1 |
An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks |
Wireless Personal Communications, 2017 |
Vinod Kumar Bhalla, Neeraj Kumar |
0.9700 |
2 |
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. |
The Journal of Supercomputing, vol. 73, no. 6, pp 2558–2631, 2017 |
Tarunpreet Bhatia and A. K. Verma |
1.3200 |
3 |
An Efficient and Robust Multi-Frame Image Super-Resolution Reconstruction Using Orthogonal Fourier-Mellin Moments |
Elsevier, Volume 49, Pages 101-115 , 2017 |
Chandan Singh, Ashutosh Aggarwal |
1.5260 |
4 |
A new convolution model for the fast computation of Zernike moments |
International Journal of Electronics and Communications, 104-113, 2017 |
Chandan Singh, Ashutosh Aggarwal, Sukhjeet K. Ranade |
1.1470 |
5 |
Intelligent Heart Disease Prediction in Cloud Environment through Ensembling. |
Expert System, 2017 |
Nishant Gupta, Shikhar Malhotra, Naman Ahuja, Anju Bala and Gurleen Kaur |
0.9470 |
6 |
VMVC: Verifiable Multitone Visual Cryptography |
MULTIMEDIA TOOLS AND APPLICATIONS, 2017 |
Shivendra Shivani |
1.5300 |
7 |
XOR based Continuous tone Multi Secret Sharing Scheme for Store and Forward Telemedicine |
MULTIMEDIA TOOLS AND APPLICATIONS, 2017 |
Shivendra Shivani, Suneeta Agarwal |
1.5300 |
8 |
Multi Secret Sharing with Unexpanded Meaningful Shares |
MULTIMEDIA TOOLS AND APPLICATIONS, 2017 |
Shivendra Shivani |
1.5300 |
9 |
A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities |
IEEE Communications Magazine 55(3), 14-21, 2017 |
Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues |
10.4350 |
10 |
An efficient energy-aware predictive clustering approach for vehicular ad hoc networks |
Int. J. Communication Systems 30(2), 14-21, 2017 |
R.S Bali, Neeraj Kumar, Joel R |
1.0660 |
11 |
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks |
Int. Journal of Network Management 27(3), 2017 |
Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti |
1.1180 |
12 |
Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid |
IEEE Systems Journal 11(1), 140-151, 2017 |
Neeraj Kumar, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues, Seungmin Rho |
3.8820 |
13 |
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System |
IEEE Trans. Information Forensics and Security12(2), 454-464, 2017 |
Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu |
4.3320 |
14 |
Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers |
IEEE Wireless Commun. 24(3), 48-56, 2017 |
Kuljeet Kaur, Tanya Dhand, Neeraj Kumar, Sherali Zeadally |
8.9720 |
15 |
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network |
Wireless Personal Communications 93(2), 523-541, 2017 |
Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen |
0.9510 |
16 |
Evolution based memetic algorithm and its application in software cost estimation |
Journal of Intelligent & Fuzzy Systems, vol. 32, no. 3, pp. 2485-2498, 2017 |
K. K. Mishra, Ashish Tripathi, Shailesh Tiwari and Nitin Saxena |
1.2610 |
17 |
An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems |
Advances in Engineering Software, 2017 |
Vijay Kumar and Dinesh Kumar |
3.0000 |
18 |
A Modified DWT-based Image Steganography Technique |
Multimedia Tools and Applications, 2017 |
Vijay Kumar and Dinesh Kumar |
1.5300 |
19 |
Internet Attacks and Intrusion Detection System: Study and Review |
Online Information Review, Vol. 41, No. 2, pp 171-184, 2017 |
Raman Singh, Harish Kumar, R.K. Singla, K.R. Ramkumar |
1.5340 |
20 |
Key Management using Chebyshev Polynomials for Mobile Ad Hoc Networks |
China Communications, Accepted for publication, 2017 |
R. Ramkumar and Raman Singh |
0.9030 |
21 |
Community Sensor Network for Monitoring Road Roughness Using Smartphones |
Journal of Computing in Civil Engineering, 2017 |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
1.9200 |
22 |
EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm |
International Journal of Ad Hoc and Ubiquitous Computing, 2017 |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
0.4930 |
23 |
Efficient Cooperative Relaying In Flying Ad Hoc Networks Using Fuzzy-Bee Colony Optimization |
Journal of Supercomputing, pp. 1-31, 2017 |
Vishal Sharma, Kathiravan Srinivasan, Rajesh Kumar, Han-Chieh Chao, Kai-Lung Hua |
1.0880 |
24 |
Driver Behaviour Detection and Vehicle Rating Using Multi-UAV Coordinated Vehicular Networks |
Journal of Computer and System Sciences, pp 3-32, 2017 |
Vishal Sharma, Hsing Chung Chen, Rajesh Kumar |
1.5830 |
25 |
Cooperative Network Frameworks and Network Models For Flying Ad Hoc Networks: A Survey |
Concurrency Control and Practices, pp. 1-40, 2017 |
Vishal Sharma, Rajesh Kumar |
0.9420 |
26 |
Equal: Energy And Qos Aware Resource Allocation Approach For Clouds |
Computing and Informatics, 2017 |
Ashok Kumar, Anju Sharma, and Rajesh Kumar |
0.5040 |
27 |
Energy Aware Resource Allocation For Clouds Using Two Level Ant Colony Optimization |
Computing and Informatics, 2017 |
Ashok Kumar, Anju Sharma, and Rajesh Kumar |
0.5040 |
28 |
Analyzing inconsistencies in software product lines using an ontological rule-based approach |
Journal of Systems and Software, 2017 |
Megha Bhushan, Shivani Goel, Karamjit Kaur |
2.4400 |
29 |
Block Based Reversible Data Hiding Using Histogram Shifting and a Modulus operator for Digital Images |
Journal of Circuits, Systems and Computers, pp. 1- 17, 2017 |
Pankaj Garg, Singara Singh Kasana and Geeta Kasana |
0.3080 |
30 |
A Sustainable Multi-Parametric Sensors Network Topology for River Water Quality Monitoring |
Wireless Networks, 2017 |
Himanshu Jindal, Sharad Saxena and Singara Singh Kasana |
1.0060 |
31 |
Deterministic Deep Pushdown Transducer and its Parallel Version |
The Computer Journal, 2017 |
Nidhi Kalra and Ajay Kumar |
0.7110 |
32 |
Efficient image transfer over WSN using cross layer architecture |
Optik-International Journal for Light and Electron Optics, DOI information, 2017 |
Ramnik Singh, A K Verma |
0.7420 |
33 |
Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks |
National Academy of Sciences, India Section A: Physical Sciences, 2017 |
Nitin goyal, M Dave, A K Verma |
0.3900 |
34 |
A MapReduce Based Scalable Discovery and Indexing of Structured Big Data |
Future Generation Computer System The International Journal of Grid Computing and eScience, 2017 |
Hari Singh and Seema Bawa |
2.1000 |
35 |
Distributed Star Coloring of Network for IP Traceback |
International Journal of Information Security, Springer, vol. 9, pp. 1-12, 2017 |
Sangita Roy, Ashok Singh Sairam |
1.9150 |
36 |
A novel shape-based character segmentation method for Devanagari script. |
Arabian Journal for Science and Engineering, 1–8, 2017 |
Rajiv Kumar, Khushneet Jindal |
0.7280 |
37 |
A Novel Ensemble Technique for Anomaly Detection |
International Journal of Communication System, 2017 |
Sahil Garg, Shalini Batra |
1.0060 |
38 |
Multicast dynamic traffic grooming using bin packing method in WDM mesh networks |
Optical Switching and Networking, 23, 40-51, 2017 |
Ashok Kumar, Pradhan, SayanGhose, Tanmay de |
1.8600 |
39 |
Fuzzy rule-based expert system for determining trustworthiness of cloud service providers |
International Journal of Fuzzy Systems, 19, pp. 338-354, 2017 |
Rajanpreet Kaur, Sarbjeet Singh |
2.1980 |
40 |
Efficient disparity estimation from stereo images using hybrid guided image filter |
Imaging Science Journal, pp 1-13, 2017 |
Khushboo Jain, Husanbir Singh Pannu, Kuldeep Singh, Avleen Kaur Malhi |
0.45 |
41 |
Multi-objective Particle Swarm Optimization based Adaptive Neuro-Fuzzy Inference System for Benzene Monitoring |
Neural Computing and Applications, pp 1-11, 2017 |
Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi |
2.5 |
42 |
QUAT-DEM: Quaternion-DEMATEL based neural model for mutual coordination between UAVs |
Information Sciences, Dec 1;418:74-90, 2017 |
Sharma V., Kumar R. & Kumar R. |
4.832 |
43 |
HMADSO: a novel hill Myna and desert Sparrow optimization algorithm for cooperative rendezvous and task allocation in FANETs |
Soft Computing, 2017:1-24, 2017 |
Sharma V, Kumar R, Reina DG |
2.472 |
44 |
Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs |
Computing and Informatics, Jul 2;35(5):1079-109, 2017 |
Sharma V. & Kumar R. |
0.488 |
45 |
Clustering-based resource discovery on Internet-of-Things |
International Journal of Communication Systems, Wiley, https://doi.org/10.1002/dac.3501, 2017 |
Monika Bharti , Rajesh Kumar, Sharad Saxena |
1.066 |
46 |
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries |
IEEE Transactions on Smart Grid, vol. 8, pp. 2411-2419, 2017 |
Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, Laurence T. Yang |
6.645 |
47 |
Cooperative Strategies for Challenged Networks and Applications: A Survey |
IEEE Systems Journal, vol. 11, pp. 2749 - 2760, 2017 |
Bruno M. C. Silva, Joel J. P. C. Rodrigues, Neeraj Kumar, Guangjie Han |
3.882 |
48 |
Anonymous Authentication for Wireless Body Area Networks With Provable Security |
IEEE Systems Journal, vol. 11, pp. 2590-2601, 2017 |
Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee |
3.882 |
49 |
Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks |
Journal of Real-Time Image Processing, vol. 13, pp. 627-644, 2017 |
Amit Dua, Neeraj Kumar, Seema Bawa |
2.01 |
50 |
Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges |
IEEE Communications Magazine, vol. 55, pp. 114-122, 2017 |
Rajat Chaudhary, Neeraj Kumar, Sherali Zeadally |
10.435 |
51 |
Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach |
IEEE Communications Magazine, vol. 55, pp. 100-108, 2017 |
Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Joel J. P. C. Rodrigues, Alexey V. Vinel |
10.435 |
52 |
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices |
IEEE Access, vol. 5, pp. 27707-27721, 2017 |
Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park |
3.244 |
53 |
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks |
IEEE Access, vol. 5, pp. 14966-14980, 2017 |
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park |
3.244 |
54 |
Cryptanalysis and Improvement of Certificateless Proxy Signcryption Scheme for E-Prescription System in Mobile Cloud Computing |
Annals of Telecommunications, 563-576 & 72, 2017 |
Tarunpreet Bhatia and A.K. Verma |
1.4 |
55 |
Local Graph Based Correlation Clustering |
Knowledge-Based Systems, Elsevier, Vol. 138, pp. 155-175, 2017 |
Divya Pandov, Rinkle Rani , Shivani Goel |
4.5 |
56 |
Correlation Clustering Methodologies and their Fundamental Results |
Experts Systems, Wiley, Vol. 34, No. 4, pp. 1-24, 2017 |
Divya Pandov, Rinkle Rani , Shivani Goel |
1.18 |
57 |
An Efficient Approach for Outlier Detection in Big Sensor Data of Healthcare |
International Journal of Communication Systems, Wiley, Vol. 30, No. 17, pp. 1-10, 2017 |
Bharti Saneja and Rinkle Rani |
1.06 |
58 |
Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete |
Advances in Civil Engineering, 2017 |
Palika Chopra, R. K. Sharma, Maneek Kumar, and Tanuj Chopra |
|
59 |
Development of Pavement Distress Deterioration Prediction Models for Urban Road Network using Genetic Programming |
Advances in Civil Engineering, 2017 |
Tanuj Chopra, Manoranjan Parida, Naveen Kwatar, and Palika Chopra |
|
60 |
A semi-supervised domain adaptation assembling approach for image classification |
Pattern Analysis and Applications, 2017 |
Shruti Saxena, Shreelekha Pandey, Pritee Khanna |
1.352 |
61 |
Comprehensive survey of 3D image steganography techniques |
IET Image Processing, pp 1-10, 2017 |
Ashish Girdhar , Vijay Kumar |
1.044 |
62 |
Context-Aware Search Optimization Framework on Internet-of-Things |
Concurrency and Computation: Practice and Experience, 2017 |
Monika Bharti, Sharad Saxena, Rajesh Kumar |
1.133 |
63 |
Clustering based resource discovery on Internet-of-Things |
International Journal of Communication Systems, 2017 |
Monika Bharti, Rajesh Kumar, Sharad Saxena |
1.066 |
64 |
Efficient Landsat image fusion using fuzzy and stationary discrete wavelet transform |
Imaging Science Journal Taylor and Francis , 65.2 (2017): 108-114, 2017 |
Dilbag Singh, Deepak Garg, And HS Pannu |
0.45 |
65 |
Autonomic point cloud based surface reconstruction using SVR Imaging Science Journal |
Imaging Science Journal Taylor and Francis , 1–9, 2017 |
Khushboo Jain, HS Pannu |
0.45 |
66 |
An Efficient Corpus-Based Stemmer |
Cognitive Computation, 671-688 & 9, 2017 |
Jasmeet Singh, Vishal Gupta |
3.441 |
67 |
A systematic review of text stemming techniques |
Artificial Intelligence, 157-217 & 48, 2017 |
Jasmeet Singh, Vishal Gupta |
2.627 |
68 |
Modified Gain Intervention Filter based Dehazing Technique |
Journal of Modern Optics, 2165-2178 & 64(20), 2017 |
Dilbag Singh and Vijay Kumar |
1.328 |
69 |
A Comprehensive Survey of 3D Image Steganography Techniques |
IET Image Processing, 1-10 & 12(1), 2017 |
Chandan Singh, Ashutosh Aggarwal |
1.044 |
70 |
Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter |
IET Computer Vision, 2017 |
Dilbag Singh and Vijay Kumar |
0.878 |
71 |
An Empirical Evaluation of Energy-aware Load Balancing Technique for Cloud Data Center |
Cluster Computing, pp. 1-19, 2017 |
Nidhi Jain Kansal and Inderveer Chana |
2.04 |
72 |
BULLET: Particle Swarm Optimization based Scheduling Technique for Provisioned Cloud Resources |
Journal of Network and Systems Management, pp. 1-40, 2017 |
Sukhpal Singh, Rajkumar Buyya, Inderveer Chana, Maninder Singh and Ajith Abraham |
1.588 |
73 |
CHOPPER: An Intelligent QoS-aware Autonomic Resource Management Approach for Cloud Computing |
Cluster Computing, pp. 1-39, 2017 |
Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya |
2.04 |
74 |
IoT based Agriculture as a Cloud and Big Data Service: The Beginning of Digital India |
Journal of Organizational and End User Computing (JOEUC), vol. 29, no. 4, 2017 |
Sukhpal Singh, Inderveer Chana and Rajkumar Buyya |
0.759 |
75 |
A Sentiment Analysis System to Improve Teaching and Learning |
IEEE Computer 50.5, 2017 |
Sujata Rani, Parteek Kumar |
1.1150 |
76 |
A public platform for developing language-independent applications |
Digital Scholarship in the Humanities, 2017 |
Vaibhav Agarwal, Parteek Kumar |
0.5250 |
77 |
Fuzzified cuckoo based clustering technique for network anomaly detection |
Computers and Electrical Engineering, 2017 |
Sahil Garg, Shalini Batra |
1.57 |
78 |
Improving quality of software product line by analysing inconsistencies in feature models using an ontological rule-based approach |
Expert Systems, 2017 |
Megha, Shivani Goel and Ajay Kumar |
1.1800 |
79 |
Offline Handwritten Gurmukhi Character Recognition: Analytical Study of different Transformations |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 137-143, 2017 |
Munish Kumar, R. K. Sharma and M. K. Jindal |
0.1790 |
80 |
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems |
IEEE Access 5: 7012-7030, 2017 |
Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park |
3.2440 |
81 |
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services |
IEEE Access, vol. 5, pp. 25808-25825, 2017 |
Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos |
3.244 |
82 |
Ontology Cohesion and Coupling Metrics |
International Journal on Semantic Web and Information Systems, 2017 |
Sandeep Kumar, Niyati Baliyan, and Shriya Sukalikar |
1.5000 |
83 |
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud |
Applied Mathematics and Computation, vol. 314, pp. 31-43, 2017 |
Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo |
1.738 |
84 |
QSLB: Queue Size based single path load balancing routing protocol for mobile ad hoc networks |
International Journal of Ad Hoc and Ubiquitous Computing, 2017 |
Mohd Naseem, Chiranjeev Kumar |
0.6000 |
85 |
Reference based semiblind image watermarking scheme in wavelet Domain |
International Journal of Light and Electron Optics., pp. 191-204, 2017 |
Geeta Kasana and Singara Singh Kasana |
0.7420 |
86 |
ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks |
Telecommunication Systems, 439-458, 2017 |
Amit Dua, Neeraj Kumar, Seema Bawa |
1.5420 |
87 |
Resource-based mobility management for video users in 5G using catalytic computing |
Computer Communications, 2017 |
Vishal Sharma, Ilsun You, Ravinder Kumar |
3.338 |
88 |
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing |
Journal of Network and Computer Applications, pp. 1-13 , 2017 |
Garg, Neenu, and Seema Bawa |
3.3310 |
89 |
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. |
IEEE Internet of Things Journal, vol. 4, pp. 1634-1646, 2017 |
Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos |
7.596 |
90 |
Secure public data auditing scheme for cloud storage in smart city |
Personal and Ubiquitous Computing, Vol. 21, pp. 949–962, 2017 |
Libing Wu, Jing Wang, Neeraj Kumar, Debiao He |
2.395 |
91 |
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications |
IEEE Access 5: 3028-3043, 2017 |
Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo |
3.2440 |
92 |
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment |
IEEE Transactions on Industrial Informatics, vol. 13, pp. 3144-3153, 2017 |
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues |
6.764 |
93 |
Sewage Water Quality Monitoring Framework using Multi-parametric Sensors |
Wireless Personal Communications, 2017 |
Himanshu Jindal, Sharad Saxena and Singara Singh Kasana |
0.7010 |
94 |
Single-image super-resolution using orthogonal rotation invariant moments |
Computers & Electrical Engineering, 2017 |
Chandan Singh, Ashutosh Aggarwal |
1.5700 |
95 |
Slantlet based Hybrid Watermarking Technique for Medical Images |
Multimedia Tools and Applications, 2017 |
Roopam Bamal and Singhara Singh Kasana |
1.3310 |
96 |
Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications |
Advances in Engineering Software, 48-70 & 114, 2017 |
Gaurav Dhiman and Vijay Kumar |
3 |
97 |
Strategies For Replica Consistency In Data Grid – A Comprehensive Survey |
Concurrency and Computation: Practice and Experience, pp. 1-40, 2017 |
Priyanka Vashisht, Anju Sharma, Rajesh Kumar |
1.1330 |
98 |
Synthesizing test scenarios in UML activity diagram using a Bio-inspired approach |
Computer Languages, Systems & Structures, Vol. 50, pp. 1-19, 2017 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
1.6150 |
99 |
T-Ensemble approach for Drug Toxicity Prediction |
International Journal of Computer Science and Information Security, 2017 |
Nishtha Hooda, Seema Bawa, Prashant Singh Rana |
0.5190 |
100 |
The Journey of QoS-Aware Autonomic Cloud Computing |
IT Professional, vol. 19, no. 2,pp. 42-49, 2017 |
Sukhpal Singh, Inderveer Chana and Maninder Singh |
1.661 |
101 |
Traffic noise mapping of Indian roads through smartphone user community participation |
Journal of Computing in Civil Engineering, 2017 |
Rajiv Kumar, Abhijit Mukherjee and V. P. Singh |
1.9800 |
102 |
Triangular Pyramidal Topology to Measure Temporal and Spatial Variations in Shallow River Water using Ad-hoc Sensors Network |
Ad Hoc & Sensor Wireless Networks, 1-35, (39), 2017 |
Himanshu Jindal, Sharad Saxena, Singara Singh |
1.034 |
103 |
AUnderwater Pipelines Panoramic Image Transmission and Refinement using Acoustic Sensors |
International Journal of Wavelets, Multiresolution and Information Processing, 2017 |
Himanshu Jindal, Singara Singh, Sharad Saxena |
0.6 |
104 |
Weighted Image De-fogging using Luminance Dark Prior |
Journal of Modern Optics, pp. 1-13, 2017 |
Isha Kansal and Singara Singh Kasana |
1.2670 |
105 |
Data Deduplication Techniques for Efficient Cloud Storage Management - A Systematic Review |
The Journal of Supercomputing, 2018 |
Ravneet Kaur, Inderveer Chana and Jhilik Bhattacharya |
1.326 |
106 |
GreenSched: An Intelligent Energy Aware Scheduling For Deadline-and- Budget Constrained Cloud Tasks |
Simulation Modelling Practice and Theory, 2018 |
Tarandeep Kaur and Inderveer Chana |
1.954 |
107 |
Character Recognition for Non-Indic and Indic Scripts: a Survey |
Artificial Intelligence Review, https://doi.org/10.1007/s10462-017-9607-x, 2018 |
Munish Kumar, M. K. Jindal and R. K. Sharma |
2.627 |
108 |
Handwritten Numeral Recognition using Combination of Different Feature Extraction Techniques |
National Academy Science Letters, 41(1), 2018 |
Munish Kumar, R. K. Sharma, M. K. Jindal and Simpel Rani Jindal |
0.369 |
109 |
Efficient Zone Identification Approach for the Recognition of Online Handwritten Gurmukhi Script |
Neural Computing and Applications, https://doi.org/10.1007/s00521-017-3340-x, 2018 |
Harjeet Singh, R. K. Sharma and V. P. Singh |
2.505 |
110 |
Comparison of Machine Learning Techniques for the Prediction of Compressive Strength of Concrete |
Advances in Civil Engineering, https://doi.org/10.1155/2018/5481705, 2018 |
Palika Chopra, R. K. Sharma, Maneek Kumar and Tanuj Chopra |
0.97 |
111 |
A Parallel Computational Approach for Similarity Search using Bloom Filters |
Computational Intelligence, 34:713–733, 2018 |
Sachendra Singh Chauhan, Shalini Batra |
0.96 |
112 |
An efficient multi party scheme for PPCF for health care system |
Future Generation Computer Systems, 2018 |
Harmanjeet Kaur, Neeraj Kumar, Shalini Batra |
3.99 |
113 |
B2 FSE framework for high dimensional imbalanced data: A case study for drug toxicity prediction |
Neurocomputing, Volume 276, Pages 31-41, 2018 |
Nishtha Hooda, Seema Bawa and Prashant Singh Rana |
3.317 |
114 |
Fraudulent Firm Classification: A Case Study of an External Audit |
Applied Artificial Intelligence, Volume 32 Issue 1, Pages 48-64, 2018 |
Nishtha Hooda, Seema Bawa and Prashant Singh Rana |
0.652 |
115 |
Improved Particle Swarm Optimization Based Adaptive Neuro-Fuzzy Inference System for Benzene Detection |
CLEAN-soil, air, water, Page no. 1-27, Vol 46(5), 2018 |
Husanbir Singh Pannu, Dilbag Singh, Avleen Kaur Malhi |
1.47 |
116 |
Efficient disparity estimation from stereo images using hybrid guided image filter |
Imaging Science Journal, Page no. 139-151, Vol 66(3), 2018 |
Khushboo Jain, Husanbir Singh Pannu, Kuldeep Singh, Avleen Kaur Malhi |
0.45 |
117 |
Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks |
Wireless Networks, Page 1-25, 2018 |
Kalpna Guleria, Anil Kumar Verma |
1.548 |
118 |
FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad hoc Networks (FANETs) |
Adhoc and Sensor Wireless Networks, Page 23-47 and Vol. 40, 2018 |
Kuldeep Singh, Anil Kumar Verma |
1.034 |
119 |
Impersonation attack on CertificateLess key agreement protocol |
International Journal of Ad Hoc and Ubiquitous Computing, Page 108-120 and Vol. 27, 2018 |
Suman Bala, Gaurav Sharma, Anil Kumar Verma |
0.705 |
120 |
A Novel Framework for Reliable Network Prediction of Small Scale Wireless Sensor Networks (SSWSNs) |
Fundamenta Informaticae, Page 303-341 and Vol. 163, 2018 |
Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana |
0.687 |
121 |
A fuzzy-based trust model for flying ad hoc networks (FANETs) |
International Jourmal of Communication Systems, Page 1-19 and Vol. 31, 2018 |
Kuldeep Singh, Anil Kumar Verma |
1.066 |
122 |
GIS-based evolutionary optimized Gradient Boosted Decision Trees for forest fire susceptibility mapping |
Natural Hazards, Page 1-20, 2018 |
Shruti Sachdeva, Tarunpreet Bhatia, Anil Kumar Verma |
1.833 |
123 |
Comprehensive review of continuous and discrete orthogonal moments in biometrics |
International journal of computer mathematics: Taylor and Francis, 1700162, 2018 |
Husanbir Singh Pannu, Dilbag Singh, Avleen Malhi |
0.97 |
124 |
A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences |
Multimedia Tools and Applications, 2018 |
Ashish Girdhar and Vijay Kumar |
1.53 |
125 |
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods |
Future Generation Computer Systems, Vol. 86, 266-280, 2018 |
Shubham Goel and Ravinder Kumar |
3.997 |
126 |
DPTR: Distributed priority tree-based routing protocol for FANETs |
Computer Communications, Vol 122, 129-151, 2018 |
Vishal Sharma, Ravinder Kumar and Neeraj Kumar |
3.338 |
127 |
Analysis of Students' Ratings of Teaching Quality to Understand the Role of Gender and Socio-Economic Diversity in Higher Education |
IEEE Transactions on Education, Vol 61 Issue 4 pp: 1-9, 2018 |
Anika Gupta ; Deepak Garg ; Parteek Kumar |
1.727 |
128 |
HMulti-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems. |
Knowledge-Based Systems, pp.175-197 & Vol. 150, 2018 |
Gaurav Dhiman and Vijay Kumar |
4.529 |
129 |
A novel dehazing model for remote sensing images. |
Computer & Electrical Engineering, pp. 14-27 & Vol. 69, 2018 |
Dilbag Singh and Vijay Kumar |
1.57 |
130 |
An efficient image encryption method based on improved Lorenz chaotic system. |
Electronics Letters, pp. 562-564 & Vol. 54(9), 2018 |
Manjit Kaur and Vijay Kumar |
1.155 |
131 |
Fourier-Mellin moments based intertwining map for image encryption. |
Modern Physics Letters B, pp. 1-17 & Vol. 32(9), 2018 |
Manjit Kaur and Vijay Kumar |
0.617 |
132 |
Comprehensive Survey on Haze Removal Techniques. |
Multimedia Tools and Applications, pp. 9595-9620 & Vol. 77(8), 2018 |
Dilbag Singh and Vijay Kumar |
1.53 |
133 |
Histogram based Multilevel Reversible Data Hiding Scheme using Simple and Absolute Difference Images |
Multimedia Tools and Applications, 2018 |
Sonal Kukreja, Singara Singh Kasana and Geeta Kasana |
1.53 |
134 |
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems |
IEEE Trans. Industrial Informatics , 1232-1241 , vol. 14, 2018 |
Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang |
6.764 |
135 |
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks |
IEEE Internet of Things Journal, 269-282, vol. 5, 2018 |
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo |
7.596 |
136 |
Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud |
IEEE Trans. Emerging Topics Comput., 58-71, vol. 6, 2018 |
Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat |
3.826 |
137 |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services |
IEEE Systems Journal, 1621-1631, vol. 12, 2018 |
Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen |
3.882 |
138 |
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks |
Journal of Network and Computer Applications, 133-144, vol. 104, 2018 |
Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo |
3.5 |
139 |
Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care. |
Journal of Medical Systems, 51:1--51:10, vol. 42, 2018 |
Mario W. L. Moreira, Joel J. P. C. Rodrigues, Neeraj Kumar, Jalal Al-Muhtadi, Valery Korotaev |
2.456 |
140 |
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment |
Future Generation Computer Systems, 629-637, vol. 83, 2018 |
Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla |
3.997 |
141 |
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment |
IEEE Communications Magazine, 24-32, vol. 56, 2018 |
Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena |
10.435 |
142 |
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks |
IEEE Access, 20673-20693, vol. 6, 2018 |
Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar |
3.244 |
143 |
Efficient Classification of the Hyperspectral Images using Deep Learning |
Multimedia Tools and Applications, 2018 |
Simranjit Singh and Singara Singh Kasana |
1.53 |
144 |
A new illumination normalisation framework via homomorphic filtering and reflectance ratio in DWT domain for face recognition |
Journal of Intelligent and Fuzzy Systems, 2018 |
Jyotsna Yadav, Navin Rajpal, Rajesh Mehta |
1.2 |
145 |
Low-dose CT image reconstruction using gain intervention based dictionary learning |
Modern Physics Letter-B, World Scientific, 1850148, Vol no 32, Issue 14, 2018 |
Y. Pathak, K.V. Arya and S. Tiwari |
0.687 |
146 |
Feature Selection for Image Steganalysis using Levy Flight-based Grey Wolf Optimization |
Multimedia Tools and Applications, Springer, 2018 |
Y. Pathak, K.V. Arya and S. Tiwari |
1.53 |
147 |
Offline Handwritten Pre-Segmented Character Recognition of Gurmukhi Script |
Machine Graphics and Vision, 25(1/4), 2018 |
Munish Kumar, M. K. Jindal, R. K. Sharma and S. R. Jindal |
0.11 |
148 |
Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective |
IEEE Trans. Industrial Informatics , 778-789, vol. 14, 2018 |
Gagangeet Singh Aujla, Neeraj Kumar, Albert Y. Zomaya, Rajiv Ranjan |
6.764 |
149 |
Optimized Big Data Management across Multi-Cloud Data Centers: Software-Defined-Network-Based Analysis |
IEEE Communications Magazine, 118-126, vol. 56, 2018 |
Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Joel J. P. C. Rodrigues |
10.435 |
150 |
Plants Disease Identification and Classification Through Leaf Images: A Survey |
Archives of Computational Methods in Engineering, https://doi.org/10.1007/s11831-018-9255-6, 2018 |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
5.061 |
151 |
Prediction of Compressive Strength of Concrete using Artificial Neural Network and Genetic Programming |
Advances in Materials Science and Engineering, http://dx.doi.org/10.1155/2016/76484679, 2018 |
Palika Chopra, R. K. Sharma and Maneek Kumar |
1.299 |
152 |
Prediction of drug synergy in cancer using ensemble-based machine learning techniques. |
World Scientific-Modern Physics Letters B, Vol. 32, No. 11 (2018) 1850132 (12 pages), 2018 |
Harpreet Singh, Prashant Singh Rana, and Urvinder Singh |
0.69 |
153 |
Quantifying matrix product state |
Quantum Information Processing, 17(41), 2018 |
Amandeep singh bhatia, Ajay Kumar |
2.2 |
154 |
Scalable Metadata Management Techniques for Ultra Large Distributed Storage Systems - A Systematic Review |
ACM Computing Surveys, 2018 |
Harcharan Jit Singh, Seema Bawa |
6.72 |
155 |
SDN-based energy management scheme for sustainability of data centers: An analysis on renewable energy sources and electric vehicles participation. |
Journal of Parallel and Distribed Computing, 228-245, vol. 117, 2018 |
Gagangeet Singh Aujla, Neeraj Kumar |
1.93 |
156 |
Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios |
IEEE Communications Magazine, 56 (4), 120-128, 2018 |
Vishal Sharma, Dushantha Nalin K. Jayakody, Ilsun You, Ravinder Kumar, Jun Li |
10.435 |
157 |
Secure Message Communication Protocol Among Vehicles in Smart City |
IEEE Transactions on Vehicular Technology, 4359-4373, vol. 67, 2018 |
Amit Dua, Neeraj Kumar, Ashok Kumar Das, Willy Susilo |
4.066 |
158 |
Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud |
Transactions on Emerging Telecommunications Technologies, Page 1-21, e3309, 2018 |
Tarunpreet Bhatia, Anil Kumar Verma, Gaurav Sharma |
1.535 |
159 |
Semi-automatic leaf disease detection and classification system for soybean culture |
IET Image Processing, Page number 1038 – 1048 & Volume 12, Issue 6, 2018 |
Sukhvir Kaur, Shreelekha Pandey, Shivani Goel |
1.044 |
160 |
Sharing Two True Color Images using (3,3) Extended Visual Cryptography Technique |
Journal of Modern Optis, 2018 |
Kirti Dhiman and Singara Singh Kasana |
1.267 |
161 |
Temporality Based Sentiment Analysis using Linguistic Rules and Meta-Data |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences , pp. 1-9, 2018 |
Sukhnandan Kaur, Rajni Mohana |
0.47 |
162 |
UNLization of Punjabi text for natural language processing applications |
Sadhana, 43-87, 2018 |
Vaibhav Agarwal, Parteek Kumar |
0.4650 |