header

Publications@Thapar

Thapar University
Patiala, Punjab - 147004

Publication@Thapar

Publications of Computer Science and Engineering

2017 (8) 2016 (61) 2015 (64) 2014 (56) 2013 (43) 2012 (28)
2011 (36) 2010 (10) 2009 (10) 2008 (8) 2007 (9) 2006 (6)
2005 (1) 2004 (1) 2002 (1) 1999 (1) All

Journal(s) :

  1. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach. Journal of Software : Practice and Experience, 45 (7), 949-971. Google Citation
  2. Supriya Kinger, Rajesh Kumar, Anju Sharma (2014). Efficient Dynamic Replication Algorithm Using Agent for Data Grid. The Scientific World Journal, 2014 (2014), 767016-. Google Citation
  3. Manoj Kumar, Arun Sharma, Rajesh Kumar (2014). Fuzzy Entropy based Framework for Multi-Faceted Test Case Classification and Selection: An Empirical Study. IET Software, 8 (3), 103-112. [IF(2015) : 0.733] . Google Citation
  4. Sunil, Rajesh Kumar (2014). Time Aware Test Case Prioritization based on Fault Coverage using Binary Integer Programming. International Journal of Data and Network Security, 2 (1), 102-103. Google Citation
  5. Neeraj Kumar Rathore, Inderveer Chana (2014). Variable Threshold Based Hierarchical Load Balancing Technique in Grid. Engineering with Computers, 30 (1), -. [IF(2015) : 0.765 ] . Google Citation
  6. Neeraj Kumar Rathore, Inderveer Chana (2014). Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing. Journal of Intelligent & Fuzzy Systems, 26 (6), 21-35. [IF(2015) : 1.261] . Google Citation
  7. Neeraj Kumar Rathore, Inderveer Chana (2014). Load Balancing and Job Migration Algorithm : Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125 . [IF(2015) : 0.951] . Google Citation
  8. Anju Bala, Inderveer Chana (2014). Intelligent failure prediction models for scientific workflows. Expert Systems with Applications, 42 (3), 980-989. [IF(2015) : 3.928 ] . Google Citation
  9. Tulika Pandey, Deepak Garg, Manoj Madhava Gore (2014). Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET. Scientific World Journal, 2014 (2014), -. [IF(2015) : 1.219] . Google Citation
  10. Srabanti Maji, Deepak Garg (2014). Hybrid Approach Using SVM and MM2 in Splice Site Junction Identification . Current Bioinformatics, 9 (1), 76-85. [IF(2015) : 0.6] . Google Citation
  11. Dua A., Neeraj Kumar, Seema Bawa (2014). A systematic review on routing protocols for Vehicular Ad Hoc Networks. Vehicular Communications, 1 (1), 33-52. Google Citation
  12. Bali R.S., Neeraj Kumar, Rodrigues J.J.P.C. (2014). Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions. Vehicular Communications, 1 (3), 134-152. Google Citation
  13. Jindal V., Seema Bawa, Batra S. (2014). A review of ranking approaches for semantic search on Web. Information Processing and Management, 50 (2), 416-425. [IF(2015) : 2.391] . Google Citation
  14. Sharma S., Lomash H., Seema Bawa (2014). Who Regulates Ethics in the Virtual World?. Science and Engineering Ethics, (), 1-10. [IF(2015) : 2.229 ] . Google Citation
  15. Shi W., Neeraj Kumar, Gong P., Chilamkurti N., Chang H. (2014). On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Networking and Applications, (), 1-5. [IF(2015) : 1.262 ] . Google Citation
  16. Tu H., Neeraj Kumar, Chilamkurti N., Rho S. (2014). An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications, (), 1-8. [IF(2015) : 1.262 ] . Google Citation
  17. He D., Neeraj Kumar, Chilamkurti N., Lee J.-H. (2014). Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. Journal of Medical Systems, 38 (10), -. [IF(2015) : 2.456] . Google Citation
  18. Vishal Sharma, Rajesh Kumar (2014). A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks. Journal of Intelligent & Robotic Systems, 77 (3), 629-652. Google Citation
  19. Bhardwaj A.K., Maninder Singh (2014). Data mining-based integrated network traffic visualization framework for threat detection. Neural Computing & Applications, (), -. [IF(2015) : 2.505 ] . Google Citation
  20. Dua A., Neeraj Kumar, Seema Bawa (2014). QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks. Mobile Networks and Applications, (), -. [IF(2015) : 3.259 ] . Google Citation
  21. Kaur R., Maninder Singh (2014). A survey on zero-day polymorphic worm detection techniques. IEEE Communications Surveys and Tutorials, 16 (3), 1520-1549. [IF(2015) : 17.188 ] . Google Citation
  22. Kaur P.D., Inderveer Chana (2014). Cloud based intelligent system for delivering health care as a service. Computer Methods and Programs in Biomedicine, 113 (1), 346-359. [IF(2015) : 2.503] . Google Citation
  23. Tu H., Neeraj Kumar, He D., Kim J., Lee C. (2014). An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. Journal of Supercomputing, 70 (1), 224-235. [IF(2015) : 1.326 ] . Google Citation
  24. Shi W., Neeraj Kumar, Gong P., Zhang Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8 (4), 656-666. [IF(2015) : 1.039] . Google Citation
  25. Mallick B., Deepak Garg, Grover P.S. (2014). A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM. Journal of Computing and Information Technology, 22 (1), 45-55. Google Citation
  26. He D., Neeraj Kumar, Lee J.-H., Sherratt R. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60 (1), 30-37. Google Citation
  27. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). OANTALG: An orientation based ant colony algorithm for mobile Ad Hoc networks. Wireless Personal Communications, 77 (3), 1859-1884. [IF(2015) : 0.951] . Google Citation
  28. Virender Ranga, Mayank Dave, Anil Kumar Verma (2014). A hybrid timer based single node failure recovery approach for WSANs. Wireless Personal Communications, 77 (3), 2155-2182. [IF(2015) : 0.951] . Google Citation
  29. Singh S., Inderveer Chana (2014). QRSF: QoS-aware resource scheduling framework in cloud computing. Journal of Supercomputing, 71 (1), 241-292. [IF(2015) : 1.326 ] . Google Citation
  30. Kumar A., Anil Kumar Verma (2014). A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata. Applied Mathematics & Information Sciences, 8 (1), 95-105. [IF(2015) : 1.232] . Google Citation
  31. Kumar A., Anil Kumar Verma (2014). Conversion of parallel regular expressions to non-deterministic finite automata using partial derivatives. Chiang Mai Journal of Science, 41 (42040), 1409-1418. [IF(2015) : 0.42] . Google Citation
  32. Neeraj Kumar, Chilamkurti N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40 (6), 1981-1996. [IF(2015) : 1.57] . Google Citation
  33. Rathore N., Inderveer Chana (2014). Load Balancing and Job Migration Techniques in Grid: A Survey of Recent Trends. Wireless Personal Communications, 79 (3), 2089-2125. [IF(2015) : 0.951] . Google Citation
  34. Zuo L., Neeraj Kumar, Tu H., Singh A., Chilamkurti N., Rho S. (2014). Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system. Journal of Supercomputing, 70 (1), 177-199. [IF(2015) : 1.326 ] . Google Citation
  35. Singh G., Neeraj Kumar, Anil Kumar Verma (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45 (), 151-167. [IF(2015) : 3.5 ] . Google Citation
  36. Kaur P.D., Inderveer Chana (2014). A resource elasticity framework for QoS-aware execution of cloud applications. Future Generation Computer Systems, 37 (), 14-25. [IF(2015) : 3.997] . Google Citation
  37. Swarnajyoti Patra, Rahul Gautam, Anshu Singla (2014). A novel context sensitive multilevel thresholding for image segmentation. Applied Soft Computing, 23 (), 122-127. [IF(2015) : 3.541 ] . Google Citation
  38. Neeraj Kumar, Chilamkurti N., Zeadally S., Jeong Y.-S. (2014). Achieving quality of service (QoS) using resource allocation and adaptive scheduling in cloud computing with grid support. Computer Journal, 57 (2), 281-290. [IF(2015) : 0.711] . Google Citation
  39. Chopra I., Maninder Singh (2014). SHAPE - An approach for self-healing and self-protection in complex distributed networks. Journal of Supercomputing, 67 (2), 585-613. [IF(2015) : 1.326 ] . Google Citation
  40. Neeraj Kumar, Chilamkurti N., Rodrigues J.J.P.C. (2014). Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks. Computer Communications, 39 (), 22-32. [IF(2015) : 3.338] . Google Citation
  41. Kumar P., Nigam S.P., Neeraj Kumar (2014). Vehicular traffic noise modeling using artificial neural network approach. Transportation Research Part C: Emerging Technologies, 40 (), 111-122. [IF(2015) : 3.805 ] . Google Citation
  42. Anshu Singla, Swarnajyoti Patra, Lorenzo Bruzzone (2014). A novel classification technique based on progressive transductive SVM learning. Pattern Recognition Letters, 42 (1), 101-106. [IF(2015) : 1.995 ] . Google Citation
  43. Neeraj Kumar, Lee J.-H. (2014). Peer-to-peer cooperative caching for data dissemination in urban vehicular communications. IEEE Systems Journal, 8 (4), 1136-1144. [IF(2015) : 3.882 ] . Google Citation
  44. Neeraj Kumar, Misra S., Obaidat M., Rodrigues J., Pati B. (2014). Networks of learning automata for the vehicular environment: A performance analysis study. IEEE Wireless Communications, 21 (6), 41-47. [IF(2015) : 8.972] . Google Citation
  45. Neeraj Kumar, Tyagi S., Deng D.-J. (2014). LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks. Journal of Network and Computer Applications, 46 (), 264-279. [IF(2015) : 3.5 ] . Google Citation

Conference(s) :

  1. Mahajan S., Maninder Singh (2014). Performance analysis of efficient RSA text encryption Using NVIDIA CUDA-C and OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  2. Gupta V., Maninder Singh, Bhalla V.K. (2014). Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis. Proceedings of the Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 [ : 24 September 2014 through 27 September 2014], pp.50-54.. Google Citation
  3. Sharma S., Maninder Singh (2014). An efficient and secure database system using OpenCL. Proceedings of the ACM International Conference Proceeding Series [ : 10 October 2014 through 11 October 2014], pp.-.. Google Citation
  4. Mahajan R., Maninder Singh, Miglani S. (2014). ADS: Protecting NTFS from hacking. Proceedings of the International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2014 [ : 9 May 2014 through 11 May 2014], pp.-.. Google Citation
  5. Kaur R., Maninder Singh (2014). Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. Proceedings of the Communications in Computer and Information Science [Trivandrum : 13 March 2014 through 14 March 2014], pp.298-309.. Google Citation
  6. Kapoor L., Seema Bawa, Gupta A. (2014). A novel mechanism for dynamic optimization of intercloud services. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 October 2014 through 31 October 2014], pp.377-388.. Google Citation
  7. Arora S., Inderveer Chana (2014). A survey of clustering techniques for big data analysis. Proceedings of the Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit [ : 25 September 2014 through 26 September 2014], pp.59-65.. Google Citation
  8. Kaur P.,D., Inderveer Chana (2014). Behavior analysis of multifarious cloud applications. Proceedings of the Proceedings - 2014 4th International Conference on Advances in Computing and Communications, ICACC 2014 [ : 27 August 2014 through 30 August 2014], pp.175-178.. Google Citation
  9. Jain S., Inderveer Chana (2014). Reengineering process of legacy systems for the cloud: An overview. Proceedings of the Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014 [ : 11 December 2014 through 13 December 2014], pp.164-168.. Google Citation
  10. Sharma A., Rinkle Rani (2014). A 3-level model for implementing MOOC in India. Proceedings of the 2014 IEEE International Conference on MOOCs, Innovation and Technology in Education, IEEE MITE 2014 [ : 19 December 2014 through 20 December 2014], pp.132-137.. Google Citation
  11. Kaur R., Maninder Singh (2014). Efficient hybrid technique for detecting zero-day polymorphic worms. Proceedings of the Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 [Gurgaon : 21 February 2014 through 22 February 2014], pp.95-100.. Google Citation