Research Papers Published in Year 2012

1. Vijendr Kumar Solanki, Kumar Pal Singh,M.Venkatesan , S.Tamilselvan "A Holistic Approach to Secure Networks Unsing Firewall" has been published in National Confernce on "Frontiers of Applied Science and Computer Techlnolgy", FACT-2012 ( dated 6-7th Dec 2012 at NIT Trichy. (Conference Proceeding, Vol-1, pp 48-56).

2. Vijender Kumar Solanki, Kumar Pal Singh and M Venkatesan. “ Firewalls Best Practices in an Organization” in IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC 9-11, November 2012. Published by Foundation of Computer Science, New York, USA (

3. Vineet Kansal “An Analysis of Mobile Transaction Methods and Limitations in execution of M Commernce Transaction” in International Journal of Computer Application, Vol. 43, Iss. 21, pp.14-19, ISSN 975-0887, April 2012.

4.Umang “Analytical Study of Existing Methodologies of IDS for False Alarm Rate -A Survey and Taxonomy”,International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Iss. 4, pp. 393-399, ISSN 2250-2459, April 2012.

5.A. Agrawal & R. A. Khan, “Role of Coupling in Vulnerability Propagation-Object Oriented Design Perspective”, Software Engineering: An International Journal (SEIJ), vol. 2, no.1 March 2012, pp. 60-68.

6.P. Dhar, “Cloud Computing and its Applications in the world of Networking” in IJCSI International Journal of Computer Science issues, Vol. 9, Issue 1 No 2,pp. 430-433, ISSN (Online) 1694-0814, January 2012.

7.P. Dhar, “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” in IJCSI International Journal of Computer Science issues, Vol. 9, Iss. 1 No 2, pp. 402-406, ISSN (Online) 1694-0814, January 2012.

8.Umang, Shruti Goyal, “Incorporation of IDS in real world applications”,Journal of Computing and Information Sciences, Vol. 3 , Iss.1, pp. 15-20,ISSN-2079-8047,EISSN: 22186301January 2012.

9.C.Sharma, R Roshan, R.Porwal “ Intellegent Video Object Classification scheme using offline Feature Extractionand Machine Learning based Approach”, International Journal of Computer Science Issue, Vol.9, Iss. 1, No. 3,pp. 247-256,ISSN (Online) 1694-0814, January 2012.

Research Papers Published in Year 2011

1.Sharma Charamani, “Automatic Human Activity Recognition in Video using Background Modleling and Spatio-temporal Template Matching Based Technique”, ACM International Conference ACAI 2011, Chitkara University, Patiala Punjab, pp 97-101, ACM 978-4503-0635-5/11.10, 2011

2.A. Seth. “Data warehousing framework for Telecom Revenue Assurance” in International Conference on Issues and Challenges in Networking, Intelligence and computing Technologies (ICNICT 2011) Sep. 2011.

3.A. Agrawal & R.A.Khan, “A Framework for Vulnerability Minimization- Object Oriented Design Perspective”, 2ndInternational Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society, pp. 499-504.

4.A. Agrawal & R.A.Khan, “Assessing and Improving Encapsulation for Minimizing Vulnerability of an Object Oriented Design”, Communication in Computer and Information Science, Springer-Verlag, vol. 250, no. 2, pp. 531-533, 2011.

5.Umang, B. V. R. Reddy, M. N. Hoda, GNDA: Detecting Good Neighbor nodes in adhoc routing protocol, IEEE Second International Conference on Emerging Applications of Information Technology, 978-0-7695-1/11 $26.00© 2011 IEEE.DOI 10.1109/EAIT.2011.62.

6. Dr. Rabins Porwal, “Working Capabilities of A.T.M with parallels redundant central computer” International Journal of Computational Intelligence and Information Security, Vol-2 No 11,pp. 16-26, Nov-2011.

7.Umang, “Secure Routing Protocols In Mobile Adhoc Networks-A Survey And Taxonomy”, International Journal of Reviews in wireless computing, Vol. 7, Iss. 2, pp. 9-17, ISSN 2076-3328, September 2011.

8.Ashish Seth, “Designing a SOA Based Model” ACM SIGSOFT Software Engineering Notes Page 1 Volume 36 Number 5, September 2011.

9.Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Evolution of Technology through Procedural, Object Oriented, Component Based to Service Oriented. The Journal for Computing Teachers.

10.Vidushi Sharma, Nancy Sharma, “Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform”, IFRSA International Journal of Data Warehousing & Mining, pp. no.75-78, Vol 1 Iss. 1, Aug-2011.

11.Dinkar,S.K. and Purwar, R.K., “Time Aware Incremental Page Ranking Based on Personalized Link Structure Analysis”. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol.2 Iss. 2, pp 383 – 388, ISSN: 2079-2557, published by Science Academy, UK, indexed in Ulrich, Cabell’s Directory, Google Scholar, Journal Seek, EBSCO, Open J-Gate, Computers and Applied Sciences Complete, ProQuest Technology, INSPEC, Scientific Commons, April, 2011.

12.Umang, Reddy B.V.R and Hoda M.N., “Study of Mobile Management Schemes in Mobile Adhoc Networks”, International Journal of Computer Applications, March 2011, Vol. 17, Iss. 7, pp. 42-47, ISSN-0975-8887, DOI: 10.5120/2236-2605.

13.Ashish Seth. “SOA Evolution – A Review” In International Journal of Engineering Sciences, Vol 1, ISSN: 2229-6913, March 2011.

14.Porwal Rabins, “A Survey in sensor’s Drift counteraction using Dynamic Pattern Recognition System”, Vol. 3 No. 1, pp. no 127-132, ISSN :975-3397, Jan 2011.

15.Pandey, SK, Singh G.P., Kansal V, “Study of Object Oriented Analysis & Design Approach’, Journal of Computer Science, Vol 7 Iss. 2, pp. 143-147, Indexed in NY, USA and indexed in Ulrich, DOAJ, Cabell, WAD, ASA, IET-ISI Scient6ific, Genamics, EBSCO, Thomson Gale, ProQuest, SCOPUS, ISSN 1549-3636, Jan 2011.`

16. Umang, Securing AODV: A Survey in the 6thNational Conference on Advancements In Computational Techniques & Applications (ACTA-2011), at I.T.S Management & IT Institute Ghaziabad, pp. no 134-137, ISBN: 978-93-815830-6-7, October 2011.

17.Nancy Kansal, Identifing Capabilities of Data Mining in providing the Quality Technical Education in The Proceeding of 5thNational Conference on “ Computing for National Development (INDIACom 2011)” at Bharati Vidya Peeth’s Institute of Computer Applications and Management New Delhi, March10-11,2011.

18.Nancy Kansal, Role of ICT in India: Rural Areas and Health Care in National Conference on“Impact of Information Technology on Society” at I.T.S Mohan Nagar Ghaziabad.

19.C. Sharma. “An Automatic Machine Learning and Particle Fitering Based Approach to Real Time Human Tracking in Videos” National Conference on Signal Processing and Real Time operating system (SPRTO, 2011), pp 290-295, HBTI Kanpur, March 26-27,2011.

20. Khanna.A, Siddiqui.Z, “Domain Driven Data Mining” published in the proceedings of the 5th National Conference on “Computing for Nation Development”, organized by BVICAM, New Delhi, pp 1 – 5, ISBN 978-93-80544-00-7, March, 2011.

21. C. Sharma IEEE International Conference on Computer and Communication Technology (ICCCT 2011) MNNIT Allahabad Conference on 15-17thSep 2011 to be published in IEEE Xplore.

22. S.K. & Singh G.P. Study of Significant of Object of object –oriented Paraligm in Modeling in national journal” computing Trends, Vol.1, ISSN:22309152,January 2011.

Research Papers Published in Year 2010

1.Roshan, R, “Weak Passwords Practices and their Impact on the Security Systems of Universities in India: Analysis and Policy” in proceeding of International Conference of Computer Application (ICCA 2010)”, organized by TFRDC, Pondicherry, Research Publishing. pp 217-221, ISBN 978-981-08-7303-5, 24-27, December 2010.

2.Kumar, R., “Geographical Information System to Identify Related and Required Dynamic Information of an Object” in the International Conference organized by Jaipuria Institute, Ghaziabad, India, issue 1, vol. 4, pp 319-329, ISBN 978-81-313-0850-9, February, 2010.

3. Dhar, P. and Pandita, S. “The Role of Artificial Neural Networks in recognizing handwritten characters” In Sovenirof International Conference on “Innovative Practices in Management and information Technology for Excellence (SRIJAN’2010)”,organized by Maharaja Agrasen Institute of Management & Technology, Jagadhri, Excel India Publishers, pp 136, May, 2010.

4. Ashish Seth., “Minimum Spanning Tree-Based Approach for Reliability Estimation of COTS-Based Software Applications” IUP Journal of Computer Science, Vol 4. Iss. 4, pp.13-21, October 2010

5.Seth A. Singhla. A.R. & Aggarwal H, (2011, Spring), Aspects of Service Oriented Computing. The Journal for Computing Teachers.

6.UmangS., Reddy, B. V. R., Hoda M. N. "Enhanced Intrusion Detection System for malicious node detection in ad hoc routing protocol using minimal energy consumption", Communications IEE, Vol. 4, Iss. 17, pp. 2084-2094, ISSN- 1751-8628, DOI: 10.1049/iet-com.2009.0616, Nov 2010.

7.Pandey, SK, Singh G.P., Kansal V., “An Alternative approach to Temporary Memory Management in Database using Object Oriented Systems”, International Journal of Computer Science & Network Security, Vol.10 Iss. 10, pp. 158-165, ISSN 1738-7906, Seoul, Korea indexed in Copernicus, Ulrich, Getcited, Open J-gate, Journal Seek, SCRIBD, Google Scholar, October, 2010.

8.A. Agrawal & R. A. Khan, “Securing Vulnerable Software: A Checklist Approach”, The Journal of Computing (TJC), Vol.1 Iss. 2, pp. 33-45, June 2010.

Research Papers Published in Year 2009

1.Nancy Sharma, Business Intelligence in Health CareChallenges & Solutions,international Conference on IT & Business Intelligence (ITBI 2009), pp. no 23-27, 6th-8thNov.2009 at Institute of Management Technology, Nagpur, 2009.

2.A. Agrawal, S. Chandra & R. A. Khan, “An Efficient Measurement of Object Oriented Design Vulnerability”, The International Dependability Conference, ARES, IEEE Computer Society, pp. 618- 623, 16-19 March 2009.

3. Dinkar S.K., “Server Based Antiphising” published in International Conference “Quality, Reliability and Infocom Technology”, Vol. 2, pp 142, ISSN 0972-3392, December, 2009.

4.Porwal, R., Shukla, M., Awasthi, A., Moghey, A. and Pandey, P.,“Modeling a Single Level Neuron”, in Proceedings of the International Conference on “Innovative Technologies, ICIT-09”, organized by PDM College of Engineering, Bahadurgarh, Haryana, India, in collaboration with IEEE-IMS/ EMBS (Delhi), pp 309-310, June 2009.

5. Agrawal & R.A.Khan, “An Algorithm to Measure Attribute Vulnerability Ratio of an Object Oriented Design” International Journal of Recent Trends in Engineering, Vol.2, Iss.3, pp. 61-63, November 2009.

6.A. Agrawal & R.A.Khan, “A Framework to Detect and Analyze Software Vulnerabilities -Development Phase Perspective” International Journal of Recent Trends in Engineering, Vol. 2, Iss. 2, pp. 82-84, November 2009.

7.A. Agrawal & R.A.Khan, “Measuring the Vulnerability of an Object Oriented Design”, Network Security, Elsevier, Vol. 2009 Iss.10, pp. 13-17, October 2009.

8.A. Agrawal & R. A. Khan, “Impact of Inheritance on Vulnerability Propagation at Design Phase”, ACM SIGESOFT Software Engineering Notes, Vol 34, Iss. 4, pp. 1-5, July 2009

9. Saurabh Saxena. “Security Based Cryptographic Schemes for Password based Protocols” in National Conference on Recent Trends in Network Security and Cryptography, PES Institute, pp. 172-176, Octorber 2009.

10.Kumar M , “ERP Issues & Challenges in Successful Implementation” published in the proceedings of National Conference “Emerging Technology in Computer Science(ETCS-2009)”, organized by MIET Meerut, 213-516, -ISBN 977-91-96549-59-18&19, Sept, 2009.

11.Roshan R., “Data Warehousing and Data Marts: Development in Pattern of Data Mart with Feedback or without Feedback” published in “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 331-338, ISBN 978-81-89547-69-1, November, 2009.

12.Bisht, S., “AOP vs OOP" published in the proceedings of National Conference “NGTIM-2009”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 287-290, ISBN 978-81-89547-69-1, November, 2009.

13.Roshan, R., “It is a tool to capture the essence of Human Thinking and communication and make decisions” published in the proceedings of National Seminar “Information Security: EmergingThreats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 251-259, ISBN 978-81-89547-55-4,April, 2009.

14.Ray, A. , “Server Side Scripting (State Management)” published in the proceedings of National Seminar “Information Security: EmergingThreats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 231-237, ISBN 978-81-89547-55-4, April, 2009.

15.Kumar M , “Ajax: An Introduction to Web applications for future Modeling” published in the proceedings of National Seminar “Information Security: EmergingThreats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, pp 209-216, ISBN 978-81-89547-55-4, April, 2009.

16.Porwal, R., Kapoor, S., Singh, L., and Gupta, A., “A Case Study in Testing a JAVA Class”, in Proceedings of the National Conference on “Emerging Trends in Software & Networking Technologies, ETSNT’09”, organized by Amity Institute of Information Technology, Amity University, Noida, India, pp 175-177, April, 2009.

17.Kumar R., “Security attacks and security policy in WLAN” published in the proceedings of National Seminar “Information Security: EmergingThreats and innovations in the 21st Century”, organized by I.T.S Mohan Nagar, Ghaziabad, India, pp 163-175, ISBN 978-81-89547-55-4, April, 2009.

18.Saurabh Saxena “ Multidimensional Database for Book sales Data warehouse” in National Confrence on Advance Conputing & Communication Technology, ABES Ghaziabad pp E22-E25, 6-7 February 2009.

19.Kumar, P., Gupta, G., and Umang, “Aspect oriented Programming with Eclipse AspectJ Development Tool (AJDT)”, 3rd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM New Delhi, India, INDIACOM-2009, pp 319-322, ISSN:0973-7529 and ISBN 978-81-904526-0-3, January, 2009.

20. Ashish Seth National Conference on “Advance Computing & Communication Technology pm 6-7 February 2009 organized by ABES Engineering College Ghaziabad

21. Dinkar, S.K. and Verma, P., ”Knowledge Discovery in Database: Data mining” in the IILM Journal of Science, Technology & Management(CHINTAN),Vol. 2 Iss.1, pp 36-42, March 2009.

Research Papers Published in Year 2008

1.Bisht, S., “A Comparative study of aspect oriented testing approaches” published in the proceedings of International conference “Innovation in redefining Business Horizons” at IMT, Ghaziabad, India, pp 587-592, ISBN 023-063-716-7, December, 2008.

2.Pandey, S. K., “Architectural Study and Comparison of Data Warehouse Technologies” in the proceedings of International conference ICDM organized by IMT, Ghaziabad, India, pp 418-426, February, 2008.

3.Singh, K.P.,Solanki, V. K., “Implementation of Client Server Architecture using Mobile Agents” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 33-45, ISBN 978-81-89547-48-6, October, 2008.

4.Juneja, N., “Load Balancing technique for SMP machine as an improvement in Linux Scheduler” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 163-169, ISBN 978-81-89547-48-6, October 2008.

5.Srivastava, S., “Techniques of High Dimensional Data Reduction” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 259-266, ISBN 978-81-89547-48-6, October, 2008.

6.Bisht, S., “A study on Benefits of Multi-core processors” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 92-99, ISBN 978-81-89547-48-6, October, 2008.

7.Kumar, G., Tiwari, R., Gupta, S. and Srivastava, A., “Modeling Business Process and IT Infrastructure” published in the proceedings of National Conference “Next Generation Computing Technologies-2008” at ITS, Ghaziabad, India, pp 211-216, ISBN 978-81-89547-48-6, October, 2008.

8.Umang, Kumar, R. and Reddy, B.V.R. “Watchdog and Pathrater as a mechanism to make network more secure”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 84-90, March, 2008.

9.Umang, Abdulahad,F.M. and Rai, C.S. “Comparison between Proactive and Reactive Routing Protocols”, National Conference On “Issues and challenges in Internet and Mobile Computing” organized by IMR, Ghaziabd, India, pp 63-66, March, 2008.

10.Arora, P. and Umang, “Security Considerations For VoIP Systems”, 2nd National Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter and BVICAM, New Delhi, INDIACOM-2008 pp 245-247, ISSN 0973-7529 and ISBN 978-81-904526-0-2, February, 2008.

11.Pandey, S.K., and Dhawan, V. B.,“Developments and Trends in Database Technology” in the proceedings of National Seminar on “Impact of IT on Society”organized by ITS, Mohan Nagar, Ghaziabad, India, pp 69-78, ISBN 81-89547-41-0, February, 2008.

12.Kumar, R.,“Finite State machine: making simple work of complex functions” in the proceeding of National Seminar on “Impact of IT on Society”organized by ITS, Mohan Nagar, Ghaziabad, India, pp 132-139, ISBN 81-89547-41-0, February, 2008.

13.Singh, K.P., “I-Mode Technologies” in the proceedings ofNational Seminar on “Impact of IT on Society” organized by ITS, Mohan Nagar, Ghaziabad, India, pp 216-228, ISBN 978-81-89457-41-0, February, 2008.

14.Dinkar, S.K. and Bansal, N., ”Web Mining and Knowledge Discovery in Usage Patterns” in the Proceedings of National Conference on Information Security & Mobile Computing, pp 85-93, Ghaziabad, India, February, 2008.

15.Pachariya, M., “A Frame work for Test Case Generation by Combinatorics Theory” published in the Proceedings of the National Seminar on “Impact of Information Technology on Society (ITOS– 2008 )” being organized by Institute of Technology & Science Mohan Nagar, Ghaziabad, India, pp 388-407, ISBN 978-81-89457-41-7, February, 2008.

16.Tripathi, A. N., “Rural Development with IT Awareness” in the proceedings of National Marketing Seminar on “Reconfiguring Marketing in the changing Business Landscape”,organized by ITS, Mohan Nagar, Ghaziabad, India, pp 225-230, ISBN 81-89547-38-0, January, 2008.

17. A. Agrawal, R. A. Khan & S. Chandra, “Software Security Process-Development Life Cycle Perspective”, CSI communications, India, vol. 32, no.5, pp. 39-42, August 2008.

18.Dhar, P., “OOUPS…! How many germs Live on your desk?” in the journalSpark.[Online]. July, 2008.

19.Dhar ,P., “Security Issues for SHE (Smart Home Environment )” in the jounalSpark.[Online]. 2008.

Research Papers Published in Year 2007

  1. Umang, and Hoda, M. N. “A Study of Adhoc Wireless Network Routing based on Various AODV Routing Schemes”, International Conference on “Information and Communication Technolgy”, organized by DIT, Dehradun in association with Uttarakhand State Council for Science & Technology, Bharat Sanchar Nigam and Institute of Engineers India((IE(I)), pp 873-876, July, 2007.
  2. Dinkar, S.K. and Bansal, N., ”Semantics of Temporal Databases: A Perspective Approach” in the proceedings of National Conference on “Organizational Transformation Through Information Technology Issues and Challenges”, Indore, India, pp 173-184, September, 2007.
  3. 32.Umang and Hoda, M.N., “Mitigating Attacks in Routing Protocol”, IstNational Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter andBVICAM, New Delhi, INDIACOM-2007 pp 145-147, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.
  4. 33.Umang and Hoda, M.N., “Role Of ICT in Indian Rural Areas”, IstNational Conference on “Computing For Nation Development”, organized by IETE Delhi Chapter, CSI Delhi Chapter andBVICAM, New Delhi, INDIACOM-2007 pp 89-92, ISSN 0973-7529 and ISBN 978-81-904526-0-1, February, 2007.
  5. .Umang, “Challenges in Securing VoIP”, 40thAnnual Convention of ORSI, organized by Indian National Science Academy, New Delhi, DST and ORSI, pp 126, December, 2007.
  6. Umang and Hoda, M.N., “A Performance comparison of Adhoc on Demand Distance Vector Routing Protocol” in the proceedings of National Conference on “Mathematical Modeling, Optimization and their applications”, organized by SEQOMM DU, Delhi, pp 62-63, April, 2007.
  7. Pandey, S. K., “Study of status and Legal Framework of cyber crimes-An Indian Prespective” in the Business Journal from FORE, India, Vol. 24 Issue 3, pp. 20-29, ISSN 0970-2385, December, 2007.
  8. 7.Dhar, P., “Use of Technology in newspaper printing with special reference to TOI” in the journalSpark[Online]. April 2007.
  9. 8.Pandey, S. K., “Context-Aware Computing: Augmentation of Mobile devices with Awareness of their Context” in the Apeejay Journal of Management and Technology, Jalandhar, India, Vol. 3, Iss.1 pp 85-93, January, 2007.

Research Papers Published in Year 2006

1.Mechanics and Information Theory” in the proceedings of National conference on Information Technology and Its Application organized by Bharati Vidyapith, New Delhi, India, pp 21-24, April, 2006.

2.Umang,Reddy, B. V. R. and Hoda, M. N.,“Impact of ICT in Wireless Networks For Indian Rural Development”, National Seminar on “ICT for Productivity, ICTP- 2006” organized bySardar patel University, Gandhinagar, India, pp 18, December, 2006.

3.Pandey, S. K., “Information and communication Technology A catalyst for future roadmap of India” in the Journal Business Transaction The road ahead, pp 133-141, INMANTEC publishing House, July, 2006.

4.10.Pandey, S. K., “Grid Computing: Enabler of Clustering of Distributed Resources” in the IIIM Journal of Management and IT (OORJA), Jaipur, India, issue 2, Vol. 4, pp 55-63, May-August 2006.

.Research Papers Published in Year 2005

1.Umang, ”Emerging Wireless Technologies in Growth & Development of Rural Areas”,8thInternational Conference on Interdisciplinary approach in Physical sciences, organized by IAPS, Allahabad, India, pp 45, December, 2005.

2.Pandey, S. K., “Analytical Study of Data Mining Algorithm”, International conference on Interdisciplinary approach in physical Sciences, organized by IAPS, Allahabad, India, pp 37-38, December, 2005.

3. Pandey, S.K. and Bagchi, D., “Software Reliability: Critical attribute for a successful Implementation” in the proceedings of National conference on Emerging Computer Technology organized by Hans Raj Mahila Maha Vidyalaya , Jalendhar, India, pp 67-73, September, 2005.

4. Pandey, S. K., “Data Mining: Application of Clustering and parallelism” in the Journal of Rajarshi School of Management & Technology, India, issue 2, Vol. 2, pp 60-74, ISSN 0972-1398, June, 2005.

Research Papers Published in Year 2003

1.Pandey, S. K., “The Saga of E-Commerce & Reforms” in the ITS Journal of IT and Management (SYNERGY), Ghaziabad, India, issue 2, Vol. 1, pp 79-85, March 2003.