header

Publications@Thapar

Thapar University
Patiala, Punjab - 147004

Thapar University Publication Database

Publications of Computer Science and Engineering

2018 (7) 2017 (15) 2016 (71) 2015 (75) 2014 (65) 2013 (48)
2012 (33) 2011 (46) 2010 (16) 2009 (13) 2008 (15) 2007 (12)
2006 (10) 2005 (5) 2004 (4) 2003 (3) 2002 (2) 2001 (1)
1999 (1) 1990 (1) (5) All

Book(s) :

  1. Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri (2018). Handbook of Image-based Security Techniques. UK: Taylor and Francis. [ISBN : 9781138054219] . Google Search
  2. Pritpal Singh (2016). Applications of Soft Computing in Time Series Forecasting Simulation and Modeling Techniques. : Springer. [ISBN : 978-3-319-26292-5] . Google Search
  3. Shivani Goel (2013). Express Learning - Artificial Intelligence. New Delhi: Pearson Education. [ISBN : 978-8131787472] . Google Search
  4. Parteek Bhatia, Gurvinder Singh (2013). Simplified Approach To DBMS(9th). New Delhi: Kalyani Publisher. [ISBN : 9788127246501] . Google Search
  5. Parteek Bhatia, Ranjit Singh, Sanjib Dutta, Ravneet Kaur Bhatia (2008). Simplified Approach To Visual Basic(3rd). New Delhi: Kalyani Publisher. [ISBN : 9789327245665] . Google Search
  6. Parteek Bhatia, Sanjeev Dutta, Ranjit Singh (2004). Simplified Approach To Oracle. New Delhi: Kalyani. [ISBN : 978-81-272-2339-5] . Google Search

Book Chapter(s) :

  1. Rajendra Kumar Sharma, Parteek Bhatia (2017). Development of Punjabi WordNet, Bilingual Dictionaries, Lexical Relations Creation, and Its Challenges. In Niladri Sekhar Dash, Pushpak Bhattacharyya, Jyoti D. Pawar, The WordNet in Indian Languages (pp. 83-99). Germany: Springer. [ISBN : 978-981-10-1907-4] . Google Search
  2. Kapil Yadav, Jhilik Bhattacharya (2016). Real-Time Hand Gesture Detection and Recognition for Human Computer Interaction. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 559-567). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search
  3. Sachin Meena, Jhilik Bhattacharya (2016). Encoded Scene Panorama Based Information Flow in a Multi Agent System. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 541-548). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search
  4. Pritpal Singh (2015). Big data time series forecasting model: A fuzzy-neuro hybridize approach. In , Computational Intelligence for Big Data Analysis (pp. 55-72). Netherlands: Springer. [ISBN : 978-3-319-16597-4] . Google Search
  5. Arun Sharma, P. S. Grover, Rajesh Kumar (2009). Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic. In Sanjay Ranka et al., Contemporary Computing (pp. pp 581-591). New Delhi: Springer. [ISBN : 978-3-642-03546-3] . Google Search

Journal(s) :

  1. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma, S. R. Jindal (2018). Offline Handwritten Pre-Segmented Character Recognition of Gurmukhi Script. Machine Graphics and Vision, 25 (1/4), 45-55. [IF(2016) : 0.04 / 0.11] . Google Citation
  2. Chopra P., Rajendra Kumar Sharma, Kumar M., Chopra T. (2018). Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete. Advances in Civil Engineering, 2018 (), -. Google Citation
  3. Kumar M., Jindal M.K., Rajendra Kumar Sharma, Jindal S.R. (2018). Offline Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques. National Academy Science Letters, 41 (1), 29-33. Google Citation
  4. Hooda N., Seema Bawa, Rana P.S. (2018). Fraudulent Firm Classification: A Case Study of an External Audit. Applied Artificial Intelligence, 32 (1), 48-64. Google Citation
  5. Singh H., Rajendra Kumar Sharma, Singh V.P. (2018). Efficient zone identification approach for the recognition of online handwritten Gurmukhi script. Neural Computing and Applications, (), 1-12. Google Citation
  6. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2017). A Novel Technique for Line Segmentation in Offline Handwritten Gurmukhi Script Documents. National Academy Science Letters, 40 (4), 273-277. [IF(2016) : 0.369] . Google Citation
  7. Anshu Singla, Patra S. (2017). A fast automatic optimal threshold selection technique for image segmentation. Signal, Image and Video Processing, 11 (2), 243-250. [IF(2016) : 1.102] . Google Citation
  8. Garg N., Seema Bawa (2017). RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. Journal of Network and Computer Applications, 84 (), 1-13. Google Citation
  9. Verma K., Rajendra Kumar Sharma (2017). Recognition of online handwritten Gurmukhi characters based on zone and stroke identification. Sadhana - Academy Proceedings in Engineering Sciences, 42 (5), 701-712. [IF(2016) : 0.465] . Google Citation
  10. Anshu Singla, Patra S. (2017). A fast partition-based batch-mode active learning technique using SVM classifier. Soft Computing, (), 1-11. Google Citation
  11. Singh H., Seema Bawa (2017). A MapReduce-based scalable discovery and indexing of structured big data. Future Generation Computer Systems, 73 (), 32-43. [IF(2016) : 3.997] . Google Citation
  12. Kumar M., Jindal M.K., Rajendra Kumar Sharma (2017). Offline Handwritten Gurmukhi Character Recognition: Analytical Study of Different Transformations. Proceedings of the National Academy of Sciences India Section A - Physical Sciences, 87 (1), 137-143. Google Citation
  13. Bhatia V., Rinkle Rani (2017). A parallel fuzzy clustering algorithm for large graphs using Pregel. Expert Systems with Applications, 78 (), 135-144. [IF(2016) : 3.928 ] . Google Citation
  14. Chandra Sekhar Vorugunti, Bharavi Mishra, Ruhul Amin, Rakesh P. Badoni, Mrudula Sarvabhatla, Dheerendra Mishra (2017). Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks. Wireless Personal Communications, (), -. [IF(2016) : 0.951] . Google Citation
  15. Podili P., Pattanaik K.K., Prashant Singh Rana (2017). BAT and Hybrid BAT Meta-Heuristic for Quality of Service-Based Web Service Selection. Journal of Intelligent Systems, 26 (1), 123-137. Google Citation
  16. Hua K.-L., Dai B.-R., Srinivasan K., Hsu Y.-H., Vishal Sharma (2017). A hybrid NSCT domain image watermarking scheme. Eurasip Journal on Image and Video Processing, 2017 (1), -. Google Citation
  17. Sukhpal Singh, Inderveer Chana, Rajkumar Buyya (2017). STAR: SLA-aware Autonomic Management of Cloud Resources. IEEE Transactions on Cloud Computing , (99), 1-14. Google Citation
  18. Ramnik Singh, Anil Kumar Verma (2017). Efficient image transfer over WSN using cross layer architecture. Optik - International Journal for Light and Electron Optics, 130 (), 499-405. [IF(2016) : 0.742] . Google Citation
  19. Munish Kumar, Rajendra Kumar Sharma, M. K. Jindal (2016). A Novel Framework for Grading Writers using Offline Gurmukhi Characters. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 86 (3), 405-415. [IF(2016) : 0.425] . Google Citation
  20. Palika Chopra, Rajendra Kumar Sharma, Maneek Kumar (2016). Prediction of Compressive Strength of Concrete using Artificial Neural Network and Genetic Programming. Advances in Materials Science and Engineering, 2016 (2016), -. [IF(2016) : 1.299 ] . Google Citation
  21. Munish Kumar, Manish Jindal, Rajendra Kumar Sharma (2016). A Novel Handwriting Grading System Using Gurmukhi Characters. International Arab Journal of Information Technology, (), -. [IF(2016) : 0.724] . Google Citation
  22. Teena Mitaal, Rajendra Kumar Sharma (2016). Speech recognition using ANN and predator influenced civilized swam optimization algorithm. Turkish Journal of Electrical Engineering & Computer Sciences, 24 (), 4780-4803. Google Citation
  23. Vishal Sharma, Rajesh Kumar (2016). Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks. IT Convergence Practice, 2 (3), 24-33. Google Citation
  24. Vishal Sharma, Rajesh Kumar (2016). Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs. Computing and Informatics, 35 (5), -. [IF(2016) : 0.488 ] . Google Citation
  25. Lee J.-H., Singh K.D., Hadjadj-Aoul Y., Neeraj Kumar (2016). Wireless and Mobile Technologies for the Internet of Things. Mobile Information Systems, 2016 (), -. [IF(2016) : 0.849] . Google Citation
  26. Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues (2016). Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Communications Magazine , 54 (10), 60-66. [IF(2016) : 10.435] . Google Citation
  27. Bansal A., Agarwal R., Rajendra Kumar Sharma (2016). Statistical Feature Extraction based Iris Recognition System. Sadhana - Academy Proceedings in Engineering Sciences, 41 (5), 507-518. [IF(2016) : 0.465] . Google Citation
  28. Dua A., Neeraj Kumar, Seema Bawa (2016). ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks. Telecommunication Systems, (), 1-20. [IF(2016) : 1.542] . Google Citation
  29. Bali R.S., Neeraj Kumar (2016). Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System. Computers & Electrical Engineering, 52 (), 82-97. [IF(2016) : 1.57] . Google Citation
  30. Mittal T., Rajendra Kumar Sharma (2016). Integrated search technique for parameter determination of SVM for speech recognition. Journal of Central South University, 23 (6), 1390-1398. Google Citation
  31. Bhardwaj A.K., Gajpal Y., Maninder Singh (2016). Fuzzy reliability analysis of integrated network traffic visualization system. Journal of Intelligent & Fuzzy Systems, 31 (3), 1941-1953. [IF(2016) : 1.261] . Google Citation
  32. Neeraj Kumar, Lee J.-H., Chilamkurti N., Vinel A. (2016). Energy-efficient multimedia data dissemination in vehicular clouds: Stochastic-reward-nets-based coalition game approach. IEEE Systems Journal, 10 (2), 847-858. [IF(2016) : 3.882 ] . Google Citation
  33. Goyal S., Seema Bawa, Singh B. (2016). Energy optimised resource scheduling algorithm for private cloud computing. International Journal of Ad Hoc and Ubiquitous Computing, 23 (2-Jan), 115-123. [IF(2016) : 0.705] . Google Citation
  34. Jindal A., Dua A., Kaur K., Mukesh Singh, Neeraj Kumar, Mishra S. (2016). Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid. IEEE Transactions on Industrial Informatics, 12 (3), 1005-1016. Google Citation
  35. Verma K., Rajendra Kumar Sharma (2016). Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi script. Neural Computing & Applications, (), 1-13. [IF(2016) : 2.505 ] . Google Citation
  36. Neeraj Kumar, Misra S., Chilamkurti N., Lee J.-H., Rodrigues J.J.P.C. (2016). Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment. IEEE Transactions on Dependable and Secure Computing, 13 (1), 133-145. Google Citation
  37. Xie Y., Wu L., Neeraj Kumar, Shen J. (2016). Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network. Wireless Personal Communications, (), 1-19. [IF(2016) : 0.951] . Google Citation
  38. Mittal T., Rajendra Kumar Sharma (2016). An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition. Journal of Engineering Research, 4 (1), 1-20. [IF(2016) : 0.333 ] . Google Citation
  39. Maitra T., Islam S.K.H., Amin R., Giri D., Khan M.K., Neeraj Kumar (2016). An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Security and Communication Networks, 9 (17), 4615-4638. [IF(2016) : 1.067 ] . Google Citation
  40. Iqbal K., Odetayo M., James A., Iqbal R., Neeraj Kumar, Barma S. (2016). An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images. Neurocomputing, 174 (), 413-430. Google Citation
  41. Zhang Y., Neeraj Kumar, Chen J., Rodrigues J.J.P.C. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9 (17), 3944-3951. [IF(2016) : 1.067 ] . Google Citation
  42. Jiang Q., Neeraj Kumar, Ma J., Shen J., He D., Chilamkurti N. (2016). A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. International Journal of Network Management, (), -. Google Citation
  43. Wang L., Liu W., Neeraj Kumar, He D., Tan C., Gao D. (2016). A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Security and Communication Networks, 9 (16), 3543-3557. [IF(2016) : 1.067 ] . Google Citation
  44. Khushneet Jindal, Rajiv Kumar (2016). A Note on "Data mining based noise diagnosis and fuzzy filter design for image processing". Computers & Electrical Engineering, 49 (), 50-51. [IF(2016) : 1.57] . Google Citation
  45. Suman Bala S., Anil Kumar Verma (2016). A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 21 (2), 140-155. [IF(2016) : 0.705] . Google Citation
  46. Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar (2016). A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Security and Communication Networks, 9 (17), 4650-4666. [IF(2016) : 1.067 ] . Google Citation
  47. Tarunpreet Bhatia, Simmi Kansal, Shivani Goel, Anil Kumar Verma (2016). A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Computers & Electrical Engineering, 56 (), 441-455. [IF(2016) : 1.57] . Google Citation
  48. Murari Mandal, Gaurav Sharma, Anil Kumar Verma (2016). A computational review of identity-based signcryption schemes. International Journal of Network Security, 18 (5), 969-977. Google Citation
  49. Kuljeet Kaur, Rubi Rana, Neeraj Kumar, Mukesh Singh, S. Mishra (2016). A Colored Petri Net Based Frequency Support Scheme Using Fleet of Electric Vehicles in Smart Grid Environment. IEEE Transactions on Power Systems, 31 (6), 4638-4649. [IF(2016) : 5.68 ] . Google Citation
  50. Goyal S., Seema Bawa, Singh B. (2016). Green Service Level Agreement (GSLA) framework for cloud computing. Computing, 98 (9), 949-963. [IF(2016) : 1.589 ] . Google Citation
  51. Anshu Singla, Swarnajyoti Patra (2016). A fast automatic optimal threshold selection technique for image segmentation. Signal, Image and Video Processing, (), 1-8. [IF(2016) : 1.102] . Google Citation
  52. He D., Zeadally S., Neeraj Kumar, Wu W. (2016). Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Transactions on Information Forensics and Security, 11 (9), 2052-2064. Google Citation
  53. Silva B.M.C., Rodrigues J.J.P.C., Neeraj Kumar, Proen?a M.L., Jr., Han G. (2016). MobiCoop: An incentive-based cooperation solution for mobile applications. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4), -. Google Citation
  54. Kapoor L., Seema Bawa, Gupta A. (2016). Detecting and containing malicious services in an intercloud environment. Journal of Web Engineering, 15 (6-May), 521-538. [IF(2016) : 0.58] . Google Citation
  55. Singh S., Inderveer Chana, Maninder Singh, Buyya R. (2016). SOCCER: Self-Optimization of Energy-efficient Cloud Resources. Cluster Computing-The Journal of Networks Software Tools and Applications, (), 1-14. [IF(2016) : 1.514] . Google Citation
  56. Bhalla V.K., Neeraj Kumar (2016). An efficient scheme for automatic web pages categorization using the support vector machine. New Review of Hypermedia and Multimedia, 22 (3), 223-242. [IF(2016) : 0.758] . Google Citation
  57. Rathore N.K., Inderveer Chana (2016). Job Migration Policies for Grid Environment. Wireless Personal Communications, 89 (1), 241-269. [IF(2016) : 0.951] . Google Citation
  58. Tekchandani R., Bhatia R., Maninder Singh (2016). Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. Journal of Supercomputing, (), 1-28. [IF(2016) : 1.326 ] . Google Citation
  59. Kumar M., Jindal M.K., Rajendra Kumar Sharma (2016). A Novel Framework for Grading of Writers Using Offline Gurmukhi Characters. Proceedings of the National Academy of Sciences India Section A-Physical Sciences, 86 (3), 405-415. [IF(2016) : 0.425 ] . Google Citation
  60. Geeta Kasana, Kulbir Singh, Satwinder Singh Bhatia (2016). Block-Based High Capacity Multilevel Image Steganography. Journal of Circuits, Systems and Computers, 25 (8), -. [IF(2016) : 0.481] . Google Citation
  61. Tanmoy Maitra, Mohammad S Obaidat, S.K. Islam, Debasis Giri, Ruhul Amin (2016). Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Security and Communication Networks, (), -. [IF(2016) : 1.067 ] . Google Citation
  62. Venkatasamy Sureshkumar, R. Anitha, N Rajamanickam, Ruhul Amin (2016). A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Computers & Electrical Engineering, (), -. [IF(2016) : 1.57] . Google Citation
  63. Sandeep Saharan, Ravinder Kumar (2016). Graph coloring based optimized algorithm for resource utilization in examination scheduling. Applied Mathematics & Information Sciences, 10 (3), 1193-1201. [IF(2016) : 1.232] . Google Citation
  64. Vishal Sharma, Ilsun You, Rajesh Kumar (2016). Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks. Mobile Information Systems, 8475820 (), 13 Pages-. [IF(2016) : 0.849] . Google Citation
  65. Vishal Sharma, Mehdi Bennis, Rajesh Kumar (2016). UAV-Assisted Heterogeneous Networks for Capacity Enhancement. IEEE Communications Letters, 20 (6), 1207-1210. [IF(2016) : 1.988] . Google Citation
  66. Amit Dua, Neeraj Kumar, Seema Bawa (2016). Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks. Journal of Real-Time Image Processing, 2016 (), 1-18. [IF(2016) : 2.01 ] . Google Citation
  67. Vijay Kumar, Jitender Kumar Chhabra, Dinesh Kumar (2016). Data Clustering using Differential Search Algorithm. Pertanika Journal of Science and Technology, 24 (2), 295-306. Google Citation
  68. He D., Neeraj Kumar, Shen H., Lee J.-H. (2016). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, (), 1-14. Google Citation
  69. Garg N., Seema Bawa (2016). Comparative analysis of cloud data integrity auditing protocols. Journal of Network and Computer Applications, 66 (), 17-32. [IF(2016) : 3.5 ] . Google Citation
  70. Priyanka Chawla, Inderveer Chana, Ajay Rana (2016). Cloud-based automatic test data generation framework. Journal of Computer and System Sciences, 82 (5), 712-738. [IF(2016) : 1.678] . Google Citation
  71. Singh S., Inderveer Chana (2016). EARTH: Energy-aware autonomic resource scheduling in cloud computing. Journal of Intelligent & Fuzzy Systems, 30 (3), 1581-1600. [IF(2016) : 1.261] . Google Citation
  72. Arora V., Bhatia R., Maninder Singh (2016). A systematic review of approaches for testing concurrent programs. Concurrency and Computation: Practice and Experience , 28 (5), 1572-1611. [IF(2016) : 0.942] . Google Citation
  73. Nidhi Jain Kansal, Inderveer Chana (2016). Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach. Journal of Grid Computing, (), -. [IF(2016) : 2.766 ] . Google Citation
  74. Vinod Kumar Bhalla, Neeraj Kumar (2016). An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks. Wireless Personal Communications, (), 1-20. [IF(2016) : 0.951] . Google Citation
  75. Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti (2016). A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Journal of Supercomputing, (), 1-13. [IF(2016) : 1.326 ] . Google Citation
  76. Singh S., Inderveer Chana (2016). Resource provisioning and scheduling in clouds: QoS perspective. Journal of Supercomputing, (), 1-35. [IF(2016) : 1.326 ] . Google Citation
  77. Anju Bala, Inderveer Chana (2016). Prediction-based proactive load balancing approach through VM migration. Engineering with Computers, (), 1-12. [IF(2016) : 0.765 ] . Google Citation
  78. Manoj Manuja, Deepak Garg (2016). Performance and accuracy analysis of semantic kernel functions. Program-Electronic Library and Information Systems, 50 (1), 83-102. [IF(2016) : 0.556] . Google Citation
  79. Singh S., Inderveer Chana (2016). A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges. Journal of Grid Computing, (), 1-48. [IF(2016) : 2.766 ] . Google Citation
  80. Yadunath Pathak, Prashant Singh Rana, P.K. Singh, Mukesh Saraswat (2016). Protein structure prediction (RMSD ≤ 5 Å) using machine learning models. Interantional Journal of Data Mining and Bioinformatics, 14 (1), 71-85. Google Citation
  81. Gaurav Sharma, Suman Bala, Anil K. Verma (2016). An improved RSA-based certificateless signature scheme for wireless sensor networks. International Journal of Network Security, 18 (1), 82-89. Google Citation
  82. Vishal Sharma, Rajesh Kumar, P. Rana (2015). Self-Healing Neural Model for Stabilization Against Failures Over Networked UAVs. IEEE Communications Letters, 19 (11), 2013-2016. [IF(2016) : 1.988] . Google Citation
  83. Lohit Kapoor, Seema Bawa, Ankit Gupta (2015). Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud. International Journal of Next Generation Computing, 6 (3), 153-164. Google Citation
  84. Atul Bansal, Ravinder Agarwal, Rajendra Kumar Sharma (2015). Determining diabetes using iris recognition system. International Journal of Diabetes in Developing Countries, 35 (4), 432-438. [IF(2016) : 0.366] . Google Citation
  85. Kaur K., Rinkle Rani (2015). A Smart Polyglot Solution for Big Data in Healthcare. It Professional, 17 (6), 48-55. [IF(2016) : 1.661 ] . Google Citation
  86. Kaur K., Dua A., Jindal A., Neeraj Kumar, Mukesh Singh, Vinel A. (2015). A novel resource reservation scheme for mobile PHEVs in V2G environment using game theoretical approach. IEEE Transactions on Vehicular Technology, 64 (12), 5653-5666. Google Citation
  87. Anju Bala, Inderveer Chana (2015). Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing. Concurrent Engineering: Research and Applications, (), -. [IF(2016) : 1.0] . Google Citation
  88. Sharma G., Bala S., Anil Kumar Verma (2015). Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks. Wireless Personal Communications, 84 (2), 1469-1485. [IF(2016) : 0.951] . Google Citation
  89. Singh S., Inderveer Chana (2015). QoS-aware autonomic resource management in cloud computing: A systematic review. ACM Computing Surveys, 48 (3), -. [IF(2016) : 6.748] . Google Citation
  90. Mittal T., Rajendra Kumar Sharma (2015). Multiclass SVM based spoken Hindi numerals recognition. International Arab Journal of Information Technology, 12 (6A), 666-671. [IF(2016) : 0.724] . Google Citation
  91. Ranga V., Dave M., Anil Kumar Verma (2015). Relay node placement to heal partitioned wireless sensor networks. Computers & Electrical Engineering, 48 (), 371-388. [IF(2016) : 1.57] . Google Citation
  92. Verma S., Deepak Garg (2015). Improvement in rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), 524-531. [IF(2016) : 0.724] . Google Citation
  93. Karamjeet Kaur, Rinkle Rani (2015). Managing Data in Healthcare Information Systems: Many Models, One Solution. IEEE Computer, 48 (3), 52-59. Google Citation
  94. Anjali Anand, Rinkle Rani, Himanshu Aggarwal (2015). A security model based on reputation and collaboration through route-request in mobile ad hoc networks. KSII Transactions on Internet and Information Systems, 9 (11), 4701-4719. [IF(2016) : 0.452] . Google Citation
  95. Vandana Jindal , A. K. Verma, Seema Bawa (2015). Quantitative Reduction in Communication Load for Energy Efficiency in WSN. Wireless Personal Communications, 85 (4), 2795-2810. [IF(2016) : 0.951] . Google Citation
  96. Neeraj Kumar, Zeadally S., Rodrigues J.J.P.C. (2015). QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Electronics, 62 (12), 7892-7900. [IF(2016) : 7.168] . Google Citation
  97. Kaur T., Inderveer Chana (2015). Energy efficiency techniques in cloud computing: A survey and taxonomy. ACM Computing Surveys, 48 (2), -. [IF(2016) : 6.748] . Google Citation
  98. Sourav Chhabra, Rasmeet Singh Bali, Neeraj Kumar (2015). Dynamic Vehicle Ontology Based Routing for VANETs. Procedia Computer Science, 57 (), 789-797. Google Citation
  99. Kumar M., Sharma A., Rajesh Kumar (2015). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach. Software - Practice and Experience, 45 (7), 949-971. [IF(2016) : 0.652] . Google Citation
  100. Avleen Kaur Malhi, Shalini Batra (2015). An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17 (1), 317-338. [IF(2016) : 0.723 ] . Google Citation
  101. Kaur N., Singh J., Dhaka G., Rinkle Rani, Vijay Luxami (2015). Benzothiazole-based chemosensor for CN- and Cu2+: Multi-logic operations within a single molecule. Supramolecular Chemistry, 27 (7-Aug), 453-459. Google Citation
  102. Neeraj Kumar, Iqbal R., Misra S., Rodrigues J.J.P.C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81 (6), 1042-1058. [IF(2016) : 1.678] . Google Citation
  103. He D., Khan M.K., Neeraj Kumar (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1-Feb), 67-74. [IF(2016) : 0.705] . Google Citation
  104. Kansal N.J., Inderveer Chana (2015). Artificial bee colony based energy-aware resource utilization technique for cloud computing. Concurrency and Computation: Practice and Experience , 27 (5), 1207-1225. [IF(2016) : 0.942] . Google Citation
  105. Neeraj Kumar, Chilamkurti N., Misra S. (2015). Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Press, 53 (1), 48-55. [IF(2016) : 5.125] . Google Citation
  106. Jaskaran Preet Singha, Rasmeet S. Bali (2015). A hybrid backbone based clustering algorithm for vehicular ad-hoc networks. Procedia Computer Science, 46 (), 1005-1013. Google Citation
  107. Verma K., Rajendra Kumar Sharma (2015). Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine. Advances in Intelligent Systems and Computing, 330 (), 747-753. Google Citation
  108. Karamjeet Kaur, Hardeep Singh (2015). An algorithm of impairment aware routing for wavelength division multiplexed optical networks. Microwave and Optical Technology Letters, 57 (7), 1632-1636. [IF(2016) : 0.731] . Google Citation
  109. Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat (2015). Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis. IEEE Internet of Things Journal, 2 (4), 310-320. Google Citation
  110. Bhardwaj K.C., Rajendra Kumar Sharma (2015). Machine learning in efficient and effective web service discovery. Journal of Web Engineering, 14 (3-Apr), 196-214. [IF(2016) : 0.58] . Google Citation
  111. Chawla P., Inderveer Chana, Rana A. (2015). A novel strategy for automatic test data generation using soft computing technique. Frontiers of Computer Science, 9 (3), 346-363. [IF(2016) : 1.039] . Google Citation
  112. Rajni Aron, Inderveer Chana, Ajith Abraham (2015). A hyper-heuristic approach for resource provisioning-based scheduling in grid environment. Journal of Supercomputing, 71 (4), 1427-1450. [IF(2016) : 1.326 ] . Google Citation
  113. Dua A., Neeraj Kumar, Seema Bawa, Rodrigues J.J.P.C. (2015). An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks. Mobile Networks and Applications, 20 (2), 181-200. [IF(2016) : 3.259 ] . Google Citation
  114. Neeraj Kumar, Rodrigues J.J.P.C., Lloret J., Dua, A. (2015). Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination. Mobile Networks and Applications, 20 (2), 251-267. [IF(2016) : 3.259 ] . Google Citation
  115. Tyagi S., Tanwar S., Gupta S.K., Neeraj Kumar, Rodrigues J.J.P.C. (2015). A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks. Telecommunication Systems, 59 (1), 43-62. [IF(2016) : 1.542] . Google Citation
  116. Neeraj Kumar, Bali R.S., Iqbal R., Chilamkurti N., Rho S. (2015). Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems. Journal of Supercomputing, 71 (9), 3258-3287. [IF(2016) : 1.326 ] . Google Citation
  117. Neeraj Kumar, Lee J.-H., Rodrigues J.J.P.C. (2015). Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach. IEEE Transactions on Intelligent Transportation Systems, 16 (3), 1148-1161. [IF(2016) : 3.724] . Google Citation
  118. Amin R., Islam S.K.H., Biswas G.P., Khan M.K., Neeraj Kumar (2015). An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical Systems, 39 (11), -. [IF(2016) : 2.456] . Google Citation
  119. Manoj Manuja, Deepak Garg (2015). Intelligent text classification system based on self-administered ontology. Turkish Journal of Electrical Engineering and Computer Sciences, 23 (2015), 1393-1404. [IF(2016) : 0.578] . Google Citation
  120. Sudhanshu Gupta, Deepak Garg (2015). Selectivity Estimation of range queries in Data Streams using Micro-clustering. International Arab Journal of Information Technology, 13 (5), -. [IF(2016) : 0.724] . Google Citation
  121. Seema Verma, Deepak Garg (2015). Improvement in Rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), -. [IF(2016) : 0.724] . Google Citation
  122. He D., Neeraj Kumar, Chilamkurti N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, (), -. [IF(2016) : 4.832] . Google Citation
  123. Singh S., Inderveer Chana (2015). Q-aware: Quality of service based cloud resource provisioning. Computers & Electrical Engineering, (), -. [IF(2016) : 1.57] . Google Citation
  124. Ruan O., Neeraj Kumar, He D., Lee J.-H. (2015). Efficient provably secure password-based explicit authenticated key agreement. Pervasive and Mobile Computing, (), -. [IF(2016) : 2.349 ] . Google Citation
  125. Tyagi S., Tanwar S., Neeraj Kumar, Rodrigues J.J.P.C. (2015). Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network. Pervasive and Mobile Computing, (), -. [IF(2016) : 2.349 ] . Google Citation
  126. Bali R.S., Neeraj Kumar, Rodrigues J.J. (2015). An efficient energy-aware predictive clustering approach for vehicular ad hoc networks. International Journal of Communication Systems, (), -. [IF(2016) : 1.066] . Google Citation
  127. Neeraj Kumar, Kaur K., Misra S.C., Iqbal R. (2015). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, (), -. [IF(2016) : 1.262 ] . Google Citation
  128. Tu H., Neeraj Kumar, Kim J., Seo J. (2015). A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools and Applications, (), -. [IF(2016) : 1.53 ] . Google Citation
  129. Tiwari R., Neeraj Kumar (2015). An adaptive cache invalidation technique for wireless environments. Telecommunication Systems, (), -. [IF(2016) : 1.542] . Google Citation
  130. He D., Neeraj Kumar, Lee J.-H. (2015). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, (), -. [IF(2016) : 1.584 ] . Google Citation
  131. Neeraj Kumar, Singh J.P., Bali R.S., Misra S., Ullah S. (2015). An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing. Cluster Computing-The Journal of Networks Software Tools and Applications, (), -. [IF(2016) : 1.514] . Google Citation
  132. Zhang Z., Qi Q., Neeraj Kumar, Chilamkurti N., Jeong H.-Y. (2015). A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools and Applications, 74 (10), 3477-3488. [IF(2016) : 1.53 ] . Google Citation
  133. Rathore N., Inderveer Chana (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31 (3), 597-615. [IF(2016) : 0.765 ] . Google Citation
  134. Kaur S., Maninder Singh (2015). A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. Computer Fraud and Security, 2015 (2), 10-16. Google Citation
  135. Mittal M., Rajendra Kumar Sharma, Singh V.P. (2015). Modified single pass clustering with variable threshold approach. International Journal of Innovative Computing, Information and Control, 11 (1), 375-386. [IF(2016) : 1.667] . Google Citation
  136. Ajay Batish, Anirban Bhattacharya, Neeraj Kumar (2015). Powder mixed dielectric: An approach for improved process performance in EDM. Particulate Science and Technology, 33 (2), 150-158. [IF(2016) : 0.784] . Google Citation
  137. Kumar R., Rajendra Kumar Sharma, Sharma A. (2015). Recognition of Multi-Stroke Based Online Handwritten Gurmukhi Aksharas. Proceedings of the National Academy of Sciences India Section A-Physical Sciences, 85 (1), 159-168. [IF(2016) : 0.425 ] . Google Citation
  138. Sharma S., Seema Bawa, Lomash H. (2015). Web Presence of Indian Digital Culture. Preservation, Digital Technology and Culture, 44 (2), 62-68. Google Citation
  139. Neeraj Kumar, Zeadally S., Chilamkurti N., Vinel A. (2015). Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Network, 29 (2), 62-69. [IF(2016) : 7.23 ] . Google Citation
  140. Vijay Luxami, Rinkle Rani, Sharma A., Paul K. (2015). Quinazoline-benzimidazole hybrid as dual optical sensor for cyanide and Pb2+ ions and Aurora kinase inhibitor. Journal of Photochemistry and Photobiology A-Chemistry, 311 (), 68-75. [IF(2016) : 2.625 ] . Google Citation
  141. Neeraj Kumar, Misra S., Obaidat M.S. (2015). Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks. IEEE Systems Journal, 9 (3), 1081-1090. [IF(2016) : 3.882 ] . Google Citation
  142. Neeraj Kumar, Lee J.-H. (2015). Collaborative-Learning-Automata-Based Channel Assignment with Topology Preservation for Wireless Mesh Networks under QoS Constraints. IEEE Systems Journal, 9 (3), 675-685. [IF(2016) : 3.882 ] . Google Citation
  143. Munish Kumar, M.K. Jindal, Rajendra Kumar Sharma (2014). Segmentation of isolated and touching characters in offline handwritten Gurmukhi script documents. International Journal of Information Technology and Computer Science, 2 (), 58-63. Google Citation
  144. Palika Chopra, Rajendra Kumar Sharma, Maneek Kumar (2014). Predicting compressive strength of concrete for varying workability using regression models. International Journal of Engineering and Applied Sciences, 6 (4), 10-22. Google Citation
  145. Palika Chopra, Rajendra Kumar Sharma, Maneek Kumar (2014). Regression models for the prediction of compressive strength of concrete with and without fly ash. International Journal of Latest Trends in Engineering and Technology , 3 (4), 400-406. Google Citation
  146. A. Bansal, R. Agrawal, Rajendra Kumar Sharma (2014). Predicting gender using Iris images. Research Journal of Recent Sciences, 3 (4), 20-26. Google Citation
  147. Mamta Mittal, Rajendra Kumar Sharma, V.P.Singh (2014). Validation of k-means and Threshold based Clustering Method. International Journal of Advancements in Technology, 5 (2), 153-160. Google Citation
  148. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach. Journal of Software : Practice and Experience, 45 (7), 949-971. Google Citation
  149. Supriya Kinger, Rajesh Kumar, Anju Sharma (2014). Efficient Dynamic Replication Algorithm Using Agent for Data Grid. The Scientific World Journal, 2014 (2014), 767016-. Google Citation
  150. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). Fuzzy Entropy based Framework for Multi-Faceted Test Case Classification and Selection: An Empirical Study. IET Software, 8 (3), 103-112. [IF(2016) : 0.733] . Google Citation
  151. Sunil, Rajesh Kumar (2014). Time Aware Test Case Prioritization based on Fault Coverage using Binary Integer Programming. International Journal of Data and Network Security, 2 (1), 102-103. Google Citation
  152. Neeraj Kumar Rathore, Inderveer Chana (2014). Variable Threshold Based Hierarchical Load Balancing Technique in Grid. Engineering with Computers, 30 (1), -. [IF(2016) : 0.765 ] . Google Citation
  153. Neeraj Kumar Rathore, Inderveer Chana (2014). Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing. Journal of Intelligent & Fuzzy Systems, 26 (6), 21-35. [IF(2016) : 1.261] . Google Citation
  154. Neeraj Kumar Rathore, Inderveer Chana (2014). Load Balancing and Job Migration Algorithm : Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125 . [IF(2016) : 0.951] . Google Citation
  155. Anju Bala, Inderveer Chana (2014). Intelligent failure prediction models for scientific workflows. Expert Systems with Applications, 42 (3), 980-989. [IF(2016) : 3.928 ] . Google Citation
  156. Tulika Pandey, Deepak Garg, Manoj Madhava Gore (2014). Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET. Scientific World Journal, 2014 (2014), -. [IF(2016) : 1.219] . Google Citation
  157. Srabanti Maji, Deepak Garg (2014). Hybrid Approach Using SVM and MM2 in Splice Site Junction Identification . Current Bioinformatics, 9 (1), 76-85. [IF(2016) : 0.6] . Google Citation
  158. Dua A., Neeraj Kumar, Seema Bawa (2014). A systematic review on routing protocols for Vehicular Ad Hoc Networks. Vehicular Communications, 1 (1), 33-52. Google Citation
  159. Bali R.S., Neeraj Kumar, Rodrigues J.J.P.C. (2014). Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions. Vehicular Communications, 1 (3), 134-152. Google Citation
  160. Jindal V., Seema Bawa, Batra S. (2014). A review of ranking approaches for semantic search on Web. Information Processing and Management, 50 (2), 416-425. [IF(2016) : 2.391] . Google Citation
  161. Sharma S., Lomash H., Seema Bawa (2014). Who Regulates Ethics in the Virtual World?. Science and Engineering Ethics, (), 1-10. [IF(2016) : 2.229 ] . Google Citation
  162. Shi W., Neeraj Kumar, Gong P., Chilamkurti N., Chang H. (2014). On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Networking and Applications, (), 1-5. [IF(2016) : 1.262 ] . Google Citation
  163. Tu H., Neeraj Kumar, Chilamkurti N., Rho S. (2014). An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications, (), 1-8. [IF(2016) : 1.262 ] . Google Citation
  164. He D., Neeraj Kumar, Chilamkurti N., Lee J.-H. (2014). Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. Journal of Medical Systems, 38 (10), -. [IF(2016) : 2.456] . Google Citation
  165. Vishal Sharma, Rajesh Kumar (2014). A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks. Journal of Intelligent & Robotic Systems, 77 (3), 629-652. Google Citation
  166. Bhardwaj A.K., Maninder Singh (2014). Data mining-based integrated network traffic visualization framework for threat detection. Neural Computing & Applications, (), -. [IF(2016) : 2.505 ] . Google Citation
  167. Dua A., Neeraj Kumar, Seema Bawa (2014). QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks. Mobile Networks and Applications, (), -. [IF(2016) : 3.259 ] . Google Citation
  168. Kaur R., Maninder Singh (2014). A survey on zero-day polymorphic worm detection techniques. IEEE Communications Surveys and Tutorials, 16 (3), 1520-1549. [IF(2016) : 17.188 ] . Google Citation
  169. Kaur P.D., Inderveer Chana (2014). Cloud based intelligent system for delivering health care as a service. Computer Methods and Programs in Biomedicine, 113 (1), 346-359. [IF(2016) : 2.503] . Google Citation
  170. Tu H., Neeraj Kumar, He D., Kim J., Lee C. (2014). An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. Journal of Supercomputing, 70 (1), 224-235. [IF(2016) : 1.326 ] . Google Citation
  171. Shi W., Neeraj Kumar, Gong P., Zhang Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8 (4), 656-666. [IF(2016) : 1.039] . Google Citation
  172. Mallick B., Deepak Garg, Grover P.S. (2014). A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM. Journal of Computing and Information Technology, 22 (1), 45-55. Google Citation
  173. He D., Neeraj Kumar, Lee J.-H., Sherratt R. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60 (1), 30-37. Google Citation
  174. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). OANTALG: An orientation based ant colony algorithm for mobile Ad Hoc networks. Wireless Personal Communications, 77 (3), 1859-1884. [IF(2016) : 0.951] . Google Citation
  175. Kumar M., Rajendra Kumar Sharma, Jindal M.K. (2014). Efficient feature extraction techniques for offline handwritten Gurmukhi character recognition. National Academy Science Letters, 37 (4), 381-391. [IF(2016) : 0.345] . Google Citation
  176. Virender Ranga, Mayank Dave, Anil Kumar Verma (2014). A hybrid timer based single node failure recovery approach for WSANs. Wireless Personal Communications, 77 (3), 2155-2182. [IF(2016) : 0.951] . Google Citation
  177. Kumar M., Jindal M.K., Rajendra Kumar Sharma (2014). A Novel Hierarchical Technique for Offline Handwritten Gurmukhi Character Recognition. National Academy Science Letters, 37 (6), 567-572. [IF(2016) : 0.345] . Google Citation
  178. Singh S., Inderveer Chana (2014). QRSF: QoS-aware resource scheduling framework in cloud computing. Journal of Supercomputing, 71 (1), 241-292. [IF(2016) : 1.326 ] . Google Citation
  179. Kumar A., Anil Kumar Verma (2014). A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata. Applied Mathematics & Information Sciences, 8 (1), 95-105. [IF(2016) : 1.232] . Google Citation
  180. Kumar A., Anil Kumar Verma (2014). Conversion of parallel regular expressions to non-deterministic finite automata using partial derivatives. Chiang Mai Journal of Science, 41 (42040), 1409-1418. [IF(2016) : 0.42] . Google Citation
  181. Neeraj Kumar, Chilamkurti N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40 (6), 1981-1996. [IF(2016) : 1.57] . Google Citation
  182. Rathore N., Inderveer Chana (2014). Load Balancing and Job Migration Techniques in Grid: A Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125. [IF(2016) : 0.951] . Google Citation
  183. Zuo L., Neeraj Kumar, Tu H., Singh A., Chilamkurti N., Rho S. (2014). Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system. Journal of Supercomputing, 70 (1), 177-199. [IF(2016) : 1.326 ] . Google Citation
  184. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45 (), 151-167. [IF(2016) : 3.5 ] . Google Citation
  185. Kaur P.D., Inderveer Chana (2014). A resource elasticity framework for QoS-aware execution of cloud applications. Future Generation Computer Systems, 37 (), 14-25. [IF(2016) : 3.997] . Google Citation
  186. Swarnajyoti Patra, Rahul Gautam, Anshu Singla (2014). A novel context sensitive multilevel thresholding for image segmentation. Applied Soft Computing, 23 (), 122-127. [IF(2016) : 3.541 ] . Google Citation
  187. Neeraj Kumar, Chilamkurti N., Zeadally S., Jeong Y.-S. (2014). Achieving quality of service (QoS) using resource allocation and adaptive scheduling in cloud computing with grid support. Computer Journal, 57 (2), 281-290. [IF(2016) : 0.711] . Google Citation
  188. Chopra I., Maninder Singh (2014). SHAPE - An approach for self-healing and self-protection in complex distributed networks. Journal of Supercomputing, 67 (2), 585-613. [IF(2016) : 1.326 ] . Google Citation
  189. Neeraj Kumar, Chilamkurti N., Rodrigues J.J.P.C. (2014). Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks. Computer Communications, 39 (), 22-32. [IF(2016) : 3.338] . Google Citation
  190. Kumar P., Nigam S.P., Neeraj Kumar (2014). Vehicular traffic noise modeling using artificial neural network approach. Transportation Research Part C: Emerging Technologies, 40 (), 111-122. [IF(2016) : 3.805 ] . Google Citation
  191. Anshu Singla, Swarnajyoti Patra, Lorenzo Bruzzone (2014). A novel classification technique based on progressive transductive SVM learning. Pattern Recognition Letters, 42 (1), 101-106. [IF(2016) : 1.995 ] . Google Citation
  192. Neeraj Kumar, Lee J.-H. (2014). Peer-to-peer cooperative caching for data dissemination in urban vehicular communications. IEEE Systems Journal, 8 (4), 1136-1144. [IF(2016) : 3.882 ] . Google Citation
  193. Neeraj Kumar, Misra S., Obaidat M., Rodrigues J., Pati B. (2014). Networks of learning automata for the vehicular environment: A performance analysis study. IEEE Wireless Communications, 21 (6), 41-47. [IF(2016) : 8.972] . Google Citation
  194. Neeraj Kumar, Tyagi S., Deng D.-J. (2014). LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks. Journal of Network and Computer Applications, 46 (), 264-279. [IF(2016) : 3.5 ] . Google Citation
  195. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2013). PCA Based Offline Handwritten Gurmukhi Character Recognition System. Smart Computing Review, 3 (5), 346-357. Google Citation
  196. Rajendra Kumar Sharma, Palki Sharma, Narpinder Sharma, Harjeet Singh, Karun Verma, Ravinder Kumar, Rajesh Kumar (2013). Development of OHWR System for Gurmukhi. Vishwa Bharat, 39-40 (), 55-66. Google Citation
  197. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2013). MDP Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition. Smart Computing Review, 3 (6), 397-404. Google Citation
  198. Vijay Kumar, Arun Sharma, Rajesh Kumar (2013). Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. Computing and Informatics, 32 (1), 203-224. [IF(2016) : 0.488 ] . Google Citation
  199. Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh (2013). Software clone detection: A systematic review. Information and Software Technology, 55 (7), 1165-1199. Google Citation
  200. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2013). Incremental Mining of Sequential Patterns: Progress and Challenges. Intelligent Data Analysis, 17 (3), 507-530. [IF(2016) : 0.772 ] . Google Citation
  201. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2013). CRM Customer Value based on Constrained Sequential Pattern Mining. International Journal of Computer Applications, 64 (9), 21-29. Google Citation
  202. Bhawna Mallick, Deepak Garg, P.S. Grover (2013). Fuzzy sequential pattern summarization with lattice structure. International Journal of Hybrid Information Technology, 6 (3), 83-94. Google Citation
  203. Shivani Goel, Ravi Kiran, Deepak Garg (2013). Predictors of User Satisfaction in ERP in Technical Educational Institutions. Information-An International Interdisciplinary Journal, 16 (5), 2885-2894. [IF(2016) : 0.00] . Google Citation
  204. Rattan Rana, Deepak Garg (2013). Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem. International Arab Journal of Information Technology, 11 (5), -. [IF(2016) : 0.724] . Google Citation
  205. Bhawna Mallick, Deepak Garg, P S Grover (2013). Constraint-Based Sequential Pattern Mining: A pattern growth algorithm incorporating compactness, length and monetary. International Arab Journal of Information Technology, 11 (1), -. [IF(2016) : 0.724] . Google Citation
  206. Tyagi S., Neeraj Kumar (2013). A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. Journal of Network and Computer Applications, 36 (2), 623-645. [IF(2016) : 3.5 ] . Google Citation
  207. He D., Neeraj Kumar, Chen J., Lee C.-C., Chilamkurti N., Yeo S.-S. (2013). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21 (1), 49-60. [IF(2016) : 2.207] . Google Citation
  208. Maji S., Deepak Garg (2013). Hidden markov model for splicing junction sites identification in dna sequences. Current Bioinformatics, 8 (3), 369-379. [IF(2016) : 0.6] . Google Citation
  209. Sharma G., Anil Kumar Verma (2013). Breaking the RSA-based certificateless signature scheme. Information (Japan), 16 (11), 7831-7836. Google Citation
  210. Bala S., Sharma G., Anil Kumar Verma (2013). Cryptanalysis of certificateless signature scheme. Information (Japan), 16 (11), 7827-7830. Google Citation
  211. Neeraj Kumar, Chilamkurti N., Park J.H., Park D.S. (2013). Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks. International Journal of Ad Hoc and Ubiquitous Computing, 12 (1), 3-13. [IF(2016) : 0.705] . Google Citation
  212. Anirban Bhattacharya, Ajay Batish, Neeraj Kumar (2013). Surface characterization and material migration during surface modification of die steels with silicon, graphite and tungsten powder in EDM process. Journal of Mechanical Science and Technology, 27 (1), 133-140. Google Citation
  213. Rajni, Inderveer Chana (2013). Bacterial foraging based hyper-heuristic for resource scheduling in grid computing. Future Generation Computer Systems, 29 (3), 751-762. [IF(2016) : 3.997] . Google Citation
  214. Parteek Kumar, Rajendra Kumar Sharma (2013). Punjabi DeConverter for generating Punjabi from Universal Networking Language. Journal of Zhejiang University-Science C-Computers & Electronics, 14 (3), 179-195. [IF(2016) : 0.77 ] . Google Citation
  215. Maji S., Deepak Garg (2013). Progress in gene prediction: Principles and challenges. Current Bioinformatics, 8 (2), 226-243. [IF(2016) : 0.6] . Google Citation
  216. Mallick B., Deepak Garg, Grover P.S. (2013). Progressive CFM-Miner: An Algorithm to Mine CFM - Sequential Patterns from a Progressive Database. International Journal of Computational Intelligence Systems, 6 (2), 209-222. [IF(2016) : 1.14 ] . Google Citation
  217. Goel S., Ravi Kiran, Deepak Garg (2013). Predictors for user satisfaction in enterprise resource planning implementation in technical educational institutions. Information (Japan), 16 (5), 2885-2894. Google Citation
  218. Bala S., Sharma G., Anil Kumar Verma (2013). Classification of symmetric key management schemes for wireless sensor networks. International Journal of Security and its Applications, 7 (2), 117-138. Google Citation
  219. Kumar R., Rajendra Kumar Sharma (2013). An efficient post processing algorithm for online handwriting Gurmukhi character recognition using set theory. International Journal of Pattern Recognition and Artificial Intelligence, 27 (4), -. [IF(2016) : 0.994 ] . Google Citation
  220. Neeraj Kumar, Chilamkurti N., Lee J.-H. (2013). UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks. Mathematical and Computer Modelling, 57 (42349), 2750-2763. [IF(2016) : 1.366] . Google Citation
  221. Neeraj Kumar, Kim J. (2013). Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks. Mathematical and Computer Modelling, 58 (42036), 3-14. [IF(2016) : 1.366] . Google Citation
  222. Sharma G., Bala S., Anil Kumar Verma (2013). On the security of Certificateless signature schemes. International Journal of Distributed Sensor Networks, 2013 (), -. [IF(2016) : 1.239 ] . Google Citation
  223. Ranga V., Dave M., Anil Kumar Verma (2013). Network partitioning recovery mechanisms in WSANs: A survey. Wireless Personal Communications, 72 (2), 857-917. [IF(2016) : 0.951] . Google Citation
  224. Neeraj Kumar, Kim J. (2013). An advanced energy efficient data dissemination for heterogeneous wireless sensor networks. Sensor Letters, 11 (9), 1771-1778. [IF(2016) : 0.558] . Google Citation
  225. Neeraj Kumar, Chilamkurti N., Rho S. (2013). A probabilistic multi constraints variable bit rate multimedia service selection in wireless mesh networks. Sensor Letters, 11 (9), 1726-1735. [IF(2016) : 0.558] . Google Citation
  226. Ravi Kiran, Agarwal P.D., Anil Kumar Verma (2013). Knowledge management: Role of thought leaders and junior academia in enhancing research and curriculum in institutions of higher technical education. SAGE Open, 3 (2), 1-13. Google Citation
  227. Aron R., Inderveer Chana (2013). QoS based resource provisioning and scheduling in grids. Journal of Supercomputing, 66 (1), 262-283. [IF(2016) : 1.326 ] . Google Citation
  228. Bernard Scott, Abhinav Bansal (2013). A cybernetic computational model for learning and skill acquisition. Constructivist Foundations, 9 (1), 125-136. Google Citation
  229. Kumar M., Rajendra Kumar Sharma, Jindal M. (2013). A novel feature extraction technique for offline handwritten Gurmukhi character recognition. IETE Journal of Research, 59 (6), 687-692. [IF(2016) : 0.909 ] . Google Citation
  230. Kaur S., Maninder Singh (2013). Automatic attack signature generation systems: A review. IEEE Security and Privacy, 11 (6), 54-61. [IF(2016) : 1.382 ] . Google Citation
  231. He D., Neeraj Kumar, Khan M.K., Lee J.-H. (2013). Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics, 59 (4), 811-817. Google Citation
  232. Neeraj Kumar, Chilamkurti N., Park J.H. (2013). ALCA: Agent learning-based clustering algorithm in vehicular ad hoc networks. Personal and Ubiquitous Computing, 17 (8), 1683-1692. [IF(2016) : 2.395 ] . Google Citation
  233. Neeraj Kumar, Kim J. (2013). ELACCA: Efficient learning automata based cell clustering algorithm for wireless sensor networks. Wireless Personal Communications, 73 (4), 1495-1512. [IF(2016) : 0.951] . Google Citation
  234. Manoj Kumar, Arun Sharma, Rajesh Kumar (2012). Multi-Faceted Measurement Framework for Test Cases Classification and Fitness Evaluation using Fuzzy Logic Approach. Chiang Mai Journal of Science, 39 (3), 486-497. [IF(2016) : 0.42] . Google Citation
  235. Vijai Kumar, Arun Kumar, Rajesh Kumar, P.S. Grover (2012). Quality aspects for component-based systems – A metrics based approach. Software — Practice & Experience, 42 (12), 1531-1548. Google Citation
  236. Navneet Kaur, Deepak Garg (2012). Analysis of the Depth First Search Algorithms. CiiT International Journal of Data Mining Knowledge Engineering, 2012 (Jan), -. Google Citation
  237. Chintan Jain, Deepak Garg (2012). Improved Edmond Karps Algorithm for Network Flow Problem. International Journal of Computer Applications, 37 (1), 48-53. Google Citation
  238. Deepika Sharma, Deepak Garg (2012). Information Retrieval on the web and its evaluation. International Journal of Computer Applications, 40 (3), 26-31. Google Citation
  239. Sandeep Kumar, Deepak Garg (2012). Online Financial Algorithms Competitive Analysis. International Journal of Computer Applications, 40 (7), 8-14. Google Citation
  240. Parth Patel, Deepak Garg (2012). Comparison of Advance Tree Data Structures. Journal of Computer Applications, 41 (2), 11-21. Google Citation
  241. Megha Tyagi, Deepak Garg (2012). Comparative Analysis of dynamic graph techniques and data structure. International Journal of Computer Applications, 45 (5), 42-46. Google Citation
  242. Shivani Goel, Ravi Kiran, Deepak Garg (2012). Vulnerability Management for an Enterprise Resource Planning System. International Journal of Computer Applications, 53 (4), 19-22. Google Citation
  243. Venkata Padmavati Metta, Kamala Kritivasan, Deepak Garg (2012). Computability of Spiking Neural P Systems with Anti-Spikes. New Mathematics and Natural Computation, 8 (3), 283-295. Google Citation
  244. Nimisha Singla, Deepak Garg (2012). String Matching Algorithms and their Applicability in various Applications. International Journal of Soft Computing and Engineering, 1 (6), 218-222. Google Citation
  245. Srabanti Maji, Deepak Garg (2012). Gene finding using Hidden Markov Model. Journal of Applied Sciences, 12 (15), 1518-1525. Google Citation
  246. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2012). CFM-PREFIXSPAN: A Pattern Growth Algorithm Incorporating Compactness and Monetary. International Journal of Innovative Computing, Information and Control, 8 (7), 4509-4520. [IF(2016) : 1.667] . Google Citation
  247. Singh G., Neeraj Kumar, Kumar Verma A. (2012). Ant colony algorithms in MANETs: A review. Journal of Network and Computer Applications, 35 (6), 1964-1972. [IF(2016) : 3.5 ] . Google Citation
  248. Prateek Kumar, Rajendra Kumar Sharma (2012). Punjabi to UNL enconversion system. Sadhana - Academy Proceedings in Engineering Sciences, 37 (2), 299-318. [IF(2016) : 0.465] . Google Citation
  249. Aron R., Inderveer Chana (2012). Formal QoS policy based Grid resource provisioning framework. Journal of Grid Computing, 10 (2), 249-264. [IF(2016) : 2.766 ] . Google Citation
  250. Neeraj Kumar, Chilamkurti N. (2012). Agent assisted mobility and load aware fast handoff scheme in wireless mesh networks. International Journal of Internet Protocol Technology, 7 (1), 26-38. Google Citation
  251. Mallick B., Deepak Garg, Grover P.S. (2012). CFM-Prefixspan: A pattern growth algorithm incorporating compactness and monetary. International Journal of Innovative Computing, Information and Control, 8 (0.2916666666666667), 4509-4520. [IF(2016) : 1.667] . Google Citation
  252. Singh S., Rajendra Kumar Sharma, Sharma M.K. (2012). Efficient rate control approach for JPEG2000 image coding. Journal of Electronic Imaging, 21 (3), -. [IF(2016) : 0.754] . Google Citation
  253. Neeraj Kumar, Iqbal R., Chilamkurti N. (2012). Capacity and load-aware service discovery with service selection in peer-to-peer grids. Future Generation Computer Systems, 28 (7), 1090-1099. [IF(2016) : 3.997] . Google Citation
  254. Neeraj Kumar, Chilamkurti N., Lee J.-H. (2012). Distributed context aware collaborative filtering approach for P2P service selection and recovery in wireless mesh networks. Peer-to-Peer Networking and Applications, 5 (4), 350-362. [IF(2016) : 1.262 ] . Google Citation
  255. Metta V.P., Krithivasan K., Deepak Garg (2012). Computability of spiking neural P systems with anti-spikes. New Mathematics and Natural Computation, 8 (3), 283-295. Google Citation
  256. Kumar S., Kumar Bhatia R., Rajesh Kumar (2012). Distance based clustering of software design components. International Journal of Applied Engineering Research, 7 (11 SUPPL.), 1299-1302. Google Citation
  257. Agarwal P.D., Ravi Kiran, Anil Kumar Verma (2012). Key features of research portal for stimulating research in institutions of higher technical education. Egitim Arastirmalari - Eurasian Journal of Educational Research, (48), 155-174. Google Citation
  258. Pandey T., Deepak Garg, Gore M.M. (2012). Publish/subscribe based information dissemination over VANET utilizing DHT. Frontiers of Computer Science in China, 6 (6), 713-724. Google Citation
  259. Agarwal P.D., Ravi Kiran, Anil Kumar Verma (2012). Knowledge sharing for stimulating learning environment in institutions of higher technical education. Technics Technologies Education Management, 7 (4), 1681-1691. Google Citation
  260. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Optimization of Test Cases using Soft Computing Techniques: A Critical Review. WSEAS Transactions on Information Science and Applications, 11 (8), 440-452. Google Citation
  261. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Towards Multi-Faceted Test Cases Optimization. Journal of Software Engineering and Applications, 4 (9), 550-557. Google Citation
  262. Jahangir Alam, Rajesh Kumar (2011). STH: A Highly Scalable and Economical Topology for Massively Parallel Systems. Indian Journal of Science and Technology, 4 (12), 1737-1748. Google Citation
  263. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Soft Computing-based Software Test Cases Optimization: A Survey. International Review on Computer and Software, 6 (4), 512-526. Google Citation
  264. Rajesh Kumar, Rajni Aron (2011). Information Retrieval System of Hospital using UML and Data Cube. International Journal of Advance Research in Computer Science, 2 (2), 379-385. Google Citation
  265. V.K. Banga, Rajesh Kumar, Y. Singh (2011). Fuzzy-Genetic Optimal Control for Robotic Systems. International Journal of Physical Sciences, 6 (2), 204-212. [IF(2016) : 0.54] . Google Citation
  266. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2011). Unified Cohesion Measures for Aspect-Oriented Systems. International Journal of Software Engineering and Knowledge Engineering, 21 (1), 143-163. [IF(2016) : 0.299 ] . Google Citation
  267. Tamana Pathak, Deepak Garg (2011). Randomized Signature Sort: Implementation & Performance Analysis. International Journal of Computer Applications, 23 (6), 1-5. Google Citation
  268. Vijender Singh, Deepak Garg (2011). Survey of Finding Frequent Patterns in Graph Mining: Algorithms and Techniques. International Journal of Soft Computing and Engineering, 1 (3), 19-23. Google Citation
  269. Deepika Sareen, Deepak Garg (2011). Parametric Maximum Flow Problem: Techniques and Algorithms. International Journal of Computer Science and Communication, 2 (2), 933-938. Google Citation
  270. Bharat Gupta, Deepak Garg (2011). FP-Tree Based Algorithms Analysis: FP-Growth, COFI-Tree and CT-PRO. International Journal on Computer Science and Engineering, 3 (7), 2691-2699. Google Citation
  271. Kuldeep Sharma, Deepak Garg (2011). Randomized algorithms methods and techniques. International Journal of Computer Applications, 28 (11), 29-32. Google Citation
  272. Deepak Garg, Hemant Sharma (2011). Comparative Analysis of Various Approaches Used in Frequent Pattern Mining. International Journal of Advanced Computer Science and Applications, (Special Issue), 141-147. Google Citation
  273. Shivani Goel, Ravi Kiran, Deepak Garg (2011). A framework for efficient enterprise resource planning implementation in technical educational institutions. African Journal of Business Management , 5 (34), 13197-13204. [IF(2016) : 1.105] . Google Citation
  274. Bharat Gupta, Deepak Garg (2011). A Taxonomy of Classical Frequent Item set Mining Algorithms. International Journal of Computer and Electrical Engineering, 3 (5), 695-699. Google Citation
  275. Kamala Kritivasan, Venkata Padmavati Metta, Deepak Garg (2011). On String Languages Generated by SN P Systems with Anti-Spikes. International Journal of Foundations of Computer Science, 22 (1), 15-27. [IF(2016) : 0.39 ] . Google Citation
  276. Venkata Padmavati Metta, Kamala Kritivasan, Deepak Garg (2011). Spiking Neural P Systems with Anti-Spikes as Transducers. Romanian Journal of Science and Technology, 14 (1), 20-30. [IF(2016) : 0.304] . Google Citation
  277. Parteek Kumar, Rajendra Kumar Sharma (2011). Generation of UNL attributes and resolving relations for Punjabi EnConverter. Malaysian Journal of Computer Science, 24 (1), 34-46. [IF(2016) : 0.6] . Google Citation
  278. Satnam Singh, Anil Vashisht, Vishal (2011). PAHs in some brands of tea. Environmental Monitoring and Assessment, 177 (42095), 35-38. [IF(2016) : 1.687] . Google Citation
  279. Neeraj Kumar, Chilamkurti N., Kim J. (2011). Routing in WDM based wireless mesh networks with capacity estimation. International Journal of Internet Protocol Technology, 6 (4), 224-233. Google Citation
  280. Metta V.P., Krithivasan K., Deepak Garg (2011). Modelling and analysis of spiking neural P systems with anti-spikes using Pnet lab. Nano Communication Networks, 2 (42065), 141-149. Google Citation
  281. Batra S., Seema Bawa (2011). Semantic discovery of web services using principal component analysis. International Journal of Physical Sciences, 6 (18), 4466-4472. [IF(2016) : 0.54] . Google Citation
  282. Varinder Pal Singh, Kumar K. (2011). Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications, 60 (4), 679-685. [IF(2016) : 0.951] . Google Citation
  283. Bhanwar S., Seema Bawa (2011). Pluggable, interoperable and extensible (PIE): A grid portal for interoperability. International Journal of Physical Sciences, 6 (22), 5329-5344. [IF(2016) : 0.54] . Google Citation
  284. Gupta A.K., Sadawarti H., Anil Kumar Verma (2011). A review of routing protocols for Mobile Ad Hoc Networks. WSEAS Transactions on Communications, 10 (11), 331-340. Google Citation
  285. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (2010). HMM based Online Handwritten Gurmukhi Character Recognition. Machine Graphics and Vision, 19 (4), 439-449. Google Citation
  286. Jahangir Alam, Rajesh Kumar (2010). Eight Row Matrix(ERM) : A new topology for designing Cost Effective product networks. International Journal of Engineering Science and Technology, 2 (4), 330-340. Google Citation
  287. Jahangir Alam, Rajesh Kumar, Zubair Khan (2010). Linearly Extendible Arm(LEA) - A Constant Degree Topology for Designing Cost Effective Product networks. Ubiquitous Computing and Communication Journal, 5 (2), 40-48. Google Citation
  288. Rajesh Kumar, P.S. Grover, Avadhesh Kumar (2010). A Fuzzy Logic Approach to Measure Complexity of Generic Aspect-Oriented Systems. Journal of Object Technology, 9 (3), 43-57. Google Citation
  289. Avadhesh Kumar, P.S. Grover, Rajesh Kumar (2009). A Quantitative Evaluation of Aspect- Oriented Software Quality Model (AOSQUAMO). ACM SIGSOFT Software Engineering Notes, 34 (5), 115-9. Google Citation
  290. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (2009). Recognizing Online Handwritten Gurmukhi Characters using Comparison of Small Line Segments. International Journal of Computer Theory and Engineering, 119 (2), 131-135. Google Citation
  291. Avadhesh Kumar, P.S. Grover, Rajesh Kumar (2009). Generalised Coupling Measures for Aspect - Oriented Systems. ACM SIGSOFT Software Engineering Notes, 34 (3), 1-6. Google Citation
  292. Arun Sharma, Rajesh Kumar, P.S. Grover (2009). Dependency Analysis for Component-Based Software Systems. ACM SIGSOFT Software Engineering Notes, 34 (3), 1-5. Google Citation
  293. Arun Sharma, Rajesh Kumar, P.S. Grover (2009). Reusability Assessment for Software Components. ACM SIGSOFT Software Engineering Notes, 34 (2), 1-6. Google Citation
  294. Anuj Sharma, Rajendra Kumar Sharma, Rajesh Kumar (2009). Online Handwritten Gurmukhi Strokes Preprocessing. International Journal of Machine GRAPHICS and VISION, 18 (1), 105-120. Google Citation
  295. Varinder Pal Singh, Chakraverty S., Rajendra Kumar Sharma, Sharma G.K. (2009). Modeling vibration frequencies of annular plates by regression based neural network. Applied Soft Computing, 9 (1), 439-447. [IF(2016) : 3.541 ] . Google Citation
  296. Kausha S., Rajendra Kumar Sharma (2009). Modeling and analysis of adaptive buffer sharing scheme for consecutive packet loss reduction in broadband networks. World Academy of Science, Engineering and Technology, 39 (), 418-425. Google Citation
  297. Kumar S., Bansal P.K., Seema Bawa (2009). Modified quad tree network with architectural analysis (M-QUAD). Computer Systems Science and Engineering, 24 (2), 59-69. [IF(2016) : 0.348] . Google Citation
  298. Kaushal S., Rajendra Kumar Sharma (2009). Performance analysis of adaptive buffer management mechanism using autoregressive based MPEG-4 encoded video traffic model. Simulation Modelling Practice and Theory, 17 (10), 1642-1662. [IF(2016) : 1.954] . Google Citation
  299. Arun Sharma, Rajesh Kumar, P.S. Grover (2008). Empirical Evaluation and Validation of Interface Complexity Metrics for Software Components. International Journal of Software Engineering and Knowledge Engineering, 18 (7), 519-531. [IF(2016) : 0.299 ] . Google Citation
  300. P.S.Grover, Rajesh Kumar, Avadhesh Kumar (2008). Measuring Changeability for Generic Aspect-Oriented Systems. ACM SIGSOFT Software Engineering Notes, 33 (6), 1-5. Google Citation
  301. Arun Sharma, Rajesh Kumar, P.S. Grover (2008). Estimation of Quality for Software Components – an Empirical Approach. ACM SIGSOFT Software Engineering Notes, 33 (6), 1-10. Google Citation
  302. Sharma A., Seema Bawa (2008). Comparative analysis of resource discovery approaches in grid computing. Journal of Computers, 3 (5), 60-64. Google Citation
  303. Kumar S., Bansal P.K., Seema Bawa (2008). Modified quad tree network with architectural analysis (M_QUAD). Engineering Intelligent Systems, 16 (3), 155-164. Google Citation
  304. Sharma A., Rajesh Kumar, Grover P.S. (2008). Empirical evaluation and validation of interface complexity metrics for software components. International Journal of Software Engineering and Knowledge Engineering, 18 (7), 919-931. [IF(2016) : 0.299 ] . Google Citation
  305. Banga V.K., Singh Y., Rajesh Kumar (2008). Uncertainty compensation and optimization of three and four degree-of-freedom robotics system using Genetic Algorithm. Modelling, Measurement and Control B, 77 (42036), 70-82. Google Citation
  306. P.S. Grover, Rajesh Kumar, Arun Sharma (2007). Few Useful Considerations for Maintaining Software Components and Component-Based Systems. ACM SIGSOFT Software Engineering Notes, 32 (4), 1564-5. Google Citation
  307. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2007). An Evaluation of Maintainability of Aspect-Oriented Systems: a Practical Approach. International Journal of Computer Science and Security, 1 (2), 1-9. Google Citation
  308. Arun Sharma, Rajesh Kumar, P.S. Grover (2007). Managing Component-Based Systems With Reusable Components. International Journal of Computer Science and Security , 1 (2), 60-65. Google Citation
  309. Vijay Kumar Banga, Yaduvir Singh, Rajesh Kumar (2007). Simulation Of Robotic Arm Using Genetic Algorithm & A H P. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1 (1), 32-38. Google Citation
  310. Sharma A.K., Rajendra Kumar Sharma, Kasana H.S. (2007). Prediction of first lactation 305-day milk yield in Karan Fries dairy cattle using ANN modeling. Applied Soft Computing, 7 (3), 1112-1120. [IF(2016) : 3.541 ] . Google Citation
  311. Sharma A., Rajesh Kumar, Grover P.S. (2007). Complexity measures for software components. WSEAS Transactions on Computers, 6 (7), 1005-1012. Google Citation
  312. Singh S., Seema Bawa (2007). A privacy policy framework for grid and web services. Information Technology Journal, 6 (6), 809-817. Google Citation
  313. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2006). A Comparative Study of Aspect-Oriented Methodology with Module-Oriented and Object-Oriented Methodologies. The IUP Journal of Information Technology, 6 (), 7-15. Google Citation
  314. Arun Sharma, Rajesh Kumar, P.S. Grover (2006). Investigation of Reusability, Complexity and Customizability Metrics for Component-based Systems. The IUP Journal of Information Technology, June (), -. Google Citation
  315. Sharma A.K., Rajendra Kumar Sharma, Kasana H.S. (2006). Empirical comparisons of feed-forward connectionist and conventional regression models for prediction of first lactation 305-day milk yield in Karan Fries dairy cows. Neural Computing & Applications, 15 (42097), 359-365. [IF(2016) : 2.505 ] . Google Citation
  316. Chakraverty S., Varinder Pal Singh, Rajendra Kumar Sharma (2006). Regression based weight generation algorithm in neural network for estimation of frequencies of vibrating plates. Computer Methods in Applied Mechanics and Engineering, 195 (33-36), 4194-4202. [IF(2016) : 3.949 ] . Google Citation
  317. Deepak Garg, S.C. Saxena, Bhardwaj L.M. (2006). An efficient algorithm after ungapped analysis in BLAST. DNA Sequence - Journal of DNA Sequencing and Mapping, 17 (4), 247-253. Google Citation
  318. Deepak Garg, S.C. Saxena, Bhardwaj L.M. (2006). A new middle path approach for alignments in blast. Journal of Biological Systems, 14 (4), 567-581. [IF(2016) : 0.39] . Google Citation
  319. Gupta P., Arvind Kumar Lal, Rajendra Kumar Sharma, Singh J. (2005). Numerical analysis of reliability and availability of the serial processes in butter-oil processing plant. International Journal of Quality and Reliability Management, 22 (3), 303-316. Google Citation
  320. Seema Bawa, G.K. Sharma (2002). A parallel transitive closure computation algorithm for VLSI test generation. Applied Parallel Computing : Advance Scientific Computing, 2367 (), 243-253. [IF(2016) : 0.402] . Google Citation
  321. Nagarathnamma R., Rinkle Rani (1999). Decolorization and detoxification of extraction-stage effluent from chlorine bleaching of kraft pulp by Rhizopus oryzae. Applied and Environmental Microbiology, 65 (3), 1078-1082. [IF(2016) : 3.807] . Google Citation
  322. Pawan Gupta, A. K. Lal, Rajendra Kumar Sharma, J. Singh (). Analysis of Reliability and Availability of Serial Processes of Plastic-pipe Manufacturing Plant: A Case Study. International Journal of Quality and Reliability Management, 24 (4), 404-419. [IF(2016) : 1.117 / 0.653.] . Google Citation

Conference(s) :

  1. Harjeet Singh, Rajendra Kumar Sharma, R. Kumar, K. Verma, R. Kumar, M. Kumar (2018). A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals. Proceedings of the 16th International Conference on Frontiers in Handwriting Recognition [ : ], pp.-.. Google Citation
  2. Devesh Dahake, Rajendra Kumar Sharma, Harjeet Singh (2017). On Segmentation of Words from Online Handwritten Gurmukhi Sentences. Proceedings of the In: 2nd International Conference on Man and Machine Interfacing (MAMI) [2nd : : ], pp.-.. Google Citation
  3. K. C. Bhardwaj, Rajendra Kumar Sharma (2016). Web Services Classification Using Machine Learning Models. Proceedings of the In Proc: ICEMS-2016, Jaipur National University, Jaipur [Jaipur : 17-19 March 2016.], pp.-.. Google Citation
  4. Singh H., Seema Bawa (2016). Spatial data analysis with ArcGIS and MapReduce. Proceedings of the Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 [ : 29 April 2016 through 30 April 2016], pp.45-49.. Google Citation
  5. Maneesha, Inderveer Chana (2016). Searching of near exact duplicate images in cloud database. Proceedings of the International Conference on Inventive Computation Technologies [ : 26-27 Aug. 2016], pp.-.. Google Citation
  6. Prashant Singh Rana, Shivendra Pratap Singh (2016). Genetic algorithm with mixed crossover approach for travelling salesman problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation
  7. Lachheta P., Seema Bawa (2016). Combining synthetic minority oversampling technique and subset feature selection technique for class imbalance problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation
  8. Puneet Garg, Rinkle Rani, Sumit Miglani (2015). Analysis and Visualization of Professional’s LinkedIn Data. Proceedings of the Emerging Research in Computing, Information, Communication and Applications [ : ], pp.1-9.. Google Citation
  9. Kumar P., Maninder Singh (2015). Mobile applications: Analyzing private data leakage using third party connections. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015 [ : 10 August 2015 through 13 August 2015], pp.57-62.. Google Citation
  10. Dhammi A., Maninder Singh (2015). Behavior analysis of malware using machine learning. Proceedings of the 2015 8th International Conference on Contemporary Computing, IC3 2015 [ : 20 August 2015 through 22 August 2015], pp.481-486.. Google Citation
  11. Gill H.K., Maninder Singh (2015). Analyze university network traffic to explore usage behaviour and to detect malicious activities. Proceedings of the Proceedings on 2015 1st International Conference on Next Generation Computing Technologies, NGCT 2015 [ : ], pp.686-691.. Google Citation
  12. Dua A., Kumar N., Seema Bawa (2015). An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET. Proceedings of the Proceedings - 2015 IEEE International Conference on Data Science and Data Intensive Systems; 8th IEEE International Conference Cyber, Physical and Social Computing; 11th IEEE International Conference on Green Computing and Communications and 8th IEEE International Conference on Internet of Things, DSDIS/CPSCom/GreenCom/iThings 2015 [ : ], pp.427-434.. Google Citation
  13. Suman Jain, Inderveer Chana (2015). Modernization of Legacy Systems: A Generalised Roadmap. Proceedings of the ICCCT '15 Proceedings of the Sixth International Conference on Computer and Communication Technology 2015 [ : ], pp.62-67.. Google Citation
  14. Chawla C., Inderveer Chana (2015). Optimal time dependent pricing model for smart cloud with cost based scheduling. Proceedings of the ACM International Conference Proceeding Series?? [ : ], pp.522-526.. Google Citation
  15. Goyal S., Bhatia T., Anil Kumar Verma (2015). Wormhole and sybil attack in WSN: A review. Proceedings of the 2015 International Conference on Computing for Sustainable Global Development INDIACom 2015?? [ : ], pp.-.. Google Citation
  16. Anshu Singla, Swarnajyoti Patra (2015). A context sensitive thresholding technique for automatic image segmentation. Proceedings of the Computational Intelligence in Data Mining [ : ], pp.19-25.. Google Citation
  17. Shukla R., Maninder Singh (2015). PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems. Proceedings of the Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 [ : 8 October 2014 through 10 October 2014], pp.-.. Google Citation
  18. Kaur R., Maninder Singh (2015). Two-level automated approach for defending against obfuscated zero-day attacks. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 August 2014 through 29 August 2014], pp.164-179.. Google Citation
  19. Goyal S., Seema Bawa, Singh B. (2015). Experimental comparison of three scheduling algorithms for energy efficiency in cloud computing. Proceedings of the 2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014 [ : 15 October 2014 through 17 October 2014], pp.-.. Google Citation
  20. Verma K., Rajendra Kumar Sharma (2015). Performance Analysis of Zone Based Features for Online Handwritten Gurmukhi Script Recognition using Support Vector Machine. Proceedings of the Advances in Intelligent Systems and Computing [Las Vegas, NV : 19 August 2014 through 21 August 2014], pp.747-753.. Google Citation
  21. Karun Verma, Rajendra Kumar Sharma (2014). Performance analysis of zone based features for online handwritten Gurmukhi Script Recognition Using Support Vector Machine. Proceedings of the In Proc: Progress in Systems Engineering Advances in Intelligent Systems and Computing [ : August 2014], pp.747-753-.. Google Citation
  22. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2014). Offline Handwritten Gurmukhi Character Recognition System using RBF-SVM. Proceedings of the International Workshop on Document Analysis and Recognition, IISc, Bangalore [ : 14 DEC 2014 ], pp.-.. Google Citation
  23. Mahajan S., Maninder Singh (2014). Performance analysis of efficient RSA text encryption Using NVIDIA CUDA-C and OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  24. Gupta V., Maninder Singh, Bhalla V.K. (2014). Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis. Proceedings of the Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 [ : 24 September 2014 through 27 September 2014], pp.50-54.. Google Citation
  25. Sharma S., Maninder Singh (2014). An efficient and secure database system using OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  26. Mahajan R., Maninder Singh, Miglani S. (2014). ADS: Protecting NTFS from hacking. Proceedings of the International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2014 [ : 9 May 2014 through 11 May 2014], pp.-.. Google Citation
  27. Kaur R., Maninder Singh (2014). Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. Proceedings of the Communications in Computer and Information Science [Trivandrum : 13 March 2014 through 14 March 2014], pp.298-309.. Google Citation
  28. Kapoor L., Seema Bawa, Gupta A. (2014). A novel mechanism for dynamic optimization of intercloud services. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 October 2014 through 31 October 2014], pp.377-388.. Google Citation
  29. Arora S., Inderveer Chana (2014). A survey of clustering techniques for big data analysis. Proceedings of the Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit [ : 25 September 2014 through 26 September 2014], pp.59-65.. Google Citation
  30. Kaur P.,D., Inderveer Chana (2014). Behavior analysis of multifarious cloud applications. Proceedings of the Proceedings - 2014 4th International Conference on Advances in Computing and Communications, ICACC 2014 [ : 27 August 2014 through 30 August 2014], pp.175-178.. Google Citation
  31. Jain S., Inderveer Chana (2014). Reengineering process of legacy systems for the cloud: An overview. Proceedings of the Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014 [ : 11 December 2014 through 13 December 2014], pp.164-168.. Google Citation
  32. Sharma A., Rinkle Rani (2014). A 3-level model for implementing MOOC in India. Proceedings of the 2014 IEEE International Conference on MOOCs, Innovation and Technology in Education, IEEE MITE 2014 [ : 19 December 2014 through 20 December 2014], pp.132-137.. Google Citation
  33. Kaur R., Maninder Singh (2014). Efficient hybrid technique for detecting zero-day polymorphic worms. Proceedings of the Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 [Gurgaon : 21 February 2014 through 22 February 2014], pp.95-100.. Google Citation
  34. Sukhpal Singh, Inderveer Chana (2013). Consistency verification and quality assurance (CVQA) traceability framework for SaaS. Proceedings of the IEEE International Advance Computing Conference [3rd : : 22-23 Feb. 2013], pp.1-6.. Google Citation
  35. Kapoor L., Seema Bawa, Gupta A. (2013). Hierarchical chord-based resource discovery in intercloud environment. Proceedings of the Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013 [Dresden, Saxony : 9 December 2013 through 12 December 2013], pp.464-469.. Google Citation
  36. Tekchandani R., Bhatia R.,K., Maninder Singh (2013). Semantic code clone detection using parse trees and grammar recovery. Proceedings of the IET Conference Publications [Noida : 26 September 2013 through 27 September 2013], pp.41-46.. Google Citation
  37. Singh S., Inderveer Chana, Maninder Singh (2013). Z language based an algorithm for event detection, analysis and classification in machine vision. Proceedings of the 2013 International Conference on Human Computer Interactions, ICHCI 2013 [Chennai : 23 August 2013 through 24 August 2013], pp.-.. Google Citation
  38. Aron R., Inderveer Chana, Abraham A. (2013). Hyper-heuristic based resource scheduling in grid environment. Proceedings of the Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013 [Manchester : 13 October 2013 through 16 October 2013], pp.1075-1080.. Google Citation
  39. Dua A., Kumar N., Seema Bawa, Chilamkurti N. (2013). Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs. Proceedings of the 2013 International Symposium on Wireless and Pervasive Computing, ISWPC 2013 [Taipei : 20 November 2013 through 22 November 2013], pp.-.. Google Citation
  40. Rathore N., Inderveer Chana (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. Proceedings of the 2013 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2013 [Shimla, HP : 26 September 2013 through 28 September 2013], pp.-.. Google Citation
  41. Atul Bansal, R. Agarwal, Rajendra Kumar Sharma (2012). FAR and FRR Based Analysis of Iris Recognition System. Proceedings of the In Proc. IEEE International Conference on Signal Processing, Computing and Control (ISPCC 12) [ : 1-6, 15-17 March, 2012], pp.-.. Google Citation
  42. Swati Mittal, Rajendra Kumar Sharma, Parteek Bhatia (2012). Cascading Style Sheet Styling Issues in Punjabi Language. Proceedings of the Communications in Computer and Information Science - Information Systems for Indian Languages [ : 2012], pp.242-245-.. Google Citation
  43. Singara Singh, Rajendra Kumar Sharma, M. K. Sharma (2012). Tile Boundary Artifacts Reduction of JPEG2000 Compressed Images. Proceedings of the In Proc. International Conference on Signal and Image Processing, Bangalore [Bangalore : 4-5 January, 2012.], pp.-.. Google Citation
  44. Kumar A., Seema Bawa (2012). Virtualization of large-scale data storage system to achieve dynamicity and scalability in grid computing. Proceedings of the Advances in Intelligent and Soft Computing [New Delhi : 25 May 2012 through 27 May 2012], pp.323-331.. Google Citation
  45. Rattan D., Bhatia R., Maninder Singh (2012). Model clone detection based on tree comparison. Proceedings of the 2012 Annual IEEE India Conference, INDICON 2012 [Kochi, Kerala : 7 December 2012 through 9 December 2012], pp.1041-1046.. Google Citation
  46. Munish Kumar, Rajendra Kumar Sharma, M. K. Jindal (2012). Offline handwritten Gurmukhi character recognition: Study of different feature-classifier combinations. Proceedings of the ACM International Conference Proceeding Series [Mumbai : 16 December 2012 through 16 December 2012], pp.94-99.. Google Citation
  47. Priyanka, Inderveer Chana, Rana A. (2012). An effective approach to build optimal T-way interaction test suites over cloud using particle swarm optimization. Proceedings of the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering [Chennai : 24 February 2012 through 25 February 2012], pp.193-198.. Google Citation
  48. Swati Mittal, Rajendra Kumar Sharma, Parteek Bhatia (2011). Cascading Style Sheet Styling Issues in Punjabi Language. Proceedings of the In Proc. of International Conference on Information Systems for Indian Languages (ICISIL-2011) [Punjabi University, Patiala : March 9-11, 2011], pp.242-245.. Google Citation
  49. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2011). SVM based Offline Handwritten Gurmukhi Character Recognition. Proceedings of the In Proc. of SCAKD-2011 [Moscow, Russia : June 25-27, 2011], pp.51-62.. Google Citation
  50. Rajendra Kumar Sharma, Parteek Bhatia, Rekha Rattan (2011). Challenges in Creation of Punjabi WordNet and Bilingual Dictionaries. Proceedings of the In Proc. of the Second National Workshop of Indradhanush WordNet Consortium, Goa University [ : August 8-10, 2011], pp.105-112.. Google Citation
  51. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2011). Review on OCR for Handwritten Indian Scripts Character Recognition. Proceedings of the In Proc. of DPPR-2011 [ : ], pp.268-276.. Google Citation
  52. Munish Kumar, Rajendra Kumar Sharma, M. K. Jindal (2011). Classification of Characters and Grading Writers in Offline Handwritten Gurmukhi Script. Proceedings of the In Proc. of ICIIP-2011 (IEEE) [ : 2011], pp.-.. Google Citation
  53. Mamta Mittal, V. P. Singh, Rajendra Kumar Sharma (2011). Random Automatic Detection of Clusters. Proceedings of the In Proc. International Conference on Image Information Process Processing (ICIIP-2011) [ : 2011], pp.1-6.. Google Citation
  54. Munish Kumar, M. K. Jindal, Rajendra Kumar Sharma (2011). Offline Handwritten Gurmukhi Character Recognition Using Curvature Feature. Proceedings of the In Proc. of AMOC 2011 [ : 2011], pp.981-989.. Google Citation
  55. A. K. Sharma, B. Mann, Rajendra Kumar Sharma (2011). Predicting Antioxidant Capacity of Whey Protein Hydrolysates Using Soft Computing Models. Proceedings of the Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) [ : December 20-22, 2011], pp.259-265.. Google Citation
  56. Aradhana, Inderveer Chana (2011). Implementing trust policies for cloud: A case study. Proceedings of the International Conference on Emerging Trends in Networks and Computer Communications [ : 22-24 April 2011], pp.355-358.. Google Citation
  57. Mittal S., Rajendra Kumar Sharma, Bhatia P. (2011). Cascading style sheet styling issues in Punjabi language. Proceedings of the Communications in Computer and Information Science [Patiala : 9 March 2011 through 11 March 2011], pp.242-245.. Google Citation
  58. Chopra I., Maninder Singh (2011). SASM - An approach towards self-protection in grid computing. Proceedings of the Communications in Computer and Information Science [Gurgaon : 10 March 2011 through 12 March 2011], pp.149-159.. Google Citation
  59. Kaur P.D., Inderveer Chana (2011). Evaluating cloud platforms - An application perspective. Proceedings of the Communications in Computer and Information Science [Nagpur, Maharashtra : 21 April 2011 through 22 April 2011], pp.449-453.. Google Citation
  60. Kaur P.D., Inderveer Chana (2011). Enhancing grid resource scheduling algorithms for cloud environments. Proceedings of the Communications in Computer and Information Science [Chandigarh : 19 July 2011 through 20 July 2011], pp.140-144.. Google Citation
  61. Sanchika Gupta, Deepak Garg (2011). Ontology based information retrieval for learning styles of autistic people. Proceedings of the Communications in Computer and Information Science [Chandigarh : 19 July 2011 through 20 July 2011], pp.293-298.. Google Citation
  62. Aron R., Inderveer Chana (2011). Resource provisioning for grid: A policy perspective. Proceedings of the Communications in Computer and Information Science [Noida : 8 August 2011 through 10 August 2011], pp.546-547.. Google Citation
  63. Aron R., Inderveer Chana (2011). Cost based resource provisioning policy for grids. Proceedings of the Proceedings of the World Congress on Engineering 2011, WCE 2011 [London : 6 July 2011 through 8 July 2011], pp.1530-1533.. Google Citation
  64. Kumar M., Jindal M.,K., Rajendra Kumar Sharma (2011). Classification of characters and grading writers in offline handwritten Gurmukhi script. Proceedings of the ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing [Waknaghat, Shimla, Himachal Pradesh : 3 November 2011 through 5 November 2011], pp.-.. Google Citation
  65. Mittal M., Singh V.,P., Rajendra Kumar Sharma (2011). Random automatic detection of clusters. Proceedings of the ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing [Waknaghat, Shimla, Himachal Pradesh : 3 November 2011 through 5 November 2011], pp.-.. Google Citation
  66. Kumar M., Jindal M.,K., Rajendra Kumar Sharma (2011). K-nearest neighbor based offline handwritten Gurmukhi character recognition. Proceedings of the ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing [Waknaghat, Shimla, Himachal Pradesh : 3 November 2011 through 5 November 2011], pp.-.. Google Citation
  67. Rathore N., Inderveer Chana (2011). A cognitive analysis of load balancing and job migration technique in Grid. Proceedings of the Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011 [Mumbai : 11 December 2011 through 14 December 2011], pp.77-82.. Google Citation
  68. Aradhana, Inderveer Chana (2011). Developing trust policies for cloud scenarios. Proceedings of the 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011 [Allahabad : 15 September 2011 through 17 September 2011], pp.389-393.. Google Citation
  69. Sumit Goyal, A. K. Sharma, Rajendra Kumar Sharma (2010). Comparison of Neuro-Computing and Conventional Regression Models for Predicting Shelf Life of Khoa. Proceedings of the International Journal of Computational Intelligence Research [ : 2010], pp.561-565.. Google Citation
  70. Mamta Mittal, V. P. Singh, Rajendra Kumar Sharma (2010). A New Validation Method for Partitioning Based Clustering. Proceedings of the International Journal of Computational Intelligence Research [ : ], pp.613-617.. Google Citation
  71. Munish Kumar, Rajendra Kumar Sharma, M. K. Jindal (2010). Review on OCR for Documents in Handwritten Gurmukhi Scripts. Proceedings of the In Proc. of National Conference on Recent Advances in Computational Techniques in Electrical Engineering (RACTEE 2010) [SLIET Longowal : 2010], pp.-.. Google Citation
  72. Atul Bansal, R. Agarwal, Rajendra Kumar Sharma (2010). Trends in Iris Recognition Algorithms. Proceedings of the In Proc. IEEE 4th Asia International Conference on Mathematical Modeling and Simulation 2010 (AMS’10) [ : 26-28 May, 2010], pp.337-340.. Google Citation
  73. Rupinderdeep Kaur, Rajendra Kumar Sharma, Parteek Bhatia (2010). Punjabi WordNet Relations and Categorization of Synsets. Proceedings of the 3rd IndoWordNet Workshop Under the Aegis of ICON 2010 [IIT Kharagpur : December 8, 2010], pp.-.. Google Citation
  74. Munish Kumar, Rajendra Kumar Sharma, M. K. Jindal (2010). Segmentation of Lines and Words in Handwritten Gurmukhi Script Documents. Proceedings of the Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, IITM-10 [ : December 28-30, 2010], pp.-.. Google Citation
  75. Chopra I., Maninder Singh (2010). Agent based self-healing system for grid computing. Proceedings of the ICWET 2010 - International Conference and Workshop on Emerging Trends in Technology 2010, Conference Proceedings [Mumbai, Maharashtra : 26 February 2010 through 27 February 2010], pp.31-35.. Google Citation
  76. Chopra I., Maninder Singh (2010). Analysing the need for autonomic behaviour in grid computing. Proceedings of the 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 [Singapore : 26 February 2010 through 28 February 2010], pp.535-539.. Google Citation
  77. Kaur P.D., Inderveer Chana (2010). Unfolding the distributed computing paradigms. Proceedings of the ACE 2010 - 2010 International Conference on Advances in Computer Engineering [Bangalore : 21 June 2010 through 22 June 2010], pp.339-342.. Google Citation
  78. Bhanwar S., Seema Bawa (2010). Reputation enhancement in a trust management system. Proceedings of the Communications in Computer and Information Science [Chennai : 23 July 2010 through 25 July 2010], pp.440-451.. Google Citation
  79. Batra S., Seema Bawa (2010). Using LSI and its variants in text classification. Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering [ : 5 December 2008 through 13 December 2008], pp.313-316.. Google Citation
  80. Rajni, Inderveer Chana (2010). Resource provisioning and scheduling in grids: Issues, challenges and future directions. Proceedings of the 2010 International Conference on Computer and Communication Technology, ICCCT-2010 [Allahabad : 17 September 2010 through 19 September 2010], pp.306-310.. Google Citation
  81. Parteek Bhatia, Rajendra Kumar Sharma (2009). Designing of Rule Base for Punjabi-UNL Enconverter. Proceedings of the Proceedings of IEEE International Advanced Computing Conference [Thapar University, Patiala : March 2009], pp.-.. Google Citation
  82. Bhanwar S., Seema Bawa (2009). Establishing and evaluating trust in a grid environment. Proceedings of the I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks [Kaohsiung : 14 December 2009 through 16 December 2009], pp.674-678.. Google Citation
  83. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (2008). Recognizing Online Handwritten Gurmukhi Characters Using Elastic Matching. Proceedings of the IEEE Proceedings of 2008 International Congress on Image and Signal Processing [Sanya : May 27-30, 2008.], pp.391-396.. Google Citation
  84. Singara Singh, Rajendra Kumar Sharma, M. K. Sharma (2008). Performance Analysis of Edge Adaptive Wavelet Transform for Image Compression. Proceedings of the 11th Punjab Science Congress [Thapar University, Patiala : 07-09 February, 2008.], pp.54-55.. Google Citation
  85. A. K. Sharma, Rajendra Kumar Sharma (2008). Predicting Milk Yield Using Connectionist Models with Cubic Spline Interpolation based Initial Weights. Proceedings of the In: Proceedings of 11th Punjab Science Congress [Thapar University, Patiala : 07-09 February, 2008.], pp.-.. Google Citation
  86. A. K. Sharma, Rajendra Kumar Sharma (2008). Effect of Transfer Functions on the Performance of Connectionist Models – A Case Study. Proceedings of the In the proceedings of National Conference on Emerging Trends in Statistical Methods and Optimization Techniques [Jammu University, Jammu, India : February 22-23, 2008], pp.-.. Google Citation
  87. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (2008). Development of Online Handwritten Character Recognizer. Proceedings of the Proceedings of 3rd National Conference on Methods and Models in Computing (NCM2C-2008) [JNU New Delhi, : December 8-9, 2008], pp.-.. Google Citation
  88. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (2008). On the Recognition of Online Handwritten Gurmukhi Characters. Proceedings of the Proceedings of 2nd National Conference on Recent Trends in Information Systems [2nd : Jadavpur University, Kolkata : February 7-9, 2008], pp.42-45.. Google Citation
  89. Jindal M.,K., Rajendra Kumar Sharma, Lehal G.,S. (2008). Structural Features for Recognizing Degraded Printed Gurmukhi Script. Proceedings of the Proceedings - International Conference on Information Technology: New Generations, ITNG 2008 [Las Vegas, NV : 7 April 2008 through 9 April 2008], pp.668-673.. Google Citation
  90. A. K. Sharma, Rajendra Kumar Sharma, H. S. Kasana, A. K. Chakraverty (2007). Connectionists Vis-à-Vis Convention Models for Prediction of Lifetime Milk Production in Karan-Fries Dairy Cattle. Proceedings of the In the proceedings of the 2nd International Conference on Advanced Computing and Communication Techniques (ICACCT-2007) [2nd : Panipat (India) : November 03-04, 2007], pp.-.. Google Citation
  91. Singh B., Seema Bawa (2007). ACO based optimized scheduling algorithm for computational grids. Proceedings of the Proceedings of the 3rd IASTED International Conference on Advances in Computer Science and Technology, ACST 2007 [ : 2 April 2007 through 4 April 2007], pp.283-286.. Google Citation
  92. Bansal B., Seema Bawa (2007). Design and development of grid portals. Proceedings of the IEEE Region 10 Annual International Conference, Proceedings/TENCON [Melbourne : 21 November 2005 through 24 November 2005], pp.-.. Google Citation
  93. Jindal M.K., Rajendra Kumar Sharma, Lehal G.S. (2007). A Study of Different Kinds of Degradation in Printed Gurmukhi Script. Proceedings of the Proceedings - International Conference on Computing: Theory and Applications, ICCTA 2007 [Kolkata : 5 March 2007 through 7 March 2007], pp.538-544.. Google Citation
  94. Singh S., Seema Bawa (2007). Design of a framework for handling security issues in grids. Proceedings of the Proceedings - 9th International Conference on Information Technology, ICIT 2006 [Bhubaneswar : 18 December 2006 through 21 December 2006], pp.178-179.. Google Citation
  95. A. K. Sharma, Rajendra Kumar Sharma, H. S. Kasana (2006). A Comparative Analysis of Feed-Forward and Feed-back Connectionist Algorithms Applied to Prediction of Lifetime 305-Day Milk Yield in Karan-Fries Dairy Cattle. Proceedings of the Proceedings of the International Conference on Systemics, Cybernetics and Informatics (ICSCI-2006), [Hyderabad, India : January 04-08, 2006.], pp.622-626.. Google Citation
  96. Sakshi Kaushal, Rajendra Kumar Sharma (2006). Extending Broadband Services Through Mobile Networks Using WiMAX. Proceedings of the Proceedings of International Conference on Mobile Communications [Bangalore, India : August 4-5, 2006.], pp.-.. Google Citation
  97. Singh S., Seema Bawa (2006). A framework for handling security problems in grid environment using Web services security specifications. Proceedings of the 2006 2nd International Conference on Semantics Knowledge and Grid, SKG [Guilin Guangxi : 1 November 2006 through 3 November 2006], pp.-.. Google Citation
  98. Jindal M.,K., Rajendra Kumar Sharma, Lehal G.,S. (2006). Segmentation of Horizontally Over lapping lines in Printed Gurmukhi Script. Proceedings of the Proceedings - 2006 14th International Conference on Advanced Computing and Communications, ADCOM 2006 [Surathkal : 20 December 2006 through 23 December 2006], pp.226-229.. Google Citation
  99. M. K. Jindal, G S Lehal, Rajendra Kumar Sharma (2005). Segmentation of Touching Characters of Indian Scripts – An Overview. Proceedings of the Proceedings of National Conference on Recent advances and Future Trends in IT [Punjabi University, Patiala : 2005], pp.74-77.. Google Citation
  100. M. K. Jindal, G. S. Lehal, Rajendra Kumar Sharma (2005). A Study of Touching Characters in Degraded Gurmukhi Script. Proceedings of the International Conference on Computer Vision and Pattern Recognition, PRCV 2005 [Istanbul, Turkey : February 25-27, 2005], pp.-.. Google Citation
  101. Kaushal S., Rajendra Kumar Sharma (2005). Effect and Analysis of Sustainable Cell Rate Using MPEG Video Traffic in ATM Networks. Proceedings of the WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings [Orlando, FL : 10 July 2005 through 13 July 2005], pp.64-67.. Google Citation
  102. Maninder Singh, S.C. Saxena (2005). Open source arsenal - A workable esecurity solution. Proceedings of the The 7th International Conference on Advanced Communication Technology, ICACT 2005 [Phoenix Park : 21 February 2005 through 23 February 2005], pp.685-688.. Google Citation
  103. Rajendra Kumar Sharma, M. K. Jindal, G. S. Lehal, Simpel Jindal (2004). Segmentation of Touching Characters in Printed Gurmukhi Script. Proceedings of the Proceedings of RPIT 2004 [SHSL Central Institute of Engineering and Technology, Longowal : March 26-27, 2004.], pp.159-162.. Google Citation
  104. Rajendra Kumar Sharma, Sakshi Kaushal (2004). Comparison and Analysis of Routing Protocols Using Performance Metrics for Mobile Ad-hoc Networks. Proceedings of the Proceedings of ITWiNS 2004 [Thapar University, Patiala : December 18-19, 2004], pp.-.. Google Citation
  105. Rajendra Kumar Sharma, A. K. Sharma, H. S. Kasana (2004). Performance Evaluation of Some Back-Propagation Training Algorithms for Prediction of Milk Yield in Dairy Cattle. Proceedings of the Proceedings of FACM-2005 [Thapar University, Patiala : December 18-19, 2004.], pp.-.. Google Citation
  106. Rajendra Kumar Sharma, V. P. Singh, S. Chakraverty (2003). Neural Network Experiments on the Identification of Dynamic Systems. Proceedings of the MCASE-2003 [Thapar University, Patiala : 27-28 January 2003.], pp.-.. Google Citation
  107. Rajendra Kumar Sharma, V. P. Singh, S. Chakraverty (2003). New Soft-Computing based Estimation of Frequencies for Some Machine Elements to be Used in Construction Machinery . Proceedings of the CONSMACH 2003 [CBRI-Roorkee : 2003], pp.-.. Google Citation
  108. Ashok Sahai, Rajendra Kumar Sharma (2003). Estimation of Finite Population Mean Using Auxiliary Variables Information. Proceedings of the International Conference On Statistics, Combinatorics and Related Areas SCRA 2003 [University of Southern Maine (U.S.A.) : Oct. 3-5, 2003.], pp.-.. Google Citation
  109. Rajendra Kumar Sharma, J. Singh, A. K. Lal, Pawan Gupta (2002). Reliability Analysis of Ply-board Manufacturing Plant – A Numerical Analysis based Approach. Proceedings of the Punjab Science Congress [Thapar University, Patiala : 7-9 January 2002.], pp.-.. Google Citation
  110. Rajendra Kumar Sharma, J. Singh, A. K. Lal, Pawan Gupta (2001). Reliability Analysis of Cement Manufacturing Plant Using Numerical Technique. Proceedings of the National Conference on Mathematical and Statistical Techniques [Thapar University, Patiala : 6-8 December 2001.], pp.-.. Google Citation
  111. Rajendra Kumar Sharma, Ashok Sahai, M. K. Pande, Ajit Sahai (1990). An Illustrated Critical Revisit to the Principle of Invariance. Proceedings of the Proceedings of Conference of Allahabad Mathematical Society [Allahabad University : 7-9 April 1990.], pp.-.. Google Citation
  112. M. K. Jindal, Rajendra Kumar Sharma, G. S. Lehal (). Segmentation of Touching Characters in Upper Zone in Printed Gurmukhi Script. Proceedings of the Proceedings of 2nd Bangalore Annual Compute Conference [Bangalore, India : January 09 - 10, 2009], pp.-.. Google Citation
  113. Parteek Bhatia, Rajendra Kumar Sharma (). Role of Punjabi Morphology in Designing Punjabi - UNL Enconverter. Proceedings of the Proceedings of International Conference on Advances in Computing, Communication and Control (ICAC3’09) [ : January 23-24, 2009.], pp.-.. Google Citation
  114. Anuj Sharma, Rajesh Kumar, Rajendra Kumar Sharma (). Rearrangement of Recognized Strokes in Online Handwritten Gurmukhi Words Recognition ”, ICDAR-2009. Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009 [10th : Barcelona, Spain : July, 26-29, 2009], pp.-.. Google Citation
  115. Atul Bansal, R. Agarwal, Rajendra Kumar Sharma (). SVM Based Gender Classification Using Iris Images. Proceedings of the In Proc. 4th IEEE International Conference on Computational Intelligence and Computer Networks (CICN 12) [4th : : 3-5 November, 2012.], pp.425-429-.. Google Citation