Volume VII (b)


Annexure ERD I - Publications



Download 3.75 Mb.
Page19/36
Date25.10.2016
Size3.75 Mb.
1   ...   15   16   17   18   19   20   21   22   ...   36
Annexure ERD I - Publications
Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia

S. No.

Title of the Paper

Author(s)

Journal

Volume, Nos, Year, Page No.

Publisher / ISSN No./ Int. Database

Impact Factor

Citation

SJR

SNIP

1

Fuzzy Priority CPU Scheduling Algorithm

Bashir Alam,Prof. M. N. Doja, R. Biswas, M. Alam

Internatio-nal Journal of Computer Science Issues

Vol. 8, Issue 6, No.1, November 2011.




0.242










2

Multiple interactive Authority Model

Prof. M. N. Doja, Dharmender

Internatio-nal Journal of Computer Science and Network Security

Volume 8 no. 3, Pages 151-154. March 2008
















3

A Method of 1-5 Vague Search to Answer Queries in Relational Database

SmitaRajpal, Prof. M.N. Doja and Ranjit Biswas

Journal of Pattern Recognition Research



















4

A Novel Approach to Reduce Signaling Delay in HMIPv6 Mobile Networks

Sapna Gambhir, Prof. M.N. Doja, and Moinuddin

Internatio-nal Journal of Engineering and technology

Vol, 1, no.1 pp.34-39, April 2009.
















5

History-Pattern based MAP Selection Algorithm for HMIPv6 Mobile Networks

Sapna Gambhir, Prof. M.N. Doja, and Moinuddin

Journal of Cooperation among University, Research and Industrial Enterprises

Vol. 2. no.2, pp.82-93, july 2009.
















6

Conceptual Improvement of Priority Based CPU Scheduling Algorithm Using Fuzzy Logic

Bashir Alam, Prof. M.N.Doja and Ranjit. Biswas

Internatio-nal Journal of Fuzzy Systems and Rough Systems

Vol. 1. No.1 June 2008.
















7

Impact of SHM Attributes of Mobile Node On Quos Parameters for HMIPv6 Mobile Networks

Sapna Gambhir, Prof. M.N. Doja, and Moinuddin

Internatio-nal Journal of Advances in Wireless and Mobile Communic-ations

Vol. 1, no,1-3, pp. 25-35, 2008,.
















8

Analysis of Impact of HMIPv6 architectures on packet delivery cost

SapnaGambhir , Prof. M.N. Doja, and Moinuddin

Internatio-nal Journal of Applied Engineering and Research

vol. 3, pp. 431-439, 2008.
















9

Improving Security through image based User Authentication

Prof. M N Doja, Naveen Kumar

Internatio-nal journal of Engineering Research and Industrial Applications

Vol. 1, No.11, pp . 225 – 236, 2008.
















10

Natural inspired energy efficient routing algorithm for Mobile Adhoc networks

Shabana Mahfuz and Prof. M.N. Doja

Internatio-nal journal of computational intelligent theory and practice

Vol.2, Dec-2007 pp 113-124.
















11

Performance analysis of Location update cost on HMIP parameters

Sapna Gambhir, M.N.Doja, and Moinuddin

Invert journal of Science and technology

vol. 1, no, pp 285-290, 2007
















12

Electronic Authority Variation

M.N.Doja and Dharmender

Internatio-nal journal of Computer Science and information Security

Vol 4, No.1 & 3 Pages 11-14. 2009
















13

Authorized SCADA Commands

M.N.Doja and Dharmender, Nitin Gupta

Internatio-nal journal of technology, Knowledge and Society

Volume 5 , issue 4, Pages 63-76. 2009
















14

A General Fuzzy CPU Scheduling Algorithm

Bashir Alam, M.N.Doja and Ranjit. Biswas

Internation-al Journal of Fuzzy Systems and Rough Systems

Vol. 1, No.1,Janu-June 2008
















15

A Method of Neutrosophic Logic to Answer Queries in Relational Database

SmitaRajpal, M.N.Doja and Ranjit Biswas

Journal of Computer Science

Vol, No.4, pp. 309-314,2008.
















16

A Method of imprecise Query Solving

SmitaRajpal, M.N.Doja and Ranjit Biswas

International Journal of Computer Science and Network Security

Vol.8, No6 , pp. 133-139, 2008
















17

A Framework for Evaluating Web Search Systems

R. Ali, Prof. M M Sufyan Beg

WSEAS Transactions on Systems

Vol. 6, issue 2, Feb. 2007 pp. 257-264

WSEAS




0

0.03

0.886

18

Web Search Enhancement by Mining User Actions

Prof. M M Sufyan Beg, N. Ahmad

Journal of Information Sciences

Vol. 177, Issue 23, December 2007, pp. 5203-5218

Elsevier

2.984

25

0.087

4.445

19

Optimizing Number of Inputs to Classify Breast Cancer Using Artificial Neural Network

B. Garg, Prof. M. M. S. Beg, A. Q. Ansari

Internation-al Journal of Computer Science and Systems Biology

Vol. 2, No. 4, (ISSN: 0974–7230), August 2009, pp. 247-254

OMICS Publishing Group

2.53

4







20

Elements of Sketching with Words

B. M. Imran, Prof. M M Sufyan Beg

Internation-al Journal of Granular Computing, Rough Sets and Intelligent Systems

Vol. 2, no.2, 2011, (ISSN: 1757-2703), pp. 166 – 178

Inderscience Publishers




3







21

An Overview of Web Search Evaluation Methods

R. Ali, Prof. M M Sufyan Beg

Computers and Electrical Engineering

Vol. 37, no. 6, November 2011, (ISSN: 0045-7906), pp. 835-848.

Elsevier

0.837

1

0.046

1.813

22

Myriad – A Novel User Feedback Based Metasearch Engine

Rashid Ali, Anjali Saxena and Richa Gupta, Prof. M M Sufyan Beg

Advanced Materials Research

Vol. 433 – 440, 2012, (ISSN: 1022-6680), pp. 7554-7562

Trans. Tech. Publications, Switzerland




0

0.03

0.158

23

A Probabilistic Approach to Apriori Algorithm

V. Sharma, Prof. M M Sufyan Beg

Internation-al Journal of Granular Computing, Rough Sets and Intelligent Systems

Vol. 2, no. 3, (ISSN: 1757-2703), 2012, pp. 225-243.

Inderscience Publishers




2







24

Fuzzy HRRN CPU Scheduling Algorithm

Dr. Bashir Alam, M. N. Doja, R. Biswas, M. Alam

Internation-al Journal of Computer Science and Information Security

Vol. 177, Issue 23, December 2007, pp. 5203-5218
















25

Ranking System for Opinion Mining of Features from Review Documents

MrTanvir Ahmad, Mohammad NajmudDoja

Internation-al Journal of Computer Science Issues

Volume: 9, Issue–4, Year- 2012. ISSN NO : 1694-0814

Software First Ltd, Mahebourg, Mauritius

0.242

0

0




26

Rule Based System for Enhancing Recall for Feature Mining from Short Sentences in Customer Review Documents

Mr Tanvir Ahmad, Mohammad Najmud Doja

Internation-al Journal of Computer Science and Engineering

Volume : 4, Number : 6, Year - 2012

SIPS Technology, Chennai.




0

0




27

Cluster-Based Routing Protocol To Improve Qos In Mobile Adhoc Networks

M N Doja, Mr Mohd Amjad

Internation-al Journal of Computer Science and Information Security

Vol.10, No. 1 pp. 95-100, 2012.
















28

Quality of Service in Mobile Ad- Hoc Networks

Mr Mohd Amjad, M N Doja

Internation-al Journal of Advance Engineering and Application

Vol-2, No. 17, 2011.
















29

Chaos and Wavelet Based Image Encryption

Mr Musheer Ahmad, Omar Farooq

Internation-al Journal of Information Processing

Vol. 4 Issue 2, May 2011, pp. 13--21

IK Publisher

0

0

0

0

30

A Computation Efficient Block Based Scrambling Technique with Random Control Parameters

Mr Musheer Ahmad, Omar Farooq

IUP Journal of Information Technology

Vol. VI, No. 4, pp. 7-16, December 2010.

Indian University Press

0

0

0

0

31

Confidentiality of Images Based on Scrambling in Spatial Domain

Mr Musheer Ahmad, Izharuddin

IUP Journal of Computer Sciences

Vol. IV, No. 3, pp. 22--29, July 2010.

Indian University Press

0

0

0

0

32

A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

Mr MusheerAhmad, M Shamsher Alm

Internation-al Journal of Computer Science and Engineering

Vol. 2, Issue 1, pp. 46--50, January 2010.

Engineers Publications

0

3

0

0

33

Chaos Based Mixed Keystream Generation for Voice data encryption

Mr Musheer Ahmad, BashirAlam, Omar Farooq

Internation-al Journal on Cryptogr-aphy and Information Security

Vol.2, No.1, March 2012.

AIRCC

0

0

0

0

34

Statistical Analysis of multiple significance test methods for differential proteomics

Bing Wang, Dr. Mohd. Fahim, Jun Zhang, XinminYiin, Eric rouchka and Xiang Zhang

BMC Bioinforma-tics

Vol. 11 (Suppl 4): P30, 2010.



















Share with your friends:
1   ...   15   16   17   18   19   20   21   22   ...   36


The database is protected by copyright ©sckool.org 2019
send message

    Main page