Year 2012-13 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors
1 Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing Advances in Intelligent and Soft Computing, ISSN: 1867-5662, Springer, 233 SPRING STREET, NEW YORK, USA, NY, 10013. Springer, Vol. 167,  page 323-331 Ajay Kumar, Seema Bawa,
2 A Survey of Search and Retrirval of Components from Software Repositories International Journal of Engineering research and Technology, ISSN : 2278 – 0181, Vol 2, Issue 4, April 2013.   Amandeep Bakshi, Seema Bawa
3 Key features of research portal for stimulating research in institutions of higher technical education EGITIM ARASTIRMALARI-EURASIAN JOURNAL OF EDUCATIONAL RESEARCH, Vol. 48, No. 12, pp. 155-174, 2012 Parul Dharmani, Ravi Kiran, Anil K Verma  
4 Simulation and analysis of AODV routing protocol in VANET International Journal of Soft Computing and Engineering, Vol. 2, No. 3, 293-301, July 2012 Tajinder Kaur, K Cheema, Anil K Verma
5 Agent enriched distributed association rules mining- A review Agents and Data Mining Interaction-LNCS, Vol. 7103, pp. 30-45, 2012 G S Bhamra, R B Patel, Anil K Verma
6 Simulation and analysis of dropped packets for DSR protocol in VANET International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Avleen Kaur, Anil K Verma
7 Simulation and Comparison of AODV and DSR Routing Protocols in VANETs International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 Tajinder Kaur, Avleen Kaur, Anil K Verma  
8 Computation of Pheromone Values in AntNet Algorithm International Journal of Computer Network and Information Security, Vol. 9, pp. 47-54, Aug 2012 Anuj Gupta, H Sadawarti, Anil K Verma  
9 Simulation and analysis of DSR protocol in VANETs International Journal of Research in Computer and Communication Technology Vol. 1 No. 3, pp. 50-59, Aug. 2012 Avleen Kaur, Anil K Verma
10 SNMP, ICMP: A Collaborative Approach to Network Discovery and Monitoring International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248-9738 Volume-1, Issue-3, 2012 Aman Mahajan, Sahil Khajuria, Haresh Joshi, Anil K Verma  
11 Classification of Symmetric Key Management Schemes for Wireless Sensor Networks-Extended International Journal of Security and its Application, Vol. 7. No. 2, Mar 2013 Suman Bala, Gaurav Sharma, Anil K Verma
12 MFZLP: Multihop Far Zone Leach Protocol for WSNs Journal of Computational Intelligence and Electronic Systems, Vol. 2, No. 1, pp. 45-49, 2013 Virender Ranga;Mayank Dave;Anil Kumar Verma
13 Implementation of DYMO routing protocol   International Journal of Information Technology, Modeling and Computing, Vol. 1, No. 2, pp. 49-57, May 2013 Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma
14 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, pp. 1382-1394, Jun 2013 T Bhatia, Anil K Verma
15 Performance Analysis of MANETS Routing Protocols in Different Mobility Models International Journal of Information Technology and Computer Science,  Vol. 6, May 2013 K Gupta Anuj, Harsh Sadawarti, Anil K Verma
16 Knowledge Management Role of Thought Leaders and Junior Academia in Enhancing Research and Curriculum in Institutions of Higher Technical Education SAGE Open, pp. 1-13, June 2013 Ravi Kiran, Parul Agarwal, Anil K Verma
17 How the Two Wireless Networks Can Be Different: WSNS and VANETS Journal of Basic and Applied Scientific Research, 2013 Vandana Jindal, A.K.Verma, Seema Bawa
18 Multi-Core Scheduling in Cloud Computing,   International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868, Volume 4– No.9, Abhishek Kaushik and Inderveer Chana,
19  Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing” International Journal of Computer Applications, IJCA Journal, pp.13-17, Vol 50, No 10 Year of Publication: 2013 Deep Mann and Inderveer Chana,
20 Empirical Evaluation of Cloud-based Testing Techniques:A Systematic Review International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6
 
Priyanka, Inderveer Chana and Ajay Rana
21 Existing Load Balancing Techniques in Cloud Computing : A Systematic Review International Journal in Foundations of Computer Science & Technology(IJFCST), Volume 3, No.3, May, 2013 Kansal J. N., Chana I.
22 Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol.2, No.2, pp. 123~133, ISSN: 2089-3337. Anju Bala, Inderveer Chana
23 Cloud Load Balancing Techniques: A Step Towards Green Computing International Journal of Cloud Computing and Services Science (IJ-CLOSER), pp. 291~302,Vol.2, No.1, Kansal J. N., Chana I.
24 An Enhanced Run Length Coding for JPEG Image Compression International Journal of Computer Applications , 72(20),  2013  Amritpal Singh, V. P Singh
25 Adaptive Distributed Intrusion Detection using Hybrid k-means SVM Algorithm International Journal of Enhanced Research in Management & Computer Applications, Vol. 2 Issue 6, June-2013, pp: (10-14), V. P. Singh, Parneet Kaur
26 Steganography : A modern day Art and Science for Data Hiding International Journals of latest research in Science and Technology (IJLRST), Volume 2 Issue 4 ,2013 (Accepted) Roopam Bansal and V. P. Singh
27 Modeling and Querying Data in MongoDB International Journal of Scientific and Engineering Research Vol. 4, No. 2 pp. 141-144 Rupali Arora Rinkle Aggarwal
28 Implementation of relation queries in graph databases   International Journal on Information & Communication Technologies Vol. 6 no.1   pp.354-357 Rupali Arora Rinkle Aggarwal
29 Simulating wireless sensor networks using opnet   International Journal on Information & Communication Technologies Vol. 6 no.1 pp. 366-371 Abhinandan Gupta Rinkle Aggarwal
30 Design and Performance Evaluation of a New Irregular Fault- Tolerant Multistage Interconnection Network International Journal of Computer Science Issues Vol. 9, No.  2 pp. 108-113 Rinkle Aggarwal
31 Design and Reliability Analysis of a Class of Irregular Fault-tolerant Multistage Interconnection Networks International Journal of Computer Applications Vol. 39, No.8, pp. 8-14 Rinkle Aggarwal
32 An Efficient Algorithm for Data Cleaning of Log File using File Extensions International Journal of Computer Applications Vol. 48, No.8, pp. 13-18 Surbhi Anand Rinkle Aggarwal
33 Reference Scan Algorithm for Path Traversal Patterns International Journal of Computer Applications Vol. 48, No.7, pp. 20-25 Chintandeep Kaur Rinkle Aggarwal
34 An Efficient Algorithm for Web Page Change Detection International Journal of Computer Applications Vol. 48, No.10, pp. 28-33 Srishti Goel Rinkle Aggarwal
35 A Modified Algorithm to Handle Dangling Pages using Hypothetical  Node International Journal of Computer Applications Vol. 48, No.7,  pp. 26-32 Shipra Srivastava Rinkle Aggarwal
36  A Short Survey of Key Distribution Techniques for Namespace Load Balancing International Journal of Emerging Technologies in Computational and Applied Sciences, Issue 4, Vol. 1, 2 & 3, pp. 532-536, May, 2013 Ravneet Kaur, Shalini Batra
37 Phases of Testing An Online Application International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 6, June 2013 Sandeep Singh and Shivani Goel
38 Testing Techniques for COTS International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 4, pp. 829-833, April 2013 Jagdeep Singh and Shivani Goel
39 COTS and OSS: A Comparative View The International Journal of Computer Science and Applications Vol 1, No. 12, pp. 55-59, Feb 2013 Jagdeep Singh and Shivani Goel
40 Selection of Component Models: A Comparative view International Journal of Computer Engineering and Software Technology, Vol 3, No. 2, pp. 166-173, July-Dec 2012 Jyotsna, Shivani Goel
41 Vulnerability Management for an Enterprise Resource Planning System International Journal of Computer Applications, ISSN: 0975 – 8887, Vol 53, No. 4, September 2012, pp. 19-22 Shivani Goel, Ravi Kiran, Deepak Garg
42 UNL-ization of Numbers and Ordinals in Punjabi with IAN,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 3, June 2013: 61,69. Vaibhav Agarwal, Parteek Kumar  
43 NLization of Nouns, Pronouns and Prepositions in Punjabi With EUGENE,  International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 2,  April 2013: 33,42 Ashutosh Verma, Parteek Kumar  
44 Development of Mobile Application for Transliteration of Roman Script to Gurmukhi Script,    International Journal of Computational Linguistics and Natural Language Processing, Vol. 1, No. 1, Aug 2012: 6-11.   Maninder Singh, Parteek Kumar, Ms. Rupinderdeep Kaur
45 Web Page Categorization: Tools, Techniques and  Evaluation International Journal of Advances in Computing  and Information Technology, ISSN 2277-9140, Vol. 1, Issue-2, pp. 212-219, 2012 K. Taneja, and V. K. Bhalla
46 Analysis the Performance of MANET Protocols by Varying the Number of Connections International Journal of Mobile & Adhoc Network, ISSN 2231–6825, Vol 2, issue 2, pp.185-191,2012 Shivender Taneja and Vinod K Bhalla
47 Optimization of Hamilton Path Tournament Schedule International Journal of Advanced Research in Computer Engineering & Technology, Volume 2 Issue 6 of  (ISSN: 2278-1323) , 2013 Trinetra Kumar Pathak and Vinod K. Bhalla
48 Android Internals International Journal of Advanced Research in Computer Science and Software Engineering,” Vol. 3, Issue 6, pp. 143-147, 2013 Vaibhav Kumar Sarkania, Vinod Kumar Bhalla
49 ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack International Journal of Network Security (IJNS), vol. 14, no. 1,  ISSN 1816-3548, pp. 36-45 B. B. Gupta, R. C. Joshi, Manoj Misra
50 Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email, Indian Journal of Science and Technology, Vol. 6, issue 1, pp. 1-5 (ISI Thomson Router) A. ALmomani, B. B. Gupta, T. Wan, A. Altaher, S. Manickam
51 Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model Journal of Computing and Information Technology (CIT) , Vol. 20, no. 1, ISSN 1846-3908, pp. 1–8 B. B. Gupta
52 Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art International Journal of Computer Applications, Vol. 49, no. 7, pp. 24-32, 2012 E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, R. Alfaris
53 Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment International Journal of Computer Science Issues(IJCSI), vol. 10, issue 2, pp. 142-146 P. Negi, a. Mishra, B. B. Gupta
54 Mutation Operators corresponding Conditions Contributing in Deporting them Equivalently Vol. 4(2), 656-658, 2013        IJCST   Tannu Singala Ajay Kumar  
<55 Rule based Normalization of Regular Expressions International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 2013 J. S. Khedar, Ajay Kumar    
56 Ambiguity detection algorithm for context free grammar   IJCST, 4(3), 2013 S. K. Jain, Ajay Kumar  
57 Text to Speech Synthesis for numerals into Punjabi Language International Journal of Computational Linguistics and Natural Language Processing Vol 2 Issue 7 July 2013 Karun Verma, Maninder Singh
58 Workflow Management in Cloud Computing   IJAIS, Vol no:4, page       no: 21-26., Oct.2012 Monika Bharti, Anju Bala
59 Automatic Fragmentation and Storage of Code in Component Repository w.r.t. their Input and Output Interfaces: A Tool” International Journal of Innovative Technology and Exploring Engineering (IJITEETM) ISSN: 2278-3075, Volume-2, Issue-3, Page: 235-238 February 2013 Pankaj Vohra Ashima Singh
60 A Tool incorporation different Techniques for Effective Component Storage and Retrieval   International Journal. of Scientific and Engineering Research, vol. 4, no. 7, pp. 1134-1137, 2013. Pankaj Vohra Ashima Singh
61 Iterative and Non–Iterative Approaches for Architecture Based Software Development CiiT International Journal of Software Engineering and Technology Vol 5, January 2013 Navneet Rathour Ashima Singh
62 Generating More Reusable Components while Development : A Technique International Journal of Innovative Technology and Exploring Engineering(IJITEE) Volume-2 Issue-3, 2013 Navneet Rathour Ashima Singh
63 A Complexity Metric for Black Box Components International Journal of Soft Computing and Engineering  Volume-3 Issue-2, ,10,179-184, June 2013 Navneet Rathour Ashima Singh
64 A Technique for Component Based Software Development International Journal of Computer Science and Engineering ( IJCSE )   Volume-2, Issue 2, 123-134, May 2013 Navneet Rathour Ashima Singh
65 Component Complexity Metrics: A Survey International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6,pp. 1056-1061, June 2013 Navneet Rathour Ashima Singh
66 A metric for Assessing Black Box Component Reusability International Journal of Scientific and Engineering Research, vol 4 ,no. 7, pp. 1114-1121, 2013 Navneet Rathour Ashima Singh
67 Design and Deployment of Workflows in Cloud Environment IJCA Vol No: 51 Issue 11 pp:9-15, August 2012 Anju Bala and Inderveer Chana
68 Autonomic Data Replication in Cloud Environment IJECSE, Vol.2, page no: 459-464, Jan,2013 Dhananjya Gupta, Anju Bala
69 Autonomic Fault Tolerant Framework for Web Applications IJCST Vol. 4, Issue 2,pp: 528-533 April - June 2013 Dhananjya Gupta, Anju Bala
70 An Emerging approach towards Clone Detection: Metric based Approach on byte code. International Journal of Advance Research in Computer Science and Software Engineering, Vol 3, pp:881-888, May 2013 Kanika Raheja and Rajkumar Tekchandani
71 Evaluation of Flow Graph and Dependence Graphs for Program Representation International Journal of Computer Applications, Vol. 56, Issue.14, pp. 18-23, October 2012 Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh
72 Literature Analysis on Model based Slicing International Journal of Computer Applications, Vol. 70, Issue.16, pp. 45-51, May 2013 Rupinder Singh, Vinay Arora
73 Technique for Extracting Subpart from UML Sequence Diagram International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, pp. 593-596, June 2013 Rupinder Singh, Vinay Arora
74 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012. Ashutosh Mishra and Vinayak Srivastava
75 Extracting a knowledge from source code comprehension using data mining methods   Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012 Ashutosh Mishra and Vinayak Srivastava  
76 Intelligent Computing Methods for Software Maintenance: a Review   Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012 Ashutosh Mishra and Vinayak Srivastava
77 Data mining methods for     Program Comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. Ashutosh Mishra and Vinayak Srivastava  
78 Use of Semantic Relatedness for Intelligent Access to Cultural Information International Journal of Computer Applications, Volume 64 – No. 15, February 2013,                    pp. 21-28 Harkiran Kaur,          Dr. Seema Bawa
79 Creating Digital Archives of Ancient Scriptures using CAPTCHAs International Journal of Computer Applications, Volume 64 – No. 15, February 2013, pp. 29-37 Harkiran Kaur,          Dr. Seema Bawa