List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Modified Single Pass Clustering with Variable Threshold Approach International Journal of Innovative Computing, Information and Control 11(1), 375-86, 2014 Mamta Mittal; V P Singh; R K Sharma
2 Validation of k-means and threshold based clustering methods International Journal of Advancements in Technology, 5(2), 153-60, 2014 Mamta Mittal; VP Singh; R K Sharma
3 Predicting gender using IRIS images Res Journal of Recent Sciences 3(4), 20-26, 2014 Atul Bansal; R Agarwal; R K Sharma
4 Regression models for the prediction of compressive strength of concrete with and without fly ash International Journal of Latest Trends in Engg and Tech, 3(4), 400-6, 2014 Palika Chopra; Maneek Kumar; R K Sharma
5 Predicting compressive strength of concrete for varying workability using regression models International Journal of Engg and Applied Sciences, 6(4), 10-22, 2014 Palika Chopra; Maneek Kumar; R K Sharma
6 Segmentation of isolated and touching characters in offline handwritten Gurmukhi script documents International Journal of Information Tech and Comp Science, 2, 58-63, 2014 Munish Kumar; M K Jindal; R K Sharma
7 A Query-Context oriented Approach to Semantic Search on Web International Journal of Artificial Intelligence and Knowledge Discovery Vol.5, Issue 1, Jan 2015. Vikas Jindal, Seema Bawa, Shalini Batra
8 Web presence of Indian Digital Culture Digital Technology and Culture, June 2015, De Gruyter Seemu Sharma, Hitashi Lomash, Seema Bawa
9 An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks Mobile Netw Appl (2015) 20:181–200 DOI 10.1007/s11036-015-0588-1, Published online: 18 March 2015 © Springer Science+Business Media New York 2015. Amit Dua, Neeraj Kumar, Seema Bawa
10 Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks IT Convergence Practice, 2(3), pp. 24-33, 2014. Vishal Sharma Rajesh Kumar
11 A Secure Opportunistic service dissemination over Flying Ad Hoc Networks. ACM security Symposium , IIT Delhi Feb. 2015 Vishal Sharma Rajesh Kumar
12 Feasibility of Public Key Cryptography in Wireless Sensor Networks. International Journal of Theoretical Physics and Cryptography, Vol. 7, 2014 Mandal Murari, Gaurav Sharma, Suman Bala, and Anil K. Verma.
13 Modified Single Pass Clustering with Variable Threshold Approach International Journal of Innovative Computing, Information and Control, pg375-386, 11(1), 2015 Mamta Mittal, R.K.Sharma and V. P. Singh
14 A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM CIT Journal of Computing and Information Technology, pp. 45-55 Vol 22 2014 Bhawna Mallick, Deepak Garg, P S Grover
15 Recommender System using Collaborative Filtering and Demographic Characteristics of Users International Journal of Recent and Innovative Trends in Computing and Communication (IJRITCC) ISSN 2321-8169 Shano Solanki and Shalini Batra
16 Data Mining – Techniques, Methods and Algorithms: A Review on Tools and their Validity International Journal of Computer Applications, Vol. 113, No. 18, pp. 22-29, March 2015(Impact factor 0.715). Mansi Gera, Shivani Goel
17 Image Super Resolution using Fusion of Images International Journal of Image and Data Fusion, Vol. 6, pp. 1-11, 2015 DOI:10.1080/19479832.2015.1046954 Chirag Garg, Singara Singh Kasana
18 Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 Tannu Singla, Ajay Kumar, Sunita Garhwal
19 A Cuckoo Search based Approach for solving Standard Cell Placement Problem Journal of VLSI Design Tools & Technology,4,1-7,2014Maninder Kaur, Amanpreet Singh Maninder Kaur, Amanpreet Singh
20 Recognition of Multi-Stroke Based Online Handwritten Gurmukhi Aksharas Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, Springer, 2015, 85, 159-168 Kumar, R.; Sharma, R. K. & Sharma, A.
21 Enhancement of Compatibility and Performance of Component Based Softwares by Deactivating Non-Participating / Non-Functional Components European Journal of engineering and technology Jasneet Chawla and Ashima Singh
22 Cost reduction techniques of CBSE Software while retaining high performance International Journal of Business Management and Scientific Research Neeraj Gupta and Ashima Singh
23 A Survey on Regression Test Techniques of Component-Based Softwares International Journal of Advanced Research in Computer Science and Software Engineering . Jasneet Chawla and Ashima Singh
24 Scrutinize: Fault Monitoring for Preventing System Failure in Cloud Computing International Journal of Innovations & Advancement in Computer Science IJIACS,PP: 211-219, Volume 4, 2015. Anu and Anju Bala
25 Fault Tolerance Against Crash Failures of Name Nodes of Hadoop By Using Load balancing Techniques International Journal of Engineering Research and Technology, Volume 8, 2015 Rajeev Kapoor, Ms. Anju Bala
26 A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. Computer Fraud & Security, 2015(2), 10-16. Sanmeet Kaur, & Maninder Singh
27 Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 Tannu Singla, Ajay Kumar, Sunita Garhwal
28 Video compression using steganographic Techniques International Journal of Innovations & Advancement in Computer Science , Vol. 4,40-46, May 2015. Sachin Meena and Jhilik Bhattacharya
29 HCI System for Windows Application International Journal of Innovations & Advancement in Computer Science , Vol. 4,47-53, May 2015 Kapil Yadav and Jhilik Bhattacharya
30 Differential Search for Multiobjective Problems Procedia Computer Science, Vol. 48, pp. 22-28, 2015 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
31 Comparative Analysis of MySQL and MongoDB : A Case Study of Hospital Management System International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1515-1526. Dhulfiqar Hazim, Karamjit Kaur
32 Comparative analysis of ECC and RSA for Document-oriented database MongoDB International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1555-1560. Saurabh Singh, Karamjit Kaur
33 Steganography Technique for JPEG2000 Compressed Images using Histogram in Wavelet Domain International Journal of Security and its Applications, Vol 8, Issue 6, pp. 211-224, 2014.(Scopus indexed) Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
34 Energy Efficient Load Balanced Multipath Routing in MANET International Journal Of Engineering And Computer Science, vol. 4, pp. 12557-12562, 2015. Simranjeet Kaur, Suveg Moudgil, Tarunpreet Bhatia
35 Simulation Analysis of MANET Routing Protocols under Different Mobility Models International Journal of Wireless Communications and Network Technologies, vol. 4, pp. 1-8, 2015. Munish Sharma, Manish Kansal, Tarunpreet Bhatia