Research Papers Published

  • Brijesh Kumar Chaurasia et al., “Intersection Attack on Anonymity in VANET,” In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 7420, pp 133-149, 2013.
  • Brijesh Kumar Chaurasia et al., “Secure Congestion Adaptive Routing using Group Signature Scheme,” In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 7420, pp 101-115, 2013.
  • Brijesh Kumar Chaurasia, et al.,”Analysis and Feasibility of Reactive Routing Protocols with Malicious Nodes in MANETs”, The International Conference on Communication Systems and Network Technologies (CSNT-2013), Organized by IEEE, Gwalior (India), 2013. (Accepted)
  • Brijesh Kumar Chaurasia, et al., “Authentication in Cloud Computing Environment using Two Factor Authentication”, International conference on soft computing for problem solving, K. Deep et al. (Eds.): Proceedings of the International Conf. on SocProS2012, AISC 130, Organized by Springer, the Institute of engineering and technology, JK Lakshmipat University, Jaipur (India), 2013. (Accepted)
  • C. S. Raghuvanshi et al. “A Comparative Study of Frequent Pattern Mining Algorithms” International Conference on Reliability, Infocom Technology and Optimization (ICRITO 2013).Sponsored by CSI & IEEE. Organized by Amity Institute of Information Technology, Amity University, Noida, Uttar Pradesh, India.
  • Deepak Motwani et al. “Patch based Texture Synthesis – A Review” ” International Conference on Reliability, Infocom Technology and Optimization (ICRITO 2013).Sponsored by CSI & IEEE. Organized by Amity Institute of Information Technology, Amity University, Noida, Uttar Pradesh, India.
  • Deepak Motwani et al. “A Review on Designing Energy Efficient Routing Protocols for Wireless Ad-Hoc Network” ICIEM 2013 BIT International conclave, BIT Patna.
  • Deepak Motwani et al. “A Review on Signature Verification in Automatic Cheque Processing” ICIEM 2013 BIT International conclave, BIT Patna.
  • Brijesh Kumar Chaurasia, Ranjeet Singh Tomar and Shekhar Verma” Using Trust for Light Weight Communication in VANETs”, In the International Journal of Artificial Intelligence and Soft Computing (IJAISC), 2012. (In Press)
  • Brijesh Kumar Chaurasia and Shekhar Verma,” Privacy Preserving Mutual Authentication in WiMAX”, In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, 2012
  • Brijesh Kumar Chaurasia and Shekhar Verma,” Model Based Verification of Privacy Preserving Authentication Protocol for VANETs, In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 2, No. 2, pp. 120-137, 2012
  • Pallavi Khatri, Aamir Mohammed,” TDSR:Trust based DSR Routing Protocol for Securing MANET”, In International Journal of Networking and Parallel Computing, Vol 1, No 3 (2012), pp. 42 – 48.
  • Shashikant Gupta,” Energy Efficient Routing Protocol in Heterogeneous Sensor Network – A Survey”, Indian Journal of Mathematical & Computer Sciences, vol. 1, 2012, pp. 37-40.
  • Shashikant Gupta,” Performance Evolution EACP Protocol for System Optimization in Heterogeneous Sensor Network”, International Journal of Computer Science and Network
  • Hari Om Sharan, Rajeev Kumar, Vikas Solanki, “Improving the Performane of hand-off calls using Frequency Sharing”, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.4, August 2012
  • Hari Om Sharan, Sumit Chaudhary, Swarna Chaudhary, Shivangi Dhall,” Towards the solution of Minimum Vertex Cover Problem”, Published in MIT Publications, Vol 2 No 1 Page no 16-18 in 2012
  • Hari Om Sharan, Rahul Rathore, Kamal Kumar Gola, Vaibhav Sharma,” New Enhanced Hybrid Algorithm with RSA, DSA & Diffie Hellman Key Exchange Encryption Algorithm”, Published in IJCIS, Page no 38-41, Vol no 4, Issue no 5, 2012
  • Reena Thakur and Arun Yadav,” Hybrid Segmentation Approach and Preprocessing of Color Image based on Haar Wavelet Transform”, International Journal of Computer Applications 46(16):1-5, May 2012. Published by Foundation of Computer Science, New York, USA, ISSN 0975-8887, (Impact factor: 0.88)
  • Gunjan Jain, S.R Biradar,” Enhanced approach Of Making Mobile Base Station in LEACH”, IJARCET, vol. 1,no.10, 2012
  • Jain, M.; Vasavada, J.; Jain, G.; Patel, P.; Ojha, V.,” Information security and auditing for distributed network”, Instrumentation & Measurement, Sensor Network and Automation (IMSNA), 2012 International Symposium , vol.2, no., pp.364,367, 25-28 Aug. 2012.
  • Gunjan Jain, S.R Biradar,” Need of Precision Agriculture through Wireless Sensor Network in India”, TEICC, 2012.
  • Ritu chauhan,Rohit Singhal,” Two Quasi Orthogonal Space Time Block Codes With 3- Time Slots for Wireless Communication”, Paper published in International Journal of Engineering & Innovative Technology “ISSN : 2277-3754” Volume-2,Issue-6, Dec 2012 page no-448-451
  • Ritu Chauhan,Narendra Thakur,Bipin Kumar,” Medical Diagnosis using GA”, Paper published in International Journal of Electronics & Computer Science Engineering “ISSN : 2277-1956″ Volume-1,Number-3,July-Dec 2012 page no-1260-1266 Performane of hand-off calls using Frequency Sharing”, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.4, August 2012
  • Ravendra Singh, Jasvinder Pal Singh, H N Verma,” An image matching approach based on string matching using remainder-prime method”, International Journal of Computer Application, Vol. 56 – No.8, October 2012
  • Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta,” A Survey on Terrorist Network Mining: Current Trends and Opportunities”, International Journal of Computer Science and Engineering Survey (IJCSES), Vol. 3 No. 4, pp: 59 – 66
  • Brijesh Kumar Chaurasia et al., “Privacy Preserving Mutual Authentication in WiMAX,” In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, 2012. (In Press).
  • Brijesh Kumar Chaurasia et al., “Trust Based Group Formation in VANET,” In International Journal of Modern Traffic and Transportation Engineering Research (MTTER), 2012. (In Press).
  • Brijesh Kumar Chaurasia et al., “Using Trust for Light Weight Communication in VANETs ,” In the International Journal of Artificial Intelligence and Soft Computing (IJAISC), 2012. (In Press).
  • Brijesh Kumar Chaurasia et al., “Model Based Verification of Privacy Preserving Authentication Protocol for VANETs”, In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 2, No. 2, pp. 120-137, 2012.
  • Yasha Dixit et al. “Analysis and implementation of FP and Q-FP tree with minimum CPU utilization in association data mining” IJECCT-2012.
  • Brijesh Kumar Chaurasia, Ranjeet Singh Tomar, Shekhar Verma and G. S. Tomar,” Suitability of MANET Routing Protocols for Vehicular Ad hoc Networks”, The International Conference on Communication Systems and Network Technologies (CSNT-2012), Organized by IEEE, Rajkot, India, pp. 334-338, 2012
  • Brijesh Kumar Chaurasia and Ranjeet Singh Tomar,” Trust Management Model for Wireless Ad hoc Networks”, International conference on soft computing for problem solving, K. Deep et al. (Eds.): Proceedings of the International Conf. on SocProS2011, AISC 130, Organized by Springer, Vol. 1, pp. 193-198, 2012, IIT Roorkee, India
  • Brijesh Kumar Chaurasia and Saurabh Updhyay,” Detecting and Avoiding Wormhole Attack in MANET using Statistical Analysis Approach”, The Third International Conference on Wireless & Mobile Networks (WiMoNe‐2012)
  • Brijesh Kumar Chaurasia and Saurabh Updhyay,” Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)”, The Third International Conference on Wireless & Mobile Networks (WiMoNe‐2012), Bangalore
  • Pallavi Khatri, S. Tapaswi, and U. P. Verma Pallavi Khatri, S. Tapaswi, and U. P. Verma,” Trust evaluation in wireless ad hoc networks using fuzzy system”, In Proceedings of the CUBE International Information Technology Conference, pp. 779-783. ACM, 2012
  • Dhyanendra Jain, Pallavi Khatri, B.K.Chaurasia, Rishi Soni,” Hiding Sensitive Association Rules without Altering the support of sensitive items”, In Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012, CCSIT 2012, Part I, LNICST 84, pp. 500–509, 2012
  • Hari Om Sharan, Gulista Khan,” Energy Efficient Routing Strategy for Dynamically Arranged Homogeneous WSN”, International Conference Resurging India Myths and Realities, Page no. 391-395, at Teerthanker Mahaveer University
  • Vaibhav Sharma, Gulista Khan, Hari Om Sharan,” Image Based Dual Level Authentication System”, International Conference Resurging India Myths and Realities, Page no. 32-34, at Teerthanker Mahaveer University, 17-18 march 2012
  • Anshu Chaturvedi, D. N. Goswami and C. S. Raghuvanshi,” Innovative Approach in Partition Algorithm for Frequent Pattern Mining”, Presented in International Conference on Optimization Modeling and Applications, Department of Operational Research, University of Delhi, Delhi, India, December 2012
  • Anshu Chaturvedi, D. N. Goswami and C. S. Raghuvanshi,” Partition Algorithm for Frequent Pattern Mining Using Two Column Atomic Data Layout”, Presented in 6th International Conference on Quality, Reliability, Infocom Technology and Industrial Technology Management, Department of Operation Research, University of Delhi, Delhi, November, 2012
  • Thakur, R.; Yadav, Arun,” Solving the Single Processor Scheduling Problem by Using Ant Colony Optimization Technique”, IEEE International Conference on Communication Systems and Network Technologies (CSNT), published by IEEE Conference Publications Page(s): 759 – 763, 11-13 May 2012
  • Nisha Chaurasia, Mradul Dhakar, Astha Chharia, Akhilesh Tiwari and R. K. Gupta,” Exploring the Current Trends and Future Prospects in Terrorist Network Mining”, The Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012), pp: 379-385.
  • C. S. Raghuvanshi et al. “Innovative approach in Partition Algorithm for Frequent Pattern Mining” International Conference on Optimization Modeling and Applications – 2012. Organized by Department of Operation Research, University of Delhi, Delhi, India.
  • Yasha Dixit et al. “Analysis and implementation of FP and Q-FP tree with minimum CPU utilization in association rule mining.” ICAE-2012,Mountabu.
  • Brijesh Kumar Chaurasia, Ranjeet Singh Tomar, Shekhar Verma and G. S. Tomar “Suitability of MANET Routing Protocols for Vehicular Ad hoc Networks”, The International Conference on Communication Systems and Network Technologies (CSNT-2012), Organized by IEEE, Rajkot, India, pp. 334-338, 2012.
  • Ritu Chauhan, et al., “Few more Quasi-Orthogonal Space-Time Block Codes with 3-Time Slots for Wireless Communication”, 3rd IEEE International Advance Computing Conference (IACC-2013), 2013.
  • Ritu Chauhan et al “Two new Quasi Orthogonal Space Time Block codes for Wireless Communication “in International journal IJEIT,volume 2,issue 6,December 2012
  • C. S. Raghuvanshi et al. “Partition Algorithm for Frequent Pattern Mining Using Two Column Atomic Data Layout” 6th International Conference on Quality, Reliability, Infocom Technology and Industrial Technology Management (ICQRITITM 2012). Organized by Society for Reliability Engineering, Quality and Operations Management (SREQOM) Department of Operational Research, University of Delhi, Delhi, India with Lulea University of Technology, Sweden.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma,” Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks”, In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science XIII, LNCS 6750, pp. 147–156, Springer-Verlag Berlin Heidelberg, 2011
  • Brijesh Kumar Chaurasia, and Dr. Shekhar Verma,” Secure Toll Collection in VANETs”, In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 1, No.4 pp. 421 – 443, 2011
  • Brijesh Kumar Chaurasia et al., “Secure Pay While On Move Toll Collection through VANET”, In International of Computer Standards & Interfaces, Elsevier, 2011. Communication Date: 02-Jan.-2011; Acceptance Date: -05_Sept.-2012 (First Review completed) Impact Factor 1.257)
  • Brijesh Kumar Chaurasia and Shekhar Verma,” Infrastructure based Authentication in VANETs”, In International Journal of Multimedia and Ubiquitous Engineering, Vol. 6, No. 2, pp. 41-54, 2011
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma,” Privacy Preserving in VANETs”, In the IUP Journal of Systems Management (IJSYM), pp. 42-52, Vol. IX, No. 2, 2011
  • Saurabh Upadhyay and Brijesh Kumar Chaurasia,” Impact of Wormhole Attacks on MANETs”, In International Journal of Computer Science & Emerging Technologies, Vol. 2, Issue 1, pp. 77-82, 2011
  • Alankar shastri, Pallavi Khatri, Shilpi Jain,” Performance analysis of Adhoc network under node failure”, In International journal of Computer Technology and Electronics Engineering (IJCTEE), Vol 1, Issue 2,ISSN 2249 – 6343, pp 168 – 175, October 2011
  • Hari Om Sharan, Rajeev Kumar, Vikas Solanki,” An approach to the solution of NP-Complete Problem”, Researcher 2011;3(5):66-68.(ISSN: 1553-9873). www.sciencepub.net
  • Vikas Solanki, Rajeev Kumar, Hari Om Saran,” Improving the Performance of Handoff Calls using Frequency Sharing”, Report & Opinion 2011;6(7):69-79.(ISSN: 2653-9874). www.sciencepub.net
  • Hari Om Sharan, Rajeev Kumar, Garima Singh, Mohd. Haroon,” Measurement of Software Testability”, Published in International Journal Sciencepub.net/ STEM 2011, Vol. 3
  • Hari Om Sharan, Rajeev Kumar, Garima Singh, Mohd. Haroon,” Sentence ordering techniques in multi Document Summerization”, Published in International Journal Sciencepub .net/ Researcher 2011 Vol. 3
  • Hari Om Sharan, Rajeev Kumar, Garima Singh, Mohd. Haroon,” Approaches to Summerize Multidocument using Infromation extraction”, Published in International Journal Sciencepub .net/ Academic Arena 2011 Vol. 3
  • H N Verma, Ravendra Singh,” A fast string matching algorithm”, International Journal of Computer Technology & Application, Vol. 2(6), 1877-1883, November 2011.
  • Brijesh Kumar Chaurasia, Shekhar Verma, and G. S. Tomar,” Attacks on Anonymity in VANET”, The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), pp. 217-221, Gwalior, India, 2011
  • Brijesh Kumar Chaurasia, Shashi Kant Gupta, and Rishi Soni,” Meta Search Engine based on Prioritizor”, The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), pp. 512-514, Gwalior, India, 2011
  • Brijesh Kumar Chaurasia, Abhishek Agrawal, Urjita Thakar and Rishi Soni,” Efficiency Enhanced Association Rule Mining Technique”, International Conference on Parallel, Distributed Computing technologies and Applications (PDCTA-2011)
  • Brijesh Kumar Chaurasia and Pallavi Khattri,” Establishing Trust in MANET using Certificate Validity”, International conference on soft computing for problem solving
  • Pallavi Khatri, Satya Bhale, Vikrant Gautam,” Study of AODV Routing Protocol in Adhoc Network”, Proc., 4th National Conference on ” IT – Contemporary and Future Technologies for Social Change” during NSC 2011 organized by ITM , Gwalior during 11th – 12th March 2011
  • Shashikant Gupta,” Meta Search Engine Based on Prioritizer”, IEEE International Conference on Computational Intelligence and Communication Networks , MIR Lab ,Gwalior “October ,7th -9th ,2011
  • Shashikant Gupta,” Review on Software Engineering Process”, National Conference “IT- Contemporary and Future Technologies for Social Change” ITM Universe Gwalior, , March ,2011
  • Hari Om Sharan,Navin Kumar Agrawal, Manoj Kumar, Vikas Solanki,” Towards the solution of Clique Problem”, Proceedings of National Conference at Hindustan Institute of Management & Computer Studies, Mahura, 11-12 March 2011
  • Hari Om Sharan,Navin Kumar Agrawal, Manoj Kumar, Vikas Solanki,” Measuring the performance of call admission control in two tier wireless cellular communication network with prioritization to the Handoff Call”, Proceedings of National Conference at Hindustan Institute of Management & Computer Studies, Mahura, 11-12 March 2011
  • S. Rahmatkar, Dr. Ajay Agarwal, Arun Kumar Yadav,” Tree Structured, Multi-hop Time Synchronization Approach in Wireless Sensor Networks”, International Conference on Advances in Information Technology and Mobile Communication-AIM2011″ published by Springer Communications in Computer and Information Science, Volume 147, Information Technology and Mobile Communication, Part 2, Pages 255-258, ISSN: 1865-0929
  • Deepak Motwani,” Review paper on Website Morphing”, 27th CSI National Student Convention, March 09-12,2011
  • Deepak Motwani,” Researched based Advanced Helping Tools and Products of Data Mining”, IT- Contemporary & Future Technologies for Social Change
  • Kapil Shrama,” Web usage Tool using efficient algorithm”, National Conference on Hybrid and Innovation in Information Technology (HAIIT’11),NITM, Gwalior,28th & 29th Jan 2011
  • Kapil Shrama,” Mining by Medical Approach for Access various data Sources”, National Conference on Hybrid and Innovation in Information Technology (HAIIT’11),NITM, Gwalior,28th & 29th Jan 2011.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma,” Maximising Anonymity of a Vehicle”, In International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications, Inderscience, Vol. 3, No. 2, pp. 198-216, 2010
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma and Dr. G. S. Tomar,” Mechanism for Privacy Preservation in VANETs”, In the International Journal of Grid and High Performance Computing (IJGHPC), Special Issue on: Grid computing and Security, IGI, Vol. 2, No 2, pp. 12-22, 2010
  • Pratibha Tomar, Brijesh Kumar Chaurasia and Dr. G. S. Tomar,” State of the art of Data Dissemination in VANETs”, In International Journal of Computer Theory and Engineering (IJCTE), Vol.2, No.6, pp. 957-962, 2010
  • Anshu Chaturvedi, D. N. Goswami and C. S. Raghuvanshi,” Frequent Pattern Mining Using Record Filter Approach”, International Journals of Computer Science and Issue, Vol. 7, Issue 4, pp. 38 – 43, July 2010
  • Anshu Chaturvedi, D. N. Goswami and C. S. Raghuvanshi,” An Algorithm for Frequent Pattern Mining Based On Apriori”, International Journals of Computer Science and Engineering, Vol. 02, No. 04, pp. 942-947, 2010
  • Arun Kumar Yadav, Dr. Ajay Agarwal,” An approach for Concurrency Control in Distributed Database System”, International Journal of Computer Science & Communication (IJCSC)” ISSN: 0973-7391, Vol. 4, Jan.2010, pp 27-36
  • Arun Kumar Yadav, Dr. Ajay Agarwal , Kamlesh Chopra,” An Approach for Ensuring Concurrency Control of Global Transactions in Heterogeneous Distributed Database Systems”, International Journal of Computer Science & Network Security (IJCSNS)” ISSN: 1738-7906, Vol. 10, No.3 March 2010, pp 280-289(Impact Factor: 0.99)
  • Arun Kumar Yadav, Dr. Ajay Agarwal,” A Distributed Architecture for Transactions Synchronization in Distributed Database Systems”, International Journal of Computer Science & Engineering (IJCSE)” ISSN: 0975-3397, Vol. 02, No. 06, September 2010, 1984-1991
  • Ritu Chauhan,” An Expert System for Tourist Information Management”, Paper published in International Journal of Computer Science and Communication “ISSN:0973-7391” Volume-1,Number-2,July-Dec 2010 Page no-181-183.
  • Brijesh Kumar Chaurasia, Shruti Keshari, Shekhar Verma and G. S. Tomar,” Verification of Privacy Preserving Authentication Protocol for VANETs”, The International Conference on Computational Intelligence and Communication and Networks (CICN-2010) organized by IEEE in Bhopal, India, pp. 243-248, 2010
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma and G. S. Tomar,” Infrastructure aided privacy preserving-authentication in VANETs”, 2nd International Conference on Advanced Communication and Networking (ACN-2010) organized by LNCS, Communications in Computer and Information Science, vol. 76, pp. 179-189, in Miyazaki, 2010
  • Pallavi Khatri, Abhishree saxena, Anshuman Shrivastava,” Multitier Authentication : An Approach of Network Security”, In Cyber Uththan a National conference on Modern Trends in Computer Science and Information Technology organized by CSE, Jhansi from 30th – 31st October 2010
  • Pallavi Khatri, Alankar Shastri, Shilpi Jain, Varsha Sarawagi,” Intrusion Detection System”, In Cyber Uththan a National conference on Modern Trends in Computer Science and Information Technology organized by CSE, Jhansi from 30th – 31st October 2010
  • Pallavi Khatri, Monika Rajput, Alankar Shastri,” Impact Comparison of Node failure on Various Ad-Hoc Routing Protocols using OPNET Modeler”, Cyber Uththan a National conference on Modern Trends in Computer Science and Information Technology organized by CSE, Jhansi from 30th – 31st October 2010
  • Pallavi Khatri, S. Tapaswi, and U. P. Verma,” Fuzzy based trust management for wireless ad hoc networks”, In Computer and Communication Technology (ICCCT), 2010 International Conference on, pp. 168-171. IEEE, 2010
  • Pallavi Khatri, Monika Rajput, Alankar Shastri, Keshav Solanki,” Comparison of Ad-hoc Reactive Routing Protocols using OPNET modeler”, Proc. International conference on Next Generation Web services and Practices (NWeSP-2010) organized by MITM and MIR (Machine Intelligent Research Labs, USA) along with IEEE SMC chapter, Bombay section labs in conjunction with CICN 2010(Computer Intelligence Communication Network) , Gwalior from 23rd – 25th November 2010, pp 43
  • Shashikant Gupta,” Implementation of Personalized web Search Using User Modeling”, International Conference on Computing: Updates & Trends (CUT-2010), Jaipuria Group of Instructions, Ghaziabad , February , 2010
  • Shashikant Gupta,” Indexing & Retrieval of Web Pages Using user profile based preferences”, International Conference on Computer Engineering and Technology ,IEEE JIET Jodhpur November 2010
  • Shashikant Gupta,” Implementation of Personalize Web Search Through User Modeling”, National Conference on Emerging Trends in Engineering and Technology MIT , Ujjain, April, 2010
  • Hari Om Sharan, Manoj Kumar, Vikas Solanki,” Application of Mathematical tools for DNA computing”, National Conference held in GLAITM 2010
  • Vikas Solanki, Manoj Kumar, Hari Om Sharan,” Throughout Prospect of Handoff Techniques in Wireless Mobile Networks”, National Conference held in GLAITM 2010
  • Deepak Motwani,” Indexing and Retrieval of Web Pages Using User Profile Based Preference”, ICCET-2010,.International Conference on Computer and Engineering technology IEEE
  • Deepak Motwani,” Searching web pages based on clicks and time spends on webpage using Novel PPR Algorithm”, E3C2010, , International Journal of Machine Intelligence & its Applications
  • Deepak Motwani,” Efficient Searching and information Retrieval using Personalized Page Rank”, International Conference “Computing: Update and Trends”
  • Deepak Motwani,” Indexing retrieval of web page using meta tag and rank algorithm”, 1’st PIMG International Conference on global business recession :lesson learnt,
  • Kapil Sharma,” “Medical Mining” Modern Technologies for betterment of human Life”, NITM, Gwalior, June 26th, 2010
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, G. S. Tomar and Ajith Abraham,” Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks”, In the Transactions on Computational Science IV, Special Issue on Security in Computing, LNCS volume 5430, pp. 136-148, 2009
  • Monika Rajput, Alankar Shastri, Pallavi Khatri,” Disaster management using wireless networks”, Proc. TIMS ’09, Nov 09 pp. 192
  • Pallavi Khatri, S. Bhadauria, Mamta Narwariya,” A survey on security issues in mobile Ad hoc networks”, TECHNIA (ISSN-0974-3375), vol.(2), July 2009, pp. 229-232
  • Vikas Solanki, Hari Om Sharan and Deepak Sharma,” Future computing to improve the Computer Efficiency”, Acta Ciencia Indica, vol. XXXV P.No. 3,407 (2009)
  • Brijesh Kumar Chaurasia, and Dr. Shekhar Verma,” Haste Induced Behavior and VANET Communication”, IEEE International Conference on Vehicular Electronics and Safety (ICVES-2009) organized by IEEE Bombay section (IIT Bombay), Pune, India, pp. 19-24 , 2009
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, Dr. G. S. Tomar, and S.M. Bhaskar,” Pseudonym Based Mechanism for Sustaining Privacy in VANETs”, The First IEEE International conference on Computational Intelligence, Communication Systems and Networks (CICSYN-2009), Indore, India, pp. 420 – 425, 2009
  • Brijesh Kumar Chaurasia, Ajit Jaiswal, Dr. Shekhar Verma and G. S. Tomar,” Profile Based Mobility Model in Vehicular Ad- Hoc Networks”, World congress on Nature and Biologically Inspired Computing (NaBIC 2009) In Cooperation with IEEE , NaBIC2009, Coimbatore, India, pp. 493-498, 2009
  • Shashikant gupta,” Review of Data Mining Technologies and its applications”, National Conference on Networking and Data Management Technologies (Sponsored By AICTE) September 2009
  • Vikas Solanki, Hari Om Sharan, Deepak Sharma,” Replacement of Silicon Computer Chip to Improve the Computer Efficiency”, 96th Proceedings of Indian Science Congress Association, North-Eastern Hill University, Shillong, 3-7 January 2009
  • Hari Om Sharan, Vikas Solanki, Manoj Varshney,” DES Application for DNA Computing”, Proceedings of National Academy of Science India (NASI-2009), Calcutta University, Kolkata, 14-16 December 2009, p.24
  • Anshu Chaturvedi, D. N. Goswami and C. S. Raghuvanshi,” Modified Approach in Classical Apriori Algorithm and Partition Algorithm”, Presented 3rd International Conference on Quality, Reliability and Infocom Technology, University of Delhi, Delhi, December, 2009
  • Arun Yadav, Dr. Ajay Agarwal, Nistha Katara,” Secure Access for a Replica Management Database”, Proceeding of National Conference, organized by Anand Engineering College, Agra, “ETCITES09”, 7-8 February,2009, pp 203-209
  • Deepak Motwani,” Role of Personalization in Internet”, NCETT-2010 19-20 March, National Conference on Emerging Technological Trends
  • Deepak Motwani,” Analysis on Web Search Engine and promote new web sites”, National Conference on FCA(Futuristic Computer Application)Oct26,27,2009
  • Deepak Motwani,” Review of Data Mining Technology and its application”, National conference “Networking and data management Technologies”Sep,3-4,2009,Sponsored by AICTE
  • Deepak Motwani,” Review of Web Mining Areas”, INDIA Com – 2009 ,3rd National Conference On Computing For Nation Development 28,Feb,2009
  • Kapil Sharma,” Enterprise java beans: development & Deployment of component based distributed business application”, Science & Technology: Future Perspective, NITM, Gwalior, June 15th & 16th 2009
  • Kapil Sharma,” Web Usage Mining”, Recent Trends in Science & Technology, NITM,Gwalior,Sep 30th 2009
  • Ritu Chauhan,” Network Security Model for Detection of Attack Target”, National conference “NCRDEM IT-2009”
  • Brijesh Kumar Chaurasia, and Dr. Shekhar Verma,” Optimizing Pseudonym Updation for Anonymity in VANETs”, IEEE International Workshop on Vehicular Networking (VON-08) In Conjunction With IEEE APSCC 2008, Yilan, Taiwan, pp. 1633 – 1637, 2008
  • Brijesh Kumar Chaurasia, and Dr. Shekhar Verma,” Maximizing Anonymity of a Vehicle through Pseudonym Updation”, First International Workshop on Wireless Vehicular Networking Technology (VINT-08) In conjunction with The Fourth Annual International Wireless Internet Conference (WICON 2008), Maui, Hawaii, USA, November 17-19, 10.4108/ICST.WICON2008.4904, Article no. – 83, 2008
  • B. K. Chaurasia and G. S. Tomar,” Modified Stream Control Transmission Protocol over Broadband High Latency Networks”, Second Asia International Conference on Modelling & Simulation Kuala Lumpur (AMS-2008), Malaysia, pp. 174-179, 2008
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, and G. S. Tomar,” Multiple spreading codes based MAC protocol for wireless networks”, Fourth International Conference on Wireless Communication and Sensor Networks, Indian Institute of Information Technology, Allahabad, India, pp. 192-195,2008
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, and S. M. Bhasker,” Message broadcast in VANETs using Group Signature”, Fourth International Conference on Wireless Communication and Sensor Networks , Indian Institute of Information Technology, Allahabad, India, pp. 131-136,2008
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, and S. M. Bhasker,” Maximizing Anonymity of a Vehicle”, Fourth International Conference on Wireless Communication and Sensor Networks , Indian Institute of Information Technology, Allahabad, India, pp. 95-98, 2008
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, and G. S. Tomar,” Strategy for Pseudonym Updation in VANETs”, The 2008 International Workshop on Secure Vehicular AdNetworks (SVANET 2008) In Conjunction with The 2008 International Conference on Intelligent Pervasive Computing (IPC-08),Sydney, Australia, December 10-12, 2008
  • Ankush Jain, Pallavi Khatri,” Time slotted routing enhances the wireless communication in mobile adhoc networks”, Proc. ICCNS ’08, Nov.2008, pp. 198-201
  • Hari Om Sharan, Vikas Solanki,” The Role of Data Structure in MIS”, International Conference on Management Science and Arts at Gurukul Kangri University, Haridwar(U.P.), 15-17 September 2008
  • Arti Maheshwari, Deepak Sharma, Hari Om Sharan,” Global Warming-A Natural Process”, International Conference on Management Science and Arts at Gurukul Kangri University, Haridwar(U.P.), 35-37 September 2008
  • Vikas Solanki, Hari Om Sharan,” Major Issues Help to Understand the “Wireless Network Security”, National Conference on Recent Innovative Techniques in Engineering & Management (NCRITEM 2008) at HITKARINI College of Engg. And Technology,Jabalpur, 3-4 October 2008
  • Hari Om Sharan, Vikas Solanki, Manoj Varshney,” DNA Microarray Image Processing”, Proceedings of National Academy of Science India (NASI-2008), Punjab University, Chandigarh, 22-24 November 2008, p.28
  • Pallavi Khatri, Geetanjali Surange,” Hiding sensitive association rules”, Proc. BITCON ’07, March 2007, pp. 27-31
  • Arun Kumar Yadav, P.S. Sudhish,” Improving Logging & Recovery performance in Database System”, proceeding of National Conference, organized by M.P. Christian College of Engineering & Technology, Bhilai, Chhattisgarh, “Technologia 2007”, 2nd & 3rd March 2007, pp 70-75
  • Arun Kumar Yadav, Pratap Sakhare,” Time Synchronization Protocol (TPSN) for wireless Ad-hoc Sensor Network”, proceeding of National Conference, organized by Meerut Institute of Engineering & Technology, Meerut, “Emerging Technologies in Computer Science (ETCS-2007)”, 22 & 23 September 2007,pp 15-21
  • Arun Kumar Yadav, Mohit Saxena,” Security Management in High-Performance Distributed Computing Environment”, proceeding of National Conference, organized by Smt. Kashibai Navale College of Engineering-Pune, “MERG-07”, 23-24 November 2007,pp 277-283