--
International Journal Publication list
1)J. M. Joshi and U. D. Dalal, “Hardware Implementation of Wavelet Based Speech Encryption for End-to-end Security in Mobile Communication System,” International Journal of Recent Trends in Engineering and Technology (IJRTET 2010), ACEEE Publication, ISSN (Print): 2158-5555, ISSN (Online): 2158-5563, pp. 59-62, Vol. 4, No. 4, Nov 2010, [Online: http://searchdl.org/index.php/journals/view/713], indexing: SEARCH digital library, IEE INSPEC, EI (Compendex), Thomson ISI, EBSCO, etc. [Total Citation 1, Self-Citation 0].
2) J. M. Joshi, K. R. Parmar and U. D. Dalal, “Design and Implementation of KASUMI Algorithm in ISMACryp Encryption for Video content protection in DVB-H application,” Advanced Material Research Journal, Trans Tech Publication, doi: 10.4028/www.scientific.net/AMR.403-408.3847, ISSN 1022-6680, Vol 403-408(2012), pp. 3847-3853, Nov. 2011, [Online: http://dx.doi.org/10.4028/www.scientific.net/AMR.403-408.3847], indexing: Elsevier SCOPUS,EI (Compendex), Google Scholar, CSA, CA, Worldcat, SCImago, etc. [Total Citation 5, Self-Citation 2].
3) J.
M. Joshi and U. D. Dalal, “Selective Encryption using ISMACryp in Real Time Video
Streaming of H.264/AVC for DVB-H Application,” International Journal of
Electrical, Computer, Energetic, Electronic and Communication Engineering, WASET
(World Academic of Science Engineering and Technology) journal publication,
ISSN (Print): 2010-376X, ISSN (Online): 2010-3778, Issue 79, pp. 342-346, July
2011, [Online: http://waset.org/publications/7288], indexing: Elsevier SCOPUS,
Thomson Reuters, Google Scholar, EI (Compendex), WorldCat, etc.[Total Citation
8, Self-citation 1].
4) J.
M. Joshi and U. D. Dalal, “Perceptual Attack Resistance Selective Encryption
after Video Compression H.264/AVC for Real-Time Applications,” International
Journal of Digital Image Processing, CiiT International, Print: ISSN 0974 - 9691,
Online: ISSN 0974 - 9586, Vol. 4, No. 3, pp. 143-148, Feb. 2012 [Online: http://ciitresearch.org/dipfebruary2012.html].
5) J. M. Joshi and U. D. Dalal, “MV Compensation Attack on fast Selective Video Encryptions,” International Journal of Computational Engineering Research, Vol. 04, Issue 1, ISSN: 2250-3005, pp. 32-38, January 2014, [Online: http://www.ijceronline.com/papers/Vol4_issue01/version-2/D0412032038.pdf], indexing: Google Scholar, EBSCO, Pro Quest, Index Copernicus, Cabell’s Directory, etc. [Total Citation 1, Self-Citation 0]
6) J. M. Joshi and U. D. Dalal, “Robust Selective Encryption For Sensitive Video Application Against Error Concealment Attack,” International Journal on Network Security, ACEEE Publication, ISSN: 2152-5072, Vol. 5, Issue 3, pp. 13-20, July 2014, [Online: http://searchdl.org/index.php/journals/view/3698] indexing: Google Scholar, Microsoft Academic Search, EBSCO, WorldCat, CiteSeer, Cabell’s Directory, Pro Quest, Index Copernicus, etc.
7) J.
M. Joshi and U. D. Dalal, “Highly Secure And Fast Video Encryption Using Minimum
Overhead in H.264/AVC Bitstream,” Journal Testing and Evaluation (JTE), ASTM
International, ISSN: 0090-3973, Vol. 44, No. 4, pp. 1461-1472, July 2016, doi:
10.1520/JTE20140332, [Online: http://dx.doi.org/10.1520/JTE20140332], indexing:
Elsevier SCOPUS, SCI, SCI Expanded, Materials SCI, INSPEC, CA, CSA, etc. [Total
Citation 1, Self-Citation 0]
8) Monali
Prajapati, J. M. Joshi, “Cross Layer Design With Extensive Virtual MIMO:FSMUP
Optimization Model For Wireless Sensor Network” Journal of High Speed Network,
IOS Press, Vol. 26, No. 4, pp. 291-306, December 2020, doi: 10.3233/JHS200645,
indexing: Elsevier SCOPUS, Materials SCI, INSPEC, CA, CSA, etc. [Total Citation
0, Self-Citation 0]
9) Monali
Prajapati, J. M. Joshi, “Adaptive virtual MIMO-based Cross-layer Design for
Wireless Sensor Networks via Hybrid Optimization Model” International Journal
of Modeling, Simulation, and Scientific Computing, World Scientific, Vol. 40, No.
4, pp. 1461-1472, January 2021, doi: 10.1142/S1793962321500070, indexing: Elsevier
SCOPUS,INSPEC, CA, CSA, etc. [Total Citation 0, Self-Citation 0]
National Conference publication list
1) J. M. Joshi, “Matlab Simulation of
Cryptographic Algorithm for Mobile Communication,” in National conference on
Emerging Trends in Information and Communication Technology, Sarvajanik College
of Engineering and Technology, Surat, 27-28 Jan. 2007.
2) J. H. Shah, J. M. Joshi, “CMOS Operational Amplifier Design,” in National conference on Future Trends in Electronics and Telecommunication for Sustainable Development – Vision 2020, Institution of Engineers, Local centre, Pune, 28-29 Oct. 2007.
3) J. M. Joshi, “Speech encryption in 3rd generation mobile system,” in National conference on Wireless Communication and VLSI design, Gwalior Engg. College, Gwalior, 27-28 March 2010.
International Conference publication list
1) J.
H. Shah, J. M. Joshi and V. C. Pandya, “Power Line Hum Cancellation from Electrocardiography
using LMS algorithm,” International Conference on Emerging Technologies and
Applications in Engineering, Technology, and Sciences, ISBN: 978-81-906220-1-1,
pp. 2027-2030, Vol 2, Saurashtra University, Rajkot, 13-14 Jan.2008
2) J. M. Joshi and U. D. Dalal, “Simulation and Comparison of Variant A5 Algorithms for GSM System,” International Conference on NUiCONE 2010, Nirma University, Ahmedabad, 9-11 Dec. 2010.
3) J. M. Joshi and U. D. Dalal, “Enhancing Selective ISMACryp Video Encryption for Real-Time Applications in Handheld Devices,” TENCON 2011 - 2011 IEEE Region 10 Conference, ISBN: 978-1-4577-0256-3, pp. 274-278, doi: 10.1109/TENCON. 2011.6129107, 22-24 Nov 2011, Bali, Indonesia [Online: http://dx.doi.org/10.1109/TENCON.2011.6129107], indexing: IEEE Digital Xplorer Library, Elsevier SCOPUS, ZL50 digital library, WorldCat, Google scholar, Pubget, Microsoft Academic Search, etc. [Total Citation 4, Self-citation 3].
4) J. M. Joshi and U. D. Dalal, “Proposed H.264/AVC for Real-Time Applications in DVB-H Sever,” 2012 IEEE International Conference on Computer System and Network Technology (CSNT 2012), ISBN: 978-1-4673-1538-8, pp. 539-542, 11-13 May 2012, Rajkot, Gujarat, India, doi: 10.1109/CSNT.2012.122 [Online: http://dx.doi.org/10.1109/CSNT.2012.122], indexing: IEEE Computer Society, IEEE Digital Xplorer Library,Elsevier SCOPUS, Microsoft Academic Search, ACM Digital Library.
5) J. M. Joshi and U. D. Dalal, “Histogram Matching Attack on Selective Perceptual Video Encryptions in H.264/AVC,” 2012 Annual IEEE India Conference (INDICON), ISBN 978-1-4673-2271-3, pp. 357 - 360, doi: 10.1109/INDCON.2012.6420643, 7-9 Dec 2012, Kochi, Kerala, India [Online: http://dx.doi.org/10.1109/INDCON.2012.6420643], indexing: IEEE Digital Xplorer Library, Elsevier SCOPUS,Google Scholar, etc. [Total Citation 1, Self-citation 0].
Book Publications
1) J. H. Shah, J. M. Joshi, “Advance Electronics (Electronics Devices and Circuits-II),” 2007 (First edition), 2010(Second edition), Atul Prakashan, Ahmedabad.
2) J. H. Shah, J. M. Joshi, “Fundamentals of Electronics and Communication,” 2008 (First edition), Atul Prakashan, Ahmedabad.
3) J. H. Shah, J. M. Joshi, N. H. Gondaliya, “Engineering Physics”, 2008 (First edition), 2009 (Second edition), Atul Prakashan, Ahmedabad.
4) J. H. Shah, J. M. Joshi, D. M. Patel, “Digital Logic Design”, 2010 (First edition), Atul Prakashan, Ahmedabad.
5) J. H. Shah, J. M. Joshi, “Digital Signal Processing: Principles and applications (ISBN: 978-93-80856-48-3)”, 2011 (First edition), University Science Press (Imprint: Laxmi publication), New Delhi.
--
--
1) Expert lecture on "Video Encryption" in STTP on "3G and 4G Technologies-2013" at Sardar Vallabhbhai National Institute of Technology during September 30--
--