1 |
Proliferation of Social Computing: Cultural Computing Paradigm |
International Journal of Computer Applications, March 2016, 137 (9), 27-30. |
Sharma, S., Bawa, S. and Lomash, H |
2 |
QoS based Workload Design Patterns in Cloud Computing: A Literature Review |
International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). |
Sukhpal Singh and Inderveer Chana |
3 |
Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing |
I. J. Computer Network and Information Security, 2015, 11, 9-19 |
Chetan Chawla, and Inderveer Chana |
4 |
QoS based Machine Learning Algorithms for Clustering of Cloud Workloads: A Review |
International Journal of Cloud-Computing and Super-Computing, vol. 2, no. 2 (2015). |
Sukhpal Singh and Inderveer Chana |
5 |
Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks |
InJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Volume: 6 Issue:3 Page No. 54-72 Year: 2015 |
Vishal Sharma Rajesh Kumar |
6 |
Green WSN- Optimization of Energy Use Through Reduction in Communication Workload. |
CoRR abs/1506.04849 (2015) |
Vandana Jindal, A. K. Verma, Seema Bawa: |
7 |
Survey on Query Processing & Optimization Techniques in WSN |
International Journal of Computer Science and Information Security 14 (2), 54 |
V Jindal, AK Verma, S Bawa |
8 |
QoS Comparison of MANET Routing Protocols |
International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. |
T Bhatia, AK Verma |
9 |
A Survey to Automatic Summarization Techniques |
International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015. |
Sherry, Parteek Kumar |
10 |
Congestion Control Using Fuzzy Based LSPs in Multiprotocol Label Switching Networks |
International Journal in Foundations of Computer Science & Technology (IJFCST), ISSN:1839-7662, Vol. 6 (2), pp. 1-21, March, 2016 |
Sukhpal Singh and Inderveer ChanaAnju Bhandari and V. P. Singh |
11 |
Proposal and Implementation of MPLS Fuzzy Traffic Monitor |
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, 2016 |
Anju Bhandari and V. P. Singh |
12 |
Comparative Study of Type-1 Fuzzy Logic and Type-2 Fuzzy Logic |
International Journal of Computer Applications Volume 124 – No.16, August 2015, pp. 14-21 |
Neeru Lalka, Sushma Jain |
13 |
A Systematic Review on Energy Aware QoS Routing in Wireless Sensor Networks |
International Journal of Energy, Information and Communications Vol.6, Issue 5 (2015), pp.1-14 |
Sukhchandan Randhawa, Sushma Jain |
14 |
Video Search Engine Optimization Using Keyword and Feature Analysis |
Procedia Computer Science 58 ( 2015 ) 691 – 697, ScienceDirect, Elsevier |
Krishna Choudharia , Vinod K Bhalla |
15 |
Strucutal Modeling on PSiOS |
Innovative Research in Computer Science,E-learning information, 2015 |
Jay Patel , Ashish Aggarwal |
16 |
Various Approaches of Community Detection in Complex Networks: A Glance |
Journal of Information Technology and Computer Science, Vol. 8, PP.35-41,2016 |
Maninder Kaur,Abhay Mahajan |
17 |
An implementation of this-sensitive points-to analysis technique for finding the program slice in concurrent programs |
International Journal of Artificial Intelligence and Knowledge Discovery, Vol. 6, pp. 1-7, 2016 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
18 |
Techniques, Trends & Challenges For Localization In Vehicular Ad Hoc Networks |
Asian Journal of Mathematics and Computer Research, Vol. 9, Issue. 4, pp. 350-360. |
VDeepak Mehta, Sharad Saxena |
19 |
Study on Emotional Intelligence of Graduate Students of Art And Science And of Different Locale |
Journal of Basic and Applied Research Internatinal (JOBRAI), Vol. 17 , No. 4, pp 227-237. |
Shilpi Saxena, Sharad Saxena |
20 |
CPU mining Malware: Complete Analysis of Real World Virus |
International Journal of Research in Advent Technology,2015 |
Gautam, R., Kumar. S, & Bhattacharya, J |
21 |
Data Clustering Using Differential Search Algorithm |
Journal of Science and Technology. Vol. 24(2), pp. 295-306, 2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
22 |
Performance Study of Evolutionary Algorithms for Structure Stability Analysis of Aln (n = 2-22) |
Quantum Matter, American Scientific Publishers, 5(3):1-8, 2016. |
Y Pathak, K Sharma, K Singh and PS Rana |
23 |
Impact Analysis of Software Processes for SPI in Indian SMEs |
International Journal of Applied Engineering Research ISSN 0973-4562 ,Volume 11, Number 5 (2016) pp. 3004-3011. (Scopus Indexed). |
Singh, A. & Aggarwal, H. |
24 |
Ruling out key enablers for software process reengineering in Indian small and medium enterprises |
International Journal of Business and Process Management, Inderscience publishers (Scopus Indexed) |
Singh, A. & Aggarwal, H |
25 |
Non Oblivious Watermarking Technique for JPEG 2000 Compressed Images using Arnold Scrambling of Unequal Size Watermark Blocks. |
International Journal of Science and Engineering, Vol. 9, No.1, pp. 17-26,2015. |
Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia |
26 |
Singular Value Decomposition Based Steganography Technique for JPEG 2000 Compressed Images |
International Journal of Engineering, Vol. 28, N0.12, pp. 1720-1727, 2015. |
Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia |
27 |
Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain |
British Journal of Applied Science &Technology, Vol. 14, No.4, pp. 21-29, 2016. |
Geeta Kasana, Satvinder Singh Bhatia and Kulbir Singh. |
28 |
Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos |
International Journal of Science and Engineering, Vol. 10, No.1, pp. 21-29, 2016. |
Geeta Kasana,Kulbir Singh and Satvinder Singh Bhatia |
29 |
An Android Application for Mobile Customers using Speech Synthesis. |
International journal of Computer Applications. Volume: 145 number2, Page Nos:18-25, 2016 |
Keshav Rana, Rupinderdeep Kaur |
30 |
Implementation of Word Level Speech Recognition System for Punjabi Language |
International journal of Computer Applications. Volume: 146 number 3, Page Nos:12-17, 2016 |
Shama Mittal, Rupinderdeep Kaur |
31 |
Visualizing Class Diagram Using OrientDB Data-Store |
International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 6, 341-345, June 2016 |
Sawinder Kaur, Karamjit Kaur |
32 |
An Efficient Trust Management Algorithm in Wireless Sensor Network |
Emerging Research in Computing, Information, Communication and Applications, 10 May 2016, pp 281-287 |
Monia , Sukhchandan Randhawa, Sushma Jain |
33 |
Intensification of Resolution in the Realm of Digital Imaging |
Intensification of Resolution in the Realm of Digital Imaging |
Shivangi Jindal, and Harkiran Kaur |
34 |
A Novel Approach for Reduction of Dynamic Range Based on Hybrid Tone Mapping Operator |
Procedia Computer Science, 58, pp. 265-271, 2015 |
Himanshu Kasliwal, Shatrughan Modi |
35 |
PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks |
Journal of Internet Services and Information Security (JISIS), volume: 6, number: 1 (February 2016), pp. 47-56 |
Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, and Chuan-Hsien Mao |
36 |
Proliferation of Social Computing: Cultural Computing Paradigm |
International Journal of Computer Applications, 137 (9), 27-30. 2016 |
Seemu Sharma, Seema Bawa, Hitashi Lomash |