top of page

Research Publications

Convention
Conference

Journal Articles

​

  1. A. K. Bhartee, K. M. Srivastava, T. Sharma, U. Scholar, and G. N. GCET, “Object identification using thermal image processing,” International Journal of Engineering Science and Computing, vol. 7, no. 05, pp. 11 400–11405, 2017.

  2. M.A.K.Bhartee,N.Pal, and A. Verma, “Protection against man-in-the-middle attack in banking transaction using diffie hellman key exchange algorithm,” IJARCCE, 2017.

  3. S.NagarandA.K.Bhartee, “A comparative study on load balancing algorithms in cloud computing,” I JCST, 2015.

  4. A.K.Bhartee,A.Saxena, A. A. Srivastava, and A. K. Patel, “Advance reservation policy for inter-member workflow scheduling in community cloud,” IJSR, 2013.

  5. A.Bhushan,A.K.Bhartee, and P. Dulari, “A study of tordes with other symmetric key algorithms,” International Journal, vol. 2, no. 12, 2012. 

  6. M.Pathak,A.K.Bhartee, and V. Tandon, “An efficient scheduling policy for load balancing model for computational grid system,” Computer Engineering and Intelligent Systems, vol. 3, no. 7, pp. 51–61, 2012.

bottom of page