Research & Publications

RESEARCH
SPOTLIGHT
145+

Journal
Publication

108+

Conference
Proceedings

28+

Books & Chapters

Research and innovation is an integral part of Amity University. AIIT actively promotes research among its staff and students. Students write research papers as a component of their education programme itself. Teachers conduct research as an integral part of their responsibilities since this enables them to assimilate and disseminate the knowledge as well as generate new knowledge.

 

The faculty are encouraged to publish their findings in reputed journals and present papers at conferences. Support is given to participate in national and international conferences and thereby network with experts from India and abroad.



Sr. No. Title Name of Author/Faculty Name of Journal Year of Publication ISSN/ ISBN Number National/ International
1 A Deep Neural Network based Model for Named Entity Recognition for Hindi Language Dr. Ramesh C. Poonia Neural Computing and Applications (NCAA), Springer Nature 2020 0941-0643 International
2 Gesture image segmentation with Otsu’s method based on noise adaptive angle threshold Dr. Ramesh C. Poonia Multimedia Tools and Applications, Springer 2020 13807501 International
3 A Review Study of Modified Swarm Intelligence: Particle Swarm Optimization, Firefly, Bat and Gray Wolf Optimizer Algorithms Dr. Ramesh C. Poonia Journal of Recent Patents on Computer Science, Bentham Science 2020 2666-2566 International
4 Suicidal ideation prediction in twitter data using machine learning techniques Dr. Ramesh C. Poonia Journal of Interdisciplinary Mathematics, Taylor & Francis 2020  0972-0502 International
5 Modified differential evolution algorithm for solving minimum spanning tree Dr. Ramesh C. Poonia Journal of Information and Optimization Sciences, Taylor & Francis 2020 0252-2667 International
6 Realistic Analysis of Reactive Routing Protocols for Rajiv Chowk [NCR] Flyove Dr. Ramesh C. Poonia International Journal of Sensors, Wireless Communications and Control, Bentham Science 2020 2210-3287 International
7 Selection of optimized features for fusion of palm print and finger knuckle-based person authentication Dr. Ramesh C. Poonia Expert Systems Journal, Wiley 2020 1468-0394 International
8 A new family of Distribution with application on two real datasets on survival problem Dr. Yudhveer Singh Science & Technology Asia 2020 2586-9027 International
9 A Review Study of Modified Swarm Intelligence: Particle Swarm Optimization, Firefly, Bat and Gray Wolf Optimizer Algorithms Dr. Yudhveer Singh Recent Advances in Computer Science and Communications 2020 1874-4796 International
10 Boundary Detection to Segment the Pectoral Muscle from Digital Mammograms Images Dr. Yudhveer Singh International Journal of Engineering and Advanced Technology 2020 2249-8958 International
11 Boundary Detection to Segment the Pectoral Muscle From Digital mammogrames Images Mr. Sameer Saxena International Journal of Engineering and Advanced Technology 2020 2249-8958 International
12 Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition towards Internet of things Dr. Ramesh C. Poonia Recent Patents on Computer Science, Bentham Science 2019 1874-4796 International
13 An enhanced quantum key distribution protocol for security authentication Dr. Ramesh C. Poonia Journal of Discrete Mathematical Sciences and Cryptography, Taylor & Francis 2019 0972-0529 International
14 Cyber-Squatting: A Cyber Crime more than a Unethical Act Dr. Ramesh C. Poonia International Journal of Social Computing and Cyber-Physical Systems  (IJSCCPS),  Inderscience 2019 2040-0721 International
15 Design a New Protocol and Comparison with B92 Protocol for Quantum Key Distribution Dr. Ramesh C. Poonia International Journal of Internet Protocol Technology (IJIPT), Inderscience 2019 1743-8209 International
16 Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model Dr. Ramesh C. Poonia International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 2278-3075 International
17 An improved chaotic-based African buffalo optimisation algorithm Dr. Ramesh C. Poonia International Journal of Innovative Computing and Applications, Inderscience 2019 1751-6498 International
18 State of the Art and Gap Analysis of Precision Agriculture: A Case Study of Indian Farmers Dr. Ramesh C. Poonia International Journal of Agricultural and Environmental Information Systems (IJAEIS), IGI Global 2019 1947-3192 International
19 Risk based ERP Implementation framework for Higher Education Institutions Dr. Swapnesh Taterh International Journal of Pure and Applied Mathematics 2019 1314-3395 International
20 An Enhanced Algorithm of Congestion Control for Transport Layer in Wireless Ad Hoc Network Dr. Swapnesh Taterh International Journal of Emerging Technology and Innovative Research 2019 2349-5162 International
21 Various Techniques Used For Emotion Detection from Speech Dr. Swapnesh Taterh International Journal of Emerging Technology and Innovative Research 2019 2349-5162 International
22 Various Techniques Used For Emotion Detection from Speech Dr. Swapnesh Taterh International Journal of Emerging Technology and Innovative Research 2019 2349-5162 International
23 An Efficient Method for Securing the e-payment System : Money Pad Dr. Swapnesh Taterh International Journal of Computing and Applications 2019 0973-5704 National
24 An Improved Chaotic-Based African Buffalo Optimization Algorithm Dr. Yudhveer Singh International Journal of Innovative Computing and Applications 2019 1751-6498 International
25 Analytical solution of generalized space-time fractional advection-dispersion equation via coupling of Sumudu and Fourier transforms Dr. Yudhveer Singh Frontiers in Physics 2019 2296-424X International
26 A New Approach to Solve Cattaneo-Hristov Diffusion Model and Fractional Diffusion Equations with Hilfer-Prabhakar Derivative Dr. Yudhveer Singh AIMS Mathematics 2019 2473-6988 International
27 On the Elzaki transform and its application in fractional free electron laser equation Dr. Yudhveer Singh Acta Univ. Sapientiae Mathematica 2019 2066-7752 International
28 TAAWUN: A Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles", Mobile Networks and Applications Furqan Alam, Rashid Mehmood, Iyad Katib, Saleh M. Altowaijri and Aiiad Albeshri Mobile Networks and Applications, Springer 2019

10.1007/

s11036-019-01319-2

International
29 A Study And Analysis For Congestion Control Model Using Bbr In Wireless Networks Scenario Dr. Girish Paliwal International Journal of Engineering Applied Sciences and Technology 2018 2455-2143 International
30 Congestion Control Algorithms Review and Analysis for Structured Wireless Network Dr. Girish Paliwal International Journal of Emerging Technologies and Innovative Research 2018 2349-5162 International
31 A Design and Implementation framework of Congestion Control Algorithm Module in the Network Simulator 3 (NS-3) Dr. Girish Paliwal International Journal of Computing and Applications 2018 0973-5704 International
32 Simulation Windows Size Quadric Increase Congestion Control Algorithm Implementation using NS3 in Wired Computer Networks Scenario Dr. Girish Paliwal International Journal of Computer Sciences and Engineering 2018 2347-2693 International
33 "“Water” Use it wisely WSN- Irrigation System (WSN-IS) for Smart Home Garden Dr. Ramesh C. Poonia Recent Patents on Engineering, Bentham Science 2018 1872-2121 International
34 Fast and Efficient Recovery of Root Node Failure in Spanning Tree Routing Protocol Dr. Ramesh C. Poonia Recent Patents on Computer Science, Bentham Science 2018 1874-4796 International
35 A Two Way Synchronized Quantum Channel Quantum Key Distribution Protocol Dr. Ramesh C. Poonia Recent Patents on Computer Science, Bentham Science 2018 1874-4796 International
36 A GA-QMR: Genetic Algorithm oriented MANET QoS Multicast Routing Dr. Ramesh C. Poonia Recent Patents on Computer Science, Bentham Science 2018 1874-4796 International
37 An era of Micro Irrigation – A priority driven approach to enhance the optimum utilization of Water and a way towards “intelligent farming” Dr. Ramesh C. Poonia Recent Patents on Computer Science, Bentham Science 2018 1874-4796 International
38 A Prototype Model for Decision Support System of NPK Fertilization Dr. Ramesh C. Poonia Journal of Statistics & Management Systems, Taylor & Francis 2018 0972-0510 International
39 Simulation of BB84 and proposed protocol for quantum key distribution Dr. Ramesh C. Poonia Journal of Statistics & Management Systems, Taylor & Francis 2018 0972-0510 International
40 Prediction of Software Reliability using Bio Inspired Soft Computing Techniques Dr. Ramesh C. Poonia Journal of Medical Systems, Springer 2018 0148-5598 International
41 Integration of traffic and network simulators for vehicular ad-hoc networks Dr. Ramesh C. Poonia Journal of Information and Optimization Sciences, Taylor & Francis 2018 0252-2667 International
42 Simulation Based Efficient Analysis of Radio Propagation Model using On-demand Routing Protocols in the Indian Automotive Networks Dr. Ramesh C. Poonia Int. J. Autonomous and Adaptive Communications Systems(IJAACS),  Inderscience 2018 1754-8640 International
43 Practical Aspects of Smart Gardening System Based on Priority Driven Scheduling to Utilize Resources at Optimum Level Dr. Ramesh C. Poonia ICIC Express Letters, Part B: Applications An International Journal of Research and Surveys, IEEE 2018 2185-2766 International
44 Automated Soil Prediction using Bag-of-Features and Chaotic Spider Monkey Optimization Algorithm Dr. Ramesh C. Poonia Evolutionary Intelligence, Springer 2018 1864-5917 International
45 Map Matching Algorithm: Trajectory and Sequential Map Analysis on Road Network Dr. Ramesh C. Poonia EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2018 2410-0218 International
46 Map Matching Algorithm: Curve Simplification for Frechet Distance Computing and Precise Navigation on Road Network using RTKLIB Dr. Ramesh C. Poonia Cluster Computing: The Journal of Networks, Software Tools and Applications, Springer 2018 1386-7857 International
47 Understanding Software Defined Networking: A Study on the existing software defined networking technologies and its security impact Dr. Swapnesh Taterh Journal of Convergence Computing 2018 2048-9137 International
48 Risk based ERP implementation framework for higher education institutions, Dr. Swapnesh Taterh Journal of Biology and Today’s World 2018 2322-3308 International
49 A Study And Analysis For Congestion Control Model Using BBR In Wireless Networks Scenario Dr. Swapnesh Taterh International Journal of Engineering Applied Sciences and Technology 2018 2455-2143 International
50 Congestion Control Algorithm : Review and Analysis of structured wireless network. Dr. Swapnesh Taterh International Journal of Emerging Technology and Innovative Research 2018 2349-5162 International
51 Analysis of Vulnerabilities Threat Attack over Network Architecture Dr. Swapnesh Taterh International Journal of Emerging Technology and Innovative Research 2018 2349-5162 International
52 Security attacks intrusions for wireless and wimax network Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science.Rajasthan Science Congress 2018 9788193575901 National
53 Ontology of XSS Vulnerabilities and its Detection Using XENOTIX Framework plus Prevention Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science. Rajasthan Science Congress 2018 9788193575901 International
54 Software Defined Networking – Imposed Security measures over Vulnerable threats and attacks Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science. 2018 9788193575901 National
55 A Scenario of Smart City Traffic Management System using Wireless Sensor Network Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science. 2018 9788193575901 National
56 Analytic Solutions of Fractional Differential Equation Associated with RLC Electrical Circuit Dr. Yudhveer Singh Journal of Statistics and Management System 2018 2169-0014 International
57 Improved African Buffalo Optimization Algorithm using Chaotic and Chaotic-Levy flight Dr. Yudhveer Singh International Journal of Engineering & Technology 2018 2227-524X  International
58 A unified study of the inverse Laplace transform of Aleph-Function involving general Class of polynomial and their associated properties Dr. Yudhveer Singh International Journal of Creative Research and Thought, 2018 2320-2882 International
59 Data Analysis utilizing principal component analysis Dr.Manju Kaushik International journal of engineering research and technology. SCOPUS 2018 0974-3154 International
60 Comparing different classification techniques using Data mining tools Dr.Manju Kaushik Intenational Journal of Management, IT & Engineering , (IJMIE) UGC Indexed 2018 2249-0558 International
61 Use Case and Misuse Case in Eliciting Security Requirements - MCOQR Metrics Framework Perspective” Dr. Chitreshh Banerjee International Journal of Modern Electronics and Communication Engineering (IJMECE) 2017 2321-2152 International
62 Identifying Security Needs in Requirements Elicitation Phase - MCOQR Metrics Framework Perspective”, Dr. Chitreshh Banerjee International Journal of Modern Computer Science and Applications (IJMCSA) 2017 2321-2632 International
63 Software Security in Requirements Engineering Phase - MCOQR Metrics Framework Perspective” Dr. Chitreshh Banerjee International Journal of Modern Computer Science (IJMCS) 2017 2370-7868 International
64 Estimating Influence of Threat using Misuse Case Oriented Quality Requirements (MCOQR) Metrics: Security Requirements Engineering Perspective” Dr. Chitreshh Banerjee International Journal of Hybrid Intelligence Systems (IJHIS), IOS Press, MIRS Lab, USA, 2017 1875-8819 International
65 Decision Support System in Precision Agriculture: Past Endeavours and Future Perspectives Dr. Ramesh C. Poonia The Subodh Journal of Recent Trends in Information Technology 2017 0975-9875 International
66 Comparative study of various protocols of DDS Dr. Ramesh C. Poonia Journal of Statistics & Management Systems, Taylor & Francis 2017 0972-0510 International
67 Relative study of steering protocols in delay tolerant network Dr. Ramesh C. Poonia Journal of Statistics & Management Systems, Taylor & Francis 2017 0972-0510 International
68 Design a new protocol for quantum key distribution Dr. Ramesh C. Poonia Journal of Information and Optimization Sciences, Taylor & Francis 2017 0252-2667 International
69 Optimum utilization of natural resources for home garden using wireless sensor networks Dr. Ramesh C. Poonia Journal of Information and Optimization Sciences, Taylor & Francis 2017 0252-2667 International
70 Case Study on WSN Based Smart Home Garden with Priority Driven Approach Dr. Ramesh C. Poonia Journal of Cases on Information Technology (JCIT), IGI Global 2017 1548-7717 International
71 A Performance Evaluation of Routing Protocols for Vehicular Ad-hoc Networks with Swarm Intelligence Dr. Ramesh C. Poonia International Journal of System Assurance Engineering and Management 2017 0975-6809 International
72 Viability Analysis of Two Ray Ground and Nakagami Model for Vehicular Ad-Hoc Networks Dr. Ramesh C. Poonia International Journal of Applied Evolutionary Computation (IJAEC), IGI Global 2017 1942-3594 International
73 A study and analysis of various existing implementation framework related to enterprise resource planning Dr. Swapnesh Taterh International Journal of Electrical, Electronics and Computers 2017 2456-2319 National
74 A Design and Implementation Framework of Congestion Control Algorithm Module in the Network Simulator 3 (NS -3) Dr. Swapnesh Taterh International Journal of Computing and Applications. 2017 0973-5704 National
75 The impact on security due to the vulnerabilities existing in the network a strategic approach towards security Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science 2017 2454-1311 National
76 Reliability Analysis of Software with Three Types of Errors and Imperfect Debugging using Markov Model Dr.Manju Kaushik International Journal of Computer Applications in Technology 2017 1741-5047 International
77 Data Fusion and IoT for Smart Ubiquitous Environments: A Survey Furqan Alam, Rashid Mehmood, Iyad Katib, Nasser N. Albogami and Aiiad Albeshri IEEE ACCESS 2017

10.1109/

ACCESS.

2017.2697839

International
78 Reducing Delays in Congestion Control Algorithm using Enhanced Network Boarder Patrol (ENBP), Mr. Sameer Saxena International Journal of Modern Electronics and Communication Engineering (IJMECE) 2017 2321-2152 International
79 UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies Rashid Mehmood Furqan Alam Nasser N. Albogami Iyad Katib Aiiad Albeshri Saleh M. Altowaijri IEEE ACCESS 2017

10.1109/

ACCESS.

2017.2668840

International
80 “Securing Software during Requirements Elicitation Phase: Metrics Perspective” Dr. Chitreshh Banerjee International Journal of Modern Computer Science (IJMCS) 2016 2370-7868 International
81 Impact of Net Neutrality Regulations and Its Future Implications: Global Perspective Dr. Chitreshh Banerjee IMPETUS an Interdisciplinary Research Journal 2016 2278-0254 National
82 A Topology Based Routing Protocols Comparative Analysis for MANETs Dr. Girish Paliwal International Journal of Advanced Engineering Research and Science 2016 2456-1908 International
83 Bridging Approaches to Reduce the Gap Between Classical and Quantum Computing Dr. Ramesh C. Poonia Journal of Information and Optimization Sciences, Taylor & Francis 2016 0252-2667 International
84 A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome. Published in Scopus Indexed, Springer AISC Series Dr. Swapnesh Taterh International Conference on Soft Computing: Theories and Applications, SoCTA 2016; Jaipur; India; 2016 2194-5357 International
85 Study and Comparative Analysis of Various Image Spamming Techniques. Published in Scopus Indexed, Springer AISC Series, Dr. Swapnesh Taterh International Conference on Soft Computing: Theories and Applications, SoCTA 2016; Jaipur; India; 2016 2194-5357 International
86 Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3. Published in Scopus Indexed, Springer AISC Series, Dr. Swapnesh Taterh International Conference on Soft Computing: Theories and Applications, SoCTA 2016; Jaipur; India 2016 2194-5357 International
87 Critical evaluation of Maintainability Parameters using code metrics Dr.Manju Kaushik International Journal of Computer Science and Information Security 2016 1947-5500 International
88 Energy aware Multipath location aided routing for Manet Dr.Manju Kaushik International Journal of Computer Science and Information Security 2016 1947-5500 International
89 Implementing Navigational Aspect of Specific Testing Process Model Dr.Manju Kaushik International Journal of Computer Science and Information Security 2016 1947-5500 International
90 Empirical Analysis of Metrics Using UML Class Diagram Dr.Manju Kaushik International Journal of Advanced Computer Science and Applications 2016 2156-5570 International
91 Dual Security testing model for web application Dr.Manju Kaushik International Journal of Advanced Computer Science and Applications 2016 2156-5570 International
92 Research on Security Requirements Engineering: Problems and Prospects Dr. Chitreshh Banerjee MATRIX Academic International Online Journal of Engineering and Technology (MAIOJET) 2015 2348–3326 International
93 Problems and Prospects of Big Data: Security Aspects Dr. Chitreshh Banerjee IMPETUS an Interdisciplinary Research Journal 2015 2278-0254 National
94 Cyber Security Awareness Through Education: Problems and Prospects Dr. Chitreshh Banerjee IMPETUS an Interdisciplinary Research Journal 2015 2278-0254 National
95 Software Defined Networking – Imposed Security Measures over Vulnerable Threats and Attacks Dr. Swapnesh Taterh IGI- International Journal of Applied Metaheuristic Computing IJAMC 2015 26711920 International
96 Availability Analysis for Embedded System with N-Version Programming using Fuzzy Approach Dr.Manju Kaushik International Journal of Software Engineering, Technology and Applications 2015 2053-2474 International
97 Reliability Anlysis of an Embedded System with Multiple Vacations and Standby Dr.Manju Kaushik Intenational Journal of Reliability and Applications 2015 1479-3903 International
98 Comparative study of object oriented measures for internal quality aManju Kaushik, Bhawana Mathur,ttributes of class diagrams Dr.Manju Kaushik Afro Asian Journals Science & Technology 2015 2349-4964 International
99 Security Threats of Social Networking Sites: An Analytical Approach Dr. Chitreshh Banerjee International Journal of Enhanced Research in Management & Computer Applications (IJERMCA) 2014 2319-7471 International
100 Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective Dr. Chitreshh Banerjee International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2014 2278-6856 International
101 Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective Dr. Chitreshh Banerjee International Journal of Computer Applications (IJCA) 2014 0975-8887 International
102 Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC Dr. Chitreshh Banerjee International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE) 2014 2278-7917 International
103 Recent Advances in Risk Analysis and Management (RAM) Dr. Chitreshh Banerjee International Journal of Advanced Computer Technology (IJACT) 2014 2320-0790 International
104 Android for Non Mobile Devices Dr. Swapnesh Taterh Journal of Computing Technologies 2014 2278 – 3814 National
105 Comparative Analysis of the Vulnerabilities Occurring in the Web Browser Dr. Swapnesh Taterh International Journal of Modern Computer Science & Applications 2014 2321-2632 International
106 Comparative Analysis of the Vulnerabilities Occurring in the Web Browser Dr. Swapnesh Taterh International Journal of Modern Computer Science & Applications 2014 2321-2632 National
107 A study on various attacks of TCP/IP and security challenges in MANET layer architecture. Published in Scopus Indexed Springer, Dr. Swapnesh Taterh 4th International Conference on Soft Computing for Problem Solving, SocProS 2014; Silchar; India; 2014 2194-5357 International
108 Reliability Characterization for Embedded System with N-Version Programming Dr.Manju Kaushik National Conference on Synergetic Trends in engineering and Technology, International Journal of Engineering and Technical Research 2014 2321-0869 International
109 Data Analysis of Students Marks with Descriptive Statistics Dr.Manju Kaushik International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC) 2014 2321-8169 International
110 Comparative Study of K-Means and Hierarchical Clustering Techniques Dr.Manju Kaushik International Journal of Software & Hardware Research in Engineering (IJSHRE) 2014 2347-4890 International
111 A Comparative Study of Web Service Testing Tools for Functional Requirements Dr.Manju Kaushik International Journal of Latest Technology in Engineering, Management and Applied Science 2014 2278 – 2540 International
112 SQL Injection Attack Detection and Prevention Methods: A Critical Review Dr.Manju Kaushik International Journal of innovative research in science engineering and technology 2014 2319-8753 International
113 Gesture based interaction NUI: An Overview Dr.Manju Kaushik International Journal of Engineering Trends and Technology (IJETT) 2014 2231-5381 International
114 The role and issue of clustering techniques in designing maintainable object oriented system Dr.Manju Kaushik International Journal of Computer Science and Software Engineering 2014 2409-4285 International
115 A Review Paper on Effort Estimation and Model Based Regression Testing with SOA Dr.Manju Kaushik International Journal of Computer Science and Mobile Computing (IJCSMC) 2014 2320-088X International
116 Challenges to Big Data Security and Privacy Dr.Manju Kaushik International Journal of Computer Science And Information Technologies (IJCSIT) 2014 0975–9646 International
117 A Proposed Model for Three Way Authentication in Cloud Computing for Sensitive Information Dr.Manju Kaushik International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 2014 2277-128X International
118 Attack Penetration System for SQL Injection Dr.Manju Kaushik International Journal of Advanced Computer Research (IJACR) 2014 2277-7970 International
119 An Experimental analysis of Parent Teacher Scale Involvement with help of K Mean Clustering Technique using Matlab Dr.Manju Kaushik International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS) 2014 2347-1778 International
120 Performance Optimization in Big Data Predictive Analytics Dr.Manju Kaushik International Journal of Advance Research in Computer and Software Engineering (IJARCSSE) 2014 2277-128X International
121 Natural User Interfaces: Trend in Virtual Interaction Dr.Manju Kaushik International Journal of latest technology in engineering management & applied sciences 2014 2278-2540 International
122 Architecture and Algorithm for Data Fusion of Heterogeneous Multi Source Information in Internet of Things (IoT) Paradigm Furqan Alam, Reda Salama, and Iyad Katib KAU journal of Computer Science 2014 10.4197/Comp.5-2 International
123 Spectrum management techniques for elastic optical networks: A survey Sahar Talebi Furqan Alam Iyad Katib Mohamed Khamis Reda Salama George N.Rouskas Optical Switching and Networking, Elsevier 2014

10.1016/

j.osn.

2014.02.003

International
124 Enhance security system of E-governance Dr. Chitreshh Banerjee SGVU Journal of Engineering & Technology 2013 2278-0181 International
125 An Improvised Software Security Awareness Model Dr. Chitreshh Banerjee International Journal of Information, Communication and Computing Technology (IJICCT) 2013 2347-7202 International
126 IT Security Practices in an Organisation: Balancing Technology and Management Perspective Dr. Chitreshh Banerjee IMPETUS an Interdisciplinary Research Journal 2013 2278-0254 National
127 Software Security Awareness Framework: Management Perspective Dr. Chitreshh Banerjee IMPETUS an Interdisciplinary Research Journal 2013 2278-0254 National
128 Threat Modeling and Security Pattern used in Design Phase of Secure Software Development life Cycle Dr. Swapnesh Taterh International Journal of Advanced Research in Computer Science and Software Engineering. 2013 2277 128X International
129 A Study of testing techniques for Web Applications Dr.Manju Kaushik International Journal of Science, Engineering and Technology Research (IJSETR) 2013 2278-7798 International
130 Reusability concept using an “M” Component Based Model Dr.Manju Kaushik International Journal of Science, Engineering and Technology Research (IJSETR) 2013 2278-7798 International
131 New Networking Era: Software Defined Networking Furqan Alam, Iyad Katib, Ahmed Alzahrani International Journal of Advanced Research in Computer Science and Software Engineering 2013 2277-128X National
132 Aneka As PAAS (Cloud Computing) Dr. Girish Paliwal Journal for Computing Technologies 2012 2278–3814 International
133 Security through Cloud Computing (ANEKA) Dr. Girish Paliwal International Conference on Technical Executive Innovation in Computing and Communication 2012 WO-ISBN International
134 A study and analysis of various existing implementation framework related to enterprise resource planning. Dr. Swapnesh Taterh International Journal of Electrical, Electronics and Computers 2012 2456-2319 International
135 The impact on security due to the vulnerabilities existing in the network a strategic approach towards security Dr. Swapnesh Taterh International Journal of Advanced Engineering, Management and Science 2012 2454-1311 International
136 A New M Model: A New Paradigm Dr.Manju Kaushik SHARE Journal of Multidisciplinary Research and Studies 2012 0976-4712 International
137 A Comparison between Traditional and Component based Software Development process Model Dr.Manju Kaushik Journal of Computer and Mathematical Sciences 2012 2319 - 8133 International
138 Brain to Brain Communication: Without any Interface images, thoughts can be exchanged between minds Dr.Manju Kaushik International Journal of Computer Science & Engineering Technology (IJCSET) 2012 2229-3345 International
139 Security Requirement Elicitation Phase of Secure Software Development Life Cycle Dr. Swapnesh Taterh International Journal of Research Review in Engineering, Science and Technology. 2011 2278-6643. International
140 Security Across Software Development Life-Cycle Dr. Swapnesh Taterh International Journal of Research Review in Engineering Science and Technology 2011 2278- 6643 International
141 Sixth Sense Technology-Advanced & Recent Technology in the field of comm. & computing Dr.Manju Kaushik SHARE Journal of Multidisciplinary Research and Studies 2011 0976-4712 International
142 Research on Software Security Awareness: Problems and Prospects Dr. Chitreshh Banerjee ACM SIGSOFT SEN 2010 0163-5948 International
143 Software Security Rules: SDLC Perspective Dr. Chitreshh Banerjee International Journal of Computer Science and Information Security 2009 1947-5500 International
144 New e-Government Model System: A Real Convenience for India Dr. Chitreshh Banerjee OORJA-The Journal of Management and IT 2008 0974-7869 National
145 Role of Technology in Education: A 21st Century Approach Dr. Chitreshh Banerjee Journal of Commerce and Information Technology 2008 0972-9550 National


Sr.No. Title Name of Author/Faculty Conference/Proceedings Title and Venue Year of Publication ISSN/ISBN Number
1 Chapter Name : A New Effective TCP-CC Algorithm Performance Analysis (NS3) Dr. Girish Paliwal 2019 4th International Conference on Information Systems and Computer Networks (ISCON) 2020 978-1-7281-3651-6
2 Neuro-Fuzzy Control Algorithm for Harmonic Compensation of Quality Improvement for Grid Interconnected Photovoltaic System Dr. Ramesh C. Poonia International Conference on Sustainable Technologies for Computational Intelligence, Springer, Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, March 29–30, 2019 2020 978-981-15-0028-2
3 Review of Register Transfer Language and Micro-operations for Digital Systems Dr. Ramesh C. Poonia International Conference on Sustainable Technologies for Computational Intelligence, Springer, Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, March 29–30, 2019 2020 978-981-15-0028-2
4 Problems and Prospects of Internet of Things in Healthcare and Agriculture Dr. Chitreshh Banerjee International conference on Emerging Trends in Science, Engineering & Management (ETSEM 2019), Alwar 2019 W/o ISBN
5 Design a New Protocol and Compare with BB84 Protocol for Quantum Key Distribution Dr. Ramesh C. Poonia Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, Vol 817, Springer, Singapore, 31 October 2018 2019 978-981-13-1594-7
6 Accurate Real-Time Location Map Matching Algorithm for Large Scale Trajectory Data Dr. Ramesh C. Poonia 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, , Amity Universty Noida, India, 29-31 Aug. 2018 2019 978-1-5386-4692-2
7 Analytical treatment of fractional integral operator via Sumudu transform & its applications in Fractional differential equations Dr. Yudhveer Singh 8th National Conference on “Computational and Mathematical Sciences,Vivekananda Global University, Jaipur. 2019 W/o ISBN
8 Analysis of Concentration of Cytosolic Calcium ion in Astrocytes cell using Fractional Calculus Dr. Yudhveer Singh Second International conference on Mathematical Modeling, Applied Analysis and Computation, JECRC, Jaipur 2019 W/o ISBN
9 Survey on Online Electronic Payments Security Mr. Sameer Saxena 2019 Amity International Conference on Artificial Intelligence (AICAI), 756-751 2019 978-1-5386-9346-9
10 Comparative Analysis of Internet of Things Monitoring Devices in Smart Agriculture Using Deep-Learning Techniques Dr. Chitreshh Banerjee 3rd International Conference on Soft Computing: Theories and Applications SoCTA 2018 2018 978-981-15-0751-9
11 Security Issues in Internet of Things (IoT)-Enabled Systems: Problem and Prospects Dr. Chitreshh Banerjee 3rd International Conference on Soft Computing: Theories and Applications SoCTA 2018 2018 978-981-15-0751-9
12 Research on Irrigation Techniques for IoT Based Smart Agriculture System Dr. Chitreshh Banerjee BICON-2018, Biyani International College, Jaipur 2018 W/o ISBN
13 Problems and Prospects of Security Issues in IoT Based System Dr. Chitreshh Banerjee BICON-2018, Biyani International College, Jaipur 2018 W/o ISBN
14 Identification of Business Goals and Assets from Security Aspect during the Software Development Process Dr. Chitreshh Banerjee International conference on Emerging Trends in Science, Engineering & Management (ETSEM 2018), MITRC, Alwar 2018 W/o ISBN
15 Problems and Prospects of Software Security Alignment with Business Goals Dr. Chitreshh Banerjee International conference on Emerging Trends in Science, Engineering & Management (ETSEM 2018), MITRC, Alwar 2018 W/o ISBN
16 Cyber Crime Against Senior Citizens Dr. Chitreshh Banerjee National Conference on Socio-Legal Rights of Women: The Implementation Conundrum, ALS, Amity University Rajasthan 2018 W/o ISBN
17 Role of IT in Protection of Child Rights: Issues and Challenges Dr. Chitreshh Banerjee National Conference on Protection of Child Rights: Contemporary Issues, Challenges, and Opportunities, MDLC, Jaipur in Collaboration with Child Welfare Committee, Govt. of Raj., India 2018 W/o ISBN
18 Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3 Dr. Girish Paliwal Soft Computing: Theories and Applications, Vol-583 Page 327-335 2018 978-981-10-5686-4
19 Enhanced Congestion Window Increment and Adaptive Fast Recovery Congestion Control Algorithm Simulation in Computer Network Dr. Girish Paliwal International Conference on Materials, Applied physics and Engineering 2018 W/o ISBN
20 A Solution to enhance TCP Performances in Ad-Hoc Wireless Network Dr. Girish Paliwal International Conference on Emerging Trends in Science Engineering and Management, Feb , 2018 2018 W/o ISBN
21   In object-oriented software framework improving maintenance exercises through k-means clustering approach Dr. Manju Kaushik The IoT-SIU 2018 Conference Proceedings and digitally available in IEEE Xplore TM.3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU) 2018 W/o ISBN
22 Performance analysis and implementation of K Means clustering and other classification techniques for open source software data bearing , Dr. Manju Kaushik INDIACom- 2018, International Conference On Computing for Sustainable Global Development Paper ID: 1130,BharatiVidyapeeth's Institute of Computer Applications and Management (BVICAM) A-4, Paschim Vihar, Rohtak Road, New Delhi – 110063. 2018 978-93-80544-28-1
23 Performance exploratory comparative study for software change and effort prediction in object-oriented systems using statistical and machine learning algorithms Dr. Manju Kaushik ELSEVIER ICIOTCT, Malviya National Institute of Technology (MNIT), Jaipur announces 3rd International Conference on Internet of Things & Connected Technologies (ICIOTCT ) 2018 W/o ISBN
24 Map Matching Approach for Current Location Tracking on the Road Network Dr. Ramesh C. Poonia International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017) (Trends and Future Directions), IEEE, Amity University Dubai, Dubai International Academic City, Dubai, December 18-20, 2017 2018 978-1-5386-0514-1
25 Routing Protocols and Security issues in MANET Dr. Ramesh C. Poonia International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017) (Trends and Future Directions), IEEE, Amity University Dubai, Dubai 2018 978-1-5386-0514-1
26 Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3,” Dr. Swapnesh Taterh Soft Computing: Theories and Applications 2018 9789811056864
27 Working of an ontology established search method in social networks Dr. Swapnesh Taterh Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, Springer, Singapore 2018 9789811305887
28 Study and Comparative Analysis of Various Image Spamming Techniques Dr. Swapnesh Taterh Advances in Intelligent Systems and Computing, Springer, Singapore 2018 9789811056864
29 A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome Dr. Swapnesh Taterh Advances in Intelligent Systems and Computing 2018 9789811056871
30 Enhanced Congestion Window Increment and Adaptive Fast Recovery Congestion Control Algorithm Simulation in Computer Network,” Dr. Swapnesh Taterh International Conference on Materials, Applied physics and Engineering, 2018 9789827895643
31 A Solution to enhance TCP Performances in Ad-Hoc Wireless Network,” Dr. Swapnesh Taterh International Conference on Emerging Trends in Science Engineering and Management 2018 9789854780231
32 Sumudu transform of fractional differential equation based upon the Hilfer derivative operator, Dr. Yudhveer Singh 7th National Conference on “Computational and Mathematical Sciences, Vivekananda Global University, Jaipur. 2018 W/o ISBN
33 Fractional derivative and integral operator involving Aleph-function in their kernel, Dr. Yudhveer Singh International Conference Mathematical Modelling, Applied Mathematics and Computaion, JECRC University, Jaipur. 2018 W/o ISBN
34 Analytic Solution of generalized space-time fractional advection-dispersion equation via coupling of Sumudu and Fourier Transforms, Dr. Yudhveer Singh National Conference on Intercepting Emerging domains in Mathematical Science, University of Rajasthan, Jaipur. 2018 W/o ISBN
35 Mathematical Treatment in Chemistry, Dr. Yudhveer Singh National Seminar on Recent Trend & Advances in Chemical Science and their impact on Environment,Amity University, Rajasthan. 2018 W/o ISBN
36 D2TFRS: An Object Recognition Method for Autonomous Vehicles Based on RGB and Spatial Values of Pixels Furqan Alam, Rashid Mehmood, Iyad Katib International Conference on Smart Cities, Infrastructure, Technologies and Applications (SCITA 2017), Springer 2018 978-3-319-94180-6
37 Improvising the Results of Misuse Case Oriented Quality Requirements (MCOQR) Framework Metrics: Secondary Objective Perspective Dr. Chitreshh Banerjee International Conference on Soft Computing: Theories and Applications SoCTA 2017, Department of Engg. And Tech., Bundelkhand University, Jhansi, AISC, Springer Publication 2017 978-981-13-0589-4
38 Aligning Misuse Case Oriented Quality Requirements Metrics with Machine Learning Approach Dr. Chitreshh Banerjee International Conference on Soft Computing: Theories and Applications SoCTA 2017, Department of Engg. And Tech., Bundelkhand University, Jhansi, AISC, Springer Publication 2017 978-981-13-0589-4
39 Role of Security Metrics in Evaluation of Software Security: SDLC Perspective Dr. Chitreshh Banerjee 5th Rajasthan Science Congress (RSC2017) Focal Theme: Science & Technology for Sustainable Development of State of Rajasthan, Amity University Rajasthan 2017 978-819-35-7590-1
40 Risk, Threats, and their Countermeasures: MCOQR Metrics Framework Perspective Dr. Chitreshh Banerjee 3rd National Conference on Advances in Communication, Computer and Electrical Engineering ACCE 2017, Rajasthan, India 2017 W/o ISBN
41 Study and Comparative Analysis of various Vulnerabilities Occurring in Google Chrome Dr. Chitreshh Banerjee 3rd National Conference on Advances in Communication, Computer and Electricals (ACCE 2017), Modern Institute of Technology and Research Centre (MITRC), Alwar, Rajasthan, India 2017 W/o ISBN
42 Research on Cyber Security Awareness: Problems and Prospects Dr. Chitreshh Banerjee National Conference on Emerging Trends in Engineering (NCETE-2017), College of Engineering and Technology, Bikaner (an Autonomous Institute of Govt. of Rajasthan) 2017 W/o ISBN
43 Research on Identity Theft: Implications and Prevention Dr. Chitreshh Banerjee National Conference on Emerging Trends in Engineering (NCETE-2017), College of Engineering and Technology, Bikaner (an Autonomous Institute of Govt. of Rajasthan) 2017 W/o ISBN
44 Security in Requirements Engineering Phase of SDLC Dr. Chitreshh Banerjee National Conference on Emerging Trends in Engineering (NCETE-2017), College of Engineering and Technology, Bikaner (an Autonomous Institute of Govt. of Rajasthan) 2017 W/o ISBN
45 Performance Analysis of Ad-Hoc on Demand Distance Vectore Routing Protocol for mobile ad-hoc networks Dr. Girish Paliwal International conference on Recent Advances and Applications in Computer Engineering 2017 978-981-32-9584-1
46 Secure and safe wearable with Integration of wireless sensor electronic devices by smart textile Dr. Girish Paliwal National conference on Progression in Apparel and Textile Research 2017 W/o ISBN
47 Emerging Issues and Challenges in Doctoral Research Dr. Manju Kaushik International Conference on Issues and Challenges in Doctoral Research, Jawaharlal Nehru University, Delhi 2017 W/o ISBN
48 Comparative study of cluster and tree based data aggregation techniques in Vehicular Ad-Hoc Networks Dr. Ramesh C. Poonia 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, 19 December 2016 2017 978-1-5090-1489-7
49 Design and development of an intelligent agent based framework for predictive analytics Dr. Ramesh C. Poonia 3rd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 31 October 2016 2017 978-9-3805-4421-2
50 Review Study of Navigation Systems for Indian Regional Navigation Satellite System (IRNSS) Dr. Ramesh C. Poonia Soft Computing: Theories and Applications, Part of the Advances in Intelligent Systems and Computing book series, SoCTA 2016, Springer 2017 978-981-10-5686-4
51 Design and development of an Intelligent agent based framework for Predictive Analytics Dr. Ramesh C. Poonia International Conference on “Computing for Sustainable Global Development”, 16th – 18th March, 2016 at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi, India 2017 978-93-80544-19-9
52 Study and Comparative Analysis of various Vulnerabilities Occurring in Google Chrome” Dr. Swapnesh Taterh 3rd National Conference on Advances in Communication, Computer and Electricals. 2017 9789867834209
53 Analysis of Ad-Hoc on Demand Distance Vectore Routing Protocol for mobile ad-hoc networks,” Dr. Swapnesh Taterh International conference on Recent Advances and Applications in Computer Engineering, 2017 9789856723905
54 A unified study of Inverse Laplace transform of Aleph function involving general class of polynomial and their associated properties, Dr. Yudhveer Singh International conference on “Recent Innovation and Trends in Engineering, Technology and Research, PCE, Jaipur. 2017 W/o ISBN
55 Proposed Algorithm for Identification of Vulnerabilities and associated Misuse Cases using CVSS, CVE Standards during Security Requirements Elicitation Phase Dr. Chitreshh Banerjee International Conference on Soft Computing: Theories and Applications SoCTA 2016, Amity University Rajasthan, Jaipur, Advances in Intelligent Systems and Computing, Springer Publication 2016 978-981-10-5699-4
56 Vulnerability Identification and Misuse Case Classification Framework Dr. Chitreshh Banerjee International Conference on Soft Computing: Theories and Applications SoCTA 2016, Amity University Rajasthan, Jaipur, Advances in Intelligent Systems and Computing, Springer Publication 2016 978-981-10-5699-4
57 UML Based Web Modeling and Testing Dr. Manju Kaushik IEEE International Conference on Advances in Computing, communication and Automation , Tulla institute, Deharadun, 2016 W/o ISBN
58 Analyzing performance of quality parameters using Naive Bayes Classifier Dr. Manju Kaushik International Conference on Recent Trends in Engineering and Material Sciences (ICEMS-2016)”organized by Jaipur National University, Jaipur 2016 W/o ISBN
59   Maintenance Policies for Improving the availability of a Software-Hardware System, Dr. Manju Kaushik 11th International conference on Reliability, Maintainability and Safety (ICRMS) Zhejiang Sci-Tech University, proceeding published by IEEE 2016 978-1-5090-2714-9
60 Run-time performance analysis of Non-agent based solution for Inter Process Synchronization problem Dr. Ramesh C. Poonia 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’2015) (Trends and Future Directions), organized by Amity Institute of Information Technology, Amity University, Uttar Pradesh , IEEE 2016 978-1-4673-7231-2
61 CDRA: Cluster-based Dynamic Routing Approach as a development of the AODV in Vehicular Ad-hoc Networks Dr. Ramesh C. Poonia IEEE International Conference on Signal Processing and Communication Engineering Systems (SPACES-2015), 2-3 January, 2015, IEEE 2016 978-1-4799-6109-2
62 Playback protection in HTTP live streaming Dr. Swapnesh Taterh 1st International Conference on Emerging Trends in Engineering, Technology and Science, ICETETS 2016 9781467367257
63 Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT) Furqan Alam, Rashid Mehmood, Iyad Katib, Aiiad Albeshri Procedia Computer Science, Elsevier 2016 10.1016/j.procs.2016.09.068
64 Analysis of round-robin load-balancing algorithm with adaptive and predictive approaches Furqan Alam, Vijey Thayananthan, Iyad Katib IEEE, UKACC 11th International Conference on Control (CONTROL) 2016 10.1109/CONTROL.2016.7737592
65 Development of iMACOQR Metrics Framework for Quantification of Software Security Dr. Chitreshh Banerjee Fifth International Conference on Soft Computing for Problem Solving 2015, Saharanpur Campus of IIT Roorkee, Advances in Intelligent Systems and Computing, Springer Publications 2015 978-981-10-0451-3
66 Improvised Cyber Crime Investigation Model Dr. Chitreshh Banerjee Fifth International Conference on Soft Computing for Problem Solving 2015, Saharanpur Campus of IIT Roorkee, Advances in Intelligent Systems and Computing 437, Springer Publications 2015 978-981-10-0451-3
67 Algorithmic Approach for Development of Misuse Case Modeling Framework for iMACOQR Metrics Dr. Chitreshh Banerjee Fifth International Conference on Advanced Computing & Communication Technologies, ACCT2015, Rohtak, India, IEEE Publication 2015 978-1-4799-8488-6
68 A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture Dr. Girish Paliwal Advances in Intelligent Systems and Computing Proceedings of Fourth International Conference on Soft Computing for Problem Solving SocProS 2014, Volume 2 , Springer India 2015 978-81-322-2219-4
69    Issues and Challenges in Doctoral Research Dr. Manju Kaushik International Conference on Issues and Challenges in Doctoral Research, Banaras Hindu University, Varanasi, 2015 W/o ISBN
70 Markovian Reliability Analysis for software using Error Generation and Imperfect Debugging Dr. Manju Kaushik proceedings of the International Multi Conference of Engineers and computer Scientist, organized by International association of Engineers),Hong Kong, 2015 2078-0966
71 Reliability Analysis for Embedded System with two types of Faults and Common Cause Failure using Markov process”, Dr. Manju Kaushik published in Proceeding of the International Conference on Computer and Communication Technology, ACM New York, NY,USA, 2015 978-1-4503-3552-2
72 Fuzzy keyword search and ranking frame work of DRS based file information management system using TFRDF ranking strategy Dr. Ramesh C. Poonia International Conference on Information and Communication Technology for Competitive Strategies (ICTCS-2104), Udaipur, Rajasthan, India, 14-16 November, 2014, ACM - International Conference Proceedings Series (ICPS) 2015 978-1-4503-3216-3
73 A Study on various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture Dr. Swapnesh Taterh Proceedings of Fourth International Conference on Soft Computing for Problem Solving 2015 97881322222001
74 Enhanced accident detection system using safety application for emergency in mobile environment: Safeme Mr. Amit Hirawat Proceedings of Fourth International Conference on Soft Computing for Problem Solving, Springer, New Delhi 2015 978-81-322-2219-4
75 Mind Reading by Face Recognition Using Security Enhancement Model. Mr. Sameer Saxena In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 173-180). Springer, New Delhi. 2015 978-81-322-2216-3
76 Spectrum assignment in rings with shortest-path routing: Complexity and approximation algorithms Sahar Talebi, Furqan Alam, Iyad Katib, George N. Rouskas IEEE, 2015 International Conference on Computing, Networking and Communications (ICNC) 2015 10.1109/ICCNC.2015.7069420
77 Algorithmic Approach to Identify and Quantify Misuse Case Modeling Defect Patterns using iMACOQR Metrics Dr. Chitreshh Banerjee National Conference on Advances in Mathematics, NCAM-2014 2014 W/o ISBN
78 Evolution of Object Oriented Method for Library Management System’, Jaipur , Dr. Manju Kaushik fourth National Conference on Computational and Mathematical Sciences, Department of Computer Science and Mathematics,VIT CAMPUS, Jaipur 2014 W/o ISBN
79 Analysis and Removing SQL Injection Attack’ Dr. Manju Kaushik International Conference on Emerging Trends in Information Communication Technology (NCETICT’ 14), MLV Textile & Engineering College, Bhilwara, India 2014 W/o ISBN
80 Availability Analysis for Embedded System with N-Version Programming using Fuzzy Approach’ Dr. Manju Kaushik National Conference on Emerging Trends in Engineering & Technology (NCETET-2014) ,Shri Ummed Singh Bhati College of Engineering and Management, Abu, Rajasthan, India 2014 W/o ISBN
81 ‘K-Means Cluster Analysis’, Dr. Manju Kaushik International conference on Futuristic trends in computer and electronics engineering, Kautilya Institute of Technology & Engineering & School of Management, Jaipur, India 2014 W/o ISBN
82 A comparative study of web service testing tools for functional requirements Dr. Manju Kaushik International conference on Innovative advancements in engineering and technology, Jaipur National University, Jaipur, India 2014 W/o ISBN
83 Hybrid Approach of Image Encryption Using DNA Cryptography and TF Hill Cipher Algorithm. Dr. Swapnesh Taterh IEEE International Conference on Communication and Signal Processing. Adhiparasakthi Engineering College, Melmaruvathur, Tamil Nadu. 2014 9789878934247
84 A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture,” Dr. Swapnesh Taterh Advances in Intelligent Systems and Computing Proceedings of Fourth International Conference on Soft Computing for Problem Solving SocProS 2014, Volume 2 , Springer India, 2014 97881322-222001
85 RoHeMaSys: Medical Revolution with Design and Development of Humanoid for Supporting Healthcare. Mr. Sameer Saxena Third International Conference on Soft Computing for Problem Solving (pp. 133-142). Springer, New Delhi. 2014 978-81-322-1770-1
86 Natural User Interface - From touch to touch less interaction with computer Dr. Manju Kaushik International conference on History & Development of Mathematics, JECRC University, Jaipur, India 2013 W/o ISBN
87    Buffer management in high speed ATM network Dr. Manju Kaushik In proceedings of Third national conference on Computational and Mathematical Sciences, VIT campus, Jaipur 2013 W/o ISBN
88 SQL injection attacks: preventing database store procedures Dr. Manju Kaushik In proceedings of Third national conference on Computational and Mathematical Sciences, VIT campus, Jaipur, India 2013 W/o ISBN
89 Estimation of regression test effort in service oriented architecture based application-An approach Dr. Manju Kaushik In proceedings of Third national conference on Computational and Mathematical Sciences, VIT campus, Jaipur, India 2013 W/o ISBN
90 ‘Natural user interface: A design expansion beyond keyboard and mouse Dr. Manju Kaushik In proceedings of Third national conference on Computational and Mathematical Sciences, VIT campus, Jaipur, India 2013 W/o ISBN
91 ‘Web Applications: Comparison of testing techniques Dr. Manju Kaushik National conference on Computational and Mathematical Sciences, VIT Campus, Jaipur, India 2013 W/o ISBN
92 Software Testing: Study and analysis of agile testing methodology Dr. Manju Kaushik National Conference on Entrepreneurship and Innovation: Catalysts & Effects, International school of Informatics & Mgmt, Jaipur, India 2013 W/o ISBN
93 Security Measurement in Secure Smart Card. Dr. Swapnesh Taterh IEEE International Conference on Advanced Research in Engineering & Technologies. K.L University, Vaddeswaram, Guntur, A.P. 2013 9789867312014
94     Cloud Computing: Digital Learning Methodology Services’ Dr. Manju Kaushik National Conference on Innovative & Sustainable Global Solutions To Business Management & IT, International School of Informatics & Magmt, Jaipur, India 2012 W/o ISBN
95           ‘Computer Security Threat-Hacking Using Phishing Technique’ Dr. Manju Kaushik National Conference on Innovative & Emerging Technologies in Computing Methodology, Marudhar Engineering college , Bikaner, India 2012 W/o ISBN
96         ‘Software testing analysis of parameters used in checking’; Dr. Manju Kaushik National Conference On Innovative & Emerging Technologies in Computing Methodology, Marudhar Engineering College, Bikaner, India 2012 W/o ISBN
97    ‘Test of Hypothesis in context of Missing Values in Data Mining’; Dr. Manju Kaushik National Conference on Numerical and Mathematical Modeling in Electrical Engineering And Applied Sciences, Poornima Group of colleges, Sitapura, Jaipur, India 2012 W/o ISBN
98 Design Phase of Secure Software Development life Dr. Swapnesh Taterh International Conference on “Recent Trends in Computing, Mechatronics and Communication” at OITM, Hisar, Haryana, 2012 9789809128563
99 ‘Brain to Brain Communication: Thoughts can be exchanged between minds, Without using any interface’ Dr. Manju Kaushik International Conference on VLSI, Communication and Networks (VCAN-2011), Institute of Engineering & Technology, Alwar, India 2011 W/o ISBN
100 ‘Statistical Methods and techniques used to recover incompleteness of Missing Values in Data Mining’ Dr. Manju Kaushik National conference on Emerging Technologies in Computer Engineering, Swami Keshvanand Institute of Technology, (SKIT) Engineering college, Jaipur, India 2011 W/o ISBN
101 Security in requirement phase of SDLC. Dr. Swapnesh Taterh Evolving Ideas : Computing Communication and Networking. Jeetendra Pande, Nihar Ranjan Pande and Deep Chandra Joshi, Global Vision 2011 9788182204102
102 Incorporating Security Principles into Requirement Analysis Phase of S.D.L.C Dr. Swapnesh Taterh National Conference Emerging Trends in Information Technology” at IPS Academy, Indore. 2011 9789845895120
103 Security in Requirement Phase of S.D.L.C Dr. Swapnesh Taterh National Conference Evolving Ideas: Computing, Communication and Networking at Amrapali Institute of Technology and Sciences, Haldwani. U.K. 2011 9789824869301
104 Software Security Awareness: Mapping of Roles and Responsibilities Dr. Chitreshh Banerjee International Conference on Emerging Trends in Engg. & Tech., Biyani International Institute of Engg. & Tech., Jaipur 2010 W/o ISBN
105 Software Security Testing Throughout System Development Life Cycle Dr. Chitreshh Banerjee International Conference on Emerging Trends in Engg. & Tech., Biyani International Institute of Engg. & Tech., Jaipur 2010 W/o ISBN
106 Multimedia in e-Learning: Exploring the Role of Audio (Narrator versus Text-To-Speech System) Dr. Chitreshh Banerjee National Conference on e-Learning: An Innovative Knowledge Oriented Framework 2009 2009 W/o ISBN
107 E-Commerce: A new paradigm of commerce Dr. Chitreshh Banerjee National Conference on Innovation in Engineering & Technology (IET-2008) 2008 W/o ISBN
108 Social Cost Benefit Analysis of E-Commerce: An Indian prospective Dr. Chitreshh Banerjee National Conference on Latest Trends in Information Technology 2008 2008 W/o ISBN



Sr. No. Book/Chapter Title Name of Author/Faculty Book Title Year of Publication Publisher Name ISSN/ISBN Number
1 Chapter Name : Performance Analysis of Ad Hoc on-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks Dr. Girish Paliwal Computational Network Application Tools for Performance Management 2020 Springer, Singapore 978-981-32-9584-1
2 Chapter Name : A New Effective TCP-CC Algorithm Performance Analysis (NS3) Dr. Girish Paliwal 2019 4th International Conference on Information Systems and Computer Networks (ISCON) 2020 IEEE 978-1-7281-3651-6
3 Deep Learning Techniques for Biomedical and Health Informatics Dr. Ramesh C. Poonia Deep Learning Techniques for Biomedical and Health Informatics 2020 Elsevier 978-012-81-9061-6
4 Proceedings of ICTSCI 2019, Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1045), Springer, Singapore Dr. Ramesh C. Poonia First International Conference on Sustainable Technologies for Computational Intelligence 2020 Springer 978-981-15-0029-9
5 Chapter Name: Comparison of decision trees and deep learning for object classification in autonomous driving Furqan Alam, Rashid Mehmood, Iyad Katib Smart Infrastructure and Applications 2020 Springer, Cham 978-3-030-13705-2
6 Chapter Title: Proposed Algorithm for Creation of Misuse Case Modeling Tree During Security Requirements Elicitation Phase to Quantify Security Dr. Chitreshh Banerjee Performance Management of Integrated Systems and its Applications in Software Engineering 2019 Series Title: Asset Analytics book series, Springer Nature Singapore Pte Ltd 978-981-13-8253-6
7 Chapter Title: Proposed Data Structure for Storage of Metrics Values: Misuse Case Oriented Quality Requirements (MCOQR) Framework Perspective Dr. Chitreshh Banerjee Performance Management of Integrated Systems and its Applications in Software Engineering 2019 Series Title: Asset Analytics book series, Springer Nature Singapore Pte Ltd 978-981-13-8253-6
8 Chapter Title: Interpreting the Objective Outcome of the Proposed Misuse Case Oriented Quality Requirements (MCOQR) Framework Metrics for Security Quantification Dr. Chitreshh Banerjee Performance Management of Integrated Systems and its Applications in Software Engineering 2019 Series Title: Asset Analytics book series, Springer Nature Singapore Pte Ltd 978-981-13-8253-6
9 Farming Technologies for Sustainable Agricultural Development Dr. Ramesh C. Poonia Farming Technologies for Sustainable Agricultural Development 2019 IGI Global 978-152-25-5909-2
10 On-Demand Routing Protocols for Vehicular Cloud Computing Dr. Ramesh C. Poonia Vehicular Cloud Computing for Traffic Management and Systems 2019 IGI Global 978-152-25-3981-0
11 Peregrinating Gardens from Traditional to Most Advanced Handy Approach for Avoiding the Unnecessary Utilization of Resources Dr. Ramesh C. Poonia Smart Farming Technologies for Sustainable Agricultural Development 2019 IGI Global 978-152-25-5909-2
12 Sustainable Development in Agriculture: Past and Present Scenario of Indian Agriculture Dr. Ramesh C. Poonia Smart Farming Technologies for Sustainable Agricultural Development 2019 IGI Global 978-152-25-5909-2
13 Numerical Study of Effects of Adrenal Hormones on Lymphocytes, Springer Proceeding Dr. Yudhveer Singh Mathematical Modelling, Applied Analysis and Computation 2019 Springer 978-981-13-9608-3
14 Real Time Location Tracking Map Matching Approaches for Road Navigation Applications Dr. Ramesh C. Poonia Data Intensive Computing Applications for Big Data 2018 IOS Press 978-1-61499-813-6
15 Internet of Things (IoT) Security Challenges Dr. Ramesh C. Poonia Handbook of E-business Security, “Internet of Things (IoT) Security Challenges 2018 CRC Press, Taylor & Francis Group 978-1-13-857-130-3
16 Text Book Dr. Chitreshh Banerjee System Design Concepts 2017 Parth Publication, Jaipur 978-81-931180-5-4
17 Chapter Name: MCOQR (Misuse Case Oriented Quality Requirements) Metrics Framework (Cited by 7) (SCOPUS) Dr. Chitreshh Banerjee Problem Solving and Uncertainty Modeling through Optimization and Soft Computing Applications 2016 IGI Global, USA 9781466698857
18 Chapter Name: Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3" Dr. Girish Paliwal Soft Computing: Theories and Applications: Proceedings of SoCTA 2016 2016 Springer, Singapore 978-981-10-5686-4
19 Text Book Dr. Chitreshh Banerjee Enhanced & Generalised E-Governance Security Framework (EG)2SF 2014 Lambert Academic Publication, Germany 978-3-659-10331-5
20 Text Book Dr. Chitreshh Banerjee Misuse & Abuse Case Oriented Quality Requirements Metrics 2014 Lambert Academic Publication, Germany 978-3-659-66966-8
21 Chapter Name: A study on various attacks of TCP/IP and security challenges in MANET layer architecture” Dr. Girish Paliwal Proceedings of Fourth International Conference on Soft Computing, 2014 Springer, New Delhi 978-81-322-2219-4
22 Edited book Dr. Chitreshh Banerjee DMCA-101 Problem Solving & Programming 2013 Himalaya Publishing House P. Ltd., Mumbai W/o ISBN
23 Edited book Dr. Chitreshh Banerjee DMCA-104 System Analysis and Design 2012 Himalaya Publishing House P. Ltd., Mumbai W/o ISBN
24 Edited book Dr. Chitreshh Banerjee DMCA-102 Computer Organisation & Assembly Language Programming 2012 Himalaya Publishing House P. Ltd., Mumbai W/o ISBN
25 Text Book Dr. Chitreshh Banerjee Software Engineering 2009 Genius Publications 81-88870-88-9
26 Text Book Dr. Chitreshh Banerjee E-Banking & Security Transactions 2009 Genius Publications 978-93-80311-07-4
27 Text Book Dr. Chitreshh Banerjee Information Technology 2008 Genius Publications 81-88870-41-2
28 Text Book Dr. Chitreshh Banerjee Multimedia Systems 2006 Genius Publications 978-81-88870-98-1