Year 2013-14

List of research publications in SCI/Impact Factor journals  

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing, pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information,  Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013  Kottayam, Kerala, India Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions International Conference on Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective International Conference on Advances in Computing, Bangalore, 3-4 July, 2012, Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava    
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management Proc. Springer Conf. on Trends in Information, Telecommunication and Computing (ITC2012)LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhawa

 

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors
1 Resource Scheduling Techniques in Utility Computing- A Survey International Journal of Systems and Service-Oriented Engineering (IJSSOE), (Accepted on 20th December, 2013). Inderveer Chana, Tarandeep Kaur
2 Cloud Computing standardization initiatives: State of Play International Journal of Cloud Computing and Services Science (IJ-CLOSER),Vol 2, no 5, Dec 2013   Rajinder Sandhu, Inderveer Chana
3 Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems, UACEE International Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765], Publication Date : 09 September 2013, pp109-114 Taranpreet Kaur and Inderveer Chana    
4 Survey of Load Balancing Technique International journal of scientific and innovative technology, vol-1, issue-1,2013 Neeraj Kumar Rathore and Dr. Inderveer Chana
5 Securing Virtual machines in Cloud Environment using OVF UACEE International      Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765],Publication Date : 09 September 2013, pp7-11 Rajinder Sandhu and Inderveer Chana
6 Report on Hierarchal Load Balancing Technique in Grid Environment” International journal of Scientific and Innovative Technology, i-manager’s Journal on Information Technology, Vol. 2, No. 4, ISSN Print: 2277-5110 , ISSN Online: 2277-5250, pp-21-35, Sep - Nov 2013  Neeraj Kumar Rathore and Inderveer Chana
7  Grid Scheduling Heuristic methods : State-of-the-Art International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6, 2014 Rajni Aron, Inderveer Chana  
8 Network Security & Ethical Hacking Against Cyber Crime International journal of scientific and innovative technology, vol-1, issue-1, 2013   Neeraj Kumar Rathore and Dr. Inderveer Chana  
9 Introducing Agility in Cloud Based Software Development through ASD International Journal of  u- and e- Service, Science and Technology, Vol.6, No.5 (2013), pp.191-202 Sukhpal Singh, Inderveer  Chana
10 A secure and energy efficient data dissemination protocol for wireless sensor networks International journal of network security, Vol. 15, Issue 6, pp. 490-500,  2013 N. Kumar, M. Kumar, R. B. Patel
11  A survey of approaches to secure vehicular networks with identity based cryptography International journal of advanced engineering and computing technologies. special edition of December 2013. ISSN 2249-4928 Avleen kaur Malhi, Shalini Batra
12 Comparison of KNN and Slope one Algorithm in Sparse Environment International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4 Issue 4, April 2014 A. Kaleroun and S. Batra
13 A short survey of Advantages and Applications of Skip Graphs International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, Nov., 2013 Amritpal Singh, Shalini Batra
14 Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 International Journal of Computer Applications (IJCA), 99(14):17-23 Supriya Singla and  Sushma Jain
15 Does Porfolio Mix Influence the Mutual Fund Performance? Asia-Pacific Journal of Management Research and Innovation, Vol No. 9 Issue No. 4, December 2013 Nidhi Walia, Ravinder Kumar
16 Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN)    International Journal of Computer  Applications (IJCA), vol. 92, no. 5, pp. 46-50, April 2014. Published by Foundation of Computer Science, New York, USA. Gurpreet Singh Bedi, Ashima Singh
17 Analysis of Search Engine Optimization (SEO) Techniques International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol.4, issue 3, pp. 563-566, 2014. Gurpreet Singh Bedi, Ashima Singh
18 Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing   International Journal of Information & Computation Technology (IJICT), ISSN 0974-2239 Vol. 4, No. 10, pp. 997-1002, 2014 M. M. Sharma and A. Bala
19 Test sequence generation for Java7 fork/join using interference dependence Journal on Today’s Ideas – Tomorrow’s Technologies, Vol. 2, Issue. 1, 2014 Vipin Verma and Vinay Arora
20 A Survey Paper on Web Page Change Detection Engineering Sciences – International research journal, Vol.2, pp. 241-245, 2014 Vishnu Goel and Vinay Arora
21 WSN Routing Challenges : A Methodological Analysis International Journal of Advanced Research in Computer Engineering & Technology. Vol.3, Issue 3, March 2014. Sukhchandan Randhawa
22 Simulation and Comparative Analysis of Single Path and Multipath Routing Protocol for MANET. Anveshanam - The Journal Of Computer Science & Applications, 2(1), August 2013, pp. 30-35. Tarunpreet Bhatia, A.K. Verma
23 Performance Evaluation of AODV under Blackhole Attack International Journal Computer Network and Information Security, 5 (2), 2013, pp 35-44. Tarunpreet Bhatia, A.K. Verma