Thursday, June 20, 2019             Toll Free: 1800-1800-190            Email: registrar@davuniversity.org
LATEST UPDATES
Result of Term 18192 has been declared
Tender for Hostel Mess, Canteen, Kiosks, books & Stationery Shop, Security, Housekeeping and Mali, Allied Services (Drivers, Conductors-cum-Peon) and Transport Services Click Here
Advertisement For The Post Of Teaching (Professors / Associate Professors / Assistant Professors) And Non-Teaching Staff Click Here
Class work will start from July 22nd, 2019 for new students and July 23rd, 2019 for old students
Advertisement for Admission to PhD (Full Time & Part Time) Programme for the Session July, 2019 Click Here
Ph.D 2018-19 Jan Intake Interview Result Click Here

Department of Computer Science and Engineering Publications

Sanjeev Dhiman

  • Thakur, and Dhiman, S. (2015). An Efficient Image Segmentation Technique by  Integrating FELICM with Negative Selection Algorithm, 8(10): 63-70. 
  • Mahajan, and Dhiman, S. (2016) Prevent and Isolate Black Hole Attack in Manet Using Alarm. IOSR Journal of Computer Engineering (IOSR-JCE), 18(3) :68-72. 
  • Dhiman,S., Gupta, T. and Kaur, A. (2012). A Survey On Cloud Computing and its Techniques, 3(1): 93-97. 
  • Kaur, P.,Dhiman,S., and Kaur, K. (2013) A methodology oncryptography applicant to mobile adhoc network & wireless sensor network and wireless sensor network, 1(3): 48-54.
  • Sunaina and Dhiman,S. (2013) Survey on security threats of wireless & mobileAd-hoc network, 2(2): 4-8. 
  • Dhiman,S. (2012) Comprehensive Study of Object-Oriented Analysis and Design by using the concept of OOSE. International journal of Computer Science and Technology, 2(3).

 

 

Nishi Madan

 

  • Goyal, S., & Nishi, E. (2016). Local Linear Reconstruction Based Medical Image Registration in DWT Domain, 8(3), 289–302.
  • Kansal, K., & Nishi, E. R. (2016). Automated detection of exudates for diabetic retinopathy screening in fundus images using CS-ACO optimization approach. International Journal of Bio-Science and Bio-Technology, 8(3), 323–340. http://doi.org/10.14257/ijbsbt.2016.8.3.33
  • Gujral, E. R., & Nishi, E. (2015). A Novel technique for the Detection of Mixed Noise in Medical Images using Data mining, 8(11), 231–242.
  • Kaur, P., & Nishi. (2015). Single image dehazing using adaptive restoration factor in dark channel prior. International Journal of Software Engineering and Its Applications, 9(8), 149–158.
  • Kaur, R., & Nishi. (2015). Automated Classification of Research Papers Using Hybrid Algorithm. International Journal of Hybrid Information Technology, 8(6), 95–106.
  • Monika & Nishi (2018), A Review on Bug Report Assignment, International Journal of Software Engineering and Its Applications, 12(1),1-20.

 

 

Rahul Hans

 

  • Bagga, P., & Hans, R. (2015). Applications of mobile agents in healthcare domain: a literature survey. International Journal of Grid Distribution Computing8(5), 55-72.
  • Bagga, P., Hans, R., & Sharma, V. (2017). A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture. Expert Systems with Applications72, 269-282.
  • Bagga, P., Hans, R., & Sharma, V. (2017). N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents. International Journal of Interactive Multimedia & Artificial Intelligence4(6).
  • Bagga, P., & Hans, R. (2017). Mobile Agents System Security: A Systematic Survey. ACM Computing Surveys (CSUR)50(5), 65.
  • Hans, R., & Kaur, R. (2012, December). Novel dynamic shadow approach for fault tolerance in mobile agent systems. In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on(pp. 1-6). IEEE.
  • Hans, R., & Kaur, R. (2014, March). Location tracking in mobile agents system using forward and backward pointers. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in(pp. 1-5). IEEE.

 

Chapter

  • Mahajan, R., & Hans, R. (2014, September). A novel comparison based approach for fault tolerance in mobile agent systems. In International Symposium on Security in Computing and Communication(pp. 221-229). Springer, Berlin, Heidelberg.

 

 

Dr. Sankalap Arora

  • Arora, S., & Singh, S. (2018). Butterfly optimization algorithm: a novel approach for global optimization. Soft Computing, 1-20.
  • Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 1-21.
  • Arora, S., Singh, S., & Yetilmezsoy, K. (2018). A modified butterfly optimization algorithm for mechanical design optimization problems. Journal of the Brazilian Society of Mechanical Sciences and Engineering, 40(1), 21.
  • Arora, S., & Anand, P. (2017). Chaos-enhanced flower pollination algorithms for global optimization. Journal of Intelligent & Fuzzy Systems, 33(6), 3853-3869.
  • Joshi, H., & Arora, S. (2017). Enhanced Grey Wolf Optimization Algorithm for Global Optimization. Fundamenta Informaticae, 153(3), 235-264.
  • Arora, S., & Singh, S. (2017). Node Localization in Wireless Sensor Networks Using Butterfly Optimization Algorithm. Arabian Journal for Science and Engineering, 42(8), 3325-3335.
  • Arora, S., & Singh, S. (2017). An improved butterfly optimization algorithm with chaos. Journal of Intelligent & Fuzzy Systems, 32(1), 1079-1088.
  • Arora, S., & Singh, S. (2017). An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization. International Journal of Interactive Multimedia & Artificial Intelligence, 4(4).
  • Kohli, M., & Arora, S. (2017). Chaotic grey wolf optimization algorithm for constrained optimization problems. Journal of Computational Design and Engineering.
  • Kaur, R., & Arora, S. (2017). Nature Inspired Range Based Wireless Sensor Node Localization Algorithms. International Journal of Interactive Multimedia & Artificial Intelligence, 4(6).
  • Kaur, G., & Arora, S. (2018). Chaotic Whale Optimization Algorithm. Journal of Computational Design and Engineering.

 

 

Dr. Harpreet Singh

 

  • Singh, H., & Dhir, R. (2013). A New Efficient Matrix Based Frequent Itemset Mining Algorithm with Tags. International Journal of Future Computer and Communication, 2(4), 355.
  • Singh, H., & Kaur, P. (2014). A survey of transformation based website structure optimization models. Journal of Information and Optimization Sciences, 35(5-6), 529-560.
  • Singh, H., & Kaur, P. (2014). Website structure optimization model based on ant colony system and local search. IJ Information Technology and Computer Science, 11, 48-53.
  • Singh, H., Kaur, M., & Kaur, P. (2017). Web page recommendation system based on partially ordered sequential rules. Journal of Intelligent & Fuzzy Systems, 32(4), 3009-3015.
  • Singh, H., & Dhir, R. (2012). An Effective Method for Association Rule Mining based on Transactional Matrix. International Journal of Computer Applications, 39(9), 13-15.
  • Singh, H., & Kaur, P. (2016). Ant Colony System-Based E-Supermarket Website Link Structure Optimization. In Proceedings of Fifth International Conference on Soft Computing for Problem Solving (pp. 249-259). Springer, Singapore.
  • Kaushal, C., & Singh, H. (2015, October). Comparative study of recent sequential pattern mining algorithms on web clickstream data. In Power, Communication and Information Technology Conference (PCITC), 2015 IEEE (pp. 652-656).

 

Ridhi Kapoor

 

 

 

 

Aarti

  • Aarti, Verma, K. and Rajput, P K (2012) Color Secret Sharing with Ideal Contrast using Bit Plane Encoding with (k,n) VCS. In Proceeding of National Conference on Recent Advances in Communication, Control and Computing Technology(RACCCT), ISBN: 978-81-88894-34-5, 326-331.
  • Aarti, Verma, H. K. and Rajput, P K (2012) Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n)-VCS.International Journal Of Computer Application, 46(9): 36-41.
  • Aarti, Verma, H. K. and Rajput, P K (2012) An Overview of Visual Cryptography with Some Important Parameters.Journal of Current Engineering Research, 2(3), 0976-8324, 38-42.
  • Aarti, Verma, H. K. and Rajput, P K (2012)Multiple Secret Sharing Scheme with Grey-Level Mixing Using EVCS. presented in International Conference on Issues and Challenges in Networking, Intelligence and Computing Technologies (ICNICT-2012) published in IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(2):24-29.
  • Aarti and Rajput, P. K. (2012) An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding. International Journal of Computer Network and Information Security,6(2): 54-60.
  • Aarti, Verma, H. K. and Rajput, P K (2012)A Novel Multi Secret Sharing Scheme with MSB Extraction Using EVCS. presented in 6thInternational Conference on Contemporary Computing( IC3 2013): pp 169-174, proceeding in ieee explorer, Noida.   
  • Rajput, P. K., Nagpal, G. and Aarti (2013) Feature Weighted Unsupervised Classification Algorithm and Adaptation for Software Cost Estimation. International Journal of Computational Intelligence Studies,3(1): 74-93.
  • Rajput, P. K., Nagpal, G. and Aarti (2014) CGANN-Clustered Genetic Algorithm with Neural Network for Software Cost Estimation. International Conference on Advances in Engineering and Technology (ICAET'2014): 29-30.
  • Aarti, Sikka, G. and Dhir, R. (2016) An investigation on the effect of cross project data for prediction accuracy. International Journal of System Assurance Engineering and Management, 7(1), 1-26, March 2016.
  • Aarti, Sikka, G. and Dhir, R. (2016) An Investigation on the Metric Threshold for Fault- Proneness. International Journal of Education and Management Engineering (IJEME),MECS,1(1): 1-8.
  • Aarti, Sikka, G. and Dhir, R. (2016) Identification of Error Prone Classes and quality estimation Using semi-supervised learning Mechanism with limited fault data. In proceeding of Recent Research in “Mechanical, Electrical, Electronics, Civil, Computer Science and Information Technology” (MECIT-2017), New Delhi. January 2016.
  • Aarti, Sikka, G. and Dhir, R. (2017) Threshold based Empirical Validation of Object-Oriented Metrics on Different Severity Levels, International Journal of Intelligent Engineering Informatics (IJIEI), Inderscience. (Accepted).

 

Shifali Katoch

  • S. andKalra, S. (2015) Security Issues Concerning Next Generation of Cloud Computing and its Current Status, IMTC-2015.
  • Kaur, S. and Katoch, S. (2017), Security Protocols for Internet of Things(IoT)- A Survey, Journal of Advance Research in Cloud Computing, Virtualization and Web Applications, 4(1).

 

Garima Jain

  • Jain, G. (2016) A Study of Bayesian Classifiers Detecting Gratuitous Email Spamming. Communications on Applied Electronics (CAE) Foundation of Computer Science FCS, New York, USA: 6(2).
  • Jain,G. Kakkar,P. (2016) A proposal of Improved K-means algorithm for detecting gratuitous Email Spamming. International Journal of Modern Computer Science August, 2016 RES Publication
  • Jain,G. A survey on variour classifiers detecting gratutious Email Spamming. International Journal of Engineering Applied Sciences and Technology.

 

 

Sangeeta Bhatti

  • Bhatti, S. and Sharma, S. (2015) A Novel Algorithm Approach for Detection of Sybil Attack in MANET.International Journal of Advanced Research in Computer Science and Software Engineering,5(5): 1680-1685.

 

 

Mission

To facilitate the society to have a broad, encompassing access to knowledge and education, and to assist individuals unravel deeper dimensions of learning and experimentation. To enable students become imaginative, integrated beings who constructively and creatively contribute to environment and society and who ...
Know More »

Vision

To ardently seek, consider and implement latest nuances, developments and innovations in Sciences, Languages, Engineering and Technology, Business Studies and Computer Sciences in order to ensure that students develop a holistic acumen for making strategic and judicious decisions in the local and global spectra ...
Know More »

Contact us

  DAV University

SARMASTPUR, Jalandhar - Pathankot, National Highway (NH 44), JALANDHAR - 144 012, Punjab

  Admission Enquiry: 0181-2372900, 070870-17551,070870-17552,
098766-05777,
Toll Free ( 1800-1800-190 )

  Registrar Office ( +91-181-2708845 )

  registrar@davuniversity.org

  Exam Cell Helpline: 0181-2708842

  ar.recordcell@davuniversity.org

  ESTATE OFFICE - 0181-2708831

Copyright © 2019, DAV University. All Rights Reserved.