Year 2014-15

List of research publications in SCI/Impact Factor journals

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors
1.        An Improved Algorithm for the Metamorphosis of Semi-Extended Regular Expressions to Deterministic Finite Automata The Computer Journal 10.1093/comjnl/bxu049doi, 2014 Ajay Kumar and Anil Kumar Verma
2.        Improvement in Rebalanced CRT RSA International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5492, Impact Factor: 0.39 Seema Verma Deepak garg;;
3.        Selectivity Estimation of range queries in Data Streams using Micro-clustering International Arab Journal of Information Technology (IAJIT) to be published in 2014, ID-5856, Impact Factor: 0.39 Sudhanshu Gupta; Deepak garg;
4.        Who Regulates Ethics in Virtual world? Science and engineering ethics Volume 21, no. 1 (2014): pp. 19-28. Seemu Sharma;Hitashi Lomash; and Seema bawa
5.        Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata using Partial Derivatives Chiang Mai Journal of Science Volume 41(5), pp. 1409-1418, 2014 Ajay Kumar; Anil Kumar Verma;
6.        A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata Applied Mathematics, Volume 8(1), pp. 95-105, 2014 Ajay Kumar; Anil Kumar Verma;
7.        Reducing Mutation Testing Endeavor using the Similar Conditions for the same Mutation Operators Occurs at Different Locations Applied Mathematics, Volume 8(5), pp. 2389-2393, 2014 Tannu Singla;Ajay Kumar;Sunita Garhwal;
8.        A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs WPC, Springer, Volume 77 pp. 2155-2182, 2014 V Ranga;M Dave; and Anil verma
9.        OANTALG: An Orientation based ANT colony ALGorithm for Mobile Adhoc Networks WPC, Springer, Volume 77 pp. 1859-1884, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
10.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs JNCA, Volume 45 151-167, 2014 G SINGH;N KUMAR; Neeraj kumar and Anil verma
11.    Anticipatory Bound Selection Procedure (ABSP) for Vertex K-center Problem International Arab Journal of Information Technology Volume 11 No 5, 2014 Rattan Rana; and  Deepak garg
12.    Cloud based intelligent system for delivering health care as a service Computer Methods and Programs in Biomedicine, Springer, Volume 113, pp. 346-359, 2014 Pankajdeep Kaur; and Inderveer Chana
13.    A resource elasticity framework for QoS-aware execution of cloud applications FGCS, Volume 37, pp. 14-35, 2014 Pankajdeep Kaur; and Inderveer Chana
14.    Variable Threshold Based Hierarchical Load Balancing Technique in Grid Engineering with computers, springer, Volume 30, 2014 Neeraj Rathore; and Inderveer Chana
15.    Artificial bee colony based energy-aware resource utilization technique for cloud computing CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,, Volume 24, DOI: 10.1002/cpe.3295, 2014 Nidhi Jain Kansal; and Inderveer Chana
16.    Job Migration with Fault Tolerance and QoS Scheduling using Hash Table Functionality in Social Grid Computing Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 21-35, 2014 Neeraj Rathore; and Inderveer Chana
17.    SHAPEâ¿¿an approach for self-healing and self-protection in complex distributed networks The Journal of Supercomputing, Volume 67, pp. 585-613, 2014 Inderpreet Chopra; and Maninder singh
18.    Software clone detection: a systematic review Information and Software technology, Volume 55, pp. 1165-1199, 2014 D Rattan;R Bhatia; and Maninder singh
19.    Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing Frontiers of Computer Science, Volume 8:04, pp. 656-666, 2014 Shi W., Gong P., Zhang Z.; and Neeraj kumar
20.    Learning Automata Based Opportunistic Data Aggregation and Forwarding Scheme for Alert Generation in Vehicular Ad Hoc Networks Computer Communications, Volume 39:01:00, pp. 22-32, 2014 Chilamkurti N., Rodrigues J.J.P.C.; and Neeraj kumar
21.    A two factor authentication scheme for Roaming Service in Global Mobility Networks IEEE Transactions on consumer Electronics, Volume 59:04:00, pp. 811-817 He D.B., Khan M.K., Lee J.K.; and Neeraj kumar
22.    An efficient Password based Three party Authenticated Multiple Key Exchange Protocol for Wireless Networks The Journal of Supercomputing, Volume 70:01:00, pp. 224-235, 2014 ;TIET H, He D, Kim J.; and Neeraj kumar
23.    A Peer-to-Peer Cooperative Caching Scheme for Data Dissemination in Urban Scenarios Using Vehicular Ad Hoc Networks IEEE Systems Journal, Volume 8:04, pp. 1136-1144, 2014 Lee H. J.; and Neeraj kumar
24.    EEMHR: Energy Efficient Multi-levels Heterogeneous Routing Protocol for Wireless Sensor Networks International Journal of Communication Systems Volume 27:09:00 pp. 1289-1318, 2014 Tanwar S;Niu J.; and Neeraj kumar
25.    Detection and Analysis of Secure Intelligent Universal Designated Verifier Signature Scheme for Electronic Voting System The Journal of Supercomputing Volume 70:01:00 pp. 177-199, 2014 Zho L;Tu Hang;Singh A;Chilamkurti N;Rho S; and Neeraj kumar
26.    Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol Journal of Medical Systems Volume 38:116, 2014 He D;Chilamkurti N;Lee J.H.; and Neeraj kumar
27.    LA-EEHSC: Learning Automata based Energy Efficient Heterogeneous Selective Clustering for Wireless Sensor Networks Journal of Networks and Computer Applications Volume 46:11:00 pp. 264-279, 2014 ;Tyagi S;Deng D.J.; and Neeraj kumar
28.    ANTALG: An Innovative ACO based Routing Algorithm for MANETs Journal of Networks and Computer Applications Volume 45 pp. 151-167, 2014 Singh G, Verma A.K.; and Neeraj kumar
29.    Collaborative Trust aware Intrusion Detection in VANETs Computers and Electrical Engineering Volume 40:06:00 pp. 1981-1996, 2014 Chilamkurti N; and Neeraj kumar
30.    Achieving QoS using Resource Allocation and Adaptive Scheduling in Cloud Computing with Support from Grid The Computer Journal Volume 57:02:00 pp. 281-290, 2014 Chilamkurti N., Zeadally S., Jeong Y.S.; and Neeraj kumar
31.    OANTALG: Orientation based ant colony algorithm for MANETs Wireless Personal Communications Volume 77:03:00 pp. 1859-1884, 2014 Singh G, Verma A.K.; and Neeraj kumar
32.    Enhanced Three-factor Security Protocol for USB Consumer Storage Devices IEEE Transactions on consumer Electronics Volume 60:01:00 pp. 30-37, 2014 He D., Khan M.K., Lee J.H; and Neeraj kumar
33.    Bayesian Coalition Game for Contention-aware Reliable Data Forwarding in Vehicular Mobile Cloud Future Generation Computer Systems :10.1016/j.future.2014.10.013, 2014 Iqbal R, Misra S.,Rodrgues J.J.P.C.; and Neeraj kumar
34.    Networks of learning automata for the vehicular environment: a performance analysis study IEEE Wireless Communication Volume 21:06 pp. 41-47, 2014 Misra S, Obaidat M.S., Rodrigues J.J.P.C., Pati B; and Neeraj kumar
35.    An intelligent approach for building a secure decentralized public key infrastructure in VANET Journal of Computer and System Sciences 10.1016/j.jcss.2014.12.016, 2014 Iqbal R, Misra S.,Rodrigues J.J.P.C.; and Neeraj kumar
36.    Power Consumption Based Simulation Model for Mobile Ad-hoc Network J. Wireless Personal communications Volume 77 pp. 1437-1448, 2014 Krishan Kumar; and Vp singh

 

S. No. Title of the paper Name of the Journal with volume, page nos., year Name of the authors Impact Factor
1 A Novel Hierarchical Technique for Offline Handwritten Gurmukhi Character Recognition Nat Acad Sci Letters 37(6) 567-72 2014 Munish Kumar; M K Jindal; R K Sharma 0.24
2 A Novel Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition IETE Journal of Research 59(6) 687-92 2013 Munish Kumar; M K Jindal; R K Sharma 0.189
3 Efficient Feature Extraction Techniques for Offline Handwritten Gurmukhi Character Recognition National Academy Science Letters 7(4) 381-91 2014 0.24 Munish Kumar; M K Jindal; R K Sharma 0.189
4 QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks Mobile Network and Applications, Amit Dua, Neeraj Kumar, Seema Bawa 1.04
5 Web presence of Indian Digital Culture Preservation, Digital Technology & Culture (PDTC), 2015, 44(2), De Gruyter Saur, pp 62- 68. Springer Seemu Sharma, Hitashi Lomash, Seema Bawa 0.963
6 A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE Communications Surveys & Tutorials, Vol.16, Issue:3, pp:1520-1549, 2014 Ratinder Kaur, Maninder Singh 6.94
7 Data Mining Based Integrated Network Traffic Visualization Framework for Threat Detection Neural Computing and Applications, Springer, Vol. 26, Issue:1, pp: 117-130 Amit Kumar Bhardwaj Maninder Singh 1.56
8 An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-antcolony optimisation approach Software: Practice And Experience DOI: 10.1002/spe.2263 (2014). Manoj Kumar, Arun Sharma, Rajesh Kumar 0.9
9 A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks Journal of intelligent and Robotic Systems,Volume 77, Issue 3-4, pp 629-652, Vishal Sharma, Rajesh Kumar 1.0
10 Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET Scientific World Journal, Vol 2014, 12 pages, 2014. dx.doi.org/10.1155/2014/136365 Tulika Pandey, Deepak Garg, MM Gore 1.7
11 Hybrid Approach using SVM and MM2 in Splice Site Junction Identification Current Bioinformatics Vol. 9, No. 1,pp. 76-85, Bentham Science, 2014 Srabanti Maji, Deepak Garg 2.017
12 Intelligent text classification system based on self-administered ontology Turkish Journal Of Electrical Engineering & Computer Sciences, Faith University, Turkey, 10.3906/elk-1305-112 Vol. 23, Issue 2015,pp. 1393-1404 Manoj Manuja, Deepak Garg 0.568
13 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Information Sciences, 321, 263-277 2015 Debiao He, Neeraj Kumar, Naveen K. Chilamkurti 4.038
14 A systematic review on heterogeneous routing protocols for wireless sensor network Network and Computer Applications, 53, 39-56, 2015 Sudeep Tanwar, Neeraj Kumar, Joel J. P. C. Rodrigues 2.229
15 Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21, 49-60, 2015 Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeojeong 0.619
16 An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks Mobile Networks and Applications, 20, 181-200, 2015 Amit Dua, Neeraj Kumar, Seema Bawa, Joel J. P. C. Rodrigues 1.045
17 Load Balancing and Job Migration Algorithm : Survey of Recent Trends Wireless Personal Communication, Volume 79, Issue 3, ISSN print 0929-6212, ISSN online 1572-834X, pp: 2089–2125 Neeraj Kumar Rathore and Inderveer Chana, 0.979
18 A Novel Strategy for Automatic Test Data Generation Strategy using Soft Computing Technique Frontiers of Computer Science, Springer, Sep 2014 Priyanka Chawla, Inderveer Chana, Ajay Rana 0.405
19 QRSF: QoS-aware resource scheduling framework in cloud computing The Journal of Supercomputing, Vol. 71, no. 1, pp: 241-292, 2015. Singh, Sukhpal, and Inderveer Chana 0.841
20 Intelligent failure prediction models for scientific workflows Expert Systems with Applications 42, no. 3 (2015): 980-989 Bala, Anju, and Inderveer Chana 1.92
21 A hyper-heuristic approach for resource provisioning-based scheduling in grid environment The Journal of Supercomputing, Springer, 20 January, 2015 Rajni Aron, Inderveer Chana and Ajith Abraham 0.841
22 Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing Concurrent Engineering: Research and Applications, , Volume 22, Issue 4, Pages 1–13 Sage Publishers Bala, Anju, and Inderveer Chana 0.531
23 A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography QoS Constraints. Multimedia Tools Appl.74, 3477-3488, 2015 Zezhong Zhang, Qingqing Qi, Neeraj Kumar, Naveen Chilamkurti, Hwa-Young Karamjit Kaur, Rinkle Rani 1.346
24 A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools Appl.74, 3477-3488, 2015 Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo 1.346
25 On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Networking and Applications 8, 881-885, 2015 Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen Chilamkurti, Hangbae Chang 0.632
26 An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications 8, 881-885, 2015 Hang Tu, Neeraj Kumar, Naveen Chilamkurti, Seungmin Rho 0.632
27 Secure pseudonym-based near field communication protocol for the consumer internet of things. IEEE Trans. Consumer Electronics 61,56-62, 2015 Debiao He, Neeraj Kumar, Jong-Hyouk Lee 1.045
28 Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems 58, 275-277, 2015 Neeraj Kumar, Al-Sakib Khan Pathan, Elias Procópio Duarte Jr., Riaz Ahmed Shaikh 0.705
29 Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints. IEEE Systems Journal 9, 675-685, 2015 Neeraj Kumar, Jong-Hyouk Lee 1.980
30 Managing Data in healthcare information systems: many models, one solution IEEE Computer , Vol. 48, No. 3, pp 52-59, 2015 Karamjit Kaur, Rinkle Rani 1.44
31 An Efficient Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks Discrete Mathematics & Theoretical Computer Science, Vol 17, No 1 (2015), pp. 317–338 Avleen Kaur, Shalini Batra 0.38
32 Protein structure prediction (RMSD ≤ 5 Å) using machine learning models Int. J. Data Mining and Bioinformatics, 2015, [In Press] Y Pathak, PS Rana, PK Singh and M Saraswat 0.66
33 Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm IETE Journal of Research, Vol. 61, pp. 22-31, 2015 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar 0.185

 

 

S. No. Title of the paper Name of the Journal with volume, page nos.,  year Name of the authors Impact Factor
1 An Analysis of Identity-Based Ring Signcryption Schemes for Wireless Sensor Networks International Information Institute Journal (SCIE-Indexed) Gaurav Sharma, Anil K. Verma 0.25
2 Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks. IJAHUC 12(1): 3-13 (2013). N. Kumar, N.Chilamkurti, J.H. Park, D.S. Park 0.65
3 A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks J. Network and Computer Applications 36(2): 623-645 (2013). S.Tyagi, N. Kumar 1.7
4 UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks Mathematical and Computer Modelling 57(11-12): 2750-2763 (2013). N. Kumar, N. Chilamkurti, J.H. Lee 2.02
5 Quantum Neural Network based Machine Translator for Hindi to English The Scientific World Journal Volume 2014 (2014), Article ID 485737, 8 pages http://dx.doi.org/10.1155/2014/485737 Ravi Narayan, V P Singh and Snehashish Chakraverty