Department of Information and Technology Engineering

Department of Information and Technology Engineering

  1. Shyam Kumawat (MF),Deepak Tomar (EF),“SLA-Aware Trust Model for cloud computing deployments” in International Journal of Computer Applications,IJCA,Vol 90 -No. 10,0975 – 8887.
  2. Vijay Patidar(MF),Vivek Shrivastva(EF),“A Generalized Association Rule Based Method for Privacy Preserving in Data Mining”,IJARCSSE,Volume 3, Issue 92277-128X.
  3. Shyam Kumawat (MF),Deepak Tomar (EF),“Trust Model in Cloud Computing: A Perspective”,IJMIT,Vol 2 no.6,2278-5612.
  4. Imran Khan(MF),Heena Shaikh(ES),Yashovardhan Kelkar(EF),A robust DWT watermarking technique basis on scaling factor,IJCSEA,Vol.2, No.4,2231 – 0088.
  5. Imran Khan(MF),Heena Shaikh(ES),Yashovardhan Kelkar(EF),Analysis of various digital watermarking techniques under various attacks,IJERD,Volume 2, Issue 6,2278-800X.
  6. Imran Khan(MF),Heena Shaikh(ES),Yashovardhan Kelkar(EF),Analysis of Robustness of Hybrid Digital Image Watermarking Technique under Various Attacks,IJCSMC,Vol. 2,Issue. 32320–088X.
  7. Imran Khan(MF),Heena Shaikh(ES),Yashovardhan Kelkar(EF),A Newly Rule-Based Method for Blood Vessel Segmentation – “Multi- scale single-channel linear tracking method,IJCTA,Vol 4 issue 22229-6063.
  8. Imran Khan(MF),Sumit Tomar(EF),Multi-scale single channel linear tracking method,IJDACR,Volume 1 issue 1,2319-4863.
  9. Vijay Kumar Patidar(MF), Abhishek Raghuvanshi(EF), Vivek Shrivastava(EF) Literature Survey of Association Rule Based Techniques for Preserving Privacy,IJACT,Volume-2, Issue-3,2320-0790.
  10. Anil Prakash Dangi(MF),Ravindra Mogili(EF),“Privacy Preservation Measure using t-closeness with combined l-diversity and k-anonymity”,IJARCSEE,Vol. 1, Issue 8,2277 – 9043.
  11. Ajay Marchya(MF),Ravindra Mogili(EF),ECG Signal Analysis for Myocardial IschemiaDetection,IJARCSEE,Vol. 1, Issue 8,2277 – 9043.