NSUT EAST CAMPUS (Formerly Ambedkar Institute of Advanced Communication Technologies & Research )

manju

 1. Full Name : Dr. Manju Khari

 2. Qualification : Ph. D. in Computer Science & Engg. from NIT Patna.

                              M.Tech in Information Security from AIACT&R, Delhi.

                              B.Tech in Computer Science & Engg. IGIT, Delhi.

 3. Designation: Assistant Professor

 4. Department: CSE

5. Email ID : This e-mail address is being protected from spambots. You need JavaScript enabled to view it

6. Teaching and Industrial Experience : (a)Teaching experience : 14 years,(b)Industrial Experience :2004-2005 i.e of 8 months in HCL Technology

7. Area of Specialization : Information Security, Software Testing , Software Security Testin, Artificial Intelligence, Nature Inspired Algorithm, Cloud Computing, Internet of Things, Cyber Forensic.

8. Scholar Profile: https://goo.gl/rsL5C5&

Publications

JOURNALS

    • Rubén González Crespo, Prabhat Kumar, Manju Khari & Daniel Burgos. (2018). Optimization of automated testing for educational software: a case study of an online STEM subject (Junhong Xiao trans.). Distance Education in China. DOI?10.13541/j.cnki.chinade.20180508.002,[INDEXING :SCIE]
    • L.H.Son, F. Chinchilla, R.kumar, M. Mittal, M.khari, J. M. Chatterjee, S.w.Baik, efficient associationrule mining algorithm based on Animal Migration Optimization, Knowledge-Based Systems, in press, 2018 (INDEXING :SCIE, 2016 IF 4.5)
    • M. Khari and P. Kumar, “An extensive evaluation of search-based software testing: a review,” Soft Computing, Springer, 1-14, 2017. [INDEXING :SCIE]
    • M. Khari and P. Kumar, Evolutionary Computation based Techniques over Multiple Data Sets: An Empirical Assessment, Arabian Journal for Science and Engineering, Springer, [INDEXING :SCIE].
    • M. Khari, P. Kumar, D. Burgos and R.G. Crespo, Optimized Test Suites for Automated Testing using Different Optimization Techniques, Soft Computing Journal, Springer,[INDEXING :SCIE].
    • J. M. Chatterjee, S. Ghatak, R. Kumar,and M. Khari, "BitCoin exclusively informational money: a valuable review from 2010 to 2017," Quality and Quantity, Springer, 1-18, 2017. [INDEXING :SCIE]
    • M. Khari and P. Kumar, An Effective Meta-Heuristic Cuckoo Search Algorithm for Test Suite Optimization, Informatica: An international Journal of Computing and informatics, [INDEXING :Scopus,ESCI].
    • M. Khari and P. Kumar, “Empirical evaluation of Hill climbing algorithm,” International Journal of Applied Metaheuristic Computing, IGI Global, [INDEXING :Web of Science,ESCI].
    • M. Khari and P. Kumar, “Optimization of test data using Firefly Algorithm,” The Journal of Global Information Management, IGI Global, [INDEXING :SCIE(accepted)].
    • M. Khari, R. Kumar, D. N. Le, and J. M.Chatterjee, “Interconnect Network on Chip Topology in Multi-core Processors: A Comparative Study, ” International Journal of Computer Network and Information Security, 2017
    • M. Khari, P. Kumar and G. Shrivestava, “Test Optimization: An Approach Based On Modified Algorithm For Software Network,” International Journal of Advanced Intelligence Paradigms, InderScience, [INDEXING :Scopus (accepted)].
    • M. Khari, P. Kumar and G. Shrivastava, Enhanced Approach for Test suite Optimization Using Genetic Algorithm, International Journal of Computer Aided Engineering and Technology, InderScience. [INDEXING :Scopus(accepted)].
    • M. Khari and P. Kumar, "An Investigating Approach for Optimization of Software Test Suite," Recent Advances in Communications and Networking Technology, [INDEXING:Scopus [accepted].
    • A.Jain, D. K. Tayal, M. Khari, and S. Vij, "A Novel Method for Test Path Prioritization using Centrality Measures," International Journal of Open Source Software and Processes (IJOSSP), 7(4), 19-38, 2016. [INDEXING :Scopus]
    • M.Khari and C.Bajaj, “Detecting Computer Viruses,” International Journal of Advanced Research in Computer Engineering & Technology, Vol. No. 3, Issue No: 7, Pp: 2357- 2364, IJARCET, 2014.
    • M.Khari and C.Bajaj, “Motivation For Security Testing,” International Journal of Advanced Engineering and Global Technology, Vol. No. 2, Issue No: 7, Pp: 828-838, IJAEGT, 2014.
    • M.Khari and C.Bajaj, “Near Field Communication Technology benefitted for Metro Rides,” International Journal of Advanced Engineering and Global Technology, Vol. No. 2, Issue No: 7, Pp: 828-838, IJAEGT, 2014.
    • M.Khari and N.Singh,” An Overview of Black Box Web Vulnerability Scanners,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. No. 4, Issue No:5, Pp: 1527- 1535, IJARCSE, 2014.
    • M.Khari and N.Singh,” Web Services Vulnerability Testing Using Open source Security Scanners: An experimental Study,” International Journal of Advanced Engineering and Global Technology, Vol. No. 2, Issue No: 7, Pp: 790-799, IJAEGT, 2014.
    • M.Khari and D. Nigam,” A Survey To Security Metrics,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. No. 2, Issue No: 6, Pp: 758-765, IJARCSE, 2014.
    • M.Khari and D. Nigam,” Advanced Security Metric Model: ASM,” International Journal of Advanced Engineering and Global Technology, ISSN: 2309-4893, Vol. No. 2, Issue No: 6, Pp: 758-765, IJAEGT, 2014.
    • M. Khari and A. Karar, “Preventing SQL-Based Attacks Using Intrusion Detection,” International Journal of Science and Engineering Applications, Vol. No. 2, Issue No: 6, IJSEA, 2013.
    • M. Khari and N. Kumar, “User Authentication Method against SQL Injection Attack,” International Journal of Scientific & Engineering Research, Vol. No: 4, Issue No: 6, Pp: 1649-1653, IJSER, 2013.
    • M.Khari and A. Karar, “Analysis on Intrusion Detection by Machine Learning Techniques: A Review,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. No. 3, Issue No: 4, IJARCSSE, 2013.
    • M.Khari and N. Kumar, “SQLIA Detection and Prevention approaches A Survey,” VSRD International Journal of Computer Science & Information Technology, Vol. No: 3, Issue No: 5, IJCSIT, 2013.
    • R. Malhotra and M. Khari, "Heuristic search–based approach for automated test data generation: a survey," International Journal of Bio-Inspired Computation, Vol. No: 5, Issue No: 1, Pp: 1-18, IJBIC, Inderscience, 2013. [INDEXING :SCIE]
    • M. Khari, M. Gaur, and Y. Tuteja,” Meticulous Study of Firewall Using Security Detection Tools,” International Journal of Computer Applications & Information Technology, Vol. No: II, Issue No: I, IJCAIT, 2013.
    • M. Khari and N. Kumar, “Comparison of six prioritization techniques for software requirements”, Journal of Global Research in Computer Science”, Vol. No: 04, GRCS, 2013.
    • A. Karar and M. Khari,” Comparative analysis of Intrusion detection by Machine learning techniques,” 37th National Symposium on Instrumentation (NSI - 37), Chandigarh, 2012.
    • S. Sharma and M. Khari, “Manet security breaches: Threat to Secure Communication Platform,” International Journal on AdHoc Networking Systems (IJANS), DOI: 10.5121/ijans.2012.2205, Vol. No: 2, Issue No: 2, Pp: 45-51, IJANS, 2012.
    • R. Dalal and M. Khari,” The New Approach to provide Trusted Platform in MANET,” International Journal of Security, Privacy and Trust Management (IJSPTM), DOI: 10.5121 /ijsptm 2012.1601, Vol. No: 1, Issue No:6, IJPTM, 2012.
    • R. Dalal and M. Khari, “A Review on key management schemes in MANET,” International Journal of Distributed and Parallel Systems, Vol. No: 3, Issue No: 4, Pp: 165, IJDPS, 2012.
    • R. Dalal and M. Khari, “Different ways to Achieve Trust In MANET,” International Journal on AdHoc Networking Systems (IJANS), Vol. No: 2, Issue No: 2, IJANS, 2012.
    • R. Saini and M. Khari, “Vulnerabilities and Attacks in Global System for Mobile Communication (GSM),” International Journal of Advanced Research and Computer Science, IJARCS, 2011.
    • R. Saini and M. Khari, “Defining Malicious Behavior of node and its Defensive methods in Ad Hoc Network,” International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), Vol. No: 1, Issue No: 1, Interscience, 2011.
    • R. Saini and M. Khari, “Defining Malicious Behavior of node and its Defensive methods in Ad Hoc Network,” International Journal of Computer Applications, Vol. No: 20, Issue No: 4, Pp: 18-21, IJCA, 2011.
    • M. Wadhwa and M. Khari, “Security holes in contrast to the new features emerging in the next generation protocol,” International Journal of Computer Applications at New York, Vol. No: 20, Issue No: 3, IJCAN, 2011.
    • M. Wadhwa and M. Khari, “Vulnerability Of IPv6 Type 0 Routing Header And It’s Prevention Algorithm,” International Journal Of Advanced Engineering Science and Technologies, Vol. No: 5, Issue No: 1, Pp: 056-061, IJAEST, 2011.

     

     

     

     

     

    CONFRENCEs

     

    • D. Meana-Llorián, C. G. García, J. P. Espada, M. Khari, and V. B. Semwal, "Bilrost: Connecting the Internet of Things through human Social Networks with a Domain-Specific,”.
    • Vaishali, M. Khari, and P Kumar, “Embedding Security in Software Development Life Cycle,” International Conference on “Computing for Sustainable Global Development”, International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5700-5704, IEEE, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, Vaishali and M. Kumar, “Analysis of Software Security Testing using Metaheuristic Search Technique,” International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5565-5570, IEEE, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, P. Sangwan and Vaishali, “Web-Application Attacks: A Survey,” International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5705-5709, IEEE, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, Sonam, Vaishali and M. Kumar, “Comprehensive Study of Web Application Attacks and Classification,” International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5677-5682, IEEE, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, M. Kumar, S. Vij, P. Pandey and Vaishali, “Internet of Things: Proposed Security Aspects for Digitizing the World,” International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5683-5688, 2016. [INDEXING : Google Scholar]
    • M. Khari, M. Kumar and Vaishali, “Secure Data Transference Architecture for Cloud Computing using Cryptography Algorithms,” International Conference on “Computing for Sustainable Global Development”, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5659-5664, 2016. [INDEXING : Google Scholar]
    • M. Khari, Vaishali and M. Kumar “Search Based Secure Software Testing: A Survey” Computer Society of India (CSI), “50th Golden Jubilee Annual Convention”, Springer, New Delhi, 2015. [INDEXING : Springer, Google Scholar].
    • M. Khari, S. Gupta and M. Kumar, “Security Outlook for Cloud Computing: A Proposed Architectural-Based Security Classification for Cloud Computing,” International Conference on “Computing for Sustainable Global Development”, IEEE, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5671-5676, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, A. Jain, M. Kumar and S. Vij, “Analysis of Various Information Retrieval Models,” International Conference on “Computing for Sustainable Global Development”, IEEE, ISSN No: 0973-7529, ISBN No: 978-93-80544-20-5, Pp: 5694-5699, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, M. Kumar, S. Vij, P. Pandey and Vaishali, “Smart Cities: A Secure Data Transmission Model,” International Conference on Information Conference on Information and Communication Technology for Competitive Strategies”, ACM-ICPS, ISBN No: 978-1-4503-3962-9, 2016. [INDEXING : ACM, Google Scholar].
    • M. Kumar and M. Khari, “DHT-based Load Balancing Scheme using CHORD protocol for Cloud Computing,” International Conference on “Research and Innovation in Engineering”, Proceeding of ICRIE, ISBN No: 978-93-5254-986-3, Pp: 190 - 194, 2016. [INDEXING :Google Scholar]
    • M. Khari, M. Kumar S. Vij and P. Pandey, “Internet of Things and Li-Fi: Future Collision for Faster Smarter and Secure Infrastructure,” International Conference on “Research and Innovation in Engineering”, Proceeding of ICRIE, ISBN No: 978-93-5254-986-3, Pp: 185-189, 2016. [INDEXING : IEEE, Google Scholar]
    • M. Khari, M. Kumar and Vaishali “Comprehensive Study of Cloud Computing and Related Security Issues,” Computer Society of India (CSI), “50th Golden Jubilee Annual Convention”, Springer, New Delhi, 2-5 Dec., 2015. [INDEXING : Springer, Google Scholar]
    • M. Khari, and P Kumar “A Novel Approach for Software Test Data Generation using Cuckoo Algorithm,” Second international conference on ICT for Competitive Strategies, ICTCCS-2016, ACM, 2016. [INDEXING : ACM, Google Scholar]
    • M. Chandra, P. Saini, M. Khari, C. S. Vinitha, “Clustering in Wireless Sensor Networks: Performance comparison of LEACH and Multi-hop LEACH protocols,” Proceedings of 24th IRF International Conference 2015, Chennai, India, IRFIC, 2015. [INDEXING : Google Scholar]
    • A. Dev, M. Khari and R. Dalal, “Efficient Clustering using MNPA in WSN,” 2nd 2015 International Conference on Computing for Sustainable Global Development, INDIACom-2015, IEEE, 2015. [INDEXING : IEEE, Google Scholar]
    • S. Deswal, P. Singh, R. Dalal, M. Khari and A. Kumar, “Reliability Estimation for OSS,” National Conference on Emerging Trends in Computing and Information Communication Technology, ETCICT-2014, Pp: 32-35, ETCICT, 2014.
    • M.Khari, A. Jain, K. Jain, and R. Dalal, “Insecure Cryptographic Storage Vulnerabilities,” National Conference on Emerging Trends in Computing and Information Communication Technology, ETCICT-2014, Pp: 42-45, ETCICT, 2014.
    • M.Khari, K. Chauhan, and P. Aggarwal, “An Integrated Approach for Ranking and Optimizing Test Suite using Firefly Algorithm,” National Conference on Emerging Trends in Computing and Information Communication Technology, ETCICT-2014, Pp: 32-35, ETCICT, 2014.
    • R. Malhotra and M. Khari, “Test suite optimization using mutated artificial bee colony,” International conference on Advances in communication, network, and computing, CNC, Pp: 45-54, Elsevier, 2014.
    • R. Dalal and M. Khari,“ Authenticity check to provide trusted platform in MANET (ACTP),” CCSEIT Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, Pp: 647-655, ACM, 2012.
    • R. Dalal and M. Khari, “Survey of Trust Schemes on Ad-hoc Network,” Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, Proceedings, Part I, Springer, Book Title: Advances in Computer Science and Information Technology, Networks, and Communications, Springer Berlin Heidelberg, Vol. No: 84, Pp: 170-180, Springer, 2012.
    • R. Saini and M. Khari, “An Approach for Establishing Trust among Nodes in Ad Hoc Networks,” International Conferences IET SEISCON, Proceedings in IEEE, IEEE, 2011.
    • R. Saini and M. Khari, “An Algorithm to detect attacks in Mobile Ad Hoc Networks (MANETs),” Software Engineering and Computer Systems Second International Conference, ICSECS, 2011, Kuantan, Pahang, Malaysia, June 27-29, Proceedings, Part III -Springer, Vol. No: 181, Springer, 2011.
    • M. Wadhwa and M. Khari, “Prevention Algorithm against the Vulnerability of Type 0 routing header in IPV6,” International Conference on Computational Intelligence and Communication Systems, IEEE Computer Society, IEEE, 2011.
    • M. Khari, “Rectifying Security issues by ensuring secure data storage in cloud computing,” International conference on Advancement in cloud computing & green IT Technology Technophilia, ICACCGIT, 2011.
    • M. Khari, “A framework for adaptive revocation,” International conference on Computational Intelligence Applications, ICCIA, 2010.
    • M. Khari, “A Hybrid Approach for scanning of computer viruses,” 2nd international conference on Innovative practices in management & information technology for excellence, ICIPMIT , 2010.
    • M. Khari, “Overview on side channel Attacks & various counter measures to avoid them,” 2nd International conferences on Innovative practices in management & information technology for excellence, ICIPMIT, 2010.

     

     

    BOOK CHAPTERs

     

    • Sonam and M. Khari, “Wireless Sensor Networks: A Technical Survey,” In Handbook of Research on Network Forensics and Analysis Techniques , Pp. 1-18. IGI Global, 2018.
    • G. Shrivastava, K. Sharma, M. Khari, and S. E. Zohora, “Role of Cyber Security and Cyber Forensics in India,” In Handbook of Research on Network Forensics and Analysis Techniques,Pp. 143-161, IGI Global, 2018.
    • M. Khari, G. Shrivastava, S. Gupta, andR. Gupta, “Role of Cyber Security in Today's Scenario,” In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, Pp. 1-15, IGI Global, 2018.
    • R. Gupta, D. Gupta, M. Dua, and M. Khari, “ Hindi Optical Character Recognition and Its Applications,” In Detecting and Mitigating Robotic Cyber Security Risks, Pp. 28-39, IGI Global, 2017.
    • R. Dalal and M. Khari,“Survey of Trust Schemes on Ad-hoc Network,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. No: 84, Pp: 170-180, Springer, 2012.
    • S. Sharma and M. Khari, “Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey,” Advances in Computer Science and Information Technology. Networks and Communications Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. No: 84, 2012, Pp 119-124, Springer, 2012.
    • S. Sharma and M. Khari, “Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey,” Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, Proceedings, Part I, Book Title: Advances in Computer Science and Information Technology, Networks and Communications, Springer Berlin Heidelberg, Vol. No: 84, Pp: 119-124, Springer, 2012.

     

    BOOKs

    • M. Kumar, M. Khari and P. Sharma, “Web Application , Student Handbook Class XII,”Published by -The Secretary, Central Board of Secondary Education, Pp: 1-170,2014.
    • M. Kumar, M. Khari and P. Sharma, “Web Application , Student Handbook Class XI,”Published by -The Secretary, Central Board of Secondary Education, Pp: 1-170, 2014.

     

B.Tech Projects

  80 Projects Based on Industrial Idea and Expertise

M.Tech Guided

  30 Thesis Based on Innovative Research and Previous Study

Memberships

 

·         IEEE Professional (Member ID:94940275)

·         SDIWC (Member ID: 1305983239)

·         IAENG(Member ID: 113914)

 

 

 

Achievements

 

 

·         Expert Talk in various seminars.

·         Guest Lectures in International Conferences.

·         Co-Chairperson in The CI Summit 2018: The Summit on Computational and Web Intelligence of special session Special session, CI002.

·         Session Chairperson in 5thInternational Conference on Computing for Sustainable Global Development, INDIACOM 2018. Special Session on “Communication, VLSI, Signal and Image processing and its Security” inIndia

·         Session Chairperson in International Conference on Communication, Management and Information Technology, ICCMIT 2017. Special Session on “Data Mining: Effect of Demonetization on Bank Data Bases inIndia”.

·         Sub reviewer of International Conference on Research in Intelligent and Computing in Engineering, 2017.

·         Program committee member of 3rd International Conference on Green Computing and Engineering Technologies, 2017.

·         Session Co-Chairperson in 2nd International Conference on Recent Trends in Computer Science and Electronics, January 2017. Special Session on “Security and Forensic Investigation in WSN Software Optimization”.

·         Program committee member of 3rd International Conference on Green Computing and Engineering Technologies, 2016.

·         Convener of Special session on “Security Trends in Mobile/ Web Analytics and IoT, (2016) of Springer.

·         Chair the Session in INDIACom-2016 on Security, Analytics and Human Factors in IT (2016) of IEEE.

·         Member of Technical Program Committee in International Conference in Hyderabad (2016).

·         Member of Technical Program Committee in IEEE International Conference on Computing Communication and Automation in Galgotias University (2016).

·         Reviewer Member of International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) 2016.

·         Attended Short Term Training Programme on 'Introduction to System Design', AIACT&R, Geeta Colony Delhi sponsored by NITTTR Chandigarh (2016)

·         Attended Short Term Course at National Institute of Technologies Patna on ‘Foundation of Data Security,’ Patna (2016).

·         Attended Faculty development Program at Delhi Technological University on ‘Nature Inspired Algorithm and Their Applications,’ Delhi (2015).

·         Attended AICTE approved Faculty development Program at G.B Pant University of Agriculture and Technology on ‘Information and Cyber Security Management,’ Pantnagar (2014).

·         Attended Workshop on ‘Intellectual Property Rights Awareness’ at Indira Gandhi Delhi Technical University for Women, Delhi (2014).

·         Attended Quality Improvement Program at Indian Institute Of Technology on ‘Optimization Methods and Application,’ Delhi (2014).

·         Attended AICTE/ISTE/CSI approved Faculty development Program at Bharati Vidyapeeth Institute Of Computer Application and Management on ‘Best Practices for Software Quality Engineering and 21st Century Teaching-Learning System,’ Delhi (2013).

·         Participated in International Seminar on ‘Regenerating Values and Gender Sensitization: A technical Innovation for Woman and Child Safety,’ at Indian Institute Of Technology, Delhi (2013).

·         Participated in 2days Workshop on ‘Recent Advances in Software Engineering’ at Delhi Technological University, Delhi (2012).

·         Attended AICTE approved Faculty development Program at Ambedkar Institute OF technology on ‘Application of advanced Computing Technologies: The Emerging Research Trend,’ Delhi (2012).

·         Participated in National Symposium on instrumentation at CSIR, Chandigharh (2012).

·         Participated in INDO-US Workshop on ‘Effective teaching at college /university level’ at Indraprastha institute of information technology, Delhi (2011).

·         Attended AICTE approved Faculty development Program at Ambedkar Institute OF technology on ‘Emerging trends in Networking Technology, Data Engineering, and Information Security,’ Delhi (2011).

 

Editor

 

  • Editor ofHandbook of Data science approaches for biomedical engineering, Elsevier Publisher, 2018.
  • Editor ofInternet of things and big data analysis for smart generations, Springer USA, 2018
  • Associate Editors of International Journal of Interactive Multimedia and Artificial Intelligence, ESCI Indexed, 2018.
  • Editor of Cyber Security in Parallel and Distributed Computing: Concept, Techniques, Applications and Case studies, Willey Publisher, 2018.
  • Editor of Internet of Things in Biomedical Engineering, Biomedical Engineering Series, Elsevier Publisher, Proposal Communicated, 2018.
  • Editor of Handbook of E-business Security Book,CRC Press, Taylor and Francis Group(Under Production House), 2018.
  • Guest Editor of International Journal of Applied Metaheuristic Computing of Special Issue On: Advanced Metaheuristic Computing for Engineering Applications, indexed in Web of Science Emerging Sources Citation Index (ESCI).
  • Guest Editor of Special Session on “New Trends for Security in Network Analytics and Internet Of Things”, SCOPES Indexed International Journal of Advanced Intelligence Paradigms Journal, Inderscience.
  • Reviewer of International Journal of Synthetic Emotions, IGI Global.
  • Reviewer of International Journal of Rough Sets and Data Analysis, IGI Global.
  • Reviewer of Scalable Computing: Practice and Experience, Scientific International Journal for Parallel and Distributed Computing.
  • Member of Editorial Review Board of the Journal of Global Information Management, IGI Global.
  • Reviewer Member of International Journal of Forensic Engineering, Inderscience.
  • Reviewer Member of International Journal of Software Engineering and Knowledge Engineering, World Scientific.
  • Reviewer Member of Asian Journal of Mathematics and Computer Research.
  • McGraw-Hill Education Publishing house Private Limited.
  • Member of the Society of Digital Information and Wireless Communications (SDIWC).
  • Member of the International Association of Engineers (IAENG).

Coleege/DEparment Administration

·         Editor Incharge of AIACTR News letter. 2016-18

·         M.Tech  ResearchCoordinator, AIACT&R,2015-16

·         B.Tech  Project Coordinator, AIACT&R,2013-14

·         M.Tech  Term paper Co-ordinator, AIACT&R, 2013-16

·         College Library In charge, AIACT&R, 2012-15

·         College Website In charge, AIACT&R, 2007-09

 

 

 

 

 
You are here  :