First Author  | Co-authors  | Title of Publication  | Name of the Journal  | Details of Journal  | |||
Vol. (No.)  | Page No.  | Year  | ISSN No.  | ||||
Priyanka Mathur  | Swati V Chande  | An Evidence-based Approach to Discovery and Assessment of Software Engineering Decisions 
  | International Journal of Computer Applications  | Special issue no. 2  | 32-36  | 2012  | 0975 – 8887  | 
Shveta Parnami  | Swati V Chande  | A Survey on Generation of Test Cases and Test Data Using Artificial Intelligence Techniques 
  | UACEE International Journal of Artificial Intelligence and Neural Networks  | 2(1)  | 16-18  | 2012  | 2250 -3749  | 
Navneet Sharma  | 
  | Analysis of Different Vulnerabilities in ATM Transaction 
  | Journal of Global Research in Computer Science  | 3(3)  | -  | 2012  | 2229-317x  | 
Navneet Sharma  | 
  | Different Data encryption methods used in secure ATM Transaction. 
  | International Journal of Engineering and Advanced Technology  | 1(4)  | -  | 2012  | 2249- 8958  | 
Navneet Sharma  | 
  | Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction 
 
  | International Journal of Engineering and Advanced Technology  | 1(6)  | 249-251  | 2012  | 2249-8958  | 
Neha Tiwari  | OP Rishi  | Analyzing the effect of playout buffer adjustment on voice quality for voip based social network applications  | International Journal of  | 2  | 105-108  | 2012  | 2250-3757  | 
Deepshikha Bhatia  | Ashok Kumar Sharma  | Theoretical Investigation of Proactive and Reactive routing protocol: MANET  | International Journal of Computer Applications in Engineering, technology and sciences  | 4  | 022-029 
  | 2012  | 
 0974-3596 
  | 
Priyanka Gianchandani  | 
  | Scheming Desertification Leading to Climate Change through Image Mining 
 
  | International Journal Of Environmental Engineering And Management  | 3(5)  | 334  | 2012  | 
  | 
Priyanka Gianchandani  | 
  | SAAS Marketplaces: New approach to reach Small And Medium Sized Businesses  | International Journal of Information & Computation Technology  | 3(7)  | 568  | 2012  | 0974-2239  | 
Amita Sharma  | Astha Pareek,Geetika Vyas  | Review of security issues of MVOIP in WIMAX network  | International Journal for Electro Computational World Knowledge Interface  | 1-6  | -  | 2012  | 2249-541X 
  | 
Astha Pareek  | 
  | A concept based approach of rare association rule mining from education data  | International journal of research in computer application and management,  | 2(9)  | 46-47  | 2012  | 223-1009  | 
Astha Pareek  | Manish Gupta  | Use of Data Mining in Education Field  | International Journal of Management Outlook  | 2(1)  | 55-58  | 2012  | 2231-1769  | 
Astha Pareek  | Manish Gupta  | Review of Data Mining Techniques in Cloud computing Database  | International journal of Advanced Computer research  | 2  | 52-55  | 2012  | 2249-7277  | 
Manoj K Sabnis  | Amita Sharma  | Shadow Detection, Methods and its Evaluation  | International Journal of electronics Communication and Computer Engineering  | 3  | 1330  | 2012  | 2278-4209  | 
Preety Verma Dhaka  | Amita Sharma  | SDMetrics: The OO Design quality measurement tool for UML  | International journal of computer engineering & technology  | 3  | 640  | 2012  | 0976-6367  |