Resume



right-486410Curriculum VitaeName & Designation:Dr. Hemraj SainiAssociate ProfessorDepartment of Computer Science & Engineering/ITJaypee University of Information Technology, Waknagahat-173234.Address for Communication: C/o Sh. K. S. CHAUHAN, 116, Housing board, Saproon, solan-173212 Cell: 08894969853; E-mail: hemraj1977@yahoo.co.in; hemraj.saini@juit.ac.inField of Specialization: (a) Major: Computer Science (b) Minor: Network Security, Mobile Edge Computing, Cloud ComputingExperience : 23 years of teaching and research experience in Computer Science & Information Technology (Including (01) one year International experience).Supervision : Completed PhD: 06; Submitted PhD: 00; Working PhD: 06; PG Projects: 07;UG Projects: 45Indian Patents : Published: 06; Filed: 01International Patents : Granted (Australia): 03; Published: 00; Filed: 00Research Publications/ Presentations: 154 [Book(s):04; Book Chapter(s):16; Journal(s): 94; Conference(s): 40]Membership of Professional BodiesAssociation of Computing Machinery (ACM Membership No.-5156611) since from 26th July, 2013.Institute of Electrical and Electronics Engineers (IEEE) Membership (Membership No.-92738007) since from 17th October, 2013.International Association of Engineers (IAENG) Membership (Membership No.:- 133186) since from 29th August, 2013.Journal Guest EditorCalls for Papers for Special Issue on?The Role of Reliable Secure and Green Computing in Wireless Sensor Networks,?International Journal of Sensors, Wireless Communications and Control (eSCI, SCOPUS), Benthem Science, Netherlands, Submission Due Date: 30.05.2019.EditorialsRajiv Kumar,?Hemraj Saini (2020). Secure, Resilient and Green Computing in Wireless Sensor Networks, Recent Advances in Electrical & Electronic Engineering, 13(2): 128 – 129. DOI:?10.2174/235209651302200224110206Research Guidance Leading to Ph. D. DegreeCompletedDr. Yerra Sankar Rao (2011-2018), “A mathematical study for the current generation cyber crimes, ITER, Bhubaneswar (Orissa).Dr. Gautam Kumar (2013-2017), “On Security and Performance in ECC Noncommutative Cryptography and Signcryption”, JUIT, Wakanaghat (H.P.).Dr. Geetanjali (2014-2017), “On Security and Performance Enhancement in Wireless MESH Networks”, JUIT, Waknaghat (H.P.).Dr.Pratiksha Gautam (2013-2019), “Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones”, JUIT, Wakanaghat (H.P.).Dr.Oshin Sharma (2013-2017), “Energy Efficient Virtual Machine Consolidation for Cloud Environment”, JUIT, Wakanaghat (H.P.).Dr. Shivi Sharma [166204] (2016-2019), “Secure Delay Aware Scheduling and Load Balancing along with Reduced Energy for Deadline Sensitive Applications in Fog Computing Environment”, JUIT, Wakanaghat (H.P.).OngoingMr. Digvijay Puri [176206] (2017 – Till Now), “Data Science”, JUIT, Wakanaghat (H.P.).Mr. Surjeet Singh [186215] (2018 – Till now), “Image Forensics”, JUIT, Wakanaghat (H.P.).Mr. Ashok Kumar Tripathi [186207] (2018 – Till now), “Advancements in Data Mining” , JUIT, Wakanaghat (H.P.).Mrs. Pratibha Sharma [186202] (2018 – Till Now), “Security concerns in FOG/Mobile Edge computing”, HPU, Shimla (H.P.).Mrs. Anju Devi [196206] (2018 – Till Now), “Blockchain Technology”, JUIT, Wakanaghat (H.P.).Ms. Charvi Vij [206209] (2021 – Till Now), “Cyber Security”, JUIT, Wakanaghat (H.P.).Discountinued/DroppedMr. Nitin Bhradwaj (2013 – Dropped), “Security Issues in WMN “, JUIT, Wakanaghat (H.P.).Educational QualificationDegreeUniversityYearSubjectPercentagePh. D. Utkal University, Bhubaneswar (Orissa)2012Computer Science; Title- “Defending against Malicious Objects in Computer Networks”M. Tech. Panjabi University, Patiala (Punjab)2005Information Technology80%B. Tech. Regional Engg. College, Hamirpur (H.P.) now NIT, Hamirpur1999Computer Sc. & Engg.68%10+2Board of Ajmer, Rajasthan1993Science & Mathematics69%10thBoard of Ajmer, Rajasthan1991General77%Employment DetailsName of the Employer Date of Joining / LeavingDesignationNature of Duty / WorkJaypee University of Information Technology, Waknagahat-173234.30/09/2016 To Till DateAssociate ProfessorTeaching, Course Design, Research & DevelopmentJaypee University of Information Technology, Waknagahat-173234.17/08/2012 To 29-09-2016Assistant Professor (Sr.Grade)Teaching, Course Design, Research & DevelopmentAlwar Institute of Engineering & Technology, Alwar10/10/2011 To 14/08/2012Associate Professor & Head (CS&E)Administration, Teaching, Research & DevelopmentOrissa Engineering College25/01/2011 To 09/10/2011Associate Professor & Head (CS&E)Administration, Teaching, Research & DevelopmentOrissa Engineering College01/10/2010 To 24/01/2011Associate Professor (IT)Teaching, Research & DevelopmentOrissa Engineering College24/09/2008 To 30/09/2010Assistant Professor(till 30/09/2010)Teaching, Research & DevelopmentHigher Institute of Electronic, Bani Walid (Libya)20/10/2007 To 03/08/2008LecturerTeaching, Lab Setting, consultancy to the institute for IT infra.BITS, Pilani22/06/2005 To 15/10/2007LecturerTeaching, Research & DevelopmentIET, MIA, Alwar ?17/11/2000 To 15/06/2005Asstt. Prof , Sr. Lecturer & HOD(CSE)Teaching for UG/PG with system adm. for the instituteREIL, Jaipur (A Public Sector Unit)20/06/2000 To 05/11/2000Software EngineerS/W development and analysis for developing an ERP for a/c softwareDataman Systems, Delhi05/07/1999 To 20/12/1999ProgrammerJAVA and SQLLanguages Known?HindiExpert (Read, Write, Speak)EnglishProficient (Read, Write, Speak)SanskritBeginner (Read, Write)Personal Details?Date of BirthPermanent AddressMailing AddressAlternate Email Id2nd April, 1977A-127, Apna Ghar Shalimar Extension, Alwar, Rajasthan-301001C/o Sh. K. S. CHAUHAN, 116, Housing board, Saproon, solan-173212 (H.P.)sailviya@Consultancy Work:Conenor, Curriculum Aspects, Institute Quality Assurance Cell, Academic Session 2021-22, Jaypee University of Information Technology, Waknaghat, India.Faculty Member, Website Committee, 10-09-2021 to till date, Jaypee University of Information Technology, Waknaghat, India.Chair, Registration Committee, 2021 Sixth International Conference on Image Information Processing (ICIIP -2021), November 26 - 28, 2021, Jaypee University of Information Technology, Waknaghat, India.Member Technical Program Committee, 2021 Sixth International Conference on Image Information Processing (ICIIP -2021), November 26 - 28, 2021, Jaypee University of Information Technology, Waknaghat, India.Member Technical Program Committee, 6th International Conference on Signal Processing, Computing and Control (ISPCC 2k21), 07-09 October, 2021, Jaypee University of Information Technology, Waknaghat, India.Member PUBLICITY COMMITTEE, 6th International Conference on Signal Processing, Computing and Control (ISPCC 2k21), 07-09 October, 2021, Jaypee University of Information Technology, Waknaghat, India.Reviewers for 6th IEEE International Women in Engineering Conference on Electrical and Computer Engineering (WIECON-ECE 2020), Bhubaneswar, India, 26 - 27 December 2020.Keynote Speaker, 4th Edition of International Conference on Communications and Cyber-Physical Engineering, 9th-10th April, 2021, Department of Computer Science and Engineering, CMR Engineering College, Hyderabad, 10th April, 2021 [1245-1300]. Title of the Talk: Aspects and Relations of Cyber Physical Systems, Internet of Things and Smart Service Systems: Understanding and Research Challenges.Resource Person, “Machine Learning and IoT: Industry 4.0”, Department of Computer Science and Engineering, CMR Engineering College, Hyderabad, 9th Jan, 2021. Title of the Talk: Emergence of IoT, IIoT and AIoT Co-Coordinator, Patents, “Innovation & Start Up’s”, 17th October, 2020, IPR Cell, Jaypee University of Information Technology, Waknaghat.Resource Person, Computational Intelligence Techniques for Machine Learning [CITML], University of Information Technology, Waknaghat, 31st August, 2020 to 05th September, 2020. Title of the Talk: Internet and Telecom Convergence: Supportive Emergent Technologies.Coordinator, Two Weeks National Level Faculty Development Program on “Ambient Technologies: State-of- Art, Challenges, and Future Directions” during 27th July, 2020 to 8th August, 2020, Jaypee University of Information Technology, Waknaghat.IPR Co-Coordinator, Jaypee University of Information Technology, Waknaghat, Coordinating the compilation of various IPR related activities, 29th July, 2020 to Till now.NAAC Coordinator, Jaypee University of Information Technology, Waknaghat, Coordinating the compilation of various NACC related activities, 2017 to Till Now.NBA Coordinator, Jaypee University of Information Technology, Waknaghat,Coordinating the compilation of various NBA related activitiesSession Chair, 2019 Fifth International Conference on Image Information Processing (ICIIP 2019),November 15-17, 2019, Jaypee University of Information Technology, IndiaNodal Coordinator for virtual labs an initiative of Ministry of Human Resource Development under National Mission on Education through ICT from July 2018 to Till DateUGC Grievance Committee Member, Jaypee University of Information Technology, Waknaghat, Coordinating the compilation of various student grievances reported to UGC.Coordinator for Data collection from Final Year (GATE, Exit Survey, Foreign University Admissions etc.), Compiling the related data at departmental data.Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2018 for REF. NO HimTu(Exam-III) M.Tech. B-147/2017-7231dated 26-11-2019 to [Ms. Kiran Thakur; MT130304; Improvement in Life-time of Sensor devices in IoT].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2018 for REF. NO HimTu(Exam-III) M.Tech. B-147/2017-7231dated 26-11-2019 to [Ms. Jyoti Thakur; MT130302; Feature Extrction and Classification Method for Face Spoof Detection].Chief Coordinator, Registration Desk and Help Desk, 2019 Fifth International Conference on Image Information Processing (ICIIP 2019),November 15-17, 2019, Jaypee University of Information Technology, IndiaRegistration Committee Chair, 2019 Fifth International Conference on Image Information Processing (ICIIP 2019),November 15-17, 2019, Jaypee University of Information Technology, IndiaStudent Exchange Data Management Coordinator, Jaypee University of Information Technology, Waknaghat, Supporting student exchange data management at departmental level.Departmental level Virtual Lab Coordinator, Jaypee University of Information Technology, Waknaghat, Supporting all vlab related activities at departmental activities including incorporating at least two(02) experiments in each lab course.Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2018 for REF. NO HimTu(Exam-III) M.Tech. B-147/2017-7737 dated 20-01-2018 to [Mr. Amit Kumar Sharma; MT30242; A two Tier Binary Image Security Algorithm Based on Visual Cryptography Scheme and Lifting Wavelet Transform].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2018 for REF. NO HimTu(Exam-III) M.Tech. B-147/2017-969 dated 01-06-2018 to [Mr. Shammi Kumar; MT1221; Energy Utilization by using Cache based Scheme in Wireless Sensor Networks].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2018 for REF. NO HimTu(Exam-III) M.Tech. B-147/2017-977 dated 04-06-2018 to [Mr. Abhay Chaaudhary; MT1201; Design of FIR Filters with Arbitrary Amplitude and Phase Specifications usingOptimization Techniques].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2017 for REF. NO HimTu(Exam-I)A-45/2013-9740 dated 13-06-2017 to [Ms. Komal Patiyal; 17MT5023910; A Comprehensive Syudy and Enhancement of Bug Tracking System].Member of Grievance and disciplinary committee [JUIT/WKG/REGR/2017-18/116] 1st September, 2017Member of Inquiry committee [JUIT/WKG/REGR/2017-18/055] 2nd August, 2017Paper Setter for Artificial Intelligence and Neural Networks for Bahra University, Shimal , June-December, 2017.Paper Setter for System Software for Bahra University, Shimal , June-December, 2017.Reviewer for 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC 2017)Nodal Coordinator for virtual labs an initiative of Ministry of Human Resource Development under National Mission on Education through ICT from 29.07.2016 to Till DateLocal Coordinator of Short Term Course on (STC) on "Cyber Crime and Forensic Tools Through ICT" from 06 - 10 Feb, 2017 in association with NITTTR Chandigarh at JUIT.Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2016 for REF. NO HimTu(Exam-I)A-45/2013-9740 dated 21-06-2016 to [Aditi Sharma; MT30239; Credit Based Scheduling using Deadline in Cloud Computing Environment].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2016 for REF. NO HimTu(Exam-I)A-45/2013-9747 dated 21-06-2016 to [Anjana Kumari; MT30245; Fusion of Scale Invariant Feature Transform and Wavelet Transform Techniques for Object Detection].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, June, 2016 for REF. NO HimTu(Exam-I)A-147/2016/15251 dated 21-06-2016 to [Ashu Suman; MT1227; Data Content Based Image Retrival with Sure, SVM and K-Means].Reviewer for the PLOS ONE since 2016 to till date.Member of M Tech CSE (Software System Security) Program Formation Departmental Committee; Department of Computer Science & Engineering, Jaypee University of Technology, Dated: 30-03-2016.Member of Oral Defense committee (University Level) for PhD Thesis entitled " Medium Access Control Protocol for Spectrum Sharing in Cognitive Radio communication System" submitted by Ms. Shweta Pandit, Jaypee University of Technology, Waknaghat, Enrol. No. 126001 viva order no. JUIT/WKG/REG/2015-16 dated 27 October, 2015.Member of Departmental PhD VIVA Committee (University Level) for Ms. Ashima Mittal; Jaypee University of Technology, Waknaghat, Enrol. No. 126564; JUIT/WKG/REG/2015-16 dated 16 November, 2015Member of Enquiry Committee (University Level) viva order no. JUIT/WKG/REGR/2014-15, dated 27th Junary, 2016 at Jaypee University of Information Technology, Waknaghat, Solan.Expert Lecture delivered at Culcutta Institute of Technology, Kilkata, West Bengal, 13-14 November, 2015 on "Recent Trends in Security of Wireless Mesh Networks".Member of Program Committee to Second International conference on Intelligent Information Processing, Security and Advanced Communication (IPAC'2016), Prague, Czech Republic, 5-6 December, 2016,Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, Jan, 2016 for REF. NO HimTu(Exam-I)A-45/2013-237 dated 01-01-2016 to [Bharti Thakur; MT1205; Data Mining with Big Data using C4.5 and Basiyan Classifier].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, Jan, 2016 for REF. NO HimTu(Exam-I)A-45/2013-569 dated 27-01-2016 to [Shivi sharma; MT30259; An Energy Efficient Swarm based Routing Protocol for MANET].Thesis (M.Tech.) Evaluator to Himachal Pradesh Technical University, Jan, 2016 for REF. NO HimTu(Exam-I)A-45/2013-15453 dated 19-12-2015 to [Anchal Thakur; MT30243; Multicore Efficient Scheduling for Operating System to avoid Congestion in client-Server Architecture] & [Shivi Sharma; MT30259; An Energy Efficient Swarm based Routing Protocol for MANET].Paper setter for Shoolini University, Solan, April, 2015Editorial Members of American Journal of Networks and Communications, 10th January, 2015 to till now.Conference Chair for "Third International Conference on Image Information Processing - ICIIP2015", December 10-13, 2015, JUIT, Waknaghat-Solan, India. Visit: for the Crime, Law and Social Change (Springer) since 2014 to till date.Program Chair for “The Third IEEE International Conference on Parallel, Distributed and Grid Computing - PDGC -2014”, December 11-13, 2014, JUIT, Wakanghat, Solan, India. Visit: Editorial Board for “ABBE-2014, Second International Conference on Advances in Bioinformatics, Bio-Technology and Environmental Engineering”, Nov. 16-17, 2014, Birmingham, UK. Visit: Editorial Board for “Second International Conference on Advances in Social Science, Economics and Management Study - SEM 2014”, 16-17, 2014 at Birmingham, UK Visit: Editorial Board for “International Journal of Advancements in Mechanical and Aeronautical Engineering” 113, Barksdale Professional CTR, Newark, New Castle County, DE, United States of America. Visit: of International Editorial Member for “International Conference on Advances in Social Sciences, Economics and Human Behavior –SHE”, 08-09, March, 2014, Kuala Lumpur, Malasiya. Visit: (Organizing Committee) for “2013 IEEE Second International Conference on Image Information Processing (ICIIP -2013)”, December 9-11, 2013, JUIT, Wakanghat, Solan, India. Visit: for 2013 3rd IEEE International conference (IACC), February 22-23, 2013, Gaziabad, India. Visit : of Technical / Editorial Board for First International Conference on Advances in Computing, Electronics and Communication. ACEC, 12-13 October, 2013, Zurich, Switzerland. Visit: Speaker, SCIENCE CAMP (under INSPIRE Internship by DST, Govt. of India), during 5th – 9th August, 2013 at AIET, MIA, Alwar.Member of Editorial Board for International Journal of Computer Networks and Communications Security (IJCNCS)”, Dubai, United Arab Emirates, 26th June 2013 to till date. Visit: of Editorial Board for “Journal of Advances in Networks” a part of Science Publishing Group, USA, 14th Dec. 2012 to till date. Visit: of Editorial Board “COMPUSOFT-International Journal of Advanced Computer Technology (IJACT)”, UK, 6th Nov. 2012 to till date. Visit: for “International Conference on Advances in Computer, Electronics and Electrical Engineering – CEEE”, 20-21 April, 2013, Mumbai, India. Visit: Reviewer for “The Second IEEE International Conference on Parallel, Distributed and Grid Computing - PDGC -2012”, December 6-8, 2012, JUIT, Wakanghat, Solan, India.Senior Member of Universal Association of Computer and Electronics Engineers (UACEE) since 27th September 2012. Visit: Reviewer for one of the HINDAWI International Journals named “Discrete Dynamics in Nature and Society” since 19th September, 2012.CAMP Coordinator, SCIENCE CAMP (under INSPIRE Internship by DST, Govt. of India), during 6th – 10th August, 2012 at AIET, MIA, Alwar.Reviewer of the “International Journal of Network Security & Its Applications (IJNSA)” since 2012 to till date.Member of Advisory Committee of the National Level Mathematics Olympiad-12 during 16th – 17th March, 2012 at IET, MIA, anizing Secretary of the National Workshop on Android Operating System and Application Development in association with EISystems during 18th – 19th February, 2012 at Alwar Institute of Engineering & Technology, MIA, Alwar.Coordinator of Workshop on Information Storage & Management Sponsored by CSI, India and SRU, Alwar. Held on 23rd and 24th January 2012 at Alwar Institute of Engineering & Technology, MIA, Alwar, anizing Secretary of National Conference on Recent Trends in Data Mining funded by AICTE, Govt. of India, New Delhi and CSIR, Govt. of India, New Delhi (Likely). Held on 3rd and 4th September, 2011 at Orissa Engineering College, Bhubaneswar.Invited Speaker, National Conference on Communication, Network & Security, Institute of Engineering & Technology, MIA, Alwar, 26-27 February, 2011 (Topic: Cyber War, Cyber Terrorism & Cyber Espionage).Organizing Secretary of the National conference “Brain Storming Session on Cyber Attacks & Defense” funded by DST, Govt. of India, New Delhi and CSIR, Govt. of India, New Delhi. Held on 7th and 8th November, 2009 at Orissa Engineering College, Bhubaneswar.Reviewer of the International Journal of Taylor Frances named “Enterprise Information Systems” since 2007 to till date.Member of Editorial & Advisory Board of Journal of Theoretical and Applied Information Technology (JATIT). Visit: Patent Details: Granted:KUMAR SAINI, DINESH ; SAINI, HEMRAJ ; RATHEE, GEETANJALI ; JINDAL, HIMASNSHU ; GOYAL, MUKTA (DATE OF PATENT: 2020-11-18; DATE OF GRANT: 13-01-2021; EXPIRY DATE: 2028-11-18) A SYSTEM AND A METHOD FOR REAL TIME MONITORING AND IDENTIFICATION OF ENDANGERED ANIMALS [APPLICATION NUMBER: 2020103515]SAINI, DINESH KUMAR; VYAS, PANKAJ; JINDAL, HIMANSHU; SAINI, HEMRAJ; DASH, SATYABRATA; BHARTI, MONIKA; RATHEE, GEETANJALI (DATE OF PATENT: 2021-02-12; DATE OF GRANT: 2021-04-07; EXPIRY DATE: 2029-02-12), PLANT IDENTIFICATION SYSTEM USING CONVOLUTIONAL NEURAL NETWORK [APPLICATION NO: 2021100864]SAINI, DINESH KUMAR; SINGHAL, SUNITA; KUMAR, ASHISH; BHARTI, MONIKA; JINDAL, HIMANSHU; RATHI, GEETANJALI; SAINI, HEMRAJ, (DATE OF PATENT: 2021-07-13; DATE OF GRANT: 2021-08-25; EXPIRY DATE: 2029-07-13), PRESERVING VILLAGES OR LOW LYING AREAS OF TERRAINS FROM ANIMAL ATTACKS USING ECONOMICAL SENSORS BASED SYSTEM [APPLICATION NO: 2021104104]Published:DR.SATYABRATA DASH, DR.HEMRA J SAINI, DR.SUJATA CHAKARVARTY, SWARNAPRABHA JENA, SUBRAT KUMAR PRADHAN, MR.BARADA P.PANIGRAHY, DR.SUBASH CH. NATH, DR.SUSANTA KUMAR ROUT (DATE OF SUBMISSION: 19-08-2020; DATE OF PUBLICATION: 11-09-2020), AUTOMATED PORTABLE DIAGNOSTIC SYSTEM AND METHOD FOR THE PATIENTS IN COVID HOSPITALS [APPLICATION NO: 202031035686].DR.SATYABRATA DASH, DR.HEMRAJ SAINI, DR.SUJATA CHAKARVARTY, SWARNAPRABHA JENA, SUBRAT KUMAR PRADHAN, MR.BARADA P.PANIGRAHY, MR.SUBAS CH.NATH, DR.SUSANTA KUMAR ROUT (DATE OF SUBMISSION: 10/09/2020; DATE OF PUBLICATION: 16/10/2020), METHOD AND AUTOMATED SAFETY EQUIPMENT FOR QUICK DETECTION OF BIOLOGICAL EVENTS OF HOSPITALIZED PATENTS FOR COVID THEREOF [APPLICATION NO: 202031039046]DR. GEETANJALI RATHEE, DR. HEMRAJ SAINI, DR. SATYABRATA DASH, DR. SUJATA CHAKARVARTY, DR. SUSANT KUMAR ROUT, AND MR. BARADA P. PANIGRAHY (DATE OF SUBMISSION: 06/11/2020; DATE OF PUBLICATION: 11/12/2020), SYSTEM AND METHOD FOR HEALTH CARE DATA PROCESSING THROUGH IOT BY USING BLOCKCHAIN TECHNOLOGY [APPLICATION NUMBER:202031048523]DR. MAYANK KR. GOYAL, DR. PARMA NAND, DR. NITIN RAKESH, DR. MANDEEP KAUR, AMARDEEP KAUR, DR. KIMMI VERMA, DR. RITIKA WASON, DR. PAYAL KHURANA BATRA, DR. MONALI TUSHAR MAVANI, DR. PRADEEP KUMAR GUPTA, DR. HEMRAJ SAINI, DR. GEETANJALI, RANI ASTYA, RITU DEWAN, ABHA KIRAN RAJPOOT, DR. SHIKHA MEHTA, AND SAKSHI GUPTA (DATE OF SUBMISSION: 29/10/2020; DATE OF PUBLICATION: 13/11/2020), EMERGENCY BRAKING ARRANGEMENT TO STOP ELEVATOR [APPLICATION NUMBER: 202011047183]DR. MAYANK KUMAR GOYAL , DR. PARMA NAND, DR. NITIN RAKESH, DR. MANDEEP, RANI ASTYA, DR. HEMRAJ SAINI (DATE OF SUBMISSION: 04/12/2020; DATE OF PUBLICATION: 11/12/2020), METHOD AND MODULE FOR MANAGING MESSAGES AND FRAUD PREVENTION THEREBY [APPLICATION NUMBER: : 202011052861]DR.SATYABRATA DASH; DR.HEMRAJ SAINI; DR.SUJATA CHAKARVARTY; SWARNA PRABHA JENA; SUBRAT KUMAR PRADHAN; MR.BARADA P.PANIGRAHY; DR.SUBAS CH. NATH; DR.SUSANTA KUMAR ROUT (DATE OF SUBMISSION: 12/01/2021; DATE OF PUBLICATION: 12/02/2021), SMART ATTENDANCE AND BODY TEMPERATURE MONITORING SYSTEM AT WORKING SITE [APPLICATION NUMBER: : 202131001373]Registered CopyrightsHEMRAJ SAINI, DINESH KUMAR SAINI, GEETANJALI RATHEE, HIMANSHU JINDAL, MUKTA GOYAL (2021). A SYSTEM AND A METHOD FOR REAL TIME MONITORING AND IDENTIFICATION OF ENDANGERED ANIMALS. ROC NO: L-99804/2021; DIARY NO.: 1579/2021-CO/L.Publications Summary: YearNumber of PublicationsNumber of publications in Scopus Indexed JournalsNumber of publications in SCI/SCIE/ESCI Indexed Journals?BookJNLCONFCHPTOTALBookJNLCONFCHPTOTALBookJNLCONFCHPTOTALPre-20120181703503003010012012045090000000000201302103001010000020140640100130400000201515711313328000002016015342201136200010120170920110110011010001020180912120912120300320190152118011431805005202014251119009020022021230272302702002Total49044151514611515930231024Summary for Indexed Articles: SCI/SCIE: 10; SCOPUS: 84; Web of Science: 74Google Scholar Citation Summary:AllSince 2016Citations772575h-index1411i10-index1814Publication(s):?2021 (07)2020 (12)2019 (18)2018 (12)2017 (11)2016 (22)2015 (14)2014 (10)2013 (3)2012-2007 (49)----Book(s):04Gautam Kumar, Om Prakash Singh,?Hemraj Saini?(2021).?Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. : CRC Press. [ISBN: 9780367702168] .?Google SearchHemraj Saini, Hari Singh, Samir Dev Gupta, Pradeep Kumar GuptA, and Geetanjali (2020). Proceeding of 2020 Sixth International Conference On Parallel, Distributed and Grid Computing (PDGC). USA: IEEE Press. [978-1-7281-7132-6]. Google SearchHemraj Saini,?Geetanjali?, Dinesh Kumar Saini (2020).?Large-Scale Data Streaming, Processing, and Blockchain Security. USA: IGI Global. [ISBN: 9781799834441, 1799834441, 9781799834458, 9781799834465].?Google SearchHemraj Saini, Satya Prakash Ghrera,?Vivek Kumar Sehgal?(2015).?Image Information Processing: Proceedings of 2015 Third International Conference on. USA: IEEE Press. [ISBN: 978-1-5090-0148-4].?Google SearchBook Chapter(s):16Anju Devi, Geetanjali Rathee,?Hemraj Saini?(2021). Security Concerns at Various Network Phases Through Blockchain Technology. In Choudhary A., Agrawal A.P., Logeswaran R., Unhelkar B.,?Applications of Artificial Intelligence and Machine Learning?(Lecture Notes in Electrical Engineering, pp. 605-616). Singapore: Springer. [ISBN : 978-981-16-3066-8; 978-981-16-3067-5] .?Google SearchOshin Sharma,?Hemraj Saini?(2021). Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm. In IRM/IT professionals,?Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms?(pp. 17). USA: IGI Global. [ISBN : 9781799880486] .?Google SearchKumar G., Kumar S.,?Hemraj Saini?(2021). Challenges and Opportunities with ECC and Noncommutative Cryptography: A Survey Perspective. In Kumar A., Mozar S.,?Lecture Notes in Electrical Engineering?(vol 698, pp. ). : Springer, Singapore. [ISBN : 978-981-15-7960-8] .?Google SearchYerra Shankar Rao,?Hemraj Saini, Ranjita Rath, Tarini Charan Panda (2020). Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine. In Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong,?Cyber Defense Mechanisms Security, Privacy, and Challenges?(1st Edition, pp. 13 pages). Boca Raton: CRC Press. [ISBN : ISBN 9780367816438] .?Google SearchGeetanjali Rathee,?Hemraj Saini?(2020). Electronic Voting Application Powered by Blockchain Technology. In Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini,?Large-Scale Data Streaming, Processing, and Blockchain Security?(pp. 230-246). USA: IGI Global. [ISBN : 9781799834441] .?Google SearchHemraj Saini,?Geetanjali Rathee, Dinesh Kumar Saini (2020). Understanding Blockchain: Case Studies in Different Domains. In Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini,?Large-Scale Data Streaming, Processing, and Blockchain Security?(pp. 181-202). USA: IGI Global. [ISBN : 9781799834441] .?Google SearchHemraj Saini,?Geetanjali Rathee, Dinesh Kumar Saini (2020). Preface. In Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini,?Large-Scale Data Streaming, Processing, and Blockchain Security?(pp. xviii - xxii). USA: IGI Global. [ISBN : 9781799834441] .?Google SearchPratiksha Gautam,?Hemraj Saini?(2020). Mutation Testing-Based Evaluation Framework for Evaluating Software Clone Detection Tools. In Gupta V., Varde P., Kankar P., Joshi N. (eds) ,?Reliability and Risk Assessment in Engineering?(Lecture Notes in Mechanical Engineering, pp. 21-35). Singapore: Springer. [ISBN : 978-981-15-3745-5; 978-981-15-3746-2] .?Google SearchShivam Sharma, Kanav Singla,?Geetanjali Rathee,?Hemraj Saini?(2019). A Hybrid Cryptographic Technique for File Storage Mechanism Over Cloud. In Luhach A., Kosa J., Poonia R., Gao XZ., Singh D.,?Advances in Intelligent Systems and Computing?(AISC, volume 1045, pp. 241-256). Singapore: Springer Nature Singapore Pte Ltd.. [ISBN : 978-981-15-0029-9] .?Google SearchGautam Kumar,?Hemraj Saini?(2019). An ECC with Probable Secure and Efficient Approach on Noncommutative Cryptography. In Lakhmi C. Jain, George A. Tsihrintzis, Valentina E. Balas, Dilip Kumar Sharma,?Advances in Intelligent Systems and Computing?(AISC, volume 1049, pp. 10). Singapore Pte Ltd.: Springer Nature . [ISBN : 978-981-15-0132-6] .?Google SearchYerra Shankar Rao,?Hemraj Saini,?Geetanjali Rathee, Tarini Charan Panda (2019). Effect of Vaccination in the Computer Network for Distributed Attacks - A Dynamic Model. In Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Oren, Rekha Kashyap,?Advances in Computing and Data Sciences?(Third International Conference, ICACDS 2019, Ghaziabad, India, April 12-3, 2019, pp. 175-184). Switzerland AG. : Springer Nature. [ISBN : 978-981-13-9941-1 ] .?Google SearchGautam Kumar,?Hemraj Saini, U. M. Fernandes Dimlo (2018). Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication. In Singh M., Gupta P.K., Tyagi V., Flusser J., Oren T. ,?Communications in Computer and Information Science - Advances in Computing and Data Sciences?(2018, pp. 205-216). Singapore: Springer Nature. [ISBN : 9789811318122] .?Google SearchOshin Sharma,?Hemraj Saini?(2018). Performance Evaluation of Energy-Aware Virtual Machine Placement Techniques for Cloud Environment. In Debashis Saha (Indian Institute of Management Calcutta, India),?Advances in Data Communications and Networking for Digital Business Transformation?(pp. 45-72). Hershey, PA: IGI Global. [ISBN : 9781522553236] .?Google SearchGeetanjali Rathee,?Hemraj Saini?(2016). A Secure Homomorphinc Routing Techniques in Wireless Mesh Networks (HRT for WMN). In Suresh Chandra Satapathy, Jyotsna Kumar Mandal, Siba K. Udgata, Vikrant Bhateja,?Information Systems Design and Intelligent Applications?(pp. 437-444). : Springer; India. [ISBN : 9788132227502] .?Google SearchPratiksha Gautam,?Hemraj Saini?(2016). Various Code Clone Detection Techniques and Tools: A Comprehensive Survey. In Aynur Unal, Malaya Nayak, Durgesh Kumar Mishra, Dharm Singh, Amit Joshi,?Smart Trends in Information Technology and Computer Communications?(pp. 255-267). Germany: Springer International Publishing AG. [ISBN : 9789811034336] .?Google SearchNinni Singh, Gunjan Chhabra, Kamal Preet Singh,?Hemraj Saini?(2016). A Secure Authentication Scheme in Multi-operator Domain (SAMD) for Wireless Mesh Network. In Suresh Chandra Satapathy, Vikrant Bhateja, Amit Joshi ,?Proceedings of the International Conference on Data Engineering and Communication Technology?(pp. 343-357). Singapore: Springer . [ISBN : 9789811016752] .?Google SearchGeetanjali Rathee,?Hemraj Saini?(2016). A Secure Homomorphinc Routing Techniques in Wireless Mesh Networks (HRT for WMN) . In Suresh Chandra Satapathy, Jyotsna Kumar Mandal, Siba K. Udgata, Vikrant Bhateja,?Information Systems Design and Intelligent Applications?(pp. 437-444). India: Springer. [ISBN : 978-81-322-2750-2] .?Google SearchGeetanjali Rathee,?Hemraj Saini, Satya Prakash Ghrera (2015). Secured Authentication and Signature Routing Protocol for WMN (SASR). In Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V,?Advances in Intelligent Systems and Computing, Vol.-2?(pp. 327-336). India: Springer. [ISBN : 978-81-322-2522-5] .?Google SearchJournal(s):94Hemraj Saini, Madan Mohan Agarwal, Mahesh Chandra Govil, Madhavi Sinha (2021).?Design of fuzzy controlled routing protocol to save energy in ad hoc networks.?International Journal of Services, Technology and Management, 27?(1/2), 51-71Dinesh Kumar Saini,?Hemraj Saini,?Surjeet Singh(2021), Security and Trust Model Analysis for Banking System, ?International Journal of Sensors, Wireless Communications and Control, Volume 11 , Issue 1 , 2021, 135 – 145.Madan Mohan Agarwal, Hemraj Saini* and Mahesh Chandra Govil (2020), "Probabilistic and Fuzzy based Efficient Routing Protocol for Mobile Ad Hoc Networks", Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume:13 Issue: 3; Pp: 422-432. DOI: 10.2174/2213275912666190101115318M. Sivaram,?Geetanjali?, Ravi Rastogi, Mohammad Tabrez Quasim,?Hemraj Saini?(2020).?A resilient and secure twostage ITA and blockchain mechanism in mobile crowd sourcing.?Journal of Ambient Intelligence and Humanized Computing?, In Press?(), -.?Google CitationRajiv Kumar,?Hemraj Saini?(2020).?Secure, Resilient and Green Computing in Wireless Sensor Networks.?Recent Advances in Electrical and Electronic Engineering, 13?(2), 128-129.?Google CitationShivi Sharma,?Hemraj Saini?(2020).?Fog assisted task allocation and secure deduplication using 2FBO2?and MoWo in cluster-based industrial IoT (IIoT).?Computer Communications, 152?(15 February 2020), 187-199 .?Google CitationGeetanjali?,?Rajinder Sandhu?,?Hemraj Saini, M. Sivaram, Vigneswaran Dhasarathan (2019).?A trust computed framework for IoT devices and fog computing environment.?Wireless Networks,?(), 1-13.?Google CitationShivi Sharma,?Hemraj Saini?(2019).?A novel four-tier architecture for delay aware scheduling and load balancing in fog environment.?Sustainable Computing: Informatics and Systems, 24?(100355), -.?Google CitationShivi Sharma,?Hemraj Saini?(2019).?Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony.?International Journal of Ambient Computing and Intelligence (IJACI), 10?(4), 60-77Shivi Sharma, Ashish Sharma,?Hemraj Saini?(2019).?Advanced Network Security Analysis (ANSA) in Big Data Technology.?International Journal of Innovative Technology and Exploring Engineering, 8?(10), 2634-2639Geetanjali?,?Hemraj Saini?(2019).?Secure handoff technique with reduced authentication delay in wireless mesh network.?International Journal of Advanced Intelligence Paradigms, 13?(1/2), 130-154Geetanjali?, Ashutosh Sharma,?Hemraj Saini,?Rajiv Kumar, Razi Iqbal (2019).?A Hybrid Framework for Multimedia Data Processing in IoT-Healthcare using Blockchain Technology.?Multimedia Tools and Applications,?(), 1-23.?Google CitationAshutosh Sharma,?Geetanjali?,?Rajiv Kumar,?Hemraj Saini, Vijayakumar Varadarajan, Yunyoung Nam, Naveen Chilamkurti (2019).?A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System.?Sensors, 19?(9), 1-22.?Google CitationAshutosh Sharma,?Geetanjali?,?Rajiv Kumar,?Hemraj Saini, Vijaykumar V., Yunyoung Nam, Naveen Chilamkurti (2019).?A Secure, Energy and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System.?Sensors, 19?(9), 1-21.?Google CitationShailja Joshi,?Hemraj Saini,?Geetanjali?(2019). SALT cryptography for privacy in Mobile Crowdsourcing.?International Journal of Information Technology, 11?(2), 1-7Tanuja Kumari Sharma,?Hemraj Saini?(2019).?State of art on efficient document co-editing in cloud collaboration.?International Journal of Spatio-Temporal Data Science, 1?(1), 114-129Pratiksha Gautam,?Hemraj Saini?(2019).?A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques.?International Journal of Information Security and Privacy, 13?(1), 30-45Yerra Shankar Rao, Prasant Kumar Nayak,?Hemraj Saini, Tarini Charana Panda (2019).?Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence.?International Journal of Information Security and Privacy, 13?(1), 17-29Oshin Sharma,?Hemraj Saini?(2019).?Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm.?International Journal of Information Security and Privacy, 13?(1), 1-16Geetanjali?,?Naveen Jaglan?,?Hemraj Saini, Gupta S.D., Kanaujia B.K (2018).?Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks.?Wireless Personal Communications, 104?(4), 1553-1571.?Google CitationOshin Sharma,?Hemraj Saini?(2018).?Energy Efficient Virtual Machine Consolidation for Cloud Data Centres using Analytic Hierarchy Process.?International Journal of Advanced Intelligence Paradigms, 10?(4), 401-422Pratiksha Gautam,?Hemraj Saini?(2018).?Correlation and Performance Estimation of Clone Detection Tools.?International Journal of Open Source Software and Processes (IJOSSP), 9?(2), 55-71Geetanjali?,?Hemraj Saini?(2018).?Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN.?International Journal of Information Security and Privacy, 12?(2), 26-37Geetanjali?,?Hemraj Saini?(2018).?Security Against Network Layer Attacks for Hierarchal Mesh Environments.?International Journal of Information Technology and Web Engineering, 13?(2), 48-55Geetanjali?,?Hemraj Saini, Ghanshyam Singh (2018).?Modified AODV (MAODV) Against Black Hole in WMN.?Proceedings of the National Academy of Sciences India Section A - Physical Sciences, 88?(2), 339-350.?Google CitationGeetanjali?,?Hemraj Saini?(2018).?Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN.?International Journal of Information Security and Privacy, 12?(1), 42-52Gautam Kumar,?Hemraj Saini?(2018).?Secure and Robust Telemedicine Using ECC on Radix-8 With Formal Verification.?International Journal of Information Security and Privacy, 12?(1), 13-28Geetanjali?,?Hemraj Saini, Ghanshyam Singh (2018).?Aspects of Trusted Routing Communication in Smart Networks.?Wireless Personal Communications, 98?(2), 2367-2387.?Google CitationPratiksha Gautam,?Hemraj Saini?(2017).?Non-Trivial Software Clone Detection Using Program Dependency Graph.?International Journal of Open Source Software and Processes, 8?(2), 1-24Geetanjali?,?Hemraj Saini?(2017).?Weight Trusted Routing Mechanism for Hierarchical Mesh Environments.?International Journal of Distributed Systems and Technologies, 8?(3), 25-42Geetanjali?,?Hemraj Saini?(2017).?Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol.?International Journal of Mobile Computing and Multimedia Communications, 8?(1), 1-18Oshin Sharma,?Hemraj Saini?(2017).?SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers.?International Journal of Grid and High Performance Computing, 9?(3), 17-33Yerra Shankar Rao, Aswin Kumar Rauta,?Hemraj Saini, Tarini Charana Panda (2017).?Mathematical Model for Cyber Attack in Computer Network.?International Journal of Business Data Communications and Networking, 13?(1), 58-65Oshin Sharma,?Hemraj Saini?(2017).?Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment.?International Journal of Business Data Communications and Networking, 13?(1), 45-57Geetanjali?,?Hemraj Saini?(2017).?Secure Buffer-Based Routing Protocol for WMN.?International Journal of Business Data Communications and Networking, 13?(1), 28-44Pratiksha Gautam,?Hemraj Saini?(2017).?A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security.?International Journal of Mobile Computing and Multimedia Communications, 8?(1), 34-47Gautam Kumar,?Hemraj Saini?(2017).?Novel Noncommutative Cryptography Scheme Using Extra Special Group.?Security and Communication Networks, 2017?(2017), -21 pagesGeetanjali?,?Hemraj Saini?(2016). End to End Encryption by Algebraic OR/XOR.?International Journal of Control Theory and Applications, 9?(10), 4819-4831Geetanjali?,?Hemraj Saini?(2016).?Security Concerns with Open Research Issues of Present Computer Network.?International Journal of Computer Science and Information Security, 14?(1), 406-432.?Google CitationGeetanjali?,?Hemraj Saini?(2016).?A Secure Multicast Routing Protocol Against Grey Hole Attack.?ARPN Journal of Engineering and Applied Sciences, 11?(21), 12828-12835Geetanjali?,?Hemraj Saini?(2016).?End-to-End Encryption by Algebaric OR/XOR.?International Journal of Control Theory and Applications, 9?(16), 4819-4831Gautam Kumar,?Hemraj Saini?(2016).?On Reduced Computation Cost for Edwards and Extended Twisted Edwards Curves.?Indian Journal of Science and Technology, 9?(44), 1-7Oshin Sharma,?Hemraj Saini?(2016).?State of Art for Energy Efficient Resource Allocation for Green Cloud Datacenters.?International Journal of Control Theory and Applications, 9?(11), 5271-5280Geetanjali Rathee,?Hemraj Saini?(2016).?End to End Encryption by Algebric OR/XOR.?International Journal of Control Theory and Applications, 9?(10), 4819-4831Prabhat Ranjan,?Hemraj Saini?(2016).?Cross -- Layer IDS for Grayhole Attack in Wireless Mesh Networks.?International Journal of Control Theory and Applications, 9?(10), 4885-4890S. B. Dash,?Hemraj Saini, T. C. Panda, A. Mishra (2016).?Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment.?Indian Journal of Science and Technology, 9?(34), 1-7Yerra Shankar Rao, Aswin Kumar Rauta,?Hemraj Saini, Tarini Charana Panda (2016).?Influence of Educational Qualification on Different Types of Cyber Crime: A Statistical Interpretation.?Indian Journal of Science and Technology, 9?(32), 1-7Oshin Sharma,?Hemraj Saini?(2016).?VM Consolidation for Cloud Data Center Using Median Based Threshold Approach.?Procedia Computer Science, 89?(2016), 27-33Gautam Kumar,?Hemraj Saini?(2016).?Reduced Precomputed Scalar Multiplication Cost for ECC.?Contemporary Engineering Sciences, 9?(18), 897-904Geetanjali Rathee,?Hemraj Saini?(2016).?Efficient Handoff Routing (EHR) in WMN, International Journal of Computer Applications.?International Journal of Computer Applications, 1?(2016), 29-34Gautam Kumar,?Hemraj Saini?(2016).?Effective Signcryption Approach for Secure Convention for Multilayer Consensus using ECC.?International Journal of Security and Its Applications?, 10?(7), 287-306Geetanjali?,?Hemraj Saini?(2016).?Security Concerns with Open Research Issues of Present Computer Network.?International Journal of Computer Science and Information Security, 14?(4), 406-432.?Google CitationGeetanjali?, Ninni Singh,?Hemraj Saini?(2015).?Efficient Shortest Path Routing (ESPR) Algorithm for Multicasting in Wireless Mesh Network.?International Journal of Computer Technology and Applications, 6?(1), 111-115Geetanjali?,?Hemraj Saini?(2015).?Efficient Handoff Routing (EHR) in WMN.?International Journal of Computer Applications, 1?(2015), 29-34Gautam Kumar,?Hemraj Saini?(2015).?Formal Verification on Signcryption Re-Cryptography: Secure and Efficient Approach towards Trust Problem.?International Journal of Applied Engineering Research, 10?(24), 44271-44277Aswain Kumar Rauta, Yerra Shankar Rao, T. C. Panda,?Hemraj Saini?(2015).?A Probabilistic Approach Using Poisson Process for Detecting the Existence of Unknown Computer Virus in Real Time.?The International Journal Of Engineering And Science (IJES), 4?(6), 47-51S.B. Dash,?Hemraj Saini, T.C. Panda, A. Mishra (2015).?Predator-Prey model for Infectious Virtual Machines in IaaS Cloud Environment based on Lakota-Volterra Equation.?Asian Journal of Information Technology, 14?(3), 84-91Yerra Shankar Rao,?Hemraj Saini, T.C.Panda (2014).?Effect of Cyber Crime Indian Economy?.?International Journal for Research in Technological Studies, 1?(10), 4-7.?Google CitationS.B.Dash,?Hemraj Saini, T.C.Panda, A. Mishra (2014).?Service Level Agreement Assurance in Cloud Computing: A Trust Issue?.?International Journal of Computer Science and Information Technologies, 5?(3), 2899-2906Hemraj Saini?(2014).?1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networks.?International Journal of Electronics and Information Engineering, 1?(1), 9-15S.B. Dash,?Hemraj Saini, T.C. Panda, A. Mishra (2014).?A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm.?International Journal of Engineering Research and Applications?, 4?(6), 248-254.?Google CitationHemraj Saini, Sitanshu Mishra, Prakhar Prateek (2014).?Proactive Security Framework for Online Business Web Portals with Implementation Details.?International Journal of Information Security Science, 3?(2), 156-164Hemraj Saini, L.K.Sharma, T.C.Panda, H.N.Pratihari (2014).?Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm.?International Journal of Wireless Networks and Broadband Technology, 2?(2), 36-46S.B. Dash,?Hemraj Saini, T.C. Panda, A. Mishra (2013).?Prediction of Trustworthiness in the Cloud Computing Environment using Predator-Prey Model.?International Journal of Cloud Computing and Services Science, 5?(2), 336-344Hemraj Saini, Kapil Dev Sharma, Pankaj Dadheech, T.C.Panda (2013).?Enhanced 4-way Handshake Process in IEEE802.11i with Cookies..?International Journal of Information and Network Security, 2?(3), 229-238Yerra Shankar Rao,?Hemraj Saini, T.C.Panda (2014).?Effect of Cyber Crime Indian Economy?.?International Journal for Research in Technological Studies, 1?(10), 4-7.?Google CitationS.B.Dash,?Hemraj Saini, T.C.Panda, A. Mishra (2014).?Service Level Agreement Assurance in Cloud Computing: A Trust Issue?.?International Journal of Computer Science and Information Technologies, 5?(3), 2899-2906Hemraj Saini?(2014).?1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networks.?International Journal of Electronics and Information Engineering, 1?(1), 9-15S.B. Dash,?Hemraj Saini, T.C. Panda, A. Mishra (2014).?A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm.?International Journal of Engineering Research and Applications, 4?(6), 248-254.?Google CitationHemraj Saini, Sitanshu Mishra, Prakhar Prateek (2014).?Proactive Security Framework for Online Business Web Portals with Implementation Details.?International Journal of Information Security Science, 3?(2), 156-164Hemraj Saini, L.K.Sharma, T.C.Panda, H.N.Pratihari (2014).?Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm.?International Journal of Wireless Networks and Broadband Technology, 2?(2), 36-46S.B. Dash,?Hemraj Saini, T.C. Panda, A. Mishra (2013).?Prediction of Trustworthiness in the Cloud Computing Environment using Predator-Prey Model.?International Journal of Cloud Computing and Services Science, 5?(2), 336-344Hemraj Saini, Kapil Dev Sharma, Pankaj Dadheech, T.C.Panda (2013).?Enhanced 4-way Handshake Process in IEEE802.11i with Cookies..?International Journal of Information and Network Security, 2?(3), 229-238Om Prakash Singh, Hemraj Saini, S. Kalaivani, (2012). A USB Based ECG Portable System and Analysis of Cardiovascular Diseases. International Journal of Scientific and Engineering Research (IJSER), Volume-3, Issue-3, pp.-1-11. Available at: Saini, Yerra Sankar Rao, T.C.Panda (2012). Cyber-Crimes and their Impacts: A Review. International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2,Mar-Apr 2012, pp.202-209. Available at: . Sharma, H.N. Pratihari, Hemraj Saini, T.C. Panda, Mita Debgoswami (2011). Optimized Frequency Cell Planning for GSM. International Journal of Environmental Engineering and Management, Volume 2, Number 1 (2011), pp. 57-67. Available at: Saini, Bimal Kumar Mishra, T.C.Panda (2011). Computing a Degree of a Business Portal which Propagates the Information from the Network of Related Business Portals. International Journal of Web Portals, Volume-3, Issue-2, pp.-14-22, April-June 2011.Available at: Saini, Bimal Kumar Mishra, H.N.Pratihari, T.C.Panda (2011). Extended Honeypot Framework to Detect Old/New Cyber Attacks. International Journal of Engineering Science & Technology, Issue-3, Number-3, pp. – 2227-2232. Available at: Saini, H.N.Pratihari (2011). Extending the Performance and quality of Search Engine via Software Test Case Generation. International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011), pp.-8-27. Available at: Saini, Sitansu Mishra, Priyabrata Sahoo (2011). Defense against Trojans by using Honeypots. IUP Journal of Science & Technology, Vol. 7, No. 3, September 2011, pp. 49-61, 2011.Available at: Saini, T. C. Panda, Minaketan Panda (2011). Prediction of Malicious Objects in Computer Network and Defense. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, pp.-161-171, 2011. Available at: Saini, H.N.Paratihari (2011). Dynamic Population Models for Single Species of Malicious Objects. International Journal of Information Science and Computer Mathematics, Volume 4, Issue 1,pp.-29 - 38. Available at: Kumar Mishra, Hemraj Saini (2010). Cyber Attack Classification by Game Theoretic Weighted Metrics Approach. World Appl. Science Journal, 7 (Special Issue of Computer & IT) [ISSN 1818.4952], pp. 206-215, 2009. Available at: (c&it)/27.pdfHemraj Saini, T.C.Panda, Bimal Kumar Mishra, Minaketan Panda (2010). Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software. International Journal of Computer Applications [ISSN: 0975 – 8887], Volume 1 – No. 14, pp. 81-85, February 2010. Available at: /number14/296-460Hemraj Saini, T.C.Panda (2010). Extended Cyber Defense Architecture for a University –A Case study. The IUP Journal of Science & Technology [ISSN: 0973-2268], Vol. 6, No. 2, pp. 33-47, June 2010. Available at: . aspL.K.Sharma, Hemraj Saini, T.C.Panda, H.N.Pratihari (2010). Taxonomy of Cell Planning. International Journal on reviews on Computing, Vol. 3, Issue-3, pp. 66-74, June 2010. Available at: B.K. Mishra, Hemraj Saini, T.C.Panda (2010). Region-Based Centralized Decentralized Cooperative Audit (RBCDCA) Framework for Large Computer Networks. International Journal of Mathematical Modeling Simulation and Application, Vol.-3, Issue-3, pp. 14-23, July, 2010. Available at: sites.site/ijmmsaH. Saini, D. Saini, N. Gupta (2009). E-Business System Development: Review on Methods, Design Factors, Techniques and Tools with an Extensive Case Study for Secure Online Retail Selling Industry. Indian Journal of Science and Technology, Vol.2 No 5 (May 2009), [ISSN: 0974-6846], PP. 82-90. Available at: sainis.pdfHemraj?Saini (2009). Queuing?Model?for Malicious Attack Detection. The IUP Journal of Information Technology [ISSN: 0973-2896], Vol. V, No. 2, pp. 16-27, June 2009. Available at SSRN: Saini, Dinesh Kumar Saini, Nirmal Gupta (2009). Cyber Defense Architecture in Campus Wide Network System. International Journal of Theoretical and Applied Information Technology (JATIT)-(E-ISSN 1817-3195, ISSN 1992-8645) (Accepted). Available at: Saini, Dinesh Saini (2008). VAIN: A Stochastic Model for Dynamics of Malicious Objects. ICFAI journal of Systems Management [ISSN: 0972-6896], Vol. 6, No. 1, February 2008, pp. 14-28. Available at: /208/ijsym.asp?mag=. Gupta, D. Saini, H. Saini (2009). Class Level Test Case Generation in Object Oriented Software Testing. International Journal of Information Technology and Web Engineering [ISSN: 1554-1045; EISSN: 1554-1053], 3(2), 18-26, April-June 2008. Available at: International +Journal+of+Information+Technology+and+Web+Engineering,+Vol.++3,+Issue+2Hemraj Saini, Dinesh Saini (2007). Malicious Object dynamics in the presence of Anti Malicious Software. European Journal of Scientific Research, [ISSN: 1450-216X], October 2007, volume-18, Issue-3, pp.-491-499. Available at: Saini, Dinesh Saini (2007). Proactive cyber Defense and Reconfigurable Framework of Cyber Security. International journal named International Review on Computer and Software (IRECOS), [ISSN: 1828-6003], Volume-2, Issue-2, March, 2007, pp.-89-97. Available at: vol_2_n_2.html#Proactive_Cyber_Defense_and_Reconfigurable_Framework_for_Cyber_SecurityConference(s):41Anju Devi,?Geetanjali?,?Hemraj Saini?(2021).?Using Optimization and Auction Approach: Security provided to Vehicle network through Blockchain Technology.?Proceedings of the International Conference on Parallel, Distributed and Grid Computing (PDGC)?[6th : JUIT, Waknaghat : 6-8 Nov. 2020], pp.476-480..?Google CitationAshok Kumar Tripathi,?Geetanjali?,?Hemraj Saini?(2019).?Taxonomy of Missing Data along with their handling Methods.?Proceedings of the IEEE International Conference on Image Information Processing (ICIIP)?[Fifth : Shimla, India : 15-17 Nov. 2019], pp.463 -468..?Google CitationShivi Sharma,?Geetanjali?,?Hemraj Saini?(2019).?Big Data Analytics for Crop Prediction Mode Using Optimization Technique.?Proceedings of the IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC-2018)?[5th : Solan, India : 20-22 Dec, 2018], pp.760-764..?Google CitationPratiksha Gautam,?Hemraj Saini?(2018).?Type-2 Software Cone Detection Using Directed Acyclic Graph.?Proceedings of the International Conference on Image Information Processing (ICIIP), 2017?[4th : Shimla, India : 21-23 December, 2017], pp.205-208..?Google CitationEffy Raja Naru,?Hemraj Saini, Mukesh Sharma (2017).?A recent review on lightweight cryptography in IoT.?Proceedings of the I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017 International Conference on?[39767 : Palladam, India : 10-11 Feb. 2017], pp.887-890..?Google CitationPratiksha Gautam,?Hemraj Saini?(2017).?A Hybrid Approach for Detection of Type-1 Software Clones.?Proceedings of the IEEE International Conference on signal Processing, Computing and Control(ISPCC 2k17)?[4th : Solan, INDIA : September 21-23, 2017], pp.279-282..?Google CitationGeetanjali?,?Hemraj Saini?(2016). Fast Handoff Technique in Wireless Mesh Network (FHT in WMN).?Proceedings of the International conference in computing, communication and virtualization, Journal of Procedia Computer Science?[7th : : ], pp.722-728..?Google CitationGeetanjali?, Prabhat Thakur,?Hemraj Saini, Ghanshyam Singh (2016). Aspects of secure communication during spectrum handoff in cognitive radio networks.?Proceedings of the Proc. IEEE International Conference on Signal Processing and Communication?[(ICSC 2016) : India : 26-28 Dec. 2016], pp.64-69..?Google CitationGautam Kumar ,?Hemraj Saini?(2016).?Secure and Efficient ECC: Radix-16 Scalar Multiplication without Pre-Computation.?Proceedings of the International Conference on Big Data and Advanced Wireless Technologies?[Blagoevgrad, Bulgaria : November 10 - 11, 2016], pp.-..?Google CitationGeetanjali?,?Hemraj Saini, Satya Prakash Ghrera (2015). Secured Authentication and Signature Routing Protocol for WMN (SASR).?Proceedings of the International Conference on Computer and Communication Technologies?[2nd. : : 04 September 2015], pp.327-336..?Google CitationGeetanjali?,?Hemraj Saini?(2015). Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network.?Proceedings of the International congress on Information and Communication Technology (ICICT)?[Udaipur : ], pp.383-392..?Google CitationGeetanjali?,?Hemraj Saini?(2015). On Reduced computational cost, Efficient and secure Routing (ESR) for Wireless Mesh Network.?Proceedings of the Second International Symposium on computer vision and internet in journal of Elsevier, Journal of Procedia Computer Science?[2nd. : kochi : ], pp.333-341..?Google CitationOshin Sharma,?Hemraj Saini?(2015).?Experimental analysis of energy management techniques for mobile devices using cloud computing.?Proceedings of the Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on?[7370053 : Noida : 8-10 Oct. 2015], pp.737-742..?Google CitationGautam Kumar,?Hemraj Saini?(2015).?Secure Composition of ECC-PAKE Protocol for Multilayer Consensus using Signcryption.?Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT 2015)?[35149 : Gwalior, MP, India : 4-6 April 2015], pp.740-745 ..?Google CitationNinni Singh,?Hemraj Saini?(2015). Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).?Proceedings of the Proceedings of the Proceedia Computer Science Journal (Elsevier) Second International Symposium on Computer Vision and the Internet (VisionNet 15)?[[SCMS Group of Institutions, Corporate Office Campus, Prathap Nagar , Muttom, Aluva, Kochi (Ernakulam) , Kerala , India : 10-13 August], pp.375-388..?Google CitationGeetanjali Rathee,?Hemraj Saini?(2015).?On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network.?Proceedings of the Proceedia Computer Science Journal (Elsevier) Second International Symposium on Computer Vision and the Internet (VisionNet 15)?[SCMS Group of Institutions, Corporate Office Campus, Prathap Nagar , Muttom, Aluva, Kochi (Ernakulam) , Kerala , India : 10-13 August. 2015], pp.333-341..?Google CitationL.K. Sharma,?Hemraj Saini,?Geetanjali?(2014).?Proposed Optimized Algorithm for Coverage Area with Capacity Calculations.?Proceedings of the IEEE International Conference Parallel Distributed and Grid Computing?[Solan, India : 11-13 Dec. 2014], pp.-..?Google CitationL.K. Sharma,?Hemraj Saini, G. Rathee, T.C. Panda (2014).?Proposed optimized algorithm for coverage area with capacity calculation.?Proceedings of the International Conference on Parallel and Distributed Computing?[Solan, India : 11-13 December 2014], pp.461-465..?Google CitationHemraj Saini?(2014).?Efficient hybrid watermarking approach by using SVD, DWT, and Back Propagation Neural Network.?Proceedings of the IEEE International Advance Computing Conference?[Gurgaon, India : 21-22 Feb. 2014], pp.985-990..?Google CitationTanu Bhardwaj,?Hemraj Saini?(2014).?Effective detection of jamming in WiMAX based communication systems.?Proceedings of the Recent Advances and Innovations in Engineering?[Jaipur, India : 9-11 May 2014], pp.1-6..?Google CitationHemraj Saini, Kapil Dev, T.C. Panda (2013).?Enhanced Cooperative Agent Framework with Security and Increased Performance of the Computer Network.?Proceedings of the IEEE International Conference on Information Systems & Computer Networks?[Mathura : 9-10 March 2013], pp.91-94..?Google CitationHemraj Saini (2012). Enhanced Cooperative Agent Framework with Increases Performance of the Computer Network, 1st Bi-Annual Conference of Jharkhand Society of Mathematical Sciences, November, 22-23, 2012, UGC Academic Staff College, Ranchi University, Morabadi Campus, Ranchi.Hemraj Saini, Sitansu Mishra, T.C.Panda (2012). Secure compression of Bitmap Charater in Transmission with the help of Neural Networks. National Conference on Science for Shaping the Future (On the occasion of Odisha Bigyan Congress), October 18-19, 2012, Department of Geology, Utkal University, Bhubaneswar.Hemraj Saini (2012). Identification of Malicious Traffic Using Data Classification Through Modified Teaching Learning Based Optimization. National Conference on Recent Trends in Mathematics and their Applications, Vinoba Bhave University, Hazaribagh, Jharkhand, 21-22 December, 2012.Hemraj Saini, T.C.Panda, L.K. Sharma (2011). Detecting Attacks by Shared Double Honeypots to Secure the Processing of Consumer Electronic. Proceedings of the Conference on Communication, Network & Security, Institute of Engineering & Technology, MIA, Alwar, 26-27 February, 2011, pp.-25-29.Saini, Dinesh Kumar? Maskari, Sanad Al? Saini, Hemraj (2011). Malicious Objects Trafficking in the Network. Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on (At IEEE Explorer), 16-18 Aug. 2011, Busan, Korea (South), pp.- 64 – 69.Hemraj Saini, Bimal Kumar Mishra, T.C.Panda (2011). Fuzzy Logic Approach to Estimating in Traffic Behavior, Conference on Mathematical & Statistical Modeling in Innovative Areas (MASTMIA’11), 19-20 October, 2011, Birla Institute of Technology, Ranchi, pp.-136-143.L.K.Sharma, Hemraj Saini, H.N.Pratihari, T.C.Panda (2011). Interoperability between 3G Systems to GSM. Proceedings of International Conference on VCAN, IET, MIA, Alwar, December, 24-25, 2011, Vol.1, pp. 161-173.Dinesh Kumar Saini, Osama A. Rahmeh, Hemraj Saini (2010). Extended Secure Architecture of HIS: HL7. DBLP Proceedings of The BIOCOMP 2010, pp.- 617-623, Monte Carlo Resort, Las Vegas, Nevada, USA, 12th-15th July, 2010. Available at: Kumar Saini, Wail M. Omar, Hemraj Saini (2010). Cyber Defense Architecture for Campus Intranet. DBLP Proceedings of The SAM'10 - International Conference on Security and Management, 2010, pp.- 87-93, Monte Carlo Resort, Las Vegas, Nevada, USA, 12th-15th July, 2010. Available at: SainiOS10Hemraj Saini, Bimal Kumar Mishra (2010). Computing a Degree of a Business Portal which Propagates the Information from the Network of Related Business Portals. 12th International Conference of International Academy of Physical Sciences, December 22-24, 2010, University of Rajasthan, Jaipur (Abstract pp.-38)Hemraj Saini, “Malicious Object Dynamics in the Presence of Anti Malicious Software (2009). Nat. Brain Storming Session on Cyber Attacks & Defense. Sponsored by DST, Govt. of India and CSIR, Govt. of India, 7th-8th Nov., 2009.Hemraj Saini (2008). Cyber Threats and Their Rescue. A Nat. Sem. at Higher Institute of Electronics, Libya, 22-01-08.Rakesh Kumar Sharma, L.K. Sharma, Shirshu Varma, Hemraj Saini (2007). Performance Evaluation of Approximate DCT Algorithms for Fast Image Coding. Proceedings of IEEE Sponsored International Conference on Recent Applications of Soft Computing In Engineering and Technology (RASIET-07), pp. 369-373, Dec. 22-23, 2007, Alwar (India)Anil Kumar, Hemraj Saini, Rakesh Sharma (2007). Modified Robust and Secret Data Transmission over the Noisy Channel. Proceedings of IEEE Sponsored International Conference on Recent Applications of Soft Computing in Engineering and Technology (RASIET-07), pp.313-318, Dec. 22-23, 2007, Alwar (India)Hemraj Saini, Dinesh Saini (2006). Cyber Wars and Defense: an Introduction. National Symposium on cyber forensics and computer crimes, 11-13 August, 2006, Punjabi university (Patiala)-PunjabHemraj Saini, Dinesh Saini (2006). Cyber Defense: mathematical Modeling and Simulation. National conference on mathematical analysis and its real time applications, 16-17 September, 2006, University of Berhampur (Berhempur) - Orissa, pp. 106-111.Hemraj Saini, Dinesh Saini (2006). Cyber Defense Architecture in Campus Wide Network. 3rd?International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future Directions), 2-4 December, 2006, Indian National Sciences and Academics, New Delhi (India)Hemraj Saini, Dinesh Saini (2006). Cyber Defense: Use of AI Techniques. 3rd?International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future Directions), 2-4 December, 2006, Indian National Sciences and Academics, New Delhi (India)Hemraj Saini, Dinesh Saini (2006). Malicious Object dynamics in the presence of Anti Malicious Software. International Conference on Computer and Information Sciences, Barcelona 2006, October 22-24, 2006 (Accepted)Dinesh Kumar Saini, Hemraj Saini (2006). A Study on Cyber Crime in India. National Seminar on Mathematics and Computer Science, 29th -30th November 2006, S D (P G) College, Muzaffarnagar (UP)Conferences/Workshops/Seminar OrganizedYearTitleDates/ DurationSponsoring Agency and Organization and Place heldOrganized20202020 Sixth IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC) (Virtual Mode)06 to 08.11.2020JUIT, Waknaghat and IIT DelhiTo be Organized2020National Level Two (02) Weeks Faculty Development Program27.07.2020 to 08.08.2020JUIT, Waknaghat and IIT DelhiOrganized2020Preparing and Performing Lab Experiments using AnyDesk06 to 25.07.2020JUIT, Waknaghat and IIT DelhiOrganized2019Vlab Workshop with IIT Experts20 to 21.09.2019JUIT, Waknaghat and IIT DelhiOrganized2018STC on "Artificial Neural Networks and Fuzzy Logic"23 to 27.08.2018JUIT, Waknaghat along with NITTTR, Chandigarh, MHRD, Govt. of INDIAOrganized2017Workshop on The Internet of Things25 to 26.11.2017JUIT, Waknaghat along with Geekslab Technologies Pvt. Ltd and AIESEC IIT-DelhiOrganized2017vLAB State Level Workshop with IIT Delhi?as coordinator17.11.2017JUIT, Waknaghat and IIT DelhiOrganized2017Workshop on College Cloud Ed. for VLabs by IIITH as Coordinator9 to 12.05.2017?JUIT, Waknaghat and IIIT HyderabadOrganized2017vLab Workshop with IITR Team as Coordinator 28 to 29.04.2017JUIT, WaknaghatOrganized2017vLAB State Level Workshop with IIT Delhi?as coordinator28 to 28.02.2017JUIT, Waknaghat and IIT DelhiOrganized2017AICTE Recognized Short Term Course on Cyber Crime & Forensic Tools through ICT as Coordinator06 to 10.02.2017JUIT, Waknaghat along with NITTTR, Chandigarh, MHRD, Govt. of INDIAOrganized2016vLab Workshop with IITR Team as Coordinator15 to 16.10.2016JUIT, WaknaghatOrganized2016vLab Workshop with IITD Team as Coordinator24 to 25.09.2016JUIT, WaknaghatOrganized20152015 IEEE Third International Conference on Image Information Processing (ICIIP -2015)21 to 24.12.2015JUIT, WaknaghatOrganizing2014IEEE Third International Conference on Parallel, Distributed and Grid Computing11 to 13.12.2014JUIT, WaknaghatOrganized20132013 IEEE Second International Conference on Image Information Processing (ICIIP -2013)09 to 12.12.2013JUIT, WaknaghatOrganized2012IEEE Second International Conference on Parallel, Distributed and Grid Computing06 to 08.12.2012JUIT, WaknaghatOrganized2012Workshop on Information Storage & Management23 to 24.01.2012CSI, India and SRU, Alwar; Alwar Institute of Engineering & Technology, MIA, Alwar, RajasthanOrganized2012Workshop on Android Operating System and Application Development18 to 19.02.2012EISystems, Delhi, IET Group, Alwar; Alwar Institute of Engineering & Technology, MIA, Alwar, RajasthanOrganized2012SCIENCE CAMP (under INSPIRE Internship by DST, Govt. of India)6 to 10.08.2012DST, Govt. Of India; Alwar Institute of Engineering & Technology, MIA, Alwar, RajasthanOrganized2011National Conference on Recent Trends in Data Mining3 to 4.09.2011 AICTE, Govt. of India, New Delhi and CSIR, Govt. of India, New Delhi; Orissa Engineering College, BhubaneswarOrganized2009Brain Storming Session on Cyber Attacks & Defense7 to 8.1.2009DST, Govt. of India and CSIR, Govt. of India, Orissa Engineering College, BhubaneswarOrganized2014IEEE Second International Conference on Parallel, Distributed and Grid Computing11 to 13.12.2012JUIT, WaknaghatOrganizedProfessional Trainings, seminars and Trainings attended: 18Workshops202001A three (03) weeks workshop on "Preparing and Performing Lab Experiments using AnyDesk", 06 to 25.07.2020, JUIT, Waknaghat.20181A one (01) Week MHRD Recognized National Workshop on Security, Privacy, challenges and Opportunities with Current Tools and Techniques: A Research Perspective, 25.06.2018 to 01.07.2018, NRCM, Hyderabad abd National Cyber Safety and Security Standards.2A two (02) days International Conference on Advances in Science & Technology (ICAST-2018), 04.05.2018 to 05.05.2018, Computer Society of India, ISTE, IETE, The Institute of Engineers and SKIT, Jaipur.3A Eight (08) days FDP on Emerging Trends in VLSI and Communication (ETVC-18), 09.06.2018 to 18.06.2018, Centre of Excellence in cyber Systems and Information Assurance, IIT, Delhi-110016.20171A one (01) day Workshop on Computer Forensics, 13.10.2017 to 13-10.2017, Centre of Excellence in cyber Systems and Information Assurance, IIT, Delhi-1100162A one (02) week STC on cloud computing through ICT, 23.10.2017 to 27.10.2017 (one Week), NITTTR, Chandigarh.20161A one (01) Week Faculty Development Program: SIGNAL PROCESSING AND ITS APPLICATIONS, 13.01.2016 to 18.01.2016, Jaypee University of Information Technology, Waknaghat-173234.2A one (01) Week AICTE Recognized Short Term course on "Building Your Own Smart Phone", 16.05.2016 to 20.05.2016, National Institute of Technical teachers Training and Research, Chandigarh 160019 and Indira Gandhi Delhi Technical University for Women, Kashmere Gate, New Delhi-11000620152A one (01) Week Faculty Development Program: VIRTUALIZATION & CLOUD COMPUTING FUNDAMENTALS & PRACTICAL APPROACH, 24.12.2015 to 30.12.2015, Jaypee University of Information Technology, Waknaghat-173234.20143A one (01) Week Faculty Development Program: EXCELLENCE IN TEACHING, RESEARCH & EDUCATION – BY DESIGN, 14.07.2014 to 19.07.2014 at Jaypee University of Information Technology, Waknaghat-173234.20134A two (02) Weeks Training Program on “INTELLIGENT TRANSPORTATION SYSTEM”, 27th May 2013 - 5th June 2013, C-DAC, Trivandrum.20125A Workshop on “SKILL DEVELOPMENT FOR ENTREPRENEURSHIP AND ENHANCED JOB OPPORTUNITIES IN INDUSTRIES”, Centre for E-Governance, Jaipur, Govt. of Rajasthan, Sponsored by Department of Planning (Manpower), 21st January, 2012, held at Seminar Hall, Technical Education Building, R.C. Khetan Polytechnic College Campus, Jhalana doongri, Jaipur.20106National Workshop on “SWARM INTELLIGENCE: THEORY AND APPLICATIONS”, Sponsored by DST, Govt. of India, Held at Institute of Technical Institute of Education & Research, Siksha ‘O’ Anusandhan University, Bhubaneswar on 20th -21st March, 2010 (two days).7A workshop on STATISTICA: DATA MINER. Held at NIT, Rourkela, on 30th and 31st Jan. 2010 (two days).20038A workshop for FACULTY DEVELOPMENT organized by IET, Alwar at its campus in May-2003 of 2 days.9A workshop for PATENT AWARENESS Organized by Govt. of India at IET, Alwar in 2003 of 1 day.Seminars20111National Seminar on Software Engineering – Recent Trends & Developments [NSS – 2011] sponsored by Orissa Information Technology Society (OITS), Bhubaneswar, Indian Science Congress Association (ISCA), Bhubaneswar Chapter held at Silicon Institute of Technology, Bhubaneswar on 15th – 16th January, 2011. (two days).20081Hemraj Saini, Cyber Threats and their Rescue, Attended & Presented in the seminar at Higher Institute of Electronics, Baniwalid (Libya) on 22nd January, 2008.20042National Seminar on INTELLIGENT SYSTEMS: APPLICATIONS AND TRENDS. Held at India International Institute of management, Mansarover, Jaipur on 18th Sep., 2004.20023A seminar on INDUSTRY INSTITUTION RELATIONSHIP Organized by Govt. of India at Hotel Taj in 2002 of 1 day.20014A seminar for MARKET TRENDS OF IBM Organized by IBM at Hotel The Park in 2001 of 1 day.Trainings1A STTP for COMMUNICATION IMPROVMENT Organized by Govt. of India at Institute of Engineering & Technology, Alwar in 2003 of 6 days.19982A 45 days training for UNDERSTANDING AND LEARNING ORACLE, DEVELOPER & JDK-1.2 at Alwar center of Aptech in 1998.19973A 45 days training for UNDERSTANDING HARDWARE AND NETWORKING CONCEPTS at Pertech Computers Ltd., Ahmadabad in 1997Merits and Awards:Academic Excellence Award for Excellent working for Project Funding in 2012 at AIET.Academic Excellence Award for Organizing National Events in 2012 at AIET.Merit cum means scholarship at college level.National scholarship at 10+2 standard.National scholarship at 10th Standard.Two times 1st position awards in state level Essay writing competitions. Current Courses to teachOn - Campus course(s) to teach at Jaypee University of Information Technology, Wakanaghat, Solan in the 14 August, 2021 – Till DateSr. NoCOURSESTREAMSEMESTERYEAR18B11CI311Object Oriented systems and ProgrammingB.Tech.5th202119B1WCI734Object Oriented Technologies using JAVAB.Tech. (All)7th202118B17CI371Object Oriented systems and Programming LabB.Tech. 5th202119B1WCI774Object Oriented Technologies using JAVA LabB.Tech. (All).7th202118B19CI691Major Project Part-IB.Tech.VIIth202118B29CI692Major Project Part-IB.Tech.VIIth2021Courses TaughtOn - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 19 January, 2021 – June 2021Sr. NoCOURSESTREAMSEMESTERYEAR18B11CI411Operating Systems18B11CI4114th 202118B17CI471Operating System Lab18B17CI4714th 2021CSE & ITProject Part IVCSE & IT8th 202118B17CI271Data Structures and Algorithms Lab18B17CI2712nd 2021On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 16 August, 2020 – December, 2020Sr. NoCOURSESTREAMSEMESTERYEAR18B11CI131Object Oriented System & ProgrammingB.Tech.4th202018B17CI371Object Oriented System & Programming LabB.Tech.6th202019B17CI171Programming for Problem Solving LabB.Tech.MTech-II202010B19CI891Project Part-III(Coordinator)B.Tech.IVth2020On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 9 January, 2020 – June, 2020Sr. NoCOURSESTREAMSEMESTERYEAR18B17CI471Operating System LabB.Tech.4th202010B17CI671Computer Networks LabB.Tech.6th202010M11CI214Multimedia SystemsB.Tech.MTech-II202018B11CI414Discrete Computational MethamaticsB.Tech.IVth202010B19CI891Project Part-IIB.Tech.VIIth202010B19CI892Project Part-IIB.Tech.IIIrd 2020On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 16 July, 2019 - December 2019Sr. NoCOURSESTREAMSEMESTERYEAR10M1WCI131 System and Network Security TechniquesM.Tech.Ist201918B11CI311Object Oriented Systems and ProgrammingB.Tech.Ist201918B17CI371Object Oriented Systems and Programming LabB.Tech.Ist201910B28CI581Web Technology LabB.Tech.VIIth201910B19CI791Project Part I LabB.Tech.VIIth201910B29CI792 Project Part I LabB.Tech.IIIrd 2019On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 14 January, 2019 - June 2019Sr. NoCOURSESTREAMSEMESTERYEAR10M11CI214 Multimedia SystemsM.Tech.IInd201918B17CI271 Data Structure LabB.Tech.IInd201918B1WCI836 Block Chain TechnologiesB.Tech.VIIIth201910B19CI891Project Part-IIB.Tech.VIIIth201910B19CI892Project Part-IIB.Tech.VIIIth2019On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the 16 July, 2018 - December 2018Sr. NoCOURSESTREAMSEMESTERYEAR10M1WCI131SYSTEM AND NETWORK SECURITY TECHNIQUES?(E-1)?M.Tech.Ist201818M1WCI114Secure Enterprise ComputingM.Tech.Ist201818B11CI111Programming for Problem SolvingB.Tech.Ist201810B19CI791Project Part I CSEB.Tech.VIIth201810B29CI792 Project Part I ITB.Tech.VIIth201810B17CI372Database Systems LabB.Tech.IIIrd 2018On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration 02 June 2018 - 14 July 2018 (Summar Semester)Sr. NoCOURSESTREAMSEMESTERYEAR10B11CI614Object Oriented Systems and ProgrammingB.Tech.IIIrd201810B17CI674Object Oriented System and Programming LabB.Tech.VIIth201817B1WCI814Design and Analysis of Real World AlgorithmsB.Tech.VIIIth201811BIWCI671Computer Graphics LabB.Tech.Vith201810M11CI213Advanced Software EngineeringB.Tech.VIIIth2018On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration Junary 2018 - June 2018Sr. NoCOURSESTREAMSEMESTERYEAR10B17CI671Computer Network LabB.Tech.??? ?VIth201810B17CI307Unix Programming LabB. Tech.??? ?IVth201810M19CI493Project SeminarM.Tech.?? ?IVth 201810B11CI613Computer Organisation and ArchitectureB.Tech.??? ?VIth201811M1WCI432Performance Evaluation of NetworksM Tech.??? ?IInd2018On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration 12 December 2017 - 30 January 2018 (Condensd Semester)Sr. NoCOURSESTREAMSEMESTERYEAR10M19CI493Project SeminarB. Tech.??? ?VIIth 201715B1WCI833Big Data AnalyticsB. Tech.??? ?VIIth 201710M11CI212Advanced Operating SystemsM.Tech.?? ?VIth2017On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration 18 July 2017 - December 2017Sr. NoCOURSESTREAMSEMESTERYEAR10M1WCI131System and Network Security TechniquesM. Tech./B.Tech.??? ?Ist/VIIth201710B11CI311Object Oriented ProgrammingB.Tech.IIIrd201710B28CI581Web Technology LabB.Tech.Vth201710B17CI572Software Engineering LabB.Tech.Vth201710B17CI674Object Oriented Programming LabB.Tech.VIIth2017On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration 9 June 2017 - 11 July 2017 (Summer Semester)Sr. NoCOURSESTREAMSEMESTERYEAR10B11CI311Object Oriented ProgrammingB.Tech.IIIrd201710B11CI614Object Oriented Systems and ProgrammingB.Tech.IIIrd201710B1WCI733Graph Algorithms and ApplicationsB.Tech.IIIrd201710B17CI674Object Oriented Programming LabB.Tech.VIIth2017On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration January 2017 - June 2017Sr. NoCOURSESTREAMSEMESTERYEAR10B17CI307Unix Programming LabB. Tech.??? ?IVth201710B11CI613Computer Organisation and ArchitectureB.Tech.??? ?VIth201711B1WCI671Computer Graphics LabB. Tech.??? ?VIst201710M19CI493Project SeminarM.Tech.?? ?IVth 201711M1WCI432Performance Evaluation of NetworksM Tech.??? ?IInd201710B19CI792/ 10B19CI791ProjectB.Tech.?? ?VIIth 2017On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration 23 December 2017 - 30 January 2017 (Condensd Semester)Sr. NoCOURSESTREAMSEMESTERYEAR10M19CI493Project SeminarB. Tech.??? ?VIIth 201715B1WCI833Big Data AnalyticsB. Tech.??? ?VIIth 201710M11CI212Advanced Operating SystemsM.Tech.?? ?VIth2017On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration July 2016 - December 2016Sr. NoCOURSESTREAMSEMESTERYEAR10B11CI311Object Oriented ProgrammingB. Tech.??? ?IVth201610M1WCI131System and Network Security TechniquesM. Tech./B.Tech.??? ?Ist/VIIth201610B17CI171Computer Programming LabB. Tech.??? ?Ist201610B19CI792/ 10B19CI791ProjectB.Tech.?? ?VIIth 2016On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration January 2016 – June 2016Sr. NoCOURSESTREAMSEMESTERYEAR10B11CI211Data structure B. Tech.??? ?IInd201610B17CI271Data Structure & Computer Programming LabB.Tech.?? ?IInd201610B28CI408Multi Media Development Lab-IB.Tech.?? ?IVth201610B17CI307Unix Programming LabB.Tech.?? ?IVth201611B1WCI671Computer Graphics LabB.Tech.?? ?IVth2016On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration July 2015 – December 2015Sr. NoCOURSESTREAMSEMESTERYEAR10M1WCI131System and Network Security TechniquesM.Tech.Ist201510B11CI111Introduction to Computer and ProgrammingB.Tech.Ist201510B17CI171Computer Programming LabB.Tech.Ist2015On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration January 2015 – June 2015Sr. NoCOURSESTREAMSEMESTERYEAR10M1WCI131System and Network Security TechniquesM.Tech.Ist201510B11CI111Introduction to Computer and ProgrammingB.Tech.Ist201510B17CI171Computer Programming LabB.Tech.Ist2015Courses Taught On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration January 2015 – June 2015 2014Sr. NoCOURSESTREAMSEMESTERYEAR11B1WCI611Computer GraphicsB.Tech.VI201510B17CI271Data Structure & Computer Programming LabB.Tech.?? ?IInd201511B1WCI671Computer Graphics LabB.Tech.VI201510B19CI791Project (IT)-Overall CoordinatorB.Tech.?? ?VIIIth 201510B29CI792Project (CSE)-Overall CoordinatorB.Tech.?? ?VIIIth 2015On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration July 2014 – December 2014Sr. NoCOURSESTREAMSEMESTERYEAR10B19CI791Project (IT)-Overall CoordinatorB.Tech.?? ?VIIth 201410B29CI792Project (CSE)-Overall CoordinatorB.Tech.?? ?VIIth 201410B1CI111Introduction to computers and ProgrammingB.Tech.Ist201410B17CI171C Programming Lab B,Tech.Ist2014On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration Jan 2014 – July 2014.Sr. NoCOURSESTREAMSEMESTERYEAR10B19CI791Project (ICT)--Overall CoordinatorB.Tech.?? ?VIIIth 201410B29CI792Project (CSE)--Overall CoordinatorB.Tech.?? ?VIIIth 201414B1WCI832Human Computer InteractionB.Tech.VIIIth201414B11CI422Computer and Communication NetworksB,Tech.VIth201414B17CI891Computer and Communication Networks LabB,Tech.VIth2014On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration July 2013 – December 2013.Sr. NoCOURSESTREAMSEMESTERYEAR10B11CI111 Introduction to computers and ProgrammingB.Tech.1st 201310B17CI171C Programming Lab B. Tech.??? ?1st 201310B19CI791Project (CSE & ICT)B.Tech.?? ?VIIth 201313???????????Network ProgrammingM.Tech. (Orientation)1st 201313???????????Network Programming LabM.Tech. (Orientation)1st 2013On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration January 2013 – July 2012.Sr. NoCOURSESTREAMSEMESTERYEAR13B1WCI832 Human Computer and InteractionB.Tech.VIIIth201310B11CI211Data structure B. Tech.??? ?IInd201310B17CI271Data Structure & Computer Programming LabB.Tech.?? ?IInd201310B19CI891Projects (Chief Coordinator)B.Tech.?? ?VIIth201310B29CI792Projects (Chief Coordinator)B.Tech.?? ?VIIth2013On - Campus course(s) taught at Jaypee University of Information Technology, Wakanaghat, Solan in the duration August 2012 – December 2012:Sr. NoCOURSESTREAMSEMESTERYEAR10M11CI112?? Advance Computer NetworksB.Tech.& M.Tech.VIIth & Ist201212B1WCI732Biometric Reorganization TechniquesB.Tech.?? ?VIIth201210B28CI581Web Technology Lab?? ?B. Tech.??? ?Vth201210B17CI372? Database System LabB.Tech.?? ?IIIth201210B17CI571Operating System LabB.Tech.?? ?Vth201210B19CI891Projects (Guided)B.Tech.?? ?VIIth2013On - Campus course(s) taught at Alwar Institute of Engineering & Technology, MIA, Alwar in the duration October 2011 – 14th August, 2012:Sr. NoCOURSESTREAMSEMESTERYEAR3IT4Object Oriented Programming through C++B.Tech.(IT)5th 20113CS4Object Oriented Programming through C++B.Tech.(CSE)5th 20116CS6.3Human Computer InterfaceB.Tech. (CSE)6th 20126IT6.3Human Computer InterfaceB.Tech. (IT)6th 2012On - Campus course(s) taught at Orissa Engineering College, BBSR in the duration September 2008 – October 2011:Sr. NoCOURSESTREAMSEMESTERYEARBE2105Programming in ‘C’B.Tech.(1st Yr.)1st Yr.2008BE9101‘C’ Programming LabB.Tech.(1st Yr.)1st Yr.2008BCSE 3307Computer Architecture and Organization-II B.Tech. (IT)6th 2009BCSE9405Major Project (In charge)B.Tech. (IT)8th 2009MTechDesign and Analysis of AlgorithmsM.Tch.(CSE)1st2009BCSE 3302Multimedia TechnologyB.Tech. (IT)5th2009BE2105Programming in ‘C’B.Tech.(1st Yr.)1st Yr.2009BE9101‘C’ Programming LabB.Tech.(1st Yr.)1st Yr.2009PEME 6405 Management Information SystemB.Tech.(ML)7th 2009MTechDatabase EngineeringM.Tech.(CSE)2nd2009BCSE 3102Data Structures Using ‘C’B.Tech.(1st Yr.)2nd2010BCSE 9102Data Structure Lab Using ‘C’B.Tech.(1st Yr.)2nd2010B.Tech.Database Management SystemB.Tech. (ML)3rd 2010B.Tech.Database Management System LabB.Tech. (ML)3rd 2010BE2105‘C’ ProgrammingB.Tech.(1st Yr.)1st Yr.2010BE9101‘C’ Programming LabB.Tech.(1st Yr.)1st Yr.2010B.Tech.Minor Project (4 Projects Guided)B.Tech. (IT)7th 2010B.Tech.Seminar (4 Seminar Guided)B.Tech.(IT)7th 2010MTechAdvance Computer ArchitectureM.Tech. (1st Year)1st2010M.Tech.Seminar(01) GuidingM.Tech. (1st Year)1st2011M.Tech.Major Project(02) GuidingM.Tech. (1st Year)1st2011B.Tech.Data Structures Through ‘C’B.Tech.(1st Yr.)2nd2011B.Tech.Data Structure Lab Through ‘C’B.Tech.(1st Yr.)2nd2011Courses TaughtOn - Campus course(s) taught at Higher Institute of Electronics, Bani Walid (Libya) in the duration Jan. 2008 – September 2008:Sr. NoCOURSESTREAMSEMESTERYEARIT352Programming TechniquesB.E.(IT)Vth2008IT353Programming Techniques(LAB)B.E.(IT)Vth2008IT365Operating SystemB.E.(IT)VIth2008IT365Operating System(LAB)B.E.(IT)VIth2008On - Campus course(s) taught at Higher Institute of Electronics, Bani Walid (Libya) in the duration Oct. 2007 – Dec. 2007:Sr. B.E.(CE) (LAB)B.E.(CE)VIIth2007IT352Programming TechniquesB.E.(IT)Vth2007IT353Programming Techniques(LAB)B.E.(IT)Vth2007On - Campus course(s) taught at IET, MIA, Alwar in the duration Nov. 2000 – June 2005:Sr. No.CourseStream Session/SemesterSemester/YearL/P/T/puter HardwareEI&C2000-01IInd YearL/T2Computer programming through CCE2000-01IInd YearL/P3Computer NetworksCE2000-01VIth YearL4Computer ArchitectureCE2001-02IIIrd YearL/T5Artificial IntelligenceEI&C2001-02IIIrd YearL6Computer ArchitectureEC & ITJuly 2002- Dec.2002Vth SemesterL/T7Computer NetworksCEJuly 2002- Dec.2002VIIth SemesterL/P8Modeling and SimulationCEJan. 2003-June 2003VIth SemesterL/T9Relational Database Manag. SystemEC & ITJan. 2003-June 2003VIth SemesterL/T/P10Expert SystemsCEJuly 2004-Dec. 2004VIIth SemesterL11Internet TechnologyITJuly 2004-Dec. 2004Vth SemesterL/P12Modeling and SimulationCEJan. 2005-June 2005VIth SemesterL/T13Parallel ProcessingEC & ITJan. 2005-June 2005VIIIth SemesterL/TNote: L=Lecture; T=Tutorial; P=Practical; O=OthersOn - Campus course(s) taught at BITS Pilani in the duration June 2005 – Oct. 2007:COMP CDCourse CodeCOURSEYEARSEMESTERL/P/T/O83 ?BITS C342Object Oriented Programming 2005 1 Lecture 716 ?TA C252Computer Programming-II 2005 1 Practical 440 ?BITS C461Software Engineering 2006 1 Lecture 53 ?CS C341Data Structures and Algorithms 2006 1 Tutorial 293 ?IS C341Software Engineering 2006 1 Lecture 82 ?IS C361Data Structures and Algorithms 2006 1 Tutorial 716 ?TA C252Computer Programming-II 2006 1 Tutorial 83 ?BITS C342Object Oriented Programming 2006 2 Lecture 440 ?BITS C461Software Engineering 2006 2 Lecture/Tutorial 293 ?IS C341Software Engineering 2006 2 Lecture/Tutorial 908 ?BITS C323Study Oriented Projects 2007 2 Lecture 901 ?BITS C335Computer Projects 2007 2 Other 83 ?BITS C342Object Oriented Programming 2007 2 Lecture 554 ?BITS C412Practice School II 2007 2 Other 440 ?BITS C461Software Engineering 2007 2 Lecture 293 ?IS C341Software Engineering 2007 2 Lecture 336CS C471Computer Graphics20071Practice768IS C471Computer Graphics20071Practical716 ?TA C252Computer Programming-II 20071 Tutorial Off - Campus course(s) taught at BITS Pilani in the duration June 2005 – Oct. 2007:COMP CDCOURSE CODECOURSEYEARSEMESTER4043 TA ZC142Computer Programming 2005 1 4042 ?SS ZG516Computer Organization and Software 2005 2 4043 ?TA ZC142Computer Programming 2006 1 4043 ?TA ZC142Computer Programming 2006 2 4125 ?POWNT ZC211Computer Programming 2007 2 4043 ?TA ZC142Computer Programming 2007 2 4043 ?TA ZC142Computer Programming 2007 1 Note: ?POWNT ZC211(Computer Programming) course is for the managerial staff of National Thermal Power Corporation (NTPC) a public sector unit of Govt. of India.Visited Stations:NTPC, Kahalgoan (Bhihar)NTPC, Farakka (West Bangal)NTPC, Talcher (Orissa)NTPC, Ramagundam (A.P.)On – Campus course(s) taught at ABV IIITM Gawalior (Jan 2006- July 2006) as a Visiting faculty:Sr. NoCOURSESTREAMSEMESTERYEAR4043 Design of Analysis of AlgorithmsM.Tech.(IT)Vth2006 4042 Software EngineeringM.Tech.(IT)Vth2006 4043 System Analysis and DesignMBAIIIrd2006 Graduate/Under Graduate level Projects Guided to the On-campus Students at BITS Pilani:-1st Semester (July - Dec. 2006)COP:-1) 2003C5PS912,? ADITHYA MADABHUSHI, "Implementing BGP with extended security measures" 2) 2003A7PS060,? GUDURI PADMASWARANA, "Intrusion Detection System" 3) 2003A7PS226,? MANOJ PRASHAD A., "Modeling and Simulation of the Behavior of Malicious Objects" SOP:-1) 2003A7PS182, K.B.KARTHIKYAN, "Analysis and Detection of Malicious object and Devising a Defense System" 2) 2003AA7PS032, SUNAINA, "To Incorporate the Intelligent Techniques to Overcome the Spreading of Malicious Objects through the Network Vulnerabilities" 3) 2003AA7PS163, BHAVYA BONTU, "To Incorporate the Intelligent Techniques to Overcome the Spreading of Malicious Objects through the Network Vulnerabilities" 4) 2003AA7PS229, ARVINDHAN P., "Analysis of Loopholes in a Campus Wide Network" 5) 2003B1TS858, DEEPAK PAREEK, "Comparative Study of the Functioning of Computer and Biological Viruses" 6) 2003C6PS411, H ABHTHAHIR, "Study and Modeling of Malicious Objects Existing in Internet"? 2nd Semester (Jan. - Jun. 2006)FDTS:-1) 2001A4C6287? DURGA PRASAD K; "scheduling algorithm for embedded systems" COP:-1) 2002C6PS334 SUDHEER S.; "Cache Architecture for Embedded Systems" 2) 2002A7PS010 RAJESH; "Performance Evaluation of Flash File System" LOP:-1) 2002A7PS104 A SANTOSH KUMAR; "Cache Architecture for Embedded Systems" 2) 2003A3PS117 HEMASUNDAR D; "Implementation of ZigBee Architecture" 3) 2003A8PS210 K RADHA KRISHNA; "Digital VLSI design" 4) 2003A8PS683 CHAPPIDI RAMA KRISHNA RAO; "Implementation of ZigBee Architecture" 1st Semester (July - Dec. 2006)SOP:-1) 2003A8PS720 JAyalalitha, “Network audit framework”2) 2003C6PS456 R. Padama, “Cyber audit framework in MAN”COP:-1) 2003A4PS321 S. Thrivani, “Implementation of double Honeypot System”2) 2003A4B4432 P. Saraswathi, “Implementation of Security Measures on BITSAT Server”2nd Semester (Jan. - Jun. 2007)PP-II:-?? 1)? 2004C6PS234 Omprakash; "Implementation of Signature based detection technique of Malicious Objects”1st Semester (July - Dec. 2007)PP-II:- 1) 2005H121234 Sanjeev Sultaniya , "Implementing Firewall for Restricting Malicious Objects”. 2) 2005H121452 Devi Singh, "Implementing Firewall for Restricting Malicious Objects”.Note: Abbreviations used are as underFDTS-First Degree Thesis Study SOP-Study Oriented Projects COP-Computer Oriented Projects LOP-Lab Oriented Projects PP-II-Practice Projects-IIPG level (M.Tech.) Projects Guided to the On-campus Students at Orissa Engineering College, Bhubaneswar (BPUT, Rourkela):-S.No.Roll No. NameLevelTopicSession10807211001Deepneel MajumdarPG (M.Tech.)Wireless Sensor Networks- An Introduction to Technologies & ArchitectureJan 2009- July 201020907211002Ashutosh DasPG (M.Tech.)Improvement of searching Technology in search EngineJan 2009 - July 2010PG/UG level Projects Guiding/Guided to the On-campus Students at Jaypee University of Information Technology, Wakanaghat (H.P.). VIIIth Semester ()MTech Dissertation?Supervision:MTech Dissertation?Supervised1. [122209] Tanu Bharadwaj; “IEEE 802.16: Security Enhancement (Detection, Avoidance and Recovery of Jamming Attacks in Mesh) ?”,??? July 2012-June 2013.2. [132214] Ninni singh; “Efficient and Scalable Key management mechanism using ECC for short memory scalar multiplication”, July 2014-June 2015.3. [132215] Ashish Rao; “Optimization of symmetric key management process in wireless mesh network”, July 2014-June 2015.4.?[142202] Prabhat Ranjan; "Cross Layer Intrusion Detection System for Gray Hole attack in WMN", July 2015-June 2016.5.?[152204] TANUJA KUMARI; “QoS IN CLOUD COLLABORATION,” July 2016-June 2017.6. [152212] EFFY RAJANARU; “Real Time Key Authentication in IoT,” July 2016-June 2017.7. [162201] Shailja Joshi; "Trust and Privacy Concerns in Mobile Crowdsourcing", July 2017-June 2018.MTech Dissertation?in Progress….BTech Project?Supervision:BTech Project Supervised1. [91404] Shivam Agarwal,[91426] Ravi Asthana, [091419] Arjun, [091459] Rajat Bajaj; “Security Enhancement in Image Processing through Hybrid Watermarking Techniques”, Jan 2013– July 2013.2. [111203] Kainat Singh; "Efficient Key Management in Wireless Mesh Networks",July 2014-June 2015.3. [111239] Sakshi Rana; "Detecting Attacks in Wireless Mesh Networks,",July 2014-June 2015.4. [111298] Chitaarth Singh; "Fairness Management in Wireless Mesh Networks", July 2014-June 2015.5. [111408] Shruti Gupta; "RAS Key Exchange for the Secure Shell (SSH) Transport Layer Protocol" July 2014-June 2015.6. [111434] Mitesh Gupta; "Load Characterization of Elliptic Curve Cryptography and Network Security Algorithm for Constrained Environment",July 2014-June 2015.7. [111209] Shreya Garg; "An Efficient Authentication Protocol Based on Kerberos 5",July 2014-June 2015.8. [111248]Ritika Bhatnagar; "Efficient Multicasting in Wireless Mesh Network using Steiner Tree", July 2014-June 2015.9. [111277] Priyanka Dubey; "Graphical Routing in Peer-to-peer Overlay Networks",July 2014-June 2015.10. [111281] Anmol Whorra; “Opinion Mining Time Series Analysis for Election Prediction”, July 2014-June 2015.11. [111293] Abhinish Popli; “Fault Tollerent Routing Protocol in Mesh”, July 2014-June 2015.12.?[121268] Anubhav Singh,[121288] Rishabh Sharma; "Secure Cloud Centric IoT communication", July 2015-June 2016.13.??[121315] Anmol Rana, [121327] Ankush Sharma; "Study and Implementation of resource allocation algorithms in cloud", July 2015-June 2016.14.?[121287] Eesham Kohli, [123212] Shashank Sharma, "Study and simulation for various WMN Routing protocols", July 2015-June 2016.15. [131230]Yash Agarwal, [131278]Pushpak Passey; "Pattern and anomaly recognition in industrial scenario", July 2016-June 2017.16. [131304]Rishav Gupta, [131339]Shubham Sharma; "Street view using Augmented reality", July 2016-June 2017.17. [131227]Jatin Kumar Mittal, [131228]Rishabh Jain; "Image Retrieval using Map Reduce Algorithm", July 2016-June 2017.18. [131274]Utkarsh Chaudhary, [131284]Sulabh; "Sentiment analysis of textual data using Map Reduce", July 2016-June 2017.19. [141341] Chetanya Negi, [141380] Ayush Sharma; "Contemporary Light Weight Cryptography in IoT: Comparative Study and Scope of Improvements", July 2017 – June 2018.20. [141296] Nitin Narang, [141317] Tarun Sluja; "Crowd Control or Selection in Mobile Crowdsourcing: Comparative Study and Scope of Improvements", July 2017 – June 2018.21. [141201] Surya Dev singh; "Theft Detection by Video Monitoring System Based on Big Data Processing", July 2017 – June 2018.22. [141236] Prateek Goel, [141355] Puru Bansal; "Sentiment Analyasis of Tweets and News using Big Data", July 2017 – June 2018.23. [151402] Sagar Gaur, [151255] Sahil Gaur, “Real time Analysis of an Online Store using Bigdata Framework”, July, 2108 to June, 2019.24. [151424] Ishupriya, [151411] Ayushi Dogra], “Neuro-Fuzzy system for Epilepsy Detection”, July, 2108 to June, 2019.25. [151385] Satyam Aggarwal, [151430] Shubham Aggarwal, “Optimization of Crop Production”, July, 2108 to June, 2019.26. [151285] Rohan Gupta, [151288] Mohit Sood, “MapReduce Algorithm and its Application using Bigdata”, July, 2108 to June, 2019.27. [151364] Shubham Ruhela, [151391] Devesh Yadav, ‘Real time Weather Data Analysis using Apache Spark”, July, 2108 to June, 2019.28. Deepika Gupta [161201], Kanika Puri,161227 "Face Liveness Detection using Python", July 2019 to June 2020.29. Varun Mishra [161356], Vipul Kashyap [161361], "Mobile crowdsourcing using Blockchain technology", July 2019 to June 2020.30. Ankit Gera [161342], Rishabh Goyal [161343], "Air Pollution Detection", July 2019 to June 2020.31. Prattyush Shanker Sinha [161471], Chandrashekhar Choudhary [161472], "Accident Detection ", July 2019 to June 2020.32. Arpit Dogra [161355], Anmol Rana [161359], "Fake News Identification", July 2019 to June 2020.33. Aabhas Kashyap [161370], Manish Sharma [161377], "Movie Recommendation System", July 2019 to June 2020.34. JAI GANGWAR [171206], SHUBHAM TYAGI [171310], "Secure File Storage On Cloud Using Hybrid Cryptography", August, 2020 to June 2021.35. Pratimaan Priyam [171240], Anand Aman [171275], "Missing Value Imputation in Datasets", August, 2020 to June 2021..36. Ojusva Goel [171248], Aditya Neekhra [171258], "Image Captioning with Voice Feedback with keras", August, 2020 to June 2021..37. GAGAN AJEET SINGH [171239], BHAVYA SENGAR [171257], "Air Quality Index prediction using Machine Learning/Deep Learning Algorithms", August, 2020 to June 2021..BTech Projects in Progress1. [181404] Astitva Shrestha, [181405], “Navdeep Singh Hada, Deepfake Video Detection”, August 2021 to till date.2. [181433] Mayank Tomar, [181442] “Preetam Kumar Tripathy, Secure text transfer based on cloud”, August 2021 to till date.3. [181352] Tanmay Kumar, [181298] “Hrishab Tripathi, Human activity Recognition”, August 2021 to till date.4. [181383] Aditya Shukla, [181388] “Mohak Goel, A real-time low latency fault-tolerant pipeline with integrated deep learning model”, August 2021 to till date.Related Links Bibliography:Dr. Hemraj Saini is currently working as?Associate Professor?in the Department of Computer Science & Engineering, Jaypee University of Information Technology, Waknaghat-173234. Prior to that he has worked in AIET, Alwar (2011-2012); OEC, Bhubaneswar (2008-2011); HIE, Baniwalid (Libya) (2007-2008); BITS, Pilani (2005-2007); IET, Alwar (2001-2005); REIL, Jaipur (2000-2001) and Dataman System, Delhi (1999-2000) for almost?23 years?in Academics, Administration and Industry. He has obtained?PhD (Computer Science)?Utkal University, VaniVihar, Bhubaneswar;?M.Tech. (Information Technolgy)?Punjabi University, Patiala; and?B.Tech. (Computer Science & Engineering)?Regional Engineering College, Hamirpur (H.P.), Now NIT.?six (06) Ph.D. degrees have been awarded?under his valuable guidance. He is an active member of various professional technical and scientific associations such as?IEEE?(Mem. No. 92738007),?ACM?(Mem. No. 5156611),?IAENG?(Mem. No. 133186), etc. Presently he is providing his services in various modes like,?Editor, Member of Editorial Boards, Member of different Subject Research Committees, reviewer for International Journals and Conferences including?Springer, ScienceDirect, IEEE, Wiely, IGI Global, Benthem Science?etc. and as a?resource person?for various workshops and conferences. He has published more than 150 research papers in International/National Journals and Conferences of repute. He has also organized various conferences and workshops including- NCRTDM 2011, OEC, BBSR (AICTE, DST and CSIR sponsored) and BSSCAD 2009, OEC, BBSR (DST and CSIR sponsored, INSPIR CAMP under the DST Internship, funded by DST in August 2012, IEEE PDGC-2012 as member of International TPC, 2013-IEEE ICIIP as Technical Program Co-Chair, 2020-IEEE PDGC and 2015-IEEE ICIIP as Conference General Chair, PDGC-2016 as the Publicity Committee Chairs and ICIIP-2017 as registration Chair.(Hemraj Saini) ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download