1 |
Cloud-based automatic test data generation framework |
Journal of Computer and System Sciences,Vol. 82, no. 5, PP. 712–738, 2016 |
Priyanka Chawla, Inderveer Chana and Ajay Rana |
1.1380 |
2 |
Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi |
Neural Computing and Applications, 2016 |
Karun Verma, RK Sharma |
1.4920 |
3 |
An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition |
Journal of Engineering Research,4(1), 1-20, 2016 |
Teena Mitaal, R. K. Sharma |
0.1280 |
4 |
Green Service Level Agreement (GSLA) Framework for Cloud Computing |
Computing, Springer,Volume 98, Issue 9, pp 949–963, 2016 |
Goyal, S. ; Bawa, S. ; Singh, B |
0.8720 |
5 |
Comparative analysis of cloud data integrity auditing protocols |
Journal of Network and Computer Applications, Vol. 66 Issue C, May 2016, pp 17-32.,2016 |
Neeru Garg, Seema Bawa |
2.3310 |
6 |
Energy optimized resource scheduling algorithm for private cloud computing |
International Journal of Ad Hoc and Ubiquitous Computing,Vol. 23, Issue 1-2, 2016 |
S. Goyal, S. Bawa and B. Singh |
0.4930 |
7 |
Detecting And Containing Malicious Services In An Intercloud Environment |
Journal of Web Engineering,Vol. 15, No.5&6 (Apr 2016), pp: 521-538, 2016 |
Lohit Kapoor, Seema Bawa, Ankur Gupta |
0.3900 |
8 |
Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy |
ACM Computing Surveys,Volume 48 Issue 2, Article 22, 2016. |
Tarandeep Kaur and Inderveer Chana |
3.7300 |
9 |
EARTH- Energy-aware Autonomic Resource Scheduling in Cloud Computing |
Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 |
Sukhpal Singh and Inderveer Chana |
1.8120 |
10 |
Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach |
Journal of Grid Computing,Volume 14, Issue 2, pp. 327–345, 2016 |
Nidhi Jain Kansal, Inderveer Chana |
1.5070 |
11 |
Energy aware scheduling of deadline-constrained tasks in cloud computing |
Journal of Cluster Computing,Volume 19, Issue 2, pp 679–698, 2016 |
Tarandeep Kaur and Inderveer Chana |
1.5000 |
12 |
Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks |
Mobile Information Systems, 2016 |
Vishal Sharma, Ilsun You, Rajesh Kumar |
0.8720 |
13 |
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks |
International Journal of Ad Hoc and Ubiquitous Computing, Vol. 21, issue 2, pp. 140–155, 2016 |
Suman Bala, Anil K. Verma |
0.6900 |
14 |
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. |
Wireless Personal Communications,Vol. 89 No.2, 1-21, 2016 |
Goyal, Nitin, Mayank Dave, and Anil Kumar Verma |
0.6500 |
15 |
Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks |
Transactions on Internet & Information Systems,Vol. 10 Issue 4, p1571-1589, 2016 |
Anjali Anand, Rinkle Rani, Himanhsu Aggarwal |
0.5600 |
16 |
A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. |
Digital Scholarship in the humanities, 2016 |
Agarwal, Vaibhav, and Parteek Kumar |
0.4300 |
17 |
Fuzzy state Grammar and Fuzzy Deep Pushdown Automata |
Journal of Intelligent and Fuzzy Systems,31(1), 249-258, 2016 |
Nidhi Kalra, Ajay Kumar |
1.0040 |
18 |
An efficient scheme for automatic web pages categorization using the support vector machine |
The New Review of Hypermedia and Multimedia,vol. 22, no. 3, pp. 223-242, 2016 |
Vinod Kumar Bhalla, Neeraj Kumar |
0.6500 |
19 |
A Recursive Algorithm for Generalized Constraint SCS Problem |
National Academy Science Letters,pp 273-276, 2016 |
Kaish Mangal and Ravinder Kumar |
0.3450 |
20 |
Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling |
An International Journal Applied Mathematics & Information Sciences,1193-1201; 2016 |
Sandeep Saharan and Ravinder Kumar |
1.2320 |
21 |
A systematic review of approaches for testing concurrent programs |
Concurrency and Computation: Practice And Experience,Vol. 5, pp. 1572 – 1611 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
0.9400 |
22 |
Conversion of fuzzy automata into fuzzy regular expressions using transitive closure |
Jounal of Intelligent & Fuzzy Systems vol.30,pp.3123-3129, 2016 |
Sunita Garhwal and Ramjiwari |
1.0040 |
23 |
An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection |
Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
0.1710 |
24 |
Block based High Capacity Multilevel Image Steganography |
Journal of Circuits, Systems and Computers, pp 1-21, 2016 |
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia |
0.3300 |
25 |
Multi-Model Persistent Solution for Healthcare Big Data |
Journal of Medical Imaging and Health Informatics, 2016 |
Karamjit Kaur and Rinkle Rani |
0.5800 |
26 |
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity |
Computers & Electrical Engineering, 2016 |
Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin |
1.0840 |
27 |
A Survey on Resource Scheduling in Cloud Computing Issues and Challenges |
Journal of Grid Computing,Vol 14, no. 2, pp 217–264, 2016 |
Sukhpal Singh and Inderveer Chana |
1.5000 |
28 |
A Hybrid-Cascaded Framework for PET and SPECT Image Reconstruction |
Journal of Medical Imaging & Health Informatics (JMIHI) Vol. 6, 2016 |
Shailendra Tiwari, Rajeev Srivastava |
0.8770 |
29 |
A genetic algorithm based distance-aware routing protocol for wireless sensor networks |
Computers & Electrical Engineering,vol. 56, pp. 441-455, 2016 |
Tarunpreet Bhatia, Simmi Kansal Shivani Goel, A. K. Verma |
1.5700 |
30 |
Progressive Visual Cryptography with Unexpanded Meaningful Shares |
In ACM Transactions on Multimedia Computing Communication and Application, Vol 12(4), 2016 |
Shivendra Shivani, Suneeta Agarwal |
2.2500 |
31 |
Novel Basis Matrix Creation and Preprocessing Algorithms for Friendly Progressive Visual Secret Sharing with Space-Efficient Shares |
MULTIMEDIA TOOLS AND APPLICATIONS , 2016 |
Shivendra Shivani, Suneeta Agarwal |
1.5300 |
32 |
VPVC: Verifiable Progressive Visual Cryptography |
Pattern Analysis and Application,Vol 19, No. 3. , 2016 |
Shivendra Shivani, Suneeta Agarwal |
1.3500 |
33 |
Self authenticating medical X-ray images for telemedicine applications |
MULTIMEDIA TOOLS AND APPLICATIONS, 2016 |
Rajitha B, Shivendra Shivani, Suneeta Agarwal |
1.5300 |
34 |
Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System |
Computers & Electrical Engineering 52: 82-97, 2016 |
Rasmeet S. Bali, Neeraj Kumar |
1.5700 |
35 |
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud |
Peer-to-Peer Networking and Applications 9(5): 824-840, 2016 |
Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal |
1.2620 |
36 |
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm |
Security and Communication Networks 9(16): 3543-3557, 2016 |
Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao |
1.0670 |
37 |
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography |
Security and Communication Networks 9(17): 3944-3951, 2016 |
Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues |
1.0670 |
38 |
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures |
IEEE -Trans. Information Forensics and Security 11(9): 2052-2064, 2016 |
Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu |
4.3320 |
39 |
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem |
The Journal of Supercomputing 72(9): 3588-3600, 2016 |
Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti |
1.3260 |
40 |
Fuzzy-based trust prediction for effective coordination in vehicular ad hoc networks |
International Journal Of Communication Systems, 2016 |
Avleen Kaur Malhi, Shalini Batra |
1.0660 |
41 |
Improved Multi-Objective Particle Swarm Optimization Algorithm for Optimizing Watermark Strength in Color Image Watermarking |
Applied Intelligence, 2016 |
Nitin Saxena and K.K. Mishra |
1.9040 |
42 |
A Nature Inspired Hybrid Optimization Algorithm for Dynamic Environment with Real Parameter Encoding |
International Journal of Bio-Inspired Computation, 2016 |
Ashish Tripathi, Nitin Saxena, K. K. Mishra and A. K. Misra |
1.3900 |
43 |
A parallel fuzzy clustering algorithm for large graphs using Pregel |
Expert Systems with Applications,Vol. 78, pp. 135-144, 2016 |
Vandana Bhatia and Rinkle Rani |
3.9300 |
44 |
A Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks |
Journal of communications and Networks,Vol. 18, No. 6, pp. 938-947, 2016 |
Anjali Anand, Rinkle Rani and Himanhsu Aggarwal |
1.1300 |
45 |
Content-based image retrieval embedded with agglomerative clustering built on information loss |
Computers & Electrical Engineering 54,506-521, 2016 |
Shreelekha Pandey, Pritee Khanna |
1.5700 |
46 |
Clustering of hierarchical image database to reduce inter-and intra-semantic gaps in visual space for finding specific image semantics |
Journal of Visual Communication and Image Representation,704-720, (2016) |
Shreelekha Pandey, Pritee Khanna, Haruo Yokota |
2.1640 |
47 |
A semantics and image retrieval system for hierarchical image databases |
Information Processing & Management,571-591, 2016 |
Shreelekha Pandey, Pritee Khanna, Haruo Yokota |
2.1640 |
48 |
G-FANET: An Ambient Network Formation Between Ground and UAVs |
Telecommunication Systems,pp 1-24, 2016 |
Vishal Sharma, Rajesh Kumar |
0.8220 |
49 |
A Multi-model Persistent Solution for Healthcare Big Data/td> |
Journal of Medical Imaging and Health Informatics,pp 937-947, 2016 |
Karamjit Kaur, Rinkle Rani |
0.9000 |
50 |
EMD based Steganography Techniques for JPEG2000 Images and Videos |
International Journal of Wavelets, Multiresolution and Information Processing, pp. 937-947, 2016 |
Karamjit Kaur, Rinkle Rani |
0.9000 |
51 |
Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN |
AEU-International Journal of Electronics and Communications, 2016 |
Ramnik Singh, A K Verma |
0.7860 |
52 |
A Novel Framework for Grading Writers using Offline Gurmukhi Characters |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences,405-15, 2016 |
Munish Kumar, R. K. Sharma and M. K. Jindal |
0.1790 |
53 |
Integrated search technique for parameter determination of SVM for speech recognition |
Journal of Central South University, 2016 |
Teena Mitaal, R. K. Sharma |
0.5200 |
54 |
A note on data mining based noise diagnosis and fuzzy filter design for image processing |
Computers and Electrical Engineering,49-, 50, 2016 |
Rajiv Kumar, Khushneet Jindal |
1.0840 |
55 |
Multicast protection and grooming scheme in survivable WDM optical networks |
International Journal of Communication System,42-57, 2016 |
Ashok Kumar, Pradhan, SayanGhose, Tanmay de |
1.8600 |
56 |
Node stability aware single node failure recovery approach for WSANS |
MJC,Vol. 29, No. 2, 2016 |
V Ranga, M Dave, AK Verma |
0.4000 |
57 |
One-to-many authentication for access control in mobile pay-TV systems |
SCIENCE CHINA Information Sciences 59(5), 2016 |
Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee |
1.6280 |
58 |
Optimal nodes selection in wireless sensor and actor networks based on prioritized mutual exclusion approach |
Kuwait Journal of Science,vol. 43, pp. 150-173, 2016. |
Virendra Ranga, M Dave, A K Verma |
0.5000 |
59 |
PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks |
Wireless Personal Communications,Volume 87, Issue 3, pp 995–1012,2016 |
Gaurav Sharma, Suman Bala, Anil K. Verma |
0.6500 |
60 |
Prediction based proactive load balancing approach through VM migration. |
Engineering with Computers,581-592, 2016 |
AnjuBala and Inderveer Chana |
1.4600 |
61 |
Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming |
Advances in Materials Science and Engineering, 2016 |
Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar |
1.010 |
62 |
Prediction-based proactive load balancing approach through VM migration |
Engineering with Computers,pp. 581-592, 2016 |
Anju Bala, Inderveer Chana |
1.4510 |
63 |
Predictive hierarchical human augmented map generation for itinerary perception |
IET Electronic Letters, Vol 52, 2016 |
Baljeet Kaur and Jhilik Bhattacharaya |
0.9400 |
64 |
Protein structure prediction (RMSD <= 5A') using machine learning models |
International Journal of Data Mining and Bioinformatics,71-85, 2016 |
Y Pathak, PS Rana, PK Singh and M Saraswat |
0.7000 |
65 |
QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review/td> |
ACM Computing Surveys, 2016 |
Sukhpal Singh and Inderveer Chana |
3.7300 |
66 |
Quantum neural network based machine translator for English to Hindi |
Applied Soft Computing 38,1060–1075, 2016 |
Ravi Narayana, S. Chakraverty, V.P. Singh |
2.8000 |
67 |
Regression Based Weight Generation Algorithm in Neural Networks for Estimation of Frequencies of Vibrating Plate |
Journal of Computer Methods in Applied Mechanics and Engineering,4194-4202, 2016 |
S. Chakraverty, V. P. Singh and R. K. Sharma |
3.4600 |
68 |
Resource Provisioning and Scheduling in Clouds: QoS Perspective |
The Journal of Supercomputing,Vol. 72, no. 3, pp 926–960, 2016 |
Sukhpal Singh and Inderveer Chana |
0.8500 |
69 |
Secure clustering for efficient data dissemination in vehicular cyber-physical systems |
Future Generation Comp. Syst. 56: 476-492, 2016 |
Rasmeet S. Bali, Neeraj Kumar |
3.9970 |
70 |
Security analysis and design of an efficient ECC based two-factor password authentication scheme |
Security and Communication Networks, 2016 |
Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin |
0.8060 |
71 |
Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs |
IEEE Communications Letters,Volume: 19, Issue: 11, 2016 |
Vishal Sharma, Rajesh Kumar, Prashant Singh |
1.2910 |
72 |
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis |
The Journal of Supercomputing, pp. 1–28,2016 |
Rajkumar Tekchandani, Rajesh Bhatia and Maninder Singh |
1.3260 |
73 |
SERVmegh: framework for green cloud |
Concurrency and Computation, 2016 |
Ashok Kumar, Anju Sharma, Rajesh Kumar |
0.9420 |
74 |
SOCCER: Self-Optimization of Energy-efficient Cloud Resources |
Cluster Computing , Vol. 19, no. 4, pp. 1787-1800, 2016 |
Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya |
1.1540 |
75 |
Software component and the semantic Web: An in-depth content analysis and integration history |
Journal of System and Software, Vol.125, pages152-169, 2016. |
Loveleen Kaur, Ashutosh Mishra |
2.4440 |
76 |
Speech recognition using ANN and predator influenced civilized swam optimization algorithm |
Turkish Journal of Electrical Engineering & Computer Sciences 24, 4780-803, 2016 |
Teena Mitaal, R. K. Sharma |
0.5070 |
77 |
State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids |
Current Bioinformatics, 11(4), 470-479, 2016 |
Nidhi Kalra, Ajay Kumar |
0.7700 |
78 |
Statistical Feature Extraction Based Iris Recognition System |
Sadhana-Academy Proceedings in Engineering Sciences, 507-18, 2016 |
Atul Bansal, R. Agarwal and R. K. Sharma |
0.5870 |
79 |
Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks |
International Journal of Communication Systems, pp 1-25, 2016 |
Vishal Sharma, Rajesh Kumar |
1.0990 |
80 |
Three Tier Neural Model For Service Provisioning Over Collabrative Modulus Operator for Digital Images |
Neural Computing and Applications, pp. 1-21, 2016 |
Vishal Sharma, Rajesh Kumar |
1.4920 |
81 |
UAV Assisted Capacity Enhancement In Heterogenous Networks |
IEEE Communications Letters,Volume: 20, Issue: 6, Pages: 1207 - 1210, 2016 |
Vishal Sharma, Mehdi Bennis, Rajesh Kumar |
1.2910 |
82 |
UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks |
International Journal of Ad Hoc and Ubiquitous Computing, 2016 |
Vishal Sharma, Rajesh Kumar |
0.4930 |
83 |
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing |
IEEE Communications Magazine54(10): 60-66, 2016 |
Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues |
10.4350 |
84 |
Wireless and Mobile Technologies for the Internet of Things |
Mobile Information Systems , 2016 |
Wireless and Mobile Technologies for the Internet of Things |
0.8490 |
85 |
Job Migration Policies for Grid Environment |
Wireless Personal Communication, 2016 |
Neeraj Kumar Rathore and Inderveer Chana |
0.951 |