List of research publications in SCI/Impact Factor journals
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Conference |
---|---|---|---|---|
1. |
Vaibhav Agarwal, Parteek Kumar |
2017 |
IJCNLP |
|
2. |
A Neural Network Based System for Face Identification by a Blind User |
Sergio Carrato, Stefano Marsi, Giovanni Ramponi, Jhilik Bhattacharya, Francesco Guzzi |
2017 |
49TH Annual Meeting Of The Associazione Società Italiana Di Elettronica |
3. |
Arrival Based Deadline Aware Job Scheduling Algorithm in cloud |
Swati Gupta, Kumar R. |
2017 |
4th IEEE International Conference on Signal Processing, Computing and Control (ISPCC 2k17) |
4. |
A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication |
Shivendra Shivani, Priyanka Singh and Suneeta Agarwal |
2017 |
9th International Conference on Computer and Automation Engineering(ICCAE-2017), |
5. |
Flood Susceptibility Mapping using GIS-based Support Vector Machine and Particle Swarm Optimization: A case study in Uttarakhand (India) |
Shruti Sachdeva, Tarunpreet Bhatia, A.K. Verma |
2017 |
Eight International Conference On Computing, Communication And Networking Technologies (ICCCNT) |
6. |
Interference Aware Scheduling of Tasks on Cloud |
S. Setia & R. Kumar |
2017 |
held at JP University Waknaghat, Sept21-23, 20172017 4th International Conference on Signal Processing, Computing and Control (ISPCC) |
7. |
Abstracting Communication Methodology in IoT Sensors to Eliminate Redundancy and Cycles |
Sharad Saxena |
2017 |
ICACDS |
8. |
Image Encryption Using Chaotic Sequence and Flipping |
Priyanka and Ashish Girdhar |
2017 |
ICCCA |
9. |
A Review on Node Replication Attack Identification Schemes in WSN |
Harpreet Kaur, Sharad Saxena |
2017 |
ICCCNT |
10. |
An Efficient algorithm for Sampling of Single Large Graph |
Vandana Bhatia and Rinkle Rani |
2017 |
IEEE 10th International Conference on Contemporary Computing (IC3’2017) |
11. |
A Novel Localized Approach for Efficient delivery of Software Products |
Diksha Hooda and Rinkle Rani |
2017 |
IEEE Fourth International Conference on Signal Processing, Computing and Control, ISPCC-2017 |
12. |
SDN-based Data Center Energy Management System Using RES and Electric Vehicles |
Gagangeet Singh Aujla, Anish Jindal, Neeraj Kumar, Mukesh Singh |
2017 |
IEEE Global Communications Conference (GLOBECOM), |
13. |
FAAL: Fog computing-based patient monitoring system for ambient assisted living |
Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues: |
2017 |
IEEE HealthCom |
14. |
Home-based exercise system for patients using IoT enabled smart speaker |
Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues: |
2017 |
IEEE HealthCom |
15. |
An Efficient Influence based Label Propagation algorithm for Clustering large graphs |
Vandana Bhatia and Rinkle Rani |
2017 |
IEEE International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017), |
16. |
Lagrangian Relaxation for the Vehicle Routing Problem with time windows |
Divya Aggarwal, Ashish Girdhar, Vijay Kumar |
2017 |
IEEE International Conference on Intelligent Computing, Instrumentation & Control Technologies, |
17. |
Classification of cancerous profiles using machine learning |
Aman Sharma and Rinkle Rani |
2017 |
IEEE International Conference on Machine Learning and Data Science |
18. |
INGC: Graph Clustering & Outlier Detection algorithm using Label Propagation |
Vandana Bhatia, Bharti Saneja and Rinkle Rani |
2017 |
IEEE International Conference on Machine Learning and Data Science |
19. |
Sentiment Analysis of Customer Product Reviews Using Machine Learning |
Zeenia Singla, Sukhchandan Randhawa, Sushma Jain |
2017 |
IEEE International Conference on Intelligent Computing and Control(I2c2’17), |
20. |
Student satisfaction: A survey at an Indian University |
Himika, Sukhchandan Randhawa and Maninder Kaur |
2017 |
IEEE International Conference on Intelligent Computing and Control(I2c2’17), |
21. |
Secure Certificateless Proxy Reencryption without Pairing |
Veronica Kuchta, Gaurav Sharma, Rajeev Sahu, Tarunpreet Bhatia, Olivier Markowitch |
2017 |
In Proceedings of 12th International Workshop on Security, International Conference Center Hiroshima, |
22. |
Managing Software Product line using an Ontological Rule Based Framework |
Megha, Shivani Goel, Ajay Kumar and Arun Negi |
2017 |
Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017 International Conference |
23. |
Statistical and Sentiment Analysis of Customer Product Reviews |
Zeenia Singla, Sukhchandan Randhawa, Sushma Jain |
2017 |
International Conference on Computing Communication and Networking Technologies 2017 |
24. |
Churn Prediction in Telecommunication using Machine Learning |
Kriti Mishra and Rinkle Rani |
2017 |
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) |
25. |
Comprehensive Review On Supervised Machine Learning Algorithms |
Hemant Kumar Gianey, Rishabh Choudhary |
2017 |
International Conference on Machine Learning and Data Science (MLDS), Noida |
26. |
ABE based Secure Distributed Storage Scheme for Big Data in Cloud |
Bhawna Jain, Tarunpreet Bhatia, A.K. Verma |
2017 |
International Conference on Smart Technologies in Computer and Communication (SmartTech 2017), |
27. |
Fault Tolerance for scientific applications in cloud |
Suruchi Talwani and Inderveer Chana |
2017 |
International Conference on Telecommunication and Networks (TEL-NET 2017) |
28. |
Feeding a DNN for Face Verification in Video Data acquired by a Visually Impaired User |
Jhilik Bhattacharya , Stefano Marsi , Sergio Carrato , Herbert Frey , and Giovanni Ramponi |
2017 |
MIPRO 2017 CIS - Intelligent Systems,Croatia, |
29. |
Enhanced Grade Diffusion for Node Recovery in Wireless Sensor |
Amandeep Kaur, Sukhchandan Randhawa and Sushma Jain, |
2017 |
Networks IEEE International Conference on Intelligent Computing and Control(I2c2’17), |
30. |
Real-time DNN-based Face Identification for the Blind |
Jhilik Bhattacharya, Francesco Guzzi, Stefano Marsi, Sergio Carrato, andGiovanni Ramponi |
2017 |
Proc. Applications in Electronics Pervading Industry, Environment and Society, ApplePies 2017 |
31. |
Multipath Routing in Wireless Sensor Networks: A Taxonomy and Future Research Directions |
Sukhchandan Randhawa and Sushma Jain |
2017 |
Recent Advances and Applications in Computer Engineering Conference, St. Xavier, Jaipur, 23-25 November 2017 |
32. |
Face as bio-metric password for secure ATM transactions |
Arun Singh, Jhilik Bhattacharya, Shatrughan Modi |
2017 |
Sixth International Conference on Soft Computing for Problem Solving |
33. |
Information Retrieval in Web Crawling Using Population Based, and Local Search Based Meta-heuristics: A Review |
Pratibha Sharma, Jagmeet Kaur, Vinay Arora, and Prashant Singh Rana |
2017 |
Sixth International Conference on Soft Computing for Problem Solving |
34. |
Internet-of-Things:A Survey |
Monika Bharti, Sharad Saxena, Rajesh Kumar |
2017 |
SmartTech 2017, Amity University Rajasthan, Jaipur, India. (SCOPUS, Springer) |
35. |
Obesity Prediction using Ensemble Machine Learning Approaches |
Kapil Jindal, Niyati Baliyan & Prashant Singh Rana |
2017 |
Springer 5th International Conference on Advanced Computing, Networking, and Informatics |
36. |
Ensemble Classifier to Enhance Computer Aided Diagnosis of Parkinson’s Disease |
Harkawalpreet Kaur ,Avleen Kaur Malhi |
2018 |
9th International Conference on Computing,Communication and Networking Technologies |
37. |
Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks |
Nitin Goyal, Mayank Dave, Anil Kumar Verma |
2018 |
Wireless, Intelligent, and Distributed Environment for Communication |
38. |
Computed Tomography Image Reconstruction using Modified One-Step-Late Method |
] Y. Pathak, K.V. Arya and S. Tiwari |
2018 |
11th International Conference on Contemporary Computing (IC3), Aug. 2-4, 2018 Noida, India |
39. |
Demand Response Management Using Lattice-Based Cryptography in Smart Grids |
Santosh Kumar Desai and Amit Dua and Neeraj Kumar and Ashok Kumar Das and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
40. |
Rule Based Fake Currency Detection System |
Harshit Rampal, Shreelekha Pandey |
2018 |
3 rd International Conference on Advancement in Engineering, Applied Science and Management (ICAEASM 2018) |
41. |
Mctope ensemble machine learning framework: A case study of routing protocol prediction. |
Nishtha Hooda, Seema Bawa, and Prashant Singh Rana. |
2018 |
3rd International Conference on Computing, Communication and Security (ICCCS) |
42. |
A Comparative Analysis of Energy Efficient Hierarchical Routing Protocols for Wireless Sensor Networks |
Deepak Mehta, Sharad Saxena |
2018 |
4th International Conference on Computing Sciences (ICCS) |
43. |
An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms |
Loveleen Kaur, Ashutosh Mishra |
2018 |
Advanced Computational and Communication Paradigms ICACCP 2017.Advances in Intelligent Systems and Computing-Springer |
44. |
A robust and secure hybrid reversible data embedding algorithm |
Divya Arora, Anil Kumar Verma |
2018 |
GUCON |
45. |
RCDR: Reliability Control Framework for Data Rate Prediction in Wireless Sensor Networks |
Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana |
2018 |
GUCON |
46. |
A Data-Driven Framework for Survivable Wireless Sensor Networks |
Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana |
2018 |
IC3 |
47. |
Using deep learning to enhance head and neckcancer diagnosis and classification |
Pooja Gupta,Avleen Kaur Malhi |
2018 |
IEEE international conference on Systems, Compu-tation, Automation and Networking |
48. |
The Digital Universe: ChangingParadigms of E-business in India |
Avleen Kaur Malhi, HS Pannu and Anupam Sharma |
2018 |
IEEE International Conferenceon Engineering Innovation |
49. |
A face recognition system using off-the-shelf feature extractors and an Ad-Hoc classifier |
Kaur, B., Bhattacharya, J |
2018 |
IEEE Region 10 Symposium, Tensymp 2018 |
50. |
MPoWS: Merged Proof of Ownership and Storage for Block Level Deduplication in Cloud Storage |
Shivansh Mishra, Surjit Singh, Syed Taqi Ali |
2018 |
IEEE, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
51. |
RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage |
Shivansh Mishra, Surjit Singh, Syed Taqi Ali |
2018 |
IEEE, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
52. |
A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals |
Harjeet Singh, R. K. Sharma, R. Kumar, K. Verma, R. Kumar, and M. Kumar |
2018 |
In: 16th International Conference on Frontiers in Handwriting Recognition |
53. |
Hand Gesture Recognition using Gaussian Threshold and Different SVM Kernels |
Shifali Sharma, Jhilik Bhattacharya, Shatrughan Modi, Prashant Singh Rana |
2018 |
International Conference on Advances in Computer Science and Data Sciences |
54. |
Review of Live Virtual Machine Migration Techniques in Cloud Computing |
Jasteen Kaur, Inderveer Chana |
2018 |
International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET) |
55. |
Autonomous Tagging of Stackoverflow Questions Using Statistical Methods |
Rishabh Bassi, Rohan Piplani, Ravijit Singh Ramana, Jasmeet Singh, Harpreet Singh, Prashant |
2018 |
International Conference on Computer Science, Industrial Electronics(ICCSIE) |
56. |
E-Krishi: An IoT based Smart Irrigation System |
Sakshi Kathuria, Rohan Kumar, Tarunpreet Bhatia |
2018 |
International Conference on Electrical, Electronics, Computer Science and Information Technology, Bengaluru |
57. |
A Systematic Review on QoS aware Resource Utilisation and Allocation in Cloud Computing |
Vijay Prakash, Seema Bawa, Lalit Garg |
2018 |
International Conference on Information Systems and Management Science, University of Malta, Malta [Feb. 22-23, 2018] |
58. |
Efficient Wavelet Families for ECG classification using Neural Classifiers |
Ritu Singh, Rajesh Mehta, Navin Rajpal |
2018 |
Procedia Engineering (Elsevier), International Conference on Computational Intelligence and Data Science (ICCIDS 2018) |
59. |
A comparative analysis of evolutionary algorithms for the prediction of software change |
L Kaur, A Mishra |
2018 |
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT). IEEE, 2018, pp. 187-192. |
60. |
Commentary upon Descriptive Data Analytics |
Harkiran Kaur, Aanchal Phutela |
2018 |
Proceedings of the 2nd International Conference on Inventive Systems and Control (ICISC 2018) IEEE Xplore Compliant |
61. |
Survey on Fault Tolerant Techniques in Scientific Applications |
Shefali Singh, Inderveer Chana |
2018 |
Second International Conference on Intelligent Computing and Control Systems (ICICCS) |
62. |
Implementing Multi-Dimensional Analytics in NRIs Directory Databases |
Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur |
2018 |
Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018) |
63. |
Utility of OLAP and Digital ATLAS to Enhance Cross Border Connectivity Among Punjabi Sikh NRIs |
Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur |
2018 |
Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018) |
64. |
A Game of Incentives: An Efficient Demand Response Mechanism using Fleet of Electric Vehicles |
Kuljeet Kaur andSahil Garg and Neeraj Kumar and Albert Y. Zomaya |
2018 |
FICN '18: Proceedings of the 1st International Workshop on Future Industrial Communication Networks |
65. |
A Model for Automatic Detection of Retina Diseases. |
Sukhdeep Kaur, Tanya Garg |
2019 |
JETIR/ICTSEM-19 |
66. |
A New Secure Data Dissemination Model in Internet of Drones |
Shubhani Aggarwal and Mohammad Shojafar and Neeraj Kumar and Mauro Conti |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
67. |
Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis. |
Amit Goyal and Shalini Batra and Neeraj Kumar and Gagangeet Singh Aujla and Mohammad S. Obaidat |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
68. |
AdCaS: Adaptive Caching for Storage Space Analysis Using Content Centric Networking |
Amuleen Gulati and Gagangeet Singh Aujla and Neeraj Kumar and Mohammad S. Obaidat and Syed Hassan Ahmed |
2018 |
2018 IEEE Globecom Workshops (GC Wkshps) |
69. |
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks |
Kuljeet Kaur and Sahil Garg and Georges Kaddoum and Fran{\c{c}}ois Gagnon and Neeraj Kumar and Syed Hassan Ahmed |
2019 |
IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) |
70. |
Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks |
Vinay Rishiwal and Omkar Singh and Sudeep Tanwar and Sudhanshu Tyagi and Ishan Budhiraja and Neeraj Kumar and Mohammad S. Obaidat |
2018 |
2018 IEEE Globecom Workshops (GC Wkshps) |
71. |
BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records |
Jayneel Vora and Anand Nayyar and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Globecom Workshops (GC Wkshps) |
72. |
Big Data Analytics on Cloud Environment:Advantages, Limitations and Issues |
Tristan Mercieca, Lalit Garg, Vijay Prakash, Seema Bawa |
2018 |
IASTEM International Conference, Ottawa, Canada |
73. |
Blind Signatures Based Secured E-Healthcare System |
Jayneel Vora and Parth DevMurari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat |
2018 |
2018 International Conference on Computer, Information and Telecommunication Systems (CITS) |
74. |
Blockchain as a Service for Software Defined Networks: A Denial of Service Attack Perspective |
Arnab Bose and Gagangeet Singh Aujla and Maninderpal Singh and Neeraj Kumar and Haotong Cao |
2019 |
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) |
75. |
BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management |
Umesh Bodkhe and Pronaya Bhattacharya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat |
2019 |
2019 International Conference on Computer, Information and Telecommunication Systems (CITS) |
76. |
Bloom Filter Based Efficient Caching Scheme for Content Distribution in Vehicular Networks |
Amit Dua and Megha Shishodia and Nikhil Kumar and Gagangeet Singh Aujla and Neeraj Kumar |
2019 |
2019 IEEE International Conference on Communications Workshops (ICC Workshops) |
77. |
Can Tactile Internet be a Solution for Low Latency Heart Disorientation Measure: An Analysis |
Shriya Kaneriya and Danial Lakhani and Heli U. Brahmbhatt and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Joel J. P. C. Rodrigues |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
78. |
CARaM: Coordinated Adaptive Replica Management for Charging Station |
Ritesh Bhatt and Chinmaya Garg and Harpreet Singh and Neeraj Kumar and Joel J. P. C. Rodrigues |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
79. |
CR-NOMA Based Interference Mitigation Scheme for 5G Femtocells Users |
Santosh Kumar Desai and Amit Dua and Neeraj Kumar and Ashok Kumar Das and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
80. |
Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems |
Shriya Kaneriya and Sudeep Tanwar and Anand Nayyar and Jai Prakash Verma and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Globecom Workshops (GC Wkshps) |
81. |
DLopC: Data Locality Independency-Aware VM Clustering in Cloud Computing |
Vipul Mudgill and Gagangeet Singh Aujla and Neeraj Kumar and Mohammad S. Obaidat and Radu Prodan |
2018 |
2018 IEEE Globecom Workshops (GC Wkshps) |
82. |
DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem |
Gagangeet Singh Aujla and Anish Jindal and Rajat Chaudhary and Neeraj Kumar and Sahil Vashist and Neeraj Sharma and Mohammad S. Obaidat |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
83. |
DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR |
Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar and Radu Prodan and Mohammad S. Obaidat |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
84. |
Dynamic Multi-objective Virtual Machine Placement in Cloud Data Centers |
Radu Prodan and Ennio Torre and Juan Jose Durillo and Gagangeet Singh Aujla and Neeraj Kumar and Hamid Mohammadi Fard and Shajulin Benedict |
2019 |
2019 45th Euromicro Conference on Software Engineering and Advanced Applicatio |
85. |
Enhancing Energy Efficiency in IoT (Internet of Thing) Based Application |
Utkarsha Singh, Inderveer Chana |
2018 |
International Conference on Inventive Computation Technologies |
86. |
Ensuring Privacy and Security in E- Health Records |
Jayneel Vora and Prit Italiya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Kuei{-}Fang Hsiao |
2018 |
2018 International Conference on Computer, Information and Telecommunication Systems (CITS) |
87. |
Evaluation of Various Classifiers for NSL-KDD Dataset using Machine Learning Approach. |
TANYA GARG & SUKHDEEP KAUR |
2019 |
International Journal IJETIR During ICTSEM-19 |
88. |
Explaining Machine Learning-Based Classifications of In-Vivo Gastral Images |
A Malhi, T Kampik, H Pannu, M Madhikermi, K Främling |
2019 |
2019 Digital Image Computing: Techniques and Applications (DICTA) |
89. |
Fetal Birth Weight Estimation in High-Risk Pregnancies Through Machine Learning Techniques |
Mario W. L. Moreira and Joel J. P. C. Rodrigues and Vasco Furtado and Constandinos X. Mavromoustakis and Neeraj Kumar and Isaac Woungang |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
90. |
FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks |
Aaisha Makkar and Mohammad S. Obaidat and Neeraj Kumar |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
91. |
HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0 |
Rajesh Gupta and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Balqies Sadoun |
2019 |
2019 International Conference on Computer, Information and Telecommunication Systems (CITS) |
92. |
Improving Neural Machine Translation Using Rule-Based Machine Translation |
Muskaan Singh, Ravinder Kumar, Inderveer Chana |
2019 |
7th International Conference on Smart Computing & Communications (ICSCC) |
93. |
Interactive Systems for Fashion Clothing Recommendation |
Himani Sachdeva, Shreelekha Pandey |
2018 |
Emerging Technology in Modelling and Graphics |
94. |
LEASE: Lattice and ECC-Based Authentication and Integrity Verification Scheme in E-Healthcare |
Amit Dua and Rajat Chaudhary and Gagangeet Singh Aujla and Anish Jindal and Neeraj Kumar and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
95. |
Markov Decision-Based Recommender System for Sleep Apnea Patients |
Shriya Kaneriya and Madhavi Chudasama and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Joel J. P. C. Rodrigues |
2019 |
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
96. |
Neural-Based Machine Translation System Outperforming Statistical Phrase-Based Machine Translation for Low-Resource Languages |
Muskaan Singh, Ravinder Kumar, Inderveer Chana |
2019 |
Twelfth International Conference on Contemporary Computing (IC3) |
97. |
QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures |
Aaisha Makkar and Neeraj Kumar and Mohammad S. Obaidat and Kuei{-}Fang Hsiao |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
98. |
RoVAN: A Rough Set-based Scheme for Cluster Head Selection in Vehicular Ad-hoc Networks |
Amit Dua and Prateek Sharma and Shivesh Ganju and Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar and Joel J. P. C. Rodrigues |
2018 |
2018 IEEE Global Communications Conference (GLOBECOM) |
99. |
Sec-IoV: A Multi-Stage Anomaly Detection Scheme for Internet of Vehicles |
Sahil Garg and Kuljeet Kaur and Georges Kaddoum and Francois Gagnon and Neeraj Kumar and Zhu Han |
2019 |
PERSIST-IoT '19: Proceedings of the ACM MobiHoc Workshop on Pervasive Systems in the IoT Era |
100. |
SLOPE: A Self Learning Optimization and Prediction Ensembler for Task Scheduling |
Lohit Kapoor and Anish Jindal and Abderrahim Benslimane and Gagangeet Singh Aujla and Rajat Chaudhary and Neeraj Kumar and Albert Y. Zomaya |
2018 |
2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) |
101. |
Smart Waste Bin: A New Approach for Waste Management in Large Urban Centers |
Kellow Pardini and Joel J. P. C. Rodrigues and Syed Ali Hassan and Neeraj Kumar and Vasco Furtado |
2018 |
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall) |
102. |
SmartChain: A Smart and Scalable Blockchain Consortium for Smart Grid Systems |
Gaurang Bansal and Amit Dua and Gagangeet Singh Aujla and Maninderpal Singh and Neeraj Kumar |
2019 |
2019 IEEE International Conference on Communications Workshops (ICC Workshops) |
103. |
Subchannel Assignment for {SWIPT-NOMA} based HetNet with Imperfect Channel State Information |
Ishan Budhiraja and Sudhanshu Tyagi and Sudeep Tanwar and Neeraj Kumar and Nadra Guizani |
2019 |
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) |
104. |
Taxonomy of Security Attacks on Cloud Environment: A Case Study on Telemedicine |
Komal Singh Gill, Sharad Saxena, Anju Sharma |
2019 |
Amity International Conference on Artificial Intelligence (AICAI 2019) |
105. |
Osmotic Computing and Related Challenges: A Survey |
A. Kaur, R. Kumar and S. Saxena |
2020 |
PDGC-2020 |
106. |
Adjacency cloud-oriented storage overlay topology using self-organizing m-way |
Ajay Kumar and Seema Bawa. |
2020 |
International Conference on Innovative Computing and Communications, |
107. |
Deep learning techniques for medical image segmentation:A systematic review |
Amrita Kaur, Lakhwinder Kaur |
2020 |
ICAML-2020 |
108. |
Swarm Intelligence based Hierarchical Routing Protocols Study in WSNs |
D. Mehta and S. Saxena |
2020 |
PDGC-2020 |
109. |
Socio-Economic and Health Challenges due to COVID-19 and Mitigation Strategies |
Deepika Singh, Tanya Garg |
2020 |
SEHCM-2020 |
110. |
Metadata Security Measures for Protecting Confidential Information on the Cloud |
Mamta, B. B. Gupta, John Chui Kwok Tai and Konstantinos Psannis |
2020 |
International Conference on Computational Data and Social Networks (CSoNet-2020) |
111. |
Computed Tomography Image Reconstruction Using Fuzzy Complex Diffusion Regularization |
Manju Devi, Sukhdip Singh, Shailendra Tiwari |
2020 |
Innovations in Computational Intelligence and Computer Vision (ICICV-2020) January 17-19, 2020, Manipal University, Jaipur, India |
112. |
Optimized Z-Buffer Using Divide and Conquer |
Nitin Bakshi, Shivendra Shivani, Shailendra Tiwari, Manju Khurana |
2020 |
Innovations in Computational Intelligence and Computer Vision (ICICV-2020) January 17-19, 2020, Manipal University, Jaipur, India |
113. |
MirGAN: Medical Image Reconstruction using Generative Adversarial Networks |
Nitin Dang; Manju Khurana; Shailendra Tiwari |
2020 |
5th International Conference on Computing, Communication and Security (ICCCS), 14-16 Oct. 2020, IIT Patna, India. |
114. |
An Efficient Hybrid Approach for Brain Tumor Detection in MR Images using Hadoop-MapReduce |
Prabhjot Kaur Chahal; Shreelekha Pandey |
2020 |
SmartData 2020 |
115. |
An Ensemble Approach for Extractive Text Summarization |
Prabhjot Singh, Prateek Chhikara, Jasmeet Singh |
2020 |
ic-ETITE-2020 |
116. |
Study and Understanding the Significance of Multilayer-ELM feature space |
R.K.Roul |
2020 |
8th BDA-2020 |
117. |
op3s: On-street occupancy based parking prices prediction system for its |
Sandeep Saharan, Seema Bawa, and Neeraj Kumar |
2020 |
IEEE Globecom Workshops (GC Wkshps) |
118. |
Network Intrusion Detection Model using Machine Learning & Data Mining Approach-A Survey |
Tanya Garg, Gurwinder Kaur, Surbhi Khullar |
2020 |
ICAML-2020 |
119. |
Big Data Analytics: Applications, Challenges & Future Directions |
Tanya Garg,Surbhi Khullar |
2020 |
ICRITO-2020 |
120. |
Instrument Classification using image-based Transfer Learning |
Utsav Shukla; Utkarsh Tiwari; Vaibhav Chawla; Shailendra Tiwari |
2020 |
5th International Conference on Computing, Communication and Security (ICCCS), 14-16 Oct. 2020, IIT Patna, India. |
121. |
An Approach for Offline Handwritten Character Shape Reconstruction Using Contour and Morphological Techniques |
Anupam Garg, Amrit Kaur and Anshu Parashar |
2021 |
ICACIT2021 |
122. |
E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud |
Moin Hasan, Major Singh Goraya, Tanya Garg |
2021 |
ICWSNUCA 2021 |
123. |
Study the significance of ML-ELM using Combined Pagerank and Content-based Feature Selection |
R.K.Roul and J.K.Sahoo |
2021 |
16th ICDCIT-2021 |
124. |
Delta Based Non- Anthropomorphic Hand |
Rajesh Kumar, Sachin Kansal, Sudipto Mukherjee |
2021 |
International Design |
125. |
Traffic Signs Classification Using Convolutional Neural Network (CNN) |
Vidisha Verma, Aashna Khan, Shailendra Tiwari |
2021 |
ICACSE-2021, KNIT Sultanpur, India |
126. |
FaceIgnition: An automatic anti-theft and keyless solution for vehicles |
Tushar Dang, Vanshita Gupta, Diljot singh Wadia, Paarth Kohli, Rajanpreet Kaur Chahal |
2021 |
IEEE International Conference on Computational Intelligence and Knowledge Economy, 17-18 March 2021, Dubai |
List of research publications in SCI/Impact Factor journals
S. No. | Title of the paper | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1. | A Behavioral Metrics Suite for Modular Ontologies | ACM Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, March 04 - 05, 2016 | Niyati Baliyan and Sandeep Kumar |
2. | A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds,2016, pp. 1-6 | 4th International Conference on Advancements in Engineering & Technology | Rajesh Kumar Ashok Kumar Anju Sharma |
3. | A Comparative study of Elasticsearch and CouchDB Document Oriented Databases | IEEE Conference on Inventive Computation Technologies (ICICT-2016).,Coimbatore, India,26-27 Aug. 2016, pp. 1-4 | "S. Gupta R. Rani " |
4. | A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout | IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 | Maninder Kaur, Amanpreet Singh |
5. | A Data Analytical Approach Using Support Vector Machine for Demand Response Management in Smart Grid | IEEE PES General Meeting, Boston, MA, USA, 17-21 July 2016, pp. 1-5 | Anish Jindal, Neeraj Kumar, Mukesh Singh |
6. | A Hierarchical Fuzzy System for Quality Assessment of Semantic Web Application as a Service | ACM SIGSOFT Software Engineering Notes,Volume 41 Issue 1, January 2016, pp. 1-7 | Niyati Baliyan and Sandeep Kumar |
7. | A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm | Poster presentation at Security and Privacy Symposium 2016, | Rohini Rajpal, Sanmeet Kaur |
8. | A non-linear modified CONVEF-AD based approach for low-dose sinogram restoration | International Conference on Computer Vision and Image Processing | Shailendra Tiwari, Rajeev Srivastava, and K.V. Arya |
9. | A novel technique of sentiment detection for microblogging sites | IEEE-3rd International Conference on Microelectronics, Circuits and Systems, 2016 | Neetika Bansal, Ashima Singh |
10. | A proposed pharmacogenetic solution for IT based Healthcare | Springer Second International Conference on ICT for Sustainable Development,pp 113-121, 2016 | Rashmeet Toor and Inderveer Chana, |
11. | A Real-time Smart Charging Station for EVs Designed for V2G Scenario and its Coordination with Renewable Energy Sources | IEEE PES General Meeting, Boston, Boston, MA, USA, 17-21 July 2016, pp. 1-5 | Mukesh Singh, Praveen Kumar, Indrani Kar, Neeraj Kumar |
12. | A review - Fuzzy Time Series Forecasting Model | ICIIECS 2016. | Alok Tripathi, HS Pannu |
13. | A Review on Energy Aware VM Placement and Consolidation Techniques | IEEE Sponsored International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp. 1-7 | Sukhandeep Kaur and Seema Bawa |
14. | A review on opinionated sentiment analysis based upon machine learning approach | International Conference on Inventive Computation Technologies (ICICT 2016) IEEE,Coimbatore, India, 26-27 Aug. 2016,pp. 1-6 | Neetika Bansal, Ashima Singh |
15. | A review on Sentiment Analysis using machine learning approaches | International Conference on Inventive Computation Technologies, 2016 | Neetika Bansal, Ashima Singh |
16. | A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system | IEEE International Conference on Engineering & Techonology (ICETECH), 2016 | Mannat Aneja, Tarunpreet Bhatia |
17. | AHP-Based Ranking of Cloud Service Providers | Conference on Information Systems Design and Intelligent Applications, pp 491-499, 2016 | Rajanpreet Kaur Chahal, Sarbjeet Singh |
18. | An Assessment of Intelligent Access Tools for Creating Digital Diasporas | International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, | Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur |
19. | An Efficient and Modified Median Root Prior based Framework for PET/SPECT reconstruction Algorithm | 8th International Conference on Contemporary Computing, Noida, India, 20-22 Aug. 2015, pp 1-6 | Shailendra Tiwari, Rajeev Srivastava |
20. | An Efficient Fuzzy Rule-Based Big Data Analytics Scheme for Providing Healthcare-as-a-Service | IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 2017, pp 1-6 | Anish Jindal, Amit Dua, Neeraj Kumar, A. V. Vasilakos, J.J.P.C. Rodrigues |
21. | Analysis of pattern matching algorithms in network intrusion detection systems | 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA),Bareilly, India,30 Sept.-1 Oct. 2016,pp 1-5 | Vishwajeet Dagar, Vatsal Prakash, Tarunpreet Bhatia |
22. | Analyzing Sentiments Using Twitter Through Big Data | IEEE International Conference on Computing for Sustainable Global Development, New Delhi, India, 16-18 March 2016, pp 2628-2631. | Monu Kumar, Anju Bala |
23. | Application of bloom filter for duplicate URL detection in a web crawler | IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, PA, USA, 1-3 Nov. 2016, pp 246-255 | Aveksha Kapoor, Vinay Arora |
24. | Application of Data Mining for high accuracy prediction of breast tissue biopsy results | Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC),Moscow, Russia, 6-8 July 2016, pp. 40-45 | Kaushik, Divyansh, and Karamjit Kaur |
25. | Application of Rough Finite State Automata in Decision Making | International Conference on Emerging Trends in Computing, 23-28, March 2017, pp 23-28 | Swati Gupta and Sunita Garhwal |
26. | Artificial Intelligence Based IDS in VANETS: A Review | IEEE International Conference on Engineering & Techonology (ICETECH), 2016 | Ritu Rani, Tarunpreet Bhatia |
27. | Auction based Resource Allocation Strategy for Infrastructure as a Service | International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India,11-13 March 2016, pp 381-386 | Anita Kumari and Sushma Jain |
28. | Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People | Elsvier Sponsored Twelfth International Conference on Communication Networks, Bangalore, India, August 19– 21, 2016 | Khushdeep Kaur, Parteek Kumar |
29. | Big Data Analytics based Recommender System for Value Added Services (VAS) | In the proceeding of 6th International Conference on "Soft Computing for Problem Solving (SocProS 2016), pp 142-150 | Inderpreet Singh, Karanvijay Singh and Sukhpal Singh |
30. | Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter | IEEE International Conference on Inventive Computation Technologies (ICICT 2016), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Mohit Mertiya and Ashima Singh |
31. | Combining Synthetic Minority Oversampling Technique And Subset Feature Selection Technique For Class Imbalance Problem | International Conference on Advances in Information Communication Technology & Computing” (AICTC 2016),Bikaner, India — August 12 - 13, 2016 | Pawan Lachheta, Seema Bawa |
32. | Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction | International Conference on Inventive Computation Technologies, ICICT 2016, pp 1-6 | Nikita Tyagi and Ajay Kumar |
33. | Comparative Analysis of Density based Outlier Detection techniques on Breast Cancer data Using Hadoop and Map Reduce | IEEE International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-4 | S. Behera and R. Rani |
34. | Comparative analysis of Twitter data using supervised classifiers | International Conference on Inventive Computation Technologies (ICICT),Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Rohit Joshi, Rajkumar Tekchandani |
35. | Complete Survey of 3D Model Generation | International Conference on Innovations in Information, Embedded and Communication Systems, 2016 | K. Jain, H. S. Pannu, V. Bassi |
36. | Decrypting Homomorphism | 2nd International Conference on Computing, Communication, Control And Automation, Pune, India, 12-13 Aug. 2016, pp 1-6 | V.Dabra, Inderveer Chana, Anju Bala |
37. | Decrypting Homomorphism | 2nd International conference on Computing, Control and Automation , Pune, India, 12-13 Aug. 2016, pp 1-6 | Vivek Dabra, Inderveer Chana and Anju Bala |
38. | Effect of Rumor propagation on the stock market dynamics using cellular automata | International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-8 | P. Vij and A. Kumar |
39. | Efficient and Secure Message Transfer in VANET | IEEE International Conference on Inventive Computer Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-5 | RajeevSingh,Sumit Miglani |
40. | Enhancement of Image Resolution: A Survey | Communications on Applied Electronics, 2016 | Dimple Mittal, HS Pannu |
41. | Evolutionary Approaches For Association Rule Mining : A Survey | IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems ,2016 | Maninder Kaur, Aanchal Gupta |
42. | Extended Change Identification System | ENASE with Italy, 2016, pp 51-58 | Parimala N. And Vinay Gautam |
43. | Facial Recognition using Histogram of Gabor Phase Patterns and Self Organizing Maps | 11th International Conference on Industrial and Information Systems (ICIIS-2016),Roorkee, India, 3-4 Dec. 2016, pp 883-889. | Shailendra Tiwari, K.V. Arya, Gaurangi Upadhyay, Shambhavi Upadhyay, Poonam Sharma |
44. | Fleet of Electric Vehicles for Frequency Support in Smart Grid | IEEE PES General Meeting,Boston, MA, USA, 17-21 July 2016, pp 1-5 | Kuljet Kaur, Mukesh Singh, Neeraj Kumar |
45. | High-order fuzzy time series forecasting model for advance prediction of temperature | ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Alok Tripathi, HS Pannu |
46. | Improved CURE Clustering for Big Data using Hadoop and Mapreduce | IEEE International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp 1-5 | P. Lathiya and R. Rani |
47. | Improved Grey Wolf Algorithm for Optimization Problems | International Symposium on Fusion of Science and Technology, New Delhi, India, January 18-22, 2016, pp 428-433 | Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra |
48. | Information retrieval in web crawling: A survey | International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 21-24 Sept. 2016, pp 2635-2643 | Chandani Saini, Vinay Arora |
49. | Intelligent Stock Data Prediction using Predictive Data Mining Techniques | IEEE International Conference - ICICT, Coimbatore, India,26-27 Aug. 2016, pp 1-5 | Pankaj Kumar, Anju Bala |
50. | Mining Data with Categorical Attributes: A Glance | IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 | Maninder Kaur, Avneet kaur |
51. | Multimedia Security through LSB Matching | Proceedings of the Second International Conference on Information and Computing, Udaipur, India — March 04 - 05, 2016 | Rupali Bhardwaj, V Sharma, |
52. | Optical Character Recognition Using Template Matching and Back Propagation Algorithm | International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Swapnil Desai and Ashima Singh |
53. | Optimization of Load Balancing in Parallel Machines using Ant Colony | ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, 2016 | Balram Kishan, Ashima Singh |
54. | Optimizing Watermark Strength in DWT-SVD based Image Watermarking Scheme for Colour Images using Dynamic-PSO, 2016. | ICCCCS-2016 | Nitin Saxena, K.K. Mishra and Ashish Tripathi |
55. | PAFB: Privacy preserving authentication framework using bloom filter for secure vehicular communications | Grace hopper Conference, 2016 | Avleen Kaur Malhi |
56. | Real-time Vehicle Detection and Tracking | 13thInternational Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2016), Chiang Mai, Thailand, 28 June-1 July 2016, pp 1-6 | K.V. Arya, Shailendra Tiwari and Saurabh Behwal |
57. | Regularization based Modified SART Iterative Method for CT Image Reconstruction | 9thInternational Conference on the Developments on eSystems Engineering, (DeSE-2016), Liverpool, UK, 31 Aug.-2 Sept. 2016, pp 217-222 | Shailendra Tiwari, K.V. Arya, and Yadunath Pathak |
58. | Regularization based Simultaneous Algebraic Reconstruction Techniques for Computed Tomography | 9th International Conference on Contemporary Computing (IC3),Noida, India,11-13 Aug. 2016, pp 1-6 | Shailendra Tiwari, Deepikanshu Chouksey, Vinod Todwal |
59. | Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD | ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Rishika Mehta, HS Pannu |
60. | Resource Scheduling in Cloud using Harmony Search | IEEE conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Chandan Malik, Sukhchandan Randhawa |
61. | Robot relay: An optimal path planning for multiple client service | ICICT 2016, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Aastha Goel, Jhilik Bhattacharya, Anika |
62. | Score Level Fusion of Iris and Fingerprint using Wavelet Features | 4th International Conference on Parallel, Distributed and Grid Computing, Waknaghat, India, 22-24 Dec. 2016, pp 456-461 | Shailendra Tiwari, Sudhakar, Triapathi, K.V. Arya |
63. | Searching of Near Exact Duplicate Images in Cloud Database | IEEE International Conference on Inventive Computation Technologies (ICICT 2016) | Maneesha, Inderveer Chana |
64. | Securing IoT devices using JavaScript based Sandbox | International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT-2016), Bangalore, India, 20-21 May 2016, pp 1476-1482 | Ayush Sahu and Ashima Singh |
65. | Semantic Analysis of Big Data by Applying De-duplication techniques | IEEE International Conference - ICICT, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 | Sanjeev Garg, Anju Bala |
66. | S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks | 2016 International Conference on Inventive Computation Technologies (ICICT), 2016 | Aditi Hans, Ashutosh Mishra |
67. | Spatial Data Analysis with ArcGIS and MapReduce | International conference on Conference Computing, Communication and Automation, Noida, India, 29-30 April 2016, pp 45-49 | Hari Singh and Seema Bawa |
68. | Speech Secret Sharing | International Conference on Innovative Research in “Civil, Computer Science, Information Technology, Mechanical, Electrical and Electronics Engineering” (CIME–2016) | Shivendra Shivani, Suneeta Agarwal |
69. | Student Performance Measure By using Different classification methods of data mining | 2016 International conference of advanced communication, control &computing technologies | Neha Chaudhary,Ashutosh Mishra |
70. | Trust Based Security in Opportunistic Networks: A Survey | IEEE International Conference on Engineering & Techonology (ICETECH), 2016 | Gurleen Kaur, Tarunpreet Bhatia |
71. | Trust Model in cloud computing based on fuzzy logic | IEEE conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 20-21 May 2016, pp 47-52 | Ritu and Sushma Jain |
72. | Urban Traffic State Estimation Techniques Using Probe Vehicles: A Review | International Research Symposium on Computing and Network Sustainability, (IRSCNS 2016) | V. Mehta and I. Chana, |
73. | Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey | Innovations In Information Embedded And Communication System, 2016 | Robin Singla and Sunita Garhwal |
74. | Vector Based Sensor Ranking in Internet of Things | IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), | Neha, Sharad Saxena |
75. | Vector Method for Ranking of Sensors in IoT | International Conference on Inventive Computaion Technologies (ICICT 2016), Coimbatore, India. (IEEE), 26-27 Aug. 2016, pp 1-5 | Neha, Sharad Saxena |
76. | Web services classification using machine learning models | In Proc: ICEMS-2016, Jaipur National University | K. C. Bhardwaj, R. K. Sharma |
77. | Abstracting Communication Methodology in IoT Sensors to Eliminate Redundancy and Cycles | International Conference on Advances in Computing and Data Sciences, pp. 541-549. Springer, Singapore, 2016 | Sharad Saxena |
List of research publications in Non-SCI journals
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Journal Name |
---|---|---|---|---|
1. |
Vaibhav Agarwal, Parteek Kumar |
2017 |
International Journal on Natural Language Computing |
|
2. |
Comprehensive review of AES and RSA security algorithms in cloud computing |
Shubham Kansal, Harkiran Kaur |
2017 |
Global Journal of Engineering Science and Research Management |
3. |
STAR: SLA-aware Autonomic Management of Cloud Resources |
Sukhpal Singh, Inderveer Chana and Rajkumar Buyya |
2017 |
IEEE Transactions on Cloud Computing |
4. |
A Variational framework for low dose sinogram restoration |
Shailendra Tiwari |
2017 |
Int. J. Biomedical Engineering and Technology (IJBET) |
5. |
Commentary Upon Role of Neural Networks in Supervised Machine Learning |
Palak Bansal, Harkiran Kaur |
2017 |
International Journal of Advanced in Management, Technology and Engineering Sciences |
6. |
Review of Transforms used in Image Enhancement |
Monty Singh,Ashish Girdhar |
2017 |
International Journal of Computer & Mathematical Sciences |
7. |
A Survey on Scheduling techniques in Cloud Computing |
Pratisha Sharma, Dr. Inderveer Chana and Dr. Anju Bala |
2017 |
International Journal of Recent Trends in Engineering and Research (IJRTER) journal |
8. |
Android GUI testing and tools |
Sumit Pal, Ashish Aggarwal |
2017 |
International Journal of Research in Computer Science (IJRCS) |
9. |
A review on Data mining based Intrusion Detection Systems |
Vidhi, Rajanpreet Kaur Chahal, Niyati Baliyan |
2017 |
International Journal of |
10. |
Trust Models in Cloud Computing: A Review |
Ritu, Sukhchandan Randhawa, Sushma Jain |
2017 |
International Journal of Wireless and Microwave Technologies |
11. |
Application wise Annotations on Intelligent Database Techniques |
Supreet Kaur, Harkiran Kaur |
2017 |
Journal for Research |
12. |
Investigative Analysis on Data Mining Techniques |
Kartik Jaitly, Harkiran Kaur |
2017 |
Journal for Research |
13. |
An Automatic Leaf Disease Detection System for Legume Species |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
2017 |
Journal of Biology and Today's World |
14. |
Enablement of IoT Based Context-aware Smart Home with Fog Computing |
M. Bansal, I. Chana, S. Clarke |
2017 |
Journal of Cases on Information Technology |
15. |
Grey Wolf-based Clustering Technique. |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
2017 |
Journal of Intelligent Systems |
16. |
Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
2017 |
Journal of Intelligent Systems |
17. |
Mobile Agent Based Communication using AES and RSA |
Mandeep Kaur, Sharad Saxena |
2017 |
Journal of Multimedia Technology & Recent Advancements |
18. |
A Comparative Analysis of Optimization Solvers. |
Rimmi Anand, Divya Agarwal and Vijay Kumar |
2017 |
Journal of Statistics and Management Systems |
19. |
Comparing UWDBCSN Clustering with LNCA for Node Replication Attack |
Harpreet Kaur, Sharad Saxena |
2017 |
Journals of Mobile Computing, Communication & Mobile Networks |
20. |
Design of Reliable Capacitated Facility Protection in Distribution Centres |
Rimmi Anand, and Vijay Kumar |
2018 |
Procedia Computer Science |
21. |
A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks |
Tarunpreet Bhatia, A.K. Verma, Gaurav Sharma, Suman Bala |
2018 |
Recent Patents on Engineering |
22. |
An Energy Efficient and Trust Aware Framework for Secure Routing in Leach for Wireless Sensor Networks |
Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava |
2018 |
Scalable Computing: Practice and Experience |
23. |
Prediction of Sentiment from Macaronic Reviews |
Sukhnandan Kaur, Rajni Mohana |
2018 |
Informatica: An International Journal of Computing and Informatics |
24. |
Fuzz testing in stack-based buffer overflow |
Manisha Bhardwaj and Seema Bawa |
2018 |
Advances in Computer Communication and Computational Sciences |
25. |
Iris Image Based Pre-Diagnostic Tool to Predict Obstructive Lung Diseases |
Atul Bansal, Ravinder Agarwal, and R. K. Sharma |
2018 |
Biomedical Research |
26. |
An Efficient Mobility Model for Improving Transmissions in Multi-UAVs Enabled WSNs |
Mohd Abuzar Sayeed, Dr. Rajesh Kumar. |
2018 |
Drones |
27. |
OLAP Approach to Visualizations and Digital ATLAS for NRIs Directory Database |
Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur |
2018 |
Harmony Search and Nature Inspired Optimization Algorithms, Advances in Intelligent Systems and Computing Book Series Vol.741 |
28. |
Comprehensive Survey of OLAP Models |
Harkiran Kaur, Gursimran Kaur |
2018 |
Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing Book Series, vol 741. |
29. |
Detecting spam web pages using multilayer ELM |
R.K.Roul |
2018 |
IJBDI, Inderscience |
30. |
An effective topic-based ranking technique for categorised research articles |
R.K.Roul, J.K.Sahoo |
2018 |
IJCSE, Inderscience |
31. |
A Proposed Pharmacogenetic Solution for IT-Based Health Care |
Rashmeet Toor and Inderveer Chana |
2018 |
Information and Communication Technology for Sustainable Development |
32. |
Complex Diffusion Regularization based Low dose CT Image Reconstruction |
Kavkirat Kaur, Shailendra Tiwari |
2018 |
Int. J. Biomedical Engineering and Technology, Inderscience |
33. |
Inspecting the Efficiency of Deep Neural Networks for Classification of Images with Noise |
Shaify Kansal, Shivani Goel, Jhilik Bhattacharya |
2018 |
International Journal of Advances in Electronics and Computer Science |
34. |
Implementing Fuzzy Technique to Expert System - A Case Study on Salt Analysis |
Kriti Asija, Harkiran Kaur |
2018 |
International Journal of Applied Engineering Research |
35. |
An improved hybrid illumination normalization and feature extraction model for face recognition |
Jyotsna Yadav, Navin Rajpal, Rajesh Mehta |
2018 |
International Journal of Applied Pattern Recognition |
36. |
An Allotment of H1B Work Visa in USA using Machine Learning |
Pooja Thakur, Mandeep Singh, Harpreet Singh,Prashant Singh Rana |
2018 |
International Journal of Engineering & Technology |
37. |
Evolving state grammar for modeling DNA and RNA structures |
Ajay Kumar, Nidhi Kalra and Sunita Garhwal |
2018 |
International Journal of Engineering & technology |
38. |
Fingerprint image enhancement techniques : A survey |
Monty Singh and Ashish Girdhar |
2018 |
International Journal of Innovations and Advancement in Computer Science (IJIACS) |
39. |
Intercloud: A hype or reality? |
Lohit Kapoor, Seema Bawa, and Ankur Gupta |
2018 |
International Journal of Next-Generation Computing |
40. |
Comparative Analysis of Effect of Corpus-Based Stemmers in Sentiment Analysis |
Fahd Alotaibi, Vishal Gupta, Jasmeet Singh |
2018 |
International Journal of Research in Electronics and Computer Engineering |
41. |
Statistical Dimension Identification and Implementation for Student Progression System |
Harkiran Kaur, Aanchal Phutela |
2018 |
International Journal of Innovative Technology and Creative Engineering |
42. |
An effective approach for semantic-based clustering and topic-based ranking of web documents |
R.K.Roul |
2018 |
JDSA, Springer |
43. |
Utility of OLAP and Digital ATLAS to Enhance Cross-Border Connectivity among Punjabi Sikh NRIs |
Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur |
2018 |
Proceedings of 2nd International Conference on Communication, Computing and Networking, Lecture Notes in Networks and Systems. Vol. 46 |
44. |
Implementing Multidimensional Analytics in NRIs Directory Databases |
Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur |
2018 |
Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46 |
45. |
Degraded offline handwritten Gurmukhi character recognition: study of various features and classifiers |
Anupam Garg, Manish Kumar Jindal, Amanpreet Singh |
2019 |
International Journal of Information Technology |
46. |
IoT-Based Solid Waste Management Solutions: A Survey |
Kellow Pardini and Joel J. P. C. Rodrigues and Sergei A. Kozlov and Neeraj Kumar and Vasco Furtado |
2019 |
Journal Sensor and Actuator Networks |
47. |
Suitability and Importance of Deep Learning Feature Space in the Domain of Text Categorization |
Rajendra Kumar Roul |
2019 |
International Journal of Computational Intelligence Studies, Inderscience |
48. |
Improving Software Process Quality Using 3D Six Sigma Approach |
Amanpreet Kaur, Harkiran Kaur |
2019 |
2018 International Conference on Inventive Research in Computing Applications (ICIRCA) |
49. |
Factual Dimension Identification and Usage for Real Estate Framework |
Gursimran Kaur, Harkiran Kaur |
2019 |
2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering |
50. |
Hybridizing J48 and SVM for Predicting Sale and Purchase of Property |
Gursimran Kaur, Harkiran Kaur |
2019 |
2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering |
51. |
Non-dominated Sorting Genetic Algorithm - III Based Meta Decision Tree |
Gursimran Kaur, Harkiran Kaur |
2019 |
2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) |
52. |
Descriptive Data Analysis of Real Estate Using Cube Technology |
Gursimran Kaur, Harkiran Kaur |
2019 |
Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing Book Series, vol 906 |
53. |
Performance Evaluation of Time Synchronized MultiLayer-MAC Protocol |
Manju Khurana, M. K. Jha |
2019 |
Recent Patents on Engineering |
54. |
Deep Learning in the Domain of Near-Duplicate Document Detection |
Rajendra Kumar Roul |
2019 |
7th Big Data Analytics |
55. |
Authorship Identification using Recurrent Neural Networks |
Shriya Gupta, Jajati Sahoo and R.K Roul |
2019 |
3rd ICISDM-2019, University of Houston, Texas, USA |
56. |
A New approach for Multi-document Text Summarization using Topic Modeling |
R.K.Roul, S. Merhotra, Y.Pengulia and J. K. Sahoo |
2019 |
15th ICDCIT-2019, KIIT, Bhubaneswar |
57. |
Smart Indoor Air Quality Monitoring System |
Supreet Kaur, Seemu Sharma, Seema Bawa |
2019 |
International Journal of Recent Technology and Engineering |
58. |
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps. |
Pankaj Kumar, Vishnu Sharma, Gaurav Sharma, and Tarunpreet Bhatia. |
2019 |
International Journal of Information Security and Privacy |
59. |
On the Security of Authenticated Group Key Agreement Protocols |
Suman Bala, Gaurav Sharma, Himani Bansal, and Tarunpreet Bhatia |
2019 |
Scalable Computing: Practice and Experience |
60. |
AN ENERGY EFFICIENT RPL OBJECTIVE FUNCTION FOR CLINICAL RESEARCH |
Neha Modi, Vivek Gupta, Rashmi Raj |
2019 |
Journal of Information and Computational Science |
61. |
Nature inspired Task Scheduling Algorithm for Improving Quality of Service in Cloud Environment |
Seema Singh, Prabhdeep Singh, Rajbir Kaur, Vivek Gupta |
2019 |
International Journal of Future Generation Communication and Networking |
62. |
Near-Duplicate Document Detection using Semantic-based Similarity Measure: A Novel Approach |
Rajendra Kumar Roul, Jajati Keshari Sahoo |
2020 |
5th ICCIDM-2018, UCE, Burla, Odisha |
63. |
Sentiment Analysis and Extractive Summarization based Recommendation System |
R.K.Roul and J. K. Sahoo |
2020 |
5th ICCIDM-2018, UCE, Burla, Odisha |
64. |
Identification of Risks and Threats Associated with SPI Programs in SMEs using PCA |
Ashima Singh, Amrita Kaur, Harpreet Vohra |
2020 |
International Journal of Computer Science and Information Security, Pittsburgh PA: IJCSIS |
65. |
Human-Computer Interaction with Special Emphasis on Converting Brain Signals to Speech |
Venkatesh Sharma, Sambhav Kumar, Amrita Kaur, Ashima Singh |
2020 |
International Journal of Innovative technology and Exploring Engineering, Blue Eyes Intelligence Engineering and Sciences, 2020 |
66. |
Application of Machine Learning for Prediction of Lung Cancer using Omics Data |
Arwinder Dhillon, Amrita Kaur, Ashima Singh |
2020 |
International Journal of Innovative technology and Exploring Engineering, Blue Eyes Intelligence Engineering and Sciences, 2020 |
67. |
A pragmatic framework for predicting change prone files using Machine Learning techniques with Java-based software |
Loveleen Kaur and Ashutosh Mishra |
2020 |
Asia Pacific Journal of Information Systems |
68. |
Localization and Tracking of Mobile Jammer Sensor Node Detection in Multi-Hop Wireless Sensor Network |
KP Porkodi, I Karthika, Hemant K Gianey |
2020 |
Recent Advances in Computer Science and Communications |
69. |
An attribute-based keyword search for m-Health networks |
Mamta and Brij Gupta |
2020 |
Journal of Computer Virology and Hacking Techniques |
70. |
|
Rajendra Kumar Roul and J.K.Sahoo |
2020 |
Internation journal of data science and analytics |
71. |
Low-Level Features based 2D Face Recognition using Machine Learning |
Sahil Sharma and Vijay Kumar |
2020 |
International Journal of Intelligent Engineering Informatics |
72. |
Effect of E-learning on public health and environment during COVID-19 lockdown |
Avani Agarwal, Sahil Sharma, Vijay Kumar, Manjit Kaur |
2020 |
Big Data Mining and Analytics |
73. |
Maritime Surveillance with Planes Using Machine Learning Techniques |
Vinod Kumar Bhalla, Parag Nijhawan, Manish Kumar Singla |
2021 |
International Journal of Advanced Trends in Computer Science and Engineering |
74. |
Soft Computing Based Ground Target Recognition |
Vinod Kumar Bhalla, Ravinandan Kumar, Manish Kumar Singla, Parag Nijhawan |
2021 |
International Journal of Recent Technology and Engineering |
75. |
Electrical Load Forecasting using SVM Algorithm |
Parag Nijhawan,Vinod KumarBhalla, ManishKumar Singla, Jyoti Gupta |
2021 |
International Journal of Recent Technology and Engineering |
List of research publications in Non-SCI journals
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors |
---|---|---|---|
1. | An Android Application for Mobile Customers using Speech Synthesis. | International journal of Computer Applications,Volume: 145 number2, Page Nos:18-25, 2016 | Keshav Rana, Rupinderdeep Kaur |
2. | An Efficient Trust Management Algorithm in Wireless Sensor Network | Emerging Research in Computing, Information, Communication and Applications, pp 281-287,2016 | Monia , Sukhchandan Randhawa, Sushma Jain |
3. | An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs | International Journal of Artificial Intelligence and Knowledge Discovery,Vol. 6, pp. 1-7,2016 | Vinay Arora, Rajesh Bhatia, Maninder Singh |
4. | Application of I.T. in Healthcare: A Systematic Review | ACM, SigBio Record Newsletter,Article no. 2,2016 | Rashmeet Toor and Inderveer Chana |
5. | Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos | International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29,2016 | Geeta Kasana,Kulbir Singh and Satvinder Singh |
6. | Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks | International Journal in Foundations of Computer Science & Technology (IJFCST),ISSN:1839-7662, Vol. 6 (2), pp. 1-21 | Anju Bhandari and V. P. Singh |
7. | Data Clustering Using Differential Search Algorithm | Journal of Science and Technology,Vol. 24(2), pp. 295-306,2016 | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
8. | Design and Development of CLI for SleuthKit: A Cyber Forensics Framework | "International Journal of Scientific and Research Publications",Volume 6 Issue 1,2016 | Dilpreet Singh Bajwa, Gurpal Singh Chhabra |
9. | Fuzzy Logic Based Intrusion Detection Scheme against DoS Attack in MANET | International Journal of Research in IT, Management and Engineering, vol. 6, pp. 21-27,2016 | Sakshi Gautam, Suveg Moudgil, Tarunpreet and Bhatia |
10. | Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain | British Journal of Applied Science &Technology,Vol. 14, No.4, pp. 21-29,2016 | Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh. |
11. | Impact Analysis of Software Processes for SPI in Indian SMEs | International Journal of Applied Engineering Research,ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011 | Singh, A. & Aggarwal, H. |
12. | Implementation of Word Level Speech Recognition System for Punjabi Language | International journal of Computer Applications, Volume: 146 number 3, Page Nos:12-17,2016 | Shama Mittal, Rupinderdeep Kaur |
13. | Intensification of Resolution in the Realm of Digital Imaging | International Journal of Computer Engineering In Research Trends, vol. 6,2016 | Shivangi Jindal, and Harkiran Kaur |
14. | PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks | Journal of Internet Services and Information Security (JISIS),volume: 6, number: 1 (February 2016), pp. 47-56 | Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao |
15. | Performance Analysis of LEACH with Machine Learning Algorithms in Wireless Sensor Networks | International Journal of Computer Applications,Vol. 147, No. 2 , pp. 7-12,2016 | Sukhchandan Randhawa, Sushma Jain |
16. | Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) | Quantum Matter, American Scientific Publishers, 5(3):1-8,2016 | Y Pathak, K Sharma, K Singh and PS Rana |
17. | Proliferation of Social Computing: Cultural Computing Paradigm | International Journal of Computer Applications, 137 (9), 27-30,2016 | Sharma, S., Bawa, S. and Lomash, H |
18. | Proposal and Implementation of MPLS Fuzzy Traffic Monitor | (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1,2016 | Anju Bhandari and V. P. Singh |
19. | Towards measurement of structural complexity for ontologies | "International Journal of Web Engineering and Technology",11, 153,2016 | Niyati Baliyan and Sandeep Kumar |
20. | Various Approaches of Community Detection in Complex Networks: A Glance | Journal of Information Technology and Computer Science, Vol. 8, PP.35-41,2016 | Maninder Kaur,Abhay Mahajan |
21. | Visualizing Class Diagram Using OrientDB Data-Store | International Journal of Innovative Science, Engineering & Technology,Vol. 3 Issue 6, 341-345, 2016 | Sawinder Kaur, Karamjit Kaur |
22. | Volatile Memory Forensics: A Legal Perspective | "International Journal Of Computer Application", 155(3),11-15, 2016 | HarnoorKaur Mann, Gurpal Singh |
List of research publications in SCI/Impact Factor journals
S. No | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Year | Impact Factor |
---|---|---|---|---|---|
1. |
Munish Kumar, R. K. Sharma and M. K. Jindal |
Offline Handwritten Gurmukhi Character Recognition: Analytical Study of different Transformations |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences |
2017 |
0.179 |
2. |
Pankaj Garg, Singara Singh Kasana and Geeta Kasana |
Block Based Reversible Data Hiding Using Histogram Shifting and a Modulus operator for Digital Images |
Journal of Circuits, Systems and Computers |
2017 |
0.308 |
3. |
Nitin goyal, M Dave, A K Verma |
Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks |
National Academy of Sciences, India Section A: Physical Sciences |
2017 |
0.39 |
4. |
Dilbag Singh, Deepak Garg and HS Pannu |
Efficient Landsat image fusion using fuzzy and stationary discrete wavelet transform |
Imaging Science Journal |
2017 |
0.45 |
5. |
Sharma V. & Kumar R. |
Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs |
Computing and Informatics |
2017 |
0.488 |
6. |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm" |
International Journal of Ad Hoc and Ubiquitous Computing |
2017 |
0.493 |
7. |
Ashok Kumar, Anju Sharma, and Rajesh Kumar |
Energy Aware Resource Allocation For Clouds Using Two Level Ant Colony Optimization |
Computing and Informatics |
2017 |
0.504 |
8. |
Ashok Kumar, Anju Sharma, and Rajesh Kumar |
Equal: Energy And Qos Aware Resource Allocation Approach For Clouds |
Computing and Informatics |
2017 |
0.504 |
9. |
Nishtha Hooda, Seema Bawa, Prashant Singh Rana |
T-Ensemble approach for Drug Toxicity Prediction |
International Journal of Computer Science and Information Security |
2017 |
0.519 |
10. |
Vaibhav Agarwal, Parteek Kumar |
A public platform for developing language-independent applications. |
Digital Scholarship in the Humanities |
2017 |
0.525 |
11. |
Mohd Naseem, Chiranjeev Kumar |
QSLB: Queue Size based single path load balancing routing protocol for mobile ad hoc networks |
International Journal of Ad Hoc and Ubiquitous Computing |
2017 |
0.6 |
12. |
Himanshu Jindal, Singara Singh, Sharad Saxena |
Underwater Pipelines Panoramic Image Transmission and Refinement using Acoustic Sensors |
International Journal of Wavelets, Multiresolution and Information Processing |
2017 |
0.6 |
13. |
Himanshu Jindal, Sharad Saxena and Singara Singh Kasana |
Sewage Water Quality Monitoring Framework using Multi-parametric Sensors |
Wireless Personal Communications |
2017 |
0.701 |
14. |
Nidhi Kalra and Ajay Kumar |
Deterministic Deep Pushdown Transducer and its Parallel Version |
The Computer Journal |
2017 |
0.711 |
15. |
Rajiv Kumar, Khushneet Jindal |
A novel shape-based character segmentation method for Devanagari script. |
Arabian Journal for Science and Engineering. |
2017 |
0.728 |
16. |
Ramnik Singh, A K Verma |
Efficient image transfer over WSN using cross layer architecture |
Optik-International Journal for Light and Electron Optics, DOI information |
2017 |
0.742 |
17. |
Geeta Kasana and Singara Singh Kasana |
Reference based semi-blind image watermarking scheme in wavelet Domain |
International Journal of Light and Electron Optics. |
2017 |
0.742 |
18. |
Sukhpal Singh, Inderveer Chana and Rajkumar Buyya |
IoT based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India |
Journal of Organizational and End User Computing (JOEUC) |
2017 |
0.759 |
19. |
Dilbag Singh and Vijay Kumar |
Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter |
IET Computer Vision |
2017 |
0.878 |
20. |
R. Ramkumar and Raman Singh |
Key Management using Chebyshev Polynomials for Mobile Ad Hoc Networks |
China Communications, Accepted for publication. |
2017 |
0.903 |
21. |
Vishal Sharma, Rajesh Kumar |
Cooperative Network Frameworks and Network Models For Flying Ad Hoc Networks: A Survey |
Concurrency Control and Practices |
2017 |
0.942 |
22. |
Nishant Gupta, Shikhar Malhotra, Naman Ahuja, Anju Bala and Gurleen Kaur |
Intelligent Heart Disease Prediction in Cloud Environment through Ensembling. |
Expert System |
2017 |
0.947 |
23. |
Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen |
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network |
2017 |
0.951 |
|
24. |
Vinod Kumar Bhalla, Neeraj Kumar |
An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks |
Wireless Personal Communications |
2017 |
0.97 |
25. |
Sahil Garg, Shalini Batra |
A Novel Ensemble Technique for Anomaly Detection |
International Journal of Communication System |
2017 |
1.006 |
26. |
Himanshu Jindal, Sharad Saxena and Singara Singh Kasana |
A Sustainable Multi-Parametric Sensors Network Topology for River Water Quality Monitoring |
Wireless Networks |
2017 |
1.006 |
27. |
Himanshu Jindal, Sharad Saxena, Singara Singh |
Triangular Pyramidal Topology to Measure Temporal and Spatial Variations in Shallow River Water using Ad-hoc Sensors Network |
Ad Hoc & Sensor Wireless Networks |
2017 |
1.034 |
28. |
Ashish Gridhar and Vijay Kumar |
A Comprehensive Survey of 3D Image Steganography Techniques |
IET Image Processing |
2017 |
1.044 |
29. |
Ashish Girdhar, Vijay Kumar |
Comprehensive survey of 3D image |
IET Image Processing |
2017 |
1.044 |
30. |
Bharti Saneja and Rinkle Rani |
An Efficient Approach for Outlier Detection in Big Sensor Data of Healthcare |
International Journal of Communication Systems, Wiley |
2017 |
1.06 |
31. |
An efficient energy-aware predictive clustering approach for vehicular ad hoc networks |
An efficient energy-aware predictive clustering approach for vehicular ad hoc networks |
2017 |
1.066 |
|
32. |
Monika Bharti, Rajesh Kumar, Sharad Saxena |
Clustering-based resource discovery on Internet-of-Things |
International Journal of Communication Systems, Wiley |
2017 |
1.066 |
33. |
Vishal Sharma, Kathiravan Srinivasan, Rajesh Kumar, Han-Chieh Chao, Kai-Lung Hua |
Efficient Cooperative Relaying In Flying Ad Hoc Networks Using Fuzzy-Bee Colony Optimization |
Journal of Supercomputing |
2017 |
1.088 |
34. |
Sujata Rani, Parteek Kumar |
A Sentiment Analysis System to Improve Teaching and Learning |
IEEE Computer 50.5 |
2017 |
1.115 |
35. |
Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti |
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks |
2017 |
1.118 |
|
36. |
Priyanka Vashisht, Anju Sharma, Rajesh Kumar |
Strategies For Replica Consistency In Data Grid – A Comprehensive Survey |
Concurrency and Computation: Practice and Experience |
2017 |
1.133 |
37. |
Chandan Singh, Ashutosh Aggarwal, Sukhjeet K. Ranade |
A new convolution model for the fast computation of Zernike moments |
International Journal of Electronics and Communications |
2017 |
1.147 |
38. |
Divya Pandov, Rinkle Rani, Shivani Goel |
Correlation Clustering Methodologies and their Fundamental Results |
Experts Systems, Wiley |
2017 |
1.18 |
39. |
Megha, Shivani Goel and Ajay Kumar |
Improving quality of software product line by analysing inconsistencies in feature models using an ontological rule‐based approach |
Expert Systems |
2017 |
1.18 |
40. |
K. K. Mishra, Ashish Tripathi, Shailesh Tiwari and Nitin Saxena |
Evolution based memetic algorithm and its application in software cost estimation |
Journal of Intelligent & Fuzzy Systems |
2017 |
1.261 |
41. |
Isha Kansal and Singara Singh Kasana |
Weighted Image De-fogging using Luminance Dark Prior |
Journal of Modern Optics |
2017 |
1.267 |
42. |
Tarunpreet Bhatia and A. K. Verma |
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. |
The Journal of Supercomputing |
2017 |
1.32 |
43. |
Dilbag Singh and Vijay Kumar |
Modified Gain Intervention Filter based Dehazing Technique |
Journal of Modern Optics |
2017 |
1.328 |
44. |
Roopam Bamal and Singhara Singh Kasana |
Slantlet based Hybrid Watermarking Technique for Medical Images |
Multimedia Tools and Applications |
2017 |
1.331 |
45. |
Shruti Saxena, Shreelekha Pandey, Pritee Khanna |
A semi-supervised domain adaptation assembling approach for image classification |
Pattern Analysis and Applications |
2017 |
1.352 |
46. |
Tarunpreet Bhatia and A.K. Verma |
Cryptanalysis and Improvement of Certificateless Proxy Signcryption Scheme for E-Prescription System in Mobile Cloud Computing |
Annals of Telecommunications |
2017 |
1.4 |
47. |
Sandeep Kumar, Niyati Baliyan, and Shriya Sukalikar |
Ontology Cohesion and Coupling Metrics |
International Journal on Semantic Web and Information Systems |
2017 |
1.5 |
48. |
Chandan Singh, Ashutosh Aggarwal |
An Efficient and Robust Multi-Frame Image Super-Resolution Reconstruction Using Orthogonal Fourier-Mellin Moments |
NA |
2017 |
1.526 |
49. |
Shivendra Shivani |
“Multi Secret Sharing with Unexpanded Meaningful Shares” |
Multimedia tools and applications |
2017 |
1.53 |
50. |
Shivendra Shivani |
“VMVC: Verifiable Multitone Visual Cryptography” |
Multimedia tools and applications |
2017 |
1.53 |
51. |
Shivendra Shivani, Suneeta Agarwal |
“XOR based Continuous tone Multi Secret Sharing Scheme for Store and Forward Telemedicine”, |
Multimedia tools and applications |
2017 |
1.53 |
52. |
Vijay Kumar and Dinesh Kumar |
A Modified DWT-based Image Steganography Technique |
2017 Multimedia Tools and Applications |
2017 |
1.53 |
53. |
Raman Singh, Harish Kumar, R.K. Singla, K.R. Ramkumar |
Internet Attacks and Intrusion Detection System: Study and Review |
Online Information Review |
2017 |
1.534 |
54. |
Amit Dua, Neeraj Kumar, Seema Bawa |
ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks |
Telecommunication Systems 64(3) |
2017 |
1.542 |
55. |
Sahil Garg, Shalini Batra |
Fuzzified cuckoo based clustering technique for network anomaly detection |
Computers and Electrical Engineering, |
2017 |
1.57 |
56. |
Chandan Singh, Ashutosh Aggarwal |
Single-image super-resolution using orthogonal rotation invariant moments |
Computers & Electrical Engineering |
2017 |
1.57 |
57. |
Vishal Sharma, Hsing Chung Chen, Rajesh Kumar |
Driver Behaviour Detection and Vehicle Rating Using Multi-UAV Coordinated Vehicular Networks |
Journal of Computer and System Sciences |
2017 |
1.583 |
58. |
Sukhpal Singh, Rajkumar Buyya, Inderveer Chana, Maninder Singh and Ajith Abraham |
BULLET: Particle Swarm Optimization based Scheduling Technique for Provisioned Cloud Resources |
Journal of Network and Systems Management |
2017 |
1.588 |
59. |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
Synthesizing test scenarios in UML activity diagram using a Bio-inspired approach |
Computer Languages, Systems & Structures |
2017 |
1.615 |
60. |
Sukhpal Singh, Inderveer Chana and Maninder Singh |
The Journey of QoS-Aware Autonomic Cloud Computing |
IT Professional |
2017 |
1.661 |
61. |
Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo |
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud |
Applied Mathematics and Computation |
2017 |
1.738 |
62. |
Ashok Kumar, Pradhan, SayanGhose, Tanmay de |
Multicast dynamic traffic grooming using bin packing method in WDM mesh networks |
Optical Switching and Networking, 23 |
2017 |
1.86 |
63. |
Sangita Roy, Ashok Singh Sairam |
Distributed Star Coloring of Network for IP Traceback |
International Journal of Information Security, Springer, vol. 9, |
2017 |
1.915 |
64. |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
Community Sensor Network for Monitoring Road Roughness Using Smartphones |
Journal of Computing in Civil Engineering |
2017 |
1.92 |
65. |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
Traffic noise mapping of Indian roads through smartphone user community participation |
Journal of Computing in Civil Engineering |
2017 |
1.98 |
66. |
Amit Dua, Neeraj Kumar, Seema Bawa |
Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks |
Journal of Real-Time Image Processing |
2017 |
2.01 |
67. |
Nidhi Jain Kansal and Inderveer Chana |
An Empirical Evaluation of Energy-aware Load Balancing Technique for Cloud Data Center |
Cluster Computing |
2017 |
2.04 |
68. |
Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya |
CHOPPER: An Intelligent QoS-aware Autonomic Resource Management Approach for Cloud Computing |
Cluster Computing |
2017 |
2.04 |
69. |
Hari Singh and Seema Bawa |
A MapReduce Based Scalable Discovery and Indexing of Structured Big Data |
Future Generation Computer System The International Journal of Grid Computing and eScience |
2017 |
2.1 |
70. |
Rajanpreet Kaur, Sarbjeet Singh |
Fuzzy rule-based expert system for determining trustworthiness of cloud service providers |
International Journal of Fuzzy Systems, 19, |
2017 |
2.198 |
71. |
Libing Wu, Jing Wang, Neeraj Kumar, Debiao He |
Secure public data auditing scheme for cloud storage in smart city |
Personal and Ubiquitous Computing |
2017 |
2.395 |
72. |
Megha Bhushan, Shivani Goel, Karamjit Kaur |
Analyzing inconsistencies in software product lines using an ontological rule-based approach |
Journal of Systems and Software, |
2017 |
2.44 |
73. |
Sharma V, Kumar R, Reina DG |
HMADSO: a novel hill Myna and desert Sparrow optimization algorithm for cooperative rendezvous and task allocation in FANETs |
Soft Computing |
2017 |
2.472 |
74. |
Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi |
Multi-objective Particle Swarm Optimization based Adaptive Neuro-Fuzzy Inference System for Benzene Monitoring |
Neural Computing and Applications |
2017 |
2.5 |
75. |
Jasmeet Singh, Vishal Gupta |
A systematic review of text stemming techniques |
Artificial Intelligence |
2017 |
2.627 |
76. |
Vijay Kumar and Dinesh Kumar |
An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems |
Advances in Engineering Software |
2017 |
3 |
77. |
Gaurav Dhiman and Vijay Kumar |
Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications |
Advances in Engineering Software |
2017 |
3 |
78. |
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park |
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks |
IEEE Access |
2017 |
3.244 |
79. |
Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park |
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices |
IEEE Access |
2017 |
3.244 |
80. |
Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park |
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems |
2017 |
3.244 |
|
81. |
Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos |
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services |
IEEE Access |
2017 |
3.244 |
82. |
Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo |
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications |
2017 |
3.244 |
|
83. |
Garg, Neenu, and Seema Bawa |
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing |
Journal of Network and Computer Applications |
2017 |
3.331 |
84. |
Vishal Sharma, Ilsun You, Ravinder Kumar |
Resource-based mobility management for video users in 5G using catalytic computing |
Computer Communications |
2017 |
3.338 |
85. |
Jasmeet Singh, Vishal Gupta |
An Efficient Corpus-Based Stemmer |
Cognitive Computation |
2017 |
3.441 |
86. |
Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee |
Anonymous Authentication for Wireless Body Area Networks With Provable Security |
IEEE Systems Journal |
2017 |
3.882 |
87. |
Neeraj Kumar, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues, Seungmin Rho |
Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid |
2017 |
3.882 |
|
88. |
Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, Guangjie Han |
Cooperative Strategies for Challenged Networks and Applications: A Survey |
IEEE Systems Journal |
2017 |
3.882 |
89. |
Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu |
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System |
2017 |
4.332 |
|
90. |
Divya Pandov, Rinkle Rani , Shivani Goel |
Local Graph Based Correlation Clustering |
Knowledge-Based Systems, Elsevier |
2017 |
4.5 |
91. |
Sharma V., Kumar R. & Kumar R. |
QUAT-DEM: Quaternion-DEMATEL based neural model for mutual coordination between UAVs |
Information Sciences |
2017 |
4.832 |
92. |
Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, Laurence T. Yang |
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries |
IEEE Transactions on Smart Grid |
2017 |
6.645 |
93. |
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues |
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment |
IEEE Transactions on Industrial Informatics |
2017 |
6.764 |
94. |
Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos |
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. |
IEEE Internet of Things Journal |
2017 |
7.596 |
95. |
Kuljeet Kaur, Tanya Dhand, Neeraj Kumar, Sherali Zeadally |
Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers |
2017 |
8.972 |
|
96. |
Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues |
A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities |
2017 |
10.435 |
|
97. |
Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Joel J. P. C. Rodrigues, Alexey V. Vinel |
Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach |
IEEE Communications Magazine |
2017 |
10.435 |
98. |
Rajat Chaudhary, Neeraj Kumar, Sherali Zeadally |
Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges |
IEEE Communications Magazine |
2017 |
10.435 |
99. |
Palika Chopra, R. K. Sharma, Maneek Kumar, and Tanuj Chopra |
Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete |
Advances in Civil Engineering |
2017 |
1.176 |
100. |
Tanuj Chopra, Manoranjan Parida, Naveen Kwatar, and Palika Chopra |
Development of Pavement Distress Deterioration Prediction Models for Urban Road Network using Genetic Programming |
Advances in Civil Engineering |
2017 |
1.176 |
101. |
Munish Kumar, M. K. Jindal, R. K. Sharma and S. R. Jindal |
Offline Handwritten Pre-Segmented Character Recognition of Gurmukhi Script |
Machine Graphics and Vision |
2018 |
0.11 |
102. |
Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal |
Offline Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques |
National Academy Science Letters |
2018 |
0.331 |
103. |
Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal |
Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques |
National Academy Science Letters |
2018 |
0.369 |
104. |
Vaibhav Agarwal, Parteek Kumar |
UNLization of Punjabi text for natural language processing applications |
Sadhana |
2018 |
0.465 |
105. |
Nishtha Hooda, Seema Bawa, and Prashant Singh Rana. |
Fraudulent Firm classification: A case study of an external audit |
Applied Artificial Intelligence |
2018 |
0.505 |
106. |
Isha Kansal and Singara Singh Kasana |
Fusion based Image De-fogging using Dual Tree Complex Wavelet Transform |
International Journal of Wavelets, Multiresolution and Information Processing |
2018 |
0.523 |
107. |
Sonal Kukreja, Singara Singh Kasana and Geeta Kasana |
Adaptive Reversible Data Hiding Scheme for Digital Images based on Histogram Shifting |
Computing and Informatics |
2018 |
0.524 |
108. |
Amritpal Singh, Shalini Batra |
Fingerprint Based Duplicate Detection in Streamed Data |
Computing and Infoarmatics |
2018 |
0.524 |
109. |
Amritpal Singh, Shalini Batra |
Streamed Data Analysis Using Adaptable Bloom Filter |
Computing and Infoarmatics |
2018 |
0.524 |
110. |
Neeraj Jain and Singara Singh Kasana |
High Capacity Reversible Data Hiding using Modified PVO Approach |
Journal of Circuits, Systems, and Computer |
2018 |
0.595 |
111. |
Manjit Kaur and Vijay Kumar |
Fourier-Mellin moments based intertwining map for image encryption. |
Modern Physics Letters B |
2018 |
0.617 |
112. |
Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana |
A Novel Framework for Reliable Network Prediction of Small Scale Wireless Sensor Networks (SSWSNs) |
Fundamenta Informaticae |
2018 |
0.687 |
113. |
Y. Pathak, K.V. Arya and S. Tiwari |
Low-dose CT image reconstruction using gain intervention based dictionary learning |
Modern Physics Letter-B, World Scientific |
2018 |
0.687 |
114. |
Harpreet Singh, Prashant Singh Rana, and Urvinder Singh |
Prediction of drug synergy in cancer using ensemble-based machine learning techniques. |
World Scientific-Modern Physics Letters B |
2018 |
0.69 |
115. |
Suman Bala, Gaurav Sharma, Anil Kumar Verma |
Impersonation attack on CertificateLess key agreement protocol |
International Journal of Ad Hoc and Ubiquitous Computing |
2018 |
0.705 |
116. |
Munish Kumar, M. K. Jindal and R. K. Sharma |
A Novel Handwriting Grading System Using Gurmukhi Characters |
International Arab Journal of Information Technology |
2018 |
0.724 |
117. |
H Singh, PS Rana and U Singh |
Fraudulent Firm Classification: A Case Study of an |
Modern Physics Letters B |
2018 |
0.73 |
118. |
Rupinderdeep Kaur, R. K. Sharma and Parteek Kumar |
An Efficient Speaker Recognition using Quantum Neural Network |
Modern Physics Letters B |
2018 |
0.731 |
119. |
Upasna Joshi and Rajiv Sharma |
An optimal data aggregation technique for physics-based applications |
Modern Physics Letters B |
2018 |
0.731 |
120. |
Y. Pathak, K.V. Arya and S. Tiwari |
Fourth Order Partial Differential Equations Based Anisotropic Diffusion Model for Low-Dose CT Images |
Modern Physics Letter-B |
2018 |
0.731 |
121. |
Y. Pathak, K.V. Arya and S. Tiwari |
Performance Evaluation of 2D Face Recognition Techniques Under Image Processing Attacks |
Modern Physics Letters B |
2018 |
0.731 |
122. |
Karun Verma, and R. K. Sharma |
An Efficient Writing-Zone Identification Technique for Online Handwritten Gurmukhi Character Recognition |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences |
2018 |
0.754 |
123. |
Munish Kumar, R. K. Sharma, M. K. Jindal and S. R. Jindal |
A Novel Framework for Writer Identification Based on Gurmukhi Characters |
Sadhana |
2018 |
0.769 |
124. |
Ajay Kumar, Nidhi Kalra, Sunita Garhwal |
Error tolerance for the recognition of faulty strings in a regulated grammar using fuzzy sets |
Sadhana |
2018 |
0.769 |
125. |
Harjeet Singh, R. K. Sharma and V. P. Singh |
Recognition of Online Unconstrained Handwritten Gurmukhi Characters based on Finite State Automata |
Sadhana-Academy Proceedings in Engineering Sciences |
2018 |
0.769 |
126. |
Sachendra Singh Chauhan, Shalini Batra |
A Parallel Computational Approach for Similarity Search using Bloom Filters |
Computational Intelligence |
2018 |
0.776 |
127. |
Jain, Khushboo, and Husanbir Singh Pannu. |
Autonomic point cloud-based surface reconstruction using SVR. |
The Imaging Science Journal |
2018 |
0.8 |
128. |
Jain, Khushboo, Husanbir Singh Pannu, Avleen Malhi, Kuldeep Singh |
Efficient disparity estimation from stereo images using hybrid-guided image filter |
The Imaging Science Journal |
2018 |
0.8 |
129. |
Sitender and Seema Bawa |
Sansunl: A sanskrit to unl enconverter system |
IETE Journal of Research |
2018 |
0.829 |
130. |
N Hooda, PS Rana and S Bawa, |
of Small Scale Wireless Sensor Networks (SSWSNs) |
Applied Artificial Intelligence, |
2018 |
0.99 |
131. |
Kuldeep Singh, Anil Kumar Verma |
FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad hoc Networks (FANETs) |
Adhoc and Sensor Wireless Networks |
2018 |
1.034 |
132. |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
Semi-automatic leaf disease detection and classification system for soybean culture |
IET Image Processing |
2018 |
1.044 |
133. |
Kuldeep Singh, Anil Kumar Verma |
A fuzzy‐based trust model for flying ad hoc networks (FANETs) |
International Jourmal of Communication Systems |
2018 |
1.066 |
134. |
Manjit Kaur and Vijay Kumar |
An efficient image encryption method based on improved Lorenz chaotic system. |
Electronics Letters |
2018 |
1.155 |
135. |
Monika Bharti , Rajesh Kumar, Sharad Saxena |
Context-Aware Search Optimization Framework on Internet-of- Things |
Concurrency and Computation: Practice and Experience |
2018 |
1.167 |
136. |
Jyotsna Yadav, Navin Rajpal, Rajesh Mehta |
A new illumination normalisation framework via homomorphic filtering and reflectance ratio in DWT domain for face recognition |
Journal of Intelligent and Fuzzy Systems |
2018 |
1.2 |
137. |
J Kaur, PS Rana and AK Verma, |
A Novel Framework for Reliable Network Prediction |
Fundamenta Informaticae |
2018 |
1.2 |
138. |
Seemu Sharma, Seema Bawa, and Hitashi Lomash |
Approaches in cultural computing: A survey and inference from social computing with dynamics of mind |
Wireless Personal Communications |
2018 |
1.2 |
139. |
Kaur, Parminder, and Husanbir Singh Pannu |
Comprehensive review of continuous and discrete orthogonal moments in biometrics |
International Journal of Computer Mathematics |
2018 |
1.2 |
140. |
Kirti Dhiman and Singara Singh Kasana |
Sharing Two True Color Images using (3,3) Extended Visual Cryptography Technique |
Journal of Modern Optis |
2018 |
1.267 |
141. |
Palika Chopra, R. K. Sharma and Maneek Kumar |
Prediction of Compressive Strength of Concrete using Artificial Neural Network and Genetic Programming |
Advances in Materials Science and Engineering |
2018 |
1.299 |
142. |
Ravneet Kaur, Inderveer Chana and Jhilik Bhattacharya |
Data Deduplication Techniques for Efficient Cloud Storage Management - A Systematic Review |
The Journal of Supercomputing |
2018 |
1.326 |
143. |
H Singh, PS Rana and U Singh |
External Audit |
IET Systems Biology |
2018 |
1.39 |
144. |
Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi |
Improved Particle Swarm Optimization Based Adaptive Neuro‐Fuzzy Inference System for Benzene Detection |
CLEAN-soil, air, water |
2018 |
1.47 |
145. |
Ashish Girdhar and Vijay Kumar |
A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences |
Multimedia Tools and Applications |
2018 |
1.53 |
146. |
Dilbag Singh and Vijay Kumar |
Comprehensive Survey on Haze Removal Techniques. |
Multimedia Tools and Applications |
2018 |
1.53 |
147. |
Y. Pathak, K.V. Arya and S. Tiwari |
Feature Selection for Image Steganalysis using Levy Flight-based Grey Wolf Optimization |
Multimedia Tools and Applications, Springer |
2018 |
1.53 |
148. |
Simar Preet Singh, Anand Nayyar, Rajesh Kumar, Anju Sharma |
Fog Computing: From Architecture to Edge Computing and Big Data Processing |
The Journal of Supercomputing |
2018 |
1.532 |
149. |
Tarunpreet Bhatia, Anil Kumar Verma, Gaurav Sharma |
Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud |
Transactions on Emerging Telecommunications Technologies |
2018 |
1.535 |
150. |
Kalpna Guleria, Anil Kumar Verma |
Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks |
Wireless Networks |
2018 |
1.548 |
151. |
Libing Wu and Yubo Zhang and Mimi Ma and Neeraj Kumar and Debiao He |
Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things |
Annals of Telecommunications |
2018 |
1.552 |
152. |
Dilbag Singh and Vijay Kumar |
A novel dehazing model for remote sensing images. |
Computer & Electrical Engineering |
2018 |
1.57 |
153. |
Ajay Kumar and Seema Bawa. |
Generalized ant colony optimizer: swarm-based meta-heuristic algorithm for cloud services execution. |
Computing |
2018 |
1.654 |
154. |
Isha Kansal and Singara Singh Kasana |
Minimum Preserving Subsampling based Fast Image De-fogging |
Journal of Modern Optics |
2018 |
1.657 |
155. |
Anika Gupta ; Deepak Garg ; Parteek Kumar |
Analysis of Students' Ratings of Teaching Quality to Understand the Role of Gender and Socio-Economic Diversity in Higher Education |
IEEE Transactions on Education |
2018 |
1.727 |
156. |
Aaisha Makkar and Neeraj Kumar |
User behavior analysis-based smart energy management for webpage ranking: Learning automata-based solution |
Sustainable Computing: Informatics and Systems |
2018 |
1.8 |
157. |
Gagangeet Singh Aujla and Neeraj Kumar |
SDN-based energy management scheme for sustainability of data centers: An analysis on renewable energy sources and electric vehicles participation |
Journal of Parallel and Distributed Computing |
2018 |
1.819 |
158. |
Shruti Sachdeva, Tarunpreet Bhatia, Anil Kumar Verma |
GIS-based evolutionary optimized Gradient Boosted Decision Trees for forest fire susceptibility mapping |
Natural Hazards |
2018 |
1.833 |
159. |
Rupali Bhardwaj, Ashutosh Aggarwal |
Hiding clinical information in medical images: An encrypted dual-image reversible data hiding algorithm with base-3 numeral framework |
OPTIK |
2018 |
1.914 |
160. |
Tarandeep Kaur and Inderveer Chana |
GreenSched: An Intelligent Energy Aware Scheduling For Deadline-and- Budget Constrained Cloud Tasks |
Simulation Modelling Practice and Theory |
2018 |
1.954 |
161. |
v. Gagandeep Kaur, Singara Singh Kasana and M. K. Sharma |
An Efficient Watermarking Scheme for Enhanced High Efficiency Video Coding/H.265 |
Multimedia Tools and Applications |
2018 |
2.101 |
162. |
Simranjit Singh and Singara Singh Kasana |
Efficient Classification of the Hyperspectral Images using Deep Learning |
Multimedia Tools and Applications |
2018 |
2.101 |
163. |
Sonal Kukreja, Singara Singh Kasana and Geeta Kasana |
Histogram based Multilevel Reversible Data Hiding Scheme using Simple and Absolute Difference Images |
Multimedia Tools and Applications |
2018 |
2.101 |
164. |
Shivendra Shivani and Shailendra Tiwari |
Simulation of Intelligent Target Hitting in Obstructed Path using Physical Body Animation and Genetic Algorithm |
Multimedia Tools and Applications |
2018 |
2.101 |
165. |
Sravani Challa and Ashok Kumar Das and Vanga Odelu and Neeraj Kumar and Saru Kumari and Muhammad Khurram Khan and Athanasios V. Vasilakos |
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks |
Computers & Electrical Engineering |
2018 |
2.189 |
166. |
Kirti Dhiman and Singara Singh Kasana |
Extended Visual Cryptography Techniques for Color Images |
Computers and Electrical Engineering |
2018 |
2.189 |
167. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar |
Fog computing for Healthcare 4.0 environment: Opportunities and challenges |
Computers & Electrical Engineering |
2018 |
2.189 |
168. |
Amandeep singh bhatia, Ajay Kumar |
Quantifying matrix product state |
Quantum Information Processing |
2018 |
2.2 |
169. |
Mario W. L. Moreira, Joel J. P. C. Rodrigues, Neeraj Kumar, Jalal Al-Muhtadi, Valery Korotaev |
Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care. |
Journal of Medical Systems |
2018 |
2.456 |
170. |
Mario W. L. Moreira and Joel J. P. C. Rodrigues and Neeraj Kumar and Jalal Al-Muhtadi and Valeriy Korotaev |
Evolutionary radial basis function network for gestational diabetes data analytics |
Journal of Computational Science |
2018 |
2.502 |
171. |
Vishal Sharma, Rajesh Kumar, Daniel Gutierrez Reina |
HMADSO: A Novel Hill Myna and Desert Sparrow Optimization Algorithm for Cooperative Rendezvous and Task Allocation in FANETs |
Soft Computing |
2018 |
2.784 |
172. |
Y Kumar, A Aggarwal, S Tiwari, K Singh |
An efficient and robust approach for biomedical image retrieval using Zernike moments |
Biomedical Signal Processing and Control |
2018 |
2.943 |
173. |
Gagangeet Singh Aujla and Anish Jindal and Neeraj Kumar |
EVaaS: Electric vehicle-as-a-service for energy trading in SDN-enabled smart transportation system |
Computer Networks |
2018 |
3.03 |
174. |
Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar |
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks |
IEEE Access |
2018 |
3.244 |
175. |
Nishtha Hooda, Seema Bawa, and Prashant Singh Rana. |
B2fse framework for high dimensional imbalanced data: A case study for drug toxicity prediction. |
Neurocomputing |
2018 |
3.317 |
176. |
Vishal Sharma, Ravinder Kumar and Neeraj Kumar |
DPTR: Distributed priority tree-based routing protocol for FANETs |
Computer Communications |
2018 |
3.338 |
177. |
Aman Sharma and Rinkle Rani |
BE-DTI’: Ensemble Framework for Drug Target Interaction Prediction using Dimensionality Reduction and Active Learning |
Computer Methods and Programs in Biomedicine |
2018 |
3.424 |
178. |
Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo |
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks |
Journal of Network and Computer Applications |
2018 |
3.5 |
179. |
Kenndy Njenga, Lalit Garg, Amit Kumar Bhardwaj, Vijay Prakash, and Seema Bawa. |
The cloud computing adoption in higher learning institutions in kenya: Hindering factors and recommendations for the way forward |
Telematics and Informatics |
2018 |
3.789 |
180. |
Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat |
Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud |
IEEE Trans. Emerging Topics Comput. |
2018 |
3.826 |
181. |
Vishal Sharma, Ravinder Kumar, Wen-Huang Cheng, Mohammed Atiquzzaman, Kathiravan Srinivasan, Albert Zomaya |
NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks |
IEEE Transactions on Knowledge and Data Engineering |
2018 |
3.857 |
182. |
Devinder Kaur and Gagangeet Singh Aujla and Neeraj Kumar and Albert Y. Zomaya and Charith Perera and Rajiv Ranjan |
Tensor-Based Big Data Management Scheme for Dimensionality Reduction Problem in Smart Grid Systems: SDN Perspective |
IEEE Transactions on Knowledge and Data Engineering |
2018 |
3.857 |
183. |
Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services |
IEEE Systems Journal |
2018 |
3.882 |
184. |
Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla |
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment |
Future Generation Computer Systems |
2018 |
3.997 |
185. |
Amit Dua, Neeraj Kumar, Ashok Kumar Das, Willy Susilo |
Secure Message Communication Protocol Among Vehicles in Smart City |
IEEE Transactions on Vehicular Technology |
2018 |
4.066 |
186. |
Shubham Goel and Ravinder Kumar |
Folksonomy-based user profile enrichment using clustering and community recommended tags in multiple levels |
Neurocomputing |
2018 |
4.072 |
187. |
Yi Yang and Debiao He and Neeraj Kumar and Sherali Zeadally |
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks |
IEEE Access |
2018 |
4.098 |
188. |
Durbadal Chattaraj and Monalisa Sarma and Ashok Kumar Das and Neeraj Kumar and Joel J. P. C. Rodrigues and Youngho Park |
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform |
IEEE Access |
2018 |
4.098 |
189. |
Debiao He and Kim-Kwang Raymond Choo and Neeraj Kumar and Aniello Castiglione |
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies |
IEEE Access |
2018 |
4.098 |
190. |
Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar and Mauro Conti and Athanasios V. Vasilakos |
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment |
IEEE Journal of Biomedical and Health Informatics |
2018 |
4.217 |
191. |
Gaurav Dhiman and Vijay Kumar |
Multi-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems. |
Knowledge-Based Systems |
2018 |
4.529 |
192. |
Harjeet Singh, R. K. Sharma and V. P. Singh |
Efficient Zone Identification Approach for the Recognition of Online Handwritten Gurmukhi Script |
Neural Computing and Applications |
2018 |
4.664 |
193. |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
Plants Disease Identification and Classification Through Leaf Images: A Survey |
Archives of Computational Methods in Engineering |
2018 |
5.061 |
194. |
Munish Kumar, M. K. Jindal and R. K. Sharma |
Character Recognition for Non-Indic and Indic Scripts: a Survey |
Artificial Intelligence Review |
2018 |
5.095 |
195. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Michele Maasberg and Kim{-Kwang Raymond Choo |
Multimedia big data computing and Internet of Things applications: A taxonomy and process model |
Journal of Network and Computer Applications |
2018 |
5.273 |
196. |
Harcharan Jit Singh and Seema Bawa |
Scalable metadata management techniques for ultra-large distributed storage systems: a systematic review |
ACM Computing Surveys |
2018 |
14.324 |
197. |
Harmanjeet Kaur, Neeraj Kumar, Shalini Batra |
An efficient multi party scheme for PPCF for health care system |
Future Generation Computer systems |
2018 |
5.768 |
198. |
Harmanjeet Kaur and Neeraj Kumar and Shalini Batra |
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system |
Future Generation Computer Systems |
2018 |
5.768 |
199. |
Amritpal Singh, Sahil Garg, Neeraj Kumar Shalini Batra, J.P.C. Rodrigues |
Bloom Filter based Optimization Scheme for Massive Data Handling in IoT Environment |
Future Generation Computer systems |
2018 |
5.768 |
200. |
Shubham Goel and Ravinder Kumar |
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods |
Future Generation Computer Systems |
2018 |
5.768 |
201. |
Amritpal Singh, Shalini Batra |
Ensemble based spam detection in social IoT using probabilistic data structures |
Future Generation Computer systems |
2018 |
5.768 |
202. |
Gagangeet Singh Aujla and Neeraj Kumar |
MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge–cloud environment |
Future Generation Computer Systems |
2018 |
5.768 |
203. |
Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang |
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems |
IEEE Trans. Industrial Informatics |
2018 |
6.764 |
204. |
Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan |
Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective |
IEEE Trans. Industrial Informatics |
2018 |
6.764 |
205. |
Sahil Garg, Amritpal Singh, Neeraj Kumar Shalini Batra, Laurence T. Yang |
UAVs-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles |
IEEE Network |
2018 |
7.5 |
206. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Michele Maasberg and Kim{-}Kwang Raymond Choo |
SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems |
IEEE Network |
2018 |
7.503 |
207. |
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo |
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks |
IEEE Internet of Things Journal |
2018 |
7.596 |
208. |
Puneet Kumar, Sahil Garg, Amritpal Singh, Shalini Batra, Neeraj Kumar, Ilsun You |
MVO-based Two-Dimensional Path Planning Scheme for Providing Quality of Service in UAV Environment |
IEEE Internet of Things |
2018 |
9.515 |
209. |
Ashok Kumar Das and Mohammad Wazid and Neeraj Kumar and Athanasios V. Vasilakos and Joel J. P. C. Rodrigues |
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment |
IEEE Internet of Things Journal |
2018 |
9.515 |
210. |
{Prabhjot Singh and Rasmeet Singh Bali and Neeraj Kumar and Ashok Kumar Das and Alexey V. Vinel and Laurence T. Yang |
Secure Healthcare Data Dissemination Using Vehicle Relay Networks |
IEEE Internet of Things Journal |
2018 |
9.515 |
211. |
Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena |
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment |
IEEE Communications Magazine |
2018 |
10.435 |
212. |
Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Joel J. P. C. Rodrigues |
Optimized Big Data Management across Multi-Cloud Data Centers: Software-Defined-Network-Based Analysis |
IEEE Communications Magazine |
2018 |
10.435 |
213. |
Vishal Sharma, Dushantha Nalin K. Jayakody, Ilsun You, Ravinder Kumar, Jun Li |
Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios |
IEEE Communications Magazine |
2018 |
10.435 |
214. |
Rajni Mohana |
Temporality Based Sentiment Analysis using Linguistic Rules and Meta- Data |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences |
2018 |
0.921 |
215. |
Ajay Kumar and Seema Bawa |
SLA violation costs for dynamic execution of cloud services |
Soft Computing |
2019 |
2.784 |
216. |
Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar |
{SURVIVOR:} {A} blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment |
Computer Networks |
2019 |
3.03 |
217. |
Ajay Kumar and Seema Bawa |
A comparative review ofmeta-heuristic approaches to optimize the SLA violation costs for dynamic execution of cloud services |
Soft Computing |
2019 |
2.784 |
218. |
Mario W. L. Moreira and Joel J. P. C. Rodrigues and Valery Korotaev and Jalal Al-Muhtadi and Neeraj Kumar |
A Comprehensive Review on Smart Decision Support Systems for Health Care |
IEEE Systems Journal |
2019 |
4.463 |
219. |
Kaur, B., Bhattacharya, J. |
A convolutional feature map-based deep network targeted towards traffic detection and classification |
Expert Systems with Applications |
2019 |
4.29 |
220. |
Pavleen Kaur, Ravinder Kumar, and Munish Kumar |
A Healthcare Monitoring System Using Machine Learning and Internet of Things (IoT) |
Multimedia Tools and Applications |
2019 |
2.101 |
221. |
Sahil Garg and Kuljeet Kaur and Neeraj Kumar and Georges Kaddoum and Albert Y. Zomaya and Rajiv Ranjan |
A hybrid deep learning-based model for anomaly detection in cloud datacenter networks |
IEEE Transactions on Network and Service Management |
2019 |
4.682 |
222. |
Ashutosh Aggarwal, Suchita Sharma, Karamjeet Singh, Harpreet Singh, Sunil Kapoor |
A new approach for effective retrieval and indexing of medical images |
Biomedical Signal Processing and Control |
2019 |
2.943 |
223. |
Nguyen Xuan Thao, Mumtaz Ali, Le Thi Nhung, Hemant Kumar Gianey, Florentin Smarandache |
A new multi-criteria decision making algorithm for medical diagnosis and classification problems using divergence measure of picture fuzzy sets |
Journal of Intelligence & Fuzzy System |
2019 |
1.6 |
224. |
Rajendra Kumar Roul, Kushagr Arora |
A nifty review to text summarization-based recommendation system for electronic products |
Soft Computing |
2019 |
2.784 |
225. |
Jasmeet Singh, Vishal Gupta |
A novel unsupervised corpus-based stemming technique using lexicon and corpus statistics |
Knowledge-Based Systems |
2019 |
5.101 |
226. |
Soumya Banerjee and Vanga Odelu and Ashok Kumar Das and Jangirala Srinivas and Neeraj Kumar and Samiran Chattopadhyay and Kim-Kwang Raymond Choo |
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment |
IEEE Internet of Things Journal |
2019 |
9.515 |
227. |
Ashish Girdhar and Vijay Kumar |
A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map |
Journal of Ambient Intelligence and Humanized Computing |
2019 |
1.91 |
228. |
Bharti Saneja and Rinkle Rani |
A Scalable Correlation based Approach for Outlier Detection in Wireless Body Sensor Networks |
International Journal of Communication Systems |
2019 |
1.278 |
229. |
Huo Liuwei; Jiang Dingde; Zhu Xiangnan; Yuqing Wang; Zhihan Lv; Surjit Singh |
A SDN-based Fine-grained Measurement and Modeling Approach to Vehicular Communication Network Traffic |
International Journal of Communication Systems |
2019 |
1.278 |
230. |
ASM Sanwar Hosen, Saurabh Singh, Vinayagam Mariappan, Maninder Kaur, Gi Hwan Cho |
A Secure and Privacy Preserving Partial Deterministic RWP Model to Reduce Overlapping in IoT Sensing Environment |
IEEE Access |
2019 |
4.098 |
231. |
Deepak Gupta and Rinkle Rani |
A Study of Big Data Evolution and Research Challenges |
Journal of Information Science |
2019 |
2.327 |
232. |
Sukhandeep Kaur, Seema Bawa and Ravinder Kumar |
A survey of mono- and multi-lingual character recognition using deep and shallow architectures: indic and non-indic scripts |
Artificial Intelligence Review |
2019 |
5.095 |
233. |
Qi Feng and Debiao He and Sherali Zeadally and Muhammad Khurram Khan and Neeraj Kumar |
A survey on privacy protection in blockchain system |
Journal of Network and Computer Applications |
2019 |
5.273 |
234. |
Mor, Bhavya, Sunita Garhwal, and Ajay Kumar. |
A Systematic Literature Review on Computational Musicology |
Archives of Computational Methods in Engineering |
2019 |
7.242 |
235. |
Harsurinder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi |
A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions |
ACM Computing Surveys |
2019 |
6.13 |
236. |
M Rana, S Mittal, G Beig and PS Rana |
Activity Assessment of Small Drug Molecules in Estrogen Receptor using Multilevel Prediction Model |
Journal of Earth System Science |
2019 |
1.1 |
237. |
Shyi-Ming Chen, Dipto Barman |
Adaptive fuzzy interpolative reasoning based on similarity measures of polygonal fuzzy sets and novel move and transformation techniques |
Information Science |
2019 |
5.524 |
238. |
Shyi-Ming Chen, Dipto Barman |
Adaptive weighted fuzzy interpolative reasoning based on representative values and similarity measures of interval type-2 fuzzy sets |
Information Science |
2019 |
5.524 |
239. |
Shyi-Ming Chen, Xin-Yao Zou, Dipto Barman |
Adaptive weighted fuzzy rule interpolation based on ranking values and similarity measures of rough-fuzzy sets |
Information Sciences |
2019 |
5.524 |
240. |
Rakeshkumar Vanzara and Priyanka Sharma and Haresh S. Bhatt and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat |
ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks |
International Journal of Communication Systems |
2019 |
1.278 |
241. |
Mimi Ma and Debiao He and Huaqun Wang and Neeraj Kumar and Kim_Kwang Raymond Choo |
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks |
IEEE Internet of Things Journal |
2019 |
9.515 |
242. |
iv. Gagandeep Kaur, Singara Singh Kasana and M. K. Sharma |
An Efficient Authentication Scheme for High Efficiency Video Coding/H.265 |
Multimedia Tools and Applications |
2019 |
2.101 |
243. |
Shubham Goel, Ravinder Kumar, Munish Kumar, and Vikram Chopra |
An Efficient Page Ranking Approach Based on Vector Norms using sNorm(p) Algorithm |
Information Processing and Management |
2019 |
3.892 |
244. |
Malhi, Avleen Kaur, Shalini Batra, and Husanbir Singh Pannu |
An Efficient Privacy Preserving Authentication Scheme for Vehicular Communications |
Wireless Personal Communications |
2019 |
1.2 |
245. |
Jyotsna Yadav, Navin Rajpal,Rajesh Mehta |
An Improved Illumination Normalization and Robust Feature Extraction Technique for Face Recognition Under Varying Illuminations |
Arabian Journal for Science and Engineering |
2019 |
0.994 |
246. |
Hari Singh and Seema Bawa |
An improved integrated grid and mapreduce-hadoop architecture for spatial data: Hilbert tgs r-treebased igsim |
Concurrency and Computation: Practice and Experience |
2019 |
1.114 |
247. |
Huo Liuwei; Jiang Dingde; Zhihan Lv; Surjit Singh |
An Intelligent Optimization-Based Traffic Information Acquirement Approach to SDN |
Computational Intelligence |
2019 |
0.776 |
248. |
Gurleen Kaur, Anju Bala, Inderveer Chana |
An intelligent regressive ensemble approach for predicting resource usage in cloud computing |
Journal of Parallel and Distributed Computing |
2019 |
1.819 |
249. |
Ravindra Kumar, Husanbir Singh Pannu,Avleen Kaur Malhi |
Aspect Based SentimentAnalysis using Deep Networks and Stochastic Optimization |
Neural Computing andApplications |
2019 |
4.66 |
250. |
Parashar, Anshu, and Jitender Kumar Chhabra |
Assessing Impact of Class Change by Mining Class Associations |
The International Arab Journal of Information Technology |
2019 |
0.74 |
251. |
Xiaoying Jia and Debiao He and Neeraj Kumar and Kim-Kwang Raymond Choo |
Authenticated key agreement scheme for fog-driven IoT healthcare system |
Wireless Networks |
2019 |
2.405 |
252. |
Mario W. L. Moreira and Joel J. P. C. Rodrigues and Vasco Furtado and Neeraj Kumar and Valery V. Korotaev |
Averaged one-dependence estimators on edge devices for smart pregnancy data analysis |
Computers & Electrical Engineering |
2019 |
2.189 |
253. |
M Goyal, D Khanna, PS Rana, T Khaibullin, E Martynova, S Khaiboullina, A Rizvanov and M Baranwal, |
based machine learning techniques |
Frontiers in Neurology |
2019 |
2.64 |
254. |
Rajat Chaudhary and Anish Jindal and Gagangeet Singh Aujla and Shubhani Aggarwal and Neeraj Kumar and Kim-Kwang Raymond Choo |
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system |
Computers & Security |
2019 |
3.062 |
255. |
Jiang Dingde; Yuqing Wang; Zhihan Lv; Sheng Qi; Surjit Singh |
Big Data Analysis-based Network Behavior Insight of Cellular Networks for Industry 4.0 Applications |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
256. |
Maninder Kaur, Gurpreet Kaur, Pradip Kumar Sharma, Alireza Jolfaei, Dhananjay Singh |
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home |
The Journal of Supercomputing |
2019 |
2.16 |
257. |
Shubhani Aggarwal and Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Kim{-}Kwang Raymond Choo and Albert Y. Zomaya |
Blockchain for smart communities: Applications, challenges and opportunities |
Journal of Network and Computer Applications |
2019 |
5.273 |
258. |
Pradip Kumar Sharma and Neeraj Kumar and Jong Hyuk Park |
Blockchain-Based Distributed Framework for Automotive Industry in a Smart City |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
259. |
Xinghua Li and Yunwei Wang and Pandi Vijayakumar and Debiao He and Neeraj Kumar and Jianfeng Ma |
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network |
IEEE Transactions on Vehicular Technology |
2019 |
5.339 |
260. |
Seemu Sharma, Seema Bawa |
CBDR: An efficient storage repository for cultural big data |
Digital Scholarship in the Humanities |
2019 |
0.592 |
261. |
Aman Sharma and Rinkle Rani |
C-HMOSHSSA: Gene selection for cancer classification using multi-objective meta-heuristic and machine learning method |
Computer Methods and Programs in Biomedicine |
2019 |
3.424 |
262. |
Harmanjeet Kaur, Neeraj Kumar, Shalini Batra |
ClaMPP: A Cloud-based Multi-party Privacy Preserving Classification Scheme for Distributed Applications |
Journal of Supercomputing |
2019 |
2.16 |
263. |
N Hooda, PS Rana and S Bawa |
Classification of Drug Molecules for Oxidative Stress Signaling Pathway |
Applied Artificial Intelligence |
2019 |
0.99 |
264. |
Loveleen Kaur, Ashutosh mishra |
Cognitive complexity as a quantifier of version to version Java-based source code change: An empirical probe |
Information and Software Technology |
2019 |
2.921 |
265. |
Aaisha Makkar and Neeraj Kumar |
Cognitive spammer: A Framework for PageRank analysis with Split by Over-sampling and Train by Under-fitting |
Future Generation Computer Systems |
2019 |
5.768 |
266. |
Parminder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi |
Comprehensive Study of Continuous Orthogonal Moments- A Systematic Review |
ACM Computing Surveys |
2019 |
6.13 |
267. |
V Gupta and PS Rana |
Computational Intelligence Technique for Prediction of Multiple Sclerosis based on Serum Cytokines |
Turkish Journal Of Electrical Engineering and Computer Sciences |
2019 |
0.63 |
268. |
Shailendra Tiwari, Kavkirat Kaur, Yadunath Pathak, Shivendra Shivaniand Kuldeep Kaur |
Computed tomography reconstruction on distributed storage using hybrid regularization approach |
Modern Physics Letter-B |
2019 |
0.731 |
269. |
Kuljeet Kaur and Neeraj Kumar and Mukesh Singh |
Coordinated Power Control of Electric Vehicles for Grid Frequency Support: MILP-Based Hierarchical Control Design |
IEEE Transactions on Smart Grid |
2019 |
10.486 |
270. |
Ishan Budhiraja and Sudhanshu Tyagi and Sudeep Tanwar and Neeraj Kumar and Mohsen Guizani |
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment |
IEEE Transactions on Vehicular Technology |
2019 |
5.339 |
271. |
Arzoo Miglani and Neeraj Kumar |
Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges |
Vehicular Communications |
2019 |
5.35 |
272. |
Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar and Athanasios V. Vasilakos and Joel J. P. C. Rodrigues |
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment |
IEEE Internet of Things Journal |
2019 |
9.515 |
273. |
Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar and Athanasios V. Vasilakos |
Design of secure key management and user authentication scheme for fog computing services |
Future Generation Computer Systems |
2019 |
5.768 |
274. |
Ishan Budhiraja and Sudhanshu Tyagi and Sudeep Tanwar and Neeraj Kumar and Joel J. P. C. Rodrigues |
DIYA: Tactile Internet Driven Delay Assessment NOMA-Based Scheme for D2D Communication |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
275. |
Gagangeet Singh Aujla and Sahil Garg and Shalini Batra and Neeraj Kumar and Ilsun You and Vishal Sharma |
DROpS: {A} demand response optimization scheme in SDN-enabled smart energy ecosystem |
Information Sciences |
2019 |
5.524 |
276. |
Aman Sharma and Rinkle Rani |
Drug Sensitivity Prediction Framework using Ensemble and Multi-task Learning |
International Journal of Machine Learning and Cybernetics |
2019 |
3.848 |
277. |
Roopam Bamal, Singara Singh Kasana |
Dual Hybrid Medical Watermarking using Walsh Slantlet Transform |
Multimedia Tools and Applications |
2019 |
2.101 |
278. |
Kanu Goel, Shalini Batra |
Dynamically Updated Diversified Ensemble based Approach for handling Concept Drift |
Turkish Journal of Electrical and Computer Sciences. |
2019 |
0.62 |
279. |
Neeraj Kumar and Gagangeet Singh Aujla and Ashok Kumar Das and Mauro Conti |
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
280. |
Sahil Garg, Amritpal Singh, Shalini Batra, Neeraj Kumar |
Edge Computing based Security Framework for Big Data Analytics in VANETs |
IEEE Network Magazine |
2019 |
7.5 |
281. |
Y. Pathak, K.V. Arya and S. Tiwari |
Efficient image reconstruction using Fourtth order partial derivatives based guided image filter |
Multimedia Tools and Applications |
2019 |
2.101 |
282. |
Sachendra Singh Chauhan, Shalini Batra |
Efficient layer-wise feature incremental approach for content-based image retrieval system for content-based image retrieval system |
Journal of Electronic Imaging |
2019 |
0.92 |
283. |
Gagangeet Singh Aujla and Neeraj Kumar and Mukesh Singh and Albert Y. Zomaya |
Energy trading with dynamic pricing for electric vehicles in a smart city environment |
Journal of Parallel and Distributed Computing |
2019 |
1.819 |
284. |
Rupali Bhardwaj |
Enhanced reversible data hiding scheme for homomorphic encrypted absolute moment block truncation coding-compressed images |
Journal of Electronic Imaging |
2019 |
|
285. |
Shatrughan Modi, Jhilik Bhattacharya, Prasenjit Basak |
Estimation of energy consumption of electric vehicles using Deep Convolutional Neural Network to reduce driver’s range anxiety |
ISA transactions |
2019 |
4.343 |
286. |
Simranjit Singh, Singara Singh Kasana |
Estimation of Soil Properties from the EU Spectral Library using Long Short-Term Memory Networks |
Geoderma Regional |
2019 |
1.5 |
287. |
Rajeev Kumar, Pawan Kumar, Ritu Vijay & Surjit Singh |
Fast and Accurate Synthesis of Hexagonal Shape Frequency Agile Antenna using Back Propagation Network |
International Journal of Electronics and Communication |
2019 |
2.853 |
288. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Joel J. P. C. Rodrigues |
Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions |
IEEE Wireless Communications Add Title To My Alerts |
2019 |
11 |
289. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Reza M. Parizi and Kim-Kwang Raymond Choo |
Fog data analytics: A taxonomy and process model |
Journal of Network and Computer Applications |
2019 |
5.273 |
290. |
Priyanka Chawla, Inderveer Chana, Ajay Rana |
Framework for cloud‐based software test data generation service |
Software: Practice And Experience |
2019 |
1.931 |
291. |
Amritpal Singh and Sahil Garg and Kuljeet Kaur and Shalini Batra and Neeraj Kumar and Kim-Kwang Raymond Choo |
Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
292. |
Divya Pandove, Shivani Goel and Rinkle Rani |
General Correlation Coefficient Based Agglomerative Clustering |
Cluster Computing |
2019 |
1.851 |
293. |
Jangirala Srinivas and Ashok Kumar Das and Neeraj Kumar |
Government regulations in cyber security: Framework, standards and recommendations |
Future Generation Computer Systems |
2019 |
5.768 |
294. |
Vinay Arora, Rohan Leekha, Raman Singh and Inderveer Chana |
Heart sound classification using machine learning and phonocardiogram |
Modern Physics Letters B |
2019 |
0.731 |
295. |
Rupinderdeep Kaur, R. K. Sharma and Parteek Kumar |
HMM-Based Phonetic Engine for Continuous Speech of a Regional Language |
Modern Physics Letters B |
2019 |
0.731 |
296. |
Sahil Garg and Kuljeet Kaur and Neeraj Kumar and Joel J. P. C. Rodrigues |
Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective |
IEEE Transactions on Multimedia |
2019 |
5.452 |
297. |
Gaurav Sharma, Seema Bawa, Prashant Singh Rana |
Hybrid machine learning models for predicting types of Human T-cell Lymphotropic Virus |
IEEE/ACM Transactions on Computational Biology and Bioinformatics |
2019 |
2.896 |
298. |
Qi Feng and Debiao He and Sherali Zeadally and Neeraj Kumar and Kaitai Lian |
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices |
IEEE Systems Journal |
2019 |
4.463 |
299. |
Deepa K and Radhamani G and Vinod P and Mohammad Shojafar and Neeraj Kumar and Mauro Conti |
Identification of Android malware using refined system calls |
Concurrency and Computation: Practice and Experience |
2019 |
1.167 |
300. |
Surbhi Gupta, Munish Kumar and Anupam Garg |
Improved Object Recognition Results Using SIFT and ORB feature detector |
Multimedia Tools and Applications |
2019 |
2.101 |
301. |
Amanpreet Singh, Maninder Kaur |
Intelligent content-based cybercrime detection in online social networks using cuckoo search metaheuristic approach |
Springer |
2019 |
2.16 |
302. |
Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat |
LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN |
IEEE Systems Journal |
2019 |
4.463 |
303. |
Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Sherali Zeadally |
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions |
IEEE Internet of Things Journal |
2019 |
9.515 |
304. |
Prosanta Gope and Ashok Kumar Das and Neeraj Kumar and Yongqiang Cheng |
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
305. |
Rajat Chaudhary and Neeraj Kumar |
LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks |
IEEE Transactions on Vehicular Technology |
2019 |
5.339 |
306. |
Amandeep Singh Bhatia, Mandeep Kaur Saggi, Ajay Kumar, Sushma Jain |
Matrix Product State–Based Quantum Classifier |
Neural computation |
2019 |
2.261 |
307. |
Kalpna Guleria, Anil Kumar Verma |
Meta-heuristic Ant Colony Optimization Based Unequal Clustering for Wireless Sensor Network |
Wireless Personal Communications |
2019 |
0.929 |
308. |
Surjit Singh and Pawan Kumar |
MH-CACA: multi-objective harmony search based coverage aware load balanced clustering algorithm in WSNs |
Enterprise Information Systems |
2019 |
2.122 |
309. |
Harsurinder Kaur, Husanbir Pannu,Avleen Malhi |
Multimedia blog volume prediction using adaptive neuro fuzzy inference system and evolutionary algorithms |
Multimedia Tools and Applications |
2019 |
2.1 |
310. |
Hemant Kumar Gianey, M. Kour, D. Singh |
Multi-objective differential evolution based random forest for E-health applications |
Modern Physics Letter- B |
2019 |
0.9 |
311. |
Kuljeet Kaur and Mukesh Singh and Neeraj Kumar |
Multiobjective Optimization for Frequency Support Using Electric Vehicles: An Aggregator-Based Hierarchical Control Mechanism |
IEEE Systems Journal |
2019 |
4.463 |
312. |
Harinder Kaur, Gaganpreet Kaur, Husanbir Singh Pannu |
Novel similarity measure-based random forest for fingerprint recognition using dual-tree complex wavelet transform and ring projection |
Modern Physics Letters B |
2019 |
0.731 |
313. |
N Verma, H Singh, D Khanna, PS Rana and SK Bhadada |
N-semble: Neural Network based ensemble approach |
IET Systems Biology |
2019 |
1.39 |
314. |
Amandeep Singh Bhatia, Ajay Kumar |
On Relation Between Linear Temporal Logic and Quantum Finite Automata |
Journal of Logic, Language and Information |
2019 |
0.5 |
315. |
Amandeep SIngh Bhatia, Ajay Kumar |
ON THE POWER OF TWO-WAY MULTIHEAD QUANTUM FINITE AUTOMATA |
RAIRO-Theor. Inf. |
2019 |
0.282 |
316. |
Pawan Kumar, Gagandeep Singh Brar, Surjit Singh, Srete Nikolovski, Hamid Reza Baghaee, Zoran Balkic |
Perspectives and Intensification of Energy Efficiency in Commercial and Residential Buildings Using Strategic Auditing and Demand-Side Management |
Energies |
2019 |
2.707 |
317. |
Parminder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi |
Plant disease recognition using fractional-order Zernike moments and SVM classifier |
Neural Computing andApplications |
2019 |
4.66 |
318. |
Mario W. L. Moreira and Joel J. P. C. Rodrigues and Neeraj Kumar and Kashif Saleem and Igor V. Illin |
Postpartum depression prediction through pregnancy data analysis for emotion-aware smart systems |
Information Fusion |
2019 |
10.716 |
319. |
Rishith Rayal, J Kaur, N Hooda, D Khanna and PS Rana |
Prediction of drug synergy in cancer using Ensemble |
International Journal of Machine Learning and Cybernetics |
2019 |
3.84 |
320. |
V Gupta and PS Rana |
Prediction of drug synergy score using ensemble based differential evolution |
IET Systems Biology |
2019 |
1.39 |
321. |
Amritpal Singh and Sahil Garg and Shalini Batra and Neeraj Kumar |
Probabilistic data structure-based community detection and storage scheme in online social networks |
Future Generation Computer Systems |
2019 |
5.768 |
322. |
|
Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends |
Wireless Personal Communications |
2019 |
0.929 |
323. |
Sandip Roy and Ashok Kumar Das and Santanu Chatterjee and Neeraj Kumar and Samiran Chattopadhyay and Joel J. P. C. Rodrigues |
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
324. |
Amandeep Singh Bhatia |
Quantum ω-Automata over Infinite Words and Their Relationships |
International Journal of Theoretical Physics |
2019 |
1.121 |
325. |
Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya |
RADAR: Self‐configuring and self‐healing in resource management for enhancing quality of cloud services |
Concurrency and Computation: Practice and Experience |
2019 |
1.167 |
326. |
Mohammad Wazid and Poonam Reshma Dsouza and Ashok Kumar Das and Vivekananda Bhat K. and Neeraj Kumar and Joel J. P. C. Rodrigues |
RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment |
International Journal of Communication Systems |
2019 |
1.278 |
327. |
Akashkumar Rajaram and Rui Dinis and Dushantha Nalin K. Jayakody and Neeraj Kumar |
Receiver Design to Employ Simultaneous Wireless Information and Power Transmission with Joint CFO and Channel Estimation |
IEEE Access |
2019 |
4.098 |
328. |
Neeraj Kumar and Gagangeet Singh Aujla and Sahil Garg and Kuljeet Kaur and Rajiv Ranjan and Saurabh Kumar Garg |
Renewable Energy-Based Multi-Indexed Job Classification and Container Management Scheme for Sustainability of Cloud Data Centers |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
329. |
Gagangeet Singh Aujla and Rajat Chaudhary and Kuljeet Kaur and Sahil Garg and Neeraj Kumar and Rajiv Ranjan |
SAFE: SDN-assisted framework for edge–cloud interplay in secure healthcare ecosystem |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
330. |
Kaur, B., Bhattacharya, J. |
Scene perception system for visually impaired based on object detection and classification using multimodal deep convolutional neural network |
Journal of Electronic Imaging |
2019 |
0.92 |
331. |
Kuljeet Kaur and Sahil Garg and Georges Kaddoum and Neeraj Kumar and Francois Gagnon |
SDN-Based Internet of Autonomous Vehicles: An Energy-Efficient Approach for Controller Placement |
IEEE Wireless Communications |
2019 |
11 |
332. |
Jigna J. Hathaliya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar |
Securing electronics healthcare records in Healthcare 4.0: {A} biometric-based approach |
Computers & Electrical Engineering |
2019 |
2.189 |
333. |
Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu |
Security of Vehicular Ad-hoc Networks: A Comprehensive Survey |
Computers & Security |
2019 |
3.06 |
334. |
Saurabh Singh, In-Ho Ra, Weizhi Meng, Maninder Kaur, Gi Hwan Cho |
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology |
International Journal of Distributed Sensor Networks |
2019 |
1.614 |
335. |
Gagangeet Singh Aujla and Mukesh Singh and Neeraj Kumar and Albert Y. Zomaya |
Stackelberg Game for Energy-Aware Resource Allocation to Sustain Data Centers Using RES |
IEEE Transactions on Cloud Computing |
2019 |
5.967 |
336. |
Garg, Sheetal, Raman Singh, Mohammad S. Obaidat, Vinod Kumar Bhalla, and Bhisham Sharma |
Statistical vertical reduction‐based data abridging technique for big network traffic dataset |
International Journal of Communication Systems |
2019 |
1.278 |
337. |
Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar |
Tactile internet and its applications in 5G era: A comprehensive review |
International Journal of Communication Systems |
2019 |
1.278 |
338. |
Sudeep Tanwar and Sudhanshu Tyagi and Ishan Budhiraja and Neeraj Kumar |
Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis |
IEEE Wireless Communications |
2019 |
11 |
339. |
Ishan Budhiraja and Sudhanshu Tyagi and Sudeep Tanwar and Neeraj Kumar and Joel J. P. C. Rodrigues |
Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions |
IEEE Transactions on Industrial Informatics |
2019 |
7.377 |
340. |
Rajesh Gupta and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar |
Tactile-Internet-Based Telesurgery System for Healthcare 4.0: An Architecture, Research Challenges, and Future Directions |
IEEE Network |
2019 |
7.503 |
341. |
Jangirala Srinivas and Ashok Kumar Das and Neeraj Kumar and Joel J. P. C. Rodrigues |
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment |
IEEE Transactions on Vehicular Technology |
2019 |
5.339 |
342. |
Jayneel Vora and Shriya Kaneriya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat |
TILAA: Tactile Internet-based Ambient Assistant Living in fog environment |
Future Generation Computer Systems |
2019 |
5.768 |
343. |
Sushil Kumar and Vipin Kumar and Omprakash Kaiwartya and Upasana Dohare and Neeraj Kumar and Jaime Lloret |
Towards green communication in wireless sensor network: GA enabled distributed zone approach |
Ad Hoc Networks |
2019 |
3.49 |
344. |
Sahil Garg and Gagangeet Singh Aujla and Neeraj Kumar and Shalini Batra |
Tree-Based Attack-Defense Model for Risk Assessment in Multi-UAV Networks |
IEEE Consumer Electronics Magazine |
2019 |
3.273 |
345. |
Vishal Sharma, Rajesh Kumar |
UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks |
International Journal of Ad Hoc and Ubiquitous Computing |
2019 |
0.56 |
346. |
Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar |
Verification and validation techniques for streaming big data analytics in internet of things environment |
IET Networks |
2019 |
0.298 |
347. |
Shaveta Dargan, Munish Kumar, Anupam Garg, Kutub Thakur |
Writer Identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM |
Soft Computing |
2019 |
2.784 |
348. |
Kaur, H., & Pannu, H. S. |
Zernike moments-based fingerprint recognition using weighted-support vector machine |
Modern Physics Letters B |
2019 |
0.7 |
349. |
Sahil Sharma and Vijay Kumar |
3D Landmark-based Face Restoration for Recognition using Variational Autoencoder and Triplet Loss |
IET Biometrics |
2020 |
1.821 |
350. |
Vijay Kumar and Ashish Girdhar |
A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach |
Multimedia Tools and Applications |
2020 |
2.313 |
351. |
Ajay Kumar and Seema Bawa. |
A comparative review of meta-heuristic approaches to optimize the sla violation costs for dynamic execution of cloud services. |
Soft Computing, |
2020 |
2.784 |
352. |
Pawan Kumar, Ikbal Ali, Mini Shaji Thomas, Surjit Singh |
A Coordinated Framework of DG Allocation and Operating Strategy in Distribution System for Configuration Management under Varying Loading Patterns |
Electric Power Components and Systems |
2020 |
0.824 |
353. |
Muskaan Singh, Ravinder Kumar, and Inderveer Chana |
A forefront to machine translation technology: deployment on the cloud as a service to enhance QoS parameters |
Soft Computing |
2020 |
2.784 |
354. |
Gourav Bathla, Himanhsu Aggarwal, Rinkle Rani |
A graph-based model to improve social trust and influence for Social Recommendation |
The Journal of Supercomputing |
2020 |
2.469 |
355. |
Anish Jindal, Bharat Singh Bhambhu, Mukesh Singh, Neeraj Kumar, Kshirasagar Naik |
A Heuristic-Based Appliance Scheduling Scheme for Smart Homes. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
356. |
Prabhjot Kaur Chahal, Shreelekha Pandey |
A hybrid weighted fuzzy approach for brain tumor segmentation using MR images |
Neural Computing and Applications |
2020 |
4.627 |
357. |
Xiong Li, Tian Liu, Mohammad S. Obaidat, Fan Wu, Pandi Vijayakumar, Neeraj Kumar |
A Lightweight Privacy-Preserving Authentication Protocol for VANETs |
IEEE Syst. J. |
2020 |
3.987 |
358. |
Monika Bharti, Rajesh Kumar, Sharad Saxena |
A Middleware Approach for Reliable Resource Selection on Internet-of-Things |
International Journal of Communication Systems |
2020 |
1.319 |
359. |
Ravinder Kumar, Shubham Goel, Vishal Sharma, Lalit Garg, Kathiravan Srinivasan, Neeraj Julka |
A Multifaceted Vigilare System for Intelligent Transportation Services in Smart Cities |
IEEE Internet of Things Magazine |
2020 |
|
360. |
Sahil Garg, Kuljeet Kaur, Shalini Batra, Georges Kaddoum, Neeraj Kumar, Azzedine Boukerche |
A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
361. |
Kumar, P., Thanki, D. V., Singh, Surjit, & Nikolovski, S. |
A new framework for intensification of energy efficiency in commercial and residential use by imposing social, technical and environmental constraints |
Sustainable Cities and Society Journal |
2020 |
5.268 |
362. |
R Kumar, N Jindal and PS Rana |
A novel approach for detecting roundabouts in maps based on analysis of core map data |
Multimedia Tools and Applications |
2020 |
2.31 |
363. |
Upasana Joshi and Rajiv Kumar |
A novel deep neural networks based path prediction |
Cluster Computing |
2020 |
1.9 |
364. |
S Sachdeva, T Bhatia, AK Verma |
A novel voting ensemble model for spatial prediction of landslides using GIS |
International Journal of Remote Sensing |
2020 |
2.47 |
365. |
Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo |
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing. |
IEEE Syst. J. |
2020 |
3.987 |
366. |
Sitender and Seema Bawa. |
A sanskrit-to-english machine translation using hybridization of direct and rule- based approach |
Neural Computing and Applications |
2020 |
4.774 |
367. |
Prabhjot Kaur Chahal, Shreelekha Pandey, Shivani Goel |
A survey on brain tumor detection techniques for MR images |
MULTIMEDIA TOOLS AND APPLICATIONS |
2020 |
2.313 |
368. |
Ashok Kumar, Anju Sharma,Rajesh Kumar |
A swarm intelligence-based quality of service aware resource allocation for clouds |
International Journal of Ad Hoc and Ubiquitous Computing |
2020 |
0.714 |
369. |
Aman Sharma; Rinkle Rani |
A Systematic Review of Applications of Machine Learning in Cancer Prediction and Diagnosis |
Archives of Computational Methods in Engineering (ARCO) |
2020 |
6.73 |
370. |
Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar |
A taxonomy of AI techniques for 6G communication networks. |
Computer Communications |
2020 |
2.816 |
371. |
Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar |
A taxonomy of blockchain-enabled softwarization for secure UAV network. |
Computer Communications |
2020 |
2.816 |
372. |
Anish Jindal, Neeraj Kumar, Mukesh Singh: |
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
373. |
Gagangeet Singh Aujla, Amritpal Singh, Neeraj Kumar |
AdaptFlow: Adaptive Flow Forwarding Scheme for Software-Defined Industrial Networks. |
IEEE Internet Things J |
2020 |
9.515 |
374. |
Darell Edmond, Vijay Prakash, Lalit Garg, Seema Bawa |
Adoption of Cloud Computing in Central Banks: Hindering factors and the recommendations for the way forward. |
Journal of Central Banking Theory and Practices |
2020 |
|
375. |
Rajesh Mehta, Keshav Gupta, Ashok Kumar Yadav |
An adaptive framework to image watermarking based |
Multimedia Tools and Applications |
2020 |
2.313 |
376. |
Sharad Saxena, Deepak Mehta |
An adaptive fuzzy-based clustering and bio-inspired energy efficient hierarchical routing protocol for wireless sensor networks |
Wireless and Personal Communication |
2020 |
1.2 |
377. |
Kuljeet Kaur, Sahil Garg, Neeraj Kumar, Gagangeet Singh Aujla, Kim-Kwang Raymond Choo, Mohammad S. Obaidat |
An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers. |
IEEE Syst. J. |
2020 |
3.987 |
378. |
Chandan Singh and Ashutosh Aggarwal |
An Effective Approach for Noise Robust and Rotation Invariant Handwritten Character Recognition Using Zernike Moments Features and Optimal Similarity Measure |
Applied Artificial Intelligence |
2020 |
1.172 |
379. |
Rohan Leekha, Inderveer Chana |
An efficacy of spectral features with boosted |
Journal of Medical Imaging and Health Informatics |
2020 |
0.659 |
380. |
Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Mohammad S. Obaidat, Debiao He, Harendra Singh |
An efficient and provable certificate-based proxy signature scheme for IIoT environment. |
Information Sciences |
2020 |
5.524 |
381. |
Neenu Garg, Seema Bawa, Neeraj Kumar |
An efficient data integrity auditing protocol for cloud computing |
Future Generation Computer Systems |
2020 |
6.125 |
382. |
Neenu Garg, Seema Bawa, and Neeraj Kumar. |
An efficient data integrity auditing protocol for cloud computing. |
Future Generation Computer Systems, |
2020 |
5.768 |
383. |
Aaisha Makkar, Neeraj Kumar: |
An efficient deep learning-based scheme for web spam detection in IoT environment. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
384. |
Prabhjot Kaur Chahal, Shreelekha Pandey |
An efficient Hadoop‐based brain tumor detection framework using big data analytic |
Software: Practice and Experience |
2020 |
1.786 |
385. |
Sandeep Saharan, Neeraj Kumar, Seema Bawa |
An efficient smart parking pricing system for smart city environment: A machine-learning based approach. |
Future Generation Computer Systems, |
2020 |
5.768 |
386. |
Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Mohsen Guizani |
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users With Imperfect CSI. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
387. |
Sumedha Arora, Anju Bala |
An ensembled data frequency prediction based framework for fast processing using hybrid cache optimization |
Journal of Ambient Intelligence and Humanized Computing |
2020 |
3.96 |
388. |
Aman Sharma and Rinkle Rani |
An Ensembled Machine Learning framework for Drug Sensitivity Prediction |
IET Systems Biology |
2020 |
1.392 |
389. |
Aman Sharma; Rinkle Rani |
An Ensembled Machine |
IET Systems Biology |
2020 |
1 |
390. |
J Kaur, PS Rana and AK Verma |
An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks |
Wireless Personal Communications |
2020 |
1.06 |
391. |
Sumedha Arora, Anju Bala |
An Intelligent Energy Efficient Storage System for Cloud Based Big Data Applications |
Simulation Modelling Practice and Theory |
2020 |
2.219 |
392. |
Huo, L., Jiang, D., Lv, Z., & Singh, S |
An Intelligent Optimization-Based |
Computational Intelligence, Wiley |
2020 |
1.196 |
393. |
Vivek Mehta, Seema Bawa, Jasmeet Singh |
Analytical review of clustering techniques and proximity measures |
Artificial Intelligence review |
2020 |
5.747 |
394. |
Mandeep Saggi, Sushma Jain |
Application of fuzzy-genetic and regularization random forest (FG-RRF): Estimation of crop evapotranspiration (ETc) for maize and wheat crops |
Agricultural Water Management |
2020 |
3.021 |
395. |
Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo |
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. |
Computers Security |
2020 |
3.579 |
396. |
Shaify Kansal, Jhilik Bhattacharya, and Vishal Srivastava |
Automated full-field polarization sensitive optical coherence tomography diagnostic systems for breast cancer |
Applied Optics |
2020 |
1.96 |
397. |
Amandeep Dhir, Nitin Koshta, Raman Kumar Goyal,Mototaka Sakashita and Mohammad Almotairi |
Behavioral reasoningtheory (BRT) perspectiveson E-waste recycling andmanagement |
Journal of Cleaner Production |
2020 |
7.246 |
398. |
S Kumari, N Kumar and PS Rana |
Big Data Analytics for Energy Consumption Prediction in Smart Grid using Genetic Algorithm and Long Short Term Memory |
Computing and Informatics |
2020 |
0.67 |
399. |
Kaur, Maninder; Kaur, Gurpreet; Sharma, Pradip Kumar; Jolfaei, Alireza; Singh, Dhananjay; |
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home |
The Journal of Supercomputing |
2020 |
2.6 |
400. |
Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar |
Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions. |
Journal of Parallel and Distributed Computing |
2020 |
2.296 |
401. |
Umesh Bodkhe, Sudeep Tanwar, Karan Parekh, Pimal Khanpara, Sudhanshu Tyagi, Neeraj Kumar, Mamoun Alazab |
Blockchain for Industry 4.0: A Comprehensive Review. |
IEEE Access |
2020 |
3.745 |
402. |
Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally |
Blockchain for Internet of Energy management: Review, solutions, and challenges. |
Computer Communications |
2020 |
2.816 |
403. |
Pradip Kumar Sharma, Neeraj Kumar, Jong Hyuk Park |
Blockchain Technology Toward Green IoT: Opportunities and Challenges. |
IEEE Network |
2020 |
9.59 |
404. |
Mamta, B. B. Gupta, K. -C. Li, V. C. M. Leung, K. E. Psannis and S. Yamaguchi |
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System |
IEEE/CAA Journal of Automatica Sinica |
2020 |
5.129 |
405. |
Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo |
Blockchain-based identity management systems: A review |
Journal of Network and Computer Applications |
2020 |
5.57 |
406. |
Basudeb Bera, Sourav Saha, Ashok Kumar Das, Neeraj Kumar, Pascal Lorenz, Mamoun Alazab |
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
407. |
Gagangeet Singh Aujla, Amritpal Singh, Maninderpal Singh, Sumit Sharma, Neeraj Kumar, Kim-Kwang Raymond Choo |
BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
408. |
Gagangeet Singh Aujla, Maninderpal Singh, Arnab Bose, Neeraj Kumar, Guangjie Han, Rajkumar Buyya |
BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications. |
IEEE Network |
2020 |
9.59 |
409. |
Amritpal Singh, Shalini Batra, Gagangeet Singh Aujla, Neeraj Kumar, Laurence T. Yang |
BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
410. |
Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Vinay Chamola |
CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment. |
IEEE Internet Things J |
2020 |
9.515 |
411. |
Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Debiao He |
CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs. |
IEEE Syst. J. |
2020 |
3.987 |
412. |
Tribhuvan Singh, Nitin Saxena |
Chaotic sequence and opposition learning guided approach for data clustering |
Pattern Analysis and Applications |
2020 |
1.512 |
413. |
Nikhil Verma, Harpreet Singh, Divya Khanna, Prashant Singh Rana and Sanjay Kumar Bhadada |
Classification of Drug Molecules for Oxidative Stress Signaling Pathway. |
IET Systems Biology |
2020 |
1.392 |
414. |
Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio and Seema Bawa |
Cloud and Edge Computing-based Computer Forensics: Challenges and Open Problems |
Electronics |
2020 |
2.412 |
415. |
Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues |
Cloud Centric Authentication for Wearable Healthcare Monitoring System. |
IEEE Transactions on Dependable and Secure Computing |
2020 |
6.404 |
416. |
Shubham Goel and Ravinder Kumar |
Collaboratively Augmented UIP - Filtered RIP with Relevancy Mapping for Personalization of Web Search |
Information Sciences |
2020 |
5.91 |
417. |
Sachin Kansal, Rajesh Kumar, Sudipto Mukherjee |
Color Invariant State Estimator to Predict the Object Trajectory and Catching using Dexterous Multifingered Delta Robot |
Multimedia Tools and Applications |
2020 |
2.31 |
418. |
Parminder Kaur, Avleen Malhi, HS Pannu |
Comparative analysis on cross-modal information retrieval: A review |
Computer Science Reviews |
2020 |
7.7 |
419. |
Shiva Raj Pokhrel, Surjit Singh |
Compound-TCP Performance for Industry 4.0 WiFi: A Cognitive Federated Learning Approach |
IEEE Transactions on Industrial Informatics |
2020 |
9.112 |
420. |
S Modi, J Bhattacharya, P Basak, |
Convolutional Neural Network-Bagged Decision Tree: A hybrid approach to reduce electric vehicle's driver's range anxiety by estimating energy consumption in real |
Soft Computing |
2020 |
3.05 |
421. |
Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana |
Convolutional neural networks for 5G-enabled Intelligent Transportation System : A systematic review. |
Computer Communications |
2020 |
2.816 |
422. |
P. Kumar; Ikbal Ali, Mini Thomas & Surjit Singh |
Coordinated framework for planning and operation of distribution system under probabilistic loading patterns with DG allocation |
Electric Power Components and Systems, Taylor and Francis |
2020 |
0.824 |
423. |
Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana |
Copyright Protection Scheme for Color Images using Extended Visual Cryptography |
Computers and Electrical Engineering Journal |
2020 |
2.662 |
424. |
Sukhchandan Randhawa, Sushma Jain |
Cross‑Layer Energy Based Clustering Technique for Heterogeneous Wireless Sensor Networks |
Wireless Personal Communications |
2020 |
1.061 |
425. |
Manju Devi, Sukhdip Singh and Shailendra Tiwari |
CT Image Reconstruction using NLMfuzzyCD Regularization Method |
Current Medical Imaging – Bentham Science |
2020 |
0.812 |
426. |
Liping Liu, Lin Wang, Dan Xu, Hongjie Zhang, Ashutosh Sharma, Shailendra Tiwari, Manjit Kaur, Manju Khurana and Mohd Asif Shah |
CT Image Segmentation Method of Liver Tumor Based on Artificial Intelligence Enabled Medical Imaging |
Mathematical Problems in Engineering |
2020 |
1.009 |
427. |
Amanpreet Singh,Maninder Kaur |
Cuckoo inspired stacking ensemble framework for content‐based cybercrime detection in online social networks |
Transactions on Emerging Telecommunications Technologies |
2020 |
1.594 |
428. |
Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana |
Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography |
Multimedia Tools and Applications |
2020 |
2.313 |
429. |
Ajay Kumar and Seema Bawa. |
Dais: dynamic access and integration services framework for cloud-oriented |
Cluster Computing |
2020 |
1.851 |
430. |
R Magoo, H Singh, N Jindal, N Hooda and PS Rana |
Deep learning based bird-eye view social distancing monitoring using surveillance video for curbing the COVID-19 spread |
Neural Computing and Applications |
2020 |
4.77 |
431. |
HS Pannu, Sahil Ahuja, Nitin Dang, Sahil Soni, Avleen Malhi |
Deep learning based image classification for intestinal hemorrhage |
MULTIMEDIA TOOLS AND APPLICATIONS |
2020 |
2.3 |
432. |
Payal Mittal, Akashdeep Sharma, Raman Singh |
Deep learning-based object detection in low-altitude UAV datasets: A survey |
Image and Vision Computing |
2020 |
3.103 |
433. |
Ankita Wadhawan, and Parteek Kumar |
Deep learning-based sign language recognition system for static signs. |
Neural Computing and Applications |
2020 |
4.774 |
434. |
Sawinder Kaur, Parteek Kumar,Ponnurangam Kumaraguru |
Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory |
Journal of Electronic Imaging |
2020 |
0.78 |
435. |
Jian Lian, Weikuan Jia, Masoumeh Zareapoor, Yuanjie Zheng, Rong Luo, Deepak Kumar Jain, Neeraj Kumar |
Deep-Learning-Based Small Surface Defect Detection via an Exaggerated Local Variation-Based Generative Adversarial Network. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
436. |
Sravani Challa, Ashok Kumar Das, Prosanta Gope, Neeraj Kumar, Fan Wu, Athanasios V. Vasilakos |
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
437. |
Simar Preet Singh, Anju Sharma, Rajesh Kumar |
Design and exploration of load balancers for fog computing using fuzzy logic |
Simulation Modelling Practice and Theory |
2020 |
2.426 |
438. |
Simar Preet Singh, Anju Sharma, Rajesh Kumar |
Designing of Fog Based FBCMI2E Model Using Machine Learning Approaches for Intelligent Communication Systems |
Computer Cpmmunications |
2020 |
2.816 |
439. |
Simar Preet Singh, Anju Sharma, Rajesh Kumar |
Designing of Fog Based FBCMI2E Model Using Machine Learning Approaches for Intelligent Communication Systems |
Computer Communications |
2020 |
2.816 |
440. |
Sawinder Kaur, Parteek Kumar, Ponnurangam Kumaraguru |
Detecting clickbaits using two-phase hybrid CNN-LSTM biterm model. |
Expert Systems with Applications |
2020 |
5.452 |
441. |
Amanpreet Singh,Maninder Kaur |
Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach |
Arabian Journal for Science and Engineering |
2020 |
1.711 |
442. |
Xinghua Li, Mengfan Xu, Pandi Vijayakumar, Neeraj Kumar, Ximeng Liu |
Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
443. |
Daljeet Singh, Rahul Upadhyay, HS Pannu, Dimitri Leray |
Development of an adaptive neuro fuzzy inference system based vehicular traffic noise prediction model |
Journal of Ambient Intelligence and Humanized Computing |
2020 |
4.5 |
444. |
Divya Prerna, Rajkumar Tekchandani, Neeraj Kumar |
Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges. |
Computer Communications |
2020 |
2.816 |
445. |
Aman Sharma; Rinkle Rani |
Drug Sensitivity Prediction Framework using Ensemble and Multi-task |
International Journal of Machine |
2020 |
3.753 |
446. |
Sandeep Saharan, Seema Bawa, Neeraj Kumar |
Dynamic pricing techniques for intelligent transportation system in smart cities: A systematic review. |
Computer Communications |
2020 |
3.066 |
447. |
Marinho Marlene, Vijay Prakash, Lalit Garg, Claudio Savaglio, and Seema Bawa |
Effective Cloud Resource Utilisation in Cloud ERP Decision-Making Process for Industry 4.0 in the United |
Electronics |
2020 |
2.412 |
448. |
Pandi Vijayakumar, Mohammad S. Obaidat, Maria Azees, SK Hafizul Islam, Neeraj Kumar |
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
449. |
Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo |
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. |
Security and Communication Networks |
2020 |
0.72 |
450. |
Simar Preet Singh, Rajesh Kumar, Anju Sharma |
Efficient Content Retrieval in Fog Zone using Nano-Caches |
Concurrency and Computation: Practice and Experience |
2020 |
1.447 |
451. |
Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma |
Efficient Data Management and Control over WSNs using SDN enabled |
International Journal of Communication Systems |
2020 |
1.278 |
452. |
Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma |
Efficient Data Management and Control over WSNs using SDN enabled Aerial Networks |
International Journal of Communication Systems |
2020 |
1.319 |
453. |
Mohd. Abuzar Sayeed, Rajesh Kumar, Vishal Sharma, Mohd. Asim Sayeed |
Efficient Deployment with Throughput Maximization for UAVs Communication Networks |
Sensors |
2020 |
3.275 |
454. |
H Chopra, H Singh, MS Bamrah, F Mahbubani, A Verma, N Hooda, PS Rana, RK Singla and AK Singh |
Efficient Fruit Grading System using Spectrophotometry and Machine Learning Approaches |
IEEE Sensors Journal |
2020 |
3.07 |
455. |
Vinay Kehar, Vinay Chopra, Bhupesh Kumar Singh, and Shailendra Tiwari |
Efficient Single Image Dehazing Model Using Metaheuristics-Based Brightness Channel Prior |
Mathematical Problems in Engineering – Hindawi |
2020 |
1.009 |
456. |
Sudeep Tanwar, Shriya Kaneriya, Neeraj Kumar, Sherali Zeadally |
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems. |
Future Gener. Comput. Syst. |
2020 |
1.319 |
457. |
Sahil Garg, Kuljeet Kaur, Shalini Batra, Gagangeet Singh Aujla, Graham Morgan, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan |
En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. |
Journal of Parallel and Distributed Computing |
2020 |
2.296 |
458. |
Vinay Chamola, Vikas Hassija, Biplab Sikdar, Neeraj Kumar, Nirwan Ansari |
Energy and Latency Aware Resource Management for Solar Powered Cellular Networks. |
IEEE Network |
2020 |
9.59 |
459. |
Neeraj Kumar, Athanasios V. Vasilakos, Kim-Kwang Raymond Choo, Laurence T. Yang |
Energy Management for Cyber-Physical Cloud Systems. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
460. |
Surjit Singh, Michael Sheng, Elhadj Benkhelifa, Jaime Lloret |
Energy Management, Protocols and Security for the Next Generation Networks and Internet of Things |
IEEE Transactions on Industrial Informatics |
2020 |
7.377 |
461. |
Rohit Ranjan, Ishan Singh Thakur, Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya |
Energy-Efficient Workflow Scheduling Using Container-Based Virtualization in Software-Defined Data Centers. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
462. |
J Kaur, PS Rana and AK Verma |
Enhancing dependability of wireless sensor network under flooding attack: A machine learning perspective |
International Journal of Ad Hoc and Ubiquitous Computing |
2020 |
0.72 |
463. |
V Gupta and PS Rana |
Ensemble Technique for Toxicity Prediction of Small Drug Molecules of the Antioxidant Response Element Signaling Pathway |
The Computer Journal |
2020 |
1.08 |
464. |
Shatrughan Modi, Jhilik Bhattacharya, Prasenjit Basak |
Estimation of energy consumption of electric vehicles using Deep Convolutional Neural Network to reduce driver’s range anxiety |
ISA Transactions |
2020 |
4.305 |
465. |
Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana |
Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors |
The Visual Computer |
2020 |
1.527 |
466. |
Keyur Patel, Dev Mehta, Chinmay Mistry, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar, Mamoun Alazab: |
Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges. |
IEEE Access |
2020 |
3.745 |
467. |
Rohan Singh Leekha, Kyungroul Lee, Aman Kataria |
Facilitating user authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence |
Mobile Information System |
2020 |
1.508 |
468. |
Kashish Goel, Parteek Kumar, Karun Verma |
Food Adulteration Detection using Artificial Intelligence: A Systematic Review |
Archives of Computational Methods in Engineering |
2020 |
6.73 |
469. |
Amrita Kaur, Pardeep Kaur, Sahil Ahuja |
Forster resonance energy transfer (FRET) and application thereof. |
Analytical methods |
2020 |
2.59 |
470. |
Vinay Chamola, Sambit Patra, Neeraj Kumar, Mohsen Guizani |
FPGA for 5G: Re-configurable Hardware for Next Generation Communication. |
IEEE Wirel. Commun. |
2020 |
11.391 |
471. |
Akhtar Husain, Santar Pal Singh, S.C. Sharma |
Fuzzy Logic Based Geocast Routing in Vehicular Ad Hoc Network |
Journal of Scientific & Industrial Research |
2020 |
0.72 |
472. |
Munish Kumar, Navdeep Singh, Ravinder Kumar, Shubham Goel, & Krishan Kumar |
Gait Recognition Based on Vision Systems: A Systematic Survey |
Journal of Visual Communication and Image Representation |
2020 |
2.479 |
473. |
Amrita Kaur, Lakhwinder Kaur, Ashima Singh |
GA-UNet: UNet-based framework for segmentation of 2D and 3D medical images applicable on heterogeneous datasets |
Neural Computing and Applications |
2020 |
4.7 |
474. |
Komal Singh Gill, Sharad Saxena, Anju Sharma |
GTM-CSec: Game Theoretic Model for Cloud Security based on IDS and Honeypot |
Computers & Security |
2020 |
3.579 |
475. |
Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Massimo Villari |
GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System |
IEEE Transactions on Services Computing |
2020 |
6.84 |
476. |
Surjit Singh, Michael Sheng, Elhadj Benkhelifa, Jaime Lloret |
Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things |
IEEE Transactions on Industrial Informatics |
2020 |
9.112 |
477. |
Albert Y. Zomaya, Neeraj Kumar, Joel J. P. C. Rodrigues, Gagangeet Singh Aujla |
Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem. |
IEEE Transactions on Industrial Informatics |
2020 |
8.48 |
478. |
Vinay Arora, EYK Ng, Karun Verma, Rohan Leekha, Takshi Gupta, Kathiravan Srinivasan |
HEALTH OF THINGS MODEL FOR CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO-OCCURRENCE MATRIX AND SPECTROGRAM |
Journal of Mechanics in Medicine and Biology |
2020 |
0.849 |
479. |
Deepak Mehta, Sharad Saxena |
Hierarchical WSN Protocol with Fuzzy Multi-criteria Clustering and Bio-inspired Energy-efficient Routing (FMCB-ER) |
Multimedia Tools and Applications |
2020 |
2.313 |
480. |
Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo |
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. |
IEEE Internet Things J |
2020 |
9.515 |
481. |
Sudeep Tanwar, Jayneel Vora, Shriya Kaneriya, Sudhanshu Tyagi, Neeraj Kumar, Vishal Sharma, Ilsun You: |
Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol. |
IEEE Consumer Electron. Mag. |
2020 |
2.21 |
482. |
Puja Modgil, Sushma Jain |
Hybrid frameworks for flexible job shop scheduling |
The International Journal of Advanced Manufacturing Technology |
2020 |
2.633 |
483. |
Cao, B., Dong, W., Lv, Z., Gu, Y., Singh, Surjit, & Kumar, P. |
Hybrid Microgrid Many-Objective Sizing Optimization with Fuzzy Decision |
IEEE Transactions on Fuzzy Systems |
2020 |
9.518 |
484. |
Isha Kansal and Singara Singh Kasana |
Improved Color Attenuation Prior based Image De-fogging Technique |
Multimedia Tools and Applications |
2020 |
2.313 |
485. |
Isha Kansal, Singara Singh Kasana |
Improved color attenuation prior based image de-fogging technique |
Multimedia Tools and Applications |
2020 |
2.101 |
486. |
Jhilik Bhattacharya, Tarunpreet Bhatia, Husanbir Singh Pannu |
Improved search space shrinking for medical image retrieval using capsule architecture and decision fusion |
Expert Systems with Applications |
2020 |
5.45 |
487. |
D Khanna and PS Rana |
Improvement in Prediction of Antigenic Epitopes using Stacked Generalization: An Ensemble Approach |
IET Systems Biology |
2020 |
1.39 |
488. |
Deepak Gupta, Rinkle Rani |
Improving malware detection using big data and |
Computers and Electrical |
2020 |
2.663 |
489. |
Muskaan Singh, Ravinder Kumar and Inderveer Chana |
Improving Neural Machine Translation for Low-Resource Indian Languages Using Rule-based Feature Extraction |
Neural Computing & Applications |
2020 |
4.664 |
490. |
Jitendra Kumar Samriya, Subhash Chandra Patel, Manju Khurana, Pradeep Kumar Tiwari, Omar Cheikhrouhou |
Intelligent SLA-Aware VM Allocation and Energy Minimization Approach with EPO Algorithm for Cloud Computing Environment |
Mathematical Problems in Engineering |
2020 |
1.009 |
491. |
Anish Jindal, Neeraj Kumar, Mukesh Singh: |
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM. |
Future Gener. Comput. Syst. |
2020 |
5.768 |
492. |
Sunil Kumar Mahla, Rohan Singh Leekha, Amit Dhir, Kyungroul Lee, |
Intervention of Artificial Neural Network with an |
Electronics |
2020 |
2.412 |
493. |
Pooja Anand, Yashwant Singh, Arvind Kumar Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar |
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. |
IEEE Access |
2020 |
3.745 |
494. |
Zeeshan Ali, Sajid Hussain, Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar, Shehzad Ashraf Chaudhry |
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. |
IEEE Access |
2020 |
3.745 |
495. |
G Sharma, A Kotia, SK Ghosh, PS Rana, S Bawa and MKH Ali |
Kinematic Viscosity Prediction of Nanolubricants Employed in Heavy Earth Moving Machinery using Machine Learning Techniques |
International Journal of Precision Engineering and Manufacturing |
2020 |
1.38 |
496. |
M Heydari, Alexios Mylonas, Vahid H F Tafreshi, Elhadj B, Surjit Singh |
Known unknowns: Indeterminacy in authentication in IoT |
Future Generation Computer Systems, Elsevier |
2020 |
6.125 |
497. |
Sivashankari Rajadurai, Mamoun Alazab, Neeraj Kumar, Thippa Reddy Gadekallu |
Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata |
IEEE Access |
2020 |
3.745 |
498. |
Vivek Dabra, Anju Bala, Saru Kumari |
LBA-PAKE: Lattice-based Anonymous Password Authenticated Key Exchange for mobile devices, |
IEEE Systems Journal |
2020 |
3.987 |
499. |
Simar Preet Singh, Anju Sharma, Rajesh Kumar, Anand Nayyar |
Leveraging Energy Efficient Load Balancing Algorithms in Fog Computing |
Concurrency and Computation: Practice and Experience |
2020 |
1.447 |
500. |
Gaurang Bansal, Naren Naren, Vinay Chamola, Biplab Sikdar, Neeraj Kumar, Mohsen Guizani |
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
501. |
Ravneet Kaur, Ravinder Kumar and PS Rana |
Long Short Term Memory Neural Network Based Multi-level Model for Smart Irrigation |
Modern Physics Letters B |
2020 |
1.224 |
502. |
Sahil Vashisht, Sushma Jain, G. Ahuja |
MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges |
Computer Communications |
2020 |
2.816 |
503. |
R Kaur, R Kumar and PS Rana |
Machine Learning Based Crop Water Demand Forecasting using Minimum Climatological Data |
Multimedia Tools and Applications |
2020 |
2.313 |
504. |
Anshu Parashar,Nidhi Kalra, Jaskirat Singh, Raman KumarGoyal |
Machine Learning Based Framework for Classification of Children with ADHD and Healthy Controls |
Intelligent |
2020 |
1.276 |
505. |
Harkawalpreet Kaur,Avleen Kaur Malhi, Husanbir Singh Pannu |
Machine learning ensemble for neurological disorders |
Neural Computing and Applications |
2020 |
4.7 |
506. |
Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar |
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model. |
Computer Communications |
2020 |
2.816 |
507. |
Chaman Verma, Veronika Stoffová, Zoltán Illés, Sudeep Tanwar, Neeraj Kumar |
Machine Learning-Based Student's Native Place Identification for Real-Time. |
IEEE Access |
2020 |
3.745 |
508. |
Muskaan Singh, Ravinder Kumar and Inderveer Chana |
Machine Translation Systems for Indian Languages: Review of Modelling Techniques, Challenges, Open Issues and Future Research Directions |
Archives of Computational Methods in Engineering |
2020 |
7.242 |
509. |
Deepak Mehta, Sharad Saxena |
MCH-EOR: Multi-objective Cluster Head based Energy aware Optimized Routing algorithm in Wireless Sensor Networks |
Sustainable Computing: Informatics and Systems |
2020 |
2.798 |
510. |
Vijay Prakash, Seema Bawa, Lalit Garg |
Multi- Dependency and Time, Based Scheduling Algorithm for Scientific Applications in Cloud Environment. |
Electronics |
2020 |
2.412 |
511. |
Raman Singh, Maninder Singh, Sheetal Garg, Ivan Perl, Olga Kalyonova, Aleksandr Penskoi |
Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment |
Journal of Ambient Intelligence and Smart Environments |
2020 |
1.595 |
512. |
Vyabhav Chaturvedi, Arman Beer Kaur, Vedansh Varshaney, Anupam Garg, Gurpal Chhabra and Munish Kumar |
Music Mood and Human Emotion Recognition Based on Physiological Signals: A Systematic Review |
Multimedia Systems |
2020 |
1.56 |
513. |
N. Kumar, M. Gupta, D. Gupta, S. Tiwari |
Novel deep transfer learning model for COVID‑19 patient detection using X‑ray chest images |
Journal of Ambient Intelligence and Humanized Computing, Springer |
2020 |
4.594 |
514. |
Priya Arora, Ashutosh Mishra, Avleen Malhi, |
N-semble based method for Parkinson’s disease gene identification |
Neural Computing and Applications |
2020 |
4.774 |
515. |
Anil Kumar Sutrala, Palak Bagga, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Pascal Lorenz |
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment. |
IEEE Transactions on Vehicular Technology |
2020 |
2.243 |
516. |
R K Sharma; Harjeet Singh; |
Online handwriting recognition systems for Indic and non-Indic scripts: a review |
Artificial Intelligence Review |
2020 |
5.9 |
517. |
H. Singh, R. K. Sharma and V. P. Singh |
Online handwriting systems for Indic and non-Indic scripts |
Artificial Intelligence Review |
2020 |
5.747 |
518. |
Diksha Hooda; Rinkle Rani |
Ontology driven human activity |
Journal of Ambient |
2020 |
4.594 |
519. |
Gurleen Kaur, Anju Bala |
OPSA: An Optimized Prediction based Scheduling Approach for Scientific Applications in Cloud Environment |
Cluster Computing |
2021 |
3.458 |
520. |
Monika Bharti, Sharad Saxena, Rajesh Kumar, Himanshu Jindal |
Optimal Resource Selection Framework on Internet-of-Things |
Computers and Electrical Engineering |
2021 |
2.663 |
521. |
Manju Khurana, Shivendra Shivani, Shailendra Tiwari, Bhisham Sharma, Mohammad S Obaidat, Kuei-Fang Hsiao |
Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes. |
Adhoc & Sensor Wireless Networks |
2021 |
0.948 |
522. |
N Hooda, PS Rana and S Bawa |
Optimizing Fraudulent Firm Prediction using Ensemble Machine Learning: A Case Study of an External Audit |
Applied Artificial Intelligence |
2021 |
1.17 |
523. |
Maninder Singh, Rajesh Bhatia |
Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram |
Information and Software Technology |
2021 |
2.726 |
524. |
Sumedha Arora, Anju Bala |
PAP: power aware prediction based framework to reduce disk energy consumption |
Cluster Computing |
2021 |
3.548 |
525. |
Rajat Chaudhary, Neeraj Kumar |
PARC: Placement Availability Resilient Controller Scheme for Software-Defined Datacenters. |
IEEE Transactions on Vehicular Technology |
2021 |
2.243 |
526. |
Tejasvi Alladi, Vinay Chamola, Naren Naren, Neeraj Kumar |
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. |
Computer Communications |
2021 |
2.816 |
527. |
Shubhani Aggarwal, Neeraj Kumar |
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges. |
Computer Communications |
2021 |
2.816 |
528. |
Munish Kumar, M. K. Jindal, R. K. Sharma and Simpel Rani Jindal |
Performance evaluation of classifiers for the recognition of offline handwritten Gurmukhi characters and numerals: a study |
Artificial Intelligence Review |
2021 |
5.747 |
529. |
S Sharma and V Kumar |
Performance Evaluation of Machine Learning Based Face Recognition Techniques |
Wireless Personal Communications |
2021 |
1.061 |
530. |
Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Omprakash Kaiwartya, Mohammad S. Obaidat |
PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System. |
IEEE Syst. J. |
2021 |
3.987 |
531. |
Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar |
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. |
IEEE Computer |
2021 |
3.564 |
532. |
Vikram Chopra, Ravinder Kumar, Nirbhow Jap Singh and Vikash sharma |
Position Control of PMBLDC Motor using ANFIS and SVR based controller |
National Academy Science Letters |
2021 |
0.331 |
533. |
Harjeet Singh, M Malarvel |
Post-processing algorithms for the formation of online handwritten Gurmukhi character/akshara |
Journal of Intelligent & Fuzzy Systems |
2021 |
1.851 |
534. |
A Sharma, N Jindal and PS Rana |
Potential of Generative Adversarial Net Algorithms in Image and Video Processing Applications - A Survey |
Multimedia Tools and Applications |
2021 |
2.31 |
535. |
Harpreet Singh, PS Rana, Urvinder Singh |
Prediction of drug synergy in cancer using ensemble-based machine learning techniques. |
Modern Physics Letters B |
2021 |
0.73 |
536. |
Harpreet Singh, PS Rana, Urvinder Singh |
Prediction of drug synergy score using ensemble based differential evolution. |
IET Systems Biology |
2021 |
1.392 |
537. |
Shiva Raj Pokhrel, Youyang Qu, Surya Nepal, Surjit Singh |
Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach |
IEEE Transactions on Intelligent Transportation Systems |
2021 |
6.319 |
538. |
Amritpal Singh, Sahil Garg, Ravneet Kaur, Shalini Batra, Neeraj Kumar, Albert Y. Zomaya |
Probabilistic data structures for big data analytics: A comprehensive review. |
Knowledge Based Systems |
2021 |
5.101 |
539. |
Akhtar Husain, Santar Pal Singh, S.C. Sharma, |
PSO Optimized Geocast Routing in VANET |
Wireless Personal Communications |
2021 |
1.06 |
540. |
Deepika Ghai, Hemant Kumar Gianey, Arpit Jain, Raminder Singh Uppal |
Quantum and dual-tree complex wavelet transform-based image watermarking |
International Journal of Modern Physics B |
2021 |
0.9 |
541. |
Banerjee, Sneha, Sawinder Kaur, and Parteek Kumar |
Quote examiner: verifying quoted images using web-based text similarity |
Multimedia Tools and Applications |
2021 |
2.313 |
542. |
J Bhattacharya, RK Sharma |
Ranking-based triplet loss function with intra-class mean and variance for fine-grained classification tasks |
Soft Computing |
2021 |
3.05 |
543. |
Shivendra Shivani, Subhash Chandra Patel, Vinay Arora, Bhisham Sharma, Alireza Jolfaei, Gautam Srivastava |
Real-time cheating immune secret sharing for remote sensing images |
Journal of real time image processing |
2021 |
1.96 |
544. |
Harjeet Singh, VP Singh, Munish Kumar |
Recognition of online handwritten Gurmukhi characters using recurrent neural network classifier |
Soft Computing |
2021 |
3.05 |
545. |
Vivek Dabra, Anju Bala, Saru Kumari |
Reconciliation based Key Exchange Schemes using Lattices: A Review |
Telecommunication Systems |
2021 |
1.734 |
546. |
Amarjeet Prajapati, Anshu Parashar, Jitender Kumar Chhabra |
Restructuring Object-Oriented Software |
Arabian Journal for Science and |
2021 |
1.7 |
547. |
Pramod Soni, Navin Rajpal, Rajesh Mehta |
Road Centerline Extraction From VHR Images Using SVM and Multi- |
Journal of the Indian Society of Remote Sensing |
2021 |
1.102 |
548. |
Pramod Soni, Navin Rajpal, Rajesh Mehta |
Road network extraction using multi-layered filtering and tensor voting |
The Egyptian Journal of Remote Sensing and Space Sciences |
2021 |
|
549. |
Shubham Goel, Ravinder Kumar, Ashwani Kumar and Reetu Malhotra |
S3A:Smart Station Search Assistance for Electric Vehicle - a step towards smart city |
IEEE Consumer Electronics Magazine |
2021 |
3.273 |
550. |
Mohd. Abuzar Sayeed, Rajesh Kumar, Vishal Sharma |
Safeguarding Unmanned Aerial Systems (UAS): An Approach for Identifying Malicious Aerial Nodes |
IET Communications |
2021 |
1.664 |
551. |
Sitender and Seema Bawa. |
Sanskrit to universal networking language enconverter system based on deep |
Multimedia Systems |
2021 |
1.563 |
552. |
Akhil Kumar, Arvind Kalia, Kinshuk Verma, Akashdeep Sharma and Manisha Kaushal |
Scaling up face masks detection with YOLO on a novel dataset |
Optik- International Journal for Light and Electron Optics, |
2021 |
2.187 |
553. |
Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo: |
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. |
Sci. China Inf. Sci. |
2021 |
2.205 |
554. |
Mamta and Brij B. Gupta |
Secure Fine-Grained Keyword Search with Efficient User Revocation and Traitor Tracing in the Cloud |
Journal of Organizational and End Computing |
2021 |
0.75 |
555. |
Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar |
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. |
IEEE Transactions on Vehicular Technology |
2021 |
2.243 |
556. |
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo |
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. |
IEEE Transactions on Dependable and Secure Computing |
2021 |
6.404 |
557. |
Arunima Ghosh, Shashank Gupta, Amit Dua, Neeraj Kumar |
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects. |
Journal of Network and Computer Applications |
2021 |
5.57 |
558. |
Pramod Kumar Soni, Navin Rajpal, Rajesh Mehta |
Semiautomatic Road Extraction Framework Based on Shape Features and LS-SVM from High-Resolution Images |
J. Indian Soc Remote Sens |
2021 |
0.869 |
559. |
Sugandi Verma, Parteek Kumar, Sanmeet Kaur |
Sign Language Generation System Based on Indian Sign Language Grammar |
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
2021 |
1.36 |
560. |
Sugandhi, Parteek Kumar, and Sanmeet Kaur |
Sign Language Generation System Based on Indian Sign Language Grammar. |
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
2021 |
1.42 |
561. |
B Garg, VP Rathor and PS Rana |
Significance Driven Inverse Distance Weighted Filter to Restore Impulsive Noise Corrupted X-ray Image |
Journal of Ambient Intelligence and Humanized Computing |
2021 |
4.59 |
562. |
Zhihan Lv, Neeraj Kumar |
Software defined solutions for sensors in 6G/IoE. |
Computer Communications |
2021 |
2.816 |
563. |
Ashima Singh, Amrita Kaur, Arwinder Kaur, Sahil Ahuja, Harpreet Vohra |
Software System to predict the infection in COVID-19 Patients using Deep learning and Web of Things |
Software:Practice and Experience |
2021 |
1.78 |
564. |
Shubham Goel and Ravinder Kumar |
SoTaRePo: Society-Tag Relationship Protocol based architecture for UIP construction |
Expert Systems With Applications |
2021 |
5.452 |
565. |
Aaisha Makkar, Neeraj Kumar, Albert Y. Zomaya, Shalini Dhiman: |
SPAMI: A cognitive spam protector for advertisement malicious images. |
Information Sciences |
2021 |
5.524 |
566. |
Rupinder Kaur, Parteek Kumar |
Speaker Classification with Support Vector Machine and Crossover-Based Particle Swarm Optimization |
International Journal of Pattern Recognition and Artificial Intelligence |
2021 |
1.375 |
567. |
J Bhattacharya, G Ramponi |
Speeded-up Convolution Neural Network for classification tasks using multiscale 2-dimensional decomposition |
NeuroComputing |
2021 |
4.43 |
568. |
Vivek Mehta, Seema Bawa, Jasmeet Singh |
Stamantic Clustering: Combining Statistical and Semantic Features for Clustering of Large Text Datasets |
Expert System With Applications |
2021 |
5.452 |
569. |
Amrita kaur, Lakhwinder kaur and Ashima Singh |
State of the art segmentation techniques and future directions for Multiple Sclerosis Brain Lesions |
Archives of Computational Methods in Engineering |
2021 |
7.36 |
570. |
Patel Jay, Vasu Kalariya, Pushpendra Parmar, Sudeep Tanwar, Neeraj Kumar, Mamoun Alazab: |
Stochastic Neural Networks for Cryptocurrency Price Prediction. |
IEEE Access |
2021 |
3.745 |
571. |
Sachin Kansal, Mohd. Zubair, Bhivraj Suthar, Sudipto Mukherjee |
Tele-operation of an Industrial Robot by an Arm Exoskeleton for Peg-in-Hole |
Robotica |
2021 |
1.5 |
572. |
Zhongshao Kuang, Shuangyuan Dai, Yinjuan Xiao, Weio Luo, Jing Tian, Ashutosh Sharma, Shailendra Tiwari, Manish Gupta, Manjit Kaur, and Mohd Asif Shah |
The Effect of Biofeedback Therapy Combined with Comprehensive Nursing Intervention on the Quality of Life of Patients with Functional Constipation Based on Dynamic Magnetic Resonance Defecation |
Journal of Healthcare Engineering |
2021 |
1.803 |
573. |
Rajendra Kumar Roul |
Topic modeling combined with classification technique for extractive multi-document text summarization |
Soft Computing |
2021 |
3.05 |
574. |
T Bhatia, AK Verma, G Sharma |
Towards a secure incremental proxy re‐encryption for e‐healthcare data sharing in mobile cloud computing. |
Concurrency and Computation: Practice and Experience |
2021 |
1.447 |
575. |
J Kaur, PS Rana and AK Verma, |
Toxicity prediction of small drug molecules binding to aryl hydrocarbon receptor using ensemble model |
Wireless Personal Communications |
2021 |
0.91 |
576. |
Rajanpreet Kaur Chahal, Neeraj Kumar, Shalini Batra |
Trust management in social Internet of Things: A taxonomy, open issues, and challenges. |
Computer Communications |
2021 |
2.816 |
577. |
Shivam Behl, Aman Rao, Sahil Aggarwal, Sakshi Chadha, H.S.Pannu |
Twitter for Disaster Relief Through Sentiment Analysis for COVID-19 and Natural Hazard Crises |
International Journal of Disaster Risk Reduction |
2021 |
2.8 |
578. |
Khan Muhammad, Salman Khan, Neeraj Kumar, Javier Del Ser, Seyedali Mirjalili |
Vision-based personalized Wireless Capsule Endoscopy for smart healthcare: Taxonomy, literature review, opportunities and challenges. |
Future Gener. Comput. Syst. |
2021 |
5.768 |
579. |
Sahil Sharma and Vijay Kumar |
Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning |
Multimedia Tools and Applications |
2021 |
2.313 |
580. |
Sahil Sharma and Vijay Kumar |
Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing |
Multimedia Tools and Applications |
2021 |
2.313 |
581. |
Quoc-Viet Pham, Seyedali Mirjalili, Neeraj Kumar, Mamoun Alazab, Won-Joo Hwang |
Whale Optimization Algorithm With Applications to Resource Allocation in Wireless Networks. |
IEEE Transactions on Vehicular Technology |
2021 |
2.243 |
582. |
Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar |
When Blockchain Meets Smart Grid: Secure Energy Trading in Demand Response Management. |
IEEE Network |
2021 |
9.59 |
583. |
Qi Feng, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo |
White-Box Implementation of Shamir's Identity-Based Signature Scheme. |
IEEE Syst. J. |
2021 |
3.987 |
List of research publications in SCI/Impact Factor journals
S. No | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Impact Factor |
---|---|---|---|---|
1 | Cloud-based automatic test data generation framework | Journal of Computer and System Sciences,Vol. 82, no. 5, PP. 712–738, 2016 | Priyanka Chawla, Inderveer Chana and Ajay Rana | 1.1380 |
2 | Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi | Neural Computing and Applications, 2016 | Karun Verma, RK Sharma | 1.4920 |
3 | An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition | Journal of Engineering Research,4(1), 1-20, 2016 | Teena Mitaal, R. K. Sharma | 0.1280 |
4 | Green Service Level Agreement (GSLA) Framework for Cloud Computing | Computing, Springer,Volume 98, Issue 9, pp 949–963, 2016 | Goyal, S. ; Bawa, S. ; Singh, B | 0.8720 |
5 | Comparative analysis of cloud data integrity auditing protocols | Journal of Network and Computer Applications, Vol. 66 Issue C, May 2016, pp 17-32.,2016 | Neeru Garg, Seema Bawa | 2.3310 |
6 | Energy optimized resource scheduling algorithm for private cloud computing | International Journal of Ad Hoc and Ubiquitous Computing,Vol. 23, Issue 1-2, 2016 | S. Goyal, S. Bawa and B. Singh | 0.4930 |
7 | Detecting And Containing Malicious Services In An Intercloud Environment | Journal of Web Engineering,Vol. 15, No.5&6 (Apr 2016), pp: 521-538, 2016 | Lohit Kapoor, Seema Bawa, Ankur Gupta | 0.3900 |
8 | Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy | ACM Computing Surveys,Volume 48 Issue 2, Article 22, 2016. | Tarandeep Kaur and Inderveer Chana | 3.7300 |
9 | EARTH- Energy-aware Autonomic Resource Scheduling in Cloud Computing | Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 | Sukhpal Singh and Inderveer Chana | 1.8120 |
10 | Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach | Journal of Grid Computing,Volume 14, Issue 2, pp. 327–345, 2016 | Nidhi Jain Kansal, Inderveer Chana | 1.5070 |
11 | Energy aware scheduling of deadline-constrained tasks in cloud computing | Journal of Cluster Computing,Volume 19, Issue 2, pp 679–698, 2016 | Tarandeep Kaur and Inderveer Chana | 1.5000 |
12 | Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks | Mobile Information Systems, 2016 | Vishal Sharma, Ilsun You, Rajesh Kumar | 0.8720 |
13 | A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks | International Journal of Ad Hoc and Ubiquitous Computing, Vol. 21, issue 2, pp. 140–155, 2016 | Suman Bala, Anil K. Verma | 0.6900 |
14 | Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. | Wireless Personal Communications,Vol. 89 No.2, 1-21, 2016 | Goyal, Nitin, Mayank Dave, and Anil Kumar Verma | 0.6500 |
15 | Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks | Transactions on Internet & Information Systems,Vol. 10 Issue 4, p1571-1589, 2016 | Anjali Anand, Rinkle Rani, Himanhsu Aggarwal | 0.5600 |
16 | A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. | Digital Scholarship in the humanities, 2016 | Agarwal, Vaibhav, and Parteek Kumar | 0.4300 |
17 | Fuzzy state Grammar and Fuzzy Deep Pushdown Automata | Journal of Intelligent and Fuzzy Systems,31(1), 249-258, 2016 | Nidhi Kalra, Ajay Kumar | 1.0040 |
18 | An efficient scheme for automatic web pages categorization using the support vector machine | The New Review of Hypermedia and Multimedia,vol. 22, no. 3, pp. 223-242, 2016 | Vinod Kumar Bhalla, Neeraj Kumar | 0.6500 |
19 | A Recursive Algorithm for Generalized Constraint SCS Problem | National Academy Science Letters,pp 273-276, 2016 | Kaish Mangal and Ravinder Kumar | 0.3450 |
20 | Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling | An International Journal Applied Mathematics & Information Sciences,1193-1201; 2016 | Sandeep Saharan and Ravinder Kumar | 1.2320 |
21 | A systematic review of approaches for testing concurrent programs | Concurrency and Computation: Practice And Experience,Vol. 5, pp. 1572 – 1611 | Vinay Arora, Rajesh Bhatia, Maninder Singh | 0.9400 |
22 | Conversion of fuzzy automata into fuzzy regular expressions using transitive closure | Jounal of Intelligent & Fuzzy Systems vol.30,pp.3123-3129, 2016 | Sunita Garhwal and Ramjiwari | 1.0040 |
23 | An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection | Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar | 0.1710 |
24 | Block based High Capacity Multilevel Image Steganography | Journal of Circuits, Systems and Computers, pp 1-21, 2016 | Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia | 0.3300 |
25 | Multi-Model Persistent Solution for Healthcare Big Data | Journal of Medical Imaging and Health Informatics, 2016 | Karamjit Kaur and Rinkle Rani | 0.5800 |
26 | A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity | Computers & Electrical Engineering, 2016 | Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin | 1.0840 |
27 | A Survey on Resource Scheduling in Cloud Computing Issues and Challenges | Journal of Grid Computing,Vol 14, no. 2, pp 217–264, 2016 | Sukhpal Singh and Inderveer Chana | 1.5000 |
28 | A Hybrid-Cascaded Framework for PET and SPECT Image Reconstruction | Journal of Medical Imaging & Health Informatics (JMIHI) Vol. 6, 2016 | Shailendra Tiwari, Rajeev Srivastava | 0.8770 |
29 | A genetic algorithm based distance-aware routing protocol for wireless sensor networks | Computers & Electrical Engineering,vol. 56, pp. 441-455, 2016 | Tarunpreet Bhatia, Simmi Kansal Shivani Goel, A. K. Verma | 1.5700 |
30 | Progressive Visual Cryptography with Unexpanded Meaningful Shares | In ACM Transactions on Multimedia Computing Communication and Application, Vol 12(4), 2016 | Shivendra Shivani, Suneeta Agarwal | 2.2500 |
31 | Novel Basis Matrix Creation and Preprocessing Algorithms for Friendly Progressive Visual Secret Sharing with Space-Efficient Shares | MULTIMEDIA TOOLS AND APPLICATIONS , 2016 | Shivendra Shivani, Suneeta Agarwal | 1.5300 |
32 | VPVC: Verifiable Progressive Visual Cryptography | Pattern Analysis and Application,Vol 19, No. 3. , 2016 | Shivendra Shivani, Suneeta Agarwal | 1.3500 |
33 | Self authenticating medical X-ray images for telemedicine applications | MULTIMEDIA TOOLS AND APPLICATIONS, 2016 | Rajitha B, Shivendra Shivani, Suneeta Agarwal | 1.5300 |
34 | Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System | Computers & Electrical Engineering 52: 82-97, 2016 | Rasmeet S. Bali, Neeraj Kumar | 1.5700 |
35 | An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud | Peer-to-Peer Networking and Applications 9(5): 824-840, 2016 | Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal | 1.2620 |
36 | A novel covert channel detection method in cloud based on XSRM and improved event association algorithm | Security and Communication Networks 9(16): 3543-3557, 2016 | Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao | 1.0670 |
37 | A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography | Security and Communication Networks 9(17): 3944-3951, 2016 | Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues | 1.0670 |
38 | Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures | IEEE -Trans. Information Forensics and Security 11(9): 2052-2064, 2016 | Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu | 4.3320 |
39 | A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem | The Journal of Supercomputing 72(9): 3588-3600, 2016 | Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti | 1.3260 |
40 | Fuzzy-based trust prediction for effective coordination in vehicular ad hoc networks | International Journal Of Communication Systems, 2016 | Avleen Kaur Malhi, Shalini Batra | 1.0660 |
41 | Improved Multi-Objective Particle Swarm Optimization Algorithm for Optimizing Watermark Strength in Color Image Watermarking | Applied Intelligence, 2016 | Nitin Saxena and K.K. Mishra | 1.9040 |
42 | A Nature Inspired Hybrid Optimization Algorithm for Dynamic Environment with Real Parameter Encoding | International Journal of Bio-Inspired Computation, 2016 | Ashish Tripathi, Nitin Saxena, K. K. Mishra and A. K. Misra | 1.3900 |
43 | A parallel fuzzy clustering algorithm for large graphs using Pregel | Expert Systems with Applications,Vol. 78, pp. 135-144, 2016 | Vandana Bhatia and Rinkle Rani | 3.9300 |
44 | A Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks | Journal of communications and Networks,Vol. 18, No. 6, pp. 938-947, 2016 | Anjali Anand, Rinkle Rani and Himanhsu Aggarwal | 1.1300 |
45 | Content-based image retrieval embedded with agglomerative clustering built on information loss | Computers & Electrical Engineering 54,506-521, 2016 | Shreelekha Pandey, Pritee Khanna | 1.5700 |
46 | Clustering of hierarchical image database to reduce inter-and intra-semantic gaps in visual space for finding specific image semantics | Journal of Visual Communication and Image Representation,704-720, (2016) | Shreelekha Pandey, Pritee Khanna, Haruo Yokota | 2.1640 |
47 | A semantics and image retrieval system for hierarchical image databases | Information Processing & Management,571-591, 2016 | Shreelekha Pandey, Pritee Khanna, Haruo Yokota | 2.1640 |
48 | G-FANET: An Ambient Network Formation Between Ground and UAVs | Telecommunication Systems,pp 1-24, 2016 | Vishal Sharma, Rajesh Kumar | 0.8220 |
49 | A Multi-model Persistent Solution for Healthcare Big Data/td> | Journal of Medical Imaging and Health Informatics,pp 937-947, 2016 | Karamjit Kaur, Rinkle Rani | 0.9000 |
50 | EMD based Steganography Techniques for JPEG2000 Images and Videos | International Journal of Wavelets, Multiresolution and Information Processing, pp. 937-947, 2016 | Karamjit Kaur, Rinkle Rani | 0.9000 |
51 | Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN | AEU-International Journal of Electronics and Communications, 2016 | Ramnik Singh, A K Verma | 0.7860 |
52 | A Novel Framework for Grading Writers using Offline Gurmukhi Characters | Proceedings of the National Academy of Sciences, India Section A: Physical Sciences,405-15, 2016 | Munish Kumar, R. K. Sharma and M. K. Jindal | 0.1790 |
53 | Integrated search technique for parameter determination of SVM for speech recognition | Journal of Central South University, 2016 | Teena Mitaal, R. K. Sharma | 0.5200 |
54 | A note on data mining based noise diagnosis and fuzzy filter design for image processing | Computers and Electrical Engineering,49-, 50, 2016 | Rajiv Kumar, Khushneet Jindal | 1.0840 |
55 | Multicast protection and grooming scheme in survivable WDM optical networks | International Journal of Communication System,42-57, 2016 | Ashok Kumar, Pradhan, SayanGhose, Tanmay de | 1.8600 |
56 | Node stability aware single node failure recovery approach for WSANS | MJC,Vol. 29, No. 2, 2016 | V Ranga, M Dave, AK Verma | 0.4000 |
57 | One-to-many authentication for access control in mobile pay-TV systems | SCIENCE CHINA Information Sciences 59(5), 2016 | Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee | 1.6280 |
58 | Optimal nodes selection in wireless sensor and actor networks based on prioritized mutual exclusion approach | Kuwait Journal of Science,vol. 43, pp. 150-173, 2016. | Virendra Ranga, M Dave, A K Verma | 0.5000 |
59 | PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks | Wireless Personal Communications,Volume 87, Issue 3, pp 995–1012,2016 | Gaurav Sharma, Suman Bala, Anil K. Verma | 0.6500 |
60 | Prediction based proactive load balancing approach through VM migration. | Engineering with Computers,581-592, 2016 | AnjuBala and Inderveer Chana | 1.4600 |
61 | Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming | Advances in Materials Science and Engineering, 2016 | Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar | 1.010 |
62 | Prediction-based proactive load balancing approach through VM migration | Engineering with Computers,pp. 581-592, 2016 | Anju Bala, Inderveer Chana | 1.4510 |
63 | Predictive hierarchical human augmented map generation for itinerary perception | IET Electronic Letters, Vol 52, 2016 | Baljeet Kaur and Jhilik Bhattacharaya | 0.9400 |
64 | Protein structure prediction (RMSD <= 5A") using machine learning models | International Journal of Data Mining and Bioinformatics,71-85, 2016 | Y Pathak, PS Rana, PK Singh and M Saraswat | 0.7000 |
65 | QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review/td> | ACM Computing Surveys, 2016 | Sukhpal Singh and Inderveer Chana | 3.7300 |
66 | Quantum neural network based machine translator for English to Hindi | Applied Soft Computing 38,1060–1075, 2016 | Ravi Narayana, S. Chakraverty, V.P. Singh | 2.8000 |
67 | Regression Based Weight Generation Algorithm in Neural Networks for Estimation of Frequencies of Vibrating Plate | Journal of Computer Methods in Applied Mechanics and Engineering,4194-4202, 2016 | S. Chakraverty, V. P. Singh and R. K. Sharma | 3.4600 |
68 | Resource Provisioning and Scheduling in Clouds: QoS Perspective | The Journal of Supercomputing,Vol. 72, no. 3, pp 926–960, 2016 | Sukhpal Singh and Inderveer Chana | 0.8500 |
69 | Secure clustering for efficient data dissemination in vehicular cyber-physical systems | Future Generation Comp. Syst. 56: 476-492, 2016 | Rasmeet S. Bali, Neeraj Kumar | 3.9970 |
70 | Security analysis and design of an efficient ECC based two-factor password authentication scheme | Security and Communication Networks, 2016 | Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin | 0.8060 |
71 | Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs | IEEE Communications Letters,Volume: 19, Issue: 11, 2016 | Vishal Sharma, Rajesh Kumar, Prashant Singh | 1.2910 |
72 | Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis | The Journal of Supercomputing, pp. 1–28,2016 | Rajkumar Tekchandani, Rajesh Bhatia and Maninder Singh | 1.3260 |
73 | SERVmegh: framework for green cloud | Concurrency and Computation, 2016 | Ashok Kumar, Anju Sharma, Rajesh Kumar | 0.9420 |
74 | SOCCER: Self-Optimization of Energy-efficient Cloud Resources | Cluster Computing , Vol. 19, no. 4, pp. 1787-1800, 2016 | Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya | 1.1540 |
75 | Software component and the semantic Web: An in-depth content analysis and integration history | Journal of System and Software, Vol.125, pages152-169, 2016. | Loveleen Kaur, Ashutosh Mishra | 2.4440 |
76 | Speech recognition using ANN and predator influenced civilized swam optimization algorithm | Turkish Journal of Electrical Engineering & Computer Sciences 24, 4780-803, 2016 | Teena Mitaal, R. K. Sharma | 0.5070 |
77 | State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids | Current Bioinformatics, 11(4), 470-479, 2016 | Nidhi Kalra, Ajay Kumar | 0.7700 |
78 | Statistical Feature Extraction Based Iris Recognition System | Sadhana-Academy Proceedings in Engineering Sciences, 507-18, 2016 | Atul Bansal, R. Agarwal and R. K. Sharma | 0.5870 |
79 | Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks | International Journal of Communication Systems, pp 1-25, 2016 | Vishal Sharma, Rajesh Kumar | 1.0990 |
80 | Three Tier Neural Model For Service Provisioning Over Collabrative Modulus Operator for Digital Images | Neural Computing and Applications, pp. 1-21, 2016 | Vishal Sharma, Rajesh Kumar | 1.4920 |
81 | UAV Assisted Capacity Enhancement In Heterogenous Networks | IEEE Communications Letters,Volume: 20, Issue: 6, Pages: 1207 - 1210, 2016 | Vishal Sharma, Mehdi Bennis, Rajesh Kumar | 1.2910 |
82 | UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks | International Journal of Ad Hoc and Ubiquitous Computing, 2016 | Vishal Sharma, Rajesh Kumar | 0.4930 |
83 | Vehicular delay-tolerant networks for smart grid data management using mobile edge computing | IEEE Communications Magazine54(10): 60-66, 2016 | Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues | 10.4350 |
84 | Wireless and Mobile Technologies for the Internet of Things | Mobile Information Systems , 2016 | Wireless and Mobile Technologies for the Internet of Things | 0.8490 |
85 | Job Migration Policies for Grid Environment | Wireless Personal Communication, 2016 | Neeraj Kumar Rathore and Inderveer Chana | 0.951 |