Research

Sr.No.Name of the candidateName of the Supervisor(s)/ Co-Supervisor(s)TitleYear
1Nripendra Kumar SinghDr Khalid RazaDentomaxillofacial Image Analysis Using Deep Learning
Nripendra Kumar SinghAbstract
2024
2Sultana ParweenProf. Syed Zeeshan HussainA Framework for the Performance Enhancement of Cross Layer TCP for loT
Sultana ParweenAbstract
2024
3Meenu Sharma-The Use of Imaging in the Early Detection of Liver Cancer
Meenu SharmaAbstract
2023
4Md Shamsul Haque AnsariProf. (Dr.) Monica MehrotraA Semantic Framework for Smart Cities
Md Shamsul Haque AnsariAbstract
2023
5ROHIT VASHISHTPROF. (DR.) SYED AFZAL MURTAZA RIZVIHETEROGENEOUS CROSS PROJECT DEFECT PREDICTION
ROHIT VASHISHTAbstract
2023
6Md Nurul IslamProf. S.M.K QuadriDevelopment of a Framework For Software Testing For Cloud Based Application
Md Nurul IslamAbstract
2023
7Ahmad Abu Turab NaqviProf. Syed Afzal Murtaza RizviAnalysis of Gene Expression Data for Cancer Classification using Artificial Intelligence Techniques
Ahmad Abu Turab NaqviAbstract
2023
8Iqbal HasaSyed Afzal Murtaza RizviA Data Analytics Framework for Knowledge Discovery from Heterogeneous Data Sources (DAFDKD)
Iqbal HasaAbstract
2023
9ABDUL MANAZIRDR. KHALID RAZAMulti-output hybrid genetic programming model for efficient prediction of time series data
ABDUL MANAZIRAbstract
2023
10SAHAR QAZIDr. KHALID RAZAIn Silico Study of POTEE and Analogous Activity of Oncologic Medicaments in Ovarian Cancer
SAHAR QAZIAbstract
2023
11TARUN KUMAR GUPTADR. KHALID RAZAOptimization of ANN Architecture Using Nature Inspired Techniques
TARUN KUMAR GUPTAAbstract
2023
12SYED ARSHAD ALIPROF. MANSAF ALAMA Dynamic Resource Allocation Framework for Cloud Computing Environment
SYED ARSHAD ALIAbstract
2023
13Aga Syed Shafat AliSyed Afzal Murtaza RizviInfection Source Detection in Complex Networks
Aga Syed Shafat AliAbstract
2022
14PrachiDr. Suraiya JabinSynthetic Aperture Radar (SAR) image modeling and analysis for Environment Protection
PrachiAbstract
2022
15Zubair Ali AnsariDr. JahiruddinEfficient Algorithms for Subgraph Matching in Big Graphs
Zubair Ali AnsariAbstract
2022
16Aditya Dev MishraProf. (Dr.) Khurram MustafaSecurity Requirement specification by formal methods
Aditya Dev MishraAbstract
2022
17Deena Nath GuptaProf. Rajendra KumarDesigning of Lightweight Security Scheme for IoT
Deena Nath GuptaAbstract
2022
18Gian DeviDr. SAM RizviG-Card towards realization of Personalized Medicines using IoT: Issues and Challenges
Gian DeviAbstract
2022
19Malik Nadeem Anwar MohammadProf. Mohammed NazirModeling Security Threats during Requirements Elicitation
Malik Nadeem Anwar MohammadAbstract
2022
20Shivangi ChawlaEmotion Mining of Social Media and its Impact Analysis
Shivangi ChawlaAbstract
2022
21HABIB UR REHMANDr. Mohammad Nazir / Dr. Khurram MustafaSECURITY ASSURANCE OF WEB APPLICATION
HABIB UR REHMANAbstract
2021
22Mohd Javed KhanProf. Khurram MustafaModelling Adaptive Hypermedia Instructional Systems
Mohd Javed KhanAbstract
2021
23Nancy AgarwalDr. Syed Zeeshan HussainIntrusion Detection for Web-based Applications
Nancy AgarwalAbstract
2021
24Samiya KhanDr. Mansaf AlamA Cloud Based Framework for Big Data Analytics
Samiya KhanAbstract
2021
25Seema RaniDr. Monica MehrotraCommunity Detection for Social Network Analysis
Seema RaniAbstract
2021
26Mohd TajammulDr. Rafat ParveenDevelopment of Secured Framework for Cloud Storage
Mohd TajammulAbstract
2021
27Vinod KumarProf (Dr.) Rajendra Kumar & Dr. S.K. PandeyAnalysis and Design of Cryptographic Algorithms for Secure Group Communication
Vinod KumarAbstract
2021
28Ajay RastogiProf. Monica MehrotraDetection of Opinion Spam in Online Social Media
Ajay RastogiAbstract
2021
29Vineet Kumar SejwalDr. JahiruddinTowards the Design of a Context- and Trust-Aware Recommender System
Vineet Kumar SejwalAbstract
2021
30Ashraf KamalDr. Jahiruddin / Prof. Mohammad AbulaishA Unified Data Mining Approach for Detecting Figurative Language in Twitrer
Ashraf KamalAbstract
2021
31Chetna KumariProf. Suraiya Jabin / Dr. Naidu Subbarao, Dr. Muhammad AbulaishDesigning Inhibitor Targeting Autophagy Regulating Kinases for Cancer Using Machine Learning Techniques
Chetna KumariAbstract
2021
32Subodh KumarProf. (Dr.) Rajendra KumarDevelopment of a cryptographic model for cyber security applications
Subodh KumarAbstract
2021
33Amanpreet Kaur ChandokProf Khurram MustafaSecurity Assurance by Efficient Password Based Authentication
Amanpreet Kaur ChandokAbstract
2020
34Mudasir Ahmad WaniDr. Suraiya JabinFake Profile Detection in Online Social Networks
Mudasir Ahmad WaniAbstract
2019
35Faisal AnwerDr. Mohammed Nazir / Prof. Khurram MustafaSecurity Testing of Object Oriented Code
Faisal AnwerAbstract
2018
36Farhana Javed ZareenDr. Suraiya JabinAn Adaptive Signature Recognition System as a Biometric Technology Using Neural Networks
Farhana Javed ZareenAbstract
2018
37Shaurya JauhariProf. (Dr.) S.A.M. RizviExegesis of Gene Expression
Shaurya JauhariAbstract
2018
38Pramod Kumar YadavProf. (Dr.) Syed Afzal Murtaza RizviEfficient Query Optimization for Mining Distributed Data
Pramod Kumar YadavAbstract
2018
39SANJAY PRATAP SINGH CHAUHANDr. SYED AFZAL MURTAZA RIZVIDEVELOPMENT OF OPTIMAL ALGORITHMS FOR ROBUST AUDIO WATERMARKING.
SANJAY PRATAP SINGH CHAUHANAbstract
2018
40Shuchi SethiDr Mansaf A lamCloud Securi ty: Data Separation th ro ugh Secure Virtual Pat1itioning in Multitena nt Data Centers
Shuchi SethiAbstract
2017
41Kashish Ara ShakilDr. Mansaf AlamAn Effective Framework for Data Management in a Cloud Based System
Kashish Ara ShakilAbstract
2017
42Sapna VarshneyDr. Monica MehrotraUse of Metaheuristic Optimization Techniques for Automatic Generation of Effective Test Cases
 Sapna Varshney Abstract
2017
43TARAN SINGH BHARATIDr. RAJENDRA KUMARSECURITY ENHANCEMENT OF MOBILE AD-HOC NETWORKS USING INTRUSION DETECTION SYSTEM
TARAN SINGH BHARATI Abstract
2017
44Naeem AhmadDr. Syed Zeeshan HussainA Unified Approach to Control the U ndesirable Route Discovery Packets in Adhoc Networks
Naeem AhmadAbstract
2017
45Rejaul Karim BarbhuiyaProf. Khurram Mustafa / Dr. Suraiya JabinAdaptive Intelligent Tutoring Systems
 Rejaul Karim Barbhuiya Abstract
2016
46Kishwar SadafDr. Mansaf AlamInformation Retrieval Using Clustering Techniques
Kishwar SadafAbstract
2016
47Thipendra Pal SinghDr. Suraiya JabinStudy of Recurrent Neural Networks for Pattern Storage and Recalling with Evolutionary Algorithms
Thipendra Pal Singh Abstract
2016
48Zeba KhanamDr S.A.M RizviLegacy System Migration
Zeba KhanamAbstract
2014
49Khalid RazaDr. Mansaf Alam / Dr. Rafat ParveenSoft Computing Approach for Modeling Biological Networks
Khalid Raza Abstract
2014
50Sajid Yousuf BhatDr. Muhammad AbulaishA Structural Data Mining Framework for Social Network Analysis
Sajid Yousuf BhatAbstract
2014
51Ahmad KamalDr. Muhammad AbulaishMining Web Opinion Sources Using Machine Learning Techniques
Ahmad KamalAbstract
2014
52NEETA WADHWADR. S. Zeeshan Hussain / DR. S.A.M. RizviEVALUATION AND ANALYSIS OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS FROM CRYPTANALYSIS PERSPECTIVE
NEETA WADHWAAbstract
2014
53Muqeem AhmedDr. Sayed Zeeshan Hussain / Dr. S.A.M Rizvi“Development of Knowledge Based Grid in Semantic Web”
Muqeem AhmedAbstract
2014
54KalpanaDr. Monica MehrotraEnhancing Ontology Alignment with Machine Learning for Better Interoperability of Semantic Web
KalpanaAbstract
2013
55Mukta NarangDr. Monica MehrotraMeasuring the security intensity of a software system using a security metrics
Mukta NarangAbstract
2013
56Meenakshi BhatDr. S. A. M. Rizvi“In silico Comprehensive Sequence and Structure Analysis of Protease Family”
Meenakshi BhatAbstract
2013
57Syed Imtiyaz HassanDr. Syed Zeeshan Hussain/Dr. S.A.M. RizviA Study to Achieve Higher Degree of Automation by Structural Change in Model-View-Controller (MVC)
Syed Imtiyaz HassanAbstract
2013
58S. SangeethaDr. Monica Mehrotra / Dr. Dinesh Gupta“In silico identification of potential inhibitors of drug targets in Plasmodium falciparum and design of target oriented virtual compound library”
S. SangeethaAbstract
2012
59JahiruddinDr. Muhammad Abulaish / Dr. Lipika DeyText Mining for Knowledge Discovery from Domain-Specific Text
JahiruddinAbstract
2012
60Vineet Kumar SharmaDr. S. Zeeshan Hussain / Dr. S.A.M. RizviThe Development of Software Technique to Improve the Performance of a Distributed System.
Vineet Kumar SharmaAbstract
2012
61Nadia ImdadiDr. S.A.M. RizviGlobal Framework for Automatic Semantic Integration Incorporating Semantic Repositories
Nadia ImdadiAbstract
2012
62Muna Mhammad Taher JawharMonica MehrotraEnhanced Design of an Intrusion Detection System
Muna Mhammad Taher JawharAbstract
2012
63Mohammad AhmadProf. K. MustafaComponent Based Software Engineering
Mohammad AhmadAbstract
2012
64Rajendra KumarProf. K. MustafaDevelopment of Security Requirements for Web Applications
Rajendra KumarAbstract
2012
65Shabana RehmanProf.K.MustafaOOD Security Vulnerabilities and Mitigation Mechanism
Shabana RehmanAbstract
2012
66Romana IshratDr. Rafat ParveenMachine Learning Approach to Object-Oriented Software Quality Estimation -A Decision Tree Perspective
Romana IshratAbstract
2011
67Raed Ibraheem HamedDr. Rafat Parveen / Prof. Syed I. AhsonMODELING AND SIMULATION OF BIOLOGICAL PROCESSES USING PETRI NET THEORY
Raed Ibraheem HamedAbstract
2011
68ZAID AL-BAGHDADIDR. S.A.M. RIZVI / DR. HALIMA SADIA RIZVIE-BANKING : CHALLENGES & FUTURE
ZAID AL-BAGHDADIAbstract
2011
69Asaad Abdul Malik M. Al-SalihProf K. Mustafa / Prof S. I. Ahson"Detection of Movement in Video Images"
Asaad Abdul Malik M. Al-SalihAbstract
2011
70Santosh Kumar PandeyProf. K. MustafaSecurity Risk Assessment through SRS
Santosh Kumar PandeyAbstract
2011
71Mohd. NazirProf. K. Mustafa / Dr. R. A. KhanTestability Estimation of Object Oriented Software -Design Phase Perspective-
Mohd. NazirAbstract
2011
72Nahla Ibraheem JabbarDr. Monica Mehrotra /Prof. S. I. Ahson / Prof. M. HanmandluApplication of Fuzzy Neural Network in Digital Image Clustering  
Nahla Ibraheem JabbarAbstract
2010
73Raad Abdulhassan MuhajjarDr. Rafat Parveen / Prof. Nupur Prakash & Dr. S. Kazim NaqviSecuring Wireless Hotspot Networks   
Raad Abdulhassan MuhajjarAbstract
2010
74Nahla Abbas FlayhDr. Rafat Parveen / Prof. S. I. AhsonImage Encryption and Compression   
Nahla Abbas FlayhAbstract
2010
75Luma Sallal HassanDr. S. A. M. RizviDevelopment of Knowledge Base Management System Using Fuzzy Logic on Genetic Learning Algorithm   
Luma Sallal HassanAbstract
2010
76Maher IbrahimDr. S.A.M. RizviExtension and Standardization of Data Dictionary in DBMS   
Maher IbrahimAbstract
2010
77Pratibha AgrawalProf. K. MustafaTesting For Software Fault Tolerance
Pratibha AgrawalAbstract
2010
78Pankaj Aggarwal Application of Pattern Matching for Sequence Analysis Techniques in Bioinformatics 
Pankaj AggarwalAbstract
2009
79Abdul WahidDr. Khurram Mustafa [DCS# JMI]/ Dr. P L Maggu [GSBA G. Noida ]Web Based Instructional System for Computer Programming 
Abdul WahidAbstract
2009
80Shahanawaj AhamadDr. S. A. M. RizviAN ANALYTICAL STUDY FOR EVOLVEMENT OF IMPROVED GUIDELINES AND MODELS FOR CENTRALIZED LEGACY SYSTEM TO INTRANET-BASED ARCHITECTURES 
Shahanawaj AhamadAbstract
2009
81Syed Zeeshan HussainDr. S.A.M RizviA Unified Approach to Analyze Multiple Access Protocols for Buffered Finite Users 
Syed Zeeshan HussainAbstract
2009
82Bharat Kumar YadavDr. S.A.M. Rizvi /Dr. H.C. Kandpal[ Optical Radiation Standards# National Physical Laboratory# New Delhi ]Computer Modelling Based Empirical Study on Coherence-Induced and Diffraction-Induced Spectral Changes 
Bharat Kumar YadavAbstract
2009
83Anirban Das Entropy-Based Indexing On Color And Texture In Image Retrieval
Anirban DasAbstract
2008
84Shane Kazim NaqviDr. Khurram Mustafa / Prof. Syed Ismail Ahson(Co-Supervisor)Web Engineering for Wireless Networks 
Shane Kazim NaqviAbstract
2008
85Saba Aziz HilalDr. S.A.M. RizviDevelopment of Syllabus Based Web Content Extractor (SBWCE)
Saba Aziz HilalAbstract
2008
86T. V. PrasadProf. S. I. AhsonModeling Gene Expression with Artificial Neural Networks   
T. V. PrasadAbstract
2006
87Raees Ahmad KhanDr. K. Mustafa / Prof. S.I. AhsonQuality Estimation of Object Oriented Code – A Design Metrics Perspective  
Raees Ahmad KhanAbstract
2005
88Chander KumarDr. K. Mustafa/ Dr. A.K. SharmaA Soft Computing Approach For The Architecture of An Expert System Shell  
Chander KumarAbstract
2005
89Anita Goel nee Anita AgarwalProf S. K. Wasan/Dr. S. C. GuptaTestability Measures for Object-Oriented Software Testing2005
90Jayanthi RanjanProf. S. I. AhsonSome Statistical Method Clustering Techniques for Large Databases2005
91Surinder Mohan BhaskarProf. S. I. AhsonRole of Cryptography and Cyber Forensic in Electronic Transaction-Security and Evidence2005