header

Publications@Thapar

Thapar University
Patiala, Punjab - 147004

Publication@Thapar

Publications of Computer Science and Engineering

2017 (8) 2016 (61) 2015 (64) 2014 (56) 2013 (43) 2012 (28)
2011 (36) 2010 (10) 2009 (10) 2008 (8) 2007 (9) 2006 (6)
2005 (1) 2004 (1) 2002 (1) 1999 (1) All

Book(s) :

  1. Pritpal Singh (2016). Applications of Soft Computing in Time Series Forecasting Simulation and Modeling Techniques. : Springer. [ISBN : 978-3-319-26292-5] . Google Search

Book Chapter(s) :

  1. Kapil Yadav, Jhilik Bhattacharya (2016). Real-Time Hand Gesture Detection and Recognition for Human Computer Interaction. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 559-567). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search
  2. Sachin Meena, Jhilik Bhattacharya (2016). Encoded Scene Panorama Based Information Flow in a Multi Agent System. In Stefano Berretti, Sabu M. Thampi, Praveen Ranjan Srivastava, Intelligent Systems Technologies and Applications (pp. 541-548). Netherlands: Springer. [ISBN : 978-3-319-23035-1] . Google Search

Journal(s) :

  1. Vishal Sharma, Rajesh Kumar (2016). Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks. IT Convergence Practice, 2 (3), 24-33. Google Citation
  2. Vishal Sharma, Rajesh Kumar (2016). Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs. Computing and Informatics, 35 (5), -. [IF(2015) : 0.488 ] . Google Citation
  3. Lee J.-H., Singh K.D., Hadjadj-Aoul Y., Neeraj Kumar (2016). Wireless and Mobile Technologies for the Internet of Things. Mobile Information Systems, 2016 (), -. [IF(2015) : 0.849] . Google Citation
  4. Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues (2016). Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Communications Magazine , 54 (10), 60-66. [IF(2015) : 10.435] . Google Citation
  5. Dua A., Neeraj Kumar, Seema Bawa (2016). ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks. Telecommunication Systems, (), 1-20. [IF(2015) : 1.542] . Google Citation
  6. Bali R.S., Neeraj Kumar (2016). Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System. Computers & Electrical Engineering, 52 (), 82-97. [IF(2015) : 1.57] . Google Citation
  7. Bhardwaj A.K., Gajpal Y., Maninder Singh (2016). Fuzzy reliability analysis of integrated network traffic visualization system. Journal of Intelligent & Fuzzy Systems, 31 (3), 1941-1953. [IF(2015) : 1.261] . Google Citation
  8. Neeraj Kumar, Lee J.-H., Chilamkurti N., Vinel A. (2016). Energy-efficient multimedia data dissemination in vehicular clouds: Stochastic-reward-nets-based coalition game approach. IEEE Systems Journal, 10 (2), 847-858. [IF(2015) : 3.882 ] . Google Citation
  9. Goyal S., Seema Bawa, Singh B. (2016). Energy optimised resource scheduling algorithm for private cloud computing. International Journal of Ad Hoc and Ubiquitous Computing, 23 (2-Jan), 115-123. [IF(2015) : 0.705] . Google Citation
  10. Jindal A., Dua A., Kaur K., Mukesh Singh, Neeraj Kumar, Mishra S. (2016). Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid. IEEE Transactions on Industrial Informatics, 12 (3), 1005-1016. Google Citation
  11. Neeraj Kumar, Misra S., Chilamkurti N., Lee J.-H., Rodrigues J.J.P.C. (2016). Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment. IEEE Transactions on Dependable and Secure Computing, 13 (1), 133-145. Google Citation
  12. Xie Y., Wu L., Neeraj Kumar, Shen J. (2016). Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network. Wireless Personal Communications, (), 1-19. [IF(2015) : 0.951] . Google Citation
  13. Maitra T., Islam S.K.H., Amin R., Giri D., Khan M.K., Neeraj Kumar (2016). An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Security and Communication Networks, 9 (17), 4615-4638. [IF(2015) : 1.067 ] . Google Citation
  14. Iqbal K., Odetayo M., James A., Iqbal R., Neeraj Kumar, Barma S. (2016). An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images. Neurocomputing, 174 (), 413-430. Google Citation
  15. Zhang Y., Neeraj Kumar, Chen J., Rodrigues J.J.P.C. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9 (17), 3944-3951. [IF(2015) : 1.067 ] . Google Citation
  16. Jiang Q., Neeraj Kumar, Ma J., Shen J., He D., Chilamkurti N. (2016). A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. International Journal of Network Management, (), -. Google Citation
  17. Wang L., Liu W., Neeraj Kumar, He D., Tan C., Gao D. (2016). A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Security and Communication Networks, 9 (16), 3543-3557. [IF(2015) : 1.067 ] . Google Citation
  18. Khushneet Jindal, Rajiv Kumar (2016). A Note on "Data mining based noise diagnosis and fuzzy filter design for image processing". Computers & Electrical Engineering, 49 (), 50-51. [IF(2015) : 1.57] . Google Citation
  19. Suman Bala S., Anil Kumar Verma (2016). A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 21 (2), 140-155. [IF(2015) : 0.705] . Google Citation
  20. Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar (2016). A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Security and Communication Networks, 9 (17), 4650-4666. [IF(2015) : 1.067 ] . Google Citation
  21. Tarunpreet Bhatia, Simmi Kansal, Shivani Goel, Anil Kumar Verma (2016). A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Computers & Electrical Engineering, 56 (), 441-455. [IF(2015) : 1.57] . Google Citation
  22. Murari Mandal, Gaurav Sharma, Anil Kumar Verma (2016). A computational review of identity-based signcryption schemes. International Journal of Network Security, 18 (5), 969-977. Google Citation
  23. Kuljeet Kaur, Rubi Rana, Neeraj Kumar, Mukesh Singh, S. Mishra (2016). A Colored Petri Net Based Frequency Support Scheme Using Fleet of Electric Vehicles in Smart Grid Environment. IEEE Transactions on Power Systems, 31 (6), 4638-4649. [IF(2015) : 5.68 ] . Google Citation
  24. Goyal S., Seema Bawa, Singh B. (2016). Green Service Level Agreement (GSLA) framework for cloud computing. Computing, 98 (9), 949-963. [IF(2015) : 1.589 ] . Google Citation
  25. Anshu Singla, Swarnajyoti Patra (2016). A fast automatic optimal threshold selection technique for image segmentation. Signal, Image and Video Processing, (), 1-8. [IF(2015) : 1.102] . Google Citation
  26. He D., Zeadally S., Neeraj Kumar, Wu W. (2016). Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Transactions on Information Forensics and Security, 11 (9), 2052-2064. Google Citation
  27. Silva B.M.C., Rodrigues J.J.P.C., Neeraj Kumar, Proen?a M.L., Jr., Han G. (2016). MobiCoop: An incentive-based cooperation solution for mobile applications. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4), -. Google Citation
  28. Kapoor L., Seema Bawa, Gupta A. (2016). Detecting and containing malicious services in an intercloud environment. Journal of Web Engineering, 15 (6-May), 521-538. [IF(2015) : 0.58] . Google Citation
  29. Singh S., Inderveer Chana, Maninder Singh, Buyya R. (2016). SOCCER: Self-Optimization of Energy-efficient Cloud Resources. Cluster Computing-The Journal of Networks Software Tools and Applications, (), 1-14. [IF(2015) : 1.514] . Google Citation
  30. Bhalla V.K., Neeraj Kumar (2016). An efficient scheme for automatic web pages categorization using the support vector machine. New Review of Hypermedia and Multimedia, 22 (3), 223-242. [IF(2015) : 0.758] . Google Citation
  31. Rathore N.K., Inderveer Chana (2016). Job Migration Policies for Grid Environment. Wireless Personal Communications, 89 (1), 241-269. [IF(2015) : 0.951] . Google Citation
  32. Tekchandani R., Bhatia R., Maninder Singh (2016). Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. Journal of Supercomputing, (), 1-28. [IF(2015) : 1.326 ] . Google Citation
  33. Kumar M., Jindal M.K., Rajendra Kumar Sharma (2016). A Novel Framework for Grading of Writers Using Offline Gurmukhi Characters. Proceedings of the National Academy of Sciences India Section A-Physical Sciences, 86 (3), 405-415. [IF(2015) : 0.425 ] . Google Citation
  34. Geeta Kasana, Kulbir Singh, Satwinder Singh Bhatia (2016). Block-Based High Capacity Multilevel Image Steganography. Journal of Circuits, Systems and Computers, 25 (8), -. [IF(2015) : 0.481] . Google Citation
  35. Tanmoy Maitra, Mohammad S Obaidat, S.K. Islam, Debasis Giri, Ruhul Amin (2016). Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Security and Communication Networks, (), -. [IF(2015) : 1.067 ] . Google Citation
  36. Venkatasamy Sureshkumar, R. Anitha, N Rajamanickam, Ruhul Amin (2016). A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Computers & Electrical Engineering, (), -. [IF(2015) : 1.57] . Google Citation
  37. Sandeep Saharan, Ravinder Kumar (2016). Graph coloring based optimized algorithm for resource utilization in examination scheduling. Applied Mathematics & Information Sciences, 10 (3), 1193-1201. [IF(2015) : 1.232] . Google Citation
  38. Vishal Sharma, Ilsun You, Rajesh Kumar (2016). Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks. Mobile Information Systems, 8475820 (), 13 Pages-. [IF(2015) : 0.849] . Google Citation
  39. Vishal Sharma, Mehdi Bennis, Rajesh Kumar (2016). UAV-Assisted Heterogeneous Networks for Capacity Enhancement. IEEE Communications Letters, 20 (6), 1207-1210. [IF(2015) : 1.988] . Google Citation
  40. Vijay Kumar, Jitender Kumar Chhabra, Dinesh Kumar (2016). Data Clustering using Differential Search Algorithm. Pertanika Journal of Science and Technology, 24 (2), 295-306. Google Citation
  41. He D., Neeraj Kumar, Shen H., Lee J.-H. (2016). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, (), 1-14. Google Citation
  42. Garg N., Seema Bawa (2016). Comparative analysis of cloud data integrity auditing protocols. Journal of Network and Computer Applications, 66 (), 17-32. [IF(2015) : 3.5 ] . Google Citation
  43. Priyanka Chawla, Inderveer Chana, Ajay Rana (2016). Cloud-based automatic test data generation framework. Journal of Computer and System Sciences, 82 (5), 712-738. [IF(2015) : 1.678] . Google Citation
  44. Singh S., Inderveer Chana (2016). EARTH: Energy-aware autonomic resource scheduling in cloud computing. Journal of Intelligent & Fuzzy Systems, 30 (3), 1581-1600. [IF(2015) : 1.261] . Google Citation
  45. Arora V., Bhatia R., Maninder Singh (2016). A systematic review of approaches for testing concurrent programs. Concurrency and Computation: Practice and Experience , 28 (5), 1572-1611. [IF(2015) : 0.942] . Google Citation
  46. Nidhi Jain Kansal, Inderveer Chana (2016). Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach. Journal of Grid Computing, (), -. [IF(2015) : 2.766 ] . Google Citation
  47. Vinod Kumar Bhalla, Neeraj Kumar (2016). An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks. Wireless Personal Communications, (), 1-20. [IF(2015) : 0.951] . Google Citation
  48. Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti (2016). A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Journal of Supercomputing, (), 1-13. [IF(2015) : 1.326 ] . Google Citation
  49. Singh S., Inderveer Chana (2016). Resource provisioning and scheduling in clouds: QoS perspective. Journal of Supercomputing, (), 1-35. [IF(2015) : 1.326 ] . Google Citation
  50. Anju Bala, Inderveer Chana (2016). Prediction-based proactive load balancing approach through VM migration. Engineering with Computers, (), 1-12. [IF(2015) : 0.765 ] . Google Citation
  51. Manoj Manuja, Deepak Garg (2016). Performance and accuracy analysis of semantic kernel functions. Program-Electronic Library and Information Systems, 50 (1), 83-102. [IF(2015) : 0.556] . Google Citation
  52. Singh S., Inderveer Chana (2016). A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges. Journal of Grid Computing, (), 1-48. [IF(2015) : 2.766 ] . Google Citation
  53. Yadunath Pathak, Prashant Singh Rana, P.K. Singh, Mukesh Saraswat (2016). Protein structure prediction (RMSD ≤ 5 Å) using machine learning models. Interantional Journal of Data Mining and Bioinformatics, 14 (1), 71-85. Google Citation
  54. Gaurav Sharma, Suman Bala, Anil K. Verma (2016). An improved RSA-based certificateless signature scheme for wireless sensor networks. International Journal of Network Security, 18 (1), 82-89. Google Citation

Conference(s) :

  1. Singh H., Seema Bawa (2016). Spatial data analysis with ArcGIS and MapReduce. Proceedings of the Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 [ : 29 April 2016 through 30 April 2016], pp.45-49.. Google Citation
  2. Maneesha, Inderveer Chana (2016). Searching of near exact duplicate images in cloud database. Proceedings of the International Conference on Inventive Computation Technologies [ : 26-27 Aug. 2016], pp.-.. Google Citation
  3. Prashant Singh Rana, Shivendra Pratap Singh (2016). Genetic algorithm with mixed crossover approach for travelling salesman problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation
  4. Lachheta P., Seema Bawa (2016). Combining synthetic minority oversampling technique and subset feature selection technique for class imbalance problem. Proceedings of the ACM International Conference Proceeding Series [ : 12 August 2016 through 13 August 2016], pp.-.. Google Citation