BABA BANDA SINGH BAHADUR ENGINEERING COLLEGE - FATEHGARH SAHIB

Affiliated to I.K.G PTU, Jalandhar

ਬਾਬਾ ਬੰਦਾ ਸਿੰਘ ਬਹਾਦਰ ਇੰਜੀਨੀਅਰਿੰਗ ਕਾਲਜ - ਫਤਿਹਗੜ੍ਹ ਸਾਹਿਬ Call Us:(1800 137 2015, 01763 503067)

Dr. Kanwalvir Singh Dhindsa

Dr. Kanwalvir Singh Dhindsa

Dr. Kanwalvir Singh Dhindsa

Professor

Phone Number: 01763-503056 (L)

Areas Of Interest

  • Cloud Computing, Big Data, IoT, Mobile Computing, Database & Security, Web Engineering

Subjects Taught

  • Operating Systems
  • Distributed Systems
  • OOAD using UML
  • Emerging Technologies
  • RDBMS
  • Advanced Databases
  • GPU Computing
  • Big Data

Additional Responsibilities

  • Head of Computer Science & Engineering Department
  • Officer Incharge, MTech(CSE),IKGPTU Regional Centre

Experience

From To Designation Organisation
2000 till date Professor BBSBEC, Fatehgarh Sahib

Educational Details

Degree University Year
Ph.D Punjabi University,Patiala 2014
M.Tech Punjabi University,Patiala 2003
B.E. Punjab technical University, Jalandhar 2000

Memberships

  • Life Member of Indian Science Congress Association (ISCA), Membership No. L27567
  • Fellow Member of Institution of Electronics & Telecommunication Engineers (IETE), Membership No. M 237761
  • Fellow Member of International Society for Research and Development (ISRD), Membership No. F3140900142
  • Member of Institution of Engineers (MIE), Membership No. M-146061-1
  • Life Member of Computer Society of India(CSI) , Membership No. 00175868
  • Member of Universal Association of Computer & Electronics Engineers(UACEE), Membership No. AM1003072
  • Member of Institute of Doctors, Engineers and Scientists , Membership No. 1044
  • Life-Member of Punjab Academy of Science (PAC), Membership No. 919
  • Member of Association of Computer Electronics and Electrical Engineers (ACEEE) ,Membership No. 7000201
  • Member of International Association of Computer Science and Information Technology(IACSIT) , Membership No. 80333814
  • Life-Member of Indian Society for Technical Education(ISTE) , Membership No. LM 49355
  • Member of International Association of Engineers(IAENG) , Membership No. 63318
  • Member of Association for Computing Machinery(ACM) ,Membership No. 2205468
  • Fellow Member of Institution of Engineers(IEI), Membership No. F-125755-9

M-Tech Thesis Supervised

Topic Scholar Name Year
An Improved AES Algorithm for Enhancing Security in Cloud Environment Navroop Kaur 2019
Enhancement of Data Security using Video Steganography Mandeep Kaur 2018
Sentiment Classification of Tweets, Supervised Learning Approach by Effective Feature Selection Jatinder Singh 2017
Critical Path Based Ant Colony Optimization for Cloud Computing using meta heuristic approach Rupinder Singh 2017
ROI based Enhanced Fragile Image Watermarking for Tamper Detection, Journal of Advancements in Robotics Harneel kaur 2018
Efficient Task Scheduling using Load Balancing in Cloud Computing Rupinder Kaur 2018
Zero Watermarking for Energy Efficiency in Wireless Sensor Networks, Journal of Web Engineering & Technology Sandeep Kaur 2018
Analysis of NoSQL Databases: A Comparative Study Amandeep Kaur 2017
Analysis of Task Scheduling Algorithms using Cloud Computing Amtoj Kaur 2017
Performance Evaluation for CRUD Operations in NoSQL Databases’, i-manager’s Journal on Cloud Computing Amandeep Kaur 2016
Performance Evaluation of Task Scheduling Algorithms for Cloud Computing Amtoj Kaur 2016
Hybrid Scheduling Algorithm for Efficient Load Balancing In Cloud Computing Navpreet Singh 2017
Load Balancing in Cloud Computing Environment: A Comparative Study of Service Models and Scheduling Algorithms Navpreet Singh 2017
Comparison of Job Scheduling Algorithms in Cloud Computing Davneet Singh 2017
A Load Balancing Based Improved Task Scheduling Algorithm In Cloud Computing Davneet Singh 2017
Comparative Study and Performance Analysis of Clustering Algorithms Kamalpreet Kaur Jassar 2016
Impact Evaluation of Sybil Attack on Manet’s for Reactive Routing Protocol Gurkirat Kaur 2018
Performance Evaluation for CRUD Operations in NoSQL Databases Amandeep Kaur Pharwaha 2017
Energy Efficient Resource Scheduling Framework for Cloud Computing Kamalpreet Kaur Gill 2016
Neural Network Based Speaker verification for Security Systems Sukhandeep Kaur March 2016
Isolating Side Channel Attack in Cloud Architecture Navjot Singh 2015
Performing Efficient Data Analysis using Spatial Clustering Kamalpreet Kaur Jassar 2015
Performance Analysis of Web Page Retrieval using Improved Hybrid Approach Kushwant Kaur 2015
Design and Analysis of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System Rajwinder Kaur 2014
Implementation of Association Rule Mining using Reverse Apriori Algorithm Ashma Chawla 2014
Modeling and Analysis of GIST Protocol using Coloured Petri Nets Atul Kumar 2014
Integrated Object Relationship Management using MVC Design Patterns in Open Source ERP Navita Goyal 2014
QoS and Cost Aware Service Brokering using Pattern based Service Selection in Cloud Computing Mandeep Singh 2013
Smartphone based Cloud Computing Architecture supporting Mobile Client accessing Web Services Mandeep Singh 2013
Implementation and Analysis of Semantic Web Technique using Ontology Ritu 2012
Comparison and Implementation of Image Matching Techniques Geetanjali 2011
Study of Performance issues in TULIP over Wireless Networks Parminder Singh 2010
Numeric to Numeric Encryption of Databases using 3KDec Algorithm Kamaljit Kaur 2010
Analytical and Comparative study of Data Mining algorithms for DSS Parneet Kaur 2010
Effect of Embedding watermarks on compression of digital images Deepak Aggarwal 2010
Effort Estimation Using Analogy for Web Hypermedia Application Dheerendra Singh 2009
Resource Discovery in Grid Environment using Ontology Based Approach Naveen Dogra 2008
Implementation & Comparison of Contemporary Clustering Techniques Amit Behl 2008
Analysis and Comparative Study of LPC and MELP Vocoders Kanchan Bala 2008
Comparison of Edge Detectors for Varying Dense Images with Effect of Noise and Blurring Ashima Uppal 2008
A Rule Based Modeling Approach using Hybrid Fuzzy Rough Sets Kalpna 2007

Phd Supervised

Topic Scholar Name Status of Phd University Year
Proliferation of Android Malware: An Analytical Study of Android apps and Anti Malware Security Sangeeta Rani Completed IKG Punjab Technical University, Kapurthala 2019
Distributed Defense against DDoS Attacks Using Cooperative Agents in ISP Networks Karanbir Singh Completed IKG Punjab Technical University, Kapurthala 2019
A Cluster Based Global Defense against distributed Denial of Service Attacks in MANETs Deepa Completed IKG Punjab Technical University, Kapurthala 2019

Journal Papers

  • Software Quality Improvement and Validation Using Reengineering, Journal of Engineering Research (JER), SCI-E, SCOPUS accepted , vol: 10.36909/jer.Vxix.9481, no: 2307-1885, pp: https://kuwaitjournals.org/jer/index.php/JER/home, 22 Feb, 2021
  • Entropy-based DDoS Attack Detection in Cluster based Mobile Ad Hoc Networks, Ad-Hoc and Sensor Wireless Networks, SCI-E, SCOPUS accepted , vol: , no: 1551-9899,, pp: http://journals.sfu.ca/ahswn/index.php/ahswn, 4 May, 2021
  • Performance-Aware Approach for Software Risk Management Using Random Forest Algorithm, International Journal of Software Innovation, vol: 9, no: ISSN: 2166-7160, pp: 12-19, , DOI: 10.4018/IJSI.2021010102, WOSUID: WOS:000587502700002 (Indexed in Scopus,WoS, ESCI), January-March 2021
  • Detection of attacks in IoT sensors networks using machine learning algorithm,Microprocessors and Microsystems,, Elsevier,Sciencedirect, vol: 82, ISSN: 0141-9331, no: 0141-9331, pp: 1-6, DOI: 10.1016/j.micpro.2020.103814, www.elsevier.com/locate/micpro(Indexed in SCI-E, SCOPUS, IF-1.161, Elsevier, Sciencedirect), Jan. 2021
  • Performance analysis of Cluster-based DDoS Defense System with different Reactive Routing Protocols, International Journal of Sensors, Wireless Communications and Control, Bentham Science, , vol: 11, no: 2210-3287 , pp: 54-65, ISSN: 2210-3287 (Online), Vol. 11, Issue 1, 2021, pp. 54-65, DOI: 10.2174/2210327910666191227125250 (UGC, Scopus) , 2021
  • Design for software risk management using Soft Computing and Simulated Biological Approach, International Journal of Security and Privacy in Pervasive Computing, vol: 12, no: 2643-7937, pp: 44-54, April-June 2020
  • T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous Systems (2020), Journal of Information Security and Applications, vol: 51, no: 2214-2126, pp: 1-12, 2020
  • Android application security: Detecting Android malware and evaluating anti-malware , International Journal of Internet Technology and Secured Transactions, vol: 10, no: 4, pp: 491-506, April 2020
  • A Pragmatic Assessment of Approaches and Paradigms in Software Risk Management Frameworks, International Journal of Natural Computing Research, vol: 9, no: , pp: 13-26, January-March 2020
  • An Empirical Evaluation of Assorted Risk Management Models and Frameworks in Software Development, International Journal of Applied Evolutionary Computation, vol: 11, no: , pp: 52-62, January-March 2020
  • Design and Development of Android Based Mobile Application for Specially Abled People, Springer, vol: 111, no: , pp: 2353-2367, Dec. 2019
  • A Novel Tweet Recommendation Framework for Twitter, International Journal of Innovative Technology and Exploring Engineering, vol: 8, no: , pp: 3188-3192, August,2019
  • Escalated Methods for Software Defects Audit in Repercussion and Effects Construe to Nature Inspired and Behaviour Driven Mechanisms, International Journal of Engineering and Advanced Technology, vol: 8, no: 2249-8958, pp: 1779-1783, August 2019
  • TrendNet Algorithm: Towards Personalization of Twitter Trends, International Journal of Recent Technology and Engineering, vol: 8, no: 2277-3878, pp: 1555-1560, July 2019
  • Usage Patterns and Implementation of Random Forest Methods for Software Risk and Bugs Predictions, International Journal of Innovative Technology and Exploring Engineering, vol: 8, no: ISSN: 2278-3075, pp: 927-932, July 2019
  • Reengineering Framework to Enhance the Performance of Existing Software, International Journal of Advanced Computer Science and Applications, vol: 10, no: 5, pp: 536-543, 2019
  • Reengineering Cost Estimation using Scrum Agile Methodology, International Journal of Computer Information Systems and Industrial Management Applications, vol: 11, no: , pp: 208-218, June 14, 2019
  • Reengineering framework for open source software using decision tree approach, International Journal of Electrical and Computer Engineering, vol: 9, no: 3, pp: 2041-2048, June 2019
  • Clustering based Model to Provide Defense against DDoS attacks in MANETs, Journal of Communication Engineering & Systems, vol: 9, no: , pp: 7-13, April 2019
  • Flow-based Attack Detection and Defense Scheme against DDoS Attacks in Cluster based Ad Hoc Networks, International Journal of Advanced Networking and Applications, vol: 10, no: , pp: 3905-3910, Feb. 2019
  • An Improved AES Algorithm for Enhancing Security in Cloud Environment, Journal of Computer Technology & Applications, vol: 10, no: , pp: 1-8, 2019
  • Threshold-Based Distributed DDoS Attack Detection in ISP Networks, Turkish Journal of Electrical Engineering & Computer Sciences, vol: 26, no: 4, pp: 1796-1811, July 2018
  • Performance analysis of agent based distributed defense mechanisms against DDoS attacks, International Journal of Computing, vol: 17, no: 1, pp: 15-24, March 2018
  • Android Malware Detection in Official and Third Party Application Stores, International Journal of Advanced Networking and Applications, vol: 9, no: , pp: 3506-3509, 2018
  • Enhancement of Data Security using Video Steganography, International Journal of Computer Applications, Foundation of Computer Science (FCS), vol: 181, no: 6, pp: 34-38, 2018
  • ROI based Enhanced Fragile Image Watermarking for Tamper Detection, Journal of Advancements in Robotics, vol: 5, no: , pp: 18-25, 2018
  • Efficient Task Scheduling using Load Balancing in Cloud Computing, International Journal of Advanced Networking and Applications, vol: 10, no: , pp: 3888-3892, 2018
  • Deployment of Agent-Based Distributed Defense Mechanism against DDoS Attacks in Multiple ISP Networks, International Journal on Information Technologies & Security, vol: 9, no: 4, pp: 123-134, Dec. 2017
  • Behavioral Characterization of Android Malware to Detect Similar Malware, International Journal of Research in Electronics and Computer Engineering, vol: 5, no: , pp: 509-514, Oct.-Dec. 2017
  • Study of Existing Design Architectures and Frameworks in Twitter, Global Journal of Enterprise Information System, vol: 9, no: , pp: 52-56, Oct.-Dec. 2017
  • Sentiment Classification of Tweets, Supervised Learning Approach by Effective Feature Selection, International Journal Of Research In Electronics and Computer Engineering, vol: 5, no: , pp: 221-224, Oct-Dec. 2017
  • Critical Path Based Ant Colony Optimization for Cloud Computing using meta heuristic approach, International Journal Of Research In Electronics and Computer Engineering, vol: 5, no: , pp: 225-230, Oct-Dec. 2017
  • Coordinator-Agent Based Distributed Defense against DDoS Attacks in Transit-Stub Networks, International Journal of Future Generation Communication and Networking, vol: 10, no: , pp: 51- 64, Oct. 2017
  • , A Load Balancing Based Improved Task Scheduling Algorithm in Cloud Computing, International Journal for Research in Applied Science and Engineering Technology, vol: 5, no: , pp: 161-170, Sept. 2017
  • Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks, International Journal of Security and its Applications, MECS,, vol: 11, no: 8, pp: 1-12, Aug. 2017, ISSN: 1738-9976, DOI: 10.14257/ijsia.2017.11.8.01, WOSUID: WOS:000409232100001, www.sersc.org/journals/IJSIA/vol11_no8_2017.php
  • . Comparison of Job Scheduling Algorithms in Cloud Computing, Asian Journal of Multidimensional Research, vol: 6, no: 8, pp: 82-90, Aug. 2017,ISSN(online): 2278-4853
  • Distributed Defense: An Edge over Centralized Defense against DDoS Attacks, International Journal of Computer Network and Information Security, vol: 9, no: 3, pp: 36-44, March 2017, ISSN: 2074-9104 (Online), DOI: 10.5815/ijcnis.2017.03.05 (Scopus, Inspec, IET)
  • Hybrid Scheduling Algorithm for Efficient Load Balancing In Cloud Computing, International Journal of Advanced Networking and Applications, vol: 8, no: 5, pp: 3181-3187, 2017, ISSN: 0975-0290
  • Load Balancing in Cloud Computing Environment: A Comparative Study of Service Models and Scheduling Algorithms, International Journal of Advanced Networking and Applications, vol: 8, no: 6, pp: 3246-3252, 2017, ISSN: 0975-0290
  • Analysis of NoSQL Databases: A Comparative Study, GRENZE International Journal of Engineering and Technology, vol: 3, no: 1, pp: 51-56, Jan. 2017, ISSN (Online): 2395-5295 (Grenze ID: 01.GIJET.3.1.30)
  • Analysis of Task Scheduling Algorithms using Cloud Computing, GRENZE International Journal of Engineering and Technology, vol: 3, no: 1, pp: 51-56, Jan. 2017, ISSN (Online): 2395-5295 (Grenze ID: 01.GIJET.3.1.30)
  • Malware Detection Techniques and Tools for Android, International Journal of Social Computing and Cyber-Physical Systems (Special Issue on: Big Data and Social Computing Analytics), Inderscience Publishers, vol: 1, no: 4, pp: 326-343, 2016, http://www.inderscience.com, ISSN online: 2040-073X, ISSN print: 2040-0721, DOI: 10.1504/IJSCCPS.2017.10005813
  • Performance Evaluation for CRUD Operations in NoSQL Databases, i-manager’s Journal on Cloud Computing, vol: 3, no: 2, pp: 1-9, Feb-April 2016, (ISSN Online: 2350-1308)
  • Performance Evaluation of Task Scheduling Algorithms for Cloud Computing, i-manager’s Journal on Cloud Computing, vol: 3, no: 2, pp: 10-16, Feb-April 2016, (ISSN Online: 2350-1308)
  • Speaker Recognition System, International Journal of Computer Sciences and Engineering, vol: 3, no: 11, pp: 63-65 , Nov. 2015, E-ISSN: 2347-2693
  • A Review on Functional Encryption Schemes and their usage in VANET, International Journal of Advanced Research in Computer and Communication Engineering, vol: 4, no: 11, pp: 184-189, Nov. 2015, ISSN (Online) 2278-1021
  • Study of Virtual Side Channel Attack in Cloud Computing - A Review, International Journal of Engineering Development and Research, vol: 3, no: 3, pp: 1-6, Sept. 2015, ISSN: 2321-9939
  • Energy Efficient Resource Scheduling Framework for Cloud Computing, i-manager’s Journal on Cloud Computing, vol: 2, no: 4, pp: 1-15 , Aug-Oct 2015, (Print ISSN 2349-6835, E-ISSN 2350-1308)
  • Speaker Recognition System Techniques and Applications, International Journal of Computer Sciences and Engineering, vol: 3, no: 8, pp: 101-104, Aug. 2015, E-ISSN: 2347-2693
  • Implementation and Evaluation of Improved SOM for High Dimensional Data Set, Journal of Advanced Research in Computer Science and Software Engineering, vol: 5, no: 8, pp: 451-457, August 2015, ISSN: 2277-128X
  • Isolating Virtual Side Channel Attack in Cloud Computing, International Journal of Advanced Research in Computer Science and Communications, vol: 3, no: 1, pp: 8-18, Aug. 2015, ISSN: 2378-0678
  • Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing, i-manager’s Journal on Cloud Computing, vol: 2, no: 3, pp: 8-18, May-July 2015, ISSN Online: 2350-1308
  • Self-organizing Map with Modified Self Organizing Map Clustering, International Journal of Computer Sciences and Engineering, vol: 3, no: 7, pp: 115-119, July 2015, E-ISSN: 2347-2693
  • A Model of Mobile Commerce Practices in the State of Punjab: An Empirical Investigation, International Journal of Indian Culture and Business Management (IJICBM), Inderscience Journals, Switzerland, vol: 10, no: 4, pp: 494-520, April 2015, DOI: 10.1504/IJICBM.2015.069651 (ESI, WoS, Clarivate Analytics)
  • Hybrid Prefetching for Improving Page Hit-Ratio, International Journal of Science and Research, vol: 4, no: 3, pp: 1878-1881, March 2015, ISSN (Online): 2319-7064
  • Comparative Study of Spatial Data Mining Techniques, International Journal of Computer Applications, vol: 112, no: 14, pp: 19-22 , Feb. 2015, ISSN: 0975-8887
  • Reverse Apriori Approach - An Effective Association Rule Mining Algorithm, International Journal of Computing and Corporate Research, vol: 4, no: 3, pp: 69-82, May 2014
  • Hybrid Approach for Improvement of Web page Response Time, International Journal of Computer Science and Information Technologies, vol: 5, no: 5, pp: 6755-6759, 2014, ISSN(online): 0975-9646 (www.ijcsit.com)
  • Implementation of Association Rule Mining using Reverse Apriori Algorithmic Approach, International Journal of Computer Applications, vol: 93, no: 8, pp: 24-28, ISSN: 0975-8887
  • Simulation of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System, International Journal of Innovative Technology and Exploring Engineering, vol: 3, no: 11, pp: 117-121, April 2014, (SCOPUS), ISSN: 2278-3075
  • Analysing Scalability factors in Open Source ERP Systems Supporting ORM for SME’s, International Journal of Engineering Research & Technology, vol: 2, no: 12, pp: 2536-2543, Dec. 2013, ISSN: 2278-0181
  • Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets, International Journal of Computer Science Engineering and Technology, vol: 3, no: 11, pp: 382-387, Nov. 2013
  • Comparative Study of Open ERP and its Technologies, International Journal of Computer Applications, vol: 73, no: 20, pp: 42-47 , July 2013, ISSN: 0975-8887
  • A Study of Different QoS Management Techniques in Cloud Computing, International Journal of Soft Computing and Engineering, vol: 3, no: 3, pp: 37-41, July 2013, ISSN: 2231-2307
  • Securing RJSON data between Middleware and Smart phones through Java Script based Cryptographic Algorithms, International Journal of Soft Computing and Engineering, vol: 3, no: 2, pp: 189-194, May 2013, ISSN: 2231-2307
  • QoS and Cost Aware Service Brokering Using Pattern Based Service Selection in Cloud Computing, International Journal of Soft Computing and Engineering, vol: 3, no: 2, pp: 441-446, May 2013
  • Enhancing Interaction between Smartphones and Web Services on Cloud for Improved Bandwidth and Latency, International Journal of Computer Science and Mobile Computing, vol: 2, no: 4, pp: 177-185, April 2013
  • Design and Analysis of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System, Journal of Software Engineering and Applications, USA, ISSN (Print): 1945-3116, vol: 3, no: 7, pp: 120-125, 2013, DOI: 10.4236/jsea.2013.64027 [Impact Factor: 2.23]
  • Design of M-Commerce based Model for e-Enablement of Land Record Information System, International Journal of Computer Applications,NY, USA, ISSN: 0975-8887, vol: 66, no: 3, pp: 28-32, March 2013
  • Design of E-Land Record Information System with Google Map using Mobile Commerce, Journal of Software Engineering and Applications, USA, ISSN (Print): 1945-3116, vol: 6, no: 4, pp: 221-228, 2013,DOI: 10.4236/jsea.2013.64027 [Impact Factor: 2.23]
  • Predicting Consumers Intention to Adopt M-Commerce Services: An Empirical Study in the Indian Context, Journal of Computing, NY, USA, ISSN (Online): 2151-9617, vol: 5, no: 2, pp: 26-35, Feb. 2013
  • Critical Factors in Consumers Perception towards Mobile Commerce in E-Governance Implementation: An Indian Perspective, International Journal of Engineering and Advanced Technology, ISSN: 2249-8958, vol: 2, no: 3, pp: 513-520 , Feb. 2013,(SCOPUS)
  • Investigation and Analysis of new approach of intelligent semantic web search engines, International Journal of Recent Technology and Engineering, vol: 1, no: 1, pp: 83-87, April 2012,(SCOPUS)
  • Showcasing the Modelling Approach: The Unified development for land record information System, International Journal of Research in Engineering & Applied Sciences, ISSN: 2249-3905, vol: 2, no: 2, pp: 453-463 , Feb. 2012
  • Modelling & Designing Land Record Information System Using Unified Modelling Language, International Journal of Advanced Computer Science and Applications,New York, USA, ISSN: 2158-107X (Print), vol: 2, no: 2, pp: 26-30, Feb. 2011,[Scopus (Elsevier), WoS , Thomson Reuters]
  • Development of an Improved Feature Based Algorithm for Image Matching, International Journal of Computer Applications, New York, USA, ISSN: 0975–8887,doi: 10.5120/1903- 2537, vol: 14, no: 8, pp: 23-26, Jan. 2011
  • Performance Study of TULIP Protocol over 802.11 Wireless Networks, International Journal of Computer Applications, New York, USA, ISSN: 0975-8887, doi: 10.5120/1709-2278, vol: 12, no: 9, pp: 27-30 , Jan. 2011
  • Estimation by Analogy in the Perspective Educational Web Hypermedia Applications, International Journal of Information Technology & Knowledge Management, vol: 4, no: 1, pp: 305-313, Dec. 2010
  • Effect of Embedding Watermark on Compression of the Digital Images, Journal of Computing, NY, USA, ISSN: 2151-9617, vol: 2, no: 2, pp: 5-8 , Feb. 2010
  • Numeric to Numeric Encryption of Databases: Comparison of Standard Encryption Algorithm and the proposed 3Kdec algorithm, International Journal of Computer and Network Security, Austria, Vienna, ISSN (Print): 2076-2739, vol: 2, no: 1, pp: 103-107 , Jan. 2010
  • Performance of TCP/IP over wireless Networks using unaware Approach, International Journal of Computer and Network Security, Austria, Vienna, ISSN Print: 2076-2739, vol: 2, no: 1, pp: 1-5, Jan. 2010
  • Analytical and Comparative Study of Data Mining Algorithms Using TANAGRA Tool for Farm DSS, International Review on Computers and Software (I.RE.CO.S), Naples, Italy, ISSN Print: 1828-6003, vol: 4, no: 5, pp: 563-566 , Sept. 2009,(SCOPUS)

Conference Papers

  • Performing Reengineering using Scrum Agile Framework, In Proceedings of IEEE Indo-Taiwan 2nd International Conference on Computing, Analytics and Networks, Feb 14 - Feb 15, 2020, Indo-Taiwan ICAN 2020, Punjab, India, India, pp: 33-35, DOI: 10.1109/Indo-TaiwanICAN48429.2020.9181328
  • Comparative study of citation and reference management tools: Mendeley, Zotero and ReadCube, Proceedings of IEEE International Conference on ICT in Business, Industry, and Government (ICTBIG 2016), IEEE Xplore, Vol. 2, Issue 1, Nov 18 - Nov 19, 2020, SAIOT, Indore, MP, India, India, pp: 1-5,DOI:10.1109/ICTBIG.2016.7892715, https://udaipur.hosting.acm.org/ictbig2016/, IEEExplore, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7892715&isnumber=7892628 (Indexed in Scopus, WoS, IEEExplore)
  • Comparative Study and Performance Analysis of Clustering Algorithms, International Journal of Computer Applications (0975 – 8887), IJCA proceedings on ICTHC 2015 - Number 1, Proceedings (ISSN: 0975-8887) of International Conference on ICT for Healthcare, ICTHC 2015(1), Jul 24 - Jul 25, 2015, Indore, Madhya Pradesh, India, India, pp: 1-6, (http://www.ijcaonline.org/proceedings/icthc2015/number1), {http://www.csi-udaipur.org/icthc-2015/
  • Comparative Study of Tools and Scheduling Algorithms of Cloud Computing, International Conference on Communication, Information and Computing Technology (ICCICT-15), May 12 - May 13, 2015, Global Institutes, Amritsar, India, pp: 781-784, ISBN: 978-93-83006-07-6, (DOI: 10.13140/RG.2.1.1395.1206)
  • Numeric To Numeric Encryption of Databases: Using 3Kdec Algorithm, Proceedings of the IEEE International Advance Computing Conference (IACC-2009), Mar 6 - Mar 7, 2009, Thapar University, Patiala , India, pp: 1501-1505, (http://ieeexplore.ieee.org), Indexed on IEEE explore, {DOI: 10.1109/IADCC.2009.4809240}
  • A Rule Based Modeling Approach using Hybrid Fuzzy Rough Sets, Proceedings of International Conference on Advanced computing (ICAC-2008), Feb 21 - Feb 22, 2008, Anuradha Engg. College (ACM Students Chapter), Chikhli, Maharashtra, India, pp:
  • Implementation Of Contemporary Clustering Techniques & Analysis, Proceedings of the 5th International Conference on Intelligent Systems & Networks (ISN-2008), Feb 22 - Feb 24, 2008, Institute of Science and Technology, Klawad (ISTK-2008), Haryana , India, pp:

Awards & Honours

Sr. No. Award Name Year
1. Best PhD Thesis Award 2014