Publications Data 2015 1. Anurag Singh Tomar Et.Al
Total Page:16
File Type:pdf, Size:1020Kb
Publications Data 2015 1. Anurag Singh Tomar et.al, "Image based Authentication with Secure Key Exchange Mechanism in Cloud", Medical Imaging, m-Health and Emerging Communication Systems (MedCom), 2014 International Conference, Issue : 1 , 2015 2. Shekhar Verma et.al, "Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement", International Journal Of Engineering Research & Technology (IJERT), volume : 4, Issue : 1 , 2015 3. Ketki Arora et.al, "Security of Data in Cloud Environment Using DPaas", IJMER, volume : 5, Issue : 1 ,8, 2015 4. Gaurav Kumar Tak et.al, "Comparative Analysis of Various Attacks on MANET", International Journal of Computer Applications, volume : 111, Issue : 12 ,42-46, 2015 5. Varun Singla et.al, "Big Data: Tools and Technologies in Big Data", International Journal of Computer Applications, volume : 112, Issue : 1 ,0975 – 8887, 2015 6. Isha et.al, "Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET: A Review", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,678-681, 2015 7. Isha et.al, "Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,674- 677, 2015 8. Nidhi Sethi et.al, "Synthesis, Characterization and Anti microbial activity of protected dipeptides and their deprotected analogs", Oriental Journal of chemistry, volume : 31, Issue : 1 , 2015 9. Rohitt Sharma et.al, "A Survey of Various Image Enhancement Methods on Different Types of Images", INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING, volume : 3, Issue : 1 , 2015 10. Aditya Khamparia et.al, "Adaptive E-Learning Based Udutu System For Object Oriented Programming", International Journal of Applied Engineering Research, volume : 10, Issue : 1 ,1439-1442, 2015 11. A.K.Srivastava et.al, "Effect on dielectric, magnetic, optical and structural properties of Nd–Co substituted barium hexaferrite nanoparticles", Applied Physics A, volume : 119, Issue : 4 ,1531- 1540, 2015 12. Priyanka et.al, "Quality Assessment Model for wheat storage warehouse using analytic Hierarchy process and BP neural Network", IEEE XPLORE, volume : Issue : 1 , 2015 13. Avinash Kaur et.al, "Object based Accountability Framework for Information Sharing in Cloud Computing", International Journal of Computer Applications, volume : 115, Issue : 1 ,28-32, 2015 14. Manmohan Sharma et.al, "A Survey on Black Hole Attack Detection and Prevention Techniques", International Journal for Research in Applied Science & Engineering Technology (IJRASET), volume : 3, Issue : 1 ,904-907, 2015 15. Gagandeep Singh et.al, "Enhanced Secure Protocol for Reliable Data Delivery", International Journal of Computer Applications, volume : 116, Issue : 1 , 2015 16. Gaurav Kumar Tak et.al, "Hybrid Protocol for Handling Security using SBPGP", International Journal of Computer Applications, volume : 115, Issue : 22 , 2015 17. Ravi Kant Sahu et.al, "Redeployment and Localization in Wireless Sensor Networks Using Mobile Anchors", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,665, 2015 18. Gagandeep Singh et.al, "An Enhanced Approach for Trust Based Routing in MANET", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,585-588, 2015 19. Nisha Sethi et.al, "Review on Fault Tolerance Techniques in Cloud Computing", International Journal of Computer Applications, volume : 116, Issue : 18 , 2015 20. Sangeeta Sharma et.al, "The Malicious Insiders Threat in the Cloud", International Journal of Engineering Research and General Science, volume : 3, Issue : 2 ,245, 2015 21. Harjeet Kaur et.al, "Identifying & Isolating Multiple Black Hole Attack on AODV protocol in MANET", International Journal of Innovative Reasearch in Science Enginnering and Technology, volume : 4, Issue : 1 , 2015 22. Kundan Munjal et.al, "Efficient Scheme for Preventing Tunneling Attack in Vehicular Ad Hoc Networks", IJAER, volume : 10, Issue : 1 ,15197-15206, 2015 23. Kundan Munjal et.al, "Prediction of Diabetes Mell-EH-Tiss Using Unsupervised Learning Method", IJAER, volume : 8, Issue : 1 ,19049-19061, 2015 24. Isha et.al, "Spectrum Sensing Techniques In Cognitive Radio Based Sensor Networks: A Survey", International Journal of Applied Engineering Research, volume : 10, Issue : 8 ,19063-19076, 2015 25. Sanjay Kumar Singh et.al, "Classification of Follicular Lymphoma Grades Using Support Vector Machine", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 8 ,20441-20449, 2015 26. Sanjay Kumar Singh et.al, "Computer-Aided Classification of Neuroblastoma Using Support Vector Machine", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 8 ,20451-20459, 2015 27. Gurpinder Singh et.al, "Synthesis and antimicrobial activity of Thiosemicarbazone induced Hydrazone of 2-Anilino-3-formylchromone", Journal of Chemical and Pharmaceutical Research, volume : 7, Issue : 5 ,599-605, 2015 28. Manmohan Sharma et.al, "Novel Enhancement Of Security And Performance Of Software Define Network (SDN)", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 1 ,23345-23354, 2015 29. Harshpreet Singh et.al, "CPSel : Cloud Provider Selection Framework for Ranking and Selection of Cloud Provider", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 1 ,18787-18810, 2015 30. Rohitt Sharma et.al, "Automated Approach for Anti-Pattern Detection", INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING, volume : 4, Issue : 2 ,62 - 66, 2015 31. Anurag Singh Tomar et.al, "Detection of Black Hole Attack With Improved AODV Protocol in Manet", International Journal of Innovative Research in Science, Engineering and Technology, volume : 4, Issue : 1 , 2015 32. Sudipta Koley et.al, "The unusual normal state and charge-density-wave order in 2H-NbSe 2", Journal of Physics Condensed Matter, volume : 27, Issue : 18 , 2015 33. Ravi Kant Sahu et.al, "Energy Efficient B-Leach Routing Protocol", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 5 ,995- 1000, 2015 34. Er.Dalwinder Singh et.al, "Hybrid Technique for the Enhancement in Regression Testing", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,130-136, 2015 35. Janpreet Singh et.al, "Improvement in Load Balancing Technique for MongoDB Clusters", International Journal of Applied Information Systems (IJAIS), volume : 8, Issue : 1 ,31-35, 2015 36. Janpreet Singh et.al, "A Review on Improvement of QoS in Web Services Functions", International Journal of Computer Applications, volume : 112, Issue : 1 ,13-15, 2015 37. Rohitt Sharma et.al, "DENOISING MEDICAL IMAGE USING WAVELET TRANSFORMATION METHODS", International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,1023 - 1027, 2015 38. Nikhil Monga et.al, "Importance of service quality in building brand loyalty in Indian automobile Industry", ACADEMICIA: An International Multidisciplinary Research Journal, volume : 5, Issue : 1 ,24-35, 2015 39. Nikhil Monga et.al, "MANAGING E-COMMERCE INDUSTRY IN INDIA", International Journal of Advanced Research in Management and Social Sciences, volume : 4, Issue : 1 ,71-83, 2015 40. Gurbakash Phonsa et.al, "Optimize Testing Process after Generating the Behavioral Representation of System", International Journal of computer application, volume : Issue : 1 ,11, 2015 41. Sudhanshu Prakash Tiwari et.al, "PSO Based on Modified SPV and a Arithmetic Crossover for Job Scheduling", Second International Conference on Advanced Developments in Engineering and Technology, volume : 5, Issue : 1 ,37-41, 2015 42. Kundan Munjal et al., "Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks", IJCA, volume : 100, Issue : 15 ,27, 2015 43. Roshan Srivastava et al., "Detection and Prevention of Code Injection Attack by Inheritance on Object Oriented Database Systems", International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,2081-2087, 2015 44. Jasvinder Pal Singh Virdi , "Constants of Motion for Complex Hamiltonian with Sextic Potential in ECPS", research journal pharmaceutical biological and chemical sciences, volume : 6, Issue : 1 ,1767-1772, 2015 45. Aditya Khamparia et al., "Diagnosis of Liver cancer ontology using SPARQL", International Journal of Applied Engineering Research, volume : 10, Issue : 69 ,15-18, 2015 46. Aditya Khamparia et al., "Performance analysis of adaptive intelligent tutoring system", International Journal of Applied Engineering Research, volume : 10, Issue : 69 ,233-236, 2015 47. A.K.Srivastava et al., "Radiation losses in the microwave Ku band in magneto-electric nanocomposites", Beilstein Journal of Nanotechnology, volume : 6, Issue : 1 ,1700-1707, 2015 48. Roshan Srivastava et al., "Prevention and Detection of SQL injection Attacks using an advanced version of Aho-corasick Algorithm", International Journal of Applied Engineering Research, volume : 10, Issue : ,2117-2120, 2015 49. Virrat Devaser et al., "Using Dempster Shafer Theory to Evaluate the Performance of Securities and Sector Wise Indices", The International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,2057-2062, 2015 50. Virrat Devaser et al., "Stock Price Prediction for a Sectorial