Year 2013-14 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals    

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
            1 Extracting a knowledge from source code comprehension using data mining methods Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012   A. Mishra and V. Srivastava
            2 Conceptual and Semantic measures for cohesion in Software Maintenance International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012 A. Mishra and V. Srivastava
           3 Intelligent Computing Methods for Software Maintenance: a Review Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012. A. Mishra and V. Srivastava
            4 Data mining methods for program comprehension International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. A. Mishra and V. Srivastava
            5 Security Issues in Manet: A Survey on Attacks and Defense Mechanisms.     International Journal of Advanced Research in Computer Science and Software Engineering, 3 (6), June 2013, pp. 1382-1394 Tarunpreet Bhatia, A.K. Verma    

 

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors
1 Resource Scheduling Techniques in Utility Computing- A Survey International Journal of Systems and Service-Oriented Engineering (IJSSOE), (Accepted on 20th December, 2013). Inderveer Chana, Tarandeep Kaur
2 Cloud Computing standardization initiatives: State of Play International Journal of Cloud Computing and Services Science (IJ-CLOSER),Vol 2, no 5, Dec 2013   Rajinder Sandhu, Inderveer Chana
3 Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems, UACEE International Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765], Publication Date : 09 September 2013, pp109-114 Taranpreet Kaur and Inderveer Chana  
4 Survey of Load Balancing Technique International journal of scientific and innovative technology, vol-1, issue-1,2013 Neeraj Kumar Rathore and Dr. Inderveer Chana
5 Securing Virtual machines in Cloud Environment using OVF UACEE International      Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765],Publication Date : 09 September 2013, pp7-11 Rajinder Sandhu and Inderveer Chana
6 Report on Hierarchal Load Balancing Technique in Grid Environment” International journal of Scientific and Innovative Technology, i-manager’s Journal on Information Technology, Vol. 2, No. 4, ISSN Print: 2277-5110 , ISSN Online: 2277-5250, pp-21-35, Sep - Nov 2013 Neeraj Kumar Rathore and Inderveer Chana
7  Grid Scheduling Heuristic methods : State-of-the-Art International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6, 2014 Rajni Aron, Inderveer Chana  
8 Network Security & Ethical Hacking Against Cyber Crime International journal of scientific and innovative technology, vol-1, issue-1, 2013   Neeraj Kumar Rathore and Dr. Inderveer Chana  
9 Introducing Agility in Cloud Based Software Development through ASD International Journal of  u- and e- Service, Science and Technology, Vol.6, No.5 (2013), pp.191-202 Sukhpal Singh, Inderveer  Chana
10 A secure and energy efficient data dissemination protocol for wireless sensor networks International journal of network security, Vol. 15, Issue 6, pp. 490-500,  2013 N. Kumar, M. Kumar, R. B. Patel
11  A survey of approaches to secure vehicular networks with identity based cryptography International journal of advanced engineering and computing technologies. special edition of December 2013. ISSN 2249-4928 Avleen kaur Malhi, Shalini Batra
12 Comparison of KNN and Slope one Algorithm in Sparse Environment International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4 Issue 4, April 2014 A. Kaleroun and S. Batra
13 A short survey of Advantages and Applications of Skip Graphs International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, Nov., 2013 Amritpal Singh, Shalini Batra
14 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 International Journal of Computer Applications (IJCA), 99(14):17-23 Supriya Singla and  Sushma Jain
15 Does Porfolio Mix Influence the Mutual Fund Performance? Asia-Pacific Journal of Management Research and Innovation, Vol No. 9 Issue No. 4, December 2013 Nidhi Walia, Ravinder Kumar
16 Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN)    International Journal of Computer  Applications (IJCA), vol. 92, no. 5, pp. 46-50, April 2014. Published by Foundation of Computer Science, New York, USA. Gurpreet Singh Bedi, Ashima Singh
17 Analysis of Search Engine Optimization (SEO) Techniques International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol.4, issue 3, pp. 563-566, 2014. Gurpreet Singh Bedi, Ashima Singh
18 Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing   International Journal of Information & Computation Technology (IJICT), ISSN 0974-2239 Vol. 4, No. 10, pp. 997-1002, 2014 M. M. Sharma and A. Bala
19 Test sequence generation for Java7 fork/join using interference dependence Journal on Today’s Ideas – Tomorrow’s Technologies, Vol. 2, Issue. 1, 2014 Vipin Verma and Vinay Arora
20 A Survey Paper on Web Page Change Detection Engineering Sciences – International research journal, Vol.2, pp. 241-245, 2014 Vishnu Goel and Vinay Arora
21 WSN Routing Challenges : A Methodological Analysis International Journal of Advanced Research in Computer Engineering & Technology. Vol.3, Issue 3, March 2014. Sukhchandan Randhawa
22 Simulation and Comparative Analysis of Single Path and Multipath Routing Protocol for MANET. Anveshanam - The Journal Of Computer Science & Applications, 2(1), August 2013, pp. 30-35. Tarunpreet Bhatia, A.K. Verma
23 Performance Evaluation of AODV under Blackhole Attack International Journal Computer Network and Information Security, 5 (2), 2013, pp 35-44. Tarunpreet Bhatia, A.K. Verma