RCACS : Published Papers

  • Panda S.N. and Gupta S., “An Effective Implementation of Load Balancing Investigation in Cloud Framework”, IJCST Vol. 5 Issue 3, July 2014.
  • Panda S.N. and Sharma N., “Traditional and Automatic Drug Delivery System: A Review” IJCST Vol.5 Issue 3, July, 2014.
  • Panda S.N., “Model based tool assistance for packet filter design and its future, International Journal of Computers and Technology, impact factor 1.341, Vol. 13, No. 1. Apr 2014.
  • Panda S.N., Kaur G. and Dhaliwal D.S., “Model-Based Tool-Assistance for Packet-Filter Design and its Future” International Journal of Computers and Technology, impact factor 1.341 Vol. 13, No. 1. Mar 2014.
  • Ahuja S. and Trivedi N., “Data Mining Functions in Advanced Education” International Conference on Advances in Computer Application (ICACA- 2013) Proceedings published in International Journal of Computer Applications® (IJCA) (0975- 8887). Sept. 2013.
  • Panda S.N., Kaur G. and Dhaliwal D.S., “A review on working models of packet filtering in firewall technology” International Journal of Computers and Technology, impact factor 1.341, Vol. 7, No. 2, Jun 2013.
  • Ahuja S. and Sahu C.P., “Optimistic congestion control to improve the performance of Mobile Ad hoc Network” presented in IEEE sponsored conference held at AKG, Ghaziabad, Mar., 2013.
  • Gupta I., Sadawarti H. and Panda S.N., “Security Attacks Vulnerability in Adhoc Network” Universal Journal of Applied Computer Science and Technology, ISSN-2250-0987 UNIASCIT Vol. 2. 2012, pp.179-182.
  • Panda S.N. and Sharma A., “Data Mining Techniques and their role in Intrusion Detection Systems” International Refereed Journal Indexed with Open Access “Journal of Academia and Industrial Research (JAIR) ISSN No. 2278-5213, Vol.1, Issue-4, September 2102, pp.157-160.
  • Panda S.N. and Kumar G., “Leech Serpentine Hybrid Algorithm for Packet Transmission in Trust Architecture” Published in Refereed International Journal “International Journal of Enterprise Computing and Business Systems”, ISSN (Online): 2230-8849, Vol. 1, Issue-2, July, 2011, Paper Id ISSN 2230 8849-V112M36-072011 with IMPACT FACTOR 1.278, pp.1-19.
  • Panda S.N. and Kumar G., “Snake Serpentine Locomotion Algorithm for Hypersensitive Data Packet Transmission in Trust Architecture” Published in an International Journal, “Journal of Global Research of Computer Science (JGRC) ISSN-2229-371X in Vol. 2, Issue IV, April 2011, pp. 141-147.
  • Panda S.N. and Kumar G., “Spectrum of Effective Security Trust Architecture to Manage the Interception of Packet Transmission in Value Added Network” Published in an International Journal GJCST- Global Journal of Computer Science & Technology Vol. 11 Issue 4 Version 1.0 February/March 2011, ISSN No. 0975-4350, pp.73-77.
  • Ahuja S. and Trivedi N., “Application of bit torrent techniques on distributed computing using comp torrent”. The national conference on recent technologies in Electronics NCRTE-11 VCE, Meerut, April 2011.
  • Ahuja S. and Trivedi N., “Speech Recognition by Wavelet Analysis” International Journal of Computer Applications (0975-8887) Vol. 15, No.8, Feb. 2011.
  • Ahuja S., Kumar N. and Kumar V., “Fuzzy Time Series Forecasting of Wheat Production” International Journal of Computer Science & Engineering (IJCSE), Vol. 2, Issue 3, ISSN: 0975-3397-635-640, Mar. 2010.
  • Ahuja S., Kumar N. and Sharma N.C., “Approximate String Matching Algorithm” Emerging Technologies in Computer Science (ETCS-09), ISBN: 978-81-8424-490-8, Aug. 2009.
  • Ahuja S., Kumar N., Yadav P. and Sharma N.C., “Granular Computing Based Clustering” Emerging Technologies in Computer Science (ETCS-09), ISBN: 978-81-8424-490-8. Aug. 2009.
  • Dr. Shaily Jain, “Sentiment Mining and Related Classifiers: A Review”, IOSR Journal of Computer Engineering (IOSR-JCE) Volume 18, Issue 1, Ver. III (Jan – Feb. 2016)
  • Dr. Shaily Jain, “Video Steganography: A Survey”, IOSR Journal of Computer Engineering (IOSR-JCE) Volume 18, Issue 1, Ver. III (Jan – Feb. 2016)
  • Dr. Shaily Jain, “Text Segmentation Analysis for C99 and Topic Tilling with different quantitative performance metrices” IEEE International conference on communication systems and network technologies (CNST-2016), March 2016
  • D.Handa and B.Kapoor, ”State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.4, August 2014
  • Kishore, N. & Kapoor, “ B. Faster File Imaging for Forensic Applications. International Conference on Advances in Computing. Communication and Control (ICAC3)”, Procedia Computer Science Elsevier, DOI: 10.1016/j.procs.2015.04.229, 2015.
  • Kishore, N. & Kapoor, B. CUDA, “Implementation of RSHA-1 and Code Optimization.”, GPU Technology Conference 2015, 2015. Nvidia. SAN JOSE, California, US
  • D.Handa and B.Kapoor, “PARC4: High Performance Implementation of RC4 Cryptographic Algorithm Using Parallelism”, International Conference on Reliability Optimization & Information Technology, Feb, 2014.
  • Neha Kishore, Dr. Bhanu Kapoor, “An Efficient Parallel Hashing Algorithm for Computation in Security and Forensics Applications”,4th IEEE International Advanced Computing Conference – IACC 2014, 21-22 Feb 2014, Gurgaon, India.
  • Sharma T, Kapoor B, “Intelligent Data Analysis Algorithms on Biofeedback Signals For Estimating Emotions”, published in ICROIT IEEE conference 978-1-4799-3958-9, Feb. 2014.
  • Neha Kishore, Dr. Bhanu Kapoor. “Parallel Implementation of RSHA-1 for Cryptographic Applications Using CUDA”, Poster presented in an International Conference – GPU Technology Conference Nov,2014, SAN JOSE, California, US.
  • Shaily Jain, Nitin, “A New Approach to Directory Based Solution for Cache Coherence Problem”,IEEE 3rd International Conference on Eco-friendly Computing and Communication Systems (ICECCS) ICECCS 2014.
  • Kishore, N. & Kapoor, B., “ An Efficient Parallel Algorithm for Hash Computation in Security and Forensics Applications.”, Advance Computing Conference (IACC), IEEE International, 2014a. IEEE, pp. 873-877, doi: 10.1109/IAdCC.2014.6779437, Feb,2014.
  • Kishore, N. & Kapoor, B., “Parallel Implementation of RSHA-1 for Cryptographic Applications using CUDA. GPU Technology”, Conference 2014, 2014b. Nvidia. SAN JOSE, California, US.
  • Shaily Mittal and Nitin, “A New Efficient Replacement Policy for Scratch Pad Memory”, Proceedings of the IEEE International Conference on Computational Intelligence and Communication Networks(IEEE CICN), Mathura, INDIA, September 27-29, 2013. [Indexed in SCOPUS].
  • Neha Kishore, Sapna Saxena, Disha Handa, Dr. Bhanu Kapoor, “ Parallel Implementation of Redesigned SHA-1 on GPUs”,Poster presented in an International Conference – GPU Technology Conference 2013, SAN JOSE, California, US.
  • Mittal, Shaily, “A New Efficient Replacement Policy for Scratch Pad Memory”,Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on. IEEE, 2013.
  • Shaily Jain, Dr. Nitin, “A Novel Directory Based Solution for Cache Coherence Problem”,7th Inderscience International Conference on Advanced Computing and Communication Technologies,2013.
  • Disha Handa, Ms. Tanu Sharma, “Practices and Approaches in the used of Blended Learning to Raise Quality of Higher Education”, FICCI HES 2013.
  • Sapna Saxena, Disha Handa, Dr. Bhanu Kapoor, Neha Kishore, “Comparative Analysis of Frequent and Parallel Implementation of RSA”, IJSER , 2013.
  • Neha Kishore, Disha Handa, Sapna Saxena, Dr. Bhanu Kapoor, “Parallel Block Cipher Symmetric Security Algorithm”, International Conference on Parallel and Distributed Computing System,2013.
  • Tanu Sharma, “Emotion Estimation of Physiological Signals using Low Power Embedded Systems”,Conference on Advances in Communication and Control Systems 2013(CAC2S), Springer,2013.
  • Kishore, N., Kapoor, B., Saxena, S. & Handa, D., “Parallel Implementation of Redesigned SHA-1 On Gpus” , GPU Technology Conference 2013, 2013. Nvidia. SAN JOSE, California, US.
  • Neha Kishore, Sapna Saxena, “Blended Learning: MOOC courses on Mobile Apps”, Poster presented in an International Conference – FICCI Higher Education Summit 2013, New Delhi, India
  • Shaily Mittal , Neetika Jain, Prachi, “Reducing Conflict Misses using Fraction Associative Mapping” , 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), Solan, pp. 349-354, DOI: 10.1109/PDGC.2012.6449844 , 6-8 Dec, 2012 [available on IEEE Xplore] .
  • Shaily Mittal and Nitin, “An Efficient Tag-based Dual Mapping Replacement Policy”, Proceedings of the First International Conference on Information Science and Management (ICoCSIM), INDONESIA, December 3-5, 2012.
  • Shaily Mittal, Geetika Ganda and Prachi, “Performance Comparison of Routing Protocols in Wireless Sensor Networks”, Proceedings of International Conference, AIM 2011,Nagpur, Maharashtra, India, Book chapter in Communications in computer and information science (Springer-verlag Berlin Heidelberg ), volume 147, ISSN: 1865-0929, pp.379-383, April 21-22, 2011.
  • Shaily Mittal and Nitin, “Replacement Policies for Scratch Pad Memory in Embedded Systems”, Proceedings of the IEEE region 10 conference, TENCON, Bali, INDONESIA, pp. 159-163, ISSN: 2159-3442, DOI: 10.1109/TENCON.2011.6129083, November 21-24, 2011. [Indexed in SCOPUS].
  • Shaily Mittal and Prabhjot Kaur, “Performance Comparison of FSR, LANMAR and LAR1 Routing Protocols in MANET’s”, ACEEE International Conference on Recent Trends in Information Processing and Computing in Springer-Verlag Berlin Heidelberg, BAIP 2010, CCIS 70, pp. 396–400.[Available online]
  • Bharadwaj Shweta, Sharma Tanu, M.Hima Bindu., “ Emotion Estimation using Physiological Signals”, in IEEE xplore and accepted for Presentation at The Region Ten Conferences, TENCON 2008, Digital Object Identifier: 10.1109/TENCON.2008.4766531 , Page(s):1– 5, 2008.
  • D.Handa and B.Kapoor, “State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.4, August 2014.
  • Shaily Mittal and Nitin, “Communication Issues in MPSoC: Performance and Power, Journal of Parallel and Distributed Computing”, Springer, 2014.
  • Tanu Sharma, Bhanu Kapoor, “Data Analysis by using Machine Learning Algorithm on Controller for Estimating Emotions”,International Journal on Computational Science & Applications (IJCSA), Volume 4,number 6.Oct 2014.
  • Kishore, N., Gupta, C. & Dawar, “ An Insight View of Digital Forensics”,International Journal on Computational Sciences & Applications (IJCSA)”,vol. 4, pp. 89-96, DOI:10.5121/ijcsa.dec,2014.4608.
  • Saxena, S., Kishore, N., Handa, D. & Kapoor, B. 2013, “Comparative Analysis of Sequential and Parallel Implementations of RSA”, International Journal of Scientific and Engineering Research, 4, 2100-2103
  • Dr. Shaily Jain and Ipta Thakur, “Countermeasures for Security Vulnerability in Android, International Journal of Innovative Technology and Exploring Engineering (IJITEE)”, ISSN: 2278-3075, Volume-3, Issue-1, June 2013. [IF: 1.27, indexed by Google scholar]
  • Sapna Saxena, Neha Kishore, Disha Handa, Dr. Bhanu Kapoor ,“ Comparative Analysis of Sequential and Parallel Implementations of RSA”, IJSER, Volume 4, Issue 8, August 2013, ISSN 2229-5518.
  • Sharma T, Kapoor B , “Estimation of Emotion through Bio-signals by using Portable and Low Power Embedded System”, IJSER Volume 4, Issue 8, 2013.
  • Neha Aggarwal, Dr. Rachna Soni, “Comparative study of Requirement Engineering Methods”, IJARCSSE, Vol. 3, Issue 7, pp. 325-327,2013.
  • Shaily Mittal and Nitin, “Memory Map: A Multiprocessor Cache Simulator, Journal of Electrical and Computer Engineering”, Hindawi Publishing Corporation, Volume 2012, DOI:10.1155/2012/365091, pp. 1-12, September 2012. [Indexed in SCOPUS, DBLP]
  • Shaily Jain, “Memory Map: A Multiprocessor Cache Simulator”,IJCSI,2012.
  • Shaily Mittal and Nitin, “A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip”, International Journal of Computer Science Issues, Volume 8, Issue 4, Number 1, ISSN: 1694-0814, pp. 503-507, July 2011. [IF: 0.242 (2011), Indexed in DBLP]

Get in Touch With Us