Welcome to Information Technology Department

Publications Details

Sr.No. Author Name Title Year Complete Citation
1 Rajesh Shyam Singh Detection of Vehicular Number Plate System using Deep Learning Approach 2021 Journal of Emerging Technologies and Innovative Research (JETIR) , March 2021, Volume 8, Issue 3, pp : 1627-1636, (ISSN-2349-5162)
2 Suchit Kumar Gupta Implementation of Hash Algorithm for Image Authentication 2021 International Conference on Communication and Computing Systems
3 Govind Verma IDENTIFICATION OF TREND IN RAINFALL PATTERN OVER FIVE DISTRICTS OF UTTARAKHAND 2020 Lal, M., Pramanick, B., Verma, G. (2020). "IDENTIFICATION OF TREND IN RAINFALL PATTERN OVER FIVE DISTRICTS OF UTTARAKHAND". published in confrence held on WORLD ENVIRONMENT SUMMIT 2020. held at UNIVERSITY OF DELHI, DELHI (INDIA) organized by ENVIRONMENT AND SOCIAL DEVELOPMENT ASSOCIATION (ESDA), DELHI on 18-19 January 2020
4 Rajesh Shyam Singh 9. A Review Paper on Automatic Number Plate Recognition System 2020 International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Volume 6, Issue 3 pp: 955-966, May-June 2020, ISSN : 2456-3307.
5 Dr H L Mandoria Two Stage Human Activity Recognition Using 2D ConvNet 2020 K.K. Verma, B.M. Singh, H.L.Mandoria,P. Chauhan "Two Stage Human Activity Recognition Using 2D ConvNet" International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI) (SCIE Journal) ISSN:1989-1660, April 24, 2020
6 Dr H L Mandoria Plant Diseases Concept in Smart Agriculture Using Deep Learning 2020 Prachi Chauhan,Hardwari Lal Mandoria, Alok Negi, R. S. Rajput" Plant Diseases Concept in Smart Agriculture Using Deep Learning" DOI: 10.4018/978-1-7998-5003-8.ch008, In book: Smart Agricultural Services Using Deep Learning Edition: 1 Chapter: 8Publisher: IGI Global, September 2020
7 Sanjay Joshi A comparative study of search engines results using data mining and statistical analysis 2020 A comparative study of search engines results using data mining and statistical analysis” by Prabhu Pant, Pankaj Joshi, Sanjay Joshi, Published in International Journal of Statistics and Applied Mathematics, ISSN: 2456-1452 Maths 2020; 5(5): 30-33
8 Ratnesh Srivastava Diagnosis of Cough and Cancer Using Image Compression and Decompression Techniques 2020 Tripathi A., Srivastava R.P., Singh A.K., Choudhary P., Vashist P.C. (2020) Diagnosis of Cough and Cancer Using Image Compression and Decompression Techniques. In: Hu YC., Tiwari S., Trivedi M., Mishra K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-15-1518-7_30
9 Shri Prakash Dwivedi Error-tolerant geometric graph similarity and matching 2019 Shri Prakash Dwivedi, Ravi Shankar Singh, “Error-tolerant geometric graph similarity and matching” In Pattern Recognition Letters, 125:625-631 (2019).
10 Dr H L Mandoria A Complete Guide to Wireless Sensor Networks: from Inception to Current 2019 Ankur Dumka, Sandip K. Chaurasia, Arindam Biswas, Hardwari Lal Mandoria "A Complete Guide to Wireless Sensor Networks: from Inception to Current" Taylors & Francis Group- CRC Press International, June 2019 978-1-138-57828-9
11 Sanjay Joshi Adding Improvements to Multinomial Naive Bayes for Increasing the Accuracy of Aggressive Tweets Classification 2019 “Adding Improvements to Multinomial Naive Bayes for Increasing the Accuracy of Aggressive Tweets Classification” by Divisha Bisht, Sanjay Joshi, International Journal of Advanced Research in Computer and Communication Engineering Vol. 8, Issue 11, November 2019, ISSN 2278-1021
12 Sanjay Joshi “Effect of changing the number of parameters in a dataset on the result of k-means clustering algorithm” 2019 “Effect of changing the number of parameters in a dataset on the result of k-means clustering algorithm” by Prabhu Pant, Hrishikesh Vallabh Joshi, Pankaj Joshi, Sanjay Joshi, International Journal of Statistics and Applied Mathematics, ISSN: 2456-1452 Maths 2019; 4(3): 43-46
13 Ratnesh Srivastava Concurrent Asynchronous Robotic Subsumption using Actors Promises 2019 Ratnesh Prasad Srivastava,G.C. Nandi, Rohit Shukla and Harsh Verma " Concurrent Asynchronous Robotic Subsumption using Actors Promises," International Journal of Robotics and Automation (IJRA) Vol. 8, No. 4, December 2019, pp. 217∼244 ISSN: 2089-4856, DOI: 10.11591/ijra.v8i4.pp217-244
14 Ratnesh Srivastava Monoids for Monadic Composition 2019 2. Ratnesh Prasad Srivastava and Rajiv Singh “Monoids for Monadic Composition” International Journal of Applied Engineering Research (IJAER) Vol. 14, No. 11 (2019) pp. 2578-2584
15 Ratnesh Srivastava Word Ranking Based Document Clustering 2019 3. Ratnesh Prasad Srivastava and Rajiv Singh “Word Ranking Based Document Clustering” International Journal of Applied Engineering Research(IJAER) ISSN 0973-4562 Volume 14, Number 11 (2019) pp. 2782-2788
16 Ratnesh Srivastava Performance Evaluation of a Solar Tree Design and a Fixed Solar Panel for Effective Solar Power Harnessing 2019 4. Rajiv Singh, Neelam Rawat and Ratnesh Prasad Srivastava “Performance Evaluation of a Solar Tree Design and a Fixed Solar Panel for Effective Solar Power Harnessing” International Journal of Applied Engineering Research (IJAER) ISSN 0973-4562 Volume 14, Number 11 (2019) pp. 2616-2621
17 Dr Hardwari Lal Mandoria Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods 2019 Mahima Rai, H. L. Mandoria “Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods”, IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT),2019,DOI:10.1109/ICICT46931.2019.8977679. Published in IEEE Xplore Digital Library
18 Shri Prakash Dwivedi Error-tolerant graph matching using node contraction 2018 Shri Prakash Dwivedi, Ravi Shankar Singh, “Error-tolerant graph matching using node contraction” In Pattern Recognition Letters, 116:58-64 (2018).
19 Shri Prakash Dwivedi Error-tolerant geometric graph similarity 2018 Shri Prakash Dwivedi, Ravi Shankar Singh, “Error-tolerant geometric graph similarity” In Structural, Syntactic, and Statistical Pattern Recognition, Lecture Notes in Computer Science 11004:337-344, Springer (2018).
20 Rajesh Shyam Singh 7. A review on Texture, Shape and Color based Classification of Satellite Images using GLCM and GABOR FILTER, FUZZY CMEANS and SVM 2018 International Research Journal of Engineering and Technology(IRJET), Volume 5, Issue 4, pp:751-754, April 2018, ISSN : 2395-0056.
21 Rajesh Shyam Singh 8. A Classification Approach for Satellite Images using Support Vector Machine 2018 Journal of Emerging Technologies and Innovative Research (JETIR), Volume 5, Issue 11 pp: 5-10, Nov. 2018, ISSN : 2349-5162.
22 Dr H L Mandoria Analysis Issues in SDN Security & Solutions 2018 Ankur Dumka, Hardwari Lal Mandoria, Anushree Sah "Analysis Issues in SDN Security & Solutions" (Chapt 10 Pages 217-239) / Innovations in Software-Defined Networking and Network Functions Virtualization, SCImago IGI Global International, Feb. 2018 DOI: 10.4018/978-1-5225-3640-6.ch010 ISBN10: 152253640X ISBN13: 9781522536406
23 Dr Hardwari Lal Mandoria Comparison of Image feature Descriptor in Content Based Image Retrieval System 2018 Shreela Pareek, Hardwari Lal Mandoria "Comparison of Image feature Descriptor in Content Based Image Retrieval System" International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) pp. 1509-1513 DOI:978-1-5090-6106-8/17 ISSN: 0045-7906 January. 2018 ,Published in IEEE Xplore Digital Librry SCImago
24 Ashok Kumar Analysis and Comparison of Loan Sanction Prediction Model using Python 2018 23. Srishti Srivastava, Ayush Garg, Arpit Sehgal & Ashok Kumar, ”Analysis and Comparison of Loan Sanction Prediction Model using Python”, International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN (P): 2249-6831; ISSN (E): 2249-7943 Vol. 8, Issue 3, Jun 2018, 1-8 © TJPRC Pvt. Ltd.
25 Ratnesh Srivastava A REVIEW ON IMAGE BASED PERSON AND OBJECT RECOGNITION USING SIFT AND HMM 2018 5. Aanchal Verma, Ratnesh Srivastava, H.L Mandoria and Binay Pandey “A REVIEW ON IMAGE BASED PERSON AND OBJECT RECOGNITION USING SIFT AND HMM” International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018
26 Rajesh Shyam Singh 5. A Study on Various kind of Fraud’s and it’s Effect 2017 International Journal of Innovative Research in Science, Engineering & Technology (IJIRSET), Volume 6, Issue 8, pp: 15588-15594 , Aug 2017, ISSN : 2347-6710.
27 Rajesh Shyam Singh 6. Analysis of Fraudulent in Graph Database for Indentification and Prevention 2017 International Journal of Innovative Research in Science & Technology (IJIRST), Volume 4, Issue 5, pp: 42-49, Oct. 2017, ISSN : 2349-6010.
28 Dr H L Mandoria "Novel Technique for Isolation of Malicious Nodes in VANET” 2017 Prachi Chauhan, H.L. Mandoria “ Novel Technique for Isolation of Malicious Nodes in VANET” Journal of Advanced Research in Dynamical and Control Systems. (Scopus Indexed) 06 Special Issue, ISSN: 1943-023X, pp 1688-1698 , 2017
29 Dr H L Mandoria “Evaluation of Weight –Based Technique to Reallocate the Task in Mobile Agent System ” 2017 Payal Chhabra, H.L. Mandoria “Evaluation of Weight –Based Technique to Reallocate the Task in Mobile Agent System ” Journal of Advanced Research in Dynamical and Control Systems(JARDCS) (Scopus Indexed) 06 Special Issue, ISSN: 1943-023X, pp 1716-1725, 2017.
30 Dr H L Mandoria “ Efficient Secure Channel Establishment Scheme for Watermarking in Image Processing ” 2017 Hemani, H.L. Mandoria “ Efficient Secure Channel Establishment Scheme for Watermarking in Image Processing ” Journal of Advanced Research in Dynamical and Control Systems (JARDCS) (Scopus Indexed) 06 Special Issue, ISSN: 1943-023X, pp 1765-1773, 2017.
31 Dr H L Mandoria “ Novel Algorithm for Image Encryption Based on GLCM and PCA Algorithms” 2017 Samridhi Singh, H.L. Mandoria “ Novel Algorithm for Image Encryption Based on GLCM and PCA Algorithms”Journal of Advanced Research in Dynamical and Control Systems(JARDCS) (Scopus Indexed) 06 Special Issue, ISSN: 1943-023X, pp 1774-1781, 2017.
32 Dr H L Mandoria Digital Watermarking Approaches and its Applications: A Review 2017 Hemani. H.L.Mandoria “Digital Watermarking Approaches and its Applications: A Review” International Journal of Control Theory and Applications (IJCTA) Vol.10, No.18, ISSN: 0974-5572, pp 343-350, 2017.
33 Dr H L Mandoria Content Based Image Retrieval: Concept and Methodologies 2017 Shreela Pareek, Hardwari Lal Mandoria “Content Based Image Retrieval: Concept and Methodologies” International Journal of Engineering Trends and Technology (IJETT) Vol. 45, No.4, ISSN: 2231-5381, pp 168-170 March, 2017.
34 Dr H L Mandoria An Empirical Study of Vehicles Communication in Vehicular Ad-Hoc Network 2017 Prachi Chauhan, Hardwari Lal Mandoria. “An Empirical Study of Vehicles Communication in Vehicular Ad-Hoc Network” International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET) Vol.06, Issue 3, ISSN: 2319-8753, pp 3763-3768, March, 2017
35 Sanjay Joshi Estimating effect of Increasing the number of ways on the performance of a Set Associative Cache memory 2017 Estimating effect of Increasing the number of ways on the performance of a Set Associative Cache memory, Sanjay Joshi, Sheraz Askari, Gautam Gururani, ICRTSTEM-2017
36 Ratnesh Srivastava Controlling Multi Thread Execution using Single Thread Event Loop 2017 R. P. Srivastava and G. C. Nandi, "Controlling Multi Thread Execution using Single Thread Event Loop," 2017 International Conference on Innovations in Control, Communication and Information Systems (ICICCI), Greater Noida, India, 2017, pp. 1-7, doi: 10.1109/ICICCIS.2017.8660809.
37 Ratnesh Srivastava Integration of robotics components and verification using petri net 2017 R. P. Srivastava and G. C. Nandi, "Integration of robotics components and verification using petri net," 2017 International Conference on Innovations in Control, Communication and Information Systems (ICICCI), Greater Noida, India, 2017, pp. 1-7, doi: 10.1109/ICICCIS.2017.8660756.
38 Binay Kumar Pandey A Review of leading Databases: Relational & Non- Relational Database 2016 I-Manager’s Journal on Information Technology Vol. 5 Issue 2
39 Binay Kumar Pandey Graph Mining Using Span: Graph- Based Substructure Pattern Mining 2016 International Journal of Applied Research on Information Technology and Computing (IJARITAC) Vol. 7, Issue 2 pages.132-139
40 Binay Kumar Pandey Study and Analysis of Copy- Move forgery Detection in Digital Image : A Review 2016 International Research Journal of Engineering and Technology (IJREST) Vol. 3, Issue 5
41 Binay Kumar Pandey A Comprehensive Study of Various Kinds of Frauds& IT’S Impact 2016 Oriental Journal of Computer Science & Technology Vol. 9, Issue 2 09774-6471
42 Rajesh Shyam Singh 4. An Ingenious Page Replacement Technique 2016 49th IRF International Conference, Pune, India, pp: 41-43, Feb 2016, ISBN : 978-93-85973-46-8.
43 Dr H L Mandoria Study of different transformation algorithm in digital image watermarking 2016 Ravish Kumar Dubey, H.L. Mandoria “Study of different transformation algorithm in digital image watermarking” International Journal of Computer Science and Engineering and Information Technology Research (IJCSEITR) Vol.6 Issue 3, pp 11-18 ISSN: 2249-6831(E)2249-7943 Jan 2016 NAAS=3.63
44 Dr H L Mandoria A Comprehensive Study of Different Energy – Efficient Routing Protocols in Wireless Sensor Networks 2016 Bhoomika Pandey, H.L. Mandoria “A Comprehensive Study of Different Energy – Efficient Routing Protocols in Wireless Sensor Networks” International Journal of Computer Networking, Wireless and Mobile communication (IJCNWMC) Vol. 6 , Issue 2, pp 2250-1568(E) 2278-9488 Apr 2016 NAAS=3.83
45 Dr H L Mandoria Analyzing Routing Protocol Based on Bat Algorithm for Sparely and Densely Deployment of sensors in Wireless Sensor Network 2016 Bhoomika Pandey, H.L. Mandoria “Analyzing Routing Protocol Based on Bat Algorithm for Sparely and Densely Deployment of sensors in Wireless Sensor Network” International Journal of Mathematics and Computer Applications Research (IJMCAR) Vol. 6 , Issue 4, (P)2249-6955(E) 2249-8060 Aug 2016
46 Dr Hardwari Lal Mandoria A comprehensive Study on Text and Image Stenography 2016 Bhoomika Pandey, Hardwari Lal Madoria “A comprehensive Study on Text and Image Stenography” International Journal of Engineering Trends &Technology in Computer Science (IJETTCS) Vol.5 Issue 1, ISSN: 2278-6856 Jan, 2016
47 Ashok Kumar Study and Comparison of Distributed Energy Efficient clustering Protocols in Wireless Sensor Network : A Review 2016 13. Anamika, Ashok Kumar, H.L. Mandoria , Binay Kumar Pandey “Study and Comparison of Distributed Energy Efficient clustering Protocols in Wireless Sensor Network : A Review” IManager’s Journal on Wireless Communication Network Vol. 4, Issue 4, Jan-March 2016.
48 Shikha Goswami Reviewing Trusted Path Algorithms in Mobile Ad Hoc 2015 Vol.5,Issue 6,International Journal Of Advanced Research in Computer Science and Software Engineering
49 Shri Prakash Dwivedi Computing Modular Exponentiation for Fixed-Exponent 2015 Shri Prakash Dwivedi, “Computing Modular Exponentiation for Fixed-Exponent” In Proceedings of the Annual ACM India Conference COMPUTE, 89-94, ACM (2015).
50 Rajesh Shyam Singh 2. Analytical Study on Intrusion Detection and Prevention System 2015 International Journal of Emerging Trends and Technology in Computer Science (IJEETCS), Vol. 4, Issue 6, Nov-Dec 2015, pp: 177-182, E-ISSN: 2278-6856.
51 Rajesh Shyam Singh 1. Left-Right Sort : A Novel Sorting Algorithm and Comparison with Insertion sort, Bubble sort and Selection sort” 2015 International Journal of Engg. & Scientific Research (IJESR), Vol.3, Issue 10, Sep 2015, pp: 47-59, E-ISSN : 2347-6532
52 Rajesh Shyam Singh 3. A Study and Analysis on Image De-noising filters for Hand written Documents 2015 International Journal of Research in Information Technology (IJRIT), Vol. 3, Issue 12, Nov-Dec 2015, pp: 15-20, E-ISSN: 2001-5569.
53 Rajesh Shyam Singh “Preventing Character Recognition Attacks on CAPTCHA: A Customizable CAPTCHA Approach” 2015 International Journal for Research in Emerging Science & Technology (IJREST), Vol.2, Issue 7, July 2015, pp: 91-95, E-ISSN : 2349-7610
54 Rajesh Shyam Singh 5. “Image Denoising in Handwritten Document for Degraded Documents using Wiener Filter Algorithm” 2015 IJREST in Vol. 2, Issue 7, July 2015, pp: 50-56, E-ISSN: 2349-7610.
55 Rajesh Shyam Singh 6. “Preventing Character Recognition Attacks on CAPTCHA: A Customizable CAPTCHA Approach” 2015 IJREST in July 2015, Vol. 2, Issue 7, pp: 91-95, International Journal for Research in Emerging Science and Technology, E-ISSN :2349-7610.
56 Rajesh Shyam Singh 7. “Comparative Study of Hierarchial Routing Protocols in Wireless Sensor Networks” 2015 IJCSE (International Journal of Computer Science and Engineering), Volume 4, Issue 5, pp:214-220, September 2015, ISSN 2347-2693, pp: 214-220
57 Rajesh Shyam Singh 8. “Energy Efficient Routing in Random Deployment of Wireless Sensor Networks” 2015 IJERMT (International Journal of Emerging Research in Management and Technology),. Volume 4, Issue 9, pp: 101-105, September 2015, ISSN : 2278-9359.
58 Rajesh Shyam Singh 9. “Analysis on Enhancements in LEACH protocol for WSN” 2015 SSRG-IJCSE International Journal of Computer Science and Engineering (IJCSE)(Seventh Sense Research Group), Volume 2, Issue 9, pp: 1-8, September 2015, ISSN : 2348-8387.
59 Rajesh Shyam Singh 10. “Analysis of a Novel CAPTCHA Security Method with Existing CAPTCHA Mechanisms” 2015 IJRIT (International Journal of Research in Information Technology), Volume 3, Issue : 9, Sep 2015 edition, pp: 106-112, September 2015, ISSN : 2201-5569.
60 Dr H L Mandoria Multiprotocol Label Switching Feedback Protocol for Per Hop Based Feedback Mechanism in MPLS Network 2015 Ankur Dumka, Hardwari Lal Mandoria "Multiprotocol Label Switching Feedback Protocol for Per Hop Based Feedback Mechanism in MPLS Network" pp 481-487 / Emerging ICT for Bridging the Future – Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) SCImago Springer International Publishing Switzerland International /2015 • • DOI://doi.org/10.1007/978-3-319-13728-5_54 , ISBN:978-3-319-13727-8 eISBN:978-3-319-13728-5
61 Dr H L Mandoria Analysis of Enhanced HOP By HOP Feedback Based Hierarchical MPLS Protocol" 2015 Ankur Dumka, H.L.Mandoria "Analysis of Enhanced HOP By HOP Feedback Based Hierarchical MPLS Protocol" International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) Vol. 5, Issue 6, pp1-6 ISSN: 2249-6831 eISSN: 2249-7943 Dec 2015 NAAS Rating= 3.63
62 Dr Hardwari Lal Mandoria MPLS VPN Using IPv4 and IPv6 Protocol 2015 Ankur Dumka, Hardwari Lal Mandoria, Kanchan Dumka, Abhineet Anand “MPLS VPN Using IPv4 and IPv6 Protocol”, Proceedings of the 9thINDIACom; 2015, IEEE Conference; 2nd International Conference On Computing For Sustainable Global Development” pp 271-275, 11th -13th March 2015,New Delhi, published in IEEE Xplore Digital Library
63 Dr Hardwari Lal Mandoria Implementation of QoS Algorithm in the Integrated Services (IntServ) MPLS Network 2015 Ankur Dumka, Hardwari Lal Mandoria, Vivudh Fore , Kanchan Dumka, “ Implementation of QoS Algorithm in the Integrated Services (IntServ) MPLS Network”, IEEE 2nd International Conference On Computing For Sustainable Global Development” pp 259-261, 1th -13th March 2015, New Delhi; Published in IEEE Xplore Digital Library
64 Dr Hardwari Lal Mandoria Performance Study of VANET Using Ant Based Routing Algorithms 2015 Radhika Kochhar, Hardwari Lal Mandoria "Performance Study of VANET Using Ant Based Routing Algorithms" IEEE 2nd International Conference (Conference ID: 35071 2015) on “Computing for Sustainable Global Development INDIACom-2015;NewDelhi pp216-.219 ISSN 0973-7529; ISBN 978-93-80544-14-4 March 11-13, 2015,Published in IEEE Xplore Digital Library
65 Ashok Kumar Performance Analysis of Image and Audio Compression Technique using Discrete Wavelet Transform 2015 10. N Gusain, A Kumar, HL Mandoria, “Performance Analysis of Image and Audio Compression Technique using Discrete Wavelet Transform” , International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-4, Issue-9) - September 2015.
66 Ashok Kumar Study and Comparison Analysis of a Video Watermarking Scheme for Different Attacks 2015 11. H Sharma, A Kumar, HL Mandoria, “Study and Comparison Analysis of a Video Watermarking Scheme for Different Attacks”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-4, Issue-9) - September 2015.
67 Ashok Kumar Augmented AODV Using Clustering in VANET 2015 12. T Arya, A Kumar, HL Mandoria, “Augmented AODV Using Clustering in VANET”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-4, Issue-7) – July 2015.
68 Shikha Goswami SMURF- An IP Spoofed Packet Flooding Attack 2014 Institute of Engineer
69 Shikha Goswami Literature Review on Evaluation of Routing Protocols on Different Scenarios 2014 Vol. 2 201-205 ,Global Journal of Current Engineering Research
70 Shri Prakash Dwivedi Computing multiplicative order and primitive root in finite cyclic group 2014 Shri Prakash Dwivedi, “Computing multiplicative order and primitive root in finite cyclic group” In International Conference on Contemporary Computing, 130-134, IEEE Computer Society (2014).
71 Rajesh Shyam Singh 2. “Performance Analysis of Leach Protocol for Wireless Sensor Network” 2014 i-manager’s Journal on Wireless Communication Networks, Vol. 3, No. 1, Apr-Jun 2014, ISSN-2319-4839, pp:12-16.
72 Rajesh Shyam Singh 3. “Ultrawideband Multiband E-shaped with Slots Microstrip Patch Antenna for Wireless Communications” 2014 ICACCE14-T1-054, ICACCE 2014, BTKIT, Dwarahat.
73 Dr H L Mandoria An efficient algorithm for conflict free address auto configuration in self-configurable networks 2014 Mukesh Chand, H.L. Mandoria, R.C. Joshi “An efficient algorithm for conflict free address auto configuration in self-configurable networks” Research Journal of Applied Sciences, Engineering and Technology (RJASET) Vol.7, Issue 18, pp 3763-3670 ISSN: 2040-7459; e-ISSN: 2040-7467, 2014 SCImago
74 Dr Hardwari Lal Mandoria Data Security Analysis in Cloud Environment: A Review 2014 Meenakshi Thapliyal, H. L. Mandoria , Neha Garg, “Data Security Analysis in Cloud Environment: A Review” International Journal of Innovations & Advancement in Computer Science (IJIACS) Vol.2 Issue 1,pp 14-19, ISSN:2347- 8616 Jan. 2014
75 Ashok Kumar Increasing Agricultural Productivity Using Software Engineering 2014 3. Bhushan Pant, Ashok Kumar, Dr H.L.Mandoria , Increasing Agricultural Productivity Using Software Engineering , international conference ICICT 2014 to be held at PESITM, Shimoga on May 5th and 6th 2014
76 Ashok Kumar Efficiency of Proactive and Reactive Routing Protocols in VANET 2014 4. Awantika, Ashok Kumar, Dr H.L.Mandoria, Efficiency of Proactive and Reactive Routing Protocols in VANET , i-manager’s Journal on Wireless Communication Networks, Vol.3.No.1.April-June 2014
77 Ashok Kumar Performance Assessment of Reactive Routing Protocols Using Random Way Point Mobility Model in MANET 2014 5. Harish Tureha, Ashok Kumar, Hardwari Lal Mandoria, Performance Assessment of Reactive Routing Protocols Using Random Way Point Mobility Model in MANET , i-manager’s Journal on Wireless Communication Networks, Vol.1.No.1., Pages 1-7, Feb-April, 2014.
78 Ashok Kumar Wavy Software Process Model:A Modern Approach 2014 6. Bhushan Pant, Dr H.L.Mandoria ,Ashok Kumar, Wavy Software Process Model:A Modern Approach, i-manager’s Journal on Software Engineering, Vol.9.No.1 July-September 2014.
79 Ratnesh Srivastava Computing Attacks: A Discussion With Solutions 2014 6. Shikha Singh, BinayKumar Pandey, Ratnesh Srivastava, Neha Rawat, Poonam Rawat, AwantikaCloud Computing Attacks: A Discussion With Solutions Open J. Mob. Comput. Cloud Comput., 1 (1) (2014)
80 Ratnesh Srivastava Data Security Issues in Cloud Computing 2014 8. Neha Rawat, Ratnesh Srivastava, Binay Kumar Pandey, Poonam Rawat, Shikha Singh, Awantika Sharma “Data Security Issues in Cloud Computing” in Open Journal of Mobile Computing and Cloud Computing, vol. 1, pp 9-17, 2014
81 Shikha Goswami Security Loop of 802.11 Wireless LANs And Their Solutions 2013 International Journal of Computer Trends and Technology,Vol. 4, Issue 6
82 Dr H L Mandoria Routing Protocols in Mobile Ad-hoc Network: A review 2013 Renu Bahuguan, Hardwari Lal Mandoria, Pranavi Tayal "Routing Protocols in Mobile Ad-hoc Network: A review" Vol. 115 pp 52-60 / Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering) Springer SCImago, Springer, Berlin, Heidelberg, 2013, ISBN:978-3-642-37948-2 ,DOI://doi.org/10.1007, E-ISBN:978-3-642-37949-9_5 ISSN:1867-8211
83 Dr H L Mandoria Merging independent Mobile Adhoc Networks-A new methodology for autoconfiguration of IP addresses 2013 Mukesh Chand, H. .L Mandoria “Merging independent mobile adhoc networks-A new methodology for autoconfiguration of IP addresses” International Journal of Engineering and Technology (IJET) Vol. 5 Issue 1,20-26 0975-4024 p-ISSN: 2319-8613 online) Feb-Mar 2013, SCImago
84 Dr H L Mandoria Partition in mobile adhoc network with mobility-A new approach for effective use of fast IP address auto configuration 2013 Mukesh Chand, H. L. Mandoria “Partition in mobile adhoc network with mobility-A new approach for effective use of fast IP address auto configuration” International Journal of Engineering and Technology (IJET) Vol.4 Issue 6, 419-4260975-4024 (online) p-ISSN: 2319-8613 Dec. 2012- Jan 2013, SCImago
85 Dr Hardwari Lal Mandoria A secure auto configuration scheme for merging independent adhoc network 2013 Mukesh Chand, H L Mandoria, R.C. Joshi “ A secure auto configuration scheme for merging independent adhoc network” International Conference on Recent Trends in Communication and Computer Networks (ComNet 2013), Nov. 8-9,2013, Hyderabad ,India , published in IEEE Xplore Digital Library
86 subodh prasad Alternatively Electricity Generation in an Automobile: An Alternative Fuel 2012 International Journal of Trends in Economics Management and Technology
87 Dr Hardwari Lal Mandoria A Proposed Model for Intrusion Detection System for Mobile Adhoc Network 2010 Husain S., Gupta S.C., Chand M., Mandoria H. L. (2010)“A Proposed Model for Intrusion Detection System for Mobile Adhoc Network” IEEE International Conference on Computer and Communication Technology (ICCCT-2010) pp 99-102 September 17-19, 2010 , Allahabad, Uttar Pradesh , India (ISBN: 978-1-4244-9033-2) published in IEEE Explore Digital Libray
88 Dr Hardwari Lal Mandoria A Combined Classifier to detect Landmines Using Rough Set Theory and Hebb Net Learning & Fuzzy Filter as Neural Networks 2009 Kumar Shrikant, Atri Shivam, H. L. Mandoria “ A Combined Classifier to detect Landmines Using Rough Set Theory and Hebb Net Learning & Fuzzy Filter as Neural Networks” IEEE International Conference on Signal Processing Systems ( ICSPS-2009) pp 423-427 May 15-17 , 2009 , ISBN: 978-0-7695-3654-5, Singapore IEEE Explore Digital Diary
89 Dr Hardwari Lal Mandoria Comparative Performance Study of Various Priority Schemes in ATM Networks 2006 H. L. Mandoria, R. P. Singh “Comparative Performance Study of Various Priority Schemes in ATM Networks” National Journal The Institution of Engineers , Vol. 87, pp 9-13 ISSN: 0971-0469 May 2006 Issue , Kolkata , India, SCImago