Research Publication in Journal
Year 2021
- Singhal, A., Bansal, A., Kumar, A.,“ Meta-heuristic algorithm to generate optimised test cases for aspect-oriented software systems”, International Journal of Advanced Intelligence Paradigms, 18(2), pp. 134-153.
- Jain, A., Singh, T., Sharma, S.K., Prajapati, V., “Implementing security in iot ecosystem using 5g network slicing and pattern matched intrusion detection system: A simulation study, ”, Interdisciplinary Journal of Information, Knowledge, and Management, 16, pp. 1-38
Year 2020
- Banga, M., Bansal, A., Singh, A., “Proposed approach to predict software faults detection using Entropy”, International Journal of Systems Assurance Engineering and Management, 11, pp. 301-312
- Kakkar, M., Jain, S., Bansal, A., Grover, P.S., “Nonlinear geometric framework for software defect prediction”, International Journal of Decision Support System Technology, 12(3), pp. 85-100
- Sharma, A., Bansal, A., Rishiwal, V., “SBADR: stable and bandwidth aware dynamic routing protocol for mobile ad hoc network”, International Journal of Pervasive Computing and Communications, 16(3), pp. 205-221
- Sharma, A., Bansal, A., Rishiwal, V., “Efficiency parameters for node indexing to get energy efficient and bandwidth aware path”, International Journal of Sensors, Wireless Communications and Control, 10(5), pp. 735-748
- Sharma, A., Bhatnagar, V., Bansal, A., “Technical analysis-based fuzzy support system for stock market trading”, International Journal of Advanced Intelligence Paradigms, 17(3-4), pp. 193-207
- Chauhan, N., Bansal, A., Matam, R., “Optimized distributed resource allocation for cloud computing applications”, International Journal on Emerging Technologies, 11(2), pp. 929-934
- Thakur, N., Mehrotra, D., Bansal, A., Bala, M., “Simulation and performance analysis of tilted time window and support vector machine based learning object ranking method”, Recent Advances in Electrical and Electronic Engineering, 13(2), pp. 153-164
- Chandel, K., Kunwar, V., Sabitha, A.S., Bansal, A., Choudhury, T., “Analysing thyroid disease using density-based clustering technique”, International Journal of Business Intelligence and Data Mining, 17(3), pp. 273-297
- Punia, S.K., Kumar, M., Agarwal, J., Malik, K., “Object Based Learning using Multi-Dimensional Games”, Journal of Discrete Mathematical Sciences and Cryptography (Taylor & Francis), 2020, Volume 23, Issue. 2, pp 509-524.
- Supriya Raheja, “An intuitionistic based novel approach to highest response ratio next CPU scheduler”, Intelligent Decision Technologies .
- Neetu Jain, Rabins Porwal, Sumit Kumar, Sapna Varshney & Mukesh Saraswat “Automatic data flow class testing based on 2-step heterogeneous process using evolutionary algorithms” Journal of Statistics and Management Systems Swarm intelligence & evolutionary computation for problem solving Volume 22, 2020.
- Chaturvedi, Yatender, and Sumit Kumar. "Selection of stand-alone self-excited induction generator parameters to obtain maximum allowable operating range under unbalanced operations using particle swarm optimization." International Journal of System Assurance Engineering and Management: 1-13.
- Grima Viz, Sumit kumar, Sapna, Priti Bansal “ Brain Tumor Detection using Renyi Entropy-based Multilevel 2D Histogram Image Segmentation and DEWO Optimization Algorithm” E-Health and Medical Communications IGI Global.
- Chaturvedi, Yatender, Sumit Kumar, and Vishal Gupta. "Capacitance Requirement for Rated Current and Rated Voltage Operation of SEIG Using Whale Optimization Algorithm." Procedia Computer Science 167.
- Stephan, Thompson, Fadi Al-Turjman, K. Suresh Joseph, Balamurugan Balusamy, and Sweta Srivastava. “Artificial Intelligence Inspired Energy and Spectrum Aware Cluster Based Routing Protocol for Cognitive Radio Sensor Networks.” Journal of Parallel and Distributed Computing, April 24, 2020. https://doi.org/10.1016/j.jpdc.2020.04.007
- Bhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. “Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems.” IEEE Access, 2020, 1–1. https://doi.org/10.1109/ACCESS.2020.2998983
- Chithaluru, Premkumar, Fadi Al-Turjman, Manoj Kumar, and Thompson Stephan. “I-AREOR: An Energy-Balanced Clustering Protocol for Implementing Green IoT in Smart Cities.” Sustainable Cities and Society, May 23, 2020, 102254. https://doi.org/10.1016/j.scs.2020.102254 .
- K. Muhuri, P.K. Gupta, J.M. Mendel, “Person Footprint of Uncertainty Based CWW Model for Power Optimization in Handheld Devices”, IEEE Transactions on Fuzzy Systems, Vol 28, Issue 3, pp. 558 – 568, DOI: 10.1109/TFUZZ.2019.2911049, 2020.
- K. Muhuri, P.K. Gupta, “A novel solution approach for multiobjective linguistic optimization problems based on the 2-tuple fuzzy linguistic representation model”, Applied Soft Computing, Elsevier, Accepted, https://doi.org/10.1016/j.asoc.2020.106395 , 2020.
- Sharma, R., Vashisht, V., Singh, U., “WOATCA: A secure and energy aware scheme based on whale optimisation in clustered wireless sensor networks”, IET Communications, 14(8), Volume 14, Issue 8, pp. 1199 –1208.
- Goyal, A., and Sardana, N., “Performance Assessment of Bug Fixing Process in Open Source Repositories”, Procedia Computer Science, Volume 167, pp. 2070-2079, 2020.
- Xuedong Xu, Wei Sun, Vivekananda GN, Achyut Shankar, “Achieving concurrency in cloud‐orchestrated Internet of Things for resource sharing through multiple concurrent access”, Computational Intelligence, (2020) [ Willey & SCI Impact Factor- 0.778]
- X Nie, Achyut Shankar: Big Data analytics and IoT in Operation safety management in Under Water Management, Computer Communications, (2020) [Elsevier & SCI with Impact Factor-2.8]
- A. Sampathkumar, Achyut Shankar: An efficient hybrid methodology for detection of cancer-causing gene using CSC for micro array data, Journal of Ambient Intelligence and Humanized Computing, (2020) [Springer Regular Issue & SCI with Impact Factor- 1.91]
- Ghazanfar Latif, Achyut Shankar, Jaafar M. Alghazo, V. Kalyanasundaram, C.S. Boopathi and M. Arfan Jaffar I-CARES: Advancing Health Diagnosis and Medication through IoT, Wireless Networks, (2019) [ Springer & SCI with Impact Factor- 2.4]
- Prabhishek Singh, Raj Shree, “Impact of Method Noise on SAR Image Despeckling”, International Journal of Information Technology and Web Engineering (IJITWE), IGI Clobal, Volume 15, Issue 1, Pages 52-63, 2020, Scopus, ESCI
- Prabhishek Singh, Amrendra Tripathi, S. Singh, Manoj Diwakar, Raj Shree, "A comparative analysis on SAR image despeckling techniques", Issue Vol. 83: March/April 2020, Test Engineering and Management, Page no: 5978 - 5985, Scopus.
- Prabhishek Singh, Rahul Sharma, Saurabh Sambhav, Shilpi Singh, Manoj Diwakar. (2020). A comparative study of decomposition level using entropy and wiener function in wavelet transform. International Journal of Control and Automation, 13(2s), 58 - 63, http://sersc.org/journals/index.php/IJCA/article/view/11541, Scopus.
- Prabhishek Singh, Chandrakala Arya, Kanika Sharma, Manoj Diwakar, Shilpi Singh, "Efficient Wavelet related Transforms in Image Denoising", Issue Vol. 83: May/June 2020, Test Engineering and Management, Page no: 8595 - 8602, Scopus.
- Prabhishek Singh, Manoj Diwakar, “Wavelet-based Multi-focus Image Fusion using Average Method Noise Diffusion (AMND)”, Recent Patents on Computer Science, (ACCEPTED), Scopus.
- Raj Shree, Ashwani Kant Shukla, Ravi Prakash Pandey, Vivek Shukla, Prabhishek Singh, "A Critical Review on Despeckling Methods in Agricultural SAR Image", International Journal of Applied Exercise Physiology, 2322-3537, http://ijaep.com/incompelete/PAPER.pdf, http://www.ijaep.com/index.php/IJAE/inpress. ESCI.
- Rashmi Dhaundiyal, Amrendra Tripathi, Kapil Joshi, Manoj Diwakar, Prabhishek Singh, "Clustering based Multi-modality Medical Image Fusion", IOP Publishing, Journal of Physics: Conference Series, 1478 (2020) 012024, doi:10.1088/1742-6596/1478/1/012024., SCOPUS.
Year 2019
- Singh, H., Kumar, Y., Kumar, S, “A new meta-heuristic algorithm based on chemical reactions for partitional clustering problems”, Evolutionary Intelligence, 2019.
- Sonam Soni, Praveen Kumar, Amal Saha, “Automatic fill-in-the-blank type questions and answer generation from text using NLP”, Journal of Advanced Research in Dynamical and Control Systems, 2019, Volume 11, Issue 10, pp 36-43.
- Praveen Kumar, Anisha Rani, Seema Rawat, “Analysis of mean-shift algorithm to detect hotspots of dengue fever outbreak”, Journal of Advanced Research in Dynamical and Control Systems, 2019, Volume 11, Issue 10, pp 27-35.
- Sharma, R., Singh, S.N., Khatri, S., “Data mining classification techniques - Comparison for better accuracy in prediction of cardiovascular disease”, International Journal of Data Analysis Techniques and Strategies, Volume 11, Issue 4, pp 356-373.
- Sharma, R., Vashisht, V., Singh, U., “Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization”, Journal of King Saud University - Computer and Information Sciences.
- Banga, M., Bansal, A., Singh, A., “Estimating performance of intelligent software systems”, International Journal of Recent Technology and Engineering, 8(3), pp. 1150-1156.
- Sharma, A., Bansal, A., Rishiwal, V. , “Efficient on demand routing protocol to optimize throughput in MANET”, International Journal of Recent Technology and Engineering, 8(3), pp. 2653-2660.
- Thakur, N., Mehrotra, D., Bansal, A., Bala, M., “A novel multi-parameter tuned optimizer for information retrieval based on particle swarm optimization”, International Journal of Recent Technology and Engineering, 8(3), pp. 1723-1731.
- Kakkar, M., Jain, S., Bansal, A., Grover, P.S., “Fuzzy logic based model to predict per phase software defect”, International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue), pp. 36-41.
- Mishra, V.P., Shukla, B., Bansal, A., “Analysis of alarms to prevent the organizations network in real-time using process mining approach”, Cluster Computing pp. 7023-7030.
- Hasteer, N., Bansal, A., Murthy, B.K., “Barriers to crowdsource software development: Evaluating the intertwined effects”, International Journal of Business Information Systems, 32(2), pp. 127-144.
- Banga, M., Bansal, A., Singh, A., “Proposed hybrid approach to predict software fault detection”, International Journal of Performability Engineering, 15(8), pp. 2049-2061.
- Narwal, P., Kumar, D., Singh, S.N., “A hidden Markov model combined with Markov games for intrusion detection in cloud”, Journal of Cases on Information Technology, 21(4), pp. 14-26.
- Sharma, A., Kumar, S., Singh, S.N., “Brain tumor segmentation using DE embedded OTSU method and neural network”, Multidimensional Systems and Signal Processing pp. 1263-1291.
- Singh, L., Singh, S.N., Dawra, S., Tuli, R., “A fuzzy rule-based approach for test case selection probability estimation in regression testing”, International Journal of Computer Aided Engineering and Technology, 11(3), pp. 391-408.
- Garg, R., “Parametric selection of software reliability growth models using multi-criteria decision-making approach”, International Journal of Reliability and Safety, 13(4), pp. 291-309.
- Anand, T., Pal, R., Dubey, S.K., “Cluster analysis for diabetic retinopathy prediction using data mining techniques”, International Journal of Business Information Systems, 31(3), pp. 372-390.
- Deb, V., Vashisht, V., Arora, N., “Semantic web ontologies based knowledge management framework for IT service management”, International Journal of Recent Technology and Engineering, 8(2 Special Issue 7), pp. 512-517.
- Lakhani, K., Vashisht, V., Gugnani, N., “Erratum: A novel method using SOM for recognizing patterns in dental radiographs-a conceptual approach”, Informatics in Medicine Unlocked, pp21-26.
- Chhabra, G., Vashisht, V., Ranjan, J., “A review on missing data value estimation using imputation algorithm”, Journal of Advanced Research in Dynamical and Control Systems, 11(7 Special Issue), pp. 312-318.
- Chhabra, G., Vashisht, V., Ranjan, J., “Crime prediction patterns using hybrid K-means hierarchical clustering”, Journal of Advanced Research in Dynamical and Control Systems, 11(6 Special Issue), pp. 1249-1258.
- Ahuja, S.K., Shukla, M.K., Ravulakollu, K.K., “Surface corrosion grade classification using convolution neural network”, International Journal of Recent Technology and Engineering, 8(3), pp. 7645-7649.
- Bhardwaj, A., Kaur, S., Shukla, A.P., Shukla, M.K., “Effects of various de-speckling filters on brachial plexus ultrasound imaging”, International Journal of Recent Technology and Engineering, 8(2), pp. 5058-5065.
- Agrawal, A.P., Choudhary, A., Kaur, A., “An effective regression test case selection using hybrid whale optimization algorithm”, International Journal of Distributed Systems and Technologies, 11(1), pp. 53-67
- Mehta, G., Dutta, M.K., Kim, P.S., “Biometric data security using joint encryption and watermarking”, International Journal of Electronic Security and Digital Forensics, 11(4), pp. 379-394.
- Vijh, S., Gaur, D., Kumar, S., “An intelligent lung tumor diagnosis system using whale optimization algorithm and support vector machine”, International Journal of Systems Assurance Engineering and Management.
- Gaur, D., Mehrotra, D., Singh, K., “Image correlation method to simulate physical characteristic of particulate matter”, International Journal of Systems Assurance Engineering and Management.
- Tomar, S.K., Singh, S.P., Husain, A., Kaswan, K.S., Tomar, K., “Face acknowledgement framework using hybrid of genetic algorithm and ant colony optimization algorithm”, International Journal of Scientific and Technology Research, 8(11), pp. 127-132.
- Gupta, K., Kumar, S., Tripathy, M.R., “Implementation of smart card for vehicular information”, International Journal of Engineering and Advanced Technology, 8(5), pp. 1751-1760.
- Tandon, A., Srivastava, P., “Energy efficient cross-layer routing protocols for IoT applications – An empirical research”, International Journal of Engineering and Advanced Technology, 8(6 Special Issue), pp. 7-12.
- Pant, P., Srivastava, P., Gupta, A., “Provisional research on ensemble learning techniques for card fraud detection”, International Journal of Engineering and Advanced Technology, 8(6 Special Issue), pp. 13-17.
- Sharma, R., Thakral, A., “Identifying botnets: Classification and detection”, International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue), pp. 131-137.
- Sethi, D., Anand, J., “Big data and WBAN: Prediction and analysis of the patient health condition in a remote area”, Engineering and Applied Science Research, 46(3), pp. 248-255.
- Altamash, M., Avinashwar, Faujdar, N., Saraswat, S., “Video based facial detection & recognition”, International Journal of Innovative Technology and Exploring Engineering, 8(9), pp. 661-665.
- Upadhyay, D., Dubey, A.K., Thilagam, P.S. “A statistical tool for time synchronization problem in WSN”, Recent Patents on Engineering, 13(2), pp. 154-158.
- Agarwal, N., Rana, A., Pandey, J.P., Agarwal, A., “Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE”, International Journal of Information Security and Privacy, 14(1), pp. 44-66.
- Agarwal, N., Rana, A., Pandey, J.P., “Guarded dual authentication based DRM with resurgence dynamic encryption techniques, Enterprise Information Systems, 13(3), pp. 257-280.
- 38. Shukla, S., Kumar, M. ,“Optimized MRAI timers for border gateway protocol in large networks”, International Journal of Distributed Systems and Technologies, 10(4), pp. 31-44.
- Bhatnagar, A., Majumdar, N., Shukla, S., “BGP anomaly detection using decision tree based machine learning classifiers”, International Journal of Innovative Technology and Exploring Engineering, 8(12), pp. 4015-4020.
- Majumdar, N., Bhatnagar, A., Shukla, S., “Using linear discriminant analysis for dimensionality reduction for predicting anomalies of BGP data”, International Journal of Innovative Technology and Exploring Engineering, 8(11), pp. 1989-1995.
- Kumar, M., Rani, A., Srivastava, S., “Image Forensics Based on Lighting Estimation”, International Journal of Image and Graphics, 19(3),1950014.
- Kumar, M., Srivastava, S., “Image authentication by assessing manipulations using illumination”, Multimedia Tools and Applications, 78(9), pp. 12451-12463.
- Aggarwal, A., Rani, A., Kumar, M., “A robust method to authenticate car license plates using segmentation and ROI based approach”, Smart and Sustainable Built Environment.
- Goyal, V., Singh, G., Tiwari, O.M., Punia, S.K., Kumar, M., “Intelligent skin cancer detection mobile application using convolution neural network”, Journal of Advanced Research in Dynamical and Control Systems, 11(7 Special Issue), pp. 253-259.
- Singh, P., Shree, R., “Impact of method noise on sar image despeckling”, International Journal of Information Technology and Web Engineering, 15(1), pp. 52-63.
- Banga, M., Bansal, A., Singh, A., “Modeling attributes influencing intelligent information software system using exploratory factor analysis”, International Journal of Innovative Technology and Exploring Engineering, 8(8), pp. 2494-2498.
- Sharma, A., Bansal, A., Rishiwal, V., “Selection of high quality path through MXAODV in mobile ad-hoc network”, International Journal of Systems, Control and Communications 10(1), pp. 1-17.
- Thakur, N., Mehrotra, D., Bansal, A., Bala, M., “Comparative analysis of ranking functions for retrieving information from medical repository”, Malaysian Journal of Computer Science 32(1), pp. 18-30.
- Yassine, A., Singh, S., Hossain, M.S., Muhammad, G., “IoT big data analytics for smart homes with fog and cloud computing”, Future Generation Computer Systems 91, pp. 563-573
- Singh, S., Yassine, A., “IoT Big Data Analytics with Fog Computing for Household Energy Management in Smart Grids”, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 256, pp. 13-22
- Silambarasan, K., Kumar, P., “Healthcare service in cloud and internet of things using cuckoo search and PSO optimization techniques”, Journal of Computational and Theoretical Nanoscience 15(11-12), pp. 3571-3575.
- Garg, R., Kumar, R., Garg, S., “MADM-Based Parametric Selection and Ranking of E-Learning Websites Using Fuzzy COPRAS”, IEEE Transactions on Education, 62(1),8329446, pp. 11-18.
- Saini, G.S., Dubey, S.K., Bharti, S.K., “Fuzzy based novel framework for user oriented software engineering”, Journal of Engineering Science and Technology 14(1), pp. 73-86
- Sharma, S., “Respondents view of novel framework for data protection in social networking sites: An analysis”, International Journal of Computing Science and Mathematics 10(1), pp. 22-31.
- Singh, K., Jain, S., Andhra, V., Sharma, S., “IoT based approach for smart irrigation system suited to multiple crop cultivation”, International Journal of Engineering Research and Technology, 12(3), pp. 357-363.
- Chhabra, G., Vashisht, V., Ranjan, J., “Improving accuracy for cancerclassification with gene selection”, International Journal of Innovative Technology and Exploring Engineering, 8(4), pp. 192-199.
- Sharma, R., Vashisht, V., Singh, U., “EEFCM-DE: Energy-efficient clustering based on fuzzy C means and differential evolution algorithm in WSNs”, IET Communications, 13(8), pp. 996-1007.
- Dutta, K., Gupta, V., Dave, V.S., “Analysis and comparison of neural network models for software development effort estimation ”, Journal of Cases on Information Technology, 21(2), pp. 88-112.
- Tandon, A., Srivastava, P., “Location based secure energy efficient cross layer routing protocols for IOT enabling technologies”, International Journal of Innovative Technology and Exploring Engineering, 8(7), pp. 368-374.
- Upadhyay, D., Dubey, A.K., Santhi Thilagam, P., “A Probabilistic Model of Clock Offset Estimator (PMCOE) for Clock Synchronization in Wireless Sensor Network”, Wireless Personal Communications, 108(2), pp. 995-1007.
- Bora, A., Sharma, S., “Effective analysis of multimedia data: A human attention perspective”, International Journal of Innovative Technology and Exploring Engineering, 8(6), pp. 250-256.
- Faujdar, N., Verma, Y., Punhani, A., “Effective utilization and delimiting energy consumption based on IoT”, International Journal of Innovative Technology and Exploring Engineering, 8(6), pp. 1499-1504.
- Punhani, A., Faujdar, N., Kumar, S., “Design and evaluation of cubic torus Network-on-Chip Architecture”, International Journal of Innovative Technology and Exploring Engineering, 8(6), pp. 1672-1676.
- Agarwal, S., Chand, S., “A Content-Adaptive Median Filtering Detection Using Markov Transition Probability Matrix of Pixel Intensity Residuals”, Journal of Applied Security Research.
- Shankar, A., Jaisankar, N., Khan, M.S., Patan, R., Balamurugan, B., “Hybrid model for security-aware cluster head selection in wireless sensor networks”, IET Wireless Sensor Systems, 9(2), pp. 68-76.
- Bhatia, V., Rani, R., “A distributed overlapping community detection model for large graphs using autoencoder”, Future Generation Computer Systems, 94, pp. 16-26.
- Srivastava, S., Sahana, S.K., “Application of Bat Algorithm for Transport Network Design Problem”, Applied Computational Intelligence and Soft Computing, 2019,9864090.
- Srivastava, S., Sahana, S.K., “A survey on traffic optimization problem using biologically inspired techniques”, Natural Computing.
- Tiwari, S., Kumar, A., Punhani, A., Mishra K.K., “Modified Environmental Adaptation Method and its Application in Test Case”, Journal of Engineering Science and Technology Review 12 (6) (2019) 208 – 218.
Year 2018
- Neetu Faujdar and Rakhi Mittal, “Non-Uniform Gap Distribution Library Sort”, International Journal of Computer Science and Information Security, Vol. 16, Issue. 3, pp.49-55, 2018.
- Sehgal,R., Mehrotra,D., Bala,M.,“Prioritizing the refactoring need for critical component using combined approach”, Decision Science Letters, 7(3), pp. 257-272.
- Rakesh Garg, R. K. Garg, and Sandhya, “MCDM Based Parametric Selection and Ranking of E-learning Websites Using Fuzzy-COPRAS”, IEEE Transactions on Education, Issue. 99, pp. 1-8, 2018 doi: 10.1109/TE.2018.2814611.
- Kanika Lakhani, Dr. Vasudha Vashisht, Dr. Neeraj Gugnani, “A Novel method using SOM for recognizing patterns in Dental Radiographs- a Conceptual Approach”, ELSEVIER Journal: Informatics in Medicine Unlocked (IMU), Vol. 12, pp. 21-26, 2018.
- D. Upadhyay, A. K. Dubey and P. S. Thilagam, “Application of Non-Linear Gaussian Regression based Adaptive Clock Synchronization Technique for Wireless Sensor Network in Agriculture”, IEEE Sensors Journal. doi: 10.1109/JSEN.2018.2818302.
- D. Upadhyay, A. K. Dubey and P. S. Thilagam, “Time synchronization problem of wireless sensor network using maximum probability theory,” International Journal System Assurance Engineering Management (2018). doi:10.1007/s13198-018-0698-9.
- D. Mehrotra, R.Srivastava, R.Nagpal, and D. Nagpal, “Multiclass classification of mobile applications as per energy consumption”, Journal of King Saud University-Computer and Information Sciences.
- Kamanasish Bhattacharjee, Sushil Kumar, Hari Mohan Pandey, Millie Pant, David Windridge, and Ankit Chaudhary, “An improved block matching algorithm for motion estimation in video sequences and application in robotics." Computers & Electrical Engineering 68, 92-106, 2018. https://www.sciencedirect.com/science/article/pii/S0045790617311928?via%3Dihub
- Hari Mohan Pandey, Ankit Chaudhary, and Deepti Mehrotra, “Bit mask-oriented genetic algorithm for grammatical inference and premature convergence”, International Journal of Bio-Inspired Computation 12, no. 1, pp. 54-69, 2018. https://www.inderscienceonline.com/doi/abs/10.1504/IJBIC.2018.093339 .
- Sharma, A., Bhatnagar, V., Bansal, A., “SENSEX Price Fluctuation Forecasting Comparison Between Global Indices and Companies Making It”, Journal of Global Information Management 26(3), pp. 1-10.
- Sinha, S., Bhatnagar, V., Bansal, A., “Multi-Label Naïve Bayes Classifier for Identification of Top Destination and Issues to Accost by Tourism Sector”, Journal of Global Information Management 26(3), pp. 1-10.
- Bharara, S., Sabitha, S., Bansal, A., “Application of learning analytics using clustering data Mining for Students’ disposition analysis”, Education and Information Technologies 23(2), pp. 957-984.
- Kakkar, M., Jain, S., Bansal, A., Grover, P.S., “Combining data preprocessing methods with imputation techniques for software defect prediction”, International Journal of Open Source Software and Processes 9(1), pp. 1-19
- Thakur, N., Mehrotra, D., Bansal, A., Bala, M., “A hybrid document similarity measure based on integrating kullbackleibler distance & L1 norm for retrieving information from ohsumed data set”, Journal of Advanced Research in Dynamical and Control Systems 10(3), pp. 386-391
- Pal, R., Anand, T., Dubey, S.K., “Evaluation and performance analysis of classification techniques for thyroid detection”, International Journal of Business Information Systems, 28(2), pp. 163-177.
- Hardaha, P.N., Singh, S., “Structured data REST protocol for end to end data mashup“, Future Internet 10(10),98.
- Arora, A., Rakesh, N., Mishra, K.K., “Asset distribution and peerless selection approach for LTE based multifarious VANET networks”, International Journal of Mathematical, Engineering and Management Sciences 4(1), pp. 27-40.
- Mishra, V.P., Shukla, B., Bansal, A., “Intelligent intrusion detection system with innovative data cleaning algorithm and efficient unique user identification algorithm”, Journal of Advanced Research in Dynamical and Control Systems, 10(1), pp. 398-412.
- Saraswat, S., Srivastava, G., Shukla, S. ,“Classification of ECG signals using cross-recurrence quantification analysis and probabilistic neural network classifier for ventricular tachycardia patients”, International Journal of Biomedical Engineering and Technology, 26(2), pp. 141-156.
- Kumar, S., Ranjan, P., Ramaswami, R., Tripathy, M.R., “Resource efficient clustering and next hop knowledge based routing in multiple heterogeneous wireless sensor networks”, International Journal of Grid and High Performance Computing.
- Kumar, S., Ranjan, P., Radhakrishnan, R., Tripathy, M.R.,” Energy efficient multichannel MAC protocol for high traffic applications in heterogeneous wireless sensor networks”, Recent Advances in Electrical and Electronic Engineering.
Year 2017
- Chandel, K., Kunwar, V., Sabitha, S., Choudhury, T., & Mukherjee, S., “A comparative study on thyroid disease detection using K-nearest neighbor and Naive Bayes classification techniques”,CSI Transactions on ICT, 1-7.
- Akshay Saini, Shipra Saraswat, Neetu Faujdar, “Clustering Based Stock Market Analysis”, International Journal of Control Theory and Applications, May 2017.
- Sanjay Kumar Dubey, Shivani Singh & Harsh Chaudhary, “Evaluation of reliability of critical software system using fuzzy approach”, International Journal of System Assurance Engineering and Management, Springer, March 2017, ISSN 0975-6809, DOI 10.1007/s13198-017-0603-y
- Sanjay Kumar Dubey, Bhat Jasra, “Reliability Assessment of Component based Software Systems using Fuzzy and ANFIS Techniques”, International Journal of System Assurance Engineering and Management, Springer, March 2017, ISSN 0975-6809, DOI 10.1007/s13198-017-0602-z
- Anurag Bhatt, Sanjay Kumar Dubey, Ashutosh Kumar Bhatt, “Sudden Cardiac Arrest Prediction Using Predictive Analytics”, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, June 2017,
- Jyoti Agarwal, Sanjay Kumar Dubey, Rajdev Tiwari, “Proposal and validation of usability model for component-based software system”, Engineering Journal, Volume 21, Issue 5, September 2017, pp. 243-255 DOI: 10.22266/ijies2017.0630.28
- Gupta Richa, Deepti Mehrotra, and Rajesh Kumar Tyagi, “Comparative analysis of edge-based fractal image compression using nearest neighbor technique in various frequency domains”, Alexandria Engineering Journal (2017). https://doi.org/10.1016/j.aej.2017.03.038
- Gaurav Dubey; Ajay Rana; Jayanthi Ranjan, “Fine-grained opinion mining of product review using sentiment and semantic orientation”, Int. J. of Business Information Systems, Inderscience ,2017 Vol.25, No.1, pp 1-17, DOI: 10.1504/IJBIS.2017.10003903.
- Garima Mehta, Malay Kishore Dutta,Pyung Soo Kim, “Combinational domain-based encryption using FrWT and hyper-chaotic system for biometric data security”, Information Security Journal, pp. 1-14, 2017
- Sharma S, Anand S, Jaiswal AK, Goyal MK, “Predictive Analysis Using Classification Techniques in Healthcare Domain”, Indian Journal of Science and Technology.
- Goyal MK, Ghrera SP, Gupta JP. “Reducing the No. of Forward Nodes from 1-Hop Nodes to Cover 2-Hop Nodes with Network Coding” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), UniversitiTeknikal Malaysia Melaka (UTeM), Malaysia, SCOPUS INDEXED JOURNAL.
- Saurabh Singh and Madhavi Sinha, “Using Keystroke dynamics to generate cancellable fingerprints”, International Journal of Control Theory and Applications, Volume 10(15), 2017, pp 39-45.
- Hari Mohan Pandey, “A Survey on Evolutionary Robotics and Direction for Future Research”, Computers and Electrical Engineering, Elsevier (SCI indexed Impact Factor = 1.57).
- Hari Mohan Pandey, “Is Parameters Quantification in Genetic Algorithm Important, How to do it?”, IAES International Journal of Artificial Intelligence (IJ-AI) 6 (3), 112-123.
- Hari Mohan Pandey, “Genetic Algorithm for Grammar Induction and Rules Verification through a PDA Simulator”, IAES International Journal of Artificial Intelligence (IJ-AI) 6 (3), 100-111.
- Agrawal A.P. and Kaur Arvinder, “An Empirical Evaluation of Memory Less and Memory Using Meta Heuristics for solving Travelling Salesman Problem”, International Journal of Computational Systems Engineering, INDERSCIENCE.
- Agrawal A.P. and Kaur Arvinder, “Performance Comparison of Bat and Cuckoo Search Using Software Artifact Infrastructure Repository and Regression Testing”, International Journal of Artificial Intelligence Paradigms, INDERSCIENCE.
- Dilbagh Panchal, Prasenjit Chatterjee, Rajendra Kumar Shukla, Tanupriya Choudhury, Jolanta Tamosaitiene,” Integrated Fuzzy AHP-CODAS Framework for maintenance decision in urea fertilizer industry”, Economic Computation and Economic Cybernetics Studies and Research, Issue 3, 2017, Vol. 51.
- Choudhary, Ankur and Anurag Singh Baghel. "Software Reliability Prediction Using Cuckoo Search Optimization, Empirical Mode Decomposition, and ARIMA Model: CS-EEMD-ARIMA Based SRGM", IJOSSP, Vol.7 Issue 4, June 2017.
- Choudhary Ankur; Baghel Anurag; Sangwan Om, “An Efficient Parameter Estimation of Software Reliability Growth Models Using Harmony Search”, IET Software, 2017, DOI: 10.1049/iet-sen.2015.0171 (SCI, SCOPUS).
- Kamanasish Bhattacharjee, Sushil Kumar, Hari Mohan Pandey, Millie Pant, " An Improved Block Matching Algorithm for Motion Estimation in Video Sequences and Application in Robotics", Computers and Electrical Engineering, Elsevier Journal (SCI with Impact Factor = 1.6).
- Arashdeep Kaur, M.K. Dutta, K.M. Soni, Nidhi Taneja, “Localized & Self Adaptive Audio Watermarking Algorithm in Wavelet Domain”, Journal of Information Security & Applications, Elsevier, 2017, Vol. 33, No. 1, pp. 1-15.
- Arashdeep Kaur, M.K. Dutta, “LU Factorization based High Payload Audio Watermarking Algorithm Robust against Synchronization Attacks”, Multimedia Systems Journal, 2017, pp. 1-13.
- Arashdeep Kaur, M.K. Dutta, K.M. Soni, Nidhi Taneja, " Embedding Digital Watermark in One-Dimensional Signals Using Wavelet & Schur Decomposition”, International Journal of Electronic Security and Digital Forensic, 2017, Vol. 9, No. 1.
- Arashdeep Kaur, M.K. Dutta, “High Embedding Capacity and Robust Audio Watermarking for Secure Transmission with Tamper Detection”, ETRI Journal, Electronics & Telecommunications Research Institute Publishers.
- Geeta Chhabra, Dr.VasudhaVashisht, Dr.Jayanthi Ranjan,” A Comparison of Multiple Imputation Methods for Data with Missing Values”, Indian Journal of Science and Technology, May 2017, Vol (10) 19, Thomson Reuters "Web of Science" Zoological Record.
- Kanika Lakhani, Dr. VasudhaVashisht, Dr. Neeraj Gugnani, “An innovative approach to measure Root Surface Area using MATLAB”, ELSEVIER Journal of Informatics in Medicine Unlocked (IMU), ISSN: 2352-9148.
- Kanika Lakhani, Dr. VasudhaVashisht, Dr. Neeraj Gugnani, “An innovative approach to measure Root Surface Area using MATLAB”, ELSEVIER Journal of Informatics in Medicine Unlocked (IMU), ISSN: 2352-9148.
- Bharara, S., Sabitha, S., Bansal, A., “Application of learning analytics using clustering data Mining for Students’ disposition analysis”, Education and Information Technologies, 5 October 2017, Pages 1-28.
- Varun Gupta, ShivamLohia, & Dr. Deniz Çetinkaya, “A Systematic Literature Survey of Non Functional Requirement Prioritization Practices & Approaches”, International Journal of Software Engineering and Its Applications (IJSEIA), 2017.
- Varun Gupta, Raj Kumar Chopra and D.S Chauhan, “Status of Non Functional Requirements in Mobile Application development: An Empirical Study”, Journal of Information Technology Research (JITR) (IGI Global Journal), 2017.
- Varun Gupta, ShivamLohia, & Dr. Deniz Çetinkaya, “Non Functional Requirement Prioritization Approach Based on Dependencies & Usage Count”, International Journal of Software Engineering and Its Applications (IJSEIA), 2017.
- Rajni Sehgal, Deepti Mehrotra, Manju Bala “An Adaptive Neuro-Fuzzy Model to Predict the Reliability before Testing Phase” International Journal of Software Engineering and Its Applications Volume 9 (2017) pp. 162-172
- Rajni Sehgal, Deepti Mehrotra, Manju Bala “Analysis of Code Smell to Quantify the Refactoring” International Journal of Systems Assurance Engineering and Management, pp1-12.
- Rajni Sehgal, Deepti Mehrotra, Manju Bala “Prioritizing the refactoring need for critical component using combinedapproach”, Decision Science Letters, 7(3), pp. 257-272
- Jay Prakash, P. K. Singh,”Gravitational Search Algorithm and K-Means for Simultaneous Feature Selection and Data Clustering: A Multi-objective Approach,” Soft Computing, Springer.
- Jay Prakash, P. K. Singh,”Hybrid Gbest-guided Artificial Bee Colony for hard partitional clustering,” International Journal of System Assurance Engineering and Management, Springer.
- Saurabh Singh and Madhavi Sinha, "Feature Selection Based on Specific Weights", International Journal of Applied Pattern Recognition, 2017.
- Hasteer, N., Bansal, A., Murthy, B.K., “Assessment of cloud application development attributes through interpretive structural modeling”, International Journal of Systems Assurance Engineering and Management 8, pp. 1069-1078
- Bhatia, M., Bansal, A., Yadav, D., “A proposed quantitative approach to classify brain MRI”, International Journal of Systems Assurance Engineering and Management 8, pp. 577-584
- Gupta, V., Chopra, R.K., Chauhan, D.S., “Status of non-functional requirements in mobile application development: An empirical study”, Journal of Information Technology Research 10(1), pp. 59-84
- Saini, S., Dubey, S.K., “Recommendation of diet to jaundice patient on the basis of nutrients using AHP and fuzzy AHP technique”, International Journal of Intelligent Engineering and Systems, 10(4), pp. 91-99
- Singh, M.P., Dubey, S.K., “Recommendation of diet to anaemia patient on the basis of nutrients using AHP and fuzzy TOPSIS approach”, International Journal of Intelligent Engineering and Systems, 10(4), pp. 100-108.
- Agarwal, J., Dubey, S.K., Tiwari, R. “Proposal and validation of usability model for component based software system”, Engineering Journal, 21(5), pp. 243-255.
Year 2016
- Choudhary, A., Baghel, A. S., &Sangwan, O. P., “An efficient parameter estimation of software reliability growth models using gravitational search algorithm”, International Journal of System Assurance Engineering and Management, 1-10.
- Saurabh Singh and Madhavi Sinha, “Forensic Sketch Recognition using User Specific Facial Region,” Int. Journal of Biometrics, Inderscience, Volume 8 (2), 2016, pp 134-143.
- Saraswat, S., Srivastava, G., & Shukla, S. N., “Classification of ECG signals using cross recurrence quantification analysis and probabilistic neural network classifier for ventricular tachycardia patients”, International Journal of Biomedical Engineering and Technology. ISSN No: 1752-6426.
- Saraswat, S., Srivastava, G., & Shukla, S. N., “Malignant Ventricular Ectopy Classification using Wavelet Transformation and Probabilistic Neural Network Classifier”, ISSN No: 0974-5645, Indian Journal of Science and Technology, 9(40).
- AnkurTripathi, Gaurav Dubey, “Frequent Query Mining using Association rule mining technique”, International Journal of Control Theory and Applications, Scopus Index, Vol 9, Issue 220, 283-292, 2016.
- Amita Bhardwaj, Gaurav Dubey, “Enterprise Resource Planning (ERP) System in Retail- a case study on corporate Indian Retail Firm”, International Journal of Control Theory and Applications, Scopus Index Vol 9, Issue 17, 199-209, 2016.
- HitikaAtre, Raj Kumar Sagar, “Offloading Computation for Efficient Mobile Cloud Computing”, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/91978(Indexed by Scopus)
- Tanupriya Choudhury et al. “A Secure Biometric Image Encryption Scheme using Chaos and Wavelet Transformations”, International Journal of Advanced Security in Data Analytics and Networks (Special Issue for Recent Advances in Communications and Networking Technology).
- Bhaskar Mandal,Tanupriya Choudhury,” A Light Weight Secure Image Encryption Scheme Based on Chaos & DNA Computing” for Encrypted Audio Watermarking”, International Journal of Advanced Intelligence Paradigms (IJAIP).
- Skand, Manav, Dr. A Sai Sabitha, “Learners Grouping in Massive Open Online Courses”, American Journal of Distance Education”. Taylor and Francis (Scopus indexed -0.91).
- Kumar, P., Singh, S.N., “Survey on reusable software component repository in green technology”, International Journal of Applied Engineering Research, 10 (12), pp. 30961-30968
- Rashmi, Chawla, V., Sehgal, R., Nagpal, R., “The encryption algorithm”, International Journal of Security and its Applications, 9 (5), pp. 55-60
- Garima Mehta, M.K. Dutta, Pyung Soo Kim, “An Efficient and Lossless Cryptosystem for Security in Tele ophthalmology Applications Using Chaotic Theory”, International Journal of E-Health & Medical Communications, IGI Global Publishers, 2016, Vol. 7, No. 4, pp. 28-47.
- Singhal, A., Bansal, A., Kumar, A., “An approach to design test oracle for aspect oriented software systems using soft computing approach”, International Journal of Systems Assurance Engineering and Management 7 (1), pp. 1-5, 2016.
- Sabitha, A.S., Mehrotra, D., Bansal, A., Sharma, B.K., “A naive bayes approach for converging learning objects with open educational resources”, Education and Information Technologies, pp. 1753-1767.
- Sabitha,A.S., Mehrotra, D., Bansal, A., “Delivery of learning knowledge objects using fuzzy clustering”, Education and Information Technologies, pp. 1329-1349.
- Hasteer, N., Bansal, A., Murthy, B.K., “Crowdsourced Software Development Process: Investigation and Modeling through Markov Decision Theory”, International Journal of Software Engineering and its Applications, 9 (9), pp. 41-54
- Bhatia, M., Bansal, A., Yadav, D., Gupta, P., “A proposed stratification approach for MRI images”, Indian Journal of Science and Technology, 8 (22), 72152
- Hasteer, N., Bansal, A., Murthy, B.K., “An agent based simulation study of association amongst contestants in crowdsourcing software development through preferential attachment”, ARPN Journal of Engineering and Applied Sciences, 10 (6), pp. 2509-2517
- 20. Hasteer, N, Bansal, A, Murthy, B.K, “CrowdOP: An opinion polling model for crowdsourced software development, Information (Japan)Volume 19, Issue 6A, 2016, Pages 1945-1956.
- Madhulika, Bansal, A., Yadav, D., Madhurima, “Survey and comparative study on statistical tools for medical images”, Advanced Science Letters, 21 (1), pp. 74-77
- Sabitha, S., Mehrotra, D., & Bansal, A.,“New Weighted Clustering Approach to Map and Prioritize Learning Knowledge Objects Towards Learning Approaches”, International Journal of Emerging Technologies in Learning, 11(6).
- Sabitha, A. S., Mehrotra, D., & Bansal, A., “An ensemble approach in converging contents of LMS and KMS”, Education and Information Technologies, pp1673-1694.
- Mehrotra, Deepti, Sai Sabitha, Renuka Nagpal, and Nisha Mattas. "Landscape Analysis of Patent Dataset", 0975-1076 (Online); 0971-7544 (Print) NISCAIR-CSIR, India.
- Sharma, K., Sabitha, A. S., & Bansal, A.,“Automobile Engine Performance Analysis using Regression Technique”, Indian Journal of Science and Technology, 9(44).
- Bhatia, M., Bansal, A., Yadav, D., Gupta, P., “Proposed algorithm to blotch grey matter from tumored and non tumored brain MRI images”, Indian Journal of Science and Technology, 8 (17), 63144
- Thakur, S., Bansal, S., “Frame work for video content management”, International Journal of Applied Engineering Research, 10 (18), pp. 39434-39438
- Rathee, G., Rakesh, N., “Resilient packet transmission (RPT) for the buffer based routing (BBR) protocol”, Journal of Information Processing Systems, 12 (1), pp. 57-72
- Dwivedi, K., Dubey, S.K., “Taxonomy and comparison of Hadoop distributed file system with Cassandra file system”, ARPN Journal of Engineering and Applied Sciences, 10 (16), pp. 6870-6876
- Sharma, C., Dubey, S.K., “A perspective approach of software reliability models and techniques”, ARPN Journal of Engineering and Applied Sciences, 10 (16), pp. 7300-7308
- Garg, A., Shukla, B., “Open source technologies: A benevolence in education informatics”, Advanced Science Letters, 21 (1), pp. 117-121
- Garg, A., Shukla, B., Kendall, G., “Barriers to implementation of IT in educational institutions”, International Journal of Information and Learning Technology, 32 (2), pp. 94-108
- Rashmi, Chawla, V., Sehgal, R., Nagpal, R., “The RC7 encryption algorithm”, International Journal of Security and its Applications, 9 (5), pp. 55-60
- Sehgal, R., Mehrotra, D, “Predicting faults before testing phase using Halstead's metrics”, International Journal of Software Engineering and its Applications, 9 (7), pp. 135-142.
- Pandey, H.M., Chaudhary, A., Mehrotra, D., “Grammar induction using bit masking oriented genetic algorithm and comparative analysis”, Applied Soft Computing Journal, 38, pp. 453-468, (Impact Factor = 3.541).
- Kaur A.,M.K. Duta, K.M. Soni and N. Taneja,“Hiding biometric features in audio signals using Gram-Schmidt orthogonalisation”, Indian Journal of Science and Technology, Volume 8, Issue 1, 2016, Pages 63-81.
- Hari Mohan Pandey, Ankit Chaudhary, Deepti Mehrotra and Graham Kendall "Maintaining regularity and generalization in data using the minimum description length principle and genetic algorithm: Case of grammatical inference" Swarm and Evolutionary Computation, (Impact Factor = 3.893) (Visit: http://www.sciencedirect.com/science/article/pii/S2210650216300244 )
- Hari Mohan Pandey, Ankit Chaudhary and Deepti Mehrotra “Bit Mask Oriented Genetic Algorithm for Grammatical Inference and Premature Convergence”, International Journal of Bio-Inspired Computation, Impact Factor = 3.97
- Hari Mohan Pandey, “Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns”,Proceedia Computer Science, Elsevier. http://www.sciencedirect.com/science/article/pii/S1877050916000065 (Impact Factor = 0.709)
- Pandey Hari Mohan, et al. "Evaluation of Genetic Algorithm’s Selection Methods", Information Systems Design and Intelligent Applications. Springer India, 731-738.Visit: http://link.springer.com/chapter/10.1007/978-81-322-2752-6_7
- Hari Mohan Pandey, "Parameters Quantification of Genetic Algorithm", Information Systems Design and Intelligent Applications, pp. 711-719. Springer India,Visit http://link.springer.com/chapter/10.1007/978-81-322-2752-6_70 (Scopus and SCI Indexed)
-
Hari Mohan Pandey, AhalyaGajendran. "Function Optimization Using Robust Simulated Annealing." Information Systems Design and Intelligent Applications, pp. 347-355. Springer India,
Visit: http://link.springer.com/chapter/10.1007/978-81-322-2757-1_35 - Gaurav Dubey, Ajay rana, Jayanthi Ranjan, “A research study of sentiment analysis and various techniques of sentiment classification”, Inderscience, Int. J. Data Analysis Techniques and Strategies, Vol. 8, Issue 2, pp 122-142, May 2016.
- Shabnam Sharma, Gaurav Raj, Dr. Dheerendra Singh, "Third Party Authentication Process in CBCCP for Services Management using MSBE and MCBS", International Journal of Engineering and Technology (IJET), ISSN: 0975-4024, Vol. 5, No.2, 1498--1505.
- Gaurav Raj, Chaitanya Kapoor, Dr. Dheerendra Singh, "Comparative Cloud Deployment and Service Orchestration Process Using Juju Charms", International Journal of Engineering and Technology (IJET), ISSN: 0975-4024, Vol. 5, No.2, 1412 - 1418.
- Gaurav Raj, Navreet Singh, Dr. Dheerendra Singh, "Resource Provisioning Using Batch Mode Heuristic Priority with Round Robin Scheduling", International Journal of Engineering and Technology (IJET), ISSN: 0975-4024, Vol. 5, No.3, 2959-2966.
- Amanpreet Kaur, Gaurav Raj &Dheerendra Singh, "Multi Round Selective Encryption using AES Over Storage Cloud", Global Journal of Computer Science and Technology - Cloud and Distributed, Volume 13 Issue 3 Version 1.0, 1-7.
- Narjeet Singh, Gaurav Raj, "Security on BCCP Through AES Encryption Technique", International Journal Of Engineering Science & Advanced Technology, Volume-2, Issue-4, 813 – 819, ISSN: 2250–3676.
- Meera Ramadas, Millie Pant, Ajith Abraham, Sushil Kumar, “ssFPA/DE-An Efficient Hybrid Differential Evolution - Flower Pollination Algorithm based approach”, International Journal of System Assurance Engineering and Management, Springer.
- Meera Ramadas, Ajith Abraham, Sushil Kumar, “ReDE- A Revised mutation strategy for Differential Evolution Algorithm”, International Journal of Intelligent Engineering and Systems, Vol.9, No.3.
- Meera Ramdas, Ajith Abraham, Sushil Kumar, “FSDE-Forced Strategy Differential Evolution used for Data Clustering”, Journal of King Saud University-Computer and Information Sciences, ELSEVIER.
- Geetanjali Rathee, Nitin Rakesh, “Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol”, Journal of Information Process System, Vol.12, No.1, pp.57-72, March 2016.
- Nagpal, R., Mehrotra, D., & Bhatia, P. K., “Usability evaluation of website using combined weighted method: fuzzy AHP and entropy approach”, International Journal of System Assurance Engineering and Management, 7(4), 408-417.
- Richa Gupta, D. Mehrotra, and R. K. Tyagi, “Adaptive searchless fractal image compression in DCT domain”, The Imaging Science Journal, 64.7 (2016): 374-380.
- Singh AA, Gupta P, Bhatt P, Goyal MK. A Survey on Green Power Efficient Resource Allocation Algorithm for Cloud Infrastructure. Indian Journal of Science and Technology. 2016 Nov 30;9(44).
- Shukla A, Gupta P, Bhatt P, Goyal MK. Intelligent and Efficient Rule Based Home Automation System Using Voice Recognition. 2016 Nov 30: pp 647 - 656
- Goyal MK, Ghrera SP, Gupta JP. Improving the Average Number of Network Coded Transmission in AODV Routing Protocol with Network Coding Scheme. Indian Journal of Science and Technology. 2016 Aug 30; 9(32).
- Garima Mehta, Malay Kishore Dutta, Pyung Soo Kim, “A secure encryption method for biometric templates based on chaotic theory”, Transactions on Computational Science, vol.9570, pp.120-140, 2016.
- Saurabh Singh and Madhavi Sinha, “User Specific Feature Extraction for Continuous Authentication through Keystroke Dynamics,” Computers and Security, Elsevier, 2016.
- Saurabh Singh and Madhavi Sinha, “Forensic Sketch Recognition using User Specific Facial Region,” Journal of Biometrics, Inderscience, Volume 8 (2), 2016, pp 134-143.
- Meera Ramadas, Millie Pant, Ajith Abraham, Sushil Kumar (2016), “Segmentation of Weather Radar image based on hazard severity using RDE - Reconstructed mutation strategy for Differential Evolution Algorithm”, Neural Computing and Applications (NCAA), Springer (SCI)(Impact Factor-2.505). [ 1433-3058]. https://doi.org/10.1007/s00521-017-3091-8 , pp 1-9.
- Meera Ramadas, Millie Pant, Ajith Abraham, Sushil Kumar (2016), “ssFPA/DE-An Efficient Hybrid Differential Evolution - Flower Pollination Algorithm based approach”, International Journal of System Assurance Engineering and Management, Springer. https://doi.org/10.1007/s13198-016-0534-z , pp 1-14.
- Meera Ramadas, Ajith Abraham, Sushil Kumar (2016), “ReDE- A Revised mutation strategy for Differential Evolution Algorithm”, International Journal of Intelligent Engineering and Systems, Vol.9, No.3. [2185-3118].
- Varun Gupta, “Historical prioritisation and reprioritisations using hierarchical historical R-tree”, IJCAT, Vol 54, Issue 04, pp: 257-265, 2016.
- Varun Gupta, Prof. D.S Chauhan, Kamlesh Dutta, “Mass Market Development Strategies of Software Industries: Case Study Based Research”, Perspectives in Science, 2016 (Elsevier).
- Raj Kr. Chopra, Varun Gupta, D.S Chauhan, Perspectives in Science, “Experimentation on Accuracy of NonFunctional Requirement Prioritization Approaches for different complexity Projects”, 2016 (Elsevier).
- Anshul Tickoo, P.K,Kapur ,Sunil Khatri, A.K Verma, "Modeling two dimensional Framework for Multi Up-Gradations of a Software with Change Point" in IJRQSE,World scientific vol-23,No-6 ,DEC 2016
- Anshul Tickoo,P.K,Kapur, A.K.Srivastav ,Sunil Khatri, "Testing Effort Based Modeling to Determine Optimal Release and Patching Time of a Software" in International Journal of System Assurance Engineering and Management, Springer,vol.-7,No.4,pp-427-434, Dec 2016.
- 69. Nagpal, R., Mehrotra, D., Bhatia, P.K., “Analytical modelling approach to measure the usability of website”, International Journal of Software Engineering and its Applications, 10(5), pp. 125-142
Year 2015
- Sabitha, S., Mehrotra, D., Bansal, A., “Knowledge enriched learning by converging knowledge object & learning object”, Electronic Journal of e-Learning, 13 (1), pp. 3-13
- Kumar, S., Pant, M., Kumar, M., Dutt, A,” Colour Image Segmentation with Histogram and Homogeneity Histogram Difference Using Evolutionary Algorithms. International Journal of Machine Learning and Cybernetics, Springer (SCI(E)). Impact Factor-1.11
- Dev Kumar Chaudhary, R.L. , Kashyap, N. , “Diagnostically Lossy image compression using convex hull algorithm”, International Journal of Applied Engineering Research, Volume 10, Issue 13, 24 August 2015, Pages 32825-32829
- Deepali, Hari Mohan Pandey,“Approaches for Software Performance Modeling, Cloud Gill Computing and Openstack", International Journal on Computer Applications, June 2015.
- Sana Bharti, Shailendra Narayan Singh, “Improvised Agile SCRUM Using Test-Asa- Service”,International Journal of Computer Science and Engineering Open Access E-ISSN-2347-2693 Vol-3 issu-3 Page-166-171 March-2015.
- Akansha Bali, Shailendra Narayan Singh, “A Review on the Network Security Related to Wireless Sensor Network”, International Journal of Advance Research in Computer Science and Software Engineering, ISSN-2277-128X Vol-5 issu-3 Page-778-784 March-2015.
- Kadambri, Shailendra Narayan Singh, “A Comparative Study of Pedestrian Identification Approaches for Traffic Light Simulation”, International Journal of Computer Science Engineering and Technology ISSN-2331-0711 Vol-5 issu-4 Page-69-72 April-2015.
- Wani Irfan Ul Haq, Shailendra Narayan Singh, “Mobile Cloud Computing: A reverberation in the field of Giant Computational Ubiquitous Network”, International Journal of Engineering and Technical Research (IJETR) ISSN-2321-0869 Vol-3 issu-4 Page-26-30 April-2015.
- DibyaSourbhi, Sandeep Kaur, Shailendra Narayan Singh, “A survey on various security issues in hybrid cloud”, International Journal of Advanced Engineering Science and Technological Research (IJAESTR) ISSN: 2321-1202, Volume 3 issue 1,pg46-50 March 2015.
- Sandeep Kaur, DibyaSourbhi, Shailendra Narayan Singh, “Survey on intrusion detection system in cloud computing”, International Journal for Technological Research in Engineering ISSN: 2347-4718, Volume 2, Issue 8, pg1730-1734, April-2015.
- Akansha Bali, Dr. Shailendra Narayan Singh, “Comparing Performance of AODV, DSR, DSDV, ZRP with Black Hole Attack and without attack through use of NS2 Simulator”, International Journal of Applied Engineering Research ISSN-0973-4562 Vol-10 issu-12 Page- 32741-32755 July-2015.
- Sana Bharti, Shailendra Narayan Singh, “Empirical Study on Heart Disease Prediction System using Practical Swarm Optimization Clustering Mechanism”, International Journal of Applied Engineering Research ISSN-0973-4562 Vol-10 issu-14 Page- 34109-34113 August-2015.
- Nishant Tyagi, Divya Upadhyay, “Study of Database Encryption on Cloud”, International Journal of Computer and Communication System Engineering (IJCCSE), 2015.
- Neha Sharma, Dr. Sanjay Kr. Dubey, “Analysis and Design of Prefetching Framework for Mozilla Firefox”, International Journal of Information Engineering and Electronic Business, Vol. 7, No. 5, pp. 7-12, September 2015, ISSN: 2074-9031, Impact Factor. 0.12DOI: 10.5815/ijieeb.2015.05.02 [Indexed: EBSCO, IndexCopernicus, INSPEC(IET)].
- Indrajeet Sharma, Dr. Sanjay Kr. Dubey, “E-Voting System with Physical Verification Using OTP Algorithm”, International Journal of Hybrid Information Technology, Vol. 8, No. 8, pp.161-166, August 2015, ISSN: 1738-9968, http://dx.doi.org/10.14257/ijhit.2015.8.8.15 [Indexed: EBSCO, ProQuest, ULRICH, Cabell, EI Compendex].
- Anusha Gupta, Dr. Sanjay Kr. Dubey, “Analytical Approach for Security of Sensitive Business Database”, International Journal of Database Theory and Application, Vol.8, No.3, May-June 2015, pp.49-56, ISSN: 2005-4270 DOI: 10.14257/ijdta.2015.8.3,05[Indexed: EBSCO, ProQuest, ULRICH, Cabell, EI.
- Sumit Pandey, Dr. Sanjay Kr. Dubey, “Measurement of Usability of Office Application Using a Fuzzy Multi-Criteria Technique”, International Journal of Information Technology and Computer Science, Vol. 7, No. 4, pp. 64-72, March 2015, Impact Factor: 0.07, ISSN: 2074-9015, DOI: 10.5815/ijitcs.2015.04.07 [Indexed: EBSCO, IndexCopernicus, INSPEC (IET)].
- Disha Sharma, Dr. Sanjay Kr. Dubey, “Software Quality Appraisal Using Multi-Criteria Decision Approach”, International Journal of Information Engineering and Electronic Business, Vol. 7, No. 2, pp. 8-13, March 2015, Impact Factor: 0.12, ISSN: 2074-9031, DOI:10.5815/ijieeb.2015.02.02 [Indexed: EBSCO, IndexCopernicus, INSPEC (IET)].
- Surabhi Thareja, Roshan Lal Chhoker, “CognitoAn E-Learning Portal”International Journal (IASIR US) May-2015.
- Abha Sharma, Roshan Lal Chhoker,” An E-learning Environment”, International journal (IASIR US)May-2015.
- Ranjan Kumar Panda, Dr. Pradeep Kumar Singh, “A Critical Analysis on Software Fault Prediction Techniques”, World Applied Sciences Journal, Vol. 33 (3), Pages 371-379, 2015.
- Rajni Sehgal, Dr.Deepti Mehrotra “Predicting faults before testing phase using Halstead’s Metrics” International Journal of Software Engineering and Its Applications Vol. 9, No. 7 (2015), pp. 135-142 .
- Somya Singh, Neetu Narayan and Gaurav Raj, “Survey on Data Processing and Scheduling in Hadoop”, International Journal of Computer Applications (0975 – 8887), Volume 119 - Number 22, June 2015, 27-30, DOI: 10.5120/21370-4411.
Year 2014
- Hari Mohan Pandey, Ankit Chaudhary, and Deepti Mehrotra. "A comparative review of approaches to prevent premature convergence in GA" Applied Soft Computing 24 (2014): 1047-1077. (ImpactFactor=541) (Visit http://www.sciencedirect.com/science/article/pii/S1568494614003901)
- Om PreetiChaurasia ,Rashi Kohli, Dr. Anchal Garg , “Biometrics Minutiae Detection and Feature Extraction”, Lampart publishers , Germany
- Rajni Sehgal, Deepti Mehrotra “Analysis of Software Defect prediction Metrics”, World Applied Sciences Journal 32 (3): 368-378, 2014 ISSN 1818-4952 © IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.32.03.98
- Harjinder Singh, Gaurav Raj, "Reserve Based Approach for Effective Resource Provisioning in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 4, Issue 9, September 2014, pp. 526-529.
- Arunima Jaiswal, Gaurav Raj, Dheerendra Sing, "Security Testing of Web Applications: Issues and Challenges", International Journal of Computer Applications (0975 – 8887), Volume 88– No. 3, Feb 2014, 26-32.
- Ankit Mundra, Geetanjali Rathee, Meenu Chawla, Nitin Rakesh, Ashutosh Soni, “Transport Information System using Query Centric Cyber Physical Systems (QCPS)”, International Journal of Computer Applications, Volume 85, Issue 3, Pages 12-16, January 2014. Published by Foundation of Computer Science, New York, USA.
- Ompal Singh, Jyotish Singh, Anshul Tickoo, and P.K Kapur, “Fault Removal Phenomenon using Different Distribution Functions for Each Release,” International Journal of Modeling and Optimization, IACSIT Press, vol.-4, pp-5, feb-2014.
- K.Kapur, Sunil Kumar Khatri, Anshul Tickoo and Omar Shatnawi , “Release Time Determination depending on number of test runs using multi attribute utility theory,” International Journal of System Assurance Engineering and Management,Springer,vol.-5,pp-186-194, June-2014.
Year 2013
- Surbhi Rautji, Deepak Gaur, “Immersive 3D Visualization of Remote Sensing Data”, Signal & Image Processing: An International Journal (SIPIJ).
- Karan Khare, DeepakGaur, “Behavioural Biometrics and Cognitive Security Authentication Comparison Study”, Advanced Computing: An International Journal(ACIJ).
- Mohit Agarwal , Gaurav Dubey, “Application of clustering technique for Tissue Image Segmentation & Comparison”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 1487 ISSN 2229-5518.
- Ashish Kots, Manoj Kumar, “The fuzzy based QMPR selection for OLSR routing protocol”, Springer Journal of Wireless Network.
- Shikha Raina , Arun Prakash Agrawal, “An Automated Tool for Regression Testing in Web Applications”, ACM SIGSOFT Software Engineering Notes, Vol. 38, Issue 4, pp. 1- 4, July 2013, DOI: 10.1145/2492248.2492272.
- Rajni Sehgal, Dr.Deepti Mehrotra “Predicting Reliability from frequent errors using A-Priori Algorithm” World Applied Sciences Journal 28 (5): 654-658, 2013, ISSN 1818-4952 © IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.05.1383
- Amanpreet Kaur, Gaurav Raj, "Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March- 2013, 79 -83.
- Naga Sri Morampudi, Gaurav Raj, "Evaluating Strengths and Weaknesses of Agile Scrum Framework using Knowledge Management", International Journal of Computer Applications (0975 – 8887), Volume 65– No.23, March 2013, 01--06.
- Gaurav Raj, Shabnam Sharma, "A New Approach of Multicasting in Cloud Computing", International Journal of Engineering Sciences & Research Technology, ISSN: 2277-9655, 2(6): June 2013, 1-9.
- Isha, Arun Malik, Gaurav Raj, "DOS Attacks on TCP/IP Layers in WSN", International Journal of Computer Networks and Communications Security, Vol. 1, No. 2, JULY 2013, 40–45.
- Ankit Mundra, Nitin Rakesh, Vipin Tyagi, “Query centric Cyber Physical System (QCPS) Approach for multiple Heterogeneous Systems” International Journal of Computer Science and Technology (IJCST) Volume 4, Special Issue 2, Pages 23-27, April 2013.
- Ankit Mundra, Bhagvan K. Gupta, Geetanjali Rathee, Meenu Chawla, Nitin Rakesh, Vipin Tyagi, “Validated Real Time Middle Ware for Distributed Cyber Physical Systems using HMM”, International Journal of Distributed and Parallel Systems (IJDPS) Volume 4, Issue 2, Pages 23-33, March 2013.
- Nagpal, R., Mehrotra, D., Sharma, A., Bhatia, P., “ANFIS method for usability assessment of website of an educational institute”, World Applied Sciences Journal, 23(11), pp. 1489-1498
Year 2012
- Gaurav Raj, MunishKatoch, "Security Implementation through PCRE Signature over Cloud Network", Advanced Computing: An International journal, May 2012, Vol. 3 No. 3 ISSN: 2229 - 6727[Online]; 2229 - 726X [Print], 119--127.
- NITIKA, SHAVETA, Gaurav Raj, "Comparative Analysis of Load Balancing Algorithms in Cloud Computing", International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1 No. 3 (2012) (ISSN:2278-1323), 120 --124.
- Gaurav Raj, Ankit Nischal, "Efficient Resource Allocation in Resource Provisioning Policies Over Resource Cloud Communication Paradigm", International Journal on Cloud Computing: Services and Architecture, June 2012, Vol. 2, No. 3, ISSN: 2231 - 5853[Online]; 2231 - 6663 [Print],11-18.
- Gaurav Raj, Kamaljeet Kaur, “Secure Cloud Communication for Effective Cost Management System through MSBE”, International Journal on Cloud Computing: Services and Architecture, June 2012, Vol. 2, No. 3, ISSN: 2231 - 5853[Online]; 2231 - 6663 [Print], 19-30.
- Gaurav Raj, Sonika Setia, "Effective Cost Mechanism for Cloudlet Retransmission and Prioritized VM Scheduling Mechanism Over Broker Virtual Machine Communication Framework", International Journal on Cloud Computing: Services and Architecture, June 2012, Vol. 2, No. 3, ISSN: 2231 - 5853[Online]; 2231 - 6663 [Print], 41-50.
- Anant Kr Jayswal, Rubina Perveen, Vibhor Kant, “E-Learning Recommended System-A Survey”, International Journal of Engineering Research and Development, November 2012, Volume 4, Issue 12, e-ISSN: 2278-06X, P-ISSN: 2278-800X, PP. 10-12.