Computer Science & Engineering

Research Publications

Year Author(s) Title & Vol. No. Journal Name Indexing (SCI) Web of Science/Scopus
2015 Arun Kumar Yadav and Divakar Yadav Wavelet Tree based Hybrid Geo-Textual Indexing Technique for Geographical Search Vol 8(33) Indian Journal of Science and Technology Scopus
2016 Arun Kumar Yadav,Divakar Yadav and Rajesh Prasad Efficient Textual Web Retrieval using Wavelet Tree, Vol 6(4) International Journal of Information Retrieval Research ESCI
2019 Arun Kumar Yadav and Divakar Yadav Wavelet Tree based Dual Indexing Technique for Geographical Search, Vol 16(4) The International Arab Journal of Information Technology SCI-E
2019 Jay Kant Pratap Singh Yadav, Arun Kumar Yadav, Divakar Yadav, Vikash Yadav Optimization of Hopfield Networks for Storage and Recall: A Decade Review DOI: 10.1504/IJAIP.2021.10030669(In press) International Journal of Advanced Intelligence Paradigms Scopus
2020 Arun Yadav, Jay Kant Pratap Singh Yadav, Divakar Yadav Spatial Ambiguities Optimization in GIR, Vol-7(28) EAI Endorsed Transactions on Scalable Information Systems ESCI
2020 Arun Yadav, Divakar Yadav and Arti Jain An Improvised Feature-Based Method for Sentimental Analysis of Product Reviews, Vol 8(29) EAI Endorsed Transactions on Scalable Information Systems ESCI
2020 Yadav, D., Akanksha, Yadav, A.K. A novel convolutional neural network based model for recognition and classification of apple leaf diseases Vol. 37(6), pp. 1093-1101 Traitement du Signal SCI-E
2021 Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav Microaneurysm Detection using Color Locus Detection Method Elsevier Publication ,Measurement 176 (2021) SCI-E
2018 B. Subba, S. Biswas, S. Karmakar "A game theory based multi layered intrusion detection framework for VANET". Vol. No. 82 Future Generation Computer Systems, Elsevier SCIE
2018 B. Subba, S. Biswas, S. Karmakar “False Alarm Reduction in Signature based IDS: Game Theory Approach”. Vol. No. 9(18) Security and Communication Networks, Wiley SCIE
2016 B. Subba, S. Biswas, S. Karmakar “Intrusion Detection in Mobile Ad-hoc Networks: Bayesian Game Formulation". Vol. No. 19(2) Engineering Science and Technology, an International Journal (JESTECH), Elsevier, SCIE
2018 B. Subba, S. Biswas, S. Karmakar “A game theory based multi layered intrusion detection framework for wireless sensor networks.” Vol. No. 25 International Journal of Wireless Information Networks, Springer, Web of Science (ESCI)
2020 B. Subba, Prakriti Gupta "A TfidfVectorizer and Singular Value Decomposition based host intrusion detection system framework for detecting anomalous system processes," Vol. No. 100 Computers & Security, Elsevier SCIE
2019 Dharmendra Prasad Mahato and Ravi Shankar Singh Load balanced scheduling and reliability modelling of grid transaction processing system using coloured petri nets, Volume 84, January 2019, Pages 225-236 ISA Transactions, Elsevier SCI
2017 Dharmendra Prasad Mahato and Ravi Shankar Singh On maximizing reliability of grid transaction processing system considering balanced task allocation using social spider optimization , Volume 38, February 2018, Pages 202-217 Swarm and Evolutionary Computation, Elsevier SCI
2018 Dharmendra Prasad Mahato et al. On Scheduling Transactions in a Grid Processing System considering load through Ant Colony Optimization , Volume 61, December 2017, Pages 875-891 Applied Soft Computing, Elsevier SCI
2018 Dharmendra Prasad Mahato and Ravi Shankar Singh Load Balanced Transaction Scheduling using Honey Bee Optimization Considering Performability in On-demand Computing System, DOI: 10.1002/cpe.4253 Concurrency and Computation: Practice and Experience, Wiley SCIE
2018 Dharmendra Prasad Mahato and Ravi Shankar Singh Balanced task allocation in the on-demand computing based transaction processing system using social spider optimization, DOI: 10.1002/cpe.4214 Concurrency and Computation: Practice and Experience, Wiley SCIE
2018 Dharmendra Prasad Mahato and Ravi Shankar Singh Maximizing availability for task scheduling in on-demand computing based transaction processing system using ant colony optimization, DOI:10.1002/cpe.4405 Concurrency and Computation: Practice and Experience, Wiley SCIE
2019 Dharmendra Prasad Mahato et al. On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load Cluster Computing, Springer SCI (Published on 23rd November 2019)
2021 Dharmendra Prasad Mahato and Van Huy Pham Reliability Analysis in Grid System Considering Load Cluster Computing, Springer SCI (Accepted on 13th January 2021)
2021 Irphan Ali, Divakar Yadav Question Reformulation based Question Answering Environment Model, DOI: 10.1007/s41870-019-00332-8. International Journal of Information Technology, Springer ISSN: 2511-2104(Print), Vol. 13, 59–67 Scopus, DBLP
2019 JKPS Yadav, A. Yadav, D. Yadav, V. Yadav Optimization of Hopfield networks for storage and recall: A decade Review International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 . DOI:10.1504/IJAIP.2019.10026855 Scopus, DBLP
2019 Anuja Arora, Riyu Bana, Habib Shahand Divakar Yadav Artificial Bee Colony Based Influence Maximization Approach for Social Coding Portal GitHub, Vol. 10, Issue 2, Article No. 4. International Journal of Swarm Intelligence Research (IJSIR), IGI Global, ISSN: 1947-9263 Web of Science, Scopus, DBLP
2019 Irphan Ali, Divakar Yadav, and A.K. Sharma Question Answering System for Semantic Web: A Review (In Press) International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 Scopus, DBLP
2019 Irphan Ali, Divakar Yadav, and A K Sharma SWFQA Semantic Web based Framework for Question Answering, Vol. 9, Issue 1, article 6, pp. 88-106. International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 Web of Science, DBLP
2019 A. Yadav, D. Yadav Wavelet Tree based Dual Indexing Technique for Geographical Search, Vol 16, No. 6, pp. 624-632. International Arab Journal of Information Technology, ISSN: 1683-3198 (print), ISSN: 2309-4524 Web of Science,, Scopus, DBLP
2018 K. Vimal Kumar, Divakar Yadav Word Sense Based Hindi-Tamil Statistical Machine Translation, Vol 14(1), article No. 2, Pp. 17-27 International Journal of Intelligent Information Technologies, Idea Group publishing, USA, ISSN: 1548-3657|EISSN: 1548-3665 Web of Science, Scopus, DBLP
2018 K. Vimal Kumar and Divakar Yadav Word Sense Based Approach for Hindi to Tamil Machine Translation Using English as Pivot Language, Vol. 11, Issue 3-4. International Journal of Advanced Intelligence Paradigms, InderScience, ISSN print: 1755-0386, ISSN online: 1755-0394. Scopus, DBLP
2017 Mukta Goyal, Divakar Yadav, and Alka Tripathi An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making, Vol 13, No. 1, pp. 57-67. Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) Web of Science, Scopus, DBLP
2017 Madhulika, Bansal Abhay, Yadav Divakar A proposed quantitative approach to classify brain MRI International Journal of System Assurance Engineering and Management, ISSN: 0975-6809, Springer, Vol. 7, PP. 1-8 Web of Science, Scopus, DBLP,
2016 Mukta Goyal, Divakar Yadav, and Alka Tripathi Intuitionistic Group Decision Making to Identify the Status of Student’s Knowledge Acquisition in E-learning Systems, Vol 5, Issue 3, pp. 14-29 International Journal of Fuzzy System Applications (IJFSA), IGI Global, ISSN: 2156-177X Scopus, DBLP
2016 Mukta Goyal, Divakar Yadav and Alka Tripathi Intuitionistic fuzzy genetic weighted averaging operator and its application for multiple attribute decision making in E-learning, vol 9, Issue 1, pp. 1-15. Indian Journal of Science and Technology , ISSN: 0974-6846 (print), Web of Science, Scopus
2016 A. Yadav, D. Yadav, R. Prasad Efficient Textual Web Retrieval using Wavelet Tree, DOI: 10.4018/IJIRR, Vol. 6, Issue 4, article 3, pp. 16-29 International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 Web of Science, DBLP
2015 A Yadav, D. Yadav Wavelet Tree based Hybrid Geo-Textual Indexing Technique for Geographical Search, pp. 1-7 Indian Journal of Science and Technology, Vol. 8(33), ISSN: 0974-6846 (print) Web of Science, Scopus
2015 Madhulika, Bansal Abhay, Yadav Divakar, Gupta Priya A Proposed Stratification Approach for MRI images, Vol. 8(18), pp. 1-10 Indian Journal of Science and Technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) Web of Science, Scopus
2015 Madhulika Bhatia, Abhay Bansal, Divakar Yadav, and Priya Gupta Proposed Algorithm to Blotch Grey Matter from Tumored and Non Tumored Brain Images", Vol. 8(17),pp. 1-10. Indian journal of Science and technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) Web of Science, Scopus
2016 Mukta Goyal, Divakar Yadav and Alka Tripathi Aggregating evaluation using dynamic weighted intuitionistic fuzzy approach for concept sequencing in an E-learning system, Vol.7, No.1, pp.44 – 65. International Journal of Mathematical Modelling and Numerical Optimisation, Inderscience Publisher, Switzerland, ISSN: 2040-3607(print), ISSN: 2040-3615(online) Scopus
2015 Madhulika; Bansal, Abhay; Yadav, Divakar; and Madhurima Survey and Comparative Study on Statistical Tools for Medical Images, Volume 21, Number 1, January 2015, pp. 74-77(4). Advanced Science Letters, USA, ISSN: 1936-6612 (Print): EISSN: 1936-7317 (Online) Scopus
2013 Sonia sanchez cuadrado, Vicente. Palacios, Divakar yadav, Christos dimou and Jorge Morato Evaluation of Semantic Retreival Systems on The Semantic Web, Vol 31, Issue 4, pp. 638-656 Library Hi Tech, Emerald, ISSN: 0737-8831, Web of Science, Scopus, DBLP
2013 Pooja Gupta, Sandeep Kr Singh, Divakar Yadav and A. K. Sharma An Improved Approach to Rank Web Document, Vol 9, No. 2, pp. 217-236. Journal of Information Processing System, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) Web of Science, Scopus, DBLP
2013 Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato Optical Character Recognition for Hindi Language Using a Neural-network Approach, Vol. 9, No. 1, pp. 117~140 Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) Web of Science, Scopus and DBLP
2012 Divakar Yadav, AK Sharma, Sonia Sanchez-Cuadrado, Jorge Morato An Approach to Design Incremental Parallel WebCrawler, Vol. 43 No.1, pp. 8-29, Journal of Theoretical and Applied Information Technology, ISSN 1992-8645 Scopus, DBLP
2012 Mukta Goyal, Divakar Yadav and Alka Choubey E-learning: Current State of Art and Future Prospects, Volume 9, Issue 3, No. 2, pp. 490-499, International Journal of Computer Science Issues, Softwarefirst ltd, ISSN 1694-0814 DBLP
2011 Pooja Gupta, A. K. Sharma and Divakar Yadav “A Novel Technique for Back-link Extraction and Relevance Evaluation, Vol 3, No 3, pp. 227- 238, International Journal of Computer Science & Information Technology (IJCSIT), Academy and Industry Research Collaboration Center, ISSN No.0975-4660 (online), Indian Citation Index
2009 Divakar Yadav, A.K. Sharma and J.P. Gupta “Topical Web Crawling Using Weighted Anchor Text and Web Page Change Detection Techniques, Issue 2, Vo; 6, pp. 263-275 WSEAS Transaction on Information Science and Applications, Greece, ISSN:1790-0832, SCOPUS
2008 Divakar Yadav, A.K. Sharma and J.P. Gupta Parallel Crawler Architecture and Web Page Change Detection Techniques, Issue 7, Vol 7, Pp. 929-941 WSEAS Transaction on Computers, ISSN: 1109-2750 SCOPUS
2014 A. Yadav, D. Yadav A Review on Spatial Access Methods, pp. 13-19 International Journal of Software and Web Sciences, 8(1), ISSN: 2279-0063 (Print), 2279-0071 (Online) -
2010 Vishwaratana Nigam, Divakar Yadav and Manish K. Thakur A Novel Approach for Hand Analysis Using Image Processing Techniques, Vol 8, No.2, pp. 320-323 International Journal of Computer Science and Information Security, ISSN 1947-5500 -
2020 Prem Sagar Sharma, Divakar Yadav A Systematic Review on Page Ranking Algorithms International Journal of Information Technology, Springer ISSN: 2511-2104 Scopus, DBLP
2020 Adarsh Kumar, Saurabh Jain, Divakar Yadav A Novel Simulation Annealing Enabled Ranking and Scaling Statistical Simulation Constrained Optimization Algorithm for Internet-of-things (IoTs) Smart and Sustainable Built Environment, Emerald Publishing, ISSN: 2046-6099 Web of Science, Scopus
2020 Prem Sagar Sharma, Divakar Yadav Incremental Refinement of Page Ranking of Web Pages International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 Web of Science, DBLP
2020 A. Yadav, D. Yadav, A.Jain An Improvised Feature-Based Method for Sentimental Analysis of Product Reviews EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 Web of Science, DBLP
2020 A. Yadav, JKPS Yadav, D. Yadav Spatial Ambiguities Optimization in GIR EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 Web of Science, DBLP
2020 Arti Jain, Divakar Yadav, Anuja Arora Particle Swarm Optimization for Punjabi Text Summarization International Journal of Operations Research and Information Systems (IJORIS), IGI Global, ISSN: 1947-9328 Indexed in Scopus, DBLP
2020 Yadav, D., Akanksha, Yadav, A.K. A novel convolutional neural network based model for recognition and classification of apple leaf diseases Traitement du Signal, Vol. 37(6), pp. 1093-1101 Web of Science, Scopus
2021 Arti Jain, Divakar Yadav, Anuja Arora Particle Swarm Optimization for Punjabi Text Summarization International Journal of Operations Research and Information Systems (IJORIS), IGI Global, ISSN: 1947-9328, Volume 12, Issue 3, Article 1. DBLP, ACM digital library
2021 Arti Jain, Anuja Arora, Divakar Yadav, Jorge Morato, Amanpreet Kaur Novel Text Summarization Technique for Punjabi Language Using Neural Networks International Arab Journal of Information Technology (In Press) Web of Science, Scopus
2021 Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav Microaneurysm Detection using Color Locus Detection Method Measurement, Elsevier Publication (In Press) Web of Science, Scopus
2015 Chandrashekar Jatoth, G.R. Gangadharan, and Rajkumar Buyya Computational intelligence based QoS-aware web service composition: a systematic literature review, Vol.10,No.03,PP.475-492 IEEE Transactions on Services Computing, IEEE (IF:5.707) SCI
2017 Chandrashekar Jatoth, G.R. Gangadharan, Fiore, Ugo and Rajkumar Buyya QoS-aware Big service composition using Map-Reduce based evolutionary algorithm with guided mutation, Vol.86,PP.1008-1018. Future Generation Computer Systems, Elsevier (IF:5.768) SCI
2017 Chandrashekar Jatoth, G.R. Gangadharan, and Fiore, Ugo Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis, Vol. 21, No. 23, PP. 7221-7234 Soft Computing, Springer (IF:2.784) SCI
2018 Chandrashekar Jatoth, G.R. Gangadharan, Fiore, Ugo, and Rajkumar Buyya SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services, DOI: https://doi.org/10.1007/s00500-018-3120-2 Soft Computing, Springer (IF:2.784) SCI
2019 Chandrashekar, Jatoth, G Siva Kumar, Gangadharan, G.R., and Rajkumar, Buyya QoS-aware cloud service composition using eagle strategy, Vol. 90, PP. 273-290 Future Generation Computer Systems, Elsevier (IF:5.768) SCI
2019 Chandrashekar, Jatoth, Gangadharan, G.R., and Rajkumar, Buyya Optimal Fitness Aware Cloud Service Composition using an Adaptive Genotypes Evolution based Genetic Algorithm, Vol. 94, PP. 185-198 Future Generation Computer Systems, Elsevier (IF:5.768) SCI
2019 Chandrashekar Jatoth, G.R. Gangadharan, and Fiore, Ugo Optimal fitness aware cloud service composition using modified invasive weed optimization, Vol. 44, PP. 1073-1091 Swarm and evolutionary computation, Elsevier (IF:6.330) SCIE
2019 B Bhaskar, Chandrashekar Jatoth, G.R. Gangadharan, U Fiore A MapReduce-based modified Grey Wolf optimizer for QoS aware big service composition, Vol.32, No.8, PP.e5351. Concurrency and Computation: Practice and Experience (IF:1.167) SCI
2020 Narayana P, Chandrashekar Jatoth, Prem Chand Optimizing Resource Scheduling based on Extended Particle Swarm Optimization in Fog Computing Environment (In-Press) Concurrency and Computation: Practice and Experience (IF:1.447) SCI
2019 Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava Extraction of reordering rules for statistical machine translation. & Vol. 36, no. 5 Journal of Intelligent & Fuzzy Systems SCI
2019 Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava An Automatic and A Machine-Assisted Method to Clean Bilingual Corpus & Volume 19 Issue 1 ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) SCI
2019 Jyoti Srivastava, Tanveer J. Siddiqui, Prof. U. S. Tiwary, Ashish Kumar Srivastava MFCC Based Speech Retrieval & Vol 8, no. 9 International Journal of Innovative Technology and Exploring Engineering SCOPUS
2018 Nagendra Pratap Singh, Rajeev Srivastava ”Extraction of retinal blood vessels by using an extended matched filter basedon second derivative of Gaussian” National Academy of Sciences, India Section A, springer publication. DOI https://doi.org/10.1007/s40010-017-0465-3 SCI Impact factor 0.754
2016 Nagendra Pratap Singh, Rajeev Srivastava "Retinal blood vessels segmentation by using Gumbel Probability Distribution Function based matched filter" Computer Methods and Programs in Biomedicine, Elsevier. DOI http://dx.doi.org/doi:10.1016/j.cmpb.2016.03.001. SCI Impact factor 3.424
2015 Nagendra Pratap Singh, Rajeev Srivastava "Segmentation of retinal blood vessels by using a matched filter based on second derivative of Gaussian" International Journal of Biomedical Engineering and Technology, DOI: http://dx.doi.org/10.1504/IJBET.2016.078286 Scopus Indexed
2011 Mrinal Kanti Debbarma, Nagendra Pratap Singh, Amit Kumar. Shrivastava, and Rishi Mishra "Analysis of Software Complexity Measures for Regression Testing" Volume 1– No.2 ACEEE Int. J. on Information Technology ACEEE
2011 Nagendra Pratap Singh, Rishi Misra, Rajit Ram Yadav "Analytical review of test redundancy detection techniques", (0975 – 8887) Volume 27– No.1 International Journal of Computer Applications IJCA
2012 Shivendu Mishra, Ritika Yaduvanshi, Anjani Kumar Rai, Nagendra Pratap Singh "An ID-Based Signature Scheme from Bilinear Pairing Based on Ex-K-Plus Problem", Vols. 408, pp. 929-934 Advanced Materials Research Trans Tech Publications, Switzerland
2013 Nagendra Pratap Singh, Rishi Mishra, Sailesh Tiwari, A. K. Misra "An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations" Vol. 5, No. 2 International Journal of Computer Theory and Engineering IJCTE
2010 Rishi Misra, Nagendra Pratap Singh "Analysis of Unit Testing using Petri Net", Vol. 2, No. 3, pp 501-506 International Journal of Information Sciences and application IJISA
2019 Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Vishal Kaushal "On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load" Cluster Computing SCI Impact factor 1.851
2020 Sushil Kumar Saroj, Rakesh Kumar, Nagendra Pratap Singh "Fréchet PDF based Matched Filter Approach for Retinal Blood Vessels Segmentation" Vol-194 Computer Methods and Programs in Biomedicine, Elsevier. DOI http://dx.doi.org/doi:10.1016/j.cmpb.2016.03.001. SCI Impact Factor 3.424
2005 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Energy Efficient Cache Invalidation in a Mobile Environment,” International Journal of Digital Information Management (JDIM) special issue on Distributed Data Management, Vol. 3, No. 2, pp. 119-125, June 2005 International Journal of Digital Information Management Scopus
2006 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “A Zone Cooperation Approach for Efficient Caching in Mobile Ad Hoc Network,” International Journal of Communication Systems, Vol. 19, No. 9, pp. 1009-1028, Nov 2006 International Journal of Communication Systems SCI
2007 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Energy Efficient Cache Invalidation in a Disconnected Wireless Mobile Environment,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 2, No. 1/2, pp. 83-91, 2007 International Journal of Ad Hoc and Ubiquitous Computing SCI
2007 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Supporting Cooperative Caching in Mobile Ad Hoc Networks Using Clusters,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) special issue on Pervasive Computing through Networked Sensing Devices, Vol. 2, No. 1/2, pp. 58-72, 2007 International Journal of Ad Hoc and Ubiquitous Computing SCI
2007 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters,” International Journal of Wireless Personal Communications special issue on Cooperation in Wireless Networks, Vol. 43, Issue 1, pp. 41-63, Oct 2007 International Journal of Wireless Personal Communications SCI
2007 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility,” International Journal of Mobile Information Systems, Vol. 3, No. 1, pp. 19-37, 2007 International Journal of Mobile Information Systems SCI
2007 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Exploiting Caching in Heterogeneous Mobile Environment,” Wireless Communications and Mobile Computing Journal (WCMC) Special Issue on Advances in Resource-Constrained Device Networking, Vol. 7, Issue 7, pp. 835-848, September 2007 Wireless Communications and Mobile Computing Journal SCI
2009 Narottam Chand, R.C. Joshi and Manoj Misra Narottam Chand, R.C. Joshi and Manoj Misra, “Energy Efficient Cache Replacement in Mobile Computing Environment,” Ubiquitous Computing and Communication Journal, pp. 1-12, 2009 Ubiquitous Computing and Communication Journal -
2009 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Trap Assisted Tunneling Model for Gate Current in Nano Scale MOSFET with High-K Gate Dielectrics,” International Journal of Electrical and Electronics Engineering, Vol. 3, No. 7, pp. 400-407, 2009 International Journal of Electrical and Electronics Engineering -
2009 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Gate Tunnel Current Calculation for NMOSFET Based on Deep Sub-Micron Effects,” International Journal of Electrical and Electronics Engineering, Vol. 3, No. 7, pp. 424-432, 2009 nternational Journal of Electrical and Electronics Engineering -
2009 Surender Soni and Narottam Chand Surender Soni and Narottam Chand, “Energy Efficient Multi-Level Clustering to Prolong the Lifetime of Wireless Sensor Networks,” Journal of Computing, Vol. 2, Issue 5, pp. 158-165, May 2010 Journal of Computing -
2010 Prashant Kumar, Naveen Chauhan, Lalit Awasthi and Narottam Chand Prashant Kumar, Naveen Chauhan, Lalit Awasthi and Narottam Chand, “Proactive Approach for Cooperative Caching in Mobile Adhoc Networks,” International Journal of Computer Science Issues, Vol. 7, No. 8, pp. 21-27, May 2010 International Journal of Computer Science Issues -
2010 Vishal Kumar and Narottam Chand Vishal Kumar and Narottam Chand, “Data Scheduling in VANETs: A Review,” International Journal of Computer Science & Communication, Vol. 1, No. 2, pp. 399-403, July 2010 International Journal of Computer Science & Communication -
2010 Vaibhav Pandey, Amarjeet Kaur and Narottam Chand Vaibhav Pandey, Amarjeet Kaur and Narottam Chand, “A Review on Data Aggregation Techniques in Wireless Sensor Network,” Journal of Electronic and Electrical Engineering, Vol. 1, Issue 2, pp. 1-8, 2010 Journal of Electronic and Electrical Engineering -
2010 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “A Compact Gate Tunnel Current Model for Nano Scale MOSFET with Sub-1nm Gate Oxide,” International Journal of Applied Engineering Research, Vol. 1, No. 2, pp. 175-193, 2010 International Journal of Applied Engineering Research -
2010 Vishal Kumar and Narottam Chand Vishal Kumar and Narottam Chand, “Efficient Data Scheduling in VANETs,” Journal of Computing, Vol. 2, Issue 9, pp. 33-37, Sep 2010 Journal of Computing -
2010 Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra, “Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks,” International Journal on Computer Science and Engineering, Vol. 2, No. 7, pp. 2268-2273, Oct 2010 International Journal on Computer Science and Engineering -
2010 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Analytical Gate Current Modelling in Nano Scale MOSFET with High-k Gate stack Structure,” Journal of Electrical and Electronics Engineering, Vol. 3, No. 2, pp. 169-174, Oct 2010 Journal of Electrical and Electronics Engineering Scopus
2010 Vivek Katiyar, Narottam Chand and Surender Soni Vivek Katiyar, Narottam Chand and Surender Soni, “Clustering Algorithms for Heterogeneous Wireless Sensor Network: A Survey,” International Journal of Applied Engineering Research, Vol. 1, No. 2, pp. 273-287, Oct 2010 International Journal of Applied Engineering Research -
2010 Vivek Katiyar, Narottam Chand and Naveen Chauhan Vivek Katiyar, Narottam Chand and Naveen Chauhan, “Recent Advances and Future Trends in Wireless Sensor Networks,” International Journal of Applied Engineering Research, Vol. 1, No. 3, pp. 330-342, Nov 2010 International Journal of Applied Engineering Research -
2010 Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra Naveen Chauhan, Lalit K. Awasthi, Narottam Chand, R.C. Joshi and Manoj Misra, “Energy Efficient Cooperative Caching in Mobile Ad Hoc Networks,” International Journal of Applied Engineering Research, Vol. 1, No. 3, pp. 360-371, Nov 2010 International Journal of Applied Engineering Research -
2010 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Impact of Gate Engineering on Gate Leakage Behavior of Nano Scale MOSFETs with High-k Dielectrics,” International Journal of Nanoelectronics and Optoelectronics, Vol. 5, No. 3, pp. 343-348, 2010 International Journal of Nanoelectronics and Optoelectronics SCI
2010 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Gate Current Modeling and Optimization of High-k Gate Stack MOSFET Structure in Nano Scale Regime,” International Journal of Micro-Nano Scale Transport, Vol. 1, No. 3, pp. 253-268, 2010 International Journal of Micro-Nano Scale Transport -
2010 Ashwani Kumar, Narottam Chand and Vinod Kapoor Ashwani Kumar, Narottam Chand and Vinod Kapoor, “Gate Leakage Reduction Through the use of Source/Drain-to-Gate Non-overlapped MOSFET Structure,” Journal of Nanoengineering and Nanosystems, Vol. 224, No. 4, pp. 173-181, 2010 Journal of Nanoengineering and Nanosystems Scopus
2018 Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi IGI Global International Journal of Web Services Research SCIE, SCOPUS
2017 Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi Springer Wireless Networks SCI
2017 Prashant Kumar, Naveen Chauhan and Narottam Chand SCRSC International Journal of Grid and Distributed Computing SCOPUS
2016 Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi Springer Wireless Networks SCI
2016 Rajesh Sharma, Lalit Kumar Awasthi and Naveen Chauhan IJNGC International Journal of Next Generation Computing DBLP
2015 Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi Springer Wireless Networks SCI
2017 Nilanshi Chauhan and Pardeep Singh Identifying the Opinion Orientation of Online Product Reviews at Feature Level: A Pruning Approach International Journal of Information System Modeling and Design Scopus
2015 Pardeep Singh and Kamlesh Dutta Automation and Validation of Annotation for Hindi Anaphora Resolution International Journal of Advanced Computer Science and Applications (IJACSA) Scopus
2019 Namrata Kumari, Ankit Guleria, Radhika Sood and Pardeep Singh A Supervised Approach for Keyphrase Extraction using SVM International Journal of Control and Automation Scopus
2020 Namrata Kumari, Pardeep Singh. Automated Hindi Text Summarization Using TF-IDF and Textrank Algorithm, 7(17): pp 2547-2555, 2020;, doi: 10.31838/jcr.07.17.315 Journal of Critical Reviews Scopus
2020 Kususm Lata, Pardeep Singh, Kamlesh Dutta A comprehensive review on feature set used for anaphora resolution Artificial Intelligence Review SCI
2016 Prakash Choudhary and Neeta Nain A Four-Tier Annotated Urdu Handwritten Text Image Dataset for Multidisciplinary Research on Urdu Script, Vol. 15(4) ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) SCI
2018 PK Bhagat and Prakash Choudhary Image Annotation: Then and Now, Vol. 80(3) Image and Vision Computing SCI
2018 Sanasam Inunganbi and Prakash Choudhary Recognition of Handwritten Meitei Mayek Script Based on Texture Feature 7(5) International Journal of Natural Language Computing(IJNLC) Other
2019 S. inunganbi, Prakash Choudhary and K. Mangalem Singh Local Texture Descriptors and Projection Histogram based Handwritten Meitei Mayek Character Recognition Multimedia Tools and Applications SCI
2019 Prakash Choudhary and Abhishek Hazra Chest Disease Radiography in Twofold: Using Convolutional Neural Networks and Transfer Learning, Evolving Systems SCI
2020 Sanasam Inunganbi, Prakash Choudhary and Khumanthem Manglem Meitei Mayek handwritten dataset: compilation, segmentation, and character recognition The Visual Computer SCI
2020 Prakash Choudhary and Neeta Nain CALAM: Model-Based Compilation and Linguistic Statistical Analysis of Urdu Corpus Vol. 45(20) Sadhana SCI
2020 Abhishek Hazra, Prakash Choudhary, Sanasam Inunganbi & Mainak Adhikari Bangla-Meitei Mayek Scripts Handwritten Character Recognition using Convolutional Neural Network Applied Intelligence SCI
2020 Sanasam Inunganbi, Prakash Choudhary and Khumanthem Manglem Singh Line and word segmentation of handwritten text document by mid-point detection and gap trailing Multimedia Tools and Applications SCI
2020 PK Bhagat and Prakash Choudhary A Novel Approach based on Fully Connected Weighted Bipartite Graph for Zero-Shot Learning Problems Journal of Ambient Intelligence and Humanized Computing SCI
2016 Rathee Priyanka, Singh, R . and Kumar, S . "Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals." Wireless Personal Communications: 89(1), 61-78 Wireless Personal Communication SCI
2019 Priyanka Performance Analysis of IEEE 802.11p using continuous time Markov Chain, , 152, 309-315. Procedia Computer Science SCI
2019 Priyanka, Singh, R . and Kumar, S . Performance Analysis of IEEE 802.11 p Protocol with Retry Limit in VANETs: An Analytical study. Procedia Computer Science, 152, 195-203. Procedia Computer Science SCI
2017 Priyanka, Singh, R. and Kumar, S. Analytical Modelling of Back-off Process of IEEE 802.11p using Continuous Markov Chain in VANETs. International Journal of Computer Applications 172(9):14-20, August 2017. ISSN 0975 - 8887 UGC Listed
2017 Rajeev Kumar, Naveen Chauhan, Narottam Chand Energy Efficient Entropy Based Clustering in Wireless Sensor Networks International Journal of Grid and Distributed Computing (IJGDC) Scopus
2017 Rajeev Kumar, Naveen Chauhan, Narottam Chand Predicting Missing Values in Wireless Sensor Network using Spatial-Temporal Correlation International Journal of Computer Networks and Wireless Communications (IJCNWC) DOAJ
2017 Rajeev Kumar, Naveen Chauhan, Narottam Chand Adaptive Clustering in Wireless Sensor Networks International Journal of Multimedia and Ubiquitous Engineering (IJMUE) Scopus
2017 Pushpender Kumar, Rajeev Kumar, Naveen Chauhan, Narottam Chand Enhancing the Lifetime of Wireless Multimedia Sensor Network Through Image Fusion International Journal of Grid and Distributed Computing (IJGDC) Scopus
2014 JaideepLakhotia and Rajeev Kumar Cluster Based Routing Protocols for Mobile Wireless Sensor Network: A Review International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Open Access
2013 Sushil Sarwa, Rajeev Kumar Selective Forwarding Attack and Its Detection Algorithms: A Review International Journal of Computer and Information Engineering International Science Index
2019 Rajeev Kumar, Naveen Chauhan, Narottam Chand Energy Map Generation in Wireless Sensor Network using Grey System Theory International Journal of Innovative Technology and Exploring Engineering (IJITEE) Scopus
2020 Rajeev Kumar, Vibha Jain, Naveen Chauhan, Narottam Chand An Adaptive Prediction Strategy with Clustering in Wireless Sensor Network pp 575 - 587 International Journal of Wireless Information Networks. Volume 27, Issue 4 ESCI
2016 SANGEETA SHARMA, MEENU CHAWLA A three phase optimization method for precopy based vm live migration, vol. 5, no. 1 Springer Plus SCI and Scopus
2017 NITESH BHAROT, PRIYANKA VERMA, SANGEETA SHARMA, AND VEENADHARI SURAPARAJU Distributed Denial-of-Service Attack Detection and Mitigation Using Feature Selection and Intensive Care Request Processing, Volume 43, No. 2 Arabian Journal for Science and Engineering SCI and Scopus
2019 Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and Amita Nandal Improving Bounds on Outage Probability in Correlated Rayleigh Fading Environment Sadhana- Springer SCI
2019 Shashi Gurung and Siddhartha Chauhan A Dynamic Threshold based Algorithm for Improving Security and Performance of AODV Under Black-hole Attack in MANET Wireless Networks-Springer SCI
2019 Shashi Gurung and Siddhartha Chauhan Performance Analysis of Black-hole Attack Mitigation protocols under Gray-hole Attacks in MANET Wireless Networks-Springer SCI
2018 Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar Analysis and Simulation of Second-Order Statistics with Modified Characteristic Wireless Personal Communications-Springer SCIE/ SCOPUS
2018 Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar Effect of Matrix Partitioning on Second Order Statistics of Fading Channels Wireless Personal Communications-Springer SCIE/ SCOPUS
2018 Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and Amita Nandal Statistical Approach for Performance Analysis of Multipath Scattering Environment Wireless Personal Communications-Springer SCIE/ SCOPUS
2018 Shashi Gurung and Siddhartha Chauhan A novel Approach for Mitigating Gray Hole Attack in MANET Wireless Networks-Springer SCI
2018 Shashi Gurung and Siddhartha Chauhan A Dynamic Threshold based Approach for Mitigating Black-Hole Attack in MANET Wireless Networks-Springer SCI
2018 Shashi Gurung and Siddhartha Chauhan A Novel Approach for Mitigating Route Request Flooding Attack in MANET Wireless Networks-Springer SCI
2018 Arvind Dhaka and Siddhartha Chauhan Statistical Analysis of Modified Fading Simulator in Rayleigh Fading Environment International Journal of Grid and Distributed Computing SCOPUS
2018 Deepshikha and Siddhartha Chauhan Succinct Review on MAC Protocols for Wireless Body Area Networks International Journal of Grid and Distributed Computing SCOPUS
2014 Siddhartha Chauhan and Lalit Kumar Awasthi An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks International Journal of Communication Networks and Distributed Systems- InderScience SCOPUS
2012 Siddhartha Chauhan and Lalit Kumar Awasthi Adaptive time synchronization for homogeneous WSNs International Journal of Engineering Business Management SCOPUS
2020 Anamika Sharma and Siddhartha Chauhan Sensor fusion for Distributed Detection of Passive Targets in Surveillance Wireless Sensor Network IEEE Sensor Journal SCI
2020 Anamika Sharma and Siddhartha Chauhan A Distributed Reinforcement Learning based Sensor Node Scheduling Algorithm for Coverage and Connectivity Maintenance in Wireless Sensor Network Wireless Networks SCI
2020 Anamika Sharma and Siddhartha Chauhan Analytic Evaluation of Non-uniformities for Coverage Probability Computation of Randomly Deployed Wireless Sensor Network International Journal of Sensor Networks SCI
2020 Anamika Sharma and Siddhartha Chauhan Information Fusion based Intruder Detection Techniques in Surveillance Wireless Sensor Network Advances in Intelligent System and Computing SCOPUS
2019 Anamika Sharma and Siddhartha Chauhan Target Coverage Computation Protocols in Wireless Sensor Networks: A Comprehensive Review International Journal of Computers and Applications SCOPUS
2019 Deepshikha and Siddhartha Chauhan Multi-Stage Context-Aware Data Filtering Technique for Body Sensor Networks (BSNs) Journal of Advanced Research in Dynamical and Control Systems SCOPUS
2019 A Sai Venkateshwar Rao and Siddhartha Chauhan Two-Step Verification Technique for Isolation of Black Hole Attack in MANETs International Journal of Recent Technology and Engineering SCOPUS
2016 Kulwardhan Singh, T.P. Sharma FDR: fault detection and recovery scheme for wireless sensor networks using virtual grid Taylor & Francis International Journal of Parallel, Emergent and Distributed Systems SCI
2016 K.P. Sharma, T.P. Sharma ZBFR: Zone Based Failure Recovery in WSNs by Utilizing Mobility and Coverage Overlapping Springer Wireless Networks SCI
2016 K.P. Sharma, T.P. Sharma rDFD: reactive distributed fault detection in wireless sensor networks Springer Wireless Networks SCI
2017 K.P. Sharma, T.P. Sharma Energy-hole avoidance and lifetime enhancement of a WSN through load factor Turkish Journal of Electrical Engineering and Computer Sciences SCI
2016 K.P. Sharma, T.P. Sharma Distributed Connectivity Restoration in Networks of Movable Sensor Nodes Elsevier International Journal of Computers and Electrical Engineering SCI
2015 Rajeev Singh and T.P. Sharma A Location Based Method for Restricting the Flooding DoS Effect in WLANs Taylor and Francis Journal of Location Based Services SCOPUS
2015 Rajeev Singh and T.P. Sharma On the IEEE 802.11i Security: A Denial of Service Perspective Wiley Journal of Security and Communication Networks SCI
2015 Rajeev Singh and T.P. Sharma Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs Journal of Electronics Science & Technology SCOPUS
2014 Rajeev Singh and T.P. Sharma A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security Springer Wireless Personal Communications SCI
2015 Abhiram Singh, T.P. Sharma Position and Hop-Count Assisted Full Coverage Control in Dense Sensor Networks Springer Wireless Networks SCI
2014 Rajeev Singh and T.P. Sharma Simulated analysis of a cryptographic solution for WLANs against Denial of Service (DoS) attacks Journal of Engineering Science and Technology SCOPUS
2010 T.P. Sharma, R.C. Joshi, Manoj Misra Data Filtering and Dynamic Sensing for Continuous Monitoring in Wireless Sensor Networks International Journal of Autonomous and Adaptive Communications (IJAACS) SCOPUS
2009 T.P. Sharma, R.C. Joshi, Manoj Misra Cooperative Caching for Homogeneous Wireless Sensor Networks International Journal of Communication Networks and Distributed Systems SCOPUS
2013 Rajeev Singh and T.P. Sharma A Secure WLAN Authentication Scheme IEEK Transactions on Smart Processing and Computing IEEK
2013 Rajeev Singh and T.P. Sharma Proof of the Secrecy Property of Secure WLAN Authentication Scheme (SWAS) using Extended PCL logic Journal of Safety Engineering JSE
2019 Krishan Pal Sharma, T.P. Sharma Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network Inderscience International Journal of Sensor Networks SCIE, Scopus
2019 Rajeev Singh, T.P. Sharma Present Status of Distributed Denial of service (DDoS) Attacks in Internet World International Journal of Mathematical, Engineering and Management Sciences Scopus
2019 Rajeev Singh, Sudeep Tanwar, T.P. Sharma Utilization of Blockchain for mitigating the Distributed Denial of Service (DDoS) Attacks Wiley Journal of Security and Privacy ACM
2019 Rajeev Singh and T.P. Sharma An Overview of WLAN Security International Journal of Scientific & Technology Research Scopus
2019 Mohammad Ahsan, Madhu Kumari and T. P. Sharma Rumors Detection, Verification and Controlling Mechanisms in Online Social Networks: A Survey Elsevier (Science Direct) Online Social Networks and Media (OSNEM) SCIE
2019 Mohammad Ahsan, Madhu Kumari and T. P. Sharma Detection of Context-Varying Rumors on Twitter through Deep Learning Journal of Advanced Science and Technology (IJAST) Scopus, SCI
2016 Rajeev Singh and T.P. Sharma Secure WLAN Handoff Scheme with Continuous Authentication MIS Review MIS
2014 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar Variance based Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems with Application to Clustering Vol. 45(6), pp. 486-511 Cybernetics and Systems, Taylor and Francis (IF=1.681) SCI
2014 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar Parameter Adaptive Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems, Vol. 5, pp. 144-155 Journal of Computational Science, Elsevier (IF=2.502) SCI
2014 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar Automatic Cluster Evolution Using Gravitational Search Algorithm and its Application on Image Segmentation. Vol. 29, pp. 93-103 Engineering Applications of Artificial Intelligence, Elsevier (IF=3.526) SCI
2015 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm, Vol. 61, pp. 22-31 IETE Journal of Research, Taylor and Francis (IF=0.793) SCI
2016 Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection, Vol. 4(2), pp.65-85 Journal of Engineering Research, Springer (IF=0.387) SCI
2017 Dilbag Singh, Vijay Kumar Dehazing of Remote Sensing Images using Improved Restoration Model based Dark Channel Prior, Vol. 65(5), pp. 282-292 Imaging Science Journal, Taylor and Francis (IF=0.846) SCI
2017 Dilbag Singh, Vijay Kumar Modified Gain Intervention Filter based Dehazing Technique, Vol. 64(20), pp. 2165-2178 Journal of Modern Optics, Taylor and Francis (IF=1.657) SCI
2017 Gaurav Dhiman, Vijay Kumar Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications, Vol. 114, pp. 48-70 Advances in Engineering Software, Elsevier (IF=4.194) SCI
2017 Vijay Kumar, Dinesh Kumar An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems. Vol. 112, pp. 231-254 Advances in Engineering Software, Elsevier (IF=4.194) SCI
2018 Dilbag Singh, Vijay Kumar Defogging of road images using gain coefficient based trilateral filter, Vol. 27(1), pp. 1-14 Journal of Electronic Imaging, SPIE (IF=0.924) SCI
2018 Dilbag Singh, Vijay Kumar Single image haze removal using integrated dark and bright channel prior, Vol. 32(4), pp. 1-9 Modern Physics Letters B, World Scientific (IF=0.731) SCI
2018 Ashish Gridhar, Vijay Kumar A Comprehensive Survey of 3D Image Steganography Techniques, Vol. 12(1), pp. 1-10 IET Image Processing, IET (IF=2.004) SCI
2018 Dilbag Singh, Vijay Kumar Comprehensive Survey on Haze Removal Techniques, Vol. 77(8), pp. 9595-9620 Multimedia Tools and Applications, Springer (IF=2.331) SCI
2018 Vijay Kumar, Dinesh Kumar A Modified DWT-based Image Steganography Technique, Vol. 77(11), pp. 13279-13308 Multimedia Tools and Applications, Springer (IF=2.331) SCI
2018 Sahil Sharma, Vijay Kumar Performance evaluation of 2D face recognition techniques under image processing attacks, Vol. 32(19), pp. 1-10 Modern Physics Letters B, World Scientific (IF=0.731) SCI
2018 Dilbag Singh, Vijay Kumar Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter, Vol. 12(2), pp. 208-219 IET Computer Vision, IET (IF=1.648) SCI
2018 Dilbag Singh, Vijay Kumar Fourier-Mellin moments based intertwining map for image encryption, Vol. 32(9), pp. 1-17 Modern Physics Letters B, World Scientific (IF=0.731) SCI
2018 Manjit Kaur, Vijay Kumar An efficient image encryption method based on improved Lorenz chaotic system, Vol. 54(9), pp. 562-564 Electronics Letters, IET (1.343) SCI
2018 Vijay Kumar, Dinesh Kumar Gene Expression Data Clustering using Variance-based Harmony Search Algorithm IETE Journal of Research, Taylor and Francis (IF=0.793) SCI
2018 Dilbag Singh, Vijay Kumar Dehazing of outdoor images using notch based integral guided filter, Vol. 77(20), pp. 27363-27386 Multimedia Tools and Applications, Springer (IF=2.331) SCI
2018 Ashish Gridhar, Vijay Kumar A RGB Image Encryption Technique using Lorenz and Rossler Chaotic System on DNA Sequences. Vol. 77(20), pp. 27017-27039 Multimedia Tools and Applications, Springer (IF=2.331) SCI
2018 Manjit Kaur, Vijay Kumar Parallel Non-dominated Sorting Genetic Algorithm-II based Image Encryption Technique, Vol. 66(8), pp. 453-462 Imaging Science Journal, Taylor and Francis (IF=0.846) SCI
2018 Manjit Kaur, Vijay Kumar Color Image Encryption Technique using Differential Evolution in Nonsubsampled Contourlet Transform Domain, Vol. 12(7), pp.1273 –1283 IET Image Processing, IET (IF=2.004) SCI
2018 Manjit Kaur, Vijay Kumar Beta Chaotic Map based Image Encryption Using Genetic Algorithm, Vol. 28(11), pp. 1850132 (1–26) International Journal of Bifurcation and Chaos, IET (IF=2.145) SCI
2018 Manjit Kaur, Vijay Kumar Adaptive Differential Evolution based Lorenz Chaotic System for Image Encryption, Vol. 43(12), pp. 8127-8144 Arabian Journal for Science and Engineering, Springer (IF=1.518) SCI
2018 Dilbag Singh, Vijay Kumar A novel dehazing model for remote sensing images, Vol. 69, pp. 14-27 Computer & Electrical Engineering, Elsevier (IF=2.189) SCI
2018 Manjit Kaur, Vijay Kumar, Li Li Color Image Encryption Approach based on Memetic Differential EvolutionColor Image Encryption Approach based on Memetic Differential Evolution Neural Computing and Applications, Springer (IF=4.664) SCI
2018 Vijay Kumar, Dinesh Kumar Automatic Clustering and Feature Selection using Gravitational Search Algorithm and its Application to Microarray Data Analysis Neural Computing and Applications, Springer (IF=4.664) SCI
2018 Gaurav Dhiman, Vijay Kumar Astrophysics inspired multi-objective approach for automatic clustering and feature selection in real-life environment, Vol. 32 (31) , pp. 1-12 Modern Physics Letters B, World Scientific (IF=0.308) SCI
2018 Vijay Kumar, Dinesh Kumar Binary Whale Optimization Algorithm and its Application to Unit Commitment Problem Neural Computing and Applications, Springer (IF=4.664) SCI
2018 Gaurav Dhiman, Vijay Kumar Emperor Penguin Optimizer: A Bio-inspired Algorithm for Engineering Problems, Vol. 159, pp. 20-50 Knowledge Based Systems, Elsevier (IF=5.101) SCI
2018 Gaurav Dhiman, Vijay Kumar Multi-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems, Vol. 150, pp.175-197 Knowledge Based Systems, Elsevier (IF=5.101) SCI
2018 Manjit Kaur, Vijay Kumar A comprehensive review on image encryption techniques Archives of Computational Methods in Engineering, Springer (IF=7.242) SCI
2019 Dilbag Singh, Vijay Kumar A comprehensive review of computational dehazing techniques Archives of Computational Methods in Engineering, Springer (IF=7.242) SCI
2019 Dilbag Singh, Vijay Kumar Single image defogging by gain gradient image filter, Vol. 62(7), pp.079101:1-079101:3 Science China Information Sciences, Springer (IF=2.731) SCI
2019 Gaurav Dhiman, Vijay Kumar KnRVEA: A Hybrid Evolutionary Algorithm based on Knee Points and Reference Vector Adaptation Strategies for Many-objective Optimization, Vol. 49(7), pp.2434-2460 Applied Intelligence, Springer (IF=2.882) SCI
2019 Gaurav Dhiman, Vijay Kumar Seagull Optimization Algorithm: Theory and its Applications for Large Scale Industrial Engineering Problems, Vol. 165, pp. 169-196 Knowledge Based Systems, Elsevier (IF=5.101) SCI
2019 Dilbag Singh, Vijay Kumar Image Dehazing using Moore neighborhood-based Gradient Profile Prior, Vol. 70, pp. 131-144 Signal Processing: Image Communication, Elsevier (IF=2.814) SCI
2019 Dinesh Kumar, Vijay Kumar, Rajani Automatic Clustering using Quantum based Multi-objective Emperor Penguin Optimizer and its Applications to Image Segmentation Modern Physics Letters A, World Scientific (IF=1.308) SCI
2019 Dilbag Singh, Vijay Kumar, Manjit Kaur Single Image Dehazing using Gradient Channel Prior Applied Intelligence, Springer (IF=2.882) SCI
2019 Ashish Gridhar, Vijay Kumar A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) SCI
2019 Vijay Kumar, Avneet Kaur Binary Spotted Hyena Optimizer and its Application to Feature Selection Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) SCI
2019 Dilbag Singh, Vijay Kumar, Manjit Kaur Image dehazing using window-based integrated means filter Multimedia Tools and Applications, Springer (IF=2.331) SCI
2020 Sahil Sharma, Vijay Kumar Voxel Based 3D Face Reconstruction and Its Application to Face Recognition Using Sequential Deep Learning Multimedia Tools and Applications, Springer (IF=2.331) SCI
2020 Manjit Kaur, Dilbag Singh, Vijay Kumar, Kehui Sun Color Image Dehazing using Gradient Channel Prior and Guided L0 Filter Information Sciences, Elsevier (IF=5.910) SCI
2020 Gaurav Dhiman, Meenakshi Garg, Vijay Kumar , Atulya Nagar, Mohammad Dehghani A Novel Algorithm for Global Optimization: Rat Swarm Optimizer Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) SCI
2020 Dilbag Singh , Vijay Kumar , Vaishali Yadav, Manjit Kaur Deep Convolutional Neural Networks based Classification model for COVID-19 Infected Patients using Chest X-ray Images International Journal of Pattern Recognition and Artificial Intelligence, Springer (IF=1.375) SCI
2020 Dilbag Singh, Vijay Kumar, Vaishali Yadav, Manjit Kaur Classification of COVID-19 patients from chest CT images using multi-objective differential evolution based convolutional neural networks European Journal of Clinical Microbiology & Infectious Diseases, Springer (IF=2.837) SCI
2020 Aayush Jaiswal, Neha Gianchandani, Dilbag Singh, Vijay Kumar, Manjit Kaur DenseNet201 based deep transfer learning model to classify the COVID-19 infected patients Journal of Biomolecular Structure & Dynamics, Springer (IF=3.310) SCI
2020 Sahil Sharma, Vijay Kumar Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing Multimedia Tools and Applications, Springer (IF=2.331) SCI
2020 Nripendra Narayan Das, Naresh Kumar, Manjit Kaur, Vijay Kumar, Dilbag Singh Automated deep transfer learning-based approach for detection of COVID-19 infection in chest X-rays images Innovation and Research in Biomedical Engineering, Elsevier (IF=1.022) SCI
2020 Rajesh Kondabala, Vijay Kumar, Amjad Ali, Manjit Kaur A novel astrophysics based framework for prediction of binding affinity of glucose binder Modern Physics Letters B, World Scientific (IF=1.224) SCI
2020 Vijay Kumar, Avneet Kaur, Kamlender Kaur Kaleka Spiral-inspired Spotted Hyena Optimizer and its Application to Constraint Engineering Problems Wireless Personal Communications, Springer (IF=1.061) SCI
2020 Manjit Kaur, Dilbag Singh, Vijay Kumar Color image encryption using minimax differential evolution based 7D hyper-chaotic map Applied Physics B: Lasers and Optics, Springer (IF=1.813) SCI
2020 Vijay Kumar, Ashish Girdhar A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach Multimedia Tools and Applications, Springer (IF=2.331) SCI
2020 Ashish Girdhar, Himani Kapur, Vijay Kumar, Manjit Kaur, Dilbag Singh, Robertas Effect of COVID-19 Outbreak on Urban Health and Environment Air Quality, Atmosphere & Health, Springer (IF=2.870) SCI
2020 Sahil Sharma, Vijay Kumar 3D Landmark-based Face Restoration for Recognition using Variational Autoencoder and Triplet Loss IET Biometrics, IET (IF=1.821) SCI
2020 Sourabh Katoch, Sumit Singh Chauhan, Vijay Kumar A Review on Genetic Algorithm: Past, Present, and Future Multimedia Tools and Applications, Springer (IF=2.331) SCI
2020 Rajesh Kondabala, Vijay Kumar, Amjad Ali Design a Synthetic Glucose Receptor using Computational Intelligence Approach Journal of Molecular Graphics and Modelling, Elsevier (IF=2.079) SCI
2020 Manjit Kaur, Dilbag Singh, Vijay Kumar Rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images Journal of Ambient Intelligence and Humanized Computing, Springer (IF=4.594) SCI
2020 Manjit Kaur, Dilbag Singh, Vijay Kumar Drug Synergy Prediction Using Dynamic Mutation based Differential Evolution Current Pharmaceutical Design, (IF=2.208) SCI
2020 Vijay Kumar, Dinesh Kumar A Systematic Review on Firefly Algorithm: Past, Present, and Future Archives of Computational Methods in Engineering, Springer (IF=7.242) SCI
2021 Neeraj Sharma, Vijay Kumar, Sunil Singla Single Image Defogging using Deep Learning Techniques: Past, Present and Future Archives of Computational Methods in Engineering, Springer (IF=7.242) SCI
2021 Manjit Kaur, Dilbag Singh, Vijay Kumar Densely connected convolutional networks-based COVID-19 screening model Applied Intelligence, Springer (IF=3.325) SCI
2021 Vijay Kumar, Sahil Sharma Performance evaluation of machine learning based face recognition techniques Wireless Personal Communications, Springer (IF=1.061) SCI
2021 Ashish Girdhar, Himani Kapur, Vijay Kumar A novel grayscale image encryption approach based on chaotic maps and image blocks Applied Physics B: Lasers and Optics, Springer (IF=1.813) SCI
2021 Manjit Kaur, Vijay Kumar, Vaishali Yadav ,Dilbag Singh, Naresh Kumar, Nripendra Narayan Das Metaheuristic-based Deep COVID-19 Screening Model from Chest X-Ray Images Journal of Healthcare Engineering (IF=1.803) SCI
2010 Kamlesh Dutta, Nupur Prakash, Saroj Kaushik Probabilistic neural network approach to the classification of demonstrative pronouns for indirect anaphora in Hindi Expert Systems with Applications SCI and Scopus
2011 Kamlesh Dutta, Siddhant Sarthak Architectural space planning using evolutionary computing approaches: A review Artificial Intelligence Review SCI and Scopus
2013 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta, Chetna Gupta Requirement Reprioritization: A Multilayered Dynamic Approach International Journal of Software Engineering and its Applications ESCI and Scopus
2013 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta Incremental development revolutions of E-learning software systems in education sector: a case study approach Human-centric Computing and Information Sciences SCIE and Scopus
2013 Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta Regression testing based requirement prioritization of desktop software applications approach International Journal of Software Engineering and its Applications Scopus
2014 Vachik S. Dave, Kamlesh Dutta Neural network based models for software effort estimation: A review Artificial Intelligence Review SCI and Scopus
2014 Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta Current prioritisation and reprioritisation practices: A case study approach International Journal of Computer Aided Engineering and Technology Scopus
2014 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta Requirement reprioritisation for pairwise compared requirements International Journal of Computer Aided Engineering and Technology Scopus
2015 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta Hybrid regression testing technique: Based on requirement priorities, fault and modification history International Journal of Computer Applications in Technology ESCI and Scopus
2015 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta Exploring prioritization through systematic literature surveys and case studies SpringerPlus SCI
2016 Priyanka Dadhich, Kamlesh Dutta, M.C. Govil Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities International Journal of Security and Networks Scopus
2016 Sunil Kumar, Kamlesh Dutta Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges Security and Communication Networks SCI and Scopus
2016 Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta Historical prioritisation and reprioritisations using hierarchical historical R-tree International Journal of Computer Applications in Technology ESCI and Scopus
2017 Mukesh Kumar, Kamlesh Dutta Detecting wormhole attack on data aggregation in hierarchical WSN International Journal of Information Security and Privacy ESCI and Scopus
2017 Sunil Kumar, Kamlesh Dutta Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks International Journal of Electronics SCI and Scopus
2018 Poonam Tanwar, T.V. Prasad, Kamlesh Dutta Natural language processing for hybrid knowledge representation International Journal of Advanced Intelligence Paradigms Scopus
2018 Sunil Kumar, Kamlesh Dutta Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks Wireless Personal Communications SCI and Scopus
2018 Sunil Kumar, Kamlesh Dutta, Anjani Garg FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks Wireless Personal Communications SCI and Scopus
2019 Kamlesh Dutta, Varun Gupta and Vachik S. Dave Analysis and Comparison of Neural Network Models for Software Development Effort Estimation Journal of Cases on Information Technology (JCIT) Scopus
2019 Parnika Bhat and Kamlesh Dutta A Survey on Various Threats and Current State of Security in Android Platform ACM Computing Surveys (CSUR) SCI and Scopus
2009 Kamlesh Dutta, Nupur Prakash, Saroj Kaushik Application of Pronominal Divergence and Anaphora Resolution in English-Hindi Machine Translation POLIBITS ISI Thomson / Clarivate Web of Science SciELO collection
2011 Kamlesh Dutta, Saroj Kaushik, Nupur Prakash Machine Learning Approach for the Classification of Demonstrative Pronouns for Indirect Anaphora in Hindi News Items The Prague Bulletin of Mathematical Linguistics ERIH PLUS, Genamics JournalSeek
2020 Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta Hybrid Algorithm to Detect DDoS Attacks in VANETs Wireless Personal Communications SCI and Scopus
2019 Poonam Tanwar, T.V. Prasad, Kamlesh Dutta Hybrid technique for effective knowledge representation in normal life International Journal of Engineering and Advanced Technology Scopus
2019 Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta Evaluating the Performance of Various Machine Learning Algorithms for Detecting DDoS Attacks in VANETs International Journal of Control and Automation Scopus
2019 Kaushik Adhikary, Shashi Bhushan, Sunil Kumar and Kamlesh Dutta Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing DDoS Attacks in VANETS International Journal of Innovative Technology and Exploring Engineering Scopus
2020 Triveni Lal Pal and Kamlesh Dutta CNN-based Embedding Learning for Sentence Classification International Journal of Control and Automation Scopus
2019 Sanjay Kumar Dhurandher, Nitin Gupta, and Petros Nicopolitdis Contract Theory based Medium Access Contention Resolution in TDMA Cognitive Radio Networks Digital Object Identifier: Vol. 68, Issue 8, 8026-8035 IEEE Transactions on Vehicular Technology Q1 SCI (I.F. 5.379)
2020 Nitin Gupta, Sanjay K Dhurandher, Aarushi Sehgal A Contract Theory Approach Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks IEEE Systems Journal Q1 SCI (I.F. 3.987)
2020 Anshu Thakur, Ashok Kumar and Nitin Gupta, Puspita Chatterjee Secrecy Analysis of Reconfigurable Underlay Cognitive Radio Networks with SWIPT and Imperfect CSI , Early Access, 10.1109/TNSE.2020.3040531 IEEE Transactions on Network Science and Engineering Q1 SCI (I.F. 5.213)
2019 Anshu Thakur, Ashok Kumar, Nitin Gupta, Ajay Singh Secrecy Outage Performance Analysis of MIMO Underlay Cognitive Radio Networks with Delayed CSI and Transmitter Antenna Selection International Journal of Communication Systems, Wiley Q2 SCI (I.F. 1.319)
2019 Nitin Gupta, Sanjay K. Dhurandher Cross-layer Perspective for Channel Assignment in Cognitive Radio Networks: A Survey e4261. https://doi.org/10.1002/dac.4261 International Journal of Communication Systems, Wiley Q2 SCI (I.F. 1.319)
2020 Riya, Nitin Gupta, Sanjay K. Dhurandher Efficient Caching Method in Fog Computing for Internet of Everything Peer to Peer Networking and Applications, Springer Q2 SCI (IF 2.793)
2020 Anshu Thakur, Ashok Kumar, Nitin Gupta, Secrecy Analysis of MIMO Underlay Cognitive Radio Networks with Energy Harvesting Transactions on Emerging Telecommunications Technologies, Wiley Q2 SCI (I.F. 1.594)
2018 Nitin Gupta, Sanjay K. Dhurandher and Isaac Woungang Sub-Carriers Assignment Scheme for Multiple Secondary Users in OFDMA Based IEEE 802.22 WRAN: A Game Theoretic Approach https://doi.org/10.1002/ett.3502 Transactions on Emerging Telecommunications Technologies, Wiley Q2 SCI (I.F. 1.594)
2021 Sejal Gupta, Ritu Garg, Nitin Gupta, Waleed S Alumany, Uttam Ghosh and Pradip K. Sharma Energy-ecient Dynamic Homomorphic Security Scheme for Fog Computing in IoT Networks, 58(102768) Journal of Information Security and Applications, Elsevier Q2 SCI (I.F. 2.327)
2020 Shushant Sharma, Nitin Gupta Federated Learning Based Caching in Fog Computing for Future Smart Cities Internet Technology Letters, Wiley E-SCI, Web of Science, DBLP
2019 Nitin Gupta, Sanjay K. Dhurandher, Isaac Woungang and Joel j.P.C. Rodrigues On the Target Channel Sequence Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area Networks Vol:8, No.:4 International Journal of Space-Based and Situated Computing, Inderscience E-SCI, Web of Science, DBLP
2021 Varan Singh Rohila, Nitin Gupta, Amit Kaul, Deepak Kumar Sharma Deep Learning Assisted Covid-19 Detection using full CT-scans   Internet of Things, Elsevier New Journal, Not Indexed Yet
2020 Satnam Kaur ., Lalit K. Awasthi ., A.L. Sangal ., Gaurav Dhiman ., Engineering Applications of Artificial Intelligence, Volume 90, Year 2020 Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization -
2020 Satnam Kaur ., Lalit K. Awasthi ., A. L. Sangal ., Engineering with Computers, Year 2020 HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems -
2020 Abhilasha Sharma ., Lalit Kumar Awasthi ., Computer Communications, Volume 159, Year 2020, Pages 71-82 AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks -
2020 Neha Agarwal ., Geeta Sikka ., Lalit Kumar Awasthi ., Information Processing and Management, Volume 57, Year 2020 Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation -
2020 Raj Mohan Singh ., Lalit Kumar Awasthi ., Geeta Sikka ., Communications in Computer and Information Science, Volume 1206 CCIS, Year 2020, Pages 673-685 Techniques for Task Scheduling in Cloud and Fog Environment: A Survey -
2019 Awasthi, Lalit Kumar;Ambedkar, B. R. ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications Message from the ICSCCC 2018 Patron and Principal General Chair -
2019 Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit Kumar Computer Networks, Volume 159, Year 2019, Pages 125-134 Laman: A supervisor controller based scalable framework for software defined networks -
2019 Kaur, Satnam;Awasthi, Lalit K.;Sangal, A. L. Modern Physics Letters A Prioritizing software refactoring opportunities using multi-objective optimization -
2019 Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S. Proceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Year 2019, Pages 968-973 Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment -
2019 Nanda, Ashok Kumar;Sankiran, V.;Gandam, Vindya;Awasthi, Lalit Kumar International Journal of Innovative Technology and Exploring Engineering, Volume 8, Year 2019, Pages 138-145 ECDSA security protocol for WSBNs -
2019 Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, Emmanuel S. International Journal of Grid and Utility Computing, Volume 10, Year 2019, Pages 308-325 Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation -
2019 Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit K. ICCT 2017 - International Conference on Intelligent Communication and Computational Techniques, Volume 2018-January, Year 2018, Pages 228-232 An empirical enhancement using scale invariant feature transform in text extraction from images -
2018 Aidan, Jagmeet Singh;Verma, Harsh Kumar;Awasthi, Lalit Kumar Proceedings - 2017 International Conference on Next Generation Computing and Information Systems, ICNGCIS 2017, Year 2018, Pages 131-136 Comprehensive survey on petya ransomware attack -
2018 Garg, Urvashi;Sikka, Geeta;Awasthi, Lalit K. Computers and Security, Volume 77, Year 2018, Pages 349-359 Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities -
2018 Garg, Urvashi; Sikka, Geeta; Awasthi, Lalit K; Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives A Systematic Review of Attack Graph Generation and Analysis Techniques -
2018 Kaur, Sumandeep;Sikka, Geeta;Awasthi, Lalit Kumar ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 13-16 Sentiment Analysis Approach Based on N-gram and KNN Classifier -
2018 Nayyer, Amit;Sharma, Aman Kumar;Awasthi, Lalit K. ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 333-339 A Study of Performance Evaluators for Software Defined Networking -
2018 Sharma, Abhilasha;Awasthi, Lalit Kumar ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, Year 2018, Pages 556-560 A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks -
2017 Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, Emmanuel S.;Kapil, Divya Journal of Cloud Computing, Volume 6, Year 2017 A critical survey of live virtual machine migration techniques -
2017 Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar Wireless Networks, Volume 23, Year 2017, Pages 1669-1687 Incentive based scheme for improving data availability in vehicular ad-hoc networks -
2017 Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan Computer Communication, Networking and Internet Security, Year 2017, Pages 461-470 Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks -
2017 Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S.;Kumar, Nitin Proceedings - 2016 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2016, Year 2017, Pages 17-24 Improved Virtual Machine Migration Approaches in Cloud Environment -
2016 Thakur, Jawahar;Kalia, Arvind;Awasthi, Lalit Kumar Proceedings of 2015 3rd International Conference on Image Information Processing, ICIIP 2015, Year 2016, Pages 220-224 Cluster-based coordinated checkpointing protocol in wireless ad-hoc networks -
2016 Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. 2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016, Year 2016, Pages 617-624 Workflow scheduling algorithms in cloud environment: A review, taxonomy, and challenges -
2016 Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan International Journal of Next-Generation Computing, Volume 7(1), Year 2016 Minimal Marking of Trap-Regions for Efficient Greedy Forwarding in WSNs. -
2016 Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan International Journal of Computer Applications, Volume 975, Year 2016, Pages 8887 An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network -
2016 Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar Wireless Networks, Volume 22, Year 2016, Pages 1641-1657 Priority based efficient data scheduling technique for VANETs -
2016 Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. 2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016, Year 2016, Pages 182-187 Energy-efficient resource allocation approaches with optimum virtual machine migrations in cloud environment -
2016 Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan International Journal of Next-Generation Computing, Volume 7(3), Year 2016 GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks. -
2015 Jawahar Thakur, Arvind Kalia, LALIT AWASTHI International Journal of Next-Generation Computing, Volume 6(2), Year 2015 Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review -
2015 Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kumar Wireless Networks, Volume 21, Year 2015, Pages 1631-1645 Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks -
2015 D Nayak, A Nanda, P Awasthi, L Kumar IJRCCT, Volume 4(3), Year 2015, Pages 250-255 Multiple private keys with NTRU cryptosystem -
2014 Singh, Vikram;Awasthi, Lalit Kumar Advances in Intelligent Systems and Computing, Volume 216, Year 2014, Pages 251-256 A review paper on IEEE 802.11 WLAN -
2014 Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kr ACM International Conference Proceeding Series, Volume 11-16-November-2014, Year 2014 NRNDD: Nearest relay node based data dissemination technique for VANETs -
2014 Chauhan, Siddhartha;Awasthi, Lalit Kumar International Journal of Communication Networks and Distributed Systems, Volume 12, Year 2014, Pages 275-298 An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks -
2014 Anup Patnaik, Lalit Kumar Awasthi, Kamlesh Dutta ournal of Engineering Research and Applications , Volume 7(5), Year 2014, Pages 82-94 An Overview of Workflow Management on Mobile Agent Technology -
2014 Awasthi, Lalit K.;Misra, Manoj;Joshi, R. C. International Journal of Communication Networks and Distributed Systems, Volume 12, Year 2014, Pages 356-380 Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems -
2014 Vijay, Uttam;Awasthi, Lalit Kumar Advances in Intelligent Systems and Computing, Volume 216, Year 2014, Pages 219-223 Scope of cloud computing for multimedia application -
2014 Nanda, Ashok Kumar, Lalit Kumar International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Year 2013, Pages 706-718 A proposal for SMS security using NTRU cryptosystem -
2013 Gupta, Ankur;Awasthi, Lalit K. International Journal of Communication Networks and Distributed Systems, Volume 11, Year 2013, Pages 347-375 Peer enterprises: Design and implementation of a cross-organisational peer-to-peer framework -
2013 Pamita Awasthi, Shilpa Dogra, Lalit K Awasthi, Ritu Barthwal International Journal of Drug Design and Discovery , Volume 4(1), Year 2013, Pages 1003-1015 Interaction of Mitoxantrone and its Analogs with Methylated and Non-Methylated CpG Islands in Tetrameric DNA Sequences: A Molecular Modeling Study -
2013 Lalit Kumar Awasthi, Siddhartha Chauhan Wireless Sensor Networks: From Theory to Applications, Year 2013, Pages 1041 Data Aggregation and Data Gathering -
2012 Rajesh Sharma, Lalit Kumar Awasthi Journal of Bioinformatics and Intelligent Control, Volume 1(2), Year 2012, Pages 138-147 A log-based recovery protocol for mobile distributed computing systems -
2012 Ashok Kumar Nanda, Lalit Kumar Awasthi International Journal of Engineering and Technology, Volume 4(6), Year 2012, Pages 836 XTR Cryptosystem for SMS security -
2012 Kamal Kant, Lalit Kumar Awasthi International Journal of IT & Knowledge, Year 2012 “Unicast And Multicast Routing Protocols For Manets: A Comparative Survey” -
2012 Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi International Journal of Advanced Computer Science and Applications, Volume 3(10), Year 2012 Request Analysis and Dynamic Queuing System for VANETs -
2012 Ashok Kumar Nanda, Lalit Kumar Awasthi Journal of Information Assurance & Security, Volume 7(4), Year 2012 Secure SMS Encryption Using NTRU Cryptosystem. -
2012 Anup Patnaik, Lalit Kumar Awasthi, Kamlesh Dutta IJCSE, Volume 3(2), Year 2012, Pages 248-254 Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review -
2012 Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam International Journal of Distributed Systems and Technologies, Volume 3, Year 2012, Pages 22-38 Cache replacement in mobile Adhoc networks -
2012 Abhishek Mohta, Ravi Kant Sahu, Lalit Kumar Awasthi International journal of advanced research in computer science and software engineering, Year 2012 Robust data security for cloud while using third party auditor -
2012 Abhishek Mohta, Lalit Kumar Awasti International Journal of Scientific & Engineering Research, Year 2012 Cloud data security while using third party auditor -
2012 Manju Bala, Lalit Awasthi International Journal of Intelligent systems and applications, Year 2012 Proficient D-SEP protocol with heterogeneity for maximizing the lifetime of wireless sensor networks -
2012 Ajay Guleria, Narottam C Kaushal, Lalit Kumar Awasthi International Journal of Next-Generation Computing, Volume 3(3), Year 2012 Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs -
2012 Manju Bala, Lalit Awasthi International Journal of Advanced Science and Technology, Year 2012 Proficient D-HEED Protocol for Maximizing the Lifetime of WSN and Comparative Performance Investigations with Various Deployment Strategies -
2012 Awasthi, Lalit K.;Misra, Manoj;Joshi, Ramesh C. International Journal of Computers and Applications, Volume 34, Year 2012, Pages 1-10 An efficient coordinated checkpointing approach for distributed computing systems with reliable channels -
2012 Chauhan, Siddhartha;Awasthi, Lalit Kumar International Journal of Engineering Business Management, Volume 4, Year 2012 Adaptive time synchronization for homogeneous WSNs -
2012 Siddhartha Chauhan, Lalit Kumar Awasthi International Journal of Advanced Networking and Applications, Volume 3(5), Year 2012, Pages 1302 Siddhartha Chauhan, Lalit Kumar Awasthi -
2012 Lakshmi Priya, M.;Awasthi, Lalit K. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Volume 7135 LNCS, Year 2012, Pages 375-380 Distributed localization for anisotropic sensor networks using spatial clustering -
2012 Naveen Chauhan, LK Awasthi, Narottam Chand International Conference on Latest Computational Technologies, Year 2012, Pages 85-89 Cluster based efficient caching technique for wireless sensor networks -
2012 Ravi Kant Sahu, Abhishek Mohta, LK Awasthi IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), Year 2012, Pages 23-27 Energy-efficient grid-based data dissemination in wireless sensor networks -
2011 Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh International Journal of Wireless Sensor Network, Volume 3(2), Year 2011 A Distributed Weighted Cluster Based Routing Protocol for MANETs. International Journal of Wireless Sensor Network -
2011 Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam;Joshi, R. C.;Misra, Manoj International Journal of Mobile Computing and Multimedia Communications, Volume 3, Year 2011, Pages 20-35 Cooperative caching in mobile ad hoc networks -
2011 Singh, Anurag;Chand, Narottam;Awasthi, Lalit Kr Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, Year 2011, Pages 135-138 Enhancing cache invalidation techniques in IVANET -
2011 Pawan Bhattarai, Amrik Singh, Lalit.K.Awasthi, A.S Sudan International Journal of Scientific & Engineering Research, Volume 2(7), Year 2011, Pages 1-7 Centralization and Universalization of Knowledge: Problems, Solution and Challenges -
2011 Kumar, Prashant;Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam International Journal of Mobile Computing and Multimedia Communications, Volume 3, Year 2011, Pages 53-66 Enhancing data availability in MANETs with cooperative caching -
2011 Pant, Sudhanshu;Chauhan, Naveen;Chand, Narottam;Awasthi, L. K.;Dubey, Brij Bihari Communications in Computer and Information Science, Volume 168 CCIS, Year 2011, Pages 395-402 Improving fading-aware routing with circular cache layers in wireless sensor networks -
2011 Singh, Anurag;Chand, Narottam;Awasthi, Lalit Kr Communications in Computer and Information Science, Volume 192 CCIS, Year 2011, Pages 609-614 Cache invalidation for location dependent and independent data in IVANETS -
2011 Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam;Chugh, Ankit World Academy of Science, Engineering and Technology, Volume 51, Year 2011, Pages 1166-1170 A distributed weighted cluster based routing protocol for manets -
2011 Awasthi, Srikanth R.L.K. 2011 International Conference on Communication Systems and Network Technologies, Year 2011, Pages 139-143 Voronoi-based Continuous query processing for mobile users -
2011 Gupta, Ankur;Awasthi, Lalit K. Computing and Informatics, Volume 30, Year 2011, Pages 559-594 Peer-to-peer networks and computation: Current trends and future perspectives -
2011 Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011, Year 2011, Pages 235-239 Global cooperative caching for wireless sensor networks -
2011 Dubey, Brij Bihari;Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam ACM International Conference Proceeding Series, Year 2011, Pages 96-99 NILDD: Nearest intersection location dependent dissemination of traffic information in VANETs -
2011 Nanda, Ashok Kumar;Awasthi, Lalit Kumar 2011 International Siberian Conference on Control and Communications, SIBCON 2011 - Proceedings, Volume 201, Year 2011, Pages 51-55 Joint channel coding and cryptography for SMS -
2011 Gupta, Ankur;Awasthi, Lalit K. International Journal of Communication Networks and Distributed Systems, Volume 6, Year 2011, Pages 202-228 Peers-for-peers (P4P): An efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications -
2011 Ram, Babu;Chauhan, Naveen;Chand, Narottam;Awasthi, L. K. ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology, Volume 4, Year 2011, Pages 250-253 A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks -
2011 Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam;Joshi, R. C.;Mishra, Manoj ACM International Conference Proceeding Series, Year 2011, Pages 17-20 A cooperative caching strategy in mobile ad hoc networks based on clusters -
2011 Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam Communications in Computer and Information Science, Volume 169 CCIS, Year 2011, Pages 594-602 Data mining techniques for prefetching in mobile Ad Hoc networks -
2011 Amit Nayyer, Meenakshi Nayyer, Lalit Kr Awasthi International Journal of Computer Applications, Volume 36, Year 2011, Pages 13-19 A comparative study of time synchronization protocols in wireless sensor network -
2011 Siddhartha Chauhan, Lalit Awasthi nternational Journal of Computer Science (IJCSI), Volume 8(6), Year 2011 TBEE: Tier based energy efficient protocol providing sink and source mobility in wireless sensor networks -
2011 Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, Year 2011, Pages 71-75 Data caching with intelligent prefetching in mobile ad hoc networks -
2011 Nanda, Ashok Kumar;Awasthi, Lalit Kumar Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011, Year 2011, Pages 1282-1287 Encryption based channel coding algorithm for secure SMS -
2011 Chauhan, Naveen;Awasthi, Lalit K.;Chand, Narottam Communications in Computer and Information Science, Volume 142 CCIS, Year 2011, Pages 628-630 Cooperative caching strategy in mobile Ad hoc networks -
2011 Dubey, Brij Bihari;Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam;Pant, Sudhanshu Communications in Computer and Information Science, Volume 168 CCIS, Year 2011, Pages 415-425 Efficient VANET-based traffic information dissemination using centralized fixed infrastructure -
2011 Amrik Singh, Lalit K Awasthi 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Year 2011, Pages 438-443 Performance comparisons and scheduling of load balancing strategy in grid computing -
2010 Gupta, Ankur;Awasthi, Lalit K. nternational Journal of Networking and Virtual Organisations, Volume 7, Year 2010, Pages 63-79 IndNet: Towards a peer-to-peer community network that connects the information technology industry and academia in India -
2010 Kamal Kant, K Lalit Awasthi IEEE supported International Conference on Recent Trends in Soft Computing and Information Technology, TSCIT-09, Year 2010 A Survey on Routing Protocols for MANETs and Comparisons -
2010 Kamal Kant, Lalit K Awasthi Proceedings of the 2010 International Conference on Advances in Communication, Network, and Computing, Year 2010, Pages 248-252 A Multicast Routing Protocol for MANETs Based on Node Stability -
2010 Yash Pal, AJ Singh, Lalit K Awasthi International Journal of Advanced Research in Computer Science, Year 2010, Pages 1(3) Evaluation of Energy Efficient Protocol for Object Tracking WSN using OMNet++ -
2010 Prachi Maheshwari, Kamal Kant, Lalit K Awasthi International Journal of Information Technology, Volume 2(2), Year 2010, Pages 657-664 Recent Advances in Checkpointing Techniques in Mobile Computing Systems -
2010 Manju Sharma, Lalit Awasthi International Journal of Computer Applications, Volume 975, Year 2010, Pages 8887 Frequency Reliance on EEHC-Based Routed Wireless Sensor Networks -
2010 Prashant Kumar, Naveen Chauhan, Lk K Awasthi, Narottam Chand International Journal of Computer Science Issues (IJCSI), Year 2010 Proactive approach for cooperative caching in mobile adhoc networks -
2010 Chaurasia, Soni;Chauhan, Siddhartha;Awasthi, L. K. 2010 International Conference on Industrial Electronics, Control and Robotics, IECR 2010, Year 2010, Pages 263-268 Energy efficient protocol for providing QoS for wireless sensor network -
2010 Gupta, Ankur;Awasthi, Lalit K. International Journal of Business Information Systems, Volume 5, Year 2010, Pages 102-116 PArch: A cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival -
2010 Gupta, Ankur;Awasthi, Lalit K. International Journal of Distributed Systems and Technologies, Volume 1, Year 2010, Pages 1-23 Toward a quality-of-service framework for peer-to-peer applications -
2010 Kant, Kamal;Awasthi, Lalit K. Proceedings - 2010 International Conference on Computational Intelligence and Communication Networks, CICN 2010, Year 2010, Pages 296-300 Stable link based multicast routing scheme for MANET -
2010 Gupta, Ankur;Awasthi, Lalit K. Information Security Journal, Volume 19, Year 2010, Pages 191-203 A Containment-Based Security Model for Cycle-Stealing P2P Applications -
2010 Kamal Kant, Lalit K Awasthi International Journal of IT & Knowledge Management (IJITKM), Special issue, Year 2010 Unicast and Multicast Routing Protocols for MA-NETs: A Comparative Survey -
2010 Awasthi, Lalit K.;Misra, Manoj;Joshi, R. C. International Journal of Ad Hoc and Ubiquitous Computing, Volume 5, Year 2010, Pages 137-149 A weighted checkpointing protocol for mobile distributed systems -
2010 Manju Sharma, Lalit Awasthi arXiv preprint arXiv:1002.1151, Year 2010 Realistic approach towards quantitative analysis and simulation of EEHC-Based routing for wireless sensor networks -
2010 Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra International Journal of Computer Science and Engineering, Volume 2(7), Year 2010, Pages 2268-2273 Global cluster cooperation strategy in mobile ad hoc networks -
2010 Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra International Journal of Applied Engineering Research, Volume 1(3), Year 2010 Energy efficient cooperative caching in mobile ad hoc networks -
2009 Gupta, Ankur;Awasthi, Lalit K. 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications, IMSAA 2009, Year 2009 Peer enterprises: A viable alternative to cloud computing? -
2009 Gupta, Ankur;Awasthi, Lalit K. Communications in Computer and Information Science, Volume 40, Year 2009, Pages 422-433 Security issues in cross-organizational peer-to-peer applications and some solutions -
2009 Nayyer, Amit;Sharma, Rajesh;Nayyer, Meenakshi;Awasthi, Lalit Kumar 2009 IEEE International Advance Computing Conference, IACC 2009, Year 2009, Pages 1141-1145 Wait and watch technique: Removing time synchronization overhead in wireless sensor network -
2009 Pamita Awasthi, Shilpa Dogra, Lalit K Awasthi, Ritu Barthwal BIOCOMP, Year 2009, Pages 121-128 Interactions of Mitoxantrone and its Analogues with DNA Tetramer Sequences-A Molecular Modeling Study. -
2009 Pal, Yash;Awasthi, Lalit K.;Singh, A. J. 2009 IEEE International Advance Computing Conference, IACC 2009, Year 2009, Pages 1200-1205 Maximize the lifetime of object tracking sensor network with node-to-node activation scheme -
2009 Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, Year 2009 Cooperative data caching with prefetching in mobile ad-hoc networks -
2008 Gupta, Ankur;Awasthi, Lalit K. Proceedings of the 2008 International Conference on Grid Computing and Applications, GCA 2008, Year 2008, Pages 140-146 "Secure thyself": Securing individual peers in collaborative peer-to-peer environments -
2008 Gupta, Ankur;Malhotra, Deepti;Awasthi, Lalit K. Proceedings of the 2008 16th International Conference on Networks, ICON 2008, Year 2008 NeighborTrust: A trust-based scheme for countering distributed denial-of-service attacks in P2P networks -
2008 Agarwal, Khushboo;Awasthi, Lalit Kumar Proceedings of the 2008 16th International Conference on Networks, ICON 2008, Year 2008 Enhanced AODV routing protocol for ad hoc networks -
2008 Ankur Gupta, Lalit K Awasthi GCA, Year 2008, Pages 140-146 Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments. -
2007 Gupta, Ankur;Awasthi, Lalit K. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Volume 4806 LNCS, Year 2007, Pages 1011-1020 Peer enterprises: Possibilities, challenges and some ideas towards their realization -
2007 Awasthi, Lalit Kumar;Kumar, P. International Journal of Information and Computer Security, Volume 1, Year 2007, Pages 298-314 A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach -
2007 Ankur Gupta, Lalit K Awasthi GCA, Year 2007, Pages 151-158 P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P applications. -
2007 Swamidoss Sathiakumar, Lalit Kumar Awasthi, M Roberts Masillamani, SS Sridhar Springer Science & Business Media, Volume 216 Proceedings of International Conference on Internet Computing and Information Communications: ICICIC Global 2012 -
2007 LK Awasthi International Conference on Information Systems and Technology (ICIST) 2011 Proceedings published by International Journal of Computer Applications® (IJCA), Year , Pages 11-17 Enhanced Query Processing Technique for Location based Services -
2007 Manju Bala, Lalit Awasthi Energy, Volume 7(2), Year On proficiency of HEED protocol with heterogeneity for wireless sensor networks with BS and nodes mobility -