welcome guest March 30, 2017




Name Batch GATE Score All India Rank
Dushyant Shukla 2011 477 4965 Dushyant Shukla
Navneet kaur 2011 600 1795 Navneet kaur
Nidhi 2011 322 17048 Nidhi
Rohit Agarwal 2011 400 9201 Rohit Agarwal
Shivam Gupta 2011 425 7499 Shivam Gupta
Shubhangi Agarwal 2011 593 1927 Shubhangi Agarwal
Tulika Agarwal 2011 544 2931 Tulika Agarwal


Name Batch CAT Score Percentile
Pawan Agarwal 2011 127.36 88.14 Pawan Agarwal
Abhinav Gupta 2011 163.18 96.39 Abhinav Gupta


Name Batch CMAT Score Percentile
Pawan Agarwal 2011 176 96.74 Pawan Agarwal


Name Batch GRE Score Percentile
Alabhaya Maheshwari 2011 156.5 71.5 Alabhaya Maheshwari

  • Ashish Patnaik, Nabila Hyder, Analysis of Challenges, Capacity & Protocol issues in MANET; International Conference on Emerging Trends & Developments in Science, Management & Technology; RKGIT Ghaziabad, 2013, ISBN No. 978-81-924342-2-3

  • Preety Sharma, 2012. Multi-hop/direct forwarding for 3D wireless sensor networks. In proceedings of the CUBE International Information Technology Conference (CUBE’12). ACM, New York, USA, 344-349.
    DOI=10.1145/2381716.2381780 http:// doi.acm.org/10.1145/2381716.2381780

  • Uday Pratap Singh An Efficient Distributed Group Key Management Using Hierarchical Approach with ECDH and Symmetric Algorithm, Computer Engineering and Intelligent Systems. ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online), Impact factor 6.39.

  • Deena Nath Gupta, Decreasing the message size by applying compression in Elliptic Curve Cryptography in DIT International Journal at DIT, Greater Noida on Dec. 2011.

  • Sonal Singh, Security against Active Attacks in Wireless Mesh Networks.
    www.ijarcsse.com.  Volume 7, Issue 7, July 2012

  • Devika. P, Generating an identity – based proxy signature using elliptic curve cryptography”; Third International Conference of GAMS;MANIT BHOPAL 2013.

  • Sharma Richa,  Local Density Differ Spatial Clustering in Data Mining, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013, PP393-397.

  • Vineet Kumar Chaudhary, Dec-2013. Intrusion Detection System Using Mobile Agent Technology. International Journal of Engineering Research & Technology, Volume-2, Issue-12, PP.2278-0181.

  • Vineet Kumar Chaudhary Oct-2013. Distributed Instrusion Detection System Using Sensor Based Mobile Agent Technology. International Journal of Innovations in Engineering & Technology, Vol-3, Issue-1, PP.2319-1058.

  • Neha Roy, Cloud Computing: Architecture and concept of Virtualization. International Conference of Emerging Trends in Technology, Science and Upcoming Research in Computer science DAVIM, Faridabad, 25th April-2015, ISBN:978-81-931039-3-7 PP.1800-1807.

  • Neha Roy Virtual Machine scheduling Using DVFS. International Journal of Advanced Research in Computer science and Software Engineering May-2015 Edition.

  • Rajiva Ranjan Divivedi Load balancing in Cloud Computing through Node Sorting Algorithm International Journal of Technological Advancement and Research Computing. Volume-3, Issue-2, 2013.

  • Rajiva Ranjan Divivedi  A Survey of Load Balancing Technique in Cloud computing. International Journal of Research in Engineering and Technological Computing. Volume-4, Issue-3, 2015.

  • Seema Nagar, A Novel approach to Load Balancing in Cloud computing Using PSO and ESCEL. International Journal of Advanced Research in Computer Science and Software Engineering. Volume-5, Issue-5 May-2015.

  • Seema Nagar, A Comparative Study on Load Balancing algorithm in Cloud Computing. International Journal of Computer Science Trends and Technology (IJCST). July-2015.

  • Anurag Gupta, Improved AODV Performance in DOS and Black hole Attack Environment. International Conference on Computational Intelligence in Data Mining, Springer, Veer Surendra Sai University of Technology, Burla Odisha.

  •  Naveen Kumar Tiwari Security System for DNS Using Cryptography. International Journal of Computer Applications, Volume 120, June 2015.

  • Reena Panwar May 2015 A Comparative study of Load Balancing Algorithms in Cloud Computing  International Journal of Computer Application, ISSN: 0975-888, Vol. 117-No.24, pp.33-37.

  • Reena Panwar May 2015 A Comparative Study of Different Load Balancing Algorithms in Cloud Computing.  International Journal of Computer Science Trends and Technology.

  • Reena Panwar, Sept 2014, A Comparative Study of various Load Balancing Techniques and Technology in Cloud Computing. International Journal of Engg. Research and Technology, ISSN: 2278-0181, IJERT, pp.374-377.

  • Shikha Malik Effective execution Time for Processing Large Data. International Journal of Engineering Research, July 2015 Edition.

  • Shikha Malik Point in Time Analysis-Gathering Big Data Over a small Duration. International Conference of Technical Research and applications, July 2015.

  • Devendra Bhaskar Performance Evaluation of MAC Protocol for IEEE 802.11, 802.11EXT. WLAN and IEEE 802.15.4 WPAN using NS-2. International Journal of Computer Application ISBN: 973-93-80887-30-9.

  • Devendra Bhaskar Evaluating efficiency of MAC Protocol for IEEE 802.11, 802.11EXT. WLAN. Accepted in International Journal of Computer Science and Technology, May 2015 Edition.

  • Pooja Sharma Three Level Cloud Computing Security Model.  International Journal of Computer Applications (0975-8887) Volume 119-No.2, June 2015 Edition.

  • Pooja Sharma Top Threats in Cloud Computing.  International Conference of Emerging Trends in technology, Science and Upcoming Research in Computer Science DAVIM, Faridabad, 25th April 2015, ISBN: 978-81-931039-3-7 pp. 1783-1786.

  • Ajay Singh, Query Efficient Database Design for SAAS Delivery Model of Cloud. International Journals of Innovations and Advancement in Computer Science., ISS: 2347-8616, 2347-8527, 2348-117X.

  • Ajay Singh, Survey of Database Design for SAAS Cloud Application. International Journal of Computer Engineering and Technology, ISSN:0976-6367, Volume 6, Issue 6, June 2015, pp.57-63.

  • Ashish Goel  A Study of Different Partitioning Clustering Technique. International Journal for Scientific Research & Development, Volume 3, Issue 06,2015, ISSN:2321-0613.

  • Ashish Goel Customer Purchasing Behaviour using Sequential Pattern Mining Technique. International Journal of Computer Applications (0975-8887), Volume 119-No.1, June 2015.
There is an elegance and sharpness to it that is captivating.It is our great honor to offer a a series of Replica Watches for you. Our friendly staff will be happy to assist you with anything you need. Good-quality Rolex Replica are thus, an analogy of admirable workmanship, in agreement of amazing account and design. It is a good way to satisfy the dream of Hublot Replica by purchasing a high grade replica watch.You may be sporting a very fine Cheap Red Bottom. And since the quality is so authentic it is bound to stay with you for ever.Their design consistency of Replica Rolex has created a distinctive look. In the last, Replica Rolex DateJust is work of art and classic design. It's also a great investment if you have the available cash, as you won't have to worry about the Cheap Christian Louboutin losing value. tags:Christian Louboutin Outlet