Faculty Details

Faculty Details


Achievements

Title Descriptioin Date View
A Comparative Performance Evaluation of Machine Learning-Based NIDS on Benchmark Datasets International... 01-04-2014 View Details
Separable Reversible Data Hiding Technique Based on RGB-LSB Method International... 01-10-2013 View Details
Steganography Based on LSB Insertion Technique International... 01-10-2013 View Details
A Survey on Separable Reversible Data Hiding Technique International... 01-05-2013 View Details
Design of a Home Embedded Surveillance System with Pyroelectric Infrared Sensor & Ultra-Low Alert Power International Journal of... 01-09-2012 View Details
XML Database System National Journal, ISSN: 09733663 ... 01-12-2007 View Details
Data Hiding Technique by using RGB-LSB Mechanism 4th IEEE International... 28-02-2014 View Details
A Novel Approach Towards Separable Reversible Data Hiding Technique Proceedings of... 07-02-2014 View Details
Software Birthmark for Theft Detection of JavaScript Programs: A Survey In Proceedings of... 20-12-2013 View Details
Generation of Whole Test Suite Through Search Based Testing: A Survey International... 20-12-2013 View Details
A Multiple Comparisons Algorithm Based Ranking and Clustering of Software Cost Estimation Models ... 20-12-2013 View Details
Automatic Detection of Unsafe Dynamic Component Loadings: A Survey ... 20-12-2013 View Details
The Novel Approach for Hiding of Sensitive Association Rules with Limited Side Effects International Conference on... 23-02-2013 View Details
Web Usage Mining and Discovery of Association Rules from Free Log Data International IEEE... 23-02-2013 View Details
Free Users Behavior Information From Central database System (Web Mining) ... 01-01-2013 View Details
Efficient Mining and Hiding of Sensitive Association Rules Third Nirma... 01-12-2012 View Details
Efficient Residential Monitoring of Patients Through Embedded Computer International... 18-02-2010 View Details
Embedded Computer for Real Time Monitoring of Patients International... 28-12-2009 View Details
Implementation of Semaphore: A Solution to the Priority Inheritance Problem in uC/OS Real-Time Kernel International... 28-12-2009 View Details
High Performance Java Used for Embedded Devices International Conference on... 24-09-2008 View Details
Jazelle DBX: Introduces High Performance Java Used for Hand Held Devices International Conference on... 20-12-2008 View Details
Need a Target Level Testing & Debugging Tools for Embedded Software International Conference on... 20-03-2008 View Details
Testing of Embedded Software Using Simulated Hardware International Conference... 20-03-2008 View Details
Query Evaluation & Formulation for XML databases International Conference on... 20-03-2008 View Details
A Survey on Software Birthmark Based Theft Detection of JavaScript Programs Using Agglomerative Clustering and Frequent Sub graph Mining 3rd National Conference... 28-03-2014 View Details
Static Detection of Unsafe Component Loadings on Windows and Linux: A Survey 3rd National... 28-03-2014 View Details
A Multiple Comparisons Algorithm Based Ranking and Clustering of COCOMO and Putnam’s Software Cost Estimation Models 3rd National... 28-03-2014 View Details
Optimized Test Suite Generation Using Memetic Algorithm: A Survey 3rd National Conference on... 28-03-2014 View Details
An Approach Towards Separable Lossy Data Hiding 3rd National... 28-03-2014 View Details
Image Based Steganography National... 10-10-2013 View Details
Telemedicine System Based on Embedded Computer National Conference... 04-03-2010 View Details
An Extension to the Existent Hardware of ARM Architecture Introduces High Performance Java National Conference on... 04-03-2010 View Details
Jazelle DBX: An Extension to the Existent Hardware of ARM Architecture Introduces High Performance Java National Conference... 29-01-2010 View Details
XML Database National Conference... 08-02-2008 View Details
Wireless Sensor Network for Rural Development National Conference on... 09-12-2007 View Details
“Database Management Systems” 1. Attended a... 21-05-2013 View Details
“Syllabus Framing of SE (Computer Engineering & Information Technology)” 2. Attended a workshop... 05-03-2013 View Details
“Aakash for Education” 3. Attended a... 11-11-2012 View Details
“Syllabus Framing” Attended a workshop organized by the... 08-11-2012 View Details
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs International Journal of... 01-08-2014 View Details
Software Birthmark for Theft Detection of Java Script Program- A survey International... 01-02-2014 View Details
Content Based Malicious URL Detection in E-mail Using Bayesian Classifier and Decision Tree: A Survey Cyber Times International Journal of... 01-01-2015 View Details
Automatic Ontology Generation Using SVM & MLP for the Domain of Musical Instruments Cyber Times International Journal of... 01-01-2015 View Details
Intrusion Detection System Based on Neural Network Using Bayesian & KPCA: A Survey Cyber Times International Journal of... 01-01-2015 View Details
Analysis and detection of multiple malicious Java Applets based on static code analysis: A Survey International Journal of Advanced... 01-02-2015 View Details
Forensic Analysis using Document Clustering: A Survey International Journal of Modern Trends... 01-04-2016 View Details
Classifiers Based on Error Measures International Journal of Advances in... 01-07-2016 View Details
Efficient Android Based Application for Required Movement of Robot International Journal of Computer... 01-04-2017 View Details
An Efficient System For Smart Robo Walk International Journal of Emerging... 02-05-2017 View Details
Comparative Analysis of Malicious Detection of Short URLs from Tweets International Journal of Emerging... 28-04-2018 View Details

Our Recruiters