Department Details

Department of Computer Science

1)    Patil, N., Joshi, S. (2019). Query routing at infrastructure level as load balancer at application and database server. International Journal of Information and Computing Science, 6 (9), 1-13. ISSN(print/online): 0972-1347, URL/DOI: http://www.ijics.com/gallery/1-sep-1493.pdf
2)    Jyoti Yadav (2019). Software Comprehension Using Open Source tools: A Study. International Journal of Computer Sciences and Engineering, 7 (3), 2347-2693. ISSN(print/online): 2347-2693.
3)    Yadav, J. (2018). Primary, Technical and Implementation Barriers in Blockchain Technology. International Journal of Modern Trends in Engineering and Research, 5 (4), 195-206. ISSN(print/online): 2393-8161/2349-9745.
4)    Yadav, J. (2018). Forecasting Model for Short Term Momentum of Nifty Index Based on Fuzzy Logic. International Journal of Advance Engineering and Research Development, 5 (4), 2079-2091. ISSN(print/online): 2348-4470/2348-6406.
5)    Yadav, J.V. (2017). Efficacy of Degree of Reliability and Computing with Words in fuzzy Description of Air Quality. International Journal of Science and Research, 6 (2), 1184-1188. ISSN(print/online): 2319-7064, URL/DOI: https://www.ijsr.net/archive/v6i2/ART2017964.pdf
6)    Yadav, J.V., Deshpande, A. (2017). Risk Based Optimal Ranking of Polluted Cities in a Fuzzy Environment: A Case Study. Grenze International Journal of Engineering and Technology, 3 (1), 1-6. ISSN(print/online): 2395-5287/2395-5295.
7)    Namdeo, A., Yadav, J., Deshpande, A. (2016). Belief and Plausibility of UK Pulmonologists’ on Health Effects Due to Air Pollution: Revisited. International Journal of Health Sciences and Research, 5 (12), 346-354. ISSN(print/online): 2249-9571, URL/DOI: http://www.ijhsr.org/IJHSR_Vol.5_Issue.12_Dec2015/50.pdf
8)    Patil, N., Patil, Y.P., Kale, N.D. (2015). Android OS Security: Heuristic based approach to detect Malicious Apps. International Journal of Research and Development, 2 (1), 1-9. ISSN(print/online): 2279-0438/2279-043X, URL/DOI: https://www.researchgate.net/publication/282074710_Android_OS_Security_Heuristic_based_approach_to_detect_Malicious_Apps
9)    Yadav, J., Kharat, V., Deshpande, A. (2015). Fuzzy-GA modeling in air quality assessment. Environmental Monitoring and Assessment, 187 (4), 1-14. Google Scholar Citations: 1, WoS Citations: 2, ISSN(print/online): 0167-6369/1573-2959, URL/DOI: http://dx.doi.org/10.1007/s10661-015-4351-7
10)    Yadav, J.Y., Kharat, V., Deshpande, A. (2014). Zadeh-Deshpande Approch for fuzzy Description of Air and Water Quality. BIJIT- BVICAM’s International Journal of Information Technology, 6 (1), 677-682. Google Scholar Citations: 2, ISSN(print/online): 0973-5658, URL/DOI: http://www.bvicam.ac.in/bijit/downloads/pdf/issue11/04.pdf
11)    Yadav, J., Kharat, V., Deshpande, A. (2014). Fuzzy description of air quality using fuzzy inference system with degree of match via computing with words: a case study. Air Quality, Atmosphere and Health, 7 (3), 325-334. Google Scholar Citations: 8, WoS Citations: 6, ISSN(print/online): 1873-9318/1873-9326, URL/DOI: http://dx.doi.org/10.1007/s11869-014-0239-x
12)    Yadav, J., Kharat, V., Deshpande, A. (2013). Evidence theory and fuzzy relational calculus in estimation of health effects due to air pollution. Journal of Intelligent Systems, 22 (1), 9-23. Google Scholar Citations: 5, ISSN(print/online): 2191-026X, URL/DOI: http://dx.doi.org/10.1515/jisys-2012-0018
13)    Korpal, R., Gopal, A. (2011). A Semantics Based Approach to Efficient Retrieval of Temporal Patterns. International Journal of Computer Applications, 4, 51-58. ISSN(print/online): 0975-8887, URL/DOI: http://www.ijcaonline.org/icwet/number4/ALGO405.pdf
  

Publications Before 2011


14)    Korpal, R., Gopal, A. (2010). Extendible Signature Hashing as an indexing technique for efficient content-based retrieval of Temporal Patterns. International Journal of Computer Science and Applications, 178-183. ISSN(print/online): 0972-9038.
16)    Maath, K. (2008). Gaining Secure Assets using Integrated Components of Grid security Infrastructure (GSI) Creating inside Grid Environment. International Journal of Computer Science and Network Security, 8 (1), 291-296. ISSN(print/online): 1738-7906, URL/DOI: http://paper.ijcsns.org/07_book/200801/20080142.pdf
17)    Gornale, S.S., Manza, R.R., Humbe, V., Kale, K.V. (2007). Performance Analysis of Biorthogonal Wavelet Filters for Lossy Fingerprint Image Compression. International Journal of Imaging Science and Engineering, 1 (1), 16-20. Google Scholar Citations: 18, ISSN(print/online): 1934-9955, URL/DOI: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.1840&rep=rep1&type=pdf
18)    Shrivastava, A., Shinde, M., Gornale, S.S., Lawande, P. (2007). An Approach-Effect of an Exponential Distribution on different medical images. International Journal of Computer Science and Network Security, 7 (9), 235-241. Google Scholar Citations: 3, ISSN(print/online): 1738-7906, URL/DOI: http://paper.ijcsns.org/07_book/200709/20070935.pdf