Publications
S.NO | PUBLICATION DETAILS | YEAR | SCS | WOS | INCI | PBM | IEEE | GSC | SNIP | IM.F |
---|---|---|---|---|---|---|---|---|---|---|
1. | Evaluation and Refinement of MVC Web Application Architecture, [2] | 2021 |
|
|
|
|
|
| 5 | 0.119 |
2. | A concept based approach of rare association rule mining from education data, [3] | 2021 |
|
|
|
|
|
| 48 |
|
3. | A Systematic Review and Comparative Analysis of Cloud Simulation Tools, [4] | 2021 |
|
|
|
|
|
| 185 | 0.119 |
4. | Security Enhancement in Storage of Linux Containers Over Cloud Computing Infrastructure, [5] | 2021 |
|
|
|
|
|
| 32 |
|
Security Enhancement in Storage of Linux Containers Over Cloud Computing Infrastructure, [5] | 2021 |
|
|
|
|
|
| 32 |
| |
6. | Analysis of Web Usage Patterns to Identify Most Frequently Accessed Web Page by Multiple Users, [6] | 2020 | 0 |
|
|
|
| 0 | 159 | 0.184 |
7. | Computational and Performance Aspects of Face Recognition Method (HOPFALRB), [7] | 2020 | 0 | 0 |
|
|
| 0 | 642 |
|
8. | A Recommendation Perspective for Modeling Drug-Target Interaction Predictions Using Network-Based Approaches, [8] | 2020 |
|
|
|
|
| 0 | 585 | 0.184 |
9. | Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python, [9] | 2020 | 0 |
|
|
|
| 0 | 8 | 0.184 |
10. | Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models, [10] | 2020 | 0 |
|
|
|
| 0 | 76 | 0.184 |
11. | Improving Public Transport Services using Sentiment Analysis of Twitter data, [11] | 2020 |
|
|
|
|
| 0 | 250 | 0.119 |
12. | Comparative Study of Prewitt and Canny Edge Detector Using Image Processing Techniques, [12] | 2020 | 0 |
|
|
|
| 0 | 713 | 0.184 |
13. | Analysis of the Influence of Photo Manipulation on Creative Advertising, [13] | 2020 | 0 | 0 |
|
|
| 0 | 541 | 0.184 |
14. | Query Caching Technique Over Cloud-Based MapReduce System: A Survey, [14] | 2020 | 0 |
|
|
|
| 0 | 25 | 0.184 |
15. | Understanding the Role of Artificial Neural Networks in the Prediction of Mental Health Diseases, [15] | 2020 | 0 |
|
|
|
| 0 | 409 | 0.184 |
16. | MRC-COVID (Map Reduce with Cache) System for Big data Analytics, [16] | 2020 |
|
|
|
|
| 2 | 1808 |
|
17. | A New Methodology on Sentiment Analysis, [17] | 2020 | 1 | 0 | 625 | |||||
18. | Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python, [9] | 2020 | 0 |
|
|
|
| 0 | 8 | 0.184 |
19. | Coronavirus (COVID-19) in India-Statistics & Facts, [18] | 2020 | 1 |
|
|
| 1 | 521 |
| |
20. | The Rising of Blockchain Technology and Its Adoption in India, [19] | 2020 | 0 |
|
|
|
| 0 | 357 |
|
21. | AI-HI…The Technological Transgenders (AI-HI Techno-Trans), [20] | 2020 | 0 |
|
|
|
| 0 | 183 |
|
22. | Innovative Classroom Activity with Flipped Teaching for Programming in C Course—A Case Study, [21] | 2020 | 0 |
|
|
|
| 0 | 252 |
|
23. | Analysis of Value-Based Academic Accomplishment Through Prominent Management Techniques, [22] | 2020 | 0 |
|
|
|
| 0 | 494 |
|
24. | Analysis of Augmented Course Delivery and Assessment of Undergraduate Computer Engineering Programming Courses with the Use of ICT, [23] | 2020 | 0 |
|
|
|
| 0 | 488 |
|
25. | A novel approach for software security requirements identification in OSS projects, | 2020 | 0 |
|
|
|
|
| 13179 | 0.101 |
26. | A novel approach for software security requirements identification in OSS projects, | 2020 | 0 |
|
|
|
|
| 13179 | 0.101 |
27. | A descriptive review on software security requirements using open source software projects, [24] | 2020 | 0 |
|
|
|
|
| 4298 | 0.123 |
28. | A descriptive review on software security requirements using open source software projects, [24] | 2020 | 0 |
|
|
|
|
| 4298 | 0.123 |
29. | Analog Front-End Design and Construction for ECG Monitoring System, [25] | 2020 | 1 |
|
|
|
| 0 | 703 | 0.184 |
30. | Vulnerability and Mitigation Strategies for Secure Expert Systems, [26] | 2020 | 0 |
|
|
|
| 0 | 72 | 0.184 |
31. | A Model for Effective Software Testing in Cloud Environment, [27] | 2020 | 0 |
|
|
|
| 0 | 153 | 0.184 |
32. | Prediction of Prediabetes, No Diabetes and Diabetes Mellitus-2 Using Pattern Recognition, [28] | 2020 | 0 |
|
|
|
| 0 | 755 | 0.184 |
33. | A Review on Applicability of Deep Learning for Remote Sensing Applications, [29] | 2020 |
|
|
|
|
| 2 | 3832 | 0.101 |
34. | Grey Box Approach For Mobile Application Testing, [30] | 2020 | 0 |
|
|
|
| 0 | 419 | 0.184 |
35. | Artificial Neural Network Approach for Modeling Cu(II) and Cr(VI) Ion Biosorption from Synthetic Textile Effluent Using Three Low-Cost Biosorbents, [31] | 2020 | 0 | 0 |
|
|
| 0 | 664 |
|
36. | A Diverse View on Feature-Oriented Programming in Software Product Line, [32] | 2020 |
|
|
|
|
|
| 1957 | 0.589 |
37. | Docker Security Analysis Mechanism with Linux Platform, [33] | 2020 | 0 |
|
|
|
| 0 | 601 |
|
38. | Analysis of Docker Performance in Cloud Environment, [34] | 2020 | 0 |
|
|
|
| 0 | 18 |
|
39. | A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment, [35] | 2020 | 0 |
|
|
|
| 0 | 43 | 0.184 |
40. | An Implementation of Privacy Preserving “IF THEN ELSE” Rules for Vertically Partitioned Data, [36] | 2020 | 0 |
|
|
|
| 0 | 56 | 0.184 |
41. | Docker Security Analysis Mechanism with Linux Platform, [33] | 2020 | 0 |
|
|
|
| 0 | 601 |
|
42. | Analysis of Docker Performance in Cloud Environment, [34] | 2020 | 0 |
|
|
|
| 0 | 18 |
|
43. | A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment, [35] | 2020 | 0 |
|
|
|
| 0 | 43 | 0.184 |
44. | An Implementation of Privacy Preserving “IF THEN ELSE” Rules for Vertically Partitioned Data, [36] | 2020 | 0 |
|
|
|
| 0 | 56 | 0.184 |
Heuristic Expert Evaluation of e-Learning Application, [37] | 2020 | 0 |
|
|
|
| 0 | 162 | 0.184 | |
Empirical Investigation of Usability Evaluation Methods for Mobile Applications Using Evidence-Based Approach, [38] | 2020 |
|
|
|
|
|
| 110 |
| |
47. | FEDUS: A comprehensive algorithm for web usage mining, [39] | 2019 |
| 0 |
|
|
| 0 | 854 |
|
48. | Twitter Sentiment Analysis using Rapid Miner Tool, | 2019 |
|
|
|
|
| 0 | 50 |
|
49. | A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm, [40] | 2019 | 2 | 0 | 0.000 | |||||
50. | Prediction Algorithms and Consecutive Estimation of Software Product Line Feature Model Usability, [41] | 2019 | 1 | 0 |
|
| 0 | 777 | 0.000 | |
51. | Essential Parameters of ASMAN Framework to Compare SSPs in Cloud Computing, [42] | 2019 | 0 |
|
|
| 0 | 781 |
| |
52. | Particle Swarm Optimization for Flexible Job Scheduling Problem with Mutation Strategy, [43] | 2019 | 0 |
|
|
|
| 0 | 503 | 0.170 |
53. | Particle Swarm Optimization for Flexible Job Scheduling Problem with Mutation Strategy, [43] | 2019 | 0 | 0 |
|
|
| 0 | 503 | 0.170 |
54. | Segmentation of Handwritten Text Using Bacteria Foraging Optimization, [44] | 2019 |
|
|
|
|
| 0 | 479 |
|
55. | Performance Analysis of E-Governance Citizen-Centric Services Through E-Mitra in Rajasthan, [45] | 2019 |
|
|
|
|
| 1 | 182 |
|
56. | Revisiting Mutation Testing in Cloud Environment (Prospects and Problems), [46] | 2019 |
|
|
|
|
| 0 | 2011 | 0.162 |
57. | Designing optimal architecture of recurrent neural network (LSTM) with particle swarm optimization technique specifically for educational dataset, [47] | 2019 | 10 |
|
|
|
| 2 | 163 | 0.000 |
58. | Cloud migration metamodel : Aaa framework for legacy to cloud migration, [48] | 2019 | 0 |
|
|
| 0 | 50 | 0.000 | |
59. | Investigation of privacy-preserving data models and contributions, | 2019 | 0 |
|
|
| 0 | 783 | 0.000 | |
60. | Toward Adapting Metamodeling Approach for Legacy to Cloud Migration, [49] | 2019 | 0 |
|
|
|
| 1 | 284 | 0.184 |
61. | Cloud migration metamodel : Aaa framework for legacy to cloud migration, [48] | 2019 | 0 |
|
|
| 0 | 50 | 0.000 | |
62. | Investigation of privacy-preserving data models and contributions, | 2019 | 0 |
|
|
| 0 | 783 | 0.000 | |
63. | Toward Adapting Metamodeling Approach for Legacy to Cloud Migration, [49] | 2019 | 0 |
|
|
|
| 1 | 284 | 0.184 |
64. | Study of Various Data Mining Techniques in Prediction of Depression, [50] | 2018 |
|
|
|
|
|
|
|
|
65. | Design and Performance Evaluation of Hybrid Wired-Wireless Network on Chip Interconnect Architecture, [51] | 2018 | 3 |
|
|
|
| 4 | 199 | 0.184 |
66. | Analysis of Load Balancing Algorithms Using Cloud Analyst, [52] | 2018 | 2 | 0 |
|
|
| 2 | 298 | 0.184 |
67. | Impact of Open-Ended Project-Based Collaborative Learning Model for Teaching Undergraduate-Level Dat, [53] | 2018 | 1 |
|
|
|
| 3 | 324 | 0.184 |
68. | Incessant Ridge Estimation Using RBCA Model, [54] | 2018 | 1 |
|
|
|
| 0 | 210 | 0.184 |
69. | Software Quality Improvement Through Penetration Testing, [55] | 2018 | 0 |
|
|
|
| 0 | 244 | 0.184 |
70. | Conceptual Structure of ASMAN Framework to Compare SaaS Providers, [56] | 2018 | 0 | 0 |
|
|
| 0 | 467 | 0.184 |
71. | A Review on Machine Translation Systems in India, [57] | 2018 | 0 |
|
|
|
| 0 | 30 | 0.184 |
72. | Impact of Try A-Gain - An Online Game App for Society, [58] | 2018 | 0 |
|
|
|
| 0 | 218 | 0.184 |
73. | Improved Google Page Rank Algorithm, [59] | 2018 | 0 |
|
|
|
| 1 | 540 | 0.184 |
74. | Empowering Rural Governance through ICT with Special Reference to Rural Rajasthan, | 2018 |
|
|
|
|
|
| 10 |
|
75. | Financial data mining: Appropriate selection of tools, techniques and algorithms, [60] | 2018 | 1 |
|
|
|
| 1 | 251 | 0.160 |
76. | Criteria for Designing Cloud Migration Framework, [61] | 2018 |
|
|
|
|
|
| 530 |
|
77. | Security Analysis of Vitrualization in Cloud Computing, [62] | 2018 |
|
|
|
|
|
| 41 |
|
78. | A Specified Security Comparison for Various Encryption Techniques in Cloud Computing, [63] | 2018 |
|
|
|
|
| 0 | - |
|
79. | A study on benefits and classification of load balancing in cloud computing environment, [64] | 2018 |
|
|
|
|
| 1 | - |
|
80. | Financial data mining: Appropriate selection of tools, techniques and algorithms, [60] | 2018 | 1 |
|
|
|
| 1 | 251 | 0.160 |
81. | Criteria for Designing Cloud Migration Framework, [61] | 2018 |
|
|
|
|
|
| 530 |
|
82. | Security Analysis of Vitrualization in Cloud Computing, [62] | 2018 |
|
|
|
|
|
| 41 |
|
A Specified Security Comparison for Various Encryption Techniques in Cloud Computing, [63] | 2018 |
|
|
|
|
| 0 | - |
| |
A study on benefits and classification of load balancing in cloud computing environment, [64] | 2018 |
|
|
|
|
| 1 | - |
| |
85. | User identification prerequisite for memorisation a type of personalisation, [65] | 2017 | 0 |
|
|
|
| 0 | 298 | 0.130 |
86. | Improved VoIP QoS over Wireless Networks, [66] | 2017 |
|
|
|
|
| 0 | 963 |
|
87. | Determining the Effect of Similar Queries in Cache-based Cloud Datastores, [67] | 2017 |
|
|
|
|
| 0 | 910 |
|
88. | Determining Appropriate Cache-size for Cost-effective Cloud Database Queries, [68] | 2017 |
|
|
|
|
| 2 | 34 |
|
89. | Modeling used for Software Product Line Engineering, [69] | 2017 |
|
|
|
|
| 0 | 679 |
|
90. | Evaluating the Importance of Analyzability, Testability and Changeability Quality Attribute in Reference to Software Product Line Orthogonal Variability Model, | 2017 |
|
|
|
|
| 1 | 32 |
|
91. | From Monolith to Microservice Architecture, [70] | 2017 |
|
|
|
|
|
| 24 |
|
92. | From Monolith to Microservice Architecture, [70] | 2017 |
|
|
|
|
|
| 24 |
|
93. | Comparitive analysis of algorithms for identification of session on the basis of threshhold value, | 2016 | 0 |
|
|
| 1 | 3730 | 0.000 | |
94. | A Study of Out of School Children Problem in Rajasthan using K-means clustering with Genetic Algorithm, [71] | 2016 |
|
|
|
|
| 0 | 16 |
|
95. | Enhancing the Query Performance of NoSQL Datastores using Caching Framework, [72] | 2016 |
|
|
|
|
| 0 | 2336 |
|
96. | A comparative analysis of proactive, reactive and hybrid routing protocols over open source network simulator in Mobile ad hoc network, | 2016 | 9 | 15 | 3896 | 0.199 | ||||
97. | Analysis and Validation of MANET Performance on Open Source Simulator, [73] | 2016 | 16 | |||||||
98. | Examining usability of classes in collaboration with SPL feature model, [74] | 2016 | 1 |
|
|
|
| 1 | 37 | 0.184 |
99. | Empirical Evaluation of Metrics to Assess Software Product Line Feature Model Usability, [75] | 2016 |
|
|
|
|
| 2 | 88 |
|
100. | Empirical Validation of Structural Metrics to Assess and Predict Usability of SPL Feature Model, [76] | 2016 |
|
|
|
|
|
| 30 |
|
101. | Effect of analysis and design phase factors on testing of object oriented software, | 2016 | 0 |
|
|
| 0 | 3700 | 0.000 | |
102. | A review on quality models to analyse the impact of refactored code on maintainability with reference to software product line, | 2016 | 3 |
|
|
| 3 | 3708 | 0.000 | |
103. | Big data protection via neural and quantum cryptography, | 2016 | 3 |
|
|
| 3 | 3704 | 0.000 | |
104. | Effect of Different UMLDiagrams to Evaluate the Size Metric for Different Software Projects, [77] | 2016 |
|
|
|
|
| 0 | 8 |
|
105. | To Retrospect the significant Inter-national parameters for Quality Assessment in Higher Education System In Indian Scenario, | 2016 |
|
|
|
|
|
| 67 |
|
106. | Theoretical study of decision tree algorithms to identify pivotal factors for performance improvement: A review, [78] | 2016 |
|
|
|
|
| 6 | 25 |
|
107. | Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud, [79] | 2016 |
|
|
|
|
| 1 | 16 |
|
108. | A Study on the Nature of Code Clone Occurrence Predominantly in Feature Oriented Programming and the Prospects of Refactoring, [80] | 2016 |
|
|
|
|
| 0 | 44 |
|
109. | Analysis and Validation of MANET Performance on Open Source Simulator, [73] | 2016 |
|
|
|
|
|
| 16 |
|
110. | Analysis and Validation of MANET Performance on Open Source Simulator, [73] | 2016 |
|
|
|
|
|
| 16 |
|
111. | Biodiversity Data Discovery through Data Mining in Mountain areas, [81] | 2015 |
|
|
|
|
| 0 | 53 |
|
112. | A Comparative Study of Mobile Application Testing Frameworks, [82] | 2015 |
|
|
|
|
| 1 | 85 |
|
113. | Review of Query Processing Techniques of Cloud Databases, [83] | 2015 |
|
|
|
|
| 4 | 16 |
|
114. | IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATION, [84] | 2015 |
|
|
|
|
| 0 | 79 |
|
115. | Hybrids of Ant Colony Optimization Algorithm- A Versatile Tool, | 2015 |
|
|
|
|
|
| 381 |
|
116. | In Retrospect of UML based Software Size Metrics, [85] | 2015 |
|
|
|
|
|
| 46 |
|
117. | A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool, [86] | 2015 |
|
|
|
|
| 1 | 19 |
|
118. | The Role of MIS in Production Management, [87] | 2015 |
|
|
|
|
|
| 19 |
|
119. | INFORMATION TECHNOLOGY A TOOL OF MANAGING HR, [88] | 2015 |
|
|
|
|
|
| 115 |
|
120. | The Role of MIS in Production Management, [87] | 2015 |
|
|
|
|
|
| 19 |
|
121. | INFORMATION TECHNOLOGY A TOOL OF MANAGING HR, [88] | 2015 |
|
|
|
|
|
| 115 |
|
122. | Web Usage mining framework for Data Cleaning and IP address Identification, [89] | 2014 |
|
|
|
|
| 6 | 43 |
|
123. | Personal Web Usage Mining: New Mining Approach to Mine Both Local and Remote Activities, | 2014 |
|
|
|
|
|
| 143 |
|
124. | Behavioral analysis of the playout buffer of VoIP based applications from client perspective, [90] | 2014 | 1 |
|
|
| 4 | 284 | 0.000 | |
125. | Relevance of genetic algorithm strategies in query optimization in information retrieval, [91] | 2014 |
|
|
|
|
| 12 | 5927 |
|
126. | Effective Information Architecture for Web based Systems, [92] | 2014 |
|
|
|
|
| 2 | 757 |
|
127. | Transforming features into web pages in feature driven development methodology, [93] | 2014 |
|
|
|
|
|
| 117 |
|
128. | Case Study on Classification of Glass using Neural Network Tool in MATLAB, [94] | 2014 |
|
|
|
|
| 1 | 15 |
|
129. | Green banking : An Analysis on sustainable Path For Green Earth type, [95] | 2014 |
|
|
|
|
|
| 20 | 0.194 |
Green banking : An Analysis on sustainable Path For Green Earth type, [95] | 2014 |
|
|
|
|
|
| 20 | 0.194 | |
131. | Web usage mining: identification of trends followed by the user through neural network, [96] | 2013 |
|
|
|
|
| 1 | 624 |
|
132. | Software Product Line Engineering: Paradigm for Product Family, [97] | 2013 |
|
|
|
|
| 0 | 360 |
|
133. | Analyzing the Importance of Learnability and Understandability Quality Attributes in Reference to SPL Feature Models, [98] | 2013 |
|
|
|
|
| 0 | 895 |
|
134. | VoIP Security Issues: The Grey Shades of Internet Telephony, [99] | 2013 |
|
|
|
|
| 1 | 22 |
|
135. | New Set of Metrics for Accessing Usability in Feature Oriented Programming, [100] | 2013 |
|
|
|
|
| 3 | 22 |
|
136. | Information portal system for a digital campus based on information architecture, [101] | 2013 | 2 |
|
|
| 4 | 352 | 0.000 | |
137. | A Study on modeling Standards for Web Applications and Significance of AspectWebML, [102] | 2013 |
|
|
|
|
| 3 | 2375 |
|
138. | A Study on modeling Standards for Web Applications and Significance of AspectWebML, [102] | 2013 |
|
|
|
|
| 3 | 2375 |
|
139. | Recapitulation on transformations in neural network back propagation algorithm, [103] | 2013 |
|
|
|
|
| 7 | 328 |
|
140. | Software Product Line Engineering: Paradigm for Product Family, [97] | 2013 |
|
|
|
|
| 0 | 360 |
|
Software Testing through Evidence Gathering, [104] | 2013 |
|
|
|
|
| 0 | 632 |
| |
142. | Review Security Issues of MVoIP in WiMAX Network, [105] | 2012 |
|
|
|
|
| 0 | 6 |
|
143. | Review of data mining techniques in cloud computing database, [106] | 2012 |
|
|
|
|
| 18 | 55 |
|
144. | Analyzing the effect of Playout Buffer Adjustment on Voice Quality for VoIP Based Social-Network Applications, [107] | 2012 |
|
|
|
|
|
| 108 |
|
145. | Shadow Detection, Methods and its Evaluation, [108] | 2012 |
|
|
|
|
| 0 | 1336 |
|
146. | Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction, [109] | 2012 |
|
|
|
|
| 9 | 251 |
|
147. | Enhancement of Auto Teller Machine Security Using Pressurized/Safe Mode Login Pin2 Security Model, [110] | 2012 |
|
|
|
|
| 0 | 206 |
|
148. | ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS, [111] | 2012 |
|
|
|
|
| 19 | 40 |
|
149. | Different data encryption methods used in secure auto teller machine transactions, [112] | 2012 |
|
|
|
|
| 8 | 176 |
|
150. | Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction, [109] | 2012 |
|
|
|
|
| 9 | 251 |
|
151. | Enhancement of Auto Teller Machine Security Using Pressurized/Safe Mode Login Pin2 Security Model, [110] | 2012 |
|
|
|
|
| 0 | 206 |
|
152. | ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS, [111] | 2012 |
|
|
|
|
| 19 | 40 |
|
Different data encryption methods used in secure auto teller machine transactions, [112] | 2012 |
|
|
|
|
| 8 | 176 |
| |
154. | Enhanced Playout Buffer Algorithm for VoIP based Social-Network Applications, [113] | 2011 |
|
|
|
|
|
| 104 |
|
155. | Analysis of Open Source Mobile Testing, [114] | 2011 |
|
|
|
|
| 0 | 5 |
|
156. | Vulnerability and security issues in Auto teller machine transactions, [115] | 2011 |
|
|
|
|
| 1 | 6 |
|
Vulnerability and security issues in Auto teller machine transactions, [115] | 2011 |
|
|
|
|
| 1 | 6 |
|
Books Published:
Name of Faculty | Name of Book Published | Year Of Publish | Book Details |
---|---|---|---|
Ms. Anubha Jain | Fundamentals of Computers | 2011 | R.B.D.Publications, Jaipur, (ISBN: 81-8142-366-6) |
Dr. Swati V. Chande | Course Module, Fundamentals of Computers | 2011 | Vardhaman Mahaveer Open University, Kota |
Ms. Priyanka Verma | Programming In Vb.Net | 2013 | R.B.D. Publications, Jaipur, (ISBN: 81-8142-366-6) |
Dr. Navneet Sharma | Office Automation Tools | 2014 | Parth Publication |
Dr. Navneet Sharma | Fundamentals of Computer | 2015 | Parth Publication |
Dr. Navneet Sharma Dr. RK Tailor | Operations And Information Technology | 2016 | RSBA Publishers, Japiur (ISBN: 978-81-7611-749-4) |
Dr. Navneet Sharma | Operating Systems | 2016 | Thakur Publications |
Dr. Geetika Vyas | Anu in Web Land: Web Designing through Conversation Theory | 2019 | Independently published on Amazon's Kindle Direct Publishing (KDP) |
Books Edited:
Year | First Editor | Name of the Book | Publisher | Status (International/ National/ State) | ISBN No. |
---|---|---|---|---|---|
2020 | Vijay Singh Rathore, Dr. Nilanjan Dey, Dr. Vincenzo Piuri, Prof. Dr. Rosalina Babo, Dr. Zdzislaw Polkowski, Prof. Joao Manuel R. S. Tavares | Expert Applications and Solutions. Proceedings of FICRTEAS 2020 | "Springer; 1st ed. 2021 edition (22 September 2020) Advances in Intelligent Systems and Computing Series; Springer Singapore" | International | ISBN-10: 9811560137 ISBN-13: 978-9811560132 |
YEAR 2009-10
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [116] | 01 |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2010-11
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [117] | 02 |
National journal [118] | 04 |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2011-12
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [119] | 09 |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2012- 2013
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [120] | 15 |
National journal | 00 |
Proceedings/ Magazine Article/ Chapter in Book | 00 |
Abstracts | 00 |
YEAR 2013-14
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [121] | 14 |
National journal [122] | 01 |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2014-15
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [123] | 8 |
National journal [124] | - |
Proceedings/ Magazine Article/ Chapter in Book | 4 |
Abstracts | - |
YEAR 2015-16
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [125] | 9 |
National journal | 2 |
Proceedings/ Magazine Article/ Chapter in Book | 1 |
Abstracts | - |
YEAR 2016-17
CATEGORY OF PUBLICATION | NUMBER |
---|---|
International journal [126] | 9 |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | 5 |
Abstracts | - |
YEAR 2017-18
CATEGORY OF PUBLICATION | Number |
---|---|
International journal [126] | 9 |
National journal | 1 |
Proceedings/ Magazine Article/ Chapter in Book | 2 |
Abstracts | - |
YEAR 2018-19
CATEGORY OF PUBLICATION | Number |
International journal [126] | 8 |
National journal | 0 |
Proceedings/ Magazine Article/ Chapter in Book | 1 |
Abstracts | 1 |
YEAR 2019-20
CATEGORY OF PUBLICATION | Number |
International journal [126] | 21 |
National journal | 0 |
Proceedings/ Magazine Article/ Chapter in Book | 4 |
Abstracts | 0 |
Links:
[1] https://www.csit.iisuniv.ac.in/publications
[2] http://iisuniv.researgence.com/AuthorDocument/Publication/1040733.pdf
[3] https://ijrcm.org.in/download.php?name=ijrcm-2-Cvol-2_issue-9_art-8.pdf&path=uploaddata/ijrcm-2-Cvol-2_issue-9_art-8.pdf
[4] https://drive.google.com/file/d/1EawVQ8-yQ4YoL_AtSQ7LcJBZqKcug2AU/view
[5] http://iisuniv.researgence.com/AuthorDocument/Publication/1040838.pdf
[6] https://dx.doi.org/10.1007/978-3-030-39875-0_16
[7] http://dx.doi.org/10.1007/978-981-15-6014-9_76
[8] https://link.springer.com/chapter/10.1007/978-981-15-6014-9_69
[9] https://doi.org/10.1007/978-981-15-6014-9_1
[10] https://doi.org/10.1007/978-981-15-6014-9_9
[11] http://www.joics.org/gallery/ics-2138.pdf
[12] https://doi.org/10.1007/978-981-15-6014-9_86
[13] https://doi.org/10.1007/978-981-15-6014-9_63
[14] https://doi.org/10.1007/978-981-15-6014-9_3
[15] https://doi.org/10.1007/978-981-15-6014-9_46
[16] https://www.researchgate.net/profile/Vandana-Vijay/publication/348355287_MRC-COVID_Map_Reduce_with_Cache_System_for_Big_data_Analytics/links/5ff9acfb299bf14088817b72/MRC-COVID-Map-Reduce-with-Cache-System-for-Big-data-Analytics.pdf
[17] http://dx.doi.org/10.1007/978-981-15-6014-9_74
[18] https://doi.org/10.1109/WorldS450073.2020.9210399
[19] http://dx.doi.org/10.1007/978-981-15-6014-9_40
[20] https://doi.org/10.1007/978-981-15-5859-7_17
[21] http://dx.doi.org/10.1007/978-981-15-5856-6_24
[22] http://dx.doi.org/10.1007/978-981-15-6014-9_56
[23] http://dx.doi.org/10.1007/978-981-15-6014-9_55
[24] https://www.ijstr.org/final-print/feb2020/A-Descriptive-Review-On-Software-Security-Requirements-Using-Open-Source-Software-Projects.pdf
[25] https://doi.org/10.1007/978-981-15-6014-9_85
[26] https://doi.org/10.1007/978-981-15-6014-9_8
[27] https://doi.org/10.1007/978-981-15-6014-9_17
[28] https://doi.org/10.1007/978-981-15-6014-9_90
[29] http://www.solidstatetechnology.us/index.php/JSST/article/view/3588
[30] https://doi.org/10.1007/978-981-15-6014-9_47
[31] http://dx.doi.org/10.1007/978-981-15-6014-9_79
[32] http://iisuniv.researgence.com/AuthorDocument/Publication/1000056.pdf
[33] https://doi.org/10.1007/978-981-15-6014-9_72
[34] http://dx.doi.org/10.1007/978-981-15-5421-6_2
[35] https://doi.org/10.1007/978-981-15-6014-9_5
[36] https://doi.org/10.1007/978-981-15-6014-9_6
[37] https://doi.org/10.1007/978-981-15-6014-9_18
[38] https://doi.org/10.1007/978-981-15-0128-9_9
[39] https://www.tandfonline.com/doi/abs/10.1080/02522667.2019.1616912
[40] https://dx.doi.org/10.1109/WOCN45266.2019.8995109
[41] https://dx.doi.org/10.1109/AICAI.2019.8701400
[42] https://doi.org/10.1109/AICAI.2019.8701300
[43] https://doi.org/10.1007/978-981-13-7150-9_53
[44] https://doi.org/10.1007/978-981-15-0077-0_48
[45] https://doi.org/10.1007/978-981-13-8253-6_16
[46] http://www.jctjournal.com/gallery/220-sep2019.pdf
[47] https://link.springer.com/content/pdf/10.1007/s41870-017-0078-8.pdf
[48] https://dx.doi.org/10.1109/CONFLUENCE.2019.8776983
[49] https://dx.doi.org/10.1007/978-981-13-5934-7_25
[50] http://www.iisjaipur.org/iiim/PDF/Oorja%20Jan-June%202018.pdf
[51] https://doi.org/10.1007/978-981-13-1165-9_17
[52] https://doi.org/10.1007/978-981-13-2285-3_34
[53] https://doi.org/10.1007/978-981-13-1165-9_28
[54] https://link.springer.com/chapter/10.1007/978-981-13-2285-3_25
[55] https://doi.org/10.1007/978-981-13-2285-3_29
[56] https://doi.org/10.1007/978-981-13-2285-3_54
[57] https://doi.org/10.1007/978-981-13-2285-3_3
[58] http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-981-13-2285-3_26
[59] https://doi.org/10.1007/978-981-13-2285-3_63
[60] https://dx.doi.org/10.1007/978-981-13-1423-0_27
[61] http://iisuniv.researgence.com/AuthorDocument/Publication/1010510.pdf
[62] http://www.shanlaxjournals.in/wp-content/uploads/special_education_redinno_publication_7.pdf
[63] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3166543
[64] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3166545
[65] https://dx.doi.org/10.1504/IJSTM.2017.088158
[66] http://search.proquest.com/openview/5a9b379e02ae9533aee1c788b20ee38f/1?pq-origsite=gscholar&cbl=1606379
[67] https://www.researchgate.net/profile/Ruchi_Nanda2/publication/316657704_Determining_the_Effect_of_Similar_Queries_in_Cache-based_Cloud_Datastores/links/590a10560f7e9b1d0823c451/Determining-the-Effect-of-Similar-Queries-in-Cache-based-Cloud-Datastores.pdf
[68] https://www.researchgate.net/profile/Ruchi_Nanda2/publication/312507541_Determining_Appropriate_Cache-size_for_Cost-effective_Cloud_Database_Queries/links/58833f32a6fdcc6b79103557/Determining-Appropriate-Cache-size-for-Cost-effective-Cloud-Database-Queries.pdf
[69] https://www.academia.edu/download/56890076/1498038344_21-06-2017.pdf
[70] http://iisuniv.researgence.com/AuthorDocument/Publication/1010508.pdf
[71] https://www.researchgate.net/profile/Amita_Sharma21/publication/304066432_A_Study_of_Out_of_School_Children_Problem_in_Rajasthan_using_K-means_clustering_with_Genetic_Algorithm/links/5779eb4f08ae1b18a7e625a8/A-Study-of-Out-of-School-Children-Problem-in-Rajasthan-using-K-means-clustering-with-Genetic-Algorithm.pdf
[72] http://ijcsit.com/docs/Volume%207/vol7issue5/ijcsit20160705040.pdf
[73] https://www.researchgate.net/publication/315552384_Analysis_and_Validation_of_MANET_Performance_on_Open_Source_Simulator_1
[74] https://dx.doi.org/10.1007/978-981-10-0767-5_4
[75] http://ijcset.net/docs/Volumes/volume6issue2/ijcset2016060202.pdf
[76] http://iisuniv.researgence.com/AuthorDocument/Publication/1010540.pdf
[77] http://computerresearch.org/index.php/computer/article/view/1321
[78] https://www.researchgate.net/profile/Amita_Sharma21/publication/303318878_Theoretical_Study_of_Decision_Tree_Algorithms_to_Identify_Pivotal_Factors_for_Performance_Improvement_A_Review/links/5762c01008ae2a00c8bb03a1/Theoretical-Study-of-Decision-Tree-Algorithms-to-Identify-Pivotal-Factors-for-Performance-Improvement-A-Review.pdf
[79] https://www.researchgate.net/profile/Amita_Sharma21/publication/304011966_Analysis_of_EnDeCloudReports_for_Encrypting_and_Decrypting_Data_in_Cloud/links/5779ebaa08aead7ba0764621.pdf
[80] https://www.researchgate.net/profile/Nishtha_Kesswani/publication/303319044_A_Study_on_the_Nature_of_Code_Clone_Occurrence_Predominantly_in_Feature_Oriented_Programming_and_the_Prospects_of_Refactoring/links/5d1d8ef3458515c11c0f9777/A-Study-on-the-Nature-of-Code-Clone-Occurrence-Predominantly-in-Feature-Oriented-Programming-and-the-Prospects-of-Refactoring.pdf
[81] http://www.jaipurhotel.satkarhotel.com/researchjournals/Paper10.pdf
[82] http://biyaniconference.com/procedings-2015/IT-BOOK-(Bicon-2015).pdf#page=83
[83] https://www.gyanvihar.org/journals/index.php/2018/12/04/review-of-query-processing-techniques-of-cloud-databases/
[84] http://www.academia.edu/download/40979531/5615ijcsa05.pdf
[85] http://iisuniv.researgence.com/AuthorDocument/Publication/1010525.pdf
[86] https://www.researchgate.net/profile/Amita_Sharma21/publication/283623076_A_Simulation_Tool_for_Security_of_Hardware_Resource_Utilization_Information_in_Cloud_Environment_with_EnDeCloudReports_Tool/links/5762c01008ae0eda64311021.pdf
[87] http://iisuniv.researgence.com/AuthorDocument/Publication/1010765.pdf
[88] http://iisuniv.researgence.com/AuthorDocument/Publication/1010772.pdf
[89] https://arxiv.org/abs/1408.5460
[90] https://dx.doi.org/10.1109/ICCCT.2014.7001505
[91] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.645.5861&rep=rep1&type=pdf
[92] http://ijarcsse.com/Before_August_2017/docs/papers/Volume_4/8_August2014/V4I8-0373.pdf
[93] http://iisuniv.researgence.com/AuthorDocument/Publication/1010533.pdf
[94] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.736.3893&rep=rep1&type=pdf
[95] http://iisuniv.researgence.com/AuthorDocument/Publication/1010770.pdf
[96] http://www.ripublication.com/irph/ijict_spl/02_ijictv3n7spl.pdf
[97] http://www.ripublication.com/irph/ijict_spl/17_ijictv3n4spl.pdf
[98] https://www.academia.edu/download/33262286/Analyzing_the_Importance_of_Learnability_and_Understandability_Quality_Attributes_in_Reference_to_SPL_Feature_Models.pdf
[99] http://www.eclatjournals.com/IJCSET/documents/vol1_issue1/eclat_vol1_paper4.pdf
[100] https://www.researchgate.net/profile/Amita_Sharma21/publication/260458363_New_Set_of_Metrics_for_Accessing_Usability_in_Feature_Oriented_Programming/links/5779ec4b08ae1b18a7e625b1/New-Set-of-Metrics-for-Accessing-Usability-in-Feature-Oriented-Programming.pdf
[101] https://dx.doi.org/10.1109/MITE.2013.6756365
[102] http://ijettjournal.org/volume-4/issue-6/IJETT-V4I6P129.pdf
[103] http://www.ripublication.com/irph/ijict_spl/12_ijictv3n4spl.pdf
[104] http://www.ripublication.com/irph/ijict_spl/03_ijictv3n7spl.pdf
[105] http://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=2249541X&AN=85126602&h=cGAcfxnh1qXxat8ziyEMKAUc%2FFW3lFZ69nOebH6Bl1nrNuedOLBzoYuluxnlOqxVd8ihWp6%2BxYoTHJXE6wP80w%3D%3D&crl=c
[106] https://pdfs.semanticscholar.org/5e9b/811006f20ba9429b8e5d0a211e792466e93d.pdf
[107] http://journals.theired.org/assets/pdf/20121213_035807.pdf
[108] http://www.ijecce.org/administrator/components/com_jresearch/files/publications/IJCEEC_944_Final.pdf
[109] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.674.7242&rep=rep1&type=pdf
[110] https://ijeir.org/administrator/components/com_jresearch/files/publications/IJEIR_515%20Final.pdf
[111] https://www.rroij.com/open-access/analysis-of-different-vulnerabilities-in-auto-teller-machine-transactions-38-40.pdf
[112] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.687.2750&rep=rep1&type=pdf
[113] http://iisuniv.researgence.com/AuthorDocument/Publication/1010505.pdf
[114] https://www.researchgate.net/profile/Peeyush_Pareek/publication/267207133_Analysis_of_Open_Source_Mobile_Testing/links/554995b60cf2ebfd8e3b0963.pdf
[115] https://pdfs.semanticscholar.org/5e4b/8e0913a8fbef1e3f191494154b933436ad56.pdf
[116] https://www.csit.iisuniv.ac.in/international-journal-1
[117] https://www.csit.iisuniv.ac.in/international-journal-0
[118] https://www.csit.iisuniv.ac.in/national-journal
[119] https://www.csit.iisuniv.ac.in/international-journal-2
[120] https://www.csit.iisuniv.ac.in/international-journal-3
[121] https://www.csit.iisuniv.ac.in/international-journal-4
[122] https://www.csit.iisuniv.ac.in/national-journal-0
[123] https://www.csit.iisuniv.ac.in/international-journal-5
[124] https://www.csit.iisuniv.ac.in/national-journal-1
[125] https://www.csit.iisuniv.ac.in/international-journal-6
[126] https://www.csit.iisuniv.ac.in/international-journal-7