College Code REAP: 1031,   CMAT: 302
Creating Winners for Life....
☎:0141 3500300, 5160400
 
SKIT COLLEGE

International Journals

  • Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., ... & Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems80, 103352.
  • Narayanan, P., Sengan, S., Marimuthu, B. P., Paulra, R. K., Bhargava, C., Sharma, P. K., ... & Dadheech, P. (2021). Analysis and design of fuzzy-based manoeuvring model for mid-vehicle collision avoidance system. Journal of Ambient Intelligence and Humanized Computing, 1-14.
  • Kumar, A., Raja, L., Dadheech, P., & Bhardwaj, M. (2020). A hybrid cluster technique for improving the efficiency of colour image segmentation. World Review of Entrepreneurship, Management and Sustainable Development16(6), 665-679.
  • Satheesh, N., Rathnamma, M. V., Rajeshkumar, G., Sagar, P. V., Dadheech, P., Dogiwal, S. R., ... & Sengan, S. (2020). Flow-based anomaly intrusion detection using machine learning model with software-defined networking for OpenFlow network. Microprocessors and Microsystems79, 103285.
  • Sangwan, A., & Hussain, R. Evaluation of Performance for bridging the gap between Volunteer and Cloud
  • Sharma, Y., Zafar, R., Metya, S. K., & Kanungo, V. (2020). Split Ring Resonators based Plasmonics sensor with Dual Fano resonances. IEEE Sensors Journal.
  • Jadwal, P. K., Jain, S., & Agarwal, B. (2020). Financial credit risk evaluation model using machine learning-based approach. World Review of Entrepreneurship, Management and Sustainable Development16(6), 576-589.
  • Sharma, G., Kumar, A., Sharma, H., Saini, A. K., Janu, N., & Thankchan, B. (2020). Development of Fuzzy based intelligent System for Assessment of Risk Estimation in Software project for Hospitals Network. European Journal of Molecular & Clinical Medicine7(4), 1433-1442.
  • Jadwal, P. K., Jain, S., & Agarwal, B. (2020). Spectral Clustering and Cost-Sensitive Deep Neural Network-Based Undersampling Approach for P2P Lending Data. International Journal of Information Technology and Web Engineering (IJITWE)15(4), 37-52.
  • Sangwan, A., & Hussain, R. Development of Load balancing solution for Real-Time Communication services over AWS.
  • Sharma, G., Kumar, A., Sharma, H., Saini, A. K., & Dogiwal, S. R. (2020). Diabetes Data Prediction in healthcare Using Hadoop over Big Data. European Journal of Molecular & Clinical Medicine7(4), 1423-1432.
  • Chauhan, G. S., Meena, Y. K., Gopalani, D., & Nahta, R. (2020). A two-step hybrid unsupervised model with attention mechanism for aspect extraction. Expert Systems with Applications161, 113673.
  • Sharma, N., Periasamy, C., Chaturvedi, N., & Chaturvedi, N. (2020). Trapping Effects on Leakage and Current Collapse in AlGaN/GaN HEMTs. Journal of Electronic Materials49(10), 5687-5697.
  • Sharma, N., Mishra, S., Singh, K., Chaturvedi, N., Chauhan, A., Periasamy, C., ... & Chaturvedi, N. (2019). High-Resolution AlGaN/GaN HEMT-Based Electrochemical Sensor for Biomedical Applications. IEEE Transactions on Electron Devices67(1), 289-295.
  • Gupta, Y., Bhargava, L., Sharma, A., & Gaur, M. S. (2020). Hybrid buffers based coarse-grained power gated network on chip router microarchitecture. International Journal of Electronics107(2), 272-287.
  • Sharma, G., Mahrishi, M., Hiran, K. K., & Doshi, R. (2020). Reverse Engineering for potential Malware detection: Android APK Smali to Java. Journal of Information Assurance & Security15(1)
  • Mathur, N., Mathur, S., Mathur, D., & Dadheech, P. (2020, February). A Brief Survey of Deep Learning Techniques for Person Re-identification. In 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE) (pp. 129-138). IEEE.
  • Sharma, A., Sangwan, A., Thankchan, B., Jain, S., Singh, V., & Saurabh, S. (2020). Development of Top K-Association Rule Mining for Discovering pattern in Medical Dataset. European Journal of Molecular & Clinical Medicine7(4), 1413-1421.
  • Dadheech, P., Goyal, D., Srivastava, S., Kumar, A., & Bhardwaj, M. (2019, December). Performance Improvement of Heterogeneous Cluster of Big Data Using Query Optimization and MapReduce. In International Conference on Information Management & Machine Intelligence (pp. 85-100). Springer, Singapore.
  • Kumar, A., Dadheech, P., Singh, V., Raja, L., & Poonia, R. C. (2019). An enhanced quantum key distribution protocol for security authentication. Journal of Discrete Mathematical Sciences and Cryptography22(4), 499-507.
  • Kumar, A., & Sinha, M. (2019). Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET). Journal of Discrete Mathematical Sciences and Cryptography22(4), 453-463.
  • Sharma, A., & Hussain, R. A Study, Analysis and Deep Dive on Docker Security vulnerabilities and their performance issue.
  • Dadheech, P., Kumar, A., Choudhary, C., Beniwal, M. K., Dogiwal, S. R., & Agarwal, B. (2019). An enhanced 4-way technique using cookies for the robust authentication process in a wireless network. Journal of Statistics and Management Systems22(4), 773-782.
  • Kumar, A., & Sinha, M. (2019). Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET. Journal of Statistics and Management Systems22(4), 753-761.
  • Kumar, A., Dadheech, P., Singh, V., Poonia, R. C., & Raja, L. (2019). An improved quantum key distribution protocol for verification. Journal of Discrete Mathematical Sciences and Cryptography22(4), 491-498.
  • Kumar, A., Dadheech, P., Kumari, R., & Singh, V. (2019). An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm. Journal of Statistics and Management Systems22(7), 1349-1364.
  • Kumar, A., Dadheech, P., Singh, V., Raja, L., & Poonia, R. C. (2019). An enhanced quantum key distribution protocol for security authentication. Journal of Discrete Mathematical Sciences and Cryptography22(4), 499-507.
  • Kumar, A., Dadheech, P., Kumari, R., & Singh, V. (2019). An enhanced energy-efficient routing protocol for VANET using a special cross-over in genetic algorithm. Journal of Statistics and Management Systems22(7), 1349-1364.
  • Sathiskumar, A., Rajaram, P., Ramesh, S., & Dadheech, P. (2020). 3D-Convolutional Neural Network with Data Enhance Hand Gestures Recognition.
  • Sengan, S., Priya, V., & Dadheech, P. (2020). Energy and Green IT Resource Management Analysis and Formation in Geographically Distributed Environmental Cloud Data Centre. Energy29(6), 4144-4155.
  • Sengan, S., Priya, V., & Dadheech, P. (2020). Implementation of New Secure File Transfer Protocol Using Triple-DES and MD5.
  • Dadheech, P., Kumar, A., Choudhary, C., Beniwal, M. K., Dogiwal, S. R., & Agarwal, B. (2019). An enhanced 4-way technique using cookies for robust authentication process in wireless network. Journal of Statistics and Management Systems22(4), 773-782.
  • Katyayan, A., Khunteta, A., Gupta, M. K., & Dogiwal, S. R. (2019). Detection of copy-move image forgery using normalized cross correlation and fast fourier transform. Journal of Statistics and Management Systems22(4), 679-688.
  • Dadheech, P., Kumar, A., Choudhary, C., Beniwal, M. K., Dogiwal, S. R., & Agarwal, B. (2019). An enhanced 4-way technique using cookies for robust authentication process in wireless network. Journal of Statistics and Management Systems22(4), 773-782.
  • Sharma, N., Dhakad, S. K., Periasamy, C., & Chaturvedi, N. (2018). Refined isolation techniques for GaN-based high electron mobility transistors. Materials Science in Semiconductor Processing87, 195-201.
  • Sharma, N., Periasamy, C., & Chaturvedi, N. (2018). Performance Analysis of GaN Capping Layer Thickness on GaN/AlGaN/GaN High Electron Mobility Transistors. Journal of nanoscience and nanotechnology18(7), 4580-4587.
  • Gupta, Y., & Bhargava, L. (2019). Write energy reduction of STT-MRAM based multi-core cache hierarchies. International Journal of Electronics Letters7(3), 249-261.
  • Kumar, A., Goyal, D., & Dadheech, P. (2018). A novel framework for performance optimization of routing protocol in VANET network. J. Adv. Res. Dyn. Control. Syst10, 2110-2121.
  • Dadheech, P., Goyal, D., Srivastava, S., & Kumar, A. (2018). A scalable data processing using Hadoop & MapReduce for big data. J. Adv. Res. Dyn. Control. Syst10, 2099-2109.
  • Dadheech, P., Goyal, D., Srivastava, S., & Choudhary, C. M. (2018). An efficient approach for big data processing using spatial Boolean queries. Journal of Statistics and Management Systems21(4), 583-591.
  • GOVIL, M. C., & SINGH, G. (2018). Text-mining and pattern-matching based prediction models for detecting vulnerable files in web applications. Journal of Web Engineering17(1&2), 028-044.
  • Mathur, N., Meena, Y. K., Mathur, S., & Mathur, D. (2018). Detection of brain tumor in MRI image through fuzzy-based approach. High-Resolut. Neuroimaging—Basic Phys. Princ. Clin. Appl.
  • Mathur, N. P., & Gupta, S. K. (2017). Performance analysis of feature extraction techniques for facial expression recognition. International Journal of Computer Applications166(1), 1-3.
  • Dhakad, S., Sharma, N., Periasamy, C., & Chaturvedi, N. (2017). Optimization of ohmic contacts on thick and thin AlGaN/GaN HEMTs structures. Superlattices and Microstructures111, 922-926.
  • Sharma, N., Periasamy, C., & Chaturvedi, N. (2016). Investigation of high-temperature effects on the performance of algan/gan high electron mobility transistors. Journal of Nanoelectronics and Optoelectronics11(6), 694-701.
  • Jain, M., & Singh, D. (2016). A survey on CBIR on the basis of different feature descriptor. Journal of Advances in Mathematics and Computer Science, 1-13.
  • Jain, M., & Singh, D. (2016). An Efficient Technique for Image Retrieval from the Large Database on the Basis of Color and Texture. International Journal of Computer Applications975, 8887.

International Conferences

  • Dadheech, P., Kumar, A., Singh, V., Raja, L., & Poonia, R. C. (2021). A Neural Network-Based Approach for Pest Detection and Control in Modern Agriculture Using Internet of Things. In Smart Agricultural Services Using Deep Learning, Big Data, and IoT (pp. 1-31). IGI Global.
  • Kumar, A., Dadheech, P., Beniwal, M. K., Agarwal, B., & Patidar, P. K. (2020). A Fuzzy Logic-Based Control System for Detection and Mitigation of Blackhole Attack in Vehicular Ad Hoc Network. In Microservices in Big Data Analytics (pp. 163-178). Springer, Singapore.
  • Sangwan, A. (2020). Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing. Design and Analysis of Security Protocol for Communication, 317-343.
  •  Kumar, A., Dadheech, P., Singh, V., & Raja, L. (2020). Performance modeling for secure migration processes of legacy systems to the cloud computing. Data Deduplication Approaches: Concepts, Strategies, and Challenges, 255.
  • Dadheech, P., Goyal, D., Srivastava, S., Kumar, A., & Bhardwaj, M. (2019, December). Performance Improvement of Heterogeneous Cluster of Big Data Using Query Optimization and MapReduce. In International Conference on Information Management & Machine Intelligence (pp. 85-100). Springer, Singapore.
  • Mathur, N., Meena, Y. K., Mathur, S., & Mathur, D. (2018). Detection of brain tumor in MRI image through fuzzy-based approach. High-Resolut. Neuroimaging—Basic Phys. Princ. Clin. Appl
  • Goel, R., Govil, M. C., & Singh, G. (2018, May). A Novel Methodology for Effective Requirements Elicitation and Modeling. In International Conference on Computational Science and Its Applications (pp. 474-487). Springer, Cham.
  • Chaturvedi, N., Mishra, S., Dhakad, S., Sharma, N., Singh, K., Taliyan, R., ... & Khanna, P. K. (2017, December). Development of GaN HEMTs Based Biosensor. In International Workshop on the Physics of Semiconductor and Devices (pp. 225-229). Springer, Cham.
  • Sharma, N., Dhakad, S., Singh, K., Chaturvedi, N., Chauhan, A., & Periasamy, C. (2017, December). AlGaN/GaN HEMT Based pH Sensor. In International Workshop on the Physics of Semiconductor and Devices (pp. 897-899). Springer, Cham.
  • Goel, R., Govil, M. C., & Singh, G. (2016, September). Security Requirements Elicitation and Modeling Authorizations. In International Symposium on Security in Computing and Communication (pp. 239-250). Springer, Singapore.
  • Goel, R., Govil, M. C., & Singh, G. (2016, July). Modeling Software Security Requirements Through Functionality Rank Diagrams. In International Conference on Computational Science and Its Applications (pp. 398-409). Springer, Cham.
  • Sharma, N., Joshi, D., & Chaturvedi, N. (2014). Influence of Source-Gate and Gate lengths variations on GaN HEMTs based biosensor. Physics of Semiconductor Devices2014, 229-30.

All Rights Reserved | Copyright © 2021 - Swami Keshvanand Institute of Technology, Management & GramothonManaged by : SKIT