| SN | Name | Date of Registration | Registration No. | Topic | Guide | Co-guide | Date of Award |
|---|---|---|---|---|---|---|---|
| 1 | Abhishek Kumar | 17-11-2025 | 15BAGK94 | ||||
| 2 | Nitish Kumar | 18-11-2025 | 17-GKL-856 | ||||
| 3 | Payal | 18-11-2025 | 19-GWK-250 | ||||
| 4 | Pinki | 20-11-2025 | 17-BAGK-310 | ||||
| 5 | Balwinder Kaur | 17-12-2025 | |||||
| 6 | Paras | 05-03-2025 | 19-GC-773 | Dr. Sanjay Tyagi | |||
| 7 | Himanshu | 04-03-2025 | 18-DCK-466 | Dr. Ramesh Kait | |||
| 8 | Kanika Devi | 04-03-2025 | 15-DA-131 | Dr. Pardeep Mittal | |||
| 9 | Kajal | 04-03-2025 | 19-UC-304 | Dr. Ashish Girdhar | |||
| 10 | Maansi | 04-03-2025 | 21-UD-314 | Dr. Rakesh Kumar | |||
| 11 | Tarjeet Kaur | 04-03-2025 | 14DWK681 | Dr. Kanwal Garg | |||
| 12 | Ajay | 07-03-2025 | 15-GH-1066 | Dr. Chander Kant | |||
| 13 | Gurmit Singh | 07-03-2025 | 17-GKL-519 | Dr. Chander Kant | |||
| 14 | Sonu Kumari | 28-12-2023 | |||||
| 15 | Rashmi | 28-12-2023 | 24-UDPHD-66 | Systematic Analysis And Detection Of Lung Cancer Using Machine Learning Algorithm | Dr. Ashish Girdhar | ||
| 16 | Nivedita | 28-12-2023 | 18-DE-5612 | Improving Biometric System Using Distorted Fingerprint Detection | Dr. Chander Kant | ||
| 17 | Ekta Dureja | 28-12-2023 | 08-AP-901 | Performance Evaluation And Energy Conservation For Wireless Sensor Networks | Dr. Ashwani Kush | ||
| 18 | Anu Malik | 28-12-2023 | 10-IP-307 | Stock Price Trends Prediction In High –Frequency Trading Environments Using Hybrid Model | Dr. Ramesh Kait | ||
| 19 | Reena Mehla | 01-03-2024 | 05DWK30 | Harnessing Self Organized Criticality For Optimization In Machine Learning: A New Frontier | Dr. Rakesh Kumar | ||
| 20 | Shipra Goel | 01-03-2024 | 05-GKL-963 | Sentiment Analysis For Comprehensive Opinion Mining On Digital Platforms | Dr. Kanwal Garg | ||
| 21 | John Telesphory Mhagama | 25-09-2023 | 24-UDPHD-73 | Pattern-Based Recommender System Using Machine Learning Techniques On Digital Domain | Dr. Kanwal Garg | ||
| 22 | Sonia Choudhary | 14-07-2022 | 08-GKL-1292 | Agent Based Modeling With Machine Learning In Financial Market: A Behavioral Finance Perspective | Dr. Rakesh Kumar | ||
| 23 | Joni | 15-07-2022 | 16-ECI-7 | Providing Secure Data Communication In Internet Of Things (IoT) Using Blockchain | Dr. Shuchita Upadhyaya | Dr. Monika Poriye | |
| 24 | Esha Rani | 20-07-2022 | 03-DWK-373 | Energy Efficient Intelligent Approach To Improve Life Time Of Sensor Nodes In WSN | Dr. Ashwani Kush | ||
| 25 | Anita Mehta | 14-07-2022 | 04-NS-1805 | Intelligence Triggered Plant Disease Detection | Dr. Pardeep Mittal | ||
| 26 | Rimpy Kumari | 14-07-2022 | 13-EMJH-6 | Performance Analysis In Sports Using Intelligent Techniques | Dr. Pardeep Mittal | ||
| 27 | Komal | 15-07-2022 | 2023-UDPHD-35 | Blockchain Based Digitization Of Land Management | Dr. Monika Poriye | ||
| 28 | Sangeeta | 15-07-2022 | 2023-UDPHD-34 | Machine Learning In Disaster Management: A Comprehensive Study And Analysis | Dr. Shuchita Upadhyaya | ||
| 29 | Rekha Rani | 07-12-2022 | 12-AKS-147 | Data Integration And Pattern Prediction Using Data Mining Or Machine Learning Approach | Dr. Kanwal Garg | ||
| 30 | Ritu Bhardwaj | 06-12-2022 | 08-IP-695 | Effective And Efficient Scheme To Establish Routing In Disaster Situations Using Wireless Sensor Networks | Dr. Ashwani Kush | ||
| 31 | Sonia | 07-12-2022 | 24-UDPHD-7 | Defense Mechanism Over Packet Dropping In Mobile Ad Hoc Network | Dr. Ashwani Kush | ||
| 32 | Nisha | 28-04-2021 | 06-DTK-191 | Computational Modeling Of Sentiment Analysis For Polarity Detection | Dr. Rakesh Kumar | ||
| 33 | Preeti | 29-04-2021 | 14UCS3 | Security Challenges And Issues In IoT Environment & Designing Solutions For Them | Dr. Rajender Nath | ||
| 34 | Sonia | 28-04-2021 | 10-ECK-22 | Design And Development Of Efficient Load Balancing Algorithms For Cloud Computing | Dr. Rajender Nath | ||
| 35 | Ali Asghar | 08-11-2021 | 22-UD-1684 | Predictive Machine Learning Models For Precision Agriculture | Dr. Shuchita Upadhyaya | ||
| 36 | Manju Sharma | 30-08-2020 | 07-ECR-578 | Data Clustering Using Metaheuristic Techniques | Dr. Sanjay Tyagi | ||
| 37 | Jyoti | 22-01-2021 | 16-UCS-6 | A Machine Learning Based Intelligent Approach For See Transmission In WSN | Dr. Ramesh Kait | ||
| 38 | Vijender Singh | 30-09-2019 | 09-GJ-1313 | Biometrics Based Multi Factor Authentication System For Protection Of IoT Devices | Dr. Chander Kant | ||
| 39 | Neha | 14-10-2019 | 08-SETK-298 | Designing A Framework For Sentiment Analysis | Dr. Sanjay Tyagi | ||
| 40 | Kirti Gupta | 14-10-2019 | 08-TERK-161 | Predictive Analysis Using Machine Learning Techniques | Dr. Pardeep Mittal | Dr. Shuchita Upadhyaya | |
| 41 | Kartika Makkar | 16-10-2019 | 2021-UD-PH.D.-09 | Review Based Data Analytics | Dr. Pardeep Mittal | Dr. Monika Poriye | 26-06-2025 |
| 42 | Harish Saini | 20-03-2020 | 06-ECM-581 | An Enhanced Security Approach For Rpl Based Iot Networks | Dr. Monika Poriye | ||
| 43 | Parbhjot Kaur | 20-03-2020 | 07-DA-148 | Biometric Framework For Securing Iot Environment. | Dr. Chander Kant | ||
| 44 | Ankita | 20-09-2018 | 2019-UD-PH.D.-19 | Hybridization Of Metaheuristics In Combinatorial Optimization Problems. | Dr. Rakesh Kumar | 05-12-2023 | |
| 45 | Jyoti Rani | 16-UCS-37 | Security In Cloud Computing | Dr. Rajender Nath | |||
| 46 | Smita Sharma | 20-09-2017 | 09-DTK-128 | Preserving Privacy In Cloud Computing Environment | Dr. Sanjay Tyagi | ||
| 47 | Meenakshi Devi | 06-01-2018 | 08-UT-112 | Basic Concepts Of Neuro Computing | Dr. Rakesh Kumar | ||
| 48 | Poonam Bhatia | 06-01-2018 | 2018-UD-PH.D.-12 | Improving Hybrid Methods For Sentiment Analysis/Opinion Mining | Dr. Rajender Nath | ||
| 49 | Pooja Choudhary | 06-01-2018 | 07-UC-863 | Mining Pattern From Privacy Preserved Data Using Efficient Big Data Framework | Dr. Kanwal Garg | ||
| 50 | Arpita | 04-01-2018 | 11-TES-259 | Sentiment Analysis Using Optimization | Dr. Pardeep Mittal | Dr. Kanwal Garg | 20-10-2022 |
| 51 | Anshu Devi | 25-05-2017 | 2018-UD-PH.D.-04 | Securing Vehicular Ad-Hoc Network Using Fog Computing | Dr. Ramesh Kait | Dr. Virender Ranga | |
| 52 | Kishu Gupta | 30-01-2017 | 09-GKL-1465 | Deployment Of Data Leakage Detection In Manet Secure Communication | Dr. Ashwani Kush | 14-03-2023 | |
| 53 | Swati Atri | 30-01-2017 | 2017-UD-PH.D.-1 | An Effecient Protocol For Routing In Manet | Dr. Sanjay Tyagi | 09-11-2023 | |
| 54 | Asha Sohal | 17-03-2017 | 2017-UD-PH.D.-8 | Optimized Load Balancing With Feeicient Energy In Fog-Cloud Networks | Dr. Ramesh Kait | 22-08-2024 | |
| 55 | Deepak Garg | 17-03-2017 | 09-UT-23 | Evaluation Of Metaheuristic Approaches For Load Balancing Under Cloud Computing Environment | Dr. Pardeep Mittal | 20-10-2022 | |
| 56 | Komal | 30-01-2017 | 12-UCS-42 | Securing Biometric System Using Fusion Strategies And Liveness Detection | Dr. Chander Kant | 25-03-2022 | |
| 57 | Sarbjit Kaur | 17-03-2017 | 04-DTK-318 | Secure Routing Based Content Dissemination In Van-Cloud | Dr. Ramesh Kait | 04-08-2023 | |
| 58 | Parminder Kaur | 17-03-2017 | 08-DA-458 | Content Based Static Video Summarization In Video Analytics | Dr. Rakesh Kumar | 01-09-2025 | |
| 59 | Nidhi | 30-01-2017 | 02-RK-781 | Mobile Agents Routing | Dr. Shuchita Upadhyaya | 26-06-2025 | |
| 60 | Deepak Narula | 15-10-2015 | 95-GKL-575 | Retrospective Assessment And Reinforcement Of Privacy Preservation Of Sensitive Data Using Annonymization | Dr. Pardeep Mittal | Dr. Shuchita Upadhyaya | 27-08-2019 |
| 61 | Arun Kumar Yadav | 15-10-2015 | 08-HEJ-414 | Energy Aware And Secured Routing For Manet In Disaster Situations | Dr. Ashwani Kush | 01-03-2023 | |
| 62 | Pooja | 18-03-2016 | 12-UCS-37 | Enhance Security Of Data Using Cryptographic Techniques In Wireless Sensor Network | Dr. R. K. Chauhan | ||
| 63 | Meenu Kamboj | 18-03-2016 | 03-MY-555 | Optimization Of Availability And Security Of Data In Wireless Moving Network | Dr. Ashwani Kush | ||
| 64 | Renu Jangra | 18-03-2016 | 13-EGRH-3 | Acsr Algorithm To Enhance The Secured Routing Parameters For Wireless Sensor Networks | Dr. Ramesh Kait | 20-01-2020 | |
| 65 | Monika | 15-10-2015 | 2016-UD-PH.D-7 | Efficient Resource Allocation & Scheduling Approaches In Cloud Computing | Dr. Pardeep Mittal | Dr. Sanjay Tyagi | 20-04-2021 |
| 66 | Sheela Devi | 18-03-2016 | 05-UD-55 | Intrusion Detection Techniques In Infrastructureless Wireless Networks | Dr. R. K. Chauhan | Dr. Ashwani Kush | 09-11-2023 |
| 67 | Amrinder Kaur | 16-03-2015 | 06-UT-156 | Big Data Optimization Using Metaheuristics | Dr. Rakesh Kumar | 04-08-2023 | |
| 68 | Harvinder Singh | 16-03-2015 | 02-SETK-249 | Qos Scheduling In Cloud Computing Environment Using Evolutionary Approach | Dr. Pardeep Mittal | Dr. Sanjay Tyagi | 30-09-2021 |
| 69 | Mahak | 17-10-2014 | 03-DMK--292 | Designing Ontology For Knowledge Discovery In Semantic Web Mining | Dr. R. K. Chauhan | 24-06-2020 | |
| 70 | Meena Kumari | 16-03-2015 | 06-PCD-43561 | Security In Cloud Computing Enviornment | Dr. Rajender Nath | 09-04-2019 | |
| 71 | Rajesh Kumar | 16-03-2015 | 03-DSC-166 | Search Based Software Engineering Using Metaheuristics | Dr. Rakesh Kumar | 22-12-2020 | |
| 72 | Shiraz Khurana | 16-03-2015 | 05-SETK-114 | Routing In Cognitive Radio Ad Hoc Networks | Dr. Shuchita Upadhyaya | 23-08-2021 | |
| 73 | Vivek Sharma | 04-04-2014 | 97-ECR-93 | Optimization In Search Based Software Engineering And Genetic Algorithm | Dr. Rakesh Kumar | Dr. Sanjay Tyagi | 04-03-2021 |
| 74 | Shabnam Parveen | 17-10-2014 | 02-ECR-440 | Link Farm Detection Using Minimum Correlation Path Based Ranking Algorthim | Dr. R. K. Chauhan | 19-05-2023 | |
| 75 | Renu Popli | 04-04-2014 | 04-SETK-65 | A Hybird Approach For Ourlier Detection In Manets Using Data Mining Techniques | Dr. Kanwal Garg | 31-10-2018 | |
| 76 | Jaideep Atri | 04-04-2014 | 06-ECI-150 | Optimizing Routing Mechanism In Ad Hoc Networks | Dr. Shuchita Upadhyaya | 27-08-2020 | |
| 77 | Shilpi Harnal | 17-10-2014 | 05-HEJ-383 | Security And Access Control Oriented Model For Multimedia Cloud Computing | Dr. R. K. Chauhan | 23-06-2023 | |
| 78 | Abha Narwal | 16-03-2015 | 07-UD-101 | Privacy Preserving In Web Mining | Dr. R. K. Chauhan | 27-02-2020 | |
| 79 | Sukhdev Singh | 13-01-2009 | 98-DAP-78 | Biometrics System Security | Dr. Chander Kant | 27-02-2020 | |
| 80 | Bhawna Taneja | 04-04-2013 | 09-UD-145 | Inter Cloud Computing Challenges & Solutions | Dr. Rajender Nath | 14-10-2019 | |
| 81 | Matish Garg | 04-04-2013 | 99-ECK-71 | Moble Cloud Computing Challenges & Solutions | Dr. Rajender Nath | 20-04-2021 | |
| 82 | Ruchika | 04-04-2013 | 2K-CC-8554 | Optimization Of Ad Hoc Networks Using Quality Assurance Paremeters | Dr. Ashwani Kush | Dr. Sanjay Tyagi | 06-07-2017 |
| 83 | Shalini Aggarwal | 04-04-2013 | 93-DA-287 | Intelligence Triggered Multi-Path Routing In Computer Networks | Dr. Shuchita Upadhyaya | 01-02-2018 | |
| 84 | Monika | 04-04-2013 | 02-UC-203 | Realization Of Dna Congruous Approach For Secure Data Gerneration & Communication In Wireless Sensor Networks | Dr. R. K. Chauhan | 09-04-2019 | |
| 85 | Girdhar Gopal | 04-04-2013 | 02-GNK-213 | Hybird Genetic Algorthim For Optimization Problems | Dr. Rakesh Kumar | 28-04-2016 | |
| 86 | Vikas Nagpal | 04-04-2013 | 99-MY-871 | Optimization Security And Stable Routing In Wireless Senor | Dr. Ashwani Kush | 28-04-2016 | |
| 87 | Ruchika Yadav | 04-04-2013 | 2014-UD-PHD-33 | Design Of An Improved Multiple Level Association Rule Algorithm For Discovery Of Frequent Patterns. | Dr. Kanwal Garg | 02-02-2018 | |
| 88 | Rosy Pawar | 04-04-2013 | 02-UC-234 | Self Healing Wireless Networks | Dr. Ashwani Kush | 31-10-2018 | |
| 89 | Upinder Kaur | 03-10-2011 | 99-CC-6446 | Distributed Data Structures And Searching Techniques In Different Computing Environments | Dr P. K. Suri | 03-08-2018 | |
| 90 | Manju | 04-04-2013 | 99-SGS-106 | Association Rule Mining Using Ant Colony Optimization | Dr. Chander Kant | 10-03-2016 | |
| 91 | Divyesh Sharma | 03-10-2011 | 02-UC-205 | Xml Databases | Dr. Pushpa Rani Suri | 02-02-2018 | |
| 92 | Jaswinder Kaur | 03-10-2011 | 03-ECM-552 | Frequent Pattern Evaluation Of Weblock File Using Web Mining | Dr. Kanwal Garg | 22-06-2018 | |
| 93 | Sunita Rani | 03-10-2011 | 08-UD-143 | Simulation Of Resource Management In Different Computing Enviournments | Dr P. K. Suri | 22-06-2018 | |
| 94 | Kompal | 06-04-2012 | 97-DA-102 | Effective Web Crawlers | Dr. Rajender Nath | 04-03-2021 | |
| 95 | Naresh | 03-10-2011 | 04-SETK-249 | Mobile Crawler and Search System Architectures for Efficient Searching of lnformation from WWW | Dr. Rajender Nath | 14-01-2016 | |
| 96 | Ravi Bhushan | 03-10-2011 | 97-ECR-55 | Information Retrieval Using Web Mining Techniques. | Dr. Rajender Nath | 06-03-2017 | |
| 97 | Vikas Goyal | 03-10-2011 | 02-UC-189 | Hybrid Algorithms for Security and Cost Optimization of Cloud Data Storage | Dr. Chander Kant | 28-04-2016 | |
| 98 | Sandeep Maan | 24-06-2009 | 96-CE-03 | A Stochastic Simulation Based Analysis Of Denial Of Service Attack At Network Layer In Mobile Adhoc Networks Carrying Packet Telephony | Dr P. K. Suri | 30-08-2012 | |
| 99 | Harsha | 21-01-2009 | 2009-UD-PHD-4 | Software Testing | Dr. Pushpa Rani Suri | 22-08-2016 | |
| 100 | Harmunish Teneja | 13-01-2009 | 93-MY-54 | Object Oriented Web Information Computing | Dr. Pushpa Rani Suri | 30-10-2012 | |
| 101 | Ashish Chopra | 13-01-2009 | 2009-UD.PHD.03 | Routing In Adhoc Network | Dr. R. K. Chauhan | 05-08-2014 | |
| 102 | Usha Kumari | 15-06-2009 | 82-DWK-362 | Analysis Design And Implementation Of Object Oriented And Component Based Software Metric | Dr. Shuchita Upadhyaya | 30-08-2012 | |
| 103 | Sunil Teneja | 11-05-2009 | 94-GNY-333 | Energy Efficient, Secure & Stable Routing For Mobile Adhoc Networks | Dr. Ashwani Kush | 01-07-2013 | |
| 104 | Vishal Verma | 15-06-2009 | 97-ECM-79 | Relational Data Based For Aspect Oriented Programming | Dr. Ashok Kumar | 30-08-2012 | |
| 105 | Seema | 27-11-2009 | 2009-UD.PHD.51 | Implementions Of Security In Ad-Hoc Networks | Dr. Ashwani Kush | 23-07-2013 | |
| 106 | Gaytri Devi | 16-01-2009 | 2009-UD-PHD-6 | Qos Support For One To One Routing A Multipath Approach | Dr. Shuchita Upadhyaya | 12-06-2014 | |
| 107 | Anil Kumar | 16-06-2009 | 04-UD-81 | Design Of Module For Public Sector On Pattern Based Reengineering & Measurment Of Complexity | Dr. Ashok Kumar | 30-08-2012 | |
| 108 | Deepak Sharma | 21-10-2009 | 06-UD-282 | Image Processing Biometrics Iris Recognition | Dr. Ashok Kumar | 05-08-2014 | |
| 109 | Karambir | 27-11-2009 | 06--243 | Software Engineering | Dr P. K. Suri | 06-03-2017 | |
| 110 | Arzoo Dahyia | 07-06-2009 | 03-UD--86 | Load Management Vehicular Adhoc Network | Dr. R. K. Chauhan | 27-03-2015 | |
| 111 | Suresh Chand Gupta | 21-10-2009 | 2009-UD-PHD-52 | Software Engineering | Dr. Ashok Kumar | 30-06-2014 | |
| 112 | Subhash Chander | 11-05-2009 | 84-AS-141 | Secured E- Governance In India | Dr. Ashwani Kush | 31-03-2014 | |
| 113 | Manoj Singhal | 28-01-2009 | 2009-UD-PH.D 5 | Design and Development of Efficient Algorithms for Finding the Reliability of a Computer Communication Network. | Dr. R. K. Chauhan | 28-05-2012 | |
| 114 | K.G. Singh | 18-12-2009 | 2009-UD-PHD. 53 | Data Mining Using Outlier Analysis On Olap | Dr. Shuchita Upadhyaya | 27-05-2015 | |
| 115 | Deepali Gupta | 15-12-2009 | 2009-UD-PHD. 51 | Software Engineering | Dr. Rakesh Kumar | 05-02-2015 | |
| 116 | Gurvinder Kaur | 16-04-2008 | 08-UD-PHD.21 | Software Engineering Measurement | Dr. Rakesh Kumar | 27-12-2012 | |
| 117 | Anupam Bhatia | 05-02-2008 | 94-SSA-11 | Data Mining / Spectrum Of Genetic Algorthims For Data Mining And Knowledge Penetratioin Process | Dr. R. K. Chauhan | 19-09-2013 | |
| 118 | Sukhvinder Singh | 16-05-2008 | 94-SP-235 | Network Security | Dr. Pushpa Rani Suri | 05-02-2015 | |
| 119 | Parul Tomar | 28-01-2009 | 2009.UD-PHD.2 | Simulation Of Qos Adhoc Network | Dr P. K. Suri | Dr. M.K. Soni | 30-08-2012 |
| 120 | Ranjeet Kaur | 15-04-2008 | 98-MY-255 | Data Structure/B-Tree | Dr. Pushpa Rani Suri | 22-08-2016 | |
| 121 | Meenakshi Sharma | 04-11-2008 | 04-UD-83 | Compression Of Data For Object Oriented Data Warehousing | Dr. Pushpa Rani Suri | 21-11-2012 | |
| 122 | Gulshan Ahuja | 95-DA-67 | Access Control in Web Services Based on Roles & Attributes | Dr. Rajender Nath | 30-08-2012 | ||
| 123 | Sheetal Chaudhary | 16-04-2008 | 96-NS-823 | Enhancement Of Security Through Biometrics Techniques | Dr. Rajender Nath | 27-02-2012 | |
| 124 | Mahesh Kumar | 20-11-2007 | 97-DNH-302 | Exploring The Use Of Evolutionary Approaches In Computer Networks | Dr. Rakesh Kumar | 30-05-2013 | |
| 125 | Vinay Goel | 22-11-2007 | 97-GJ-585 | Agent Oriented Software Engineering | Dr. Ashok Kumar | 27-12-2012 | |
| 126 | Munishwar Rai | 23-04-2007 | 91-DSA-507 | Reusability Moderl Based On Aspect Oriented Programming | Dr. Rajender Nath | 27-05-2015 | |
| 127 | Surjeet Singh | 14-11-2007 | 93-GKL-491 | Automatic Test Suit Generation Employing Genetic Algorithms | Dr. Rakesh Kumar | 31-12-2013 | |
| 128 | Abhishek Kumar | 14-11-2007 | 92-MY-367 | Predictive Data Mining -A Relative Study Of Kinear Techniques | Dr. R. K. Chauhan | 26-07-2012 | |
| 129 | Pankaj Kumar | 20-11-2007 | 96-MJ-68 | Secure And Dynamic Data Dissemination In Mobile Adhoc Network | Dr. Ashok Kumar | 28-05-2012 | |
| 130 | Kulvinder Singh | 16-04-2007 | 95-GA-110 | Specification Based Testing | Dr. Rakesh Kumar | 26-07-2012 | |
| 131 | B.S. Gill | 04-12-2007 | 2007-UD.PHD..09 | Design Of Model(S) Re-Engineering Object Oriented Software Systems | Dr. Ashok Kumar | 28-03-2013 | |
| 132 | Pardeep Mittal | 14-11-2007 | 90-UC-249 | Simulation Based Analysis Of Grid Computing Environment | Dr P. K. Suri | Dr. Rakesh Kumar | 29-04-2014 |
| 133 | Harish Kumar | 28-11-2006 | 97-CJH-369 | Improving Techniques Of Compositional Reuse | Dr. Rajender Nath | 27-12-2012 | |
| 134 | Sumit Mittal | 23-11-2006 | 02-SAA.18 | Design Of Simulation Models For Different Processing Environments | Dr P. K. Suri | 23-07-2013 | |
| 135 | Sandeep Kumar | 26-11-2006 | 95-UC-434 | Simulation Modeles For Component Based Software Engineering | Dr P. K. Suri | 14-10-2013 | |
| 136 | Ramesh Kumar Kait | 26-11-2006 | 96-UC-417 | Optimization Of Security Techniques For Wireless Networks | Dr. R. K. Chauhan | 29-04-2014 | |
| 137 | Jyotishree | 26-11-2006 | 93-MY-318 | Knowledge Based Operation And Problems Representation In Genetic Algorthims | Dr. Rakesh Kumar | 24-07-2013 | |
| 138 | Sandeep Kumar | 26-11-2006 | 95-UC-434 | Simulation Modeles For Component Based Software Engineering | Dr P. K. Suri | 14-10-2013 | |
| 139 | Rajesh Kumar | 91-UC-193 | Impact Of Reengineering On Software Development Houses | Dr. R. K. Chauhan | 31-10-2009 | ||
| 140 | Manoj Wadhwa | 12-10-2004 | 97-UD-86 | Assessing The Risk Factors Of Software Projects And Developing Methodology Of Risk Management & Designing Alternate Risk Model | Dr P. K. Suri | 31-10-2009 | |
| 141 | Sanjay Tyagi | 21-03-2005 | 88-GJ-420 | Testing Web Based Applications | Dr. Ashok Kumar | 16-03-2009 | |
| 142 | Brijesh Kumar | 12-09-2004 | 90-SP-222 | Performance Improvement Of High Speed Fixed Size Cell Switches With Alternative Architecture | Dr P. K. Suri | Dr. K.D.Sharma | 16-03-2009 |
| 143 | Sudesh Rani | 96-DNH-29 | Algebraic Query Processing And Parallelism In Databases | Dr. Pushpa Rani Suri | 30-10-2009 | ||
| 144 | Mini Sharma | 2005-UD-PH.D.-10 | Metric Evaluation In Routing Decision : A Fuzzy Approach | Dr. Shuchita Upadhyaya | 30-10-2009 | ||
| 145 | Mukesh Kumar | 93-UD-71 | Decision Support System For Water Management And Crop Planning | Dr. R. K. Chauhan | Dr. Manoranjan Kumar | 29-12-2009 | |
| 146 | Alka Kalra | 90-GH-77 | Clustering In Data Mining | Dr. Shuchita Upadhyaya | 03-02-2010 | ||
| 147 | Chander Kant | 2006-UD-PH.D-16 | Efficiency & Security Optimization For Fingerprint Biometric System | Dr. Rajender Nath | 09-04-2010 | ||
| 148 | Neeraj Garg | 92-GNY-435 | Developing Simulation Models For Software Reusability | Dr P. K. Suri | 09-04-2010 | ||
| 149 | Priti Sharma | 98-FH-118 | Effects Of Reengineering In The Public Sectors | Dr. Ashok Kumar | 09-04-2010 | ||
| 150 | Ashish Jolly | 07-06-2004 | 2004-UD-PH.D.-30 | Design Of Simlators For Managing Software Projects | Dr P. K. Suri | 09-07-2010 | |
| 151 | Charu | 99-SETK-93 | Quality Of Service Routing In Mobile Ad Hoc Networks-A Multipath Perspective. | Dr. Shuchita Upadhyaya | 11-03-2011 | ||
| 152 | Sunil Kumar Gupta | 2007-UD-PH.D.-08 | Backward Error Recovery In Distributed Mobile Systems | Dr. R. K. Chauhan | 10-05-2011 | ||
| 153 | Richa | 91-GJ-701 | Implementation Consideration For Ant Net Routing In Packet Switched Networks | Dr. Shuchita Upadhyaya | 10-05-2011 | ||
| 154 | Sanjeev Dhawan | 95-UC-415 | Efforts Assessment For Web Based Hypermedia Applications | Dr. Rakesh Kumar | 30-08-2011 | ||
| 155 | Kavita Taneja | 99-MCM-1 | Simulation Models Of Computing In Mobile Ad-Hoc Networks | Dr P. K. Suri | 30-08-2011 | ||
| 156 | Neetu Mendiratta | 2005-UD-PH.D.-11 | Xml Data Storage And Analysis For Time Series Web Applications | Dr. Pushpa Rani Suri | 30-08-2011 | ||
| 157 | Gurdev Singh | 95-GNY-6 | Software Quality-Qualitative Design | Dr P. K. Suri | 30-08-2011 | ||
| 158 | Madhu Goel | 99-AKS-308 | Ternary Tree & Huffman Coding | Dr. Pushpa Rani Suri | 30-08-2011 | ||
| 159 | Nanhay Singh | 97-UD-81 | The Application Of Intelligent Web Mining Techniques & Web Traffic In Analysis And Modeling Of Web Marketing Strategies | Dr. R. K. Chauhan | 27-09-2011 | ||
| 160 | Satinder Bal | 2006-UD-PH.D.-17 | Mobile Crawler Architecture For Efficient Crawling Of Public Index Able And Hidden Web | Dr. Rajender Nath | 27-09-2011 | ||
| 161 | Surender | 08-UD-PH.D.-7 | Low Overhead Algorithm For Determining Consistent Global State In Mobile Distributed Systems | Dr. R. K. Chauhan | 03-10-2011 | ||
| 162 | Parveen Arora | 08-UD-PH.D.-20 | Fuzzy Generalized Association Rules For Multiple Tables | Dr. R. K. Chauhan | 03-10-2011 | ||
| 163 | Gyanendra Pal Saroha | 81-DNH-876 | Geoinformatics Semi Automatic Approach To Update Gis Database Of Natural Resources | Dr. R. K. Chauhan | Dr. B.S Chaudhary | 03-10-2011 | |
| 164 | Shuchita Upadhyaya | 82-DSK-79 | Improvements In The Design Of Delta Routing Algorithm: Computational Considerations | Dr. Ashok Kumar | Dr. K. K. Aggarwal | 14-08-2003 | |
| 165 | Vikram Singh | 83-GJ-588 | Exploring Applications Of Simulation Tools In Software Engineering Processes | Dr P. K. Suri | 19-10-2004 | ||
| 166 | Ritu Soni | 2001-UD-PH.D.-16 | Software Reliability Models And Simulators | Dr P. K. Suri | 19-10-2004 | ||
| 167 | Rakesh Kumar | 83-UC-625 | Performance & Evaluation Of Information Retrieval-Systems | Dr P. K. Suri | Dr. R. K. Chauhan | 10-03-2005 | |
| 168 | Shalini | 94-UC-292 | Some Cryptographic Techniques In Network Security | Dr. Pushpa Rani Suri | 11-10-2005 | ||
| 169 | Ashwani Kumar Kush | 81-SDA-648 | Optimization Of Routing Protocols For Ad Hoc Networks | Dr. R. K. Chauhan | 22-09-2006 | ||
| 170 | Parveen Kumar | 83-UC-588 | Check Pointing Based Fault Tolerance In Mobile Distributed Systems | Dr. R. K. Chauhan | 29-12-2006 | ||
| 171 | Dilbag Singh | 26-04-2004 | 91-GJH-68 | Designing Simulators For Assessing The Impact Of It Initiative On Productivity(A Case Of Indian Banking Industry) | Dr P. K. Suri | Dr. Ramesh Kumar Dalal | 14-08-2007 |
| 172 | Surya Narayan Panda | 21-03-2005 | 2005-UD-PH.D.-8 | Spectrum Of Cyber –Terrorism And Info-War Tactics At Convergence Point And Its Effect To Organizations | Dr. Ashok Kumar | 16-01-2008 | |
| 173 | Navneet Adlakha | 21-03-2005 | 98-AKS-249 | Component Modeling And Techniques Of Reuse Oriented Software Development Process | Dr. Ashok Kumar | 03-09-2008 | |
| 174 | Bharat Bhushan Parsoon | 93-CCL-37 | Information Technology Applications In Administration Of Justice | Dr P. K. Suri | 03-09-2008 | ||
| 175 | Sona Rani | 09-06-2004 | 2004-UD-PH.D.-29 | Security Ibn Bluetooth Authentication And Connection Process | Dr. Pushpa Rani Suri | 24-10-2008 | |
| 176 | Bharat Bhushan | 15-12-2004 | 2004-UD-PH.D.-55 | Simulators For Quality Software Related Issues | Dr P. K. Suri | 30-12-2008 | |
| 177 | Shashi Rawat | 92-DSK-366 | Strategies For Optimal Resource Utilization For Tactical Decision Making For Potato Cultivation Using Geographical Information System | Dr. R. K. Chauhan | 30-12-2008 | ||
| 178 | Rachna Malhotra | 15-12-2004 | 2004-UD-PH.D.-50 | Simulating Potential Effects Of Software Risk Management | Dr P. K. Suri | 30-12-2008 | |
| 179 | Suman Lata | 83-DSK-797 | Task Allocation In Distributed Databases | Dr. Shuchita Upadhyaya | 30-12-2008 | ||
| 180 | Vinod Prasad | 2005-UD-PH.D.-7 | Balancing And Parallel Processing Of Binary Search Tree | Dr. Pushpa Rani Suri | 30-12-2008 | ||
| 181 | Shyam Sunder Tyagi | 2007-UD-PH.D.-24 | Design & Development Of A Secure Routing Protocol For Mobile Ad-Hoc Networks | Dr. R. K. Chauhan | 10-11-2010 | ||
| 182 | Manpreet Singh | 96-ECM-368 | Simulation Based Analysis Of Grid Computing Environment | Dr P. K. Suri | 10-11-2010 | ||
| 183 | Pritee Khanna | 95-UD-82 | Geometric Modelling ard Generatlon of Statically and Dynamically Symmetric Patterns | Dr. Pushpa Rani Suri | 04-06-2004 |
| Name | Date of Research | Area of Research Work | |
| SONALI | 28.04.2021 | sona.bangia25@gmail.com | |
| NISHA | 28.04.2021 | “Computational Modeling of Sentiment Analysis for Polarity Detection”. | nisha.jrf.dcsa@kuk.ac.in |
| PREETI | 29.04.2021 | “Security Issues And Challenges in IOT Environment & Designing Solutions For Them”. | preeti.sen50@yahoo.com |
| SONIA | 28.04.2021 | “Design And Development of Efficient Load Balancing Algorithms for Cloud Computing”. | sharmasonia246@gmail.com |
| SHERZAI SHUJAUDDIN MOHAMMAD ESSA | 08.11.2021 | shujasherzai@gmail.com | |
| ALI ASGHAR | 08.11.2021 | aliasgharkhavari222@gmail.com | |
| Manju Sharma | 30.08.2020 | " Data Clustering using Metaheuristic Techniques " | manjusharmaknl@gmail.com |
| Jyoti | 02.02.2021 | “A Machine Learning Based Intelligent Approach for SEE Transmission in WSN”. | jsaini089@gmail.com |
| VIJENDER SINGH | 30.09.2019 | Biometrics Based Multi Factor Authentication System for Protection of IoT Devices | vijender14ranga@gmail.com |
| NEHA | 14.10.2019 | “Designing a Framework For Sentiment Analysis” | nehadevsharma19@gmail.com |
| KIRTI GUPTA | 14.10.2019 | “Predictive Analysis using Machine Learning Techniques” | kirtigupta811@gmail.com |
| KARTIKA MAKKAR | 16.10.2019 | “Review Based Data Analytics” | sonikartika19@gmail.com |
| JYOTI | 16.10.2019 | “Analytical Evaluation and Emotion Detection in Code-Mixed Text on Covid-19 Pandemic with Reference to India” | jyoti2cs@gmail.com |
| HARISH SAINI | 20.03.2020 | A Security Approach For RPL Based IOT Network | harishsaini5479@kuk.ac.in |
| PARBHJOT KAUR | 20.03.2020 | Biometric Framework for Securing IoT Environment. | pjmahi8@gmail.com |
| ANKITA | 20.09.2018 | Hybridization Of Metaheuristics In Combinatorial Optimization Problems. | ankuchiks12@gmail.com |
| JYOTI RANI | 27.03.2019 | SECURITY IN CLOUD COMPUTING | jyoti41nagwan@gmail.com |
| SMITA SHARMA | 20.09.2017 | “Preserving Privacy in Cloud Computing Environment” | smita148.sharma@gmail.com |
| MEENAKSHI DEVI | 06.01.2018 | Basic Concepts of Neuro Computing | menakshichouhan@gmail.com |
| POONAM BHATIA | 06.01.2018 | "Improving Hybrid Methods for Sentiment Analysis/Opinion Mining" | poonambhatia02@gmail.com |
Haryana
Copyright © 2020 Kurukshetra University, Kurukshetra. All Rights
Reserved.
Powered by: Dexpert Systems
Pvt Ltd