Thapar Institute of Engineering and Technology University - Year 2014-15

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors

1.       

An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata

The Computer Journal 10.1093/comjnl/bxu049doi, 2014

Ajay Kumar and Anil Kumar Verma

2.       

Improvement in Rebalanced CRT RSA

International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5492, Impact Factor: 0.39

Seema Verma Deepak garg;;

3.       

Selectivity Estimation of range queries in Data Streams using Micro-clustering

International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5856, Impact Factor: 0.39

Sudhanshu Gupta; Deepak garg;

4.       

Who Regulates Ethics in Virtual world?

Science and engineering ethics Volume 21, no. 1 (2014): pp. 19-28.

Seemu Sharma;Hitashi Lomash; and Seema bawa

5.       

Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata using Partial Derivatives

Chiang Mai Journal of Science

Volume 41(5), pp. 1409-1418, 2014

Ajay Kumar;

Anil Kumar Verma;

6.       

A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata

Applied Mathematics, Volume 8(1),

pp. 95-105, 2014

Ajay Kumar;

Anil Kumar Verma;

7.       

Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations

Applied Mathematics, Volume 8(5),

pp. 2389-2393, 2014

Tannu Singla;Ajay Kumar;Sunita Garhwal;

8.       

A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs

WPC, Springer,

Volume 77 pp. 2155-2182, 2014

V Ranga;M Dave; and Anil verma

9.       

OANTALG: An Orientation based ANT colony ALGorithm for Mobile Adhoc Networks

WPC, Springer, Volume 77

pp. 1859-1884, 2014

G SINGH;N KUMAR; Neeraj kumar and Anil verma

 

10.   

ANTALG: An Innovative ACO based Routing Algorithm for MANETs

JNCA, Volume 45

151-167, 2014

G SINGH;N KUMAR; Neeraj kumar and Anil verma

 

11.   

Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem

International Arab Journal of Information Technology Volume 11 No 5, 2014

Rattan Rana; and  Deepak garg

12.   

Cloud based intelligent system for delivering health care as a service

Computer Methods and Programs in Biomedicine, Springer, Volume 113, pp. 346-359, 2014

Pankajdeep Kaur; and Inderveer Chana

13.   

A resource elasticity framework for QoS-aware execution of cloud applications

FGCS, Volume 37, pp. 14-35, 2014

Pankajdeep Kaur; and Inderveer Chana

14.   

Variable Threshold Based Hierarchical Load Balancing Technique in Grid

Engineering with computers, springer, Volume 30, 2014

 

Neeraj Rathore; and Inderveer Chana

15.   

Artificial bee colony based energy-aware resource utilization technique for cloud computing

CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,, Volume 24, DOI: 10.1002/cpe.3295, 2014

Nidhi Jain Kansal; and Inderveer Chana

16.   

Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing

Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 21-35, 2014

Neeraj Rathore; and Inderveer Chana

17.   

SHAPEâ¿¿an approach for self-healing and self-protection in complex distributed networks

The Journal of Supercomputing, Volume 67, pp. 585-613, 2014

Inderpreet Chopra; and Maninder singh

18.   

Software clone detection: a systematic review

Information and Software technology, Volume 55, pp. 1165-1199, 2014

D Rattan;R Bhatia; and Maninder singh

19.   

Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing

Frontiers of Computer Science, Volume 8:04, pp. 656-666, 2014

Shi W., Gong P., Zhang Z.; and Neeraj kumar

20.   

Learning Automata Based Opportunistic Data Aggregation and Forwarding Scheme for Alert Generation in Vehicular Ad Hoc Networks

Computer Communications, Volume 39:01:00, pp. 22-32, 2014

Chilamkurti N., Rodrigues J.J.P.C.; and Neeraj kumar

21.   

A two factor authentication scheme for Roaming Service in Global Mobility Networks

IEEE Transactions on consumer Electronics, Volume 59:04:00, pp. 811-817

He D.B., Khan M.K., Lee J.K.; and Neeraj kumar

22.   

An efficient Password based Three party Authenticated Multiple Key Exchange Protocol for Wireless Networks

The Journal of Supercomputing, Volume 70:01:00, pp. 224-235, 2014

;TU H, He D, Kim J.; and Neeraj kumar

23.   

A Peer-to-Peer Cooperative Caching Scheme for Data Dissemination in Urban Scenarios Using Vehicular Ad Hoc Networks

IEEE Systems Journal, Volume 8:04, pp. 1136-1144, 2014

Lee H. J.; and Neeraj kumar

24.   

EEMHR: Energy Efficient Multi-levels Heterogeneous Routing Protocol for Wireless Sensor Networks

International Journal of Communication Systems Volume 27:09:00 pp. 1289-1318, 2014

Tanwar S;Niu J.; and Neeraj kumar

25.   

Detection and Analysis of Secure Intelligent Universal Designated Verifier Signature Scheme for Electronic Voting System

The Journal of Supercomputing Volume 70:01:00 pp. 177-199, 2014

Zho L;Tu Hang;Singh A;Chilamkurti N;Rho S; and Neeraj kumar

26.   

Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol

Journal of Medical Systems Volume 38:116, 2014

He D;Chilamkurti N;Lee J.H.; and Neeraj kumar

27.   

LA-EEHSC: Learning Automata based Energy Efficient Heterogeneous Selective Clustering for Wireless Sensor Networks

Journal of Networks and Computer Applications Volume 46:11:00 pp. 264-279, 2014

;Tyagi S;Deng D.J.; and Neeraj kumar

28.   

ANTALG: An Innovative ACO based Routing Algorithm for MANETs

Journal of Networks and Computer Applications Volume 45 pp. 151-167, 2014

Singh G, Verma A.K.; and Neeraj kumar

29.   

Collaborative Trust aware Intrusion Detection in VANETs

Computers and Electrical Engineering Volume 40:06:00 pp. 1981-1996, 2014

Chilamkurti N; and Neeraj kumar

30.   

Achieving QoS using Resource Allocation and Adaptive Scheduling in Cloud Computing with Support from Grid

The Computer Journal Volume 57:02:00

pp. 281-290, 2014

Chilamkurti N., Zeadally S., Jeong Y.S.; and Neeraj kumar

31.   

OANTALG: Orientation based ant colony algorithm for MANETs

Wireless Personal Communications Volume 77:03:00 pp. 1859-1884, 2014

Singh G, Verma A.K.; and Neeraj kumar

32.   

Enhanced Three-factor Security Protocol for USB Consumer Storage Devices

IEEE Transactions on consumer Electronics Volume 60:01:00 pp. 30-37, 2014

He D., Khan M.K., Lee J.H; and Neeraj kumar

33.   

Bayesian Coalition Game for Contention-aware Reliable Data Forwarding in Vehicular Mobile Cloud

Future Generation Computer Systems

:10.1016/j.future.2014.10.013, 2014

Iqbal R, Misra S.,Rodrgues J.J.P.C.; and Neeraj kumar

34.   

Networks of learning automata for the vehicular environment: a performance analysis study

IEEE Wireless Communication Volume 21:06 pp. 41-47, 2014

Misra S, Obaidat M.S., Rodrigues J.J.P.C., Pati B; and Neeraj kumar

35.   

An intelligent approach for building a secure decentralized public key infrastructure in VANET

Journal of Computer and System Sciences

10.1016/j.jcss.2014.12.016, 2014

Iqbal R, Misra S.,Rodrigues J.J.P.C.; and Neeraj kumar

36.   

Power Consumption Based Simulation Model for Mobile Ad-hoc Network

J. Wireless Personal communications Volume 77 pp. 1437-1448, 2014

Krishan Kumar; and Vp singh

 

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 A Novel Hierarchical Technique for Offline Handwritten Gurmukhi Character Recognition Nat Acad Sci Letters 37(6) 567-72 2014 Munish Kumar; M K Jindal; R K Sharma 0.24
2 A Novel Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition IETE Journal of Research 59(6) 687-92 2013 Munish Kumar; M K Jindal; R K Sharma 0.189
3 Efficient Feature Extraction Techniques for Offline Handwritten Gurmukhi Character Recognition National Academy Science Letters 7(4) 381-91 2014 0.24 Munish Kumar; M K Jindal; R K Sharma 0.189
4 QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks Mobile Network and Applications, Amit Dua, Neeraj Kumar, Seema Bawa 1.04
5 Web presence of Indian Digital Culture Preservation, Digital Technology & Culture (PDTC), 2015, 44(2), De Gruyter Saur, pp 62- 68. Springer Seemu Sharma, Hitashi Lomash, Seema Bawa 0.963
6 A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE Communications Surveys & Tutorials, Vol.16, Issue:3, pp:1520-1549, 2014 Ratinder Kaur, Maninder Singh 6.94
7 Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection Neural Computing and Applications, Springer, Vol. 26, Issue:1, pp: 117-130 Amit Kumar Bhardwaj Maninder Singh 1.56
8 An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach Software: Practice And Experience DOI: 10.1002/spe.2263 (2014). Manoj Kumar, Arun Sharma, Rajesh Kumar 0.9
9 A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks Journal of intelligent and Robotic Systems,Volume 77, Issue 3-4, pp 629-652, Vishal Sharma, Rajesh Kumar 1.0
10 Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET Scientific World Journal, Vol 2014, 12 pages, 2014. dx.doi.org/10.1155/2014/136365 Tulika Pandey, Deepak Garg, MM Gore 1.7
11 Hybrid Approach using SVM and MM2 in Splice Site Junction Identification Current Bioinformatics Vol. 9, No. 1,pp. 76-85, Bentham Science, 2014 Srabanti Maji, Deepak Garg 2.017
12 Intelligent text classification system based on self-administered ontology Turkish Journal Of Electrical Engineering & Computer Sciences, Faith University, Turkey, 10.3906/elk-1305-112 Vol. 23, Issue 2015,pp. 1393-1404 Manoj Manuja, Deepak Garg 0.568
13 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Information Sciences, 321, 263-277 2015 Debiao He, Neeraj Kumar, Naveen K. Chilamkurti 4.038
14 A systematic review on heterogeneous routing protocols for wireless sensor network Network and Computer Applications, 53, 39-56, 2015 Sudeep Tanwar, Neeraj Kumar, Joel J. P. C. Rodrigues 2.229
15 Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21, 49-60, 2015 Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeojeong 0.619
16 An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks Mobile Networks and Applications, 20, 181-200, 2015 Amit Dua, Neeraj Kumar, Seema Bawa, Joel J. P. C. Rodrigues 1.045
17 Load Balancing and Job Migration Algorithm : Survey of Recent Trends Wireless Personal Communication, Volume 79, Issue 3, ISSN print 0929-6212, ISSN online 1572-834X, pp: 2089–2125 Neeraj Kumar Rathore and Inderveer Chana, 0.979
18 A Novel Strategy for Automatic Test Data Generation Strategy using Soft Computing Technique Frontiers of Computer Science, Springer, Sep 2014 Priyanka Chawla, Inderveer Chana, Ajay Rana 0.405
19 QRSF: QoS-aware resource scheduling framework in cloud computing The Journal of Supercomputing, Vol. 71, no. 1, pp: 241-292, 2015. Singh, Sukhpal, and Inderveer Chana 0.841
20 Intelligent failure prediction models for scientific workflows Expert Systems with Applications 42, no. 3 (2015): 980-989 Bala, Anju, and Inderveer Chana 1.92
21 A hyper-heuristic approach for resource provisioning-based scheduling in grid environment The Journal of Supercomputing, Springer, 20 January, 2015 Rajni Aron, Inderveer Chana and Ajith Abraham 0.841
22 Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing Concurrent Engineering: Research and Applications, , Volume 22, Issue 4, Pages 1–13 Sage Publishers Bala, Anju, and Inderveer Chana 0.531
23 A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography QoS Constraints. Multimedia Tools Appl.74, 3477-3488, 2015 Zezhong Zhang, Qingqing Qi, Neeraj Kumar, Naveen Chilamkurti, Hwa-Young Karamjit Kaur, Rinkle Rani 1.346
24 A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools Appl.74, 3477-3488, 2015 Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo 1.346
25 On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Networking and Applications 8, 881-885, 2015 Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen Chilamkurti, Hangbae Chang 0.632
26 An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications 8, 881-885, 2015 Hang Tu, Neeraj Kumar, Naveen Chilamkurti, Seungmin Rho 0.632
27 Secure pseudonym-based near field communication protocol for the consumer internet of things. IEEE Trans. Consumer Electronics 61,56-62, 2015 Debiao He, Neeraj Kumar, Jong-Hyouk Lee 1.045
28 Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems 58, 275-277, 2015 Neeraj Kumar, Al-Sakib Khan Pathan, Elias Procópio Duarte Jr., Riaz Ahmed Shaikh 0.705
29 Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints. IEEE Systems Journal 9, 675-685, 2015 Neeraj Kumar, Jong-Hyouk Lee 1.980
30 Managing Data in healthcare information systems: many models, one solution IEEE Computer , Vol. 48, No. 3, pp 52-59, 2015 Karamjit Kaur, Rinkle Rani 1.44
31 An Efficient Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks Discrete Mathematics & Theoretical Computer Science, Vol 17, No 1 (2015), pp. 317–338 Avleen Kaur, Shalini Batra 0.38
32 Protein structure prediction (RMSD ≤ 5 Å) using machine learning models Int. J. Data Mining and Bioinformatics, 2015, [In Press] Y Pathak, PS Rana, PK Singh and M Saraswat 0.66
33 Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm IETE Journal of Research, Vol. 61, pp. 22-31, 2015 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar 0.185

 

S. No.

Title of the paper

Name of the Journal with volume, page nos.,  year

Name of the authors

Impact Factor

  1.  

An Analysis of Identity-Based Ring Signcryption Schemes for Wireless Sensor Networks

International Information Institute Journal (SCIE-Indexed)                        

 

Gaurav Sharma, Anil K. Verma

0.25

  1.  

Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks.

 

IJAHUC 12(1): 3-13 (2013).

 

N. Kumar, N.Chilamkurti, J.H. Park, D.S. Park

 

0.65

  1.  

A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks

 

J. Network and Computer Applications 36(2): 623-645 (2013).

 

S.Tyagi, N. Kumar

 

1.7

  1.  

UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks

 

Mathematical and Computer Modelling 57(11-12): 2750-2763 (2013).

N. Kumar, N. Chilamkurti, J.H. Lee

2.02

 

  1.  

Quantum Neural Network based Machine Translator for Hindi to English

The Scientific World Journal

Volume 2014 (2014), Article ID 485737, 8 pages

http://dx.doi.org/10.1155/2014/485737

Ravi Narayan, V P Singh and Snehashish Chakraverty