1st Edition

Computer Science Engineering and Emerging Technologies Proceedings of ICCS 2022

    The year 2022 marks the 100th birth anniversary of Kathleen Hylda Valerie Booth, who wrote the first assembly language
    and designed the assembler and auto code for the first computer systems at Birkbeck College, University of London.
    She helped design three different machines including the ARC (Automatic Relay Calculator), SEC (Simple Electronic
    Computer), and APE(X). School of Computer Science and Engineering, under the aegis of Lovely Professional University,
    pays homage to this great programmer of all times by hosting “BOOTH100”—6th International Conference on Computing
    Sciences.

    1. Potentiality of IOT in Resolving Failed Copulation
    Shivam Tiwari, Niraj Kumar, Gursharan Singh and Simarjit Singh Malhi

    2. A Comprehensive Review on Blockchain: Types, Techniques, Consensus Algorithms and Platforms
    Bhupinder Kaur, Deepak Prashar and Arfat Ahmad Khan

    3. Biometrics and its Application in Parkinson’s Disease Detection
    Jatin Gupta and Baljit Singh Saini

    4. Alzeimer’s Detection Using Deep Learning: A Review
    Suseel Kumar Gedela and Komal Arora

    5. Survey on Heart Diseases Prediction Using Machine Learning Algorithms
    Saurav Kumar and Sudhanshu Prakash Tiwari

    6. Detection of Brain Tumor Using Machine Learning: An Overview
    Chittem Harika and Ashu Mehta

    7. Development of Future Wireless Communication-based IoT System
    Mintu Debnath, C. A. Subasini, D. Khalandar Basha, Adlin Sheeba, G. Shiva Kumari and Firos A.

    8. A Comprehensive Review of Different Clustering Algorithms for IoT-Based Networks
    Bishwajeet Kumar and A. Ranjith Kumar

    9. Review Paper on Real-time Speech Recognition for Augmentation of Class Room Learning
    Neha and A. Ranjith Kumar

    10. Applied Cryptography in Banking and Financial Services for Data Protection
    Sarika Tanwar, Roopa Balavenu, Ramesha H. H., Mohit Tiwari, K. K. Ramachandran and Dilip Kumar Jang Bahadur Saini

    11. A Study to Investigate the Methods of Enhancing Database Security in Web-based Environments through Big Data
    Akash Saxena, Nagendra Prasad Krishnam, Rahul Joshi, Namita Arya, Shailendra M. Pardeshi and Balaji Ramkumar Rajagopal

    12. Challenges in Security and Privacy in Wireless Networks and Mitigation Methods Using Blockchain Technology
    Vikas Nana Mahandule, Ankur Kulshreshtha, Babu Kumar S., S. Shyni Carmel Mary, Ashim Bora and Anilkumar Suthar

    13. Prediction of Suicide Ideation for Military Personnel Based on Deep Learning: A Review
    Sapna Katoch, Balwinder Kaur Dhaliwal, Gurpreet Singh and Navjot kaur

    14. Machine Translation Models and Named Entity Recognition: Comprehensive Study
    K. Soumya and Vijay Kumar Garg

    15. IOT-based Security and Surge Rescue—A Modish Smart Bus System
    Aniruddha Prabhu B. P., Ojas Misra, Sumeshwar Singh, Shiv Ashish Dhondiyal and Rajeev Gupta

    16. A Flexible Blockchain-dependent IoT Communication Framework
    Jay Kumar Pandey, Vivek Veeraiah, Vaibhav Ranjan, Dharmesh Dhabliya, Krishna Nand Mishra, Sarita Soni and Ankur Gupta

    17. The Emerging Role and Application of Adopting Revolutionary Internet of Things (IoT) for Future Technology Sustainability
    Ashutosh Singh, Deepali Virmani, Nirzar Kulkarni, Mohit Tiwari, Geetha Manoharan and Joel Alanya-Beltran

    18. Forecasting of Stock Market Data Frame Analysis Using Relative Strength Index (RSI) and Deep Learning
    Anuj Pratap Singh, Ranjith Kumar Anandan, Rajat Rana, Harsh Prakash Dwivedi, Avinash P. and Akshat Narendra Sakharkar

    19. Enablement of Blockchain in Healthcare: A Systematic Review
    Rishabh Srivastava and Deepak Prashar

    20. An Empirical Analysis in Understanding the Transformative Effect of Application of Internet of Things in Business and Society
    Franklin John Selvaraj, Neeru Sidana, Roop Raj, Seema Sharma, Geetha Manoharan and Firos A.

    21. MORSE: Social Networking Platform that Enables Connecting with Alumni, Teachers, and Students
    Samir Akthar, Kambam Sindhuja Priya, Mayank Shekhar and Gauri Mathur

    22. Detailed Investigation of Influence of Internet of Things (IoT) and Big Data on Digital Transformation in Marketing
    K. Arulrajan, Roop Raj, Lalit Mohan Pant, Ashutosh Kumar Bhatt, Jeidy Panduro-Ramirez and José Luis Arias Gonzáles

    23. Internet of Things (IoT)-based Smart Cities Help Achieving Sustainable Development Goals
    Vipin Kumar

    24. Logo Validation Using Unsupervised Machine Learning Technique—A Blockchain-based Approach
    Aniruddha Prabhu B. P., Ojas Misra and Rakesh Dani

    25. Detailed Analysis of Machine Learning and Deep Learning Technologies for Web Security
    Logeshwari Dhavamani, K. A. jayabalaji, Anupama Chadha, Rahul Shyam, Balaji Ramkumar Rajagopal and José Luis Arias Gonzáles

    26. A Detailed Investigation of Artificial Intelligence Applications in Cyber Security
    Mukesh Madanan

    27. Use of Blockchain Technologies Against Cyber Security Threats and Increase IT Industry Security
    Tejo Lakshmi Gudipalli, Dipesh Uike, Gaikwad Anil Pandurang, Ripon Bhattacharjee, Nishakar Kankalla and Firos A.

    28. Examining Cyber Security Curricular Frameworks for Business Schools Using Artificial Intelligence
    S. Durga, K. Lakshmi Sujitha, V. Manusha, V. Narasimha, Kukatla Rajeshwar and Firos A.

    29. Weighted Ensemble Classification System for Prediction of Diabetes Mellitus
    Gurbakash Phonsa, Sudhanshu Prakash Tiwari and Ravi Shanker

    30. Applications of Internet of Things (IoT) in Maintaining Privacy and Security of Smart Cities
    Shahanawaj Ahamad, A. B. Mishra, K. S. Raghuram, Mohit Tiwari, Y. Md. Riyazuddin and Joel Alanya-Beltran

    31. EMG Muscular Disorder Classification Using Motor Neuron Signals
    Reema Jain and Vijay Kumar Garg

    32. Role of IoT and Cloud in Smart Healthcare Monitoring System for Efficient Resource Utilization
    Navneet Kumar Rajpoot, Prabhdeep Singh and Bhaskar Pant

    33. Challenges Faced in Polygon Clipping Procedures and Visualization Technique in 3D Face Detection: A Comprehensive Review
    Prabhjyot kaur Haryal, Punam Rattan and Shilpa Sharma

    34. Use of IoT and Senso-based Big Data Applications to Develop Future Smart Sustainable Cities
    K. K. Ramachandran, Jagadish R. M., G. Saravana Kumar, Manik Deshmukh, Tanvi Jindal and M. Kalyan Chakravarthi

    35. Dual-Level Encrytion for Secure Communication
    Nupur Kaushik, Gobinda Karmakar, Siddharth Pansare, Sahil Bhardwaj and Jayant Mehra

    36. A Detailed Investigation of Artificial Intelligence in Economic Growth and Development of Emerging Economies
    Somanchi Hari Krishna, Ayan Das Gupta, Dipesh Uike, Christopher Raj D., Venkanna Mood and Firos A.

    37. Coal and Gangue Positioning and Classification Using Support Vector Machines
    Prasoon Bisht, Gurmeet Singh and Harjot Singh Gill

    38. IoT and Its Escalating Security Needs
    Siddharth Pansare, Nancy Sharma, Gobinda Karmarkar, Sahil Bhardwaj, Jithin Govind, Jayant Mehra and Dhiraj Kapila

    39. Empirical Analysis of Machine Learning (Ml) for Big Data and its Applications Using CNN
    D. Lakshmi Padmaja, Imran Qureshi, Sudha Rajesh, M. K. Sharma, Ravi Kumar Sanapala and Firos A.

    40. Applications of Optical Networking in Enhancing 5G Communications in Smart Cities
    S. K. UmaMaheswaran, Sunil S. Chavan, Prabhakara Rao Kapula, A. Suneetha, Prakash Pareek and Rachit Garg

    41. Role of Image Segmentation and Feature Extraction Methods in Cotton Plant Disease Detection
    Sandhya N. Dhage and Vijay Kumar Garg

    42. An Approach to Reconstruct Cervical Spondylosis MRI Image Using Generative Adversarial Networks
    Robin Kumar and Rahul Malik

    43. Collective Intelligence in Digital Marketing and Business Decision-making Through Artificial Swarm Intelligence
    M. Sivakoti Reddy, Suraj Chandrakant Kamble, Shikha Salil Jain, Archana Saxena, Jeidy Panduro-Ramirez and José Luis Arias Gonzáles

    44. The Advancement of Using Internet of Things in Blockchain Applications for Creating Sustainable Environment in the Real Word Scenario
    Hashem Ali Almashaqbeh, K. K. Ramachandran, Shyam Sunder. T., Shouvik Kumar Guha, Mahabub Basha S. and M. Z. M. Nomani

    45. The Recent Advancements in Security, Privacy and Trust in Mobile and Wireless Communication in the Emerging Economies
    Korakod Tongkachok, Thomas Felix K, A. Sai Manideep, Pralay Ganguly, Shouvik Kumar Guha and P. Naveen Kumar

    46. Intelligent Computing Techniques for The House Price Prediction Model: A Review
    Sumit Kumar and Vijay Kumar Garg

    47. An Empirical Evaluation of Machine Learning Image Augmentation Models from a Pragmatic Perspective
    Dipen Saini and Rahul Malik

    48. Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
    Nancy Sharma, Gobinda Karmakar, Siddharth Pansare, Jithin Govind, Sahil Bhardwaj, Nupur Kaushik and Jayant Mehra

    49. A Systematic Literature Review on Various Methodologies Used from Time to Time for Predicting Rainfall
    Deepa Sharma, Punam Rattan and Shilpa Sharma

    50. Recent Advances in Optical Networks and Their Implications for 5G and Beyond Communications
    Ramapati Mishra, Sachin Kumar, Pedada Sujata, R. Swaminathan, Yashpal Singh and Joel Alanya-Beltran

    51. Depression Detection Using Artificial Intelligence: A Review
    Vishnu Kant Pandey and Vijay Kumar Garg

    52. A Review for Weather Forecasting and Photovoltaic Load Forecasting Systems
    Dora Praveen Kumar and Navjot Kaur

    53. Image Enhancement Using Morphological Techniques
    Navjot Kaur, Kalpana Sharma, Anuj Jain, Someet Singh and Balwinder Kaur Dhaliwal

    54. Efficient Novel Cryptographic Algorithm to Improve Security: A Review
    Innam Ul Haq and Richa Jain

    55. A Study on Blockchain Technology for the Future E-Voting Systems
    Pyla Uma and P. V. Lakshmi

    56. Implementation of Waste Management, Renewable Energy and Green Buildings in Smart Cities for Quality Life
    K. K. Ramachandran

    57. A Review—Rice Plant Disease Detection Using Machine Learning Algorithms
    Manoj Kumar Ahirwar and Tejinder Thind

    58. Enhancement of Key Management System in Cloud Environment
    Shahnawaz Ahmad, Shabana Mehfuz and Javed Beg

    59. A Comparative Study of Load Balancing Algorithms in Cloud Computing
    Nahita Pathania and Balraj Singh

    60. Examining How Human Perceptions and Abilities are Used in Cryptography
    Jithin Govind, Dhiraj Kapila, Harwant Singh Arri, Nupur Kaushik, Gobinda Karmakar, Nancy Sharma, Siddhart Pansare, Sahil Bhardwaj and Jayant Mehra

    61. Online Cab Booking System Uber Clone Using Next JS
    Abhishek, Aditya Gautam and Aparna

    62. Contemporary Software Cloning Detection Methods: Meta-Analyses
    Chavi Ralhan and Navneet Malik

    63. Deep Learning for Aquatic Object Recognition in Seafloor
    Vivek Veeraiah, Shahanawaj Ahamad, Dharmesh Dhabliya, Vinod D. Rajput, Subodihini Gupta, Kajal Jaisinghani and Ankur Gupta

    64. Ensembling Intelligent Models to Design an Efficient System for Prediction of Pulmonary Tuberculosis
    Abdul Karim Siddiqui and Vijay Kumar Garg

    65. Evaluation of Machine Learning Classifiers for Multiple Disease Prediction
    Richa Jain, Devendran V., Parminder Singh and Ritika

    66. Machine Learning-based Approaches to Biosignal Processing
    Mohammad Asif Ikbal and Suverna Sengar

    67. A Neoteric Review of Story Point Estimation in Agile-Scrum Projects Using Machine and Deep Learning Algorithms
    Shivali Chopra and Arun Malik

    68. Image-Based Dragonfly Classification Using Capsule Networks
    Aniruddha Prabhu B. P., Ojas Misra and Rakesh Dani

    69. Empirical Analysis of VLSI Implementation for Improving Signal Processing System
    Ujwal Ramesh Shirode, Gowtham M. S., R. Sarath Kumar, Ravivarman G., S. Srinivasulu Raju and Prabin Kumar Bera

    70. Exploratory Data Analysis of Heart Disease Using Machine Learning
    Prerna Rawat, Prabhdeep Singh and Devesh Pratap Singh

    71. Recommending Future Collaborations Using Feature Selection Technique for Scholarly Network
    Shilpa Verma, Sandeep Harit and Rajesh Bhatia

    72. Applications of SPT (Squeeze Pack and Transfer) and Other Lossless Compression Algorithms in IoT: A Comparative Study
    Shiv Preet and Chirag Sharma

    73. Call Centre Resource Optimization Using Applied Operations Research: A Linear Programming Approach
    Pawan Kumar, Varun Kumar, Kajal Rai, Vandana Sharma and Rahul Kamboj

    74. Role of Machine Learning in Developing the Effectiveness of Digital Marketing Aspects in Emerging Economies
    Harihara Sudhan R., A. Shameem, Pavithra V., Tanvi Jindal, Jeidy Panduro-Ramirez and José Luis Arias Gonzáles

    75. Leveraging Cyber Hunt and Investigation on Endpoints Using Elastic XDR/EDR
    Gobinda Karmakar, Urvesh Devendra Thakkar and Sakshi Kashid

    76. An examination of Cloud Network Security Issues and Potential Solutions
    Gobinda Karmakar, Nancy Sharma, Siddharth Pansare, Jithin Govind, Sahil Bhardwaj, Nupur Kaushik and Jayant Mehra

    77. Blockchain Scalability Analysis on Throughput and Long Transaction Time
    Dama Vamsi Krishna and Ravi Shanker

    78. Approach Based on Machine Learning to Predict People’s Intention to Use Mobile Learning Platforms
    Madhavi Katamaneni, Brijesh kumar Verma, Shyam Sundar, Prachi Juyal, Ravi Kumar Sanapala and Firos A.

    79. Epileptic Seizure Detection and Classification Based on EEG Signals Using Particle Swarm Optimization and Whale Optimization Algorithm
    Puja Dhar and Vijay Kumar Garg

    80. Coding Sketch: Turn Your Sketch Designs into Code
    Ayush Gour, Sankalp Sudarsan Rajguru, V. Shivanshu Yadav and Shilpa Sharma

    81. Automatic Error Detection Using Python
    Shilpa Sharma, Punam Rattan, Banala Lakshmipathi,Devendra Kumar, Sharan Kumar and Siva Ramakrishna

    82. Emerging Cryptographic Techniques
    Jayant Mehra, Siddharth Pansare, Nancy Sharma, Sahil Bharadwaj, Jithin Govind, Gobinda Karmakar and Nupur Kaushik

    83. Mixed Language Text Classification Using Machine Learning: Cyberbullying Detection System
    Pankaj Shah and Shivali Chopra

    84. A Systematic Review on Thalassemia Using Neural Network Techniques
    Gurbinder Kaur and Vijay Kumar Garg

    85. Cryptographic Applications in Blockchain
    Sahil Bhardwaj, Dhiraj Kapila, Harwant Singh Arri, Siddharth Pansare, Nancy Sharma, Gobinda Karmakar, Jithin Govind, Nupur Kaushik and Jayant Mehra

    86. Use of Blockchain Technology Toward Green IoT and its Impact on Smart City Development
    S. K. UmaMaheswaran, Ankur Kulshreshtha, Bipin Kumar Srivastava, Sunil Babu Melingi, Rajani Mahendra Mandhare and José Luis Arias Gonzáles

    87. Automated Smart Agriculture Using Machine Learning
    Tarun Kumar, Cherry Khosla and Manik Rakhra

    88. A Review on Classification of Covid-19 and Pneumonia Disease Using Machine Learning
    Vikram Sharma, Anurag Anand, Sushant Kumar, Pabitra Kumar Panda and Makul Mahajan

    89. A Systematic Review on Machine Learning-based Fraud Detection System in E-Commerce
    Ankush Kumar Shah and Parminder Singh

    90. A systematical Reviewing of Prediction Models During Aggravation of Asthma and its Validation
    Tarun, Vijay Kumar Garg and Varsha

    91. Cyber Crimes: An Interdisciplinary Perspective
    Nidhi Sagarwal, Rachit Garg, Bhupendra Kumar, S. Praveenkumar, Dharmesh Dhabliya, Yagnam Nagesh and Ankur Gupta

    92. Blockchain Based Framework for E-Governance: A Review of the Literature
    Ajinkya Panday, Vikas Verma and Arun Malik

    93. Segmentation of Skin Cancer Images Applying Background Subtraction with Midpoint Analysis
    Uzma Saghir and Shailendra Kumar Singh

    94. Computational Social Interactions and Trust Models in Virtual Societies
    Aseem Kumar and Arun Malik

    95. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
    Vishav Kapoor and Daljeet Singh

    96. A Survey on User Stories Using NLP for Agile Development
    Bodem Niharika and Shivali Chopra

    97. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
    Vishav Kapoor and Daljeet Singh

    98. Architectural Sustainability in Computer Design: A mirror Review
    Ayush Gour, Sankalp Sudarsan Rajguru, Gursharan Singh, Gurpreet Singh and Balwinder Kaur

    99. Comprehensive Analysis of IEEE 802.11 WLAN Performance Optimization Strategies
    Simarjit Singh Malhi and Raj Kumar

    100. Review Paper for Detection and Prevention of Cyber Attacks
    Malik Rasool Magry and Gurpreet Singh*

    101. A Concise Review on the Vision-Based Moving Vehicle Detection System by Deep Learning Approaches
    Vaibhav Pandilwar and Navjot Kaur

    102. Automation and Robotics in Healthcare Industry for Monitoring Patients in Critical Care Unit
    Manish Kumar Thimmaraju, Mohammed Asif Hussain, Anil Kumar Garige, Vijitha Chandupatla and A. Mohathasim Billah

    103. A Review of Various System-on-Chip Technologies for Multiprocessor Systems
    Sankalp Sudarsan Rajguru, Ayush Gour, Gursharan Singh, Gurpreet Singh, Makul Mahajan and Salil Batra

    104. Detailed Investigation of Role of Machine Learning Techniques in Agricultural Development in Future
    Khongdet Phasinam, Priyanka P. Shinde, Thanwamas Kassanuk and Chetan M. Thakar

    105. Emerging Microfluidic Devices and Fabrication Methods in Various Domains
    Manoj B. Mandake, Ravi W. Tapre, Ashwini G. Thokal, 4Yaser Qureshi, Sandhya Jadhav and Chetan M. Thakar

    106. Computation of Cuckoo Search Algorithm and its Implementation in Active Noise Cancellation
    Balpreet Singh, Harpal Thethi and Santosh Nanda

    107. Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques
    Zakariyya Hassan Abdullahi, Shailendra Kumar Singh and Moin Hasan

    108. Latest Trends in Non-Destructive Document Examination Using Hyperspectral Imaging
    Nidhi Sagarwal and Rachit Garg

    109. Adaptive Cloud Service Optimization Using Drone Swarm Methodology
    Rajesh Kumar, Vani Agrawal, Sumit Kumar, Manikandan R., Juan Carlos Cotrina-Aliaga and Sarvesh Kumar

    110. Efficient Security Enhancement of Key Management System (KMS) in Cloud Environment
    Harish Reddy Gantla, V. Akilandeswari, Nancy Arya, Kusum Yadav, Sayed Sayeed Ahmad and Dhiraj Kapila

    111. Machine Learning-based Cloud Optimization System
    Pankaj Agarwal, Abolfazl Mehbodniya, Julian L. Webber, Radha Raman Chandan, Mohit Tiwari and Dhiraj Kapila

    112. Multi Objective Eagle Optimization Feature Selection for Cloud Systems
    Gaurav Kumar Arora, Rahul Koshti, G. Swamy, Abolfazl Mehbodniya, Julian L. Webber and Ashish Tiwari

    113. The impact of Anti-forensic Techniques on Forensic Investigation Challenges
    Zakariyya Hassan Abdullahi, Shailendra Kumar Singh, Moin Hasan

    Biography

    Dr. Rajeev Sobti is a distinguished academic and administrative leader who currently serves as the Head of the School of Computer Science & Engineering at Lovely Professional University, India. With over two decades of experience in both academia and industry, Dr. Sobti has made significant contributions to the field of computer science. His expertise primarily lies in Network Security and System Architecture, and he has a keen interest in areas such as Cryptography, Cryptanalysis of Hash Functions, and Performance Analysis. Dr. Sobti’s impressive research portfolio includes numerous published research papers in reputed journals and conferences. He has also authored and reviewed various chapters in refereed books, showcasing his profound knowledge and scholarly contributions. Notably, his work on the RKC mode of operation had earned recognition as one of the thirteen recommended algorithms for authenticated encryption mode by NIST (National Institute of Standards and Technology), Security Division of the US Department of Commerce.
    In addition to his research achievements, Dr. Rajeev Sobti is known for his dedication to education and student engagement.
    Over the past five years, he has conducted more than 100 counselling sessions, interacting with more than 10,000 students
    across India. His commitment to fostering academic growth extends to his role as a resource person in various faculty
    development and training programs.
    Dr. Sobti’s commitment to continuous learning is evident through his participation in approximately 20 relevant training
    programs and his memberships in several engineering and research societies and institutions. His expertise is also sought
    after on a global scale, as he has served on review boards for various journals and conferences both in India and abroad. He
    also holds several prestigious certifications in the field of computer science and network security, including:
    GIAC Forensic Analyst (GFACT)
    GIAC Security Essentials (GSEC)
    GIAC Certified Incident Handler (GCIH)
    Furthermore, Dr. Rajeev Sobti’s mentorship has been instrumental in guiding the academic journeys of aspiring scholars.
    Under his supervision, two scholars have successfully defended their final viva and completed their doctorate, a testament
    to his guidance and commitment to nurturing future researchers.
    These certifications further underscore his expertise and commitment to the field, solidifying his position as a leading
    figure in the realm of computer science and network security in India and beyond.

    Dr. Rachit Garg is working as a COS (Coordinator of The School) of School of Computer Science and Engineering, Lovely Professional, Punjab, India. LPU is a young university having 30,000+ young minds in emerging areas of Science and Technology in a single campus. The university campus exhibits a rich diversity as the academic staff and students
    from all 29 states of India and more than 30 countries of the world. He has 22+ years of teaching and administrative experience as Director and Principal to various institutions of repute in Lyallpur Khalsa College, Jalandhar; Universal Institute of Engg & Technology, Sri Sai College of Engg & Tehnology, Founder Director Pyramid College of Businss & Technology, where he has taught subjects like Distributed Mobile Computing, Software Engineering, System Analysis and Design, Operating System and Data Mining, Information Security, Information Systems, Health Informatics and Cyber Forensics.
    He has organized 07 in series International conferences and chaired special sessions and delivered various technical sessions at the national and international level. He is currently guest editor to the JDMSC Talyor and Francis Journal. He is working in various capacities as Editor, Associate Editor, Guest Editor and is a member editorial board to many international journal and conferences. He has published more than 80 research paper(s) in reputed international journals and conferences, which are indexed in various international databases.
    He has supervised many master and doctorate students in the various phases of dissertation. He has also edited books and authored book chapters with international and national publishers. He is a senior member to many international conferences in association with IEEE and a life member of CSI and IAENG. IEEE and SCRS student chapters have been initiated under his guidance. He is also associated with 02 International Universities of repute as Adjunct Professor.