| 1 |
Cloud-based automatic test data generation framework |
Journal of Computer and System Sciences,Vol. 82, no. 5, PP. 712–738, 2016 |
Priyanka Chawla, Inderveer Chana and Ajay Rana |
1.1380 |
| 2 |
Comparison of HMM- and SVM-based stroke classifiers for Gurmukhi |
Neural Computing and Applications, 2016 |
Karun Verma, RK Sharma |
1.4920 |
| 3 |
An improved SVM using predator prey optimization and Hooke-Jeeves method for speech recognition |
Journal of Engineering Research,4(1), 1-20, 2016 |
Teena Mitaal, R. K. Sharma |
0.1280 |
| 4 |
Green Service Level Agreement (GSLA) Framework for Cloud Computing |
Computing, Springer,Volume 98, Issue 9, pp 949–963, 2016 |
Goyal, S. ; Bawa, S. ; Singh, B |
0.8720 |
| 5 |
Comparative analysis of cloud data integrity auditing protocols |
Journal of Network and Computer Applications, Vol. 66 Issue C, May 2016, pp 17-32.,2016 |
Neeru Garg, Seema Bawa |
2.3310 |
| 6 |
Energy optimized resource scheduling algorithm for private cloud computing |
International Journal of Ad Hoc and Ubiquitous Computing,Vol. 23, Issue 1-2, 2016 |
S. Goyal, S. Bawa and B. Singh |
0.4930 |
| 7 |
Detecting And Containing Malicious Services In An Intercloud Environment |
Journal of Web Engineering,Vol. 15, No.5&6 (Apr 2016), pp: 521-538, 2016 |
Lohit Kapoor, Seema Bawa, Ankur Gupta |
0.3900 |
| 8 |
Energy Efficiency Techniques in Cloud Computing- A Survey and Taxonomy |
ACM Computing Surveys,Volume 48 Issue 2, Article 22, 2016. |
Tarandeep Kaur and Inderveer Chana |
3.7300 |
| 9 |
EARTH- Energy-aware Autonomic Resource Scheduling in Cloud Computing |
Journal of Intelligent and Fuzzy System, Vol. 31, pp. 1-20 |
Sukhpal Singh and Inderveer Chana |
1.8120 |
| 10 |
Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly Optimization Approach |
Journal of Grid Computing,Volume 14, Issue 2, pp. 327–345, 2016 |
Nidhi Jain Kansal, Inderveer Chana |
1.5070 |
| 11 |
Energy aware scheduling of deadline-constrained tasks in cloud computing |
Journal of Cluster Computing,Volume 19, Issue 2, pp 679–698, 2016 |
Tarandeep Kaur and Inderveer Chana |
1.5000 |
| 12 |
Energy Efficient Data Dissemination in Multi- UAV Coordinated Wireless Sensor Networks |
Mobile Information Systems, 2016 |
Vishal Sharma, Ilsun You, Rajesh Kumar |
0.8720 |
| 13 |
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks |
International Journal of Ad Hoc and Ubiquitous Computing, Vol. 21, issue 2, pp. 140–155, 2016 |
Suman Bala, Anil K. Verma |
0.6900 |
| 14 |
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. |
Wireless Personal Communications,Vol. 89 No.2, 1-21, 2016 |
Goyal, Nitin, Mayank Dave, and Anil Kumar Verma |
0.6500 |
| 15 |
Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks |
Transactions on Internet & Information Systems,Vol. 10 Issue 4, p1571-1589, 2016 |
Anjali Anand, Rinkle Rani, Himanhsu Aggarwal |
0.5600 |
| 16 |
A Multilingual Cross-omain Client Application Prototype for UNL-ization and NL-ization for NLP Applications. |
Digital Scholarship in the humanities, 2016 |
Agarwal, Vaibhav, and Parteek Kumar |
0.4300 |
| 17 |
Fuzzy state Grammar and Fuzzy Deep Pushdown Automata |
Journal of Intelligent and Fuzzy Systems,31(1), 249-258, 2016 |
Nidhi Kalra, Ajay Kumar |
1.0040 |
| 18 |
An efficient scheme for automatic web pages categorization using the support vector machine |
The New Review of Hypermedia and Multimedia,vol. 22, no. 3, pp. 223-242, 2016 |
Vinod Kumar Bhalla, Neeraj Kumar |
0.6500 |
| 19 |
A Recursive Algorithm for Generalized Constraint SCS Problem |
National Academy Science Letters,pp 273-276, 2016 |
Kaish Mangal and Ravinder Kumar |
0.3450 |
| 20 |
Graph Coloring based Optimized Algorithm for Resource Utilization in Examination Scheduling |
An International Journal Applied Mathematics & Information Sciences,1193-1201; 2016 |
Sandeep Saharan and Ravinder Kumar |
1.2320 |
| 21 |
A systematic review of approaches for testing concurrent programs |
Concurrency and Computation: Practice And Experience,Vol. 5, pp. 1572 – 1611 |
Vinay Arora, Rajesh Bhatia, Maninder Singh |
0.9400 |
| 22 |
Conversion of fuzzy automata into fuzzy regular expressions using transitive closure |
Jounal of Intelligent & Fuzzy Systems vol.30,pp.3123-3129, 2016 |
Sunita Garhwal and Ramjiwari |
1.0040 |
| 23 |
An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection |
Journal of Engineering Research, Vol. 4(2), pp.65-85, 2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
0.1710 |
| 24 |
Block based High Capacity Multilevel Image Steganography |
Journal of Circuits, Systems and Computers, pp 1-21, 2016 |
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia |
0.3300 |
| 25 |
Multi-Model Persistent Solution for Healthcare Big Data |
Journal of Medical Imaging and Health Informatics, 2016 |
Karamjit Kaur and Rinkle Rani |
0.5800 |
| 26 |
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity |
Computers & Electrical Engineering, 2016 |
Venkatasamy Sureshkumar, R Anitha, N Rajamanickam, Ruhul Amin |
1.0840 |
| 27 |
A Survey on Resource Scheduling in Cloud Computing Issues and Challenges |
Journal of Grid Computing,Vol 14, no. 2, pp 217–264, 2016 |
Sukhpal Singh and Inderveer Chana |
1.5000 |
| 28 |
A Hybrid-Cascaded Framework for PET and SPECT Image Reconstruction |
Journal of Medical Imaging & Health Informatics (JMIHI) Vol. 6, 2016 |
Shailendra Tiwari, Rajeev Srivastava |
0.8770 |
| 29 |
A genetic algorithm based distance-aware routing protocol for wireless sensor networks |
Computers & Electrical Engineering,vol. 56, pp. 441-455, 2016 |
Tarunpreet Bhatia, Simmi Kansal Shivani Goel, A. K. Verma |
1.5700 |
| 30 |
Progressive Visual Cryptography with Unexpanded Meaningful Shares |
In ACM Transactions on Multimedia Computing Communication and Application, Vol 12(4), 2016 |
Shivendra Shivani, Suneeta Agarwal |
2.2500 |
| 31 |
Novel Basis Matrix Creation and Preprocessing Algorithms for Friendly Progressive Visual Secret Sharing with Space-Efficient Shares |
MULTIMEDIA TOOLS AND APPLICATIONS , 2016 |
Shivendra Shivani, Suneeta Agarwal |
1.5300 |
| 32 |
VPVC: Verifiable Progressive Visual Cryptography |
Pattern Analysis and Application,Vol 19, No. 3. , 2016 |
Shivendra Shivani, Suneeta Agarwal |
1.3500 |
| 33 |
Self authenticating medical X-ray images for telemedicine applications |
MULTIMEDIA TOOLS AND APPLICATIONS, 2016 |
Rajitha B, Shivendra Shivani, Suneeta Agarwal |
1.5300 |
| 34 |
Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System |
Computers & Electrical Engineering 52: 82-97, 2016 |
Rasmeet S. Bali, Neeraj Kumar |
1.5700 |
| 35 |
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud |
Peer-to-Peer Networking and Applications 9(5): 824-840, 2016 |
Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal |
1.2620 |
| 36 |
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm |
Security and Communication Networks 9(16): 3543-3557, 2016 |
Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao |
1.0670 |
| 37 |
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography |
Security and Communication Networks 9(17): 3944-3951, 2016 |
Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues |
1.0670 |
| 38 |
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures |
IEEE -Trans. Information Forensics and Security 11(9): 2052-2064, 2016 |
Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu |
4.3320 |
| 39 |
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem |
The Journal of Supercomputing 72(9): 3588-3600, 2016 |
Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen Chilamkurti |
1.3260 |
| 40 |
Fuzzy-based trust prediction for effective coordination in vehicular ad hoc networks |
International Journal Of Communication Systems, 2016 |
Avleen Kaur Malhi, Shalini Batra |
1.0660 |
| 41 |
Improved Multi-Objective Particle Swarm Optimization Algorithm for Optimizing Watermark Strength in Color Image Watermarking |
Applied Intelligence, 2016 |
Nitin Saxena and K.K. Mishra |
1.9040 |
| 42 |
A Nature Inspired Hybrid Optimization Algorithm for Dynamic Environment with Real Parameter Encoding |
International Journal of Bio-Inspired Computation, 2016 |
Ashish Tripathi, Nitin Saxena, K. K. Mishra and A. K. Misra |
1.3900 |
| 43 |
A parallel fuzzy clustering algorithm for large graphs using Pregel |
Expert Systems with Applications,Vol. 78, pp. 135-144, 2016 |
Vandana Bhatia and Rinkle Rani |
3.9300 |
| 44 |
A Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks |
Journal of communications and Networks,Vol. 18, No. 6, pp. 938-947, 2016 |
Anjali Anand, Rinkle Rani and Himanhsu Aggarwal |
1.1300 |
| 45 |
Content-based image retrieval embedded with agglomerative clustering built on information loss |
Computers & Electrical Engineering 54,506-521, 2016 |
Shreelekha Pandey, Pritee Khanna |
1.5700 |
| 46 |
Clustering of hierarchical image database to reduce inter-and intra-semantic gaps in visual space for finding specific image semantics |
Journal of Visual Communication and Image Representation,704-720, (2016) |
Shreelekha Pandey, Pritee Khanna, Haruo Yokota |
2.1640 |
| 47 |
A semantics and image retrieval system for hierarchical image databases |
Information Processing & Management,571-591, 2016 |
Shreelekha Pandey, Pritee Khanna, Haruo Yokota |
2.1640 |
| 48 |
G-FANET: An Ambient Network Formation Between Ground and UAVs |
Telecommunication Systems,pp 1-24, 2016 |
Vishal Sharma, Rajesh Kumar |
0.8220 |
| 49 |
A Multi-model Persistent Solution for Healthcare Big Data/td> |
Journal of Medical Imaging and Health Informatics,pp 937-947, 2016 |
Karamjit Kaur, Rinkle Rani |
0.9000 |
| 50 |
EMD based Steganography Techniques for JPEG2000 Images and Videos |
International Journal of Wavelets, Multiresolution and Information Processing, pp. 937-947, 2016 |
Karamjit Kaur, Rinkle Rani |
0.9000 |
| 51 |
Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN |
AEU-International Journal of Electronics and Communications, 2016 |
Ramnik Singh, A K Verma |
0.7860 |
| 52 |
A Novel Framework for Grading Writers using Offline Gurmukhi Characters |
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences,405-15, 2016 |
Munish Kumar, R. K. Sharma and M. K. Jindal |
0.1790 |
| 53 |
Integrated search technique for parameter determination of SVM for speech recognition |
Journal of Central South University, 2016 |
Teena Mitaal, R. K. Sharma |
0.5200 |
| 54 |
A note on data mining based noise diagnosis and fuzzy filter design for image processing |
Computers and Electrical Engineering,49-, 50, 2016 |
Rajiv Kumar, Khushneet Jindal |
1.0840 |
| 55 |
Multicast protection and grooming scheme in survivable WDM optical networks |
International Journal of Communication System,42-57, 2016 |
Ashok Kumar, Pradhan, SayanGhose, Tanmay de |
1.8600 |
| 56 |
Node stability aware single node failure recovery approach for WSANS |
MJC,Vol. 29, No. 2, 2016 |
V Ranga, M Dave, AK Verma |
0.4000 |
| 57 |
One-to-many authentication for access control in mobile pay-TV systems |
SCIENCE CHINA Information Sciences 59(5), 2016 |
Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee |
1.6280 |
| 58 |
Optimal nodes selection in wireless sensor and actor networks based on prioritized mutual exclusion approach |
Kuwait Journal of Science,vol. 43, pp. 150-173, 2016. |
Virendra Ranga, M Dave, A K Verma |
0.5000 |
| 59 |
PF-ID-2PAKA: Pairing Free Identity-based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks |
Wireless Personal Communications,Volume 87, Issue 3, pp 995–1012,2016 |
Gaurav Sharma, Suman Bala, Anil K. Verma |
0.6500 |
| 60 |
Prediction based proactive load balancing approach through VM migration. |
Engineering with Computers,581-592, 2016 |
AnjuBala and Inderveer Chana |
1.4600 |
| 61 |
Prediction of Compressive Strength of Concrete Using Artificial Neural Network and Genetic Programming |
Advances in Materials Science and Engineering, 2016 |
Palika Chopra, Dr. R.K.Sharma, Dr. Maneek Kumar |
1.010 |
| 62 |
Prediction-based proactive load balancing approach through VM migration |
Engineering with Computers,pp. 581-592, 2016 |
Anju Bala, Inderveer Chana |
1.4510 |
| 63 |
Predictive hierarchical human augmented map generation for itinerary perception |
IET Electronic Letters, Vol 52, 2016 |
Baljeet Kaur and Jhilik Bhattacharaya |
0.9400 |
| 64 |
Protein structure prediction (RMSD <= 5A') using machine learning models |
International Journal of Data Mining and Bioinformatics,71-85, 2016 |
Y Pathak, PS Rana, PK Singh and M Saraswat |
0.7000 |
| 65 |
QoS-aware Autonomic Resource Management in Cloud Computing: A Systematic Review/td> |
ACM Computing Surveys, 2016 |
Sukhpal Singh and Inderveer Chana |
3.7300 |
| 66 |
Quantum neural network based machine translator for English to Hindi |
Applied Soft Computing 38,1060–1075, 2016 |
Ravi Narayana, S. Chakraverty, V.P. Singh |
2.8000 |
| 67 |
Regression Based Weight Generation Algorithm in Neural Networks for Estimation of Frequencies of Vibrating Plate |
Journal of Computer Methods in Applied Mechanics and Engineering,4194-4202, 2016 |
S. Chakraverty, V. P. Singh and R. K. Sharma |
3.4600 |
| 68 |
Resource Provisioning and Scheduling in Clouds: QoS Perspective |
The Journal of Supercomputing,Vol. 72, no. 3, pp 926–960, 2016 |
Sukhpal Singh and Inderveer Chana |
0.8500 |
| 69 |
Secure clustering for efficient data dissemination in vehicular cyber-physical systems |
Future Generation Comp. Syst. 56: 476-492, 2016 |
Rasmeet S. Bali, Neeraj Kumar |
3.9970 |
| 70 |
Security analysis and design of an efficient ECC based two-factor password authentication scheme |
Security and Communication Networks, 2016 |
Tanmoy Maitra, Mohammad S Obaidat, SK Islam, Debasis Giri, Ruhul Amin |
0.8060 |
| 71 |
Self-Healing Neural Model For Stabilization Against Network Failures Over Networked UAVs |
IEEE Communications Letters,Volume: 19, Issue: 11, 2016 |
Vishal Sharma, Rajesh Kumar, Prashant Singh |
1.2910 |
| 72 |
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis |
The Journal of Supercomputing, pp. 1–28,2016 |
Rajkumar Tekchandani, Rajesh Bhatia and Maninder Singh |
1.3260 |
| 73 |
SERVmegh: framework for green cloud |
Concurrency and Computation, 2016 |
Ashok Kumar, Anju Sharma, Rajesh Kumar |
0.9420 |
| 74 |
SOCCER: Self-Optimization of Energy-efficient Cloud Resources |
Cluster Computing , Vol. 19, no. 4, pp. 1787-1800, 2016 |
Sukhpal Singh, Inderveer Chana, Maninder Singh and Rajkumar Buyya |
1.1540 |
| 75 |
Software component and the semantic Web: An in-depth content analysis and integration history |
Journal of System and Software, Vol.125, pages152-169, 2016. |
Loveleen Kaur, Ashutosh Mishra |
2.4440 |
| 76 |
Speech recognition using ANN and predator influenced civilized swam optimization algorithm |
Turkish Journal of Electrical Engineering & Computer Sciences 24, 4780-803, 2016 |
Teena Mitaal, R. K. Sharma |
0.5070 |
| 77 |
State Grammar and Deep Pushdown Automata for Biological Sequences of Nucleic Acids |
Current Bioinformatics, 11(4), 470-479, 2016 |
Nidhi Kalra, Ajay Kumar |
0.7700 |
| 78 |
Statistical Feature Extraction Based Iris Recognition System |
Sadhana-Academy Proceedings in Engineering Sciences, 507-18, 2016 |
Atul Bansal, R. Agarwal and R. K. Sharma |
0.5870 |
| 79 |
Teredo Tunneling Based Secure Transmission Between UAVs and Ground Ad Hoc Networks |
International Journal of Communication Systems, pp 1-25, 2016 |
Vishal Sharma, Rajesh Kumar |
1.0990 |
| 80 |
Three Tier Neural Model For Service Provisioning Over Collabrative Modulus Operator for Digital Images |
Neural Computing and Applications, pp. 1-21, 2016 |
Vishal Sharma, Rajesh Kumar |
1.4920 |
| 81 |
UAV Assisted Capacity Enhancement In Heterogenous Networks |
IEEE Communications Letters,Volume: 20, Issue: 6, Pages: 1207 - 1210, 2016 |
Vishal Sharma, Mehdi Bennis, Rajesh Kumar |
1.2910 |
| 82 |
UAVs Assisted Queue Scheduling in Ground Ad Hoc Networks |
International Journal of Ad Hoc and Ubiquitous Computing, 2016 |
Vishal Sharma, Rajesh Kumar |
0.4930 |
| 83 |
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing |
IEEE Communications Magazine54(10): 60-66, 2016 |
Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues |
10.4350 |
| 84 |
Wireless and Mobile Technologies for the Internet of Things |
Mobile Information Systems , 2016 |
Wireless and Mobile Technologies for the Internet of Things |
0.8490 |
| 85 |
Job Migration Policies for Grid Environment |
Wireless Personal Communication, 2016 |
Neeraj Kumar Rathore and Inderveer Chana |
0.951 |