Wednesday 23 September 2015

Dr Vinay Kumar

Dr. Vinay Kumar

Blog: http://drvinayscientist.blogspot.in 

Twitter: https://twitter.com/ScientistVinay1

Facebook: https://www.facebook.com/Professorvinay 

Website: https://knowdrvinaykumar.blogspot.com

Brief Professional Profile

Dr. Vinay Kumar is a native by culture, Urbane by education and Civil by action, He is currently heading a NGO known as DHEI Research Foundation that is active in Education and Health sector and working at India Level.

Dr. Vinay Kumar is an alumnus of University of Delhi and Jawaharlal Nehru University, Delhi. He has authored a book of Discrete Mathematics, published by BPB, India. Its first edition was published in October 2002 and its second edition is published in January 2015. He has also authored a memoire, Killed Instinct, self published on Amazon.com and released on October 1, 2018. He also contributes to blog in Times of India.

He worked as technocrats in NIC, Government of India for almost 21 years. He has broadly worked in the field of Academy, Research, Software Development and technical/academic writing for more than 35 years. He has extensively contributed to the knowledge arena through his books and research publications.

He took voluntary retirement from NIC in December 2012 when he was serving as Scientist E & Technical Director. Then he joined Vivekananda Institute of Professional Studies (VIPS), affiliated to Guru Gobind Singh Indraprastha University, as Professor of Information Technology. He worked as Dean of the IT Department and Department of Research and Publication till 5th July, 2018. He worked as chief editor of bi-annual journal named “Vivekananda Journal of Research” during the period. He resigned from VIPS on 5th July, 2018 and took retirement from active routine service life since then.

He successfully mentored over 10 research scholars for their Ph.D. award. He is now devoting his time in social services and services to deprived section of the society.

He is a lifetime member of Computer Society of India and an associate member of Association of Computing Machine (ACM), USA.

He has published over 100 of research papers in the areas of Graph-Theoretic Approach of Steganography, Information Security & Privacy, Geographic Information System Data Modeling, Restricting Backtracking in NP problems, Digital watermarking of Spatial Data, and e-Governance. Some of the publications are listed below.

 Publications

Book/Chapter

1. Vinay Kumar, (2002). Discrete Mathematics, New Delhi, India: BPB. 2nd edition in January 2015.

2.  Muttoo, S. K. and Kumar V., (2010). Chapter 15 in a book titled “Optimizing Information Security and Advancing Privacy Assurance”, ed. Hamid Nemati, IGI Global, USA.

3. Vinay Kumar, (2018). Killed Instinct, New Delhi, Worldwide on KDP Amazon.com

Research Papers in International Journals

1.  Sharma, V., Kumar, V. and Bhangari, J., (2003). ‘NIC’s Initiative in SDI’. Geospatial World. Vol. 2, No. 4, pp. 40-44.

2.  Kumar, V. and Sharma, V., (2006). ‘Overcoming 64K data size limit in handling large spatial data in GISNIC while cleaning and building topology’. Int. J. of Information Technology and Management, Inderscience, Vol. 5, No. 1, pp. 77-86.

3.  Kumar, V. and Muttoo, S. K., (2009). ‘A Data Structure for Graph to Facilitate Hiding of Information in a Graph’s Segments –A Graph-Theoretic Approach to Steganography’. Int. J. on Computer Network and Distributed System, Inderscience, Vol. 3, No. 3, pp. 268-282.

4.  Kumar, V. and Muttoo, S. K., (2010) ‘Graph-Theoretic Approach to Steganography to Secure Message Digest’, Information Security Journal: A global perspective, Taylor & Francis, Vol. 19, No. 6, pp. 328-335.

5.  Muttoo, S. K. and Kumar, V., (2010)‘Hamiltonian Graph Approach to Steganography’, International Journal of Electronic Security and Digital Forensic, Inderscience, Vol. 3, No. 4, pp. 311 – 332.

6.  Muttoo, S. K. and Kumar, V., (2010).‘Hiding Message in Map along pre-Hamiltonian Path’, Int. J. of Information Security and Privacy, Idea Group USA, Vol. 4, No. 4, pp. 21-34.  Also appeared as Chapter 15 in a book titled “Optimizing Information Security and Advancing Privacy Assurance”, ed. Hamid Nemati, IGI Global

7.  Kumar, V., (2011). “Effort to get published: Rejection to Double Submission”. Int. J. of Research and Reviews in Computer Science. Science Academy Publishers, UK, Vol. 2, No. 4, pp. 994-1000.

8. Kumar, V. and Muttoo, S. K., (2011). ‘A Graph-Theoretic Approach to Sustainable Steganography’. MIS Review: An Int. Journal, Vol. 17, No. 1, pp. 19-37.

9. S. K. Muttoo, Kumar, V., (2012). “Watermarking Digital Vector Map Using Graph-Theoretic Approach”, Annals of GIS, Taylor & Francis. Vol. 18, No. 2 pp. 135-146.

10. Avijit Dutta, Kumar, V., (2012). “Managing Information Security in Digital Age”, Int. J. of Management and Social Sciences. Vol. 1, No. 2, pp. 205-212.

11. Kumar, V., (2012). “Mathematics is Science: A Topic Revisited in Context of FCS of India”, Int. J. of Modern Education and Computer Science, MECS, Vol. 4, No. 6, pp. 17-26.

12. Kumar, V., Muttoo, S. K. and Bansal, A. (2012). “Hiding Information in Vector Layer while Extracting Layer from Raster Data”. Information Security Journal: A global perspective, Taylor & Francis, Vol. 21, No. 6, pp. 317-327.

13. Muttoo, S. K., Kumar, V., and Bansal, A. (2012). “Secure Data Hiding Using Eight Queens Problem”. Int. J. of Information Security and Privacy, Idea Group USA, Vol. 6, No. 4, pp. 55-70. 

14. Kumar, V. and Bansal, A. (2013).  “Information & Communication Technology for Improving Livelihoods of Tribal Community in India”, Int. J. of Computer Engineering Science (IJCES), Vol. 3, No. 5, pp. 13-21.

15. Kumar, V. and Thareja, R.  (2013).“Goal Structured Requirement Engineering and Traceability Model for Data Warehouses”, Int. J. Information Technology &Computer Science, MECS, Hongkong, Vol. 5, No. 12, pp. 78-85.

16. Kumar, V. and Thareja, R.  (2013). “A Simplified Approach for Quality Management in Data Warehouse”, Int. J. of data Mining & Knowledge Management Process (IJDKP), Australia, Vol. 3, No. 5, pp. 61-69. 

17. Kumar,V. andThareja, R.  (2014). “Managing Traceability Data Warehouse Development Project”, Int. J. of Computer Technology & Application (IJCTA), Australia, Vol. 5, No. 3, pp.1001-1011.

18. Thareja, R. and Kumar, V. (2014). “Data Warehouse Requirements Engineering”, Int. J. of Information, Communication and Computing Technology (IJICCT), Vol. 2, No. 1, pp 53-60.

19. Kumar, V. and Thareja, R. (2014). “Analyzing the Goal Structured Requirement Engineering and Traceability Model”, Int. J. of Database Theory and Application (IJDTA), Vol. 7, No. 3, pp 231-244.

20. Kumar, V. and Thareja, R. (2014). “Requirement Engineering for a user centric spatial data warehouse”, Int. J. of Open Problems in Computer Science and Mathematics (IJOPCM), Vol. 7, No. 3, pp.63-72.

21. Bansal, A., Muttoo, S. K. and Kumar, V., (2014). “Data Hiding Approach based on Eight-Queens Problem and Pixel Mapping Method”. Int. J. of Signal Processing, Image Processing and Pattern Recognition (IJSIP), SERC, Australia, Vol. 7, No. 5, pp 47-58

22. Kumar, V. (2014), “Proof of Fermat Last Theorem based on Odd Even Classification of Integers”, IJOPCM, Vol. 7, No. 4, pp 23-34.

23. Kumar, V., Bansal, A., and Muttoo, S. K. (2014). “Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution”. Int. J. of Information Security and Privacy, Idea Group USA, Vol. 8, No. 2, pp 55-68.

24. Kumar, V., and Thareja, R. (2015). “Risk based Layered Securing Approach to Secure Data in Data Warehouse”, Global Journal of Advanced Engineering Technologies (GJAET).Vol. 4, No. 2, pp. 101-106.

25. Sharma, R., and Kumar, V. (2015). Implementation of Steganography using Recursive Equation Approach,  International Journal of Computer & Mathematical Science (IJCMS), Vol. 4, pp 15-19.

26. Sharma, G., and Kumar, V. (2015). Reversible Information Hiding and its Application in Watermarking, International Journal of Engineering Technology, Management and Applied Sciences (IJETMAS) Vol. 4, pp 157-162.

27. Bansal, A., Muttoo, S. K., and Kumar, V. (2015).Secure Data Hiding by Optimal Placement of Queen along Closed Knight Tour, I-Manager’s Journal of Information Technology, Vol. 4 No. 3, pp 18-24.

28. Bansal, A., Muttoo, S. K., and Kumar, V. (2016). Secure Data Hiding along Randomly Selected Closed Knight Tour. Journal of Applied Security Research: An International Journal of Police - Security Operations & Practices, Taylor & Francis, Vol. 11, No. 1, pp.90-100.

29. Kwatra, R., Kumar, V., and Madan, S. (2016). Principle of 2d Curve Steganography, Journal of Global Information and Business Strategy (J-GIBS), Vol. No. pp.  104-108

30. Bansal, A., Muttoo, S. K., and Kumar, V. (2016).Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique, Int. J. of Computer Network and Information Security (IJCNIS), MECS Press, Vol 8, No. 8. pp. 39-46.

31. Kumar, V., Chaturvedi, A. and Verma, P. (2016). Applications of Big Data in the Digital India: Opportunities and Challenges, IRA-International Journal of Technology & Engineering, Vol. 3, No. 3. pp 164-174.

32. Kumar, V., Chaturvedi, A. and Verma, P. (2016). The Concepts of Exploring Applications of Big Data in Digital India Scenario, International Journal of Multidisciplinary Research and Modern Education (IJMRME), Vol. 2, No. 1. Pp 703-708.

33. Kwatra, R., Kumar, V. and Madan, S. (2016). Curve Approach to Hide Image Based Information In a digital Cover. I-Manager’s Journal of Information Technology, Vol. 5 No. 4, pp 26-32.

34. Sharma, G, Kumar, V. (2017), A novel technique for Reversible Information Hiding, Advances in Computational Sciences and Technology, Vol 10, No. 7, pp 2069-2078.

35. Kwatra, R., Kumar, V. and Madan, S. (2018). Embedding stego text in a digital cover using Elliptic Curve, Journal of Advanced Research in Dynamical and Control Systems, Vol 10, No. 11, pp 836-841

36. Kumar, V., Dave, M. and Chaturvedi A. (2018). A Solution to Secure Personal Data When Aadhar is Linked With DigiLocker, International Journal of Computer Network and Information Security (IJCNIS), MECS Press, Hong Kong Vol 10, No 5 pp 37-44.

37. Kumar, V. (2018), Proof of Beal’s Conjecture and Fermat Last Theorem using Contra Positive Method, i-manager’s Journal of Mathematics, Vol. 7 No.2 pp 1-7.

38. Kumar, V., Pal, P. and Sharma, A. (2018). Mobile Apps in E-Governance Projects in India: Where Do We Stand?, International Journal of Sciences: Basic and Applied Research (IJSBAR). Vol. 21 no. 1 pp 392-397.

39. Sharma, G., Kumar, V. (2018)   "Review of Different Parameters For Digital Reversible Watermarking", IJRAR - International Journal Of Research And Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, Volume.5, Issue 4, Page No pp.90-93, December 2018, Available at : http://www.ijrar.org/IJRAR1944392.pdf

40  Sharma, M., Ahuja, L. and Kumar, V. (2019). A Hybrid Context Aware Recommender System with Combined Pre and Post-Filter Approach, International Journal of Information Technology Project Management (IJITPM ) 10.4 (2019): 1-14. Web 30 Nov. 2019. doi:10.4018/IJITPM.2019100101

41. Sharma, M., Ahuja, L. and Kumar, V. (2019). A Hybrid Filtering Approach for an Improved Context-aware Recommender System, Recent Patents on Engineering, Bentham Science Publishers, Vol 13, No 1, 2019, pp. 39-47, DOI: https://doi.org/10.2174/1872212112666180813124358

42. Kaur, B., Ahuja, L. and Kumar, V. (2020). “Developing a Conceptual Model for Crime Against Women using ISM & MICMAC”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2213275912666190809113047

43. Kaur, B., Ahuja, L. and Kumar, V. (In Press). “Predicting sexual offenders using Exhaustive CHAID techniques on victims age”, Int. J. of Applied Management Science (IJAMS), Vol. XX No XX, pp XX-XX

 Research Papers in National Journals

1. Kumar, V., (2009). ‘E-governance in India Needs New Project Management Paradigm’, IITM Journal of Management and IT, India, Vol. 1, No. 1, pp. 7-15

2. Kumar, V., (2010). ‘Restricted Backtracked Algorithm to Find Hamiltonian Circuit in Undirected Graph’, BVICAM Int. J. of Information Technology, India, Vol. 2, No. 2, pp. 23-32.

3. Kumar, V., (2010) ‘Essential Points for Setting up Video Wall Facility’. IMS Manthan: The Journal of Innovation, India, Vol. 5, No. 2 pp. 47-52. (refereed & indexed)

4. Kumar, V., (2010). ‘GISNIC: A Low-End GIS tool from NIC’. IITM Journal of Management and IT, India, Vol. 1, No. 2, pp 1-11.

5. Kumar, V., (2012). “Approach to Prove Correctness of Graph Algorithm”, IMS Manthan: The Journal of Innovation, Vol. 7, No. 1, pp. 101-108.

6. Kumar, V. and Sinha A. K. (2013). “Virtual Classroom an Initiative for Spreading Excellent Education in India”, Vivekananda, J of Research, Vol. 2, No. 1, pp. 15-26.

7.  Avijit Dutta, Kumar, V., (2013). “Evolution and Adoption of Social IT”, IMS Manthan: The Journal of Innovation, India, Vol. 8, No. 2, pp.113-118.

8.  Kumar, V. and Muttoo S. K., (2014). “Geographic Information Systems: From Desktop to WWW Environment”, Vivekananda, J of Research, Vol. 3, No. 1, pp. 15-20.

Research Papers in International Conferences

1.   Kumar, V., (2008). “E-Governance Projects in India, Myths, Reality, and Alternative”, Proceedings of the First International Conference; Review of Business & Technology Research (RBTR), July– August, New Delhi, Vol. 1, No. 1, pp. 1-8.

2. Thareja, R. and Kumar, V. (2014). “Best Practices To Improve Data Warehouse Performance”, Proceedings of the Fifth INDIACOM International Conference, March, New Delhi, pp. 41-46.

3. Kaur B., Ahuja L., Kumar V. (2018). Factors Affecting Crime against Women Using Regression and K-Means Clustering Techniques, In: Bhattacharyya S., Sen S., Dutta M., Biswas P., Chattopadhyay H. (eds) Industry Interactive Innovations in Science, Engineering and Technology. Lecture Notes in Networks and Systems, Vol. 11. Springer, Singapore

4. Munshi, A., Kumar, V. (2018). “Need of New Project Management Paradigm in E-Governance”, Proceedings of the 12th INDIACOM International Conference, March, New Delhi, pp. 262-267. IEEE conference Id: 42835.

5. Chaturvedi, A. Kumar, V. (2018). “Proposed Security Solutions at Different Levels of Network Required in UIDAI System”, Proceedings of the 12th INDIACOM International Conference, March, New Delhi, pp. 713-720, IEEE conference Id: 42835

6. Kwatra, R., Kumar, V. and Madan, S. (2019). Hiding Information along Fractal in a Digital Cover to Improve Capacity, Proceedings of the ICETIT 2019, Emerging Trend in Information Technology, March, New Delhi, pp 1055-1070, Lecture Notes in Electrical Engineering 605, Springer Nature Switzerland 2020

7.   Kaur, B., Ahuja, L. and Kumar, V. (2019), Application of ISM and TISM: Model building techniques, International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) 14-16 Feb, 2019, IEEE Xplore, DOI: 10.1109/COMITCon.2019.8862177

8    Kaur, B., Ahuja, L. and Kumar, V.,(2019) “Crime Against Women: Analysis and Prediction Using Data Mining Techniques,” International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) 14-16 Feb, 2019, IEEE Xplore, DOI: 10.1109/COMITCon.2019.8862195

9.   Kaur, B., Ahuja, L. and Kumar, V. (2019), Decision tree Model to predict sexual offenders on the basis of major and minor victims, Amity International Conference on Artificial Intelligence (AICAI), Dubai (UAE), 4-6 Feb, 2019, IEEE Xplore, DOI: 10.1109/AICAI.2019.8701276

10. Munshi, A., Kumar, V. and Mallik P. (2019). “Digitization of Land Records--What we can learn from Bhoomi?”, Proceedings of the International Conference on Advancements in Computing & Management (ICACM-2019), April 13-14, Jaipur, pp. 888-893. Available at SSRN: https://ssrn.com/abstract=3464213 or http://dx.doi.org/10.2139/ssrn.3464213  

Research Papers in National Conferences

1.   Kumar, V. and Muttoo, S. K. (2008). “Relevance of Steganography in General and Graph-Theoretic Approach in particular in Indian Security Concern and Measure” Proceedings of the Second INDIACOM National Conference, February, New Delhi, pp 183-188. (Refereed with ISSN)

2. Kumar, V. and Muttoo, S. K., (2009). ‘Principle of Graph-Theoretic Approach to Digital Steganography’, Proceedings of the Third INDIACOM National Conference, February, New Delhi, pp. 161-165.

3. Kumar, V., (2010). ‘Encryption Strength Lies beyond Key Length: A Suggestive Approach’. Proceedings of the Fourth INDIACOM National Conference, February, New Delhi, pp.123-127

4.   S. K. Muttoo, Kumar, V., (2011). “Managing Copyrights of Digital Vector Map using Steganography”, Proceedings of the Fifth INDIACOM National Conference, March, New Delhi, pp. 191-194

Articles in National/Local Seminars/Symposium

1.   Kumar, V., (1996). ‘Internet, Its Goal, Application, and Impact’, Proceedings of the first computer today and tomorrow conference, July, Dhanbad, India, pp. 10-12 

2.   Kumar, V., (2010). ‘Solving Some Recurrence Equation Using Unconventional GF-DC Method’, Proceedings of Third MATEIT National Conference March, New Delhi, pp TS-5.3.1.- TS5.3.4

Research Paper in Press

1.    Bansal, A., Muttoo, S. K., and Kumar, V.() “Steganography Technique Inspired by Rook”, IJISP, IGI Global

2.   Kaur, B., Ahuja, L. and Kumar, V. (), Interpretive Structural Modeling of the factors affecting crime against women,

3.   Kwatra, R., Kumar, V. and Madan, S. (). “Koch Fractal Approach to hide Information in a Digital Cover”, ISJ:GP

4.  Sharma, M., Ahuja, L. and Kumar, V. ( ) “Study and Classification of Recommender Systems: A Survey”, ICICC - 2020

5.   Sharma, G, Kumar, V. (), “Preserving IPR Using Reversible Digital Watermarking”, Advances in Computing and Intelligent Systems, Proceedings of the International Conference on Advancements in Computing & Management (ICACM-2019), April 13-14, Jaipur, pp. xxx-xxx.

Invited Lectures and Workshop Participated

1.   Delivered invited talk on “ICT for Health and Mankind” on 16.03.2019 at University Women’s Polytechnic, Aligarh Muslim University, Aligarh.

2.   Delivered a valedictory address at GTBIT, Delhi on 1.02.2018 during its CSI State Student Convention organized by them.

3.  Delivered Keynote Address on “Innovative Realms in Management & Technology” during a Technical Session in National conference organized by CPJ College, GGSIPU on 19.01.2018

4.  Delivered lecture on “E-Governance an e-effort to empower common man” at MD University Ajmer on 5th October 2017.

5.  Delivered lecture on “A Talk on GIS Technology, Application, and Current Trend” at MD University Ajmer on 5th October 2017.

6.  Participated in a Panel Discussion on “Digital India” during International Conference “IndiaCom 2017” on 2nd March 2017.

7.  Delivered a Lecture on “Research Methodology” in RDIAS, GGSIPU on March 13, 2017.

8. Chaired a session on “Systems and Architecture” in Digital India Golden celebration of CSI on 3rd December 2015 at New Delhi. 

9.  Delivered an invited lecture on ‘Application of Natural Number in Computer Science’ at Rajdhani College, Delhi University, during Arity 2015 on September 21, 2015.

10. Chaired a session in International Conference on “Bilingual International Conference Information Technology: Yesterday, Today, and Tomorrow” held in Delhi, 19-21, 2015 by DRDO.

11. Delivered an invited lecture on ‘Secure Computer Network & Dark Web’ at DRDO, Metcalf House, New Delhi, May 2014.

12.  Delivered an invited lecture on ‘e-Governance’ at University of Delhi (Dec 2013).

13. Delivered an invited lecture on ‘Graph-Theoretic Approach to Steganography and its Application’ in RDIAS, Delhi, (Feb 2013) and the lecture is available on U-tube.

14. Delivered an invited lecture on ‘Graph-Theoretic Approach to Steganography and its Application’ in Amity University, Noida. (May 2012)

15.  Attended 5 days MDP training at IIM Lucknow from 13-17 Feb 2012.

16. Delivered an invited lecture on ‘GIS: Technology, Application and its Future’ at University of Delhi (Dec 2011 and Jan 2013).

17.  Delivered an invited lecture on ‘How to write Research Papers in IT’ at MERI, GGSIPU, Delhi. (Mar 2006)

18. Delivered an invited lecture on ‘Application of Discrete Mathematics in Computer Science and Application’ in BVICAM, Delhi.

19. Delivered lectures on GISNIC and Remote Sensing during five days GIS training at Assam Administrative Staff College (AASC) Guwahati (Dec 2004).

20. Participated in the workshop on Parallel Computing –Optimization Performance of Parallel Programs (PCOPP –2002).

21. Prepared, scheduled and delivered a lecture on ‘Parallel computing in reference to PARAM 9000 in NIC’ (Jan 1997).

22.  Delivered a lecture on ‘Application of Computer and NIC Net Services’ to the officers and staff of CBI, Dhanbad Branch. (Feb1995)

Members of professional Bodies/ Program Committees

Life member of CSI

Member of ACM

Member of Executive Committee of Delhi Chapter of CSI Year 2015-2016

Hon. Secretary, CSI Delhi Chapter 2016-2018

Vice Chairman, CSI Delhi Chapter 2018-2019

Chairman, CSI Delhi Chapter 2019-2020.

Some titles under my Times of India online Blogs

1. “The Civility of a Criminal”, published on 30/07/2019 at https://timesofindia.indiatimes.com /blogs/ thought-of-vinay/ and also at https://economictimes.indiatimes.com/blogs /author/ vinay-kumar/

2. “Electricity Bill -an Extortion Facilitated by AAP in Delhi”, published on 30/07/2019 at https://timesofindia.indiatimes.com/blogs/thought-of-vinay/ and also at https:// economictimes.indiatimes.com/blogs/author/vinay-kumar/

3.   “Epidemic of Elitism”, published on    at https://timesofindia.indiatimes.com/blogs/ thought-of-vinay/ and also at https:// economictimes.indiatimes.com/blogs/author/vinay-kumar/

Some titles under my blog http://drvinayscientist.blogspot.in are

1.   “Expectation from Life”, published on 08/08/2017

2.  “Too much Pampering is not good for life”, published on 23/09/2016

3.  “Disputes and Crime’ industry is the largest employer in India”, published on 24/11/2015

4.  “India has become Intolerant for whom?” published on 24/11/2015

5. “Classic Example of Double Speak and Contempt of Court by NIC and DIETY”, published on 13/08/2015

6.  “Institutionalized Procedural Corruption in NIC”, published on 04/06/2015

7.  “Innovative Methods to Delay Implementation of court Order”, published on 30/03/2015

8.  “Chat with GOD”, published on 24/01/2015

9.  “Another rape a fodder for media hype and politics”, published on 08/12/2014

10. “May I get justice in this country? (An Open Letter to Prime Minister of India & Chief Justice of India)”, published on 24/09/2014

11. “How difficult is to publish this "A Simple Proof of Fermat Last Theorem by Method of Contradiction”, published on 20/08/2014

12. “How honesty spoke is different from honesty practiced”, published on 09/06/2014

13. “Selective Approach of Judiciary in India”, published on 01/03/2014

14. “AAP in Zombie State”, published on 17/02/2014

15. “Is Judicial System relevant for Government of India Today?”, published on 13/02/2014

16. “Impact of Social Networks on Youths in India”, published on 12/02/2014

17. “A. A. P. Stands for”, published on 11/12/2013

18. “Morally Turpitude Sick-u-lar Media’s Expectation from BJP”, published on 20/11/2013

19. “Empathy of Sick-u-lar Media for Nehru Family”, published on 18/11/2013

20. “Killed Instinct - An unpublished farewell message”, published on 12/11/2013

21. “Is Mathematics a science?” published on 08/05/2012