{"id":7819,"date":"2022-11-27T08:38:05","date_gmt":"2022-11-27T08:38:05","guid":{"rendered":"https:\/\/bvcoend.ac.in\/?page_id=7819"},"modified":"2022-12-06T05:19:55","modified_gmt":"2022-12-06T05:19:55","slug":"research-publication-a-y-2018-19-it","status":"publish","type":"page","link":"https:\/\/bvcoend.ac.in\/index.php\/research-publication-a-y-2018-19-it\/","title":{"rendered":"RESEARCH PUBLICATION A.Y 2018-19"},"content":{"rendered":"[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;66&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]\n<table dir=\"ltr\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<colgroup>\n<col width=\"60\" \/>\n<col width=\"202\" \/>\n<col width=\"371\" \/>\n<col width=\"225\" \/>\n<col width=\"121\" \/>\n<col width=\"284\" \/>\n<col width=\"99\" \/>\n<col width=\"100\" \/><\/colgroup>\n<tbody>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Sl.No&quot;}\"><strong><span style=\"color: #000000;\">Sl.No<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Author(s)\u00a0&quot;}\"><strong><span style=\"color: #000000;\">Author(s)\u00a0<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Title of the Article&quot;}\"><strong><span style=\"color: #000000;\">Title of the Article<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Title of the Journal\/Book\/Conference Detail&quot;}\"><strong><span style=\"color: #000000;\">Title of the Journal\/Book\/Conference Detail<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Volume &amp; Issue Number, Page Numbers, Month &amp; Year of Publication&quot;}\"><strong><span style=\"color: #000000;\">Volume &amp; Issue Number, Page Numbers, Month &amp; Year of Publication<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ISSN\/ ISBN \/DOI No.\u00a0&quot;}\"><strong><span style=\"color: #000000;\">ISSN\/ ISBN \/DOI No.\u00a0<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Indexing&quot;}\"><strong><span style=\"color: #000000;\">Indexing<\/span><\/strong><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;If SCI, mention Impact Factor.&quot;}\"><strong><span style=\"color: #000000;\">If SCI, mention Impact Factor.<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\"><span style=\"color: #000000;\">1<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Puneet Singh Lamba, Deepali\\nVirmani&quot;}\"><span style=\"color: #000000;\">Puneet Singh Lamba, Deepali<\/span><br \/>\n<span style=\"color: #000000;\">Virmani<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Reckoning number of eye blinks using eye facet correlation for exigency detection.&quot;}\"><span style=\"color: #000000;\">Reckoning number of eye blinks using eye facet correlation for exigency detection.<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Intelligent &amp; Fuzzy Systems&quot;}\"><span style=\"color: #000000;\">Journal of Intelligent &amp; Fuzzy Systems<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol 35, Issue 5, PP: 5279-5286, Nov. 18&quot;}\"><span style=\"color: #000000;\">Vol 35, Issue 5, PP: 5279-5286, Nov. 18<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;DOI: 10.3233\/JIFS-169811&quot;}\"><span style=\"color: #000000;\">DOI: 10.3233\/JIFS-169811<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SCIE&quot;}\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1.737}\"><span style=\"color: #000000;\">1.737<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:2}\"><span style=\"color: #000000;\">2<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vanita Jain, Rishabh Kapoor,\\nShashwat Gulyani &amp; Arun Kumar Dubey&quot;}\"><span style=\"color: #000000;\">Vanita Jain, Rishabh Kapoor,<\/span><br \/>\n<span style=\"color: #000000;\">Shashwat Gulyani &amp; Arun Kumar Dubey<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Categorization of spam images and identification of controversial images on mobile phones using machine learning and predictive learning&quot;}\"><span style=\"color: #000000;\">Categorization of spam images and identification of controversial images on mobile phones using machine learning and predictive learning<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Discrete Mathematical Sciences and Cryptography,&quot;}\"><span style=\"color: #000000;\">Journal of Discrete Mathematical Sciences and Cryptography,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 293-307,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 293-307,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;DOI: 10.1080\/09720529.2019.1582863&quot;}\"><span style=\"color: #000000;\">DOI: 10.1080\/09720529.2019.1582863<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:3}\"><span style=\"color: #000000;\">3<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Achin Jain, Vanita Jain&quot;}\"><span style=\"color: #000000;\">Achin Jain, Vanita Jain<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Sentiment classification of twitter data belonging to renewable energy using machine learning&quot;}\"><span style=\"color: #000000;\">Sentiment classification of twitter data belonging to renewable energy using machine learning<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Recent trends in Computational Intelligence, Evolutionary Optimization and Techniques&quot;}\"><span style=\"color: #000000;\">Recent trends in Computational Intelligence, Evolutionary Optimization and Techniques<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 40, Issue 2, ,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 40, Issue 2, ,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;10.1080\/02522667.2019.1582873&quot;}\"><span style=\"color: #000000;\">10.1080\/02522667.2019.1582873<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4}\"><span style=\"color: #000000;\">4<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vanita Jain,Arun Kumar Dubey,Achin Jain,Mohit Malhotra &amp; Shikha Rastogi&quot;}\"><span style=\"color: #000000;\">Vanita Jain,Arun Kumar Dubey,Achin Jain,Mohit Malhotra &amp; Shikha Rastogi<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Crime pattern recognition in Chicago city using hadoop multinode cluster&quot;}\"><span style=\"color: #000000;\">Crime pattern recognition in Chicago city using hadoop multinode cluster<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Information and Optimization Sciences&quot;}\"><span style=\"color: #000000;\">Journal of Information and Optimization Sciences<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 40, Issue 2, PP: 587-601,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 40, Issue 2, PP: 587-601,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;10.1080\/02522667.2019.1582878&quot;}\"><span style=\"color: #000000;\">10.1080\/02522667.2019.1582878<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:5}\"><span style=\"color: #000000;\">5<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Prakhar Priyadarshi &amp; C.S.Rai&quot;}\"><span style=\"color: #000000;\">Prakhar Priyadarshi &amp; C.S.Rai<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Rprop and improved Rprop+ based constant modulus type (RCMT) blind channel equalization algorithm for QAM signal&quot;}\"><span style=\"color: #000000;\">Rprop and improved Rprop+ based constant modulus type (RCMT) blind channel equalization algorithm for QAM signal<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Information and Optimization Sciences&quot;}\"><span style=\"color: #000000;\">Journal of Information and Optimization Sciences<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 40, Issue 2, PP: 351-366,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 40, Issue 2, PP: 351-366,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/02522667.2019.1586351&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/02522667.2019.1586351<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:6}\"><span style=\"color: #000000;\">6<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Sarita yadav ,M Gaur, A Joshi&quot;}\"><span style=\"color: #000000;\">Sarita yadav ,M Gaur, A Joshi<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Framework for SLEPS: Self learning electoral results prediction system&quot;}\"><span style=\"color: #000000;\">Framework for SLEPS: Self learning electoral results prediction system<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Statistics &amp; Management Systems&quot;}\"><span style=\"color: #000000;\">Journal of Statistics &amp; Management Systems<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 379-391,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 379-391,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/09720510.2019.1582879&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720510.2019.1582879<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:7}\"><span style=\"color: #000000;\">7<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Singh, P., &amp; Puneet Singh Lamba&quot;}\"><span style=\"color: #000000;\">Singh, P., &amp; Puneet Singh Lamba<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Influence of crowdsourcing popularity and previous year statistics in market value estimation of football players.&quot;}\"><span style=\"color: #000000;\">Influence of crowdsourcing popularity and previous year statistics in market value estimation of football players.<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 113-126,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 113-126,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/09720529.2019.1576333&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720529.2019.1576333<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:8}\"><span style=\"color: #000000;\">8<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Jain, V., Lamba, Puneet. S., Singh, B., Namboothiri, N.,\\n&amp; Dhall, S.&quot;}\"><span style=\"color: #000000;\">Jain, V., Lamba, Puneet. S., Singh, B., Namboothiri, N.,<\/span><br \/>\n<span style=\"color: #000000;\">&amp; Dhall, S.<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Facial expression recognition using feature level fusion. Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Facial expression recognition using feature level fusion. Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 337-350,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 337-350,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/09720529.2019.1582866&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720529.2019.1582866<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:9}\"><span style=\"color: #000000;\">9<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Puneet Singh Lamba, Deepali\\nVirmani&quot;}\"><span style=\"color: #000000;\">Puneet Singh Lamba, Deepali<\/span><br \/>\n<span style=\"color: #000000;\">Virmani<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Information retrieval from facial expression using voting to assert exigency. Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Information retrieval from facial expression using voting to assert exigency. Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 177-190, Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 177-190, Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/09720529.2019.1583829&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720529.2019.1583829<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:10}\"><span style=\"color: #000000;\">10<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Prakhar Priyadarshi &amp; C.S.Rai&quot;}\"><span style=\"color: #000000;\">Prakhar Priyadarshi &amp; C.S.Rai<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Rprop Based Noble Blind channel Equalization Algorithm for QAM signal&quot;}\"><span style=\"color: #000000;\">Rprop Based Noble Blind channel Equalization Algorithm for QAM signal<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Mechanics of Continua and Mathematical Sciences&quot;}\"><span style=\"color: #000000;\">Journal of Mechanics of Continua and Mathematical Sciences<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 13, Issue 3, PP 103-116, Aug 18&quot;}\"><span style=\"color: #000000;\">Vol. 13, Issue 3, PP 103-116, Aug 18<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ISSN No.-2474-7190&quot;}\"><span style=\"color: #000000;\">ISSN No.-2474-7190<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:11}\"><span style=\"color: #000000;\">11<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Manish Kumar,Vanita Jain,Achin Jain,Uttam Singh\\nBisht &amp; Neha Gupta&quot;}\"><span style=\"color: #000000;\">Manish Kumar,Vanita Jain,Achin Jain,Uttam Singh<\/span><br \/>\n<span style=\"color: #000000;\">Bisht &amp; Neha Gupta<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET&quot;}\"><span style=\"color: #000000;\">Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Information and Optimization Sciences&quot;}\"><span style=\"color: #000000;\">Journal of Information and Optimization Sciences<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 277-291,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 277-291,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;10.1080\/09720529.2019.1585635&quot;}\"><span style=\"color: #000000;\">10.1080\/09720529.2019.1585635<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:12}\"><span style=\"color: #000000;\">12<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Alka Leekha and Dr. Alam Shaikh&quot;}\"><span style=\"color: #000000;\">Alka Leekha and Dr. Alam Shaikh<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Implementation and Comparison of the functions of building blocks in SHA-2 Family used in secured cloud Applications&quot;}\"><span style=\"color: #000000;\">Implementation and Comparison of the functions of building blocks in SHA-2 Family used in secured cloud Applications<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Discrete Mathematical Sciences and Cryptography&quot;}\"><span style=\"color: #000000;\">Journal of Discrete Mathematical Sciences and Cryptography<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 22, Issue 2, PP: 323-335,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 22, Issue 2, PP: 323-335,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/09720529.2019.1582865&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720529.2019.1582865<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:13}\"><span style=\"color: #000000;\">13<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Poras Khetarpal, Neeraj Kumar,\\nNikita Rai&quot;}\"><span style=\"color: #000000;\">Poras Khetarpal, Neeraj Kumar,<\/span><br \/>\n<span style=\"color: #000000;\">Nikita Rai<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Real-Time Static Hand Gesture Recognition Using MATLAB. In: Mishra&quot;}\"><span style=\"color: #000000;\">Real-Time Static Hand Gesture Recognition Using MATLAB. In: Mishra<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Applications of Computing, Automation and Wireless Systems in Electrical Engineering&quot;}\"><span style=\"color: #000000;\">Applications of Computing, Automation and Wireless Systems in Electrical Engineering<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 553, -, PP: 1149\u20131158, June, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 553, -, PP: 1149\u20131158, June, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1007\/978-981-13-6772-4_100&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-13-6772-4_100<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SCOPUS&quot;}\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:14}\"><span style=\"color: #000000;\">14<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Rachna Pathak, Neha Gupta,Poras Khetarpal, S Jain&quot;}\"><span style=\"color: #000000;\">Rachna Pathak, Neha Gupta,Poras Khetarpal, S Jain<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;BIJLI: A Hyperledger-Based Blockchain-Powered Application for Decentralized Power&quot;}\"><span style=\"color: #000000;\">BIJLI: A Hyperledger-Based Blockchain-Powered Application for Decentralized Power<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Applications of Computing, Automation and Wireless Systems in Electrical Engineering&quot;}\"><span style=\"color: #000000;\">Applications of Computing, Automation and Wireless Systems in Electrical Engineering<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 553, -, PP: 363-372, June, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 553, -, PP: 363-372, June, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1007\/978-981-13-6772-4_31&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-13-6772-4_31<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SCOPUS&quot;}\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:15}\"><span style=\"color: #000000;\">15<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Poras Khetarpal, K Sudha, Neeraj Kumar, Ruchi Sharma,\\nAkarsh Sood&quot;}\"><span style=\"color: #000000;\">Poras Khetarpal, K Sudha, Neeraj Kumar, Ruchi Sharma,<\/span><br \/>\n<span style=\"color: #000000;\">Akarsh Sood<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;LabVIEW based application software for GPS radiosonde system&quot;}\"><span style=\"color: #000000;\">LabVIEW based application software for GPS radiosonde system<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Information and Optimization Sciences&quot;}\"><span style=\"color: #000000;\">Journal of Information and Optimization Sciences<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 40, Issue 2, PP: 413-426,Mar, 2019&quot;}\"><span style=\"color: #000000;\">Vol. 40, Issue 2, PP: 413-426,Mar, 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1080\/02522667.2019.1580882&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/02522667.2019.1580882<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SCOPUS&quot;}\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:16}\"><span style=\"color: #000000;\">16<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Puneet Singh Lamba, Deepali\\nVirmani&quot;}\"><span style=\"color: #000000;\">Puneet Singh Lamba, Deepali<\/span><br \/>\n<span style=\"color: #000000;\">Virmani<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes.&quot;}\"><span style=\"color: #000000;\">Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes.<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of Electrical &amp; Computer Engineering &quot;}\"><span style=\"color: #000000;\">International Journal of Electrical &amp; Computer Engineering<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 8, Issue 4, 2433-2441, Aug 2018&quot;}\"><span style=\"color: #000000;\">Vol. 8, Issue 4, 2433-2441, Aug 2018<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;DOI: 10.11591\/ijece.v8i4.pp2433-2441&quot;}\"><span style=\"color: #000000;\">DOI: 10.11591\/ijece.v8i4.pp2433-2441<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SCOPUS&quot;}\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:17}\"><span style=\"color: #000000;\">17<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Prakhar Priyadarshi &amp; C.S.Rai&quot;}\"><span style=\"color: #000000;\">Prakhar Priyadarshi &amp; C.S.Rai<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Logarithmic Cost Based Improved Constant Modulus (LCICM) Type Blind Channel Equalization&quot;}\"><span style=\"color: #000000;\">Logarithmic Cost Based Improved Constant Modulus (LCICM) Type Blind Channel Equalization<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of Digital Signals and Smart Systems&quot;}\"><span style=\"color: #000000;\">International Journal of Digital Signals and Smart Systems<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol. 2, Issue 3, PP: 202-214, Jan 2019&quot;}\"><span style=\"color: #000000;\">Vol. 2, Issue 3, PP: 202-214, Jan 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;https:\/\/doi.org\/10.1504\/IJDSSS.2018.097307&quot;}\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1504\/IJDSSS.2018.097307<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:18}\"><span style=\"color: #000000;\">18<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vanita Jain, Aarushi Jain, Achin\\nJain and Arun Kumar Dubey&quot;}\"><span style=\"color: #000000;\">Vanita Jain, Aarushi Jain, Achin<\/span><br \/>\n<span style=\"color: #000000;\">Jain and Arun Kumar Dubey<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Comparative Study between FA,ACO and PSO Algorithms for Optimizing Quadratic Assignment&quot;}\"><span style=\"color: #000000;\">Comparative Study between FA,ACO and PSO Algorithms for Optimizing Quadratic Assignment<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of Scientific Research in Computer Science and Engineering&quot;}\"><span style=\"color: #000000;\">International Journal of Scientific Research in Computer Science and Engineering<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol.6 , Issue.2 , PP: 76-81, 2018&quot;}\"><span style=\"color: #000000;\">Vol.6 , Issue.2 , PP: 76-81, 2018<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;DOI:10.26438\/ijsrcse\/v6i2.7681&quot;}\"><span style=\"color: #000000;\">DOI:10.26438\/ijsrcse\/v6i2.7681<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:19}\"><span style=\"color: #000000;\">19<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Alka Leekha, Arnav Wadhwa,Nikhil Jain, Mehul Wadhwa&quot;}\"><span style=\"color: #000000;\">Alka Leekha, Arnav Wadhwa,Nikhil Jain, Mehul Wadhwa<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Understanding the Impact of News on Stock Market Trends Using Natural Language Processing and Machine Learning Algorithms&quot;}\"><span style=\"color: #000000;\">Understanding the Impact of News on Stock Market Trends Using Natural Language Processing and Machine Learning Algorithms<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of Knowledge Based Computer Systems&quot;}\"><span style=\"color: #000000;\">International Journal of Knowledge Based Computer Systems<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Vol.6, issue 2, pp.23-30, Dec.2018&quot;}\"><span style=\"color: #000000;\">Vol.6, issue 2, pp.23-30, Dec.2018<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;_&quot;}\"><span style=\"color: #000000;\">_<\/span><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:20}\"><span style=\"color: #000000;\">20<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Gopal Chaudhary, Surinder\\nKaur, Bhawna Mehta, RachnaTewani\\n&quot;}\"><span style=\"color: #000000;\">Gopal Chaudhary, Surinder<\/span><br \/>\n<span style=\"color: #000000;\">Kaur, Bhawna Mehta, RachnaTewani<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Observer based fuzzy and PID controlled smart greenhouse,&quot;}\"><span style=\"color: #000000;\">Observer based fuzzy and PID controlled smart greenhouse,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Statistics and\\nManagement Systems\\n&quot;}\"><span style=\"color: #000000;\">Journal of Statistics and<\/span><br \/>\n<span style=\"color: #000000;\">Management Systems<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;22, no. 2 (2019): 393-401&quot;}\"><span style=\"color: #000000;\">22, no. 2 (2019): 393-401<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;doi\/abs\/10.1080\/09720510.2019.1582880&quot;}\"><span style=\"color: #000000;\">doi\/abs\/10.1080\/09720510.2019.1582880<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESCI&quot;}\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:21}\"><span style=\"color: #000000;\">21<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;R. Malhotra and A. Khurana, ,, &quot;}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:28,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:3355443},&quot;3&quot;:&quot;Arial&quot;,&quot;4&quot;:10}}\"><span style=\"color: #000000;\">R. Malhotra and A. Khurana, ,,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Analysis of evolutionary algorithms to improve software defect prediction,\u00a0&quot;}\"><span style=\"color: #000000;\">Analysis of evolutionary algorithms to improve software defect prediction,\u00a0<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017&quot;}\"><span style=\"color: #000000;\">2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot; pp. 301-305, 2018&quot;}\"><span style=\"color: #000000;\">pp. 301-305, 2018<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;doi: 10.1109\/ICRITO.2017.8342442&quot;}\"><span style=\"color: #000000;\">doi: 10.1109\/ICRITO.2017.8342442<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Scopus&quot;}\"><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:22}\"><span style=\"color: #000000;\">22<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Khurana, Anshu\\n and Verma, Om Prakash\\n&quot;}\"><span style=\"color: #000000;\">Khurana, Anshu<\/span><br \/>\n<span style=\"color: #000000;\">and Verma, Om Prakash<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;PSO based Optimal Text Classification using Tuned k-NN and Feature Weighting&quot;}\"><span style=\"color: #000000;\">PSO based Optimal Text Classification using Tuned k-NN and Feature Weighting<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of Information Systems &amp; Management Science,&quot;}\"><span style=\"color: #000000;\">International Journal of Information Systems &amp; Management Science,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot; Vol. 1, No. 1, 2018&quot;}\"><span style=\"color: #000000;\">Vol. 1, No. 1, 2018<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot; https:\/\/ssrn.com\/abstract=3363570&quot;}\"><span style=\"color: #000000;\">https:\/\/ssrn.com\/abstract=3363570<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:23}\"><span style=\"color: #000000;\">23<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Rohit, Sagar Kamra, Manu\\nSharma, Alka Leekha\\n&quot;}\"><span style=\"color: #000000;\">Rohit, Sagar Kamra, Manu<\/span><br \/>\n<span style=\"color: #000000;\">Sharma, Alka Leekha<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Modified SHA256 and its Comparison with Original SHA256 and SHA512, &quot;}\"><span style=\"color: #000000;\">Modified SHA256 and its Comparison with Original SHA256 and SHA512,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;International Journal of\\nEngineering, Applied and Management Sciences Paradigms&quot;}\"><span style=\"color: #000000;\">International Journal of<\/span><br \/>\n<span style=\"color: #000000;\">Engineering, Applied and Management Sciences Paradigms<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Volume 54 Issue 3 pp: 462-468,June 2019 &quot;}\"><span style=\"color: #000000;\">Volume 54 Issue 3 pp: 462-468,June 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ISSN 2320-6608&quot;}\"><span style=\"color: #000000;\">ISSN 2320-6608<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:24}\"><span style=\"color: #000000;\">24<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Alka Leekha , Shruti Bhardwaj ,Sarthak\\n&quot;}\"><span style=\"color: #000000;\">Alka Leekha , Shruti Bhardwaj ,Sarthak<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;TRANSFER AND RESIDUAL LEARNING FOR PLANT DISEASE DETECTION, &quot;}\"><span style=\"color: #000000;\">TRANSFER AND RESIDUAL LEARNING FOR PLANT DISEASE DETECTION,<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Journal of Multi\\nDisciplinary Engineering Technologies\\n&quot;}\"><span style=\"color: #000000;\">Journal of Multi<\/span><br \/>\n<span style=\"color: #000000;\">Disciplinary Engineering Technologies<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;vol 13 issue. 01 pp: 22-27, Jan-July 2019&quot;}\"><span style=\"color: #000000;\">vol 13 issue. 01 pp: 22-27, Jan-July 2019<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ISSN(Online) : 2581-9372&quot;}\"><span style=\"color: #000000;\">ISSN(Online) : 2581-9372<\/span><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Google Scholar&quot;}\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;66&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text] Sl.No Author(s)\u00a0 Title of the Article Title of the Journal\/Book\/Conference Detail Volume &amp; Issue Number, Page Numbers, Month &amp; Year of Publication ISSN\/ ISBN \/DOI No.\u00a0 Indexing If SCI, mention Impact Factor. 1 Puneet Singh Lamba, Deepali Virmani Reckoning number of eye blinks using eye facet correlation for exigency&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/7819"}],"collection":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=7819"}],"version-history":[{"count":5,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/7819\/revisions"}],"predecessor-version":[{"id":8720,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/7819\/revisions\/8720"}],"wp:attachment":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=7819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}