2020 |
Ajay Kumar Mallick, Susanta Mukhopadhyay |
Video retrieval using salient foreground region of motion vector based extracted keyframes and spatial pyramid matching, Vol-79 |
Multimedia Tools and Applications (Springer) |
SCI |
2022 |
Ajay Kumar Mallick, Susanta Mukhopadhyay |
Video Retrieval Framework based on Color Co-occurrence Feature of Adaptive Low Rank Extracted Keyframes and Graph Pattern Matching, Vol-59 |
Information Processing & Management (Elsevier) |
SCI |
2022 |
Mukul Majhi, Ajay Kumar Mallick |
Random Projection and Hashing based Privacy Preserving for Image Retrieval Paradigm using Invariant and Clustered Feature, Vol-34 |
Journal of King Saud University-Computer and Information Sciences(Elsevier) |
SCI |
2015 |
Arun Kumar Yadav and Divakar Yadav |
Wavelet Tree based Hybrid Geo-Textual Indexing
Technique for Geographical Search Vol 8(33) Page: 1-7 |
Indian Journal of Science and Technology |
Scopus |
2016 |
Arun Kumar Yadav,Divakar Yadav and Rajesh Prasad |
Efficient Textual Web Retrieval
using Wavelet Tree, Vol 6(4) Page: 16-29 |
International Journal of Information Retrieval Research |
ESCI |
2019 |
Arun Kumar Yadav
and Divakar Yadav |
Wavelet Tree based Dual Indexing Technique for Geographical Search, Vol 16(4) Page:624-632 |
The International Arab Journal of Information Technology |
SCI |
2019 |
Jay Kant Pratap Singh Yadav, Arun Kumar Yadav, Divakar Yadav, Vikash Yadav |
Optimization of Hopfield Networks for Storage and Recall: A Decade Review, Vol 21(3-4) Page:321-329 |
International Journal of Advanced Intelligence Paradigms |
Scopus |
2020 |
Arun Yadav, Jay Kant Pratap Singh Yadav, Divakar Yadav |
Spatial Ambiguities Optimization in GIR, Vol-7(28) Page:1-8 |
EAI Endorsed Transactions on Scalable Information Systems |
ESCI, Scopus |
2020 |
Arun Yadav, Divakar Yadav and Arti Jain |
An Improvised Feature-Based Method for Sentimental Analysis of Product Reviews, Vol 8(29) Page:1-8 |
EAI Endorsed Transactions on Scalable Information Systems |
ESCI, Scopus |
2020 |
Yadav, D., Akanksha, Yadav, A.K. |
A novel convolutional neural network based model for recognition and classification of apple leaf diseases Vol. 37(6), pp. 1093-1101 |
Traitement du Signal |
SCI |
2021 |
Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav |
Microaneurysm Detection using Color Locus Detection Method, Vol 176(109084) Page:1-9 |
Elsevier Publication ,Measurement 176 (2021) |
SCI |
2021 |
A Yerma, VK Gupta, S Goel, AK Yadav, D Yadav |
Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach, Vol 38(2) Page:299-307 |
Traitement du Signal |
SCI |
2021 |
S. Bharti, A. K. Yadav, M. Kumar, and D. Yadav |
Cyberbullying detection from tweets using deep learning, vol 51(9) Page:2695-2711. |
Kybernetes(Emeralled Publishing) |
SCI |
2021 |
Kartikey Tewari, Abhijeet Shrivastava, Arun Kumar Yadav, Divakar Yadav |
Efficient transitive operations using binary indexed trees, Vol 13(3) Page:1155-1163. |
International Journal of Information Technology |
Scopus |
2021 |
P Das, JKP Singh Yadav, AK Yadav |
An Automated Tomato Maturity Grading System Using Transfer Learning Based AlexNet, vol 26(2) Page:191-200. |
Ingénierie des Systèmes d’Information |
Scopus |
2022 |
Arun Kumar Yadav, Amit Singh, Mayank Dhiman, Vineet, Rishabh Kaundal, Ankit Verma , Divakar Yadav |
Extractive text summarization using deep learning approach, vol 14(5) Page:2407-2415. |
International Journal of Information Technology |
Scopus |
2022 |
Jay Kant Pratap Singh Yadav,
Arun Kumar Yadav, Divakar Yadav,
Vikash Yadav |
Optimisation of Hopfield networks for storage and recall: a decade review, vol 21(3-4) page: 321-329. |
International Journal of Advanced Intelligence Paradigms |
Scopus |
2022 |
Sonam Gupta, Arun Kumar Yadav, Divakar Yadav , Bharti Shukla |
A scalable approach for index compression using wavelet tree and LZW, Vol 14(4) Page:2191-2204. |
International Journal of Information Technology |
Scopus |
2022 |
Arjun Singh, , Surbhi Chauhan, Sonam Gupta, and Arun Kumar Yadav |
intrusion Detection System Using Deep Learning Asymmetric Autoencoder (DLAA), Vol 11(2) Page:1-17. |
International Journal of Fuzzy System Applications (IJFSA) |
Scopus |
2022 |
Sonam Gupta, Tushtee Varshney, Abhinav Verma, Lipika Goe |
A Hybrid Machine Learning Approach for Credit Card Fraud Detection, Vol 13(3) Page:1-13. |
International Journal of Information Technology Project Management (IJITPM) |
Scopus |
2022 |
Divakar Yadav, Aarushi Gupta, Arti Jain, and Arun Kumar Yadav. |
Plant leaf disease detection using CNN with transfer learning and XGBoos, Vol 14(3) Page:244-265. |
International Journal of Data Analysis Techniques and Strategies |
Scopus |
2022 |
Rishabh Katna, Kashish Kalsi, Srajika Gupta, Divakar Yadav , Arun Kumar Yadav |
Machine learning based approaches for age and gender prediction from tweets, Vol 81(19) Page:27799-27817. |
Multimedia Tools and Applications |
SCI |
2022 |
Akhilesh Verma, Anshdha Gupta, Mohammad Akbar, Arun Kumar Yadav , Divakar Yadav |
Presentation Attack Detection Using Referential Quality Metrics and Minutiae Count, Vol 127(4) Page:3347-3361. |
Wireless Personal Communications |
SCI |
2022 |
Arun Kumar Yadav, Divakar Yadav, Akhilesh Verma, Mohd. Akbar ,Kartikey Tewari |
Scalable thread based index construction using wavelet tree, Vol 82(9) Page:14037-14053. |
Multimedia Tools and Applications |
SCI |
2022 |
Divakar Yadav; Rishabh Katna; Arun Kumar Yadav; Jorge Morato |
Feature Based Automatic Text Summarization Methods: A
Comprehensive State-of-the-Art Survey, Vol 10 Page:133981-134003. |
IEEE Access |
SCI |
2023 |
Chinmay Gupta, Mohit Kumar, Arun Kumar Yadav, and Divakar Yadav |
FERNET: An Integrated Hybrid DCNN Model for Driver Stress Monitoring via Facial Expression.Vol-37, No.3 Page 1-25. |
International Journal of Pattern Recognition and Artificial Intelligence |
SCI |
2023 |
Akash Verma, Arun Kumar Yadav, Mohit Kumar , Divakar Yadav |
Automatic image caption generation using deep learning. Vol 83(2) Page:5309-5325. |
Multimedia Tools and Applications |
SCI |
2023 |
G Khartheesvar, Mohit Kumar, Arun Kumar Yadav , Divakar Yadav |
Automatic Indian sign language recognition using MediaPipe holistic and LSTM network, Vol 83(20), Page:5309-5325. |
Multimedia Tools and Applications |
SCI |
2023 |
Arun Kumar Yadav, Mohit Kumar, Abhishek Kumar, Shivani, Kusum, Divakar Yadav |
Hate speech recognition in multilingual
text: hinglish documents, Vol 15(3), Page:1319-1331. |
International Journal of Information Technology |
Scopus |
2023 |
Gupta, Sonam, Bhanu Verma, Pradeep Gupta, Lipika Goel, Arun Kumar Yadav, and Divakar Yada |
Identification of Fake News Using Deep Neural Network-Based Hybrid Mode. Vol-4 No.5 Page:1-13. |
SN Computer Scienc |
Scopus |
2023 |
Arun Kumar Yadav, Suraj Kumar, Dipesh Kumar, Lalit Kumar, Kapil Kumar, Sandeep Kumar Maurya, Mohit Kumar,
and Divakar Yadav |
Fake News Detection Using Hybrid Deep Learning Method. Vol-4 No.6 Page 1-15. |
SN Computer Scienc |
Scopus |
2023 |
Archit Dhiman, Mohit Kumar,Arun Kumar Yadav, Divakar Yadav. |
Pothole Detection and Localization from Images using Deep Learning, Vol 18(1). |
International Journal of Information and Decision Sciences |
Scopus |
2024 |
Sanjeewani,Arun Kumar Yadav, Mohd Akbar, Mohit Kumar,Divakar Yadav |
Retinal blood vessel segmentation using a deep learning method based monmodified U-NET model, Page 1-20. |
Multimedia Tools and Applications |
SCI |
2024 |
Divakar Yadav, Kritarth Kapoor, Arun Kumar Yadav, Mohit Kumar, Arti Jain |
Satellite image classification using deep learning approach, Vol 17(3) Page 2495-2508. |
Earth Science Informatics |
SCI |
2024 |
Ashish Dhiman, Arun Kumar Yadav, Mohit Kumar, Divakar Yadav, Akash Verma |
Sentiment classification in Hindi text using hybrid deep learning method, Vol 14(1) Page 1-12. |
International Journal of Information Technology |
Scopus |
2024 |
Arun Kumar Yadav, Abhishek Kumar, Mohit Kumar, Divakar Yadav |
Semantic proximity assessment in Bhojpuri and Maithili: a word
embedding perspective, Vol 14(130). |
Social Network Analysis and Mining |
SCI |
2024 |
Akash Verma, Arun Kumar Yadav |
Residual learning for brain tumor segmentation: dual residual blocks approach |
Neural Computing and Applications |
Scopus |
2024 |
John Wang, Arti Jain, Arun Kumar Yadav, Divakar Yadav |
Analyzing the Complexity of US Federal Debt: A Mathematical Approach -11(1) |
International Journal of Business Analytics (IJBAN) |
Scopus |
2024 |
Sonam Gupta, Lipika Goel, Arun Kumar Yadav, and Pradeep Gupta |
Novel approach for depression detection on Reddit pos 16(4) |
International Journal of Data Analysis Techniques and Strategies |
Scopus |
2025 |
Akash Verma, Arun Kumar Yadav |
Improved multi-class brain tumor mri classification with ds-net: a patch-based deep supervision approach |
Multimedia Tools and Applications |
Scopus |
2025 |
Arun Kumar Yadav, Tushar Gupta, Mohit Kumar and Divakar Yadav |
A Hybrid Model Integrating LDA, BERT, and Clustering for Enhanced Topic Modeling |
Quality & Quantity, Springer |
Scopus |
2025 |
Akash Verma, Arun Kumar Yadav |
FusionNet: Dual Input Feature Fusion Network with Ensemble Based Filter Feature Selection for Enhanced Brain Tumor Classification |
Brain Research, Elsevier |
SCI |
2025 |
Divya Rathod, Arun Kumar Yadav, Mohit Kumar, Divakar Yadav |
Character-Level Encoding based Neural Machine Translation
for Hindi language |
Neural Processing Letters, Springer |
SCI |
2019 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Load balanced scheduling and reliability modelling of grid transaction processing system using coloured petri nets, Volume 84, January 2019, Pages 225-236
|
ISA Transactions, Elsevier |
Cambridge Scientific Abstracts
Current Contents - Engineering, Computing & Technology
EBSCOhost
Engineering Index Monthly
Ei Compendex
Embase
Embase
Gale Academic OneFile
Gale Infotrac Custom
GeoRef
INSPEC
PubMed/Medline
Science Citation Index Expanded
PubMed/Medline
Scopus
TEMA - Technik und Management
Web of Science
Zentralblatt MATH
SCI (Impact Factor: 7.3) |
2017 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
On maximizing reliability of grid transaction processing system considering balanced task allocation using social spider optimization , Volume 38, February 2018, Pages 202-217 |
Swarm and Evolutionary Computation, Elsevier |
Scopus
Journal Citation Reports - Science Edition
Science Citation Index Expanded
INSPEC
(Impact Factor: 10.00) |
2018 |
Dharmendra Prasad Mahato et al. |
On Scheduling Transactions in
a Grid Processing System considering load through Ant Colony Optimization
, Volume 61, December 2017, Pages 875-891
|
Applied Soft Computing, Elsevier |
Scopus
Science Citation Index Expanded
CompuMath Citation Index
Current Contents - Engineering, Computing & Technology
INSPEC
(Impact Factor: 8.7) |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Load Balanced Transaction Scheduling using Honey Bee Optimization Considering
Performability in On-demand Computing System, DOI: 10.1002/cpe.4253 |
Concurrency and Computation: Practice and Experience, Wiley |
ACM Guide to Computing Literature (ACM)
COMPENDEX (Elsevier)
CompuMath Citation Index (Clarivate Analytics)
CompuScience Database (FIZ Karlsruhe)
Computer Abstracts (Emerald)
Computer Science Index (EBSCO Publishing)
Current Contents: Engineering, Computing & Technology (Clarivate Analytics)
INSPEC (IET)
Journal Citation Reports/Science Edition (Clarivate Analytics)
Science Citation Index Expanded (Clarivate Analytics)
SCOPUS (Elsevier)
The DBLP Computer Science Bibliography (University of Trier)
Web of Science (Clarivate Analytics)
(Impact Factor: 2.0) |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Balanced task allocation in the on-demand computing based transaction processing system
using social spider optimization, DOI: 10.1002/cpe.4214 |
Concurrency and Computation: Practice
and Experience, Wiley |
ACM Guide to Computing Literature (ACM)
COMPENDEX (Elsevier)
CompuMath Citation Index (Clarivate Analytics)
CompuScience Database (FIZ Karlsruhe)
Computer Abstracts (Emerald)
Computer Science Index (EBSCO Publishing)
Current Contents: Engineering, Computing & Technology (Clarivate Analytics)
INSPEC (IET)
Journal Citation Reports/Science Edition (Clarivate Analytics)
Science Citation Index Expanded (Clarivate Analytics)
SCOPUS (Elsevier)
The DBLP Computer Science Bibliography (University of Trier)
Web of Science (Clarivate Analytics)
Impact Factor: 2.0) |
2018 |
Dharmendra Prasad Mahato and Ravi Shankar Singh |
Maximizing availability for task scheduling in on-demand computing based transaction
processing system using ant colony optimization, DOI:10.1002/cpe.4405 |
Concurrency and Computation: Practice and Experience, Wiley |
ACM Guide to Computing Literature (ACM)
COMPENDEX (Elsevier)
CompuMath Citation Index (Clarivate Analytics)
CompuScience Database (FIZ Karlsruhe)
Computer Abstracts (Emerald)
Computer Science Index (EBSCO Publishing)
Current Contents: Engineering, Computing & Technology (Clarivate Analytics)
INSPEC (IET)
Journal Citation Reports/Science Edition (Clarivate Analytics)
Science Citation Index Expanded (Clarivate Analytics)
SCOPUS (Elsevier)
The DBLP Computer Science Bibliography (University of Trier)
Web of Science (Clarivate Analytics)
(Impact Factor: 2.0) |
2019 |
Dharmendra Prasad Mahato et al. |
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load |
Cluster Computing, Springer |
ACM Digital Library
Baidu
CLOCKSS
CNKI
CNPIEC
Current Contents/Engineering, Computing and Technology
DBLP
Dimensions
EBSCO Academic Search
EBSCO Applied Science & Technology Source
EBSCO Computer Science Index
EBSCO Computers & Applied Sciences Complete
EBSCO Discovery Service
EBSCO MasterFILE
EBSCO STM Source
EBSCO Science & Technology Collection
EI Compendex
Google Scholar
INSPEC
Japanese Science and Technology Agency (JST)
Journal Citation Reports/Science Edition
Naver
Norwegian Register for Scientific Journals and Series
OCLC WorldCat Discovery Service
Portico
ProQuest Advanced Technologies & Aerospace Database
ProQuest-ExLibris Summon
SCImago
SCOPUS
Science Citation Index Expanded (SCIE)
TD Net Discovery Service
UGC-CARE List (India)
Wanfang
(Published on 23rd November 2019) (Impact Factor: 4.4) |
2021 |
Dharmendra Prasad Mahato and Van Huy Pham |
Reliability Analysis in Grid System Considering Load, https://doi.org/10.1007/s10586-021-03241-3, Volume:24, Issue:2. |
Cluster Computing, Springer |
ACM Digital Library
Baidu
CLOCKSS
CNKI
CNPIEC
Current Contents/Engineering, Computing and Technology
DBLP
Dimensions
EBSCO Academic Search
EBSCO Applied Science & Technology Source
EBSCO Computer Science Index
EBSCO Computers & Applied Sciences Complete
EBSCO Discovery Service
EBSCO MasterFILE
EBSCO STM Source
EBSCO Science & Technology Collection
EI Compendex
Google Scholar
INSPEC
Japanese Science and Technology Agency (JST)
Journal Citation Reports/Science Edition
Naver
Norwegian Register for Scientific Journals and Series
OCLC WorldCat Discovery Service
Portico
ProQuest Advanced Technologies & Aerospace Database
ProQuest-ExLibris Summon
SCImago
SCOPUS
Science Citation Index Expanded (SCIE)
TD Net Discovery Service
UGC-CARE List (India)
Wanfang
(Published on 19th May 2021) (Impact Factor: 4.4) |
2022 |
Radha Rani, Mayak Kumar Singh and Dharmendra Prasad Mahato |
Game Theory based Consensus Learning in Unidirectional Rings |
Turkish Online Journal of Qualitative Inquiry (TOJQI)
e-ISSN 1309-6591 |
Scopus |
2022 |
Radha Rani and Dharmendra Prasad Mahato |
A randomized algorithm for the wait-free consensus problem, Journal of
Supercomputing, Springer, SCI, Impact Factor: 2.557, Volume:
86, ISSN: 1573-0484, Published on 7th September 2022, DOI
https://doi.org/10.1007/s11227-022-04774-z.
|
Journal of Supercomputing, Springer |
Impact Factor: 2.557, Quartile: Q2, SJR (SCImago Journal Rank): 0.684, Indexing: SCIE/SSCI |
2022 |
Radha Rani and Dharmendra Prasad Mahato |
Survey on Wait Free
Consensus Protocol in Distributed Systems, International Journal of
Communication Networks and Distributed Systems,Inderscience Publishers,
ESCI, Scopus, ISSN: 1754-3924, Published, 2022.
DOI: 10.1504/IJCNDS.2023.10049439 |
International Journal of
Communication Networks and Distributed Systems,Inderscience Publishers |
ESCI, Scopus, SCImago Journal Rank (SJR): 0.287, Quartile: Q3, Impact Factor: 1.513 |
2024 |
Aman Verma, Sanat Thakur, Ankush Kumar, Dharmendra Prasad Mahato |
Routing Algorithm for Sparse Unstructured P2P
Networks using Honey Bee Behaviour |
International Journal of Communication Systems, Wiley. |
2023 CiteScore (Scopus): 5.9, 2023 Journal Impact Factor (Clarivate): 1.7, 2023 Journal Citation Indicator (Clarivate): 0.48. Indexing: SCIE, SCOPUS, Web opf Science. |
2021 |
Irphan Ali, Divakar Yadav |
Question Reformulation based Question Answering Environment Model, Vol. 13, 59–67. DOI: https://doi.org/10.1007/s41870-019-00332-8 |
International Journal of Information Technology, Springer ISSN: 2511-2104(Print) |
Scopus |
2019 |
JKPS Yadav, A. Yadav, D. Yadav, V. Yadav |
Optimization of Hopfield networks for storage and recall: A decade Review. DOI:10.1504/IJAIP.2019.10026855 |
International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 |
Scopus |
2019 |
Anuja Arora, Riyu Bana, Habib Shahand Divakar Yadav |
Artificial Bee Colony Based Influence Maximization Approach for Social Coding Portal GitHub, Vol. 10, Issue 2, Article No. 4. |
International Journal of Swarm Intelligence Research (IJSIR), IGI Global, ISSN: 1947-9263 |
Web of Science (ESCI), Scopus |
2019 |
Irphan Ali, Divakar Yadav, and A.K. Sharma |
Question Answering System for Semantic Web: A Review, DOI: 10.1504/IJAIP.2018.10042066 |
International Journal of Advanced Intelligence Paradigms, InderScience Publication, ISSN print: 1755-0386, ISSN online: 1755-0394 |
Scopus |
2019 |
Irphan Ali, Divakar Yadav, and A K Sharma |
SWFQA Semantic Web based Framework for Question Answering, Vol. 9, Issue 1, article 6, pp. 88-106. |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science (ESCI) |
2019 |
A. Yadav, D. Yadav |
Wavelet Tree based Dual Indexing Technique for Geographical Search, Vol 16, No. 6, pp. 624-632. |
International Arab Journal of Information Technology, ISSN: 1683-3198 (print), ISSN: 2309-4524 |
Web of Science (SCI), Scopus |
2018 |
K. Vimal Kumar, Divakar Yadav |
Word Sense Based Hindi-Tamil Statistical Machine Translation, Vol 14(1), article No. 2, Pp. 17-27 |
International Journal of Intelligent Information Technologies, Idea Group publishing, USA, ISSN: 1548-3657|EISSN: 1548-3665 |
Web of Science (ESCI), Scopus |
2018 |
K. Vimal Kumar and Divakar Yadav |
Word Sense Based Approach for Hindi to Tamil Machine Translation Using English as Pivot Language, Vol. 11, Issue 3-4. |
International Journal of Advanced Intelligence Paradigms, InderScience, ISSN print: 1755-0386, ISSN online: 1755-0394. |
Scopus |
2017 |
Mukta Goyal, Divakar Yadav, and Alka Tripathi |
An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making, Vol 13, No. 1, pp. 57-67. |
Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science (ESCI), Scopus |
2017 |
Madhulika, Bansal Abhay, Yadav Divakar |
A proposed quantitative approach to classify brain MRI |
International Journal of System Assurance Engineering and Management, ISSN: 0975-6809, Springer, Vol. 7, PP. 1-8
|
Web of Science (ESCI), Scopus |
2016 |
Mukta Goyal, Divakar Yadav, and Alka Tripathi |
Intuitionistic Group Decision Making to Identify the Status of Student’s Knowledge Acquisition in E-learning Systems, Vol 5, Issue 3, pp. 14-29 |
International Journal of Fuzzy System Applications (IJFSA), IGI Global, ISSN: 2156-177X |
Scopus |
2016 |
Mukta Goyal, Divakar Yadav and Alka Tripathi |
Intuitionistic fuzzy genetic weighted averaging operator and its application for multiple attribute decision making in E-learning, vol 9, Issue 1, pp. 1-15. |
Indian Journal of Science and Technology , ISSN: 0974-6846 (print), |
Web of Science, Scopus |
2016 |
A. Yadav, D. Yadav, R. Prasad |
Efficient Textual Web Retrieval using Wavelet Tree, DOI: 10.4018/IJIRR, Vol. 6, Issue 4, article 3, pp. 16-29 |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science (ESCI) |
2015 |
A Yadav, D. Yadav |
Wavelet Tree based Hybrid Geo-Textual Indexing Technique for Geographical Search, pp. 1-7 |
Indian Journal of Science and Technology, Vol. 8(33), ISSN: 0974-6846 (print) |
Web of Science, Scopus |
2015 |
Madhulika, Bansal Abhay, Yadav Divakar, Gupta Priya |
A Proposed Stratification Approach for MRI images, Vol. 8(18), pp. 1-10 |
Indian Journal of Science and Technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) |
Web of Science, Scopus |
2015 |
Madhulika Bhatia, Abhay Bansal, Divakar Yadav, and Priya Gupta |
Proposed Algorithm to Blotch Grey Matter from Tumored and Non Tumored Brain Images", Vol. 8(17),pp. 1-10. |
Indian journal of Science and technology, ISSN: 0974-6846 (print) ISSN: 0974-5645 (Online) |
Web of Science, Scopus |
2016 |
Mukta Goyal, Divakar Yadav and Alka Tripathi |
Aggregating evaluation using dynamic weighted intuitionistic fuzzy approach for concept sequencing in an E-learning system, Vol.7, No.1, pp.44 – 65. |
International Journal of Mathematical Modelling and Numerical Optimisation, Inderscience Publisher, Switzerland, ISSN: 2040-3607(print), ISSN: 2040-3615(online) |
Scopus |
2015 |
Madhulika; Bansal, Abhay; Yadav, Divakar; and Madhurima |
Survey and Comparative Study on Statistical Tools for Medical Images, Volume 21, Number 1, January 2015, pp. 74-77(4). |
Advanced Science Letters, USA, ISSN: 1936-6612 (Print): EISSN: 1936-7317 (Online) |
Scopus |
2013 |
Sonia sanchez cuadrado, Vicente. Palacios, Divakar yadav, Christos dimou and Jorge Morato |
Evaluation of Semantic Retreival Systems on The Semantic Web, Vol 31, Issue 4, pp. 638-656 |
Library Hi Tech, Emerald, ISSN: 0737-8831, |
Web of Science (SCI), Scopus |
2013 |
Pooja Gupta, Sandeep Kr Singh, Divakar Yadav and A. K. Sharma |
An Improved Approach to Rank Web Document, Vol 9, No. 2, pp. 217-236. |
Journal of Information Processing System, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science (ESCI), Scopus |
2013 |
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato |
Optical Character Recognition for Hindi Language Using a Neural-network Approach, Vol. 9, No. 1, pp. 117~140 |
Journal of Information Processing Systems, ISSN: 1976-913X(Print), ISSN: 2092-805X(Online) |
Web of Science (ESCI), Scopus |
2012 |
Divakar Yadav, AK Sharma, Sonia Sanchez-Cuadrado, Jorge Morato |
An Approach to Design Incremental Parallel WebCrawler, Vol. 43 No.1, pp. 8-29, |
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645 |
Scopus |
2012 |
Mukta Goyal, Divakar Yadav and Alka Choubey |
E-learning: Current State of Art and Future Prospects, Volume 9, Issue 3, No. 2, pp. 490-499, |
International Journal of Computer Science Issues, Softwarefirst ltd, ISSN 1694-0814 |
DBLP |
2011 |
Pooja Gupta, A. K. Sharma and Divakar Yadav |
“A Novel Technique for Back-link Extraction and Relevance Evaluation, Vol 3, No 3, pp. 227- 238, |
International Journal of Computer Science & Information Technology (IJCSIT), Academy and Industry Research Collaboration Center, ISSN No.0975-4660 (online), |
Indian Citation Index |
2009 |
Divakar Yadav, A.K. Sharma and J.P. Gupta |
“Topical Web Crawling Using Weighted Anchor Text and Web Page Change Detection Techniques, Issue 2, Vo; 6, pp. 263-275 |
WSEAS Transaction on Information Science and Applications, Greece, ISSN:1790-0832, |
SCOPUS |
2008 |
Divakar Yadav, A.K. Sharma and J.P. Gupta |
Parallel Crawler Architecture and Web Page Change Detection Techniques, Issue 7, Vol 7, Pp. 929-941 |
WSEAS Transaction on Computers, ISSN: 1109-2750 |
SCOPUS |
2014 |
A. Yadav, D. Yadav |
A Review on Spatial Access Methods, pp. 13-19 |
International Journal of Software and Web Sciences, 8(1), ISSN: 2279-0063 (Print), 2279-0071 (Online) |
- |
2010 |
Vishwaratana Nigam, Divakar Yadav and Manish K. Thakur |
A Novel Approach for Hand Analysis Using Image Processing Techniques, Vol 8, No.2, pp. 320-323 |
International Journal of Computer Science and Information Security, ISSN 1947-5500 |
- |
2020 |
Prem Sagar Sharma, Divakar Yadav |
A Systematic Review on Page Ranking Algorithms, Vol. 12(2), pp. 329-337. https://doi.org/10.1007/s41870-020-00439-3 |
International Journal of Information Technology, Springer ISSN: 2511-2104 |
Scopus |
2020 |
Adarsh Kumar, Saurabh Jain, Divakar Yadav |
A Novel Simulation Annealing Enabled Ranking and Scaling Statistical Simulation Constrained Optimization Algorithm for Internet-of-things (IoTs), Vol. 9(4), pp. 675-693. https://doi.org/10.1108/SASBE-06-2019-0073 |
Smart and Sustainable Built Environment, Emerald Publishing, ISSN: 2046-6099 |
Web of Science (ESCI), Scopus |
2020 |
Prem Sagar Sharma, Divakar Yadav |
Incremental Refinement of Page Ranking of Web Pages, Vol. 10(3), pp. 57-73. DOI: 10.4018/IJIRR.2020070104 |
International Journal of Information Retrieval Research (IJIRR), IGI Global, ISSN: 2155-6377 |
Web of Science (ESCI) |
2020 |
A. Yadav, D. Yadav, A.Jain |
An Improvised Feature-Based Method for Sentimental Analysis of Product Reviews, , Vol. 8, pp. 1-8, 22 July 2020. http://dx.doi.org/10.4108/eai.13-7-2018.165670 |
EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 |
Web of Science (ESCI), Scopus |
2020 |
A. Yadav, JKPS Yadav, D. Yadav |
Spatial Ambiguities Optimization in GIR , Vol. 7, pp. 1-8, 14 May 2020, DOI: http://dx.doi.org/10.4108/eai.13-7-2018.164556 |
EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407 |
Web of Science (ESCI), Scopus |
2020 |
Arti Jain, Divakar Yadav, Anuja Arora |
Particle Swarm Optimization for Punjabi Text Summarization ,Vol. 12(3), Article 1, pp. 1-17. DOI: 10.4018/IJORIS.20210701.oa1 |
International Journal of Operations Research and Information Systems (IJORIS), IGI Global, |
Scopus |
2020 |
Yadav, D., Akanksha, Yadav, A.K. |
A novel convolutional neural network based model for recognition and classification of apple leaf diseases, Vol. 37(6), pp. 1093-1101. https://doi.org/10.18280/ts.370622 |
Traitement du Signal, |
Web of Science (SCI), Scopus |
2021 |
Arti Jain, Divakar Yadav, Anuja Arora |
Particle Swarm Optimization for Punjabi Text Summarization, Volume 12, Issue 3, Article 1. DOI: 10.4018/IJORIS.20210701.oa1 |
International Journal of Operations Research and Information Systems (IJORIS), IGI Global, ISSN: 1947-9328. |
DBLP, ACM digital library |
2021 |
Arti Jain, Anuja Arora, Divakar Yadav, Jorge Morato, Amanpreet Kaur |
Novel Text Summarization Technique for Punjabi Language Using Neural Networks , Vol 18(6), Nov. 2021, pp. 807-818. https://doi.org/10.34028/iajit/18/6/8 |
International Arab Journal of Information Technology |
Web of Science (SCI), Scopus |
2021 |
Divakar Yadav, Arun Kumar Karn, Arti Dhiman, Sakshi Sharma, Anurag Giddalur, Muskan, and Arun Kumar Yadav |
Microaneurysm Detection using Color Locus Detection Method Vol. 176, 109084,https://doi.org/10.1016/j.measurement.2021.109084 |
Measurement, Elsevier |
Web of Science (SCI), Scopus |
2021 |
Bharti, S., Yadav, A.K., Kumar, M. and Yadav, D. |
Cyberbullying detection from tweets using deep learning, https://doi.org/10.1108/K-01-2021-0061, ISSN: 0368-492X |
Kybernetes, Vol. ahead-of-print No. ahead-of-print. |
Web of Science (SCI), Scopus |
2021 |
Verma, A., Gupta, V.K., Goel, S., Akbar, Yadav, A.K., Yadav, D. |
Modeling fingerprint presentation attack detection through Transient Liveness Factor-A person specific approach. Vol. 38, No. 2, pp. 299-307. https://doi.org/10.18280/ts.380206 |
Traitement du Signal |
Web of Science (SCI), Scopus |
2021 |
Tewari, K., Shrivastava, A., Yadav, A.K. Yadav, D. |
Efficient transitive operations using binary indexed trees, vol. 13, 1155–1163. https://doi.org/10.1007/s41870-021-00685-z |
Int. j. inf. tecnol., Springer |
Scopus |
2021 |
Kumar, D., Yadav, D.S. & Yadav, D. |
A comprehensive analysis of wavelet tree based indexing schemes in GIR systems. https://doi.org/10.1007/s41870-021-00683-1 |
International Journal of Information Technology, Springer. |
Scopus |
2021 |
Gupta, A., Yadav, D. |
A novel approach to perform context‐based automatic spoken document retrieval of political speeches based on wavelet tree indexing, 80, 22209–22229. (H-index: 70, Impact Factor = 2.75) https://doi.org/10.1007/s11042-021-10800-8 |
Multimedia Tools Applications |
Web of Science (SCI), SCOPUS |
2021 |
Rishabh Katna, Kashish Kalsi, Srajika Gupta, Divakar Yadav, Arun Kr Yadav |
Machine Learning based Approach for Age and Gender prediction from Tweets (revised version submitted ) |
Multimedia Tools and Applications |
Web of Science (SCI), SCOPUS |
2021 |
Shobhit Tyagi, Divakar Yadav |
A Detailed Analysis of Image and Video Forgery Detection Techniques, ISSN: 0178-2789 DOI: 10.1007/s00371-021-02347-4 |
The Visual Computer, Springer |
Web of Science (SCI), SCOPUS |
2022 |
Prem Sagar Sharma, and Divakar Yadav |
A Novel Architecture for Search Engine using Domain based Web Log Data |
International Arab Journal of Information Technology |
Web of Science (SCI), SCOPUS |
2022 |
Divakar Yadav, Sonam Gupta, Arun Kumar Yadav, Neha Katiyar |
A Scalable approach for index compression using wavelet tree and LZW |
International Journal of Information Technology (Springer Singapore) |
Scopus |
2022 |
Amit Singh, Mayank Dhiman, Vineet, Rishabh Kaundal, Ankit Verma, Arun Kumar Yadav, Divakar Yadav |
Extractive Text Summarization using Deep Learning Approach |
International Journal of Information Technology, (Springer Singapore) |
Scopus |
2021 |
Dhingra K., Garg A., Yadav D., Pujari J. |
Impediments to effective utilization of assistive technology for learning disabled, Vol. 33(4), pp. 283 - 296, 2021. DOI: 10.3233/TAD-210342 |
Technology and Disability, ISSN: 1055-4181 |
Scopus |
2021 |
Shashank Srivastav, PK Singh and Divakar Yadav |
A Method to Improve Exact Matching Results in Compressed Text Using Parallel Wavelet Tree, Volume 22, Issues 4, pp. 387–400, Nov 24, 2021 |
Scalable Computing: Practice and Experience, ISSN 1895-1767 |
Web of Science (ESCI), SCOPUS |
2022 |
Arti Jain, Divakar Yadav, Devendra K. Tayal, Anuja Arora |
Named Entity Recognition for Hindi Language Using Context Pattern Based Maximum Entropy |
Computer Science Journal AGH University of Science and Technology, Krakow Poland, ISSN: 15082806 |
Web of Science (ESCI), SCOPUS |
2021 |
Tyagi, S., Yadav, D |
A Comprehensive Review on Image Synthesis with Adversarial Networks: Theory, Literature, and Applications, https://doi.org/10.1007/s11831-021-09672-w |
Archives of Computational Methods in Engineering, ISSN: 11343060 |
Web of Science (SCI), SCOPUS |
2020 |
Shashank Srivastav, P. K. Singh, Divakar Yadav |
An approach for fast compressed text matching and to avoid false matching using WBTC and wavelet tree |
EAI Endorsed Transactions on Scalable Information Systems, ISSN: 2032-9407, Vol. 8, pp. 1-10, Oct 2020. http://dx.doi.org/10.4108/eai.23-10-2020.166717 |
Web of Science (ESCI), SCOPUS |
2019 |
Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava |
Extraction of reordering rules for statistical machine translation. & Vol. 36, no. 5 |
Journal of Intelligent & Fuzzy Systems |
SCI |
2019 |
Jyoti Srivastava, Sudip Sanyal, and Ashish Kumar Srivastava |
An Automatic and A Machine-Assisted Method to Clean Bilingual Corpus & Volume 19 Issue 1 |
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
SCI |
2019 |
Jyoti Srivastava, Tanveer J. Siddiqui, Prof. U. S. Tiwary, Ashish Kumar Srivastava |
MFCC Based Speech Retrieval & Vol 8, no. 9 |
International Journal of Innovative Technology and Exploring Engineering |
SCOPUS |
2024 |
Jyoti Srivastava, Ashish Kumar Srivastava, B. Muthu Kumar, S.P. Anandaraj |
Text summarization using modified generative adversarial network & vol. 46, no. 3 |
Journal of Intelligent & Fuzzy Systems |
SCI |
2022 |
Mohammad Khalid Pandit, RN Mir, MA Chishti |
Learning Sparse Neural Networks Using Non-Convex Regularization 6(2) |
IEEE Transactions on Emerging Topics in Computational Intelligence |
SCIE |
2022 |
Mohammad Khalid Pandit, Mahroosh Banday |
Variance-Guided Structured Sparsity in Deep Neural Networks |
IEEE Transactions on Artificial Intelligence |
SCIE |
2023 |
O Shafi, Mohammad Khalid Pandit, A Saini, Gayathri A, R Sen |
Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit |
ACM Journal on Emerging Technologies in Computing Systems |
SCIE |
2020 |
SA Banday, Mohammad Khalid Pandit, A R Khan |
Achieving a reversible lower dimensionality transformation for picture archiving and communication system in healthcare |
IET Electronics Letters |
SCIE |
2021 |
SA Banday, Mohammad Khalid Pandit |
Texture maps and chaotic maps framework for secure medical image transmission |
Multimedia Tools and Applications |
SCIE |
2020 |
Mohammad Khalid Pandit, SA Banday, RN Mir, MA Chishti |
Automatic detection of COVID-19 from chest radiographs using deep learning |
Radiography (Elsevier) |
SCI |
2021 |
Shubham Bharti, Arun Kumar Yadav, Mohit Kumar and Divakar Yadav |
Cyberbullying detection from tweets using deep learning", Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/K-01-2021-0061, ISSN: 0368-492X, (Impact Factor = 1.75) |
Kybernetes |
SCI |
2023 |
Chinmay Gupta, Mohit Kumar, Arun Kumar Yadav, and Divakar Yadav |
FERNET: An Integrated Hybrid DCNN Model for Driver Stress Monitoring via Facial Expression.Vol-37, No.3 |
International Journal of Pattern Recognition and Artificial Intelligence |
SCI |
2023 |
Akash Verma, Arun Kumar Yadav, Mohit Kumar , Divakar Yadav |
Automatic image caption generation using deep learning. Vol-83 |
Multimedia Tools and Applications |
SCI |
2023 |
G Khartheesvar, Mohit Kumar, Arun Kumar Yadav , Divakar Yadav |
Automatic Indian sign language recognition using MediaPipe holistic and LSTM network |
Multimedia Tools and Applications |
SCI |
2023 |
Arun Kumar Yadav, Mohit Kumar, Abhishek Kumar, Shivani, Kusum, Divakar Yadav |
Hate speech recognition in multilingual text: hinglish documents |
International Journal of Information Technology |
Scopus |
2023 |
Arun Kumar Yadav, Suraj Kumar, Dipesh Kumar, Lalit Kumar, Kapil Kumar, Sandeep Kumar Maurya, Mohit Kumar, and Divakar Yadav |
Fake News Detection Using Hybrid Deep Learning Method. Vol-4 No.6 |
SN Computer Science |
Scopus |
2023 |
Archit Dhiman, Mohit Kumar,Arun Kumar Yadav, Divakar Yadav |
Pothole Detection and Localization from Images using Deep Learning |
International Journal of Information and Decision Sciences |
Scopus |
2024 |
Sanjeewani, Arun Kumar Yadav, Mohd Akbar, Mohit Kumar, Divakar Yadav |
Retinal blood vessel segmentation using a deep learning method based on modified U-NET model |
Multimedia Tools and Applications |
SCI |
2018 |
Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
IGI Global |
International Journal of Web Services Research |
SCIE, SCOPUS |
2017 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2017 |
Prashant Kumar, Naveen Chauhan and Narottam Chand |
SCRSC |
International Journal of Grid and Distributed Computing |
SCOPUS |
2016 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi and Naveen Chauhan |
IJNGC |
International Journal of Next Generation Computing |
DBLP |
2015 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi |
Springer |
Wireless Networks |
SCI |
2023 |
Himanshu Verma, Naveen Chauhan, Narottam Chand and Lalit Kumar Awasthi |
Modeling Buffer-Overflow in 6LoWPAN- Based Resource-Constraint IoT-Healthcare Network, 2023. |
Springer Journal of Wireless Personal Communications, |
SCI |
2023 |
Nishant Sharma, Naveen Chauhan, Narottam Chand and Lalit Kumar Awasthi, |
Secure authentication and session key management scheme for Internet of Vehicles,” |
Wiley Transaction on Emerging Telecommunications Technologies |
SCI |
2022 |
Himanshu Verma, Naveen Chauhan, Narottam Chand and Lalit Kumar Awasthi |
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network, , Vol. 181, pp. 236-256, 2022 |
Elsevier Computer Communication |
SCI |
2023 |
Himanshu Verma, Naveen Chauhan, and Lalit Kumar Awasthi |
A Comprehensive review of 'Internet of Healthcare Things': Networking Aspects, technologies,services, applications, challenges, and security concerns. |
Elsevier Computer Science Review |
SCI |
2023 |
Deepa Rani, Rajeev Kumar, Naveen Chauhan |
A secure framework for IoT-based healthcare using blockchain and IPFS |
Wiley Security and Privacy |
SCI |
2023 |
Tanuj Wala, Rajeev Kumar, Naveen Chauhan, Ajay K. Sharma |
DDC-OMDC: Deadline-based data collection using optimal mobile data collectors in Internet of Things |
Wiley International Journal of Communication Systems |
SCI |
2023 |
Deepa Rani; Tanuj Wala; Rajeev Kumar; Naveen Chauhan |
Fuzzy Logic-Based Delay Efficient Data Collection Technique for IoT Environment |
International Journal of Communication Networks and Distributed Systems |
SCOPUS, WoS |
2019 |
Sanjay Kumar Dhurandher, Nitin Gupta, and Petros Nicopolitdis |
Contract Theory based Medium Access Contention
Resolution in TDMA Cognitive Radio Networks
Digital Object Identifier: Vol. 68, Issue 8, 8026-8035 |
IEEE Transactions on Vehicular Technology |
SCI (I.F. 6.1) (SJR 2023: Q1) |
2020 |
Nitin Gupta, Sanjay K Dhurandher, Aarushi Sehgal |
A Contract Theory Approach Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks |
IEEE Systems Journal |
CI (I.F. 4) (SJR 2023: Q1) |
2020 |
Anshu Thakur, Ashok Kumar and Nitin Gupta, Puspita Chatterjee |
Secrecy Analysis of Reconfigurable Underlay
Cognitive Radio Networks with SWIPT and
Imperfect CSI , Early Access, 10.1109/TNSE.2020.3040531 |
IEEE Transactions on Network Science and Engineering |
SCI (I.F. 6.7) (SJR 2023: Q1) |
2021 |
Deepak Kumar Sharma, Kartik Krishna Bhardwaj, Siddhant Banyal, Riyanshi
Gupta, Nitin Gupta, and Lewis Nkenyereye |
An Opportunistic Approach for Cloud Service based IoT Routing Framework Administering Data, Transaction, and Identity Security , Early Access |
IEEE Internet of Things Journal |
SCI (I. F. 8.2) (SJR 2023: Q1) |
2021 |
Nitin Gupta, Jagdeep Singh, Sanjay K Dhurandher, Zhu Han |
Contract Theory based Incentive Design Mechanism
for Opportunistic IoT Networks
|
IEEE Internet of Things Journal |
SCI (I. F. 8.2) (SJR 2023: Q1) |
2020 |
Riya, Nitin Gupta, Sanjay K. Dhurandher |
Efficient Caching Method in Fog Computing for
Internet of Everything |
Peer to Peer Networking and Applications, Springer |
SCI (IF 3.3) (SJR 2023: Q2) |
2020 |
Anshu Thakur, Ashok Kumar, Nitin Gupta, |
Secrecy Analysis of MIMO Underlay Cognitive Radio Networks with Energy Harvesting |
Transactions on Emerging Telecommunications Technologies, Wiley |
SCI (I.F. 2.5) (SJR 2023: Q1) |
2018 |
Nitin Gupta, Sanjay K. Dhurandher and Isaac Woungang |
Sub-Carriers Assignment Scheme for Multiple Secondary Users in OFDMA Based IEEE 802.22 WRAN: A Game Theoretic Approach
https://doi.org/10.1002/ett.3502 |
Transactions on Emerging Telecommunications Technologies, Wiley |
SCI (I.F. 2.5) (SJR 2023: Q1) |
2021 |
Sejal Gupta, Ritu Garg, Nitin Gupta, Waleed S Alumany, Uttam Ghosh and Pradip K. Sharma |
Energy-ecient Dynamic Homomorphic Security Scheme for Fog Computing in IoT Networks, 58(102768) |
Journal of Information Security and Applications, Elsevier |
SCI (I.F. 3.8) (SJR 2023: Q1) |
2019 |
Anshu Thakur, Ashok Kumar, Nitin Gupta, Ajay Singh |
Secrecy Outage Performance Analysis of MIMO Underlay
Cognitive Radio Networks with Delayed CSI and Transmitter
Antenna Selection |
International Journal of Communication Systems, Wiley |
SCI (I.F. 1.7) (SJR 2023: Q2) |
2021 |
Vidyotma Thakur, Gaurav Indra, Nitin Gupta, Pushpita Chatterjee, Omar
Said, Amr Tolba |
Cryptographically Secure Privacy-preserving Authenticated Key
Agreement Protocol for an IoT Network: A Step Towards Critical Infrastructure Protection |
Peer to Peer Networking and Applications, Springer |
SCI (IF 3.3) (SJR 2023: Q2) |
2019 |
Nitin Gupta, Sanjay K. Dhurandher |
Cross-layer Perspective for Channel Assignment in Cognitive
Radio Networks: A Survey
e4261. https://doi.org/10.1002/dac.4261 |
International Journal of Communication Systems, Wiley |
SCI (I.F. 1.7) (SJR 2023: Q2) |
2020 |
Shushant Sharma, Nitin Gupta |
Federated Learning Based Caching in Fog Computing for Future Smart Cities |
Internet Technology Letters, Wiley |
E-SCI, Web of Science, (I.F. 0.9) |
2019 |
Nitin Gupta, Sanjay K. Dhurandher,
Isaac Woungang and Joel j.P.C. Rodrigues |
On the Target Channel Sequence
Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area
Networks
Vol:8, No.:4 |
International Journal of Space-Based and Situated Computing, Inderscience |
E-SCI, Web of Science, DBLP |
2021 |
Varan Singh Rohila, Nitin Gupta, Amit Kaul, Deepak Kumar Sharma |
Deep Learning Assisted Covid-19 Detection using full CT-scans Volume 14, June 2021, 100377
|
Internet of Things, Elsevier |
SCI (I.F. 6) (SJR 2023: Q1) |
2023 |
M. Sreenu, Nitin Gupta, Chandrashekar Jatoth and Deepak Gupta |
Reinforcement Learning and Blockchain-based Intelligent and Secure Vaccine Recommender System |
Expert Systems, Wiley |
SCI (I.F. 3) (SJR 2023: Q2) |
2022 |
Kartik Saxena, Nitin Gupta, Jahnvi Gupta, Deepak K. Sharma, Kapal Dev |
Trajectory Optimization for the UAV assisted Data Collection in Wireless Sensor Networks |
Wireless Networks,
Springer |
SCI (I.F. 2.1) (SJR 2023: Q2) |
2022 |
Robin Singh Rana and Nitin Gupta |
Efficient Task Scheduling in Cloud Environment |
International Journal of Communication Systems, Wiley |
SCI (I.F. 1.7) (SJR 2023: Q2) |
2022 |
Ritwik Duggal, Nitin Gupta, Aarya Pandyaa, Poorvansh Mahajan, Kanak Sharma, Tarush kaundal, and Pragya Angra |
a, “Building Structural Analysis based Internet of Things Network Assisted
Earthquake Detection" |
Internet of Things, Elsevier with Reproducibility Badge certified by
CodeOcean |
SCI (I.F. 6) (SJR 2023: Q1) |
2022 |
Yash Prakash Gupta, Mukul and Nitin Gupta |
Deep Learning Model based Multimedia Retrieval
and its Optimization in Augmented Reality Applications |
Multimedia Tools and Applications,
Springer |
SCI (I.F. 3) (SJR 2023: Q1) |
2023 |
Mehul Sharma, Shrid Pant, Priety, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava |
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks |
Mobile Networks and Applications, Springer |
SCI (I.F. 2.3) (SJR 2023: Q2) |
2023 |
Archit Jain, Nitin Gupta, M. Sreenu, |
Blockchain Based Smart Contract for Cooperative Spectrum Sensing in Cognitive Radio Networks for Sustainable Beyond 5G Wireless Communicatio |
Green Technologies and Sustainability, Elsevier |
Scopus |
2022 |
M Sreenu, Nitin Gupta, Chandrashekar Jatoth, Aldosary Saad, Abdullah Alharbi and Lewis
Nkenyereye |
Blockchain based Secure and Reliable Cyber Physical Ecosystem for Vaccine Supply Chain |
Computer Communications, Elsevier |
SCI (I.F. 4.5) (SJR 2023: Q1) |
2024 |
Moulik Bhardwaj, Jagdeep Singh, Nitin Gupta, Kuldeep Jadon and Sanjay K. Dhurandher |
A Novel Federated Learning Approach for Routing Optimization in Opportunistic IoT Networks |
International Journal of Sensor Networks |
SCI (I.F. 1.1) (SJR 2023: Q3) |
2024 |
Phani Krishna Bulasara, Somya Ranjan Sahoo, Nitin Gupta, Zhu Han, Neeraj Kumar |
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey |
ACM Computing Surveys |
SCI (I.F. 23.8) (SJR 2023: Q1) |
2017 |
Nilanshi Chauhan and Pardeep Singh |
Identifying the Opinion Orientation of Online Product Reviews at Feature Level: A Pruning Approach |
International Journal of Information System Modeling and Design |
Scopus |
2015 |
Pardeep Singh and Kamlesh Dutta |
Automation and Validation of Annotation for Hindi Anaphora Resolution |
International Journal of Advanced Computer Science and Applications (IJACSA) |
Scopus |
2019 |
Namrata Kumari, Ankit Guleria, Radhika Sood and Pardeep Singh |
A Supervised Approach for Keyphrase Extraction using SVM |
International Journal of Control and Automation |
Scopus |
2020 |
Namrata Kumari, Pardeep Singh. |
Automated Hindi Text Summarization Using TF-IDF and Textrank Algorithm, 7(17): pp 2547-2555, 2020;, doi: 10.31838/jcr.07.17.315 |
Journal of Critical Reviews |
Scopus |
2020 |
Kususm Lata, Pardeep Singh, Kamlesh Dutta |
A comprehensive review on feature set used for anaphora resolution |
Artificial Intelligence Review |
SCI |
2022 |
Kususm Lata, Pardeep Singh, Kamlesh Dutta |
Mention detection in coreference resolution: survey, Vol- 58 |
Applied Intelligence |
SCI |
2023 |
Kususm Lata, Pardeep Singh, Kamlesh Dutta |
Semi‑automatic Annotation for Mentions in Hindi Text |
SN Computers |
Scopus |
2023 |
Namrata Kumari, Pardeep Singh |
Hindi Text Summarization using Sequence to Sequence Neural Network |
The ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) |
SCI |
2019 |
Preeti Soni, Arup Kumar Pal, SK Hafizul Islam |
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system, volume 182 |
Computer Methods and Programs in Biomedicine |
SCIE |
2021 |
Preeti Soni, Arup Kumar Pal, SK Hafizul Islam, Aadarsh Singh, Priyanshu Kumar |
Provably secure and biometric-based secure access of E-Governance services using mobile devices, volume 63 |
Journal of Information Security and Applications |
SCIE |
2022 |
Preeti Soni, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam, |
Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system, volume 19 |
IEEE Transactions on Industrial Informatics |
SCIE |
2024 |
Preeti Soni, SK Hafizul Islam, Arup Kumar Pal, Nimish Mishra, Debabrata Samanta |
Blockchain-based User Authentication and Data-sharing Framework for Healthcare Industries, volume 11 |
IEEE Transactions on Network Science and Engineering |
SCIE |
2016 |
Rathee Priyanka, Singh, R . and Kumar, S . |
"Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals." Wireless Personal Communications: 89(1), 61-78 |
Wireless Personal Communication |
SCI |
2019 |
Priyanka |
Performance Analysis of IEEE 802.11p using continuous time Markov Chain, , 152, 309-315. |
Procedia Computer Science
|
SCI |
2019 |
Priyanka, Singh, R . and Kumar, S . |
Performance Analysis of IEEE 802.11 p Protocol with Retry Limit in VANETs: An Analytical study. Procedia Computer Science, 152, 195-203.
|
Procedia Computer Science |
SCI |
2017 |
Priyanka, Singh, R. and Kumar, S. |
Analytical Modelling of Back-off Process of IEEE 802.11p using Continuous Markov Chain in VANETs. |
International Journal of Computer Applications 172(9):14-20, August 2017. ISSN 0975 - 8887 |
UGC Listed |
2023 |
Rathee, P., Shirsath, M., Awasthi, L. K., & Chauhan, N. |
A Novel Deep Convolutional Neural Network based Classification of Arrhythmia, Vol. 14, No. 2, March 2023. |
International Journal of Next-Generation Computing |
Scopus |
2023 |
Ishana Atri, Lalit Awasthi, Ph.D; Dr.Teek Sharma, Ph.D; Dr. Priyanka Rathee, Ph.D |
A review of Deep Learning techniques used in agriculture,2023
|
Ecological Informatics, Elsevier |
SCI |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Energy Efficient Entropy Based Clustering in Wireless Sensor Networks |
International Journal of Grid and Distributed Computing (IJGDC) |
Scopus |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Predicting Missing Values in Wireless Sensor Network using Spatial-Temporal Correlation |
International Journal of Computer Networks and Wireless Communications (IJCNWC) |
DOAJ |
2017 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Adaptive Clustering in Wireless Sensor Networks |
International Journal of Multimedia and Ubiquitous Engineering (IJMUE) |
Scopus |
2017 |
Pushpender Kumar, Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Enhancing the Lifetime of Wireless Multimedia Sensor Network Through Image Fusion |
International Journal of Grid and Distributed Computing (IJGDC) |
Scopus |
2014 |
Jaideep Lakhotia and Rajeev Kumar |
Cluster Based Routing Protocols for Mobile Wireless Sensor Network: A Review |
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) |
Open Access |
2013 |
Sushil Sarwa, Rajeev Kumar |
Selective Forwarding Attack and Its Detection Algorithms: A Review |
International Journal of Computer and Information Engineering |
International Science Index |
2019 |
Rajeev Kumar, Naveen Chauhan, Narottam Chand |
Energy Map Generation in Wireless Sensor
Network using Grey System Theory |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) |
Scopus |
2020 |
Rajeev Kumar, Vibha Jain, Naveen Chauhan, Narottam Chand |
An Adaptive Prediction Strategy with Clustering in Wireless Sensor Network pp 575 - 587 |
International Journal of Wireless Information Networks. Volume 27, Issue 4 |
ESCI |
2023 |
Deepa Rani, Rajeev Kumar, Naveen Chauhan |
A secure framework for IoT-based healthcare using blockchain and IPFS |
Security and Privacy |
SCI |
2023 |
Tanuj Wala, Rajeev Kumar, Naveen Chauhan, Ajay K. Sharma |
DDC-OMDC: Deadline-based data collection using optimal mobile data collectors in Internet of Things |
International Journal of Communication Systems |
SCI |
2023 |
Deepa Rani, Tanuj Wala, Rajeev Kumar, Naveen Chauhan |
Fuzzy Logic-Based Delay Efficient Data Collection Technique for IoT Environment |
International Journal of Communication Networks and Distributed Systems |
SCI |
2024 |
Deepa Rani, Rajeev Kumar, Naveen Chauhan |
Study Influencing Factors of Maternal Health and the Role of Internet of Things (IoT) to Improve Maternal Care |
SN Computer Science |
Scopus |
2023 |
Anuj Rai, Ashutosh Anshul, Ashwini Jha, Prayag Jain, Ram Prakash Sharma, Somnath Dey |
An open patch generator based fingerprint
presentation attack detection using generative adversarial network |
Multimedia Tools and Applications |
SCI |
2023 |
Ashutosh Anshul, Ashwini Jha, Prayag Jain, Anuj Rai, Ram Prakash Sharma, Somnath Dey |
An Enhanced Generative Adversarial
Network Model for Fingerprint Presentation Attack Detection |
SN Computer Science |
Scopus |
2021 |
Ram Prakash Sharma and Somnath Dey |
A comparative study of local texture
descriptors for fingerprint liveness detection under real-world scenarios, 80 |
Multimedia Tools and Applications |
SCI |
2019 |
Ram Prakash Sharma and Somnath Dey |
Two-stage quality adaptive fingerprint image enhancement using Fuzzy c-means clustering based fingerprint quality analysis, 83-84 |
Image and Vision Computing |
SCI |
2018 |
Ram Prakash Sharma and Somnath Dey |
Fingerprint image quality assessment and scoring using minutiae centered local patches, 28 |
Journal of Electronic Imaging |
SCI |
2018 |
Ram Prakash Sharma and Somnath Dey |
Fingerprint liveness detection using local quality features, 35 |
The Visual Computer |
SCI |
2023 |
Sandeep Rathor, Subhas Chandra Agrawal, Robin Singh Bhadoria, Praphula Kumar Jain |
Secure and Embedded Processing Framework for Payload Scattering in Image Steganography with Low Computation Time, Vol. 130, pp. 2679–2695, 2023. |
Wireless Personal Communication (Springer) |
SCI |
2023 |
Ajay Rawat, Rama Sushil, Amit Agarwal, Afzal Sikander, Robin Singh Bhadoria |
A New Adaptive Fault Tolerant Framework in the Cloud, Vol. 69, Issue 5, pp. 2897-2909, 2023 |
IETE Journal of Research (Taylor & Francis) |
SCI |
2023 |
Kumar Debasis, Lakhan Dev Sharma, Vijay Bohat, Robin Singh Bhadoria |
An Energy‑Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks using Machine Learning, Vol. 28, pp. 853–867, 2023 |
Mobile Networks & Applications (Springer) |
SCI |
2023 |
Robin Singh Bhadoria, Yash Gupta, Ivan Perl |
Outbreak Trends of Fatality Rate into Coronavirus Disease - 2019 using Deep Learning, Vol. 15, No. 1, pp.70–83, 2023. |
International Journal of Medical Engineering and Informatics (Inder Science) |
SCOPUS |
2022 |
Naman Bhoj, Robin Singh Bhadoria, |
Time-Series based Prediction for Energy Consumption of Smart Home Data Using Hybrid Convolution-Recurrent Neural Network, Vol. 75, p.101907, 2022. |
Telematics & Informatics (Elsevier) |
SCI |
2023 |
Robin Singh Bhadoria, Naman Bhoj, "Manoj Kumar Srivastav, Rahul Kumar, Balasubramanian Raman |
A Machine Learning Framework for Security and Privacy Issues in Building Trust for Social Networking, Vol. 26, pp. 3907–3930, 2023. |
Cluster Computing (Springer) |
SCI |
2022 |
Robin Singh Bhadoria, Hatim G. Zaini, Manzer Nezami,Md. Danish Equbal, Elfatih Elmubarak Mustafa, Sherif S. Ghoneim |
"Cone Model in Resource Provisioning for Service-Oriented Architecture System: An Effective Network Management to the Internet of Things, Vol. 10, pp.61385-61397, June 2022 |
IEEE ACCESS |
SCI |
2022 |
Robin Singh Bhadoria, Sovan Samanta, Yadhunath Pathak, Piyush Kumar Shukla, Ahmad Ali Zubi, Manjit Kaur |
"Bunch graph based dimensionality reduction using auto-encoder for character recognition, Vol.81, No. 22, pp. 32093–32115, 2022. |
Multimedia Tools & Applications (Springer) |
SCI |
2021 |
Robin Singh Bhadoria, Manish Kumar Pandey, Pradeep Kundu |
"RVFR: Random Vector Forest Regression Model for Integrated & Enhanced Approach in Forest Fires Predictions, Vol. 66, p.101471, 2021. |
Ecological Informatics (Elsevier) |
SCI |
2021 |
Pradeep Singh Rawat, Robin Singh Bhadoria, Puneet Gupta and G. P. Saroha |
Performance Evaluation of an Adopted Model based on Big-Bang Big-Crunch and Artificial Neural Networks for Cloud Applications, Vol. 48, No. 04, pp. 1-13, 2021. |
Kuwait Journal of Science |
SCI |
2021 |
Law Kumar Singh, Pooja, Hitendra Garg, Munish Khanna, and Robin Singh Bhadoria |
An Enhanced Deep Image Learning Model for Glaucoma Diagnosis using Feature based Detection in Retinal Fundus, Vol. 59, No. 02, pp. 333-353, 2021. |
Medical & Biological Engineering & Computing (Springer) |
SCI |
2019 |
Robin Singh Bhadoria and Dhananjai Bajpai |
Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies using Internet of Things, Vol. 108, Issue 1, pp. 493-510, 2019. |
Wireless Personal Communication (Springer) |
SCI |
2019 |
Robin Singh Bhadoria and Narendra S Chaudhari |
Pragmatic Sensory Data Semantics with Service-Oriented Computing, Vol. 31, No. 02, pp. 22-36, 2019 |
Journal of Organisational and End User Computing (IGI Global) |
SCI |
2018 |
Robin Singh Bhadoria, Narendra S. Chaudhari, Tharinda Nishantha Vidanagama |
Analyzing the Role of Interfaces in Enterprise Service Bus: A Middleware Epitome for Service-Oriented Systems, Vol. 55, pp. 146-155, 2018 |
Computer Standards & Interface (Elsevier) |
SCI |
2018 |
Robin Singh Bhadoria, Narendra S Chaudhari, Sovan Samanta |
Uncertainty in Sensor Data Acquisition for SOA System, Vol. 30, No. 10, pp. 3177–3187, 2018 |
Neural Computing and Applications (Springer) |
SCI |
2017 |
Robin Singh Bhadoria, Narendra S Chaudhari, & Geetam Singh Tomar |
The Performance Metric for Enterprise Service Bus (ESB) in SOA System: theoretical underpinnings and empirical illustrations for information processing, Vol. 65, pp. 158-171, 2017 |
Information Systems (Elsevier) |
SCI |
2016 |
SANGEETA SHARMA, MEENU CHAWLA |
A three phase optimization method for precopy based vm live migration, vol. 5, no. 1 |
Springer Plus |
Scopus |
2017 |
NITESH BHAROT, PRIYANKA VERMA, SANGEETA SHARMA, AND VEENADHARI SURAPARAJU |
Distributed Denial-of-Service Attack Detection and Mitigation
Using Feature Selection and Intensive Care Request Processing, Volume 43, No. 2
|
Arabian Journal for Science and Engineering |
SCI and Scopus |
2023 |
Vishal Kaushal, Nishant Singh Hada, Sangeeta Sharma |
Sangeeta Sharma
Eye Disease Detection Through Image Classification Using Federated Learning |
SN Computer Science Springer |
Scopus |
2019 |
Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and
Amita Nandal |
Improving Bounds on Outage Probability in Correlated Rayleigh Fading
Environment |
Sadhana- Springer |
SCI |
2019 |
Shashi Gurung and Siddhartha Chauhan |
A Dynamic Threshold based Algorithm for Improving Security and Performance of AODV Under Black-hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2019 |
Shashi Gurung and Siddhartha Chauhan |
Performance Analysis of Black-hole Attack Mitigation protocols under Gray-hole Attacks in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar |
Analysis and Simulation of Second-Order Statistics with Modified Characteristic |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Arvind Dhaka, Siddhartha Chauhan, and Vidhyacharan Bhaskar |
Effect of Matrix Partitioning on Second Order Statistics of Fading Channels |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar and Amita Nandal |
Statistical Approach for Performance Analysis of Multipath Scattering Environment |
Wireless Personal Communications-Springer |
SCIE/ SCOPUS |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A novel Approach for Mitigating Gray Hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A Dynamic Threshold based Approach for Mitigating Black-Hole Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Shashi Gurung and Siddhartha Chauhan |
A Novel Approach for Mitigating Route Request Flooding Attack in MANET |
Wireless Networks-Springer |
SCI |
2018 |
Arvind Dhaka and Siddhartha Chauhan |
Statistical Analysis of Modified Fading Simulator in Rayleigh Fading Environment |
International Journal of Grid and Distributed Computing |
SCOPUS |
2018 |
Deepshikha and Siddhartha Chauhan |
Succinct Review on MAC Protocols for Wireless Body Area Networks |
International Journal of Grid and Distributed Computing |
SCOPUS |
2014 |
Siddhartha Chauhan and Lalit Kumar Awasthi |
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks |
International Journal of Communication Networks and Distributed Systems- InderScience |
SCOPUS |
2012 |
Siddhartha Chauhan and Lalit Kumar Awasthi |
Adaptive time synchronization for homogeneous WSNs |
International Journal of Engineering Business Management |
SCOPUS |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Sensor fusion for Distributed Detection of Passive Targets in Surveillance Wireless Sensor Network |
IEEE Sensor Journal |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
A Distributed Reinforcement Learning based Sensor Node Scheduling Algorithm for Coverage and Connectivity Maintenance in Wireless Sensor Network |
Wireless Networks |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Analytic Evaluation of Non-uniformities for Coverage Probability Computation of Randomly Deployed Wireless Sensor Network |
International Journal of Sensor Networks |
SCI |
2020 |
Anamika Sharma and Siddhartha Chauhan |
Information Fusion based Intruder Detection Techniques in Surveillance Wireless Sensor Network |
Advances in Intelligent System and Computing |
SCOPUS |
2019 |
Anamika Sharma and Siddhartha Chauhan |
Target Coverage Computation Protocols in Wireless Sensor Networks: A Comprehensive Review |
International Journal of Computers and Applications |
SCOPUS |
2019 |
Deepshikha and Siddhartha Chauhan |
Multi-Stage Context-Aware Data Filtering Technique for Body Sensor Networks (BSNs) |
Journal of Advanced Research in Dynamical and Control Systems |
SCOPUS |
2019 |
A Sai Venkateshwar Rao and Siddhartha Chauhan |
Two-Step Verification Technique for Isolation of Black Hole Attack in MANETs |
International Journal of Recent Technology and Engineering |
SCOPUS |
2020 |
Piyush Rawat and Siddhartha Chauhan |
A Novel Heterogeneous Clustering Protocol for Lifetime Maximization of Wireless Sensor Network |
Wirel. Pers. Commun. |
SCI |
2020 |
Piyush Rawat and Siddhartha Chauhan |
Energy Efficient Clusterhead Selection Scheme in Heterogeneous Wireless Sensor Network |
J. Circuits, Syst. Comput., |
SCI |
2020 |
Piyush Rawat and Siddhartha Chauhan |
Probability based cluster routing protocol for wireless sensor network |
J. Ambient Intell. Humaniz. Computing |
SCI |
2021 |
Piyush Rawat and Siddhartha Chauhan |
Performance Analysis of RNC Clustering Protocol in Wireless Sensor Network |
Int. J. Sensors, Wirel. Commun. Control |
SCOPUS |
2021 |
Piyush Rawat and Siddhartha Chauhan |
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions |
Comput. Sci. Rev., |
SCI |
2018 |
Piyush Rawat and Siddhartha Chauhan |
Performance Analysis of RN-LEACH Protocol over LEACH Protocol |
Int. J. Futur. Gener. Commun. Netw., |
ESCI |
2021 |
Nilanshi Chauhan and Siddhartha Chauhan |
A novel area coverage technique for maximizing the wireless sensor network lifetime |
Arabian Journal of Science and Engineering |
SCI |
2021 |
Nilanshi Chauhan and Siddhartha Chauhan |
Partly Centralized Partly Distributed Energy
Efficient Sleep/Wake Scheduling in Wireless Sensor
Networks for Applications Requiring Continuous
Sensing
|
IETE TECHNICAL REVIEW |
SCI |
2022 |
Pranjal Kumar and Siddhartha Chauhan |
Study on temperature (τ) variation for SimCLR-based activity recognition |
Signal, Image and Video Processing |
SCI |
2022 |
Pranjal Kumar, Piyush Rawat and Siddhartha Chauhan |
Contrastive self-supervised learning: review, progress, challenges and future research directions |
International Journal of Multimedia Information Retrieval |
SCI |
2023 |
Pranjal Kumar, Siddhartha Chauhan and Lalit Kumar Awasthi |
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions |
Engineering Applications of Artificial Intelligence |
SCI |
2022 |
Pranjal Kumar, Siddhartha Chauhan and Lalit Kumar Awasthi |
Human pose estimation using deep learning: review, methodologies, progress and future research directions |
International Journal of Multimedia Information Retrieval |
SCI |
2024 |
Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan |
Energy‑efficient cluster‑based routing protocol for heterogeneous
wireless sensor network |
Annals of Telecommunications |
SCIE, SCOPUS |
2024 |
Aschalew Tirulo, Siddhartha Chauhan and Biju Issac |
Ensemble LOF-based detection of false data injection in smart grid
demand response system |
Computers and Electrical Engineering |
SCI |
2016 |
Kulwardhan Singh, T.P. Sharma |
FDR: fault detection and recovery scheme for wireless sensor networks using virtual grid |
Taylor & Francis International Journal of Parallel, Emergent and Distributed Systems |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
ZBFR: Zone Based Failure Recovery in WSNs by Utilizing Mobility and Coverage Overlapping |
Springer Wireless Networks |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
rDFD: reactive distributed fault detection in wireless sensor networks |
Springer Wireless Networks |
SCI |
2017 |
K.P. Sharma, T.P. Sharma |
Energy-hole avoidance and lifetime enhancement of a WSN through load factor |
Turkish Journal of Electrical Engineering and Computer Sciences |
SCI |
2016 |
K.P. Sharma, T.P. Sharma |
Distributed Connectivity Restoration in Networks of Movable Sensor Nodes |
Elsevier International Journal of Computers and Electrical Engineering |
SCI |
2015 |
Rajeev Singh and T.P. Sharma |
A Location Based Method for Restricting the Flooding DoS Effect in WLANs |
Taylor and Francis Journal of Location Based Services |
SCOPUS |
2015 |
Rajeev Singh and T.P. Sharma |
On the IEEE 802.11i Security: A Denial of Service Perspective |
Wiley Journal of Security and Communication Networks |
SCI |
2015 |
Rajeev Singh and T.P. Sharma |
Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs |
Journal of Electronics Science & Technology |
SCOPUS |
2014 |
Rajeev Singh and T.P. Sharma |
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security |
Springer Wireless Personal Communications |
SCI |
2015 |
Abhiram Singh, T.P. Sharma |
Position and Hop-Count Assisted Full Coverage Control in Dense Sensor Networks |
Springer Wireless Networks |
SCI |
2014 |
Rajeev Singh and T.P. Sharma |
Simulated analysis of a cryptographic solution for WLANs against Denial of Service (DoS) attacks |
Journal of Engineering Science and Technology |
SCOPUS |
2010 |
T.P. Sharma, R.C. Joshi, Manoj Misra |
Data Filtering and Dynamic Sensing for Continuous Monitoring in Wireless Sensor Networks |
International Journal of Autonomous and Adaptive Communications (IJAACS) |
SCOPUS |
2009 |
T.P. Sharma, R.C. Joshi, Manoj Misra |
Cooperative Caching for Homogeneous Wireless Sensor Networks |
International Journal of Communication Networks and Distributed Systems |
SCOPUS |
2013 |
Rajeev Singh and T.P. Sharma |
A Secure WLAN Authentication Scheme |
IEEK Transactions on Smart Processing and Computing |
IEEK |
2013 |
Rajeev Singh and T.P. Sharma |
Proof of the Secrecy Property of Secure WLAN Authentication Scheme (SWAS) using Extended PCL logic |
Journal of Safety Engineering |
JSE |
2019 |
Krishan Pal Sharma, T.P. Sharma |
Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network |
Inderscience International Journal of Sensor Networks |
SCIE, Scopus |
2019 |
Rajeev Singh, T.P. Sharma |
Present Status of Distributed Denial of service (DDoS) Attacks in Internet World |
International Journal of Mathematical, Engineering and Management Sciences |
Scopus |
2019 |
Rajeev Singh, Sudeep Tanwar, T.P. Sharma |
Utilization of Blockchain for mitigating the Distributed Denial of Service (DDoS) Attacks |
Wiley Journal of Security and Privacy |
ACM |
2019 |
Rajeev Singh and T.P. Sharma |
An Overview of WLAN Security |
International Journal of Scientific & Technology Research |
Scopus |
2019 |
Mohammad Ahsan, Madhu Kumari and T. P. Sharma |
Rumors Detection, Verification and Controlling Mechanisms in Online Social Networks: A Survey |
Elsevier (Science Direct) Online Social Networks and Media (OSNEM) |
SCIE |
2019 |
Mohammad Ahsan, Madhu Kumari and T. P. Sharma |
Detection of Context-Varying Rumors on Twitter through Deep Learning |
Journal of Advanced Science and Technology (IJAST) |
Scopus, SCI |
2016 |
Rajeev Singh and T.P. Sharma |
Secure WLAN Handoff Scheme with Continuous Authentication |
MIS Review |
MIS |
2019 |
Krishan Pal Sharma, T.P. Sharma |
: Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network |
Inderscience International Journal of Sensor Networks |
SCIE, Scopus |
2022 |
Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma |
Trust assessment-based stable and attack resistant grouping strategy for data dissemination in IoV |
Inderscience Publishers (IEL) |
SCIE |
2021 |
Richa Sharma, TP Sharma, Ajay K Sharma |
TVDD: topology based vehicular data dissemination scheme for stability optimisation in IoV |
International Journal of Sensor Networks |
SCIE |
2020 |
Rishabh, TP Sharma |
Device classification based data encryption for internet of things
Name of the Journal: International Journal of High Performance Computing and Networking
|
Inderscience Int. J. of High Performance Computing and Networking |
IEL |
2013 |
Rajeev Singh, T.P. Sharma |
Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL) |
International Journal of Computer Applications |
. |
2015 |
Rajeev Singh and T.P. Sharma |
A Location Based Method for Restricting the Flooding DoS Effect in WLANs
Name of Journal: Taylor and Francis Journal of Location Based Services
|
Taylor and Francis Journal of Location Based Services |
Scopus |
2019 |
Rajeev Singh, T.P. Sharma |
Present Status of Distributed Denial of service (DDoS) Attacks in Internet World
|
International Journal of Mathematical, Engineering and Management Sciences
|
Scopus |
2022 |
Mohammad Ahsan, TP Sharma |
Spams classification and their diffusibility prediction on Twitter through sentiment and topic models |
Taylor & Francis International Journal of Computers and Applications |
Scopus |
2022 |
Richa Sharma, TP Sharma, Ajay K Sharma |
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles
Publication date: 2022
|
International Journal of Cloud Applications and Computing (IJCAC) |
Scopus |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma |
Machine learning in agriculture: a review of crop management applications |
Springer Multimedia Tools and Applications |
Scopus, SCIE |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma, Priyanka Rathee |
A review of deep learning techniques used in agriculture |
Ecological Informatics |
SCIE |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Variance based Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems with Application to Clustering Vol. 45(6), pp. 486-511 |
Cybernetics and Systems, Taylor and Francis (IF=1.879) |
SCI |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Parameter Adaptive Harmony Search Algorithm for Unimodal and Multimodal Optimization Problems, Vol. 5, pp. 144-155 |
Journal of Computational Science, Elsevier (IF=3.976) |
SCI |
2014 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Automatic Cluster Evolution Using Gravitational Search Algorithm and its Application on Image Segmentation. Vol. 29, pp. 93-103 |
Engineering Applications of Artificial Intelligence, Elsevier (IF=6.212) |
SCI |
2015 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
Automatic Unsupervised Feature Selection Using Gravitational Search Algorithm, Vol. 61, pp. 22-31 |
IETE Journal of Research, Taylor and Francis (IF=2.333) |
SCI |
2016 |
Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar |
An Automated Parameter Selection Approach for Simultaneous Clustering and Feature Selection, Vol. 4(2), pp.65-85 |
Journal of Engineering Research, Springer (IF=0.620) |
SCI |
2017 |
Dilbag Singh, Vijay Kumar |
Dehazing of Remote Sensing Images using Improved Restoration Model based Dark Channel Prior, Vol. 65(5), pp. 282-292 |
Imaging Science Journal, Taylor and Francis (IF=0.871) |
SCI |
2017 |
Dilbag Singh, Vijay Kumar |
Modified Gain Intervention Filter based Dehazing Technique, Vol. 64(20), pp. 2165-2178 |
Journal of Modern Optics, Taylor and Francis (IF=1.464) |
SCI |
2017 |
Gaurav Dhiman, Vijay Kumar |
Spotted Hyena Optimizer: A Novel Bio-inspired based Metaheuristic Technique for Engineering Applications, Vol. 114, pp. 48-70 |
Advances in Engineering Software, Elsevier (IF=4.141) |
SCI |
2017 |
Vijay Kumar, Dinesh Kumar |
An Astrophysics-inspired Grey Wolf Algorithm for Numerical Optimization and its Application to Engineering Design Problems. Vol. 112, pp. 231-254 |
Advances in Engineering Software, Elsevier (IF=4.141) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Defogging of road images using gain coefficient based trilateral filter, Vol. 27(1), pp. 1-14 |
Journal of Electronic Imaging, SPIE (IF=0.945) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Single image haze removal using integrated dark and bright channel prior, Vol. 32(4), pp. 1-9 |
Modern Physics Letters B, World Scientific (IF=1.668) |
SCI |
2018 |
Ashish Gridhar, Vijay Kumar |
A Comprehensive Survey of 3D Image Steganography Techniques, Vol. 12(1), pp. 1-10 |
IET Image Processing, IET (IF=2.373) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Comprehensive Survey on Haze Removal Techniques, Vol. 77(8), pp. 9595-9620 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
A Modified DWT-based Image Steganography Technique, Vol. 77(11), pp. 13279-13308 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2018 |
Sahil Sharma, Vijay Kumar |
Performance evaluation of 2D face recognition techniques under image processing attacks, Vol. 32(19), pp. 1-10 |
Modern Physics Letters B, World Scientific (IF=1.668) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Dehazing of Remote Sensing Images using Fourth-order Partial Differential Equations Based Trilateral Filter, Vol. 12(2), pp. 208-219 |
IET Computer Vision, IET (IF=1.950) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Fourier-Mellin moments based intertwining map for image encryption, Vol. 32(9), pp. 1-17 |
Modern Physics Letters B, World Scientific (IF=1.668) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
An efficient image encryption method based on improved Lorenz chaotic system, Vol. 54(9), pp. 562-564 |
Electronics Letters, IET (1.343) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Gene Expression Data Clustering using Variance-based Harmony Search Algorithm |
IETE Journal of Research, Taylor and Francis (IF=0.793) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
Dehazing of outdoor images using notch based integral guided filter, Vol. 77(20), pp. 27363-27386 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2018 |
Ashish Gridhar, Vijay Kumar |
A RGB Image Encryption Technique using Lorenz and Rossler Chaotic System on DNA Sequences. Vol. 77(20), pp. 27017-27039 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Parallel Non-dominated Sorting Genetic Algorithm-II based Image Encryption Technique, Vol. 66(8), pp. 453-462 |
Imaging Science Journal, Taylor and Francis (IF=0.871) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Color Image Encryption Technique using Differential Evolution in Nonsubsampled Contourlet Transform Domain, Vol. 12(7), pp.1273 –1283 |
IET Image Processing, IET (IF=2.373) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Beta Chaotic Map based Image Encryption Using Genetic Algorithm, Vol. 28(11), pp. 1850132 (1–26) |
International Journal of Bifurcation and Chaos, IET (IF=2.836) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar |
Adaptive Differential Evolution based Lorenz Chaotic System for Image Encryption, Vol. 43(12), pp. 8127-8144 |
Arabian Journal for Science and Engineering, Springer (IF=2.334) |
SCI |
2018 |
Dilbag Singh, Vijay Kumar |
A novel dehazing model for remote sensing images, Vol. 69, pp. 14-27 |
Computer & Electrical Engineering, Elsevier (IF=3.818) |
SCI |
2018 |
Manjit Kaur, Vijay Kumar, Li Li |
Color Image Encryption Approach based on Memetic Differential EvolutionColor Image Encryption Approach based on Memetic Differential Evolution |
Neural Computing and Applications, Springer (IF=5.606) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Automatic Clustering and Feature Selection using Gravitational Search Algorithm and its Application to Microarray Data Analysis |
Neural Computing and Applications, Springer (IF=5.606) |
SCI |
2018 |
Gaurav Dhiman, Vijay Kumar |
Astrophysics inspired multi-objective approach for automatic clustering and feature selection in real-life environment, Vol. 32 (31) , pp. 1-12 |
Modern Physics Letters B, World Scientific (IF=1.668) |
SCI |
2018 |
Vijay Kumar, Dinesh Kumar |
Binary Whale Optimization Algorithm and its Application to Unit Commitment Problem |
Neural Computing and Applications, Springer (IF=5.606) |
SCI |
2019 |
Gaurav Dhiman, Vijay Kumar |
KnRVEA: A Hybrid Evolutionary Algorithm based on Knee Points and Reference Vector Adaptation Strategies for Many-objective Optimization, Vol. 49(7), pp.2434-2460 |
Applied Intelligence, Springer (IF=5.086) |
SCI |
2019 |
Gaurav Dhiman, Vijay Kumar |
Emperor Penguin Optimizer: A Bio-inspired Algorithm for Engineering Problems, Vol. 159, pp. 20-50 |
Knowledge-Based Systems, Elsevier (IF=8.038) |
SCI |
2018 |
Gaurav Dhiman, Vijay Kumar |
Multi-objective Spotted Hyena Optimizer: A Novel Multi-Objective Optimization Algorithm for Engineering Problems, Vol. 150, pp.175-197 |
Knowledge-Based Systems, Elsevier (IF=8.038) |
SCI |
2019 |
Gaurav Dhiman, Vijay Kumar |
Seagull Optimization Algorithm: Theory and its Applications for Large Scale Industrial Engineering Problems, Vol. 165, pp. 169-196 |
Knowledge-Based Systems, Elsevier (IF=8.038) |
SCI |
2019 |
Manjit Kaur, Vijay Kumar |
A comprehensive review on image encryption techniques |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
A comprehensive review of computational dehazing techniques |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
Image Dehazing using Moore neighborhood-based Gradient Profile Prior |
Signal Processing: Image Communication, Elsevier (IF=3.256) |
SCI |
2019 |
Dinesh Kumar, Vijay Kumar, Rajani |
Automatic Clustering using Quantum based Multi-objective Emperor Penguin Optimizer and its Applications to Image Segmentation, Vol. 34, No. 24, pp. 1950193:1-19 |
Modern Physics Letters A, World Scientific (IF=2.066) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar, Manjit Kaur |
Single Image Dehazing using Gradient Channel Prior, Vol. 49, pp. 4276-4293 |
Applied Intelligence, Springer (IF=5.086) |
SCI |
2019 |
Ashish Gridhar, Vijay Kumar |
A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map, Vol. 10, pp. 4947-4961 |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=7.104) |
SCI |
2020 |
Vijay Kumar, Avneet Kaur |
Binary Spotted Hyena Optimizer and its Application to Feature Selection, Vol. 11, pp. 2625-2645 |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=7.104) |
SCI |
2020 |
Dilbag Singh, Vijay Kumar, Manjit Kaur |
Image Dehazing using Window-based Integrated Means Filter, Vol. 79, pp. 34771–34793 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2020 |
Manjit Kaur, Dilbag Singh, Vijay Kumar, Kehui Sun |
Color Image Dehazing using Gradient Channel Prior and Guided L0 Filter, Vol. 521, pp. 326-342 |
Information Sciences, Elsevier (IF=6.795) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning, Vol. 79, pp. 17303-17330 |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2020 |
Rajesh Kondabala, Vijay Kumar, Amjad Ali, Manjit Kaur |
A novel astrophysics-based framework for prediction of binding affinity of glucose binder, Vol. 32 (31) , pp. 1-12 |
Modern Physics Letters B, World Scientific (IF=1.668) |
SCI |
2020 |
Gaurav Dhiman, Meenakshi Garg, Atulya Nagar, Vijay Kumar, Mohammad Dehghani |
A novel algorithm for global optimization: Rat Swarm Optimizer |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=7.104) |
SCI |
2020 |
Aayush Jaiswal, Neha Gianchandani, Dilbag Singh, Vijay Kumar, Manjit Kaur |
Classification of the COVID-19 infected patients using DenseNet201 based deep transfer learning |
Journal of Biomolecular Structure & Dynamics, Taylor and Francis (IF=3.310) |
SCI |
2020 |
Dilbag Singh, Vijay Kumar, Manjit Kaur |
Color image encryption using minimax differential evolution based 7D hyper-chaotic map |
Applied Physics B: Lasers and Optics, Springer (IF=2.070) |
SCI |
2020 |
Dilbag Singh, Vijay Kumar, Vaishali Yadav, Manjit Kaur |
Deep Convolutional Neural Networks based Classification model for COVID-19 Infected Patients using Chest X-ray Images |
International Journal of Pattern Recognition and Artificial Intelligence, Springer (IF=1.373) |
SCI |
2020 |
Dilbag Singh, Vijay Kumar, Vaishali Yadav, Manjit Kaur |
Classification of COVID-19 patients from chest CT images using multi-objective differential evolution based convolutional neural networks, Vol. 39(7), pp. 1379-1389 |
European Journal of Clinical Microbiology & Infectious Diseases, Springer (IF=3.726) |
SCI |
2020 |
N. Narayan Das, N. Kumar, Majit Kaur, Vijay Kumar, Dilbag Singh |
Automated deep transfer learning-based approach for detection of COVID-19 infection in chest X-rays, |
Innovation and Research in Biomedical Engineering, Elsevier (IF=1.856) |
SCI |
2020 |
Vijay Kumar , Kamlinder Kaur, Avneet Kaur |
Spiral-inspired Spotted Hyena Optimizer and its Application to Constraint Engineering Problems |
Wireless Personal Communications, Springer (IF=1.671) |
SCI |
2020 |
Ashish Girdhar, Himani Kapur, Vijay Kumar, Manjit Kaur, Dilbag Singh, Robertas Damaševičius |
Effect of COVID-19 Outbreak on Urban Health and Environment |
Air Quality, Atmosphere & Health, Springer (IF=3.763) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2020 |
Ashish Girdhar, Vijay Kumar, |
A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2020 |
Vijay Kumar, Dinesh Kumar |
A Systematic Review on Firefly Algorithm: Past, Present, and Future |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2020 |
Sahil Sharma, Vijay Kumar |
3D Landmark-based Face Restoration for Recognition using Variational Autoencoder and Triplet Loss |
IET Biometrics, IET (IF=1.821) |
SCI |
2020 |
Sourabh Katoch, Sumit Singh Chauhan, Vijay Kumar |
A Review on Genetic Algorithm: Past, Present, and Future |
Multimedia Tools and Applications, Springer (IF=2.757) |
SCI |
2020 |
Rajesh Kondabala, Vijay Kumar, Amjad Ali |
Design a Synthetic Glucose Receptor using Computational Intelligence Approach |
Journal of Molecular Graphics and Modelling, Elsevier (IF=2.518) |
SCI |
2020 |
Dilbag Singh, Manjit Kaur, Vijay Kumar |
Rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images |
Journal of Ambient Intelligence and Humanized Computing, Springer (IF=7.104) |
SCI |
2020 |
Dilbag Singh, Manjit Kaur, Vijay Kumar |
Drug Synergy Prediction Using Dynamic Mutation based Differential Evolution |
Current Pharmaceutical Design, (IF=3.116) |
SCI |
2021 |
Neeraj Kumar, Vijay Kumar, Sunil Singla |
Single Image Defogging using Deep Learning Techniques: Past, Present and Future |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2021 |
Dilbag Singh, Manjit Kaur, Vijay Kumar |
Densely connected convolutional networks-based COVID-19 screening model |
Applied Intelligence, Springer (IF=5.086) |
SCI |
2021 |
Ashish Girdhar, Himani Kapur, Vijay Kumar |
A novel Grayscale image encryption approach based on chaotic maps and image blocks |
Applied Physics B: Lasers and Optics, Springer (IF=2.070) |
SCI |
2021 |
Sahil Sharma, Vijay Kumar |
Performance evaluation of machine learning based face recognition techniques |
Wireless Personal Communications, Springer (IF=1.671) |
SCI |
2021 |
Manjit Kaur, Vijay Kumar , Vaishali Yadav, Dilbag Singh, Naresh Kumar, Nripendra Narayan Das |
Metaheuristic-based Deep COVID-19 Screening Model from Chest X-Ray Images |
Journal of Healthcare Engineering (IF=2.682) |
SCI |
2021 |
Mahima Dubey, Vijay Kumar, Manjit Kaur, Than-Pan Dao |
A Systematic Review on Harmony Search Algorithm: Theory, Literature, and Applications |
Mathematical Problems in Engineering (IF=1.305) |
SCI |
2021 |
Minkashi Kalra, Shobhit Tyagi, Vijay Kumar, Manjit Kaur, Wali Khan Mashwani, Habib Shah, Kamal Shah |
A Comprehensive Review on Scatter Search: Techniques, Applications, and Challenges |
Mathematical Problems in Engineering (IF=1.305) |
SCI |
2021 |
Vijay Kumar, Dilbag Singh, Manjit Kaur, Robertas Damasevicius |
Overview of current state of research on the application of artificial intelligence techniques for COVID-19 |
PeerJ Computer Science. (IF=3.09) |
SCI |
2021 |
Vijay Kumar, Nitin Dogra |
A Comprehensive Review on Deep Synergistic Drug Prediction Techniques for Cancer |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2019 |
Dilbag Singh, Vijay Kumar |
Single image defogging by gain gradient image filter, Vol. 62(7), pp.079101:1-079101:3 |
Science China Information Sciences, Springer (IF=4.380) |
SCI |
2021 |
Vijay Kumar, Dinesh Kumar, Dilbag Singh, Manjit Kaur, Sahar Ahmed Idris, Hammam Alshazly |
A novel binary seagull optimizer and its application to feature selection problem |
IEEE Access, IEEE (IF=3.367) |
SCI |
2021 |
Akshay Juneja, Vijay Kumar, Sunil Singla |
A Systematic Review on Foggy Datasets: Applications and Challenges |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2021 |
Minakshi Kalra, Vijay Kumar, Manjit Kaur, Sahar Ahmed Idris, Şaban Öztürk, Hammam Alshazly |
A Novel Binary Emperor Penguin Optimizer for Feature Selection Tasks |
Computers, Materials & Continua (IF=3.772) |
SCI |
2021 |
Gundeep Singh, Sahil Sharma,Vijay Kumar,
Manjit Kaur, Mohammed Baz, Mehedi Masud |
Spoken Language Identification using Deep Learning |
Computational Intelligence and Neuroscience (IF=3.633) |
SCI |
2021 |
Ashish Girdhar, Vijay Kumar, Himani Kapur |
Classification of White Blood Cell using Convolution Neural Network |
Biomedical Signal Processing and Control, Elsevier (IF=3.88) |
SCI |
2021 |
Vijay Kumar, Dilbag Singh, Manjit Kaur |
Screening of COVID-19 Suspected Subjects using Multi-Crossover Genetic Algorithm based Dense Convolutional Neural Network |
IEEE Access, IEEE (IF=3.367) |
SCI |
2021 |
Vijay Kumar, Tarun Agarwal |
A Systematic Review on Bat Algorithm: Theoretical Foundation, Variants, and Applications |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2021 |
Rajani, Vijay Kumar, Dilbag Singh, Manjit Kaur |
Early Diagnosis of COVID-19 Patients Using Deep Learning-based Deep Forest Model |
Journal of Experimental & Theoretical Artificial Intelligence, Taylor and Francis (IF=2.340) |
SCI |
2021 |
Vijay Kumar, Sahar Ahmed Idris, Sami Bourouis, Hammam Alshazly |
Impact of COVID-19 on Society, Environment, Economy and Education |
Sustainability (IF=3.251) |
SCI |
2021 |
Sahil Sharma, Vijay Kumar |
3D Face Reconstruction in Deep Learning Era: A Survey |
Archives of Computational Methods in Engineering, Springer (IF=7.302) |
SCI |
2010 |
Kamlesh Dutta, Nupur Prakash, Saroj Kaushik |
Probabilistic neural network approach to the classification of demonstrative pronouns for indirect anaphora in Hindi |
Expert Systems with Applications, Volume 37, Issue 8,
2010,
Pages 5607-5613,
ISSN 0957-4174,
https://doi.org/10.1016/j.eswa.2010.02.052., Elsevier |
Scopus and SCI Impact Factor 8.665 2023 Q1 |
2011 |
Kamlesh Dutta, Siddhant Sarthak |
Architectural space planning using evolutionary computing approaches: A review |
Artificial Intelligence Review, Volume 36, pages 311–321, (2011), Springer
|
Scopus SCI Impact Factor 9.588 2023 Q1
|
2013 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta, Chetna Gupta |
Requirement Reprioritization: A Multilayered Dynamic Approach |
International Journal of Software Engineering and its Applications |
ESCI and Scopus (2016) |
2013 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Incremental development revolutions of E-learning software systems in education sector: a case study approach |
Human-centric Computing and Information Sciences,Volume 3, article number 8, (2013), Springer |
Scopus SCI Impact Factor 3.9 (2024) Q1 |
2013 |
Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta |
Regression testing based requirement prioritization of desktop software applications approach |
International Journal of Software Engineering and its Applications |
Scopus (2016) |
2014 |
Vachik S. Dave, Kamlesh Dutta |
Neural network based models for software effort estimation: A review |
Artificial Intelligence Review, Volume 42, pages 295–307, (2014), Springer
|
Scopus SCI Impact Factor 9.588 2023 Q1 |
2014 |
Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta |
Current prioritisation and reprioritisation practices: A case study approach |
International Journal of Computer Aided Engineering and Technology, Volume 6, Issue 22014, pp 159-170https://doi.org/10.1504/IJCAET.2014.060297, InderScience |
Scopus |
2014 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Requirement reprioritisation for pairwise compared requirements |
International Journal of Computer Aided Engineering and Technology,pp 29-47https://doi.org/10.1504/IJCAET.2014.058003, Volume 6, Issue 1, 2014 |
Scopus |
2015 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Hybrid regression testing technique: Based on requirement priorities, fault and modification history |
International Journal of Computer Applications in Technology |
ESCI 1.2 (2024) and Scopus Q3 |
2015 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Exploring prioritization through systematic literature surveys and case studies |
SpringerPlus, Volume 4, article number 539, (2015), Springer
|
SCI Impact factor 0.982 (2015) |
2016 |
Priyanka Dadhich, Kamlesh Dutta, M.C. Govil |
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities |
International Journal of Security and Networks |
Scopus 1.4 (2023) Q4 |
2016 |
Sunil Kumar, Kamlesh Dutta |
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges |
Security and Communication Networks, Vol 9, issue 14, September 2016, Wiley |
SCI 1.06 (2016) and Scopus |
2016 |
Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta |
Historical prioritisation and reprioritisations using hierarchical historical R-tree |
International Journal of Computer Applications in Technology (IJCAT), Inderscience |
ESCI 1.2 (2024) and Scopus Q3 |
2017 |
Mukesh Kumar, Kamlesh Dutta |
Detecting wormhole attack on data aggregation in hierarchical WSN |
International Journal of Information Security and Privacy |
ESCI 0.5 (2023) and Scopus Q4 |
2017 |
Sunil Kumar, Kamlesh Dutta |
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks |
International Journal of Electronics |
SCI 1.1 (2023) and Scopus Q3 |
2018 |
Poonam Tanwar, T.V. Prasad, Kamlesh Dutta |
Natural language processing for hybrid knowledge representation |
International Journal of Advanced Intelligence Paradigms, Volume 10, Issue 3, pp 223-235https://doi.org/10.1504/IJAIP.2018.090787, 2018 |
Scopus |
2018 |
Sunil Kumar, Kamlesh Dutta |
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks |
Wireless Personal Communications |
Scopus and SCIE Impact factor 1,9 (2023) Q2 |
2018 |
Sunil Kumar, Kamlesh Dutta, Anjani Garg |
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks |
Wireless Personal Communications |
Scopus and SCIE Impact factor 1,9 (2023) Q2 |
2019 |
Kamlesh Dutta, Varun Gupta and Vachik S. Dave |
Analysis and Comparison of Neural Network Models for Software Development Effort Estimation |
Journal of Cases on Information Technology (JCIT) |
SCOPUS, Web of Science Emerging Sources Citation Index (ESCI), Impact Factor 0.7 (2023) Q3 |
2019 |
Parnika Bhat and Kamlesh Dutta |
A Survey on Various Threats and Current State of Security in Android Platform |
ACM Computing Surveys (CSUR) |
Scopus and SCI Impact Factor 23.8 (2023) Q1 |
2009 |
Kamlesh Dutta, Nupur Prakash, Saroj Kaushik |
Application of Pronominal Divergence and Anaphora Resolution in English-Hindi Machine Translation |
POLIBITS |
ISI Thomson / Clarivate Web of Science SciELO collection |
2011 |
Kamlesh Dutta, Saroj Kaushik, Nupur Prakash |
Machine Learning Approach for the Classification
of Demonstrative Pronouns for Indirect Anaphora
in Hindi News Items |
The Prague Bulletin of Mathematical Linguistics |
ERIH PLUS, Genamics JournalSeek |
2020 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta |
Hybrid Algorithm to Detect DDoS Attacks in VANETs |
Wireless Personal Communications |
Scopus and SCIE Impact factor 1,9 (2023) Q2 |
2019 |
Poonam Tanwar, T.V. Prasad, Kamlesh Dutta |
Hybrid technique for effective knowledge representation in normal life |
International Journal of Engineering and Advanced Technology |
Scopus |
2019 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta |
Evaluating the Performance of Various Machine Learning Algorithms for Detecting DDoS Attacks in VANETs |
International Journal of Control and Automation |
Scopus |
2019 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar and Kamlesh Dutta |
Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing DDoS Attacks in VANETS |
International Journal of Innovative Technology and Exploring Engineering |
Scopus |
2020 |
Triveni Lal Pal and Kamlesh Dutta |
CNN-based Embedding Learning for Sentence Classification |
International Journal of Control and Automation |
Scopus |
2021 |
Parnika Bhat and Kamlesh Dutta |
CogramDroid- An approach towards malware detection in Android using opcode ngrams |
Concurrency and Computation: Practice and Experience, Volume33, Issue20, pages 14, Wiley |
Scopus Citescore 5.0 and SCIE Impact factor 1.5 2023 Q2 |
2021 |
Kusum Lata, Pardeep Singh and Kamlesh Dutta |
A comprehensive review on feature set used for anaphora resolution |
Artificial Intelligence Review |
Scopus and SCI Impact Factor 10.7 (2023) Q1 |
2020 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta |
Evaluating the impact of DDos Attacks in Vehicular Adhoc Networks |
International Journal of Security and Privacy in Pervasive Computing (IJSPPC) |
- |
2021 |
चेतन अग्रवाल एवं कमलेश दत्ता |
मशीन आधारित भाषा अनुवाद में संदर्भ निराकरण का महत्व. |
भारतीय वैज्ञानिक एवं औद्योगिक अनुसंधान पत्रिका, 29 अंक (1) जून 2021 पृ. 49-54 |
- |
2022 |
Kusum Lata, Pardeep Singh and Kamlesh Dutta |
Mention detection in Coreference Resolution: Survey |
Applied Intelligence, 52, 9816–9860 (2022). https://doi.org/10.1007/s10489-021-02878-2 , Springer |
SCIE Impact factor 3.4 (2023) Q2 |
2022 |
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta |
Evaluating the performance of various SVM Kernel functions based on basic features extracted from KDDCUP'99 dataset by Random Forest method for detecting DDoS Attacks |
Wireless Personal Communications, Volume 123, pages 3127–3145, Springer |
Scopus and SCIE Impact factor 1,9 (2023) Q2 |
2022 |
Parnika Bhat and Kamlesh Dutta |
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain |
Journal of King Saud University - Computer and Information Sciences Volume 34, Issue 10, Part B, November 2022, Pages 9464-9477, Elsevier |
SCIE Impact factor 5.2 (2023) Q1 |
2015 |
Rakesh Kumar Dutta, Kamlesh Dutta and S. Jeevanandham |
Prediction of Deviator Stress of Sand Reinforced with Waste Plastic Strips Using Neural Network |
International Journal of Geosynthetics and Ground Engineering, Volume 1, article number 11, (2015),
Springer |
SCIE Impact factor 2.3 (2023) Q2 |
2016 |
Mukesh Kumar and Kamlesh Dutta |
LDAT: LFTM based data aggregation and transmission protocol for wireless sensor networks |
Journal of Trust Management, Volume 3, article number 2, (2016) Spinger |
- |
2023 |
Arun Kumar, Kamlesh Dutta, Abhishek Srivastava |
Generating Automated Layout Design Using a Multi-Population Genetic Algorithm |
Journal of Web Engineering, vol. 22, no. 2, pp. 357-384, March 2023, doi: 10.13052/jwe1540-9589.2227 |
SCIE Impact factor 0.7 (2023) Q3 |
2023 |
Arun Kumar, Kamlesh Dutta, Abhishek Srivastava |
Topological and Dimensional constraints based optimal placement of Layout Entities using Clustering and Genetic Algorithm |
Applied Soft Computing, Volume 132, January 2023, 109867, Elsevier |
SCIE Impact factor 8.57 (2024) Q1 |
2024 |
Pooja Rani, Kamlesh Dutta, Vijay Kumar |
Performance evaluation of drug synergy datasets using computational intelligence approaches |
Multimedia Tools and Applications. https://doi.org/10.1007/s11042-023-15723-0, 83(3), 8971-8997, 2024/1 Springer |
SCIE Impact factor 4.53 (2024) Q1 |
2023 |
Pooja Rani, Kamlesh Dutta, Vijay Kumar |
Drug synergy model for malignant diseases using deep learning |
Journal of Bioinformatics and Computational Biology, 22 Jun 2023, 21(3):2350014, https://doi.org/10.1142/s0219720023500142, world Scientific |
SCIE Impact factor 0.9 (2023) Q3 |
2023 |
Parnika Bhat, Sunny Behal, Kamlesh Dutta |
A System Call-based Android Malware Detection Approach with Homogeneous & Heterogeneous Ensemble Machine Learning |
Computers & Security, Volume 130, July 2023, 103277, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2023.103277. Elsevier |
SCIE Impact factor 4.8 2023 Q1 |
2023 |
Parnika Bhat, Sunny Behal, Kamlesh Dutta |
Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis |
Proceedings of the Indian National Science Academy, Volume 89, pages 429–444, (2023), Springer |
ESCI Impact factor 1.31 (2024) Q3
|
2023 |
Kusum Lata, Pardeep Singh and Kamlesh Dutta |
Semi-automatic Annotation for Mentions in Hindi Text |
SN Computer Science, 4(5), DOI: 10.1007/s42979-023-01885-z Springer (SCOPUS) |
Web of Science’s Emerging Sources Citation Index (ESCI), 4.34 (2024) Impact Factor, SCOPUS Q2 |
2023 |
Kunal Vermani, Amandeep Noilya, Sunil Kumar, Kamlesh Dutta |
Ensemble Learning Based Malicious Node Detection in SDN-based VANETs |
Journal of Information Systems Engineering and Business Intelligence, Vol.9, No.2, October 2023 |
SCOPUS |
2024 |
Shubhkirti Sharma, Vijay Kumar and Kamlesh Dutta |
Multi-objective Optimization Algorithms for Intrusion Detection in IoT Networks: A Systematic Review |
Internet of Things and Cyber-Physical Systems, Volume 4, 2024, Pages 258-267, https://doi.org/10.1016/j.iotcps.2024.01.003, Elsevier |
SCOPUS 13.8 citescore Q1 |
2022 |
Pooja Rani, Kamlesh Dutta, and Vijay Kumar |
Artificial intelligence techniques for prediction of drug synergy in malignant diseases: Past, present, and future |
Computers in Biology and Medicine, Volume 144, 2022, 105334, https://doi.org/10.1016/j.compbiomed.2022.105334. ISSN 0010-4825, Elsevier |
SCIE Impact factor 7.0 (2023) Q1 |
2024 |
Shubhkirti Sharma, Vijay Kumar and Kamlesh Dutta |
Multi-objective Prairie Dog Optimization Algorithm for IoT-based Intrusion Detection |
Internet Technology Letters, Wiley, 10.1002/itl2.516 |
Scopus and ESCI Impact factor 0.9 Q3 |
2024 |
Upinder Kaur, Aparna N. Mahajan, Sunil Kumar, and Kamlesh Dutta |
Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs |
Wireless Personal Communications, https://doi.org/10.1007/s11277-024-11525-1 |
Scopus and SCIE Impact factor 1,9 (2023) Q2 |
2024 |
Kusum Lata, Pardeep Singh, Kamlesh Dutta |
SMDDH: Singleton Mention Detection using Deep Learning in Hindi Text, |
ACM Transactions on Asian and Low-Resource Language Information Processing, https://doi.org/10.1145/3700821 |
SCI Impact factor 1.8 (2023) Q2 |
2024 |
Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta |
Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review |
International Journal of Information and Computer Security, Volume 24, Issue 3-4, Pages
284-321 (InderScience) |
Web of Science: Emerging Sources Citation Index (Clarivate Analytics) and Scopus (Elsevier) Q3 |
2024 |
Pooja Rani, Kamlesh Dutta, and Vijay Kumar |
Autoencoder-based Drug Synergy Framework for Malignant Diseases |
Computational Biology and Chemistry |
SCI Impact factor 2.6 (2023) Q2 |
2023 |
Rohit Singh, Lalit Kumar Awasthi, Kp Sharma |
EEDF: Enhanced Encryption Decryption Framework for Device Authentication in IoT. Vol. 56, No. 3, pp. 163-184. |
Adhoc & Sensor Wireless Networks |
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns Vol. 50 pp.1-26. DOI: https://doi.org/10.1016/j.cosrev.2023.100591 |
Computer Science Review |
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
Schema generation for document stores using workload-driven approach Vol.4 pp. 1-49. DOI: https://doi.org/10.1007/s11227-023-05613-5 |
The Journal of Supercomputing |
- |
2023 |
Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi |
Human Activity Recognition (HAR) Using Deep Learning: Review, Methodologies, Progress and Future Research Directions Vol. 3 pp. 1-41. DOI: https://doi.org/10.1007/s11831-023-09986-x |
Archives of Computational Methods in Engineering |
- |
2023 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
WGSDMM+ GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding Vol. 145 pp. 254-266. DOI: https://doi.org/10.1016/j.future.2023.03.028
|
Future Generation Computer Systems
|
- |
2023 |
Neha Bansal, Shelly Sachdeva, Lalit K Awasthi |
Are NoSQL Databases Affected by Schema? Vol.3 pp. 1-22. DOI:
https://doi.org/10.1080/03772063.2023.2237478
|
IETE Journal of Research |
- |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma, Priyanka Rathee |
A review of deep learning techniques used in agriculture Vol.77 pp.1-22. DOI: https://doi.org/10.1016/j.ecoinf.2023.102217 |
Ecological Informatics |
- |
2023 |
Pankaj Sharma, Lalit Kumar Awasthi |
Next-generation Digital Forensics Challenges and Evidence Preservation Framework for IoT Devices. Vol. 14 pp.1-3. |
International Journal of Next-Generation Computing
|
- |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma |
Machine learning in agriculture: a review of crop management applications Vol.2 pp. 1-41. DOI: https://doi.org/10.1007/s11042-023-16105-2 |
Multimedia Tools and Applications |
- |
2023 |
Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi |
Clustering based opportunistic traffic offloading technique for device-to-device communication Vol. 14 pp. 827-839. DOI: |
International Journal of System Assurance Engineering and Management
|
- |
2023 |
Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava |
Candidate project selection in cross project defect prediction using hybrid method Vol. 218 pp. 1-11. DOI: https://doi.org/10.1016/j.eswa.2023.119625 |
Expert Systems with Applications |
- |
2023 |
Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava |
Efficient Random Forest Algorithm for Multi-objective Optimization in Software Defect Prediction Vol.4 pp. 1-13. DOI: https://doi.org/10.1080/03772063.2023.2205377 |
IETE Journal of Research |
- |
2023 |
Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka |
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review, Vol. 55, No. 3, pp. 1-43.
https://doi.org/10.1145/3494520
|
ACM Computing Surveys
|
- |
2023 |
Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi |
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions Vol. 120 pp. 1-58. DOI: https://doi.org/10.1016/j.engappai.2023.105894 |
Engineering Applications of Artificial Intelligence |
- |
2023 |
Urvashi, Geeta Sikka, Lalit K Awasthi, Bharat Bhargava |
Quantitative evaluation of extensive vulnerability set using cost benefit analysis Vol. 3 pp. 1 - 11. DOI: 10.1109/TDSC.2023.3253121 |
IEEE Transactions on Dependable and Secure Computing
|
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network Vol.129 pp.1113-1128. DOI: https://doi.org/10.1007/s11277-023-10178-w |
Wireless Personal Communications |
- |
2023 |
Md Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi |
A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification Vol. 82 pp. 8507-8535. |
Multimedia Tools and Applications |
- |
2023 |
Amitoj Bir Singh, Lalit Kumar Awasthi, Mohammad Shorfuzzaman, Abdulmajeed Alsufyani, Mueen Uddin |
Chained Dual-Generative Adversarial Network: A Generalized Defense Against Adversarial Attacks. Vol. 74, No. 2, pp. 2541-2555. |
Computers, Materials & Continua |
- |
2023 |
Monika Chaudhary, Nitin Goyal, Abderrahi Benslimane, Lalit Kumar Awasthi, Ayed Alwadain, Aman Singh |
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges. Vol. 10, No. 4, pp. 3500-3524. |
International Journal of Communication Systems |
- |
2022 |
Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma |
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection Vol. 25, pp.1341–1354. DOI: https://doi.org/10.1002/wcm.654 |
Springer: Cluster Computing |
- |
2022 |
Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik |
A range-based node localization scheme with hybrid optimization for underwater wireless sensor network Vol. 35, pp.1-55. DOI: https://doi.org/10.1002/dac.5147 |
International Journal of Communication Systems |
- |
2022 |
Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network Vol. 181, pp. 236-256. DOI: https://doi.org/10.1016/j.comcom.2021.10.016 |
Computer Communications |
- |
2022 |
Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Secure authentication and session key management scheme for Internet of Vehicles Vol. 33, pp. 1-5. DOI: https://doi.org/10.1002/ett.4451 |
John Wiley & Sons, Ltd.: Transactions on Emerging Telecommunications Technologies |
- |
2022 |
Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik |
A range based node localization scheme with hybrid optimization for underwater wireless sensor network Vol. 35 pp. 1-10 DOI: https://doi.org/10.1002/dac.5147 |
Computer Networks |
- |
2022 |
Pranjal Kumar, Siddhartha Chauhan & Lalit Kumar Awasthi |
Human pose estimation using deep learning: review, methodologies, progress and future research directions Vol. 11 pp. 489-521 DOI: https://doi.org/10.1007/s13735-022-00261-6 |
International Journal of Multimedia Information Retrieval |
- |
2022 |
Md Ansari, Sarfaraj Alam, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi |
A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification Vol. 10, pp. 1-10. DOI: https://doi.org/10.1007/s11042-022-13556-x |
Multimedia Tools and Applications |
- |
2022 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation Vol. 45, pp. 1-22. DOI: https://doi.org/10.1016/j.cosrev.2022.100498 |
Computer Science Review |
- |
2022 |
Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli |
Energy-aware scientific workflow scheduling in cloud environment Vol. 25, pp. 3845-3874. DOI: https://doi.org/10.1007/s10586-022-03613-3 |
Cluster Computing |
- |
2022 |
Abhilasha Sharma, Lalit Kumar Awasthi |
Ob-EID: Obstacle aware event information dissemination for SDN enabled vehicular network Vol. 216, pp. 1-25. DOI: https://doi.org/10.1016/j.comnet.2022.109257 |
Computer Networks |
- |
2021 |
Aridaman Singh Nandan, Samayveer Singh, Lalit K Awasthi |
An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs Vol. 107, pp. 1-78. DOI: https://doi.org/10.1016/j.asoc.2021.107318 |
Applied Soft Computing |
- |
2021 |
Samayveer Singh, Aridaman Singh Nandan, Aruna Malik, Rajeev Kumar, Lalit K Awasthi, Neeraj Kumar |
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare Vol. 9, pp. 7481 - 7490. DOI: 10.1109/JIOT.2021.3108875 |
Internet of Things Journal |
- |
2021 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Learning-based hybrid routing for scalability in software defined networks Vol. 198, pp.252-267. DOI: https://doi.org/10.1016/j.comnet.2021.108362 |
Computer Networks |
- |
2021 |
Abhilasha Sharma, Lalit Kumar Awasthi |
Pr-CAI: Priority Based-Context Aware Information scheduling for SDN-based vehicular network Vol. 193, pp. 10-31. DOI: https://doi.org/10.1016/j.comnet.2021.108097 |
Computer Networks |
- |
2021 |
Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi |
Clustering based opportunistic traffic offloading technique for device-to-device communication Vol. 185, pp. 0976-4348. DOI: https://doi.org/10.1007/s13198-021-01136-5 |
International Journal of System Assurance Engineering and Management |
- |
2021 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
An ensemble approach for optimization of penetration layout in wide area networks Vol. 174, pp. 61-74. DOI: https://doi.org/10.1016/j.comcom.2021.04.009 |
Computer Communications |
- |
2021 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
Empirical risk assessment of attack graphs using time to compromise framework Vol. 16, pp. 192-206. DOI: https://doi.org/10.1504/IJICS.2021.117393 |
International Journal of Information and Computer Security |
- |
2021 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Unified model towards Scalability in Software Defined Networks Vol. 12 No. 1 pp. 1-35 DOI: https://doi.org/10.47164/ijngc.v14i3.1299 |
International Journal Next Gener. Comput |
- |
2021 |
Satnam Kaur, Lalit K Awasthi, Amrit L Sangal |
A Review on Software Refactoring Opportunity Identification and Sequencing in Object-oriented Software Vol. 14 No. 3 pp. 252-267 DOI: https://doi.org/10.2174/2352096513999200704140718 |
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) |
- |
2020 |
Satnam Kaur, Lalit K Awasthi, AL Sangal, Gaurav Dhiman |
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization Vol. 90, pp. 1-18. DOI: https://doi.org/10.1016/j.engappai.2020.103541 |
Engineering Applications of Artificial Intelligence |
- |
2020 |
Satnam Kaur, Lalit K Awasthi, AL Sangal |
HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems Vol. 37, pp. 3167–3203. DOI: https://doi.org/10.1007/s00366-020-00989-x |
Engineering with Computers |
- |
2020 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation Vol. 161, pp. 11-36. DOI: https://doi.org/10.1016/j.eswa.2020.113682 |
Expert Systems with Applications |
- |
2020 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
Evaluation of web service clustering using Dirichlet Multinomial Mixture model-based approach for Dimensionality Reduction in service representation Vol. 57, pp. 1-22. DOI: https://doi.org/10.1016/j.ipm.2020.102238 |
Information Processing & Management |
- |
2020 |
Abhilasha Sharma, Lalit Kumar Awasthi |
AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks Vol. 159, pp. 71-82. DOI : https://doi.org/10.1016/j.comcom.2020.05.013 |
Computer Communications |
- |
2020 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Game Theory-based Routing for Software-Defined Networks Vol. 12, pp. 1-48. DOI: https://doi.org/10.22214/ijraset.2020.32676 |
IJRASET, XII (8) (2020) |
- |
2019 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Laman: A supervisor controller based scalable framework for software defined networks Vol. 159, pp. 125-134. DOI : https://doi.org/10.1016/j.comnet.2019.05.003 |
Computer Networks |
- |
2019 |
Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli |
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation Vol. 10, pp. 1741-88. DOI: https://doi.org/10.1504/IJGUC.2019.100863 |
International Journal of Grid and Utility Computing |
- |
2019 |
Ashok Kumar Nanda, V. Sankiran, Vindya Gandam, and Lalit Kumar Awasthi |
ECDSA Security Protocol for WSBNs, Vol. 8, pp. 138-145. |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) |
- |
2018 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities Vol. 77, pp. 349-359. DOI : https://doi.org/10.1016/j.cose.2018.04.006 |
Computers & Security |
- |
2018 |
Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K Awasthi |
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks Vol. 15, pp. 1-20. DOI : 10.4018/IJWSR.2018040103 |
International Journal of Web Services Research (IJWSR) |
- |
2017 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Incentive based scheme for improving data availability in vehicular ad-hoc networks. Vol. 23, pp. 1-36. DOI: https://doi.org/10.1007/s11276-016-1246-7 |
Wireless Networks |
- |
2017 |
Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli, Divya Kapil |
A critical survey of live virtual machine migration techniques Vol. 6, pp. 1-44. DOI: https://doi.org/10.1186/s13677-017-0092-1 |
Journal of Cloud Computing |
- |
2016 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Priority based efficient data scheduling technique for VANETs, Vol. 22, pp 1641–1657. DOI: https://doi.org/10.1007/s11276-015-1051-8 |
Wireless Networks |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
Minimal marking of trap-regions for efficient greedy forwarding in wsns, Vol. 7, pp. 58-68. |
International Journal of Next-Generation Computing |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan: |
GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks. Vol. 7 No. 3 pp. 46-78 |
International Journal of Next-Generation Computing |
- |
2015 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks Vol. 21, pp. 15-26. DOI: https://doi.org/10.1007/s11276-014-0869-9 |
Wireless Networks |
- |
2015 |
Jawahar Thakur, Dr Arvind Kalia, & Dr. Lalit Kumar Awasthi |
Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review, Vol. 6, No. 2, pp. 140–152. https://doi.org/10.47164/ijngc.v6i2.81 |
International Journal of Next-Generation Computing |
- |
2015 |
Rakesh Nayak, Ashok Kumar Nanda, Lalit Kumar Awasthi |
Multiple Private Keys with NTRU Cryptosystem, Vol. 4, No. 3, pp. 250-255. |
International Journal of Research in Computer and Communication Technology (IJRCCT) |
- |
2013 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks. Vol. 45 pp. 75-96. DOI : https://doi.org/10.1504/IJCNDS.2014.060624 |
International Journal of Communication Networks and Distributed Systems |
- |
2013 |
Ankur Gupta, Lalit K Awasthi |
Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework Vol. 11, pp. 347-375. DOI : https://doi.org/10.1504/IJCNDS.2013.057716 |
International Journal of Communication Networks and Distributed Systems |
- |
2014 |
Prashant Kumar, Naveen Chauhan, LK Awasthi, Narottam Chand |
Cooperative Cache Replacement Policy for MANETs Vol. 6 No. 6 pp 1-12 DOI: 10.4018/ijapuc.2014040103 |
International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) |
- |
2014 |
Lalit K. Awasthi, Manoj Misra, R.C. Joshi |
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems. Vol. 12 No. 4 pp. 356-380 DOI: https://doi.org/10.1504/IJCNDS.2014.062226 |
International Journal of Communication Networks and Distributed Systems |
- |
2012 |
Abhishek Mohta, Ravi Kant Sahu, Lalit Kumar Awasthi |
Robust data security for cloud while using third party auditor Vol. 3, pp. 1-20. DOI: http://surl.li/niltc |
International journal of advanced research in computer science and software engineering |
- |
2012 |
Abhishek Mohta, Lalit Kumar Awasti |
Cloud data security while using third party auditor Vol.3, pp. 2229-5518. DOI: http://surl.li/nilth |
International Journal of Scientific & Engineering Research |
- |
2012 |
Manju Bala, Lalit Awasthi |
Proficient D-SEP protocol with heterogeneity for maximizing the lifetime of wireless sensor networks Vol. 25, pp. 1341-54. DOI : 10.5815/ijisa.2012.07.01.07
|
International Journal of Intelligent systems and applications |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
XTR Cryptosystem for SMS security Vol. 4, pp. 836-839.
|
International Journal of Engineering and Technology |
- |
2012 |
Rajesh Sharma, Lalit Kumar Awasthi |
A log-based recovery protocol for mobile distributed computing systems Vol. 1, pp. 138-147. DOI: https://doi.org/10.1166/jbic.2013.1021 |
Journal of Bioinformatics and Intelligent Control |
- |
2012 |
Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi |
Request Analysis and Dynamic Queuing System for VANETs Vol. 3, pp. 1-7. |
International Journal of Advanced Computer Science and Applications |
- |
2012 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
An efficient coordinated checkpointing approach for distributed computing systems with reliable channels Vol. 34, pp. 11-25. DOI: https://doi.org/10.2316/Journal.202.2012.1.202-2118 |
ACTA: International Journal of Computers and Applications |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
Secure SMS Encryption Using NTRU Cryptosystem. Vol. 7, No. 4, pp. 182-198. |
Journal of Information Assurance & Security |
- |
2012 |
Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi |
Request Analysis and Dynamic Queuing System for VANETs Vol. 3, pp. 192-198.
|
International Journal of Advanced Computer Science and Applications |
- |
2012 |
Ajay Guleria, Narottam Chand Kaushal, Lalit Kumar Awasthi: |
Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs Vol. 3 No. 3 pp 1-25
DOI: https://doi.org/10.47164/ijngc.v14i3.1299 |
International Journal. Next Gener. Comput. |
- |
2012 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
An efficient coordinated checkpointing approach for distributed computing systems with reliable channels Vol. 3, pp. 1341-54. DOI: https://doi.org/10.2316/Journal.202.2012.1.202-2118 |
International Journal of Computers and Applications |
- |
2012 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
Adaptive Time Synchronization for Homogeneous WSNs Vol. 14, pp. 1-18. DOI: https://hrcak.srce.hr/file/114170 |
International Journal of Engineering Business Management |
- |
2012 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand |
Cache replacement in mobile adhoc networks Vol. 02, pp. 22-38. DOI: 10.4018/jdst.2012040102 |
International Journal of Distributed Systems and Technologies (IJDST) |
- |
2011 |
Amit Nayyer, Meenakshi Nayyer, Lalit Kr Awasthi
|
A comparative study of time synchronization protocols in wireless sensor network Vol. 36, pp. 1341-54. |
International Journal of Computer Applications |
- |
2011 |
Siddhartha Chauhan, Lalit Awasthi |
TBEE: Tier based energy efficient protocol providing sink and source mobility in wireless sensor networks Vol. 8, pp. 281-291. |
International Journal of Computer Science Issues (IJCSI)
|
- |
2011 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
Cluster based task scheduling in wireless sensor network Vol. 33, pp. 38-43. |
International Journal of Computer Applications
|
- |
2011 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra |
Cooperative Caching in Mobile Ad Hoc Networks Vol. 3, pp. 1-16 DOI: 10.4018/jmcmc.2011070102
|
International Journal of Mobile Computing and Multimedia Communications (IJMCMC) |
- |
2011 |
Computing and Informatics |
Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives Vol. 30, pp. 559 - 594. |
A Gupta, Lalit Awasthi
|
- |
2011 |
Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh |
A Distributed Weighted Cluster Based Routing Protocol for MANETs Vol. 3 No.2 pp. 54-60 DOI: 10.4236/wsn.2011.32006 |
Wireless Sensor Network |
- |
2011 |
Ankur Gupta, Lalit K Awasthi |
Peers-for-peers (P4P): an efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications Vol. 6, pp. 202 - 228 DOI: https://doi.org/10.1504/IJCNDS.2011.038525 |
International Journal of Communication Networks and Distributed Systems |
- |
2011 |
Manju Bala, Lalit Awasthi |
Performance tradeoff with routing protocols for radio models in wireless sensor networks Vol. 2, pp. 53-59. DOI: http://dx.doi.org/10.4236/wet.2011.22008 |
Wireless Engineering and Technology |
- |
2011 |
Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand |
Enhancing Data Availability in MANETs with Cooperative Caching. Vol. 3 No .4 pp. 1-14 DOI: |
International Journal of Mobile Computing and Multimedia Communications (IJMCMC) |
- |
2010 |
Lalit K. Awasthi, Manoj Misra R.C. Joshi |
A weighted checkpointing protocol for mobile distributed systems. Vol.5 No.3 pp.137-149 DOI: https://doi.org/10.1504/IJAHUC.2010.032227 |
International Journal of Ad Hoc and Ubiquitous Computing |
- |
2010 |
Prashant Kumar, Naveen Chauhan, L K Awasthi, Narottam Chand |
Proactive approach for cooperative caching in mobile adhoc networks Vol. 7, pp. 21-27. |
International Journal of Computer Science Issues (IJCSI)
|
- |
2010 |
Kamal Kant, Lalit K Awasthi |
Unicast and Multicast Routing Protocols for MA-NETs: A Comparative Survey Vol. 101, pp. 1-8. |
International Journal of IT & Knowledge Management (IJITKM), Special issue |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra |
Global cluster cooperation strategy in mobile ad hoc networks Vol. 115, pp. 16. |
International Journal of Computer Science and Engineering |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misrah |
Energy efficient cooperative caching in mobile ad hoc networks Vol. 7, pp. 21-28. |
International Journal of Applied Engineering Research |
- |
2010 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
A weighted Check pointing protocol for mobile distributed systems Vol. 5, pp. 137-149. DOI: https://doi.org/10.1504/IJAHUC.2010.032227 |
International Journal of ad hoc and ubiquitous Computing |
- |
2010 |
Ankur Gupta, Lalit K Awasthi
|
Ind Net: towards a peer-to-peer community network that connects the information technology industry and academia in India Vol. 7, pp. 63-79. DOI: https://doi.org/10.1504/IJNVO.2010.029871 |
International Journal of Networking and Virtual Organisations |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
PArch: a cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival Vol. 5, pp. 102-110 .DOI: https://doi.org/10.1504/IJBIS.2010.029482 |
International Journal of Business Information Systems |
- |
2010 |
Kamal Kant Lalit K. Awasthi, |
Unicast And Multicast Routing Protocols for Manets: A Comparative Survey” Vol. 11, pp. 1-8. |
International Journal of IT & Knowledge |
- |
2010 |
Ankur Gupta, Lalit K. Awasthi |
Toward a Quality-of-Service Framework for Peer-to-Peer Applications. Vol.1 No.3 pp.1-23 DOI: 10.4018/jdst.2010070101 |
International Journal Distributed Syst. Technol. |
- |
2010 |
Ankur Gupta, Lalit K. Awasthi |
IndNet: towards a peer-to-peer community network that connects the information technology industry and academia in India. Vol.7 No.1 pp.63-79 DOI: https://doi.org/10.1504/IJNVO.2010.029871 |
International Journal of Networking and Virtual Organisations |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
A containment-based security model for cycle-stealing P2P applications Vol. 19, pp. 191-203. DOI: https://doi.org/10.1080/19393551003762207 |
Information Security Journal: A Global Perspective |
- |
2007 |
Lalit Kumar Awasthi, Prashant Kumar |
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approac h Vol. 3, pp. 298-314 DOI: https://doi.org/10.1504/IJICS.2007.013957 |
International Journal of Information and Computer Security |
- |
2006 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A Nonintrusive Hybrid Synchronous Checkpointing Protocol for Mobile Systems Vol. 52, pp. 247-54. |
IETE Journal of Research
|
- |
2006 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A hybrid coordinated checkpointing protocol for mobile computing systems Vol. 52, pp. 247-254 DOi: https://doi.org/10.1080/03772063.2006.11416461 |
IETE journal of research |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
A coordinated checkpointing protocol for mobile computing systems Vol. 52, pp. 1341-54. |
International Journal of information and computing science, Accepted for Publication |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Checkpointing Distributed Applications on Mobile Computers Vol. 34, pp. 40-51. |
Journal of Multidisciplinary Engineering and Technologies |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Hybrid and intrusive synchronous checkpointing protocols for mobile distributed systems Vol. 52, pp. 247-54. |
ACCST Journal of Research |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Non-intrusive C coordinated C heck pointing Protocol for Mobile C omputing Systems: A Critical Survey Vol. 51, pp. 485-490. |
ACCST Journal of Research |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Logging based coordinated check pointing in mobile distributed computing systems Vol. 51, pp. 485-490. DOI: https://doi.org/10.1080/03772063.2005.11416429 |
ACCST Journal of research |
- |
2005 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A low overhead Non-intrusive Hybrid Synchronous check pointing protocol for mobile systems Vol. 52, pp. 247-254. |
Journal of Multidisciplinary Engineering Technologies
|
- |
2005 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
Synchronous Check pointing Protocols for Mobile Distributed Systems: A Comparative Study Vol. 1, pp. 298-314. |
International Journal of information and computing science |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Pitfalls in Minimum-process Coordinated Check pointing protocols for Mobile Distributed Vol. 19, pp. 1015-1038.
|
ACCST Journal of Research |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Message Logging and Check pointing in Mobile Computing Vol. 51, pp. 485-90. |
Journal of Multi-disciplinary Engineering Technologies |
- |