Research & Publications

Research & Publications

Research & Publications
Title of the paper Name of the Jornal volume/Issue Page No. Publish Month/Year
Data security in cloud computing using various Encryption Techniques International Journal of Modern Computer Science Volume 4,Issue 3 p.p. 163,166 June,2016
Enhancing Data Security in cloud Computing based on Blowfish and MD5 cryptography International Journal of Modern Computer Science and Applications Volume No-4,Issue No.5 p.p. 12,18 September,2016
Automatic Image Registration based on Transform Based Correlation Based Approch -Survey international journal of research in electronics and computer engineering vol.4,issue2 49-52 June,2016
Image Resigtration based on Geomatrical Transformation Approch using segmentation and Detect the Brain Tumar in MRI Images international journal of computer science research vol,4,issue3 103-110 Sep-16
A Review over the Optimal Vulnerability Detection Methods International Journal of modern Computer Science(IJMCS) Volume 4 Issue 2 83-86. Apr-16
An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification International Journal of Technology and Computing (IJTC) Volume 2 Issue 8 419-422 Aug-16
A Unified Approach to Expose Web Vulnerabilities International Conference on Recent Developments in Science REDSET-2016(3rd Conference) Oct-16
The Study and Selection of Color Image Segmentation Techniques-Survey IJRECE Volume 4 Issue 2 82-85 Apr-16
Detection the Retinal Blood Vessel Segmentation Using Edge & K-Mean Clustering Techniques International Journal of Computer Science Research Volume 4 Issue 4 Dec-16
Measuring the data routing efficacy in Level-2 Leach protocol IEEE 3227-3230 Oct-16
Review of wireless sensor networks national conference ptu september,2016
Improving energy of modified multilevel leach protocol by triggering random channel selection Ijcnis mecs publisher volume8N12 Aug-16
Review on Herachical routing protocols of WSN ijtc journal Volume2 Aug-16
Comparitive study and Analysis of AODV and OLSR Protocols in Mesh Networks ijtc journal Volume 1 Oct-15
Performance Metrics of AODV and OLSR in Mesh Netweorks IEEE Confrence 3182-3185 October,16
Path Selection and Effects of Channel Behaviour in Multi-cast networks IJLTET Journal Volume 7 105-112 September,2016
Enhancing Performance of Multi-Cast Networks by Implicit Channel Assignment national conference ptu September,2016
Overview of SYBIL Attack : Analysis and Detection ijtc journal Volume 1 Oct-15
Analysis and Detection of Byzantine Attack in Wireless Sensor Network IEEE Confrence 3189-3191 October,16
Security Protection across Network based Attacks in Mesh Networks IJLTET Journal Volume 7 470-478 September,2016
Wireless Mesh Networks and Riskless Connection Models national conference ptu September,2016
Review of IDS System in Large Scale Adhoc Networks ijtc journal Volume 1 Oct-15
Performace Analysis of Intrusion Detection System IEEE Confrence 3186-3188 October,16
Detecting and Tracking Intruders in Mesh Based Networks IJLTET Journal Volume 7 63-68 September,2016
Network based Intrusion Detection System or Detecting Anomaly national conference ptu September,2016
Low Cost Robust Inter-Server Authentication for Cloud Environment IEEE
Mitigation of DDoS Attacks in Cloud Computing IEEE
Mitigation of EDoS Attacks in Cloud Computing Taylor and Francis
Pattern Analytical Module for EDoS Attack Recognition IOSR vol. 18, issue 5 14-20 Sep-16
Comparison of Hybrid HOD-GSA, HOD and PSO for the Tuning of Extended Kalman Filter IEEE
A Review on Tuning of Extended Kalman Filter using optimization techniques for state estimation International Journal of computer applications vol. 145, issue 15 1-5 May,2016
Tuning of Extended Kalman Filter for non-linear state estimation IOSR vol.18, issue 5 14-19 October, 2016
Cost Aware task scheduling with active VM Load eveluation ACM Nov-16
Load balancing in Tasks using honeybee Behaviour Algorithm in cloud computing IEEE
Energy Aware task Scheduling with Adaptive Clustering method in cloud computing:A review Taylor and francsis
Mata-Heuristic hybrid Task Scheduling Mechanism with Weighted Clustering over cloud computing IJMCSA vol.4 ,issue-5 39-43 Sep-16
enhanced TPA scheme to improve access permissions development over cloud architecture IJTC journal vol 2,issue 10 508-513 october,2016
Review of third party authentication model for securing user space in cloud computing ijrece vol 4,issue 2 75-77 april,2016
Data security in cloud computing using various Encryption Techniques International Journal of Modern Computer Science Volume 4,Issue 3 p.p. 163,166 June,2016
Enhancing Data Security in cloud Computing based on Blowfish and MD5 cryptography International Journal of Modern Computer Science and Applications Volume No-4,Issue No.5 p.p. 12,18 September,2016
Automatic Image Registration based on Transform Based Correlation Based Approch -Survey international journal of research in electronics and computer engineering vol.4,issue2 49-52 June,2016
Image Resigtration based on Geomatrical Transformation Approch using segmentation and Detect the Brain Tumar in MRI Images international journal of computer science research vol,4,issue3 103-110 Sep-16
A Review over the Optimal Vulnerability Detection Methods International Journal of modern Computer Science(IJMCS) Volume 4 Issue 2 83-86. Apr-16
An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification International Journal of Technology and Computing (IJTC) Volume 2 Issue 8 419-422 Aug-16
A Unified Approach to Expose Web Vulnerabilities International Conference on Recent Developments in Science REDSET-2016(3rd Conference) Oct-16
The Study and Selection of Color Image Segmentation Techniques-Survey IJRECE Volume 4 Issue 2 82-85 Apr-16
Detection the Retinal Blood Vessel Segmentation Using Edge & K-Mean Clustering Techniques International Journal of Computer Science Research Volume 4 Issue 4 Dec-16
Measuring the data routing efficacy in Level-2 Leach protocol IEEE 3227-3230 Oct-16
Review of wireless sensor networks national conference ptu september,2016
Improving energy of modified multilevel leach protocol by triggering random channel selection Ijcnis mecs publisher volume8N12 Aug-16
Review on Herachical routing protocols of WSN ijtc journal Volume2 Aug-16
Comparitive study and Analysis of AODV and OLSR Protocols in Mesh Networks ijtc journal Volume 1 Oct-15
Performance Metrics of AODV and OLSR in Mesh Netweorks IEEE Confrence 3182-3185 October,16
Path Selection and Effects of Channel Behaviour in Multi-cast networks IJLTET Journal Volume 7 105-112 September,2016
Enhancing Performance of Multi-Cast Networks by Implicit Channel Assignment national conference ptu September,2016
Overview of SYBIL Attack : Analysis and Detection ijtc journal Volume 1 Oct-15
Analysis and Detection of Byzantine Attack in Wireless Sensor Network IEEE Confrence 3189-3191 October,16
Security Protection across Network based Attacks in Mesh Networks IJLTET Journal Volume 7 470-478 September,2016
Wireless Mesh Networks and Riskless Connection Models national conference ptu September,2016
Review of IDS System in Large Scale Adhoc Networks ijtc journal Volume 1 Oct-15
Performace Analysis of Intrusion Detection System IEEE Confrence 3186-3188 October,16
Detecting and Tracking Intruders in Mesh Based Networks IJLTET Journal Volume 7 63-68 September,2016
Network based Intrusion Detection System or Detecting Anomaly national conference ptu September,2016
Low Cost Robust Inter-Server Authentication for Cloud Environment IEEE
Mitigation of DDoS Attacks in Cloud Computing IEEE
Mitigation of EDoS Attacks in Cloud Computing Taylor and Francis
Pattern Analytical Module for EDoS Attack Recognition IOSR vol. 18, issue 5 14-20 Sep-16
Comparison of Hybrid HOD-GSA, HOD and PSO for the Tuning of Extended Kalman Filter IEEE
A Review on Tuning of Extended Kalman Filter using optimization techniques for state estimation International Journal of computer applications vol. 145, issue 15 1-5 May,2016
Tuning of Extended Kalman Filter for non-linear state estimation IOSR vol.18, issue 5 14-19 October, 2016
Cost Aware task scheduling with active VM Load eveluation ACM Nov-16
Load balancing in Tasks using honeybee Behaviour Algorithm in cloud computing IEEE
Energy Aware task Scheduling with Adaptive Clustering method in cloud computing:A review Taylor and francsis
Mata-Heuristic hybrid Task Scheduling Mechanism with Weighted Clustering over cloud computing IJMCSA vol.4 ,issue-5 39-43 Sep-16
enhanced TPA scheme to improve access permissions development over cloud architecture IJTC journal vol 2,issue 10 508-513 october,2016
Review of third party authentication model for securing user space in cloud computing ijrece vol 4,issue 2 75-77 april,2016