Year 2014-15 (Non-SCI)

List of research publications in Non-SCI/Non-Impact journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Energy Efficient and High Performance Scheduling Algorithm for Grid Computing. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 3, no. 3 (2014): 179-188. Jain, Nidhi, and Inderveer Chana
2 Energy based Efficient Resource Scheduling: A Step Towards Green Computing International Journal of Energy, Information and Communications Vol.5, Issue 2 (2014), pp.35-52 Sukhpal Singh and Inderveer Chana
3 Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN) International Journal of Computer Applications (IJCA), vol. 92, no. 5, pp. 46-50, 2014 Ashima Singh and Gurpreet Bedi
4 Development of Component Repository, 3, 2014 AshimaSingh and Amandeep Bakshi
5 DNA Based Cryptography: A Review, International J. Information and Computational Technology, Volume 4, Number 7, pp. 693-698, 2014 Ashish Kumar; and Anil verma
6 A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata 8 pp. 95-105, 2014 A Kumar; and Anil verma
7 Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing 4 pp. 997-1001, 2014 Anju Bala and Inderveer Chana
8 Challenges of Sentiment Analysis and Existing state of art 1, 2014 Sujata Rani ; and Parteek kumar
9 Detection of potential clones from software using metrics 4 pp. 964-969, 2014 Geetika Bansal; and Rajkumar Tekchandani
10 Comparison of KNN and Slope one Algorithm in Sparse Enviornment 4, 2014 Abhishek Kaleroun; and Shalini Batra
11 A review of ranking approaches for semantic search on Web 50 pp. 416-425, 2014 Vikas Jindal;Seema Bawa;
12 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 99 pp. 17-23, 2014 sushma jain and Supriya Singla
13 Buffer OverFlow : Proof Of Concept Implementation 2 pp. 1201-1204, 2014 sushma jain and Pooja Rani
14 Quantum Neural Network based Machine Translator for Hindi to English 8, 2014 Ravi Narayan;Snehashish Chakraverty; and Vp singh
15 A Survey Paper on Web Page Change Detection 2 pp. 241-245, 2014 Vishnu Goel ; and Vinay arora
16 A novel approach for automatic test sequence generation for Java fork/join from activity diagram IEEE Advanced Communication Control and Computing Technologies pp. 1611-1615, 2014 Vipin Verma; and Vinay arora
17 Test sequence generation for Java7 fork/join using interference dependence 2, 2014 Vipin Verma ; and Vinay arora
18. Analysis of Search Engine Optimization (SEO) Techniques International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), pp. 563-566, 2015 Gurpreet Singh Bedi and Ms. Ashima Singh  
19    A Non-Interactive Certificateless Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks International Journal of Ad Hoc and Ubiquitous Computing, 2015 [Accepted In press] Suman Bala and Anil Verma
20    Word Sense Disambiguation for Punjabi Language Using Overlap Based Approach Advances in Intelligent Informatics, pp. 607-619. Springer International Publishing, 2015. Rana, Preeti and Parteek Kumar
21    P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network Intelligent Distributed Computing, 321, 43-54, 2015. Amrindeerpreet Singh and shalini batra
22    Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks Intelligent Distributed Computing  (Book title Advances in Intelligent Systems and Computing), 321, 185-198,  2015. Kriti Chadha, Sushma Jain
23    Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges Book Chapter titled, “Quality of Service and Service Level Agreements for Cloud Environments: Issues and Challenges” in the book:. Challenges, Limitations and R&D Solutions, 2014, Springer, pp. 51-72. Inderveer Chana and Sukhpal Singh

 
 

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1 Modified Single Pass Clustering with Variable Threshold Approach International Journal of Innovative Computing, Information and Control 11(1), 375-86, 2014 Mamta Mittal; V P Singh; R K Sharma
2 Validation of k-means and threshold based clustering methods International Journal of Advancements in Technology, 5(2), 153-60, 2014 Mamta Mittal; VP Singh; R K Sharma
3 Predicting gender using IRIS images Res Journal of Recent Sciences 3(4), 20-26, 2014 Atul Bansal; R Agarwal; R K Sharma
4 Regression models for the prediction of compressive strength of concrete with and without fly ash International Journal of Latest Trends in Engg and Tech, 3(4), 400-6, 2014 Palika Chopra; Maneek Kumar; R K Sharma
5 Predicting compressive strength of concrete for varying workability using regression models International Journal of Engg and Applied Sciences, 6(4), 10-22, 2014 Palika Chopra; Maneek Kumar; R K Sharma
6 Segmentation of isolated and touching characters in offline handwritten Gurmukhi script documents International Journal of Information Tech and Comp Science, 2, 58-63, 2014 Munish Kumar; M K Jindal; R K Sharma
7 A Query-Context oriented Approach to Semantic Search on Web International Journal of Artificial Intelligence and Knowledge Discovery Vol.5, Issue 1, Jan 2015. Vikas Jindal, Seema Bawa, Shalini Batra
8 Web presence of Indian Digital Culture Digital Technology and Culture, June 2015, De Gruyter Seemu Sharma, Hitashi Lomash, Seema Bawa
9 An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks Mobile Netw Appl (2015) 20:181–200 DOI 10.1007/s11036-015-0588-1, Published online: 18 March 2015 © Springer Science+Business Media New York 2015. Amit Dua, Neeraj Kumar, Seema Bawa
10 Service-Oriented Middleware for Multi-UAV Guided Ad Hoc Networks IT Convergence Practice, 2(3), pp. 24-33, 2014. Vishal Sharma Rajesh Kumar
11 A Secure Opportunistic service dissemination over Flying Ad Hoc Networks. ACM security Symposium , IIT Delhi Feb. 2015 Vishal Sharma Rajesh Kumar
12 Feasibility of Public Key Cryptography in Wireless Sensor Networks. International Journal of Theoretical Physics and Cryptography, Vol. 7, 2014 Mandal Murari, Gaurav Sharma, Suman Bala, and Anil K. Verma.
13 Modified Single Pass Clustering with Variable Threshold Approach International Journal of Innovative Computing, Information and Control, pg375-386, 11(1), 2015 Mamta Mittal, R.K.Sharma and V. P. Singh
14 A Constraint Guided Progressive Sequential Mining Waterfall Model for CRM CIT Journal of Computing and Information Technology, pp. 45-55 Vol 22 2014 Bhawna Mallick, Deepak Garg, P S Grover
15 Recommender System using Collaborative Filtering and Demographic Characteristics of Users International Journal of Recent and Innovative Trends in Computing and Communication (IJRITCC) ISSN 2321-8169 Shano Solanki and Shalini Batra
16 Data Mining – Techniques, Methods and Algorithms: A Review on Tools and their Validity International Journal of Computer Applications, Vol. 113, No. 18, pp. 22-29, March 2015(Impact factor 0.715). Mansi Gera, Shivani Goel
17 Image Super Resolution using Fusion of Images International Journal of Image and Data Fusion, Vol. 6, pp. 1-11, 2015 DOI:10.1080/19479832.2015.1046954 Chirag Garg, Singara Singh Kasana
18 Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 Tannu Singla, Ajay Kumar, Sunita Garhwal
19 A Cuckoo Search based Approach for solving Standard Cell Placement Problem Journal of VLSI Design Tools & Technology,4,1-7,2014Maninder Kaur, Amanpreet Singh Maninder Kaur, Amanpreet Singh
20 Recognition of Multi-Stroke Based Online Handwritten Gurmukhi Aksharas Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, Springer, 2015, 85, 159-168 Kumar, R.; Sharma, R. K. & Sharma, A.
21 Enhancement of Compatibility and Performance of Component Based Softwares by Deactivating Non-Participating / Non-Functional Components European Journal of engineering and technology Jasneet Chawla and Ashima Singh
22 Cost reduction techniques of CBSE Software while retaining high performance International Journal of Business Management and Scientific Research Neeraj Gupta and Ashima Singh
23 A Survey on Regression Test Techniques of Component-Based Softwares International Journal of Advanced Research in Computer Science and Software Engineering . Jasneet Chawla and Ashima Singh
24 Scrutinize: Fault Monitoring for Preventing System Failure in Cloud Computing International Journal of Innovations & Advancement in Computer Science IJIACS,PP: 211-219, Volume 4, 2015. Anu and Anju Bala
25 Fault Tolerance Against Crash Failures of Name Nodes of Hadoop By Using Load balancing Techniques International Journal of Engineering Research and Technology, Volume 8, 2015 Rajeev Kapoor, Ms. Anju Bala
26 A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. Computer Fraud & Security, 2015(2), 10-16. Sanmeet Kaur, & Maninder Singh
27 Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Appl. Math. Inf. Sci., 8(5) 2389-2393, 2014 Tannu Singla, Ajay Kumar, Sunita Garhwal
28 Video compression using steganographic Techniques International Journal of Innovations & Advancement in Computer Science , Vol. 4,40-46, May 2015. Sachin Meena and Jhilik Bhattacharya
29 HCI System for Windows Application International Journal of Innovations & Advancement in Computer Science , Vol. 4,47-53, May 2015 Kapil Yadav and Jhilik Bhattacharya
30 Differential Search for Multiobjective Problems Procedia Computer Science, Vol. 48, pp. 22-28, 2015 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
31 Comparative Analysis of MySQL and MongoDB : A Case Study of Hospital Management System International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1515-1526. Dhulfiqar Hazim, Karamjit Kaur
32 Comparative analysis of ECC and RSA for Document-oriented database MongoDB International Journal of Computer Technology and Applications, Volume 5 Issue 4, July-August 2014, pp. no. 1555-1560. Saurabh Singh, Karamjit Kaur
33 Steganography Technique for JPEG2000 Compressed Images using Histogram in Wavelet Domain International Journal of Security and its Applications, Vol 8, Issue 6, pp. 211-224, 2014.(Scopus indexed) Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
34 Energy Efficient Load Balanced Multipath Routing in MANET International Journal Of Engineering And Computer Science, vol. 4, pp. 12557-12562, 2015. Simranjeet Kaur, Suveg Moudgil, Tarunpreet Bhatia
35 Simulation Analysis of MANET Routing Protocols under Different Mobility Models International Journal of Wireless Communications and Network Technologies, vol. 4, pp. 1-8, 2015. Munish Sharma, Manish Kansal, Tarunpreet Bhatia