Publications
S.NO | PUBLICATION DETAILS | YEAR | SCS | WOS | INCI | PBM | IEEE | GSC | SNIP | IM.F |
---|---|---|---|---|---|---|---|---|---|---|
1. | Evaluation and Refinement of MVC Web Application Architecture, | 2021 |
|
|
|
|
|
| 5 | 0.119 |
2. | A concept based approach of rare association rule mining from education data, | 2021 |
|
|
|
|
|
| 48 |
|
3. | A Systematic Review and Comparative Analysis of Cloud Simulation Tools, | 2021 |
|
|
|
|
|
| 185 | 0.119 |
4. | Security Enhancement in Storage of Linux Containers Over Cloud Computing Infrastructure, | 2021 |
|
|
|
|
|
| 32 |
|
Security Enhancement in Storage of Linux Containers Over Cloud Computing Infrastructure, | 2021 |
|
|
|
|
|
| 32 |
| |
6. | Analysis of Web Usage Patterns to Identify Most Frequently Accessed Web Page by Multiple Users, | 2020 | 0 |
|
|
|
| 0 | 159 | 0.184 |
7. | Computational and Performance Aspects of Face Recognition Method (HOPFALRB), | 2020 | 0 | 0 |
|
|
| 0 | 642 |
|
8. | A Recommendation Perspective for Modeling Drug-Target Interaction Predictions Using Network-Based Approaches, | 2020 |
|
|
|
|
| 0 | 585 | 0.184 |
9. | Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python, | 2020 | 0 |
|
|
|
| 0 | 8 | 0.184 |
10. | Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models, | 2020 | 0 |
|
|
|
| 0 | 76 | 0.184 |
11. | Improving Public Transport Services using Sentiment Analysis of Twitter data, | 2020 |
|
|
|
|
| 0 | 250 | 0.119 |
12. | Comparative Study of Prewitt and Canny Edge Detector Using Image Processing Techniques, | 2020 | 0 |
|
|
|
| 0 | 713 | 0.184 |
13. | Analysis of the Influence of Photo Manipulation on Creative Advertising, | 2020 | 0 | 0 |
|
|
| 0 | 541 | 0.184 |
14. | Query Caching Technique Over Cloud-Based MapReduce System: A Survey, | 2020 | 0 |
|
|
|
| 0 | 25 | 0.184 |
15. | Understanding the Role of Artificial Neural Networks in the Prediction of Mental Health Diseases, | 2020 | 0 |
|
|
|
| 0 | 409 | 0.184 |
16. | MRC-COVID (Map Reduce with Cache) System for Big data Analytics, | 2020 |
|
|
|
|
| 2 | 1808 |
|
17. | A New Methodology on Sentiment Analysis, | 2020 | 1 | 0 | 625 | |||||
18. | Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python, | 2020 | 0 |
|
|
|
| 0 | 8 | 0.184 |
19. | Coronavirus (COVID-19) in India-Statistics & Facts, | 2020 | 1 |
|
|
| 1 | 521 |
| |
20. | The Rising of Blockchain Technology and Its Adoption in India, | 2020 | 0 |
|
|
|
| 0 | 357 |
|
21. | AI-HI…The Technological Transgenders (AI-HI Techno-Trans), | 2020 | 0 |
|
|
|
| 0 | 183 |
|
22. | Innovative Classroom Activity with Flipped Teaching for Programming in C Course—A Case Study, | 2020 | 0 |
|
|
|
| 0 | 252 |
|
23. | Analysis of Value-Based Academic Accomplishment Through Prominent Management Techniques, | 2020 | 0 |
|
|
|
| 0 | 494 |
|
24. | Analysis of Augmented Course Delivery and Assessment of Undergraduate Computer Engineering Programming Courses with the Use of ICT, | 2020 | 0 |
|
|
|
| 0 | 488 |
|
25. | A novel approach for software security requirements identification in OSS projects, | 2020 | 0 |
|
|
|
|
| 13179 | 0.101 |
26. | A novel approach for software security requirements identification in OSS projects, | 2020 | 0 |
|
|
|
|
| 13179 | 0.101 |
27. | A descriptive review on software security requirements using open source software projects, | 2020 | 0 |
|
|
|
|
| 4298 | 0.123 |
28. | A descriptive review on software security requirements using open source software projects, | 2020 | 0 |
|
|
|
|
| 4298 | 0.123 |
29. | Analog Front-End Design and Construction for ECG Monitoring System, | 2020 | 1 |
|
|
|
| 0 | 703 | 0.184 |
30. | Vulnerability and Mitigation Strategies for Secure Expert Systems, | 2020 | 0 |
|
|
|
| 0 | 72 | 0.184 |
31. | A Model for Effective Software Testing in Cloud Environment, | 2020 | 0 |
|
|
|
| 0 | 153 | 0.184 |
32. | Prediction of Prediabetes, No Diabetes and Diabetes Mellitus-2 Using Pattern Recognition, | 2020 | 0 |
|
|
|
| 0 | 755 | 0.184 |
33. | A Review on Applicability of Deep Learning for Remote Sensing Applications, | 2020 |
|
|
|
|
| 2 | 3832 | 0.101 |
34. | Grey Box Approach For Mobile Application Testing, | 2020 | 0 |
|
|
|
| 0 | 419 | 0.184 |
35. | Artificial Neural Network Approach for Modeling Cu(II) and Cr(VI) Ion Biosorption from Synthetic Textile Effluent Using Three Low-Cost Biosorbents, | 2020 | 0 | 0 |
|
|
| 0 | 664 |
|
36. | A Diverse View on Feature-Oriented Programming in Software Product Line, | 2020 |
|
|
|
|
|
| 1957 | 0.589 |
37. | Docker Security Analysis Mechanism with Linux Platform, | 2020 | 0 |
|
|
|
| 0 | 601 |
|
38. | Analysis of Docker Performance in Cloud Environment, | 2020 | 0 |
|
|
|
| 0 | 18 |
|
39. | A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment, | 2020 | 0 |
|
|
|
| 0 | 43 | 0.184 |
40. | An Implementation of Privacy Preserving “IF THEN ELSE” Rules for Vertically Partitioned Data, | 2020 | 0 |
|
|
|
| 0 | 56 | 0.184 |
41. | Docker Security Analysis Mechanism with Linux Platform, | 2020 | 0 |
|
|
|
| 0 | 601 |
|
42. | Analysis of Docker Performance in Cloud Environment, | 2020 | 0 |
|
|
|
| 0 | 18 |
|
43. | A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment, | 2020 | 0 |
|
|
|
| 0 | 43 | 0.184 |
44. | An Implementation of Privacy Preserving “IF THEN ELSE” Rules for Vertically Partitioned Data, | 2020 | 0 |
|
|
|
| 0 | 56 | 0.184 |
Heuristic Expert Evaluation of e-Learning Application, | 2020 | 0 |
|
|
|
| 0 | 162 | 0.184 | |
Empirical Investigation of Usability Evaluation Methods for Mobile Applications Using Evidence-Based Approach, | 2020 |
|
|
|
|
|
| 110 |
| |
47. | FEDUS: A comprehensive algorithm for web usage mining, | 2019 |
| 0 |
|
|
| 0 | 854 |
|
48. | Twitter Sentiment Analysis using Rapid Miner Tool, | 2019 |
|
|
|
|
| 0 | 50 |
|
49. | A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm, | 2019 | 2 | 0 | 0.000 | |||||
50. | Prediction Algorithms and Consecutive Estimation of Software Product Line Feature Model Usability, | 2019 | 1 | 0 |
|
| 0 | 777 | 0.000 | |
51. | Essential Parameters of ASMAN Framework to Compare SSPs in Cloud Computing, | 2019 | 0 |
|
|
| 0 | 781 |
| |
52. | Particle Swarm Optimization for Flexible Job Scheduling Problem with Mutation Strategy, | 2019 | 0 |
|
|
|
| 0 | 503 | 0.170 |
53. | Particle Swarm Optimization for Flexible Job Scheduling Problem with Mutation Strategy, | 2019 | 0 | 0 |
|
|
| 0 | 503 | 0.170 |
54. | Segmentation of Handwritten Text Using Bacteria Foraging Optimization, | 2019 |
|
|
|
|
| 0 | 479 |
|
55. | Performance Analysis of E-Governance Citizen-Centric Services Through E-Mitra in Rajasthan, | 2019 |
|
|
|
|
| 1 | 182 |
|
56. | Revisiting Mutation Testing in Cloud Environment (Prospects and Problems), | 2019 |
|
|
|
|
| 0 | 2011 | 0.162 |
57. | Designing optimal architecture of recurrent neural network (LSTM) with particle swarm optimization technique specifically for educational dataset, | 2019 | 10 |
|
|
|
| 2 | 163 | 0.000 |
58. | Cloud migration metamodel : Aaa framework for legacy to cloud migration, | 2019 | 0 |
|
|
| 0 | 50 | 0.000 | |
59. | Investigation of privacy-preserving data models and contributions, | 2019 | 0 |
|
|
| 0 | 783 | 0.000 | |
60. | Toward Adapting Metamodeling Approach for Legacy to Cloud Migration, | 2019 | 0 |
|
|
|
| 1 | 284 | 0.184 |
61. | Cloud migration metamodel : Aaa framework for legacy to cloud migration, | 2019 | 0 |
|
|
| 0 | 50 | 0.000 | |
62. | Investigation of privacy-preserving data models and contributions, | 2019 | 0 |
|
|
| 0 | 783 | 0.000 | |
63. | Toward Adapting Metamodeling Approach for Legacy to Cloud Migration, | 2019 | 0 |
|
|
|
| 1 | 284 | 0.184 |
64. | Study of Various Data Mining Techniques in Prediction of Depression, | 2018 |
|
|
|
|
|
|
|
|
65. | Design and Performance Evaluation of Hybrid Wired-Wireless Network on Chip Interconnect Architecture, | 2018 | 3 |
|
|
|
| 4 | 199 | 0.184 |
66. | Analysis of Load Balancing Algorithms Using Cloud Analyst, | 2018 | 2 | 0 |
|
|
| 2 | 298 | 0.184 |
67. | Impact of Open-Ended Project-Based Collaborative Learning Model for Teaching Undergraduate-Level Dat, | 2018 | 1 |
|
|
|
| 3 | 324 | 0.184 |
68. | Incessant Ridge Estimation Using RBCA Model, | 2018 | 1 |
|
|
|
| 0 | 210 | 0.184 |
69. | Software Quality Improvement Through Penetration Testing, | 2018 | 0 |
|
|
|
| 0 | 244 | 0.184 |
70. | Conceptual Structure of ASMAN Framework to Compare SaaS Providers, | 2018 | 0 | 0 |
|
|
| 0 | 467 | 0.184 |
71. | A Review on Machine Translation Systems in India, | 2018 | 0 |
|
|
|
| 0 | 30 | 0.184 |
72. | Impact of Try A-Gain - An Online Game App for Society, | 2018 | 0 |
|
|
|
| 0 | 218 | 0.184 |
73. | Improved Google Page Rank Algorithm, | 2018 | 0 |
|
|
|
| 1 | 540 | 0.184 |
74. | Empowering Rural Governance through ICT with Special Reference to Rural Rajasthan, | 2018 |
|
|
|
|
|
| 10 |
|
75. | Financial data mining: Appropriate selection of tools, techniques and algorithms, | 2018 | 1 |
|
|
|
| 1 | 251 | 0.160 |
76. | Criteria for Designing Cloud Migration Framework, | 2018 |
|
|
|
|
|
| 530 |
|
77. | Security Analysis of Vitrualization in Cloud Computing, | 2018 |
|
|
|
|
|
| 41 |
|
78. | A Specified Security Comparison for Various Encryption Techniques in Cloud Computing, | 2018 |
|
|
|
|
| 0 | - |
|
79. | A study on benefits and classification of load balancing in cloud computing environment, | 2018 |
|
|
|
|
| 1 | - |
|
80. | Financial data mining: Appropriate selection of tools, techniques and algorithms, | 2018 | 1 |
|
|
|
| 1 | 251 | 0.160 |
81. | Criteria for Designing Cloud Migration Framework, | 2018 |
|
|
|
|
|
| 530 |
|
82. | Security Analysis of Vitrualization in Cloud Computing, | 2018 |
|
|
|
|
|
| 41 |
|
A Specified Security Comparison for Various Encryption Techniques in Cloud Computing, | 2018 |
|
|
|
|
| 0 | - |
| |
A study on benefits and classification of load balancing in cloud computing environment, | 2018 |
|
|
|
|
| 1 | - |
| |
85. | User identification prerequisite for memorisation a type of personalisation, | 2017 | 0 |
|
|
|
| 0 | 298 | 0.130 |
86. | Improved VoIP QoS over Wireless Networks, | 2017 |
|
|
|
|
| 0 | 963 |
|
87. | Determining the Effect of Similar Queries in Cache-based Cloud Datastores, | 2017 |
|
|
|
|
| 0 | 910 |
|
88. | Determining Appropriate Cache-size for Cost-effective Cloud Database Queries, | 2017 |
|
|
|
|
| 2 | 34 |
|
89. | Modeling used for Software Product Line Engineering, | 2017 |
|
|
|
|
| 0 | 679 |
|
90. | Evaluating the Importance of Analyzability, Testability and Changeability Quality Attribute in Reference to Software Product Line Orthogonal Variability Model, | 2017 |
|
|
|
|
| 1 | 32 |
|
91. | From Monolith to Microservice Architecture, | 2017 |
|
|
|
|
|
| 24 |
|
92. | From Monolith to Microservice Architecture, | 2017 |
|
|
|
|
|
| 24 |
|
93. | Comparitive analysis of algorithms for identification of session on the basis of threshhold value, | 2016 | 0 |
|
|
| 1 | 3730 | 0.000 | |
94. | A Study of Out of School Children Problem in Rajasthan using K-means clustering with Genetic Algorithm, | 2016 |
|
|
|
|
| 0 | 16 |
|
95. | Enhancing the Query Performance of NoSQL Datastores using Caching Framework, | 2016 |
|
|
|
|
| 0 | 2336 |
|
96. | A comparative analysis of proactive, reactive and hybrid routing protocols over open source network simulator in Mobile ad hoc network, | 2016 | 9 | 15 | 3896 | 0.199 | ||||
97. | Analysis and Validation of MANET Performance on Open Source Simulator, | 2016 | 16 | |||||||
98. | Examining usability of classes in collaboration with SPL feature model, | 2016 | 1 |
|
|
|
| 1 | 37 | 0.184 |
99. | Empirical Evaluation of Metrics to Assess Software Product Line Feature Model Usability, | 2016 |
|
|
|
|
| 2 | 88 |
|
100. | Empirical Validation of Structural Metrics to Assess and Predict Usability of SPL Feature Model, | 2016 |
|
|
|
|
|
| 30 |
|
101. | Effect of analysis and design phase factors on testing of object oriented software, | 2016 | 0 |
|
|
| 0 | 3700 | 0.000 | |
102. | A review on quality models to analyse the impact of refactored code on maintainability with reference to software product line, | 2016 | 3 |
|
|
| 3 | 3708 | 0.000 | |
103. | Big data protection via neural and quantum cryptography, | 2016 | 3 |
|
|
| 3 | 3704 | 0.000 | |
104. | Effect of Different UMLDiagrams to Evaluate the Size Metric for Different Software Projects, | 2016 |
|
|
|
|
| 0 | 8 |
|
105. | To Retrospect the significant Inter-national parameters for Quality Assessment in Higher Education System In Indian Scenario, | 2016 |
|
|
|
|
|
| 67 |
|
106. | Theoretical study of decision tree algorithms to identify pivotal factors for performance improvement: A review, | 2016 |
|
|
|
|
| 6 | 25 |
|
107. | Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud, | 2016 |
|
|
|
|
| 1 | 16 |
|
108. | A Study on the Nature of Code Clone Occurrence Predominantly in Feature Oriented Programming and the Prospects of Refactoring, | 2016 |
|
|
|
|
| 0 | 44 |
|
109. | Analysis and Validation of MANET Performance on Open Source Simulator, | 2016 |
|
|
|
|
|
| 16 |
|
110. | Analysis and Validation of MANET Performance on Open Source Simulator, | 2016 |
|
|
|
|
|
| 16 |
|
111. | Biodiversity Data Discovery through Data Mining in Mountain areas, | 2015 |
|
|
|
|
| 0 | 53 |
|
112. | A Comparative Study of Mobile Application Testing Frameworks, | 2015 |
|
|
|
|
| 1 | 85 |
|
113. | Review of Query Processing Techniques of Cloud Databases, | 2015 |
|
|
|
|
| 4 | 16 |
|
114. | IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATION, | 2015 |
|
|
|
|
| 0 | 79 |
|
115. | Hybrids of Ant Colony Optimization Algorithm- A Versatile Tool, | 2015 |
|
|
|
|
|
| 381 |
|
116. | In Retrospect of UML based Software Size Metrics, | 2015 |
|
|
|
|
|
| 46 |
|
117. | A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool, | 2015 |
|
|
|
|
| 1 | 19 |
|
118. | The Role of MIS in Production Management, | 2015 |
|
|
|
|
|
| 19 |
|
119. | INFORMATION TECHNOLOGY A TOOL OF MANAGING HR, | 2015 |
|
|
|
|
|
| 115 |
|
120. | The Role of MIS in Production Management, | 2015 |
|
|
|
|
|
| 19 |
|
121. | INFORMATION TECHNOLOGY A TOOL OF MANAGING HR, | 2015 |
|
|
|
|
|
| 115 |
|
122. | Web Usage mining framework for Data Cleaning and IP address Identification, | 2014 |
|
|
|
|
| 6 | 43 |
|
123. | Personal Web Usage Mining: New Mining Approach to Mine Both Local and Remote Activities, | 2014 |
|
|
|
|
|
| 143 |
|
124. | Behavioral analysis of the playout buffer of VoIP based applications from client perspective, | 2014 | 1 |
|
|
| 4 | 284 | 0.000 | |
125. | Relevance of genetic algorithm strategies in query optimization in information retrieval, | 2014 |
|
|
|
|
| 12 | 5927 |
|
126. | Effective Information Architecture for Web based Systems, | 2014 |
|
|
|
|
| 2 | 757 |
|
127. | Transforming features into web pages in feature driven development methodology, | 2014 |
|
|
|
|
|
| 117 |
|
128. | Case Study on Classification of Glass using Neural Network Tool in MATLAB, | 2014 |
|
|
|
|
| 1 | 15 |
|
129. | Green banking : An Analysis on sustainable Path For Green Earth type, | 2014 |
|
|
|
|
|
| 20 | 0.194 |
Green banking : An Analysis on sustainable Path For Green Earth type, | 2014 |
|
|
|
|
|
| 20 | 0.194 | |
131. | Web usage mining: identification of trends followed by the user through neural network, | 2013 |
|
|
|
|
| 1 | 624 |
|
132. | Software Product Line Engineering: Paradigm for Product Family, | 2013 |
|
|
|
|
| 0 | 360 |
|
133. | Analyzing the Importance of Learnability and Understandability Quality Attributes in Reference to SPL Feature Models, | 2013 |
|
|
|
|
| 0 | 895 |
|
134. | VoIP Security Issues: The Grey Shades of Internet Telephony, | 2013 |
|
|
|
|
| 1 | 22 |
|
135. | New Set of Metrics for Accessing Usability in Feature Oriented Programming, | 2013 |
|
|
|
|
| 3 | 22 |
|
136. | Information portal system for a digital campus based on information architecture, | 2013 | 2 |
|
|
| 4 | 352 | 0.000 | |
137. | A Study on modeling Standards for Web Applications and Significance of AspectWebML, | 2013 |
|
|
|
|
| 3 | 2375 |
|
138. | A Study on modeling Standards for Web Applications and Significance of AspectWebML, | 2013 |
|
|
|
|
| 3 | 2375 |
|
139. | Recapitulation on transformations in neural network back propagation algorithm, | 2013 |
|
|
|
|
| 7 | 328 |
|
140. | Software Product Line Engineering: Paradigm for Product Family, | 2013 |
|
|
|
|
| 0 | 360 |
|
Software Testing through Evidence Gathering, | 2013 |
|
|
|
|
| 0 | 632 |
| |
142. | Review Security Issues of MVoIP in WiMAX Network, | 2012 |
|
|
|
|
| 0 | 6 |
|
143. | Review of data mining techniques in cloud computing database, | 2012 |
|
|
|
|
| 18 | 55 |
|
144. | Analyzing the effect of Playout Buffer Adjustment on Voice Quality for VoIP Based Social-Network Applications, | 2012 |
|
|
|
|
|
| 108 |
|
145. | Shadow Detection, Methods and its Evaluation, | 2012 |
|
|
|
|
| 0 | 1336 |
|
146. | Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction, | 2012 |
|
|
|
|
| 9 | 251 |
|
147. | Enhancement of Auto Teller Machine Security Using Pressurized/Safe Mode Login Pin2 Security Model, | 2012 |
|
|
|
|
| 0 | 206 |
|
148. | ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS, | 2012 |
|
|
|
|
| 19 | 40 |
|
149. | Different data encryption methods used in secure auto teller machine transactions, | 2012 |
|
|
|
|
| 8 | 176 |
|
150. | Role of Biometric Technology over advance security and protection in Auto Teller Machine Transaction, | 2012 |
|
|
|
|
| 9 | 251 |
|
151. | Enhancement of Auto Teller Machine Security Using Pressurized/Safe Mode Login Pin2 Security Model, | 2012 |
|
|
|
|
| 0 | 206 |
|
152. | ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS, | 2012 |
|
|
|
|
| 19 | 40 |
|
Different data encryption methods used in secure auto teller machine transactions, | 2012 |
|
|
|
|
| 8 | 176 |
| |
154. | Enhanced Playout Buffer Algorithm for VoIP based Social-Network Applications, | 2011 |
|
|
|
|
|
| 104 |
|
155. | Analysis of Open Source Mobile Testing, | 2011 |
|
|
|
|
| 0 | 5 |
|
156. | Vulnerability and security issues in Auto teller machine transactions, | 2011 |
|
|
|
|
| 1 | 6 |
|
Vulnerability and security issues in Auto teller machine transactions, | 2011 |
|
|
|
|
| 1 | 6 |
|
Books Published:
Name of Faculty | Name of Book Published | Year Of Publish | Book Details |
---|---|---|---|
Ms. Anubha Jain | Fundamentals of Computers | 2011 | R.B.D.Publications, Jaipur, (ISBN: 81-8142-366-6) |
Dr. Swati V. Chande | Course Module, Fundamentals of Computers | 2011 | Vardhaman Mahaveer Open University, Kota |
Ms. Priyanka Verma | Programming In Vb.Net | 2013 | R.B.D. Publications, Jaipur, (ISBN: 81-8142-366-6) |
Dr. Navneet Sharma | Office Automation Tools | 2014 | Parth Publication |
Dr. Navneet Sharma | Fundamentals of Computer | 2015 | Parth Publication |
Dr. Navneet Sharma Dr. RK Tailor | Operations And Information Technology | 2016 | RSBA Publishers, Japiur (ISBN: 978-81-7611-749-4) |
Dr. Navneet Sharma | Operating Systems | 2016 | Thakur Publications |
Dr. Geetika Vyas | Anu in Web Land: Web Designing through Conversation Theory | 2019 | Independently published on Amazon's Kindle Direct Publishing (KDP) |
Books Edited:
Year | First Editor | Name of the Book | Publisher | Status (International/ National/ State) | ISBN No. |
---|---|---|---|---|---|
2020 | Vijay Singh Rathore, Dr. Nilanjan Dey, Dr. Vincenzo Piuri, Prof. Dr. Rosalina Babo, Dr. Zdzislaw Polkowski, Prof. Joao Manuel R. S. Tavares | Expert Applications and Solutions. Proceedings of FICRTEAS 2020 | "Springer; 1st ed. 2021 edition (22 September 2020) Advances in Intelligent Systems and Computing Series; Springer Singapore" | International | ISBN-10: 9811560137 ISBN-13: 978-9811560132 |
YEAR 2009-10
CATEGORY OF PUBLICATION | NUMBER |
---|---|
01 | |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2010-11
CATEGORY OF PUBLICATION | NUMBER |
---|---|
02 | |
04 | |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2011-12
CATEGORY OF PUBLICATION | NUMBER |
---|---|
09 | |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2012- 2013
CATEGORY OF PUBLICATION | NUMBER |
---|---|
15 | |
National journal | 00 |
Proceedings/ Magazine Article/ Chapter in Book | 00 |
Abstracts | 00 |
YEAR 2013-14
CATEGORY OF PUBLICATION | NUMBER |
---|---|
14 | |
01 | |
Proceedings/ Magazine Article/ Chapter in Book | - |
Abstracts | - |
YEAR 2014-15
CATEGORY OF PUBLICATION | NUMBER |
---|---|
8 | |
- | |
Proceedings/ Magazine Article/ Chapter in Book | 4 |
Abstracts | - |
YEAR 2015-16
CATEGORY OF PUBLICATION | NUMBER |
---|---|
9 | |
National journal | 2 |
Proceedings/ Magazine Article/ Chapter in Book | 1 |
Abstracts | - |
YEAR 2016-17
CATEGORY OF PUBLICATION | NUMBER |
---|---|
9 | |
National journal | - |
Proceedings/ Magazine Article/ Chapter in Book | 5 |
Abstracts | - |
YEAR 2017-18
CATEGORY OF PUBLICATION | Number |
---|---|
International journal | 9 |
National journal | 1 |
Proceedings/ Magazine Article/ Chapter in Book | 2 |
Abstracts | - |
YEAR 2018-19
CATEGORY OF PUBLICATION | Number |
International journal | 8 |
National journal | 0 |
Proceedings/ Magazine Article/ Chapter in Book | 1 |
Abstracts | 1 |
YEAR 2019-20
CATEGORY OF PUBLICATION | Number |
International journal | 21 |
National journal | 0 |
Proceedings/ Magazine Article/ Chapter in Book | 4 |
Abstracts | 0 |