Research
Sr.No. | Name of the candidate | Name of the Supervisor(s)/ Co-Supervisor(s) | Title | Year |
---|---|---|---|---|
1 | Nripendra Kumar Singh | Dr Khalid Raza | Dentomaxillofacial Image Analysis Using Deep Learning Abstract | 2024 |
2 | Sultana Parween | Prof. Syed Zeeshan Hussain | A Framework for the Performance Enhancement of Cross Layer TCP for loT Abstract | 2024 |
3 | Meenu Sharma | - | The Use of Imaging in the Early Detection of Liver Cancer Abstract | 2023 |
4 | Md Shamsul Haque Ansari | Prof. (Dr.) Monica Mehrotra | A Semantic Framework for Smart Cities Abstract | 2023 |
5 | ROHIT VASHISHT | PROF. (DR.) SYED AFZAL MURTAZA RIZVI | HETEROGENEOUS CROSS PROJECT DEFECT PREDICTION Abstract | 2023 |
6 | Md Nurul Islam | Prof. S.M.K Quadri | Development of a Framework For Software Testing For Cloud Based Application Abstract | 2023 |
7 | Ahmad Abu Turab Naqvi | Prof. Syed Afzal Murtaza Rizvi | Analysis of Gene Expression Data for Cancer Classification using Artificial Intelligence Techniques Abstract | 2023 |
8 | Iqbal Hasa | Syed Afzal Murtaza Rizvi | A Data Analytics Framework for Knowledge Discovery from Heterogeneous Data Sources (DAFDKD) Abstract | 2023 |
9 | ABDUL MANAZIR | DR. KHALID RAZA | Multi-output hybrid genetic programming model for efficient prediction of time series data Abstract | 2023 |
10 | SAHAR QAZI | Dr. KHALID RAZA | In Silico Study of POTEE and Analogous Activity of Oncologic Medicaments in Ovarian Cancer Abstract | 2023 |
11 | TARUN KUMAR GUPTA | DR. KHALID RAZA | Optimization of ANN Architecture Using Nature Inspired Techniques Abstract | 2023 |
12 | SYED ARSHAD ALI | PROF. MANSAF ALAM | A Dynamic Resource Allocation Framework for Cloud Computing Environment Abstract | 2023 |
13 | Aga Syed Shafat Ali | Syed Afzal Murtaza Rizvi | Infection Source Detection in Complex Networks Abstract | 2022 |
14 | Prachi | Dr. Suraiya Jabin | Synthetic Aperture Radar (SAR) image modeling and analysis for Environment Protection Abstract | 2022 |
15 | Zubair Ali Ansari | Dr. Jahiruddin | Efficient Algorithms for Subgraph Matching in Big Graphs Abstract | 2022 |
16 | Aditya Dev Mishra | Prof. (Dr.) Khurram Mustafa | Security Requirement specification by formal methods Abstract | 2022 |
17 | Deena Nath Gupta | Prof. Rajendra Kumar | Designing of Lightweight Security Scheme for IoT Abstract | 2022 |
18 | Gian Devi | Dr. SAM Rizvi | G-Card towards realization of Personalized Medicines using IoT: Issues and Challenges Abstract | 2022 |
19 | Malik Nadeem Anwar Mohammad | Prof. Mohammed Nazir | Modeling Security Threats during Requirements Elicitation Abstract | 2022 |
20 | Shivangi Chawla | Emotion Mining of Social Media and its Impact Analysis Abstract | 2022 | |
21 | HABIB UR REHMAN | Dr. Mohammad Nazir / Dr. Khurram Mustafa | SECURITY ASSURANCE OF WEB APPLICATION Abstract | 2021 |
22 | Mohd Javed Khan | Prof. Khurram Mustafa | Modelling Adaptive Hypermedia Instructional Systems Abstract | 2021 |
23 | Nancy Agarwal | Dr. Syed Zeeshan Hussain | Intrusion Detection for Web-based Applications Abstract | 2021 |
24 | Samiya Khan | Dr. Mansaf Alam | A Cloud Based Framework for Big Data Analytics Abstract | 2021 |
25 | Seema Rani | Dr. Monica Mehrotra | Community Detection for Social Network Analysis Abstract | 2021 |
26 | Mohd Tajammul | Dr. Rafat Parveen | Development of Secured Framework for Cloud Storage Abstract | 2021 |
27 | Vinod Kumar | Prof (Dr.) Rajendra Kumar & Dr. S.K. Pandey | Analysis and Design of Cryptographic Algorithms for Secure Group Communication Abstract | 2021 |
28 | Ajay Rastogi | Prof. Monica Mehrotra | Detection of Opinion Spam in Online Social Media Abstract | 2021 |
29 | Vineet Kumar Sejwal | Dr. Jahiruddin | Towards the Design of a Context- and Trust-Aware Recommender System Abstract | 2021 |
30 | Ashraf Kamal | Dr. Jahiruddin / Prof. Mohammad Abulaish | A Unified Data Mining Approach for Detecting Figurative Language in Twitrer Abstract | 2021 |
31 | Chetna Kumari | Prof. Suraiya Jabin / Dr. Naidu Subbarao, Dr. Muhammad Abulaish | Designing Inhibitor Targeting Autophagy Regulating Kinases for Cancer Using Machine Learning Techniques Abstract | 2021 |
32 | Subodh Kumar | Prof. (Dr.) Rajendra Kumar | Development of a cryptographic model for cyber security applications Abstract | 2021 |
33 | Amanpreet Kaur Chandok | Prof Khurram Mustafa | Security Assurance by Efficient Password Based Authentication Abstract | 2020 |
34 | Mudasir Ahmad Wani | Dr. Suraiya Jabin | Fake Profile Detection in Online Social Networks Abstract | 2019 |
35 | Faisal Anwer | Dr. Mohammed Nazir / Prof. Khurram Mustafa | Security Testing of Object Oriented Code Abstract | 2018 |
36 | Farhana Javed Zareen | Dr. Suraiya Jabin | An Adaptive Signature Recognition System as a Biometric Technology Using Neural Networks Abstract | 2018 |
37 | Shaurya Jauhari | Prof. (Dr.) S.A.M. Rizvi | Exegesis of Gene Expression Abstract | 2018 |
38 | Pramod Kumar Yadav | Prof. (Dr.) Syed Afzal Murtaza Rizvi | Efficient Query Optimization for Mining Distributed Data Abstract | 2018 |
39 | SANJAY PRATAP SINGH CHAUHAN | Dr. SYED AFZAL MURTAZA RIZVI | DEVELOPMENT OF OPTIMAL ALGORITHMS FOR ROBUST AUDIO WATERMARKING. Abstract | 2018 |
40 | Shuchi Sethi | Dr Mansaf A lam | Cloud Securi ty: Data Separation th ro ugh Secure Virtual Pat1itioning in Multitena nt Data Centers Abstract | 2017 |
41 | Kashish Ara Shakil | Dr. Mansaf Alam | An Effective Framework for Data Management in a Cloud Based System Abstract | 2017 |
42 | Sapna Varshney | Dr. Monica Mehrotra | Use of Metaheuristic Optimization Techniques for Automatic Generation of Effective Test Cases Abstract | 2017 |
43 | TARAN SINGH BHARATI | Dr. RAJENDRA KUMAR | SECURITY ENHANCEMENT OF MOBILE AD-HOC NETWORKS USING INTRUSION DETECTION SYSTEM Abstract | 2017 |
44 | Naeem Ahmad | Dr. Syed Zeeshan Hussain | A Unified Approach to Control the U ndesirable Route Discovery Packets in Adhoc Networks Abstract | 2017 |
45 | Rejaul Karim Barbhuiya | Prof. Khurram Mustafa / Dr. Suraiya Jabin | Adaptive Intelligent Tutoring Systems Abstract | 2016 |
46 | Kishwar Sadaf | Dr. Mansaf Alam | Information Retrieval Using Clustering Techniques Abstract | 2016 |
47 | Thipendra Pal Singh | Dr. Suraiya Jabin | Study of Recurrent Neural Networks for Pattern Storage and Recalling with Evolutionary Algorithms Abstract | 2016 |
48 | Zeba Khanam | Dr S.A.M Rizvi | Legacy System Migration Abstract | 2014 |
49 | Khalid Raza | Dr. Mansaf Alam / Dr. Rafat Parveen | Soft Computing Approach for Modeling Biological Networks Abstract | 2014 |
50 | Sajid Yousuf Bhat | Dr. Muhammad Abulaish | A Structural Data Mining Framework for Social Network Analysis Abstract | 2014 |
51 | Ahmad Kamal | Dr. Muhammad Abulaish | Mining Web Opinion Sources Using Machine Learning Techniques Abstract | 2014 |
52 | NEETA WADHWA | DR. S. Zeeshan Hussain / DR. S.A.M. Rizvi | EVALUATION AND ANALYSIS OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS FROM CRYPTANALYSIS PERSPECTIVE Abstract | 2014 |
53 | Muqeem Ahmed | Dr. Sayed Zeeshan Hussain / Dr. S.A.M Rizvi | “Development of Knowledge Based Grid in Semantic Web” Abstract | 2014 |
54 | Kalpana | Dr. Monica Mehrotra | Enhancing Ontology Alignment with Machine Learning for Better Interoperability of Semantic Web Abstract | 2013 |
55 | Mukta Narang | Dr. Monica Mehrotra | Measuring the security intensity of a software system using a security metrics Abstract | 2013 |
56 | Meenakshi Bhat | Dr. S. A. M. Rizvi | “In silico Comprehensive Sequence and Structure Analysis of Protease Family” Abstract | 2013 |
57 | Syed Imtiyaz Hassan | Dr. Syed Zeeshan Hussain/Dr. S.A.M. Rizvi | A Study to Achieve Higher Degree of Automation by Structural Change in Model-View-Controller (MVC) Abstract | 2013 |
58 | S. Sangeetha | Dr. Monica Mehrotra / Dr. Dinesh Gupta | “In silico identification of potential inhibitors of drug targets in Plasmodium falciparum and design of target oriented virtual compound library” Abstract | 2012 |
59 | Jahiruddin | Dr. Muhammad Abulaish / Dr. Lipika Dey | Text Mining for Knowledge Discovery from Domain-Specific Text Abstract | 2012 |
60 | Vineet Kumar Sharma | Dr. S. Zeeshan Hussain / Dr. S.A.M. Rizvi | The Development of Software Technique to Improve the Performance of a Distributed System. Abstract | 2012 |
61 | Nadia Imdadi | Dr. S.A.M. Rizvi | Global Framework for Automatic Semantic Integration Incorporating Semantic Repositories Abstract | 2012 |
62 | Muna Mhammad Taher Jawhar | Monica Mehrotra | Enhanced Design of an Intrusion Detection System Abstract | 2012 |
63 | Mohammad Ahmad | Prof. K. Mustafa | Component Based Software Engineering Abstract | 2012 |
64 | Rajendra Kumar | Prof. K. Mustafa | Development of Security Requirements for Web Applications Abstract | 2012 |
65 | Shabana Rehman | Prof.K.Mustafa | OOD Security Vulnerabilities and Mitigation Mechanism Abstract | 2012 |
66 | Romana Ishrat | Dr. Rafat Parveen | Machine Learning Approach to Object-Oriented Software Quality Estimation -A Decision Tree Perspective Abstract | 2011 |
67 | Raed Ibraheem Hamed | Dr. Rafat Parveen / Prof. Syed I. Ahson | MODELING AND SIMULATION OF BIOLOGICAL PROCESSES USING PETRI NET THEORY Abstract | 2011 |
68 | ZAID AL-BAGHDADI | DR. S.A.M. RIZVI / DR. HALIMA SADIA RIZVI | E-BANKING : CHALLENGES & FUTURE Abstract | 2011 |
69 | Asaad Abdul Malik M. Al-Salih | Prof K. Mustafa / Prof S. I. Ahson | "Detection of Movement in Video Images" Abstract | 2011 |
70 | Santosh Kumar Pandey | Prof. K. Mustafa | Security Risk Assessment through SRS Abstract | 2011 |
71 | Mohd. Nazir | Prof. K. Mustafa / Dr. R. A. Khan | Testability Estimation of Object Oriented Software -Design Phase Perspective- Abstract | 2011 |
72 | Nahla Ibraheem Jabbar | Dr. Monica Mehrotra /Prof. S. I. Ahson / Prof. M. Hanmandlu | Application of Fuzzy Neural Network in Digital Image Clustering Abstract | 2010 |
73 | Raad Abdulhassan Muhajjar | Dr. Rafat Parveen / Prof. Nupur Prakash & Dr. S. Kazim Naqvi | Securing Wireless Hotspot Networks Abstract | 2010 |
74 | Nahla Abbas Flayh | Dr. Rafat Parveen / Prof. S. I. Ahson | Image Encryption and Compression Abstract | 2010 |
75 | Luma Sallal Hassan | Dr. S. A. M. Rizvi | Development of Knowledge Base Management System Using Fuzzy Logic on Genetic Learning Algorithm Abstract | 2010 |
76 | Maher Ibrahim | Dr. S.A.M. Rizvi | Extension and Standardization of Data Dictionary in DBMS Abstract | 2010 |
77 | Pratibha Agrawal | Prof. K. Mustafa | Testing For Software Fault Tolerance Abstract | 2010 |
78 | Pankaj Aggarwal | Application of Pattern Matching for Sequence Analysis Techniques in Bioinformatics Abstract | 2009 | |
79 | Abdul Wahid | Dr. Khurram Mustafa [DCS# JMI]/ Dr. P L Maggu [GSBA G. Noida ] | Web Based Instructional System for Computer Programming Abstract | 2009 |
80 | Shahanawaj Ahamad | Dr. S. A. M. Rizvi | AN ANALYTICAL STUDY FOR EVOLVEMENT OF IMPROVED GUIDELINES AND MODELS FOR CENTRALIZED LEGACY SYSTEM TO INTRANET-BASED ARCHITECTURES Abstract | 2009 |
81 | Syed Zeeshan Hussain | Dr. S.A.M Rizvi | A Unified Approach to Analyze Multiple Access Protocols for Buffered Finite Users Abstract | 2009 |
82 | Bharat Kumar Yadav | Dr. S.A.M. Rizvi /Dr. H.C. Kandpal[ Optical Radiation Standards# National Physical Laboratory# New Delhi ] | Computer Modelling Based Empirical Study on Coherence-Induced and Diffraction-Induced Spectral Changes Abstract | 2009 |
83 | Anirban Das | Entropy-Based Indexing On Color And Texture In Image Retrieval Abstract | 2008 | |
84 | Shane Kazim Naqvi | Dr. Khurram Mustafa / Prof. Syed Ismail Ahson(Co-Supervisor) | Web Engineering for Wireless Networks Abstract | 2008 |
85 | Saba Aziz Hilal | Dr. S.A.M. Rizvi | Development of Syllabus Based Web Content Extractor (SBWCE) Abstract | 2008 |
86 | T. V. Prasad | Prof. S. I. Ahson | Modeling Gene Expression with Artificial Neural Networks Abstract | 2006 |
87 | Raees Ahmad Khan | Dr. K. Mustafa / Prof. S.I. Ahson | Quality Estimation of Object Oriented Code – A Design Metrics Perspective  Abstract | 2005 |
88 | Chander Kumar | Dr. K. Mustafa/ Dr. A.K. Sharma | A Soft Computing Approach For The Architecture of An Expert System Shell Abstract | 2005 |
89 | Anita Goel nee Anita Agarwal | Prof S. K. Wasan/Dr. S. C. Gupta | Testability Measures for Object-Oriented Software Testing | 2005 |
90 | Jayanthi Ranjan | Prof. S. I. Ahson | Some Statistical Method Clustering Techniques for Large Databases | 2005 |
91 | Surinder Mohan Bhaskar | Prof. S. I. Ahson | Role of Cryptography and Cyber Forensic in Electronic Transaction-Security and Evidence | 2005 |