Best Paper Awards
Best paper award for the paper “Secure approach for remote voting system using visual cryptography and SHA” in IEEE International conference ICCUBEA 2016
Best paper award for the paper “An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image” in IEEE International conference ICCUBEA 2018
Publications
"Identify and classify pests in the agricultural sector using metaheuristics deep learning approach," Franklin Open, Volume 3, June 2023, 100024
"Energy-aware UAV based on blockchain model using IoE application in 6G network-driven cyber twin ", Energies, MDPI, 2022, 15(21), 8304,
"Implicant Based Solver for XOR Boolean Linear Systems", SpringSim-HPC 2017, April 23-26, Virginia Beach, VA, USA, pp.556-567; ISBN: 1-56555-361-6 DOI: 10.22360/springsim.2017.hpc.029 Conference: Proceedings of the 25th High-Performance Computing Symposium and ACM digital library
"SizeAR – Online apparel trial system for customers using AR", International Journal of Computer Applications, 2022, Volume 184, ISBN: 10.5120/ijca2022921961
"Security of User Credentials on Web Portals," 2021 IEEE International Conference on Computing, Communication and Green Engineering (CCGE), pp. 1-4, doi: 10.1109/CCGE50943.2021.9776476.
"Image Captioning using Neural Network Model," IEEE International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), 2022, pp. 1-3, doi: 10.1109/ICSTSN53084.2022.9761320.
"Review Paper on: University Admission Prediction Using Google Vertex AI", IEEE, International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR) - 2022
Security Enhancement of Forensic Evidences Using Blockchain, IEEE ICICV 2021.
Knowledge Transfer to Preschoolers based on Augmented Reality”, IEEE ICICCS 2021
Contactless Elevator Based On Hand Gestures Useful During Covid 19 Like Pandemics”, IEEE ICACCS 2021
Development of a effective system to identify fruit ripening system for apple, banana and mango”, International Journal of advanced science and technology, 2005-4238
Phobia environment simulation and object modeling using augmented reality”, International Journal of advanced science and technology, 2005-4238
Cloud based Framework for Secure Sharing of Medical Reports”, International Journal of Computer Applications, 2019,Volume 182
Security of Audio File based on Partial Encryption ”,International Journal of Computer Applications, 2019,Volume 178, ISBN: 973-93-80900-13-8
A Survey Paper on Audio Security”, Journal of Information Technology and Science,2018, Volume 4, issue 3
Medical Image Security on Cloud”, i-PGCON, 2018
An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image” , IEEE conference, ICCUBEA 2018
Best paper award for the paper “An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image” in IEEE International conference ICCUBEA 2018
Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography, IJCA, 2017, VOL 179.
Visual Cryptography for Security of Images”,Journal of Network Security Computer Networks(MAT Journal) Volume 4 Issue 1,Jan 2018
Automated analyzer to assess multilingual websites with reference to localization guidelines”, IEEE 2017.
E-Voting System based on Mobile using NIC and SIM, IJCA,2017,VOL 165.
Parallel Implementation of Pohlig-Hellman to Compute Discrete Logarithms”, IJCA, 2017, VOL 166
Evaluation of multilingual websites using localization matrix”, IEEE,2017.
Integrity Check of Shared Data on Cloud with Various Mechanisms”, International Journal of Computer Applications, 2017, VOL 159.
Secure approach for remote voting system using visual cryptography and SHA”, International Conference on Computing, Communication, Control And Automation, IEEE,2016.
Anti-Phishing framework using Word based image CAPTCHA and Halftone Visual Cryptography”, International Conference on Automatic Control and Dynamic Optimization Techniques, IEEE, 2016.
A Review on Anti-Phishing based on halftone visual cryptography”, International Conference on Research in Intelligent Computing in Engineering (RICE-2016).
A Review on Various Digital Image Secret Sharing Schemes”, International journal of Advanced Research in computer science and management studies, 2016, ISSN: 2321-7782.
Security of grayscale images by vss with novel method of bit-plane slicing”, IEEE conference on emerging devices and smart systems,2016.
Authentication of gray scale forensic image using visual secret sharing”, IEEE conference on emerging devices and smart systems,2016.
“Secure approach for remote voting system using visual cryptography and SHA” in IEEE International conference ICCUBEA 2016
Reduction of Transmission Risk Problem in Image Security using Diverse Image Media”, International Conference on Communication, Computing and Virtualization, 2016 Elsevier.
Attacks on Elliptical Curve Cryptography Discrete Logarithm Problem”, International Journal of Innovative research in Electronics, Electrical, Instrumentation and Control Engineering, Vol. 3, Issue 4, April 2015.
A Methodology for Securing a Database using ECC with Cache”, International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 188-195.
Framework for Client Side AES Encryption Technique in Cloud Computing”, IEEE International Advance Computing Conference, IACC 2015.
Two Level Encryption based on One Time Pad and Koblitz Method of Encoding”, International Journal of Computer Applications, Volume 122, 10.5120/21773-5041.
Designing a database encryption technique for database security solution with cache”, IEEE International Advance Computing Conference, IACC 2015.
Novel Unique Technique for generating Ticket Identifier Using Image Texture Patterns, International Journal of Engineering Research and Applications, vol 4, Issue 5 May 2014.
High speed access of XML documents, International Conference held on 4th and 5th March 2009.
Exploring feasibility of graphical Passwords, in the National Conference on Advances in Engineering, Management and General Sciences, held on 28-29 April 2011.
Advances in Software Engineering, in the National Conference on Advances in Engineering, Management and General Sciences, held on 28-29 April 2011.
Bitmap Indexing, Clustering and Compression for XML documents”, National conference on Emerging Trends in Engineering and Management, held on 3rd and 4th of March 2008.
Cryptanalysis of Mobile agents, in the National conference on Emerging Trends in Electronics and Telecommunication, held on 16th and 17th April 2007.
Statistical Analysis, Bitmap Indexing and Compression for XML Authorization and Query Optimization, National conference held on 23-24 Nov 2007.