School of Computer Science and Engineering

Research

Conference Publications

Year 2019

  •  Amit Kumar Tyagi, Deepti Goyal , “A Survey of Privacy Leakage and Security Vulnerabilities in the Internet of Things” , ICCES 2019 Confernce Coimbatore , 2019
  •  Amit Kumar Tyagi, Deepti Goyal , “Blockchain Technology – A New Technology for Creating Distributed and Trusted Computing Environment” , ICSCT 2019 Hyderabad , 2019
  •  Shubham Sharma, Anuja Negi, Shantanu Singh, Dinesh Samuel Sathia Raj, Graceline Jasmine S, Vaidehi V, Subramaniam Ganesan , “Eye state detection for use in advanced driver assistance systems” , International Conference on Recent Trends in Advance Computing (ICRTAC) , 2019
  • Benson Raj, L. Jani Anbarasi,Modigari Narendra,V. J. Subashini , “A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map” , The 7th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2019) , 2019
  • Aakash Kag, Jenila Livingston L.M., Merlin L.L.M. & Agnel Livingston L.G.X. , “Multiclass Single Label Model for Web page Classification” , IEEE International Conference on Recent Advances in Energy-Efficient Computing and Communication , 2019
  • Jayasudha, T.Subbulakshmi, “An Efficient Attribute Encryption for Secure Data Sharing and Storage in Public and Private Clouds-A Survey “, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue- 1C2, May 2019.
  • M.Jayasudha, T.Subbulakshmi, “A Comparative Study of Attribute-based Encryption of Electronic Health Records in Cloud”, Journal of Advanced Research in Dynamical & Control Systems, Vol. 11, 07-Special Issue, 2019.
  • Jenila Livingston L.M, Merlin L.L.M, Agnel Livingston L.G.X.& Annie Portia A , “Personalized Tutoring System for E-Learning” , IEEE International Conference on Recent Advances in Energy-Efficient Computing and Communication , 2019
  • Kanchana Devi V, Ganesan R , “Conditional Probabilistic Coefficient Based Selfish Node Identification in Cyber Physical Systems” , Wispnet-2019 , 2019
  • N Radha, A Shahina, A Nayeemulla Khan , “Improving Recognition of Speech System Using Multimodal Approach” , International Conference on Innovative Computing and Communications , 2019
  • Nivedita.M, Kaviya , “Image captioning Using Deep Learning” , International Conference on Recent Trends in Science and Management , 2019
  • Siva Kumar Seelam and Pattabiraman.V , “Acceleration of Hadoop MapReduce using in-memory Computing” , IEEE_International Conference on Recent Trends in Advanced Computing (ICRTAC-CPS 2018) , 2019
  • Geeeta Atkar, Priyadarshini J , “Enhancing readability of dyslexic children by machine learning technique -A survey” , Springer proceeding , 2019
  • Vaibhav Swaminathan, Shrey Arora, Ravi Bansal, Rajalakshmi R , “Autonomous Driving System with Road Sign Recognition using Convolutional Neural Networks” , International Conference on Computational Intelligence in Data Science , 2019
  • Jothi Prabha, A., & Bhargavi, R. , “Prediction of Dyslexia Using Machine Learning—A Research Travelogue” , Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems , 2019
  • Rishitha, Reshmi , “Security in Cloud Computing” , 2018 International Conference on Recent Trends in Advance Computing (ICRTAC) , 2019
  • Shyamala loganathan, Shubham Karande , “Prediction of Employee Turnover Using Ensemble Learning” , RACCCS 2018-Ambient Communications and Computer Systems, Springer , 2019
  • Mayank Murali, Bismita Sahoo, Akansha Maharana, Suganya G, Premalatha M , “Low Cost Air Sensing system” , International Conference on Computing and Communication Technologies , 2019
  • Vergin Raja Sarobin, Utsav Rai, Aman Saha , “ReachOut Smart Safety Device” , 6th International Conference on Wireless Networks & Embedded Systems , 2019

Year 2018

  •  E. Priyadharshini1, V. Vijayakumar1,*, M.D. Abdul Quadir1 , “Towards a cloud consumers credibility assessment and trust management of cloud services” , EAI Endorsed Transactions on Cloud Systems , 2018
  •  Narayanan, Manikandan; Kannan, Anusha; Ulaganathan, Senthilkumaran; Reddiar, Monesh , “Secured Key Management with Trusted Certificate Revocation in MANET” , Information Systems Design and Intelligent Applications, Springer , 2018
  •  Dhar, S., Gandhi, A., Ahuja, G., Anusooya, G , “Raspberry Pi based real time tracking system” , Proceedings of the International Conference on Inventive Computing and Informatics, ICICI 2017 , 2018
  • Asnath Victy Phamila Y and Kalaivani K (Research Scholar) , “Extraction of Surface Water feature using satellite derived indices to detect changes from times serie LandSat Imagery” , International conference on Emerging Trends in Engineering Research, organised by VISTA chennai and SIAM University, Bangkok , 2018
  • Asnath Victy Phamila Y and Suseela G (14PHD1186) , “Low Complex secured Image coding for Wireless Image Sensor Network with chaotic map” , International Conference on Current Trends in Data Science and Virtualization , 2018
  • Prof. Christy Jackson, Dr. V. Vijayakumar , “Taxonomy on Evolutionary computation for Vehicular Ad-hoc Networks” , International Conference on Mathematical Computer Engineering 2017 3-4 November, 2017 , 2018
  • Karthik.R.V, Sannasi Ganapathy, Arputharaj Kannan , “A Recommendation System for Online Purchase Using Feature and Product Ranking” , Proceedings of 2018 Eleventh International Conference on Contemporary Computing (IC3), 2-4 August, 2018, Noida, India , 2018
  • Balasubramanian Prabhu Kavin, Sannasi Ganapathy, Arputharaj Kannan , “An Intelligent Task Scheduling Approach for Cloud using IPSO and A* Search Algorithm” , Proceedings of 2018 Eleventh International Conference on Contemporary Computing (IC3), 2-4 August, 2018, Noida, India , 2018
  • S.Abhija Roseline, S.Geetha , “Intelligent Malware Detection using Oblique Random Forest Paradigm” , International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2018 , 2018
  • S.Geetha, Uma N.Dulhare, Siva S.Sivatha Sindhu , “Intrusion Detection using NBHoeffding Rule based Decision Tree for Wireless Sensor Networks” , Second IEEE International Conference on Advanced in Electronics, Computers and Communications – ICAECC 2018 , 2018
  • Modigari Narendra, M.L.Valarmathi and L. Jani Anbarasi , “A New Optimal 3D Mesh model watermarking based on Weber Law” , 1st International Symposium on Artificial Intelligence and Computer Vision , 2018
  • J. Jenifa Sharon,L. Jani Anbarasi,Dr. Benson Edwin Raj , “DPSO-FCM based segmentation and Classification of DCM and HCM Heart Diseases” , ITT 2018 Information Technology Trends -IEE Conference – Dubai , 2018
  • M. Jayasudha, Sai Riteesh, T.Subbulakshmi, “Asymmetric Key Encryption for file transfer in OpenNebula Private Cloud”, International conference on new trends in engineering and technology, Published in IEEE digital Xplore, vol 9, pg 561-567, 2018
  • M Jayasudha ; Shreya Rajiv Somkuwar ; Raj J Robin ; T Subbulakshmi , “Encrypted Packet Transfer with Enhanced Dijkstra’s Algorithm using Open Source tools ” , International Conference on Communication and Signal Processing (ICCSP) , 2018
  • Santosh & Jenila Livingston L.M. , “Two Level Filtering using High Band Pass and Winner Algorithms for Speech Enhancement” , International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017 , 2018
  • Krishnapriya, and Justus S , “KM Trajectory Schema Service Frame Work for Software Development Organizations” , TeLMISR 2018 , 2018
  • Muhmmad Al-khiza’ay 1( B ) , Noora Alallaq 1 , Qusay Alanoz 2 , Adil Al-Azzawi 3,4 , and N. Maheswari , “Personalize Review Selection Using PeRView” , International conference on knowledge,science,engineering and management , 2018
  • Durga Prasad Bollu 1 & Maheswari R , “Machine Learning Approach To Predict Remaining Life Span of Bearing ” , International conference on Mathematical Computer Engineering , 2018
  • Maheswari R, Sheeba Rani, Sharmila.P,s.Rajarao , “Personalized Secured API for Application Developer ” , 2nd International Conference on Smart Innovations in Communications and Computational Sciences , 2018
  • Abhisekh Kumar Singh & *Maheswari R , “Product Recommendation Based On Expiry Date Using Big Data Analytics” , International conference on Mathematical Computer Engineering , 2018
  • S.Maheswari U.Gudla , “Secure sharing of personal health records in Jelastic cloud by attribute based encryption” , International Conference on Advanced Computing and Communication Systems , 2018
  • Yashesh PANDYA, Józef SUCHY, Nagaraj S. V. , “Adaptative product manufacturing technique for foundry industry using IoT technology: an industry 4.0 initiative” , 73 WFC Kraków 2018 , 2018
  • Yashesh PANDYA, Józef SUCHY, Nagaraj S. V., Jagedeesh Kannan R. , “Product design and manufacturing in foundry industry using augmented virtual reality technology ” , 73 WFC Kraków 2018 , 2018
  • Deepali B. Gothawal and S.V.Nagaraj , “Review on routing performance matrices , tools, security attacks, and defence mechanisms in context of Internet of Things” , ICCUBEA 2018 , 2018
  • Deepali Gothawal and S.V.Nagaraj , “Security issues in IOT layers and its applications:: A review” , International Conference on Emerging Trends in Science Engg and Tech , 2018
  • N Radha, A Shahina, A Nayeemulla Khan , “A Study on Alternative Speech Sensor” , 2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP) , 2018
  • L. Jeganathan, A. N. Khan, J. Kannan Raju and S. Narayanasamy, , “On a Frame Work of Curriculum for Engineering Education 4.0” , 2018 World Engineering Education Forum – Global Engineering Deans Council (WEEF-GEDC) , 2018
  • M.Poongodi and Prithvisai , “UNDERWATER IMAGE INTENSIFICATION AND OBJECT RECOGNITION USING WCID ALGORITHM” , ICRTAC – CPS 2018 , 2018
  • Siddharth Dhar, Kaustubh Pandey, Premalatha M, Suganya G , “A Tree Based Approach to Improve Traditional Collision Avoidance Mechanisms of Hashing” , Proceedings of the International Conference on Inventive Computing and Informatics (ICICI 2017) IEEE Xplore Compliant – Part Number: CFP17L34-ART, ISBN: 978-1-5386-4031-9 , 2018
  • Reuben Varghese ; Smarita Sharma ; M Premalatha , “Transforming Auto-Encoder and Decoder Network for Pediatric Bone Image Segmentation” , ICIIBMS 2018, Track3: Bioinformatics, Medical Imaging, and Neuroscience, Bangkok, Thailand , 2018
  • Prateek Singh, Priyaadharshini M , “Large Scale Image Retrieval with Locality Sensitive Hashing” , International Conference on Inventive Computation Technologies (ICICT-2018) , 2018
  • R. Rajalakshmi and Chandrabose Aravindan , “”An Effective and Discriminative Feature Learning for URL Based Web Page Classification” , IEEE SMC 2018 – IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan , 2018
  • Dr. Reshmi TR , ” Advanced Computing and Intelligent Engineering” , ICACIE 2017 2nd International Conference on Advanced Computing and Intelligent Engineering , 2018
  • Rukmani P, Gunda Krishna Teja, M Sai Vinay, Bhanu Prakash Reddy K , “Industrial Monitoring Using Image Processing, IoT and Analyzing the Sensor Values Using Big Data” , International Conference on Robotics and Smart Manufacturing (RoSMa2018) , 2018
  • Kiruthika Devi B.S, Aravindhan K, P Srikanth Kini ,G Adarsh Reddy, Subbulakshmi T , “A Prediction Model for Flooded Packets in SNMP Networks” , IEEE International Conference on Intelligent Computing and Control Systems ICCS 2018 , 2018
  • Jayasudha M,Sai Riteesh, Subbulakshmi T , “Asymmetric Key Encryption for File Transfer in the Open Nebula Private Cloud” , IEEE International Conference on New Trends in Engineering and Technology ICNTET 2018 , 2018
  • Udayakumar N, Abhay Khera, Lakshya Suri, Chhavi Gupta, Subbulakshmi T , “Bandwidth Analysis of File Transfer Protocol” , IEEE International Conference on Communications and Signal Processing ICCSP 2018 , 2018
  • Kiruthika Devi B.S, Rishi Barath B, Abhishek L, Aravindhan S and Subbulakshmi T , “Classification of SNMP Network Dataset for DDoS attack prevention” , IEEE International Conference on New Trends in Engineering and Technology ICNTET 2018 , 2018
  • Kiruthika Devi B.S, Vatsal j. Saglani, Aayush V. Gupta ,Subbulakshmi T , “Classifying and Predicting DoS and DDoS Attacks on Cloud Services” , IEEE International conference on Trends in Electronics and Informatics ICOEI 2018 , 2018
  • Kiruthika Devi B.S, Abhijeet Gupta, Nikhil Sharma, Raghhuveer J and Subbulakshmi T , “Detection and Classification of Attacks on SNMP Network using Machine Learning” , IEEE International Conference on New Trends in Engineering and Technology ICNTET 2018 , 2018
  • Shashank Pathak, Ayush Sharma, Shashank Shekhar Shukla, Aayush Pandey, Kiruthika Devi B S and Udayakumar N and Subbulakshmi T , “Detection and Classification of DDoS Attack using Machine Learning Models with Real Time Generated Dataset” , IEEE International Conference on New Trends in Engineering and Technology ICNTET 2018 , 2018
  • M. Jayasudha, R. Raj, S. S. Rajiv and T. Subbulakshmi , “Encrypted Packet Transfer with Enhanced Dijkstra’s Algorithm using Open Source to” , IEEE International Conference on Communications and Signal Processing , 2018
  • Jayasudha M, Robin Raj, Somkuwar Shreya Rajiv, T Subbulakshmi , “Encrypted Packet Transfer with Enhanced Dijkstra’s Algorithm using Open Source tools” , IEEE International Conference on Communications and Signal Processing ICCSP 2018 , 2018
  • Subbulakshmi T, Suryansh Bhardwaj, Prakhar Ranjan and Kenneth Antony John , “Enhanced SPK Encryption Algorithm for File Encryption using Java” , IEEE International Conference on Intelligent Computing and Control Systems ICCS 2018 , 2018
  • Udayakumar N, Anandaselvi S and Subbulakshmi T , “Malware Analysis and Classification Using Support Vector Machines” , IEEE International Conference on New Trends in Engineering and Technology ICNTET 2018 , 2018
  • Udayakumar N, Vatsal j. Saglani, Aayush V. Gupta ,Subbulakshmi T , “Malware Classification Using Machine Learning Algorithms” , IEEE International conference on Trends in Electronics and Informatics ICOEI 2018 , 2018
  • Poorani .M, Vaidehi .V, Badri Narayanan .C.G, Bharathi .A, Sasidharan .J, Varalakshm , “Personalized Remote Health Monitoring Scheme (PRHMS) using Machine Learning and Genetic Algorithm, ” , World Summit on Advances in Science, Engineering and Technology (Cambridge Summit 2018), UK on January 4 – 6, 2018 , 2018

Year 2017

Year 2016

Year 2015

  • Rajesh Kanna and A. Vijayalakshmi Enhanced quality of service in visualizing the malaria data using cloud computing ARPN Journal of Engineering and Applied Sciences 10 5 2061-2065 1819-6608 (Online)
  • Tulasi Prasad, Suresh, Parvez Twitter Data Analytics by Using Machine Learning Techniques International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) 2 5 97-102 ISSN 2394-2320
  • Dr.R.Nandhini Cross-layer designed scheduling algorithm for QoS enhancement in Wireless Broadband networks International Journal of Applied Engineering Research 10 13 33191-33196 0973-4562
  • R. Anto Arockia Rosaline , R. Parvathi PERFORMANCE ANALYSIS OF VARIOUS TEXT CLASSIFICATION ALGORITHMS International Journal of Pure and Applied Mathematics 101 5 625-634 ISSN: 1311-8080 (printed version); ISSN: 1314-3395
  • Devi T and Ganesan R Present, Past and Future challenges in cloud computing International journal of applied engineering research 10 44
  • Devi T and Ganesan R DATA SECURITY MODEL EMPLOYING HYPERELLIPTIC CURVE CRYPTOGRAPHY (HECC) AND SECURE HASH ALGORITHM-3 (SHA-3) IN CLOUD COMPUTING International Journal of Technology 6 3 327-335 2086-9614
  • C. Angel, S. Asha A Survey on Ambient Intelligence in Agricultural Technology International Journal of Biological, Biomolecular, Agricultural, Food and Biotechnological Engineering 9 2
  • S RAJKUMAR and G MALATHI A Novel approach for the recovery of defocussed color Images International Journal on Recent Researches in Science, Engineering and Technology 3 5 2347-6729
  • Vijaylakshmi S. and Priyadarshini J. BIG DATA ANALYSIS BASED ON MATHEMATICAL MODEL: A COMPREHENSIVE SURVEY ARPN Journal of Engineering and Applied Sciences 10 5 2103-2107 ISSN 1819-6608
  • Vijaylakshmi S. and Priyadarshini J. Optimization in Big Data Using Swarm Intelligence : A Survey 2015 IEEE International Conference on Engineering and Technology 0 0
  • D.Sudha a, J.Priyadarshini b Reducing Semantic Gap in Video Retrieval with Fusion: A survey Elsevier procedia computer science 50 0 496-502
  • D.Sudha, J.Priyadarshini Histology Based Image Retrieval in Multifeature Spaces International Journal of Innovative Technology and Exploring Engineering 3 9
  • Vennila . S, Priyadarshini . J Scalable Privacy Preservation in Big Data A Survey elsevier procedia computer science 50 0
  • Aravind B, Ajay S, Priyadarshini J virtualizing electrical appliances and gadgets input with human gestures elsevier procedia computer science 50 0
  • Dr.Umamaheswari.E Cloud Testing Vs. Conventional Software Testing Over a Web Service (Pbc -Product’s Bio-Data in A Click) International Journal of Scientific Research 4 9 583-586 22778179
  • S.Rajkumar, G.Malathi A Novel approach for the recovery of de-focussed color Images Internation Journal on Recent Researches in Science Engineering and Technology 3 5 2347 – 6729
  • M.Prathilothamai,M. Meena Devii , V.Viswanathan Identification of threat to public life by classifying NEWS RSS Feeds International Journal of Applied Engineering Research 10 13 33859-33862 0973-4562
  • Dr. P. Sandhya, G. Krishna Kanth Sensor Network Accessing Cloud Services for Data Collection and Sharing Using Arduino Yun International Journal of Scientific Research 4 9 51-54 2277-8179
  • R .Vishnu Priya A Single Scan Prefix-Tree Construction Approach For Maximal Pattern Mining International Journal of Applied Engineering Research 10 17 0973-4562
  • Dr. M. Janaki Meena and Dr. S. P. Syed Ibrahim Statistical and Evolutionary Feature Selection Techniques Parallelized using MapReduce Programming Model Springer book on Evolutionary Algorithms to handle Big Data 17 1 159-180 2197-6503
  • Vignesh.U, Asha.S Modifying security policies towards BYOD 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) 50 0
  • Elumalai Gokulakrishnan, Seshasayanam Asha Subspace Based Face Recognition using Clustering IJCSN International Journal of Computer Science and Network, Volume 3, Issue 5, October 2014 3 5
  • G.Malathi Image Fusion Techniques for the Assessment of Multi-focus Ultrasound Placenta using Quality Metrics International Journal of Applied Engineering Research 10 12 30761-30774 0973-4562
  • K. Suresh and V. Pattabiraman AN IMPROVED UTILITY ITEMSETS MINING WITH RESPECT TO POSITIVE AND NEGATIVE VALUES USING MATHEMATICAL MODEL International Journal of Pure and Applied Mathematics 101 5 763-772 1311-8080
  • Koteswari C. and Saleena B. Context Based Ranking of Web Database Based on User Query Search International journal of applied engineering and research 10 11 ISSN 0973 – 4562
  • S.V.Nagaraj Review of A mathematical orchard ACM SIGACT News 46 3 21-22 ISSN:0163-5700
  • C.angel, S.Asha “A study on developing a smart environment in agricultural irrigation technique” International Journal of Ambient Systems and Applications 3 2
  • KARMEL A & Dr.C.JAYAKUMAR RECURRENT ANT COLONY OPTIMIZATION FOR OPTIMAL PATH CONVERGENCE IN MOBILE ADHOC NETWORKS KSII TRANSACTION ON INTERNET AND INFORMATION SYSTEMS 9 9 1976-7277
  • Dr.R.Nandhini BANDWIDTH RESERVATION POLICY PERFORMANCE ANALYSIS IN A WIRELESS CELLULAR NETWORK UNDER NON-EXPONENTIAL DISTRIBUTIONS ARPN Journal of Engineering and Applied Sciences 10 8 1819-6608
  • Prof. Sharath Kumar. J and Dr. Maheswari. N A framework for security in data mining using intelligent agents ARPN Journal of Engineering and Applied Sciences 10 6
  • Dr.P.Vetrivelan, S.Siva Maharajan, Dr.P.Narayanasamy, C.P.Koushik, R.Ratheesh, T.S.Pradeep Kumar Vertical Handover and Video Streaming Over Cloud in 4G Heterogeneous Overlay Wireless Networks International Journal of Engineering and Technology 7 5 1537-1547 0975-4024
  • D. Sudha and Priyadarshini J Intelligent Multiple Vehicular Detection and Tracking Using Haar and Filtering Techniques in Dynamic Environment with Occlusion Handling and Collision Avoidance International Journal of Applied Engineering Research 10 20 41570-41574
  • Maheswari R. and Pattabiraman V. Performance analysis of reconfigurable open soft core processor OR1200 with global hazard controller International Journal of Pure and Applied Mathematics 101 5 849-858 1311-8080
  • I.Sumaiya Thaseen,Ch.Aswani Kumar Intrusion Detection model using PCA and ensemble of classifiers Advances in systems science and aplications 0 0
  • Sumaiya Thaseen and Aswani Kumar Improving Accuracy of Intrusion Detection Model using PCA and optimized SVM CIT Journal of computing and information technology 0 0
  • Sumaiya Thaseen and Aswani Kumar Intrusion Detection model using chi square feature selection and multi class SVM Journal of King Saud University- Computer and Information Sciences 0 0
  • Sumaiya Thaseen and Aswani Kumar Intrusion Detection model using chi square feature selection and modified Naive Bayes Classifier International Symposium on Big Data and Cloud Computing 0 0
  • P. Rukmani and R.Ganesan MODIFIED LOW LATENCY QUEUING ALGORITHM FOR REAL TIME APPLICATIONS IN WIMAX NETWORKS International Journal of Pure and Applied Mathematics 101 8 915-924 13143395 /13118080
  • S.V.Nagaraj Review of Handbook of Finite fields ACM SIGACT News 46 4 17-18 ISSN:0163-5700
  • Aparna Vijaya, Neelanarayanan V A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation International Journal of Education and Management Engineering(IJEME) 4 4
  • N.Manikandan, M.Sakthiganesh, P.J.Kumar, M.SenthilKumar Web based Farmers Bulletin for agricultural development using PAP Approach International Journal of Soft Computing and Engineering (IJSCE) 2 1 171-174 2231-2307
  • M.Sakthi ganesh1, DR.P.Venkata krishna2 Improving Frequent Link Failure Detection in VANET International Journal of Engineering and Technology (IJET) 5 2 1882-1886 0975-4024
  • Tejaswi Agarwal, Saurabh Jha and B. Rajesh Kanna, P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for Image Denoising, 22th ACM Interenational Symposium on High Performance Parallel and Distributed Computing, New York, USA , HPDC 2013. (Best Poster Award) 10 4 0 CoRR abs/1306.5390 .
  • S. Graceline Jasmine and V. Pattabiraman, Hyperspectral Image Analysis Using End Member Extraction Algorithm International Journal of Pure and Applied Mathematics 101 5 809-829 1311-8080
  • R. Maheswari and V. Pattabiraman Performance Analysis Of Reconfigurable Open Soft Core Processor-Or1200 With Global Hazard Controller International Journal of Pure and Applied Mathematics 101 5 849-858 1311-8080
  • S. Harini and V. Pattabiraman Hybrid Multi-Core ASIC Architecture With FPGA for Self-Repairing of Hard Faults International Journal of Pure and Applied Mathematics 1 5 905-913 1311-8080
  • Dr. M. Janaki Meena and Dr. S.P.Syed Ibrahim Statistical and Evolutionary Feature Selection Techniques Parallelized using MapReduce Programming Model Techniques and Environments for Big Data Analysis 17 1 25 2197-6503
  • Ananda Kanagaraj.S, Kamalakannan.N, Devosh.M, Uma Maheswari.S, Shahina.A, Nayeemulla Khan. A Automated Health Monitoring through Emotion Identification Proc. Springer Intl. Conf. Soft Computing Systems 0 0 0 978-81-322-2671-0
  • N. Radha, A. Shahina, G. Vinoth, A. Nayeemulla Khan Improving recognition of syllabic units of Hindi language using combined features of throat microphone and normal microphone speech IEEE., Int. Conf. Control Instrumentation Communication and Computational Technologies (ICCICCT), (Thukalay, India) 0 0 1343 – 1348 978-1-4799-4191-9
  • “1. Anju Mary Thomas, Dr. B.Vinayaga Sundaram , M.Priyaadharshini” ASSESSING ASSOCIATIVE LEARNING SKILLS TO REGULATE SRL BEHAVIOUR International Journal of Research in Computer Applications & Information Technology 1 1 81-87 2347-5099
  • Teenu Rose Jacob ,M. Priyaadharshini, Dr. B. Vinayaga Sundaram Enhancing Identity Based Authentication Using Partial Key Mechanism in Cloud Computing International Journal of Research in Computer Applications & Information Technology 1 2 32–39 Online: 2347-5099, Print: 2348-0009
  • Parvathy R, M. Priyaadharshini , Dr. B. Vinayaga Sundaram Enhancing Performance of Learning Objects using Map-Reduce Techniques International Journal of Research in Computer Applications & Information Technology 1 2 85-90 ISSN Online: 2347-5099, Print: 2348-0009
  • M.Priyaadharshini, Dr.B.Vinayaga Sundaram Teaching and Learning as a Service (TLaaS) International Journal of Applied Engineering Research 10 34 72183-27188 ISSN 0973-4562
  • M. Rajesh , Indra Rajasingh ORIENTED DIAMETER OF SIBLING TREES International Journal of Pure and Applied Mathematics 101 5 871-876 1311-8080 (printed version); 1314-3395(onlineVer)
  • G. R. Bharath Ram, R. Jayakumaur, R. Narayan, A. Shahina and A. Nayeemulla Khan An Efficient Voice Enabled Web Content Retrieval System for Limited Vocabulary Springer Communications in Computer and Information Science Series 292 3 390-398 978-3-642-31685-2
  • Mubeen, N.; Shahina, A.; Nayeemulla Khan, A.; Vinoth, G Combining spectral features of standard and Throat Microphones for speaker identification IEEE Proc. Intl. Conf. Recent Trends In Information Technology (ICRTIT), (MIT, Chennai) 0 0 119-122 978-1-4673-1599-9
  • Harini S and Pattabiraman V Online Self Repairing of Hard Faults in an ASIC Multi-core Processor using FPGAOnline Self Repairing of Hard Faults in an ASIC Multi-core Processor using FPGA Conference proceedings of Recent Researches in Circuits, Communications and Signal Processing 0 0 123-127 978-1-61804-151-7
  • Harini S and Pattabiraman V Simulated Annealing based Test Instruction Set Optimization for Post Silicon Validation Recent Advances in Electrical and Computer Engineering 0 0 177 – 181 978-1-61804-156-2
  • N.MAHESWARI,PROFESSOR,VIT,M.REVATHI,ASST.PROFESSOR,HINDUSTAN COLLEGE OF ENGG & TECH Protecting the Sensitivity using Data Distortion IRACST – International Journal of Computer Science and Information Technology & Security (IJCSITS), 2 4 864-868 ISSN: 2249-9555
  • Kalvina,VIT,N.Maheswari,VIT Univrsity,Andrews, Mahendra Engg college Intact Analysis of Intra Trials On Assorted Paradigms Of Gesture Based Communication System International Journal of Engineering and Technology 5 4 3617-3624 ISSN : 0975-4024
  • Kanchana Devi V, Dr. R. Ganesan Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack International Journal of Computer Applications 70 6 13-Oct 10.5120/11965-7805
  • G. Bharadwaja Kumar, Melvin Jose Johnson Premkumar Issues in developing LVCSR System for Dravidian Languages: An exhaustive case study for Tamil International Journal of Computer Applications 70 19 0 0975-8887
  • Sneha. D. L, G. Bharadwaja Kumar Comparison of Various Bilingual Sentence Alignment Methods for Parallel Corpora Development International Journal of Engineering Research & Technology 3 4 0 2278-0181
  • Tulasi Prasad Sariki, Dr. Bharadwaja Kumar, Ramesh Ragala Effective Classroom Presentation Generation Using Text Summarization International Journal of Computer technology and applications 5 4 0 2229-6093
  • G. Bharadwaja Kumar An Encyclopedic Overview of Big Data Analytics International Journal of Applied Engineering Research 10 3 5681-5705 0973-4562
  • D.Arivudainambi and D.Rekha An evolutionary algorithm for broadcast scheduling in wireless multihop networks Wireless Networks, Springer 18 7 787–798 1022-0038
  • D.Arivudainambi and D.Rekha Broadcast scheduling problem in TDMA ad hoc networks using immune genetic algorithm International Journal of Computer Communications and Control 8 1 18–29 1841-9836
  • Sharath Jagannathan, Andrews Samraj, Maheswari Rajavel Potential Fishing Zone Estimation by Rough Cluster Predictions CIMSIM ’12 Proceedings of the 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation 34 10 82-87 2166-8531 / 978-1-4673-3113-5
  • D.Arivudainambi and D.Rekha Heuristic approach for broadcast scheduling problem in wireless mesh networks Elsevier International Journal of Electronics and Communications 68 6 489–495 1434-8411
  • Anvesh Kumar, Nisha V M Algorithm for Sequence alignment in Regular Expression Signature Generation International Journal of Research in Computer Applications and Information 1 2 77-81 0
  • Sakkaravarthi Ramanathan, JagadeeshKannan. R, Ismael Bouassida Rodriguez MAM: Mission – Aware Middleware for Collaborative Communication IEEE(EDS) Kolkata Chapter Sponsored 4th International Conference on Computing, Communication and Sensor Network 0 0 6 IEEE(EDS) Kolkata Chapter Sponsored 4th Internatio
  • Maheswari R. and Pattabiraman V. PERFORMANCE EVALUATION OF OR1200 PROCESSOR WITH EVOLUTIONARY PARALLEL HPRC USING GEP ICTACT JOURNAL ON SOFT COMPUTING 2 3 331- 336 2229-6956
  • Maheswari R. and Pattabiraman V. DYNAMIC RECONFIGURABLE COMPUTING IN OR1200 CORE OF EMBEDDED SYSTEM International Journal of Computer Technology and Electronics Communication 2 2 09-Jan 2320 – 0081
  • SONALI. N and MAHESWARI.R AN INTELLIGENT OBSTACLE AND OVER SPEEDING SENSOR TO PREVENT DASHING OF MOTORCYCLES International Journal of Advanced Computational Engineering and Networking 1 6 56-59 2320-2106
  • TEJASWI AGARWAL & MAHESWARI R. DESIGN OF A SOFT-CORE PROCESSOR BASED ON OPENCORES WITH ENHANCED PROCESSING FOR EMBEDDED APPLICATIONS Second Student Research Symposium (SRS), International Conference on Advances in Computing, Communications and Informatics (ICACCI’13), 1 1 06-Jan 0
  • P.Padmasree and Maheswari.R A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network International Journal of Computer Science & Engineering Technology (IJCSET) 4 6 763-768 2229-3345
  • B.Rajesh, University College of Engineering – Pattukkottai , S.Ismail Mohideen, Jamal Mohamed College – Tiruchirappalli and J.Prassanna, VIT-Chennai FLOW DISTRIBUTION NETWORK IN FUZZY ENVIRONMENT International Conference on Mathematical Methods and Computation, Jan 22 & 23, 2015, Jamal Mohamed College(Autonomous), Tiruchirappalli, India 0 0 0 0
  • B.Rajesh, University College of Engineering – Pattukkottai , S.Ismail Mohideen, Jamal Mohamed College – Tiruchirappalli and J.Prassanna, VIT-Chennai Flow Distribution Network with Triangular Intuitionistic Fuzzy Number as EDGE Weight International journal of engineering research and technology, RACMS-2014 Conference Proceedings 3 33 06-Apr 2278-0181
  • S.Geetha, Siva S.Sivatha Sindhu Audio Stego Intrusion Detection System through Hybrid Neural Tree Model Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security 1 1 142-165 9781522501053, 1522501053
  • Ankit Kumar Agrawal, Prof. Sivagami M Object Recognition In HADOOP Using HIPI INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 4 7 115-118 ISSN 2277 – 8616
  • S. Muthuramalingam,N Karthikeyan,S. Geetha, Siva S. Sivatha Sindhu Stego Anomaly Detection in Images exploiting the Curvelet Higher Order Statistics using Evolutionary Support Vector Machine Journal of MultimediaTools and Applications – Springer 1 1 Jan-35 1380-7501
  • “2. B. Muthukumar, Siva S.Sivatha Sindhu, S.Geetha, Dr.A.Kannan” Intelligent Network-Misuse-Detection-System using Neurotree Classifier Neural Network World 25 5 541-564 1210-0552
  • Umamaheswari E. CLOUD OFFICE USING HOMOMORPHIC ENCRYPTION ARPN Journal of Engineering and Applied Sciences 10 20 9621-9625 1819-6608
  • P. V. Vijay kumar Prof. A. Vijayalakshmi Association Rule Mining Using Hash-Based Decision Tree as Directed a-Cyclic Graph International Journal of Engineering Research & Technology (IJERT) 3 4 4 2278-0181
  • A. Vijayalakshmi and B. Rajesh Kanna ENHANCED QUALITY OF SERVICE IN VISUALIZING THE MALARIA DATA USING CLOUD COMPUTING ARPN Journal of Engineering and Applied Sciences 10 5 5 1819-6608
  • Gayathri. R, Dr. Neelanarayanan V Systematic mapping of security mechanism Combating security braches and criminal activities in the digital sphere 0 0 0 0
  • B. Rajesh Kanna An Adoptive approach in Demosaicing True Color from Digital Camera having Bayer Color Filter International Journal of Computer Science & Engineering Technology 4 10 1271–1276 2229-3345
  • D.Arivudainambi and D.Rekha Memetic algorithm for minimum energy broadcast problem in wireless ad hoc networks Elsevier Swarm and Evolutionary Computation 12 0 57–64 2210-6502
  • Nithya Darisini, P.S. & Santhiya Kumari, N. Geo-Reactive: An efficient and reliable hybrid routing protocol for VANETs Indian Journal of Science and Technology 8 27 DOI:10.17485/ijst/20 9746846
  • Nithya Darisini, P.S., Santhiya Kumari, N & Bolla Karthikeya An Optimized Geographic routing protocol for VANETs ARPN Journal of Engineering and Applied Sciences 10 22 10597-10604 18196608
  • Saurabh Jha, Tejaswi Agarwal and B. Rajesh Kanna Exploiting data parallelism in the yConvex hypergraph algorithm for image representation using GPGPUs 27th International Conference on Supercomputing, ICS 2013, Eugene, Oregon, USA 0 0 475–476 978-1-4503-2130-3
  • Alok Chauhan, V. Vijayakumar, Rajiv Vincent, K.V. Pradeep Towards the development of a framework for socially responsible software by analyzing social media big data on cloud through ontological engineering Big Data, Cloud and Computing Challenges 50 0 524–530 1877-0509
  • L.M. Jenila Livingston & Dr. D. Brahadeeswaran Educational Diagnosis of Underacheivers and Remediation Encore 2013-Frontiers of Managment 0 0 39-47 978-81-926045-0-3
  • L.M.Merlin Livingston , L.G.X.Agnel Livingston , L.M.Jenila Livingston PERFORMANCE EVALUATION OF ADAPTIVE SPECKLE FILTERS FOR ULTRASOUND IMAGES International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) 2 12 62-69 2394-3777
  • Santosh, Jenila Livingston L.M. An Algorithm for Speech Enhancement International Journal of Research and Scientific Innovation (IJRSI) 2 9 70-72 2321 – 2705
  • KATHIR DEIVANAI, VIT, CHENNAI CAMPUS. RESPRIRATORY RATE ESTIMATION OF EXTRACTED PPG SIGNALS FROM EMBEDDED SMART ATTIRE FOR OPERATION STRATEGISTS Lecturer Notes in Electrical Engineering 279 187 1235-1240 978-3-642-41673-6
  • Deivanai K, Venkatesan. P, Pratibha Nalini. R EMERGENCY CARE AND ONLINE MEDICAL DIAGNOSIS SYSTEM Int, J. Pure and Applied Mathematics 101 0 655-662. ISSN: 1311-8080
  • Vergin Raja Sarobin.M and Ganesan.R Swarm Intelligence Based Node Deployment of Wireless Sensor Networks for Smart Grid Power Generation International Conference on Mathematical Computer Engineering 2 0 160-161 978-93-81899-64-9
  • Vergin Raja Sarobin.M and Ganesan.R Energy Aware Wireless Sensor Networks using Soft Computing: A Survey International Workshop on Parallel Computing 1 0 37 978-93-81899-42-7
  • Ankush Rai, Jagadeesh.Kannan. R, Sakkaravarthi Ramanathan Survey of Advances in Human Action Recognition International Journal of Computational Vision and Robotics 6 1 31 1752-9131
  • P.Rukmani and R.Ganesan Enhanced Low Latency Queuing Algorithm with Active Queue Management for Multimedia Applications in Wireless Networks International Journal of High Performance Computing and Networking 0 0 0 1740-0570/1740-0562
  • P.Rukmani and R.Ganesan An Analytical Model for Enhanced Low Latency Queuing Algorithm International Conference on Mathematical Computer Engineering-2015 2 1 76 978-93-81899-64-9
  • Justus S, Maheswari S Assessing the Behaviour of Web Services using Finite States International Journal of Information Engineering and Electronic Business 7 4 31-38 2074-9031
  • Patil Rohit Ramesh, Justus S Chords Suggestion Algorithm using Jusic Distance for Music Knowledgebase International Journal Of Computer & Moderen Technology 2 2 98-104 2454-4604
  • J Prassanna, K Punitha, V Neelanarayanan Towards an Analysis of Data Accountability and Auditing for Secure Cloud Data Storage Procedia Computer Science 50 1 543–550 0
  • Aparna Vijaya, V Neelanarayanan A Model Driven Framework for Portable Cloud Services: Proof of Concept Implementation IJ Education and Management Engineering 5 4 27-35 2305-3623
  • Indra Rajasingh, R. Sundara Rajan, Rajesh M and Paul Manuel Oriented Diameter of Grids Journal of Combinatorial Mathematics and Combinatorial Computing 92 0 283-288 0835-3026
  • Nithya Darisini P.S. and Santhiya Kumari N A survey of routing protocols for VANET in urban scenarios International conference on pattern recognition, informatics and mobile engineering(PRIME-13) 0 0 464-467 978-1-4673-5845-3/13
  • Nithya Darisini P.S. and Santhiya Kumari N Evaluation of greedy recovery strategy in VANETs International conference on computational intelligence and communication networks (CICN 2014) 6 0 380-384 978-1-4799-6929-6/14
  • Prasad R Khandar, K Deivanai Preventive system for forests IJCST 4 1 15-18 ISSN: 2347-8578
  • Sandhya P. and Lakshmi M. Web Service Selection Using Decision Tree Analysis in a Risky Environment Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg 279 0 1211- 1217 1876-1100
  • Sandhya P. and Lakshmi M. Enhancing Service Provider’s Profitability and Determining the Frequency of Selection of Web Services for Composition using Dynamic Programming Approach Indian Journal of Research, The Global Journals 3 0 26-31 2250-1991
  • Sakthi Ganesh.M1, Dr.Vijayakumar V2, Dr.Venkata Krishna P3, Dr.X. Z. Gao, Docent­4 A Review on Automation of classification and summarization of Neurosurvey by multiclass svm Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 0 0 0 0
  • Abdul Rahman, Justus A Survey Study on Knowledge Management Systems Quality Views for Building a Unified Quality Model International Journal of Engineering Trends and Technology 0 0 0 0
  • Bangaru Kamatchi.S,Parvathi.R A Review on Mobile Analytics International Journal of Mobile Learning and Organisation 0 0 0 0
  • I.Sumaiya Thaseen,Ch.Aswani Kumar Intrusion Detection model using chi square feature selection and ensemble of classifiers International arab journal of information technology. 0 0 10-Jan 0
  • SHRIDEVI.S, Dr.G.Raju. A Novel approach for web service annotation verification and service parameters validation using ontology SPRINGER-Smart Innovation, Systems and Technologies 49 201 399-415 ISSN: 2190-3018
  • Dr.E.UMAMAHESWARI Ranking of Software Metrics with Neural Network RBF and Condition Based Aggregation ARPN Journal of Engineering and Applied Sciences 0 0 0 18196608
  • Vergin Raja Sarobin.M and Ganesan.R SWARM INTELLIGENCE IN WIRELESS SENSOR NETWORKS: A SURVEY International Journal of Pure and Applied Mathematics 101 5 773-807 1311-8080 (printed version),1314-3395 (on-line ver
  • Dr.D.Rekha, Dr.D.Arivudainambi Harmony Search Using Memetic Algorithm for Broadcast Scheduling Problem in Wireless Multihop Networks IETE Technical Review 0 0 0 0256-4602
  • J. Christy Jackson and V. Vijayakumar A Review on Congestion Control System using APU and D-FPAV in VANET International Journal of Advanced Intelligence Paradigm 0 0 0 0
  • Dr.Sivabalakrishnan Asso prof/SCSE Background Estimation Techniques. A Review International Journal of Advanced Intelligence Paradigms 0 0 0 0
  • G.Suganeshwari and S. P. Syed Ibrahim A Survey on collaborative filtering based recommendation system Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges 49 0 503-517 2190-3026
  • Vergin Raja Sarobin, Ganesan R SWARM INTELLIGENCE IN WIRELESS SENSOR NETWORS: A SURVEY “International Journal of Pure and applied mathematics 101 5 773-807 1311-8080
  • B. Rajesh Kanna ESTIMATION OF SALT AND PEPPER NOISE DENSITY LEVEL ON GRAYSCALE DIGITAL IMAGE SIAM Journal of Imaging Science 0 0 0 1936-4954
  • Dr Subbulakshmi T and Sundaraman Execution of Scientific Workflows on IaaS clouds by PBRR algorithm International Journal of Computational Science and Engineering 0 0 0 0
  • Dr Subbulakshmi T and Jisha S Manjaly Task tracker aware scheduler with resource availability control for Hadoop MapReduce International Journal of High Performance Computing and Networking 0 0 0 0
  • Dr. T. Subbulakshmi, Shantanu Sakpal, Surendra Kumar Prajapat, Aditya Gaikwad and Kiruthika Devi BS SMURF ATTACK DETECTION USING SNORT IDS 11th International Conference on Science, Engineering and Technology 0 0 121-123 978-93-85477-73-7
  • Dr.T.Subbulakshmi, N.Udayakumar, Arpit Pratap Singh and Pawan Agrahari Analysing Vulnerabilities of Windows XP International Conference on Science, Engineering and Technology 0 0 0 0
  • Dr Subbulakshmi T Combating Cyber Security Breaches in digital world using Misuse Detection Methods Combating Security Breaches and Criminal Activity in the Digital Sphere 0 0 0 0
  • Dr.T.Subbulakshmi and M.Jayasudha An Efficient ABBE for secure data sharing and storage in public and private clouds-A Survey International Journal of Applied Engineering Research 0 0 0 0
  • Maheswari R. and Pattabiraman V. Reconfigurable FPGA Based Soft-core Processor for SIMD Applications International Journal of Applied Engineering Research 0 0 0 0
  • Abdul Quadir,Kiran Mathew,Vijaya Kumar V An Improved Key Management Scheme in Cloud Storage International Journal of Advanced Intelligence Paradigms (IJAIP) 0 0 0 0
  • Jayasudha M,Dr T SUBBULAKSHMI An efficient ABBE for secure data sharing in public and private clouds INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESERACH 10 0 06-Jan Online ISSN-1087-1090
  • S.Bharathi Raja & Ajeet Kumar Prajapati Neutral sort 3rd International Symposium on Big Data and Cloud Computing Challenges – ISBCC 0 0 0 0
  • vijayakumar.v Trust Based Resource Selection in Grids using Immune System Inspired Model SPRINGER-Smart Innovation, Systems and Technologies 48 48 103-108 2190-3018
  • D M Ajay, Umamaheswari. E CURRENT RESEARCH & FUTURE DIRECTIONS IN CLOUD BASED DATA ANALYSIS FOR SMART CITIES international journal of big data intelligence 0 0 0 2053-13894
  • Sakthi Ganesh.M1, Dr.Vijayakumar V2, Dr.Venkata Krishna P3, Dr.X. Z. Gao, Docent¬4 A REVIEW ON AUTOMATION OF CLASSIFICATION AND SUMMARIZATION OF NEUROSURVEY BY MULTICLASS SVM Wiley – DMKD 0 0 0 1942-4795
  • D M Ajay, Dr. Umamaheswari. E EVALUATING THE SECURITY OF A CLOUD SERVICE PROVIDER SPRINGER-Smart Innovation, Systems and Technologies 0 0 33-41 2190-3018
  • 1. S. Graceline Jasmine 2. V. Pattabiraman Hyperspectral Image Analysis and Interpretation using Pixel Purity Index Algorithm International journal of computer applications in technology 0 0 0 0
  • Ashutosh Satapathy and Jenila Livingston L.M. A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud Indian Journal Science and Technology 9 6 – 0974-6846
  • NEELANARAYANAN V A Survey on Desktop Grid Systems-Research Gap Smart Innovation, Systems and Technologies 0 0 0 21903018
  • S. Rajkumar, G.Malathi A Comparative Analysis on Image Quality Assessment Journal of Digital Imaging 0 0 0 ISSN: 0897-1889 (Print) 1618-727X (Online)
  • Anto Rosaline,Parvathi MOOD BASED RECOMMENDATION SYSTEM IN SOCIAL MEDIA USING PSV ALGORITHM International symposium on Bigdata and Cloud Computing Challenges 2016 0 0 0 0
  • Mohammed Rafi K & Pattabiraman V Curing the Curse of Dimensionality – A Review Journal of Ambient Intelligence and Humanized Computing 0 0 0 0
  • Vinodha.R and Parvathi.R ANALYSIS AND MODELING OF ELECTION RESULT USING SPATIAL STATISTICAL METHOD” “International Journal of Computer Science and Applications” (IJCSA) 0 0 0 0
  • Ankush Rai, Jagadeesh.Kannan. R, Sakkaravarthi Ramanathan SURVEY OF ADVANCES IN MACHINE VISION BASED HUMAN ACTION RECOGNITION Current Science 110 10 0 0011 3891
  • B V A N S S PRABHAKAR RAO Critical Review on Practical Software Estimation IJSC 0 0 0 ISSN Number (Print) : 0976-6561
  • D.M.AJAY & Dr.E.UMAMAHESWARI Why, How Cloud Computing – How Not, and Cloud Security Issues Global Journal of Pure and Applied Mathematics (GJPAM) 12 1 08-Jan 0973-1768
  • Kumar Rangasamy Intrusion Detection Systems for Virtual Grid Environment Internation Journal of Bigdata Intelligence 0 0 0 0
  • S.Geetha, P.Punithavathi Visual Cryptography for Securing Images in Cloud IGI Book on “Combating Security Breaches and Criminal Activity in the Digital Sphere”, Advances in Digital Crime, Forensics, and Cyber Terrorism Book Series 1 1 22-Jan 2327-0381
  • S.Geetha, P.Punithavathi Cancelable Biometric Template Security using Segment-based Visual Cryptography International Conference on Computer Vision & Image Processing CVIP 2016 4 1 22-32 2194-5357
  • S. Arumugam, B. Jayara, K. Thulasiraman Independent Dominator Sequence Number of a Graph Procedia computer Science 74 0 43 – 46 1877-0509
  • Dr.P.Nithyanandam , Mrs. Jincy Fernandez “Review on Objective Image Quality metrics of Fused Images: from Natural images to Satellite images signal image and vide processing 0 0 0 0
  • S Rajkumar and G Malathi A Novel approach for the recovery of de-focussed color Images International Journal on Recent Researches In Science, Engineering & Technology 3 5 0 2347-6729
  • Dr.D.Rekha,Ms.Bharathi, Dr.V.Vijayakumar Genetic Algorithm based Demand Side Management for Smart Grid Springer Wireless Personal Communication 0 0 0 0929-6212
  • B. Rajesh Kanna, Devarathy, Sandra Felix, Nikhil Joseph Intuitive Touch Interaction to Amputated Fingers Smart Innovation, Systems and Technologies 49 4 387-397 978-3-319-30347-5 ; 978-3-319-30348-2
  • S.Geetha, P.Punithavathi A Survey on Cancelable Biometrics Computer Science Review 1 1 21-Jan 1574-0137
  • Prathilothamai, M., Marilakshmi, S., Majeed, N., Viswanathan, V Timely prediction of road traffic congestion using ontology Advances in Intelligent Systems and Computing 2 0 331-344 978-81-322-2672-7
  • Hepsiba Mabel, Justus Selwyn Performance of the three-layered knowledgebase and its representation models: an empirical evaluation International Journal of Knowledge Engineering and Data Mining 3 4 239-254 1755-2095
  • S Rajkumar and G Malathi A Comparative analysis on Image Quality Assessment Journal on Electronic Imaging 0 0 0 1017-9909
  • Dr.R.Nandhini RFID in Health Domain: Today and Tomorrow-a comprehensive survey. International Journal of Applied Engineering and Research 11 4 34 9734562
  • Ms. Susheela G, Dr. Y. Asnath Victy Phamila Visual Sensor Networks Critical Infrastructure Protection IGI Book on Combating Security Breaches and Criminal Activity in the Digital Sphere, Advances in Digital Crime, Forensics, and Cyber Terrorism Book Series 263-282 9.78152E+12
  • Ms. Susheela G, Dr. Y. Asnath Victy Phamila Low Complex Energy Efficient Image Compression Algorithms for Visual Sensor Networks: A Review International Journal of Imaging & Robotics 2231525X
  • Rajarajeswari. S , Dr V .Neelanarayanan Reasoning in Context Aware Computing – A Review Human-centric Computing and Information Sciences 0 0 0 2192-1962
  • Sridhar, Justus S A Survey on Named Entity Recognition and Classification International Journal of Computer and Information Technology 0 0 0 2010-3778
  • Hepsiba Mabel, Justus Selwyn A Review on the Knowledge Representation Models and its Implications International Journal of Information Technology and Computer Science 0 0 0 2074-9015
  • Ms. Kalaivani K, Dr. Y. Asnath Victy Phamila Multi-focus Image Fusion Techniques in Visual Sensor Networks: A Review JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY 18234690
  • Sharath Kumar J*, Nayan Mattani**, Dr.Maheswari N* A Survey on Privacy Preserving Techniques for Social Network Data CYBERNETICS AND INFORMATION TECHNOLOGIES 0 0 0 1314-4081
  • Vergin Raja Sarobin.M and Linda Ann Thomas Improved Leach Algorithm for Energy Efficient Clustering of Wireless Sensor Network (WSN) International Journal of Technology 7 1 50-60 p-ISSN 2086-9614 e-ISSN 2087-2100
  • Ranita Pal and I.Sumaiya Thaseen Intrusion detection model using integrated clustering and decision tree ARPN Journal of Engineering and Applied Sciences 10 5 1980-1987 1819-6608
  • J. Wisely Joe and S.P. Syed Ibrahim A Novel Approach for High Utility Closed Itemset Mining with Transaction Splitting 3rd International Symposium on Big Data and Cloud Computing Challenges 0 0 0 0
  • Darshan Barapatre, Janaki Meena M, Syed Ibrahim S P Twitter Data Classification using Side Information 3rd International Symposium on Big Data and Cloud Computing Challenges 0 0 0 0
  • Riddhi Anjankumar Shah, Janaki Meena, Syed Ibrahim Efficient Mining of Top k-closed Itemset in Real Time 3rd International Symposium on Big Data and Cloud Computing Challenges 0 0 0 0
  • Nilanjana Dev Nath, Janaki Meena, Syed Ibrahim Mining Frequent Itemsets in Real Time 3rd International Symposium on Big Data and Cloud Computing Challenges 0 0 0 0
  • GAYATRI K. PRADHAN and Syed Ibrahim SUMMARIZATION OF LARGE TEXT DOCUMENT 2nd IEEE International Conference on Human Computer Interactions (ICHCI’16) 0 0 0 0
  • Sudhi Tiwari and Syed Ibrahim Email clustering using Big Data Framework 2nd IEEE International Conference on Human Computer Interactions (ICHCI\’16) 0 0 0 0
  • Riddhi Anjankumar Shah, Syed Ibrahim Efficient Mining of Top k closed Frequent Itemsets in Real Time using Spark Framework 2nd IEEE International Conference on Human Computer Interactions (ICHCI’16) 0 0 0 0
  • Priyanga Sharma and Syed Ibrahim Email Classification using Big Data Framework 2nd IEEE International Conference on Human Computer Interactions (ICHCI\’16) 0 0 0 0
  • Nilanjana Dev Nath, Syed Ibrahim MINING FREQUENT ITEMSETS IN REAL TIME 2nd IEEE International Conference on Human Computer Interactions (ICHCI’16) 0 0 0 0
  • Ashutosh Satapathy and Jenila Livingston L.M. A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud Indian Journal of Science and Technology 9 6 13-Jan 0974-6846
  • Dr. R. Bhargavi Online Dynamic Regressive Learning International Journal of Applied Engineering Research ISSN 0973-4562 11 3 2085-2090 0973-4562
  • Ashutosh Satapathy and Jenila Livingston L.M. SSL/ TLS and Their Exploitations: Review IEEE International Conference on Engineering and Technology (ICETECH) 0 0 493-499 978-1-4673-9916-6
  • Asha Shiny, X.S, and Dr. R. Jagadeesh Kannan Energy Efficient Clustering Protocol using Self Organizing Map in MANET Indian Journal of Science and Technology 8 28 08-Jan 0974-6846
  • Asha Shiny, X.S, and Dr. R. Jagadeesh Kannan A Novel Multicast Routing Protocol based on SOM to Minimize Energy Consumption in MANETs International Journal of Applied Engineering Research (IJAER) 10 19 39885-39890 0973-4562
  • M. Kempanna and R. Jagadeesh Kannan Anfis Based Multilayered Botnet Detection with Traffic Reduction Technique Middle-East Journal of Scientific Research 23 3 426-431 1990-9233
  • R. Jagadeesh Kannan and S. Subramanian An Adaptive Approach of Tamil Character Recognition Using Deep Learning with Big Data-A Survey Advances in Intelligent Systems and Computing 337 1 557-567 978-3-319-13727-8
  • S.Geetha, Y.Asnath Victy Phamila Combating Security Breaches and Criminal Activity in the Digital Sphere IGI Book on “Combating Security Breaches and Criminal Activity in the Digital Sphere”, Advances in Digital Crime, Forensics, and Cyber Terrorism Book Series 1 1 1-300 9.78152E+12
  • R. Jagadeesh Kannan, Subramanian.S, M. Pradeep Raja An Adaptive Approach of Biometric based Authentication in ATM using Deep Learning Proceedings of 1st International Conference on Microelectronics, Computing & Communication Systems organized by Institution of Electronics & Telecommunication Engineers & Indian Society for VLSI Education ARTTC 1 1 36 0
  • R. Jagadeesh Kannan, Subramanian.S, M. Pradeep Raja, A. Vidhya Classifying and Detecting Packed Polymorphic Malware Files Using Data Mining Tool International Conference on Mathematical Computer Engineering 1 1 16 9.78938E+12
  • Dolly Meghani, S.Geetha, ECG Steganography to secure patient data in an E-Healthcare System ACM – International Conference Proceedings Series – Women in Research ACM-WIR 2016 1 1 35-40 978 – 1 – 4503 – 4278 – 0
  • Deepanshu Dixit, Umadevi. K.S, R. Jagadeesh Kannan An Energy Efficient Protocol for Underwater Acoustic Sensor Networks International Conference on Mathematical Computer Engineering 1 1 184 9.78938E+12
  • S.Geetha, S.Sasikala, S. Appavu alias Balammurugan Improving Detection Performance of Artificial Neural Network by Shapley Value Embedded Genetic Feature Selector Neural Network World 26 2 86-106 1210-0552
  • Prabakaran.N, Jagadeesh Kannan. R Context Centered Response for Enabling Pervasive Environment Using Data Centric WSNs International Conference on Mathematical Computer Engineering 1 1 104-105 978-93-81899-64-9
  • Naresh. K, R. Jagadeesh Kannan An Enumeration of Radiotherapy Terminologies, Planning and its Optimization International Conference on Mathematical Computer Engineering 1 1 105 978-93-81899-64-9
  • Sakkaravarthi Ramanathan, R Jagadeesh Kannan, Ismael Bouassida Rodriguez MAM: Mission – Aware Middleware for Collaborative Communication IEEE(EDS) sponsored 4th International Conference on Computing, Communication and Sensor Network CCSN2015 1 1 44-49 81-85824-46-0
  • Prof B V A N S S Prabhakar Rao & Dr P Seetharamaiah SOFTWARE EFFORT ESTIMATION FRAMEWORK TO IMPROVE ORGANIZATION PRODUCTIVITY USING EMOTION RECOGNITION OF SOFTWARE ENGINEERS IN SPONTANEOUS SPEECH ICTACT JOURNAL ON SOFT COMPUTING 6 1 Pp.1076-1082 ISSN: 2229-6956
  • M.Sakthi ganesh1, DR.P.Venkata krishna2 Improving the performance of message broadcasting in VANETS International Journal of High Performance Computing and Networking 177 6 174 ISSN online: 1740-0570 ISSN print: 1740-0562
  • G Suganya, S A Sahaaya Arul Mary Subset Selection in Market-Driven Product Development: An Empirical Study Smart Innovation, Systems and Technologies 49 1 493 – 501 21903018
  • 50413 – N. Hema Knowledge Base Representation Model for a Structured Repository International Journal for Engineering Science and Computing 6 3 2126-2132 ISSN 2321 3361 © 2016 IJESC
  • N. Hema Knowledge Base Representation Model for a Structured Repository International Journal of Engineering Science and Computing 6 6 2126-2132 ISSN 2321 3361
  • Dt. Justus & Nachiyappan Understanding and Addressing Technical Challenges for Big Data International Journal of Engineering Science and computing 16 3 2132 – 2135 ISSN 2321 3361 © 2016 IJESC
  • Dr. Justus & Nachiyappan Understanding and Addressing Technical Challenges for Big Data International Journal of Engineering Science and computing 16 3 2132 – 2135 ISSN 2321 3361 © 2016 IJESC
  • Mrs. G. Susheela and Dr. Asnath Victy Phamila Y Energy Efficient Image Coding Techniques for Low Power Sensor Nodes IET Image Processing 0 0 0 1751-9659
  • J. Christy Jackson, V. Vijayakumar, Md. Abdul Quadir, C. Bharathi Survey on Programming Models and Environments for Cluster, Cloud, and Grid Computing that defends Big Data Elsevier Procedia Computer Science 50 0 517-523 1877-0509
  • Dr Subbulakshmi T A Learning based Hybrid Framework for Detection and Defence of DDoS Attacks International Journal of Internet Protocol Technology 0 0 0 0
  • Suresh, K. and Pattabiraman, V Investigation on ARM Algorithm with Incremental Mining and Proposing a New Algorithm for Streaming Dataset Australian Journal of Basic and Applied Sciences 9 6 72-76 1991-8178
  • S. Graceline Jasmine and V. Pattabiraman Hyperspectral Image Analysis using End Member Extraction Algorithm International Journal of Pure and Applied Mathematics 101 5 809-829 ISSN:1311-8080(printed);ISSN:1314-33(on line)
  • Vaibhavi Rajendran and G. Bharadwaja Kumar Text Processing for Developing Unrestricted Tamil Text to Speech Synthesis System Indian Journal of Science and Technology 8 29 0 0974-6846
  • Disha Kaur Phull, G. Bharadwaja Kumar Investigation of Indian English Speech Recognition using CMU Sphinx International Journal of Applied Engineering Research 11 6 4167-4174 0973-4562
  • Anusooya G, Vijayakumar V Power Optimization System for Small PC using Docker Smart Innovation, Systems and Technologies 49 49 1 173-181 21903018, 21903026
  • Rajesh M and Indra Rajasingh Wirelength of Directed Hypercubes into Grids International Journal of Applied Engineering Research 10 34 27352 – 27356 0973-4562
  • S. Raamakirtinan* and L. M. Jenila Livingston Identifying Influential Users in Facebook – A Sentiment Based Approach Indian Journal Science and Technology 9 10 09-Jan 0974-6846
  • Rukmani P, Ganesan R MODIFIED LOW LATENCY QUEUING ALGORITHM FOR REAL TIME APPLICATIONS IN WIMAX NETWORKS International journal of pure and applied mathematics 101 5 915-924 1311-8080
  • D.Sudha and Priyadarshini.J A review on multiple vehicle detection and tracking in dynamic environment International conference on distributed and intelligent computing 0 0 227 – 233 0
  • S.Vijayalakshmi and J.Priyadarshini An analysis of particle swarm optimization technique for breast cancer dataset International conference on distributed and intelligent computing 0 0 898-909 0
  • Vergin Raja Sarobin.M and Ganesan.R BIO-INSPIRED, CLUSTER-BASED DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS International Journal of Technology 1 4 88-97 2086-9614
  • Dr. P. Sandhya Developing Evaluavators For E-Commerce Application International Journal of Applied Engineering Research 11 5 3386-3389 0973-4562
  • Harini S and Pattabiraman V HYBRID MULTI-CORE ASIC ARCHITECTURE WITH FPGA FOR SELF-REPAIRING OF HARD FAULTS International Journal of Pure and Applied Mathematics 101 5 905-913 1311-808
  • G.Suganya, S.A.Sahaaya Arul Mary Multi-Criteria Decision Making using ELECRE Circuits and Systems 7 6 1008-1020 2153-1293
  • D.sudha and J.Priyadarshini A Review on Multiple Vehicle Detection and Tracking in Dynamic Environment International Journal of Control Theory and Applications 9 3 93-98 0974-5572
  • S.Vijayalakshmi and Dr.J.Priyadarshini An Analysis of Particle Swarm Optimization Technique for Breast Cancer Dataset International Journal of Control Theory and Applications 9 3 297-308 0974-5572
  • Asnath Victy Phamila Y and Geetha S IGI Book on “Combating Security Breaches and Criminal Activity in the Digital Sphere”, Advances in Digital Crime, Forensics, and Cyber Terrorism Book Series Combating Security Breaches and Criminal Activity in the Digital Sphere 1 1 1-300 9.78152E+12
  • Dr. Y. Asnath Victy Phamila Y and Mrs. S. Geetha Gamboled Image Compression Technique for Low Power Devices with Binary DCT and Torus Automorphism International Journal of Engineering Science and Computing 6 6 6655-6657 2250-1371
  • Yugandhara A. Nimbalkar, Justus S Design of Layers in Knowledgebase for Expert Systems IOSR Journal of Computer Engineering 18 3 89-93 ISSN: 2278-8727
  • R PRABHAKAAN ENHANCING CYBER SECURITY ON SUBSTATION AUTOMATION USING RSA ALGORITHM JESTEC 0 0 0 0
  • Kanchana Devi V, Dr. R. Ganesan A Generic Trust Management Framework for Heterogeneous Sensors in Cyber Physical Systems International Journal of Sensor Networks 0 0 0 1748-1279
  • SHRIDEVI.S, Dr.G.Raju. A literature survey on the performance evaluation model of semantics enabled web services International Journal of Advanced Intelligence Paradigms 0 0 NA ISSN online: 1755-0394 ISSN print: 1755-0386
  • A. Anuradha, V.Viswanathan Store attribute(s) preference of customers towards organised food and grocery retail outlets – a gap analysis Int. Journal of Business Excellence 10 1 120-138 ISSN online: 1756-0055 ISSN print: 1756-0047
  • A.KARMEL & Dr.C.Jayakumar ASTOUNDING IMPACT OF OVERHEARING ON ENERGY MANAGEMENT IN MANET International Journal of Advanced Engineering Technology 7 2 163-165 E-ISSN 0976-3945
  • Dr. Y. Asnath Victy Phamila and Dr. R. Amutha Energy efficient low bit rate image compression in wvelet domain for wireless image sensor networks Electronics Letters (IET) (Impact Factor: 0.93), Vol. 51(11), 2015, pages. 824-826. 51 11 824-826 0013-5194
  • R. Bhargavi Complex Event Processing framework for Big data Applications Springer, Data Science and Big data computing 0 0 41 – 56 978-3-319-31859-2, 978-3-319-31861-5 (e-book)
  • Darshan Barapatre, M. Janaki Meena and S.P. Syed Ibrahim Twitter Data Classification Using Side Information Smart Innovation, Systems and Technologies 49, Springer 49 0 363 to 368 2190-3018
  • Nilanjana Dev Nath, M. Janaki Meena and S.P. Syed Ibrahim Mining Frequent Itemsets in Real Time Smart Innovation, Systems and Technologies 49, Springer 49 0 325 to 334 2190-3018
  • Riddhi Anjankumar Shah, M. Janaki Meena and S.P. Syed Ibrahim Efficient Mining of Top k-Closed Itemset in Real Time Smart Innovation, Systems and Technologies 49, Springer 49 0 317-324 2190-3018
  • S.Hasan Hussain, S. Geetha, M. AmuthaPrabakar Design and Implementation of Adaptive Model For Sustainable Home Automation Using Internet Of Things (IoT) International Journal of Advanced Engineering Technology 7 1 827-829 0976-3945
  • “3. T. B Sivakumar, S. Geetha, M. AmuthaPrabakar” An Efficient Advanced Hierarchical Attribute Based Scheme With Asymmetric Encryption For Personal Health Records In Cloud Computing International Journal of Advanced Engineering Technology 7 1 892-895 0976-3945
  • P. Punithavathi, S.Geetha Dynamic Sectored Random Projection for Cancelable Iris Template IEEE Proceedings International Conference on Advances in Computing, Communications and Informatics (ICACCI -2016) 5 1 06-Jan 0
  • R.Geetha, S.Geetha, Multilevel RDH Scheme Using Image Interpolation IEEE Proceedings International Conference on Advances in Computing, Communications and Informatics (ICACCI -2016) 5 1 10-Jul 0
  • A. Kanmani, N. Karthikeyan and S. Geetha High Capacity Separable Data Hiding Using Repeated Histogram Modification in Integer Wavelet Transform Domain Asian Journal of Information Technology 15 5 862-865 1682-3915
  • Vishnu Priya R Facial Emotion Recognition International Journal of Engineering and Future Technology 7 7 18-29 2455-6432
  • Aaliya Amreen H Speaker Recognition using Gaussian Mixture Model International Journal of Computer & Organization Trends 33 1 45-50 2249-2593
  • S. Sasikala, S. Appavu alias Balamurugan, S. Geetha A novel shapely value embedded genetic feature selector for improving detection performance of classifiers Information Processing Letters – Elsevier 116 12 12-Feb 0020-0190
  • Kumar Rangasamy and Thamaraiselvi Somasundaram Trust Enabled CARE Resource Broker Springer – Smart Innovation, Systems and Technologies 49 3 13-32 2190-3018/Print ISBN 978-3-319-30347-5
  • Aparna V, Neelanarayanan V A Model Driven Framework for Portable Cloud Services International Journal of Electrical and Computer Engineering 6 2 708-716 2088-8708
  • Lavanya Sivakumar (SRM Research Institute & SRM University, India) Jayaram Balabaskaran (VIT, India) Krishnaiyan Thulasiraman (Universi Virtual Topologies for Topology Abstraction Service for IP-VPNs 17th International Telecommunications Network Strategy and Planning Symposium 0 0 0 0
  • Anusha.K, Dr.Ezhilmaran “Investigations on Classification Algorithms for Intrusion Detection System in MANETS” IEEE proceedings 0 0 216 – 219 0
  • Anusha.K, Sathiyamoorthy.E , “Comparative Study for Feature Selection Algorithms in Intrusion Detection System” Journal of Automatic control and computer science, Springer 50 1 09-Jan 0146-4116
  • Madhevan, Sakkaravarthi Ramanathan and Durgesh Kumar Jha A Novel Image Intelligent System Architecture for Fire Proof Robot Aritificial Intelligence and evolutionary computations in engineering systems 0 0 12 2192-6360
  • 1Ankush Rai, 2SakkaravarthiRamanathan., 3RJagadeesh.Kannan QUASI OPPORTUNISTIC SUPERCOMPUTING FOR GEOSPATIAL SOCIALLY NETWORKED MOBILE DEVICES 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2016) 0 0 2 0
  • S.Leela (Ph.D – Research Scholar) SECURED CHANGE DETECTION OF SATELLITE IMAGES USING HOMOMORPHIC ENCRYPTION Global Journal of Engineering Sciences and Researches 3 8 21-28 2348-8034
  • J.V. Thomas Abraham A Survey on Robust Speaker Recognition for Noise and Channel Robustness The International Journal Of Science & Technoledge 4 7 126-133 (ISSN 2321 – 919X)
  • Merlin L L.M., Agnel L.G.X and Jenila Livingston L.M. MULTIMEDIA SECURITY SPOOFING OF DIGITAL IMAGE FORENSICS -3D FACE MASK International Journal of Scientific & Engineering Research 7 5 320-328 2229-5518
  • Dr.Sakthi Ganesh M,Dr. Venkata Krishna P Advance intelligence tyre monitoring system using ambient backscatter technology in VANETs Int. J. Advanced Intelligence Paradigms-Inderscience 0 0 0 0
  • Senjaliya Mudra and Jenila Livingston L.M. Automatize Content Personalization by Agents In Digital Learning of Java Course International Journal of Applied Engineering Research 10 9 23063-23071 0973-4562
  • Neetika Verma, Prof A Muralidhar Cumulative Mining of Profitable Item Sets The International Journal Of Science & Technoledge 4 7 21-24 ISSN 2321 – 919X
  • J Prassanna, VIT-Chennai, P Ajit Jadhav, VIT-Chennai, V Neelanarayanan, VIT-Chennai Towards an Analysis of Load Balancing Algorithms to Enhance Efficient Management of Cloud Data Centres Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’) Volume 49 of the series Smart Innovation, Systems and Technologies pp 143-155 49 0 pp 143-155 978-3-319-30347-5
  • S.Asha & A.Syed Ismail Security Issues and Solutions in Cloud Computing – A Survey International Journal of Computer Science and Information Security 14 5 309-315 ISSN:1947-5500
  • Abirami, M., Pattabiraman, V. Data mining approach for intelligent customer behavior analysis for a retail store Smart Innovation, Systems and Technologies 49 1 283-291 DOI 10.1007/978-3-319-30348-2_23
  • S Rajkumar and Dr.G Malathi A Comparative Analysis on Image Quality Assessment for real time Satellite Images Indian Journal of Science and Technology 0 0 0 0974-5645

Year 2014

  • A. J. George Ebbinason, B. Rajesh Kanna, Color Fingers: Improved Multi-Touch Color Picker, Proceeding of SIGGRAPH Asia 2014 Technical Briefs, Shenzhen, China, Page 13:1–13:4, 13, DOI:10.1145/2669024.2669033
  •  R. D. Jackson Samuel, B. Rajesh Kanna, Development Of Cybernetic Technique in complete smear scanning of Tuberculosis Bacterium smear, Parallel Computing, Page, 51-54, 2014, ISBN: 978-93-81899-42-7. VIT, Chennai
  •  B. Rajesh Kanna And C. Vijayalakshmi, Detection of Cutting Tool Wear using Hybrid techniques of Pattern Recognition and Artificial Intelligence Noopur Nawge, Proceedings Of International Conference On Modelling, Optimization And Computing (ICMOC 2014), NI University, Nagercoil, Tamilnadu
  • E.Umamaheswari, Dr. D.K.Ghosh “Radial Basis Function Neural Network for Software Engineering Measures – A Survey” ISBCC’14.
  • Kasliwal B,Bhatia S, Saini.S, Sumaiya Thaseen and Ch.Aswani Kumar,”A hybrid anomaly detection model using G-LDA”, IEEE Advance Computing Conference IACC 2014.
  • Alok Chauhan, “Towards the development of a framework for socially responsible software by analyzing social media big data on cloud through ontological engineering”, International symposium on Big data and Cloud computing Challenges, 2014.
  • Prassanna, Punitha, NeelaNarayanan, “Towards an analysis of data accountability and auditing for secure cloud data storage”, International symposium on Big data and Cloud computing Challenges, 2014.
  • Christy Jackson, Abdul Quadir, Vijayakumar, “Survey on Programming Models and Environments for cluster, cloud and grid computing that defends big data”, International symposium on Big data and Cloud computing Challenges, 2014.

Year 2013

  • Saurabh Jha, Tejaswi Agarwal and B. Rajesh Kanna, Exploiting data parallelism in the yConvex hypergraph algorithm for image representation using GPGPUs, in Proceedings of International Conference on Supercomputing (ICS-12), 475-476, 2013 DOI:acm.org/10.1145/2464996.2467269
  •  Tejaswi Agarwal, Saurabh Jha and B. Rajesh Kanna, P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for Image Denoising, in Proceedings of 22nd International ACM Symposium on High-Performance Parallel and Distributed Computing (HPDC 13), abs/1306.5390, 2013, DOI:arxiv.org/abs/1306.5390,
  • Maheswari.R, Pattabiraman.V, “Simulation of Global Hazard Controller Unit in Reconfigurable OR1200 Open Source Soft-core Processor”, International Conference on Mathematical Computer Engineering, 2013.
  • Shahidha Banu, N.Maheswari, M.Geethalakshmi, “A Framework for Image Classification for an Efficient Dictionary Based Face Recognition System”,IEEE International Conference on Computational Intelligence and Computing Research(ICCIC) 26-28 ,Dec 2013.
  • Tejaswi, Maheswari.R, “Design Of A Soft-Core Processor Based On Opencores With Enhanced Processing For Embedded Applications “, International Conference on Advances in Computing, Communications and Informatics, August 2013.
  • Sonali and Maheswari.R “An Intelligent Obstacle And Over Speeding Sensor To Prevent Dashing Of Motorcycles”, International Conference On Electrical, Electronics And Computer Engineering, 14th July 2013.
  • Arun , Ashok, Maheswari.R, “Biometric Based Mobile Panel To Prevent Mobile Hacking”, International Conference On Industrial Electronics And Electrical Engineering, 2013.
  • P.Rukmani, “Scheduling algorithm for RT application in mobile adhoc mobile network with open modeler”, International Conference on Design and Manufacturing, 2013.
  • Nachiyappan. S, Justus. S., “Getting Ready for Big Data Testing: A Practitioner’s Perception”, International Conference on Computational and Networking Technologies, July 2013.
  • Sumaiya Thaseen and Ch.Aswani Kumar, “Analysis of Supervised tree based classifiers for intrusion detection system”, IEEE International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
  • P. Sandhya & M. Lakshmi (2013), Web Service Composition Based on Decision Theory under Environmental Condition of Uncertainty, National Conference on Innovations in Electrical and Electronics and Computer Science Engineering, Bangalore by, Association of Researchers and Scientists, 22 September, 2013.
  • P. Sandhya and M. Lakshmi, Processing Composite Service Requests in a Sequential Model to Minimize Total Elapsed Time, The Second National Conference on Computational Intelligence in Electrical and Electronics Engineering, 2013.

Year 2012

  •  B. Rajesh Kanna, C.Aravindan, K.Kannan, An Extended algorithm based on yConvex Hypergraph model to distinguish between simply and multiply-connected regions in digital images, National Conference on Graph theory and its Engineering Applications, SASTRA University, Thanjavur
  • B.Saleena and Dr.S.K.Srivatsa “ConSim: An Enhanced Semantic Similarity measure to find the relationship between concepts in cross ontology”, International Conference and IT Exhibition”, 3rd to 5th September, 2012.
  • Maheswari.R, Pattabiraman.V, “Parallel High Performance Reconfigurable Computing in Soft-Core Processor of Embedded Systems”, International Conference on Advanced Computing and Communications, 14th -16th December 2012.
  • Sarathkumar.J, Maheswari.N, Potential fishing zone estimation by rough cluster predictions, Fourth International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2012.DOI: 10.1109/CIMSim.2012.34, Page(s): 82 – 87.
  • Kalvina.R, Maheswari.N. Suitability Analysis of Gestures for Emergency Response Communication by Patients, Elderly and Disabled while using Data Gloves. 1st WSEAS International Conference on Information Technology and Computer Networks (ITCN’12), Book of Latest trends in Information Technology, ISSN: 1790-5109, ISBN: 978-1-61804-134-0 ,Page:256-260.
  • Emil Kuriakose John and Sumaiya Thaseen. An efficient defense system for IP Spoofing in Networks. Computer Science Conference Proceedings on Wireless and Mobile Networks, October 2012.
  • Nancy Nainan, Himika Parmar and Sumaiya Thaseen. Generation of Secure one time password based on image authentication. Computer Science Conference Proceedings on Wireless and Mobile Networks, October 2012.
  • Sasirekha and Sumaiya Thaseen. An integrated intrusion detection system for credit card fraud detection. Fifth international conference on network security and Applications, July 14, 2012.
  • S. Graceline Jasmine and V. Pattabiraman. Detection of Surface and Bedrock Region in a Polar Ice Sheet Radar Image. Proceeding of International Conference on Electrical Engineering and Computer Science (ICEECS-2012), pp.20-25, Goa, May 2012.
  • Maheswari R, Pattabiraman V. A New Technique of Embedding Multigrain Parallel HPRC in OR1200 a Soft-Core Processor. Proceeding of International Conference on Machine Learning and Computing (ICMLC 2012), Hong Kong, 10-11 March 2012.
  • Pattabiraman. V, Mahefooza. M and Suresh. K. Comparative Study on Chlorophyll Distributions in the Coastal Regions of Northeastern Arabian Sea and Southern Bay of Bengal based on Indian Seasons and Rainfall Distributions. Proceeding of Asia pacific International conference on Environmental science and Technology (APEST 2012), Kuala Lumpur, Malaysia, Feb 1-2,2012.

Year 2011

  • Saira Banu J, Sumaiya Thaseen I. A Novel Intrusion Detection Technique for Credit Card Fraud Detection. 3rd International Conference on Science, Engineering and Technology (SET), Vol.4, November 17-18, 2011.
  • K.Santhi, Sumaiya Thaseen I. Performance Analysis of FSR,LAR and ZRP Routing Protocols in MANET. 3rd International Conference on Science, Engineering and Technology(SET), Vol.5, November 17-18 2011.

Journal Publications

Year 2019

ABDUL QUADIR AND VIJAYAKUMAR V , “Combined Preference Ranking Algorithm for Comparing and Initial Ranking of Cloud Services ​” , Recent Advances in Electrical & Electronic Engineering , Vol.12 , 1 , 2019

Gillala Rekha, Amit Kumar Tyagi and V Krishna Reddy , “A Wide Scale Classification of Class Imbalance Problem and its Solutions: A Systematic Literature Review” , Journal of Computer Science , Vol.7 , 0 , 2019

D.Raghava Lavanya, G.Rekha, Amit Kumar Tyagi, Niharika Sakruti , “Class Imbalanced Data: Open Issues and Future Research Directions” , ICSCT 2019 Hyderabad , Vol.0 , 0 , 2019

Dr.K. Anusha, Dr.N. Manikandan, M.K. Nallakaruppan and Dr.U. Rahamathunnissa , “Load Balancing Prototype for Cost Proficient Fault Tolerant Geo-Distributed Datacenters” , journal of advanced research in dynamical and control systems , Vol.1 , 14 , 2019

Anusooya G, Vijayakumar V , “Reduced carbon emission and optimized power consumption technique using container over virtual machine” , Wireless Netowrks (2019) , Vol.0 , 0 , 2019

Anusooya G, Vijayakumar V, NeelaNarayanan V , “Reducing the carbon emission by early prediction of peak time load in a data center” , Journal of Intelligent & Fuzzy Systems , Vol.36 , 5 , 2019

Balasubramanian Prabhu Kavin, Sannasi Ganapathy , “A Secured Storage and Privacy-Preserving Model Using CRT for Providing Security on Cloud and IoT based Applications” , Computer Networks , Vol.151 , 0 , 2019

Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Khannah Nehemiah H, Kannan A , “An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks” , Wireless Personal Communications , Vol.0 , 0 , 2019

Sankar Pariserum Perumal, Ganapathy Sannasi, Kannan Arputharaj , “An intelligent fuzzy rule-based e-learning recommendation system for dynamic user interests” , The Journal of Supercomputing , Vol.0 , 0 , 2019

Balasubramanian Prabhu Kavin, Sannasi Ganapathy , “EC(DH)2: an effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie-Hellman” , International Journal of Internet Technology and Secured Transactions , Vol.0 , 0 , 2019

K. Thangaramya, K. Kulothungan, R. Logambigai, M. Selvi, Sannasi Ganapathy, A. Kannan , “Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT” , Computer Networks , Vol.151 , 0 , 2019

Devi T and Ganesan R , “Environmental benefits of enhanced hecc-elgamal cryptosystem for security in cloud data storage using soft computing techniques ” , Ekoloji , Vol.28 , 107 , 2019

Kevin Dudeja, Sambaran Baidya, Sahil Gupta, S. Graceline Jasmine , “Low-Cost 3DOF Virtual Reality First Aid Training Programs” , International Journal of Engineering and Advanced Technology (IJEAT) , Vol.8 , 5 , 2019

B Srividya, Harini Sriraman, Rukmani P , “Optimized multi-threading to balance energy and performance efficiency ” , International Journal of Recent Technology and Engineering , Vol.7 , 6 , 2019

Malla Sudhakar , “A novel method to detect foreground region using morphological operations with block based enhancement for underwater images” , International Journal of Engineering & Technology , Vol.7 , 3 , 2019

Arshad, Jani Anbarasi.L, Modigari Narendra, Pushbarani.S, Dhanya.D , “Investigating The Effect of Social Media Campaign on German 2017 Elections” , International Journal of Recent Technology and Engineering , Vol.8 , 1 , 2019

John singh, “Network security ” , International Journal of Advanced Intelligence Paradigms , Vol.12 , 1 , 2019

Pragya Nayak, Jenila Livingston L. M. , “Automated Notification for Improper Use of AWS Resources” , International Journal of Recent Technology and Engineering (IJRTE) , Vol.8 , 2 , 2019

Kanchana Devi V, Ganesan R , “Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS)” , Cybersecurity-Springer Open , Vol.2 , 4 , 2019

Kanchana Devi V, Ganesan R , “Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network” , Journal of ICT Research and Applications , Vol.13 , 1 , 2019

Logesh Ravi, Subramaniyaswamy, Vijayakumar, Siguang ChenA, Malathi Devarajan , “Hybrid Location-based Recommender System for Mobility and Travel Planning” , Mobile Networks and Applications , Vol.0 , 0 , 2019

Niraj Kalantri, Kumar R , “Predictive Analysis on Heart Disease Using Different Machine Learning Techniques ” , International Journal of Computer Sciences and Engineering , Vol.7 , 2 , 2019

Maheswari R, Sheeba Rani, Sharmila.P,s.Rajarao , “Personalized Secured API for Application Developer” , Springer Smart Innovations in Communication and Computational Sciences, Advances in Intelligent Systems and Computing , Vol.851 , 1 , 2019

Maheswari S, Selwyn S , “A review on Quality of service of web services” , International Journal of Mechanical Engineering and Technology , Vol.9 , 9 , 2019

Rajkumar Murugesan , S . K . Sudarsanam , Malathi . G, V. Vijayakumar , Neelanarayanan .V, Venugopal . R , D. Rekha , Sumit Saha , Rahul Bajaj , Atish , “Artificial Intelligence and Industry 5.0” , International Journal of Recent Technology and Engineering , Vol.8 , 2 , 2019

G.Malathi, Bhagavatula Aiswarya, Anushka Sharma, Rupsa Chakraborty, Malathi.G, T Raghav Kumar , “Image Processing Based Edibility Analysis of Spinach Leaves Using Machine Learning Approach ” , International Journal of Recent Technology and Engineering , Vol.7 , 6 , 2019

A Muralidhar, Ashutosh Bansal, Chunni Lal Gupta , “A Sentimental Analysis for YouTube Data using Supervised Learning Approach” , International Journal of Engineering and Advanced Technology (IJEAT) , Vol.8 , 5 , 2019

A Muralidhar, Pattabiraman V , “Enhancing the Performance of Large-scale Profitable Itemset Mining using Efficient Data Structures” , International Journal of Innovative Technology and Exploring Engineering (IJITEE) , Vol.8 , 9 , 2019

S.V.Nagaraj , “Review of Codes, Cryptology and Curves with Computer Algebra” , ACM SIGACT News , Vol.50 , 1 , 2019

Usha S Rani and Neelanarayanan V , “Comparative Study of 4-Compartmental PK-PD Model with Effective Site Compartment for Different Parameter Set” , International Journal of Reliable and Quality E-Healthcare , Vol.8 , 1 , 2019

Vijayakumar Varadarajan, Venkataraman Neelanarayanan, Ron Doyle, Imad Fakhri Al-Shaikhli, Sven Groppe , “Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks” , Mobile Networks and Applications , Vol.0 , 0 , 2019

Nisha V M, L. Jeganathan , “A symmetry based anomaly detection in brain using cellular automata for computer aided diagnosis” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.14 , 1 , 2019

P.Nithyanandam and A Dhanapal , “Wireless Networks An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks” , Wireless network , Vol.0 , 0 , 2019

M. Poongodi and V. Vijayakumar , Ashutosh, Razi Iqbal , “Etherium Blockchain Cryptocurrency PricePrediction in Industrial Finance System ” , Computer and Electrical Engineering , Vol.0 , 0 , 2019

Prakash B, Viswanathan V , “Distributed cat modeling based agile framework for software development” , Sadhana (Indian Academy of Sciences / Springer) , Vol.44 , 166 , 2019

Prakash B, Viswanathan V , “Risk Prioritization for Software Development using Grey Wolf Optimization” , International Journal of Recent Technology and Engineering , Vol.7 , 6 , 2019

M. Premalatha, V. Viswanathan , “Reducing the duration of Higher Education Study with Sequenced Course Recommendation using Categorical Subset Summation Algorithm” , International Journal of Recent Technology and Engineering , Vol.7 , 584 , 2019

D.sudha and J.Priyadarshini , “Single and Multiple Object Tracking Algorithm Based on a Particle Grouping Approach with Occlusion Handling” , european Journal of Scientific research , Vol.152 , 4 , 2019

R. Rajalakshmi, S. Ramraj and R. Ramesh Kannan , “Transfer Learning Approach for Identification of Malicious Domain Names” , Communications in Computer and Information Science , Vol.96 , 969 , 2019

R.D Jackson Samuel, B. Rajesh Kanna, , “A Programmable microscopic stage: Design and Development,” , Microscopy research and Technique, Wiley, , Vol.82 , 4 , 2019

Bharathiraja S & Rajesh Kanna B, , “Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram” , Mobile Networks and Applications , Vol.0 , 0 , 2019

Abhishek Kumar, K. Vengatesan, Rajiv Vincent, Rajesh M, Achintya Singhal , “A Novel Arp Approach for Cloud Resource Management” , International Journal of Recent Technology and Engineering (IJRTE) , Vol.7 , 5 , 2019

S. Venkatraj, Rajiv Vincent, V. Vijayakumar, K. Vengatesan, and M. Rajesh , “Development of Test Automation Framework for REST API Testing” , Journal of Computational and Theoretical Nanoscience , Vol.16 , 2 , 2019

S Rajkumar G Malathi , “Impact of Image artifact and solution to the Image Quality Issues in real time SAR images” , International Journal of Mobile networks and Applications , Vol.0 , 0 , 2019

V.Sivakumar and D.Rekha , “A QoS‐aware energy‐efficient memetic flower pollination routing protocol for underwater acoustic sensor network” , Concurrency and Computation: Practice and Experience , Vol.0 , 0 , 2019

R Bhargavi,Maya Gopal PS , “Optimum feature subset for optimizing crop yield prediction using filter and wrapper approaches” , Applied Engineering in Agriculture , Vol.35 , 1 , 2019

R Bhargavi,Maya Gopal PS , “Performance Evaluation of Best Feature Subsets for Crop Yield Prediction Using Machine Learning Algorithms” , Applied Artificial Intelligence , Vol.33 , 7 , 2019

Jothi Prabha, A., & Bhargavi, R. , “Prediction of Dyslexia from Eye Movements Using Machine Learning” , IETEJOURNALOFRESEARCH , Vol.0 , 0 , 2019

R Bhargavi,Maya Gopal PS , “Selection of Important Features for Optimizing Crop Yield Prediction” , International Journal of Agricultural and Environmental Information Systems (IJAEIS) , Vol.10 , 3 , 2019

Ashutosh Rai, Rohit Vishwkarma, Rukmani Panjanathan , “Automatic Plant Irrigation System With Real Time Notification” , International Journal of Recent Technology and Engineering , Vol.8 , 1 , 2019

B.Saleena and S.K.Srivatsa , “Using concept similarity in cross ontology for adaptive e-Learning systems” , Journal of King Saud University-Computer and Information Sciences , Vol.27 , 1 , 2019

Venugopal Boppana, Dr. Sandhya P , “Focused crawling from the basic approach to context aware notification architecture” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.13 , 2 , 2019

Sathyarajasekaran K, Ganesan R , “An Approach on Software Readiness Workflow with Change Impact Analysis (SRW-CIA)” , International Journal of Innovative Technology and Exploring Engineering (IJITEE) , Vol.8 , 7 , 2019

Sharath Kumar.J AND Maheswari.N , “Privacy Preservation Analysis in Social Network Graphs for avoiding Community Detection and Publishing Sensitive Information” , International Journal of Innovative Technology and Exploring Engineering(TM) , Vol.8 , 6 , 2019

Kiruthika Devi B.S, Trada Yashkumar, Tanisha and Subbulakshmi T , “Distributed Denial Service Attack using Splunk Visualization” , International Journal of Mechanical Engineering and Technology , Vol.10 , 2 , 2019

Udayakumar N, Subbulakshmi.T, Ayush Mishra, Shivang Mishra and Puneet Jain , “MALWARE CATEGORY PREDICTION USING KNN AND SVM CLASSIFIERS” , International Journal of Mechanical Engineering and Technology , Vol.10 , 2 , 2019

Suganya G, Premalatha M, Anushka Sharma, Muktak Pandya, Abhishek Joshi , “IoT based Automated Medicine Dispenser for Online Health Community using Cloud” , International Journal of Recent Technology and Engineering , Vol.7 , 584 , 2019

C. Sweetlin Hemalatha, Ravi Pathak, V. Vaidehi , “Hybrid decision trees for data streams based on Incremental Flexible Naive Bayes prediction at leaf nodes” , Evolutionary Intelligence – Springer , Vol.0 , 0 , 2019

Rohit Roy, S P Syed Ibrahim , “An Approach in Big Data Analytics Framework for Analysing Huge Gene Transcription Data” , International Journal of Basic Sciences & Applied Computing (IJBSAC) , Vol.2 , 7 , 2019

Anand Pandey, Aman Sharma and S P Syed Ibrahim* , “Clinical Image Analysis for Detection of Skin Cancer Using Convolution Neural Networks” , Theranostics of Respiratory & Skin Diseases , Vol.1 , 3 , 2019

Kalaivani Kalamohana, Paramasamy Gunasekaran, Syed Ibrahim , “Gene coexpression network analysis of multiple cancers discovers the varying stem cell features between gastric and breast cancer” , Meta Gene , Vol.21 , 0 , 2019

Preeti Tamrakar, S. P. Syed Ibrahim , “Lazy Learning Associative Classification with Hybrid Feature Selection” , International Journal of Recent Technology and Engineering (IJRTE) , Vol.8 , 1 , 2019

Upasana Chaudhari, Syed Ibrahim , “Stakeholder Targeting and Engagement Platform” , International Journal of Recent Technology and Engineering (IJRTE) , Vol.8 , 1 , 2019

P. Amrith, E. Umamaheswari, R.U.Anitha, Devi Mani, D M Ajay , “Smart Detection of Vehicle Accidents using Object Identification Sensors with Artificial Intelligent Systems” , ‘International Journal of Recent Technology and Engineering (IJRTE) , Vol.7 , 5 , 2019

SriniVasa Rao U and Jeganathan L , “Replication of a Binary Image on a One-Dimensional Cellular Automaton with Linear Rules ” , Complex Systems , Vol.27 , 4 , 2019

S Sibi Chakkaravarthy, V Vaidehi , “A Survey on malware analysis and mitigation techniques” , Journal: Computer Science Review , Vol.32 , 1 , 2019

Mohanraj V., Sibi Chakkaravarthy S., Vaidehi V. , “Ensemble of Convolutional Neural Networks for Face Recognition” , Recent Developments in Machine Learning and Data Analytics , Vol.0 , 0 , 2019

Sibi Chakkaravarthy. S, V. Vaidehi , and Sangeetha. D , “Intrusion Detection System for detecting wireless attacks in IEEE 802.11 networks” , IET Networks , Vol.0 , 0 , 2019

M.Poorani, P.Varalakshmi, V.Vaidehi, , “OAFPM: optimized ANFIS using frequent pattern mining for activity recognition” , The Journal of Supercomputing, Springer, US, online, March 11, 2019, pp1-20, http://doi.org/10.1007/s11227-019-02802-z. , Vol.1 , 1 , 2019

J. Joshan Athanesious, S. Sibi Chakkaravarthy, S. Vasuhi, V. Vaidehi , “Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering ” , Multimedia Tools and Applications, (Feb 2019) , Vol.1 , 1 , 2019

Ubaid Ullah, Anwar Khan,OrcID, Saleh M. Altowaijri, Ihsan Ali, Atiq Ur Rahman, Vijay Kumar V. , “”Cooperative and Delay Minimization Routing Schemes for Dense Underwater Wireless Sensor Networks”” , MDPI-Symmetry , Vol.11 , 3 , 2019

Kumar C., Sathish Kumar K., Indra Gandhi V., Vijayakumar V., Rawal B.S. , “A novel distribution system reconfiguration for loss minimization using symbiotic organism search algorithm ” , Journal of Intelligent and Fuzzy Systems , Vol.36 , 5 , 2019

Sharma A., Rathee G., Kumar R., Saini H., Vijaykumar V., Nam Y., Chilamkurti N. , “A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System” , SENSORS , Vol.19 , 9 , 2019

Sharma A., Rathee G., Kumar R., Saini H., Vijaykumar V., Nam Y., Chilamkurti N , “A secure, energy-and SLA-efficient (SESE) E-healthcare framework for quickest data transmission using cyber-physical system” , Sensors (Switzerland) , Vol.19 , 9 , 2019

Ameerul A. J. Jeman, Naeem M. S. Hannoon, Nabil Hidayat, Mohamed M. H. Adam, Ismail Musirin, Vijayakumar V , “Active and reactive power management of grid connected photovoltaic system” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.13 , 3 , 2019

Subramaniyaswamy V., Manogaran G., Logesh R., Vijayakumar V., Chilamkurti N., Malathi D., Senthilselvan N. , “An ontology-driven personalized food recommendation in IoT-based healthcare system ” , Journal of SuperComputing , Vol.75 , 6 , 2019

Tan Y., Shum H.P.H., Chao F., Vijayakumar V., Yang L. , “Curvature-based sparse rule base generation for fuzzy rule interpolation” , Journal of Intelligent and Fuzzy Systems , Vol.36 , 5 , 2019

Vijayakumar V.,Vairavasundaram S.,Logesh R., Sivapathi A , “Effective knowledge based recommender system for tailored multiple point of interest recommendation” , IGI Global, International Journal of Web Portals , Vol.11 , 1 , 2019

Ameerul A. J. Jeman, Naeem M. S. Hannoon, Nabil Hidayat, Mohamed M. H. Adam, Ismail Musirin, Vijayakumar V, , “Fault analysis for renewable energy power system in micro-grid distributed generation” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.13 , 3 , 2019

Devarajan M., Subramaniyaswamy V., Vijayakumar V., Ravi L. , “Fog-assisted personalized healthcaresupport system for remote patients with diabetes ” , Journal of Ambient Intelligence and Humanized Computing , Vol.10 , 55 , 2019

Ramya K.C., Vinoth Kumar K., Irfan M., Mesforush S., Mohanasundaram K., Vijayakumar V. , “Fuzzy based hybrid incorporating wind solar energy source by reduced harmonics” , Journal of Intelligent and Fuzzy Systems , Vol.36 , 5 , 2019

Logesh, V.Subramaniyaswamy, V. Vijayakumar, Xiao-Zhi Gao, Gai-Ge Wang , “Hybrid bio-inspired user clustering for the generation of diversified recommendations” , Springer-Neural Computing and Applications , Vol.10 , 5 , 2019

Malathi D., Logesh R.,Subramaniyaswamy V.,Vijayakumar V.,Sangaiah A.K. , “Hybrid Reasoning-based PrivacyAware Disease Prediction Support System” , Springer-Computers and Electrical Engineering , Vol.9 , 4 , 2019

Pradhan B., Vijayakumar V., Hui N.B., Sinha Roy D. , “Intelligent navigation of multiple coordinated robots” , Journal of Intelligent and Fuzzy Systems , Vol.36 , 5 , 2019

Klug N., Chauhan A., Vijayakumar V., Ragala R. , “k-RNN: Extending NN-heuristics for the TSP ” , Mobile Networks and Applications , Vol.24 , 125 , 2019

Chauhan A., Vijayakumar V., Sliman L. , “Ontology matching techniques: A gold standard model” , International Journal of Innovative Technology and Exploring Engineering , Vol.801 , 6 , 2019

Ravi L., Subramaniyaswamy V., Devarajan M., Ravichandran K.S., Arunkumar S., Indragandhi V., Vijayakumar V. , “SECRECSY: A Secure Framework for Enhanced Privacy-Preserving Location Recommendations in Cloud Environment” , Wireless Personal Communications , Vol.107 , 386 , 2019

Lavanya S., SaravanaKumar N.M., Vijayakumar V., Thilagam S. , “Secured Key Management Scheme for Multicast Network Using Graphical Password” , Mobile Networks and Applications , Vol.24 , 125 , 2019

Vishnu Priya R.,Vijayakumar V., Yang L. , “Semantics based web ranking using a robust weight scheme” , IGI Global, International Journal of Web Portals , Vol.9 , 4 , 2019

Ameerul A. J. Jeman, Naeem M. S. Hannoon, Nabil Hidayat, Mohamed M. H. Adam, Ismail Musirin, Vijayakumar V, , “Small signal fault analysis for renewable energy (wind) power system distributed generation by using MATLAB software (simulink)”” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.13 , 3 , 2019

Hannoon N.M.S., Vijayakumar V., Vengatesan K., Hidayat N. , “Stability assessment on doubly fed induction generator (DFIG) wind turbine micro grid power system” , Journal of Computational and Theoretical Nanoscience , Vol.16 , 2 , 2019

S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, Naveen Chilamkurti, R. Logesh , “SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images ” , Elsevier-Recent Measurement Articles , Vol.11 , 6 , 2019

Chanana G., Vijaya Kumar V., Geetha M. , “Understanding students’ learning experiences by mining social media data” , International Journal of Recent Technology and Engineering , Vol.7 , 6 , 2019

A. Vijayalakshmi, B.Rajesh Kanna , “Deep learning approach to detect malaria from microscopic images” , Multimedia Tools and Applications, Springer , Vol.0 , 0 , 2019

Aarthi D., Viswanathan V. , “Disambiguation of named entity with supervised technique over a knowledge base” , International Journal of Recent Technology and Engineering , Vol.7 , 6 , 2019

Supragya Raj, Siddha Prabhu Chodnekar, T Harish, Harini Sriraman , “eMDPM: Efficient Multidimensional Pattern Matching Algorithm for GPU” , International Conference on Smart Innovations in Communications and Computational Sciences , Vol.1 , 1 , 2019

Year 2018

1. VijayaKumar V, Abdul Quadir, Kiran Mary Matthew A , “An Improved Key Management Scheme in Cloud Storage” , International Journal of Advanced Intelligence Paradigms , Vol.10 , 1 , 2018

2. Kiran Mary Matthew (VIT University, Chennai Campus, Chennai, India) and Abdul Quadir Md (VIT University, Chennai Campus, Chennai, India) , “Analysis Framework for Logs in Communication Devices” , International Journal of Web Portals (IJWP) , Vol.10 , 1 , 2018

3. Sinsu Anna Mathew (VIT University, Chennai, India) and Abdul Quadir Md (VIT University, Chennai, India) , “Evaluation of Blockchain in Capital Market Use-Cases” , International Journal of Web Portals (IJWP) , Vol.10 , 1 , 2018

4. S. PRASANNA, N. MANIKANDAN, K. VIJAYAKUMAR and ANUSHA K, 2018 , “A SURVEY OF BLOCK CHAIN TECHNOLOGY FOR DIGITIZATION IN INDIA” , International Journal of Civil Engineering & Technology (IJCIET) , Vol.9 , 6 , 2018

5. Anusha Kannan, Sumathi Vijayan, Manikandan Narayanan, Monesh Reddiar , “Adaptive Routing Mechanism in SDN to Limit Congestion” , Information Systems Design and Intelligent Applications , Vol.862 , 1 , 2018

6. Vijayakumar V, Punitha.K, Sathyarajasekaran.K, Bharathiraja.S , “A COMPARATIVE ANALYSIS ABOUT LOAD BALANCING ALGORITHMS USING CLOUD SIMULATOR” , International Journal of Civil Engineering and Technology (IJCIET) , Vol.9 , 7 , 2018

7. Premalatha M, Vishwanathan V, Suganya G, Aparna V , “Educational Data Mining and Recommender Systems Survey ” , International Journal of Web Portals (IJWP) Volume 10, Issue 1 , Vol.10 , 1 , 2018

8. S Agarwal, F Patel, P Chaturvedi, S Asha” , “A Novel Approach for Communication among Blind, Deaf and Dumb People” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

9. R Prabhakaran, S Asha” , “Analysis of Cyber Physical Vulnerability Index in a Power Station” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

10. K Sanmay, S Asha , “Analysis of data from vehicle data recorder in automobile vehicles using machine learning” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

11. P UDAY, SHANKAR, C Alok, S Asha” , “DATA MINING & PREDICTIVE ANALYSIS ON AIRLINES PERFORMANCE” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

12. Mayank Kushwah, S.Bharathiraja, S.Asha” , “Detection of Malware in Windows Operating System” , International Journal of Pure and Applied Mathematics, Vol.120, No.6, 1219 – 1240, 2018 , Vol.120 , 6 , 2018

13. R Prabhakaran, S Asha , “Enhancing Cyber Security in Power Substation using RSA Algorithm and LSB Stegnography Methodology” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

14. T Rishabh, S Asha” , “Network Traffic Analysis Using Weka Tool” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

15. M Reddy, Bogati, S Asha , “Orchestration Framework and Fabric Deployment” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

16. S Asha, S Sarojini , “STUDY OF FIGHTING FINANCIAL BOTNETS CRIMEWARE TOOLKITS” , International Journal of Pure and Applied Mathematics 118 (24), 2018 , Vol.118 , 24 , 2018

17. Asnath Victy Phamila Y and Suseela G (14PHD1186) , ” Low-complexity low-memory energy-efficient image coding for wireless image sensor networks” , The Imaging Science Journal (Taylor & Francis) , Vol.66 , 2 , 2018

18. Asnath Victy Phamila Y , “Energy Efficient Image Coding Techniques for Low Power Sensor Nodes: A Review” , Ain Shams Engineering Journal, Elsevier , Vol.9 , 4 , 2018

19. Asnath Victy Phamila Y and Suseela G (Research Scholar 14PHD1186) , “Low Complexity Secured Image Compression for Wireless Image Sensor Network with Chaotic Map” , International Journal of Pure and Applied Mathematics , Vol.119 , 16 , 2018

20. Asnath Victy Phamila Y and Kalaivani K (Research Scholar) , “Modified wiener filter for restoring Landsat images in remote sensing applications” , Pertanika Journal of Science and Technology , Vol.26 , 3 , 2018

21. G. Bharadwaja Kumar and Tulasi Prasad Sariki , “A book recommendation system based on named entities” , Annals of Library and Information Studies , Vol.65 , 1 , 2018

22. G. Bharadwaja Kumar and Vaibhavi Rajendran , “A Robust Syllable Centric Pronunciation Model for Tamil Text To Speech Synthesizer” , IETE Journal of Research , Vol.0 , 0 , 2018

23. disha kaur phull, g. bharadwaja kumar , “Ameliorated language modelling for lecture speech recognition of Indian English” , Sadhana , Vol.43 , 12 , 2018

24. G. Bharadwaja Kumar and Vaibhavi Rajendran , “Prosody Detection from Text Using Aggregative Linguistic Features” , Communications in Computer and Information Science , Vol.827 , 0 , 2018

25. MashrinSrivastava, SaumyaSuvarna, ApoorvaSrivastava, S.Bharathiraja , “Automated emergency paramedical response system” , Health information science and systems , Vol.6 , 1 , 2018

26. Anusooya G, Vijayakumar.V, Punitha.K, Sathyarajasekaran.K, Bharathiraja.S , “Comparative Analysis of Load Balancing algorithm using cloud simulator” , International Journal of Civil Engineering and Technology , Vol.9 , 7 , 2018

27. KAMBHAMPATI JYOTHI, J. CHRISTY JACKSON , “A Time based approach for solving the Dynamic Path problem in VANETs – An Extension of Ant Colony Optimization” , Journal of Engineering Science and Technology , Vol.13 , 3 , 2018

28. Abraham Sudharson Ponraj and Christy Jackson , “NFC BASED PARKING SYSTEM FOR SMART CITIES ” , ARPN Journal of Engineering and Applied Sciences , Vol.13 , 11 , 2018

29. Christy Jackson J, Vijayakumar V , “Taxonomy On Evolutionary Computation Approaches In Vehicular Adhoc Networks” , International Journal of Pure and Applied Mathematics , Vol.120 , 8 , 2018

30. Priyanka. P, Deivanai. K , “A Survey on machine learning approach to mainframe analysis” , Asian Journal of Pharmaceutical and clinical Research , Vol.10 , 1 , 2018

31. U. Kanimozhi, S. Ganapathy, D. Manjula, A. Kannan , “An Intelligent Risk Prediction System for Breast Cancer Using Fuzzy Temporal Rules” , National Academy Science Letters , Vol.0 , 0 , 2018

32. R.Logambigai, Sannasi Ganapathy, A.Kannan , “Energy efficient grid based routing algorithm using intelligent fuzzy rules for wireless sensor networks” , Computers & Electrical Engineering , Vol.68 , 0 , 2018

33. P. Velvizhy, A. Pravi, M. Selvi, S. Ganapathy, A. Kannan , “FUZZY BASED REVIEW RATING PREDICTION IN E-COMMERCE ” , International Journal of Business Intelligence and Data Mining , Vol.0 , 0 , 2018

34. Vijay Kumar Thalampathy Jeyapaul, Lavanya Naidu, Khanna Nehemiah H, Ganapathy Sannasi and Kannan Arputharaj , “Identification and classification of pulmonary nodule in lung modality using digital computer” , Applied Mathematics & Information Sciences , Vol.12 , 2 , 2018

35. Karthik R.V, S. Ganapathy , “Intelligence Approaches for Sentimental Analysis in Social Networks : A Survey” , International Journal of Scientific Research in Computer Science, Engineering and Information Technology , Vol.3 , 1 , 2018

36. D. Sudaroli Vijayakumar, S.Ganapathy , “Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System” , Computer and Infromation Science , Vol.11 , 3 , 2018

37. Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., Ganapathy, S. , “Optimal and Energy Efficient Scheduling Techniques for Resource Management in Public Cloud Networks” , National Academy Science Letters , Vol.41 , 4 , 2018

38. Sankar Pariserum Perumal, Ganapathy Sannasi, Kannan Arputharaj , “REFERS: Refined & Effective Fuzzy E-commerce Recommendation System” , International Journal of Business Intelligence and Data Mining , Vol.0 , 0 , 2018

39. Selvi Munuswamy, Jothi Muneeswari Saravanakumar, Sannasi Ganapathy, Harichandran Khanna Nehemiah., Arputharaj Kannan , “Virtual force-based intelligent clustering for energyefficient routing in mobile wireless sensor networks” , Turkish Journal of Electrical Engineering and Computer Sciences , Vol.26 , 0 , 2018

40. Vergin Sarobin and Ganesan R , “Deterministic Node Deployment for Connected Target Coverage Problem in Heterogeneous Wireless Sensor Networks for Monitoring Wind Farm” , Advances in Smart Grid and Renewable Energy , Vol.0 , 0 , 2018

41. Sathya Rajasekaran, Ganesan R , “Effect of code generation in change impact analysis using MVC design pattern ” , Journal of Advanced Research in Dynamical and Control Systems , Vol.10 , 10 , 2018

42. Krishnamurthy A Ganesan R , “Effective implementation of Energy Aware Routing for Wireless Sensor Network” , Materials Today : Proceedings , Vol.5 , 1 , 2018

43. Geetha M, Ganesan R , “Enhanced cuckoo search algorithm for energy efficient cooperative communication in wireless body area networks (WBAN) ” , Journal of Advanced Research in Dynamical and Control Systems , Vol.10 , 10 , 2018

44. J.Prassanna, Prabhakaran.R, Rajiv Vincent, Khadar Nawas K and M Geetha , “IOT-ENABLED EFFICIENT SOLID WASTE MANAGEMENT SYSTEM TOWARDS BUILDING SMART CITY” , International Journal of Civil Engineering and Technology (IJCIET) , Vol.9 , 12 , 2018

45. Hemalatha Jeyaprakash, Kavitha Devi M.K., S.Geetha , “A Comparative Review of Various Machine Learning Approaches for Improving the Performance of Stego Anomaly Detection” , Handbook of Research on Network Forensics and Analysis Techniques, , IGI Global, Pennsylvania, USA , Vol.1 , 1 , 2018

46. R.Geetha, S.Geetha , “Improved Reversible Data Embedding In Medical Images Using I-IWT and Pairwise Pixel Difference Expansion” , Communications in Computers and Information Science , Vol.828 , 1 , 2018

47. G.Nirmala, S.Geetha, S.Selvakumar , “Optimal Path Planning of Mobile Robot Navigation using Hybrid Exploration and Exploitation with Hill Climbing technique” , Sylwan , Vol.162 , 5 , 2018

48. K.Angaleeswari, T.Ezhilarasan, M.Perumal, S.Geetha, V.Swaminathan , “Study on k – extensibility and Weakly k -extensibility in Harary Graphs (Hm,n), for specific values of m and n”” , International Journal of Mathematics Trends and Technology (IJMTT), Special Issue NCCFQET , Vol.1 , 1 , 2018

49. S. Graceline Jasmine, V. Pattabiraman , “Improved pure pixel identification algorithms to determine the endmembers in hyperspectral images” , Computers & Electrical Engineering , Vol.71 , 5 , 2018

50. Harini Sriraman and Pattabiraman Venkatasubbu , “Extending Lifetime Reliability Model for Multi-Threaded Architectures” , International Journal of Next-Generation Computing , Vol.9 , 1 , 2018

51. Padma Lakshmi , “Recommendation System to improve the Availability of Cabs” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

52. Avinash Thakur, V. Hepsiba Mabel , “A Critical Literature Review on Patent document mining, analysis and evaluation” , Journal of advanced research in dynamical and control systems , Vol.0 , 13 , 2018

53. Sathish Kumar P J, R. Jagadeesh Kannan , “An Enhanced and Efficient Approach for Improving the Performance of HPC Environment Using Map-Reduce With MARIANE” , Materials Today: Proceedings , Vol.5 , 1 , 2018

54. Naresh K, R. Jagadeesh Kannan , “An Enumeration of Radiotherapy Terminologies, Planning and its Optimization” , Materials Today: Proceedings , Vol.5 , 1 , 2018

55. J. Jeyapriya, K.S. Umadevi, R. Jagadeesh Kannan , “Automated Detection of Microaneurysms Using Probabilistic Cascaded Neural Network” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.11 , 3 , 2018

56. Purniemaa.P, R. Jagadeesh Kannan , “Cascaded Neural Network based Data Mining Strategy for Cloud Intrusion Detection” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.11 , 3 , 2018

57. P. Kamaraj, R. Jagadeesh Kannan, Arjun Vaithiyalingam Sudhkar , “Design and Implementation of Micro Controller Zigbee based Wireless Network for Selection of Transmit Receive Module in Radar calibration” , International Journal of Engineering and Technology , Vol.7 , 4.5 , 2018

58. Ankush Rai, R. Jagadeesh Kannan , “Differed Restructuring of Neural Connectome Using Evolutionary Neurodynamic Algorithm for Improved M2M Online Learning ” , Elsevier Procedia Computer Science, , Vol.133 , 0 , 2018

59. J. Velmurugan, R. Jagadeesh Kannan , “Dynamic Trust Factor based Energy Efficient Relay Node Selection in WHSNs” , Journal of Engineering and Applied Sciences , Vol.13 , 6 , 2018

60. S. Shanthi, R.Jagadeesh Kannan, S. Santhi , “Efficient secure system of data in cloud using steganography based cryptosystem with FSN” , Materials Today: Proceedings , Vol.5 , 1 , 2018

61. Ankush Rai, R. Jagadeesh Kannan , “Evolutionary Neurodynamic Algorithm Based Data Driven Modeling of Non-Linear Systems” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

62. J. Subramaniam J.K. Raju and D. Ebenezer , “Fast median-finding word comparator array” , IET Electronic Letters , Vol.53 , 21 , 2018

63. S.Shanthi, R. Jagadeesh Kannan, S. Shanthi , “Fuzzified Graph Percolation Method for Ontological Data Anonymization of Patient Healthcare Database ” , International Journal of Engineering and Technology , Vol.7 , 4.5 , 2018

64. Subramanian Shanmugavel, R. Jagadeesh Kannan, Arjun Vaithiyalingam Sudhkar , “Handwritten Optical Character Extraction and Recognition from Catalogue Sheets” , International Journal of Engineering and Technology , Vol.7 , 4.5 , 2018

65. Gayathri. M, R. Jagadeesh Kannan , “Ontology Based Indian Medical System” , Materials Today: Proceedings , Vol.5 , 1 , 2018

66. J. Subramaniam. Raju Jagadeesh Kannan and D. Ebenezer , “Parallel and Pipelined 2D Median Filter Architecture” , IEEE Embedded systems Letters , Vol.10 , 3 , 2018

67. Ankush Rai, R. Jagadeesh Kannan , “Quasi Opportunistic Supercomputing using Population Coding of Neurons in Integration with Co-Simulated Networking” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

68. P.J. Sathish Kumar, R. Jagadeesh Kannan, Arjun Vaithiyalingam Sudhkar , “Real Time Symptomatic Analysis for Efficient Disease Prediction and Recommendation Generation using Multi Level Symptom Similarity Measure” , International Journal of Engineering and Technology , Vol.7 , 4.5 , 2018

69. Suresh Kumar, R. Jagadeesh Kannan , “Review of Advancements in Multi-tenant Framework in Cloud Computing” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.11 , 3 , 2018

70. Prabakaran N, R. Jagadeesh Kannan , “Smart Objects Assisted Event Detection System Using Wireless Sensor Networks” , Materials Today: Proceedings , Vol.5 , 1 , 2018

71. Ankush Rai, R. Jagadeesh Kannan , “Translational Network: Networked Infrastructure for Scalable Drone Services” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

72. R. Jaya, C.S. Pillai, R. Jagadeesh Kannan, Arjun Vaithiyalingam Sudhkar , “Type-2 Fuzzy Based Artificial Neural Fuzzy Inference System For Query Processing In Ayurvedic Database” , International Journal of Engineering and Technology , Vol.7 , 4.5 , 2018

73. Malla Sudhakar , “An Efficient Eye Region Detection by Gamma Correction for Real Time Application” , Journal of Advanced Research in Dynamical and Control Systems , Vol.9 , 8 , 2018

74. Sekar S N, Jani Anbarasi L,Dhanya D , “An efficient distributed compressive Sensing framework for reconstruction of sparse signals in mechanical systems” , International Journal of Mechanical Engineering and Technology (IJMET) , Vol.9 , 13 , 2018

75. Jayasudha , “An Empirical Study of Accident Reportin Data Mining Techniques ” , International journal of pure and applied Mathematics , Vol.116 , 1 , 2018

76. Ashutosh Satapathy & Jenila Livingston LM , “A DENIAL OF SERVICE ATTACK ON DHCP SERVER AND ITS COUNTERMEASURES ” , ARPN Journal of Engineering and Applied Sciences , Vol.13 , 12 , 2018

77. Ashutosh Satapathy & Jenila Livingston LM , “An Intelligent Framework Prototype for Monitoring Students in Virtual Classroom” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.12 , 3 , 2018

78. Maheswari S and Justus S , “A Review On The Quality Of Service Of Web Services” , International Journal of Mechanical Engineering and Technology , Vol.9 , 12 , 2018

79. Sridhar R, Justus S , “A study on the use of Datamining to Improve Performance and Security of Intelligent Transportation Systems” , International Journal of Mechanical Engineering and Technology , Vol.9 , 13 , 2018

80. Sridhar R, Justus S , “AUTOMATIC EXTRACTION OF ACRONYMS FROM ENGLISH NEWSPAPERS” , International Journal of Mechanical Engineering and Technology , Vol.9 , 6 , 2018

81. ustus Selwyn and Meenakshi K. Sundaram , “Evaluating the Dynamic Metrics for Object-Relational Modeling” , International Journal of Knowledge Based Computer Systems , Vol.6 , 1 , 2018

82. Hepsiba Mabel and Justus S , “Preliminary Results on the Implementation of Music Expert System” , International Journal of Engineering and Applied Sciences , Vol.13 , 14 , 2018

83. Sangavi VP, Kanchana Devi V, Kavya Alluru , “Language Geography Based Communication Medium Using Geographic Information System” , International Journal of Computer Techniques , Vol.5 , 3 , 2018

84. Kanchana Devi V, B. Gayathri , “Machine Learning for Real Estate Contracts- Automatic Categorization of Text” , International Journal of Computer Techniques , Vol.5 , 2 , 2018

85. V. KANCHANA DEVI, A. DAVID MAXIM GURURAJ, A. KAVYA, E. UMAMAHESWARI , “TRUCK TRACKING AND ALERTS MONITORING SYSTEM” , International Journal of Civil Engineering & Technology (IJCIET) – Scopus Indexed , Vol.9 , 11 , 2018

86. Karmel A, Adhithiyan. M, Senthil Kumar. P , “MACHINE LEARNING BASED APPROACH FOR POTHOLE DETECTION” , International Journal of Civil Engineering and Technology , Vol.9 , 5 , 2018

87. Purvi Pathak, Dr. Kumar Rangasamy and Theophilus Selvaraj , “Security Analytics and Benchmarking Log Aggregation in the Cloud” , EAI Endorsed Transactions on Cloud Systems , Vol.3 , 11 , 2018

88. N Maheswari, Andrews Samraj, MV Vijayakumar , “An Efficient Score level Multimodal Biometric System using ECG and Fingerprint” , Journal of Telecommunication, Electronic and Computer Engineering (JTEC) , Vol.10 , 4 , 2018

89. Aditya Narhari Khobragade,N.Maheswari,M.sivagami , “ANALYZING THE HOUSING RATE IN A REAL ESTATE INFORMATIVE SYSTEM: A PREDICTION ANALYSIS” , International Journal of Civil Engineering and Technology (IJCIET) , Vol.9 , 5 , 2018

90. Adithya Subramanian , Sivagami M , Maheswari N , “Improved speeded up robust features for low contrast images” , International Journal of Engineering & Technology(UAE) , Vol.7 , 4 , 2018

91. N Maheswari Anuradha M, Sheryl Oliver A, Jean Justus J , “IOT based monitoring system to detect the ECG of soldiers using GPS and GPRS” , Biomedical Research , Vol.29 , 20 , 2018

92. N Maheswari Sheryl Oliver A, Anuradha M, Jean Justus J , “Optimized low computational algorithm for elderly fall detection based on machine learning techniques” , Biomedical REsearch , Vol.29 , 20 , 2018

93. Maheswari R, Sheeba Rani, Sharmila.P, Gomathy , “Cancer Detecting Nanobot using Positron Emission Tomography” , Elsevier Procedia Computer Science , Vol.133 , 1 , 2018

94. Maheswari R, Sheeba Rani, Sharmila.P, Gomathy , “IoT Driven Vehicle License Plate Extraction Approach ” , International Journal of Engineering & Technology , Vol.2 , 24 , 2018

95. Maheswari R, Sheeba Rani, Sharmila.P, Gomathy , “Real Time Environment Simulation through Virtual Reality ” , International Journal of Engineering & Technology , Vol.7 , 24 , 2018

96. S.Sheeba Rani Gnanamalar, P.Sharmila , V.Gomathy , “SOLAR POWERED SYSTEM-ON-CHIP FOR METEOROLOGICAL DATA STATION ” , International Journal of Pure and Applied Mathematics , Vol.118 , 20 , 2018

97. G.Malathi and E.Gokulakrishnan , “CONTACTLESS NOVEL HAND WRIST BIOMETRICS FEATURE DETECTION USING SURF” , International Journal of Civil Engineering and Technology , Vol.9 , 11 , 2018

98. S.V.Nagaraj , “Review of Trends in Computational Social Choice” , ACM SIGACT NEWS , Vol.49 , 2 , 2018

99. Deepali Gothawal and SV Nagaraj , “Security issues in IOT layers and its applications: A review” , international Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

100. Gayathri R and Neelanarayanan V , “DoS detection solution for cloud platform using SNMP” , International Journal of Pure and Applied Mathematics , Vol.118 , 23 , 2018

101. Neelanarayanan V and Aparna V , “Modernizing legacy systems: A re-engineering approach ” , International Journal of Web Portals , Vol.10 , 2 , 2018

102. Arunkumar Gopu, Neelanarayanan Venkataraman , “Optimal VM placement in distributed cloud environment using MOEA/D” , Soft Computing , Vol.0 , 0 , 2018

103. Vijayakumar Varadarajan, P Nithyanandam, Neelanarayanan Venkataraman, Guillaume Blin , “Special Issue: Innovative mobile technology” , Int. J. of Image Mining , Vol.2 , 3 , 2018

104. Nisha Vellarayil Mohandas and Lakshmanan Jeganathan , “Classification of Two Dimensional Cellular Automata Rules for Symmetric Pattern Generation” , Symmetry-Basel , Vol.10 , 12 , 2018

105. Nithya Darisini P.S, Pounambal M, Nagaraju D and Saritha V , “An Adaptive fault tolerance mechanism in grid computing” , ARPN journal of engineering and applied sciences , Vol.13 , 7 , 2018

106. Vignesh.U , Parvathi.R , “3D visualization and cluster analysis of unstructured protein sequences using ARCSA with a file conversion approach” , The Journal of Super Computing , Vol.0 , 0 , 2018

107. Monika,K.M,Parvathi.R , “Correlation analysis of community detection in social network of big data methodical using set theorem” , International Journal of Engineering & Technology(UAE , Vol.7 , 2.2 , 2018

108. Dharini, Parvathi , “Event Detection from Twitter – A Survey” , International Journal of Web Information Systems , Vol.14 , 3 , 2018

109. R. Anto Arockia Rosaline and R. Parvathi , “Sensing the mood on crimes against women by exploring social media using dimensional model ” , International Journal of Engineering and Technology(UAE) , Vol.7 , 2.2 , 2018

110. Mehfooza Munavar and Pattabiraman. V , “Analysis of Supervised Machine Learning Techniques On The Application of the Indian Coastal Dataset” , International Journal of Pure and Applied Mathematics , Vol.118 , 18 , 2018

111. Harini Sriraman and Pattabiraman Venkatasubbu , “Extending lifetime reliability model for multi-threaded architectures ” , International Journal of Next-Generation Computing , Vol.9 , 1 , 2018

112. M. Poongodi* and V. Vijayakumar , Naveen , “Bitcoin Price Prediction using ARIMA Model” , Int. J. of Internet Technology and Secured Transactions, Inderscience , Vol.5 , 2 , 2018

113. Poongodi M, Vijayakumar V, Xio Gao , “Chatbot Based NL interface for Blogs and Information Networks” , International Journal of Web Based Communities, Inderscience , Vol.10 , 5 , 2018

114. Poongodi M, Vijayakumar V, Bharat Rawal, Vaibhav Bharadwaj, Tanay Agarwal and Ankit Jain , “Recommendation Model Based on Trust Relations & User Credibility” , Journal of Intelligent and Fuzzy Systems , Vol.10 , 2 , 2018

115. M.Poongodi and Arvind Jeyachandran , “Securing Cloud information with the use of Bastion Algorithm to enhance Condentiality and Protection” , International journal of Pure and Applied mathematics , Vol.118 , 24 , 2018

116. T S Pradeep Kumar, M Alamelu , “PERM based service Prediction model for Groundwater Level Analysis” , TAGA JOURNAL OF GRAPHIC TECHNOLOGY , Vol.14 , 3 , 2018

117. T S Pradeep Kumar, P Venkata Krishna , “Power modelling of sensors for IoT using reinforcement learning” , International Journal of Advanced Intelligence Paradigms , Vol.10 , 1 , 2018

118. T S Pradeep Kumar, M Alamelu , “Unique Identical Weightage (UIW) Model for Real Time Customer Search Queries” , International Journal of Recent Technology and Engineering(TM) , Vol.7 , 4 , 2018

119. G.Leena suganthi, M. Premalatha , “Comparative Study On Classification Algorithms” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

120. M. Premalatha, V. Viswanathan, G. Suganya, M. Kaviya, Aparna Vijaya , “Educational Data Mining and Recommender Systems Survey” , International Journal of Web Portals , Vol.10 , 1 , 2018

121. Manickavasagam Priyaadharshini, Bala Vinayaga Sundaram , “Evaluation of higher‐order thinking skills using learning style in an undergraduate engineering in flipped classroom” , Computer Application in Engineering Education , Vol.26 , 6 , 2018

122. R. Rajalakshmi and Chandrabose Aravindan , “A Naive Bayes approach for URL classification with supervised feature selection and rejection framework” , Computational Intelligence , Vol.34 , 1 , 2018

123.Subhangi Chakraborty , Rajarajeswari. s , “FUNCTIONAL DESIGN AND SPECIFICATION FOR PLANT SECURITY AND SURVEILLANCE SYSTEM” , International Journal of Pure and Applied Mathematics , Vol.118 , 24 , 2018

124. Dinesh Jackson Samuel R, B Rajesh Kanna , “Cybernetic microbial detection system using transfer learning” , Multimedia Tools and Applications , Vol.0 , 0 , 2018

125. Rajesh Kanna B , Mohd Shafi Bhat , Vijayalakshmi C , Alex Noel Joseph Raj , “Model to estimate the salt and pepper noise density level on gray-scale digital image” , EAI Endorsed Transactions on Energy Web and Information Technologies , Vol.5 , 6 , 2018

126. Dinesh Jackson Samuel, R. & Rajesh Kanna, , “Tuberculosis (TB) detection system using deep neural networks” , Neural Computing and Applications , Vol.0 , 0 , 2018

127. Rajesh Kumar , “Strengthening SSL Security with attribute certificate” , EUDL EAI Endorsed Transaction on cloud system , Vol.18 , 11 , 2018

128. Rajesh M, Y Sahana and Rajiv Vincent , “A Predictive Based Localization Method for Wireless Sensor Network” , International Journal of Pure and Applied Mathematics , Vol.120 , 8 , 2018

129. Rajiv Vincent, Vijitha A and Rajesh M , “An Effective Monitoring System for Face Recognition using Principle Component Analysis and Linear Discriminant Analysis” , International Journal of Pure and Applied Mathematics , Vol.120 , 8 , 2018

130. Padma Priya R, Agarwal Ruchi Sanjay, Yesho Vardhan Gupta, D. Rekha , “Investigating feasible tool for swarm robotic based oil skimming application” , International Journal of Engineering and Technology , Vol.7 , 0 , 2018

131. D.Rekha, V.Sivakumar , “Node scheduling problem in underwater acoustic sensor network using genetic algorithm” , Personal and Ubiquitous Computing , Vol.22 , 06-May , 2018

132. V.Sivakumar, D.Rekha , “Underwater acoustic sensor node scheduling using an evolutionary memetic algorithm” , Journal of Telecommunications and Information Technology , Vol.1 , 1 , 2018

133. Maya Gopal, P.S & Bhargavi, R , “Feature Selection for Yield Prediction Using Boruta Algorithm” , International Journal of Pure and Applied Mathematics , Vol.118 , 22 , 2018

134. Tejas Anant Wagh, R Bhargavi, Tanmay Anant Wagh and R M Samant , “Forest Cover Type Prediction using Cartographic Variables” , International Journal of Computer Applications , Vol.182 , 30 , 2018

135. PRABHA A, Jothi; R, Bhargavi; RAGALA, Ramesh , “Prediction of dyslexia using support vector machine in distributed environment” , International Journal of Engineering & Technology , Vol.7 , 4 , 2018

136. B. Rakhesh and S. Renuka Devi , “A SURVEY TO ANALYSE MITIGATION TECHNIQUES FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS” , International Journal of Civil Engineering and Technology , Vol.9 , 11 , 2018

137. Gaurav Srikar & Reshmi TR , “A Fuzzy-Logic based CLustering Algorithm in WSN to Extend Network Lifetime” , International Journal of Applied Engineering Research , Vol.13 , 10 , 2018

138. Reshmi TR, Shyamala L, Sandhya MK , “Mitigation of selfish node attacks in autoconfiguration of manets” , Internation journal of advances in applied sciences , Vol.7 , 2 , 2018

139. Poornima and Saleena , “Automatic annotation of educational videos for enhancing information retrieval” ,  Pertanika Journal of Science and Technology , Vol.4 , 26 , 2018

140. N Poornima , “Multi model features and correlation incorporated Naive Nayes classifier for a semantic-enriched lecture video retrievel system” , The Imaging Science Journal , Vol.0 , 0 , 2018

141. A. Sudha Ramkumar , B. Poorna and B. Saleena , “Ontology Based Text Document Clustering for Sports ” , Journal of Engineering and Applied Sciences , Vol.13 , 11 , 2018

142. Sandhya P , “ENSEMBLE LEARNING ON FORECASTING FINE GRAINED POLLUTANT LEVELS IN AIR USING RANDOM FOREST, NAIVE BAYES, DECISION TREE ALGORITHMS” , International Journal of Civil Engineering and Technology (IJCIET) , Vol.9 , 7 , 2018

143. Sandhya P., Siddharth Gupta, G. Saikishan and Harsh Mohan Garg , “Smart Home using IOT” , ARPN Journal of Engineering and Applied Sciences , Vol.13 , 13 , 2018

144. B Sathis Kumar , “simplifying use case transaction identification by using architects use case diagram” , Journal of advanced research in dynamical control systems , Vol.0 , 9 , 2018

145. Sathyarajasekaran K, Ganesan R , “Change impact analysis (CIA) and its role in analysis and design of software development” , International Journal of Engineering and Advanced Technology , Vol.8 , 2 , 2018

146. Sathyarajasekaran K, Ganesan R , “Effect of Code Generation in Change Impact Analysis using MVC Design Pattern” , Journal of Advanced Research in Dynamical & Control Systems , Vol.10 , 10 , 2018

147. Sharath Kumar.J AND Maheswari.N , “An Approach Towards Privacy Preservation of Sensitive Information in Social Networked Graphs” , Journal of Advanced Research in Dynamical and Control Systems – JARDCS , Vol.0 , 10 , 2018

148. Dr.G.Raju, KANNUR UNIVERSITY, KANNUR. , “A Literature Survey on the Performance Evaluation Model of Semantics enabled Web services” , INTERNATIONAL JOURNAL OF ADVANCED INTELLIGENCE AND PARADIGMS , Vol.10 , 10 , 2018

149. Dr.G.Raju, KANNUR UNIVERSITY, KANNUR. , “Ontology based Annotation Verification framework for Semantics enabled Web Services” , Journal of Engineering and Applied Sciences , Vol.13 , 9 , 2018

150. Shyamala Loganathan1, Anitha Balaji , “ADAPTIVE RANK BASED SCHEDULING IN AN INSTITUTIONAL CLOUD ORIENTED DISTRIBUTED DATACENTERS ” , International Journal of Civil Engineering & Technology (IJCIET) , Vol.9 , 7 , 2018

151. viral Srivastava, Fenil Patel and Prof. M Sivagami , “A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT BASED HEALTHCARE APPLICATIONS” , International Journal of Software Engineering and Applications , Vol.9 , 1 , 2018

152. “M. Sivagami, T. Revathi, L. Jeganathan,” , “Dynamiic Background Modelling using Multiswarm Optimization” , International Journal of BioInformatics Research and Applications , Vol.15 , 1 , 2019

153. Chandni Naidu, Dhanush Kumar, N Maheswari, M Sivagami , “Prediction of Alzheimer’s Disease using Brain images” , Research Journal of Pharmacy and Technology , Vol.11 , 12 , 2018

154. Sridhar Ranganathan and Justus Selwyn , “A STUDY ON THE USE OF DATA MINING TO IMPROVE PERFORMANCE AND SECURITY OF INTELLIGENT TRANSPORTATION SYSTEMS” , International journal of mechanical engineering and technology , Vol.9 , 13 , 2018

155. Sridhar Ranganathan and Srivatsan Kannan , “A SURVEY OF ENTITY IDENTIFICATION AND CLUSTERING USING TEXT PROCESSING FROM NEWSPAPER” , International Journal of Civil Engineering and Technology (IJCIET) , Vol.9 , 1 , 2018

156. Subbulakshmi T, Mahesh Babu KV and Kiruthika Devi B S , “A Survey of Security Models using Effective Moving Target Defenses” , International Journal of Information Security and Privacy , Vol.12 , 3 , 2018

157. Hemalatha, C. S., Sankaran, V., Vaidehi, V., Sharmi, P., Lavanya, B., Vasuhi, S., & Kumar, R. , “Symmetric Uncertainty based Search Space Reduction for Fast Face Recognition” , International Journal of Intelligent Information Technologies , Vol.4 , 4 , 2018

158. G. Suganeshwari and S.P. Syed Ibrahim , “A Comparison Study on Similarity Measures in Collaborative Filtering Algorithms for Movie Recommendation” , International Journal of Pure and Applied Mathematics , Vol.119 , 15 , 2018

159. Preeti Tamrakar and S.P. Syed Ibrahim , “A Review of Lazy Learning Associative Classifications” , International Journal of Pure and Applied Mathematics , Vol.119 , 15 , 2018

160. Preeti Tamrakar and S. P. Syed Ibrahim , “ATTRIBUTE RANKING BASED LAZY LEARNING ASSOCIATIVE CLASSIFICATION” , ARPN Journal of Engineering and Applied Sciences , Vol.13 , 11 , 2018

161. L. Anand & S. P. Syed Ibrahim , “HANN: A Hybrid Model for Liver Syndrome Classification by Feature Assortment Optimization” , Journal of Medical Systems , Vol.42 , 11 , 2018

162. Suganeshwari G, Syed Ibrahim SP, Gang Li , “Lazy Collaborative Filtering with Dynamic Neighborhoods” , Information Discovery and Delivery , Vol.46 , 2 , 2018

163. Siddique Ibrahim S.P., Sivabalakrishnan M., Syed Ibrahim S.P. , “Lazy learning associative classification in MapReduce framework” , International Journal of Recent Technology and Engineering , Vol.7 , 4 , 2018

164. Osho Agyeya , “Performance Evaluation of Guest Operating System Following Obliteration of Pre-Installed Features” , International Journal of Innovative Research in Computer and Communication Engineering , Vol.6 , 4 , 2018

165. Dr.E.Umamaheswari & Besnet George , “An Overview of the Impact of Fog Computing and Internet of Things on Cloud Computing and Its Challenges” , Journal of Advanced Research in Dynamical and Control Systems , Vol.12 , 12 , 2018

166. DINESH KUMAR K, UMAMAHESWARI E , “Efficient Cloud Resource Scaling based on Prediction Approaches” , International Journal of Engineering & Technology , Vol.7 , 10 , 2018

167. DINESH KUMAR K, UMAMAHESWARI E , “Prediction methods for effective resource provisioning in cloud computing: A survey” , Multiagent and Grid Systems , Vol.14 , 3 , 2018

168. K Dinesh Kumar and E Umamaheswari , “Resource Provisioning in Cloud Computing Using Prediction Models – A Survey” , International Journal of Pure and Applied Mathematics , Vol.119 , 9 , 2018

169. DINESH KUMAR K, UMAMAHESWARI E , “Resource Provisioning in Cloud Computing Using Prediction Models: A Survey” , International Journal of Pure and Applied Mathematics , Vol.119 , 9 , 2018

170. E Umamahewari1 *, Krishnaveni S2 , Xiao-Zhi Gao3 , “Trace Crawler” , International Journal of Engineering & Technology , Vol.7 , 10 , 2018

171. Mohanraj, V, Vaidehi, V, Vasuhi, S & Ranajitkumar , “A Novel Approach for Face Recognition under Varying Illumination Conditions” , International Journal of Intelligent Information Technologies , Vol.14 , 2 , 2018

172. Mohan Raj., Gogul I., Deepan Raj M., Sathiesh Kumar V., Vaidehi V., Sibi Chakkaravarthy S , “Analyzing ConvNets Depth for Deep Face Recognition” , Proceedings of 2nd International Conference on Computer Vision; Image Processing, Advances in Intelligent Systems and Computing , Vol.703 , 0 , 2018

173. Sibi Chakkaravarthy. S , Sangeetha. D, M. V. Rathnam, K. Srinithi, and V. Vaidehi , “Futuristic cyber-attacks” , International Journal of Knowledge-based and Intelligent Engineering Systems , Vol.22 , 3 , 2018

174. Sibi Chakravarthy, V.Vaidehi , “Hybrid Analysis Technique to detect Advanced Persistent Threats” , International Journal of Intelligent Information Technologies (IJIIT) , Vol.14 , 2 , 2018

175. Mohanraj, V. Sibi Chakkaravarthy, Gogul, Sathiesh Kumar, Kumar, Ranajit, Vaidehi, V. , “Hybrid feature descriptors to detect face spoof attacks” , Journal of Intelligent & Fuzzy Systems, IOS Press , Vol.34 , 3 , 2018

176. K.Kalyana Chakravarthi,Vaidehi Vijayakumar , “Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey” , International Journal of Electrical and Computer Engineering (IJECE), , Vol.8 , 2 , 2018

177. Vergin Raja Sarobin M,Simrandeep Singh, Abhay Khera, Lakshya Suri, Chhavi Gupta, Ayush Sharma , “Forest Fire Detection using IoT Enabled Drone” , International Journal of Pure and Applied Mathematics , Vol.119 , 12 , 2018

178. “• R. Logesh, V. Subramaniyaswamy, V. Vijayakumar, Xiao-Zhi Gao, V. Indragandhi” , “A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city” , Future Generation Computer Systems, ELSEVIER , Vol.6 , 83 , 2018

179. R. Logesh and V. Subramaniyaswamy*, V. Vijayakumar , “A personalised travel recommender system utilising social network profile and accurate GPS data ” , Electronic Government, An International Journal , Vol.14 , 1 , 2018

180. J. Christy Jackson; V. Vijayakumar , “A review on congestion control system using APU and D-FPAV in VANET” , Int. J. of Advanced Intelligence Paradigms , Vol.10 , 4 , 2018

181. Editor(s)-in-Chief: V. Vijayakumar and NeelaNarayanan V. , “EAI Endorsed Transactions on Cloud Systems” , EAI Endorsed Transactions on Cloud Systems , Vol.2 , 5 , 2018

182. R. Logesh and V. Subramaniyaswamy, V. Vijayakumar , “Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users” , Springer-Mobile Networks and Applications , Vol.10 , 2 , 2018

183. V. Vijayakumar, M. K. Priyan, G Ushadevi, R. Varatharajan, Gunasekaran Manogaran, Prathamesh Vijay Tarare , “E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption” , Springer-Mobile Networks and Applications , Vol.10 , 3 , 2018

184. K.Karthikeyan,R.Sunder,K.Shankar,S.K.Lakshmanaprabu,V.Vijayakumar,Mohamed Elhoseny, Gunasekaran Manogaran , “Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA)” , he Journal of Supercomputing, Springer , Vol.74 , 10 , 2018

185. R. LogeshV. Subramaniyaswamy D. MalathiN. Sivaramakrishnan V. Vijayakumar , “Enhancing recommendation stability of collaborative filtering recommender system through bio-inspired clustering ensemble method” , Springer-Neural Computing and Applications , Vol.9 , 3 , 2018

186. Vishnu Priya R.,Vijayakumar V., Tavares J.M.R.S. , “MQSMER: a mixed quadratic shape model with optimal fuzzy membership functions for emotion recognition” , Springer-Neural Computing and Applications , Vol.9 , 4 , 2018

187. Kamal A. Al-Khayyat, Imad F. Al-Shaikhli, V. Vijayakuumar , “On Randomness of Compressed Data Using Non-parametric Randomness Tests” , Bulletin of Electrical Engineering and Informatics , Vol.7 , 1 , 2018

188. Bharat S. Rawal1 • V. Vijayakumar2 • Gunasekaran Manogaran3 • R. Varatharajan4 • Naveen Chilamkurti5 , “Secure Disintegration Protocol for Privacy Preserving Cloud Storage” , Springer Wireless Pers Communication , Vol.98 , 1 , 2018

189. Islam M.R., Al-Shaikhli I.F., Nor R.B.M.,Varadarajan. Vijayakumar , “Technical approach in text mining for stock market prediction: A systematic review” , Indonesian Journal of Electrical Engineering and Computer Science , Vol.10 , 2 , 2018

190. Kamal Al Khayyat, Imad Fakhri Al-Shaikhli, Vijaykumar V , “Using Pre-Determined Patterns to Analyze the Common Behavior of Compressed Data and Their Compressibility Apeal” , International Journal of Engineering and Technology(UAE) , Vol.7 , 2 , 2018

191. S. Alaudeen Basha and V. Vijayakumar , “Wavelet Transform Based Satellite Image Enhancement” , Journal of Engineering and Applied Sciences , Vol.13 , 4 , 2018

192. Brindha J., Vijayakumar V , “Web of-things devices based on DNS name auto pattern in IPV4 system using DNSNAV4” , Indian Journal of Public Health Research and Development , Vol.9 , 3 , 2018

193. A. Vijayalakshmi, C. John Paul , “Big Data Health Care System Using Distributed Wearable Sensors ” , International Journal of Engineering & Technology , Vol.4 , 10 , 2018

194. Vishnu Priya R, Sparsha Saha, Sridhar Swain , “POS TAGGING AND SENTIMENT ANALYSIS OF TWEETS USING STATE MACHINE” , International journal of pure and applied mathametics , Vol.119 , 16 , 2018

195. Akanksha Madan Thorat, R. Vishnu Priya , “Sentiment Analysis of Movie Review Using Text Mining” , International Journal of Pure and Applied Mathematics , Vol.119 , 16 , 2018

196. Prakash, B., Viswanathan, V. , “Ontology based risks management model for agile software development” , Journal of Advanced Research in Dynamical and Control Systems , Vol.10 , 11 , 2018

197. Sarobin, V.R, Gondalia, A., Dixit, D , “IoT-based Healthcare Monitoring System for War Soldiers using Machine Learning” , Procedia Computer Science , Vol.133 , 1 , 2018

198. 1Vaibhav Swaminathan, 2Abhineet Joshi and 3Prof.Sajidha. S.A , “Comparative Study on Stock Market Prediction Techniques Based On Artificial Intelligence” , International Journal of Pure and Applied Mathematics , Vol.118 , 18 , 2018

Year 2017

Year 2016

Year 2015

1. Vijaya lakshmi. A, B. Rajesh Kanna, Enhanced Quality of Service in Visualizing the Malaria Data using Cloud Computing, ARPN Journal of Engineering and Applied Sciences, Article under press

Year 2014

1. E.Umamaheswari, Dr. D.K.Ghosh and Dr.N.Bhalaji “Software Engineering Measures Using Radial Basis Function Neural Network”,International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 23 (2014) pp. 22629-22639 © Research India Publications.

2. Rashmi Ranjan Dhal, B V A N S S Prabhakar Rao, “Service Cost Estimation in Cloud Environment Using a Third Party Web Server: A Comparative Analysis With and Without Using Cloud Computing”, IOSR-Journal of Computer Engineering, Vol. 16, Issue 1, pp 72-77, 2014.

3. B.Saleena, S.K.Srivatsa, “An Automated Approach to Extract Domain Ontology for E-Learning System”, International Journal of Innovation and Learning, Inderscience Publishers, Vol. 15, No.3, pp.254-273, 2014.

4. B.Saleena, S.K.Srivatsa, ”Designing a Novel Cross ontology measure to Extract Resources from Knowledge Base For An Adaptive E-Learning System”, International Journal of Metadata, Semantics and Ontologies, Inderscience Publishers, Vol.9 ,No.3, pp 193-203, 2014.

5. G Bharadwaja Kumar, Sneha D.L., “Comparison of Various Bilingual Sentence Alignment Methods for Parallel Corpora Development”, International Journal of Engineering, Research and Technology, Vol. 3, Issue 4, 2014.

6.P. Sandhya & M. Lakshmi, “Enhancing Service Provider’s Profitability and Determining the Frequency of Selection of Web Services for Composition using Dynamic Programming Approach”, PARIPEX Indian Journal of Research, The Global Journals, Vol. 3, Issue 2, pp. 26-31, 2014.

7. P.V.Vijayakumar, A.Vijayalakshmi “Association Rule Mining a hash based technique using Directed A-Cyclic Graph”, International Journal of Engineering Research and Technology, Vol.3, pp.1923-1926, 2014.

8. Umamaheswari E ,Ghosh D.K., “Software quality: dual Experts opinion and conditional based aggregation method”, International Journal of Engineering and Technology, Vol.6, No.2,pp.1167-1175, 2014.

9. R.Kumar, “Priority based resource scheduling algorithm in cloudsim”, International Journal of Science and Research, Vol.3, pp.312-315, 2014.

10. Justus, Alagarsamy K, Hepsiba Mabel V, “Knowledge based Chords Manipuation in MES”, International Journal of Computer, Information Sciences and Engineering, Vol. 8, No.:1, 2014.

11. Viswanathan, V., Ilango Krishnamurthi, “Finding relevant Semantic Association paths using semantic ant colony optimization algorithm”, Soft Computing, 2014.

12. Atul Singh, Sharath Kumar, Muralidhar, “A secure Multi-tenant model for saas system”, International Journal of Computer Applications, Vol.90, Issue 15, PP.1-5, 2014.

13. P. Sandhya, M. Lakshmi, Enhancing Service Provider’s Profitability and Determining the Frequency of Selection of Web Services for Composition using Dynamic Programming Approach”, PARIPEX Indian Journal of Research, The Global Journals, Vol. 3, Issue 2, February 2014, pp. 26-31, 2014.

Year 2013

1. B. Rajesh Kanna, An adoptive approach in demosaicing true color from digital camera having bayer color filter, International Journal of Computer Science & Engineering Technology, 4, (10), 2013, 1271-1276

2. M.Sakthi Ganesh, Venkata Krishna, “Improving Frequent Link Failure Detection in VANETS”, International Journal of Engineering and Technology, Vol. 5, Issue 2,pp.1882-1889, 2013.

3. R. Maheswari, V. Pattabiraman, “Dynamic Reconfigurable Computing in OR1200 Core of Embedded System”, International Journal Computing Technology and Electronic Communications, vol.2, no.2, pp. 1-9, 2013.

4. Mehfooza Munavar and Pattabiraman. V, “A Methodology Adopted towards Analysis of Spatial Patterns of Chlorophyll Distribution in Coastal Areas”, International Journal of Computer Applications & Information Technology, Vol. 3, Issue II, pp. 20-24, 2013.

5. P. Sandhya & M. Lakshmi, “Web Service Selection Using Decision Tree Analysis in a Risky Environment”, Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, Vol. 279, pp. 1211- 1217, 2013.

6. R.Parvathi, ”Analysis of Land Surface Temperature And Predicting the Unknown Values Using Spatial Interpolation Methods”, International Journal of Computer Science & Engineering Technology, Vol. 4, No.5, pp.609-615, 2013.

7. D.Arivudainambi, D.Rekha, “Memetic algorithm for minimum energy broadcast problem in wireless ad hoc networks”, Elsevier Swarm and Evolutionary Computation, Vol.12, pp. 57–64, 2013.

8. A Muralidhar, “Discovering Closed Itemsets Based on Logical Patterns”, International Journal of Research in Computer Applications & Information Technology, 2013.

9. Umamaheswari.E, Ghosh D.K ,” Developing a Reliability Prediction System Using Multivariate Analysis Theory on Software Quality Metrics “ International Journal of Engineering, Research and Technology, 2013.

10. P. Sandhya, M. Lakshmi , Web Service Selection Using Decision Tree Analysis in a Risky Environment, Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg,Vol279, pp 1211- 1217, 2013.

11. Nisha V M, ” An algorithm for sequence alignment in Regular expression signature generation” in International journal of Research in Computer Applications & Information Technology, Vol. 1,Issue 2, 2013.

12. Kalvina.R, Maheswari.N, Andrews.S ,”Intact Analysis of Intra Trials On Assorted Paradigms Of Gesture Based Communication System”. International Journal of Engineering and Technology, Vol.5, No.4, 2013.

13. Kanchana Devi V, Ganesan R, “Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack”, International Journal of Computer Applications (IJCA), Volume 70 – Number 6, pp 10-13, 2013.

14. Syed Imdad Huseny , I. Sumaiya Thasleen, “iSetup Oracle Migration Module for New Instance Configuration”, International Journal of Computer Science and Information Technology and Security, Vol.3, Issue 3, pp. 242-250, 2013.

15. Sonali N, Maheswari R, “An Intelligent Obstacle And Over Speeding Sensor To Prevent Dashing Of Motorcycles”, International Journal of Advanced Computational Engineering and Networking, Vol. 1, Issue.6, pp.56-59,2013.

16. D.Arivudainambi, D.Rekha, “Heuristic approach for broadcast scheduling for wireless mesh networks”, International Journal of Electronics and Communications, Vol.68, 489-495, 2013.

17. P.Padmashree, Maheswari R, “A Novel Technique For Image Compression In Hand Written Recognition Using Back Propagation In Neural Network”, International Journal Of Computer Science & Engineering Technology, Vol. 4, No. 06,pp.763-768, 2013.

18. K.P. Shyam, Sharath Jagannathan and Maheswari Rajavel, “A New Technique for Ranking Web Pages and Adwords”, International Journal of Computer Applications, Vol.82, No.12, 2013.

Year 2012

1. I.Sumaiya Thaseen, Ch.Aswani Kumar and Sulava Singh Mahapatra.Analysis of cross layer schemes to enhance TCP performance in MANET. Vol.2, No.3, Sept 2012.

2. Sasirekha, Sumaiya Thaseen and Saira Banu. A defense mechanism for credit card fraud detection. International Journal on Cryptography and Information Security”,Vol 2,No.3,Sept 2012.

3. Maheswari.N,Revathi.M, Protecting the Sensitivity using Data Distortion, International Journal of Computer Science, Information Technology, & Security (IJCSITS), Vol 2, No.4, Aug,2012.

4. R. Maheswari, V. Pattabiraman, “Performance Evaluation of OR1200 Processor with Evolutionary Parallel HPRC using GEP’, ICTACT Journal on Soft Computing, vol.2, no.3, pp. 331-336, April 2012.

5. Pattabiraman, V., “Optimization of Spatial Join using Constraints based Clustering Techniques”, Journal of Engineering and Computer Innovations, vol.3, no.1, pp. 1-10, February 2012.

6. Syed Imdad Huseny and Sumaiya Thaseen.I. Subledger Accounting in Oracle R12 New Release. International Journal of Computer Science and Information Technology and Security(IJCSITS), Vol.2, No.1,2012.

Year 2011

1. Syed Imdad Huseny and Sumaiya Thaseen.I. ,Multi Org Access Control in Oracle R12 New Release. IRACST –Engineering Science and Technology:ESTIJ,Vol.1,No.1,December 2011.

2. Preethi M and Sumaiya Thaseen. I. Detecting The Damage In Civil Infrastructure Using Sensors In Wireless Networks. International Journal of Advanced Research in Computer Science,Vol 2, No.2, Mar-Apr 2011.

3. Swathi.J.N, Sumaiya Thaseen. I and Sangeetha.S. Minimal Test Case Generation for Effective Program Test using Control Structure Methods and Test Effectiveness Ratio. International Journal of Computer Applications ,Vol 17, No.3, March 2011.

4. Sumaiya Thaseen. I, Muhammad Rukunuddin Ghalib and Fazal E Sattar K. A Secure Adaptive Agent Model using Model Driven Architecture. International Journal of Computer Information Systems, Vol. 2, No.2, Special Issue Feb 2011.

Funded Projects