Year 2017-18 Conferences

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms Advanced Computational and Communication Paradigms ICACCP 2017 Loveleen Kaur, Ashutosh Mishra
2.        A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication Proceedings of the 9th International Conference on Computer and Automation Engineering, Sydney, Australia — February 18 - 21, 2017 Shivendra Shivani, Priyanka Singh and Suneeta Agarwal
3.        A Neural Network Based System for Face Identification by a Blind User 49TH Annual Meeting Of The Associazione Società Italiana Di Elettronica, Andrea La Caita, 2017 Sergio Carrato, Stefano Marsi, Giovanni Ramponi, Jhilik Bhattacharya, Francesco Guzzi
4.        A Novel Localized Approach for Efficient delivery of Software Products IEEE Fourth International Conference on Signal Processing, Computing and Control, ISPCC-2017 Diksha Hooda and Rinkle Rani
5.        A Review on Node Replication Attack Identification Schemes in WSN 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2017 Harpreet Kaur, Sharad Saxena
6.        ABE based Secure Distributed Storage Scheme for Big Data in Cloud International Conference on Smart Technologies in Computer and Communication (SmartTech 2017) Bhawna Jain, Tarunpreet Bhatia, A.K. Verma
7.        An Efficient algorithm for Sampling of Single Large Graph IEEE 10th International Conference on Contemporary Computing (IC3’2017) Vandana Bhatia and Rinkle Rani
8.        An Efficient Influence based Label Propagation algorithm for Clustering large graphs IEEE International Conference on Infocom Technologies and Unmanned Systems (ICTUS"2017) Vandana Bhatia and Rinkle Rani
9.        Arrival Based Deadline Aware Job Scheduling Algorithm in cloud International conference held at JP University Waknaghat, Sept21-23, 2017 Swati Gupta, Kumar R.
10.        Churn Prediction in Telecommunication using Machine Learning International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) Kriti Mishra and Rinkle Rani
11.        Classification of cancerous profiles using machine learning IEEE International Conference on Machine Learning and Data Science (MLDS), 2017 Aman Sharma and Rinkle Rani
12.        Comprehensive Review On Supervised Machine Learning Algorithms International Conference on Machine Learning and Data Science (MLDS), Noida (2017) Hemant Kumar Gianey, Rishabh Choudhary
13.        Enhanced Grade Diffusion for Node Recovery in Wireless Sensor IEEE International Conference on Intelligent Computing and Control(I2c2017)  Amandeep Kaur, Sukhchandan Randhawa and Sushma Jain
14.        FAAL: Fog computing-based patient monitoring system for ambient assisted living IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), 2017 Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues
15.        Face as bio-metric password for secure ATM transactions Proceedings of Sixth International Conference on Soft Computing for Problem Solving, pp. 271-278. Springer, Singapore, 2017 Arun Singh, Jhilik Bhattacharya, Shatrughan Modi
16.        Fault Tolerance for scientific applications in cloud International Conference on Telecommunication and Networks (TEL-NET 2017) Suruchi Talwani and Inderveer Chana
17.        Feeding a DNN for Face Verification in Video Data acquired by a Visually Impaired User MIPRO 2017 CIS - Intelligent Systems,Croatia Jhilik Bhattacharya, Stefano Marsi, Sergio Carrato, Herbert Frey and Giovanni Ramponi
18.        Flood Susceptibility Mapping using GIS-based Support Vector Machine and Particle Swarm Optimization: A case study in Uttarakhand (India) Eight International Conference On Computing, Communication And Networking Technologies (ICCCNT) 2017 Shruti Sachdeva, Tarunpreet Bhatia, A.K. Verma
19.        Home-based exercise system for patients using IoT enabled smart speaker IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom) 2017 Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues
20.        Image Encryption Using Chaotic Sequence and Flipping IEEE International conference on Computing, Communication and Automation; 2017 Priyanka and Ashish Girdhar
21.        Information Retrieval in Web Crawling Using Population Based, and Local Search Based Meta-heuristics: A Review Proceedings of Sixth International Conference on Soft Computing for Problem Solving (pp. 87-104). Springer, Singapore, 2017 Pratibha Sharma, Jagmeet Kaur, Vinay Arora, and Prashant Singh Rana
22.        INGC:  Graph Clustering & Outlier Detection algorithm using Label Propagation IEEE International Conference on Machine Learning and Data Science (MLDS), 2017 Vandana Bhatia, Bharti Saneja and Rinkle Rani
23.        Interference Aware Scheduling of Tasks on Cloud IEEE International Conference held at JP University Waknaghat, Sept21-23, 2017 S. Setia & R. Kumar
24.        Internet-of-Things:A Survey SmartTech 2017, Amity University Rajasthan, Jaipur, India. (SCOPUS, Springer) Monika Bharti, Sharad Saxena, Rajesh Kumar
25.        Lagrangian Relaxation for the Vehicle Routing Problem with time windows IEEE International Conference on Intelligent Computing, Instrumentation & Control Technologies, 2017 Divya Aggarwal, Ashish Girdhar, Vijay Kumar
26.        Managing Software Product line using an Ontological Rule Based Framework International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017 Megha, Shivani Goel, Ajay Kumar and Arun Negi
27.        Multipath Routing in Wireless Sensor Networks: A Taxonomy and Future Research Directions Recent Advances and Applications in Computer Engineering Conference, St. Xavier, Jaipur, 23-25 November 2017 Sukhchandan Randhawa and Sushma Jain
28.        Obesity Prediction using Ensemble Machine Learning Approaches Springer 5th International Conference on Advanced Computing, Networking, and Informatics, 2017 Kapil Jindal, Niyati Baliyan & Prashant Singh Rana
29.        Real-time DNN-based Face Identification for the Blind Proc. Applications in Electronics Pervading Industry, Environment and Society, ApplePies 2017 Jhilik Bhattacharya, Francesco Guzzi, Stefano Marsi, Sergio Carrato, andGiovanni Ramponi
30.        Review of Transforms used in Image Enhancement International Journal of Computer & Mathematical Sciences, 2017 Monty Singh,Ashish Girdhar
31.        SDN-based Data Center Energy Management System Using RES and Electric Vehicles IEEE Global Communications Conference (GLOBECOM), 2017 Gagangeet Singh Aujla, Anish Jindal, Neeraj Kumar, Mukesh Singh
32.        Secure Certificateless Proxy Reencryption without Pairing In Proceedings of 12th International Workshop on Security, International Conference Center Hiroshima, pp. 85-101. Springer, Cham, 2017 Veronica Kuchta, Gaurav Sharma, Rajeev Sahu, Tarunpreet Bhatia, Olivier Markowitch
33.        Sentiment Analysis of Customer Product Reviews Using Machine Learning IEEE International Conference on Intelligent Computing and Control(I2c2’17) Zeenia Singla, Sukhchandan Randhawa, Sushma Jain
34.        Statistical and Sentiment Analysis of Customer Product Reviews International Conference on Computing Communication and Networking Technologies 2017 Zeenia Singla, Sukhchandan Randhawa, Sushma Jain
35.        Student satisfaction: A survey at an Indian University IEEE International Conference on Intelligent Computing and Control(I2c2’17) Himika, Sukhchandan Randhawa and Maninder Kaur
36.        A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals In: 16th International Conference on Frontiers in Handwriting Recognition, 2018 Harjeet Singh, R. K. Sharma, R. Kumar, K. Verma, R. Kumar, and M. Kumar
37.        A Data-Driven Framework for Survivable Wireless Sensor Networks 11th Internation Conference on Contemporary Computing (IC3), 2018 Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana
38.        A robust and secure hybrid reversible data embedding algorithm International Conference on Computing, Power and Communication Technologies 2018 (GUCON), Galgotias University,Sep 28-29, 2018 Divya Arora, Anil Kumar Verma
39.        A Systematic Review on QoS aware Resource Utilisation and Allocation in Cloud Computing International Conference on Information Systems and Management Science, University of Malta, Malta [Feb. 22-23, 2018] Vijay Prakash, Seema Bawa, Lalit Garg
40.        Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks  Wireless, Intelligent, and Distributed Environment for Communication, 2018 Nitin Goyal, Mayank Dave, Anil Kumar Verma
41.        OLAP Approach to Visualizations and Digital ATLAS for NRIs Directory Database 4th International Conference on Harmony Search, Soft Computing and Applications (ICHSA 2018) Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur
42.        Autonomous tagging of stack overflow questions using statistical methods International Conference on Computer Science, Industrial Electronics(ICCSIE), 2018 Rishabh Bassi, Rohan Piplani, Ravijit Singh Ramana, Jasmeet Singh, Harpreet Singh, Prashant
43.        Efficient Wavelet Families for ECG classification using Neural Classifiers Procedia Engineering (Elsevier), International Conference on Computational Intelligence and Data Science (ICCIDS 2018) Ritu Singh, Rajesh Mehta, Navin Rajpal
44.        E-Krishi: An IoT based Smart Irrigation System International Conference on Electrical, Electronics, Computer Science and Information Technology, Bengaluru, 2018 Sakshi Kathuria, Rohan Kumar, Tarunpreet Bhatia
45.        Hand Gesture Recognition using Gaussian Threshold and Different SVM Kernels International Conference on Advances in Computer Science and Data Sciences, 2018 Shifali Sharma, Jhilik Bhattacharya, Shatrughan Modi, Prashant Singh Rana
46.        RCDR: Reliability Control Framework for Data Rate Prediction in Wireless Sensor Networks International Conference on Computing, Power and Communication Technologies 2018 (GUCON), Galgotias University,Sep 28-29, 2018 Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana
47.        Rule Based Fake Currency Detection System 3 rd International Conference on Advancement in Engineering, Applied Science and Management (ICAEASM 2018) Harshit Rampal, Shreelekha Pandey
48.        Commentary upon Descriptive Data Analytics Proceedings of the 2nd International Conference on Inventive Systems and Control (ICISC 2018) IEEE Xplore Compliant Harkiran Kaur, Aanchal Phutela
49.        Utility of OLAP and Digital ATLAS to Enhance Cross Border Connectivity Among Punjabi Sikh NRIs Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018) Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur
50.        Implementing Multi-Dimensional Analytics in NRIs Directory Databases Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018) Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur

Year 2016-17 Conferences

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1.        A Behavioral Metrics Suite for Modular Ontologies ACM Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, March 04 - 05, 2016 Niyati Baliyan and Sandeep Kumar
2.        A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds,2016, pp. 1-6 4th International Conference on Advancements in Engineering & Technology Rajesh Kumar Ashok Kumar Anju Sharma
3.        A Comparative study of Elasticsearch and CouchDB Document Oriented Databases IEEE Conference on Inventive Computation Technologies (ICICT-2016).,Coimbatore, India,26-27 Aug. 2016, pp. 1-4 "S. Gupta R. Rani "
4.        A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Amanpreet Singh
5.        A Data Analytical Approach Using Support Vector Machine for Demand Response Management in Smart Grid IEEE PES General Meeting, Boston, MA, USA, 17-21 July 2016, pp. 1-5 Anish Jindal, Neeraj Kumar, Mukesh Singh
6.        A Hierarchical Fuzzy System for Quality Assessment of Semantic Web Application as a Service ACM SIGSOFT Software Engineering Notes,Volume 41 Issue 1, January 2016, pp. 1-7 Niyati Baliyan and Sandeep Kumar
7.        A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm Poster presentation at Security and Privacy Symposium 2016, Rohini Rajpal, Sanmeet Kaur
8.        A non-linear modified CONVEF-AD based approach for low-dose sinogram restoration International Conference on Computer Vision and Image Processing Shailendra Tiwari, Rajeev Srivastava, and K.V. Arya
9.        A novel technique of sentiment detection for microblogging sites IEEE-3rd International Conference on Microelectronics, Circuits and Systems, 2016 Neetika Bansal, Ashima Singh
10.    A proposed pharmacogenetic solution for IT based Healthcare Springer Second International Conference on ICT for Sustainable Development,pp 113-121, 2016 Rashmeet Toor and Inderveer Chana,
11.    A Real-time Smart Charging Station for EVs Designed for V2G Scenario and its Coordination with Renewable Energy Sources IEEE PES General Meeting, Boston, Boston, MA, USA, 17-21 July 2016, pp. 1-5 Mukesh Singh, Praveen Kumar, Indrani Kar, Neeraj Kumar
12.    A review - Fuzzy Time Series Forecasting Model ICIIECS 2016. Alok Tripathi, HS Pannu
13.    A Review on Energy Aware VM Placement and Consolidation Techniques IEEE Sponsored International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp. 1-7 Sukhandeep Kaur and Seema Bawa
14.    A review on opinionated sentiment analysis based upon machine learning approach International Conference on Inventive Computation Technologies (ICICT 2016) IEEE,Coimbatore, India, 26-27 Aug. 2016,pp. 1-6 Neetika Bansal, Ashima Singh
15.    A review on Sentiment Analysis using machine learning approaches International Conference on Inventive Computation Technologies, 2016 Neetika Bansal, Ashima Singh
16.    A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Mannat Aneja, Tarunpreet Bhatia
17.    AHP-Based Ranking of Cloud Service Providers Conference on Information Systems Design and Intelligent Applications, pp 491-499, 2016 Rajanpreet Kaur Chahal, Sarbjeet Singh
18.    An Assessment of Intelligent Access Tools for Creating Digital Diasporas International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
19.    An Efficient and Modified Median Root Prior based Framework for PET/SPECT reconstruction Algorithm 8th International Conference on Contemporary Computing, Noida, India, 20-22 Aug. 2015, pp 1-6 Shailendra Tiwari, Rajeev Srivastava
20.    An Efficient Fuzzy Rule-Based Big Data Analytics Scheme for Providing Healthcare-as-a-Service IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 2017, pp 1-6 Anish Jindal, Amit Dua, Neeraj Kumar, A. V. Vasilakos, J.J.P.C. Rodrigues
21.    Analysis of pattern matching algorithms in network intrusion detection systems 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA),Bareilly, India,30 Sept.-1 Oct. 2016,pp 1-5 Vishwajeet Dagar, Vatsal Prakash, Tarunpreet Bhatia
22.    Analyzing Sentiments Using Twitter Through Big Data IEEE International Conference on Computing for Sustainable Global Development, New Delhi, India, 16-18 March 2016, pp 2628-2631. Monu Kumar, Anju Bala
23.    Application of bloom filter for duplicate URL detection in a web crawler IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, PA, USA, 1-3 Nov. 2016, pp 246-255 Aveksha Kapoor, Vinay Arora
24.    Application of Data Mining for high accuracy prediction of breast tissue biopsy results Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC),Moscow, Russia, 6-8 July 2016, pp. 40-45 Kaushik, Divyansh, and Karamjit Kaur
25.    Application of Rough Finite State Automata in Decision Making International Conference on Emerging Trends in Computing, 23-28, March 2017, pp 23-28 Swati Gupta and Sunita Garhwal
26.    Artificial Intelligence Based IDS in VANETS: A Review IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Ritu Rani, Tarunpreet Bhatia
27.    Auction based Resource Allocation Strategy for Infrastructure as a Service International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India,11-13 March 2016, pp 381-386 Anita Kumari and Sushma Jain
28.    Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People Elsvier Sponsored Twelfth International Conference on Communication Networks, Bangalore, India, August 19– 21, 2016 Khushdeep Kaur, Parteek Kumar
29.    Big Data Analytics based Recommender System for Value Added Services (VAS) In the proceeding of 6th International Conference on "Soft Computing for Problem Solving (SocProS 2016), pp 142-150 Inderpreet Singh, Karanvijay Singh and Sukhpal Singh
30.    Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter IEEE International Conference on Inventive Computation Technologies (ICICT 2016), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Mohit Mertiya and Ashima Singh
31.    Combining Synthetic Minority Oversampling Technique And Subset Feature Selection Technique For Class Imbalance Problem International Conference on Advances in Information Communication Technology & Computing” (AICTC ­ 2016),Bikaner, India — August 12 - 13, 2016 Pawan Lachheta, Seema Bawa
32.    Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction International Conference on Inventive Computation Technologies, ICICT 2016, pp 1-6 Nikita Tyagi and Ajay Kumar
33.    Comparative Analysis of Density based Outlier Detection techniques on Breast Cancer data Using Hadoop and Map Reduce IEEE International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-4 S. Behera and R. Rani
34.    Comparative analysis of Twitter data using supervised classifiers International Conference on Inventive Computation Technologies (ICICT),Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Rohit Joshi, Rajkumar Tekchandani
35.    Complete Survey of 3D Model Generation International Conference on Innovations in Information, Embedded and Communication Systems, 2016 K. Jain, H. S. Pannu, V. Bassi
36.    Decrypting Homomorphism 2nd International Conference on Computing, Communication, Control And Automation, Pune, India, 12-13 Aug. 2016, pp 1-6 V.Dabra, Inderveer Chana, Anju Bala
37.    Decrypting Homomorphism 2nd International conference on Computing, Control and Automation , Pune, India, 12-13 Aug. 2016, pp 1-6 Vivek Dabra, Inderveer Chana and Anju Bala
38.    Effect of Rumor propagation on the stock market dynamics using cellular automata International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-8 P. Vij and A. Kumar
39.    Efficient and Secure Message Transfer in VANET IEEE International Conference on Inventive Computer Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-5 RajeevSingh,Sumit Miglani
40.    Enhancement of Image Resolution: A Survey Communications on Applied Electronics, 2016 Dimple Mittal, HS Pannu
41.    Evolutionary Approaches For Association Rule Mining : A Survey IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems ,2016 Maninder Kaur, Aanchal Gupta
42.    Extended Change Identification System ENASE with Italy, 2016, pp 51-58 Parimala N. And Vinay Gautam
43.    Facial Recognition using Histogram of Gabor Phase Patterns and Self Organizing Maps 11th International Conference on Industrial and Information Systems (ICIIS-2016),Roorkee, India, 3-4 Dec. 2016, pp 883-889. Shailendra Tiwari, K.V. Arya, Gaurangi Upadhyay, Shambhavi Upadhyay, Poonam Sharma
44.    Fleet of Electric Vehicles for Frequency Support in Smart Grid IEEE PES General Meeting,Boston, MA, USA, 17-21 July 2016, pp 1-5 Kuljet Kaur, Mukesh Singh, Neeraj Kumar
45.    High-order fuzzy time series forecasting model for advance prediction of temperature ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Alok Tripathi, HS Pannu
46.    Improved CURE Clustering for Big Data using Hadoop and Mapreduce IEEE International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp 1-5 P. Lathiya and R. Rani
47.    Improved Grey Wolf Algorithm for Optimization Problems International Symposium on Fusion of Science and Technology, New Delhi, India, January 18-22, 2016, pp 428-433 Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra
48.    Information retrieval in web crawling: A survey International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 21-24 Sept. 2016, pp 2635-2643 Chandani Saini, Vinay Arora
49.    Intelligent Stock Data Prediction using Predictive Data Mining Techniques IEEE International Conference - ICICT, Coimbatore, India,26-27 Aug. 2016, pp 1-5 Pankaj Kumar, Anju Bala
50.    Mining Data with Categorical Attributes: A Glance IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Avneet kaur
51.    Multimedia Security through LSB Matching Proceedings of the Second International Conference on Information and Computing, Udaipur, India — March 04 - 05, 2016 Rupali Bhardwaj, V Sharma,
52.    Optical Character Recognition Using Template Matching and Back Propagation Algorithm International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Swapnil Desai and Ashima Singh
53.    Optimization of Load Balancing in Parallel Machines using Ant Colony ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, 2016 Balram Kishan, Ashima Singh
54.    Optimizing Watermark Strength in DWT-SVD based Image Watermarking Scheme for Colour Images using Dynamic-PSO, 2016. ICCCCS-2016 Nitin Saxena, K.K. Mishra and Ashish Tripathi
55.    PAFB: Privacy preserving authentication framework using bloom filter for secure vehicular communications Grace hopper Conference, 2016 Avleen Kaur Malhi
56.    Real-time Vehicle Detection and Tracking 13thInternational Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2016), Chiang Mai, Thailand, 28 June-1 July 2016, pp 1-6 K.V. Arya, Shailendra Tiwari and Saurabh Behwal
57.    Regularization based Modified SART Iterative Method for CT Image Reconstruction 9thInternational Conference on the Developments on eSystems Engineering, (DeSE-2016), Liverpool, UK, 31 Aug.-2 Sept. 2016, pp 217-222 Shailendra Tiwari, K.V. Arya, and Yadunath Pathak
58.    Regularization based Simultaneous Algebraic Reconstruction Techniques for Computed Tomography 9th International Conference on Contemporary Computing (IC3),Noida, India,11-13 Aug. 2016, pp 1-6 Shailendra Tiwari, Deepikanshu Chouksey, Vinod Todwal
59.    Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Rishika Mehta, HS Pannu
60.    Resource Scheduling in Cloud using Harmony Search IEEE conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Chandan Malik, Sukhchandan Randhawa
61.    Robot relay: An optimal path planning for multiple client service ICICT 2016, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Aastha Goel, Jhilik Bhattacharya, Anika
62.    Score Level Fusion of Iris and Fingerprint using Wavelet Features 4th International Conference on Parallel, Distributed and Grid Computing, Waknaghat, India, 22-24 Dec. 2016, pp 456-461 Shailendra Tiwari, Sudhakar, Triapathi, K.V. Arya
63.    Searching of Near Exact Duplicate Images in Cloud Database IEEE International Conference on Inventive Computation Technologies (ICICT 2016) Maneesha, Inderveer Chana
64.    Securing IoT devices using JavaScript based Sandbox International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT-2016), Bangalore, India, 20-21 May 2016, pp 1476-1482 Ayush Sahu and Ashima Singh
65.    Semantic Analysis of Big Data by Applying De-duplication techniques IEEE International Conference - ICICT, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Sanjeev Garg, Anju Bala
66.    S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks 2016 International Conference on Inventive Computation Technologies (ICICT), 2016 Aditi Hans, Ashutosh Mishra
67.    Spatial Data Analysis with ArcGIS and MapReduce International conference on Conference Computing, Communication and Automation, Noida, India, 29-30 April 2016, pp 45-49 Hari Singh and Seema Bawa
68.    Speech Secret Sharing International Conference on Innovative Research in “Civil, Computer Science, Information Technology, Mechanical, Electrical and Electronics Engineering” (CIME–2016) Shivendra Shivani, Suneeta Agarwal
69.    Student Performance Measure By using Different classification methods of data mining 2016 International conference of advanced communication, control &computing technologies Neha Chaudhary,Ashutosh Mishra
70.    Trust Based Security in Opportunistic Networks: A Survey IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Gurleen Kaur, Tarunpreet Bhatia
71.    Trust Model in cloud computing based on fuzzy logic IEEE conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 20-21 May 2016, pp 47-52 Ritu and Sushma Jain
72.    Urban Traffic State Estimation Techniques Using Probe Vehicles: A Review International Research Symposium on Computing and Network Sustainability, (IRSCNS 2016) V. Mehta and I. Chana,
73.    Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey Innovations In Information Embedded And Communication System, 2016 Robin Singla and Sunita Garhwal
74.    Vector Based Sensor Ranking in Internet of Things IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), Neha, Sharad Saxena
75.    Vector Method for Ranking of Sensors in IoT International Conference on Inventive Computaion Technologies (ICICT 2016), Coimbatore, India. (IEEE), 26-27 Aug. 2016, pp 1-5 Neha, Sharad Saxena
76.    Web services classification using machine learning models In Proc: ICEMS-2016, Jaipur National University K. C. Bhardwaj, R. K. Sharma
77.    Abstracting Communication Methodology in IoT Sensors to Eliminate Redundancy and Cycles International Conference on Advances in Computing and Data Sciences, pp. 541-549. Springer, Singapore, 2016 Sharad Saxena

Year 2015-16 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1.              Web services classification using machine learning models In Proc: ICEMS-2016, Jaipur National University, Jaipur, 17-19 March 2016 K. C. Bhardwaj, R. K. Sharma
2.              A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds 4th International Conference on Advancements in Engineering & Technology (ICAET-2016)       Sangrur, Punjab, India                  Volume 57 
March 18-19, 2016
DOI: 10.1051/matecconf/20165702008
Rajesh Kumar Ashok Kumar Anju Sharma
3.              An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET 11th IEEE International conference on Green Computing and Communications, GreenCom 2015, Sydney Australia. Amit Dua, Neeraj Kumar, and Seema Bawa
4.                  Optimal Time Dependent Pricing Model for Smart Cloud with Cost Based Scheduling. Third International Symposium on Women in Computing and Informatics (WCI "15), Indu Nair (Ed.). ACM, New York, NY, USA, 522-526. Chetan Chawla and Inderveer Chana
5.              Energy Conscious Allocation and Scheduling of Deadline-Bound Tasks in ICT Cloud Paradigm Proceeding of the International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2015), Springer International Publishing, (2015). Tarandeep Kaur and Inderveer Chana
6.              Wormhole and Sybil attack in WSN: A review Computing for Sustainable Global Development (INDIACom), 2015 2nd . S Goyal, T Bhatia, AK Verma
7.              Integrated fleet of electric vehicles as a frequency regulation agent in the grid IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-7 Rubi Rana,Kuljeet Kaur, Mukesh Singh, Neeraj Kumar, Praveen Kumar
8.              A novel smart meter for better control over devices including electric vehicles and to enable smart use of power in smart home IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 Nand Nandan Arora, Anish Jindal, Mukesh Singh, Neeraj Kumar, Praveen Kumar
9.              A novel central energy management system for smart grid integrated with renewable energy and electric vehicles IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 Sumedha Sharma, Amit Dua, Surya Prakash, Neeraj Kumar, Mukesh Singh
10  MongoDB vs SQL : A case study on electricity data International Conference on Emerging Research in Computing, Information, Communication and Applications, (ERCICA 2015), Bangalore. Jatin, Shalini Batra
11  Topic Sensitive Web Page Ranking Through Graph Database   International Conference on Emerging Research in Computing, Information, Communication and Applications 2015, pp. 519-527 Alok Gupta, Harkiran Kaur, Shalini Batra
12  Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data structure and Graph Database In 5th International Conference on Advances in Computing and Communications (ICACC-2015) IEEE, 2015 Ashish Sharma, Shalini Batra
13  XML based Wireless Patient Monitoring System using Vehicular AdHoc Networks 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), October,2015, Liverpool, UK Avleen Kaur Malhi;Shalini Batra
14  Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People Elsvier Sponsored Twelfth International Conference on Communication Networks, ICCN 2016, August 19– 21, 2016, Bangalore, India Khushdeep Kaur, Parteek Kumar
15  Effect of Rumor propagation on the stock market dynamics using cellular automata International Conference on Inventive Computation Technologies. IEEE – 2016 P. Vij and A. Kumar
16  Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction”, International Conference on Inventive Computation Technologies ICICT 2016 Nikita Tyagi and Ajay Kumar
17.            “B-cell and T-cell leukemia classification using PCA, Genetic Algorithm , ANN and SVM 3rd International Conference on Microelectronics Circuit and Systems. Sakshi Sharma and Ajay Kumar
18.          An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information and Applications, ERCICA 2015, Vol. 3, pp. 281-287 Monia Bajaj, Sukhchandan Randhawa, Sushma Jain
19.          School Bus Routing Based on Branch & Bournd Approach Computer Communication and Control (IC4), 2015,pp.1-4 Yash Kumar, Sushma Jain
20.          Auction based resource allocation strategy for infrastructure as a service 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) Anita Kumari, Sushma Jain
21.          Adaptive Word Recommender System with Fastest Data Structure for Devanagari Script IEEE International Symposium on Advanced Computing & Communication, 2015, Assam University, Silchar, Assam, India, Sep 14-15, 2015 Prem Narayan Yadav, Karun Verma
22.          Associative Memory Model for Distorted On-line Devanagari Character Recognition The Fifth International Conference on Advances in Computing and Communications (ACC-2015), 2-4 September 2015 in Kochi, Kerala, India Gaurav Pagare, Karun Verma
23.          Spam Filtering Using Hybrid Local-Global Naive Bayes Classifier International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, 10-13 Aug. 2015, SCMS, Aluva, Kochi PP 829-833 Rohit Solanki, Karun Verma, Ravinder Kumar
24.          Securing IoT devices using JavaScript based
Sandbox
International Conference on Recent Trends in Electronics, Information
& Communication Technology (RTEICT-2016), IEEE.
Ayush Sahu and Ashima Singh
25.          A novel technique of sentiment detection for
microblogging sites
IEEE-3rd International Conference on Microelectronics, Circuits
and Systems, Micro2016
Neetika Bansal, Ashima Singh
26.          A review on Sentiment Analysis using machine learning
approaches
International Conference on Inventive Computation Technologies, ICICT
2016
Neetika Bansal, Ashima Singh
27.          Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter IEEE International Conference on Inventive Computation Technologies (ICICT 2016) Mohit Mertiya and Ashima Singh
28.          Optimization of Load Balancing in Parallel Machines using Ant Colony ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, Circuits and Systems, 9-10th July, 2016, Kolkata. Balram Kishan, Ashima Singh
29.          Optical Character Recognition Using Template Matching and Back Propagation Algorithm International Conference on Inventive Computation Technologies (ICICT 2016).  Swapnil Desai and Ashima Singh
30.          Complete Survey of 3D Model Generation International Conference on Innovations in Information, Embedded and Communication Systems, vol. 4, pp. 2013-2015, March 2016 K. Jain, H. S. Pannu, V. Bassi
31.          Mining Data with Categorical Attributes: A Glance  IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Avneet kaur
32.          Evolutionary Approaches For Association Rule Mining : A Survey IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems, ,2016 Maninder Kaur, Aanchal Gupta
33.          A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems, ,2016 Maninder Kaur, Amanpreet Singh
34.          Multimedia Security through LSB Matching   Proceedings of the Second International Conference on Information and Computing, March 2016 Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
35.          A lossless Data Hiding method based on inverted LSB technique Third International Conference on Image Information Processing, Dec 2015 Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
36.          Enhanced the security of image steganography through image encryption 2015 Annual IEEE India Conference (INDICON Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
37.          Interpolation based Reversible Data Hiding Scheme for Digital Images   21st Western Canadian Conference on Computing Education, May 06-07, 2016, Kamloops, BC, Canada Singara Singh Kasana and Pankaj Garg
38.          Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey Innovations In Information Embedded And Communication System Coimbatore ,India,17th-18th  March,2016 pp.349-353 Robin Singla and Sunita Garhwal
39.          Application of Rough Finite State Automata in Decision Making International Conference on Emerging Trends in Computing Nasik, India,10th-11th June, 2016 Swati Gupta and Sunita Garhwal  
40.          Real Time Hand Gesture Recognition Based Interface for Microsoft Word Document Handling Advances in Intelligent Systems and Computing Series,Springer,2015 Kapil Yadav and Jhilik Bhattacharya
41.          Encoded Scene Panorama based Information Flow in a Multi Agent System Advances in Intelligent Systems and Computing Series, Springer,2015. Sachin Meena and Jhilik Bhattacharya
42.          Optimized Virtual Honeynet withImplementation of Host machine as Honeywall 12th IEEE International Conference, INDICON, 2015 Gautam, R., Kumar. S, & Bhattacharya J
43.          SMS Spam Detection for Indian Market IEEE International Conference on Next Generation Computing Technologies NGCT 15, Dehradun Sakshi Aggarwal, Sanmeet Kaur  
44.          Antispammer for Mobile Messages, ICCCT "15 Sixth International Conference on Computer and Communication Technology, Allahabad, India, Sep 2015, Sakshi Aggarwal, Sanmeet Kaur  
45.          A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm Poster presentation at Security and Privacy Symposium 2016, Feb 13, 2016 in IIIT Delhi.    Rohini Rajpal, Sanmeet Kaur
46.          Loan approval prediction based on machine learning approach National conference on recent trends in computer science and information technology(NCRTCSIT2016,Apr 2016 Arun Kumar, Ishan Garg, Sanmeet Kaur
47.          Software Perspective to Underwater Acoustic Sensors Network International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 187-191, NGCT-2015 (IEEE) Ghanshyam Maurya, Himanshu Jindal, Sharad Saxena
48.          Intrusion Detection System based on Software Defined Network Firewall International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 379-382, NGCT-2015 (IEEE). Mohd. Abuzar Sayed, Sharad Saxena
49.          Health Demolition via Social Websites and E-Contents Addiction Shannon100, LPU, Phagwara. (SCOPUS) Sharad Saxena, Vishnu Shankar, Deepak Mehta, Shilpi Saxena
50.              Vector Based Sensor Ranking in Internet of Things IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), Chennai, India. (SCOPUS) Neha, Sharad Saxena
51.          A New Conception of Information Requisition in Web of Things Shannon100, LPU, Phagwara. (SCOPUS) Avaneesh K Yadav, Sharad Saxena
52.          Automated Leukaemia Detection Using Microscopic Images Procedia Computer Science, Volume 58, 2015, Pages 635-642 Ashutosh Mishra, Nimesh Patel
53.          Student Performance Measure By using Different classification methods of data mining 2016 International conference of advanced communication, control &computing technologies Neha Chaudhary,Ashutosh Mishra
54.          S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks 2016 International Conference on Inventive Computation Technologies (ICICT)   Aditi Hans, Ashutosh Mishra
55.          Improved Grey Wolf Algorithm for Optimization Problems International Symposium on Fusion of Science and Technology, New Delhi, 2016, pp. 428-433 Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra
56.          Effective Test Case Generation for Load Testing of Web Server using River Formation Dynamics. International Conference on Electrical, Electronics, Computer Science, Management and Mechanical Engineering under International Institute of Technology and Research. Gurleen Kaur and Rupinderdeep Kaur
57.          Implementation of Phonetic Level Speech to text Recognition System for Punjabi Language. International Conference on Data Science and Engineering. (IEEE), DTU, 13th august, 2016 Shama Mittal, Rupinderdeep Kaur
58.          An Assessment of Intelligent Access Tools for Creating Digital Diasporas   International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, Feb. 24-26, 2016. Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
59.          Trust Based Security in Opportunistic Networks: A Survey IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 634-638. Gurleen Kaur, Tarunpreet Bhatia
60.          Artificial Intelligence Based IDS in VANETS: A Review IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 561-566. Ritu Rani, Tarunpreet Bhatia
61.          A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 639-644. Mannat Aneja, Tarunpreet Bhatia
62.          AHP-Based Ranking of Cloud Service Providers Conference on Information Systems Design and Intelligent Applications, Springer,8th-9th January, 2016, pp 491-499 Rajanpreet Kaur Chahal, Sarbjeet Singh
63.          Fuzzy Logic and AHP based Ranking of Cloud Service Providers Conference on Computational Intelligence in Data Mining, Springer, 5th-6th December, 2015, pp 337-345 Rajanpreet Kaur Chahal, Sarbjeet Singh
64.          A review - Fuzzy Time Series Forecasting Model ICIIECS"16. Alok Tripathi, HS Pannu
65.          High-order fuzzy time series forecasting model for advance prediction of temperature ICICT2016   Alok Tripathi, HS Pannu
66.          Enhancement of Image Resolution: A Survey Communications on Applied Electronics (CAE) July 2016. Dimple Mittal, HS Pannu
67.          Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD ICICT 2016 Rishika Mehta, HS Pannu

Year 2014-15 Conferences

Publication of papers in conference proceedings and other publications

SNO Title of the Thesis Name of the conference with venue, date and year, page nos. Name of the authors
1 Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine International Conf on Systems Engineering 330; pp.747-53; 2014 UNLV, USA, Springer Int Publishing Karun Verma; R K Sharma
2 Offline Handwritten Gurmukhi Character Recognition System using RBF-SVM International Workshop on Doc Analysis and Recognition; 2014; IISc Bengaluru Munish Kumar;MK Jindal; R K Sharma
3 Performance Analysis of NoSQL Databases having Hadoop Integration International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, 1-2 Aug, 2014 Aayush, Seema Bawa
4 Experimental Comparison of Three Scheduling Algorithms for Energy Efficiency in Cloud Computing IEEE International Conference of Cloud Computing in Emerging Markets (CCEM), 2014.pp:1-6, DOI: 10.1109/CCEM .2014. 7015491 Goyal, S.; Bawa, S.; Singh, B
5 An opportunistic cross layer design for efficient service dissemination over flying ad hoc networks (FANETs)." - In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, Coimbatore, pp. 1551-1557. IEEE,  Feb.-2015. Vishal Sharma Rajesh Kumar
6 A Secure Opportunistic service dissemination       over Flying Ad Hoc Networks. ACM security Symposium , IIT Delhi Feb. 2015 Vishal Sharma Rajesh Kumar
7 Multilingual text summarization with UNL   International Conference on Advances in Computer Engineering and Applications (ICACEA), March 2015. Sherry, Parteek Bhatia, 
8 Adaptive probabilistic skip graph IEEE International Advance Computing Conference, June 2015 Amit Goyal, Shalini Batra
9 Progressive Alignment using Shortest Common Supersequence  International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1113-1117, September 24-27, 2014 Ankush Garg, Deepak Garg
10 Bootstrap Sequential Projection Multi Kernel Locality Sensitive Hashing International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 213-218 September 24-27, 2014 Harsham Mehta, Deepak Garg
11 Maximal pattern matching with flexible wildcard gaps and one-off constraint  International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 1107-1112 September 24-27, 2014 Anu Dahiya, Deepak Garg
12 Applying Data Mining Techniques in Job Recommender System for Considering Candidate Job Preferences International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1458-1465 Anika Gupta, Deepak Garg
13 Evaluating Quality Score of New Advertisements International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.13-17 September 24-27, 2014) Sohil Jain, Deepak Garg
14 Multistage learning model for better learning: A cognitive science perspective 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), at Thapar Institute of Engineering & Technology, Patiala IEEE Xplore 386 - 389 on December 19-20, 2014 Shivani Goel, Deepak Garg
15 Variable Bid Fee: An Online Auction Shill Bidding Prevention Methodology 5th IEEE International Advance Computing Conference (IACC- 2015) at BMS College of Engineering, Bengaluru, Karnatka, India IEEE Xplore pp. 381-386 June 12-13, 2015 Dhanmeet Kaur, Deepak Garg
16 Wormhole and Sybil Attack In WSN: a Review   INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development,  pp. 216-220, 2015. arnumber=7100491 Svarika Goyal, Tarunpreet Bhatia and A.K.Verma,
17 Jellyfish Attack in MANETs: A Review” IEEE International Conference On Electrical, Computer and Communication technologies (ICECCT),SVS College of Engineering, Coimbatore, Tamilnadu , India, pp. 1373-1377, 2015. Kaur Simran, Kaur Rupinderdeep, Verma A.K,
18   Preventing Faults: Fault Monitoring and Proactive Fault Tolerance in Cloud Computing ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. Anu and Anju Bala
19 Multi-level Priority   Based Task Scheduling Algorithm for Workflows in Cloud Environment ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. Dr. Anju Bala and Dr. Inderveer Chana
20 Heart Disease Prediction Model in Cloud Environment ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series.

Anju Bala, Shikhar Malhotra, Nishant Gupta and Naman Ahuja

21 Fingerprint recognition password scheme using BFO International Conference on Advances in Computing, Communications and Informatics (ICACCI, Sept. 2014 ), pg 1942-1946 Harpreet Singh, Brar; V. P. Singh
22 Detection of alphanumeric shellcodes using similarity index International Conference on Advances in Computing, Communications and  Informatics (ICACCI, Sept. 2014 ), pg 1573-1577 Nidhi Verma;Vishal Mishra and V. P. Singh
23 A 3 level model for implementing MOOC in India 2nd IEEE International Conference on MOOCs Innovation and Technology in Education (IEEE-MITE 2014), Thapar Institute of Engineering & Technology, Patiala pp. 132-137 Aman Sharma, Rinkle Rani
24 Analysis and Visualization of Twitter Data using R   The 1 st International Conference ‘INBUSH ERA 2015’ Theme: Futuristic trends in computational analysis and knowledge management Amity University Greater Noida On 25 - 27 February, 2015 Aman Sharma, Rinkle Rani
25 IoT solutions for 3-D visualization of Twitter data IEEE IACC-2015BMS College of Engineering, Bangalore 12-13 June, 2015 pp. 839-843 Aman Sharma, Rinkle Rani
26 Analysis and Visualization of Professional’s LinkedIn Data   Springer International Conference on Emerging Research in Computing, Information, Communication and Applications Nitte Meenakshi Institute of Technology, Bangalore ERCICA-2015 31 July - 01 August, 2015 pp. 1-9 Puneet Garg Rinkle Rani Sumit Miglani
27   Big Data: An Introduction, Challenges & Analysis using Splunk   International conference on Advances in Computer Science and Information Technology (ACSIT), pp. 464-468, April 2015. Satyam Gupta, Rinkle Rani
28 Performance analysis of LEACH and its variants Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, IEEE, Karpagam College of Engineering, Coimbatore, 26-27th Feb, 2015, pp. 630-634. Simmi Kansal, Tarunpreet Bhatia, Shivani Goel
29 Trust based energy efficient routing in LEACH for wireless sensor network Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE, Noorul Islam University, Tamil Nadu 23-24th April, 2015, pp. 361-365.   Arzoo Miglani, Tarunpreet Bhatia, Shivani Goel
30 Intelligent Agent in Scheduler Cum Emailer Application Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE, Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 260-266(Elsevier). Rupal Bansal, Shivani Goel
31 Speech Emotion Classification using EEMD, SVM and ANN Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE , Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 336-341(Elsevier) Manisha, Shivani Goel
32 Multistage Learning Model for Better Learning: A Cognitive Science Perspective IEEE international Conference on MOOC, Innovation and Technology in Education 2014, Organized by Thapar Institute of Engineering & Technology, Patiala, Dec 19-20, 2014, pp. 386-389 Shivani Goel, Deepak Garg
33 A Comprehensive Study on Clustering Approaches for Big Data Mining International Conference on Electronic and Communication Systems (ICECS), organized by Karpagam College of Engineering, Coimbtore, 26-27th Feb, 2015, pp. 1333-1338 Divya Pandove, Shivani Goel
34 A Model for Predicting the Eligibility for Placement of Students Using Data Mining Technique International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 114-117 (IEEE Explore) Mansi Gera and Shivani Goel
35 CSAAES: An Expert System for Cyber Security Attack Awareness International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 242-245, IEEE Explore Cheshta Rani and Shivani Goel
36 Challenges and Issues in Underwater Acoustics Sensor Network International Conference on Parallel Distributed and Grid Computing (PDGC2014), December 11-13, 2014, Solan, pp 251-255 Himanshu Jindal, Sharad Saxena, Singara Singh Kasana
37 A Noval Image Zooming Approach using Wavelet Coefficients Recent Cognizance in Wireless Communication & Image Processing (ICRCWIP2014), January 16-17, 2015, Jaipur.  Himanshu Jindal, Singara Singh Kasana, Sharad, Saxena
38   Tree Based Energy Efficient Routing Scheme for Body Area Network International Conference on Advances in Computer Engineering and Applications (ICACEA, IMS Engineering College, Ghaziabad, India, March 2015,pp.140-147 Priya Juneja and Sushma Jain
39 Fuzzy Based Expert System for Diabetes Diagnosis and Insulin Dosage Control International Conference on Computing, Communication and Automation (ICCCA), Galgotias University, Noida, 2015, pp. 262-267 Neeru Lalka and Sushma Jain
40 Selecting a set of appropriate metrics for detecting code clones 2014 Seventh International Conference on Contemporary Computing (IC3),Noida, Aug. 7, 2014 to Aug. 9, 2014, pp. 484-488. Geetika Bansal ,Rajkumar Tekchandani
41 An approach to rank code clones for efficient clone management 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bangalore, 10-11 Oct. 2014, 1 - 5 R.Garg, Rajkumar Tekchandani
42 A Hybrid Approach to Detect Code Clones In Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), India, August 2014. Surbhi Sonika , Rajkumar Tekchandani
43 Enhanced MFCC algorithm using look up table and Kaiser window Proceedings of Second IRF International Conference on 10th August 2014, Cochin, India, pp.144-149. Vikram Ojha, Rajkumar Tekchandani.
44 Automated Leukaemia Detection Using Microscopic Images Procedia Computer Science, Volume 58, 2015, Pages 635-642 Ashutosh Mishra, Nimesh Patel
45 Multi agent paradigm used to complexity measure for perfective software maintenance Computer Science and Engineering (APWC on CSE), 2014 Asia-Pacific World Congress, Fiji, 2014. IEEE Xplore: DOI: 10.1109/APWCCSE.2014.7053834 Ashutosh Mishra, Vinayak Srivastava
46 Securing mobile agent"s information in ad-hoc network CONFLUENCE-2014 pp. 442-446, (IEEE), Amity University, Noida Jasleen Kaur, Sharad Saxena, Mohd Abuzar Sayeed
47 Challenges and issues in underwater acoustics sensor networks: A review International Conference on  Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan Jindal Himanshu, Saxena Sharad, Singh Singara
48 Acoustic communication characteristics in UWDBCSN International Conference on  Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan Saxena Sharad, Mehta Deepak, Kaur Jasminder, Jindal Himanshu
49 A Survey- Academic Demolition via Internet Addiction 2nd International Conference on Computing for Sustainable Global Development (INDIACom-2015), pp 210-215 (IEEE), Bharti Vidyapeeth, New Delhi Vishal Kohli, Sharad Saxena, Jagdish Patni
50 Dependncy Mapper and ACO based Efficient Job Scheduling and Load Balancing in Green Clouds IC3I, Mysore, Nov.27-29 Supriya Kinger, Anju Sharma
51 SQL2Neo: Moving Health-care Data from Relational to Graph Databases Advance Computing Conference (IACC), 2015 IEEE International , vol., no., pp.721,725, 12-13 June 2015
doi: 10.1109/IADCC.2015.7154801  
Manpreet Singh, Karamjit Kaur  
52 Integration of heterogeneous databases Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in, vol., no., pp.1033,1038, 19-20 March 2015 doi: 10.1109/ICACEA.2015.7164859 Binny Garg, Karamjit Kaur
53 Jellyfish Attack in MANETs: A Review ICECCT 2015, Coimbatore (IEEE) Simranpreet Kaur, Anil Kumar Verma, Rupinderdeep Kaur
54 A Context Sensitive Thresholding Technique for Automatic Image Segmentation   ICCIDM 2014 Conference, VSSUT, Odhisa, India, December 20-21(2014),Computational Intelligence in Data Mining - Volume 2,Smart Innovation, Systems and Technologies Volume 32, 2015, pp 19-25 Anshu Singla, Swarnajyoti Patra.
55 Bringing closer to the Cultural Roots through Cultural Computing: Detailed Analysis of movie ‘Chaar Sahibzaade’ National Conference on Advances in Engineering, Technology & Management (AETM’15) MMU Ambala, 4th April 2015, pp 09-14 Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
56 Topic sensitive web page ranking through. Graph database  Third International conference on emerging research in computing, information, communication and applications ercica-2015, NITTE Meenakshi Institute of Technology Yelahanka, bangalore-560 064. India, 31st July 2015, pp 519-527 Alok Gupta, Harkiran Kaur, Shalini Batra
57 Wormhole and Sybil Attack in WSN: A Review INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, Bharati Vidyapeeth, New Delhi, 11 – 13 March 2015. pp. 166-170. Svarika Goyal, Tarunpreet Bhatia, A.K Verma
58 A Hybrid Approach for Data Clustering using Expectation-Maximization and Parameter Adaptive Harmony Search Algorithm. International Conference on Future Computational Technologies,Singapore, 2015, pp.61-67. Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
59 Swarm Intelligence and Flocking Behaviour ICAET-2015, BGIET, Sangrur, Date: 20-21 March 2015, Paper ID:183 Himani , Ashish Girdhar
60 Chapter titled “Trust Calculation using Fuzzy Logic in Cloud Computing” Book titled “Handbook of Research on Security Considerations in Cloud Computing” Ms. Rajanpreet Kaur Chahal, Dr. Sarbjeet Singh

Year 2013-14 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 Performance Analysis of NoSQL Databases having Hadoop Integration International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier,, 1-2 Aug, 2014. Aayush, Seema Bawa
2 Review of virtual machine selection and migration techniques International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, 1-2 Aug, 2014. C. Kaur and S. Bawa
3 Designing URL Access Counter using MapReduce with HBase Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Baljit Kaur and Rinkle Rani
4 Transforming Relational Database to Graph Database Using Neo4j Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Mehak Gupta and Rinkle Rani
5 Security Issues and User Authentication in MongoDB Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. P. Aggarwal and R. Rani
6 Performance comparison of System using  MongoDB-Redis vs System using Relational Database Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Yogesh Punia,Rinkle Aggarwal
7 Collaborating Trust and Item-prediction with Ant Colony for Recommendation System Seventh International Conference on Contemporary Computing (IC3)-2014 IEEE, 2014 A. Kaleroun and S. Batra
8 “Resolving Issue of Lexical Disambiguation using WordNet First International Conference on Networks & Soft Computing(ICNSC-2014), IEEE, 2014 Swati Kukreja and Shalini Batra
9 An Improved Approach for Solving 0/1 Knapsack Problem In Polynomial Time Using Genetic Algorithms IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur India, May 09-11, 2014(to be published in IEEE Explore) C. Sachdeva, S. Goel
10 Expert System and Its Requirement Engineering Process IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur India, May 09-11, 2014(to be published in IEEE Explore) M. Aggarwal, S. Goel
11 Speech Emotion Classification using EEMD, SVM and ANN 2nd International Conference on Emerging Research in Computing, Information, Communication and Application-ERCICA2014, Bangalore, August 2-3, 2014 (Sponsored by Elsevier) M. Chauhan, S. Goel
12 Intelligent agent in scheduler cum emailer application 2nd International Conference on Emerging Research in Computing, Information, Communication and Application-ERCICA2014, Bangalore, August 2-3, 2014 (Sponsored by Elsevier) R. Bansal, S. Goel
13   An Improved Algorithm for Data Hiding using DNA Sequence and Central Dogma of Molecular Biology International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14)   Ravi gupta, Ajay Kumar
14 Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Third International Symposium on Intelligent Informatics (ISI"14), Springer, 2014.[Accepted] Kriti Chadha and  Sushma Jain
15 Impact of Black Hole and Gray Hole attack in AODV Protocol   International Conference on Recent Advances and Innovations in Engineering” ,IEEE,2014. [Accepted]   Kriti Chadha and  Sushma Jain  
16 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 International Journal of Computer Applications (IJCA) Supriya Singla and  Sushma Jain
17 Energy Efficient Protocol for Wireless Sensor Network International Conference on Recent Advances and Innovations in Engineering” ,IEEE,2014. [Accepted] Mandeep Singh Bhandral and  Sushma Jain
18 “2014 Testing Trend is not purely Adhoc:Exploratory Testing Algorithmic Design and Metrics Implementation” in Proc. Elsevier International conference on emerging research in computing, information, communication and applications, 1 August 2014 Nishtha Hooda Vinod K Bhalla
19 Proposed Approach and Algorithm for estimating the cyclomatic complexity in object-oriented programming IEEE International conference on computer, Communication and control Technology, Langkawi, Kedah, Malaysia, 2-4 Sep2014[Accepted] Ankita Garg Vinod K Bhalla  
20 Novel Approaches for increasing energy efficiency in WSNs IEEE First international conference on networks and soft computing, IEEE(ICNSC-2014), 2014[Accepted] Omkar Taneja Vinod K Bhalla
21 Efficient Regression Test Selection and Recommendation Approach for Component Based Software IEEE International Conference on Advances in Computing, Communications and Informatics – ICACCI-14, Noida Janhavi Puniani,Ashima Singh
22 Load Balancing Issues, Techniques and Challenges in Cloud Computing  Elsevier proc. of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), 2014 Gurpreet Singh Bedi, Ashima Singh,
23 IEEE Grey Testing Support in Software Repository with Keyword based Extraction  IEEE International Conference on Advances in Computing, Communications and Informatics – ICACCI-14, Noida Inderjit Singh, Ashima Singh
24 A Survey on various Component Repositories with Detail Study of different Methods and Extraction of Components IEEE International Conference on Advances in Electronics Computers and CommunicationsICAECC-14, Banglore   Inderjit Singh, Ashima Singh
25 Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine International Conference on Systems Engineering 2014, Las Vegas, Nevada, August 19-21, 2014 Karun Verma, R. K. Sharma
26 HMM based Punjabi Speaker Independent Isolated Word Speech To Text Conversion Using HTK International Conference on Emerging Research In Computing, Information, Communication And Applications’ - Ercica-2014, August 01-02, 2014 Karun Verma, Shweta
27 Sign Recognition Using Support Vector Machine International Conference on Emerging Research In Computing, Information, Communication And Applications’ - Ercica-2014, August 01-02, 2014 Karun Verma, Shama
28 An Approach for Frequent Access Pattern Identification in Web Usage Mining. IEEE Conference ICACCI-2014, Delhi       M. M. Sharma and Anju Bala  
29 A Modified K-Means Clustering Approach for High Dimensional Data     ICAECC 2014,oct 10-11,Banglore  V. Sharma and A.Bala                 
30 Deadlock detection with dependence graph due to wait-notify dependency in multithreaded programs Second International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), Bangalore, India, Elsevier, 2014 Vipin Verma, Aman Jyoti and Vinay Arora
31 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012.   Ashutosh Mishra and Vinayak Srivastava
32 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012.   Ashutosh Mishra and Vinayak Srivastava
33 Source code comprehension using data mining methods National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012   Ashutosh Mishra and Vinayak Srivastava
34 Multi Agent Paradigm for Software Maintenance National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011.   Ashutosh Mishra and Vinayak Srivastava
35 K-means and its variants in Cloud data mining : A comparative Analysis 5th International Conference Confluence 2014 on Cloud Security and Big Data, IEEE, 2014 Ashish Aggarwal,Damandeep Kaur,Deepti Mittal
36 Cost Model for Software as a Service    Confluence 2014, Amity University   Tript Kaur, Ashish Aggarwal and Dr. Damandeep Kaur
37 Design and Implementation of Mobile SMS Categorization Second International Conference in Emerging Research in Computing, Information, Communication and Applications – ERCICA 2014, Bangalore, August 1-2, 2014(Sponsored by Elsevier). Anamika Arya, Rupinderdeep Kaur
38 Efficient Emotion Recognition System based on Classifier Second International Conference in Emerging Research in Computing, Information, Communication and Applications – ERCICA 2014, Bangalore, August 1-2, 2014(Sponsored by Elsevier). Rohit Katyal, Rupinderdeep Kaur

Year 2012-13 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information, Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013 
Kottayam, Kerala, India
Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods , Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava      
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhaw

Year 2017-18 (Non-SCI)

List of research publications in Non-SCI journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.    Trust Models in Cloud Computing: A Review  International  Journal of Wireless and Microwave Technologies, Vol. 7, No. 4, pp. 14-27, 2017 Ritu, Sukhchandan Randhawa, Sushma Jain
2.        A Comparative Analysis of Optimization Solvers. Journal of Statistics and Management Systems,20 (4), pp.623-635,2017 Rimmi Anand, Divya Agarwal and Vijay Kumar
3.        A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks Recent Patents on Engineering, vol 11, 2017 Tarunpreet Bhatia, A.K. Verma, Gaurav Sharma, Suman Bala
4.        A review on Data mining based Intrusion Detection Systems "International Journal of Control Theory Applications",2017 Vidhi, Rajanpreet Kaur Chahal, Niyati Baliyan
5.        A Survey on Scheduling techniques in Cloud Computing International Journal of Recent Trends in Engineering and Research (IJRTER) journal,vol. 3, no. 7, pp. 303-311,2017 Pratisha Sharma, Dr. InderveerChana and Dr. AnjuBala
6.        A Variational framework for low dose sinogram restoration Int. J. Biomedical Engineering and Technology (IJBET), Vol 24, No. 4, Pp356-367, 2017 Shailendra Tiwari
7.        An Automatic Leaf Disease Detection System for Legume Species Journal of Biology and Today"s World, 6(6), 115-122, 2017 Sukhvir Kaur, Shreelekha Pandey, Shivani Goel
8.        An Energy Efficient and Trust Aware Framework for Secure Routing in Leach for Wireless Sensor Networks Scalable Computing: Practice and Experience, 207-218 & 17, 2017 Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava
9.        An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor  Scalable Computing: Practice and Experience, 2017 Miglani, Arzoo, Tarunpreet Bhatia, Gaurav Sharma, and Gulshan Shrivastava
10.    Android GUI testing and tools International Journal of Research in Computer Science (IJRCS),Volume 04, Issue 2 Paper 22, ISSN no. 2349-3828, Page No. 97-99, 2017 Sumit Pal, Ashish Aggarwal
11.    Application wise Annotations on Intelligent Database Techniques Journal for Research, 19-21, Vol. 3 Issue 10, 2017 Supreet Kaur, Harkiran Kaur
12.    Commentary Upon Role of Neural Networks in Supervised Machine Learning International Journal of Advanced in Management, Technology and Engineering Sciences,160-166, Vol. 7 Issue 12, 2017 Palak Bansal, Harkiran Kaur
13.    Comparing UWDBCSN Clustering with LNCA for Node Replication Attack Journals of Mobile Computing, Communication & Mobile Networks, 41-49, (4), 2017 Harpreet Kaur, Sharad Saxena
14.    COMPREHENSIVE REVIEW OF AES AND RSA SECURITY ALGORITHMS IN CLOUD COMPUTING Global Journal of Engineering Science and Research Management ,63-68, 4(12), 2017 Shubham Kansal, Harkiran Kaur
15.    Design of Reliable Capacitated Facility Protection in Distribution Centres Procedia Computer Science, 115, pp.312-321 , 2017 Rimmi Anand, and Vijay Kumar
16.    Grey Wolf-based Clustering Technique. Journal of Intelligent Systems, Vol. 26(1), pp.153-168, 2017 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
17.    Investigative Analysis on Data Mining Techniques Journal for Research, 32-34, Vol. 3 Issue 10, 2017 Kartik Jaitly, Harkiran Kaur
18.    Mobile Agent Based Communication using AES and RSA Journal of Multimedia Technology & Recent Advancements, 6-16, (4), 2017 Mandeep Kaur, Sharad Saxena
19.    Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms Journal of Intelligent Systems,Vol. 26(3), pp.483-503, 2017 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
20.    STAR: SLA-aware Autonomic Management of Cloud Resources IEEE Transactions on Cloud Computing, 2017 Sukhpal Singh, Inderveer Chana and Rajkumar Buyya
21.    Prediction of Sentiment from Macaronic Reviews Informatica: An International Journal of Computing and Informatics, vol.42, no. 1, pp. 127-136, 2018 Sukhnandan Kaur, Rajni Mohana
22.    An Allotment of H1B Work Visa in USA using Machine Learning International Journal of Engineering & Technology, 2018 Pooja Thakur, Mandeep Singh, Harpreet Singh,Prashant Singh Rana
23.    An effective approach for semantic-based clustering and topic-based ranking of web documents JDSA, Springer, 1-16, Vol 5 (issue 2)2018 R.K.Roul
24.    An effective topic-based ranking technique for categorised research articles IJCSE, Inderscience, 35-45, Vol 4(issue 1),2018 R.K.Roul, J.K.Sahoo
25.    An improved hybrid illumination normalization and feature extraction model for face recognition International Journal of Applied Pattern Recognition, 2018 Jyotsna Yadav, Navin Rajpal, Rajesh Mehta
26.    Complex Diffusion Regularization based Low dose CT Image Reconstruction Int. J. Biomedical Engineering and Technology , Inderscience, 2018 Kavkirat Kaur, Shailendra Tiwari
27.    Detecting spam web pages using multilayer ELM IJBDI, Inderscience,49-61, Vol 5(issue 2), 2018 R.K.Roul
28.    Evolving state grammar for modeling DNA and RNA structures International Journal of Engineering & technology, 2018 Ajay Kumar, Nidhi kalra and Sunita Garhwal
29.    Fingerprint image enhancement techniques : A survey International journal of innovations and advancement in computer science (IJIACS),Volume 7,Issue 3, 2018 Monty singh and Ashish Girdhar
30.    Statistical Dimension Identification and Implementation for Student Progression System INTERNATIONALJOURNAL OFINNOVATIVETECHNOLOGY ANDCREATIVEENGINEERING,VOL.8 NO.5 pp. 480-484, 2018 Harkiran Kaur, Aanchal Phutela
31.    Implementing Fuzzy Technique to Expert System - A Case Study on Salt Analysis International Journal of Applied Engineering Research, Volume 13, Number 11 pp. 9474-9479, 2018 Kriti Asija, Harkiran Kaur

Year 2016-17 (Non-SCI)

List of research publications in Non-SCI journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Android Application for Mobile Customers using Speech Synthesis. International journal of Computer Applications,Volume: 145 number2, Page Nos:18-25, 2016 Keshav Rana, Rupinderdeep Kaur
2.        An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information, Communication and Applications, pp 281-287,2016 Monia , Sukhchandan Randhawa, Sushma Jain
3.        An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs International Journal of Artificial Intelligence and Knowledge Discovery,Vol. 6, pp. 1-7,2016 Vinay Arora, Rajesh Bhatia, Maninder Singh
4.        Application of I.T. in Healthcare: A Systematic Review ACM, SigBio Record Newsletter,Article no. 2,2016 Rashmeet Toor and Inderveer Chana
5.        Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29,2016 Geeta Kasana,Kulbir Singh and Satvinder Singh
6.        Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks International Journal in Foundations of Computer Science & Technology (IJFCST),ISSN:1839-7662, Vol. 6 (2), pp. 1-21 Anju Bhandari and V. P. Singh
7.        Data Clustering Using Differential Search Algorithm Journal of Science and Technology,Vol. 24(2), pp. 295-306,2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
8.        Design and Development of CLI for SleuthKit: A Cyber Forensics Framework "International Journal of Scientific and Research Publications",Volume 6 Issue 1,2016 Dilpreet Singh Bajwa, Gurpal Singh Chhabra
9.        Fuzzy Logic Based Intrusion Detection Scheme against DoS Attack in MANET International Journal of Research in IT, Management and Engineering, vol. 6, pp. 21-27,2016 Sakshi Gautam, Suveg Moudgil, Tarunpreet and Bhatia
10.    Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain British Journal of Applied Science &Technology,Vol. 14, No.4, pp. 21-29,2016 Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh.
11.    Impact Analysis of Software Processes for SPI in Indian SMEs International Journal of Applied Engineering Research,ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011 Singh, A. & Aggarwal, H.
12.    Implementation of Word Level Speech Recognition System for Punjabi Language International journal of Computer Applications, Volume: 146 number 3, Page Nos:12-17,2016 Shama Mittal, Rupinderdeep Kaur
13.    Intensification of Resolution in the Realm of Digital Imaging International Journal of Computer Engineering In Research Trends, vol. 6,2016 Shivangi Jindal, and Harkiran Kaur
14.    PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks Journal of Internet Services and Information Security (JISIS),volume: 6, number: 1 (February 2016), pp. 47-56 Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao
15.    Performance Analysis of LEACH with Machine Learning Algorithms in Wireless Sensor Networks International Journal of Computer Applications,Vol. 147, No. 2 , pp. 7-12,2016 Sukhchandan Randhawa, Sushma Jain
16.    Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) Quantum Matter, American Scientific Publishers, 5(3):1-8,2016 Y Pathak, K Sharma, K Singh and PS Rana
17.    Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, 137 (9), 27-30,2016 Sharma, S., Bawa, S. and Lomash, H
18.    Proposal and Implementation of MPLS Fuzzy Traffic Monitor (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1,2016 Anju Bhandari and V. P. Singh
19.    Towards measurement of structural complexity for ontologies "International Journal of Web Engineering and Technology",11, 153,2016 Niyati Baliyan and Sandeep Kumar
20.    Various Approaches of Community Detection in Complex Networks: A Glance Journal of Information Technology and Computer Science, Vol. 8,  PP.35-41,2016 Maninder Kaur,Abhay Mahajan
21.    Visualizing Class Diagram Using OrientDB Data-Store International Journal of Innovative Science, Engineering & Technology,Vol. 3 Issue 6, 341-345, 2016 Sawinder Kaur, Karamjit Kaur
22.    Volatile Memory Forensics: A Legal Perspective "International Journal Of Computer Application", 155(3),11-15, 2016 HarnoorKaur Mann, Gurpal Singh

Year 2015-16 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, March 2016, 137 (9), 27-30. Sharma, S., Bawa, S. and Lomash, H
2 QoS based Workload Design Patterns in Cloud Computing: A Literature Review International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). Sukhpal Singh and Inderveer Chana
3 Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing I. J. Computer Network and Information Security, 2015, 11, 9-19 Chetan Chawla, and Inderveer Chana
4 QoS based Machine Learning Algorithms for Clustering of Cloud Workloads: A Review International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). Sukhpal Singh and Inderveer Chana
5 Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks InJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Volume: 6 Issue:3 Page No. 54-72 Year: 2015 Vishal Sharma Rajesh Kumar
6 Green WSN- Optimization of Energy Use Through Reduction in Communication Workload. CoRR abs/1506.04849 (2015) Vandana Jindal, A. K. Verma, Seema Bawa:
7 Survey on Query Processing & Optimization Techniques in WSN International Journal of Computer Science and Information Security 14 (2), 54 V Jindal, AK Verma, S Bawa
8 QoS Comparison of MANET Routing Protocols International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. T Bhatia, AK Verma
9 A Survey to Automatic Summarization Techniques International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015. Sherry, Parteek Kumar
10 Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks International Journal in Foundations of Computer Science & Technology (IJFCST), ISSN:1839-7662, Vol. 6 (2), pp. 1-21, March, 2016 Sukhpal Singh and Inderveer ChanaAnju Bhandari and V. P. Singh
11 Proposal and Implementation of MPLS Fuzzy Traffic Monitor (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, 2016 Anju Bhandari and V. P. Singh
12 Comparative Study of Type-1 Fuzzy Logic and Type-2 Fuzzy Logic International Journal of Computer Applications Volume 124 – No.16, August 2015, pp. 14-21 Neeru Lalka, Sushma Jain
13 A Systematic Review on Energy Aware QoS Routing in Wireless Sensor Networks International Journal of Energy, Information and Communications Vol.6, Issue 5 (2015), pp.1-14 Sukhchandan Randhawa, Sushma Jain
14 Video Search Engine Optimization Using Keyword and Feature Analysis Procedia Computer Science 58 ( 2015 ) 691 – 697, ScienceDirect, Elsevier Krishna Choudharia , Vinod K Bhalla
15 Strucutal Modeling on PSiOS Innovative Research in Computer Science,E-learning information, 2015 Jay Patel , Ashish Aggarwal
16 Various Approaches of Community Detection in Complex Networks: A Glance Journal of Information Technology and Computer Science, Vol. 8, PP.35-41,2016 Maninder Kaur,Abhay Mahajan
17 An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs International Journal of Artificial Intelligence and Knowledge Discovery, Vol. 6, pp. 1-7, 2016 Vinay Arora, Rajesh Bhatia, Maninder Singh
18 Techniques, Trends & Challenges For Localization In Vehicular Ad Hoc Networks Asian Journal of Mathematics and Computer Research, Vol. 9, Issue. 4, pp. 350-360. VDeepak Mehta, Sharad Saxena
19 Study on Emotional Intelligence of Graduate Students of Art And Science And of Different Locale Journal of Basic and Applied Research Internatinal (JOBRAI), Vol. 17 , No. 4, pp 227-237. Shilpi Saxena, Sharad Saxena
20 CPU mining Malware: Complete Analysis of Real World Virus International Journal of Research in Advent Technology,2015 Gautam, R., Kumar. S, & Bhattacharya, J
21 Data Clustering Using Differential Search Algorithm Journal of Science and Technology. Vol. 24(2), pp. 295-306, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
22 Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) Quantum Matter, American Scientific Publishers, 5(3):1-8, 2016. Y Pathak, K Sharma, K Singh and PS Rana
23 Impact Analysis of Software Processes for SPI in Indian SMEs International Journal of Applied Engineering Research ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011. (Scopus Indexed). Singh, A. & Aggarwal, H.
24 Ruling out key enablers for software process reengineering in Indian small and medium enterprises International Journal of Business and Process Management, Inderscience publishers (Scopus Indexed) Singh, A. & Aggarwal, H
25 Non Oblivious Watermarking Technique for JPEG 2000 Compressed Images using Arnold Scrambling of Unequal Size Watermark Blocks. International Journal of Science and Engineering, Vol. 9, No.1, pp. 17-26,2015. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
26 Singular Value Decomposition Based Steganography Technique for JPEG 2000 Compressed Images International Journal of Engineering, Vol. 28, N0.12, pp. 1720-1727, 2015. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
27 Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain British Journal of Applied Science &Technology, Vol. 14, No.4, pp. 21-29, 2016. Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh.
28 Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29, 2016. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
29 An Android Application for Mobile Customers using Speech Synthesis. International journal of Computer Applications. Volume: 145 number2, Page Nos:18-25, 2016 Keshav Rana, Rupinderdeep Kaur
30 Implementation of Word Level Speech Recognition System for Punjabi Language International journal of Computer Applications. Volume: 146 number 3, Page Nos:12-17, 2016 Shama Mittal, Rupinderdeep Kaur
31 Visualizing Class Diagram Using OrientDB Data-Store International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 6, 341-345, June 2016 Sawinder Kaur, Karamjit Kaur
32 An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information, Communication and Applications, 10 May 2016, pp 281-287 Monia , Sukhchandan Randhawa, Sushma Jain
33 Intensification of Resolution in the Realm of Digital Imaging Intensification of Resolution in the Realm of Digital Imaging Shivangi Jindal, and Harkiran Kaur
34 A Novel Approach for Reduction of Dynamic Range Based on Hybrid Tone Mapping Operator Procedia Computer Science, 58, pp. 265-271, 2015 Himanshu Kasliwal, Shatrughan Modi
35 PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks Journal of Internet Services and Information Security (JISIS), volume: 6, number: 1 (February 2016), pp. 47-56 Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao
36 Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, 137 (9), 27-30. 2016 Seemu Sharma, Seema Bawa, Hitashi Lomash

Year 2014-15 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Energy Efficient and High Performance Scheduling Algorithm for Grid Computing. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 3, no. 3 (2014): 179-188. Jain, Nidhi, and Inderveer Chana
2 Energy based Efficient Resource Scheduling: A Step Towards Green Computing International Journal of Energy, Information and Communications Vol.5, Issue 2 (2014), pp.35-52 Sukhpal Singh and Inderveer Chana
3 Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN) International Journal of Computer Applications (IJCA), vol. 92, no. 5, pp. 46-50, 2014 Ashima Singh and Gurpreet Bedi
4 Development of Component Repository, 3, 2014 AshimaSingh and Amandeep Bakshi
5 DNA Based Cryptography: A Review, International J. Information and Computational Technology, Volume 4, Number 7, pp. 693-698, 2014 Ashish Kumar; and Anil verma
6 A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata 8 pp. 95-105, 2014 A Kumar; and Anil verma
7 Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing 4 pp. 997-1001, 2014 Anju Bala and Inderveer Chana
8 Challenges of Sentiment Analysis and Existing state of art 1, 2014 Sujata Rani ; and Parteek kumar
9 Detection of potential clones from software using metrics 4 pp. 964-969, 2014 Geetika Bansal; and Rajkumar Tekchandani
10 Comparison of KNN and Slope one Algorithm in Sparse Enviornment 4, 2014 Abhishek Kaleroun; and Shalini Batra
11 A review of ranking approaches for semantic search on Web 50 pp. 416-425, 2014 Vikas Jindal;Seema Bawa;
12 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 99 pp. 17-23, 2014 sushma jain and Supriya Singla
13 Buffer OverFlow : Proof Of Concept Implementation 2 pp. 1201-1204, 2014 sushma jain and Pooja Rani
14 Quantum Neural Network based Machine Translator for Hindi to English 8, 2014 Ravi Narayan;Snehashish Chakraverty; and Vp singh
15 A Survey Paper on Web Page Change Detection 2 pp. 241-245, 2014 Vishnu Goel ; and Vinay arora
16 A novel approach for automatic test sequence generation for Java fork/join from activity diagram IEEE Advanced Communication Control and Computing Technologies pp. 1611-1615, 2014 Vipin Verma; and Vinay arora
17 Test sequence generation for Java7 fork/join using interference dependence 2, 2014 Vipin Verma ; and Vinay arora
18. Analysis of Search Engine Optimization (SEO) Techniques International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), pp. 563-566, 2015 Gurpreet Singh Bedi and Ms. Ashima Singh  
19    A Non-Interactive Certificateless Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks International Journal of Ad Hoc and Ubiquitous Computing, 2015 [Accepted In press] Suman Bala and Anil Verma
20    Word Sense Disambiguation for Punjabi Language Using Overlap Based Approach Advances in Intelligent Informatics, pp. 607-619. Springer International Publishing, 2015. Rana, Preeti and Parteek Kumar
21    P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network Intelligent Distributed Computing, 321, 43-54, 2015. Amrindeerpreet Singh and shalini batra
22    Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Intelligent Distributed Computing  (Book title Advances in Intelligent Systems and Computing), 321, 185-198,  2015. Kriti Chadha, Sushma Jain
23    Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges Book Chapter titled, “Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges” in the book:. Challenges, Limitations and R&D Solutions, 2014, Springer, pp. 51-72. Inderveer Chana and Sukhpal Singh

Year 2013-14 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals    

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
            1 Extracting a knowledge from source code comprehension using data mining methods Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012   A. Mishra and V. Srivastava
            2 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012 A. Mishra and V. Srivastava
           3 Intelligent Computing Methods for Software Maintenance: a Review Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012. A. Mishra and V. Srivastava
            4 Data mining methods for program comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. A. Mishra and V. Srivastava
            5 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms.     International Journal of Advanced Research in Computer Science and Software Engineering, 3 (6), June 2013, pp. 1382-1394 Tarunpreet Bhatia, A.K. Verma    

Year 2012-13 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors
1 Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing Advances in Intelligent and Soft Computing, ISSN: 1867-5662, Springer, 233 SPRING STREET, NEW YORK, USA, NY, 10013. Springer, Vol. 167,  page 323-331 Ajay Kumar, Seema Bawa,
2 A Survey of Search and Retrirval of Components from Software Repositories International Journal of Engineering research and Technology, ISSN : 2278 – 0181, Vol 2, Issue 4, April 2013.   Amandeep Bakshi, Seema Bawa
3 Key features of research portal for stimulating research in institutions of higher technical education EGITIM ARASTIRMALARI-EURASIAN JOURNAL OF EDUCATIONAL RESEARCH, Vol. 48, No. 12, pp. 155-174, 2012 Parul Dharmani, Ravi Kiran, Anil K Verma  
4 Simulation and analysis of AODV routing protocol in VANET International Journal of Soft Computing and Engineering, Vol. 2, No. 3, 293-301, July 2012 Tajinder Kaur, K Cheema, Anil K Verma
5 Agent enriched distributed association rules mining- A review Agents and Data Mining Interaction-LNCS, Vol. 7103, pp. 30-45, 2012 G S Bhamra, R B Patel, Anil K Verma
6 Simulation and analysis of dropped packets for DSR protocol in VANET International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Avleen Kaur, Anil K Verma
7 Simulation and Comparison of AODV and DSR Routing Protocols in VANETs International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Tajinder Kaur, Avleen Kaur, Anil K Verma  
8 Computation of Pheromone Values in AntNet Algorithm International Journal of Computer Network and Information Security, Vol. 9, pp. 47-54, Aug 2012 Anuj Gupta, H Sadawarti, Anil K Verma  
9 Simulation and analysis of DSR protocol in VANETs International Journal of Research in Computer and Communication Technology Vol. 1 No. 3, pp. 50-59, Aug. 2012 Avleen Kaur, Anil K Verma
10 SNMP, ICMP: A Collaborative Approach to Network Discovery and Monitoring International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248-9738 Volume-1, Issue-3, 2012 Aman Mahajan, Sahil Khajuria, Haresh Joshi, Anil K Verma  
11 Classification of Symmetric Key Management Schemes for Wireless Sensor Networks-Extended International Journal of Security and its Application, Vol. 7. No. 2, Mar 2013 Suman Bala, Gaurav Sharma, Anil K Verma
12 MFZLP: Multihop Far Zone Leach Protocol for WSNs Journal of Computational Intelligence and Electronic Systems, Vol. 2, No. 1, pp. 45-49, 2013 Virender Ranga;Mayank Dave;Anil Kumar Verma
13 Implementation of DYMO routing protocol   International Journal of Information Technology, Modeling and Computing, Vol. 1, No. 2, pp. 49-57, May 2013 Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma
14 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, pp. 1382-1394, Jun 2013 T Bhatia, Anil K Verma
15 Performance Analysis of MANETS Routing Protocols in Different Mobility Models International Journal of Information Technology and Computer Science,  Vol. 6, May 2013 K Gupta Anuj, Harsh Sadawarti, Anil K Verma
16 Knowledge Management Role of Thought Leaders and Junior Academia in Enhancing Research and Curriculum in Institutions of Higher Technical Education SAGE Open, pp. 1-13, June 2013 Ravi Kiran, Parul Agarwal, Anil K Verma
17 How the Two Wireless Networks Can Be Different: WSNS and VANETS Journal of Basic and Applied Scientific Research, 2013 Vandana Jindal, A.K.Verma, Seema Bawa
18 Multi-Core Scheduling in Cloud Computing,   International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868, Volume 4– No.9, Abhishek Kaushik and Inderveer Chana,
19  Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing” International Journal of Computer Applications, IJCA Journal, pp.13-17, Vol 50, No 10 Year of Publication: 2013 Deep Mann and Inderveer Chana,
20 Empirical Evaluation of Cloud-based Testing Techniques:A Systematic Review International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6
 
Priyanka, Inderveer Chana and Ajay Rana
21 Existing Load Balancing Techniques in Cloud Computing : A Systematic Review International Journal in Foundations of Computer Science & Technology(IJFCST), Volume 3, No.3, May, 2013 Kansal J. N., Chana I.
22 Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol.2, No.2, pp. 123~133, ISSN: 2089-3337. Anju Bala, Inderveer Chana
23 Cloud Load Balancing Techniques: A Step Towards Green Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), pp. 291~302,Vol.2, No.1, Kansal J. N., Chana I.
24 An Enhanced Run Length Coding for JPEG Image Compression International Journal of Computer Applications , 72(20),  2013  Amritpal Singh, V. P Singh
25 Adaptive Distributed Intrusion Detection using Hybrid k-means SVM Algorithm International Journal of Enhanced Research in Management & Computer Applications, Vol. 2 Issue 6, June-2013, pp: (10-14), V. P. Singh, Parneet Kaur
26 Steganography : A modern day Art and Science for Data Hiding International Journals of latest research in Science and Technology (IJLRST), Volume 2 Issue 4 ,2013 (Accepted) Roopam Bansal and V. P. Singh
27 Modeling and Querying Data in MongoDB International Journal of Scientific and Engineering Research Vol. 4, No. 2 pp. 141-144 Rupali Arora Rinkle Aggarwal
28 Implementation of relation queries in graph databases   International Journal on Information & Communication Technologies Vol. 6 no.1   pp.354-357 Rupali Arora Rinkle Aggarwal
29 Simulating wireless sensor networks using opnet   International Journal on Information & Communication Technologies Vol. 6 no.1 pp. 366-371 Abhinandan Gupta Rinkle Aggarwal
30 Design and Performance Evaluation of a New Irregular Fault- Tolerant Multistage Interconnection Network International Journal of Computer Science Issues Vol. 9, No.  2 pp. 108-113 Rinkle Aggarwal
31 Design and Reliability Analysis of a Class of Irregular Fault-tolerant Multistage Interconnection Networks International Journal of Computer Applications Vol. 39, No.8, pp. 8-14 Rinkle Aggarwal
32 An Efficient Algorithm for Data Cleaning of Log File using File Extensions International Journal of Computer Applications Vol. 48, No.8, pp. 13-18 Surbhi Anand Rinkle Aggarwal
33 Reference Scan Algorithm for Path Traversal Patterns International Journal of Computer Applications Vol. 48, No.7, pp. 20-25 Chintandeep Kaur Rinkle Aggarwal
34 An Efficient Algorithm for Web Page Change Detection International Journal of Computer Applications Vol. 48, No.10, pp. 28-33 Srishti Goel Rinkle Aggarwal
35 A Modified Algorithm to Handle Dangling Pages using Hypothetical  Node International Journal of Computer Applications Vol. 48, No.7,  pp. 26-32 Shipra Srivastava Rinkle Aggarwal
36  A Short Survey of Key Distribution Techniques for Namespace Load Balancing International Journal of Emerging Technologies in Computational and Applied Sciences, Issue 4, Vol. 1, 2 & 3, pp. 532-536, May, 2013 Ravneet Kaur, Shalini Batra
37 Phases of Testing An Online Application International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 6, June 2013 Sandeep Singh and Shivani Goel
38 Testing Techniques for COTS International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 4, pp. 829-833, April 2013 Jagdeep Singh and Shivani Goel
39 COTS and OSS: A Comparative View The International Journal of Computer Science and Applications Vol 1, No. 12, pp. 55-59, Feb 2013 Jagdeep Singh and Shivani Goel
40 Selection of Component Models: A Comparative view International Journal of Computer Engineering and Software Technology, Vol 3, No. 2, pp. 166-173, July-Dec 2012 Jyotsna, Shivani Goel
41 Vulnerability Management for an Enterprise Resource Planning System International Journal of Computer Applications, ISSN: 0975 – 8887, Vol 53, No. 4, September 2012, pp. 19-22 Shivani Goel, Ravi Kiran, Deepak Garg
42 UNL-ization of Numbers and Ordinals in Punjabi with IAN,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 3, June 2013: 61,69. Vaibhav Agarwal, Parteek Kumar  
43 NLization of Nouns, Pronouns and Prepositions in Punjabi With EUGENE,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 2,  April 2013: 33,42 Ashutosh Verma, Parteek Kumar  
44 Development of Mobile Application for Transliteration of Roman Script to Gurmukhi Script,    International Journal of Computational Linguistics and Natural Language Processing, Vol. 1, No. 1, Aug 2012: 6-11.   Maninder Singh, Parteek Kumar, Ms. Rupinderdeep Kaur
45 Web Page Categorization: Tools, Techniques and  Evaluation International Journal of Advances in Computing  and Information Technology, ISSN 2277-9140, Vol. 1, Issue-2, pp. 212-219, 2012 K. Taneja, and V. K. Bhalla
46 Analysis the Performance of MANET Protocols by Varying the Number of Connections International Journal of Mobile & Adhoc Network, ISSN 2231–6825, Vol 2, issue 2, pp.185-191,2012 Shivender Taneja and Vinod K Bhalla
47 Optimization of Hamilton Path Tournament Schedule International Journal of Advanced Research in Computer Engineering & Technology, Volume 2 Issue 6 of  (ISSN: 2278-1323) , 2013 Trinetra Kumar Pathak and Vinod K. Bhalla
48 Android Internals International Journal of Advanced Research in Computer Science and Software Engineering,” Vol. 3, Issue 6, pp. 143-147, 2013 Vaibhav Kumar Sarkania, Vinod Kumar Bhalla
49 ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack International Journal of Network Security (IJNS), vol. 14, no. 1,  ISSN 1816-3548, pp. 36-45 B. B. Gupta, R. C. Joshi, Manoj Misra
50 Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email, Indian Journal of Science and Technology, Vol. 6, issue 1, pp. 1-5 (ISI Thomson Router) A. ALmomani, B. B. Gupta, T. Wan, A. Altaher, S. Manickam
51 Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model Journal of Computing and Information Technology (CIT) , Vol. 20, no. 1, ISSN 1846-3908, pp. 1–8 B. B. Gupta
52 Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art International Journal of Computer Applications, Vol. 49, no. 7, pp. 24-32, 2012 E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, R. Alfaris
53 Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment International Journal of Computer Science Issues(IJCSI), vol. 10, issue 2, pp. 142-146 P. Negi, a. Mishra, B. B. Gupta
54 Mutation Operators corresponding Conditions Contributing in Deporting them Equivalently Vol. 4(2), 656-658, 2013        IJCST   Tannu Singala Ajay Kumar  
<55 Rule based Normalization of Regular Expressions International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 2013 J. S. Khedar, Ajay Kumar    
56 Ambiguity detection algorithm for context free grammar   IJCST, 4(3), 2013 S. K. Jain, Ajay Kumar  
57 Text to Speech Synthesis for numerals into Punjabi Language International Journal of Computational Linguistics and Natural Language Processing Vol 2 Issue 7 July 2013 Karun Verma, Maninder Singh
58 Workflow Management in Cloud Computing   IJAIS, Vol no:4, page       no: 21-26., Oct.2012 Monika Bharti, Anju Bala
59 Automatic Fragmentation and Storage of Code in Component Repository w.r.t. their Input and Output Interfaces: A Tool” International Journal of Innovative Technology and Exploring Engineering (IJITEETM) ISSN: 2278-3075, Volume-2, Issue-3, Page: 235-238 February 2013 Pankaj Vohra Ashima Singh
60 A Tool incorporation different Techniques for Effective Component Storage and Retrieval   International Journal. of Scientific and Engineering Research, vol. 4, no. 7, pp. 1134-1137, 2013. Pankaj Vohra Ashima Singh
61 Iterative and Non–Iterative Approaches for Architecture Based Software Development CiiT International Journal of Software Engineering and Technology Vol 5, January 2013 Navneet Rathour Ashima Singh
62 Generating More Reusable Components while Development : A Technique International Journal of Innovative Technology and Exploring Engineering(IJITEE) Volume-2 Issue-3, 2013 Navneet Rathour Ashima Singh
63 A Complexity Metric for Black Box Components International Journal of Soft Computing and Engineering  Volume-3 Issue-2, ,10,179-184, June 2013 Navneet Rathour Ashima Singh
64 A Technique for Component Based Software Development International Journal of Computer Science and Engineering ( IJCSE )   Volume-2, Issue 2, 123-134, May 2013 Navneet Rathour Ashima Singh
65 Component Complexity Metrics: A Survey International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6,pp. 1056-1061, June 2013 Navneet Rathour Ashima Singh
66 A metric for Assessing Black Box Component Reusability International Journal of Scientific and Engineering Research, vol 4 ,no. 7, pp. 1114-1121, 2013 Navneet Rathour Ashima Singh
67 Design and Deployment of Workflows in Cloud Environment IJCA Vol No: 51 Issue 11 pp:9-15, August 2012 Anju Bala and Inderveer Chana
68 Autonomic Data Replication in Cloud Environment IJECSE, Vol.2, page no: 459-464, Jan,2013 Dhananjya Gupta, Anju Bala
69 Autonomic Fault Tolerant Framework for Web Applications IJCST Vol. 4, Issue 2,pp: 528-533 April - June 2013 Dhananjya Gupta, Anju Bala
70 An Emerging approach towards Clone Detection: Metric based Approach on byte code. International Journal of Advance Research in Computer Science and Software Engineering, Vol 3, pp:881-888, May 2013 Kanika Raheja and Rajkumar Tekchandani
71 Evaluation of Flow Graph and Dependence Graphs for Program Representation International Journal of Computer Applications, Vol. 56, Issue.14, pp. 18-23, October 2012 Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh
72 Literature Analysis on Model based Slicing International Journal of Computer Applications, Vol. 70, Issue.16, pp. 45-51, May 2013 Rupinder Singh, Vinay Arora
73 Technique for Extracting Subpart from UML Sequence Diagram International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, pp. 593-596, June 2013 Rupinder Singh, Vinay Arora
74 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012. Ashutosh Mishra and Vinayak Srivastava
75 Extracting a knowledge from source code comprehension using data mining methods   Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012 Ashutosh Mishra and Vinayak Srivastava  
76 Intelligent Computing Methods for Software Maintenance: a Review   Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012 Ashutosh Mishra and Vinayak Srivastava
77 Data mining methods for     Program Comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. Ashutosh Mishra and Vinayak Srivastava  
78 Use of Semantic Relatedness for Intelligent Access to Cultural Information International Journal of Computer Applications, Volume 64 – No. 15, February 2013,                    pp. 21-28 Harkiran Kaur,          Dr. Seema Bawa
79 Creating Digital Archives of Ancient Scriptures using CAPTCHAs International Journal of Computer Applications, Volume 64 – No. 15, February 2013, pp. 29-37 Harkiran Kaur,          Dr. Seema Bawa

Year 2017-18 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks Wireless Personal Communications, 2017 Vinod Kumar Bhalla, Neeraj Kumar 0.9700
2 Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues.  The Journal of Supercomputing, vol. 73, no. 6, pp 2558–2631, 2017 Tarunpreet Bhatia and A. K. Verma 1.3200
3 An Efficient and Robust Multi-Frame Image Super-Resolution Reconstruction Using Orthogonal Fourier-Mellin Moments Elsevier, Volume 49, Pages 101-115 , 2017 Chandan Singh, Ashutosh Aggarwal 1.5260
4 A new convolution model for the fast computation of Zernike moments International Journal of Electronics and Communications, 104-113, 2017 Chandan Singh, Ashutosh Aggarwal, Sukhjeet K. Ranade 1.1470
5 Intelligent Heart Disease Prediction in Cloud Environment through Ensembling. Expert System, 2017 Nishant Gupta, Shikhar Malhotra, Naman Ahuja, Anju Bala and Gurleen Kaur 0.9470
6 VMVC: Verifiable Multitone Visual Cryptography MULTIMEDIA TOOLS AND APPLICATIONS, 2017 Shivendra Shivani 1.5300
7 XOR based Continuous tone Multi Secret Sharing Scheme for Store and Forward Telemedicine MULTIMEDIA TOOLS AND APPLICATIONS, 2017 Shivendra Shivani, Suneeta Agarwal 1.5300
8 Multi Secret Sharing with Unexpanded Meaningful Shares MULTIMEDIA TOOLS AND APPLICATIONS, 2017 Shivendra Shivani 1.5300
9 A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities IEEE Communications Magazine 55(3), 14-21, 2017 Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues 10.4350
10 An efficient energy-aware predictive clustering approach for vehicular ad hoc networks Int. J. Communication Systems 30(2), 14-21, 2017 R.S Bali, Neeraj Kumar, Joel R 1.0660
11 A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks Int. Journal of Network Management 27(3), 2017 Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti 1.1180
12 Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid IEEE Systems Journal 11(1), 140-151, 2017 Neeraj Kumar, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues, Seungmin Rho 3.8820
13 Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System IEEE Trans. Information Forensics and Security12(2), 454-464, 2017 Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu 4.3320
14 Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers IEEE Wireless Commun. 24(3), 48-56, 2017 Kuljeet Kaur, Tanya Dhand, Neeraj Kumar, Sherali Zeadally 8.9720
15 Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network Wireless Personal Communications 93(2), 523-541, 2017 Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen 0.9510
16 Evolution based memetic algorithm and its application in software cost estimation Journal of Intelligent & Fuzzy Systems, vol. 32, no. 3, pp. 2485-2498, 2017 K. K. Mishra, Ashish Tripathi, Shailesh Tiwari and Nitin Saxena 1.2610
17 An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems Advances in Engineering Software, 2017 Vijay Kumar and Dinesh Kumar 3.0000
18 A Modified DWT-based Image Steganography Technique Multimedia Tools and Applications, 2017 Vijay Kumar and Dinesh Kumar 1.5300
19 Internet Attacks and Intrusion Detection System: Study and Review Online Information Review, Vol. 41, No. 2, pp 171-184, 2017 Raman Singh, Harish Kumar, R.K. Singla, K.R. Ramkumar 1.5340
20 Key Management using Chebyshev Polynomials for Mobile Ad Hoc Networks China Communications, Accepted for publication, 2017 R. Ramkumar and Raman Singh 0.9030
21 Community Sensor Network for Monitoring Road Roughness Using Smartphones Journal of Computing in Civil Engineering, 2017 Rajiv Kumar, Abhijit Mukherjee and V. P. Singh 1.9200
22 EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm International Journal of Ad Hoc and Ubiquitous Computing, 2017 Rajiv Kumar, Abhijit Mukherjee and V. P. Singh 0.4930
23 Efficient Cooperative Relaying In Flying Ad Hoc Networks Using Fuzzy-Bee Colony Optimization Journal of Supercomputing, pp. 1-31, 2017 Vishal Sharma, Kathiravan Srinivasan, Rajesh Kumar, Han-Chieh Chao, Kai-Lung Hua 1.0880
24 Driver Behaviour Detection and Vehicle Rating Using Multi-UAV Coordinated Vehicular Networks Journal of Computer and System Sciences, pp 3-32, 2017 Vishal Sharma, Hsing Chung Chen, Rajesh Kumar 1.5830
25 Cooperative Network Frameworks and Network Models For Flying Ad Hoc Networks: A Survey Concurrency Control and Practices, pp. 1-40, 2017 Vishal Sharma, Rajesh Kumar 0.9420
26 Equal: Energy And Qos Aware Resource Allocation Approach For Clouds Computing and Informatics, 2017 Ashok Kumar, Anju Sharma, and Rajesh Kumar 0.5040
27 Energy Aware Resource Allocation For Clouds Using Two Level Ant Colony Optimization Computing and Informatics, 2017 Ashok Kumar, Anju Sharma, and Rajesh Kumar 0.5040
28 Analyzing inconsistencies in software product lines using an ontological rule-based approach Journal of Systems and Software, 2017 Megha Bhushan, Shivani Goel, Karamjit Kaur 2.4400
29 Block Based Reversible Data Hiding Using Histogram Shifting and a Modulus operator for Digital Images Journal of Circuits, Systems and Computers, pp. 1- 17, 2017 Pankaj Garg, Singara Singh Kasana and Geeta Kasana 0.3080
30 A Sustainable Multi-Parametric Sensors Network Topology for River Water Quality Monitoring Wireless Networks, 2017 Himanshu Jindal, Sharad Saxena and Singara Singh Kasana 1.0060
31 Deterministic Deep Pushdown Transducer and its Parallel Version The Computer Journal, 2017 Nidhi Kalra and Ajay Kumar 0.7110
32 Efficient image transfer over WSN using cross layer architecture Optik-International Journal for Light and Electron Optics, DOI information, 2017 Ramnik Singh, A K Verma 0.7420
33 Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks National Academy of Sciences, India Section A: Physical Sciences, 2017 Nitin goyal, M Dave, A K Verma 0.3900
34 A MapReduce Based Scalable Discovery and Indexing of Structured Big Data Future Generation Computer System The International Journal of Grid Computing and eScience, 2017 Hari Singh and Seema Bawa 2.1000
35 Distributed Star Coloring of Network for IP Traceback International Journal of Information Security, Springer, vol. 9, pp. 1-12, 2017 Sangita Roy, Ashok Singh Sairam 1.9150
36 A novel shape-based character segmentation method for Devanagari script. Arabian Journal for Science and Engineering, 1–8, 2017 Rajiv Kumar, Khushneet Jindal 0.7280
37 A Novel Ensemble Technique for Anomaly Detection International Journal of Communication System, 2017 Sahil Garg, Shalini Batra 1.0060
38 Multicast dynamic traffic grooming using bin packing method in WDM mesh networks Optical Switching and Networking, 23, 40-51, 2017 Ashok Kumar, Pradhan, SayanGhose, Tanmay de 1.8600
39 Fuzzy rule-based expert system for determining trustworthiness of cloud service providers International Journal of Fuzzy Systems, 19, pp. 338-354, 2017 Rajanpreet Kaur, Sarbjeet Singh 2.1980
40 Efficient disparity estimation from stereo images using hybrid guided image filter Imaging Science Journal, pp 1-13, 2017 Khushboo Jain, Husanbir Singh Pannu, Kuldeep Singh, Avleen Kaur Malhi 0.45
41 Multi-objective Particle Swarm Optimization based Adaptive Neuro-Fuzzy Inference System for Benzene Monitoring Neural Computing and Applications, pp 1-11, 2017 Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi 2.5
42 QUAT-DEM: Quaternion-DEMATEL based neural model for mutual coordination between UAVs Information Sciences, Dec 1;418:74-90, 2017 Sharma V., Kumar R. & Kumar R. 4.832
43 HMADSO: a novel hill Myna and desert Sparrow optimization algorithm for cooperative rendezvous and task allocation in FANETs Soft Computing, 2017:1-24, 2017 Sharma V,  Kumar R, Reina DG 2.472
44 Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs Computing and Informatics, Jul 2;35(5):1079-109, 2017 Sharma V. & Kumar R. 0.488
45 Clustering-based resource discovery on Internet-of-Things International Journal of Communication Systems, Wiley, https://doi.org/10.1002/dac.3501, 2017 Monika Bharti , Rajesh Kumar, Sharad Saxena 1.066
46 Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries IEEE Transactions on Smart Grid, vol. 8, pp. 2411-2419, 2017 Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, Laurence T. Yang 6.645
47 Cooperative Strategies for Challenged Networks and Applications: A Survey IEEE Systems Journal, vol. 11, pp. 2749 - 2760, 2017 Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, Guangjie Han 3.882
48 Anonymous Authentication for Wireless Body Area Networks With Provable Security IEEE Systems Journal, vol. 11, pp. 2590-2601, 2017 Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee 3.882
49 Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks Journal of Real-Time Image Processing, vol. 13, pp. 627-644, 2017 Amit Dua, Neeraj Kumar, Seema Bawa 2.01
50 Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges IEEE Communications Magazine, vol. 55, pp. 114-122, 2017 Rajat Chaudhary, Neeraj Kumar, Sherali Zeadally 10.435
51 Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach IEEE Communications Magazine, vol. 55, pp. 100-108, 2017 Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Joel J. P. C. Rodrigues, Alexey V. Vinel 10.435
52 Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices IEEE Access, vol. 5, pp. 27707-27721, 2017 Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park 3.244
53 Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks IEEE Access, vol. 5, pp. 14966-14980, 2017 Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park 3.244
54 Cryptanalysis and Improvement of Certificateless Proxy Signcryption Scheme for E-Prescription System in Mobile Cloud Computing Annals of Telecommunications, 563-576 & 72, 2017 Tarunpreet Bhatia and A.K. Verma 1.4
55 Local Graph Based Correlation Clustering Knowledge-Based Systems, Elsevier, Vol. 138, pp. 155-175, 2017 Divya Pandov, Rinkle Rani , Shivani Goel 4.5
56 Correlation Clustering Methodologies and their Fundamental Results Experts Systems, Wiley, Vol. 34, No. 4, pp. 1-24, 2017 Divya Pandov, Rinkle Rani , Shivani Goel 1.18
57 An Efficient Approach for Outlier Detection in Big Sensor Data of Healthcare International Journal of Communication Systems, Wiley, Vol. 30, No. 17, pp. 1-10, 2017 Bharti Saneja and Rinkle Rani 1.06
58 Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete Advances in Civil Engineering, 2017 Palika Chopra, R. K. Sharma, Maneek Kumar, and Tanuj Chopra  
59 Development of Pavement Distress Deterioration Prediction Models for Urban Road Network using Genetic Programming Advances in Civil Engineering, 2017 Tanuj Chopra, Manoranjan Parida, Naveen Kwatar, and Palika Chopra  
60 A semi-supervised domain adaptation assembling approach for image classification Pattern Analysis and Applications, 2017 Shruti Saxena, Shreelekha Pandey, Pritee Khanna 1.352
61 Comprehensive survey of 3D image steganography techniques IET Image Processing, pp 1-10, 2017 Ashish Girdhar , Vijay Kumar 1.044
62 Context-Aware Search Optimization Framework on Internet-of-Things Concurrency and Computation: Practice and Experience, 2017 Monika Bharti, Sharad Saxena, Rajesh Kumar 1.133
63 Clustering based resource discovery on Internet-of-Things International Journal of Communication Systems, 2017 Monika Bharti, Rajesh Kumar, Sharad Saxena 1.066
64 Efficient Landsat image fusion using fuzzy and stationary discrete wavelet transform Imaging Science Journal Taylor and Francis , 65.2 (2017): 108-114, 2017 Dilbag Singh, Deepak Garg, And HS Pannu 0.45
65 Autonomic point cloud based surface reconstruction using SVR Imaging Science Journal Imaging Science Journal Taylor and Francis , 1–9, 2017 Khushboo Jain, HS Pannu 0.45
66 An Efficient Corpus-Based Stemmer Cognitive Computation, 671-688 & 9, 2017 Jasmeet Singh, Vishal Gupta 3.441
67 A systematic review of text stemming techniques Artificial Intelligence, 157-217 & 48, 2017 Jasmeet Singh, Vishal Gupta 2.627
68 Modified Gain Intervention Filter based Dehazing Technique Journal of Modern Optics, 2165-2178 & 64(20), 2017 Dilbag Singh and Vijay Kumar 1.328
69 A Comprehensive Survey of 3D Image Steganography Techniques IET Image Processing, 1-10 & 12(1), 2017 Chandan Singh, Ashutosh Aggarwal 1.044
70 Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter IET Computer Vision, 2017 Dilbag Singh and Vijay Kumar 0.878
71 An Empirical Evaluation of Energy-aware Load Balancing Technique for Cloud Data Center Cluster Computing, pp. 1-19, 2017 Nidhi Jain Kansal and Inderveer Chana 2.04
72 BULLET: Particle Swarm Optimization based Scheduling Technique for Provisioned Cloud Resources Journal of Network and Systems Management, pp. 1-40, 2017 Sukhpal Singh, Rajkumar Buyya, Inderveer Chana, Maninder Singh and Ajith Abraham 1.588
73 CHOPPER: An Intelligent QoS-aware Autonomic Resource Management Approach for Cloud Computing Cluster Computing, pp. 1-39, 2017 Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya 2.04
74 IoT based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India  Journal of Organizational and End User Computing (JOEUC), vol. 29, no. 4, 2017 Sukhpal Singh, Inderveer Chana and Rajkumar Buyya 0.759
75 A Sentiment Analysis System to Improve Teaching and Learning IEEE Computer 50.5, 2017 Sujata Rani, Parteek Kumar 1.1150
76 A public platform for developing language-independent applications Digital Scholarship in the Humanities, 2017 Vaibhav Agarwal, Parteek Kumar 0.5250
77 Fuzzified cuckoo based clustering technique for network anomaly detection Computers and Electrical Engineering, 2017 Sahil Garg, Shalini Batra 1.57
78 Improving quality of software product line by analysing inconsistencies in feature models using an ontological rule-based approach Expert Systems, 2017 Megha, Shivani Goel and Ajay Kumar 1.1800
79 Offline Handwritten Gurmukhi Character Recognition: Analytical Study of different Transformations Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 137-143, 2017 Munish Kumar, R. K. Sharma and M. K. Jindal 0.1790
80 On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems IEEE Access 5: 7012-7030, 2017 Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park 3.2440
81 On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services IEEE Access, vol. 5, pp. 25808-25825, 2017 Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos 3.244
82 Ontology Cohesion and Coupling Metrics International Journal on Semantic Web and Information Systems, 2017 Sandeep Kumar, Niyati Baliyan, and Shriya Sukalikar 1.5000
83 Privacy-preserving certificateless provable data possession scheme for big data storage on cloud Applied Mathematics and Computation, vol. 314, pp. 31-43, 2017 Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo 1.738
84 QSLB: Queue Size based single path load balancing routing protocol for mobile ad hoc networks International Journal of Ad Hoc and Ubiquitous Computing, 2017 Mohd Naseem, Chiranjeev Kumar 0.6000
85 Reference based semiblind image watermarking scheme in wavelet Domain International Journal of Light and Electron Optics., pp. 191-204, 2017 Geeta Kasana and Singara Singh Kasana 0.7420
86 ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks Telecommunication Systems, 439-458, 2017 Amit Dua, Neeraj Kumar, Seema Bawa 1.5420
87 Resource-based mobility management for video users in 5G using catalytic computing Computer Communications, 2017 Vishal Sharma, Ilsun You, Ravinder Kumar 3.338
88 RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing Journal of Network and Computer Applications, pp. 1-13 , 2017 Garg, Neenu, and Seema Bawa 3.3310
89 Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet of Things Journal, vol. 4, pp. 1634-1646, 2017 Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos 7.596
90 Secure public data auditing scheme for cloud storage in smart city Personal and Ubiquitous Computing, Vol. 21, pp. 949–962, 2017 Libing Wu, Jing Wang, Neeraj Kumar, Debiao He 2.395
91 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications IEEE Access 5: 3028-3043, 2017 Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo 3.2440
92 Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment IEEE Transactions on Industrial Informatics, vol. 13, pp. 3144-3153, 2017 Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues 6.764
93 Sewage Water Quality Monitoring Framework using Multi-parametric Sensors Wireless Personal Communications, 2017 Himanshu Jindal, Sharad Saxena and Singara Singh Kasana 0.7010
94 Single-image super-resolution using orthogonal rotation invariant moments Computers & Electrical Engineering, 2017 Chandan Singh, Ashutosh Aggarwal 1.5700
95 Slantlet based Hybrid Watermarking Technique for Medical Images Multimedia Tools and Applications, 2017 Roopam Bamal and Singhara Singh Kasana 1.3310
96 Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications Advances in Engineering Software, 48-70 & 114, 2017 Gaurav Dhiman and Vijay Kumar 3
97 Strategies For Replica Consistency In Data Grid – A Comprehensive Survey Concurrency and Computation: Practice and Experience, pp. 1-40, 2017 Priyanka Vashisht, Anju Sharma, Rajesh Kumar 1.1330
98 Synthesizing test scenarios in UML activity diagram using a Bio-inspired approach Computer Languages, Systems & Structures, Vol. 50, pp. 1-19, 2017 Vinay Arora, Rajesh Bhatia, Maninder Singh 1.6150
99 T-Ensemble approach for Drug Toxicity Prediction International Journal of Computer Science and Information Security, 2017 Nishtha Hooda, Seema Bawa, Prashant Singh Rana 0.5190
100 The Journey of QoS-Aware Autonomic Cloud Computing IT Professional, vol. 19, no. 2,pp. 42-49, 2017 Sukhpal Singh, Inderveer Chana and Maninder Singh 1.661
101 Traffic noise mapping of Indian roads through smartphone user community participation Journal of Computing in Civil Engineering, 2017 Rajiv Kumar, Abhijit Mukherjee and V. P. Singh 1.9800
102 Triangular Pyramidal Topology to Measure Temporal and Spatial Variations in Shallow River Water using Ad-hoc Sensors Network Ad Hoc & Sensor Wireless Networks, 1-35, (39), 2017 Himanshu Jindal, Sharad Saxena, Singara Singh 1.034
103 AUnderwater Pipelines Panoramic Image Transmission and Refinement using Acoustic Sensors International Journal of Wavelets, Multiresolution and Information Processing, 2017 Himanshu Jindal, Singara Singh, Sharad Saxena 0.6
104 Weighted Image De-fogging using Luminance Dark Prior Journal of Modern Optics, pp. 1-13, 2017 Isha Kansal and Singara Singh Kasana 1.2670
105 Data Deduplication Techniques for Efficient Cloud Storage Management - A Systematic Review The Journal of Supercomputing, 2018 Ravneet Kaur, Inderveer Chana and Jhilik Bhattacharya 1.326
106 GreenSched: An Intelligent Energy Aware Scheduling For Deadline-and- Budget Constrained Cloud Tasks Simulation Modelling Practice and Theory, 2018 Tarandeep Kaur and Inderveer Chana 1.954
107 Character Recognition for Non-Indic and Indic Scripts: a Survey Artificial Intelligence Review, https://doi.org/10.1007/s10462-017-9607-x, 2018 Munish Kumar, M. K. Jindal and R. K. Sharma 2.627
108 Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques National Academy Science Letters, 41(1), 2018 Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal 0.369
109 Efficient Zone Identification Approach for the Recognition of Online Handwritten Gurmukhi Script Neural Computing and Applications, https://doi.org/10.1007/s00521-017-3340-x, 2018 Harjeet Singh, R. K. Sharma and V. P. Singh 2.505
110 Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete Advances in Civil Engineering, https://doi.org/10.1155/2018/5481705, 2018 Palika Chopra, R. K. Sharma, Maneek Kumar and Tanuj Chopra 0.97
111 A Parallel Computational Approach for Similarity Search using Bloom Filters Computational Intelligence, 34:713–733, 2018 Sachendra Singh Chauhan, Shalini Batra 0.96
112 An efficient multi party scheme for PPCF for health care system Future Generation Computer Systems, 2018 Harmanjeet Kaur, Neeraj Kumar, Shalini Batra 3.99
113 B2 FSE framework for high dimensional imbalanced data: A case study for drug toxicity prediction Neurocomputing, Volume 276, Pages 31-41, 2018 Nishtha Hooda, Seema Bawa and Prashant Singh Rana 3.317
114 Fraudulent Firm Classification: A Case Study of an External Audit Applied Artificial Intelligence, Volume 32 Issue 1, Pages 48-64, 2018 Nishtha Hooda, Seema Bawa and Prashant Singh Rana 0.652
115 Improved Particle Swarm Optimization Based Adaptive Neuro-Fuzzy Inference System for Benzene Detection CLEAN-soil, air, water, Page no. 1-27, Vol 46(5), 2018 Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi 1.47
116 Efficient disparity estimation from stereo images using hybrid guided image filter Imaging Science Journal, Page no. 139-151, Vol 66(3), 2018 Khushboo Jain, Husanbir Singh Pannu, Kuldeep Singh, Avleen Kaur Malhi 0.45
117 Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks Wireless Networks, Page 1-25, 2018 Kalpna Guleria, Anil Kumar Verma 1.548
118 FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad hoc Networks (FANETs) Adhoc and Sensor Wireless Networks, Page 23-47 and Vol. 40, 2018 Kuldeep Singh, Anil Kumar Verma 1.034
119 Impersonation attack on CertificateLess key agreement protocol International Journal of Ad Hoc and Ubiquitous Computing, Page 108-120 and Vol. 27, 2018 Suman Bala, Gaurav Sharma, Anil Kumar Verma 0.705
120 A Novel Framework for Reliable Network Prediction of Small Scale Wireless Sensor Networks (SSWSNs) Fundamenta Informaticae, Page 303-341 and Vol. 163, 2018 Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana 0.687
121 A fuzzy-based trust model for flying ad hoc networks (FANETs) International Jourmal of Communication Systems, Page 1-19 and Vol. 31, 2018 Kuldeep Singh, Anil Kumar Verma 1.066
122 GIS-based evolutionary optimized Gradient Boosted Decision Trees for forest fire susceptibility mapping Natural Hazards, Page 1-20, 2018 Shruti Sachdeva, Tarunpreet Bhatia, Anil Kumar Verma 1.833
123 Comprehensive review of continuous and discrete orthogonal moments in biometrics International journal of computer mathematics: Taylor and Francis, 1700162, 2018 Husanbir Singh Pannu, Dilbag Singh, Avleen Malhi 0.97
124 A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences Multimedia Tools and Applications, 2018 Ashish Girdhar and Vijay Kumar 1.53
125 Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods Future Generation Computer Systems, Vol. 86, 266-280, 2018 Shubham Goel and Ravinder Kumar 3.997
126 DPTR: Distributed priority tree-based routing protocol for FANETs Computer Communications, Vol 122, 129-151, 2018 Vishal Sharma, Ravinder Kumar and Neeraj Kumar 3.338
127 Analysis of Students" Ratings of Teaching Quality to Understand the Role of Gender and Socio-Economic Diversity in Higher Education IEEE Transactions on Education, Vol 61 Issue 4 pp: 1-9, 2018 Anika Gupta ; Deepak Garg ; Parteek Kumar 1.727
128 HMulti-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems. Knowledge-Based Systems, pp.175-197 & Vol. 150, 2018 Gaurav Dhiman and Vijay Kumar 4.529
129 A novel dehazing model for remote sensing images. Computer & Electrical Engineering, pp. 14-27 & Vol. 69, 2018 Dilbag Singh and Vijay Kumar 1.57
130 An efficient image encryption method based on improved Lorenz chaotic system. Electronics Letters, pp. 562-564 & Vol. 54(9), 2018 Manjit Kaur and Vijay Kumar 1.155
131 Fourier-Mellin moments based intertwining map for image encryption. Modern Physics Letters B, pp. 1-17 & Vol. 32(9), 2018 Manjit Kaur and Vijay Kumar 0.617
132 Comprehensive Survey on Haze Removal Techniques. Multimedia Tools and Applications, pp. 9595-9620 & Vol. 77(8), 2018 Dilbag Singh and Vijay Kumar 1.53
133 Histogram based Multilevel Reversible Data Hiding Scheme using Simple and Absolute Difference Images Multimedia Tools and Applications, 2018 Sonal Kukreja, Singara Singh Kasana and Geeta Kasana 1.53
134 Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems IEEE Trans. Industrial Informatics , 1232-1241 , vol. 14, 2018 Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang 6.764
135 Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks IEEE Internet of Things Journal, 269-282, vol. 5, 2018 Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo 7.596
136 Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud IEEE Trans. Emerging Topics Comput., 58-71, vol. 6, 2018 Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat 3.826
137 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services IEEE Systems Journal, 1621-1631, vol. 12, 2018 Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen 3.882
138 An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks Journal of Network and Computer Applications, 133-144, vol. 104, 2018 Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo 3.5
139 Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care. Journal of Medical Systems, 51:1--51:10, vol. 42, 2018 Mario W. L. Moreira, Joel J. P. C. Rodrigues, Neeraj Kumar, Jalal Al-Muhtadi, Valery Korotaev 2.456
140 Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment Future Generation Computer Systems, 629-637, vol. 83, 2018 Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla 3.997
141 LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment IEEE Communications Magazine, 24-32, vol. 56, 2018 Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena 10.435
142 Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks IEEE Access, 20673-20693, vol. 6, 2018 Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar 3.244
143 Efficient Classification of the Hyperspectral Images using Deep Learning Multimedia Tools and Applications, 2018 Simranjit Singh and Singara Singh Kasana 1.53
144 A new illumination normalisation framework via homomorphic filtering and reflectance ratio in DWT domain for face recognition Journal of Intelligent and Fuzzy Systems, 2018 Jyotsna Yadav, Navin Rajpal, Rajesh Mehta 1.2
145 Low-dose CT image reconstruction using gain intervention based dictionary learning Modern Physics Letter-B, World Scientific, 1850148, Vol no 32, Issue 14, 2018 Y. Pathak, K.V. Arya and S. Tiwari 0.687
146 Feature Selection for Image Steganalysis using Levy Flight-based Grey Wolf Optimization Multimedia Tools and Applications, Springer, 2018 Y. Pathak, K.V. Arya and S. Tiwari 1.53
147 Offline Handwritten Pre-Segmented Character Recognition of Gurmukhi Script Machine Graphics and Vision, 25(1/4), 2018 Munish Kumar, M. K. Jindal, R. K. Sharma and S. R. Jindal 0.11
148 Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective IEEE Trans. Industrial Informatics , 778-789, vol. 14, 2018 Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan 6.764
149 Optimized Big Data Management across Multi-Cloud Data Centers: Software-Defined-Network-Based Analysis IEEE Communications Magazine, 118-126, vol. 56, 2018 Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Joel J. P. C. Rodrigues 10.435
150 Plants Disease Identification and Classification Through Leaf Images: A Survey Archives of Computational Methods in Engineering, https://doi.org/10.1007/s11831-018-9255-6, 2018 Sukhvir Kaur, Shreelekha Pandey, Shivani Goel 5.061
151 Prediction of Compressive Strength of Concrete using Artificial Neural Network and Genetic Programming Advances in Materials Science and Engineering, http://dx.doi.org/10.1155/2016/76484679, 2018 Palika Chopra, R. K. Sharma and Maneek Kumar 1.299
152 Prediction of drug synergy in cancer using ensemble-based machine learning techniques. World Scientific-Modern Physics Letters B, Vol. 32, No. 11 (2018) 1850132 (12 pages), 2018 Harpreet Singh, Prashant Singh Rana, and Urvinder Singh 0.69
153 Quantifying matrix product state Quantum Information Processing, 17(41), 2018 Amandeep singh bhatia, Ajay Kumar 2.2
154 Scalable Metadata Management Techniques for Ultra Large Distributed Storage Systems - A Systematic Review ACM Computing Surveys, 2018 Harcharan Jit Singh, Seema Bawa 6.72
155 SDN-based energy management scheme for sustainability of data centers: An analysis on renewable energy sources and electric vehicles participation. Journal of Parallel and Distribed Computing,  228-245, vol. 117, 2018 Gagangeet Singh Aujla, Neeraj Kumar 1.93
156 Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios IEEE Communications Magazine, 56 (4), 120-128, 2018 Vishal Sharma, Dushantha Nalin K. Jayakody, Ilsun You, Ravinder Kumar, Jun Li 10.435
157 Secure Message Communication Protocol Among Vehicles in Smart City IEEE Transactions on Vehicular Technology, 4359-4373, vol. 67, 2018 Amit Dua, Neeraj Kumar, Ashok Kumar Das, Willy Susilo 4.066
158 Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud Transactions on Emerging Telecommunications Technologies, Page 1-21, e3309, 2018 Tarunpreet Bhatia, Anil Kumar Verma, Gaurav Sharma 1.535
159 Semi-automatic leaf disease detection and classification system for soybean culture IET Image Processing, Page number 1038 – 1048 & Volume 12, Issue 6, 2018 Sukhvir Kaur, Shreelekha Pandey, Shivani Goel 1.044
160 Sharing Two True Color Images using (3,3) Extended Visual Cryptography Technique Journal of Modern Optis, 2018 Kirti Dhiman and Singara Singh Kasana 1.267
161 Temporality Based Sentiment Analysis using Linguistic Rules and Meta-Data Proceedings of the National Academy of Sciences, India Section A: Physical Sciences , pp. 1-9, 2018 Sukhnandan Kaur, Rajni Mohana 0.47
162 UNLization of Punjabi text for natural language processing applications Sadhana, 43-87, 2018 Vaibhav Agarwal, Parteek Kumar 0.4650

Year 2016-17 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 Cloud-based automatic test data generation framework Journal of Computer and System Sciences,Vol. 82, no. 5, PP. 712–738, 2016 Priyanka Chawla, Inderveer Chana and Ajay Rana 1.1380
2 Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi Neural Computing and Applications, 2016 Karun Verma, RK Sharma 1.4920
3 An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition Journal of Engineering Research,4(1), 1-20, 2016 Teena Mitaal, R. K. Sharma 0.1280
4 Green Service Level Agreement (GSLA) Framework for Cloud Computing Computing, Springer,Volume 98, Issue 9, pp 949–963, 2016 Goyal, S. ; Bawa, S. ; Singh, B 0.8720
5 Comparative analysis of cloud data integrity auditing protocols Journal of Network and Computer Applications, Vol. 66 Issue C, May 2016, pp 17-32.,2016 Neeru Garg, Seema Bawa 2.3310
6 Energy optimized resource scheduling algorithm for private cloud computing International Journal of Ad Hoc and Ubiquitous Computing,Vol. 23, Issue 1-2, 2016 S. Goyal, S. Bawa and B. Singh 0.4930
7 Detecting And Containing Malicious Services In An Intercloud Environment Journal of Web Engineering,Vol. 15, No.5&6 (Apr 2016), pp: 521-538, 2016 Lohit Kapoor, Seema Bawa, Ankur Gupta 0.3900
8 Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy ACM Computing Surveys,Volume 48 Issue 2, Article 22, 2016. Tarandeep Kaur and Inderveer Chana 3.7300
9 EARTH- Energy-aware Autonomic Resource Scheduling in Cloud Computing Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 Sukhpal Singh and Inderveer Chana 1.8120
10 Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach Journal of Grid Computing,Volume 14, Issue 2, pp. 327–345, 2016 Nidhi Jain Kansal, Inderveer Chana 1.5070
11 Energy aware scheduling of deadline-constrained tasks in cloud computing Journal of Cluster Computing,Volume 19, Issue 2, pp 679–698, 2016 Tarandeep Kaur and Inderveer Chana 1.5000
12 Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks Mobile Information Systems, 2016 Vishal Sharma, Ilsun You, Rajesh Kumar 0.8720
13 A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks  International Journal of Ad Hoc and Ubiquitous Computing, Vol. 21, issue 2, pp. 140–155, 2016 Suman Bala, Anil K. Verma 0.6900
14 Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wireless Personal Communications,Vol. 89 No.2, 1-21, 2016 Goyal, Nitin, Mayank Dave, and Anil Kumar Verma 0.6500
15 Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks Transactions on Internet & Information Systems,Vol. 10 Issue 4, p1571-1589, 2016 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.5600
16 A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. Digital Scholarship in the humanities, 2016 Agarwal, Vaibhav, and Parteek Kumar 0.4300
17 Fuzzy state Grammar and Fuzzy Deep Pushdown Automata Journal of Intelligent and Fuzzy Systems,31(1), 249-258, 2016 Nidhi Kalra, Ajay Kumar 1.0040
18 An efficient scheme for automatic web pages categorization using the support vector machine The New Review of Hypermedia and Multimedia,vol. 22, no. 3, pp. 223-242, 2016 Vinod Kumar Bhalla, Neeraj Kumar 0.6500
19 A Recursive Algorithm for Generalized Constraint SCS Problem National Academy Science Letters,pp 273-276, 2016 Kaish Mangal and Ravinder Kumar 0.3450
20 Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling An International Journal Applied Mathematics & Information Sciences,1193-1201; 2016 Sandeep Saharan and Ravinder Kumar 1.2320
21 A systematic review of approaches for testing concurrent programs Concurrency and Computation: Practice And Experience,Vol. 5, pp. 1572 – 1611 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.9400
22 Conversion of fuzzy automata into fuzzy regular expressions using transitive closure Jounal of Intelligent & Fuzzy Systems vol.30,pp.3123-3129, 2016 Sunita Garhwal and Ramjiwari 1.0040
23 An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar 0.1710
24 Block based High Capacity Multilevel Image Steganography Journal of Circuits, Systems and Computers, pp 1-21, 2016 Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia 0.3300
25 Multi-Model Persistent Solution for Healthcare Big Data Journal of Medical Imaging and Health Informatics, 2016 Karamjit Kaur and Rinkle Rani 0.5800
26 A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering, 2016 Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin 1.0840
27 A Survey on Resource Scheduling in Cloud Computing Issues and Challenges Journal of Grid Computing,Vol 14, no. 2, pp 217–264, 2016 Sukhpal Singh and Inderveer Chana 1.5000
28 A Hybrid-Cascaded Framework for PET and SPECT Image Reconstruction Journal of Medical Imaging & Health Informatics (JMIHI) Vol. 6, 2016 Shailendra Tiwari, Rajeev Srivastava 0.8770
29 A genetic algorithm based distance-aware routing protocol for wireless sensor networks Computers & Electrical Engineering,vol. 56, pp. 441-455, 2016 Tarunpreet Bhatia, Simmi Kansal Shivani Goel, A. K. Verma 1.5700
30 Progressive Visual Cryptography with Unexpanded Meaningful Shares In ACM Transactions on Multimedia Computing Communication and Application, Vol 12(4), 2016 Shivendra Shivani, Suneeta Agarwal 2.2500
31 Novel Basis Matrix Creation and Preprocessing Algorithms for Friendly Progressive Visual Secret Sharing with Space-Efficient Shares MULTIMEDIA TOOLS AND APPLICATIONS , 2016 Shivendra Shivani, Suneeta Agarwal 1.5300
32 VPVC: Verifiable Progressive Visual Cryptography Pattern Analysis and Application,Vol 19, No. 3. , 2016 Shivendra Shivani, Suneeta Agarwal 1.3500
33 Self authenticating medical X-ray images for telemedicine applications MULTIMEDIA TOOLS AND APPLICATIONS, 2016 Rajitha B, Shivendra Shivani, Suneeta Agarwal 1.5300
34 Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System Computers & Electrical Engineering 52: 82-97, 2016 Rasmeet S. Bali, Neeraj Kumar 1.5700
35 An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud Peer-to-Peer Networking and Applications 9(5): 824-840, 2016 Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal 1.2620
36 A novel covert channel detection method in cloud based on XSRM and improved event association algorithm Security and Communication Networks 9(16): 3543-3557, 2016 Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao 1.0670
37 A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography Security and Communication Networks 9(17): 3944-3951, 2016 Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues 1.0670
38 Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures IEEE -Trans. Information Forensics and Security 11(9): 2052-2064, 2016 Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu 4.3320
39 A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem The Journal of Supercomputing 72(9): 3588-3600, 2016 Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti 1.3260
40 Fuzzy-based trust prediction for effective coordination in vehicular ad hoc networks International Journal Of Communication Systems, 2016 Avleen Kaur Malhi, Shalini Batra 1.0660
41 Improved Multi-Objective Particle Swarm Optimization Algorithm for Optimizing Watermark Strength in Color Image Watermarking Applied Intelligence, 2016 Nitin Saxena and K.K. Mishra 1.9040
42 A Nature Inspired Hybrid Optimization Algorithm for Dynamic Environment with Real Parameter Encoding International Journal of Bio-Inspired Computation, 2016 Ashish Tripathi, Nitin Saxena, K. K. Mishra and A. K. Misra 1.3900
43 A parallel fuzzy clustering algorithm for large graphs using Pregel Expert Systems with Applications,Vol. 78, pp. 135-144, 2016 Vandana Bhatia and Rinkle Rani 3.9300
44 A Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks Journal of communications and Networks,Vol. 18, No. 6, pp. 938-947, 2016 Anjali Anand, Rinkle Rani and Himanhsu Aggarwal 1.1300
45 Content-based image retrieval embedded with agglomerative clustering built on information loss Computers & Electrical Engineering 54,506-521, 2016 Shreelekha Pandey, Pritee Khanna 1.5700
46 Clustering of hierarchical image database to reduce inter-and intra-semantic gaps in visual space for finding specific image semantics Journal of Visual Communication and Image Representation,704-720, (2016) Shreelekha Pandey, Pritee Khanna, Haruo Yokota 2.1640
47 A semantics and image retrieval system for hierarchical image databases Information Processing & Management,571-591, 2016 Shreelekha Pandey, Pritee Khanna, Haruo Yokota 2.1640
48 G-FANET: An Ambient Network Formation Between Ground and UAVs Telecommunication Systems,pp 1-24, 2016 Vishal Sharma, Rajesh Kumar 0.8220
49 A Multi-model Persistent Solution for Healthcare Big Data/td> Journal of Medical Imaging and Health Informatics,pp 937-947, 2016 Karamjit Kaur, Rinkle Rani 0.9000
50 EMD based Steganography Techniques for JPEG2000 Images and Videos International Journal of Wavelets, Multiresolution and Information Processing, pp. 937-947, 2016 Karamjit Kaur, Rinkle Rani 0.9000
51 Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN AEU-International Journal of Electronics and Communications, 2016 Ramnik Singh, A K Verma 0.7860
52 A Novel Framework for Grading Writers using Offline Gurmukhi Characters Proceedings of the National Academy of Sciences, India Section A: Physical Sciences,405-15, 2016 Munish Kumar, R. K. Sharma and M. K. Jindal 0.1790
53 Integrated search technique for parameter determination of SVM for speech recognition Journal of Central South University, 2016 Teena Mitaal, R. K. Sharma 0.5200
54 A note on data mining based noise diagnosis and fuzzy filter design for image processing Computers and Electrical Engineering,49-, 50, 2016 Rajiv Kumar, Khushneet Jindal 1.0840
55 Multicast protection and grooming scheme in survivable WDM optical networks International Journal of Communication System,42-57, 2016 Ashok Kumar, Pradhan, SayanGhose, Tanmay de 1.8600
56 Node stability aware single node failure recovery approach for WSANS MJC,Vol. 29, No. 2, 2016 V Ranga, M Dave, AK Verma 0.4000
57 One-to-many authentication for access control in mobile pay-TV systems SCIENCE CHINA Information Sciences 59(5), 2016 Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee 1.6280
58 Optimal nodes selection in wireless sensor and actor networks based on prioritized  mutual exclusion approach Kuwait Journal of Science,vol. 43, pp. 150-173, 2016. Virendra Ranga, M Dave, A K Verma 0.5000
59 PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks Wireless Personal Communications,Volume 87, Issue 3, pp 995–1012,2016 Gaurav Sharma, Suman Bala, Anil K. Verma 0.6500
60 Prediction based proactive load balancing approach through VM migration. Engineering with Computers,581-592, 2016 AnjuBala and Inderveer Chana 1.4600
61 Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming Advances in Materials Science and Engineering, 2016 Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar 1.010
62 Prediction-based proactive load balancing approach through VM migration Engineering with Computers,pp. 581-592, 2016 Anju Bala, Inderveer Chana 1.4510
63 Predictive hierarchical human augmented map generation for itinerary perception IET Electronic Letters, Vol 52, 2016 Baljeet Kaur and Jhilik Bhattacharaya 0.9400
64 Protein structure prediction (RMSD <= 5A") using machine learning models International Journal of Data Mining and Bioinformatics,71-85, 2016 Y Pathak, PS Rana, PK Singh and M Saraswat 0.7000
65 QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review/td> ACM Computing Surveys, 2016 Sukhpal Singh and Inderveer Chana 3.7300
66 Quantum neural network based machine translator for English to Hindi Applied Soft Computing 38,1060–1075, 2016 Ravi Narayana, S. Chakraverty, V.P. Singh 2.8000
67 Regression Based Weight Generation Algorithm in Neural Networks for Estimation of Frequencies of Vibrating Plate Journal of Computer Methods in Applied Mechanics and Engineering,4194-4202, 2016 S. Chakraverty, V. P. Singh and R. K. Sharma 3.4600
68 Resource Provisioning and Scheduling in Clouds: QoS Perspective The Journal of Supercomputing,Vol. 72, no. 3, pp 926–960, 2016 Sukhpal Singh and Inderveer Chana 0.8500
69 Secure clustering for efficient data dissemination in vehicular cyber-physical systems Future Generation Comp. Syst. 56: 476-492, 2016 Rasmeet S. Bali, Neeraj Kumar 3.9970
70 Security analysis and design of an efficient ECC based two-factor password authentication scheme Security and Communication Networks, 2016 Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin 0.8060
71 Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs IEEE Communications Letters,Volume: 19, Issue: 11, 2016 Vishal Sharma, Rajesh Kumar, Prashant Singh 1.2910
72 Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis The Journal of Supercomputing, pp. 1–28,2016 Rajkumar Tekchandani, Rajesh Bhatia and Maninder Singh 1.3260
73 SERVmegh: framework for green cloud Concurrency and Computation, 2016 Ashok Kumar, Anju Sharma, Rajesh Kumar 0.9420
74 SOCCER: Self-Optimization of Energy-efficient Cloud Resources Cluster Computing , Vol. 19, no. 4, pp. 1787-1800, 2016 Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya 1.1540
75 Software component and the semantic Web: An in-depth content analysis and integration history Journal of System and Software, Vol.125, pages152-169, 2016. Loveleen Kaur, Ashutosh Mishra 2.4440
76 Speech recognition using ANN and predator influenced civilized swam optimization algorithm Turkish Journal of Electrical Engineering & Computer Sciences 24, 4780-803, 2016 Teena Mitaal, R. K. Sharma 0.5070
77 State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids Current Bioinformatics, 11(4), 470-479, 2016 Nidhi Kalra, Ajay Kumar 0.7700
78 Statistical Feature Extraction Based Iris Recognition System Sadhana-Academy Proceedings in Engineering Sciences, 507-18, 2016 Atul Bansal, R. Agarwal and R. K. Sharma 0.5870
79 Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks International Journal of Communication Systems, pp 1-25, 2016 Vishal Sharma, Rajesh Kumar 1.0990
80 Three Tier Neural Model For Service Provisioning Over Collabrative Modulus Operator for Digital Images Neural Computing and Applications, pp. 1-21, 2016 Vishal Sharma, Rajesh Kumar 1.4920
81 UAV Assisted Capacity Enhancement In Heterogenous Networks IEEE Communications Letters,Volume: 20, Issue: 6, Pages: 1207 - 1210, 2016 Vishal Sharma, Mehdi Bennis, Rajesh Kumar 1.2910
82 UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks International Journal of Ad Hoc and Ubiquitous Computing, 2016 Vishal Sharma, Rajesh Kumar 0.4930
83 Vehicular delay-tolerant networks for smart grid data management using mobile edge computing IEEE Communications Magazine54(10): 60-66, 2016 Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues 10.4350
84 Wireless and Mobile Technologies for the Internet of Things Mobile Information Systems , 2016 Wireless and Mobile Technologies for the Internet of Things 0.8490
85 Job Migration Policies for Grid Environment Wireless Personal Communication, 2016 Neeraj Kumar Rathore and Inderveer Chana 0.951

Year 2015-16 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi Neural Computing and Applications, 27(3), 2016 Karun Verma, R. K. Sharma 1.492
2 An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition Journal of Engineering Research, 4(1), 1-20, 2016 Teena Mitaal, R. K. Sharma 0.128
3 Quantitative Reduction in Communication Load for Energy Efficiency in WSN Wireless Personal Communications (WPC), Vol. 83, Number (4), August (II) 2015, pp.1-16. Vandana Jindal, A.K. Verma, Seema Bawa 0.693
4 QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks Mobile Network and Applications, December 2015, Volume 20, Issue 6, pp 773–780 Amit Dua, Neeraj Kumar, Seema Bawa 1.045
5 Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud International Journal of Next-Generation Computing, Vol. 6, No. 3, November 2015 Lohit Kapoor, Seema Bawa, Ankur Gupta 0.3
6 Green Service Level Agreement (GSLA) Framework for Cloud Computing Computing, Springer, Volume 98, Issue 9, pp 949–963 Goyal, S. ; Bawa, S. ; Singh, B 0.872
7 Comparative analysis of cloud data integrity auditing protocols, Journal of Network and Computer Applications, Elsevier, Vol. 66 Issue C, May 2016, pp 17-32. Neenu Garg, Seema Bawa 2.331
8 Energy optimized resource scheduling algorithm for private cloud computing International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. S. Goyal, S. Bawa and B. Singh 0.493
9 Detecting And Containing Malicious Services In An Intercloud Environment Journal of Web Engineering, Vol. 15, No.5&6 (Apr 2016), pp: 521-538. Lohit Kapoor, Seema Bawa, Ankur Gupta 0.39
10 Q-aware: Quality of Service based Cloud Resource Provisioning Computers & Electrical Engineering Journal, Elsevier, October 2015, Vol. 47, Pages 138–160 Sukhpal Singh and Inderveer Chana 0.817
11 Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy ACM Computing Surveys (CSUR) Volume 48 Issue 2, February 2016 Article No. 22 Tarandeep Kaur and Inderveer Chana 3.73
12 EARTH- Energy- aware Autonomic Resource Scheduling in Cloud Computing Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 Sukhpal Singh and Inderveer Chana 1.812
13 QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review ACM Computing Surveys (CSUR) Volume 48 Issue 3, Article No. 42 Sukhpal Singh and Inderveer Chana 3.73
14 Prediction-based proactive load balancing approach through VM migration Engineering with Computers, Springer, pp. 581-592 , January 2016 Anju Bala, Inderveer Chana 1.451
15 Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach Journal of Grid Computing, Springer, June 2016, Volume 14, Issue 2, pp. 327–345 2016, Nidhi Jain Kansal, Inderveer Chana 1.507
16 Energy aware scheduling of deadline-constrained tasks in cloud computing Journal of Cluster Computing,June 2016, Volume 19, Issue 2, pp 679–698 Tarandeep Kaur and Inderveer Chana 1.5
17 Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks International Journal of Communication Systems DOI: 10.1002/dac.3144 Year: 2016 Vishal Sharma, Rajesh Kumar 1.099
18 Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks IMobile Information Systems Volume: 2016 Year: 2016 Vishal Sharma, Mehdi Bennis, Rajesh Kumar 0.872
19 UAV Assisted Capacity Enhancement In Heterogenous Networks IEEE Communications Letters Year: 2016 Volume: 20 Issue: 6 Pages: 1207 - 1210 VVishal Sharma, Mehdi Bennis, Rajesh Kumar 1.291
20 Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs IIEEE Communications Letters Year: 2016 Volume: 19 Issue: 11 Pages: 2013 – 2016 Vishal Sharma, Rajesh Kumar, Prashant Singh 1.291
21 SERVmegh: framework for green cloud Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3903 Ashok Kumar, Anju Sharma, Rajesh Kumar 0.942
22 Strategies For Replica Consistency In Data Grid – A Comprehensive Survey Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3907 Priyanka Vashisht, Anju Sharma, Rajesh Kumar 0.942
23 Pairing-Free CertificateLess Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor networks Wireless Personal Communications, Vol. 84, Issue 2, pp. 1469-1485, Springer Gaurav Sharma, Suman Bala, Anil K. Verma 0.65
24 PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks Wireless Personal Communications, April 2016, Volume 87, Issue 3, pp 995–1012 Springer AGaurav Sharma, Suman Bala, Anil K. Verma 0.65
25 A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 21, issue 2, pp. 140–155, March, 2016 Suman Bala, Anil K. Verma 0.69
26 Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wireless Personal Communications: 1-21 Vol. 89 No.2 Goyal, Nitin, Mayank Dave, and Anil Kumar Verma 0.65
27 Relay node placement to heal partitioned wireless sensor networks Computers & Electrical Engineering 48, 371-388 V Ranga, M Dave, AK Verma 1.1
28 Node stability aware single node failure recovery approach for WSANS MJCS Vol. 29, No. 2, 2016 V Ranga, M Dave, AK Verma 0.4
29 A Novel Resource Reservation Scheme for Mobile PHEVs in V2G Environment using Game Theoretical Approach IEEE Transactions on Vehicular Technology, vol. 64, pp. 5653-5666, Dec. 2015 Kuljeet Kaur, Amit Dua, Anish Jindal, Neeraj Kumar, Mukesh Singh, Alexy Vinel 2.243
30 An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing Cluster Computing, vol. 18, pp. 1263–1283, Sept. 2015 Neeraj Kumar, Jaskaran Preet Singh, Rasmeet S. Bali, Sudip Misra, Sana Ullah 1.514
31 Cooperation strategies for vehicular delay-tolerant networks IEEE Communications Magazine, vol. 53, pp. 88-94, Dec. 2015 Joao A. F. F. Dias, Joel J. P. C. Rodrigues, Neeraj Kumar, Kashif Saleem 5.125
32 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Information Sciences, vol. 321, pp. 263-277, Nov. 2015 Debiao He, Neeraj Kumar, Naveen Chilamkurti 3.364
33 A systematic review on heterogeneous routing protocols for wireless sensor network Journal of Network and Computer Applications, vol. 53, pp. 39-56, July 2015 Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues 2.331
34 Reliable multicast as a Bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata-based approach International Journal of Ad Hoc and Ubiquitous Computing, vol. 19, pp. 168-182, 2015 Neeraj Kumar, Chun-Cheng Lin 0.5
35 A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments Multimedia Tools and Applications, vol. 74, pp. 6365-6377, Aug. 2015 Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo 1.331
36 Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network Pervasive and Mobile Computing, vol. 22, pp. 90-112, Sept. 2015 Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues 1.719
37 Efficient provably secure password-based explicit authenticated key agreement Pervasive and Mobile Computing, vol. 24, pp. 50-60, Dec. 2015 Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee 1.719
38 Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks IEEE Systems Journal, vol. 9, pp. 1081-1090, Aug. 2015 Neeraj Kumar, Sudip Misra, Mohammad S. Obaidat 2.114
39 QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks IEEE Transactions on Industrial Electronics, vol. 62, pp. 7892-7900, Dec. 2015 Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues 6.383
40 Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems The Journal of Supercomputing, vol. 71, pp. 3258-3287, Sept. 2015 Neeraj Kumar, Rasmeet Singh Bali, Rahat Iqbal, Naveen Chilamkurti, Seungmin Rho 1.088
41 Cooperative Gateway Cache Invalidation Scheme for Internet-Based Vehicular Ad Hoc Networks Wireless Personal Communications, vol. 85, pp. 1789-1814, Dec. 2015 Rajeev Tiwari, Neeraj Kumar 0.701
42 A Smart Polyglot Solution for Big Data in Healthcare IEEE, IT Professional, Volume 17, Issue 6, pp. 48-55, 2015 Karamjit Kaur and Rinkle Rani 1.067
43 A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks Transactions on Internet and Information Systems Vol 9, No. 11, pp. 4701-4719, 2015 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.56
44 Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks Transactions on Internet & Information Systems, Vol. 10 Issue 4, p1571-1589, 2016 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.56
45 A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. April, 2016 Agarwal, Vaibhav, and Parteek Kumar 0.430
46 Quantum neural network based machine translator for English to Hindi Applied Soft Computing 38, 1060–1075, (2016) Ravi Narayana, S. Chakraverty, V.P. Singh 2.8
47 Fuzzy State Grammar and Fuzzy Deep Pushdown Automata AJournal of Intelligent and Fuzzy Systems, 31(1), 249-258, 2016 Nidhi Kalra, Ajay Kumar 1.004
48 State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids Current Bioinformatics, 11(4), 470-479, 2016 Nidhi Kalra, Ajay Kumar 0.77An efficient scheme for automatic web pages categorization using the support vector machine
49 An efficient scheme for automatic web pages categorization using the support vector machine The New Review of Hypermedia and Multimedia, vol. 22, no. 3, pp. 223-242, 2016 Vinod Kumar Bhalla, Neeraj Kumar 0.65
50 An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks Wireless Personal Communications, In Press, DOI:10.1007/s11277-016-3173-4. Vinod Kumar Bhalla, Neeraj Kumar 0.97
51 A Recursive Algorithm for Generalized Constraint SCS Problem National Academy Science Letters 39 (4), pp 273-276 2016 Kaish Mangal and Ravinder Kumar 0.345
52 Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling An International Journal Applied Mathematics & Information Sciences 10 (3), pp 1193-1201 Sandeep Saharan and Ravinder Kumar 1.232
53 A systematic review of approaches for testing concurrent programs Concurrency and Computation: Practice And Experience, Vol. 5, pp. 1572 – 1611, 2016 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.94
54 Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton The Computer Journal bxv104,2015 Sunita Garhwal and Ramjiwari 1.0
55 Conversion of fuzzy automata into fuzzy regular expressions using transitive closure Jounal of Intelligent & Fuzzy Systems vol.30, pp.3123-3129,2016 Sunita Garhwal and Ramjiwari 1.004
56 Predictive hierarchical human augmented map generation for itinerary perception IET Electronic Letters, Vol 52, 2016 Baljeet Kaur and Jhilik Bhattacharaya 0.94
57 An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar IF=0.177
58 Protein structure prediction (RMSD ≤ 5A°) using machine learning models International Journal of Data Mining and Bioinformatics, Inderscience, 14(1):71-85, 2016. Y Pathak, PS Rana, PK Singh and M Saraswat 0.7
59 Block based High Capacity Multilevel Image Steganography Journal of Circuits, Systems and Computers, Vol. 25,No.8,pp.165009(1-21),2016 Kasana, Kulbir Geeta Singh and Satvinder Singh Bhatia 0.33
60 Multi-Model Persistent Solution for Healthcare Big Data Journal of Medical Imaging and Health Informatics, Volume 6, Page nos 937–947 (2016) Karamjit Kaur and Rinkle Rani 0.58
61 Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming Advances in Materials Science and Engineering Volume 2016 (2016), Article ID 7648467, 10 pages http://dx.doi.org/10.1155/2016/7648467 Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar 1.010
62 A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering, In press, 2016 Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin 1.084
63 Security analysis and design of an efficient ECC based two-factor password authentication scheme Security and Communication Networks, In press, 2016 Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin 1.084
64 Resource Provisioning and Scheduling in Clouds: QoS The Journal of Supercomputing, Vol. 72, no. 3, pp 926–960, 2016 Sukhpal Singh and Inderveer Chana 0.85
65 A Survey on Resource Scheduling in Cloud Computing Issues and Challenges Journal of Grid Computing, Vol 14, no. 2, pp 217–264, 2016 Sukhpal Singh and Inderveer Chana 1.50
66                   A systematic review of approaches for testing concurrent programs Concurrency and computation: practice and experience, Vol 28 pp 1572-1611, 2015 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.997
67        Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection Neural Computing and Applications, Vol 26, pp 117-130 Amit Kumar Bhardwaj, Maninder Singh 1.56

Year 2014-15 (SCI)

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata The Computer Journal 10.1093/comjnl/bxu049doi, 2014 Ajay Kumar and Anil Kumar Verma
2.        Improvement in Rebalanced CRT RSA International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5492, Impact Factor: 0.39 Seema Verma Deepak garg;;
3.        Selectivity Estimation of range queries in Data Streams using Micro-clustering International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5856, Impact Factor: 0.39 Sudhanshu Gupta; Deepak garg;
4.        Who Regulates Ethics in Virtual world? Science and engineering ethics Volume 21, no. 1 (2014): pp. 19-28. Seemu Sharma;Hitashi Lomash; and Seema bawa
5.        Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata using Partial Derivatives Chiang Mai Journal of Science Volume 41(5), pp. 1409-1418, 2014 Ajay Kumar; Anil Kumar Verma;
6.        A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata Applied Mathematics, Volume 8(1), pp. 95-105, 2014 Ajay Kumar; Anil Kumar Verma;
7.        Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Applied Mathematics, Volume 8(5), pp. 2389-2393, 2014 Tannu Singla;Ajay Kumar;Sunita Garhwal;
8.        A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs WPC, Springer, Volume 77 pp. 2155-2182, 2014 V Ranga;M Dave; and Anil verma
9.        OANTALG: An Orientation based ANT colony ALGorithm for Mobile Adhoc Networks WPC, Springer, Volume 77 pp. 1859-1884, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
10.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs JNCA, Volume 45 151-167, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
11.    Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem International Arab Journal of Information Technology Volume 11 No 5, 2014 Rattan Rana; and  Deepak garg
12.    Cloud based intelligent system for delivering health care as a service Computer Methods and Programs in Biomedicine, Springer, Volume 113, pp. 346-359, 2014 Pankajdeep Kaur; and Inderveer Chana
13.    A resource elasticity framework for QoS-aware execution of cloud applications FGCS, Volume 37, pp. 14-35, 2014 Pankajdeep Kaur; and Inderveer Chana
14.    Variable Threshold Based Hierarchical Load Balancing Technique in Grid Engineering with computers, springer, Volume 30, 2014 Neeraj Rathore; and Inderveer Chana
15.    Artificial bee colony based energy-aware resource utilization technique for cloud computing CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,, Volume 24, DOI: 10.1002/cpe.3295, 2014 Nidhi Jain Kansal; and Inderveer Chana
16.    Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 21-35, 2014 Neeraj Rathore; and Inderveer Chana
17.    SHAPEâ¿¿an approach for self-healing and self-protection in complex distributed networks The Journal of Supercomputing, Volume 67, pp. 585-613, 2014 Inderpreet Chopra; and Maninder singh
18.    Software clone detection: a systematic review Information and Software technology, Volume 55, pp. 1165-1199, 2014 D Rattan;R Bhatia; and Maninder singh
19.    Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing Frontiers of Computer Science, Volume 8:04, pp. 656-666, 2014 Shi W., Gong P., Zhang Z.; and Neeraj kumar
20.    Learning Automata Based Opportunistic Data Aggregation and Forwarding Scheme for Alert Generation in Vehicular Ad Hoc Networks Computer Communications, Volume 39:01:00, pp. 22-32, 2014 Chilamkurti N., Rodrigues J.J.P.C.; and Neeraj kumar
21.    A two factor authentication scheme for Roaming Service in Global Mobility Networks IEEE Transactions on consumer Electronics, Volume 59:04:00, pp. 811-817 He D.B., Khan M.K., Lee J.K.; and Neeraj kumar
22.    An efficient Password based Three party Authenticated Multiple Key Exchange Protocol for Wireless Networks The Journal of Supercomputing, Volume 70:01:00, pp. 224-235, 2014 ;TIET H, He D, Kim J.; and Neeraj kumar
23.    A Peer-to-Peer Cooperative Caching Scheme for Data Dissemination in Urban Scenarios Using Vehicular Ad Hoc Networks IEEE Systems Journal, Volume 8:04, pp. 1136-1144, 2014 Lee H. J.; and Neeraj kumar
24.    EEMHR: Energy Efficient Multi-levels Heterogeneous Routing Protocol for Wireless Sensor Networks International Journal of Communication Systems Volume 27:09:00 pp. 1289-1318, 2014 Tanwar S;Niu J.; and Neeraj kumar
25.    Detection and Analysis of Secure Intelligent Universal Designated Verifier Signature Scheme for Electronic Voting System The Journal of Supercomputing Volume 70:01:00 pp. 177-199, 2014 Zho L;Tu Hang;Singh A;Chilamkurti N;Rho S; and Neeraj kumar
26.    Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol Journal of Medical Systems Volume 38:116, 2014 He D;Chilamkurti N;Lee J.H.; and Neeraj kumar
27.    LA-EEHSC: Learning Automata based Energy Efficient Heterogeneous Selective Clustering for Wireless Sensor Networks Journal of Networks and Computer Applications Volume 46:11:00 pp. 264-279, 2014 ;Tyagi S;Deng D.J.; and Neeraj kumar
28.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs Journal of Networks and Computer Applications Volume 45 pp. 151-167, 2014 Singh G, Verma A.K.; and Neeraj kumar
29.    Collaborative Trust aware Intrusion Detection in VANETs Computers and Electrical Engineering Volume 40:06:00 pp. 1981-1996, 2014 Chilamkurti N; and Neeraj kumar
30.    Achieving QoS using Resource Allocation and Adaptive Scheduling in Cloud Computing with Support from Grid The Computer Journal Volume 57:02:00 pp. 281-290, 2014 Chilamkurti N., Zeadally S., Jeong Y.S.; and Neeraj kumar
31.    OANTALG: Orientation based ant colony algorithm for MANETs Wireless Personal Communications Volume 77:03:00 pp. 1859-1884, 2014 Singh G, Verma A.K.; and Neeraj kumar
32.    Enhanced Three-factor Security Protocol for USB Consumer Storage Devices IEEE Transactions on consumer Electronics Volume 60:01:00 pp. 30-37, 2014 He D., Khan M.K., Lee J.H; and Neeraj kumar
33.    Bayesian Coalition Game for Contention-aware Reliable Data Forwarding in Vehicular Mobile Cloud Future Generation Computer Systems :10.1016/j.future.2014.10.013, 2014 Iqbal R, Misra S.,Rodrgues J.J.P.C.; and Neeraj kumar
34.    Networks of learning automata for the vehicular environment: a performance analysis study IEEE Wireless Communication Volume 21:06 pp. 41-47, 2014 Misra S, Obaidat M.S., Rodrigues J.J.P.C., Pati B; and Neeraj kumar
35.    An intelligent approach for building a secure decentralized public key infrastructure in VANET Journal of Computer and System Sciences 10.1016/j.jcss.2014.12.016, 2014 Iqbal R, Misra S.,Rodrigues J.J.P.C.; and Neeraj kumar
36.    Power Consumption Based Simulation Model for Mobile Ad-hoc Network J. Wireless Personal communications Volume 77 pp. 1437-1448, 2014 Krishan Kumar; and Vp singh

Year 2013-14 (SCI)

List of research publications in SCI/Impact Factor journals  

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing, pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information,  Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013  Kottayam, Kerala, India Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions International Conference on Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective International Conference on Advances in Computing, Bangalore, 3-4 July, 2012, Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava    
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management Proc. Springer Conf. on Trends in Information, Telecommunication and Computing (ITC2012)LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhawa

Year 2012-13 (SCI)

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors Impact Factor
1.        Software clone detection: A systematic review Information and Software Technology Volume 55, Issue 7, July 2013, Pages 1165–1199 Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh 1.9
2.        CFM-PREFIXSPAN: A Pattern Growth Algorithm Incorporating Compactness And Monetary International Journal of Innovative computing, Information and Control Volume 8, Number 7(A),  2012 pp. 4509-4520 Bhawna Mallick , Deepak Garg and PS Grover 1.9
3.        Publish/subscribe based information dissemination over VANET utilizing DHT Frontiers of Computer Science December 2012, Volume 6, Issue 6 pp 713-724 Tulika Pandey, Deepak Garg, Manoj Madhav Gore 0.298
4.        Progress in gene prediction: Principles and challenges Current Bioinformatics Apr 2013, Vol. 8, No. 2 Srabanti Maji, Deepak Garg 2.017
5.        Progressive CFM-Miner: An Algorithm to Mine CFM- Sequential Patterns from A Progressive Database International Journal of Computational Intelligence Systems Vol. 6, No. 2 Mar, 2013, 209-222 Bhawna Mallick Deepak Garg P S Grover 1.49
6.        Incremental Mining of Sequential Patterns: Progress and Challenges Intelligent Data Analysis- an International Journal, , Volume 17, Number 3, May 2013 Bhawna Mallick Deepak Garg, PS Grover 0.448
7.        Hidden markov model for splicing junction sites identification in DNA sequences, Current Bioinformatics Vol. 8 Issue 3 pp. 369-379, 2013 Srabanti Maji and Deepak Garg 2.017
8.        Predictors of User Satisfaction in ERP in Technical Educational Institutions Information, An International Interdisciplinary Journal,  pp.2885-2894 Vol.16, No.5 Shivani Goel, Ravi Kiran, Deepak Garg 0.2
9.        Ant colony algorithms in MANETs: A review Journal of network and computer applications Gurpreet Singh, Neeraj Kumar, Anil K Verma 1.065
10.    Knowledge sharing for stimulating learning environment in institutions of higher technical education Technics Technology Education Management, 7(4), 1681-1691 Parul Dharmani, Ravi Kiran, Anil K Verma 0.351
11.    Network partitioning recovery mechanisms in WSANs: A survey Wireless personal communications, Vol. 72, No. 2, pp.857-917 Virendra Ranga, ,M Dave, Anil K Verma 0.458
12.    On the Security of Certificateless Signature Schemes International Journal of Distributed Sensor Networks, 2013 Gaurav Sharma, Suman Bala, Anil K Verma 0.727
13.    QoS based Resource Provisioning and Scheduling in Grids Journal of Supercomputing, Springer , DOI 10.1007/s11227-013-0903-1, March 2013 Aron R., Chana I.       0.578.
14.    Bacterial Foraging based Hyper-heuristic for Resource        Scheduling in Grid Computing   Future Generation Computer Systems (FGCS Vol 29, No 3, pp. 751-762,) Elsevier, March 2013   Rajni, Chana Inderveer   1.978  
15.    Formal QoS Policy based Grid Resource Provisioning Framework Journal of Grid Computing, Vol 10, No 2, pp. 249-264, June 2012, doi: 10.1007/s10723-012-9202, October 2012 Rajni, Chana Inderveer 1.310  
16.    Ant Colony algorithms in MANETs: A Review Journal of Network and Computer Applications, 35:6, 1964-1972, 2012. Gurpreet Singh, Neeraj Kumar, Anil Kumar Verma 1.4
17.    A Systematic Review of A Systematic Review on Clustering and Routing      Techniques based upon LEACH Protocol for Wireless Sensor Networks Journal of Network and Computer Applications, 36:2, 623-645   Sudhanshu Tyagi, Neeraj Kumar   1.4
18.    Load Balancing and Adaptive Scheduling for Data Intensive Prioritized Traffic in Wireless Mesh Networks International Journal of Ad hoc and Ubiquitous Computing, 12: 1, 3-13. Neeraj Kumar, Naveen Chilamkurti, John Hyuk Park, Doo- Soon Park 0.9  
19.    Predictors of User Satisfaction in TEIs Information- An Interdisciplinary Journal, Vol 16 No. 5  pp.2885-2894, May 2013 Shivani Goel, Ravi Kiran, Deepak Garg 0.2
20.    Punjabi DeConverter for generating Punjabi from Universal Networking Language, Springer: Journal of Zhejiang University SCIENCE C, Vol. 14 No. 3,  March 2013: 79-196.   Parteek Kumar, R.K. Sharma 0.308
21.    A Survey of Phishing Email Filtering Techniques IEEE Communications Surveys & Tutorials, vol. PP, issue 99 A. ALmomani,  B. B. Gupta, S. Atawneh, A. Meulenberg, E. ALmomani, 4.8