-
"Using 3G Dongle, Recognition and Reporting based on Pervasive Computing", International Journal of Computer Science and Information Security, 14(10):907-913 October 2016
-
"Performance Analysis of Ad hoc Routing Protocols over VANETs", International Journal of Computer Applications (0975 - 8887), Volume 147 – No.14, pp.41-46, August 2016
-
"Dynamic Trust Level Decision in Pervasive Environment", Grenze International Journal of Engineering and Technology, July 2016, DOI: 10.21647/gijet/2016/v2/i2/48897
-
"Performance Challenges and Solutions for Vehicular Ad Hoc Networks: Survey", International Journal of Engineering Research and Application(IJERA), Vol.6(6), pp.16-24, June 2016, ISSN : 2248-9622.
-
"Entity Behavioral based Trust Level Decision in Pervasive Environment", International Conference on Advances in Engineering and Technology(AET2015), IDES, ACEECom, AMAE and ACEE, pp. 28-37, May 2016.
-
"Towards Pervasive Computing in Individual Care: A Literature Review", International Journal of Engineering Science and Technology (IJEST), Vol.7(11), pp.382-392, November 2015.
-
"A Review on Face Recognition Algorithms", International Journal of Advanced and Innovative Research (2278-7844) / # 150 / Volume 4 Issue 12, 2015.
-
"Incremental development of Geographical routing protocols for WSNs: A Review", International Journal of Advanced Research in Computer and communication Engineering (IJARCCE), vol. 4(04), April 2015.
-
"A Traffic Aware Health Monitoring Application Embedded in Smart Ambulance (THESA)", International Journal of Computer Sciences and Engineering (IJCSE), vol. 2(11), pp. 132-137, December 2014.
-
"Secure Mechanism for Medical Database Using RSA", International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3(07), pp. 320-327, July 2014
-
"Autonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), vol. 9(06), No 2, pp. 170-176, November 2012.
-
"Cache Based Query Optimization Approach in Distributed Database", International Journal of Computer Science Issues (IJCSI), vol. 9(06), No 1, pp. 389-395, November 2012.
-
"Cache Based Query Optimization Approach in Distributed Database", International Journal of Computer Science Issues (IJCSI), vol. 9(06), No 1, pp. 389-395, November 2012.
- "Centralized Host Control System", International Journal of Engineering Science and Technology (IJEST), vol. 4(03), pp. 1021-1029, March 2012.
-
"Improved Bandwidth Utilization based Check pointing Algorithm in Distributed Database", International Journal of Computer Applications (IJCA), vol. 27(7), pp. 31-35, August 2011.
-
"Multilevel Policy Based Security in Distributed Database", International Conference on Advances in computing and communications (ACC2011), Springer-Verlag., vol.190 (8), pp. 572-580, July 2011.
-
"An Efficient Traffic Control and Cost Effective Check pointing Approach for Cluster Federation", International Journal of Recent Trends in Engineering and Technology(IJRTET), vol. 4(1), pp. 38-43, November 2010.
-
"Three Tier Cache Based Query Optimization Model in Distributed Database", International Journal of Engineering Science and Technology (IJEST), vol. 2(7), pp. 3206-3212, July 2010.
-
"Concurrency Control Algorithms and its Variants: A Survey", International Conference on Methods and Models in Science and Technology (ICM2ST-10), AIP Conference Proceedings, pp. 46-50, 10-12 November 2010.
-
"Neemon Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database", International Conference on Recent Trends in Business Information Processing (BAIP), CCIS, Springer-Verlag. vol. 70, pp. 224-232, 26-27 March 2010.
-
"An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System", International Conference on Recent Trends in Business Information Processing(BAIP), CCIS, Springer- Verlag., vol. 70, pp. 442-445, 26-27 March 2010.
-
"Evaluation and Modification in Clustering Technique for Data Mining", International Journal of Contemporary Practices, vol. 1(5),pp. 58-61, 2009
-
"A New approach to Credit Card Fraud Detection using Supervised and Unsupervised Techniques", National Conference cum Workshop on Information Security and Networks (ISAN-2009), June, 2009.
-
"Reputation Based Trust Models for Grid: A Survey", In Proceedings of National Conference cum Workshop on Information Security and Networks (ISAN-2009), June 2009.
-
"Providing Secure and Efficient Routing Environment in WSNs: A Survey", International conference On Computing, Communication And Information Technology Applications (CCITA 2010), January 2010.
- Covered 1700 students in training workshops over 4 months (June 2015 - September 2015).
- Initiated sales discussions with over 30+ colleges (Telangana& Andhra Pradesh).
- Sold the vision of job-readiness to colleges to produce high quality graduates.
- Implemented an interactive web interface for students to learn and practice behavior skills in a safe environment.
Associate Professor, Dept. of CSE, MMDU, Mullana
Doctor of Philosophy (Ph.D.) in Computer Applications, Maharishi Markandeshwar University, Mullana
Masters degree in Computer Science, Kurukshetra University, Kurukshetra