Publications Data 2015 1. Anurag Singh Tomar Et.Al

Publications Data 2015 1. Anurag Singh Tomar Et.Al

Publications Data 2015 1. Anurag Singh Tomar et.al, "Image based Authentication with Secure Key Exchange Mechanism in Cloud", Medical Imaging, m-Health and Emerging Communication Systems (MedCom), 2014 International Conference, Issue : 1 , 2015 2. Shekhar Verma et.al, "Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement", International Journal Of Engineering Research & Technology (IJERT), volume : 4, Issue : 1 , 2015 3. Ketki Arora et.al, "Security of Data in Cloud Environment Using DPaas", IJMER, volume : 5, Issue : 1 ,8, 2015 4. Gaurav Kumar Tak et.al, "Comparative Analysis of Various Attacks on MANET", International Journal of Computer Applications, volume : 111, Issue : 12 ,42-46, 2015 5. Varun Singla et.al, "Big Data: Tools and Technologies in Big Data", International Journal of Computer Applications, volume : 112, Issue : 1 ,0975 – 8887, 2015 6. Isha et.al, "Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET: A Review", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,678-681, 2015 7. Isha et.al, "Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,674- 677, 2015 8. Nidhi Sethi et.al, "Synthesis, Characterization and Anti microbial activity of protected dipeptides and their deprotected analogs", Oriental Journal of chemistry, volume : 31, Issue : 1 , 2015 9. Rohitt Sharma et.al, "A Survey of Various Image Enhancement Methods on Different Types of Images", INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING, volume : 3, Issue : 1 , 2015 10. Aditya Khamparia et.al, "Adaptive E-Learning Based Udutu System For Object Oriented Programming", International Journal of Applied Engineering Research, volume : 10, Issue : 1 ,1439-1442, 2015 11. A.K.Srivastava et.al, "Effect on dielectric, magnetic, optical and structural properties of Nd–Co substituted barium hexaferrite nanoparticles", Applied Physics A, volume : 119, Issue : 4 ,1531- 1540, 2015 12. Priyanka et.al, "Quality Assessment Model for wheat storage warehouse using analytic Hierarchy process and BP neural Network", IEEE XPLORE, volume : Issue : 1 , 2015 13. Avinash Kaur et.al, "Object based Accountability Framework for Information Sharing in Cloud Computing", International Journal of Computer Applications, volume : 115, Issue : 1 ,28-32, 2015 14. Manmohan Sharma et.al, "A Survey on Black Hole Attack Detection and Prevention Techniques", International Journal for Research in Applied Science & Engineering Technology (IJRASET), volume : 3, Issue : 1 ,904-907, 2015 15. Gagandeep Singh et.al, "Enhanced Secure Protocol for Reliable Data Delivery", International Journal of Computer Applications, volume : 116, Issue : 1 , 2015 16. Gaurav Kumar Tak et.al, "Hybrid Protocol for Handling Security using SBPGP", International Journal of Computer Applications, volume : 115, Issue : 22 , 2015 17. Ravi Kant Sahu et.al, "Redeployment and Localization in Wireless Sensor Networks Using Mobile Anchors", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,665, 2015 18. Gagandeep Singh et.al, "An Enhanced Approach for Trust Based Routing in MANET", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,585-588, 2015 19. Nisha Sethi et.al, "Review on Fault Tolerance Techniques in Cloud Computing", International Journal of Computer Applications, volume : 116, Issue : 18 , 2015 20. Sangeeta Sharma et.al, "The Malicious Insiders Threat in the Cloud", International Journal of Engineering Research and General Science, volume : 3, Issue : 2 ,245, 2015 21. Harjeet Kaur et.al, "Identifying & Isolating Multiple Black Hole Attack on AODV protocol in MANET", International Journal of Innovative Reasearch in Science Enginnering and Technology, volume : 4, Issue : 1 , 2015 22. Kundan Munjal et.al, "Efficient Scheme for Preventing Tunneling Attack in Vehicular Ad Hoc Networks", IJAER, volume : 10, Issue : 1 ,15197-15206, 2015 23. Kundan Munjal et.al, "Prediction of Diabetes Mell-EH-Tiss Using Unsupervised Learning Method", IJAER, volume : 8, Issue : 1 ,19049-19061, 2015 24. Isha et.al, "Spectrum Sensing Techniques In Cognitive Radio Based Sensor Networks: A Survey", International Journal of Applied Engineering Research, volume : 10, Issue : 8 ,19063-19076, 2015 25. Sanjay Kumar Singh et.al, "Classification of Follicular Lymphoma Grades Using Support Vector Machine", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 8 ,20441-20449, 2015 26. Sanjay Kumar Singh et.al, "Computer-Aided Classification of Neuroblastoma Using Support Vector Machine", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 8 ,20451-20459, 2015 27. Gurpinder Singh et.al, "Synthesis and antimicrobial activity of Thiosemicarbazone induced Hydrazone of 2-Anilino-3-formylchromone", Journal of Chemical and Pharmaceutical Research, volume : 7, Issue : 5 ,599-605, 2015 28. Manmohan Sharma et.al, "Novel Enhancement Of Security And Performance Of Software Define Network (SDN)", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 1 ,23345-23354, 2015 29. Harshpreet Singh et.al, "CPSel : Cloud Provider Selection Framework for Ranking and Selection of Cloud Provider", International Journal of Applied Engineering Research (IJAER), volume : 10, Issue : 1 ,18787-18810, 2015 30. Rohitt Sharma et.al, "Automated Approach for Anti-Pattern Detection", INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING, volume : 4, Issue : 2 ,62 - 66, 2015 31. Anurag Singh Tomar et.al, "Detection of Black Hole Attack With Improved AODV Protocol in Manet", International Journal of Innovative Research in Science, Engineering and Technology, volume : 4, Issue : 1 , 2015 32. Sudipta Koley et.al, "The unusual normal state and charge-density-wave order in 2H-NbSe 2", Journal of Physics Condensed Matter, volume : 27, Issue : 18 , 2015 33. Ravi Kant Sahu et.al, "Energy Efficient B-Leach Routing Protocol", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 5 ,995- 1000, 2015 34. Er.Dalwinder Singh et.al, "Hybrid Technique for the Enhancement in Regression Testing", International Journal of Advanced Research in Computer Science and Software Engineering, volume : 5, Issue : 1 ,130-136, 2015 35. Janpreet Singh et.al, "Improvement in Load Balancing Technique for MongoDB Clusters", International Journal of Applied Information Systems (IJAIS), volume : 8, Issue : 1 ,31-35, 2015 36. Janpreet Singh et.al, "A Review on Improvement of QoS in Web Services Functions", International Journal of Computer Applications, volume : 112, Issue : 1 ,13-15, 2015 37. Rohitt Sharma et.al, "DENOISING MEDICAL IMAGE USING WAVELET TRANSFORMATION METHODS", International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,1023 - 1027, 2015 38. Nikhil Monga et.al, "Importance of service quality in building brand loyalty in Indian automobile Industry", ACADEMICIA: An International Multidisciplinary Research Journal, volume : 5, Issue : 1 ,24-35, 2015 39. Nikhil Monga et.al, "MANAGING E-COMMERCE INDUSTRY IN INDIA", International Journal of Advanced Research in Management and Social Sciences, volume : 4, Issue : 1 ,71-83, 2015 40. Gurbakash Phonsa et.al, "Optimize Testing Process after Generating the Behavioral Representation of System", International Journal of computer application, volume : Issue : 1 ,11, 2015 41. Sudhanshu Prakash Tiwari et.al, "PSO Based on Modified SPV and a Arithmetic Crossover for Job Scheduling", Second International Conference on Advanced Developments in Engineering and Technology, volume : 5, Issue : 1 ,37-41, 2015 42. Kundan Munjal et al., "Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks", IJCA, volume : 100, Issue : 15 ,27, 2015 43. Roshan Srivastava et al., "Detection and Prevention of Code Injection Attack by Inheritance on Object Oriented Database Systems", International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,2081-2087, 2015 44. Jasvinder Pal Singh Virdi , "Constants of Motion for Complex Hamiltonian with Sextic Potential in ECPS", research journal pharmaceutical biological and chemical sciences, volume : 6, Issue : 1 ,1767-1772, 2015 45. Aditya Khamparia et al., "Diagnosis of Liver cancer ontology using SPARQL", International Journal of Applied Engineering Research, volume : 10, Issue : 69 ,15-18, 2015 46. Aditya Khamparia et al., "Performance analysis of adaptive intelligent tutoring system", International Journal of Applied Engineering Research, volume : 10, Issue : 69 ,233-236, 2015 47. A.K.Srivastava et al., "Radiation losses in the microwave Ku band in magneto-electric nanocomposites", Beilstein Journal of Nanotechnology, volume : 6, Issue : 1 ,1700-1707, 2015 48. Roshan Srivastava et al., "Prevention and Detection of SQL injection Attacks using an advanced version of Aho-corasick Algorithm", International Journal of Applied Engineering Research, volume : 10, Issue : ,2117-2120, 2015 49. Virrat Devaser et al., "Using Dempster Shafer Theory to Evaluate the Performance of Securities and Sector Wise Indices", The International Journal of Applied Engineering Research, volume : 10, Issue : 55 ,2057-2062, 2015 50. Virrat Devaser et al., "Stock Price Prediction for a Sectorial

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    47 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us