2015 |
Arun Kumar Yadav and Divakar Yadav |
Wavelet Tree based Hybrid Geo-Textual Indexing
Technique for Geographical Search Vol 8(33)
|
Indian Journal of Science and Technology |
Scopus |
2016 |
Arun Kumar Yadav,Divakar Yadav and Rajesh Prasad |
Efficient Textual Web Retrieval
using Wavelet Tree, Vol 6(4) |
International Journal of Information Retrieval Research |
ESCI |
2019 |
Arun Kumar Yadav
and Divakar Yadav |
Wavelet Tree based Dual Indexing Technique for
Geographical Search, Vol 16(4) |
The International Arab Journal of Information Technology |
SCI-E |
2019 |
Jay Kant Pratap Singh Yadav, Arun Kumar Yadav, Divakar Yadav, Vikash Yadav |
Optimization of Hopfield Networks for Storage and Recall: A Decade Review
DOI: 10.1504/IJAIP.2021.10030669(In press) |
International Journal of Advanced Intelligence Paradigms |
Scopus |
2020 |
Arun Yadav, Jay Kant Pratap Singh Yadav, Divakar Yadav |
Spatial Ambiguities Optimization in GIR, Vol-7(28) |
EAI Endorsed Transactions on Scalable Information Systems |
ESCI |
2020 |
Arun Yadav, Divakar Yadav and Arti Jain |
An Improvised Feature-Based Method for Sentimental Analysis of
Product Reviews, Vol 8(29) |
EAI Endorsed Transactions on Scalable Information Systems |
ESCI |
2020 |
Yadav, D., Akanksha, Yadav, A.K. |
A novel convolutional neural network based model for recognition and classification of apple leaf diseases Vol. 37(6), pp. 1093-1101 |
Traitement du Signal |
SCI-E |
2021 |
Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav |
Microaneurysm Detection using Color Locus Detection Method |
Elsevier Publication ,Measurement 176 (2021) |
SCI-E |
2018 |
B. Subba, S. Biswas, S. Karmakar |
"A game theory based multi layered intrusion detection framework for VANET". Vol. No. 82 |
Future Generation Computer Systems, Elsevier |
SCIE |
2018 |
B. Subba, S. Biswas, S. Karmakar |
āFalse Alarm Reduction in Signature based
IDS: Game Theory Approachā. Vol. No. 9(18) |
Security and Communication Networks, Wiley |
SCIE |
2016 |
B. Subba, S. Biswas, S. Karmakar |
āIntrusion Detection in Mobile Ad-hoc Networks: Bayesian Game Formulation". Vol. No. 19(2) |
Engineering Science and Technology, an
International Journal (JESTECH), Elsevier, |
SCIE |
2018 |
B. Subba, S. Biswas, S. Karmakar |
āA game theory based
multi layered intrusion detection framework for wireless sensor networks.ā Vol. No. 25 |
International Journal of Wireless Information Networks, Springer, |
Web of Science (ESCI) |
2020 |
B. Subba, Prakriti Gupta |
"A TfidfVectorizer and Singular Value Decomposition based host intrusion detection system framework for detecting anomalous system processes," Vol. No. 100 |
Computers & Security, Elsevier |
SCIE |
2019 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Load balanced scheduling and reliability modelling of grid transaction processing system using coloured petri nets, Volume 84, January 2019, Pages 225-236
|
ISA Transactions, Elsevier |
SCI |
2017 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
On maximizing reliability of grid transaction processing system considering balanced task allocation using social spider optimization , Volume 38, February 2018, Pages 202-217 |
Swarm and Evolutionary Computation, Elsevier |
SCI |
2018 |
Dharmendra Prasad Mahato et al. |
On Scheduling Transactions in
a Grid Processing System considering load through Ant Colony Optimization
, Volume 61, December 2017, Pages 875-891
|
Applied Soft Computing, Elsevier |
SCI |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Load Balanced Transaction Scheduling using Honey Bee Optimization Considering
Performability in On-demand Computing System, DOI: 10.1002/cpe.4253 |
Concurrency and Computation: Practice and Experience, Wiley |
SCIE |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Balanced task allocation in the on-demand computing based transaction processing system
using social spider optimization, DOI: 10.1002/cpe.4214 |
Concurrency and Computation: Practice
and Experience, Wiley |
SCIE |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Maximizing availability for task scheduling in on-demand computing based transaction
processing system using ant colony optimization, DOI:10.1002/cpe.4405 |
Concurrency and Computation: Practice and Experience, Wiley |
SCIE |
2019 |
Dharmendra Prasad Mahato et al. |
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load |
Cluster Computing, Springer |
SCI (Published on 23rd November 2019) |
2021 |
Dharmendra Prasad Mahato and Van Huy Pham |
Reliability Analysis in Grid System Considering Load |
Cluster Computing, Springer |
SCI (Accepted on 13th January 2021) |
2021 |
Irphan Ali, Divakar Yadav |
Question Reformulation based Question Answering Environment Model, DOI: 10.1007/s41870-019-00332-8. |
International Journal of Information Technology, Springer ISSN: 2511-2104(Print), Vol. 13, 59ā67 |
Scopus, DBLP |
2019 |
JKPS Yadav, A. Yadav, D. Yadav, V. Yadav |
Optimization of Hopfield networks for storage and recall: A decade Review |
International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 . DOI:10.1504/IJAIP.2019.10026855 |
Scopus, DBLP |
2019 |
Anuja Arora, Riyu Bana, Habib Shahand Divakar Yadav |
Artificial Bee Colony Based Influence Maximization Approach for Social Coding Portal GitHub, Vol. 10, Issue 2, Article No. 4. |
International Journal of Swarm Intelligence Research (IJSIR), IGI Global, ISSN: 1947-9263 |
Web of Science, Scopus, DBLP |
2019 |
Irphan Ali, Divakar Yadav, and A.K. Sharma |
Question Answering System for Semantic Web: A Review (In Press) |
International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 |
Scopus, DBLP |
2019 |
Irphan Ali, Divakar Yadav, and A K Sharma |
SWFQA Semantic Web based Framework for Question Answering, Vol. 9, Issue 1, article 6, pp. 88-106. |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science, DBLP |
2019 |
A. Yadav, D. Yadav |
Wavelet Tree based Dual Indexing Technique for Geographical Search, Vol 16, No. 6, pp. 624-632. |
International Arab Journal of Information Technology, ISSN: 1683-3198 (print), ISSN: 2309-4524 |
Web of Science,, Scopus, DBLP |
2018 |
K. Vimal Kumar, Divakar Yadav |
Word Sense Based Hindi-Tamil Statistical Machine Translation, Vol 14(1), article No. 2, Pp. 17-27 |
International Journal of Intelligent Information Technologies, Idea Group publishing, USA, ISSN: 1548-3657|EISSN: 1548-3665 |
Web of Science, Scopus, DBLP |
2018 |
K. Vimal Kumar and Divakar Yadav |
Word Sense Based Approach for Hindi to Tamil Machine Translation Using English as Pivot Language, Vol. 11, Issue 3-4. |
International Journal of Advanced Intelligence Paradigms, InderScience, ISSN print: 1755-0386, ISSN online: 1755-0394. |
Scopus, DBLP |
2017 |
Mukta Goyal, Divakar Yadav, and Alka Tripathi |
An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learnerās Knowledge Level in E-Learning Decision-Making, Vol 13, No. 1, pp. 57-67. |
Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science, Scopus, DBLP |
2017 |
Madhulika, Bansal Abhay, Yadav Divakar |
A proposed quantitative approach to classify brain MRI |
International Journal of System Assurance Engineering and Management, ISSN: 0975-6809, Springer, Vol. 7, PP. 1-8
|
Web of Science, Scopus, DBLP, |
2016 |
Mukta Goyal, Divakar Yadav, and Alka Tripathi |
Intuitionistic Group Decision Making to Identify the Status of Studentās Knowledge Acquisition in E-learning Systems, Vol 5, Issue 3, pp. 14-29 |
International Journal of Fuzzy System Applications (IJFSA), IGI Global, ISSN: 2156-177X |
Scopus, DBLP |
2016 |
Mukta Goyal, Divakar Yadav and Alka Tripathi |
Intuitionistic fuzzy genetic weighted averaging operator and its application for multiple attribute decision making in E-learning, vol 9, Issue 1, pp. 1-15. |
Indian Journal of Science and Technology , ISSN: 0974-6846 (print), |
Web of Science, Scopus |
2016 |
A. Yadav, D. Yadav, R. Prasad |
Efficient Textual Web Retrieval using Wavelet Tree, DOI: 10.4018/IJIRR, Vol. 6, Issue 4, article 3, pp. 16-29 |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science, DBLP |
2015 |
A Yadav, D. Yadav |
Wavelet Tree based Hybrid Geo-Textual Indexing Technique for Geographical Search, pp. 1-7 |
Indian Journal of Science and Technology, Vol. 8(33), ISSN: 0974-6846 (print) |
Web of Science, Scopus |
2015 |
Madhulika, Bansal Abhay, Yadav Divakar, Gupta Priya |
A Proposed Stratification Approach for MRI images, Vol. 8(18), pp. 1-10 |
Indian Journal of Science and Technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) |
Web of Science, Scopus |
2015 |
Madhulika Bhatia, Abhay Bansal, Divakar Yadav, and Priya Gupta |
Proposed Algorithm to Blotch Grey Matter from Tumored and Non Tumored Brain Images", Vol. 8(17),pp. 1-10. |
Indian journal of Science and technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) |
Web of Science, Scopus |
2016 |
Mukta Goyal, Divakar Yadav and Alka Tripathi |
Aggregating evaluation using dynamic weighted intuitionistic fuzzy approach for concept sequencing in an E-learning system, Vol.7, No.1, pp.44 ā 65. |
International Journal of Mathematical Modelling and Numerical Optimisation, Inderscience Publisher, Switzerland, ISSN: 2040-3607(print), ISSN: 2040-3615(online) |
Scopus |
2015 |
Madhulika; Bansal, Abhay; Yadav, Divakar; and Madhurima |
Survey and Comparative Study on Statistical Tools for Medical Images, Volume 21, Number 1, January 2015, pp. 74-77(4). |
Advanced Science Letters, USA, ISSN: 1936-6612 (Print): EISSN: 1936-7317 (Online) |
Scopus |
2013 |
Sonia sanchez cuadrado, Vicente. Palacios, Divakar yadav, Christos dimou and Jorge Morato |
Evaluation of Semantic Retreival Systems on The Semantic Web, Vol 31, Issue 4, pp. 638-656 |
Library Hi Tech, Emerald, ISSN: 0737-8831, |
Web of Science, Scopus, DBLP |
2013 |
Pooja Gupta, Sandeep Kr Singh, Divakar Yadav and A. K. Sharma |
An Improved Approach to Rank Web Document, Vol 9, No. 2, pp. 217-236. |
Journal of Information Processing System, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science, Scopus, DBLP |
2013 |
Divakar Yadav, Sonia SƔnchez-Cuadrado and Jorge Morato |
Optical Character Recognition for Hindi Language Using a Neural-network Approach, Vol. 9, No. 1, pp. 117~140 |
Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science, Scopus and DBLP |
2012 |
Divakar Yadav, AK Sharma, Sonia Sanchez-Cuadrado, Jorge Morato |
An Approach to Design Incremental Parallel WebCrawler, Vol. 43 No.1, pp. 8-29, |
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645 |
Scopus, DBLP |
2012 |
Mukta Goyal, Divakar Yadav and Alka Choubey |
E-learning: Current State of Art and Future Prospects, Volume 9, Issue 3, No. 2, pp. 490-499, |
International Journal of Computer Science Issues, Softwarefirst ltd, ISSN 1694-0814 |
DBLP |
2011 |
Pooja Gupta, A. K. Sharma and Divakar Yadav |
āA Novel Technique for Back-link Extraction and Relevance Evaluation, Vol 3, No 3, pp. 227- 238, |
International Journal of Computer Science & Information Technology (IJCSIT), Academy and Industry Research Collaboration Center, ISSN No.0975-4660 (online), |
Indian Citation Index |
2009 |
Divakar Yadav, A.K. Sharma and J.P. Gupta |
āTopical Web Crawling Using Weighted Anchor Text and Web Page Change Detection Techniques, Issue 2, Vo; 6, pp. 263-275 |
WSEAS Transaction on Information Science and Applications, Greece, ISSN:1790-0832, |
SCOPUS |
2008 |
Divakar Yadav, A.K. Sharma and J.P. Gupta |
Parallel Crawler Architecture and Web Page Change Detection Techniques, Issue 7, Vol 7, Pp. 929-941 |
WSEAS Transaction on Computers, ISSN: 1109-2750 |
SCOPUS |
2014 |
A. Yadav, D. Yadav |
A Review on Spatial Access Methods, pp. 13-19 |
International Journal of Software and Web Sciences, 8(1), ISSN: 2279-0063 (Print), 2279-0071 (Online) |
- |
2010 |
Vishwaratana Nigam, Divakar Yadav and Manish K. Thakur |
A Novel Approach for Hand Analysis Using Image Processing Techniques, Vol 8, No.2, pp. 320-323 |
International Journal of Computer Science and Information Security, ISSN 1947-5500 |
- |
2020 |
Prem Sagar Sharma, Divakar Yadav |
A Systematic Review on Page Ranking Algorithms |
International Journal of Information Technology, Springer ISSN: 2511-2104 |
Scopus, DBLP |
2020 |
Adarsh Kumar, Saurabh Jain, Divakar Yadav |
A Novel Simulation Annealing Enabled Ranking and Scaling Statistical Simulation Constrained Optimization Algorithm for Internet-of-things (IoTs) |
Smart and Sustainable Built Environment, Emerald Publishing, ISSN: 2046-6099 |
Web of Science, Scopus |
2020 |
Prem Sagar Sharma, Divakar Yadav |
Incremental Refinement of Page Ranking of Web Pages |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science, DBLP |
2020 |
A. Yadav, D. Yadav, A.Jain |
An Improvised Feature-Based Method for Sentimental Analysis of Product Reviews |
EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 |
Web of Science, DBLP |
2020 |
A. Yadav, JKPS Yadav, D. Yadav |
Spatial Ambiguities Optimization in GIR |
EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 |
Web of Science, DBLP |
2020 |
Arti Jain, Divakar Yadav, Anuja Arora |
Particle Swarm Optimization for Punjabi Text Summarization |
International Journal of Operations Research and Information Systems (IJORIS), IGI Global, ISSN: 1947-9328 |
Indexed in Scopus, DBLP |
2020 |
Yadav, D., Akanksha, Yadav, A.K. |
A novel convolutional neural network based model for recognition and classification of apple leaf diseases |
Traitement du Signal, Vol. 37(6), pp. 1093-1101 |
Web of Science, Scopus |
2021 |
Arti Jain, Divakar Yadav, Anuja Arora |
Particle Swarm Optimization for Punjabi Text Summarization |
International Journal of Operations Research and Information Systems (IJORIS), IGI Global, ISSN: 1947-9328, Volume 12, Issue 3, Article 1. |
DBLP, ACM digital library |
2021 |
Arti Jain, Anuja Arora, Divakar Yadav, Jorge Morato, Amanpreet Kaur |
Novel Text Summarization Technique for Punjabi Language Using Neural Networks |
International Arab Journal of Information Technology (In Press) |
Web of Science, Scopus |
2021 |
Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav |
Microaneurysm Detection using Color Locus Detection Method |
Measurement, Elsevier Publication (In Press) |
Web of Science, Scopus |
2015 |
Chandrashekar Jatoth, G.R. Gangadharan, and Rajkumar Buyya |
Computational intelligence based QoS-aware web service composition: a systematic literature review, Vol.10,No.03,PP.475-492 |
IEEE Transactions on Services Computing, IEEE (IF:5.707) |
SCI |
2017 |
Chandrashekar Jatoth, G.R. Gangadharan, Fiore, Ugo and Rajkumar Buyya |
QoS-aware Big service composition using Map-Reduce based evolutionary algorithm with guided mutation, Vol.86,PP.1008-1018. |
Future Generation Computer Systems, Elsevier (IF:5.768) |
SCI |
2017 |
Chandrashekar Jatoth, G.R. Gangadharan, and Fiore, Ugo |
Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis, Vol. 21, No. 23, PP. 7221-7234 |
Soft Computing, Springer (IF:2.784) |
SCI |
2018 |
Chandrashekar Jatoth, G.R. Gangadharan, Fiore, Ugo, and Rajkumar Buyya |
SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services, DOI: https://doi.org/10.1007/s00500-018-3120-2 |
Soft Computing, Springer (IF:2.784) |
SCI |
2019 |
Chandrashekar, Jatoth, G Siva Kumar, Gangadharan, G.R., and Rajkumar, Buyya |
QoS-aware cloud service composition using eagle strategy, Vol. 90, PP. 273-290 |
Future Generation Computer Systems, Elsevier (IF:5.768) |
SCI |
2019 |
Chandrashekar, Jatoth, Gangadharan, G.R., and Rajkumar, Buyya |
Optimal Fitness Aware Cloud Service Composition using an Adaptive Genotypes Evolution based Genetic Algorithm, Vol. 94, PP. 185-198 |
Future Generation Computer Systems, Elsevier (IF:5.768) |
SCI |
2019 |
Chandrashekar Jatoth, G.R. Gangadharan, and Fiore, Ugo |
Optimal fitness aware cloud service composition using modified invasive weed optimization, Vol. 44, PP. 1073-1091 |
Swarm and evolutionary computation, Elsevier (IF:6.330) |
SCIE |
2019 |
B Bhaskar, Chandrashekar Jatoth, G.R. Gangadharan, U Fiore |
A MapReduce-based modified Grey Wolf optimizer for QoS aware big service composition, Vol.32, No.8, PP.e5351. |
Concurrency and Computation: Practice and Experience (IF:1.167) |
SCI |
2020 |
Narayana P, Chandrashekar Jatoth, Prem Chand |
Optimizing Resource Scheduling based on Extended Particle
Swarm Optimization in Fog Computing Environment (In-Press) |
Concurrency and Computation: Practice and Experience (IF:1.447) |
SCI |
2019 |
Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava |
Extraction of reordering rules for statistical machine translation. & Vol. 36, no. 5 |
Journal of Intelligent & Fuzzy Systems |
SCI |
2019 |
Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava |
An Automatic and A Machine-Assisted Method to Clean Bilingual Corpus & Volume 19 Issue 1 |
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
SCI |
2019 |
Jyoti Srivastava, Tanveer J. Siddiqui, Prof. U. S. Tiwary, Ashish Kumar Srivastava |
MFCC Based Speech Retrieval & Vol 8, no. 9 |
International Journal of Innovative Technology and Exploring Engineering |
SCOPUS |
2018 |
Nagendra Pratap Singh, Rajeev Srivastava |
āExtraction of retinal blood vessels by using an extended matched filter basedon
second derivative of Gaussianā |
National Academy of Sciences, India Section A, springer publication. DOI https://doi.org/10.1007/s40010-017-0465-3 |
SCI Impact factor 0.754 |
2016 |
Nagendra Pratap Singh, Rajeev Srivastava |
"Retinal blood vessels segmentation by using Gumbel Probability Distribution
Function based matched filter" |
Computer Methods and Programs in Biomedicine, Elsevier. DOI
http://dx.doi.org/doi:10.1016/j.cmpb.2016.03.001. |
SCI Impact factor 3.424 |
2015 |
Nagendra Pratap Singh, Rajeev Srivastava |
"Segmentation of retinal blood vessels by using a matched filter based on second
derivative of Gaussian" |
International Journal of Biomedical Engineering and Technology, DOI: http://dx.doi.org/10.1504/IJBET.2016.078286 |
Scopus Indexed |
2011 |
Mrinal Kanti Debbarma, Nagendra Pratap Singh, Amit Kumar. Shrivastava, and Rishi Mishra |
"Analysis of Software Complexity Measures for Regression Testing" Volume 1ā No.2 |
ACEEE Int. J. on Information Technology |
ACEEE |
2011 |
Nagendra Pratap Singh, Rishi Misra, Rajit Ram Yadav |
"Analytical review of test redundancy detection techniques", (0975 ā 8887)
Volume 27ā No.1 |
International Journal of Computer Applications |
IJCA |
2012 |
Shivendu Mishra, Ritika Yaduvanshi, Anjani Kumar Rai, Nagendra Pratap Singh |
"An ID-Based Signature Scheme from Bilinear Pairing Based on Ex-K-Plus Problem", Vols. 408, pp. 929-934 |
Advanced Materials Research |
Trans Tech Publications, Switzerland |
2013 |
Nagendra Pratap Singh, Rishi Mishra, Sailesh Tiwari, A. K. Misra |
"An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations" Vol. 5, No. 2 |
International Journal of Computer Theory and Engineering |
IJCTE |
2010 |
Rishi Misra, Nagendra Pratap Singh |
"Analysis of Unit Testing using Petri Net", Vol. 2, No. 3, pp 501-506 |
International Journal of Information Sciences and application |
IJISA |
2019 |
Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Vishal Kaushal |
"On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load" |
Cluster Computing |
SCI Impact factor 1.851 |
2020 |
Sushil Kumar Saroj, Rakesh Kumar, Nagendra Pratap Singh |
"FrƩchet PDF based Matched Filter Approach for Retinal Blood Vessels Segmentation" Vol-194 |
Computer Methods and Programs in Biomedicine, Elsevier. DOI
http://dx.doi.org/doi:10.1016/j.cmpb.2016.03.001. |
SCI Impact Factor 3.424
|
2005 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āEnergy Efficient Cache Invalidation in a Mobile Environment,ā International Journal of Digital Information Management (JDIM) special issue on Distributed Data Management, Vol. 3, No. 2, pp. 119-125, June 2005 |
International Journal of Digital Information Management |
Scopus |
2006 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āA Zone Cooperation Approach for Efficient Caching in Mobile Ad Hoc Network,ā International Journal of Communication Systems, Vol. 19, No. 9, pp. 1009-1028, Nov 2006 |
International Journal of Communication Systems |
SCI |
2007 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āEnergy Efficient Cache Invalidation in a Disconnected Wireless Mobile Environment,ā International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 2, No. 1/2, pp. 83-91, 2007 |
International Journal of Ad Hoc and Ubiquitous Computing |
SCI |
2007 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āSupporting Cooperative Caching in Mobile Ad Hoc Networks Using Clusters,ā International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) special issue on Pervasive Computing through Networked Sensing Devices, Vol. 2, No. 1/2, pp. 58-72, 2007 |
International Journal of Ad Hoc and Ubiquitous Computing |
SCI |
2007 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āCooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters,ā International Journal of Wireless Personal Communications special issue on Cooperation in Wireless Networks, Vol. 43, Issue 1, pp. 41-63, Oct 2007 |
International Journal of Wireless Personal Communications |
SCI |
2007 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āCooperative Caching in Mobile Ad Hoc Networks Based on Data Utility,ā International Journal of Mobile Information Systems, Vol. 3, No. 1, pp. 19-37, 2007 |
International Journal of Mobile Information Systems |
SCI |
2007 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āExploiting Caching in Heterogeneous Mobile Environment,ā Wireless Communications and Mobile Computing Journal (WCMC) Special Issue on Advances in Resource-Constrained Device Networking, Vol. 7, Issue 7, pp. 835-848, September 2007 |
Wireless Communications and Mobile Computing Journal |
SCI |
2009 |
Narottam Chand, R.C. Joshi and Manoj Misra |
Narottam Chand, R.C. Joshi and Manoj Misra, āEnergy Efficient Cache Replacement in Mobile Computing Environment,ā Ubiquitous Computing and Communication Journal, pp. 1-12, 2009 |
Ubiquitous Computing and Communication Journal |
- |
2009 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āTrap Assisted Tunneling Model for Gate Current in Nano Scale MOSFET with High-K
Gate Dielectrics,ā International Journal of Electrical and Electronics Engineering, Vol. 3, No. 7, pp. 400-407, 2009 |
International Journal of Electrical and Electronics Engineering |
- |
2009 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āGate Tunnel Current Calculation for NMOSFET Based on Deep Sub-Micron Effects,ā International Journal of Electrical and Electronics Engineering, Vol. 3, No. 7, pp. 424-432, 2009 |
nternational Journal of Electrical and Electronics Engineering |
- |
2009 |
Surender Soni and Narottam Chand |
Surender Soni and Narottam Chand, āEnergy Efficient Multi-Level Clustering to Prolong the Lifetime of Wireless Sensor Networks,ā Journal of Computing, Vol. 2, Issue 5, pp. 158-165, May 2010 |
Journal of Computing |
- |
2010 |
Prashant Kumar, Naveen Chauhan, Lalit Awasthi and Narottam Chand |
Prashant Kumar, Naveen Chauhan, Lalit Awasthi and Narottam Chand, āProactive Approach for Cooperative Caching in Mobile Adhoc Networks,ā International Journal of Computer Science Issues, Vol. 7, No. 8, pp. 21-27, May 2010 |
International Journal of Computer Science Issues |
- |
2010 |
Vishal Kumar and Narottam Chand |
Vishal Kumar and Narottam Chand, āData Scheduling in VANETs: A Review,ā International Journal of Computer Science & Communication, Vol. 1, No. 2, pp. 399-403, July 2010 |
International Journal of Computer Science & Communication |
- |
2010 |
Vaibhav Pandey, Amarjeet Kaur and Narottam Chand |
Vaibhav Pandey, Amarjeet Kaur and Narottam Chand, āA Review on Data Aggregation Techniques in Wireless Sensor Network,ā Journal of Electronic and Electrical Engineering, Vol. 1, Issue 2, pp. 1-8, 2010 |
Journal of Electronic and Electrical Engineering |
- |
2010 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āA Compact Gate Tunnel Current Model for Nano Scale MOSFET with Sub-1nm Gate Oxide,ā International Journal of Applied Engineering Research, Vol. 1, No. 2, pp. 175-193, 2010 |
International Journal of Applied Engineering Research |
- |
2010 |
Vishal Kumar and Narottam Chand |
Vishal Kumar and Narottam Chand, āEfficient Data Scheduling in VANETs,ā Journal of Computing, Vol. 2, Issue 9, pp. 33-37, Sep 2010 |
Journal of Computing |
- |
2010 |
Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra |
Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra, āGlobal Cluster Cooperation Strategy in Mobile Ad Hoc Networks,ā International Journal on Computer Science and Engineering, Vol. 2, No. 7, pp. 2268-2273, Oct 2010 |
International Journal on Computer Science and Engineering |
- |
2010 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āAnalytical Gate Current Modelling in Nano Scale MOSFET with High-k
Gate stack Structure,ā Journal of Electrical and Electronics
Engineering, Vol. 3, No. 2, pp. 169-174, Oct 2010 |
Journal of Electrical and Electronics
Engineering |
Scopus |
2010 |
Vivek Katiyar, Narottam Chand and Surender Soni |
Vivek Katiyar, Narottam Chand and Surender Soni, āClustering Algorithms for Heterogeneous Wireless Sensor Network: A Survey,ā International Journal of Applied Engineering Research, Vol. 1, No. 2, pp. 273-287, Oct 2010 |
International Journal of Applied Engineering Research |
- |
2010 |
Vivek Katiyar, Narottam Chand and Naveen Chauhan |
Vivek Katiyar, Narottam Chand and Naveen Chauhan, āRecent Advances and Future Trends in Wireless Sensor Networks,ā International Journal of Applied Engineering Research, Vol. 1, No. 3, pp. 330-342, Nov 2010 |
International Journal of Applied Engineering Research |
- |
2010 |
Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra |
Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra, āEnergy Efficient Cooperative Caching in Mobile Ad Hoc Networks,ā International Journal of Applied Engineering Research, Vol. 1, No. 3, pp. 360-371, Nov 2010 |
International Journal of Applied Engineering Research |
- |
2010 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āImpact of Gate Engineering on Gate Leakage Behavior of Nano Scale MOSFETs with High-k Dielectrics,ā International Journal of Nanoelectronics and Optoelectronics, Vol. 5, No. 3, pp. 343-348, 2010 |
International Journal of Nanoelectronics and Optoelectronics |
SCI |
2010 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āGate Current Modeling and Optimization of High-k Gate Stack MOSFET Structure in Nano Scale Regime,ā International Journal of Micro-Nano Scale Transport, Vol. 1, No. 3, pp. 253-268, 2010 |
International Journal of Micro-Nano Scale Transport |
- |
2010 |
Ashwani Kumar, Narottam Chand and Vinod Kapoor |
Ashwani Kumar, Narottam Chand and Vinod Kapoor, āGate Leakage Reduction Through the use of Source/Drain-to-Gate Non-overlapped MOSFET Structure,ā Journal of Nanoengineering and Nanosystems, Vol. 224, No. 4, pp. 173-181, 2010 |
Journal of Nanoengineering and Nanosystems |
Scopus |
2018 |
Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
IGI Global |
International Journal of Web Services Research |
SCIE, SCOPUS |
2017 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2017 |
Prashant Kumar, Naveen Chauhan and Narottam Chand |
SCRSC |
International Journal of Grid and Distributed Computing |
SCOPUS |
2016 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi and Naveen Chauhan |
IJNGC |
International Journal of Next Generation Computing |
DBLP |
2015 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2019 |
Sanjay Kumar Dhurandher, Nitin Gupta, and Petros Nicopolitdis |
Contract Theory based Medium Access Contention
Resolution in TDMA Cognitive Radio Networks
Digital Object Identifier: Vol. 68, Issue 8, 8026-8035 |
IEEE Transactions on Vehicular Technology |
Q1 SCI (I.F. 5.379) |
2020 |
Nitin Gupta, Sanjay K Dhurandher, Aarushi Sehgal |
A Contract Theory Approach Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks |
IEEE Systems Journal |
Q1 SCI (I.F. 3.987) |
2020 |
Anshu Thakur, Ashok Kumar and Nitin Gupta, Puspita Chatterjee |
Secrecy Analysis of Reconfigurable Underlay
Cognitive Radio Networks with SWIPT and
Imperfect CSI , Early Access, 10.1109/TNSE.2020.3040531 |
IEEE Transactions on Network Science and Engineering |
Q1 SCI (I.F. 5.213) |
2019 |
Anshu Thakur, Ashok Kumar, Nitin Gupta, Ajay Singh |
Secrecy Outage Performance Analysis of MIMO Underlay
Cognitive Radio Networks with Delayed CSI and Transmitter
Antenna Selection |
International Journal of Communication Systems, Wiley |
Q2 SCI (I.F. 1.319) |
2019 |
Nitin Gupta, Sanjay K. Dhurandher |
Cross-layer Perspective for Channel Assignment in Cognitive
Radio Networks: A Survey
e4261. https://doi.org/10.1002/dac.4261 |
International Journal of Communication Systems, Wiley |
Q2 SCI (I.F. 1.319) |
2020 |
Riya, Nitin Gupta, Sanjay K. Dhurandher |
Efficient Caching Method in Fog Computing for
Internet of Everything |
Peer to Peer Networking and Applications, Springer |
Q2 SCI (IF 2.793) |
2020 |
Anshu Thakur, Ashok Kumar, Nitin Gupta, |
Secrecy Analysis of MIMO Underlay Cognitive Radio Networks with Energy Harvesting |
Transactions on Emerging Telecommunications Technologies, Wiley |
Q2 SCI (I.F. 1.594) |
2018 |
Nitin Gupta, Sanjay K. Dhurandher and Isaac Woungang |
Sub-Carriers Assignment Scheme for Multiple Secondary Users in OFDMA Based IEEE 802.22 WRAN: A Game Theoretic Approach
https://doi.org/10.1002/ett.3502 |
Transactions on Emerging Telecommunications Technologies, Wiley |
Q2 SCI (I.F. 1.594) |
2021 |
Sejal Gupta, Ritu Garg, Nitin Gupta, Waleed S Alumany, Uttam Ghosh and Pradip K. Sharma |
Energy-ecient Dynamic Homomorphic Security Scheme for Fog Computing in IoT Networks, 58(102768) |
Journal of Information Security and Applications, Elsevier |
Q2 SCI (I.F. 2.327) |
2020 |
Shushant Sharma, Nitin Gupta |
Federated Learning Based Caching in Fog Computing for Future Smart Cities |
Internet Technology Letters, Wiley |
E-SCI, Web of Science, DBLP |
2019 |
Nitin Gupta, Sanjay K. Dhurandher,
Isaac Woungang and Joel j.P.C. Rodrigues |
On the Target Channel Sequence
Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area
Networks
Vol:8, No.:4 |
International Journal of Space-Based and Situated Computing, Inderscience |
E-SCI, Web of Science, DBLP |
2021 |
Varan Singh Rohila, Nitin Gupta, Amit Kaul, Deepak Kumar Sharma |
Deep Learning Assisted Covid-19 Detection using full CT-scans ⯠|
Internet of Things, Elsevier |
New Journal, Not Indexed Yet |
2017 |
Nilanshi Chauhan and Pardeep Singh |
Identifying the Opinion Orientation of Online Product Reviews at Feature Level: A Pruning Approach |
International Journal of Information System Modeling and Design |
Scopus |
2015 |
Pardeep Singh and Kamlesh Dutta |
Automation and Validation of Annotation for Hindi Anaphora Resolution |
International Journal of Advanced Computer Science and Applications (IJACSA) |
Scopus |
2019 |
Namrata Kumari, Ankit Guleria, Radhika Sood and Pardeep Singh |
A Supervised Approach for Keyphrase Extraction using SVM |
International Journal of Control and Automation |
Scopus |
2020 |
Namrata Kumari, Pardeep Singh. |
Automated Hindi Text Summarization Using TF-IDF and Textrank Algorithm, 7(17): pp 2547-2555, 2020;, doi: 10.31838/jcr.07.17.315 |
Journal of Critical Reviews |
Scopus |
2020 |
Kususm Lata, Pardeep Singh, Kamlesh Dutta |
A comprehensive review on feature set used for anaphora resolution |
Artificial Intelligence Review |
SCI |
2016 |
Prakash Choudhary and Neeta Nain |
A Four-Tier Annotated Urdu Handwritten Text Image Dataset for Multidisciplinary Research on Urdu Script, Vol. 15(4) |
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
SCI |
2018 |
PK Bhagat and Prakash Choudhary |
Image Annotation: Then and Now, Vol. 80(3) |
Image and Vision Computing |
SCI |
2018 |
Sanasam Inunganbi and Prakash Choudhary |
Recognition of Handwritten Meitei Mayek Script Based on Texture Feature 7(5) |
International Journal of Natural Language Computing(IJNLC) |
Other |
2019 |
S. inunganbi, Prakash Choudhary and K. Mangalem Singh |
Local Texture Descriptors and Projection Histogram based Handwritten Meitei Mayek Character Recognition |
Multimedia Tools and Applications |
SCI |
2019 |
Prakash Choudhary and Abhishek Hazra |
Chest Disease Radiography in Twofold: Using Convolutional Neural Networks and Transfer Learning, |
Evolving Systems |
SCI |
2020 |
Sanasam Inunganbi, Prakash Choudhary and Khumanthem Manglem |
Meitei Mayek handwritten dataset: compilation, segmentation, and character recognition |
The Visual Computer |
SCI |
2020 |
Prakash Choudhary and Neeta Nain |
CALAM: Model-Based Compilation and Linguistic Statistical Analysis of Urdu
Corpus Vol. 45(20) |
Sadhana |
SCI |
2020 |
Abhishek Hazra, Prakash Choudhary, Sanasam Inunganbi & Mainak Adhikari |
Bangla-Meitei Mayek Scripts Handwritten Character Recognition using Convolutional Neural Network |
Applied Intelligence |
SCI |
2020 |
Sanasam Inunganbi, Prakash Choudhary and Khumanthem Manglem Singh |
Line and word segmentation of handwritten text document by mid-point detection and gap trailing |
Multimedia Tools and Applications |
SCI |
2021 |
PK Bhagat and Prakash Choudhary |
A Novel Approach based on Fully Connected Weighted Bipartite Graph for Zero-Shot Learning Problems (68) |
Journal of Ambient Intelligence and Humanized Computing |
SCI |
2020 |
Sanasam Inunganbi, Prakash Choudhary and Kh. Singh |
Handwritten Meitei Mayek recognition using threeāchannel convolution neural network of gradients and gray 37(6) |
Computational Intelligence |
SCI |
2016 |
Rathee Priyanka, Singh, R . and Kumar, S . |
"Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals."Ā Wireless Personal Communications: 89(1), 61-78 |
Wireless Personal Communication |
SCI |
2019 |
Priyanka |
Performance Analysis of IEEE 802.11p using continuous time Markov Chain, ,Ā 152, 309-315. |
Procedia Computer Science
|
SCI |
2019 |
Priyanka, Singh, R . and Kumar, S . |
Performance Analysis of IEEE 802.11 p Protocol with Retry Limit in VANETs: An Analytical study.Ā Procedia Computer Science,Ā 152, 195-203.
|
Procedia Computer Science |
SCI |
2017 |
Priyanka, Singh, R. and Kumar, S. |
Analytical Modelling of Back-off Process of IEEE 802.11p using Continuous Markov Chain in VANETs. |
International Journal of Computer Applications 172(9):14-20, August 2017. ISSN 0975 - 8887 |
UGC Listed |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Energy Efficient Entropy Based Clustering in Wireless Sensor Networks |
International Journal of Grid and Distributed Computing (IJGDC) |
Scopus |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Predicting Missing Values in Wireless Sensor Network using Spatial-Temporal Correlation |
International Journal of Computer Networks and Wireless Communications (IJCNWC) |
DOAJ |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Adaptive Clustering in Wireless Sensor Networks |
International Journal of Multimedia and Ubiquitous Engineering (IJMUE) |
Scopus |
2017 |
Pushpender Kumar, Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Enhancing the Lifetime of Wireless Multimedia Sensor Network Through Image Fusion |
International Journal of Grid and Distributed Computing (IJGDC) |
Scopus |
2014 |
JaideepLakhotia and Rajeev Kumar |
Cluster Based Routing Protocols for Mobile Wireless Sensor Network: A Review |
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) |
Open Access |
2013 |
Sushil Sarwa, Rajeev Kumar |
Selective Forwarding Attack and Its Detection Algorithms: A Review |
International Journal of Computer and Information Engineering |
International Science Index |
2019 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Energy Map Generation in Wireless Sensor
Network using Grey System Theory |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) |
Scopus |
2020 |
Rajeev Kumar, Vibha Jain, Naveen Chauhan, Narottam Chand |
An Adaptive Prediction Strategy with Clustering in Wireless Sensor Network pp 575 - 587 |
International Journal of Wireless Information Networks. Volume 27, Issue 4 |
ESCI |
2016 |
SANGEETA SHARMA, MEENU CHAWLA |
A three phase optimization method for precopy based vm live migration, vol. 5, no. 1 |
Springer Plus |
SCI and Scopus |
2017 |
NITESH BHAROT, PRIYANKA VERMA, SANGEETA SHARMA, AND VEENADHARI SURAPARAJU |
Distributed Denial-of-Service Attack Detection and Mitigation
Using Feature Selection and Intensive Care Request Processing, Volume 43, No. 2
|
Arabian Journal for Science and Engineering |
SCI and Scopus |
2019 |
Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and
Amita Nandal |
Improving Bounds on Outage Probability in Correlated Rayleigh Fading
Environment |
Sadhana- Springer |
SCI |
2019 |
Shashi Gurung and Siddhartha Chauhan |
A Dynamic Threshold based Algorithm for Improving Security and Performance of AODV Under Black-hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2019 |
Shashi Gurung and Siddhartha Chauhan |
Performance Analysis of Black-hole Attack Mitigation protocols under Gray-hole Attacks in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar |
Analysis and Simulation of Second-Order Statistics with Modified Characteristic |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar |
Effect of Matrix Partitioning on Second Order Statistics of Fading Channels |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and Amita Nandal |
Statistical Approach for Performance Analysis of Multipath Scattering Environment |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A novel Approach for Mitigating Gray Hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A Dynamic Threshold based Approach for Mitigating Black-Hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A Novel Approach for Mitigating Route Request Flooding Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Arvind Dhaka and Siddhartha Chauhan |
Statistical Analysis of Modified Fading Simulator in Rayleigh Fading Environment |
International Journal of Grid and Distributed Computing |
SCOPUS |
2018 |
Deepshikha and Siddhartha Chauhan |
Succinct Review on MAC Protocols for Wireless Body Area Networks |
International Journal of Grid and Distributed Computing |
SCOPUS |
2014 |
Siddhartha Chauhan and Lalit Kumar Awasthi |
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks |
International Journal of Communication Networks and Distributed Systems- InderScience |
SCOPUS |
2012 |
Siddhartha Chauhan and Lalit Kumar Awasthi |
Adaptive time synchronization for homogeneous WSNs |
International Journal of Engineering Business Management |
SCOPUS |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Sensor fusion for Distributed Detection of Passive Targets in Surveillance Wireless Sensor Network |
IEEE Sensor Journal |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
A Distributed Reinforcement Learning based Sensor Node Scheduling Algorithm for Coverage and Connectivity Maintenance in Wireless Sensor Network |
Wireless Networks |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Analytic Evaluation of Non-uniformities for Coverage Probability Computation of Randomly Deployed Wireless Sensor Network |
International Journal of Sensor Networks |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Information Fusion based Intruder Detection Techniques in Surveillance Wireless Sensor Network |
Advances in Intelligent System and Computing |
SCOPUS |
2019 |
Anamika Sharma and Siddhartha Chauhan |
Target Coverage Computation Protocols in Wireless Sensor Networks: A Comprehensive Review |
International Journal of Computers and Applications |
SCOPUS |
2019 |
Deepshikha and Siddhartha Chauhan |
Multi-Stage Context-Aware Data Filtering Technique for Body Sensor Networks (BSNs) |
Journal of Advanced Research in Dynamical and Control Systems |
SCOPUS |
2019 |
A Sai Venkateshwar Rao and Siddhartha Chauhan |
Two-Step Verification Technique for Isolation of Black Hole Attack in MANETs |
International Journal of Recent Technology and Engineering |
SCOPUS |
2016 |
Kulwardhan Singh, T.P. Sharma |
FDR: fault detection and recovery scheme for wireless sensor networks using virtual grid |
Taylor & Francis International Journal of Parallel, Emergent and Distributed Systems |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
ZBFR: Zone Based Failure Recovery in WSNs by Utilizing Mobility and Coverage Overlapping |
Springer Wireless Networks |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
rDFD: reactive distributed fault detection in wireless sensor networks |
Springer Wireless Networks |
SCI |
2017 |
K.P. Sharma, T.P. Sharma |
Energy-hole avoidance and lifetime enhancement of a WSN through load factor |
Turkish Journal of Electrical Engineering and Computer Sciences |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
Distributed Connectivity Restoration in Networks of Movable Sensor Nodes |
Elsevier International Journal of Computers and Electrical Engineering |
SCI |
2015 |
Rajeev Singh and T.P. Sharma |
A Location Based Method for Restricting the Flooding DoS Effect in WLANs |
Taylor and Francis Journal of Location Based Services |
SCOPUS |
2015 |
Rajeev Singh and T.P. Sharma |
On the IEEE 802.11i Security: A Denial of Service Perspective |
Wiley Journal of Security and Communication Networks |
SCI |
2015 |
Rajeev Singh and T.P. Sharma |
Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs |
Journal of Electronics Science & Technology |
SCOPUS |
2014 |
Rajeev Singh and T.P. Sharma |
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security |
Springer Wireless Personal Communications |
SCI |
2015 |
Abhiram Singh, T.P. Sharma |
Position and Hop-Count Assisted Full Coverage Control in Dense Sensor Networks |
Springer Wireless Networks |
SCI |
2014 |
Rajeev Singh and T.P. Sharma |
Simulated analysis of a cryptographic solution for WLANs against Denial of Service (DoS) attacks |
Journal of Engineering Science and Technology |
SCOPUS |
2010 |
T.P. Sharma, R.C. Joshi, Manoj Misra |
Data Filtering and Dynamic Sensing for Continuous Monitoring in Wireless Sensor Networks |
International Journal of Autonomous and Adaptive Communications (IJAACS) |
SCOPUS |
2009 |
T.P. Sharma, R.C. Joshi, Manoj Misra |
Cooperative Caching for Homogeneous Wireless Sensor Networks |
International Journal of Communication Networks and Distributed Systems |
SCOPUS |
2013 |
Rajeev Singh and T.P. Sharma |
A Secure WLAN Authentication Scheme |
IEEK Transactions on Smart Processing and Computing |
IEEK |
2013 |
Rajeev Singh and T.P. Sharma |
Proof of the Secrecy Property of Secure WLAN Authentication Scheme (SWAS) using Extended PCL logic |
Journal of Safety Engineering |
JSE |
2019 |
Krishan Pal Sharma, T.P. Sharma |
Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network |
Inderscience International Journal of Sensor Networks |
SCIE, Scopus |
2019 |
Rajeev Singh, T.P. Sharma |
Present Status of Distributed Denial of service (DDoS) Attacks in Internet World |
International Journal of Mathematical, Engineering and Management Sciences |
Scopus |
2019 |
Rajeev Singh, Sudeep Tanwar, T.P. Sharma |
Utilization of Blockchain for mitigating the Distributed Denial of Service (DDoS) Attacks |
Wiley Journal of Security and Privacy |
ACM |
2019 |
Rajeev Singh and T.P. Sharma |
An Overview of WLAN Security |
International Journal of Scientific & Technology Research |
Scopus |
2019 |
Mohammad Ahsan, Madhu Kumari and T. P. Sharma |
Rumors Detection, Verification and Controlling Mechanisms in Online Social Networks: A Survey |
Elsevier (Science Direct) Online Social Networks and Media (OSNEM) |
SCIE |
2019 |
Mohammad Ahsan, Madhu Kumari and T. P. Sharma |
Detection of Context-Varying Rumors on Twitter through Deep Learning |
Journal of Advanced Science and Technology (IJAST) |
Scopus, SCI |
2016 |
Rajeev Singh and T.P. Sharma |
Secure WLAN Handoff Scheme with Continuous Authentication |
MIS Review |
MIS |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Variance based Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems with Application to Clustering Vol. 45(6), pp. 486-511 |
Cybernetics and Systems, Taylor and Francis (IF=1.681) |
SCI |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Parameter Adaptive Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems, Vol. 5, pp. 144-155 |
Journal of Computational Science, Elsevier (IF=2.502) |
SCI |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Automatic Cluster Evolution Using Gravitational Search Algorithm and its Application on Image Segmentation. Vol. 29, pp. 93-103 |
Engineering Applications of Artificial Intelligence, Elsevier (IF=3.526) |
SCI |
2015 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm, Vol. 61, pp. 22-31 |
IETE Journal of Research, Taylor and Francis (IF=0.793) |
SCI |
2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection, Vol. 4(2), pp.65-85 |
Journal of Engineering Research, Springer (IF=0.387) |
SCI |
2017 |
Dilbag Singh, Vijay Kumar |
Dehazing of Remote Sensing Images using Improved Restoration Model based Dark Channel Prior, Vol. 65(5), pp. 282-292 |
Imaging Science Journal, Taylor and Francis (IF=0.846) |
SCI |
2017 |
Dilbag Singh, Vijay Kumar |
Modified Gain Intervention Filter based Dehazing Technique, Vol. 64(20), pp. 2165-2178 |
Journal of Modern Optics, Taylor and Francis (IF=1.657) |
SCI |
2017 |
Gaurav Dhiman, Vijay Kumar |
Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications, Vol. 114, pp. 48-70 |
Advances in Engineering Software, Elsevier (IF=4.194) |
SCI |
2017 |
Vijay Kumar, Dinesh Kumar |
An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems. Vol. 112, pp. 231-254 |
Advances in Engineering Software, Elsevier (IF=4.194) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Defogging of road images using gain coefficient based trilateral filter, Vol. 27(1), pp. 1-14 |
Journal of Electronic Imaging, SPIE (IF=0.924) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Single image haze removal using integrated dark and bright channel prior, Vol. 32(4), pp. 1-9 |
Modern Physics Letters B, World Scientific (IF=0.731) |
SCI |
2018 |
Ashish Gridhar, Vijay Kumar |
A Comprehensive Survey of 3D Image Steganography Techniques, Vol. 12(1), pp. 1-10 |
IET Image Processing, IET (IF=2.004) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Comprehensive Survey on Haze Removal Techniques, Vol. 77(8), pp. 9595-9620 |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
A Modified DWT-based Image Steganography Technique, Vol. 77(11), pp. 13279-13308 |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2018 |
Sahil Sharma, Vijay Kumar |
Performance evaluation of 2D face recognition techniques under image processing attacks, Vol. 32(19), pp. 1-10 |
Modern Physics Letters B, World Scientific (IF=0.731) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter, Vol. 12(2), pp. 208-219 |
IET Computer Vision, IET (IF=1.648) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Fourier-Mellin moments based intertwining map for image encryption, Vol. 32(9), pp. 1-17 |
Modern Physics Letters B, World Scientific (IF=0.731) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
An efficient image encryption method based on improved Lorenz chaotic system, Vol. 54(9), pp. 562-564 |
Electronics Letters, IET (1.343) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Gene Expression Data Clustering using Variance-based Harmony Search Algorithm |
IETE Journal of Research, Taylor and Francis (IF=0.793) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Dehazing of outdoor images using notch based integral guided filter, Vol. 77(20), pp. 27363-27386 |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2018 |
Ashish Gridhar, Vijay Kumar |
A RGB Image Encryption Technique using Lorenz and Rossler Chaotic System on DNA Sequences. Vol. 77(20), pp. 27017-27039 |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Parallel Non-dominated Sorting Genetic Algorithm-II based Image Encryption Technique, Vol. 66(8), pp. 453-462 |
Imaging Science Journal, Taylor and Francis (IF=0.846) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Color Image Encryption Technique using Differential Evolution in Nonsubsampled Contourlet Transform Domain, Vol. 12(7), pp.1273 ā1283 |
IET Image Processing, IET (IF=2.004) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Beta Chaotic Map based Image Encryption Using Genetic Algorithm, Vol. 28(11), pp. 1850132 (1ā26) |
International Journal of Bifurcation and Chaos, IET (IF=2.145) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Adaptive Differential Evolution based Lorenz Chaotic System for Image Encryption, Vol. 43(12), pp. 8127-8144 |
Arabian Journal for Science and Engineering, Springer (IF=1.518) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
A novel dehazing model for remote sensing images, Vol. 69, pp. 14-27 |
Computer & Electrical Engineering, Elsevier (IF=2.189) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar, Li Li |
Color Image Encryption Approach based on Memetic Differential EvolutionColor Image Encryption Approach based on Memetic Differential Evolution |
Neural Computing and Applications, Springer (IF=4.664) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Automatic Clustering and Feature Selection using Gravitational Search Algorithm and its Application to Microarray Data Analysis |
Neural Computing and Applications, Springer (IF=4.664) |
SCI |
2018 |
Gaurav Dhiman, Vijay Kumar |
Astrophysics inspired multi-objective approach for automatic clustering and feature selection in real-life environment, Vol. 32 (31) , pp. 1-12 |
Modern Physics Letters B, World Scientific (IF=0.308) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Binary Whale Optimization Algorithm and its Application to Unit Commitment Problem |
Neural Computing and Applications, Springer (IF=4.664) |
SCI |
2018 |
Gaurav Dhiman, Vijay Kumar |
Emperor Penguin Optimizer: A Bio-inspired Algorithm for Engineering Problems, Vol. 159, pp. 20-50 |
Knowledge Based Systems, Elsevier (IF=5.101) |
SCI |
2018 |
Gaurav Dhiman, Vijay Kumar |
Multi-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems, Vol. 150, pp.175-197 |
Knowledge Based Systems, Elsevier (IF=5.101) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
A comprehensive review on image encryption techniques |
Archives of Computational Methods in Engineering, Springer (IF=7.242) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
A comprehensive review of computational dehazing techniques |
Archives of Computational Methods in Engineering, Springer (IF=7.242) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
Single image defogging by gain gradient image filter, Vol. 62(7), pp.079101:1-079101:3 |
Science China Information Sciences, Springer (IF=2.731) |
SCI |
2019 |
Gaurav Dhiman, Vijay Kumar |
KnRVEA: A Hybrid Evolutionary Algorithm based on Knee Points and Reference Vector Adaptation Strategies for Many-objective Optimization, Vol. 49(7), pp.2434-2460 |
Applied Intelligence, Springer (IF=2.882) |
SCI |
2019 |
Gaurav Dhiman, Vijay Kumar |
Seagull Optimization Algorithm: Theory and its Applications for Large Scale Industrial Engineering Problems, Vol. 165, pp. 169-196 |
Knowledge Based Systems, Elsevier (IF=5.101) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
Image Dehazing using Moore neighborhood-based Gradient Profile Prior, Vol. 70, pp. 131-144 |
Signal Processing: Image Communication, Elsevier (IF=2.814) |
SCI |
2019 |
Dinesh Kumar, Vijay Kumar, Rajani |
Automatic Clustering using Quantum based Multi-objective Emperor Penguin Optimizer and its Applications to Image Segmentation |
Modern Physics Letters A, World Scientific (IF=1.308) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar, Manjit Kaur |
Single Image Dehazing using Gradient Channel Prior |
Applied Intelligence, Springer (IF=2.882) |
SCI |
2019 |
Ashish Gridhar, Vijay Kumar |
A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) |
SCI |
2019 |
Vijay Kumar, Avneet Kaur |
Binary Spotted Hyena Optimizer and its Application to Feature Selection |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar, Manjit Kaur |
Image dehazing using window-based integrated means filter |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
Voxel Based 3D Face Reconstruction and Its Application to Face Recognition Using Sequential Deep Learning |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2020 |
Manjit Kaur, Dilbag Singh, Vijay Kumar, Kehui Sun |
Color Image Dehazing using Gradient Channel Prior and Guided L0 Filter |
Information Sciences, Elsevier (IF=5.910) |
SCI |
2020 |
Gaurav Dhiman, Meenakshi Garg, Vijay Kumar , Atulya Nagar, Mohammad Dehghani |
A Novel Algorithm for Global Optimization: Rat Swarm Optimizer |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) |
SCI |
2020 |
Dilbag Singh
, Vijay Kumar
, Vaishali Yadav, Manjit Kaur |
Deep Convolutional Neural Networks based Classification model for COVID-19 Infected Patients using Chest X-ray Images |
International Journal of Pattern Recognition and Artificial Intelligence, Springer (IF=1.375) |
SCI |
2020 |
Dilbag Singh, Vijay Kumar, Vaishali Yadav, Manjit Kaur |
Classification of COVID-19 patients from chest CT images using multi-objective differential evolution based convolutional neural networks |
European Journal of Clinical Microbiology & Infectious Diseases, Springer (IF=2.837) |
SCI |
2020 |
Aayush Jaiswal, Neha Gianchandani, Dilbag Singh, Vijay Kumar, Manjit Kaur |
DenseNet201 based deep transfer learning model to classify the COVID-19 infected patients |
Journal of Biomolecular Structure & Dynamics, Springer (IF=3.310) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2020 |
Nripendra Narayan Das, Naresh Kumar, Manjit Kaur, Vijay Kumar, Dilbag Singh |
Automated deep transfer learning-based approach for detection of COVID-19 infection in chest X-rays images |
Innovation and Research in Biomedical Engineering, Elsevier (IF=1.022) |
SCI |
2020 |
Rajesh Kondabala, Vijay Kumar, Amjad Ali, Manjit Kaur |
A novel astrophysics based framework for prediction of binding affinity of glucose binder |
Modern Physics Letters B, World Scientific (IF=1.224) |
SCI |
2020 |
Vijay Kumar, Avneet Kaur, Kamlender Kaur Kaleka |
Spiral-inspired Spotted Hyena Optimizer and its Application to Constraint Engineering Problems |
Wireless Personal Communications, Springer (IF=1.061) |
SCI |
2020 |
Manjit Kaur, Dilbag Singh, Vijay Kumar |
Color image encryption using minimax differential evolution based 7D hyper-chaotic map |
Applied Physics B: Lasers and Optics, Springer (IF=1.813) |
SCI |
2020 |
Vijay Kumar, Ashish Girdhar |
A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2020 |
Ashish Girdhar, Himani Kapur, Vijay Kumar, Manjit Kaur, Dilbag Singh, Robertas |
Effect of COVID-19 Outbreak on Urban Health and Environment |
Air Quality, Atmosphere & Health, Springer (IF=2.870) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
3D Landmark-based Face Restoration for Recognition using Variational Autoencoder and Triplet Loss |
IET Biometrics, IET (IF=1.821) |
SCI |
2020 |
Sourabh Katoch, Sumit Singh Chauhan, Vijay Kumar |
A Review on Genetic Algorithm: Past, Present, and Future |
Multimedia Tools and Applications, Springer (IF=2.331) |
SCI |
2020 |
Rajesh Kondabala, Vijay Kumar, Amjad Ali |
Design a Synthetic Glucose Receptor using Computational Intelligence Approach |
Journal of Molecular Graphics and Modelling, Elsevier (IF=2.079) |
SCI |
2020 |
Manjit Kaur, Dilbag Singh, Vijay Kumar |
Rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) |
SCI |
2020 |
Manjit Kaur, Dilbag Singh, Vijay Kumar |
Drug Synergy Prediction Using Dynamic Mutation based Differential Evolution |
Current Pharmaceutical Design, (IF=2.208) |
SCI |
2020 |
Vijay Kumar, Dinesh Kumar |
A Systematic Review on Firefly Algorithm: Past, Present, and Future |
Archives of Computational Methods in Engineering, Springer (IF=7.242) |
SCI |
2021 |
Neeraj Sharma, Vijay Kumar, Sunil Singla |
Single Image Defogging using Deep Learning Techniques: Past, Present and Future |
Archives of Computational Methods in Engineering, Springer (IF=7.242) |
SCI |
2021 |
Manjit Kaur, Dilbag Singh, Vijay Kumar |
Densely connected convolutional networks-based COVID-19 screening
model |
Applied Intelligence, Springer (IF=3.325) |
SCI |
2021 |
Vijay Kumar, Sahil Sharma |
Performance evaluation of machine learning based face recognition techniques |
Wireless Personal Communications, Springer (IF=1.061) |
SCI |
2021 |
Ashish Girdhar, Himani Kapur, Vijay Kumar |
A novel grayscale image encryption approach based on chaotic maps and image blocks |
Applied Physics B: Lasers and Optics, Springer (IF=1.813) |
SCI |
2021 |
Manjit Kaur, Vijay Kumar, Vaishali Yadav ,Dilbag Singh, Naresh Kumar, Nripendra Narayan Das |
Metaheuristic-based Deep COVID-19 Screening Model from Chest X-Ray Images |
Journal of Healthcare Engineering (IF=1.803) |
SCI |
2021 |
Mahima Dubey, Vijay Kumar, Manjit Kaur, Thanh-Phong Dao |
A Systematic Review on Harmony Search Algorithm: Theory, Literature, and Applications |
Mathematical Problems in Engineering (IF=1.009) |
SCI |
2010 |
Kamlesh Dutta, Nupur Prakash, Saroj Kaushik |
Probabilistic neural network approach to the classification of demonstrative pronouns for indirect anaphora in Hindi |
Expert Systems with Applications |
SCI and Scopus |
2011 |
Kamlesh Dutta, Siddhant Sarthak |
Architectural space planning using evolutionary computing approaches: A review |
Artificial Intelligence Review |
SCI and Scopus |
2013 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta, Chetna Gupta |
Requirement Reprioritization: A Multilayered Dynamic Approach |
International Journal of Software Engineering and its Applications |
ESCI and Scopus |
2013 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Incremental development revolutions of E-learning software systems in education sector: a case study approach |
Human-centric Computing and Information Sciences |
SCIE and Scopus |
2013 |
Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta |
Regression testing based requirement prioritization of desktop software applications approach |
International Journal of Software Engineering and its Applications |
Scopus |
2014 |
Vachik S. Dave, Kamlesh Dutta |
Neural network based models for software effort estimation: A review |
Artificial Intelligence Review |
SCI and Scopus |
2014 |
Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta |
Current prioritisation and reprioritisation practices: A case study approach |
International Journal of Computer Aided Engineering and Technology |
Scopus |
2014 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Requirement reprioritisation for pairwise compared requirements |
International Journal of Computer Aided Engineering and Technology |
Scopus |
2015 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Hybrid regression testing technique: Based on requirement priorities, fault and modification history |
International Journal of Computer Applications in Technology |
ESCI and Scopus |
2015 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Exploring prioritization through systematic literature surveys and case studies |
SpringerPlus |
SCI |
2016 |
Priyanka Dadhich, Kamlesh Dutta, M.C. Govil |
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities |
International Journal of Security and Networks |
Scopus |
2016 |
Sunil Kumar, Kamlesh Dutta |
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges |
Security and Communication Networks |
SCI and Scopus |
2016 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Historical prioritisation and reprioritisations using hierarchical historical R-tree |
International Journal of Computer Applications in Technology |
ESCI and Scopus |
2017 |
Mukesh Kumar, Kamlesh Dutta |
Detecting wormhole attack on data aggregation in hierarchical WSN |
International Journal of Information Security and Privacy |
ESCI and Scopus |
2017 |
Sunil Kumar, Kamlesh Dutta |
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks |
International Journal of Electronics |
SCI and Scopus |
2018 |
Poonam Tanwar, T.V. Prasad, Kamlesh Dutta |
Natural language processing for hybrid knowledge representation |
International Journal of Advanced Intelligence Paradigms |
Scopus |
2018 |
Sunil Kumar, Kamlesh Dutta |
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks |
Wireless Personal Communications |
SCI and Scopus |
2018 |
Sunil Kumar, Kamlesh Dutta, Anjani Garg |
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks |
Wireless Personal Communications |
SCI and Scopus |
2019 |
Kamlesh Dutta, Varun Gupta and Vachik S. Dave |
Analysis and Comparison of Neural Network Models for Software Development Effort Estimation |
Journal of Cases on Information Technology (JCIT) |
Scopus |
2019 |
Parnika Bhat and Kamlesh Dutta |
A Survey on Various Threats and Current State of Security in Android Platform |
ACM Computing Surveys (CSUR) |
SCI and Scopus |
2009 |
Kamlesh Dutta, Nupur Prakash, Saroj Kaushik |
Application of Pronominal Divergence and Anaphora Resolution in English-Hindi Machine Translation |
POLIBITS |
ISI Thomson / Clarivate Web of Science SciELO collection |
2011 |
Kamlesh Dutta, Saroj Kaushik, Nupur Prakash |
Machine Learning Approach for the Classification
of Demonstrative Pronouns for Indirect Anaphora
in Hindi News Items |
The Prague Bulletin of Mathematical Linguistics |
ERIH PLUS, Genamics JournalSeek |
2020 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta |
Hybrid Algorithm to Detect DDoS Attacks in VANETs |
Wireless Personal Communications |
SCI and Scopus |
2019 |
Poonam Tanwar, T.V. Prasad, Kamlesh Dutta |
Hybrid technique for effective knowledge representation in normal life |
International Journal of Engineering and Advanced Technology |
Scopus |
2019 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta |
Evaluating the Performance of Various Machine Learning Algorithms for Detecting DDoS Attacks in VANETs |
International Journal of Control and Automation |
Scopus |
2019 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar and Kamlesh Dutta |
Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing DDoS Attacks in VANETS |
International Journal of Innovative Technology and Exploring Engineering |
Scopus |
2020 |
Triveni Lal Pal and Kamlesh Dutta |
CNN-based Embedding Learning for Sentence Classification |
International Journal of Control and Automation |
Scopus |
2020 |
Satnam Kaur ., Lalit K. Awasthi ., A.L. Sangal ., Gaurav Dhiman ., |
Engineering Applications of Artificial Intelligence, Volume 90, Year 2020 |
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization |
- |
2020 |
Satnam Kaur ., Lalit K. Awasthi ., A. L. Sangal ., |
Engineering with Computers, Year 2020 |
HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems |
- |
2020 |
Abhilasha Sharma ., Lalit Kumar Awasthi ., |
Computer Communications, Volume 159, Year 2020, Pages 71-82 |
AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks |
- |
2020 |
Neha Agarwal ., Geeta Sikka ., Lalit Kumar Awasthi ., |
Information Processing and Management, Volume 57, Year 2020 |
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation |
- |
2020 |
Raj Mohan Singh ., Lalit Kumar Awasthi ., Geeta Sikka ., |
Communications in Computer and Information Science, Volume 1206 CCIS, Year 2020, Pages 673-685 |
Techniques for Task Scheduling in Cloud and Fog Environment: A Survey |
- |
2019 |
Awasthi, Lalit Kumar;Ambedkar, B. R. |
ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications |
Message from the ICSCCC 2018 Patron and Principal General Chair |
- |
2019 |
Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit Kumar |
Computer Networks, Volume 159, Year 2019, Pages 125-134 |
Laman: A supervisor controller based scalable framework for software defined networks |
- |
2019 |
Kaur, Satnam;Awasthi, Lalit K.;Sangal, A. L. |
Modern Physics Letters A |
Prioritizing software refactoring opportunities using multi-objective optimization |
- |
2019 |
Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S. |
Proceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Year 2019, Pages 968-973 |
Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment |
- |
2019 |
Nanda, Ashok Kumar;Sankiran, V.;Gandam, Vindya;Awasthi, Lalit Kumar |
International Journal of Innovative Technology and Exploring Engineering, Volume 8, Year 2019, Pages 138-145 |
ECDSA security protocol for WSBNs |
- |
2019 |
Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, Emmanuel S. |
International Journal of Grid and Utility Computing, Volume 10, Year 2019, Pages 308-325 |
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation |
- |
2019 |
Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit K. |
ICCT 2017 - International Conference on Intelligent Communication and Computational Techniques, Volume 2018-January, Year 2018, Pages 228-232 |
An empirical enhancement using scale invariant feature transform in text extraction from images |
- |
2018 |
Aidan, Jagmeet Singh;Verma, Harsh Kumar;Awasthi, Lalit Kumar |
Proceedings - 2017 International Conference on Next Generation Computing and Information Systems, ICNGCIS 2017, Year 2018, Pages 131-136 |
Comprehensive survey on petya ransomware attack |
- |
2018 |
Garg, Urvashi;Sikka, Geeta;Awasthi, Lalit K. |
Computers and Security, Volume 77, Year 2018, Pages 349-359 |
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities |
- |
2018 |
Garg, Urvashi; Sikka, Geeta; Awasthi, Lalit K; |
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives |
A Systematic Review of Attack Graph Generation and Analysis Techniques |
- |
2018 |
Kaur, Sumandeep;Sikka, Geeta;Awasthi, Lalit Kumar |
ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 13-16 |
Sentiment Analysis Approach Based on N-gram and KNN Classifier |
- |
2018 |
Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit K. |
ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 333-339 |
A Study of Performance Evaluators for Software Defined Networking |
- |
2018 |
Sharma, Abhilasha;Awasthi, Lalit Kumar |
ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 556-560 |
A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks |
- |
2017 |
Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, Emmanuel S.;Kapil, Divya |
Journal of Cloud Computing, Volume 6, Year 2017 |
A critical survey of live virtual machine migration techniques |
- |
2017 |
Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar |
Wireless Networks, Volume 23, Year 2017, Pages 1669-1687 |
Incentive based scheme for improving data availability in vehicular ad-hoc networks |
- |
2017 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
Computer Communication, Networking and Internet Security, Year 2017, Pages 461-470
|
Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks |
- |
2017 |
Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S.;Kumar, Nitin |
Proceedings - 2016 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2016, Year 2017, Pages 17-24 |
Improved Virtual Machine Migration Approaches in Cloud Environment |
- |
2016 |
Thakur, Jawahar;Kalia, Arvind;Awasthi, Lalit Kumar |
Proceedings of 2015 3rd International Conference on Image Information Processing, ICIIP 2015, Year 2016, Pages 220-224 |
Cluster-based coordinated checkpointing protocol in wireless ad-hoc networks |
- |
2016 |
Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. |
2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016, Year 2016, Pages 617-624 |
Workflow scheduling algorithms in cloud environment: A review, taxonomy, and challenges |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
International Journal of Next-Generation Computing, Volume 7(1), Year 2016
|
Minimal Marking of Trap-Regions for Efficient Greedy Forwarding in WSNs. |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
International Journal of Computer Applications, Volume 975, Year 2016, Pages 8887
|
An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network |
- |
2016 |
Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar |
Wireless Networks, Volume 22, Year 2016, Pages 1641-1657 |
Priority based efficient data scheduling technique for VANETs |
- |
2016 |
Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. |
2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016, Year 2016, Pages 182-187 |
Energy-efficient resource allocation approaches with optimum virtual machine migrations in cloud environment |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
International Journal of Next-Generation Computing, Volume 7(3), Year 2016
|
GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks. |
- |
2015 |
Jawahar Thakur, Arvind Kalia, LALIT AWASTHI |
International Journal of Next-Generation Computing, Volume 6(2), Year 2015
|
Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review |
- |
2015 |
Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar |
Wireless Networks, Volume 21, Year 2015, Pages 1631-1645 |
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks |
- |
2015 |
D Nayak, A Nanda, P Awasthi, L Kumar |
IJRCCT, Volume 4(3), Year 2015, Pages 250-255
|
Multiple private keys with NTRU cryptosystem |
- |
2014 |
Singh, Vikram;Awasthi, Lalit Kumar |
Advances in Intelligent Systems and Computing, Volume 216, Year 2014, Pages 251-256 |
A review paper on IEEE 802.11 WLAN |
- |
2014 |
Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kr |
ACM International Conference Proceeding Series, Volume 11-16-November-2014, Year 2014 |
NRNDD: Nearest relay node based data dissemination technique for VANETs |
- |
2014 |
Chauhan, Siddhartha;Awasthi, Lalit Kumar |
International Journal of Communication Networks and Distributed Systems, Volume 12, Year 2014, Pages 275-298 |
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks |
- |
2014 |
Anup Patnaik, Lalit Kumar Awasthi, Kamlesh Dutta |
ournal of Engineering Research and Applications , Volume 7(5), Year 2014, Pages 82-94
|
An Overview of Workflow Management on Mobile Agent Technology |
- |
2014 |
Awasthi, Lalit K.;Misra, Manoj;Joshi, R. C. |
International Journal of Communication Networks and Distributed Systems, Volume 12, Year 2014, Pages 356-380 |
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems |
- |
2014 |
Vijay, Uttam;Awasthi, Lalit Kumar |
Advances in Intelligent Systems and Computing, Volume 216, Year 2014, Pages 219-223 |
Scope of cloud computing for multimedia application |
- |
2014 |
Nanda, Ashok Kumar, Lalit Kumar |
International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Year 2013, Pages 706-718 |
A proposal for SMS security using NTRU cryptosystem |
- |
2013 |
Gupta, Ankur;Awasthi, Lalit K. |
International Journal of Communication Networks and Distributed Systems, Volume 11, Year 2013, Pages 347-375 |
Peer enterprises: Design and implementation of a cross-organisational peer-to-peer framework |
- |
2013 |
Pamita Awasthi, Shilpa Dogra, Lalit K Awasthi, Ritu Barthwal |
International Journal of Drug Design and Discovery , Volume 4(1), Year 2013, Pages 1003-1015
|
Interaction of Mitoxantrone and its Analogs with Methylated and Non-Methylated CpG Islands in Tetrameric DNA Sequences: A Molecular Modeling Study |
- |
2013 |
Lalit Kumar Awasthi, Siddhartha Chauhan |
Wireless Sensor Networks: From Theory to Applications, Year 2013, Pages 1041 |
Data Aggregation and Data Gathering |
- |
2012 |
Rajesh Sharma, Lalit Kumar Awasthi |
Journal of Bioinformatics and Intelligent Control, Volume 1(2), Year 2012, Pages 138-147
|
A log-based recovery protocol for mobile distributed computing systems |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
International Journal of Engineering and Technology, Volume 4(6), Year 2012, Pages 836
|
XTR Cryptosystem for SMS security |
- |
2012 |
Kamal Kant, Lalit Kumar Awasthi |
International Journal of IT & Knowledge, Year 2012
|
āUnicast And Multicast Routing Protocols For Manets: A Comparative Surveyā |
- |
2012 |
Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi |
International Journal of Advanced Computer Science and Applications, Volume 3(10), Year 2012 |
Request Analysis and Dynamic Queuing System for VANETs |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
Journal of Information Assurance & Security, Volume 7(4), Year 2012
|
Secure SMS Encryption Using NTRU Cryptosystem. |
- |
2012 |
Anup Patnaik, Lalit Kumar Awasthi, Kamlesh Dutta |
IJCSE, Volume 3(2), Year 2012, Pages 248-254
|
Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review |
- |
2012 |
Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam |
International Journal of Distributed Systems and Technologies, Volume 3, Year 2012, Pages 22-38 |
Cache replacement in mobile Adhoc networks |
- |
2012 |
Abhishek Mohta, Ravi Kant Sahu, Lalit Kumar Awasthi |
International journal of advanced research in computer science and software engineering, Year 2012
|
Robust data security for cloud while using third party auditor |
- |
2012 |
Abhishek Mohta, Lalit Kumar Awasti |
International Journal of Scientific & Engineering Research, Year 2012
|
Cloud data security while using third party auditor |
- |
2012 |
Manju Bala, Lalit Awasthi |
International Journal of Intelligent systems and applications, Year 2012
|
Proficient D-SEP protocol with heterogeneity for maximizing the lifetime of wireless sensor networks |
- |
2012 |
Ajay Guleria, Narottam C Kaushal, Lalit Kumar Awasthi |
International Journal of Next-Generation Computing, Volume 3(3), Year 2012
|
Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs |
- |
2012 |
Manju Bala, Lalit Awasthi |
International Journal of Advanced Science and Technology, Year 2012
|
Proficient D-HEED Protocol for Maximizing the Lifetime of WSN and Comparative Performance Investigations with Various Deployment Strategies |
- |
2012 |
Awasthi, Lalit K.;Misra, Manoj;Joshi, Ramesh C. |
International Journal of Computers and Applications, Volume 34, Year 2012, Pages 1-10 |
An efficient coordinated checkpointing approach for distributed computing systems with reliable channels |
- |
2012 |
Chauhan, Siddhartha;Awasthi, Lalit Kumar |
International Journal of Engineering Business Management, Volume 4, Year 2012 |
Adaptive time synchronization for homogeneous WSNs |
- |
2012 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
International Journal of Advanced Networking and Applications, Volume 3(5), Year 2012, Pages 1302
|
Siddhartha Chauhan, Lalit Kumar Awasthi |
- |
2012 |
Lakshmi Priya, M.;Awasthi, Lalit K. |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Volume 7135 LNCS, Year 2012, Pages 375-380 |
Distributed localization for anisotropic sensor networks using spatial clustering |
- |
2012 |
Naveen Chauhan, LK Awasthi, Narottam Chand |
International Conference on Latest Computational Technologies, Year 2012, Pages 85-89
|
Cluster based efficient caching technique for wireless sensor networks |
- |
2012 |
Ravi Kant Sahu, Abhishek Mohta, LK Awasthi |
IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), Year 2012, Pages 23-27
|
Energy-efficient grid-based data dissemination in wireless sensor networks |
- |
2011 |
Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh |
International Journal of Wireless Sensor Network, Volume 3(2), Year 2011
|
A Distributed Weighted Cluster Based Routing Protocol for MANETs. International Journal of Wireless Sensor Network |
- |
2011 |
Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam;Joshi, R. C.;Misra, Manoj |
International Journal of Mobile Computing and Multimedia Communications, Volume 3, Year 2011, Pages 20-35 |
Cooperative caching in mobile ad hoc networks |
- |
2011 |
Singh, Anurag;Chand, Narottam;Awasthi, Lalit Kr |
Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, Year 2011, Pages 135-138 |
Enhancing cache invalidation techniques in IVANET |
- |
2011 |
Pawan Bhattarai, Amrik Singh, Lalit.K.Awasthi, A.S Sudan |
International Journal of Scientific & Engineering Research, Volume 2(7), Year 2011, Pages 1-7
|
Centralization and Universalization of Knowledge: Problems, Solution and Challenges |
- |
2011 |
Kumar, Prashant;Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam |
International Journal of Mobile Computing and Multimedia Communications, Volume 3, Year 2011, Pages 53-66 |
Enhancing data availability in MANETs with cooperative caching |
- |
2011 |
Pant, Sudhanshu;Chauhan, Naveen;Chand, Narottam;Awasthi, L. K.;Dubey, Brij Bihari |
Communications in Computer and Information Science, Volume 168 CCIS, Year 2011, Pages 395-402 |
Improving fading-aware routing with circular cache layers in wireless sensor networks |
- |
2011 |
Singh, Anurag;Chand, Narottam;Awasthi, Lalit Kr |
Communications in Computer and Information Science, Volume 192 CCIS, Year 2011, Pages 609-614 |
Cache invalidation for location dependent and independent data in IVANETS |
- |
2011 |
Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam;Chugh, Ankit |
World Academy of Science, Engineering and Technology, Volume 51, Year 2011, Pages 1166-1170 |
A distributed weighted cluster based routing protocol for manets |
- |
2011 |
Awasthi, Srikanth R.L.K. |
2011 International Conference on Communication Systems and Network Technologies, Year 2011, Pages 139-143 |
Voronoi-based Continuous query processing for mobile users |
- |
2011 |
Gupta, Ankur;Awasthi, Lalit K. |
Computing and Informatics, Volume 30, Year 2011, Pages 559-594 |
Peer-to-peer networks and computation: Current trends and future perspectives |
- |
2011 |
Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam |
Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011, Year 2011, Pages 235-239 |
Global cooperative caching for wireless sensor networks |
- |
2011 |
Dubey, Brij Bihari;Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam |
ACM International Conference Proceeding Series, Year 2011, Pages 96-99 |
NILDD: Nearest intersection location dependent dissemination of traffic information in VANETs |
- |
2011 |
Nanda, Ashok Kumar;Awasthi, Lalit Kumar |
2011 International Siberian Conference on Control and Communications, SIBCON 2011 - Proceedings, Volume 201, Year 2011, Pages 51-55 |
Joint channel coding and cryptography for SMS |
- |
2011 |
Gupta, Ankur;Awasthi, Lalit K. |
International Journal of Communication Networks and Distributed Systems, Volume 6, Year 2011, Pages 202-228 |
Peers-for-peers (P4P): An efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications |
- |
2011 |
Ram, Babu;Chauhan, Naveen;Chand, Narottam;Awasthi, L. K. |
ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology, Volume 4, Year 2011, Pages 250-253 |
A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks |
- |
2011 |
Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam;Joshi, R. C.;Mishra, Manoj |
ACM International Conference Proceeding Series, Year 2011, Pages 17-20 |
A cooperative caching strategy in mobile ad hoc networks based on clusters |
- |
2011 |
Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam |
Communications in Computer and Information Science, Volume 169 CCIS, Year 2011, Pages 594-602 |
Data mining techniques for prefetching in mobile Ad Hoc networks |
- |
2011 |
Amit Nayyer, Meenakshi Nayyer, Lalit Kr Awasthi |
International Journal of Computer Applications, Volume 36, Year 2011, Pages 13-19
|
A comparative study of time synchronization protocols in wireless sensor network |
- |
2011 |
Siddhartha Chauhan, Lalit Awasthi |
nternational Journal of Computer Science (IJCSI), Volume 8(6), Year 2011
|
TBEE: Tier based energy efficient protocol providing sink and source mobility in wireless sensor networks |
- |
2011 |
Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam |
Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, Year 2011, Pages 71-75 |
Data caching with intelligent prefetching in mobile ad hoc networks |
- |
2011 |
Nanda, Ashok Kumar;Awasthi, Lalit Kumar |
Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011, Year 2011, Pages 1282-1287 |
Encryption based channel coding algorithm for secure SMS |
- |
2011 |
Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam |
Communications in Computer and Information Science, Volume 142 CCIS, Year 2011, Pages 628-630 |
Cooperative caching strategy in mobile Ad hoc networks |
- |
2011 |
Dubey, Brij Bihari;Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam;Pant, Sudhanshu |
Communications in Computer and Information Science, Volume 168 CCIS, Year 2011, Pages 415-425 |
Efficient VANET-based traffic information dissemination using centralized fixed infrastructure |
- |
2011 |
Amrik Singh, Lalit K Awasthi |
2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Year 2011, Pages 438-443
|
Performance comparisons and scheduling of load balancing strategy in grid computing |
- |
2010 |
Gupta, Ankur;Awasthi, Lalit K. |
nternational Journal of Networking and Virtual Organisations, Volume 7, Year 2010, Pages 63-79 |
IndNet: Towards a peer-to-peer community network that connects the information technology industry and academia in India |
- |
2010 |
Kamal Kant, K Lalit Awasthi |
IEEE supported International Conference on Recent Trends in Soft Computing and Information Technology, TSCIT-09, Year 2010
|
A Survey on Routing Protocols for MANETs and Comparisons |
- |
2010 |
Kamal Kant, Lalit K Awasthi |
Proceedings of the 2010 International Conference on Advances in Communication, Network, and Computing, Year 2010, Pages 248-252
|
A Multicast Routing Protocol for MANETs Based on Node Stability |
- |
2010 |
Yash Pal, AJ Singh, Lalit K Awasthi |
International Journal of Advanced Research in Computer Science, Year 2010, Pages 1(3)
|
Evaluation of Energy Efficient Protocol for Object Tracking WSN using OMNet++ |
- |
2010 |
Prachi Maheshwari, Kamal Kant, Lalit K Awasthi |
International Journal of Information Technology, Volume 2(2), Year 2010, Pages 657-664
|
Recent Advances in Checkpointing Techniques in Mobile Computing Systems |
- |
2010 |
Manju Sharma, Lalit Awasthi |
International Journal of Computer Applications, Volume 975, Year 2010, Pages 8887
|
Frequency Reliance on EEHC-Based Routed Wireless Sensor Networks |
- |
2010 |
Prashant Kumar, Naveen Chauhan, Lk K Awasthi, Narottam Chand |
International Journal of Computer Science Issues (IJCSI), Year 2010
|
Proactive approach for cooperative caching in mobile adhoc networks |
- |
2010 |
Chaurasia, Soni;Chauhan, Siddhartha;Awasthi, L. K. |
2010 International Conference on Industrial Electronics, Control and Robotics, IECR 2010, Year 2010, Pages 263-268 |
Energy efficient protocol for providing QoS for wireless sensor network |
- |
2010 |
Gupta, Ankur;Awasthi, Lalit K. |
International Journal of Business Information Systems, Volume 5, Year 2010, Pages 102-116 |
PArch: A cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival |
- |
2010 |
Gupta, Ankur;Awasthi, Lalit K. |
International Journal of Distributed Systems and Technologies, Volume 1, Year 2010, Pages 1-23 |
Toward a quality-of-service framework for peer-to-peer applications |
- |
2010 |
Kant, Kamal;Awasthi, Lalit K. |
Proceedings - 2010 International Conference on Computational Intelligence and Communication Networks, CICN 2010, Year 2010, Pages 296-300 |
Stable link based multicast routing scheme for MANET |
- |
2010 |
Gupta, Ankur;Awasthi, Lalit K. |
Information Security Journal, Volume 19, Year 2010, Pages 191-203 |
A Containment-Based Security Model for Cycle-Stealing P2P Applications |
- |
2010 |
Kamal Kant, Lalit K Awasthi |
International Journal of IT & Knowledge Management (IJITKM), Special issue, Year 2010
|
Unicast and Multicast Routing Protocols for MA-NETs: A Comparative Survey |
- |
2010 |
Awasthi, Lalit K.;Misra, Manoj;Joshi, R. C. |
International Journal of Ad Hoc and Ubiquitous Computing, Volume 5, Year 2010, Pages 137-149 |
A weighted checkpointing protocol for mobile distributed systems |
- |
2010 |
Manju Sharma, Lalit Awasthi |
arXiv preprint arXiv:1002.1151, Year 2010
|
Realistic approach towards quantitative analysis and simulation of EEHC-Based routing for wireless sensor networks |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra |
International Journal of Computer Science and Engineering, Volume 2(7), Year 2010, Pages 2268-2273
|
Global cluster cooperation strategy in mobile ad hoc networks |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra |
International Journal of Applied Engineering Research, Volume 1(3), Year 2010 |
Energy efficient cooperative caching in mobile ad hoc networks |
- |
2009 |
Gupta, Ankur;Awasthi, Lalit K. |
2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications, IMSAA 2009, Year 2009 |
Peer enterprises: A viable alternative to cloud computing? |
- |
2009 |
Gupta, Ankur;Awasthi, Lalit K. |
Communications in Computer and Information Science, Volume 40, Year 2009, Pages 422-433 |
Security issues in cross-organizational peer-to-peer applications and some solutions |
- |
2009 |
Nayyer, Amit;Sharma, Rajesh;Nayyer, Meenakshi;Awasthi, Lalit Kumar |
2009 IEEE International Advance Computing Conference, IACC 2009, Year 2009, Pages 1141-1145 |
Wait and watch technique: Removing time synchronization overhead in wireless sensor network |
- |
2009 |
Pamita Awasthi, Shilpa Dogra, Lalit K Awasthi, Ritu Barthwal |
BIOCOMP, Year 2009, Pages 121-128
|
Interactions of Mitoxantrone and its Analogues with DNA Tetramer Sequences-A Molecular Modeling Study. |
- |
2009 |
Pal, Yash;Awasthi, Lalit K.;Singh, A. J. |
2009 IEEE International Advance Computing Conference, IACC 2009, Year 2009, Pages 1200-1205 |
Maximize the lifetime of object tracking sensor network with node-to-node activation scheme |
- |
2009 |
Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam |
1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, Year 2009 |
Cooperative data caching with prefetching in mobile ad-hoc networks |
- |
2008 |
Gupta, Ankur;Awasthi, Lalit K. |
Proceedings of the 2008 International Conference on Grid Computing and Applications, GCA 2008, Year 2008, Pages 140-146 |
"Secure thyself": Securing individual peers in collaborative peer-to-peer environments |
- |
2008 |
Gupta, Ankur;Malhotra, Deepti;Awasthi, Lalit K. |
Proceedings of the 2008 16th International Conference on Networks, ICON 2008, Year 2008 |
NeighborTrust: A trust-based scheme for countering distributed denial-of-service attacks in P2P networks |
- |
2008 |
Agarwal, Khushboo;Awasthi, Lalit Kumar |
Proceedings of the 2008 16th International Conference on Networks, ICON 2008, Year 2008 |
Enhanced AODV routing protocol for ad hoc networks |
- |
2008 |
Ankur Gupta, Lalit K Awasthi |
GCA, Year 2008, Pages 140-146
|
Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments. |
- |
2007 |
Gupta, Ankur;Awasthi, Lalit K. |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Volume 4806 LNCS, Year 2007, Pages 1011-1020 |
Peer enterprises: Possibilities, challenges and some ideas towards their realization |
- |
2007 |
Awasthi, Lalit Kumar;Kumar, P. |
International Journal of Information and Computer Security, Volume 1, Year 2007, Pages 298-314 |
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach |
- |
2007 |
Ankur Gupta, Lalit K Awasthi |
GCA, Year 2007, Pages 151-158
|
P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P applications. |
- |
2007 |
Swamidoss Sathiakumar, Lalit Kumar Awasthi, M Roberts Masillamani, SS Sridhar |
Springer Science & Business Media, Volume 216 |
Proceedings of International Conference on Internet Computing and Information Communications: ICICIC Global 2012 |
- |
2007 |
LK Awasthi |
International Conference on Information Systems and Technology (ICIST) 2011 Proceedings published by International Journal of Computer ApplicationsĀ® (IJCA), Year , Pages 11-17
|
Enhanced Query Processing Technique for Location based Services |
- |
2007 |
Manju Bala, Lalit Awasthi |
Energy, Volume 7(2), Year
|
On proficiency of HEED protocol with heterogeneity for wireless sensor networks with BS and nodes mobility |
- |