MCA TWO YERAS, LATERAL ENTRY PROGRAMME       INSTITUTE OF TECHNOLOGY AND SCIENCE HAS BEEN RECOGNIZED FOR "NAAC"       NBA ACCREDITED MCA PROGRAMME @ INSTITUTE OF TECHNOLOGY AND SCIENCE, GHAZIABAD       
 

IT Research & Publications

List of Publication in International  Conferences/Seminars

1.      Sharma Charamani, “Automatic Human Activity Recognition in Video using Background Modleling and Spatio-temporal Template Matching Based Technique”, ACM International Conference ACAI 2011, Chitkara University, Patiala Punjab, pp 97-101, ACM 978-4503-0635-5/11.10, 2011

2.      A. Seth. “Data warehousing framework for Telecom Revenue Assurance” in International Conference on Issues and Challenges in Networking, Intelligence and computing Technologies (ICNICT 2011) Sep. 2011.

3.      A. Agrawal & R.A.Khan, “A Framework for Vulnerability Minimization- Object Oriented Design Perspective”, 2nd International Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society, pp. 499-504.

4.      A. Agrawal & R.A.Khan, “Assessing and Improving Encapsulation for Minimizing Vulnerability of an Object Oriented Design”, Communication in Computer and Information Science, Springer-Verlag, vol. 250, no. 2, pp. 531-533, 2011.

5.      Umang, B. V. R. Reddy, M. N. Hoda, GNDA: Detecting Good Neighbor nodes in adhoc routing protocol, IEEE Second International Conference on Emerging Applications of Information Technology, 978-0-7695-1/11 $26.00© 2011 IEEE.DOI 10.1109/EAIT.2011.62.

6.      Roshan, R, “Weak Passwords Practices and their Impact on the Security Systems of Universities in India: Analysis and Policy” in proceeding of International Conference of Computer Application (ICCA 2010)”, organized by TFRDC, Pondicherry, Research Publishing. pp 217-221, ISBN 978-981-08-7303-5, 24-27, December 2010.

7.      Kumar, R., “Geographical Information System to Identify Related and Required Dynamic Information of an Object” in the International Conference organized by Jaipuria Institute, Ghaziabad, India, issue 1, vol. 4, pp 319-329, ISBN 978-81-313-0850-9, February, 2010.

8.      Nancy Sharma, Business Intelligence in Health Care  Challenges & Solutions,  international Conference on IT & Business Intelligence (ITBI 2009), pp. no 23-27, 6th-8th Nov.2009 at Institute of Management Technology, Nagpur, 2009.

9.      A. Agrawal, S. Chandra & R. A. Khan, “An Efficient Measurement of Object Oriented Design Vulnerability”, The International Dependability Conference, ARES, IEEE Computer Society, pp. 618- 623, 16-19 March 2009.

10.  Bisht, S., “A Comparative study of aspect oriented testing approaches” published in the proceedings of International conference “Innovation in redefining Business Horizons” at IMT, Ghaziabad, India, pp 587-592, ISBN 023-063-716-7, December, 2008.

11.  Pandey, S. K., “Architectural Study and Comparison of Data Warehouse Technologies” in the proceedings of International conference ICDM organized by IMT, Ghaziabad, India, pp 418-426, February, 2008.

12.  Umang, and Hoda, M. N. “A Study of Adhoc Wireless Network Routing based on Various AODV Routing Schemes”, International Conference on “Information and Communication Technolgy”, organized by DIT, Dehradun in association with Uttarakhand State Council for Science & Technology, Bharat Sanchar Nigam and Institute of Engineers India((IE(I)), pp 873-876, July, 2007.

List of Abstract Publication in International Conferences/Seminars

1.    Dhar, P. and Pandita, S. “The Role of Artificial Neural Networks in recognizing handwritten characters” In Sovenir of International Conference on “Innovative Practices in Management and information Technology for Excellence (SRIJAN’2010)”,  organized by Maharaja Agrasen Institute of Management & Technology, Jagadhri, Excel India Publishers, pp 136, May, 2010.

2.      Dinkar S.K., “Server Based Antiphising” published in International Conference “Quality, Reliability and Infocom Technology”, Vol. 2, pp 142, ISSN 0972-3392, December, 2009.

3.      Porwal, R., Shukla, M., Awasthi, A., Moghey, A. and Pandey, P.,  “Modeling a Single Level Neuron”, in Proceedings of the International Conference on “Innovative Technologies, ICIT-09”, organized by PDM College of Engineering, Bahadurgarh, Haryana, India, in collaboration with IEEE-IMS/ EMBS (Delhi), pp 309-310, June 2009.

4.      Umang, ”Emerging Wireless Technologies in Growth & Development of Rural Areas”, 8th International Conference on Interdisciplinary approach in Physical sciences, organized by IAPS, Allahabad, India, pp 45, December, 2005.

5.      Pandey, S. K., “Analytical Study of Data Mining Algorithm”, International conference on Interdisciplinary approach in physical Sciences, organized by IAPS, Allahabad, India, pp 37-38, December, 2005.

List of Publication in International  Journal

1.      Vineet Kansal “An Analysis of Mobile Transaction Methods and Limitations in execution of M Commernce Transaction” in International Journal of Computer Application, Vol. 43, Iss. 21, pp.14-19, ISSN 975-0887, April 2012.

2.      Umang “Analytical Study of Existing Methodologies of IDS for False Alarm Rate -A Survey and Taxonomy”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Iss. 4, pp. 393-399, ISSN 2250-2459, April 2012.

3.      A. Agrawal & R. A. Khan, “Role of Coupling in Vulnerability Propagation-Object Oriented Design Perspective”, Software Engineering: An International Journal (SEIJ), vol. 2, no.1 March 2012, pp. 60-68.

4.      P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

5.      P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.

6.      Umang, Shruti Goyal, “Incorporation of IDS in real world applications”, Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20, ISSN-2079-8047, EISSN: 22186301 January 2012.

7.      C.Sharma, R Roshan, R.Porwal “ Intellegent Video Object Classification scheme using offline Feature Extraction  and Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256,  ISSN (Online) 1694-0814, January 2012.

8.      Dr. Rabins Porwal, “Working Capabilities of A.T.M with parallels redundant central computer” International Journal of Computational Intelligence and Information Security, Vol-2 No 11,pp. 16-26, Nov-2011.

9.      Umang, “Secure Routing Protocols In Mobile Adhoc Networks-A Survey And Taxonomy”, International Journal of Reviews in wireless computing, Vol. 7, Iss. 2, pp. 9-17, ISSN 2076-3328, September 2011.

10.  Ashish Seth, “Designing a SOA Based Model” ACM SIGSOFT Software Engineering Notes Page 1 Volume 36 Number 5, September 2011.

11.  Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Evolution of Technology through Procedural, Object Oriented, Component Based to Service Oriented. The Journal for Computing Teachers.

12.  Vidushi Sharma, Nancy Sharma, “Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform”, IFRSA International Journal of Data Warehousing & Mining, pp. no.75-78, Vol 1 Iss. 1, Aug-2011.

13.  Dinkar,S.K. and Purwar, R.K., “Time Aware Incremental Page Ranking Based on Personalized Link Structure Analysis”. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2 Iss. 2, pp 383 – 388, ISSN: 2079-2557, published by Science Academy, UK, indexed in Ulrich, Cabell’s Directory, Google Scholar, Journal Seek, EBSCO, Open J-Gate, Computers and Applied Sciences Complete, ProQuest Technology, INSPEC, Scientific Commons, April, 2011.

14.  Umang, Reddy B.V.R and Hoda M.N., “Study of Mobile Management Schemes in Mobile Adhoc Networks”, International Journal of Computer Applications, March 2011, Vol. 17, Iss. 7, pp. 42-47, ISSN-0975-8887, DOI: 10.5120/2236-2605.

15.  Ashish Seth. “SOA Evolution – A Review” In International Journal of Engineering Sciences, Vol 1, ISSN: 2229-6913, March 2011.

16.  Porwal Rabins, “A Survey in sensor’s Drift counteraction using Dynamic Pattern Recognition System”, Vol. 3 No. 1, pp. no 127-132, ISSN :975-3397, Jan 2011.

17.  Pandey, SK, Singh G.P., Kansal V, “Study of Object Oriented Analysis & Design Approach’, Journal of Computer Science, Vol 7 Iss. 2, pp. 143-147, Indexed in NY, USA and indexed in Ulrich, DOAJ, Cabell, WAD, ASA, IET-ISI Scient6ific, Genamics, EBSCO, Thomson Gale, ProQuest, SCOPUS, ISSN 1549-3636, Jan 2011.`  

18.  Ashish Seth., “Minimum Spanning Tree-Based Approach for Reliability Estimation of COTS-Based Software Applications” IUP Journal of Computer Science, Vol 4. Iss. 4, pp.13-21, October 2010

19.  Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Aspects of Service Oriented Computing. The Journal for Computing Teachers.

20.  Umang S., Reddy, B. V. R., Hoda M. N. "Enhanced Intrusion Detection System for malicious node detection in ad hoc routing protocol using minimal energy consumption", Communications IEE, Vol. 4, Iss. 17, pp. 2084-2094, ISSN- 1751-8628, DOI: 10.1049/iet-com.2009.0616, Nov 2010.

21.  Pandey, SK, Singh G.P., Kansal V., “An Alternative approach to Temporary Memory Management in Database using Object Oriented Systems”, International Journal of Computer Science & Network Security, Vol.10 Iss. 10, pp. 158-165, ISSN 1738-7906, Seoul, Korea indexed in Copernicus, Ulrich, Getcited, Open J-gate, Journal Seek, SCRIBD, Google Scholar, October, 2010.

22.  A. Agrawal & R. A. Khan, “Securing Vulnerable Software: A Checklist Approach”, The Journal of Computing (TJC), Vol.1 Iss. 2, pp. 33-45, June 2010.

23.  A. Agrawal & R.A.Khan, “An Algorithm to Measure Attribute Vulnerability Ratio of an Object Oriented Design” International Journal of Recent Trends in Engineering, Vol.2, Iss.3, pp. 61-63, November 2009.

24.  A. Agrawal & R.A.Khan, “A Framework to Detect and Analyze Software Vulnerabilities -Development Phase Perspective” International Journal of Recent Trends in Engineering, Vol. 2, Iss. 2, pp. 82-84, November 2009.

25.  A. Agrawal & R.A.Khan, “Measuring the Vulnerability of an Object Oriented Design”, Network Security, Elsevier, Vol. 2009 Iss.10, pp. 13-17, October 2009.

26.  A. Agrawal & R. A. Khan, “Impact of Inheritance on Vulnerability Propagation at Design Phase”, ACM SIGESOFT Software Engineering Notes, Vol 34, Iss. 4, pp. 1-5, July 2009.        

                          

List of Publication in National Conferences /Seminars

1.      Umang, Securing AODV: A Survey in the 6th National Conference on Advancements In Computational Techniques & Applications (ACTA-2011), at I.T.S Management & IT Institute Ghaziabad, pp. no 134-137, ISBN: 978-93-815830-6-7, October 2011.

2.      Nancy Kansal, Identifing Capabilities of Data Mining in providing the Quality Technical Education in The Proceeding of 5th National Conference on “ Computing for National Development (INDIACom 2011)” at Bharati Vidya Peeth’s Institute of Computer Applications and Management New Delhi, March  10-11,  2011.

3.      Nancy Kansal, Role of ICT in India: Rural Areas and Health Care in National Conference on        “Impact of Information Technology on Society” at I.T.S Mohan Nagar Ghaziabad.

4.      C. Sharma. “An Automatic Machine Learning and Particle Fitering Based Approach to Real Time Human Tracking in Videos” National Conference on Signal Processing and Real Time operating system (SPRTO, 2011), pp 290-295, HBTI Kanpur, March 26-27,2011.

5.      Saurabh Saxena. “Security Based Cryptographic Schemes for Password based Protocols” in National Conference on Recent Trends in Network Security and Cryptography, PES Institute, pp. 172-176, Octorber 2009.

6.      Khanna.A, Siddiqui.Z, “Domain Driven Data Mining” published in the proceedings of the 5th National Conference on “Computing for Nation Development”, organized by BVICAM, New Delhi, pp 1 – 5, ISBN 978-93-80544-00-7, March, 2011.

7.      Kumar M , “ERP Issues & Challenges in Successful Implementation” published in the proceedings of National Conference “Emerging Technology in Computer Science(ETCS-2009)”, organized by MIET Meerut, 213-516, -ISBN 977-91-96549-59-18&19, Sept, 2009.

8.      Roshan R., “Data Warehousing and Data Marts: Development in Pattern of Data Mart with Feedback or without Feedback” published in “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 331-338, ISBN 978-81-89547-69-1, November, 2009.

9.      Bisht, S., “AOP vs OOP" published in the proceedings of National Conference “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 287-290, ISBN 978-81-89547-69-1, November, 2009.  

10.  Roshan, R., “It is a tool to capture the essence of Human Thinking and communication and make decisions” published in the proceedings of National Seminar “Information Security: Emerging  Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 251-259, ISBN 978-81-89547-55-4,  April, 2009.

11.  Ray, A. , “Server Side Scripting (State Management)” published in the proceedings of National Seminar “Information Security: Emerging  Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 231-237, ISBN 978-81-89547-55-4, April, 2009.

12.  Kumar M , “Ajax: An Introduction to Web applications for future Modeling” published in the proceedings of National Seminar “Information Security: Emerging  Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, pp 209-216, ISBN 978-81-89547-55-4, April, 2009.

13.  Porwal, R., Kapoor, S., Singh, L., and Gupta, A., “A Case Study in Testing a JAVA Class”, in Proceedings of the National Conference on “Emerging Trends in Software & Networking Technologies, ETSNT’09”, organized by Amity Institute of Information Technology, Amity University, Noida, India, pp 175-177, April, 2009.

14.  Kumar R., “Security attacks and security policy in WLAN” published in the proceedings of National Seminar “Information Security: Emerging  Threats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 163-175, ISBN 978-81-89547-55-4, April, 2009.

15.  Saurabh Saxena “ Multidimensional Database for Book sales Data warehouse” in National Confrence on Advance Conputing & Communication Technology, ABES Ghaziabad pp E22-E25, 6-7 February 2009.

16.  Kumar, P., Gupta, G., and Umang, “Aspect oriented Programming with Eclipse AspectJ Development Tool (AJDT)”, 3rd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM New Delhi, India, INDIACOM-2009, pp 319-322, ISSN:0973-7529 and ISBN 978-81-904526-0-3, January, 2009.

17.  Singh, K.P.,  Solanki, V. K., “Implementation of Client Server Architecture using Mobile Agents” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 33-45, ISBN 978-81-89547-48-6, October, 2008.

18.  Juneja, N., “Load Balancing technique for SMP machine as an improvement in Linux Scheduler” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 163-169, ISBN 978-81-89547-48-6, October 2008.

19.  Srivastava, S., “Techniques of High Dimensional Data Reduction” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 259-266, ISBN 978-81-89547-48-6, October, 2008.

20.  Bisht, S., “A study on Benefits of Multi-core processors” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 92-99, ISBN 978-81-89547-48-6, October, 2008.

21.  Kumar, G., Tiwari, R., Gupta, S. and Srivastava, A., “Modeling Business Process and IT Infrastructure” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 211-216, ISBN 978-81-89547-48-6, October, 2008.

22.  Umang, Kumar, R. and Reddy, B.V.R. “Watchdog and Pathrater as a mechanism to make network more secure”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 84-90, March, 2008.

23.  Umang, Abdulahad,  F.M. and Rai, C.S. “Comparison between Proactive and Reactive Routing Protocols”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 63-66, March, 2008.

24.  Arora, P. and Umang, “Security Considerations For VoIP Systems”, 2nd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM, New Delhi, INDIACOM-2008 pp 245-247, ISSN 0973-7529 and ISBN 978-81-904526-0-2, February, 2008.

25.  Pandey, S.K., and Dhawan, V. B.,  “Developments and Trends in Database Technology” in the proceedings of National Seminar on “Impact of IT on Society”  organized by ITS, Mohan Nagar, Ghaziabad, India, pp 69-78, ISBN 81-89547-41-0, February, 2008.

26.  Kumar, R.,  “Finite State machine: making simple work of complex functions” in the proceeding of National Seminar on “Impact of IT on Society”  organized by ITS, Mohan Nagar, Ghaziabad, India, pp 132-139, ISBN 81-89547-41-0, February, 2008.

27.  Singh, K.P., “I-Mode Technologies” in the proceedings of National Seminar on “Impact of IT on Society” organized by ITS, Mohan Nagar, Ghaziabad, India, pp 216-228, ISBN 978-81-89457-41-0, February, 2008.

28.  Dinkar, S.K. and Bansal, N., ”Web Mining and Knowledge Discovery in Usage Patterns” in the Proceedings of National Conference on Information Security & Mobile Computing, pp 85-93, Ghaziabad, India, February, 2008.

29.  Pachariya, M., “A Frame work for Test Case Generation by Combinatorics Theory”  published in the Proceedings of the National Seminar  on “Impact of Information Technology on Society (ITOS– 2008 )” being organized by Institute of Technology & Science Mohan Nagar, Ghaziabad, India, pp 388-407, ISBN 978-81-89457-41-7, February, 2008.

30.  Tripathi, A. N., “Rural Development with IT Awareness” in the proceedings of National Marketing Seminar on “Reconfiguring Marketing in the changing Business Landscape”,  organized by ITS, Mohan Nagar, Ghaziabad, India, pp 225-230, ISBN 81-89547-38-0, January, 2008.

31.  Dinkar, S.K. and Bansal, N., ”Semantics of Temporal Databases: A Perspective Approach” in the proceedings of National Conference on “Organizational Transformation Through Information Technology Issues and Challenges”, Indore, India, pp 173-184, September, 2007.

32.  Umang and Hoda, M.N., “Mitigating Attacks in Routing Protocol”, Ist  National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and  BVICAM, New Delhi, INDIACOM-2007 pp 145-147, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.

33.  Umang and Hoda, M.N., “Role Of ICT in Indian Rural Areas”, Ist  National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and  BVICAM, New Delhi, INDIACOM-2007 pp 89-92, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.

34.  Mechanics and Information Theory” in the proceedings of National conference on Information Technology and Its Application organized by Bharati Vidyapith, New Delhi, India, pp 21-24, April, 2006.

35.  Pandey, S.K. and Bagchi, D., “Software Reliability: Critical attribute for a successful Implementation” in the proceedings of National conference on Emerging Computer Technology organized by Hans Raj Mahila Maha Vidyalaya , Jalendhar, India, pp 67-73, September, 2005.

List of Abstract Publication in National  Conferences /Seminars

1.      C. Sharma IEEE International Conference on Computer and Communication Technology (ICCCT 2011) MNNIT Allahabad Conference on 15-17th Sep 2011 to be published in IEEE Xplore.

2.      Ashish Seth , Kirti Seth “ Business Intelligence with ESB” in conference proceeding of Advancement of Technology soft Computing “

3.      Seth A. “Human Resources Planning Model For Scientific Institutions”

4.      Ashish Seth National Conference on “Advance Computing & Communication Technology pm 6-7 February 2009 organized by ABES Engineering College Ghaziabad

5.      Seth A “Data Warehousing framework for Telecom Revenue Assurance “.

6.      Umang, “Challenges in Securing VoIP”, 40th Annual Convention of ORSI, organized by Indian National Science Academy, New Delhi, DST and ORSI, pp 126, December, 2007.

7.      Umang and Hoda, M.N., “A Performance comparison of Adhoc on Demand Distance Vector Routing Protocol” in the proceedings of National Conference on “Mathematical Modeling, Optimization and their applications”, organized by SEQOMM DU, Delhi, pp 62-63, April, 2007.

8.   Umang,  Reddy, B. V. R. and Hoda, M. N.,  “Impact of ICT in Wireless Networks For Indian Rural Development”, National Seminar on “ICT for Productivity, ICTP- 2006” organized by Sardar patel University, Gandhinagar, India, pp 18, December, 2006.

List of Publication in National Journal


1.      S.K. & Singh G.P. Study of Significant of Object of object –oriented Paraligm in Modeling in national journal” computing Trends, Vol.1, ISSN:22309152,  January 2011.

2.      Dinkar, S.K. and Verma, P., ”Knowledge Discovery in Database: Data mining” in the IILM Journal of Science, Technology & Management(CHINTAN),  Vol. 2 Iss.1, pp 36-42, March 2009.

3.      A. Agrawal, R. A. Khan & S. Chandra, “Software Security Process-Development Life Cycle Perspective”, CSI communications, India, vol. 32, no.5, pp. 39-42, August 2008.

4.      Dhar, P., “OOUPS…! How many germs Live on your desk?” in the journal Spark. [Online]. http://www.indiabschools.com/sparkjournal_sys1.html, July, 2008.

5.      Dhar ,P., “Security Issues for SHE (Smart Home Environment )” in the jounal Spark. [Online]. http://www.indiabschools.com/sparkjournal_sys2.html,   March, 2008.

6.      Pandey, S. K., “Study of status and Legal Framework of cyber crimes-An Indian Prespective” in the Business Journal from FORE, India, Vol. 24 Issue 3, pp. 20-29, ISSN 0970-2385, December, 2007.

7.      Dhar, P., “Use of Technology in newspaper printing with special reference to TOI” in the journal Spark [Online]. http://www.indiabschools.com/sparkjournal_sys3.html , April 2007.

8.      Pandey, S. K., “Context-Aware Computing: Augmentation of Mobile devices with Awareness of their Context” in the Apeejay Journal of Management and Technology, Jalandhar, India, Vol. 3, Iss.1 pp 85-93, January, 2007.

9.      Pandey, S. K., “Information and communication Technology A catalyst for future roadmap of India” in the Journal Business Transaction The road ahead, pp 133-141, INMANTEC publishing House, July, 2006.

10.  Pandey, S. K., “Grid Computing: Enabler of Clustering of Distributed Resources” in the IIIM Journal of Management and IT (OORJA), Jaipur, India, issue 2, Vol. 4, pp 55-63, May-August 2006.

11.  Pandey, S. K., “Data Mining: Application of Clustering and parallelism” in the Journal of Rajarshi School of Management & Technology, India, issue 2, Vol. 2, pp 60-74, ISSN 0972-1398, June, 2005.

12.  Pandey, S. K., “The Saga of E-Commerce & Reforms” in the ITS Journal of IT and Management (SYNERGY), Ghaziabad, India, issue 2, Vol. 1, pp 79-85, March 2003.

Corporate Conscription

Research & Publications

Announcements

Awards & Ranking