header

Publications@Thapar

Thapar University
Patiala, Punjab - 147004

Publication@Thapar

Publications of Computer Science and Engineering

2017 (6) 2016 (61) 2015 (64) 2014 (56) 2013 (43) 2012 (28)
2011 (36) 2010 (10) 2009 (10) 2008 (8) 2007 (9) 2006 (6)
2005 (1) 2004 (1) 2002 (1) 1999 (1) All

Book(s) :

  1. Pritpal Singh (2016). Applications of Soft Computing in Time Series Forecasting Simulation and Modeling Techniques. : Springer. [ISBN : 978-3-319-26292-5] . Google Search
  2. Shivani Goel (2013). Express Learning - Artificial Intelligence. New Delhi: Pearson Education. [ISBN : 978-8131787472] . Google Search
  3. Parteek Bhatia, Gurvinder Singh (2013). Simplified Approach To DBMS(9th). New Delhi: Kalyani Publisher. [ISBN : 9788127246501] . Google Search
  4. Parteek Bhatia, Ranjit Singh, Sanjib Dutta, Ravneet Kaur Bhatia (2008). Simplified Approach To Visual Basic(3rd). New Delhi: Kalyani Publisher. [ISBN : 9789327245665] . Google Search
  5. Parteek Bhatia, Sanjeev Dutta, Ranjit Singh (2004). Simplified Approach To Oracle. New Delhi: Kalyani. [ISBN : 978-81-272-2339-5] . Google Search

Book Chapter(s) :

  1. Rajendra Kumar Sharma, Parteek Bhatia (2017). Development of Punjabi WordNet, Bilingual Dictionaries, Lexical Relations Creation, and Its Challenges. In Niladri Sekhar Dash, Pushpak Bhattacharyya, Jyoti D. Pawar, The WordNet in Indian Languages (pp. 83-99). Germany: Springer. [ISBN : 978-981-10-1907-4] . Google Search
  2. Kapil Yadav, Jhilik Bhattacharya (2016). Real-Time Hand Gesture Detection and Recognition for Human Computer Interaction. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 559-567). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search
  3. Sachin Meena, Jhilik Bhattacharya (2016). Encoded Scene Panorama Based Information Flow in a Multi Agent System. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 541-548). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search
  4. Pritpal Singh (2015). Big data time series forecasting model: A fuzzy-neuro hybridize approach. In , Computational Intelligence for Big Data Analysis (pp. 55-72). Netherlands: Springer. [ISBN : 978-3-319-16597-4] . Google Search
  5. Arun Sharma, P. S. Grover, Rajesh Kumar (2009). Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic. In Sanjay Ranka et al., Contemporary Computing (pp. pp 581-591). New Delhi: Springer. [ISBN : 978-3-642-03546-3] . Google Search

Journal(s) :

  1. Chandra Sekhar Vorugunti, Bharavi Mishra, Ruhul Amin, Rakesh P. Badoni, Mrudula Sarvabhatla, Dheerendra Mishra (2017). Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks. Wireless Personal Communications, (), -. [IF(2015) : 0.951] . Google Citation
  2. Podili P., Pattanaik K.K., Prashant Singh Rana (2017). BAT and Hybrid BAT Meta-Heuristic for Quality of Service-Based Web Service Selection. Journal of Intelligent Systems, 26 (1), 123-137. Google Citation
  3. Hua K.-L., Dai B.-R., Srinivasan K., Hsu Y.-H., Vishal Sharma (2017). A hybrid NSCT domain image watermarking scheme. Eurasip Journal on Image and Video Processing, 2017 (1), -. Google Citation
  4. Sukhpal Singh, Inderveer Chana, Rajkumar Buyya (2017). STAR: SLA-aware Autonomic Management of Cloud Resources. IEEE Transactions on Cloud Computing , (99), 1-14. Google Citation
  5. Ramnik Singh, Anil Kumar Verma (2017). Efficient image transfer over WSN using cross layer architecture. Optik - International Journal for Light and Electron Optics, 130 (), 499-405. [IF(2015) : 0.742] . Google Citation
  6. Vishal Sharma, Rajesh Kumar (2016). Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks. IT Convergence Practice, 2 (3), 24-33. Google Citation
  7. Vishal Sharma, Rajesh Kumar (2016). Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs. Computing and Informatics, 35 (5), -. [IF(2015) : 0.488 ] . Google Citation
  8. Lee J.-H., Singh K.D., Hadjadj-Aoul Y., Neeraj Kumar (2016). Wireless and Mobile Technologies for the Internet of Things. Mobile Information Systems, 2016 (), -. [IF(2015) : 0.849] . Google Citation
  9. Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues (2016). Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Communications Magazine , 54 (10), 60-66. [IF(2015) : 10.435] . Google Citation
  10. Dua A., Neeraj Kumar, Seema Bawa (2016). ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks. Telecommunication Systems, (), 1-20. [IF(2015) : 1.542] . Google Citation
  11. Bali R.S., Neeraj Kumar (2016). Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System. Computers & Electrical Engineering, 52 (), 82-97. [IF(2015) : 1.57] . Google Citation
  12. Bhardwaj A.K., Gajpal Y., Maninder Singh (2016). Fuzzy reliability analysis of integrated network traffic visualization system. Journal of Intelligent & Fuzzy Systems, 31 (3), 1941-1953. [IF(2015) : 1.261] . Google Citation
  13. Neeraj Kumar, Lee J.-H., Chilamkurti N., Vinel A. (2016). Energy-efficient multimedia data dissemination in vehicular clouds: Stochastic-reward-nets-based coalition game approach. IEEE Systems Journal, 10 (2), 847-858. [IF(2015) : 3.882 ] . Google Citation
  14. Goyal S., Seema Bawa, Singh B. (2016). Energy optimised resource scheduling algorithm for private cloud computing. International Journal of Ad Hoc and Ubiquitous Computing, 23 (2-Jan), 115-123. [IF(2015) : 0.705] . Google Citation
  15. Jindal A., Dua A., Kaur K., Mukesh Singh, Neeraj Kumar, Mishra S. (2016). Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid. IEEE Transactions on Industrial Informatics, 12 (3), 1005-1016. Google Citation
  16. Neeraj Kumar, Misra S., Chilamkurti N., Lee J.-H., Rodrigues J.J.P.C. (2016). Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment. IEEE Transactions on Dependable and Secure Computing, 13 (1), 133-145. Google Citation
  17. Xie Y., Wu L., Neeraj Kumar, Shen J. (2016). Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network. Wireless Personal Communications, (), 1-19. [IF(2015) : 0.951] . Google Citation
  18. Maitra T., Islam S.K.H., Amin R., Giri D., Khan M.K., Neeraj Kumar (2016). An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Security and Communication Networks, 9 (17), 4615-4638. [IF(2015) : 1.067 ] . Google Citation
  19. Iqbal K., Odetayo M., James A., Iqbal R., Neeraj Kumar, Barma S. (2016). An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images. Neurocomputing, 174 (), 413-430. Google Citation
  20. Zhang Y., Neeraj Kumar, Chen J., Rodrigues J.J.P.C. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9 (17), 3944-3951. [IF(2015) : 1.067 ] . Google Citation
  21. Jiang Q., Neeraj Kumar, Ma J., Shen J., He D., Chilamkurti N. (2016). A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. International Journal of Network Management, (), -. Google Citation
  22. Wang L., Liu W., Neeraj Kumar, He D., Tan C., Gao D. (2016). A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Security and Communication Networks, 9 (16), 3543-3557. [IF(2015) : 1.067 ] . Google Citation
  23. Khushneet Jindal, Rajiv Kumar (2016). A Note on "Data mining based noise diagnosis and fuzzy filter design for image processing". Computers & Electrical Engineering, 49 (), 50-51. [IF(2015) : 1.57] . Google Citation
  24. Suman Bala S., Anil Kumar Verma (2016). A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 21 (2), 140-155. [IF(2015) : 0.705] . Google Citation
  25. Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar (2016). A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Security and Communication Networks, 9 (17), 4650-4666. [IF(2015) : 1.067 ] . Google Citation
  26. Tarunpreet Bhatia, Simmi Kansal, Shivani Goel, Anil Kumar Verma (2016). A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Computers & Electrical Engineering, 56 (), 441-455. [IF(2015) : 1.57] . Google Citation
  27. Murari Mandal, Gaurav Sharma, Anil Kumar Verma (2016). A computational review of identity-based signcryption schemes. International Journal of Network Security, 18 (5), 969-977. Google Citation
  28. Kuljeet Kaur, Rubi Rana, Neeraj Kumar, Mukesh Singh, S. Mishra (2016). A Colored Petri Net Based Frequency Support Scheme Using Fleet of Electric Vehicles in Smart Grid Environment. IEEE Transactions on Power Systems, 31 (6), 4638-4649. [IF(2015) : 5.68 ] . Google Citation
  29. Goyal S., Seema Bawa, Singh B. (2016). Green Service Level Agreement (GSLA) framework for cloud computing. Computing, 98 (9), 949-963. [IF(2015) : 1.589 ] . Google Citation
  30. Anshu Singla, Swarnajyoti Patra (2016). A fast automatic optimal threshold selection technique for image segmentation. Signal Image and Video Processing, (), 1-8. [IF(2015) : 1.102] . Google Citation
  31. He D., Zeadally S., Neeraj Kumar, Wu W. (2016). Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Transactions on Information Forensics and Security, 11 (9), 2052-2064. Google Citation
  32. Silva B.M.C., Rodrigues J.J.P.C., Neeraj Kumar, Proen?a M.L., Jr., Han G. (2016). MobiCoop: An incentive-based cooperation solution for mobile applications. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4), -. Google Citation
  33. Kapoor L., Seema Bawa, Gupta A. (2016). Detecting and containing malicious services in an intercloud environment. Journal of Web Engineering, 15 (6-May), 521-538. [IF(2015) : 0.58] . Google Citation
  34. Singh S., Inderveer Chana, Maninder Singh, Buyya R. (2016). SOCCER: Self-Optimization of Energy-efficient Cloud Resources. Cluster Computing-The Journal of Networks Software Tools and Applications, (), 1-14. [IF(2015) : 1.514] . Google Citation
  35. Bhalla V.K., Neeraj Kumar (2016). An efficient scheme for automatic web pages categorization using the support vector machine. New Review of Hypermedia and Multimedia, 22 (3), 223-242. [IF(2015) : 0.758] . Google Citation
  36. Rathore N.K., Inderveer Chana (2016). Job Migration Policies for Grid Environment. Wireless Personal Communications, 89 (1), 241-269. [IF(2015) : 0.951] . Google Citation
  37. Tekchandani R., Bhatia R., Maninder Singh (2016). Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. Journal of Supercomputing, (), 1-28. [IF(2015) : 1.326 ] . Google Citation
  38. Kumar M., Jindal M.K., Rajendra Kumar Sharma (2016). A Novel Framework for Grading of Writers Using Offline Gurmukhi Characters. Proceedings of the National Academy of Sciences India Section A-Physical Sciences, 86 (3), 405-415. [IF(2015) : 0.425 ] . Google Citation
  39. Geeta Kasana, Kulbir Singh, Satwinder Singh Bhatia (2016). Block-Based High Capacity Multilevel Image Steganography. WORLD SCIENTIFIC PUBL CO PTE LTD, 25 (8), -. [IF(2015) : 0.481] . Google Citation
  40. Tanmoy Maitra, Mohammad S Obaidat, S.K. Islam, Debasis Giri, Ruhul Amin (2016). Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Security and Communication Networks, (), -. [IF(2015) : 1.067 ] . Google Citation
  41. Venkatasamy Sureshkumar, R. Anitha, N Rajamanickam, Ruhul Amin (2016). A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Computers & Electrical Engineering, (), -. [IF(2015) : 1.57] . Google Citation
  42. Sandeep Saharan, Ravinder Kumar (2016). Graph coloring based optimized algorithm for resource utilization in examination scheduling. Applied Mathematics & Information Sciences, 10 (3), 1193-1201. [IF(2015) : 1.232] . Google Citation
  43. Vishal Sharma, Ilsun You, Rajesh Kumar (2016). Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks. Mobile Information Systems, 8475820 (), 13 Pages-. [IF(2015) : 0.849] . Google Citation
  44. Vishal Sharma, Mehdi Bennis, Rajesh Kumar (2016). UAV-Assisted Heterogeneous Networks for Capacity Enhancement. IEEE Communications Letters, 20 (6), 1207-1210. [IF(2015) : 1.988] . Google Citation
  45. Vijay Kumar, Jitender Kumar Chhabra, Dinesh Kumar (2016). Data Clustering using Differential Search Algorithm. Pertanika Journal of Science and Technology, 24 (2), 295-306. Google Citation
  46. He D., Neeraj Kumar, Shen H., Lee J.-H. (2016). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, (), 1-14. Google Citation
  47. Garg N., Seema Bawa (2016). Comparative analysis of cloud data integrity auditing protocols. Journal of Network and Computer Applications, 66 (), 17-32. [IF(2015) : 3.5 ] . Google Citation
  48. Priyanka Chawla, Inderveer Chana, Ajay Rana (2016). Cloud-based automatic test data generation framework. Journal of Computer and System Sciences, 82 (5), 712-738. [IF(2015) : 1.678] . Google Citation
  49. Singh S., Inderveer Chana (2016). EARTH: Energy-aware autonomic resource scheduling in cloud computing. Journal of Intelligent & Fuzzy Systems, 30 (3), 1581-1600. [IF(2015) : 1.261] . Google Citation
  50. Arora V., Bhatia R., Maninder Singh (2016). A systematic review of approaches for testing concurrent programs. Concurrency and Computation: Practice and Experience , 28 (5), 1572-1611. [IF(2015) : 0.942] . Google Citation
  51. Nidhi Jain Kansal, Inderveer Chana (2016). Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach. Journal of Grid Computing, (), -. [IF(2015) : 2.766 ] . Google Citation
  52. Vinod Kumar Bhalla, Neeraj Kumar (2016). An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks. Wireless Personal Communications, (), 1-20. [IF(2015) : 0.951] . Google Citation
  53. Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti (2016). A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Journal of Supercomputing, (), 1-13. [IF(2015) : 1.326 ] . Google Citation
  54. Singh S., Inderveer Chana (2016). Resource provisioning and scheduling in clouds: QoS perspective. Journal of Supercomputing, (), 1-35. [IF(2015) : 1.326 ] . Google Citation
  55. Anju Bala, Inderveer Chana (2016). Prediction-based proactive load balancing approach through VM migration. Engineering with Computers, (), 1-12. [IF(2015) : 0.765 ] . Google Citation
  56. Manoj Manuja, Deepak Garg (2016). Performance and accuracy analysis of semantic kernel functions. Program-Electronic Library and Information Systems, 50 (1), 83-102. [IF(2015) : 0.556] . Google Citation
  57. Singh S., Inderveer Chana (2016). A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges. Journal of Grid Computing, (), 1-48. [IF(2015) : 2.766 ] . Google Citation
  58. Yadunath Pathak, Prashant Singh Rana, P.K. Singh, Mukesh Saraswat (2016). Protein structure prediction (RMSD ≤ 5 Å) using machine learning models. Interantional Journal of Data Mining and Bioinformatics, 14 (1), 71-85. Google Citation
  59. Gaurav Sharma, Suman Bala, Anil K. Verma (2016). An improved RSA-based certificateless signature scheme for wireless sensor networks. International Journal of Network Security, 18 (1), 82-89. Google Citation
  60. Vishal Sharma, Rajesh Kumar, P. Rana (2015). Self-Healing Neural Model for Stabilization Against Failures Over Networked UAVs. IEEE Communications Letters, 19 (11), 2013-2016. [IF(2015) : 1.988] . Google Citation
  61. Lohit Kapoor, Seema Bawa, Ankit Gupta (2015). Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud. International Journal of Next Generation Computing, 6 (3), 153-164. Google Citation
  62. Kaur K., Dua A., Jindal A., Neeraj Kumar, Mukesh Singh, Vinel A. (2015). A novel resource reservation scheme for mobile PHEVs in V2G environment using game theoretical approach. IEEE Transactions on Vehicular Technology, 64 (12), 5653-5666. Google Citation
  63. Anju Bala, Inderveer Chana (2015). Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing. Concurrent Engineering: Research and Applications, (), -. [IF(2015) : 1.0] . Google Citation
  64. Sharma G., Bala S., Anil Kumar Verma (2015). Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks. Wireless Personal Communications, 84 (2), 1469-1485. [IF(2015) : 0.951] . Google Citation
  65. Singh S., Inderveer Chana (2015). QoS-aware autonomic resource management in cloud computing: A systematic review. ACM Computing Surveys, 48 (3), -. [IF(2015) : 6.748] . Google Citation
  66. Ranga V., Dave M., Anil Kumar Verma (2015). Relay node placement to heal partitioned wireless sensor networks. Computers & Electrical Engineering, 48 (), 371-388. [IF(2015) : 1.57] . Google Citation
  67. Verma S., Deepak Garg (2015). Improvement in rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), 524-531. [IF(2015) : 0.724] . Google Citation
  68. Karamjeet Kaur, Rinkle Rani (2015). Managing Data in Healthcare Information Systems: Many Models, One Solution. IEEE Computer, 48 (3), 52-59. Google Citation
  69. Anjali Anand, Rinkle Rani, Himanshu Aggarwal (2015). A security model based on reputation and collaboration through route-request in mobile ad hoc networks. KSII Transactions on Internet and Information Systems, 9 (11), 4701-4719. [IF(2015) : 0.452] . Google Citation
  70. Vandana Jindal , A. K. Verma, Seema Bawa (2015). Quantitative Reduction in Communication Load for Energy Efficiency in WSN. Wireless Personal Communications, 85 (4), 2795-2810. [IF(2015) : 0.951] . Google Citation
  71. Neeraj Kumar, Zeadally S., Rodrigues J.J.P.C. (2015). QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Electronics, 62 (12), 7892-7900. [IF(2015) : 7.168] . Google Citation
  72. Kaur T., Inderveer Chana (2015). Energy efficiency techniques in cloud computing: A survey and taxonomy. ACM Computing Surveys, 48 (2), -. [IF(2015) : 6.748] . Google Citation
  73. Sourav Chhabra, Rasmeet Singh Bali, Neeraj Kumar (2015). Dynamic Vehicle Ontology Based Routing for VANETs. Procedia Computer Science, 57 (), 789-797. Google Citation
  74. Kumar M., Sharma A., Rajesh Kumar (2015). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach. Software - Practice and Experience, 45 (7), 949-971. [IF(2015) : 0.652] . Google Citation
  75. Avleen Kaur Malhi, Shalini Batra (2015). An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17 (1), 317-338. [IF(2015) : 0.723 ] . Google Citation
  76. Neeraj Kumar, Iqbal R., Misra S., Rodrigues J.J.P.C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81 (6), 1042-1058. [IF(2015) : 1.678] . Google Citation
  77. He D., Khan M.K., Neeraj Kumar (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1-Feb), 67-74. [IF(2015) : 0.705] . Google Citation
  78. Kansal N.J., Inderveer Chana (2015). Artificial bee colony based energy-aware resource utilization technique for cloud computing. Concurrency and Computation: Practice and Experience , 27 (5), 1207-1225. [IF(2015) : 0.942] . Google Citation
  79. Neeraj Kumar, Chilamkurti N., Misra S. (2015). Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Press, 53 (1), 48-55. [IF(2015) : 5.125] . Google Citation
  80. Jaskaran Preet Singha, Rasmeet S. Bali (2015). A hybrid backbone based clustering algorithm for vehicular ad-hoc networks. Procedia Computer Science, 46 (), 1005-1013. Google Citation
  81. Karamjeet Kaur, Hardeep Singh (2015). An algorithm of impairment aware routing for wavelength division multiplexed optical networks. Microwave and Optical Technology Letters, 57 (7), 1632-1636. [IF(2015) : 0.731] . Google Citation
  82. Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat (2015). Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis. IEEE Internet of Things Journal, 2 (4), 310-320. Google Citation
  83. Chawla P., Inderveer Chana, Rana A. (2015). A novel strategy for automatic test data generation using soft computing technique. Frontiers of Computer Science, 9 (3), 346-363. [IF(2015) : 1.039] . Google Citation
  84. Rajni Aron, Inderveer Chana, Ajith Abraham (2015). A hyper-heuristic approach for resource provisioning-based scheduling in grid environment. Journal of Supercomputing, 71 (4), 1427-1450. [IF(2015) : 1.326 ] . Google Citation
  85. Dua A., Neeraj Kumar, Seema Bawa, Rodrigues J.J.P.C. (2015). An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks. Mobile Networks and Applications, 20 (2), 181-200. [IF(2015) : 3.259 ] . Google Citation
  86. Neeraj Kumar, Rodrigues J.J.P.C., Lloret J., Dua, A. (2015). Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination. Mobile Networks and Applications, 20 (2), 251-267. [IF(2015) : 3.259 ] . Google Citation
  87. Tyagi S., Tanwar S., Gupta S.K., Neeraj Kumar, Rodrigues J.J.P.C. (2015). A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks. Telecommunication Systems, 59 (1), 43-62. [IF(2015) : 1.542] . Google Citation
  88. Neeraj Kumar, Bali R.S., Iqbal R., Chilamkurti N., Rho S. (2015). Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems. Journal of Supercomputing, 71 (9), 3258-3287. [IF(2015) : 1.326 ] . Google Citation
  89. Neeraj Kumar, Lee J.-H., Rodrigues J.J.P.C. (2015). Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach. IEEE Transactions on Intelligent Transportation Systems, 16 (3), 1148-1161. [IF(2015) : 3.724] . Google Citation
  90. Amin R., Islam S.K.H., Biswas G.P., Khan M.K., Neeraj Kumar (2015). An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical Systems, 39 (11), -. [IF(2015) : 2.456] . Google Citation
  91. Manoj Manuja, Deepak Garg (2015). Intelligent text classification system based on self-administered ontology. Turkish Journal of Electrical Engineering and Computer Sciences, 23 (2015), 1393-1404. [IF(2015) : 0.578] . Google Citation
  92. Sudhanshu Gupta, Deepak Garg (2015). Selectivity Estimation of range queries in Data Streams using Micro-clustering. International Arab Journal of Information Technology, 13 (5), -. [IF(2015) : 0.724] . Google Citation
  93. Seema Verma, Deepak Garg (2015). Improvement in Rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), -. [IF(2015) : 0.724] . Google Citation
  94. He D., Neeraj Kumar, Chilamkurti N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, (), -. [IF(2015) : 4.832] . Google Citation
  95. Singh S., Inderveer Chana (2015). Q-aware: Quality of service based cloud resource provisioning. Computers & Electrical Engineering, (), -. [IF(2015) : 1.57] . Google Citation
  96. Ruan O., Neeraj Kumar, He D., Lee J.-H. (2015). Efficient provably secure password-based explicit authenticated key agreement. Pervasive and Mobile Computing, (), -. [IF(2015) : 2.349 ] . Google Citation
  97. Tyagi S., Tanwar S., Neeraj Kumar, Rodrigues J.J.P.C. (2015). Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network. Pervasive and Mobile Computing, (), -. [IF(2015) : 2.349 ] . Google Citation
  98. Bali R.S., Neeraj Kumar, Rodrigues J.J. (2015). An efficient energy-aware predictive clustering approach for vehicular ad hoc networks. International Journal of Communication Systems, (), -. [IF(2015) : 1.066] . Google Citation
  99. Neeraj Kumar, Kaur K., Misra S.C., Iqbal R. (2015). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, (), -. [IF(2015) : 1.262 ] . Google Citation
  100. Tu H., Neeraj Kumar, Kim J., Seo J. (2015). A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools and Applications, (), -. [IF(2015) : 1.53 ] . Google Citation
  101. Tiwari R., Neeraj Kumar (2015). An adaptive cache invalidation technique for wireless environments. Telecommunication Systems, (), -. [IF(2015) : 1.542] . Google Citation
  102. He D., Neeraj Kumar, Lee J.-H. (2015). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, (), -. [IF(2015) : 1.584 ] . Google Citation
  103. Neeraj Kumar, Singh J.P., Bali R.S., Misra S., Ullah S. (2015). An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing. Cluster Computing-The Journal of Networks Software Tools and Applications, (), -. [IF(2015) : 1.514] . Google Citation
  104. Zhang Z., Qi Q., Neeraj Kumar, Chilamkurti N., Jeong H.-Y. (2015). A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools and Applications, 74 (10), 3477-3488. [IF(2015) : 1.53 ] . Google Citation
  105. Rathore N., Inderveer Chana (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31 (3), 597-615. [IF(2015) : 0.765 ] . Google Citation
  106. Kaur S., Maninder Singh (2015). A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. Computer Fraud and Security, 2015 (2), 10-16. Google Citation
  107. Ajay Batish, Anirban Bhattacharya, Neeraj Kumar (2015). Powder mixed dielectric: An approach for improved process performance in EDM. Particulate Science and Technology, 33 (2), 150-158. [IF(2015) : 0.784] . Google Citation
  108. Sharma S., Seema Bawa, Lomash H. (2015). Web Presence of Indian Digital Culture. Preservation, Digital Technology and Culture, 44 (2), 62-68. Google Citation
  109. Neeraj Kumar, Zeadally S., Chilamkurti N., Vinel A. (2015). Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Network, 29 (2), 62-69. [IF(2015) : 7.23 ] . Google Citation
  110. Neeraj Kumar, Misra S., Obaidat M.S. (2015). Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks. IEEE Systems Journal, 9 (3), 1081-1090. [IF(2015) : 3.882 ] . Google Citation
  111. Neeraj Kumar, Lee J.-H. (2015). Collaborative-Learning-Automata-Based Channel Assignment with Topology Preservation for Wireless Mesh Networks under QoS Constraints. IEEE Systems Journal, 9 (3), 675-685. [IF(2015) : 3.882 ] . Google Citation
  112. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach. Journal of Software : Practice and Experience, 45 (7), 949-971. Google Citation
  113. Supriya Kinger, Rajesh Kumar, Anju Sharma (2014). Efficient Dynamic Replication Algorithm Using Agent for Data Grid. The Scientific World Journal, 2014 (2014), 767016-. Google Citation
  114. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). Fuzzy Entropy based Framework for Multi-Faceted Test Case Classification and Selection: An Empirical Study. IET Software, 8 (3), 103-112. [IF(2015) : 0.733] . Google Citation
  115. Sunil, Rajesh Kumar (2014). Time Aware Test Case Prioritization based on Fault Coverage using Binary Integer Programming. International Journal of Data and Network Security, 2 (1), 102-103. Google Citation
  116. Neeraj Kumar Rathore, Inderveer Chana (2014). Variable Threshold Based Hierarchical Load Balancing Technique in Grid. Engineering with Computers, 30 (1), -. [IF(2015) : 0.765 ] . Google Citation
  117. Neeraj Kumar Rathore, Inderveer Chana (2014). Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing. Journal of Intelligent & Fuzzy Systems, 26 (6), 21-35. [IF(2015) : 1.261] . Google Citation
  118. Neeraj Kumar Rathore, Inderveer Chana (2014). Load Balancing and Job Migration Algorithm : Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125 . [IF(2015) : 0.951] . Google Citation
  119. Anju Bala, Inderveer Chana (2014). Intelligent failure prediction models for scientific workflows. Expert Systems with Applications, 42 (3), 980-989. [IF(2015) : 3.928 ] . Google Citation
  120. Tulika Pandey, Deepak Garg, Manoj Madhava Gore (2014). Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET. Scientific World Journal, 2014 (2014), -. [IF(2015) : 1.219] . Google Citation
  121. Srabanti Maji, Deepak Garg (2014). Hybrid Approach Using SVM and MM2 in Splice Site Junction Identification . Current Bioinformatics, 9 (1), 76-85. [IF(2015) : 0.6] . Google Citation
  122. Dua A., Neeraj Kumar, Seema Bawa (2014). A systematic review on routing protocols for Vehicular Ad Hoc Networks. Vehicular Communications, 1 (1), 33-52. Google Citation
  123. Bali R.S., Neeraj Kumar, Rodrigues J.J.P.C. (2014). Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions. Vehicular Communications, 1 (3), 134-152. Google Citation
  124. Jindal V., Seema Bawa, Batra S. (2014). A review of ranking approaches for semantic search on Web. Information Processing and Management, 50 (2), 416-425. [IF(2015) : 2.391] . Google Citation
  125. Sharma S., Lomash H., Seema Bawa (2014). Who Regulates Ethics in the Virtual World?. Science and Engineering Ethics, (), 1-10. [IF(2015) : 2.229 ] . Google Citation
  126. Shi W., Neeraj Kumar, Gong P., Chilamkurti N., Chang H. (2014). On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Networking and Applications, (), 1-5. [IF(2015) : 1.262 ] . Google Citation
  127. Tu H., Neeraj Kumar, Chilamkurti N., Rho S. (2014). An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications, (), 1-8. [IF(2015) : 1.262 ] . Google Citation
  128. He D., Neeraj Kumar, Chilamkurti N., Lee J.-H. (2014). Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. Journal of Medical Systems, 38 (10), -. [IF(2015) : 2.456] . Google Citation
  129. Vishal Sharma, Rajesh Kumar (2014). A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks. Journal of Intelligent & Robotic Systems, 77 (3), 629-652. Google Citation
  130. Bhardwaj A.K., Maninder Singh (2014). Data mining-based integrated network traffic visualization framework for threat detection. Neural Computing & Applications, (), -. [IF(2015) : 2.505 ] . Google Citation
  131. Dua A., Neeraj Kumar, Seema Bawa (2014). QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks. Mobile Networks and Applications, (), -. [IF(2015) : 3.259 ] . Google Citation
  132. Kaur R., Maninder Singh (2014). A survey on zero-day polymorphic worm detection techniques. IEEE Communications Surveys and Tutorials, 16 (3), 1520-1549. [IF(2015) : 17.188 ] . Google Citation
  133. Kaur P.D., Inderveer Chana (2014). Cloud based intelligent system for delivering health care as a service. Computer Methods and Programs in Biomedicine, 113 (1), 346-359. [IF(2015) : 2.503] . Google Citation
  134. Tu H., Neeraj Kumar, He D., Kim J., Lee C. (2014). An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. Journal of Supercomputing, 70 (1), 224-235. [IF(2015) : 1.326 ] . Google Citation
  135. Shi W., Neeraj Kumar, Gong P., Zhang Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8 (4), 656-666. [IF(2015) : 1.039] . Google Citation
  136. Mallick B., Deepak Garg, Grover P.S. (2014). A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM. Journal of Computing and Information Technology, 22 (1), 45-55. Google Citation
  137. He D., Neeraj Kumar, Lee J.-H., Sherratt R. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60 (1), 30-37. Google Citation
  138. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). OANTALG: An orientation based ant colony algorithm for mobile Ad Hoc networks. Wireless Personal Communications, 77 (3), 1859-1884. [IF(2015) : 0.951] . Google Citation
  139. Virender Ranga, Mayank Dave, Anil Kumar Verma (2014). A hybrid timer based single node failure recovery approach for WSANs. Wireless Personal Communications, 77 (3), 2155-2182. [IF(2015) : 0.951] . Google Citation
  140. Singh S., Inderveer Chana (2014). QRSF: QoS-aware resource scheduling framework in cloud computing. Journal of Supercomputing, 71 (1), 241-292. [IF(2015) : 1.326 ] . Google Citation
  141. Kumar A., Anil Kumar Verma (2014). A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata. Applied Mathematics & Information Sciences, 8 (1), 95-105. [IF(2015) : 1.232] . Google Citation
  142. Kumar A., Anil Kumar Verma (2014). Conversion of parallel regular expressions to non-deterministic finite automata using partial derivatives. Chiang Mai Journal of Science, 41 (42040), 1409-1418. [IF(2015) : 0.42] . Google Citation
  143. Neeraj Kumar, Chilamkurti N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40 (6), 1981-1996. [IF(2015) : 1.57] . Google Citation
  144. Rathore N., Inderveer Chana (2014). Load Balancing and Job Migration Techniques in Grid: A Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125. [IF(2015) : 0.951] . Google Citation
  145. Zuo L., Neeraj Kumar, Tu H., Singh A., Chilamkurti N., Rho S. (2014). Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system. Journal of Supercomputing, 70 (1), 177-199. [IF(2015) : 1.326 ] . Google Citation
  146. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45 (), 151-167. [IF(2015) : 3.5 ] . Google Citation
  147. Kaur P.D., Inderveer Chana (2014). A resource elasticity framework for QoS-aware execution of cloud applications. Future Generation Computer Systems, 37 (), 14-25. [IF(2015) : 3.997] . Google Citation
  148. Swarnajyoti Patra, Rahul Gautam, Anshu Singla (2014). A novel context sensitive multilevel thresholding for image segmentation. Applied Soft Computing, 23 (), 122-127. [IF(2015) : 3.541 ] . Google Citation
  149. Neeraj Kumar, Chilamkurti N., Zeadally S., Jeong Y.-S. (2014). Achieving quality of service (QoS) using resource allocation and adaptive scheduling in cloud computing with grid support. Computer Journal, 57 (2), 281-290. [IF(2015) : 0.711] . Google Citation
  150. Chopra I., Maninder Singh (2014). SHAPE - An approach for self-healing and self-protection in complex distributed networks. Journal of Supercomputing, 67 (2), 585-613. [IF(2015) : 1.326 ] . Google Citation
  151. Neeraj Kumar, Chilamkurti N., Rodrigues J.J.P.C. (2014). Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks. Computer Communications, 39 (), 22-32. [IF(2015) : 3.338] . Google Citation
  152. Kumar P., Nigam S.P., Neeraj Kumar (2014). Vehicular traffic noise modeling using artificial neural network approach. Transportation Research Part C: Emerging Technologies, 40 (), 111-122. [IF(2015) : 3.805 ] . Google Citation
  153. Anshu Singla, Swarnajyoti Patra, Lorenzo Bruzzone (2014). A novel classification technique based on progressive transductive SVM learning. Pattern Recognition Letters, 42 (1), 101-106. [IF(2015) : 1.995 ] . Google Citation
  154. Neeraj Kumar, Lee J.-H. (2014). Peer-to-peer cooperative caching for data dissemination in urban vehicular communications. IEEE Systems Journal, 8 (4), 1136-1144. [IF(2015) : 3.882 ] . Google Citation
  155. Neeraj Kumar, Misra S., Obaidat M., Rodrigues J., Pati B. (2014). Networks of learning automata for the vehicular environment: A performance analysis study. IEEE Wireless Communications, 21 (6), 41-47. [IF(2015) : 8.972] . Google Citation
  156. Neeraj Kumar, Tyagi S., Deng D.-J. (2014). LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks. Journal of Network and Computer Applications, 46 (), 264-279. [IF(2015) : 3.5 ] . Google Citation
  157. Vijay Kumar, Arun Sharma, Rajesh Kumar (2013). Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. Computing and Informatics, 32 (1), 203-224. [IF(2015) : 0.488 ] . Google Citation
  158. Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh (2013). Software clone detection: A systematic review. Information and Software Technology, 55 (7), 1165-1199. Google Citation
  159. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2013). Incremental Mining of Sequential Patterns: Progress and Challenges. Intelligent Data Analysis, 17 (3), 507-530. [IF(2015) : 0.772 ] . Google Citation
  160. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2013). CRM Customer Value based on Constrained Sequential Pattern Mining. International Journal of Computer Applications, 64 (9), 21-29. Google Citation
  161. Bhawna Mallick, Deepak Garg, P.S. Grover (2013). Fuzzy sequential pattern summarization with lattice structure. International Journal of Hybrid Information Technology, 6 (3), 83-94. Google Citation
  162. Shivani Goel, Ravi Kiran, Deepak Garg (2013). Predictors of User Satisfaction in ERP in Technical Educational Institutions. Information-An International Interdisciplinary Journal, 16 (5), 2885-2894. [IF(2015) : 0.00] . Google Citation
  163. Rattan Rana, Deepak Garg (2013). Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem. International Arab Journal of Information Technology, 11 (5), -. [IF(2015) : 0.724] . Google Citation
  164. Bhawna Mallick, Deepak Garg, P S Grover (2013). Constraint-Based Sequential Pattern Mining: A pattern growth algorithm incorporating compactness, length and monetary. International Arab Journal of Information Technology, 11 (1), -. [IF(2015) : 0.724] . Google Citation
  165. Tyagi S., Neeraj Kumar (2013). A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. Journal of Network and Computer Applications, 36 (2), 623-645. [IF(2015) : 3.5 ] . Google Citation
  166. He D., Neeraj Kumar, Chen J., Lee C.-C., Chilamkurti N., Yeo S.-S. (2013). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21 (1), 49-60. [IF(2015) : 2.207] . Google Citation
  167. Maji S., Deepak Garg (2013). Hidden markov model for splicing junction sites identification in dna sequences. Current Bioinformatics, 8 (3), 369-379. [IF(2015) : 0.6] . Google Citation
  168. Sharma G., Anil Kumar Verma (2013). Breaking the RSA-based certificateless signature scheme. Information (Japan), 16 (11), 7831-7836. Google Citation
  169. Bala S., Sharma G., Anil Kumar Verma (2013). Cryptanalysis of certificateless signature scheme. Information (Japan), 16 (11), 7827-7830. Google Citation
  170. Neeraj Kumar, Chilamkurti N., Park J.H., Park D.S. (2013). Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks. International Journal of Ad Hoc and Ubiquitous Computing, 12 (1), 3-13. [IF(2015) : 0.705] . Google Citation
  171. Anirban Bhattacharya, Ajay Batish, Neeraj Kumar (2013). Surface characterization and material migration during surface modification of die steels with silicon, graphite and tungsten powder in EDM process. Journal of Mechanical Science and Technology, 27 (1), 133-140. Google Citation
  172. Rajni, Inderveer Chana (2013). Bacterial foraging based hyper-heuristic for resource scheduling in grid computing. Future Generation Computer Systems, 29 (3), 751-762. [IF(2015) : 3.997] . Google Citation
  173. Parteek Kumar, Rajendra Kumar Sharma (2013). Punjabi DeConverter for generating Punjabi from Universal Networking Language. Journal of Zhejiang University-Science C-Computers & Electronics, 14 (3), 179-195. [IF(2015) : 0.77 ] . Google Citation
  174. Maji S., Deepak Garg (2013). Progress in gene prediction: Principles and challenges. Current Bioinformatics, 8 (2), 226-243. [IF(2015) : 0.6] . Google Citation
  175. Mallick B., Deepak Garg, Grover P.S. (2013). Progressive CFM-Miner: An Algorithm to Mine CFM - Sequential Patterns from a Progressive Database. International Journal of Computational Intelligence Systems, 6 (2), 209-222. [IF(2015) : 1.14 ] . Google Citation
  176. Goel S., Ravi Kiran, Deepak Garg (2013). Predictors for user satisfaction in enterprise resource planning implementation in technical educational institutions. Information (Japan), 16 (5), 2885-2894. Google Citation
  177. Bala S., Sharma G., Anil Kumar Verma (2013). Classification of symmetric key management schemes for wireless sensor networks. International Journal of Security and its Applications, 7 (2), 117-138. Google Citation
  178. Neeraj Kumar, Chilamkurti N., Lee J.-H. (2013). UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks. Mathematical and Computer Modelling, 57 (42349), 2750-2763. [IF(2015) : 1.366] . Google Citation
  179. Neeraj Kumar, Kim J. (2013). Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks. Mathematical and Computer Modelling, 58 (42036), 3-14. [IF(2015) : 1.366] . Google Citation
  180. Sharma G., Bala S., Anil Kumar Verma (2013). On the security of Certificateless signature schemes. International Journal of Distributed Sensor Networks, 2013 (), -. [IF(2015) : 1.239 ] . Google Citation
  181. Ranga V., Dave M., Anil Kumar Verma (2013). Network partitioning recovery mechanisms in WSANs: A survey. Wireless Personal Communications, 72 (2), 857-917. [IF(2015) : 0.951] . Google Citation
  182. Neeraj Kumar, Kim J. (2013). An advanced energy efficient data dissemination for heterogeneous wireless sensor networks. Sensor Letters, 11 (9), 1771-1778. [IF(2015) : 0.558] . Google Citation
  183. Neeraj Kumar, Chilamkurti N., Rho S. (2013). A probabilistic multi constraints variable bit rate multimedia service selection in wireless mesh networks. Sensor Letters, 11 (9), 1726-1735. [IF(2015) : 0.558] . Google Citation
  184. Ravi Kiran, Agarwal P.D., Anil Kumar Verma (2013). Knowledge management: Role of thought leaders and junior academia in enhancing research and curriculum in institutions of higher technical education. SAGE Open, 3 (2), 1-13. Google Citation
  185. Aron R., Inderveer Chana (2013). QoS based resource provisioning and scheduling in grids. Journal of Supercomputing, 66 (1), 262-283. [IF(2015) : 1.326 ] . Google Citation
  186. Bernard Scott, Abhinav Bansal (2013). A cybernetic computational model for learning and skill acquisition. Constructivist Foundations, 9 (1), 125-136. Google Citation
  187. Kaur S., Maninder Singh (2013). Automatic attack signature generation systems: A review. IEEE Security and Privacy, 11 (6), 54-61. [IF(2015) : 1.382 ] . Google Citation
  188. He D., Neeraj Kumar, Khan M.K., Lee J.-H. (2013). Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics, 59 (4), 811-817. Google Citation
  189. Neeraj Kumar, Chilamkurti N., Park J.H. (2013). ALCA: Agent learning-based clustering algorithm in vehicular ad hoc networks. Personal and Ubiquitous Computing, 17 (8), 1683-1692. [IF(2015) : 2.395 ] . Google Citation
  190. Neeraj Kumar, Kim J. (2013). ELACCA: Efficient learning automata based cell clustering algorithm for wireless sensor networks. Wireless Personal Communications, 73 (4), 1495-1512. [IF(2015) : 0.951] . Google Citation
  191. Manoj Kumar, Arun Sharma, Rajesh Kumar (2012). Multi-Faceted Measurement Framework for Test Cases Classification and Fitness Evaluation using Fuzzy Logic Approach. Chiang Mai Journal of Science, 39 (3), 486-497. [IF(2015) : 0.42] . Google Citation
  192. Vijai Kumar, Arun Kumar, Rajesh Kumar, P.S. Grover (2012). Quality aspects for component-based systems – A metrics based approach. Software — Practice & Experience, 42 (12), 1531-1548. Google Citation
  193. Navneet Kaur, Deepak Garg (2012). Analysis of the Depth First Search Algorithms. CiiT International Journal of Data Mining Knowledge Engineering, 2012 (Jan), -. Google Citation
  194. Chintan Jain, Deepak Garg (2012). Improved Edmond Karps Algorithm for Network Flow Problem. International Journal of Computer Applications, 37 (1), 48-53. Google Citation
  195. Deepika Sharma, Deepak Garg (2012). Information Retrieval on the web and its evaluation. International Journal of Computer Applications, 40 (3), 26-31. Google Citation
  196. Sandeep Kumar, Deepak Garg (2012). Online Financial Algorithms Competitive Analysis. International Journal of Computer Applications, 40 (7), 8-14. Google Citation
  197. Parth Patel, Deepak Garg (2012). Comparison of Advance Tree Data Structures. Journal of Computer Applications, 41 (2), 11-21. Google Citation
  198. Megha Tyagi, Deepak Garg (2012). Comparative Analysis of dynamic graph techniques and data structure. International Journal of Computer Applications, 45 (5), 42-46. Google Citation
  199. Shivani Goel, Ravi Kiran, Deepak Garg (2012). Vulnerability Management for an Enterprise Resource Planning System. International Journal of Computer Applications, 53 (4), 19-22. Google Citation
  200. Venkata Padmavati Metta, Kamala Kritivasan, Deepak Garg (2012). Computability of Spiking Neural P Systems with Anti-Spikes. New Mathematics and Natural Computation, 8 (3), 283-295. Google Citation
  201. Nimisha Singla, Deepak Garg (2012). String Matching Algorithms and their Applicability in various Applications. International Journal of Soft Computing and Engineering, 1 (6), 218-222. Google Citation
  202. Srabanti Maji, Deepak Garg (2012). Gene finding using Hidden Markov Model. Journal of Applied Sciences, 12 (15), 1518-1525. Google Citation
  203. Bhawna Mallick, Deepak Garg, Preetam Singh Grover (2012). CFM-PREFIXSPAN: A Pattern Growth Algorithm Incorporating Compactness and Monetary. International Journal of Innovative Computing, Information and Control, 8 (7), 4509-4520. [IF(2015) : 1.667] . Google Citation
  204. Singh G., Neeraj Kumar, Kumar Verma A. (2012). Ant colony algorithms in MANETs: A review. Journal of Network and Computer Applications, 35 (6), 1964-1972. [IF(2015) : 3.5 ] . Google Citation
  205. Prateek Kumar, Rajendra Kumar Sharma (2012). Punjabi to UNL enconversion system. Sadhana-Academy Proceedings in Engineering Sciences, 37 (2), 299-318. [IF(2015) : 0.465] . Google Citation
  206. Aron R., Inderveer Chana (2012). Formal QoS policy based Grid resource provisioning framework. Journal of Grid Computing, 10 (2), 249-264. [IF(2015) : 2.766 ] . Google Citation
  207. Neeraj Kumar, Chilamkurti N. (2012). Agent assisted mobility and load aware fast handoff scheme in wireless mesh networks. International Journal of Internet Protocol Technology, 7 (1), 26-38. Google Citation
  208. Mallick B., Deepak Garg, Grover P.S. (2012). CFM-Prefixspan: A pattern growth algorithm incorporating compactness and monetary. International Journal of Innovative Computing, Information and Control, 8 (0.2916666666666667), 4509-4520. [IF(2015) : 1.667] . Google Citation
  209. Neeraj Kumar, Iqbal R., Chilamkurti N. (2012). Capacity and load-aware service discovery with service selection in peer-to-peer grids. Future Generation Computer Systems, 28 (7), 1090-1099. [IF(2015) : 3.997] . Google Citation
  210. Neeraj Kumar, Chilamkurti N., Lee J.-H. (2012). Distributed context aware collaborative filtering approach for P2P service selection and recovery in wireless mesh networks. Peer-to-Peer Networking and Applications, 5 (4), 350-362. [IF(2015) : 1.262 ] . Google Citation
  211. Metta V.P., Krithivasan K., Deepak Garg (2012). Computability of spiking neural P systems with anti-spikes. New Mathematics and Natural Computation, 8 (3), 283-295. Google Citation
  212. Kumar S., Kumar Bhatia R., Rajesh Kumar (2012). Distance based clustering of software design components. International Journal of Applied Engineering Research, 7 (11 SUPPL.), 1299-1302. Google Citation
  213. Agarwal P.D., Ravi Kiran, Anil Kumar Verma (2012). Key features of research portal for stimulating research in institutions of higher technical education. Egitim Arastirmalari - Eurasian Journal of Educational Research, (48), 155-174. Google Citation
  214. Pandey T., Deepak Garg, Gore M.M. (2012). Publish/subscribe based information dissemination over VANET utilizing DHT. Frontiers of Computer Science in China, 6 (6), 713-724. Google Citation
  215. Agarwal P.D., Ravi Kiran, Anil Kumar Verma (2012). Knowledge sharing for stimulating learning environment in institutions of higher technical education. Technics Technologies Education Management, 7 (4), 1681-1691. Google Citation
  216. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Optimization of Test Cases using Soft Computing Techniques: A Critical Review. WSEAS Transactions on Information Science and Applications, 11 (8), 440-452. Google Citation
  217. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Towards Multi-Faceted Test Cases Optimization. Journal of Software Engineering and Applications, 4 (9), 550-557. Google Citation
  218. Jahangir Alam, Rajesh Kumar (2011). STH: A Highly Scalable and Economical Topology for Massively Parallel Systems. Indian Journal of Science and Technology, 4 (12), 1737-1748. Google Citation
  219. Manoj Kumar, Arun Sharma, Rajesh Kumar (2011). Soft Computing-based Software Test Cases Optimization: A Survey. International Review on Computer and Software, 6 (4), 512-526. Google Citation
  220. Rajesh Kumar, Rajni Aron (2011). Information Retrieval System of Hospital using UML and Data Cube. International Journal of Advance Research in Computer Science, 2 (2), 379-385. Google Citation
  221. V.K. Banga, Rajesh Kumar, Y. Singh (2011). Fuzzy-Genetic Optimal Control for Robotic Systems. International Journal of Physical Sciences, 6 (2), 204-212. [IF(2015) : 0.54] . Google Citation
  222. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2011). Unified Cohesion Measures for Aspect-Oriented Systems. International Journal of Software Engineering and Knowledge Engineering, 21 (1), 143-163. [IF(2015) : 0.299 ] . Google Citation
  223. Tamana Pathak, Deepak Garg (2011). Randomized Signature Sort: Implementation & Performance Analysis. International Journal of Computer Applications, 23 (6), 1-5. Google Citation
  224. Vijender Singh, Deepak Garg (2011). Survey of Finding Frequent Patterns in Graph Mining: Algorithms and Techniques. International Journal of Soft Computing and Engineering, 1 (3), 19-23. Google Citation
  225. Deepika Sareen, Deepak Garg (2011). Parametric Maximum Flow Problem: Techniques and Algorithms. International Journal of Computer Science and Communication, 2 (2), 933-938. Google Citation
  226. Bharat Gupta, Deepak Garg (2011). FP-Tree Based Algorithms Analysis: FP-Growth, COFI-Tree and CT-PRO. International Journal on Computer Science and Engineering, 3 (7), 2691-2699. Google Citation
  227. Kuldeep Sharma, Deepak Garg (2011). Randomized algorithms methods and techniques. International Journal of Computer Applications, 28 (11), 29-32. Google Citation
  228. Deepak Garg, Hemant Sharma (2011). Comparative Analysis of Various Approaches Used in Frequent Pattern Mining. International Journal of Advanced Computer Science and Applications, (Special Issue), 141-147. Google Citation
  229. Shivani Goel, Ravi Kiran, Deepak Garg (2011). A framework for efficient enterprise resource planning implementation in technical educational institutions. African Journal of Business Management , 5 (34), 13197-13204. [IF(2015) : 1.105] . Google Citation
  230. Bharat Gupta, Deepak Garg (2011). A Taxonomy of Classical Frequent Item set Mining Algorithms. International Journal of Computer and Electrical Engineering, 3 (5), 695-699. Google Citation
  231. Kamala Kritivasan, Venkata Padmavati Metta, Deepak Garg (2011). On String Languages Generated by SN P Systems with Anti-Spikes. International Journal of Foundations of Computer Science, 22 (1), 15-27. [IF(2015) : 0.39 ] . Google Citation
  232. Venkata Padmavati Metta, Kamala Kritivasan, Deepak Garg (2011). Spiking Neural P Systems with Anti-Spikes as Transducers. Romanian Journal of Science and Technology, 14 (1), 20-30. [IF(2015) : 0.304] . Google Citation
  233. Parteek Kumar, Rajendra Kumar Sharma (2011). Generation of UNL attributes and resolving relations for Punjabi EnConverter. Malaysian Journal of Computer Science, 24 (1), 34-46. [IF(2015) : 0.6] . Google Citation
  234. Satnam Singh, Anil Vashisht, Vishal (2011). PAHs in some brands of tea. Environmental Monitoring and Assessment, 177 (42095), 35-38. [IF(2015) : 1.687] . Google Citation
  235. Neeraj Kumar, Chilamkurti N., Kim J. (2011). Routing in WDM based wireless mesh networks with capacity estimation. International Journal of Internet Protocol Technology, 6 (4), 224-233. Google Citation
  236. Metta V.P., Krithivasan K., Deepak Garg (2011). Modelling and analysis of spiking neural P systems with anti-spikes using Pnet lab. Nano Communication Networks, 2 (42065), 141-149. Google Citation
  237. Batra S., Seema Bawa (2011). Semantic discovery of web services using principal component analysis. International Journal of Physical Sciences, 6 (18), 4466-4472. [IF(2015) : 0.54] . Google Citation
  238. Varinder Pal Singh, Kumar K. (2011). Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications, 60 (4), 679-685. [IF(2015) : 0.951] . Google Citation
  239. Bhanwar S., Seema Bawa (2011). Pluggable, interoperable and extensible (PIE): A grid portal for interoperability. International Journal of Physical Sciences, 6 (22), 5329-5344. [IF(2015) : 0.54] . Google Citation
  240. Gupta A.K., Sadawarti H., Anil Kumar Verma (2011). A review of routing protocols for Mobile Ad Hoc Networks. WSEAS Transactions on Communications, 10 (11), 331-340. Google Citation
  241. Anuj Sharma, Rajesh Kumar, R.K. Sharma (2010). HMM based Online Handwritten Gurmukhi Character Recognition. Machine Graphics and Vision, 19 (4), 439-449. Google Citation
  242. Jahangir Alam, Rajesh Kumar (2010). Eight Row Matrix(ERM) : A new topology for designing Cost Effective product networks. International Journal of Engineering Science and Technology, 2 (4), 330-340. Google Citation
  243. Jahangir Alam, Rajesh Kumar, Zubair Khan (2010). Linearly Extendible Arm(LEA) - A Constant Degree Topology for Designing Cost Effective Product networks. Ubiquitous Computing and Communication Journal, 5 (2), 40-48. Google Citation
  244. Rajesh Kumar, P.S. Grover, Avadhesh Kumar (2010). A Fuzzy Logic Approach to Measure Complexity of Generic Aspect-Oriented Systems. Journal of Object Technology, 9 (3), 43-57. Google Citation
  245. Avadhesh Kumar, P.S. Grover, Rajesh Kumar (2009). A Quantitative Evaluation of Aspect- Oriented Software Quality Model (AOSQUAMO). ACM SIGSOFT Software Engineering Notes, 34 (5), 115-9. Google Citation
  246. Anuj Sharma, Rajesh Kumar, R.K. Sharma (2009). Recognizing Online Handwritten Gurmukhi Characters using Comparison of Small Line Segments. International Journal of Computer Theory and Engineering, 119 (2), 131-135. Google Citation
  247. Avadhesh Kumar, P.S. Grover, Rajesh Kumar (2009). Generalised Coupling Measures for Aspect - Oriented Systems. ACM SIGSOFT Software Engineering Notes, 34 (3), 1-6. Google Citation
  248. Arun Sharma, Rajesh Kumar, P.S. Grover (2009). Dependency Analysis for Component-Based Software Systems. ACM SIGSOFT Software Engineering Notes, 34 (3), 1-5. Google Citation
  249. Arun Sharma, Rajesh Kumar, P.S. Grover (2009). Reusability Assessment for Software Components. ACM SIGSOFT Software Engineering Notes, 34 (2), 1-6. Google Citation
  250. Anuj Sharma, R.K. Sharma, Rajesh Kumar (2009). Online Handwritten Gurmukhi Strokes Preprocessing. International Journal of Machine GRAPHICS and VISION, 18 (1), 105-120. Google Citation
  251. Varinder Pal Singh, Chakraverty S., Rajendra Kumar Sharma, Sharma G.K. (2009). Modeling vibration frequencies of annular plates by regression based neural network. Applied Soft Computing, 9 (1), 439-447. [IF(2015) : 3.541 ] . Google Citation
  252. Kumar S., Bansal P.K., Seema Bawa (2009). Modified quad tree network with architectural analysis (M-QUAD). Computer Systems Science and Engineering, 24 (2), 59-69. [IF(2015) : 0.348] . Google Citation
  253. Arun Sharma, Rajesh Kumar, P.S. Grover (2008). Empirical Evaluation and Validation of Interface Complexity Metrics for Software Components. International Journal of Software Engineering and Knowledge Engineering, 18 (7), 519-531. [IF(2015) : 0.299 ] . Google Citation
  254. P.S.Grover, Rajesh Kumar, Avadhesh Kumar (2008). Measuring Changeability for Generic Aspect-Oriented Systems. ACM SIGSOFT Software Engineering Notes, 33 (6), 1-5. Google Citation
  255. Arun Sharma, Rajesh Kumar, P.S. Grover (2008). Estimation of Quality for Software Components – an Empirical Approach. ACM SIGSOFT Software Engineering Notes, 33 (6), 1-10. Google Citation
  256. Sharma A., Seema Bawa (2008). Comparative analysis of resource discovery approaches in grid computing. Journal of Computers, 3 (5), 60-64. Google Citation
  257. Kumar S., Bansal P.K., Seema Bawa (2008). Modified quad tree network with architectural analysis (M_QUAD). Engineering Intelligent Systems, 16 (3), 155-164. Google Citation
  258. Sharma A., Rajesh Kumar, Grover P.S. (2008). Empirical evaluation and validation of interface complexity metrics for software components. International Journal of Software Engineering and Knowledge Engineering, 18 (7), 919-931. [IF(2015) : 0.299 ] . Google Citation
  259. Banga V.K., Singh Y., Rajesh Kumar (2008). Uncertainty compensation and optimization of three and four degree-of-freedom robotics system using Genetic Algorithm. Modelling, Measurement and Control B, 77 (42036), 70-82. Google Citation
  260. P.S. Grover, Rajesh Kumar, Arun Sharma (2007). Few Useful Considerations for Maintaining Software Components and Component-Based Systems. ACM SIGSOFT Software Engineering Notes, 32 (4), 1564-5. Google Citation
  261. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2007). An Evaluation of Maintainability of Aspect-Oriented Systems: a Practical Approach. International Journal of Computer Science and Security, 1 (2), 1-9. Google Citation
  262. Arun Sharma, Rajesh Kumar, P.S. Grover (2007). Managing Component-Based Systems With Reusable Components. International Journal of Computer Science and Security , 1 (2), 60-65. Google Citation
  263. Vijay Kumar Banga, Yaduvir Singh, Rajesh Kumar (2007). Simulation Of Robotic Arm Using Genetic Algorithm & A H P. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1 (1), 32-38. Google Citation
  264. Sharma A., Rajesh Kumar, Grover P.S. (2007). Complexity measures for software components. WSEAS Transactions on Computers, 6 (7), 1005-1012. Google Citation
  265. Singh S., Seema Bawa (2007). A privacy policy framework for grid and web services. Information Technology Journal, 6 (6), 809-817. Google Citation
  266. Avadhesh Kumar, Rajesh Kumar, P.S. Grover (2006). A Comparative Study of Aspect-Oriented Methodology with Module-Oriented and Object-Oriented Methodologies. The IUP Journal of Information Technology, 6 (), 7-15. Google Citation
  267. Arun Sharma, Rajesh Kumar, P.S. Grover (2006). Investigation of Reusability, Complexity and Customizability Metrics for Component-based Systems. The IUP Journal of Information Technology, June (), -. Google Citation
  268. Chakraverty S., Varinder Pal Singh, Rajendra Kumar Sharma (2006). Regression based weight generation algorithm in neural network for estimation of frequencies of vibrating plates. Computer Methods in Applied Mechanics and Engineering, 195 (33-36), 4194-4202. [IF(2015) : 3.949 ] . Google Citation
  269. Deepak Garg, S.C. Saxena, Bhardwaj L.M. (2006). An efficient algorithm after ungapped analysis in BLAST. DNA Sequence - Journal of DNA Sequencing and Mapping, 17 (4), 247-253. Google Citation
  270. Deepak Garg, S.C. Saxena, Bhardwaj L.M. (2006). A new middle path approach for alignments in blast. Journal of Biological Systems, 14 (4), 567-581. [IF(2015) : 0.39] . Google Citation
  271. Seema Bawa, G.K. Sharma (2002). A parallel transitive closure computation algorithm for VLSI test generation. Applied Parallel Computing : Advance Scientific Computing, 2367 (), 243-253. [IF(2015) : 0.402] . Google Citation
  272. Nagarathnamma R., Rinkle Rani (1999). Decolorization and detoxification of extraction-stage effluent from chlorine bleaching of kraft pulp by Rhizopus oryzae. Applied and Environmental Microbiology, 65 (3), 1078-1082. [IF(2015) : 3.807] . Google Citation

Conference(s) :

  1. Singh H., Seema Bawa (2016). Spatial data analysis with ArcGIS and MapReduce. Proceedings of the Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 [ : 29 April 2016 through 30 April 2016], pp.45-49.. Google Citation
  2. Maneesha, Inderveer Chana (2016). Searching of near exact duplicate images in cloud database. Proceedings of the International Conference on Inventive Computation Technologies [ : 26-27 Aug. 2016], pp.-.. Google Citation
  3. Prashant Singh Rana, Shivendra Pratap Singh (2016). Genetic algorithm with mixed crossover approach for travelling salesman problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation
  4. Lachheta P., Seema Bawa (2016). Combining synthetic minority oversampling technique and subset feature selection technique for class imbalance problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation
  5. Puneet Garg, Rinkle Rani, Sumit Miglani (2015). Analysis and Visualization of Professional’s LinkedIn Data. Proceedings of the Emerging Research in Computing, Information, Communication and Applications [ : ], pp.1-9.. Google Citation
  6. Kumar P., Maninder Singh (2015). Mobile applications: Analyzing private data leakage using third party connections. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015 [ : 10 August 2015 through 13 August 2015], pp.57-62.. Google Citation
  7. Dhammi A., Maninder Singh (2015). Behavior analysis of malware using machine learning. Proceedings of the 2015 8th International Conference on Contemporary Computing, IC3 2015 [ : 20 August 2015 through 22 August 2015], pp.481-486.. Google Citation
  8. Gill H.K., Maninder Singh (2015). Analyze university network traffic to explore usage behaviour and to detect malicious activities. Proceedings of the Proceedings on 2015 1st International Conference on Next Generation Computing Technologies, NGCT 2015 [ : ], pp.686-691.. Google Citation
  9. Dua A., Kumar N., Seema Bawa (2015). An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET. Proceedings of the Proceedings - 2015 IEEE International Conference on Data Science and Data Intensive Systems; 8th IEEE International Conference Cyber, Physical and Social Computing; 11th IEEE International Conference on Green Computing and Communications and 8th IEEE International Conference on Internet of Things, DSDIS/CPSCom/GreenCom/iThings 2015 [ : ], pp.427-434.. Google Citation
  10. Suman Jain, Inderveer Chana (2015). Modernization of Legacy Systems: A Generalised Roadmap. Proceedings of the ICCCT '15 Proceedings of the Sixth International Conference on Computer and Communication Technology 2015 [ : ], pp.62-67.. Google Citation
  11. Chawla C., Inderveer Chana (2015). Optimal time dependent pricing model for smart cloud with cost based scheduling. Proceedings of the ACM International Conference Proceeding Series?? [ : ], pp.522-526.. Google Citation
  12. Anshu Singla, Swarnajyoti Patra (2015). A context sensitive thresholding technique for automatic image segmentation. Proceedings of the Computational Intelligence in Data Mining [ : ], pp.19-25.. Google Citation
  13. Shukla R., Maninder Singh (2015). PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems. Proceedings of the Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 [ : 8 October 2014 through 10 October 2014], pp.-.. Google Citation
  14. Kaur R., Maninder Singh (2015). Two-level automated approach for defending against obfuscated zero-day attacks. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 August 2014 through 29 August 2014], pp.164-179.. Google Citation
  15. Goyal S., Seema Bawa, Singh B. (2015). Experimental comparison of three scheduling algorithms for energy efficiency in cloud computing. Proceedings of the 2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014 [ : 15 October 2014 through 17 October 2014], pp.-.. Google Citation
  16. Mahajan S., Maninder Singh (2014). Performance analysis of efficient RSA text encryption Using NVIDIA CUDA-C and OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  17. Gupta V., Maninder Singh, Bhalla V.K. (2014). Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis. Proceedings of the Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 [ : 24 September 2014 through 27 September 2014], pp.50-54.. Google Citation
  18. Sharma S., Maninder Singh (2014). An efficient and secure database system using OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  19. Mahajan R., Maninder Singh, Miglani S. (2014). ADS: Protecting NTFS from hacking. Proceedings of the International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2014 [ : 9 May 2014 through 11 May 2014], pp.-.. Google Citation
  20. Kaur R., Maninder Singh (2014). Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. Proceedings of the Communications in Computer and Information Science [Trivandrum : 13 March 2014 through 14 March 2014], pp.298-309.. Google Citation
  21. Kapoor L., Seema Bawa, Gupta A. (2014). A novel mechanism for dynamic optimization of intercloud services. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 October 2014 through 31 October 2014], pp.377-388.. Google Citation
  22. Arora S., Inderveer Chana (2014). A survey of clustering techniques for big data analysis. Proceedings of the Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit [ : 25 September 2014 through 26 September 2014], pp.59-65.. Google Citation
  23. Kaur P.,D., Inderveer Chana (2014). Behavior analysis of multifarious cloud applications. Proceedings of the Proceedings - 2014 4th International Conference on Advances in Computing and Communications, ICACC 2014 [ : 27 August 2014 through 30 August 2014], pp.175-178.. Google Citation
  24. Jain S., Inderveer Chana (2014). Reengineering process of legacy systems for the cloud: An overview. Proceedings of the Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014 [ : 11 December 2014 through 13 December 2014], pp.164-168.. Google Citation
  25. Sharma A., Rinkle Rani (2014). A 3-level model for implementing MOOC in India. Proceedings of the 2014 IEEE International Conference on MOOCs, Innovation and Technology in Education, IEEE MITE 2014 [ : 19 December 2014 through 20 December 2014], pp.132-137.. Google Citation
  26. Kaur R., Maninder Singh (2014). Efficient hybrid technique for detecting zero-day polymorphic worms. Proceedings of the Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 [Gurgaon : 21 February 2014 through 22 February 2014], pp.95-100.. Google Citation
  27. Sukhpal Singh, Inderveer Chana (2013). Consistency verification and quality assurance (CVQA) traceability framework for SaaS. Proceedings of the IEEE International Advance Computing Conference [3rd : : 22-23 Feb. 2013], pp.1-6.. Google Citation
  28. Kapoor L., Seema Bawa, Gupta A. (2013). Hierarchical chord-based resource discovery in intercloud environment. Proceedings of the Proceedings - 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, UCC 2013 [Dresden, Saxony : 9 December 2013 through 12 December 2013], pp.464-469.. Google Citation
  29. Tekchandani R., Bhatia R.,K., Maninder Singh (2013). Semantic code clone detection using parse trees and grammar recovery. Proceedings of the IET Conference Publications [Noida : 26 September 2013 through 27 September 2013], pp.41-46.. Google Citation
  30. Singh S., Inderveer Chana, Maninder Singh (2013). Z language based an algorithm for event detection, analysis and classification in machine vision. Proceedings of the 2013 International Conference on Human Computer Interactions, ICHCI 2013 [Chennai : 23 August 2013 through 24 August 2013], pp.-.. Google Citation
  31. Aron R., Inderveer Chana, Abraham A. (2013). Hyper-heuristic based resource scheduling in grid environment. Proceedings of the Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013 [Manchester : 13 October 2013 through 16 October 2013], pp.1075-1080.. Google Citation
  32. Dua A., Kumar N., Seema Bawa, Chilamkurti N. (2013). Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs. Proceedings of the 2013 International Symposium on Wireless and Pervasive Computing, ISWPC 2013 [Taipei : 20 November 2013 through 22 November 2013], pp.-.. Google Citation
  33. Rathore N., Inderveer Chana (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. Proceedings of the 2013 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2013 [Shimla, HP : 26 September 2013 through 28 September 2013], pp.-.. Google Citation
  34. Kumar A., Seema Bawa (2012). Virtualization of large-scale data storage system to achieve dynamicity and scalability in grid computing. Proceedings of the Advances in Intelligent and Soft Computing [New Delhi : 25 May 2012 through 27 May 2012], pp.323-331.. Google Citation
  35. Rattan D., Bhatia R., Maninder Singh (2012). Model clone detection based on tree comparison. Proceedings of the 2012 Annual IEEE India Conference, INDICON 2012 [Kochi, Kerala : 7 December 2012 through 9 December 2012], pp.1041-1046.. Google Citation
  36. Priyanka, Inderveer Chana, Rana A. (2012). An effective approach to build optimal T-way interaction test suites over cloud using particle swarm optimization. Proceedings of the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering [Chennai : 24 February 2012 through 25 February 2012], pp.193-198.. Google Citation
  37. Aradhana, Inderveer Chana (2011). Implementing trust policies for cloud: A case study. Proceedings of the International Conference on Emerging Trends in Networks and Computer Communications [ : 22-24 April 2011], pp.355-358.. Google Citation
  38. Mittal S., Rajendra Kumar Sharma, Bhatia P. (2011). Cascading style sheet styling issues in Punjabi language. Proceedings of the Communications in Computer and Information Science [Patiala : 9 March 2011 through 11 March 2011], pp.242-245.. Google Citation
  39. Chopra I., Maninder Singh (2011). SASM - An approach towards self-protection in grid computing. Proceedings of the Communications in Computer and Information Science [Gurgaon : 10 March 2011 through 12 March 2011], pp.149-159.. Google Citation
  40. Kaur P.D., Inderveer Chana (2011). Evaluating cloud platforms - An application perspective. Proceedings of the Communications in Computer and Information Science [Nagpur, Maharashtra : 21 April 2011 through 22 April 2011], pp.449-453.. Google Citation
  41. Kaur P.D., Inderveer Chana (2011). Enhancing grid resource scheduling algorithms for cloud environments. Proceedings of the Communications in Computer and Information Science [Chandigarh : 19 July 2011 through 20 July 2011], pp.140-144.. Google Citation
  42. Sanchika Gupta, Deepak Garg (2011). Ontology based information retrieval for learning styles of autistic people. Proceedings of the Communications in Computer and Information Science [Chandigarh : 19 July 2011 through 20 July 2011], pp.293-298.. Google Citation
  43. Aron R., Inderveer Chana (2011). Resource provisioning for grid: A policy perspective. Proceedings of the Communications in Computer and Information Science [Noida : 8 August 2011 through 10 August 2011], pp.546-547.. Google Citation
  44. Aron R., Inderveer Chana (2011). Cost based resource provisioning policy for grids. Proceedings of the Proceedings of the World Congress on Engineering 2011, WCE 2011 [London : 6 July 2011 through 8 July 2011], pp.1530-1533.. Google Citation
  45. Mittal M., Singh V.,P., Rajendra Kumar Sharma (2011). Random automatic detection of clusters. Proceedings of the ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing [Waknaghat, Shimla, Himachal Pradesh : 3 November 2011 through 5 November 2011], pp.-.. Google Citation
  46. Rathore N., Inderveer Chana (2011). A cognitive analysis of load balancing and job migration technique in Grid. Proceedings of the Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011 [Mumbai : 11 December 2011 through 14 December 2011], pp.77-82.. Google Citation
  47. Aradhana, Inderveer Chana (2011). Developing trust policies for cloud scenarios. Proceedings of the 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011 [Allahabad : 15 September 2011 through 17 September 2011], pp.389-393.. Google Citation
  48. Chopra I., Maninder Singh (2010). Agent based self-healing system for grid computing. Proceedings of the ICWET 2010 - International Conference and Workshop on Emerging Trends in Technology 2010, Conference Proceedings [Mumbai, Maharashtra : 26 February 2010 through 27 February 2010], pp.31-35.. Google Citation
  49. Chopra I., Maninder Singh (2010). Analysing the need for autonomic behaviour in grid computing. Proceedings of the 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 [Singapore : 26 February 2010 through 28 February 2010], pp.535-539.. Google Citation
  50. Kaur P.D., Inderveer Chana (2010). Unfolding the distributed computing paradigms. Proceedings of the ACE 2010 - 2010 International Conference on Advances in Computer Engineering [Bangalore : 21 June 2010 through 22 June 2010], pp.339-342.. Google Citation
  51. Bhanwar S., Seema Bawa (2010). Reputation enhancement in a trust management system. Proceedings of the Communications in Computer and Information Science [Chennai : 23 July 2010 through 25 July 2010], pp.440-451.. Google Citation
  52. Batra S., Seema Bawa (2010). Using LSI and its variants in text classification. Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering [ : 5 December 2008 through 13 December 2008], pp.313-316.. Google Citation
  53. Rajni, Inderveer Chana (2010). Resource provisioning and scheduling in grids: Issues, challenges and future directions. Proceedings of the 2010 International Conference on Computer and Communication Technology, ICCCT-2010 [Allahabad : 17 September 2010 through 19 September 2010], pp.306-310.. Google Citation
  54. Bhanwar S., Seema Bawa (2009). Establishing and evaluating trust in a grid environment. Proceedings of the I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks [Kaohsiung : 14 December 2009 through 16 December 2009], pp.674-678.. Google Citation
  55. Singh B., Seema Bawa (2007). ACO based optimized scheduling algorithm for computational grids. Proceedings of the Proceedings of the 3rd IASTED International Conference on Advances in Computer Science and Technology, ACST 2007 [ : 2 April 2007 through 4 April 2007], pp.283-286.. Google Citation
  56. Bansal B., Seema Bawa (2007). Design and development of grid portals. Proceedings of the IEEE Region 10 Annual International Conference, Proceedings/TENCON [Melbourne : 21 November 2005 through 24 November 2005], pp.-.. Google Citation
  57. Singh S., Seema Bawa (2007). Design of a framework for handling security issues in grids. Proceedings of the Proceedings - 9th International Conference on Information Technology, ICIT 2006 [Bhubaneswar : 18 December 2006 through 21 December 2006], pp.178-179.. Google Citation
  58. Singh S., Seema Bawa (2006). A framework for handling security problems in grid environment using Web services security specifications. Proceedings of the 2006 2nd International Conference on Semantics Knowledge and Grid, SKG [Guilin Guangxi : 1 November 2006 through 3 November 2006], pp.-.. Google Citation
  59. Maninder Singh, S.C. Saxena (2005). Open source arsenal - A workable esecurity solution. Proceedings of the The 7th International Conference on Advanced Communication Technology, ICACT 2005 [Phoenix Park : 21 February 2005 through 23 February 2005], pp.685-688.. Google Citation