Sorry, you need to enable JavaScript to visit this website.
Dr. Manoj Kumar
Professor
Qualification
B.E.(CSE), M.Tech.(Information Systems), Ph.D.(Information Technology)

 

 

 

 

Bio-Sketch

Dr. Manoj Kumar has been serving as Professor (CSE) at NSUT (East Campus), Geeta Colony, Delhi (Formerly Ambedkar Institute of Advanced Communication Technologies and Research, Govt. of NCT. of Delhi) since March 4, 2014. He has also been serving third term as HOD(CSE) since June 2021. He completed B.E. (Computer Science and Engineering) in 1996 from Bipin Tripathi Kumaon Institute of Technology, An Autonomous Institute of Govt. of Uttrakhand (Formerly Kumaon Engineering College, Dwarahat, Almora). He completed M.Tech (Information Systems) in 2002  from Netaji Subhas University of Technology (Formerly Netaji Subhas Institute of Technology, University of Delhi).He completed Ph.D.(Information Technology) in 2014 from Guru Gobind Singh Indraprastha University, Delhi. He has more than 27 years of teaching experience. He has worked as Lecturer (CSE) at SLIET(Deemed to be a University, established by Govt. of India) Longowal, Sangrur (Punjab). He has published 49 research papers in the International Journals and Conferences of repute. Two scholars have been awarded Ph.D. degree and also 06 research scholars have been pursuing Ph.D. under his supervision. He has guided 24 students during their M.Tech. thesis. He has been an expert member of various selection panels and committees constituted by Govt. of India. He has been reviewer for International Journals and Conferences of repute. He is a senior member of IEEE(USA) and also life members of ISTE(India).

 

International Journal

1. Chaudhary R, Kumar M. Optimized Deep Maxout for Crowd Anomaly Detection: A hybrid Optimization based Model, Network: Computation in Neural Systems, Taylor & Francis. https://doi.org/10.1080/0954898X.2024.2392772, September 2024 (SCIE).

2.  Chaudhary R, Kumar M. Hybrid Classifier for Crowd Anomaly Detection with Bernoulli Map Evaluation. International Journal on Artificial Intelligence Tools, World Scientific. https://doi.org/10.1142/S0218213024500088, January 2024(SCIE).

3.  Tomer M, Kumar M, Hashmi A, Sharma B, Tomer U. Enhancing metaheuristic based extractive text summarization with fuzzy logic. Neural Computing and Applications, Springer, https://doi.org/10.1007/s00521-023-08209-5, February 2023 (SCI) 4. Chaudhary R, Kumar M. A proposed framework for small group detection in medium density crowd. Telematique, Vol.21(1), pp. 1886-1895, June, 2022(ESCI).

5. Tomer M, Kumar M. STV-BEATS: Skip Thought Vector and Bi-Encoder based Automatic Text Summarizer. Knowledge-Based Systems, Elsevier, Vol. 240, 108108, March 2022, https://doi.org/10.1016/j.knosys.2021.108108  (SCI).

6. Singh T, Kumar M. Investigating Requirements Completeness Metrics for Requirements Schemas using Requirements Engineering Approach of Data Warehouse: A Formal and Empirical Validation. Arabian Journal for Science and Engineering, Springer, Vol. 47, pp. 9527–9546, https://doi.org/10.1007/s13369-021-06269-0, August 2022(SCIE).

7.  Singh T, Kumar M. Empirical study to predict the understandability of requirements schemas of data warehouse using requirements metrics. International Journal of Intelligent Engineering Informatics, Inderscience,Vol.9(4),pp.329-354, https://doi.org/10.1504/IJIEI.2021.120317, January 2022 (ESCI).

8.  Tomer M, Kumar M. Multi-document extractive text summarization based on firefly algorithm. Journal of King Saud University-Computer and Information Sciences, Elsevier, https://doi.org/10.1016/j.jksuci.2021.04.004, September 2022(SCIE).

9.  Tomer M, Kumar M. Improving Text Summarization using Ensembled Approach based on Fuzzy with LSTM. Arabian Journal for Science and Engineering, Springer, https://doi.org/10.1007/s13369-020-04827-6, December 2020 (SCIE) 10.  Kumar M, Gosain A, Singh Y. A novel requirements engineering approach for designing data warehouses. International  Journal of  System Assurance  Engineering and Management,  7, 205–221, Springer, 2016 (ESCI).

11.  Kumar M, Gosain A, Singh Y. Empirical validation of structural metrics for predicting understandability of conceptual schemas for data warehouse. International Journal of System Assurance Engineering and Management, Springer, Vol. 5(3), pp. 291-306, 2014(ESCI).

12. Kumar M, Gosain A, Singh Y. On Completeness and Traceability Metrics for Data Warehouse Requirements Engineering. International Journal of Computational Systems Engineering, Inderscience, Vol. 1(4), pp.229-237, 2013.

13.  Kumar M, Gosain A, Singh Y. Quality-Oriented Requirements Engineering Approach for Data Warehouse.  International Journal of Computational Systems Engineering, Inderscience, Vol. 1(2), pp. 127-138, 2012.

14.  Kumar M, Gosain A, Singh Y. Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development. Journal of Information Processing Systems, Vol. 6(3), pp. 385-402, 2010(ESCI)

ACM News Letters

1. Gaur H, Kumar M. Assessing the understandability of a data warehouse logical model using a decision-tree approach. Software Engineering Notes, ACM SIGSOFT, Vol.39(5), pp.1-5, 2014.

2. Singh I, Kumar M. A proposed model for data warehouse user behaviour using intrusion detection system.  Software Engineering Notes, ACM SIGSOFT, Vol.  37(6), pp.  1-7, 2012.

3. Khajaria K, Kumar M. Modeling of Security Requirements for Decision Information System. ACM SIGSOFT Software Engineering Notes Vol. 36(5), pp. 1-4, 2011.

4. Kumar M, Gosain A, Singh Y. Quality-Oriented Requirements Engineering for a Data Warehouse. Software Engineering Notes, ACM SIGSOFT, Vol. 36(5), pp. 1-4, 2011.

5. Kumar M, Gosain A, Singh Y. Agent Oriented Requirements Engineering for a Data Warehouse. Software Engineering Notes, ACM SIGSOFT, Vol. 34(5), pp. 1- 4, 2009.

 

International Conferences 

 

  1. Chaudhary R, Kumar M. A deep learning framework to identify abnormal activity in closed space, AIP Conf. Proc.2919(1), 050011, https://doi.org/10.1063/5.0185209, March 2024.
  2. Chaudhary R, Kumar M. A novel method for real time group detection in medium density crowd, AIP Conf. Proc.2919(1), 050010, https://doi.org/10.1063/5.0186075, March 2024.
  3. Singh T, Kumar M. Formally Investigating Traceability Metrics of Data Warehouse Requirements Model using Briand's Framework. In: 5th International Conference on Intelligent Computing and Control Systems, 6-8 May, 2021, India.
  4. Singh N, Kumar M. Conceptual Framework for Accident Prone Hotspot Identification and Removal using Historical Data Analytics. In: IEEE 17th India Council International Conference,10-13 December,India,2020.
  5. Singh T, Kumar M. Empirical Validation of Requirements Traceability Metrics for Requirements Model of Data Warehouse using SVM. In: IEEE 17th India Council International Conference, 10-13 December, India, 2020.
  6. Rakhee, Kumar M. Validation of data warehouse requirements - model traceability metrics using a formal framework. In: Proceedings of 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 216-221, IEEE, 2015.
  7. Kaur A, Kumar M. An intrusive way to detect coordinated attacks using CIDS. In: Proceedings of 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 432- 437, IEEE, 2015.
  8. Sharma R,  Kumar M. Validation of the data warehouse metrics using formal frameworks. In: Proceeding of International Conference on Signal Propagation and Computer Technology, 12-13 July, Ajmer, India, IEEE, pp.239-243, 2014.
  9. Anand N, Kumar M. An Overview on Data Quality Issues at Data Staging ETL. In: proceedings of 2nd International Conference on Advances in Computer Science and Application, June 21-22, Lucknow, India,  ACEEE, DOI: 03.LSCS.2013.3.47, 2013.
  10. Singh I, Kumar M. Evaluation of approaches for designing secure data warehouse. In: proceedings of  International Conference on Advances in Computing, Communications, and Informatics  (ICACCI ), Chennai, India, ACM,  pp. 69-73, 2012.
  11. Ingle M, Kumar M. Push Technique based Certificate Revocation Model for mobile devices. In: Proceedings of IEEE International Conference on computational Intelligence and Communication Networks, Gwalior, India, IEEE Computer Society, pp. 635-638, 2011.
  12. Ingle M, Kumar M. Comparative Analysis of Methods for Distribution of Certificate Revocation Information in Mobile Environment. In: Proceedings of International Conference on Communication Systems and Network Technologies, Jammu, India, IEEE Computer Society, pp. 166-169, 2011.
  13. Khajaria K, Kumar M. Evaluation of Approaches for Modeling of Security in Data Warehouses. In: Proceedings of First International Conference on Advances in Computing and Communications, Kochi, India, Springer CCIS, Vol.191, Part-1, pp. 9-18, 2011.
  14. Saroop S, Kumar M. Comparison of Data Warehouse Design Approaches from User Requirement to Conceptual Model: A Survey. In: Proceedings of International Conference on Communication Systems and Network Technologies, Jammu, India, IEEE Computer Society, pp. 308-312, 2011.
  15. Singh Y, Gosain A, Kumar M. From Early Requirements to Late Requirements Modeling for a Data warehouse. In: Proceedings of International Joint Conference on INC, IMS & IDC ‘NCM09’, Korea, IEEE Computer Society, pp. 798-804.
  16. Singh Y, Gosain A, Kumar M. Evaluation of Agent Oriented Requirements Engineering Frameworks. In: Proceedings of International Conference on Computer Science and Software Engineering ‘CSSE08’, Wuhan, China, IEEE Computer Society, pp. 33-38.

National Conferences

1.    Kumar M, Gosain A. Data Warehouse Development Approach for improving quality of organizational decision making. In: proceedings of the National Conference ‘NCCT-06’, pp.103-106,  DIT, Dehradun, India.


2.    Singh Y, Gosain A, Kumar M. Conceptual Design of a Data Warehouse. In: proceedings of the     National Conference ‘NCCT-06’, pp. 83-86, 2006,  DIT, Dehradun, India.


3.    Singh Y, Kumar M, Gosain A. Data Warehouse Development Approaches: A Comparison. In:     proceedings of the National Conference 'RPIT-04’, pp. 56-59, SLIET, Longowal, India.


4.    Kumar M, Singh K.V, Singh B. Decision Support System: A Conceptual Overview. In: proceedings of the National Conference ‘RPIT-04’, pp. 75-77, SLIET, Longowal, India.

Books/Book Chapters

1. Singh N,  Kumar, M. Accident Hotspot Identification by Affinity Propagation and Compared With Different Clustering Algorithms. In: Swaroop, A., Kansal, V., Fortino,        G., Hassanien, A.E. (eds) Proceedings of Fourth Doctoral Symposium on Computational    Intelligence. DoSCI 2023. Lecture Notes in Networks and Systems, Vol 726. Springer, Singapore. https://doi.org/10.1007/978-981-99-3716-5_17, (First Online, September 2023).

2. Chaudhary R, Kumar M. Deep Neural Network with Optimal Tuned Weights for Automated Crowd Anomaly Detection. In: Bhattacharya, A., Dutta, S., Dutta, P., Piuri, V.(eds) Innovations in Data Analytics. ICIDA 2022. Advances in Intelligent Systems and Computing, Vol 1442. Springer, Singapore. https://doi.org/10.1007/978-981-99-   0550-8_43, June 2023.

3. Singh, N., Kumar, M. Road Traffic Density Classification to Improvise Traffic System     Using Convolutional Neural Network (CNN). In: Mahapatra, R.P., Peddoju, S.K., Roy,            S., Parwekar, P. (eds) Proceedings of International Conference on Recent Trends in      Computing. Lecture Notes in Networks and Systems, Vol. 600. Springer, Singapore.       https://doi.org/10.1007/978-981-19-8825-7_34  (First online, March 2023).

4. Chaudhary R, Kumar M. Computer Vision-Based Framework for Anomaly Detection. In: Kumar R., Mishra B K.,Patnaik PK(eds) Next Generation of Internet of Things. Lecture Notes in Networks and Systems, Vol 201, Springer, Singapore. https://doi.org/10.1007/978-981-16-0666-3_45, 2021. (First online, June 2021).

5. Tomer M, Kumar M. Question Answering System using LSTM and Keyword Generation. In: Goar V., Kuri M., Kumar R.,Senjyu T.(eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, Vol 135, Springer, Singapore, 2021(First online, August 2020).

6. Tomer M, Kumar M. Text Summarization with Different Encoders for Pointer enerator Network. In: Khanna A, Gupta D, Bhattacharyya S, Snasel V, Platos J, Hassanien A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1087. Springer, Singapore, 2020.

7. Tiwari D, Kumar M. Social Media Data Mining Techniques: A Survey. In: Tuba    M., Akashe S., Joshi A. (eds) Information and Communication Technology for     Sustainable Development. Advances in Intelligent Systems and Computing, vol          933.Springer, Singapore, 2019.

8. Mani, Suri B.  Kumar M. Performance Evaluation of Data Mining Techniques. In: Mishra D., Nayak M., Joshi A. (eds) Information and Communication   Technology for Sustainable Development. Lecture Notes in Networks and             Systems, vol 9. Springer, Singapore, 2018.

9. Raychaudhuri K, Kumar M, Bhanu S. A Comparative Study and Performance Analysis of Classification Techniques: Support Vector Machine, Neural Networks and Decision Trees. In: Singh M., Gupta P., Tyagi V., Sharma A., Ören T., Grosky W. (eds) Advances in Computing and Data Sciences. Communications in Computer and Information Science, vol 721. Springer, Singapore, 2017.

10. Sharma R, Gaur H, Kumar M. Evaluation of Data Warehouse Quality from Conceptual Model Perspective. In: Advances in Intelligent Informatics, EI-Sayed M, EI-Alfy et al.(eds.), Springer, 2015.

11. ‘Web Applications Students Hand Book’ for Class XI  (Vocational IT) published by CBSE in the year  June 2016 authored by  Dr.Manoj Kumar, Dr. Pradeep Kumar, Ms. Manju Khari.

12. ‘Web Application Students Hand Book’ for Class XII (Vocational IT) published by CBSE in the year October 2015 authored by  Dr. Manoj Kumar, Dr. Pradeep Kumar, Ms. Manju Khari. 

 

Order By Weight
0