| 1. |
Trust Models in Cloud Computing: A Review |
International Journal of Wireless and Microwave Technologies, Vol. 7, No. 4, pp. 14-27, 2017 |
Ritu, Sukhchandan Randhawa, Sushma Jain |
| 2. |
A Comparative Analysis of Optimization Solvers. |
Journal of Statistics and Management Systems,20 (4), pp.623-635,2017 |
Rimmi Anand, Divya Agarwal and Vijay Kumar |
| 3. |
A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks |
Recent Patents on Engineering, vol 11, 2017 |
Tarunpreet Bhatia, A.K. Verma, Gaurav Sharma, Suman Bala |
| 4. |
A review on Data mining based Intrusion Detection Systems |
"International Journal of Control Theory Applications",2017 |
Vidhi, Rajanpreet Kaur Chahal, Niyati Baliyan |
| 5. |
A Survey on Scheduling techniques in Cloud Computing |
International Journal of Recent Trends in Engineering and Research (IJRTER) journal,vol. 3, no. 7, pp. 303-311,2017 |
Pratisha Sharma, Dr. InderveerChana and Dr. AnjuBala |
| 6. |
A Variational framework for low dose sinogram restoration |
Int. J. Biomedical Engineering and Technology (IJBET), Vol 24, No. 4, Pp356-367, 2017 |
Shailendra Tiwari |
| 7. |
An Automatic Leaf Disease Detection System for Legume Species |
Journal of Biology and Today's World, 6(6), 115-122, 2017 |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
| 8. |
An Energy Efficient and Trust Aware Framework for Secure Routing in Leach for Wireless Sensor Networks |
Scalable Computing: Practice and Experience, 207-218 & 17, 2017 |
Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava |
| 9. |
An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor |
Scalable Computing: Practice and Experience, 2017 |
Miglani, Arzoo, Tarunpreet Bhatia, Gaurav Sharma, and Gulshan Shrivastava |
| 10. |
Android GUI testing and tools |
International Journal of Research in Computer Science (IJRCS),Volume 04, Issue 2 Paper 22, ISSN no. 2349-3828, Page No. 97-99, 2017 |
Sumit Pal, Ashish Aggarwal |
| 11. |
Application wise Annotations on Intelligent Database Techniques |
Journal for Research, 19-21, Vol. 3 Issue 10, 2017 |
Supreet Kaur, Harkiran Kaur |
| 12. |
Commentary Upon Role of Neural Networks in Supervised Machine Learning |
International Journal of Advanced in Management, Technology and Engineering Sciences,160-166, Vol. 7 Issue 12, 2017 |
Palak Bansal, Harkiran Kaur |
| 13. |
Comparing UWDBCSN Clustering with LNCA for Node Replication Attack |
Journals of Mobile Computing, Communication & Mobile Networks, 41-49, (4), 2017 |
Harpreet Kaur, Sharad Saxena |
| 14. |
COMPREHENSIVE REVIEW OF AES AND RSA SECURITY ALGORITHMS IN CLOUD COMPUTING |
Global Journal of Engineering Science and Research Management ,63-68, 4(12), 2017 |
Shubham Kansal, Harkiran Kaur |
| 15. |
Design of Reliable Capacitated Facility Protection in Distribution Centres |
Procedia Computer Science, 115, pp.312-321 , 2017 |
Rimmi Anand, and Vijay Kumar |
| 16. |
Grey Wolf-based Clustering Technique. |
Journal of Intelligent Systems, Vol. 26(1), pp.153-168, 2017 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
| 17. |
Investigative Analysis on Data Mining Techniques |
Journal for Research, 32-34, Vol. 3 Issue 10, 2017 |
Kartik Jaitly, Harkiran Kaur |
| 18. |
Mobile Agent Based Communication using AES and RSA |
Journal of Multimedia Technology & Recent Advancements, 6-16, (4), 2017 |
Mandeep Kaur, Sharad Saxena |
| 19. |
Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms |
Journal of Intelligent Systems,Vol. 26(3), pp.483-503, 2017 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
| 20. |
STAR: SLA-aware Autonomic Management of Cloud Resources |
IEEE Transactions on Cloud Computing, 2017 |
Sukhpal Singh, Inderveer Chana and Rajkumar Buyya |
| 21. |
Prediction of Sentiment from Macaronic Reviews |
Informatica: An International Journal of Computing and Informatics, vol.42, no. 1, pp. 127-136, 2018 |
Sukhnandan Kaur, Rajni Mohana |
| 22. |
An Allotment of H1B Work Visa in USA using Machine Learning |
International Journal of Engineering & Technology, 2018 |
Pooja Thakur, Mandeep Singh, Harpreet Singh,Prashant Singh Rana |
| 23. |
An effective approach for semantic-based clustering and topic-based ranking of web documents |
JDSA, Springer, 1-16, Vol 5 (issue 2)2018 |
R.K.Roul |
| 24. |
An effective topic-based ranking technique for categorised research articles |
IJCSE, Inderscience, 35-45, Vol 4(issue 1),2018 |
R.K.Roul, J.K.Sahoo |
| 25. |
An improved hybrid illumination normalization and feature extraction model for face recognition |
International Journal of Applied Pattern Recognition, 2018 |
Jyotsna Yadav, Navin Rajpal, Rajesh Mehta |
| 26. |
Complex Diffusion Regularization based Low dose CT Image Reconstruction |
Int. J. Biomedical Engineering and Technology , Inderscience, 2018 |
Kavkirat Kaur, Shailendra Tiwari |
| 27. |
Detecting spam web pages using multilayer ELM |
IJBDI, Inderscience,49-61, Vol 5(issue 2), 2018 |
R.K.Roul |
| 28. |
Evolving state grammar for modeling DNA and RNA structures |
International Journal of Engineering & technology, 2018 |
Ajay Kumar, Nidhi kalra and Sunita Garhwal |
| 29. |
Fingerprint image enhancement techniques : A survey |
International journal of innovations and advancement in computer science (IJIACS),Volume 7,Issue 3, 2018 |
Monty singh and Ashish Girdhar |
| 30. |
Statistical Dimension Identification and Implementation for Student Progression System |
INTERNATIONALJOURNAL OFINNOVATIVETECHNOLOGY ANDCREATIVEENGINEERING,VOL.8 NO.5 pp. 480-484, 2018 |
Harkiran Kaur, Aanchal Phutela |
| 31. |
Implementing Fuzzy Technique to Expert System - A Case Study on Salt Analysis |
International Journal of Applied Engineering Research, Volume 13, Number 11 pp. 9474-9479, 2018 |
Kriti Asija, Harkiran Kaur |