Department of Computer Science and Engineering Publications

Sanjeev Dhiman

  • Thakur, and Dhiman, S. (2015). An Efficient Image Segmentation Technique by  Integrating FELICM with Negative Selection Algorithm, 8(10): 63-70. 
  • Mahajan, and Dhiman, S. (2016) Prevent and Isolate Black Hole Attack in Manet Using Alarm. IOSR Journal of Computer Engineering (IOSR-JCE), 18(3) :68-72. 
  • Dhiman,S., Gupta, T. and Kaur, A. (2012). A Survey On Cloud Computing and its Techniques, 3(1): 93-97. 
  • Kaur, P.,Dhiman,S., and Kaur, K. (2013) A methodology oncryptography applicant to mobile adhoc network & wireless sensor network and wireless sensor network, 1(3): 48-54.
  • Sunaina and Dhiman,S. (2013) Survey on security threats of wireless & mobileAd-hoc network, 2(2): 4-8. 
  • Dhiman,S. (2012) Comprehensive Study of Object-Oriented Analysis and Design by using the concept of OOSE. International journal of Computer Science and Technology, 2(3).

 

 

Nishi Madan

 

  • Goyal, S., & Nishi, E. (2016). Local Linear Reconstruction Based Medical Image Registration in DWT Domain, 8(3), 289–302.
  • Kansal, K., & Nishi, E. R. (2016). Automated detection of exudates for diabetic retinopathy screening in fundus images using CS-ACO optimization approach. International Journal of Bio-Science and Bio-Technology, 8(3), 323–340. http://doi.org/10.14257/ijbsbt.2016.8.3.33
  • Gujral, E. R., & Nishi, E. (2015). A Novel technique for the Detection of Mixed Noise in Medical Images using Data mining, 8(11), 231–242.
  • Kaur, P., & Nishi. (2015). Single image dehazing using adaptive restoration factor in dark channel prior. International Journal of Software Engineering and Its Applications, 9(8), 149–158.
  • Kaur, R., & Nishi. (2015). Automated Classification of Research Papers Using Hybrid Algorithm. International Journal of Hybrid Information Technology, 8(6), 95–106.
  • Monika & Nishi (2018), A Review on Bug Report Assignment, International Journal of Software Engineering and Its Applications, 12(1),1-20.

 

 

Rahul Hans

 

  • Bagga, P., & Hans, R. (2015). Applications of mobile agents in healthcare domain: a literature survey. International Journal of Grid Distribution Computing8(5), 55-72.
  • Bagga, P., Hans, R., & Sharma, V. (2017). A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture. Expert Systems with Applications72, 269-282.
  • Bagga, P., Hans, R., & Sharma, V. (2017). N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents. International Journal of Interactive Multimedia & Artificial Intelligence4(6).
  • Bagga, P., & Hans, R. (2017). Mobile Agents System Security: A Systematic Survey. ACM Computing Surveys (CSUR)50(5), 65.
  • Hans, R., & Kaur, R. (2012, December). Novel dynamic shadow approach for fault tolerance in mobile agent systems. In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on(pp. 1-6). IEEE.
  • Hans, R., & Kaur, R. (2014, March). Location tracking in mobile agents system using forward and backward pointers. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in(pp. 1-5). IEEE.

 

Chapter

  • Mahajan, R., & Hans, R. (2014, September). A novel comparison based approach for fault tolerance in mobile agent systems. In International Symposium on Security in Computing and Communication(pp. 221-229). Springer, Berlin, Heidelberg.

 

 

Dr. Sankalap Arora

  • Arora, S., & Singh, S. (2018). Butterfly optimization algorithm: a novel approach for global optimization. Soft Computing, 1-20.
  • Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 1-21.
  • Arora, S., Singh, S., & Yetilmezsoy, K. (2018). A modified butterfly optimization algorithm for mechanical design optimization problems. Journal of the Brazilian Society of Mechanical Sciences and Engineering, 40(1), 21.
  • Arora, S., & Anand, P. (2017). Chaos-enhanced flower pollination algorithms for global optimization. Journal of Intelligent & Fuzzy Systems, 33(6), 3853-3869.
  • Joshi, H., & Arora, S. (2017). Enhanced Grey Wolf Optimization Algorithm for Global Optimization. Fundamenta Informaticae, 153(3), 235-264.
  • Arora, S., & Singh, S. (2017). Node Localization in Wireless Sensor Networks Using Butterfly Optimization Algorithm. Arabian Journal for Science and Engineering, 42(8), 3325-3335.
  • Arora, S., & Singh, S. (2017). An improved butterfly optimization algorithm with chaos. Journal of Intelligent & Fuzzy Systems, 32(1), 1079-1088.
  • Arora, S., & Singh, S. (2017). An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization. International Journal of Interactive Multimedia & Artificial Intelligence, 4(4).
  • Kohli, M., & Arora, S. (2017). Chaotic grey wolf optimization algorithm for constrained optimization problems. Journal of Computational Design and Engineering.
  • Kaur, R., & Arora, S. (2017). Nature Inspired Range Based Wireless Sensor Node Localization Algorithms. International Journal of Interactive Multimedia & Artificial Intelligence, 4(6).
  • Kaur, G., & Arora, S. (2018). Chaotic Whale Optimization Algorithm. Journal of Computational Design and Engineering.

 

 

Dr. Harpreet Singh

 

  • Singh, H., & Dhir, R. (2013). A New Efficient Matrix Based Frequent Itemset Mining Algorithm with Tags. International Journal of Future Computer and Communication, 2(4), 355.
  • Singh, H., & Kaur, P. (2014). A survey of transformation based website structure optimization models. Journal of Information and Optimization Sciences, 35(5-6), 529-560.
  • Singh, H., & Kaur, P. (2014). Website structure optimization model based on ant colony system and local search. IJ Information Technology and Computer Science, 11, 48-53.
  • Singh, H., Kaur, M., & Kaur, P. (2017). Web page recommendation system based on partially ordered sequential rules. Journal of Intelligent & Fuzzy Systems, 32(4), 3009-3015.
  • Singh, H., & Dhir, R. (2012). An Effective Method for Association Rule Mining based on Transactional Matrix. International Journal of Computer Applications, 39(9), 13-15.
  • Singh, H., & Kaur, P. (2016). Ant Colony System-Based E-Supermarket Website Link Structure Optimization. In Proceedings of Fifth International Conference on Soft Computing for Problem Solving (pp. 249-259). Springer, Singapore.
  • Kaushal, C., & Singh, H. (2015, October). Comparative study of recent sequential pattern mining algorithms on web clickstream data. In Power, Communication and Information Technology Conference (PCITC), 2015 IEEE (pp. 652-656).

 

Ridhi Kapoor

 

 

 

 

Aarti

  • Aarti, Verma, K. and Rajput, P K (2012) Color Secret Sharing with Ideal Contrast using Bit Plane Encoding with (k,n) VCS. In Proceeding of National Conference on Recent Advances in Communication, Control and Computing Technology(RACCCT), ISBN: 978-81-88894-34-5, 326-331.
  • Aarti, Verma, H. K. and Rajput, P K (2012) Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n)-VCS.International Journal Of Computer Application, 46(9): 36-41.
  • Aarti, Verma, H. K. and Rajput, P K (2012) An Overview of Visual Cryptography with Some Important Parameters.Journal of Current Engineering Research, 2(3), 0976-8324, 38-42.
  • Aarti, Verma, H. K. and Rajput, P K (2012)Multiple Secret Sharing Scheme with Grey-Level Mixing Using EVCS. presented in International Conference on Issues and Challenges in Networking, Intelligence and Computing Technologies (ICNICT-2012) published in IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(2):24-29.
  • Aarti and Rajput, P. K. (2012) An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding. International Journal of Computer Network and Information Security,6(2): 54-60.
  • Aarti, Verma, H. K. and Rajput, P K (2012)A Novel Multi Secret Sharing Scheme with MSB Extraction Using EVCS. presented in 6thInternational Conference on Contemporary Computing( IC3 2013): pp 169-174, proceeding in ieee explorer, Noida.   
  • Rajput, P. K., Nagpal, G. and Aarti (2013) Feature Weighted Unsupervised Classification Algorithm and Adaptation for Software Cost Estimation. International Journal of Computational Intelligence Studies,3(1): 74-93.
  • Rajput, P. K., Nagpal, G. and Aarti (2014) CGANN-Clustered Genetic Algorithm with Neural Network for Software Cost Estimation. International Conference on Advances in Engineering and Technology (ICAET'2014): 29-30.
  • Aarti, Sikka, G. and Dhir, R. (2016) An investigation on the effect of cross project data for prediction accuracy. International Journal of System Assurance Engineering and Management, 7(1), 1-26, March 2016.
  • Aarti, Sikka, G. and Dhir, R. (2016) An Investigation on the Metric Threshold for Fault- Proneness. International Journal of Education and Management Engineering (IJEME),MECS,1(1): 1-8.
  • Aarti, Sikka, G. and Dhir, R. (2016) Identification of Error Prone Classes and quality estimation Using semi-supervised learning Mechanism with limited fault data. In proceeding of Recent Research in “Mechanical, Electrical, Electronics, Civil, Computer Science and Information Technology” (MECIT-2017), New Delhi. January 2016.
  • Aarti, Sikka, G. and Dhir, R. (2017) Threshold based Empirical Validation of Object-Oriented Metrics on Different Severity Levels, International Journal of Intelligent Engineering Informatics (IJIEI), Inderscience. (Accepted).

 

Shifali Katoch

  • S. andKalra, S. (2015) Security Issues Concerning Next Generation of Cloud Computing and its Current Status, IMTC-2015.
  • Kaur, S. and Katoch, S. (2017), Security Protocols for Internet of Things(IoT)- A Survey, Journal of Advance Research in Cloud Computing, Virtualization and Web Applications, 4(1).

 

Garima Jain

  • Jain, G. (2016) A Study of Bayesian Classifiers Detecting Gratuitous Email Spamming. Communications on Applied Electronics (CAE) Foundation of Computer Science FCS, New York, USA: 6(2).
  • Jain,G. Kakkar,P. (2016) A proposal of Improved K-means algorithm for detecting gratuitous Email Spamming. International Journal of Modern Computer Science August, 2016 RES Publication
  • Jain,G. A survey on variour classifiers detecting gratutious Email Spamming. International Journal of Engineering Applied Sciences and Technology.

 

 

Sangeeta Bhatti

  • Bhatti, S. and Sharma, S. (2015) A Novel Algorithm Approach for Detection of Sybil Attack in MANET.International Journal of Advanced Research in Computer Science and Software Engineering,5(5): 1680-1685.

 

 

Mission

The mission of DAV University is to contribute to society through the pursuit of education, learning, and research at the highest international levels of excellence imbibing the following core values: Freedom of thought and expression, Freedom from discrimination, Education, The encouragement of a questioning ...
Know More »

Vision

With a vision to provide excellent human resource to corporate DAV University ensures students are taught through latest teaching methodologies and technology platforms. The quality of students is the hallmark of DAV University due to which companies of global stature have recruited from DAV University.
Know More »

Contact us

  DAV University

        SARMASTPUR

        Jalandhar - Pathankot

        National Highway (NH 44)

        JALANDHAR - 144 012, Punjab

  +91-181-2708845

  registrar@davuniversity.org

Quick Inquiry
Copyright © 2016-17. DAV University. All Rights Reserved.
Mandatory Disclosures | Legal Notice | Privacy | Contact Details |   Last updated : 19 Jul 18