{"id":8044,"date":"2022-11-29T04:29:50","date_gmt":"2022-11-29T04:29:50","guid":{"rendered":"https:\/\/bvcoend.ac.in\/?page_id=8044"},"modified":"2023-01-20T03:39:39","modified_gmt":"2023-01-20T03:39:39","slug":"research-publication-a-y-2021-22-cse","status":"publish","type":"page","link":"https:\/\/bvcoend.ac.in\/index.php\/research-publication-a-y-2021-22-cse\/","title":{"rendered":"RESEARCH PUBLICATION A.Y 2021-22"},"content":{"rendered":"[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;67&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]\n<table border=\"1\" width=\"982\">\n<tbody>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\"><strong>S. No.<\/strong><\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\"><strong>Faculty name<\/strong><\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\"><strong>Paper Title<\/strong><\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\"><strong>Doi<\/strong><\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\"><strong>Indexing<\/strong><\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\"><strong>No of Citation<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" colspan=\"6\" width=\"982\"><span style=\"color: #000000;\"><strong>Journals<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">1<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Pranav Dass<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Descriptive analysis of COVID-19 patients in the context of India<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720502.2020.1761635<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">135<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">2<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Pranav Dass<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">The Review of Prediction Models for COVID-19 Outbreak in Indian Scenario<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720502.2021.2016917<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">3<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Pranav Dass and Vedika Gupta<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Pendulating or resonating? A case of echo-chambers in twitter<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720529.2021.2019442<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">4<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Pranav Dass and Vedika Gupta<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A truncated deep neural network for identifying age groups in real time images<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/09720502.2021.2016917<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">5<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A Comprehensive E-Commerce Customer Behavior Analysis Using Convolutional Methods<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107541<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">\u00a0SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">6<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Pranav Dass and Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Comprehensive Revision On The Fabrication And Designing Of Engineered Nanoparticles<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/www.researchgate.net\/publication\/357510345<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">7<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Credit Card Fraud Detection<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/publishoa.com\/index.php\/journal\/article\/view\/352<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">8<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A topical design of circularly polarized fractal boundary antenna for RF harvesting<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/02522667.2022.2037280<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">9<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Design and analysis of triangular patch antenna with enhanced bandwidth for RF energy harvesting<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/02522667.2022.2036356<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">10<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Modelling and analysis of artificial intelligence approaches in enhancing the speech recognition for effective multi-functional machine learning platform \u2013 A multi regression modelling approach<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.36909\/jer.ICMET.17161<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE, SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">11<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Implementing Critical Machine Learning (ML) Approaches for Generating Robust Discriminative Neuroimaging Representations Using Structural Equation Model (SEM)<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1155\/2022\/6501975<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE, SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">12<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A Comparative Study on Subtractive Manufacturing and Additive Manufacturing<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1155\/2022\/6892641<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE, SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">13<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Deepika Kumar<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">An Integrated Approach For Monitoring Social Distancing And Face Mask Detection Using Stacked Resnet-50 And Yolov5<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.3390\/electronics10232996<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">10<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">14<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Deepika Kumar<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Tri-Integrated Convolutional Neural Network For Audio Image Classification Using Mel-Frequency Spectrograms<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/s11042-022-13358-1<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">15<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Deepika Kumar and Shilpa Gupta<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Native Accent Sensitive Voice Cloning Using Pairwise Ranking Based Decoder Models<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">10.2316\/J.2022.201-0224<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI\/SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">16<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Rajesh Kumar<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Minimizing The Effect Of Cascade Failure In Multilayer Networks With Optimal Redistribution Of Link Loads<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1093\/comnet\/cnab043<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">17<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Rajesh Kumar<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Maintainable stochastic communication network reliability within tolerable packet error rate<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1016\/j.comcom.2021.07.023<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">5<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">18<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Deepika Varshney<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A Unified Approach Of Detecting Misleading Images Via Tracing Its Instance On Web And Analysing Its Past Context For The Verification Of Multimedia Content<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/s13735-022-00235-8<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCIE<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">19<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Rajat Gupta<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Short Term Wind Power Forecasting Using K-Nearest Neighbour (KNN)<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1080\/02522667.2022.2042093<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">ESCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">20<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Neuro-Fuzzy Network Incorporating Multiple Lexicons For Social Sentiment Analysis.<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/s00500-021-06528-0<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">\u00a0SCI<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">5<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">21<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Impact Caused By COVID-19 On Mental Health: Word- Level Analysis<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">http:\/\/jmdet.com\/wp-content\/uploads\/2022\/03\/P4-Final-Draft.pdf<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Google scholar<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" colspan=\"6\" width=\"982\"><span style=\"color: #000000;\"><strong>Conferences<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">1<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Prof. Dharmender Saini<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Evaluation and Performance Analysis of Apache Pulsar and NATS<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-16-3961-6_16<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">2<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Predicting Personalities Through Online Posts Using NLP<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-19-5037-7_62<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">3<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Stress Prediction Using Machine Learning and IoT<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-16-6285-0_49<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">4<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A Dynamic Approach of Eye Disease Classification Using Deep Learning and Machine Learning Model.<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-981-16-6289-8_59<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">5<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Implementation Of Data Mining Tools To Classify Protein Structural Class From Residue Based Averaged NMR Chemical Shifts<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">10.1109\/ICAECA52838.2021.9675628<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">6<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Heart Attack Anxiety Disorder using Machine Learning and Artificial Neural Networks (ANN) Approaches<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1109\/ICACITE53722.2022.9823697<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">7<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Empirical Analysis of Deep Learning for Big Data and Its Applications using CNN<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1109\/ICACITE53722.2022.9823927<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">8<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">SentiSpotMusic: a music recommendation system based on sentiment analysis<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">10.1109\/ICRTCST54752.2022.9781862<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Google scholar<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">9<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">A Novel Recurrent and Convolutional Neural Network Technique for Generating Handwriting from Voice<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">10.1109\/ICIRCA51532.2021.9544925<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">Google scholar<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">10<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Prof. Dharmender Saini and Vedika Gupta<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Computational Intelligence for Information Retrieval<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1201\/9781003134138<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">11<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Jolly Parikh and Anuradha Basu<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Unmanned Aerial vehicles: State of art, challenges and Future Scope<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1002\/9781119769170.ch2.<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">12<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Real-Time Anomaly Detection Surveillance System.<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">10.1007\/978-981-16-6289-8_54<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">SCOPUS<\/span><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">13<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Prof. Dharmender Saini and Preeti Nagrath<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Understanding New Age of Intelligent Video Surveillance and Deeper Analysis on Deep Learning Techniques for Object Tracking<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-3-030-89554-9_2<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">3<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">14<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Prof. Dharmender Saini<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Measuring Clock Reliability in Cloud Virtual Machines<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-3-030-75614-7_6<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">15<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Prof. Dharmender Saini<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Characterization and Benchmarking of Message-Oriented Middleware<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1007\/978-3-030-75614-7_9<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">16<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Preeti Nagrath\u00a0<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Novel defending and prevention technique for man in the middle attacks in wireless networks<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/doi.org\/10.1002\/9781119836636.ch7<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">17<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Recent Trends and Innovations in Information Technology (RTIIT)<\/span><\/td>\n<td width=\"342\"><span style=\"color: #000000;\">https:\/\/www.researchgate.net\/publication\/355168121<\/span><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">18<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Elements of Cloud Computing<\/span><\/td>\n<td width=\"342\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">19<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Textbook of Computational Intelligence<\/span><\/td>\n<td width=\"342\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">20<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Role of ICT in Effective Dissemination of Technical Education- A<\/span><\/p>\n<p><span style=\"color: #000000;\">Systematic Review<\/span><\/td>\n<td width=\"342\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><span style=\"color: #000000;\">21<\/span><\/td>\n<td width=\"130\"><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td width=\"283\"><span style=\"color: #000000;\">Information Systems And Technology For Entrepreneurs And Managers<\/span><\/td>\n<td width=\"342\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\"><span style=\"color: #000000;\">0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;67&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text] S. No. Faculty name Paper Title Doi Indexing No of Citation Journals 1 Pranav Dass Descriptive analysis of COVID-19 patients in the context of India https:\/\/doi.org\/10.1080\/09720502.2020.1761635 ESCI 135 2 Pranav Dass The Review of Prediction Models for COVID-19 Outbreak in Indian Scenario https:\/\/doi.org\/10.1080\/09720502.2021.2016917 Google Scholar 1 3 Pranav Dass&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8044"}],"collection":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=8044"}],"version-history":[{"count":6,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8044\/revisions"}],"predecessor-version":[{"id":9195,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8044\/revisions\/9195"}],"wp:attachment":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=8044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}