal of Intelligent Systems, Vol. 26(1), pp.153-168, 2017 | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
17. | Investigative Analysis on Data Mining Techniques | Journal for Research, 32-34, Vol. 3 Issue 10, 2017 | Kartik Jaitly, Harkiran Kaur |
18. | Mobile Agent Based Communication using AES and RSA | Journal of Multimedia Technology & Recent Advancements, 6-16, (4), 2017 | Mandeep Kaur, Sharad Saxena |
19. | Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms | Journal of Intelligent Systems,Vol. 26(3), pp.483-503, 2017 | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
20. | STAR: SLA-aware Autonomic Management of Cloud Resources | IEEE Transactions on Cloud Computing, 2017 | Sukhpal Singh, Inderveer Chana and Rajkumar Buyya |
21. | Prediction of Sentiment from Macaronic Reviews | Informatica: An International Journal of Computing and Informatics, vol.42, no. 1, pp. 127-136, 2018 | Sukhnandan Kaur, Rajni Mohana |
22. | An Allotment of H1B Work Visa in USA using Machine Learning | International Journal of Engineering & Technology, 2018 | Pooja Thakur, Mandeep Singh, Harpreet Singh,Prashant Singh Rana |
23. | An effective approach for semantic-based clustering and topic-based ranking of web documents | JDSA, Springer, 1-16, Vol 5 (issue 2)2018 | R.K.Roul |
24. | An effective topic-based ranking technique for categorised research articles | IJCSE, Inderscience, 35-45, Vol 4(issue 1),2018 | R.K.Roul, J.K.Sahoo |
25. | An improved hybrid illumination normalization and feature extraction model for face recognition | International Journal of Applied Pattern Recognition, 2018 | Jyotsna Yadav, Navin Rajpal, Rajesh Mehta |
26. | Complex Diffusion Regularization based Low dose CT Image Reconstruction | Int. J. Biomedical Engineering and Technology , Inderscience, 2018 | Kavkirat Kaur, Shailendra Tiwari |
27. | Detecting spam web pages using multilayer ELM | IJBDI, Inderscience,49-61, Vol 5(issue 2), 2018 | R.K.Roul |
28. | Evolving state grammar for modeling DNA and RNA structures | International Journal of Engineering & technology, 2018 | Ajay Kumar, Nidhi kalra and Sunita Garhwal |
29. | Fingerprint image enhancement techniques : A survey | International journal of innovations and advancement in computer science (IJIACS),Volume 7,Issue 3, 2018 | Monty singh and Ashish Girdhar |
30. | Statistical Dimension Identification and Implementation for Student Progression System | INTERNATIONALJOURNAL OFINNOVATIVETECHNOLOGY ANDCREATIVEENGINEERING,VOL.8 NO.5 pp. 480-484, 2018 | Harkiran Kaur, Aanchal Phutela |
31. | Implementing Fuzzy Technique to Expert System - A Case Study on Salt Analysis | International Journal of Applied Engineering Research, Volume 13, Number 11 pp. 9474-9479, 2018 | Kriti Asija, Harkiran Kaur |