S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors |
---|---|---|---|
1. | An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata | The Computer Journal 10.1093/comjnl/bxu049doi, 2014 | Ajay Kumar and Anil Kumar Verma |
2. | Improvement in Rebalanced CRT RSA | International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5492, Impact Factor: 0.39 | Seema Verma Deepak garg;; |
3. | Selectivity Estimation of range queries in Data Streams using Micro-clustering | International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5856, Impact Factor: 0.39 | Sudhanshu Gupta; Deepak garg; |
4. | Who Regulates Ethics in Virtual world? | Science and engineering ethics Volume 21, no. 1 (2014): pp. 19-28. | Seemu Sharma;Hitashi Lomash; and Seema bawa |
5. | Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata using Partial Derivatives | Chiang Mai Journal of Science Volume 41(5), pp. 1409-1418, 2014 | Ajay Kumar; Anil Kumar Verma; |
6. | A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata | Applied Mathematics, Volume 8(1), pp. 95-105, 2014 | Ajay Kumar; Anil Kumar Verma; |
7. | Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations | Applied Mathematics, Volume 8(5), pp. 2389-2393, 2014 | Tannu Singla;Ajay Kumar;Sunita Garhwal; |
8. | A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs | WPC, Springer, Volume 77 pp. 2155-2182, 2014 | V Ranga;M Dave; and Anil verma |
9. | OANTALG: An Orientation based ANT colony ALGorithm for Mobile Adhoc Networks | WPC, Springer, Volume 77 pp. 1859-1884, 2014 | G SINGH;N KUMAR; Neeraj kumar and Anil verma |
10. | ANTALG: An Innovative ACO based Routing Algorithm for MANETs | JNCA, Volume 45 151-167, 2014 | G SINGH;N KUMAR; Neeraj kumar and Anil verma |
11. | Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem | International Arab Journal of Information Technology Volume 11 No 5, 2014 | Rattan Rana; and Deepak garg |
12. | Cloud based intelligent system for delivering health care as a service | Computer Methods and Programs in Biomedicine, Springer, Volume 113, pp. 346-359, 2014 | Pankajdeep Kaur; and Inderveer Chana |
13. | A resource elasticity framework for QoS-aware execution of cloud applications | FGCS, Volume 37, pp. 14-35, 2014 | Pankajdeep Kaur; and Inderveer Chana |
14. | Variable Threshold Based Hierarchical Load Balancing Technique in Grid | Engineering with computers, springer, Volume 30, 2014 | Neeraj Rathore; and Inderveer Chana |
15. | Artificial bee colony based energy-aware resource utilization technique for cloud computing | CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,, Volume 24, DOI: 10.1002/cpe.3295, 2014 | Nidhi Jain Kansal; and Inderveer Chana |
16. | Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing | Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 21-35, 2014 | Neeraj Rathore; and Inderveer Chana |
17. | SHAPEâ¿¿an approach for self-healing and self-protection in complex distributed networks | The Journal of Supercomputing, Volume 67, pp. 585-613, 2014 | Inderpreet Chopra; and Maninder singh |
18. | Software clone detection: a systematic review | Information and Software technology, Volume 55, pp. 1165-1199, 2014 | D Rattan;R Bhatia; and Maninder singh |
19. | Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing | Frontiers of Computer Science, Volume 8:04, pp. 656-666, 2014 | Shi W., Gong P., Zhang Z.; and Neeraj kumar |
20. | Learning Automata Based Opportunistic Data Aggregation and Forwarding Scheme for Alert Generation in Vehicular Ad Hoc Networks | Computer Communications, Volume 39:01:00, pp. 22-32, 2014 | Chilamkurti N., Rodrigues J.J.P.C.; and Neeraj kumar |
21. | A two factor authentication scheme for Roaming Service in Global Mobility Networks | IEEE Transactions on consumer Electronics, Volume 59:04:00, pp. 811-817 | He D.B., Khan M.K., Lee J.K.; and Neeraj kumar |
22. | An efficient Password based Three party Authenticated Multiple Key Exchange Protocol for Wireless Networks | The Journal of Supercomputing, Volume 70:01:00, pp. 224-235, 2014 | ;TIET H, He D, Kim J.; and Neeraj kumar |
23. | A Peer-to-Peer Cooperative Caching Scheme for Data Dissemination in Urban Scenarios Using Vehicular Ad Hoc Networks | IEEE Systems Journal, Volume 8:04, pp. 1136-1144, 2014 | Lee H. J.; and Neeraj kumar |
24. | EEMHR: Energy Efficient Multi-levels Heterogeneous Routing Protocol for Wireless Sensor Networks | International Journal of Communication Systems Volume 27:09:00 pp. 1289-1318, 2014 | Tanwar S;Niu J.; and Neeraj kumar |
25. | Detection and Analysis of Secure Intelligent Universal Designated Verifier Signature Scheme for Electronic Voting System | The Journal of Supercomputing Volume 70:01:00 pp. 177-199, 2014 | Zho L;Tu Hang;Singh A;Chilamkurti N;Rho S; and Neeraj kumar |
26. | Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol | Journal of Medical Systems Volume 38:116, 2014 | He D;Chilamkurti N;Lee J.H.; and Neeraj kumar |
27. | LA-EEHSC: Learning Automata based Energy Efficient Heterogeneous Selective Clustering for Wireless Sensor Networks | Journal of Networks and Computer Applications Volume 46:11:00 pp. 264-279, 2014 | ;Tyagi S;Deng D.J.; and Neeraj kumar |
28. | ANTALG: An Innovative ACO based Routing Algorithm for MANETs | Journal of Networks and Computer Applications Volume 45 pp. 151-167, 2014 | Singh G, Verma A.K.; and Neeraj kumar |
29. | Collaborative Trust aware Intrusion Detection in VANETs | Computers and Electrical Engineering Volume 40:06:00 pp. 1981-1996, 2014 | Chilamkurti N; and Neeraj kumar |
30. | Achieving QoS using Resource Allocation and Adaptive Scheduling in Cloud Computing with Support from Grid | The Computer Journal Volume 57:02:00 pp. 281-290, 2014 | Chilamkurti N., Zeadally S., Jeong Y.S.; and Neeraj kumar |
31. | OANTALG: Orientation based ant colony algorithm for MANETs | Wireless Personal Communications Volume 77:03:00 pp. 1859-1884, 2014 | Singh G, Verma A.K.; and Neeraj kumar |
32. | Enhanced Three-factor Security Protocol for USB Consumer Storage Devices | IEEE Transactions on consumer Electronics Volume 60:01:00 pp. 30-37, 2014 | He D., Khan M.K., Lee J.H; and Neeraj kumar |
33. | Bayesian Coalition Game for Contention-aware Reliable Data Forwarding in Vehicular Mobile Cloud | Future Generation Computer Systems :10.1016/j.future.2014.10.013, 2014 | Iqbal R, Misra S.,Rodrgues J.J.P.C.; and Neeraj kumar |
34. | Networks of learning automata for the vehicular environment: a performance analysis study | IEEE Wireless Communication Volume 21:06 pp. 41-47, 2014 | Misra S, Obaidat M.S., Rodrigues J.J.P.C., Pati B; and Neeraj kumar |
35. | An intelligent approach for building a secure decentralized public key infrastructure in VANET | Journal of Computer and System Sciences 10.1016/j.jcss.2014.12.016, 2014 | Iqbal R, Misra S.,Rodrigues J.J.P.C.; and Neeraj kumar |
36. | Power Consumption Based Simulation Model for Mobile Ad-hoc Network | J. Wireless Personal communications Volume 77 pp. 1437-1448, 2014 | Krishan Kumar; and Vp singh |
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Impact Factor |
---|---|---|---|---|
1 | A Novel Hierarchical Technique for Offline Handwritten Gurmukhi Character Recognition | Nat Acad Sci Letters 37(6) 567-72 2014 | Munish Kumar; M K Jindal; R K Sharma | 0.24 |
2 | A Novel Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition | IETE Journal of Research 59(6) 687-92 2013 | Munish Kumar; M K Jindal; R K Sharma | 0.189 |
3 | Efficient Feature Extraction Techniques for Offline Handwritten Gurmukhi Character Recognition | National Academy Science Letters 7(4) 381-91 2014 0.24 | Munish Kumar; M K Jindal; R K Sharma | 0.189 |
4 | QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks | Mobile Network and Applications, | Amit Dua, Neeraj Kumar, Seema Bawa | 1.04 |
5 | Web presence of Indian Digital Culture | Preservation, Digital Technology & Culture (PDTC), 2015, 44(2), De Gruyter Saur, pp 62- 68. Springer | Seemu Sharma, Hitashi Lomash, Seema Bawa | 0.963 |
6 | A Survey on Zero-Day Polymorphic Worm Detection Techniques | IEEE Communications Surveys & Tutorials, Vol.16, Issue:3, pp:1520-1549, 2014 | Ratinder Kaur, Maninder Singh | 6.94 |
7 | Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection | Neural Computing and Applications, Springer, Vol. 26, Issue:1, pp: 117-130 | Amit Kumar Bhardwaj Maninder Singh | 1.56 |
8 | An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach | Software: Practice And Experience DOI: 10.1002/spe.2263 (2014). | Manoj Kumar, Arun Sharma, Rajesh Kumar | 0.9 |
9 | A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks | Journal of intelligent and Robotic Systems,Volume 77, Issue 3-4, pp 629-652, | Vishal Sharma, Rajesh Kumar | 1.0 |
10 | Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET | Scientific World Journal, Vol 2014, 12 pages, 2014. dx.doi.org/10.1155/2014/136365 | Tulika Pandey, Deepak Garg, MM Gore | 1.7 |
11 | Hybrid Approach using SVM and MM2 in Splice Site Junction Identification | Current Bioinformatics Vol. 9, No. 1,pp. 76-85, Bentham Science, 2014 | Srabanti Maji, Deepak Garg | 2.017 |
12 | Intelligent text classification system based on self-administered ontology | Turkish Journal Of Electrical Engineering & Computer Sciences, Faith University, Turkey, 10.3906/elk-1305-112 Vol. 23, Issue 2015,pp. 1393-1404 | Manoj Manuja, Deepak Garg | 0.568 |
13 | A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks | Information Sciences, 321, 263-277 2015 | Debiao He, Neeraj Kumar, Naveen K. Chilamkurti | 4.038 |
14 | A systematic review on heterogeneous routing protocols for wireless sensor network | Network and Computer Applications, 53, 39-56, 2015 | Sudeep Tanwar, Neeraj Kumar, Joel J. P. C. Rodrigues | 2.229 |
15 | Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. | Multimedia Systems, 21, 49-60, 2015 | Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeojeong | 0.619 |
16 | An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks | Mobile Networks and Applications, 20, 181-200, 2015 | Amit Dua, Neeraj Kumar, Seema Bawa, Joel J. P. C. Rodrigues | 1.045 |
17 | Load Balancing and Job Migration Algorithm : Survey of Recent Trends | Wireless Personal Communication, Volume 79, Issue 3, ISSN print 0929-6212, ISSN online 1572-834X, pp: 2089–2125 | Neeraj Kumar Rathore and Inderveer Chana, | 0.979 |
18 | A Novel Strategy for Automatic Test Data Generation Strategy using Soft Computing Technique | Frontiers of Computer Science, Springer, Sep 2014 | Priyanka Chawla, Inderveer Chana, Ajay Rana | 0.405 |
19 | QRSF: QoS-aware resource scheduling framework in cloud computing | The Journal of Supercomputing, Vol. 71, no. 1, pp: 241-292, 2015. | Singh, Sukhpal, and Inderveer Chana | 0.841 |
20 | Intelligent failure prediction models for scientific workflows | Expert Systems with Applications 42, no. 3 (2015): 980-989 | Bala, Anju, and Inderveer Chana | 1.92 |
21 | A hyper-heuristic approach for resource provisioning-based scheduling in grid environment | The Journal of Supercomputing, Springer, 20 January, 2015 | Rajni Aron, Inderveer Chana and Ajith Abraham | 0.841 |
22 | Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing | Concurrent Engineering: Research and Applications, , Volume 22, Issue 4, Pages 1–13 Sage Publishers | Bala, Anju, and Inderveer Chana | 0.531 |
23 | A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography QoS Constraints. | Multimedia Tools Appl.74, 3477-3488, 2015 | Zezhong Zhang, Qingqing Qi, Neeraj Kumar, Naveen Chilamkurti, Hwa-Young Karamjit Kaur, Rinkle Rani | 1.346 |
24 | A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. | Multimedia Tools Appl.74, 3477-3488, 2015 | Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo | 1.346 |
25 | On the security of a certificateless online/offline signcryption for Internet of Things. | Peer-to-Peer Networking and Applications 8, 881-885, 2015 | Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen Chilamkurti, Hangbae Chang | 0.632 |
26 | An improved authentication protocol for session initiation protocol using smart card. | Peer-to-Peer Networking and Applications 8, 881-885, 2015 | Hang Tu, Neeraj Kumar, Naveen Chilamkurti, Seungmin Rho | 0.632 |
27 | Secure pseudonym-based near field communication protocol for the consumer internet of things. | IEEE Trans. Consumer Electronics 61,56-62, 2015 | Debiao He, Neeraj Kumar, Jong-Hyouk Lee | 1.045 |
28 | Critical applications in vehicular ad hoc/sensor networks. | Telecommunication Systems 58, 275-277, 2015 | Neeraj Kumar, Al-Sakib Khan Pathan, Elias Procópio Duarte Jr., Riaz Ahmed Shaikh | 0.705 |
29 | Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints. | IEEE Systems Journal 9, 675-685, 2015 | Neeraj Kumar, Jong-Hyouk Lee | 1.980 |
30 | Managing Data in healthcare information systems: many models, one solution | IEEE Computer , Vol. 48, No. 3, pp 52-59, 2015 | Karamjit Kaur, Rinkle Rani | 1.44 |
31 | An Efficient Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks | Discrete Mathematics & Theoretical Computer Science, Vol 17, No 1 (2015), pp. 317–338 | Avleen Kaur, Shalini Batra | 0.38 |
32 | Protein structure prediction (RMSD ≤ 5 Å) using machine learning models | Int. J. Data Mining and Bioinformatics, 2015, [In Press] | Y Pathak, PS Rana, PK Singh and M Saraswat | 0.66 |
33 | Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm | IETE Journal of Research, Vol. 61, pp. 22-31, 2015 | Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar | 0.185 |
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors | Impact Factor |
---|---|---|---|---|
1 | An Analysis of Identity-Based Ring Signcryption Schemes for Wireless Sensor Networks | International Information Institute Journal (SCIE-Indexed) | Gaurav Sharma, Anil K. Verma | 0.25 |
2 | Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks. | IJAHUC 12(1): 3-13 (2013). | N. Kumar, N.Chilamkurti, J.H. Park, D.S. Park | 0.65 |
3 | A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks | J. Network and Computer Applications 36(2): 623-645 (2013). | S.Tyagi, N. Kumar | 1.7 |
4 | UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks | Mathematical and Computer Modelling 57(11-12): 2750-2763 (2013). | N. Kumar, N. Chilamkurti, J.H. Lee | 2.02 |
5 | Quantum Neural Network based Machine Translator for Hindi to English | The Scientific World Journal Volume 2014 (2014), Article ID 485737, 8 pages http://dx.doi.org/10.1155/2014/485737 | Ravi Narayan, V P Singh and Snehashish Chakraverty |