Hemraj Saini

Hemraj Saini is currently working as Associate Professor in the Department of Computer Science & Engineering, Jaypee University of Information Technology, Waknaghat-173234. Prior to that he has worked in AIET, Alwar; OEC, Bhubaneswar; HIE, Baniwalid (Libya); BITS, Pilani; IET, Alwar; REIL, Jaipur and Dataman System, Delhi for almost 20 years in Academics, Administration and Industry. Five (05) Ph.D. degrees have been awarded and two (02) Ph.D. Theses are submitted under his valuable guidance. He is an active member of various professional technical and scientific associations such as IEEE, ACM, IAENG, etc. Presently he is providing his services in various modes like, Editor, Member of Editorial Boards, Member of different Subject Research Committees, reviewer for International Journals and Conferences including Springer, ScienceDirect, IEEE, Wiely, IGI Global, Benthem Science etc. and as a resource person for various workshops and conferences. He has published more than 100 research papers in International/National Journals and Conferences of repute. He has also organized various International/National conferences and workshops.

Publications

Futuristic Prediction of Missing Value Imputation Methods Using Extended ANN
Ashok Kumar Tripathi, Hemraj Saini, Geetanjali Rathee. © 2022. 12 pages.
Missing data is universal complexity for most part of the research fields which introduces the part of uncertainty into data analysis. We can take place due to many types of...
Large-Scale Data Streaming, Processing, and Blockchain Security
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini. © 2021. 285 pages.
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy....
Understanding Blockchain: Case Studies in Different Domains
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini. © 2021. 22 pages.
In this chapter, the authors have detailed the need of blockchain technology along with its case studies in different domains. The literature survey is described that describes...
Electronic Voting Application Powered by Blockchain Technology
Geetanjali Rathee, Hemraj Saini. © 2021. 17 pages.
India is the largest democracy in the world, and in spite of that, it faces various challenges on a daily basis that hinder its growth like corruption and human rights...
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Gautam Kumar, Hemraj Saini. © 2021. 16 pages.
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction...
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm
Oshin Sharma, Hemraj Saini. © 2021. 17 pages.
To increase the availability of the resources and simultaneously to reduce the energy consumption of data centers by providing a good level of the service are one of the major...
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment
Oshin Sharma, Hemraj Saini. © 2021. 15 pages.
In current era, the trend of cloud computing is increasing with every passing day due to one of its dominant service i.e. Infrastructure as a service (IAAS), which virtualizes...
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Gautam Kumar, Hemraj Saini. © 2021. 18 pages.
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction...
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm
Oshin Sharma, Hemraj Saini. © 2019. 16 pages.
To increase the availability of the resources and simultaneously to reduce the energy consumption of data centers by providing a good level of the service are one of the major...
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence
Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini, Tarini Charana Panda. © 2019. 13 pages.
This article describes a highly infected e-epidemic model in a computer network. This article establishes the Basic reproduction number R0, which explicitly brings out the...
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
Pratiksha Gautam, Hemraj Saini. © 2019. 16 pages.
Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are...
Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony
Shivi Sharma, Hemraj Saini. © 2019. 18 pages.
Fog computing is a set of mobile cloudlets which can fulfil the demand of the user who is already considered a mobile job in this architecture. The main aim of Fog computing is...
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Gautam Kumar, Hemraj Saini. © 2018. 16 pages.
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction...
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
Geetanjali Rathee, Hemraj Saini. © 2018. 11 pages.
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple...
Security Against Network Layer Attacks for Hierarchal Mesh Environments
Geetanjali Rathee, Hemraj Saini. © 2018. 8 pages.
This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh...
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN
Geetanjali Rathee, Hemraj Saini. © 2018. 12 pages.
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN...
Performance Evaluation of Energy-Aware Virtual Machine Placement Techniques for Cloud Environment
Oshin Sharma, Hemraj Saini. © 2018. 28 pages.
The most dominant service of cloud computing is infrastructure as a service (IaaS). Virtualization is the most important feature of IaaS and it is very important for the...
Correlation and Performance Estimation of Clone Detection Tools
Pratiksha Gautam, Hemraj Saini. © 2018. 17 pages.
Over the past few decades, many tools and methods have been proposed by several researchers to detect clones automatically in programs and software. Nevertheless, it is not yet...
Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol
Geetanjali Rathee, Hemraj Saini. © 2017. 18 pages.
In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and...
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security
Pratiksha Gautam, Hemraj Saini. © 2017. 14 pages.
Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital...
Secure Buffer-Based Routing Protocol for WMN
Geetanjali Rathee, Hemraj Saini. © 2017. 17 pages.
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number...
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment
Oshin Sharma, Hemraj Saini. © 2017. 13 pages.
In current era, the trend of cloud computing is increasing with every passing day due to one of its dominant service i.e. Infrastructure as a service (IAAS), which virtualizes...
Mathematical Model for Cyber Attack in Computer Network
Yerra Shankar Rao, Aswin Kumar Rauta, Hemraj Saini, Tarini Charana Panda. © 2017. 8 pages.
This investigation focuses to develop an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic computer network model to study the transmission of malicious code in a...
Weight Trusted Routing Mechanism for Hierarchical Mesh Environments
Geetanjali Rathee, Hemraj Saini. © 2017. 18 pages.
In this paper, we have proposed a technique to detect and eliminate the malicious/misbehaving nodes involved during routing path formation in hierarchical mesh environments. In...
SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers
Oshin Sharma, Hemraj Saini. © 2017. 17 pages.
Cloud computing has revolutionized the working models of IT industry and increasing the demand of cloud resources which further leads to increase in energy consumption of data...
Non-Trivial Software Clone Detection Using Program Dependency Graph
Pratiksha Gautam, Hemraj Saini. © 2017. 24 pages.
Code clones are copied fragments that occur at different levels of abstraction and may have different origins in a software system. This article presents an approach which shows...
Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network
Hemraj Saini, Bimal Kumar Mishra, T. C. Panda. © 2013. 9 pages.
This paper predicts the malicious object prone site from the set of multi business portals of an organization or company. Graph theory is used to solve this problem as the...
Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm
Hemraj Saini, L. K. Sharma, T. C. Panda, H. N. Pratihari. © 2012. 11 pages.
In the current era of cellular world, cell planning plays an important role to achieve better performance of the cellular network. Capacity expansion and cost optimization of a...
Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network
Hemraj Saini, Bimal Kumar Mishra, T. C. Panda. © 2011. 9 pages.
This paper predicts the malicious object prone site from the set of multi business portals of an organization or company. Graph theory is used to solve this problem as the...