Department Details

Department of Computer Science

1)    Yadav, J., Mate, N.S., Shaligram, A.D. (2024). Comprehensive Evaluation of Clustering-based Defensive Technique against Label Modification Attack. Telematique, 23 (1), 315-323. ISSN(print/online): 1856-4194, URL/DOI: https://www.provinciajournal.com/index.php/telematique/article/view/1692
2)    Suryavanshi, M., Yadav, J.Y. (2022). Mitigating TCP incast in data center networks using enhanced application layer technique. International Journal of Information Technology, 14, 2523–2531. ISSN(print/online): 2511-2104/2511-2112, URL/DOI: http://dx.doi.org/10.1007/s41870-022-00976-z
3)    Yadav, J., Ahire, K.P. (2022). The Network Topology Classification in SDN Ecosystem using Machine Learning. International Journal of Next-Generation Computing, 13 (2), 162-180. ISSN(print/online): 2229-4678/0976-5034, URL/DOI: http://dx.doi.org/10.47164/ijngc.v13i2.410
4)    Keskar, M.V., Yadav, J., Kumar, A. (2021). Taxonomy of Data Inconsistencies in Big Data. Information Technology in Industry, 9 (1), 353-363. ISSN(print/online): 2203-1731, URL/DOI: http://www.it-in-industry.org/index.php/itii/article/view/139/124
5)    Kumbhar, V., Yadav, J., Kumar, A. (2021). Least Afflicted Load Balancing Algorithm (LALBA) for Performance Improvement of Multi-Scale Applications in Cloud Environment. Turkish Journal of Computer and Mathematics Education, 12 (2), 1709-1720. ISSN(print/online): 1309-4653, URL/DOI: https://www.turcomat.org/index.php/turkbilmat/issue/archive
6)    Yadav, J., Shevkar, R. (2021). Performance-Based Analysis of Blockchain Scalability Metric. Tehnicki glasnik, 15 (1), 133-142. Google Scholar Citations: 1, ISSN(print/online): 1846-6168/1848-5588, URL/DOI: http://dx.doi.org/10.31803/tg-20210205103310
7)    Keskar, V., Yadav, J., Kumar, A. (2021). Perspective of Anomaly Detection in Big Data for Data Quality Improvement. Materials Today: Proceedings, 51 (1), 532-537. Google Scholar Citations: 8, ISSN(print/online): 2214-7853, URL/DOI: http://dx.doi.org/10.1016/j.matpr.2021.05.597
8)    Mandhare, P., Yadav, J., Kharat, V., Patil, C.Y. (2021). Control and Coordination of Self-Adaptive Traffic Signal Using Deep Reinforcement Learning. International Journal of Next-Generation Computing, 12 (3), 190-199. ISSN(print/online): 2229-4678/0976-5034, URL/DOI: https://ijngc.perpetualinnovation.net/index.php/ijngc/article/view/207
9)    Suryavanshi, M., Kumar, A., Yadav, J. (2021). Balanced Multipath Transport Protocol for Mitigating MPTCP Incast in Data Center Networks. International Journal of Next-Generation Computing, 12 (3), 328-342. ISSN(print/online): 2229-4678/0976-5034, URL/DOI: https://ijngc.perpetualinnovation.net/index.php/ijngc/article/view/214
10)    Suryavanshi, M., Kumar, A. , Yadav, J. (2021). An application layer technique to overcome TCP incast in data center network using delayed server response. International Journal of Information Technology, 13 (2), 703-711. ISSN(print/online): 2511-2104/2511-2112, URL/DOI: http://dx.doi.org/10.1007/s41870-020-00579-6
11)    Yadav, J., Keskar, V., Kumar, A. (2020). 5V‟s of Big Data Attributes and their Relevance and Importance across Domains. International Journal of Innovative Technology and Exploring Engineering, 9 (11), 154-163. ISSN(print/online): 2278-3075, URL/DOI: http://dx.doi.org/10.35940/ijitee.K7709.0991120
12)    Kumbhar, V., Yadav, J., Kumar, A. (2020). A Conceptual Paper on Multi-Scale Applications in Cloud Environment with Reference to Variety of Data. International Journal of Innovative Technology and Exploring Engineering, 9 (5), 1229-1235. ISSN(print/online): 2278-3075, URL/DOI: http://dx.doi.org/10.35940/ijitee.D1808.039520
13)    Yadav, J., Keskar, V., Kumar, A. (2020). Big Data Analytics: Challenges, Openings, Issues, Tools, and Techniques. International Journal of Grid and Distributed Computing, 13 (2), 2454-2474. ISSN(print/online): 2005-4262, URL/DOI: http://sersc.org/journals/index.php/IJGDC/article/view/35234
14)    Patil, N., Joshi, S. (2019). Query routing at infrastructure level as load balancer at application and database server. International Journal of Information and Computing Science, 6 (9), 1-13. ISSN(print/online): 0972-1347, URL/DOI: http://www.ijics.com/gallery/1-sep-1493.pdf
15)    Samdadia, R., Patil, N. (2019). A Multi Factor Duplicate Image Deduplication System. International Journal of Computer Sciences and Engineering, 7 (11), 49-51. ISSN(print/online): 2347-2693, URL/DOI: http://dx.doi.org/10.26438/ijcse/v7i11.4951
16)    Jyoti Yadav (2019). Software Comprehension Using Open Source tools: A Study. International Journal of Computer Sciences and Engineering, 7 (3), 657-668. ISSN(print/online): 2347-2693, URL/DOI: http://dx.doi.org/10.26438/ijcse/v7i3.657668
17)    Yadav, J. (2018). Primary, Technical and Implementation Barriers in Blockchain Technology. International Journal of Modern Trends in Engineering and Research, 5 (4), 195-206. ISSN(print/online): 2393-8161/2349-9745.
18)    Yadav, J. (2018). Forecasting Model for Short Term Momentum of Nifty Index Based on Fuzzy Logic. International Journal of Advance Engineering and Research Development, 5 (4), 2079-2091. ISSN(print/online): 2348-4470/2348-6406.
19)    Yadav, J.V. (2017). Efficacy of Degree of Reliability and Computing with Words in fuzzy Description of Air Quality. International Journal of Science and Research, 6 (2), 1184-1188. ISSN(print/online): 2319-7064, URL/DOI: https://www.ijsr.net/archive/v6i2/ART2017964.pdf
20)    Yadav, J.V., Deshpande, A. (2017). Risk Based Optimal Ranking of Polluted Cities in a Fuzzy Environment: A Case Study. Grenze International Journal of Engineering and Technology, 3 (1), 1-6. ISSN(print/online): 2395-5287/2395-5295.
21)    Namdeo, A., Yadav, J., Deshpande, A. (2016). Belief and Plausibility of UK Pulmonologists’ on Health Effects Due to Air Pollution: Revisited. International Journal of Health Sciences and Research, 5 (12), 346-354. ISSN(print/online): 2249-9571, URL/DOI: http://www.ijhsr.org/IJHSR_Vol.5_Issue.12_Dec2015/50.pdf
22)    Patil, N., Patil, Y.P., Kale, N.D. (2015). Android OS Security: Heuristic based approach to detect Malicious Apps. International Journal of Research and Development, 2 (1), 1-9. ISSN(print/online): 2279-0438/2279-043X, URL/DOI: https://www.researchgate.net/publication/282074710_Android_OS_Security_Heuristic_based_approach_to_detect_Malicious_Apps
23)    Yadav, J., Kharat, V., Deshpande, A. (2015). Fuzzy-GA modeling in air quality assessment. Environmental Monitoring and Assessment, 187 (4), 1-14. Google Scholar Citations: 1, WoS Citations: 2, ISSN(print/online): 0167-6369/1573-2959, URL/DOI: http://dx.doi.org/10.1007/s10661-015-4351-7
24)    Yadav, J.Y., Kharat, V., Deshpande, A. (2014). Zadeh-Deshpande Approch for fuzzy Description of Air and Water Quality. International Journal of Information Technology, 6 (1), 677-682. Google Scholar Citations: 2, ISSN(print/online): 2511-2104/2511-2112, URL/DOI: http://www.bvicam.ac.in/bijit/downloads/pdf/issue11/04.pdf
25)    Yadav, J., Kharat, V., Deshpande, A. (2014). Fuzzy description of air quality using fuzzy inference system with degree of match via computing with words: a case study. Air Quality, Atmosphere and Health, 7 (3), 325-334. Google Scholar Citations: 8, WoS Citations: 9, ISSN(print/online): 1873-9318/1873-9326, URL/DOI: http://dx.doi.org/10.1007/s11869-014-0239-x
26)    Yadav, J., Kharat, V., Deshpande, A. (2013). Evidence theory and fuzzy relational calculus in estimation of health effects due to air pollution. Journal of Intelligent Systems, 22 (1), 9-23. Google Scholar Citations: 5, ISSN(print/online): 0334-1860/2191-026X, URL/DOI: http://dx.doi.org/10.1515/jisys-2012-0018
27)    Korpal, R., Gopal, A. (2011). A Semantics Based Approach to Efficient Retrieval of Temporal Patterns. International Journal of Computer Applications, 4, 51-58. ISSN(print/online): 0975-8887, URL/DOI: http://www.ijcaonline.org/icwet/number4/ALGO405.pdf
  

Publications Before 2011


28)    Korpal, R., Gopal, A. (2010). Extendible Signature Hashing as an indexing technique for efficient content-based retrieval of Temporal Patterns. International Journal of Computer Science and Applications, 178-183. ISSN(print/online): 0972-9038.
30)    Maath, K. (2008). Gaining Secure Assets using Integrated Components of Grid security Infrastructure (GSI) Creating inside Grid Environment. International Journal of Computer Science and Network Security, 8 (1), 291-296. ISSN(print/online): 1738-7906, URL/DOI: http://paper.ijcsns.org/07_book/200801/20080142.pdf
31)    Shrivastava, A., Shinde, M., Gornale, S.S., Lawande, P. (2007). An Approach-Effect of an Exponential Distribution on different medical images. International Journal of Computer Science and Network Security, 7 (9), 235-241. Google Scholar Citations: 3, ISSN(print/online): 1738-7906, URL/DOI: http://paper.ijcsns.org/07_book/200709/20070935.pdf
32)    Gornale, S.S., Manza, R.R., Humbe, V., Kale, K.V. (2007). Performance Analysis of Biorthogonal Wavelet Filters for Lossy Fingerprint Image Compression. International Journal of Imaging Science and Engineering, 1 (1), 16-20. Google Scholar Citations: 18, ISSN(print/online): 1934-9955, URL/DOI: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.1840&rep=rep1&type=pdf