First Author | Co-authors | Title of Publication | Name of the Journal | Details of Journal | |||
Vol. (No.) | Page No. | Year | ISSN No. | ||||
Priyanka Mathur | Swati V Chande | An Evidence-based Approach to Discovery and Assessment of Software Engineering Decisions
| International Journal of Computer Applications | Special issue no. 2 | 32-36 | 2012 | 0975 – 8887 |
Shveta Parnami | Swati V Chande | A Survey on Generation of Test Cases and Test Data Using Artificial Intelligence Techniques
| UACEE International Journal of Artificial Intelligence and Neural Networks | 2(1) | 16-18 | 2012 | 2250 -3749 |
Navneet Sharma |
| Analysis of Different Vulnerabilities in ATM Transaction
| Journal of Global Research in Computer Science | 3(3) | - | 2012 | 2229-317x |
Navneet Sharma |
| Different Data encryption methods used in secure ATM Transaction.
| International Journal of Engineering and Advanced Technology | 1(4) | - | 2012 | 2249- 8958 |
Navneet Sharma |
| Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction
| International Journal of Engineering and Advanced Technology | 1(6) | 249-251 | 2012 | 2249-8958 |
Neha Tiwari | OP Rishi | Analyzing the effect of playout buffer adjustment on voice quality for voip based social network applications | International Journal of | 2 | 105-108 | 2012 | 2250-3757 |
Deepshikha Bhatia | Ashok Kumar Sharma | Theoretical Investigation of Proactive and Reactive routing protocol: MANET | International Journal of Computer Applications in Engineering, technology and sciences | 4 | 022-029
| 2012 |
0974-3596
|
Priyanka Gianchandani |
| Scheming Desertification Leading to Climate Change through Image Mining
| International Journal Of Environmental Engineering And Management | 3(5) | 334 | 2012 |
|
Priyanka Gianchandani |
| SAAS Marketplaces: New approach to reach Small And Medium Sized Businesses | International Journal of Information & Computation Technology | 3(7) | 568 | 2012 | 0974-2239 |
Amita Sharma | Astha Pareek,Geetika Vyas | Review of security issues of MVOIP in WIMAX network | International Journal for Electro Computational World Knowledge Interface | 1-6 | - | 2012 | 2249-541X
|
Astha Pareek |
| A concept based approach of rare association rule mining from education data | International journal of research in computer application and management, | 2(9) | 46-47 | 2012 | 223-1009 |
Astha Pareek | Manish Gupta | Use of Data Mining in Education Field | International Journal of Management Outlook | 2(1) | 55-58 | 2012 | 2231-1769 |
Astha Pareek | Manish Gupta | Review of Data Mining Techniques in Cloud computing Database | International journal of Advanced Computer research | 2 | 52-55 | 2012 | 2249-7277 |
Manoj K Sabnis | Amita Sharma | Shadow Detection, Methods and its Evaluation | International Journal of electronics Communication and Computer Engineering | 3 | 1330 | 2012 | 2278-4209 |
Preety Verma Dhaka | Amita Sharma | SDMetrics: The OO Design quality measurement tool for UML | International journal of computer engineering & technology | 3 | 640 | 2012 | 0976-6367 |