1 |
Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi |
Neural Computing and Applications, 27(3), 2016 |
Karun Verma, R. K. Sharma |
1.492 |
2 |
An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition |
Journal of Engineering Research, 4(1), 1-20, 2016 |
Teena Mitaal, R. K. Sharma |
0.128 |
3 |
Quantitative Reduction in Communication Load for Energy Efficiency in WSN |
Wireless Personal Communications (WPC), Vol. 83, Number (4), August (II) 2015, pp.1-16. |
Vandana Jindal, A.K. Verma, Seema Bawa |
0.693 |
4 |
QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks |
Mobile Network and Applications, December 2015, Volume 20, Issue 6, pp 773–780 |
Amit Dua, Neeraj Kumar, Seema Bawa |
1.045 |
5 |
Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud |
International Journal of Next-Generation Computing, Vol. 6, No. 3, November 2015 |
Lohit Kapoor, Seema Bawa, Ankur Gupta |
0.3 |
6 |
Green Service Level Agreement (GSLA) Framework for Cloud Computing |
Computing, Springer, Volume 98, Issue 9, pp 949–963 |
Goyal, S. ; Bawa, S. ; Singh, B |
0.872 |
7 |
Comparative analysis of cloud data integrity auditing protocols, |
Journal of Network and Computer Applications, Elsevier, Vol. 66 Issue C, May 2016, pp 17-32. |
Neenu Garg, Seema Bawa |
2.331 |
8 |
Energy optimized resource scheduling algorithm for private cloud computing |
International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 23, Issue 1-2, 2016. |
S. Goyal, S. Bawa and B. Singh |
0.493 |
9 |
Detecting And Containing Malicious Services In An Intercloud Environment |
Journal of Web Engineering, Vol. 15, No.5&6 (Apr 2016), pp: 521-538. |
Lohit Kapoor, Seema Bawa, Ankur Gupta |
0.39 |
10 |
Q-aware: Quality of Service based Cloud Resource Provisioning |
Computers & Electrical Engineering Journal, Elsevier, October 2015, Vol. 47, Pages 138–160 |
Sukhpal Singh and Inderveer Chana |
0.817 |
11 |
Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy |
ACM Computing Surveys (CSUR) Volume 48 Issue 2, February 2016 Article No. 22 |
Tarandeep Kaur and Inderveer Chana |
3.73 |
12 |
EARTH- Energy- aware Autonomic Resource Scheduling in Cloud Computing |
Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 |
Sukhpal Singh and Inderveer Chana |
1.812 |
13 |
QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review |
ACM Computing Surveys (CSUR) Volume 48 Issue 3, Article No. 42 |
Sukhpal Singh and Inderveer Chana |
3.73 |
14 |
Prediction-based proactive load balancing approach through VM migration |
Engineering with Computers, Springer, pp. 581-592 , January 2016 |
Anju Bala, Inderveer Chana |
1.451 |
15 |
Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach |
Journal of Grid Computing, Springer, June 2016, Volume 14, Issue 2, pp. 327–345 2016, |
Nidhi Jain Kansal, Inderveer Chana |
1.507 |
16 |
Energy aware scheduling of deadline-constrained tasks in cloud computing |
Journal of Cluster Computing,June 2016, Volume 19, Issue 2, pp 679–698 |
Tarandeep Kaur and Inderveer Chana |
1.5 |
17 |
Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks |
International Journal of Communication Systems DOI: 10.1002/dac.3144 Year: 2016 |
Vishal Sharma, Rajesh Kumar |
1.099 |
18 |
Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks |
IMobile Information Systems Volume: 2016 Year: 2016 |
Vishal Sharma, Mehdi Bennis, Rajesh Kumar |
0.872 |
19 |
UAV Assisted Capacity Enhancement In Heterogenous Networks |
IEEE Communications Letters Year: 2016 Volume: 20 Issue: 6 Pages: 1207 - 1210 |
VVishal Sharma, Mehdi Bennis, Rajesh Kumar |
1.291 |
20 |
Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs |
IIEEE Communications Letters Year: 2016 Volume: 19 Issue: 11 Pages: 2013 – 2016 |
Vishal Sharma, Rajesh Kumar, Prashant Singh |
1.291 |
21 |
SERVmegh: framework for green cloud |
Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3903 |
Ashok Kumar, Anju Sharma, Rajesh Kumar |
0.942 |
22 |
Strategies For Replica Consistency In Data Grid – A Comprehensive Survey |
Concurrency and Computation: Practice and Experience Year: 2016 DOI: 10.1002/cpe.3907 |
Priyanka Vashisht, Anju Sharma, Rajesh Kumar |
0.942 |
23 |
Pairing-Free CertificateLess Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor networks |
Wireless Personal Communications, Vol. 84, Issue 2, pp. 1469-1485, Springer |
Gaurav Sharma, Suman Bala, Anil K. Verma |
0.65 |
24 |
PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks |
Wireless Personal Communications, April 2016, Volume 87, Issue 3, pp 995–1012 Springer |
AGaurav Sharma, Suman Bala, Anil K. Verma |
0.65 |
25 |
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks |
International Journal of Ad Hoc and Ubiquitous Computing, Inderscience, Vol. 21, issue 2, pp. 140–155, March, 2016 |
Suman Bala, Anil K. Verma |
0.69 |
26 |
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. |
Wireless Personal Communications: 1-21 Vol. 89 No.2 |
Goyal, Nitin, Mayank Dave, and Anil Kumar Verma |
0.65 |
27 |
Relay node placement to heal partitioned wireless sensor networks |
Computers & Electrical Engineering 48, 371-388 |
V Ranga, M Dave, AK Verma |
1.1 |
28 |
Node stability aware single node failure recovery approach for WSANS |
MJCS Vol. 29, No. 2, 2016 |
V Ranga, M Dave, AK Verma |
0.4 |
29 |
A Novel Resource Reservation Scheme for Mobile PHEVs in V2G Environment using Game Theoretical Approach |
IEEE Transactions on Vehicular Technology, vol. 64, pp. 5653-5666, Dec. 2015 |
Kuljeet Kaur, Amit Dua, Anish Jindal, Neeraj Kumar, Mukesh Singh, Alexy Vinel |
2.243 |
30 |
An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing |
Cluster Computing, vol. 18, pp. 1263–1283, Sept. 2015 |
Neeraj Kumar, Jaskaran Preet Singh, Rasmeet S. Bali, Sudip Misra, Sana Ullah |
1.514 |
31 |
Cooperation strategies for vehicular delay-tolerant networks |
IEEE Communications Magazine, vol. 53, pp. 88-94, Dec. 2015 |
Joao A. F. F. Dias, Joel J. P. C. Rodrigues, Neeraj Kumar, Kashif Saleem |
5.125 |
32 |
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks |
Information Sciences, vol. 321, pp. 263-277, Nov. 2015 |
Debiao He, Neeraj Kumar, Naveen Chilamkurti |
3.364 |
33 |
A systematic review on heterogeneous routing protocols for wireless sensor network |
Journal of Network and Computer Applications, vol. 53, pp. 39-56, July 2015 |
Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues |
2.331 |
34 |
Reliable multicast as a Bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata-based approach |
International Journal of Ad Hoc and Ubiquitous Computing, vol. 19, pp. 168-182, 2015 |
Neeraj Kumar, Chun-Cheng Lin |
0.5 |
35 |
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments |
Multimedia Tools and Applications, vol. 74, pp. 6365-6377, Aug. 2015 |
Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo |
1.331 |
36 |
Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network |
Pervasive and Mobile Computing, vol. 22, pp. 90-112, Sept. 2015 |
Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Joel J.P.C. Rodrigues |
1.719 |
37 |
Efficient provably secure password-based explicit authenticated key agreement |
Pervasive and Mobile Computing, vol. 24, pp. 50-60, Dec. 2015 |
Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee |
1.719 |
38 |
Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks |
IEEE Systems Journal, vol. 9, pp. 1081-1090, Aug. 2015 |
Neeraj Kumar, Sudip Misra, Mohammad S. Obaidat |
2.114 |
39 |
QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks |
IEEE Transactions on Industrial Electronics, vol. 62, pp. 7892-7900, Dec. 2015 |
Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues |
6.383 |
40 |
Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems |
The Journal of Supercomputing, vol. 71, pp. 3258-3287, Sept. 2015 |
Neeraj Kumar, Rasmeet Singh Bali, Rahat Iqbal, Naveen Chilamkurti, Seungmin Rho |
1.088 |
41 |
Cooperative Gateway Cache Invalidation Scheme for Internet-Based Vehicular Ad Hoc Networks |
Wireless Personal Communications, vol. 85, pp. 1789-1814, Dec. 2015 |
Rajeev Tiwari, Neeraj Kumar |
0.701 |
42 |
A Smart Polyglot Solution for Big Data in Healthcare |
IEEE, IT Professional, Volume 17, Issue 6, pp. 48-55, 2015 |
Karamjit Kaur and Rinkle Rani |
1.067 |
43 |
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks |
Transactions on Internet and Information Systems Vol 9, No. 11, pp. 4701-4719, 2015 |
Anjali Anand, Rinkle Rani, Himanhsu Aggarwal |
0.56 |
44 |
Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks |
Transactions on Internet & Information Systems, Vol. 10 Issue 4, p1571-1589, 2016 |
Anjali Anand, Rinkle Rani, Himanhsu Aggarwal |
0.56 |
45 |
A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. |
April, 2016 |
Agarwal, Vaibhav, and Parteek Kumar |
0.430 |
46 |
Quantum neural network based machine translator for English to Hindi |
Applied Soft Computing 38, 1060–1075, (2016) |
Ravi Narayana, S. Chakraverty, V.P. Singh |
2.8 |
47 |
Fuzzy State Grammar and Fuzzy Deep Pushdown Automata |
AJournal of Intelligent and Fuzzy Systems, 31(1), 249-258, 2016 |
Nidhi Kalra, Ajay Kumar |
1.004 |
48 |
State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids |
Current Bioinformatics, 11(4), 470-479, 2016 |
Nidhi Kalra, Ajay Kumar |
0.77An efficient scheme for automatic web pages categorization using the support vector machine |
49 |
An efficient scheme for automatic web pages categorization using the support vector machine |
The New Review of Hypermedia and Multimedia, vol. 22, no. 3, pp. 223-242, 2016 |
Vinod Kumar Bhalla, Neeraj Kumar |
0.65 |
50 |
An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks |
Wireless Personal Communications, In Press, DOI:10.1007/s11277-016-3173-4. |
Vinod Kumar Bhalla, Neeraj Kumar |
0.97 |
51 |
A Recursive Algorithm for Generalized Constraint SCS Problem |
National Academy Science Letters 39 (4), pp 273-276 2016 |
Kaish Mangal and Ravinder Kumar |
0.345 |
52 |
Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling |
An International Journal Applied Mathematics & Information Sciences 10 (3), pp 1193-1201 |
Sandeep Saharan and Ravinder Kumar |
1.232 |
53 |
A systematic review of approaches for testing concurrent programs |
Concurrency and Computation: Practice And Experience, Vol. 5, pp. 1572 – 1611, 2016 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
0.94 |
54 |
Parallel Fuzzy Regular Expression and its Conversion to Epsilon-Free Fuzzy Automaton |
The Computer Journal bxv104,2015 |
Sunita Garhwal and Ramjiwari |
1.0 |
55 |
Conversion of fuzzy automata into fuzzy regular expressions using transitive closure |
Jounal of Intelligent & Fuzzy Systems vol.30, pp.3123-3129,2016 |
Sunita Garhwal and Ramjiwari |
1.004 |
56 |
Predictive hierarchical human augmented map generation for itinerary perception |
IET Electronic Letters, Vol 52, 2016 |
Baljeet Kaur and Jhilik Bhattacharaya |
0.94 |
57 |
An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection |
Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
IF=0.177 |
58 |
Protein structure prediction (RMSD ≤ 5A°) using machine learning models |
International Journal of Data Mining and Bioinformatics, Inderscience, 14(1):71-85, 2016. |
Y Pathak, PS Rana, PK Singh and M Saraswat |
0.7 |
59 |
Block based High Capacity Multilevel Image Steganography |
Journal of Circuits, Systems and Computers, Vol. 25,No.8,pp.165009(1-21),2016 |
Kasana, Kulbir Geeta Singh and Satvinder Singh Bhatia |
0.33 |
60 |
Multi-Model Persistent Solution for Healthcare Big Data |
Journal of Medical Imaging and Health Informatics, Volume 6, Page nos 937–947 (2016) |
Karamjit Kaur and Rinkle Rani |
0.58 |
61 |
Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming |
Advances in Materials Science and Engineering Volume 2016 (2016), Article ID 7648467, 10 pages http://dx.doi.org/10.1155/2016/7648467 |
Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar |
1.010 |
62 |
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity |
Computers & Electrical Engineering, In press, 2016 |
Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin |
1.084 |
63 |
Security analysis and design of an efficient ECC based two-factor password authentication scheme |
Security and Communication Networks, In press, 2016 |
Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin |
1.084 |
64 |
Resource Provisioning and Scheduling in Clouds: QoS |
The Journal of Supercomputing, Vol. 72, no. 3, pp 926–960, 2016 |
Sukhpal Singh and Inderveer Chana |
0.85 |
65 |
A Survey on Resource Scheduling in Cloud Computing Issues and Challenges |
Journal of Grid Computing, Vol 14, no. 2, pp 217–264, 2016 |
Sukhpal Singh and Inderveer Chana |
1.50 |
66 |
A systematic review of approaches for testing concurrent programs |
Concurrency and computation: practice and experience, Vol 28 pp 1572-1611, 2015 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
0.997 |
67 |
Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection |
Neural Computing and Applications, Vol 26, pp 117-130 |
Amit Kumar Bhardwaj, Maninder Singh |
1.56 |