Year 2017-21 Conferences

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors Conference

1.       

UNL-ization of Punjabi with IAN

Vaibhav Agarwal, Parteek Kumar

2017

IJCNLP

2.       

A Neural Network Based System for Face Identification by a Blind User

Sergio Carrato, Stefano Marsi, Giovanni Ramponi, Jhilik Bhattacharya, Francesco Guzzi

2017

49TH Annual Meeting Of The Associazione Società Italiana Di Elettronica

3.       

Arrival Based Deadline Aware Job Scheduling Algorithm in cloud

Swati Gupta, Kumar R.

2017

4th IEEE International Conference on Signal Processing, Computing and Control (ISPCC 2k17)

4.       

A Dual Watermarking Scheme  for Ownership Verification and Pixel Level Authentication

Shivendra Shivani, Priyanka Singh and Suneeta Agarwal

2017

9th International Conference on Computer and Automation Engineering(ICCAE-2017),

5.       

Flood Susceptibility Mapping using GIS-based Support Vector Machine and Particle Swarm Optimization: A case study in Uttarakhand (India) 

Shruti Sachdeva, Tarunpreet Bhatia, A.K. Verma

2017

Eight International Conference On Computing, Communication And Networking Technologies (ICCCNT)

6.       

Interference Aware Scheduling of Tasks on Cloud

S. Setia & R. Kumar

2017

held at JP University Waknaghat, Sept21-23, 20172017 4th International Conference on Signal Processing, Computing and Control (ISPCC)

7.       

Abstracting Communication Methodology in IoT Sensors to Eliminate Redundancy and Cycles

Sharad Saxena

2017

ICACDS

8.       

Image Encryption Using Chaotic Sequence and Flipping

Priyanka and Ashish Girdhar

2017

ICCCA

9.       

A Review on Node Replication Attack Identification Schemes in WSN

Harpreet Kaur, Sharad Saxena

2017

ICCCNT

10.   

An Efficient algorithm for Sampling of Single Large Graph

Vandana Bhatia and Rinkle Rani

2017

IEEE 10th International Conference on Contemporary Computing (IC3’2017)

11.   

A Novel Localized Approach for Efficient delivery of Software Products

Diksha Hooda and Rinkle Rani

2017

IEEE Fourth International Conference on Signal Processing, Computing and Control, ISPCC-2017

12.   

SDN-based Data Center Energy Management System Using RES and Electric Vehicles

Gagangeet Singh Aujla, Anish Jindal, Neeraj Kumar, Mukesh Singh

2017

IEEE Global Communications Conference (GLOBECOM),

13.   

FAAL: Fog computing-based patient monitoring system for ambient assisted living

Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues:

2017

IEEE HealthCom

14.   

Home-based exercise system for patients using IoT enabled smart speaker

Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Joel J. P. C. Rodrigues:

2017

IEEE HealthCom

15.   

An Efficient Influence based Label Propagation algorithm for Clustering large graphs

Vandana Bhatia and Rinkle Rani

2017

IEEE International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017),

16.   

Lagrangian Relaxation for the Vehicle Routing Problem with time windows

Divya Aggarwal, Ashish Girdhar, Vijay Kumar

2017

IEEE International Conference on Intelligent Computing, Instrumentation & Control Technologies,

17.   

Classification of cancerous profiles using machine learning

Aman Sharma and Rinkle Rani

2017

IEEE International Conference on Machine Learning and Data Science

18.   

INGC:  Graph Clustering & Outlier Detection algorithm using Label Propagation

Vandana Bhatia, Bharti Saneja and Rinkle Rani

2017

IEEE International Conference on Machine Learning and Data Science

19.   

Sentiment Analysis of Customer Product  Reviews Using Machine Learning  

Zeenia Singla, Sukhchandan Randhawa,  Sushma Jain

2017

IEEE International Conference on Intelligent Computing and Control(I2c2’17), 

20.   

Student satisfaction: A survey at an Indian University

Himika, Sukhchandan Randhawa and Maninder Kaur

2017

IEEE International Conference on Intelligent Computing and Control(I2c2’17), 

21.   

Secure Certificateless Proxy Reencryption without Pairing

Veronica Kuchta, Gaurav Sharma, Rajeev Sahu, Tarunpreet  Bhatia, Olivier Markowitch

2017

In Proceedings of 12th International Workshop on Security, International Conference Center Hiroshima,

22.   

Managing Software Product line using an Ontological Rule Based Framework

Megha, Shivani Goel, Ajay Kumar and Arun Negi

2017

Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017 International Conference

23.   

Statistical and Sentiment Analysis of Customer Product Reviews

Zeenia Singla, Sukhchandan Randhawa, Sushma Jain

2017

International Conference on Computing Communication and Networking Technologies 2017

24.   

Churn Prediction in Telecommunication using Machine Learning

Kriti Mishra and Rinkle Rani

2017

International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

25.   

Comprehensive Review On Supervised Machine Learning Algorithms

Hemant Kumar Gianey, Rishabh Choudhary

2017

International Conference on Machine Learning and Data Science (MLDS), Noida

26.   

ABE based Secure Distributed Storage Scheme for Big Data in Cloud

Bhawna Jain, Tarunpreet Bhatia, A.K. Verma

2017

International Conference on Smart Technologies in Computer and Communication (SmartTech 2017),

27.   

Fault Tolerance for scientific applications in cloud

Suruchi Talwani and Inderveer Chana

2017

International Conference on Telecommunication and Networks (TEL-NET 2017)

28.   

Feeding a DNN for Face Verification in Video Data acquired by a Visually Impaired User

Jhilik Bhattacharya , Stefano Marsi , Sergio Carrato , Herbert Frey , and Giovanni Ramponi 

2017

MIPRO 2017  CIS - Intelligent Systems,Croatia,

29.   

Enhanced Grade Diffusion for Node Recovery in Wireless Sensor

Amandeep Kaur, Sukhchandan Randhawa and Sushma Jain, 

2017

Networks   IEEE International Conference on Intelligent Computing and Control(I2c2’17), 

30.   

Real-time DNN-based Face Identification for the Blind

Jhilik Bhattacharya, Francesco Guzzi, Stefano Marsi, Sergio Carrato, andGiovanni Ramponi

2017

Proc. Applications in Electronics Pervading Industry, Environment and Society, ApplePies 2017

31.   

Multipath Routing in Wireless Sensor Networks: A Taxonomy and Future Research Directions

Sukhchandan Randhawa and Sushma Jain

2017

Recent Advances and Applications in Computer Engineering Conference, St. Xavier, Jaipur, 23-25 November 2017

32.   

Face as bio-metric password for secure ATM transactions

Arun Singh, Jhilik Bhattacharya, Shatrughan Modi

2017

Sixth International Conference on Soft Computing for Problem Solving

33.   

Information Retrieval in Web Crawling Using Population Based, and Local Search Based Meta-heuristics: A Review

Pratibha Sharma, Jagmeet Kaur, Vinay Arora, and Prashant Singh Rana

2017

Sixth International Conference on Soft Computing for Problem Solving

34.   

Internet-of-Things:A Survey

Monika Bharti, Sharad Saxena, Rajesh Kumar

2017

SmartTech 2017, Amity University Rajasthan, Jaipur, India. (SCOPUS, Springer)

35.   

Obesity Prediction using Ensemble Machine Learning Approaches

Kapil Jindal, Niyati Baliyan & Prashant Singh Rana

2017

Springer 5th International Conference on Advanced Computing, Networking, and Informatics

36.   

Ensemble Classifier to Enhance Computer Aided Diagnosis of Parkinson’s Disease

Harkawalpreet Kaur ,Avleen Kaur Malhi

2018

 9th International Conference on Computing,Communication and Networking Technologies

37.   

Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks

Nitin Goyal, Mayank Dave, Anil Kumar Verma

2018

 Wireless, Intelligent, and Distributed Environment for Communication

38.   

Computed Tomography Image Reconstruction using Modified One-Step-Late Method

] Y. Pathak, K.V. Arya and S. Tiwari

2018

11th International Conference on Contemporary Computing (IC3), Aug. 2-4, 2018 Noida, India

39.   

Demand Response Management Using Lattice-Based Cryptography in Smart Grids

Santosh Kumar Desai and                Amit Dua and                Neeraj Kumar and                Ashok Kumar Das and                Joel J. P. C. Rodrigues

2018

2018 IEEE Global Communications Conference (GLOBECOM)

40.   

Rule Based Fake Currency Detection System

Harshit Rampal, Shreelekha Pandey

2018

3 rd International Conference on Advancement in Engineering, Applied Science and Management (ICAEASM 2018)

41.   

Mctope ensemble machine learning framework: A case study of routing protocol prediction.

Nishtha Hooda, Seema Bawa, and Prashant Singh Rana.

2018

3rd International Conference on Computing, Communication and Security (ICCCS)

42.   

A Comparative Analysis of Energy Efficient Hierarchical Routing Protocols for Wireless Sensor Networks

Deepak Mehta, Sharad Saxena

2018

4th International Conference on Computing Sciences (ICCS)

43.   

An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms

Loveleen Kaur, Ashutosh Mishra

2018

Advanced Computational and Communication Paradigms ICACCP 2017.Advances in Intelligent Systems and Computing-Springer

44.   

A robust and secure hybrid reversible data embedding algorithm

Divya Arora, Anil Kumar Verma

2018

GUCON

45.   

RCDR: Reliability Control Framework for Data Rate Prediction in Wireless Sensor Networks

Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana

2018

GUCON

46.   

A Data-Driven Framework for Survivable Wireless Sensor Networks

Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana

2018

IC3

47.   

Using deep learning to enhance head and neckcancer diagnosis and classification

Pooja Gupta,Avleen Kaur Malhi

2018

IEEE international conference on Systems, Compu-tation, Automation and Networking

48.   

The Digital Universe: ChangingParadigms of E-business in India

Avleen Kaur Malhi, HS Pannu and Anupam Sharma

2018

IEEE International Conferenceon Engineering Innovation

49.   

A face recognition system using off-the-shelf feature extractors and an Ad-Hoc classifier

Kaur, B., Bhattacharya, J

2018

IEEE Region 10 Symposium, Tensymp 2018

50.   

MPoWS: Merged Proof of Ownership and Storage for Block Level Deduplication in Cloud Storage

Shivansh Mishra, Surjit Singh, Syed Taqi Ali

2018

IEEE, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

51.   

RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage

Shivansh Mishra, Surjit Singh, Syed Taqi Ali

2018

IEEE, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

52.   

A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals

Harjeet Singh, R. K. Sharma, R. Kumar, K. Verma, R. Kumar, and M. Kumar

2018

In: 16th International Conference on Frontiers in Handwriting Recognition

53.   

Hand Gesture Recognition using Gaussian Threshold and Different SVM Kernels

Shifali Sharma, Jhilik Bhattacharya, Shatrughan Modi, Prashant Singh Rana

2018

International Conference on Advances in Computer Science and Data Sciences

54.   

Review of Live Virtual Machine Migration Techniques in Cloud Computing

Jasteen Kaur, Inderveer Chana

2018

International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)

55.   

Autonomous Tagging of Stackoverflow Questions Using Statistical Methods

Rishabh Bassi, Rohan Piplani, Ravijit Singh Ramana, Jasmeet Singh, Harpreet Singh, Prashant

2018

International Conference on Computer Science, Industrial Electronics(ICCSIE)

56.   

E-Krishi: An IoT based Smart Irrigation System

Sakshi Kathuria, Rohan Kumar, Tarunpreet Bhatia

2018

International Conference on Electrical, Electronics, Computer Science and Information Technology, Bengaluru

57.   

A Systematic Review on QoS aware Resource Utilisation and Allocation in Cloud Computing

Vijay Prakash, Seema Bawa, Lalit Garg

2018

International Conference on Information Systems and Management Science, University of Malta, Malta [Feb. 22-23, 2018]

58.   

Efficient Wavelet Families for ECG classification using Neural Classifiers

Ritu Singh, Rajesh Mehta, Navin Rajpal

2018

Procedia Engineering (Elsevier), International Conference on Computational Intelligence and Data Science (ICCIDS 2018)

59.   

A comparative analysis of evolutionary algorithms for the prediction of software change

L Kaur, A Mishra

2018

Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT). IEEE, 2018, pp. 187-192.

60.   

Commentary upon Descriptive Data Analytics

Harkiran Kaur, Aanchal Phutela

2018

Proceedings of the 2nd International Conference on Inventive Systems and Control (ICISC 2018) IEEE Xplore Compliant

61.   

Survey on Fault Tolerant Techniques in Scientific Applications

Shefali Singh, Inderveer Chana

2018

Second International Conference on Intelligent Computing and Control Systems (ICICCS)

62.   

Implementing Multi-Dimensional Analytics in NRIs Directory Databases

Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur

2018

Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018)

63.   

Utility of OLAP and Digital ATLAS to Enhance Cross Border Connectivity Among Punjabi Sikh NRIs

Harkiran Kaur,Kawaljeet Singh, Tejinder Kaur

2018

Springer LNNS Series - 2nd International Conference on Communication, Computing and Networking (ICCCN 2018)

64.   

A Game of Incentives: An Efficient Demand Response Mechanism using Fleet of Electric Vehicles

Kuljeet Kaur andSahil Garg and Neeraj Kumar and Albert Y. Zomaya

2018

FICN '18: Proceedings of the 1st International Workshop on Future Industrial Communication Networks

65.   

A Model for Automatic Detection of Retina Diseases.

Sukhdeep Kaur, Tanya Garg

2019

JETIR/ICTSEM-19

66.   

A New Secure Data Dissemination Model in Internet of Drones

Shubhani Aggarwal and                Mohammad Shojafar and                Neeraj Kumar and                Mauro Conti

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

67.   

Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis.

Amit Goyal and Shalini Batra and Neeraj Kumar and Gagangeet Singh Aujla and Mohammad S. Obaidat

2018

2018 IEEE Global Communications Conference (GLOBECOM)

68.   

AdCaS: Adaptive Caching for Storage Space Analysis Using Content Centric                Networking

Amuleen Gulati and Gagangeet Singh Aujla and Neeraj Kumar and Mohammad S. Obaidat and Syed Hassan Ahmed

2018

2018 IEEE Globecom Workshops (GC Wkshps)

69.   

An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks

Kuljeet Kaur and Sahil Garg and Georges Kaddoum and Fran{\c{c}}ois Gagnon and Neeraj Kumar and Syed Hassan Ahmed

2019

IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

70.   

Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks

Vinay Rishiwal and Omkar Singh and Sudeep Tanwar and Sudhanshu Tyagi and Ishan Budhiraja and Neeraj Kumar and Mohammad S. Obaidat

2018

2018 IEEE Globecom Workshops (GC Wkshps)

71.   

BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records

Jayneel Vora and Anand Nayyar and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Joel J. P. C. Rodrigues

2018

2018 IEEE Globecom Workshops (GC Wkshps)

72.   

Big Data Analytics on Cloud Environment:Advantages, Limitations and Issues

Tristan Mercieca, Lalit Garg, Vijay Prakash, Seema Bawa

2018

 IASTEM International Conference, Ottawa, Canada

73.   

Blind Signatures Based Secured E-Healthcare System

Jayneel Vora and Parth DevMurari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat

2018

2018 International Conference on Computer, Information and Telecommunication Systems (CITS)

74.   

Blockchain as a Service for Software Defined Networks: A Denial of Service Attack Perspective

Arnab Bose and                Gagangeet Singh Aujla and                Maninderpal Singh and                Neeraj Kumar and                Haotong Cao

2019

2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)

75.   

BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management

Umesh Bodkhe and Pronaya Bhattacharya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat

2019

2019 International Conference on Computer, Information and Telecommunication Systems (CITS)

76.   

Bloom Filter Based Efficient Caching Scheme for Content Distribution in Vehicular Networks

Amit Dua and Megha Shishodia and Nikhil Kumar and Gagangeet Singh Aujla and Neeraj Kumar

2019

2019 IEEE International Conference on Communications Workshops (ICC Workshops)

77.   

Can Tactile Internet be a Solution for Low Latency Heart Disorientation Measure: An Analysis

Shriya Kaneriya and Danial Lakhani and Heli U. Brahmbhatt and  Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Joel J. P. C. Rodrigues

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

78.   

CARaM: Coordinated Adaptive Replica Management for Charging Station

Ritesh Bhatt and  Chinmaya Garg and  Harpreet Singh and Neeraj Kumar and  Joel J. P. C. Rodrigues

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

79.   

CR-NOMA Based Interference Mitigation Scheme for 5G Femtocells Users

Santosh Kumar Desai and Amit Dua and Neeraj Kumar and Ashok Kumar Das and Joel J. P. C. Rodrigues

2018

2018 IEEE Global Communications Conference (GLOBECOM)

80.   

Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems

Shriya Kaneriya and Sudeep Tanwar and  Anand Nayyar and Jai Prakash Verma and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Joel J. P. C. Rodrigues

2018

2018 IEEE Globecom Workshops (GC Wkshps)

81.   

DLopC: Data Locality Independency-Aware VM Clustering in Cloud Computing

Vipul Mudgill and                Gagangeet Singh Aujla and                Neeraj Kumar and                Mohammad S. Obaidat and                Radu Prodan

2018

2018 IEEE Globecom Workshops (GC Wkshps)

82.   

DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem

Gagangeet Singh Aujla and Anish Jindal and  Rajat Chaudhary and Neeraj Kumar and Sahil Vashist and Neeraj Sharma and Mohammad S. Obaidat

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

83.   

DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR

Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar and Radu Prodan and Mohammad S. Obaidat

2018

2018 IEEE Global Communications Conference (GLOBECOM)

84.   

Dynamic Multi-objective Virtual Machine Placement in Cloud Data Centers

Radu Prodan and Ennio Torre and Juan Jose Durillo and Gagangeet Singh Aujla and Neeraj Kumar and Hamid Mohammadi Fard and Shajulin Benedict

2019

2019 45th Euromicro Conference on Software Engineering and Advanced Applicatio

85.   

Enhancing Energy Efficiency in IoT (Internet of Thing) Based Application

Utkarsha Singh, Inderveer Chana

2018

International Conference on Inventive Computation Technologies

86.   

Ensuring Privacy and Security in E- Health Records

Jayneel Vora and Prit Italiya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Kuei{-}Fang Hsiao

2018

2018 International Conference on Computer, Information and Telecommunication Systems (CITS)

87.   

Evaluation of Various Classifiers for NSL-KDD Dataset using Machine Learning Approach.

TANYA GARG & SUKHDEEP KAUR

2019

International Journal IJETIR During ICTSEM-19

88.   

Explaining Machine Learning-Based Classifications of In-Vivo Gastral Images

A Malhi, T Kampik, H Pannu, M Madhikermi, K Främling

2019

2019 Digital Image Computing: Techniques and Applications (DICTA)

89.   

Fetal Birth Weight Estimation in High-Risk Pregnancies Through Machine Learning Techniques

Mario W. L. Moreira and Joel J. P. C. Rodrigues and Vasco Furtado and Constandinos X. Mavromoustakis and Neeraj Kumar and Isaac Woungang

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

90.   

FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks

Aaisha Makkar and Mohammad S. Obaidat and Neeraj Kumar

2018

2018 IEEE Global Communications Conference (GLOBECOM)

91.   

HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0

Rajesh Gupta and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat and Balqies Sadoun

2019

2019 International Conference on Computer, Information and Telecommunication Systems (CITS)

92.   

Improving Neural Machine Translation Using Rule-Based Machine Translation

Muskaan Singh, Ravinder Kumar, Inderveer Chana

2019

7th International Conference on Smart Computing & Communications (ICSCC)

93.   

Interactive Systems for Fashion Clothing Recommendation

Himani Sachdeva, Shreelekha Pandey

2018

Emerging Technology in Modelling and Graphics

94.   

LEASE: Lattice and ECC-Based Authentication and Integrity Verification Scheme in E-Healthcare

Amit Dua and Rajat Chaudhary and Gagangeet Singh Aujla and Anish Jindal and Neeraj Kumar and Joel J. P. C. Rodrigues

2018

2018 IEEE Global Communications Conference (GLOBECOM)

95.   

Markov Decision-Based Recommender System for Sleep Apnea Patients

Shriya Kaneriya and Madhavi Chudasama and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Joel J. P. C. Rodrigues

2019

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

96.   

Neural-Based Machine Translation System Outperforming Statistical Phrase-Based Machine Translation for Low-Resource Languages

Muskaan Singh, Ravinder Kumar, Inderveer Chana

2019

Twelfth International Conference on Contemporary Computing (IC3)

97.   

QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures

Aaisha Makkar and Neeraj Kumar and Mohammad S. Obaidat and Kuei{-}Fang Hsiao

2018

2018 IEEE Global Communications Conference (GLOBECOM)

98.   

RoVAN: A Rough Set-based Scheme for Cluster Head Selection in Vehicular Ad-hoc Networks

Amit Dua and Prateek Sharma and Shivesh Ganju and Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar and  Joel J. P. C. Rodrigues

2018

2018 IEEE Global Communications Conference (GLOBECOM)

99.   

Sec-IoV: A Multi-Stage Anomaly Detection Scheme for Internet of Vehicles

Sahil Garg and Kuljeet Kaur and Georges Kaddoum and Francois Gagnon and Neeraj Kumar and Zhu Han

2019

PERSIST-IoT '19: Proceedings of the ACM MobiHoc Workshop on Pervasive Systems in the IoT Era

100.           

SLOPE: A Self Learning Optimization and Prediction Ensembler for Task Scheduling

Lohit Kapoor and Anish Jindal and Abderrahim Benslimane and Gagangeet Singh Aujla and Rajat Chaudhary and Neeraj Kumar and Albert Y. Zomaya

2018

2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

101.           

Smart Waste Bin: A New Approach for Waste Management in Large Urban Centers

Kellow Pardini and Joel J. P. C. Rodrigues and Syed Ali Hassan and Neeraj Kumar and Vasco Furtado

2018

2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)

102.           

SmartChain: A Smart and Scalable Blockchain Consortium for Smart Grid Systems

Gaurang Bansal and  Amit Dua and Gagangeet Singh Aujla and Maninderpal Singh and Neeraj Kumar

2019

2019 IEEE International Conference on Communications Workshops (ICC Workshops)

103.           

Subchannel Assignment for {SWIPT-NOMA} based HetNet with Imperfect Channel State Information

Ishan Budhiraja and Sudhanshu Tyagi and Sudeep Tanwar and Neeraj Kumar and Nadra Guizani

2019

2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)

104.           

Taxonomy of Security Attacks on Cloud Environment: A Case Study on Telemedicine

Komal Singh Gill, Sharad Saxena, Anju Sharma

2019

Amity International Conference on Artificial Intelligence (AICAI 2019)

105.           

Osmotic Computing and Related Challenges: A Survey

A. Kaur, R. Kumar and S. Saxena

2020

PDGC-2020

106.           

Adjacency cloud-oriented storage overlay topology using self-organizing m-way
 tree

Ajay Kumar and Seema Bawa.

2020

International Conference on Innovative Computing and Communications,

107.           

Deep learning techniques for medical image segmentation:A systematic review

Amrita Kaur, Lakhwinder Kaur

2020

ICAML-2020

108.           

Swarm Intelligence based Hierarchical Routing Protocols Study in WSNs

D. Mehta and S. Saxena

2020

PDGC-2020

109.           

Socio-Economic and Health Challenges due to COVID-19 and Mitigation Strategies

Deepika Singh, Tanya Garg

2020

SEHCM-2020

110.           

Metadata Security Measures for Protecting Confidential Information on the Cloud

Mamta, B. B. Gupta, John Chui Kwok Tai and Konstantinos Psannis

2020

International Conference on Computational Data and Social Networks (CSoNet-2020)

111.           

Computed Tomography Image Reconstruction Using Fuzzy Complex Diffusion Regularization

Manju Devi, Sukhdip Singh, Shailendra Tiwari

2020

Innovations in Computational Intelligence and Computer Vision (ICICV-2020) January 17-19, 2020, Manipal University, Jaipur, India

112.           

Optimized Z-Buffer Using Divide and Conquer

Nitin Bakshi, Shivendra Shivani, Shailendra Tiwari, Manju Khurana

2020

Innovations in Computational Intelligence and Computer Vision (ICICV-2020) January 17-19, 2020, Manipal University, Jaipur, India

113.           

MirGAN: Medical Image Reconstruction using Generative Adversarial Networks

Nitin Dang; Manju Khurana; Shailendra Tiwari

2020

5th International Conference on Computing, Communication and Security (ICCCS), 14-16 Oct. 2020, IIT Patna, India.

114.           

An Efficient Hybrid Approach for Brain Tumor Detection in MR Images using Hadoop-MapReduce

Prabhjot Kaur Chahal; Shreelekha Pandey

2020

SmartData 2020

115.           

An Ensemble Approach for Extractive Text Summarization

Prabhjot Singh, Prateek Chhikara, Jasmeet Singh

2020

ic-ETITE-2020

116.           

Study and Understanding the Significance of Multilayer-ELM feature space

R.K.Roul

2020

8th BDA-2020

117.           

op3s: On-street occupancy based parking prices prediction system for its

Sandeep Saharan, Seema Bawa, and Neeraj Kumar

2020

IEEE Globecom Workshops (GC Wkshps)

118.           

Network Intrusion Detection Model using Machine Learning & Data Mining Approach-A Survey

Tanya Garg, Gurwinder Kaur, Surbhi Khullar

2020

ICAML-2020

119.           

Big Data Analytics: Applications, Challenges & Future Directions

Tanya Garg,Surbhi Khullar

2020

ICRITO-2020

120.           

Instrument Classification using image-based Transfer Learning

Utsav Shukla; Utkarsh Tiwari; Vaibhav Chawla; Shailendra Tiwari

2020

5th International Conference on Computing, Communication and Security (ICCCS), 14-16 Oct. 2020, IIT Patna, India.

121.           

An Approach for Offline Handwritten Character Shape Reconstruction Using Contour and Morphological Techniques

Anupam Garg, Amrit Kaur and Anshu Parashar

2021

ICACIT2021

122.           

E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud

Moin Hasan, Major Singh Goraya, Tanya Garg

2021

ICWSNUCA 2021

123.           

Study the significance of ML-ELM using Combined Pagerank and Content-based Feature Selection

R.K.Roul and J.K.Sahoo

2021

16th ICDCIT-2021

124.           

Delta Based Non- Anthropomorphic Hand

Rajesh Kumar, Sachin Kansal, Sudipto Mukherjee

2021

International Design
Engineering Technical Conferences & Computers and Information 2021

125.           

Traffic Signs Classification Using Convolutional Neural Network (CNN)

Vidisha Verma, Aashna Khan, Shailendra Tiwari

2021

ICACSE-2021, KNIT Sultanpur, India

126.           

FaceIgnition: An automatic anti-theft and keyless solution for vehicles

Tushar Dang, Vanshita Gupta, Diljot singh Wadia, Paarth Kohli, Rajanpreet Kaur Chahal

2021

IEEE International Conference on Computational Intelligence and Knowledge Economy, 17-18 March 2021, Dubai

Year 2016-17 Conferences

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1.        A Behavioral Metrics Suite for Modular Ontologies ACM Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, March 04 - 05, 2016 Niyati Baliyan and Sandeep Kumar
2.        A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds,2016, pp. 1-6 4th International Conference on Advancements in Engineering & Technology Rajesh Kumar Ashok Kumar Anju Sharma
3.        A Comparative study of Elasticsearch and CouchDB Document Oriented Databases IEEE Conference on Inventive Computation Technologies (ICICT-2016).,Coimbatore, India,26-27 Aug. 2016, pp. 1-4 "S. Gupta R. Rani "
4.        A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Amanpreet Singh
5.        A Data Analytical Approach Using Support Vector Machine for Demand Response Management in Smart Grid IEEE PES General Meeting, Boston, MA, USA, 17-21 July 2016, pp. 1-5 Anish Jindal, Neeraj Kumar, Mukesh Singh
6.        A Hierarchical Fuzzy System for Quality Assessment of Semantic Web Application as a Service ACM SIGSOFT Software Engineering Notes,Volume 41 Issue 1, January 2016, pp. 1-7 Niyati Baliyan and Sandeep Kumar
7.        A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm Poster presentation at Security and Privacy Symposium 2016, Rohini Rajpal, Sanmeet Kaur
8.        A non-linear modified CONVEF-AD based approach for low-dose sinogram restoration International Conference on Computer Vision and Image Processing Shailendra Tiwari, Rajeev Srivastava, and K.V. Arya
9.        A novel technique of sentiment detection for microblogging sites IEEE-3rd International Conference on Microelectronics, Circuits and Systems, 2016 Neetika Bansal, Ashima Singh
10.    A proposed pharmacogenetic solution for IT based Healthcare Springer Second International Conference on ICT for Sustainable Development,pp 113-121, 2016 Rashmeet Toor and Inderveer Chana,
11.    A Real-time Smart Charging Station for EVs Designed for V2G Scenario and its Coordination with Renewable Energy Sources IEEE PES General Meeting, Boston, Boston, MA, USA, 17-21 July 2016, pp. 1-5 Mukesh Singh, Praveen Kumar, Indrani Kar, Neeraj Kumar
12.    A review - Fuzzy Time Series Forecasting Model ICIIECS 2016. Alok Tripathi, HS Pannu
13.    A Review on Energy Aware VM Placement and Consolidation Techniques IEEE Sponsored International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp. 1-7 Sukhandeep Kaur and Seema Bawa
14.    A review on opinionated sentiment analysis based upon machine learning approach International Conference on Inventive Computation Technologies (ICICT 2016) IEEE,Coimbatore, India, 26-27 Aug. 2016,pp. 1-6 Neetika Bansal, Ashima Singh
15.    A review on Sentiment Analysis using machine learning approaches International Conference on Inventive Computation Technologies, 2016 Neetika Bansal, Ashima Singh
16.    A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Mannat Aneja, Tarunpreet Bhatia
17.    AHP-Based Ranking of Cloud Service Providers Conference on Information Systems Design and Intelligent Applications, pp 491-499, 2016 Rajanpreet Kaur Chahal, Sarbjeet Singh
18.    An Assessment of Intelligent Access Tools for Creating Digital Diasporas International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
19.    An Efficient and Modified Median Root Prior based Framework for PET/SPECT reconstruction Algorithm 8th International Conference on Contemporary Computing, Noida, India, 20-22 Aug. 2015, pp 1-6 Shailendra Tiwari, Rajeev Srivastava
20.    An Efficient Fuzzy Rule-Based Big Data Analytics Scheme for Providing Healthcare-as-a-Service IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 2017, pp 1-6 Anish Jindal, Amit Dua, Neeraj Kumar, A. V. Vasilakos, J.J.P.C. Rodrigues
21.    Analysis of pattern matching algorithms in network intrusion detection systems 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA),Bareilly, India,30 Sept.-1 Oct. 2016,pp 1-5 Vishwajeet Dagar, Vatsal Prakash, Tarunpreet Bhatia
22.    Analyzing Sentiments Using Twitter Through Big Data IEEE International Conference on Computing for Sustainable Global Development, New Delhi, India, 16-18 March 2016, pp 2628-2631. Monu Kumar, Anju Bala
23.    Application of bloom filter for duplicate URL detection in a web crawler IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, PA, USA, 1-3 Nov. 2016, pp 246-255 Aveksha Kapoor, Vinay Arora
24.    Application of Data Mining for high accuracy prediction of breast tissue biopsy results Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC),Moscow, Russia, 6-8 July 2016, pp. 40-45 Kaushik, Divyansh, and Karamjit Kaur
25.    Application of Rough Finite State Automata in Decision Making International Conference on Emerging Trends in Computing, 23-28, March 2017, pp 23-28 Swati Gupta and Sunita Garhwal
26.    Artificial Intelligence Based IDS in VANETS: A Review IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Ritu Rani, Tarunpreet Bhatia
27.    Auction based Resource Allocation Strategy for Infrastructure as a Service International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India,11-13 March 2016, pp 381-386 Anita Kumari and Sushma Jain
28.    Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People Elsvier Sponsored Twelfth International Conference on Communication Networks, Bangalore, India, August 19– 21, 2016 Khushdeep Kaur, Parteek Kumar
29.    Big Data Analytics based Recommender System for Value Added Services (VAS) In the proceeding of 6th International Conference on "Soft Computing for Problem Solving (SocProS 2016), pp 142-150 Inderpreet Singh, Karanvijay Singh and Sukhpal Singh
30.    Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter IEEE International Conference on Inventive Computation Technologies (ICICT 2016), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Mohit Mertiya and Ashima Singh
31.    Combining Synthetic Minority Oversampling Technique And Subset Feature Selection Technique For Class Imbalance Problem International Conference on Advances in Information Communication Technology & Computing” (AICTC ­ 2016),Bikaner, India — August 12 - 13, 2016 Pawan Lachheta, Seema Bawa
32.    Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction International Conference on Inventive Computation Technologies, ICICT 2016, pp 1-6 Nikita Tyagi and Ajay Kumar
33.    Comparative Analysis of Density based Outlier Detection techniques on Breast Cancer data Using Hadoop and Map Reduce IEEE International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-4 S. Behera and R. Rani
34.    Comparative analysis of Twitter data using supervised classifiers International Conference on Inventive Computation Technologies (ICICT),Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Rohit Joshi, Rajkumar Tekchandani
35.    Complete Survey of 3D Model Generation International Conference on Innovations in Information, Embedded and Communication Systems, 2016 K. Jain, H. S. Pannu, V. Bassi
36.    Decrypting Homomorphism 2nd International Conference on Computing, Communication, Control And Automation, Pune, India, 12-13 Aug. 2016, pp 1-6 V.Dabra, Inderveer Chana, Anju Bala
37.    Decrypting Homomorphism 2nd International conference on Computing, Control and Automation , Pune, India, 12-13 Aug. 2016, pp 1-6 Vivek Dabra, Inderveer Chana and Anju Bala
38.    Effect of Rumor propagation on the stock market dynamics using cellular automata International Conference on Inventive Computation Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-8 P. Vij and A. Kumar
39.    Efficient and Secure Message Transfer in VANET IEEE International Conference on Inventive Computer Technologies, Coimbatore, India, 26-27 Aug. 2016, pp 1-5 RajeevSingh,Sumit Miglani
40.    Enhancement of Image Resolution: A Survey Communications on Applied Electronics, 2016 Dimple Mittal, HS Pannu
41.    Evolutionary Approaches For Association Rule Mining : A Survey IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems ,2016 Maninder Kaur, Aanchal Gupta
42.    Extended Change Identification System ENASE with Italy, 2016, pp 51-58 Parimala N. And Vinay Gautam
43.    Facial Recognition using Histogram of Gabor Phase Patterns and Self Organizing Maps 11th International Conference on Industrial and Information Systems (ICIIS-2016),Roorkee, India, 3-4 Dec. 2016, pp 883-889. Shailendra Tiwari, K.V. Arya, Gaurangi Upadhyay, Shambhavi Upadhyay, Poonam Sharma
44.    Fleet of Electric Vehicles for Frequency Support in Smart Grid IEEE PES General Meeting,Boston, MA, USA, 17-21 July 2016, pp 1-5 Kuljet Kaur, Mukesh Singh, Neeraj Kumar
45.    High-order fuzzy time series forecasting model for advance prediction of temperature ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Alok Tripathi, HS Pannu
46.    Improved CURE Clustering for Big Data using Hadoop and Mapreduce IEEE International Conference on Inventive Computation Technologies (ICICT 2016),Coimbatore, India, 26-27 Aug. 2016, pp 1-5 P. Lathiya and R. Rani
47.    Improved Grey Wolf Algorithm for Optimization Problems International Symposium on Fusion of Science and Technology, New Delhi, India, January 18-22, 2016, pp 428-433 Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra
48.    Information retrieval in web crawling: A survey International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 21-24 Sept. 2016, pp 2635-2643 Chandani Saini, Vinay Arora
49.    Intelligent Stock Data Prediction using Predictive Data Mining Techniques IEEE International Conference - ICICT, Coimbatore, India,26-27 Aug. 2016, pp 1-5 Pankaj Kumar, Anju Bala
50.    Mining Data with Categorical Attributes: A Glance IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Avneet kaur
51.    Multimedia Security through LSB Matching Proceedings of the Second International Conference on Information and Computing, Udaipur, India — March 04 - 05, 2016 Rupali Bhardwaj, V Sharma,
52.    Optical Character Recognition Using Template Matching and Back Propagation Algorithm International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Swapnil Desai and Ashima Singh
53.    Optimization of Load Balancing in Parallel Machines using Ant Colony ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, 2016 Balram Kishan, Ashima Singh
54.    Optimizing Watermark Strength in DWT-SVD based Image Watermarking Scheme for Colour Images using Dynamic-PSO, 2016. ICCCCS-2016 Nitin Saxena, K.K. Mishra and Ashish Tripathi
55.    PAFB: Privacy preserving authentication framework using bloom filter for secure vehicular communications Grace hopper Conference, 2016 Avleen Kaur Malhi
56.    Real-time Vehicle Detection and Tracking 13thInternational Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2016), Chiang Mai, Thailand, 28 June-1 July 2016, pp 1-6 K.V. Arya, Shailendra Tiwari and Saurabh Behwal
57.    Regularization based Modified SART Iterative Method for CT Image Reconstruction 9thInternational Conference on the Developments on eSystems Engineering, (DeSE-2016), Liverpool, UK, 31 Aug.-2 Sept. 2016, pp 217-222 Shailendra Tiwari, K.V. Arya, and Yadunath Pathak
58.    Regularization based Simultaneous Algebraic Reconstruction Techniques for Computed Tomography 9th International Conference on Contemporary Computing (IC3),Noida, India,11-13 Aug. 2016, pp 1-6 Shailendra Tiwari, Deepikanshu Chouksey, Vinod Todwal
59.    Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD ICIIECS"16, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Rishika Mehta, HS Pannu
60.    Resource Scheduling in Cloud using Harmony Search IEEE conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Chandan Malik, Sukhchandan Randhawa
61.    Robot relay: An optimal path planning for multiple client service ICICT 2016, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Aastha Goel, Jhilik Bhattacharya, Anika
62.    Score Level Fusion of Iris and Fingerprint using Wavelet Features 4th International Conference on Parallel, Distributed and Grid Computing, Waknaghat, India, 22-24 Dec. 2016, pp 456-461 Shailendra Tiwari, Sudhakar, Triapathi, K.V. Arya
63.    Searching of Near Exact Duplicate Images in Cloud Database IEEE International Conference on Inventive Computation Technologies (ICICT 2016) Maneesha, Inderveer Chana
64.    Securing IoT devices using JavaScript based Sandbox International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT-2016), Bangalore, India, 20-21 May 2016, pp 1476-1482 Ayush Sahu and Ashima Singh
65.    Semantic Analysis of Big Data by Applying De-duplication techniques IEEE International Conference - ICICT, Coimbatore, India, 26-27 Aug. 2016, pp 1-6 Sanjeev Garg, Anju Bala
66.    S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks 2016 International Conference on Inventive Computation Technologies (ICICT), 2016 Aditi Hans, Ashutosh Mishra
67.    Spatial Data Analysis with ArcGIS and MapReduce International conference on Conference Computing, Communication and Automation, Noida, India, 29-30 April 2016, pp 45-49 Hari Singh and Seema Bawa
68.    Speech Secret Sharing International Conference on Innovative Research in “Civil, Computer Science, Information Technology, Mechanical, Electrical and Electronics Engineering” (CIME–2016) Shivendra Shivani, Suneeta Agarwal
69.    Student Performance Measure By using Different classification methods of data mining 2016 International conference of advanced communication, control &computing technologies Neha Chaudhary,Ashutosh Mishra
70.    Trust Based Security in Opportunistic Networks: A Survey IEEE International Conference on Engineering & Techonology (ICETECH), 2016 Gurleen Kaur, Tarunpreet Bhatia
71.    Trust Model in cloud computing based on fuzzy logic IEEE conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 20-21 May 2016, pp 47-52 Ritu and Sushma Jain
72.    Urban Traffic State Estimation Techniques Using Probe Vehicles: A Review International Research Symposium on Computing and Network Sustainability, (IRSCNS 2016) V. Mehta and I. Chana,
73.    Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey Innovations In Information Embedded And Communication System, 2016 Robin Singla and Sunita Garhwal
74.    Vector Based Sensor Ranking in Internet of Things IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), Neha, Sharad Saxena
75.    Vector Method for Ranking of Sensors in IoT International Conference on Inventive Computaion Technologies (ICICT 2016), Coimbatore, India. (IEEE), 26-27 Aug. 2016, pp 1-5 Neha, Sharad Saxena
76.    Web services classification using machine learning models In Proc: ICEMS-2016, Jaipur National University K. C. Bhardwaj, R. K. Sharma
77.    Abstracting Communication Methodology in IoT Sensors to Eliminate Redundancy and Cycles International Conference on Advances in Computing and Data Sciences, pp. 541-549. Springer, Singapore, 2016 Sharad Saxena

Year 2015-16 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1.              Web services classification using machine learning models In Proc: ICEMS-2016, Jaipur National University, Jaipur, 17-19 March 2016 K. C. Bhardwaj, R. K. Sharma
2.              A Bio-inspired Approach for Power and Performance Aware Resource Allocation in Clouds 4th International Conference on Advancements in Engineering & Technology (ICAET-2016)       Sangrur, Punjab, India                  Volume 57 
March 18-19, 2016
DOI: 10.1051/matecconf/20165702008
Rajesh Kumar Ashok Kumar Anju Sharma
3.              An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET 11th IEEE International conference on Green Computing and Communications, GreenCom 2015, Sydney Australia. Amit Dua, Neeraj Kumar, and Seema Bawa
4.                  Optimal Time Dependent Pricing Model for Smart Cloud with Cost Based Scheduling. Third International Symposium on Women in Computing and Informatics (WCI "15), Indu Nair (Ed.). ACM, New York, NY, USA, 522-526. Chetan Chawla and Inderveer Chana
5.              Energy Conscious Allocation and Scheduling of Deadline-Bound Tasks in ICT Cloud Paradigm Proceeding of the International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2015), Springer International Publishing, (2015). Tarandeep Kaur and Inderveer Chana
6.              Wormhole and Sybil attack in WSN: A review Computing for Sustainable Global Development (INDIACom), 2015 2nd . S Goyal, T Bhatia, AK Verma
7.              Integrated fleet of electric vehicles as a frequency regulation agent in the grid IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-7 Rubi Rana,Kuljeet Kaur, Mukesh Singh, Neeraj Kumar, Praveen Kumar
8.              A novel smart meter for better control over devices including electric vehicles and to enable smart use of power in smart home IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 Nand Nandan Arora, Anish Jindal, Mukesh Singh, Neeraj Kumar, Praveen Kumar
9.              A novel central energy management system for smart grid integrated with renewable energy and electric vehicles IEEE International Transportation Electrification Conference (ITEC), 27-29 Aug 2015, pp. 1-6 Sumedha Sharma, Amit Dua, Surya Prakash, Neeraj Kumar, Mukesh Singh
10  MongoDB vs SQL : A case study on electricity data International Conference on Emerging Research in Computing, Information, Communication and Applications, (ERCICA 2015), Bangalore. Jatin, Shalini Batra
11  Topic Sensitive Web Page Ranking Through Graph Database   International Conference on Emerging Research in Computing, Information, Communication and Applications 2015, pp. 519-527 Alok Gupta, Harkiran Kaur, Shalini Batra
12  Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data structure and Graph Database In 5th International Conference on Advances in Computing and Communications (ICACC-2015) IEEE, 2015 Ashish Sharma, Shalini Batra
13  XML based Wireless Patient Monitoring System using Vehicular AdHoc Networks 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), October,2015, Liverpool, UK Avleen Kaur Malhi;Shalini Batra
14  Automatic Generation of .Sign Language from Hindi Text for Communication and Education of Hearing Impaired People Elsvier Sponsored Twelfth International Conference on Communication Networks, ICCN 2016, August 19– 21, 2016, Bangalore, India Khushdeep Kaur, Parteek Kumar
15  Effect of Rumor propagation on the stock market dynamics using cellular automata International Conference on Inventive Computation Technologies. IEEE – 2016 P. Vij and A. Kumar
16  Comparative Analysis of Backpropagation and Radial basis Function Neural Network on Rainfall Prediction”, International Conference on Inventive Computation Technologies ICICT 2016 Nikita Tyagi and Ajay Kumar
17.            “B-cell and T-cell leukemia classification using PCA, Genetic Algorithm , ANN and SVM 3rd International Conference on Microelectronics Circuit and Systems. Sakshi Sharma and Ajay Kumar
18.          An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information and Applications, ERCICA 2015, Vol. 3, pp. 281-287 Monia Bajaj, Sukhchandan Randhawa, Sushma Jain
19.          School Bus Routing Based on Branch & Bournd Approach Computer Communication and Control (IC4), 2015,pp.1-4 Yash Kumar, Sushma Jain
20.          Auction based resource allocation strategy for infrastructure as a service 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) Anita Kumari, Sushma Jain
21.          Adaptive Word Recommender System with Fastest Data Structure for Devanagari Script IEEE International Symposium on Advanced Computing & Communication, 2015, Assam University, Silchar, Assam, India, Sep 14-15, 2015 Prem Narayan Yadav, Karun Verma
22.          Associative Memory Model for Distorted On-line Devanagari Character Recognition The Fifth International Conference on Advances in Computing and Communications (ACC-2015), 2-4 September 2015 in Kochi, Kerala, India Gaurav Pagare, Karun Verma
23.          Spam Filtering Using Hybrid Local-Global Naive Bayes Classifier International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, 10-13 Aug. 2015, SCMS, Aluva, Kochi PP 829-833 Rohit Solanki, Karun Verma, Ravinder Kumar
24.          Securing IoT devices using JavaScript based
Sandbox
International Conference on Recent Trends in Electronics, Information
& Communication Technology (RTEICT-2016), IEEE.
Ayush Sahu and Ashima Singh
25.          A novel technique of sentiment detection for
microblogging sites
IEEE-3rd International Conference on Microelectronics, Circuits
and Systems, Micro2016
Neetika Bansal, Ashima Singh
26.          A review on Sentiment Analysis using machine learning
approaches
International Conference on Inventive Computation Technologies, ICICT
2016
Neetika Bansal, Ashima Singh
27.          Combining Naïve Bayes and Adjective Analysis for Sentiment Detection on Twitter IEEE International Conference on Inventive Computation Technologies (ICICT 2016) Mohit Mertiya and Ashima Singh
28.          Optimization of Load Balancing in Parallel Machines using Ant Colony ApproachIEEE (EDS) Kolkata chapter Sponsored 3rd International Conference on Microelectronics, Circuits and Systems, 9-10th July, 2016, Kolkata. Balram Kishan, Ashima Singh
29.          Optical Character Recognition Using Template Matching and Back Propagation Algorithm International Conference on Inventive Computation Technologies (ICICT 2016).  Swapnil Desai and Ashima Singh
30.          Complete Survey of 3D Model Generation International Conference on Innovations in Information, Embedded and Communication Systems, vol. 4, pp. 2013-2015, March 2016 K. Jain, H. S. Pannu, V. Bassi
31.          Mining Data with Categorical Attributes: A Glance  IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems,2016 Maninder Kaur, Avneet kaur
32.          Evolutionary Approaches For Association Rule Mining : A Survey IEEE ,ICIIECS 2016, Innovations in Information Embedded and Communication Systems, ,2016 Maninder Kaur, Aanchal Gupta
33.          A Cuckoo Optimization Based Algorithm for Solving the Placement Problem of Digital Circuit Layout IEEE ,ICIIECS 2016,International Conference on Innovations in Information Embedded and Communication Systems, ,2016 Maninder Kaur, Amanpreet Singh
34.          Multimedia Security through LSB Matching   Proceedings of the Second International Conference on Information and Computing, March 2016 Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
35.          A lossless Data Hiding method based on inverted LSB technique Third International Conference on Image Information Processing, Dec 2015 Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
36.          Enhanced the security of image steganography through image encryption 2015 Annual IEEE India Conference (INDICON Rupali Bhardwaj V Sharma, R Bhardwaj R Bhardwaj
37.          Interpolation based Reversible Data Hiding Scheme for Digital Images   21st Western Canadian Conference on Computing Education, May 06-07, 2016, Kamloops, BC, Canada Singara Singh Kasana and Pankaj Garg
38.          Various Target Resetting Techniques For Interrupted Cricket Matches- A Survey Innovations In Information Embedded And Communication System Coimbatore ,India,17th-18th  March,2016 pp.349-353 Robin Singla and Sunita Garhwal
39.          Application of Rough Finite State Automata in Decision Making International Conference on Emerging Trends in Computing Nasik, India,10th-11th June, 2016 Swati Gupta and Sunita Garhwal  
40.          Real Time Hand Gesture Recognition Based Interface for Microsoft Word Document Handling Advances in Intelligent Systems and Computing Series,Springer,2015 Kapil Yadav and Jhilik Bhattacharya
41.          Encoded Scene Panorama based Information Flow in a Multi Agent System Advances in Intelligent Systems and Computing Series, Springer,2015. Sachin Meena and Jhilik Bhattacharya
42.          Optimized Virtual Honeynet withImplementation of Host machine as Honeywall 12th IEEE International Conference, INDICON, 2015 Gautam, R., Kumar. S, & Bhattacharya J
43.          SMS Spam Detection for Indian Market IEEE International Conference on Next Generation Computing Technologies NGCT 15, Dehradun Sakshi Aggarwal, Sanmeet Kaur  
44.          Antispammer for Mobile Messages, ICCCT "15 Sixth International Conference on Computer and Communication Technology, Allahabad, India, Sep 2015, Sakshi Aggarwal, Sanmeet Kaur  
45.          A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm Poster presentation at Security and Privacy Symposium 2016, Feb 13, 2016 in IIIT Delhi.    Rohini Rajpal, Sanmeet Kaur
46.          Loan approval prediction based on machine learning approach National conference on recent trends in computer science and information technology(NCRTCSIT2016,Apr 2016 Arun Kumar, Ishan Garg, Sanmeet Kaur
47.          Software Perspective to Underwater Acoustic Sensors Network International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 187-191, NGCT-2015 (IEEE) Ghanshyam Maurya, Himanshu Jindal, Sharad Saxena
48.          Intrusion Detection System based on Software Defined Network Firewall International Conference on Next Generation Computing Technologies (NGCT), UPES, Dehradun, pp. 379-382, NGCT-2015 (IEEE). Mohd. Abuzar Sayed, Sharad Saxena
49.          Health Demolition via Social Websites and E-Contents Addiction Shannon100, LPU, Phagwara. (SCOPUS) Sharad Saxena, Vishnu Shankar, Deepak Mehta, Shilpi Saxena
50.              Vector Based Sensor Ranking in Internet of Things IIR Virtual Conference on Science, Engineering and Technology Applications (IIRVCSETA 2016), Chennai, India. (SCOPUS) Neha, Sharad Saxena
51.          A New Conception of Information Requisition in Web of Things Shannon100, LPU, Phagwara. (SCOPUS) Avaneesh K Yadav, Sharad Saxena
52.          Automated Leukaemia Detection Using Microscopic Images Procedia Computer Science, Volume 58, 2015, Pages 635-642 Ashutosh Mishra, Nimesh Patel
53.          Student Performance Measure By using Different classification methods of data mining 2016 International conference of advanced communication, control &computing technologies Neha Chaudhary,Ashutosh Mishra
54.          S-OLSR: Secure OLSR routing protocol for Mobile ad-hoc Networks 2016 International Conference on Inventive Computation Technologies (ICICT)   Aditi Hans, Ashutosh Mishra
55.          Improved Grey Wolf Algorithm for Optimization Problems International Symposium on Fusion of Science and Technology, New Delhi, 2016, pp. 428-433 Vijay Kumar Dinesh Kumar and Jitender Kumar Chhabra
56.          Effective Test Case Generation for Load Testing of Web Server using River Formation Dynamics. International Conference on Electrical, Electronics, Computer Science, Management and Mechanical Engineering under International Institute of Technology and Research. Gurleen Kaur and Rupinderdeep Kaur
57.          Implementation of Phonetic Level Speech to text Recognition System for Punjabi Language. International Conference on Data Science and Engineering. (IEEE), DTU, 13th august, 2016 Shama Mittal, Rupinderdeep Kaur
58.          An Assessment of Intelligent Access Tools for Creating Digital Diasporas   International Conference, ‘Diaspora and development: Emerging Multidisciplinary Dynamics of Indian/Punjabi Migration’, Feb. 24-26, 2016. Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
59.          Trust Based Security in Opportunistic Networks: A Survey IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 634-638. Gurleen Kaur, Tarunpreet Bhatia
60.          Artificial Intelligence Based IDS in VANETS: A Review IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 561-566. Ritu Rani, Tarunpreet Bhatia
61.          A Survey on Machine Learning and Data Mining Techniques for real-time intrusion detection system IEEE International Conference on Engineering & Techonology (ICETECH), Coimbatore, Tamil Nadu, March 17th & 18th, 2016, pp. 639-644. Mannat Aneja, Tarunpreet Bhatia
62.          AHP-Based Ranking of Cloud Service Providers Conference on Information Systems Design and Intelligent Applications, Springer,8th-9th January, 2016, pp 491-499 Rajanpreet Kaur Chahal, Sarbjeet Singh
63.          Fuzzy Logic and AHP based Ranking of Cloud Service Providers Conference on Computational Intelligence in Data Mining, Springer, 5th-6th December, 2015, pp 337-345 Rajanpreet Kaur Chahal, Sarbjeet Singh
64.          A review - Fuzzy Time Series Forecasting Model ICIIECS"16. Alok Tripathi, HS Pannu
65.          High-order fuzzy time series forecasting model for advance prediction of temperature ICICT2016   Alok Tripathi, HS Pannu
66.          Enhancement of Image Resolution: A Survey Communications on Applied Electronics (CAE) July 2016. Dimple Mittal, HS Pannu
67.          Remote Sensing Image Contrast and Brightness Enhancement based on Cuckoo search and DTCWT–SVD ICICT 2016 Rishika Mehta, HS Pannu

Year 2014-15 Conferences

Publication of papers in conference proceedings and other publications

SNO Title of the Thesis Name of the conference with venue, date and year, page nos. Name of the authors
1 Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine International Conf on Systems Engineering 330; pp.747-53; 2014 UNLV, USA, Springer Int Publishing Karun Verma; R K Sharma
2 Offline Handwritten Gurmukhi Character Recognition System using RBF-SVM International Workshop on Doc Analysis and Recognition; 2014; IISc Bengaluru Munish Kumar;MK Jindal; R K Sharma
3 Performance Analysis of NoSQL Databases having Hadoop Integration International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, 1-2 Aug, 2014 Aayush, Seema Bawa
4 Experimental Comparison of Three Scheduling Algorithms for Energy Efficiency in Cloud Computing IEEE International Conference of Cloud Computing in Emerging Markets (CCEM), 2014.pp:1-6, DOI: 10.1109/CCEM .2014. 7015491 Goyal, S.; Bawa, S.; Singh, B
5 An opportunistic cross layer design for efficient service dissemination over flying ad hoc networks (FANETs)." - In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, Coimbatore, pp. 1551-1557. IEEE,  Feb.-2015. Vishal Sharma Rajesh Kumar
6 A Secure Opportunistic service dissemination       over Flying Ad Hoc Networks. ACM security Symposium , IIT Delhi Feb. 2015 Vishal Sharma Rajesh Kumar
7 Multilingual text summarization with UNL   International Conference on Advances in Computer Engineering and Applications (ICACEA), March 2015. Sherry, Parteek Bhatia, 
8 Adaptive probabilistic skip graph IEEE International Advance Computing Conference, June 2015 Amit Goyal, Shalini Batra
9 Progressive Alignment using Shortest Common Supersequence  International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1113-1117, September 24-27, 2014 Ankush Garg, Deepak Garg
10 Bootstrap Sequential Projection Multi Kernel Locality Sensitive Hashing International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 213-218 September 24-27, 2014 Harsham Mehta, Deepak Garg
11 Maximal pattern matching with flexible wildcard gaps and one-off constraint  International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp. 1107-1112 September 24-27, 2014 Anu Dahiya, Deepak Garg
12 Applying Data Mining Techniques in Job Recommender System for Considering Candidate Job Preferences International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.1458-1465 Anika Gupta, Deepak Garg
13 Evaluating Quality Score of New Advertisements International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014) at Galgotias College of Engineering, Noida IEEE Xplore pp.13-17 September 24-27, 2014) Sohil Jain, Deepak Garg
14 Multistage learning model for better learning: A cognitive science perspective 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), at Thapar Institute of Engineering & Technology, Patiala IEEE Xplore 386 - 389 on December 19-20, 2014 Shivani Goel, Deepak Garg
15 Variable Bid Fee: An Online Auction Shill Bidding Prevention Methodology 5th IEEE International Advance Computing Conference (IACC- 2015) at BMS College of Engineering, Bengaluru, Karnatka, India IEEE Xplore pp. 381-386 June 12-13, 2015 Dhanmeet Kaur, Deepak Garg
16 Wormhole and Sybil Attack In WSN: a Review   INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development,  pp. 216-220, 2015. arnumber=7100491 Svarika Goyal, Tarunpreet Bhatia and A.K.Verma,
17 Jellyfish Attack in MANETs: A Review” IEEE International Conference On Electrical, Computer and Communication technologies (ICECCT),SVS College of Engineering, Coimbatore, Tamilnadu , India, pp. 1373-1377, 2015. Kaur Simran, Kaur Rupinderdeep, Verma A.K,
18   Preventing Faults: Fault Monitoring and Proactive Fault Tolerance in Cloud Computing ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. Anu and Anju Bala
19 Multi-level Priority   Based Task Scheduling Algorithm for Workflows in Cloud Environment ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series. Dr. Anju Bala and Dr. Inderveer Chana
20 Heart Disease Prediction Model in Cloud Environment ICT4SD-2015, Ahmedabad, India (July 2015), Springer AISC series.

Anju Bala, Shikhar Malhotra, Nishant Gupta and Naman Ahuja

21 Fingerprint recognition password scheme using BFO International Conference on Advances in Computing, Communications and Informatics (ICACCI, Sept. 2014 ), pg 1942-1946 Harpreet Singh, Brar; V. P. Singh
22 Detection of alphanumeric shellcodes using similarity index International Conference on Advances in Computing, Communications and  Informatics (ICACCI, Sept. 2014 ), pg 1573-1577 Nidhi Verma;Vishal Mishra and V. P. Singh
23 A 3 level model for implementing MOOC in India 2nd IEEE International Conference on MOOCs Innovation and Technology in Education (IEEE-MITE 2014), Thapar Institute of Engineering & Technology, Patiala pp. 132-137 Aman Sharma, Rinkle Rani
24 Analysis and Visualization of Twitter Data using R   The 1 st International Conference ‘INBUSH ERA 2015’ Theme: Futuristic trends in computational analysis and knowledge management Amity University Greater Noida On 25 - 27 February, 2015 Aman Sharma, Rinkle Rani
25 IoT solutions for 3-D visualization of Twitter data IEEE IACC-2015BMS College of Engineering, Bangalore 12-13 June, 2015 pp. 839-843 Aman Sharma, Rinkle Rani
26 Analysis and Visualization of Professional’s LinkedIn Data   Springer International Conference on Emerging Research in Computing, Information, Communication and Applications Nitte Meenakshi Institute of Technology, Bangalore ERCICA-2015 31 July - 01 August, 2015 pp. 1-9 Puneet Garg Rinkle Rani Sumit Miglani
27   Big Data: An Introduction, Challenges & Analysis using Splunk   International conference on Advances in Computer Science and Information Technology (ACSIT), pp. 464-468, April 2015. Satyam Gupta, Rinkle Rani
28 Performance analysis of LEACH and its variants Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, IEEE, Karpagam College of Engineering, Coimbatore, 26-27th Feb, 2015, pp. 630-634. Simmi Kansal, Tarunpreet Bhatia, Shivani Goel
29 Trust based energy efficient routing in LEACH for wireless sensor network Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE, Noorul Islam University, Tamil Nadu 23-24th April, 2015, pp. 361-365.   Arzoo Miglani, Tarunpreet Bhatia, Shivani Goel
30 Intelligent Agent in Scheduler Cum Emailer Application Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE, Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 260-266(Elsevier). Rupal Bansal, Shivani Goel
31 Speech Emotion Classification using EEMD, SVM and ANN Second international Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2014, organized by NITTE , Bangalore on 2-3 August, 2014, ISBN: 978951072621, pp. 336-341(Elsevier) Manisha, Shivani Goel
32 Multistage Learning Model for Better Learning: A Cognitive Science Perspective IEEE international Conference on MOOC, Innovation and Technology in Education 2014, Organized by Thapar Institute of Engineering & Technology, Patiala, Dec 19-20, 2014, pp. 386-389 Shivani Goel, Deepak Garg
33 A Comprehensive Study on Clustering Approaches for Big Data Mining International Conference on Electronic and Communication Systems (ICECS), organized by Karpagam College of Engineering, Coimbtore, 26-27th Feb, 2015, pp. 1333-1338 Divya Pandove, Shivani Goel
34 A Model for Predicting the Eligibility for Placement of Students Using Data Mining Technique International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 114-117 (IEEE Explore) Mansi Gera and Shivani Goel
35 CSAAES: An Expert System for Cyber Security Attack Awareness International Conference on Computing, Communication and Automation 2015, Galgotia University, Greater Noida, UP, 15-16 May, 2015, pp. 242-245, IEEE Explore Cheshta Rani and Shivani Goel
36 Challenges and Issues in Underwater Acoustics Sensor Network International Conference on Parallel Distributed and Grid Computing (PDGC2014), December 11-13, 2014, Solan, pp 251-255 Himanshu Jindal, Sharad Saxena, Singara Singh Kasana
37 A Noval Image Zooming Approach using Wavelet Coefficients Recent Cognizance in Wireless Communication & Image Processing (ICRCWIP2014), January 16-17, 2015, Jaipur.  Himanshu Jindal, Singara Singh Kasana, Sharad, Saxena
38   Tree Based Energy Efficient Routing Scheme for Body Area Network International Conference on Advances in Computer Engineering and Applications (ICACEA, IMS Engineering College, Ghaziabad, India, March 2015,pp.140-147 Priya Juneja and Sushma Jain
39 Fuzzy Based Expert System for Diabetes Diagnosis and Insulin Dosage Control International Conference on Computing, Communication and Automation (ICCCA), Galgotias University, Noida, 2015, pp. 262-267 Neeru Lalka and Sushma Jain
40 Selecting a set of appropriate metrics for detecting code clones 2014 Seventh International Conference on Contemporary Computing (IC3),Noida, Aug. 7, 2014 to Aug. 9, 2014, pp. 484-488. Geetika Bansal ,Rajkumar Tekchandani
41 An approach to rank code clones for efficient clone management 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bangalore, 10-11 Oct. 2014, 1 - 5 R.Garg, Rajkumar Tekchandani
42 A Hybrid Approach to Detect Code Clones In Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), India, August 2014. Surbhi Sonika , Rajkumar Tekchandani
43 Enhanced MFCC algorithm using look up table and Kaiser window Proceedings of Second IRF International Conference on 10th August 2014, Cochin, India, pp.144-149. Vikram Ojha, Rajkumar Tekchandani.
44 Automated Leukaemia Detection Using Microscopic Images Procedia Computer Science, Volume 58, 2015, Pages 635-642 Ashutosh Mishra, Nimesh Patel
45 Multi agent paradigm used to complexity measure for perfective software maintenance Computer Science and Engineering (APWC on CSE), 2014 Asia-Pacific World Congress, Fiji, 2014. IEEE Xplore: DOI: 10.1109/APWCCSE.2014.7053834 Ashutosh Mishra, Vinayak Srivastava
46 Securing mobile agent"s information in ad-hoc network CONFLUENCE-2014 pp. 442-446, (IEEE), Amity University, Noida Jasleen Kaur, Sharad Saxena, Mohd Abuzar Sayeed
47 Challenges and issues in underwater acoustics sensor networks: A review International Conference on  Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan Jindal Himanshu, Saxena Sharad, Singh Singara
48 Acoustic communication characteristics in UWDBCSN International Conference on  Parallel, Distributed and Grid Computing (PDGC), pp. 251-255, PDGC-2014 (IEEE), JAYPEE Univ. Solan Saxena Sharad, Mehta Deepak, Kaur Jasminder, Jindal Himanshu
49 A Survey- Academic Demolition via Internet Addiction 2nd International Conference on Computing for Sustainable Global Development (INDIACom-2015), pp 210-215 (IEEE), Bharti Vidyapeeth, New Delhi Vishal Kohli, Sharad Saxena, Jagdish Patni
50 Dependncy Mapper and ACO based Efficient Job Scheduling and Load Balancing in Green Clouds IC3I, Mysore, Nov.27-29 Supriya Kinger, Anju Sharma
51 SQL2Neo: Moving Health-care Data from Relational to Graph Databases Advance Computing Conference (IACC), 2015 IEEE International , vol., no., pp.721,725, 12-13 June 2015
doi: 10.1109/IADCC.2015.7154801  
Manpreet Singh, Karamjit Kaur  
52 Integration of heterogeneous databases Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in, vol., no., pp.1033,1038, 19-20 March 2015 doi: 10.1109/ICACEA.2015.7164859 Binny Garg, Karamjit Kaur
53 Jellyfish Attack in MANETs: A Review ICECCT 2015, Coimbatore (IEEE) Simranpreet Kaur, Anil Kumar Verma, Rupinderdeep Kaur
54 A Context Sensitive Thresholding Technique for Automatic Image Segmentation   ICCIDM 2014 Conference, VSSUT, Odhisa, India, December 20-21(2014),Computational Intelligence in Data Mining - Volume 2,Smart Innovation, Systems and Technologies Volume 32, 2015, pp 19-25 Anshu Singla, Swarnajyoti Patra.
55 Bringing closer to the Cultural Roots through Cultural Computing: Detailed Analysis of movie ‘Chaar Sahibzaade’ National Conference on Advances in Engineering, Technology & Management (AETM’15) MMU Ambala, 4th April 2015, pp 09-14 Harkiran Kaur, Kawaljeet Singh, Tejinder Kaur
56 Topic sensitive web page ranking through. Graph database  Third International conference on emerging research in computing, information, communication and applications ercica-2015, NITTE Meenakshi Institute of Technology Yelahanka, bangalore-560 064. India, 31st July 2015, pp 519-527 Alok Gupta, Harkiran Kaur, Shalini Batra
57 Wormhole and Sybil Attack in WSN: A Review INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, Bharati Vidyapeeth, New Delhi, 11 – 13 March 2015. pp. 166-170. Svarika Goyal, Tarunpreet Bhatia, A.K Verma
58 A Hybrid Approach for Data Clustering using Expectation-Maximization and Parameter Adaptive Harmony Search Algorithm. International Conference on Future Computational Technologies,Singapore, 2015, pp.61-67. Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
59 Swarm Intelligence and Flocking Behaviour ICAET-2015, BGIET, Sangrur, Date: 20-21 March 2015, Paper ID:183 Himani , Ashish Girdhar
60 Chapter titled “Trust Calculation using Fuzzy Logic in Cloud Computing” Book titled “Handbook of Research on Security Considerations in Cloud Computing” Ms. Rajanpreet Kaur Chahal, Dr. Sarbjeet Singh

Year 2013-14 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 Performance Analysis of NoSQL Databases having Hadoop Integration International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier,, 1-2 Aug, 2014. Aayush, Seema Bawa
2 Review of virtual machine selection and migration techniques International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14), Elsevier, 1-2 Aug, 2014. C. Kaur and S. Bawa
3 Designing URL Access Counter using MapReduce with HBase Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Baljit Kaur and Rinkle Rani
4 Transforming Relational Database to Graph Database Using Neo4j Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Mehak Gupta and Rinkle Rani
5 Security Issues and User Authentication in MongoDB Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. P. Aggarwal and R. Rani
6 Performance comparison of System using  MongoDB-Redis vs System using Relational Database Elsevier Second International Conference on Emerging Research In Computing Information, Communication and Applications - (ERCICA-14), Bangalore, 01-02 Aug. 2014. Yogesh Punia,Rinkle Aggarwal
7 Collaborating Trust and Item-prediction with Ant Colony for Recommendation System Seventh International Conference on Contemporary Computing (IC3)-2014 IEEE, 2014 A. Kaleroun and S. Batra
8 “Resolving Issue of Lexical Disambiguation using WordNet First International Conference on Networks & Soft Computing(ICNSC-2014), IEEE, 2014 Swati Kukreja and Shalini Batra
9 An Improved Approach for Solving 0/1 Knapsack Problem In Polynomial Time Using Genetic Algorithms IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur India, May 09-11, 2014(to be published in IEEE Explore) C. Sachdeva, S. Goel
10 Expert System and Its Requirement Engineering Process IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur India, May 09-11, 2014(to be published in IEEE Explore) M. Aggarwal, S. Goel
11 Speech Emotion Classification using EEMD, SVM and ANN 2nd International Conference on Emerging Research in Computing, Information, Communication and Application-ERCICA2014, Bangalore, August 2-3, 2014 (Sponsored by Elsevier) M. Chauhan, S. Goel
12 Intelligent agent in scheduler cum emailer application 2nd International Conference on Emerging Research in Computing, Information, Communication and Application-ERCICA2014, Bangalore, August 2-3, 2014 (Sponsored by Elsevier) R. Bansal, S. Goel
13   An Improved Algorithm for Data Hiding using DNA Sequence and Central Dogma of Molecular Biology International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14)   Ravi gupta, Ajay Kumar
14 Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Third International Symposium on Intelligent Informatics (ISI"14), Springer, 2014.[Accepted] Kriti Chadha and  Sushma Jain
15 Impact of Black Hole and Gray Hole attack in AODV Protocol   International Conference on Recent Advances and Innovations in Engineering” ,IEEE,2014. [Accepted]   Kriti Chadha and  Sushma Jain  
16 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 International Journal of Computer Applications (IJCA) Supriya Singla and  Sushma Jain
17 Energy Efficient Protocol for Wireless Sensor Network International Conference on Recent Advances and Innovations in Engineering” ,IEEE,2014. [Accepted] Mandeep Singh Bhandral and  Sushma Jain
18 “2014 Testing Trend is not purely Adhoc:Exploratory Testing Algorithmic Design and Metrics Implementation” in Proc. Elsevier International conference on emerging research in computing, information, communication and applications, 1 August 2014 Nishtha Hooda Vinod K Bhalla
19 Proposed Approach and Algorithm for estimating the cyclomatic complexity in object-oriented programming IEEE International conference on computer, Communication and control Technology, Langkawi, Kedah, Malaysia, 2-4 Sep2014[Accepted] Ankita Garg Vinod K Bhalla  
20 Novel Approaches for increasing energy efficiency in WSNs IEEE First international conference on networks and soft computing, IEEE(ICNSC-2014), 2014[Accepted] Omkar Taneja Vinod K Bhalla
21 Efficient Regression Test Selection and Recommendation Approach for Component Based Software IEEE International Conference on Advances in Computing, Communications and Informatics – ICACCI-14, Noida Janhavi Puniani,Ashima Singh
22 Load Balancing Issues, Techniques and Challenges in Cloud Computing  Elsevier proc. of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), 2014 Gurpreet Singh Bedi, Ashima Singh,
23 IEEE Grey Testing Support in Software Repository with Keyword based Extraction  IEEE International Conference on Advances in Computing, Communications and Informatics – ICACCI-14, Noida Inderjit Singh, Ashima Singh
24 A Survey on various Component Repositories with Detail Study of different Methods and Extraction of Components IEEE International Conference on Advances in Electronics Computers and CommunicationsICAECC-14, Banglore   Inderjit Singh, Ashima Singh
25 Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine International Conference on Systems Engineering 2014, Las Vegas, Nevada, August 19-21, 2014 Karun Verma, R. K. Sharma
26 HMM based Punjabi Speaker Independent Isolated Word Speech To Text Conversion Using HTK International Conference on Emerging Research In Computing, Information, Communication And Applications’ - Ercica-2014, August 01-02, 2014 Karun Verma, Shweta
27 Sign Recognition Using Support Vector Machine International Conference on Emerging Research In Computing, Information, Communication And Applications’ - Ercica-2014, August 01-02, 2014 Karun Verma, Shama
28 An Approach for Frequent Access Pattern Identification in Web Usage Mining. IEEE Conference ICACCI-2014, Delhi       M. M. Sharma and Anju Bala  
29 A Modified K-Means Clustering Approach for High Dimensional Data     ICAECC 2014,oct 10-11,Banglore  V. Sharma and A.Bala                 
30 Deadlock detection with dependence graph due to wait-notify dependency in multithreaded programs Second International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA), Bangalore, India, Elsevier, 2014 Vipin Verma, Aman Jyoti and Vinay Arora
31 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012.   Ashutosh Mishra and Vinayak Srivastava
32 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012.   Ashutosh Mishra and Vinayak Srivastava
33 Source code comprehension using data mining methods National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012   Ashutosh Mishra and Vinayak Srivastava
34 Multi Agent Paradigm for Software Maintenance National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011.   Ashutosh Mishra and Vinayak Srivastava
35 K-means and its variants in Cloud data mining : A comparative Analysis 5th International Conference Confluence 2014 on Cloud Security and Big Data, IEEE, 2014 Ashish Aggarwal,Damandeep Kaur,Deepti Mittal
36 Cost Model for Software as a Service    Confluence 2014, Amity University   Tript Kaur, Ashish Aggarwal and Dr. Damandeep Kaur
37 Design and Implementation of Mobile SMS Categorization Second International Conference in Emerging Research in Computing, Information, Communication and Applications – ERCICA 2014, Bangalore, August 1-2, 2014(Sponsored by Elsevier). Anamika Arya, Rupinderdeep Kaur
38 Efficient Emotion Recognition System based on Classifier Second International Conference in Emerging Research in Computing, Information, Communication and Applications – ERCICA 2014, Bangalore, August 1-2, 2014(Sponsored by Elsevier). Rohit Katyal, Rupinderdeep Kaur

Year 2012-13 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information, Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013 
Kottayam, Kerala, India
Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods , Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava      
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhaw

Year 2017-21 (Non-SCI)

List of research publications in Non-SCI journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors Journal Name

1.       

 UNL-ization of Numbers and Ordinals in Punjabi with IAN

Vaibhav Agarwal, Parteek Kumar

2017

 International Journal on Natural Language Computing 

2.       

Comprehensive review of AES and RSA security algorithms in cloud computing

Shubham Kansal, Harkiran Kaur

2017

Global Journal of Engineering Science and Research Management

3.       

STAR: SLA-aware Autonomic Management of Cloud Resources

Sukhpal Singh, Inderveer Chana and Rajkumar Buyya

2017

IEEE Transactions on Cloud Computing

4.       

A Variational framework for low dose sinogram restoration

Shailendra Tiwari

2017

Int. J. Biomedical Engineering and Technology (IJBET)

5.       

Commentary Upon Role of Neural Networks in Supervised Machine Learning

Palak Bansal, Harkiran Kaur

2017

International Journal of Advanced in Management, Technology and Engineering Sciences

6.       

Review of Transforms used in Image Enhancement

Monty Singh,Ashish Girdhar

2017

International Journal of Computer & Mathematical Sciences

7.       

A Survey on Scheduling techniques in Cloud Computing

Pratisha Sharma, Dr. Inderveer Chana and Dr. Anju Bala

2017

International Journal of Recent Trends in Engineering and Research (IJRTER) journal

8.       

Android GUI testing and tools

Sumit Pal, Ashish Aggarwal

2017

International Journal of Research in Computer Science (IJRCS) 

9.       

A review on Data mining based Intrusion Detection Systems

Vidhi, Rajanpreet Kaur Chahal, Niyati Baliyan

2017

International Journal of
Control Theory
Applications

10.   

Trust Models in Cloud Computing: A Review 

Ritu, Sukhchandan Randhawa, Sushma Jain

2017

International Journal of Wireless and Microwave Technologies

11.   

Application wise Annotations on Intelligent Database Techniques

Supreet Kaur, Harkiran Kaur

2017

Journal for Research

12.   

Investigative Analysis on Data Mining Techniques

Kartik Jaitly, Harkiran Kaur

2017

Journal for Research

13.   

An Automatic Leaf Disease Detection System for Legume Species

Sukhvir Kaur, Shreelekha Pandey, Shivani Goel

2017

Journal of Biology and Today's World

14.   

Enablement of IoT Based Context-aware Smart Home with Fog Computing

M. Bansal, I. Chana, S. Clarke

2017

Journal of Cases on Information Technology

15.   

Grey Wolf-based Clustering Technique.

Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar

2017

Journal of Intelligent Systems

16.   

Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms

Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar

2017

Journal of Intelligent Systems

17.   

Mobile Agent Based Communication using AES and RSA

Mandeep Kaur, Sharad Saxena

2017

Journal of Multimedia Technology & Recent Advancements

18.   

A Comparative Analysis of Optimization Solvers.

Rimmi Anand, Divya Agarwal and Vijay Kumar

2017

Journal of Statistics and Management Systems

19.   

Comparing UWDBCSN Clustering with LNCA for Node Replication Attack

Harpreet Kaur, Sharad Saxena

2017

Journals of Mobile Computing, Communication & Mobile Networks

20.   

Design of Reliable Capacitated Facility Protection in Distribution Centres

Rimmi Anand, and Vijay Kumar

2018

Procedia Computer Science

21.   

A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks

Tarunpreet Bhatia, A.K. Verma, Gaurav Sharma, Suman Bala

2018

Recent Patents on Engineering

22.   

An Energy Efficient and Trust Aware Framework for Secure Routing in Leach for Wireless Sensor Networks

Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava

2018

Scalable Computing: Practice and Experience

23.   

Prediction of Sentiment from Macaronic Reviews

Sukhnandan Kaur, Rajni Mohana

2018

 Informatica: An International Journal of Computing and Informatics

24.   

Fuzz testing in stack-based buffer overflow

Manisha Bhardwaj and Seema Bawa

2018

Advances in Computer Communication and Computational Sciences

25.   

Iris Image Based Pre-Diagnostic Tool to Predict Obstructive Lung Diseases

Atul Bansal, Ravinder Agarwal, and R. K. Sharma

2018

Biomedical Research

26.   

An Efficient Mobility Model for Improving Transmissions in Multi-UAVs Enabled WSNs

Mohd Abuzar Sayeed, Dr. Rajesh Kumar.

2018

Drones

27.   

OLAP Approach to Visualizations and Digital ATLAS for NRIs Directory Database

Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur

2018

Harmony Search and Nature Inspired Optimization Algorithms, Advances in Intelligent Systems and Computing Book Series Vol.741

28.   

Comprehensive Survey of OLAP Models

Harkiran Kaur, Gursimran Kaur

2018

Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing Book Series, vol 741.

29.   

Detecting spam web pages using multilayer ELM

R.K.Roul

2018

IJBDI, Inderscience

30.   

An effective topic-based ranking technique for categorised research articles

R.K.Roul, J.K.Sahoo

2018

IJCSE, Inderscience

31.   

A Proposed Pharmacogenetic Solution for IT-Based Health Care

Rashmeet Toor and Inderveer Chana

2018

Information and Communication Technology for Sustainable Development

32.   

Complex Diffusion Regularization based Low dose CT Image Reconstruction

Kavkirat Kaur, Shailendra Tiwari

2018

Int. J. Biomedical Engineering and Technology, Inderscience

33.   

Inspecting the Efficiency of Deep Neural Networks for Classification of Images with Noise

Shaify Kansal, Shivani Goel, Jhilik Bhattacharya

2018

International Journal of Advances in Electronics and Computer Science

34.   

Implementing Fuzzy Technique to Expert System - A Case Study on Salt Analysis

Kriti Asija, Harkiran Kaur

2018

International Journal of Applied Engineering Research

35.   

An improved hybrid illumination normalization and feature extraction model for face recognition

Jyotsna Yadav, Navin Rajpal, Rajesh Mehta

2018

International Journal of Applied Pattern Recognition

36.   

An Allotment of H1B Work Visa in USA using Machine Learning

Pooja Thakur, Mandeep Singh, Harpreet Singh,Prashant Singh Rana

2018

International Journal of Engineering & Technology

37.   

Evolving state grammar for modeling DNA and RNA structures

Ajay Kumar, Nidhi Kalra and Sunita Garhwal

2018

International Journal of Engineering & technology

38.   

Fingerprint image enhancement techniques : A survey 

Monty Singh and Ashish Girdhar

2018

International Journal of Innovations and Advancement in Computer Science (IJIACS)

39.   

Intercloud: A hype or reality?

Lohit Kapoor, Seema Bawa, and Ankur Gupta

2018

International Journal of Next-Generation Computing

40.   

Comparative Analysis of Effect of Corpus-Based Stemmers in Sentiment Analysis

Fahd Alotaibi, Vishal Gupta, Jasmeet Singh

2018

International Journal of Research in Electronics and Computer Engineering

41.   

Statistical Dimension Identification and Implementation for Student Progression System

Harkiran Kaur, Aanchal Phutela

2018

International Journal of Innovative Technology and Creative Engineering

42.   

An effective approach for semantic-based clustering and topic-based ranking of web documents

R.K.Roul

2018

JDSA, Springer

43.   

Utility of OLAP and Digital ATLAS to Enhance Cross-Border Connectivity among Punjabi Sikh NRIs

Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur

2018

Proceedings of 2nd International Conference on Communication, Computing and Networking, Lecture Notes in Networks and Systems. Vol. 46

44.   

Implementing Multidimensional Analytics in NRIs Directory Databases

Harkiran Kaur, Kawaljeet Singh and Tejinder Kaur

2018

Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46

45.   

Degraded offline handwritten Gurmukhi character recognition: study of various features and classifiers

Anupam Garg, Manish Kumar Jindal, Amanpreet Singh

2019

International Journal of Information Technology

46.   

IoT-Based Solid Waste Management Solutions: A Survey

Kellow Pardini and Joel J. P. C. Rodrigues and Sergei A. Kozlov and Neeraj Kumar and Vasco Furtado

2019

Journal Sensor and Actuator Networks

47.   

Suitability and Importance of Deep Learning Feature Space in the Domain of Text Categorization

Rajendra Kumar Roul

2019

International Journal of Computational Intelligence Studies, Inderscience

48.   

Improving Software Process Quality Using 3D Six Sigma Approach

Amanpreet Kaur, Harkiran Kaur

2019

2018 International Conference on Inventive Research in Computing Applications (ICIRCA)

49.   

Factual Dimension Identification and Usage for Real Estate Framework

Gursimran Kaur, Harkiran Kaur

2019

2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering

50.   

Hybridizing J48 and SVM for Predicting Sale and Purchase of Property

Gursimran Kaur, Harkiran Kaur

2019

2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering

51.   

Non-dominated Sorting Genetic Algorithm - III Based Meta Decision Tree

Gursimran Kaur, Harkiran Kaur

2019

2018 2nd International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)

52.   

Descriptive Data Analysis of Real Estate Using Cube Technology

Gursimran Kaur, Harkiran Kaur

2019

Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing Book Series, vol 906

53.   

Performance Evaluation of Time Synchronized MultiLayer-MAC Protocol

Manju Khurana, M. K. Jha

2019

Recent Patents on Engineering

54.   

 Deep Learning in the Domain of Near-Duplicate Document Detection

Rajendra Kumar Roul

2019

7th Big Data Analytics

55.   

Authorship Identification using Recurrent Neural Networks

Shriya Gupta, Jajati Sahoo and R.K Roul

2019

3rd ICISDM-2019, University of Houston, Texas, USA

56.   

A New approach for Multi-document Text Summarization using Topic Modeling

R.K.Roul, S. Merhotra, Y.Pengulia and J. K. Sahoo

2019

15th ICDCIT-2019, KIIT, Bhubaneswar

57.   

Smart Indoor Air Quality Monitoring System

Supreet Kaur, Seemu Sharma, Seema Bawa

2019

International Journal of Recent Technology and Engineering

58.   

An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps.

Pankaj Kumar, Vishnu Sharma, Gaurav Sharma, and Tarunpreet Bhatia.

2019

International Journal of Information Security and Privacy

59.   

On the Security of Authenticated Group Key Agreement Protocols

Suman Bala, Gaurav Sharma, Himani Bansal, and Tarunpreet Bhatia

2019

Scalable Computing: Practice and Experience

60.   

AN ENERGY EFFICIENT RPL OBJECTIVE FUNCTION FOR CLINICAL RESEARCH

Neha Modi, Vivek Gupta, Rashmi Raj

2019

Journal of Information and Computational Science

61.   

Nature inspired Task Scheduling Algorithm for Improving Quality of Service in Cloud Environment

Seema Singh, Prabhdeep Singh, Rajbir Kaur, Vivek Gupta

2019

International Journal of Future Generation Communication and Networking

62.   

Near-Duplicate Document Detection using Semantic-based Similarity Measure: A Novel Approach

Rajendra Kumar Roul, Jajati Keshari Sahoo

2020

5th ICCIDM-2018, UCE, Burla, Odisha

63.   

Sentiment Analysis and Extractive Summarization based Recommendation System

R.K.Roul and J. K. Sahoo

2020

5th ICCIDM-2018, UCE, Burla, Odisha

64.   

Identification of Risks and Threats Associated with SPI Programs in SMEs using PCA

Ashima Singh, Amrita Kaur, Harpreet Vohra

2020

International Journal of Computer Science and Information Security, Pittsburgh PA: IJCSIS

65.   

Human-Computer Interaction with Special Emphasis on Converting Brain Signals to Speech

Venkatesh Sharma, Sambhav Kumar, Amrita Kaur, Ashima Singh

2020

International Journal of Innovative technology and Exploring Engineering, Blue Eyes Intelligence Engineering and Sciences, 2020

66.   

Application of Machine Learning for Prediction of Lung Cancer using Omics Data

Arwinder Dhillon, Amrita Kaur, Ashima Singh

2020

International Journal of Innovative technology and Exploring Engineering, Blue Eyes Intelligence Engineering and Sciences, 2020

67.   

A pragmatic framework for predicting change prone files using Machine Learning techniques with Java-based software

Loveleen Kaur and Ashutosh Mishra

2020

Asia Pacific Journal of Information Systems

68.   

Localization and Tracking of Mobile Jammer Sensor Node Detection in Multi-Hop Wireless Sensor Network

KP Porkodi, I Karthika, Hemant K Gianey

2020

Recent Advances in Computer Science and Communications

69.   

An attribute-based keyword search for m-Health networks

Mamta and Brij Gupta

2020

Journal of Computer Virology and Hacking Techniques

70.   


A Novel Approach for Ranking Web Documents based on Query-Optimized Personalized PageRank

Rajendra Kumar Roul and J.K.Sahoo

2020

Internation journal of data science and analytics

71.   

Low-Level Features based 2D Face Recognition using Machine Learning

Sahil Sharma and Vijay Kumar

2020

International Journal of Intelligent Engineering Informatics

72.   

Effect of E-learning on public health and environment during COVID-19 lockdown

Avani Agarwal, Sahil Sharma, Vijay Kumar, Manjit Kaur

2020

Big Data Mining and Analytics

73.   

Maritime Surveillance with Planes Using Machine Learning Techniques

Vinod Kumar Bhalla, Parag Nijhawan, Manish Kumar Singla

2021

International Journal of Advanced Trends in Computer Science and Engineering

74.   

Soft Computing Based Ground Target Recognition

Vinod Kumar Bhalla, Ravinandan Kumar, Manish Kumar Singla, Parag Nijhawan

2021

International Journal of Recent Technology and Engineering

75.   

Electrical Load Forecasting using SVM Algorithm

Parag Nijhawan,Vinod KumarBhalla, ManishKumar Singla, Jyoti Gupta

2021

International Journal of Recent Technology and Engineering

Year 2016-17 (Non-SCI)

List of research publications in Non-SCI journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Android Application for Mobile Customers using Speech Synthesis. International journal of Computer Applications,Volume: 145 number2, Page Nos:18-25, 2016 Keshav Rana, Rupinderdeep Kaur
2.        An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information, Communication and Applications, pp 281-287,2016 Monia , Sukhchandan Randhawa, Sushma Jain
3.        An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs International Journal of Artificial Intelligence and Knowledge Discovery,Vol. 6, pp. 1-7,2016 Vinay Arora, Rajesh Bhatia, Maninder Singh
4.        Application of I.T. in Healthcare: A Systematic Review ACM, SigBio Record Newsletter,Article no. 2,2016 Rashmeet Toor and Inderveer Chana
5.        Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29,2016 Geeta Kasana,Kulbir Singh and Satvinder Singh
6.        Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks International Journal in Foundations of Computer Science & Technology (IJFCST),ISSN:1839-7662, Vol. 6 (2), pp. 1-21 Anju Bhandari and V. P. Singh
7.        Data Clustering Using Differential Search Algorithm Journal of Science and Technology,Vol. 24(2), pp. 295-306,2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
8.        Design and Development of CLI for SleuthKit: A Cyber Forensics Framework "International Journal of Scientific and Research Publications",Volume 6 Issue 1,2016 Dilpreet Singh Bajwa, Gurpal Singh Chhabra
9.        Fuzzy Logic Based Intrusion Detection Scheme against DoS Attack in MANET International Journal of Research in IT, Management and Engineering, vol. 6, pp. 21-27,2016 Sakshi Gautam, Suveg Moudgil, Tarunpreet and Bhatia
10.    Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain British Journal of Applied Science &Technology,Vol. 14, No.4, pp. 21-29,2016 Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh.
11.    Impact Analysis of Software Processes for SPI in Indian SMEs International Journal of Applied Engineering Research,ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011 Singh, A. & Aggarwal, H.
12.    Implementation of Word Level Speech Recognition System for Punjabi Language International journal of Computer Applications, Volume: 146 number 3, Page Nos:12-17,2016 Shama Mittal, Rupinderdeep Kaur
13.    Intensification of Resolution in the Realm of Digital Imaging International Journal of Computer Engineering In Research Trends, vol. 6,2016 Shivangi Jindal, and Harkiran Kaur
14.    PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks Journal of Internet Services and Information Security (JISIS),volume: 6, number: 1 (February 2016), pp. 47-56 Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao
15.    Performance Analysis of LEACH with Machine Learning Algorithms in Wireless Sensor Networks International Journal of Computer Applications,Vol. 147, No. 2 , pp. 7-12,2016 Sukhchandan Randhawa, Sushma Jain
16.    Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) Quantum Matter, American Scientific Publishers, 5(3):1-8,2016 Y Pathak, K Sharma, K Singh and PS Rana
17.    Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, 137 (9), 27-30,2016 Sharma, S., Bawa, S. and Lomash, H
18.    Proposal and Implementation of MPLS Fuzzy Traffic Monitor (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1,2016 Anju Bhandari and V. P. Singh
19.    Towards measurement of structural complexity for ontologies "International Journal of Web Engineering and Technology",11, 153,2016 Niyati Baliyan and Sandeep Kumar
20.    Various Approaches of Community Detection in Complex Networks: A Glance Journal of Information Technology and Computer Science, Vol. 8,  PP.35-41,2016 Maninder Kaur,Abhay Mahajan
21.    Visualizing Class Diagram Using OrientDB Data-Store International Journal of Innovative Science, Engineering & Technology,Vol. 3 Issue 6, 341-345, 2016 Sawinder Kaur, Karamjit Kaur
22.    Volatile Memory Forensics: A Legal Perspective "International Journal Of Computer Application", 155(3),11-15, 2016 HarnoorKaur Mann, Gurpal Singh

Year 2015-16 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, March 2016, 137 (9), 27-30. Sharma, S., Bawa, S. and Lomash, H
2 QoS based Workload Design Patterns in Cloud Computing: A Literature Review International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). Sukhpal Singh and Inderveer Chana
3 Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing I. J. Computer Network and Information Security, 2015, 11, 9-19 Chetan Chawla, and Inderveer Chana
4 QoS based Machine Learning Algorithms for Clustering of Cloud Workloads: A Review International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). Sukhpal Singh and Inderveer Chana
5 Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks InJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Volume: 6 Issue:3 Page No. 54-72 Year: 2015 Vishal Sharma Rajesh Kumar
6 Green WSN- Optimization of Energy Use Through Reduction in Communication Workload. CoRR abs/1506.04849 (2015) Vandana Jindal, A. K. Verma, Seema Bawa:
7 Survey on Query Processing & Optimization Techniques in WSN International Journal of Computer Science and Information Security 14 (2), 54 V Jindal, AK Verma, S Bawa
8 QoS Comparison of MANET Routing Protocols International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. T Bhatia, AK Verma
9 A Survey to Automatic Summarization Techniques International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015. Sherry, Parteek Kumar
10 Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks International Journal in Foundations of Computer Science & Technology (IJFCST), ISSN:1839-7662, Vol. 6 (2), pp. 1-21, March, 2016 Sukhpal Singh and Inderveer ChanaAnju Bhandari and V. P. Singh
11 Proposal and Implementation of MPLS Fuzzy Traffic Monitor (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, 2016 Anju Bhandari and V. P. Singh
12 Comparative Study of Type-1 Fuzzy Logic and Type-2 Fuzzy Logic International Journal of Computer Applications Volume 124 – No.16, August 2015, pp. 14-21 Neeru Lalka, Sushma Jain
13 A Systematic Review on Energy Aware QoS Routing in Wireless Sensor Networks International Journal of Energy, Information and Communications Vol.6, Issue 5 (2015), pp.1-14 Sukhchandan Randhawa, Sushma Jain
14 Video Search Engine Optimization Using Keyword and Feature Analysis Procedia Computer Science 58 ( 2015 ) 691 – 697, ScienceDirect, Elsevier Krishna Choudharia , Vinod K Bhalla
15 Strucutal Modeling on PSiOS Innovative Research in Computer Science,E-learning information, 2015 Jay Patel , Ashish Aggarwal
16 Various Approaches of Community Detection in Complex Networks: A Glance Journal of Information Technology and Computer Science, Vol. 8, PP.35-41,2016 Maninder Kaur,Abhay Mahajan
17 An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs International Journal of Artificial Intelligence and Knowledge Discovery, Vol. 6, pp. 1-7, 2016 Vinay Arora, Rajesh Bhatia, Maninder Singh
18 Techniques, Trends & Challenges For Localization In Vehicular Ad Hoc Networks Asian Journal of Mathematics and Computer Research, Vol. 9, Issue. 4, pp. 350-360. VDeepak Mehta, Sharad Saxena
19 Study on Emotional Intelligence of Graduate Students of Art And Science And of Different Locale Journal of Basic and Applied Research Internatinal (JOBRAI), Vol. 17 , No. 4, pp 227-237. Shilpi Saxena, Sharad Saxena
20 CPU mining Malware: Complete Analysis of Real World Virus International Journal of Research in Advent Technology,2015 Gautam, R., Kumar. S, & Bhattacharya, J
21 Data Clustering Using Differential Search Algorithm Journal of Science and Technology. Vol. 24(2), pp. 295-306, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
22 Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) Quantum Matter, American Scientific Publishers, 5(3):1-8, 2016. Y Pathak, K Sharma, K Singh and PS Rana
23 Impact Analysis of Software Processes for SPI in Indian SMEs International Journal of Applied Engineering Research ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011. (Scopus Indexed). Singh, A. & Aggarwal, H.
24 Ruling out key enablers for software process reengineering in Indian small and medium enterprises International Journal of Business and Process Management, Inderscience publishers (Scopus Indexed) Singh, A. & Aggarwal, H
25 Non Oblivious Watermarking Technique for JPEG 2000 Compressed Images using Arnold Scrambling of Unequal Size Watermark Blocks. International Journal of Science and Engineering, Vol. 9, No.1, pp. 17-26,2015. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
26 Singular Value Decomposition Based Steganography Technique for JPEG 2000 Compressed Images International Journal of Engineering, Vol. 28, N0.12, pp. 1720-1727, 2015. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
27 Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain British Journal of Applied Science &Technology, Vol. 14, No.4, pp. 21-29, 2016. Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh.
28 Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29, 2016. Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia
29 An Android Application for Mobile Customers using Speech Synthesis. International journal of Computer Applications. Volume: 145 number2, Page Nos:18-25, 2016 Keshav Rana, Rupinderdeep Kaur
30 Implementation of Word Level Speech Recognition System for Punjabi Language International journal of Computer Applications. Volume: 146 number 3, Page Nos:12-17, 2016 Shama Mittal, Rupinderdeep Kaur
31 Visualizing Class Diagram Using OrientDB Data-Store International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 6, 341-345, June 2016 Sawinder Kaur, Karamjit Kaur
32 An Efficient Trust Management Algorithm in Wireless Sensor Network Emerging Research in Computing, Information, Communication and Applications, 10 May 2016, pp 281-287 Monia , Sukhchandan Randhawa, Sushma Jain
33 Intensification of Resolution in the Realm of Digital Imaging Intensification of Resolution in the Realm of Digital Imaging Shivangi Jindal, and Harkiran Kaur
34 A Novel Approach for Reduction of Dynamic Range Based on Hybrid Tone Mapping Operator Procedia Computer Science, 58, pp. 265-271, 2015 Himanshu Kasliwal, Shatrughan Modi
35 PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks Journal of Internet Services and Information Security (JISIS), volume: 6, number: 1 (February 2016), pp. 47-56 Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao
36 Proliferation of Social Computing: Cultural Computing Paradigm International Journal of Computer Applications, 137 (9), 27-30. 2016 Seemu Sharma, Seema Bawa, Hitashi Lomash

Year 2014-15 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Energy Efficient and High Performance Scheduling Algorithm for Grid Computing. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 3, no. 3 (2014): 179-188. Jain, Nidhi, and Inderveer Chana
2 Energy based Efficient Resource Scheduling: A Step Towards Green Computing International Journal of Energy, Information and Communications Vol.5, Issue 2 (2014), pp.35-52 Sukhpal Singh and Inderveer Chana
3 Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN) International Journal of Computer Applications (IJCA), vol. 92, no. 5, pp. 46-50, 2014 Ashima Singh and Gurpreet Bedi
4 Development of Component Repository, 3, 2014 AshimaSingh and Amandeep Bakshi
5 DNA Based Cryptography: A Review, International J. Information and Computational Technology, Volume 4, Number 7, pp. 693-698, 2014 Ashish Kumar; and Anil verma
6 A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata 8 pp. 95-105, 2014 A Kumar; and Anil verma
7 Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing 4 pp. 997-1001, 2014 Anju Bala and Inderveer Chana
8 Challenges of Sentiment Analysis and Existing state of art 1, 2014 Sujata Rani ; and Parteek kumar
9 Detection of potential clones from software using metrics 4 pp. 964-969, 2014 Geetika Bansal; and Rajkumar Tekchandani
10 Comparison of KNN and Slope one Algorithm in Sparse Enviornment 4, 2014 Abhishek Kaleroun; and Shalini Batra
11 A review of ranking approaches for semantic search on Web 50 pp. 416-425, 2014 Vikas Jindal;Seema Bawa;
12 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 99 pp. 17-23, 2014 sushma jain and Supriya Singla
13 Buffer OverFlow : Proof Of Concept Implementation 2 pp. 1201-1204, 2014 sushma jain and Pooja Rani
14 Quantum Neural Network based Machine Translator for Hindi to English 8, 2014 Ravi Narayan;Snehashish Chakraverty; and Vp singh
15 A Survey Paper on Web Page Change Detection 2 pp. 241-245, 2014 Vishnu Goel ; and Vinay arora
16 A novel approach for automatic test sequence generation for Java fork/join from activity diagram IEEE Advanced Communication Control and Computing Technologies pp. 1611-1615, 2014 Vipin Verma; and Vinay arora
17 Test sequence generation for Java7 fork/join using interference dependence 2, 2014 Vipin Verma ; and Vinay arora
18. Analysis of Search Engine Optimization (SEO) Techniques International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), pp. 563-566, 2015 Gurpreet Singh Bedi and Ms. Ashima Singh  
19    A Non-Interactive Certificateless Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks International Journal of Ad Hoc and Ubiquitous Computing, 2015 [Accepted In press] Suman Bala and Anil Verma
20    Word Sense Disambiguation for Punjabi Language Using Overlap Based Approach Advances in Intelligent Informatics, pp. 607-619. Springer International Publishing, 2015. Rana, Preeti and Parteek Kumar
21    P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network Intelligent Distributed Computing, 321, 43-54, 2015. Amrindeerpreet Singh and shalini batra
22    Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Intelligent Distributed Computing  (Book title Advances in Intelligent Systems and Computing), 321, 185-198,  2015. Kriti Chadha, Sushma Jain
23    Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges Book Chapter titled, “Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges” in the book:. Challenges, Limitations and R&D Solutions, 2014, Springer, pp. 51-72. Inderveer Chana and Sukhpal Singh

Year 2013-14 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals    

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
            1 Extracting a knowledge from source code comprehension using data mining methods Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012   A. Mishra and V. Srivastava
            2 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012 A. Mishra and V. Srivastava
           3 Intelligent Computing Methods for Software Maintenance: a Review Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012. A. Mishra and V. Srivastava
            4 Data mining methods for program comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. A. Mishra and V. Srivastava
            5 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms.     International Journal of Advanced Research in Computer Science and Software Engineering, 3 (6), June 2013, pp. 1382-1394 Tarunpreet Bhatia, A.K. Verma    

Year 2012-13 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors
1 Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing Advances in Intelligent and Soft Computing, ISSN: 1867-5662, Springer, 233 SPRING STREET, NEW YORK, USA, NY, 10013. Springer, Vol. 167,  page 323-331 Ajay Kumar, Seema Bawa,
2 A Survey of Search and Retrirval of Components from Software Repositories International Journal of Engineering research and Technology, ISSN : 2278 – 0181, Vol 2, Issue 4, April 2013.   Amandeep Bakshi, Seema Bawa
3 Key features of research portal for stimulating research in institutions of higher technical education EGITIM ARASTIRMALARI-EURASIAN JOURNAL OF EDUCATIONAL RESEARCH, Vol. 48, No. 12, pp. 155-174, 2012 Parul Dharmani, Ravi Kiran, Anil K Verma  
4 Simulation and analysis of AODV routing protocol in VANET International Journal of Soft Computing and Engineering, Vol. 2, No. 3, 293-301, July 2012 Tajinder Kaur, K Cheema, Anil K Verma
5 Agent enriched distributed association rules mining- A review Agents and Data Mining Interaction-LNCS, Vol. 7103, pp. 30-45, 2012 G S Bhamra, R B Patel, Anil K Verma
6 Simulation and analysis of dropped packets for DSR protocol in VANET International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Avleen Kaur, Anil K Verma
7 Simulation and Comparison of AODV and DSR Routing Protocols in VANETs International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Tajinder Kaur, Avleen Kaur, Anil K Verma  
8 Computation of Pheromone Values in AntNet Algorithm International Journal of Computer Network and Information Security, Vol. 9, pp. 47-54, Aug 2012 Anuj Gupta, H Sadawarti, Anil K Verma  
9 Simulation and analysis of DSR protocol in VANETs International Journal of Research in Computer and Communication Technology Vol. 1 No. 3, pp. 50-59, Aug. 2012 Avleen Kaur, Anil K Verma
10 SNMP, ICMP: A Collaborative Approach to Network Discovery and Monitoring International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248-9738 Volume-1, Issue-3, 2012 Aman Mahajan, Sahil Khajuria, Haresh Joshi, Anil K Verma  
11 Classification of Symmetric Key Management Schemes for Wireless Sensor Networks-Extended International Journal of Security and its Application, Vol. 7. No. 2, Mar 2013 Suman Bala, Gaurav Sharma, Anil K Verma
12 MFZLP: Multihop Far Zone Leach Protocol for WSNs Journal of Computational Intelligence and Electronic Systems, Vol. 2, No. 1, pp. 45-49, 2013 Virender Ranga;Mayank Dave;Anil Kumar Verma
13 Implementation of DYMO routing protocol   International Journal of Information Technology, Modeling and Computing, Vol. 1, No. 2, pp. 49-57, May 2013 Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma
14 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, pp. 1382-1394, Jun 2013 T Bhatia, Anil K Verma
15 Performance Analysis of MANETS Routing Protocols in Different Mobility Models International Journal of Information Technology and Computer Science,  Vol. 6, May 2013 K Gupta Anuj, Harsh Sadawarti, Anil K Verma
16 Knowledge Management Role of Thought Leaders and Junior Academia in Enhancing Research and Curriculum in Institutions of Higher Technical Education SAGE Open, pp. 1-13, June 2013 Ravi Kiran, Parul Agarwal, Anil K Verma
17 How the Two Wireless Networks Can Be Different: WSNS and VANETS Journal of Basic and Applied Scientific Research, 2013 Vandana Jindal, A.K.Verma, Seema Bawa
18 Multi-Core Scheduling in Cloud Computing,   International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868, Volume 4– No.9, Abhishek Kaushik and Inderveer Chana,
19  Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing” International Journal of Computer Applications, IJCA Journal, pp.13-17, Vol 50, No 10 Year of Publication: 2013 Deep Mann and Inderveer Chana,
20 Empirical Evaluation of Cloud-based Testing Techniques:A Systematic Review International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6
 
Priyanka, Inderveer Chana and Ajay Rana
21 Existing Load Balancing Techniques in Cloud Computing : A Systematic Review International Journal in Foundations of Computer Science & Technology(IJFCST), Volume 3, No.3, May, 2013 Kansal J. N., Chana I.
22 Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol.2, No.2, pp. 123~133, ISSN: 2089-3337. Anju Bala, Inderveer Chana
23 Cloud Load Balancing Techniques: A Step Towards Green Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), pp. 291~302,Vol.2, No.1, Kansal J. N., Chana I.
24 An Enhanced Run Length Coding for JPEG Image Compression International Journal of Computer Applications , 72(20),  2013  Amritpal Singh, V. P Singh
25 Adaptive Distributed Intrusion Detection using Hybrid k-means SVM Algorithm International Journal of Enhanced Research in Management & Computer Applications, Vol. 2 Issue 6, June-2013, pp: (10-14), V. P. Singh, Parneet Kaur
26 Steganography : A modern day Art and Science for Data Hiding International Journals of latest research in Science and Technology (IJLRST), Volume 2 Issue 4 ,2013 (Accepted) Roopam Bansal and V. P. Singh
27 Modeling and Querying Data in MongoDB International Journal of Scientific and Engineering Research Vol. 4, No. 2 pp. 141-144 Rupali Arora Rinkle Aggarwal
28 Implementation of relation queries in graph databases   International Journal on Information & Communication Technologies Vol. 6 no.1   pp.354-357 Rupali Arora Rinkle Aggarwal
29 Simulating wireless sensor networks using opnet   International Journal on Information & Communication Technologies Vol. 6 no.1 pp. 366-371 Abhinandan Gupta Rinkle Aggarwal
30 Design and Performance Evaluation of a New Irregular Fault- Tolerant Multistage Interconnection Network International Journal of Computer Science Issues Vol. 9, No.  2 pp. 108-113 Rinkle Aggarwal
31 Design and Reliability Analysis of a Class of Irregular Fault-tolerant Multistage Interconnection Networks International Journal of Computer Applications Vol. 39, No.8, pp. 8-14 Rinkle Aggarwal
32 An Efficient Algorithm for Data Cleaning of Log File using File Extensions International Journal of Computer Applications Vol. 48, No.8, pp. 13-18 Surbhi Anand Rinkle Aggarwal
33 Reference Scan Algorithm for Path Traversal Patterns International Journal of Computer Applications Vol. 48, No.7, pp. 20-25 Chintandeep Kaur Rinkle Aggarwal
34 An Efficient Algorithm for Web Page Change Detection International Journal of Computer Applications Vol. 48, No.10, pp. 28-33 Srishti Goel Rinkle Aggarwal
35 A Modified Algorithm to Handle Dangling Pages using Hypothetical  Node International Journal of Computer Applications Vol. 48, No.7,  pp. 26-32 Shipra Srivastava Rinkle Aggarwal
36  A Short Survey of Key Distribution Techniques for Namespace Load Balancing International Journal of Emerging Technologies in Computational and Applied Sciences, Issue 4, Vol. 1, 2 & 3, pp. 532-536, May, 2013 Ravneet Kaur, Shalini Batra
37 Phases of Testing An Online Application International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 6, June 2013 Sandeep Singh and Shivani Goel
38 Testing Techniques for COTS International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 4, pp. 829-833, April 2013 Jagdeep Singh and Shivani Goel
39 COTS and OSS: A Comparative View The International Journal of Computer Science and Applications Vol 1, No. 12, pp. 55-59, Feb 2013 Jagdeep Singh and Shivani Goel
40 Selection of Component Models: A Comparative view International Journal of Computer Engineering and Software Technology, Vol 3, No. 2, pp. 166-173, July-Dec 2012 Jyotsna, Shivani Goel
41 Vulnerability Management for an Enterprise Resource Planning System International Journal of Computer Applications, ISSN: 0975 – 8887, Vol 53, No. 4, September 2012, pp. 19-22 Shivani Goel, Ravi Kiran, Deepak Garg
42 UNL-ization of Numbers and Ordinals in Punjabi with IAN,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 3, June 2013: 61,69. Vaibhav Agarwal, Parteek Kumar  
43 NLization of Nouns, Pronouns and Prepositions in Punjabi With EUGENE,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 2,  April 2013: 33,42 Ashutosh Verma, Parteek Kumar  
44 Development of Mobile Application for Transliteration of Roman Script to Gurmukhi Script,    International Journal of Computational Linguistics and Natural Language Processing, Vol. 1, No. 1, Aug 2012: 6-11.   Maninder Singh, Parteek Kumar, Ms. Rupinderdeep Kaur
45 Web Page Categorization: Tools, Techniques and  Evaluation International Journal of Advances in Computing  and Information Technology, ISSN 2277-9140, Vol. 1, Issue-2, pp. 212-219, 2012 K. Taneja, and V. K. Bhalla
46 Analysis the Performance of MANET Protocols by Varying the Number of Connections International Journal of Mobile & Adhoc Network, ISSN 2231–6825, Vol 2, issue 2, pp.185-191,2012 Shivender Taneja and Vinod K Bhalla
47 Optimization of Hamilton Path Tournament Schedule International Journal of Advanced Research in Computer Engineering & Technology, Volume 2 Issue 6 of  (ISSN: 2278-1323) , 2013 Trinetra Kumar Pathak and Vinod K. Bhalla
48 Android Internals International Journal of Advanced Research in Computer Science and Software Engineering,” Vol. 3, Issue 6, pp. 143-147, 2013 Vaibhav Kumar Sarkania, Vinod Kumar Bhalla
49 ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack International Journal of Network Security (IJNS), vol. 14, no. 1,  ISSN 1816-3548, pp. 36-45 B. B. Gupta, R. C. Joshi, Manoj Misra
50 Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email, Indian Journal of Science and Technology, Vol. 6, issue 1, pp. 1-5 (ISI Thomson Router) A. ALmomani, B. B. Gupta, T. Wan, A. Altaher, S. Manickam
51 Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model Journal of Computing and Information Technology (CIT) , Vol. 20, no. 1, ISSN 1846-3908, pp. 1–8 B. B. Gupta
52 Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art International Journal of Computer Applications, Vol. 49, no. 7, pp. 24-32, 2012 E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, R. Alfaris
53 Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment International Journal of Computer Science Issues(IJCSI), vol. 10, issue 2, pp. 142-146 P. Negi, a. Mishra, B. B. Gupta
54 Mutation Operators corresponding Conditions Contributing in Deporting them Equivalently Vol. 4(2), 656-658, 2013        IJCST   Tannu Singala Ajay Kumar  
<55 Rule based Normalization of Regular Expressions International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 2013 J. S. Khedar, Ajay Kumar    
56 Ambiguity detection algorithm for context free grammar   IJCST, 4(3), 2013 S. K. Jain, Ajay Kumar  
57 Text to Speech Synthesis for numerals into Punjabi Language International Journal of Computational Linguistics and Natural Language Processing Vol 2 Issue 7 July 2013 Karun Verma, Maninder Singh
58 Workflow Management in Cloud Computing   IJAIS, Vol no:4, page       no: 21-26., Oct.2012 Monika Bharti, Anju Bala
59 Automatic Fragmentation and Storage of Code in Component Repository w.r.t. their Input and Output Interfaces: A Tool” International Journal of Innovative Technology and Exploring Engineering (IJITEETM) ISSN: 2278-3075, Volume-2, Issue-3, Page: 235-238 February 2013 Pankaj Vohra Ashima Singh
60 A Tool incorporation different Techniques for Effective Component Storage and Retrieval   International Journal. of Scientific and Engineering Research, vol. 4, no. 7, pp. 1134-1137, 2013. Pankaj Vohra Ashima Singh
61 Iterative and Non–Iterative Approaches for Architecture Based Software Development CiiT International Journal of Software Engineering and Technology Vol 5, January 2013 Navneet Rathour Ashima Singh
62 Generating More Reusable Components while Development : A Technique International Journal of Innovative Technology and Exploring Engineering(IJITEE) Volume-2 Issue-3, 2013 Navneet Rathour Ashima Singh
63 A Complexity Metric for Black Box Components International Journal of Soft Computing and Engineering  Volume-3 Issue-2, ,10,179-184, June 2013 Navneet Rathour Ashima Singh
64 A Technique for Component Based Software Development International Journal of Computer Science and Engineering ( IJCSE )   Volume-2, Issue 2, 123-134, May 2013 Navneet Rathour Ashima Singh
65 Component Complexity Metrics: A Survey International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6,pp. 1056-1061, June 2013 Navneet Rathour Ashima Singh
66 A metric for Assessing Black Box Component Reusability International Journal of Scientific and Engineering Research, vol 4 ,no. 7, pp. 1114-1121, 2013 Navneet Rathour Ashima Singh
67 Design and Deployment of Workflows in Cloud Environment IJCA Vol No: 51 Issue 11 pp:9-15, August 2012 Anju Bala and Inderveer Chana
68 Autonomic Data Replication in Cloud Environment IJECSE, Vol.2, page no: 459-464, Jan,2013 Dhananjya Gupta, Anju Bala
69 Autonomic Fault Tolerant Framework for Web Applications IJCST Vol. 4, Issue 2,pp: 528-533 April - June 2013 Dhananjya Gupta, Anju Bala
70 An Emerging approach towards Clone Detection: Metric based Approach on byte code. International Journal of Advance Research in Computer Science and Software Engineering, Vol 3, pp:881-888, May 2013 Kanika Raheja and Rajkumar Tekchandani
71 Evaluation of Flow Graph and Dependence Graphs for Program Representation International Journal of Computer Applications, Vol. 56, Issue.14, pp. 18-23, October 2012 Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh
72 Literature Analysis on Model based Slicing International Journal of Computer Applications, Vol. 70, Issue.16, pp. 45-51, May 2013 Rupinder Singh, Vinay Arora
73 Technique for Extracting Subpart from UML Sequence Diagram International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, pp. 593-596, June 2013 Rupinder Singh, Vinay Arora
74 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012. Ashutosh Mishra and Vinayak Srivastava
75 Extracting a knowledge from source code comprehension using data mining methods   Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012 Ashutosh Mishra and Vinayak Srivastava  
76 Intelligent Computing Methods for Software Maintenance: a Review   Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012 Ashutosh Mishra and Vinayak Srivastava
77 Data mining methods for     Program Comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. Ashutosh Mishra and Vinayak Srivastava  
78 Use of Semantic Relatedness for Intelligent Access to Cultural Information International Journal of Computer Applications, Volume 64 – No. 15, February 2013,                    pp. 21-28 Harkiran Kaur,          Dr. Seema Bawa
79 Creating Digital Archives of Ancient Scriptures using CAPTCHAs International Journal of Computer Applications, Volume 64 – No. 15, February 2013, pp. 29-37 Harkiran Kaur,          Dr. Seema Bawa

Year 2017-21 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor

1.       

Munish Kumar, R. K. Sharma and M. K. Jindal

Offline Handwritten Gurmukhi Character Recognition: Analytical Study of different Transformations

Proceedings of the National Academy of Sciences, India Section A: Physical Sciences

2017

0.179

2.       

Pankaj Garg, Singara Singh Kasana and Geeta Kasana

Block Based Reversible Data Hiding Using Histogram Shifting and a Modulus operator for Digital Images

Journal of Circuits, Systems and Computers

2017

0.308

3.       

Nitin goyal, M Dave, A K Verma

Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks

National Academy of Sciences, India Section A: Physical Sciences

2017

0.39

4.       

Dilbag Singh, Deepak Garg and HS Pannu

Efficient Landsat image fusion using fuzzy and stationary discrete wavelet transform

Imaging Science Journal
Taylor and Francis

2017

0.45

5.       

Sharma V. & Kumar R.

Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs

Computing and Informatics

2017

0.488

6.       

Rajiv Kumar, Abhijit Mukherjee and V. P. Singh

EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm"

International Journal of Ad Hoc and Ubiquitous Computing

2017

0.493

7.       

Ashok Kumar, Anju Sharma, and Rajesh Kumar

Energy Aware Resource Allocation For Clouds Using Two Level Ant Colony Optimization

Computing and Informatics

2017

0.504

8.       

Ashok Kumar, Anju Sharma, and Rajesh  Kumar

Equal: Energy And Qos Aware Resource   Allocation Approach For Clouds

Computing and Informatics

2017

0.504

9.       

Nishtha Hooda, Seema Bawa, Prashant Singh Rana

T-Ensemble approach for Drug Toxicity Prediction

International Journal of Computer Science and Information Security

2017

0.519

10.   

Vaibhav Agarwal, Parteek Kumar

A public platform for developing language-independent applications.

Digital Scholarship in the Humanities

2017

0.525

11.   

Mohd Naseem, Chiranjeev Kumar

QSLB: Queue Size based single path load balancing routing protocol for mobile ad hoc networks

International Journal of Ad Hoc and Ubiquitous Computing

2017

0.6

12.   

Himanshu Jindal, Singara Singh, Sharad Saxena

Underwater Pipelines Panoramic Image Transmission and Refinement using Acoustic Sensors

International Journal of Wavelets, Multiresolution and Information Processing

2017

0.6

13.   

Himanshu Jindal, Sharad Saxena and Singara Singh Kasana

Sewage Water Quality Monitoring Framework using Multi-parametric Sensors

Wireless Personal Communications

2017

0.701

14.   

Nidhi Kalra and Ajay Kumar

Deterministic Deep Pushdown Transducer and its Parallel Version

The Computer Journal

2017

0.711

15.   

Rajiv Kumar, Khushneet Jindal 

A novel shape-based character segmentation method for Devanagari script.

Arabian Journal for Science and Engineering.

2017

0.728

16.   

Ramnik Singh, A K Verma

Efficient image transfer over WSN using cross layer architecture

Optik-International Journal for Light and Electron Optics, DOI information

2017

0.742

17.   

Geeta Kasana and Singara Singh Kasana

Reference based semi-blind image watermarking scheme in wavelet Domain

International Journal of Light and Electron Optics.

2017

0.742

18.   

Sukhpal Singh, Inderveer Chana and Rajkumar Buyya

IoT based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India

Journal of Organizational and End User Computing (JOEUC)

2017

0.759

19.   

Dilbag Singh and Vijay Kumar

Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter

IET Computer Vision

2017

0.878

20.   

R. Ramkumar and Raman Singh

Key Management using Chebyshev Polynomials for Mobile Ad Hoc Networks

China Communications, Accepted for publication.

2017

0.903

21.   

Vishal Sharma, Rajesh Kumar

Cooperative Network Frameworks and Network Models For Flying Ad Hoc Networks: A Survey

Concurrency Control and Practices

2017

0.942

22.   

Nishant Gupta, Shikhar Malhotra, Naman Ahuja, Anju Bala and Gurleen Kaur

Intelligent Heart Disease Prediction in Cloud Environment through Ensembling.

Expert System

2017

0.947

23.   

Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen

Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network

Wireless Personal Communications 93(2)

2017

0.951

24.   

Vinod Kumar Bhalla, Neeraj Kumar

An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks

Wireless Personal Communications

2017

0.97

25.   

Sahil Garg, Shalini Batra

A Novel Ensemble Technique for Anomaly Detection

International Journal of Communication System

2017

1.006

26.   

Himanshu Jindal, Sharad Saxena and Singara Singh Kasana

A Sustainable Multi-Parametric Sensors Network Topology for River Water Quality Monitoring

Wireless Networks

2017

1.006

27.   

Himanshu Jindal, Sharad Saxena, Singara Singh

Triangular Pyramidal Topology to Measure Temporal and Spatial Variations in Shallow River Water using Ad-hoc Sensors Network

Ad Hoc & Sensor Wireless Networks

2017

1.034

28.   

Ashish Gridhar and Vijay Kumar

A Comprehensive Survey of 3D Image Steganography Techniques

IET Image Processing

2017

1.044

29.   

Ashish Girdhar, Vijay Kumar

Comprehensive survey of 3D image
steganography techniques

IET Image Processing

2017

1.044

30.   

Bharti Saneja and Rinkle Rani

An Efficient Approach for Outlier Detection in Big Sensor Data of Healthcare

International Journal of Communication Systems, Wiley

2017

1.06

31.   

An efficient energy-aware predictive clustering approach for vehicular ad hoc networks

An efficient energy-aware predictive clustering approach for vehicular ad hoc networks

Int. J. Communication Systems 30(2)

2017

1.066

32.   

Monika Bharti, Rajesh Kumar, Sharad Saxena

Clustering-based resource discovery on Internet-of-Things

International Journal of Communication Systems, Wiley

2017

1.066

33.   

Vishal Sharma, Kathiravan Srinivasan, Rajesh Kumar, Han-Chieh Chao, Kai-Lung Hua

Efficient Cooperative Relaying In Flying Ad Hoc Networks Using Fuzzy-Bee Colony Optimization

Journal of Supercomputing

2017

1.088

34.   

Sujata Rani, Parteek Kumar

A Sentiment Analysis System to Improve Teaching and Learning

IEEE Computer 50.5

2017

1.115

35.   

Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks

Int. Journal of Network Management 27(3)

2017

1.118

36.   

Priyanka Vashisht, Anju Sharma, Rajesh Kumar

Strategies For Replica Consistency In Data Grid – A Comprehensive Survey

Concurrency and Computation: Practice and Experience

2017

1.133

37.   

Chandan Singh, Ashutosh Aggarwal, Sukhjeet K. Ranade

A new convolution model for the fast computation of Zernike moments

International Journal of Electronics and Communications

2017

1.147

38.   

Divya Pandov, Rinkle Rani, Shivani Goel

Correlation Clustering Methodologies and their Fundamental Results

Experts Systems, Wiley

2017

1.18

39.   

Megha, Shivani Goel and Ajay Kumar

Improving quality of software product line by analysing inconsistencies in feature models using an ontological rule‐based approach

Expert Systems

2017

1.18

40.   

K. K. Mishra, Ashish Tripathi, Shailesh Tiwari and Nitin Saxena

Evolution based memetic algorithm and its application in software cost estimation

Journal of Intelligent & Fuzzy Systems

2017

1.261

41.   

Isha Kansal and Singara Singh Kasana

Weighted Image De-fogging using Luminance Dark Prior

Journal of Modern Optics

2017

1.267

42.   

Tarunpreet Bhatia and A. K. Verma

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues.

The Journal of Supercomputing

2017

1.32

43.   

Dilbag Singh and Vijay Kumar

Modified Gain Intervention Filter based Dehazing Technique

Journal of Modern Optics

2017

1.328

44.   

Roopam Bamal and Singhara Singh Kasana

Slantlet based Hybrid Watermarking Technique for Medical Images

Multimedia Tools and Applications

2017

1.331

45.   

Shruti Saxena, Shreelekha Pandey, Pritee Khanna

A semi-supervised domain adaptation assembling approach for image classification

Pattern Analysis and Applications

2017

1.352

46.   

Tarunpreet Bhatia and A.K. Verma

Cryptanalysis and Improvement of Certificateless Proxy Signcryption Scheme for E-Prescription System in Mobile Cloud Computing

Annals of Telecommunications

2017

1.4

47.   

Sandeep Kumar, Niyati Baliyan, and Shriya Sukalikar

Ontology Cohesion and Coupling Metrics

International Journal on Semantic Web and Information Systems

2017

1.5

48.   

Chandan Singh, Ashutosh Aggarwal

An Efficient and Robust Multi-Frame Image Super-Resolution Reconstruction Using Orthogonal Fourier-Mellin Moments

NA

2017

1.526

49.   

Shivendra Shivani

“Multi Secret Sharing with Unexpanded Meaningful Shares”

Multimedia tools and applications

2017

1.53

50.   

Shivendra Shivani

“VMVC: Verifiable Multitone Visual Cryptography”

Multimedia tools and applications

2017

1.53

51.   

Shivendra Shivani, Suneeta Agarwal

“XOR based Continuous tone Multi Secret Sharing Scheme for Store and Forward Telemedicine”,

Multimedia tools and applications

2017

1.53

52.   

Vijay Kumar and Dinesh Kumar

A Modified DWT-based Image Steganography Technique

2017 Multimedia Tools and Applications

2017

1.53

53.   

Raman Singh, Harish Kumar, R.K. Singla, K.R. Ramkumar

Internet Attacks and Intrusion Detection System: Study and Review

Online Information Review

2017

1.534

54.   

Amit Dua, Neeraj Kumar, Seema Bawa

ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks

Telecommunication Systems 64(3)

2017

1.542

55.   

Sahil Garg, Shalini Batra

Fuzzified cuckoo based clustering technique for network anomaly detection

Computers and Electrical Engineering,

2017

1.57

56.   

Chandan Singh, Ashutosh Aggarwal

Single-image super-resolution using orthogonal rotation invariant moments

Computers & Electrical Engineering

2017

1.57

57.   

Vishal Sharma, Hsing Chung Chen, Rajesh Kumar

Driver Behaviour Detection and Vehicle Rating Using Multi-UAV Coordinated Vehicular Networks

Journal of Computer and System Sciences

2017

1.583

58.   

Sukhpal Singh, Rajkumar Buyya, Inderveer Chana, Maninder Singh and Ajith Abraham

BULLET: Particle Swarm Optimization based Scheduling Technique for Provisioned Cloud Resources

Journal of Network and Systems Management

2017

1.588

59.   

Vinay Arora, Rajesh Bhatia, Maninder Singh

Synthesizing test scenarios in UML activity diagram using a Bio-inspired approach

Computer Languages, Systems & Structures

2017

1.615

60.   

Sukhpal Singh, Inderveer Chana and Maninder Singh

The Journey of QoS-Aware Autonomic Cloud Computing

IT Professional

2017

1.661

61.   

Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud

Applied Mathematics and Computation

2017

1.738

62.   

Ashok Kumar, Pradhan, SayanGhose, Tanmay de

Multicast dynamic traffic grooming using bin packing method in WDM mesh networks

Optical Switching and Networking, 23

2017

1.86

63.   

Sangita Roy, Ashok Singh Sairam

Distributed Star Coloring of Network for IP Traceback

International Journal of Information Security, Springer, vol. 9,

2017

1.915

64.   

Rajiv Kumar, Abhijit Mukherjee and V. P. Singh

Community Sensor Network for Monitoring Road Roughness Using Smartphones

Journal of Computing in Civil Engineering

2017

1.92

65.   

Rajiv Kumar, Abhijit Mukherjee and V. P. Singh

Traffic noise mapping of Indian roads through smartphone user community participation

Journal of Computing in Civil Engineering

2017

1.98

66.   

Amit Dua, Neeraj Kumar, Seema Bawa

Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks

Journal of Real-Time Image Processing

2017

2.01

67.   

Nidhi Jain Kansal and Inderveer Chana

An Empirical Evaluation of Energy-aware Load Balancing Technique for Cloud Data Center

Cluster Computing

2017

2.04

68.   

Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya

CHOPPER: An Intelligent QoS-aware Autonomic Resource Management Approach for Cloud Computing

Cluster Computing

2017

2.04

69.   

Hari Singh and Seema Bawa

A MapReduce Based Scalable Discovery and Indexing of Structured Big Data

Future Generation Computer System The International Journal of Grid Computing and eScience

2017

2.1

70.   

Rajanpreet Kaur, Sarbjeet Singh

Fuzzy rule-based expert system for determining trustworthiness of cloud service providers

International Journal of Fuzzy Systems, 19,

2017

2.198

71.   

Libing Wu, Jing Wang, Neeraj Kumar, Debiao He

Secure public data auditing scheme for cloud storage in smart city

Personal and Ubiquitous Computing

2017

2.395

72.   

Megha Bhushan, Shivani Goel, Karamjit Kaur

Analyzing inconsistencies in software product lines using an ontological rule-based approach

Journal of Systems and Software,

2017

2.44

73.   

Sharma V, Kumar R, Reina DG

HMADSO: a novel hill Myna and desert Sparrow optimization algorithm for cooperative rendezvous and task allocation in FANETs

Soft Computing

2017

2.472

74.   

Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi

Multi-objective Particle Swarm Optimization based Adaptive Neuro-Fuzzy Inference System for Benzene Monitoring

Neural Computing and Applications

2017

2.5

75.   

Jasmeet Singh, Vishal Gupta

A systematic review of text stemming techniques

Artificial Intelligence

2017

2.627

76.   

Vijay Kumar and Dinesh Kumar

An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems

Advances in Engineering Software

2017

3

77.   

Gaurav Dhiman and Vijay Kumar

Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications

Advances in Engineering Software

2017

3

78.   

Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks

IEEE Access

2017

3.244

79.   

Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices

IEEE Access

2017

3.244

80.   

Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems

IEEE Access 5: 

2017

3.244

81.   

Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services

IEEE Access

2017

3.244

82.   

Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

IEEE Access 5: 

2017

3.244

83.   

Garg, Neenu, and Seema Bawa

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

Journal of Network and Computer Applications

2017

3.331

84.   

Vishal Sharma, Ilsun You, Ravinder Kumar

Resource-based mobility management for video users in 5G using catalytic computing

Computer Communications

2017

3.338

85.   

Jasmeet Singh, Vishal Gupta

An Efficient Corpus-Based Stemmer

Cognitive Computation

2017

3.441

86.   

Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee

Anonymous Authentication for Wireless Body Area Networks With Provable Security

IEEE Systems Journal

2017

3.882

87.   

Neeraj Kumar, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues, Seungmin Rho

Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid

IEEE Systems Journal 11(1)

2017

3.882

88.   

Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, Guangjie Han

Cooperative Strategies for Challenged Networks and Applications: A Survey

IEEE Systems Journal

2017

3.882

89.   

Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System

IEEE Trans. Information Forensics and Security12(2)

2017

4.332

90.   

Divya Pandov, Rinkle Rani , Shivani Goel

Local Graph Based Correlation Clustering

Knowledge-Based Systems, Elsevier

2017

4.5

91.   

Sharma V., Kumar R. & Kumar R.

QUAT-DEM: Quaternion-DEMATEL based neural model for mutual coordination between UAVs

Information Sciences

2017

4.832

92.   

Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, Laurence T. Yang

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries

IEEE Transactions on Smart Grid

2017

6.645

93.   

Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment

IEEE Transactions on Industrial Informatics

2017

6.764

94.   

Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.

IEEE Internet of Things Journal

2017

7.596

95.   

Kuljeet Kaur, Tanya Dhand, Neeraj Kumar, Sherali Zeadally

Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers

IEEE Wireless Commun. 24(3)

2017

8.972

96.   

Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues

A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities

IEEE Communications Magazine 55(3)

2017

10.435

97.   

Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Joel J. P. C. Rodrigues, Alexey V. Vinel

Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach

IEEE Communications Magazine

2017

10.435

98.   

Rajat Chaudhary, Neeraj Kumar, Sherali Zeadally

Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges

IEEE Communications Magazine

2017

10.435

99.   

Palika Chopra, R. K. Sharma, Maneek Kumar, and Tanuj Chopra

Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete

Advances in Civil Engineering

2017

1.176

100.           

Tanuj Chopra, Manoranjan Parida, Naveen Kwatar, and Palika Chopra

Development of Pavement Distress Deterioration Prediction Models for Urban Road Network using Genetic Programming

Advances in Civil Engineering

2017

1.176

101.           

Munish Kumar, M. K. Jindal, R. K. Sharma and S. R. Jindal

Offline Handwritten Pre-Segmented Character Recognition of Gurmukhi Script

Machine Graphics and Vision

2018

0.11

102.           

Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal

Offline Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques

National Academy Science Letters

2018

0.331

103.           

Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal

Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques

National Academy Science Letters

2018

0.369

104.           

Vaibhav Agarwal, Parteek Kumar

UNLization of Punjabi text for natural language processing applications

Sadhana

2018

0.465

105.           

Nishtha Hooda, Seema Bawa, and Prashant Singh Rana.

Fraudulent Firm classification: A case study of an external audit

Applied Artificial Intelligence

2018

0.505

106.           

Isha Kansal and Singara Singh Kasana

Fusion based Image De-fogging using Dual Tree Complex Wavelet Transform

International Journal of Wavelets, Multiresolution and Information Processing

2018

0.523

107.           

Sonal Kukreja, Singara Singh Kasana and Geeta Kasana

Adaptive Reversible Data Hiding Scheme for Digital Images based on Histogram Shifting

Computing and Informatics

2018

0.524

108.           

Amritpal Singh, Shalini Batra

Fingerprint Based Duplicate Detection in Streamed Data

Computing and Infoarmatics

2018

0.524

109.           

Amritpal Singh, Shalini Batra

Streamed Data Analysis Using Adaptable Bloom Filter

Computing and Infoarmatics

2018

0.524

110.           

Neeraj Jain and Singara Singh Kasana

High Capacity Reversible Data Hiding using Modified PVO Approach

Journal of Circuits, Systems, and Computer

2018

0.595

111.           

Manjit Kaur and Vijay Kumar

Fourier-Mellin moments based intertwining map for image encryption.

Modern Physics Letters B

2018

0.617

112.           

Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana

A Novel Framework for Reliable Network Prediction of Small Scale Wireless Sensor Networks (SSWSNs)

Fundamenta Informaticae

2018

0.687

113.           

Y. Pathak, K.V. Arya and S. Tiwari

Low-dose CT image reconstruction using gain intervention based dictionary learning

Modern Physics Letter-B, World Scientific

2018

0.687

114.           

Harpreet Singh, Prashant Singh Rana, and Urvinder Singh

Prediction of drug synergy in cancer using ensemble-based machine learning techniques.

World Scientific-Modern Physics Letters B

2018

0.69

115.           

Suman Bala, Gaurav Sharma, Anil Kumar Verma

Impersonation attack on CertificateLess key agreement protocol

International Journal of Ad Hoc and Ubiquitous Computing

2018

0.705

116.           

Munish Kumar, M. K. Jindal and R. K. Sharma

A Novel Handwriting Grading System Using Gurmukhi Characters

International Arab Journal of Information Technology

2018

0.724

117.           

H Singh, PS Rana and U Singh

Fraudulent Firm Classification: A Case Study of an

Modern Physics Letters B

2018

0.73

118.           

Rupinderdeep Kaur, R. K. Sharma and Parteek Kumar

An Efficient Speaker Recognition using Quantum Neural Network

Modern Physics Letters B

2018

0.731

119.           

Upasna Joshi and Rajiv Sharma

An optimal data aggregation technique for physics-based applications

Modern Physics Letters B

2018

0.731

120.           

Y. Pathak, K.V. Arya and S. Tiwari

Fourth Order Partial Differential Equations Based Anisotropic Diffusion Model for Low-Dose CT Images

Modern Physics Letter-B

2018

0.731

121.           

Y. Pathak, K.V. Arya and S. Tiwari

Performance Evaluation of 2D Face Recognition Techniques Under Image Processing Attacks

Modern Physics Letters B

2018

0.731

122.           

Karun Verma, and R. K. Sharma

An Efficient Writing-Zone Identification Technique for Online Handwritten Gurmukhi Character Recognition

Proceedings of the National Academy of Sciences, India Section A: Physical Sciences

2018

0.754

123.           

Munish Kumar, R. K. Sharma, M. K. Jindal and S. R. Jindal

A Novel Framework for Writer Identification Based on Gurmukhi Characters

Sadhana

2018

0.769

124.           

Ajay Kumar, Nidhi Kalra, Sunita Garhwal

Error tolerance for the recognition of faulty strings in a regulated grammar using fuzzy sets

Sadhana

2018

0.769

125.           

Harjeet Singh, R. K. Sharma and V. P. Singh

Recognition of Online Unconstrained Handwritten Gurmukhi Characters based on Finite State Automata

Sadhana-Academy Proceedings in Engineering Sciences

2018

0.769

126.           

Sachendra Singh Chauhan, Shalini Batra

A Parallel Computational Approach for Similarity Search using Bloom Filters

Computational Intelligence

2018

0.776

127.           

Jain, Khushboo, and Husanbir Singh Pannu.

Autonomic point cloud-based surface reconstruction using SVR.

The Imaging Science Journal

2018

0.8

128.           

Jain, Khushboo, Husanbir Singh Pannu, Avleen Malhi, Kuldeep Singh

Efficient disparity estimation from stereo images using hybrid-guided image filter

The Imaging Science Journal

2018

0.8

129.           

Sitender and Seema Bawa

Sansunl: A sanskrit to unl enconverter system

IETE Journal of Research

2018

0.829

130.           

N Hooda, PS Rana and S Bawa,

of Small Scale Wireless Sensor Networks (SSWSNs)

Applied Artificial Intelligence,

2018

0.99

131.           

Kuldeep Singh, Anil Kumar Verma

FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad hoc Networks (FANETs)

Adhoc and Sensor Wireless Networks

2018

1.034

132.           

Sukhvir Kaur, Shreelekha Pandey, Shivani Goel

Semi-automatic leaf disease detection and classification system for soybean culture

IET Image Processing

2018

1.044

133.           

Kuldeep Singh, Anil Kumar Verma

A fuzzy‐based trust model for flying ad hoc networks (FANETs)

International Jourmal of Communication Systems

2018

1.066

134.           

Manjit Kaur and Vijay Kumar

An efficient image encryption method based on improved Lorenz chaotic system.

Electronics Letters

2018

1.155

135.           

Monika Bharti , Rajesh Kumar,  Sharad Saxena

Context-Aware Search Optimization Framework on Internet-of- Things

Concurrency and Computation: Practice and Experience

2018

1.167

136.           

Jyotsna Yadav, Navin Rajpal, Rajesh Mehta

A new illumination normalisation framework via homomorphic filtering and reflectance ratio in DWT domain for face recognition

Journal of Intelligent and Fuzzy Systems

2018

1.2

137.           

J Kaur, PS Rana and AK Verma,

A Novel Framework for Reliable Network Prediction

Fundamenta Informaticae

2018

1.2

138.           

Seemu Sharma, Seema Bawa, and Hitashi Lomash

Approaches in cultural computing: A survey and inference from social computing with dynamics of mind

Wireless Personal Communications

2018

1.2

139.           

Kaur, Parminder, and Husanbir Singh Pannu

Comprehensive review of continuous and discrete orthogonal moments in biometrics

International Journal of Computer Mathematics

2018

1.2

140.           

Kirti Dhiman and Singara Singh Kasana

Sharing Two True Color Images using (3,3) Extended Visual Cryptography Technique

Journal of Modern Optis

2018

1.267

141.           

Palika Chopra, R. K. Sharma and Maneek Kumar

Prediction of Compressive Strength of Concrete using Artificial Neural Network and Genetic Programming

Advances in Materials Science and Engineering

2018

1.299

142.           

Ravneet Kaur, Inderveer Chana and Jhilik Bhattacharya

Data Deduplication Techniques for Efficient Cloud Storage Management - A Systematic Review

The Journal of Supercomputing

2018

1.326

143.           

H Singh, PS Rana and U Singh

External Audit

IET Systems Biology

2018

1.39

144.           

Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi

Improved Particle Swarm Optimization Based Adaptive Neuro‐Fuzzy Inference System for Benzene Detection

CLEAN-soil, air, water

2018

1.47

145.           

Ashish Girdhar and Vijay Kumar

A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences

Multimedia Tools and Applications

2018

1.53

146.           

Dilbag Singh and Vijay Kumar

Comprehensive Survey on Haze Removal Techniques.

Multimedia Tools and Applications

2018

1.53

147.           

Y. Pathak, K.V. Arya and S. Tiwari

Feature Selection for Image Steganalysis using Levy Flight-based Grey Wolf Optimization

Multimedia Tools and Applications, Springer

2018

1.53

148.           

Simar Preet Singh, Anand Nayyar, Rajesh Kumar, Anju Sharma

Fog Computing: From Architecture to Edge Computing and Big Data Processing

The Journal of Supercomputing

2018

1.532

149.           

Tarunpreet Bhatia, Anil Kumar Verma, Gaurav Sharma

Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud

Transactions on Emerging Telecommunications Technologies

2018

1.535

150.           

Kalpna Guleria, Anil Kumar Verma

Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks

Wireless Networks

2018

1.548

151.           

Libing Wu and                Yubo Zhang and                Mimi Ma and                Neeraj Kumar and                Debiao He

Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things

Annals of Telecommunications

2018

1.552

152.           

Dilbag Singh and Vijay Kumar

A novel dehazing model for remote sensing images.

Computer & Electrical Engineering

2018

1.57

153.           

Ajay Kumar and Seema Bawa.

Generalized ant colony optimizer: swarm-based meta-heuristic algorithm for cloud services execution.

Computing

2018

1.654

154.           

Isha Kansal and Singara Singh Kasana

Minimum Preserving Subsampling based Fast Image De-fogging

Journal of Modern Optics

2018

1.657

155.           

Anika Gupta ; Deepak Garg ; Parteek Kumar

Analysis of Students' Ratings of Teaching Quality to Understand the Role of Gender and Socio-Economic Diversity in Higher Education

IEEE Transactions on Education

2018

1.727

156.           

Aaisha Makkar and                Neeraj Kumar

User behavior analysis-based smart energy management for webpage ranking: Learning automata-based solution

Sustainable Computing: Informatics and Systems

2018

1.8

157.           

Gagangeet Singh Aujla and                Neeraj Kumar

SDN-based energy management scheme for sustainability of data centers: An analysis on renewable energy sources and electric vehicles participation

Journal of Parallel and Distributed Computing

2018

1.819

158.           

Shruti Sachdeva, Tarunpreet Bhatia, Anil Kumar Verma

GIS-based evolutionary optimized Gradient Boosted Decision Trees for forest fire susceptibility mapping

Natural Hazards

2018

1.833

159.           

Rupali Bhardwaj, Ashutosh Aggarwal

Hiding clinical information in medical images: An encrypted dual-image reversible data hiding algorithm with base-3 numeral framework

OPTIK

2018

1.914

160.           

Tarandeep Kaur and Inderveer Chana

GreenSched: An Intelligent Energy Aware Scheduling For Deadline-and- Budget Constrained Cloud Tasks

Simulation Modelling Practice and Theory

2018

1.954

161.           

v. Gagandeep Kaur, Singara Singh Kasana and M. K. Sharma

An Efficient Watermarking Scheme for Enhanced High Efficiency Video Coding/H.265

Multimedia Tools and Applications

2018

2.101

162.           

Simranjit Singh and Singara Singh Kasana

Efficient Classification of the Hyperspectral Images using Deep Learning

Multimedia Tools and Applications

2018

2.101

163.           

Sonal Kukreja, Singara Singh Kasana and Geeta Kasana

Histogram based Multilevel Reversible Data Hiding Scheme using Simple and Absolute Difference Images

Multimedia Tools and Applications

2018

2.101

164.           

Shivendra Shivani and Shailendra Tiwari

Simulation of Intelligent Target Hitting in Obstructed Path using Physical Body Animation and Genetic Algorithm

Multimedia Tools and Applications

2018

2.101

165.           

Sravani Challa and                Ashok Kumar Das and                Vanga Odelu and                Neeraj Kumar and                Saru Kumari and                Muhammad Khurram Khan and                Athanasios V. Vasilakos

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Computers & Electrical Engineering

2018

2.189

166.           

Kirti Dhiman and Singara Singh Kasana

Extended Visual Cryptography Techniques for Color Images

Computers and Electrical Engineering

2018

2.189

167.           

Aparna Kumari and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar

Fog computing for Healthcare 4.0 environment: Opportunities and challenges

Computers & Electrical Engineering

2018

2.189

168.           

Amandeep singh bhatia, Ajay Kumar

Quantifying matrix product state

Quantum Information Processing

2018

2.2

169.           

Mario W. L. Moreira, Joel J. P. C. Rodrigues, Neeraj Kumar, Jalal Al-Muhtadi, Valery Korotaev

Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care.

Journal of Medical Systems

2018

2.456

170.           

Mario W. L. Moreira and                Joel J. P. C. Rodrigues and                Neeraj Kumar and                Jalal Al-Muhtadi and                Valeriy Korotaev

Evolutionary radial basis function network for gestational diabetes data analytics

Journal of Computational Science

2018

2.502

171.           

Vishal Sharma, Rajesh Kumar, Daniel Gutierrez Reina

HMADSO: A Novel Hill Myna and Desert Sparrow Optimization Algorithm for Cooperative Rendezvous and Task Allocation in FANETs

Soft Computing

2018

2.784

172.           

Y Kumar, A Aggarwal, S Tiwari, K Singh

An efficient and robust approach for biomedical image retrieval using Zernike moments

Biomedical Signal Processing and Control

2018

2.943

173.           

Gagangeet Singh Aujla and                Anish Jindal and                Neeraj Kumar

EVaaS: Electric vehicle-as-a-service for energy trading in SDN-enabled smart transportation system

Computer Networks

2018

3.03

174.           

Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks

 IEEE Access

2018

3.244

175.           

Nishtha Hooda, Seema Bawa, and Prashant Singh Rana.

B2fse framework for high dimensional imbalanced data: A case study for drug toxicity prediction.

Neurocomputing

2018

3.317

176.           

Vishal Sharma, Ravinder Kumar and Neeraj Kumar

DPTR: Distributed priority tree-based routing protocol for FANETs

Computer Communications

2018

3.338

177.           

Aman Sharma and Rinkle Rani

BE-DTI’: Ensemble Framework for Drug Target Interaction Prediction using Dimensionality Reduction and Active Learning

Computer Methods and Programs in Biomedicine

2018

3.424

178.           

Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks

Journal of Network and Computer Applications

2018

3.5

179.           

Kenndy Njenga, Lalit Garg, Amit Kumar Bhardwaj, Vijay Prakash, and Seema Bawa.

The cloud computing adoption in higher learning institutions in kenya: Hindering factors and recommendations for the way forward

Telematics and Informatics

2018

3.789

180.           

Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat

Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud

 IEEE Trans. Emerging Topics Comput.

2018

3.826

181.           

Vishal Sharma, Ravinder Kumar, Wen-Huang Cheng, Mohammed Atiquzzaman, Kathiravan Srinivasan, Albert Zomaya

NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks

IEEE Transactions on Knowledge and Data Engineering

2018

3.857

182.           

Devinder Kaur and                Gagangeet Singh Aujla and                Neeraj Kumar and                Albert Y. Zomaya and                Charith Perera and                Rajiv Ranjan

Tensor-Based Big Data Management Scheme for Dimensionality Reduction Problem in Smart Grid Systems: SDN Perspective

IEEE Transactions on Knowledge and Data Engineering

2018

3.857

183.           

Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

 IEEE Systems Journal

2018

3.882

184.           

Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

Future Generation Computer Systems

2018

3.997

185.           

Amit Dua, Neeraj Kumar, Ashok Kumar Das, Willy Susilo

Secure Message Communication Protocol Among Vehicles in Smart City

IEEE Transactions on Vehicular Technology

2018

4.066

186.           

Shubham Goel and Ravinder Kumar

Folksonomy-based user profile enrichment using clustering and community recommended tags in multiple levels

Neurocomputing

2018

4.072

187.           

Yi Yang and                Debiao He and                Neeraj Kumar and                Sherali Zeadally

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks

IEEE Access

2018

4.098

188.           

Durbadal Chattaraj and                Monalisa Sarma and                Ashok Kumar Das and                Neeraj Kumar and                Joel J. P. C. Rodrigues and                Youngho Park

HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform

IEEE Access

2018

4.098

189.           

Debiao He and                Kim-Kwang Raymond Choo and                Neeraj Kumar and                Aniello Castiglione

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies

IEEE Access

2018

4.098

190.           

Mohammad Wazid and                Ashok Kumar Das and                Neeraj Kumar and                Mauro Conti and                Athanasios V. Vasilakos

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

IEEE Journal of Biomedical and Health Informatics

2018

4.217

191.           

Gaurav Dhiman and Vijay Kumar

Multi-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems.

Knowledge-Based Systems

2018

4.529

192.           

Harjeet Singh, R. K. Sharma and V. P. Singh

Efficient Zone Identification Approach for the Recognition of Online Handwritten Gurmukhi Script

Neural Computing and Applications

2018

4.664

193.           

Sukhvir Kaur, Shreelekha Pandey, Shivani Goel

Plants Disease Identification and Classification Through Leaf Images: A Survey

Archives of Computational Methods in Engineering

2018

5.061

194.           

Munish Kumar, M. K. Jindal and R. K. Sharma

Character Recognition for Non-Indic and Indic Scripts: a Survey

Artificial Intelligence Review

2018

5.095

195.           

Aparna Kumari and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and                Michele Maasberg and                Kim{-Kwang Raymond Choo

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

Journal of Network and Computer Applications

2018

5.273

196.           

Harcharan Jit Singh and Seema Bawa

Scalable metadata management techniques for ultra-large distributed storage systems: a systematic review

ACM Computing Surveys

2018

5.55

197.           

Harmanjeet Kaur, Neeraj Kumar, Shalini Batra

An efficient multi party scheme for PPCF for health care system

Future Generation Computer systems

2018

5.768

198.           

Harmanjeet Kaur and                Neeraj Kumar and                Shalini Batra

An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system

Future Generation Computer Systems

2018

5.768

199.           

Amritpal Singh, Sahil Garg, Neeraj Kumar Shalini Batra, J.P.C. Rodrigues

Bloom Filter based Optimization Scheme for Massive Data Handling in IoT Environment

Future Generation Computer systems

2018

5.768

200.           

Shubham Goel and Ravinder Kumar

Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods

Future Generation Computer Systems

2018

5.768

201.           

Amritpal Singh, Shalini Batra

Ensemble based spam detection in social IoT using probabilistic data structures

Future Generation Computer systems

2018

5.768

202.           

Gagangeet Singh Aujla and                Neeraj Kumar

MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge–cloud environment

Future Generation Computer Systems

2018

5.768

203.           

Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems

IEEE Trans. Industrial Informatics 

2018

6.764

204.           

Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan

Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective

IEEE Trans. Industrial Informatics 

2018

6.764

205.           

Sahil Garg, Amritpal Singh, Neeraj Kumar Shalini Batra, Laurence T. Yang

UAVs-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles

IEEE Network

2018

7.5

206.           

Aparna Kumari and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and                Michele Maasberg and                Kim{-}Kwang Raymond Choo

SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

IEEE Network

2018

7.503

207.           

Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

 IEEE Internet of Things Journal

2018

7.596

208.           

Puneet Kumar, Sahil Garg, Amritpal Singh, Shalini Batra, Neeraj Kumar, Ilsun You

 MVO-based Two-Dimensional Path Planning Scheme for Providing Quality of Service in UAV Environment

IEEE Internet of Things

2018

9.515

209.           

Ashok Kumar Das and                Mohammad Wazid and                Neeraj Kumar and                Athanasios V. Vasilakos and                Joel J. P. C. Rodrigues

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

IEEE Internet of Things Journal

2018

9.515

210.           

{Prabhjot Singh and                Rasmeet Singh Bali and                Neeraj Kumar and                Ashok Kumar Das and                Alexey V. Vinel and                Laurence T. Yang

Secure Healthcare Data Dissemination Using Vehicle Relay Networks

 IEEE Internet of Things Journal

2018

9.515

211.           

Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena

LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment

IEEE Communications Magazine

2018

10.435

212.           

Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Joel J. P. C. Rodrigues

Optimized Big Data Management across Multi-Cloud Data Centers: Software-Defined-Network-Based Analysis

IEEE Communications Magazine

2018

10.435

213.           

Vishal Sharma, Dushantha Nalin K. Jayakody, Ilsun You, Ravinder Kumar, Jun Li

Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios

IEEE Communications Magazine

2018

10.435

214.           

Rajni Mohana

Temporality Based Sentiment Analysis using Linguistic Rules and Meta- Data

Proceedings of the National Academy of Sciences, India Section A: Physical Sciences

2018

 0.921

215.           

Ajay Kumar and Seema Bawa

 SLA violation costs for dynamic execution of cloud services

Soft Computing

2019

2.784

216.           

Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar

{SURVIVOR:} {A} blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment

Computer Networks

2019

3.03

217.           

Ajay Kumar and Seema Bawa

A comparative review ofmeta-heuristic approaches to optimize the SLA violation costs for dynamic execution of cloud services

Soft Computing

2019

2.784

218.           

Mario W. L. Moreira and                Joel J. P. C. Rodrigues and                Valery Korotaev and                Jalal Al-Muhtadi and                Neeraj Kumar

A Comprehensive Review on Smart Decision Support Systems for Health Care

IEEE Systems Journal

2019

4.463

219.           

Kaur, B., Bhattacharya, J.

A convolutional feature map-based deep network targeted towards traffic detection and classification

Expert Systems with Applications

2019

4.29

220.           

Pavleen Kaur, Ravinder Kumar, and Munish Kumar

A Healthcare Monitoring System Using Machine Learning and Internet of Things (IoT)

Multimedia Tools and Applications

2019

2.101

221.           

Sahil Garg and                Kuljeet Kaur and                Neeraj Kumar and                Georges Kaddoum and                Albert Y. Zomaya and                Rajiv Ranjan

A hybrid deep learning-based model for anomaly detection in cloud datacenter networks

IEEE Transactions on Network and Service Management

2019

4.682

222.           

Ashutosh Aggarwal, Suchita Sharma, Karamjeet Singh, Harpreet Singh, Sunil Kapoor

A new approach for effective retrieval and indexing of medical images

Biomedical Signal Processing and Control

2019

2.943

223.           

Nguyen Xuan Thao, Mumtaz Ali, Le Thi Nhung, Hemant Kumar Gianey, Florentin Smarandache

A new multi-criteria decision making algorithm for medical diagnosis and classification problems using divergence measure of picture fuzzy sets

Journal of Intelligence & Fuzzy System

2019

1.6

224.           

Rajendra Kumar Roul, Kushagr Arora

A nifty review to text summarization-based recommendation system for electronic products

Soft Computing

2019

2.784

225.           

Jasmeet Singh, Vishal Gupta

A novel unsupervised corpus-based stemming technique using lexicon and corpus statistics

Knowledge-Based Systems

2019

5.101

226.           

Soumya Banerjee and                Vanga Odelu and                Ashok Kumar Das and                Jangirala Srinivas and                Neeraj Kumar and                Samiran Chattopadhyay and                Kim-Kwang Raymond Choo

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment

IEEE Internet of Things Journal

2019

9.515

227.           

Ashish Girdhar and Vijay Kumar

A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map

Journal of Ambient Intelligence and Humanized Computing

2019

1.91

228.           

Bharti Saneja and Rinkle Rani

A Scalable Correlation based Approach for Outlier Detection in Wireless Body Sensor Networks

International Journal of Communication Systems

2019

1.278

229.           

Huo Liuwei; Jiang Dingde; Zhu Xiangnan; Yuqing Wang; Zhihan Lv; Surjit Singh

A SDN-based Fine-grained Measurement and Modeling Approach to Vehicular Communication Network Traffic

International Journal of Communication Systems

2019

1.278

230.           

ASM Sanwar Hosen, Saurabh Singh, Vinayagam Mariappan, Maninder Kaur, Gi Hwan Cho

A Secure and Privacy Preserving Partial Deterministic RWP Model to Reduce Overlapping in IoT Sensing Environment

IEEE Access

2019

4.098

231.           

Deepak Gupta and Rinkle Rani

A Study of Big Data Evolution and Research Challenges

Journal of Information Science

2019

2.327

232.           

Sukhandeep Kaur, Seema Bawa and Ravinder Kumar

A survey of mono- and multi-lingual character recognition using deep and shallow architectures: indic and non-indic scripts

Artificial Intelligence Review

2019

5.095

233.           

Qi Feng and                Debiao He and                Sherali Zeadally and                Muhammad Khurram Khan and                Neeraj Kumar

A survey on privacy protection in blockchain system

Journal of Network and Computer Applications

2019

5.273

234.           

Mor, Bhavya, Sunita Garhwal, and Ajay Kumar.

A Systematic Literature Review on Computational Musicology

Archives of Computational Methods in Engineering

2019

7.242

235.           

Harsurinder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi

A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions

ACM Computing Surveys

2019

6.13

236.           

M Rana, S Mittal, G Beig and PS Rana

Activity Assessment of Small Drug Molecules in Estrogen Receptor using Multilevel Prediction Model

Journal of Earth System Science

2019

1.1

237.           

Shyi-Ming Chen, Dipto Barman

Adaptive fuzzy interpolative reasoning based on similarity measures of polygonal fuzzy sets and novel move and transformation techniques

Information Science

2019

5.524

238.           

Shyi-Ming Chen, Dipto Barman

Adaptive weighted fuzzy interpolative reasoning based on representative values and similarity measures of interval type-2 fuzzy sets

Information Science

2019

5.524

239.           

Shyi-Ming Chen, Xin-Yao Zou, Dipto Barman

Adaptive weighted fuzzy rule interpolation based on ranking values and similarity measures of rough-fuzzy sets

Information Sciences

2019

5.524

240.           

Rakeshkumar Vanzara and                Priyanka Sharma and                Haresh S. Bhatt and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and Mohammad S. Obaidat

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks

International Journal of Communication Systems

2019

1.278

241.           

Mimi Ma and                Debiao He and                Huaqun Wang and                Neeraj Kumar and                Kim_Kwang Raymond Choo

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

 IEEE Internet of Things Journal

2019

9.515

242.           

iv. Gagandeep Kaur, Singara Singh Kasana and M. K. Sharma

An Efficient Authentication Scheme for High Efficiency Video Coding/H.265

Multimedia Tools and Applications

2019

2.101

243.           

Shubham Goel, Ravinder Kumar, Munish Kumar, and Vikram Chopra

An Efficient Page Ranking Approach Based on Vector Norms using sNorm(p) Algorithm

Information Processing and Management

2019

3.892

244.           

Malhi, Avleen Kaur, Shalini Batra, and Husanbir Singh Pannu

An Efficient Privacy Preserving Authentication Scheme for Vehicular Communications

Wireless Personal Communications

2019

1.2

245.           

Jyotsna Yadav, Navin Rajpal,Rajesh Mehta

An Improved Illumination Normalization and Robust Feature Extraction Technique for Face Recognition Under Varying Illuminations

Arabian Journal for Science and Engineering

2019

0.994

246.           

Hari Singh and Seema Bawa

An improved integrated grid and mapreduce-hadoop architecture for spatial data: Hilbert tgs r-treebased igsim

Concurrency and Computation: Practice and Experience

2019

1.114

247.           

Huo Liuwei; Jiang Dingde;  Zhihan Lv;  Surjit Singh

An Intelligent Optimization-Based Traffic Information Acquirement Approach to SDN

Computational Intelligence

2019

0.776

248.           

Gurleen Kaur, Anju Bala, Inderveer Chana

An intelligent regressive ensemble approach for predicting resource usage in cloud computing

Journal of Parallel and Distributed Computing

2019

1.819

249.           

Ravindra Kumar, Husanbir Singh Pannu,Avleen Kaur Malhi

Aspect Based SentimentAnalysis using Deep Networks and Stochastic Optimization

Neural Computing andApplications

2019

4.66

250.           

Parashar, Anshu, and Jitender Kumar Chhabra

Assessing Impact of Class Change by Mining Class Associations

The International Arab Journal of Information Technology

2019

0.74

251.           

Xiaoying Jia and                Debiao He and                Neeraj Kumar and                Kim-Kwang Raymond Choo

Authenticated key agreement scheme for fog-driven IoT healthcare system

Wireless Networks

2019

2.405

252.           

Mario W. L. Moreira and Joel J. P. C. Rodrigues and Vasco Furtado and Neeraj Kumar and Valery V. Korotaev

Averaged one-dependence estimators on edge devices for smart pregnancy data analysis

Computers & Electrical Engineering

2019

2.189

253.           

M Goyal, D Khanna, PS Rana, T Khaibullin, E Martynova, S Khaiboullina, A Rizvanov and M Baranwal,

based machine learning techniques

Frontiers in Neurology

2019

2.64

254.           

Rajat Chaudhary and Anish Jindal and Gagangeet Singh Aujla and Shubhani Aggarwal and Neeraj Kumar and Kim-Kwang Raymond Choo

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

Computers & Security

2019

3.062

255.           

Jiang Dingde; Yuqing Wang; Zhihan Lv; Sheng Qi; Surjit Singh

Big Data Analysis-based Network Behavior Insight of Cellular Networks for Industry 4.0 Applications

IEEE Transactions on Industrial Informatics

2019

7.377

256.           

Maninder Kaur, Gurpreet Kaur, Pradip Kumar Sharma, Alireza Jolfaei, Dhananjay Singh

Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home

The Journal of Supercomputing

2019

2.16

257.           

Shubhani Aggarwal and                Rajat Chaudhary and                Gagangeet Singh Aujla and                Neeraj Kumar and                Kim{-}Kwang Raymond Choo and                Albert Y. Zomaya

Blockchain for smart communities: Applications, challenges and opportunities

Journal of Network and Computer Applications

2019

5.273

258.           

Pradip Kumar Sharma and                Neeraj Kumar and                Jong Hyuk Park

Blockchain-Based Distributed Framework for Automotive Industry in a Smart City

IEEE Transactions on Industrial Informatics

2019

7.377

259.           

Xinghua Li and                Yunwei Wang and                Pandi Vijayakumar and                Debiao He and                Neeraj Kumar and                Jianfeng Ma

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network

IEEE Transactions on Vehicular Technology

2019

5.339

260.           

Seemu Sharma, Seema Bawa

CBDR: An efficient storage repository for cultural big data

Digital Scholarship in the Humanities

2019

 0.592

261.           

Aman Sharma and Rinkle Rani

C-HMOSHSSA: Gene selection for cancer classification using multi-objective meta-heuristic and machine learning method

Computer Methods and Programs in Biomedicine

2019

3.424

262.           

Harmanjeet Kaur, Neeraj Kumar, Shalini Batra

ClaMPP: A Cloud-based Multi-party Privacy Preserving Classification Scheme for Distributed Applications

Journal of Supercomputing

2019

2.16

263.           

N Hooda, PS Rana and S Bawa

Classification of Drug Molecules for Oxidative Stress Signaling Pathway

Applied Artificial Intelligence

2019

0.99

264.           

Loveleen Kaur, Ashutosh mishra

Cognitive complexity as a quantifier of version to version Java-based source code change: An empirical probe

Information and Software Technology

2019

2.921

265.           

Aaisha Makkar and Neeraj Kumar

Cognitive spammer: A Framework for PageRank analysis with Split                by Over-sampling and Train by Under-fitting

Future Generation Computer Systems

2019

5.768

266.           

Parminder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi

Comprehensive Study of Continuous Orthogonal Moments- A Systematic Review

ACM Computing Surveys

2019

6.13

267.           

V Gupta and PS Rana

Computational Intelligence Technique for Prediction of Multiple Sclerosis based on Serum Cytokines

Turkish Journal Of Electrical Engineering and Computer Sciences

2019

0.63

268.           

Shailendra Tiwari, Kavkirat Kaur, Yadunath Pathak, Shivendra Shivaniand Kuldeep Kaur

Computed tomography reconstruction on distributed storage using hybrid regularization approach

Modern Physics Letter-B

2019

0.731

269.           

Kuljeet Kaur and                Neeraj Kumar and                Mukesh Singh

Coordinated Power Control of Electric Vehicles for Grid Frequency Support: MILP-Based Hierarchical Control Design

IEEE Transactions on Smart Grid

2019

10.486

270.           

Ishan Budhiraja and                Sudhanshu Tyagi and                Sudeep Tanwar and                Neeraj Kumar and                Mohsen Guizani

Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment

IEEE Transactions on Vehicular Technology

2019

5.339

271.           

Arzoo Miglani and                Neeraj Kumar

Deep learning models for traffic flow prediction in autonomous vehicles: A review, solutions, and challenges

Vehicular Communications

2019

5.35

272.           

Mohammad Wazid and                Ashok Kumar Das and                Neeraj Kumar and                Athanasios V. Vasilakos and                Joel J. P. C. Rodrigues

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

IEEE Internet of Things Journal

2019

9.515

273.           

Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar and Athanasios V. Vasilakos

Design of secure key management and user authentication scheme for fog computing services

Future Generation Computer Systems

2019

5.768

274.           

Ishan Budhiraja and                Sudhanshu Tyagi and                Sudeep Tanwar and                Neeraj Kumar and                Joel J. P. C. Rodrigues

DIYA: Tactile Internet Driven Delay Assessment NOMA-Based Scheme for D2D Communication

IEEE Transactions on Industrial Informatics

2019

7.377

275.           

Gagangeet Singh Aujla and                Sahil Garg and                Shalini Batra and                Neeraj Kumar and                Ilsun You and                Vishal Sharma

DROpS: {A} demand response optimization scheme in SDN-enabled smart energy ecosystem

Information Sciences

2019

5.524

276.           

Aman Sharma and Rinkle Rani

Drug Sensitivity Prediction Framework using Ensemble and Multi-task Learning

International Journal of Machine Learning and Cybernetics

2019

3.848

277.           

Roopam Bamal, Singara Singh Kasana

Dual Hybrid Medical Watermarking using Walsh Slantlet Transform

Multimedia Tools and Applications

2019

2.101

278.           

Kanu Goel, Shalini Batra

Dynamically Updated Diversified Ensemble based Approach for handling Concept Drift

Turkish Journal of Electrical and Computer Sciences.

2019

0.62

279.           

Neeraj Kumar and                Gagangeet Singh Aujla and                Ashok Kumar Das and                Mauro Conti

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System

IEEE Transactions on Industrial Informatics

2019

7.377

280.           

Sahil Garg, Amritpal Singh, Shalini Batra, Neeraj Kumar

Edge Computing based Security Framework for Big Data Analytics in VANETs

IEEE Network Magazine

2019

7.5

281.           

Y. Pathak, K.V. Arya and S. Tiwari

Efficient image reconstruction using Fourtth order partial derivatives based guided image filter

Multimedia Tools and Applications

2019

2.101

282.           

Sachendra Singh Chauhan, Shalini Batra

Efficient layer-wise feature incremental approach for content-based image retrieval system for content-based image retrieval system

Journal of Electronic Imaging

2019

0.92

283.           

Gagangeet Singh Aujla and                Neeraj Kumar and                Mukesh Singh and                Albert Y. Zomaya

Energy trading with dynamic pricing for electric vehicles in a smart city environment

Journal of Parallel and Distributed Computing

2019

1.819

284.           

Rupali Bhardwaj

Enhanced reversible data hiding scheme for homomorphic encrypted absolute moment block truncation coding-compressed images

Journal of Electronic Imaging

2019

 

285.           

Shatrughan Modi, Jhilik Bhattacharya, Prasenjit Basak

Estimation of energy consumption of electric vehicles using Deep Convolutional Neural Network to reduce driver’s range anxiety

ISA transactions

2019

4.343

286.           

Simranjit Singh, Singara Singh Kasana

Estimation of Soil Properties from the EU Spectral Library using Long Short-Term Memory Networks

Geoderma Regional

2019

1.5

287.           

Rajeev Kumar, Pawan Kumar, Ritu Vijay & Surjit Singh

Fast and Accurate Synthesis of Hexagonal Shape Frequency Agile Antenna using Back Propagation Network

International Journal of Electronics and Communication

2019

2.853

288.           

Aparna Kumari and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and                Mohammad S. Obaidat and                Joel J. P. C. Rodrigues

Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions

IEEE Wireless Communications Add Title To My Alerts

2019

11

289.           

Aparna Kumari and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and                Reza M. Parizi and                Kim-Kwang Raymond Choo

Fog data analytics: A taxonomy and process model

Journal of Network and Computer Applications

2019

5.273

290.           

Priyanka Chawla, Inderveer Chana, Ajay Rana

Framework for cloud‐based software test data generation service

Software: Practice And Experience 

2019

1.931

291.           

Amritpal Singh and                Sahil Garg and                Kuljeet Kaur and                Shalini Batra and                Neeraj Kumar and                Kim-Kwang Raymond Choo

Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud

IEEE Transactions on Industrial Informatics

2019

7.377

292.           

Divya Pandove, Shivani Goel and Rinkle Rani

General Correlation Coefficient Based Agglomerative Clustering

Cluster Computing

2019

1.851

293.           

Jangirala Srinivas and Ashok Kumar Das and Neeraj Kumar

Government regulations in cyber security: Framework, standards and recommendations

Future Generation Computer Systems

2019

5.768

294.           

Vinay Arora, Rohan Leekha, Raman Singh and Inderveer Chana

Heart sound classification using machine learning and phonocardiogram

Modern Physics Letters B

2019

0.731

295.           

Rupinderdeep Kaur, R. K. Sharma and Parteek Kumar

HMM-Based Phonetic Engine for Continuous Speech of a Regional Language

Modern Physics Letters B

2019

0.731

296.           

Sahil Garg and                Kuljeet Kaur and                Neeraj Kumar and                Joel J. P. C. Rodrigues

Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective

IEEE Transactions on Multimedia

2019

5.452

297.           

Gaurav Sharma, Seema Bawa, Prashant Singh Rana

Hybrid machine learning models for predicting types of Human T-cell Lymphotropic Virus

IEEE/ACM Transactions on Computational Biology and Bioinformatics

2019

2.896

298.           

Qi Feng and                Debiao He and                Sherali Zeadally and                Neeraj Kumar and                Kaitai Lian

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

IEEE Systems Journal

2019

4.463

299.           

Deepa K and Radhamani G and Vinod P and Mohammad Shojafar and Neeraj Kumar and Mauro Conti

Identification of Android malware using refined system calls

Concurrency and Computation: Practice and Experience

2019

1.167

300.           

Surbhi Gupta, Munish Kumar and Anupam Garg

Improved Object Recognition Results Using SIFT and ORB feature detector

Multimedia Tools and Applications

2019

2.101

301.           

Amanpreet Singh, Maninder Kaur

Intelligent content-based cybercrime detection in online social networks using cuckoo search metaheuristic approach

Springer

2019

2.16

302.           

Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar and                Mohammad S. Obaidat

LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN

IEEE Systems Journal

2019

4.463

303.           

Rajat Chaudhary and                Gagangeet Singh Aujla and                Neeraj Kumar and                Sherali Zeadally

Lattice-Based Public Key Cryptosystem for Internet of Things Environment:                Challenges and Solutions

IEEE Internet of Things Journal

2019

9.515

304.           

Prosanta Gope and                Ashok Kumar Das and                Neeraj Kumar and                Yongqiang Cheng

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks

IEEE Transactions on Industrial Informatics

2019

7.377

305.           

Rajat Chaudhary and                Neeraj Kumar

LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks

IEEE Transactions on Vehicular Technology

2019

5.339

306.           

Amandeep Singh Bhatia, Mandeep Kaur Saggi, Ajay Kumar, Sushma Jain

Matrix Product State–Based Quantum Classifier

Neural computation

2019

2.261

307.           

Kalpna Guleria, Anil Kumar Verma

Meta-heuristic Ant Colony Optimization Based Unequal Clustering for Wireless Sensor Network

Wireless Personal Communications

2019

0.929

308.           

Surjit Singh and Pawan Kumar

MH-CACA: multi-objective harmony search based coverage aware load balanced clustering algorithm in WSNs

Enterprise Information Systems

2019

2.122

309.           

Harsurinder Kaur, Husanbir Pannu,Avleen Malhi

Multimedia blog volume prediction using adaptive neuro fuzzy inference system and evolutionary algorithms

Multimedia Tools and Applications

2019

2.1

310.           

Hemant Kumar Gianey, M. Kour, D. Singh

Multi-objective differential evolution based random forest for E-health applications

Modern Physics Letter- B

2019

0.9

311.           

Kuljeet Kaur and                Mukesh Singh and                Neeraj Kumar

Multiobjective Optimization for Frequency Support Using Electric Vehicles: An Aggregator-Based Hierarchical Control Mechanism

IEEE Systems Journal

2019

4.463

312.           

Harinder Kaur, Gaganpreet Kaur, Husanbir Singh Pannu

Novel similarity measure-based random forest for fingerprint recognition using dual-tree complex wavelet transform and ring projection

Modern Physics Letters B

2019

0.731

313.           

N Verma, H Singh, D Khanna, PS Rana and SK Bhadada

N-semble: Neural Network based ensemble approach

IET Systems Biology

2019

1.39

314.           

Amandeep Singh Bhatia, Ajay Kumar

On Relation Between Linear Temporal Logic and Quantum Finite Automata

Journal of Logic, Language and Information

2019

0.5

315.           

Amandeep SIngh Bhatia, Ajay Kumar

ON THE POWER OF TWO-WAY MULTIHEAD QUANTUM FINITE AUTOMATA

RAIRO-Theor. Inf.

2019

0.282

316.           

Pawan Kumar, Gagandeep Singh Brar, Surjit Singh, Srete Nikolovski, Hamid Reza Baghaee, Zoran Balkic

Perspectives and Intensification of Energy Efficiency in Commercial and Residential Buildings Using Strategic Auditing and Demand-Side Management

Energies

2019

2.707

317.           

Parminder Kaur, Husanbir Singh Pannu,Avleen Kaur Malhi

Plant disease recognition using fractional-order Zernike moments and SVM classifier

Neural Computing andApplications

2019

4.66

318.           

Mario W. L. Moreira and                Joel J. P. C. Rodrigues and               Neeraj Kumar and                Kashif Saleem and                Igor V. Illin

Postpartum depression prediction through pregnancy data analysis for emotion-aware smart systems

Information Fusion

2019

10.716

319.           

Rishith Rayal, J Kaur, N Hooda, D Khanna and PS Rana

Prediction of drug synergy in cancer using Ensemble

International Journal of Machine Learning and Cybernetics

2019

3.84

320.           

V Gupta and PS Rana

Prediction of drug synergy score using ensemble based differential evolution

IET Systems Biology

2019

1.39

321.           

Amritpal Singh and Sahil Garg and Shalini Batra and Neeraj Kumar

Probabilistic data structure-based community detection and storage scheme in online social networks

Future Generation Computer Systems

2019

5.768

322.           


Nitin Goyal, Mayank Dave, Anil Kumar Verma

Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends

Wireless Personal Communications

2019

0.929

323.           

Sandip Roy and                Ashok Kumar Das and                Santanu Chatterjee and                Neeraj Kumar and                Samiran Chattopadhyay and                Joel J. P. C. Rodrigues

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications

 IEEE Transactions on Industrial Informatics

2019

7.377

324.           

Amandeep Singh Bhatia

Quantum ω-Automata over Infinite Words and Their Relationships

International Journal of Theoretical Physics

2019

1.121

325.           

Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya

RADAR: Self‐configuring and self‐healing in resource management for enhancing quality of cloud services

Concurrency and Computation: Practice and Experience

2019

1.167

326.           

Mohammad Wazid and                Poonam Reshma Dsouza and                Ashok Kumar Das and                Vivekananda Bhat K. and                Neeraj Kumar and                Joel J. P. C. Rodrigues

RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment

International Journal of Communication Systems

2019

1.278

327.           

Akashkumar Rajaram and                Rui Dinis and                Dushantha Nalin K. Jayakody and                Neeraj Kumar

Receiver Design to Employ Simultaneous Wireless Information and Power Transmission with Joint CFO and Channel Estimation

IEEE Access

2019

4.098

328.           

Neeraj Kumar and                Gagangeet Singh Aujla and                Sahil Garg and                Kuljeet Kaur and                Rajiv Ranjan and                Saurabh Kumar Garg

Renewable Energy-Based Multi-Indexed Job Classification and Container Management Scheme for Sustainability of Cloud Data Centers

IEEE Transactions on Industrial Informatics

2019

7.377

329.           

Gagangeet Singh Aujla and                Rajat Chaudhary and                Kuljeet Kaur and                Sahil Garg and                Neeraj Kumar and                Rajiv Ranjan

SAFE: SDN-assisted framework for edge–cloud interplay in secure healthcare ecosystem

IEEE Transactions on Industrial Informatics

2019

7.377

330.           

Kaur, B., Bhattacharya, J.

Scene perception system for visually impaired based on object detection and classification using multimodal deep convolutional neural network 

Journal of Electronic Imaging

2019

0.92

331.           

Kuljeet Kaur and                Sahil Garg and                Georges Kaddoum and                Neeraj Kumar and                Francois Gagnon

SDN-Based Internet of Autonomous Vehicles: An Energy-Efficient Approach for Controller Placement

IEEE Wireless Communications

2019

11

332.           

Jigna J. Hathaliya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar

Securing electronics healthcare records in Healthcare 4.0: {A} biometric-based approach

Computers & Electrical Engineering

2019

2.189

333.           

Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu

Security of Vehicular Ad-hoc Networks: A Comprehensive Survey

Computers & Security

2019

3.06

334.           

Saurabh Singh, In-Ho Ra, Weizhi Meng, Maninder Kaur, Gi Hwan Cho

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

International Journal of Distributed Sensor Networks

2019

1.614

335.           

Gagangeet Singh Aujla and Mukesh Singh and                Neeraj Kumar and Albert Y. Zomaya

Stackelberg Game for Energy-Aware Resource Allocation to Sustain Data Centers Using RES

 IEEE Transactions on Cloud Computing

2019

5.967

336.           

Garg, Sheetal, Raman Singh, Mohammad S. Obaidat, Vinod Kumar Bhalla, and Bhisham Sharma

Statistical vertical reduction‐based data abridging technique for big network traffic dataset

International Journal of Communication Systems

2019

1.278

337.           

Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar

Tactile internet and its applications in 5G era: A comprehensive review

International Journal of Communication Systems

2019

1.278

338.           

Sudeep Tanwar and                Sudhanshu Tyagi and                Ishan Budhiraja and                Neeraj Kumar

Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis

IEEE Wireless Communications

2019

11

339.           

Ishan Budhiraja and                Sudhanshu Tyagi and                Sudeep Tanwar and                Neeraj Kumar and                Joel J. P. C. Rodrigues

Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions

IEEE Transactions on Industrial Informatics

2019

7.377

340.           

Rajesh Gupta and                Sudeep Tanwar and                Sudhanshu Tyagi and                Neeraj Kumar

Tactile-Internet-Based Telesurgery System for Healthcare 4.0: An Architecture, Research Challenges, and Future Directions

IEEE Network

2019

7.503

341.           

Jangirala Srinivas and                Ashok Kumar Das and                Neeraj Kumar and                Joel J. P. C. Rodrigues

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

IEEE Transactions on Vehicular Technology

2019

5.339

342.           

Jayneel Vora and Shriya Kaneriya and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat

TILAA: Tactile Internet-based Ambient Assistant Living in fog environment

Future Generation Computer Systems

2019

5.768

343.           

Sushil Kumar and                Vipin Kumar and                Omprakash Kaiwartya and                Upasana Dohare and                Neeraj Kumar and                Jaime Lloret

Towards green communication in wireless sensor network: GA enabled distributed zone approach

Ad Hoc Networks

2019

3.49

344.           

Sahil Garg and Gagangeet Singh Aujla and Neeraj Kumar and Shalini Batra

Tree-Based Attack-Defense Model for Risk Assessment in Multi-UAV Networks

IEEE Consumer Electronics Magazine

2019

3.273

345.           

Vishal Sharma, Rajesh Kumar

UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks

International Journal of Ad Hoc and Ubiquitous Computing

2019

0.56

346.           

Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar

Verification and validation techniques for streaming big data analytics in internet of things environment

IET Networks

2019

0.298

347.           

Shaveta Dargan, Munish Kumar, Anupam Garg, Kutub Thakur

Writer Identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM

Soft Computing

2019

2.784

348.           

Kaur, H., & Pannu, H. S.

Zernike moments-based fingerprint recognition using weighted-support vector machine

Modern Physics Letters B

2019

0.7

349.           

Sahil Sharma and Vijay Kumar

3D Landmark-based Face Restoration for Recognition using Variational Autoencoder and Triplet Loss

IET Biometrics

2020

1.821

350.           

Vijay Kumar and Ashish Girdhar

A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach

Multimedia Tools and Applications

2020

2.313

351.           

Ajay Kumar and Seema Bawa.

A comparative review of meta-heuristic approaches to optimize the sla violation costs for dynamic execution of cloud services.

Soft Computing,

2020

2.784

352.           

Pawan Kumar, Ikbal Ali, Mini Shaji Thomas, Surjit Singh

A Coordinated Framework of DG Allocation and Operating Strategy in Distribution System for Configuration Management under Varying Loading Patterns

Electric Power Components and Systems

2020

0.824

353.           

Muskaan Singh, Ravinder Kumar, and Inderveer Chana

A forefront to machine translation technology: deployment on the cloud as a service to enhance QoS parameters

Soft Computing

2020

2.784

354.           

Gourav Bathla, Himanhsu Aggarwal, Rinkle Rani

A graph-based model to improve social trust and influence for Social Recommendation

The Journal of Supercomputing

2020

2.469

355.           

Anish Jindal, Bharat Singh Bhambhu, Mukesh Singh, Neeraj Kumar, Kshirasagar Naik

A Heuristic-Based Appliance Scheduling Scheme for Smart Homes.

IEEE Transactions on Industrial Informatics

2020

8.48

356.           

Prabhjot Kaur Chahal, Shreelekha Pandey

A hybrid weighted fuzzy approach for brain tumor segmentation using MR images

Neural Computing and Applications

2020

4.627

357.           

Xiong Li, Tian Liu, Mohammad S. Obaidat, Fan Wu, Pandi Vijayakumar, Neeraj Kumar

A Lightweight Privacy-Preserving Authentication Protocol for VANETs

IEEE Syst. J.

2020

3.987

358.           

Monika Bharti, Rajesh Kumar, Sharad Saxena

A Middleware Approach for Reliable Resource Selection on Internet-of-Things

International Journal of Communication Systems

2020

1.319

359.           

Ravinder Kumar, Shubham Goel, Vishal Sharma, Lalit Garg, Kathiravan Srinivasan, Neeraj Julka

A Multifaceted Vigilare System for Intelligent Transportation Services in Smart Cities

IEEE Internet of Things Magazine

2020

 

360.           

Sahil Garg, Kuljeet Kaur, Shalini Batra, Georges Kaddoum, Neeraj Kumar, Azzedine Boukerche

A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications.

Future Gener. Comput. Syst.

2020

5.768

361.           

Kumar, P., Thanki, D. V., Singh, Surjit, & Nikolovski, S.

A new framework for intensification of energy efficiency in commercial and residential use by imposing social, technical and environmental constraints

Sustainable Cities and Society Journal

2020

5.268

362.           

R Kumar, N Jindal and PS Rana

A novel approach for detecting roundabouts in maps based on analysis of core map data

Multimedia Tools and Applications

2020

2.31

363.           

Upasana Joshi and Rajiv Kumar

A novel deep neural networks based path prediction

Cluster Computing

2020

1.9

364.           

S Sachdeva, T Bhatia, AK Verma

A novel voting ensemble model for spatial prediction of landslides using GIS

International Journal of Remote Sensing

2020

2.47

365.           

Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.

IEEE Syst. J.

2020

3.987

366.           

Sitender and Seema Bawa.

A sanskrit-to-english machine translation using hybridization of direct and rule- based approach

Neural Computing and Applications

2020

4.774

367.           

Prabhjot Kaur Chahal, Shreelekha Pandey, Shivani Goel

A survey on brain tumor detection techniques for MR images

MULTIMEDIA TOOLS AND APPLICATIONS

2020

2.313

368.           

Ashok Kumar, Anju Sharma,Rajesh Kumar

A swarm intelligence-based quality of service aware resource allocation for clouds

International Journal of Ad Hoc and Ubiquitous Computing

2020

0.714

369.           

Aman Sharma; Rinkle Rani

A Systematic Review of Applications of Machine Learning in Cancer Prediction and Diagnosis

Archives of Computational Methods in Engineering (ARCO)

2020

6.73

370.           

Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar

A taxonomy of AI techniques for 6G communication networks.

Computer Communications

2020

2.816

371.           

Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar

A taxonomy of blockchain-enabled softwarization for secure UAV network.

Computer Communications

2020

2.816

372.           

Anish Jindal, Neeraj Kumar, Mukesh Singh:

A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities.

Future Gener. Comput. Syst.

2020

5.768

373.           

Gagangeet Singh Aujla, Amritpal Singh, Neeraj Kumar

AdaptFlow: Adaptive Flow Forwarding Scheme for Software-Defined Industrial Networks.

IEEE Internet Things J

2020

9.515

374.           

Darell Edmond, Vijay Prakash, Lalit Garg, Seema Bawa

Adoption of Cloud Computing in Central Banks: Hindering factors and the recommendations for the way forward.

Journal of Central Banking Theory and Practices

2020

 

375.           

Rajesh Mehta, Keshav Gupta, Ashok Kumar Yadav

An adaptive framework to image watermarking based
on the twin support vector regression
and genetic algorithm in lifting wavelet transform
domain

Multimedia Tools and Applications

2020

2.313

376.           

Sharad Saxena, Deepak Mehta

An adaptive fuzzy-based clustering and bio-inspired energy efficient hierarchical routing protocol for wireless sensor networks

Wireless and Personal Communication

2020

1.2

377.           

Kuljeet Kaur, Sahil Garg, Neeraj Kumar, Gagangeet Singh Aujla, Kim-Kwang Raymond Choo, Mohammad S. Obaidat

An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.

IEEE Syst. J.

2020

3.987

378.           

Chandan Singh and Ashutosh Aggarwal

An Effective Approach for Noise Robust and Rotation Invariant Handwritten Character Recognition Using Zernike Moments Features and Optimal Similarity Measure

Applied Artificial Intelligence

2020

1.172

379.           

Rohan Leekha, Inderveer Chana

An efficacy of spectral features with boosted
decision tree algorithm for automatic heart sound
classification

Journal of Medical Imaging and Health Informatics

2020

0.659

380.           

Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Mohammad S. Obaidat, Debiao He, Harendra Singh

An efficient and provable certificate-based proxy signature scheme for IIoT environment.

Information Sciences

2020

5.524

381.           

Neenu Garg, Seema Bawa, Neeraj Kumar

An efficient data integrity auditing protocol for cloud computing

Future Generation Computer Systems

2020

6.125

382.           

Neenu Garg, Seema Bawa, and Neeraj Kumar.

An efficient data integrity auditing protocol for cloud computing.

Future Generation Computer Systems,

2020

5.768

383.           

Aaisha Makkar, Neeraj Kumar:

An efficient deep learning-based scheme for web spam detection in IoT environment.

Future Gener. Comput. Syst.

2020

5.768

384.           

Prabhjot Kaur Chahal, Shreelekha Pandey

An efficient Hadoop‐based brain tumor detection framework using big data analytic

Software: Practice and Experience

2020

1.786

385.           

Sandeep Saharan, Neeraj Kumar, Seema Bawa

An efficient smart parking pricing system for smart city environment: A machine-learning based approach.

Future Generation Computer Systems,

2020

5.768

386.           

Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Mohsen Guizani

An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users With Imperfect CSI.

IEEE Transactions on Vehicular Technology

2020

2.243

387.           

Sumedha Arora, Anju Bala

An ensembled data frequency prediction based framework for fast processing using hybrid cache optimization

Journal of Ambient Intelligence and Humanized Computing

2020

3.96

388.           

Aman Sharma and Rinkle Rani

An Ensembled Machine Learning framework for Drug Sensitivity Prediction

IET Systems Biology

2020

1.392

389.           

Aman Sharma; Rinkle Rani

An Ensembled Machine
 Learning
 framework for Drug Sensitivity Prediction

IET Systems Biology

2020

1

390.           

J Kaur, PS Rana and AK Verma

An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks

Wireless Personal Communications

2020

1.06

391.           

Sumedha Arora, Anju Bala

An Intelligent Energy Efficient Storage System for Cloud Based Big Data Applications

Simulation Modelling Practice and Theory

2020

2.219

392.           

Huo, L., Jiang, D., Lv, Z., & Singh, S

An Intelligent Optimization-Based
 Traffic Information Acquirement
 Approach to SDN

Computational Intelligence, Wiley

2020

1.196

393.           

Vivek Mehta, Seema Bawa, Jasmeet Singh

Analytical review of clustering techniques and proximity measures

Artificial Intelligence review

2020

5.747

394.           

Mandeep Saggi, Sushma Jain

Application of fuzzy-genetic and regularization random forest (FG-RRF): Estimation of crop evapotranspiration (ETc) for maize and wheat crops

 Agricultural Water Management

2020

3.021

395.           

Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.

Computers Security

2020

3.579

396.           

Shaify Kansal, Jhilik Bhattacharya, and Vishal Srivastava

Automated full-field polarization sensitive optical coherence tomography diagnostic systems for breast cancer

Applied Optics

2020

1.96

397.           

Amandeep Dhir, Nitin Koshta, Raman Kumar Goyal,Mototaka Sakashita and Mohammad Almotairi

Behavioral reasoningtheory (BRT) perspectiveson E-waste recycling andmanagement

Journal of Cleaner Production

2020

7.246

398.           

S Kumari, N Kumar and PS Rana

Big Data Analytics for Energy Consumption Prediction in Smart Grid using Genetic Algorithm and Long Short Term Memory

Computing and Informatics

2020

0.67

399.           

Kaur, Maninder; Kaur, Gurpreet; Sharma, Pradip Kumar; Jolfaei, Alireza; Singh, Dhananjay;

Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home

The Journal of Supercomputing

2020

2.6

400.           

Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar

Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions.

Journal of Parallel and Distributed Computing

2020

2.296

401.           

Umesh Bodkhe, Sudeep Tanwar, Karan Parekh, Pimal Khanpara, Sudhanshu Tyagi, Neeraj Kumar, Mamoun Alazab

Blockchain for Industry 4.0: A Comprehensive Review.

IEEE Access

2020

3.745

402.           

Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally

Blockchain for Internet of Energy management: Review, solutions, and challenges.

Computer Communications

2020

2.816

403.           

Pradip Kumar Sharma, Neeraj Kumar, Jong Hyuk Park

Blockchain Technology Toward Green IoT: Opportunities and Challenges.

IEEE Network

2020

9.59

404.           

Mamta, B. B. Gupta, K. -C. Li, V. C. M. Leung, K. E. Psannis and S. Yamaguchi

Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System

IEEE/CAA Journal of Automatica Sinica

2020

5.129

405.           

Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo

Blockchain-based identity management systems: A review

Journal of Network and Computer Applications

2020

5.57

406.           

Basudeb Bera, Sourav Saha, Ashok Kumar Das, Neeraj Kumar, Pascal Lorenz, Mamoun Alazab

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment.

IEEE Transactions on Vehicular Technology

2020

2.243

407.           

Gagangeet Singh Aujla, Amritpal Singh, Maninderpal Singh, Sumit Sharma, Neeraj Kumar, Kim-Kwang Raymond Choo

BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment.

IEEE Transactions on Vehicular Technology

2020

2.243

408.           

Gagangeet Singh Aujla, Maninderpal Singh, Arnab Bose, Neeraj Kumar, Guangjie Han, Rajkumar Buyya

BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications.

IEEE Network

2020

9.59

409.           

Amritpal Singh, Shalini Batra, Gagangeet Singh Aujla, Neeraj Kumar, Laurence T. Yang

BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN.

IEEE Transactions on Industrial Informatics

2020

8.48

410.           

Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Vinay Chamola

CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment.

IEEE Internet Things J

2020

9.515

411.           

Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Debiao He

CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs.

IEEE Syst. J.

2020

3.987

412.           

Tribhuvan Singh, Nitin Saxena

Chaotic sequence and opposition learning guided approach for data clustering

Pattern Analysis and Applications

2020

1.512

413.           

Nikhil Verma, Harpreet Singh, Divya Khanna, Prashant Singh Rana and Sanjay Kumar Bhadada

Classification of Drug Molecules for Oxidative Stress Signaling Pathway.

IET Systems Biology

2020

1.392

414.           

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio and Seema Bawa

Cloud and Edge Computing-based Computer Forensics: Challenges and Open Problems

Electronics

2020

2.412

415.           

Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues

Cloud Centric Authentication for Wearable Healthcare Monitoring System.

IEEE Transactions on Dependable and Secure Computing

2020

6.404

416.           

Shubham Goel and Ravinder Kumar

Collaboratively Augmented UIP - Filtered RIP with Relevancy Mapping for Personalization of Web Search

Information Sciences

2020

5.91

417.           

Sachin Kansal, Rajesh Kumar, Sudipto Mukherjee

Color Invariant State Estimator to Predict the Object Trajectory and Catching using Dexterous Multifingered Delta Robot

Multimedia Tools and Applications

2020

2.31

418.           

Parminder Kaur, Avleen Malhi, HS Pannu

Comparative analysis on cross-modal information retrieval: A review

Computer Science Reviews

2020

7.7

419.           

Shiva Raj Pokhrel, Surjit Singh

Compound-TCP Performance for Industry 4.0 WiFi: A Cognitive Federated Learning Approach

IEEE Transactions on Industrial Informatics

2020

9.112

420.           

S Modi, J Bhattacharya, P Basak,

Convolutional Neural Network-Bagged Decision Tree: A hybrid approach to reduce electric vehicle's driver's range anxiety by estimating energy consumption in real

Soft Computing

2020

3.05

421.           

Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana

Convolutional neural networks for 5G-enabled Intelligent Transportation System : A systematic review.

Computer Communications

2020

2.816

422.           

P. Kumar;  Ikbal Ali, Mini Thomas & Surjit Singh

Coordinated framework for planning and operation of distribution system under probabilistic loading patterns with DG allocation

Electric Power Components and Systems, Taylor and Francis

2020

0.824

423.           

Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana

Copyright Protection Scheme for Color Images using Extended Visual Cryptography

Computers and Electrical Engineering Journal

2020

2.662

424.           

Sukhchandan Randhawa, Sushma Jain

Cross‑Layer Energy Based Clustering Technique for Heterogeneous Wireless Sensor Networks

Wireless Personal Communications

2020

1.061

425.           

Manju Devi, Sukhdip Singh and Shailendra Tiwari

CT Image Reconstruction using NLMfuzzyCD Regularization Method

Current Medical Imaging – Bentham Science

2020

0.812

426.           

Liping Liu, Lin Wang, Dan Xu, Hongjie Zhang, Ashutosh Sharma, Shailendra Tiwari, Manjit Kaur, Manju Khurana and Mohd Asif Shah

CT Image Segmentation Method of Liver Tumor Based on Artificial Intelligence Enabled Medical Imaging

Mathematical Problems in Engineering

2020

1.009

427.           

Amanpreet Singh,Maninder Kaur

Cuckoo inspired stacking ensemble framework for content‐based cybercrime detection in online social networks

Transactions on Emerging Telecommunications Technologies

2020

1.594

428.           

Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana

Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography

Multimedia Tools and Applications

2020

2.313

429.           

Ajay Kumar and Seema Bawa.

Dais: dynamic access and integration services framework for cloud-oriented
 storage systems.

Cluster Computing

2020

1.851

430.           

R Magoo, H Singh, N Jindal, N Hooda and PS Rana

Deep learning based bird-eye view social distancing monitoring using surveillance video for curbing the COVID-19 spread

Neural Computing and Applications

2020

4.77

431.           

HS Pannu, Sahil Ahuja, Nitin Dang, Sahil Soni, Avleen Malhi

Deep learning based image classification for intestinal hemorrhage

MULTIMEDIA TOOLS AND APPLICATIONS

2020

2.3

432.           

Payal Mittal, Akashdeep Sharma, Raman Singh

Deep learning-based object detection in low-altitude UAV datasets: A survey

Image and Vision Computing

2020

3.103

433.           

Ankita Wadhawan, and Parteek Kumar

Deep learning-based sign language recognition system for static signs.

Neural Computing and Applications

2020

4.774

434.           

Sawinder Kaur, Parteek Kumar,Ponnurangam Kumaraguru

Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory

Journal of Electronic Imaging

2020

0.78

435.           

Jian Lian, Weikuan Jia, Masoumeh Zareapoor, Yuanjie Zheng, Rong Luo, Deepak Kumar Jain, Neeraj Kumar

Deep-Learning-Based Small Surface Defect Detection via an Exaggerated Local Variation-Based Generative Adversarial Network.

IEEE Transactions on Industrial Informatics

2020

8.48

436.           

Sravani Challa, Ashok Kumar Das, Prosanta Gope, Neeraj Kumar, Fan Wu, Athanasios V. Vasilakos

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems.

Future Gener. Comput. Syst.

2020

5.768

437.           

Simar Preet Singh, Anju Sharma, Rajesh Kumar

Design and exploration of load balancers for fog computing using fuzzy logic

Simulation Modelling Practice and Theory

2020

2.426

438.           

Simar Preet Singh, Anju Sharma, Rajesh Kumar

Designing of Fog Based FBCMI2E Model Using Machine Learning Approaches for Intelligent Communication Systems

Computer Cpmmunications

2020

2.816

439.           

Simar Preet Singh, Anju Sharma, Rajesh Kumar

Designing of Fog Based FBCMI2E Model Using Machine Learning Approaches for Intelligent Communication Systems

Computer Communications

2020

2.816

440.           

Sawinder Kaur, Parteek Kumar, Ponnurangam Kumaraguru

Detecting clickbaits using two-phase hybrid CNN-LSTM biterm model.

Expert Systems with Applications

2020

5.452

441.           

Amanpreet Singh,Maninder Kaur

Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach

Arabian Journal for Science and Engineering

2020

1.711

442.           

Xinghua Li, Mengfan Xu, Pandi Vijayakumar, Neeraj Kumar, Ximeng Liu

Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things.

IEEE Transactions on Vehicular Technology

2020

2.243

443.           

Daljeet Singh, Rahul Upadhyay, HS Pannu, Dimitri Leray

Development of an adaptive neuro fuzzy inference system based vehicular traffic noise prediction model

Journal of Ambient Intelligence and Humanized Computing

2020

4.5

444.           

Divya Prerna, Rajkumar Tekchandani, Neeraj Kumar

Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges.

Computer Communications

2020

2.816

445.           

Aman Sharma; Rinkle Rani

Drug Sensitivity Prediction Framework using Ensemble and Multi-task
 Learning

International Journal of Machine
 Learning and Cybernetics

2020

3.753

446.           

Sandeep Saharan, Seema Bawa, Neeraj Kumar

Dynamic pricing techniques for intelligent transportation system in smart cities: A systematic review.

Computer Communications

2020

3.066

447.           

Marinho Marlene, Vijay Prakash, Lalit Garg, Claudio Savaglio, and Seema Bawa

Effective Cloud Resource Utilisation in Cloud ERP Decision-Making Process for Industry 4.0 in the United

Electronics

2020

2.412

448.           

Pandi Vijayakumar, Mohammad S. Obaidat, Maria Azees, SK Hafizul Islam, Neeraj Kumar

Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.

IEEE Transactions on Industrial Informatics

2020

8.48

449.           

Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.

Security and Communication Networks

2020

0.72

450.           

Simar Preet Singh, Rajesh Kumar, Anju Sharma

Efficient Content Retrieval in Fog Zone using Nano-Caches

Concurrency and Computation: Practice and Experience

2020

1.447

451.           

Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma

Efficient Data Management and Control over WSNs using SDN enabled

International Journal of Communication Systems

2020

1.278

452.           

Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma

Efficient Data Management and Control over WSNs using SDN enabled Aerial Networks

International Journal of Communication Systems

2020

1.319

453.           

Mohd. Abuzar Sayeed, Rajesh Kumar, Vishal Sharma, Mohd. Asim Sayeed

Efficient Deployment with Throughput Maximization for UAVs Communication Networks

Sensors

2020

3.275

454.           

H Chopra, H Singh, MS Bamrah, F Mahbubani, A Verma, N Hooda, PS Rana, RK Singla and AK Singh

Efficient Fruit Grading System using Spectrophotometry and Machine Learning Approaches

IEEE Sensors Journal

2020

3.07

455.           

Vinay Kehar, Vinay Chopra, Bhupesh Kumar Singh, and Shailendra Tiwari

Efficient Single Image Dehazing Model Using Metaheuristics-Based Brightness Channel Prior

Mathematical Problems in Engineering – Hindawi

2020

1.009

456.           

Sudeep Tanwar, Shriya Kaneriya, Neeraj Kumar, Sherali Zeadally

ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems.

Future Gener. Comput. Syst.

2020

1.319

457.           

Sahil Garg, Kuljeet Kaur, Shalini Batra, Gagangeet Singh Aujla, Graham Morgan, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan

En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment.

Journal of Parallel and Distributed Computing

2020

2.296

458.           

Vinay Chamola, Vikas Hassija, Biplab Sikdar, Neeraj Kumar, Nirwan Ansari

Energy and Latency Aware Resource Management for Solar Powered Cellular Networks.

IEEE Network

2020

9.59

459.           

Neeraj Kumar, Athanasios V. Vasilakos, Kim-Kwang Raymond Choo, Laurence T. Yang

Energy Management for Cyber-Physical Cloud Systems.

Future Gener. Comput. Syst.

2020

5.768

460.           

Surjit Singh, Michael Sheng, Elhadj Benkhelifa, Jaime Lloret

Energy Management, Protocols and Security for the Next Generation Networks and Internet of Things

IEEE Transactions on Industrial Informatics

2020

7.377

461.           

Rohit Ranjan, Ishan Singh Thakur, Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya

Energy-Efficient Workflow Scheduling Using Container-Based Virtualization in Software-Defined Data Centers.

IEEE Transactions on Industrial Informatics

2020

8.48

462.           

J Kaur, PS Rana and AK Verma

Enhancing dependability of wireless sensor network under flooding attack: A machine learning perspective

International Journal of Ad Hoc and Ubiquitous Computing

2020

0.72

463.           

V Gupta and PS Rana

Ensemble Technique for Toxicity Prediction of Small Drug Molecules of the Antioxidant Response Element Signaling Pathway

The Computer Journal

2020

1.08

464.           

Shatrughan Modi, Jhilik Bhattacharya, Prasenjit Basak

Estimation of energy consumption of electric vehicles using Deep Convolutional Neural Network to reduce driver’s range anxiety

ISA Transactions

2020

4.305

465.           

Sonal Kukreja, Geeta Kasana, and Singara Singh Kasana

Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors

The Visual Computer

2020

1.527

466.           

Keyur Patel, Dev Mehta, Chinmay Mistry, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar, Mamoun Alazab:

Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges.

IEEE Access

2020

3.745

467.           

Rohan Singh Leekha, Kyungroul Lee, Aman Kataria

Facilitating user authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence

Mobile Information System

2020

1.508

468.           

Kashish Goel, Parteek Kumar, Karun Verma

Food Adulteration Detection using Artificial Intelligence: A Systematic Review

Archives of Computational Methods in Engineering

2020

6.73

469.           

Amrita Kaur, Pardeep Kaur, Sahil Ahuja

Forster resonance energy transfer (FRET) and application thereof.

Analytical methods

2020

2.59

470.           

Vinay Chamola, Sambit Patra, Neeraj Kumar, Mohsen Guizani

FPGA for 5G: Re-configurable Hardware for Next Generation Communication.

IEEE Wirel. Commun.

2020

11.391

471.           

Akhtar Husain, Santar Pal Singh, S.C. Sharma

Fuzzy Logic Based Geocast Routing in Vehicular Ad Hoc Network

Journal of Scientific & Industrial Research

2020

0.72

472.           

Munish Kumar, Navdeep Singh, Ravinder Kumar, Shubham Goel, & Krishan Kumar

Gait Recognition Based on Vision Systems: A Systematic Survey

Journal of Visual Communication and Image Representation

2020

2.479

473.           

Amrita Kaur, Lakhwinder Kaur, Ashima Singh

GA-UNet: UNet-based framework for segmentation of 2D and 3D medical images applicable on heterogeneous datasets

Neural Computing and Applications

2020

4.7

474.           

Komal Singh Gill, Sharad Saxena, Anju Sharma

GTM-CSec: Game Theoretic Model for Cloud Security based on IDS and Honeypot

Computers & Security

2020

3.579

475.           

Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Massimo Villari

GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System

IEEE Transactions on Services Computing

2020

6.84

476.           

Surjit Singh, Michael Sheng, Elhadj Benkhelifa, Jaime Lloret

Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things

IEEE Transactions on Industrial Informatics

2020

9.112

477.           

Albert Y. Zomaya, Neeraj Kumar, Joel J. P. C. Rodrigues, Gagangeet Singh Aujla

Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem.

IEEE Transactions on Industrial Informatics

2020

8.48

478.           

Vinay Arora, EYK Ng, Karun Verma, Rohan Leekha, Takshi Gupta, Kathiravan Srinivasan

HEALTH OF THINGS MODEL FOR CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO-OCCURRENCE MATRIX AND SPECTROGRAM

Journal of Mechanics in Medicine and Biology

2020

0.849

479.           

Deepak Mehta, Sharad Saxena

Hierarchical WSN Protocol with Fuzzy Multi-criteria Clustering and Bio-inspired Energy-efficient Routing (FMCB-ER)

Multimedia Tools and Applications

2020

2.313

480.           

Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.

IEEE Internet Things J

2020

9.515

481.           

Sudeep Tanwar, Jayneel Vora, Shriya Kaneriya, Sudhanshu Tyagi, Neeraj Kumar, Vishal Sharma, Ilsun You:

Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol.

IEEE Consumer Electron. Mag.

2020

2.21

482.           

Puja Modgil, Sushma Jain

Hybrid frameworks for flexible job shop scheduling

The International Journal of Advanced Manufacturing Technology

2020

2.633

483.           

Cao, B., Dong, W., Lv, Z., Gu, Y., Singh, Surjit, & Kumar, P.

Hybrid Microgrid Many-Objective Sizing Optimization with Fuzzy Decision

IEEE Transactions on Fuzzy Systems

2020

9.518

484.           

Isha Kansal and Singara Singh Kasana

Improved Color Attenuation Prior based Image De-fogging Technique

Multimedia Tools and Applications

2020

2.313

485.           

Isha Kansal, Singara Singh Kasana

Improved color attenuation prior based image de-fogging technique

Multimedia Tools and Applications

2020

2.101

486.           

Jhilik Bhattacharya, Tarunpreet Bhatia, Husanbir Singh Pannu

Improved search space shrinking for medical image retrieval using capsule architecture and decision fusion

Expert Systems with Applications

2020

5.45

487.           

D Khanna and PS Rana

Improvement in Prediction of Antigenic Epitopes using Stacked Generalization: An Ensemble Approach

IET Systems Biology

2020

1.39

488.           

Deepak Gupta, Rinkle Rani

Improving malware detection using big data and
 ensemble learning

Computers and Electrical
 Engineering

2020

2.663

489.           

Muskaan Singh, Ravinder Kumar and Inderveer Chana

Improving Neural Machine Translation for Low-Resource Indian Languages Using Rule-based Feature Extraction

Neural Computing & Applications

2020

4.664

490.           

Jitendra Kumar Samriya, Subhash Chandra Patel, Manju Khurana, Pradeep Kumar Tiwari, Omar Cheikhrouhou

Intelligent SLA-Aware VM Allocation and Energy Minimization Approach with EPO Algorithm for Cloud Computing Environment

Mathematical Problems in Engineering

2020

1.009

491.           

Anish Jindal, Neeraj Kumar, Mukesh Singh:

Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM.

Future Gener. Comput. Syst.

2020

5.768

492.           

Sunil Kumar Mahla, Rohan Singh Leekha, Amit Dhir, Kyungroul Lee,
Hoon Ko

Intervention of Artificial Neural Network with an
improved activation function to predict the performance
and emission characteristics of a biogas powered dual
fuel engine

Electronics

2020

2.412

493.           

Pooja Anand, Yashwant Singh, Arvind Kumar Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges.

IEEE Access

2020

3.745

494.           

Zeeshan Ali, Sajid Hussain, Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar, Shehzad Ashraf Chaudhry

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments.

IEEE Access

2020

3.745

495.           

G Sharma, A Kotia, SK Ghosh, PS Rana, S Bawa and MKH Ali

Kinematic Viscosity Prediction of Nanolubricants Employed in Heavy Earth Moving Machinery using Machine Learning Techniques

International Journal of Precision Engineering and Manufacturing

2020

1.38

496.           

M Heydari, Alexios Mylonas, Vahid H F Tafreshi, Elhadj B, Surjit Singh

Known unknowns: Indeterminacy in authentication in IoT

Future Generation Computer Systems, Elsevier

2020

6.125

497.           

Sivashankari Rajadurai, Mamoun Alazab, Neeraj Kumar, Thippa Reddy Gadekallu

Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata

IEEE Access

2020

3.745

498.           

Vivek Dabra, Anju Bala, Saru Kumari

LBA-PAKE: Lattice-based Anonymous Password Authenticated Key Exchange for mobile devices,

IEEE Systems Journal

2020

3.987

499.           

Simar Preet Singh, Anju Sharma, Rajesh Kumar, Anand Nayyar

Leveraging Energy Efficient Load Balancing Algorithms in Fog Computing

Concurrency and Computation: Practice and Experience

2020

1.447

500.           

Gaurang Bansal, Naren Naren, Vinay Chamola, Biplab Sikdar, Neeraj Kumar, Mohsen Guizani

Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function.

IEEE Transactions on Vehicular Technology

2020

2.243

501.           

Ravneet Kaur, Ravinder Kumar and PS Rana

Long Short Term Memory Neural Network Based Multi-level Model for Smart Irrigation

Modern Physics Letters B

2020

1.224

502.           

Sahil Vashisht, Sushma Jain, G. Ahuja

MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges

Computer Communications

2020

2.816

503.           

R Kaur, R Kumar and PS Rana

Machine Learning Based Crop Water Demand Forecasting using Minimum Climatological Data

Multimedia Tools and Applications

2020

2.313

504.           

Anshu Parashar,Nidhi Kalra, Jaskirat Singh, Raman KumarGoyal

Machine Learning Based Framework for Classification of Children with ADHD and Healthy Controls

Intelligent
Automation
&Soft
Computing

2020

1.276

505.           

Harkawalpreet Kaur,Avleen Kaur Malhi, Husanbir Singh Pannu

Machine learning ensemble for neurological disorders

Neural Computing and Applications

2020

4.7

506.           

Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar

Machine Learning Models for Secure Data Analytics: A taxonomy and threat model.

Computer Communications

2020

2.816

507.           

Chaman Verma, Veronika Stoffová, Zoltán Illés, Sudeep Tanwar, Neeraj Kumar

Machine Learning-Based Student's Native Place Identification for Real-Time.

IEEE Access

2020

3.745

508.           

Muskaan Singh, Ravinder Kumar and Inderveer Chana

Machine Translation Systems for Indian Languages: Review of Modelling Techniques, Challenges, Open Issues and Future Research Directions

Archives of Computational Methods in Engineering

2020

7.242

509.           

Deepak Mehta, Sharad Saxena

MCH-EOR: Multi-objective Cluster Head based Energy aware Optimized Routing algorithm in Wireless Sensor Networks

Sustainable Computing: Informatics and Systems

2020

2.798

510.           

Vijay Prakash, Seema Bawa, Lalit Garg

Multi- Dependency and Time, Based Scheduling Algorithm for Scientific Applications in Cloud Environment.

Electronics

2020

2.412

511.           

Raman Singh, Maninder Singh, Sheetal Garg, Ivan Perl, Olga Kalyonova, Aleksandr Penskoi

Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment

Journal of Ambient Intelligence and Smart Environments

2020

1.595

512.           

Vyabhav Chaturvedi, Arman Beer Kaur, Vedansh Varshaney, Anupam Garg, Gurpal Chhabra and Munish Kumar

Music Mood and Human Emotion Recognition Based on Physiological Signals: A Systematic Review

Multimedia Systems

2020

1.56

513.           

N. Kumar, M. Gupta, D. Gupta, S. Tiwari

Novel deep transfer learning model for COVID‑19 patient detection using X‑ray chest images

Journal of Ambient Intelligence and Humanized Computing, Springer

2020

4.594

514.           

Priya Arora, Ashutosh Mishra, Avleen Malhi,

N-semble based method for Parkinson’s disease gene identification

Neural Computing and Applications

2020

4.774

515.           

Anil Kumar Sutrala, Palak Bagga, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Pascal Lorenz

On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment.

IEEE Transactions on Vehicular Technology

2020

2.243

516.           

R K Sharma; Harjeet Singh;

Online handwriting recognition systems for Indic and non-Indic scripts: a review

Artificial Intelligence Review

2020

5.9

517.           

H. Singh, R. K. Sharma and V. P. Singh

Online handwriting systems for Indic and non-Indic scripts

Artificial Intelligence Review

2020

5.747

518.           

Diksha Hooda; Rinkle Rani

Ontology driven human activity
 recognition in heterogeneous sensor measurements

Journal of Ambient
 Intelligence and Humanized Computing

2020

4.594

519.           

Gurleen Kaur, Anju Bala

OPSA: An Optimized Prediction based Scheduling Approach for Scientific Applications in Cloud Environment

Cluster Computing

2021

3.458

520.           

Monika Bharti, Sharad Saxena, Rajesh Kumar, Himanshu Jindal

Optimal Resource Selection Framework on Internet-of-Things

Computers and Electrical Engineering

2021

2.663

521.           

Manju Khurana, Shivendra Shivani, Shailendra Tiwari, Bhisham Sharma, Mohammad S Obaidat, Kuei-Fang Hsiao

Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.

Adhoc & Sensor Wireless Networks

2021

0.948

522.           

N Hooda, PS Rana and S Bawa

Optimizing Fraudulent Firm Prediction using Ensemble Machine Learning: A Case Study of an External Audit

Applied Artificial Intelligence

2021

1.17

523.           

Maninder Singh, Rajesh Bhatia

Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram

Information and Software Technology

2021

2.726

524.           

Sumedha Arora, Anju Bala

PAP: power aware prediction based framework to reduce disk energy consumption

Cluster Computing

2021

3.548

525.           

Rajat Chaudhary, Neeraj Kumar

PARC: Placement Availability Resilient Controller Scheme for Software-Defined Datacenters.

IEEE Transactions on Vehicular Technology

2021

2.243

526.           

Tejasvi Alladi, Vinay Chamola, Naren Naren, Neeraj Kumar

PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks.

Computer Communications

2021

2.816

527.           

Shubhani Aggarwal, Neeraj Kumar

Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges.

Computer Communications

2021

2.816

528.           

Munish Kumar, M. K. Jindal, R. K. Sharma and Simpel Rani Jindal

Performance evaluation of classifiers for the recognition of offline handwritten Gurmukhi characters and numerals: a study

Artificial Intelligence Review

2021

5.747

529.           

S Sharma and V Kumar

Performance Evaluation of Machine Learning Based Face Recognition Techniques

Wireless Personal Communications

2021

1.061

530.           

Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Omprakash Kaiwartya, Mohammad S. Obaidat

PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System.

IEEE Syst. J.

2021

3.987

531.           

Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar

PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs.

IEEE Computer

2021

3.564

532.           

Vikram Chopra, Ravinder Kumar, Nirbhow Jap Singh and Vikash sharma

Position Control of PMBLDC Motor using ANFIS and SVR based controller

National Academy Science Letters

2021

0.331

533.           

Harjeet Singh, M Malarvel

Post-processing algorithms for the formation of online handwritten Gurmukhi character/akshara

Journal of Intelligent & Fuzzy Systems

2021

1.851

534.           

A Sharma, N Jindal and PS Rana

Potential of Generative Adversarial Net Algorithms in Image and Video Processing Applications - A Survey

Multimedia Tools and Applications

2021

2.31

535.           

Harpreet Singh, PS Rana, Urvinder Singh

Prediction of drug synergy in cancer using ensemble-based machine learning techniques.

Modern Physics Letters B

2021

0.73

536.           

Harpreet Singh, PS Rana, Urvinder Singh

Prediction of drug synergy score using ensemble based differential evolution.

IET Systems Biology

2021

1.392

537.           

Shiva Raj Pokhrel, Youyang Qu, Surya Nepal, Surjit Singh

Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach

IEEE Transactions on Intelligent Transportation Systems

2021

6.319

538.           

Amritpal Singh, Sahil Garg, Ravneet Kaur, Shalini Batra, Neeraj Kumar, Albert Y. Zomaya

Probabilistic data structures for big data analytics: A comprehensive review.

Knowledge Based Systems

2021

5.101

539.           

Akhtar Husain, Santar Pal Singh, S.C. Sharma,

PSO Optimized Geocast Routing in VANET

Wireless Personal Communications

2021

1.06

540.           

Deepika Ghai, Hemant Kumar Gianey, Arpit Jain, Raminder Singh Uppal

Quantum and dual-tree complex wavelet transform-based image watermarking

International Journal of Modern Physics B

2021

0.9

541.           

Banerjee, Sneha, Sawinder Kaur, and Parteek Kumar

Quote examiner: verifying quoted images using web-based text similarity

Multimedia Tools and Applications

2021

2.313

542.           

J Bhattacharya, RK Sharma

Ranking-based triplet loss function with intra-class mean and variance for fine-grained classification tasks

Soft Computing

2021

3.05

543.           

Shivendra Shivani, Subhash Chandra Patel, Vinay Arora, Bhisham Sharma, Alireza Jolfaei, Gautam Srivastava

Real-time cheating immune secret sharing for remote sensing images

Journal of real time image processing

2021

1.96

544.           

Harjeet Singh, VP Singh, Munish Kumar

Recognition of online handwritten Gurmukhi characters using recurrent neural network classifier

Soft Computing

2021

3.05

545.           

Vivek Dabra, Anju Bala, Saru Kumari

Reconciliation based Key Exchange Schemes using Lattices: A Review

Telecommunication Systems

2021

1.734

546.           

Amarjeet Prajapati,  Anshu Parashar,  Jitender Kumar  Chhabra

Restructuring Object-Oriented Software
 Systems Using Various Aspects of Class Information

Arabian Journal for Science and
Engineering

2021

1.7

547.           

Pramod Soni, Navin Rajpal, Rajesh Mehta

Road Centerline Extraction From VHR Images Using SVM and Multi-
Scale Maximum Response Filter

Journal of the Indian Society of Remote Sensing

2021

1.102

548.           

Pramod Soni, Navin Rajpal, Rajesh Mehta

Road network extraction using multi-layered filtering and tensor voting
from aerial images

The Egyptian Journal of Remote Sensing and Space Sciences

2021

 

549.           

Shubham Goel, Ravinder Kumar, Ashwani Kumar and Reetu Malhotra

S3A:Smart Station Search Assistance for Electric Vehicle - a step towards smart city

IEEE Consumer Electronics Magazine

2021

3.273

550.           

Mohd. Abuzar Sayeed, Rajesh Kumar, Vishal Sharma

Safeguarding Unmanned Aerial Systems (UAS): An Approach for Identifying Malicious Aerial Nodes

IET Communications

2021

1.664

551.           

Sitender and Seema Bawa.

Sanskrit to universal networking language enconverter system based on deep
 learning and context-free grammar.

Multimedia Systems

2021

1.563

552.           

Akhil Kumar, Arvind Kalia, Kinshuk Verma, Akashdeep Sharma and Manisha Kaushal

Scaling up face masks detection with YOLO on a novel dataset

Optik- International Journal for Light and Electron Optics,

2021

2.187

553.           

Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo:

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.

Sci. China Inf. Sci.

2021

2.205

554.           

Mamta and Brij B. Gupta

Secure Fine-Grained Keyword Search with Efficient User Revocation and Traitor Tracing in the Cloud

Journal of Organizational and End Computing

2021

0.75

555.           

Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar

Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.

IEEE Transactions on Vehicular Technology

2021

2.243

556.           

Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.

IEEE Transactions on Dependable and Secure Computing

2021

6.404

557.           

Arunima Ghosh, Shashank Gupta, Amit Dua, Neeraj Kumar

Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects.

Journal of Network and Computer Applications

2021

5.57

558.           

Pramod Kumar Soni, Navin Rajpal, Rajesh Mehta

Semiautomatic Road Extraction Framework Based on Shape Features and LS-SVM from High-Resolution Images

J. Indian Soc Remote Sens

2021

0.869

559.           

Sugandi Verma, Parteek Kumar, Sanmeet Kaur

Sign Language Generation System Based on Indian Sign Language Grammar

ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)

2021

1.36

560.           

Sugandhi, Parteek Kumar, and Sanmeet Kaur

Sign Language Generation System Based on Indian Sign Language Grammar.

ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)

2021

1.42

561.           

B Garg, VP Rathor and PS Rana

Significance Driven Inverse Distance Weighted Filter to Restore Impulsive Noise Corrupted X-ray Image

Journal of Ambient Intelligence and Humanized Computing

2021

4.59

562.           

Zhihan Lv, Neeraj Kumar

Software defined solutions for sensors in 6G/IoE.

Computer Communications

2021

2.816

563.           

Ashima Singh, Amrita Kaur, Arwinder Kaur, Sahil Ahuja, Harpreet Vohra

Software System to predict the infection in COVID-19 Patients using Deep learning and Web of Things

Software:Practice and Experience

2021

1.78

564.           

Shubham Goel and Ravinder Kumar

SoTaRePo: Society-Tag Relationship Protocol based architecture for UIP construction

Expert Systems With Applications

2021

5.452

565.           

Aaisha Makkar, Neeraj Kumar, Albert Y. Zomaya, Shalini Dhiman:

SPAMI: A cognitive spam protector for advertisement malicious images.

Information Sciences

2021

5.524

566.           

Rupinder Kaur, Parteek Kumar

Speaker Classification with Support Vector Machine and Crossover-Based Particle Swarm Optimization

International Journal of Pattern Recognition and Artificial Intelligence

2021

1.375

567.           

J Bhattacharya, G Ramponi

Speeded-up Convolution Neural Network for classification tasks using multiscale 2-dimensional decomposition

NeuroComputing

2021

4.43

568.           

Vivek Mehta, Seema Bawa, Jasmeet Singh

Stamantic Clustering: Combining Statistical and Semantic Features for Clustering of Large Text Datasets

Expert System With Applications

2021

5.452

569.           

Amrita kaur, Lakhwinder kaur and Ashima Singh

State of the art segmentation techniques and future directions for Multiple Sclerosis Brain Lesions

Archives of Computational Methods in Engineering

2021

7.36

570.           

Patel Jay, Vasu Kalariya, Pushpendra Parmar, Sudeep Tanwar, Neeraj Kumar, Mamoun Alazab:

Stochastic Neural Networks for Cryptocurrency Price Prediction.

IEEE Access

2021

3.745

571.           

Sachin Kansal, Mohd. Zubair, Bhivraj Suthar, Sudipto Mukherjee

Tele-operation of an Industrial Robot by an Arm Exoskeleton for Peg-in-Hole
Operation Using Immersive Environments

Robotica

2021

1.5

572.           

Zhongshao Kuang, Shuangyuan Dai, Yinjuan Xiao, Weio Luo, Jing Tian, Ashutosh Sharma, Shailendra Tiwari, Manish Gupta, Manjit Kaur, and Mohd Asif Shah

The Effect of Biofeedback Therapy Combined with Comprehensive Nursing Intervention on the Quality of Life of Patients with Functional Constipation Based on Dynamic Magnetic Resonance Defecation

Journal of Healthcare Engineering

2021

1.803

573.           

Rajendra Kumar Roul

Topic modeling combined with classification technique for extractive multi-document text summarization

Soft Computing

2021

3.05

574.           

T Bhatia, AK Verma, G Sharma

Towards a secure incremental proxy re‐encryption for e‐healthcare data sharing in mobile cloud computing.

Concurrency and Computation: Practice and Experience

2021

1.447

575.           

J Kaur, PS Rana and AK Verma,

Toxicity prediction of small drug molecules binding to aryl hydrocarbon receptor using ensemble model

Wireless Personal Communications

2021

0.91

576.           

Rajanpreet Kaur Chahal, Neeraj Kumar, Shalini Batra

Trust management in social Internet of Things: A taxonomy, open issues, and challenges.

Computer Communications

2021

2.816

577.           

Shivam Behl, Aman Rao, Sahil Aggarwal, Sakshi Chadha, H.S.Pannu

Twitter for Disaster Relief Through Sentiment Analysis for COVID-19 and Natural Hazard Crises

International Journal of Disaster Risk Reduction

2021

2.8

578.           

Khan Muhammad, Salman Khan, Neeraj Kumar, Javier Del Ser, Seyedali Mirjalili

Vision-based personalized Wireless Capsule Endoscopy for smart healthcare: Taxonomy, literature review, opportunities and challenges.

Future Gener. Comput. Syst.

2021

5.768

579.           

Sahil Sharma and Vijay Kumar

Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning

Multimedia Tools and Applications

2021

2.313

580.           

Sahil Sharma and Vijay Kumar

Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing

Multimedia Tools and Applications

2021

2.313

581.           

Quoc-Viet Pham, Seyedali Mirjalili, Neeraj Kumar, Mamoun Alazab, Won-Joo Hwang

Whale Optimization Algorithm With Applications to Resource Allocation in Wireless Networks.

IEEE Transactions on Vehicular Technology

2021

2.243

582.           

Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar

When Blockchain Meets Smart Grid: Secure Energy Trading in Demand Response Management.

IEEE Network

2021

9.59

583.           

Qi Feng, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo

White-Box Implementation of Shamir's Identity-Based Signature Scheme.

IEEE Syst. J.

2021

3.987

Year 2016-17 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 Cloud-based automatic test data generation framework Journal of Computer and System Sciences,Vol. 82, no. 5, PP. 712–738, 2016 Priyanka Chawla, Inderveer Chana and Ajay Rana 1.1380
2 Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi Neural Computing and Applications, 2016 Karun Verma, RK Sharma 1.4920
3 An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition Journal of Engineering Research,4(1), 1-20, 2016 Teena Mitaal, R. K. Sharma 0.1280
4 Green Service Level Agreement (GSLA) Framework for Cloud Computing Computing, Springer,Volume 98, Issue 9, pp 949–963, 2016 Goyal, S. ; Bawa, S. ; Singh, B 0.8720
5 Comparative analysis of cloud data integrity auditing protocols Journal of Network and Computer Applications, Vol. 66 Issue C, May 2016, pp 17-32.,2016 Neeru Garg, Seema Bawa 2.3310
6 Energy optimized resource scheduling algorithm for private cloud computing International Journal of Ad Hoc and Ubiquitous Computing,Vol. 23, Issue 1-2, 2016 S. Goyal, S. Bawa and B. Singh 0.4930
7 Detecting And Containing Malicious Services In An Intercloud Environment Journal of Web Engineering,Vol. 15, No.5&6 (Apr 2016), pp: 521-538, 2016 Lohit Kapoor, Seema Bawa, Ankur Gupta 0.3900
8 Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy ACM Computing Surveys,Volume 48 Issue 2, Article 22, 2016. Tarandeep Kaur and Inderveer Chana 3.7300
9 EARTH- Energy-aware Autonomic Resource Scheduling in Cloud Computing Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 Sukhpal Singh and Inderveer Chana 1.8120
10 Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach Journal of Grid Computing,Volume 14, Issue 2, pp. 327–345, 2016 Nidhi Jain Kansal, Inderveer Chana 1.5070
11 Energy aware scheduling of deadline-constrained tasks in cloud computing Journal of Cluster Computing,Volume 19, Issue 2, pp 679–698, 2016 Tarandeep Kaur and Inderveer Chana 1.5000
12 Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks Mobile Information Systems, 2016 Vishal Sharma, Ilsun You, Rajesh Kumar 0.8720
13 A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks  International Journal of Ad Hoc and Ubiquitous Computing, Vol. 21, issue 2, pp. 140–155, 2016 Suman Bala, Anil K. Verma 0.6900
14 Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wireless Personal Communications,Vol. 89 No.2, 1-21, 2016 Goyal, Nitin, Mayank Dave, and Anil Kumar Verma 0.6500
15 Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks Transactions on Internet & Information Systems,Vol. 10 Issue 4, p1571-1589, 2016 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.5600
16 A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. Digital Scholarship in the humanities, 2016 Agarwal, Vaibhav, and Parteek Kumar 0.4300
17 Fuzzy state Grammar and Fuzzy Deep Pushdown Automata Journal of Intelligent and Fuzzy Systems,31(1), 249-258, 2016 Nidhi Kalra, Ajay Kumar 1.0040
18 An efficient scheme for automatic web pages categorization using the support vector machine The New Review of Hypermedia and Multimedia,vol. 22, no. 3, pp. 223-242, 2016 Vinod Kumar Bhalla, Neeraj Kumar 0.6500
19 A Recursive Algorithm for Generalized Constraint SCS Problem National Academy Science Letters,pp 273-276, 2016 Kaish Mangal and Ravinder Kumar 0.3450
20 Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling An International Journal Applied Mathematics & Information Sciences,1193-1201; 2016 Sandeep Saharan and Ravinder Kumar 1.2320
21 A systematic review of approaches for testing concurrent programs Concurrency and Computation: Practice And Experience,Vol. 5, pp. 1572 – 1611 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.9400
22 Conversion of fuzzy automata into fuzzy regular expressions using transitive closure Jounal of Intelligent & Fuzzy Systems vol.30,pp.3123-3129, 2016 Sunita Garhwal and Ramjiwari 1.0040
23 An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar 0.1710
24 Block based High Capacity Multilevel Image Steganography Journal of Circuits, Systems and Computers, pp 1-21, 2016 Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia 0.3300
25 Multi-Model Persistent Solution for Healthcare Big Data Journal of Medical Imaging and Health Informatics, 2016 Karamjit Kaur and Rinkle Rani 0.5800
26 A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering, 2016 Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin 1.0840
27 A Survey on Resource Scheduling in Cloud Computing Issues and Challenges Journal of Grid Computing,Vol 14, no. 2, pp 217–264, 2016 Sukhpal Singh and Inderveer Chana 1.5000
28 A Hybrid-Cascaded Framework for PET and SPECT Image Reconstruction Journal of Medical Imaging & Health Informatics (JMIHI) Vol. 6, 2016 Shailendra Tiwari, Rajeev Srivastava 0.8770
29 A genetic algorithm based distance-aware routing protocol for wireless sensor networks Computers & Electrical Engineering,vol. 56, pp. 441-455, 2016 Tarunpreet Bhatia, Simmi Kansal Shivani Goel, A. K. Verma 1.5700
30 Progressive Visual Cryptography with Unexpanded Meaningful Shares In ACM Transactions on Multimedia Computing Communication and Application, Vol 12(4), 2016 Shivendra Shivani, Suneeta Agarwal 2.2500
31 Novel Basis Matrix Creation and Preprocessing Algorithms for Friendly Progressive Visual Secret Sharing with Space-Efficient Shares MULTIMEDIA TOOLS AND APPLICATIONS , 2016 Shivendra Shivani, Suneeta Agarwal 1.5300
32 VPVC: Verifiable Progressive Visual Cryptography Pattern Analysis and Application,Vol 19, No. 3. , 2016 Shivendra Shivani, Suneeta Agarwal 1.3500
33 Self authenticating medical X-ray images for telemedicine applications MULTIMEDIA TOOLS AND APPLICATIONS, 2016 Rajitha B, Shivendra Shivani, Suneeta Agarwal 1.5300
34 Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System Computers & Electrical Engineering 52: 82-97, 2016 Rasmeet S. Bali, Neeraj Kumar 1.5700
35 An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud Peer-to-Peer Networking and Applications 9(5): 824-840, 2016 Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal 1.2620
36 A novel covert channel detection method in cloud based on XSRM and improved event association algorithm Security and Communication Networks 9(16): 3543-3557, 2016 Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao 1.0670
37 A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography Security and Communication Networks 9(17): 3944-3951, 2016 Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues 1.0670
38 Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures IEEE -Trans. Information Forensics and Security 11(9): 2052-2064, 2016 Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu 4.3320
39 A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem The Journal of Supercomputing 72(9): 3588-3600, 2016 Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti 1.3260
40 Fuzzy-based trust prediction for effective coordination in vehicular ad hoc networks International Journal Of Communication Systems, 2016 Avleen Kaur Malhi, Shalini Batra 1.0660
41 Improved Multi-Objective Particle Swarm Optimization Algorithm for Optimizing Watermark Strength in Color Image Watermarking Applied Intelligence, 2016 Nitin Saxena and K.K. Mishra 1.9040
42 A Nature Inspired Hybrid Optimization Algorithm for Dynamic Environment with Real Parameter Encoding International Journal of Bio-Inspired Computation, 2016 Ashish Tripathi, Nitin Saxena, K. K. Mishra and A. K. Misra 1.3900
43 A parallel fuzzy clustering algorithm for large graphs using Pregel Expert Systems with Applications,Vol. 78, pp. 135-144, 2016 Vandana Bhatia and Rinkle Rani 3.9300
44 A Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks Journal of communications and Networks,Vol. 18, No. 6, pp. 938-947, 2016 Anjali Anand, Rinkle Rani and Himanhsu Aggarwal 1.1300
45 Content-based image retrieval embedded with agglomerative clustering built on information loss Computers & Electrical Engineering 54,506-521, 2016 Shreelekha Pandey, Pritee Khanna 1.5700
46 Clustering of hierarchical image database to reduce inter-and intra-semantic gaps in visual space for finding specific image semantics Journal of Visual Communication and Image Representation,704-720, (2016) Shreelekha Pandey, Pritee Khanna, Haruo Yokota 2.1640
47 A semantics and image retrieval system for hierarchical image databases Information Processing & Management,571-591, 2016 Shreelekha Pandey, Pritee Khanna, Haruo Yokota 2.1640
48 G-FANET: An Ambient Network Formation Between Ground and UAVs Telecommunication Systems,pp 1-24, 2016 Vishal Sharma, Rajesh Kumar 0.8220
49 A Multi-model Persistent Solution for Healthcare Big Data/td> Journal of Medical Imaging and Health Informatics,pp 937-947, 2016 Karamjit Kaur, Rinkle Rani 0.9000
50 EMD based Steganography Techniques for JPEG2000 Images and Videos International Journal of Wavelets, Multiresolution and Information Processing, pp. 937-947, 2016 Karamjit Kaur, Rinkle Rani 0.9000
51 Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN AEU-International Journal of Electronics and Communications, 2016 Ramnik Singh, A K Verma 0.7860
52 A Novel Framework for Grading Writers using Offline Gurmukhi Characters Proceedings of the National Academy of Sciences, India Section A: Physical Sciences,405-15, 2016 Munish Kumar, R. K. Sharma and M. K. Jindal 0.1790
53 Integrated search technique for parameter determination of SVM for speech recognition Journal of Central South University, 2016 Teena Mitaal, R. K. Sharma 0.5200
54 A note on data mining based noise diagnosis and fuzzy filter design for image processing Computers and Electrical Engineering,49-, 50, 2016 Rajiv Kumar, Khushneet Jindal 1.0840
55 Multicast protection and grooming scheme in survivable WDM optical networks International Journal of Communication System,42-57, 2016 Ashok Kumar, Pradhan, SayanGhose, Tanmay de 1.8600
56 Node stability aware single node failure recovery approach for WSANS MJC,Vol. 29, No. 2, 2016 V Ranga, M Dave, AK Verma 0.4000
57 One-to-many authentication for access control in mobile pay-TV systems SCIENCE CHINA Information Sciences 59(5), 2016 Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee 1.6280
58 Optimal nodes selection in wireless sensor and actor networks based on prioritized  mutual exclusion approach Kuwait Journal of Science,vol. 43, pp. 150-173, 2016. Virendra Ranga, M Dave, A K Verma 0.5000
59 PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks Wireless Personal Communications,Volume 87, Issue 3, pp 995–1012,2016 Gaurav Sharma, Suman Bala, Anil K. Verma 0.6500
60 Prediction based proactive load balancing approach through VM migration. Engineering with Computers,581-592, 2016 AnjuBala and Inderveer Chana 1.4600
61 Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming Advances in Materials Science and Engineering, 2016 Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar 1.010
62 Prediction-based proactive load balancing approach through VM migration Engineering with Computers,pp. 581-592, 2016 Anju Bala, Inderveer Chana 1.4510
63 Predictive hierarchical human augmented map generation for itinerary perception IET Electronic Letters, Vol 52, 2016 Baljeet Kaur and Jhilik Bhattacharaya 0.9400
64 Protein structure prediction (RMSD <= 5A") using machine learning models International Journal of Data Mining and Bioinformatics,71-85, 2016 Y Pathak, PS Rana, PK Singh and M Saraswat 0.7000
65 QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review/td> ACM Computing Surveys, 2016 Sukhpal Singh and Inderveer Chana 3.7300
66 Quantum neural network based machine translator for English to Hindi Applied Soft Computing 38,1060–1075, 2016 Ravi Narayana, S. Chakraverty, V.P. Singh 2.8000
67 Regression Based Weight Generation Algorithm in Neural Networks for Estimation of Frequencies of Vibrating Plate Journal of Computer Methods in Applied Mechanics and Engineering,4194-4202, 2016 S. Chakraverty, V. P. Singh and R. K. Sharma 3.4600
68 Resource Provisioning and Scheduling in Clouds: QoS Perspective The Journal of Supercomputing,Vol. 72, no. 3, pp 926–960, 2016 Sukhpal Singh and Inderveer Chana 0.8500
69 Secure clustering for efficient data dissemination in vehicular cyber-physical systems Future Generation Comp. Syst. 56: 476-492, 2016 Rasmeet S. Bali, Neeraj Kumar 3.9970
70 Security analysis and design of an efficient ECC based two-factor password authentication scheme Security and Communication Networks, 2016 Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin 0.8060
71 Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs IEEE Communications Letters,Volume: 19, Issue: 11, 2016 Vishal Sharma, Rajesh Kumar, Prashant Singh 1.2910
72 Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis The Journal of Supercomputing, pp. 1–28,2016 Rajkumar Tekchandani, Rajesh Bhatia and Maninder Singh 1.3260
73 SERVmegh: framework for green cloud Concurrency and Computation, 2016 Ashok Kumar, Anju Sharma, Rajesh Kumar 0.9420
74 SOCCER: Self-Optimization of Energy-efficient Cloud Resources Cluster Computing , Vol. 19, no. 4, pp. 1787-1800, 2016 Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya 1.1540
75 Software component and the semantic Web: An in-depth content analysis and integration history Journal of System and Software, Vol.125, pages152-169, 2016. Loveleen Kaur, Ashutosh Mishra 2.4440
76 Speech recognition using ANN and predator influenced civilized swam optimization algorithm Turkish Journal of Electrical Engineering & Computer Sciences 24, 4780-803, 2016 Teena Mitaal, R. K. Sharma 0.5070
77 State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids Current Bioinformatics, 11(4), 470-479, 2016 Nidhi Kalra, Ajay Kumar 0.7700
78 Statistical Feature Extraction Based Iris Recognition System Sadhana-Academy Proceedings in Engineering Sciences, 507-18, 2016 Atul Bansal, R. Agarwal and R. K. Sharma 0.5870
79 Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks International Journal of Communication Systems, pp 1-25, 2016 Vishal Sharma, Rajesh Kumar 1.0990
80 Three Tier Neural Model For Service Provisioning Over Collabrative Modulus Operator for Digital Images Neural Computing and Applications, pp. 1-21, 2016 Vishal Sharma, Rajesh Kumar 1.4920
81 UAV Assisted Capacity Enhancement In Heterogenous Networks IEEE Communications Letters,Volume: 20, Issue: 6, Pages: 1207 - 1210, 2016 Vishal Sharma, Mehdi Bennis, Rajesh Kumar 1.2910
82 UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks International Journal of Ad Hoc and Ubiquitous Computing, 2016 Vishal Sharma, Rajesh Kumar 0.4930
83 Vehicular delay-tolerant networks for smart grid data management using mobile edge computing IEEE Communications Magazine54(10): 60-66, 2016 Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues 10.4350
84 Wireless and Mobile Technologies for the Internet of Things Mobile Information Systems , 2016 Wireless and Mobile Technologies for the Internet of Things 0.8490
85 Job Migration Policies for Grid Environment Wireless Personal Communication, 2016 Neeraj Kumar Rathore and Inderveer Chana 0.951

Year 2015-16 (SCI)

List of research publications in SCI/Impact Factor journals

S. No Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi Neural Computing and Applications, 27(3), 2016 Karun Verma, R. K. Sharma 1.492
2 An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition Journal of Engineering Research, 4(1), 1-20, 2016 Teena Mitaal, R. K. Sharma 0.128
3 Quantitative Reduction in Communication Load for Energy Efficiency in WSN Wireless Personal Communications (WPC), Vol. 83, Number (4), August (II) 2015, pp.1-16. Vandana Jindal, A.K. Verma, Seema Bawa 0.693
4 QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks Mobile Network and Applications, December 2015, Volume 20, Issue 6, pp 773–780 Amit Dua, Neeraj Kumar, Seema Bawa 1.045
5 Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud International Journal of Next-Generation Computing, Vol. 6, No. 3, November 2015 Lohit Kapoor, Seema Bawa, Ankur Gupta 0.3
6 Green Service Level Agreement (GSLA) Framework for Cloud Computing Computing, Springer, Volume 98, Issue 9, pp 949–963 Goyal, S. ; Bawa, S. ; Singh, B 0.872
7 Comparative analysis of cloud data integrity auditing protocols, Journal of Network and Computer Applications, Elsevier, Vol. 66 Issue C, May 2016, pp 17-32. Neenu Garg, Seema Bawa 2.331
8 Energy optimized resource scheduling algorithm for private cloud computing International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. S. Goyal, S. Bawa and B. Singh 0.493
9 Detecting And Containing Malicious Services In An Intercloud Environment Journal of Web Engineering, Vol. 15, No.5&6 (Apr 2016), pp: 521-538. Lohit Kapoor, Seema Bawa, Ankur Gupta 0.39
10 Q-aware: Quality of Service based Cloud Resource Provisioning Computers & Electrical Engineering Journal, Elsevier, October 2015, Vol. 47, Pages 138–160 Sukhpal Singh and Inderveer Chana 0.817
11 Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy ACM Computing Surveys (CSUR) Volume 48 Issue 2, February 2016 Article No. 22 Tarandeep Kaur and Inderveer Chana 3.73
12 EARTH- Energy- aware Autonomic Resource Scheduling in Cloud Computing Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 Sukhpal Singh and Inderveer Chana 1.812
13 QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review ACM Computing Surveys (CSUR) Volume 48 Issue 3, Article No. 42 Sukhpal Singh and Inderveer Chana 3.73
14 Prediction-based proactive load balancing approach through VM migration Engineering with Computers, Springer, pp. 581-592 , January 2016 Anju Bala, Inderveer Chana 1.451
15 Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach Journal of Grid Computing, Springer, June 2016, Volume 14, Issue 2, pp. 327–345 2016, Nidhi Jain Kansal, Inderveer Chana 1.507
16 Energy aware scheduling of deadline-constrained tasks in cloud computing Journal of Cluster Computing,June 2016, Volume 19, Issue 2, pp 679–698 Tarandeep Kaur and Inderveer Chana 1.5
17 Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks International Journal of Communication Systems DOI: 10.1002/dac.3144 Year: 2016 Vishal Sharma, Rajesh Kumar 1.099
18 Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks IMobile Information Systems Volume: 2016 Year: 2016 Vishal Sharma, Mehdi Bennis, Rajesh Kumar 0.872
19 UAV Assisted Capacity Enhancement In Heterogenous Networks IEEE Communications Letters Year: 2016 Volume: 20 Issue: 6 Pages: 1207 - 1210 VVishal Sharma, Mehdi Bennis, Rajesh Kumar 1.291
20 Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs IIEEE Communications Letters Year: 2016 Volume: 19 Issue: 11 Pages: 2013 – 2016 Vishal Sharma, Rajesh Kumar, Prashant Singh 1.291
21 SERVmegh: framework for green cloud Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3903 Ashok Kumar, Anju Sharma, Rajesh Kumar 0.942
22 Strategies For Replica Consistency In Data Grid – A Comprehensive Survey Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3907 Priyanka Vashisht, Anju Sharma, Rajesh Kumar 0.942
23 Pairing-Free CertificateLess Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor networks Wireless Personal Communications, Vol. 84, Issue 2, pp. 1469-1485, Springer Gaurav Sharma, Suman Bala, Anil K. Verma 0.65
24 PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks Wireless Personal Communications, April 2016, Volume 87, Issue 3, pp 995–1012 Springer AGaurav Sharma, Suman Bala, Anil K. Verma 0.65
25 A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 21, issue 2, pp. 140–155, March, 2016 Suman Bala, Anil K. Verma 0.69
26 Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wireless Personal Communications: 1-21 Vol. 89 No.2 Goyal, Nitin, Mayank Dave, and Anil Kumar Verma 0.65
27 Relay node placement to heal partitioned wireless sensor networks Computers & Electrical Engineering 48, 371-388 V Ranga, M Dave, AK Verma 1.1
28 Node stability aware single node failure recovery approach for WSANS MJCS Vol. 29, No. 2, 2016 V Ranga, M Dave, AK Verma 0.4
29 A Novel Resource Reservation Scheme for Mobile PHEVs in V2G Environment using Game Theoretical Approach IEEE Transactions on Vehicular Technology, vol. 64, pp. 5653-5666, Dec. 2015 Kuljeet Kaur, Amit Dua, Anish Jindal, Neeraj Kumar, Mukesh Singh, Alexy Vinel 2.243
30 An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing Cluster Computing, vol. 18, pp. 1263–1283, Sept. 2015 Neeraj Kumar, Jaskaran Preet Singh, Rasmeet S. Bali, Sudip Misra, Sana Ullah 1.514
31 Cooperation strategies for vehicular delay-tolerant networks IEEE Communications Magazine, vol. 53, pp. 88-94, Dec. 2015 Joao A. F. F. Dias, Joel J. P. C. Rodrigues, Neeraj Kumar, Kashif Saleem 5.125
32 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Information Sciences, vol. 321, pp. 263-277, Nov. 2015 Debiao He, Neeraj Kumar, Naveen Chilamkurti 3.364
33 A systematic review on heterogeneous routing protocols for wireless sensor network Journal of Network and Computer Applications, vol. 53, pp. 39-56, July 2015 Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues 2.331
34 Reliable multicast as a Bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata-based approach International Journal of Ad Hoc and Ubiquitous Computing, vol. 19, pp. 168-182, 2015 Neeraj Kumar, Chun-Cheng Lin 0.5
35 A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments Multimedia Tools and Applications, vol. 74, pp. 6365-6377, Aug. 2015 Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo 1.331
36 Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network Pervasive and Mobile Computing, vol. 22, pp. 90-112, Sept. 2015 Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues 1.719
37 Efficient provably secure password-based explicit authenticated key agreement Pervasive and Mobile Computing, vol. 24, pp. 50-60, Dec. 2015 Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee 1.719
38 Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks IEEE Systems Journal, vol. 9, pp. 1081-1090, Aug. 2015 Neeraj Kumar, Sudip Misra, Mohammad S. Obaidat 2.114
39 QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks IEEE Transactions on Industrial Electronics, vol. 62, pp. 7892-7900, Dec. 2015 Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues 6.383
40 Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems The Journal of Supercomputing, vol. 71, pp. 3258-3287, Sept. 2015 Neeraj Kumar, Rasmeet Singh Bali, Rahat Iqbal, Naveen Chilamkurti, Seungmin Rho 1.088
41 Cooperative Gateway Cache Invalidation Scheme for Internet-Based Vehicular Ad Hoc Networks Wireless Personal Communications, vol. 85, pp. 1789-1814, Dec. 2015 Rajeev Tiwari, Neeraj Kumar 0.701
42 A Smart Polyglot Solution for Big Data in Healthcare IEEE, IT Professional, Volume 17, Issue 6, pp. 48-55, 2015 Karamjit Kaur and Rinkle Rani 1.067
43 A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks Transactions on Internet and Information Systems Vol 9, No. 11, pp. 4701-4719, 2015 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.56
44 Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks Transactions on Internet & Information Systems, Vol. 10 Issue 4, p1571-1589, 2016 Anjali Anand, Rinkle Rani, Himanhsu Aggarwal 0.56
45 A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. April, 2016 Agarwal, Vaibhav, and Parteek Kumar 0.430
46 Quantum neural network based machine translator for English to Hindi Applied Soft Computing 38, 1060–1075, (2016) Ravi Narayana, S. Chakraverty, V.P. Singh 2.8
47 Fuzzy State Grammar and Fuzzy Deep Pushdown Automata AJournal of Intelligent and Fuzzy Systems, 31(1), 249-258, 2016 Nidhi Kalra, Ajay Kumar 1.004
48 State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids Current Bioinformatics, 11(4), 470-479, 2016 Nidhi Kalra, Ajay Kumar 0.77An efficient scheme for automatic web pages categorization using the support vector machine
49 An efficient scheme for automatic web pages categorization using the support vector machine The New Review of Hypermedia and Multimedia, vol. 22, no. 3, pp. 223-242, 2016 Vinod Kumar Bhalla, Neeraj Kumar 0.65
50 An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks Wireless Personal Communications, In Press, DOI:10.1007/s11277-016-3173-4. Vinod Kumar Bhalla, Neeraj Kumar 0.97
51 A Recursive Algorithm for Generalized Constraint SCS Problem National Academy Science Letters 39 (4), pp 273-276 2016 Kaish Mangal and Ravinder Kumar 0.345
52 Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling An International Journal Applied Mathematics & Information Sciences 10 (3), pp 1193-1201 Sandeep Saharan and Ravinder Kumar 1.232
53 A systematic review of approaches for testing concurrent programs Concurrency and Computation: Practice And Experience, Vol. 5, pp. 1572 – 1611, 2016 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.94
54 Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton The Computer Journal bxv104,2015 Sunita Garhwal and Ramjiwari 1.0
55 Conversion of fuzzy automata into fuzzy regular expressions using transitive closure Jounal of Intelligent & Fuzzy Systems vol.30, pp.3123-3129,2016 Sunita Garhwal and Ramjiwari 1.004
56 Predictive hierarchical human augmented map generation for itinerary perception IET Electronic Letters, Vol 52, 2016 Baljeet Kaur and Jhilik Bhattacharaya 0.94
57 An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar IF=0.177
58 Protein structure prediction (RMSD ≤ 5A°) using machine learning models International Journal of Data Mining and Bioinformatics, Inderscience, 14(1):71-85, 2016. Y Pathak, PS Rana, PK Singh and M Saraswat 0.7
59 Block based High Capacity Multilevel Image Steganography Journal of Circuits, Systems and Computers, Vol. 25,No.8,pp.165009(1-21),2016 Kasana, Kulbir Geeta Singh and Satvinder Singh Bhatia 0.33
60 Multi-Model Persistent Solution for Healthcare Big Data Journal of Medical Imaging and Health Informatics, Volume 6, Page nos 937–947 (2016) Karamjit Kaur and Rinkle Rani 0.58
61 Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming Advances in Materials Science and Engineering Volume 2016 (2016), Article ID 7648467, 10 pages http://dx.doi.org/10.1155/2016/7648467 Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar 1.010
62 A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering, In press, 2016 Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin 1.084
63 Security analysis and design of an efficient ECC based two-factor password authentication scheme Security and Communication Networks, In press, 2016 Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin 1.084
64 Resource Provisioning and Scheduling in Clouds: QoS The Journal of Supercomputing, Vol. 72, no. 3, pp 926–960, 2016 Sukhpal Singh and Inderveer Chana 0.85
65 A Survey on Resource Scheduling in Cloud Computing Issues and Challenges Journal of Grid Computing, Vol 14, no. 2, pp 217–264, 2016 Sukhpal Singh and Inderveer Chana 1.50
66                   A systematic review of approaches for testing concurrent programs Concurrency and computation: practice and experience, Vol 28 pp 1572-1611, 2015 Vinay Arora, Rajesh Bhatia, Maninder Singh 0.997
67        Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection Neural Computing and Applications, Vol 26, pp 117-130 Amit Kumar Bhardwaj, Maninder Singh 1.56

Year 2014-15 (SCI)

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata The Computer Journal 10.1093/comjnl/bxu049doi, 2014 Ajay Kumar and Anil Kumar Verma
2.        Improvement in Rebalanced CRT RSA International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5492, Impact Factor: 0.39 Seema Verma Deepak garg;;
3.        Selectivity Estimation of range queries in Data Streams using Micro-clustering International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5856, Impact Factor: 0.39 Sudhanshu Gupta; Deepak garg;
4.        Who Regulates Ethics in Virtual world? Science and engineering ethics Volume 21, no. 1 (2014): pp. 19-28. Seemu Sharma;Hitashi Lomash; and Seema bawa
5.        Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata using Partial Derivatives Chiang Mai Journal of Science Volume 41(5), pp. 1409-1418, 2014 Ajay Kumar; Anil Kumar Verma;
6.        A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata Applied Mathematics, Volume 8(1), pp. 95-105, 2014 Ajay Kumar; Anil Kumar Verma;
7.        Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Applied Mathematics, Volume 8(5), pp. 2389-2393, 2014 Tannu Singla;Ajay Kumar;Sunita Garhwal;
8.        A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs WPC, Springer, Volume 77 pp. 2155-2182, 2014 V Ranga;M Dave; and Anil verma
9.        OANTALG: An Orientation based ANT colony ALGorithm for Mobile Adhoc Networks WPC, Springer, Volume 77 pp. 1859-1884, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
10.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs JNCA, Volume 45 151-167, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
11.    Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem International Arab Journal of Information Technology Volume 11 No 5, 2014 Rattan Rana; and  Deepak garg
12.    Cloud based intelligent system for delivering health care as a service Computer Methods and Programs in Biomedicine, Springer, Volume 113, pp. 346-359, 2014 Pankajdeep Kaur; and Inderveer Chana
13.    A resource elasticity framework for QoS-aware execution of cloud applications FGCS, Volume 37, pp. 14-35, 2014 Pankajdeep Kaur; and Inderveer Chana
14.    Variable Threshold Based Hierarchical Load Balancing Technique in Grid Engineering with computers, springer, Volume 30, 2014 Neeraj Rathore; and Inderveer Chana
15.    Artificial bee colony based energy-aware resource utilization technique for cloud computing CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,, Volume 24, DOI: 10.1002/cpe.3295, 2014 Nidhi Jain Kansal; and Inderveer Chana
16.    Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 21-35, 2014 Neeraj Rathore; and Inderveer Chana
17.    SHAPEâ¿¿an approach for self-healing and self-protection in complex distributed networks The Journal of Supercomputing, Volume 67, pp. 585-613, 2014 Inderpreet Chopra; and Maninder singh
18.    Software clone detection: a systematic review Information and Software technology, Volume 55, pp. 1165-1199, 2014 D Rattan;R Bhatia; and Maninder singh
19.    Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing Frontiers of Computer Science, Volume 8:04, pp. 656-666, 2014 Shi W., Gong P., Zhang Z.; and Neeraj kumar
20.    Learning Automata Based Opportunistic Data Aggregation and Forwarding Scheme for Alert Generation in Vehicular Ad Hoc Networks Computer Communications, Volume 39:01:00, pp. 22-32, 2014 Chilamkurti N., Rodrigues J.J.P.C.; and Neeraj kumar
21.    A two factor authentication scheme for Roaming Service in Global Mobility Networks IEEE Transactions on consumer Electronics, Volume 59:04:00, pp. 811-817 He D.B., Khan M.K., Lee J.K.; and Neeraj kumar
22.    An efficient Password based Three party Authenticated Multiple Key Exchange Protocol for Wireless Networks The Journal of Supercomputing, Volume 70:01:00, pp. 224-235, 2014 ;TIET H, He D, Kim J.; and Neeraj kumar
23.    A Peer-to-Peer Cooperative Caching Scheme for Data Dissemination in Urban Scenarios Using Vehicular Ad Hoc Networks IEEE Systems Journal, Volume 8:04, pp. 1136-1144, 2014 Lee H. J.; and Neeraj kumar
24.    EEMHR: Energy Efficient Multi-levels Heterogeneous Routing Protocol for Wireless Sensor Networks International Journal of Communication Systems Volume 27:09:00 pp. 1289-1318, 2014 Tanwar S;Niu J.; and Neeraj kumar
25.    Detection and Analysis of Secure Intelligent Universal Designated Verifier Signature Scheme for Electronic Voting System The Journal of Supercomputing Volume 70:01:00 pp. 177-199, 2014 Zho L;Tu Hang;Singh A;Chilamkurti N;Rho S; and Neeraj kumar
26.    Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol Journal of Medical Systems Volume 38:116, 2014 He D;Chilamkurti N;Lee J.H.; and Neeraj kumar
27.    LA-EEHSC: Learning Automata based Energy Efficient Heterogeneous Selective Clustering for Wireless Sensor Networks Journal of Networks and Computer Applications Volume 46:11:00 pp. 264-279, 2014 ;Tyagi S;Deng D.J.; and Neeraj kumar
28.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs Journal of Networks and Computer Applications Volume 45 pp. 151-167, 2014 Singh G, Verma A.K.; and Neeraj kumar
29.    Collaborative Trust aware Intrusion Detection in VANETs Computers and Electrical Engineering Volume 40:06:00 pp. 1981-1996, 2014 Chilamkurti N; and Neeraj kumar
30.    Achieving QoS using Resource Allocation and Adaptive Scheduling in Cloud Computing with Support from Grid The Computer Journal Volume 57:02:00 pp. 281-290, 2014 Chilamkurti N., Zeadally S., Jeong Y.S.; and Neeraj kumar
31.    OANTALG: Orientation based ant colony algorithm for MANETs Wireless Personal Communications Volume 77:03:00 pp. 1859-1884, 2014 Singh G, Verma A.K.; and Neeraj kumar
32.    Enhanced Three-factor Security Protocol for USB Consumer Storage Devices IEEE Transactions on consumer Electronics Volume 60:01:00 pp. 30-37, 2014 He D., Khan M.K., Lee J.H; and Neeraj kumar
33.    Bayesian Coalition Game for Contention-aware Reliable Data Forwarding in Vehicular Mobile Cloud Future Generation Computer Systems :10.1016/j.future.2014.10.013, 2014 Iqbal R, Misra S.,Rodrgues J.J.P.C.; and Neeraj kumar
34.    Networks of learning automata for the vehicular environment: a performance analysis study IEEE Wireless Communication Volume 21:06 pp. 41-47, 2014 Misra S, Obaidat M.S., Rodrigues J.J.P.C., Pati B; and Neeraj kumar
35.    An intelligent approach for building a secure decentralized public key infrastructure in VANET Journal of Computer and System Sciences 10.1016/j.jcss.2014.12.016, 2014 Iqbal R, Misra S.,Rodrigues J.J.P.C.; and Neeraj kumar
36.    Power Consumption Based Simulation Model for Mobile Ad-hoc Network J. Wireless Personal communications Volume 77 pp. 1437-1448, 2014 Krishan Kumar; and Vp singh

Year 2013-14 (SCI)

List of research publications in SCI/Impact Factor journals  

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing, pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information,  Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013  Kottayam, Kerala, India Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions International Conference on Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective International Conference on Advances in Computing, Bangalore, 3-4 July, 2012, Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava    
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management Proc. Springer Conf. on Trends in Information, Telecommunication and Computing (ITC2012)LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhawa

Year 2012-13 (SCI)

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors Impact Factor
1.        Software clone detection: A systematic review Information and Software Technology Volume 55, Issue 7, July 2013, Pages 1165–1199 Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh 1.9
2.        CFM-PREFIXSPAN: A Pattern Growth Algorithm Incorporating Compactness And Monetary International Journal of Innovative computing, Information and Control Volume 8, Number 7(A),  2012 pp. 4509-4520 Bhawna Mallick , Deepak Garg and PS Grover 1.9
3.        Publish/subscribe based information dissemination over VANET utilizing DHT Frontiers of Computer Science December 2012, Volume 6, Issue 6 pp 713-724 Tulika Pandey, Deepak Garg, Manoj Madhav Gore 0.298
4.        Progress in gene prediction: Principles and challenges Current Bioinformatics Apr 2013, Vol. 8, No. 2 Srabanti Maji, Deepak Garg 2.017
5.        Progressive CFM-Miner: An Algorithm to Mine CFM- Sequential Patterns from A Progressive Database International Journal of Computational Intelligence Systems Vol. 6, No. 2 Mar, 2013, 209-222 Bhawna Mallick Deepak Garg P S Grover 1.49
6.        Incremental Mining of Sequential Patterns: Progress and Challenges Intelligent Data Analysis- an International Journal, , Volume 17, Number 3, May 2013 Bhawna Mallick Deepak Garg, PS Grover 0.448
7.        Hidden markov model for splicing junction sites identification in DNA sequences, Current Bioinformatics Vol. 8 Issue 3 pp. 369-379, 2013 Srabanti Maji and Deepak Garg 2.017
8.        Predictors of User Satisfaction in ERP in Technical Educational Institutions Information, An International Interdisciplinary Journal,  pp.2885-2894 Vol.16, No.5 Shivani Goel, Ravi Kiran, Deepak Garg 0.2
9.        Ant colony algorithms in MANETs: A review Journal of network and computer applications Gurpreet Singh, Neeraj Kumar, Anil K Verma 1.065
10.    Knowledge sharing for stimulating learning environment in institutions of higher technical education Technics Technology Education Management, 7(4), 1681-1691 Parul Dharmani, Ravi Kiran, Anil K Verma 0.351
11.    Network partitioning recovery mechanisms in WSANs: A survey Wireless personal communications, Vol. 72, No. 2, pp.857-917 Virendra Ranga, ,M Dave, Anil K Verma 0.458
12.    On the Security of Certificateless Signature Schemes International Journal of Distributed Sensor Networks, 2013 Gaurav Sharma, Suman Bala, Anil K Verma 0.727
13.    QoS based Resource Provisioning and Scheduling in Grids Journal of Supercomputing, Springer , DOI 10.1007/s11227-013-0903-1, March 2013 Aron R., Chana I.       0.578.
14.    Bacterial Foraging based Hyper-heuristic for Resource        Scheduling in Grid Computing   Future Generation Computer Systems (FGCS Vol 29, No 3, pp. 751-762,) Elsevier, March 2013   Rajni, Chana Inderveer   1.978  
15.    Formal QoS Policy based Grid Resource Provisioning Framework Journal of Grid Computing, Vol 10, No 2, pp. 249-264, June 2012, doi: 10.1007/s10723-012-9202, October 2012 Rajni, Chana Inderveer 1.310  
16.    Ant Colony algorithms in MANETs: A Review Journal of Network and Computer Applications, 35:6, 1964-1972, 2012. Gurpreet Singh, Neeraj Kumar, Anil Kumar Verma 1.4
17.    A Systematic Review of A Systematic Review on Clustering and Routing      Techniques based upon LEACH Protocol for Wireless Sensor Networks Journal of Network and Computer Applications, 36:2, 623-645   Sudhanshu Tyagi, Neeraj Kumar   1.4
18.    Load Balancing and Adaptive Scheduling for Data Intensive Prioritized Traffic in Wireless Mesh Networks International Journal of Ad hoc and Ubiquitous Computing, 12: 1, 3-13. Neeraj Kumar, Naveen Chilamkurti, John Hyuk Park, Doo- Soon Park 0.9  
19.    Predictors of User Satisfaction in TEIs Information- An Interdisciplinary Journal, Vol 16 No. 5  pp.2885-2894, May 2013 Shivani Goel, Ravi Kiran, Deepak Garg 0.2
20.    Punjabi DeConverter for generating Punjabi from Universal Networking Language, Springer: Journal of Zhejiang University SCIENCE C, Vol. 14 No. 3,  March 2013: 79-196.   Parteek Kumar, R.K. Sharma 0.308
21.    A Survey of Phishing Email Filtering Techniques IEEE Communications Surveys & Tutorials, vol. PP, issue 99 A. ALmomani,  B. B. Gupta, S. Atawneh, A. Meulenberg, E. ALmomani, 4.8