School of Computer Science and Engineering

Research

Journal Publications (SCI Indexed)

Year 2020

1. Poongodi, M., Sharma, A., Vijayakumar, V., Bhardwaj, V., Sharma, A. P., Iqbal, R., & Kumar, R. (2020). Prediction of the price of Ethereum blockchain cryptocurrency in an industrial finance system. Computers & Electrical Engineering, 81(1), 106527. (IF : 2.189)
2. Sukumar, A., Subramaniyaswamy, V., Vijayakumar, V., & Ravi, L. (2020). A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage. Multimedia Tools and Applications, 1-25. (IF : 2.101)
3. Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2020). Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles. Journal of Medical Systems, 44(1), 29. (IF : 2.415)
4. Rajesh, K. B. (2018). Cybernetic microbial detection system using transfer learning. Multimedia Tools and Applications, 1(1), 1-18. (IF : 2.101)
5. Geetha, R., & Geetha, S. (2020). Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimedia Tools and Applications, 1(1), 1-22. (IF : 2.101)
6. Geetha, R., & Geetha, S. (2020). Efficient high capacity technique to embed EPR information and to detect tampering in medical images. Journal of Medical Engineering & Technology, 1(1), 1-14. (IF : 1.4)
7. Suresh Kumar, D., & Jagadeesh Kannan, R. (2020). Reinforcement learning-based controller for adaptive workflow scheduling in multi-tenant cloud computing. The International Journal of Electrical Engineering & Education, Online First, 0020720919894199. (IF : 0.941)
8. Chakravarthi, S. S., & Kannan, R. J. (2020). Detection of anomalies in cloud services using network flowdata analysis. The International Journal of Electrical Engineering & Education, Online First, 0020720920901436. (IF : 0.941)
9. Sarobin, M. V. R. (2020). Optimized Node Deployment in Wireless Sensor Network for Smart Grid Application. Wireless Personal Communications, 111(3), 1431-1451. (IF : 0.929)
10. Rai, A. & Kannan, R. J. (2020). IP traffic modelling in scalable drone network for carrying scalable logistic operations. Wireless Personal Communications. Article in Press. (IF : 0.929)
11. Rekha, D. (2020). Sustainability modelling and green energy optimisation in microgrid powered distributed Fog Micro Data Centers in rural area. Wireless Networks, 1(1), 1-14. (IF : 2.405)
12. Jackson, C. J., Rekha, D., Vijayakumar, V., Carvalho, G. H. S. (2020) Optimal broadcast scheduling method for VANETs: an adaptive discrete firefly approach. Journal of Intelligent Fuzzy Systems, Accepted. (IF : 1.637)
13. Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET COMMUNICATIONS, 14(5), 888-895. (IF : 1.779)
14. Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637-1658. (IF : 0.929)
15. Pandiyaraju, V., Logambigai, R., Ganapathy, S., & Kannan, A. (2020). An Energy Efficient Routing Algorithm for WSNs Using Intelligent Fuzzy Rules in Precision Agriculture. Wireless Personal Communications, 1(1), 1-17. (IF : 0.929)
16. Ramasamy, J., & Kumaresan, J. S. (2020). Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks. Wireless Personal Communications, 1(1), 1-14. (IF : 0.929)
17. Kirthica, S., Saravanan, I., & Sridhar, R. (2020). Enhancing the Cloud Inter-operation Toolkit (CIT) to support multiple cloud service models. Journal of Grid Computing. Available Online. (IF : 3.288)
18. Chakravarthi, K. K., Shyamala, L., & Vaidehi, V. (2020). Budget aware scheduling algorithm for workflow applications in IaaS clouds. Cluster Computing, 1(1), 1-15. (IF : 2.04)
19. Chakravarthi, K. K., Shyamala, L., & Vaidehi, V. (2020). TOPSIS inspired Cost-Efficient Concurrent Workflow Scheduling Algorithm in Cloud. Journal of King Saud University-Computer and Information Sciences, 1(1), 15. (IF : 1.897)

20. N. Ilakiyaselvan, A. Nayeemulla Khan, A. Shahina. Deep learning approach to detect seizure using reconstructed phase space images[J]. The Journal of Biomedical Research, 2020, 34(3): 240-250.

Year 2019

1. Harini, S., & Pattabiraman, V. (2019). SeRA: Self-Repairing Architecture for Dark Silicon Era. Journal of Circuits, Systems and Computers, 28(6), 2050053. (IF : 0.595)
2. Malathi, D., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., & Sangaiah, A. K. (2019). Hybrid reasoning-based privacy-aware disease prediction support system. Computers & Electrical Engineering, 73, 114-127. (IF : 2.189)
3. Klug, N., Chauhan, A., Vijayakumar, V., & Ragala, R. (2019). k-RNN: Extending NN-heuristics for the TSP. Mobile Networks and Applications, 24(4), 1210-1213. (IF : 2.39)
4. Poongodi, M., Vijayakumar, V., Al-Turjman, F., Hamdi, M., & Ma, M. (2019). Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics. IEEE Access, 7, 158481-158491. (IF : 4.098)
5. Devarajan, M., Subramaniyaswamy, V., Vijayakumar, V., & Ravi, L. (2019). Fog-assisted personalized healthcare-support system for remote patients with diabetes. Journal of Ambient Intelligence and Humanized Computing, 10(10), 3747-3760. (IF : 1.91)
6. Kumar, C., Sathish Kumar, K., Indra Gandhi, V., Vijayakumar, V., & Rawal, B. S. (2019). A novel distribution system reconfiguration for loss minimization using symbiotic organism search algorithm. Journal of Intelligent & Fuzzy Systems, 36(5), 4319-4326. (IF : 1.637)
7. Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23. (IF : 5.392)
8. Athanesious, J. J., Chakkaravarthy, S. S., Vasuhi, S., & Vaidehi, V. (2019). Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering. Multimedia Tools and Applications, 78(14), 19877-19903. (IF : 2.101)
9. Marimuthu, P., Perumal, V., & Vijayakumar, V. (2019). OAFPM: optimized ANFIS using frequent pattern mining for activity recognition. The Journal of Supercomputing, 75(8), 5347-5366. (IF : 2.157)
10. Tembhare, A., Chakkaravarthy, S. S., Sangeetha, D., Vaidehi, V., & Rathnam, M. V. (2019). Role-based policy to maintain privacy of patient health records in cloud. The Journal of Supercomputing, 75(9), 5866-5881. (IF : 2.157)
11. JothiPrabha, A., & Bhargavi, R. (2019). Prediction of Dyslexia from Eye Movements Using Machine Learning. IETE Journal of Research, 1(1), 1-10. (IF : 0.793)
12. Maya Gopal, P. S., & Bhargavi, R. (2019). A novel approach for efficient crop yield prediction. Computers and Electronics in Agriculture, 165(1), 104968. (IF : 3.171)
13. Maya Gopal, P. S., & Bhargavi, R. (2019). Performance Evaluation of Best Feature Subsets for Crop Yield Prediction Using Machine Learning Algorithms. Applied Artificial Intelligence, 33(7), 621-642. (IF : 0.988)
14. Gopal, P. M., & Bhargavi, R. (2019). Optimum Feature Subset for Optimizing Crop Yield Prediction Using Filter and Wrapper Approaches. Applied Engineering in Agriculture, 35(1), 9-14. (IF : 0.74)
15. Prakash, B., & Viswanathan, V. (2019). Distributed cat modeling based agile framework for software development. Sadhana – Academy Proceedings in Engineering Sciences, 44(7), 166. (IF : 0.769)
16. Rajarajeswari, S., & Neelanarayanan, V. (2019). Dynamic rule generation and rule matching for composite environmental condition. Wireless Networks, 1(1), 1-9. (IF : 2.405)
17. Vijayalakshmi, A., & Rajesh Kanna, B. (2019). Deep learning approach to detect malaria from microscopic images. Multimedia Tools and Applications, 1(1), 1-21. (IF : 2.101)
18. Maheswari, M., & Geetha, S. (2019). Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system. Cluster Computing, 22(5), 12325-12338. (IF : 2.04)
19. Hemalatha, J., Devi, M. K., & Geetha, S. (2019). Improving image steganalyser performance through curvelet transform denoising. Cluster Computing, 22(5), 11821-11839. (IF : 2.04)
20. Koteeswaran, S., Malarvizhi, N., Kannan, E., Sasikala, S., & Geetha, S. (2019). Data mining application on aviation accident data for predicting topmost causes for accidents. Cluster computing, 22(5), 11379-11399. (IF : 2.04)
21. Punithavathi, P., & Geetha, S. (2019). Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications. Multimedia Tools and Applications, 78(18), 25487-25514. (IF : 2.101)
22. Punithavathi, P., Geetha, S., Karuppiah, M., Islam, S. H., Hassan, M. M., & Choo, K. K. R. (2019). A lightweight machine learning-based authentication framework for smart IoT devices. Information Sciences, 484(1), 255-268. (IF : 5.524)
23. Bharathiraja, S. (2019). Anti-forensics contrast enhancement detection (AFCED) technique in images based on laplace derivative histogram. Mobile Networks and Applications, 24(4), 1174-1180. (IF : 2.39)
24. Dinesh Jackson Samuel, R., & Rajesh Kanna, B. (2019). A programmable microscopic stage: Design and development. Microscopy research and technique, 82(4), 429-442. (IF : 1.147)
25. Samuel, R. D. J., & Kanna, B. R. (2019). Tuberculosis (TB) detection system using deep neural networks. Neural Computing and Applications, 31(5), 1533-1545. (IF : 4.664)
26. Subburam, S., Selvakumar, S., & Geetha, S. (2018). High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimedia Tools and Applications, 77(6), 7071-7095. (IF : 2.101)
27. Rajkumar, S., & Malathi, G. (2019). Impact of image artifact and solution to the image quality issues in real time SAR images. Mobile Networks and Applications, 24(4), 1166-1173. (IF : 2.39)
28. Rai, A., & Kannan, R. J. (2019). Consensus-based decision making in non-linearly multi-coupled IoT networked SLAM operations. The International Journal of Electrical Engineering & Education, 1 (1), 0020720919883797. (IF : 0.941)
29. Kamaraj, P., & Kannan, R. J. (2019). Design and development of the optical control network active phased array radar. INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 1 (1), 10. (IF : 0.941)
30. Chakravarthi, S. S., & Kannan, R. J. (2019). Non-linear Dimensionality Reduction-based Intrusion Detection using Deep Autoencoder. Network, 10(8), 1. (IF : 0.14)
31. Rai, A., & Kannan, R. J. (2019). One-shot learning technique regression of reconfigurable learning network for generative modeling in interconnected imaging infrastructure. The International Journal of Electrical Engineering & Education, 1 (1), 0020720919895908. (IF : 0.941)
32. Rai, A., & Kannan, R. J. (2019). Co-simulation Based Finite State Machine for Telematic and Data Compression Microservices in IoT. Wireless Personal Communications, 105(3), 1069-1082. (IF : 0.929)
33. Narasappa, J. H., & Rekha, D. (2019). Energy aware methodical data forwarding (EAMDF) mechanism in VANET. Journal of Intelligent & Fuzzy Systems, 36(5), 4293-4303. (IF : 1.637)
34. Kumar, C., Sathish Kumar, K., Indra Gandhi, V., Vijayakumar, V., & Rawal, B. S. (2019). A novel distribution system reconfiguration for loss minimization using symbiotic organism search algorithm. Journal of Intelligent & Fuzzy Systems, 36(5), 4319-4326. (IF : 1.637)
35. Vijayakumar, V., Subramaniyaswamy, V., Abawajy, J., & Yang, L. (2019). Intelligent, smart and scalable cyber-physical systems. Journal of Intelligent and Fuzzy Systems, 36(5), 3935-3943. (IF : 1.637)
36. Md, A. Q., Varadarajan, V., & Mandal, K. (2019). Efficient algorithm for identification and cache based discovery of cloud services. Mobile Networks and Applications, 24(4), 1181-1197. (IF : 2.39)
37. Joshua, Christy. J., Duraisamy, R., & Varadarajan, V. (2019). A reputation based weighted clustering protocol in VANET: a multi-objective firefly approach. Mobile Networks and Applications, 24(4), 1199-1209. (IF : 2.39)
38. Joshua, Christy. J., & Varadarajan, V. (2019). An optimization framework for routing protocols in VANETs: a multi-objective firefly algorithm approach. Wireless Networks, 1 (1), 1-10. (IF : 2.405)
39. Anusooya, G., & Vijayakumar, V. (2019). Reduced carbon emission and optimized power consumption technique using container over virtual machine. Wireless Networks, 1 (1), 1-19. (IF : 2.405)
40. Anusooya, G., Vijayakumar, V., & Narayanan, V. N. (2019). Reducing the carbon emission by early prediction of peak time load in a data center. Journal of Intelligent & Fuzzy Systems, 36(5), 4341-4348. (IF : 1.637)
41. Sivakumar, V., & Rekha, D. (2020). A QoS‐aware energy‐efficient memetic flower pollination routing protocol for underwater acoustic sensor network. Concurrency and Computation: Practice and Experience, 32(4), e5166. (IF : 1.167)
42. Prassanna, J., & Venkataraman, N. (2019). Threshold based multi-objective memetic optimized round Robin scheduling for resource efficient load balancing in cloud. Mobile Networks and Applications, 24(4), 1214-1225. (IF : 2.39)
43. Prassanna, J., & Venkataraman, N. (2019). Adaptive regressive holt–winters workload prediction and firefly optimized lottery scheduling for load balancing in cloud. Wireless Networks, 1(1), 1-19. (IF : 2.405)
44. Varadarajan, V., Neelanarayanan, V., Doyle, R., Al-Shaikhli, I. F., & Groppe, S. (2019). Mobile Networks in the Era of Big Data. Mobile Networks and Applications, 24(4), 1135-1138. (IF : 2.39)
45. Varadarajan, V., Neelanarayanan, V., Doyle, R., Al-Shaikhli, I. F., & Groppe, S. (2019). Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks. Mobile Networks and Applications, 24(3), 1015-1017. (IF : 2.39)
46. Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475-1490. (IF : 0.929)
47. Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181-190. (IF : 3.03)
48. Kanimozhi, U., Ganapathy, S., Manjula, D., & Kannan, A. (2019). An intelligent risk prediction system for breast cancer using fuzzy temporal rules. National Academy Science Letters, 42(3), 227-232. (IF : 0.331)
49. Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Networking and Applications, 12(5), 1076-1096. (IF : 2.397)
50. Perumal, S. P., Sannasi, G., & Arputharaj, K. (2019). An intelligent fuzzy rule-based e-learning recommendation system for dynamic user interests. The Journal of Supercomputing, 75(8), 5145-5160. (IF : 2.157)
51. Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks, 151, 211-223. (IF : 3.03)
52. Dhanapal, A., & Nithyanandam, P. (2019). An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks. Wireless Networks, 1(1), 1-11. (IF : 2.405)
53. Vanamoorthy, M., & Devendran, V. (2019). Congestion-Free Transient Plane (CFTP) Using Bandwidth Sharing During Link Failures in SDN. The Computer Journal, 1(1), 10. (IF : 0.98)
54. Karmel, A., Vijayakumar, V., & Kapilan, R. (2019). Ant-based efficient energy and balanced load routing approach for optimal path convergence in MANET. Wireless Networks, 1(1), 1-13. (IF : 2.405)
55. Ravi, L., Subramaniyaswamy, V., Vijayakumar, V., Chen, S., Karmel, A., & Devarajan, M. (2019). Hybrid location-based recommender system for mobility and travel planning. Mobile Networks and Applications, 24(4), 1226-1239. (IF : 2.39)
56. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., & Li, X. (2019). Efficient user profiling based intelligent travel recommender system for individual and group of users. Mobile Networks and Applications, 24(3), 1018-1033. (IF : 2.39)
57. Vijayakumar, V., Priyan, M. K., Ushadevi, G., Varatharajan, R., Manogaran, G., & Tarare, P. V. (2019). E-health cloud security using timing enabled proxy re-encryption. Mobile Networks and Applications, 24(3), 1034-1045. (IF : 2.39)
58. Ravi, L., Subramaniyaswamy, V., Devarajan, M., Ravichandran, K. S., Arunkumar, S., Indragandhi, V., & Vijayakumar, V. (2019). SECRECSY: A secure framework for enhanced privacy-preserving location recommendations in cloud environment. Wireless Personal Communications, 108(3), 1869-1907. (IF : 0.929)
59. Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2019). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 75(6), 3184-3216. (IF : 2.157)
60. Sharma, A., Rathee, G., Kumar, R., Saini, H., Varadarajan, V., Nam, Y., & Chilamkurti, N. (2019). A Secure, Energy-and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System. Sensors, 19(9), 2119. (IF : 3.039)
61. Prachi Sarode and Reshmi TR 2019, Optimized Query Ordering Data Aggregation model using Neural Networks and Group Search Optimization in Wireless Sensor networks, Ad Hoc & Sensor Wireless Networks (AHSWN) (SCI Indexed) – In Press. (IF : 0.56)
62. Dhanashri W and Reshmi TR 2019, Cat-Swarm-Optimization-Based Energy-Efficient Re-liable Sectoring Scheme in WSN, Journal of Information Science & Engineering, Special Issue on “Advanced Networking and Communication Solutions for Wireless Mobile Networks” (SCI Indexed) – In Press. (IF : 0.525)

63. Satapathy A. & Jenila Livingston L.M.(2019, Oct). Optimized OpenCL™ kernels for frequency domain image high-boost filters using image vectorization technique. SN Applied Sciences, Springer International Publishing, p-ISSN: 2523-3963, e-ISSN: 2523-3971, Vol. 1, Issue -11, Pages: 1424. https://doi.org/10.1007/s42452-019-1445-9
64. D M Ajay and E Umamaheswari, “Packet Encryption for Securing Real-Time Mobile Cloud Applications”. Mobile Networks and Applications, Aug 2019, Volume – 24, Issue – 4, pp.1249-1254 (IF- 2.39).

Year 2018

1. Sethuraman, S. C., Dhamodaran, S., & Vijayakumar, V. (2018). Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. IET Networks, 8(4), 219-232. (IF : 2.58) (Available in 2019 publication)
2. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2018). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673. (IF : 4.639)
3. Vignesh, U., & Parvathi, R. (2018). 3D visualization and cluster analysis of unstructured protein sequences using ARCSA with a file conversion approach. The Journal of Supercomputing, 1-15. (IF : 2.157)
4. Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering, 70, 179-198. (IF : 2.189)
5. Mohanraj, V., Sibi Chakkaravarthy, S., Gogul, I., Sathiesh Kumar, V., Kumar, R., & Vaidehi, V. (2018). Hybrid feature descriptors to detect face spoof attacks. Journal of Intelligent & Fuzzy Systems, 34(3), 1411-1419. (IF : 1.637)
6. Suseela, G., & Phamila, Y. A. V. (2018). Energy efficient image coding techniques for low power sensor nodes: A review. Ain Shams Engineering Journal, 9(4), 2961-2972. (IF : 3.091)
7. Jasmine, S. G., & Pattabiraman, V. (2018). Improved pure pixel identification algorithms to determine the endmembers in hyperspectral images. Computers & Electrical Engineering, 71, 515-532. (IF : 2.189)
8. Sivakumar, V., & Rekha, D. (2018). Node scheduling problem in underwater acoustic sensor network using genetic algorithm. Personal and Ubiquitous Computing, 22(5-6), 951-959. (IF : 1.735)
9. Reshmi, T. R. (2018). Enhanced Passive Duplicate Address Detection (EPDAD) for Autoconfiguration in MANETs. Journal of Information Science & Engineering, 34(4), 10. (IF : 0.525)
10. Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy–efficient grid–based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62-75. (IF : 2.189)
11. Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters, 41(4), 219-223. (IF : 0.331)
12. Vijay Kumar, T. J., Naidu, L., Nehemiah, H. K., Ganapathy, S., & Kannan, A. (2018). Identification and classification of pulmonary nodule in lung modality using digital computer. Applied Mathematics and Information Sciences, 12(2), 451-459. (IF : 0.31)
13. Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., & Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering & Computer Sciences, 26(3), 1444-1452. (IF : 0.625)
14. Kirthica, S., & Sridhar, R. (2018). A residue-based approach for resource provisioning by horizontal scaling across heterogeneous clouds. International Journal of Approximate Reasoning, 101, 88-106. (IF : 1.982)
15. Kirthica, S., & Sridhar, R. (2018). Horizontal scaling and aggregation across heterogeneous clouds for resource provisioning. Computers & Electrical Engineering, 69, 301-316. (IF : 2.189)
16. Logesh, R., Subramaniyaswamy, V., Malathi, D., Sivaramakrishnan, N., & Vijayakumar, V. (2018). Enhancing recommendation stability of collaborative filtering recommender system through bio-inspired clustering ensemble method. Neural Computing and Applications, 1-24. (IF : 4.664)

17. K Dinesh Kumar and E Umamaheswari, “Prediction methods for effective resource provisioning in cloud computing: A survey”, Multiagent and Grid Systems, ISSN No. 1574-1702, Vol. 14, No. 3, pp. 283-305, 2018 (IF-0.56).

Year 2017

1. Subramaniam, J., Kannan, R. J., & Ebenezer, D. (2017). Parallel and pipelined 2-D median filter architecture. IEEE Embedded Systems Letters, 10(3), 69-72. (IF : 1.5) (Available in 2018 publications)
2. Audithan, S., Vijayasaro, V., Vijayakumar, P., & Vijayakumar, V. (2017). An Efficient Authentication Scheme for Mobile Cloud Computing Services. Journal of Information Science & Engineering, 33(3). (IF : 0.525)
3. Pandiaraja, P., Vijayakumar, P., Vijayakumar, V., & Seshadhri, R. (2017). Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud. Journal of Information Science & Engineering, 33(3). (IF : 0.525)
4. Sangeetha, D., & Vaidehi, V. (2017). Improved Searchable Attribute Based Encryption in Cloud. Journal of Information Science & Engineering, 33(3). (IF : 0.525)
5. Muthumeenakshi, R., Reshmi, T. R., & Murugan, K. (2017). Extended 3PAKE authentication scheme for value-added services in VANETs. Computers & Electrical Engineering, 59(1), 27-38. (IF : 2.189)
6. Reshmi, T. R., & Murugan, K. (2017). Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs. China Communications, 14(9), 114-126. (IF : 1.882)
7. Sasikala, S., alias Balamurugan, S. A., & Geetha, S. (2017). A novel adaptive feature selector for supervised classification. Information Processing Letters, 117(1), 25-34. (IF : 0.605)
8. Bharathi, C., Rekha, D., & Vijayakumar, V. (2017). Genetic algorithm based demand side management for smart grid. Wireless personal communications, 93(2), 481-502. (IF : 0.929)
9. Prabakaran, N., & Kannan, R. J. (2017). Sustainable life-span of WSN nodes using participatory devices in pervasive environment. Microsystem Technologies, 23(3), 651-657. (IF : 01.513)
10. Subramaniam, J., Kannan, R. J., & Ebenezer, D. (2017). Fast median-finding word comparator array. Electronics Letters, 53(21), 1402-1404. (IF : 1.343)
11. Jayaram, B., Arumugam, S., & Thulasiraman, K. (2017). Dominator sequences in bipartite graphs. Theoretical Computer Science, 694, 34-41. (IF : 0.718
12. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications, 96(2), 1753-1769. (IF : 0.929)
13. Selvi, M., Velvizhy, P., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2019). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(5), 10839-10848. (IF : 2.04)
14. Saraswathi, S., Devi, S. R., & Yogesh, P. (2017). Secure Smart Card Based Remote User Authentication Scheme for Multi-Server Environment to Eliminate Smart Card Security Breach. Journal of Computational and Theoretical Nanoscience, 14(11), 5174-5183.
15. Prasad, M., & Manoharan, R. (2015). DS-AKA-A Novel Secured Authentication Protocol for LTE-A Using Public Key Cryptography. Journal of Internet Technology, 18(4) , 753-763. (IF : 0.715)

Year 2016

1. Muralidhar. A., Pattabiraman. V., & Sathe, A.A. (2016). A novel approach to extract greater profitable itemsets. International Journal of Pure and Applied Mathematics 109(8), 83-90.
2. Anuradha, A., & Viswanathan, V. (2016). Store attribute (s) preference of customers towards organised food and grocery retail outlets-a gap analysis. International Journal of Business Excellence, 10(1), 120-138.
3. Viswanathan, V. (2016). Discovery of semantic associations in an RDF graph using bi-directional BFS on massively parallel hardware. International Journal of Big Data Intelligence, 3(3), 176-181.
4. Nachiyappan, S., & Selwyn, J. (2016). Big data validation needs and challenges. International Journal of Pharmacy and Technology, 8(4), 21998-22008.
5. Nachiyappan, S. and Selwyn, J. (2016). Towards an automated testing framework for big data. International Journal of Control Theory and Applications. 9(52),1.
6. Saikia, S., Saleena, B., & Prakash, B. (2016). Enhancing the accuracy of prediction and classification of crime using SVM. International Journal of Control Theory and Applications, 9(52), pp. 1-11.
7. Ajay, D.M. & Umamaheswari, E. (2016). Why, how cloud computing – how not and cloud security issues. Global Journal of Pure and Applied Mathematics, 12(1), 1-8.
8. Ajay, D.M. & Umamaheswari, E. (2016). Evaluating the efficiency of security mechanisms in cloud environments. International Journal of Control Theory and Applications, 9(51), 75-85.
9. Hema, N., & Selwyn, J. (2016). Knowledge base representation model for a structured repository, International Journal of Engineering Science and Computing, 6(3), 2126-2132.
10. Hema N., & Selwyn, J. (2016). Generation of ICD code using graph form of knowledge representation. International Journal of Control Theory and Applications, 9(52), 9-21.
11. Hepsiba Mabel, V., & Selwyn, J. (2016). A review on the knowledge representation models and its implications. International Journal of Information Technology and Computer Science (IJITCS), 8(10), 72-81.
12. Priya, M. K., & Selwyn, J. (June,2016). An exploratory study on the practices of knowledge management in software development organizations. International Journal of Business Intelligents, 5(1), 1-7.
13. Nimbalkar, Y. A., & Justus, S. (2016). Design of layers in knowledgebase for expert systems. IOSR Journal of Computer Engineering, 18(3), 89-93.
14. Kamala, S. P. R., & Justus, S. (2016). Towards MORK: Model for Representing Knowledge. International Journal of Modern Education and Computer Science, 8(3), 45.
15. Nachiyappan, S., & Selwyn, J. (2016, March). Understanding and addressing technical challenges for big data. International Journal of Engineering Science and Computing, 6(3), 2132-2135.
16. Mehta, S., Singh, R.K., & Sivabalakrishnan, M. (2016). Analyzing the cancer to improve the health using big data analytics: a review. International Journal of Control Theory and Applications, 9(52), 1.
17. Bhargavi, R. (2016). Online Dynamic Regressive Learning. International Journal of Applied Engineering Research, 11(3), 2085-2090.
18. Bhargavi, R., & Abraham, M.S. (2016). A study and evaluation of Hoeffding tree for stream data mining. International Journal of Engineering and future Technology, 8(8), 18- 27.
19. Rajkumar, S., & Malathi, G. (2016). A comparative analysis on image quality assessment for real time satellite images. Indian J. Sci. Technol, 9.
20. Rajkumar, S., Malathi, G., Kumar, D.V. (2016). An axiomatic image enhancement algorithm in the field of image processing application, International Journal of Control Theory and Applications, 51(9),187-193.
21. Punithavathi, P., & Geetha, S. (2016). Securing multimodal biometrics using random projection-based template transformation. International Journal of Control Theory and Applications, 9(52), 33–43.
22. Nirmala, G., Geetha, S., & Selvakumar, S. (2016). Mobile robot localization and navigation in artificial intelligence: Survey. Computational Methods in Social Sciences, 4(2), 12.
23. Geetha, S., & Sharma, S. (2016). Implementation of artificial neural networks in multimodal image recognition and text. International Journal of Advanced Research, 4(8), 1285–1291.
24. Kanmani, A., Karthikeyan, N. & Geetha, S. (2016). High capacity separable data hiding using repeated histogram modification in integer wavelet transform domain. Asian Journal of Information Technology, 15(5), 862-865.
25. Hussain, S.H., Geetha, S., & Prabakar, M.A. (2016). Design and implementation of adaptive model for sustainable home automation using Internet Of Things (IoT). International Journal of Advanced Engineering Technology, 7(1), 827-829.
26. Sivakumar, T. B., Geetha, S., & AmuthaPrabhakar, M. (2016). An efficient advanced hierarchical attribute based scheme with asymmetric encryption for personal health records in cloud computing. Int J Adv Engg Tech, 7(1), 892-895.
27. Sandhya P. (2016, March). Developing evaluators for e-commerce application, International Journal of Applied Engineering Research, 11(5), 3386-3389.
28. Suseela, G., & Y. Phamila, Y.A.V. (2016). Gamboled image compression technique for low power devices with binary DCT and torus automorphism”, International Journal of Engineering Science and Computing, 6(6), 6655-6657.
29. Kalaivani, K., & Phamila, Y.A.V. (2016). Analysis of image fusion techniques based on quality assessment metrics. Indian Journal of Science and Technology, 9 (31), 1-8.
30. Suseela, G., & Y. Phamila, Y.A.V. (2016). Secured image compression using wavelet transform. Indian Journal of Science and Technology, 9, 33.
31. Jasmine, S.G, & Pattabiraman. V. (2016). Performance evaluation of dimensionality reduction in hyperspectral imaging, International Journal of Control Theory and Applications, 9(52), 169-178.
32. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, March). Efficient algorithm for frequent itemset generation in big data, International Journal of Advanced Research in Science, Engineering and Technology, 3(3), 1735-1740.
33. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, January). Minimize the utilization of household items using FP-tree, International Journal for Research in Applied Science and Engineering Technology(IJRASET), 4(1), 330-337.
34. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, January). Glaucoma prediction system using associative classification, International Journal of Multidisciplinary Research Centre (IJMRC), 2(8), 1-4.
35. Jeeva, S., & Sivabalakrishnan, M. (2016). Robust background subtraction for real time video processing. International Journal of Pure and Applied Mathematics, 109(5), 117-124.
36. Singh, R.K., & Sivabalakrishnan, M. (2016, December). Analyzing the impact of diseases on cancer to improve the health using big data analytics: a review, International Journal of Control Theory and Applications ,9(52), 199-203.
37. Jeeva, S., & Sivabalakrishnan, M. (2016). Background estimation techniques, a review, International Journal of Control Theory and Applications, 9(52), 199-203,
38. Sivagami, M., Revathi, T., & Jeganathan L. (2016). Adaptive foreground object extraction in real time videos using fuzzy c means with weber principle, Indian Journal of Science and Technology. 9(29), 1-9.
39. Bhatt, M.L.S., & Bharathiraja, S. (2016). Rainy image restoration using iterative algorithm. International Journal of Applied Engineering Research, 10(34), 27158-27161.
40. Bharathiraja, S., & Kanna, B.R. (2016, December). Pragmatic analysis on drowning detection system in swimming pool, International Journal of Control Theory and Applications, 9(51),
41. Samuel, R.D.J., & Kanna, B.R. (2016). Design to automate the identification and counting of tuberculosis bacilli, International Journal of Control Theory and Applications, 9 (52), 303-310.
42. Vincent, R., & Vijayakumar, V. (2016). Analyzing prospects of autistic children to create context aware ambiance. International Journal of Pure and Applied Mathematics, 109(10), 129-137.
43. Rukmani, P., & Ganesan, R. (2016). Enhanced low latency queuing algorithm for real time applications in wireless networks. International Journal of Technology, 7(4), 663-672.
44. Maheswari, R., & Pattabiraman, V. (2016). Petri Net-based System Modelling for Performance Analysis of Reconfigurable Soft-core Processor using FPGA. International Journal of Technology, 7(6), 1054-1067.
45. Sarobin, V. R. M., & Ganesan, R. (2016). Bio-Inspired, cluster-based deterministic node deployment in wireless sensor networks. International Journal of Technology, 7(4), 673-682.
46. Sarobin, V. R. M., & Thomas, L. A. (2016). Improved LEACH algorithm for energy efficient clustering of wireless sensor network (WSN). International Journal of Technology, 7(1), 50-60.
47. Aparna Vijaya and, “A Model Driven Framework for Portable Cloud Services”, International Journal of Electrical and Computer Engineering, ol. 6(2):708 – 716, 2016.
48. Vijaya, A., & Neelanarayanan, V. (2016). A Model Driven Framework for Portable Cloud Services. International Journal of Electrical & Computer Engineering, 6(2), 708-716.
49. Asha Shiny, X. S., & Jagadeesh Kannan, R. (2016). Maximizing Energy Based on SNR using Self Organizing Map in MANETs. International Journal of Computing, 5(1), 1-10.
50. Shinde, S.S., Manusmare, R.P., Lawange, A., & Kannan, R.J. (2016). Neural network based biometric technology for fingerprint classification. International Journal of Pharmacy and Technology (IJPT),8(3), 18742-18754.
51. Waghmare, A., Verma, N., Gaur, A., & Kannan, R.J. (2016). Neural network based feature analysis of mortality risk by heart failure, International Journal of Pharmacy and Technology (IJPT), 8(3), 18755-18762.
52. Devendra, K.C., Tomar, A.S., Javali, P.N., & Kannan, R.J. (2016). Facial emotion recognition using neural network. International Journal of Pharmacy and Technology (IJPT), 8(3), 18727-18733.
53. Bhopale, M., Kshatriya, A., Kumar, P., & Kannan, R.J. (2016). Fuzzy based system for analysis of DDOS attacks. International Journal of Pharmacy and Technology (IJPT),8 (3), 18718-18726.
54. Nath, N.D., Saikia, S., & Kannan, R. J. (2016). Congestion control in TCP/IP using TAHOE. International Journal of Pharmacy and Technology (IJPT), 8(3), 17588-17600.
55. Prabakaran, N., & Kannan, R.J. (2016). Context centered response for enabling pervasive environment using data centric WSNS. International Journal of Pharmacy and Technology (IJPT), 8(3), 15485-15496.
56. Harshini, K.S., Rohini, T., Bansal, R., & Kannan, R.J. (2016). Neural model for ingredient level based multimodal cuisine recognition. International Journal of Pharmacy and Technology (IJPT), 8(3), 18734-18741.
57. Prabakaran,N., & Kannan, R.J. (2016). A smart wireless access infrastructure for ubiquitous environment in healthcare. International Journal of Pharma and Bio Sciences, Special Issue on Health Care Technology & Management, 1(1), 239 – 244.
58. Umadevi, K.S., & Kannan, R.J. (2016). F-MAC: an optimal clustering based fault tolerant system for underwater acoustic sensor networks. International Journal of Pure and Applied Mathematics, 109 (8), 177 – 184.
59. Mishra, V., Jain, H., Nagra, A., Naresh, K., & Kannan, R.J. (2016). Queuing models for mobile communication approaches. International Journal of Pharmacy & Technology, 8(4), 5291 – 5302.
60. Prabhakaran, R., & Asha, S. (2016). Enhancing cyber security on substation automation using RGK algorithm. International Journal of Control Theory and Applications, 9 (51), 217 -224.
61. Ismail, A.S., & Asha, S. (2016). Data security in cloud computing by using three tier method. International Journal of Control Theory and Applications, 9 (51), 123-132.
62. Prabhakaran, R., & Asha, S. (2016). Enhancing cyber security on substation automation using RSA algorithm. International Journal of Control Theory and Applications. 9 (51), 225-232.
63. Annamalai, C., & Asha, S. (2016). Energy efficient resource allocation techniques in cloud: a review. International Journal of Control Theory and Applications, 9 (52), 141-146.
64. Venkatesh, A., & Asha, S. (2016). intrusion detection system using modified particle swarm optimization. International Journal of Control Theory and Applications, 9 (52), 283-292.
65. Asha, S., & Ismail, A.S. (2016, May). Security issues and solutions in cloud computing – a survey. International Journal of Computer Science and Information Security, 14(5), 309.
66. Jayasudha, M., Thaneker, S.H., & Subbulakshmi, T. (2016). Secured data authentication and confidentiality in cloud computing using RSA with homomorphic encryption technique. International Journal of Control Theory and Application, 9(52), 1-9.
67. Jayasudha, M., Riteesh, K.S., & Subbulakshmi, T. (2016). data retrieval in private and public cloud using attribute based encryption. International Journal of Control Theory and Application, 9(51), 233-239.
68. Anusha, K., & Sathiyamoorthy, E. (2016). Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks. Journal of Applied Security Research, 11(4), 489-508.
69. Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.
70. Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection algorithms in intrusion detection system. Automatic Control and Computer Sciences, 50(1), 1-9.
71. Rao, U.S., Jeganathan, L., & Mathew, T., (2016). Error bounds for darboux integral of continuous functions with supremum norm using cellular automaton. International Journal of Control Theory and Application, 9(52), 179-190.
72. Mathew, T., Rao, U.S & Jeganathan, L. (2016). Cellular automata: a decision support system for stock market trading, International Journal of Computational Economics and Econometrics, 6(4), 366-378.
73. Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2016). Malicious nodes detection in MANET using back-off clustering approach. Circuits and Systems, 7(08), 2070.
74. Elumalaivasan, P., Kulothungan, K., Sannasi, G., & Arputharaj, K. (2016). Trust based Ciphertext policy attribute based encryption techniques for decentralized disruption tolerant networks. Aust. J. Basic & Appl. Sci, 10(2), 18-26.
75. Rafi. K.M., & Pattabiraman, V. (2016). Curing the curse of dimensionality with multi-fold deep denoising autoencoder. International Journal of Control Theory and Applications, 9(51), 113-122.
76. Sundari, R.S., & Pattabiraman, V. (2016). A complete investigation to demystify the math behind PCA using the MNIST dataset. International Journal of Control Theory and Applications, 9(51), 249-260.
77. Kamatchi, B., & Parvathi, R. (2016, June). call log analysis using different clustering approach. International Journal of Engineering Science and Computing, 6(6),6952 – 6954.
78. Vinodha, R., & Parvathi, R. (2016). Location Based Travelling Recommendation System Using Hypertext Induced Topic Search (HITS). International Journal of Pure and Applied Mathematics, 109(9), 248-256.
79. Kumar, S., Khobragade, A., Maheswari, N., & Prabakaran, A. (2016). Privacy Preservation in Social Network Using K-Nearest Perturbation Technique. International Journal of Computer Science and Information Security, 14(8), 146.
80. Kumar, S., Maheswari, N., & John, A.S. (2016). A randomized approach for privacy preservation. The International Journal of Science and Technology, 4(7), 69–74.
81. Mattani, N., Kumar, J. S., Prabakaran, A., & Maheswari, N. (2016). Privacy Preservation in Social Network Analysis using Edge Weight Perturbation. Indian Journal of Science and Technology, 9(37), 1-10.
82. Sariki, T.P., Kumar, G.B., & Kambhatla. (2016). Sarcasm detection. International Journal of Pharmacy & Technology, 8 (4), 22163-22181.
83. Phulla, D.K., & Kumar, G.B. (2016). Consonant analysis for indian english. International Journal of Control Theory and Applications, 9 (51), 241-248.
84. Jothi, R., Mohanty, S. K., & Ojha, A. (2016). Functional grouping of similar genes using eigenanalysis on minimum spanning tree based neighborhood graph. Computers in biology and medicine, 71, 135-148.
85. Phull, D. K., & Kumar, G. B. (2016). Vowel analysis for indian english. Procedia Computer Science, 93, 533-538.
86. Phull, D. K., & Kumar, G. B. (2016). Investigation of indian english speech recognition using cmu sphinx. International Journal of Applied Engineering Research, 11(6), 4167-4174.
87. Oliver, A. S., & Maheswari, N. (2016). Identifying the gestures of toddler, pregnant woman and elderly using segmented pigeon hole feature extraction technique and IR-threshold classifier. Indian J. Sci. Technol, 9, 39.
88. Mukane, S., & Maheswari, N. (2016). Privacy preserving clinical data of patients using data perturbation. International Journal of Pharmacy & Technology, 8(3), 18290-18299.
89. Vasuhi, S., & Vaidehi, V. (2016). An ensemble Kalman filtering algorithm for state estimation of jump Markov systems. International Journal of Engineering Systems Modelling and Simulation, 8(1), 1-7.

Year 2015

Muthukumar, B., Sindhu, S. S., Geetha, S., & Kannan, A. (2015). Intelligent network-misuse-detection-system using neurotree classifier. Neural Network World, 25(5), 541.
2. Karmel, A., & Jayakumar, C. (2015). Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks. KSII Transactions on Internet & Information Systems, 9(9), 10.
3. Phamila, A. V. Y., & Amutha, R. (2015). Energy-efficient low bit rate image compression in wavelet domain for wireless image sensor networks. Electronics Letters, 51(11), 824-826.
4. Phamila, A. V. Y., & Amutha, R. (2015). Energy-efficient low bit rate image compression in wavelet domain for wireless image sensor networks. Electronics Letters, 51(11), 824-826.
5. Shunmuganathan, S., Saravanan, R. D., & Palanichamy, Y. (2015). Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Canadian Journal of Electrical and Computer Engineering, 38(1), 20-30.
6. Viswanathan, V., & Krishnamurthi, I. (2015). Finding relevant semantic association paths using semantic ant colony optimization algorithm. Soft Computing, 19(1), 251-260.

Year 2014

1. Arivudainambi, D., & Rekha, D. (2014). Heuristic approach for broadcast scheduling, problem in wireless mesh networks. AEU-International Journal of Electronics and Communications, 68(6), 489-495. [IF: 2.853]
2. Malleswaran, M., Vaidehi, V., & Sivasankari, N. (2014). A novel approach to the integration of GPS and INS using recurrent neural networks with evolutionary optimization techniques. Aerospace Science and Technology, 32(1), 169-179. [IF: 2.829]
3. Fathima, A. A., Vaidehi, V., & Selvaraj, K. (2014). Fall detection with part-based approach for indoor environment. International Journal of Intelligent Information Technologies (IJIIT), 10(4), 51-69. [IF: 0.03]

Journal Publications (Scopus Indexed)

Year 2020

1. Prakash, B., & Viswanathan, V. (2020). A comparative study of meta-heuristic optimisation techniques for prioritisation of risks in agile software development. International Journal of Computer Applications in Technology (IJCAT), 62(2), 175-188.
2. Pradeep, K.V., Anusha, K., & Nachiyappan, S. (2020, March). Performance and computation time enhancement of various machine learning techniques for NSL-KDD dataset. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 4726- 4730.
3. Nachiyappan,S., Pradeep, K.V., & Anusha, K. (2020, March). Blur detection and classification using Dnn. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 4777-4780.
4. 189. Rao, B.P., Kumar, K.S., Singh, R.K., & Sundeep, P. (2020, February). Intelligent system for smart cultivation – to integrate technology in rural economic development. International Journal of Engineering and Advanced Technology(IJEAT), 9(3), 511 – 517.
5. Rao, B.P., (2020). AI based e-healthcare in rural areas. International Journal of Innovative Technology and Exploring Engineering (IJITE), 9(3), 3098-3104.
6. Rahman, A.A., & Selwyn, J. (2020, March). A study on applicability of product quality models in software engineering literature and defining quality dimensions for knowledge management systems. International Journal of Scientific and Technology Research (IJSTR), 9(3), 195-202.
7. Rahman, A.A., & Selwyn, J. (2020, February). A novel approach to design quality model for knowledge management systems. International Journal of Scientific and Technology Research(IJSTR), 9(2), 2020.
8. Bharathiraja,S., Suganya, G., Premalatha, M., Kumar, R., & Ramanathan, S. (2020, March). An efficient methodology to sort large volume of data. International Journal of Scientific and Technology Research (IJSTR), 9(3), 5828-5832.
9. Jain, S., & Shyamala, L. (2020, February). A review on suitable execution environment for executing parallel workloads with mapreduce and spark. International Journal of Scientific and Technology Research(IJSTR), 9(2), 5595-5599.
10. Daniel, D.C., & Shyamala, L. (2020, March). Hybrid CNN classification for sentiment analysis under deep learning. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(5), 1473-1480.
11. PS, M. G., & Chintala, B. R. (2020). Big data challenges and opportunities in agriculture. International Journal of Agricultural and Environmental Information Systems (IJAEIS), 11(1), 48-66.
12. Prassanna, J., Quadir, M.A., Jackson,J.C., Prabakaran, R., & Ramanathan, S. (2020, March). Secrecy protector: a novel data analytics based credit score management system. International Journal of Scientific and Technology Research (IJSTR), 9(3),1215-1218.
13. Prassanna, J., Nawas, K., Jackson, J.C., Prabakaran, R., & Ramanathan, S. (2020, March). Towards building a neural conversation CHATBOT through seq2seq model. International Journal of Scientific and Technology Research (IJSTR), 9(3), 1219-1222.
14. Gayathri, R., & Neelanarayanan, V. (2020). Denial of service attack prediction using gradient descent algorithm. Advances in Internet Research and Engineering(AIRE), 1(45), 1-8.
15. Verma, S.K., Rajesh, M., & Vincent, R. (2020). Smart-farming using internet of things. Journal of Computational and Theoretical Nanoscience(JCTN), 17(1
),172-176.
16. Vincent, R., Sanjaykumar, K., Rajesh, M., & Verma, S. K. (2020). Agricart: an innovative methodology for enhancing farmers livelihood. Journal of Computational and Theoretical Nanoscience (JCTN), 17(1), 373-377.
17. Perumal, S., Ganapathy, S., & Kannan, A. (2020). REFERS: refined and effective fuzzy e-commerce recommendation system. International Journal of Business Intelligence and Data Mining (IJBIDM), 17(1), 117-137.
18. Kapadia, A. M., & Pandian, N. (2020). Reversible data hiding methods in integer wavelet transform. International Journal of Information and Computer Security (IJICS), 12(1), 70-89.
19. Pramod, S., & Jayasudha, M. (2020). Multi-root symmetrical encryption preservation sequence scheme in EHR using cloud. Journal of Discrete Mathematical Science and Cryptography (JDMSC), 22(7), 70-87.
20. Devi, B. G., & Pattabiraman, V. (2020). Soft cosine gradient and gaussian mixture joint probability recommender system for online social networks. International Journal of Intelligent Engineering and Systems (IJIES), 13(1), 301-311.
21. Sudhakara, M., & Meena, M.J. (2020, April). An edge detection mechanism using L*A*B color-based contrast enhancement for underwater images. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), 18(1), no. 41-48.
22. Balasundaram, A. (2020). Computer vision based detection of partially occluded faces, International Journal of Engineering & Advanced Technology (IJEAT), 9(3), 2188-2200.

23. Anjum, Shaik Shabana; Noor, Rafidah Md; Ahmedy, Ismail; Anisi, Mohammad Hossein; Azzuhri, Saaidal Razalli; Kiah, Miss Laiha Mat; Lloret, Jaime; Kumar, Pradeep, An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, Vol 46, Issue 1-2, pp 83-112.

24. Alamelu M, Pradeep Kumar TS, Vijayakumar V, Fuzzy Rule based SLA Generation Algorithms for Web Based Multi Party Negotiation Systems, Journal of Intelligent and Fuzzy Systems (accepted), 2020.

Year 2019

1. Lakshmi, V. A., Meena, M. J., & Ibrahim, S. S. (2019). Big data analytics framework to analyse student’s performance. International Journal of Computational Complexity and Intelligent Algorithms (IJCCIA), 1(2), 154-164.
2. Sudhakara, M., & Meena, M.J. (2019, May). Underwater image enhancement using conventional techniques with quality metrics. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(7S), 241-249.
3. Bansal, A., Gupta, C. L., & Muralidhar, A. (2019, June). A sentimental analysis for youtube data using supervised learning approach. International Journal of Engineering and Advanced Technology (IJEAT), 8(5), 2314-2318.
4. Muralidhar, A., & Pattabiraman, V. (2019). Enhancing the performance of large-scale profitable itemset mining using efficient data structures. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(9), 1768 -1772.
5. Aarthi, D., Viswanathan, V., Nandhini, B., Ilakiyaselvan, N. (2019, November). Question classification using a rule based model. International Journal of Innovative Technology and Exploring Engineering (IJITEE),9(1), 4172-4176.
6. Premalatha, M., & Viswanathan, V. (2019). Course sequence recommendation with course difficulty index using subset sum approximation algorithms. Cybernetics and Information Technologies (CIT), 19(3), 25-44.
7. Prakash, B., & Viswanathan, V. (2019). Risk prioritization for software development using grey wolf optimization. International Journal of Recent Technology and Engineering, 7(6), 1457-1463.
8. Aarthi D., & Viswanathan, V. (2019, March). Disambiguation of named entity with supervised technique over a knowledge base. International Journal of Recent Technology and Engineering (IJTRE),7(6),1386-1391.
9. Premalatha, M., & Viswanathan, V. (2019). Reducing the duration of Higher education study with sequenced course recommendation using categorical subset summation algorithm. International Journal of Recent Technology and Engineering (IJRTE), 7(-5S4), 751-754.
10. Sathyarajasekaran, K., & Ganesan R. (2019, May). An approach on software Readiness Workflow with Change Impact Analysis (SRW-CIA). International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(7), 284-288.
11. Sathyarajasekaran K., & Ganesan R, (2019). A novel process using impact analysis over requirement phase with impact transition model. Test Engineering and Management(TEM), 81, 4435-4445.
12. Nachiyappan, S., & Selwyn, J. (2019). A big data framework for quality assurance and validation. International Journal of Recent Technology and Engineering (IJRTE), 8(2), 2490-2494 .
13. Nachiyappan, S., & Selwyn, J. (2019), Automated testing for big data environment using multi model structure validation. International Journal of Engineering and Advanced Technology (IJEAT), 8(5), 1304-1309 .
14. Kumar, B,S., & Sountharrajan, S. (2019). Big data projects requirement understandability using big data use case diagram approach. International Journal of Computational and Theoretical Nanoscience (IJCTN), 16, 1–6.
15. Shankar, V.S., Sajidha,S.A., Nisha,V.M., & Kumar., B.S. (2019, December). Performance testing in a multi-tenant cloud architecture using genetic algorithm. International Journal of Engineering and Advanced Technology (IJEAT), 9(2), 2840-2846.
16. Rajarajeswari, S., & Neelanarayanan, V. (2019, July). Detecting and resolving conflicts in adaptation rules for the context aware system. International Journal of Recent Technology and Engineering (IJRTE), 8(2), 760-763.
17. Bansal, A., Saleena, B., &Prakash. B. (2019). Using data mining techniques to analyze the customers reaction towards social media advertisements. International Journal of Recent Technology and Engineering (IJRTE), 8(2), 1139 – 1143.
18. Nagelli, A., Ragala, R., & Saleena, B. (2019). Automotive rank based ELM using iterative decomposition. International Journal of Intelligent Engineering and Systems (IJIES), 12(5), 287-298.
19. Suganya, G., Premalatha, M., & Anushka Sharma, M. P. (2019). IoT based automated medicine dispenser for online health community using cloud. International Journal of Recent Technology and Engineering (IJRTE), 7(5S4), 759-762.
20. Ajay, D. M., & Umamaheswari, E. (2019). Packet encryption for securing real-time Mobile cloud applications. Mobile Networks and Applications (MNA), 24(4), 1249-1254.
21. Amrith, P., Umamaheswari, E., Anitha, R. U., Mani, D., & Ajay, D. M. (2019, January). Smart detection of vehicle accidents using object identification sensors with artificial intelligent systems. International Journal of Recent Technology and Engineering(IJRTE), 7(5), 375-379.
22. Maheswari, S., & Selwyn, J. (2019). State behavior analysis in validating the web service framework. International Journal of Computers and Applications (IJCA), 1-11.
23. Maheswari, S., & Selwyn, J. (2019). Machine learning algorithms for understanding web user access based on query. Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 11(08), 636-647.
24. Jeyasingh, J., & Selwyn, J. (2019, December). Validating the knowledge acquisition process metrics in content management systems. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 257-262.
25. Rachel. K.P., & Selwyn, J. (2019, December). a knowledge representation model using concept-relation graph. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 170-175.
26. Krishnapriya, M.A., & Selwyn, J. (2019, October). Synthetization of solution knowledge base. The International Journal of Analytical and Experimental Modal Analysis (IJAEMA), 11(10), 403-409.
27. Priya, M. K., & Selwyn, J. (2019, September). Code knowledge acquisition for knowledge management trajectory framework. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 1830-1834.
28. Rahaman, A., & Selwyn, J. (2019, July). A conceptual model for effectiveness of knowledge management systems. International Journal of Recent Trends and Engineering (IJRTE), 8(2), 4195-4199.
29. Ramachandran, D., & Parvathi, R. (2019). Enhanced event detection in twitter through feature analysis. International Journal of Information Technology and Web Engineering (IJITWE), 14(3), 1-15.
30. Parvathi, R., & Aravind, J. (2019, September). Classification based credibility analysis on twitter data. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 5371-5376.
31. Vinodha, R., & Parvathi, R. (2019, July). Election result prediction using spatial statistical method. International Journal of Recent Technology and Engineering (IJRTE), 8(2S6), 838-843.
32. Monica, K.M., & Parvathi, R. (2019, September). Traditional dimensionality reduction techniques using deep learning. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 7153-7160.
33. Dutta S., Parvathi R., & Ganesan R. (2019, October). Threat identification and examination using graph based anomaly detection. International Journal of Engineering and Advanced Technology (IJEAT),9(1), 7510-7513.
34. Vinodha, R., & Parvathi, R. (2019, December). Location based point-of-interest recommendation system using co-pear similarity measure. International Journal Of Scientific and Technology Research (IJSTR), 8(12), 3689-3696.
35. Aravind, J., & Parvathi, R. (2019, July). A personalized location recommendation system based on probability and proximity. International Journal of Recent Technology and Engineering (IJRTE),8(2), 714-718.
36. Ramachandran, D., & Parvathi, R. (2019). Analysis of twitter specific preprocessing technique for tweets. Procedia Computer Science, 165, 245-251.
37. Kamatchi, S. B., & Parvathi, R. (2019). Improvement of crop production using recommender system by weather forecasts. Procedia Computer Science, 165, 724-732.
38. GayathriDevi, B., & Pattabiraman, V. (2019). Towards user profiling from multiple online social networks. Procedia Computer Science, 165, 456-461.
39. Pattabiraman, V., & Ganesh, M. (2019, December). Used cars price prediction using supervised learning techniques. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 216-223.
40. Muralidhar, A., Sathe, A.A.K., & Pattabiraman, V. (2019, July). Enhancing the performance of large-scale profitable itemset mining using efficient data structure. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8 (9), 1768-1772.
41. Akram, W., Jain, M., & Hemalatha, C. S. (2019). Design of a smart safety device for women using IoT. Procedia Computer Science, 165, 656-662.
42. C SweetlinHemalatha, Pathak, R., &Vaidehi, V. (2019). Hybrid decision trees for data streams based on incremental flexible naive bayes prediction at leaf nodes. Evolutionary Intelligence,12(4)515-526.
43. Suganeshwari, G., & Ibrahim, S.S (2019, December). A movie recommendation using common genre relation on user-item subgroup. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 193-199.
44. Shende, N. N., & SyedIbrahim, S. P. (2019). Layout detection using computer vision. International Journal of Computational Complexity and Intelligent Algorithms (IJCCIA), 1(2), 165-177.
45. Suganeshwari, G., & Ibrahim, S.S, (2019, October). Time adaptive collaborative filtering for movie recommendation. Pertanika Journal of Science & Technology, 27(4), 1783-1802.
46. Vijayakumar, S., & Ibrahim, S.S. (2019, July). Mining learners’ data to perceive the need for german for academic purposes. International Journal of Recent Technology and Engineering, 8(2), 5491-5494.
47. Tamrakar, P., & Ibrahim, S. S. (2019). Comparative study of different lazy learning associative classification methods. Procedia Computer Science, 165, 370-376.
48. Kalamohan, K., Gunasekaran, P., & Ibrahim, S. (2019). r. Meta Gene, 21, 100576.
49. Tamrakar, P., & Ibrahim, S. S. (2019, May). Lazy learning associative classification with hybrid feature selection. International Journal of Recent Technology and Engineering, 8(1), 299-303.
50. Pandey, A., Sharma, A., & Ibrahim, S. S. (2019, May). Clinical image analysis for detection of skin cancer using convolution neural networks. Theranostics of Respiratory and Skin Diseases (TRSD),1(3), 61-64.
51. Anand, L., & Ibrahim, S. S. (2018). HANN: a hybrid model for liver syndrome classification by feature assortment optimization. Journal of medical systems, 42(11), 211.
52. Singh, R.K. & Sivabalakrishnan, M. (2019, August). Classification of gene expression data using efficient feature selection technique and resampling method. International Journal of Engineering and Advanced Technology (IJEAT), 8(6), 406-414.
53. Singh, R.K. & Sivabalakrishnan, M. (2019, August). Microarray gene expression data classification using a hybrid algorithm: MRMRAGA. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 706-713.
54. Subramanian, C.B., Hemalatha, J., Balakannan, S.P & Geetha, S. (2019, December). Improving image steganalyser performance using second order spam features extracting through contourlet transform. International Journal of Engineering and Advanced Technology (IJEAT), 9(IS4), 137-143.
55. Punithavathi, P., & Geetha, S. (2019, December). Cancelable biometric transformations for e-passport security. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 342-346.
56. Geetha, R., & Geetha, S. (2019, December). Multi-layered ‘odd-even’ reversible embedding for encrypted images. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 347-351.
57. Roseline, S.A., & Geetha, S. (2019, December). An efficient malware detection system using hybrid feature selection methods. International Journal of Engineering and Advanced Technology (IJEAT), 9(1S3), 224-228.
58. Gopal, R., Phamila, Y.A.V & Geetha, S. (2019, June). A hand geometry verification system relating finger length, position of the finger base and palm center. International Journal of Engineering and Advanced Technology (IJEAT), 8(5), 1974 – 1979.
59. P Balamurugan, S. A. A., Chitra, P. K. A., & Geetha, S. (2019). Multi label learning approaches for multi species avifaunal occurrence modelling: a case study of south eastern Tamil Nadu. International Journal of Business Intelligence and Data Mining, 15(4), 449-477.
60. Hemalatha, J., Devi, M. K., & Geetha, S. (2019). Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table. International Journal of Business Intelligence and Data Mining, 14(1-2), 138-154.
61. Sandhya, P., & Kantesaria, M. (2019, April). Prediction of mental disorder for employees in IT industry. International Journal of Innovative Technology and Exploring Engineering(IJITEE),8(6S), 374-376.
62. Venugopal Boppana, S. P. (2019). Focused crawling from the basic approach to context aware notification architecture. Indonesian Journal of Electrical Engineering and Computer Science, 13(2), 492-498.
63. Wagdarikar, R.R & Sandhya, P. (2019, December). Parallelism in web services: design of parallel XML parser for web services. Indonesian Journal of Electrical Engineering and Computer Science, 16(3),1407-1415.
64. Nivedita, M., Phamila, Y.A.V., & Harsh, P.V. (2019, June). Captioning for motion detection for video surveillance applications using deep learning. International Journal of Innovative Technology and Exploring Engineering (IJITEE) , 8(8),3180-3185.
65. Nivedita, M., & Phamila, Y.A.V. (2019, October). Image captioning for affine transformed images using image hashing. International Journal of Engineering and Advanced Technology (IJEAT), 9(1), 4736-4741.
66. Kalaivani,K., Phamila, Y.A.V., Selvaperumal, S.K. (2019, October). Random forest classifier for extracting water bodies from pansharpened image to detect surface water changes. International Journal of Engineering and Advanced Technology (IJEAT), 9(1), 4910-4915.
67. Arshad, Anbarasi, L. J., & Narendra, M., Pushbarani, S., & Dhanya. (2019). Investigating the effect of social media campaign on german 2017 elections. International Journal of Recent Technology and Engineering (IJEAT),5, 2123-212.
68. Murali, S., Narayanan, S., & Prasanna, D., Anbarasi, L.J. (2019). Backtracking based joint-sparse signal recovery for distributed compressive sense. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ,12(1), 3919-3922.
69. Surianarayanan, B., Pandian A,S., & Narayanan, S., Anbarasi, L.J. , & Raj, B.E. (2019). Estimation of percentage of adulteration using structural similarity index .International Journal of Innovative Technology and Exploring Engineering, 5(12), 2129-2132.
70. Singh, S., & Jasmine, S. G. (2019). Face recognition system. International Journal of Engineering Research & Technology (IJERT), 8(5), 263-266.
71. Dudeja, K., Baidya, S., & Gupta, S. S., & Jasmine, S.G. Low-cost 3DOF virtual reality first aid training programs. International Journal of Engineering and Advanced Technology (IJEAT), 8(5), 693-696.
72. Shukla, U., Mishra, A., Jasmine, S. G., Vaidehi, V., & Ganesan, S. (2019). A deep neural network framework for road side analysis and lane detection. Procedia Computer Science, 165, 252-258.
73. Singh, R.K., & Sivabalakrishnan, M. (2019, August). Classification of microarray gene expression data using a hybrid approach of mRMR and AGA. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 706-713.
74. Jeeva, S., & Sivabalakrishnan,M. (2019, September). Utilising P300 via non-invasive brain computer interface to control wheelchair. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 3329-3333.
75. Naidu, C., Kumar, D., Maheswari, N., Sivagami, M., &Li, G. (2019, April). Prediction of alzheimer’s disease using oasis dataset. International Journal of Recent Technology and Engineering (IJRTE), 7(6S3), 36-42.
76. Ravi. R., Sowmiyasree, Maheswari, N., & Sivagami,M. (2019, October). Improving the performance of hadoop framework using optimization process in the information management. Advances in Science, Technology and Engineering Systems Journal (ASTESJ), 4(5),327-333.
77. M Sivagami, M., Revathi, T., & Jeganathan, L. (2019). Dynamic background modelling using multi-swarm optimisation. International Journal of Bioinformatics Research and Applications, 15(1), 68-90.
78. Giri, B., Sivagami, M., & Maheswari, N. (2019, April). Frequent item set mining for data streaming using spark with pincer search algorithm. International Journal of Recent Technology and Engineering, 7(6), 40-45.
79. Bhavana, V., Ramesh, V., & Sivagami, M. (2019, June). Implementing discrete cuckoo search algorithm for TSP using MPI and beowulf cluster. International Journal of Innovative Technology and Exploring Engineering (IJITEE),8(8),554-560,
80. Karande, S., Shelake, A., Sivagami, M., & Sophia, S. (2019, May). Prediction of employee retention using cassandra and ensemble learning. International Journal of Recent Technology and Engineering, Volume-8, Issue-1,Page No: 508-512, May’2019,Scopus
81. Aiswarya, B., Sharma, A., Chakraborty, R., Malathi, G., Kumar, T.R. (2019, March). Image processing based edibility analysis of spinach leaves using machine learning approach. International Journal of Recent Technology and Engineering (IJRTE), 7(6), 2097-2101.
82. Diviya, M., Malathi, G., & Karmel, A. (2019, November). Regression based model for prediction of heart disease recumbent. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 6639-6642.
83. Murugesan, R., Sudarsanam, S.K., Malathi, G.,Vijayakumar, V., Neelanarayanan, V., Venugopal, R., Rekha, D., Saha, S., Bajaj, R., Miral, A., & Malolan, V. (2019, July). Artificial intelligence and agriculture 5. 0, International Journal of Recent Technology and Engineering(IJRTE), 8(2), 1870-1877.
84. Jackson, J.C., Rekha, D., Vijayakumar, V., & Prasath, V. B. S. (2019). Broadcast scheduling problem in VANETS: a discrete genetic algorithm approach. International Journal of Recent Technology and Engineering(IJRTE), 7 (6s), 360-366.
85. Jackson, J.C., & Singh, A. (2019). Fire alert system using real-time video processing. International Journal of Innovative Technology and Exploring Engineering(IJITE) , 8(7), 1008-1010.
86. Devi, V.K., & Ganesan, R. (2019). Trust-based selfish node detection mechanism using beta distribution in wireless sensor network. Journal of ICT Research and Applications, 13(1), 79-92.
87. Gayathri, R., & Neelanarayanan, V. (2019, August). Moving target defense strategy for mitigating distributed denial of service attack in the public cloud environment. International Journal of Engineering and Advanced Technology, 8(6), 1112-1115.
88. Gayathri, R., & Neelanarayanan, V. (2019). Identification of regression function and distribution model for denial of service attack in Second Life online community using simple network management protocol. International Journal of Web Based Communities, 15(3), 225-237.
89. Sri Vidya, B., Sriraman, H., & Rukmani, P. (2019). Optimized multi-threading to balance energy and performance efficiency. International Journal of Recent Technology and Engineering, 7(6), 599-60.
90. Rai, A., Vishwkarma, R., & Panjanathan, R. (2019). Automatic plant irrigation system with real time notification. International Journal of Recent Technology and Engineering, 8(1), 1428-1430.
91. Rani. S.U., & Neelanarayanan V. (2019). Control of anesthesia concentration using PID controller. International Journal of Innovative Technology and Exploring Engineering, 8(6), 356-360.
92. Rani. S.U., & Neelanarayanan V. (2019). BIS performance for CLAD PK-PD model. International Journal of Engineering and Advanced Technology (IJEAT), 8(5), 837-843.
93. Kumar, K.A., Vengatesan., Vincent, R., Rajesh, M., & Singhal, A. (2019). “A novel arp approach for cloud resource management. International Journal of Recent Technology and Engineering (IJRTE), 7(5), 260-262.
94. Venkatraj, S., Vincent, R., Vijayakumar, V., Vengatesan, K., & Rajesh, M. (2019). Development of test automation framework for REST API testing. Journal of Computational and Theoretical Nanoscience, 16(2), 453-457.
95. Vincent, R., & Vijayakumar, V. (2019). An enhanced virtual reality method for diagnosing autistic children. International Journal of Recent Technology and Engineering (IJRTE), 8(2), 3362-3365.
96. Preetha, A.D., & Kumar, T.S.P. (2019). Leveraging fog computing for a secure and smart healthcare, International Journal of Recent Technology and Engineering (IJRTE), 8(2), 6177–6182.
97. Quadir, M.A., & Vijayakumar, V. (2019). Combined preference ranking algorithm for comparing and initial ranking of cloud services, Recent Advances in Electrical and Electronic Engineering, 13(2), 260 – 275.
98. Md, A. Q., & Vijayakumar, V. (2019). Dynamic ranking of cloud services for web-based cloud communities: efficient algorithm for rating-based discovery and multi-level ranking of cloud services. International Journal of Web Based Communities, 15(3), 248-270.
99. Matthew, K. M., Muhammed, A. Q., & Varadarajan, V. (2019). An improved key management scheme in cloud storage. International Journal of Advanced Intelligence Paradigms, 14(3-4), 197-203.
100. Shubankar, B., Chowdhary, M., & Priyaadharshini, M. (20I9). IoT device for disabled people. Procedia Computer Science, 165, 189-195.
101. Murali, M., Bhargava, M., Snehaa, G., Anand, A., Haque, M.A., Sarobin. M. V.R. (2019). Data analytics on IoT-based health monitoring system. Journal of Recent Technology and Engineering (IJRTE), 8(1), 220-223.
102. Parthasarathy, E., Vaidyanathan, P., Akshay, N., Vimal, J., Manikandan, R., Prassanna, J., Kumar, A., & Daniel, W.C.S. (2019). Development of required power point tracking algorithm for standalone solar photovoltaic inverter. International Journal of Recent Technology and Engineering (IJRTE), 7(6), 1578-1582.
103. Manikandan, R., Parameshwaran, R., Prassanna, J., & Sekar, K.R. (2019). A study on specific computational algorithms for VLSI cell partitioning problems. International Journal on Emerging Technologies, 10(2), 67-70.
104. G. Manikandan, Krishnan, R.B., Preethivi, E., Sekar, K.R., Manikandan, R., & Prassanna, J. (2019). An Approach with steganography and scrambling mechanism for hiding image over images. International Journal on Emerging Technologies ,10(1), 64-67.
105. Sethuraman, J., Manikandan, R., Sekar, K.R., Prassanna, J., & Kumar, A. (2019). Classic search for dominant factors in web pages using search engines and validation through data analytics using R. International Journal on Emerging Technologies, 10(2), 117-121.
106. Rajarajeswari, S., & Neelanarayanan, V. (2019). Dynamic rule generation and rule matching for composite environmental condition in context aware system. Wireless Networks, 1-9.
107. Venkatesh, R., Ragala, R., & Kannan, R.J. (2019). Squeezing deep learning into mobile devices. International Journal of Recent Technology and Engineering(IJRTE), 7(6S), 902 – 906.
108. Jaya, R., Pillai, C.S., & Kannan, R.J. (2019). Hybrid fuzzified fish school search based learning method for prakriti analysis. Journal of Advanced Research in Dynamical and Control Systems, 11(2), 1777 – 1784.
109. Prabhakaran, R., & Asha, S. (2019, May). Enhancing cyber security in power sector systems using block chain. International Journal of Recent Technology and Engineering, 8(1), 58-62.
110. Prabhakaran, R., & Asha, S. (2019, July). Enhancing cyber security in power sector using machine learning. International Journal of Innovative Technology and Exploring Engineering, 8(9), 3382-3386.
111. Jayanthi, R., & Singh, K. J. (2019). A public key-based encryption and signature verification model for secured image transmission in network. International Journal of Internet Technology and Secured Transactions, 9(3), 299-312.
112. Jayanthi, R., & Singh, K. J. (2019). Image encryption techniques for data transmission in networks: a survey. International Journal of Advanced Intelligence Paradigms, 12(1-2), 178-191.
113. Sathyarajasekaran, K., & Ganesan, R. (2019). A novel process using impact analysis over requirement phase with impact transition model. Test Engineering and Management, 81(11-12), 4435-4445.
114. Sathyarajasekaran, K., & Ganesan, R. (2019). An approach on software readiness workflow with change impact analysis (SRW-CIA). International Journal of Innovative Technology and Exploring Engineering, 8(7), 284-288.
115. Devi, T., & Ganesan, R. (2019). Environmental benefits of enhanced hecc-elgamal cryptosystem for security in cloud data storage using soft computing techniques. Ekoloji, 28(107), 665-677.
116. Geetha, M., Ganesan, R., & Sai, T. (2019). Performance analysis of the machine learning algorithms on heart condition predictions. International Journal of Recent Technology and Engineering, 8(4), 975-981.
117. Dutta, S., Parvathi, R., & Ganesan, R., (2019). Threat identification and examination using graph based anomaly detection. International Journal of Engineering and Advanced Technology, 9(1), 7510-7513.
118. Jayasudha, M., & Subbulakshmi, T. (2019). an efficient attribute encryption for secure data sharing and storage in public and private clouds-a survey. International Journal of Recent Technology and Engineering,8(1C2), 1185-1189.
119. Jayasudha M, Subbulakshmi T. “A Comparative Study of Attribute based Encryption of Electronic Health Records in Cloud”, Journal of Advanced Research in Dynamical and Control Systems, Volume 11, 07-Special Issue, pp. 230-247, 2019.
120. Dhanapal, A., & Nithyanandam, P. (2019). The HTTP flooding attack detection to secure and safeguard online applications in the cloud. International Journal of Information System Modeling and Design (IJISMD), 10(3), 41-58.
121. Dhanapal, A., & Nithyanandam, P. (2019). A review of cloud computing adoption issues and challenges”, Recent Patents on Computer Science, 12, 1-6.
122. Dhanapal, A., & Nithyanandam, P. (2019). The slow HTTP DDoS attacks: detection, mitigation and prevention in the cloud environment. Scalable Computing: Practice and Experience, 20(4), 669-685.
123. Dhanapal, A., & Nithyanandam, P. (2019). The slow HTTP distributed denial of service attack detection in cloud. Scalable Computing: Practice and Experience, 20(2), 285-298.
124. Kapadia, A. M., & Nithyanandam, P. (2019). Secured reversible matrix embedding based on dual image using integer wavelet and arnold transform. Procedia Computer Science, 165, 766-773.
125. Karmel, A., Sharma, A., & Garg, D. (2019). IoT based assistive device for deaf, dumb and blind People. Procedia Computer Science, 165, 259-269.
126. Adhithiyan, M., & Karmel, A. (2019). Novel approach of deep learning in toxicity prediction. International Journal of Recent Technology and Engineering (IJRTE), 7(54), 698-704.
127. Jagtap, M. M., & Devi, S. R. (2019). Securing 5G het nets in SDN using authentication. International Journal of Innovative Technology and Exploring Enginering, 8(8), 1297-1303.
128. Monali, P., Mohite, S., & Devi, R. (2019). Design and implementation of ASCII based method for author attribution. International Journal of Innovative Technology and Exploring Enginering, 8(9), 1963-1967.
129. Venkatesh, A., & Asha, S. (2019, July). Detecting denial of service attack in wireless sensor network using energy Efficient Extreme Learning Neural Network (EEELNN). International Journal of Recent Technology and Engineering (IJRTE), 8(2), 5913-5918 .
130. Asha, S., & Angel, C. (2019). Creating a smart agricultural environment using ambient intelligent technique. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 1010-1015.
131. Asha, S., & Sarojini, S. (2019). Botnet detection on the analysis of zeus panda financial botnet. International Journal of Engineering and Advanced Technology (IJEAT), 8(6),1972-1976.
132. Devi, B. K., Dudeja, K., John, A. V., Marcin, K., & Subbulakshmi, T. (2019). Symmetric measure of network traffic using packet ratio and packet symmetry. Procedia Computer Science, 165, 112-118.
133. Devi, B. K., & Subbulakshmi, T. (2019). “Adaptive Learning and Automatic Filtering of Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment”, International Journal of Engineering and Advanced Technology, 9(1S3), 200-205.
134. Devi, B. K., & Subbulakshmi, T. (2019). Cloud-based DDoS attack detection and defence system using statistical approach. International Journal of Information and Computer Security, 11(4-5), 447-475.
135. Manjaly, J. S., & Subbulakshmi, T. (2019). TaskTracker aware scheduler with resource availability control for Hadoop MapReduce. International Journal of Advanced Intelligence Paradigms, 14(3-4), 359-374.
136. Sundararaman, S. A., & SubbuLakshmi, T. (2019). Execution of scientific workflows on IaaS cloud by PBRR algorithm. International Journal of Computational Science and Engineering, 19(4), 455-463.
137. Prabhakaran, R., & Asha, S. (2019, July). Analysis of cyber attacks vulnerabilities in electrical power systems. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(9), 925-928.
138. Nisha, V. M., & Jeganathan, L. (2019). A symmetry based anomaly detection in brain using cellular automata for computer aided diagnosis. Indonesian Journal of Electrical Engineering and Computer Science, 14(1), 471-477.
139. Patro, S.J. , & Nisha, V.M. (2019). Early detection of alzheimers disease using image processing. International Journal of Engineering Research and Technology, 8(5), 468-471.
140. Patro, S.J., & Nisha, V. M. (2019). Real time Video Analytics for object detection and face identification. International Journal of Engineering Research and Technology, 8(5), 462-467.
141. Lakshmi, D.V., & Jeganathan, L. (2019). Graph Self-Replication System. Complex systems, 28(3), 313-323.
142. Sivagami, M., Revathi, T., & Jeganathan, L. (2019). Dynamic background modelling using multi-swarm optimisation. International Journal of Bioinformatics Research and Applications, 15(1), 68-90.
143. Daniel, D. C., & Shyamala, L. (2019, August). An insight on sentiment analysis research from text using deep learning methods. International Journal of Innovative Technology and Exploring Engineering, 8(10), 2033-2048.
144. Vijayakumar, D.S., & Ganapathy, S. (2019). Feature reduction using lasso hybrid algorithm in wireless intrusion detection system. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 1476-1483.
145. Kavin, B. P., & Ganapathy, S. (2019). A novel M-commerce data security mechanism using elliptic curve cryptography. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 847-851.
146. Rajeswari, A.R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). Trust aware SVM based IDS for mitigating the malicious nodes in MANET. International Journal of Innovative Technology and Exploring Engineering, 8(8), 185-197.
147. Prabha, A. J., Bhargavi, R., & Harish, B. (2019). Predictive model for dyslexia from eye fixation events. International Journal of Engineering and Advanced Technology,9(3), 2249 – 8958.
148. PS, M. G., & Bhargavi, R. (2019). Selection of Important Features for Optimizing Crop Yield Prediction. International Journal of Agricultural and Environmental Information Systems (IJAEIS), 10(3), 54-71.
149. Arumugam, S., & Bhargavi, R. (2019). A survey on driving behavior analysis in usage based insurance using big data. Journal of Big Data, 6(1), 86.
150. Kumar, J. S., & Maheswari, N. (2019). Privacy preservation analysis in social network graphs for avoiding community detection and publishing sensitive information’ International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(6), 888 – 893.
151. Kumar, G.B., & Phull, D.K. (2019). Efficient search mechanism from large scale corpora for domain-specific language modeling in speech recognition, International Journal of Engineering and Advanced Technology (IJEAT), 8-6, 1682-1689.
152. Saluja, G. S., & Maheswari, N. (2019). Comparative Study to Predict the Kidney Disease for the Clinical Data Using Classification Techniques. Indian Journal of Public Health Research & Development, 10(8), 73-77.
153. Kumar, J.S, & Maheswari, N. (2019). Privacy preservation analysis in social network graphs for avoiding community detection and publishing sensitive information. International Journal of Innovative Technology and Exploring Engineering, 8(6),888–893.
154. Chandiramani, K., Garg, D., & Maheswari, N. (2019). Performance Analysis of Distributed and Federated Learning Models on Private Data. Procedia Computer Science, 165, 349-355.
155. Balasundaram, A., & Chellappan, C. (2019). Computer vision based system to detect abandoned objects. International Journal of Engineering & Advanced Technology (IJEAT), 9(1), 4000-4010.
156. Balasundaram, A., Kumar, S.A., & Kumar, S.M. (2019). Optical flow based object movement tracking. International Journal of Engineering & Advanced Technology (IJEAT), 9(1), 3913-3916.
157. Pradeep, K. V., & Vijayakumar, V. (2019, August). Energy-efficient consolidation of virtual machines in cloud data centers. International Journal of Engineering and Advanced Technology(IJEAT), 8(6), 446-449.
158. Pradeep, K. V., & Vijayakumar, V. (2019, June). Secure key management system in cloud environment for client data. International Journal of Engineering and Advanced Technology(IJEAT), 8(6), 1490-1496.
159. Pradeep.K. V., Vijayakumar, V., & Sathiyanarayanan, M. (2019, May). Visual analytics on spatial time series for environmental data. International Journal of Recent Technology and Engineering(IJRET), 8(1C2), 1173-1181.
160. Pradeep.K. V., & Vijayakumar, V. (2019, May). A proposed client based key management framework to secure information in cloud storage for public SaaS”, International Journal of Recent Technology and Engineering(IJRET), 8(1), 2148-2153, May 2019.
161. Sowmiyasree, R. R., Maheswari, N., & Sivagami, M. (2019). Improving the performance of hadoop framework using optimization process in the information management. Advances in Science, Technology and Engineering Systems, 4(5), 327–333.
162. Giri, B., Sivagami, M., & Maheswari, N. (2019). Frequent item set mining for data streaming using spark with pincer search algorithm. International Journal of Recent Technology and Engineering, 7(6), 40–45.

163. Sariki, T. P., & G, B. K. (2019). Exploiting visual content of book front cover to aggrandize the content based book recommendation system. International Journal of Innovative Technology and Exploring Engineering, 8(12), 1631-1634.
164. Ragala, R & Kumar, B. (2019). HOSVD based hybrid CNN-ELM model for scene categorization. International Journal of Advanced Trends in Computer Science and Engineering, 8(6), 3498 – 3503.
165. Ragala, R., Nagelli, A., & Saleena, B. (2019). Automotive rank based ELM using iterative decomposition. International Journal of Intelligent Engineering and Systems, 12(5), 287-298.
166. Ramesh, R., Ramya, V., & Kannan, R.J. (2019). Squeezing deep learning into mobile devices. International Journal of Recent Technology and Engineering, 7(6S), 902-906.
167. Kumar, S.M., Ashokkumar, S., & Balasundaram, A. (2019). Providing enhanced resource management framework for cloud storage. International Journal of Engineering & Advanced Technology (IJEAT), 9(1), 3903-3908.
168. Sariki, T.P., Kumar, G.B.,Shukla, U., & Mishra, A. (2019). An adroit approach for extractive text summarization. International Journal of Engineering and Advanced Technology, 8 (5), 2047-2051.
169. Jothi, R., Mohanty, S. K., & Ojha, A. (2019). DK-means: a deterministic k-means clustering algorithm for gene expression analysis. Pattern Analysis and Applications, 22(2), 649-667.
170. Vijayakumar, V., Vairavasundaram, S., Logesh, R., & Sivapathi, A. (2019). Effective knowledge based recommender system for tailored multiple point of interest recommendation. International Journal of Web Portals (IJWP), 11(1), 1-18.
171. Pradeep, K. V., Vijayakumar, V., & Subramaniyaswamy, V. (2019). An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment. Journal of Computer Networks and Communications, 2019.
172. Chauhan, A., Vijayakumar, V.,Sliman, L. (2019). Ontology matching techniques: a gold standard model. International Journal of Innovative Technology and Exploring Engineering, 8(6S), 370-373.

173. Sagar Gupta, Jenila Livingston L.M.& Agnel Livingston L.G.X. (2019, Sept). Prediction of Top Tourist Attraction Spots using Learning Algorithms. International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Vol-8, Issue-3, pp 1063-1067.

174. Pragya Nayak & Jenila Livingston L.M. (2019, July). Automated Notification for Improper use of AWS Resources. International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Vol-8, Issue-2, pp 981-988.

175. Karthiyaini S, Senthamaraikannan K, Priyadarshini J, Gupta K, Shanmugasundaram M. Prediction of Mechanical Strength of Fiber Admixed Concrete Using Multiple Regression Analysis and Artificial Neural Network. Advances in Materials Science and Engineering. 2019;

176. Ilakiyaselvan N, Hardik Bhatt, Utkarsh Shukla, A. Nayeemulla khan , A. Shahina, “Epileptic Seizure Prediction through Machine Learning and Spatio-Temporal Features Based Time Series Analysis of Intracranial Electroencephalogram Data”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 8958, Volume-9 Issue-1, October 2019

177. J.V. Thomas Abraham, A. Shahina, A. Nayeemulla Khan, “Enhancing Noisy Speech using WEMD”, International Journal of Recent Technology and Engineering(IJRET), Volume-7, Issue-5S4, Feb 2019.

178. J.V. Thomas Abraham, A. Nayeemulla Khan, “Imputations of Hostile Conditions in Automatic Speaker Recognition Performance”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-7, May 2019.

Year 2018

1. Sudhakar, M., & Meena, M. J. (2018). A novel method to detect foreground region using morphological operations with block based enhancement for underwater images. International Journal of Engineering & Technology, 7(3), 1751-1756. (This is available under 2019 in website)
2. Anusooya, G., Vijayakumar, V., Punitha, K., Sathyarajasekaran, K., & Bharathiraja, S. (2018). A comparative analysis about load balancing algorithms using cloud simulator. International Journal of Civil Engineering & Technology (IJCIET), 9(7), 476-483.
3. Prakash, B., & Viswanathan, V. (2018). Ontology based risks management model for agile software development. Journal of Advanced Research in Dynamical and Control Systems, 10(11), 319-330.
4. Premalatha, M., Viswanathan, V., Suganya, G., Kaviya, M., & Vijaya, A. (2018). Educational data mining and recommender systems survey. International Journal of Web Portals (IJWP), 10(1), 39-53.
5. Sathyarajasekaran, K., & Ganesan, R. (2018). Change impact analysis (CIA) and its role in analysis and design of software development. International Journal of Engineering and Advanced Technology (IJEAT), 8(2S), 275-283.
6. Sathyarajasekaran, K., & Ganesan, R. (2018). Effect of code generation in change impact analysis using MVC design pattern. Journal of Advanced Research in Dynamical Control Systems (JARDCS),10(1), 2417-2429.
7. Kumar, B.S. (2018). Simplifying use case transaction identification by using architect’s use case diagram. Journal of Advanced Research in Dynamical & Control Systems, 10(9), 2145-2156.
8. Rao, B.P. (2018). Software development effort estimation: a framework. International Journal of Applied Business and Economic Research, 15(22), 749-763.
9. Rajarajeswari, S., & Neelanarayanan, V. (2018). Consistent context aware behaviour in smart home environment, International Journal of Sustainable Society, 10(4), 300-312.
10. Poornima, N., & Saleena, B. (2018). Automatic Annotation of Educational Videos for Enhancing Information Retrieval. Pertanika Journal of Science & Technology, 26(4), 1571-1590.
11. Ramkumar, A.S, Poorna, B., & Saleena, B. (2018). Ontology based text document clustering for sports. Journal of Engineering and Applied Sciences, 13(11), 4073-4079.
12. K Dinesh Kumar and E Umamaheswari, “Efficient Cloud Resource Scaling based on Prediction Approaches”, International Journal of Engineering & Technology (UAE), ISSN: 2227-524X, Vol. 7, No 4.10, 2018.
13. Kumar, K. D., & Umamaheswari, E. (2018). Efficient Cloud Resource Scaling based on Prediction Approaches. International Journal of Engineering & Technology, 7(4.10).
14. Kumar, K. D., & Umamaheswari, E. (2018). Resource provisioning in cloud computing using prediction models: a survey. International Journal of Pure and Applied Mathematics, 119(9), 333-342.
15. George, B., & Umamaheswari, E. (2018). An Overview of the impact of fog computing and internet of things on cloud computing and its challenges. Journal of Advance Research in Dynamical and Control Systems, 10(12), 882-887.
16. Maheswari, S., & Selwyn, J. (2018, December). A review on the quality of service of web services International Journal of Mechanical Engineering and Technology. 9(12), 414–424.
17. Ranganathan, S., & Selwyn, J. (2018, December). A study on the use of datamining to improve performance and security of intelligent transportation systems. International Journal of Mechanical Engineering and Technology, 9(13), 810–818.
18. Mabel, V.H., & Selwyn, J. (2018, September). Preliminary results on the implementation of music expert system. International Journal of Engineering and Applied Sciences, 13(14), 5814-5819.
19. Ranganathan, S., & Selwyn, J. (2018, June). Automatic extraction of acronyms from english newspapers. International Journal of Mechanical Engineering and Technology, 9(6), 817–826.
20. M Priya, M. K., & Selwyn, J. (2018). KM trajectory schema service frame work for software development organizations. International Journal of Engineering &Technology, 7(3.12), 616-620.
21. Selwyn, J., & Sundaram, M. K. (2018). Evaluating the dynamic metrics for object-relational modeling. International Journal of Knowledge based Computer Systems, 6(1), 1-6 .
22. Hemalatha, C. S., Sankaran, V., Vaidehi, V., Sharmi, P., Lavanya, B., Vasuhi, S., & Kumar, R. (2018). Symmetric uncertainty based search space reduction for fast face recognition. International Journal of Intelligent Information Technologies (IJIIT), 14(4), 77-97.
23. Ibrahim, S. S., Sivabalakrishnan, M., & Ibrahim, S. P. (2018, November). Lazy learning associative classification in mapreduce framework. International Journal of Recent Technology and Engineering (IJRTE), 7(4S), 168-172.
24. Suganeshwari, G., SP, S. I., & Li, G. (2018). Lazy collaborative filtering with dynamic neighborhoods. Information discovery and delivery. Information Discovery and Delivery,46(2), 95-109.
25. Tamrakar, P., & Ibrahim, S. S. (2018). Attribute ranking based lazy learning associative classification. ARPN Journal of Engineering and Applied Sciences, 13(11), 3698-3705.
26. Suganeshwari, G., & Ibrahim, S. P. (2018). A comparative study on similarity measures in collaborative filtering algorithms for movie recommendation. International Journal of Pure and Applied Mathematics, 119(15), 1495-1504.
27. Tamrakar, P., & Ibrahim, S. S. (2018). A review of lazy learning associative classifications. International Journal of Pure and Applied Mathematics, 119(15), 1507-1515.
28. Wagh, T. A., Bhargavi, R., Wagh, T. A., & Samant, R. M. Forest cover type prediction using cartographic variables. International Journal of Computer Applications, 975, 8887.
29. Vijayalakshmi, A., PAUL, C. J. (2018, October). Big data health care system using distributed wearable sensors. International Journal of Engineering & Technology, 7(4.10), 429-431.
30. Prabha A, J., R, B., & Ragala, R. (2018). Prediction of dyslexia using support vector machine in distributed environment. International Journal of Engineering & Technology, 7(4), 2795-2799.
31. Gopal, P.S.M., & Bhargavi, R. (2018) . Feature selection for yield prediction using boruta algorithm. International Journal of Pure and Applied Mathematics, 118(22), 139-144.
32. Sarobin, V.R. M., Rukmani, P., Jasmine. S, G., & Harini, S. (2018). Application of data analytics for IoT based healthcare system, International Journal of Engineering & Technology, 7(3-8), 169 – 172.
33. Naidu, C., Kumar, D., Maheswari, N., & Sivagami, M. (2018). Prediction of alzheimer’s disease using brain images. Research Journal of Pharmacy and Technology, 11(12), 5365-5368.
34. Thakur, V. A., Mabel, V.H., & Dhingra, V. (2018). A critical literature review on patent document mining, analysis and evaluation. Journal of Advanced Research in Dynamical and Control Systems, 13, pp. 2260-2271.
35. Subramanian, A., Sivagami, M., & Maheswari, N. (2018). Improved speeded up robust features for low contrast images. International Journal of Engineering and Technology, 7(4), 4697-4701.
36. Khobragade, A.N., Maheswari, N., Sivagami, M. (2018). Analysing the housing rate in a real estate informative system, International Journal of Civil Engineering and Technology, 9(5), 1156-1164.
37. Mayankkushwah, S.A., & Bharathiraja, S. (2018). Detection of malware in windows operating system, International Journal of Pure and Applied Mathematics, 120(6), 1219-1240, 2018.
38. Prassanna, J., Prabhakaran, R., Vincent, R., Nawas, K. K., & Geetha, M. (2018). IOT-Enabled efficient solid waste management system towards building smart city. International Journal of Civil Engineering and Technology (IJCIET), 9(12), 603-611.
39. Jackson, J. C., & Vijayakumar, V. (2018). A review on congestion control system using APU and D-FPAV in VANET. International Journal of Advanced Intelligence Paradigms, 10(4), 391-400.
40. Ponraj, A. S., & Jackson, C. (2018). NFC based parking system for smart cities. ARPN Journal of Engineering and Applied Sciences, 13 (11), 3758-3764.
41. Jackson, J.C., & Vijayakumar, V. (2018). Taxonomy on evolutionary computation approaches in vehicular adhoc networks, International Journal of Pure and Applied Mathematics,120 (8), 169-177.
42. Jyothi, K., & Jackson, J.C. (2018). A time-based approach for solving the dynamic path problem in vanets – an extension of ant colony optimization, Journal of Engineering Science and Technology,13 (3), 813-821.
43. Devi, V.K., Gururaj, A.D.M., Kavya, A., & Umamaheswari, E. (2018). Truck tracking and alerts monitoring system. International Journal of Civil Engineering and Technology, 9, 105-111.
44. Gayathri, R., & Neelanarayanan, V. (2018). DoS detection solution for cloud platform using SNMP. Int J Pure Appl Math, 119(11), 175-83.
45. Sivakumar, V., & Rekha, D. (2018). Underwater acoustic sensor node scheduling using an evolutionary memetic algorithm. Journal of Telecommunications and Information Technology, 1(1), 88-94.
46. Priya R,P., Sanjay, A.R., Gupta, Y.V & Rekha, D. (2018, July). Investigating feasible tool for swarm robotic based oil skimming application. International Journal of Engineering and Technology, 7(1), 960-967.
47. Alamelu, N., & Kumar, T.S.P. (2018). Unique Identical Weightage (UIW) model for real time customer search queries. International Journal of Recent Technology and Engineering(IJRTM), 14(1), 1612–1621.
48. Kumar, T. P., & Krishna, P. V. (2018). Power modelling of sensors for IoT using reinforcement learning. International Journal of Advanced Intelligence Paradigms, 10(1-2), 3-22.
49. Mathew, S. A., & Md, A. Q. (2018). Evaluation of blockchain in capital market use-cases. International Journal of Web Portals (IJWP), 10(1), 54-76.
50. Matthew, K. M., & Md, A. Q. (2018). Analysis framework for logs in communication devices. International Journal of Web Portals (IJWP), 10(1), 15-26.
51. Maheswari,R., Rani, S., & Sharmila, P.(2018). IoT driven vehicle license plate extraction approach, International Journal of Engineering and Technology (UAE), 7 (2), 457-459.
52. Maheswari, R., Gomathy, V., & Sharmila, P. (2018). Cancer detecting nanobot using positron emission tomography. Procedia Computer Science, 133, 315-322.
53. Maheswari, R., Rani, S., & Sharmila,P. (2018). Real time environment simulation through virtual reality. International Journal of Engineering and Technology (UAE), 7(2), 404-406.
54. Maheswari, R., Sheeba, S., Gnanamalar, R., Sharmila, P., & Gomathy, V. (2018). Solar powered system-on-chip for meteorological data station. International Journal of Pure and Applied Mathematics, 118(20), 1225-1229.
55. Priyaadharshini, M., & Vinayaga Sundaram, B. (2018). Evaluation of higher‐order thinking skills using learning style in an undergraduate engineering in flipped classroom. Computer Applications in Engineering Education, 26(6), 2237-2254.
56. Gondalia, A., Dixit, D., Parashar, S., Raghava, V., Sengupta, A., & Sarobin, V. R. (2018). IoT-based healthcare monitoring system for war soldiers using machine learning. Procedia computer science, 133, 1005-1013.
57. Vijaya, A., & Venkataraman, N. (2018). Modernizing Legacy Systems: A Re-Engineering Approach. International Journal of Web Portals (IJWP), 10(2), 50-60.
58. Shanthi, S., Kannan, R. J., & Santhi, S. (2018). Efficient secure system of data in cloud using steganography based cryptosystem with FSN. Materials Today: Proceedings, 5(1), 1967-1973.
59. Gayathri, M., & Kannan, R. J. (2018). Ontology based Indian medical system. Materials Today: Proceedings, 5(1), 1974-1979.
60. Kumar, P. S., & Kannan, R. J. (2018). An Enhanced and Efficient Approach for Improving the Performance of HPC Environment Using Map-Reduce With MARIANE. Materials Today: Proceedings, 5(1), 1980-1988.
61. Naresh, K., & Kannan, R. J. (2018). An Enumeration of Radiotherapy Terminologies, Planning and its Optimization. Materials Today: Proceedings, 5(1), 1048-1056.
62. Prabakaran, N. (2018). Smart Objects Assisted Event Detection System Using Wireless Sensor Networks. Materials Today: Proceedings, 5(1), 1063-1070.
63. Kumar, R, S., & Kannan, R. J. (2018). Review of Advancements in Multi-tenant Framework in Cloud Computing. Indonesian Journal of Electrical Engineering and Computer Science, 11(3), 1102-1108.
64. Purniemaa, P., & Kannan, R. J. (2018). Cascaded neural network based data mining strategy for cloud intrusion detection. Indonesian Journal of Electrical Engineering and Computer Science, 11(3), 1094 – 1101.
65. Jeyapriya, J., Umadevi, K.S., & Kannan, R. J. (2018). Automated detection of microaneurysms using probabilistic cascaded neural network. Indonesian Journal of Electrical Engineering and Computer Science, 11(3), 1083 – 1093.
66. Shanmugavel, S., Kannan, R. J., & Sudhkar, A.V. (2018). Handwritten optical character extraction and recognition from catalogue sheets. International Journal of Engineering and Technology, 7(4.5), 36 – 39.

67. Velmurugan, J., & Kannan, R. J. (2018). Dynamic trust factor based energy efficient relay node selection in WHSNs”, Journal of Engineering and Applied Sciences, 13(6), 1326 – 1330.
68. Rai, A., & Kannan, R. J. (2018). Differed restructuring of neural connectome using evolutionary neurodynamic algorithm for improved M2M online learning. Procedia computer science, 133, 298-305.
69. Kirthica, S., & Sridhar, R. (2018). Securely communicating with an optimal cloud for intelligently enhancing a cloud’s elasticity. International Journal of Intelligent Information Technologies (IJIIT), 14(2), 43-58.
70. Kushwah, M., Bharathiraja, S., & Asha, S. (2018). Detection of malware in windows operating system. International Journal of Pure and Applied Mathematics, 120(6), 1219 – 1240.
71. Jayanthi, R., & Singh, K. J. (2018). Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography. International Journal of Reasoning-based Intelligent Systems, 10(3-4), 279-285.
72. Sarojini, S., & Asha, S. (2018). Study of fighting financial botnets crimeware toolkits. International Journal of Pure and Applied Mathematics, 118(24), 1-12.
73. Prabhakaran, R., & Asha, S. (2018). Enhancing cyber security in power substation using RSA algorithm and LSB stegnography methodology. International Journal Of Pure And Applied Mathematics ,118 (24), 1-17.
74. Rishabh, T., & Asha, S. (2018). Network traffic analysis using weka tool, International Journal of Pure and Applied Mathematics, 118 (24), 1-14.
75. Reddy, M., Bogati, Asha, S. (2018). Orchestration framework and fabric deployment, International Journal of pure and Applied Mathematics, 118 (24),1-17.
76. Uday, P., Shankar, Alok, C., Asha, S. (2018). Data mining & predictive analysis on airlines performance, International Journal Pure and Applied Mathematics, 118 (24), 1-12.
77. Prabhakaran, R., & Asha, S. (2018). Analysis of cyber physical vulnerability index in a power station. International Journal of Pure and Applied Mathematics. 118 (24), 1-9.
78. Agarwal, S., Patel, F., Chaturvedi, P., Asha, S. (2018). A Novel Approach for Communication among Blind, Deaf and Dumb People. International Journal of Pure and Applied Mathematics, 118(24), 1-13.
79. Sanmay, K., & Asha, S. (2018). Analysis of data from vehicle data recorder in automobile vehicles using machine learning. International Journal of Pure and Applied Mathematics,118 (24), 1-6.
80. Rakhesh, B., & Devi, S.R. A survey to analyse mitigation techniques for distributed denial of service attacks. International Journal of Civil Engineering and Technology, 9(11), 1437–1446.
81. Karmel, A., Adhithiyan, M ., Kumar. P.S. (2018, May). Machine learning based approach for pothole detection, International Journal of Civil Engineering and Technology (IJCIET), 9(5), 882–888
82. Geetha, M., & Ganesan, R. (2018). Enhanced cuckoo search algorithm for energy efficient cooperative communication in wireless body area networks (WBAN), Journal of Advanced Research in Dynamical and Control Systems, 10(10), 2443-2450.
83. Sangeetha, G., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2018). A comprehensive analysis of congestion control models in wireless sensor networks. International Journal of Strategic Information Technology and Applications (IJSITA), 9(4), 15-37.
84. Nisha., M, & Jeganathan, L. (2018). Classification of two dimensional cellular automata rules for symmetric pattern generation”, Symmetry, 10(12), 772.
85. Rao, U.S., & Jeganathan, L. (2018). Replication of a binary image on a one-dimensional cellular automaton with linear rules, Complex Systems, 27(4), 415-430.
86. Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems, 20(4), 519-531.
87. Munavar, M., & Pattabiraman,V. (2018), Analysis of supervised machine learning techniques on the application of the indian coastal dataset. International Journal of Pure and Applied Mathematics, 118(18), 1913-1923.
88. Sriraman, H., & Pattabiraman, V. (2018, March), Extending lifetime reliability model for multi-threaded architectures. International Journal of Next-Generation Computing, 9(1), 51-65, 2018.
89. Mehfooza, M., & Pattabiraman, V. (2018). SP-DDPT: a simple prescriptive-based domain data preprocessing technique to support multilabel-multicriteria learning with expert information. International Journal of Computers and Applications. 1-7.
90. Rosaline, A., & Parvathi.R. (2018). Sensing the mood on crimes against women by exploring social media using dimensional model. International Journal of Engineering and Technology(UAE), 7 (2.20), 344-348.
91. Monika,M., & Parvathi, R., (2018). Correlation analysis of community detection in social network of big data methodical using set theorem. International Journal of Engineering and Technology(UAE), 7 (2.21), 398-401.
92. Dharini., R, & Parvathi, R. (2018). Event detection from Twitter – a survey. International Journal of Web Information Systems, 14 (3), 262-280.
93. Shyamala, L., & Balaji, A. (2018). Adaptive rank based scheduling in an institutional cloud oriented distributed datacenters. International Journal of Civil Engineering and Technology, 9,(7), 1241–1248.
94. Kumar, J. S., & Maheswari, N. (2018). An approach towards privacy preservation of sensitive information in social networked graphs’ Journal of Advanced Research in Dynamical and Control Systems, 10 (10), 2363 – 2374.
95. Nirmala, G., Geetha, S., & Selvakumar, S. (2018). Optimization of path planning problem of a mobile robot using hybrid exploration and exploitation with hill climbing technique. Sylwan Journal, 162(5), 58-71.
96. Geetha, S., Punithavathi, P., Infanteena, A. M., & Sindhu, S. S. S. (2018). A literature review on image encryption techniques. International Journal of Information Security and Privacy (IJISP), 12(3), 42-83.
97. Angaleeswari, K., Ezhilarasan, T., Perumal, M., Geetha, S., & Swaminathan, V. (2018, May) .Study on k – extensibility and weakly k -extensibility in harary graphs (Hm,n), for specific values of m and n. International Journal of Mathematics Trends and Technology (IJMTT), 1-7.
98. Sandhya, P. (2018, July). Ensemble learning on forecasting fine grained pollutant levels in air using random forest, naive bayes, decision tree algorithms. International Journal of Civil Engineering and Technology (IJCIET),9(7), 303-313.
99. Sandhya P., Gupta, S., Saikishan, G., & Garg, H.M. (2018). Smart home using IOT. ARPN Journal of Engineering and Applied Sciences,13(13),4224-4230.
100. Suseela, S., & Phamila, Y.A.V. (2018). Low complexity secured image compression for wireless image sensor network with chaotic map. International Journal of Pure and Applied Mathematics, 119(16), 4861-4870.
101. Kalaivani, K., & Phamila, Y.A.V .(2018). Modified Wiener Filter for Restoring Landsat Images in Remote Sensing Applications. Pertanika Journal of Science & Technology, 26(3), 1005-1018.
102. Sekar, S. N, Anbarasi, L. J., & Dhanya, D. (2018). An efficient distributed compressive sensing framework for reconstruction of sparse signals in mechanical systems. International Journal of Mechanical Engineering and Technology (IJMET), 9(13), 1286-1292.
103. Khobragade, A.N., Maheswari, N., & Sivagami, M.(2018). Analyzing the housing rate in a real estate informative system: a prediction analysis. International Journal of Civil Engineering & Technology (IJCIET), 9(5), 1156-1164.
104. Ragala, R., Prabha, A.J., & Bhargavi, R. (2018). Prediction of dyslexia using support vector machine in distributed environment. International Journal of Engineering & Technology, 7(4), 2795-2799.
105. NS, G. R. S., Maheswari, N., Samraj, A., & Vijayakumar, M. V. (2018). An Efficient Score level Multimodal Biometric System using ECG and Fingerprint. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(4), 31-36.
106. Sheryl Oliver, A., Anuradha, M., Jean Justus, J., & Maheshwari, N. (2018). Optimized low computational algorithm for elderly fall detection based on machine learning techniques.
107. Anuradha, M., Sheryl Oliver, A., Jean Justus, J., & Maheswari, N. (2018). IOT based monitoring system to detect the ECG of soldiers using GPS and GPRS.
108. Kumar, J.S., & Maheswari, N. An approach towards privacy preservation of sensitive information in social networked graphs. Journal of Advanced Research in Dynamical and Control Systems, 10(10), 2363-2374.
109. Sariki, T. P., & Kumar G, B. (2018). A book recommendation system based on named entities. Annals of Library and Information Studies (ALIS), 65(1), 77-82.
a. Krishnan E, G., & Malathi, G. (2018). Contactless novel hand wrist biometrics feature detection using surf, International Journal of Civil Engineering and Technology (IJCIET), 9(11), 1102–1114.
110. Rajesh, K. B., Bhat, M. S., Vijayalakshmi, C., & Raj, A. N. J. (2018). Model to estimate the salt and pepper noise density level on gray-scale digital image. EAI Endorsed Transactions on Energy Web, 5(18), 1-7.
111. Srikar, G., & Reshmi, T. R. (2018). A Fuzzy-Logic Based Clustering Algorithm in WSN to Extend Network Lifetime. International Journal of Applied Engineering Research, 13(10), 7711-7718.
112. Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.
113. Mohanraj, V., Vaidehi, V., Vasuhi, S., & Kumar, R. (2018). A Novel Approach for Face Recognition under Varying Illumination Conditions. International Journal of Intelligent Information Technologies (IJIIT), 14(2), 22-42.
114. Chakkaravarthy, S. S., Vaidehi, V., & Rajesh, P. (2018). Hybrid analysis technique to detect advanced persistent threats. International Journal of Intelligent Information Technologies (IJIIT), 14(2), 59-76.
115. Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi, K., & Vaidehi, V. (2018). Futuristic cyber-attacks. International Journal of Knowledge-based and Intelligent Engineering Systems, 22(3), 195-204.
116. Mohanraj, V., Vaidehi, V., Vasuhi, S., & Kumar, R. (2018). A Novel Approach for Face Recognition under Varying Illumination Conditions. International Journal of Intelligent Information Technologies (IJIIT), 14(2), 22-42.
117. Chakravarthi, K. K., & Vijayakumar, V. (2018). Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey. International Journal of Electrical and Computer Engineering, 8(2), 853.
118. Brindha, J., & Vijayakumar, V. (2018). Framework and Implementation of Marine Dumping Area’s Monitoring System Based on GPRS. Indonesian Journal of Electrical Engineering and Computer Science, 9(2), 322-326.
119. Brindha, J., & Vijayakumar, V. (2018). Proximity Sensors Based Marine Engine Fault Detection using CAN Protocol. Indonesian Journal of Electrical Engineering and Computer Science, 9(3), 619-623.
120. Basha, A., & Vijayakumar, V. (2018). Mobile-Robot Navigation through Fuzzy Behavioral Algorithm & Vector-Polar Histogram Algorithm. Indonesian Journal of Electrical Engineering and Computer Science, 9(3), 565-571.

121. Satapathy A. & Jenila Livingston L.M. (2018). An Intelligent Framework Prototype for Monitoring Students in Virtual Classroom. Indonesian Journal of Electrical Engineering and Computer Science, p-ISSN: 2502-4752, e-ISSN: 2502-4760, Vol. 12, Issue 3, pp 1151-1158.

122. Satapathy A. & Jenila Livingston L.M. (2018). A Denial of Service Attack on DHCP Server and its Countermeasures. ARPN Journal of Engineering and Applied Sciences, ISSN 1819-6608, Vol. 13, Issue 12, pp 3983-3787.

Year 2017

1. Sudhakar, M., & Meena, M.J. (2017, November). An efficient eye region detection by gamma correction for real time application. Journal of Advanced Research in Dynamical and Control Systems, 9(8), 237-248. (This is available under 2018 in website)
2. Pradhan, G.K, Gollapalli, S, Meena, M.J & Ibrahim, S. P.S. (2017). Survey on advisor intelligence through purchase patterns and sales analytics. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 302-304.
3. Nath, N. D., Jha, S., Meena, J.M., & Ibrahim, S. P.S. (2017). A survey paper on elastic search similarity algorithm. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 361-364.
4. Sharma, P., Meena, M. J., & Ibrahim, S. P.S. (2017). Media mix modeling comparison of interaction model to simple log-linear model. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 390-393.
5. Vaidya, P. V., Meena, M. J., & Ibrahim, S. P.S. (2017). Cloud-based data analytics framework for mobile app event analysis. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 207-210.
6. Punitha,K. (2017). Enactment of face recognition algorithm for attendance system. International Journal of Applied Engineering Research, 12(24), 14014-14018.
7. Premalatha, M., Viswanathan, V., Ravali, R., & Akshay, A. (2017). Recommender systems for course re-registration. International Journal of Economic Research,14(16), 319-327.
8. Prakash, B., & Viswanathan, V. (2017). A survey on software estimation techniques in traditional and agile development models. Indonesian Journal of Electrical Engineering and Computer Science, 7(3), pp.877-886.
9. Ruikar, A.V., & Viswanathan, V. (2017). Bus location and route system using IoT . Asian Journal of Pharmaceutical and Clinical Research, Asian Journal of Pharmaceutical and Clinical Research, Special issue on Advances in Smart Computing and Bioinformatics, 1(1),129-132.
10. Jayasudha ,R., Viswanathan, V., & Shanthi, P. (2017). Implementation of reuse in the Agile software development process SCRUM. Asian Journal of Pharmaceutical and Clinical Research, Special issue on Advances in Smart Computing and Bioinformatics, 1(1),143-147.
11. Anusooya, G., Jackson, C., & Sathyarajasekaran, K., & Kannan. K. (2017). RFID based smart car parking system. International Journal of Applied Engineering Research,12(17), 6559-6563.
12. Nachiyappan, S. and Selwyn, J. (2017). Pre hadoop and post hadoop validations for big data. International Journal of Mechanical Engineering and Technology. 8(10), 1(1), 608-616.
13. Kumar, B.S. (2017). Evaluation of capturing architecturally significant requirements methods. Asian Journal of Pharmaceutical and Clinical Research, 10,1(1), 122-128.
14. Ghosh, S., Kumar, B.S., & Deivanai, K. (2017). Detection of whales using deep learning methods and neural networks. Asian Journal of Pharmaceutical and Clinical Research, 10, 1(1), 489-494.
15. Rao, B.P. (2017). A case study on software project development cost, schedule & effort estimation. Asian Journal of Pharmaceutical and Clinical Research, Special issue on Advances in Smart Computing and Bioinformatics, 1(1),10-14.
16. Borah, R., Rajarajeswari, S. (2017). A study on application of machine learning and computer vision for retail projects. Asian Journal of pharmaceutical and clinical research, 1(1), 476-480.
17. Saikia, S., Saleena, B., & Prakash, B. (2017). Dynamic location area planning in cellular network using frequent pattern mining. Asian Journal of Pharmaceutical and Clinical Research,10(13), 324-327.
18. Tejashwini, K., Saleena, B., Prakash, B., & Shopia, S. (2017). Analyzing the stock market behavior using event study and sentiment analysis on twitter posts. International Journal of Pure and Applied Mathematics, 117(15), 387 – 396.
19. Sangavi, V.P., & Saleena, B. (2017, April). Unmanned image narration. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 378-381.
20. Poornima, N., Agrawal, S., & Saleena, B. (2017). Prior ontology selection and query translation for information search. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 499-501.
21. Suganya, G., Premalatha, M., Bharathiraja, S., Agrawal, R. (2017). low cost design to detect drowsiness of driver. International Journal of Civil Engineering and Technology (IJCIET), 8(9), 1138–1149.
22. Umamaheswari. E., & Ajay, D.M. (2017, April), Scope of internet of things: a survey, Asian Journal of Pharmaceutical and Clinical Research, 1(1), 187-190.
23. Kumar, K.D., & Umamaheswari, E. (2017, April). An authenticated, secure virtualization management system in cloud computing. Asian Journal of Pharmaceutical and Clinical Research, Advances in Smart Computing and Bioinformatics, 1(1), 45-48.
24. Mabel, V.H., & Selwyn, J. (2017, December). Knowledge based process framework for the static and dynamic activities in design and development. International Journal of Mechanical Engineering and Technology, 8(12), 307-315.
25. Rahaman, A., & Selwyn, J. (2017). A survey study on significant quality dimensions and factors for knowledge management systems. Journal of Advanced Research in Dynamical and Control Systems, 1(15), 78-88.
26. Sridhar, R., & Selwyn, J. (2017). A study on the named entity recognition and classification. International Journal of Artificial Intelligence and Knowledge Discovery, 7(1), 1.
27. Nimbalkar, Y.A., & Selwyn, J. (2017, August). Implementing a knowledge based Band Management Tool. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(4), 163-169.
28. Rachel,S.P, & Selwyn, J. (2017). Concept-relation constructs for knowledge representation. International Journal of Economic Research, 15(22), 765-775.
29. Maheswari. S, & Selwyn, J. (2017). A survey on QoS of real world web services. International Journal of Economic Research, 15(22), 847-856.
30. Drishti., Nachiyappan, S., & Selwyn, J. (2017). Towards an automated testing framework for big data. International Journal of Economic Research, 14(16), 301-311.
31. Suganya, G., Premalatha, M., Bharathiraja, S., & Rohan Agrawal, A. (2017). Low cost design to detect drowsiness of driver. International Journal of Civil Engineering and Technology, 8(9), 1138–1149.
32. Sivagami, M., Revathi, T., & Jeganathan, L. (2017). An optimised background modelling for efficient foreground extraction. International Journal of High Performance Computing and Networking, 10(1-2), 44-53.
33. Bhargavi, R., & Abraham, M.S. (2017). Failure analysis based on relaibility testing using genetic algorithm. International Journal of Control Theory and Applications, 10(33), 183-191.
34. Mathew, T., Jeganathan, L., & Rao, U. S. (2017). A cellular automata model for safe investment based on expert’s recommendations. International Journal of Economics and Business Research, 14(3-4), 390-400.
35. Waghmare, A., & Hemalatha, S. (2017). Predictive analytics of health care data.Asian Journal of Pharmaceutical and Clinical Research, 10(1),333 – 336.
36. Anirudh Bhardwaj, C., Mishra, M., & Hemalatha, S. (2017). An Automated Compatibility Prediction Engine using DISC Theory Based Classification and Neural Networks. International Journal of Engineering Technology Science and Research, 4(8), 347 – 353.
37. Vaidya, P.V., Meena, J.M., & Ibrahim, S.P. (2017, April). Cloud-based data analytics framework for mobile app event analysis. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 207 – 210.
38. Pradhan, G. K., Gollapalli, Meena, J. M, Ibrahim,S.P. (2017). Survey on advisor intelligence through purchase patterns and sales analytics. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 302-304.
39. Nath, N.D., Jha, S., Meena, J. M, Ibrahim,S.P. (2017). A survey on elastic search similarity algorithm, Asian Journal of Pharmaceutical and Clinical Research. 10(13), 361 – 364.
40. Singh, R.K. (2017, December). Human-less auto meter reading: HAMER system. International Journal of Research in Engineering, IT and Social Sciences, 7(12), 77-80.
41. Jamdar1, N., & Vijayalakshmi, A. (2017, April). Big data mining for interesting patterns with map reduce technique, Asian Journal of Pharmaceutical and Clinical Research, 10(1), 191-193.
42. Barapatre, D., & Vijayalakshmi, A. (2017). Data Preparation on large datasets for data science, Asian Journal of Pharmaceutical and Clinical Research, 10(1), 485-488.
43. Kumar, P., Patel, F., & Kanna, R. (2018). An efficient line clipping algorithm for circular windows using vector calculus and parallelization. International Journal of Computer Graphics & Animation, 8(1/2), 1-8.
44. Rajkumar, S., & Malathi, G. (2017). An efficient image denoising approach for the recovery of impulse noise. Bulletin of Electrical Engineering and Informatics, 6(3), 281-286.
45. Punithavathi, P., & Geetha, S. (2017). Visual cryptography: A brief survey. Information Security Journal: A Global Perspective, 26(6), 305-317.
46. Punithavathi, P., & Geetha, S. (2017). Random projection-based cancelable template generation for sparsely distributed biometric patterns. Indonesian J Electric Eng Comput Sci, 7(3), 877-886.
47. Punithavathi, P., & Subbiah, G. (2017). Can cancellable biometrics preserve privacy?. Biometric Technology Today, 2017(7), 8-11.
48. Sandhya, P. (2017, August). Health analysis using big data. ARPN Journal of Engineering and Applied Sciences, 12(15), 4620-4623.
49. Sandhya, P., & Chouhan, S. (2017, April). Internet of thing BASED based car parking system. Asian Journal of Pharmaceutical and clinical research, 10(13), 97-100.
50. Geetha, M., Prassanna, J., Nivedita, M., & Prabhakaran R. (2017, November). Towards an enhanced efficient cross layer protocol (EECLAP) for wireless sensor networks. International Journal of Mechanical Engineering and Technology, 8(11), 394 – 402.
51. Susheela, G., & Phamila, Y.A.V. (2017). Low bitrate hybrid secured image compression for wireless image sensor network. Asian Journal of Pharmaceutical and Clinical Research, 1(4), 101-104.
52. Kalaivani. K., & Phamila, Y.A.V. (2017). Pixel level fusion of multi temporal landsat images using discrete wavelet transform for detecting changes. Journal of Advanced Research in Dynamical and Control Systems, 9(5), 125-130.
53. Mounika,N., K., Kalaivani & Phamila, Y.A.V. (2017). Enhanced data hiding using least significant bit masking technique for image steganography. Journal of Advanced Research in Dynamical and Control Systems, 9(6), 90-96.
54. Sangavi, V.P., Mounika, N., Jasmine N, G. (2017). disaster recovery through prediction of safe route using dem levels. Asian Journal Of Pharmaceutical And Clinical Research,10 (13), 20 – 24.
55. Ibrahim, S. S., Sivabalakrishnan, M., & Kumar, R. S. (2017). Posteriori probability inspired minimal rule generation in associative classification. International Journal of Pure and Applied Mathematics, 116(12), 47-55.
56. Ibrahim, S. S., Pavithra, M., & Sivabalakrishnan, M. (2017). Pstree based associative classification of data stream mining. International Journal of Pure and Applied Mathematics, 116(12), 57-65.
57. Sivagami, M., Revathi, T., & Jeganathan, L. (2017). An optimized background modelling for foreground extraction. International Journal of High Performance Computing and Networking, 10 (1/2), 44-53.
58. Manna, S., & Malathi, G. (2017, August). Performance analysis of classification algorithm on diabetes healthcare dataset. International Journal of Research, 5(8), 260-266.
59. Kanna,B.R., & Rajalakshmi, R. (2017). Perceptive interaction for amputated fingers (PIAF). International Journal of Pure and Applied Mathematics,117 (20), 713-725.
60. Kanna, B, R., Viswanathan, V., & Ebbinason A.J.G. (2017). Eventr – Design of an event management mobile application using ontology. Asian Journal of Pharmaceutical and Clinical Research,10(1), 90-93.
61. Rai, A., & Kannan, R.J. (2017, April). Modeling thermal shock based cracking behaviour of armour material for fusion reactor. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 214 – 217.
62. Rai, A., & Kannan, R.J. (2017, April). Development of cyber-physical system for laser-based controlled cloud seeding. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 218 – 221.
63. Rai, A., & Kannan, R.J. (2017, April). Compressed transmission of depth maps in 3d stream services for robotics & surveillance. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), pp 222 – 224.
64. Rai, A., & Kannan, R.J. (2017, April). Neuro-computational modelling of distributed learning from visual stimuli. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 225 – 229.
65. Rai, A., & Kannan, R.J. (2017, April). Microtubule based neuro-fuzzy nested framework for security of cyber physical system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 230 – 234.
66. Rai, A., & Kannan, R.J. (2017, April). Hybrid noise filtering algorithm based on neuro-type 2 fuzzy systems. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 235 – 238.
67. Rai, A., & Kannan, R.J. (2017, April). Universal infrastructure of M2M enabled inter-cloud services for intelligent transportation system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 239 – 243.
68. Rai, A., & Kannan, R.J. (2017, April). Computational modelling and predicting spread of arboreal epidemic. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 244 – 246.
69. Rai, A., & Kannan, R.J. (2017, April). Region specific wavelet compression for 4k surveillance images. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 247 – 250.
70. Rai, A., & Kannan, R.J. (2017, April). Central processing unit-graphics processing unit computing scheme for multi-object tracking in surveillance. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 251 – 253.
71. Rai, A., & Kannan, R.J. (2017, April). Hyper-properties based optical flow-based autonomous driving system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 254 – 258.
72. Rai, A., & Kannan, R.J. (2017, April). Modeling of light illumination field on micro-expression for face recognition application. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 259 – 262.
73. Rai, A., & Kannan, R.J. (2017, April). Associative rule learning for anomalistic behavioral modeling in banking fraud applications. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 263 – 266.
74. Rai, A., & Kannan, R.J. (2017, April). Shape selectivity of and synthetic visual intelligence. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 267 – 271.
75. Rai, A., & Kannan, R.J. (2017, April). Bi-directional recurrent neural network for improving multispectral image denoising. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 272 – 275.
76. Rai, A., & Kannan, R.J. (2017, April). Touch free user interface for augmented reality systems. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 276 – 278.
77. Rai, A., & Kannan, R.J. (2017, April). Fusion of thermal and RGB images for border security surveillance. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 279 – 281.
78. Rai, A., & Kannan, R.J. (2017, April). Synchronized neural firing for controlling cyber physical system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), pp 282 – 284.
79. Rai, A., & Kannan, R.J. (2017, April). online learning for image processing in networked setting. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 285 – 287.
80. Rai, A., & Kannan, R.J. (2017, April). Wavelet transformation for enhancing mammographic images. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 288 – 291.
81. Rai, A., & Kannan, R.J. (2017, April). A survey of multispectral image denoising methods for satellite imagery applications. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 292 – 295.
82. Rai, A., & Kannan, R.J. (2017, April). Survey of soft biometric techniques for gender identification. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 296 – 301.
83. Rai, A., & Kannan, R.J. (2017, April). Multi-scale modeling of territorial dynamics of geospatial anthropogenic energy consumption. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 305 – 311.
84. Rai, A., & Kannan, R.J. (2017, April). Internet of things-based multisensor non-invasive technology for robust monitoring of tunneling infrastructure. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 312 – 316.
85. Rai, A., & Kannan, R.J. (2017, April). Virtual farmer: controlling phytochrome signaling in plants through cyber-physical system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 317 – 320.
86. Rai, A., & Kannan, R.J. (2017, April). A development of von neumann machines with artificial neuro-GLIA network. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 394 – 398.
87. Rai, A., & Kannan, R.J. (2017, April). Simulating drug-target interaction using large scale molecular dynamics and fuzzy ART. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 399 – 401.
88. Rai, A., & Kannan, R.J. (2017, April). Mathematical architecture of micro-services for geographic information system based health management system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 402 – 405.
89. Rai, A., & Kannan, R.J. (2017, April). A review on machine learning algorithms on human action recognition. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 406 – 416.
90. Rai, A., & Kannan, R.J. (2017, April). Prediction of chronic bacterial infection by identification of inter cellular responses of genetic fusion centers. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 417 – 419.
91. Rai, A., & Kannan, R.J. (2017, April). Mathematical modeling of feedback control of gravitational waves. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 420 – 426.
92. Rai, A., & Kannan, R.J. (2017, April). Modeling and dynamics of puzzling space probes anomalies in space engineering. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 427 – 430.

93. Rai, A., & Kannan, R.J. (2017, April). Computational technique for modeling and clustering of feedback control in galaxies using gravitational thermodynamics. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 431 – 436.
94. Rai, A., & Kannan, R.J. (2017, April). Energy aware zone routing protocol for MANET. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 437 – 440.
95. Rai, A., & Kannan, R.J. (2017, April). Advanced encryption and extended authentication for wireless LAN. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 441 – 444.
96. Gayathri, M., & Kannan, R.J. (2017, April). Layered architecture toward mining ayurvedic facts. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 506 – 510.
97. Kumar, P.J. S., & Kannan, R.J. (2017, July). Symptoms based predict treatment medicine suggestion system using data mining techniques. Journal of Advanced Research in Dynamical & Control Systems, 1(6), 2012 – 2022.
98. Padmanaban. K., & Kannan, R.J. (2017). Enhanced Three Layer Energy Efficient Clustering (ETLEEC) algorithms for wireless sensor networks. Indian Journal of Public Health Research & Development, 8(3S), 225 – 229.
99. Velmurugan, A.K., & Kannan, R.J. (2017). Sleep scheduling for energy efficient load balance routing in heterogeneous wireless sensor network. Indian Journal of Public Health Research & Development, 8(3S), 236 – 241.
100. Jaya, R., Pillai, C.S., & R Kannan, R.J. (2017, December). Ontology based optimization with adaptive network based fuzzy inference system based health maintenance system. International Journal of Current Research and Review, 9(23), 32 -40.
101. Rani, S.U., & Neelanarayanan, V. (2017). A Review of patient –controlled analgesia infusion system. Asian Journal of Pharmaceutical and Clinical Research, 10(1), 117-121.
102. Sarobin, M.V., Kumar, B., & Lakshmidevi, K.R. (2017, April). Genetic algorithm-based clustering of wireless sensor network with novel data encryption. Asian Journal of Pharmaceutical and Clinical Research, Advances in Smart Computing and Bioinformatics, 10(13), 94-96.
103. Prassanna, J., Anjali, P., & Neelanarayanan, V. (2017). A review of existing cloud automation tools. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 471-473.
104. Manickavasagam, P., & Surwade, S.S. (2017, April). Cognitive, affective and conative model for analyzing higher education students. Advances in Smart Computing and Bioinformatics, Asian Journal of Pharmaceutical and Clinical Research, 1(1), 133-136.
105. Priyaadharshini, M., & Sundaram, B. V. (2017). Lifelong learning: analyzing behavioral models using cloud based flipped classroom. Journal of Computational and Theoretical Nanoscience, 14(1), 5770 – 5779.
106. Maheswari, R., Pattabiraman, V., & Sharmila, P. (2017). Reconfigurable FPGA based soft-core processor for SIMD applications. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 180-186.
107. Maheswari, R., & Pattabiraman, V. (2017). Improved reconfigurable hyper-pipeline soft-core processor on FPGA for SIMD. International Journal of High Performance Computing and Networking, 10(3), 207-217.
108. Vedika, B., & Quadir, M.A. (2017). Cryptographic techniques for secure key management in personnel cloud. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 369-72.
109. Pavithra, L., & Rekha, D. (2017, April). Internet of things – survey on research challenges. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 464-6.
110. Darisini, P.S., & Kumar, T.S.P., & Kumar, R. (2017). A survey on object tracking in wireless sensor networks for machine tool applications. International Journal of Mechanical Engineering and Technology, 8(12), 21–30.
111. Kumar, T.S.P., & Chitnis, S. (2017). Distance and hop based energy estimation in wireless sensor networks. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 85–89.
112. Rivankar, A., & Anusooya, G. (2017). Energy efficient load balancing for cloud data center. Asian Journal of Pharmaceutical and Clinical Research, 10(1),162-165.
113. Rani. S.U., & Neelanarayanan. V. (2017). A Review on patient-controlled analgesia infusion system. Asian Journal of Pharmaceutical and Clinical Research, 10(1), 117-121.
114. Rani. S.U., Ignatious, A., Hari, B. V. & Balavishnu, V. J. (2017). IoT patient health monitoring system. Indian Journal of Public Health Research & Development, 8( 4), 1329-1334.
115. Panjanathan, R., & Ramachandran, G. (2017). Enhanced low latency queuing algorithm with active queue management for multimedia applications in wireless networks, International Journal of High Performance Computing and Networking, 10(1-2), 23-33.
116. Rukmani, P., & Ganesan, R. (2017). Adaptive modified low latency queuing algorithm for real time traffic in WIMAX networks, Journal of Engineering Science and Technology, 12(9), 2551-2566.
117. V, K. D., and G. R. (2017, April). A generic trust management framework for heterogeneous sensors in cyber physical systems, Asian Journal of Pharmaceutical and Clinical Research, 10(13), 176-179.
118. Nisha, V.M., & Sajidha, S.A. (2017). Simulation of non deterministic cellular automata by boolean circuits. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 8(1), 77-81.
119. Sasank, S., Nisha, V. M., Sajidha S. A., & Kumar, G.B. (2017). Urban growth modelling using cellular automata based classifier. International Journal of Civil Engineering and Technology, 8(12), 302-308.
120. Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(14), 2764-2777.
121. Anusha, K., & Sathiyamoorthy, E. (2017). MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network. International Journal of Information and Computer Security, 9(4), 361-386.
122. Anusha, K., & Sathiyamoorthy, E. (2017). A new trust-based mechanism for detecting intrusions in MANET. Information Security Journal, 26(4), 153-165.
123. Asha, S. (2017). An improved sleep detection and driver alert system using biometrics. Indian Journal of Public Health Research & Development, 8(4), 1307-1311.
124. Loganathan, S., Saravanan, R. D., & Mukherjee, S. (2017). Energy aware resource management and job scheduling in cloud datacenter. International Journal of Intelligent Engineering and Systems, 10(4), 175-184.
125. Saravanan, R. D., Loganathan, S., Shunmuganathan, S., & Palanichamy, Y. (2017). Suspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service Attacks. International Journal of Intelligent Engineering & Systems, 10(4), 147-156.
126. Fernandez, J. J., Pandian, N., Chavali, R., & Appalaghe, A. K. (2017). A novel image theft identification using biometric feature. Asian Journal of pharmaceutical and clinical research, special issue-April, 385-389.
127. Sudhakar, K., & Nithyanandam, P. (2017). An accurate facial component detection using Gabor filter. Bulletin of Electrical Engineering and Informatics, 6(3), 287-294.
128. Karmel, A. (2017). Multi-Level privacy preservation and transmission of medical records using cryptographic technique. International Journal of Applied Engineering Research, 12(17), 6735-6740.
129. A Karmel. (2017). Review of particle swarm optimization for energy management in mobile Ad Hoc networks, Journal of Engineering and Applied Sciences, 12 (22), 2017, 6042-6044
130. M Sasikomala, M., & Mayilvahanan, P. (2017). An empirical study of accident reportin data mining techniques. International Journal of Pure and Applied Mathematics, 116(24), 35-42.
131. Thiyagarajan, D., & Ganesan, R. (2017). Cryptographically imposed model for efficient multiple keyword-based search over encrypted data in cloud by secure index using bloom filter and false random bit generator. IJ Network Security, 19(3), 413-420.
132. Thiyagarajan, D., & Ganesan, R. (2017). User verifiable multiple keyword search scheme using the merkle tree for outsourced data in the cloud. International Journal Of Technology, 8(4), 591-600.
133. Bhargavi, R., Gumparthi, S. & Anith, R. (2017). Relative strength index for developing effective trading strategies in constructing optimal portfolio. International Journal of Applied Engineering Research, 12(19), 8926-8936.
134. Sriraman, H., & Venkatasubbu, P. (2017). On the field design bug tolerance on a multi-core processor using FPGA. International Journal of High Performance Computing and Networking, 10(1-2), 34-43.
135. Remesh, R. & Pattabiraman, V. (2017). A survey on the cures for the curse of dimensionality in big data. Asian Journal of Pharmaceutical and Clinical Research ,Special issue in Advances in Smart Computing and Bioinformatics, 1(1), 354-360.
136. Vignesh, U., & Parvathi, R. (2017). Clustering on structured proteins with filtering instances on Bioweka. J Eng Sci Technol, 12, 820-833.
137. Joshika., &Parvathi, R. (2017). A survey on business facilities analysis. Asian Journal of Pharamacutical and clinical research, 1(4),15-19.
138. Verghese, M. S., & Parvathi, R. (2017). A survey on usage analytics for imaging diagnostic equipments. Asian Journal of Pharmaceutical and clinical research, 1(4),c457-460.
139. Kamatchi, B., & Parvathi, R. (2017). Feature selection and yield prediction of rice crop using Ann. Journal of Advanced Research in Dynamical and Control Systems, 9(12), 546-553.
140. Priya, R,V. & Muralidhar, A. (2017). Facial emotion recognition using eye. International Journal of Applied Engineering Research , 12(16), 5655-5659.
141. Ilakiyaselvan, N., Abraham, J. V. T., & Muralidhar, A. (2017). Real-time driver fatigue or drowsiness detection system using face image stream. International Journal of Civil Engineering & Technology, 8 (1), 793-802.
142. Ashish, M., Kumar, S., & Muralidhar, A. (2017). Employee performance appraisal system based on ranking and reviews. Entropy, 1, 1.
143. Muralidhar, A., & Pattabiraman, V. (2017). Tabu search based fast high utility item set mining. Journal of Advanced Research in Dynamical and control Systems, 1(18), 3152 – 3164.
144. Kumar, J, S. & Maheswari, N. (2017), A survey on privacy preserving techniques for social network data’ Asian Journal of Pharmaceutical and Clinical Research,10(13), 112.
145. Jaganathan, S.K., & Maheswari, N. (2017). A survey on privacy-preserving techniques for social network data. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 112-116.
146. Sariki, T.P., & Manusmare, R.P.(2017). Xtreams toolkit ui development on microsoft WPF technology. Asian Journal of Pharmaceutical and Clinical Research, 10(13),449-452.
147. Ragala, R., & Venkataraman, R. (2017). A survey on churn analysis and prediction in video on demand. Asian Journal of Pharmaceutical and Clinical Research, 10(1S), 158-161.
148. En, P., & Kumar, B.G. (2017). Diabetic retinopathy image classification using deep neural network. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 461-463.
149. Pradeep, K.V., & Tudu, B.P. (2017). Secure and recoverable model to manage keys for cloud storage. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 109-111.
150. Manindra, T., & Pradeep. K.V. (2017, April). data compression technique for cloud storage in multi-user environments. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 82-84.
151. Pradeep.K.V., & Rakesh, T. (2017, April). Secure and recoverable split key management technique for cloud storage. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 109-111.
152. Shrivastava, P., & Kumar, G.B. (2017). Working of acontext-aware conversational entity. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 202-206.
153. Rajendran, V., & Kumar, G.B. (2017). Prosody prediction for tamil text-to-speech synthesizer using sentiment analysis. Asian Journal of Pharmaceutical and Clinical Research, 10(13),6-9.
154. SR, D., & V. Vijayakumar. (2017). A review on security enhancement through anonymous routing in manet”. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 166-170,
155. K, S., & V. Vijayakumar. (2017). Secured data aggregation methods in wireless sensor networks using homomorphic operation – a review. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 328-332.
156. Reshmi,TR., Anusha, K., Sumati, V., & Pandiyarajan, K.(2017,April) The IPv6 Resistance – A Survey, Asian Journal of Pharmaceutical and Clinical Research, 10(13),321-323.
157. Srivastav, A., & Chauhan, A. (2017). Social network data retrieval using semantic technology. Asian Journal of Pharmaceutical and Clinical Research, 10(13), 31- 35

158. Elavenil S, Jenila Livingston L.M. & K. Parameswari. (2017). Case Study on Illegal Sand Mining in Tamil Nadu: Alternate Solution by Replacing Natural Sand by M-Sand. International Journal of Mechanical and Production Engineering Research and Development (IJMPERD); ISSN (P): 2249-6890; ISSN (E): 2249-8001; Vol. 7, Issue 6, pp 279-284.
159. Jaimin Maniyar & Jenila Livingston L.M. (2017, Apr). Personalized Virtual School Environment Using Classifier Algorithm and Semantic Advisor-Assisting Framework. Asian Journal of Pharmaceutical and Clinical Research, ISSN 0974-2441, pp 105-108.

160 Vijaylakshmi S., Priyadarshini J. “Breast cancer classification using RBF and BPN neural networks”, International Journal of Applied Engineering Research, Volume 12, Number 15 (2017) pp. 4775-4781.
161. Maya RathnasabapathyGeetaAtkar, Priyadarshini J.“Review on Advanced Machine Learning Techniques for Solving Problem of Dyslexia in children” International Journal of Engineering Technology Science and Research, Volume: 4, Issue: 8 (2017), 663 – 666

162. Gorai, K. P., and T. Abraham. “A GAUSSIAN MIXTURE MODEL-BASED SPEAKER RECOGNITION SYSTEM”. Asian Journal of Pharmaceutical and Clinical Research, Vol. 10, no. 13, pp. 140-142, Apr 2017.

Year 2016

1. Prathilothamai, M., Devi, M.M., & Viswanathan, V. (2015). Identification of threat to public life by classifying NEWS RSS Feeds, International Journal of Applied Engineering Research, 10(13), 33859-33862.
2. Kumar, B.S., & Krishnamurthi, I. (2015). Capturing architecturally significant requirements using architect’s use case diagram. International Journal of Applied Engineering Research, 10(6), 13921-13943.
3. Sathis Kumar, B., & Krishnamuthi, I. (2015). CloudASR an android application for capturing architecturally significant requirements visually in cloud computing applications using platform as service. Int. J. Appl. Eng. Res, 10(5), 13505-13514.
4. Saleena, B., & Srivatsa, S.K. (2015). Concept similarity for cross ontology in adaptive e-learning systems. Journal of King Saud University–Computer and Information sciences, 27(1),1-12.
5. Koteswari, C., & Saleena, B. (2015). Context based ranking of web database based on user query search. International Journal of Applied Engineering and Research, 10(11), 29717-29724.
6. Maulik Parekh, D., & Saleena, B. (2015). Designing a cloud based framework for healthcare system and applying clustering techniques for region wise diagnosis. Procedia Computer Science, 50, 537-542.
7. Umamaheswari, E., & Ghosh, D.K. (2015, March). Radial basis function neural networks for software engineering measures –a survey. ARPN Journal of Engineering and Applied Sciences, 10(5), 2027-2032.
8. Umamaheswari, E., Ghosh, D.K. & Bhalaji, N. (2015, March). Evaluating metrics at class and method level for java programs using knowledge based systems. ARPN Journal of Engineering and Applied Sciences, 10(5), 2047-2052 .
9. Umamaheswari, E. (2015, September). Cloud testing vs. conventional software testing over a web service, International Journal of Scientific Research, 4(9). 583-586.
10. Maheswari, S., & Selwyn, J. (2015). Assessing the behaviour of web services using finite states. International Journal of Information Engineering and Electronic Business, 7(4), 31.
11. Balavignesh, G., Qumar, S.M., & Premalatha, M. (2015).Policy assessment system: a smart approach to assess national policies of developing countries. International Journal of Applied Engineering Research, 10(34), 27220-27225.
12. Mabel, V.H., & Selwyn, J. (2015, December). Performance assessment of 3-layered knowledgebase and representation models: an empirical study. International Journal of Knowledge Engineering and Data Mining, 3(4), 239-254.
13. Ramesh, P.R., & Selwyn, J. (2015, July). Chords suggestion algorithm using jusic distance for music knowledgebase. International Journal of Computer and Modern Technology, 2(2), 1.
14. Kharde, D. N., & Selwyn, J. (2015). A knowledge acquisition model using multi-agents for KaaS. International Journal of Computer and Information Engineering, 9(2), 521-525.
15. Singh, R. K., & Sivabalakrishnan, M. (2015). Feature selection of gene expression data for cancer classification: a review. Procedia Computer Science, 50(1), 52-57.
16. Merry, K. P., Singh, R. K., & Kumar, S. S. (2012). Apriori-hybrid algorithm as a tool for colon cancer microarray data classification. International Journal of Engineering Research and Development, 4(1), 53-57.
17. Bhargavi, R., & Gumparthi, S. (2015). Credit risk management model optimization using complex event processing. International Journal of Applied Engineering Research, 10(3), 6353-6362.
18. Hussain, S.H., Geetha, S., & Prabakar, M.A. (2015). Listing past, current, and upcoming research in ubiquitous computing – a review. International Journal of Applied Engineering Research, 10(55), 2142-2145.
19. Sivakumar, T.B., Geetha, S., & Prabakar, M.A. (2015). Role based access control policy in secure sharing healthcare data using multi cloud. International Journal of Applied Engineering Research, 10(55), 2302-2307.
20. Seema, S.S., Maheswari, M., Selvakumar, S., & Geetha, S. (2015). Reckoning trust in e-commerce by mining product reviews. International Journal of Applied Engineering Research, 10(55), 1875-1879.
21. Chitra, P.K.A., SA alias Balamurugan., & Geetha, S. (2015). Modeling and analysis of multi label classification algorithms. International Journal of Applied Engineering Research, 10(55), 1116-1121.
22. Nirmala, G., Geetha, S., & Selvakumar, S. (2015). Optimal long run cost path of mobile robot navigation using qlearning algorithm. International Journal of Applied Engineering Research, 10(9), 6867-6870.
23. Jasmine, G. S., & Pattabiraman, V. (2015). Hyperspectral image analysis using end member extraction algorithm. Int. J. Pure Appl. Math, 101, 809-829.
24. Gayathri, A. U., & Sivabalakrishnan, D. (2015, March). Face and foreground and background detection estimation using adaptive based algorithm in real time video’s, International Journal of Advanced Research in Computer and Communication Engineering, 4(3), 617-620.
25. Sivabalakrishnan, M., & Shanthi, K. (2015). Person Counting System Using EFV Segmentation and Fuzzy Logic. Procedia Computer Science, 50, 572-578.
26. Vignesh, R., & Sivabalakrishnan, M . (2015). a comparative study on blur families and their algorithmic applications methods to make an image restoration by image deblurring. International Journal of Scientific Progress and Research (IJSPR), 11(1), 8-11.
27. Sivagami, M., Revathi, T., & Jeganathan, L. (2015). Object detection with a hard shadow removal in a still image, International Journal of Applied Engineering and Research, 10(34), 27153-27157.
28. Malathi, G. (2015, July). Image fusion techniques for the assessment of multi-focus ultrasound placenta using quality metrics. International Journal of Applied Engineering Research, 10(12), 30761-30774.
29. Vijayalakshmi, A., & Kanna, B.R. (2015). Enhanced quality of service in visualizing the malaria data using cloud computing. ARPN Journal of Engineering and Applied Sciences, 10(5), 2061-2065.
30. Rajkumar, S., & Malathi, G. (2015). A novel approach for the recovery of de-focussed color images. International Journal on Recent Researches In Science ,Engineering & Technology, 5(3), 1.
31. Jackson, C., Vijayakumar, V., Subramaniyaswamy, V., & Anusooya, G. (2006). An insight on reputation based incentive scheme and throughput feedback routing in MANET’S. ARPN Journal of Engineering and Applied Sciences 10 (5), 1988-1992.
32. Rukmani, P., & Ganesan, R. (2015). Modified low latency queuing algorithm for real time applications in WIMAX networks. International Journal of Pure and Applied Mathematics, 101(5), 915-924.
33. Chauhan, A., Vijayakumar, V., Vincent, R., & Pradeep, K. V. (2015). Towards the Development of a Framework for Socially Responsible Software by Analyzing Social Media Big Data on Cloud Through Ontological Engineering. Procedia Computer Science, 50(1), 524-530.
34. Vetrivelan, P., Maharajan, S. S., Narayanasamy, P., Koushik, C. P., Ratheesh, R., & Kumar, T. P. (2015). Vertical handover and video streaming over cloud in 4g heterogeneous overlay wireless networks. International Journal of Engineering and Technology (IJET), 7(5). 1537-1547.
35. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Hybrid cloud for educational sector. Procedia Computer Science, 50, 37-41.
36. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Era of cloud computing: a new insight to hybrid cloud. Procedia Computer Science, 50, 42-51.
37. Maheswari, R., & Pattabiraman, V. (2015). Performance analysis of reconfigurable open soft core processor-or1200 with global hazard controller. International Journal of Pure and Applied Mathematics, 101(5), 849-858.
38. Priyaadharshini, M., & Sundaram, B.V. (2015). Teaching and Learning as a Service (TLaaS). International Journal of Applied Engineering Research, 10(34), 27183-27188.
39. Sarobin, M. V. R., & Ganesan, R. (2015). Swarm intelligence in wireless sensor networks: a survey. Int. J. Pure Appl. Math, 101(5), 773-807.
40. Prassanna, J., Punitha, K., & Neelanarayanan, V. (2015). Towards an Analysis of Data Accountability and Auditing for Secure Cloud Data Storage. Procedia Computer Science, 50(1), 543-550.
41. Vijaya, A., & Neelanarayanan, V. (2015). A model driven framework for portable cloud services: Proof of concept implementation. International Journal of Education and Management Engineering, 5(4), 27.
42. Rani. S.U., & Neelanarayanan V. (2015). Interoperable framework solutions to ICU health care monitoring. ICTACT Journal on Communication Technology, 6(1),1072-1079.
43. Karthikeyan, G.K., Jayachandran, J., & Neelanarayanan, V. (2015). Energy aware network scheduling for a data center. International Journal of Big Data Intelligence, Special Issue on: Big Data and Cloud Computing Challenges, 2(1), 37-44.
44. Kempanna, M., & Kannan, R. J. (2015). Anfis Based Multilayered Botnet Detection with Traffic Reduction Technique. Middle-East Journal of Scientific Research, 23(3), 426-431.
45. Shiny, X. A., & Kannan, R. J. (2015). Energy Efficient Clustering Protocol using Self Organizing Map in MANET. Indian Journal of Science and Technology, 8(28), 1.
46. Shiny, X.S.A., & Kannan, R.J. (2015). A novel multicast routing protocol based on SOM to minimize energy consumption in MANETs. International Journal of Applied Engineering Research (IJAER), 10(19), 39885-39890.
47. Arumugam, S., Jayaram, B., & Thulasiraman, K. (2015). Independent dominator sequence number of a graph. Procedia Computer Science, 74, 43-46.
48. Vignesh, U., & Asha, S. (2015). Modifying security policies towards BYOD. Procedia Computer Science, 50, 511-516.
49. Devi, T., & Ganesan, R. (2015). Platform-as-a-Service (PaaS): model and security issues. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 151-161.
50. Devi, T., & Ganesan, R. (2015). Present, past and future challenges in cloud computing, International Journal of Applied Engineering Research, 10(44), 30735-30739.
51. Thiyagarajan, D., & Ganesan, R. (2015). Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (SHA-3) in Cloud Computing. International Journal of Technology, 3, 327-335.
52. Suresh, K., & Pattabiraman, V. (2015), Investigation on ARM algorithm with incremental mining and proposing a new algorithm for streaming dataset”, Australian Journal of Basic and Applied Sciences, 9(6), 72-76.
53. Suresh, K., & Pattabiraman, V. (2015). An Improved Utility Itemsets Mining With Respect To Positive And Negative Values Using Mathematical Model. International Journal of Pure and Applied Mathematics, 101(5), 763-772.
54. Muralidhar, A., & Pattabiraman, V. (2015). An efficient association rule based clustering of XML documents. Procedia Computer Science, 50, 401-407.
55. Harini, S., & Pattabiraman, V. (2015). Hybrid multi-core Asic architecture with FPGA for self-repairing of hard faults. Int. J. Pure Appl. Math, 101(8), 905-914.
56. Rosaline, R. A. A., & Parvathi, R. (2010). Performance analysis of various text classification algorithms. Int. J. Pure Appl. Math, 101(5), 625-634.
57. Rekha, J. H., & Parvathi, R. (2015). Survey on software project risks and big data analytics. Procedia Computer Science, 50, 295-300.
58. Mary, S,A., & Suganya, G. (2015). Requirements prioritization – stakeholder identification and participation. International Journal of Applied Engineering Research, 10(34), 27230-27233.
59. Kumar, J.S., & Maheswari, N. (2015), A framework for security in data mining using intelligent agents. ARPN Journal of Engineering and Applied Sciences, 10(6), 2551–2560.
60. Maheswari N. & Kumar, J. S. (2015). A framework for security in data mining using intelligent agents. ARPN Journal of Engineering and Applied Sciences,10(6),1.
61. Chauhan, A., Vijayakumar, V., & Ragala, R. (2015). Towards a Multi-level Upper Ontology/foundation Ontology Framework as Background Knowledge for Ontology Matching Problem. Procedia Computer Science, 50, 631-634.
62. Nujella, S., & Pradeep, K. V. (2015). Supervisory service for cloud infrastructure and services. International Journal of Applied Engineering Research,10(55), 2866-2870.
63. Rajendran, V., & Kumar, G. B. (2015). Text processing for developing unrestricted Tamil text to speech synthesis system. Indian Journal of Science and Technology, 8(29), 112-124.
64. Kumar, B. (2015). An encyclopedic overview of big data analytics. International Journal of Applied Engineering Research,10(3), 5681-5705.
65. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.
66. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.
67. Va, S., Rb, L., Vc, V., & Vd, I. (2015). Automated message filtering system in online social network. Procedia Computer Science, 50, 466-475.
68. Jackson, J. C., Vijayakumar, V., Quadir, M. A., & Bharathi, C. (2015). Survey on programming models and environments for cluster, cloud, and grid computing that defends big data. Procedia Computer Science, 50, 517-523.
69. Bharathi, C., Vijayakumar, V., & Pradeep, K. V. (2015). An extended trust management scheme for location based real-time service composition in secure cloud computing. Procedia Computer Science, 50, 103-108.
70. Durgalakshmi, B., & Vijayakumar, V. (2015). Progonosis and modelling of breast cancer and its growth novel naïve bayes. Procedia Computer Science, 50, 551-553.
71. Pradeep, K. V., & Vijayakumar, V. (2015). Survey on the key management for securing the cloud. Procedia Computer Science, 50, 115-121.
72. Anitha, R., & Vijayakumar, V. (2015). Homomorphic Encryption Based Data Security on Federated Cloud Computing‖. ARPN Journal of Engineering and Applied Sciences, 10(5).

73. Satapathy A. & Jenila Livingston L.M. (2016). A Comprehensive Survey of Security Issues and Defense Framework for VoIP cloud. Indian Journal of Science and Technology, ISSN 0974-6846, Vol. 9, Issue 6, Pp-1-13.

74.  Raamakirtinan S. & Jenila Livingston L.M. (2016, March). Identifying Influential Users in Facebook – A Sentiment Based Approach. Indian Journal of Science and Technology, ISSN 0974-6846, Vol. 9, Issue 10, Pp-1-9.

75.  D.sudha and J. Priayadarshini“A Review on Multiple Vehicle Detection and Tracking in Dynamic Environment”, International Journal of Control Theory and Applications, pp 93-98, Volume: 9, Issue: 3, 2016.
76.  Vijaylakshmi S., Priyadarshini J. “An Analysis of Particle Swarm Optimization Technique for Breast Cancer Dataset”, International Journal of Control Theory and Applications, pp 297-308, Volume: 9, Issue: 3, 2016.

Year 2015

1. Prathilothamai, M., Devi, M.M., & Viswanathan, V. (2015). Identification of threat to public life by classifying NEWS RSS Feeds, International Journal of Applied Engineering Research, 10(13), 33859-33862.
2. Kumar, B.S., & Krishnamurthi, I. (2015). Capturing architecturally significant requirements using architect’s use case diagram. International Journal of Applied Engineering Research, 10(6), 13921-13943.
3. Sathis Kumar, B., & Krishnamuthi, I. (2015). CloudASR an android application for capturing architecturally significant requirements visually in cloud computing applications using platform as service. Int. J. Appl. Eng. Res, 10(5), 13505-13514.
4. Saleena, B., & Srivatsa, S.K. (2015). Concept similarity for cross ontology in adaptive e-learning systems. Journal of King Saud University–Computer and Information sciences, 27(1),1-12.
5. Koteswari, C., & Saleena, B. (2015). Context based ranking of web database based on user query search. International Journal of Applied Engineering and Research, 10(11), 29717-29724.
6. Maulik Parekh, D., & Saleena, B. (2015). Designing a cloud based framework for healthcare system and applying clustering techniques for region wise diagnosis. Procedia Computer Science, 50, 537-542.
7. Umamaheswari, E., & Ghosh, D.K. (2015, March). Radial basis function neural networks for software engineering measures –a survey. ARPN Journal of Engineering and Applied Sciences, 10(5), 2027-2032.
8. Umamaheswari, E., Ghosh, D.K. & Bhalaji, N. (2015, March). Evaluating metrics at class and method level for java programs using knowledge based systems. ARPN Journal of Engineering and Applied Sciences, 10(5), 2047-2052 .
9. Umamaheswari, E. (2015, September). Cloud testing vs. conventional software testing over a web service, International Journal of Scientific Research, 4(9). 583-586.
10. Maheswari, S., & Selwyn, J. (2015). Assessing the behaviour of web services using finite states. International Journal of Information Engineering and Electronic Business, 7(4), 31.
11. Balavignesh, G., Qumar, S.M., & Premalatha, M. (2015).Policy assessment system: a smart approach to assess national policies of developing countries. International Journal of Applied Engineering Research, 10(34), 27220-27225.
12. Mabel, V.H., & Selwyn, J. (2015, December). Performance assessment of 3-layered knowledgebase and representation models: an empirical study. International Journal of Knowledge Engineering and Data Mining, 3(4), 239-254.
13. Ramesh, P.R., & Selwyn, J. (2015, July). Chords suggestion algorithm using jusic distance for music knowledgebase. International Journal of Computer and Modern Technology, 2(2), 1.
14. Kharde, D. N., & Selwyn, J. (2015). A knowledge acquisition model using multi-agents for KaaS. International Journal of Computer and Information Engineering, 9(2), 521-525.
15. Singh, R. K., & Sivabalakrishnan, M. (2015). Feature selection of gene expression data for cancer classification: a review. Procedia Computer Science, 50(1), 52-57.
16. Merry, K. P., Singh, R. K., & Kumar, S. S. (2012). Apriori-hybrid algorithm as a tool for colon cancer microarray data classification. International Journal of Engineering Research and Development, 4(1), 53-57.
17. Bhargavi, R., & Gumparthi, S. (2015). Credit risk management model optimization using complex event processing. International Journal of Applied Engineering Research, 10(3), 6353-6362.
18. Hussain, S.H., Geetha, S., & Prabakar, M.A. (2015). Listing past, current, and upcoming research in ubiquitous computing – a review. International Journal of Applied Engineering Research, 10(55), 2142-2145.
19. Sivakumar, T.B., Geetha, S., & Prabakar, M.A. (2015). Role based access control policy in secure sharing healthcare data using multi cloud. International Journal of Applied Engineering Research, 10(55), 2302-2307.
20. Seema, S.S., Maheswari, M., Selvakumar, S., & Geetha, S. (2015). Reckoning trust in e-commerce by mining product reviews. International Journal of Applied Engineering Research, 10(55), 1875-1879.
21. Chitra, P.K.A., SA alias Balamurugan., & Geetha, S. (2015). Modeling and analysis of multi label classification algorithms. International Journal of Applied Engineering Research, 10(55), 1116-1121.
22. Nirmala, G., Geetha, S., & Selvakumar, S. (2015). Optimal long run cost path of mobile robot navigation using qlearning algorithm. International Journal of Applied Engineering Research, 10(9), 6867-6870.
23. Jasmine, G. S., & Pattabiraman, V. (2015). Hyperspectral image analysis using end member extraction algorithm. Int. J. Pure Appl. Math, 101, 809-829.
24. Gayathri, A. U., & Sivabalakrishnan, D. (2015, March). Face and foreground and background detection estimation using adaptive based algorithm in real time video’s, International Journal of Advanced Research in Computer and Communication Engineering, 4(3), 617-620.
25. Sivabalakrishnan, M., & Shanthi, K. (2015). Person Counting System Using EFV Segmentation and Fuzzy Logic. Procedia Computer Science, 50, 572-578.
26. Vignesh, R., & Sivabalakrishnan, M . (2015). a comparative study on blur families and their algorithmic applications methods to make an image restoration by image deblurring. International Journal of Scientific Progress and Research (IJSPR), 11(1), 8-11.
27. Sivagami, M., Revathi, T., & Jeganathan, L. (2015). Object detection with a hard shadow removal in a still image, International Journal of Applied Engineering and Research, 10(34), 27153-27157.
28. Malathi, G. (2015, July). Image fusion techniques for the assessment of multi-focus ultrasound placenta using quality metrics. International Journal of Applied Engineering Research, 10(12), 30761-30774.
29. Vijayalakshmi, A., & Kanna, B.R. (2015). Enhanced quality of service in visualizing the malaria data using cloud computing. ARPN Journal of Engineering and Applied Sciences, 10(5), 2061-2065.
30. Rajkumar, S., & Malathi, G. (2015). A novel approach for the recovery of de-focussed color images. International Journal on Recent Researches In Science ,Engineering & Technology, 5(3), 1.
31. Jackson, C., Vijayakumar, V., Subramaniyaswamy, V., & Anusooya, G. (2006). An insight on reputation based incentive scheme and throughput feedback routing in MANET’S. ARPN Journal of Engineering and Applied Sciences 10 (5), 1988-1992.
32. Rukmani, P., & Ganesan, R. (2015). Modified low latency queuing algorithm for real time applications in WIMAX networks. International Journal of Pure and Applied Mathematics, 101(5), 915-924.
33. Chauhan, A., Vijayakumar, V., Vincent, R., & Pradeep, K. V. (2015). Towards the Development of a Framework for Socially Responsible Software by Analyzing Social Media Big Data on Cloud Through Ontological Engineering. Procedia Computer Science, 50(1), 524-530.
34. Vetrivelan, P., Maharajan, S. S., Narayanasamy, P., Koushik, C. P., Ratheesh, R., & Kumar, T. P. (2015). Vertical handover and video streaming over cloud in 4g heterogeneous overlay wireless networks. International Journal of Engineering and Technology (IJET), 7(5). 1537-1547.
35. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Hybrid cloud for educational sector. Procedia Computer Science, 50, 37-41.
36. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Era of cloud computing: a new insight to hybrid cloud. Procedia Computer Science, 50, 42-51.
37. Maheswari, R., & Pattabiraman, V. (2015). Performance analysis of reconfigurable open soft core processor-or1200 with global hazard controller. International Journal of Pure and Applied Mathematics, 101(5), 849-858.
38. Priyaadharshini, M., & Sundaram, B.V. (2015). Teaching and Learning as a Service (TLaaS). International Journal of Applied Engineering Research, 10(34), 27183-27188.
39. Sarobin, M. V. R., & Ganesan, R. (2015). Swarm intelligence in wireless sensor networks: a survey. Int. J. Pure Appl. Math, 101(5), 773-807.
40. Prassanna, J., Punitha, K., & Neelanarayanan, V. (2015). Towards an Analysis of Data Accountability and Auditing for Secure Cloud Data Storage. Procedia Computer Science, 50(1), 543-550.
41. Vijaya, A., & Neelanarayanan, V. (2015). A model driven framework for portable cloud services: Proof of concept implementation. International Journal of Education and Management Engineering, 5(4), 27.
42. Rani. S.U., & Neelanarayanan V. (2015). Interoperable framework solutions to ICU health care monitoring. ICTACT Journal on Communication Technology, 6(1),1072-1079.
43. Karthikeyan, G.K., Jayachandran, J., & Neelanarayanan, V. (2015). Energy aware network scheduling for a data center. International Journal of Big Data Intelligence, Special Issue on: Big Data and Cloud Computing Challenges, 2(1), 37-44.
44. Kempanna, M., & Kannan, R. J. (2015). Anfis Based Multilayered Botnet Detection with Traffic Reduction Technique. Middle-East Journal of Scientific Research, 23(3), 426-431.
45. Shiny, X. A., & Kannan, R. J. (2015). Energy Efficient Clustering Protocol using Self Organizing Map in MANET. Indian Journal of Science and Technology, 8(28), 1.
46. Shiny, X.S.A., & Kannan, R.J. (2015). A novel multicast routing protocol based on SOM to minimize energy consumption in MANETs. International Journal of Applied Engineering Research (IJAER), 10(19), 39885-39890.
47. Arumugam, S., Jayaram, B., & Thulasiraman, K. (2015). Independent dominator sequence number of a graph. Procedia Computer Science, 74, 43-46.
48. Vignesh, U., & Asha, S. (2015). Modifying security policies towards BYOD. Procedia Computer Science, 50, 511-516.
49. Devi, T., & Ganesan, R. (2015). Platform-as-a-Service (PaaS): model and security issues. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 151-161.
50. Devi, T., & Ganesan, R. (2015). Present, past and future challenges in cloud computing, International Journal of Applied Engineering Research, 10(44), 30735-30739.
51. Thiyagarajan, D., & Ganesan, R. (2015). Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (SHA-3) in Cloud Computing. International Journal of Technology, 3, 327-335.
52. Suresh, K., & Pattabiraman, V. (2015), Investigation on ARM algorithm with incremental mining and proposing a new algorithm for streaming dataset”, Australian Journal of Basic and Applied Sciences, 9(6), 72-76.
53. Suresh, K., & Pattabiraman, V. (2015). An Improved Utility Itemsets Mining With Respect To Positive And Negative Values Using Mathematical Model. International Journal of Pure and Applied Mathematics, 101(5), 763-772.
54. Muralidhar, A., & Pattabiraman, V. (2015). An efficient association rule based clustering of XML documents. Procedia Computer Science, 50, 401-407.
55. Harini, S., & Pattabiraman, V. (2015). Hybrid multi-core Asic architecture with FPGA for self-repairing of hard faults. Int. J. Pure Appl. Math, 101(8), 905-914.
56. Rosaline, R. A. A., & Parvathi, R. (2010). Performance analysis of various text classification algorithms. Int. J. Pure Appl. Math, 101(5), 625-634.
57. Rekha, J. H., & Parvathi, R. (2015). Survey on software project risks and big data analytics. Procedia Computer Science, 50, 295-300.
58. Mary, S,A., & Suganya, G. (2015). Requirements prioritization – stakeholder identification and participation. International Journal of Applied Engineering Research, 10(34), 27230-27233.
59. Kumar, J.S., & Maheswari, N. (2015), A framework for security in data mining using intelligent agents. ARPN Journal of Engineering and Applied Sciences, 10(6), 2551–2560.
60. Maheswari N. & Kumar, J. S. (2015). A framework for security in data mining using intelligent agents. ARPN Journal of Engineering and Applied Sciences,10(6),1.
61. Chauhan, A., Vijayakumar, V., & Ragala, R. (2015). Towards a Multi-level Upper Ontology/foundation Ontology Framework as Background Knowledge for Ontology Matching Problem. Procedia Computer Science, 50, 631-634.
62. Nujella, S., & Pradeep, K. V. (2015). Supervisory service for cloud infrastructure and services. International Journal of Applied Engineering Research,10(55), 2866-2870.
63. Rajendran, V., & Kumar, G. B. (2015). Text processing for developing unrestricted Tamil text to speech synthesis system. Indian Journal of Science and Technology, 8(29), 112-124.
64. Kumar, B. (2015). An encyclopedic overview of big data analytics. International Journal of Applied Engineering Research,10(3), 5681-5705.
65. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.
66. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.
67. Va, S., Rb, L., Vc, V., & Vd, I. (2015). Automated message filtering system in online social network. Procedia Computer Science, 50, 466-475.
68. Jackson, J. C., Vijayakumar, V., Quadir, M. A., & Bharathi, C. (2015). Survey on programming models and environments for cluster, cloud, and grid computing that defends big data. Procedia Computer Science, 50, 517-523.
69. Bharathi, C., Vijayakumar, V., & Pradeep, K. V. (2015). An extended trust management scheme for location based real-time service composition in secure cloud computing. Procedia Computer Science, 50, 103-108.
70. Durgalakshmi, B., & Vijayakumar, V. (2015). Progonosis and modelling of breast cancer and its growth novel naïve bayes. Procedia Computer Science, 50, 551-553.
71. Pradeep, K. V., & Vijayakumar, V. (2015). Survey on the key management for securing the cloud. Procedia Computer Science, 50, 115-121.
72. Anitha, R., & Vijayakumar, V. (2015). Homomorphic Encryption Based Data Security on Federated Cloud Computing‖. ARPN Journal of Engineering and Applied Sciences, 10(5).

73. Senjaliya Mudra & Jenila Livingston L.M. (2015, June). Automatize Content Personalization by Agents in Digital Learning of Java Course. International Journal of Applied Engineering Research, ISSN 0973-4562, Vol.10, Issue 9, Pp- 23063-23071.
74. D.sudha and J. Priayadarshini“Intelligent Multiple Vehicular Detection and Tracking Using Haar and Filtering Techniques in Dynamic Environment with Occlusion Handling and Collision Avoidance” , International Journal of Applied Engineering Research, Vol.10, No. 20, 2015.

75. Vijaylakshmi S., Priyadarshini J. “Big Data Analysis Based on Mathematical model: A Comprehensive Survey”, ARPN Journal of Engineering and Applied Sciences, Vol.10, No.5, March 2015.

76. D.sudha and J. Priyadarshini“Reducing semantic gap in video retrieval with fusion: A Survey”, 2 nd International Symposium on Big Data and Cloud computing (ISBCC’15), Elsevier Procedia Computer Science 50(2015) 496-502.

77. D.sudha and J. S Vennila, J Priyadarshini”Scalable Privacy Preservation in Big Data: A Survey”, 2 nd International Symposium on Big Data and Cloud computing (ISBCC’15), Elsevier Procedia Computer Science 50(2015) 369-373.

78. Priyadarshini J Aravind B, Ajay S“Virtualizing Electrical Appliances and Gadgets Input with Human Gestures”, 2 nd International Symposium on Big Data and Cloud computing (ISBCC’15), Elsevier Procedia Computer Science 50(2015) 503-510.

79. D.sudha and J. Priayadarshini“Intelligent Multiple Vehicular Detection and Tracking Using Haar and Filtering Techniques in Dynamic Environment with Occlusion Handling and Collision Avoidance”, International Journal of Applied Engineering Research, pp 41570-41574, Volume: 10, Issue: 20, 2015.

Year 2014

1. R. Jagadeesh Kannan, M.Kempanna, (2014). A Back Propagation Based Botnet Detection Algorithm for Enhanced Network Security. Journal of Theoretical and Applied Information Technology, 65(2), 499- 503.
2. Saleena, B., & Srivatsa, S. K. (2014). An automated approach to extract domain ontology for an e-learning system. International journal of innovation and learning, 15(3), 254-273.
3. Saleena, B., & Srivatsa, S. K. (2014). Designing a novel cross ontology measure to extract resources from knowledge base for an adaptive e–learning system. International Journal of Metadata, Semantics and Ontologies, 9(3), 193-203.
4. Poongodi, M., & Bose, S. (2014). A firegroup mechanism to provide intrusion detection and prevention system against DDoS attack in collaborative clustered networks. International Journal of Information Security and Privacy (IJISP), 8(2), 1-18.
5. Fathima, A. A., Vasuhi, S., Babu, N. T., Vaidehi, V., & Treesa, T. M. (2014). Fusion Framework for Multimodal Biometric Person Authentication System. IAENG International Journal of Computer Science, 41(1).
6. Ganapathy, K., Vaidehi, V., Kannan, B., & Murugan, H. (2014). Hierarchical particle swarm optimization with ortho-cyclic circles. Expert systems with applications, 41(7), 3460-3476.