Research Papers (Computer Science & Engineering)

Topic AUTHOR CO AUTHOR Journal / Proceedings
A Survey on Evaluation of IOT Enable Smart Healthcare system Architecture Akhilesh Pratap Singh NATCOM, SRMSCETR, BAREILLY, 25th March 2017.
Comparative Study and Performance Analysis of Randomized Reverse AODV Nilesh Chandra Akhilesh Pratap Singh NATCOM, SRMSCETR, BAREILLY, 25th March 2017.
Modified Leach Algorithm in Wireless Sensor Network Nilesh Chandra   PARIPEX, March 2017.
Comparative Study & Performance Analysis Of Aodv,R-Aodv&Phr-Aodv In Manet Nilesh Chandra   IJRET, Februray 2017
Application of XML Compressor[EXI] in Medical Image Database(DICOM)   Niharika Srivastava International Journal of Advanced Research in Computer and Communication
Engineering (IJARCCE), Volume 5, Issue 2, February, 2016.
Application of XML Compressor[EXI] in Medical Image Database(DICOM) Gaurav Jaiswal   International Journal of Advance Research in Computer & Communication Engineering- IJARCCE, Vol. 5, Issue 2, Pp. 4-8, February 2016 (Impact Factor 5.3) [ISSN (Online) 2278-1021].
Fuzzy Query: Animpression in Query processing   Niharika Srivastava International Conference on Advancement in Computer Engineering and Information Technology (ACEIT-16), 12th March 2016.
Application of XML Compressor[EXI] in Medical Image Database(DICOM)   Niharika Srivastava International Journal of Advanced Research in Computer and< Communication Engineering (IJARCCE), Volume 5, Issue 2, February, 2016./td>
Pervasive Computing: An Overview   Gaurav Jaiswal International Journal of Advance Research in Computer & Communication Engineering-
IJARCCE, Vol. 5, Issue 11, Pp. 325-328, November 2016 (Impact Factor 5.332) [ISSN (Online)
2278-1021].
Comparative Study of Parallel Sorting Algorithms. Akhilesh Pratap Singh National Conference on Research & Innovation in Engineering & Technology, 6-7
Nov 2015 Vol​. ISBN 978-93-5254-335-9
An Intelligent Approach To Secure The Network   Akhilesh Pratap Singh National Conference on Research & Innovation in Engineering & Technology, 6-7
Nov 2015 Vol​. ISBN 978-93-5254-335-9
Advanced Approach For Face Recognition Using Gabor Wavelet and SURF detector (GWSS) Gaurav Jaiswal   5th IEEE InternationalConference on System Modeling & Advancement in Research Trends
(SMART-2017) Organized by College Of Computing Sciences & Information Technology, Teerthanker
Mahaveer University,
SQL injection detection and correction using audit record. Ms. Garima Singh   International Journal of Technology & Management, IJTM, Nov-2013
A Clustering Based Intrusion Detection System for Storage AreaNetwork. Ms. Garima Singh   International Journal of Computer Application, IJCA, Feb-2014
SQL injection detection and correction Using Machine Learning Technique. Ms. Garima Singh   Advances in Intelligent Systems and Computing Volume337,2015,pp435-442, http://link.springer.com/ chapter/ 10.1007%2F978-3-319-13728-5_49
, Springer, CSI-2014
An Efficient Salt and Pepper noise Removal and Edge preserving Scheme for Image Restoration . Ms. Garima Singh   IJCTA, Sept-Oct 2012
http://ijcta.com/ documents/volumes/ vol3issue5/ijcta2012030535.pdf
Network Based Intrusion Detection System For Pervasive Computing Environment. Ms. Garima Singh   Elsevier
A Wavelet Based Watermarking Technique for medical Images. Ms. Garima Singh   International Journal of Computer Application, Springer(Accepted)
Systematics Review and Comparative Analysis among Various XML Compression Techniques. Mr. Gaurav Jaiswal   International conference on Advances in Electronics, Electrical and Computer Science Engineering organized by UACC at Dehradun, Uttarakhand on 7th to 9th July, 2012
Why Use Efficient XML Interchange instead of Fast Infoset Mr. Gaurav Jaiswal   3rd IEEE International Advance Computing Conference held at AKGEC, Ghaziabad on 22nd -23rd Feb., 2013, Pp. 925-930
Layer-Based Compound Image Compression using Efficient XML Interchange Processor Mr. Gaurav Jaiswal   1st National Conference on Innovative Trends in Signal Processing and Networking, ITSPN-2013 held at SRMSWCET, Bareilly on April, 2013.
Systematics Review and Comparative Analysis among Various XML Compression Techniques Mr. Gaurav Jaiswal   proceedings of UACC in International Journal of Advances in Computer Science and its Application – IJCSIA, Vol.2 (3), Pp. 26-30, 2012.
Layer-Based Compound Image Compression using Efficient XML Interchange Processor. Ms. Niharika Srivastava   1st National Conference on Innovative Trends in Signal Processing and Networking, ITSPN-2013 held at SRMSWCET, Bareilly on April, 2013
A review on the approaches in honeypot for implementation of network security Ms. Niharika Srivastava   International Journal on Computer Science and Engineering (IJCSE), Volume 4, Issue 10, 2012.
Energy Consumption Evaluation of MANET Routing Protocols Using NS2 ENERGY MODEL Mr. Akhilesh Pratap Singh   NCRTES-2013 KNIT Sultanpur
SQL Injection Detection and Correction Using Machine Learning Techniques.   Mr. Akhilesh Pratap Singh Springer international Publishing Switzerland 2015
A User-Side Framework for Security Auditing and Monitoring Mr. Devkant Gupta   International Journal of Advanced Information Science and Technology (IJAIST) Vol.13, No.13, May 2013. ISSN: 2319:2682
SQL Injection Detection and Correction Using Machine Learning Techniques   Mr. Devkant Gupta Springer international Publishing Switzerland 2015.