Dr. Vinay Kumar
Blog: http://drvinayscientist.blogspot.in
Twitter: https://twitter.com/ScientistVinay1
Facebook: https://www.facebook.com/Professorvinay
Website: https://knowdrvinaykumar.blogspot.com
Brief Professional Profile
Dr. Vinay Kumar is a
native by culture, Urbane by education and Civil by action, He is currently heading a NGO known as
DHEI Research Foundation that is active in Education and Health sector and
working at India Level.
Dr. Vinay Kumar is an alumnus of University
of Delhi and Jawaharlal Nehru University, Delhi. He has authored a book of
Discrete Mathematics, published by BPB, India. Its first edition was published
in October 2002 and its second edition is published in January 2015. He has
also authored a memoire, Killed Instinct, self published on Amazon.com
and released on October 1, 2018. He also contributes to blog in Times of India.
He worked as technocrats in NIC,
Government of India for almost 21 years. He has broadly worked in the field of
Academy, Research, Software Development and technical/academic writing for more
than 35 years. He has extensively contributed to the knowledge arena through
his books and research publications.
He took voluntary retirement from NIC
in December 2012 when he was serving as Scientist E & Technical Director.
Then he joined Vivekananda Institute of Professional Studies (VIPS), affiliated
to Guru Gobind Singh Indraprastha University, as Professor of Information
Technology. He worked as Dean of the IT Department and Department of Research
and Publication till 5th July, 2018. He
worked as chief editor of bi-annual journal named “Vivekananda Journal of
Research” during the period. He
resigned from VIPS on 5th July, 2018 and took retirement from active
routine service life since then.
He successfully mentored over 10
research scholars for their Ph.D. award. He is now devoting his time in social
services and services to deprived section of the society.
He is a lifetime member of Computer
Society of India and an associate member of Association of Computing Machine
(ACM), USA.
He has published over 100 of research
papers in the areas of Graph-Theoretic Approach of Steganography, Information
Security & Privacy, Geographic Information System Data Modeling,
Restricting Backtracking in NP problems, Digital watermarking of Spatial Data,
and e-Governance. Some of the publications are listed below.
Publications
Book/Chapter
1. Vinay Kumar, (2002).
Discrete Mathematics, New Delhi, India: BPB. 2nd edition in January
2015.
2. Muttoo, S. K. and Kumar V., (2010). Chapter
15 in a book titled “Optimizing Information Security and Advancing Privacy
Assurance”, ed. Hamid Nemati, IGI Global, USA.
3. Vinay Kumar, (2018).
Killed Instinct, New Delhi, Worldwide on KDP Amazon.com
Research Papers in International Journals
1. Sharma, V., Kumar, V. and Bhangari, J.,
(2003). ‘NIC’s Initiative in SDI’. Geospatial World. Vol. 2, No. 4, pp. 40-44.
2. Kumar, V. and Sharma, V., (2006). ‘Overcoming
64K data size limit in handling large spatial data in GISNIC while cleaning and
building topology’. Int. J. of Information Technology and Management,
Inderscience, Vol. 5, No. 1, pp. 77-86.
3. Kumar, V. and Muttoo, S. K., (2009). ‘A
Data Structure for Graph to Facilitate Hiding of Information in a Graph’s
Segments –A Graph-Theoretic Approach to Steganography’. Int. J. on Computer
Network and Distributed System, Inderscience, Vol. 3, No. 3, pp. 268-282.
4. Kumar, V. and Muttoo, S. K., (2010)
‘Graph-Theoretic Approach to Steganography to Secure Message Digest’,
Information Security Journal: A global perspective, Taylor & Francis, Vol.
19, No. 6, pp. 328-335.
5. Muttoo, S. K. and Kumar, V.,
(2010)‘Hamiltonian Graph Approach to Steganography’, International Journal of
Electronic Security and Digital Forensic, Inderscience, Vol. 3, No. 4, pp. 311
– 332.
6. Muttoo, S. K. and Kumar, V., (2010).‘Hiding
Message in Map along pre-Hamiltonian Path’, Int. J. of Information Security and
Privacy, Idea Group USA, Vol. 4, No. 4, pp. 21-34. Also appeared as Chapter 15 in a book titled
“Optimizing Information Security and Advancing Privacy Assurance”, ed. Hamid
Nemati, IGI Global
7. Kumar, V., (2011). “Effort to get published:
Rejection to Double Submission”. Int. J. of Research and Reviews in Computer
Science. Science Academy Publishers, UK, Vol. 2, No. 4, pp. 994-1000.
8. Kumar, V. and Muttoo, S.
K., (2011). ‘A Graph-Theoretic Approach to Sustainable Steganography’. MIS
Review: An Int. Journal, Vol. 17, No. 1, pp. 19-37.
9. S. K. Muttoo, Kumar, V.,
(2012). “Watermarking Digital Vector Map Using Graph-Theoretic Approach”,
Annals of GIS, Taylor & Francis. Vol. 18, No. 2 pp. 135-146.
10. Avijit Dutta, Kumar, V.,
(2012). “Managing Information Security in Digital Age”, Int. J. of Management
and Social Sciences. Vol. 1, No. 2, pp. 205-212.
11. Kumar, V., (2012).
“Mathematics is Science: A Topic Revisited in Context of FCS of India”, Int. J.
of Modern Education and Computer Science, MECS, Vol. 4, No. 6, pp. 17-26.
12. Kumar, V., Muttoo, S. K.
and Bansal, A. (2012). “Hiding Information in Vector Layer while Extracting
Layer from Raster Data”. Information Security Journal: A global perspective,
Taylor & Francis, Vol. 21, No. 6, pp. 317-327.
13. Muttoo, S. K., Kumar, V.,
and Bansal, A. (2012). “Secure Data Hiding Using Eight Queens Problem”. Int. J.
of Information Security and Privacy, Idea Group USA, Vol. 6, No. 4, pp.
55-70.
14. Kumar, V. and Bansal, A.
(2013). “Information & Communication
Technology for Improving Livelihoods of Tribal Community in India”, Int. J. of
Computer Engineering Science (IJCES), Vol. 3, No. 5, pp. 13-21.
15. Kumar, V. and Thareja,
R. (2013).“Goal Structured Requirement
Engineering and Traceability Model for Data Warehouses”, Int. J. Information
Technology &Computer Science, MECS, Hongkong, Vol. 5, No. 12, pp. 78-85.
16. Kumar, V. and Thareja,
R. (2013). “A Simplified Approach for
Quality Management in Data Warehouse”, Int. J. of data Mining & Knowledge
Management Process (IJDKP), Australia, Vol. 3, No. 5, pp. 61-69.
17. Kumar,V. andThareja,
R. (2014). “Managing Traceability Data
Warehouse Development Project”, Int. J. of Computer Technology &
Application (IJCTA), Australia, Vol. 5, No. 3, pp.1001-1011.
18. Thareja, R. and Kumar, V.
(2014). “Data Warehouse Requirements Engineering”, Int. J. of Information,
Communication and Computing Technology (IJICCT), Vol. 2, No. 1, pp 53-60.
19. Kumar, V. and Thareja, R.
(2014). “Analyzing the Goal Structured Requirement Engineering and Traceability
Model”, Int. J. of Database Theory and Application (IJDTA), Vol. 7, No. 3, pp
231-244.
20. Kumar, V. and Thareja, R.
(2014). “Requirement Engineering for a user centric spatial data warehouse”,
Int. J. of Open Problems in Computer Science and Mathematics (IJOPCM), Vol. 7,
No. 3, pp.63-72.
21. Bansal, A., Muttoo, S. K.
and Kumar, V., (2014). “Data Hiding Approach based on Eight-Queens Problem and
Pixel Mapping Method”. Int. J. of Signal Processing, Image Processing and
Pattern Recognition (IJSIP), SERC, Australia, Vol. 7, No. 5, pp 47-58
22. Kumar, V. (2014), “Proof
of Fermat Last Theorem based on Odd Even Classification of Integers”, IJOPCM,
Vol. 7, No. 4, pp 23-34.
23. Kumar, V., Bansal, A.,
and Muttoo, S. K. (2014). “Data Hiding Method Based on Inter-Block Difference
in Eight Queens Solutions and LSB Substitution”. Int. J. of Information
Security and Privacy, Idea Group USA, Vol. 8, No. 2, pp 55-68.
24. Kumar, V., and Thareja,
R. (2015). “Risk based Layered Securing Approach to Secure Data in Data
Warehouse”, Global Journal of Advanced Engineering Technologies (GJAET).Vol. 4,
No. 2, pp. 101-106.
25. Sharma, R., and Kumar, V.
(2015). Implementation of Steganography using Recursive Equation Approach, International Journal of Computer &
Mathematical Science (IJCMS), Vol. 4, pp 15-19.
26. Sharma, G., and Kumar, V.
(2015). Reversible Information Hiding and its Application in Watermarking,
International Journal of Engineering Technology, Management and Applied
Sciences (IJETMAS) Vol. 4, pp 157-162.
27. Bansal, A., Muttoo, S.
K., and Kumar, V. (2015).Secure Data Hiding by Optimal Placement of Queen along
Closed Knight Tour, I-Manager’s Journal of Information Technology, Vol. 4 No.
3, pp 18-24.
28. Bansal, A., Muttoo, S.
K., and Kumar, V. (2016). Secure Data Hiding along Randomly Selected Closed
Knight Tour. Journal of Applied Security Research: An International Journal of
Police - Security Operations & Practices, Taylor & Francis, Vol. 11,
No. 1, pp.90-100.
29. Kwatra, R., Kumar, V.,
and Madan, S. (2016). Principle of 2d Curve Steganography, Journal of Global
Information and Business Strategy (J-GIBS), Vol. No. pp. 104-108
30. Bansal, A., Muttoo, S.
K., and Kumar, V. (2016).Security against Sample Pair Steganalysis in Eight
Queens Data Hiding Technique, Int. J. of Computer Network and Information
Security (IJCNIS), MECS Press, Vol 8, No. 8. pp. 39-46.
31. Kumar, V., Chaturvedi, A.
and Verma, P. (2016). Applications of Big Data in the Digital India:
Opportunities and Challenges, IRA-International Journal of Technology &
Engineering, Vol. 3, No. 3. pp 164-174.
32. Kumar, V., Chaturvedi, A.
and Verma, P. (2016). The Concepts of Exploring Applications of Big Data in
Digital India Scenario, International Journal of Multidisciplinary Research and
Modern Education (IJMRME), Vol. 2, No. 1. Pp 703-708.
33. Kwatra, R., Kumar, V. and
Madan, S. (2016). Curve Approach to Hide Image Based Information In a digital
Cover. I-Manager’s Journal of Information Technology, Vol. 5 No. 4, pp 26-32.
34. Sharma, G, Kumar, V.
(2017), A novel technique for Reversible Information Hiding, Advances in
Computational Sciences and Technology, Vol 10, No. 7, pp 2069-2078.
35. Kwatra, R., Kumar, V. and
Madan, S. (2018). Embedding stego text in a digital cover using Elliptic Curve,
Journal of Advanced Research in Dynamical and Control Systems, Vol 10, No. 11,
pp 836-841
36. Kumar, V., Dave, M. and
Chaturvedi A. (2018). A Solution to Secure Personal Data When Aadhar is Linked
With DigiLocker, International Journal of Computer Network and Information
Security (IJCNIS), MECS Press, Hong Kong Vol 10, No 5 pp 37-44.
37. Kumar, V. (2018), Proof
of Beal’s Conjecture and Fermat Last Theorem using Contra Positive Method,
i-manager’s Journal of Mathematics, Vol. 7 No.2 pp 1-7.
38. Kumar, V., Pal, P. and
Sharma, A. (2018). Mobile Apps in E-Governance Projects in India: Where Do We
Stand?, International Journal of Sciences: Basic and Applied Research (IJSBAR).
Vol. 21 no. 1 pp 392-397.
39. Sharma, G.,
Kumar, V. (2018) "Review of
Different Parameters For Digital Reversible Watermarking", IJRAR -
International Journal Of Research And Analytical Reviews (IJRAR), E-ISSN
2348-1269, P- ISSN 2349-5138, Volume.5, Issue 4, Page No pp.90-93, December
2018, Available at :
http://www.ijrar.org/IJRAR1944392.pdf
40 Sharma, M., Ahuja, L. and Kumar, V. (2019). A Hybrid Context Aware Recommender System with Combined Pre
and Post-Filter Approach, International Journal of Information
Technology Project Management (IJITPM ) 10.4 (2019): 1-14. Web 30 Nov. 2019.
doi:10.4018/IJITPM.2019100101
41. Sharma,
M., Ahuja, L. and Kumar, V. (2019). A Hybrid
Filtering Approach for an Improved Context-aware Recommender System, Recent Patents on Engineering, Bentham Science Publishers, Vol 13, No 1, 2019, pp. 39-47, DOI: https://doi.org/10.2174/1872212112666180813124358
42. Kaur, B., Ahuja, L. and
Kumar, V. (2020). “Developing
a Conceptual Model for Crime Against Women using ISM & MICMAC”, Recent
Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2213275912666190809113047
43. Kaur, B.,
Ahuja, L. and Kumar, V. (In Press). “Predicting sexual offenders using Exhaustive CHAID techniques
on victims age”, Int. J. of Applied Management Science
(IJAMS), Vol. XX No XX, pp XX-XX
Research Papers in National Journals
1. Kumar, V., (2009).
‘E-governance in India Needs New Project Management Paradigm’, IITM Journal of
Management and IT, India, Vol. 1, No. 1, pp. 7-15
2. Kumar, V., (2010).
‘Restricted Backtracked Algorithm to Find Hamiltonian Circuit in Undirected
Graph’, BVICAM Int. J. of Information Technology, India, Vol. 2, No. 2, pp.
23-32.
3. Kumar, V., (2010)
‘Essential Points for Setting up Video Wall Facility’. IMS Manthan: The Journal
of Innovation, India, Vol. 5, No. 2 pp. 47-52. (refereed & indexed)
4. Kumar, V., (2010).
‘GISNIC: A Low-End GIS tool from NIC’. IITM Journal of Management and IT,
India, Vol. 1, No. 2, pp 1-11.
5. Kumar, V., (2012).
“Approach to Prove Correctness of Graph Algorithm”, IMS Manthan: The Journal of
Innovation, Vol. 7, No. 1, pp. 101-108.
6. Kumar, V. and Sinha A. K.
(2013). “Virtual Classroom an Initiative for Spreading Excellent Education in
India”, Vivekananda, J of Research, Vol. 2, No. 1, pp. 15-26.
7. Avijit Dutta, Kumar, V., (2013). “Evolution
and Adoption of Social IT”, IMS Manthan: The Journal of Innovation, India, Vol.
8, No. 2, pp.113-118.
8. Kumar, V. and Muttoo S. K., (2014).
“Geographic Information Systems: From Desktop to WWW Environment”, Vivekananda,
J of Research, Vol. 3, No. 1, pp. 15-20.
Research Papers in
International Conferences
1. Kumar, V., (2008). “E-Governance Projects in India, Myths, Reality,
and Alternative”, Proceedings of the First International Conference; Review of
Business & Technology Research (RBTR), July– August, New Delhi, Vol. 1, No.
1, pp. 1-8.
2. Thareja, R. and Kumar, V.
(2014). “Best Practices To Improve Data Warehouse Performance”, Proceedings of
the Fifth INDIACOM International Conference, March, New Delhi, pp. 41-46.
3. Kaur B., Ahuja L., Kumar
V. (2018). Factors Affecting Crime against Women Using Regression and K-Means
Clustering Techniques, In: Bhattacharyya S., Sen S., Dutta M., Biswas P.,
Chattopadhyay H. (eds) Industry Interactive Innovations in Science, Engineering
and Technology. Lecture Notes in Networks and Systems, Vol. 11. Springer,
Singapore
4. Munshi, A., Kumar, V.
(2018). “Need of New Project Management Paradigm in E-Governance”, Proceedings
of the 12th INDIACOM International Conference, March, New Delhi, pp. 262-267.
IEEE conference Id: 42835.
5. Chaturvedi, A. Kumar, V.
(2018). “Proposed Security Solutions at Different Levels of Network Required in
UIDAI System”, Proceedings of the 12th INDIACOM International Conference,
March, New Delhi, pp. 713-720, IEEE conference Id: 42835
6. Kwatra, R., Kumar, V. and
Madan, S. (2019). Hiding Information along Fractal in a Digital Cover to
Improve Capacity, Proceedings of the ICETIT 2019, Emerging Trend in Information
Technology, March, New Delhi, pp 1055-1070, Lecture Notes in Electrical
Engineering 605, Springer Nature Switzerland 2020
7. Kaur, B., Ahuja, L. and Kumar, V. (2019), Application of ISM and
TISM: Model building techniques, International Conference on
Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) 14-16 Feb,
2019, IEEE Xplore, DOI: 10.1109/COMITCon.2019.8862177
8 Kaur,
B., Ahuja, L. and Kumar, V.,(2019) “Crime
Against Women: Analysis and Prediction Using Data Mining Techniques,” International Conference on Machine Learning, Big
Data, Cloud and Parallel Computing (COMITCon) 14-16 Feb, 2019, IEEE Xplore, DOI:
10.1109/COMITCon.2019.8862195
9. Kaur, B., Ahuja, L. and Kumar, V. (2019), Decision tree Model to
predict sexual offenders on the basis of major and minor victims, Amity
International Conference on Artificial Intelligence (AICAI), Dubai (UAE), 4-6
Feb, 2019, IEEE Xplore, DOI: 10.1109/AICAI.2019.8701276
10. Munshi, A., Kumar, V. and
Mallik P. (2019). “Digitization of Land Records--What we can learn from Bhoomi?”,
Proceedings of the International Conference on Advancements in Computing &
Management (ICACM-2019), April 13-14, Jaipur, pp. 888-893. Available at SSRN: https://ssrn.com/abstract=3464213 or http://dx.doi.org/10.2139/ssrn.3464213
Research Papers in
National Conferences
1. Kumar, V. and Muttoo, S. K. (2008). “Relevance of Steganography in
General and Graph-Theoretic Approach in particular in Indian Security Concern
and Measure” Proceedings of the Second INDIACOM National Conference, February,
New Delhi, pp 183-188. (Refereed with ISSN)
2. Kumar, V. and Muttoo, S.
K., (2009). ‘Principle of Graph-Theoretic Approach to Digital Steganography’,
Proceedings of the Third INDIACOM National Conference, February, New Delhi, pp.
161-165.
3. Kumar, V., (2010).
‘Encryption Strength Lies beyond Key Length: A Suggestive Approach’.
Proceedings of the Fourth INDIACOM National Conference, February, New Delhi,
pp.123-127
4. S. K. Muttoo, Kumar, V., (2011). “Managing Copyrights of Digital
Vector Map using Steganography”, Proceedings of the Fifth INDIACOM National
Conference, March, New Delhi, pp. 191-194
Articles in National/Local
Seminars/Symposium
1. Kumar, V., (1996). ‘Internet, Its Goal, Application, and Impact’,
Proceedings of the first computer today and tomorrow conference, July, Dhanbad,
India, pp. 10-12
2. Kumar, V., (2010). ‘Solving Some Recurrence Equation Using
Unconventional GF-DC Method’, Proceedings of Third MATEIT National Conference
March, New Delhi, pp TS-5.3.1.- TS5.3.4
Research Paper in Press
1. Bansal, A.,
Muttoo, S. K., and Kumar, V.() “Steganography
Technique Inspired by Rook”, IJISP, IGI
Global
2. Kaur, B., Ahuja, L. and Kumar, V. (), Interpretive Structural Modeling
of the factors affecting crime against women,
3. Kwatra, R., Kumar, V. and Madan, S. (). “Koch Fractal Approach to hide Information
in a Digital Cover”, ISJ:GP
4. Sharma,
M., Ahuja, L. and Kumar, V. (
) “Study and Classification of Recommender Systems: A Survey”, ICICC - 2020
5. Sharma, G, Kumar, V. (),
“Preserving IPR Using Reversible Digital Watermarking”, Advances in Computing and Intelligent Systems, Proceedings of the International Conference on
Advancements in Computing & Management (ICACM-2019), April 13-14, Jaipur,
pp. xxx-xxx.
Invited Lectures and Workshop Participated
1. Delivered invited talk on “ICT
for Health and Mankind” on 16.03.2019
at University Women’s
Polytechnic, Aligarh Muslim University, Aligarh.
2. Delivered a valedictory address at GTBIT, Delhi on 1.02.2018
during its CSI State Student Convention organized by them.
3. Delivered Keynote Address on “Innovative
Realms in Management & Technology” during a Technical Session in National
conference organized by CPJ College, GGSIPU on 19.01.2018
4. Delivered lecture on “E-Governance an
e-effort to empower common man” at MD University Ajmer on 5th October 2017.
5. Delivered lecture on “A Talk on GIS
Technology, Application, and Current Trend” at MD University Ajmer on 5th
October 2017.
6. Participated in a Panel Discussion on
“Digital India” during International Conference “IndiaCom 2017” on 2nd March
2017.
7. Delivered a Lecture on “Research Methodology”
in RDIAS, GGSIPU on March 13, 2017.
8. Chaired a session on “Systems
and Architecture” in Digital India Golden celebration of CSI on 3rd December
2015 at New Delhi.
9. Delivered an invited lecture on ‘Application
of Natural Number in Computer Science’ at Rajdhani College, Delhi University,
during Arity 2015 on September 21, 2015.
10. Chaired a session in
International Conference on “Bilingual International Conference Information
Technology: Yesterday, Today, and Tomorrow” held in Delhi, 19-21, 2015 by DRDO.
11. Delivered an invited
lecture on ‘Secure Computer Network & Dark Web’ at DRDO, Metcalf House, New
Delhi, May 2014.
12. Delivered an invited lecture on
‘e-Governance’ at University of Delhi (Dec 2013).
13. Delivered an invited
lecture on ‘Graph-Theoretic Approach to Steganography and its Application’ in
RDIAS, Delhi, (Feb 2013) and the lecture is available on U-tube.
14. Delivered an invited
lecture on ‘Graph-Theoretic Approach to Steganography and its Application’ in
Amity University, Noida. (May 2012)
15. Attended 5 days MDP training at IIM Lucknow
from 13-17 Feb 2012.
16. Delivered an invited
lecture on ‘GIS: Technology, Application and its Future’ at University of Delhi
(Dec 2011 and Jan 2013).
17. Delivered an invited lecture on ‘How to write
Research Papers in IT’ at MERI, GGSIPU, Delhi. (Mar 2006)
18. Delivered an invited
lecture on ‘Application of Discrete Mathematics in Computer Science and
Application’ in BVICAM, Delhi.
19. Delivered lectures on
GISNIC and Remote Sensing during five days GIS training at Assam Administrative
Staff College (AASC) Guwahati (Dec 2004).
20. Participated in the
workshop on Parallel Computing –Optimization Performance of Parallel Programs
(PCOPP –2002).
21. Prepared, scheduled and
delivered a lecture on ‘Parallel computing in reference to PARAM 9000 in NIC’
(Jan 1997).
22. Delivered a lecture on ‘Application of Computer and NIC Net Services’ to the officers and staff of CBI, Dhanbad Branch. (Feb1995)
Members of professional Bodies/ Program Committees
Life member of CSI
Member of ACM
Member of Executive Committee
of Delhi Chapter of CSI Year 2015-2016
Hon. Secretary, CSI Delhi
Chapter 2016-2018
Vice Chairman, CSI Delhi
Chapter 2018-2019
Chairman, CSI Delhi Chapter
2019-2020.
Some titles under my Times of India online Blogs
1. “The Civility
of a Criminal”, published on 30/07/2019
at https://timesofindia.indiatimes.com /blogs/ thought-of-vinay/ and also at https://economictimes.indiatimes.com/blogs /author/ vinay-kumar/
2. “Electricity Bill -an Extortion
Facilitated by AAP in Delhi”, published
on 30/07/2019 at https://timesofindia.indiatimes.com/blogs/thought-of-vinay/
and also at https://
economictimes.indiatimes.com/blogs/author/vinay-kumar/
3. “Epidemic of Elitism”, published on at https://timesofindia.indiatimes.com/blogs/ thought-of-vinay/ and also at https://
economictimes.indiatimes.com/blogs/author/vinay-kumar/
Some titles under my blog http://drvinayscientist.blogspot.in
are
1. “Expectation from Life”, published on 08/08/2017
2. “Too much Pampering is not good for life”, published
on 23/09/2016
3. “Disputes and Crime’ industry is the largest
employer in India”, published on 24/11/2015
4. “India has become Intolerant for whom?” published
on 24/11/2015
5. “Classic Example of Double
Speak and Contempt of Court by NIC and DIETY”, published on 13/08/2015
6. “Institutionalized Procedural Corruption in
NIC”, published on 04/06/2015
7. “Innovative Methods to Delay Implementation
of court Order”, published on 30/03/2015
8. “Chat with GOD”, published on 24/01/2015
9. “Another rape a fodder for media hype and
politics”, published on 08/12/2014
10. “May I get justice in this country? (An Open Letter to Prime
Minister of India & Chief Justice of India)”, published on 24/09/2014
11. “How difficult is to
publish this "A Simple Proof of Fermat Last Theorem by Method of
Contradiction”, published on 20/08/2014
12. “How honesty spoke is
different from honesty practiced”, published on 09/06/2014
13. “Selective Approach of
Judiciary in India”, published on 01/03/2014
14. “AAP in Zombie State”,
published on 17/02/2014
15. “Is Judicial System
relevant for Government of India Today?”, published on 13/02/2014
16. “Impact of Social
Networks on Youths in India”, published on 12/02/2014
17. “A. A. P. Stands for”,
published on 11/12/2013
18. “Morally Turpitude
Sick-u-lar Media’s Expectation from BJP”, published on 20/11/2013
19. “Empathy of Sick-u-lar
Media for Nehru Family”, published on 18/11/2013
20. “Killed Instinct - An
unpublished farewell message”, published on 12/11/2013
21. “Is Mathematics a
science?” published on 08/05/2012