Research And Development



  • Software Engineering & Cloud Computing

  • Computer Architecture, Communication & Computer Network

  • Artificial Intelligence and it's applications

  • Interdisciplinary Research
Sr No Enrollment Names Mode Research Toic Supervisor Year Of Joinning Status Co-Supervisor
1 1801008 Gargie Bhatt Part Time Design and development of a recommender system for precision agriculture Dr. Manish Madhav Tripathi, Integral University, L 2018 Pursuing
2 1801034 MD Ashif Habibi Part Time Use of soft computing technique for patient management in Intelligent healthcare systems Dr. Faiyaz Ahmad, Integral University, Lucknow 2018 Pursuing
3 1801052 Sunil Singh Part Time Improving security and latency for efficient cloud data management Dr. Shish Ahmad,Integral University, Lucknow 2018 Pursuing
4 1801069 Wasim Khan Part Time Design and development of framework for anomaly detection in online social networks Dr. Mohd. Haroon, Integral University, Lucknow 2018 Pursuing
5 1701034 Shashi Kant Gupta Part Time A Cluster Based Approach for Auto-Scalable IaaS Provisioning in Geographically Distributed Data Centers Dr. M. Akheela Khanum, Integral University, Luckn 2017 Pursuing
6 1701035 Shahin Fatima Part Time Key Management in Cloud Computing Using Secret Sharing Schemes Dr. Shish Ahmad, Integral University, Lucknow 2017 Pursuing
7 1701062 Ashish Kumar Pandey Part Time Design and Evaluation of a Novel Communication Protocol to Improve Energy Efficiency in Cloud Environment Dr. Shish Ahmad, Integral University, Lucknow 2017 Pursuing
8 1502073 Mohd Akbar Part Time service mechanism to reduce query latency in iVANET: An approach to improve QoS Dr Shish Ahmad, Integral University, Lucknow 2015 Pursuing
9 1502040 Manmohan Singh Yadav Part Time Outlier detection in Wireless Sensor Networks using Data Entropy Dr Shish Ahmad, Integral University, Lucknow 2015 Pursuing
10 1401036 Anwar Ahmad Shaikh Part Time conceptual framework for fault tolerance in cloud computing Dr. M. Akheela Khanum, Integral University, Luckno 2014 Pursuing
11 12056 Mr. Mohammad Suaib Part Time Personlized ranking for search enmgines based on web usage analysis Dr. M. Akheela Khanum, Integral University, Luckno 2012 Pursuing
Sr No Enrollment Registration Year Of Joinning Research Toic Supervisor Co-Supervisor Year of Awarded File Url
1 1502007 Mohd. Amir Siddiqui 2015 Design and implementation of security to increase privacy and authenticity for cloud computing Dr. M.Akheela Khanum, Integral University, Lucknow 2019 View
2 1401037 Mohammad Zunnun Khan 2014 A Perspective Framework for the Industry Personnel for Integrating Testability with in the Requirement Elicitation Process Dr. M.Akheela Khanum, Integral University, Lucknow Prof(Dr.) M. H. Khan, IET,Lucknow 2018 View
3 12058 Mr. Jameel Ahmad 2012 A Cost Effective Framework for Performance Enhancement of Adaptive Wormhole Routing Technique in directly connected multicomputer systems Dr. M. Akheela Khanum, Integral University, Luckno 2018 View
4 1401029 Mohammad Arif 2014 ACO based routing for VANETS using real time traffic information Dr Shish Ahmad, Integral University, Lucknow 2018 View
5 12057 Shahid Hussain 2012 An Approach towards Ambiguity Resolution in Software Requirements Specifications Dr. M.Akheela Khanum 2017 View
6 Mohammad Kamran 2008 Study of Mining Association Rules in Large Databases Prof. Qamar Abbas, Integral University, Lucknow 2017 View
7 09043 Shish Ahmad 2009 Energy Efficient Public Key Framework in Adhoc Sensor Network Prof. (Dr.) Md. Rizwan Beg, Integral University, L 2014 View
8 08022 Ravi Prakash Verma 2008 Generation of test cases from requirements Prof. (Dr.) Md. Rizwan Beg,Integral University, Lu 2014 View
9 08024 Sandesh Tripathi 2008 Designing a model for composition, performance analysis & simulation of web services Prof. Qamar Abbas, Integral University, Lucknow 2014 View
  • Conference

    Sr No Author Name Title Conference Name Held At From Date To Date Organizer Name Publication Link
    1 Mohammad Zunnun Khan; Mohd Suhaib Kidwai; Faiyaz Ahamad; Mohd. Usman Khan Hadoop based EMH framework: A Big Data approach 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACI Galgotias College of Engineering and Technology, Greater Noida, India 04/03/2021 05/03/2021 IEEE View
    2 Nishat Bano, Monauwer Alam and Shish Ahmad Energy efficient image compression techniques in WSN International conference on Intelligent communication, control and devices Dehradun 04/12/2018 04/12/2018 Department of Electronics and Instrumentation Engineering, University of Petroleum & Energy Studies, View
    3 Md Zeeshan Ahmad, Sonali Yadav, Mohd Shahid Hussain Application of artificial intelligence in fighting against cyber crimes: A REVIEW "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    4 Halima Sadia, Mohd. Faisal, Dr. Syed Qamar Abbas, Nudrat Fatima VOLATILE REQUIREMENT IDENTIFICATION: AN IMPLEMENTATION OF PERSPECTIVE BASED INSPECTION TECHNIQUES "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    5 NikhatAzhar, Mohammad Suaib Review of Different approaches and Analysis of Big Data Security Issues "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    6 BassamFarooq, Mohammad Suaib Crawling of Japanese Real-Estate Websites Using scrapy "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    7 Shahin Fatima, Shish Ahmad, Shadab Siddiqui Security issues in cloud computing :a survey """International Conference on Advancement in Computer engineering and Information Technology (ACEIT Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    8 Sowmya M.C., Shish Ahmad Congestion avoidance and control mechanisms for manet using aodv protocol: a survey """International Conference on Advancement in Computer engineering and Information Technology (ACEIT Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    9 Anwar Ahamed Shaikh, Shish Ahmad Fault tolerance management for cloud environment: a critical review """International Conference on Advancement in Computer engineering and Information Technology (ACEIT Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    10 Sana Zeba, Shish Ahmad Detection and verification of malicious node in black hole attack using DSA """International Conference on Advancement in Computer engineering and Information Technology (ACEIT Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    11 Sheeba Praveen, Prof. (Dr) Devendra Agarwal, Ankita Srivastava Literature Survey on Object Oriented Function Point: A Reusability Metrics "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    12 Sheeba Praveen, Prof. (Dr) Devendra Agarwal, Ankita Srivastava Literature Survey on Object Oriented Function Point: A Reusability Metrics "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 04/07/2018 04/06/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    13 Nishat Bano, Monauwer Alam and Shish Ahmad Performance Evaluation of Wavelet Based Image Compression Techniques International conference on Intelligent communication, control and devices Dehradun 16/04/2018 15/04/2018 Department of Electronics and Instrumentation Engineering, University of Petroleum & Energy Studies, View
    14 Mohd. Arif, Shish Ahmad Security Issues in Vehicular Adhoc Network: A critical Survey International conference on Intelligent communication, control and devices Dehradun 16/04/2018 15/04/2018 Department of Electronics and Instrumentation Engineering, University of Petroleum & Energy Studies, View
    15 Alfia Mahmood, Mohammad Arif G-SLAM: Optimizing Energy Efficiency in Clouds ACEIT 2018 Integral University 07/04/2018 06/04/2018 Integral University View
    16 Arti Singh, Mohammad Arif Analysis of DDOS attack Detection and Prevention in Cloud Environment: A Review ACEIT 2018 Integral University 07/04/2018 06/04/2018 Integral University View
    17 Shahin Fatima, Shish Ahmad, Shadab Siddiqui Security issues in cloud computing :a survey International Conference on Advancement in Computer engineering and Information Technology (ACEIT-18 Integral University, Lucknow, India 06/04/2018 04/07/2018 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    18 Faiyaz Ahamad, Mohd. Talha Comparison Membership Function of Adaptive Neuro Fuzzy Inference System to fuzzy and Neural network inference system ETIITC-18 Maulana azad national urdu university Hyderabad school of computer science and information technolog 18/03/2018 17/03/2018 Maulana azad national urdu university Hyderabad school of computer science and information technolog View
    19 Sheeba Praveen, Sumaiya Fauziyab Preventive Measures for Security Threat in Big Data Environment "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 03/12/2016 03/12/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    20 Nudrat Fatima* 1 , Saba Khalid*2 , Halima Sadia*3 An Indiscriminate Semantic Similarity Search Using Latent Semantic Indexing in Data Mining "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 03/12/2016 03/12/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    21 "Ankita Srivastava , Sonali Yadav , Niharika Srivastava , Zaina Khan" Fuzzy Query: An Impression in Query processing "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 03/12/2016 03/12/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    22 Pratibha Tripathi, Shish Ahmad Energy Efficient Congestion Control mechanism in MANET "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    23 Mohita Dixit1, Shish Ahmad2, Mohd. Arif3 Energy Efficient Routing Algorithm in MANET Using Optimized Euler Digraph "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    24 Shriom Maurya1, Dr. Shish Ahmad2, Mohd Haroon3 Optimization and Performance Analysis of AODV Routing Protocol in MANETUsing AI "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    25 Vipin Dwivedi1, Shish Ahmad2 Detection and Prevention Methods of Block Hole & Gray Hole Attacks in MANET - A Critical Survey "International Conference on Advancement in Computer engineering and Information Technology (ACEIT-1 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    26 Anurag Srivastava, Kavita Agarwal, Md. Shahid Bayesian Equalizers Literature Survey with Analytical Comparison ACEIT-16 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    27 Anurag Srivastava, Kavita Agarwal, Md. Shahid Hussain Bayesian Equalizers for Inter symbol and Co-channel Interference using Mamdani fuzzy system ACEIT-16 Integral University, Lucknow, India 12/03/2016 12/03/2016 Department of Computer Science & Engineeing, Integral University, Lucknow, India View
    28 Salma Taranum, Mohammad Arif, Shish Ahmad Software Effort Estimation using Fuzzy Approach ACEIT 2016 Integral University 12/03/2016 12/03/2016 Integral University View
    29 Satyendra Kr. Srivastav, Mohammad Arif, Bably Dolly Key Management in Hierarchical MANET Using Kerberos ACEIT 2016 Integral University 12/03/2016 12/03/2016 Integral University View
    30 Rudrendra Bahudar Singh, Mohammad Arif , Manish Madhav Tripathi Software Elicitation Technique ACEIT 2016 Integral University 12/03/2016 12/03/2016 Integral University View
    31 Harendra Singh Kharkwal, Mohammad Arif, Abu Daud Mohd Fayak, Afsaruddin Khan A Survey on Object-Oriented Software Testing”. ACEIT 2016 Integral University 12/03/2016 12/03/2016 Integral University View
    32 Mohita Dixit, Shish Ahmad, Mohammad Arif Energy Efficient Routing Algorithm in MANET Using Optimized Euler Digraph ACEIT 2016 Integral University 12/03/2016 12/03/2016 Integral University View
  • Journal

    Sr No Author Name Title Journal Name Volume No Issue No Page No Year Of Publication Indexing Impact Factor Name Url
    1 Ashish Kumar Pandey, Dr. Shish Ahmad Performance Evaluation of Interconnection Structures for Data Centers International Journal of Advanced Science and Technology 29 3 4005-4016 2020 Scopus SJR View
    2 manmohan singh yadav, Shish Ahamad Automated detection of outlier in WSN by entropy features based machine learning methods Indonesian Journal of Electrical Engineering and Computer Science 20 3 ... 2020 Scopus SJR View
    3 Faiyaz Ahmed, Obaidullah Analysis Of Behavior Extraction On Social Life Issues Using Tweets By Deep Learning Technique ”International journal of scientific & Technology research 8 8 ... 2019 Not Index In Scopus / UGC Care ... View
    4 mohammad haroon A Novel Method forLoad Balancing In Cloud Computing: Round Robin with Floyd-Warshall Algorithm International Journal of | Science and Research (IJSR)? 6 3 ... 2019 Scopus ... View
    5 mohammad haroon Dynamic Load balancing by Round Robin andWarshall Algorithm in Cloud Computing International Journal of Innovative Technology and Exploring Engineering (IJITEE) 6 3 ... 2019 Scopus GLOBAL IMPACT View
    6 mohammad haroon Deep Learning Based Question Answering System: A Review International Journal of Scientific Development and Research - IJSDR 4 7 ... 2019 Ugc Care List jcc View
    7 Noorishta Hashmi & M.Akheela Khanum Preventing Road Accidents by Analysing Speed, Driving Pattern and Drowsiness Using Deep Learning International Journal of Computational Engineering Research (IJCER) 9 7 ... 2019 Not Index In Scopus / UGC Care IF View
    8 Noorishta Hashmi & M.Akheela Khanum Intelligent Road Accidents Avoidance: A Review International Journal of Computational Engineering Research (IJCER) 9 6 ... 2019 Not Index In Scopus / UGC Care IF View
    9 Manmohan Singh Yadav, Shish Ahamad Outlier Detection in Wireless Sensor Networks Data by Entropy Based K-NN Predictor International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 12 5483-5489 2019 Scopus Value of Citation (VoC) View
    10 Shabeen Akhtar, Halima Sadia Designing a Cloud Analytics Service Framework for Mobile Advertisement and Marketing: A Review Journal of Android and IOS Applications and Testing 4 1 10-18 2019 Not Index In Scopus / UGC Care NA View
    11 Shaheen Fatima, Shish Ahad Secure and Effective Key management using secret sharing scheme in cloud computing International Journal of e-Collaboration (IJeC) 16 1 1-15 2019 Web of Science SJR View
    12 Shaheen Fatima, Shish Ahad An Exhaustive Review on Security Issues in Cloud Computing KSII Transactions on Internet and Information Systems 13 6 3219-3237 2019 Web of Science JCR View
    13 Aaftab Alam, Shish Ahmad Extending Network life time by energy efficient data aggregation in WSN International Journal of Research in Advent Technology 7 5 250-255 2019 Ugc Care List Google Scholar h-index View
    14 Farah Jamal, Kavita Agrawal Analysis of user’s behavioral pattern using sentiment analysis : A survey International journal of science and research 8 4 843-847 2019 Not Index In Scopus / UGC Care ... View
    15 Farah Jamal, Kavita Agrawal Analysis of user’s behavioral pattern for various brands using machine learning International journal of research in advent technology 7 5 564-566 2019 Not Index In Scopus / UGC Care ... View
    16 Halima Sadia, Dr. Syed Qamar Abbas, Mohammad Faisal Volatile Requirement Prioritization: A Fuzzy Based Approach International Journal of Engineering and Advanced Technology (IJEAT) 8 5 2467-2472 2019 Scopus B-Impact Factor View
    17 MOHD AKBAR, Dr. SHISH AHMAD Fructifying the Network Performance of iVANET thru a Rectified Associative Service Mechanism: an Alg International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 11 4291-4297 2019 Scopus B-Impact Factor View
    18 Shabeen Akhtar, Halima Sadia Designing a Cloud Analytics Service Framework for Mobile Advertisement and Marketing JASC: Journal of Applied Science and Computations 6 6 1011-1017 2019 Ugc Care List NA View
    19 Mohammad Zunnun Khan, Mohd Shoaib Healthcare Analytics in the Modern Era: A Survey International Journal of Research in Advent Technology 7 3 132-134 2019 Ugc Care List NA View
    20 Mariyam Fatima, Jameel Ahmad, Shish Ahmad Detection And Prevention Of Distributed Denial Of Service Attack Using Choke Packet International Journal Of Scientific & Technology Research 8 8 781-786 2019 Scopus SJIF View
    21 Ajay Kumar Maurya, Shish Ahmad IOT Based Model For Smart Monitoring Of Network Related Infrastructure Using Integrated Iot Platform International Journal Of Scientific & Technology Research 8 8 1764-1769 2019 Scopus SJIF View
    22 Faiyaz Ahmed, Obaidullah Analysis Of Behavior Extraction On Social Life Issues Using Sentiment Analysis:A Review ”International journal of research in Advent technology 7 6 ... 2019 Not Index In Scopus / UGC Care ... View
    23 Manish Madhava Tripathi, Aas Mohd Audio Analysis and Classification: A Review International Journal of Research in Advent Technology 7 6 103-109 2019 Scopus Global Impact View
    24 Sheeba Praveen OOFFMM: A Size Estimation Model for Real Time Application International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 11 1232-1239. 2019 Scopus ... View
    25 Mohd Amir Siddiqui & M. AKheela Khanum Implementation of Security Algorithm for Data Security in Cloud Computing International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 5 ... 2019 Scopus Volume of citation (VoC) View
    26 Faiyaz Ahmed, Nabila kazmi ” Multimodal Biometrics - Accurate Identification System Journal of emerging technology and Innovative research 6 6 ... 2019 Not Index In Scopus / UGC Care ... View
    27 Joyti Singh, Mohammad Zunnun Khan DETECTION OF FAKE PROFILE IN SOCIAL MEDIA Journal of Emerging Technologies and Innovative Research 6 6 38-42 2019 Ugc Care List Google Scholar h-index View
    28 Halima Sadia, Dr. Syed Qamar Abbas, Mohammad Faisal A Systematic Literature Review Of Multi-Criteria Risk Factors (VUCA) In Requirement Engineering International Journal of Scientific & Technology Research 8 11 13-20 2019 Scopus B-Impact Factor View
    29 Jameel Ahmad, M.Akheela Khanum, & A.A.Zilli A Comparative Study of Deadlock Recovery Schemes in Wormhole Routed Networks International Journal of Engineering Research and Technology 7 7 ... 2018 Not Index In Scopus / UGC Care IF View
    30 Manish Madhava Tripathi, Salman A Literature Review on Ethical Analysis of Big Data Sharing International Journal of Latest Trends in Engineering and Technology 10 3 35-39 2018 Not Index In Scopus / UGC Care GLOBAL IMPACT View
    31 Faiyaz Ahmed, Mohd Kamran Khan Literature Review on Software Compexity, Software Usbaility and Software Deliverability ” International Journal of advanced Research in Computer Science 9 2 ... 2018 Not Index In Scopus / UGC Care ... View
    32 Nikhat Azhar , Mohammad Suaib and Faiyaz Ahamad Review of Different Approaches and Analysis of Big Data Security Issues IJEMR ... ... 21-25 2018 Not Index In Scopus / UGC Care ... View
    33 AH Siddique, P Suman, K Agarwal "Traffic Sign Detection and Recognition Using Digital Image Processing" International Journal of Advanced Research in Computer Science 9 2 204-207 2018 Not Index In Scopus / UGC Care ... View
    34 R Mishra, K Agrawal, P Suman "HARDWARE TROJANS IN IOT DEVICES : A SURVEY" International Journal of Advanced Research in Computer Science 9 9 68-70 2018 Not Index In Scopus / UGC Care ... View
    35 MrAfsaruddim, Zulfikar Ali Different Data Analysis Technique Used in BIg Data International Journal of Engineering and Management Research (IJEMR) NA special issue 12-16 2018 Not Index In Scopus / UGC Care NA View
    36 shaireen khanDr.Shashank Singh Cloud Computing: Security Issues and Security Standards International Journal of Engineering and Management Research (IJEMR) 6 NA 31-36 2018 Ugc Care List NA View
    37 Sheeba Praveen,Ankita srivastava Literature Survey on Object Oriented Function Point: A Reusability Metrics” INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER SCIENCE (IJARCS 18) 9 2 152-156 2018 Not Index In Scopus / UGC Care ... View
    38 Furkan Ahmad, M.Akheela Khanum Review Based Recommender System for Business Advantage Using Natural Language Processing International Journal of Current Advanced Research 7 5 ... 2018 Not Index In Scopus / UGC Care IF View
    39 Ajay Kumar Maurya, Dr. Jameel Ahmad IOT Based Comprehensive Monitoring of Network and Infrastructure International Journal of Advanced Research in Computer Science 9 2 281-284 2018 Not Index In Scopus / UGC Care IF View
    40 Sahiba Raza, Dr. Jameel Ahmad Study of Diverse Models of Deadlock Detection in Distributed Environment International Journal of Technical Research and Applications 6 1 56-59 2018 Not Index In Scopus / UGC Care IF View
    41 Manish Madhava Tripathi, Mohd Husain Development Of Encryption And Decryption Technique To Secure The Confidential Data International Journal of Advanced Research in Computer Science 9 2 60-63 2018 Not Index In Scopus / UGC Care JCC View
    42 Manish Madhava Tripathi, Faizan Approaches Of Big Data In Healthcare: A Critical Review” International Journal of Advanced Research in Computer Science 9 2 1-7 2018 Not Index In Scopus / UGC Care jcc View
    43 Sheeba Praveen A Systematic Literature Review of Software Development Project Size Estimation Metric: OOFF Journal of Applied Science and Computations (JASC 18) 5 10 ... 2018 Ugc Care List ... View
    44 K C MAURYA MO. SAMEER Identify Protein Folding and Unfolding Structure International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) ... Vol 4, Issue 12 37-42 2017 Not Index In Scopus / UGC Care ... View
    45 Manish Madhava Tripathi, Saif HMM BASED OFFLINE SIGNATURE FORGERY DETECTION. International Journal of Engineering Technology and Computer Research (IJETCR), 3 2 41-47 2017 Not Index In Scopus / UGC Care Global View
    46 mohammad haroon A FRAMEWORK FOR TASK SCHEDULING IN DISTRIBUTED SYSTEM International Journal of Computer Science and Engineering (IJCSE) 6 3 ... 2017 Scopus JCC View
    47 Uzma Jafri, Dr. Jameel Ahmad PSO Based Optimized Software Testing Technique International Journal of Research and Development in Applied Science and Engineering 13 2 283-288 2017 Not Index In Scopus / UGC Care IF View
    48 Salma Tarannum, Dr. Jameel Ahmad Opinion Mining With Spam Detection Using Real Time Dats on Cloud International Journal of Scientific & Engineering Research 8 4 1240-1244 2017 Not Index In Scopus / UGC Care IF View
    49 Faiyaz Ahamad, Diwan Arshad Khan “Service Discovery Mechanism for Mesh Network International Journal of Scientific & Engineering Research 8 5 ... 2017 Not Index In Scopus / UGC Care ... View
    50 Mohammad Zunnun Khan, M Akheela Khanam, M H Khan Requirement Modifiability Quantification Model of Object Oriented Software Global Journal of Pure and Applied Mathematics 13 3 36-41 2017 Ugc Care List SJR View
    51 Mohammad Zunnun Khan, M Akheela Khanam, M H Khan Requirement Based Testability Estimation Model of Object Oriented Software Oriental Journal of Computer Science and Technology 10 4 793-801 2017 Ugc Care List NA View
    52 Mohammad Zunnun Khan, M Akheela Khanam, M H Khan REQUIREMENT UNDERSTANDABILITY QUANTIFICATION MODEL OF OBJECT ORIENTED SOFTWARE "International Journal of Advanced Research in Computer Science " 8 7 298-302 2017 Ugc Care List NA View
    53 Faiyaz Ahamad Comparison of Membership Function in Adaptive Neuro Fuzzy Inference System for Prediction of Respira International Journal of Scientific & Engineering Research 8 5 ... 2017 Not Index In Scopus / UGC Care ... View
    54 Manish Madhava Tripathi Identification Of Digital Image Using Protein Folding And Unfolding Structure Journal Of Advances And Scholarly Researches In Allied Education 7 1 22-27 2017 Ugc Care List JCC View
    55 Mohammad Faisal, Dr.Md.Rizwan Begb, Halima Sadia STABLE REQUIREMENT SPECIFICATION FRAMEWORK: REQUIREMENT VOLATILITY PERSPECTIVE International Journal of Scientific & Engineering Research 7 10 1342-1347 2016 Ugc Care List Impact Factor View
    56 S. M. Zakariya , Aftab Yaseen ANALYSIS OF FACE RECOGNITION USING MULTI-ALGORITHMIC CONCEPTS International Journal of Advance Research In Science And Engineerin 5 2 236-247 2016 Not Index In Scopus / UGC Care ... View
    57 Anwar Ahmad Sheik , Afsaruddi , Ijtaba Saleem Khan Buffer Overflow : Anomaly in Application Security ACEIT Conference Proceeding 2016- Anwar bhai ye paper conference ka hai ... ... ... 2016 Not Index In Scopus / UGC Care ... View
    58 Nishat Bano, Monauwer Alam, Shish Ahmad Energy-Efficient Low Memory Listless SPIHT coder for Wireless Multimedia Sensor Networks Advances in Wireless and Mobile Communications (AWMC) 10 5 89-94 2016 Not Index In Scopus / UGC Care NA View
    59 Dr.Shashank Singh,Dr Pankaj kumar Challenges and Prospects of Wireless Network in 4G IJCA newyork 133 NA 11-14 2016 Ugc Care List NA View
    60 Anwar Ahamed Shaikh,Anurag Srivastava Buffer overflow:Anomaly in Application security International Journal of computer science and information Technologies 1 4 ... 2016 Not Index In Scopus / UGC Care ... View
    61 Mohammad Zunnun Khan, M Akheela Khanam, M H Khan Software Testability in Requirement Phase: A Review International Journal of Advanced Research in Computer and Communication Engineering 5 4 1031-1035 2016 Not Index In Scopus / UGC Care NA View
    62 shashank Singh,Dr Pankaj kumar A Methodology for 4G Mobile Networks Using Vertical Handoff Approach IJSRD NA 4 651-654 2016 Ugc Care List NA View
    63 "mohammad haroon " Decentralized load balancing in hetrogenious distributed system using tranning based approach International Journal of Computer Science and Engineering (IJCSE) 5 16 ... 2016 Scopus JCC View
    64 Mohd. Arif, Shish Ahmad A Survey on VANET Unicast Routing Protocols International Journal of Engineering and Management Research (IJEMR) 6 1 89-94 2016 Not Index In Scopus / UGC Care NA View
    65 Manish Madhava Tripathi AN EFFECTIVE WATERMARKING SCHEME FOR 3D MEDICAL IMAGES International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) 6 1 ... 2016 Not Index In Scopus / UGC Care jcc View
    66 "mohammad haroon " dynamic load balancing in distributed system by AI agent International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) 6 1 ... 2016 Scopus jcc View
    67 Manish Madhava Tripathi Enhanced Reversible Watermarking of Medical Images in Lossy Environment International Journal of Computer Science and Engineering (IJCSE) 5 1 ... 2016 Not Index In Scopus / UGC Care JCC View
    68 "mohammad haroon " Adjacent Selection Method for Load Balancing in Distributed Network by Artificial Intelligence International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineerin 4 8 ... 2015 Not Index In Scopus / UGC Care ... View
    69 Zaina Khan, Shish Ahmad, Shimaila3 ‘Development and Analysis of High Data rate quality based secured AODV-RC4 and AODV-RSA in WSN International Journal of Scientific research and development NA NA 344-347 2015 Not Index In Scopus / UGC Care NA View
    70 Faiyaz Ahamad, Afsaruddin Khan Service Mechanism for Reusability Framework for Software and it’s Challenges: Literature review International Advanced Research Journal in Science, Engineering and Technology 2 1 ... 2015 Not Index In Scopus / UGC Care ... View
    71 Shaheen Fatima, Shish Ahmad Comparative Study of Flipkart.com, Snap deal, E-bay: India’s Leading E-business Portals International Research Journal of Engineering and Technology 2 8 883-887 2015 Ugc Care List N.A View
    72 Ashish Kumar Pandey, Kavita Agrawal, Mohd. Haroon A Hybrid approach for enriching image using Mamdani neuro-fuzzy technique and its comparative analys IJCA 121 19 9-16 2015 Not Index In Scopus / UGC Care ... View
    73 Ayesha Saad Khan, Mohammad Suaib Extreme Programming: Aiming towards Quality Assurance International Journal of Engineering and Innovative Technology (IJEIT) 5 4 73-77 2015 Not Index In Scopus / UGC Care ... View
    74 Manish Madhava Tripathi, Repu Daman Encryption Tools for Secured Health Data in Public Cloud International Journal of Innovative Science, Engineering & Technology, 2 11 843-848 2015 Not Index In Scopus / UGC Care JCC View
    75 Sheikh Fahad Ahmad Ravindra Kumar, Mohd Suaib Improving Performance of Complex Dynamic Websites Using ORM , Entity Framework , SQL Server and MVC IJISET - International Journal of Innovative Science, Engineering & Technology 2 11 852-856 2015 Not Index In Scopus / UGC Care ... View
    76 "mohammad haroon " "A Hybrid Approach for Enriching Image using Mamdani Neuro - Fuzzy Technique and its Comparative An international journal of computer applications 121 19 ... 2015 Ugc Care List global impact View
    77 mohammad haroon "Appearance Determined Interest Attentive Load BalancingAlgorithm" "International Journal of Engineering Technology, Management and Applied Sciences" Volume 2 Issue 7 ... 2014 Ugc Care List JCR View
    78 Mizbah Fatima, Sheikh Fahad Ahmad, Mustafa Hasan Fuzzy based software cost estimation methods: a comparative study IJIRST-International Journal for Innovative Research in Science & Technology 1 7 ... 2014 Not Index In Scopus / UGC Care ... View
    79 Shaheen Fatima, Shish Ahmad Certificate Based Security Services in Adhoc Sensor Network International Journal of Information Technology 6 2 783-790 2014 Ugc Care List Google Scholar h-index View
    80 Sheeba Praveen An Approach to Evaluate Subjective Questions for Online Examination System International Journal of Innovative Research in Computer and Communication Engineering 2 11 6410-6413 2014 Not Index In Scopus / UGC Care NA View
    81 Shivam Singh, Kavita Agrawal , Jameel Ahmad An overview of Fuzzy Object-oriented Database JECET 3 2 808-813 2014 Not Index In Scopus / UGC Care ... View
    82 Shabeeha Khatoon, Kavita Agrawal Case based reasoning system for diagnosis of neuropsychiatric abnormality IJCER 4 6 27-34 2014 Not Index In Scopus / UGC Care ... View
    83 Shivam Singh, Kavita Agrawal Mapping of conceptual fuzzy object oriented data model into logical schema IJAET 4 2 164-169 2014 Not Index In Scopus / UGC Care ... View
    84 Shivam Singh, Kavita Agrawal Conceptual modeling in fuzzy object oriented databases using unified modeling language IJLRST 3 3 174-178 2014 Not Index In Scopus / UGC Care ... View
    85 Shabeeha Khatoon, Kavita Agrawal, R.P.Verma An expert system for diagnosis of neuropsychiatric disease IJATES 2 8 508-516 2014 Not Index In Scopus / UGC Care ... View
    86 Geeta Laxmi, Kavita Agrawal Maintainability measurement model of object oriented design. IJARCSSE 4 11 55-69 2014 Not Index In Scopus / UGC Care ... View
    87 Halima Sadia, Md Rizwan Beg, Halima Sadia Requirement Risk Identification: A Practitioner’s Approach International Journal of Computer Applications 102 15 13-15 2014 Not Index In Scopus / UGC Care ... View
    88 mohammad haroon Security in Cloud by Diffie Hellman Protocol "International Journal of Engineering and Innovative Technology(IJEIT)" Volume 4, Issue 5 ... 2014 Ugc Care List Global Impact Factor View
    89 Md Faisal, Md Rizwan Beg, Halima Sadia An Efficient Approach for Requirement Volatility Identification International Journal of Computer Applications 101 15 42-45 2014 Not Index In Scopus / UGC Care ... View
    90 Faiyaz Ahamad, Prof.(Dr.) Mohd. Rizwan Beg, Dr.Rishi Asthana The Service Discovery Mechanism For Data Compression To Natural Language Processing: A Review International Journal of Information and Computation Technology (IJICT) 3 5 ... 2013 Not Index In Scopus / UGC Care ... View
    91 Syed Umar Amin, Kavita Agrawal, Dr. Rizwan Beg Data mining in clinical decision support systems for diagnosis, prediction and treatment of heart di IJARCET ... ... ... 2013 Not Index In Scopus / UGC Care ... View
    92 Naveen Singh, Kavita Agrawal Software Testing using Evolutionary Approach International Journal of Scientific and Research 3 6 ... 2013 Not Index In Scopus / UGC Care ... View
    93 Sheeba Praveen Object-Oriented Full Function Point Analysis: An Empirical Validation International Journal Of Computational Engineering Research 2 8 256-262 2012 Not Index In Scopus / UGC Care NA View
  • Book Chapter

    Sr No Name of Authors Choose appropriate option Title of Book ISBN Number Publisher Name Year of Publication
    1 Mohammad Zunnun Khan, Mohd Shahid Husain Book Edited Critical Concepts, Standards, and Techniques in Cyber Forensics 9781799815594 IGI,USA 2020
    2 Haleema Sadia Book Published Requirement Risk Management : A Practitioner's Approach 978-3-659-15494-2 LAP LAMBERT Academic Publishing 2014