Welcome to My Portfolio Page
Personal Information
Name
Dr. Lalit Kumar Awasthi
Designation
Professor
Phone
lalit@nith.ac.in
Google Scholar Link
Vidwan Link
For more details please visit the the Personal Details Section...
Faculty Portfolio
About Me
Prof. Lalit Kumar Awasthi, is presently Professor and Director at National Institute of Technology, Hamirpur since 10th October 2021 and he is serving as Professor, Computer Science and Engineering Department. He has been former Director at Dr. B. R. Ambedkar National Institute of Technology, Jalandhar from 10th October 2016 to 09th October 2021. He has been working as Director at various technical institutions since July 2012. While working as Director at NIT Jalandhar, Professor Awasthi had additional charge of Director NIT Delhi for about four months during which he enhanced the pace of construction and now he is also having additional charge of Director, National Institute of Technology, Hamirpur from August 14th, 2020 to 09th October 2021 His academic career spans for more than three decades in which he is involved in teaching-learning, laboratory development, infrastructure development, research and administration. He is the main architect of Computer Science and Engineering Department at National Institute of Technology, Hamirpur where he joined as founder faculty in August 1988. He had established the first computing facility at NIT Hamirpur. During his tenure as Head of Department at Computer Science and Engineering department the department could get a new building and all new laboratories were established. He also served as Head of Computer Centre and attributed in establishment of Voice and Data integrated network at NIT Hamirpur in 2002-03. As Head of CSE Department, he could initiate the process of starting M. Tech. programme in Computer Science and Engineering and also in Mobile Computing. Also, he proposed to start another M Tech programme in Cloud Computing at CSE department NIT Hamirpur. Prof. Awasthi also served as Dean (Students and Alumni) at the institute and initiated the process of having strong Alumni base of NIT Hamirpur. Many chapters were opened in most of the metro cities in India and even in abroad to strengthen the alumni base of the institute. He was entrusted with responsibility of establishing a new Government Engineering College, now known as Atal Bihari Vajpayee Govt. Institute of Engineering and Technology, Pragtinagar, INDIA by Govt. of Himachal Pradesh. Now, the institute is an AICTE approved technical institution of Himachal Pradesh Govt. and initially it was established with grant in aid of Rs. 15 Crores from Satluj Jal Vidut Nigam Limited, Shimla, India. Professor Awasthi has finalized the master plan of the campus and established the institution with its infrastructure for about four years. While at Pragtinagar he was having charge of Director of J N Govt. Engineering College, Sundernagar (HP) for almost two years. For a small period, he also served as Founder Director of Mahatma Gandhi Govt. Engineering College, Jeori, Rampur, Shimla, Himachal. Professor Lalit K Awasthi also served as Dean of Academics at HP Technical University Hamirpur where he was instrumental in finalization of curriculum of various BTech and MTech courses, process of affiliation and finalization of the ordinances of the University. He joined NITJ in October 2016 and initiated many reforms in academics, research, Teaching, recruitment, Internationalization of institute, MoU with International and National Institutes and Alumni interactions which led to 52nd rank in NIRF ranking in 2020 out of 12000 + institutions. Professor Awasthi has excellent international exposure as he has visited University of California Berkley, USA, Stanford University, USA, University of Newcastle upon Tyne UK, University of Technology Sydney, Australia, University of Melbourne, Australia, University of Missouri Kansas USA and University of Florence Italy.
Personal Details
Name | Dr. Lalit Kumar Awasthi |
Designation | Professor |
Department | Computer Science & Engineering |
Qualification | PhD |
Specilization | Mobile distributed systems, Fault tolerance, Sensor Networks, P2P networks, Network Security. |
Phone Office | 01972-254420 |
Mobile | |
Email ID | lalit@nith.ac.in |
Google Scholar | |
Vidwan Link | |
Publon Link | |
Youtube | |
Tumblr | |
Researchgate | |
Orcid | |
Linked In | |
Other |
Education Qualification
Degree Name | Passed in Year | Institute | Remarks(if any) |
---|---|---|---|
B.Tech. | 1998 | Shivaji University | |
M.Tech. | 1993 | IIT Delhi | |
PhD | 2003 | IIT Roorkee |
Teaching Experience
Position Held | Organization | From Date | To Date | Remarks |
---|
Administrative Experience
Position Held | Organization | From Date | To Date | Remarks(if any) |
---|
Research Experience
Research Experience | REsearch Statements | Remarks |
---|
Research Projects
Role | Project Type | Title | Funding Agency | From Date | To Date | Amount | CO PI | Current Status |
---|
Research Supervision
Programe Name | Scholar Name | Research Project Topic | Status | Co-Supervisor | Year | Remarks |
---|---|---|---|---|---|---|
Ph.D | Urvashi Garg | Analysis and Design of a Hybrid Model to optimize and Prioritize Attack Graphs for Cyber Warfare | Completed | Dr Geeta Sikka | 2019 | |
Ph.D | Rajesh Sharma | Energy Efficient Data Dissemination in WSNs | Completed | Dr. Narottam Chand | 2017 | |
Ph.D | Jawahar Thakur | Devising Checkpointing Protocol For Wireless Adhoc Networks | Completed | Dr. Arvind Kalia | 2016 | |
Ph.D | Ashok Kumar Nanda | Efficient Protocols for Security In Mobile Environment | Completed | None | 2015 | |
Ph.D | Manju Bala | Proficient Protocols for Wireless Sensor Networks | Completed | None | 2013 | |
Ph.D | Ajay Gularia | Efficient Data Dissemination in VANETs | Completed | Dr. Narottam Chand | 2013 | |
Ph.D | Siddartha Chauhan | Energy Efficient Data Gathering and Time Synchronization Protocols for Wire less Sensor Networks | Completed | None | 2013 | |
Ph.D | Naveen Chauhan | Data Caching In Mobile Ad Hoc Network. | Completed | Dr. Narottam Chand | 2012 | |
Ph.D | Yash Pal | Design of Efficient and Power Aware Object Tracking and Routing Protocol for Wireless Sensor Network | Completed | Dr. Amarjit Singh | 2011 | |
Ph.D | Ankur Gupta | Peer Enterprises: Extending the Power of P2P Computing Across Organisations | Completed | None | 2009 | |
Ph.D | Amit Nayyer | Software Defined Network: A Scalability Framework with Enhanced Protocol | Completed | Dr. Aman Sharma | 2021 | |
Ph.D | Satnam Kaur | Refactoring Opportunity Identification and Sequencing Using Dynamic Analysis | Completed | Prof. A L Sangal | 2021 | |
Ph.D | Abhilasha Sharma | Reliable information dissemination in Heterogeneous vehicular networks | Completed | None | 2021 | |
Ph.D | Neha Agarwal | Design of an efficient web service clustering model using machine and deep learning | Completed | DR GEETA SIKKA, Dr. Shelly Sachdeva | 2021 | |
Ph.D | Ms. Neha Bansal | Data Modelling and Database Migration for NoSQL Data Base | Completed | Prof. Lalit K. Awasthi, Dr. Shelly Sachdeva | 2024 | |
Ph.D | Shailza Kanwar | Design and Development of Cross-Project Defect Prediction Model for Software Testing using Machine Learning | Completed | Prof. Lalit K. Awasthi, Prof. Vivek Shrivastava | 2024 |
Conference Publication
Year | Conference Name | First Author | Other Author | Publication | Remarks |
---|---|---|---|---|---|
2010 | International Conference on Computational Intelligence and Communication Networks | - | Stable link based multicast routing scheme for MANET | ||
2009 | National Conference FCPC’ 09 at H.I.E.T, Kaithal | Lalit Kumar Awasthi | Multicast Routing Protocol for MANET: A Survey | ||
2008 | National Conference on Emerging Trends in Computing and Communication (ETCC’08) Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh | Lalit Kumar Awasthi ,Kamal Kant | Molecular modelling study of Mitrxantrone and its Analogues with D-5’ ACGG 3’ DNA Tetrameric Sequence | ||
2008 | National Conference on Emerging Trends in Computing and Communication (ETCC’08) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh | Lalit Kumar Awasthi | Interfacing of Phonocardiogram with Mobile Devices | ||
2013 | International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Year 2013, Pages 706-718 | Lalit Kumar Awasthi | A proposal for SMS security using NTRU cryptosystem | ||
2018 | International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness | Lalit Kumar Awasthi | A proposal for SMS security using NTRU cryptosystem | ||
2019 | IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) | Nanda, Ashok Kumar, Lalit Kumar | Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment | ||
2019 | International Conference on Intelligent Communication and Computational Techniques (ICCT) | Awasthi, Lalit Kumar; Ashok Kumar Nanda | An empirical enhancement using scale invariant feature transform in text extraction from images | ||
2017 | International Conference on Next Generation Computing and Information Systems (ICNGCIS) | Choudhary, Anita;Govil, Mahesh Chandra;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S. | Comprehensive survey on petya ransomware attack | ||
2018 | First International Conference on Secure Cyber Computing and Communication (ICSCCC) | Kirti Kaur Sahota ,Harsh Kumar Verma, Awasthi, Lalit K. | Sentiment Analysis Approach Based on N-gram and KNN Classifier | ||
2018 | First International Conference on Secure Cyber Computing and Communication (ICSCCC) Jalandhar, India | Aidan, Jagmeet Singh;Verma, Harsh Kumar;Awasthi, Lalit Kumar | A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks | ||
2016 | Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) | Kaur, Sumandeep;Sikka, Geeta;Awasthi, Lalit Kumar | Workflow scheduling algorithms in cloud environment: A review, taxonomy, and challenges | ||
2017 | IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India | Sharma Abhilasha;Awasthi, Lalit Kumar | Improved Virtual Machine Migration Approaches in Cloud Environment | ||
2016 | Third International Conference on Image Information Processing (ICIIP) | Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. | Cluster-based coordinated checkpointing protocol in wireless ad-hoc networks | ||
2016 | Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India | Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K.;Pilli, E. S.;Kumar, Nitin | Energy-efficient resource allocation approaches with optimum virtual machine migrations in cloud environment | ||
2014 | International Conference on Information and Communication Technology for Competitive Strategies | Thakur, Jawahar;Kalia, Arvind;Awasthi, Lalit Kumar | NRNDD: Nearest Relay Node based Data Dissemination Technique for VANETs | ||
2012 | International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) Ghaziabad, India | Choudhary, Anita;Govil, M. C.;Singh, Girdhari;Awasthi, Lalit K. | An energy efficient grid based Data Dissemination routing mechanism to mobile sinks in Wireless Sensor Network | ||
2011 | International Conference on Communication Systems and Network Technologies, Katra, India | Dubey, Brij Bihari;Chauhan, Naveen;Chand, Narottam;Awasthi, Lalit Kr | Enhancing Cache Invalidation Techniques in IVANET | ||
2011 | International Conference on Communication Systems and Network Technologies, Katra, India | Ravi Kant Sahu, Abhishek Mohta, LK Awasthi | Voronoi-based Continuous Query Processing for Mobile Users | ||
2011 | Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011 | Singh, Anurag;Chand, Narottam;Awasthi, Lalit Kr | NILDD: nearest intersection location dependent dissemination of traffic information in VANETs | ||
2007 | International Conference on Information Systems and Technology | Awasthi, Srikanth R.L.K. | Enhanced Query Processing Technique for Location based Services | ||
2008 | 16th IEEE International Conference on Networks, New Delhi, India | Dubey, Brij Bihari;Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam | NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networks | ||
2008 | Proceedings of the 2008 International Conference on Grid Computing & Applications, GCA 2008, Las Vegas, Nevada, USA, July 14-17, 2008 | Srikanth. RL. K. Awasthi | Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments. | ||
2011 | International Siberian Conference on Control and Communications (SIBCON), Krasnoyarsk, Russia | Gupta, Ankur;Malhotra, Deepti;Awasthi, Lalit K. | Joint Channel Coding and Cryptography for SMS | ||
2011 | 3rd International Conference on Electronics Computer Technology, Kanyakumari, India | Gupta, Ankur;Awasthi, Lalit K. | A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks | ||
2011 | Proceedings of the 2011 International Conference on Communication, Computing & Security | Nanda, Ashok Kumar;Awasthi, Lalit Kumar | A cooperative caching strategy in mobile ad hoc networks based on clusters | ||
2011 | International Conference on Communication Systems and Network Technologies, Katra, India | Ram, Babu;Chauhan, Naveen;Chand, Narottam;Awasthi, L. K. | Data Caching with Intelligent Prefetching in Mobile Ad Hoc Networks | ||
2011 | International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Udaipur, India | Chauhan, Naveen;Awasthi, Lalit Kumar;Chand, Narottam;Joshi, R. C.;Mishra, Manoj | Performance comparisons and scheduling of load balancing strategy in Grid Computing | ||
2009 | 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), Bangalore, India | Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam | Peer enterprises: A viable alternative to Cloud computing? | ||
2009 | 2009 IEEE International Advance Computing Conference, Patiala, India | Amrik Singh, Lalit K Awasthi | Wait and Watch Technique: Removing Time synchronization overhead in Wireless Sensor Network | ||
2008 | 16th IEEE International Conference on Networks, New Delhi, India | Gupta, Ankur;Awasthi, Lalit K. | Enhanced AODV routing protocol for Ad hoc networks | ||
2009 | IEEE International Advance Computing Conference, Patiala, India | Nayyer, Amit;Sharma, Rajesh;Nayyer, Meenakshi;Awasthi, Lalit Kumar | Maximize the Lifetime of Object Tracking Sensor Network with Node-to-Node Activation Scheme | ||
2009 | First Asian Himalayas International Conference on Internet, Kathmundu, Nepal | Agarwal, Khushboo;Awasthi, Lalit Kumar | Cooperative data caching with prefetching in mobile ad-hoc networks | ||
2007 | National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh | Pal, Yash;Awasthi, Lalit K.;Singh, A. J. | New Routing Protocol for Wireless Sensor Networks | ||
2007 | National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh | Chauhan, Naveen;Awasthi, L. K.;Chand, Narottam | Data Indexing and Scheduling for Heterogeneous Multiple Broadcast Channels | ||
2007 | National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh | Lalit Kumar Awasthi | Data Replication in Mobile Ad hoc Networks | ||
2006 | National Conference on Innovative Applications of IT and Management for Economic Growth of India at Apeejay Institute of Management, Jalandhar, Punjab | Lalit Kumar Awasthi | Fault Tolerance, Checkpointing and Ad-Hoc Networks | ||
2021 | The International Conference on Recent Innovations in Computing | Lalit Kumar Awasthi | Web Service Clustering Approaches to Enhance Service Discovery: A Review | ||
2021 | In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 546-550). IEEE. | Lalit Kumar Awasthi | Big Data Storage and Decentralization: A Review. | ||
2021 | In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 212-217). IEEE. | Agarwal N., Sikka G., Awasthi L.K. | Divergent applications of Blockchain Security: A Survey | ||
2020 | International Conference on Innovative Computing and Communications (pp. 947-962). | Sharma, P., & Awasthi, L. K. | Gender and Age Estimation from Gait: A Review | ||
2019 | In International Conference on Futuristic Trends in Networks and Computing Technologies (pp. 673-685). | Sharma, V., & Awasthi, L. K. | Techniques for Task Scheduling in Cloud and Fog Environment: A Survey | ||
2018 | First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 333-339). IEEE. Jalandhar, India | Islam, T. U., Awasthi, L. K., & Garg, U | A Study of Performance Evaluators for Software Defined Networking | ||
2018 | First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 1-4). IEEE. | Singh, R. M., Awasthi, L. K., & Sikka, G | Sentiment Analysis Approach Based on N-gram and KNN Classifier | ||
2018 | First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 556-560). IEEE. | Nayyer, A., Sharma, A. K., & Awasthi, L. K. | A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks | ||
2019 | In Proceedings of 2nd International Conference on Communication, Computing and Networking (pp. 989-997). Springer, Singapore. | Kaur, S., Sikka, G., & Awasthi, L. K | Issues in Software Defined Networking | ||
2018 | IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 968-973). IEEE. | Sharma, A., & Awasthi, L. K. | Task clustering-based Energy-aware Workflow Scheduling in Cloud environment | ||
2017 | International Conference on Intelligent Communication and Computational Techniques (ICCT) (pp. 228-232). IEEE. | Nayyer, A., Sharma, A. K., & Awasthi, L. K. | An empirical enhancement using scale invariant feature transform in text extraction from images | ||
2017 | International Conference on Next Generation Computing and Information Systems (ICNGCIS) (pp. 122-125). IEEE. | Choudhary, A., Govil, M. C., Singh, G., Awasthi, L. K., & Pilli, E. S. | Comprehensive Survey on Petya Ransomware Attack | ||
2017 | Computer Communication, Networking and Internet Security (pp. 461-470). Springer, Singapore. | Sahota, K. K., Awasthi, L. K., & Verma, H. K. | Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks | ||
2016 | Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 617-624). IEEE. | Aidan, J. S., Verma, H. K., & Awasthi, L. K. | Workflow scheduling algorithms in cloud environment: A review, taxonomy, and challenges | ||
2016 | International conference on cloud computing in emerging markets (CCEM) (pp. 17-24). IEEE. | Sharma, R., Awasthi, L. K., & Chauhan, N. | Improved Virtual Machine Migration Approaches in Cloud Environment | ||
2015 | International Conference organized by (CMAI) and in academic participation with HELP University of Malaysia in Kulalalumpur, Malaysia | Choudhary, A., Govil, M. C., Singh, G., & Awasthi, L. K. | Checkpointing based Rollback Recovery Techniques in Wireless Ad-hoc Networks | ||
2015 | Third International Conference on Image Information Processing (ICIIP) (pp. 220-224). IEEE. | Choudhary, A., Govil, M. C., Singh, G., Awasthi, L. K., Pilli, E. S., & Kumar, N. | Cluster based coordinated Checkpointing in Wireless Adhoc Network | ||
2014 | International Conference on Internet Computing and Information Communications (pp. 251-256). Springer, New Delhi. | Thakur Jawahar, Kalia Arvind and Awasthi Lalit | A Review Paper on IEEE 802.11 WLAN | ||
2014 | International Conference on Internet Computing and Information Communications (pp. 103-110). Springer, New Delhi. | Thakur, J., Kalia, A., & Awasthi, L. K. | Solutions for security in mobile agent system | ||
2013 | International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (pp. 706-718). Springer, Berlin, Heidelberg. | Singh, V., & Awasthi, L. K. | A Proposal for SMS Security Using NTRU Cryptosystem | ||
2012 | 2nd International Conference on Advances in Engineering and Technology-ICAET-2012 at Chennai | Dayal, N., & Aswathi, L. K. | Grid Based Data Dissemination Scheme for Handling Sink Mobility in Wireless Sensor Networks | ||
2012 | IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), iRAFIT (7) (pp. 23-27). | Nanda, A. K., & Awasthi, L. K. | Energy-efficient grid-based data dissemination in wireless sensor networks | ||
2012 | International Conference on Latest Computational Technologies (pp. 85-89). | Ravi Kant Sahu, Abhishek Mohta, and Lalit Kumar Awasthi | Cluster Based Efficient Caching Technique for Wireless Sensor Networks | ||
2012 | International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE‟ 2012) (pp. 24-25). | Sahu, R. K., Mohta, A., & Awasthi, L. K. | Prefetching based Cooperative Caching in Mobile Adhoc Networks | ||
2012 | 1st International Conference and 5th CSI National Conference on Education & Research (confER-2012) at Lingaya’s University, Faridabad | Chauhan, N., Awasthi, L. K., & Chand, N. | Robust Data Integration while using Third Party Auditor for Cloud Data Storage Services | ||
2012 | IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. (pp. 8-pp). IEEE. | Chauhan, N., & Awasthi, L. K. | Data dissemination to mobile sinks in wireless sensor networks: an information theoretic approach. | ||
2011 | International Conference on Advanced Computing, Networking and Security (pp. 375-380). Springer, Berlin, Heidelberg. | Abhishek Mohta, Ravi Kant Sahu, LK Awasthi | Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering | ||
2011 | World Congress on Information and Communication Technologies (pp. 235-239). IEEE,.Mumbai, India | Ammari, H. M., & Das, S. K. LK Awasthi | Global cooperative caching for Wireless Sensor Networks | ||
2011 | World Congress on Information and Communication Technologies (pp. 1282-1287). IEEE, Mumbai, India. | Lakshmi Priya M.Lalit K. Awasthi | Encryption based channel coding algorithm for secure SMS | ||
2011 | International Siberian Conference on Control and Communications (SIBCON) (pp. 51-55). IEEE. | Chauhan, N., Awasthi, L. K., & Chand, N. | Joint Channel Coding and Cryptography for SMS | ||
2011 | International Conference on Communication Systems and Network Technologies, Katra, India | Nanda, A. K., & Awasthi, L. K. | Enhancing Cache Invalidation Techniques in IVANET | ||
2011 | International Conference on Contemporary Computing (pp. 415-425). Springer, Berlin, Heidelberg. | Nanda, A. K., & Awasthi, L. K. | Efficient VANET - based Traffic Information Dissemination using Centralized Fixed Infrastructure | ||
2011 | International Conference on Contemporary Computing (pp. 395-402). Springer, Berlin, Heidelberg. | Anurag Singh, Narottam Chand and Lalit Awasthi | Improving Fading Aware Routing with Circular Cache Layers in Wireless Sensor Networks | ||
2011 | International Conference on Advances in Computing and Communications (pp. 609-614). Springer, Berlin, Heidelberg. | Dubey, B. B., Chauhan, N., Awasthi, L. K., Chand, N., & Pant, S. | Cache Invalidation for Location dependent and independent data in IVANETS | ||
2011 | International Conference on High Performance Architecture and Grid Computing (pp. 594-602). Springer, Berlin, Heidelberg. | Pant, S., Chauhan, N., Chand, N., Awasthi, L. K., & Dubey, B. B. | Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks | ||
2011 | International Conference on Mobile Communications, Networking and Applications (MobiCONA 2011) Singapore | Singh, A., Chand, N., & Awasthi, L. K. | Cooperative Caching and Replacement in MANETs | ||
2011 | International Conference on Communication Systems and Network Technologies (pp. 71-75). IEEE. | Chauhan, N., Awasthi, L. K., & Chand, N. | Data Caching with Intelligent Prefetching" in Mobile Ad Hoc Networks | ||
2011 | International Conference on Communication Systems and Network Technologies (pp. 139-143). IEEE. | Narottam Chand, Naveen Chauhan and Lalit Kumar Awasthi | Voronoi-based continuous query processing for mobile users | ||
2011 | International Conference on Communication Systems and Network Technologies (pp. 135-138). IEEE. | Chauhan, N., Awasthi, L. K., & Chand, N. | Enhancing Cache Invalidation Techniques in IVANET | ||
2011 | International Conference on Communication Systems and Network Technologies (pp. 71-75). IEEE. | Srikanth, R., & Awasthi, L. K. | Data Caching with Intelligent Prefetching in Mobile Ad Hoc Networks | ||
2011 | International Conference on Advanced Computing, Communication and Networks [ICACCN-11] at Hotel Aroma, Chandigarh, India | Singh, A., Chand, N., & Awasthi, L. K. | A Novel approach for query processing in Location based services | ||
2011 | 2nd International Conference on Information Systems and Technology (ICIST – 2011) and MES Journal of Technology and Management, pp. 93-98 | Chauhan, N., Awasthi, L. K., & Chand, N. | Privacy for mobile users in Location-Based Services | ||
2011 | International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 438-443). IEEE. | L. K. Awasthi, R. Srikanth | Performance comparisons and scheduling of load balancing strategy in Grid Computing | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 235-240, NIT Hamirpur, India. | Srikanth. R and Lalit Kumar Awasthi | Integrated Push Pull Algorithm with Accomplishment Assurance in VANET | ||
2011 | 3rd International Conference on Electronics Computer Technology (Vol. 4, pp. 250-253). IEEE. | Singh, A., & Awasthi, L. K. | A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks | ||
2011 | 3rd International Conference on Electronics Computer Technology (Vol. 4, pp. 250-253). IEEE. | Ajay Guleria, Narottam Chand and Lalit Awasthi | A New Mechanism to Query Latency Minimization for Cache Invalidation in Vehicular Ad Hoc Network (VANETs) | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 296-303, NIT Hamirpur, India. | Ram, B., Chauhan, N., Chand, N., & Awasthi, L. K. | SMS Security | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 42-47, NIT Hamirpur, India. | Ram, B., Chauhan, N., Chand, N., & Awasthi, L. K. | TDMA Based MAC Layer Protocols for Wireless Sensor Networks: A Survey | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 112-117, NIT Hamirpur, India. | Ashok Kumar Nanda and Lalit Awasthi | Node Security in the WSN using Quantum Cryptography | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 132-138, NIT Hamirpur, India. | Siddhartha Chauhan, Lalit Awasthi and Sumit Kumar | A Review of Routing Protocols on Wireless Sensor Networks | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 149-155, NIT Hamirpur, India. | Anurag Singh, Srikanth R. and Lalit Awasthi | A Cooperative Caching Strategy in Wireless Sensor Networks | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 156-160, NIT Hamirpur, India. | Abhishek Mohta, Ravi Kant Sahoo and Lalit Awasthi | Privacy in Location-Based Services for Mobile Users | ||
2011 | Electronics Computer Technology (ICECT), 2011 3rd International Conference on Volume: 4 | Sudhanshu Pant, Naveen Chauhan, Lalit Awasthi and N. Chand | A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 181-185, NIT Hamirpur, India. | Srikanth R. Anurag Singh and Lalit Awasthi | Push-Pull Queue Dependent Data Dissemination in VANETs | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 186-191, NIT Hamirpur, India. | Babu Ram, Naveen Chauhan, Narottam Chand and Lalit Awasthi | A Survey on Energy Efficient Routing in Wireless Sensor Networks | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 206-215, NIT Hamirpur, India. | BB Dubey, Naveen Chauhan, Lalit Awasthi and Narottam Chand | A Log Based Recovery Protocol for Mobile Distributed Computing Systems | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 591-597, NIT Hamirpur, India. | Yash Pal, AJ Singh and Lalit Awasthi | Analytical Study of Cross Site Scripting (XSS) | ||
2011 | International Conference on Advances in Computing and Communication (ICACC), pp. 192-196, NIT Hamirpur, India. | Rajesh Sharma and Lalit Awasthi | Mobile ICT Learning Using Advanced Technology | ||
2011 | International Conference on Advances in Communication, Network, and Computing (pp. 628-630). Springer, Berlin, Heidelberg. | Prashant Jain, Kamal Kant, Mohit Batra and Lalit Awasthi | Cooperative Caching Strategy in Mobile Ad Hoc Networks | ||
2011 | International Conference on Digital Convergence (ICDC - 2011) at Chennai, India, pp. 364 – 367 | Ashok Kumar Nanda and Lalit Awasthi | Proposal for Enhancing The Security System of SEESMS | ||
2011 | International Conference on Communication, Computing & Security (pp. 96-99). | Chauhan, N., Awasthi, L. K., & Chand, N. | NILDD- Nearest Intersection Location Dependent Dissemination of Traffic Information in VANETs | ||
2011 | International Conference on Communication, Computing & Security (pp. 17-20). | Ashok Kumar Nanda and Lalit Kumar Awasthi | A Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters | ||
2011 | International Conference on Information Systems and Technology(ICIST), 2011 Proceedings published by International Journal of Computer Applications | Dubey, B. B., Chauhan, N., & Awasthi, L. K. | Enhanced Query Processing Technique for Location based Services | ||
2010 | International Conference on Industrial Electronics, Control and Robotics (pp. 263-268). IEEE. | Chauhan, N., Awasthi, L. K., Chand, N., Joshi, R. C., & Mishra, M. | Energy efficient protocol for providing QoS for Wireless Sensor Network | ||
2010 | 3rd National Conference on Next-Generation Computing and Information Systems (NGCIS'10) at Model Institute of Engineering & Technology, Kot Bhalwal, Jammu, India | Lalit Kumar Awasthi | Node Authentication in WSN using Quantum Cryptography | ||
2010 | 3rd National Conference on Next-Generation Computing and Information Systems (NGCIS'10) at Model Institute of Engineering & Technology, Kot Bhalwal, Jammu, India | Chaurasia, S., Chauhan, S., & Awasthi, L. K. | Providing Security in WSN using mobile Agents | ||
2010 | International Conference on Advances in Communication, Network, and Computing (pp. 147-151). Springer, Berlin, Heidelberg. | Anurag Singh, Srikanth R and Lalit Kumar Awasthi | A Distributed Weighted Cluster Based Routing Protocol for MANETs | ||
2010 | International Conference on Advances in Communication, Network, and Computing (pp. 248-252). IEEE Computer Society. | Srikanth R, Anurag Singh and Lalit Kumar Awasthi | A Multicast Routing Protocol for MANETS Based on Node Stability | ||
2010 | 3rd International Conference Transport Science and Technology Congress (TRANSTEC 2010), New Delhi | Chauhan, N., Awasthi, L. K., Chand, N., & Chugh, A. | Efficient Traffic Protocol for Highly Populated Cities | ||
2010 | International Conference on Data Management (ICDM 2010) at Institute of Management Technology (IMT) Ghaziabad, UP, India, pp. 46-59 | Kant, K., & Awasthi, L. K. | QoS in Wireless Sensor Network with Node-to-Node Activation Scheme | ||
2010 | International Conference on Advance Computing and Creating Entrepreneurs (ICOACCE’10), Udaipur, India | Kamal Kant and Lalit Awasthi | P2P To Grid Computing: Possibilities, Challenges and Solutions | ||
2010 | International Conference on Recent Trends in Soft Computing and Information Technology (RTSCIT-09), pp. 405 - 411 Bhopal, India | Yash Pal, A. J. Singh and Lalit Kumar Awasthi | A Survey on Routing Protocols for MANETs and Comparisons | ||
2009 | 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing - Symposium on Adaptive Sensing, Control, and Optimization in Sensor Networks (ISSNIP 2009) at Melbourne, Australia | Amrik Singh and Lalit Awasthi | Energy Efficient Object Tracking Sensor Network | ||
2009 | International Conference on Global Computing and Communication, pp. 13-18 | Kamal Kant and Lalit Awasthi | Data Aggregation in Object Tracking Sensor Network with Node-to-Node Activation Scheme | ||
2009 | International Conference on Pervasive Computing and Governance (ICPCG 09) | Yash Pal, Lalit Kumar Awasthi and A. J. Singh | Research Directions in Mobile Databases | ||
2009 | In 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA) (pp. 1-6). IEEE. | Yash Pal, Lalit Kumar Awasthi and A. J. Singh | Peer Enterprises: A Viable Alternative to Cloud Computing? | ||
2009 | International Conference on frontiers in prevention, diagnosis and therapy of cancer (FPDTC – 2009) at Department of Pathology, Moti Lal Nehru Medical College, Allahabad, India | Devendra Kumar Jain, Lalit Kumar Awasthi and Manish Kumar Yadav | A comparative molecular modeling study of mitoxantrone and its analogues with 5’-CCCGGG-3’ and 5’-ATCGAT-3’ DNA hexamer sequences | ||
2009 | In International Conference on Contemporary Computing (pp. 422-433). Springer, Berlin, Heidelberg. | Gupta, A., & Awasthi, L. K. | Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions | ||
2009 | In 2009 First Asian Himalayas International Conference on Internet (pp. 1-4). IEEE. | Pamita Awasthi, Shilpa Dogra, Lalit Kumar Awasthi and Ritu Barthwal | Cooperative Data Caching with Prefetching in Mobile Ad-Hoc Networks | ||
2009 | International Conference on Bioinformatics & Computational Biology, BIOCOMP 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes | Gupta, A., & Awasthi, L. K. | Interactions of Mitoxantrone and its Analogues with DNA Tetramer Sequences- A Molecular Modeling Study. | ||
2009 | IEEE International Conference on Advanced Computing, pp. 3543–3548. IEEE Press, Los Alamitos (2009) | Chauhan, N., Awasthi, L. K., & Chand, N. | Peer Enterprises: Enabling Advanced Computing and Collaboration Across Organizations | ||
2009 | IEEE International Advance Computing Conference (pp. 1141-1145). IEEE. | Awasthi, P., Dogra, S., Awasthi, L. K., & Barthwal, R. | Wait and Watch Technique: Removing Time synchronization overhead in Wireless Sensor Network | ||
2009 | In 2009 IEEE International Advance Computing Conference (pp. 1200-1205). IEEE | Gupta, A., Awasthi, L.K. Awasthi | Maximize the Lifetime of Object Tracking Sensor Network with Node-to-Node Activation Scheme | ||
2008 | In 2008 16th IEEE International Conference on Networks (pp. 1-6). IEEE. | Nayyer, A., Sharma, R., Nayyer, M., & Awasthi, L. K. | NeighborTrust: A Trust-based Scheme for Countering Distributed Denial-of-Service Attacks in P2P Networks | ||
2008 | In 2008 16th IEEE International Conference on Networks (pp. 1-5). IEEE. | Pal, Y., Awasthi, L. K., & Singh, A. J. | Enhanced AODV routing protocol for Ad hoc Networks | ||
2008 | International Conference and Symposium on Storage Technologies (ICSST) at NMAM Institute of Technology, NITTE, Mangalore, Karnataka | Gupta, A., Malhotra, D., & Awasthi, L. K. | PStore: A Scalable Peer-to-Peer Based Data Storage Framework | ||
2008 | International Conference on Wireless Networks & Embedded Systems (WECON 2008), pp. 235-237, Chitkara Institute of Engineering & Technology, Rajpura, Patiala, India | Agarwal, K., & Awasthi, L. K. | Hybrid Multicast Routing Protocol for MANENTs using Multipoint Relay | ||
2008 | International Conference on Wireless Networks & Embedded Systems (WECON 2008), pp. 182-184, Chitkara Institute of Engineering & Technology, Rajpura, Patiala, India | Ankur Gupta and Lalit. Awasthi | Node-to-node Activation Scheme for Energy Saving in Object Tracking Sensor Networks | ||
2008 | International Conference on Data Management (ICDM’08), pp. 622-630, Institute of Management Technology (IMT) Ghaziabad, UP, India | D. K. Jain and Lalit Awasthi | Parch: A Peer-to-Peer Based Email Archival Application | ||
2007 | In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems" (pp. 1011-1020). Springer, Berlin, Heidelberg. | Yash Pal, Lalit Awasthi, and A.J. Singh | Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization | ||
2007 | International Conference on Information Processing (ICIP), pp. 288 - 297 | Ankur Gupta and Lalit Awasthi | Challenges in Check pointing Ad hoc Networks | ||
2007 | Proceedings of the 2007 International Conference on Grid Computing & Applications, GCA 2007, Las Vegas, Nevada, USA, June 25-28, 2007 | Gupta, A., & Awasthi, L. K. | P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P applications. | ||
2007 | International Conference on Network Security (ICON’07) | Lalit Kumar Awasthi | A Secure and Highly Available Architecture for SNMP Based Monitoring of Network Devices | ||
2006 | Asian Conference on Intelligent Systems & Networks (AISN-2006), pp. 250 - 258 | Gupta, A., & Awasthi, L. K. | Mobility Management in Mobile Computing Environments | ||
2006 | International Conference on Wireless Communication and Sensor Network (WCSN) at IIIT- Allahabad | Lalit Awasthi, Ankur Gupta and Nimrita Koul | Minimum-Process Coordinated Checkpointing Scheme for Mobile Computing Environments | ||
2005 | In 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005. (pp. 491-495). IEEE. | Kuldeep Singh, R. B. Patel and Lalit Kumar Awasthi | A Non-Intrusive Minimum Process Synchronous Checkpointing Protocol for Mobile Distributed Systems | ||
2003 | In Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405) (pp. 686-688). IEEE. | Parveen Kumar, Lalit Kumar Awasthi, R. K. Chauhan and A. Nayyer | Low overhead Optimal Check pointing for Mobile Distributed Systems | ||
2002 | International conference on High Performance Computing (HiPC) at Bangalore, India | Kumar, P., Kumar, L., Chauhan, R. K., & Gupta, V. K. | Non-intrusive Recovery in Mobile Distributed Systems | ||
2002 | International Conference on Modelling Techniques and Tools for Computer Performance Evaluation (pp. 279-288). Springer, Berlin, Heidelberg. | Kumar, L., Mishra, M., & Joshi, R. C. | Analysis of a Transaction System with Check pointing, Failures and Rollback | ||
2002 | International Conference on Computer Applications in Electrical Engineering (CERA-2002) at Indian Institute of Technology, Roorkee | Lalit Kumar Awasthi, M. Misra and R.C. Joshi | Checkpointing and Recovery for Mobile Distributed Systems: A New Approach | ||
2000 | International conference on Advances in computing and Communication (ADCOM-2000) Cochin, India | Kumar, L., Misra, M., & Mitrani, I. | Probabilistic Check pointing and Recovery for Mobile Distributed Systems | ||
1996 | International Conference on Cognitive Systems at Delhi, India | Lalit Kumar Awasthi, M. Misra and R.C. Joshi | Digital Multimedia & Virtual Reality |
Journal Publications
Year | Authors | Journal Name | Title | Volume No | Indexed in |
---|---|---|---|---|---|
2023 | Rohit Singh, Lalit Kumar Awasthi, Kp Sharma | Adhoc & Sensor Wireless Networks | EEDF: Enhanced Encryption Decryption Framework for Device Authentication in IoT. Vol. 56, No. 3, pp. 163-184. | - | |
2023 | Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi | Computer Science Review | A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns Vol. 50 pp.1-26. DOI: https://doi.org/10.1016/j.cosrev.2023.100591 | - | |
2023 | Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi | The Journal of Supercomputing | Schema generation for document stores using workload-driven approach Vol.4 pp. 1-49. DOI: https://doi.org/10.1007/s11227-023-05613-5 | - | |
2023 | Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi | Archives of Computational Methods in Engineering | Human Activity Recognition (HAR) Using Deep Learning: Review, Methodologies, Progress and Future Research Directions Vol. 3 pp. 1-41. DOI: https://doi.org/10.1007/s11831-023-09986-x | - | |
2023 | Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi | Future Generation Computer Systems | WGSDMM+ GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding Vol. 145 pp. 254-266. DOI: https://doi.org/10.1016/j.future.2023.03.028 | - | |
2023 | Neha Bansal, Shelly Sachdeva, Lalit K Awasthi | IETE Journal of Research | Are NoSQL Databases Affected by Schema? Vol.3 pp. 1-22. DOI: https://doi.org/10.1080/03772063.2023.2237478 | - | |
2023 | Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma, Priyanka Rathee | Ecological Informatics | A review of deep learning techniques used in agriculture Vol.77 pp.1-22. DOI: https://doi.org/10.1016/j.ecoinf.2023.102217 | - | |
2023 | Pankaj Sharma, Lalit Kumar Awasthi | International Journal of Next-Generation Computing | Next-generation Digital Forensics Challenges and Evidence Preservation Framework for IoT Devices. Vol. 14 pp.1-3. | - | |
2023 | Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma | Multimedia Tools and Applications | Machine learning in agriculture: a review of crop management applications Vol.2 pp. 1-41. DOI: https://doi.org/10.1007/s11042-023-16105-2 | - | |
2023 | Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi | International Journal of System Assurance Engineering and Management | Clustering based opportunistic traffic offloading technique for device-to-device communication Vol. 14 pp. 827-839. DOI: | - | |
2023 | Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava | Expert Systems with Applications | Candidate project selection in cross project defect prediction using hybrid method Vol. 218 pp. 1-11. DOI: https://doi.org/10.1016/j.eswa.2023.119625 | - | |
2023 | Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava | IETE Journal of Research | Efficient Random Forest Algorithm for Multi-objective Optimization in Software Defect Prediction Vol.4 pp. 1-13. DOI: https://doi.org/10.1080/03772063.2023.2205377 | - | |
2023 | Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka | ACM Computing Surveys | Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review, Vol. 55, No. 3, pp. 1-43. https://doi.org/10.1145/3494520 | - | |
2023 | Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi | Engineering Applications of Artificial Intelligence | Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions Vol. 120 pp. 1-58. DOI: https://doi.org/10.1016/j.engappai.2023.105894 | - | |
2023 | Urvashi, Geeta Sikka, Lalit K Awasthi, Bharat Bhargava | IEEE Transactions on Dependable and Secure Computing | Quantitative evaluation of extensive vulnerability set using cost benefit analysis Vol. 3 pp. 1 - 11. DOI: 10.1109/TDSC.2023.3253121 | - | |
2023 | Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi | Wireless Personal Communications | Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network Vol.129 pp.1113-1128. DOI: https://doi.org/10.1007/s11277-023-10178-w | - | |
2023 | Md Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi | Multimedia Tools and Applications | A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification Vol. 82 pp. 8507-8535. | - | |
2023 | Amitoj Bir Singh, Lalit Kumar Awasthi, Mohammad Shorfuzzaman, Abdulmajeed Alsufyani, Mueen Uddin | Computers, Materials & Continua | Chained Dual-Generative Adversarial Network: A Generalized Defense Against Adversarial Attacks. Vol. 74, No. 2, pp. 2541-2555. | - | |
2023 | Monika Chaudhary, Nitin Goyal, Abderrahi Benslimane, Lalit Kumar Awasthi, Ayed Alwadain, Aman Singh | International Journal of Communication Systems | Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges. Vol. 10, No. 4, pp. 3500-3524. | - | |
2022 | Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma | Springer: Cluster Computing | Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection Vol. 25, pp.1341–1354. DOI: https://doi.org/10.1002/wcm.654 | - | |
2022 | Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik | International Journal of Communication Systems | A range-based node localization scheme with hybrid optimization for underwater wireless sensor network Vol. 35, pp.1-55. DOI: https://doi.org/10.1002/dac.5147 | - | |
2022 | Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi | Computer Communications | Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network Vol. 181, pp. 236-256. DOI: https://doi.org/10.1016/j.comcom.2021.10.016 | - | |
2022 | Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi | John Wiley & Sons, Ltd.: Transactions on Emerging Telecommunications Technologies | Secure authentication and session key management scheme for Internet of Vehicles Vol. 33, pp. 1-5. DOI: https://doi.org/10.1002/ett.4451 | - | |
2022 | Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik | Computer Networks | A range based node localization scheme with hybrid optimization for underwater wireless sensor network Vol. 35 pp. 1-10 DOI: https://doi.org/10.1002/dac.5147 | - | |
2022 | Pranjal Kumar, Siddhartha Chauhan & Lalit Kumar Awasthi | International Journal of Multimedia Information Retrieval | Human pose estimation using deep learning: review, methodologies, progress and future research directions Vol. 11 pp. 489-521 DOI: https://doi.org/10.1007/s13735-022-00261-6 | - | |
2022 | Md Ansari, Sarfaraj Alam, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi | Multimedia Tools and Applications | A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification Vol. 10, pp. 1-10. DOI: https://doi.org/10.1007/s11042-022-13556-x | - | |
2022 | Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi | Computer Science Review | A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation Vol. 45, pp. 1-22. DOI: https://doi.org/10.1016/j.cosrev.2022.100498 | - | |
2022 | Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli | Cluster Computing | Energy-aware scientific workflow scheduling in cloud environment Vol. 25, pp. 3845-3874. DOI: https://doi.org/10.1007/s10586-022-03613-3 | - | |
2022 | Abhilasha Sharma, Lalit Kumar Awasthi | Computer Networks | Ob-EID: Obstacle aware event information dissemination for SDN enabled vehicular network Vol. 216, pp. 1-25. DOI: https://doi.org/10.1016/j.comnet.2022.109257 | - | |
2021 | Aridaman Singh Nandan, Samayveer Singh, Lalit K Awasthi | Applied Soft Computing | An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs Vol. 107, pp. 1-78. DOI: https://doi.org/10.1016/j.asoc.2021.107318 | - | |
2021 | Samayveer Singh, Aridaman Singh Nandan, Aruna Malik, Rajeev Kumar, Lalit K Awasthi, Neeraj Kumar | Internet of Things Journal | A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare Vol. 9, pp. 7481 - 7490. DOI: 10.1109/JIOT.2021.3108875 | - | |
2021 | Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi | Computer Networks | Learning-based hybrid routing for scalability in software defined networks Vol. 198, pp.252-267. DOI: https://doi.org/10.1016/j.comnet.2021.108362 | - | |
2021 | Abhilasha Sharma, Lalit Kumar Awasthi | Computer Networks | Pr-CAI: Priority Based-Context Aware Information scheduling for SDN-based vehicular network Vol. 193, pp. 10-31. DOI: https://doi.org/10.1016/j.comnet.2021.108097 | - | |
2021 | Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi | International Journal of System Assurance Engineering and Management | Clustering based opportunistic traffic offloading technique for device-to-device communication Vol. 185, pp. 0976-4348. DOI: https://doi.org/10.1007/s13198-021-01136-5 | - | |
2021 | Urvashi Garg, Geeta Sikka, Lalit K Awasthi | Computer Communications | An ensemble approach for optimization of penetration layout in wide area networks Vol. 174, pp. 61-74. DOI: https://doi.org/10.1016/j.comcom.2021.04.009 | - | |
2021 | Urvashi Garg, Geeta Sikka, Lalit K Awasthi | International Journal of Information and Computer Security | Empirical risk assessment of attack graphs using time to compromise framework Vol. 16, pp. 192-206. DOI: https://doi.org/10.1504/IJICS.2021.117393 | - | |
2021 | Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi | International Journal Next Gener. Comput | Unified model towards Scalability in Software Defined Networks Vol. 12 No. 1 pp. 1-35 DOI: https://doi.org/10.47164/ijngc.v14i3.1299 | - | |
2021 | Satnam Kaur, Lalit K Awasthi, Amrit L Sangal | Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) | A Review on Software Refactoring Opportunity Identification and Sequencing in Object-oriented Software Vol. 14 No. 3 pp. 252-267 DOI: https://doi.org/10.2174/2352096513999200704140718 | - | |
2020 | Satnam Kaur, Lalit K Awasthi, AL Sangal, Gaurav Dhiman | Engineering Applications of Artificial Intelligence | Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization Vol. 90, pp. 1-18. DOI: https://doi.org/10.1016/j.engappai.2020.103541 | - | |
2020 | Satnam Kaur, Lalit K Awasthi, AL Sangal | Engineering with Computers | HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems Vol. 37, pp. 3167–3203. DOI: https://doi.org/10.1007/s00366-020-00989-x | - | |
2020 | Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi | Expert Systems with Applications | Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation Vol. 161, pp. 11-36. DOI: https://doi.org/10.1016/j.eswa.2020.113682 | - | |
2020 | Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi | Information Processing & Management | Evaluation of web service clustering using Dirichlet Multinomial Mixture model-based approach for Dimensionality Reduction in service representation Vol. 57, pp. 1-22. DOI: https://doi.org/10.1016/j.ipm.2020.102238 | - | |
2020 | Abhilasha Sharma, Lalit Kumar Awasthi | Computer Communications | AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks Vol. 159, pp. 71-82. DOI : https://doi.org/10.1016/j.comcom.2020.05.013 | - | |
2020 | Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi | IJRASET, XII (8) (2020) | Game Theory-based Routing for Software-Defined Networks Vol. 12, pp. 1-48. DOI: https://doi.org/10.22214/ijraset.2020.32676 | - | |
2019 | Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi | Computer Networks | Laman: A supervisor controller based scalable framework for software defined networks Vol. 159, pp. 125-134. DOI : https://doi.org/10.1016/j.comnet.2019.05.003 | - | |
2019 | Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli | International Journal of Grid and Utility Computing | Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation Vol. 10, pp. 1741-88. DOI: https://doi.org/10.1504/IJGUC.2019.100863 | - | |
2019 | Ashok Kumar Nanda, V. Sankiran, Vindya Gandam, and Lalit Kumar Awasthi | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | ECDSA Security Protocol for WSBNs, Vol. 8, pp. 138-145. | - | |
2018 | Urvashi Garg, Geeta Sikka, Lalit K Awasthi | Computers & Security | Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities Vol. 77, pp. 349-359. DOI : https://doi.org/10.1016/j.cose.2018.04.006 | - | |
2018 | Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K Awasthi | International Journal of Web Services Research (IJWSR) | SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks Vol. 15, pp. 1-20. DOI : 10.4018/IJWSR.2018040103 | - | |
2017 | Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi | Wireless Networks | Incentive based scheme for improving data availability in vehicular ad-hoc networks. Vol. 23, pp. 1-36. DOI: https://doi.org/10.1007/s11276-016-1246-7 | - | |
2017 | Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli, Divya Kapil | Journal of Cloud Computing | A critical survey of live virtual machine migration techniques Vol. 6, pp. 1-44. DOI: https://doi.org/10.1186/s13677-017-0092-1 | - | |
2016 | Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi | Wireless Networks | Priority based efficient data scheduling technique for VANETs, Vol. 22, pp 1641–1657. DOI: https://doi.org/10.1007/s11276-015-1051-8 | - | |
2016 | Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan | International Journal of Next-Generation Computing | Minimal marking of trap-regions for efficient greedy forwarding in wsns, Vol. 7, pp. 58-68. | - | |
2016 | Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan: | International Journal of Next-Generation Computing | GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks. Vol. 7 No. 3 pp. 46-78 | - | |
2015 | Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi | Wireless Networks | Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks Vol. 21, pp. 15-26. DOI: https://doi.org/10.1007/s11276-014-0869-9 | - | |
2015 | Jawahar Thakur, Dr Arvind Kalia, & Dr. Lalit Kumar Awasthi | International Journal of Next-Generation Computing | Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review, Vol. 6, No. 2, pp. 140–152. https://doi.org/10.47164/ijngc.v6i2.81 | - | |
2015 | Rakesh Nayak, Ashok Kumar Nanda, Lalit Kumar Awasthi | International Journal of Research in Computer and Communication Technology (IJRCCT) | Multiple Private Keys with NTRU Cryptosystem, Vol. 4, No. 3, pp. 250-255. | - | |
2013 | Siddhartha Chauhan, Lalit Kumar Awasthi | International Journal of Communication Networks and Distributed Systems | An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks. Vol. 45 pp. 75-96. DOI : https://doi.org/10.1504/IJCNDS.2014.060624 | - | |
2013 | Ankur Gupta, Lalit K Awasthi | International Journal of Communication Networks and Distributed Systems | Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework Vol. 11, pp. 347-375. DOI : https://doi.org/10.1504/IJCNDS.2013.057716 | - | |
2014 | Prashant Kumar, Naveen Chauhan, LK Awasthi, Narottam Chand | International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) | Cooperative Cache Replacement Policy for MANETs Vol. 6 No. 6 pp 1-12 DOI: 10.4018/ijapuc.2014040103 | - | |
2014 | Lalit K. Awasthi, Manoj Misra, R.C. Joshi | International Journal of Communication Networks and Distributed Systems | Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems. Vol. 12 No. 4 pp. 356-380 DOI: https://doi.org/10.1504/IJCNDS.2014.062226 | - | |
2012 | Abhishek Mohta, Ravi Kant Sahu, Lalit Kumar Awasthi | International journal of advanced research in computer science and software engineering | Robust data security for cloud while using third party auditor Vol. 3, pp. 1-20. DOI: http://surl.li/niltc | - | |
2012 | Abhishek Mohta, Lalit Kumar Awasti | International Journal of Scientific & Engineering Research | Cloud data security while using third party auditor Vol.3, pp. 2229-5518. DOI: http://surl.li/nilth | - | |
2012 | Manju Bala, Lalit Awasthi | International Journal of Intelligent systems and applications | Proficient D-SEP protocol with heterogeneity for maximizing the lifetime of wireless sensor networks Vol. 25, pp. 1341-54. DOI : 10.5815/ijisa.2012.07.01.07 | - | |
2012 | Ashok Kumar Nanda, Lalit Kumar Awasthi | International Journal of Engineering and Technology | XTR Cryptosystem for SMS security Vol. 4, pp. 836-839. | - | |
2012 | Rajesh Sharma, Lalit Kumar Awasthi | Journal of Bioinformatics and Intelligent Control | A log-based recovery protocol for mobile distributed computing systems Vol. 1, pp. 138-147. DOI: https://doi.org/10.1166/jbic.2013.1021 | - | |
2012 | Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi | International Journal of Advanced Computer Science and Applications | Request Analysis and Dynamic Queuing System for VANETs Vol. 3, pp. 1-7. | - | |
2012 | Lalit K Awasthi, Manoj Misra, Ramesh C Joshi | ACTA: International Journal of Computers and Applications | An efficient coordinated checkpointing approach for distributed computing systems with reliable channels Vol. 34, pp. 11-25. DOI: https://doi.org/10.2316/Journal.202.2012.1.202-2118 | - | |
2012 | Ashok Kumar Nanda, Lalit Kumar Awasthi | Journal of Information Assurance & Security | Secure SMS Encryption Using NTRU Cryptosystem. Vol. 7, No. 4, pp. 182-198. | - | |
2012 | Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi | International Journal of Advanced Computer Science and Applications | Request Analysis and Dynamic Queuing System for VANETs Vol. 3, pp. 192-198. | - | |
2012 | Ajay Guleria, Narottam Chand Kaushal, Lalit Kumar Awasthi: | International Journal. Next Gener. Comput. | Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs Vol. 3 No. 3 pp 1-25 DOI: https://doi.org/10.47164/ijngc.v14i3.1299 | - | |
2012 | Lalit K Awasthi, Manoj Misra, Ramesh C Joshi | International Journal of Computers and Applications | An efficient coordinated checkpointing approach for distributed computing systems with reliable channels Vol. 3, pp. 1341-54. DOI: https://doi.org/10.2316/Journal.202.2012.1.202-2118 | - | |
2012 | Siddhartha Chauhan, Lalit Kumar Awasthi | International Journal of Engineering Business Management | Adaptive Time Synchronization for Homogeneous WSNs Vol. 14, pp. 1-18. DOI: https://hrcak.srce.hr/file/114170 | - | |
2012 | Naveen Chauhan, Lalit K Awasthi, Narottam Chand | International Journal of Distributed Systems and Technologies (IJDST) | Cache replacement in mobile adhoc networks Vol. 02, pp. 22-38. DOI: 10.4018/jdst.2012040102 | - | |
2011 | Amit Nayyer, Meenakshi Nayyer, Lalit Kr Awasthi | International Journal of Computer Applications | A comparative study of time synchronization protocols in wireless sensor network Vol. 36, pp. 1341-54. | - | |
2011 | Siddhartha Chauhan, Lalit Awasthi | International Journal of Computer Science Issues (IJCSI) | TBEE: Tier based energy efficient protocol providing sink and source mobility in wireless sensor networks Vol. 8, pp. 281-291. | - | |
2011 | Siddhartha Chauhan, Lalit Kumar Awasthi | International Journal of Computer Applications | Cluster based task scheduling in wireless sensor network Vol. 33, pp. 38-43. | - | |
2011 | Naveen Chauhan, Lalit K Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra | International Journal of Mobile Computing and Multimedia Communications (IJMCMC) | Cooperative Caching in Mobile Ad Hoc Networks Vol. 3, pp. 1-16 DOI: 10.4018/jmcmc.2011070102 | - | |
2011 | Computing and Informatics | A Gupta, Lalit Awasthi | Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives Vol. 30, pp. 559 - 594. | - | |
2011 | Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh | Wireless Sensor Network | A Distributed Weighted Cluster Based Routing Protocol for MANETs Vol. 3 No.2 pp. 54-60 DOI: 10.4236/wsn.2011.32006 | - | |
2011 | Ankur Gupta, Lalit K Awasthi | International Journal of Communication Networks and Distributed Systems | Peers-for-peers (P4P): an efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications Vol. 6, pp. 202 - 228 DOI: https://doi.org/10.1504/IJCNDS.2011.038525 | - | |
2011 | Manju Bala, Lalit Awasthi | Wireless Engineering and Technology | Performance tradeoff with routing protocols for radio models in wireless sensor networks Vol. 2, pp. 53-59. DOI: http://dx.doi.org/10.4236/wet.2011.22008 | - | |
2011 | Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand | International Journal of Mobile Computing and Multimedia Communications (IJMCMC) | Enhancing Data Availability in MANETs with Cooperative Caching. Vol. 3 No .4 pp. 1-14 DOI: | - | |
2010 | Lalit K. Awasthi, Manoj Misra R.C. Joshi | International Journal of Ad Hoc and Ubiquitous Computing | A weighted checkpointing protocol for mobile distributed systems. Vol.5 No.3 pp.137-149 DOI: https://doi.org/10.1504/IJAHUC.2010.032227 | - | |
2010 | Prashant Kumar, Naveen Chauhan, L K Awasthi, Narottam Chand | International Journal of Computer Science Issues (IJCSI) | Proactive approach for cooperative caching in mobile adhoc networks Vol. 7, pp. 21-27. | - | |
2010 | Kamal Kant, Lalit K Awasthi | International Journal of IT & Knowledge Management (IJITKM), Special issue | Unicast and Multicast Routing Protocols for MA-NETs: A Comparative Survey Vol. 101, pp. 1-8. | - | |
2010 | Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra | International Journal of Computer Science and Engineering | Global cluster cooperation strategy in mobile ad hoc networks Vol. 115, pp. 16. | - | |
2010 | Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misrah | International Journal of Applied Engineering Research | Energy efficient cooperative caching in mobile ad hoc networks Vol. 7, pp. 21-28. | - | |
2010 | Lalit K Awasthi, Manoj Misra, Ramesh C Joshi | International Journal of ad hoc and ubiquitous Computing | A weighted Check pointing protocol for mobile distributed systems Vol. 5, pp. 137-149. DOI: https://doi.org/10.1504/IJAHUC.2010.032227 | - | |
2010 | Ankur Gupta, Lalit K Awasthi | International Journal of Networking and Virtual Organisations | Ind Net: towards a peer-to-peer community network that connects the information technology industry and academia in India Vol. 7, pp. 63-79. DOI: https://doi.org/10.1504/IJNVO.2010.029871 | - | |
2010 | Ankur Gupta, Lalit K Awasthi | International Journal of Business Information Systems | PArch: a cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival Vol. 5, pp. 102-110 .DOI: https://doi.org/10.1504/IJBIS.2010.029482 | - | |
2010 | Kamal Kant Lalit K. Awasthi, | International Journal of IT & Knowledge | Unicast And Multicast Routing Protocols for Manets: A Comparative Survey” Vol. 11, pp. 1-8. | - | |
2010 | Ankur Gupta, Lalit K. Awasthi | International Journal Distributed Syst. Technol. | Toward a Quality-of-Service Framework for Peer-to-Peer Applications. Vol.1 No.3 pp.1-23 DOI: 10.4018/jdst.2010070101 | - | |
2010 | Ankur Gupta, Lalit K. Awasthi | International Journal of Networking and Virtual Organisations | IndNet: towards a peer-to-peer community network that connects the information technology industry and academia in India. Vol.7 No.1 pp.63-79 DOI: https://doi.org/10.1504/IJNVO.2010.029871 | - | |
2010 | Ankur Gupta, Lalit K Awasthi | Information Security Journal: A Global Perspective | A containment-based security model for cycle-stealing P2P applications Vol. 19, pp. 191-203. DOI: https://doi.org/10.1080/19393551003762207 | - | |
2007 | Lalit Kumar Awasthi, Prashant Kumar | International Journal of Information and Computer Security | A synchronous checkpointing protocol for mobile distributed systems: probabilistic approac h Vol. 3, pp. 298-314 DOI: https://doi.org/10.1504/IJICS.2007.013957 | - | |
2006 | Parveen Kumar, Lalit Kumar, RK Chauhan | IETE Journal of Research | A Nonintrusive Hybrid Synchronous Checkpointing Protocol for Mobile Systems Vol. 52, pp. 247-54. | - | |
2006 | Parveen Kumar, Lalit Kumar, RK Chauhan | IETE journal of research | A hybrid coordinated checkpointing protocol for mobile computing systems Vol. 52, pp. 247-254 DOi: https://doi.org/10.1080/03772063.2006.11416461 | - | |
2006 | RK Chauhan, Parveen Kumar, Lalit Kumar | International Journal of information and computing science, Accepted for Publication | A coordinated checkpointing protocol for mobile computing systems Vol. 52, pp. 1341-54. | - | |
2006 | RK Chauhan, Parveen Kumar, Lalit Kumar | Journal of Multidisciplinary Engineering and Technologies | Checkpointing Distributed Applications on Mobile Computers Vol. 34, pp. 40-51. | - | |
2006 | RK Chauhan, Parveen Kumar, Lalit Kumar | ACCST Journal of Research | Hybrid and intrusive synchronous checkpointing protocols for mobile distributed systems Vol. 52, pp. 247-54. | - | |
2006 | RK Chauhan, Parveen Kumar, Lalit Kumar | ACCST Journal of Research | Non-intrusive C coordinated C heck pointing Protocol for Mobile C omputing Systems: A Critical Survey Vol. 51, pp. 485-490. | - | |
2005 | Lalit Kumar, Parveen Kumar, RK Chauhan | ACCST Journal of research | Logging based coordinated check pointing in mobile distributed computing systems Vol. 51, pp. 485-490. DOI: https://doi.org/10.1080/03772063.2005.11416429 | - | |
2005 | Parveen Kumar, Lalit Kumar, RK Chauhan | Journal of Multidisciplinary Engineering Technologies | A low overhead Non-intrusive Hybrid Synchronous check pointing protocol for mobile systems Vol. 52, pp. 247-254. | - | |
2005 | Parveen Kumar, Lalit Kumar, RK Chauhan | International Journal of information and computing science | Synchronous Check pointing Protocols for Mobile Distributed Systems: A Comparative Study Vol. 1, pp. 298-314. | - | |
2005 | Lalit Kumar, Parveen Kumar, RK Chauhan | ACCST Journal of Research | Pitfalls in Minimum-process Coordinated Check pointing protocols for Mobile Distributed Vol. 19, pp. 1015-1038. | - | |
2005 | Lalit Kumar, Parveen Kumar, RK Chauhan | Journal of Multi-disciplinary Engineering Technologies | Message Logging and Check pointing in Mobile Computing Vol. 51, pp. 485-90. | - |
Book Chapter Written
Type | Title | Publisher | Author(s) | ISBN/ISSn No. | Year | Remarks |
---|
Expert Talks
Title | Place | Year | Description |
---|
Patents
Title | Registration No | Award Date | Awarding Agency | Remarks(if any) |
---|
Conference/Workshops/Short Term Course Organized
Category | Title | Type | Venue | From Date | To Date | Designation | Remarks |
---|
Consultancies
Consultancy Title | Client Organization | Faculty Involved | Amount | Status | Remarks |
---|
National International Exposures
Title | Description | Remarks(if any) |
---|
Honours & Recognitions
Title | Activity | Given By | Year | Remarks(if any) |
---|