List of M. Tech Students & Research
Amit Sangwan (2010-12)
1. Analysis and Comparison
Of Alerts Generated For The Particular Attack With Respect To Several Protocols
– Akhil Kaushik & Amit Sangwan – International Conference on Emerging
Trends in Engineering & Management (ICETEM 2012) – Satpriya Group Of
Institutions, Rohtak - ISBN: 978-981-07-2631-7, pp. 23-24 June 2012 , Online
Available at http://spgoi.com/ICETEM12/proceed/html/P152.xml
2. Performance Analysis Of
Real Time Intrusion Detection And Prevention System Using Snort - Mukesh
Sharma, Akhil Kaushik & Amit Sangwan - International Journal of Engineering Research
& Technology (IJERT) - Vol.1 - Issue 5 (July – 2012) -
e-ISSN: 2278-0181 - http://www.ijert.org/view-pdf/474/performance-analysis-of-real-time-intrusion-detection-and-prevention-system-using-snort
Smiley Gandhi (2010-12)
No Research work with me
Manupriya Hasija (2011-13)
3. D-MMLQ Algorithm for
Multi-level Queue Scheduling – Akhil Kaushik, Satvika, Manupriya Hasija &
Manoj Barnela - International Journal of Computer Science and Network Security
(IJCSNS), Vol.14- No.7, July 2014 – Online Available at http://paper.ijcsns.org/07_book/201407/20140715.pdf
4. OM Algorithm for Multi-level
Queue Scheduling – Akhil Kaushik, Manupriya Hasija & Praveen Kumar – IEEE
sponsored International Conference on Machine
Intelligence and Research Advancement (ICMIRA 2013), 21-23rd Dec. 2013 – pp. 564 – 568 – Online
Available at http://ieeeexplore.com/xpl/articleDetails.jsp?tp=&arnumber=6918895&searchWithin%3Dp_Authors%3A.QT.Kaushik%2C+%2FA%2F..QT.%26rowsPerPage%3D50
Kusum Yadav (2011-13)
5. A Review of Hybrid Digital
Watermarking – Akhil Kaushik & Kusum Yadav - International Journal of
Engineering Trends and Technology (IJETT) – Vol. 4 Iss. 7- July 2013- Online
Available at www.ijettjournal.org/volume-4/issue-7/IJETT-V4I7P168.pdf
6. An Enhanced and Hybrid Approach on
Digital Watermarking – Akhil Kaushik & Kusum Yadav – IEEE sponsored International Conference on Machine
Intelligence and Research Advancement (ICMIRA 2013), 21-23rd Dec 2013 – pp. 463-466, – Online
Available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6918875&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6917607%2F6918774%2F06918875.pdf%3Farnumber%3D6918875
Meenakshi (2012-14)
7. Performance Comparison
Of Routing Protocols Using OPNET UMTS Model Suite – Akhil Kaushik, Satvika
& Meenakshi – IEEE sponsored International Conference on - 12-13
July 2014 - pp. 668 – 672, Online Available at http://ieeeexplore.com/xpl/login.jsp?tp=&arnumber=6884957&url=http%3A%2F%2Fieeeexplore.com%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D6884957
8. QoS Parameter Evaluation
of UMTS under EIGRP, IGRP and RIP using OPNET - Akhil Kaushik, Satvika &
Meenakshi – IEEE sponsored International Conference on Communications and Signal
Processing (ICCSP 2014), 3-5th April 2014, pp. 399–403, ISBN
978-1-4799-3357-0, Online Available at http://ieeeexplore.com/xpl/articleDetails.jsp?tp=&arnumber=6949871&searchWithin%3Dp_Authors%3A.QT.Kaushik%2C+%2FA%2F..QT.%26rowsPerPage%3D50
9.
Comparative Analysis of Handover and Traffic Classes in UMTS using OPNET
simulator for Improving QoS – Akhil Kaushik, Satvika & Meenakshi – IEEE
Sponsored International Conference on Signal
Propagation and Computer Technology (ICSPCT 2014), Ajmer 2014 - 12-13 July 2014 -
pp.288-293, ISBN 978-1-4799-3139-2, Online Available at http://ieeeexplore.com/xpl/articleDetails.jsp?tp=&arnumber=6884956&searchWithin%3Dp_Authors%3A.QT.Kaushik%2C+%2FA%2F..QT.%26rowsPerPage%3D50
10.
Evaluating QoS Parameter of UMTS under Soft Handover using OPNET Simulator –
Akhil Kaushik, Satvika & Meenakshi – 2nd National Conference on Advances in
Computing Communication Networks and Electrical Systems (NCACCNC 2014), MDU
Rohtak, 27-28th February
2014.
Sudesh (2012-14)
10. A Two Stage Hybrid
Model For Image Encryption And Compression To Enhance Security And Efficiency –
Akhil Kaushik, Satvika & Sudesh – IEEE sponsored International Conference
on Advances in Engineering and
Technology Research (ICAETR 2014), Unnao, 1-2nd Aug
2014 – pp. 1-5, ISSN 2347-9337, Online Available at http://ieeeexplore.com/xpl/articleDetails.jsp?tp=&arnumber=7012825&searchWithin%3Dp_Authors%3A.QT.Kaushik%2C+%2FA%2F..QT.%26rowsPerPage%3D50
11.
A Review on Various Image Encryption Techniques – Akhil Kaushik & Sudesh -
2nd National Conference on Advances in Computing Communication Networks and
Electrical Systems (NCACCNC 2014), MDU Rohtak, 27-28th February 2014.
Nisha Kumari (2012-14)
12.
A Three Dimensional Model for Image Based Information Security – Akhil Kaushik
& Nisha – IEEE sponsored International Conference on Computational
Intelligence and Communication Networks (CICN 2014), Bhopal, 14-16th November 2014.
13.
A Review of Image Enhancement Techniques – Akhil Kaushik & Nisha Kumari -
2nd National Conference on Advances in Computing Communication Networks and
Electrical Systems (NCACCNC 2014), MDU Rohtak, 27-28th February 2014.
Monika Sharma
(2012-14)
14.
Network Simulators for Next Generation Networks: An Overview – Akhil Kaushik,
Monika Sharma & Mani Shekhar - International Journal of Mobile Network
Communications & Telematics ( IJMNCT) Vol. 4, No.4,August 2014. Online
Available at airccse.org/journal/ijmnct/papers/4414ijmnct04.pdf
Neha (2013-15)
15. Extended Bellman Ford Algorithm with optimized
time of computation - Neha &
Akhil Kaushik - Springer
International Conference Ahmdebad India, 3-4th July 2015.
16. Comparative Study of Greedy and
Dynamic Programming Algorithms - Neha
& Akhil Kaushik - National
Conference on Innovative Trends in Computer Science Engineering, BRCM Bahal,
Bhiwani, Haryana, India, 4th April 2015.
Anju Sinhmar (2013-15)
17. Knowledge Based Retrieval
Scheme from Big Data for Aviation Industry - Anju
& Akhil Kaushik - IEEE
7th Conference on Computational Intelligence
and Communication Networks (CICN2015), Jabalpur, Madhya Pradesh, India, 12th Dec 2015.
18. Design Big Data Knowledge
Retrieval Scheme for Industry - Anju
& Akhil Kaushik -IJMRS’s International Journal of Engineering and Sciences,
ISSN : 2277-9698, Vol. 4, Iss. 1, March 2015.
No comments:
Post a Comment