MCA TWO YEARS, LATERAL ENTRY PROGRAMME       INSTITUTE OF TECHNOLOGY AND SCIENCE HAS BEEN RECOGNIZED FOR "NAAC"       WE PROUDLY SHARE THAT ONCE AGAIN NBA ACCREDITS MCA PROGRAMME @ I.T.S       Very Important for All students seeking admission in any Professional Course (B.Tech, MCA, MBA, B.Pharm etc) Course       AICTE signs MOUs for Student Internships        PGDM @ I.T.S is Equivalent to MBA by AIU since 2004.        I.T.S GHAZIABAD has been re-accredited by NAAC with grade A       Orientation Program for 14th Batch of MBA (2017-2019) at I.T.S, Ghaziabad, is scheduled from 21st August to 25th August 2017.       Corporate Talk on Digital Marketing: Introduction to SEO and SEM on 18th August, 2017 at I.T.S Ghaziabad       I.T.S Ghaziabad has got associated with Keshav Event as Venue Partner for the Pan India Fashion Show, Miss & Mrs. Mutiyar and Mr. Gabru, Delhi, 2017       "ANUBHAV-2017" Summer Internship Project Competition on Tuesday, 7th November, 2017       Alumni Meet (PGDM, PGDM (RM), MBA & BBA) Saturday 16th December 2017       
 

IT Research & Publications

Book Chapters

1. S.K. Pandey, Vineet Kansal “Social Media Analytics An application of Data Mining” , Book chapter of Book Titled “Data Mining in Dianamic Social Networks & Vuzzy Systems” , DOI:10.4018/978-1-4666-4213-3.CH010, 2013.
2. Chandramani Sharma, Deepika Sharma, Harish Kumar "Cloud based infilteration detection system for military purposes" book chapter of book "Devlivery and adoption of Cloud Computing Services in Contemporary Organizations.

List of Publication in International Journal  

    1.P.Dhar “A Study of Big Data Analytics & Tools : Challenges and Disadvantages”  International Journal of Innovations &Advancement in Computer science ISSN:2347-8616, August 2017.

2.Abhay Ray , Rakesh  Roshan “Issues, Challenges and Application of Big Data” International Journal of Computer Application , issue – July 2017, ISBN No. 973-93-80975-09-1.

3.Umang, “Wireless Networks Past, Present and Future : A Technical Review” ICSE International Journal of Computer Science and Engineering , ISSN : 23472693,30 July 2017.

4.P.Dhar “Role of Digitalization in Enhancing Quality Education in India” International Journal of Computer Application (0975-887) ISBN:973-93-80975-09-01, July 2017.

5.R.Roshan, A.K.Ray, “Challenges and Risk toImplement IOT in Smart Homes : An Indian Perspective” International Journal of Computer Application (Page No. 16-19) (0975-8887) Volume – 153 No 3, November 2016.

6.Umang Singh, Payal Goyal, “Hierarchical based Routing Protocol in WSN”, International Journal of Computer Applications, p.p. no 16-22, ISSN 0975-8887(Online),2016.

7.Umang Singh, Bhawna Singh, “Information Retreival in Wireless Sensor Networks”, International Journal of Computer Applications, p.p. no 11-16, ISSN 0975-8887(Online), 2016 .

8.Ms.Ayushi, Dr. Umang Singh, “ Study on load Balancing Techniques in Ant colony optimization for cloud computing”, International Journal of Computer Applications (0975-8887 on Next Generation Technologies for E Business, E-Education & E-Society, NGTBES-2016, pp.no 16-27, ISBN:978-81-928380-9-0. 

9.Dr. Umang, “CloudSim Simulator Used for Load Balancing in Coud Computing”, Interantional Journal Of Emerging Technology and Advanced Engineering, Volume-6 Issue-4, April 2016 (Page no. 246-255)

10.
Abhay Ray “Study and Analysis of different Testing Techniques for web Application” IJCA Proceedings  EPICTIS 2014 with effect from http://www.ijcaonline.org/proceedings/epictis2014/number1/19424-3009, International Journal of Computer Applications,Foundation of Computer Science, New York, USA. January 30, 2015. ISBN : 973-93-80885-03-1 (Page No. 15-18).

     11. Kumar Pal Singh, Gaurav Kumar, Abhay N. Tripathi, “A Comparative Study of Security Protocols of Wireless Networks” published in “IJCSI International Journal of Computer Science Issues” Volume 12, Issue 1, No 2, January 2015, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 through National Conference "Emerging Paradigms of Information and Communication Technology & its impact on Society” organized by I.T.S Mohan Nagar, Ghaziabad on 7-8 November, 2014. (Page No. 72-78)

      12. Vaibhav Bansal, Rabins Porwal, “Mobile Commerce: Applications & Services”, International Journal of Multidisciplinary Consortium (IJMC), vol. 1, Issue 1, Jun 2014, pp. 01-09, ISSN: 2349-073X, published by MRES, Delhi, India.

     13. Chandramani Sharma , “Adaptive real time motion segmentation technique based on statistical background model” International The Imaging Science Journal UK, Volume- 62 June 2014 DOI 10.1179/1743131X13Y.0000000056. Pg. No 285-302 (http://www.maneyonline.com/doi/abs/10.1179/1743131X13Y.0000000056)

14. Jitendra Singh, Rabins Porwal, S. P. Singh, “Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link”, International Journal of Computer Network and Information Security (IJCNIS), vol. 6, No. 5, Apr. 2014, pp. 21-28, ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), DOI: 10.5815/ijcnis.2014.05.03, published by MECS Publisher, Hong Kong.

15. K. L. Sarkar, Rabins Porwal, “Voice over IP: Improving Call Admission Control with Modified Voice Codec-A new Approach”, International Journal of Trends in Computer Systems Engineering (IJTICSE), vol. 3, issue 2, Feb. 2014, pp. 153-163, ISSN: 2348-1978 (Online), published by Academic Journals Online, India.

16. Rajeev Kumar, Gaurav Kumar “Location Based UML Development – A UML Based Modeling for usage of location based services” International Journal of Computer Engineering & Technolgoy (IJCET), ISSN 0976-6367 (Print) ISSN 0976-6375 (Online) Oct. 2013.

17. Vaibhav Bansal, Rabins Porwal, “Knowledge Patterns from Knowledge Mining”, International Journal of Research and Development in Technology & Management Sciences (IJRDTM)-Kailash, vol. 20, Issue 06, Jun 2013, pp. 01-05, ISBN No. 978-1-62840-997-0, published by MRES, Delhi, India.

18. S. Saxena, C M Sharma “ A context - aware Approach for detecting skin colored pixels in image” International Journal for Computer Science Vol-71, No-17 June 2013.

19. Umang Singh Deepali Jain, Ashish Payal “ Sensor Nodes Based Group Mobility Model (SN-GM) for MANET, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 823 ISSN 2229-5518.

20. Rajeev Kumar and Harsh Dev, “Efficiency Related Parameters in GPS based Vehicle Tracking System working for an Organization”, International Journal of Computer Applications 68(19):31-35. Published by Foundation of Computer Science, New York, USA, April 2013. Volume- 68,Pg. No 0975-8887. http://www.ijcaonline.org/archives/volume68/number19/11690-7393

21. Vijender Kumar Solanki, Kumar Pal Singh and M Venkatesan. “ Firewalls Best Practices in an Organization” in IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC 9-11, November 2012. Published byFoundation of Computer Science, New York, USA(http://www.ijcaonline.org/proceedings/ctngc/number3/9063-1025)

22. S. Saxena, C M Sharma “ Machine learning based approach for human trait Identification from Blog Data “International Journal for computer application, Vol 48 No—10 June -2012 (pp 0975-888)

23. Vineet Kansal “An Analysis of Mobile Transaction Methods and Limitations in execution of M Commernce Transaction” in International Journal of Computer Application, Vol. 43, Iss. 21, pp.14-19, ISSN 975-0887, April 2012.

24. Umang “Analytical Study of Existing Methodologies of IDS for False Alarm Rate -A Survey and Taxonomy”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Iss. 4, pp. 393-399, ISSN 2250-2459, April 2012.

25. Dr. Vineet Kansal “An Analysis of Mobile Transaction methods and Limitations in execution of M-Commerce Transaction” in International Journal of Computer application ( 975-8887) Vol.43, No.21 April 2012.

26. A. Agrawal & R. A. Khan, “Role of Coupling in Vulnerability Propagation-Object Oriented Design Perspective”, Software Engineering: An International Journal (SEIJ), vol. 2, no.1 March 2012, pp. 60-68.

27. C.Sharma, R Roshan, R.Porwal “ Intelligent Video Object Classification scheme using offline Feature Extraction and Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256, ISSN (Online) 1694-0814, January 2012.

28. P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

29. P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.

30. Umang, Shruti Goyal, “Incorporation of IDS in real world applications”, Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20, ISSN-2079-8047, EISSN: 22186301 January 2012.

31. P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

32. P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.

33. Umang, Shruti Goyal, “Incorporation of IDS in real world applications”, Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20, ISSN-2079-8047, EISSN: 22186301 January 2012.

34. C.Sharma, R Roshan, R.Porwal “ Intellegent Video Object Classification scheme using offline Feature Extraction and Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256, ISSN (Online) 1694-0814, January 2012.

35. Dr. Rabins Porwal, “Working Capabilities of A.T.M with parallels redundant central computer” International Journal of Computational Intelligence and Information Security, Vol-2 No 11,pp. 16-26, Nov-2011.

36. Umang, “Secure Routing Protocols In Mobile Adhoc Networks-A Survey And Taxonomy”, International Journal of Reviews in wireless computing, Vol. 7, Iss. 2, pp. 9-17, ISSN 2076-3328, September 2011.

37. Ashish Seth, “Designing a SOA Based Model” ACM SIGSOFT Software Engineering Notes Page 1 Volume 36 Number 5, September 2011.

38. Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Evolution of Technology through Procedural, Object Oriented, Component Based to Service Oriented. The Journal for Computing Teachers.

39. Vidushi Sharma, Nancy Sharma, “Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform”, IFRSA International Journal of Data Warehousing & Mining, pp. no.75-78, Vol 1 Iss. 1, Aug-2011.

40. Dinkar,S.K. and Purwar, R.K., “Time Aware Incremental Page Ranking Based on Personalized Link Structure Analysis”. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2 Iss. 2, pp 383 – 388, ISSN: 2079-2557, published by Science Academy, UK, indexed in Ulrich, Cabell’s Directory, Google Scholar, Journal Seek, EBSCO, Open J-Gate, Computers and Applied Sciences Complete, ProQuest Technology, INSPEC, Scientific Commons, April, 2011.

41. Umang, Reddy B.V.R and Hoda M.N., “Study of Mobile Management Schemes in Mobile Adhoc Networks”, International Journal of Computer Applications, March 2011, Vol. 17, Iss. 7, pp. 42-47, ISSN-0975-8887, DOI: 10.5120/2236-2605.

42. Ashish Seth. “SOA Evolution – A Review” In International Journal of Engineering Sciences, Vol 1, ISSN: 2229-6913, March 2011.

43. Porwal Rabins, “A Survey in sensor’s Drift counteraction using Dynamic Pattern Recognition System”, Vol. 3 No. 1, pp. no 127-132, ISSN :975-3397, Jan 2011.

44. Pandey, SK, Singh G.P., Kansal V, “Study of Object Oriented Analysis & Design Approach’, Journal of Computer Science, Vol 7 Iss. 2, pp. 143-147, Indexed in NY, USA and indexed in Ulrich, DOAJ, Cabell, WAD, ASA, IET-ISI Scient6ific, Genamics, EBSCO, Thomson Gale, ProQuest, SCOPUS, ISSN 1549-3636, Jan 2011.

45. Umang S., Reddy, B. V. R., Hoda M. N. "Enhanced Intrusion Detection System for malicious node detection in ad hoc routing protocol using minimal energy consumption", Communications IEE, Vol. 4, Iss. 17, pp. 2084-2094, ISSN- 1751-8628, DOI: 10.1049/iet-com.2009.0616, Nov 2010.

46. Ashish Seth., “Minimum Spanning Tree-Based Approach for Reliability Estimation of COTS-Based Software Applications” IUP Journal of Computer Science, Vol 4. Iss. 4, pp.13-21, October 2010.

47. Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Aspects of Service Oriented Computing. The Journal for Computing Teachers.

48. Pandey, SK, Singh G.P., Kansal V., “An Alternative approach to Temporary Memory Management in Database using Object Oriented Systems”, International Journal of Computer Science & Network Security, Vol.10 Iss. 10, pp. 158-165, ISSN 1738-7906, Seoul, Korea indexed in Copernicus, Ulrich, Getcited, Open J-gate, Journal Seek, SCRIBD, Google Scholar, October, 2010.

49. A. Agrawal & R. A. Khan, “Securing Vulnerable Software: A Checklist Approach”, The Journal of Computing (TJC), Vol.1 Iss. 2, pp. 33-45, June 2010.

50. A. Agrawal & R.A.Khan, “An Algorithm to Measure Attribute Vulnerability Ratio of an Object Oriented Design” International Journal of Recent Trends in Engineering, Vol.2, Iss.3, pp. 61-63, November 2009.

51. A. Agrawal & R.A.Khan, “A Framework to Detect and Analyze Software Vulnerabilities -Development Phase Perspective” International Journal of Recent Trends in Engineering, Vol. 2, Iss. 2, pp. 82-84, November 2009.

52. A. Agrawal & R.A.Khan, “Measuring the Vulnerability of an Object Oriented Design”, Network Security, Elsevier, Vol. 2009 Iss.10, pp. 13-17, October 2009.

53. A. Agrawal & R. A. Khan, “Impact of Inheritance on Vulnerability Propagation at Design Phase”, ACM SIGESOFT Software Engineering Notes, Vol 34, Iss. 4, pp. 1-5, July 2009.
List of Publication in National Journal

1. Kumar Rajeev, Dr. Vanshraj Uphadhay, published a paper with title “A comparison of the performance of vehicle tracking system depending on location based services”, in IEBRJ bi- annual journal published by IMS Lucknow in April issue 2014, Volume -1, No-1.

2. S.K. & Singh G.P. Study of Significant of Object of object –oriented Paraligm in Modeling in national journal” computing Trends, Vol.1, ISSN:22309152, January 2011.

3. Dinkar, S.K. and Verma, P., ”Knowledge Discovery in Database: Data mining” in the IILM Journal of Science, Technology & Management(CHINTAN), Vol. 2 Iss.1, pp 36-42, March 2009.

4. A. Agrawal, R. A. Khan & S. Chandra, “Software Security Process-Development Life Cycle Perspective”, CSI communications, India, vol. 32, no.5, pp. 39-42, August 2008.

5. Dhar, P., “OOUPS…! How many germs Live on your desk?” in the journal Spark. [Online].http://www.indiabschools.com/sparkjournal_sys1.html, July, 2008.

6. Dhar ,P., “Security Issues for SHE (Smart Home Environment )” in the jounal Spark. [Online].http://www.indiabschools.com/sparkjournal_sys2.html, March, 2008.

7. Pandey, S. K., “Study of status and Legal Framework of cyber crimes-An Indian Prespective” in the Business Journal from FORE, India, Vol. 24 Issue 3, pp. 20-29, ISSN 0970-2385, December, 2007.
 
8. Dhar, P., “Use of Technology in newspaper printing with special reference to TOI” in the journal Spark[Online]. http://www.indiabschools.com/sparkjournal_sys3.html , April 2007.

9. Pandey, S. K., “Context-Aware Computing: Augmentation of Mobile devices with Awareness of their Context” in the Apeejay Journal of Management and Technology, Jalandhar, India, Vol. 3, Iss.1 pp 85-93, January, 2007.

10. Pandey, S. K., “Information and communication Technology A catalyst for future roadmap of India” in the Journal Business Transaction The road ahead, pp 133-141, INMANTEC publishing House, July, 2006.

11. Pandey, S. K., “Grid Computing: Enabler of Clustering of Distributed Resources” in the IIIM Journal of Management and IT (OORJA), Jaipur, India, issue 2, Vol. 4, pp 55-63, May-August 2006.

12. Pandey, S. K., “Data Mining: Application of Clustering and parallelism” in the Journal of Rajarshi School of Management & Technology, India, issue 2, Vol. 2, pp 60-74, ISSN 0972-1398, June, 2005

13. Pandey, S. K., “The Saga of E-Commerce & Reforms” in the ITS Journal of IT and Management (SYNERGY), Ghaziabad, India, issue 2, Vol. 1, pp 79-85, March 2003.

List of Publication in International Conferences/Seminars

     1.      Vidushi Singh, V.Arora “ Future of Secure Financial Transactions : Bitcoins” International Conference on Changing Global Economic Scenario – Strategies for Business    Sustanability 11th November 2017 organized by Jaipuria Business School Ghaziabad.   

2. Umang,Anupriya “IOT in the Backdrop of Developing Smart Cities Challenges and the Road Ahead:An Indian Perspective Proceeding of 2nd International Symposium, 28 Feb – 01 March 2017

    3. Kumar Pal Singh, Gaurav Kumar, Abhay N Tripathi “Information Integrity Preserving Approaches in Wireless Networks” published in proceeding IEEE International Symposium on "Internet of Things:
        Smart Innovation and Usages (IoT-SIU 2017)" organized at FET, MJPRU, Bareilly, UP, India on 28 Feb-01 March 2017
    4. Abhay Ray , Rakesh  Roshan “Issues, Challenges and Application of Big Data” International Conference ICCSMS-2016”  international Conference on “Computer Systems & Mathematical Science”
       date 18-19 November 2016, pp. no. 124-128, ISBN No. 978-81-928555-0-9. 

    5.  Puja Dhar  “Role of Digitization in Enhancing  Quality Education in India” International Conference ICCSMS-2016”  international Conference on “Computer Systems & Mathematical Science” date 18-
        19 November 2016, pp. no. 129-134,ISBN No. 978-81-928555-0-9. 

    6. Parul Choudhary, Umang S, “ A Literature Review on Vehicular Adhoc Network for Intelligent Transport”, IEEE International Conference on Computing for sustainable global development,
       INDIACom-2015, pp. no. 2194-2197, 978-9-3805-4416-8/15/$31.00_c © 2015 IEEE.   

    7. Anu Kiran Jain, Umang S, Hoda M N, “Conceptual Understanding of Cognitive Radio Adhoc Networks”, IEEE International Conference on Computing for sustainable global development,
        INDIACom-2015, pp. no. 2194-2197, 978-9-3805-4416-8/15/$31.00_c © 2015 IEEE. 

    8. Jaspal S.S., Umang S, Hoda M N, “Evolution of routing protocols in Wireless Sensor Networks”, IEEE International Conference on Computing for sustainable global development, INDIACom-2015,
        pp. no. 2190-2193, 978-9-3805-4416-8/15/$31.00_c © 2015 IEEE. 

    9. Umang, B.V.R Reddy, M.N. Hoda, “MNI-AODV, Malicious Node Isolation in AODV Routing Protocol”, IEEE International Conference on Computing for sustainable global development, 2014, pp.
        no. 719-723,978-93-80544-10-6, DOI://10.1109/IndiaCom.2014.6828056

    10. Chandramani Sharma, Harish Kumar, “Architectural Framework for implementing Visual Surveillance as a Servic” Proceedings of IEEE International Conference IndiaCom, April – 2014 Pg. No- 296-
        301. 978-93-80544-12-0/14/$31.00_c 2014 IEEE.  

    11. Vijender Kumar Solanki, Kumar Pal Singh, M.Venkatesan, Sudhanshu Raghuvanshi “Securing Networks Using Situation-Based Firewall Policy Computations” published in Springer DOI:
          10.1007/978-81-322-1665-0_105, pp: 1029-1035, ISBN : 978-81-322-1665-0 in March-2014 through International Conference “Advanced Computing, Networking, and Informatics” conducted
          by NIT Rourkela.

12. Rajeev Kumar, “Availability and Handling of Data received from GPS Device: In tracking a Vehicle ,” has been accepted for Oral Presentation in International Advance Computing Conference going to be held in ITM Gurgaun Haryana with IEEE sponsorship and paper will be published in IEEE Xplore, 22-23th Feb- 2014, ISBN 978-1-4799-2571-1, DOI 10.1109/IAdCC.2014.6779328.

13. Harsh Dev, Rajeev Kumar, “Optimization Model for Efficiency Parameters of Location Based Services,” has been accepted for Oral Presentation in International Conference on Issues and Challenges in Intelligent Computing Techniques going to be held in KIET Ghaziabad and will be published in IEEE Xplore, 7-8th Feb- 2014., DOI 10.1109/ICICICT.6781287, INSPEC NO.14211019, Pg No.244-247.

14. Vijender Kumar Solanki, Kumar Pal Singh “Firewalls Policies Enhancement Strategies Towards Securing Network” Proceedings of 2013 IEEE International Conference on Information Communication Technology (ICT-2013) 978-1-4673-5758-6/13.

15. Sharma Charamani, “Automatic Human Activity Recognition in Video using Background Modleling and Spatio-temporal Template Matching Based Technique”, ACM International Conference ACAI 2011, Chitkara University, Patiala Punjab, pp 97-101, ACM 978-4503-0635-5/11.10, 2011.

16. A. Seth. “Data warehousing framework for Telecom Revenue Assurance” in International Conference on Issues and Challenges in Networking, Intelligence and computing Technologies (ICNICT 2011) Sep. 2011.

17. A. Agrawal & R.A.Khan, “A Framework for Vulnerability Minimization- Object Oriented Design Perspective”, 2nd International Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society, pp. 499-504.

18. A. Agrawal & R.A.Khan, “Assessing and Improving Encapsulation for Minimizing Vulnerability of an Object Oriented Design”, Communication in Computer and Information Science, Springer-Verlag, vol. 250, no. 2, pp. 531-533, 2011.

19. Umang, B. V. R. Reddy, M. N. Hoda, GNDA: Detecting Good Neighbor nodes in adhoc routing protocol, IEEE Second International Conference on Emerging Applications of Information Technology, 978-0-7695-1/11 $26.00© 2011 IEEE.DOI 10.1109/EAIT.2011.62.

20. Roshan, R, “Weak Passwords Practices and their Impact on the Security Systems of Universities in India: Analysis and Policy” in proceeding of International Conference of Computer Application (ICCA 2010)”, organized by TFRDC, Pondicherry, Research Publishing. pp 217-221, ISBN 978-981-08-7303-5, 24-27, December 2010.
 

       21. Dhar, P. and Pandita, S. “The Role of Artificial Neural Networks in recognizing handwritten characters” In Sovenir of International Conference on “Innovative Practices in Management and information
      Technology for Excellence (SRIJAN’2010)”, organized by Maharaja Agrasen Institute of Management & Technology, Jagadhri, Excel India Publishers, pp 136, May, 2010.

22. Kumar, R., “Geographical Information System to Identify Related and Required Dynamic Information of an Object” in the International Conference organized by Jaipuria Institute, Ghaziabad, India, issue 1, vol. 4, pp 319-329, ISBN 978-81-313-0850-9, February, 2010.

23. Dinkar S.K., “Server Based Antiphising” published in International Conference “Quality, Reliability and Infocom Technology”, Vol. 2,
pp 142, ISSN 0972-3392, December, 2009.

24. Nancy Sharma, Business Intelligence in Health Care Challenges & Solutions, international Conference on IT & Business Intelligence (ITBI 2009), pp. no 23-27, 6th-8th Nov.2009 at Institute of Management Technology, Nagpur, 2009.

25. Porwal, R., Shukla, M., Awasthi, A., Moghey, A. and Pandey, P., “Modeling a Single Level Neuron”, in Proceedings of the
 International Conference on “Innovative Technologies, ICIT-09”, organized by PDM College of Engineering, Bahadurgarh, Haryana,
 India, in collaboration with IEEE-IMS/ EMBS (Delhi), pp 309-310, June 2009.

26. A. Agrawal, S. Chandra & R. A. Khan, “An Efficient Measurement of Object Oriented Design Vulnerability”, The International Dependability Conference, ARES, IEEE Computer Society, pp. 618- 623, 16-19 March 2009.

27. Bisht, S., “A Comparative study of aspect oriented testing approaches” published in the proceedings of International conference “Innovation in redefining Business Horizons” at IMT, Ghaziabad, India, pp 587-592, ISBN 023-063-716-7, December, 2008.

28. Pandey, S. K., “Architectural Study and Comparison of Data Warehouse Technologies” in the proceedings of International conference ICDM organized by IMT, Ghaziabad, India, pp 418-426, February, 2008.

29. Umang, and Hoda, M. N. “A Study of Adhoc Wireless Network Routing based on Various AODV Routing Schemes”, International Conference on “Information and Communication Technolgy”, organized by DIT, Dehradun in association with Uttarakhand State Council for Science & Technology, Bharat Sanchar Nigam and Institute of Engineers India((IE(I)), pp 873-876, July, 2007.

30. Umang, ”Emerging Wireless Technologies in Growth & Development of Rural Areas”, 8th International Conference on Interdisciplinary
approach in Physical sciences, organized by IAPS, Allahabad, India, pp 45, December, 2005.

31. Pandey, S. K., “Analytical Study of Data Mining Algorithm”, International conference on Interdisciplinary approach in physical
Sciences, organized by IAPS, Allahabad, India, pp 37-38, December, 2005.

List of Publication in National Conferences /Seminars

     1. S. Saxena, C. Sharma “Unified Security Framework for web hosting as a service” Name: National Conference on Next Generation technologies for e-business, e-education & e-society,  5 March 2016 ISBN: 978-81-928380-9-0 (Page num: 192-198). 

    2.  Kumar Pal Singh, Gaurav Kumar, Abhay N Tripathi, “Analytical Study of Different Generations of Wireless Networks” published in National Conference on “Next Generation Technologies for e-Business, e-Education & e-Society (NGTBES-2016)” on 5 March, 2016 at I.T.S Mohan Nagar, Ghaziabad.

3. Geetanjali Singh, Umang, “Optimization Techniques for Energy Consumption in Sensor Networks- Survey”10th National Conference on Emerging Paradigms of Information & Communication Technology & its impact on Society on 07-08, November, 2014 organized by I.T.S Mohan Nagar, Ghaziabad.  ISBN No. 97881928380-4-5, Pg No. 56-64.

4. Anu Kiran Jain, Umang, M N Hoda, “Exigency of Cognitive Radio Networks”, 10th National Conference on   Emerging Paradigms of Information & Communication Technology & its impact on Society on 07-08, November, 2014 organized by I.T.S Mohan Nagar, Ghaziabad. ISBN No. 97881928380-4-5, Pg No. 103-107

5. Puja Dhar “Knowledge Mangement Supoort using Web for Collection of Documents” in Proceedings of 2nd National Conference on Innovation in computer Science & Emerging Technologies (ICSET-2015)

6. S. Saxena, V.Arora  “A Comprehensive Survey on Personality of Authors on Blog Data”  ISBN No. 97881928380-4-5, Pg No. 128-130,  National Conference “ EPICTIS-2014

7. Rabins Porwal, Syed Imtiyaz Hassan, “A Brief Survey on Generating Test Data for Data Flow Testing using Genetic Algorithms”, in Proceedings of 10th National Conference on Emerging Paradigms of Information & Communication Technologies & its Impact on Society (EPICTIS-2014) bearing unique ISBN: 978-81-928380-4-5; organized by/ at Institute of Technology & Science (ITS), Mohan Nagar, Ghaziabad (UP), India, in association with CSI-Ghaziabad Chapter, CSI Division-I & III, CSI Region-I and technically sponsored by IJCA, NY(USA), IJCSI (Mauritius); pp 163-166, Nov. 07-08, 2014.

8. Amit Aggarwal, Rabins Porwal, “An In-depth Study of Mobile Application Testing in Reference to Real Time Scenario”, inProceedings of 10th National Conference on Emerging Paradigms of Information & Communication Technologies & its Impact on Society (EPICTIS-2014) bearing unique ISBN: 978-81-928380-4-5; organized by/ at Institute of Technology & Science (ITS), Mohan Nagar, Ghaziabad (UP), India, in association with CSI-Ghaziabad Chapter, CSI Division-I & III, CSI Region-I and technically sponsored by IJCA, NY(USA), IJCSI (Mauritius); pp 150-157, Nov. 07-08, 2014.

9. Avneesh Vashistha, Rabins Porwal, A. K. Soni, “A Taxonomy of Scheduling Algorithms for Cloud Computing”, in Proceedings of 10th National Conference on Emerging Paradigms of Information & Communication Technologies & its Impact on Society (EPICTIS-2014) bearing unique ISBN: 978-81-928380-4-5; organized by/ at Institute of Technology & Science (ITS), Mohan Nagar, Ghaziabad (UP), India, in association with CSI-Ghaziabad Chapter, CSI Division-I & III, CSI Region-I and technically sponsored by IJCA, NY(USA), IJCSI (Mauritius); pp 132-135, Nov. 07-08, 2014.

10. R. Kumar “A study of Movement and speed of Vehicle byt Using Vehicle Tracking System Depending upon Location Based Services”  ISBN No. 97881928340-4-5, Pg No. 157-161,  National Conference “ EPICTIS-2014

11.  K.P. Singh, G. Midha, A.N Tripathi  “ A Comparative study of security Protocols of Wireless Networks” ISBN No. 97881928340-4-5, Pg No. 135-140, National Conference “ EPICTIS-2014”.

12. Rajeev Kumar, Dr Harish Kumar “Real Tracking Scenarios through Vehicle Tracking System Based On Location Based Services”, IJCA Proceedings on National Conference on Advancement in Computing Technologies and Applications SACTA, 87-92,, Published by Foundation of Computer Science, New York, USA, April 2014. Pg no- 251-255. ISBN-978-81-928-3802-1.

13. Rajeev Kumar, Harsh Dev, “PhD Showcase: Performance Evaluation and modelling of Location based Services in facilitating logistics by Using GPS/GIS through Hand Held Devices”, IJCA Proceedings on National Conference on Advancement in Computing Technologies and Applications ACTA, 29-32,, Published by Foundation of Computer Science, New York, USA, April 2014.pg no- 291-296, ISBN-978-81-928-3802-1.

14. Puja Dhar, Dr.Sarjue Pandita “A Glance into various government and non-government Projects using ICT in development of Rural India” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 232-234, ISBN No.978-81-928-3802-1.

15. K.P. Singh Harish Kumar, Abay N Tripathi “Threats and preventive approaches for Information Integrity in Wireless Networks” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 380-38, ISBN No.978-81-928-3802-1

16. Chandramani Sharma, Harish Kumar “Creation of Video Mosaics from Low Resolution CCTV Footage” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 297-300, ISBN No.978-81-928-3802-1.

17. Chandramani Sharma, Harish Kumar “Smarter Visual Approach for object segmentation and motion Analysis” Proceeding of 9th IT National Conference SACTA- 2014, pg. No. 301-303, ISBN No.978-81-928-3802-1.

18. Harsh Dev, Rajeev Kumar, “Optimization approach for Convergence Aspect of Wireless Communication, Positioning Techniques and Spatial Databases in Facilitating Logistics Industry, IJCA Proceedings on National Conference on Next generation Computing Technologies and Applications NGCTA, 29-32,International Journal of Computer Applications (0975 – 8887) Published by Foundation of Computer Science, New York, USA, November 2013.

19. Chandra Mani Sharma, Rabins Porwal, Deepika Sharma, “An Approach to Deformable Object tracking in Video”,in special edition of IJCA Proceedings on 08th National Conference on Next Generation Computing Technologies & Applications (NGCTA-2013), Nov. 2013, pp. 12-16, ISSN (Online): 0975-8887, published by Foundation of Computer Science, New York, USA.

20. Chandra Mani Sharma, Rabins Porwal, Deepika Sharma, “Testing Object-Oriented Software: Issues, State-of-the-art and Future”, in special edition of IJCA Proceedings on 08th National Conference on Next Generation Computing Technologies & Applications (NGCTA-2013), Nov. 2013, pp. 25-28, ISSN (Online): 0975-8887, published by Foundation of Computer Science, New York, USA.

21. K.P. Singh, Gaurav Kumar, A.N. Tripathi “Analytical study of security Threats of Wireless Networks” published in Proceeding of 8th National Conference NGCTA, Oct-2013, International Journal of Computer Application ( 0975-8887).

22. Vijendr Kumar Solanki, Kumar Pal Singh, M.Venkatesan , S.Tamilselvan "A Holistic Approach to Secure Networks Unsing Firewall" has been published in National Conference on "Frontiers of Applied Science and Computer Technology", FACT-2012 (http://www.ijesacbt.org/fact2012/) dated 6-7th Dec 2012 at NIT Trichy. (Conference Proceeding, Vol-1, pp 48-56).

23. Umang, Securing AODV: A Survey in the 6th National Conference on Advancements In Computational Techniques & Applications (ACTA-2011), at I.T.S Management & IT Institute Ghaziabad, pp. no 134-137, ISBN: 978-93-815830-6-7, October 2011.

24. Nancy Kansal, Identifing Capabilities of Data Mining in providing the Quality Technical Education in The Proceeding of 5th National Conference on “ Computing for National Development (INDIACom 2011)” at Bharati Vidya Peeth’s Institute of Computer Applications and Management New Delhi, March 10-11, 2011.

25. Nancy Kansal, Role of ICT in India: Rural Areas and Health Care in National Conference on “Impact of Information Technology on Society” at I.T.S Mohan Nagar Ghaziabad.

26. C. Sharma. “An Automatic Machine Learning and Particle Fitering Based Approach to Real Time Human Tracking in Videos” National Conference on Signal Processing and Real Time operating system (SPRTO, 2011), pp 290-295, HBTI Kanpur, March 26-27, 2011.

27. Khanna.A, Siddiqui.Z, “Domain Driven Data Mining” published in the proceedings of the 5th National Conference on “Computing for Nation Development”, organized by BVICAM, New Delhi, pp 1 – 5, ISBN 978-93-80544-00-7, March, 2011.

28. Kumar M , “ERP Issues & Challenges in Successful Implementation” published in the proceedings of National Conference “Emerging Technology in Computer Science(ETCS-2009)”, organized by MIET Meerut, 213-516, -ISBN 977-91-96549-59-18&19, Sept, 2009.

29. Roshan R., “Data Warehousing and Data Marts: Development in Pattern of Data Mart with Feedback or without Feedback” published in “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 331-338, ISBN 978-81-89547-69-1, November, 2009.

30. Bisht, S., “AOP vs OOP" published in the proceedings of National Conference “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 287-290, ISBN 978-81-89547-69-1, November, 2009.

31. Saurabh Saxena. “Security Based Cryptographic Schemes for Password based Protocols” in National Conference on Recent Trends in Network Security and Cryptography, PES Institute, pp. 172-176, Octorber 2009.

32. Roshan, R., “It is a tool to capture the essence of Human Thinking and communication and make decisions” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 251-259, ISBN 978-81-89547-55-4, April, 2009.

33. Ray, A. , “Server Side Scripting (State Management)” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 231-237, ISBN 978-81-89547-55-4, April, 2009.

34. Kumar M , “Ajax: An Introduction to Web applications for future Modeling” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, pp 209-216, ISBN 978-81-89547-55-4, April, 2009.

35. Porwal, R., Kapoor, S., Singh, L., and Gupta, A., “A Case Study in Testing a JAVA Class”, in Proceedings of the National Conference on “Emerging Trends in Software & Networking Technologies, ETSNT’09”, organized by Amity Institute of Information Technology, Amity University, Noida, India, pp 175-177, April, 2009.

36. Kumar R., “Security attacks and security policy in WLAN” published in the proceedings of National Seminar “Information Security: Emerging Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 163-175, ISBN 978-81-89547-55-4, April, 2009.

37. Saurabh Saxena “ Multidimensional Database for Book sales Data warehouse” in National Confrence on Advance Conputing & Communication Technology, ABES Ghaziabad pp E22-E25, 6-7 February 2009.

38. Kumar, P., Gupta, G., and Umang, “Aspect oriented Programming with Eclipse AspectJ Development Tool (AJDT)”, 3rd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM New Delhi, India, INDIACOM-2009, pp 319-322, ISSN:0973-7529 and ISBN 978-81-904526-0-3, January, 2009.

39. Singh, K.P., Solanki, V. K., “Implementation of Client Server Architecture using Mobile Agents” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 33-45, ISBN 978-81-89547-48-6, October, 2008.

40. Juneja, N., “Load Balancing technique for SMP machine as an improvement in Linux Scheduler” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 163-169, ISBN 978-81-89547-48-6, October 2008.

41. Srivastava, S., “Techniques of High Dimensional Data Reduction” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 259-266, ISBN 978-81-89547-48-6, October, 2008.

42. Bisht, S., “A study on Benefits of Multi-core processors” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 92-99, ISBN 978-81-89547-48-6, October, 2008.

43. Kumar, G., Tiwari, R., Gupta, S. and Srivastava, A., “Modeling Business Process and IT Infrastructure” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 211-216, ISBN 978-81-89547-48-6, October, 2008.

44. Umang, Kumar, R. and Reddy, B.V.R. “Watchdog and Pathrater as a mechanism to make network more secure”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 84-90, March, 2008.

45. Umang, Abdulahad, F.M. and Rai, C.S. “Comparison between Proactive and Reactive Routing Protocols”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Gh

 

Corporate Conscription

Research & Publications

Announcements

Awards & Ranking